radare2 through 4.0.0 lacks validation of the content variable in the function r_asm_pseudo_incbin at libr/asm/asm.c, ultimately leading to an arbitrary write. This allows remote attackers to cause a denial of service (application crash) or possibly have unspecified other impact via crafted input. Reference: https://github.com/radareorg/radare2/issues/15545
Created radare2 tracking bugs for this issue: Affects: epel-7 [bug 1783454] Affects: fedora-all [bug 1783453]
This CVE Bugzilla entry is for community support informational purposes only as it does not affect a package in a commercially supported Red Hat product. Refer to the dependent bugs for status of those individual community products.