CVE-2021-43311

NameCVE-2021-43311
DescriptionA heap-based buffer overflow was discovered in upx, during the generic pointer 'p' points to an inaccessible address in func get_le32(). The problem is essentially caused in PackLinuxElf32::elf_lookup() at p_lx_elf.cpp:5382.
SourceCVE (at NVD; CERT, LWN, oss-sec, fulldisc, Red Hat, Ubuntu, Gentoo, SUSE bugzilla/CVE, GitHub advisories/code/issues, web search, more)

Vulnerable and fixed packages

The table below lists information on source packages.

Source PackageReleaseVersionStatus
upx-ucl (PTS)bullseye3.96-2vulnerable
sid, trixie4.2.4-1fixed

The information below is based on the following data on fixed versions.

PackageTypeReleaseFixed VersionUrgencyOriginDebian Bugs
upx-uclsource(unstable)4.2.2-1unimportant

Notes

https://github.com/upx/upx/issues/380
https://github.com/upx/upx/commit/b327645e648d46c8730be80730a171cf74cfe338
Crash in CLI tool, no security impact

Search for package or bug name: Reporting problems