openSUSE-SU-2020:0163-1

See a problem?
Import Source
https://ftp.suse.com/pub/projects/security/osv/openSUSE-SU-2020:0163-1.json
JSON Data
https://api.test.osv.dev/v1/vulns/openSUSE-SU-2020:0163-1
Related
Published
2020-02-04T09:13:50Z
Modified
2025-05-08T17:45:11.721396Z
Upstream
  • CVE-2019-1010048
Summary
Security update for upx
Details

This update for upx to version 3.96 fixes the following issues:

  • CVE-2019-1010048: Fixed a denial of service in PackLinuxElf32::PackLinuxElf32help1() (boo#1141777).
  • CVE-2019-14296: Fixed a denial of service in canUnpack() (boo#1143839).
  • CVE-2019-20021: Fixed a heap-based buffer over-read in canUnpack() (boo#1159833).
  • CVE-2019-20053: Fixed a denial of service in canUnpack() (boo#1159920).
  • CVE-2018-11243: Fixed a denial of service in PackLinuxElf64::unpack() (boo#1094138).

  • Update to version 3.96

    • Bug fixes: [CVE-2019-1010048, boo#1141777] [CVE-2019-14296, boo#1143839] [CVE-2019-20021, boo#1159833] [CVE-2019-20053, boo#1159920] [CVE-2018-11243 partially - ticket 206 ONLY, boo#1094138]
  • Update to version 3.95
    • Flag --force-pie when ETDYN main program is not marked as DF1PIE
    • Better compatibility with varying layout of address space on Linux
    • Support for 4 PTLOAD layout in ELF generated by binutils-2.31
    • bug fixes, particularly better diagnosis of malformed input
    • bug fixes - see https://github.com/upx/upx/milestone/4
References

Affected packages

openSUSE:Leap 15.1 / upx

Package

Name
upx
Purl
pkg:rpm/opensuse/upx&distro=openSUSE%20Leap%2015.1

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
3.96-lp151.3.3.1

Ecosystem specific

{
    "binaries": [
        {
            "upx": "3.96-lp151.3.3.1"
        }
    ]
}