CVE Vulnerabilities

CVE-2022-4285

NULL Pointer Dereference

Published: Jan 27, 2023 | Modified: Nov 07, 2023
CVSS 3.x
5.5
MEDIUM
Source:
NVD
CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
CVSS 2.x
RedHat/V2
RedHat/V3
5.5 MODERATE
CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
Ubuntu
LOW

An illegal memory access flaw was found in the binutils package. Parsing an ELF file containing corrupt symbol version information may result in a denial of service. This issue is the result of an incomplete fix for CVE-2020-16599.

Weakness

A NULL pointer dereference occurs when the application dereferences a pointer that it expects to be valid, but is NULL, typically causing a crash or exit.

Affected Software

Name Vendor Start Version End Version
Binutils Gnu 2.35 (including) 2.39-7 (excluding)
Red Hat Enterprise Linux 8 RedHat gcc-toolset-12-binutils-0:2.38-17.el8 *
Red Hat Enterprise Linux 8 RedHat binutils-0:2.30-119.el8_8.2 *
Red Hat Enterprise Linux 8 RedHat binutils-0:2.30-119.el8_8.2 *
Red Hat Enterprise Linux 8.6 Extended Update Support RedHat binutils-0:2.30-113.el8_6.2 *
Red Hat Enterprise Linux 9 RedHat binutils-0:2.35.2-42.el9 *
Red Hat Enterprise Linux 9 RedHat binutils-0:2.35.2-42.el9 *
Red Hat Software Collections for Red Hat Enterprise Linux 7 RedHat devtoolset-12-binutils-0:2.36.1-6.el7 *
Binutils Ubuntu jammy *
Binutils Ubuntu kinetic *
Binutils Ubuntu trusty *
Binutils Ubuntu upstream *
Binutils Ubuntu xenial *
Binutils-avr Ubuntu bionic *
Binutils-avr Ubuntu kinetic *
Binutils-avr Ubuntu lunar *
Binutils-avr Ubuntu mantic *
Binutils-avr Ubuntu trusty *
Binutils-avr Ubuntu xenial *
Gdb Ubuntu bionic *
Gdb Ubuntu esm-infra/bionic *
Gdb Ubuntu esm-infra/xenial *
Gdb Ubuntu focal *
Gdb Ubuntu jammy *
Gdb Ubuntu kinetic *
Gdb Ubuntu trusty *
Gdb Ubuntu xenial *

Potential Mitigations

References