Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

debian логотип

CVE-2021-43313

Опубликовано: 24 мар. 2023
Источник: debian
EPSS Низкий

Описание

A heap-based buffer overflow was discovered in upx, during the variable 'bucket' points to an inaccessible address. The issue is being triggered in the function PackLinuxElf32::invert_pt_dynamic at p_lx_elf.cpp:1688.

Пакеты

ПакетСтатусВерсия исправленияРелизТип
upx-uclfixed4.2.2-1package

Примечания

  • https://github.com/upx/upx/issues/378

  • https://github.com/upx/upx/commit/828a6cf07b69bc7314e888d7b76f0eafe125a3f6

  • Crash in CLI tool, no security impact

EPSS

Процентиль: 40%
0.00185
Низкий

Связанные уязвимости

CVSS3: 7.5
ubuntu
почти 3 года назад

A heap-based buffer overflow was discovered in upx, during the variable 'bucket' points to an inaccessible address. The issue is being triggered in the function PackLinuxElf32::invert_pt_dynamic at p_lx_elf.cpp:1688.

CVSS3: 7.5
nvd
почти 3 года назад

A heap-based buffer overflow was discovered in upx, during the variable 'bucket' points to an inaccessible address. The issue is being triggered in the function PackLinuxElf32::invert_pt_dynamic at p_lx_elf.cpp:1688.

CVSS3: 7.5
github
почти 3 года назад

A heap-based buffer overflow was discovered in upx, during the variable 'bucket' points to an inaccessible address. The issue is being triggered in the function PackLinuxElf32::invert_pt_dynamic at p_lx_elf.cpp:1688.

suse-cvrf
почти 3 года назад

Security update for upx

EPSS

Процентиль: 40%
0.00185
Низкий