SUSE-SU-2017:1379-1 -- SLES libplistID: oval:org.secpod.oval:def:89044918 | Date: (C)2021-07-20 (M)2022-10-10 |
Class: PATCH | Family: unix |
This update for libplist fixes the following issues: - CVE-2017-5209: The base64decode function in libplist allowed attackers to obtain sensitive information from process memory or cause a denial of service via split encoded Apple Property List data . - CVE-2017-5545: The main function in plistutil.c in libimobiledevice libplist allowed attackers to obtain sensitive information from process memory or cause a denial of service via Apple Property List data that is too short. - CVE-2017-5836: A type inconsistency in bplist.c was fixed. - CVE-2017-5835: A memory allocation error leading to DoS was fixed. - CVE-2017-5834: A heap-buffer overflow in parse_dict_node was fixed. - CVE-2017-6440: Ensure that sanity checks work on 32-bit platforms. - CVE-2017-7982: Add some safety checks, backported from upstream . - CVE-2017-5836: A maliciously crafted file could cause the application to crash. - CVE-2017-5835: Malicious crafted file could cause libplist to allocate large amounts of memory and consume lots of CPU - CVE-2017-5834: Maliciou crafted file could cause a heap buffer overflow or segmentation fault
Platform: |
SUSE Linux Enterprise Server 12 SP2 |