Calling napi_get_value_string_latin1(), napi_get_value_string_utf8(), or napi_get_value_string_utf16() with a non-NULL buf, and a bufsize of 0 will cause the entire string value to be written to buf, probably overrunning the length of the buffer. Reference: https://nodejs.org/en/blog/vulnerability/june-2020-security-releases/
Created nodejs tracking bugs for this issue: Affects: epel-all [bug 1845263] Affects: fedora-all [bug 1845257] Created nodejs:10/nodejs tracking bugs for this issue: Affects: fedora-all [bug 1845260] Created nodejs:11/nodejs tracking bugs for this issue: Affects: fedora-all [bug 1845258] Created nodejs:12/nodejs tracking bugs for this issue: Affects: fedora-all [bug 1845259] Created nodejs:13/nodejs tracking bugs for this issue: Affects: fedora-all [bug 1845261] Created nodejs:14/nodejs tracking bugs for this issue: Affects: fedora-all [bug 1845262]
Upstream fix: https://github.com/nodejs/node/commit/656260b4b65fec3b10f6da3fdc9f11fb941aafb5
Statement: NodeJS is a build time dependency of Red Hat Quay and is not used at runtime. Therefore this issue will not fixed in Quay 3.3.
What is the ETA for this fix with RHEL 8 and NodeJS 12? We have a release deadline for July and this CVE is needed.
In reply to comment #9: > What is the ETA for this fix with RHEL 8 and NodeJS 12? We have a release > deadline for July and this CVE is needed. This issue is currently treated with a Moderate severity : this flaw is currently theoretical only. It is considered unlikely that the vulnerability can be triggered from Node.JS.
This issue has been addressed in the following products: Red Hat Enterprise Linux 8.1 Extended Update Support Via RHSA-2020:2847 https://access.redhat.com/errata/RHSA-2020:2847
This issue has been addressed in the following products: Red Hat Enterprise Linux 8.1 Extended Update Support Via RHSA-2020:2849 https://access.redhat.com/errata/RHSA-2020:2849
This issue has been addressed in the following products: Red Hat Enterprise Linux 8 Via RHSA-2020:2848 https://access.redhat.com/errata/RHSA-2020:2848
This issue has been addressed in the following products: Red Hat Enterprise Linux 8 Via RHSA-2020:2852 https://access.redhat.com/errata/RHSA-2020:2852
This bug is now closed. Further updates for individual products will be reflected on the CVE page(s): https://access.redhat.com/security/cve/cve-2020-8174
External References: https://hackerone.com/reports/784186
This issue has been addressed in the following products: Red Hat Software Collections for Red Hat Enterprise Linux 7 Red Hat Software Collections for Red Hat Enterprise Linux 7.6 EUS Red Hat Software Collections for Red Hat Enterprise Linux 7.7 EUS Via RHSA-2020:2895 https://access.redhat.com/errata/RHSA-2020:2895
This issue has been addressed in the following products: Red Hat Enterprise Linux 8.0 Update Services for SAP Solutions Via RHSA-2020:3042 https://access.redhat.com/errata/RHSA-2020:3042
This issue has been addressed in the following products: Red Hat Software Collections for Red Hat Enterprise Linux 7 Red Hat Software Collections for Red Hat Enterprise Linux 7.6 EUS Red Hat Software Collections for Red Hat Enterprise Linux 7.7 EUS Via RHSA-2020:3084 https://access.redhat.com/errata/RHSA-2020:3084