CVE Vulnerabilities

CVE-2021-22570

NULL Pointer Dereference

Published: Jan 26, 2022 | Modified: Nov 21, 2024
CVSS 3.x
5.5
MEDIUM
Source:
NVD
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
CVSS 2.x
2.1 LOW
AV:L/AC:L/Au:N/C:N/I:N/A:P
RedHat/V2
RedHat/V3
7.5 MODERATE
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
Ubuntu
LOW
root.io logo minimus.io logo echo.ai logo

Nullptr dereference when a null char is present in a proto symbol. The symbol is parsed incorrectly, leading to an unchecked call into the proto files name during generation of the resulting error message. Since the symbol is incorrectly parsed, the file is nullptr. We recommend upgrading to version 3.15.0 or greater.

Weakness

The product dereferences a pointer that it expects to be valid but is NULL.

Affected Software

NameVendorStart VersionEnd Version
ProtobufGoogle*3.15.0 (excluding)
Red Hat Enterprise Linux 8RedHatprotobuf-0:3.5.0-15.el8*
Red Hat Enterprise Linux 8.6 Extended Update SupportRedHatprotobuf-0:3.5.0-15.el8_6*
Red Hat Enterprise Linux 9RedHatprotobuf-0:3.14.0-13.el9*
Red Hat OpenStack Platform 16.1RedHatprotobuf-0:3.6.1-6.el8ost*
Red Hat OpenStack Platform 16.2RedHatprotobuf-0:3.6.1-6.el8ost*
ProtobufUbuntubionic*
ProtobufUbuntuesm-infra-legacy/trusty*
ProtobufUbuntuesm-infra/bionic*
ProtobufUbuntuesm-infra/focal*
ProtobufUbuntuesm-infra/xenial*
ProtobufUbuntufocal*
ProtobufUbuntuimpish*
ProtobufUbuntujammy*
ProtobufUbuntukinetic*
ProtobufUbuntutrusty*
ProtobufUbuntutrusty/esm*
ProtobufUbuntuupstream*
ProtobufUbuntuxenial*

Potential Mitigations

References