Rizin versions 0.4.0 and prior are vulnerable to an out-of-bounds write when getting data from Luac files. A user opening a malicious Luac file could be affected by this vulnerability, allowing an attacker to execute code on the user's machine. https://github.com/rizinorg/rizin/security/advisories/GHSA-mqcj-82c6-gh5q https://github.com/rizinorg/rizin/commit/07b43bc8aa1ffebd9b68d60624c9610cf7e460c7 https://github.com/rizinorg/rizin/commit/05bbd147caccc60162d6fba9baaaf24befa281cd
Created rizin tracking bugs for this issue: Affects: epel-all [bug 2126128] Affects: fedora-all [bug 2126131]
This CVE Bugzilla entry is for community support informational purposes only as it does not affect a package in a commercially supported Red Hat product. Refer to the dependent bugs for status of those individual community products.