{"id":"CVE-2022-0849","summary":"Use After Free in r_reg_get_name_idx in radareorg/radare2","details":"Use After Free in r_reg_get_name_idx in GitHub repository radareorg/radare2 prior to 5.6.6.","modified":"2026-04-12T05:16:33.494475Z","published":"2022-03-05T09:30:12Z","related":["openSUSE-SU-2024:12173-1"],"database_specific":{"cna_assigner":"@huntrdev","cwe_ids":["CWE-416"],"osv_generated_from":"https://github.com/CVEProject/cvelistV5/tree/main/cves/2022/0xxx/CVE-2022-0849.json"},"references":[{"type":"WEB","url":"https://huntr.dev/bounties/29c5f76e-5f1f-43ab-a0c8-e31951e407b6"},{"type":"ADVISORY","url":"https://github.com/CVEProject/cvelistV5/tree/main/cves/2022/0xxx/CVE-2022-0849.json"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-0849"},{"type":"FIX","url":"https://github.com/radareorg/radare2/commit/10517e3ff0e609697eb8cde60ec8dc999ee5ea24"}],"affected":[{"ranges":[{"type":"GIT","repo":"https://github.com/radareorg/radare2","events":[{"introduced":"0"},{"fixed":"50b8813f1df7fbae3bbcb0e8d04397cd353d4759"}]}],"versions":["0.10.0","0.10.1","0.10.2","0.10.3","0.10.4","0.10.4-termux4","0.10.5","0.10.6","0.8.6","0.8.8","0.9","0.9.2","0.9.4","0.9.6","0.9.7","0.9.8","0.9.8-rc1","0.9.8-rc2","0.9.8-rc3","0.9.8-rc4","0.9.9","1.0","1.0.0","1.0.1","1.0.2","1.1.0","1.2.0","1.2.0-git","1.3.0","1.3.0-git","1.4.0","1.5.0","1.6.0","2.0.0","2.0.1","2.1.0","2.2.0","2.4.0","2.5.0","2.6.0","2.6.9","2.7.0","2.8.0","2.9.0","3.0.0","3.0.1","3.1.0","3.1.1","3.1.2","3.1.3","3.2.0","3.2.1","3.3.0","3.4.0","3.4.1","3.5.0","3.5.1","3.6.0","3.7.0","3.7.1","3.8.0","3.9.0","4.0.0","4.1.0","4.1.1","4.2.0","4.2.1","4.3.0","4.3.1","4.4.0","4.5.1","5.0.0","5.1.0","5.1.1","5.2.0","5.2.1","5.3.0","5.3.1","5.4.0","5.4.0-git","5.4.2","5.5.0","5.5.2","5.5.4","5.6.0","5.6.2","5.6.4","Continuous-Windows","continuous","radare2-windows-nightly","release-5.0.0","termux"],"database_specific":{"vanir_signatures":[{"digest":{"threshold":0.9,"line_hashes":["328844296527964699559187876661418238576","253920139967170652729387284666385654249","117571790103213992821300394342125765222","10396150301260521368715778446628543679"]},"target":{"file":"libr/core/cmd_anal.c"},"source":"https://github.com/radareorg/radare2/commit/50b8813f1df7fbae3bbcb0e8d04397cd353d4759","signature_version":"v1","id":"CVE-2022-0849-24f72056","signature_type":"Line","deprecated":false},{"digest":{"threshold":0.9,"line_hashes":["248703042087547650931829489021330946693","303082029420654455372568773614294085007","233835211568827527701686548302743389874","237053497720261221732558082134243876349","39552186032153365246311784909057731859","259015929924226254055811560665894860234","306265339556989330828556346707571755272","239698056189293661340679831939965898025","152218095028500660250169403200519688878","85487560684615839369043740098829315278","208399799703906950163957621798976264600"]},"target":{"file":"libr/debug/dreg.c"},"source":"https://github.com/radareorg/radare2/commit/50b8813f1df7fbae3bbcb0e8d04397cd353d4759","signature_version":"v1","id":"CVE-2022-0849-8f750298","signature_type":"Line","deprecated":false},{"digest":{"length":875,"function_hash":"10552958541101443880575713688090510761"},"target":{"file":"libr/debug/dreg.c","function":"r_debug_reg_get_err"},"source":"https://github.com/radareorg/radare2/commit/50b8813f1df7fbae3bbcb0e8d04397cd353d4759","signature_version":"v1","id":"CVE-2022-0849-f07b5eb3","signature_type":"Function","deprecated":false},{"digest":{"length":5910,"function_hash":"91655719831952633604622023602399838594"},"target":{"file":"libr/core/cmd_anal.c","function":"r_core_esil_step"},"source":"https://github.com/radareorg/radare2/commit/50b8813f1df7fbae3bbcb0e8d04397cd353d4759","signature_version":"v1","id":"CVE-2022-0849-ffdedd81","signature_type":"Function","deprecated":false}],"vanir_signatures_modified":"2026-04-12T05:16:33Z","source":"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2022-0849.json"}}],"schema_version":"1.7.5","severity":[{"type":"CVSS_V3","score":"CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:H/A:H"}]}