CVE-2022-36040

Source
https://cve.org/CVERecord?id=CVE-2022-36040
Import Source
https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2022-36040.json
JSON Data
https://api.test.osv.dev/v1/vulns/CVE-2022-36040
Aliases
  • GHSA-h897-rhm9-rpmw
Published
2022-09-06T00:00:00Z
Modified
2026-02-20T16:47:13.776205Z
Severity
  • 7.8 (High) CVSS_V3 - CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H CVSS Calculator
Summary
Rizin Out-of-bounds Write vulnerability in pyc/marshal.c
Details

Rizin is a UNIX-like reverse engineering framework and command-line toolset. Versions 0.4.0 and prior are vulnerable to an out-of-bounds write when getting data from PYC(python) files. A user opening a malicious PYC file could be affected by this vulnerability, allowing an attacker to execute code on the user's machine. Commit number 68948017423a12786704e54227b8b2f918c2fd27 contains a patch.

Database specific
{
    "cna_assigner": "GitHub_M",
    "cwe_ids": [
        "CWE-787"
    ],
    "osv_generated_from": "https://github.com/CVEProject/cvelistV5/tree/main/cves/2022/36xxx/CVE-2022-36040.json"
}
References

Affected packages

Git / github.com/rizinorg/rizin

Affected ranges

Type
GIT
Repo
https://github.com/rizinorg/rizin
Events
Introduced
0 Unknown introduced commit / All previous commits are affected
Fixed

Database specific

source
"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2022-36040.json"
vanir_signatures
[
    {
        "signature_version": "v1",
        "signature_type": "Function",
        "target": {
            "file": "librz/bin/format/pyc/marshal.c",
            "function": "get_complex_object"
        },
        "deprecated": false,
        "source": "https://github.com/rizinorg/rizin/commit/68948017423a12786704e54227b8b2f918c2fd27",
        "digest": {
            "length": 1154.0,
            "function_hash": "72458637873801972653470581717360473393"
        },
        "id": "CVE-2022-36040-6537e996"
    },
    {
        "signature_version": "v1",
        "signature_type": "Line",
        "target": {
            "file": "librz/bin/format/pyc/marshal.c"
        },
        "deprecated": false,
        "source": "https://github.com/rizinorg/rizin/commit/68948017423a12786704e54227b8b2f918c2fd27",
        "digest": {
            "line_hashes": [
                "82261749963884352064761051487121887822",
                "228268872496510562546183714163607576222",
                "199466917720915328768596104141075825853",
                "293482853746269340502531165291506837508",
                "140999574085095719459912485404339349722",
                "116412659685932707513396615129518789484",
                "173925645218753159051339930150842507044",
                "312678228229500263673679713722502109697",
                "68626622871899505520720809438743105521",
                "151776157733578431625676153769401840921",
                "136916274336501706032085600434429911593",
                "311877571123002377407786169711506545989",
                "261076102413676695034074526986463750302",
                "292817559914706842946213124231108447799",
                "239081205955742708329577561677706450353",
                "203515982502618665553204445678132622747",
                "85884461731748264322993589370992014696",
                "243075124111099643022453739273065865248",
                "318682926191024384660535147717027302238",
                "101345095486902603108522056330809211919",
                "320471860538681276076444384901723410039",
                "204701611301982111874660282145742224988",
                "222056925131123246676957947244190969287",
                "160754004593734786832102050938434667205"
            ],
            "threshold": 0.9
        },
        "id": "CVE-2022-36040-7b35c5b5"
    }
]