{"id":"CVE-2021-22570","details":"Nullptr dereference when a null char is present in a proto symbol. The symbol is parsed incorrectly, leading to an unchecked call into the proto file's name during generation of the resulting error message. Since the symbol is incorrectly parsed, the file is nullptr. We recommend upgrading to version 3.15.0 or greater.","aliases":["GHSA-77rm-9x9h-xj3g","PYSEC-2022-48"],"modified":"2026-02-12T00:42:40.362658Z","published":"2022-01-26T14:15:08.067Z","related":["ALSA-2022:7464","ALSA-2022:7970","CGA-mmq2-c642-63f5","SUSE-SU-2022:1040-1","SUSE-SU-2022:1040-2","SUSE-SU-2022:1040-3","SUSE-SU-2023:2783-1","SUSE-SU-2023:2783-2","openSUSE-SU-2022:0823-1","openSUSE-SU-2022:1040-1"],"references":[{"type":"WEB","url":"https://lists.debian.org/debian-lts-announce/2023/04/msg00019.html"},{"type":"WEB","url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/3DVUZPALAQ34TQP6KFNLM4IZS6B32XSA/"},{"type":"WEB","url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/5PAGL5M2KGYPN3VEQCRJJE6NA7D5YG5X/"},{"type":"WEB","url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/BTRGBRC5KGCA4SK5MUNLPYJRAGXMBIYY/"},{"type":"WEB","url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/IFX6KPNOFHYD6L4XES5PCM3QNSKZBOTQ/"},{"type":"WEB","url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/KQJB6ZPRLKV6WCMX2PRRRQBFAOXFBK6B/"},{"type":"WEB","url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/MRWRAXAFR3JR7XCFWTHC2KALSZKWACCE/"},{"type":"WEB","url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/NVTWVQRB5OCCTMKEQFY5MYED3DXDVSLP/"},{"type":"ADVISORY","url":"https://github.com/protocolbuffers/protobuf/releases/tag/v3.15.0"},{"type":"ADVISORY","url":"https://security.netapp.com/advisory/ntap-20220429-0005/"},{"type":"ADVISORY","url":"https://www.oracle.com/security-alerts/cpuapr2022.html"}],"affected":[{"ranges":[{"type":"GIT","repo":"https://github.com/protocolbuffers/protobuf","events":[{"introduced":"0"},{"fixed":"ae50d9b9902526efd6c7a1907d09739f959c6297"}]}],"versions":["3.15.0-rc1","conformance-build-tag","v2.4.1","v2.5.0","v2.6.0","v2.6.1","v2.6.1rc1","v3.0.0","v3.0.0-alpha-1","v3.0.0-alpha-2","v3.0.0-alpha-3","v3.0.0-alpha-4","v3.0.0-beta-1","v3.0.0-beta-1-bzl-fix","v3.0.0-beta-2","v3.0.0-beta-3","v3.0.0-beta-3-pre-1","v3.0.0-beta-4","v3.0.2","v3.1.0","v3.1.0-alpha-1","v3.10.0","v3.10.0-rc1","v3.11.0","v3.11.0-rc1","v3.11.0-rc2","v3.11.1","v3.11.2","v3.11.3","v3.11.4","v3.12.0","v3.12.0-rc1","v3.12.0-rc2","v3.12.1","v3.12.2","v3.12.3","v3.13.0","v3.13.0-rc3","v3.13.0.1","v3.14.0","v3.14.0-rc1","v3.14.0-rc2","v3.14.0-rc3","v3.15.0-rc1","v3.15.0-rc2","v3.3.0","v3.3.0rc1","v3.3.1","v3.3.2","v3.4.0","v3.4.0rc1","v3.4.0rc2","v3.4.0rc3","v3.4.1","v3.5.0","v3.5.0.1","v3.5.1","v3.5.2","v3.6.0","v3.6.0.1","v3.6.0rc1","v3.6.0rc2","v3.6.1","v3.7.0","v3.7.0-rc.2","v3.7.0-rc.3","v3.7.0rc1","v3.7.0rc2","v3.7.1","v3.8.0","v3.8.0-rc1","v3.9.0-rc1"],"database_specific":{"source":"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2021-22570.json"}}],"schema_version":"1.7.3","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"}]}