Buffer Overflow Affecting nodejs-full-i18n package, versions <1:10.23.1-1.module+el8.3.0+9642+87902f83
Threat Intelligence
Do your applications use this vulnerable package?
In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.
Test your applications- Snyk ID SNYK-ORACLE8-NODEJSFULLI18N-2564803
- published 10 Apr 2022
- disclosed 18 Sep 2020
Introduced: 18 Sep 2020
CVE-2020-8252 Open this link in a new tabHow to fix?
Upgrade Oracle:8
nodejs-full-i18n
to version 1:10.23.1-1.module+el8.3.0+9642+87902f83 or higher.
This issue was patched in ELSA-2021-0548
.
NVD Description
Note: Versions mentioned in the description apply only to the upstream nodejs-full-i18n
package and not the nodejs-full-i18n
package as distributed by Oracle
.
See How to fix?
for Oracle:8
relevant fixed versions and status.
The implementation of realpath in libuv < 10.22.1, < 12.18.4, and < 14.9.0 used within Node.js incorrectly determined the buffer size which can result in a buffer overflow if the resolved path is longer than 256 bytes.
References
- https://linux.oracle.com/cve/CVE-2020-8252.html
- https://linux.oracle.com/errata/ELSA-2020-4272.html
- https://linux.oracle.com/errata/ELSA-2021-0548.html
- http://lists.opensuse.org/opensuse-security-announce/2020-10/msg00011.html
- http://lists.opensuse.org/opensuse-security-announce/2020-10/msg00023.html
- https://hackerone.com/reports/965914
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4OOYAMJVLLCLXDTHW3V5UXNULZBBK4O6/
- https://nodejs.org/en/blog/vulnerability/september-2020-security-releases/
- https://security.gentoo.org/glsa/202009-15
- https://security.netapp.com/advisory/ntap-20201009-0004/
- https://usn.ubuntu.com/4548-1/
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/4OOYAMJVLLCLXDTHW3V5UXNULZBBK4O6/