Bug 1611890 (CVE-2017-9118)

Summary: CVE-2017-9118 php: Out of bounds access in php_pcre.c:php_pcre_replace_impl()
Product: [Other] Security Response Reporter: Sam Fowler <sfowler>
Component: vulnerabilityAssignee: Red Hat Product Security <security-response-team>
Status: CLOSED ERRATA QA Contact:
Severity: medium Docs Contact:
Priority: medium    
Version: unspecifiedCC: fedora, hhorak, jorton, rcollet, webstack-team, yozone
Target Milestone: ---Keywords: Security
Target Release: ---   
Hardware: All   
OS: Linux   
Whiteboard:
Fixed In Version: Doc Type: If docs needed, set a value
Doc Text:
Story Points: ---
Clone Of: Environment:
Last Closed: 2019-08-19 08:47:24 UTC Type: ---
Regression: --- Mount Type: ---
Documentation: --- CRM:
Verified Versions: Category: ---
oVirt Team: --- RHEL 7.3 requirements from Atomic Host:
Cloudforms Team: --- Target Upstream Version:
Embargoed:
Bug Depends On: 1611891, 1611892, 1615623, 1615624, 1615625, 1615626    
Bug Blocks: 1611893    

Description Sam Fowler 2018-08-03 02:16:29 UTC
PHP through is vulnerable to an out of bounds access in the php_pcre.c:php_pcre_replace_impl() function. An attacker could exploit this by calling preg_replace() with crafted arguments.


Upstream Bug:

https://bugs.php.net/bug.php?id=74604

Comment 1 Sam Fowler 2018-08-03 02:16:53 UTC
Created php tracking bugs for this issue:

Affects: fedora-all [bug 1611891]

Comment 6 Remi Collet 2018-09-19 10:48:03 UTC
Upstream does not consider this as a security issue, per https://wiki.php.net/security as it rely on bas configuration (no memory limit)

Comment 7 errata-xmlrpc 2019-08-19 08:42:32 UTC
This issue has been addressed in the following products:

  Red Hat Software Collections for Red Hat Enterprise Linux 7
  Red Hat Software Collections for Red Hat Enterprise Linux 7.4 EUS
  Red Hat Software Collections for Red Hat Enterprise Linux 7.5 EUS
  Red Hat Software Collections for Red Hat Enterprise Linux 7.6 EUS

Via RHSA-2019:2519 https://access.redhat.com/errata/RHSA-2019:2519

Comment 8 Product Security DevOps Team 2019-08-19 08:47:24 UTC
This bug is now closed. Further updates for individual products will be reflected on the CVE page(s):

https://access.redhat.com/security/cve/cve-2017-9118