CVE-2025-60359
Unknown Unknown - Not Provided
BaseFortify

Publication date: 2025-10-17

Last updated on: 2025-10-23

Assigner: MITRE

Description
radare2 v5.9.8 and before contains a memory leak in the function r_bin_object_new.
CVSS Scores
EPSS Scores
Probability:
Percentile:
Meta Information
Published
2025-10-17
Last Modified
2025-10-23
Generated
2026-05-07
AI Q&A
2025-10-17
EPSS Evaluated
2026-05-05
NVD
Affected Vendors & Products
Showing 1 associated CPE
Vendor Product Version / Range
radare radare2 to 5.9.8 (inc)
Helpful Resources
Exploitability
CWE
CWE Icon
KEV
KEV Icon
CWE ID Description
CWE-401 The product does not sufficiently track and release allocated memory after it has been used, making the memory unavailable for reallocation and reuse.
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?

CVE-2025-60359 is a memory leak vulnerability in radare2 versions up to and including v5.9.8. It occurs in the function r_bin_object_new, which improperly manages memory allocation, causing memory to be consumed without being freed. This can lead to resource exhaustion. [1]


How can this vulnerability impact me? :

This vulnerability can lead to a Denial of Service (DoS) by exhausting system memory, potentially causing the affected system or application to crash or become unresponsive. [1]


How can this vulnerability be detected on my network or system? Can you suggest some commands?

This vulnerability is a memory leak in the function r_bin_object_new in radare2 versions up to v5.9.8. Detection would involve monitoring the radare2 process for abnormal memory usage growth over time, which could indicate the leak. There are no specific commands provided to detect this vulnerability directly. General commands to monitor memory usage include 'top', 'htop', or 'ps aux --sort=-rss' on Linux systems. Additionally, running radare2 with debugging or profiling tools to observe memory allocation patterns might help identify the leak. [1]


What immediate steps should I take to mitigate this vulnerability?

The immediate mitigation step is to upgrade radare2 to a version that includes the fix from pull request #24215, which addresses the memory leak in r_bin_object_new. If upgrading is not immediately possible, limiting the use of vulnerable radare2 versions and monitoring system memory usage to prevent Denial of Service conditions is advised. [1]


Ask Our AI Assistant
Need more information? Ask your question to get an AI reply (Powered by our expertise)
0/70
EPSS Chart