Source: radare2
Version: 6.0.7+ds-1
Severity: important
Tags: security upstream
X-Debbugs-Cc: [email protected], Debian Security Team <[email protected]>

Hi,

The following vulnerability was published for radare2.

CVE-2026-8695[0]:
| radare2 6.1.5 contains a use-after-free vulnerability in the
| gdbr_threads_list() function that allows remote attackers to trigger
| memory corruption by sending a valid qfThreadInfo response followed
| by a malformed qsThreadInfo response. Attackers can exploit this
| vulnerability through GDB remote debugging to cause a denial of
| service or potentially achieve code execution by manipulating thread
| list processing.


If you fix the vulnerability please also make sure to include the
CVE (Common Vulnerabilities & Exposures) id in your changelog entry.

For further information see:

[0] https://security-tracker.debian.org/tracker/CVE-2026-8695
    https://www.cve.org/CVERecord?id=CVE-2026-8695
[1] https://github.com/radareorg/radare2/issues/25835
[2] https://github.com/radareorg/radare2/issues/25836
[3] 
https://github.com/radareorg/radare2/commit/c213ad6894a1eb9086ac8bf5fae35757e9e1683c

Regards,
Salvatore

Reply via email to