CVE-2021-42341

checkpath in OpenRC before 0.44.7 uses the direct output of strlen() to allocate strings, which does not account for the '\0' byte at the end of the string. This results in memory corruption. CVE-2021-42341 was introduced in git commit 63db2d99e730547339d1bdd28e8437999c380cae, which was introduced as part of OpenRC 0.44.0 development.
Configurations

Configuration 1 (hide)

cpe:2.3:a:openrc_project:openrc:*:*:*:*:*:*:*:*

History

21 Nov 2024, 06:27

Type Values Removed Values Added
References () https://bugs.gentoo.org/816900 - Exploit, Patch, Third Party Advisory () https://bugs.gentoo.org/816900 - Exploit, Patch, Third Party Advisory
References () https://github.com/OpenRC/openrc/commit/63db2d99e730547339d1bdd28e8437999c380cae - Patch, Third Party Advisory () https://github.com/OpenRC/openrc/commit/63db2d99e730547339d1bdd28e8437999c380cae - Patch, Third Party Advisory
References () https://github.com/OpenRC/openrc/commit/bb8334104baf4d5a4a442a8647fb9204738f2204 - Patch, Third Party Advisory () https://github.com/OpenRC/openrc/commit/bb8334104baf4d5a4a442a8647fb9204738f2204 - Patch, Third Party Advisory
References () https://github.com/OpenRC/openrc/issues/418 - Exploit, Patch, Third Party Advisory () https://github.com/OpenRC/openrc/issues/418 - Exploit, Patch, Third Party Advisory
References () https://github.com/OpenRC/openrc/issues/459 - Exploit, Patch, Third Party Advisory () https://github.com/OpenRC/openrc/issues/459 - Exploit, Patch, Third Party Advisory
References () https://github.com/OpenRC/openrc/pull/462 - Patch, Third Party Advisory () https://github.com/OpenRC/openrc/pull/462 - Patch, Third Party Advisory

Information

Published : 2021-10-14 05:15

Updated : 2024-11-21 06:27


NVD link : CVE-2021-42341

Mitre link : CVE-2021-42341

CVE.ORG link : CVE-2021-42341


JSON object : View

Products Affected

openrc_project

  • openrc