CVE-2025-47153
Published: May 2, 2025Last modified: February 18, 2026
Description
Certain build processes for libuv and Node.js for 32-bit systems, such as for the nodejs binary package through nodejs_20.19.0+dfsg-2_i386.deb for Debian GNU/Linux, have an inconsistent off_t size (e.g., building on i386 Debian always uses _FILE_OFFSET_BITS=64 for the libuv dynamic library, but uses the _FILE_OFFSET_BITS global system default of 32 for nodejs), leading to out-of-bounds access. NOTE: this is not a problem in the Node.js software itself. In particular, the Node.js website's download page does not offer prebuilt Node.js for Linux on i386.
Severity score breakdown
| Parameter | Value |
|---|---|
| Base score | 6.5 |
| Attack Vector | NETWORK |
| Attack complexity | HIGH |
| Privileges required | NONE |
| User interaction | NONE |
| Scope | CHANGED |
| Confidentiality | LOW |
| Integrity impact | LOW |
| Availability impact | LOW |
| Vector | CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:L/I:L/A:L |
Status
| Product | Release | Package | Status |
|---|---|---|---|
| Alpaquita Linux | 23 LTS | nodejs | Unknown (18.16.0-r0) |
| Stream | nodejs | Unknown (18.16.1-r0) | |
| Hardened Containers | 23 LTS | nodejs | Unknown (18.16.0-r0) |
| Stream | nodejs | Unknown (18.16.1-r0) |
References
- http://www.openwall.com/lists/oss-security/2025/05/02/2
- https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1076350
- https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=922075
- https://bugzilla.redhat.com/show_bug.cgi?id=892601
- https://github.com/nodejs/node-v0.x-archive/issues/4549
- https://lists.debian.org/debian-lts-announce/2025/05/msg00003.html