Bug 2178821 (CVE-2023-27590) - CVE-2023-27590 rizin: stack-based buffer overflow
Summary: CVE-2023-27590 rizin: stack-based buffer overflow
Keywords:
Status: CLOSED UPSTREAM
Alias: CVE-2023-27590
Product: Security Response
Classification: Other
Component: vulnerability
Version: unspecified
Hardware: All
OS: Linux
high
high
Target Milestone: ---
Assignee: Red Hat Product Security
QA Contact:
URL:
Whiteboard:
Depends On: 2178822 2178823
Blocks:
TreeView+ depends on / blocked
 
Reported: 2023-03-15 19:26 UTC by Patrick Del Bello
Modified: 2023-03-15 23:02 UTC (History)
0 users

Fixed In Version:
Clone Of:
Environment:
Last Closed: 2023-03-15 23:02:09 UTC
Embargoed:


Attachments (Terms of Use)

Description Patrick Del Bello 2023-03-15 19:26:17 UTC
Rizin is a UNIX-like reverse engineering framework and command-line toolset. In version 0.5.1 and prior, converting a GDB registers profile file into a Rizin register profile can result in a stack-based buffer overflow when the `name`, `type`, or `groups` fields have longer values than expected. Users opening untrusted GDB registers files (e.g. with the `drpg` or `arpg` commands) are affected by this flaw. Commit d6196703d89c84467b600ba2692534579dc25ed4 contains a patch for this issue. As a workaround, review the GDB register profiles before loading them with `drpg`/`arpg` commands.

https://github.com/rizinorg/rizin/security/advisories/GHSA-rqcp-m8m2-jcqf
https://github.com/rizinorg/rizin/pull/3422
https://github.com/rizinorg/rizin/commit/d6196703d89c84467b600ba2692534579dc25ed4
https://github.com/rizinorg/rizin/blob/3a7d5116244beb678ad9950bb9dd27d28ed2691f/librz/reg/profile.c#L545
https://github.com/rizinorg/rizin/blob/3a7d5116244beb678ad9950bb9dd27d28ed2691f/librz/reg/profile.c#L514

Comment 1 Patrick Del Bello 2023-03-15 19:26:34 UTC
Created rizin tracking bugs for this issue:

Affects: epel-all [bug 2178822]
Affects: fedora-all [bug 2178823]

Comment 2 Product Security DevOps Team 2023-03-15 23:02:07 UTC
This CVE Bugzilla entry is for community support informational purposes only as it does not affect a package in a commercially supported Red Hat product. Refer to the dependent bugs for status of those individual community products.


Note You need to log in before you can comment on or make changes to this bug.