Out-of-bounds Write The advisory has been revoked - it doesn't affect any version of package upx-ucl  (opens in a new tab)


Threat Intelligence

EPSS
0.12% (47th percentile)

Do your applications use this vulnerable package?

In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.

Test your applications
  • Snyk IDSNYK-DEBIAN12-UPXUCL-5417231
  • published11 Apr 2023
  • disclosed24 Mar 2023

Introduced: 24 Mar 2023

CVE-2021-43313  (opens in a new tab)
CWE-787  (opens in a new tab)

Amendment

The Debian security team deemed this advisory irrelevant for Debian:12.

NVD Description

Note: Versions mentioned in the description apply only to the upstream upx-ucl package and not the upx-ucl package as distributed by Debian.

A heap-based buffer overflow was discovered in upx, during the variable 'bucket' points to an inaccessible address. The issue is being triggered in the function PackLinuxElf32::invert_pt_dynamic at p_lx_elf.cpp:1688.