{"id":"CVE-2022-4285","details":"An illegal memory access flaw was found in the binutils package. Parsing an ELF file containing corrupt symbol version information may result in a denial of service. This issue is the result of an incomplete fix for CVE-2020-16599.","modified":"2026-04-16T04:32:13.867374618Z","published":"2023-01-27T18:15:15.977Z","related":["ALSA-2023:2873","ALSA-2023:6236","ALSA-2023:6593","SUSE-SU-2023:3695-1","SUSE-SU-2023:3825-1","openSUSE-SU-2024:12717-1"],"references":[{"type":"WEB","url":"https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git%3Bh=5c831a3c7f3ca98d6aba1200353311e1a1f84c70"},{"type":"ADVISORY","url":"https://security.gentoo.org/glsa/202309-15"},{"type":"FIX","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2150768"},{"type":"FIX","url":"https://sourceware.org/bugzilla/show_bug.cgi?id=29699"}],"affected":[{"ranges":[{"type":"GIT","repo":"https://sourceware.org/git/binutils-gdb.git","events":[{"introduced":"0"},{"last_affected":"497f816e7547ec80b87ff4be68e054ac00d03ea0"},{"introduced":"0"},{"last_affected":"a17fcd19400181f4b8b45be7715337ed83d7a122"},{"introduced":"0"},{"last_affected":"1f1c02597cc199227226251a2ea51fe5f44b4d6d"}],"database_specific":{"versions":[{"introduced":"0"},{"last_affected":"6.0"},{"introduced":"0"},{"last_affected":"7.0"},{"introduced":"0"},{"last_affected":"8.0"}]}}],"versions":["gdb-4_18-branchpoint","gdb-7.10-branchpoint","gdb-7.11-branchpoint","gdb-7.12-branchpoint","gdb-7.7-branchpoint","gdb-7.8-branchpoint","gdb-7.9-branchpoint","gdb-8.0-branchpoint","gdb-8.0-release","gdb_5_2-branchpoint","gdb_5_3-branchpoint","gdb_6_0-branchpoint","gdb_6_1-branchpoint","gdb_6_2-branchpoint","gdb_6_3-branchpoint","gdb_6_4-branchpoint","gdb_6_5-branchpoint","gdb_6_6-branchpoint","gdb_6_7-branchpoint","gdb_6_8-branchpoint","gdb_7_0-branchpoint","gdb_7_1-branchpoint","gdb_7_2-branchpoint","gdb_7_3-branchpoint","gdb_7_4-branchpoint","gdb_7_5-branchpoint","gdb_7_6-branchpoint","users/ARM/embedded-binutils-master-2016q4"],"database_specific":{"source":"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2022-4285.json","unresolved_ranges":[{"events":[{"introduced":"2.35"},{"fixed":"2.39-7"}]},{"events":[{"introduced":"0"},{"last_affected":"37"}]},{"events":[{"introduced":"0"},{"last_affected":"9.0"}]}]}}],"schema_version":"1.7.5","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"}]}