In radare 2.0.1, an out-of-bounds read vulnerability exists in stringscanrange() in libr/bin/bin.c when doing a string search.
{ "binaries": [ { "binary_name": "libradare2-2.3", "binary_version": "2.3.0+dfsg-2" }, { "binary_name": "libradare2-2.3-dbgsym", "binary_version": "2.3.0+dfsg-2" }, { "binary_name": "libradare2-common", "binary_version": "2.3.0+dfsg-2" }, { "binary_name": "libradare2-dev", "binary_version": "2.3.0+dfsg-2" }, { "binary_name": "radare2", "binary_version": "2.3.0+dfsg-2" }, { "binary_name": "radare2-dbgsym", "binary_version": "2.3.0+dfsg-2" } ], "ubuntu_priority": "untriaged", "availability": "No subscription required" }