Fedora 31: upx FEDORA-2020-67590fbf08
Summary
UPX is a free, portable, extendable, high-performance executable
packer for several different executable formats. It achieves an
excellent compression ratio and offers very fast decompression. Your
executables suffer no memory overhead or other drawbacks.
3.96, multiple security fixes. ---- Patch for CVE-2019-20021
* Fri Jan 24 2020 Gwyn Ciesla
- EVR bump for koji issue.
* Fri Jan 24 2020 Gwyn Ciesla
- 3.96
* Fri Jan 17 2020 Gwyn Ciesla
- Upstream patch for CVE-2019-20021
[ 1 ] Bug #1792327 - CVE-2019-20021 upx: heap-based buffer overflow in canUnpack in p_mach.cpp [fedora-all]
https://bugzilla.redhat.com/show_bug.cgi?id=1792327
[ 2 ] Bug #1581264 - CVE-2018-11243 upx: Double-free in PackLinuxElf64::unpack in p_lx_elf.cpp allows denial of service [fedora-all]
https://bugzilla.redhat.com/show_bug.cgi?id=1581264
[ 3 ] Bug #1794720 - CVE-2019-20051 upx: floating point exception in PackLinuxElf::elf_hash in p_lx_elf.cpp [epel-7]
https://bugzilla.redhat.com/show_bug.cgi?id=1794720
[ 4 ] Bug #1794722 - CVE-2019-20051 upx: floating point exception in PackLinuxElf::elf_hash in p_lx_elf.cpp [epel-8]
https://bugzilla.redhat.com/show_bug.cgi?id=1794722
[ 5 ] Bug #1794721 - CVE-2019-20051 upx: floating point exception in PackLinuxElf::elf_hash in p_lx_elf.cpp [fedora-all]
https://bugzilla.redhat.com/show_bug.cgi?id=1794721
[ 6 ] Bug #1792328 - CVE-2019-20021 upx: heap-based buffer overflow in canUnpack in p_mach.cpp [epel-7]
https://bugzilla.redhat.com/show_bug.cgi?id=1792328
[ 7 ] Bug #1581263 - CVE-2018-11243 upx: Double-free in PackLinuxElf64::unpack in p_lx_elf.cpp allows denial of service [epel-7]
https://bugzilla.redhat.com/show_bug.cgi?id=1581263
[ 8 ] Bug #1792329 - CVE-2019-20021 upx: heap-based buffer overflow in canUnpack in p_mach.cpp [epel-8]
https://bugzilla.redhat.com/show_bug.cgi?id=1792329
su -c 'dnf upgrade --advisory FEDORA-2020-67590fbf08' at the command
line. For more information, refer to the dnf documentation available at
https://dnf.readthedocs.io/en/latest/command_ref.html
All packages are signed with the Fedora Project GPG key. More details on the
GPG keys used by the Fedora Project can be found at
https://fedoraproject.org/security/
package-announce mailing list -- package-announce@lists.fedoraproject.org
To unsubscribe send an email to package-announce-leave@lists.fedoraproject.org
Fedora Code of Conduct: https://docs.fedoraproject.org/en-US/project/code-of-conduct/
List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
List Archives: https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/
FEDORA-2020-67590fbf08 2020-02-07 01:50:13.851550 Product : Fedora 31 Version : 3.96 Release : 2.fc31 URL : https://upx.github.io/ Summary : Ultimate Packer for eXecutables Description : UPX is a free, portable, extendable, high-performance executable packer for several different executable formats. It achieves an excellent compression ratio and offers very fast decompression. Your executables suffer no memory overhead or other drawbacks. 3.96, multiple security fixes. ---- Patch for CVE-2019-20021 * Fri Jan 24 2020 Gwyn Ciesla - 3.96-2 - EVR bump for koji issue. * Fri Jan 24 2020 Gwyn Ciesla - 3.96-1 - 3.96 * Fri Jan 17 2020 Gwyn Ciesla - 3.95-5 - Upstream patch for CVE-2019-20021 [ 1 ] Bug #1792327 - CVE-2019-20021 upx: heap-based buffer overflow in canUnpack in p_mach.cpp [fedora-all] https://bugzilla.redhat.com/show_bug.cgi?id=1792327 [ 2 ] Bug #1581264 - CVE-2018-11243 upx: Double-free in PackLinuxElf64::unpack in p_lx_elf.cpp allows denial of service [fedora-all] https://bugzilla.redhat.com/show_bug.cgi?id=1581264 [ 3 ] Bug #1794720 - CVE-2019-20051 upx: floating point exception in PackLinuxElf::elf_hash in p_lx_elf.cpp [epel-7] https://bugzilla.redhat.com/show_bug.cgi?id=1794720 [ 4 ] Bug #1794722 - CVE-2019-20051 upx: floating point exception in PackLinuxElf::elf_hash in p_lx_elf.cpp [epel-8] https://bugzilla.redhat.com/show_bug.cgi?id=1794722 [ 5 ] Bug #1794721 - CVE-2019-20051 upx: floating point exception in PackLinuxElf::elf_hash in p_lx_elf.cpp [fedora-all] https://bugzilla.redhat.com/show_bug.cgi?id=1794721 [ 6 ] Bug #1792328 - CVE-2019-20021 upx: heap-based buffer overflow in canUnpack in p_mach.cpp [epel-7] https://bugzilla.redhat.com/show_bug.cgi?id=1792328 [ 7 ] Bug #1581263 - CVE-2018-11243 upx: Double-free in PackLinuxElf64::unpack in p_lx_elf.cpp allows denial of service [epel-7] https://bugzilla.redhat.com/show_bug.cgi?id=1581263 [ 8 ] Bug #1792329 - CVE-2019-20021 upx: heap-based buffer overflow in canUnpack in p_mach.cpp [epel-8] https://bugzilla.redhat.com/show_bug.cgi?id=1792329 su -c 'dnf upgrade --advisory FEDORA-2020-67590fbf08' at the command line. For more information, refer to the dnf documentation available at https://dnf.readthedocs.io/en/latest/command_ref.html All packages are signed with the Fedora Project GPG key. More details on the GPG keys used by the Fedora Project can be found at https://fedoraproject.org/security/ package-announce mailing list -- package-announce@lists.fedoraproject.org To unsubscribe send an email to package-announce-leave@lists.fedoraproject.org Fedora Code of Conduct: https://docs.fedoraproject.org/en-US/project/code-of-conduct/ List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines List Archives: https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/
Change Log
References