Ecosyste.ms: Advisories
An open API service providing security vulnerability metadata for many open source software ecosystems.
Security Advisories: MDE2OlNlY3VyaXR5QWR2aXNvcnlHSFNBLXBwN2gtNTNneC1teDdy
Remote Memory Exposure in bl
A buffer over-read vulnerability exists in bl <4.0.3, <3.0.1, <2.2.1, and <1.2.3 which could allow an attacker to supply user input (even typed) that if it ends up in consume() argument and can become negative, the BufferList state can be corrupted, tricking it into exposing uninitialized memory via regular .slice() calls.
Permalink: https://github.com/advisories/GHSA-pp7h-53gx-mx7rJSON: https://advisories.ecosyste.ms/api/v1/advisories/MDE2OlNlY3VyaXR5QWR2aXNvcnlHSFNBLXBwN2gtNTNneC1teDdy
Source: GitHub Advisory Database
Origin: Unspecified
Severity: Moderate
Classification: General
Published: over 3 years ago
Updated: over 1 year ago
CVSS Score: 6.5
CVSS vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L
Identifiers: GHSA-pp7h-53gx-mx7r, CVE-2020-8244
References:
- https://nvd.nist.gov/vuln/detail/CVE-2020-8244
- https://github.com/rvagg/bl/commit/8a8c13c880e2bef519133ea43e0e9b78b5d0c91e
- https://github.com/rvagg/bl/commit/d3e240e3b8ba4048d3c76ef5fb9dd1f8872d3190
- https://github.com/rvagg/bl/commit/dacc4ac7d5fcd6201bcf26fbd886951be9537466
- https://hackerone.com/reports/966347
- https://lists.debian.org/debian-lts-announce/2021/06/msg00028.html
- https://github.com/advisories/GHSA-pp7h-53gx-mx7r
Blast Radius: 37.1
Affected Packages
npm:bl
Dependent packages: 1,595Dependent repositories: 506,109
Downloads: 129,285,648 last month
Affected Version Ranges: >= 2.0.0, < 2.2.1, < 1.2.3, >= 4.0.0, < 4.0.3, = 3.0.0
Fixed in: 2.2.1, 1.2.3, 4.0.3, 3.0.1
All affected versions: 0.0.0, 0.1.0, 0.1.1, 0.2.0, 0.3.0, 0.4.0, 0.4.1, 0.4.2, 0.5.0, 0.6.0, 0.7.0, 0.8.0, 0.8.1, 0.8.2, 0.9.0, 0.9.1, 0.9.2, 0.9.3, 0.9.4, 0.9.5, 1.0.0, 1.0.1, 1.0.2, 1.0.3, 1.1.1, 1.1.2, 1.2.0, 1.2.1, 1.2.2, 2.0.0, 2.0.1, 2.1.0, 2.1.1, 2.1.2, 2.2.0, 3.0.0, 4.0.0, 4.0.1, 4.0.2
All unaffected versions: 1.2.3, 2.2.1, 3.0.1, 4.0.3, 4.0.4, 4.1.0, 5.0.0, 5.1.0, 6.0.0, 6.0.1, 6.0.2, 6.0.3, 6.0.4, 6.0.5, 6.0.6, 6.0.7, 6.0.8, 6.0.9, 6.0.10, 6.0.11, 6.0.12