Security update for upx

This update for upx to version 3.96 fixes the following issues:

- CVE-2019-1010048: Fixed a denial of service in PackLinuxElf32::PackLinuxElf32help1() (boo#1141777).
- CVE-2019-14296: Fixed a denial of service in canUnpack() (boo#1143839).
- CVE-2019-20021: Fixed a heap-based buffer over-read in canUnpack() (boo#1159833).
- CVE-2019-20053: Fixed a denial of service in canUnpack() (boo#1159920).
- CVE-2018-11243: Fixed a denial of service in PackLinuxElf64::unpack() (boo#1094138).

- Update to version 3.96
* Bug fixes:
[CVE-2019-1010048, boo#1141777]
[CVE-2019-14296, boo#1143839]
[CVE-2019-20021, boo#1159833]
[CVE-2019-20053, boo#1159920]
[CVE-2018-11243 partially - ticket 206 ONLY, boo#1094138]
- Update to version 3.95
* Flag --force-pie when ET_DYN main program is not marked as
DF_1_PIE
* Better compatibility with varying layout of address space on
Linux
* Support for 4 PT_LOAD layout in ELF generated by binutils-2.31
* bug fixes, particularly better diagnosis of malformed input
* bug fixes - see https://github.com/upx/upx/milestone/4

Fixed bugs
bnc#1159920
VUL-1: CVE-2019-20053: upx: An invalid memory address dereference was discovered in the canUnpack function in p_mach.cpp in UPX 3.95 via a crafted Mach-O file.
bnc#1094138
VUL-0: CVE-2018-11243: upx: PackLinuxElf64::unpack in p_lx_elf.cpp in UPX 3.95 allows remote attackers to cause a denial of service
bnc#1159833
VUL-1: CVE-2019-20021: upx: heap-based buffer over-read was discovered in canUnpack in p_mach.cpp in UPX 3.95 via a crafted Mach-O file.
bnc#1141777
VUL-1: CVE-2019-1010048: upx: 3.95 is affected by: Integer Overflow. The impact is: attacker can cause a denial of service. The component is: src/p_lx_elf.cpp PackLinuxElf32:PackLinuxElf32help1() Line 262.
bnc#1143839
VUL-1: CVE-2019-14296: upx: denial of service in canUnpack in p_vmlinx.cpp
Selected Binaries
openSUSE Build Service is sponsored by