--------------------------------------------------------------------------------Fedora Update Notification
FEDORA-2020-20cf0743f5
2020-02-03 01:02:24.438470
--------------------------------------------------------------------------------Name        : upx
Product     : Fedora 30
Version     : 3.96
Release     : 1.fc30
URL         : https://upx.github.io/
Summary     : Ultimate Packer for eXecutables
Description :
UPX is a free, portable, extendable, high-performance executable
packer for several different executable formats. It achieves an
excellent compression ratio and offers very fast decompression. Your
executables suffer no memory overhead or other drawbacks.

--------------------------------------------------------------------------------Update Information:

3.96, multiple security fixes.  ----  Patch for CVE-2019-20021
--------------------------------------------------------------------------------ChangeLog:

* Fri Jan 24 2020 Gwyn Ciesla  - 3.96-1
- 3.96
* Fri Jan 17 2020 Gwyn Ciesla  - 3.95-5
- Upstream patch for CVE-2019-20021
* Thu Aug  1 2019 Gwyn Ciesla  - 3.95-4
- Upstream patches for CVE-2019-14295 and CVE-2019-14296.
* Sat Jul 27 2019 Fedora Release Engineering  - 3.95-3
- Rebuilt for https://fedoraproject.org/wiki/Fedora_31_Mass_Rebuild
--------------------------------------------------------------------------------References:

  [ 1 ] Bug #1792327 - CVE-2019-20021 upx: heap-based buffer overflow in canUnpack in p_mach.cpp [fedora-all]
        https://bugzilla.redhat.com/show_bug.cgi?id=1792327
  [ 2 ] Bug #1581264 - CVE-2018-11243 upx: Double-free in PackLinuxElf64::unpack in p_lx_elf.cpp allows denial of service [fedora-all]
        https://bugzilla.redhat.com/show_bug.cgi?id=1581264
  [ 3 ] Bug #1794720 - CVE-2019-20051 upx: floating point exception in PackLinuxElf::elf_hash in p_lx_elf.cpp [epel-7]
        https://bugzilla.redhat.com/show_bug.cgi?id=1794720
  [ 4 ] Bug #1794722 - CVE-2019-20051 upx: floating point exception in PackLinuxElf::elf_hash in p_lx_elf.cpp [epel-8]
        https://bugzilla.redhat.com/show_bug.cgi?id=1794722
  [ 5 ] Bug #1794721 - CVE-2019-20051 upx: floating point exception in PackLinuxElf::elf_hash in p_lx_elf.cpp [fedora-all]
        https://bugzilla.redhat.com/show_bug.cgi?id=1794721
  [ 6 ] Bug #1792328 - CVE-2019-20021 upx: heap-based buffer overflow in canUnpack in p_mach.cpp [epel-7]
        https://bugzilla.redhat.com/show_bug.cgi?id=1792328
  [ 7 ] Bug #1581263 - CVE-2018-11243 upx: Double-free in PackLinuxElf64::unpack in p_lx_elf.cpp allows denial of service [epel-7]
        https://bugzilla.redhat.com/show_bug.cgi?id=1581263
  [ 8 ] Bug #1792329 - CVE-2019-20021 upx: heap-based buffer overflow in canUnpack in p_mach.cpp [epel-8]
        https://bugzilla.redhat.com/show_bug.cgi?id=1792329
--------------------------------------------------------------------------------This update can be installed with the "dnf" update program. Use
su -c 'dnf upgrade --advisory FEDORA-2020-20cf0743f5' at the command
line. For more information, refer to the dnf documentation available at
https://dnf.readthedocs.io/en/latest/command_ref.html

All packages are signed with the Fedora Project GPG key. More details on the
GPG keys used by the Fedora Project can be found at
https://fedoraproject.org/security/
--------------------------------------------------------------------------------_______________________________________________
package-announce mailing list -- package-announce@lists.fedoraproject.org
To unsubscribe send an email to package-announce-leave@lists.fedoraproject.org
Fedora Code of Conduct: https://docs.fedoraproject.org/en-US/project/code-of-conduct/
List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
List Archives: https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org

Fedora 30: upx FEDORA-2020-20cf0743f5

February 2, 2020
3.96, multiple security fixes

Summary

UPX is a free, portable, extendable, high-performance executable

packer for several different executable formats. It achieves an

excellent compression ratio and offers very fast decompression. Your

executables suffer no memory overhead or other drawbacks.

3.96, multiple security fixes. ---- Patch for CVE-2019-20021

* Fri Jan 24 2020 Gwyn Ciesla - 3.96-1

- 3.96

* Fri Jan 17 2020 Gwyn Ciesla - 3.95-5

- Upstream patch for CVE-2019-20021

* Thu Aug 1 2019 Gwyn Ciesla - 3.95-4

- Upstream patches for CVE-2019-14295 and CVE-2019-14296.

* Sat Jul 27 2019 Fedora Release Engineering - 3.95-3

- Rebuilt for https://fedoraproject.org/wiki/Fedora_31_Mass_Rebuild

[ 1 ] Bug #1792327 - CVE-2019-20021 upx: heap-based buffer overflow in canUnpack in p_mach.cpp [fedora-all]

https://bugzilla.redhat.com/show_bug.cgi?id=1792327

[ 2 ] Bug #1581264 - CVE-2018-11243 upx: Double-free in PackLinuxElf64::unpack in p_lx_elf.cpp allows denial of service [fedora-all]

https://bugzilla.redhat.com/show_bug.cgi?id=1581264

[ 3 ] Bug #1794720 - CVE-2019-20051 upx: floating point exception in PackLinuxElf::elf_hash in p_lx_elf.cpp [epel-7]

https://bugzilla.redhat.com/show_bug.cgi?id=1794720

[ 4 ] Bug #1794722 - CVE-2019-20051 upx: floating point exception in PackLinuxElf::elf_hash in p_lx_elf.cpp [epel-8]

https://bugzilla.redhat.com/show_bug.cgi?id=1794722

[ 5 ] Bug #1794721 - CVE-2019-20051 upx: floating point exception in PackLinuxElf::elf_hash in p_lx_elf.cpp [fedora-all]

https://bugzilla.redhat.com/show_bug.cgi?id=1794721

[ 6 ] Bug #1792328 - CVE-2019-20021 upx: heap-based buffer overflow in canUnpack in p_mach.cpp [epel-7]

https://bugzilla.redhat.com/show_bug.cgi?id=1792328

[ 7 ] Bug #1581263 - CVE-2018-11243 upx: Double-free in PackLinuxElf64::unpack in p_lx_elf.cpp allows denial of service [epel-7]

https://bugzilla.redhat.com/show_bug.cgi?id=1581263

[ 8 ] Bug #1792329 - CVE-2019-20021 upx: heap-based buffer overflow in canUnpack in p_mach.cpp [epel-8]

https://bugzilla.redhat.com/show_bug.cgi?id=1792329

su -c 'dnf upgrade --advisory FEDORA-2020-20cf0743f5' at the command

line. For more information, refer to the dnf documentation available at

https://dnf.readthedocs.io/en/latest/command_ref.html

All packages are signed with the Fedora Project GPG key. More details on the

GPG keys used by the Fedora Project can be found at

https://fedoraproject.org/security/

package-announce mailing list -- package-announce@lists.fedoraproject.org

To unsubscribe send an email to package-announce-leave@lists.fedoraproject.org

Fedora Code of Conduct: https://docs.fedoraproject.org/en-US/project/code-of-conduct/

List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines

List Archives: https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org

FEDORA-2020-20cf0743f5 2020-02-03 01:02:24.438470 Product : Fedora 30 Version : 3.96 Release : 1.fc30 URL : https://upx.github.io/ Summary : Ultimate Packer for eXecutables Description : UPX is a free, portable, extendable, high-performance executable packer for several different executable formats. It achieves an excellent compression ratio and offers very fast decompression. Your executables suffer no memory overhead or other drawbacks. 3.96, multiple security fixes. ---- Patch for CVE-2019-20021 * Fri Jan 24 2020 Gwyn Ciesla - 3.96-1 - 3.96 * Fri Jan 17 2020 Gwyn Ciesla - 3.95-5 - Upstream patch for CVE-2019-20021 * Thu Aug 1 2019 Gwyn Ciesla - 3.95-4 - Upstream patches for CVE-2019-14295 and CVE-2019-14296. * Sat Jul 27 2019 Fedora Release Engineering - 3.95-3 - Rebuilt for https://fedoraproject.org/wiki/Fedora_31_Mass_Rebuild [ 1 ] Bug #1792327 - CVE-2019-20021 upx: heap-based buffer overflow in canUnpack in p_mach.cpp [fedora-all] https://bugzilla.redhat.com/show_bug.cgi?id=1792327 [ 2 ] Bug #1581264 - CVE-2018-11243 upx: Double-free in PackLinuxElf64::unpack in p_lx_elf.cpp allows denial of service [fedora-all] https://bugzilla.redhat.com/show_bug.cgi?id=1581264 [ 3 ] Bug #1794720 - CVE-2019-20051 upx: floating point exception in PackLinuxElf::elf_hash in p_lx_elf.cpp [epel-7] https://bugzilla.redhat.com/show_bug.cgi?id=1794720 [ 4 ] Bug #1794722 - CVE-2019-20051 upx: floating point exception in PackLinuxElf::elf_hash in p_lx_elf.cpp [epel-8] https://bugzilla.redhat.com/show_bug.cgi?id=1794722 [ 5 ] Bug #1794721 - CVE-2019-20051 upx: floating point exception in PackLinuxElf::elf_hash in p_lx_elf.cpp [fedora-all] https://bugzilla.redhat.com/show_bug.cgi?id=1794721 [ 6 ] Bug #1792328 - CVE-2019-20021 upx: heap-based buffer overflow in canUnpack in p_mach.cpp [epel-7] https://bugzilla.redhat.com/show_bug.cgi?id=1792328 [ 7 ] Bug #1581263 - CVE-2018-11243 upx: Double-free in PackLinuxElf64::unpack in p_lx_elf.cpp allows denial of service [epel-7] https://bugzilla.redhat.com/show_bug.cgi?id=1581263 [ 8 ] Bug #1792329 - CVE-2019-20021 upx: heap-based buffer overflow in canUnpack in p_mach.cpp [epel-8] https://bugzilla.redhat.com/show_bug.cgi?id=1792329 su -c 'dnf upgrade --advisory FEDORA-2020-20cf0743f5' at the command line. For more information, refer to the dnf documentation available at https://dnf.readthedocs.io/en/latest/command_ref.html All packages are signed with the Fedora Project GPG key. More details on the GPG keys used by the Fedora Project can be found at https://fedoraproject.org/security/ package-announce mailing list -- package-announce@lists.fedoraproject.org To unsubscribe send an email to package-announce-leave@lists.fedoraproject.org Fedora Code of Conduct: https://docs.fedoraproject.org/en-US/project/code-of-conduct/ List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines List Archives: https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org

Change Log

References

Update Instructions

Severity
Product : Fedora 30
Version : 3.96
Release : 1.fc30
URL : https://upx.github.io/
Summary : Ultimate Packer for eXecutables

Related News

News

Powered By

Footer Logo

Linux Security - Your source for Top Linux News, Advisories, HowTo's and Feature Release.

Powered By

Footer Logo