Memory Corruption Vulnerability in Radare2 by Radare Org
CVE-2025-5647
Key Information:
- Vendor
Radare Org
- Status
- Vendor
- CVE Published:
- 5 June 2025
Badges
What is CVE-2025-5647?
A memory corruption vulnerability exists in Radare2 version 5.9.9 and the master branch, specifically affecting the r_cons_context_break_pop function within the radiff2 component. This vulnerability is triggered through manipulation of the experimental argument -T, which is noted to be 'crashy.' Although exploitation requires local access and is technically complex, public disclosures indicate that it is feasible. Users are advised to implement the provided patch (5705d99cc1f23f36f9a84aab26d1724010b97798) to mitigate risks. Recent updates have noted that the race condition may not present significant issues unless AddressSanitizer (asan) is in use, and a warning has been added accordingly.
Affected Version(s)
Radare2 5.9.9
Exploit Proof of Concept (PoC)
PoC code is written by security researchers to demonstrate the vulnerability can be exploited. PoC code is also a key component for weaponization which could lead to ransomware.
References
CVSS V4
Timeline
- 🟡
Public PoC available
- 👾
Exploit known to exist
Vulnerability published
Vulnerability Reserved