nodejs / nodejs-dependency-vuln-assessments

MIT License
14 stars 5 forks source link

Plan to port the fixes to the openssl versions (CVE-2024-6119) in use for nodejs. #192

Open qinpeilin opened 2 weeks ago

qinpeilin commented 2 weeks ago

Hello,

In recent BDBA scan, there is one CVE:

https://nvd.nist.gov/vuln/detail/CVE-2024-6119

detected in node.js. Issue summary: Applications performing certificate name checks (e.g., TLS clients checking server certificates) may attempt to read an invalid memory address resulting in abnormal termination of the application process.

Impact summary: Abnormal termination of an application can a cause a denial of service.

Applications performing certificate name checks (e.g., TLS clients checking server certificates) may attempt to read an invalid memory address when comparing the expected name with an otherName subject alternative name of an X.509 certificate. This may result in an exception that terminates the application program.

Note that basic certificate chain validation (signatures, dates, ...) is not affected, the denial of service can occur only when the application also specifies an expected DNS name, Email address or IP address.

TLS servers rarely solicit client certificates, and even when they do, they generally don't perform a name check against a reference identifier (expected identity), but rather extract the presented identity after checking the certificate chain. So TLS servers are generally not affected and the severity of the issue is Moderate.

In the latest version of nodejs of 22.9.0, the fixed is still not included, Here we would like to know if there are plans to port this fixes to the openssl versions in use for nodejs. thanks a lot.

Best regards, Peilin

qinpeilin commented 2 weeks ago

our environment it is based on domain service and DNS is the same for all components, and for the component which use nodejs, it is server not client application.

Solution - Fix available Fixed in openssl version:

3.0.15 by this commit, 3.1.7 by this commit, 3.2.3 by this commit, 3.3.2 by this commit.

RafaelGSS commented 2 weeks ago

Node.js uses a fork of OpenSSL https://github.com/quictls/openssl for its usage on QUIC protocol. This library hasn't officially released a 3.0.15 version yet.

RafaelGSS commented 2 days ago

https://github.com/nodejs/node/pull/55184

Will be fixed in the next Node.js release.