Out-of-Bounds Affecting nanopb package, versions <0.4.4-1


Severity

Recommended
0.0
high
0
10

Snyk's Security Team recommends NVD's CVSS assessment. Learn more

Threat Intelligence

EPSS
0.4% (74th percentile)

Do your applications use this vulnerable package?

In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.

Test your applications
  • Snyk IDSNYK-DEBIAN11-NANOPB-1045790
  • published26 Nov 2020
  • disclosed25 Nov 2020

Introduced: 25 Nov 2020

CVE-2020-26243  (opens in a new tab)
CWE-119  (opens in a new tab)
CWE-20  (opens in a new tab)

How to fix?

Upgrade Debian:11 nanopb to version 0.4.4-1 or higher.

NVD Description

Note: Versions mentioned in the description apply only to the upstream nanopb package and not the nanopb package as distributed by Debian. See How to fix? for Debian:11 relevant fixed versions and status.

Nanopb is a small code-size Protocol Buffers implementation. In Nanopb before versions 0.4.4 and 0.3.9.7, decoding specifically formed message can leak memory if dynamic allocation is enabled and an oneof field contains a static submessage that contains a dynamic field, and the message being decoded contains the submessage multiple times. This is rare in normal messages, but it is a concern when untrusted data is parsed. This is fixed in versions 0.3.9.7 and 0.4.4. The following workarounds are available: 1) Set the option no_unions for the oneof field. This will generate fields as separate instead of C union, and avoids triggering the problematic code. 2) Set the type of the submessage field inside oneof to FT_POINTER. This way the whole submessage will be dynamically allocated and the problematic code is not executed. 3) Use an arena allocator for nanopb, to make sure all memory can be released afterwards.

CVSS Scores

version 3.1