Bug 1893708 (CVE-2020-27618)

Summary: CVE-2020-27618 glibc: iconv when processing invalid multi-byte input sequences fails to advance the input state, which could result in an infinite loop
Product: [Other] Security Response Reporter: Michael Kaplan <mkaplan>
Component: vulnerabilityAssignee: Red Hat Product Security <security-response-team>
Status: CLOSED ERRATA QA Contact:
Severity: low Docs Contact:
Priority: low    
Version: unspecifiedCC: ashankar, bdettelb, cmoore, codonell, dj, fweimer, glibc-bugzilla, gmccullo, kaycoth, kmullins, mfabian, mnewsome, pfrankli, sipoyare, tomckay
Target Milestone: ---Keywords: Security
Target Release: ---   
Hardware: All   
OS: Linux   
Whiteboard:
Fixed In Version: Doc Type: If docs needed, set a value
Doc Text:
A flaw was found in glibc. If an attacker provides the iconv function with invalid multi-byte input sequences in IBM1364, IBM1371, IBM1388, IBM1390, IBM1399 encodings, it fails to advance the input state, which could lead to an infinite loop in applications, resulting in a denial of service.
Story Points: ---
Clone Of: Environment:
Last Closed: 2021-05-18 14:36:01 UTC Type: ---
Regression: --- Mount Type: ---
Documentation: --- CRM:
Verified Versions: Category: ---
oVirt Team: --- RHEL 7.3 requirements from Atomic Host:
Cloudforms Team: --- Target Upstream Version:
Embargoed:
Bug Depends On: 1895970, 1895971, 1895973, 1895974, 1895975, 1893709, 1894669, 1894670, 1895972, 1968673, 1968674, 1968675    
Bug Blocks: 1893710    

Description Michael Kaplan 2020-11-02 12:15:39 UTC
The iconv function in the GNU C Library (aka glibc or libc6) 2.32 and earlier, when processing invalid multi-byte input sequences in IBM1364, IBM1371, IBM1388, IBM1390, IBM1399 encodings, fails to advance the input state, which could lead to an infinite loop in applications, resulting in a denial of service

Comment 1 Michael Kaplan 2020-11-02 12:15:46 UTC
External References:

https://sourceware.org/bugzilla/show_bug.cgi?id=26224

Comment 2 Michael Kaplan 2020-11-02 12:16:11 UTC
Created glibc tracking bugs for this issue:

Affects: fedora-all [bug 1893709]

Comment 3 Siddhesh Poyarekar 2020-11-02 12:26:29 UTC
This ought to be low severity similar to CVE-2016-10228.

Comment 4 Todd Cullum 2020-11-04 17:48:11 UTC
Flaw summary:

When glibc iconv function/command is passed certain input, it hangs using high CPU cycles. This could have an impact to system availability.

Comment 8 Todd Cullum 2020-11-04 19:07:04 UTC
Statement:

Red Hat Product Security has rated this flaw as a "Low" severity rating because the affected encodings are uncommon, and an attacker would need to either have local privileges or depend on an application feeding untrusted encoding input to iconv. Low and Moderate severity flaws are out of support scope for glibc as shipped with:

* Red Hat Enterprise Linux 5
* Red Hat Enterprise Linux 6
* Red Hat Enterprise Linux 7

For more detailed information about Red Hat Enterprise Linux support phases, please see [1].

1. https://access.redhat.com/support/policy/updates/errata

Comment 9 Todd Cullum 2020-11-04 19:07:06 UTC
Mitigation:

Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.

Comment 17 errata-xmlrpc 2021-05-18 13:26:24 UTC
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 8

Via RHSA-2021:1585 https://access.redhat.com/errata/RHSA-2021:1585

Comment 18 Product Security DevOps Team 2021-05-18 14:36:01 UTC
This bug is now closed. Further updates for individual products will be reflected on the CVE page(s):

https://access.redhat.com/security/cve/cve-2020-27618

Comment 19 Product Security DevOps Team 2021-05-18 20:36:59 UTC
This bug is now closed. Further updates for individual products will be reflected on the CVE page(s):

https://access.redhat.com/security/cve/cve-2020-27618