Information Exposure Affecting rhoar-nodejs-docs package, versions <1:10.9.0-1.el7


Severity

Recommended
0.0
medium
0
10

Based on Red Hat Enterprise Linux security rating.

Threat Intelligence

EPSS
0.15% (53rd percentile)

Do your applications use this vulnerable package?

In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.

Test your applications
  • Snyk IDSNYK-RHEL7-RHOARNODEJSDOCS-5365927
  • published1 Nov 2021
  • disclosed11 Aug 2018

Introduced: 11 Aug 2018

CVE-2018-7166  (opens in a new tab)
CWE-200  (opens in a new tab)

How to fix?

Upgrade RHEL:7 rhoar-nodejs-docs to version 1:10.9.0-1.el7 or higher.
This issue was patched in RHSA-2018:2553.

NVD Description

Note: Versions mentioned in the description apply only to the upstream rhoar-nodejs-docs package and not the rhoar-nodejs-docs package as distributed by RHEL. See How to fix? for RHEL:7 relevant fixed versions and status.

In all versions of Node.js 10 prior to 10.9.0, an argument processing flaw can cause Buffer.alloc() to return uninitialized memory. This method is intended to be safe and only return initialized, or cleared, memory. The third argument specifying encoding can be passed as a number, this is misinterpreted by Buffer&#39;s internal "fill" method as the start to a fill operation. This flaw may be abused where Buffer.alloc() arguments are derived from user input to return uncleared memory blocks that may contain sensitive information.

CVSS Base Scores

version 3.1