libuv: Buffer overflow — GLSA 202009-15

A buffer overflow in libuv might allow remote attacker(s) to execute arbitrary code.

Affected packages

dev-libs/libuv on all architectures
Affected versions < 1.39.0
Unaffected versions >= 1.39.0

Background

libuv is a multi-platform support library with a focus on asynchronous I/O.

Description

libuv used an incorrect buffer size for paths, causing a buffer overflow.

Impact

A remote attacker could possibly execute arbitrary code with the privileges of the process, or cause a Denial of Service condition.

Workaround

There is no known workaround at this time.

Resolution

All libuv users should upgrade to the latest version:

 # emerge --sync
 # emerge --ask --oneshot --verbose ">=dev-libs/libuv-1.39.0"
 

References

Release date
September 29, 2020

Latest revision
September 29, 2020: 1

Severity
normal

Exploitable
remote

Bugzilla entries