Hello community,

here is the log from the commit of package patchinfo.11894 for 
openSUSE:Leap:15.1:Update checked in at 2020-02-04 10:13:49
++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++
Comparing /work/SRC/openSUSE:Leap:15.1:Update/patchinfo.11894 (Old)
 and      /work/SRC/openSUSE:Leap:15.1:Update/.patchinfo.11894.new.26092 (New)
++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++

Package is "patchinfo.11894"

Tue Feb  4 10:13:49 2020 rev:1 rq:768353 version:unknown

Changes:
--------
New Changes file:

NO CHANGES FILE!!!

New:
----
  _patchinfo

++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++

Other differences:
------------------
++++++ _patchinfo ++++++
<patchinfo incident="11894">
  <issue tracker="cve" id="2019-14296"/>
  <issue tracker="cve" id="2019-20021"/>
  <issue tracker="cve" id="2019-1010048"/>
  <issue tracker="cve" id="2018-11243"/>
  <issue tracker="cve" id="2019-20053"/>
  <issue tracker="bnc" id="1159920">VUL-1: CVE-2019-20053: upx: An invalid 
memory address dereference was discovered in the canUnpack function in 
p_mach.cpp in UPX 3.95 via a crafted Mach-O file.</issue>
  <issue tracker="bnc" id="1094138">VUL-0: CVE-2018-11243: upx: 
PackLinuxElf64::unpack in p_lx_elf.cpp in UPX 3.95 allows remote attackers to 
cause a denial of service</issue>
  <issue tracker="bnc" id="1159833">VUL-1: CVE-2019-20021: upx:  heap-based 
buffer over-read was discovered in canUnpack in p_mach.cpp in UPX 3.95 via a 
crafted Mach-O file.</issue>
  <issue tracker="bnc" id="1141777">VUL-1: CVE-2019-1010048: upx: 3.95 is 
affected by: Integer Overflow. The impact is: attacker can cause a denial of 
service. The component is: src/p_lx_elf.cpp 
PackLinuxElf32:PackLinuxElf32help1() Line 262.</issue>
  <issue tracker="bnc" id="1143839">VUL-1: CVE-2019-14296: upx: denial of 
service in canUnpack in p_vmlinx.cpp</issue>
  <packager>jengelh</packager>
  <rating>moderate</rating>
  <category>security</category>
  <summary>Security update for upx</summary>
  <description>This update for upx to version 3.96 fixes the following issues:


- CVE-2019-1010048: Fixed a denial of service in 
PackLinuxElf32::PackLinuxElf32help1() (boo#1141777).
- CVE-2019-14296: Fixed a denial of service in canUnpack() (boo#1143839).
- CVE-2019-20021: Fixed a heap-based buffer over-read in canUnpack() 
(boo#1159833).
- CVE-2019-20053: Fixed a denial of service in canUnpack() (boo#1159920).
- CVE-2018-11243: Fixed a denial of service in PackLinuxElf64::unpack() 
(boo#1094138).

- Update to version 3.96
  * Bug fixes:
    [CVE-2019-1010048, boo#1141777]
    [CVE-2019-14296, boo#1143839]
    [CVE-2019-20021, boo#1159833]
    [CVE-2019-20053, boo#1159920]
    [CVE-2018-11243 partially - ticket 206 ONLY, boo#1094138]
- Update to version 3.95
  * Flag --force-pie when ET_DYN main program is not marked as
    DF_1_PIE
  * Better compatibility with varying layout of address space on
    Linux
  * Support for 4 PT_LOAD layout in ELF generated by binutils-2.31
  * bug fixes, particularly better diagnosis of malformed input
  * bug fixes - see https://github.com/upx/upx/milestone/4
</description>
</patchinfo>

Reply via email to