Bug 1112434 (CVE-2018-18385) - VUL-1: CVE-2018-18385: rubygem-asciidoctor: Denial of service because Parser#next_block misuses a "while true" statement.
Summary: VUL-1: CVE-2018-18385: rubygem-asciidoctor: Denial of service because Parser#...
Status: RESOLVED FIXED
Alias: CVE-2018-18385
Product: SUSE Security Incidents
Classification: Novell Products
Component: Incidents (show other bugs)
Version: unspecified
Hardware: Other Other
: P4 - Low : Normal
Target Milestone: ---
Assignee: Security Team bot
QA Contact: Security Team bot
URL: https://smash.suse.de/issue/216897/
Whiteboard: CVSSv3:SUSE:CVE-2018-18385:5.9:(AV:N...
Keywords:
Depends on:
Blocks:
 
Reported: 2018-10-18 14:36 UTC by Robert Frohl
Modified: 2024-07-19 12:51 UTC (History)
3 users (show)

See Also:
Found By: Security Response Team
Services Priority:
Business Priority:
Blocker: ---
Marketing QA Status: ---
IT Deployment: ---


Attachments

Note You need to log in before you can comment on or make changes to this bug.
Description Robert Frohl 2018-10-18 14:36:28 UTC
CVE-2018-18385
Asciidoctor v1.5.7.1 allows remote attackers to cause a denial of service
(infinite loop), as demonstrated by web applications that deliver untrusted
input to this product, because Parser#next_block misuses a "while true"
statement.

upstream issue:
https://github.com/asciidoctor/asciidoctor/issues/2888


References:
http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2018-18385
http://people.canonical.com/~ubuntu-security/cve/2018/CVE-2018-18385.html
http://www.cvedetails.com/cve/CVE-2018-18385/
Comment 1 Robert Frohl 2018-10-18 14:37:47 UTC
Hi Stephan,
I wasn't able to find any additional information or patches. The only information is the link to the upstream issue.
Comment 4 Robert Frohl 2018-10-19 11:20:14 UTC
There is now a patch by upstream, but it does not look like it would apply easily to the version we ship:
https://github.com/mojavelinux/asciidoctor/commit/bedfcd284767cdf29a5625d89a24924d916ad3b3
Comment 10 Andrea Mattiazzo 2024-07-19 12:51:41 UTC
All done, closing.