Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

debian логотип

CVE-2021-43317

Опубликовано: 24 мар. 2023
Источник: debian

Описание

A heap-based buffer overflows was discovered in upx, during the generic pointer 'p' points to an inaccessible address in func get_le32(). The problem is essentially caused in PackLinuxElf64::elf_lookup() at p_lx_elf.cpp:5404

Пакеты

ПакетСтатусВерсия исправленияРелизТип
upx-uclfixed4.2.2-1package

Примечания

  • https://github.com/upx/upx/issues/380

  • https://github.com/upx/upx/commit/b327645e648d46c8730be80730a171cf74cfe338

  • Crash in CLI tool, no security impact

Связанные уязвимости

CVSS3: 7.5
ubuntu
почти 3 года назад

A heap-based buffer overflows was discovered in upx, during the generic pointer 'p' points to an inaccessible address in func get_le32(). The problem is essentially caused in PackLinuxElf64::elf_lookup() at p_lx_elf.cpp:5404

CVSS3: 7.5
nvd
почти 3 года назад

A heap-based buffer overflows was discovered in upx, during the generic pointer 'p' points to an inaccessible address in func get_le32(). The problem is essentially caused in PackLinuxElf64::elf_lookup() at p_lx_elf.cpp:5404

CVSS3: 7.5
github
почти 3 года назад

A heap-based buffer overflows was discovered in upx, during the generic pointer 'p' points to an inaccessible address in func get_le32(). The problem is essentially caused in PackLinuxElf64::elf_lookup() at p_lx_elf.cpp:5404

suse-cvrf
почти 3 года назад

Security update for upx