CVE-2021-42341 The advisory has been revoked - it doesn't affect any version of package openrc  (opens in a new tab)


Threat Intelligence

EPSS
1.14% (85th percentile)

Do your applications use this vulnerable package?

In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.

Test your applications
  • Snyk IDSNYK-DEBIAN12-OPENRC-1734123
  • published14 Oct 2021
  • disclosed14 Oct 2021

Introduced: 14 Oct 2021

CVE-2021-42341  (opens in a new tab)

Amendment

The Debian security team deemed this advisory irrelevant for Debian:12.

NVD Description

Note: Versions mentioned in the description apply only to the upstream openrc package and not the openrc package as distributed by Debian.

checkpath in OpenRC before 0.44.7 uses the direct output of strlen() to allocate strings, which does not account for the '\0' byte at the end of the string. This results in memory corruption. CVE-2021-42341 was introduced in git commit 63db2d99e730547339d1bdd28e8437999c380cae, which was introduced as part of OpenRC 0.44.0 development.