MGASA-2020-0096

Source
https://advisories.mageia.org/MGASA-2020-0096.html
Import Source
https://advisories.mageia.org/MGASA-2020-0096.json
JSON Data
https://api.test.osv.dev/v1/vulns/MGASA-2020-0096
Related
Published
2020-02-24T21:44:46Z
Modified
2020-02-24T21:20:25Z
Summary
Updated upx packages fix security vulnerabilities
Details

The updated packages fix security vulnerabilities:

PackLinuxElf64::unpack in plxelf.cpp in UPX 3.95 allows remote attackers to cause a denial of service (double free), limit the ability of a malware scanner to operate on the entire original data, or possibly have unspecified other impact via a crafted file. (CVE-2018-11243)

A heap-based buffer over-read was discovered in canUnpack in p_mach.cpp in UPX 3.95 via a crafted Mach-O file. (CVE-2019-20021)

A floating-point exception was discovered in PackLinuxElf::elfhash in plx_elf.cpp in UPX 3.95. The vulnerability causes an application crash, which leads to denial of service. (CVE-2019-20051)

An invalid memory address dereference was discovered in the canUnpack function in p_mach.cpp in UPX 3.95 via a crafted Mach-O file. (CVE-2019-20053)

A denial of service in PackLinuxElf32::PackLinuxElf32help1(). (CVE-2019-1010048)

References
Credits

Affected packages

Mageia:7 / upx

Package

Name
upx
Purl
pkg:rpm/mageia/upx?distro=mageia-7

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
3.96-1.mga7

Ecosystem specific

{
    "section": "core"
}

Mageia:7 / ucl

Package

Name
ucl
Purl
pkg:rpm/mageia/ucl?distro=mageia-7

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
1.03-16.1.mga7

Ecosystem specific

{
    "section": "core"
}