Bugzilla will be upgraded to version 5.0 on a still to be determined date in the near future. The original upgrade date has been delayed.
Bug 1612362 - (CVE-2018-14884) CVE-2018-14884 php: mishandled http_header_value in an atoi call in ext/standard/http_fopen_wrapper.c
CVE-2018-14884 php: mishandled http_header_value in an atoi call in ext/stan...
Status: NEW
Product: Security Response
Classification: Other
Component: vulnerability (Show other bugs)
unspecified
All Linux
medium Severity medium
: ---
: ---
Assigned To: Red Hat Product Security
impact=moderate,public=20171117,repor...
: Security
Depends On: 1613731
Blocks: 1612363
  Show dependency treegraph
 
Reported: 2018-08-03 15:14 EDT by Laura Pardo
Modified: 2018-08-08 05:11 EDT (History)
5 users (show)

See Also:
Fixed In Version: php 7.0.27, php 7.1.13, php 7.2.1
Doc Type: If docs needed, set a value
Doc Text:
Story Points: ---
Clone Of:
Environment:
Last Closed:
Type: ---
Regression: ---
Mount Type: ---
Documentation: ---
CRM:
Verified Versions:
Category: ---
oVirt Team: ---
RHEL 7.3 requirements from Atomic Host:
Cloudforms Team: ---


Attachments (Terms of Use)

  None (edit)
Description Laura Pardo 2018-08-03 15:14:50 EDT
An issue was discovered in PHP 7.0.x before 7.0.27, 7.1.x before 7.1.13, and 7.2.x before 7.2.1. Inappropriately parsing an HTTP response leads to a segmentation fault because http_header_value in ext/standard/http_fopen_wrapper.c can be a NULL value that is mishandled in an atoi call.


References:
http://php.net/ChangeLog-7.php 	
https://bugs.php.net/bug.php?id=75535

Upstream Patch:
https://github.com/php/php-src/commit/0e097f2c96ce31b16fa371981045f224e5a37160

Note You need to log in before you can comment on or make changes to this bug.