Bug#1031874: upx-ucl: CVE-2023-23457

2023-10-09 Thread Michael Prokop
* Moritz Mühlenhoff [Fri Feb 24, 2023 at 05:04:53PM +0100]:

> The following vulnerability was published for upx-ucl.
> 
> CVE-2023-23457[0]:
> | A Segmentation fault was found in UPX in
> | PackLinuxElf64::invert_pt_dynamic() in p_lx_elf.cpp. An attacker with
> | a crafted input file allows invalid memory address access that could
> | lead to a denial of service.
> 
> https://github.com/upx/upx/issues/631
> https://github.com/upx/upx/commit/779b648c5f6aa9b33f4728f79dd4d0efec0bf860
[...]

There are patches available for this and also for #1033258 since
several months, also upstream released multiple versions since 3.96
(latest being v4.1.0 as of 2023-08-08).

Is there any reason why this wasn't yet taken care of?
Is the package maintainer still around?

regards
-mika-


signature.asc
Description: PGP signature


Bug#1031874: upx-ucl: CVE-2023-23457

2023-02-24 Thread Moritz Mühlenhoff
Source: upx-ucl
X-Debbugs-CC: t...@security.debian.org
Severity: grave
Tags: security

Hi,

The following vulnerability was published for upx-ucl.

CVE-2023-23457[0]:
| A Segmentation fault was found in UPX in
| PackLinuxElf64::invert_pt_dynamic() in p_lx_elf.cpp. An attacker with
| a crafted input file allows invalid memory address access that could
| lead to a denial of service.

https://github.com/upx/upx/issues/631
https://github.com/upx/upx/commit/779b648c5f6aa9b33f4728f79dd4d0efec0bf860


If you fix the vulnerability please also make sure to include the
CVE (Common Vulnerabilities & Exposures) id in your changelog entry.

For further information see:

[0] https://security-tracker.debian.org/tracker/CVE-2023-23457
https://www.cve.org/CVERecord?id=CVE-2023-23457

Please adjust the affected versions in the BTS as needed.