CVE-2021-22570

NameCVE-2021-22570
DescriptionNullptr dereference when a null char is present in a proto symbol. The symbol is parsed incorrectly, leading to an unchecked call into the proto file's name during generation of the resulting error message. Since the symbol is incorrectly parsed, the file is nullptr. We recommend upgrading to version 3.15.0 or greater.
SourceCVE (at NVD; CERT, LWN, oss-sec, fulldisc, bugtraq, EDB, Metasploit, Red Hat, Ubuntu, Gentoo, SUSE bugzilla/CVE, Mageia, GitHub code/issues, web search, more)
NVD severitymedium

Vulnerable and fixed packages

The table below lists information on source packages.

Source PackageReleaseVersionStatus
protobuf (PTS)stretch3.0.0-9vulnerable
buster3.6.1.3-2vulnerable
bookworm, bullseye, sid3.12.4-1vulnerable

The information below is based on the following data on fixed versions.

PackageTypeReleaseFixed VersionUrgencyOriginDebian Bugs
protobufsourceexperimental3.17.1-1
protobufsource(unstable)(unfixed)

Notes

[bullseye] - protobuf <no-dsa> (Minor issue)
[buster] - protobuf <no-dsa> (Minor issue)
[stretch] - protobuf <postponed> (Minor issue; clean crash / Dos; patch needs to be isolated)
Fixed upstream in v3.15.0: https://github.com/protocolbuffers/protobuf/releases/tag/v3.15.0

Search for package or bug name: Reporting problems