Gentoo Websites Logo
Go to: Gentoo Home Documentation Forums Lists Bugs Planet Store Wiki Get Gentoo!
Bug 868999 (CVE-2022-36039, CVE-2022-36040, CVE-2022-36041, CVE-2022-36042, CVE-2022-36043, CVE-2022-36044) - <dev-util/rizin-0.4.1: multiple vulnerabilities
Summary: <dev-util/rizin-0.4.1: multiple vulnerabilities
Status: RESOLVED FIXED
Alias: CVE-2022-36039, CVE-2022-36040, CVE-2022-36041, CVE-2022-36042, CVE-2022-36043, CVE-2022-36044
Product: Gentoo Security
Classification: Unclassified
Component: Vulnerabilities (show other bugs)
Hardware: All Linux
: Normal normal (vote)
Assignee: Gentoo Security
URL:
Whiteboard: B2 [glsa+]
Keywords:
Depends on:
Blocks:
 
Reported: 2022-09-07 00:02 UTC by John Helmert III
Modified: 2022-09-25 13:56 UTC (History)
2 users (show)

See Also:
Package list:
Runtime testing required: ---


Attachments

Note You need to log in before you can comment on or make changes to this bug.
Description John Helmert III archtester Gentoo Infrastructure gentoo-dev Security 2022-09-07 00:02:10 UTC
CVE-2022-36040 (https://github.com/rizinorg/rizin/security/advisories/GHSA-h897-rhm9-rpmw):

Rizin is a UNIX-like reverse engineering framework and command-line toolset. Versions 0.4.0 and prior are vulnerable to an out-of-bounds write when getting data from PYC(python) files. A user opening a malicious PYC file could be affected by this vulnerability, allowing an attacker to execute code on the user's machine. Commit number 68948017423a12786704e54227b8b2f918c2fd27 contains a patch.

https://github.com/rizinorg/rizin/issues/2963
https://github.com/rizinorg/rizin/commit/68948017423a12786704e54227b8b2f918c2fd27

CVE-2022-36041 (https://github.com/rizinorg/rizin/security/advisories/GHSA-2c7m-2f37-mr5m):

Rizin is a UNIX-like reverse engineering framework and command-line toolset. Versions 0.4.0 and prior are vulnerable to an out-of-bounds write when parsing Mach-O files. A user opening a malicious Mach-O file could be affected by this vulnerability, allowing an attacker to execute code on the user's machine. Commit number 7323e64d68ecccfb0ed3ee480f704384c38676b2 contains a patch.

https://github.com/rizinorg/rizin/issues/2956
https://github.com/rizinorg/rizin/commit/7323e64d68ecccfb0ed3ee480f704384c38676b2

CVE-2022-36043 (https://github.com/rizinorg/rizin/security/advisories/GHSA-rjhv-mj4g-j4p5):

Rizin is a UNIX-like reverse engineering framework and command-line toolset. Versions 0.4.0 and prior are vulnerable to a double free in bobj.c:rz_bin_reloc_storage_free() when freeing relocations generated from qnx binary plugin. A user opening a malicious qnx binary could be affected by this vulnerability, allowing an attacker to execute code on the user's machine. Commit number a3d50c1ea185f3f642f2d8180715f82d98840784 contains a patch for this issue.

https://github.com/rizinorg/rizin/issues/2964
https://github.com/rizinorg/rizin/commit/a3d50c1ea185f3f642f2d8180715f82d98840784

CVE-2022-36044 (https://github.com/rizinorg/rizin/security/advisories/GHSA-mqcj-82c6-gh5q):

Rizin is a UNIX-like reverse engineering framework and command-line toolset. Versions 0.4.0 and prior are vulnerable to an out-of-bounds write when getting data from Luac files. A user opening a malicious Luac file could be affected by this vulnerability, allowing an attacker to execute code on the user's machine. Commits 07b43bc8aa1ffebd9b68d60624c9610cf7e460c7 and 05bbd147caccc60162d6fba9baaaf24befa281cd contain fixes for the issue.

https://github.com/rizinorg/rizin/commit/05bbd147caccc60162d6fba9baaaf24befa281cd
https://github.com/rizinorg/rizin/commit/07b43bc8aa1ffebd9b68d60624c9610cf7e460c7

Seems not released yet.
Comment 1 John Helmert III archtester Gentoo Infrastructure gentoo-dev Security 2022-09-07 00:04:30 UTC
CVE-2022-36039 (https://github.com/rizinorg/rizin/security/advisories/GHSA-pr85-hv85-45pg):

Rizin is a UNIX-like reverse engineering framework and command-line toolset. Versions 0.4.0 and prior are vulnerable to out-of-bounds write when parsing DEX files. A user opening a malicious DEX file could be affected by this vulnerability, allowing an attacker to execute code on the user's machine. A patch is available on the `dev` branch of the repository.

https://github.com/rizinorg/rizin/issues/2969
https://github.com/rizinorg/rizin/commit/1524f85211445e41506f98180f8f69f7bf115406

CVE-2022-36042 (https://github.com/rizinorg/rizin/security/advisories/GHSA-pf72-jg54-8gvp):

Rizin is a UNIX-like reverse engineering framework and command-line toolset. Versions 0.4.0 and prior are vulnerable to an out-of-bounds write when getting data from dyld cache files. A user opening a malicious dyld cache file could be affected by this vulnerability, allowing an attacker to execute code on the user's machine. Commit number 556ca2f9eef01ec0f4a76d1fbacfcf3a87a44810 contains a patch.

https://github.com/rizinorg/rizin/commit/556ca2f9eef01ec0f4a76d1fbacfcf3a87a44810
Comment 2 Larry the Git Cow gentoo-dev 2022-09-10 15:29:37 UTC
The bug has been referenced in the following commit(s):

https://gitweb.gentoo.org/repo/gentoo.git/commit/?id=c1e0726a3bb3579ce4d2e555707a41906967719c

commit c1e0726a3bb3579ce4d2e555707a41906967719c
Author:     John Helmert III <ajak@gentoo.org>
AuthorDate: 2022-09-10 15:29:16 +0000
Commit:     John Helmert III <ajak@gentoo.org>
CommitDate: 2022-09-10 15:29:33 +0000

    dev-util/rizin: add 0.4.1
    
    Bug: https://bugs.gentoo.org/868999
    Signed-off-by: John Helmert III <ajak@gentoo.org>

 dev-util/rizin/Manifest           |  2 +
 dev-util/rizin/rizin-0.4.1.ebuild | 94 +++++++++++++++++++++++++++++++++++++++
 2 files changed, 96 insertions(+)
Comment 3 Larry the Git Cow gentoo-dev 2022-09-18 21:43:04 UTC
The bug has been referenced in the following commit(s):

https://gitweb.gentoo.org/repo/gentoo.git/commit/?id=afc498940ea5697bf841f7f8e052be6ec4768396

commit afc498940ea5697bf841f7f8e052be6ec4768396
Author:     John Helmert III <ajak@gentoo.org>
AuthorDate: 2022-09-18 21:40:45 +0000
Commit:     John Helmert III <ajak@gentoo.org>
CommitDate: 2022-09-18 21:42:57 +0000

    dev-util/rizin: drop 0.4.0-r1
    
    Bug: https://bugs.gentoo.org/861524
    Bug: https://bugs.gentoo.org/868999
    Signed-off-by: John Helmert III <ajak@gentoo.org>

 dev-util/rizin/Manifest                         |  2 -
 dev-util/rizin/files/rizin-0.4.0-capstone.patch | 22 ------
 dev-util/rizin/rizin-0.4.0-r1.ebuild            | 95 -------------------------
 3 files changed, 119 deletions(-)
Comment 4 John Helmert III archtester Gentoo Infrastructure gentoo-dev Security 2022-09-19 04:49:43 UTC
Request filed
Comment 5 John Helmert III archtester Gentoo Infrastructure gentoo-dev Security 2022-09-25 13:39:22 UTC
GLSA released, all done!
Comment 6 Larry the Git Cow gentoo-dev 2022-09-25 13:56:45 UTC
The bug has been referenced in the following commit(s):

https://gitweb.gentoo.org/data/glsa.git/commit/?id=89088d8ee19407be5e30c10d244979cbc879b19f

commit 89088d8ee19407be5e30c10d244979cbc879b19f
Author:     GLSAMaker <glsamaker@gentoo.org>
AuthorDate: 2022-09-25 13:33:58 +0000
Commit:     John Helmert III <ajak@gentoo.org>
CommitDate: 2022-09-25 13:42:17 +0000

    [ GLSA 202209-06 ] Rizin: Multiple Vulnerabilities
    
    Bug: https://bugs.gentoo.org/861524
    Bug: https://bugs.gentoo.org/868999
    Signed-off-by: GLSAMaker <glsamaker@gentoo.org>
    Signed-off-by: John Helmert III <ajak@gentoo.org>

 glsa-202209-06.xml | 49 +++++++++++++++++++++++++++++++++++++++++++++++++
 1 file changed, 49 insertions(+)