Amazon Linux 2022 Security Advisory: ALAS-2022-098
Advisory Release Date: 2022-06-28 23:52 Pacific
Advisory Updated Date: 2022-07-19 19:44 Pacific
A flaw was found in protobuf. The vulnerability occurs due to incorrect parsing of a NULL character in the proto symbol and leads to a Null pointer dereference. This flaw allows an attacker to execute unauthorized code or commands, read memory, modify memory. (CVE-2021-22570)
Affected Packages:
protobuf
Issue Correction:
Run dnf update --releasever=2022.0.20220628 protobuf to update your system.
aarch64:
protobuf-debuginfo-3.14.0-7.amzn2022.0.1.aarch64
protobuf-lite-debuginfo-3.14.0-7.amzn2022.0.1.aarch64
protobuf-compiler-debuginfo-3.14.0-7.amzn2022.0.1.aarch64
protobuf-lite-static-3.14.0-7.amzn2022.0.1.aarch64
protobuf-lite-devel-3.14.0-7.amzn2022.0.1.aarch64
protobuf-static-3.14.0-7.amzn2022.0.1.aarch64
protobuf-debugsource-3.14.0-7.amzn2022.0.1.aarch64
protobuf-lite-3.14.0-7.amzn2022.0.1.aarch64
protobuf-3.14.0-7.amzn2022.0.1.aarch64
protobuf-devel-3.14.0-7.amzn2022.0.1.aarch64
protobuf-compiler-3.14.0-7.amzn2022.0.1.aarch64
noarch:
python3-protobuf-3.14.0-7.amzn2022.0.1.noarch
protobuf-vim-3.14.0-7.amzn2022.0.1.noarch
protobuf-emacs-3.14.0-7.amzn2022.0.1.noarch
src:
protobuf-3.14.0-7.amzn2022.0.1.src
x86_64:
protobuf-debuginfo-3.14.0-7.amzn2022.0.1.x86_64
protobuf-static-3.14.0-7.amzn2022.0.1.x86_64
protobuf-compiler-3.14.0-7.amzn2022.0.1.x86_64
protobuf-lite-debuginfo-3.14.0-7.amzn2022.0.1.x86_64
protobuf-lite-devel-3.14.0-7.amzn2022.0.1.x86_64
protobuf-devel-3.14.0-7.amzn2022.0.1.x86_64
protobuf-compiler-debuginfo-3.14.0-7.amzn2022.0.1.x86_64
protobuf-3.14.0-7.amzn2022.0.1.x86_64
protobuf-lite-3.14.0-7.amzn2022.0.1.x86_64
protobuf-lite-static-3.14.0-7.amzn2022.0.1.x86_64
protobuf-debugsource-3.14.0-7.amzn2022.0.1.x86_64