Lucene search

K
rosalinuxROSA LABROSA-SA-2023-2260
HistoryOct 22, 2023 - 5:19 a.m.

Advisory ROSA-SA-2023-2260

2023-10-2205:19:12
ROSA LAB
abf.rosalinux.ru
6
security
upx
rosa-chrome
medium severity
high severity
heap buffer overflow
segmentation error

7 High

AI Score

Confidence

High

0.001 Low

EPSS

Percentile

31.4%

software: upx 4.0.2
OS: ROSA-CHROME

package_evr_string: upx-4.0.2-1.src.rpm

CVE-ID: CVE-2019-20805
BDU-ID: None
CVE-Crit: MEDIUM
CVE-DESC.: p_lx_elf.cpp in UPX before version 3.96 has an integer overflow during unpacking via created values in the PT_DYNAMIC segment.
CVE-STATUS: Fixed
CVE-REV: To close, run the command: sudo dnf update upx

CVE-ID: CVE-2020-27787
BDU-ID: None
CVE-Crit: MEDIUM
CVE-DESC.: A segmentation error was detected in UPX in the invert_pt_dynamic() function in p_lx_elf.cpp. An attacker using the created input file allows access to an invalid memory address, which may result in a denial of service.
CVE-STATUS: Fixed
CVE-REV: To close, run the command: sudo dnf update upx

CVE-ID: CVE-2020-27788
BDU-ID: None
CVE-Crit: MEDIUM
CVE-DESC.: An out-of-bounds read access vulnerability was discovered in UPX in the PackLinuxElf64::canPack() function of the p_lx_elf.cpp file. An attacker with a crafted input file could cause this issue, which could cause a crash leading to a denial of service.
CVE-STATUS: Fixed
CVE-REV: To close, run the command: sudo dnf update upx

CVE-ID: CVE-2020-27790
BDU-ID: None
CVE-Crit: MEDIUM
CVE-DESC.: A floating-point exception problem was discovered in UPX in the PackLinuxElf64::invert_pt_dynamic() function of the p_lx_elf.cpp file. An attacker with a crafted input file can cause this problem, which can cause a crash leading to a denial of service. The biggest impact is accessibility.

CVE-STATUS: Fixed
CVE-REV: To close, run the command: sudo dnf update upx

CVE-ID: CVE-2021-43311
BDU-ID: None
CVE-Crit: HIGH
CVE-DESC.: A heap buffer overflow was detected in upx when the shared pointer “p” points to an unreachable address in get_le32(). The problem essentially occurs in PackLinuxElf32::elf_lookup() at p_lx_elf.cpp:5382.
CVE-STATUS: Fixed
CVE-REV: To close, run the command: sudo dnf update upx

CVE-ID: CVE-2021-43312
BDU-ID: None
CVE-Crit: HIGH
CVE-DESC.: A heap buffer overflow was detected in upx when the “bucket” variable points to an unreachable address. The problem occurs in the PackLinuxElf64::invert_pt_dynamic function at p_lx_elf.cpp:5239.
CVE-STATUS: Fixed
CVE-REV: To close, run the command: sudo dnf update upx

CVE-ID: CVE-2021-43313
BDU-ID: None
CVE-Crit: HIGH
CVE-DESC.: A heap buffer overflow was detected in upx when the “bucket” variable points to an unreachable address. The problem occurs in the PackLinuxElf32::invert_pt_dynamic function at p_lx_elf.cpp:1688.
CVE-STATUS: Fixed
CVE-REV: To close, run the command: sudo dnf update upx

CVE-ID: CVE-2021-43314
BDU-ID: None
CVE-Crit: HIGH
CVE-DESC.: A heap buffer overflow was detected in upx when the shared pointer “p” points to an unreachable address in get_le32(). The problem essentially occurs in PackLinuxElf32::elf_lookup() at p_lx_elf.cpp:5368.
CVE-STATUS: Fixed
CVE-REV: To close, run the command: sudo dnf update upx

CVE-ID: CVE-2021-43315
BDU-ID: None
CVE-Crit: HIGH
CVE-DESC.: A heap buffer overflow was detected in upx when the shared pointer “p” points to an unreachable address in get_le32(). The problem essentially occurs in PackLinuxElf32::elf_lookup() at p_lx_elf.cpp:5349.
CVE-STATUS: Fixed
CVE-REV: To close, run the command: sudo dnf update upx

CVE-ID: CVE-2021-43316
BDU-ID: None
CVE-Crit: HIGH
CVE-DESC.: A heap buffer overflow was detected in upx when the shared pointer “p” points to an unreachable address in get_le64().
CVE-STATUS: Fixed
CVE-REV: To close, run the command: sudo dnf update upx

CVE-ID: CVE-2021-43317
BDU-ID: None
CVE-Crit: HIGH
CVE-DESC.: A heap buffer overflow was detected in upx when the shared pointer “p” points to an unreachable address in get_le32(). The problem essentially occurs in PackLinuxElf64::elf_lookup() at p_lx_elf.cpp:5404.
CVE-STATUS: Fixed
CVE-REV: To close, run the command: sudo dnf update upx

CVE-ID: CVE-2023-23456
BDU-ID: None
CVE-Crit: MEDIUM
CVE-DESC.: A heap buffer overflow problem was discovered in UPX in PackTmt::pack() in p_tmt.cpp. This thread allows an attacker to cause a denial of service (interrupt) using the file created.
CVE-STATUS: Fixed
CVE-REV: To close, run the command: sudo dnf update upx

CVE-ID: CVE-2023-23457
BDU-ID: None
CVE-Crit: MEDIUM
CVE-DESC.: A segmentation error was detected in UPX in PackLinuxElf64::invert_pt_dynamic() in p_lx_elf.cpp. An attacker using a crafted input file allows access to an invalid memory address, which may result in a denial of service.
CVE-STATUS: Fixed
CVE-REV: To close, run the command: sudo dnf update upx

OSVersionArchitecturePackageVersionFilename
ROSAanynoarchupx< 4.0.2UNKNOWN

7 High

AI Score

Confidence

High

0.001 Low

EPSS

Percentile

31.4%