Lucene search

K
archlinuxArchLinuxASA-202107-36
HistoryJul 20, 2021 - 12:00 a.m.

[ASA-202107-36] libuv: information disclosure

2021-07-2000:00:00
security.archlinux.org
114

5.3 Medium

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

LOW

Integrity Impact

NONE

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N

5 Medium

CVSS2

Access Vector

NETWORK

Access Complexity

LOW

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

NONE

Availability Impact

NONE

AV:N/AC:L/Au:N/C:P/I:N/A:N

0.001 Low

EPSS

Percentile

45.9%

Arch Linux Security Advisory ASA-202107-36

Severity: Medium
Date : 2021-07-20
CVE-ID : CVE-2021-22918
Package : libuv
Type : information disclosure
Remote : Yes
Link : https://security.archlinux.org/AVG-2131

Summary

The package libuv before version 1.41.1-1 is vulnerable to information
disclosure.

Resolution

Upgrade to 1.41.1-1.

pacman -Syu โ€œlibuv>=1.41.1-1โ€

The problem has been fixed upstream in version 1.41.1.

Workaround

None.

Description

libuv before version 1.14.1, as bundled by Node.js before versions
16.4.1, 14.17.2 and 12.22.2, is vulnerable to an out-of-bounds read in
the libuvโ€™s uv__idna_toascii() function which is used to convert
strings to ASCII. This is called by Nodeโ€™s dns moduleโ€™s lookup()
function and can lead to information disclosures or crashes.

Impact

Attempting to look up a crafted domain name could disclose sensitive
information or crash an application using libuv.

References

https://github.com/libuv/libuv/issues/3147
https://hackerone.com/reports/1209681
https://github.com/libuv/libuv/commit/86dbeb4bd665749d6234ae90d30923e210de21b9
https://nodejs.org/en/blog/vulnerability/july-2021-security-releases/#libuv-upgrade-out-of-bounds-read-medium-cve-2021-22918
https://github.com/nodejs/node/commit/d33aead28bcec32a2a450f884907a6d971631829
https://github.com/nodejs/node/commit/a7496aba0a95b6425e9651c297697b5dd67ac358
https://github.com/nodejs/node/commit/623fd1fcb557985bf452984856c1d0ce4fc096a7
https://security.archlinux.org/CVE-2021-22918

OSVersionArchitecturePackageVersionFilename
ArchLinuxanyanylibuv<ย 1.41.1-1UNKNOWN

5.3 Medium

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

LOW

Integrity Impact

NONE

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N

5 Medium

CVSS2

Access Vector

NETWORK

Access Complexity

LOW

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

NONE

Availability Impact

NONE

AV:N/AC:L/Au:N/C:P/I:N/A:N

0.001 Low

EPSS

Percentile

45.9%