The implementation of realpath in libuv < 10.22.1, < 12.18.4, and < 14.9.0 used within Node.js incorrectly determined the buffer size which can result in a buffer overflow if the resolved path is longer than 256 bytes.
References
Link | Resource |
---|---|
http://lists.opensuse.org/opensuse-security-announce/2020-10/msg00011.html | Third Party Advisory |
http://lists.opensuse.org/opensuse-security-announce/2020-10/msg00023.html | Mailing List Third Party Advisory |
https://hackerone.com/reports/965914 | Permissions Required Third Party Advisory |
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/4OOYAMJVLLCLXDTHW3V5UXNULZBBK4O6/ | |
https://nodejs.org/en/blog/vulnerability/september-2020-security-releases/ | Vendor Advisory |
https://security.gentoo.org/glsa/202009-15 | Third Party Advisory |
https://security.netapp.com/advisory/ntap-20201009-0004/ | Third Party Advisory |
https://usn.ubuntu.com/4548-1/ | Third Party Advisory |
Configurations
History
24 May 2022, 17:16
Type | Values Removed | Values Added |
---|---|---|
References | (FEDORA) https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4OOYAMJVLLCLXDTHW3V5UXNULZBBK4O6/ - Mailing List, Third Party Advisory | |
References | (SUSE) http://lists.opensuse.org/opensuse-security-announce/2020-10/msg00023.html - Mailing List, Third Party Advisory | |
References | (CONFIRM) https://security.netapp.com/advisory/ntap-20201009-0004/ - Third Party Advisory | |
CPE | cpe:2.3:o:fedoraproject:fedora:33:*:*:*:*:*:*:* |
Information
Published : 2020-09-18 21:15
Updated : 2024-02-04 21:23
NVD link : CVE-2020-8252
Mitre link : CVE-2020-8252
CVE.ORG link : CVE-2020-8252
JSON object : View
Products Affected
nodejs
- node.js
fedoraproject
- fedora
opensuse
- leap
CWE
CWE-120
Buffer Copy without Checking Size of Input ('Classic Buffer Overflow')