--------------------------------------------------------------------------------
Fedora Update Notification
FEDORA-2024-d4d1e89e61
2024-12-12 02:29:32.892756+00:00
--------------------------------------------------------------------------------

Name        : radare2
Product     : Fedora 40
Version     : 5.9.8
Release     : 4.fc40
URL         : https://radare.org/
Summary     : The reverse engineering framework
Description :
The radare2 is a reverse-engineering framework that is multi-architecture,
multi-platform, and highly scriptable.  Radare2 provides a hexadecimal
editor, wrapped I/O, file system support, debugger support, diffing
between two functions or binaries, and code analysis at opcode,
basic block, and function levels.

--------------------------------------------------------------------------------
Update Information:

Bump radare2 to 5.9.8, iaito to 5.9.9, fixes CVE-2024-11858
--------------------------------------------------------------------------------
ChangeLog:

* Sat Nov 30 2024 Michal Ambroz  - 5.9.8-4
- fix epel build
* Mon Nov 25 2024 Michal Ambroz  - 5.9.8-2
- documentation of embedded quickjs-ng library
* Fri Nov 22 2024 Michal Ambroz  - 5.9.8-1
- bump to 5.9.8
--------------------------------------------------------------------------------
References:

  [ 1 ] Bug #2313891 - iaito: fails to install from epel9
        https://bugzilla.redhat.com/show_bug.cgi?id=2313891
  [ 2 ] Bug #2327286 - iaito-5.9.9 is available
        https://bugzilla.redhat.com/show_bug.cgi?id=2327286
  [ 3 ] Bug #2327308 - radare2-5.9.8 is available
        https://bugzilla.redhat.com/show_bug.cgi?id=2327308
  [ 4 ] Bug #2329104 - CVE-2024-11858 radare2: Command Injection via Pebble Application Files in Radare2 [epel-8]
        https://bugzilla.redhat.com/show_bug.cgi?id=2329104
  [ 5 ] Bug #2329105 - CVE-2024-11858 radare2: Command Injection via Pebble Application Files in Radare2 [epel-9]
        https://bugzilla.redhat.com/show_bug.cgi?id=2329105
  [ 6 ] Bug #2329107 - CVE-2024-11858 radare2: Command Injection via Pebble Application Files in Radare2 [fedora-40]
        https://bugzilla.redhat.com/show_bug.cgi?id=2329107
  [ 7 ] Bug #2329108 - CVE-2024-11858 radare2: Command Injection via Pebble Application Files in Radare2 [fedora-41]
        https://bugzilla.redhat.com/show_bug.cgi?id=2329108
  [ 8 ] Bug #2329622 - F41FailsToInstall: iaito
        https://bugzilla.redhat.com/show_bug.cgi?id=2329622
  [ 9 ] Bug #2329623 - F40FailsToInstall: iaito
        https://bugzilla.redhat.com/show_bug.cgi?id=2329623
--------------------------------------------------------------------------------

This update can be installed with the "dnf" update program. Use
su -c 'dnf upgrade --advisory FEDORA-2024-d4d1e89e61' at the command
line. For more information, refer to the dnf documentation available at
http://dnf.readthedocs.io/en/latest/command_ref.html#upgrade-command-label

All packages are signed with the Fedora Project GPG key. More details on the
GPG keys used by the Fedora Project can be found at
https://fedoraproject.org/keys
--------------------------------------------------------------------------------

-- 
_______________________________________________
package-announce mailing list -- package-announce@lists.fedoraproject.org
To unsubscribe send an email to package-announce-leave@lists.fedoraproject.org
Fedora Code of Conduct: https://docs.fedoraproject.org/en-US/project/code-of-conduct/
List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
List Archives: https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org
Do not reply to spam, report it: https://pagure.io/fedora-infrastructure/new_issue

Fedora 40: radare2 2024-d4d1e89e61

December 12, 2024
The radare2 is a reverse-engineering framework that is multi-architecture, multi-platform, and highly scriptable

Summary

The radare2 is a reverse-engineering framework that is multi-architecture,

multi-platform, and highly scriptable. Radare2 provides a hexadecimal

editor, wrapped I/O, file system support, debugger support, diffing

between two functions or binaries, and code analysis at opcode,

basic block, and function levels.

Update Information:

Bump radare2 to 5.9.8, iaito to 5.9.9, fixes CVE-2024-11858

Change Log

* Sat Nov 30 2024 Michal Ambroz - 5.9.8-4 - fix epel build * Mon Nov 25 2024 Michal Ambroz - 5.9.8-2 - documentation of embedded quickjs-ng library * Fri Nov 22 2024 Michal Ambroz - 5.9.8-1 - bump to 5.9.8

References

[ 1 ] Bug #2313891 - iaito: fails to install from epel9 https://bugzilla.redhat.com/show_bug.cgi?id=2313891 [ 2 ] Bug #2327286 - iaito-5.9.9 is available https://bugzilla.redhat.com/show_bug.cgi?id=2327286 [ 3 ] Bug #2327308 - radare2-5.9.8 is available https://bugzilla.redhat.com/show_bug.cgi?id=2327308 [ 4 ] Bug #2329104 - CVE-2024-11858 radare2: Command Injection via Pebble Application Files in Radare2 [epel-8] https://bugzilla.redhat.com/show_bug.cgi?id=2329104 [ 5 ] Bug #2329105 - CVE-2024-11858 radare2: Command Injection via Pebble Application Files in Radare2 [epel-9] https://bugzilla.redhat.com/show_bug.cgi?id=2329105 [ 6 ] Bug #2329107 - CVE-2024-11858 radare2: Command Injection via Pebble Application Files in Radare2 [fedora-40] https://bugzilla.redhat.com/show_bug.cgi?id=2329107 [ 7 ] Bug #2329108 - CVE-2024-11858 radare2: Command Injection via Pebble Application Files in Radare2 [fedora-41] ...

Read the Full Advisory

Update Instructions

This update can be installed with the "dnf" update program. Use su -c 'dnf upgrade --advisory FEDORA-2024-d4d1e89e61' at the command line. For more information, refer to the dnf documentation available at http://dnf.readthedocs.io/en/latest/command_ref.html#upgrade-command-label

Severity
Name : radare2
Product : Fedora 40
Version : 5.9.8
Release : 4.fc40
URL : https://radare.org/
Summary : The reverse engineering framework

Related News