vulnerability
Amazon Linux 2023: CVE-2021-22570: Medium priority package update for protobuf
| Severity | CVSS | Published | Added | Modified |
|---|---|---|---|---|
| 2 | (AV:L/AC:L/Au:N/C:N/I:N/A:P) | Jan 26, 2022 | Feb 17, 2025 | Jul 4, 2025 |
Severity
2
CVSS
(AV:L/AC:L/Au:N/C:N/I:N/A:P)
Published
Jan 26, 2022
Added
Feb 17, 2025
Modified
Jul 4, 2025
Description
Nullptr dereference when a null char is present in a proto symbol. The symbol is parsed incorrectly, leading to an unchecked call into the proto file's name during generation of the resulting error message. Since the symbol is incorrectly parsed, the file is nullptr. We recommend upgrading to version 3.15.0 or greater.
A flaw was found in protobuf. The vulnerability occurs due to incorrect parsing of a NULL character in the proto symbol and leads to a Null pointer dereference. This flaw allows an attacker to execute unauthorized code or commands, read memory, modify memory.
A flaw was found in protobuf. The vulnerability occurs due to incorrect parsing of a NULL character in the proto symbol and leads to a Null pointer dereference. This flaw allows an attacker to execute unauthorized code or commands, read memory, modify memory.
Solutions
amazon-linux-2023-upgrade-protobufamazon-linux-2023-upgrade-protobuf-compileramazon-linux-2023-upgrade-protobuf-compiler-debuginfoamazon-linux-2023-upgrade-protobuf-debuginfoamazon-linux-2023-upgrade-protobuf-debugsourceamazon-linux-2023-upgrade-protobuf-develamazon-linux-2023-upgrade-protobuf-emacsamazon-linux-2023-upgrade-protobuf-liteamazon-linux-2023-upgrade-protobuf-lite-debuginfoamazon-linux-2023-upgrade-protobuf-lite-develamazon-linux-2023-upgrade-protobuf-lite-staticamazon-linux-2023-upgrade-protobuf-staticamazon-linux-2023-upgrade-protobuf-vimamazon-linux-2023-upgrade-python3-protobuf
NEW
Explore Exposure Command
Confidently identify and prioritize exposures from endpoint to cloud with full attack surface visibility and threat-aware risk context.