Bug 1611890 (CVE-2017-9118) - CVE-2017-9118 php: Out of bounds access in php_pcre.c:php_pcre_replace_impl()
Summary: CVE-2017-9118 php: Out of bounds access in php_pcre.c:php_pcre_replace_impl()
Keywords:
Status: CLOSED ERRATA
Alias: CVE-2017-9118
Product: Security Response
Classification: Other
Component: vulnerability
Version: unspecified
Hardware: All
OS: Linux
medium
medium
Target Milestone: ---
Assignee: Red Hat Product Security
QA Contact:
URL:
Whiteboard:
Depends On: 1611891 1611892 1615623 1615624 1615625 1615626
Blocks: 1611893
TreeView+ depends on / blocked
 
Reported: 2018-08-03 02:16 UTC by Sam Fowler
Modified: 2021-12-10 16:52 UTC (History)
6 users (show)

Fixed In Version:
Clone Of:
Environment:
Last Closed: 2019-08-19 08:47:24 UTC
Embargoed:


Attachments (Terms of Use)


Links
System ID Private Priority Status Summary Last Updated
Red Hat Product Errata RHSA-2019:2519 0 None None None 2019-08-19 08:42:34 UTC

Description Sam Fowler 2018-08-03 02:16:29 UTC
PHP through is vulnerable to an out of bounds access in the php_pcre.c:php_pcre_replace_impl() function. An attacker could exploit this by calling preg_replace() with crafted arguments.


Upstream Bug:

https://bugs.php.net/bug.php?id=74604

Comment 1 Sam Fowler 2018-08-03 02:16:53 UTC
Created php tracking bugs for this issue:

Affects: fedora-all [bug 1611891]

Comment 6 Remi Collet 2018-09-19 10:48:03 UTC
Upstream does not consider this as a security issue, per https://wiki.php.net/security as it rely on bas configuration (no memory limit)

Comment 7 errata-xmlrpc 2019-08-19 08:42:32 UTC
This issue has been addressed in the following products:

  Red Hat Software Collections for Red Hat Enterprise Linux 7
  Red Hat Software Collections for Red Hat Enterprise Linux 7.4 EUS
  Red Hat Software Collections for Red Hat Enterprise Linux 7.5 EUS
  Red Hat Software Collections for Red Hat Enterprise Linux 7.6 EUS

Via RHSA-2019:2519 https://access.redhat.com/errata/RHSA-2019:2519

Comment 8 Product Security DevOps Team 2019-08-19 08:47:24 UTC
This bug is now closed. Further updates for individual products will be reflected on the CVE page(s):

https://access.redhat.com/security/cve/cve-2017-9118


Note You need to log in before you can comment on or make changes to this bug.