The implementation of realpath in libuv < 10.22.1, < 12.18.4, and < 14.9.0 used within Node.js incorrectly determined the buffer size which can result in a buffer overflow if the resolved path is longer than 256 bytes.
References
Link | Resource |
---|---|
https://hackerone.com/reports/965914 | Permissions Required Third Party Advisory |
https://nodejs.org/en/blog/vulnerability/september-2020-security-releases/ | Vendor Advisory |
https://security.gentoo.org/glsa/202009-15 | Third Party Advisory |
https://usn.ubuntu.com/4548-1/ | Third Party Advisory |
http://lists.opensuse.org/opensuse-security-announce/2020-10/msg00011.html | Third Party Advisory |
https://security.netapp.com/advisory/ntap-20201009-0004/ | Third Party Advisory |
http://lists.opensuse.org/opensuse-security-announce/2020-10/msg00023.html | Mailing List Third Party Advisory |
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4OOYAMJVLLCLXDTHW3V5UXNULZBBK4O6/ | Mailing List Third Party Advisory |
Configurations
Information
Published : 2020-09-18 14:15
Updated : 2022-05-24 10:16
NVD link : CVE-2020-8252
Mitre link : CVE-2020-8252
JSON object : View
CWE
CWE-120
Buffer Copy without Checking Size of Input ('Classic Buffer Overflow')
Products Affected
nodejs
- node.js
fedoraproject
- fedora
opensuse
- leap