Age | Commit message (Collapse) | Author |
|
d2d08a45ac am: bd24d4e500 am: 71e4789187 am: c80aa5641b
Original change: https://android-review.googlesource.com/c/platform/external/nanopb-c/+/2062297
Change-Id: Id9a422fe2ff209f707d80c8fe6d0d2034643e5a3
Signed-off-by: Automerger Merge Worker <android-build-automerger-merge-worker@system.gserviceaccount.com>
|
|
d2d08a45ac am: bd24d4e500 am: 71e4789187
Original change: https://android-review.googlesource.com/c/platform/external/nanopb-c/+/2062297
Change-Id: I354462db1e28e59a578a6db0da65ad42acdb0f94
Signed-off-by: Automerger Merge Worker <android-build-automerger-merge-worker@system.gserviceaccount.com>
|
|
d2d08a45ac am: bd24d4e500
Original change: https://android-review.googlesource.com/c/platform/external/nanopb-c/+/2062297
Change-Id: I3ea21353e1e07a032561e931073dfdc295b913bd
Signed-off-by: Automerger Merge Worker <android-build-automerger-merge-worker@system.gserviceaccount.com>
|
|
d2d08a45ac
Original change: https://android-review.googlesource.com/c/platform/external/nanopb-c/+/2062297
Change-Id: I8131125fd674a831d897faebbea6129420ce7cde
Signed-off-by: Automerger Merge Worker <android-build-automerger-merge-worker@system.gserviceaccount.com>
|
|
Original change: https://android-review.googlesource.com/c/platform/external/nanopb-c/+/2062297
Change-Id: Ie99c0b53b014ace0ca0a546b62260c6b2570e8e2
Signed-off-by: Automerger Merge Worker <android-build-automerger-merge-worker@system.gserviceaccount.com>
|
|
Change-Id: I1fe5f91a295864e43212938a932e4852ccc0d18b
|
|
Ignore-AOSP-First: Updating it for apex which is on tm-dev
Test: make a full build with m -j64
Bug: 220216883
Change-Id: I8a9d1cf630e9009e794e35b2b94732227ea66818
|
|
Bug: 206121418
Test: Compile
Change-Id: Iff797922920a0a2d92db4022b8ad93c078c2ef81
|
|
e0506e99f1 -s ours
am skip reason: Merged-In If02f28dcb5a6034625681a733e640c550e79c6a2 with SHA-1 b1208c1f81 is already in history
Original change: https://googleplex-android-review.googlesource.com/c/platform/external/nanopb-c/+/16438090
Change-Id: I2d4fb1d35cc5aa8cc8c284f99fe4ef1a4501e753
|
|
am skip reason: Merged-In If02f28dcb5a6034625681a733e640c550e79c6a2 with SHA-1 b1208c1f81 is already in history
Original change: https://googleplex-android-review.googlesource.com/c/platform/external/nanopb-c/+/16438090
Change-Id: I2fd31d44c04bbcebb814695ea3c09e48df112635
|
|
Performed by merging the upgrade commit from master.
Bug: 198577383
Test: presubmit
Merged-In: If02f28dcb5a6034625681a733e640c550e79c6a2
Change-Id: I8f12a43d3a7c9048785de12c24285ae99e8571b6
|
|
b89b3299cf
Original change: https://android-review.googlesource.com/c/platform/external/nanopb-c/+/1911071
Change-Id: I0f437d2455800739eea53300b4b376eef8b16c93
|
|
Original change: https://android-review.googlesource.com/c/platform/external/nanopb-c/+/1911071
Change-Id: I99eeef86c6f62e0587bb41f56a036c6d192bcc01
|
|
Original change: https://android-review.googlesource.com/c/platform/external/nanopb-c/+/1911071
Change-Id: I4b13c6cdbdafdc1f3b934ed998034e52003d66fb
|
|
Original change: https://android-review.googlesource.com/c/platform/external/nanopb-c/+/1911071
Change-Id: I302fb410274377eea0ede822422cfee2f0f779ee
|
|
Bug: 204282739
Test: presubmit
Change-Id: If02f28dcb5a6034625681a733e640c550e79c6a2
|
|
c41cd8542e am: 59d7c7b732
Original change: https://android-review.googlesource.com/c/platform/external/nanopb-c/+/1869256
Change-Id: I3a07b6c0be0529699aa4f550b64896384c0dd755
|
|
c41cd8542e
Original change: https://android-review.googlesource.com/c/platform/external/nanopb-c/+/1869256
Change-Id: I360602b0123854585cd7857c949dbf2e25d07ee7
|
|
Original change: https://android-review.googlesource.com/c/platform/external/nanopb-c/+/1869256
Change-Id: I7da2cf793f1add66c452eef0a270643b4fbc50aa
|
|
Original change: https://android-review.googlesource.com/c/platform/external/nanopb-c/+/1869256
Change-Id: I430696bc7ac3bfbe2c1f8977070d5941ff662f10
|
|
Original change: https://android-review.googlesource.com/c/platform/external/nanopb-c/+/1869256
Change-Id: I4c6d2c7818657ea14f47c2f56059806ab7f4ac28
|
|
Perfomed by merging version 0.3.9.2 from upstream.
Retained local change defining PB_FIELD2 to PB_FIELD to preserve
compatibility with autogenerated nanopb headers committed to Git
in third party vendor code.
Bug: 203713560
Test: build, presubmit
Change-Id: Id4ea86c30c6a3d7e0217dfdfb3eef8c215aa2a62
|
|
Bug: 189946434
Change-Id: I7b0e5190415072b38388950a87d2f8daa06b4932
|
|
|
|
Nanopb would call free() or realloc() on an invalid
(attacker controlled) pointer value when all the following
conditions are true:
- PB_ENABLE_MALLOC is defined at the compile time
- Message definition contains an oneof field, and the oneof
contains at least one pointer type field and at least one
non-pointer type field.
- Data being decoded first contains a non-pointer value for
the oneof field, and later contains an overwriting pointer
value.
Depending on message layout, the bug may not be exploitable in all
cases, but it is known to be exploitable at least with string and
bytes fields. Actual security impact will also depend on the heap
implementation used.
|
|
|
|
53f48813a3 am: 31f6168234 am: 75930fdbca
Original change: https://android-review.googlesource.com/c/platform/external/nanopb-c/+/1588798
MUST ONLY BE SUBMITTED BY AUTOMERGER
Change-Id: Ic7810e3a0fc949a1111b69ffa564b6f2ea3d4520
|
|
53f48813a3 am: 31f6168234 am: 75930fdbca
Original change: https://android-review.googlesource.com/c/platform/external/nanopb-c/+/1588798
MUST ONLY BE SUBMITTED BY AUTOMERGER
Change-Id: I5a343113a43d5a82a881350a715a84eb5247c4b0
|
|
53f48813a3 am: 31f6168234
Original change: https://android-review.googlesource.com/c/platform/external/nanopb-c/+/1588798
MUST ONLY BE SUBMITTED BY AUTOMERGER
Change-Id: I969c2a119fde81fc67b58da48de2841e9cbd3e4e
|
|
Original change: https://android-review.googlesource.com/c/platform/external/nanopb-c/+/1588798
MUST ONLY BE SUBMITTED BY AUTOMERGER
Change-Id: Idef8c3407a99e833bf582c6ce041d4c7cdb948e0
|
|
Original change: https://android-review.googlesource.com/c/platform/external/nanopb-c/+/1588798
MUST ONLY BE SUBMITTED BY AUTOMERGER
Change-Id: Ic36113ce08baec380898d18885d3600a1938a7a7
|
|
Added SPDX-license-identifier-BSD SPDX-license-identifier-MIT to:
generator/Android.bp
Added SPDX-license-identifier-BSD SPDX-license-identifier-MIT
SPDX-license-identifier-Zlib legacy_unencumbered
to:
Android.bp
Bug: 68860345
Bug: 151177513
Bug: 151953481
Test: m all
Exempt-From-Owner-Approval: janitorial work
Change-Id: I5b0ab1087df58c93fa55e5cd735446c4e8583ffc
|
|
The 0.3 branch was not affected by this bug, but expanding the test case to cover it.
|
|
|
|
The 0.4 branch contains commit 2519119babea ("Verify stream size before
allocating string / bytes."):
This stops ridicuously large mallocs from getting through
on length-limited streams or buffers. Typically you should
also override realloc() to limit allocation size yourself
if dealing with untrusted data in pointer mode, but this
at least limits the potential denial-of-service attacks.
Backport this patch in 0.3 maintenance branch in order to make fuzzing
not crash as soon as the decoder tries to allocate a large buffer.
|
|
|
|
|
|
|
|
Fixed also a few smaller issues where generator didn't consider
fields inside oneof for field name mangling.
|
|
There is a small typo in pb_encode.h, spm_headers/nanopb/pb_encode.h.
Should read `specifying` rather than `specifing`.
|
|
|
|
Nanopb would leak memory when all of the following conditions were true:
- PB_ENABLE_MALLOC is defined at the compile time
- Message definitions contains an oneof field,
the oneof contains a static submessage, and
the static submessage contains a pointer field.
- Data being decoded contains two values for the submessage.
The logic in pb_release_union_field would detect that the same
submessage occurs twice, and wouldn't release it because keeping
the old values is necessary to match the C++ library behavior
regarding message merges.
But then decode_static_field() would go to memset() the whole
submessage to zero, because it unconditionally assumed it to
be uninitialized memory. This would normally happen when the
contents of the union field is switched to a different oneof
item, instead of merging with the same one.
This commit changes it so that the field is memset() only when
`which_field` contains a different tag.
|
|
This also covers the fairly rarely used behavior of protobuf C++
library regarding oneof merges: if an oneof submessage occurs
multiple times in a message, their contents are merged together.
This behavior was also previously broken in nanopb.
|
|
|
|
This update allows clients to share common syntax for nanopb imports/includes between CocoaPods and Swift Package Manager.
See example at firebase/firebase-ios-sdk#6165
|
|
|
|
Add build rules for Swift package manager
|
|
|
|
On platforms where size_t equals pb_size_t, for example AVR where both
are 16-bit, or x86 and ARM when PB_FIELD_32BIT is defined, the buffer size
checks in pb_write() and pb_enc_submessage can overflow if a bytes field
has size close to maximum size value. This causes read and write out of bounds.
This issue can cause a security vulnerability if the size of a bytes field
in the structure given to pb_encode() is untrusted. Note that pb_decode()
has correct bounds checking and will reject too large values.
|
|
74741d77d4 am: 05a8588518 am: 1c7089bdbd am: 08db7e3d44
Change-Id: Icf9e6e9209ed66815e3c5342801edf4d033dae17
|