Name | CVE-2020-8244 |
Description | A buffer over-read vulnerability exists in bl <4.0.3, <3.0.1, <2.2.1, and <1.2.3 which could allow an attacker to supply user input (even typed) that if it ends up in consume() argument and can become negative, the BufferList state can be corrupted, tricking it into exposing uninitialized memory via regular .slice() calls. |
Source | CVE (at NVD; CERT, LWN, oss-sec, fulldisc, Red Hat, Ubuntu, Gentoo, SUSE bugzilla/CVE, GitHub advisories/code/issues, web search, more) |
References | DLA-2698-1 |
Debian Bugs | 969309 |
The table below lists information on source packages.
Source Package | Release | Version | Status |
---|---|---|---|
node-bl (PTS) | bullseye | 4.0.3-1 | fixed |
sid, trixie, bookworm | 5.1.0-1 | fixed |
The information below is based on the following data on fixed versions.
Package | Type | Release | Fixed Version | Urgency | Origin | Debian Bugs |
---|---|---|---|---|---|---|
node-bl | source | stretch | 1.1.2-1+deb9u1 | DLA-2698-1 | ||
node-bl | source | buster | 1.1.2-1+deb10u1 | |||
node-bl | source | (unstable) | 4.0.3-1 | 969309 |
https://hackerone.com/reports/966347
https://github.com/rvagg/bl/commit/d3e240e3b8ba4048d3c76ef5fb9dd1f8872d3190