Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

debian логотип

CVE-2021-42341

Опубликовано: 14 окт. 2021
Источник: debian
EPSS Низкий

Описание

checkpath in OpenRC before 0.44.7 uses the direct output of strlen() to allocate strings, which does not account for the '\0' byte at the end of the string. This results in memory corruption. CVE-2021-42341 was introduced in git commit 63db2d99e730547339d1bdd28e8437999c380cae, which was introduced as part of OpenRC 0.44.0 development.

Пакеты

ПакетСтатусВерсия исправленияРелизТип
openrcnot-affectedpackage

Примечания

  • https://github.com/OpenRC/openrc/issues/459

  • https://github.com/OpenRC/openrc/pull/462

  • https://github.com/OpenRC/openrc/commit/bb8334104baf4d5a4a442a8647fb9204738f2204

EPSS

Процентиль: 81%
0.01546
Низкий

Связанные уязвимости

CVSS3: 7.5
ubuntu
больше 4 лет назад

checkpath in OpenRC before 0.44.7 uses the direct output of strlen() to allocate strings, which does not account for the '\0' byte at the end of the string. This results in memory corruption. CVE-2021-42341 was introduced in git commit 63db2d99e730547339d1bdd28e8437999c380cae, which was introduced as part of OpenRC 0.44.0 development.

CVSS3: 7.5
nvd
больше 4 лет назад

checkpath in OpenRC before 0.44.7 uses the direct output of strlen() to allocate strings, which does not account for the '\0' byte at the end of the string. This results in memory corruption. CVE-2021-42341 was introduced in git commit 63db2d99e730547339d1bdd28e8437999c380cae, which was introduced as part of OpenRC 0.44.0 development.

github
больше 3 лет назад

checkpath in OpenRC before 0.44.7 uses the direct output of strlen() to allocate strings, which does not account for the '\0' byte at the end of the string. This results in memory corruption. CVE-2021-42341 was introduced in git commit 63db2d99e730547339d1bdd28e8437999c380cae, which was introduced as part of OpenRC 0.44.0 development.

EPSS

Процентиль: 81%
0.01546
Низкий