Bug 1893708 (CVE-2020-27618)
Summary: | CVE-2020-27618 glibc: iconv when processing invalid multi-byte input sequences fails to advance the input state, which could result in an infinite loop | ||
---|---|---|---|
Product: | [Other] Security Response | Reporter: | Michael Kaplan <mkaplan> |
Component: | vulnerability | Assignee: | Red Hat Product Security <security-response-team> |
Status: | CLOSED ERRATA | QA Contact: | |
Severity: | low | Docs Contact: | |
Priority: | low | ||
Version: | unspecified | CC: | ashankar, bdettelb, cmoore, codonell, dj, fweimer, glibc-bugzilla, gmccullo, kaycoth, kmullins, mfabian, mnewsome, pfrankli, sipoyare, tomckay |
Target Milestone: | --- | Keywords: | Security |
Target Release: | --- | ||
Hardware: | All | ||
OS: | Linux | ||
Whiteboard: | |||
Fixed In Version: | Doc Type: | If docs needed, set a value | |
Doc Text: |
A flaw was found in glibc. If an attacker provides the iconv function with invalid multi-byte input sequences in IBM1364, IBM1371, IBM1388, IBM1390, IBM1399 encodings, it fails to advance the input state, which could lead to an infinite loop in applications, resulting in a denial of service.
|
Story Points: | --- |
Clone Of: | Environment: | ||
Last Closed: | 2021-05-18 14:36:01 UTC | Type: | --- |
Regression: | --- | Mount Type: | --- |
Documentation: | --- | CRM: | |
Verified Versions: | Category: | --- | |
oVirt Team: | --- | RHEL 7.3 requirements from Atomic Host: | |
Cloudforms Team: | --- | Target Upstream Version: | |
Embargoed: | |||
Bug Depends On: | 1895970, 1895971, 1895973, 1895974, 1895975, 1893709, 1894669, 1894670, 1895972, 1968673, 1968674, 1968675 | ||
Bug Blocks: | 1893710 |
Description
Michael Kaplan
2020-11-02 12:15:39 UTC
External References: https://sourceware.org/bugzilla/show_bug.cgi?id=26224 Created glibc tracking bugs for this issue: Affects: fedora-all [bug 1893709] This ought to be low severity similar to CVE-2016-10228. Flaw summary: When glibc iconv function/command is passed certain input, it hangs using high CPU cycles. This could have an impact to system availability. Statement: Red Hat Product Security has rated this flaw as a "Low" severity rating because the affected encodings are uncommon, and an attacker would need to either have local privileges or depend on an application feeding untrusted encoding input to iconv. Low and Moderate severity flaws are out of support scope for glibc as shipped with: * Red Hat Enterprise Linux 5 * Red Hat Enterprise Linux 6 * Red Hat Enterprise Linux 7 For more detailed information about Red Hat Enterprise Linux support phases, please see [1]. 1. https://access.redhat.com/support/policy/updates/errata Mitigation: Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability. Upstream commit: https://sourceware.org/git/?p=glibc.git;a=commit;h=9a99c682144bdbd40792ebf822fe9264e0376fb5 This issue has been addressed in the following products: Red Hat Enterprise Linux 8 Via RHSA-2021:1585 https://access.redhat.com/errata/RHSA-2021:1585 This bug is now closed. Further updates for individual products will be reflected on the CVE page(s): https://access.redhat.com/security/cve/cve-2020-27618 This bug is now closed. Further updates for individual products will be reflected on the CVE page(s): https://access.redhat.com/security/cve/cve-2020-27618 |