Description
radare2 6.1.5 contains a use-after-free vulnerability in the gdbr_threads_list() function that allows remote attackers to trigger memory corruption by sending a valid qfThreadInfo response followed by a malformed qsThreadInfo response. Attackers can exploit this vulnerability through GDB remote debugging to cause a denial of service or potentially achieve code execution by manipulating thread list processing.
Problem types
Product status
6.1.5 (semver)
c213ad6894a1eb9086ac8bf5fae35757e9e1683c (git)
Credits
Saad Elharaj
References
github.com/radareorg/radare2/issues/25835
github.com/radareorg/radare2/issues/25835
github.com/...ommit/c213ad6894a1eb9086ac8bf5fae35757e9e1683c
www.vulncheck.com/...e2-use-after-free-via-gdbr-threads-list
github.com/radareorg/radare2/issues/25836