Updated upx packages fix security vulnerabilities
Publication date: 24 Feb 2020Modification date: 24 Feb 2020
Type: security
Affected Mageia releases : 7
CVE: CVE-2018-11243 , CVE-2019-20021 , CVE-2019-20051 , CVE-2019-20053 , CVE-2019-1010048
Description
The updated packages fix security vulnerabilities: PackLinuxElf64::unpack in p_lx_elf.cpp in UPX 3.95 allows remote attackers to cause a denial of service (double free), limit the ability of a malware scanner to operate on the entire original data, or possibly have unspecified other impact via a crafted file. (CVE-2018-11243) A heap-based buffer over-read was discovered in canUnpack in p_mach.cpp in UPX 3.95 via a crafted Mach-O file. (CVE-2019-20021) A floating-point exception was discovered in PackLinuxElf::elf_hash in p_lx_elf.cpp in UPX 3.95. The vulnerability causes an application crash, which leads to denial of service. (CVE-2019-20051) An invalid memory address dereference was discovered in the canUnpack function in p_mach.cpp in UPX 3.95 via a crafted Mach-O file. (CVE-2019-20053) A denial of service in PackLinuxElf32::PackLinuxElf32help1(). (CVE-2019-1010048)
References
- https://bugs.mageia.org/show_bug.cgi?id=26172
- https://lists.opensuse.org/opensuse-updates/2020-02/msg00012.html
- https://lists.opensuse.org/opensuse-updates/2020-02/msg00006.html
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/thread/D7XU42G6MUQQXHWRP7DCF2JSIBOJ5GOO/
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-11243
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-20021
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-20051
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-20053
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-1010048
SRPMS
7/core
- upx-3.96-1.mga7
- ucl-1.03-16.1.mga7