漏洞信息
尽管我们使用了先进的大模型技术,但其输出仍可能包含不准确或过时的信息。神龙努力确保数据的准确性,但请您根据实际情况进行核实和判断。
Vulnerability Title
Radare2 radiff2 cons.c r_cons_flush use after free
Vulnerability Description
A vulnerability, which was classified as problematic, has been found in Radare2 5.9.9. Affected by this issue is the function r_cons_flush in the library /libr/cons/cons.c of the component radiff2. The manipulation of the argument -T leads to use after free. Local access is required to approach this attack. The complexity of an attack is rather high. The exploitation is known to be difficult. The exploit has been disclosed to the public and may be used. The real existence of this vulnerability is still doubted at the moment. The name of the patch is 5705d99cc1f23f36f9a84aab26d1724010b97798. It is recommended to apply a patch to fix this issue. The documentation explains that the parameter -T is experimental and "crashy". Further analysis has shown "the race is not a real problem unless you use asan". A new warning has been added.
CVSS Information
CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:L
Vulnerability Type
释放后使用
Vulnerability Title
Radare2 资源管理错误漏洞
Vulnerability Description
Radare2是Radare开源的一个面向 Unix 极客的 Libre 反向框架。 Radare2 5.9.9版本存在资源管理错误漏洞,该漏洞源于组件radiff2中函数r_cons_flush对参数-T操作不当,可能导致释放后重用。
CVSS Information
N/A
Vulnerability Type
N/A