[USN-3728-1] libmspack vulnerabilities


–===============2283396726613382186==
Content-Type: multipart/signed; micalg=”pgp-sha256″;
protocol=”application/pgp-signature”; boundary=”=-wdzH7G1PXOZahrBtHNF/”

–=-wdzH7G1PXOZahrBtHNF/
Content-Type: text/plain; charset=”UTF-8″
Content-Transfer-Encoding: quoted-printable

=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=
=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=
=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D
Ubuntu Security Notice USN-3728-1
August 01, 2018

libmspack vulnerabilities
=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=
=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=
=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D

A security issue affects these releases of Ubuntu and its derivatives:

– Ubuntu 18.04 LTS
– Ubuntu 16.04 LTS

Summary:

Several security issues were fixed in libmspack.

Software Description:
– libmspack: library for Microsoft compression formats

Details:

Hanno B=C3=B6ck discovered that libmspack incorrectly handled certain CHM
files. An attacker could possibly use this issue to cause a denial of
service. (CVE-2018-14679, CVE-2018-14680)

Jakub Wilk discovered that libmspack incorrectly handled certain KWAJ
files. An attacker could possibly use this issue to execute arbitrary
code. (CVE-2018-14681)

Dmitry Glavatskikh discovered that libmspack incorrectly certain CHM
files. An attacker could possibly use this issue to execute arbitrary
code. (CVE-2018-14682)

Update instructions:

The problem can be corrected by updating your system to the following
package versions:

Ubuntu 18.04 LTS:
=C2=A0 libmspack0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=
=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=
0.6-3ubuntu0.1

Ubuntu 16.04 LTS:
=C2=A0 libmspack0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=
=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=
0.5-1ubuntu0.16.04.2

In general, a standard system update will make all the necessary
changes.

References:
=C2=A0 https://usn.ubuntu.com/usn/usn-3728-1
=C2=A0 CVE-2018-14679, CVE-2018-14680, CVE-2018-14681, CVE-2018-14682

Package Information:
=C2=A0 https://launchpad.net/ubuntu/+source/libmspack/0.6-3ubuntu0.1
=C2=A0 https://launchpad.net/ubuntu/+source/libmspack/0.5-1ubuntu0.16.04.2
–=-wdzH7G1PXOZahrBtHNF/
Content-Type: application/pgp-signature; name=”signature.asc”
Content-Description: This is a digitally signed message part
Content-Transfer-Encoding: 7bit

—–BEGIN PGP SIGNATURE—–
Version: GnuPG v2

iQIcBAABCAAGBQJbYgnuAAoJEEW851uECx9p0wkQALgLhcsL2MKd1wxNt2oFQYdc
BsO09O8qdzgyDeHFsV2cfmWAkMdJrQ69l+0wiOwAFWHHw5w3wV4YeH5n6iv+Fche
V25MBNNORE08fZbs7CjyVm0eY9iT8P6gbc3PVImdCQyTZHL8Gl0P47LxEpPwTTSO
JcFVkcBN8IbvrHfEeDky1Gqx2HQIZohejkOzG9uBobUeuua8LJPqeVFATfXm1q7/
1fK+X/LtEGPijZRBD+6Bt6ol1GtykQtCdWHb46ZIr5cAHQAUpeG7NfYdDufWKZO+
Mrtdz5Lnbxlb+fiWTJvcYrlKkOrPcoNdAKVRcDRvlqfhdhNBhsXscKjaazDNg3AA
2EjWgR4/9dElmwh4KXcTSdxAGdORpNXG/IQ7+ROOuGxY76JGJ2Y2BRf/6vXgCZvK
Wfupg/xoxpDxhGDVsEzP2ayKy8M7t4dxTmqkcPkVk68ZXoYZeiSczVUMllR/Ga/A
rQowLAamY4xELZyG9awueHeF7ui6+iF6dfAX1i3qbYu4YiKXTC3NSQHhbyvC4paf
j0PNvb+h17urtOJT/abv6OqV+V1YKv6yl2BNli5eKcCAgv5benF9u+YSvrjK1ZYG
s2bSczvdV+9wZjsIDrMr3CA6u1ZVVQxZ1vIGRAUjX4CV98hZT/HW/yo648NftzYV
ZRAeoRpkxJj8JokUqfc2
=KDnv
—–END PGP SIGNATURE—–

–=-wdzH7G1PXOZahrBtHNF/–

–===============2283396726613382186==
Content-Type: text/plain; charset=”utf-8″
MIME-Version: 1.0
Content-Transfer-Encoding: base64
Content-Disposition: inline

LS0gCnVidW50dS1zZWN1cml0eS1hbm5vdW5jZSBtYWlsaW5nIGxpc3QKdWJ1bnR1LXNlY3VyaXR5
LWFubm91bmNlQGxpc3RzLnVidW50dS5jb20KTW9kaWZ5IHNldHRpbmdzIG9yIHVuc3Vic2NyaWJl
IGF0OiBodHRwczovL2xpc3RzLnVidW50dS5jb20vbWFpbG1hbi9saXN0aW5mby91YnVudHUtc2Vj
dXJpdHktYW5ub3VuY2UK

–===============2283396726613382186==–