Lucene search

K
ubuntuUbuntuUSN-6666-1
HistoryFeb 28, 2024 - 12:00 a.m.

libuv vulnerability

2024-02-2800:00:00
ubuntu.com
29
libuv
vulnerability
ubuntu
asynchronous event notification
hostname truncation
remote attacker
security bypass
unix

7.3 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

LOW

Integrity Impact

LOW

Availability Impact

LOW

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L

7.2 High

AI Score

Confidence

Low

0.001 Low

EPSS

Percentile

37.1%

Releases

  • Ubuntu 23.10
  • Ubuntu 22.04 LTS
  • Ubuntu 20.04 LTS

Packages

  • libuv1 - asynchronous event notification library

Details

It was discovered that libuv incorrectly truncated certain hostnames. A
remote attacker could possibly use this issue with specially crafted
hostnames to bypass certain checks.

OSVersionArchitecturePackageVersionFilename
Ubuntu23.10noarchlibuv1<ย 1.44.2-1ubuntu0.1UNKNOWN
Ubuntu23.10noarchlibuv1-dbgsym<ย 1.44.2-1ubuntu0.1UNKNOWN
Ubuntu23.10noarchlibuv1-dev<ย 1.44.2-1ubuntu0.1UNKNOWN
Ubuntu22.04noarchlibuv1<ย 1.43.0-1ubuntu0.1UNKNOWN
Ubuntu22.04noarchlibuv1-dbgsym<ย 1.43.0-1ubuntu0.1UNKNOWN
Ubuntu22.04noarchlibuv1-dev<ย 1.43.0-1ubuntu0.1UNKNOWN
Ubuntu20.04noarchlibuv1<ย 1.34.2-1ubuntu1.5UNKNOWN
Ubuntu20.04noarchlibuv1-dbgsym<ย 1.34.2-1ubuntu1.5UNKNOWN
Ubuntu20.04noarchlibuv1-dev<ย 1.34.2-1ubuntu1.5UNKNOWN

7.3 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

LOW

Integrity Impact

LOW

Availability Impact

LOW

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L

7.2 High

AI Score

Confidence

Low

0.001 Low

EPSS

Percentile

37.1%