checkpath in OpenRC before 0.44.7 uses the direct output of strlen() to allocate strings, which does not account for the '\0' byte at the end of the string. This results in memory corruption. CVE-2021-42341 was introduced in git commit 63db2d99e730547339d1bdd28e8437999c380cae, which was introduced as part of OpenRC 0.44.0 development.
References
Link | Resource |
---|---|
https://github.com/OpenRC/openrc/issues/459 | Exploit Patch Third Party Advisory |
https://github.com/OpenRC/openrc/commit/bb8334104baf4d5a4a442a8647fb9204738f2204 | Patch Third Party Advisory |
https://bugs.gentoo.org/816900 | Exploit Patch Third Party Advisory |
https://github.com/OpenRC/openrc/pull/462 | Patch Third Party Advisory |
https://github.com/OpenRC/openrc/commit/63db2d99e730547339d1bdd28e8437999c380cae | Patch Third Party Advisory |
https://github.com/OpenRC/openrc/issues/418 | Exploit Patch Third Party Advisory |
Configurations
Information
Published : 2021-10-13 22:15
Updated : 2021-10-20 12:03
NVD link : CVE-2021-42341
Mitre link : CVE-2021-42341
JSON object : View
CWE
Products Affected
openrc_project
- openrc