2 Commits

Author SHA256 Message Date
44f3504960 Accepting request 1291444 from X11:common:Factory
OBS-URL: https://build.opensuse.org/request/show/1291444
OBS-URL: https://build.opensuse.org/package/show/openSUSE:Factory/chmlib?expand=0&rev=23
2025-07-09 15:28:57 +00:00
5a9ad107ea Accepting request 1291013 from home:pgajdos
- security update
- added patches
  CVE-2025-48172 [bsc#1245803], integer overflow in _chm_decompress_block of chm_lib.c can lead to heap buffer overflow
  + chmlib-CVE-2025-48172.patch

OBS-URL: https://build.opensuse.org/request/show/1291013
OBS-URL: https://build.opensuse.org/package/show/X11:common:Factory/chmlib?expand=0&rev=17
2025-07-09 08:59:44 +00:00
3 changed files with 35 additions and 1 deletions

View File

@@ -0,0 +1,24 @@
Index: chmlib-0.40/src/chm_lib.c
===================================================================
--- chmlib-0.40.orig/src/chm_lib.c
+++ chmlib-0.40/src/chm_lib.c
@@ -86,6 +86,7 @@
#include <sys/types.h>
#include <sys/stat.h>
#include <fcntl.h>
+#include <limits.h>
/* #include <dmalloc.h> */
#endif
@@ -570,6 +571,11 @@ static int _unmarshal_lzxc_reset_table(u
if (dest->version != 2)
return 0;
+ if (dest->uncompressed_len > INT_MAX || dest->compressed_len > INT_MAX)
+ return 0;
+ if (dest->block_len == 0 || dest->block_len > INT_MAX)
+ return 0;
+
return 1;
}

View File

@@ -1,3 +1,11 @@
-------------------------------------------------------------------
Mon Jul 7 10:05:58 UTC 2025 - pgajdos@suse.com
- security update
- added patches
CVE-2025-48172 [bsc#1245803], integer overflow in _chm_decompress_block of chm_lib.c can lead to heap buffer overflow
+ chmlib-CVE-2025-48172.patch
-------------------------------------------------------------------
Thu Oct 5 09:50:41 UTC 2023 - Dirk Müller <dmueller@suse.com>

View File

@@ -1,7 +1,7 @@
#
# spec file for package chmlib
#
# Copyright (c) 2023 SUSE LLC
# Copyright (c) 2025 SUSE LLC
#
# All modifications and additions to the file contributed by third parties
# remain the property of their copyright owners, unless otherwise agreed
@@ -38,6 +38,8 @@ Patch4: chm_http-bind-localhost.patch
Patch5: chm_http-output-server-address.patch
# PATCH-FIX-UPSTREAM: https://github.com/jedwing/CHMLib/pull/17
Patch6: chmlib-c99.patch
# CVE-2025-48172 [bsc#1245803], integer overflow in _chm_decompress_block of chm_lib.c can lead to heap buffer overflow
Patch7: chmlib-CVE-2025-48172.patch
BuildRequires: gcc-c++
%description