Security update for libplist
This update for libplist fixes the following issues:
Security issues fixed:
- CVE-2017-6439: Heap-based buffer overflow in the parse_string_node function. (bsc#1029638)
- CVE-2017-6438: Heap-based buffer overflow in the parse_unicode_node function. (bsc#1029706)
- CVE-2017-6437: The base64encode function in base64.c allows local users to cause denial of service
(out-of-bounds read) via a crafted plist file. (bsc#1029707)
- CVE-2017-6436: Integer overflow in parse_string_node. (bsc#1029751)
- CVE-2017-6435: Crafted plist file could lead to Heap-buffer overflow. (bsc#1029639)
This update was imported from the SUSE:SLE-12-SP2:Update update project.
-
Submitted by
Michael Gorse (mgorse)
Fixed bugs
bnc#1029638
VUL-0: CVE-2017-6439: libplist: Heap-based buffer overflow in the parse_string_node function
bnc#1029639
VUL-0: CVE-2017-6435: libplist: crafed plist file could lead to Heap-buffer overflow
bnc#1029706
VUL-0: CVE-2017-6438: libplist: Heap-based buffer overflow in the parse_unicode_node function
bnc#1029707
VUL-0: CVE-2017-6437: libplist: The base64encode function in base64.c in libimobiledevice libplist 1.12 allowslocal users to cause ...
bnc#1029751
VUL-0: CVE-2017-6436: libplist: Integer overflow in parse_string_node