Withdrawn Advisory: NULL Pointer Dereference in Protocol Buffers
High severity
GitHub Reviewed
Published
Jan 27, 2022
to the GitHub Advisory Database
•
Updated Aug 25, 2025
Withdrawn
This advisory was withdrawn on Aug 25, 2025
< 0.0.0-20210218195015-ae50d9b99025
>= 0.0.0, < 3.15.0
0.0.0-20210218195015-ae50d9b99025
3.15.0
Description
Published by the National Vulnerability Database
Jan 26, 2022
Published to the GitHub Advisory Database
Jan 27, 2022
Reviewed
Feb 3, 2022
Withdrawn
Aug 25, 2025
Last updated
Aug 25, 2025
Withdrawn Advisory
This advisory has been withdrawn because the protobuf vulnerability comes from the compiler rather that the code. This link is maintained to preserve external references.
Original Description
Nullptr dereference when a null char is present in a proto symbol. The symbol is parsed incorrectly, leading to an unchecked call into the proto file's name during generation of the resulting error message. Since the symbol is incorrectly parsed, the file is nullptr. We recommend upgrading to version 3.15.0 or greater.
References