CVE-2021-22570

NameCVE-2021-22570
DescriptionNullptr dereference when a null char is present in a proto symbol. The symbol is parsed incorrectly, leading to an unchecked call into the proto file's name during generation of the resulting error message. Since the symbol is incorrectly parsed, the file is nullptr. We recommend upgrading to version 3.15.0 or greater.
SourceCVE (at NVD; CERT, LWN, oss-sec, fulldisc, Red Hat, Ubuntu, Gentoo, SUSE bugzilla/CVE, GitHub advisories/code/issues, web search, more)
ReferencesDLA-3393-1, ELA-836-1

Vulnerable and fixed packages

The table below lists information on source packages.

Source PackageReleaseVersionStatus
protobuf (PTS)jessie, jessie (lts)2.6.1-1+deb8u1fixed
stretch (lts), stretch3.0.0-9+deb9u1fixed
buster (security), buster, buster (lts)3.6.1.3-2+deb10u1fixed
bullseye3.12.4-1+deb11u1fixed
bookworm3.21.12-3fixed
sid, trixie3.21.12-10fixed

The information below is based on the following data on fixed versions.

PackageTypeReleaseFixed VersionUrgencyOriginDebian Bugs
protobufsourceexperimental3.17.1-1
protobufsourcejessie2.6.1-1+deb8u1ELA-836-1
protobufsourcestretch3.0.0-9+deb9u1ELA-836-1
protobufsourcebuster3.6.1.3-2+deb10u1DLA-3393-1
protobufsourcebullseye3.12.4-1+deb11u1
protobufsource(unstable)3.21.9-3

Notes

[stretch] - protobuf <postponed> (Minor issue; clean crash / Dos; patch needs to be isolated)
Fixed upstream in v3.15.0: https://github.com/protocolbuffers/protobuf/releases/tag/v3.15.0
Fixed in merge commit https://github.com/protocolbuffers/protobuf/a00125024e9231d76746bd394fef8876f5cc15e2
in src/google/protobuf/descriptor.cc

Search for package or bug name: Reporting problems