NULL Pointer Dereference Affecting zellij package, versions <0.41.2-r2


Severity

Recommended
0.0
medium
0
10

Snyk's Security Team recommends NVD's CVSS assessment. Learn more

Threat Intelligence

EPSS
0.11% (45th percentile)

Do your applications use this vulnerable package?

In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.

Test your applications

Snyk Learn

Learn about NULL Pointer Dereference vulnerabilities in an interactive lesson.

Start learning
  • Snyk IDSNYK-CHAINGUARDLATEST-ZELLIJ-8602114
  • published5 Jan 2025
  • disclosed24 Nov 2020

Introduced: 24 Nov 2020

CVE-2020-26235  (opens in a new tab)
CWE-476  (opens in a new tab)

How to fix?

Upgrade Chainguard zellij to version 0.41.2-r2 or higher.

NVD Description

Note: Versions mentioned in the description apply only to the upstream zellij package and not the zellij package as distributed by Chainguard. See How to fix? for Chainguard relevant fixed versions and status.

In Rust time crate from version 0.2.7 and before version 0.2.23, unix-like operating systems may segfault due to dereferencing a dangling pointer in specific circumstances. This requires the user to set any environment variable in a different thread than the affected functions. The affected functions are time::UtcOffset::local_offset_at, time::UtcOffset::try_local_offset_at, time::UtcOffset::current_local_offset, time::UtcOffset::try_current_local_offset, time::OffsetDateTime::now_local and time::OffsetDateTime::try_now_local. Non-Unix targets are unaffected. This includes Windows and wasm. The issue was introduced in version 0.2.7 and fixed in version 0.2.23.

CVSS Scores

version 3.1