CVE-2019-19590
Publication date 5 December 2019
Last updated 26 August 2025
Ubuntu priority
Cvss 3 Severity Score
Description
In radare2 through 4.0, there is an integer overflow for the variable new_token_size in the function r_asm_massemble at libr/asm/asm.c. This integer overflow will result in a Use-After-Free for the buffer tokens, which can be filled with arbitrary malicious data after the free. This allows remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via crafted input.
Status
| Package | Ubuntu Release | Status | 
|---|---|---|
| radare2 | 25.10 questing | 
                                Not affected 
                                
                               | 
| 25.04 plucky | 
                                Not affected 
                                
                               | |
| 24.04 LTS noble | 
                                Not affected 
                                
                               | |
| 22.04 LTS jammy | Not in release | |
| 20.04 LTS focal | 
                                Not affected 
                                
                               | |
| 18.04 LTS bionic | 
                                Vulnerable 
                                
                               | |
| 16.04 LTS xenial | 
                                Vulnerable 
                                
                               | |
| 14.04 LTS trusty | Not in release | 
Severity score breakdown
| Parameter | Value | 
|---|---|
| Base score |  | 
| Attack vector | Local | 
| Attack complexity | Low | 
| Privileges required | None | 
| User interaction | Required | 
| Scope | Unchanged | 
| Confidentiality | High | 
| Integrity impact | High | 
| Availability impact | High | 
| Vector | CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H |