CVE-2021-43314

NameCVE-2021-43314
DescriptionA heap-based buffer overflows was discovered in upx, during the generic pointer 'p' points to an inaccessible address in func get_le32(). The problem is essentially caused in PackLinuxElf32::elf_lookup() at p_lx_elf.cpp:5368
SourceCVE (at NVD; CERT, LWN, oss-sec, fulldisc, Red Hat, Ubuntu, Gentoo, SUSE bugzilla/CVE, GitHub advisories/code/issues, web search, more)

Vulnerable and fixed packages

The table below lists information on source packages.

Source PackageReleaseVersionStatus
upx-ucl (PTS)jessie3.91-1vulnerable
stretch3.91-4vulnerable
buster3.95-1vulnerable
bullseye3.96-2vulnerable
sid, trixie4.2.4-1fixed

The information below is based on the following data on fixed versions.

PackageTypeReleaseFixed VersionUrgencyOriginDebian Bugs
upx-uclsourcejessie(unfixed)end-of-life
upx-uclsourcestretch(unfixed)end-of-life
upx-uclsource(unstable)4.2.2-1unimportant

Notes

https://github.com/upx/upx/issues/380
https://github.com/upx/upx/commit/b327645e648d46c8730be80730a171cf74cfe338
Crash in CLI tool, no security impact

Search for package or bug name: Reporting problems