Name | CVE-2021-22570 |
Description | Nullptr dereference when a null char is present in a proto symbol. The symbol is parsed incorrectly, leading to an unchecked call into the proto file's name during generation of the resulting error message. Since the symbol is incorrectly parsed, the file is nullptr. We recommend upgrading to version 3.15.0 or greater. |
Source | CVE (at NVD; CERT, LWN, oss-sec, fulldisc, Red Hat, Ubuntu, Gentoo, SUSE bugzilla/CVE, GitHub advisories/code/issues, web search, more) |
References | DLA-3393-1, ELA-836-1 |
Vulnerable and fixed packages
The table below lists information on source packages.
Source Package | Release | Version | Status |
---|
protobuf (PTS) | jessie, jessie (lts) | 2.6.1-1+deb8u1 | fixed |
| stretch (lts), stretch | 3.0.0-9+deb9u1 | fixed |
| buster (security), buster, buster (lts) | 3.6.1.3-2+deb10u1 | fixed |
| bullseye | 3.12.4-1+deb11u1 | fixed |
| bookworm | 3.21.12-3 | fixed |
| sid, trixie | 3.21.12-10 | fixed |
The information below is based on the following data on fixed versions.
Notes
[stretch] - protobuf <postponed> (Minor issue; clean crash / Dos; patch needs to be isolated)
Fixed upstream in v3.15.0: https://github.com/protocolbuffers/protobuf/releases/tag/v3.15.0
Fixed in merge commit https://github.com/protocolbuffers/protobuf/a00125024e9231d76746bd394fef8876f5cc15e2
in src/google/protobuf/descriptor.cc