CVE-2022-4285
CVSS V2 None
CVSS V3 None
Description
An illegal memory access flaw was found in the binutils package. Parsing an ELF file containing corrupt symbol version information may result in a denial of service. This issue is the result of an incomplete fix for CVE-2020-16599.
Overview
- CVE ID
- CVE-2022-4285
- Assigner
- secalert@redhat.com
- Vulnerability Status
- Analyzed
- Published Version
- 2023-01-27T18:15:15
- Last Modified Date
- 2023-02-07T19:46:46
Weakness Enumerations
CPE Configuration (Product)
CPE | Vulnerable | Operator | Version Start | Version End |
---|---|---|---|---|
cpe:2.3:a:gnu:binutils:*:*:*:*:*:*:*:* | 1 | OR | 2.39-7 | |
cpe:2.3:o:fedoraproject:fedora:37:*:*:*:*:*:*:* | 1 | OR | ||
cpe:2.3:o:redhat:enterprise_linux:6.0:*:*:*:*:*:*:* | 1 | OR | ||
cpe:2.3:o:redhat:enterprise_linux:7.0:*:*:*:*:*:*:* | 1 | OR | ||
cpe:2.3:o:redhat:enterprise_linux:8.0:*:*:*:*:*:*:* | 1 | OR | ||
cpe:2.3:o:redhat:enterprise_linux:9.0:*:*:*:*:*:*:* | 1 | OR |
References
Reference URL | Reference Tags |
---|---|
https://bugzilla.redhat.com/show_bug.cgi?id=2150768 | Exploit Issue Tracking Patch Third Party Advisory |
https://sourceware.org/bugzilla/show_bug.cgi?id=29699 | Exploit Issue Tracking Patch Vendor Advisory |
https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git;h=5c831a3c7f3ca98d6aba1200353311e1a1f84c70 | Mailing List Patch Vendor Advisory |
Sources
Source Name | Source URL |
---|---|
NIST | https://nvd.nist.gov/vuln/detail/CVE-2022-4285 |
MITRE | https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-4285 |
History
Created | Old Value | New Value | Data Type | Notes |
---|---|---|---|---|
2023-04-17 06:52:34 | Added to TrackCVE | |||
2023-04-17 06:52:37 | Weakness Enumeration | new |