setuid() does not affect libuv's internal io_uring operations if initialized before the call to setuid(). This allows the process to perform privileged operations despite presumably having dropped such privileges through a call to setuid(). This vulnerability affects all users using version greater or equal than Node.js 18.18.0, Node.js 20.4.0 and Node.js 21.
{
"priority_reason": "setting priority based on oss-security report",
"binaries": [
{
"binary_version": "20.18.1+dfsg-1ubuntu2",
"binary_name": "libnode-dev"
},
{
"binary_version": "20.18.1+dfsg-1ubuntu2",
"binary_name": "libnode115"
},
{
"binary_version": "20.18.1+dfsg-1ubuntu2",
"binary_name": "libnode115-dbgsym"
},
{
"binary_version": "20.18.1+dfsg-1ubuntu2",
"binary_name": "nodejs"
},
{
"binary_version": "20.18.1+dfsg-1ubuntu2",
"binary_name": "nodejs-dbgsym"
},
{
"binary_version": "20.18.1+dfsg-1ubuntu2",
"binary_name": "nodejs-doc"
}
],
"availability": "No subscription required"
}