CVE-2021-42782

5.3 MEDIUM
Published: April 18, 2022 Modified: November 03, 2025

Description

Stack buffer overflow issues were found in Opensc before version 0.22.0 in various places that could potentially crash programs using the library.

AI Explanation

Get an AI-powered plain-language explanation of this vulnerability and remediation steps.

Login to generate AI explanation

CVSS v3.x Details

0.0 Low Medium High Critical 10.0
Vector String
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L

References to Advisories, Solutions, and Tools

Patch Vendor Advisory Exploit Third Party Advisory
https://bugzilla.redhat.com/show_bug.cgi?id=2016448
Source: secalert@redhat.com
Issue Tracking Mailing List Patch Third Party Advisory
https://github.com/OpenSC/OpenSC/commit/1252aca9
Source: secalert@redhat.com
Patch Third Party Advisory
https://github.com/OpenSC/OpenSC/commit/456ac566
Source: secalert@redhat.com
Patch Third Party Advisory
https://github.com/OpenSC/OpenSC/commit/7114fb71
Source: secalert@redhat.com
Patch Third Party Advisory
https://github.com/OpenSC/OpenSC/commit/78cdab94
Source: secalert@redhat.com
Patch Third Party Advisory
https://github.com/OpenSC/OpenSC/commit/ae1cf0be
Source: secalert@redhat.com
Patch Third Party Advisory
https://security.gentoo.org/glsa/202209-03
Source: secalert@redhat.com
Third Party Advisory
https://bugzilla.redhat.com/show_bug.cgi?id=2016448
Source: af854a3a-2127-422b-91ae-364da2661108
Issue Tracking Mailing List Patch Third Party Advisory
https://github.com/OpenSC/OpenSC/commit/1252aca9
Source: af854a3a-2127-422b-91ae-364da2661108
Patch Third Party Advisory
https://github.com/OpenSC/OpenSC/commit/456ac566
Source: af854a3a-2127-422b-91ae-364da2661108
Patch Third Party Advisory
https://github.com/OpenSC/OpenSC/commit/7114fb71
Source: af854a3a-2127-422b-91ae-364da2661108
Patch Third Party Advisory
https://github.com/OpenSC/OpenSC/commit/78cdab94
Source: af854a3a-2127-422b-91ae-364da2661108
Patch Third Party Advisory
https://github.com/OpenSC/OpenSC/commit/ae1cf0be
Source: af854a3a-2127-422b-91ae-364da2661108
Patch Third Party Advisory
https://security.gentoo.org/glsa/202209-03
Source: af854a3a-2127-422b-91ae-364da2661108
Third Party Advisory

17 reference(s) from NVD

Quick Stats

CVSS v3 Score
5.3 / 10.0
EPSS (Exploit Probability)
0.1%
27th percentile
Exploitation Status
Not in CISA KEV

Weaknesses (CWE)

Affected Vendors

opensc_project fedoraproject