Nanopb is a small code-size Protocol Buffers implementation. When the compile time option PB_ENABLE_MALLOC is enabled, the message contains at least one field with FT_POINTER field type, custom stream callback is used with unknown stream length. and the pb_decode_ex() function is used with flag PB_DECODE_DELIMITED, then the pb_decode_ex() function does not automatically call pb_release(), like is done for other failure cases. This could lead to memory leak and potential denial-of-service. This vulnerability is fixed in 0.4.9.1.
Metrics
Affected Vendors & Products
References
History
Mon, 02 Dec 2024 22:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Metrics |
ssvc
|
Mon, 02 Dec 2024 16:00:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Description | Nanopb is a small code-size Protocol Buffers implementation. When the compile time option PB_ENABLE_MALLOC is enabled, the message contains at least one field with FT_POINTER field type, custom stream callback is used with unknown stream length. and the pb_decode_ex() function is used with flag PB_DECODE_DELIMITED, then the pb_decode_ex() function does not automatically call pb_release(), like is done for other failure cases. This could lead to memory leak and potential denial-of-service. This vulnerability is fixed in 0.4.9.1. | |
Title | Nanopb does not release memory on error return when using PB_DECODE_DELIMITED | |
Weaknesses | CWE-401 CWE-755 |
|
References |
| |
Metrics |
cvssV3_1
|
MITRE
Status: PUBLISHED
Assigner: GitHub_M
Published: 2024-12-02T15:54:47.478Z
Updated: 2024-12-02T21:40:02.909Z
Reserved: 2024-11-25T23:14:36.380Z
Link: CVE-2024-53984
Vulnrichment
Updated: 2024-12-02T21:39:58.794Z
NVD
Status : Received
Published: 2024-12-02T16:15:14.603
Modified: 2024-12-02T16:15:14.603
Link: CVE-2024-53984
Redhat
No data.