CVE-2021-42782
Gentoo Linux Security Advisory 202209-03
Severity Score
Exploit Likelihood
Affected Versions
Public Exploits
0Exploited in Wild
-Decision
Descriptions
Stack buffer overflow issues were found in Opensc before version 0.22.0 in various places that could potentially crash programs using the library.
Se han encontrado problemas de desbordamiento del buffer de pila en Opensc versiones anteriores a 0.22.0, en varios lugares que podrĂan bloquear los programas usando la biblioteca
It was discovered that OpenSC did not correctly handle certain memory operations, which could lead to a use-after-free vulnerability. An attacker could possibly use this issue to cause a denial of service or execute arbitrary code. This issue only affected Ubuntu 16.04 LTS, Ubuntu 18.04 LTS and Ubuntu 20.04 LTS. It was discovered that OpenSC did not correctly handle certain memory operations, which could lead to a stack buffer overflow. An attacker could possibly use this issue to cause a denial of service or execute arbitrary code. This issue only affected Ubuntu 20.04 LTS.
CVSS Scores
SSVC
- Decision:-
Timeline
- 2021-10-21 CVE Reserved
- 2022-04-18 CVE Published
- 2024-08-04 CVE Updated
- 2025-03-30 EPSS Updated
- ---------- Exploited in Wild
- ---------- KEV Due Date
- ---------- First Exploit
CWE
- CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer
- CWE-787: Out-of-bounds Write
CAPEC
References (8)
URL | Tag | Source |
---|---|---|
https://lists.debian.org/debian-lts-announce/2023/06/msg00025.html | Mailing List |
|
URL | Date | SRC |
---|
URL | Date | SRC |
---|---|---|
https://bugzilla.redhat.com/show_bug.cgi?id=2016448 | 2023-06-21 | |
https://github.com/OpenSC/OpenSC/commit/1252aca9 | 2023-06-21 | |
https://github.com/OpenSC/OpenSC/commit/456ac566 | 2023-06-21 | |
https://github.com/OpenSC/OpenSC/commit/7114fb71 | 2023-06-21 | |
https://github.com/OpenSC/OpenSC/commit/78cdab94 | 2023-06-21 | |
https://github.com/OpenSC/OpenSC/commit/ae1cf0be | 2023-06-21 |
URL | Date | SRC |
---|---|---|
https://security.gentoo.org/glsa/202209-03 | 2023-06-21 |
Affected Vendors, Products, and Versions
Vendor | Product | Version | Other | Status | ||||||
---|---|---|---|---|---|---|---|---|---|---|
Vendor | Product | Version | Other | Status | <-- --> | Vendor | Product | Version | Other | Status |
Opensc Project Search vendor "Opensc Project" | Opensc Search vendor "Opensc Project" for product "Opensc" | < 0.22.0 Search vendor "Opensc Project" for product "Opensc" and version " < 0.22.0" | - |
Affected
| ||||||
Fedoraproject Search vendor "Fedoraproject" | Fedora Search vendor "Fedoraproject" for product "Fedora" | 33 Search vendor "Fedoraproject" for product "Fedora" and version "33" | - |
Affected
|