Buffer Over-read Affecting node package, versions [16.0.0,16.20.1) [18.0.0,18.16.1) [20.0.0,20.3.1)
Snyk CVSS
Threat Intelligence
Do your applications use this vulnerable package?
In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.
Test your applications- Snyk ID SNYK-UPSTREAM-NODE-5741894
- published 28 Jun 2023
- disclosed 20 Apr 2023
- credit Anton Romanov
Introduced: 20 Apr 2023
CVE-2023-1255 Open this link in a new tabHow to fix?
Upgrade node
to version 16.20.1, 18.16.1, 20.3.1 or higher.
Overview
node is a JavaScript runtime built on Chrome's V8 JavaScript engine.
Affected versions of this package are vulnerable to Buffer Over-read on 64-bit ARM systems using AES-XTS cipher decryption. Attackers in control of the size and location of the ciphertext buffer can cause a crash by supplying a buffer of length 4 mod 5 at a location just before unmapped memory.
NOTE: This issue can be patched by applying the fix commits to versions 3.0 and 3.1, but no dedicated fixed release is planned until the next scheduled one.