Age | Commit message (Collapse) | Author | Files | Lines | |
---|---|---|---|---|---|
2017-01-18 | plistutil: Use plist_is_binary() to check for binary plist data | 1 | -1/+1 | ||
2017-01-18 | plistutil: Prevent OOB heap buffer read by checking input size | 1 | -0/+6 | ||
As pointed out in #87 plistutil would do a memcmp with a heap buffer without checking the size. If the size is less than 8 it would read beyond the bounds of this heap buffer. This commit prevents that. | |||||
2017-01-16 | bplist: Disallow key nodes with non-string node types | 1 | -0/+7 | ||
As reported in #86, the binary plist parser would force the type of the key node to be of type PLIST_KEY while the node might be of a different i.e. non-string type. A following plist_free() might then call free() on an invalid pointer; e.g. if the node is of type integer, its value would be considered a pointer, and free() would cause an error. We prevent this issue by disallowing non-string key nodes during parsing. | |||||
2017-01-11 | base64: Rework base64decode to handle split encoded data correctly | 1 | -41/+27 | ||
2017-01-03 | xplist: Refine XML parsing error messages | 1 | -15/+18 | ||
2017-01-03 | time64: Remove some unused (and non-thread-safe) functions | 2 | -28/+0 | ||
2017-01-03 | win32: Try to prevent linking against libgcc_s_dw2 | 1 | -2/+2 | ||
While this works for libplist.dll, libplist++.dll will still have the _Unwind_Resume symbol being imported from libgcc_s_dw2-1.dll and there doesn't seem to be a way to prevent that. | |||||
2017-01-02 | test: Add some more test cases for various valid and invalid content | 7 | -1/+62 | ||
2017-01-02 | test: Add new test case for dictionaries with empty keys | 3 | -1/+22 | ||
2017-01-02 | test: Add new test case for entities | 3 | -1/+71 | ||
2017-01-02 | xplist: Error out when invalid tags inside text nodes are encountered | 1 | -2/+12 | ||
2017-01-02 | xplist: Make sure to error out when encountering empty/incomplete entities | 1 | -1/+5 | ||
2017-01-02 | xplist: Make sure to not parse for entities in empty strings | 1 | -1/+1 | ||
2017-01-02 | xplist: Allow empty keys in dictionaries | 1 | -2/+2 | ||
2017-01-02 | xplist: Allow whitespace after name in closing tag | 1 | -2/+7 | ||
'</key >' is a perfectly valid closing tag and so is '</key >' (note the newline). This commit will make the parser skip any encountered whitespace before checking for the closing '>'. | |||||
2017-01-01 | xplist: Fix numerical character entity conversion | 1 | -2/+6 | ||
2016-12-27 | Remove unused AC_SUBST for WINDRES | 1 | -1/+0 | ||
2016-12-27 | Remove check for pthread on macOS to suppress clang compiler warning | 1 | -10/+8 | ||
2016-12-21 | xplist: Fix UaF in code checking for closing tag | 1 | -2/+2 | ||
2016-12-21 | xplist: Make sure to correctly parse for closing tags of structured nodes | 1 | -7/+45 | ||
2016-12-21 | xplist: Make sure to stop parsing on entity errors | 1 | -7/+11 | ||
2016-12-14 | xplist: Remove usage of strlen() wherever possible | 1 | -45/+66 | ||
2016-12-14 | xplist: Improve text content parsing, reducing memory usage and unneeded copying | 1 | -113/+318 | ||
2016-12-14 | Properly check for the availability of strptime() and make sure to use it | 2 | -2/+6 | ||
2016-12-14 | base64: Prevent use of strlen() in base64decode when input buffer size is known | 1 | -7/+8 | ||
2016-11-28 | xplist: Fix parsing of adjacent nodes without whitespace between them | 1 | -2/+1 | ||
The context position counter was increased after encountering a closing node, e.g. '</dict>' or after a closing '</key>' node. When a node followed it directly without any whitespace inbetween, e.g. </dict><key>, parsing would fail since the parser would look at 'key>' instead of '<key>' for the next node to be parsed. | |||||
2016-11-27 | plist_copy: Duplicate hash tables when copying PLIST_DICT nodes | 1 | -5/+15 | ||
2016-11-18 | Updated README | 1 | -2/+8 | ||
2016-11-18 | test: Fix test plist having duplicate keys in dictionary | 1 | -1/+1 | ||
2016-11-18 | bplist: Remove misleading/redundant `else` from BPLIST_DATE case in ↵ | 1 | -4/+3 | ||
parse_bin_node | |||||
2016-11-18 | Improve plist_dict_set_item performance for large dictionaries with hash table | 5 | -18/+119 | ||
2016-11-13 | xplist: Don't parse XML reserved characters in CDATA blocks | 1 | -0/+1 | ||
2016-11-13 | bplist: Fix surrogate parsing range to include U+100000 - U+1FFFFF | 1 | -2/+2 | ||
2016-11-13 | xplist: Support converting numerical character entities | 1 | -3/+51 | ||
2016-11-13 | xplist: Don't escape " and ' characters in node_to_xml | 1 | -10/+0 | ||
2016-11-13 | xplist: Properly parse CDATA blocks in get_text_content() | 1 | -7/+23 | ||
2016-11-10 | libcnary: Fix possible NULL pointer dereference in node_iterator_create() | 1 | -1/+1 | ||
When NULL is passed to node_iterator_create() the code tries to access the begin element of the node list and causes a NULL pointer dereference. The value of list is checked a few lines down and iterator->value is then properly assigned in node_iterator_bind(). | |||||
2016-11-10 | Add new PLIST_IS_* helper macros for the different plist node types | 1 | -0/+14 | ||
Instead of e.g.: if (plist_get_node_type(plist) == PLIST_STRING) you can now write: if (PLIST_IS_STRING(plist)) | |||||
2016-11-10 | Remove libxml2 private requirement from pkg-config control file | 1 | -1/+0 | ||
2016-11-10 | Remove libxml2 requirement from README | 1 | -4/+1 | ||
2016-11-10 | bplist: Make sure to error out if allocation of `used_indexes` buffer in ↵ | 1 | -0/+6 | ||
plist_from_bin() fails If the allocation fails, a lot of bad things can happen so we check the result and return accordingly. We also check that the multiplication used to calculate the buffer size doesn't overflow. Otherwise this could lead to an allocation of a very small buffer compared to what we need, ultimately leading to arbitrary writes later on. | |||||
2016-11-10 | bplist: Prevent out-of-bounds read in plist_from_bin() when parsing offset_table | 1 | -1/+9 | ||
offset_table_index is read from the file, so we have full control over it. This means we can point offset_table essentially anywhere we want, which can lead to an out-of-bounds read when it will be used later on. | |||||
2016-11-10 | bplist: Make sure the index in parse_bin_node_at_index() is actually within ↵ | 1 | -4/+13 | ||
the offset table | |||||
2016-11-10 | bplist: Fix possible out-of-bounds reads in parse_bin_node() with proper ↵ | 1 | -0/+21 | ||
bounds checking | |||||
2016-11-10 | bplist: Fix possible out-of-bounds read in parse_dict_node() with proper ↵ | 1 | -2/+13 | ||
bounds checking | |||||
2016-10-31 | xplist: Prevent UaF when parsing structured nodes failstime64 | 1 | -0/+5 | ||
In case parsing inside `node_from_xml` called from line 842 fails, `data` gets freed by the call to `plist_free` at line 899, since `subnode` is actually created by making it point to `data` at line 684. This commit prevents this situation by bailing out whenever parsing in a deeper level of structured nodes fails. | |||||
2016-10-31 | xplist: Prevent heap buffer overflow when parsing empty tags | 1 | -1/+3 | ||
If `ctx->pos - p - 1` is greater than `taglen`, we end up writing outside the buffer pointed to by `tag`. This commit fixes it by checking the bounds of the heap buffer before writing. | |||||
2016-10-31 | xplist: Prevent NULL pointer dereference when parsing <real> nodes | 1 | -0/+8 | ||
2016-10-31 | base64: Prevent buffer overflow by not decoding blocks with less than 4 chars | 1 | -1/+1 | ||
2016-10-24 | Add pthread detection to configure.ac to get cflags and libs right | 3 | -2/+495 | ||