The grubext2read_block function in fs/ext2.c in GNU GRUB before 2013-11-12, as used in shlr/grub/fs/ext2.c in radare2 1.5.0, allows remote attackers to cause a denial of service (excessive stack use and application crash) via a crafted binary file, related to use of a variable-size stack array.
{ "binaries": [ { "binary_name": "libradare2-0.9.6", "binary_version": "0.9.6-3.1ubuntu1" }, { "binary_name": "libradare2-common", "binary_version": "0.9.6-3.1ubuntu1" }, { "binary_name": "libradare2-dev", "binary_version": "0.9.6-3.1ubuntu1" }, { "binary_name": "radare2", "binary_version": "0.9.6-3.1ubuntu1" }, { "binary_name": "radare2-plugins", "binary_version": "0.9.6-3.1ubuntu1" } ] }