Lucene search

K
mageiaGentoo FoundationMGASA-2024-0079
HistoryMar 22, 2024 - 3:19 a.m.

Updated libuv packages fix security vulnerability

2024-03-2203:19:51
Gentoo Foundation
advisories.mageia.org
20
libuv
packages
security
vulnerability
uv_getaddrinfo
hostname
bypass
security measures
internal apis
ssrf attacks
cve-2024-24806
unix

7.3 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

LOW

Integrity Impact

LOW

Availability Impact

LOW

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L

7 High

AI Score

Confidence

Low

0.001 Low

EPSS

Percentile

37.1%

It was discovered that the uv_getaddrinfo() function in libuv, an asynchronous event notification library, incorrectly truncated certain hostnames, which may result in bypass of security measures on internal APIs or SSRF attacks. (CVE-2024-24806)

OSVersionArchitecturePackageVersionFilename
Mageia9noarchlibuv<ย 1.44.2-2.1libuv-1.44.2-2.1.mga9

7.3 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

LOW

Integrity Impact

LOW

Availability Impact

LOW

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L

7 High

AI Score

Confidence

Low

0.001 Low

EPSS

Percentile

37.1%