Vulnerability Database
Blog
FAQ
Docs
CVE-2022-1052
See a problem?
Please try reporting it
to the source
first.
Source
https://nvd.nist.gov/vuln/detail/CVE-2022-1052
Import Source
https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2022-1052.json
JSON Data
https://api.test.osv.dev/v1/vulns/CVE-2022-1052
Related
UBUNTU-CVE-2022-1052
openSUSE-SU-2024:12173-1
Published
2022-03-24T13:15:07Z
Modified
2025-07-01T13:15:44.584460Z
Downstream
openSUSE-SU-2024:12173-1
Severity
5.5 (Medium)
CVSS_V3 - CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
CVSS Calculator
Summary
[none]
Details
Heap Buffer Overflow in iterate
chained
fixups in GitHub repository radareorg/radare2 prior to 5.6.6.
References
https://huntr.dev/bounties/3b3b7f77-ab8d-4de3-999b-eeec0a3eebe7
https://github.com/radareorg/radare2/commit/0052500c1ed5bf8263b26b9fd7773dbdc6f170c4
Affected packages
Git
/
github.com/radare/radare2
Affected ranges
Type
GIT
Repo
https://github.com/radare/radare2
Events
Introduced
0
Unknown introduced commit / All previous commits are affected
Fixed
50b8813f1df7fbae3bbcb0e8d04397cd353d4759
Type
GIT
Repo
https://github.com/radareorg/radare2
Events
Introduced
0
Unknown introduced commit / All previous commits are affected
Fixed
0052500c1ed5bf8263b26b9fd7773dbdc6f170c4
Affected versions
0.*
0.10.0
0.10.1
0.10.2
0.10.3
0.10.4
0.10.4-termux4
0.10.5
0.10.6
0.8.6
0.8.8
0.9
0.9.2
0.9.4
0.9.6
0.9.7
0.9.8
0.9.8-rc1
0.9.8-rc2
0.9.8-rc3
0.9.8-rc4
0.9.9
1.*
1.0
1.0.0
1.0.1
1.0.2
1.1.0
1.2.0
1.2.0-git
1.3.0
1.3.0-git
1.4.0
1.5.0
1.6.0
2.*
2.0.0
2.0.1
2.1.0
2.2.0
2.4.0
2.5.0
2.6.0
2.6.9
2.7.0
2.8.0
2.9.0
3.*
3.0.0
3.0.1
3.1.0
3.1.1
3.1.2
3.1.3
3.2.0
3.2.1
3.3.0
3.4.0
3.4.1
3.5.0
3.5.1
3.6.0
3.7.0
3.7.1
3.8.0
3.9.0
4.*
4.0.0
4.1.0
4.1.1
4.2.0
4.2.1
4.3.0
4.3.1
4.4.0
4.5.1
5.*
5.0.0
5.1.0
5.1.1
5.2.0
5.2.1
5.3.0
5.3.1
5.4.0
5.4.0-git
5.4.2
5.5.0
5.5.2
5.5.4
5.6.0
5.6.2
5.6.4
Other
Continuous-Windows
continuous
radare2-windows-nightly
termux
release-5.*
release-5.0.0
CVE-2022-1052 - OSV