First published: Wed May 12 2021(Updated: )
In radare2 through 5.3.0 there is a double free vulnerability in the pyc parse via a crafted file which can lead to DoS.
Credit: patrick@puiterwijk.org
Affected Software | Affected Version | How to fix |
---|---|---|
radare2 | <=5.3.0 | |
Fedora | =33 | |
Fedora | =34 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2021-32613 is classified as a medium severity vulnerability due to its potential for denial of service (DoS).
To fix CVE-2021-32613, upgrade radare2 to version 5.4.0 or later where the vulnerability is patched.
The vulnerability in CVE-2021-32613 is caused by a double free in the pyc parser when handling specially crafted files.
CVE-2021-32613 affects radare2 versions up to and including 5.3.0.
CVE-2021-32613 specifically can lead to a denial of service (DoS) but does not directly cause data loss.