CVE-2022-1052

Source
https://nvd.nist.gov/vuln/detail/CVE-2022-1052
Import Source
https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2022-1052.json
JSON Data
https://api.test.osv.dev/v1/vulns/CVE-2022-1052
Downstream
Related
Published
2022-03-24T13:15:07Z
Modified
2025-10-29T00:11:49.369855Z
Severity
  • 5.5 (Medium) CVSS_V3 - CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H CVSS Calculator
Summary
[none]
Details

Heap Buffer Overflow in iteratechainedfixups in GitHub repository radareorg/radare2 prior to 5.6.6.

References

Affected packages

Git / github.com/radare/radare2

Affected ranges

Type
GIT
Repo
https://github.com/radare/radare2
Events
Introduced
0 Unknown introduced commit / All previous commits are affected
Fixed

Affected versions

0.*

0.10.0
0.10.1
0.10.2
0.10.3
0.10.4
0.10.4-termux4
0.10.5
0.10.6
0.8.6
0.8.8
0.9
0.9.2
0.9.4
0.9.6
0.9.7
0.9.8
0.9.8-rc1
0.9.8-rc2
0.9.8-rc3
0.9.8-rc4
0.9.9

1.*

1.0
1.0.0
1.0.1
1.0.2
1.1.0
1.2.0
1.2.0-git
1.3.0
1.3.0-git
1.4.0
1.5.0
1.6.0

2.*

2.0.0
2.0.1
2.1.0
2.2.0
2.4.0
2.5.0
2.6.0
2.6.9
2.7.0
2.8.0
2.9.0

3.*

3.0.0
3.0.1
3.1.0
3.1.1
3.1.2
3.1.3
3.2.0
3.2.1
3.3.0
3.4.0
3.4.1
3.5.0
3.5.1
3.6.0
3.7.0
3.7.1
3.8.0
3.9.0

4.*

4.0.0
4.1.0
4.1.1
4.2.0
4.2.1
4.3.0
4.3.1
4.4.0
4.5.1

5.*

5.0.0
5.1.0
5.1.1
5.2.0
5.2.1
5.3.0
5.3.1
5.4.0
5.4.0-git
5.4.2
5.5.0
5.5.2
5.5.4
5.6.0
5.6.2
5.6.4

Other

Continuous-Windows
continuous
radare2-windows-nightly
termux

release-5.*

release-5.0.0

Database specific

vanir_signatures

[
    {
        "signature_type": "Line",
        "source": "https://github.com/radare/radare2/commit/50b8813f1df7fbae3bbcb0e8d04397cd353d4759",
        "digest": {
            "line_hashes": [
                "248703042087547650931829489021330946693",
                "303082029420654455372568773614294085007",
                "233835211568827527701686548302743389874",
                "237053497720261221732558082134243876349",
                "39552186032153365246311784909057731859",
                "259015929924226254055811560665894860234",
                "306265339556989330828556346707571755272",
                "239698056189293661340679831939965898025",
                "152218095028500660250169403200519688878",
                "85487560684615839369043740098829315278",
                "208399799703906950163957621798976264600"
            ],
            "threshold": 0.9
        },
        "id": "CVE-2022-1052-0e8aff06",
        "target": {
            "file": "libr/debug/dreg.c"
        },
        "signature_version": "v1",
        "deprecated": false
    },
    {
        "signature_type": "Line",
        "source": "https://github.com/radare/radare2/commit/50b8813f1df7fbae3bbcb0e8d04397cd353d4759",
        "digest": {
            "line_hashes": [
                "328844296527964699559187876661418238576",
                "253920139967170652729387284666385654249",
                "117571790103213992821300394342125765222",
                "10396150301260521368715778446628543679"
            ],
            "threshold": 0.9
        },
        "id": "CVE-2022-1052-18778cc5",
        "target": {
            "file": "libr/core/cmd_anal.c"
        },
        "signature_version": "v1",
        "deprecated": false
    },
    {
        "signature_type": "Function",
        "source": "https://github.com/radare/radare2/commit/50b8813f1df7fbae3bbcb0e8d04397cd353d4759",
        "digest": {
            "function_hash": "91655719831952633604622023602399838594",
            "length": 5910.0
        },
        "id": "CVE-2022-1052-4e88202b",
        "target": {
            "function": "r_core_esil_step",
            "file": "libr/core/cmd_anal.c"
        },
        "signature_version": "v1",
        "deprecated": false
    },
    {
        "signature_type": "Function",
        "source": "https://github.com/radare/radare2/commit/50b8813f1df7fbae3bbcb0e8d04397cd353d4759",
        "digest": {
            "function_hash": "10552958541101443880575713688090510761",
            "length": 875.0
        },
        "id": "CVE-2022-1052-5335f1d4",
        "target": {
            "function": "r_debug_reg_get_err",
            "file": "libr/debug/dreg.c"
        },
        "signature_version": "v1",
        "deprecated": false
    }
]

Git / github.com/radareorg/radare2

Affected ranges

Type
GIT
Repo
https://github.com/radareorg/radare2
Events
Introduced
0 Unknown introduced commit / All previous commits are affected
Fixed

Affected versions

0.*

0.10.0
0.10.1
0.10.2
0.10.3
0.10.4
0.10.4-termux4
0.10.5
0.10.6
0.8.6
0.8.8
0.9
0.9.2
0.9.4
0.9.6
0.9.7
0.9.8
0.9.8-rc1
0.9.8-rc2
0.9.8-rc3
0.9.8-rc4
0.9.9

1.*

1.0
1.0.0
1.0.1
1.0.2
1.1.0
1.2.0
1.2.0-git
1.3.0
1.3.0-git
1.4.0
1.5.0
1.6.0

2.*

2.0.0
2.0.1
2.1.0
2.2.0
2.4.0
2.5.0
2.6.0
2.6.9
2.7.0
2.8.0
2.9.0

3.*

3.0.0
3.0.1
3.1.0
3.1.1
3.1.2
3.1.3
3.2.0
3.2.1
3.3.0
3.4.0
3.4.1
3.5.0
3.5.1
3.6.0
3.7.0
3.7.1
3.8.0
3.9.0

4.*

4.0.0
4.1.0
4.1.1
4.2.0
4.2.1
4.3.0
4.3.1
4.4.0
4.5.1

5.*

5.0.0
5.1.0
5.1.1
5.2.0
5.2.1
5.3.0
5.3.1
5.4.0
5.4.0-git
5.4.2
5.5.0
5.5.2
5.5.4
5.6.0
5.6.2
5.6.4

Other

Continuous-Windows
continuous
radare2-windows-nightly
termux

release-5.*

release-5.0.0

Database specific

vanir_signatures

[
    {
        "signature_type": "Line",
        "source": "https://github.com/radareorg/radare2/commit/0052500c1ed5bf8263b26b9fd7773dbdc6f170c4",
        "digest": {
            "line_hashes": [
                "272228540757210611327438278635051663242",
                "144445266653377313355112383567586591029",
                "37459767844809411295375703366922945640",
                "89454255614794713275028532629511352914"
            ],
            "threshold": 0.9
        },
        "id": "CVE-2022-1052-33ff2086",
        "target": {
            "file": "libr/bin/format/mach0/mach0.h"
        },
        "signature_version": "v1",
        "deprecated": false
    },
    {
        "signature_type": "Line",
        "source": "https://github.com/radareorg/radare2/commit/0052500c1ed5bf8263b26b9fd7773dbdc6f170c4",
        "digest": {
            "line_hashes": [
                "338394472426677400133931801676182226655",
                "106938584846022291308469413098442860381",
                "26181395122399735231856383349631979295",
                "160856274870941695022575291569548575639",
                "147379671688962299265033012488802397799",
                "286986662757872427965606228819534281590",
                "178619029598745217697967106362884016634",
                "285540088223084919237847590345082711518",
                "150727403335883475400726087007398735606",
                "334876360317547137137273438412964227232",
                "181268808135414304881461499395835900369",
                "144392167428073998028926439852887657190",
                "237577840472140814330073511676527244641",
                "61335762207400746443275711103778082711",
                "59602087548180553501046327725141226420",
                "4266400223263906347360474836846072316",
                "138952050582079960515746874915526476488",
                "267552173037352107650970652611271126500"
            ],
            "threshold": 0.9
        },
        "id": "CVE-2022-1052-91ccf39b",
        "target": {
            "file": "libr/bin/format/mach0/mach0.c"
        },
        "signature_version": "v1",
        "deprecated": false
    },
    {
        "signature_type": "Function",
        "source": "https://github.com/radareorg/radare2/commit/0052500c1ed5bf8263b26b9fd7773dbdc6f170c4",
        "digest": {
            "function_hash": "146323697741813775383030848886486922422",
            "length": 1283.0
        },
        "id": "CVE-2022-1052-a15a1c73",
        "target": {
            "function": "MACH0_",
            "file": "libr/bin/format/mach0/mach0.h"
        },
        "signature_version": "v1",
        "deprecated": false
    }
]