<html>
<head>
<base href="https://bugzilla.rosalinux.ru/">
</head>
<body><table border="1" cellspacing="0" cellpadding="8">
<tr>
<th>Platform</th>
<td>2021.1
</td>
</tr>
<tr>
<th>Bug ID</th>
<td><a class="bz_bug_link
bz_status_CONFIRMED "
title="CONFIRMED - [CVE 21] upx 3.95 CVEs found"
href="https://bugzilla.rosalinux.ru/show_bug.cgi?id=13337">13337</a>
</td>
</tr>
<tr>
<th>Summary</th>
<td>[CVE 21] upx 3.95 CVEs found
</td>
</tr>
<tr>
<th>Classification</th>
<td>ROSA-based products
</td>
</tr>
<tr>
<th>Product</th>
<td>ROSA Fresh
</td>
</tr>
<tr>
<th>Version</th>
<td>All
</td>
</tr>
<tr>
<th>Hardware</th>
<td>All
</td>
</tr>
<tr>
<th>URL</th>
<td>CVE-2019-20805, CVE-2020-27787, CVE-2020-27788, CVE-2020-27790, CVE-2021-43311, CVE-2021-43312, CVE-2021-43313, CVE-2021-43314, CVE-2021-43315, CVE-2021-43316, CVE-2021-43317, CVE-2023-23456, CVE-2023-23457,
</td>
</tr>
<tr>
<th>OS</th>
<td>Linux
</td>
</tr>
<tr>
<th>Status</th>
<td>CONFIRMED
</td>
</tr>
<tr>
<th>Severity</th>
<td>normal
</td>
</tr>
<tr>
<th>Priority</th>
<td>Normal
</td>
</tr>
<tr>
<th>Component</th>
<td>System (kernel, glibc, systemd, bash, PAM...)
</td>
</tr>
<tr>
<th>Assignee</th>
<td>bugs@lists.rosalinux.ru
</td>
</tr>
<tr>
<th>Reporter</th>
<td>y.tumanov@rosalinux.ru
</td>
</tr>
<tr>
<th>QA Contact</th>
<td>bugs@lists.rosalinux.ru
</td>
</tr>
<tr>
<th>CC</th>
<td>s.matveev@rosalinux.ru, y.tumanov@rosalinux.ru
</td>
</tr>
<tr>
<th>Target Milestone</th>
<td>---
</td>
</tr>
<tr>
<th>Flags</th>
<td>secteam_verified?
</td>
</tr></table>
<p>
<div>
<pre>Please patch CVEs for package upx version 3.95
INFO (CVEs are): upx 3.95
cves found
CVE-2019-20805
Desc: p_lx_elf.cpp in UPX before 3.96 has an integer overflow during unpacking
via crafted values in a PT_DYNAMIC segment.
Link: <a href="https://nvd.nist.gov/vuln/detail/CVE-2019-20805">https://nvd.nist.gov/vuln/detail/CVE-2019-20805</a>
Severity: MEDIUM
CVE-2020-27787
Desc: A Segmentaation fault was found in UPX in invert_pt_dynamic() function in
p_lx_elf.cpp. An attacker with a crafted input file allows invalid memory
address access that could lead to a denial of service.
Link: <a href="https://nvd.nist.gov/vuln/detail/CVE-2020-27787">https://nvd.nist.gov/vuln/detail/CVE-2020-27787</a>
Severity: MEDIUM
CVE-2020-27788
Desc: An out-of-bounds read access vulnerability was discovered in UPX in
PackLinuxElf64::canPack() function of p_lx_elf.cpp file. An attacker with a
crafted input file could trigger this issue that could cause a crash leading to
a denial of service.
Link: <a href="https://nvd.nist.gov/vuln/detail/CVE-2020-27788">https://nvd.nist.gov/vuln/detail/CVE-2020-27788</a>
Severity: MEDIUM
CVE-2020-27790
Desc: A floating point exception issue was discovered in UPX in
PackLinuxElf64::invert_pt_dynamic() function of p_lx_elf.cpp file. An attacker
with a crafted input file could trigger this issue that could cause a crash
leading to a denial of service. The highest impact is to Availability.
Link: <a href="https://nvd.nist.gov/vuln/detail/CVE-2020-27790">https://nvd.nist.gov/vuln/detail/CVE-2020-27790</a>
Severity: MEDIUM
CVE-2021-43311
Desc: A heap-based buffer overflow was discovered in upx, during the generic
pointer 'p' points to an inaccessible address in func get_le32(). The problem
is essentially caused in PackLinuxElf32::elf_lookup() at p_lx_elf.cpp:5382.
Link: <a href="https://nvd.nist.gov/vuln/detail/CVE-2021-43311">https://nvd.nist.gov/vuln/detail/CVE-2021-43311</a>
Severity: HIGH
CVE-2021-43312
Desc: A heap-based buffer overflow was discovered in upx, during the variable
'bucket' points to an inaccessible address. The issue is being triggered in the
function PackLinuxElf64::invert_pt_dynamic at p_lx_elf.cpp:5239.
Link: <a href="https://nvd.nist.gov/vuln/detail/CVE-2021-43312">https://nvd.nist.gov/vuln/detail/CVE-2021-43312</a>
Severity: HIGH
CVE-2021-43313
Desc: A heap-based buffer overflow was discovered in upx, during the variable
'bucket' points to an inaccessible address. The issue is being triggered in the
function PackLinuxElf32::invert_pt_dynamic at p_lx_elf.cpp:1688.
Link: <a href="https://nvd.nist.gov/vuln/detail/CVE-2021-43313">https://nvd.nist.gov/vuln/detail/CVE-2021-43313</a>
Severity: HIGH
CVE-2021-43314
Desc: A heap-based buffer overflows was discovered in upx, during the generic
pointer 'p' points to an inaccessible address in func get_le32(). The problem
is essentially caused in PackLinuxElf32::elf_lookup() at p_lx_elf.cpp:5368
Link: <a href="https://nvd.nist.gov/vuln/detail/CVE-2021-43314">https://nvd.nist.gov/vuln/detail/CVE-2021-43314</a>
Severity: HIGH
CVE-2021-43315
Desc: A heap-based buffer overflows was discovered in upx, during the generic
pointer 'p' points to an inaccessible address in func get_le32(). The problem
is essentially caused in PackLinuxElf32::elf_lookup() at p_lx_elf.cpp:5349
Link: <a href="https://nvd.nist.gov/vuln/detail/CVE-2021-43315">https://nvd.nist.gov/vuln/detail/CVE-2021-43315</a>
Severity: HIGH
CVE-2021-43316
Desc: A heap-based buffer overflow was discovered in upx, during the generic
pointer 'p' points to an inaccessible address in func get_le64().
Link: <a href="https://nvd.nist.gov/vuln/detail/CVE-2021-43316">https://nvd.nist.gov/vuln/detail/CVE-2021-43316</a>
Severity: HIGH
CVE-2021-43317
Desc: A heap-based buffer overflows was discovered in upx, during the generic
pointer 'p' points to an inaccessible address in func get_le32(). The problem
is essentially caused in PackLinuxElf64::elf_lookup() at p_lx_elf.cpp:5404
Link: <a href="https://nvd.nist.gov/vuln/detail/CVE-2021-43317">https://nvd.nist.gov/vuln/detail/CVE-2021-43317</a>
Severity: HIGH
CVE-2023-23456
Desc: A heap-based buffer overflow issue was discovered in UPX in
PackTmt::pack() in p_tmt.cpp file. The flow allows an attacker to cause a
denial of service (abort) via a crafted file.
Link: <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-23456">https://nvd.nist.gov/vuln/detail/CVE-2023-23456</a>
Severity: MEDIUM
CVE-2023-23457
Desc: A Segmentation fault was found in UPX in
PackLinuxElf64::invert_pt_dynamic() in p_lx_elf.cpp. An attacker with a crafted
input file allows invalid memory address access that could lead to a denial of
service.
Link: <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-23457">https://nvd.nist.gov/vuln/detail/CVE-2023-23457</a>
Severity: MEDIUM</pre>
</div>
</p>
<hr>
<span>You are receiving this mail because:</span>
<ul>
<li>You are the QA Contact for the bug.</li>
<li>You are the assignee for the bug.</li>
</ul>
</body>
</html>