Our docker image scanning tools reported that prom/blackbox-exporter:v0.19.0 has CVE-2021-42377 with following description
An attacker-controlled pointer free in Busybox's hush applet leads to denial of service and possible code execution when processing a crafted shell command, due to the shell mishandling the &&& string. This may be used for remote code execution under rare conditions of filtered command input.
Is it possible creating newer version of this image to resolve this CVE ?
Our docker image scanning tools reported that prom/blackbox-exporter:v0.19.0 has CVE-2021-42377 with following description
Is it possible creating newer version of this image to resolve this CVE ?