Search for packages
purl | pkg:alpm/archlinux/mkinitcpio-busybox@1.33.1-1 |
Vulnerability | Summary | Fixed by |
---|---|---|
VCID-2tkt-ue26-aaac
Aliases: CVE-2021-42379 |
A use-after-free in Busybox's awk applet leads to denial of service and possibly code execution when processing a crafted awk pattern in the next_input_file function |
Affected by 0 other vulnerabilities. |
VCID-5rqu-a8ny-aaaa
Aliases: CVE-2021-42381 |
A use-after-free in Busybox's awk applet leads to denial of service and possibly code execution when processing a crafted awk pattern in the hash_init function |
Affected by 0 other vulnerabilities. |
VCID-6dg9-jza4-aaae
Aliases: CVE-2021-42378 |
A use-after-free in Busybox's awk applet leads to denial of service and possibly code execution when processing a crafted awk pattern in the getvar_i function |
Affected by 0 other vulnerabilities. |
VCID-7pk9-skex-aaam
Aliases: CVE-2021-42373 |
A NULL pointer dereference in Busybox's man applet leads to denial of service when a section name is supplied but no page argument is given |
Affected by 0 other vulnerabilities. |
VCID-ahw5-xnjr-aaar
Aliases: CVE-2021-42380 |
A use-after-free in Busybox's awk applet leads to denial of service and possibly code execution when processing a crafted awk pattern in the clrvar function |
Affected by 0 other vulnerabilities. |
VCID-av9h-6859-aaac
Aliases: CVE-2021-42377 |
An attacker-controlled pointer free in Busybox's hush applet leads to denial of service and possible code execution when processing a crafted shell command, due to the shell mishandling the &&& string. This may be used for remote code execution under rare conditions of filtered command input. |
Affected by 0 other vulnerabilities. |
VCID-bczg-wjhp-aaad
Aliases: CVE-2021-42383 |
A use-after-free in Busybox's awk applet leads to denial of service and possibly code execution when processing a crafted awk pattern in the evaluate function |
Affected by 0 other vulnerabilities. |
VCID-ebet-us66-aaaf
Aliases: CVE-2021-42375 |
An incorrect handling of a special element in Busybox's ash applet leads to denial of service when processing a crafted shell command, due to the shell mistaking specific characters for reserved characters. This may be used for DoS under rare conditions of filtered command input. |
Affected by 0 other vulnerabilities. |
VCID-gmbr-bs84-aaap
Aliases: CVE-2021-42384 |
A use-after-free in Busybox's awk applet leads to denial of service and possibly code execution when processing a crafted awk pattern in the handle_special function |
Affected by 0 other vulnerabilities. |
VCID-jgpd-adpu-aaas
Aliases: CVE-2021-42374 |
An out-of-bounds heap read in Busybox's unlzma applet leads to information leak and denial of service when crafted LZMA-compressed input is decompressed. This can be triggered by any applet/format that |
Affected by 0 other vulnerabilities. |
VCID-ket1-5bqg-aaah
Aliases: CVE-2021-42376 |
A NULL pointer dereference in Busybox's hush applet leads to denial of service when processing a crafted shell command, due to missing validation after a \x03 delimiter character. This may be used for DoS under very rare conditions of filtered command input. |
Affected by 0 other vulnerabilities. |
VCID-qzgw-u7tm-aaab
Aliases: CVE-2021-42382 |
A use-after-free in Busybox's awk applet leads to denial of service and possibly code execution when processing a crafted awk pattern in the getvar_s function |
Affected by 0 other vulnerabilities. |
VCID-x3h3-2gm5-aaar
Aliases: CVE-2021-42386 |
A use-after-free in Busybox's awk applet leads to denial of service and possibly code execution when processing a crafted awk pattern in the nvalloc function |
Affected by 0 other vulnerabilities. |
VCID-xfvj-3dez-aaap
Aliases: CVE-2021-42385 |
A use-after-free in Busybox's awk applet leads to denial of service and possibly code execution when processing a crafted awk pattern in the evaluate function |
Affected by 0 other vulnerabilities. |
Vulnerability | Summary | Aliases |
---|---|---|
This package is not known to fix vulnerabilities. |
Date | Actor | Action | Vulnerability | Source | VulnerableCode Version |
---|---|---|---|---|---|
2025-03-28T07:46:24.461207+00:00 | Arch Linux Importer | Affected by | VCID-7pk9-skex-aaam | https://security.archlinux.org/AVG-2562 | 36.0.0 |
2025-03-28T07:46:24.442555+00:00 | Arch Linux Importer | Affected by | VCID-jgpd-adpu-aaas | https://security.archlinux.org/AVG-2562 | 36.0.0 |
2025-03-28T07:46:24.423865+00:00 | Arch Linux Importer | Affected by | VCID-ebet-us66-aaaf | https://security.archlinux.org/AVG-2562 | 36.0.0 |
2025-03-28T07:46:24.405213+00:00 | Arch Linux Importer | Affected by | VCID-ket1-5bqg-aaah | https://security.archlinux.org/AVG-2562 | 36.0.0 |
2025-03-28T07:46:24.386368+00:00 | Arch Linux Importer | Affected by | VCID-av9h-6859-aaac | https://security.archlinux.org/AVG-2562 | 36.0.0 |
2025-03-28T07:46:24.367287+00:00 | Arch Linux Importer | Affected by | VCID-6dg9-jza4-aaae | https://security.archlinux.org/AVG-2562 | 36.0.0 |
2025-03-28T07:46:24.348647+00:00 | Arch Linux Importer | Affected by | VCID-2tkt-ue26-aaac | https://security.archlinux.org/AVG-2562 | 36.0.0 |
2025-03-28T07:46:24.330061+00:00 | Arch Linux Importer | Affected by | VCID-ahw5-xnjr-aaar | https://security.archlinux.org/AVG-2562 | 36.0.0 |
2025-03-28T07:46:24.311348+00:00 | Arch Linux Importer | Affected by | VCID-5rqu-a8ny-aaaa | https://security.archlinux.org/AVG-2562 | 36.0.0 |
2025-03-28T07:46:24.292476+00:00 | Arch Linux Importer | Affected by | VCID-qzgw-u7tm-aaab | https://security.archlinux.org/AVG-2562 | 36.0.0 |
2025-03-28T07:46:24.273900+00:00 | Arch Linux Importer | Affected by | VCID-bczg-wjhp-aaad | https://security.archlinux.org/AVG-2562 | 36.0.0 |
2025-03-28T07:46:24.254902+00:00 | Arch Linux Importer | Affected by | VCID-gmbr-bs84-aaap | https://security.archlinux.org/AVG-2562 | 36.0.0 |
2025-03-28T07:46:24.236072+00:00 | Arch Linux Importer | Affected by | VCID-xfvj-3dez-aaap | https://security.archlinux.org/AVG-2562 | 36.0.0 |
2025-03-28T07:46:24.217462+00:00 | Arch Linux Importer | Affected by | VCID-x3h3-2gm5-aaar | https://security.archlinux.org/AVG-2562 | 36.0.0 |
2024-09-18T02:01:39.674027+00:00 | Arch Linux Importer | Affected by | VCID-7pk9-skex-aaam | https://security.archlinux.org/AVG-2562 | 34.0.1 |
2024-09-18T02:01:39.648315+00:00 | Arch Linux Importer | Affected by | VCID-jgpd-adpu-aaas | https://security.archlinux.org/AVG-2562 | 34.0.1 |
2024-09-18T02:01:39.624446+00:00 | Arch Linux Importer | Affected by | VCID-ebet-us66-aaaf | https://security.archlinux.org/AVG-2562 | 34.0.1 |
2024-09-18T02:01:39.602964+00:00 | Arch Linux Importer | Affected by | VCID-ket1-5bqg-aaah | https://security.archlinux.org/AVG-2562 | 34.0.1 |
2024-09-18T02:01:39.579361+00:00 | Arch Linux Importer | Affected by | VCID-av9h-6859-aaac | https://security.archlinux.org/AVG-2562 | 34.0.1 |
2024-09-18T02:01:39.554923+00:00 | Arch Linux Importer | Affected by | VCID-6dg9-jza4-aaae | https://security.archlinux.org/AVG-2562 | 34.0.1 |
2024-09-18T02:01:39.521409+00:00 | Arch Linux Importer | Affected by | VCID-2tkt-ue26-aaac | https://security.archlinux.org/AVG-2562 | 34.0.1 |
2024-09-18T02:01:39.496753+00:00 | Arch Linux Importer | Affected by | VCID-ahw5-xnjr-aaar | https://security.archlinux.org/AVG-2562 | 34.0.1 |
2024-09-18T02:01:39.472712+00:00 | Arch Linux Importer | Affected by | VCID-5rqu-a8ny-aaaa | https://security.archlinux.org/AVG-2562 | 34.0.1 |
2024-09-18T02:01:39.447152+00:00 | Arch Linux Importer | Affected by | VCID-qzgw-u7tm-aaab | https://security.archlinux.org/AVG-2562 | 34.0.1 |
2024-09-18T02:01:39.420958+00:00 | Arch Linux Importer | Affected by | VCID-bczg-wjhp-aaad | https://security.archlinux.org/AVG-2562 | 34.0.1 |
2024-09-18T02:01:39.395233+00:00 | Arch Linux Importer | Affected by | VCID-gmbr-bs84-aaap | https://security.archlinux.org/AVG-2562 | 34.0.1 |
2024-09-18T02:01:39.369704+00:00 | Arch Linux Importer | Affected by | VCID-xfvj-3dez-aaap | https://security.archlinux.org/AVG-2562 | 34.0.1 |
2024-09-18T02:01:39.343325+00:00 | Arch Linux Importer | Affected by | VCID-x3h3-2gm5-aaar | https://security.archlinux.org/AVG-2562 | 34.0.1 |
2024-01-03T22:27:46.080751+00:00 | Arch Linux Importer | Affected by | VCID-7pk9-skex-aaam | https://security.archlinux.org/AVG-2562 | 34.0.0rc1 |
2024-01-03T22:27:46.058791+00:00 | Arch Linux Importer | Affected by | VCID-jgpd-adpu-aaas | https://security.archlinux.org/AVG-2562 | 34.0.0rc1 |
2024-01-03T22:27:46.036892+00:00 | Arch Linux Importer | Affected by | VCID-ebet-us66-aaaf | https://security.archlinux.org/AVG-2562 | 34.0.0rc1 |
2024-01-03T22:27:46.017376+00:00 | Arch Linux Importer | Affected by | VCID-ket1-5bqg-aaah | https://security.archlinux.org/AVG-2562 | 34.0.0rc1 |
2024-01-03T22:27:45.998368+00:00 | Arch Linux Importer | Affected by | VCID-av9h-6859-aaac | https://security.archlinux.org/AVG-2562 | 34.0.0rc1 |
2024-01-03T22:27:45.979309+00:00 | Arch Linux Importer | Affected by | VCID-6dg9-jza4-aaae | https://security.archlinux.org/AVG-2562 | 34.0.0rc1 |
2024-01-03T22:27:45.959873+00:00 | Arch Linux Importer | Affected by | VCID-2tkt-ue26-aaac | https://security.archlinux.org/AVG-2562 | 34.0.0rc1 |
2024-01-03T22:27:45.940784+00:00 | Arch Linux Importer | Affected by | VCID-ahw5-xnjr-aaar | https://security.archlinux.org/AVG-2562 | 34.0.0rc1 |
2024-01-03T22:27:45.921867+00:00 | Arch Linux Importer | Affected by | VCID-5rqu-a8ny-aaaa | https://security.archlinux.org/AVG-2562 | 34.0.0rc1 |
2024-01-03T22:27:45.897977+00:00 | Arch Linux Importer | Affected by | VCID-qzgw-u7tm-aaab | https://security.archlinux.org/AVG-2562 | 34.0.0rc1 |
2024-01-03T22:27:45.876550+00:00 | Arch Linux Importer | Affected by | VCID-bczg-wjhp-aaad | https://security.archlinux.org/AVG-2562 | 34.0.0rc1 |
2024-01-03T22:27:45.854667+00:00 | Arch Linux Importer | Affected by | VCID-gmbr-bs84-aaap | https://security.archlinux.org/AVG-2562 | 34.0.0rc1 |
2024-01-03T22:27:45.832810+00:00 | Arch Linux Importer | Affected by | VCID-xfvj-3dez-aaap | https://security.archlinux.org/AVG-2562 | 34.0.0rc1 |
2024-01-03T22:27:45.810896+00:00 | Arch Linux Importer | Affected by | VCID-x3h3-2gm5-aaar | https://security.archlinux.org/AVG-2562 | 34.0.0rc1 |