First published: Fri Mar 19 2021(Updated: )
decompress_gunzip.c in BusyBox through 1.32.1 mishandles the error bit on the huft_build result pointer, with a resultant invalid free or segmentation fault, via malformed gzip data.
Credit: cve@mitre.org cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Busybox Busybox | >=1.32.0<=1.32.1 | |
Fedoraproject Fedora | =32 | |
Fedoraproject Fedora | =33 | |
Fedoraproject Fedora | =34 | |
Debian Debian Linux | =9.0 | |
debian/busybox | <=1:1.30.1-6 | 1:1.35.0-4 1:1.36.1-9 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2021-28831 is a vulnerability in BusyBox through version 1.32.1 that mishandles the error bit on the huft_build result pointer, leading to an invalid free or segmentation fault when processing malformed gzip data.
BusyBox versions up to and including 1.32.1 are affected by CVE-2021-28831.
The CVE-2021-28831 vulnerability can be exploited by providing the affected software with malformed gzip data, which can trigger an invalid free or segmentation fault.
Yes, updating BusyBox to version 1.32.2 or later will fix the CVE-2021-28831 vulnerability.
You can find more information about CVE-2021-28831 on the MITRE CVE website and the Ubuntu security notices.