Advisory Database
  • Advisories
  • Dependency Scanning
  1. pypi
  2. ›
  3. nanopb
  4. ›
  5. CVE-2020-26243

CVE-2020-26243: Improper Input Validation

November 25, 2020 (updated January 7, 2021)

Nanopb is a small code-size Protocol Buffers implementation. The following workarounds are available: 1) Set the option no_unions for the oneof field. This will generate fields as separate instead of C union, and avoids triggering the problematic code. 2) Set the type of the submessage field inside oneof to FT_POINTER. This way the whole submessage will be dynamically allocated and the problematic code is not executed. 3) Use an arena allocator for nanopb, to make sure all memory can be released afterwards.

References

  • github.com/advisories/GHSA-85rr-4rh9-hhwh
  • github.com/nanopb/nanopb/blob/2b48a361786dfb1f63d229840217a93aae064667/CHANGELOG.txt
  • github.com/nanopb/nanopb/commit/4fe23595732b6f1254cfc11a9b8d6da900b55b0c
  • github.com/nanopb/nanopb/issues/615
  • github.com/nanopb/nanopb/security/advisories/GHSA-85rr-4rh9-hhwh
  • nvd.nist.gov/vuln/detail/CVE-2020-26243

Code Behaviors & Features

Detect and mitigate CVE-2020-26243 with GitLab Dependency Scanning

Secure your software supply chain by verifying that all open source dependencies used in your projects contain no disclosed vulnerabilities. Learn more about Dependency Scanning →

Affected versions

All versions starting from 0.3.2 up to 0.3.9.6, all versions starting from 0.4.0 before 0.4.4

Fixed versions

  • 0.3.9.7
  • 0.4.4

Solution

Upgrade to versions 0.3.9.7, 0.4.4 or above.

Impact 7.5 HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H

Learn more about CVSS

Weakness

  • CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer
  • CWE-20: Improper Input Validation
  • CWE-78: Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')

Source file

pypi/nanopb/CVE-2020-26243.yml

Spotted a mistake? Edit the file on GitLab.

  • Site Repo
  • About GitLab
  • Terms
  • Privacy Statement
  • Contact

Page generated Wed, 14 May 2025 12:15:18 +0000.