Impact
The vulnerability is a use‑after‑free in the gdbr_pids_list() function of radare2 6.1.5. It is triggered when a malformed thread information response causes qsThreadInfo to fail after qfThreadInfo has allocated RDebugPid structures. The failure path performs a double‑free of the allocated memory, allowing a remote attacker to corrupt memory, crash the process, or potentially execute arbitrary code.
Affected Systems
The affected product is radare2 version 6.1.5. No other versions are listed as affected in the provided data.
Risk and Exploitability
The CVSS score of 8.7 indicates high severity, but the EPSS score is not available so the precise likelihood of exploitation cannot be determined. Because this flaw allows remote attackers to send crafted GDB client responses, it can be exploited over a network where GDB debugging is exposed. The vulnerability is not listed in the CISA KEV catalog, but its potential to cause denial of service or arbitrary code execution warrants close monitoring and rapid remediation.
OpenCVE Enrichment