CVE-2019-19590

Priority
Description
In radare2 through 4.0, there is an integer overflow for the variable
new_token_size in the function r_asm_massemble at libr/asm/asm.c. This
integer overflow will result in a Use-After-Free for the buffer tokens,
which can be filled with arbitrary malicious data after the free. This
allows remote attackers to cause a denial of service (application crash) or
possibly execute arbitrary code via crafted input.
Notes
Package
Upstream:needs-triage
Ubuntu 12.04 ESM (Precise Pangolin):DNE
Ubuntu 14.04 ESM (Trusty Tahr):DNE
Ubuntu 16.04 LTS (Xenial Xerus):needs-triage
Ubuntu 18.04 LTS (Bionic Beaver):needs-triage
Ubuntu 19.10 (Eoan Ermine):needs-triage
Ubuntu 20.04 (Focal Fossa):not-affected (4.2.1+dfsg-1)
More Information

Updated: 2020-02-19 13:14:32 UTC (commit 6482bb9a8b21f6b37c882a7613a3632ccd0a1d0a)