Amazon Linux 2022 Security Advisory: ALAS-2022-165
Advisory Release Date: 2022-11-01 21:23 Pacific
Advisory Updated Date: 2022-11-03 21:03 Pacific
A flaw was found in protobuf. The vulnerability occurs due to incorrect parsing of a NULL character in the proto symbol and leads to a Null pointer dereference. This flaw allows an attacker to execute unauthorized code or commands, read memory, modify memory. (CVE-2021-22570)
Affected Packages:
protobuf
Issue Correction:
Run dnf update protobuf --releasever=2022.0.20221102 to update your system.
aarch64:
protobuf-static-3.14.0-7.amzn2022.0.2.aarch64
protobuf-3.14.0-7.amzn2022.0.2.aarch64
protobuf-lite-debuginfo-3.14.0-7.amzn2022.0.2.aarch64
protobuf-lite-devel-3.14.0-7.amzn2022.0.2.aarch64
protobuf-lite-static-3.14.0-7.amzn2022.0.2.aarch64
protobuf-compiler-debuginfo-3.14.0-7.amzn2022.0.2.aarch64
protobuf-devel-3.14.0-7.amzn2022.0.2.aarch64
protobuf-lite-3.14.0-7.amzn2022.0.2.aarch64
protobuf-debuginfo-3.14.0-7.amzn2022.0.2.aarch64
protobuf-compiler-3.14.0-7.amzn2022.0.2.aarch64
protobuf-debugsource-3.14.0-7.amzn2022.0.2.aarch64
noarch:
protobuf-vim-3.14.0-7.amzn2022.0.2.noarch
protobuf-emacs-3.14.0-7.amzn2022.0.2.noarch
python3-protobuf-3.14.0-7.amzn2022.0.2.noarch
src:
protobuf-3.14.0-7.amzn2022.0.2.src
x86_64:
protobuf-static-3.14.0-7.amzn2022.0.2.x86_64
protobuf-lite-devel-3.14.0-7.amzn2022.0.2.x86_64
protobuf-devel-3.14.0-7.amzn2022.0.2.x86_64
protobuf-debuginfo-3.14.0-7.amzn2022.0.2.x86_64
protobuf-lite-debuginfo-3.14.0-7.amzn2022.0.2.x86_64
protobuf-3.14.0-7.amzn2022.0.2.x86_64
protobuf-lite-3.14.0-7.amzn2022.0.2.x86_64
protobuf-compiler-debuginfo-3.14.0-7.amzn2022.0.2.x86_64
protobuf-debugsource-3.14.0-7.amzn2022.0.2.x86_64
protobuf-lite-static-3.14.0-7.amzn2022.0.2.x86_64
protobuf-compiler-3.14.0-7.amzn2022.0.2.x86_64