Resolve vulnerability: CVE-2021-42379 in busybox-1.33.1-r2
Description:
A use-after-free in Busybox's awk applet leads to denial of service and possibly code execution when processing a crafted awk pattern in the next_input_file function
- Severity: high
- Confidence: unknown
Solution:
Upgrade busybox to 1.33.1-r6
Identifiers:
Links:
- https://access.redhat.com/security/cve/CVE-2021-42379
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42379
- https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/
- https://nvd.nist.gov/vuln/detail/CVE-2021-42379
- https://security.netapp.com/advisory/ntap-20211223-0002/
- https://ubuntu.com/security/notices/USN-5179-1