libuv before 0.10.34 does not properly drop group privileges, which allows context-dependent attackers to gain privileges via unspecified vectors.
References
Link | Resource |
---|---|
https://lists.fedoraproject.org/pipermail/package-announce/2015-February/150526.html | Third Party Advisory |
https://github.com/libuv/libuv/commit/66ab38918c911bcff025562cf06237d7fedaba0c | Patch Third Party Advisory |
http://advisories.mageia.org/MGASA-2015-0186.html | Third Party Advisory |
http://www.mandriva.com/security/advisories?name=MDVSA-2015:228 | Third Party Advisory |
https://github.com/libuv/libuv/pull/215 | Third Party Advisory |
https://security.gentoo.org/glsa/201611-10 | Third Party Advisory |
https://groups.google.com/forum/#%21msg/libuv/0JZxwLMtsMI/jraczskYWWQJ |
Information
Published : 2015-05-18 08:59
Updated : 2023-02-12 15:15
NVD link : CVE-2015-0278
Mitre link : CVE-2015-0278
JSON object : View
CWE
CWE-273
Improper Check for Dropped Privileges
Products Affected
nodejs
- node.js
libuv_project
- libuv
fedoraproject
- fedora