Opened 3 months ago

Closed 2 months ago

#19263 closed enhancement (fixed)

libuv-1.48.0

Reported by: Bruce Dubbs Owned by: Douglas R. Reno
Priority: elevated Milestone: 12.1
Component: BOOK Version: git
Severity: normal Keywords:
Cc:

Description

New minor version.

Change History (5)

comment:1 by Xi Ruoyao, 3 months ago

Priority: normalelevated
  • misc: remove deprecated stalebot file (Jameson Nash)
  • build: disable windows asan buildbot (Ben Noordhuis)
  • test: don't run tcp_writealot under msan (Ben Noordhuis)
  • build,win: remove extraneous -lshell32 (Ben Noordhuis)
  • unix: ignore ifaddrs with NULL ifa_addr (Stephen Gallagher)
  • unix,win: utility for setting priority for thread (Hao Hu)
  • pipe: add back error handling to connect / bind (Jameson Nash)
  • test: check if ipv6 link-local traffic is routable (Ben Noordhuis)
  • win: remove check for UV_PIPE_NO_TRUNCATE (Jameson Nash)
  • linux: disable io_uring on hppa below kernel 6.1.51 (matoro)
  • unix,win: fix read past end of pipe name buffer (Ben Noordhuis)
  • unix: unbreak macOS < 10.14 (Sergey Fedorov)
  • aix: disable ipv6 link local (Abdirahim Musse)
  • doc: move cjihrig to emeriti (cjihrig)
  • unix: correct pwritev conditional (Bo Anderson)
  • test_fs.c: Fix issue on 32-bit systems using btrfs (Stephen Gallagher)
  • misc: ignore libuv-release-tool files (Jameson Nash)
  • win: honor NoDefaultCurrentDirectoryInExePath env var (Ardi Nugraha)
  • idna: fix compilation warning (Saúl Ibarra Corretgé)
  • linux: remove HAVE_IFADDRS_H macro (Ben Noordhuis)
  • test: skip tcp-write-in-a-row on IBM i (Abdirahim Musse)
  • build,win: work around missing uuid.dll on MinGW (Anton Bachin)
  • win: stop using deprecated names (Matheus Izvekov)
  • unix,win: fix busy loop with zero timeout timers (Matheus Izvekov)
  • aix,ibmi: use uv_interface_addresses instead of getifaddrs (Abdirahim Musse)
  • linux: fix bind/connect for abstract sockets (Santiago Gimeno)
  • win: replace c99 comments with c89 comments (Trevor Flynn)
  • build: add .cache clangd folder to .gitignore (Juan José Arboleda)
  • unix: support full TCP keep-alive on Solaris (Andy Pan)
  • freebsd: fix F_KINFO file path handling (David Carlier)
  • linux: retry fs op if unsupported by io_uring (Santiago Gimeno)
  • freebsd: fix build on non-intel archs (David Carlier)
  • unix: optimize uv__tcp_keepalive cpp directives (Andy Pan)
  • linux: disable io_uring on ppc64 and ppc64le (Brad King)
  • doc: add very basic Security Policy document (Santiago Gimeno)
  • build: re-enable msvc-asan job on CI (Jameson Nash)
  • win/spawn: optionally run executable paths with no file extension (Brad King)
  • win: fix ESRCH implementation (Jameson Nash)
  • unix,win: reset the timer queue on stop (Santiago Gimeno)
  • fix: always zero-terminate idna output (Ben Noordhuis)
  • fix: reject zero-length idna inputs (Ben Noordhuis)
  • test: empty strings are not valid IDNA (Santiago Gimeno)
  • Merge pull request from GHSA-f74f-cvh7-c6q6 (Ben Noordhuis)

GHSA-f74f-cvh7-c6q6 is now assigned CVE-2024-24806.

comment:2 by Bruce Dubbs, 3 months ago

libuv is a multi-platform support library with a focus on asynchronous I/O. The uv_getaddrinfo function in src/unix/getaddrinfo.c truncates hostnames to 256 characters before calling getaddrinfo. This behavior can be exploited to create addresses like 0x00007f000001, which are considered valid by getaddrinfo and could allow an attacker to craft payloads that resolve to unintended IP addresses, bypassing developer checks. The vulnerability arises due to how the hostname_ascii variable (with a length of 256 bytes) is handled in uv_getaddrinfo and subsequently in uv__idna_toascii. When the hostname exceeds 256 characters, it gets truncated without a terminating null byte. As a result attackers may be able to access internal APIs or for websites (similar to MySpace) that allows users to have username.example.com pages. Internal services that crawl or cache these user pages can be exposed to SSRF attacks if a malicious user chooses a long vulnerable username. This issue has been addressed in release version 1.48.0. Users are advised to upgrade. There are no known workarounds for this vulnerability.

affected at >= 1.45.0, < 1.48.0

Base Score: 5.3 MEDIUM

comment:3 by Douglas R. Reno, 3 months ago

Owner: changed from blfs-book to Douglas R. Reno
Status: newassigned

comment:5 by Douglas R. Reno, 2 months ago

Resolution: fixed
Status: assignedclosed

SA-12.0-094 issued

Note: See TracTickets for help on using tickets.