Описание
The implementation of realpath in libuv < 10.22.1, < 12.18.4, and < 14.9.0 used within Node.js incorrectly determined the buffer size which can result in a buffer overflow if the resolved path is longer than 256 bytes.
Релиз | Статус | Примечание |
---|---|---|
bionic | not-affected | 1.18.0-3 |
devel | released | 1.38.0-2ubuntu2 |
esm-apps/xenial | not-affected | 1.8.0-1 |
esm-infra-legacy/trusty | DNE | |
esm-infra/bionic | not-affected | 1.18.0-3 |
esm-infra/focal | not-affected | 1.34.2-1ubuntu1.1 |
focal | released | 1.34.2-1ubuntu1.1 |
precise/esm | DNE | |
trusty | ignored | end of standard support |
trusty/esm | DNE |
Показывать по
Ссылки на источники
4.6 Medium
CVSS2
7.8 High
CVSS3
Связанные уязвимости
The implementation of realpath in libuv < 10.22.1, < 12.18.4, and < 14.9.0 used within Node.js incorrectly determined the buffer size which can result in a buffer overflow if the resolved path is longer than 256 bytes.
The implementation of realpath in libuv < 10.22.1, < 12.18.4, and < 14.9.0 used within Node.js incorrectly determined the buffer size which can result in a buffer overflow if the resolved path is longer than 256 bytes.
The implementation of realpath in libuv < 10.22.1, < 12.18.4, and < 14 ...
The implementation of realpath in libuv < 10.22.1, < 12.18.4, and < 14.9.0 used within Node.js incorrectly determined the buffer size which can result in a buffer overflow if the resolved path is longer than 256 bytes.
4.6 Medium
CVSS2
7.8 High
CVSS3