CVE-2021-42341

NameCVE-2021-42341
Descriptioncheckpath in OpenRC before 0.44.7 uses the direct output of strlen() to allocate strings, which does not account for the '\0' byte at the end of the string. This results in memory corruption. CVE-2021-42341 was introduced in git commit 63db2d99e730547339d1bdd28e8437999c380cae, which was introduced as part of OpenRC 0.44.0 development.
SourceCVE (at NVD; CERT, LWN, oss-sec, fulldisc, Red Hat, Ubuntu, Gentoo, SUSE bugzilla/CVE, GitHub advisories/code/issues, web search, more)

Vulnerable and fixed packages

The table below lists information on source packages.

Source PackageReleaseVersionStatus
openrc (PTS)buster0.40.3-1fixed
bullseye0.42-2.1fixed
bookworm0.45.2-2fixed
trixie0.53-1fixed
sid0.53-2fixed

The information below is based on the following data on fixed versions.

PackageTypeReleaseFixed VersionUrgencyOriginDebian Bugs
openrcsource(unstable)(not affected)

Notes

- openrc <not-affected> (Introduced in 0.44)
https://github.com/OpenRC/openrc/issues/459
https://github.com/OpenRC/openrc/pull/462
https://github.com/OpenRC/openrc/commit/bb8334104baf4d5a4a442a8647fb9204738f2204

Search for package or bug name: Reporting problems