Compare commits
2 Commits
| Author | SHA256 | Date | |
|---|---|---|---|
| 44f3504960 | |||
| 5a9ad107ea |
24
chmlib-CVE-2025-48172.patch
Normal file
24
chmlib-CVE-2025-48172.patch
Normal file
@@ -0,0 +1,24 @@
|
||||
Index: chmlib-0.40/src/chm_lib.c
|
||||
===================================================================
|
||||
--- chmlib-0.40.orig/src/chm_lib.c
|
||||
+++ chmlib-0.40/src/chm_lib.c
|
||||
@@ -86,6 +86,7 @@
|
||||
#include <sys/types.h>
|
||||
#include <sys/stat.h>
|
||||
#include <fcntl.h>
|
||||
+#include <limits.h>
|
||||
/* #include <dmalloc.h> */
|
||||
#endif
|
||||
|
||||
@@ -570,6 +571,11 @@ static int _unmarshal_lzxc_reset_table(u
|
||||
if (dest->version != 2)
|
||||
return 0;
|
||||
|
||||
+ if (dest->uncompressed_len > INT_MAX || dest->compressed_len > INT_MAX)
|
||||
+ return 0;
|
||||
+ if (dest->block_len == 0 || dest->block_len > INT_MAX)
|
||||
+ return 0;
|
||||
+
|
||||
return 1;
|
||||
}
|
||||
|
||||
@@ -1,3 +1,11 @@
|
||||
-------------------------------------------------------------------
|
||||
Mon Jul 7 10:05:58 UTC 2025 - pgajdos@suse.com
|
||||
|
||||
- security update
|
||||
- added patches
|
||||
CVE-2025-48172 [bsc#1245803], integer overflow in _chm_decompress_block of chm_lib.c can lead to heap buffer overflow
|
||||
+ chmlib-CVE-2025-48172.patch
|
||||
|
||||
-------------------------------------------------------------------
|
||||
Thu Oct 5 09:50:41 UTC 2023 - Dirk Müller <dmueller@suse.com>
|
||||
|
||||
|
||||
@@ -1,7 +1,7 @@
|
||||
#
|
||||
# spec file for package chmlib
|
||||
#
|
||||
# Copyright (c) 2023 SUSE LLC
|
||||
# Copyright (c) 2025 SUSE LLC
|
||||
#
|
||||
# All modifications and additions to the file contributed by third parties
|
||||
# remain the property of their copyright owners, unless otherwise agreed
|
||||
@@ -38,6 +38,8 @@ Patch4: chm_http-bind-localhost.patch
|
||||
Patch5: chm_http-output-server-address.patch
|
||||
# PATCH-FIX-UPSTREAM: https://github.com/jedwing/CHMLib/pull/17
|
||||
Patch6: chmlib-c99.patch
|
||||
# CVE-2025-48172 [bsc#1245803], integer overflow in _chm_decompress_block of chm_lib.c can lead to heap buffer overflow
|
||||
Patch7: chmlib-CVE-2025-48172.patch
|
||||
BuildRequires: gcc-c++
|
||||
|
||||
%description
|
||||
|
||||
Reference in New Issue
Block a user