Bug 1595502 (CVE-2018-12882)

Summary: CVE-2018-12882 php: Use-after-free reachable via the exif.c:exif_read_from_impl() function
Product: [Other] Security Response Reporter: Sam Fowler <sfowler>
Component: vulnerabilityAssignee: Red Hat Product Security <security-response-team>
Status: CLOSED NOTABUG QA Contact:
Severity: medium Docs Contact:
Priority: medium    
Version: unspecifiedCC: abhgupta, dbaker, fedora, hhorak, jokerman, jorton, rcollet, sthangav, trankin, webstack-team
Target Milestone: ---Keywords: Security
Target Release: ---   
Hardware: All   
OS: Linux   
Whiteboard:
Fixed In Version: Doc Type: If docs needed, set a value
Doc Text:
Story Points: ---
Clone Of: Environment:
Last Closed: 2019-07-12 13:05:44 UTC Type: ---
Regression: --- Mount Type: ---
Documentation: --- CRM:
Verified Versions: Category: ---
oVirt Team: --- RHEL 7.3 requirements from Atomic Host:
Cloudforms Team: --- Target Upstream Version:
Embargoed:
Bug Depends On: 1595503, 1595504    
Bug Blocks: 1595510    

Description Sam Fowler 2018-06-27 03:03:18 UTC
PHP versions 7.2.x through 7.2.7 are vulnerable to a heap-use-after-free in streams.c:_php_stream_free() that is reachable via the exif.c:exif_read_from_impl() function. An attacker could exploit this via a crafted file to potentially execute arbitrary code.

The vulnerable PHP exif_read_data() function was modified in version 7.2.0 to support local files and stream resources.


Upstream Bug:

https://bugs.php.net/bug.php?id=76409


Upstream Patch:

http://git.php.net/?p=php-src.git;a=commit;h=3fdde65617e9f954e2c964768aac8831005497e5


Reference:

http://php.net/manual/en/function.exif-read-data.php

Comment 1 Sam Fowler 2018-06-27 03:03:47 UTC
Created php tracking bugs for this issue:

Affects: fedora-28 [bug 1595503]

Comment 5 Product Security DevOps Team 2019-07-12 13:05:44 UTC
This bug is now closed. Further updates for individual products will be reflected on the CVE page(s):

https://access.redhat.com/security/cve/cve-2018-12882