First published: Mon Nov 15 2021(Updated: )
A use-after-free in Busybox's awk applet leads to denial of service and possibly code execution when processing a crafted awk pattern in the evaluate function
Credit: reefs@jfrog.com reefs@jfrog.com reefs@jfrog.com
Affected Software | Affected Version | How to fix |
---|---|---|
Busybox Busybox | >=1.16.0<=1.33.1 | |
Fedoraproject Fedora | =33 | |
Fedoraproject Fedora | =34 | |
debian/busybox | <=1:1.30.1-6 | 1:1.35.0-4 1:1.36.1-9 |
>=1.16.0<=1.33.1 | ||
=33 | ||
=34 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID for this use-after-free vulnerability is CVE-2021-42385.
The affected software for this vulnerability is Busybox.
The severity of CVE-2021-42385 is not specified.
The use-after-free vulnerability in Busybox's awk applet can lead to denial of service by causing the applet to crash or become unresponsive.
Yes, there are available fixes for CVE-2021-42385 depending on the version of Busybox being used.