No advisories yet.
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
Tue, 19 May 2026 13:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Mon, 18 May 2026 18:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| CPEs | cpe:2.3:a:radare:radare2:*:*:*:*:*:*:*:* |
Sun, 17 May 2026 18:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Radare
Radare radare2 |
|
| Vendors & Products |
Radare
Radare radare2 |
Fri, 15 May 2026 21:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | radare2 6.1.5 contains a use-after-free vulnerability in the gdbr_pids_list() function within the GDB client core that allows remote attackers to cause a denial of service or potentially execute arbitrary code by sending malformed thread information responses. Attackers can trigger the vulnerability by causing qsThreadInfo to fail after qfThreadInfo successfully allocates RDebugPid structures, resulting in double-free memory corruption when the error path attempts to clean up the list. | |
| Title | radare2 6.1.5 Use-After-Free via gdbr_pids_list() | |
| Weaknesses | CWE-416 | |
| References |
| |
| Metrics |
cvssV3_1
|
Projects
Sign in to view the affected projects.
Status: PUBLISHED
Assigner: VulnCheck
Published:
Updated: 2026-05-19T12:30:09.977Z
Reserved: 2026-05-15T16:29:43.746Z
Link: CVE-2026-8696
Updated: 2026-05-19T12:29:58.682Z
Status : Modified
Published: 2026-05-15T21:16:39.360
Modified: 2026-05-19T14:16:49.757
Link: CVE-2026-8696
No data.
OpenCVE Enrichment
Updated: 2026-05-17T17:01:05Z