CVE-2021-42341
Severity CVSS v4.0:
Pending analysis
Type:
Unavailable / Other
Publication date:
14/10/2021
Last modified:
20/10/2021
Description
checkpath in OpenRC before 0.44.7 uses the direct output of strlen() to allocate strings, which does not account for the '\0' byte at the end of the string. This results in memory corruption. CVE-2021-42341 was introduced in git commit 63db2d99e730547339d1bdd28e8437999c380cae, which was introduced as part of OpenRC 0.44.0 development.
Impact
Base Score 3.x
7.50
Severity 3.x
HIGH
Base Score 2.0
5.00
Severity 2.0
MEDIUM
Vulnerable products and versions
| CPE | From | Up to |
|---|---|---|
| cpe:2.3:a:openrc_project:openrc:*:*:*:*:*:*:*:* | 0.44.0 (including) | 0.44.7 (excluding) |
To consult the complete list of CPE names with products and versions, see this page
References to Advisories, Solutions, and Tools
- https://bugs.gentoo.org/816900
- https://github.com/OpenRC/openrc/commit/63db2d99e730547339d1bdd28e8437999c380cae
- https://github.com/OpenRC/openrc/commit/bb8334104baf4d5a4a442a8647fb9204738f2204
- https://github.com/OpenRC/openrc/issues/418
- https://github.com/OpenRC/openrc/issues/459
- https://github.com/OpenRC/openrc/pull/462



