CVE-2025-60360: n/a
radare2 v5.9.8 and before contains a memory leak in the function r2r_subprocess_init.
AI Analysis
Technical Summary
CVE-2025-60360 identifies a memory leak vulnerability in radare2, an open-source reverse engineering tool widely used for binary analysis and debugging. The flaw exists in the function r2r_subprocess_init in versions 5.9.8 and earlier. A memory leak occurs when allocated memory is not properly released, causing gradual consumption of system memory over time. Although this vulnerability does not directly allow code execution or privilege escalation, continuous exploitation could exhaust system resources, leading to degraded performance or denial of service (DoS). The absence of a CVSS score and known exploits suggests it is not currently exploited in the wild, but the vulnerability remains a concern for environments where radare2 is heavily used. The lack of patch links indicates that a fix may not yet be publicly available, emphasizing the need for vigilance. Since radare2 is often employed by security researchers and developers, the vulnerability could impact the stability of analysis environments, especially when processing untrusted or malformed binaries. The technical details do not indicate any authentication or user interaction requirements, implying that any user with access to the vulnerable radare2 instance could trigger the leak. However, exploitation requires deliberate invocation of the affected function, limiting the attack surface to users running the tool.
Potential Impact
For European organizations, the primary impact of CVE-2025-60360 is potential resource exhaustion leading to denial of service conditions on systems running vulnerable radare2 versions. This could disrupt software analysis workflows, delay security research, and impact development pipelines relying on reverse engineering. While confidentiality and integrity are not directly compromised, availability degradation can affect operational efficiency and incident response capabilities. Organizations using radare2 in automated or large-scale analysis environments may experience amplified effects due to repeated triggering of the memory leak. The vulnerability could also increase operational costs by requiring more frequent system restarts or memory management interventions. Given radare2's niche but critical role in cybersecurity and software development, the impact is significant within those contexts but limited outside them.
Mitigation Recommendations
To mitigate CVE-2025-60360, organizations should first monitor official radare2 repositories and security advisories for patches addressing the memory leak. Until a patch is available, users should limit the use of vulnerable radare2 versions, especially in automated or high-load environments. Employing resource monitoring tools to detect abnormal memory consumption during radare2 operations can help identify exploitation attempts. Running radare2 with restricted privileges and isolating it within containerized or sandboxed environments can minimize potential impact. Additionally, avoid processing untrusted or malformed binaries that could trigger the leak. Organizations should also consider alternative reverse engineering tools if immediate patching is not feasible. Finally, integrating memory leak detection tools during development and testing phases can prevent similar vulnerabilities in custom tooling.
Affected Countries
Germany, France, United Kingdom, Netherlands, Sweden
CVE-2025-60360: n/a
Description
radare2 v5.9.8 and before contains a memory leak in the function r2r_subprocess_init.
AI-Powered Analysis
Technical Analysis
CVE-2025-60360 identifies a memory leak vulnerability in radare2, an open-source reverse engineering tool widely used for binary analysis and debugging. The flaw exists in the function r2r_subprocess_init in versions 5.9.8 and earlier. A memory leak occurs when allocated memory is not properly released, causing gradual consumption of system memory over time. Although this vulnerability does not directly allow code execution or privilege escalation, continuous exploitation could exhaust system resources, leading to degraded performance or denial of service (DoS). The absence of a CVSS score and known exploits suggests it is not currently exploited in the wild, but the vulnerability remains a concern for environments where radare2 is heavily used. The lack of patch links indicates that a fix may not yet be publicly available, emphasizing the need for vigilance. Since radare2 is often employed by security researchers and developers, the vulnerability could impact the stability of analysis environments, especially when processing untrusted or malformed binaries. The technical details do not indicate any authentication or user interaction requirements, implying that any user with access to the vulnerable radare2 instance could trigger the leak. However, exploitation requires deliberate invocation of the affected function, limiting the attack surface to users running the tool.
Potential Impact
For European organizations, the primary impact of CVE-2025-60360 is potential resource exhaustion leading to denial of service conditions on systems running vulnerable radare2 versions. This could disrupt software analysis workflows, delay security research, and impact development pipelines relying on reverse engineering. While confidentiality and integrity are not directly compromised, availability degradation can affect operational efficiency and incident response capabilities. Organizations using radare2 in automated or large-scale analysis environments may experience amplified effects due to repeated triggering of the memory leak. The vulnerability could also increase operational costs by requiring more frequent system restarts or memory management interventions. Given radare2's niche but critical role in cybersecurity and software development, the impact is significant within those contexts but limited outside them.
Mitigation Recommendations
To mitigate CVE-2025-60360, organizations should first monitor official radare2 repositories and security advisories for patches addressing the memory leak. Until a patch is available, users should limit the use of vulnerable radare2 versions, especially in automated or high-load environments. Employing resource monitoring tools to detect abnormal memory consumption during radare2 operations can help identify exploitation attempts. Running radare2 with restricted privileges and isolating it within containerized or sandboxed environments can minimize potential impact. Additionally, avoid processing untrusted or malformed binaries that could trigger the leak. Organizations should also consider alternative reverse engineering tools if immediate patching is not feasible. Finally, integrating memory leak detection tools during development and testing phases can prevent similar vulnerabilities in custom tooling.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- mitre
- Date Reserved
- 2025-09-26T00:00:00.000Z
- Cvss Version
- null
- State
- PUBLISHED
Threat ID: 68f24fd29c34d0947f2503ea
Added to database: 10/17/2025, 2:16:50 PM
Last enriched: 10/17/2025, 2:31:42 PM
Last updated: 10/19/2025, 9:20:41 AM
Views: 8
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2025-11940: Uncontrolled Search Path in LibreWolf
HighCVE-2025-11939: Path Traversal in ChurchCRM
MediumCVE-2025-11938: Deserialization in ChurchCRM
MediumCVE-2025-62672: CWE-770 Allocation of Resources Without Limits or Throttling in boyns rplay
MediumCVE-2025-47410: CWE-352 Cross-Site Request Forgery (CSRF) in Apache Software Foundation Apache Geode
UnknownActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
External Links
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.