File _patchinfo of Package patchinfo.18697

<patchinfo incident="18697">
  <issue tracker="cve" id="2024-29645"/>
  <issue tracker="bnc" id="1234065">VUL-0: CVE-2024-29645: radare2: buffer overflow vulnerability allows an attacker to execute arbitrary code via the parse_die function</issue>
  <packager>abergmann</packager>
  <rating>important</rating>
  <category>security</category>
  <summary>Security update for radare2</summary>
  <description>This update for radare2 fixes the following issues:

Update to version 5.9.8:

- CVE-2024-29645: buffer overflow vulnerability allows an attacker to
  execute arbitrary code via the parse_die function (boo#1234065).
- For more details, check full release notes:
  https://github.com/radareorg/radare2/releases/tag/5.9.8
  https://github.com/radareorg/radare2/releases/tag/5.9.6
  https://github.com/radareorg/radare2/releases/tag/5.9.4
  https://github.com/radareorg/radare2/releases/tag/5.9.2
  https://github.com/radareorg/radare2/releases/tag/5.9.0 
  https://github.com/radareorg/radare2/releases/tag/5.8.8
</description>
</patchinfo>
openSUSE Build Service is sponsored by