Bug 1893708 (CVE-2020-27618) - CVE-2020-27618 glibc: iconv when processing invalid multi-byte input sequences fails to advance the input state, which could result in an infinite loop
Summary: CVE-2020-27618 glibc: iconv when processing invalid multi-byte input sequence...
Keywords:
Status: CLOSED ERRATA
Alias: CVE-2020-27618
Product: Security Response
Classification: Other
Component: vulnerability
Version: unspecified
Hardware: All
OS: Linux
low
low
Target Milestone: ---
Assignee: Red Hat Product Security
QA Contact:
URL:
Whiteboard:
Depends On: 1895970 1895971 1895973 1895974 1895975 1893709 1894669 1894670 1895972 1968673 1968674 1968675
Blocks: 1893710
TreeView+ depends on / blocked
 
Reported: 2020-11-02 12:15 UTC by Michael Kaplan
Modified: 2021-06-17 15:55 UTC (History)
15 users (show)

Fixed In Version:
Doc Type: If docs needed, set a value
Doc Text:
A flaw was found in glibc. If an attacker provides the iconv function with invalid multi-byte input sequences in IBM1364, IBM1371, IBM1388, IBM1390, IBM1399 encodings, it fails to advance the input state, which could lead to an infinite loop in applications, resulting in a denial of service.
Clone Of:
Environment:
Last Closed: 2021-05-18 14:36:01 UTC
Embargoed:


Attachments (Terms of Use)


Links
System ID Private Priority Status Summary Last Updated
Red Hat Product Errata RHSA-2021:1585 0 None None None 2021-06-17 15:55:13 UTC

Description Michael Kaplan 2020-11-02 12:15:39 UTC
The iconv function in the GNU C Library (aka glibc or libc6) 2.32 and earlier, when processing invalid multi-byte input sequences in IBM1364, IBM1371, IBM1388, IBM1390, IBM1399 encodings, fails to advance the input state, which could lead to an infinite loop in applications, resulting in a denial of service

Comment 1 Michael Kaplan 2020-11-02 12:15:46 UTC
External References:

https://sourceware.org/bugzilla/show_bug.cgi?id=26224

Comment 2 Michael Kaplan 2020-11-02 12:16:11 UTC
Created glibc tracking bugs for this issue:

Affects: fedora-all [bug 1893709]

Comment 3 Siddhesh Poyarekar 2020-11-02 12:26:29 UTC
This ought to be low severity similar to CVE-2016-10228.

Comment 4 Todd Cullum 2020-11-04 17:48:11 UTC
Flaw summary:

When glibc iconv function/command is passed certain input, it hangs using high CPU cycles. This could have an impact to system availability.

Comment 8 Todd Cullum 2020-11-04 19:07:04 UTC
Statement:

Red Hat Product Security has rated this flaw as a "Low" severity rating because the affected encodings are uncommon, and an attacker would need to either have local privileges or depend on an application feeding untrusted encoding input to iconv. Low and Moderate severity flaws are out of support scope for glibc as shipped with:

* Red Hat Enterprise Linux 5
* Red Hat Enterprise Linux 6
* Red Hat Enterprise Linux 7

For more detailed information about Red Hat Enterprise Linux support phases, please see [1].

1. https://access.redhat.com/support/policy/updates/errata

Comment 9 Todd Cullum 2020-11-04 19:07:06 UTC
Mitigation:

Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.

Comment 17 errata-xmlrpc 2021-05-18 13:26:24 UTC
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 8

Via RHSA-2021:1585 https://access.redhat.com/errata/RHSA-2021:1585

Comment 18 Product Security DevOps Team 2021-05-18 14:36:01 UTC
This bug is now closed. Further updates for individual products will be reflected on the CVE page(s):

https://access.redhat.com/security/cve/cve-2020-27618

Comment 19 Product Security DevOps Team 2021-05-18 20:36:59 UTC
This bug is now closed. Further updates for individual products will be reflected on the CVE page(s):

https://access.redhat.com/security/cve/cve-2020-27618


Note You need to log in before you can comment on or make changes to this bug.