vulnerability
Red Hat: CVE-2021-22570: protobuf: Incorrect parsing of nullchar in the proto symbol leads to Nullptr dereference (Multiple Advisories)
| Severity | CVSS | Published | Added | Modified |
|---|---|---|---|---|
| 2 | (AV:L/AC:L/Au:N/C:N/I:N/A:P) | Jan 26, 2022 | Nov 9, 2022 | Nov 14, 2025 |
Severity
2
CVSS
(AV:L/AC:L/Au:N/C:N/I:N/A:P)
Published
Jan 26, 2022
Added
Nov 9, 2022
Modified
Nov 14, 2025
Description
Nullptr dereference when a null char is present in a proto symbol. The symbol is parsed incorrectly, leading to an unchecked call into the proto file's name during generation of the resulting error message. Since the symbol is incorrectly parsed, the file is nullptr. We recommend upgrading to version 3.15.0 or greater.
Solutions
no-fix-redhat-rpm-packageredhat-upgrade-protobufredhat-upgrade-protobuf-compilerredhat-upgrade-protobuf-compiler-debuginforedhat-upgrade-protobuf-debuginforedhat-upgrade-protobuf-debugsourceredhat-upgrade-protobuf-develredhat-upgrade-protobuf-literedhat-upgrade-protobuf-lite-debuginforedhat-upgrade-protobuf-lite-develredhat-upgrade-python3-protobuf
NEW
Explore Exposure Command
Confidently identify and prioritize exposures from endpoint to cloud with full attack surface visibility and threat-aware risk context.