An update for busybox is now available for openEuler-20.03-LTS-SP1 and openEuler-20.03-LTS-SP2
Security Advisory
openeuler-security@openeuler.org
openEuler security committee
openEuler-SA-2021-1449
Final
1.0
1.0
2021-12-03
Initial
2021-12-03
2021-12-03
openEuler SA Tool V1.0
2021-12-03
busybox security update
An update for busybox is now available for openEuler-20.03-LTS-SP1 and openEuler-20.03-LTS-SP2.
BusyBox combines tiny versions of many common UNIX utilities into a single small executable. It provides replacements for most of the utilities you usually find in GNU fileutils, shellutils, etc. It provides a fairly complete environment for any small or embedded system.
Security Fix(es):
A use-after-free in Busybox's awk applet leads to denial of service and possibly code execution when processing a crafted awk pattern in the getvar_s function(CVE-2021-42382)
A use-after-free in Busybox's awk applet leads to denial of service and possibly code execution when processing a crafted awk pattern in the hash_init function(CVE-2021-42381)
A use-after-free in Busybox's awk applet leads to denial of service and possibly code execution when processing a crafted awk pattern in the clrvar function(CVE-2021-42380)
A use-after-free in Busybox's awk applet leads to denial of service and possibly code execution when processing a crafted awk pattern in the evaluate function(CVE-2021-42385)
A use-after-free in Busybox's awk applet leads to denial of service and possibly code execution when processing a crafted awk pattern in the getvar_i function(CVE-2021-42378)
A use-after-free in Busybox's awk applet leads to denial of service and possibly code execution when processing a crafted awk pattern in the next_input_file function(CVE-2021-42379)
A use-after-free in Busybox's awk applet leads to denial of service and possibly code execution when processing a crafted awk pattern in the evaluate function(CVE-2021-42383)
A use-after-free in Busybox's awk applet leads to denial of service and possibly code execution when processing a crafted awk pattern in the handle_special function(CVE-2021-42384)
An update for busybox is now available for openEuler-20.03-LTS-SP1 and openEuler-20.03-LTS-SP2.
openEuler Security has rated this update as having a security impact of high. A Common Vunlnerability Scoring System(CVSS)base score,which gives a detailed severity rating, is available for each vulnerability from the CVElink(s) in the References section.
High
busybox
https://www.openeuler.org/en/security/safety-bulletin/detail.html?id=openEuler-SA-2021-1449
https://www.openeuler.org/en/security/cve/detail.html?id=CVE-2021-42382
https://www.openeuler.org/en/security/cve/detail.html?id=CVE-2021-42381
https://www.openeuler.org/en/security/cve/detail.html?id=CVE-2021-42380
https://www.openeuler.org/en/security/cve/detail.html?id=CVE-2021-42385
https://www.openeuler.org/en/security/cve/detail.html?id=CVE-2021-42378
https://www.openeuler.org/en/security/cve/detail.html?id=CVE-2021-42379
https://www.openeuler.org/en/security/cve/detail.html?id=CVE-2021-42383
https://www.openeuler.org/en/security/cve/detail.html?id=CVE-2021-42384
https://nvd.nist.gov/vuln/detail/CVE-2021-42382
https://nvd.nist.gov/vuln/detail/CVE-2021-42381
https://nvd.nist.gov/vuln/detail/CVE-2021-42380
https://nvd.nist.gov/vuln/detail/CVE-2021-42385
https://nvd.nist.gov/vuln/detail/CVE-2021-42378
https://nvd.nist.gov/vuln/detail/CVE-2021-42379
https://nvd.nist.gov/vuln/detail/CVE-2021-42383
https://nvd.nist.gov/vuln/detail/CVE-2021-42384
openEuler-20.03-LTS-SP1
openEuler-20.03-LTS-SP2
busybox-help-1.31.1-13.oe1.aarch64.rpm
busybox-petitboot-1.31.1-13.oe1.aarch64.rpm
busybox-debuginfo-1.31.1-13.oe1.aarch64.rpm
busybox-1.31.1-13.oe1.aarch64.rpm
busybox-debugsource-1.31.1-13.oe1.aarch64.rpm
busybox-help-1.31.1-11.oe1.aarch64.rpm
busybox-debugsource-1.31.1-11.oe1.aarch64.rpm
busybox-1.31.1-11.oe1.aarch64.rpm
busybox-debuginfo-1.31.1-11.oe1.aarch64.rpm
busybox-petitboot-1.31.1-11.oe1.aarch64.rpm
busybox-1.31.1-13.oe1.src.rpm
busybox-1.31.1-11.oe1.src.rpm
busybox-help-1.31.1-13.oe1.x86_64.rpm
busybox-petitboot-1.31.1-13.oe1.x86_64.rpm
busybox-debuginfo-1.31.1-13.oe1.x86_64.rpm
busybox-1.31.1-13.oe1.x86_64.rpm
busybox-debugsource-1.31.1-13.oe1.x86_64.rpm
busybox-help-1.31.1-11.oe1.x86_64.rpm
busybox-debugsource-1.31.1-11.oe1.x86_64.rpm
busybox-1.31.1-11.oe1.x86_64.rpm
busybox-debuginfo-1.31.1-11.oe1.x86_64.rpm
busybox-petitboot-1.31.1-11.oe1.x86_64.rpm
A use-after-free in Busybox's awk applet leads to denial of service and possibly code execution when processing a crafted awk pattern in the getvar_s function
2021-12-03
CVE-2021-42382
openEuler-20.03-LTS-SP1
openEuler-20.03-LTS-SP2
High
7.2
AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
busybox security update
2021-12-03
https://www.openeuler.org/en/security/safety-bulletin/detail.html?id=openEuler-SA-2021-1449
A use-after-free in Busybox's awk applet leads to denial of service and possibly code execution when processing a crafted awk pattern in the hash_init function
2021-12-03
CVE-2021-42381
openEuler-20.03-LTS-SP1
openEuler-20.03-LTS-SP2
High
7.2
AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
busybox security update
2021-12-03
https://www.openeuler.org/en/security/safety-bulletin/detail.html?id=openEuler-SA-2021-1449
A use-after-free in Busybox's awk applet leads to denial of service and possibly code execution when processing a crafted awk pattern in the clrvar function
2021-12-03
CVE-2021-42380
openEuler-20.03-LTS-SP1
openEuler-20.03-LTS-SP2
High
7.2
AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
busybox security update
2021-12-03
https://www.openeuler.org/en/security/safety-bulletin/detail.html?id=openEuler-SA-2021-1449
A use-after-free in Busybox's awk applet leads to denial of service and possibly code execution when processing a crafted awk pattern in the evaluate function
2021-12-03
CVE-2021-42385
openEuler-20.03-LTS-SP1
openEuler-20.03-LTS-SP2
High
7.2
AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
busybox security update
2021-12-03
https://www.openeuler.org/en/security/safety-bulletin/detail.html?id=openEuler-SA-2021-1449
A use-after-free in Busybox's awk applet leads to denial of service and possibly code execution when processing a crafted awk pattern in the getvar_i function
2021-12-03
CVE-2021-42378
openEuler-20.03-LTS-SP1
openEuler-20.03-LTS-SP2
High
7.2
AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
busybox security update
2021-12-03
https://www.openeuler.org/en/security/safety-bulletin/detail.html?id=openEuler-SA-2021-1449
A use-after-free in Busybox's awk applet leads to denial of service and possibly code execution when processing a crafted awk pattern in the next_input_file function
2021-12-03
CVE-2021-42379
openEuler-20.03-LTS-SP1
openEuler-20.03-LTS-SP2
High
7.2
AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
busybox security update
2021-12-03
https://www.openeuler.org/en/security/safety-bulletin/detail.html?id=openEuler-SA-2021-1449
A use-after-free in Busybox's awk applet leads to denial of service and possibly code execution when processing a crafted awk pattern in the evaluate function
2021-12-03
CVE-2021-42383
openEuler-20.03-LTS-SP1
openEuler-20.03-LTS-SP2
High
7.2
AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
busybox security update
2021-12-03
https://www.openeuler.org/en/security/safety-bulletin/detail.html?id=openEuler-SA-2021-1449
A use-after-free in Busybox's awk applet leads to denial of service and possibly code execution when processing a crafted awk pattern in the handle_special function
2021-12-03
CVE-2021-42384
openEuler-20.03-LTS-SP1
openEuler-20.03-LTS-SP2
High
7.2
AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
busybox security update
2021-12-03
https://www.openeuler.org/en/security/safety-bulletin/detail.html?id=openEuler-SA-2021-1449