Impact
A use‑after‑free flaw exists in radare2 6.1.5’s gdbr_threads_list() routine. The bug is triggered when a GDB client sends a valid qfThreadInfo response followed by a malformed qsThreadInfo reply, causing memory corruption that can lead to denial of service or, if carefully crafted, to arbitrary code execution.
Affected Systems
The vulnerability affects the radare2 project, specifically the radare2 executable running version 6.1.5. No other versions are listed as affected in the advisory.
Risk and Exploitability
The CVSS score of 8.7 indicates a high severity assessment. EPSS data is not available, and the flaw is not listed in CISA KEV, but that does not reduce the risk. Remote exploitation is possible through the GDB remote debugging interface; an attacker who can reach the debug port on a machine running the vulnerable radare2 binary can trigger the flaw by sending the appropriate GDB protocol packets, potentially crashing the service or achieving code execution.
OpenCVE Enrichment