An off-by-one overflow flaw was found in radare2 due to mismatched array length in core_java.c. This could allow an attacker to cause a crash, and perform a denail of service attack.
A product calculates or uses an incorrect maximum or minimum value that is 1 more, or 1 less, than the correct value.
Name | Vendor | Start Version | End Version |
---|---|---|---|
Radare2 | Radare | * | 4.4.0 (excluding) |
Radare2 | Ubuntu | bionic | * |
Radare2 | Ubuntu | esm-apps/bionic | * |
Radare2 | Ubuntu | esm-apps/focal | * |
Radare2 | Ubuntu | esm-apps/xenial | * |
Radare2 | Ubuntu | focal | * |
Radare2 | Ubuntu | lunar | * |
Radare2 | Ubuntu | trusty | * |
Radare2 | Ubuntu | upstream | * |
Radare2 | Ubuntu | xenial | * |