First published: Tue Sep 15 2020(Updated: )
Node.js is vulnerable to a buffer overflow, caused by improper bounds checking by the libuv's fs.realpath.native. By sending an overly long argument, a remote attacker could overflow a buffer and execute arbitrary code on the system or cause a denial of service.
Credit: support@hackerone.com support@hackerone.com
Affected Software | Affected Version | How to fix |
---|---|---|
redhat/rh-nodejs12-nodejs | <0:12.18.4-3.el7 | 0:12.18.4-3.el7 |
redhat/rh-nodejs10-nodejs | <0:10.23.1-2.el7 | 0:10.23.1-2.el7 |
redhat/nodejs | <12.18.4 | 12.18.4 |
redhat/nodejs | <10.22.1 | 10.22.1 |
redhat/libuv | <1.39.0 | 1.39.0 |
ubuntu/libuv1 | <1.34.2-1ubuntu1.1 | 1.34.2-1ubuntu1.1 |
ubuntu/libuv1 | <1.39.0-1 | 1.39.0-1 |
debian/libuv1 | 1.40.0-2+deb11u1 1.44.2-1+deb12u1 1.48.0-5 | |
Node.js | >=10.0.0<10.22.1 | |
Node.js | >=12.0.0<12.18.4 | |
Node.js | >=14.0.0<14.9.0 | |
openSUSE | =15.2 | |
Fedoraproject Fedora | =33 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
(Appears in the following advisories)
CVE-2020-8252 is a vulnerability in the realpath() implementation in libuv, which can lead to a potential buffer overflow.
The highest threat from CVE-2020-8252 is to data confidentiality and integrity, as well as system availability.
Node.js versions < 10.22.1, < 12.18.4, and < 14.9.0, as well as libuv versions < 1.39.0, are affected by CVE-2020-8252.
To fix CVE-2020-8252, update Node.js to version 10.22.1, 12.18.4, or 14.9.0, and update libuv to version 1.39.0.
You can find more information about CVE-2020-8252 on the Node.js and libuv websites.