CVE-2021-42781

Heap buffer overflow issues were found in Opensc before version 0.22.0 in pkcs15-oberthur.c that could potentially crash programs using the library.
Configurations

Configuration 1 (hide)

cpe:2.3:a:opensc_project:opensc:*:*:*:*:*:*:*:*

Configuration 2 (hide)

cpe:2.3:o:fedoraproject:fedora:33:*:*:*:*:*:*:*

Configuration 3 (hide)

cpe:2.3:o:redhat:enterprise_linux:7.0:*:*:*:*:*:*:*

History

21 Nov 2024, 06:28

Type Values Removed Values Added
References () https://bugzilla.redhat.com/show_bug.cgi?id=2016439 - Issue Tracking, Patch, Third Party Advisory () https://bugzilla.redhat.com/show_bug.cgi?id=2016439 - Issue Tracking, Patch, Third Party Advisory
References () https://github.com/OpenSC/OpenSC/commit/05648b06 - Patch, Third Party Advisory () https://github.com/OpenSC/OpenSC/commit/05648b06 - Patch, Third Party Advisory
References () https://github.com/OpenSC/OpenSC/commit/17d8980c - Patch, Third Party Advisory () https://github.com/OpenSC/OpenSC/commit/17d8980c - Patch, Third Party Advisory
References () https://github.com/OpenSC/OpenSC/commit/40c50a3a - Patch, Third Party Advisory () https://github.com/OpenSC/OpenSC/commit/40c50a3a - Patch, Third Party Advisory
References () https://github.com/OpenSC/OpenSC/commit/5d4daf6c - Patch, Third Party Advisory () https://github.com/OpenSC/OpenSC/commit/5d4daf6c - Patch, Third Party Advisory
References () https://github.com/OpenSC/OpenSC/commit/cae5c71f - Patch, Third Party Advisory () https://github.com/OpenSC/OpenSC/commit/cae5c71f - Patch, Third Party Advisory
References () https://lists.debian.org/debian-lts-announce/2023/06/msg00025.html - () https://lists.debian.org/debian-lts-announce/2023/06/msg00025.html -
References () https://security.gentoo.org/glsa/202209-03 - Third Party Advisory () https://security.gentoo.org/glsa/202209-03 - Third Party Advisory

21 Jun 2023, 02:15

Type Values Removed Values Added
References
  • (MLIST) https://lists.debian.org/debian-lts-announce/2023/06/msg00025.html -

Information

Published : 2022-04-18 17:15

Updated : 2024-11-21 06:28


NVD link : CVE-2021-42781

Mitre link : CVE-2021-42781

CVE.ORG link : CVE-2021-42781


JSON object : View

Products Affected

redhat

  • enterprise_linux

opensc_project

  • opensc

fedoraproject

  • fedora
CWE
CWE-119

Improper Restriction of Operations within the Bounds of a Memory Buffer

CWE-787

Out-of-bounds Write