vulnerability

Red Hat: CVE-2021-22570: protobuf: Incorrect parsing of nullchar in the proto symbol leads to Nullptr dereference (Multiple Advisories)

Severity
2
CVSS
(AV:L/AC:L/Au:N/C:N/I:N/A:P)
Published
Jan 26, 2022
Added
Nov 9, 2022
Modified
Nov 14, 2025

Description

Nullptr dereference when a null char is present in a proto symbol. The symbol is parsed incorrectly, leading to an unchecked call into the proto file's name during generation of the resulting error message. Since the symbol is incorrectly parsed, the file is nullptr. We recommend upgrading to version 3.15.0 or greater.

Solutions

no-fix-redhat-rpm-packageredhat-upgrade-protobufredhat-upgrade-protobuf-compilerredhat-upgrade-protobuf-compiler-debuginforedhat-upgrade-protobuf-debuginforedhat-upgrade-protobuf-debugsourceredhat-upgrade-protobuf-develredhat-upgrade-protobuf-literedhat-upgrade-protobuf-lite-debuginforedhat-upgrade-protobuf-lite-develredhat-upgrade-python3-protobuf
Title
NEW

Explore Exposure Command

Confidently identify and prioritize exposures from endpoint to cloud with full attack surface visibility and threat-aware risk context.