Логотип exploitDog
bind:CVE-2021-42341
Консоль
Логотип exploitDog

exploitDog

bind:CVE-2021-42341

Количество 4

Количество 4

ubuntu логотип

CVE-2021-42341

больше 4 лет назад

checkpath in OpenRC before 0.44.7 uses the direct output of strlen() to allocate strings, which does not account for the '\0' byte at the end of the string. This results in memory corruption. CVE-2021-42341 was introduced in git commit 63db2d99e730547339d1bdd28e8437999c380cae, which was introduced as part of OpenRC 0.44.0 development.

CVSS3: 7.5
EPSS: Низкий
nvd логотип

CVE-2021-42341

больше 4 лет назад

checkpath in OpenRC before 0.44.7 uses the direct output of strlen() to allocate strings, which does not account for the '\0' byte at the end of the string. This results in memory corruption. CVE-2021-42341 was introduced in git commit 63db2d99e730547339d1bdd28e8437999c380cae, which was introduced as part of OpenRC 0.44.0 development.

CVSS3: 7.5
EPSS: Низкий
debian логотип

CVE-2021-42341

больше 4 лет назад

checkpath in OpenRC before 0.44.7 uses the direct output of strlen() t ...

CVSS3: 7.5
EPSS: Низкий
github логотип

GHSA-3fxr-g4w3-xwx9

больше 3 лет назад

checkpath in OpenRC before 0.44.7 uses the direct output of strlen() to allocate strings, which does not account for the '\0' byte at the end of the string. This results in memory corruption. CVE-2021-42341 was introduced in git commit 63db2d99e730547339d1bdd28e8437999c380cae, which was introduced as part of OpenRC 0.44.0 development.

EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
ubuntu логотип
CVE-2021-42341

checkpath in OpenRC before 0.44.7 uses the direct output of strlen() to allocate strings, which does not account for the '\0' byte at the end of the string. This results in memory corruption. CVE-2021-42341 was introduced in git commit 63db2d99e730547339d1bdd28e8437999c380cae, which was introduced as part of OpenRC 0.44.0 development.

CVSS3: 7.5
2%
Низкий
больше 4 лет назад
nvd логотип
CVE-2021-42341

checkpath in OpenRC before 0.44.7 uses the direct output of strlen() to allocate strings, which does not account for the '\0' byte at the end of the string. This results in memory corruption. CVE-2021-42341 was introduced in git commit 63db2d99e730547339d1bdd28e8437999c380cae, which was introduced as part of OpenRC 0.44.0 development.

CVSS3: 7.5
2%
Низкий
больше 4 лет назад
debian логотип
CVE-2021-42341

checkpath in OpenRC before 0.44.7 uses the direct output of strlen() t ...

CVSS3: 7.5
2%
Низкий
больше 4 лет назад
github логотип
GHSA-3fxr-g4w3-xwx9

checkpath in OpenRC before 0.44.7 uses the direct output of strlen() to allocate strings, which does not account for the '\0' byte at the end of the string. This results in memory corruption. CVE-2021-42341 was introduced in git commit 63db2d99e730547339d1bdd28e8437999c380cae, which was introduced as part of OpenRC 0.44.0 development.

2%
Низкий
больше 3 лет назад

Уязвимостей на страницу