CVE Vulnerabilities

CVE-2021-22570

NULL Pointer Dereference

Published: Jan 26, 2022 | Modified: Nov 07, 2023
CVSS 3.x
5.5
MEDIUM
Source:
NVD
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
CVSS 2.x
2.1 LOW
AV:L/AC:L/Au:N/C:N/I:N/A:P
RedHat/V2
RedHat/V3
7.5 MODERATE
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
Ubuntu
LOW

Nullptr dereference when a null char is present in a proto symbol. The symbol is parsed incorrectly, leading to an unchecked call into the proto files name during generation of the resulting error message. Since the symbol is incorrectly parsed, the file is nullptr. We recommend upgrading to version 3.15.0 or greater.

Weakness

A NULL pointer dereference occurs when the application dereferences a pointer that it expects to be valid, but is NULL, typically causing a crash or exit.

Affected Software

Name Vendor Start Version End Version
Protobuf Google * 3.15.0 (excluding)
Protobuf Ubuntu bionic *
Protobuf Ubuntu esm-infra/xenial *
Protobuf Ubuntu focal *
Protobuf Ubuntu impish *
Protobuf Ubuntu jammy *
Protobuf Ubuntu kinetic *
Protobuf Ubuntu trusty *
Protobuf Ubuntu trusty/esm *
Protobuf Ubuntu upstream *
Protobuf Ubuntu xenial *
Red Hat Enterprise Linux 8 RedHat protobuf-0:3.5.0-15.el8 *
Red Hat Enterprise Linux 8.6 Extended Update Support RedHat protobuf-0:3.5.0-15.el8_6 *
Red Hat Enterprise Linux 9 RedHat protobuf-0:3.14.0-13.el9 *
Red Hat OpenStack Platform 16.1 RedHat protobuf-0:3.6.1-6.el8ost *
Red Hat OpenStack Platform 16.2 RedHat protobuf-0:3.6.1-6.el8ost *

Potential Mitigations

References