Packages
- busybox - Tiny utilities for small and embedded systems
Details
It was discovered that BusyBox incorrectly handled certain malformed gzip
archives. If a user or automated system were tricked into processing a
specially crafted gzip archive, a remote attacker could use this issue to
cause BusyBox to crash, resulting in a denial of service, or possibly
execute arbitrary code. (CVE-2021-28831)
It was discovered that BusyBox incorrectly handled certain malformed LZMA
archives. If a user or automated system were tricked into processing a
specially crafted LZMA archive, a remote attacker could use this issue to
cause BusyBox to crash, resulting in a denial of service, or possibly
leak sensitive information. (CVE-2021-42374)
Vera Mens, Uri Katz, Tal Keren, Sharon Brizinov, and Shachar Menashe
discovered that BusyBox incorrectly handled certain awk patterns. If a user
or automated system were tricked into processing a...
It was discovered that BusyBox incorrectly handled certain malformed gzip
archives. If a user or automated system were tricked into processing a
specially crafted gzip archive, a remote attacker could use this issue to
cause BusyBox to crash, resulting in a denial of service, or possibly
execute arbitrary code. (CVE-2021-28831)
It was discovered that BusyBox incorrectly handled certain malformed LZMA
archives. If a user or automated system were tricked into processing a
specially crafted LZMA archive, a remote attacker could use this issue to
cause BusyBox to crash, resulting in a denial of service, or possibly
leak sensitive information. (CVE-2021-42374)
Vera Mens, Uri Katz, Tal Keren, Sharon Brizinov, and Shachar Menashe
discovered that BusyBox incorrectly handled certain awk patterns. If a user
or automated system were tricked into processing a specially crafted awk
pattern, a remote attacker could use this issue to cause BusyBox to crash,
resulting in a denial of service, or possibly execute arbitrary code.
(CVE-2021-42378, CVE-2021-42379, CVE-2021-42380, CVE-2021-42381,
CVE-2021-42382, CVE-2021-42384, CVE-2021-42385, CVE-2021-42386)
Update instructions
In general, a standard system update will make all the necessary changes.
Learn more about how to get the fixes.The problem can be corrected by updating your system to the following package versions:
Ubuntu Release | Package Version | ||
---|---|---|---|
21.10 impish | busybox – 1:1.30.1-6ubuntu3.1 | ||
busybox-initramfs – 1:1.30.1-6ubuntu3.1 | |||
busybox-static – 1:1.30.1-6ubuntu3.1 | |||
21.04 hirsute | busybox – 1:1.30.1-6ubuntu2.1 | ||
busybox-initramfs – 1:1.30.1-6ubuntu2.1 | |||
busybox-static – 1:1.30.1-6ubuntu2.1 | |||
20.04 focal | busybox – 1:1.30.1-4ubuntu6.4 | ||
busybox-initramfs – 1:1.30.1-4ubuntu6.4 | |||
busybox-static – 1:1.30.1-4ubuntu6.4 | |||
18.04 bionic | busybox – 1:1.27.2-2ubuntu3.4 | ||
busybox-initramfs – 1:1.27.2-2ubuntu3.4 | |||
busybox-static – 1:1.27.2-2ubuntu3.4 |
Reduce your security exposure
Ubuntu Pro provides ten-year security coverage to 25,000+ packages in Main and Universe repositories, and it is free for up to five machines.