{"id":"CVE-2021-22570","details":"Nullptr dereference when a null char is present in a proto symbol. The symbol is parsed incorrectly, leading to an unchecked call into the proto file's name during generation of the resulting error message. Since the symbol is incorrectly parsed, the file is nullptr. We recommend upgrading to version 3.15.0 or greater.","aliases":["GHSA-77rm-9x9h-xj3g","PYSEC-2022-48"],"modified":"2026-04-10T04:30:20.940528Z","published":"2022-01-26T14:15:08.067Z","related":["ALSA-2022:7464","ALSA-2022:7970","CGA-mmq2-c642-63f5","SUSE-SU-2022:1040-1","SUSE-SU-2022:1040-2","SUSE-SU-2022:1040-3","SUSE-SU-2023:2783-1","SUSE-SU-2023:2783-2","openSUSE-SU-2022:0823-1","openSUSE-SU-2022:1040-1"],"references":[{"type":"WEB","url":"https://lists.debian.org/debian-lts-announce/2023/04/msg00019.html"},{"type":"WEB","url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/3DVUZPALAQ34TQP6KFNLM4IZS6B32XSA/"},{"type":"WEB","url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/IFX6KPNOFHYD6L4XES5PCM3QNSKZBOTQ/"},{"type":"WEB","url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/KQJB6ZPRLKV6WCMX2PRRRQBFAOXFBK6B/"},{"type":"WEB","url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/NVTWVQRB5OCCTMKEQFY5MYED3DXDVSLP/"},{"type":"WEB","url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/5PAGL5M2KGYPN3VEQCRJJE6NA7D5YG5X/"},{"type":"WEB","url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/BTRGBRC5KGCA4SK5MUNLPYJRAGXMBIYY/"},{"type":"WEB","url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/MRWRAXAFR3JR7XCFWTHC2KALSZKWACCE/"},{"type":"ADVISORY","url":"https://security.netapp.com/advisory/ntap-20220429-0005/"},{"type":"ADVISORY","url":"https://www.oracle.com/security-alerts/cpuapr2022.html"},{"type":"ADVISORY","url":"https://github.com/protocolbuffers/protobuf/releases/tag/v3.15.0"}],"affected":[{"ranges":[{"type":"GIT","repo":"https://github.com/mysql/mysql-server","events":[{"introduced":"0"},{"last_affected":"527c12ed611f3fe072c3043734319edb2c733099"},{"introduced":"0"},{"last_affected":"6846e6b2f72931991cc9fd589dc9946ea2ab58c9"}],"database_specific":{"versions":[{"introduced":"0"},{"last_affected":"9.0"},{"introduced":"0"},{"last_affected":"8.0.28"}]}},{"type":"GIT","repo":"https://github.com/protocolbuffers/protobuf","events":[{"introduced":"0"},{"fixed":"ae50d9b9902526efd6c7a1907d09739f959c6297"},{"introduced":"0"},{"last_affected":"6a6cd88c262ffdb1738167a47d5fcc7a3eb4edac"}],"database_specific":{"versions":[{"introduced":"0"},{"fixed":"3.15.0"},{"introduced":"0"},{"last_affected":"34"}]}}],"versions":["3.15.0-rc1","mysql-3.23.22-beta","mysql-3.23.28-gamma","mysql-3.23.30-gamma","mysql-3.23.31","mysql-3.23.32","mysql-3.23.33","mysql-3.23.36","mysql-4.0.2","mysql-4.0.4","mysql-5.1.4","mysql-8.0.28","mysql-9.0.0","mysql-9.0.0-release","mysql-cluster-8.0.28","mysql-cluster-9.0.0","rust-prerelease-4.30.0-beta1","rust-prerelease-4.31.0-beta1","v2.6.0","v2.6.1rc1","v26-dev","v27-dev","v28-dev","v29-dev","v3.0.0-alpha-3","v3.0.0-alpha-4","v3.0.0-beta-1","v3.0.0-beta-1-bzl-fix","v3.0.0-beta-2","v3.0.0-beta-3-pre-1","v3.12.3","v3.15.0-rc1","v3.15.0-rc2","v3.20.0-rc2","v30-dev","v31-dev","v32-dev","v33-dev","v34.0","v34.0-rc1.1","v5.34.0-objectivec","v5.34.0-rc1-objectivec"],"database_specific":{"unresolved_ranges":[{"events":[{"introduced":"0"},{"last_affected":"10.0"}]},{"events":[{"introduced":"0"},{"last_affected":"11.0"}]},{"events":[{"introduced":"0"},{"last_affected":"35"}]},{"events":[{"introduced":"0"},{"last_affected":"36"}]}],"source":"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2021-22570.json"}}],"schema_version":"1.7.5","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"}]}