VYPR
High severityNVD Advisory· Published Mar 23, 2021· Updated Aug 3, 2024

Invalid free() call in Nanopb

CVE-2021-21401

Description

Nanopb is a small code-size Protocol Buffers implementation in ansi C. In Nanopb before versions 0.3.9.8 and 0.4.5, decoding a specifically formed message can cause invalid free() or realloc() calls if the message type contains an oneof field, and the oneof directly contains both a pointer field and a non-pointer field. If the message data first contains the non-pointer field and then the pointer field, the data of the non-pointer field is incorrectly treated as if it was a pointer value. Such message data rarely occurs in normal messages, but it is a concern when untrusted data is parsed. This has been fixed in versions 0.3.9.8 and 0.4.5. See referenced GitHub Security Advisory for more information including workarounds.

Affected packages

Versions sourced from the GitHub Security Advisory.

PackageAffected versionsPatched versions
nanopbPyPI
>= 0.3.2, < 0.3.9.80.3.9.8
nanopbPyPI
>= 0.4.0, < 0.4.50.4.5

Affected products

1

Patches

2
e2f0ccf939d9

Fix invalid free() with oneof (#647)

https://github.com/nanopb/nanopbPetteri AimonenMar 20, 2021via ghsa
1 file changed · +8 0
  • pb_decode.c+8 0 modified
    @@ -1203,6 +1203,14 @@ static bool pb_release_union_field(pb_istream_t *stream, pb_field_iter_t *field)
     
         pb_release_single_field(&old_field);
     
    +    if (PB_ATYPE(field->type) == PB_ATYPE_POINTER)
    +    {
    +        /* Initialize the pointer to NULL to make sure it is valid
    +         * even in case of error return. */
    +        *(void**)field->pField = NULL;
    +        field->pData = NULL;
    +    }
    +
         return true;
     }
     
    
4a375a560651

Fix invalid free() with oneof (#647)

https://github.com/nanopb/nanopbPetteri AimonenMar 20, 2021via ghsa
1 file changed · +8 1
  • pb_decode.c+8 1 modified
    @@ -1150,7 +1150,14 @@ static bool pb_release_union_field(pb_istream_t *stream, pb_field_iter_t *iter)
          * This shouldn't fail unless the pb_field_t structure is corrupted. */
         if (!pb_field_iter_find(iter, new_tag))
             PB_RETURN_ERROR(stream, "iterator error");
    -    
    +
    +    if (PB_ATYPE(iter->pos->type) == PB_ATYPE_POINTER)
    +    {
    +        /* Initialize the pointer to NULL to make sure it is valid
    +         * even in case of error return. */
    +        *(void**)iter->pData = NULL;
    +    }
    +
         return true;
     }
     
    

Vulnerability mechanics

Generated on May 9, 2026. Inputs: CWE entries + fix-commit diffs from this CVE's patches. Citations validated against bundle.

References

8

News mentions

0

No linked articles in our index yet.