Gentoo Websites Logo
Go to: Gentoo Home Documentation Forums Lists Bugs Planet Store Wiki Get Gentoo!
Bug 903141 (CVE-2021-3674) - <dev-util/rizin-0.3.0: oob reads to code execution
Summary: <dev-util/rizin-0.3.0: oob reads to code execution
Status: RESOLVED FIXED
Alias: CVE-2021-3674
Product: Gentoo Security
Classification: Unclassified
Component: Vulnerabilities (show other bugs)
Hardware: All Linux
: Normal trivial (vote)
Assignee: Gentoo Security
URL:
Whiteboard: ~2 [noglsa]
Keywords:
Depends on:
Blocks:
 
Reported: 2023-03-27 00:21 UTC by John Helmert III
Modified: 2023-03-27 00:21 UTC (History)
2 users (show)

See Also:
Package list:
Runtime testing required: ---


Attachments

Note You need to log in before you can comment on or make changes to this bug.
Description John Helmert III archtester Gentoo Infrastructure gentoo-dev Security 2023-03-27 00:21:22 UTC
CVE-2021-3674 (https://github.com/rizinorg/rizin/pull/1313):

A flaw was found in rizin. The create_section_from_phdr function allocates space for ELF section data by processing the headers. Crafted values in the headers can cause out of bounds reads, which can lead to memory corruption and possibly code execution through the binary object's callback function.

No affected versions were ever stable. No GLSA.