7.3 High
CVSS3
Attack Vector
LOCAL
Attack Complexity
LOW
Privileges Required
HIGH
User Interaction
NONE
Scope
CHANGED
Confidentiality Impact
LOW
Integrity Impact
HIGH
Availability Impact
LOW
CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:C/C:L/I:H/A:L
7.3 High
AI Score
Confidence
High
0.0004 Low
EPSS
Percentile
15.6%
setuid() does not affect libuv’s internal io_uring operations if initialized before the call to setuid(). This allows the process to perform privileged operations despite presumably having dropped such privileges through a call to setuid(). This vulnerability affects all users using version greater or equal than Node.js 18.18.0, Node.js 20.4.0 and Node.js 21.
OS | Version | Architecture | Package | Version | Filename |
---|---|---|---|---|---|
Debian | 12 | all | nodejs | < 18.13.0+dfsg1-1 | nodejs_18.13.0+dfsg1-1_all.deb |
Debian | 11 | all | nodejs | < 12.22.12~dfsg-1~deb11u4 | nodejs_12.22.12~dfsg-1~deb11u4_all.deb |
Debian | 10 | all | nodejs | < 10.24.0~dfsg-1~deb10u1 | nodejs_10.24.0~dfsg-1~deb10u1_all.deb |
Debian | 999 | all | nodejs | < 20.14.0+dfsg-3 | nodejs_20.14.0+dfsg-3_all.deb |
Debian | 13 | all | nodejs | < 20.14.0+dfsg-1 | nodejs_20.14.0+dfsg-1_all.deb |
7.3 High
CVSS3
Attack Vector
LOCAL
Attack Complexity
LOW
Privileges Required
HIGH
User Interaction
NONE
Scope
CHANGED
Confidentiality Impact
LOW
Integrity Impact
HIGH
Availability Impact
LOW
CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:C/C:L/I:H/A:L
7.3 High
AI Score
Confidence
High
0.0004 Low
EPSS
Percentile
15.6%