CVE-2021-43313

NameCVE-2021-43313
DescriptionA heap-based buffer overflow was discovered in upx, during the variable 'bucket' points to an inaccessible address. The issue is being triggered in the function PackLinuxElf32::invert_pt_dynamic at p_lx_elf.cpp:1688.
SourceCVE (at NVD; CERT, LWN, oss-sec, fulldisc, Red Hat, Ubuntu, Gentoo, SUSE bugzilla/CVE, GitHub advisories/code/issues, web search, more)

Vulnerable and fixed packages

The table below lists information on source packages.

Source PackageReleaseVersionStatus
upx-ucl (PTS)buster3.95-1vulnerable
bullseye3.96-2vulnerable
sid, trixie4.2.2-3fixed

The information below is based on the following data on fixed versions.

PackageTypeReleaseFixed VersionUrgencyOriginDebian Bugs
upx-uclsource(unstable)4.2.2-1unimportant

Notes

https://github.com/upx/upx/issues/378
https://github.com/upx/upx/commit/828a6cf07b69bc7314e888d7b76f0eafe125a3f6
Crash in CLI tool, no security impact

Search for package or bug name: Reporting problems