BIT-node-2022-35255

See a problem?
Import Source
https://github.com/bitnami/vulndb/tree/main/data/node/BIT-node-2022-35255.json
JSON Data
https://api.osv.dev/v1/vulns/BIT-node-2022-35255
Aliases
Published
2024-03-06T11:03:16.007Z
Modified
2024-03-06T11:25:28.861Z
Summary
[none]
Details

A weak randomness in WebCrypto keygen vulnerability exists in Node.js 18 due to a change with EntropySource() in SecretKeyGenTraits::DoKeyGen() in src/crypto/crypto_keygen.cc. There are two problems with this: 1) It does not check the return value, it assumes EntropySource() always succeeds, but it can (and sometimes will) fail. 2) The random data returned byEntropySource() may not be cryptographically strong and therefore not suitable as keying material.

Database specific
{
    "cpes": [
        "cpe:2.3:a:nodejs:node.js:*:*:*:*:-:*:*:*",
        "cpe:2.3:a:nodejs:node.js:*:*:*:*:lts:*:*:*"
    ],
    "severity": "Critical"
}
References

Affected packages

Bitnami / node

Package

Name
node
Purl
pkg:bitnami/node

Severity

  • 9.1 (Critical) CVSS_V3 - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N CVSS Calculator

Affected ranges

Type
SEMVER
Events
Introduced
15.0.0
Fixed
15.14.0
Introduced
16.0.0
Fixed
16.12.0
Introduced
16.13.0
Fixed
16.17.1
Introduced
18.0.0
Fixed
18.9.1