* Moritz Mühlenhoff [Fri Feb 24, 2023 at 05:04:53PM +0100]: > The following vulnerability was published for upx-ucl. > > CVE-2023-23457[0]: > | A Segmentation fault was found in UPX in > | PackLinuxElf64::invert_pt_dynamic() in p_lx_elf.cpp. An attacker with > | a crafted input file allows invalid memory address access that could > | lead to a denial of service. > > https://github.com/upx/upx/issues/631 > https://github.com/upx/upx/commit/779b648c5f6aa9b33f4728f79dd4d0efec0bf860 [...]
There are patches available for this and also for #1033258 since several months, also upstream released multiple versions since 3.96 (latest being v4.1.0 as of 2023-08-08). Is there any reason why this wasn't yet taken care of? Is the package maintainer still around? regards -mika-
signature.asc
Description: PGP signature