File _patchinfo of Package patchinfo.9244
<patchinfo incident="9244">
<issue tracker="bnc" id="1130489">Please enable build time tests of libmspack</issue>
<issue tracker="bnc" id="1141680">buffer overflow in chmd_read_headers() in libmspack leads to information disclosure</issue>
<issue tracker="bnc" id="1113038">VUL-1: CVE-2018-18584: libmspack: CAB block input buffer extended by one byte to allow extra byte added after the block by cabd_sys_read_block</issue>
<issue tracker="bnc" id="1113039">VUL-1: CVE-2018-18585: libmspack: chmd_read_headers() reject files with blank filenames,</issue>
<issue tracker="cve" id="2018-18584"/>
<issue tracker="cve" id="2018-18585"/>
<issue tracker="cve" id="2019-1010305"/>
<category>security</category>
<rating>moderate</rating>
<packager>mcalabkova</packager>
<description>This update for libmspack fixes the following issues:
Security issues fixed:
- CVE-2019-1010305: Fixed a buffer overflow triggered by a crafted chm file
which could have led to information disclosure (bsc#1141680).
- CVE-2018-18584: The CAB block input buffer was one byte too small for the
maximal Quantum block, leading to an out-of-bounds write. (bsc#1113038)
- CVE-2018-18585: chmd_read_headers accepted a filename that has '\0' as its
first or second character (such as the "/\0" name). (bsc#1113039)
- Fix off-by-one bounds check on CHM PMGI/PMGL chunk numbers and reject empty filenames.
</description>
<summary>Security update for libmspack</summary>
</patchinfo>