Skip to content

Plan to port the fixes to the openssl versions (CVE-2024-6119) in use for nodejs. #192

Closed
@qinpeilin

Description

@qinpeilin

Hello,

In recent BDBA scan, there is one CVE:

https://nvd.nist.gov/vuln/detail/CVE-2024-6119

detected in node.js.
Issue summary: Applications performing certificate name checks (e.g., TLS clients checking server certificates) may attempt to read an invalid memory address resulting in abnormal termination of the application process.

Impact summary: Abnormal termination of an application can a cause a denial of service.

Applications performing certificate name checks (e.g., TLS clients checking server certificates) may attempt to read an invalid memory address when comparing the expected name with an otherName subject alternative name of an X.509 certificate. This may result in an exception that terminates the application program.

Note that basic certificate chain validation (signatures, dates, ...) is not affected, the denial of service can occur only when the application also specifies an expected DNS name, Email address or IP address.

TLS servers rarely solicit client certificates, and even when they do, they generally don't perform a name check against a reference identifier (expected identity), but rather extract the presented identity after checking the certificate chain. So TLS servers are generally not affected and the severity of the issue is Moderate.

In the latest version of nodejs of 22.9.0, the fixed is still not included, Here we would like to know if there are plans to port this fixes to the openssl versions in use for nodejs. thanks a lot.

Best regards,
Peilin

Metadata

Metadata

Assignees

No one assigned

    Labels

    No labels
    No labels

    Type

    No type

    Projects

    No projects

    Milestone

    No milestone

    Relationships

    None yet

    Development

    No branches or pull requests

    Issue actions