Source: nanopb
Version: 0.4.4-1
Severity: important
Tags: security upstream
X-Debbugs-Cc: car...@debian.org, Debian Security Team <t...@security.debian.org>

Hi,

The following vulnerability was published for nanopb.

CVE-2021-21401[0]:
| Nanopb is a small code-size Protocol Buffers implementation in ansi C.
| In Nanopb before versions 0.3.9.8 and 0.4.5, decoding a specifically
| formed message can cause invalid `free()` or `realloc()` calls if the
| message type contains an `oneof` field, and the `oneof` directly
| contains both a pointer field and a non-pointer field. If the message
| data first contains the non-pointer field and then the pointer field,
| the data of the non-pointer field is incorrectly treated as if it was
| a pointer value. Such message data rarely occurs in normal messages,
| but it is a concern when untrusted data is parsed. This has been fixed
| in versions 0.3.9.8 and 0.4.5. See referenced GitHub Security Advisory
| for more information including workarounds.


If you fix the vulnerability please also make sure to include the
CVE (Common Vulnerabilities & Exposures) id in your changelog entry.

For further information see:

[0] https://security-tracker.debian.org/tracker/CVE-2021-21401
    https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-21401
[1] https://github.com/nanopb/nanopb/security/advisories/GHSA-7mv5-5mxh-qg88

Regards,
Salvatore

Reply via email to