Improper Input Validation Affecting nanopb package, versions <2.30907.0


Severity

Recommended
0.0
high
0
10

CVSS assessment made by Snyk's Security Team. Learn more

Threat Intelligence

EPSS
0.4% (74th percentile)

Do your applications use this vulnerable package?

In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.

Test your applications
  • Snyk IDSNYK-COCOAPODS-NANOPB-5725775
  • published12 Jan 2022
  • disclosed25 Nov 2020
  • creditUnknown

Introduced: 25 Nov 2020

CVE-2020-26243  (opens in a new tab)
CWE-119  (opens in a new tab)
CWE-20  (opens in a new tab)

How to fix?

Upgrade nanopb to version 2.30907.0 or higher.

Overview

nanopb is a plain-C implementation of Google's Protocol Buffers data format.

Affected versions of this package are vulnerable to Improper Input Validation. Nanopb is a small code-size Protocol Buffers implementation. In Nanopb before versions 0.4.4 and 0.3.9.7, decoding specifically formed message can leak memory if dynamic allocation is enabled and an oneof field contains a static submessage that contains a dynamic field, and the message being decoded contains the submessage multiple times. This is rare in normal messages, but it is a concern when untrusted data is parsed. This is fixed in versions 0.3.9.7 and 0.4.4. The following workarounds are available: 1) Set the option no_unions for the oneof field. This will generate fields as separate instead of C union, and avoids triggering the problematic code. 2) Set the type of the submessage field inside oneof to FT_POINTER. This way the whole submessage will be dynamically allocated and the problematic code is not executed. 3) Use an arena allocator for nanopb, to make sure all memory can be released afterwards.

CVSS Scores

version 3.1