radare2 6.1.5 contains a use-after-free vulnerability in...
High severity
Unreviewed
Published
May 15, 2026
to the GitHub Advisory Database
•
Updated May 15, 2026
Description
Published by the National Vulnerability Database
May 15, 2026
Published to the GitHub Advisory Database
May 15, 2026
Last updated
May 15, 2026
radare2 6.1.5 contains a use-after-free vulnerability in the gdbr_pids_list() function within the GDB client core that allows remote attackers to cause a denial of service or potentially execute arbitrary code by sending malformed thread information responses. Attackers can trigger the vulnerability by causing qsThreadInfo to fail after qfThreadInfo successfully allocates RDebugPid structures, resulting in double-free memory corruption when the error path attempts to clean up the list.
References