All vulnerabilities
CVE-2021-22570
Withdrawn Advisory: NULL Pointer Dereference in Protocol Buffers
Description
Nullptr dereference when a null char is present in a proto symbol. The symbol is parsed incorrectly, leading to an unchecked call into the proto file's name during generation of the resulting error message. Since the symbol is incorrectly parsed, the file is nullptr. We recommend upgrading to version 3.15.0 or greater.
Patch Available
Fix available through Seal Security.
No upgrade required, protect your application instantly.
Fix without upgrading
Score
Severity
Ecosystem
Python
Publish Date
January 26, 2022
Modified Date
October 22, 2024
Score Vector
Affected Versions

