CVE-2021-28831 (https://git.busybox.net/busybox/commit/?id=f25d254dfd4243698c31a4f3153d4ac72aa9e9bd): decompress_gunzip.c in BusyBox through 1.32.1 mishandles the error bit on the huft_build result pointer, with a resultant invalid free or segmentation fault, via malformed gzip data. Please cleanup <1.32.0-r1.
The bug has been referenced in the following commit(s): https://gitweb.gentoo.org/repo/gentoo.git/commit/?id=ef7c4bacba33dac9ad48e980d68cfe57e2bf6858 commit ef7c4bacba33dac9ad48e980d68cfe57e2bf6858 Author: Thomas Deutschmann <whissi@gentoo.org> AuthorDate: 2021-03-31 22:54:33 +0000 Commit: Thomas Deutschmann <whissi@gentoo.org> CommitDate: 2021-03-31 22:54:44 +0000 sys-apps/busybox: security cleanup Bug: https://bugs.gentoo.org/777255 Package-Manager: Portage-3.0.18, Repoman-3.0.3 Signed-off-by: Thomas Deutschmann <whissi@gentoo.org> sys-apps/busybox/Manifest | 1 - sys-apps/busybox/busybox-1.32.0-r1.ebuild | 337 ------------------------------ 2 files changed, 338 deletions(-)
New GLSA request filed.
This issue was resolved and addressed in GLSA 202105-09 at https://security.gentoo.org/glsa/202105-09 by GLSA coordinator Thomas Deutschmann (whissi).