Out-of-Bounds Affecting radare2 package, versions *


Severity

Recommended
0.0
low
0
10

Snyk's Security Team recommends NVD's CVSS assessment. Learn more

Threat Intelligence

EPSS
0.03% (7th percentile)

Do your applications use this vulnerable package?

In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.

Test your applications
  • Snyk IDSNYK-DEBIANUNSTABLE-RADARE2-10304465
  • published6 Jun 2025
  • disclosed5 Jun 2025

Introduced: 5 Jun 2025

CVE-2025-5643  (opens in a new tab)
CWE-119  (opens in a new tab)

How to fix?

There is no fixed version for Debian:unstable radare2.

NVD Description

Note: Versions mentioned in the description apply only to the upstream radare2 package and not the radare2 package as distributed by Debian. See How to fix? for Debian:unstable relevant fixed versions and status.

A vulnerability classified as problematic was found in Radare2 5.9.9. Affected by this vulnerability is the function cons_stack_load in the library /libr/cons/cons.c of the component radiff2. The manipulation of the argument -T leads to memory corruption. An attack has to be approached locally. The complexity of an attack is rather high. The exploitation appears to be difficult. The exploit has been disclosed to the public and may be used. The real existence of this vulnerability is still doubted at the moment. The patch is named 5705d99cc1f23f36f9a84aab26d1724010b97798. It is recommended to apply a patch to fix this issue. The documentation explains that the parameter -T is experimental and "crashy". Further analysis has shown "the race is not a real problem unless you use asan". A new warning has been added.

CVSS Base Scores

version 3.1