Home

Description

Rizin is a UNIX-like reverse engineering framework and command-line toolset. Prior to 0.8.2, a heap overflow can be exploited when a malicious mach0 file, having bogus entries for the dyld chained segments, is parsed by rizin. This vulnerability is fixed in 0.8.2.

PUBLISHED Reserved 2026-01-09 | Published 2026-02-02 | Updated 2026-02-03 | Assigner GitHub_M




MEDIUM: 4.4CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:L

Problem types

CWE-770: Allocation of Resources Without Limits or Throttling

Product status

< 0.8.2
affected

References

github.com/.../rizin/security/advisories/GHSA-f3v7-xhmj-9cjj

github.com/rizinorg/rizin/issues/5768

github.com/rizinorg/rizin/pull/5770

github.com/...ommit/41ea75d5b07d9b41b27ae80675cdda65f1b1c989

github.com/.../librz/bin/format/mach0/mach0_chained_fixups.c

github.com/rizinorg/rizin/releases/tag/v0.8.2

cve.org (CVE-2026-22780)

nvd.nist.gov (CVE-2026-22780)

Download JSON