The parse_string_node function in bplist.c in libimobiledevice libplist 1.12 allows local users to cause a denial of service (memory allocation error) via a crafted plist file. Upstream bug: https://github.com/libimobiledevice/libplist/issues/94 Upstream patch: https://github.com/libimobiledevice/libplist/commit/32ee5213fe64f1e10ec76c1ee861ee6f233120dd
Created libplist tracking bugs for this issue: Affects: fedora-all [bug 1432971]
Why are you reopening these?
These CVE bugs filed against the "Security Response" product are used to track flaws across multiple products using Red Hat Bugzilla. While Fedora was dealt with, there are other products with pending actions. Also Fixed-In field has special meaning / format in the "Security Response" bugs.
(In reply to Tomas Hoger from comment #4) > These CVE bugs filed against the "Security Response" product are used to > track flaws across multiple products using Red Hat Bugzilla. While Fedora > was dealt with, there are other products with pending actions. Also > Fixed-In field has special meaning / format in the "Security Response" bugs. Where is the details of the "special meaning" publicly documented?
(In reply to Peter Robinson from comment #5) > (In reply to Tomas Hoger from comment #4) > > These CVE bugs filed against the "Security Response" product are used to > > track flaws across multiple products using Red Hat Bugzilla. While Fedora > > was dealt with, there are other products with pending actions. Also > > Fixed-In field has special meaning / format in the "Security Response" bugs. > > Where is the details of the "special meaning" publicly documented? Nowhere right now. But since the bug is not assigned to you (only the tracking one is), it is not really expected that you'd need to update it. The changes you made here should have been done in the product-relevant bug only.