Skip to content

Stack-based buffer overflow when parsing GDB registers profile files

Moderate
ret2libc published GHSA-rqcp-m8m2-jcqf Mar 14, 2023

Package

rizin (C)

Affected versions

<=v0.5.1

Patched versions

0.5.2

Description

Impact

Converting a GDB registers profile file into a Rizin register profile can result in a stack-based buffer overflow when the name, type or groups fields have longer values than expected. Users opening untrusted GDB registers files (e.g. with the drpg or arpg commands) are affected by this flaw.

Patches

#3422
d619670

Workarounds

Review the GDB register profiles before loading them with drpg/arpg commands.

References

Severity

Moderate

CVE ID

CVE-2023-27590

Weaknesses

Credits