{"id":"USN-6544-1","summary":"binutils vulnerabilities","details":"It was discovered that GNU binutils incorrectly handled certain COFF files.\nAn attacker could possibly use this issue to cause a crash or execute\narbitrary code. This issue only affected Ubuntu 14.04 LTS. (CVE-2022-38533)\n\nIt was discovered that GNU binutils was not properly performing bounds\nchecks in several functions, which could lead to a buffer overflow. An\nattacker could possibly use this issue to cause a denial of service,\nexpose sensitive information or execute arbitrary code. This issue only\naffected Ubuntu 20.04 LTS and Ubuntu 22.04 LTS. \n(CVE-2022-4285, CVE-2020-19726, CVE-2021-46174)\n\nIt was discovered that GNU binutils contained a reachable assertion, which\ncould lead to an intentional assertion failure when processing certain\ncrafted DWARF files. An attacker could possibly use this issue to cause a\ndenial of service. This issue only affected Ubuntu 20.04 LTS \nand Ubuntu 22.04 LTS. (CVE-2022-35205)\n","modified":"2026-02-10T04:43:27Z","published":"2023-12-11T11:18:13Z","related":["UBUNTU-CVE-2020-19726","UBUNTU-CVE-2021-46174","UBUNTU-CVE-2022-35205","UBUNTU-CVE-2022-38533","UBUNTU-CVE-2022-4285"],"upstream":["CVE-2020-19726","CVE-2021-46174","CVE-2022-35205","CVE-2022-38533","CVE-2022-4285","UBUNTU-CVE-2020-19726","UBUNTU-CVE-2021-46174","UBUNTU-CVE-2022-35205","UBUNTU-CVE-2022-38533","UBUNTU-CVE-2022-4285"],"references":[{"type":"ADVISORY","url":"https://ubuntu.com/security/notices/USN-6544-1"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2020-19726"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2021-46174"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2022-4285"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2022-35205"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2022-38533"}],"affected":[{"package":{"name":"binutils","ecosystem":"Ubuntu:Pro:14.04:LTS","purl":"pkg:deb/ubuntu/binutils@2.24-5ubuntu14.2+esm6?arch=source&distro=trusty/esm"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"2.24-5ubuntu14.2+esm6"}]}],"versions":["2.23.52.20130913-0ubuntu1","2.23.90.20131017-1ubuntu1","2.23.90.20131116-1ubuntu1","2.23.91.20131123-1ubuntu1","2.24-1ubuntu1","2.24-1ubuntu2","2.24-2ubuntu1","2.24-2ubuntu2","2.24-2ubuntu3","2.24-4ubuntu1","2.24-5ubuntu1","2.24-5ubuntu2","2.24-5ubuntu3","2.24-5ubuntu3.1","2.24-5ubuntu13","2.24-5ubuntu14","2.24-5ubuntu14.1","2.24-5ubuntu14.2","2.24-5ubuntu14.2+esm1","2.24-5ubuntu14.2+esm2","2.24-5ubuntu14.2+esm3","2.24-5ubuntu14.2+esm5"],"ecosystem_specific":{"binaries":[{"binary_version":"2.24-5ubuntu14.2+esm6","binary_name":"binutils"},{"binary_version":"2.24-5ubuntu14.2+esm6","binary_name":"binutils-dev"},{"binary_version":"2.24-5ubuntu14.2+esm6","binary_name":"binutils-multiarch"},{"binary_version":"2.24-5ubuntu14.2+esm6","binary_name":"binutils-multiarch-dev"},{"binary_version":"2.24-5ubuntu14.2+esm6","binary_name":"binutils-source"},{"binary_version":"2.24-5ubuntu14.2+esm6","binary_name":"binutils-static"}],"availability":"Available with Ubuntu Pro (Infra-only): https://ubuntu.com/pro"},"database_specific":{"source":"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/usn/USN-6544-1.json","cves_map":{"ecosystem":"Ubuntu:Pro:14.04:LTS","cves":[{"id":"CVE-2022-38533","severity":[{"score":"CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H","type":"CVSS_V3"},{"score":"medium","type":"Ubuntu"}]}]}}},{"package":{"name":"binutils","ecosystem":"Ubuntu:20.04:LTS","purl":"pkg:deb/ubuntu/binutils@2.34-6ubuntu1.7?arch=source&distro=focal"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"2.34-6ubuntu1.7"}]}],"versions":["2.33-2ubuntu1","2.33.1-1ubuntu1","2.33.1-5ubuntu1","2.33.1-6ubuntu1","2.33.1-6ubuntu3","2.33.90.20200122-1ubuntu2","2.34-1ubuntu1","2.34-3ubuntu1","2.34-4ubuntu1","2.34-5ubuntu1","2.34-6ubuntu1","2.34-6ubuntu1.1","2.34-6ubuntu1.3","2.34-6ubuntu1.4","2.34-6ubuntu1.5","2.34-6ubuntu1.6"],"ecosystem_specific":{"binaries":[{"binary_version":"2.34-6ubuntu1.7","binary_name":"binutils"},{"binary_version":"2.34-6ubuntu1.7","binary_name":"binutils-aarch64-linux-gnu"},{"binary_version":"2.34-6ubuntu1.7","binary_name":"binutils-alpha-linux-gnu"},{"binary_version":"2.34-6ubuntu1.7","binary_name":"binutils-arm-linux-gnueabi"},{"binary_version":"2.34-6ubuntu1.7","binary_name":"binutils-arm-linux-gnueabihf"},{"binary_version":"2.34-6ubuntu1.7","binary_name":"binutils-common"},{"binary_version":"2.34-6ubuntu1.7","binary_name":"binutils-dev"},{"binary_version":"2.34-6ubuntu1.7","binary_name":"binutils-for-build"},{"binary_version":"2.34-6ubuntu1.7","binary_name":"binutils-for-host"},{"binary_version":"2.34-6ubuntu1.7","binary_name":"binutils-hppa-linux-gnu"},{"binary_version":"2.34-6ubuntu1.7","binary_name":"binutils-hppa64-linux-gnu"},{"binary_version":"2.34-6ubuntu1.7","binary_name":"binutils-i686-gnu"},{"binary_version":"2.34-6ubuntu1.7","binary_name":"binutils-i686-kfreebsd-gnu"},{"binary_version":"2.34-6ubuntu1.7","binary_name":"binutils-i686-linux-gnu"},{"binary_version":"2.34-6ubuntu1.7","binary_name":"binutils-ia64-linux-gnu"},{"binary_version":"2.34-6ubuntu1.7","binary_name":"binutils-m68k-linux-gnu"},{"binary_version":"2.34-6ubuntu1.7","binary_name":"binutils-multiarch"},{"binary_version":"2.34-6ubuntu1.7","binary_name":"binutils-multiarch-dev"},{"binary_version":"2.34-6ubuntu1.7","binary_name":"binutils-powerpc-linux-gnu"},{"binary_version":"2.34-6ubuntu1.7","binary_name":"binutils-powerpc64-linux-gnu"},{"binary_version":"2.34-6ubuntu1.7","binary_name":"binutils-powerpc64le-linux-gnu"},{"binary_version":"2.34-6ubuntu1.7","binary_name":"binutils-riscv64-linux-gnu"},{"binary_version":"2.34-6ubuntu1.7","binary_name":"binutils-s390x-linux-gnu"},{"binary_version":"2.34-6ubuntu1.7","binary_name":"binutils-sh4-linux-gnu"},{"binary_version":"2.34-6ubuntu1.7","binary_name":"binutils-source"},{"binary_version":"2.34-6ubuntu1.7","binary_name":"binutils-sparc64-linux-gnu"},{"binary_version":"2.34-6ubuntu1.7","binary_name":"binutils-x86-64-kfreebsd-gnu"},{"binary_version":"2.34-6ubuntu1.7","binary_name":"binutils-x86-64-linux-gnu"},{"binary_version":"2.34-6ubuntu1.7","binary_name":"binutils-x86-64-linux-gnux32"},{"binary_version":"2.34-6ubuntu1.7","binary_name":"libbinutils"},{"binary_version":"2.34-6ubuntu1.7","binary_name":"libctf-nobfd0"},{"binary_version":"2.34-6ubuntu1.7","binary_name":"libctf0"}],"availability":"No subscription required"},"database_specific":{"source":"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/usn/USN-6544-1.json","cves_map":{"ecosystem":"Ubuntu:20.04:LTS","cves":[{"id":"CVE-2020-19726","severity":[{"score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H","type":"CVSS_V3"},{"score":"medium","type":"Ubuntu"}]},{"id":"CVE-2021-46174","severity":[{"score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H","type":"CVSS_V3"},{"score":"medium","type":"Ubuntu"}]},{"id":"CVE-2022-35205","severity":[{"score":"CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H","type":"CVSS_V3"},{"score":"CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H","type":"CVSS_V3"},{"score":"medium","type":"Ubuntu"}]}]}}},{"package":{"name":"binutils","ecosystem":"Ubuntu:22.04:LTS","purl":"pkg:deb/ubuntu/binutils@2.38-4ubuntu2.4?arch=source&distro=jammy"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"2.38-4ubuntu2.4"}]}],"versions":["2.37-7ubuntu1","2.37-9ubuntu1","2.37-10ubuntu1","2.37.50.20220106-2ubuntu1","2.37.90.20220126-0ubuntu1","2.37.90.20220130-0ubuntu2","2.38-1ubuntu1","2.38-2ubuntu1","2.38-3ubuntu1","2.38-4ubuntu2","2.38-4ubuntu2.1","2.38-4ubuntu2.2","2.38-4ubuntu2.3"],"ecosystem_specific":{"binaries":[{"binary_version":"2.38-4ubuntu2.4","binary_name":"binutils"},{"binary_version":"2.38-4ubuntu2.4","binary_name":"binutils-aarch64-linux-gnu"},{"binary_version":"2.38-4ubuntu2.4","binary_name":"binutils-alpha-linux-gnu"},{"binary_version":"2.38-4ubuntu2.4","binary_name":"binutils-arm-linux-gnueabi"},{"binary_version":"2.38-4ubuntu2.4","binary_name":"binutils-arm-linux-gnueabihf"},{"binary_version":"2.38-4ubuntu2.4","binary_name":"binutils-common"},{"binary_version":"2.38-4ubuntu2.4","binary_name":"binutils-dev"},{"binary_version":"2.38-4ubuntu2.4","binary_name":"binutils-for-build"},{"binary_version":"2.38-4ubuntu2.4","binary_name":"binutils-for-host"},{"binary_version":"2.38-4ubuntu2.4","binary_name":"binutils-hppa-linux-gnu"},{"binary_version":"2.38-4ubuntu2.4","binary_name":"binutils-hppa64-linux-gnu"},{"binary_version":"2.38-4ubuntu2.4","binary_name":"binutils-i686-gnu"},{"binary_version":"2.38-4ubuntu2.4","binary_name":"binutils-i686-kfreebsd-gnu"},{"binary_version":"2.38-4ubuntu2.4","binary_name":"binutils-i686-linux-gnu"},{"binary_version":"2.38-4ubuntu2.4","binary_name":"binutils-ia64-linux-gnu"},{"binary_version":"2.38-4ubuntu2.4","binary_name":"binutils-m68k-linux-gnu"},{"binary_version":"2.38-4ubuntu2.4","binary_name":"binutils-multiarch"},{"binary_version":"2.38-4ubuntu2.4","binary_name":"binutils-multiarch-dev"},{"binary_version":"2.38-4ubuntu2.4","binary_name":"binutils-powerpc-linux-gnu"},{"binary_version":"2.38-4ubuntu2.4","binary_name":"binutils-powerpc64-linux-gnu"},{"binary_version":"2.38-4ubuntu2.4","binary_name":"binutils-powerpc64le-linux-gnu"},{"binary_version":"2.38-4ubuntu2.4","binary_name":"binutils-riscv64-linux-gnu"},{"binary_version":"2.38-4ubuntu2.4","binary_name":"binutils-s390x-linux-gnu"},{"binary_version":"2.38-4ubuntu2.4","binary_name":"binutils-sh4-linux-gnu"},{"binary_version":"2.38-4ubuntu2.4","binary_name":"binutils-source"},{"binary_version":"2.38-4ubuntu2.4","binary_name":"binutils-sparc64-linux-gnu"},{"binary_version":"2.38-4ubuntu2.4","binary_name":"binutils-x86-64-kfreebsd-gnu"},{"binary_version":"2.38-4ubuntu2.4","binary_name":"binutils-x86-64-linux-gnu"},{"binary_version":"2.38-4ubuntu2.4","binary_name":"binutils-x86-64-linux-gnux32"},{"binary_version":"2.38-4ubuntu2.4","binary_name":"libbinutils"},{"binary_version":"2.38-4ubuntu2.4","binary_name":"libctf-nobfd0"},{"binary_version":"2.38-4ubuntu2.4","binary_name":"libctf0"}],"availability":"No subscription required"},"database_specific":{"source":"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/usn/USN-6544-1.json","cves_map":{"ecosystem":"Ubuntu:22.04:LTS","cves":[{"id":"CVE-2022-4285","severity":[{"score":"CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H","type":"CVSS_V3"},{"score":"CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H","type":"CVSS_V3"},{"score":"low","type":"Ubuntu"}]},{"id":"CVE-2022-35205","severity":[{"score":"CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H","type":"CVSS_V3"},{"score":"CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H","type":"CVSS_V3"},{"score":"medium","type":"Ubuntu"}]}]}}}],"schema_version":"1.7.3"}