
Cloud Vulnerability DB
A community-led vulnerabilities database
A use after return issue was discovered in OpenSC before version 0.22.0 in the insert_pin function that could potentially crash programs using the library. The vulnerability was assigned CVE-2021-42780 and was reported on October 21, 2021. The issue affects multiple operating systems including Ubuntu, Debian, and Red Hat Enterprise Linux (NVD, CVE).
The vulnerability is classified with a CVSS v3.1 Base Score of 5.3 (MEDIUM) with the vector string CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L. The issue specifically occurs in the insert_pin function where improper memory handling could lead to a use-after-return condition. The vulnerability was discovered through OSS-Fuzz testing and was fixed in OpenSC version 0.22.0 (NVD, Chromium Issue).
The vulnerability could potentially cause programs using the OpenSC library to crash, leading to a denial of service condition. This affects applications that rely on OpenSC for smart card operations (Ubuntu Notice, NVD).
The vulnerability has been fixed in OpenSC version 0.22.0. Users are advised to upgrade to this version or later. The fix involves adding proper bounds checking in the insert_pin function. For systems that cannot immediately upgrade, no alternative workarounds have been publicly documented (OpenSC Commit, Gentoo Advisory).
Source: This report was generated using AI
Free Vulnerability Assessment
Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.
Get a personalized demo
"Best User Experience I have ever seen, provides full visibility to cloud workloads."
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
"We know that if Wiz identifies something as critical, it actually is."