CVE Vulnerabilities

CVE-2021-28683

NULL Pointer Dereference

Published: May 20, 2021 | Modified: Nov 21, 2024
CVSS 3.x
7.5
HIGH
Source:
NVD
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
CVSS 2.x
5 MEDIUM
AV:N/AC:L/Au:N/C:N/I:N/A:P
RedHat/V2
RedHat/V3
7.5 IMPORTANT
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
Ubuntu
root.io logo minimus.io logo echo.ai logo

An issue was discovered in Envoy through 1.71.1. There is a remotely exploitable NULL pointer dereference and crash in TLS when an unknown TLS alert code is received.

Weakness

The product dereferences a pointer that it expects to be valid but is NULL.

Affected Software

NameVendorStart VersionEnd Version
EnvoyEnvoyproxy1.16.2 (including)1.16.2 (including)
EnvoyEnvoyproxy1.17.1 (including)1.17.1 (including)
OpenShift Service Mesh 1.1RedHatservicemesh-proxy-0:1.1.13-1.el8*
OpenShift Service Mesh 2.0RedHatservicemesh-proxy-0:2.0.3-1.el8*

Potential Mitigations

References