Skip to content
Snippets Groups Projects
  1. Sep 11, 2014
    • Petteri Aimonen's avatar
      Fix crash in pb_release() if called twice on same message. · 13a07e35
      Petteri Aimonen authored
      There was a double-free bug in pb_release() because it didn't set size fields
      to zero after deallocation. Most commonly this happens if pb_decode() fails,
      internally calls pb_release() and then application code also calls pb_release().
      13a07e35
    • Petteri Aimonen's avatar
      Add a better fuzz test. · 0dce9ef6
      Petteri Aimonen authored
      Attempts to verify all the properties defined in the security model,
      while also being portable and able to run on many platforms.
      0dce9ef6
  2. Sep 07, 2014
  3. Aug 28, 2014
  4. Aug 26, 2014
  5. Aug 19, 2014
    • Petteri Aimonen's avatar
      Add #if guard for .pb.h version. · 3ed21938
      Petteri Aimonen authored
      The version in PB_PROTO_HEADER_VERSION can be bumped whenever there
      is a breaking change to the generated files, and it will then alert
      to the difference.
      
      Update issue 129
      Status: FixedInGit
      3ed21938
  6. Aug 18, 2014
  7. Aug 10, 2014
  8. Aug 09, 2014
  9. Aug 04, 2014
    • Petteri Aimonen's avatar
      Update changelog · 4f76e649
      Petteri Aimonen authored
      4f76e649
    • Petteri Aimonen's avatar
      Generate #defines for initializing message structures. · ec3bff4b
      Petteri Aimonen authored
      Usage like:
      MyMessage foo = MyMessage_init_default;
      
      MyMessage_init_default will initialize to default values defined in .proto.
      
      MyMessage_init_zero will initialize to null/zero values. Same results as {}
      or {0}, but will avoid compiler warnings by initializing everything explicitly.
      
      Update issue 79
      Status: FixedInGit
      ec3bff4b
  10. Jul 20, 2014
  11. Jun 02, 2014
  12. May 30, 2014
  13. May 20, 2014
  14. May 17, 2014
    • Petteri Aimonen's avatar
    • Petteri Aimonen's avatar
      Fix security issue with PB_ENABLE_MALLOC. · 5ef12861
      Petteri Aimonen authored
      The multiplication in allocate_field could potentially overflow,
      leading to allocating too little memory. This could subsequently
      allow an attacker to cause a write past the buffer, overwriting
      other memory contents.
      
      The attack is possible if untrusted message data is decoded using
      nanopb, and the message type includes a pointer-type string or bytes
      field, or a repeated numeric field. Submessage fields are not
      affected.
      
      This issue only affects systems that have been compiled with
      PB_ENABLE_MALLOC enabled. Only version nanopb-0.2.7 is affected,
      as prior versions do not include this functionality.
      
      Update issue 117
      Status: FixedInGit
      5ef12861
Loading