Use After Free Affecting neon Open this link in a new tab package, versions <0.10.1


0.0
high
  • Attack Complexity

    Low

  • User Interaction

    Required

  • Confidentiality

    High

  • Integrity

    High

  • Availability

    High

Do your applications use this vulnerable package?

In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.

Test your applications
  • snyk-id

    SNYK-RUST-NEON-2847870

  • published

    25 May 2022

  • disclosed

    22 May 2022

  • credit

    Cassy343

Introduced: 22 May 2022

CWE-416 Open this link in a new tab

How to fix?

Upgrade neon to version 0.10.1 or higher.

Overview

neon is a Rust bindings for writing safe and fast native Node.js modules.

Affected versions of this package are vulnerable to Use After Free as the JsArrayBuffer::external and ``JsBuffer::externalmethods did not requireT: 'static. This allowed the creation of an externally backed buffer from types that may be freed while they are still referenced by a JavaScript ArrayBuffer`.