Bug 2272826 (CVE-2024-3209)

Summary: CVE-2024-3209 upx: heap-based buffer overflow via get_ne64()
Product: [Other] Security Response Reporter: Robb Gatica <rgatica>
Component: vulnerabilityAssignee: Product Security <prodsec-ir-bot>
Status: NEW --- QA Contact:
Severity: medium Docs Contact:
Priority: medium    
Version: unspecifiedKeywords: Security
Target Milestone: ---   
Target Release: ---   
Hardware: All   
OS: Linux   
Whiteboard:
Fixed In Version: Doc Type: If docs needed, set a value
Doc Text:
Story Points: ---
Clone Of: Environment:
Last Closed: Type: ---
Regression: --- Mount Type: ---
Documentation: --- CRM:
Verified Versions: Category: ---
oVirt Team: --- RHEL 7.3 requirements from Atomic Host:
Cloudforms Team: --- Target Upstream Version:
Embargoed:
Bug Depends On: 2272827, 2272828    
Bug Blocks:    

Description Robb Gatica 2024-04-02 23:51:40 UTC
A vulnerability was found in UPX up to 4.2.2. It has been rated as critical. This issue affects the function get_ne64 of the file bele.h. The manipulation leads to heap-based buffer overflow. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-259055. NOTE: The vendor was contacted early about this disclosure but did not respond in any way.

https://drive.google.com/drive/folders/1qlUXvycOzGJygfkdQB9dGO6VwNRRZoih?usp=sharing
https://vuldb.com/?ctiid.259055
https://vuldb.com/?id.259055
https://vuldb.com/?submit.304575

Comment 1 Robb Gatica 2024-04-02 23:51:57 UTC
Created upx tracking bugs for this issue:

Affects: epel-all [bug 2272827]
Affects: fedora-all [bug 2272828]