Bug 1573802 (CVE-2018-10546)
Summary: | CVE-2018-10546 php: Infinite loop in ext/iconv/iconv.c when using stream filter with convert.incov on invalid sequence leads to denial-of-service | ||
---|---|---|---|
Product: | [Other] Security Response | Reporter: | Adam Mariš <amaris> |
Component: | vulnerability | Assignee: | Red Hat Product Security <security-response-team> |
Status: | CLOSED ERRATA | QA Contact: | |
Severity: | medium | Docs Contact: | |
Priority: | medium | ||
Version: | unspecified | CC: | apmukher, fedora, hhorak, jorton, kbost, kwalker, pim, ravpatil, rcollet, webstack-team, yozone |
Target Milestone: | --- | Keywords: | Security |
Target Release: | --- | ||
Hardware: | All | ||
OS: | Linux | ||
Whiteboard: | |||
Fixed In Version: | php 5.6.36, php 7.0.30, php 7.1.17, php 7.2.5 | Doc Type: | If docs needed, set a value |
Doc Text: |
An infinite loop vulnerability was found in ext/iconv/iconv.c in PHP due to the iconv stream not rejecting invalid multibyte sequences. A remote attacker could use this vulnerability to hang the php process and consume resources.
|
Story Points: | --- |
Clone Of: | Environment: | ||
Last Closed: | 2019-08-19 08:47:13 UTC | Type: | --- |
Regression: | --- | Mount Type: | --- |
Documentation: | --- | CRM: | |
Verified Versions: | Category: | --- | |
oVirt Team: | --- | RHEL 7.3 requirements from Atomic Host: | |
Cloudforms Team: | --- | Target Upstream Version: | |
Embargoed: | |||
Bug Depends On: | 1563859, 1573816, 1578432, 1578433, 1578434, 1578435 | ||
Bug Blocks: | 1573818, 1574650 |
Description
Adam Mariš
2018-05-02 09:52:06 UTC
Created php tracking bugs for this issue: Affects: fedora-all [bug 1573816] The versions of PHP as provided by Red Hat Enterprise Linux 5, 6 and 7, though they do contain the vulnerable code, cannot be used to trigger the vulnerability with the linked test case. In the provided versions, php://memory stream changed the way it reads data, but we do not exclude other ways to trigger the vulnerability still exist. Is there any update on releasing updated packages for PHP on RHEL 7? (I have no access to the four linked issues.) This issue has been addressed in the following products: Red Hat Software Collections for Red Hat Enterprise Linux 7 Red Hat Software Collections for Red Hat Enterprise Linux 7.4 EUS Red Hat Software Collections for Red Hat Enterprise Linux 7.5 EUS Red Hat Software Collections for Red Hat Enterprise Linux 7.6 EUS Via RHSA-2019:2519 https://access.redhat.com/errata/RHSA-2019:2519 This bug is now closed. Further updates for individual products will be reflected on the CVE page(s): https://access.redhat.com/security/cve/cve-2018-10546 |