Bug 29231 - libuv new security issue CVE-2021-22918
Summary: libuv new security issue CVE-2021-22918
Status: RESOLVED FIXED
Alias: None
Product: Mageia
Classification: Unclassified
Component: Security (show other bugs)
Version: 8
Hardware: All Linux
Priority: Normal normal
Target Milestone: ---
Assignee: QA Team
QA Contact: Sec team
URL:
Whiteboard: MGA8-64-OK
Keywords: advisory, validated_update
Depends on:
Blocks:
 
Reported: 2021-07-06 16:31 CEST by David Walser
Modified: 2021-07-20 12:48 CEST (History)
4 users (show)

See Also:
Source RPM: libuv-1.40.0-1.mga8.src.rpm
CVE: CVE-2021-22918
Status comment:


Attachments

Description David Walser 2021-07-06 16:31:43 CEST
Debian has issued an advisory on July 5:
https://www.debian.org/security/2021/dsa-4936

The source was the latest Nodejs advisory:
https://nodejs.org/en/blog/vulnerability/july-2021-security-releases/

Mageia 8 is also affected.
David Walser 2021-07-06 16:32:01 CEST

See Also: (none) => https://bugs.mageia.org/show_bug.cgi?id=29028
Whiteboard: (none) => MGA8TOO

Comment 1 Lewis Smith 2021-07-07 09:09:24 CEST
Assigning to Stig for this SRPM.

Assignee: bugsquad => smelror

Comment 2 David Walser 2021-07-07 15:42:19 CEST
Ubuntu has issued an advisory for this today (July 7):
https://ubuntu.com/security/notices/USN-5007-1
Comment 3 Stig-Ørjan Smelror 2021-07-07 22:01:35 CEST
Cauldron updated to 1.41.1

Version: Cauldron => 8
Whiteboard: MGA8TOO => (none)

Comment 4 Stig-Ørjan Smelror 2021-07-07 22:05:47 CEST
Advisory
========
libuv has been updated to fix an OOB in the punycode decoder.

References
==========
https://ubuntu.com/security/CVE-2021-22918

Files
=====

Uploaded to core/updates_testing

lib64uv-devel-1.40.0-1.1.mga8
lib64uv1-1.40.0-1.1.mga8
lib64uv-static-devel-1.40.0-1.1.mga8

from libuv-1.40.0-1.1.mga8.src.rpm

Source RPM: libuv-1.41.0-1.mga9.src.rpm => libuv-1.40.0-1.mga8.src.rpm
Assignee: smelror => qa-bugs

Comment 5 Len Lawrence 2021-07-18 02:49:10 CEST
mga8, x64

CVE-2021-22918
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22921
Out of bounds read in uv__idna_toascii() function affects node.js.
https://hackerone.com/reports/1209681
Hackerone provides test materials which may not be usable by QA so we shall skip any attempt to reproduce the issue.

Updated the three packages.
$ urpmq --whatrequires lib64uv1
cmake
cmake-qtgui
lib64luv1
lib64radare2_4.5.1
lib64storj0
lib64websockets-devel
libstorj
neovim
perl-UV
   
$ urpmq --requires-recursive nodejs | grep libuv
$
This is strange.  node.js no longer uses libuv apparently.
The tests copied from bug 27403 now bear this out.
neovim requires libluv1 which needs libuv1.
Had to visit https://neovim.io/doc/user/vim_diff.html#nvim-features
to confirm that nvim and neovim are the same.  nvim is the command.
$ strace -o neovim.trace nvim hello
$ grep uv neovim.trace
openat(AT_FDCWD, "/lib64/libluv.so.1", O_RDONLY|O_CLOEXEC) = 3
openat(AT_FDCWD, "/lib64/libuv.so.1", O_RDONLY|O_CLOEXEC) = 3

The editing session worked just like vim - familiar commands and mode changes were unchanged.

This all looks OK for mga8.

Whiteboard: (none) => MGA8-64-OK
CC: (none) => tarazed25

Comment 6 Thomas Andrews 2021-07-18 22:03:29 CEST
Validating. Advisory in Comment 4.

CC: (none) => andrewsfarm, sysadmin-bugs
Keywords: (none) => validated_update

Comment 7 Aurelien Oudelet 2021-07-19 22:05:47 CEST
type: security
subject: Updated libuv packages fix security vulnerability
CVE:
 - CVE-2021-22918
src:
  8:
   core:
     - libuv-1.40.0-1.1.mga8
description: |
  Node.js before 16.4.1, 14.17.2, 12.22.2 is vulnerable to an out-of-bounds
  read when uv__idna_toascii() is used to convert strings to ASCII. The pointer
  p is read and increased without checking whether it is beyond pe, with the
  latter holding a pointer to the end of the buffer. This can lead to
  information disclosures or crashes. This function can be triggered via
  uv_getaddrinfo(). (CVE-2021-22918).
references:
 - https://bugs.mageia.org/show_bug.cgi?id=29231
 - https://nodejs.org/en/blog/vulnerability/july-2021-security-releases/
 - https://www.debian.org/security/2021/dsa-4936
 - https://ubuntu.com/security/notices/USN-5007-1

CC: (none) => ouaurelien
CVE: (none) => CVE-2021-22918
Keywords: (none) => advisory

Comment 8 Mageia Robot 2021-07-20 12:48:16 CEST
An update for this issue has been pushed to the Mageia Updates repository.

https://advisories.mageia.org/MGASA-2021-0360.html

Resolution: (none) => FIXED
Status: NEW => RESOLVED


Note You need to log in before you can comment on or make changes to this bug.