Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

suse-cvrf логотип

openSUSE-SU-2023:0088-1

Опубликовано: 11 апр. 2023
Источник: suse-cvrf

Описание

Security update for upx

upx was updated to fix the following issues:

Update to release 4.0.2

  • Fix unpack of ELF x86-64 that failed with 'CantUnpackException: corrupt b_info'
  • Resolve SEGV on PackLinuxElf64::invert_pt_dynamic
  • CVE-2021-30500: Fixed Null pointer dereference in PackLinuxElf:canUnpack() in p_lx_elf.cpp
  • CVE-2021-30501: Fixed Assertion abort in function MemBuffer:alloc()
  • CVE-2021-43311: Fixed Heap-based buffer overflow in PackLinuxElf32:elf_lookup() at p_lx_elf.cpp
  • CVE-2021-43312: Fixed Heap-based buffer overflow in PackLinuxElf64:invert_pt_dynamic at p_lx_elf.cpp:5239
  • CVE-2021-43313: Fixed Heap-based buffer overflow in PackLinuxElf32:invert_pt_dynamic at p_lx_elf.cpp:1688
  • CVE-2021-43314: Fixed Heap-based buffer overflows in PackLinuxElf32:elf_lookup() at p_lx_elf.cp
  • CVE-2021-43315: Fixed Heap-based buffer overflows in PackLinuxElf32:elf_lookup() at p_lx_elf.cp
  • CVE-2021-43316: Fixed Heap-based buffer overflow in func get_le64()
  • CVE-2021-43317: Fixed Heap-based buffer overflows in PackLinuxElf64:elf_lookup() at p_lx_elf.cp
  • CVE-2023-23456: Fixed heap-buffer-overflow in PackTmt:pack()
  • CVE-2023-23457: Fixed SEGV on PackLinuxElf64:invert_pt_dynamic() in p_lx_elf.cpp

Список пакетов

SUSE Package Hub 15 SP4
upx-4.0.2-bp154.4.6.1
openSUSE Leap 15.4
upx-4.0.2-bp154.4.6.1

Описание

A flaw was found in upx canPack in p_lx_elf.cpp in UPX 3.96. This flaw allows attackers to cause a denial of service (SEGV or buffer overflow and application crash) or possibly have unspecified other impacts via a crafted ELF. The highest threat from this vulnerability is to system availability.


Затронутые продукты
SUSE Package Hub 15 SP4:upx-4.0.2-bp154.4.6.1
openSUSE Leap 15.4:upx-4.0.2-bp154.4.6.1

Ссылки

Описание

Null pointer dereference was found in upx PackLinuxElf::canUnpack() in p_lx_elf.cpp,in version UPX 4.0.0. That allow attackers to execute arbitrary code and cause a denial of service via a crafted file.


Затронутые продукты
SUSE Package Hub 15 SP4:upx-4.0.2-bp154.4.6.1
openSUSE Leap 15.4:upx-4.0.2-bp154.4.6.1

Ссылки

Описание

An assertion abort was found in upx MemBuffer::alloc() in mem.cpp, in version UPX 4.0.0. The flow allows attackers to cause a denial of service (abort) via a crafted file.


Затронутые продукты
SUSE Package Hub 15 SP4:upx-4.0.2-bp154.4.6.1
openSUSE Leap 15.4:upx-4.0.2-bp154.4.6.1

Ссылки

Описание

A heap-based buffer overflow was discovered in upx, during the generic pointer 'p' points to an inaccessible address in func get_le32(). The problem is essentially caused in PackLinuxElf32::elf_lookup() at p_lx_elf.cpp:5382.


Затронутые продукты
SUSE Package Hub 15 SP4:upx-4.0.2-bp154.4.6.1
openSUSE Leap 15.4:upx-4.0.2-bp154.4.6.1

Ссылки

Описание

A heap-based buffer overflow was discovered in upx, during the variable 'bucket' points to an inaccessible address. The issue is being triggered in the function PackLinuxElf64::invert_pt_dynamic at p_lx_elf.cpp:5239.


Затронутые продукты
SUSE Package Hub 15 SP4:upx-4.0.2-bp154.4.6.1
openSUSE Leap 15.4:upx-4.0.2-bp154.4.6.1

Ссылки

Описание

A heap-based buffer overflow was discovered in upx, during the variable 'bucket' points to an inaccessible address. The issue is being triggered in the function PackLinuxElf32::invert_pt_dynamic at p_lx_elf.cpp:1688.


Затронутые продукты
SUSE Package Hub 15 SP4:upx-4.0.2-bp154.4.6.1
openSUSE Leap 15.4:upx-4.0.2-bp154.4.6.1

Ссылки

Описание

A heap-based buffer overflows was discovered in upx, during the generic pointer 'p' points to an inaccessible address in func get_le32(). The problem is essentially caused in PackLinuxElf32::elf_lookup() at p_lx_elf.cpp:5368


Затронутые продукты
SUSE Package Hub 15 SP4:upx-4.0.2-bp154.4.6.1
openSUSE Leap 15.4:upx-4.0.2-bp154.4.6.1

Ссылки

Описание

A heap-based buffer overflows was discovered in upx, during the generic pointer 'p' points to an inaccessible address in func get_le32(). The problem is essentially caused in PackLinuxElf32::elf_lookup() at p_lx_elf.cpp:5349


Затронутые продукты
SUSE Package Hub 15 SP4:upx-4.0.2-bp154.4.6.1
openSUSE Leap 15.4:upx-4.0.2-bp154.4.6.1

Ссылки

Описание

A heap-based buffer overflow was discovered in upx, during the generic pointer 'p' points to an inaccessible address in func get_le64().


Затронутые продукты
SUSE Package Hub 15 SP4:upx-4.0.2-bp154.4.6.1
openSUSE Leap 15.4:upx-4.0.2-bp154.4.6.1

Ссылки

Описание

A heap-based buffer overflows was discovered in upx, during the generic pointer 'p' points to an inaccessible address in func get_le32(). The problem is essentially caused in PackLinuxElf64::elf_lookup() at p_lx_elf.cpp:5404


Затронутые продукты
SUSE Package Hub 15 SP4:upx-4.0.2-bp154.4.6.1
openSUSE Leap 15.4:upx-4.0.2-bp154.4.6.1

Ссылки

Описание

A heap-based buffer overflow issue was discovered in UPX in PackTmt::pack() in p_tmt.cpp file. The flow allows an attacker to cause a denial of service (abort) via a crafted file.


Затронутые продукты
SUSE Package Hub 15 SP4:upx-4.0.2-bp154.4.6.1
openSUSE Leap 15.4:upx-4.0.2-bp154.4.6.1

Ссылки

Описание

A Segmentation fault was found in UPX in PackLinuxElf64::invert_pt_dynamic() in p_lx_elf.cpp. An attacker with a crafted input file allows invalid memory address access that could lead to a denial of service.


Затронутые продукты
SUSE Package Hub 15 SP4:upx-4.0.2-bp154.4.6.1
openSUSE Leap 15.4:upx-4.0.2-bp154.4.6.1

Ссылки
Уязвимость openSUSE-SU-2023:0088-1