MGASA-2021-0069

Source
https://advisories.mageia.org/MGASA-2021-0069.html
Import Source
https://advisories.mageia.org/MGASA-2021-0069.json
JSON Data
https://api.osv.dev/v1/vulns/MGASA-2021-0069
Related
Published
2021-02-05T11:54:53Z
Modified
2021-02-05T11:14:13Z
Summary
Updated nodejs packages fix security vulnerabilities
Details

Node.js versions before 10.23.1, 12.20.1, 14.15.4, 15.5.1 are vulnerable to a use-after-free bug in its TLS implementation. When writing to a TLS enabled socket, node::StreamBase::Write calls node::TLSWrap::DoWrite with a freshly allocated WriteWrap object as first argument. If the DoWrite method does not return an error, this object is passed back to the caller as part of a StreamWriteResult structure. This may be exploited to corrupt memory leading to a Denial of Service or potentially other exploits. (CVE-2020-8265).

Node.js versions before 10.23.1, 12.20.1, 14.15.4, 15.5.1 allow two copies of a header field in an HTTP request (for example, two Transfer-Encoding header fields). In this case, Node.js identifies the first header field and ignores the second. This can lead to HTTP Request Smuggling. (CVE-2020-8287).

References
Credits

Affected packages

Mageia:7 / nodejs

Package

Name
nodejs
Purl
pkg:rpm/mageia/nodejs?distro=mageia-7

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
10.23.1-10.mga7

Ecosystem specific

{
    "section": "core"
}