A heap-based buffer overflow was discovered in upx, during the variable 'bucket' points to an inaccessible address. The issue is being triggered in the function PackLinuxElf64::invert_pt_dynamic at p_lx_elf.cpp:5239.
                
            Metrics
Affected Vendors & Products
References
        | Link | Providers | 
|---|---|
| https://github.com/upx/upx/issues/379 |     | 
History
                    Fri, 11 Apr 2025 12:45:00 +0000
| Type | Values Removed | Values Added | 
|---|---|---|
| First Time appeared | Upx Upx upx | |
| CPEs | cpe:2.3:a:upx:upx:*:*:*:*:*:*:*:* | |
| Vendors & Products | Upx Project Upx Project upx | Upx Upx upx | 
Tue, 25 Feb 2025 16:15:00 +0000
| Type | Values Removed | Values Added | 
|---|---|---|
| Metrics | ssvc 
 | 
 MITRE
                        MITRE
                    Status: PUBLISHED
Assigner: fedora
Published: 2023-03-24T00:00:00.000Z
Updated: 2025-02-25T15:13:30.750Z
Reserved: 2021-11-03T00:00:00.000Z
Link: CVE-2021-43312
 Vulnrichment
                        Vulnrichment
                    Updated: 2024-08-04T03:55:29.092Z
 NVD
                        NVD
                    Status : Modified
Published: 2023-03-24T20:15:08.270
Modified: 2025-04-11T12:27:55.013
Link: CVE-2021-43312
 Redhat
                        Redhat
                    No data.
 ReportizFlow
ReportizFlow