CVE-2021-22570
Published: 01/26/2022 14:15:08
Nullptr dereference when a null char is present in a proto symbol. The symbol is parsed incorrectly, leading to an unchecked call into the proto file's name during generation of the resulting error message. Since the symbol is incorrectly parsed, the file is nullptr. We recommend upgrading to version 3.15.0 or greater.
MEDIUM
CVSS v3: 6.5
CVSS v3: 6.5
Status
DocFilters Release | Package | State | Justification | Comment |
---|---|---|---|---|
25.1 | protobuf (3.0.0) | Not Affected | Code Not Reachable | Vulnerability does not affect runtime serialization/deserialization. The issue happens when generating code with the protoc compiler, which does not happen at runtime. |
24.4 | protobuf (3.0.0) | Not Affected | Code Not Reachable | Vulnerability does not affect runtime serialization/deserialization. The issue happens when generating code with the protoc compiler, which does not happen at runtime. |
24.4.0 | protobuf (3.0.0) | Not Affected | Code Not Reachable | Vulnerability does not affect runtime serialization/deserialization. The issue happens when generating code with the protoc compiler, which does not happen at runtime. |
24.3 | protobuf (3.0.0) | Not Affected | Code Not Reachable | Vulnerability does not affect runtime serialization/deserialization. The issue happens when generating code with the protoc compiler, which does not happen at runtime. |
24.2.1 | protobuf (3.0.0) | Not Affected | Code Not Reachable | Vulnerability does not affect runtime serialization/deserialization. The issue happens when generating code with the protoc compiler, which does not happen at runtime. |
24.2 | protobuf (3.0.0) | Not Affected | Code Not Reachable | Vulnerability does not affect runtime serialization/deserialization. The issue happens when generating code with the protoc compiler, which does not happen at runtime. |
24.1 | protobuf (3.0.0) | Not Affected | Code Not Reachable | Vulnerability does not affect runtime serialization/deserialization. The issue happens when generating code with the protoc compiler, which does not happen at runtime. |
23.3 | protobuf (3.0.0) | Not Affected | Code Not Reachable | Vulnerability does not affect runtime serialization/deserialization. The issue happens when generating code with the protoc compiler, which does not happen at runtime. |
23.2.1 | protobuf (3.0.0) | Not Affected | Code Not Reachable | Vulnerability does not affect runtime serialization/deserialization. The issue happens when generating code with the protoc compiler, which does not happen at runtime. |
23.2 | protobuf (3.0.0) | Not Affected | Code Not Reachable | Vulnerability does not affect runtime serialization/deserialization. The issue happens when generating code with the protoc compiler, which does not happen at runtime. |
23.1 | protobuf (3.0.0) | Not Affected | Code Not Reachable | Vulnerability does not affect runtime serialization/deserialization. The issue happens when generating code with the protoc compiler, which does not happen at runtime. |
22.4 | protobuf (3.0.0) | Not Affected | Code Not Reachable | Vulnerability does not affect runtime serialization/deserialization. The issue happens when generating code with the protoc compiler, which does not happen at runtime. |
22.3 | protobuf (3.0.0) | Needs Triage | not-exploitable | |
22.2 | protobuf (3.0.0) | Needs Triage | not-exploitable | |
22.1 | protobuf (3.0.0) | Needs Triage | not-exploitable | |
21.11.1 | protobuf (3.0.0) | Needs Triage | ||
21.11 | protobuf (3.0.0) | Needs Triage | ||
21.8.1 | protobuf (3.0.0) | Needs Triage | ||
21.8 | protobuf (3.0.0) | Needs Triage | ||
21.5.1 | protobuf (3.0.0) | Needs Triage | ||
21.5.0 | protobuf (3.0.0) | Needs Triage | ||
21.2.0 | protobuf (3.0.0) | Needs Triage | ||
11.4.20 | protobuf (3.0.0) | Needs Triage | ||
11.4.19.3667 | protobuf (3.0.0) | Needs Triage | ||
11.4.18.3599 | protobuf (3.0.0) | Needs Triage | ||
11.4.17 | protobuf (3.0.0) | Needs Triage | ||
11.4.16.3445 | protobuf (3.0.0) | Needs Triage | ||
11.4.15.3368 | protobuf (3.0.0) | Needs Triage | ||
11.4.14.3263 | protobuf (3.0.0) | Needs Triage | ||
11.4.13.3179 | protobuf (3.0.0) | Needs Triage | ||
11.4.12.3054 | protobuf (3.0.0) | Needs Triage | ||
11.4.11.3040 | protobuf (3.0.0) | Needs Triage | ||
11.4.11.2990 | protobuf (3.0.0) | Needs Triage | ||
11.4.10.2934 | protobuf (3.0.0) | Needs Triage | ||
11.4.9.2878 | protobuf (3.0.0) | Needs Triage | ||
11.4.8.2822 | protobuf (3.0.0) | Needs Triage |
Severity score breakdown
Attack Complexity
LOW
Attack Vector
NETWORK
Availability Impact
HIGH
Base Score
6.5
Base Severity
MEDIUM
Confidentiality Impact
NONE
Integrity Impact
NONE
Privileges Required
LOW
Scope
UNCHANGED
User Interaction
NONE
Vector String
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
Version
3.1