Radare2 has a division by zero vulnerability in Mach-O parser's rebase_buffer function. This allow attackers to create malicious inputs that can cause denial of service. References: https://github.com/radareorg/radare2/issues/18667 https://github.com/radareorg/radare2/commit/a07dedb804a82bc01c07072861942dd80c6b6d62
Created radare2 tracking bugs for this issue: Affects: epel-all [bug 2221282] Affects: fedora-all [bug 2221281]
This CVE Bugzilla entry is for community support informational purposes only as it does not affect a package in a commercially supported Red Hat product. Refer to the dependent bugs for status of those individual community products.
https://github.com/radareorg/radare2/commit/a07dedb804a82bc01c07072861942dd80c6b6d62 fixed since release 5.3.0