First published: Fri Mar 24 2023(Updated: )
A heap-based buffer overflow was discovered in upx, during the variable 'bucket' points to an inaccessible address. The issue is being triggered in the function PackLinuxElf64::invert_pt_dynamic at p_lx_elf.cpp:5239.
Credit: patrick@puiterwijk.org
Affected Software | Affected Version | How to fix |
---|---|---|
UPX | <4.0.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID is CVE-2021-43312.
The severity of CVE-2021-43312 is high, with a severity score of 7.5.
The software affected by CVE-2021-43312 is Upx Project Upx, version up to 4.0.0.
CVE-2021-43312 is a heap-based buffer overflow vulnerability discovered in upx, which triggers an issue in the PackLinuxElf64::invert_pt_dynamic function.
You can find more information about CVE-2021-43312 at the following reference link: https://github.com/upx/upx/issues/379