Bug 1964072 (CVE-2021-23386)

Summary: CVE-2021-23386 dns-packet: does not always fill buffers before forming network packets which couls result in Remote Memory Exposure
Product: [Other] Security Response Reporter: Michael Kaplan <mkaplan>
Component: vulnerabilityAssignee: Red Hat Product Security <security-response-team>
Status: CLOSED WONTFIX QA Contact:
Severity: medium Docs Contact:
Priority: medium    
Version: unspecifiedCC: aileenc, anpicker, aos-bugs, bmontgom, chazlett, drieden, eparis, erooth, ggaughan, gghezzo, gmalinko, gparvin, janstey, jburrell, jochrist, jokerman, jramanat, jweiser, jwendell, jwon, kaycoth, nstielau, rcernich, spasquie, sponnaga, stcannon, thee, twalsh, vmugicag
Target Milestone: ---Keywords: Security
Target Release: ---   
Hardware: All   
OS: Linux   
Whiteboard:
Fixed In Version: dns-packet 5.2.2 Doc Type: If docs needed, set a value
Doc Text:
Remote memory exposure vulnerability was found in nodejs dns-packet library. The buffers (created with `allocUnsafe`) are not always filled before forming the network packets and an attacker can use this vulnerability to potentially get access to internal application memory over non encrypted networks when querying crafted invalid domain names.
Story Points: ---
Clone Of: Environment:
Last Closed: 2021-10-28 08:54:10 UTC Type: ---
Regression: --- Mount Type: ---
Documentation: --- CRM:
Verified Versions: Category: ---
oVirt Team: --- RHEL 7.3 requirements from Atomic Host:
Cloudforms Team: --- Target Upstream Version:
Embargoed:
Bug Depends On: 1964155, 1964156, 1966181, 1966182, 1966183, 1966184, 1966185, 1966186, 1966187, 1966188, 1966189, 1966190    
Bug Blocks: 1964076    

Description Michael Kaplan 2021-05-24 16:31:28 UTC
This affects the package dns-packet before 5.2.2. It creates buffers with allocUnsafe and does not always fill them before forming network packets. This can expose internal application memory over unencrypted network when querying crafted invalid domain names.