Gentoo Websites Logo
Go to: Gentoo Home Documentation Forums Lists Bugs Planet Store Wiki Get Gentoo!
Bug 618584 (CVE-2017-6439) - <app-pda/libplist-2.0.0: Heap-based buffer overflow in parse_string_node (CVE-2017-6439)
Summary: <app-pda/libplist-2.0.0: Heap-based buffer overflow in parse_string_node (CVE...
Status: RESOLVED FIXED
Alias: CVE-2017-6439
Product: Gentoo Security
Classification: Unclassified
Component: Vulnerabilities (show other bugs)
Hardware: All Linux
: Normal minor (vote)
Assignee: Gentoo Security
URL: https://bugzilla.redhat.com/show_bug....
Whiteboard: B3 [noglsa cve]
Keywords:
Depends on: CVE-2017-5545, CVE-2017-5834, CVE-2017-5835, CVE-2017-5836
Blocks:
  Show dependency tree
 
Reported: 2017-05-15 22:12 UTC by Volkan
Modified: 2017-07-15 21:57 UTC (History)
0 users

See Also:
Package list:
Runtime testing required: ---


Attachments

Note You need to log in before you can comment on or make changes to this bug.
Description Volkan 2017-05-15 22:12:28 UTC
Heap-based buffer overflow in the parse_string_node function in
bplist.c in libimobiledevice libplist 1.12 allows local users to cause
a denial of service (out-of-bounds write) via a crafted plist file.

Upstream bug:

https://github.com/libimobiledevice/libplist/issues/95

Upstream patch:

https://github.com/libimobiledevice/libplist/commit/32ee5213fe64f1e10ec76c1ee861ee6f233120dd
Comment 1 Aaron Bauman Gentoo Infrastructure gentoo-dev Security 2017-07-15 21:57:51 UTC
Tree is clean.

GLSA Vote: No