Bug 1221810 (CVE-2024-27935) - VUL-0: CVE-2024-27935: deno: cross-session data contamination during simultaneous asynchronous reads
Summary: VUL-0: CVE-2024-27935: deno: cross-session data contamination during simultan...
Status: RESOLVED FIXED
Alias: CVE-2024-27935
Product: openSUSE Distribution
Classification: openSUSE
Component: Security (show other bugs)
Version: Leap 15.6
Hardware: Other Other
: P5 - None : Normal (vote)
Target Milestone: ---
Assignee: Adam Majer
QA Contact: Security Team bot
URL: https://smash.suse.de/issue/398501/
Whiteboard:
Keywords:
Depends on:
Blocks:
 
Reported: 2024-03-21 11:17 UTC by SMASH SMASH
Modified: 2024-03-21 11:22 UTC (History)
1 user (show)

See Also:
Found By: Security Response Team
Services Priority:
Business Priority:
Blocker: ---
Marketing QA Status: ---
IT Deployment: ---


Attachments

Note You need to log in before you can comment on or make changes to this bug.
Description SMASH SMASH 2024-03-21 11:17:23 UTC
Deno is a JavaScript, TypeScript, and WebAssembly runtime. Starting in version 1.35.1 and prior to version 1.36.3, a vulnerability in Deno's Node.js compatibility runtime allows for cross-session data contamination during simultaneous asynchronous reads from Node.js streams sourced from sockets or files. The issue arises from the re-use of a global buffer (BUF) in stream_wrap.ts used as a performance optimization to limit allocations during these asynchronous read operations. This can lead to data intended for one session being received by another session, potentially resulting in data corruption and unexpected behavior. This affects all users of Deno that use the node.js compatibility layer for network communication or other streams, including packages that may require node.js libraries indirectly. Version 1.36.3 contains a patch for this issue.

References:
http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2024-27935
https://www.cve.org/CVERecord?id=CVE-2024-27935
https://github.com/denoland/deno/issues/20188
https://github.com/denoland/deno/security/advisories/GHSA-wrqv-pf6j-mqjp

Patch:
https://github.com/denoland/deno/commit/3e9fb8aafd9834ebacd27734cea4310caaf794c6
Comment 1 Andrea Mattiazzo 2024-03-21 11:22:24 UTC
Closing since already fixed.