Lucene search

K
debiancveDebian Security Bug TrackerDEBIANCVE:CVE-2024-22017
HistoryMar 19, 2024 - 5:15 a.m.

CVE-2024-22017

2024-03-1905:15:10
Debian Security Bug Tracker
security-tracker.debian.org
28
setuid bypass
libuv
io_uring
privileged operations
node.js 20.4.0
node.js 21
unix

7.3 High

CVSS3

Attack Vector

LOCAL

Attack Complexity

LOW

Privileges Required

HIGH

User Interaction

NONE

Scope

CHANGED

Confidentiality Impact

LOW

Integrity Impact

HIGH

Availability Impact

LOW

CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:C/C:L/I:H/A:L

7.3 High

AI Score

Confidence

High

0.0004 Low

EPSS

Percentile

15.6%

setuid() does not affect libuv’s internal io_uring operations if initialized before the call to setuid(). This allows the process to perform privileged operations despite presumably having dropped such privileges through a call to setuid(). This vulnerability affects all users using version greater or equal than Node.js 18.18.0, Node.js 20.4.0 and Node.js 21.

7.3 High

CVSS3

Attack Vector

LOCAL

Attack Complexity

LOW

Privileges Required

HIGH

User Interaction

NONE

Scope

CHANGED

Confidentiality Impact

LOW

Integrity Impact

HIGH

Availability Impact

LOW

CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:C/C:L/I:H/A:L

7.3 High

AI Score

Confidence

High

0.0004 Low

EPSS

Percentile

15.6%