Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

redhat логотип

CVE-2020-8252

Опубликовано: 15 сент. 2020
Источник: redhat
CVSS3: 7.8

Описание

The implementation of realpath in libuv < 10.22.1, < 12.18.4, and < 14.9.0 used within Node.js incorrectly determined the buffer size which can result in a buffer overflow if the resolved path is longer than 256 bytes.

A flaw has been found in libuv. The realpath() implementation performs an incorrect calculation when allocating a buffer, leading to a potential buffer overflow. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.

Отчет

As shipped in Red Hat Software Collections (nodejs-10 & nodejs-12) as well as Red Hat Enterprise Linux 8 (nodejs-10 and nodejs-12), no incorrect use of the UV__PATH_MAX macro were found. Although the releases of libuv contained in these versions of nodejs are considered "Affected", it is considered not feasible to trigger the flaw. NodeJS is included in Red Hat Quay as a dependency of Yarn which is only used while building Red Hat Quay, and not during runtime. Red Hat Enterprise Linux 8 ships libuv-1.23.1, which is not vulnerable to this flaw.

Затронутые пакеты

ПлатформаПакетСостояниеРекомендацияРелиз
Red Hat Enterprise Linux 8libuvNot affected
Red Hat Enterprise Linux 8nodejs:14/nodejsNot affected
Red Hat OpenStack Platform 13 (Queens) Operational ToolslibuvNot affected
Red Hat Quay 3quayFix deferred
Red Hat Enterprise Linux 8nodejsFixedRHSA-2020:427219.10.2020
Red Hat Enterprise Linux 8nodejsFixedRHSA-2021:054816.02.2021
Red Hat Enterprise Linux 8.1 Extended Update SupportnodejsFixedRHSA-2020:490304.11.2020
Red Hat Software Collections for Red Hat Enterprise Linux 7rh-nodejs12-nodejsFixedRHSA-2020:508612.11.2020
Red Hat Software Collections for Red Hat Enterprise Linux 7rh-nodejs10-nodejsFixedRHSA-2021:052115.02.2021
Red Hat Software Collections for Red Hat Enterprise Linux 7.6 EUSrh-nodejs12-nodejsFixedRHSA-2020:508612.11.2020

Показывать по

Дополнительная информация

Статус:

Important
Дефект:
CWE-131->CWE-122
https://bugzilla.redhat.com/show_bug.cgi?id=1879315libuv: buffer overflow in realpath

7.8 High

CVSS3

Связанные уязвимости

CVSS3: 7.8
ubuntu
почти 5 лет назад

The implementation of realpath in libuv < 10.22.1, < 12.18.4, and < 14.9.0 used within Node.js incorrectly determined the buffer size which can result in a buffer overflow if the resolved path is longer than 256 bytes.

CVSS3: 7.8
nvd
почти 5 лет назад

The implementation of realpath in libuv < 10.22.1, < 12.18.4, and < 14.9.0 used within Node.js incorrectly determined the buffer size which can result in a buffer overflow if the resolved path is longer than 256 bytes.

CVSS3: 7.8
debian
почти 5 лет назад

The implementation of realpath in libuv < 10.22.1, < 12.18.4, and < 14 ...

CVSS3: 7.8
github
около 3 лет назад

The implementation of realpath in libuv < 10.22.1, < 12.18.4, and < 14.9.0 used within Node.js incorrectly determined the buffer size which can result in a buffer overflow if the resolved path is longer than 256 bytes.

suse-cvrf
больше 4 лет назад

Security update for nodejs10

7.8 High

CVSS3