CVE Vulnerabilities

CVE-2022-4285

NULL Pointer Dereference

Published: Jan 27, 2023 | Modified: Mar 28, 2025
CVSS 3.x
5.5
MEDIUM
Source:
NVD
CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
CVSS 2.x
RedHat/V2
RedHat/V3
5.5 MODERATE
CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
Ubuntu
LOW
root.io logo minimus.io logo echo.ai logo

An illegal memory access flaw was found in the binutils package. Parsing an ELF file containing corrupt symbol version information may result in a denial of service. This issue is the result of an incomplete fix for CVE-2020-16599.

Weakness

The product dereferences a pointer that it expects to be valid but is NULL.

Affected Software

NameVendorStart VersionEnd Version
BinutilsGnu2.35 (including)2.39-7 (excluding)
Red Hat Enterprise Linux 8RedHatgcc-toolset-12-binutils-0:2.38-17.el8*
Red Hat Enterprise Linux 8RedHatbinutils-0:2.30-119.el8_8.2*
Red Hat Enterprise Linux 8RedHatbinutils-0:2.30-119.el8_8.2*
Red Hat Enterprise Linux 8.6 Extended Update SupportRedHatbinutils-0:2.30-113.el8_6.2*
Red Hat Enterprise Linux 9RedHatbinutils-0:2.35.2-42.el9*
Red Hat Enterprise Linux 9RedHatbinutils-0:2.35.2-42.el9*
Red Hat Software Collections for Red Hat Enterprise Linux 7RedHatdevtoolset-12-binutils-0:2.36.1-6.el7*
BinutilsUbuntujammy*
BinutilsUbuntukinetic*
BinutilsUbuntutrusty*
BinutilsUbuntuupstream*
BinutilsUbuntuxenial*
Binutils-avrUbuntubionic*
Binutils-avrUbuntufocal*
Binutils-avrUbuntukinetic*
Binutils-avrUbuntulunar*
Binutils-avrUbuntumantic*
Binutils-avrUbuntuoracular*
Binutils-avrUbuntuplucky*
Binutils-avrUbuntutrusty*
Binutils-avrUbuntuxenial*
GdbUbuntubionic*
GdbUbuntuesm-infra/bionic*
GdbUbuntuesm-infra/focal*
GdbUbuntuesm-infra/xenial*
GdbUbuntufocal*
GdbUbuntujammy*
GdbUbuntukinetic*
GdbUbuntutrusty*
GdbUbuntuxenial*

Potential Mitigations

References