Bug 2165020 (CVE-2022-25927)

Summary: CVE-2022-25927 ua-parser-js: ReDoS vulnerability via the trim() function
Product: [Other] Security Response Reporter: Mauro Matteo Cascella <mcascell>
Component: vulnerabilityAssignee: Red Hat Product Security <security-response-team>
Status: CLOSED ERRATA QA Contact:
Severity: medium Docs Contact:
Priority: medium    
Version: unspecifiedCC: alampare, alazarot, amctagga, aoconnor, aturgema, bbuckingham, bcourt, bniver, btotty, candlepin-bugs, chazlett, dfreiber, dhanak, dymurray, ehelms, ellin, emingora, erack, flucifre, fmuellner, fzatlouk, gjospin, gmeno, grafana-maint, ibek, ibolton, idm-ds-dev-bugs, jburrell, jhorak, jkozol, jkurik, jmatthew, jmontleo, jrokos, jsherril, jwendell, jwon, klember, kverlaen, lbacciot, lzap, mbenjamin, mhackett, mhulan, michal.skrivanek, mnovotny, mperina, mpitt, mwringe, nathans, nmoumoul, orabin, oskutka, pcreech, pjindal, rcernich, rchan, rguimara, rogbas, rrajasek, sbonazzo, scorneli, scox, slucidi, sostapov, sseago, stransky, tpopela, vereddy, vkumar
Target Milestone: ---Keywords: Security
Target Release: ---   
Hardware: All   
OS: Linux   
Whiteboard:
Fixed In Version: ua-parser-js 0.7.33, ua-parser-js 1.0.33 Doc Type: If docs needed, set a value
Doc Text:
A flaw was found in ua-parser-js. This issue could allow a malicious user to trigger a regular expression denial of service (ReDoS) via the trim() function.
Story Points: ---
Clone Of: Environment:
Last Closed: 2023-03-23 11:47:34 UTC Type: ---
Regression: --- Mount Type: ---
Documentation: --- CRM:
Verified Versions: Category: ---
oVirt Team: --- RHEL 7.3 requirements from Atomic Host:
Cloudforms Team: --- Target Upstream Version:
Embargoed:
Bug Depends On: 2165026, 2165027, 2165447, 2174268, 2174269, 2174270, 2174271, 2174272, 2174274, 2174275    
Bug Blocks: 2165015    

Description Mauro Matteo Cascella 2023-01-27 11:52:36 UTC
Versions of the package ua-parser-js from 0.7.30 and before 0.7.33, from 0.8.1 and before 1.0.33 are vulnerable to Regular Expression Denial of Service (ReDoS) via the trim() function.

Upstream fix:
https://github.com/faisalman/ua-parser-js/commit/a6140a17dd0300a35cfc9cff999545f267889411

Synk security advisory:
https://security.snyk.io/vuln/SNYK-JS-UAPARSERJS-3244450

GitHub security advisory:
https://github.com/faisalman/ua-parser-js/security/advisories/GHSA-fhg7-m89q-25r3

Comment 6 Patrick Del Bello 2023-03-01 02:35:26 UTC
Created golang-entgo-ent tracking bugs for this issue:

Affects: fedora-all [bug 2174269]


Created grafana tracking bugs for this issue:

Affects: fedora-all [bug 2174270]


Created mozjs68 tracking bugs for this issue:

Affects: fedora-all [bug 2174271]


Created mozjs78 tracking bugs for this issue:

Affects: fedora-all [bug 2174272]


Created seamonkey tracking bugs for this issue:

Affects: epel-all [bug 2174268]
Affects: fedora-all [bug 2174274]


Created zuul tracking bugs for this issue:

Affects: fedora-all [bug 2174275]

Comment 9 errata-xmlrpc 2023-03-23 02:16:25 UTC
This issue has been addressed in the following products:

  Red Hat Migration Toolkit for Containers 1.7

Via RHSA-2023:1428 https://access.redhat.com/errata/RHSA-2023:1428

Comment 10 Product Security DevOps Team 2023-03-23 11:47:29 UTC
This bug is now closed. Further updates for individual products will be reflected on the CVE page(s):

https://access.redhat.com/security/cve/cve-2022-25927