You are here
Home > Preporuke > Sigurnosni nedostaci programskog paketa upx

Sigurnosni nedostaci programskog paketa upx

  • Detalji os-a: WN7
  • Važnost: IMP
  • Operativni sustavi: L
  • Kategorije: LFE

——————————————————————————–
Fedora Update Notification
FEDORA-2020-67590fbf08
2020-02-07 01:50:13.851550
——————————————————————————–

Name : upx
Product : Fedora 31
Version : 3.96
Release : 2.fc31
URL : http://upx.sourceforge.net/
Summary : Ultimate Packer for eXecutables
Description :
UPX is a free, portable, extendable, high-performance executable
packer for several different executable formats. It achieves an
excellent compression ratio and offers very fast decompression. Your
executables suffer no memory overhead or other drawbacks.

——————————————————————————–
Update Information:

3.96, multiple security fixes. —- Patch for CVE-2019-20021
——————————————————————————–
ChangeLog:

* Fri Jan 24 2020 Gwyn Ciesla <gwync@protonmail.com> – 3.96-2
– EVR bump for koji issue.
* Fri Jan 24 2020 Gwyn Ciesla <gwync@protonmail.com> – 3.96-1
– 3.96
* Fri Jan 17 2020 Gwyn Ciesla <gwync@protonmail.com> – 3.95-5
– Upstream patch for CVE-2019-20021
——————————————————————————–
References:

[ 1 ] Bug #1792327 – CVE-2019-20021 upx: heap-based buffer overflow in canUnpack in p_mach.cpp [fedora-all]
https://bugzilla.redhat.com/show_bug.cgi?id=1792327
[ 2 ] Bug #1581264 – CVE-2018-11243 upx: Double-free in PackLinuxElf64::unpack in p_lx_elf.cpp allows denial of service [fedora-all]
https://bugzilla.redhat.com/show_bug.cgi?id=1581264
[ 3 ] Bug #1794720 – CVE-2019-20051 upx: floating point exception in PackLinuxElf::elf_hash in p_lx_elf.cpp [epel-7]
https://bugzilla.redhat.com/show_bug.cgi?id=1794720
[ 4 ] Bug #1794722 – CVE-2019-20051 upx: floating point exception in PackLinuxElf::elf_hash in p_lx_elf.cpp [epel-8]
https://bugzilla.redhat.com/show_bug.cgi?id=1794722
[ 5 ] Bug #1794721 – CVE-2019-20051 upx: floating point exception in PackLinuxElf::elf_hash in p_lx_elf.cpp [fedora-all]
https://bugzilla.redhat.com/show_bug.cgi?id=1794721
[ 6 ] Bug #1792328 – CVE-2019-20021 upx: heap-based buffer overflow in canUnpack in p_mach.cpp [epel-7]
https://bugzilla.redhat.com/show_bug.cgi?id=1792328
[ 7 ] Bug #1581263 – CVE-2018-11243 upx: Double-free in PackLinuxElf64::unpack in p_lx_elf.cpp allows denial of service [epel-7]
https://bugzilla.redhat.com/show_bug.cgi?id=1581263
[ 8 ] Bug #1792329 – CVE-2019-20021 upx: heap-based buffer overflow in canUnpack in p_mach.cpp [epel-8]
https://bugzilla.redhat.com/show_bug.cgi?id=1792329
——————————————————————————–

This update can be installed with the “dnf” update program. Use
su -c ‘dnf upgrade –advisory FEDORA-2020-67590fbf08’ at the command
line. For more information, refer to the dnf documentation available at
http://dnf.readthedocs.io/en/latest/command_ref.html#upgrade-command-label

All packages are signed with the Fedora Project GPG key. More details on the
GPG keys used by the Fedora Project can be found at
https://fedoraproject.org/keys
——————————————————————————–
_______________________________________________
package-announce mailing list — package-announce@lists.fedoraproject.org
To unsubscribe send an email to package-announce-leave@lists.fedoraproject.org
Fedora Code of Conduct: https://docs.fedoraproject.org/en-US/project/code-of-conduct/
List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
List Archives: https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org

AutorVlatka Misic
Cert idNCERT-REF-2020-02-0001-ADV
CveCERT-CVE-DUMMY
ID izvornikaCERT-ORIGID-DUMMY
ProizvodCERT-DUMMY-PRODUCT
IzvorAdobe
Top
More in Preporuke
Sigurnosni nedostaci programskog paketa xar

Otkriveni su sigurnosni nedostaci u programskom paketu xar za operacijski sustav Fedora. Otkriveni nedostaci potencijalnim napadačima omogućuju izvršavanje proizvoljnog programskog...

Close