CVE-2021-42341

high
New! CVE Severity Now Using CVSS v3

The calculated severity for CVEs has been updated to use CVSS v3 by default. CVEs that do not have a CVSS v3 score will fall back CVSS v2 for calculating severity. Severity display preferences can be toggled in the settings dropdown.

Description

checkpath in OpenRC before 0.44.7 uses the direct output of strlen() to allocate strings, which does not account for the '\0' byte at the end of the string. This results in memory corruption. CVE-2021-42341 was introduced in git commit 63db2d99e730547339d1bdd28e8437999c380cae, which was introduced as part of OpenRC 0.44.0 development.

References

https://github.com/OpenRC/openrc/issues/459

https://github.com/OpenRC/openrc/commit/bb8334104baf4d5a4a442a8647fb9204738f2204

https://bugs.gentoo.org/816900

https://github.com/OpenRC/openrc/pull/462

https://github.com/OpenRC/openrc/commit/63db2d99e730547339d1bdd28e8437999c380cae

https://github.com/OpenRC/openrc/issues/418

Details

Source: MITRE

Published: 2021-10-14

Updated: 2021-10-20

Risk Information

CVSS v2

Base Score: 5

Vector: AV:N/AC:L/Au:N/C:N/I:N/A:P

Impact Score: 2.9

Exploitability Score: 10

Severity: MEDIUM

CVSS v3

Base Score: 7.5

Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H

Impact Score: 3.6

Exploitability Score: 3.9

Severity: HIGH

Vulnerable Software

Configuration 1

OR

cpe:2.3:a:openrc_project:openrc:*:*:*:*:*:*:*:*