The iconv function in the GNU C Library (aka glibc or libc6) 2.32 and earlier, when processing invalid multi-byte input sequences in IBM1364, IBM1371, IBM1388, IBM1390, IBM1399 encodings, fails to advance the input state, which could lead to an infinite loop in applications, resulting in a denial of service
External References: https://sourceware.org/bugzilla/show_bug.cgi?id=26224
Created glibc tracking bugs for this issue: Affects: fedora-all [bug 1893709]
This ought to be low severity similar to CVE-2016-10228.
Flaw summary: When glibc iconv function/command is passed certain input, it hangs using high CPU cycles. This could have an impact to system availability.
Statement: Red Hat Product Security has rated this flaw as a "Low" severity rating because the affected encodings are uncommon, and an attacker would need to either have local privileges or depend on an application feeding untrusted encoding input to iconv. Low and Moderate severity flaws are out of support scope for glibc as shipped with: * Red Hat Enterprise Linux 5 * Red Hat Enterprise Linux 6 * Red Hat Enterprise Linux 7 For more detailed information about Red Hat Enterprise Linux support phases, please see [1]. 1. https://access.redhat.com/support/policy/updates/errata
Mitigation: Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.
Upstream commit: https://sourceware.org/git/?p=glibc.git;a=commit;h=9a99c682144bdbd40792ebf822fe9264e0376fb5
This issue has been addressed in the following products: Red Hat Enterprise Linux 8 Via RHSA-2021:1585 https://access.redhat.com/errata/RHSA-2021:1585
This bug is now closed. Further updates for individual products will be reflected on the CVE page(s): https://access.redhat.com/security/cve/cve-2020-27618