<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/"><channel><title>Gdb — CraftedSignal Threat Feed</title><link>https://feed.craftedsignal.io/tags/gdb/</link><description>Trending threats, MITRE ATT&amp;CK coverage, and detection metadata. Fed continuously.</description><generator>Hugo</generator><language>en</language><managingEditor>hello@craftedsignal.io</managingEditor><webMaster>hello@craftedsignal.io</webMaster><lastBuildDate>Fri, 15 May 2026 17:19:37 +0000</lastBuildDate><atom:link href="https://feed.craftedsignal.io/tags/gdb/feed.xml" rel="self" type="application/rss+xml"/><item><title>radare2 Use-After-Free Vulnerability in gdbr_threads_list() Function (CVE-2026-8695)</title><link>https://feed.craftedsignal.io/briefs/2026-05-radare2-uaf/</link><pubDate>Fri, 15 May 2026 17:19:37 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-05-radare2-uaf/</guid><description>radare2 version 6.1.5 contains a use-after-free vulnerability in the gdbr_threads_list() function, allowing remote attackers to trigger memory corruption by sending a valid qfThreadInfo response followed by a malformed qsThreadInfo response, potentially leading to denial of service or code execution through GDB remote debugging (CVE-2026-8695).</description><content:encoded><![CDATA[<p>radare2 is a reverse engineering and binary analysis framework. Version 6.1.5 contains a use-after-free vulnerability (CVE-2026-8695) within the <code>gdbr_threads_list()</code> function. This flaw can be exploited by remote attackers via GDB remote debugging. By sending a specifically crafted sequence of GDB thread information requests, specifically a valid <code>qfThreadInfo</code> followed by a malformed <code>qsThreadInfo</code> request, an attacker can trigger memory corruption. Successful exploitation could lead to a denial-of-service condition or potentially arbitrary code execution. This vulnerability poses a risk to systems where radare2 is used for debugging or analysis of potentially untrusted binaries.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>Attacker establishes a GDB remote debugging connection to the target radare2 instance.</li>
<li>Attacker sends a valid <code>qfThreadInfo</code> request to initiate thread list retrieval.</li>
<li>The radare2 instance processes the <code>qfThreadInfo</code> request and prepares the initial thread list.</li>
<li>Attacker sends a malformed <code>qsThreadInfo</code> request as a continuation of thread list retrieval.</li>
<li>The <code>gdbr_threads_list()</code> function attempts to process the malformed <code>qsThreadInfo</code> response.</li>
<li>Due to the malformed data, the function accesses a previously freed memory location.</li>
<li>This use-after-free condition triggers memory corruption.</li>
<li>Depending on the memory layout and attacker-controlled data, this can lead to a denial of service (application crash) or potentially code execution.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of CVE-2026-8695 can result in a denial-of-service condition, where the radare2 application crashes, interrupting debugging or analysis tasks. In more sophisticated scenarios, attackers could potentially achieve arbitrary code execution by carefully manipulating the memory corruption caused by the use-after-free vulnerability. The impact is greatest in environments where radare2 is used to analyze potentially malicious binaries, as the attacker could leverage this vulnerability to compromise the analysis system.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Upgrade to a version of radare2 that patches CVE-2026-8695.</li>
<li>Monitor network connections for unusual GDB debugging traffic using the <code>Detect Malformed GDB Thread Info Request</code> Sigma rule.</li>
<li>Consider restricting access to GDB debugging interfaces to trusted networks or users.</li>
<li>Review the provided references (especially the VulnCheck advisory) for more context on the exploitation details for CVE-2026-8695.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>use-after-free</category><category>memory-corruption</category><category>gdb</category><category>debugging</category></item></channel></rss>