Use After Free Affecting nodejs-devel package, versions <1:12.20.1-1.module+el8.3.0+9643+8c99e187
Threat Intelligence
Do your applications use this vulnerable package?
In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.
Test your applications- Snyk ID SNYK-ORACLE8-NODEJSDEVEL-2579644
- published 10 Apr 2022
- disclosed 6 Jan 2021
Introduced: 6 Jan 2021
CVE-2020-8265 Open this link in a new tabHow to fix?
Upgrade Oracle:8
nodejs-devel
to version 1:12.20.1-1.module+el8.3.0+9643+8c99e187 or higher.
This issue was patched in ELSA-2021-0549
.
NVD Description
Note: Versions mentioned in the description apply only to the upstream nodejs-devel
package and not the nodejs-devel
package as distributed by Oracle
.
See How to fix?
for Oracle:8
relevant fixed versions and status.
Node.js versions before 10.23.1, 12.20.1, 14.15.4, 15.5.1 are vulnerable to a use-after-free bug in its TLS implementation. When writing to a TLS enabled socket, node::StreamBase::Write calls node::TLSWrap::DoWrite with a freshly allocated WriteWrap object as first argument. If the DoWrite method does not return an error, this object is passed back to the caller as part of a StreamWriteResult structure. This may be exploited to corrupt memory leading to a Denial of Service or potentially other exploits.
References
- https://linux.oracle.com/cve/CVE-2020-8265.html
- https://linux.oracle.com/errata/ELSA-2021-0548.html
- https://linux.oracle.com/errata/ELSA-2021-0549.html
- https://linux.oracle.com/errata/ELSA-2021-0551.html
- https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf
- https://hackerone.com/reports/988103
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/H472D5HPXN6RRXCNFML3BK5OYC52CXF2/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/K4I6MZNC7C7VIDQR267OL4TVCI3ZKAC4/
- https://nodejs.org/en/blog/vulnerability/january-2021-security-releases/
- https://security.gentoo.org/glsa/202101-07
- https://security.netapp.com/advisory/ntap-20210212-0003/
- https://www.debian.org/security/2021/dsa-4826
- https://www.oracle.com/security-alerts/cpujan2021.html
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/H472D5HPXN6RRXCNFML3BK5OYC52CXF2/
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/K4I6MZNC7C7VIDQR267OL4TVCI3ZKAC4/