A vulnerability was found in libsolv through 0.7.2. There is an illegal address access at src/pool.h (function pool_whatprovides) in libsolv.a that will cause a denial of service. References: https://bugzilla.redhat.com/show_bug.cgi?id=1652604 Upstream Patch: https://github.com/openSUSE/libsolv/pull/291
Created libsolv tracking bugs for this issue: Affects: fedora-all [bug 1665539]
When function testcase_str2solvid() is called on a malformed input, pool may be not correctly initialized and pool->whatprovides may be NULL, causing the program to crash when accessing an illegal address in pool_whatprovides().
This issue has been addressed in the following products: Red Hat Enterprise Linux 7 Via RHSA-2019:2290 https://access.redhat.com/errata/RHSA-2019:2290
This bug is now closed. Further updates for individual products will be reflected on the CVE page(s): https://access.redhat.com/security/cve/cve-2018-20534
This issue has been addressed in the following products: Red Hat Enterprise Linux 8 Via RHSA-2019:3583 https://access.redhat.com/errata/RHSA-2019:3583