CVE-2021-22570

Published: 01/26/2022 14:15:08
Nullptr dereference when a null char is present in a proto symbol. The symbol is parsed incorrectly, leading to an unchecked call into the proto file's name during generation of the resulting error message. Since the symbol is incorrectly parsed, the file is nullptr. We recommend upgrading to version 3.15.0 or greater.
MEDIUM
CVSS v3: 6.5

Status

DocFilters Release Package State Justification Comment
25.1 protobuf (3.0.0) Not Affected Code Not Reachable Vulnerability does not affect runtime serialization/deserialization. The issue happens when generating code with the protoc compiler, which does not happen at runtime.
24.4 protobuf (3.0.0) Not Affected Code Not Reachable Vulnerability does not affect runtime serialization/deserialization. The issue happens when generating code with the protoc compiler, which does not happen at runtime.
24.4.0 protobuf (3.0.0) Not Affected Code Not Reachable Vulnerability does not affect runtime serialization/deserialization. The issue happens when generating code with the protoc compiler, which does not happen at runtime.
24.3 protobuf (3.0.0) Not Affected Code Not Reachable Vulnerability does not affect runtime serialization/deserialization. The issue happens when generating code with the protoc compiler, which does not happen at runtime.
24.2.1 protobuf (3.0.0) Not Affected Code Not Reachable Vulnerability does not affect runtime serialization/deserialization. The issue happens when generating code with the protoc compiler, which does not happen at runtime.
24.2 protobuf (3.0.0) Not Affected Code Not Reachable Vulnerability does not affect runtime serialization/deserialization. The issue happens when generating code with the protoc compiler, which does not happen at runtime.
24.1 protobuf (3.0.0) Not Affected Code Not Reachable Vulnerability does not affect runtime serialization/deserialization. The issue happens when generating code with the protoc compiler, which does not happen at runtime.
23.3 protobuf (3.0.0) Not Affected Code Not Reachable Vulnerability does not affect runtime serialization/deserialization. The issue happens when generating code with the protoc compiler, which does not happen at runtime.
23.2.1 protobuf (3.0.0) Not Affected Code Not Reachable Vulnerability does not affect runtime serialization/deserialization. The issue happens when generating code with the protoc compiler, which does not happen at runtime.
23.2 protobuf (3.0.0) Not Affected Code Not Reachable Vulnerability does not affect runtime serialization/deserialization. The issue happens when generating code with the protoc compiler, which does not happen at runtime.
23.1 protobuf (3.0.0) Not Affected Code Not Reachable Vulnerability does not affect runtime serialization/deserialization. The issue happens when generating code with the protoc compiler, which does not happen at runtime.
22.4 protobuf (3.0.0) Not Affected Code Not Reachable Vulnerability does not affect runtime serialization/deserialization. The issue happens when generating code with the protoc compiler, which does not happen at runtime.
22.3 protobuf (3.0.0) Needs Triage not-exploitable
22.2 protobuf (3.0.0) Needs Triage not-exploitable
22.1 protobuf (3.0.0) Needs Triage not-exploitable
21.11.1 protobuf (3.0.0) Needs Triage
21.11 protobuf (3.0.0) Needs Triage
21.8.1 protobuf (3.0.0) Needs Triage
21.8 protobuf (3.0.0) Needs Triage
21.5.1 protobuf (3.0.0) Needs Triage
21.5.0 protobuf (3.0.0) Needs Triage
21.2.0 protobuf (3.0.0) Needs Triage
11.4.20 protobuf (3.0.0) Needs Triage
11.4.19.3667 protobuf (3.0.0) Needs Triage
11.4.18.3599 protobuf (3.0.0) Needs Triage
11.4.17 protobuf (3.0.0) Needs Triage
11.4.16.3445 protobuf (3.0.0) Needs Triage
11.4.15.3368 protobuf (3.0.0) Needs Triage
11.4.14.3263 protobuf (3.0.0) Needs Triage
11.4.13.3179 protobuf (3.0.0) Needs Triage
11.4.12.3054 protobuf (3.0.0) Needs Triage
11.4.11.3040 protobuf (3.0.0) Needs Triage
11.4.11.2990 protobuf (3.0.0) Needs Triage
11.4.10.2934 protobuf (3.0.0) Needs Triage
11.4.9.2878 protobuf (3.0.0) Needs Triage
11.4.8.2822 protobuf (3.0.0) Needs Triage

Severity score breakdown

Attack Complexity
LOW
Attack Vector
NETWORK
Availability Impact
HIGH
Base Score
6.5
Base Severity
MEDIUM
Confidentiality Impact
NONE
Integrity Impact
NONE
Privileges Required
LOW
Scope
UNCHANGED
User Interaction
NONE
Vector String
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
Version
3.1

References