CVE-2021-42341
Publication date 14 October 2021
Last updated 24 July 2024
Ubuntu priority
Cvss 3 Severity Score
checkpath in OpenRC before 0.44.7 uses the direct output of strlen() to allocate strings, which does not account for the ‘\0’ byte at the end of the string. This results in memory corruption. CVE-2021-42341 was introduced in git commit 63db2d99e730547339d1bdd28e8437999c380cae, which was introduced as part of OpenRC 0.44.0 development.
Status
Package | Ubuntu Release | Status |
---|---|---|
openrc | 16.04 LTS xenial | Ignored end of standard support |
14.04 LTS trusty | Ignored end of standard support |
Severity score breakdown
Parameter | Value |
---|---|
Base score |
|
Attack vector | Network |
Attack complexity | Low |
Privileges required | None |
User interaction | None |
Scope | Unchanged |
Confidentiality | None |
Integrity impact | None |
Availability impact | High |
Vector | CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H |
References
Other references
- https://github.com/OpenRC/openrc/issues/459
- https://github.com/OpenRC/openrc/pull/462
- https://github.com/OpenRC/openrc/commit/bb8334104baf4d5a4a442a8647fb9204738f2204
- https://bugs.gentoo.org/816900
- https://github.com/OpenRC/openrc/commit/63db2d99e730547339d1bdd28e8437999c380cae
- https://github.com/OpenRC/openrc/issues/418
- https://www.cve.org/CVERecord?id=CVE-2021-42341