Bugzilla will be upgraded to version 5.0. The upgrade date is tentatively scheduled for 2 December 2018, pending final testing and feedback.
Bug 1432951 - (CVE-2017-6436) CVE-2017-6436 libplist: Integer overflow in parse_string_node
CVE-2017-6436 libplist: Integer overflow in parse_string_node
Status: CLOSED WONTFIX
Product: Security Response
Classification: Other
Component: vulnerability (Show other bugs)
unspecified
All Linux
low Severity low
: ---
: ---
Assigned To: Red Hat Product Security
impact=low,public=20170208,reported=2...
: Reopened, Security
Depends On: 1432971
Blocks: 1432966
  Show dependency treegraph
 
Reported: 2017-03-16 09:03 EDT by Adam Mariš
Modified: 2017-05-17 03:17 EDT (History)
4 users (show)

See Also:
Fixed In Version:
Doc Type: If docs needed, set a value
Doc Text:
Story Points: ---
Clone Of:
Environment:
Last Closed: 2017-05-17 03:17:16 EDT
Type: ---
Regression: ---
Mount Type: ---
Documentation: ---
CRM:
Verified Versions:
Category: ---
oVirt Team: ---
RHEL 7.3 requirements from Atomic Host:
Cloudforms Team: ---


Attachments (Terms of Use)

  None (edit)
Description Adam Mariš 2017-03-16 09:03:10 EDT
The parse_string_node function in bplist.c in libimobiledevice libplist 1.12 allows local users to cause a denial of service (memory allocation error) via a crafted plist file.

Upstream bug:

https://github.com/libimobiledevice/libplist/issues/94

Upstream patch:

https://github.com/libimobiledevice/libplist/commit/32ee5213fe64f1e10ec76c1ee861ee6f233120dd
Comment 1 Adam Mariš 2017-03-16 09:27:51 EDT
Created libplist tracking bugs for this issue:

Affects: fedora-all [bug 1432971]
Comment 3 Peter Robinson 2017-05-12 10:28:41 EDT
Why are you reopening these?
Comment 4 Tomas Hoger 2017-05-12 16:18:01 EDT
These CVE bugs filed against the "Security Response" product are used to track flaws across multiple products using Red Hat Bugzilla.  While Fedora was dealt with, there are other products with pending actions.  Also Fixed-In field has special meaning / format in the "Security Response" bugs.
Comment 5 Peter Robinson 2017-05-14 12:08:21 EDT
(In reply to Tomas Hoger from comment #4)
> These CVE bugs filed against the "Security Response" product are used to
> track flaws across multiple products using Red Hat Bugzilla.  While Fedora
> was dealt with, there are other products with pending actions.  Also
> Fixed-In field has special meaning / format in the "Security Response" bugs.

Where is the details of the "special meaning" publicly documented?
Comment 6 Martin Prpič 2017-05-15 04:52:36 EDT
(In reply to Peter Robinson from comment #5)
> (In reply to Tomas Hoger from comment #4)
> > These CVE bugs filed against the "Security Response" product are used to
> > track flaws across multiple products using Red Hat Bugzilla.  While Fedora
> > was dealt with, there are other products with pending actions.  Also
> > Fixed-In field has special meaning / format in the "Security Response" bugs.
> 
> Where is the details of the "special meaning" publicly documented?

Nowhere right now. But since the bug is not assigned to you (only the tracking one is), it is not really expected that you'd need to update it. The changes you made here should have been done in the product-relevant bug only.

Note You need to log in before you can comment on or make changes to this bug.