A vulnerability was found in Radare2 in version 5.3.1. Improper input validation when reading a crafted LE binary can lead to resource exhaustion and DoS. Reference: https://github.com/radareorg/radare2/issues/18923 Upstream patch: https://github.com/radareorg/radare2/commit/d7ea20fb2e1433ebece9f004d87ad8f2377af23d
Created radare2 tracking bugs for this issue: Affects: epel-all [bug 1989137] Affects: fedora-all [bug 1989136]
This CVE Bugzilla entry is for community support informational purposes only as it does not affect a package in a commercially supported Red Hat product. Refer to the dependent bugs for status of those individual community products.