Gentoo Websites Logo
Go to: Gentoo Home Documentation Forums Lists Bugs Planet Store Wiki Get Gentoo!
Bug 737286 (CVE-2020-24346, CVE-2020-24347, CVE-2020-24348, CVE-2020-24349) - <www-servers/nginx-{1.18.0-r2, 1.19.2-r1}: Multiple vulnerabilities (CVE-2020-{24346,24347,24348,24349})
Summary: <www-servers/nginx-{1.18.0-r2, 1.19.2-r1}: Multiple vulnerabilities (CVE-2020...
Status: RESOLVED FIXED
Alias: CVE-2020-24346, CVE-2020-24347, CVE-2020-24348, CVE-2020-24349
Product: Gentoo Security
Classification: Unclassified
Component: Vulnerabilities (show other bugs)
Hardware: All Linux
: Normal trivial (vote)
Assignee: Gentoo Security
URL:
Whiteboard: B3 [noglsa cve]
Keywords:
Depends on:
Blocks:
 
Reported: 2020-08-16 05:33 UTC by Sam James
Modified: 2020-09-13 22:15 UTC (History)
1 user (show)

See Also:
Package list:
Runtime testing required: ---


Attachments

Note You need to log in before you can comment on or make changes to this bug.
Description Sam James archtester Gentoo Infrastructure gentoo-dev Security 2020-08-16 05:33:44 UTC
* CVE-2020-24346

Description:
"njs through 0.4.3, used in NGINX, has a use-after-free in njs_json_parse_iterator_call in njs_json.c."

Bug: https://github.com/nginx/njs/issues/325

* CVE-2020-24347

Description:
"njs through 0.4.3, used in NGINX, has an out-of-bounds read in njs_lvlhsh_level_find in njs_lvlhsh.c."

Bug: https://github.com/nginx/njs/issues/323

* CVE-2020-24348

Description:
"njs through 0.4.3, used in NGINX, has an out-of-bounds read in njs_json_stringify_iterator in njs_json.c."

Bug: https://github.com/nginx/njs/issues/322

* CVE-2020-24349

Description:
"njs through 0.4.3, used in NGINX, allows control-flow hijack in njs_value_property in njs_value.c. NOTE: the vendor considers the issue to be "fluff" in the NGINX use case because there is no remote attack surface."

Bug: https://github.com/nginx/njs/issues/324
Comment 1 Sam James archtester Gentoo Infrastructure gentoo-dev Security 2020-08-16 05:35:50 UTC
All bugs were marked as "fluff" by upstream, and on one bug:
"Regarding remote exploitability: nginx-njs threat model considers njs code as a part of nginx configuration (which includes among other things certificates and keys). So, njs code is expected to be not controllable by a remote user."

but I'll let Whissi vote on this given it's his package.
Comment 2 Thomas Deutschmann (RETIRED) gentoo-dev 2020-09-13 22:15:25 UTC
Upstream considers reported issues as normal bugs because in NJS there is no way to dynamically execute any code -- all JS code is statically compiled at nginx start (https://github.com/nginx/njs/issues/324#issuecomment-688677832).

All done, repository is clean.