CVE-2021-43312

NameCVE-2021-43312
DescriptionA heap-based buffer overflow was discovered in upx, during the variable 'bucket' points to an inaccessible address. The issue is being triggered in the function PackLinuxElf64::invert_pt_dynamic at p_lx_elf.cpp:5239.
SourceCVE (at NVD; CERT, LWN, oss-sec, fulldisc, Red Hat, Ubuntu, Gentoo, SUSE bugzilla/CVE, GitHub advisories/code/issues, web search, more)

Vulnerable and fixed packages

The table below lists information on source packages.

Source PackageReleaseVersionStatus
upx-ucl (PTS)jessie3.91-1vulnerable
stretch3.91-4vulnerable
buster3.95-1vulnerable
bullseye3.96-2vulnerable
bullseye (security)3.96-2+deb11u1vulnerable
sid, trixie4.2.4-1fixed

The information below is based on the following data on fixed versions.

PackageTypeReleaseFixed VersionUrgencyOriginDebian Bugs
upx-uclsource(unstable)4.2.2-1unimportant

Notes

https://github.com/upx/upx/issues/379
https://github.com/upx/upx/commit/828a6cf07b69bc7314e888d7b76f0eafe125a3f6
Crash in CLI tool, no security impact

Search for package or bug name: Reporting problems