Skip to content

Commit 42e659c

Browse files
tniessenRafaelGSS
authored andcommitted
deps: disable io_uring support in libuv by default
setuid() does not affect libuv's internal io_uring operations if initialized before the call to setuid(). This potentially allows the process to perform privileged operations despite presumably having dropped such privileges through a call to setuid(). Similar concerns apply to other functions that modify the process's user identity. This commit changes libuv's io_uring behavior from opt-out (through UV_USE_IO_URING=0) to opt-in (through UV_USE_IO_URING=1) until we figure out a better long-term solution. PR-URL: nodejs-private/node-private#528 Reviewed-By: Rafael Gonzaga <[email protected]> CVE-ID: CVE-2024-22017
1 parent 03a5c34 commit 42e659c

File tree

2 files changed

+20
-2
lines changed

2 files changed

+20
-2
lines changed

deps/uv/src/unix/linux.c

+2-2
Original file line numberDiff line numberDiff line change
@@ -487,8 +487,8 @@ static int uv__use_io_uring(void) {
487487
use = atomic_load_explicit(&use_io_uring, memory_order_relaxed);
488488

489489
if (use == 0) {
490-
/* Older kernels have a bug where the sqpoll thread uses 100% CPU. */
491-
use = uv__kernel_version() >= /* 5.10.186 */ 0x050ABA ? 1 : -1;
490+
/* Disable io_uring by default due to CVE-2024-22017. */
491+
use = -1;
492492

493493
/* But users can still enable it if they so desire. */
494494
val = getenv("UV_USE_IO_URING");

doc/api/cli.md

+18
Original file line numberDiff line numberDiff line change
@@ -2887,6 +2887,22 @@ threadpool by setting the `'UV_THREADPOOL_SIZE'` environment variable to a value
28872887
greater than `4` (its current default value). For more information, see the
28882888
[libuv threadpool documentation][].
28892889

2890+
### `UV_USE_IO_URING=value`
2891+
2892+
Enable or disable libuv's use of `io_uring` on supported platforms.
2893+
2894+
On supported platforms, `io_uring` can significantly improve the performance of
2895+
various asynchronous I/O operations.
2896+
2897+
`io_uring` is disabled by default due to security concerns. When `io_uring`
2898+
is enabled, applications must not change the user identity of the process at
2899+
runtime, neither through JavaScript functions such as [`process.setuid()`][] nor
2900+
through native addons that can invoke system functions such as [`setuid(2)`][].
2901+
2902+
This environment variable is implemented by a dependency of Node.js and may be
2903+
removed in future versions of Node.js. No stability guarantees are provided for
2904+
the behavior of this environment variable.
2905+
28902906
## Useful V8 options
28912907

28922908
V8 has its own set of CLI options. Any V8 CLI option that is provided to `node`
@@ -2991,6 +3007,8 @@ done
29913007
[`dnsPromises.lookup()`]: dns.md#dnspromiseslookuphostname-options
29923008
[`import` specifier]: esm.md#import-specifiers
29933009
[`process.setUncaughtExceptionCaptureCallback()`]: process.md#processsetuncaughtexceptioncapturecallbackfn
3010+
[`process.setuid()`]: process.md#processsetuidid
3011+
[`setuid(2)`]: https://man7.org/linux/man-pages/man2/setuid.2.html
29943012
[`tls.DEFAULT_MAX_VERSION`]: tls.md#tlsdefault_max_version
29953013
[`tls.DEFAULT_MIN_VERSION`]: tls.md#tlsdefault_min_version
29963014
[`unhandledRejection`]: process.md#event-unhandledrejection

0 commit comments

Comments
 (0)