CVE Vulnerabilities

CVE-2021-28683

NULL Pointer Dereference

Published: May 20, 2021 | Modified: Nov 21, 2024
CVSS 3.x
7.5
HIGH
Source:
NVD
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
CVSS 2.x
5 MEDIUM
AV:N/AC:L/Au:N/C:N/I:N/A:P
RedHat/V2
RedHat/V3
7.5 IMPORTANT
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
Ubuntu

An issue was discovered in Envoy through 1.71.1. There is a remotely exploitable NULL pointer dereference and crash in TLS when an unknown TLS alert code is received.

Weakness

The product dereferences a pointer that it expects to be valid but is NULL.

Affected Software

Name Vendor Start Version End Version
Envoy Envoyproxy 1.16.2 (including) 1.16.2 (including)
Envoy Envoyproxy 1.17.1 (including) 1.17.1 (including)
OpenShift Service Mesh 1.1 RedHat servicemesh-proxy-0:1.1.13-1.el8 *
OpenShift Service Mesh 2.0 RedHat servicemesh-proxy-0:2.0.3-1.el8 *

Potential Mitigations

References