Action not permitted
Modal body text goes here.
Modal Title
Modal Body
cve-2021-28831
Vulnerability from cvelistv5
Published
2021-03-19 04:01
Modified
2024-08-03 21:55
Severity ?
EPSS score ?
0.89%
(0.74126)
Summary
decompress_gunzip.c in BusyBox through 1.32.1 mishandles the error bit on the huft_build result pointer, with a resultant invalid free or segmentation fault, via malformed gzip data.
References
{ containers: { adp: [ { providerMetadata: { dateUpdated: "2024-08-03T21:55:12.232Z", orgId: "af854a3a-2127-422b-91ae-364da2661108", shortName: "CVE", }, references: [ { tags: [ "x_refsource_MISC", "x_transferred", ], url: "https://git.busybox.net/busybox/commit/?id=f25d254dfd4243698c31a4f3153d4ac72aa9e9bd", }, { name: "FEDORA-2021-e82915eee1", tags: [ "vendor-advisory", "x_refsource_FEDORA", "x_transferred", ], url: "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ZASBW7QRRLY5V2R44MQ4QQM4CZIDHM2U/", }, { name: "FEDORA-2021-d20c8a4730", tags: [ "vendor-advisory", "x_refsource_FEDORA", "x_transferred", ], url: "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/Z7ZIFKPRR32ZYA3WAA2NXFA3QHHOU6FJ/", }, { name: "FEDORA-2021-2024803354", tags: [ "vendor-advisory", "x_refsource_FEDORA", "x_transferred", ], url: "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/3UDQGJRECXFS5EZVDH2OI45FMO436AC4/", }, { name: "[debian-lts-announce] 20210401 [SECURITY] [DLA 2614-1] busybox security update", tags: [ "mailing-list", "x_refsource_MLIST", "x_transferred", ], url: "https://lists.debian.org/debian-lts-announce/2021/04/msg00001.html", }, { name: "GLSA-202105-09", tags: [ "vendor-advisory", "x_refsource_GENTOO", "x_transferred", ], url: "https://security.gentoo.org/glsa/202105-09", }, ], title: "CVE Program Container", }, ], cna: { affected: [ { product: "n/a", vendor: "n/a", versions: [ { status: "affected", version: "n/a", }, ], }, ], descriptions: [ { lang: "en", value: "decompress_gunzip.c in BusyBox through 1.32.1 mishandles the error bit on the huft_build result pointer, with a resultant invalid free or segmentation fault, via malformed gzip data.", }, ], metrics: [ { cvssV3_1: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "HIGH", baseScore: 7.5, baseSeverity: "HIGH", confidentialityImpact: "NONE", integrityImpact: "NONE", privilegesRequired: "NONE", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.1/AC:L/AV:N/A:H/C:N/I:N/PR:N/S:U/UI:N", version: "3.1", }, }, ], problemTypes: [ { descriptions: [ { description: "n/a", lang: "en", type: "text", }, ], }, ], providerMetadata: { dateUpdated: "2021-05-26T09:06:11", orgId: "8254265b-2729-46b6-b9e3-3dfca2d5bfca", shortName: "mitre", }, references: [ { tags: [ "x_refsource_MISC", ], url: "https://git.busybox.net/busybox/commit/?id=f25d254dfd4243698c31a4f3153d4ac72aa9e9bd", }, { name: "FEDORA-2021-e82915eee1", tags: [ "vendor-advisory", "x_refsource_FEDORA", ], url: "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ZASBW7QRRLY5V2R44MQ4QQM4CZIDHM2U/", }, { name: "FEDORA-2021-d20c8a4730", tags: [ "vendor-advisory", "x_refsource_FEDORA", ], url: "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/Z7ZIFKPRR32ZYA3WAA2NXFA3QHHOU6FJ/", }, { name: "FEDORA-2021-2024803354", tags: [ "vendor-advisory", "x_refsource_FEDORA", ], url: "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/3UDQGJRECXFS5EZVDH2OI45FMO436AC4/", }, { name: "[debian-lts-announce] 20210401 [SECURITY] [DLA 2614-1] busybox security update", tags: [ "mailing-list", "x_refsource_MLIST", ], url: "https://lists.debian.org/debian-lts-announce/2021/04/msg00001.html", }, { name: "GLSA-202105-09", tags: [ "vendor-advisory", "x_refsource_GENTOO", ], url: "https://security.gentoo.org/glsa/202105-09", }, ], x_legacyV4Record: { CVE_data_meta: { ASSIGNER: "cve@mitre.org", ID: "CVE-2021-28831", STATE: "PUBLIC", }, affects: { vendor: { vendor_data: [ { product: { product_data: [ { product_name: "n/a", version: { version_data: [ { version_value: "n/a", }, ], }, }, ], }, vendor_name: "n/a", }, ], }, }, data_format: "MITRE", data_type: "CVE", data_version: "4.0", description: { description_data: [ { lang: "eng", value: "decompress_gunzip.c in BusyBox through 1.32.1 mishandles the error bit on the huft_build result pointer, with a resultant invalid free or segmentation fault, via malformed gzip data.", }, ], }, impact: { cvss: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "HIGH", confidentialityImpact: "NONE", integrityImpact: "NONE", privilegesRequired: "NONE", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.1/AC:L/AV:N/A:H/C:N/I:N/PR:N/S:U/UI:N", version: "3.1", }, }, problemtype: { problemtype_data: [ { description: [ { lang: "eng", value: "n/a", }, ], }, ], }, references: { reference_data: [ { name: "https://git.busybox.net/busybox/commit/?id=f25d254dfd4243698c31a4f3153d4ac72aa9e9bd", refsource: "MISC", url: "https://git.busybox.net/busybox/commit/?id=f25d254dfd4243698c31a4f3153d4ac72aa9e9bd", }, { name: "FEDORA-2021-e82915eee1", refsource: "FEDORA", url: "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ZASBW7QRRLY5V2R44MQ4QQM4CZIDHM2U/", }, { name: "FEDORA-2021-d20c8a4730", refsource: "FEDORA", url: "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/Z7ZIFKPRR32ZYA3WAA2NXFA3QHHOU6FJ/", }, { name: "FEDORA-2021-2024803354", refsource: "FEDORA", url: "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/3UDQGJRECXFS5EZVDH2OI45FMO436AC4/", }, { name: "[debian-lts-announce] 20210401 [SECURITY] [DLA 2614-1] busybox security update", refsource: "MLIST", url: "https://lists.debian.org/debian-lts-announce/2021/04/msg00001.html", }, { name: "GLSA-202105-09", refsource: "GENTOO", url: "https://security.gentoo.org/glsa/202105-09", }, ], }, }, }, }, cveMetadata: { assignerOrgId: "8254265b-2729-46b6-b9e3-3dfca2d5bfca", assignerShortName: "mitre", cveId: "CVE-2021-28831", datePublished: "2021-03-19T04:01:54", dateReserved: "2021-03-19T00:00:00", dateUpdated: "2024-08-03T21:55:12.232Z", state: "PUBLISHED", }, dataType: "CVE_RECORD", dataVersion: "5.1", "vulnerability-lookup:meta": { nvd: "{\"cve\":{\"id\":\"CVE-2021-28831\",\"sourceIdentifier\":\"cve@mitre.org\",\"published\":\"2021-03-19T05:15:13.150\",\"lastModified\":\"2024-11-21T06:00:17.377\",\"vulnStatus\":\"Modified\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"decompress_gunzip.c in BusyBox through 1.32.1 mishandles the error bit on the huft_build result pointer, with a resultant invalid free or segmentation fault, via malformed gzip data.\"},{\"lang\":\"es\",\"value\":\"El archivo decompress_gunzip.c en BusyBox versiones hasta 1.32.1, maneja inapropiadamente el bit de error en el puntero de resultado de huft_build, con un fallo liberación invalida o de segmentación resultante, por medio de datos gzip malformados\"}],\"metrics\":{\"cvssMetricV31\":[{\"source\":\"cve@mitre.org\",\"type\":\"Secondary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H\",\"baseScore\":7.5,\"baseSeverity\":\"HIGH\",\"attackVector\":\"NETWORK\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"NONE\",\"userInteraction\":\"NONE\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"NONE\",\"integrityImpact\":\"NONE\",\"availabilityImpact\":\"HIGH\"},\"exploitabilityScore\":3.9,\"impactScore\":3.6},{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H\",\"baseScore\":7.5,\"baseSeverity\":\"HIGH\",\"attackVector\":\"NETWORK\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"NONE\",\"userInteraction\":\"NONE\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"NONE\",\"integrityImpact\":\"NONE\",\"availabilityImpact\":\"HIGH\"},\"exploitabilityScore\":3.9,\"impactScore\":3.6}],\"cvssMetricV2\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"2.0\",\"vectorString\":\"AV:N/AC:L/Au:N/C:N/I:N/A:P\",\"baseScore\":5.0,\"accessVector\":\"NETWORK\",\"accessComplexity\":\"LOW\",\"authentication\":\"NONE\",\"confidentialityImpact\":\"NONE\",\"integrityImpact\":\"NONE\",\"availabilityImpact\":\"PARTIAL\"},\"baseSeverity\":\"MEDIUM\",\"exploitabilityScore\":10.0,\"impactScore\":2.9,\"acInsufInfo\":false,\"obtainAllPrivilege\":false,\"obtainUserPrivilege\":false,\"obtainOtherPrivilege\":false,\"userInteractionRequired\":false}]},\"weaknesses\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-755\"}]}],\"configurations\":[{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:busybox:busybox:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"1.32.0\",\"versionEndIncluding\":\"1.32.1\",\"matchCriteriaId\":\"3F45843F-3E26-4DE5-B89B-E83623AB8054\"}]}]},{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:fedoraproject:fedora:32:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"36D96259-24BD-44E2-96D9-78CE1D41F956\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:fedoraproject:fedora:33:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E460AA51-FCDA-46B9-AE97-E6676AA5E194\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:fedoraproject:fedora:34:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A930E247-0B43-43CB-98FF-6CE7B8189835\"}]}]},{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"DEECE5FC-CACF-4496-A3E7-164736409252\"}]}]}],\"references\":[{\"url\":\"https://git.busybox.net/busybox/commit/?id=f25d254dfd4243698c31a4f3153d4ac72aa9e9bd\",\"source\":\"cve@mitre.org\",\"tags\":[\"Mailing List\",\"Patch\",\"Vendor Advisory\"]},{\"url\":\"https://lists.debian.org/debian-lts-announce/2021/04/msg00001.html\",\"source\":\"cve@mitre.org\",\"tags\":[\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/3UDQGJRECXFS5EZVDH2OI45FMO436AC4/\",\"source\":\"cve@mitre.org\"},{\"url\":\"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/Z7ZIFKPRR32ZYA3WAA2NXFA3QHHOU6FJ/\",\"source\":\"cve@mitre.org\"},{\"url\":\"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ZASBW7QRRLY5V2R44MQ4QQM4CZIDHM2U/\",\"source\":\"cve@mitre.org\"},{\"url\":\"https://security.gentoo.org/glsa/202105-09\",\"source\":\"cve@mitre.org\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://git.busybox.net/busybox/commit/?id=f25d254dfd4243698c31a4f3153d4ac72aa9e9bd\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Mailing List\",\"Patch\",\"Vendor Advisory\"]},{\"url\":\"https://lists.debian.org/debian-lts-announce/2021/04/msg00001.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/3UDQGJRECXFS5EZVDH2OI45FMO436AC4/\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/Z7ZIFKPRR32ZYA3WAA2NXFA3QHHOU6FJ/\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ZASBW7QRRLY5V2R44MQ4QQM4CZIDHM2U/\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://security.gentoo.org/glsa/202105-09\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]}]}}", }, }
opensuse-su-2021:1408-1
Vulnerability from csaf_opensuse
Published
2021-10-31 14:53
Modified
2021-10-31 14:53
Summary
Security update for busybox
Notes
Title of the patch
Security update for busybox
Description of the patch
This update for busybox fixes the following issues:
- CVE-2021-28831: Fixed invalid free or segmentation fault via malformed gzip data (bsc#1184522).
- CVE-2018-20679: Fixed out of bounds read in udhcp (bsc#1121426).
- CVE-2018-1000517: Fixed buffer overflow in the retrieve_file_data() (bsc#1099260).
- CVE-2011-5325: Fixed a directory traversal related to 'tar' command (bsc#951562).
- CVE-2018-1000500: Fixed missing SSL certificate validation related to the 'wget' command (bsc#1099263).
This update was imported from the SUSE:SLE-15:Update update project.
Patchnames
openSUSE-2021-1408
Terms of use
CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
{ document: { aggregate_severity: { namespace: "https://www.suse.com/support/security/rating/", text: "important", }, category: "csaf_security_advisory", csaf_version: "2.0", distribution: { text: "Copyright 2024 SUSE LLC. All rights reserved.", tlp: { label: "WHITE", url: "https://www.first.org/tlp/", }, }, lang: "en", notes: [ { category: "summary", text: "Security update for busybox", title: "Title of the patch", }, { category: "description", text: "This update for busybox fixes the following issues:\n\n- CVE-2021-28831: Fixed invalid free or segmentation fault via malformed gzip data (bsc#1184522).\n- CVE-2018-20679: Fixed out of bounds read in udhcp (bsc#1121426).\n- CVE-2018-1000517: Fixed buffer overflow in the retrieve_file_data() (bsc#1099260).\n- CVE-2011-5325: Fixed a directory traversal related to 'tar' command (bsc#951562).\n- CVE-2018-1000500: Fixed missing SSL certificate validation related to the 'wget' command (bsc#1099263).\n\nThis update was imported from the SUSE:SLE-15:Update update project.", title: "Description of the patch", }, { category: "details", text: "openSUSE-2021-1408", title: "Patchnames", }, { category: "legal_disclaimer", text: "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", title: "Terms of use", }, ], publisher: { category: "vendor", contact_details: "https://www.suse.com/support/security/contact/", name: "SUSE Product Security Team", namespace: "https://www.suse.com/", }, references: [ { category: "external", summary: "SUSE ratings", url: "https://www.suse.com/support/security/rating/", }, { category: "self", summary: "URL of this CSAF notice", url: "https://ftp.suse.com/pub/projects/security/csaf/opensuse-su-2021_1408-1.json", }, { category: "self", summary: "URL for openSUSE-SU-2021:1408-1", url: "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/LTZHQ6OAWXY23IUCNO7X25C5CHHCWLOM/", }, { category: "self", summary: "E-Mail link for openSUSE-SU-2021:1408-1", url: "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/LTZHQ6OAWXY23IUCNO7X25C5CHHCWLOM/", }, { category: "self", summary: "SUSE Bug 1099260", url: "https://bugzilla.suse.com/1099260", }, { category: "self", summary: "SUSE Bug 1099263", url: "https://bugzilla.suse.com/1099263", }, { category: "self", summary: "SUSE Bug 1121426", url: "https://bugzilla.suse.com/1121426", }, { category: "self", summary: "SUSE Bug 1184522", url: "https://bugzilla.suse.com/1184522", }, { category: "self", summary: "SUSE Bug 951562", url: "https://bugzilla.suse.com/951562", }, { category: "self", summary: "SUSE CVE CVE-2011-5325 page", url: "https://www.suse.com/security/cve/CVE-2011-5325/", }, { category: "self", summary: "SUSE CVE CVE-2018-1000500 page", url: "https://www.suse.com/security/cve/CVE-2018-1000500/", }, { category: "self", summary: "SUSE CVE CVE-2018-1000517 page", url: "https://www.suse.com/security/cve/CVE-2018-1000517/", }, { category: "self", summary: "SUSE CVE CVE-2018-20679 page", url: "https://www.suse.com/security/cve/CVE-2018-20679/", }, { category: "self", summary: "SUSE CVE CVE-2021-28831 page", url: "https://www.suse.com/security/cve/CVE-2021-28831/", }, ], title: "Security update for busybox", tracking: { current_release_date: "2021-10-31T14:53:16Z", generator: { date: "2021-10-31T14:53:16Z", engine: { name: "cve-database.git:bin/generate-csaf.pl", version: "1", }, }, id: "openSUSE-SU-2021:1408-1", initial_release_date: "2021-10-31T14:53:16Z", revision_history: [ { date: "2021-10-31T14:53:16Z", number: "1", summary: "Current version", }, ], status: "final", version: "1", }, }, product_tree: { branches: [ { branches: [ { branches: [ { category: "product_version", name: "busybox-1.26.2-lp152.5.3.1.i586", product: { name: "busybox-1.26.2-lp152.5.3.1.i586", product_id: "busybox-1.26.2-lp152.5.3.1.i586", }, }, ], category: "architecture", name: "i586", }, { branches: [ { category: "product_version", name: "busybox-1.26.2-lp152.5.3.1.x86_64", product: { name: "busybox-1.26.2-lp152.5.3.1.x86_64", product_id: "busybox-1.26.2-lp152.5.3.1.x86_64", }, }, { category: "product_version", name: "busybox-static-1.26.2-lp152.5.3.1.x86_64", product: { name: "busybox-static-1.26.2-lp152.5.3.1.x86_64", product_id: "busybox-static-1.26.2-lp152.5.3.1.x86_64", }, }, ], category: "architecture", name: "x86_64", }, { branches: [ { category: "product_name", name: "openSUSE Leap 15.2", product: { name: "openSUSE Leap 15.2", product_id: "openSUSE Leap 15.2", product_identification_helper: { cpe: "cpe:/o:opensuse:leap:15.2", }, }, }, ], category: "product_family", name: "SUSE Linux Enterprise", }, ], category: "vendor", name: "SUSE", }, ], relationships: [ { category: "default_component_of", full_product_name: { name: "busybox-1.26.2-lp152.5.3.1.i586 as component of openSUSE Leap 15.2", product_id: "openSUSE Leap 15.2:busybox-1.26.2-lp152.5.3.1.i586", }, product_reference: "busybox-1.26.2-lp152.5.3.1.i586", relates_to_product_reference: "openSUSE Leap 15.2", }, { category: "default_component_of", full_product_name: { name: "busybox-1.26.2-lp152.5.3.1.x86_64 as component of openSUSE Leap 15.2", product_id: "openSUSE Leap 15.2:busybox-1.26.2-lp152.5.3.1.x86_64", }, product_reference: "busybox-1.26.2-lp152.5.3.1.x86_64", relates_to_product_reference: "openSUSE Leap 15.2", }, { category: "default_component_of", full_product_name: { name: "busybox-static-1.26.2-lp152.5.3.1.x86_64 as component of openSUSE Leap 15.2", product_id: "openSUSE Leap 15.2:busybox-static-1.26.2-lp152.5.3.1.x86_64", }, product_reference: "busybox-static-1.26.2-lp152.5.3.1.x86_64", relates_to_product_reference: "openSUSE Leap 15.2", }, ], }, vulnerabilities: [ { cve: "CVE-2011-5325", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2011-5325", }, ], notes: [ { category: "general", text: "Directory traversal vulnerability in the BusyBox implementation of tar before 1.22.0 v5 allows remote attackers to point to files outside the current working directory via a symlink.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Leap 15.2:busybox-1.26.2-lp152.5.3.1.i586", "openSUSE Leap 15.2:busybox-1.26.2-lp152.5.3.1.x86_64", "openSUSE Leap 15.2:busybox-static-1.26.2-lp152.5.3.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2011-5325", url: "https://www.suse.com/security/cve/CVE-2011-5325", }, { category: "external", summary: "SUSE Bug 951562 for CVE-2011-5325", url: "https://bugzilla.suse.com/951562", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Leap 15.2:busybox-1.26.2-lp152.5.3.1.i586", "openSUSE Leap 15.2:busybox-1.26.2-lp152.5.3.1.x86_64", "openSUSE Leap 15.2:busybox-static-1.26.2-lp152.5.3.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 7.5, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N", version: "3.1", }, products: [ "openSUSE Leap 15.2:busybox-1.26.2-lp152.5.3.1.i586", "openSUSE Leap 15.2:busybox-1.26.2-lp152.5.3.1.x86_64", "openSUSE Leap 15.2:busybox-static-1.26.2-lp152.5.3.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2021-10-31T14:53:16Z", details: "moderate", }, ], title: "CVE-2011-5325", }, { cve: "CVE-2018-1000500", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2018-1000500", }, ], notes: [ { category: "general", text: "Busybox contains a Missing SSL certificate validation vulnerability in The \"busybox wget\" applet that can result in arbitrary code execution. This attack appear to be exploitable via Simply download any file over HTTPS using \"busybox wget https://compromised-domain.com/important-file\".", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Leap 15.2:busybox-1.26.2-lp152.5.3.1.i586", "openSUSE Leap 15.2:busybox-1.26.2-lp152.5.3.1.x86_64", "openSUSE Leap 15.2:busybox-static-1.26.2-lp152.5.3.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2018-1000500", url: "https://www.suse.com/security/cve/CVE-2018-1000500", }, { category: "external", summary: "SUSE Bug 1099263 for CVE-2018-1000500", url: "https://bugzilla.suse.com/1099263", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Leap 15.2:busybox-1.26.2-lp152.5.3.1.i586", "openSUSE Leap 15.2:busybox-1.26.2-lp152.5.3.1.x86_64", "openSUSE Leap 15.2:busybox-static-1.26.2-lp152.5.3.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 7.5, baseSeverity: "HIGH", vectorString: "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N", version: "3.0", }, products: [ "openSUSE Leap 15.2:busybox-1.26.2-lp152.5.3.1.i586", "openSUSE Leap 15.2:busybox-1.26.2-lp152.5.3.1.x86_64", "openSUSE Leap 15.2:busybox-static-1.26.2-lp152.5.3.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2021-10-31T14:53:16Z", details: "important", }, ], title: "CVE-2018-1000500", }, { cve: "CVE-2018-1000517", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2018-1000517", }, ], notes: [ { category: "general", text: "BusyBox project BusyBox wget version prior to commit 8e2174e9bd836e53c8b9c6e00d1bc6e2a718686e contains a Buffer Overflow vulnerability in Busybox wget that can result in heap buffer overflow. This attack appear to be exploitable via network connectivity. This vulnerability appears to have been fixed in after commit 8e2174e9bd836e53c8b9c6e00d1bc6e2a718686e.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Leap 15.2:busybox-1.26.2-lp152.5.3.1.i586", "openSUSE Leap 15.2:busybox-1.26.2-lp152.5.3.1.x86_64", "openSUSE Leap 15.2:busybox-static-1.26.2-lp152.5.3.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2018-1000517", url: "https://www.suse.com/security/cve/CVE-2018-1000517", }, { category: "external", summary: "SUSE Bug 1099260 for CVE-2018-1000517", url: "https://bugzilla.suse.com/1099260", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Leap 15.2:busybox-1.26.2-lp152.5.3.1.i586", "openSUSE Leap 15.2:busybox-1.26.2-lp152.5.3.1.x86_64", "openSUSE Leap 15.2:busybox-static-1.26.2-lp152.5.3.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.6, baseSeverity: "MEDIUM", vectorString: "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L", version: "3.0", }, products: [ "openSUSE Leap 15.2:busybox-1.26.2-lp152.5.3.1.i586", "openSUSE Leap 15.2:busybox-1.26.2-lp152.5.3.1.x86_64", "openSUSE Leap 15.2:busybox-static-1.26.2-lp152.5.3.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2021-10-31T14:53:16Z", details: "important", }, ], title: "CVE-2018-1000517", }, { cve: "CVE-2018-20679", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2018-20679", }, ], notes: [ { category: "general", text: "An issue was discovered in BusyBox before 1.30.0. An out of bounds read in udhcp components (consumed by the DHCP server, client, and relay) allows a remote attacker to leak sensitive information from the stack by sending a crafted DHCP message. This is related to verification in udhcp_get_option() in networking/udhcp/common.c that 4-byte options are indeed 4 bytes.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Leap 15.2:busybox-1.26.2-lp152.5.3.1.i586", "openSUSE Leap 15.2:busybox-1.26.2-lp152.5.3.1.x86_64", "openSUSE Leap 15.2:busybox-static-1.26.2-lp152.5.3.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2018-20679", url: "https://www.suse.com/security/cve/CVE-2018-20679", }, { category: "external", summary: "SUSE Bug 1121426 for CVE-2018-20679", url: "https://bugzilla.suse.com/1121426", }, { category: "external", summary: "SUSE Bug 1121428 for CVE-2018-20679", url: "https://bugzilla.suse.com/1121428", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Leap 15.2:busybox-1.26.2-lp152.5.3.1.i586", "openSUSE Leap 15.2:busybox-1.26.2-lp152.5.3.1.x86_64", "openSUSE Leap 15.2:busybox-static-1.26.2-lp152.5.3.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.3, baseSeverity: "MEDIUM", vectorString: "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N", version: "3.0", }, products: [ "openSUSE Leap 15.2:busybox-1.26.2-lp152.5.3.1.i586", "openSUSE Leap 15.2:busybox-1.26.2-lp152.5.3.1.x86_64", "openSUSE Leap 15.2:busybox-static-1.26.2-lp152.5.3.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2021-10-31T14:53:16Z", details: "moderate", }, ], title: "CVE-2018-20679", }, { cve: "CVE-2021-28831", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2021-28831", }, ], notes: [ { category: "general", text: "decompress_gunzip.c in BusyBox through 1.32.1 mishandles the error bit on the huft_build result pointer, with a resultant invalid free or segmentation fault, via malformed gzip data.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Leap 15.2:busybox-1.26.2-lp152.5.3.1.i586", "openSUSE Leap 15.2:busybox-1.26.2-lp152.5.3.1.x86_64", "openSUSE Leap 15.2:busybox-static-1.26.2-lp152.5.3.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2021-28831", url: "https://www.suse.com/security/cve/CVE-2021-28831", }, { category: "external", summary: "SUSE Bug 1184522 for CVE-2021-28831", url: "https://bugzilla.suse.com/1184522", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Leap 15.2:busybox-1.26.2-lp152.5.3.1.i586", "openSUSE Leap 15.2:busybox-1.26.2-lp152.5.3.1.x86_64", "openSUSE Leap 15.2:busybox-static-1.26.2-lp152.5.3.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 7.5, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "openSUSE Leap 15.2:busybox-1.26.2-lp152.5.3.1.i586", "openSUSE Leap 15.2:busybox-1.26.2-lp152.5.3.1.x86_64", "openSUSE Leap 15.2:busybox-static-1.26.2-lp152.5.3.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2021-10-31T14:53:16Z", details: "important", }, ], title: "CVE-2021-28831", }, ], }
opensuse-su-2022:0135-1
Vulnerability from csaf_opensuse
Published
2022-01-20 09:04
Modified
2022-01-20 09:04
Summary
Security update for busybox
Notes
Title of the patch
Security update for busybox
Description of the patch
This update for busybox fixes the following issues:
- CVE-2011-5325: Fixed tar directory traversal (bsc#951562).
- CVE-2015-9261: Fixed segfalts and application crashes in huft_build (bsc#1102912).
- CVE-2016-2147: Fixed out of bounds write (heap) due to integer underflow in udhcpc (bsc#970663).
- CVE-2016-2148: Fixed heap-based buffer overflow in OPTION_6RD parsing (bsc#970662).
- CVE-2016-6301: Fixed NTP server denial of service flaw (bsc#991940).
- CVE-2017-15873: Fixed integer overflow in get_next_block function in archival/libarchive/decompress_bunzip2.c (bsc#1064976).
- CVE-2017-15874: Fixed integer underflow in archival/libarchive/decompress_unlzma.c (bsc#1064978).
- CVE-2017-16544: Fixed Insufficient sanitization of filenames when autocompleting (bsc#1069412).
- CVE-2018-1000500 : Fixed missing SSL certificate validation in wget (bsc#1099263).
- CVE-2018-1000517: Fixed heap-based buffer overflow in the retrieve_file_data() (bsc#1099260).
- CVE-2018-20679: Fixed out of bounds read in udhcp (bsc#1121426).
- CVE-2019-5747: Fixed out of bounds read in udhcp components (bsc#1121428).
- CVE-2021-28831: Fixed invalid free or segmentation fault via malformed gzip data (bsc#1184522).
- CVE-2021-42373: Fixed NULL pointer dereference in man leading to DoS when a section name is supplied but no page argument is given (bsc#1192869).
- CVE-2021-42374: Fixed out-of-bounds heap read in unlzma leading to information leak and DoS when crafted LZMA-compressed input is decompressed (bsc#1192869).
- CVE-2021-42375: Fixed incorrect handling of a special element in ash leading to DoS when processing a crafted shell command, due to the shell mistaking specific characters for reserved characters (bsc#1192869).
- CVE-2021-42376: Fixed NULL pointer dereference in hush leading to DoS when processing a crafted shell command (bsc#1192869).
- CVE-2021-42377: Fixed attacker-controlled pointer free in hush leading to DoS and possible code execution when processing a crafted shell command (bsc#1192869).
- CVE-2021-42378: Fixed use-after-free in awk leading to DoS and possibly code execution when processing a crafted awk pattern in the getvar_i function (bsc#1192869).
- CVE-2021-42379: Fixed use-after-free in awk leading to DoS and possibly code execution when processing a crafted awk pattern in the next_input_file function (bsc#1192869).
- CVE-2021-42380: Fixed use-after-free in awk leading to DoS and possibly code execution when processing a crafted awk pattern in the clrvar function (bsc#1192869).
- CVE-2021-42381: Fixed use-after-free in awk leading to DoS and possibly code execution when processing a crafted awk pattern in the hash_init function (bsc#1192869).
- CVE-2021-42382: Fixed use-after-free in awk leading to DoS and possibly code execution when processing a crafted awk pattern in the getvar_s function (bsc#1192869).
- CVE-2021-42383: Fixed use-after-free in awk leading to DoS and possibly code execution when processing a crafted awk pattern in the evaluate function (bsc#1192869).
- CVE-2021-42384: Fixed use-after-free in awk leading to DoS and possibly code execution when processing a crafted awk pattern in the handle_special function (bsc#1192869).
- CVE-2021-42385: Fixed use-after-free in awk leading to DoS and possibly code execution when processing a crafted awk pattern in the evaluate function (bsc#1192869).
- CVE-2021-42386: Fixed use-after-free in awk leading to DoS and possibly code execution when processing a crafted awk pattern in the nvalloc function (bsc#1192869).
Patchnames
openSUSE-2022-135,openSUSE-SLE-15.3-2022-135
Terms of use
CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
{ document: { aggregate_severity: { namespace: "https://www.suse.com/support/security/rating/", text: "important", }, category: "csaf_security_advisory", csaf_version: "2.0", distribution: { text: "Copyright 2024 SUSE LLC. All rights reserved.", tlp: { label: "WHITE", url: "https://www.first.org/tlp/", }, }, lang: "en", notes: [ { category: "summary", text: "Security update for busybox", title: "Title of the patch", }, { category: "description", text: "This update for busybox fixes the following issues:\n\n- CVE-2011-5325: Fixed tar directory traversal (bsc#951562).\n- CVE-2015-9261: Fixed segfalts and application crashes in huft_build (bsc#1102912).\n- CVE-2016-2147: Fixed out of bounds write (heap) due to integer underflow in udhcpc (bsc#970663).\n- CVE-2016-2148: Fixed heap-based buffer overflow in OPTION_6RD parsing (bsc#970662).\n- CVE-2016-6301: Fixed NTP server denial of service flaw (bsc#991940).\n- CVE-2017-15873: Fixed integer overflow in get_next_block function in archival/libarchive/decompress_bunzip2.c (bsc#1064976).\n- CVE-2017-15874: Fixed integer underflow in archival/libarchive/decompress_unlzma.c (bsc#1064978).\n- CVE-2017-16544: Fixed Insufficient sanitization of filenames when autocompleting (bsc#1069412).\n- CVE-2018-1000500 : Fixed missing SSL certificate validation in wget (bsc#1099263).\n- CVE-2018-1000517: Fixed heap-based buffer overflow in the retrieve_file_data() (bsc#1099260).\n- CVE-2018-20679: Fixed out of bounds read in udhcp (bsc#1121426).\n- CVE-2019-5747: Fixed out of bounds read in udhcp components (bsc#1121428).\n- CVE-2021-28831: Fixed invalid free or segmentation fault via malformed gzip data (bsc#1184522).\n- CVE-2021-42373: Fixed NULL pointer dereference in man leading to DoS when a section name is supplied but no page argument is given (bsc#1192869).\n- CVE-2021-42374: Fixed out-of-bounds heap read in unlzma leading to information leak and DoS when crafted LZMA-compressed input is decompressed (bsc#1192869).\n- CVE-2021-42375: Fixed incorrect handling of a special element in ash leading to DoS when processing a crafted shell command, due to the shell mistaking specific characters for reserved characters (bsc#1192869).\n- CVE-2021-42376: Fixed NULL pointer dereference in hush leading to DoS when processing a crafted shell command (bsc#1192869).\n- CVE-2021-42377: Fixed attacker-controlled pointer free in hush leading to DoS and possible code execution when processing a crafted shell command (bsc#1192869).\n- CVE-2021-42378: Fixed use-after-free in awk leading to DoS and possibly code execution when processing a crafted awk pattern in the getvar_i function (bsc#1192869).\n- CVE-2021-42379: Fixed use-after-free in awk leading to DoS and possibly code execution when processing a crafted awk pattern in the next_input_file function (bsc#1192869).\n- CVE-2021-42380: Fixed use-after-free in awk leading to DoS and possibly code execution when processing a crafted awk pattern in the clrvar function (bsc#1192869).\n- CVE-2021-42381: Fixed use-after-free in awk leading to DoS and possibly code execution when processing a crafted awk pattern in the hash_init function (bsc#1192869).\n- CVE-2021-42382: Fixed use-after-free in awk leading to DoS and possibly code execution when processing a crafted awk pattern in the getvar_s function (bsc#1192869).\n- CVE-2021-42383: Fixed use-after-free in awk leading to DoS and possibly code execution when processing a crafted awk pattern in the evaluate function (bsc#1192869).\n- CVE-2021-42384: Fixed use-after-free in awk leading to DoS and possibly code execution when processing a crafted awk pattern in the handle_special function (bsc#1192869).\n- CVE-2021-42385: Fixed use-after-free in awk leading to DoS and possibly code execution when processing a crafted awk pattern in the evaluate function (bsc#1192869).\n- CVE-2021-42386: Fixed use-after-free in awk leading to DoS and possibly code execution when processing a crafted awk pattern in the nvalloc function (bsc#1192869).\n", title: "Description of the patch", }, { category: "details", text: "openSUSE-2022-135,openSUSE-SLE-15.3-2022-135", title: "Patchnames", }, { category: "legal_disclaimer", text: "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", title: "Terms of use", }, ], publisher: { category: "vendor", contact_details: "https://www.suse.com/support/security/contact/", name: "SUSE Product Security Team", namespace: "https://www.suse.com/", }, references: [ { category: "external", summary: "SUSE ratings", url: "https://www.suse.com/support/security/rating/", }, { category: "self", summary: "URL of this CSAF notice", url: "https://ftp.suse.com/pub/projects/security/csaf/opensuse-su-2022_0135-1.json", }, { category: "self", summary: "URL for openSUSE-SU-2022:0135-1", url: "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/YB6DIPEMLRTDD3RU77DD7UYYKBEEKYDY/", }, { category: "self", summary: "E-Mail link for openSUSE-SU-2022:0135-1", url: "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/YB6DIPEMLRTDD3RU77DD7UYYKBEEKYDY/", }, { category: "self", summary: "SUSE Bug 1064976", url: "https://bugzilla.suse.com/1064976", }, { category: "self", summary: "SUSE Bug 1064978", url: "https://bugzilla.suse.com/1064978", }, { category: "self", summary: "SUSE Bug 1069412", url: "https://bugzilla.suse.com/1069412", }, { category: "self", summary: "SUSE Bug 1099260", url: "https://bugzilla.suse.com/1099260", }, { category: "self", summary: "SUSE Bug 1099263", url: "https://bugzilla.suse.com/1099263", }, { category: "self", summary: "SUSE Bug 1102912", url: "https://bugzilla.suse.com/1102912", }, { category: "self", summary: "SUSE Bug 1121426", url: "https://bugzilla.suse.com/1121426", }, { category: "self", summary: "SUSE Bug 1121428", url: "https://bugzilla.suse.com/1121428", }, { category: "self", summary: "SUSE Bug 1184522", url: "https://bugzilla.suse.com/1184522", }, { category: "self", summary: "SUSE Bug 1192869", url: "https://bugzilla.suse.com/1192869", }, { category: "self", summary: "SUSE Bug 951562", url: "https://bugzilla.suse.com/951562", }, { category: "self", summary: "SUSE Bug 970662", url: "https://bugzilla.suse.com/970662", }, { category: "self", summary: "SUSE Bug 970663", url: "https://bugzilla.suse.com/970663", }, { category: "self", summary: "SUSE Bug 991940", url: "https://bugzilla.suse.com/991940", }, { category: "self", summary: "SUSE CVE CVE-2011-5325 page", url: "https://www.suse.com/security/cve/CVE-2011-5325/", }, { category: "self", summary: "SUSE CVE CVE-2015-9261 page", url: "https://www.suse.com/security/cve/CVE-2015-9261/", }, { category: "self", summary: "SUSE CVE CVE-2016-2147 page", url: "https://www.suse.com/security/cve/CVE-2016-2147/", }, { category: "self", summary: "SUSE CVE CVE-2016-2148 page", url: "https://www.suse.com/security/cve/CVE-2016-2148/", }, { category: "self", summary: "SUSE CVE CVE-2016-6301 page", url: "https://www.suse.com/security/cve/CVE-2016-6301/", }, { category: "self", summary: "SUSE CVE CVE-2017-15873 page", url: "https://www.suse.com/security/cve/CVE-2017-15873/", }, { category: "self", summary: "SUSE CVE CVE-2017-15874 page", url: "https://www.suse.com/security/cve/CVE-2017-15874/", }, { category: "self", summary: "SUSE CVE CVE-2017-16544 page", url: "https://www.suse.com/security/cve/CVE-2017-16544/", }, { category: "self", summary: "SUSE CVE CVE-2018-1000500 page", url: "https://www.suse.com/security/cve/CVE-2018-1000500/", }, { category: "self", summary: "SUSE CVE CVE-2018-1000517 page", url: "https://www.suse.com/security/cve/CVE-2018-1000517/", }, { category: "self", summary: "SUSE CVE CVE-2018-20679 page", url: "https://www.suse.com/security/cve/CVE-2018-20679/", }, { category: "self", summary: "SUSE CVE CVE-2019-5747 page", url: "https://www.suse.com/security/cve/CVE-2019-5747/", }, { category: "self", summary: "SUSE CVE CVE-2021-28831 page", url: "https://www.suse.com/security/cve/CVE-2021-28831/", }, { category: "self", summary: "SUSE CVE CVE-2021-42373 page", url: "https://www.suse.com/security/cve/CVE-2021-42373/", }, { category: "self", summary: "SUSE CVE CVE-2021-42374 page", url: "https://www.suse.com/security/cve/CVE-2021-42374/", }, { category: "self", summary: "SUSE CVE CVE-2021-42375 page", url: "https://www.suse.com/security/cve/CVE-2021-42375/", }, { category: "self", summary: "SUSE CVE CVE-2021-42376 page", url: "https://www.suse.com/security/cve/CVE-2021-42376/", }, { category: "self", summary: "SUSE CVE CVE-2021-42377 page", url: "https://www.suse.com/security/cve/CVE-2021-42377/", }, { category: "self", summary: "SUSE CVE CVE-2021-42378 page", url: "https://www.suse.com/security/cve/CVE-2021-42378/", }, { category: "self", summary: "SUSE CVE CVE-2021-42379 page", url: "https://www.suse.com/security/cve/CVE-2021-42379/", }, { category: "self", summary: "SUSE CVE CVE-2021-42380 page", url: "https://www.suse.com/security/cve/CVE-2021-42380/", }, { category: "self", summary: "SUSE CVE CVE-2021-42381 page", url: "https://www.suse.com/security/cve/CVE-2021-42381/", }, { category: "self", summary: "SUSE CVE CVE-2021-42382 page", url: "https://www.suse.com/security/cve/CVE-2021-42382/", }, { category: "self", summary: "SUSE CVE CVE-2021-42383 page", url: "https://www.suse.com/security/cve/CVE-2021-42383/", }, { category: "self", summary: "SUSE CVE CVE-2021-42384 page", url: "https://www.suse.com/security/cve/CVE-2021-42384/", }, { category: "self", summary: "SUSE CVE CVE-2021-42385 page", url: "https://www.suse.com/security/cve/CVE-2021-42385/", }, { category: "self", summary: "SUSE CVE CVE-2021-42386 page", url: "https://www.suse.com/security/cve/CVE-2021-42386/", }, ], title: "Security update for busybox", tracking: { current_release_date: "2022-01-20T09:04:27Z", generator: { date: "2022-01-20T09:04:27Z", engine: { name: "cve-database.git:bin/generate-csaf.pl", version: "1", }, }, id: "openSUSE-SU-2022:0135-1", initial_release_date: "2022-01-20T09:04:27Z", revision_history: [ { date: "2022-01-20T09:04:27Z", number: "1", summary: "Current version", }, ], status: "final", version: "1", }, }, product_tree: { branches: [ { branches: [ { branches: [ { category: "product_version", name: "busybox-1.34.1-4.9.1.aarch64", product: { name: "busybox-1.34.1-4.9.1.aarch64", product_id: "busybox-1.34.1-4.9.1.aarch64", }, }, { category: "product_version", name: "busybox-static-1.34.1-4.9.1.aarch64", product: { name: "busybox-static-1.34.1-4.9.1.aarch64", product_id: "busybox-static-1.34.1-4.9.1.aarch64", }, }, ], category: "architecture", name: "aarch64", }, { branches: [ { category: "product_version", name: "virtualbox-guest-desktop-icons-6.1.34-lp153.2.27.2.noarch", product: { name: "virtualbox-guest-desktop-icons-6.1.34-lp153.2.27.2.noarch", product_id: "virtualbox-guest-desktop-icons-6.1.34-lp153.2.27.2.noarch", }, }, { category: "product_version", name: "virtualbox-guest-source-6.1.34-lp153.2.27.2.noarch", product: { name: "virtualbox-guest-source-6.1.34-lp153.2.27.2.noarch", product_id: "virtualbox-guest-source-6.1.34-lp153.2.27.2.noarch", }, }, { category: "product_version", name: "virtualbox-host-source-6.1.34-lp153.2.27.2.noarch", product: { name: "virtualbox-host-source-6.1.34-lp153.2.27.2.noarch", product_id: "virtualbox-host-source-6.1.34-lp153.2.27.2.noarch", }, }, ], category: "architecture", name: "noarch", }, { branches: [ { category: "product_version", name: "busybox-1.34.1-4.9.1.ppc64le", product: { name: "busybox-1.34.1-4.9.1.ppc64le", product_id: "busybox-1.34.1-4.9.1.ppc64le", }, }, { category: "product_version", name: "busybox-static-1.34.1-4.9.1.ppc64le", product: { name: "busybox-static-1.34.1-4.9.1.ppc64le", product_id: "busybox-static-1.34.1-4.9.1.ppc64le", }, }, ], category: "architecture", name: "ppc64le", }, { branches: [ { category: "product_version", name: "busybox-1.34.1-4.9.1.s390x", product: { name: "busybox-1.34.1-4.9.1.s390x", product_id: "busybox-1.34.1-4.9.1.s390x", }, }, { category: "product_version", name: "busybox-static-1.34.1-4.9.1.s390x", product: { name: "busybox-static-1.34.1-4.9.1.s390x", product_id: "busybox-static-1.34.1-4.9.1.s390x", }, }, ], category: "architecture", name: "s390x", }, { branches: [ { category: "product_version", name: "python3-virtualbox-6.1.34-lp153.2.27.2.x86_64", product: { name: "python3-virtualbox-6.1.34-lp153.2.27.2.x86_64", product_id: "python3-virtualbox-6.1.34-lp153.2.27.2.x86_64", }, }, { category: "product_version", name: "virtualbox-6.1.34-lp153.2.27.2.x86_64", product: { name: "virtualbox-6.1.34-lp153.2.27.2.x86_64", product_id: "virtualbox-6.1.34-lp153.2.27.2.x86_64", }, }, { category: "product_version", name: "virtualbox-devel-6.1.34-lp153.2.27.2.x86_64", product: { name: "virtualbox-devel-6.1.34-lp153.2.27.2.x86_64", product_id: "virtualbox-devel-6.1.34-lp153.2.27.2.x86_64", }, }, { category: "product_version", name: "virtualbox-guest-tools-6.1.34-lp153.2.27.2.x86_64", product: { name: "virtualbox-guest-tools-6.1.34-lp153.2.27.2.x86_64", product_id: "virtualbox-guest-tools-6.1.34-lp153.2.27.2.x86_64", }, }, { category: "product_version", name: "virtualbox-guest-x11-6.1.34-lp153.2.27.2.x86_64", product: { name: "virtualbox-guest-x11-6.1.34-lp153.2.27.2.x86_64", product_id: "virtualbox-guest-x11-6.1.34-lp153.2.27.2.x86_64", }, }, { category: "product_version", name: "virtualbox-kmp-default-6.1.34_k5.3.18_150300.59.63-lp153.2.27.1.x86_64", product: { name: "virtualbox-kmp-default-6.1.34_k5.3.18_150300.59.63-lp153.2.27.1.x86_64", product_id: "virtualbox-kmp-default-6.1.34_k5.3.18_150300.59.63-lp153.2.27.1.x86_64", }, }, { category: "product_version", name: "virtualbox-kmp-preempt-6.1.34_k5.3.18_150300.59.63-lp153.2.27.1.x86_64", product: { name: "virtualbox-kmp-preempt-6.1.34_k5.3.18_150300.59.63-lp153.2.27.1.x86_64", product_id: "virtualbox-kmp-preempt-6.1.34_k5.3.18_150300.59.63-lp153.2.27.1.x86_64", }, }, { category: "product_version", name: "virtualbox-qt-6.1.34-lp153.2.27.2.x86_64", product: { name: "virtualbox-qt-6.1.34-lp153.2.27.2.x86_64", product_id: "virtualbox-qt-6.1.34-lp153.2.27.2.x86_64", }, }, { category: "product_version", name: "virtualbox-vnc-6.1.34-lp153.2.27.2.x86_64", product: { name: "virtualbox-vnc-6.1.34-lp153.2.27.2.x86_64", product_id: "virtualbox-vnc-6.1.34-lp153.2.27.2.x86_64", }, }, { category: "product_version", name: "virtualbox-websrv-6.1.34-lp153.2.27.2.x86_64", product: { name: "virtualbox-websrv-6.1.34-lp153.2.27.2.x86_64", product_id: "virtualbox-websrv-6.1.34-lp153.2.27.2.x86_64", }, }, { category: "product_version", name: "busybox-1.34.1-4.9.1.x86_64", product: { name: "busybox-1.34.1-4.9.1.x86_64", product_id: "busybox-1.34.1-4.9.1.x86_64", }, }, { category: "product_version", name: "busybox-static-1.34.1-4.9.1.x86_64", product: { name: "busybox-static-1.34.1-4.9.1.x86_64", product_id: "busybox-static-1.34.1-4.9.1.x86_64", }, }, ], category: "architecture", name: "x86_64", }, { branches: [ { category: "product_name", name: "openSUSE Leap 15.3", product: { name: "openSUSE Leap 15.3", product_id: "openSUSE Leap 15.3", product_identification_helper: { cpe: "cpe:/o:opensuse:leap:15.3", }, }, }, { category: "product_name", name: "openSUSE Leap 15.3", product: { name: "openSUSE Leap 15.3", product_id: "openSUSE Leap 15.3", product_identification_helper: { cpe: "cpe:/o:opensuse:leap:15.3", }, }, }, ], category: "product_family", name: "SUSE Linux Enterprise", }, ], category: "vendor", name: "SUSE", }, ], relationships: [ { category: "default_component_of", full_product_name: { name: "python3-virtualbox-6.1.34-lp153.2.27.2.x86_64 as component of openSUSE Leap 15.3", product_id: "openSUSE Leap 15.3:python3-virtualbox-6.1.34-lp153.2.27.2.x86_64", }, product_reference: "python3-virtualbox-6.1.34-lp153.2.27.2.x86_64", relates_to_product_reference: "openSUSE Leap 15.3", }, { category: "default_component_of", full_product_name: { name: "virtualbox-6.1.34-lp153.2.27.2.x86_64 as component of openSUSE Leap 15.3", product_id: "openSUSE Leap 15.3:virtualbox-6.1.34-lp153.2.27.2.x86_64", }, product_reference: "virtualbox-6.1.34-lp153.2.27.2.x86_64", relates_to_product_reference: "openSUSE Leap 15.3", }, { category: "default_component_of", full_product_name: { name: "virtualbox-devel-6.1.34-lp153.2.27.2.x86_64 as component of openSUSE Leap 15.3", product_id: "openSUSE Leap 15.3:virtualbox-devel-6.1.34-lp153.2.27.2.x86_64", }, product_reference: "virtualbox-devel-6.1.34-lp153.2.27.2.x86_64", relates_to_product_reference: "openSUSE Leap 15.3", }, { category: "default_component_of", full_product_name: { name: "virtualbox-guest-desktop-icons-6.1.34-lp153.2.27.2.noarch as component of openSUSE Leap 15.3", product_id: "openSUSE Leap 15.3:virtualbox-guest-desktop-icons-6.1.34-lp153.2.27.2.noarch", }, product_reference: "virtualbox-guest-desktop-icons-6.1.34-lp153.2.27.2.noarch", relates_to_product_reference: "openSUSE Leap 15.3", }, { category: "default_component_of", full_product_name: { name: "virtualbox-guest-source-6.1.34-lp153.2.27.2.noarch as component of openSUSE Leap 15.3", product_id: "openSUSE Leap 15.3:virtualbox-guest-source-6.1.34-lp153.2.27.2.noarch", }, product_reference: "virtualbox-guest-source-6.1.34-lp153.2.27.2.noarch", relates_to_product_reference: "openSUSE Leap 15.3", }, { category: "default_component_of", full_product_name: { name: "virtualbox-guest-tools-6.1.34-lp153.2.27.2.x86_64 as component of openSUSE Leap 15.3", product_id: "openSUSE Leap 15.3:virtualbox-guest-tools-6.1.34-lp153.2.27.2.x86_64", }, product_reference: "virtualbox-guest-tools-6.1.34-lp153.2.27.2.x86_64", relates_to_product_reference: "openSUSE Leap 15.3", }, { category: "default_component_of", full_product_name: { name: "virtualbox-guest-x11-6.1.34-lp153.2.27.2.x86_64 as component of openSUSE Leap 15.3", product_id: "openSUSE Leap 15.3:virtualbox-guest-x11-6.1.34-lp153.2.27.2.x86_64", }, product_reference: "virtualbox-guest-x11-6.1.34-lp153.2.27.2.x86_64", relates_to_product_reference: "openSUSE Leap 15.3", }, { category: "default_component_of", full_product_name: { name: "virtualbox-host-source-6.1.34-lp153.2.27.2.noarch as component of openSUSE Leap 15.3", product_id: "openSUSE Leap 15.3:virtualbox-host-source-6.1.34-lp153.2.27.2.noarch", }, product_reference: "virtualbox-host-source-6.1.34-lp153.2.27.2.noarch", relates_to_product_reference: "openSUSE Leap 15.3", }, { category: "default_component_of", full_product_name: { name: "virtualbox-kmp-default-6.1.34_k5.3.18_150300.59.63-lp153.2.27.1.x86_64 as component of openSUSE Leap 15.3", product_id: "openSUSE Leap 15.3:virtualbox-kmp-default-6.1.34_k5.3.18_150300.59.63-lp153.2.27.1.x86_64", }, product_reference: "virtualbox-kmp-default-6.1.34_k5.3.18_150300.59.63-lp153.2.27.1.x86_64", relates_to_product_reference: "openSUSE Leap 15.3", }, { category: "default_component_of", full_product_name: { name: "virtualbox-kmp-preempt-6.1.34_k5.3.18_150300.59.63-lp153.2.27.1.x86_64 as component of openSUSE Leap 15.3", product_id: "openSUSE Leap 15.3:virtualbox-kmp-preempt-6.1.34_k5.3.18_150300.59.63-lp153.2.27.1.x86_64", }, product_reference: "virtualbox-kmp-preempt-6.1.34_k5.3.18_150300.59.63-lp153.2.27.1.x86_64", relates_to_product_reference: "openSUSE Leap 15.3", }, { category: "default_component_of", full_product_name: { name: "virtualbox-qt-6.1.34-lp153.2.27.2.x86_64 as component of openSUSE Leap 15.3", product_id: "openSUSE Leap 15.3:virtualbox-qt-6.1.34-lp153.2.27.2.x86_64", }, product_reference: "virtualbox-qt-6.1.34-lp153.2.27.2.x86_64", relates_to_product_reference: "openSUSE Leap 15.3", }, { category: "default_component_of", full_product_name: { name: "virtualbox-vnc-6.1.34-lp153.2.27.2.x86_64 as component of openSUSE Leap 15.3", product_id: "openSUSE Leap 15.3:virtualbox-vnc-6.1.34-lp153.2.27.2.x86_64", }, product_reference: "virtualbox-vnc-6.1.34-lp153.2.27.2.x86_64", relates_to_product_reference: "openSUSE Leap 15.3", }, { category: "default_component_of", full_product_name: { name: "virtualbox-websrv-6.1.34-lp153.2.27.2.x86_64 as component of openSUSE Leap 15.3", product_id: "openSUSE Leap 15.3:virtualbox-websrv-6.1.34-lp153.2.27.2.x86_64", }, product_reference: "virtualbox-websrv-6.1.34-lp153.2.27.2.x86_64", relates_to_product_reference: "openSUSE Leap 15.3", }, { category: "default_component_of", full_product_name: { name: "busybox-1.34.1-4.9.1.aarch64 as component of openSUSE Leap 15.3", product_id: "openSUSE Leap 15.3:busybox-1.34.1-4.9.1.aarch64", }, product_reference: "busybox-1.34.1-4.9.1.aarch64", relates_to_product_reference: "openSUSE Leap 15.3", }, { category: "default_component_of", full_product_name: { name: "busybox-1.34.1-4.9.1.ppc64le as component of openSUSE Leap 15.3", product_id: "openSUSE Leap 15.3:busybox-1.34.1-4.9.1.ppc64le", }, product_reference: "busybox-1.34.1-4.9.1.ppc64le", relates_to_product_reference: "openSUSE Leap 15.3", }, { category: "default_component_of", full_product_name: { name: "busybox-1.34.1-4.9.1.s390x as component of openSUSE Leap 15.3", product_id: "openSUSE Leap 15.3:busybox-1.34.1-4.9.1.s390x", }, product_reference: "busybox-1.34.1-4.9.1.s390x", relates_to_product_reference: "openSUSE Leap 15.3", }, { category: "default_component_of", full_product_name: { name: "busybox-1.34.1-4.9.1.x86_64 as component of openSUSE Leap 15.3", product_id: "openSUSE Leap 15.3:busybox-1.34.1-4.9.1.x86_64", }, product_reference: "busybox-1.34.1-4.9.1.x86_64", relates_to_product_reference: "openSUSE Leap 15.3", }, { category: "default_component_of", full_product_name: { name: "busybox-static-1.34.1-4.9.1.aarch64 as component of openSUSE Leap 15.3", product_id: "openSUSE Leap 15.3:busybox-static-1.34.1-4.9.1.aarch64", }, product_reference: "busybox-static-1.34.1-4.9.1.aarch64", relates_to_product_reference: "openSUSE Leap 15.3", }, { category: "default_component_of", full_product_name: { name: "busybox-static-1.34.1-4.9.1.ppc64le as component of openSUSE Leap 15.3", product_id: "openSUSE Leap 15.3:busybox-static-1.34.1-4.9.1.ppc64le", }, product_reference: "busybox-static-1.34.1-4.9.1.ppc64le", relates_to_product_reference: "openSUSE Leap 15.3", }, { category: "default_component_of", full_product_name: { name: "busybox-static-1.34.1-4.9.1.s390x as component of openSUSE Leap 15.3", product_id: "openSUSE Leap 15.3:busybox-static-1.34.1-4.9.1.s390x", }, product_reference: "busybox-static-1.34.1-4.9.1.s390x", relates_to_product_reference: "openSUSE Leap 15.3", }, { category: "default_component_of", full_product_name: { name: "busybox-static-1.34.1-4.9.1.x86_64 as component of openSUSE Leap 15.3", product_id: "openSUSE Leap 15.3:busybox-static-1.34.1-4.9.1.x86_64", }, product_reference: "busybox-static-1.34.1-4.9.1.x86_64", relates_to_product_reference: "openSUSE Leap 15.3", }, { category: "default_component_of", full_product_name: { name: "python3-virtualbox-6.1.34-lp153.2.27.2.x86_64 as component of openSUSE Leap 15.3", product_id: "openSUSE Leap 15.3:python3-virtualbox-6.1.34-lp153.2.27.2.x86_64", }, product_reference: "python3-virtualbox-6.1.34-lp153.2.27.2.x86_64", relates_to_product_reference: "openSUSE Leap 15.3", }, { category: "default_component_of", full_product_name: { name: "virtualbox-6.1.34-lp153.2.27.2.x86_64 as component of openSUSE Leap 15.3", product_id: "openSUSE Leap 15.3:virtualbox-6.1.34-lp153.2.27.2.x86_64", }, product_reference: "virtualbox-6.1.34-lp153.2.27.2.x86_64", relates_to_product_reference: "openSUSE Leap 15.3", }, { category: "default_component_of", full_product_name: { name: "virtualbox-devel-6.1.34-lp153.2.27.2.x86_64 as component of openSUSE Leap 15.3", product_id: "openSUSE Leap 15.3:virtualbox-devel-6.1.34-lp153.2.27.2.x86_64", }, product_reference: "virtualbox-devel-6.1.34-lp153.2.27.2.x86_64", relates_to_product_reference: "openSUSE Leap 15.3", }, { category: "default_component_of", full_product_name: { name: "virtualbox-guest-desktop-icons-6.1.34-lp153.2.27.2.noarch as component of openSUSE Leap 15.3", product_id: "openSUSE Leap 15.3:virtualbox-guest-desktop-icons-6.1.34-lp153.2.27.2.noarch", }, product_reference: "virtualbox-guest-desktop-icons-6.1.34-lp153.2.27.2.noarch", relates_to_product_reference: "openSUSE Leap 15.3", }, { category: "default_component_of", full_product_name: { name: "virtualbox-guest-source-6.1.34-lp153.2.27.2.noarch as component of openSUSE Leap 15.3", product_id: "openSUSE Leap 15.3:virtualbox-guest-source-6.1.34-lp153.2.27.2.noarch", }, product_reference: "virtualbox-guest-source-6.1.34-lp153.2.27.2.noarch", relates_to_product_reference: "openSUSE Leap 15.3", }, { category: "default_component_of", full_product_name: { name: "virtualbox-guest-tools-6.1.34-lp153.2.27.2.x86_64 as component of openSUSE Leap 15.3", product_id: "openSUSE Leap 15.3:virtualbox-guest-tools-6.1.34-lp153.2.27.2.x86_64", }, product_reference: "virtualbox-guest-tools-6.1.34-lp153.2.27.2.x86_64", relates_to_product_reference: "openSUSE Leap 15.3", }, { category: "default_component_of", full_product_name: { name: "virtualbox-guest-x11-6.1.34-lp153.2.27.2.x86_64 as component of openSUSE Leap 15.3", product_id: "openSUSE Leap 15.3:virtualbox-guest-x11-6.1.34-lp153.2.27.2.x86_64", }, product_reference: "virtualbox-guest-x11-6.1.34-lp153.2.27.2.x86_64", relates_to_product_reference: "openSUSE Leap 15.3", }, { category: "default_component_of", full_product_name: { name: "virtualbox-host-source-6.1.34-lp153.2.27.2.noarch as component of openSUSE Leap 15.3", product_id: "openSUSE Leap 15.3:virtualbox-host-source-6.1.34-lp153.2.27.2.noarch", }, product_reference: "virtualbox-host-source-6.1.34-lp153.2.27.2.noarch", relates_to_product_reference: "openSUSE Leap 15.3", }, { category: "default_component_of", full_product_name: { name: "virtualbox-kmp-default-6.1.34_k5.3.18_150300.59.63-lp153.2.27.1.x86_64 as component of openSUSE Leap 15.3", product_id: "openSUSE Leap 15.3:virtualbox-kmp-default-6.1.34_k5.3.18_150300.59.63-lp153.2.27.1.x86_64", }, product_reference: "virtualbox-kmp-default-6.1.34_k5.3.18_150300.59.63-lp153.2.27.1.x86_64", relates_to_product_reference: "openSUSE Leap 15.3", }, { category: "default_component_of", full_product_name: { name: "virtualbox-kmp-preempt-6.1.34_k5.3.18_150300.59.63-lp153.2.27.1.x86_64 as component of openSUSE Leap 15.3", product_id: "openSUSE Leap 15.3:virtualbox-kmp-preempt-6.1.34_k5.3.18_150300.59.63-lp153.2.27.1.x86_64", }, product_reference: "virtualbox-kmp-preempt-6.1.34_k5.3.18_150300.59.63-lp153.2.27.1.x86_64", relates_to_product_reference: "openSUSE Leap 15.3", }, { category: "default_component_of", full_product_name: { name: "virtualbox-qt-6.1.34-lp153.2.27.2.x86_64 as component of openSUSE Leap 15.3", product_id: "openSUSE Leap 15.3:virtualbox-qt-6.1.34-lp153.2.27.2.x86_64", }, product_reference: "virtualbox-qt-6.1.34-lp153.2.27.2.x86_64", relates_to_product_reference: "openSUSE Leap 15.3", }, { category: "default_component_of", full_product_name: { name: "virtualbox-vnc-6.1.34-lp153.2.27.2.x86_64 as component of openSUSE Leap 15.3", product_id: "openSUSE Leap 15.3:virtualbox-vnc-6.1.34-lp153.2.27.2.x86_64", }, product_reference: "virtualbox-vnc-6.1.34-lp153.2.27.2.x86_64", relates_to_product_reference: "openSUSE Leap 15.3", }, { category: "default_component_of", full_product_name: { name: "virtualbox-websrv-6.1.34-lp153.2.27.2.x86_64 as component of openSUSE Leap 15.3", product_id: "openSUSE Leap 15.3:virtualbox-websrv-6.1.34-lp153.2.27.2.x86_64", }, product_reference: "virtualbox-websrv-6.1.34-lp153.2.27.2.x86_64", relates_to_product_reference: "openSUSE Leap 15.3", }, { category: "default_component_of", full_product_name: { name: "busybox-1.34.1-4.9.1.aarch64 as component of openSUSE Leap 15.3", product_id: "openSUSE Leap 15.3:busybox-1.34.1-4.9.1.aarch64", }, product_reference: "busybox-1.34.1-4.9.1.aarch64", relates_to_product_reference: "openSUSE Leap 15.3", }, { category: "default_component_of", full_product_name: { name: "busybox-1.34.1-4.9.1.ppc64le as component of openSUSE Leap 15.3", product_id: "openSUSE Leap 15.3:busybox-1.34.1-4.9.1.ppc64le", }, product_reference: "busybox-1.34.1-4.9.1.ppc64le", relates_to_product_reference: "openSUSE Leap 15.3", }, { category: "default_component_of", full_product_name: { name: "busybox-1.34.1-4.9.1.s390x as component of openSUSE Leap 15.3", product_id: "openSUSE Leap 15.3:busybox-1.34.1-4.9.1.s390x", }, product_reference: "busybox-1.34.1-4.9.1.s390x", relates_to_product_reference: "openSUSE Leap 15.3", }, { category: "default_component_of", full_product_name: { name: "busybox-1.34.1-4.9.1.x86_64 as component of openSUSE Leap 15.3", product_id: "openSUSE Leap 15.3:busybox-1.34.1-4.9.1.x86_64", }, product_reference: "busybox-1.34.1-4.9.1.x86_64", relates_to_product_reference: "openSUSE Leap 15.3", }, { category: "default_component_of", full_product_name: { name: "busybox-static-1.34.1-4.9.1.aarch64 as component of openSUSE Leap 15.3", product_id: "openSUSE Leap 15.3:busybox-static-1.34.1-4.9.1.aarch64", }, product_reference: "busybox-static-1.34.1-4.9.1.aarch64", relates_to_product_reference: "openSUSE Leap 15.3", }, { category: "default_component_of", full_product_name: { name: "busybox-static-1.34.1-4.9.1.ppc64le as component of openSUSE Leap 15.3", product_id: "openSUSE Leap 15.3:busybox-static-1.34.1-4.9.1.ppc64le", }, product_reference: "busybox-static-1.34.1-4.9.1.ppc64le", relates_to_product_reference: "openSUSE Leap 15.3", }, { category: "default_component_of", full_product_name: { name: "busybox-static-1.34.1-4.9.1.s390x as component of openSUSE Leap 15.3", product_id: "openSUSE Leap 15.3:busybox-static-1.34.1-4.9.1.s390x", }, product_reference: "busybox-static-1.34.1-4.9.1.s390x", relates_to_product_reference: "openSUSE Leap 15.3", }, { category: "default_component_of", full_product_name: { name: "busybox-static-1.34.1-4.9.1.x86_64 as component of openSUSE Leap 15.3", product_id: "openSUSE Leap 15.3:busybox-static-1.34.1-4.9.1.x86_64", }, product_reference: "busybox-static-1.34.1-4.9.1.x86_64", relates_to_product_reference: "openSUSE Leap 15.3", }, ], }, vulnerabilities: [ { cve: "CVE-2011-5325", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2011-5325", }, ], notes: [ { category: "general", text: "Directory traversal vulnerability in the BusyBox implementation of tar before 1.22.0 v5 allows remote attackers to point to files outside the current working directory via a symlink.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Leap 15.3:busybox-1.34.1-4.9.1.aarch64", "openSUSE Leap 15.3:busybox-1.34.1-4.9.1.ppc64le", "openSUSE Leap 15.3:busybox-1.34.1-4.9.1.s390x", "openSUSE Leap 15.3:busybox-1.34.1-4.9.1.x86_64", "openSUSE Leap 15.3:busybox-static-1.34.1-4.9.1.aarch64", "openSUSE Leap 15.3:busybox-static-1.34.1-4.9.1.ppc64le", "openSUSE Leap 15.3:busybox-static-1.34.1-4.9.1.s390x", "openSUSE Leap 15.3:busybox-static-1.34.1-4.9.1.x86_64", "openSUSE Leap 15.3:python3-virtualbox-6.1.34-lp153.2.27.2.x86_64", "openSUSE Leap 15.3:virtualbox-6.1.34-lp153.2.27.2.x86_64", "openSUSE Leap 15.3:virtualbox-devel-6.1.34-lp153.2.27.2.x86_64", "openSUSE Leap 15.3:virtualbox-guest-desktop-icons-6.1.34-lp153.2.27.2.noarch", "openSUSE Leap 15.3:virtualbox-guest-source-6.1.34-lp153.2.27.2.noarch", "openSUSE Leap 15.3:virtualbox-guest-tools-6.1.34-lp153.2.27.2.x86_64", "openSUSE Leap 15.3:virtualbox-guest-x11-6.1.34-lp153.2.27.2.x86_64", "openSUSE Leap 15.3:virtualbox-host-source-6.1.34-lp153.2.27.2.noarch", "openSUSE Leap 15.3:virtualbox-kmp-default-6.1.34_k5.3.18_150300.59.63-lp153.2.27.1.x86_64", "openSUSE Leap 15.3:virtualbox-kmp-preempt-6.1.34_k5.3.18_150300.59.63-lp153.2.27.1.x86_64", "openSUSE Leap 15.3:virtualbox-qt-6.1.34-lp153.2.27.2.x86_64", "openSUSE Leap 15.3:virtualbox-vnc-6.1.34-lp153.2.27.2.x86_64", "openSUSE Leap 15.3:virtualbox-websrv-6.1.34-lp153.2.27.2.x86_64", ], }, references: [ { category: "external", summary: "CVE-2011-5325", url: "https://www.suse.com/security/cve/CVE-2011-5325", }, { category: "external", summary: "SUSE Bug 951562 for CVE-2011-5325", url: "https://bugzilla.suse.com/951562", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Leap 15.3:busybox-1.34.1-4.9.1.aarch64", "openSUSE Leap 15.3:busybox-1.34.1-4.9.1.ppc64le", "openSUSE Leap 15.3:busybox-1.34.1-4.9.1.s390x", "openSUSE Leap 15.3:busybox-1.34.1-4.9.1.x86_64", "openSUSE Leap 15.3:busybox-static-1.34.1-4.9.1.aarch64", "openSUSE Leap 15.3:busybox-static-1.34.1-4.9.1.ppc64le", "openSUSE Leap 15.3:busybox-static-1.34.1-4.9.1.s390x", "openSUSE Leap 15.3:busybox-static-1.34.1-4.9.1.x86_64", "openSUSE Leap 15.3:python3-virtualbox-6.1.34-lp153.2.27.2.x86_64", "openSUSE Leap 15.3:virtualbox-6.1.34-lp153.2.27.2.x86_64", "openSUSE Leap 15.3:virtualbox-devel-6.1.34-lp153.2.27.2.x86_64", "openSUSE Leap 15.3:virtualbox-guest-desktop-icons-6.1.34-lp153.2.27.2.noarch", "openSUSE Leap 15.3:virtualbox-guest-source-6.1.34-lp153.2.27.2.noarch", "openSUSE Leap 15.3:virtualbox-guest-tools-6.1.34-lp153.2.27.2.x86_64", "openSUSE Leap 15.3:virtualbox-guest-x11-6.1.34-lp153.2.27.2.x86_64", "openSUSE Leap 15.3:virtualbox-host-source-6.1.34-lp153.2.27.2.noarch", "openSUSE Leap 15.3:virtualbox-kmp-default-6.1.34_k5.3.18_150300.59.63-lp153.2.27.1.x86_64", "openSUSE Leap 15.3:virtualbox-kmp-preempt-6.1.34_k5.3.18_150300.59.63-lp153.2.27.1.x86_64", "openSUSE Leap 15.3:virtualbox-qt-6.1.34-lp153.2.27.2.x86_64", "openSUSE Leap 15.3:virtualbox-vnc-6.1.34-lp153.2.27.2.x86_64", "openSUSE Leap 15.3:virtualbox-websrv-6.1.34-lp153.2.27.2.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 7.5, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N", version: "3.1", }, products: [ "openSUSE Leap 15.3:busybox-1.34.1-4.9.1.aarch64", "openSUSE Leap 15.3:busybox-1.34.1-4.9.1.ppc64le", "openSUSE Leap 15.3:busybox-1.34.1-4.9.1.s390x", "openSUSE Leap 15.3:busybox-1.34.1-4.9.1.x86_64", "openSUSE Leap 15.3:busybox-static-1.34.1-4.9.1.aarch64", "openSUSE Leap 15.3:busybox-static-1.34.1-4.9.1.ppc64le", "openSUSE Leap 15.3:busybox-static-1.34.1-4.9.1.s390x", "openSUSE Leap 15.3:busybox-static-1.34.1-4.9.1.x86_64", "openSUSE Leap 15.3:python3-virtualbox-6.1.34-lp153.2.27.2.x86_64", "openSUSE Leap 15.3:virtualbox-6.1.34-lp153.2.27.2.x86_64", "openSUSE Leap 15.3:virtualbox-devel-6.1.34-lp153.2.27.2.x86_64", "openSUSE Leap 15.3:virtualbox-guest-desktop-icons-6.1.34-lp153.2.27.2.noarch", "openSUSE Leap 15.3:virtualbox-guest-source-6.1.34-lp153.2.27.2.noarch", "openSUSE Leap 15.3:virtualbox-guest-tools-6.1.34-lp153.2.27.2.x86_64", "openSUSE Leap 15.3:virtualbox-guest-x11-6.1.34-lp153.2.27.2.x86_64", "openSUSE Leap 15.3:virtualbox-host-source-6.1.34-lp153.2.27.2.noarch", "openSUSE Leap 15.3:virtualbox-kmp-default-6.1.34_k5.3.18_150300.59.63-lp153.2.27.1.x86_64", "openSUSE Leap 15.3:virtualbox-kmp-preempt-6.1.34_k5.3.18_150300.59.63-lp153.2.27.1.x86_64", "openSUSE Leap 15.3:virtualbox-qt-6.1.34-lp153.2.27.2.x86_64", "openSUSE Leap 15.3:virtualbox-vnc-6.1.34-lp153.2.27.2.x86_64", "openSUSE Leap 15.3:virtualbox-websrv-6.1.34-lp153.2.27.2.x86_64", ], }, ], threats: [ { category: "impact", date: "2022-01-20T09:04:27Z", details: "moderate", }, ], title: "CVE-2011-5325", }, { cve: "CVE-2015-9261", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2015-9261", }, ], notes: [ { category: "general", text: "huft_build in archival/libarchive/decompress_gunzip.c in BusyBox before 1.27.2 misuses a pointer, causing segfaults and an application crash during an unzip operation on a specially crafted ZIP file.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Leap 15.3:busybox-1.34.1-4.9.1.aarch64", "openSUSE Leap 15.3:busybox-1.34.1-4.9.1.ppc64le", "openSUSE Leap 15.3:busybox-1.34.1-4.9.1.s390x", "openSUSE Leap 15.3:busybox-1.34.1-4.9.1.x86_64", "openSUSE Leap 15.3:busybox-static-1.34.1-4.9.1.aarch64", "openSUSE Leap 15.3:busybox-static-1.34.1-4.9.1.ppc64le", "openSUSE Leap 15.3:busybox-static-1.34.1-4.9.1.s390x", "openSUSE Leap 15.3:busybox-static-1.34.1-4.9.1.x86_64", "openSUSE Leap 15.3:python3-virtualbox-6.1.34-lp153.2.27.2.x86_64", "openSUSE Leap 15.3:virtualbox-6.1.34-lp153.2.27.2.x86_64", "openSUSE Leap 15.3:virtualbox-devel-6.1.34-lp153.2.27.2.x86_64", "openSUSE Leap 15.3:virtualbox-guest-desktop-icons-6.1.34-lp153.2.27.2.noarch", "openSUSE Leap 15.3:virtualbox-guest-source-6.1.34-lp153.2.27.2.noarch", "openSUSE Leap 15.3:virtualbox-guest-tools-6.1.34-lp153.2.27.2.x86_64", "openSUSE Leap 15.3:virtualbox-guest-x11-6.1.34-lp153.2.27.2.x86_64", "openSUSE Leap 15.3:virtualbox-host-source-6.1.34-lp153.2.27.2.noarch", "openSUSE Leap 15.3:virtualbox-kmp-default-6.1.34_k5.3.18_150300.59.63-lp153.2.27.1.x86_64", "openSUSE Leap 15.3:virtualbox-kmp-preempt-6.1.34_k5.3.18_150300.59.63-lp153.2.27.1.x86_64", "openSUSE Leap 15.3:virtualbox-qt-6.1.34-lp153.2.27.2.x86_64", "openSUSE Leap 15.3:virtualbox-vnc-6.1.34-lp153.2.27.2.x86_64", "openSUSE Leap 15.3:virtualbox-websrv-6.1.34-lp153.2.27.2.x86_64", ], }, references: [ { category: "external", summary: "CVE-2015-9261", url: "https://www.suse.com/security/cve/CVE-2015-9261", }, { category: "external", summary: "SUSE Bug 1102912 for CVE-2015-9261", url: "https://bugzilla.suse.com/1102912", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Leap 15.3:busybox-1.34.1-4.9.1.aarch64", "openSUSE Leap 15.3:busybox-1.34.1-4.9.1.ppc64le", "openSUSE Leap 15.3:busybox-1.34.1-4.9.1.s390x", "openSUSE Leap 15.3:busybox-1.34.1-4.9.1.x86_64", "openSUSE Leap 15.3:busybox-static-1.34.1-4.9.1.aarch64", "openSUSE Leap 15.3:busybox-static-1.34.1-4.9.1.ppc64le", "openSUSE Leap 15.3:busybox-static-1.34.1-4.9.1.s390x", "openSUSE Leap 15.3:busybox-static-1.34.1-4.9.1.x86_64", "openSUSE Leap 15.3:python3-virtualbox-6.1.34-lp153.2.27.2.x86_64", "openSUSE Leap 15.3:virtualbox-6.1.34-lp153.2.27.2.x86_64", "openSUSE Leap 15.3:virtualbox-devel-6.1.34-lp153.2.27.2.x86_64", "openSUSE Leap 15.3:virtualbox-guest-desktop-icons-6.1.34-lp153.2.27.2.noarch", "openSUSE Leap 15.3:virtualbox-guest-source-6.1.34-lp153.2.27.2.noarch", "openSUSE Leap 15.3:virtualbox-guest-tools-6.1.34-lp153.2.27.2.x86_64", "openSUSE Leap 15.3:virtualbox-guest-x11-6.1.34-lp153.2.27.2.x86_64", "openSUSE Leap 15.3:virtualbox-host-source-6.1.34-lp153.2.27.2.noarch", "openSUSE Leap 15.3:virtualbox-kmp-default-6.1.34_k5.3.18_150300.59.63-lp153.2.27.1.x86_64", "openSUSE Leap 15.3:virtualbox-kmp-preempt-6.1.34_k5.3.18_150300.59.63-lp153.2.27.1.x86_64", "openSUSE Leap 15.3:virtualbox-qt-6.1.34-lp153.2.27.2.x86_64", "openSUSE Leap 15.3:virtualbox-vnc-6.1.34-lp153.2.27.2.x86_64", "openSUSE Leap 15.3:virtualbox-websrv-6.1.34-lp153.2.27.2.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.5, baseSeverity: "MEDIUM", vectorString: "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", version: "3.0", }, products: [ "openSUSE Leap 15.3:busybox-1.34.1-4.9.1.aarch64", "openSUSE Leap 15.3:busybox-1.34.1-4.9.1.ppc64le", "openSUSE Leap 15.3:busybox-1.34.1-4.9.1.s390x", "openSUSE Leap 15.3:busybox-1.34.1-4.9.1.x86_64", "openSUSE Leap 15.3:busybox-static-1.34.1-4.9.1.aarch64", "openSUSE Leap 15.3:busybox-static-1.34.1-4.9.1.ppc64le", "openSUSE Leap 15.3:busybox-static-1.34.1-4.9.1.s390x", "openSUSE Leap 15.3:busybox-static-1.34.1-4.9.1.x86_64", "openSUSE Leap 15.3:python3-virtualbox-6.1.34-lp153.2.27.2.x86_64", "openSUSE Leap 15.3:virtualbox-6.1.34-lp153.2.27.2.x86_64", "openSUSE Leap 15.3:virtualbox-devel-6.1.34-lp153.2.27.2.x86_64", "openSUSE Leap 15.3:virtualbox-guest-desktop-icons-6.1.34-lp153.2.27.2.noarch", "openSUSE Leap 15.3:virtualbox-guest-source-6.1.34-lp153.2.27.2.noarch", "openSUSE Leap 15.3:virtualbox-guest-tools-6.1.34-lp153.2.27.2.x86_64", "openSUSE Leap 15.3:virtualbox-guest-x11-6.1.34-lp153.2.27.2.x86_64", "openSUSE Leap 15.3:virtualbox-host-source-6.1.34-lp153.2.27.2.noarch", "openSUSE Leap 15.3:virtualbox-kmp-default-6.1.34_k5.3.18_150300.59.63-lp153.2.27.1.x86_64", "openSUSE Leap 15.3:virtualbox-kmp-preempt-6.1.34_k5.3.18_150300.59.63-lp153.2.27.1.x86_64", "openSUSE Leap 15.3:virtualbox-qt-6.1.34-lp153.2.27.2.x86_64", "openSUSE Leap 15.3:virtualbox-vnc-6.1.34-lp153.2.27.2.x86_64", "openSUSE Leap 15.3:virtualbox-websrv-6.1.34-lp153.2.27.2.x86_64", ], }, ], threats: [ { category: "impact", date: "2022-01-20T09:04:27Z", details: "moderate", }, ], title: "CVE-2015-9261", }, { cve: "CVE-2016-2147", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2016-2147", }, ], notes: [ { category: "general", text: "Integer overflow in the DHCP client (udhcpc) in BusyBox before 1.25.0 allows remote attackers to cause a denial of service (crash) via a malformed RFC1035-encoded domain name, which triggers an out-of-bounds heap write.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Leap 15.3:busybox-1.34.1-4.9.1.aarch64", "openSUSE Leap 15.3:busybox-1.34.1-4.9.1.ppc64le", "openSUSE Leap 15.3:busybox-1.34.1-4.9.1.s390x", "openSUSE Leap 15.3:busybox-1.34.1-4.9.1.x86_64", "openSUSE Leap 15.3:busybox-static-1.34.1-4.9.1.aarch64", "openSUSE Leap 15.3:busybox-static-1.34.1-4.9.1.ppc64le", "openSUSE Leap 15.3:busybox-static-1.34.1-4.9.1.s390x", "openSUSE Leap 15.3:busybox-static-1.34.1-4.9.1.x86_64", "openSUSE Leap 15.3:python3-virtualbox-6.1.34-lp153.2.27.2.x86_64", "openSUSE Leap 15.3:virtualbox-6.1.34-lp153.2.27.2.x86_64", "openSUSE Leap 15.3:virtualbox-devel-6.1.34-lp153.2.27.2.x86_64", "openSUSE Leap 15.3:virtualbox-guest-desktop-icons-6.1.34-lp153.2.27.2.noarch", "openSUSE Leap 15.3:virtualbox-guest-source-6.1.34-lp153.2.27.2.noarch", "openSUSE Leap 15.3:virtualbox-guest-tools-6.1.34-lp153.2.27.2.x86_64", "openSUSE Leap 15.3:virtualbox-guest-x11-6.1.34-lp153.2.27.2.x86_64", "openSUSE Leap 15.3:virtualbox-host-source-6.1.34-lp153.2.27.2.noarch", "openSUSE Leap 15.3:virtualbox-kmp-default-6.1.34_k5.3.18_150300.59.63-lp153.2.27.1.x86_64", "openSUSE Leap 15.3:virtualbox-kmp-preempt-6.1.34_k5.3.18_150300.59.63-lp153.2.27.1.x86_64", "openSUSE Leap 15.3:virtualbox-qt-6.1.34-lp153.2.27.2.x86_64", "openSUSE Leap 15.3:virtualbox-vnc-6.1.34-lp153.2.27.2.x86_64", "openSUSE Leap 15.3:virtualbox-websrv-6.1.34-lp153.2.27.2.x86_64", ], }, references: [ { category: "external", summary: "CVE-2016-2147", url: "https://www.suse.com/security/cve/CVE-2016-2147", }, { category: "external", summary: "SUSE Bug 970663 for CVE-2016-2147", url: "https://bugzilla.suse.com/970663", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Leap 15.3:busybox-1.34.1-4.9.1.aarch64", "openSUSE Leap 15.3:busybox-1.34.1-4.9.1.ppc64le", "openSUSE Leap 15.3:busybox-1.34.1-4.9.1.s390x", "openSUSE Leap 15.3:busybox-1.34.1-4.9.1.x86_64", "openSUSE Leap 15.3:busybox-static-1.34.1-4.9.1.aarch64", "openSUSE Leap 15.3:busybox-static-1.34.1-4.9.1.ppc64le", "openSUSE Leap 15.3:busybox-static-1.34.1-4.9.1.s390x", "openSUSE Leap 15.3:busybox-static-1.34.1-4.9.1.x86_64", "openSUSE Leap 15.3:python3-virtualbox-6.1.34-lp153.2.27.2.x86_64", "openSUSE Leap 15.3:virtualbox-6.1.34-lp153.2.27.2.x86_64", "openSUSE Leap 15.3:virtualbox-devel-6.1.34-lp153.2.27.2.x86_64", "openSUSE Leap 15.3:virtualbox-guest-desktop-icons-6.1.34-lp153.2.27.2.noarch", "openSUSE Leap 15.3:virtualbox-guest-source-6.1.34-lp153.2.27.2.noarch", "openSUSE Leap 15.3:virtualbox-guest-tools-6.1.34-lp153.2.27.2.x86_64", "openSUSE Leap 15.3:virtualbox-guest-x11-6.1.34-lp153.2.27.2.x86_64", "openSUSE Leap 15.3:virtualbox-host-source-6.1.34-lp153.2.27.2.noarch", "openSUSE Leap 15.3:virtualbox-kmp-default-6.1.34_k5.3.18_150300.59.63-lp153.2.27.1.x86_64", "openSUSE Leap 15.3:virtualbox-kmp-preempt-6.1.34_k5.3.18_150300.59.63-lp153.2.27.1.x86_64", "openSUSE Leap 15.3:virtualbox-qt-6.1.34-lp153.2.27.2.x86_64", "openSUSE Leap 15.3:virtualbox-vnc-6.1.34-lp153.2.27.2.x86_64", "openSUSE Leap 15.3:virtualbox-websrv-6.1.34-lp153.2.27.2.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 7.5, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "openSUSE Leap 15.3:busybox-1.34.1-4.9.1.aarch64", "openSUSE Leap 15.3:busybox-1.34.1-4.9.1.ppc64le", "openSUSE Leap 15.3:busybox-1.34.1-4.9.1.s390x", "openSUSE Leap 15.3:busybox-1.34.1-4.9.1.x86_64", "openSUSE Leap 15.3:busybox-static-1.34.1-4.9.1.aarch64", "openSUSE Leap 15.3:busybox-static-1.34.1-4.9.1.ppc64le", "openSUSE Leap 15.3:busybox-static-1.34.1-4.9.1.s390x", "openSUSE Leap 15.3:busybox-static-1.34.1-4.9.1.x86_64", "openSUSE Leap 15.3:python3-virtualbox-6.1.34-lp153.2.27.2.x86_64", "openSUSE Leap 15.3:virtualbox-6.1.34-lp153.2.27.2.x86_64", "openSUSE Leap 15.3:virtualbox-devel-6.1.34-lp153.2.27.2.x86_64", "openSUSE Leap 15.3:virtualbox-guest-desktop-icons-6.1.34-lp153.2.27.2.noarch", "openSUSE Leap 15.3:virtualbox-guest-source-6.1.34-lp153.2.27.2.noarch", "openSUSE Leap 15.3:virtualbox-guest-tools-6.1.34-lp153.2.27.2.x86_64", "openSUSE Leap 15.3:virtualbox-guest-x11-6.1.34-lp153.2.27.2.x86_64", "openSUSE Leap 15.3:virtualbox-host-source-6.1.34-lp153.2.27.2.noarch", "openSUSE Leap 15.3:virtualbox-kmp-default-6.1.34_k5.3.18_150300.59.63-lp153.2.27.1.x86_64", "openSUSE Leap 15.3:virtualbox-kmp-preempt-6.1.34_k5.3.18_150300.59.63-lp153.2.27.1.x86_64", "openSUSE Leap 15.3:virtualbox-qt-6.1.34-lp153.2.27.2.x86_64", "openSUSE Leap 15.3:virtualbox-vnc-6.1.34-lp153.2.27.2.x86_64", "openSUSE Leap 15.3:virtualbox-websrv-6.1.34-lp153.2.27.2.x86_64", ], }, ], threats: [ { category: "impact", date: "2022-01-20T09:04:27Z", details: "important", }, ], title: "CVE-2016-2147", }, { cve: "CVE-2016-2148", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2016-2148", }, ], notes: [ { category: "general", text: "Heap-based buffer overflow in the DHCP client (udhcpc) in BusyBox before 1.25.0 allows remote attackers to have unspecified impact via vectors involving OPTION_6RD parsing.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Leap 15.3:busybox-1.34.1-4.9.1.aarch64", "openSUSE Leap 15.3:busybox-1.34.1-4.9.1.ppc64le", "openSUSE Leap 15.3:busybox-1.34.1-4.9.1.s390x", "openSUSE Leap 15.3:busybox-1.34.1-4.9.1.x86_64", "openSUSE Leap 15.3:busybox-static-1.34.1-4.9.1.aarch64", "openSUSE Leap 15.3:busybox-static-1.34.1-4.9.1.ppc64le", "openSUSE Leap 15.3:busybox-static-1.34.1-4.9.1.s390x", "openSUSE Leap 15.3:busybox-static-1.34.1-4.9.1.x86_64", "openSUSE Leap 15.3:python3-virtualbox-6.1.34-lp153.2.27.2.x86_64", "openSUSE Leap 15.3:virtualbox-6.1.34-lp153.2.27.2.x86_64", "openSUSE Leap 15.3:virtualbox-devel-6.1.34-lp153.2.27.2.x86_64", "openSUSE Leap 15.3:virtualbox-guest-desktop-icons-6.1.34-lp153.2.27.2.noarch", "openSUSE Leap 15.3:virtualbox-guest-source-6.1.34-lp153.2.27.2.noarch", "openSUSE Leap 15.3:virtualbox-guest-tools-6.1.34-lp153.2.27.2.x86_64", "openSUSE Leap 15.3:virtualbox-guest-x11-6.1.34-lp153.2.27.2.x86_64", "openSUSE Leap 15.3:virtualbox-host-source-6.1.34-lp153.2.27.2.noarch", "openSUSE Leap 15.3:virtualbox-kmp-default-6.1.34_k5.3.18_150300.59.63-lp153.2.27.1.x86_64", "openSUSE Leap 15.3:virtualbox-kmp-preempt-6.1.34_k5.3.18_150300.59.63-lp153.2.27.1.x86_64", "openSUSE Leap 15.3:virtualbox-qt-6.1.34-lp153.2.27.2.x86_64", "openSUSE Leap 15.3:virtualbox-vnc-6.1.34-lp153.2.27.2.x86_64", "openSUSE Leap 15.3:virtualbox-websrv-6.1.34-lp153.2.27.2.x86_64", ], }, references: [ { category: "external", summary: "CVE-2016-2148", url: "https://www.suse.com/security/cve/CVE-2016-2148", }, { category: "external", summary: "SUSE Bug 970662 for CVE-2016-2148", url: "https://bugzilla.suse.com/970662", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Leap 15.3:busybox-1.34.1-4.9.1.aarch64", "openSUSE Leap 15.3:busybox-1.34.1-4.9.1.ppc64le", "openSUSE Leap 15.3:busybox-1.34.1-4.9.1.s390x", "openSUSE Leap 15.3:busybox-1.34.1-4.9.1.x86_64", "openSUSE Leap 15.3:busybox-static-1.34.1-4.9.1.aarch64", "openSUSE Leap 15.3:busybox-static-1.34.1-4.9.1.ppc64le", "openSUSE Leap 15.3:busybox-static-1.34.1-4.9.1.s390x", "openSUSE Leap 15.3:busybox-static-1.34.1-4.9.1.x86_64", "openSUSE Leap 15.3:python3-virtualbox-6.1.34-lp153.2.27.2.x86_64", "openSUSE Leap 15.3:virtualbox-6.1.34-lp153.2.27.2.x86_64", "openSUSE Leap 15.3:virtualbox-devel-6.1.34-lp153.2.27.2.x86_64", "openSUSE Leap 15.3:virtualbox-guest-desktop-icons-6.1.34-lp153.2.27.2.noarch", "openSUSE Leap 15.3:virtualbox-guest-source-6.1.34-lp153.2.27.2.noarch", "openSUSE Leap 15.3:virtualbox-guest-tools-6.1.34-lp153.2.27.2.x86_64", "openSUSE Leap 15.3:virtualbox-guest-x11-6.1.34-lp153.2.27.2.x86_64", "openSUSE Leap 15.3:virtualbox-host-source-6.1.34-lp153.2.27.2.noarch", "openSUSE Leap 15.3:virtualbox-kmp-default-6.1.34_k5.3.18_150300.59.63-lp153.2.27.1.x86_64", "openSUSE Leap 15.3:virtualbox-kmp-preempt-6.1.34_k5.3.18_150300.59.63-lp153.2.27.1.x86_64", "openSUSE Leap 15.3:virtualbox-qt-6.1.34-lp153.2.27.2.x86_64", "openSUSE Leap 15.3:virtualbox-vnc-6.1.34-lp153.2.27.2.x86_64", "openSUSE Leap 15.3:virtualbox-websrv-6.1.34-lp153.2.27.2.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 9.8, baseSeverity: "CRITICAL", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, products: [ "openSUSE Leap 15.3:busybox-1.34.1-4.9.1.aarch64", "openSUSE Leap 15.3:busybox-1.34.1-4.9.1.ppc64le", "openSUSE Leap 15.3:busybox-1.34.1-4.9.1.s390x", "openSUSE Leap 15.3:busybox-1.34.1-4.9.1.x86_64", "openSUSE Leap 15.3:busybox-static-1.34.1-4.9.1.aarch64", "openSUSE Leap 15.3:busybox-static-1.34.1-4.9.1.ppc64le", "openSUSE Leap 15.3:busybox-static-1.34.1-4.9.1.s390x", "openSUSE Leap 15.3:busybox-static-1.34.1-4.9.1.x86_64", "openSUSE Leap 15.3:python3-virtualbox-6.1.34-lp153.2.27.2.x86_64", "openSUSE Leap 15.3:virtualbox-6.1.34-lp153.2.27.2.x86_64", "openSUSE Leap 15.3:virtualbox-devel-6.1.34-lp153.2.27.2.x86_64", "openSUSE Leap 15.3:virtualbox-guest-desktop-icons-6.1.34-lp153.2.27.2.noarch", "openSUSE Leap 15.3:virtualbox-guest-source-6.1.34-lp153.2.27.2.noarch", "openSUSE Leap 15.3:virtualbox-guest-tools-6.1.34-lp153.2.27.2.x86_64", "openSUSE Leap 15.3:virtualbox-guest-x11-6.1.34-lp153.2.27.2.x86_64", "openSUSE Leap 15.3:virtualbox-host-source-6.1.34-lp153.2.27.2.noarch", "openSUSE Leap 15.3:virtualbox-kmp-default-6.1.34_k5.3.18_150300.59.63-lp153.2.27.1.x86_64", "openSUSE Leap 15.3:virtualbox-kmp-preempt-6.1.34_k5.3.18_150300.59.63-lp153.2.27.1.x86_64", "openSUSE Leap 15.3:virtualbox-qt-6.1.34-lp153.2.27.2.x86_64", "openSUSE Leap 15.3:virtualbox-vnc-6.1.34-lp153.2.27.2.x86_64", "openSUSE Leap 15.3:virtualbox-websrv-6.1.34-lp153.2.27.2.x86_64", ], }, ], threats: [ { category: "impact", date: "2022-01-20T09:04:27Z", details: "moderate", }, ], title: "CVE-2016-2148", }, { cve: "CVE-2016-6301", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2016-6301", }, ], notes: [ { category: "general", text: "The recv_and_process_client_pkt function in networking/ntpd.c in busybox allows remote attackers to cause a denial of service (CPU and bandwidth consumption) via a forged NTP packet, which triggers a communication loop.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Leap 15.3:busybox-1.34.1-4.9.1.aarch64", "openSUSE Leap 15.3:busybox-1.34.1-4.9.1.ppc64le", "openSUSE Leap 15.3:busybox-1.34.1-4.9.1.s390x", "openSUSE Leap 15.3:busybox-1.34.1-4.9.1.x86_64", "openSUSE Leap 15.3:busybox-static-1.34.1-4.9.1.aarch64", "openSUSE Leap 15.3:busybox-static-1.34.1-4.9.1.ppc64le", "openSUSE Leap 15.3:busybox-static-1.34.1-4.9.1.s390x", "openSUSE Leap 15.3:busybox-static-1.34.1-4.9.1.x86_64", "openSUSE Leap 15.3:python3-virtualbox-6.1.34-lp153.2.27.2.x86_64", "openSUSE Leap 15.3:virtualbox-6.1.34-lp153.2.27.2.x86_64", "openSUSE Leap 15.3:virtualbox-devel-6.1.34-lp153.2.27.2.x86_64", "openSUSE Leap 15.3:virtualbox-guest-desktop-icons-6.1.34-lp153.2.27.2.noarch", "openSUSE Leap 15.3:virtualbox-guest-source-6.1.34-lp153.2.27.2.noarch", "openSUSE Leap 15.3:virtualbox-guest-tools-6.1.34-lp153.2.27.2.x86_64", "openSUSE Leap 15.3:virtualbox-guest-x11-6.1.34-lp153.2.27.2.x86_64", "openSUSE Leap 15.3:virtualbox-host-source-6.1.34-lp153.2.27.2.noarch", "openSUSE Leap 15.3:virtualbox-kmp-default-6.1.34_k5.3.18_150300.59.63-lp153.2.27.1.x86_64", "openSUSE Leap 15.3:virtualbox-kmp-preempt-6.1.34_k5.3.18_150300.59.63-lp153.2.27.1.x86_64", "openSUSE Leap 15.3:virtualbox-qt-6.1.34-lp153.2.27.2.x86_64", "openSUSE Leap 15.3:virtualbox-vnc-6.1.34-lp153.2.27.2.x86_64", "openSUSE Leap 15.3:virtualbox-websrv-6.1.34-lp153.2.27.2.x86_64", ], }, references: [ { category: "external", summary: "CVE-2016-6301", url: "https://www.suse.com/security/cve/CVE-2016-6301", }, { category: "external", summary: "SUSE Bug 991940 for CVE-2016-6301", url: "https://bugzilla.suse.com/991940", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Leap 15.3:busybox-1.34.1-4.9.1.aarch64", "openSUSE Leap 15.3:busybox-1.34.1-4.9.1.ppc64le", "openSUSE Leap 15.3:busybox-1.34.1-4.9.1.s390x", "openSUSE Leap 15.3:busybox-1.34.1-4.9.1.x86_64", "openSUSE Leap 15.3:busybox-static-1.34.1-4.9.1.aarch64", "openSUSE Leap 15.3:busybox-static-1.34.1-4.9.1.ppc64le", "openSUSE Leap 15.3:busybox-static-1.34.1-4.9.1.s390x", "openSUSE Leap 15.3:busybox-static-1.34.1-4.9.1.x86_64", "openSUSE Leap 15.3:python3-virtualbox-6.1.34-lp153.2.27.2.x86_64", "openSUSE Leap 15.3:virtualbox-6.1.34-lp153.2.27.2.x86_64", "openSUSE Leap 15.3:virtualbox-devel-6.1.34-lp153.2.27.2.x86_64", "openSUSE Leap 15.3:virtualbox-guest-desktop-icons-6.1.34-lp153.2.27.2.noarch", "openSUSE Leap 15.3:virtualbox-guest-source-6.1.34-lp153.2.27.2.noarch", "openSUSE Leap 15.3:virtualbox-guest-tools-6.1.34-lp153.2.27.2.x86_64", "openSUSE Leap 15.3:virtualbox-guest-x11-6.1.34-lp153.2.27.2.x86_64", "openSUSE Leap 15.3:virtualbox-host-source-6.1.34-lp153.2.27.2.noarch", "openSUSE Leap 15.3:virtualbox-kmp-default-6.1.34_k5.3.18_150300.59.63-lp153.2.27.1.x86_64", "openSUSE Leap 15.3:virtualbox-kmp-preempt-6.1.34_k5.3.18_150300.59.63-lp153.2.27.1.x86_64", "openSUSE Leap 15.3:virtualbox-qt-6.1.34-lp153.2.27.2.x86_64", "openSUSE Leap 15.3:virtualbox-vnc-6.1.34-lp153.2.27.2.x86_64", "openSUSE Leap 15.3:virtualbox-websrv-6.1.34-lp153.2.27.2.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 7.5, baseSeverity: "HIGH", vectorString: "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", version: "3.0", }, products: [ "openSUSE Leap 15.3:busybox-1.34.1-4.9.1.aarch64", "openSUSE Leap 15.3:busybox-1.34.1-4.9.1.ppc64le", "openSUSE Leap 15.3:busybox-1.34.1-4.9.1.s390x", "openSUSE Leap 15.3:busybox-1.34.1-4.9.1.x86_64", "openSUSE Leap 15.3:busybox-static-1.34.1-4.9.1.aarch64", "openSUSE Leap 15.3:busybox-static-1.34.1-4.9.1.ppc64le", "openSUSE Leap 15.3:busybox-static-1.34.1-4.9.1.s390x", "openSUSE Leap 15.3:busybox-static-1.34.1-4.9.1.x86_64", "openSUSE Leap 15.3:python3-virtualbox-6.1.34-lp153.2.27.2.x86_64", "openSUSE Leap 15.3:virtualbox-6.1.34-lp153.2.27.2.x86_64", "openSUSE Leap 15.3:virtualbox-devel-6.1.34-lp153.2.27.2.x86_64", "openSUSE Leap 15.3:virtualbox-guest-desktop-icons-6.1.34-lp153.2.27.2.noarch", "openSUSE Leap 15.3:virtualbox-guest-source-6.1.34-lp153.2.27.2.noarch", "openSUSE Leap 15.3:virtualbox-guest-tools-6.1.34-lp153.2.27.2.x86_64", "openSUSE Leap 15.3:virtualbox-guest-x11-6.1.34-lp153.2.27.2.x86_64", "openSUSE Leap 15.3:virtualbox-host-source-6.1.34-lp153.2.27.2.noarch", "openSUSE Leap 15.3:virtualbox-kmp-default-6.1.34_k5.3.18_150300.59.63-lp153.2.27.1.x86_64", "openSUSE Leap 15.3:virtualbox-kmp-preempt-6.1.34_k5.3.18_150300.59.63-lp153.2.27.1.x86_64", "openSUSE Leap 15.3:virtualbox-qt-6.1.34-lp153.2.27.2.x86_64", "openSUSE Leap 15.3:virtualbox-vnc-6.1.34-lp153.2.27.2.x86_64", "openSUSE Leap 15.3:virtualbox-websrv-6.1.34-lp153.2.27.2.x86_64", ], }, ], threats: [ { category: "impact", date: "2022-01-20T09:04:27Z", details: "moderate", }, ], title: "CVE-2016-6301", }, { cve: "CVE-2017-15873", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2017-15873", }, ], notes: [ { category: "general", text: "The get_next_block function in archival/libarchive/decompress_bunzip2.c in BusyBox 1.27.2 has an Integer Overflow that may lead to a write access violation.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Leap 15.3:busybox-1.34.1-4.9.1.aarch64", "openSUSE Leap 15.3:busybox-1.34.1-4.9.1.ppc64le", "openSUSE Leap 15.3:busybox-1.34.1-4.9.1.s390x", "openSUSE Leap 15.3:busybox-1.34.1-4.9.1.x86_64", "openSUSE Leap 15.3:busybox-static-1.34.1-4.9.1.aarch64", "openSUSE Leap 15.3:busybox-static-1.34.1-4.9.1.ppc64le", "openSUSE Leap 15.3:busybox-static-1.34.1-4.9.1.s390x", "openSUSE Leap 15.3:busybox-static-1.34.1-4.9.1.x86_64", "openSUSE Leap 15.3:python3-virtualbox-6.1.34-lp153.2.27.2.x86_64", "openSUSE Leap 15.3:virtualbox-6.1.34-lp153.2.27.2.x86_64", "openSUSE Leap 15.3:virtualbox-devel-6.1.34-lp153.2.27.2.x86_64", "openSUSE Leap 15.3:virtualbox-guest-desktop-icons-6.1.34-lp153.2.27.2.noarch", "openSUSE Leap 15.3:virtualbox-guest-source-6.1.34-lp153.2.27.2.noarch", "openSUSE Leap 15.3:virtualbox-guest-tools-6.1.34-lp153.2.27.2.x86_64", "openSUSE Leap 15.3:virtualbox-guest-x11-6.1.34-lp153.2.27.2.x86_64", "openSUSE Leap 15.3:virtualbox-host-source-6.1.34-lp153.2.27.2.noarch", "openSUSE Leap 15.3:virtualbox-kmp-default-6.1.34_k5.3.18_150300.59.63-lp153.2.27.1.x86_64", "openSUSE Leap 15.3:virtualbox-kmp-preempt-6.1.34_k5.3.18_150300.59.63-lp153.2.27.1.x86_64", "openSUSE Leap 15.3:virtualbox-qt-6.1.34-lp153.2.27.2.x86_64", "openSUSE Leap 15.3:virtualbox-vnc-6.1.34-lp153.2.27.2.x86_64", "openSUSE Leap 15.3:virtualbox-websrv-6.1.34-lp153.2.27.2.x86_64", ], }, references: [ { category: "external", summary: "CVE-2017-15873", url: "https://www.suse.com/security/cve/CVE-2017-15873", }, { category: "external", summary: "SUSE Bug 1064976 for CVE-2017-15873", url: "https://bugzilla.suse.com/1064976", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Leap 15.3:busybox-1.34.1-4.9.1.aarch64", "openSUSE Leap 15.3:busybox-1.34.1-4.9.1.ppc64le", "openSUSE Leap 15.3:busybox-1.34.1-4.9.1.s390x", "openSUSE Leap 15.3:busybox-1.34.1-4.9.1.x86_64", "openSUSE Leap 15.3:busybox-static-1.34.1-4.9.1.aarch64", "openSUSE Leap 15.3:busybox-static-1.34.1-4.9.1.ppc64le", "openSUSE Leap 15.3:busybox-static-1.34.1-4.9.1.s390x", "openSUSE Leap 15.3:busybox-static-1.34.1-4.9.1.x86_64", "openSUSE Leap 15.3:python3-virtualbox-6.1.34-lp153.2.27.2.x86_64", "openSUSE Leap 15.3:virtualbox-6.1.34-lp153.2.27.2.x86_64", "openSUSE Leap 15.3:virtualbox-devel-6.1.34-lp153.2.27.2.x86_64", "openSUSE Leap 15.3:virtualbox-guest-desktop-icons-6.1.34-lp153.2.27.2.noarch", "openSUSE Leap 15.3:virtualbox-guest-source-6.1.34-lp153.2.27.2.noarch", "openSUSE Leap 15.3:virtualbox-guest-tools-6.1.34-lp153.2.27.2.x86_64", "openSUSE Leap 15.3:virtualbox-guest-x11-6.1.34-lp153.2.27.2.x86_64", "openSUSE Leap 15.3:virtualbox-host-source-6.1.34-lp153.2.27.2.noarch", "openSUSE Leap 15.3:virtualbox-kmp-default-6.1.34_k5.3.18_150300.59.63-lp153.2.27.1.x86_64", "openSUSE Leap 15.3:virtualbox-kmp-preempt-6.1.34_k5.3.18_150300.59.63-lp153.2.27.1.x86_64", "openSUSE Leap 15.3:virtualbox-qt-6.1.34-lp153.2.27.2.x86_64", "openSUSE Leap 15.3:virtualbox-vnc-6.1.34-lp153.2.27.2.x86_64", "openSUSE Leap 15.3:virtualbox-websrv-6.1.34-lp153.2.27.2.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 7.8, baseSeverity: "HIGH", vectorString: "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", version: "3.0", }, products: [ "openSUSE Leap 15.3:busybox-1.34.1-4.9.1.aarch64", "openSUSE Leap 15.3:busybox-1.34.1-4.9.1.ppc64le", "openSUSE Leap 15.3:busybox-1.34.1-4.9.1.s390x", "openSUSE Leap 15.3:busybox-1.34.1-4.9.1.x86_64", "openSUSE Leap 15.3:busybox-static-1.34.1-4.9.1.aarch64", "openSUSE Leap 15.3:busybox-static-1.34.1-4.9.1.ppc64le", "openSUSE Leap 15.3:busybox-static-1.34.1-4.9.1.s390x", "openSUSE Leap 15.3:busybox-static-1.34.1-4.9.1.x86_64", "openSUSE Leap 15.3:python3-virtualbox-6.1.34-lp153.2.27.2.x86_64", "openSUSE Leap 15.3:virtualbox-6.1.34-lp153.2.27.2.x86_64", "openSUSE Leap 15.3:virtualbox-devel-6.1.34-lp153.2.27.2.x86_64", "openSUSE Leap 15.3:virtualbox-guest-desktop-icons-6.1.34-lp153.2.27.2.noarch", "openSUSE Leap 15.3:virtualbox-guest-source-6.1.34-lp153.2.27.2.noarch", "openSUSE Leap 15.3:virtualbox-guest-tools-6.1.34-lp153.2.27.2.x86_64", "openSUSE Leap 15.3:virtualbox-guest-x11-6.1.34-lp153.2.27.2.x86_64", "openSUSE Leap 15.3:virtualbox-host-source-6.1.34-lp153.2.27.2.noarch", "openSUSE Leap 15.3:virtualbox-kmp-default-6.1.34_k5.3.18_150300.59.63-lp153.2.27.1.x86_64", "openSUSE Leap 15.3:virtualbox-kmp-preempt-6.1.34_k5.3.18_150300.59.63-lp153.2.27.1.x86_64", "openSUSE Leap 15.3:virtualbox-qt-6.1.34-lp153.2.27.2.x86_64", "openSUSE Leap 15.3:virtualbox-vnc-6.1.34-lp153.2.27.2.x86_64", "openSUSE Leap 15.3:virtualbox-websrv-6.1.34-lp153.2.27.2.x86_64", ], }, ], threats: [ { category: "impact", date: "2022-01-20T09:04:27Z", details: "moderate", }, ], title: "CVE-2017-15873", }, { cve: "CVE-2017-15874", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2017-15874", }, ], notes: [ { category: "general", text: "archival/libarchive/decompress_unlzma.c in BusyBox 1.27.2 has an Integer Underflow that leads to a read access violation.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Leap 15.3:busybox-1.34.1-4.9.1.aarch64", "openSUSE Leap 15.3:busybox-1.34.1-4.9.1.ppc64le", "openSUSE Leap 15.3:busybox-1.34.1-4.9.1.s390x", "openSUSE Leap 15.3:busybox-1.34.1-4.9.1.x86_64", "openSUSE Leap 15.3:busybox-static-1.34.1-4.9.1.aarch64", "openSUSE Leap 15.3:busybox-static-1.34.1-4.9.1.ppc64le", "openSUSE Leap 15.3:busybox-static-1.34.1-4.9.1.s390x", "openSUSE Leap 15.3:busybox-static-1.34.1-4.9.1.x86_64", "openSUSE Leap 15.3:python3-virtualbox-6.1.34-lp153.2.27.2.x86_64", "openSUSE Leap 15.3:virtualbox-6.1.34-lp153.2.27.2.x86_64", "openSUSE Leap 15.3:virtualbox-devel-6.1.34-lp153.2.27.2.x86_64", "openSUSE Leap 15.3:virtualbox-guest-desktop-icons-6.1.34-lp153.2.27.2.noarch", "openSUSE Leap 15.3:virtualbox-guest-source-6.1.34-lp153.2.27.2.noarch", "openSUSE Leap 15.3:virtualbox-guest-tools-6.1.34-lp153.2.27.2.x86_64", "openSUSE Leap 15.3:virtualbox-guest-x11-6.1.34-lp153.2.27.2.x86_64", "openSUSE Leap 15.3:virtualbox-host-source-6.1.34-lp153.2.27.2.noarch", "openSUSE Leap 15.3:virtualbox-kmp-default-6.1.34_k5.3.18_150300.59.63-lp153.2.27.1.x86_64", "openSUSE Leap 15.3:virtualbox-kmp-preempt-6.1.34_k5.3.18_150300.59.63-lp153.2.27.1.x86_64", "openSUSE Leap 15.3:virtualbox-qt-6.1.34-lp153.2.27.2.x86_64", "openSUSE Leap 15.3:virtualbox-vnc-6.1.34-lp153.2.27.2.x86_64", "openSUSE Leap 15.3:virtualbox-websrv-6.1.34-lp153.2.27.2.x86_64", ], }, references: [ { category: "external", summary: "CVE-2017-15874", url: "https://www.suse.com/security/cve/CVE-2017-15874", }, { category: "external", summary: "SUSE Bug 1064978 for CVE-2017-15874", url: "https://bugzilla.suse.com/1064978", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Leap 15.3:busybox-1.34.1-4.9.1.aarch64", "openSUSE Leap 15.3:busybox-1.34.1-4.9.1.ppc64le", "openSUSE Leap 15.3:busybox-1.34.1-4.9.1.s390x", "openSUSE Leap 15.3:busybox-1.34.1-4.9.1.x86_64", "openSUSE Leap 15.3:busybox-static-1.34.1-4.9.1.aarch64", "openSUSE Leap 15.3:busybox-static-1.34.1-4.9.1.ppc64le", "openSUSE Leap 15.3:busybox-static-1.34.1-4.9.1.s390x", "openSUSE Leap 15.3:busybox-static-1.34.1-4.9.1.x86_64", "openSUSE Leap 15.3:python3-virtualbox-6.1.34-lp153.2.27.2.x86_64", "openSUSE Leap 15.3:virtualbox-6.1.34-lp153.2.27.2.x86_64", "openSUSE Leap 15.3:virtualbox-devel-6.1.34-lp153.2.27.2.x86_64", "openSUSE Leap 15.3:virtualbox-guest-desktop-icons-6.1.34-lp153.2.27.2.noarch", "openSUSE Leap 15.3:virtualbox-guest-source-6.1.34-lp153.2.27.2.noarch", "openSUSE Leap 15.3:virtualbox-guest-tools-6.1.34-lp153.2.27.2.x86_64", "openSUSE Leap 15.3:virtualbox-guest-x11-6.1.34-lp153.2.27.2.x86_64", "openSUSE Leap 15.3:virtualbox-host-source-6.1.34-lp153.2.27.2.noarch", "openSUSE Leap 15.3:virtualbox-kmp-default-6.1.34_k5.3.18_150300.59.63-lp153.2.27.1.x86_64", "openSUSE Leap 15.3:virtualbox-kmp-preempt-6.1.34_k5.3.18_150300.59.63-lp153.2.27.1.x86_64", "openSUSE Leap 15.3:virtualbox-qt-6.1.34-lp153.2.27.2.x86_64", "openSUSE Leap 15.3:virtualbox-vnc-6.1.34-lp153.2.27.2.x86_64", "openSUSE Leap 15.3:virtualbox-websrv-6.1.34-lp153.2.27.2.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 3.3, baseSeverity: "LOW", vectorString: "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L", version: "3.0", }, products: [ "openSUSE Leap 15.3:busybox-1.34.1-4.9.1.aarch64", "openSUSE Leap 15.3:busybox-1.34.1-4.9.1.ppc64le", "openSUSE Leap 15.3:busybox-1.34.1-4.9.1.s390x", "openSUSE Leap 15.3:busybox-1.34.1-4.9.1.x86_64", "openSUSE Leap 15.3:busybox-static-1.34.1-4.9.1.aarch64", "openSUSE Leap 15.3:busybox-static-1.34.1-4.9.1.ppc64le", "openSUSE Leap 15.3:busybox-static-1.34.1-4.9.1.s390x", "openSUSE Leap 15.3:busybox-static-1.34.1-4.9.1.x86_64", "openSUSE Leap 15.3:python3-virtualbox-6.1.34-lp153.2.27.2.x86_64", "openSUSE Leap 15.3:virtualbox-6.1.34-lp153.2.27.2.x86_64", "openSUSE Leap 15.3:virtualbox-devel-6.1.34-lp153.2.27.2.x86_64", "openSUSE Leap 15.3:virtualbox-guest-desktop-icons-6.1.34-lp153.2.27.2.noarch", "openSUSE Leap 15.3:virtualbox-guest-source-6.1.34-lp153.2.27.2.noarch", "openSUSE Leap 15.3:virtualbox-guest-tools-6.1.34-lp153.2.27.2.x86_64", "openSUSE Leap 15.3:virtualbox-guest-x11-6.1.34-lp153.2.27.2.x86_64", "openSUSE Leap 15.3:virtualbox-host-source-6.1.34-lp153.2.27.2.noarch", "openSUSE Leap 15.3:virtualbox-kmp-default-6.1.34_k5.3.18_150300.59.63-lp153.2.27.1.x86_64", "openSUSE Leap 15.3:virtualbox-kmp-preempt-6.1.34_k5.3.18_150300.59.63-lp153.2.27.1.x86_64", "openSUSE Leap 15.3:virtualbox-qt-6.1.34-lp153.2.27.2.x86_64", "openSUSE Leap 15.3:virtualbox-vnc-6.1.34-lp153.2.27.2.x86_64", "openSUSE Leap 15.3:virtualbox-websrv-6.1.34-lp153.2.27.2.x86_64", ], }, ], threats: [ { category: "impact", date: "2022-01-20T09:04:27Z", details: "low", }, ], title: "CVE-2017-15874", }, { cve: "CVE-2017-16544", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2017-16544", }, ], notes: [ { category: "general", text: "In the add_match function in libbb/lineedit.c in BusyBox through 1.27.2, the tab autocomplete feature of the shell, used to get a list of filenames in a directory, does not sanitize filenames and results in executing any escape sequence in the terminal. This could potentially result in code execution, arbitrary file writes, or other attacks.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Leap 15.3:busybox-1.34.1-4.9.1.aarch64", "openSUSE Leap 15.3:busybox-1.34.1-4.9.1.ppc64le", "openSUSE Leap 15.3:busybox-1.34.1-4.9.1.s390x", "openSUSE Leap 15.3:busybox-1.34.1-4.9.1.x86_64", "openSUSE Leap 15.3:busybox-static-1.34.1-4.9.1.aarch64", "openSUSE Leap 15.3:busybox-static-1.34.1-4.9.1.ppc64le", "openSUSE Leap 15.3:busybox-static-1.34.1-4.9.1.s390x", "openSUSE Leap 15.3:busybox-static-1.34.1-4.9.1.x86_64", "openSUSE Leap 15.3:python3-virtualbox-6.1.34-lp153.2.27.2.x86_64", "openSUSE Leap 15.3:virtualbox-6.1.34-lp153.2.27.2.x86_64", "openSUSE Leap 15.3:virtualbox-devel-6.1.34-lp153.2.27.2.x86_64", "openSUSE Leap 15.3:virtualbox-guest-desktop-icons-6.1.34-lp153.2.27.2.noarch", "openSUSE Leap 15.3:virtualbox-guest-source-6.1.34-lp153.2.27.2.noarch", "openSUSE Leap 15.3:virtualbox-guest-tools-6.1.34-lp153.2.27.2.x86_64", "openSUSE Leap 15.3:virtualbox-guest-x11-6.1.34-lp153.2.27.2.x86_64", "openSUSE Leap 15.3:virtualbox-host-source-6.1.34-lp153.2.27.2.noarch", "openSUSE Leap 15.3:virtualbox-kmp-default-6.1.34_k5.3.18_150300.59.63-lp153.2.27.1.x86_64", "openSUSE Leap 15.3:virtualbox-kmp-preempt-6.1.34_k5.3.18_150300.59.63-lp153.2.27.1.x86_64", "openSUSE Leap 15.3:virtualbox-qt-6.1.34-lp153.2.27.2.x86_64", "openSUSE Leap 15.3:virtualbox-vnc-6.1.34-lp153.2.27.2.x86_64", "openSUSE Leap 15.3:virtualbox-websrv-6.1.34-lp153.2.27.2.x86_64", ], }, references: [ { category: "external", summary: "CVE-2017-16544", url: "https://www.suse.com/security/cve/CVE-2017-16544", }, { category: "external", summary: "SUSE Bug 1069412 for CVE-2017-16544", url: "https://bugzilla.suse.com/1069412", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Leap 15.3:busybox-1.34.1-4.9.1.aarch64", "openSUSE Leap 15.3:busybox-1.34.1-4.9.1.ppc64le", "openSUSE Leap 15.3:busybox-1.34.1-4.9.1.s390x", "openSUSE Leap 15.3:busybox-1.34.1-4.9.1.x86_64", "openSUSE Leap 15.3:busybox-static-1.34.1-4.9.1.aarch64", "openSUSE Leap 15.3:busybox-static-1.34.1-4.9.1.ppc64le", "openSUSE Leap 15.3:busybox-static-1.34.1-4.9.1.s390x", "openSUSE Leap 15.3:busybox-static-1.34.1-4.9.1.x86_64", "openSUSE Leap 15.3:python3-virtualbox-6.1.34-lp153.2.27.2.x86_64", "openSUSE Leap 15.3:virtualbox-6.1.34-lp153.2.27.2.x86_64", "openSUSE Leap 15.3:virtualbox-devel-6.1.34-lp153.2.27.2.x86_64", "openSUSE Leap 15.3:virtualbox-guest-desktop-icons-6.1.34-lp153.2.27.2.noarch", "openSUSE Leap 15.3:virtualbox-guest-source-6.1.34-lp153.2.27.2.noarch", "openSUSE Leap 15.3:virtualbox-guest-tools-6.1.34-lp153.2.27.2.x86_64", "openSUSE Leap 15.3:virtualbox-guest-x11-6.1.34-lp153.2.27.2.x86_64", "openSUSE Leap 15.3:virtualbox-host-source-6.1.34-lp153.2.27.2.noarch", "openSUSE Leap 15.3:virtualbox-kmp-default-6.1.34_k5.3.18_150300.59.63-lp153.2.27.1.x86_64", "openSUSE Leap 15.3:virtualbox-kmp-preempt-6.1.34_k5.3.18_150300.59.63-lp153.2.27.1.x86_64", "openSUSE Leap 15.3:virtualbox-qt-6.1.34-lp153.2.27.2.x86_64", "openSUSE Leap 15.3:virtualbox-vnc-6.1.34-lp153.2.27.2.x86_64", "openSUSE Leap 15.3:virtualbox-websrv-6.1.34-lp153.2.27.2.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 7.8, baseSeverity: "HIGH", vectorString: "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", version: "3.0", }, products: [ "openSUSE Leap 15.3:busybox-1.34.1-4.9.1.aarch64", "openSUSE Leap 15.3:busybox-1.34.1-4.9.1.ppc64le", "openSUSE Leap 15.3:busybox-1.34.1-4.9.1.s390x", "openSUSE Leap 15.3:busybox-1.34.1-4.9.1.x86_64", "openSUSE Leap 15.3:busybox-static-1.34.1-4.9.1.aarch64", "openSUSE Leap 15.3:busybox-static-1.34.1-4.9.1.ppc64le", "openSUSE Leap 15.3:busybox-static-1.34.1-4.9.1.s390x", "openSUSE Leap 15.3:busybox-static-1.34.1-4.9.1.x86_64", "openSUSE Leap 15.3:python3-virtualbox-6.1.34-lp153.2.27.2.x86_64", "openSUSE Leap 15.3:virtualbox-6.1.34-lp153.2.27.2.x86_64", "openSUSE Leap 15.3:virtualbox-devel-6.1.34-lp153.2.27.2.x86_64", "openSUSE Leap 15.3:virtualbox-guest-desktop-icons-6.1.34-lp153.2.27.2.noarch", "openSUSE Leap 15.3:virtualbox-guest-source-6.1.34-lp153.2.27.2.noarch", "openSUSE Leap 15.3:virtualbox-guest-tools-6.1.34-lp153.2.27.2.x86_64", "openSUSE Leap 15.3:virtualbox-guest-x11-6.1.34-lp153.2.27.2.x86_64", "openSUSE Leap 15.3:virtualbox-host-source-6.1.34-lp153.2.27.2.noarch", "openSUSE Leap 15.3:virtualbox-kmp-default-6.1.34_k5.3.18_150300.59.63-lp153.2.27.1.x86_64", "openSUSE Leap 15.3:virtualbox-kmp-preempt-6.1.34_k5.3.18_150300.59.63-lp153.2.27.1.x86_64", "openSUSE Leap 15.3:virtualbox-qt-6.1.34-lp153.2.27.2.x86_64", "openSUSE Leap 15.3:virtualbox-vnc-6.1.34-lp153.2.27.2.x86_64", "openSUSE Leap 15.3:virtualbox-websrv-6.1.34-lp153.2.27.2.x86_64", ], }, ], threats: [ { category: "impact", date: "2022-01-20T09:04:27Z", details: "important", }, ], title: "CVE-2017-16544", }, { cve: "CVE-2018-1000500", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2018-1000500", }, ], notes: [ { category: "general", text: "Busybox contains a Missing SSL certificate validation vulnerability in The \"busybox wget\" applet that can result in arbitrary code execution. This attack appear to be exploitable via Simply download any file over HTTPS using \"busybox wget https://compromised-domain.com/important-file\".", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Leap 15.3:busybox-1.34.1-4.9.1.aarch64", "openSUSE Leap 15.3:busybox-1.34.1-4.9.1.ppc64le", "openSUSE Leap 15.3:busybox-1.34.1-4.9.1.s390x", "openSUSE Leap 15.3:busybox-1.34.1-4.9.1.x86_64", "openSUSE Leap 15.3:busybox-static-1.34.1-4.9.1.aarch64", "openSUSE Leap 15.3:busybox-static-1.34.1-4.9.1.ppc64le", "openSUSE Leap 15.3:busybox-static-1.34.1-4.9.1.s390x", "openSUSE Leap 15.3:busybox-static-1.34.1-4.9.1.x86_64", "openSUSE Leap 15.3:python3-virtualbox-6.1.34-lp153.2.27.2.x86_64", "openSUSE Leap 15.3:virtualbox-6.1.34-lp153.2.27.2.x86_64", "openSUSE Leap 15.3:virtualbox-devel-6.1.34-lp153.2.27.2.x86_64", "openSUSE Leap 15.3:virtualbox-guest-desktop-icons-6.1.34-lp153.2.27.2.noarch", "openSUSE Leap 15.3:virtualbox-guest-source-6.1.34-lp153.2.27.2.noarch", "openSUSE Leap 15.3:virtualbox-guest-tools-6.1.34-lp153.2.27.2.x86_64", "openSUSE Leap 15.3:virtualbox-guest-x11-6.1.34-lp153.2.27.2.x86_64", "openSUSE Leap 15.3:virtualbox-host-source-6.1.34-lp153.2.27.2.noarch", "openSUSE Leap 15.3:virtualbox-kmp-default-6.1.34_k5.3.18_150300.59.63-lp153.2.27.1.x86_64", "openSUSE Leap 15.3:virtualbox-kmp-preempt-6.1.34_k5.3.18_150300.59.63-lp153.2.27.1.x86_64", "openSUSE Leap 15.3:virtualbox-qt-6.1.34-lp153.2.27.2.x86_64", "openSUSE Leap 15.3:virtualbox-vnc-6.1.34-lp153.2.27.2.x86_64", "openSUSE Leap 15.3:virtualbox-websrv-6.1.34-lp153.2.27.2.x86_64", ], }, references: [ { category: "external", summary: "CVE-2018-1000500", url: "https://www.suse.com/security/cve/CVE-2018-1000500", }, { category: "external", summary: "SUSE Bug 1099263 for CVE-2018-1000500", url: "https://bugzilla.suse.com/1099263", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Leap 15.3:busybox-1.34.1-4.9.1.aarch64", "openSUSE Leap 15.3:busybox-1.34.1-4.9.1.ppc64le", "openSUSE Leap 15.3:busybox-1.34.1-4.9.1.s390x", "openSUSE Leap 15.3:busybox-1.34.1-4.9.1.x86_64", "openSUSE Leap 15.3:busybox-static-1.34.1-4.9.1.aarch64", "openSUSE Leap 15.3:busybox-static-1.34.1-4.9.1.ppc64le", "openSUSE Leap 15.3:busybox-static-1.34.1-4.9.1.s390x", "openSUSE Leap 15.3:busybox-static-1.34.1-4.9.1.x86_64", "openSUSE Leap 15.3:python3-virtualbox-6.1.34-lp153.2.27.2.x86_64", "openSUSE Leap 15.3:virtualbox-6.1.34-lp153.2.27.2.x86_64", "openSUSE Leap 15.3:virtualbox-devel-6.1.34-lp153.2.27.2.x86_64", "openSUSE Leap 15.3:virtualbox-guest-desktop-icons-6.1.34-lp153.2.27.2.noarch", "openSUSE Leap 15.3:virtualbox-guest-source-6.1.34-lp153.2.27.2.noarch", "openSUSE Leap 15.3:virtualbox-guest-tools-6.1.34-lp153.2.27.2.x86_64", "openSUSE Leap 15.3:virtualbox-guest-x11-6.1.34-lp153.2.27.2.x86_64", "openSUSE Leap 15.3:virtualbox-host-source-6.1.34-lp153.2.27.2.noarch", "openSUSE Leap 15.3:virtualbox-kmp-default-6.1.34_k5.3.18_150300.59.63-lp153.2.27.1.x86_64", "openSUSE Leap 15.3:virtualbox-kmp-preempt-6.1.34_k5.3.18_150300.59.63-lp153.2.27.1.x86_64", "openSUSE Leap 15.3:virtualbox-qt-6.1.34-lp153.2.27.2.x86_64", "openSUSE Leap 15.3:virtualbox-vnc-6.1.34-lp153.2.27.2.x86_64", "openSUSE Leap 15.3:virtualbox-websrv-6.1.34-lp153.2.27.2.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 7.5, baseSeverity: "HIGH", vectorString: "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N", version: "3.0", }, products: [ "openSUSE Leap 15.3:busybox-1.34.1-4.9.1.aarch64", "openSUSE Leap 15.3:busybox-1.34.1-4.9.1.ppc64le", "openSUSE Leap 15.3:busybox-1.34.1-4.9.1.s390x", "openSUSE Leap 15.3:busybox-1.34.1-4.9.1.x86_64", "openSUSE Leap 15.3:busybox-static-1.34.1-4.9.1.aarch64", "openSUSE Leap 15.3:busybox-static-1.34.1-4.9.1.ppc64le", "openSUSE Leap 15.3:busybox-static-1.34.1-4.9.1.s390x", "openSUSE Leap 15.3:busybox-static-1.34.1-4.9.1.x86_64", "openSUSE Leap 15.3:python3-virtualbox-6.1.34-lp153.2.27.2.x86_64", "openSUSE Leap 15.3:virtualbox-6.1.34-lp153.2.27.2.x86_64", "openSUSE Leap 15.3:virtualbox-devel-6.1.34-lp153.2.27.2.x86_64", "openSUSE Leap 15.3:virtualbox-guest-desktop-icons-6.1.34-lp153.2.27.2.noarch", "openSUSE Leap 15.3:virtualbox-guest-source-6.1.34-lp153.2.27.2.noarch", "openSUSE Leap 15.3:virtualbox-guest-tools-6.1.34-lp153.2.27.2.x86_64", "openSUSE Leap 15.3:virtualbox-guest-x11-6.1.34-lp153.2.27.2.x86_64", "openSUSE Leap 15.3:virtualbox-host-source-6.1.34-lp153.2.27.2.noarch", "openSUSE Leap 15.3:virtualbox-kmp-default-6.1.34_k5.3.18_150300.59.63-lp153.2.27.1.x86_64", "openSUSE Leap 15.3:virtualbox-kmp-preempt-6.1.34_k5.3.18_150300.59.63-lp153.2.27.1.x86_64", "openSUSE Leap 15.3:virtualbox-qt-6.1.34-lp153.2.27.2.x86_64", "openSUSE Leap 15.3:virtualbox-vnc-6.1.34-lp153.2.27.2.x86_64", "openSUSE Leap 15.3:virtualbox-websrv-6.1.34-lp153.2.27.2.x86_64", ], }, ], threats: [ { category: "impact", date: "2022-01-20T09:04:27Z", details: "important", }, ], title: "CVE-2018-1000500", }, { cve: "CVE-2018-1000517", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2018-1000517", }, ], notes: [ { category: "general", text: "BusyBox project BusyBox wget version prior to commit 8e2174e9bd836e53c8b9c6e00d1bc6e2a718686e contains a Buffer Overflow vulnerability in Busybox wget that can result in heap buffer overflow. This attack appear to be exploitable via network connectivity. This vulnerability appears to have been fixed in after commit 8e2174e9bd836e53c8b9c6e00d1bc6e2a718686e.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Leap 15.3:busybox-1.34.1-4.9.1.aarch64", "openSUSE Leap 15.3:busybox-1.34.1-4.9.1.ppc64le", "openSUSE Leap 15.3:busybox-1.34.1-4.9.1.s390x", "openSUSE Leap 15.3:busybox-1.34.1-4.9.1.x86_64", "openSUSE Leap 15.3:busybox-static-1.34.1-4.9.1.aarch64", "openSUSE Leap 15.3:busybox-static-1.34.1-4.9.1.ppc64le", "openSUSE Leap 15.3:busybox-static-1.34.1-4.9.1.s390x", "openSUSE Leap 15.3:busybox-static-1.34.1-4.9.1.x86_64", "openSUSE Leap 15.3:python3-virtualbox-6.1.34-lp153.2.27.2.x86_64", "openSUSE Leap 15.3:virtualbox-6.1.34-lp153.2.27.2.x86_64", "openSUSE Leap 15.3:virtualbox-devel-6.1.34-lp153.2.27.2.x86_64", "openSUSE Leap 15.3:virtualbox-guest-desktop-icons-6.1.34-lp153.2.27.2.noarch", "openSUSE Leap 15.3:virtualbox-guest-source-6.1.34-lp153.2.27.2.noarch", "openSUSE Leap 15.3:virtualbox-guest-tools-6.1.34-lp153.2.27.2.x86_64", "openSUSE Leap 15.3:virtualbox-guest-x11-6.1.34-lp153.2.27.2.x86_64", "openSUSE Leap 15.3:virtualbox-host-source-6.1.34-lp153.2.27.2.noarch", "openSUSE Leap 15.3:virtualbox-kmp-default-6.1.34_k5.3.18_150300.59.63-lp153.2.27.1.x86_64", "openSUSE Leap 15.3:virtualbox-kmp-preempt-6.1.34_k5.3.18_150300.59.63-lp153.2.27.1.x86_64", "openSUSE Leap 15.3:virtualbox-qt-6.1.34-lp153.2.27.2.x86_64", "openSUSE Leap 15.3:virtualbox-vnc-6.1.34-lp153.2.27.2.x86_64", "openSUSE Leap 15.3:virtualbox-websrv-6.1.34-lp153.2.27.2.x86_64", ], }, references: [ { category: "external", summary: "CVE-2018-1000517", url: "https://www.suse.com/security/cve/CVE-2018-1000517", }, { category: "external", summary: "SUSE Bug 1099260 for CVE-2018-1000517", url: "https://bugzilla.suse.com/1099260", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Leap 15.3:busybox-1.34.1-4.9.1.aarch64", "openSUSE Leap 15.3:busybox-1.34.1-4.9.1.ppc64le", "openSUSE Leap 15.3:busybox-1.34.1-4.9.1.s390x", "openSUSE Leap 15.3:busybox-1.34.1-4.9.1.x86_64", "openSUSE Leap 15.3:busybox-static-1.34.1-4.9.1.aarch64", "openSUSE Leap 15.3:busybox-static-1.34.1-4.9.1.ppc64le", "openSUSE Leap 15.3:busybox-static-1.34.1-4.9.1.s390x", "openSUSE Leap 15.3:busybox-static-1.34.1-4.9.1.x86_64", "openSUSE Leap 15.3:python3-virtualbox-6.1.34-lp153.2.27.2.x86_64", "openSUSE Leap 15.3:virtualbox-6.1.34-lp153.2.27.2.x86_64", "openSUSE Leap 15.3:virtualbox-devel-6.1.34-lp153.2.27.2.x86_64", "openSUSE Leap 15.3:virtualbox-guest-desktop-icons-6.1.34-lp153.2.27.2.noarch", "openSUSE Leap 15.3:virtualbox-guest-source-6.1.34-lp153.2.27.2.noarch", "openSUSE Leap 15.3:virtualbox-guest-tools-6.1.34-lp153.2.27.2.x86_64", "openSUSE Leap 15.3:virtualbox-guest-x11-6.1.34-lp153.2.27.2.x86_64", "openSUSE Leap 15.3:virtualbox-host-source-6.1.34-lp153.2.27.2.noarch", "openSUSE Leap 15.3:virtualbox-kmp-default-6.1.34_k5.3.18_150300.59.63-lp153.2.27.1.x86_64", "openSUSE Leap 15.3:virtualbox-kmp-preempt-6.1.34_k5.3.18_150300.59.63-lp153.2.27.1.x86_64", "openSUSE Leap 15.3:virtualbox-qt-6.1.34-lp153.2.27.2.x86_64", "openSUSE Leap 15.3:virtualbox-vnc-6.1.34-lp153.2.27.2.x86_64", "openSUSE Leap 15.3:virtualbox-websrv-6.1.34-lp153.2.27.2.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.6, baseSeverity: "MEDIUM", vectorString: "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L", version: "3.0", }, products: [ "openSUSE Leap 15.3:busybox-1.34.1-4.9.1.aarch64", "openSUSE Leap 15.3:busybox-1.34.1-4.9.1.ppc64le", "openSUSE Leap 15.3:busybox-1.34.1-4.9.1.s390x", "openSUSE Leap 15.3:busybox-1.34.1-4.9.1.x86_64", "openSUSE Leap 15.3:busybox-static-1.34.1-4.9.1.aarch64", "openSUSE Leap 15.3:busybox-static-1.34.1-4.9.1.ppc64le", "openSUSE Leap 15.3:busybox-static-1.34.1-4.9.1.s390x", "openSUSE Leap 15.3:busybox-static-1.34.1-4.9.1.x86_64", "openSUSE Leap 15.3:python3-virtualbox-6.1.34-lp153.2.27.2.x86_64", "openSUSE Leap 15.3:virtualbox-6.1.34-lp153.2.27.2.x86_64", "openSUSE Leap 15.3:virtualbox-devel-6.1.34-lp153.2.27.2.x86_64", "openSUSE Leap 15.3:virtualbox-guest-desktop-icons-6.1.34-lp153.2.27.2.noarch", "openSUSE Leap 15.3:virtualbox-guest-source-6.1.34-lp153.2.27.2.noarch", "openSUSE Leap 15.3:virtualbox-guest-tools-6.1.34-lp153.2.27.2.x86_64", "openSUSE Leap 15.3:virtualbox-guest-x11-6.1.34-lp153.2.27.2.x86_64", "openSUSE Leap 15.3:virtualbox-host-source-6.1.34-lp153.2.27.2.noarch", "openSUSE Leap 15.3:virtualbox-kmp-default-6.1.34_k5.3.18_150300.59.63-lp153.2.27.1.x86_64", "openSUSE Leap 15.3:virtualbox-kmp-preempt-6.1.34_k5.3.18_150300.59.63-lp153.2.27.1.x86_64", "openSUSE Leap 15.3:virtualbox-qt-6.1.34-lp153.2.27.2.x86_64", "openSUSE Leap 15.3:virtualbox-vnc-6.1.34-lp153.2.27.2.x86_64", "openSUSE Leap 15.3:virtualbox-websrv-6.1.34-lp153.2.27.2.x86_64", ], }, ], threats: [ { category: "impact", date: "2022-01-20T09:04:27Z", details: "important", }, ], title: "CVE-2018-1000517", }, { cve: "CVE-2018-20679", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2018-20679", }, ], notes: [ { category: "general", text: "An issue was discovered in BusyBox before 1.30.0. An out of bounds read in udhcp components (consumed by the DHCP server, client, and relay) allows a remote attacker to leak sensitive information from the stack by sending a crafted DHCP message. This is related to verification in udhcp_get_option() in networking/udhcp/common.c that 4-byte options are indeed 4 bytes.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Leap 15.3:busybox-1.34.1-4.9.1.aarch64", "openSUSE Leap 15.3:busybox-1.34.1-4.9.1.ppc64le", "openSUSE Leap 15.3:busybox-1.34.1-4.9.1.s390x", "openSUSE Leap 15.3:busybox-1.34.1-4.9.1.x86_64", "openSUSE Leap 15.3:busybox-static-1.34.1-4.9.1.aarch64", "openSUSE Leap 15.3:busybox-static-1.34.1-4.9.1.ppc64le", "openSUSE Leap 15.3:busybox-static-1.34.1-4.9.1.s390x", "openSUSE Leap 15.3:busybox-static-1.34.1-4.9.1.x86_64", "openSUSE Leap 15.3:python3-virtualbox-6.1.34-lp153.2.27.2.x86_64", "openSUSE Leap 15.3:virtualbox-6.1.34-lp153.2.27.2.x86_64", "openSUSE Leap 15.3:virtualbox-devel-6.1.34-lp153.2.27.2.x86_64", "openSUSE Leap 15.3:virtualbox-guest-desktop-icons-6.1.34-lp153.2.27.2.noarch", "openSUSE Leap 15.3:virtualbox-guest-source-6.1.34-lp153.2.27.2.noarch", "openSUSE Leap 15.3:virtualbox-guest-tools-6.1.34-lp153.2.27.2.x86_64", "openSUSE Leap 15.3:virtualbox-guest-x11-6.1.34-lp153.2.27.2.x86_64", "openSUSE Leap 15.3:virtualbox-host-source-6.1.34-lp153.2.27.2.noarch", "openSUSE Leap 15.3:virtualbox-kmp-default-6.1.34_k5.3.18_150300.59.63-lp153.2.27.1.x86_64", "openSUSE Leap 15.3:virtualbox-kmp-preempt-6.1.34_k5.3.18_150300.59.63-lp153.2.27.1.x86_64", "openSUSE Leap 15.3:virtualbox-qt-6.1.34-lp153.2.27.2.x86_64", "openSUSE Leap 15.3:virtualbox-vnc-6.1.34-lp153.2.27.2.x86_64", "openSUSE Leap 15.3:virtualbox-websrv-6.1.34-lp153.2.27.2.x86_64", ], }, references: [ { category: "external", summary: "CVE-2018-20679", url: "https://www.suse.com/security/cve/CVE-2018-20679", }, { category: "external", summary: "SUSE Bug 1121426 for CVE-2018-20679", url: "https://bugzilla.suse.com/1121426", }, { category: "external", summary: "SUSE Bug 1121428 for CVE-2018-20679", url: "https://bugzilla.suse.com/1121428", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Leap 15.3:busybox-1.34.1-4.9.1.aarch64", "openSUSE Leap 15.3:busybox-1.34.1-4.9.1.ppc64le", "openSUSE Leap 15.3:busybox-1.34.1-4.9.1.s390x", "openSUSE Leap 15.3:busybox-1.34.1-4.9.1.x86_64", "openSUSE Leap 15.3:busybox-static-1.34.1-4.9.1.aarch64", "openSUSE Leap 15.3:busybox-static-1.34.1-4.9.1.ppc64le", "openSUSE Leap 15.3:busybox-static-1.34.1-4.9.1.s390x", "openSUSE Leap 15.3:busybox-static-1.34.1-4.9.1.x86_64", "openSUSE Leap 15.3:python3-virtualbox-6.1.34-lp153.2.27.2.x86_64", "openSUSE Leap 15.3:virtualbox-6.1.34-lp153.2.27.2.x86_64", "openSUSE Leap 15.3:virtualbox-devel-6.1.34-lp153.2.27.2.x86_64", "openSUSE Leap 15.3:virtualbox-guest-desktop-icons-6.1.34-lp153.2.27.2.noarch", "openSUSE Leap 15.3:virtualbox-guest-source-6.1.34-lp153.2.27.2.noarch", "openSUSE Leap 15.3:virtualbox-guest-tools-6.1.34-lp153.2.27.2.x86_64", "openSUSE Leap 15.3:virtualbox-guest-x11-6.1.34-lp153.2.27.2.x86_64", "openSUSE Leap 15.3:virtualbox-host-source-6.1.34-lp153.2.27.2.noarch", "openSUSE Leap 15.3:virtualbox-kmp-default-6.1.34_k5.3.18_150300.59.63-lp153.2.27.1.x86_64", "openSUSE Leap 15.3:virtualbox-kmp-preempt-6.1.34_k5.3.18_150300.59.63-lp153.2.27.1.x86_64", "openSUSE Leap 15.3:virtualbox-qt-6.1.34-lp153.2.27.2.x86_64", "openSUSE Leap 15.3:virtualbox-vnc-6.1.34-lp153.2.27.2.x86_64", "openSUSE Leap 15.3:virtualbox-websrv-6.1.34-lp153.2.27.2.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.3, baseSeverity: "MEDIUM", vectorString: "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N", version: "3.0", }, products: [ "openSUSE Leap 15.3:busybox-1.34.1-4.9.1.aarch64", "openSUSE Leap 15.3:busybox-1.34.1-4.9.1.ppc64le", "openSUSE Leap 15.3:busybox-1.34.1-4.9.1.s390x", "openSUSE Leap 15.3:busybox-1.34.1-4.9.1.x86_64", "openSUSE Leap 15.3:busybox-static-1.34.1-4.9.1.aarch64", "openSUSE Leap 15.3:busybox-static-1.34.1-4.9.1.ppc64le", "openSUSE Leap 15.3:busybox-static-1.34.1-4.9.1.s390x", "openSUSE Leap 15.3:busybox-static-1.34.1-4.9.1.x86_64", "openSUSE Leap 15.3:python3-virtualbox-6.1.34-lp153.2.27.2.x86_64", "openSUSE Leap 15.3:virtualbox-6.1.34-lp153.2.27.2.x86_64", "openSUSE Leap 15.3:virtualbox-devel-6.1.34-lp153.2.27.2.x86_64", "openSUSE Leap 15.3:virtualbox-guest-desktop-icons-6.1.34-lp153.2.27.2.noarch", "openSUSE Leap 15.3:virtualbox-guest-source-6.1.34-lp153.2.27.2.noarch", "openSUSE Leap 15.3:virtualbox-guest-tools-6.1.34-lp153.2.27.2.x86_64", "openSUSE Leap 15.3:virtualbox-guest-x11-6.1.34-lp153.2.27.2.x86_64", "openSUSE Leap 15.3:virtualbox-host-source-6.1.34-lp153.2.27.2.noarch", "openSUSE Leap 15.3:virtualbox-kmp-default-6.1.34_k5.3.18_150300.59.63-lp153.2.27.1.x86_64", "openSUSE Leap 15.3:virtualbox-kmp-preempt-6.1.34_k5.3.18_150300.59.63-lp153.2.27.1.x86_64", "openSUSE Leap 15.3:virtualbox-qt-6.1.34-lp153.2.27.2.x86_64", "openSUSE Leap 15.3:virtualbox-vnc-6.1.34-lp153.2.27.2.x86_64", "openSUSE Leap 15.3:virtualbox-websrv-6.1.34-lp153.2.27.2.x86_64", ], }, ], threats: [ { category: "impact", date: "2022-01-20T09:04:27Z", details: "moderate", }, ], title: "CVE-2018-20679", }, { cve: "CVE-2019-5747", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2019-5747", }, ], notes: [ { category: "general", text: "An issue was discovered in BusyBox through 1.30.0. An out of bounds read in udhcp components (consumed by the DHCP client, server, and/or relay) might allow a remote attacker to leak sensitive information from the stack by sending a crafted DHCP message. This is related to assurance of a 4-byte length when decoding DHCP_SUBNET. NOTE: this issue exists because of an incomplete fix for CVE-2018-20679.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Leap 15.3:busybox-1.34.1-4.9.1.aarch64", "openSUSE Leap 15.3:busybox-1.34.1-4.9.1.ppc64le", "openSUSE Leap 15.3:busybox-1.34.1-4.9.1.s390x", "openSUSE Leap 15.3:busybox-1.34.1-4.9.1.x86_64", "openSUSE Leap 15.3:busybox-static-1.34.1-4.9.1.aarch64", "openSUSE Leap 15.3:busybox-static-1.34.1-4.9.1.ppc64le", "openSUSE Leap 15.3:busybox-static-1.34.1-4.9.1.s390x", "openSUSE Leap 15.3:busybox-static-1.34.1-4.9.1.x86_64", "openSUSE Leap 15.3:python3-virtualbox-6.1.34-lp153.2.27.2.x86_64", "openSUSE Leap 15.3:virtualbox-6.1.34-lp153.2.27.2.x86_64", "openSUSE Leap 15.3:virtualbox-devel-6.1.34-lp153.2.27.2.x86_64", "openSUSE Leap 15.3:virtualbox-guest-desktop-icons-6.1.34-lp153.2.27.2.noarch", "openSUSE Leap 15.3:virtualbox-guest-source-6.1.34-lp153.2.27.2.noarch", "openSUSE Leap 15.3:virtualbox-guest-tools-6.1.34-lp153.2.27.2.x86_64", "openSUSE Leap 15.3:virtualbox-guest-x11-6.1.34-lp153.2.27.2.x86_64", "openSUSE Leap 15.3:virtualbox-host-source-6.1.34-lp153.2.27.2.noarch", "openSUSE Leap 15.3:virtualbox-kmp-default-6.1.34_k5.3.18_150300.59.63-lp153.2.27.1.x86_64", "openSUSE Leap 15.3:virtualbox-kmp-preempt-6.1.34_k5.3.18_150300.59.63-lp153.2.27.1.x86_64", "openSUSE Leap 15.3:virtualbox-qt-6.1.34-lp153.2.27.2.x86_64", "openSUSE Leap 15.3:virtualbox-vnc-6.1.34-lp153.2.27.2.x86_64", "openSUSE Leap 15.3:virtualbox-websrv-6.1.34-lp153.2.27.2.x86_64", ], }, references: [ { category: "external", summary: "CVE-2019-5747", url: "https://www.suse.com/security/cve/CVE-2019-5747", }, { category: "external", summary: "SUSE Bug 1121426 for CVE-2019-5747", url: "https://bugzilla.suse.com/1121426", }, { category: "external", summary: "SUSE Bug 1121428 for CVE-2019-5747", url: "https://bugzilla.suse.com/1121428", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Leap 15.3:busybox-1.34.1-4.9.1.aarch64", "openSUSE Leap 15.3:busybox-1.34.1-4.9.1.ppc64le", "openSUSE Leap 15.3:busybox-1.34.1-4.9.1.s390x", "openSUSE Leap 15.3:busybox-1.34.1-4.9.1.x86_64", "openSUSE Leap 15.3:busybox-static-1.34.1-4.9.1.aarch64", "openSUSE Leap 15.3:busybox-static-1.34.1-4.9.1.ppc64le", "openSUSE Leap 15.3:busybox-static-1.34.1-4.9.1.s390x", "openSUSE Leap 15.3:busybox-static-1.34.1-4.9.1.x86_64", "openSUSE Leap 15.3:python3-virtualbox-6.1.34-lp153.2.27.2.x86_64", "openSUSE Leap 15.3:virtualbox-6.1.34-lp153.2.27.2.x86_64", "openSUSE Leap 15.3:virtualbox-devel-6.1.34-lp153.2.27.2.x86_64", "openSUSE Leap 15.3:virtualbox-guest-desktop-icons-6.1.34-lp153.2.27.2.noarch", "openSUSE Leap 15.3:virtualbox-guest-source-6.1.34-lp153.2.27.2.noarch", "openSUSE Leap 15.3:virtualbox-guest-tools-6.1.34-lp153.2.27.2.x86_64", "openSUSE Leap 15.3:virtualbox-guest-x11-6.1.34-lp153.2.27.2.x86_64", "openSUSE Leap 15.3:virtualbox-host-source-6.1.34-lp153.2.27.2.noarch", "openSUSE Leap 15.3:virtualbox-kmp-default-6.1.34_k5.3.18_150300.59.63-lp153.2.27.1.x86_64", "openSUSE Leap 15.3:virtualbox-kmp-preempt-6.1.34_k5.3.18_150300.59.63-lp153.2.27.1.x86_64", "openSUSE Leap 15.3:virtualbox-qt-6.1.34-lp153.2.27.2.x86_64", "openSUSE Leap 15.3:virtualbox-vnc-6.1.34-lp153.2.27.2.x86_64", "openSUSE Leap 15.3:virtualbox-websrv-6.1.34-lp153.2.27.2.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 3.5, baseSeverity: "LOW", vectorString: "CVSS:3.1/AV:A/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N", version: "3.1", }, products: [ "openSUSE Leap 15.3:busybox-1.34.1-4.9.1.aarch64", "openSUSE Leap 15.3:busybox-1.34.1-4.9.1.ppc64le", "openSUSE Leap 15.3:busybox-1.34.1-4.9.1.s390x", "openSUSE Leap 15.3:busybox-1.34.1-4.9.1.x86_64", "openSUSE Leap 15.3:busybox-static-1.34.1-4.9.1.aarch64", "openSUSE Leap 15.3:busybox-static-1.34.1-4.9.1.ppc64le", "openSUSE Leap 15.3:busybox-static-1.34.1-4.9.1.s390x", "openSUSE Leap 15.3:busybox-static-1.34.1-4.9.1.x86_64", "openSUSE Leap 15.3:python3-virtualbox-6.1.34-lp153.2.27.2.x86_64", "openSUSE Leap 15.3:virtualbox-6.1.34-lp153.2.27.2.x86_64", "openSUSE Leap 15.3:virtualbox-devel-6.1.34-lp153.2.27.2.x86_64", "openSUSE Leap 15.3:virtualbox-guest-desktop-icons-6.1.34-lp153.2.27.2.noarch", "openSUSE Leap 15.3:virtualbox-guest-source-6.1.34-lp153.2.27.2.noarch", "openSUSE Leap 15.3:virtualbox-guest-tools-6.1.34-lp153.2.27.2.x86_64", "openSUSE Leap 15.3:virtualbox-guest-x11-6.1.34-lp153.2.27.2.x86_64", "openSUSE Leap 15.3:virtualbox-host-source-6.1.34-lp153.2.27.2.noarch", "openSUSE Leap 15.3:virtualbox-kmp-default-6.1.34_k5.3.18_150300.59.63-lp153.2.27.1.x86_64", "openSUSE Leap 15.3:virtualbox-kmp-preempt-6.1.34_k5.3.18_150300.59.63-lp153.2.27.1.x86_64", "openSUSE Leap 15.3:virtualbox-qt-6.1.34-lp153.2.27.2.x86_64", "openSUSE Leap 15.3:virtualbox-vnc-6.1.34-lp153.2.27.2.x86_64", "openSUSE Leap 15.3:virtualbox-websrv-6.1.34-lp153.2.27.2.x86_64", ], }, ], threats: [ { category: "impact", date: "2022-01-20T09:04:27Z", details: "low", }, ], title: "CVE-2019-5747", }, { cve: "CVE-2021-28831", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2021-28831", }, ], notes: [ { category: "general", text: "decompress_gunzip.c in BusyBox through 1.32.1 mishandles the error bit on the huft_build result pointer, with a resultant invalid free or segmentation fault, via malformed gzip data.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Leap 15.3:busybox-1.34.1-4.9.1.aarch64", "openSUSE Leap 15.3:busybox-1.34.1-4.9.1.ppc64le", "openSUSE Leap 15.3:busybox-1.34.1-4.9.1.s390x", "openSUSE Leap 15.3:busybox-1.34.1-4.9.1.x86_64", "openSUSE Leap 15.3:busybox-static-1.34.1-4.9.1.aarch64", "openSUSE Leap 15.3:busybox-static-1.34.1-4.9.1.ppc64le", "openSUSE Leap 15.3:busybox-static-1.34.1-4.9.1.s390x", "openSUSE Leap 15.3:busybox-static-1.34.1-4.9.1.x86_64", "openSUSE Leap 15.3:python3-virtualbox-6.1.34-lp153.2.27.2.x86_64", "openSUSE Leap 15.3:virtualbox-6.1.34-lp153.2.27.2.x86_64", "openSUSE Leap 15.3:virtualbox-devel-6.1.34-lp153.2.27.2.x86_64", "openSUSE Leap 15.3:virtualbox-guest-desktop-icons-6.1.34-lp153.2.27.2.noarch", "openSUSE Leap 15.3:virtualbox-guest-source-6.1.34-lp153.2.27.2.noarch", "openSUSE Leap 15.3:virtualbox-guest-tools-6.1.34-lp153.2.27.2.x86_64", "openSUSE Leap 15.3:virtualbox-guest-x11-6.1.34-lp153.2.27.2.x86_64", "openSUSE Leap 15.3:virtualbox-host-source-6.1.34-lp153.2.27.2.noarch", "openSUSE Leap 15.3:virtualbox-kmp-default-6.1.34_k5.3.18_150300.59.63-lp153.2.27.1.x86_64", "openSUSE Leap 15.3:virtualbox-kmp-preempt-6.1.34_k5.3.18_150300.59.63-lp153.2.27.1.x86_64", "openSUSE Leap 15.3:virtualbox-qt-6.1.34-lp153.2.27.2.x86_64", "openSUSE Leap 15.3:virtualbox-vnc-6.1.34-lp153.2.27.2.x86_64", "openSUSE Leap 15.3:virtualbox-websrv-6.1.34-lp153.2.27.2.x86_64", ], }, references: [ { category: "external", summary: "CVE-2021-28831", url: "https://www.suse.com/security/cve/CVE-2021-28831", }, { category: "external", summary: "SUSE Bug 1184522 for CVE-2021-28831", url: "https://bugzilla.suse.com/1184522", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Leap 15.3:busybox-1.34.1-4.9.1.aarch64", "openSUSE Leap 15.3:busybox-1.34.1-4.9.1.ppc64le", "openSUSE Leap 15.3:busybox-1.34.1-4.9.1.s390x", "openSUSE Leap 15.3:busybox-1.34.1-4.9.1.x86_64", "openSUSE Leap 15.3:busybox-static-1.34.1-4.9.1.aarch64", "openSUSE Leap 15.3:busybox-static-1.34.1-4.9.1.ppc64le", "openSUSE Leap 15.3:busybox-static-1.34.1-4.9.1.s390x", "openSUSE Leap 15.3:busybox-static-1.34.1-4.9.1.x86_64", "openSUSE Leap 15.3:python3-virtualbox-6.1.34-lp153.2.27.2.x86_64", "openSUSE Leap 15.3:virtualbox-6.1.34-lp153.2.27.2.x86_64", "openSUSE Leap 15.3:virtualbox-devel-6.1.34-lp153.2.27.2.x86_64", "openSUSE Leap 15.3:virtualbox-guest-desktop-icons-6.1.34-lp153.2.27.2.noarch", "openSUSE Leap 15.3:virtualbox-guest-source-6.1.34-lp153.2.27.2.noarch", "openSUSE Leap 15.3:virtualbox-guest-tools-6.1.34-lp153.2.27.2.x86_64", "openSUSE Leap 15.3:virtualbox-guest-x11-6.1.34-lp153.2.27.2.x86_64", "openSUSE Leap 15.3:virtualbox-host-source-6.1.34-lp153.2.27.2.noarch", "openSUSE Leap 15.3:virtualbox-kmp-default-6.1.34_k5.3.18_150300.59.63-lp153.2.27.1.x86_64", "openSUSE Leap 15.3:virtualbox-kmp-preempt-6.1.34_k5.3.18_150300.59.63-lp153.2.27.1.x86_64", "openSUSE Leap 15.3:virtualbox-qt-6.1.34-lp153.2.27.2.x86_64", "openSUSE Leap 15.3:virtualbox-vnc-6.1.34-lp153.2.27.2.x86_64", "openSUSE Leap 15.3:virtualbox-websrv-6.1.34-lp153.2.27.2.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 7.5, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "openSUSE Leap 15.3:busybox-1.34.1-4.9.1.aarch64", "openSUSE Leap 15.3:busybox-1.34.1-4.9.1.ppc64le", "openSUSE Leap 15.3:busybox-1.34.1-4.9.1.s390x", "openSUSE Leap 15.3:busybox-1.34.1-4.9.1.x86_64", "openSUSE Leap 15.3:busybox-static-1.34.1-4.9.1.aarch64", "openSUSE Leap 15.3:busybox-static-1.34.1-4.9.1.ppc64le", "openSUSE Leap 15.3:busybox-static-1.34.1-4.9.1.s390x", "openSUSE Leap 15.3:busybox-static-1.34.1-4.9.1.x86_64", "openSUSE Leap 15.3:python3-virtualbox-6.1.34-lp153.2.27.2.x86_64", "openSUSE Leap 15.3:virtualbox-6.1.34-lp153.2.27.2.x86_64", "openSUSE Leap 15.3:virtualbox-devel-6.1.34-lp153.2.27.2.x86_64", "openSUSE Leap 15.3:virtualbox-guest-desktop-icons-6.1.34-lp153.2.27.2.noarch", "openSUSE Leap 15.3:virtualbox-guest-source-6.1.34-lp153.2.27.2.noarch", "openSUSE Leap 15.3:virtualbox-guest-tools-6.1.34-lp153.2.27.2.x86_64", "openSUSE Leap 15.3:virtualbox-guest-x11-6.1.34-lp153.2.27.2.x86_64", "openSUSE Leap 15.3:virtualbox-host-source-6.1.34-lp153.2.27.2.noarch", "openSUSE Leap 15.3:virtualbox-kmp-default-6.1.34_k5.3.18_150300.59.63-lp153.2.27.1.x86_64", "openSUSE Leap 15.3:virtualbox-kmp-preempt-6.1.34_k5.3.18_150300.59.63-lp153.2.27.1.x86_64", "openSUSE Leap 15.3:virtualbox-qt-6.1.34-lp153.2.27.2.x86_64", "openSUSE Leap 15.3:virtualbox-vnc-6.1.34-lp153.2.27.2.x86_64", "openSUSE Leap 15.3:virtualbox-websrv-6.1.34-lp153.2.27.2.x86_64", ], }, ], threats: [ { category: "impact", date: "2022-01-20T09:04:27Z", details: "important", }, ], title: "CVE-2021-28831", }, { cve: "CVE-2021-42373", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2021-42373", }, ], notes: [ { category: "general", text: "A NULL pointer dereference in Busybox's man applet leads to denial of service when a section name is supplied but no page argument is given", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Leap 15.3:busybox-1.34.1-4.9.1.aarch64", "openSUSE Leap 15.3:busybox-1.34.1-4.9.1.ppc64le", "openSUSE Leap 15.3:busybox-1.34.1-4.9.1.s390x", "openSUSE Leap 15.3:busybox-1.34.1-4.9.1.x86_64", "openSUSE Leap 15.3:busybox-static-1.34.1-4.9.1.aarch64", "openSUSE Leap 15.3:busybox-static-1.34.1-4.9.1.ppc64le", "openSUSE Leap 15.3:busybox-static-1.34.1-4.9.1.s390x", "openSUSE Leap 15.3:busybox-static-1.34.1-4.9.1.x86_64", "openSUSE Leap 15.3:python3-virtualbox-6.1.34-lp153.2.27.2.x86_64", "openSUSE Leap 15.3:virtualbox-6.1.34-lp153.2.27.2.x86_64", "openSUSE Leap 15.3:virtualbox-devel-6.1.34-lp153.2.27.2.x86_64", "openSUSE Leap 15.3:virtualbox-guest-desktop-icons-6.1.34-lp153.2.27.2.noarch", "openSUSE Leap 15.3:virtualbox-guest-source-6.1.34-lp153.2.27.2.noarch", "openSUSE Leap 15.3:virtualbox-guest-tools-6.1.34-lp153.2.27.2.x86_64", "openSUSE Leap 15.3:virtualbox-guest-x11-6.1.34-lp153.2.27.2.x86_64", "openSUSE Leap 15.3:virtualbox-host-source-6.1.34-lp153.2.27.2.noarch", "openSUSE Leap 15.3:virtualbox-kmp-default-6.1.34_k5.3.18_150300.59.63-lp153.2.27.1.x86_64", "openSUSE Leap 15.3:virtualbox-kmp-preempt-6.1.34_k5.3.18_150300.59.63-lp153.2.27.1.x86_64", "openSUSE Leap 15.3:virtualbox-qt-6.1.34-lp153.2.27.2.x86_64", "openSUSE Leap 15.3:virtualbox-vnc-6.1.34-lp153.2.27.2.x86_64", "openSUSE Leap 15.3:virtualbox-websrv-6.1.34-lp153.2.27.2.x86_64", ], }, references: [ { category: "external", summary: "CVE-2021-42373", url: "https://www.suse.com/security/cve/CVE-2021-42373", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Leap 15.3:busybox-1.34.1-4.9.1.aarch64", "openSUSE Leap 15.3:busybox-1.34.1-4.9.1.ppc64le", "openSUSE Leap 15.3:busybox-1.34.1-4.9.1.s390x", "openSUSE Leap 15.3:busybox-1.34.1-4.9.1.x86_64", "openSUSE Leap 15.3:busybox-static-1.34.1-4.9.1.aarch64", "openSUSE Leap 15.3:busybox-static-1.34.1-4.9.1.ppc64le", "openSUSE Leap 15.3:busybox-static-1.34.1-4.9.1.s390x", "openSUSE Leap 15.3:busybox-static-1.34.1-4.9.1.x86_64", "openSUSE Leap 15.3:python3-virtualbox-6.1.34-lp153.2.27.2.x86_64", "openSUSE Leap 15.3:virtualbox-6.1.34-lp153.2.27.2.x86_64", "openSUSE Leap 15.3:virtualbox-devel-6.1.34-lp153.2.27.2.x86_64", "openSUSE Leap 15.3:virtualbox-guest-desktop-icons-6.1.34-lp153.2.27.2.noarch", "openSUSE Leap 15.3:virtualbox-guest-source-6.1.34-lp153.2.27.2.noarch", "openSUSE Leap 15.3:virtualbox-guest-tools-6.1.34-lp153.2.27.2.x86_64", "openSUSE Leap 15.3:virtualbox-guest-x11-6.1.34-lp153.2.27.2.x86_64", "openSUSE Leap 15.3:virtualbox-host-source-6.1.34-lp153.2.27.2.noarch", "openSUSE Leap 15.3:virtualbox-kmp-default-6.1.34_k5.3.18_150300.59.63-lp153.2.27.1.x86_64", "openSUSE Leap 15.3:virtualbox-kmp-preempt-6.1.34_k5.3.18_150300.59.63-lp153.2.27.1.x86_64", "openSUSE Leap 15.3:virtualbox-qt-6.1.34-lp153.2.27.2.x86_64", "openSUSE Leap 15.3:virtualbox-vnc-6.1.34-lp153.2.27.2.x86_64", "openSUSE Leap 15.3:virtualbox-websrv-6.1.34-lp153.2.27.2.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.5, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "openSUSE Leap 15.3:busybox-1.34.1-4.9.1.aarch64", "openSUSE Leap 15.3:busybox-1.34.1-4.9.1.ppc64le", "openSUSE Leap 15.3:busybox-1.34.1-4.9.1.s390x", "openSUSE Leap 15.3:busybox-1.34.1-4.9.1.x86_64", "openSUSE Leap 15.3:busybox-static-1.34.1-4.9.1.aarch64", "openSUSE Leap 15.3:busybox-static-1.34.1-4.9.1.ppc64le", "openSUSE Leap 15.3:busybox-static-1.34.1-4.9.1.s390x", "openSUSE Leap 15.3:busybox-static-1.34.1-4.9.1.x86_64", "openSUSE Leap 15.3:python3-virtualbox-6.1.34-lp153.2.27.2.x86_64", "openSUSE Leap 15.3:virtualbox-6.1.34-lp153.2.27.2.x86_64", "openSUSE Leap 15.3:virtualbox-devel-6.1.34-lp153.2.27.2.x86_64", "openSUSE Leap 15.3:virtualbox-guest-desktop-icons-6.1.34-lp153.2.27.2.noarch", "openSUSE Leap 15.3:virtualbox-guest-source-6.1.34-lp153.2.27.2.noarch", "openSUSE Leap 15.3:virtualbox-guest-tools-6.1.34-lp153.2.27.2.x86_64", "openSUSE Leap 15.3:virtualbox-guest-x11-6.1.34-lp153.2.27.2.x86_64", "openSUSE Leap 15.3:virtualbox-host-source-6.1.34-lp153.2.27.2.noarch", "openSUSE Leap 15.3:virtualbox-kmp-default-6.1.34_k5.3.18_150300.59.63-lp153.2.27.1.x86_64", "openSUSE Leap 15.3:virtualbox-kmp-preempt-6.1.34_k5.3.18_150300.59.63-lp153.2.27.1.x86_64", "openSUSE Leap 15.3:virtualbox-qt-6.1.34-lp153.2.27.2.x86_64", "openSUSE Leap 15.3:virtualbox-vnc-6.1.34-lp153.2.27.2.x86_64", "openSUSE Leap 15.3:virtualbox-websrv-6.1.34-lp153.2.27.2.x86_64", ], }, ], threats: [ { category: "impact", date: "2022-01-20T09:04:27Z", details: "moderate", }, ], title: "CVE-2021-42373", }, { cve: "CVE-2021-42374", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2021-42374", }, ], notes: [ { category: "general", text: "An out-of-bounds heap read in Busybox's unlzma applet leads to information leak and denial of service when crafted LZMA-compressed input is decompressed. This can be triggered by any applet/format that", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Leap 15.3:busybox-1.34.1-4.9.1.aarch64", "openSUSE Leap 15.3:busybox-1.34.1-4.9.1.ppc64le", "openSUSE Leap 15.3:busybox-1.34.1-4.9.1.s390x", "openSUSE Leap 15.3:busybox-1.34.1-4.9.1.x86_64", "openSUSE Leap 15.3:busybox-static-1.34.1-4.9.1.aarch64", "openSUSE Leap 15.3:busybox-static-1.34.1-4.9.1.ppc64le", "openSUSE Leap 15.3:busybox-static-1.34.1-4.9.1.s390x", "openSUSE Leap 15.3:busybox-static-1.34.1-4.9.1.x86_64", "openSUSE Leap 15.3:python3-virtualbox-6.1.34-lp153.2.27.2.x86_64", "openSUSE Leap 15.3:virtualbox-6.1.34-lp153.2.27.2.x86_64", "openSUSE Leap 15.3:virtualbox-devel-6.1.34-lp153.2.27.2.x86_64", "openSUSE Leap 15.3:virtualbox-guest-desktop-icons-6.1.34-lp153.2.27.2.noarch", "openSUSE Leap 15.3:virtualbox-guest-source-6.1.34-lp153.2.27.2.noarch", "openSUSE Leap 15.3:virtualbox-guest-tools-6.1.34-lp153.2.27.2.x86_64", "openSUSE Leap 15.3:virtualbox-guest-x11-6.1.34-lp153.2.27.2.x86_64", "openSUSE Leap 15.3:virtualbox-host-source-6.1.34-lp153.2.27.2.noarch", "openSUSE Leap 15.3:virtualbox-kmp-default-6.1.34_k5.3.18_150300.59.63-lp153.2.27.1.x86_64", "openSUSE Leap 15.3:virtualbox-kmp-preempt-6.1.34_k5.3.18_150300.59.63-lp153.2.27.1.x86_64", "openSUSE Leap 15.3:virtualbox-qt-6.1.34-lp153.2.27.2.x86_64", "openSUSE Leap 15.3:virtualbox-vnc-6.1.34-lp153.2.27.2.x86_64", "openSUSE Leap 15.3:virtualbox-websrv-6.1.34-lp153.2.27.2.x86_64", ], }, references: [ { category: "external", summary: "CVE-2021-42374", url: "https://www.suse.com/security/cve/CVE-2021-42374", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Leap 15.3:busybox-1.34.1-4.9.1.aarch64", "openSUSE Leap 15.3:busybox-1.34.1-4.9.1.ppc64le", "openSUSE Leap 15.3:busybox-1.34.1-4.9.1.s390x", "openSUSE Leap 15.3:busybox-1.34.1-4.9.1.x86_64", "openSUSE Leap 15.3:busybox-static-1.34.1-4.9.1.aarch64", "openSUSE Leap 15.3:busybox-static-1.34.1-4.9.1.ppc64le", "openSUSE Leap 15.3:busybox-static-1.34.1-4.9.1.s390x", "openSUSE Leap 15.3:busybox-static-1.34.1-4.9.1.x86_64", "openSUSE Leap 15.3:python3-virtualbox-6.1.34-lp153.2.27.2.x86_64", "openSUSE Leap 15.3:virtualbox-6.1.34-lp153.2.27.2.x86_64", "openSUSE Leap 15.3:virtualbox-devel-6.1.34-lp153.2.27.2.x86_64", "openSUSE Leap 15.3:virtualbox-guest-desktop-icons-6.1.34-lp153.2.27.2.noarch", "openSUSE Leap 15.3:virtualbox-guest-source-6.1.34-lp153.2.27.2.noarch", "openSUSE Leap 15.3:virtualbox-guest-tools-6.1.34-lp153.2.27.2.x86_64", "openSUSE Leap 15.3:virtualbox-guest-x11-6.1.34-lp153.2.27.2.x86_64", "openSUSE Leap 15.3:virtualbox-host-source-6.1.34-lp153.2.27.2.noarch", "openSUSE Leap 15.3:virtualbox-kmp-default-6.1.34_k5.3.18_150300.59.63-lp153.2.27.1.x86_64", "openSUSE Leap 15.3:virtualbox-kmp-preempt-6.1.34_k5.3.18_150300.59.63-lp153.2.27.1.x86_64", "openSUSE Leap 15.3:virtualbox-qt-6.1.34-lp153.2.27.2.x86_64", "openSUSE Leap 15.3:virtualbox-vnc-6.1.34-lp153.2.27.2.x86_64", "openSUSE Leap 15.3:virtualbox-websrv-6.1.34-lp153.2.27.2.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.7, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:H", version: "3.1", }, products: [ "openSUSE Leap 15.3:busybox-1.34.1-4.9.1.aarch64", "openSUSE Leap 15.3:busybox-1.34.1-4.9.1.ppc64le", "openSUSE Leap 15.3:busybox-1.34.1-4.9.1.s390x", "openSUSE Leap 15.3:busybox-1.34.1-4.9.1.x86_64", "openSUSE Leap 15.3:busybox-static-1.34.1-4.9.1.aarch64", "openSUSE Leap 15.3:busybox-static-1.34.1-4.9.1.ppc64le", "openSUSE Leap 15.3:busybox-static-1.34.1-4.9.1.s390x", "openSUSE Leap 15.3:busybox-static-1.34.1-4.9.1.x86_64", "openSUSE Leap 15.3:python3-virtualbox-6.1.34-lp153.2.27.2.x86_64", "openSUSE Leap 15.3:virtualbox-6.1.34-lp153.2.27.2.x86_64", "openSUSE Leap 15.3:virtualbox-devel-6.1.34-lp153.2.27.2.x86_64", "openSUSE Leap 15.3:virtualbox-guest-desktop-icons-6.1.34-lp153.2.27.2.noarch", "openSUSE Leap 15.3:virtualbox-guest-source-6.1.34-lp153.2.27.2.noarch", "openSUSE Leap 15.3:virtualbox-guest-tools-6.1.34-lp153.2.27.2.x86_64", "openSUSE Leap 15.3:virtualbox-guest-x11-6.1.34-lp153.2.27.2.x86_64", "openSUSE Leap 15.3:virtualbox-host-source-6.1.34-lp153.2.27.2.noarch", "openSUSE Leap 15.3:virtualbox-kmp-default-6.1.34_k5.3.18_150300.59.63-lp153.2.27.1.x86_64", "openSUSE Leap 15.3:virtualbox-kmp-preempt-6.1.34_k5.3.18_150300.59.63-lp153.2.27.1.x86_64", "openSUSE Leap 15.3:virtualbox-qt-6.1.34-lp153.2.27.2.x86_64", "openSUSE Leap 15.3:virtualbox-vnc-6.1.34-lp153.2.27.2.x86_64", "openSUSE Leap 15.3:virtualbox-websrv-6.1.34-lp153.2.27.2.x86_64", ], }, ], threats: [ { category: "impact", date: "2022-01-20T09:04:27Z", details: "moderate", }, ], title: "CVE-2021-42374", }, { cve: "CVE-2021-42375", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2021-42375", }, ], notes: [ { category: "general", text: "An incorrect handling of a special element in Busybox's ash applet leads to denial of service when processing a crafted shell command, due to the shell mistaking specific characters for reserved characters. This may be used for DoS under rare conditions of filtered command input.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Leap 15.3:busybox-1.34.1-4.9.1.aarch64", "openSUSE Leap 15.3:busybox-1.34.1-4.9.1.ppc64le", "openSUSE Leap 15.3:busybox-1.34.1-4.9.1.s390x", "openSUSE Leap 15.3:busybox-1.34.1-4.9.1.x86_64", "openSUSE Leap 15.3:busybox-static-1.34.1-4.9.1.aarch64", "openSUSE Leap 15.3:busybox-static-1.34.1-4.9.1.ppc64le", "openSUSE Leap 15.3:busybox-static-1.34.1-4.9.1.s390x", "openSUSE Leap 15.3:busybox-static-1.34.1-4.9.1.x86_64", "openSUSE Leap 15.3:python3-virtualbox-6.1.34-lp153.2.27.2.x86_64", "openSUSE Leap 15.3:virtualbox-6.1.34-lp153.2.27.2.x86_64", "openSUSE Leap 15.3:virtualbox-devel-6.1.34-lp153.2.27.2.x86_64", "openSUSE Leap 15.3:virtualbox-guest-desktop-icons-6.1.34-lp153.2.27.2.noarch", "openSUSE Leap 15.3:virtualbox-guest-source-6.1.34-lp153.2.27.2.noarch", "openSUSE Leap 15.3:virtualbox-guest-tools-6.1.34-lp153.2.27.2.x86_64", "openSUSE Leap 15.3:virtualbox-guest-x11-6.1.34-lp153.2.27.2.x86_64", "openSUSE Leap 15.3:virtualbox-host-source-6.1.34-lp153.2.27.2.noarch", "openSUSE Leap 15.3:virtualbox-kmp-default-6.1.34_k5.3.18_150300.59.63-lp153.2.27.1.x86_64", "openSUSE Leap 15.3:virtualbox-kmp-preempt-6.1.34_k5.3.18_150300.59.63-lp153.2.27.1.x86_64", "openSUSE Leap 15.3:virtualbox-qt-6.1.34-lp153.2.27.2.x86_64", "openSUSE Leap 15.3:virtualbox-vnc-6.1.34-lp153.2.27.2.x86_64", "openSUSE Leap 15.3:virtualbox-websrv-6.1.34-lp153.2.27.2.x86_64", ], }, references: [ { category: "external", summary: "CVE-2021-42375", url: "https://www.suse.com/security/cve/CVE-2021-42375", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Leap 15.3:busybox-1.34.1-4.9.1.aarch64", "openSUSE Leap 15.3:busybox-1.34.1-4.9.1.ppc64le", "openSUSE Leap 15.3:busybox-1.34.1-4.9.1.s390x", "openSUSE Leap 15.3:busybox-1.34.1-4.9.1.x86_64", "openSUSE Leap 15.3:busybox-static-1.34.1-4.9.1.aarch64", "openSUSE Leap 15.3:busybox-static-1.34.1-4.9.1.ppc64le", "openSUSE Leap 15.3:busybox-static-1.34.1-4.9.1.s390x", "openSUSE Leap 15.3:busybox-static-1.34.1-4.9.1.x86_64", "openSUSE Leap 15.3:python3-virtualbox-6.1.34-lp153.2.27.2.x86_64", "openSUSE Leap 15.3:virtualbox-6.1.34-lp153.2.27.2.x86_64", "openSUSE Leap 15.3:virtualbox-devel-6.1.34-lp153.2.27.2.x86_64", "openSUSE Leap 15.3:virtualbox-guest-desktop-icons-6.1.34-lp153.2.27.2.noarch", "openSUSE Leap 15.3:virtualbox-guest-source-6.1.34-lp153.2.27.2.noarch", "openSUSE Leap 15.3:virtualbox-guest-tools-6.1.34-lp153.2.27.2.x86_64", "openSUSE Leap 15.3:virtualbox-guest-x11-6.1.34-lp153.2.27.2.x86_64", "openSUSE Leap 15.3:virtualbox-host-source-6.1.34-lp153.2.27.2.noarch", "openSUSE Leap 15.3:virtualbox-kmp-default-6.1.34_k5.3.18_150300.59.63-lp153.2.27.1.x86_64", "openSUSE Leap 15.3:virtualbox-kmp-preempt-6.1.34_k5.3.18_150300.59.63-lp153.2.27.1.x86_64", "openSUSE Leap 15.3:virtualbox-qt-6.1.34-lp153.2.27.2.x86_64", "openSUSE Leap 15.3:virtualbox-vnc-6.1.34-lp153.2.27.2.x86_64", "openSUSE Leap 15.3:virtualbox-websrv-6.1.34-lp153.2.27.2.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 4.1, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "openSUSE Leap 15.3:busybox-1.34.1-4.9.1.aarch64", "openSUSE Leap 15.3:busybox-1.34.1-4.9.1.ppc64le", "openSUSE Leap 15.3:busybox-1.34.1-4.9.1.s390x", "openSUSE Leap 15.3:busybox-1.34.1-4.9.1.x86_64", "openSUSE Leap 15.3:busybox-static-1.34.1-4.9.1.aarch64", "openSUSE Leap 15.3:busybox-static-1.34.1-4.9.1.ppc64le", "openSUSE Leap 15.3:busybox-static-1.34.1-4.9.1.s390x", "openSUSE Leap 15.3:busybox-static-1.34.1-4.9.1.x86_64", "openSUSE Leap 15.3:python3-virtualbox-6.1.34-lp153.2.27.2.x86_64", "openSUSE Leap 15.3:virtualbox-6.1.34-lp153.2.27.2.x86_64", "openSUSE Leap 15.3:virtualbox-devel-6.1.34-lp153.2.27.2.x86_64", "openSUSE Leap 15.3:virtualbox-guest-desktop-icons-6.1.34-lp153.2.27.2.noarch", "openSUSE Leap 15.3:virtualbox-guest-source-6.1.34-lp153.2.27.2.noarch", "openSUSE Leap 15.3:virtualbox-guest-tools-6.1.34-lp153.2.27.2.x86_64", "openSUSE Leap 15.3:virtualbox-guest-x11-6.1.34-lp153.2.27.2.x86_64", "openSUSE Leap 15.3:virtualbox-host-source-6.1.34-lp153.2.27.2.noarch", "openSUSE Leap 15.3:virtualbox-kmp-default-6.1.34_k5.3.18_150300.59.63-lp153.2.27.1.x86_64", "openSUSE Leap 15.3:virtualbox-kmp-preempt-6.1.34_k5.3.18_150300.59.63-lp153.2.27.1.x86_64", "openSUSE Leap 15.3:virtualbox-qt-6.1.34-lp153.2.27.2.x86_64", "openSUSE Leap 15.3:virtualbox-vnc-6.1.34-lp153.2.27.2.x86_64", "openSUSE Leap 15.3:virtualbox-websrv-6.1.34-lp153.2.27.2.x86_64", ], }, ], threats: [ { category: "impact", date: "2022-01-20T09:04:27Z", details: "moderate", }, ], title: "CVE-2021-42375", }, { cve: "CVE-2021-42376", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2021-42376", }, ], notes: [ { category: "general", text: "A NULL pointer dereference in Busybox's hush applet leads to denial of service when processing a crafted shell command, due to missing validation after a \\x03 delimiter character. This may be used for DoS under very rare conditions of filtered command input.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Leap 15.3:busybox-1.34.1-4.9.1.aarch64", "openSUSE Leap 15.3:busybox-1.34.1-4.9.1.ppc64le", "openSUSE Leap 15.3:busybox-1.34.1-4.9.1.s390x", "openSUSE Leap 15.3:busybox-1.34.1-4.9.1.x86_64", "openSUSE Leap 15.3:busybox-static-1.34.1-4.9.1.aarch64", "openSUSE Leap 15.3:busybox-static-1.34.1-4.9.1.ppc64le", "openSUSE Leap 15.3:busybox-static-1.34.1-4.9.1.s390x", "openSUSE Leap 15.3:busybox-static-1.34.1-4.9.1.x86_64", "openSUSE Leap 15.3:python3-virtualbox-6.1.34-lp153.2.27.2.x86_64", "openSUSE Leap 15.3:virtualbox-6.1.34-lp153.2.27.2.x86_64", "openSUSE Leap 15.3:virtualbox-devel-6.1.34-lp153.2.27.2.x86_64", "openSUSE Leap 15.3:virtualbox-guest-desktop-icons-6.1.34-lp153.2.27.2.noarch", "openSUSE Leap 15.3:virtualbox-guest-source-6.1.34-lp153.2.27.2.noarch", "openSUSE Leap 15.3:virtualbox-guest-tools-6.1.34-lp153.2.27.2.x86_64", "openSUSE Leap 15.3:virtualbox-guest-x11-6.1.34-lp153.2.27.2.x86_64", "openSUSE Leap 15.3:virtualbox-host-source-6.1.34-lp153.2.27.2.noarch", "openSUSE Leap 15.3:virtualbox-kmp-default-6.1.34_k5.3.18_150300.59.63-lp153.2.27.1.x86_64", "openSUSE Leap 15.3:virtualbox-kmp-preempt-6.1.34_k5.3.18_150300.59.63-lp153.2.27.1.x86_64", "openSUSE Leap 15.3:virtualbox-qt-6.1.34-lp153.2.27.2.x86_64", "openSUSE Leap 15.3:virtualbox-vnc-6.1.34-lp153.2.27.2.x86_64", "openSUSE Leap 15.3:virtualbox-websrv-6.1.34-lp153.2.27.2.x86_64", ], }, references: [ { category: "external", summary: "CVE-2021-42376", url: "https://www.suse.com/security/cve/CVE-2021-42376", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Leap 15.3:busybox-1.34.1-4.9.1.aarch64", "openSUSE Leap 15.3:busybox-1.34.1-4.9.1.ppc64le", "openSUSE Leap 15.3:busybox-1.34.1-4.9.1.s390x", "openSUSE Leap 15.3:busybox-1.34.1-4.9.1.x86_64", "openSUSE Leap 15.3:busybox-static-1.34.1-4.9.1.aarch64", "openSUSE Leap 15.3:busybox-static-1.34.1-4.9.1.ppc64le", "openSUSE Leap 15.3:busybox-static-1.34.1-4.9.1.s390x", "openSUSE Leap 15.3:busybox-static-1.34.1-4.9.1.x86_64", "openSUSE Leap 15.3:python3-virtualbox-6.1.34-lp153.2.27.2.x86_64", "openSUSE Leap 15.3:virtualbox-6.1.34-lp153.2.27.2.x86_64", "openSUSE Leap 15.3:virtualbox-devel-6.1.34-lp153.2.27.2.x86_64", "openSUSE Leap 15.3:virtualbox-guest-desktop-icons-6.1.34-lp153.2.27.2.noarch", "openSUSE Leap 15.3:virtualbox-guest-source-6.1.34-lp153.2.27.2.noarch", "openSUSE Leap 15.3:virtualbox-guest-tools-6.1.34-lp153.2.27.2.x86_64", "openSUSE Leap 15.3:virtualbox-guest-x11-6.1.34-lp153.2.27.2.x86_64", "openSUSE Leap 15.3:virtualbox-host-source-6.1.34-lp153.2.27.2.noarch", "openSUSE Leap 15.3:virtualbox-kmp-default-6.1.34_k5.3.18_150300.59.63-lp153.2.27.1.x86_64", "openSUSE Leap 15.3:virtualbox-kmp-preempt-6.1.34_k5.3.18_150300.59.63-lp153.2.27.1.x86_64", "openSUSE Leap 15.3:virtualbox-qt-6.1.34-lp153.2.27.2.x86_64", "openSUSE Leap 15.3:virtualbox-vnc-6.1.34-lp153.2.27.2.x86_64", "openSUSE Leap 15.3:virtualbox-websrv-6.1.34-lp153.2.27.2.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 4.1, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "openSUSE Leap 15.3:busybox-1.34.1-4.9.1.aarch64", "openSUSE Leap 15.3:busybox-1.34.1-4.9.1.ppc64le", "openSUSE Leap 15.3:busybox-1.34.1-4.9.1.s390x", "openSUSE Leap 15.3:busybox-1.34.1-4.9.1.x86_64", "openSUSE Leap 15.3:busybox-static-1.34.1-4.9.1.aarch64", "openSUSE Leap 15.3:busybox-static-1.34.1-4.9.1.ppc64le", "openSUSE Leap 15.3:busybox-static-1.34.1-4.9.1.s390x", "openSUSE Leap 15.3:busybox-static-1.34.1-4.9.1.x86_64", "openSUSE Leap 15.3:python3-virtualbox-6.1.34-lp153.2.27.2.x86_64", "openSUSE Leap 15.3:virtualbox-6.1.34-lp153.2.27.2.x86_64", "openSUSE Leap 15.3:virtualbox-devel-6.1.34-lp153.2.27.2.x86_64", "openSUSE Leap 15.3:virtualbox-guest-desktop-icons-6.1.34-lp153.2.27.2.noarch", "openSUSE Leap 15.3:virtualbox-guest-source-6.1.34-lp153.2.27.2.noarch", "openSUSE Leap 15.3:virtualbox-guest-tools-6.1.34-lp153.2.27.2.x86_64", "openSUSE Leap 15.3:virtualbox-guest-x11-6.1.34-lp153.2.27.2.x86_64", "openSUSE Leap 15.3:virtualbox-host-source-6.1.34-lp153.2.27.2.noarch", "openSUSE Leap 15.3:virtualbox-kmp-default-6.1.34_k5.3.18_150300.59.63-lp153.2.27.1.x86_64", "openSUSE Leap 15.3:virtualbox-kmp-preempt-6.1.34_k5.3.18_150300.59.63-lp153.2.27.1.x86_64", "openSUSE Leap 15.3:virtualbox-qt-6.1.34-lp153.2.27.2.x86_64", "openSUSE Leap 15.3:virtualbox-vnc-6.1.34-lp153.2.27.2.x86_64", "openSUSE Leap 15.3:virtualbox-websrv-6.1.34-lp153.2.27.2.x86_64", ], }, ], threats: [ { category: "impact", date: "2022-01-20T09:04:27Z", details: "moderate", }, ], title: "CVE-2021-42376", }, { cve: "CVE-2021-42377", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2021-42377", }, ], notes: [ { category: "general", text: "An attacker-controlled pointer free in Busybox's hush applet leads to denial of service and possible code execution when processing a crafted shell command, due to the shell mishandling the &&& string. This may be used for remote code execution under rare conditions of filtered command input.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Leap 15.3:busybox-1.34.1-4.9.1.aarch64", "openSUSE Leap 15.3:busybox-1.34.1-4.9.1.ppc64le", "openSUSE Leap 15.3:busybox-1.34.1-4.9.1.s390x", "openSUSE Leap 15.3:busybox-1.34.1-4.9.1.x86_64", "openSUSE Leap 15.3:busybox-static-1.34.1-4.9.1.aarch64", "openSUSE Leap 15.3:busybox-static-1.34.1-4.9.1.ppc64le", "openSUSE Leap 15.3:busybox-static-1.34.1-4.9.1.s390x", "openSUSE Leap 15.3:busybox-static-1.34.1-4.9.1.x86_64", "openSUSE Leap 15.3:python3-virtualbox-6.1.34-lp153.2.27.2.x86_64", "openSUSE Leap 15.3:virtualbox-6.1.34-lp153.2.27.2.x86_64", "openSUSE Leap 15.3:virtualbox-devel-6.1.34-lp153.2.27.2.x86_64", "openSUSE Leap 15.3:virtualbox-guest-desktop-icons-6.1.34-lp153.2.27.2.noarch", "openSUSE Leap 15.3:virtualbox-guest-source-6.1.34-lp153.2.27.2.noarch", "openSUSE Leap 15.3:virtualbox-guest-tools-6.1.34-lp153.2.27.2.x86_64", "openSUSE Leap 15.3:virtualbox-guest-x11-6.1.34-lp153.2.27.2.x86_64", "openSUSE Leap 15.3:virtualbox-host-source-6.1.34-lp153.2.27.2.noarch", "openSUSE Leap 15.3:virtualbox-kmp-default-6.1.34_k5.3.18_150300.59.63-lp153.2.27.1.x86_64", "openSUSE Leap 15.3:virtualbox-kmp-preempt-6.1.34_k5.3.18_150300.59.63-lp153.2.27.1.x86_64", "openSUSE Leap 15.3:virtualbox-qt-6.1.34-lp153.2.27.2.x86_64", "openSUSE Leap 15.3:virtualbox-vnc-6.1.34-lp153.2.27.2.x86_64", "openSUSE Leap 15.3:virtualbox-websrv-6.1.34-lp153.2.27.2.x86_64", ], }, references: [ { category: "external", summary: "CVE-2021-42377", url: "https://www.suse.com/security/cve/CVE-2021-42377", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Leap 15.3:busybox-1.34.1-4.9.1.aarch64", "openSUSE Leap 15.3:busybox-1.34.1-4.9.1.ppc64le", "openSUSE Leap 15.3:busybox-1.34.1-4.9.1.s390x", "openSUSE Leap 15.3:busybox-1.34.1-4.9.1.x86_64", "openSUSE Leap 15.3:busybox-static-1.34.1-4.9.1.aarch64", "openSUSE Leap 15.3:busybox-static-1.34.1-4.9.1.ppc64le", "openSUSE Leap 15.3:busybox-static-1.34.1-4.9.1.s390x", "openSUSE Leap 15.3:busybox-static-1.34.1-4.9.1.x86_64", "openSUSE Leap 15.3:python3-virtualbox-6.1.34-lp153.2.27.2.x86_64", "openSUSE Leap 15.3:virtualbox-6.1.34-lp153.2.27.2.x86_64", "openSUSE Leap 15.3:virtualbox-devel-6.1.34-lp153.2.27.2.x86_64", "openSUSE Leap 15.3:virtualbox-guest-desktop-icons-6.1.34-lp153.2.27.2.noarch", "openSUSE Leap 15.3:virtualbox-guest-source-6.1.34-lp153.2.27.2.noarch", "openSUSE Leap 15.3:virtualbox-guest-tools-6.1.34-lp153.2.27.2.x86_64", "openSUSE Leap 15.3:virtualbox-guest-x11-6.1.34-lp153.2.27.2.x86_64", "openSUSE Leap 15.3:virtualbox-host-source-6.1.34-lp153.2.27.2.noarch", "openSUSE Leap 15.3:virtualbox-kmp-default-6.1.34_k5.3.18_150300.59.63-lp153.2.27.1.x86_64", "openSUSE Leap 15.3:virtualbox-kmp-preempt-6.1.34_k5.3.18_150300.59.63-lp153.2.27.1.x86_64", "openSUSE Leap 15.3:virtualbox-qt-6.1.34-lp153.2.27.2.x86_64", "openSUSE Leap 15.3:virtualbox-vnc-6.1.34-lp153.2.27.2.x86_64", "openSUSE Leap 15.3:virtualbox-websrv-6.1.34-lp153.2.27.2.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 6.4, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, products: [ "openSUSE Leap 15.3:busybox-1.34.1-4.9.1.aarch64", "openSUSE Leap 15.3:busybox-1.34.1-4.9.1.ppc64le", "openSUSE Leap 15.3:busybox-1.34.1-4.9.1.s390x", "openSUSE Leap 15.3:busybox-1.34.1-4.9.1.x86_64", "openSUSE Leap 15.3:busybox-static-1.34.1-4.9.1.aarch64", "openSUSE Leap 15.3:busybox-static-1.34.1-4.9.1.ppc64le", "openSUSE Leap 15.3:busybox-static-1.34.1-4.9.1.s390x", "openSUSE Leap 15.3:busybox-static-1.34.1-4.9.1.x86_64", "openSUSE Leap 15.3:python3-virtualbox-6.1.34-lp153.2.27.2.x86_64", "openSUSE Leap 15.3:virtualbox-6.1.34-lp153.2.27.2.x86_64", "openSUSE Leap 15.3:virtualbox-devel-6.1.34-lp153.2.27.2.x86_64", "openSUSE Leap 15.3:virtualbox-guest-desktop-icons-6.1.34-lp153.2.27.2.noarch", "openSUSE Leap 15.3:virtualbox-guest-source-6.1.34-lp153.2.27.2.noarch", "openSUSE Leap 15.3:virtualbox-guest-tools-6.1.34-lp153.2.27.2.x86_64", "openSUSE Leap 15.3:virtualbox-guest-x11-6.1.34-lp153.2.27.2.x86_64", "openSUSE Leap 15.3:virtualbox-host-source-6.1.34-lp153.2.27.2.noarch", "openSUSE Leap 15.3:virtualbox-kmp-default-6.1.34_k5.3.18_150300.59.63-lp153.2.27.1.x86_64", "openSUSE Leap 15.3:virtualbox-kmp-preempt-6.1.34_k5.3.18_150300.59.63-lp153.2.27.1.x86_64", "openSUSE Leap 15.3:virtualbox-qt-6.1.34-lp153.2.27.2.x86_64", "openSUSE Leap 15.3:virtualbox-vnc-6.1.34-lp153.2.27.2.x86_64", "openSUSE Leap 15.3:virtualbox-websrv-6.1.34-lp153.2.27.2.x86_64", ], }, ], threats: [ { category: "impact", date: "2022-01-20T09:04:27Z", details: "moderate", }, ], title: "CVE-2021-42377", }, { cve: "CVE-2021-42378", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2021-42378", }, ], notes: [ { category: "general", text: "A use-after-free in Busybox's awk applet leads to denial of service and possibly code execution when processing a crafted awk pattern in the getvar_i function", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Leap 15.3:busybox-1.34.1-4.9.1.aarch64", "openSUSE Leap 15.3:busybox-1.34.1-4.9.1.ppc64le", "openSUSE Leap 15.3:busybox-1.34.1-4.9.1.s390x", "openSUSE Leap 15.3:busybox-1.34.1-4.9.1.x86_64", "openSUSE Leap 15.3:busybox-static-1.34.1-4.9.1.aarch64", "openSUSE Leap 15.3:busybox-static-1.34.1-4.9.1.ppc64le", "openSUSE Leap 15.3:busybox-static-1.34.1-4.9.1.s390x", "openSUSE Leap 15.3:busybox-static-1.34.1-4.9.1.x86_64", "openSUSE Leap 15.3:python3-virtualbox-6.1.34-lp153.2.27.2.x86_64", "openSUSE Leap 15.3:virtualbox-6.1.34-lp153.2.27.2.x86_64", "openSUSE Leap 15.3:virtualbox-devel-6.1.34-lp153.2.27.2.x86_64", "openSUSE Leap 15.3:virtualbox-guest-desktop-icons-6.1.34-lp153.2.27.2.noarch", "openSUSE Leap 15.3:virtualbox-guest-source-6.1.34-lp153.2.27.2.noarch", "openSUSE Leap 15.3:virtualbox-guest-tools-6.1.34-lp153.2.27.2.x86_64", "openSUSE Leap 15.3:virtualbox-guest-x11-6.1.34-lp153.2.27.2.x86_64", "openSUSE Leap 15.3:virtualbox-host-source-6.1.34-lp153.2.27.2.noarch", "openSUSE Leap 15.3:virtualbox-kmp-default-6.1.34_k5.3.18_150300.59.63-lp153.2.27.1.x86_64", "openSUSE Leap 15.3:virtualbox-kmp-preempt-6.1.34_k5.3.18_150300.59.63-lp153.2.27.1.x86_64", "openSUSE Leap 15.3:virtualbox-qt-6.1.34-lp153.2.27.2.x86_64", "openSUSE Leap 15.3:virtualbox-vnc-6.1.34-lp153.2.27.2.x86_64", "openSUSE Leap 15.3:virtualbox-websrv-6.1.34-lp153.2.27.2.x86_64", ], }, references: [ { category: "external", summary: "CVE-2021-42378", url: "https://www.suse.com/security/cve/CVE-2021-42378", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Leap 15.3:busybox-1.34.1-4.9.1.aarch64", "openSUSE Leap 15.3:busybox-1.34.1-4.9.1.ppc64le", "openSUSE Leap 15.3:busybox-1.34.1-4.9.1.s390x", "openSUSE Leap 15.3:busybox-1.34.1-4.9.1.x86_64", "openSUSE Leap 15.3:busybox-static-1.34.1-4.9.1.aarch64", "openSUSE Leap 15.3:busybox-static-1.34.1-4.9.1.ppc64le", "openSUSE Leap 15.3:busybox-static-1.34.1-4.9.1.s390x", "openSUSE Leap 15.3:busybox-static-1.34.1-4.9.1.x86_64", "openSUSE Leap 15.3:python3-virtualbox-6.1.34-lp153.2.27.2.x86_64", "openSUSE Leap 15.3:virtualbox-6.1.34-lp153.2.27.2.x86_64", "openSUSE Leap 15.3:virtualbox-devel-6.1.34-lp153.2.27.2.x86_64", "openSUSE Leap 15.3:virtualbox-guest-desktop-icons-6.1.34-lp153.2.27.2.noarch", "openSUSE Leap 15.3:virtualbox-guest-source-6.1.34-lp153.2.27.2.noarch", "openSUSE Leap 15.3:virtualbox-guest-tools-6.1.34-lp153.2.27.2.x86_64", "openSUSE Leap 15.3:virtualbox-guest-x11-6.1.34-lp153.2.27.2.x86_64", "openSUSE Leap 15.3:virtualbox-host-source-6.1.34-lp153.2.27.2.noarch", "openSUSE Leap 15.3:virtualbox-kmp-default-6.1.34_k5.3.18_150300.59.63-lp153.2.27.1.x86_64", "openSUSE Leap 15.3:virtualbox-kmp-preempt-6.1.34_k5.3.18_150300.59.63-lp153.2.27.1.x86_64", "openSUSE Leap 15.3:virtualbox-qt-6.1.34-lp153.2.27.2.x86_64", "openSUSE Leap 15.3:virtualbox-vnc-6.1.34-lp153.2.27.2.x86_64", "openSUSE Leap 15.3:virtualbox-websrv-6.1.34-lp153.2.27.2.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 6.6, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, products: [ "openSUSE Leap 15.3:busybox-1.34.1-4.9.1.aarch64", "openSUSE Leap 15.3:busybox-1.34.1-4.9.1.ppc64le", "openSUSE Leap 15.3:busybox-1.34.1-4.9.1.s390x", "openSUSE Leap 15.3:busybox-1.34.1-4.9.1.x86_64", "openSUSE Leap 15.3:busybox-static-1.34.1-4.9.1.aarch64", "openSUSE Leap 15.3:busybox-static-1.34.1-4.9.1.ppc64le", "openSUSE Leap 15.3:busybox-static-1.34.1-4.9.1.s390x", "openSUSE Leap 15.3:busybox-static-1.34.1-4.9.1.x86_64", "openSUSE Leap 15.3:python3-virtualbox-6.1.34-lp153.2.27.2.x86_64", "openSUSE Leap 15.3:virtualbox-6.1.34-lp153.2.27.2.x86_64", "openSUSE Leap 15.3:virtualbox-devel-6.1.34-lp153.2.27.2.x86_64", "openSUSE Leap 15.3:virtualbox-guest-desktop-icons-6.1.34-lp153.2.27.2.noarch", "openSUSE Leap 15.3:virtualbox-guest-source-6.1.34-lp153.2.27.2.noarch", "openSUSE Leap 15.3:virtualbox-guest-tools-6.1.34-lp153.2.27.2.x86_64", "openSUSE Leap 15.3:virtualbox-guest-x11-6.1.34-lp153.2.27.2.x86_64", "openSUSE Leap 15.3:virtualbox-host-source-6.1.34-lp153.2.27.2.noarch", "openSUSE Leap 15.3:virtualbox-kmp-default-6.1.34_k5.3.18_150300.59.63-lp153.2.27.1.x86_64", "openSUSE Leap 15.3:virtualbox-kmp-preempt-6.1.34_k5.3.18_150300.59.63-lp153.2.27.1.x86_64", "openSUSE Leap 15.3:virtualbox-qt-6.1.34-lp153.2.27.2.x86_64", "openSUSE Leap 15.3:virtualbox-vnc-6.1.34-lp153.2.27.2.x86_64", "openSUSE Leap 15.3:virtualbox-websrv-6.1.34-lp153.2.27.2.x86_64", ], }, ], threats: [ { category: "impact", date: "2022-01-20T09:04:27Z", details: "moderate", }, ], title: "CVE-2021-42378", }, { cve: "CVE-2021-42379", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2021-42379", }, ], notes: [ { category: "general", text: "A use-after-free in Busybox's awk applet leads to denial of service and possibly code execution when processing a crafted awk pattern in the next_input_file function", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Leap 15.3:busybox-1.34.1-4.9.1.aarch64", "openSUSE Leap 15.3:busybox-1.34.1-4.9.1.ppc64le", "openSUSE Leap 15.3:busybox-1.34.1-4.9.1.s390x", "openSUSE Leap 15.3:busybox-1.34.1-4.9.1.x86_64", "openSUSE Leap 15.3:busybox-static-1.34.1-4.9.1.aarch64", "openSUSE Leap 15.3:busybox-static-1.34.1-4.9.1.ppc64le", "openSUSE Leap 15.3:busybox-static-1.34.1-4.9.1.s390x", "openSUSE Leap 15.3:busybox-static-1.34.1-4.9.1.x86_64", "openSUSE Leap 15.3:python3-virtualbox-6.1.34-lp153.2.27.2.x86_64", "openSUSE Leap 15.3:virtualbox-6.1.34-lp153.2.27.2.x86_64", "openSUSE Leap 15.3:virtualbox-devel-6.1.34-lp153.2.27.2.x86_64", "openSUSE Leap 15.3:virtualbox-guest-desktop-icons-6.1.34-lp153.2.27.2.noarch", "openSUSE Leap 15.3:virtualbox-guest-source-6.1.34-lp153.2.27.2.noarch", "openSUSE Leap 15.3:virtualbox-guest-tools-6.1.34-lp153.2.27.2.x86_64", "openSUSE Leap 15.3:virtualbox-guest-x11-6.1.34-lp153.2.27.2.x86_64", "openSUSE Leap 15.3:virtualbox-host-source-6.1.34-lp153.2.27.2.noarch", "openSUSE Leap 15.3:virtualbox-kmp-default-6.1.34_k5.3.18_150300.59.63-lp153.2.27.1.x86_64", "openSUSE Leap 15.3:virtualbox-kmp-preempt-6.1.34_k5.3.18_150300.59.63-lp153.2.27.1.x86_64", "openSUSE Leap 15.3:virtualbox-qt-6.1.34-lp153.2.27.2.x86_64", "openSUSE Leap 15.3:virtualbox-vnc-6.1.34-lp153.2.27.2.x86_64", "openSUSE Leap 15.3:virtualbox-websrv-6.1.34-lp153.2.27.2.x86_64", ], }, references: [ { category: "external", summary: "CVE-2021-42379", url: "https://www.suse.com/security/cve/CVE-2021-42379", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Leap 15.3:busybox-1.34.1-4.9.1.aarch64", "openSUSE Leap 15.3:busybox-1.34.1-4.9.1.ppc64le", "openSUSE Leap 15.3:busybox-1.34.1-4.9.1.s390x", "openSUSE Leap 15.3:busybox-1.34.1-4.9.1.x86_64", "openSUSE Leap 15.3:busybox-static-1.34.1-4.9.1.aarch64", "openSUSE Leap 15.3:busybox-static-1.34.1-4.9.1.ppc64le", "openSUSE Leap 15.3:busybox-static-1.34.1-4.9.1.s390x", "openSUSE Leap 15.3:busybox-static-1.34.1-4.9.1.x86_64", "openSUSE Leap 15.3:python3-virtualbox-6.1.34-lp153.2.27.2.x86_64", "openSUSE Leap 15.3:virtualbox-6.1.34-lp153.2.27.2.x86_64", "openSUSE Leap 15.3:virtualbox-devel-6.1.34-lp153.2.27.2.x86_64", "openSUSE Leap 15.3:virtualbox-guest-desktop-icons-6.1.34-lp153.2.27.2.noarch", "openSUSE Leap 15.3:virtualbox-guest-source-6.1.34-lp153.2.27.2.noarch", "openSUSE Leap 15.3:virtualbox-guest-tools-6.1.34-lp153.2.27.2.x86_64", "openSUSE Leap 15.3:virtualbox-guest-x11-6.1.34-lp153.2.27.2.x86_64", "openSUSE Leap 15.3:virtualbox-host-source-6.1.34-lp153.2.27.2.noarch", "openSUSE Leap 15.3:virtualbox-kmp-default-6.1.34_k5.3.18_150300.59.63-lp153.2.27.1.x86_64", "openSUSE Leap 15.3:virtualbox-kmp-preempt-6.1.34_k5.3.18_150300.59.63-lp153.2.27.1.x86_64", "openSUSE Leap 15.3:virtualbox-qt-6.1.34-lp153.2.27.2.x86_64", "openSUSE Leap 15.3:virtualbox-vnc-6.1.34-lp153.2.27.2.x86_64", "openSUSE Leap 15.3:virtualbox-websrv-6.1.34-lp153.2.27.2.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 6.6, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, products: [ "openSUSE Leap 15.3:busybox-1.34.1-4.9.1.aarch64", "openSUSE Leap 15.3:busybox-1.34.1-4.9.1.ppc64le", "openSUSE Leap 15.3:busybox-1.34.1-4.9.1.s390x", "openSUSE Leap 15.3:busybox-1.34.1-4.9.1.x86_64", "openSUSE Leap 15.3:busybox-static-1.34.1-4.9.1.aarch64", "openSUSE Leap 15.3:busybox-static-1.34.1-4.9.1.ppc64le", "openSUSE Leap 15.3:busybox-static-1.34.1-4.9.1.s390x", "openSUSE Leap 15.3:busybox-static-1.34.1-4.9.1.x86_64", "openSUSE Leap 15.3:python3-virtualbox-6.1.34-lp153.2.27.2.x86_64", "openSUSE Leap 15.3:virtualbox-6.1.34-lp153.2.27.2.x86_64", "openSUSE Leap 15.3:virtualbox-devel-6.1.34-lp153.2.27.2.x86_64", "openSUSE Leap 15.3:virtualbox-guest-desktop-icons-6.1.34-lp153.2.27.2.noarch", "openSUSE Leap 15.3:virtualbox-guest-source-6.1.34-lp153.2.27.2.noarch", "openSUSE Leap 15.3:virtualbox-guest-tools-6.1.34-lp153.2.27.2.x86_64", "openSUSE Leap 15.3:virtualbox-guest-x11-6.1.34-lp153.2.27.2.x86_64", "openSUSE Leap 15.3:virtualbox-host-source-6.1.34-lp153.2.27.2.noarch", "openSUSE Leap 15.3:virtualbox-kmp-default-6.1.34_k5.3.18_150300.59.63-lp153.2.27.1.x86_64", "openSUSE Leap 15.3:virtualbox-kmp-preempt-6.1.34_k5.3.18_150300.59.63-lp153.2.27.1.x86_64", "openSUSE Leap 15.3:virtualbox-qt-6.1.34-lp153.2.27.2.x86_64", "openSUSE Leap 15.3:virtualbox-vnc-6.1.34-lp153.2.27.2.x86_64", "openSUSE Leap 15.3:virtualbox-websrv-6.1.34-lp153.2.27.2.x86_64", ], }, ], threats: [ { category: "impact", date: "2022-01-20T09:04:27Z", details: "moderate", }, ], title: "CVE-2021-42379", }, { cve: "CVE-2021-42380", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2021-42380", }, ], notes: [ { category: "general", text: "A use-after-free in Busybox's awk applet leads to denial of service and possibly code execution when processing a crafted awk pattern in the clrvar function", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Leap 15.3:busybox-1.34.1-4.9.1.aarch64", "openSUSE Leap 15.3:busybox-1.34.1-4.9.1.ppc64le", "openSUSE Leap 15.3:busybox-1.34.1-4.9.1.s390x", "openSUSE Leap 15.3:busybox-1.34.1-4.9.1.x86_64", "openSUSE Leap 15.3:busybox-static-1.34.1-4.9.1.aarch64", "openSUSE Leap 15.3:busybox-static-1.34.1-4.9.1.ppc64le", "openSUSE Leap 15.3:busybox-static-1.34.1-4.9.1.s390x", "openSUSE Leap 15.3:busybox-static-1.34.1-4.9.1.x86_64", "openSUSE Leap 15.3:python3-virtualbox-6.1.34-lp153.2.27.2.x86_64", "openSUSE Leap 15.3:virtualbox-6.1.34-lp153.2.27.2.x86_64", "openSUSE Leap 15.3:virtualbox-devel-6.1.34-lp153.2.27.2.x86_64", "openSUSE Leap 15.3:virtualbox-guest-desktop-icons-6.1.34-lp153.2.27.2.noarch", "openSUSE Leap 15.3:virtualbox-guest-source-6.1.34-lp153.2.27.2.noarch", "openSUSE Leap 15.3:virtualbox-guest-tools-6.1.34-lp153.2.27.2.x86_64", "openSUSE Leap 15.3:virtualbox-guest-x11-6.1.34-lp153.2.27.2.x86_64", "openSUSE Leap 15.3:virtualbox-host-source-6.1.34-lp153.2.27.2.noarch", "openSUSE Leap 15.3:virtualbox-kmp-default-6.1.34_k5.3.18_150300.59.63-lp153.2.27.1.x86_64", "openSUSE Leap 15.3:virtualbox-kmp-preempt-6.1.34_k5.3.18_150300.59.63-lp153.2.27.1.x86_64", "openSUSE Leap 15.3:virtualbox-qt-6.1.34-lp153.2.27.2.x86_64", "openSUSE Leap 15.3:virtualbox-vnc-6.1.34-lp153.2.27.2.x86_64", "openSUSE Leap 15.3:virtualbox-websrv-6.1.34-lp153.2.27.2.x86_64", ], }, references: [ { category: "external", summary: "CVE-2021-42380", url: "https://www.suse.com/security/cve/CVE-2021-42380", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Leap 15.3:busybox-1.34.1-4.9.1.aarch64", "openSUSE Leap 15.3:busybox-1.34.1-4.9.1.ppc64le", "openSUSE Leap 15.3:busybox-1.34.1-4.9.1.s390x", "openSUSE Leap 15.3:busybox-1.34.1-4.9.1.x86_64", "openSUSE Leap 15.3:busybox-static-1.34.1-4.9.1.aarch64", "openSUSE Leap 15.3:busybox-static-1.34.1-4.9.1.ppc64le", "openSUSE Leap 15.3:busybox-static-1.34.1-4.9.1.s390x", "openSUSE Leap 15.3:busybox-static-1.34.1-4.9.1.x86_64", "openSUSE Leap 15.3:python3-virtualbox-6.1.34-lp153.2.27.2.x86_64", "openSUSE Leap 15.3:virtualbox-6.1.34-lp153.2.27.2.x86_64", "openSUSE Leap 15.3:virtualbox-devel-6.1.34-lp153.2.27.2.x86_64", "openSUSE Leap 15.3:virtualbox-guest-desktop-icons-6.1.34-lp153.2.27.2.noarch", "openSUSE Leap 15.3:virtualbox-guest-source-6.1.34-lp153.2.27.2.noarch", "openSUSE Leap 15.3:virtualbox-guest-tools-6.1.34-lp153.2.27.2.x86_64", "openSUSE Leap 15.3:virtualbox-guest-x11-6.1.34-lp153.2.27.2.x86_64", "openSUSE Leap 15.3:virtualbox-host-source-6.1.34-lp153.2.27.2.noarch", "openSUSE Leap 15.3:virtualbox-kmp-default-6.1.34_k5.3.18_150300.59.63-lp153.2.27.1.x86_64", "openSUSE Leap 15.3:virtualbox-kmp-preempt-6.1.34_k5.3.18_150300.59.63-lp153.2.27.1.x86_64", "openSUSE Leap 15.3:virtualbox-qt-6.1.34-lp153.2.27.2.x86_64", "openSUSE Leap 15.3:virtualbox-vnc-6.1.34-lp153.2.27.2.x86_64", "openSUSE Leap 15.3:virtualbox-websrv-6.1.34-lp153.2.27.2.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 6.6, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, products: [ "openSUSE Leap 15.3:busybox-1.34.1-4.9.1.aarch64", "openSUSE Leap 15.3:busybox-1.34.1-4.9.1.ppc64le", "openSUSE Leap 15.3:busybox-1.34.1-4.9.1.s390x", "openSUSE Leap 15.3:busybox-1.34.1-4.9.1.x86_64", "openSUSE Leap 15.3:busybox-static-1.34.1-4.9.1.aarch64", "openSUSE Leap 15.3:busybox-static-1.34.1-4.9.1.ppc64le", "openSUSE Leap 15.3:busybox-static-1.34.1-4.9.1.s390x", "openSUSE Leap 15.3:busybox-static-1.34.1-4.9.1.x86_64", "openSUSE Leap 15.3:python3-virtualbox-6.1.34-lp153.2.27.2.x86_64", "openSUSE Leap 15.3:virtualbox-6.1.34-lp153.2.27.2.x86_64", "openSUSE Leap 15.3:virtualbox-devel-6.1.34-lp153.2.27.2.x86_64", "openSUSE Leap 15.3:virtualbox-guest-desktop-icons-6.1.34-lp153.2.27.2.noarch", "openSUSE Leap 15.3:virtualbox-guest-source-6.1.34-lp153.2.27.2.noarch", "openSUSE Leap 15.3:virtualbox-guest-tools-6.1.34-lp153.2.27.2.x86_64", "openSUSE Leap 15.3:virtualbox-guest-x11-6.1.34-lp153.2.27.2.x86_64", "openSUSE Leap 15.3:virtualbox-host-source-6.1.34-lp153.2.27.2.noarch", "openSUSE Leap 15.3:virtualbox-kmp-default-6.1.34_k5.3.18_150300.59.63-lp153.2.27.1.x86_64", "openSUSE Leap 15.3:virtualbox-kmp-preempt-6.1.34_k5.3.18_150300.59.63-lp153.2.27.1.x86_64", "openSUSE Leap 15.3:virtualbox-qt-6.1.34-lp153.2.27.2.x86_64", "openSUSE Leap 15.3:virtualbox-vnc-6.1.34-lp153.2.27.2.x86_64", "openSUSE Leap 15.3:virtualbox-websrv-6.1.34-lp153.2.27.2.x86_64", ], }, ], threats: [ { category: "impact", date: "2022-01-20T09:04:27Z", details: "moderate", }, ], title: "CVE-2021-42380", }, { cve: "CVE-2021-42381", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2021-42381", }, ], notes: [ { category: "general", text: "A use-after-free in Busybox's awk applet leads to denial of service and possibly code execution when processing a crafted awk pattern in the hash_init function", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Leap 15.3:busybox-1.34.1-4.9.1.aarch64", "openSUSE Leap 15.3:busybox-1.34.1-4.9.1.ppc64le", "openSUSE Leap 15.3:busybox-1.34.1-4.9.1.s390x", "openSUSE Leap 15.3:busybox-1.34.1-4.9.1.x86_64", "openSUSE Leap 15.3:busybox-static-1.34.1-4.9.1.aarch64", "openSUSE Leap 15.3:busybox-static-1.34.1-4.9.1.ppc64le", "openSUSE Leap 15.3:busybox-static-1.34.1-4.9.1.s390x", "openSUSE Leap 15.3:busybox-static-1.34.1-4.9.1.x86_64", "openSUSE Leap 15.3:python3-virtualbox-6.1.34-lp153.2.27.2.x86_64", "openSUSE Leap 15.3:virtualbox-6.1.34-lp153.2.27.2.x86_64", "openSUSE Leap 15.3:virtualbox-devel-6.1.34-lp153.2.27.2.x86_64", "openSUSE Leap 15.3:virtualbox-guest-desktop-icons-6.1.34-lp153.2.27.2.noarch", "openSUSE Leap 15.3:virtualbox-guest-source-6.1.34-lp153.2.27.2.noarch", "openSUSE Leap 15.3:virtualbox-guest-tools-6.1.34-lp153.2.27.2.x86_64", "openSUSE Leap 15.3:virtualbox-guest-x11-6.1.34-lp153.2.27.2.x86_64", "openSUSE Leap 15.3:virtualbox-host-source-6.1.34-lp153.2.27.2.noarch", "openSUSE Leap 15.3:virtualbox-kmp-default-6.1.34_k5.3.18_150300.59.63-lp153.2.27.1.x86_64", "openSUSE Leap 15.3:virtualbox-kmp-preempt-6.1.34_k5.3.18_150300.59.63-lp153.2.27.1.x86_64", "openSUSE Leap 15.3:virtualbox-qt-6.1.34-lp153.2.27.2.x86_64", "openSUSE Leap 15.3:virtualbox-vnc-6.1.34-lp153.2.27.2.x86_64", "openSUSE Leap 15.3:virtualbox-websrv-6.1.34-lp153.2.27.2.x86_64", ], }, references: [ { category: "external", summary: "CVE-2021-42381", url: "https://www.suse.com/security/cve/CVE-2021-42381", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Leap 15.3:busybox-1.34.1-4.9.1.aarch64", "openSUSE Leap 15.3:busybox-1.34.1-4.9.1.ppc64le", "openSUSE Leap 15.3:busybox-1.34.1-4.9.1.s390x", "openSUSE Leap 15.3:busybox-1.34.1-4.9.1.x86_64", "openSUSE Leap 15.3:busybox-static-1.34.1-4.9.1.aarch64", "openSUSE Leap 15.3:busybox-static-1.34.1-4.9.1.ppc64le", "openSUSE Leap 15.3:busybox-static-1.34.1-4.9.1.s390x", "openSUSE Leap 15.3:busybox-static-1.34.1-4.9.1.x86_64", "openSUSE Leap 15.3:python3-virtualbox-6.1.34-lp153.2.27.2.x86_64", "openSUSE Leap 15.3:virtualbox-6.1.34-lp153.2.27.2.x86_64", "openSUSE Leap 15.3:virtualbox-devel-6.1.34-lp153.2.27.2.x86_64", "openSUSE Leap 15.3:virtualbox-guest-desktop-icons-6.1.34-lp153.2.27.2.noarch", "openSUSE Leap 15.3:virtualbox-guest-source-6.1.34-lp153.2.27.2.noarch", "openSUSE Leap 15.3:virtualbox-guest-tools-6.1.34-lp153.2.27.2.x86_64", "openSUSE Leap 15.3:virtualbox-guest-x11-6.1.34-lp153.2.27.2.x86_64", "openSUSE Leap 15.3:virtualbox-host-source-6.1.34-lp153.2.27.2.noarch", "openSUSE Leap 15.3:virtualbox-kmp-default-6.1.34_k5.3.18_150300.59.63-lp153.2.27.1.x86_64", "openSUSE Leap 15.3:virtualbox-kmp-preempt-6.1.34_k5.3.18_150300.59.63-lp153.2.27.1.x86_64", "openSUSE Leap 15.3:virtualbox-qt-6.1.34-lp153.2.27.2.x86_64", "openSUSE Leap 15.3:virtualbox-vnc-6.1.34-lp153.2.27.2.x86_64", "openSUSE Leap 15.3:virtualbox-websrv-6.1.34-lp153.2.27.2.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 6.6, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, products: [ "openSUSE Leap 15.3:busybox-1.34.1-4.9.1.aarch64", "openSUSE Leap 15.3:busybox-1.34.1-4.9.1.ppc64le", "openSUSE Leap 15.3:busybox-1.34.1-4.9.1.s390x", "openSUSE Leap 15.3:busybox-1.34.1-4.9.1.x86_64", "openSUSE Leap 15.3:busybox-static-1.34.1-4.9.1.aarch64", "openSUSE Leap 15.3:busybox-static-1.34.1-4.9.1.ppc64le", "openSUSE Leap 15.3:busybox-static-1.34.1-4.9.1.s390x", "openSUSE Leap 15.3:busybox-static-1.34.1-4.9.1.x86_64", "openSUSE Leap 15.3:python3-virtualbox-6.1.34-lp153.2.27.2.x86_64", "openSUSE Leap 15.3:virtualbox-6.1.34-lp153.2.27.2.x86_64", "openSUSE Leap 15.3:virtualbox-devel-6.1.34-lp153.2.27.2.x86_64", "openSUSE Leap 15.3:virtualbox-guest-desktop-icons-6.1.34-lp153.2.27.2.noarch", "openSUSE Leap 15.3:virtualbox-guest-source-6.1.34-lp153.2.27.2.noarch", "openSUSE Leap 15.3:virtualbox-guest-tools-6.1.34-lp153.2.27.2.x86_64", "openSUSE Leap 15.3:virtualbox-guest-x11-6.1.34-lp153.2.27.2.x86_64", "openSUSE Leap 15.3:virtualbox-host-source-6.1.34-lp153.2.27.2.noarch", "openSUSE Leap 15.3:virtualbox-kmp-default-6.1.34_k5.3.18_150300.59.63-lp153.2.27.1.x86_64", "openSUSE Leap 15.3:virtualbox-kmp-preempt-6.1.34_k5.3.18_150300.59.63-lp153.2.27.1.x86_64", "openSUSE Leap 15.3:virtualbox-qt-6.1.34-lp153.2.27.2.x86_64", "openSUSE Leap 15.3:virtualbox-vnc-6.1.34-lp153.2.27.2.x86_64", "openSUSE Leap 15.3:virtualbox-websrv-6.1.34-lp153.2.27.2.x86_64", ], }, ], threats: [ { category: "impact", date: "2022-01-20T09:04:27Z", details: "moderate", }, ], title: "CVE-2021-42381", }, { cve: "CVE-2021-42382", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2021-42382", }, ], notes: [ { category: "general", text: "A use-after-free in Busybox's awk applet leads to denial of service and possibly code execution when processing a crafted awk pattern in the getvar_s function", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Leap 15.3:busybox-1.34.1-4.9.1.aarch64", "openSUSE Leap 15.3:busybox-1.34.1-4.9.1.ppc64le", "openSUSE Leap 15.3:busybox-1.34.1-4.9.1.s390x", "openSUSE Leap 15.3:busybox-1.34.1-4.9.1.x86_64", "openSUSE Leap 15.3:busybox-static-1.34.1-4.9.1.aarch64", "openSUSE Leap 15.3:busybox-static-1.34.1-4.9.1.ppc64le", "openSUSE Leap 15.3:busybox-static-1.34.1-4.9.1.s390x", "openSUSE Leap 15.3:busybox-static-1.34.1-4.9.1.x86_64", "openSUSE Leap 15.3:python3-virtualbox-6.1.34-lp153.2.27.2.x86_64", "openSUSE Leap 15.3:virtualbox-6.1.34-lp153.2.27.2.x86_64", "openSUSE Leap 15.3:virtualbox-devel-6.1.34-lp153.2.27.2.x86_64", "openSUSE Leap 15.3:virtualbox-guest-desktop-icons-6.1.34-lp153.2.27.2.noarch", "openSUSE Leap 15.3:virtualbox-guest-source-6.1.34-lp153.2.27.2.noarch", "openSUSE Leap 15.3:virtualbox-guest-tools-6.1.34-lp153.2.27.2.x86_64", "openSUSE Leap 15.3:virtualbox-guest-x11-6.1.34-lp153.2.27.2.x86_64", "openSUSE Leap 15.3:virtualbox-host-source-6.1.34-lp153.2.27.2.noarch", "openSUSE Leap 15.3:virtualbox-kmp-default-6.1.34_k5.3.18_150300.59.63-lp153.2.27.1.x86_64", "openSUSE Leap 15.3:virtualbox-kmp-preempt-6.1.34_k5.3.18_150300.59.63-lp153.2.27.1.x86_64", "openSUSE Leap 15.3:virtualbox-qt-6.1.34-lp153.2.27.2.x86_64", "openSUSE Leap 15.3:virtualbox-vnc-6.1.34-lp153.2.27.2.x86_64", "openSUSE Leap 15.3:virtualbox-websrv-6.1.34-lp153.2.27.2.x86_64", ], }, references: [ { category: "external", summary: "CVE-2021-42382", url: "https://www.suse.com/security/cve/CVE-2021-42382", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Leap 15.3:busybox-1.34.1-4.9.1.aarch64", "openSUSE Leap 15.3:busybox-1.34.1-4.9.1.ppc64le", "openSUSE Leap 15.3:busybox-1.34.1-4.9.1.s390x", "openSUSE Leap 15.3:busybox-1.34.1-4.9.1.x86_64", "openSUSE Leap 15.3:busybox-static-1.34.1-4.9.1.aarch64", "openSUSE Leap 15.3:busybox-static-1.34.1-4.9.1.ppc64le", "openSUSE Leap 15.3:busybox-static-1.34.1-4.9.1.s390x", "openSUSE Leap 15.3:busybox-static-1.34.1-4.9.1.x86_64", "openSUSE Leap 15.3:python3-virtualbox-6.1.34-lp153.2.27.2.x86_64", "openSUSE Leap 15.3:virtualbox-6.1.34-lp153.2.27.2.x86_64", "openSUSE Leap 15.3:virtualbox-devel-6.1.34-lp153.2.27.2.x86_64", "openSUSE Leap 15.3:virtualbox-guest-desktop-icons-6.1.34-lp153.2.27.2.noarch", "openSUSE Leap 15.3:virtualbox-guest-source-6.1.34-lp153.2.27.2.noarch", "openSUSE Leap 15.3:virtualbox-guest-tools-6.1.34-lp153.2.27.2.x86_64", "openSUSE Leap 15.3:virtualbox-guest-x11-6.1.34-lp153.2.27.2.x86_64", "openSUSE Leap 15.3:virtualbox-host-source-6.1.34-lp153.2.27.2.noarch", "openSUSE Leap 15.3:virtualbox-kmp-default-6.1.34_k5.3.18_150300.59.63-lp153.2.27.1.x86_64", "openSUSE Leap 15.3:virtualbox-kmp-preempt-6.1.34_k5.3.18_150300.59.63-lp153.2.27.1.x86_64", "openSUSE Leap 15.3:virtualbox-qt-6.1.34-lp153.2.27.2.x86_64", "openSUSE Leap 15.3:virtualbox-vnc-6.1.34-lp153.2.27.2.x86_64", "openSUSE Leap 15.3:virtualbox-websrv-6.1.34-lp153.2.27.2.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 6.6, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, products: [ "openSUSE Leap 15.3:busybox-1.34.1-4.9.1.aarch64", "openSUSE Leap 15.3:busybox-1.34.1-4.9.1.ppc64le", "openSUSE Leap 15.3:busybox-1.34.1-4.9.1.s390x", "openSUSE Leap 15.3:busybox-1.34.1-4.9.1.x86_64", "openSUSE Leap 15.3:busybox-static-1.34.1-4.9.1.aarch64", "openSUSE Leap 15.3:busybox-static-1.34.1-4.9.1.ppc64le", "openSUSE Leap 15.3:busybox-static-1.34.1-4.9.1.s390x", "openSUSE Leap 15.3:busybox-static-1.34.1-4.9.1.x86_64", "openSUSE Leap 15.3:python3-virtualbox-6.1.34-lp153.2.27.2.x86_64", "openSUSE Leap 15.3:virtualbox-6.1.34-lp153.2.27.2.x86_64", "openSUSE Leap 15.3:virtualbox-devel-6.1.34-lp153.2.27.2.x86_64", "openSUSE Leap 15.3:virtualbox-guest-desktop-icons-6.1.34-lp153.2.27.2.noarch", "openSUSE Leap 15.3:virtualbox-guest-source-6.1.34-lp153.2.27.2.noarch", "openSUSE Leap 15.3:virtualbox-guest-tools-6.1.34-lp153.2.27.2.x86_64", "openSUSE Leap 15.3:virtualbox-guest-x11-6.1.34-lp153.2.27.2.x86_64", "openSUSE Leap 15.3:virtualbox-host-source-6.1.34-lp153.2.27.2.noarch", "openSUSE Leap 15.3:virtualbox-kmp-default-6.1.34_k5.3.18_150300.59.63-lp153.2.27.1.x86_64", "openSUSE Leap 15.3:virtualbox-kmp-preempt-6.1.34_k5.3.18_150300.59.63-lp153.2.27.1.x86_64", "openSUSE Leap 15.3:virtualbox-qt-6.1.34-lp153.2.27.2.x86_64", "openSUSE Leap 15.3:virtualbox-vnc-6.1.34-lp153.2.27.2.x86_64", "openSUSE Leap 15.3:virtualbox-websrv-6.1.34-lp153.2.27.2.x86_64", ], }, ], threats: [ { category: "impact", date: "2022-01-20T09:04:27Z", details: "moderate", }, ], title: "CVE-2021-42382", }, { cve: "CVE-2021-42383", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2021-42383", }, ], notes: [ { category: "general", text: "A use-after-free in Busybox's awk applet leads to denial of service and possibly code execution when processing a crafted awk pattern in the evaluate function", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Leap 15.3:busybox-1.34.1-4.9.1.aarch64", "openSUSE Leap 15.3:busybox-1.34.1-4.9.1.ppc64le", "openSUSE Leap 15.3:busybox-1.34.1-4.9.1.s390x", "openSUSE Leap 15.3:busybox-1.34.1-4.9.1.x86_64", "openSUSE Leap 15.3:busybox-static-1.34.1-4.9.1.aarch64", "openSUSE Leap 15.3:busybox-static-1.34.1-4.9.1.ppc64le", "openSUSE Leap 15.3:busybox-static-1.34.1-4.9.1.s390x", "openSUSE Leap 15.3:busybox-static-1.34.1-4.9.1.x86_64", "openSUSE Leap 15.3:python3-virtualbox-6.1.34-lp153.2.27.2.x86_64", "openSUSE Leap 15.3:virtualbox-6.1.34-lp153.2.27.2.x86_64", "openSUSE Leap 15.3:virtualbox-devel-6.1.34-lp153.2.27.2.x86_64", "openSUSE Leap 15.3:virtualbox-guest-desktop-icons-6.1.34-lp153.2.27.2.noarch", "openSUSE Leap 15.3:virtualbox-guest-source-6.1.34-lp153.2.27.2.noarch", "openSUSE Leap 15.3:virtualbox-guest-tools-6.1.34-lp153.2.27.2.x86_64", "openSUSE Leap 15.3:virtualbox-guest-x11-6.1.34-lp153.2.27.2.x86_64", "openSUSE Leap 15.3:virtualbox-host-source-6.1.34-lp153.2.27.2.noarch", "openSUSE Leap 15.3:virtualbox-kmp-default-6.1.34_k5.3.18_150300.59.63-lp153.2.27.1.x86_64", "openSUSE Leap 15.3:virtualbox-kmp-preempt-6.1.34_k5.3.18_150300.59.63-lp153.2.27.1.x86_64", "openSUSE Leap 15.3:virtualbox-qt-6.1.34-lp153.2.27.2.x86_64", "openSUSE Leap 15.3:virtualbox-vnc-6.1.34-lp153.2.27.2.x86_64", "openSUSE Leap 15.3:virtualbox-websrv-6.1.34-lp153.2.27.2.x86_64", ], }, references: [ { category: "external", summary: "CVE-2021-42383", url: "https://www.suse.com/security/cve/CVE-2021-42383", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Leap 15.3:busybox-1.34.1-4.9.1.aarch64", "openSUSE Leap 15.3:busybox-1.34.1-4.9.1.ppc64le", "openSUSE Leap 15.3:busybox-1.34.1-4.9.1.s390x", "openSUSE Leap 15.3:busybox-1.34.1-4.9.1.x86_64", "openSUSE Leap 15.3:busybox-static-1.34.1-4.9.1.aarch64", "openSUSE Leap 15.3:busybox-static-1.34.1-4.9.1.ppc64le", "openSUSE Leap 15.3:busybox-static-1.34.1-4.9.1.s390x", "openSUSE Leap 15.3:busybox-static-1.34.1-4.9.1.x86_64", "openSUSE Leap 15.3:python3-virtualbox-6.1.34-lp153.2.27.2.x86_64", "openSUSE Leap 15.3:virtualbox-6.1.34-lp153.2.27.2.x86_64", "openSUSE Leap 15.3:virtualbox-devel-6.1.34-lp153.2.27.2.x86_64", "openSUSE Leap 15.3:virtualbox-guest-desktop-icons-6.1.34-lp153.2.27.2.noarch", "openSUSE Leap 15.3:virtualbox-guest-source-6.1.34-lp153.2.27.2.noarch", "openSUSE Leap 15.3:virtualbox-guest-tools-6.1.34-lp153.2.27.2.x86_64", "openSUSE Leap 15.3:virtualbox-guest-x11-6.1.34-lp153.2.27.2.x86_64", "openSUSE Leap 15.3:virtualbox-host-source-6.1.34-lp153.2.27.2.noarch", "openSUSE Leap 15.3:virtualbox-kmp-default-6.1.34_k5.3.18_150300.59.63-lp153.2.27.1.x86_64", "openSUSE Leap 15.3:virtualbox-kmp-preempt-6.1.34_k5.3.18_150300.59.63-lp153.2.27.1.x86_64", "openSUSE Leap 15.3:virtualbox-qt-6.1.34-lp153.2.27.2.x86_64", "openSUSE Leap 15.3:virtualbox-vnc-6.1.34-lp153.2.27.2.x86_64", "openSUSE Leap 15.3:virtualbox-websrv-6.1.34-lp153.2.27.2.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 6.6, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, products: [ "openSUSE Leap 15.3:busybox-1.34.1-4.9.1.aarch64", "openSUSE Leap 15.3:busybox-1.34.1-4.9.1.ppc64le", "openSUSE Leap 15.3:busybox-1.34.1-4.9.1.s390x", "openSUSE Leap 15.3:busybox-1.34.1-4.9.1.x86_64", "openSUSE Leap 15.3:busybox-static-1.34.1-4.9.1.aarch64", "openSUSE Leap 15.3:busybox-static-1.34.1-4.9.1.ppc64le", "openSUSE Leap 15.3:busybox-static-1.34.1-4.9.1.s390x", "openSUSE Leap 15.3:busybox-static-1.34.1-4.9.1.x86_64", "openSUSE Leap 15.3:python3-virtualbox-6.1.34-lp153.2.27.2.x86_64", "openSUSE Leap 15.3:virtualbox-6.1.34-lp153.2.27.2.x86_64", "openSUSE Leap 15.3:virtualbox-devel-6.1.34-lp153.2.27.2.x86_64", "openSUSE Leap 15.3:virtualbox-guest-desktop-icons-6.1.34-lp153.2.27.2.noarch", "openSUSE Leap 15.3:virtualbox-guest-source-6.1.34-lp153.2.27.2.noarch", "openSUSE Leap 15.3:virtualbox-guest-tools-6.1.34-lp153.2.27.2.x86_64", "openSUSE Leap 15.3:virtualbox-guest-x11-6.1.34-lp153.2.27.2.x86_64", "openSUSE Leap 15.3:virtualbox-host-source-6.1.34-lp153.2.27.2.noarch", "openSUSE Leap 15.3:virtualbox-kmp-default-6.1.34_k5.3.18_150300.59.63-lp153.2.27.1.x86_64", "openSUSE Leap 15.3:virtualbox-kmp-preempt-6.1.34_k5.3.18_150300.59.63-lp153.2.27.1.x86_64", "openSUSE Leap 15.3:virtualbox-qt-6.1.34-lp153.2.27.2.x86_64", "openSUSE Leap 15.3:virtualbox-vnc-6.1.34-lp153.2.27.2.x86_64", "openSUSE Leap 15.3:virtualbox-websrv-6.1.34-lp153.2.27.2.x86_64", ], }, ], threats: [ { category: "impact", date: "2022-01-20T09:04:27Z", details: "moderate", }, ], title: "CVE-2021-42383", }, { cve: "CVE-2021-42384", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2021-42384", }, ], notes: [ { category: "general", text: "A use-after-free in Busybox's awk applet leads to denial of service and possibly code execution when processing a crafted awk pattern in the handle_special function", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Leap 15.3:busybox-1.34.1-4.9.1.aarch64", "openSUSE Leap 15.3:busybox-1.34.1-4.9.1.ppc64le", "openSUSE Leap 15.3:busybox-1.34.1-4.9.1.s390x", "openSUSE Leap 15.3:busybox-1.34.1-4.9.1.x86_64", "openSUSE Leap 15.3:busybox-static-1.34.1-4.9.1.aarch64", "openSUSE Leap 15.3:busybox-static-1.34.1-4.9.1.ppc64le", "openSUSE Leap 15.3:busybox-static-1.34.1-4.9.1.s390x", "openSUSE Leap 15.3:busybox-static-1.34.1-4.9.1.x86_64", "openSUSE Leap 15.3:python3-virtualbox-6.1.34-lp153.2.27.2.x86_64", "openSUSE Leap 15.3:virtualbox-6.1.34-lp153.2.27.2.x86_64", "openSUSE Leap 15.3:virtualbox-devel-6.1.34-lp153.2.27.2.x86_64", "openSUSE Leap 15.3:virtualbox-guest-desktop-icons-6.1.34-lp153.2.27.2.noarch", "openSUSE Leap 15.3:virtualbox-guest-source-6.1.34-lp153.2.27.2.noarch", "openSUSE Leap 15.3:virtualbox-guest-tools-6.1.34-lp153.2.27.2.x86_64", "openSUSE Leap 15.3:virtualbox-guest-x11-6.1.34-lp153.2.27.2.x86_64", "openSUSE Leap 15.3:virtualbox-host-source-6.1.34-lp153.2.27.2.noarch", "openSUSE Leap 15.3:virtualbox-kmp-default-6.1.34_k5.3.18_150300.59.63-lp153.2.27.1.x86_64", "openSUSE Leap 15.3:virtualbox-kmp-preempt-6.1.34_k5.3.18_150300.59.63-lp153.2.27.1.x86_64", "openSUSE Leap 15.3:virtualbox-qt-6.1.34-lp153.2.27.2.x86_64", "openSUSE Leap 15.3:virtualbox-vnc-6.1.34-lp153.2.27.2.x86_64", "openSUSE Leap 15.3:virtualbox-websrv-6.1.34-lp153.2.27.2.x86_64", ], }, references: [ { category: "external", summary: "CVE-2021-42384", url: "https://www.suse.com/security/cve/CVE-2021-42384", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Leap 15.3:busybox-1.34.1-4.9.1.aarch64", "openSUSE Leap 15.3:busybox-1.34.1-4.9.1.ppc64le", "openSUSE Leap 15.3:busybox-1.34.1-4.9.1.s390x", "openSUSE Leap 15.3:busybox-1.34.1-4.9.1.x86_64", "openSUSE Leap 15.3:busybox-static-1.34.1-4.9.1.aarch64", "openSUSE Leap 15.3:busybox-static-1.34.1-4.9.1.ppc64le", "openSUSE Leap 15.3:busybox-static-1.34.1-4.9.1.s390x", "openSUSE Leap 15.3:busybox-static-1.34.1-4.9.1.x86_64", "openSUSE Leap 15.3:python3-virtualbox-6.1.34-lp153.2.27.2.x86_64", "openSUSE Leap 15.3:virtualbox-6.1.34-lp153.2.27.2.x86_64", "openSUSE Leap 15.3:virtualbox-devel-6.1.34-lp153.2.27.2.x86_64", "openSUSE Leap 15.3:virtualbox-guest-desktop-icons-6.1.34-lp153.2.27.2.noarch", "openSUSE Leap 15.3:virtualbox-guest-source-6.1.34-lp153.2.27.2.noarch", "openSUSE Leap 15.3:virtualbox-guest-tools-6.1.34-lp153.2.27.2.x86_64", "openSUSE Leap 15.3:virtualbox-guest-x11-6.1.34-lp153.2.27.2.x86_64", "openSUSE Leap 15.3:virtualbox-host-source-6.1.34-lp153.2.27.2.noarch", "openSUSE Leap 15.3:virtualbox-kmp-default-6.1.34_k5.3.18_150300.59.63-lp153.2.27.1.x86_64", "openSUSE Leap 15.3:virtualbox-kmp-preempt-6.1.34_k5.3.18_150300.59.63-lp153.2.27.1.x86_64", "openSUSE Leap 15.3:virtualbox-qt-6.1.34-lp153.2.27.2.x86_64", "openSUSE Leap 15.3:virtualbox-vnc-6.1.34-lp153.2.27.2.x86_64", "openSUSE Leap 15.3:virtualbox-websrv-6.1.34-lp153.2.27.2.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 6.6, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, products: [ "openSUSE Leap 15.3:busybox-1.34.1-4.9.1.aarch64", "openSUSE Leap 15.3:busybox-1.34.1-4.9.1.ppc64le", "openSUSE Leap 15.3:busybox-1.34.1-4.9.1.s390x", "openSUSE Leap 15.3:busybox-1.34.1-4.9.1.x86_64", "openSUSE Leap 15.3:busybox-static-1.34.1-4.9.1.aarch64", "openSUSE Leap 15.3:busybox-static-1.34.1-4.9.1.ppc64le", "openSUSE Leap 15.3:busybox-static-1.34.1-4.9.1.s390x", "openSUSE Leap 15.3:busybox-static-1.34.1-4.9.1.x86_64", "openSUSE Leap 15.3:python3-virtualbox-6.1.34-lp153.2.27.2.x86_64", "openSUSE Leap 15.3:virtualbox-6.1.34-lp153.2.27.2.x86_64", "openSUSE Leap 15.3:virtualbox-devel-6.1.34-lp153.2.27.2.x86_64", "openSUSE Leap 15.3:virtualbox-guest-desktop-icons-6.1.34-lp153.2.27.2.noarch", "openSUSE Leap 15.3:virtualbox-guest-source-6.1.34-lp153.2.27.2.noarch", "openSUSE Leap 15.3:virtualbox-guest-tools-6.1.34-lp153.2.27.2.x86_64", "openSUSE Leap 15.3:virtualbox-guest-x11-6.1.34-lp153.2.27.2.x86_64", "openSUSE Leap 15.3:virtualbox-host-source-6.1.34-lp153.2.27.2.noarch", "openSUSE Leap 15.3:virtualbox-kmp-default-6.1.34_k5.3.18_150300.59.63-lp153.2.27.1.x86_64", "openSUSE Leap 15.3:virtualbox-kmp-preempt-6.1.34_k5.3.18_150300.59.63-lp153.2.27.1.x86_64", "openSUSE Leap 15.3:virtualbox-qt-6.1.34-lp153.2.27.2.x86_64", "openSUSE Leap 15.3:virtualbox-vnc-6.1.34-lp153.2.27.2.x86_64", "openSUSE Leap 15.3:virtualbox-websrv-6.1.34-lp153.2.27.2.x86_64", ], }, ], threats: [ { category: "impact", date: "2022-01-20T09:04:27Z", details: "moderate", }, ], title: "CVE-2021-42384", }, { cve: "CVE-2021-42385", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2021-42385", }, ], notes: [ { category: "general", text: "A use-after-free in Busybox's awk applet leads to denial of service and possibly code execution when processing a crafted awk pattern in the evaluate function", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Leap 15.3:busybox-1.34.1-4.9.1.aarch64", "openSUSE Leap 15.3:busybox-1.34.1-4.9.1.ppc64le", "openSUSE Leap 15.3:busybox-1.34.1-4.9.1.s390x", "openSUSE Leap 15.3:busybox-1.34.1-4.9.1.x86_64", "openSUSE Leap 15.3:busybox-static-1.34.1-4.9.1.aarch64", "openSUSE Leap 15.3:busybox-static-1.34.1-4.9.1.ppc64le", "openSUSE Leap 15.3:busybox-static-1.34.1-4.9.1.s390x", "openSUSE Leap 15.3:busybox-static-1.34.1-4.9.1.x86_64", "openSUSE Leap 15.3:python3-virtualbox-6.1.34-lp153.2.27.2.x86_64", "openSUSE Leap 15.3:virtualbox-6.1.34-lp153.2.27.2.x86_64", "openSUSE Leap 15.3:virtualbox-devel-6.1.34-lp153.2.27.2.x86_64", "openSUSE Leap 15.3:virtualbox-guest-desktop-icons-6.1.34-lp153.2.27.2.noarch", "openSUSE Leap 15.3:virtualbox-guest-source-6.1.34-lp153.2.27.2.noarch", "openSUSE Leap 15.3:virtualbox-guest-tools-6.1.34-lp153.2.27.2.x86_64", "openSUSE Leap 15.3:virtualbox-guest-x11-6.1.34-lp153.2.27.2.x86_64", "openSUSE Leap 15.3:virtualbox-host-source-6.1.34-lp153.2.27.2.noarch", "openSUSE Leap 15.3:virtualbox-kmp-default-6.1.34_k5.3.18_150300.59.63-lp153.2.27.1.x86_64", "openSUSE Leap 15.3:virtualbox-kmp-preempt-6.1.34_k5.3.18_150300.59.63-lp153.2.27.1.x86_64", "openSUSE Leap 15.3:virtualbox-qt-6.1.34-lp153.2.27.2.x86_64", "openSUSE Leap 15.3:virtualbox-vnc-6.1.34-lp153.2.27.2.x86_64", "openSUSE Leap 15.3:virtualbox-websrv-6.1.34-lp153.2.27.2.x86_64", ], }, references: [ { category: "external", summary: "CVE-2021-42385", url: "https://www.suse.com/security/cve/CVE-2021-42385", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Leap 15.3:busybox-1.34.1-4.9.1.aarch64", "openSUSE Leap 15.3:busybox-1.34.1-4.9.1.ppc64le", "openSUSE Leap 15.3:busybox-1.34.1-4.9.1.s390x", "openSUSE Leap 15.3:busybox-1.34.1-4.9.1.x86_64", "openSUSE Leap 15.3:busybox-static-1.34.1-4.9.1.aarch64", "openSUSE Leap 15.3:busybox-static-1.34.1-4.9.1.ppc64le", "openSUSE Leap 15.3:busybox-static-1.34.1-4.9.1.s390x", "openSUSE Leap 15.3:busybox-static-1.34.1-4.9.1.x86_64", "openSUSE Leap 15.3:python3-virtualbox-6.1.34-lp153.2.27.2.x86_64", "openSUSE Leap 15.3:virtualbox-6.1.34-lp153.2.27.2.x86_64", "openSUSE Leap 15.3:virtualbox-devel-6.1.34-lp153.2.27.2.x86_64", "openSUSE Leap 15.3:virtualbox-guest-desktop-icons-6.1.34-lp153.2.27.2.noarch", "openSUSE Leap 15.3:virtualbox-guest-source-6.1.34-lp153.2.27.2.noarch", "openSUSE Leap 15.3:virtualbox-guest-tools-6.1.34-lp153.2.27.2.x86_64", "openSUSE Leap 15.3:virtualbox-guest-x11-6.1.34-lp153.2.27.2.x86_64", "openSUSE Leap 15.3:virtualbox-host-source-6.1.34-lp153.2.27.2.noarch", "openSUSE Leap 15.3:virtualbox-kmp-default-6.1.34_k5.3.18_150300.59.63-lp153.2.27.1.x86_64", "openSUSE Leap 15.3:virtualbox-kmp-preempt-6.1.34_k5.3.18_150300.59.63-lp153.2.27.1.x86_64", "openSUSE Leap 15.3:virtualbox-qt-6.1.34-lp153.2.27.2.x86_64", "openSUSE Leap 15.3:virtualbox-vnc-6.1.34-lp153.2.27.2.x86_64", "openSUSE Leap 15.3:virtualbox-websrv-6.1.34-lp153.2.27.2.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 6.6, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, products: [ "openSUSE Leap 15.3:busybox-1.34.1-4.9.1.aarch64", "openSUSE Leap 15.3:busybox-1.34.1-4.9.1.ppc64le", "openSUSE Leap 15.3:busybox-1.34.1-4.9.1.s390x", "openSUSE Leap 15.3:busybox-1.34.1-4.9.1.x86_64", "openSUSE Leap 15.3:busybox-static-1.34.1-4.9.1.aarch64", "openSUSE Leap 15.3:busybox-static-1.34.1-4.9.1.ppc64le", "openSUSE Leap 15.3:busybox-static-1.34.1-4.9.1.s390x", "openSUSE Leap 15.3:busybox-static-1.34.1-4.9.1.x86_64", "openSUSE Leap 15.3:python3-virtualbox-6.1.34-lp153.2.27.2.x86_64", "openSUSE Leap 15.3:virtualbox-6.1.34-lp153.2.27.2.x86_64", "openSUSE Leap 15.3:virtualbox-devel-6.1.34-lp153.2.27.2.x86_64", "openSUSE Leap 15.3:virtualbox-guest-desktop-icons-6.1.34-lp153.2.27.2.noarch", "openSUSE Leap 15.3:virtualbox-guest-source-6.1.34-lp153.2.27.2.noarch", "openSUSE Leap 15.3:virtualbox-guest-tools-6.1.34-lp153.2.27.2.x86_64", "openSUSE Leap 15.3:virtualbox-guest-x11-6.1.34-lp153.2.27.2.x86_64", "openSUSE Leap 15.3:virtualbox-host-source-6.1.34-lp153.2.27.2.noarch", "openSUSE Leap 15.3:virtualbox-kmp-default-6.1.34_k5.3.18_150300.59.63-lp153.2.27.1.x86_64", "openSUSE Leap 15.3:virtualbox-kmp-preempt-6.1.34_k5.3.18_150300.59.63-lp153.2.27.1.x86_64", "openSUSE Leap 15.3:virtualbox-qt-6.1.34-lp153.2.27.2.x86_64", "openSUSE Leap 15.3:virtualbox-vnc-6.1.34-lp153.2.27.2.x86_64", "openSUSE Leap 15.3:virtualbox-websrv-6.1.34-lp153.2.27.2.x86_64", ], }, ], threats: [ { category: "impact", date: "2022-01-20T09:04:27Z", details: "moderate", }, ], title: "CVE-2021-42385", }, { cve: "CVE-2021-42386", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2021-42386", }, ], notes: [ { category: "general", text: "A use-after-free in Busybox's awk applet leads to denial of service and possibly code execution when processing a crafted awk pattern in the nvalloc function", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Leap 15.3:busybox-1.34.1-4.9.1.aarch64", "openSUSE Leap 15.3:busybox-1.34.1-4.9.1.ppc64le", "openSUSE Leap 15.3:busybox-1.34.1-4.9.1.s390x", "openSUSE Leap 15.3:busybox-1.34.1-4.9.1.x86_64", "openSUSE Leap 15.3:busybox-static-1.34.1-4.9.1.aarch64", "openSUSE Leap 15.3:busybox-static-1.34.1-4.9.1.ppc64le", "openSUSE Leap 15.3:busybox-static-1.34.1-4.9.1.s390x", "openSUSE Leap 15.3:busybox-static-1.34.1-4.9.1.x86_64", "openSUSE Leap 15.3:python3-virtualbox-6.1.34-lp153.2.27.2.x86_64", "openSUSE Leap 15.3:virtualbox-6.1.34-lp153.2.27.2.x86_64", "openSUSE Leap 15.3:virtualbox-devel-6.1.34-lp153.2.27.2.x86_64", "openSUSE Leap 15.3:virtualbox-guest-desktop-icons-6.1.34-lp153.2.27.2.noarch", "openSUSE Leap 15.3:virtualbox-guest-source-6.1.34-lp153.2.27.2.noarch", "openSUSE Leap 15.3:virtualbox-guest-tools-6.1.34-lp153.2.27.2.x86_64", "openSUSE Leap 15.3:virtualbox-guest-x11-6.1.34-lp153.2.27.2.x86_64", "openSUSE Leap 15.3:virtualbox-host-source-6.1.34-lp153.2.27.2.noarch", "openSUSE Leap 15.3:virtualbox-kmp-default-6.1.34_k5.3.18_150300.59.63-lp153.2.27.1.x86_64", "openSUSE Leap 15.3:virtualbox-kmp-preempt-6.1.34_k5.3.18_150300.59.63-lp153.2.27.1.x86_64", "openSUSE Leap 15.3:virtualbox-qt-6.1.34-lp153.2.27.2.x86_64", "openSUSE Leap 15.3:virtualbox-vnc-6.1.34-lp153.2.27.2.x86_64", "openSUSE Leap 15.3:virtualbox-websrv-6.1.34-lp153.2.27.2.x86_64", ], }, references: [ { category: "external", summary: "CVE-2021-42386", url: "https://www.suse.com/security/cve/CVE-2021-42386", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Leap 15.3:busybox-1.34.1-4.9.1.aarch64", "openSUSE Leap 15.3:busybox-1.34.1-4.9.1.ppc64le", "openSUSE Leap 15.3:busybox-1.34.1-4.9.1.s390x", "openSUSE Leap 15.3:busybox-1.34.1-4.9.1.x86_64", "openSUSE Leap 15.3:busybox-static-1.34.1-4.9.1.aarch64", "openSUSE Leap 15.3:busybox-static-1.34.1-4.9.1.ppc64le", "openSUSE Leap 15.3:busybox-static-1.34.1-4.9.1.s390x", "openSUSE Leap 15.3:busybox-static-1.34.1-4.9.1.x86_64", "openSUSE Leap 15.3:python3-virtualbox-6.1.34-lp153.2.27.2.x86_64", "openSUSE Leap 15.3:virtualbox-6.1.34-lp153.2.27.2.x86_64", "openSUSE Leap 15.3:virtualbox-devel-6.1.34-lp153.2.27.2.x86_64", "openSUSE Leap 15.3:virtualbox-guest-desktop-icons-6.1.34-lp153.2.27.2.noarch", "openSUSE Leap 15.3:virtualbox-guest-source-6.1.34-lp153.2.27.2.noarch", "openSUSE Leap 15.3:virtualbox-guest-tools-6.1.34-lp153.2.27.2.x86_64", "openSUSE Leap 15.3:virtualbox-guest-x11-6.1.34-lp153.2.27.2.x86_64", "openSUSE Leap 15.3:virtualbox-host-source-6.1.34-lp153.2.27.2.noarch", "openSUSE Leap 15.3:virtualbox-kmp-default-6.1.34_k5.3.18_150300.59.63-lp153.2.27.1.x86_64", "openSUSE Leap 15.3:virtualbox-kmp-preempt-6.1.34_k5.3.18_150300.59.63-lp153.2.27.1.x86_64", "openSUSE Leap 15.3:virtualbox-qt-6.1.34-lp153.2.27.2.x86_64", "openSUSE Leap 15.3:virtualbox-vnc-6.1.34-lp153.2.27.2.x86_64", "openSUSE Leap 15.3:virtualbox-websrv-6.1.34-lp153.2.27.2.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 6.6, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, products: [ "openSUSE Leap 15.3:busybox-1.34.1-4.9.1.aarch64", "openSUSE Leap 15.3:busybox-1.34.1-4.9.1.ppc64le", "openSUSE Leap 15.3:busybox-1.34.1-4.9.1.s390x", "openSUSE Leap 15.3:busybox-1.34.1-4.9.1.x86_64", "openSUSE Leap 15.3:busybox-static-1.34.1-4.9.1.aarch64", "openSUSE Leap 15.3:busybox-static-1.34.1-4.9.1.ppc64le", "openSUSE Leap 15.3:busybox-static-1.34.1-4.9.1.s390x", "openSUSE Leap 15.3:busybox-static-1.34.1-4.9.1.x86_64", "openSUSE Leap 15.3:python3-virtualbox-6.1.34-lp153.2.27.2.x86_64", "openSUSE Leap 15.3:virtualbox-6.1.34-lp153.2.27.2.x86_64", "openSUSE Leap 15.3:virtualbox-devel-6.1.34-lp153.2.27.2.x86_64", "openSUSE Leap 15.3:virtualbox-guest-desktop-icons-6.1.34-lp153.2.27.2.noarch", "openSUSE Leap 15.3:virtualbox-guest-source-6.1.34-lp153.2.27.2.noarch", "openSUSE Leap 15.3:virtualbox-guest-tools-6.1.34-lp153.2.27.2.x86_64", "openSUSE Leap 15.3:virtualbox-guest-x11-6.1.34-lp153.2.27.2.x86_64", "openSUSE Leap 15.3:virtualbox-host-source-6.1.34-lp153.2.27.2.noarch", "openSUSE Leap 15.3:virtualbox-kmp-default-6.1.34_k5.3.18_150300.59.63-lp153.2.27.1.x86_64", "openSUSE Leap 15.3:virtualbox-kmp-preempt-6.1.34_k5.3.18_150300.59.63-lp153.2.27.1.x86_64", "openSUSE Leap 15.3:virtualbox-qt-6.1.34-lp153.2.27.2.x86_64", "openSUSE Leap 15.3:virtualbox-vnc-6.1.34-lp153.2.27.2.x86_64", "openSUSE Leap 15.3:virtualbox-websrv-6.1.34-lp153.2.27.2.x86_64", ], }, ], threats: [ { category: "impact", date: "2022-01-20T09:04:27Z", details: "moderate", }, ], title: "CVE-2021-42386", }, ], }
opensuse-su-2021:3531-1
Vulnerability from csaf_opensuse
Published
2021-10-27 08:07
Modified
2021-10-27 08:07
Summary
Security update for busybox
Notes
Title of the patch
Security update for busybox
Description of the patch
This update for busybox fixes the following issues:
- CVE-2021-28831: Fixed invalid free or segmentation fault via malformed gzip data (bsc#1184522).
- CVE-2018-20679: Fixed out of bounds read in udhcp (bsc#1121426).
- CVE-2018-1000517: Fixed buffer overflow in the retrieve_file_data() (bsc#1099260).
- CVE-2011-5325: Fixed a directory traversal related to 'tar' command (bsc#951562).
- CVE-2018-1000500: Fixed missing SSL certificate validation related to the 'wget' command (bsc#1099263).
Patchnames
openSUSE-SLE-15.3-2021-3531
Terms of use
CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
{ document: { aggregate_severity: { namespace: "https://www.suse.com/support/security/rating/", text: "important", }, category: "csaf_security_advisory", csaf_version: "2.0", distribution: { text: "Copyright 2024 SUSE LLC. All rights reserved.", tlp: { label: "WHITE", url: "https://www.first.org/tlp/", }, }, lang: "en", notes: [ { category: "summary", text: "Security update for busybox", title: "Title of the patch", }, { category: "description", text: "This update for busybox fixes the following issues:\n\n- CVE-2021-28831: Fixed invalid free or segmentation fault via malformed gzip data (bsc#1184522).\n- CVE-2018-20679: Fixed out of bounds read in udhcp (bsc#1121426).\n- CVE-2018-1000517: Fixed buffer overflow in the retrieve_file_data() (bsc#1099260).\n- CVE-2011-5325: Fixed a directory traversal related to 'tar' command (bsc#951562).\n- CVE-2018-1000500: Fixed missing SSL certificate validation related to the 'wget' command (bsc#1099263).\n", title: "Description of the patch", }, { category: "details", text: "openSUSE-SLE-15.3-2021-3531", title: "Patchnames", }, { category: "legal_disclaimer", text: "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", title: "Terms of use", }, ], publisher: { category: "vendor", contact_details: "https://www.suse.com/support/security/contact/", name: "SUSE Product Security Team", namespace: "https://www.suse.com/", }, references: [ { category: "external", summary: "SUSE ratings", url: "https://www.suse.com/support/security/rating/", }, { category: "self", summary: "URL of this CSAF notice", url: "https://ftp.suse.com/pub/projects/security/csaf/opensuse-su-2021_3531-1.json", }, { category: "self", summary: "URL for openSUSE-SU-2021:3531-1", url: "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/EXGVAQ34C33F4R3O65TKB73FYUDCIM6B/", }, { category: "self", summary: "E-Mail link for openSUSE-SU-2021:3531-1", url: "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/EXGVAQ34C33F4R3O65TKB73FYUDCIM6B/", }, { category: "self", summary: "SUSE Bug 1099260", url: "https://bugzilla.suse.com/1099260", }, { category: "self", summary: "SUSE Bug 1099263", url: "https://bugzilla.suse.com/1099263", }, { category: "self", summary: "SUSE Bug 1121426", url: "https://bugzilla.suse.com/1121426", }, { category: "self", summary: "SUSE Bug 1184522", url: "https://bugzilla.suse.com/1184522", }, { category: "self", summary: "SUSE Bug 951562", url: "https://bugzilla.suse.com/951562", }, { category: "self", summary: "SUSE CVE CVE-2011-5325 page", url: "https://www.suse.com/security/cve/CVE-2011-5325/", }, { category: "self", summary: "SUSE CVE CVE-2018-1000500 page", url: "https://www.suse.com/security/cve/CVE-2018-1000500/", }, { category: "self", summary: "SUSE CVE CVE-2018-1000517 page", url: "https://www.suse.com/security/cve/CVE-2018-1000517/", }, { category: "self", summary: "SUSE CVE CVE-2018-20679 page", url: "https://www.suse.com/security/cve/CVE-2018-20679/", }, { category: "self", summary: "SUSE CVE CVE-2021-28831 page", url: "https://www.suse.com/security/cve/CVE-2021-28831/", }, ], title: "Security update for busybox", tracking: { current_release_date: "2021-10-27T08:07:47Z", generator: { date: "2021-10-27T08:07:47Z", engine: { name: "cve-database.git:bin/generate-csaf.pl", version: "1", }, }, id: "openSUSE-SU-2021:3531-1", initial_release_date: "2021-10-27T08:07:47Z", revision_history: [ { date: "2021-10-27T08:07:47Z", number: "1", summary: "Current version", }, ], status: "final", version: "1", }, }, product_tree: { branches: [ { branches: [ { branches: [ { category: "product_version", name: "busybox-1.26.2-4.5.1.aarch64", product: { name: "busybox-1.26.2-4.5.1.aarch64", product_id: "busybox-1.26.2-4.5.1.aarch64", }, }, { category: "product_version", name: "busybox-static-1.26.2-4.5.1.aarch64", product: { name: "busybox-static-1.26.2-4.5.1.aarch64", product_id: "busybox-static-1.26.2-4.5.1.aarch64", }, }, ], category: "architecture", name: "aarch64", }, { branches: [ { category: "product_version", name: "busybox-1.26.2-4.5.1.ppc64le", product: { name: "busybox-1.26.2-4.5.1.ppc64le", product_id: "busybox-1.26.2-4.5.1.ppc64le", }, }, { category: "product_version", name: "busybox-static-1.26.2-4.5.1.ppc64le", product: { name: "busybox-static-1.26.2-4.5.1.ppc64le", product_id: "busybox-static-1.26.2-4.5.1.ppc64le", }, }, ], category: "architecture", name: "ppc64le", }, { branches: [ { category: "product_version", name: "busybox-1.26.2-4.5.1.s390x", product: { name: "busybox-1.26.2-4.5.1.s390x", product_id: "busybox-1.26.2-4.5.1.s390x", }, }, { category: "product_version", name: "busybox-static-1.26.2-4.5.1.s390x", product: { name: "busybox-static-1.26.2-4.5.1.s390x", product_id: "busybox-static-1.26.2-4.5.1.s390x", }, }, ], category: "architecture", name: "s390x", }, { branches: [ { category: "product_version", name: "busybox-1.26.2-4.5.1.x86_64", product: { name: "busybox-1.26.2-4.5.1.x86_64", product_id: "busybox-1.26.2-4.5.1.x86_64", }, }, { category: "product_version", name: "busybox-static-1.26.2-4.5.1.x86_64", product: { name: "busybox-static-1.26.2-4.5.1.x86_64", product_id: "busybox-static-1.26.2-4.5.1.x86_64", }, }, ], category: "architecture", name: "x86_64", }, { branches: [ { category: "product_name", name: "openSUSE Leap 15.3", product: { name: "openSUSE Leap 15.3", product_id: "openSUSE Leap 15.3", product_identification_helper: { cpe: "cpe:/o:opensuse:leap:15.3", }, }, }, ], category: "product_family", name: "SUSE Linux Enterprise", }, ], category: "vendor", name: "SUSE", }, ], relationships: [ { category: "default_component_of", full_product_name: { name: "busybox-1.26.2-4.5.1.aarch64 as component of openSUSE Leap 15.3", product_id: "openSUSE Leap 15.3:busybox-1.26.2-4.5.1.aarch64", }, product_reference: "busybox-1.26.2-4.5.1.aarch64", relates_to_product_reference: "openSUSE Leap 15.3", }, { category: "default_component_of", full_product_name: { name: "busybox-1.26.2-4.5.1.ppc64le as component of openSUSE Leap 15.3", product_id: "openSUSE Leap 15.3:busybox-1.26.2-4.5.1.ppc64le", }, product_reference: "busybox-1.26.2-4.5.1.ppc64le", relates_to_product_reference: "openSUSE Leap 15.3", }, { category: "default_component_of", full_product_name: { name: "busybox-1.26.2-4.5.1.s390x as component of openSUSE Leap 15.3", product_id: "openSUSE Leap 15.3:busybox-1.26.2-4.5.1.s390x", }, product_reference: "busybox-1.26.2-4.5.1.s390x", relates_to_product_reference: "openSUSE Leap 15.3", }, { category: "default_component_of", full_product_name: { name: "busybox-1.26.2-4.5.1.x86_64 as component of openSUSE Leap 15.3", product_id: "openSUSE Leap 15.3:busybox-1.26.2-4.5.1.x86_64", }, product_reference: "busybox-1.26.2-4.5.1.x86_64", relates_to_product_reference: "openSUSE Leap 15.3", }, { category: "default_component_of", full_product_name: { name: "busybox-static-1.26.2-4.5.1.aarch64 as component of openSUSE Leap 15.3", product_id: "openSUSE Leap 15.3:busybox-static-1.26.2-4.5.1.aarch64", }, product_reference: "busybox-static-1.26.2-4.5.1.aarch64", relates_to_product_reference: "openSUSE Leap 15.3", }, { category: "default_component_of", full_product_name: { name: "busybox-static-1.26.2-4.5.1.ppc64le as component of openSUSE Leap 15.3", product_id: "openSUSE Leap 15.3:busybox-static-1.26.2-4.5.1.ppc64le", }, product_reference: "busybox-static-1.26.2-4.5.1.ppc64le", relates_to_product_reference: "openSUSE Leap 15.3", }, { category: "default_component_of", full_product_name: { name: "busybox-static-1.26.2-4.5.1.s390x as component of openSUSE Leap 15.3", product_id: "openSUSE Leap 15.3:busybox-static-1.26.2-4.5.1.s390x", }, product_reference: "busybox-static-1.26.2-4.5.1.s390x", relates_to_product_reference: "openSUSE Leap 15.3", }, { category: "default_component_of", full_product_name: { name: "busybox-static-1.26.2-4.5.1.x86_64 as component of openSUSE Leap 15.3", product_id: "openSUSE Leap 15.3:busybox-static-1.26.2-4.5.1.x86_64", }, product_reference: "busybox-static-1.26.2-4.5.1.x86_64", relates_to_product_reference: "openSUSE Leap 15.3", }, ], }, vulnerabilities: [ { cve: "CVE-2011-5325", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2011-5325", }, ], notes: [ { category: "general", text: "Directory traversal vulnerability in the BusyBox implementation of tar before 1.22.0 v5 allows remote attackers to point to files outside the current working directory via a symlink.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Leap 15.3:busybox-1.26.2-4.5.1.aarch64", "openSUSE Leap 15.3:busybox-1.26.2-4.5.1.ppc64le", "openSUSE Leap 15.3:busybox-1.26.2-4.5.1.s390x", "openSUSE Leap 15.3:busybox-1.26.2-4.5.1.x86_64", "openSUSE Leap 15.3:busybox-static-1.26.2-4.5.1.aarch64", "openSUSE Leap 15.3:busybox-static-1.26.2-4.5.1.ppc64le", "openSUSE Leap 15.3:busybox-static-1.26.2-4.5.1.s390x", "openSUSE Leap 15.3:busybox-static-1.26.2-4.5.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2011-5325", url: "https://www.suse.com/security/cve/CVE-2011-5325", }, { category: "external", summary: "SUSE Bug 951562 for CVE-2011-5325", url: "https://bugzilla.suse.com/951562", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Leap 15.3:busybox-1.26.2-4.5.1.aarch64", "openSUSE Leap 15.3:busybox-1.26.2-4.5.1.ppc64le", "openSUSE Leap 15.3:busybox-1.26.2-4.5.1.s390x", "openSUSE Leap 15.3:busybox-1.26.2-4.5.1.x86_64", "openSUSE Leap 15.3:busybox-static-1.26.2-4.5.1.aarch64", "openSUSE Leap 15.3:busybox-static-1.26.2-4.5.1.ppc64le", "openSUSE Leap 15.3:busybox-static-1.26.2-4.5.1.s390x", "openSUSE Leap 15.3:busybox-static-1.26.2-4.5.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 7.5, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N", version: "3.1", }, products: [ "openSUSE Leap 15.3:busybox-1.26.2-4.5.1.aarch64", "openSUSE Leap 15.3:busybox-1.26.2-4.5.1.ppc64le", "openSUSE Leap 15.3:busybox-1.26.2-4.5.1.s390x", "openSUSE Leap 15.3:busybox-1.26.2-4.5.1.x86_64", "openSUSE Leap 15.3:busybox-static-1.26.2-4.5.1.aarch64", "openSUSE Leap 15.3:busybox-static-1.26.2-4.5.1.ppc64le", "openSUSE Leap 15.3:busybox-static-1.26.2-4.5.1.s390x", "openSUSE Leap 15.3:busybox-static-1.26.2-4.5.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2021-10-27T08:07:47Z", details: "moderate", }, ], title: "CVE-2011-5325", }, { cve: "CVE-2018-1000500", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2018-1000500", }, ], notes: [ { category: "general", text: "Busybox contains a Missing SSL certificate validation vulnerability in The \"busybox wget\" applet that can result in arbitrary code execution. This attack appear to be exploitable via Simply download any file over HTTPS using \"busybox wget https://compromised-domain.com/important-file\".", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Leap 15.3:busybox-1.26.2-4.5.1.aarch64", "openSUSE Leap 15.3:busybox-1.26.2-4.5.1.ppc64le", "openSUSE Leap 15.3:busybox-1.26.2-4.5.1.s390x", "openSUSE Leap 15.3:busybox-1.26.2-4.5.1.x86_64", "openSUSE Leap 15.3:busybox-static-1.26.2-4.5.1.aarch64", "openSUSE Leap 15.3:busybox-static-1.26.2-4.5.1.ppc64le", "openSUSE Leap 15.3:busybox-static-1.26.2-4.5.1.s390x", "openSUSE Leap 15.3:busybox-static-1.26.2-4.5.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2018-1000500", url: "https://www.suse.com/security/cve/CVE-2018-1000500", }, { category: "external", summary: "SUSE Bug 1099263 for CVE-2018-1000500", url: "https://bugzilla.suse.com/1099263", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Leap 15.3:busybox-1.26.2-4.5.1.aarch64", "openSUSE Leap 15.3:busybox-1.26.2-4.5.1.ppc64le", "openSUSE Leap 15.3:busybox-1.26.2-4.5.1.s390x", "openSUSE Leap 15.3:busybox-1.26.2-4.5.1.x86_64", "openSUSE Leap 15.3:busybox-static-1.26.2-4.5.1.aarch64", "openSUSE Leap 15.3:busybox-static-1.26.2-4.5.1.ppc64le", "openSUSE Leap 15.3:busybox-static-1.26.2-4.5.1.s390x", "openSUSE Leap 15.3:busybox-static-1.26.2-4.5.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 7.5, baseSeverity: "HIGH", vectorString: "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N", version: "3.0", }, products: [ "openSUSE Leap 15.3:busybox-1.26.2-4.5.1.aarch64", "openSUSE Leap 15.3:busybox-1.26.2-4.5.1.ppc64le", "openSUSE Leap 15.3:busybox-1.26.2-4.5.1.s390x", "openSUSE Leap 15.3:busybox-1.26.2-4.5.1.x86_64", "openSUSE Leap 15.3:busybox-static-1.26.2-4.5.1.aarch64", "openSUSE Leap 15.3:busybox-static-1.26.2-4.5.1.ppc64le", "openSUSE Leap 15.3:busybox-static-1.26.2-4.5.1.s390x", "openSUSE Leap 15.3:busybox-static-1.26.2-4.5.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2021-10-27T08:07:47Z", details: "important", }, ], title: "CVE-2018-1000500", }, { cve: "CVE-2018-1000517", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2018-1000517", }, ], notes: [ { category: "general", text: "BusyBox project BusyBox wget version prior to commit 8e2174e9bd836e53c8b9c6e00d1bc6e2a718686e contains a Buffer Overflow vulnerability in Busybox wget that can result in heap buffer overflow. This attack appear to be exploitable via network connectivity. This vulnerability appears to have been fixed in after commit 8e2174e9bd836e53c8b9c6e00d1bc6e2a718686e.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Leap 15.3:busybox-1.26.2-4.5.1.aarch64", "openSUSE Leap 15.3:busybox-1.26.2-4.5.1.ppc64le", "openSUSE Leap 15.3:busybox-1.26.2-4.5.1.s390x", "openSUSE Leap 15.3:busybox-1.26.2-4.5.1.x86_64", "openSUSE Leap 15.3:busybox-static-1.26.2-4.5.1.aarch64", "openSUSE Leap 15.3:busybox-static-1.26.2-4.5.1.ppc64le", "openSUSE Leap 15.3:busybox-static-1.26.2-4.5.1.s390x", "openSUSE Leap 15.3:busybox-static-1.26.2-4.5.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2018-1000517", url: "https://www.suse.com/security/cve/CVE-2018-1000517", }, { category: "external", summary: "SUSE Bug 1099260 for CVE-2018-1000517", url: "https://bugzilla.suse.com/1099260", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Leap 15.3:busybox-1.26.2-4.5.1.aarch64", "openSUSE Leap 15.3:busybox-1.26.2-4.5.1.ppc64le", "openSUSE Leap 15.3:busybox-1.26.2-4.5.1.s390x", "openSUSE Leap 15.3:busybox-1.26.2-4.5.1.x86_64", "openSUSE Leap 15.3:busybox-static-1.26.2-4.5.1.aarch64", "openSUSE Leap 15.3:busybox-static-1.26.2-4.5.1.ppc64le", "openSUSE Leap 15.3:busybox-static-1.26.2-4.5.1.s390x", "openSUSE Leap 15.3:busybox-static-1.26.2-4.5.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.6, baseSeverity: "MEDIUM", vectorString: "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L", version: "3.0", }, products: [ "openSUSE Leap 15.3:busybox-1.26.2-4.5.1.aarch64", "openSUSE Leap 15.3:busybox-1.26.2-4.5.1.ppc64le", "openSUSE Leap 15.3:busybox-1.26.2-4.5.1.s390x", "openSUSE Leap 15.3:busybox-1.26.2-4.5.1.x86_64", "openSUSE Leap 15.3:busybox-static-1.26.2-4.5.1.aarch64", "openSUSE Leap 15.3:busybox-static-1.26.2-4.5.1.ppc64le", "openSUSE Leap 15.3:busybox-static-1.26.2-4.5.1.s390x", "openSUSE Leap 15.3:busybox-static-1.26.2-4.5.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2021-10-27T08:07:47Z", details: "important", }, ], title: "CVE-2018-1000517", }, { cve: "CVE-2018-20679", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2018-20679", }, ], notes: [ { category: "general", text: "An issue was discovered in BusyBox before 1.30.0. An out of bounds read in udhcp components (consumed by the DHCP server, client, and relay) allows a remote attacker to leak sensitive information from the stack by sending a crafted DHCP message. This is related to verification in udhcp_get_option() in networking/udhcp/common.c that 4-byte options are indeed 4 bytes.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Leap 15.3:busybox-1.26.2-4.5.1.aarch64", "openSUSE Leap 15.3:busybox-1.26.2-4.5.1.ppc64le", "openSUSE Leap 15.3:busybox-1.26.2-4.5.1.s390x", "openSUSE Leap 15.3:busybox-1.26.2-4.5.1.x86_64", "openSUSE Leap 15.3:busybox-static-1.26.2-4.5.1.aarch64", "openSUSE Leap 15.3:busybox-static-1.26.2-4.5.1.ppc64le", "openSUSE Leap 15.3:busybox-static-1.26.2-4.5.1.s390x", "openSUSE Leap 15.3:busybox-static-1.26.2-4.5.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2018-20679", url: "https://www.suse.com/security/cve/CVE-2018-20679", }, { category: "external", summary: "SUSE Bug 1121426 for CVE-2018-20679", url: "https://bugzilla.suse.com/1121426", }, { category: "external", summary: "SUSE Bug 1121428 for CVE-2018-20679", url: "https://bugzilla.suse.com/1121428", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Leap 15.3:busybox-1.26.2-4.5.1.aarch64", "openSUSE Leap 15.3:busybox-1.26.2-4.5.1.ppc64le", "openSUSE Leap 15.3:busybox-1.26.2-4.5.1.s390x", "openSUSE Leap 15.3:busybox-1.26.2-4.5.1.x86_64", "openSUSE Leap 15.3:busybox-static-1.26.2-4.5.1.aarch64", "openSUSE Leap 15.3:busybox-static-1.26.2-4.5.1.ppc64le", "openSUSE Leap 15.3:busybox-static-1.26.2-4.5.1.s390x", "openSUSE Leap 15.3:busybox-static-1.26.2-4.5.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.3, baseSeverity: "MEDIUM", vectorString: "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N", version: "3.0", }, products: [ "openSUSE Leap 15.3:busybox-1.26.2-4.5.1.aarch64", "openSUSE Leap 15.3:busybox-1.26.2-4.5.1.ppc64le", "openSUSE Leap 15.3:busybox-1.26.2-4.5.1.s390x", "openSUSE Leap 15.3:busybox-1.26.2-4.5.1.x86_64", "openSUSE Leap 15.3:busybox-static-1.26.2-4.5.1.aarch64", "openSUSE Leap 15.3:busybox-static-1.26.2-4.5.1.ppc64le", "openSUSE Leap 15.3:busybox-static-1.26.2-4.5.1.s390x", "openSUSE Leap 15.3:busybox-static-1.26.2-4.5.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2021-10-27T08:07:47Z", details: "moderate", }, ], title: "CVE-2018-20679", }, { cve: "CVE-2021-28831", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2021-28831", }, ], notes: [ { category: "general", text: "decompress_gunzip.c in BusyBox through 1.32.1 mishandles the error bit on the huft_build result pointer, with a resultant invalid free or segmentation fault, via malformed gzip data.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Leap 15.3:busybox-1.26.2-4.5.1.aarch64", "openSUSE Leap 15.3:busybox-1.26.2-4.5.1.ppc64le", "openSUSE Leap 15.3:busybox-1.26.2-4.5.1.s390x", "openSUSE Leap 15.3:busybox-1.26.2-4.5.1.x86_64", "openSUSE Leap 15.3:busybox-static-1.26.2-4.5.1.aarch64", "openSUSE Leap 15.3:busybox-static-1.26.2-4.5.1.ppc64le", "openSUSE Leap 15.3:busybox-static-1.26.2-4.5.1.s390x", "openSUSE Leap 15.3:busybox-static-1.26.2-4.5.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2021-28831", url: "https://www.suse.com/security/cve/CVE-2021-28831", }, { category: "external", summary: "SUSE Bug 1184522 for CVE-2021-28831", url: "https://bugzilla.suse.com/1184522", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Leap 15.3:busybox-1.26.2-4.5.1.aarch64", "openSUSE Leap 15.3:busybox-1.26.2-4.5.1.ppc64le", "openSUSE Leap 15.3:busybox-1.26.2-4.5.1.s390x", "openSUSE Leap 15.3:busybox-1.26.2-4.5.1.x86_64", "openSUSE Leap 15.3:busybox-static-1.26.2-4.5.1.aarch64", "openSUSE Leap 15.3:busybox-static-1.26.2-4.5.1.ppc64le", "openSUSE Leap 15.3:busybox-static-1.26.2-4.5.1.s390x", "openSUSE Leap 15.3:busybox-static-1.26.2-4.5.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 7.5, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "openSUSE Leap 15.3:busybox-1.26.2-4.5.1.aarch64", "openSUSE Leap 15.3:busybox-1.26.2-4.5.1.ppc64le", "openSUSE Leap 15.3:busybox-1.26.2-4.5.1.s390x", "openSUSE Leap 15.3:busybox-1.26.2-4.5.1.x86_64", "openSUSE Leap 15.3:busybox-static-1.26.2-4.5.1.aarch64", "openSUSE Leap 15.3:busybox-static-1.26.2-4.5.1.ppc64le", "openSUSE Leap 15.3:busybox-static-1.26.2-4.5.1.s390x", "openSUSE Leap 15.3:busybox-static-1.26.2-4.5.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2021-10-27T08:07:47Z", details: "important", }, ], title: "CVE-2021-28831", }, ], }
opensuse-su-2024:11738-1
Vulnerability from csaf_opensuse
Published
2024-06-15 00:00
Modified
2024-06-15 00:00
Summary
busybox-1.35.0-1.1 on GA media
Notes
Title of the patch
busybox-1.35.0-1.1 on GA media
Description of the patch
These are all security issues fixed in the busybox-1.35.0-1.1 package on the GA media of openSUSE Tumbleweed.
Patchnames
openSUSE-Tumbleweed-2024-11738
Terms of use
CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
{ document: { aggregate_severity: { namespace: "https://www.suse.com/support/security/rating/", text: "moderate", }, category: "csaf_security_advisory", csaf_version: "2.0", distribution: { text: "Copyright 2024 SUSE LLC. All rights reserved.", tlp: { label: "WHITE", url: "https://www.first.org/tlp/", }, }, lang: "en", notes: [ { category: "summary", text: "busybox-1.35.0-1.1 on GA media", title: "Title of the patch", }, { category: "description", text: "These are all security issues fixed in the busybox-1.35.0-1.1 package on the GA media of openSUSE Tumbleweed.", title: "Description of the patch", }, { category: "details", text: "openSUSE-Tumbleweed-2024-11738", title: "Patchnames", }, { category: "legal_disclaimer", text: "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", title: "Terms of use", }, ], publisher: { category: "vendor", contact_details: "https://www.suse.com/support/security/contact/", name: "SUSE Product Security Team", namespace: "https://www.suse.com/", }, references: [ { category: "external", summary: "SUSE ratings", url: "https://www.suse.com/support/security/rating/", }, { category: "self", summary: "URL of this CSAF notice", url: "https://ftp.suse.com/pub/projects/security/csaf/opensuse-su-2024_11738-1.json", }, { category: "self", summary: "SUSE CVE CVE-2011-5325 page", url: "https://www.suse.com/security/cve/CVE-2011-5325/", }, { category: "self", summary: "SUSE CVE CVE-2015-9261 page", url: "https://www.suse.com/security/cve/CVE-2015-9261/", }, { category: "self", summary: "SUSE CVE CVE-2016-2147 page", url: "https://www.suse.com/security/cve/CVE-2016-2147/", }, { category: "self", summary: "SUSE CVE CVE-2016-2148 page", url: "https://www.suse.com/security/cve/CVE-2016-2148/", }, { category: "self", summary: "SUSE CVE CVE-2016-6301 page", url: "https://www.suse.com/security/cve/CVE-2016-6301/", }, { category: "self", summary: "SUSE CVE CVE-2017-15873 page", url: "https://www.suse.com/security/cve/CVE-2017-15873/", }, { category: "self", summary: "SUSE CVE CVE-2017-15874 page", url: "https://www.suse.com/security/cve/CVE-2017-15874/", }, { category: "self", summary: "SUSE CVE CVE-2017-16544 page", url: "https://www.suse.com/security/cve/CVE-2017-16544/", }, { category: "self", summary: "SUSE CVE CVE-2018-1000500 page", url: "https://www.suse.com/security/cve/CVE-2018-1000500/", }, { category: "self", summary: "SUSE CVE CVE-2018-1000517 page", url: "https://www.suse.com/security/cve/CVE-2018-1000517/", }, { category: "self", summary: "SUSE CVE CVE-2018-20679 page", url: "https://www.suse.com/security/cve/CVE-2018-20679/", }, { category: "self", summary: "SUSE CVE CVE-2019-5747 page", url: "https://www.suse.com/security/cve/CVE-2019-5747/", }, { category: "self", summary: "SUSE CVE CVE-2021-28831 page", url: "https://www.suse.com/security/cve/CVE-2021-28831/", }, { category: "self", summary: "SUSE CVE CVE-2021-42373 page", url: "https://www.suse.com/security/cve/CVE-2021-42373/", }, { category: "self", summary: "SUSE CVE CVE-2021-42377 page", url: "https://www.suse.com/security/cve/CVE-2021-42377/", }, { category: "self", summary: "SUSE CVE CVE-2021-42381 page", url: "https://www.suse.com/security/cve/CVE-2021-42381/", }, { category: "self", summary: "SUSE CVE CVE-2021-42385 page", url: "https://www.suse.com/security/cve/CVE-2021-42385/", }, ], title: "busybox-1.35.0-1.1 on GA media", tracking: { current_release_date: "2024-06-15T00:00:00Z", generator: { date: "2024-06-15T00:00:00Z", engine: { name: "cve-database.git:bin/generate-csaf.pl", version: "1", }, }, id: "openSUSE-SU-2024:11738-1", initial_release_date: "2024-06-15T00:00:00Z", revision_history: [ { date: "2024-06-15T00:00:00Z", number: "1", summary: "Current version", }, ], status: "final", version: "1", }, }, product_tree: { branches: [ { branches: [ { branches: [ { category: "product_version", name: "busybox-1.35.0-1.1.aarch64", product: { name: "busybox-1.35.0-1.1.aarch64", product_id: "busybox-1.35.0-1.1.aarch64", }, }, { category: "product_version", name: "busybox-static-1.35.0-1.1.aarch64", product: { name: "busybox-static-1.35.0-1.1.aarch64", product_id: "busybox-static-1.35.0-1.1.aarch64", }, }, { category: "product_version", name: "busybox-testsuite-1.35.0-1.1.aarch64", product: { name: "busybox-testsuite-1.35.0-1.1.aarch64", product_id: "busybox-testsuite-1.35.0-1.1.aarch64", }, }, { category: "product_version", name: "busybox-warewulf3-1.35.0-1.1.aarch64", product: { name: "busybox-warewulf3-1.35.0-1.1.aarch64", product_id: "busybox-warewulf3-1.35.0-1.1.aarch64", }, }, ], category: "architecture", name: "aarch64", }, { branches: [ { category: "product_version", name: "busybox-1.35.0-1.1.ppc64le", product: { name: "busybox-1.35.0-1.1.ppc64le", product_id: "busybox-1.35.0-1.1.ppc64le", }, }, { category: "product_version", name: "busybox-static-1.35.0-1.1.ppc64le", product: { name: "busybox-static-1.35.0-1.1.ppc64le", product_id: "busybox-static-1.35.0-1.1.ppc64le", }, }, { category: "product_version", name: "busybox-testsuite-1.35.0-1.1.ppc64le", product: { name: "busybox-testsuite-1.35.0-1.1.ppc64le", product_id: "busybox-testsuite-1.35.0-1.1.ppc64le", }, }, { category: "product_version", name: "busybox-warewulf3-1.35.0-1.1.ppc64le", product: { name: "busybox-warewulf3-1.35.0-1.1.ppc64le", product_id: "busybox-warewulf3-1.35.0-1.1.ppc64le", }, }, ], category: "architecture", name: "ppc64le", }, { branches: [ { category: "product_version", name: "busybox-1.35.0-1.1.s390x", product: { name: "busybox-1.35.0-1.1.s390x", product_id: "busybox-1.35.0-1.1.s390x", }, }, { category: "product_version", name: "busybox-static-1.35.0-1.1.s390x", product: { name: "busybox-static-1.35.0-1.1.s390x", product_id: "busybox-static-1.35.0-1.1.s390x", }, }, { category: "product_version", name: "busybox-testsuite-1.35.0-1.1.s390x", product: { name: "busybox-testsuite-1.35.0-1.1.s390x", product_id: "busybox-testsuite-1.35.0-1.1.s390x", }, }, { category: "product_version", name: "busybox-warewulf3-1.35.0-1.1.s390x", product: { name: "busybox-warewulf3-1.35.0-1.1.s390x", product_id: "busybox-warewulf3-1.35.0-1.1.s390x", }, }, ], category: "architecture", name: "s390x", }, { branches: [ { category: "product_version", name: "busybox-1.35.0-1.1.x86_64", product: { name: "busybox-1.35.0-1.1.x86_64", product_id: "busybox-1.35.0-1.1.x86_64", }, }, { category: "product_version", name: "busybox-static-1.35.0-1.1.x86_64", product: { name: "busybox-static-1.35.0-1.1.x86_64", product_id: "busybox-static-1.35.0-1.1.x86_64", }, }, { category: "product_version", name: "busybox-testsuite-1.35.0-1.1.x86_64", product: { name: "busybox-testsuite-1.35.0-1.1.x86_64", product_id: "busybox-testsuite-1.35.0-1.1.x86_64", }, }, { category: "product_version", name: "busybox-warewulf3-1.35.0-1.1.x86_64", product: { name: "busybox-warewulf3-1.35.0-1.1.x86_64", product_id: "busybox-warewulf3-1.35.0-1.1.x86_64", }, }, ], category: "architecture", name: "x86_64", }, { branches: [ { category: "product_name", name: "openSUSE Tumbleweed", product: { name: "openSUSE Tumbleweed", product_id: "openSUSE Tumbleweed", product_identification_helper: { cpe: "cpe:/o:opensuse:tumbleweed", }, }, }, ], category: "product_family", name: "SUSE Linux Enterprise", }, ], category: "vendor", name: "SUSE", }, ], relationships: [ { category: "default_component_of", full_product_name: { name: "busybox-1.35.0-1.1.aarch64 as component of openSUSE Tumbleweed", product_id: "openSUSE Tumbleweed:busybox-1.35.0-1.1.aarch64", }, product_reference: "busybox-1.35.0-1.1.aarch64", relates_to_product_reference: "openSUSE Tumbleweed", }, { category: "default_component_of", full_product_name: { name: "busybox-1.35.0-1.1.ppc64le as component of openSUSE Tumbleweed", product_id: "openSUSE Tumbleweed:busybox-1.35.0-1.1.ppc64le", }, product_reference: "busybox-1.35.0-1.1.ppc64le", relates_to_product_reference: "openSUSE Tumbleweed", }, { category: "default_component_of", full_product_name: { name: "busybox-1.35.0-1.1.s390x as component of openSUSE Tumbleweed", product_id: "openSUSE Tumbleweed:busybox-1.35.0-1.1.s390x", }, product_reference: "busybox-1.35.0-1.1.s390x", relates_to_product_reference: "openSUSE Tumbleweed", }, { category: "default_component_of", full_product_name: { name: "busybox-1.35.0-1.1.x86_64 as component of openSUSE Tumbleweed", product_id: "openSUSE Tumbleweed:busybox-1.35.0-1.1.x86_64", }, product_reference: "busybox-1.35.0-1.1.x86_64", relates_to_product_reference: "openSUSE Tumbleweed", }, { category: "default_component_of", full_product_name: { name: "busybox-static-1.35.0-1.1.aarch64 as component of openSUSE Tumbleweed", product_id: "openSUSE Tumbleweed:busybox-static-1.35.0-1.1.aarch64", }, product_reference: "busybox-static-1.35.0-1.1.aarch64", relates_to_product_reference: "openSUSE Tumbleweed", }, { category: "default_component_of", full_product_name: { name: "busybox-static-1.35.0-1.1.ppc64le as component of openSUSE Tumbleweed", product_id: "openSUSE Tumbleweed:busybox-static-1.35.0-1.1.ppc64le", }, product_reference: "busybox-static-1.35.0-1.1.ppc64le", relates_to_product_reference: "openSUSE Tumbleweed", }, { category: "default_component_of", full_product_name: { name: "busybox-static-1.35.0-1.1.s390x as component of openSUSE Tumbleweed", product_id: "openSUSE Tumbleweed:busybox-static-1.35.0-1.1.s390x", }, product_reference: "busybox-static-1.35.0-1.1.s390x", relates_to_product_reference: "openSUSE Tumbleweed", }, { category: "default_component_of", full_product_name: { name: "busybox-static-1.35.0-1.1.x86_64 as component of openSUSE Tumbleweed", product_id: "openSUSE Tumbleweed:busybox-static-1.35.0-1.1.x86_64", }, product_reference: "busybox-static-1.35.0-1.1.x86_64", relates_to_product_reference: "openSUSE Tumbleweed", }, { category: "default_component_of", full_product_name: { name: "busybox-testsuite-1.35.0-1.1.aarch64 as component of openSUSE Tumbleweed", product_id: "openSUSE Tumbleweed:busybox-testsuite-1.35.0-1.1.aarch64", }, product_reference: "busybox-testsuite-1.35.0-1.1.aarch64", relates_to_product_reference: "openSUSE Tumbleweed", }, { category: "default_component_of", full_product_name: { name: "busybox-testsuite-1.35.0-1.1.ppc64le as component of openSUSE Tumbleweed", product_id: "openSUSE Tumbleweed:busybox-testsuite-1.35.0-1.1.ppc64le", }, product_reference: "busybox-testsuite-1.35.0-1.1.ppc64le", relates_to_product_reference: "openSUSE Tumbleweed", }, { category: "default_component_of", full_product_name: { name: "busybox-testsuite-1.35.0-1.1.s390x as component of openSUSE Tumbleweed", product_id: "openSUSE Tumbleweed:busybox-testsuite-1.35.0-1.1.s390x", }, product_reference: "busybox-testsuite-1.35.0-1.1.s390x", relates_to_product_reference: "openSUSE Tumbleweed", }, { category: "default_component_of", full_product_name: { name: "busybox-testsuite-1.35.0-1.1.x86_64 as component of openSUSE Tumbleweed", product_id: "openSUSE Tumbleweed:busybox-testsuite-1.35.0-1.1.x86_64", }, product_reference: "busybox-testsuite-1.35.0-1.1.x86_64", relates_to_product_reference: "openSUSE Tumbleweed", }, { category: "default_component_of", full_product_name: { name: "busybox-warewulf3-1.35.0-1.1.aarch64 as component of openSUSE Tumbleweed", product_id: "openSUSE Tumbleweed:busybox-warewulf3-1.35.0-1.1.aarch64", }, product_reference: "busybox-warewulf3-1.35.0-1.1.aarch64", relates_to_product_reference: "openSUSE Tumbleweed", }, { category: "default_component_of", full_product_name: { name: "busybox-warewulf3-1.35.0-1.1.ppc64le as component of openSUSE Tumbleweed", product_id: "openSUSE Tumbleweed:busybox-warewulf3-1.35.0-1.1.ppc64le", }, product_reference: "busybox-warewulf3-1.35.0-1.1.ppc64le", relates_to_product_reference: "openSUSE Tumbleweed", }, { category: "default_component_of", full_product_name: { name: "busybox-warewulf3-1.35.0-1.1.s390x as component of openSUSE Tumbleweed", product_id: "openSUSE Tumbleweed:busybox-warewulf3-1.35.0-1.1.s390x", }, product_reference: "busybox-warewulf3-1.35.0-1.1.s390x", relates_to_product_reference: "openSUSE Tumbleweed", }, { category: "default_component_of", full_product_name: { name: "busybox-warewulf3-1.35.0-1.1.x86_64 as component of openSUSE Tumbleweed", product_id: "openSUSE Tumbleweed:busybox-warewulf3-1.35.0-1.1.x86_64", }, product_reference: "busybox-warewulf3-1.35.0-1.1.x86_64", relates_to_product_reference: "openSUSE Tumbleweed", }, ], }, vulnerabilities: [ { cve: "CVE-2011-5325", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2011-5325", }, ], notes: [ { category: "general", text: "Directory traversal vulnerability in the BusyBox implementation of tar before 1.22.0 v5 allows remote attackers to point to files outside the current working directory via a symlink.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:busybox-1.35.0-1.1.aarch64", "openSUSE Tumbleweed:busybox-1.35.0-1.1.ppc64le", "openSUSE Tumbleweed:busybox-1.35.0-1.1.s390x", "openSUSE Tumbleweed:busybox-1.35.0-1.1.x86_64", "openSUSE Tumbleweed:busybox-static-1.35.0-1.1.aarch64", "openSUSE Tumbleweed:busybox-static-1.35.0-1.1.ppc64le", "openSUSE Tumbleweed:busybox-static-1.35.0-1.1.s390x", "openSUSE Tumbleweed:busybox-static-1.35.0-1.1.x86_64", "openSUSE Tumbleweed:busybox-testsuite-1.35.0-1.1.aarch64", "openSUSE Tumbleweed:busybox-testsuite-1.35.0-1.1.ppc64le", "openSUSE Tumbleweed:busybox-testsuite-1.35.0-1.1.s390x", "openSUSE Tumbleweed:busybox-testsuite-1.35.0-1.1.x86_64", "openSUSE Tumbleweed:busybox-warewulf3-1.35.0-1.1.aarch64", "openSUSE Tumbleweed:busybox-warewulf3-1.35.0-1.1.ppc64le", "openSUSE Tumbleweed:busybox-warewulf3-1.35.0-1.1.s390x", "openSUSE Tumbleweed:busybox-warewulf3-1.35.0-1.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2011-5325", url: "https://www.suse.com/security/cve/CVE-2011-5325", }, { category: "external", summary: "SUSE Bug 951562 for CVE-2011-5325", url: "https://bugzilla.suse.com/951562", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:busybox-1.35.0-1.1.aarch64", "openSUSE Tumbleweed:busybox-1.35.0-1.1.ppc64le", "openSUSE Tumbleweed:busybox-1.35.0-1.1.s390x", "openSUSE Tumbleweed:busybox-1.35.0-1.1.x86_64", "openSUSE Tumbleweed:busybox-static-1.35.0-1.1.aarch64", "openSUSE Tumbleweed:busybox-static-1.35.0-1.1.ppc64le", "openSUSE Tumbleweed:busybox-static-1.35.0-1.1.s390x", "openSUSE Tumbleweed:busybox-static-1.35.0-1.1.x86_64", "openSUSE Tumbleweed:busybox-testsuite-1.35.0-1.1.aarch64", "openSUSE Tumbleweed:busybox-testsuite-1.35.0-1.1.ppc64le", "openSUSE Tumbleweed:busybox-testsuite-1.35.0-1.1.s390x", "openSUSE Tumbleweed:busybox-testsuite-1.35.0-1.1.x86_64", "openSUSE Tumbleweed:busybox-warewulf3-1.35.0-1.1.aarch64", "openSUSE Tumbleweed:busybox-warewulf3-1.35.0-1.1.ppc64le", "openSUSE Tumbleweed:busybox-warewulf3-1.35.0-1.1.s390x", "openSUSE Tumbleweed:busybox-warewulf3-1.35.0-1.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 7.5, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N", version: "3.1", }, products: [ "openSUSE Tumbleweed:busybox-1.35.0-1.1.aarch64", "openSUSE Tumbleweed:busybox-1.35.0-1.1.ppc64le", "openSUSE Tumbleweed:busybox-1.35.0-1.1.s390x", "openSUSE Tumbleweed:busybox-1.35.0-1.1.x86_64", "openSUSE Tumbleweed:busybox-static-1.35.0-1.1.aarch64", "openSUSE Tumbleweed:busybox-static-1.35.0-1.1.ppc64le", "openSUSE Tumbleweed:busybox-static-1.35.0-1.1.s390x", "openSUSE Tumbleweed:busybox-static-1.35.0-1.1.x86_64", "openSUSE Tumbleweed:busybox-testsuite-1.35.0-1.1.aarch64", "openSUSE Tumbleweed:busybox-testsuite-1.35.0-1.1.ppc64le", "openSUSE Tumbleweed:busybox-testsuite-1.35.0-1.1.s390x", "openSUSE Tumbleweed:busybox-testsuite-1.35.0-1.1.x86_64", "openSUSE Tumbleweed:busybox-warewulf3-1.35.0-1.1.aarch64", "openSUSE Tumbleweed:busybox-warewulf3-1.35.0-1.1.ppc64le", "openSUSE Tumbleweed:busybox-warewulf3-1.35.0-1.1.s390x", "openSUSE Tumbleweed:busybox-warewulf3-1.35.0-1.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "moderate", }, ], title: "CVE-2011-5325", }, { cve: "CVE-2015-9261", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2015-9261", }, ], notes: [ { category: "general", text: "huft_build in archival/libarchive/decompress_gunzip.c in BusyBox before 1.27.2 misuses a pointer, causing segfaults and an application crash during an unzip operation on a specially crafted ZIP file.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:busybox-1.35.0-1.1.aarch64", "openSUSE Tumbleweed:busybox-1.35.0-1.1.ppc64le", "openSUSE Tumbleweed:busybox-1.35.0-1.1.s390x", "openSUSE Tumbleweed:busybox-1.35.0-1.1.x86_64", "openSUSE Tumbleweed:busybox-static-1.35.0-1.1.aarch64", "openSUSE Tumbleweed:busybox-static-1.35.0-1.1.ppc64le", "openSUSE Tumbleweed:busybox-static-1.35.0-1.1.s390x", "openSUSE Tumbleweed:busybox-static-1.35.0-1.1.x86_64", "openSUSE Tumbleweed:busybox-testsuite-1.35.0-1.1.aarch64", "openSUSE Tumbleweed:busybox-testsuite-1.35.0-1.1.ppc64le", "openSUSE Tumbleweed:busybox-testsuite-1.35.0-1.1.s390x", "openSUSE Tumbleweed:busybox-testsuite-1.35.0-1.1.x86_64", "openSUSE Tumbleweed:busybox-warewulf3-1.35.0-1.1.aarch64", "openSUSE Tumbleweed:busybox-warewulf3-1.35.0-1.1.ppc64le", "openSUSE Tumbleweed:busybox-warewulf3-1.35.0-1.1.s390x", "openSUSE Tumbleweed:busybox-warewulf3-1.35.0-1.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2015-9261", url: "https://www.suse.com/security/cve/CVE-2015-9261", }, { category: "external", summary: "SUSE Bug 1102912 for CVE-2015-9261", url: "https://bugzilla.suse.com/1102912", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:busybox-1.35.0-1.1.aarch64", "openSUSE Tumbleweed:busybox-1.35.0-1.1.ppc64le", "openSUSE Tumbleweed:busybox-1.35.0-1.1.s390x", "openSUSE Tumbleweed:busybox-1.35.0-1.1.x86_64", "openSUSE Tumbleweed:busybox-static-1.35.0-1.1.aarch64", "openSUSE Tumbleweed:busybox-static-1.35.0-1.1.ppc64le", "openSUSE Tumbleweed:busybox-static-1.35.0-1.1.s390x", "openSUSE Tumbleweed:busybox-static-1.35.0-1.1.x86_64", "openSUSE Tumbleweed:busybox-testsuite-1.35.0-1.1.aarch64", "openSUSE Tumbleweed:busybox-testsuite-1.35.0-1.1.ppc64le", "openSUSE Tumbleweed:busybox-testsuite-1.35.0-1.1.s390x", "openSUSE Tumbleweed:busybox-testsuite-1.35.0-1.1.x86_64", "openSUSE Tumbleweed:busybox-warewulf3-1.35.0-1.1.aarch64", "openSUSE Tumbleweed:busybox-warewulf3-1.35.0-1.1.ppc64le", "openSUSE Tumbleweed:busybox-warewulf3-1.35.0-1.1.s390x", "openSUSE Tumbleweed:busybox-warewulf3-1.35.0-1.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.5, baseSeverity: "MEDIUM", vectorString: "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", version: "3.0", }, products: [ "openSUSE Tumbleweed:busybox-1.35.0-1.1.aarch64", "openSUSE Tumbleweed:busybox-1.35.0-1.1.ppc64le", "openSUSE Tumbleweed:busybox-1.35.0-1.1.s390x", "openSUSE Tumbleweed:busybox-1.35.0-1.1.x86_64", "openSUSE Tumbleweed:busybox-static-1.35.0-1.1.aarch64", "openSUSE Tumbleweed:busybox-static-1.35.0-1.1.ppc64le", "openSUSE Tumbleweed:busybox-static-1.35.0-1.1.s390x", "openSUSE Tumbleweed:busybox-static-1.35.0-1.1.x86_64", "openSUSE Tumbleweed:busybox-testsuite-1.35.0-1.1.aarch64", "openSUSE Tumbleweed:busybox-testsuite-1.35.0-1.1.ppc64le", "openSUSE Tumbleweed:busybox-testsuite-1.35.0-1.1.s390x", "openSUSE Tumbleweed:busybox-testsuite-1.35.0-1.1.x86_64", "openSUSE Tumbleweed:busybox-warewulf3-1.35.0-1.1.aarch64", "openSUSE Tumbleweed:busybox-warewulf3-1.35.0-1.1.ppc64le", "openSUSE Tumbleweed:busybox-warewulf3-1.35.0-1.1.s390x", "openSUSE Tumbleweed:busybox-warewulf3-1.35.0-1.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "moderate", }, ], title: "CVE-2015-9261", }, { cve: "CVE-2016-2147", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2016-2147", }, ], notes: [ { category: "general", text: "Integer overflow in the DHCP client (udhcpc) in BusyBox before 1.25.0 allows remote attackers to cause a denial of service (crash) via a malformed RFC1035-encoded domain name, which triggers an out-of-bounds heap write.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:busybox-1.35.0-1.1.aarch64", "openSUSE Tumbleweed:busybox-1.35.0-1.1.ppc64le", "openSUSE Tumbleweed:busybox-1.35.0-1.1.s390x", "openSUSE Tumbleweed:busybox-1.35.0-1.1.x86_64", "openSUSE Tumbleweed:busybox-static-1.35.0-1.1.aarch64", "openSUSE Tumbleweed:busybox-static-1.35.0-1.1.ppc64le", "openSUSE Tumbleweed:busybox-static-1.35.0-1.1.s390x", "openSUSE Tumbleweed:busybox-static-1.35.0-1.1.x86_64", "openSUSE Tumbleweed:busybox-testsuite-1.35.0-1.1.aarch64", "openSUSE Tumbleweed:busybox-testsuite-1.35.0-1.1.ppc64le", "openSUSE Tumbleweed:busybox-testsuite-1.35.0-1.1.s390x", "openSUSE Tumbleweed:busybox-testsuite-1.35.0-1.1.x86_64", "openSUSE Tumbleweed:busybox-warewulf3-1.35.0-1.1.aarch64", "openSUSE Tumbleweed:busybox-warewulf3-1.35.0-1.1.ppc64le", "openSUSE Tumbleweed:busybox-warewulf3-1.35.0-1.1.s390x", "openSUSE Tumbleweed:busybox-warewulf3-1.35.0-1.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2016-2147", url: "https://www.suse.com/security/cve/CVE-2016-2147", }, { category: "external", summary: "SUSE Bug 970663 for CVE-2016-2147", url: "https://bugzilla.suse.com/970663", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:busybox-1.35.0-1.1.aarch64", "openSUSE Tumbleweed:busybox-1.35.0-1.1.ppc64le", "openSUSE Tumbleweed:busybox-1.35.0-1.1.s390x", "openSUSE Tumbleweed:busybox-1.35.0-1.1.x86_64", "openSUSE Tumbleweed:busybox-static-1.35.0-1.1.aarch64", "openSUSE Tumbleweed:busybox-static-1.35.0-1.1.ppc64le", "openSUSE Tumbleweed:busybox-static-1.35.0-1.1.s390x", "openSUSE Tumbleweed:busybox-static-1.35.0-1.1.x86_64", "openSUSE Tumbleweed:busybox-testsuite-1.35.0-1.1.aarch64", "openSUSE Tumbleweed:busybox-testsuite-1.35.0-1.1.ppc64le", "openSUSE Tumbleweed:busybox-testsuite-1.35.0-1.1.s390x", "openSUSE Tumbleweed:busybox-testsuite-1.35.0-1.1.x86_64", "openSUSE Tumbleweed:busybox-warewulf3-1.35.0-1.1.aarch64", "openSUSE Tumbleweed:busybox-warewulf3-1.35.0-1.1.ppc64le", "openSUSE Tumbleweed:busybox-warewulf3-1.35.0-1.1.s390x", "openSUSE Tumbleweed:busybox-warewulf3-1.35.0-1.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 7.5, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "openSUSE Tumbleweed:busybox-1.35.0-1.1.aarch64", "openSUSE Tumbleweed:busybox-1.35.0-1.1.ppc64le", "openSUSE Tumbleweed:busybox-1.35.0-1.1.s390x", "openSUSE Tumbleweed:busybox-1.35.0-1.1.x86_64", "openSUSE Tumbleweed:busybox-static-1.35.0-1.1.aarch64", "openSUSE Tumbleweed:busybox-static-1.35.0-1.1.ppc64le", "openSUSE Tumbleweed:busybox-static-1.35.0-1.1.s390x", "openSUSE Tumbleweed:busybox-static-1.35.0-1.1.x86_64", "openSUSE Tumbleweed:busybox-testsuite-1.35.0-1.1.aarch64", "openSUSE Tumbleweed:busybox-testsuite-1.35.0-1.1.ppc64le", "openSUSE Tumbleweed:busybox-testsuite-1.35.0-1.1.s390x", "openSUSE Tumbleweed:busybox-testsuite-1.35.0-1.1.x86_64", "openSUSE Tumbleweed:busybox-warewulf3-1.35.0-1.1.aarch64", "openSUSE Tumbleweed:busybox-warewulf3-1.35.0-1.1.ppc64le", "openSUSE Tumbleweed:busybox-warewulf3-1.35.0-1.1.s390x", "openSUSE Tumbleweed:busybox-warewulf3-1.35.0-1.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "important", }, ], title: "CVE-2016-2147", }, { cve: "CVE-2016-2148", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2016-2148", }, ], notes: [ { category: "general", text: "Heap-based buffer overflow in the DHCP client (udhcpc) in BusyBox before 1.25.0 allows remote attackers to have unspecified impact via vectors involving OPTION_6RD parsing.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:busybox-1.35.0-1.1.aarch64", "openSUSE Tumbleweed:busybox-1.35.0-1.1.ppc64le", "openSUSE Tumbleweed:busybox-1.35.0-1.1.s390x", "openSUSE Tumbleweed:busybox-1.35.0-1.1.x86_64", "openSUSE Tumbleweed:busybox-static-1.35.0-1.1.aarch64", "openSUSE Tumbleweed:busybox-static-1.35.0-1.1.ppc64le", "openSUSE Tumbleweed:busybox-static-1.35.0-1.1.s390x", "openSUSE Tumbleweed:busybox-static-1.35.0-1.1.x86_64", "openSUSE Tumbleweed:busybox-testsuite-1.35.0-1.1.aarch64", "openSUSE Tumbleweed:busybox-testsuite-1.35.0-1.1.ppc64le", "openSUSE Tumbleweed:busybox-testsuite-1.35.0-1.1.s390x", "openSUSE Tumbleweed:busybox-testsuite-1.35.0-1.1.x86_64", "openSUSE Tumbleweed:busybox-warewulf3-1.35.0-1.1.aarch64", "openSUSE Tumbleweed:busybox-warewulf3-1.35.0-1.1.ppc64le", "openSUSE Tumbleweed:busybox-warewulf3-1.35.0-1.1.s390x", "openSUSE Tumbleweed:busybox-warewulf3-1.35.0-1.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2016-2148", url: "https://www.suse.com/security/cve/CVE-2016-2148", }, { category: "external", summary: "SUSE Bug 970662 for CVE-2016-2148", url: "https://bugzilla.suse.com/970662", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:busybox-1.35.0-1.1.aarch64", "openSUSE Tumbleweed:busybox-1.35.0-1.1.ppc64le", "openSUSE Tumbleweed:busybox-1.35.0-1.1.s390x", "openSUSE Tumbleweed:busybox-1.35.0-1.1.x86_64", "openSUSE Tumbleweed:busybox-static-1.35.0-1.1.aarch64", "openSUSE Tumbleweed:busybox-static-1.35.0-1.1.ppc64le", "openSUSE Tumbleweed:busybox-static-1.35.0-1.1.s390x", "openSUSE Tumbleweed:busybox-static-1.35.0-1.1.x86_64", "openSUSE Tumbleweed:busybox-testsuite-1.35.0-1.1.aarch64", "openSUSE Tumbleweed:busybox-testsuite-1.35.0-1.1.ppc64le", "openSUSE Tumbleweed:busybox-testsuite-1.35.0-1.1.s390x", "openSUSE Tumbleweed:busybox-testsuite-1.35.0-1.1.x86_64", "openSUSE Tumbleweed:busybox-warewulf3-1.35.0-1.1.aarch64", "openSUSE Tumbleweed:busybox-warewulf3-1.35.0-1.1.ppc64le", "openSUSE Tumbleweed:busybox-warewulf3-1.35.0-1.1.s390x", "openSUSE Tumbleweed:busybox-warewulf3-1.35.0-1.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 9.8, baseSeverity: "CRITICAL", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, products: [ "openSUSE Tumbleweed:busybox-1.35.0-1.1.aarch64", "openSUSE Tumbleweed:busybox-1.35.0-1.1.ppc64le", "openSUSE Tumbleweed:busybox-1.35.0-1.1.s390x", "openSUSE Tumbleweed:busybox-1.35.0-1.1.x86_64", "openSUSE Tumbleweed:busybox-static-1.35.0-1.1.aarch64", "openSUSE Tumbleweed:busybox-static-1.35.0-1.1.ppc64le", "openSUSE Tumbleweed:busybox-static-1.35.0-1.1.s390x", "openSUSE Tumbleweed:busybox-static-1.35.0-1.1.x86_64", "openSUSE Tumbleweed:busybox-testsuite-1.35.0-1.1.aarch64", "openSUSE Tumbleweed:busybox-testsuite-1.35.0-1.1.ppc64le", "openSUSE Tumbleweed:busybox-testsuite-1.35.0-1.1.s390x", "openSUSE Tumbleweed:busybox-testsuite-1.35.0-1.1.x86_64", "openSUSE Tumbleweed:busybox-warewulf3-1.35.0-1.1.aarch64", "openSUSE Tumbleweed:busybox-warewulf3-1.35.0-1.1.ppc64le", "openSUSE Tumbleweed:busybox-warewulf3-1.35.0-1.1.s390x", "openSUSE Tumbleweed:busybox-warewulf3-1.35.0-1.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "moderate", }, ], title: "CVE-2016-2148", }, { cve: "CVE-2016-6301", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2016-6301", }, ], notes: [ { category: "general", text: "The recv_and_process_client_pkt function in networking/ntpd.c in busybox allows remote attackers to cause a denial of service (CPU and bandwidth consumption) via a forged NTP packet, which triggers a communication loop.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:busybox-1.35.0-1.1.aarch64", "openSUSE Tumbleweed:busybox-1.35.0-1.1.ppc64le", "openSUSE Tumbleweed:busybox-1.35.0-1.1.s390x", "openSUSE Tumbleweed:busybox-1.35.0-1.1.x86_64", "openSUSE Tumbleweed:busybox-static-1.35.0-1.1.aarch64", "openSUSE Tumbleweed:busybox-static-1.35.0-1.1.ppc64le", "openSUSE Tumbleweed:busybox-static-1.35.0-1.1.s390x", "openSUSE Tumbleweed:busybox-static-1.35.0-1.1.x86_64", "openSUSE Tumbleweed:busybox-testsuite-1.35.0-1.1.aarch64", "openSUSE Tumbleweed:busybox-testsuite-1.35.0-1.1.ppc64le", "openSUSE Tumbleweed:busybox-testsuite-1.35.0-1.1.s390x", "openSUSE Tumbleweed:busybox-testsuite-1.35.0-1.1.x86_64", "openSUSE Tumbleweed:busybox-warewulf3-1.35.0-1.1.aarch64", "openSUSE Tumbleweed:busybox-warewulf3-1.35.0-1.1.ppc64le", "openSUSE Tumbleweed:busybox-warewulf3-1.35.0-1.1.s390x", "openSUSE Tumbleweed:busybox-warewulf3-1.35.0-1.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2016-6301", url: "https://www.suse.com/security/cve/CVE-2016-6301", }, { category: "external", summary: "SUSE Bug 991940 for CVE-2016-6301", url: "https://bugzilla.suse.com/991940", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:busybox-1.35.0-1.1.aarch64", "openSUSE Tumbleweed:busybox-1.35.0-1.1.ppc64le", "openSUSE Tumbleweed:busybox-1.35.0-1.1.s390x", "openSUSE Tumbleweed:busybox-1.35.0-1.1.x86_64", "openSUSE Tumbleweed:busybox-static-1.35.0-1.1.aarch64", "openSUSE Tumbleweed:busybox-static-1.35.0-1.1.ppc64le", "openSUSE Tumbleweed:busybox-static-1.35.0-1.1.s390x", "openSUSE Tumbleweed:busybox-static-1.35.0-1.1.x86_64", "openSUSE Tumbleweed:busybox-testsuite-1.35.0-1.1.aarch64", "openSUSE Tumbleweed:busybox-testsuite-1.35.0-1.1.ppc64le", "openSUSE Tumbleweed:busybox-testsuite-1.35.0-1.1.s390x", "openSUSE Tumbleweed:busybox-testsuite-1.35.0-1.1.x86_64", "openSUSE Tumbleweed:busybox-warewulf3-1.35.0-1.1.aarch64", "openSUSE Tumbleweed:busybox-warewulf3-1.35.0-1.1.ppc64le", "openSUSE Tumbleweed:busybox-warewulf3-1.35.0-1.1.s390x", "openSUSE Tumbleweed:busybox-warewulf3-1.35.0-1.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 7.5, baseSeverity: "HIGH", vectorString: "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", version: "3.0", }, products: [ "openSUSE Tumbleweed:busybox-1.35.0-1.1.aarch64", "openSUSE Tumbleweed:busybox-1.35.0-1.1.ppc64le", "openSUSE Tumbleweed:busybox-1.35.0-1.1.s390x", "openSUSE Tumbleweed:busybox-1.35.0-1.1.x86_64", "openSUSE Tumbleweed:busybox-static-1.35.0-1.1.aarch64", "openSUSE Tumbleweed:busybox-static-1.35.0-1.1.ppc64le", "openSUSE Tumbleweed:busybox-static-1.35.0-1.1.s390x", "openSUSE Tumbleweed:busybox-static-1.35.0-1.1.x86_64", "openSUSE Tumbleweed:busybox-testsuite-1.35.0-1.1.aarch64", "openSUSE Tumbleweed:busybox-testsuite-1.35.0-1.1.ppc64le", "openSUSE Tumbleweed:busybox-testsuite-1.35.0-1.1.s390x", "openSUSE Tumbleweed:busybox-testsuite-1.35.0-1.1.x86_64", "openSUSE Tumbleweed:busybox-warewulf3-1.35.0-1.1.aarch64", "openSUSE Tumbleweed:busybox-warewulf3-1.35.0-1.1.ppc64le", "openSUSE Tumbleweed:busybox-warewulf3-1.35.0-1.1.s390x", "openSUSE Tumbleweed:busybox-warewulf3-1.35.0-1.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "moderate", }, ], title: "CVE-2016-6301", }, { cve: "CVE-2017-15873", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2017-15873", }, ], notes: [ { category: "general", text: "The get_next_block function in archival/libarchive/decompress_bunzip2.c in BusyBox 1.27.2 has an Integer Overflow that may lead to a write access violation.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:busybox-1.35.0-1.1.aarch64", "openSUSE Tumbleweed:busybox-1.35.0-1.1.ppc64le", "openSUSE Tumbleweed:busybox-1.35.0-1.1.s390x", "openSUSE Tumbleweed:busybox-1.35.0-1.1.x86_64", "openSUSE Tumbleweed:busybox-static-1.35.0-1.1.aarch64", "openSUSE Tumbleweed:busybox-static-1.35.0-1.1.ppc64le", "openSUSE Tumbleweed:busybox-static-1.35.0-1.1.s390x", "openSUSE Tumbleweed:busybox-static-1.35.0-1.1.x86_64", "openSUSE Tumbleweed:busybox-testsuite-1.35.0-1.1.aarch64", "openSUSE Tumbleweed:busybox-testsuite-1.35.0-1.1.ppc64le", "openSUSE Tumbleweed:busybox-testsuite-1.35.0-1.1.s390x", "openSUSE Tumbleweed:busybox-testsuite-1.35.0-1.1.x86_64", "openSUSE Tumbleweed:busybox-warewulf3-1.35.0-1.1.aarch64", "openSUSE Tumbleweed:busybox-warewulf3-1.35.0-1.1.ppc64le", "openSUSE Tumbleweed:busybox-warewulf3-1.35.0-1.1.s390x", "openSUSE Tumbleweed:busybox-warewulf3-1.35.0-1.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2017-15873", url: "https://www.suse.com/security/cve/CVE-2017-15873", }, { category: "external", summary: "SUSE Bug 1064976 for CVE-2017-15873", url: "https://bugzilla.suse.com/1064976", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:busybox-1.35.0-1.1.aarch64", "openSUSE Tumbleweed:busybox-1.35.0-1.1.ppc64le", "openSUSE Tumbleweed:busybox-1.35.0-1.1.s390x", "openSUSE Tumbleweed:busybox-1.35.0-1.1.x86_64", "openSUSE Tumbleweed:busybox-static-1.35.0-1.1.aarch64", "openSUSE Tumbleweed:busybox-static-1.35.0-1.1.ppc64le", "openSUSE Tumbleweed:busybox-static-1.35.0-1.1.s390x", "openSUSE Tumbleweed:busybox-static-1.35.0-1.1.x86_64", "openSUSE Tumbleweed:busybox-testsuite-1.35.0-1.1.aarch64", "openSUSE Tumbleweed:busybox-testsuite-1.35.0-1.1.ppc64le", "openSUSE Tumbleweed:busybox-testsuite-1.35.0-1.1.s390x", "openSUSE Tumbleweed:busybox-testsuite-1.35.0-1.1.x86_64", "openSUSE Tumbleweed:busybox-warewulf3-1.35.0-1.1.aarch64", "openSUSE Tumbleweed:busybox-warewulf3-1.35.0-1.1.ppc64le", "openSUSE Tumbleweed:busybox-warewulf3-1.35.0-1.1.s390x", "openSUSE Tumbleweed:busybox-warewulf3-1.35.0-1.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 7.8, baseSeverity: "HIGH", vectorString: "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", version: "3.0", }, products: [ "openSUSE Tumbleweed:busybox-1.35.0-1.1.aarch64", "openSUSE Tumbleweed:busybox-1.35.0-1.1.ppc64le", "openSUSE Tumbleweed:busybox-1.35.0-1.1.s390x", "openSUSE Tumbleweed:busybox-1.35.0-1.1.x86_64", "openSUSE Tumbleweed:busybox-static-1.35.0-1.1.aarch64", "openSUSE Tumbleweed:busybox-static-1.35.0-1.1.ppc64le", "openSUSE Tumbleweed:busybox-static-1.35.0-1.1.s390x", "openSUSE Tumbleweed:busybox-static-1.35.0-1.1.x86_64", "openSUSE Tumbleweed:busybox-testsuite-1.35.0-1.1.aarch64", "openSUSE Tumbleweed:busybox-testsuite-1.35.0-1.1.ppc64le", "openSUSE Tumbleweed:busybox-testsuite-1.35.0-1.1.s390x", "openSUSE Tumbleweed:busybox-testsuite-1.35.0-1.1.x86_64", "openSUSE Tumbleweed:busybox-warewulf3-1.35.0-1.1.aarch64", "openSUSE Tumbleweed:busybox-warewulf3-1.35.0-1.1.ppc64le", "openSUSE Tumbleweed:busybox-warewulf3-1.35.0-1.1.s390x", "openSUSE Tumbleweed:busybox-warewulf3-1.35.0-1.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "moderate", }, ], title: "CVE-2017-15873", }, { cve: "CVE-2017-15874", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2017-15874", }, ], notes: [ { category: "general", text: "archival/libarchive/decompress_unlzma.c in BusyBox 1.27.2 has an Integer Underflow that leads to a read access violation.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:busybox-1.35.0-1.1.aarch64", "openSUSE Tumbleweed:busybox-1.35.0-1.1.ppc64le", "openSUSE Tumbleweed:busybox-1.35.0-1.1.s390x", "openSUSE Tumbleweed:busybox-1.35.0-1.1.x86_64", "openSUSE Tumbleweed:busybox-static-1.35.0-1.1.aarch64", "openSUSE Tumbleweed:busybox-static-1.35.0-1.1.ppc64le", "openSUSE Tumbleweed:busybox-static-1.35.0-1.1.s390x", "openSUSE Tumbleweed:busybox-static-1.35.0-1.1.x86_64", "openSUSE Tumbleweed:busybox-testsuite-1.35.0-1.1.aarch64", "openSUSE Tumbleweed:busybox-testsuite-1.35.0-1.1.ppc64le", "openSUSE Tumbleweed:busybox-testsuite-1.35.0-1.1.s390x", "openSUSE Tumbleweed:busybox-testsuite-1.35.0-1.1.x86_64", "openSUSE Tumbleweed:busybox-warewulf3-1.35.0-1.1.aarch64", "openSUSE Tumbleweed:busybox-warewulf3-1.35.0-1.1.ppc64le", "openSUSE Tumbleweed:busybox-warewulf3-1.35.0-1.1.s390x", "openSUSE Tumbleweed:busybox-warewulf3-1.35.0-1.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2017-15874", url: "https://www.suse.com/security/cve/CVE-2017-15874", }, { category: "external", summary: "SUSE Bug 1064978 for CVE-2017-15874", url: "https://bugzilla.suse.com/1064978", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:busybox-1.35.0-1.1.aarch64", "openSUSE Tumbleweed:busybox-1.35.0-1.1.ppc64le", "openSUSE Tumbleweed:busybox-1.35.0-1.1.s390x", "openSUSE Tumbleweed:busybox-1.35.0-1.1.x86_64", "openSUSE Tumbleweed:busybox-static-1.35.0-1.1.aarch64", "openSUSE Tumbleweed:busybox-static-1.35.0-1.1.ppc64le", "openSUSE Tumbleweed:busybox-static-1.35.0-1.1.s390x", "openSUSE Tumbleweed:busybox-static-1.35.0-1.1.x86_64", "openSUSE Tumbleweed:busybox-testsuite-1.35.0-1.1.aarch64", "openSUSE Tumbleweed:busybox-testsuite-1.35.0-1.1.ppc64le", "openSUSE Tumbleweed:busybox-testsuite-1.35.0-1.1.s390x", "openSUSE Tumbleweed:busybox-testsuite-1.35.0-1.1.x86_64", "openSUSE Tumbleweed:busybox-warewulf3-1.35.0-1.1.aarch64", "openSUSE Tumbleweed:busybox-warewulf3-1.35.0-1.1.ppc64le", "openSUSE Tumbleweed:busybox-warewulf3-1.35.0-1.1.s390x", "openSUSE Tumbleweed:busybox-warewulf3-1.35.0-1.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 3.3, baseSeverity: "LOW", vectorString: "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L", version: "3.0", }, products: [ "openSUSE Tumbleweed:busybox-1.35.0-1.1.aarch64", "openSUSE Tumbleweed:busybox-1.35.0-1.1.ppc64le", "openSUSE Tumbleweed:busybox-1.35.0-1.1.s390x", "openSUSE Tumbleweed:busybox-1.35.0-1.1.x86_64", "openSUSE Tumbleweed:busybox-static-1.35.0-1.1.aarch64", "openSUSE Tumbleweed:busybox-static-1.35.0-1.1.ppc64le", "openSUSE Tumbleweed:busybox-static-1.35.0-1.1.s390x", "openSUSE Tumbleweed:busybox-static-1.35.0-1.1.x86_64", "openSUSE Tumbleweed:busybox-testsuite-1.35.0-1.1.aarch64", "openSUSE Tumbleweed:busybox-testsuite-1.35.0-1.1.ppc64le", "openSUSE Tumbleweed:busybox-testsuite-1.35.0-1.1.s390x", "openSUSE Tumbleweed:busybox-testsuite-1.35.0-1.1.x86_64", "openSUSE Tumbleweed:busybox-warewulf3-1.35.0-1.1.aarch64", "openSUSE Tumbleweed:busybox-warewulf3-1.35.0-1.1.ppc64le", "openSUSE Tumbleweed:busybox-warewulf3-1.35.0-1.1.s390x", "openSUSE Tumbleweed:busybox-warewulf3-1.35.0-1.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "low", }, ], title: "CVE-2017-15874", }, { cve: "CVE-2017-16544", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2017-16544", }, ], notes: [ { category: "general", text: "In the add_match function in libbb/lineedit.c in BusyBox through 1.27.2, the tab autocomplete feature of the shell, used to get a list of filenames in a directory, does not sanitize filenames and results in executing any escape sequence in the terminal. This could potentially result in code execution, arbitrary file writes, or other attacks.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:busybox-1.35.0-1.1.aarch64", "openSUSE Tumbleweed:busybox-1.35.0-1.1.ppc64le", "openSUSE Tumbleweed:busybox-1.35.0-1.1.s390x", "openSUSE Tumbleweed:busybox-1.35.0-1.1.x86_64", "openSUSE Tumbleweed:busybox-static-1.35.0-1.1.aarch64", "openSUSE Tumbleweed:busybox-static-1.35.0-1.1.ppc64le", "openSUSE Tumbleweed:busybox-static-1.35.0-1.1.s390x", "openSUSE Tumbleweed:busybox-static-1.35.0-1.1.x86_64", "openSUSE Tumbleweed:busybox-testsuite-1.35.0-1.1.aarch64", "openSUSE Tumbleweed:busybox-testsuite-1.35.0-1.1.ppc64le", "openSUSE Tumbleweed:busybox-testsuite-1.35.0-1.1.s390x", "openSUSE Tumbleweed:busybox-testsuite-1.35.0-1.1.x86_64", "openSUSE Tumbleweed:busybox-warewulf3-1.35.0-1.1.aarch64", "openSUSE Tumbleweed:busybox-warewulf3-1.35.0-1.1.ppc64le", "openSUSE Tumbleweed:busybox-warewulf3-1.35.0-1.1.s390x", "openSUSE Tumbleweed:busybox-warewulf3-1.35.0-1.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2017-16544", url: "https://www.suse.com/security/cve/CVE-2017-16544", }, { category: "external", summary: "SUSE Bug 1069412 for CVE-2017-16544", url: "https://bugzilla.suse.com/1069412", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:busybox-1.35.0-1.1.aarch64", "openSUSE Tumbleweed:busybox-1.35.0-1.1.ppc64le", "openSUSE Tumbleweed:busybox-1.35.0-1.1.s390x", "openSUSE Tumbleweed:busybox-1.35.0-1.1.x86_64", "openSUSE Tumbleweed:busybox-static-1.35.0-1.1.aarch64", "openSUSE Tumbleweed:busybox-static-1.35.0-1.1.ppc64le", "openSUSE Tumbleweed:busybox-static-1.35.0-1.1.s390x", "openSUSE Tumbleweed:busybox-static-1.35.0-1.1.x86_64", "openSUSE Tumbleweed:busybox-testsuite-1.35.0-1.1.aarch64", "openSUSE Tumbleweed:busybox-testsuite-1.35.0-1.1.ppc64le", "openSUSE Tumbleweed:busybox-testsuite-1.35.0-1.1.s390x", "openSUSE Tumbleweed:busybox-testsuite-1.35.0-1.1.x86_64", "openSUSE Tumbleweed:busybox-warewulf3-1.35.0-1.1.aarch64", "openSUSE Tumbleweed:busybox-warewulf3-1.35.0-1.1.ppc64le", "openSUSE Tumbleweed:busybox-warewulf3-1.35.0-1.1.s390x", "openSUSE Tumbleweed:busybox-warewulf3-1.35.0-1.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 7.8, baseSeverity: "HIGH", vectorString: "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", version: "3.0", }, products: [ "openSUSE Tumbleweed:busybox-1.35.0-1.1.aarch64", "openSUSE Tumbleweed:busybox-1.35.0-1.1.ppc64le", "openSUSE Tumbleweed:busybox-1.35.0-1.1.s390x", "openSUSE Tumbleweed:busybox-1.35.0-1.1.x86_64", "openSUSE Tumbleweed:busybox-static-1.35.0-1.1.aarch64", "openSUSE Tumbleweed:busybox-static-1.35.0-1.1.ppc64le", "openSUSE Tumbleweed:busybox-static-1.35.0-1.1.s390x", "openSUSE Tumbleweed:busybox-static-1.35.0-1.1.x86_64", "openSUSE Tumbleweed:busybox-testsuite-1.35.0-1.1.aarch64", "openSUSE Tumbleweed:busybox-testsuite-1.35.0-1.1.ppc64le", "openSUSE Tumbleweed:busybox-testsuite-1.35.0-1.1.s390x", "openSUSE Tumbleweed:busybox-testsuite-1.35.0-1.1.x86_64", "openSUSE Tumbleweed:busybox-warewulf3-1.35.0-1.1.aarch64", "openSUSE Tumbleweed:busybox-warewulf3-1.35.0-1.1.ppc64le", "openSUSE Tumbleweed:busybox-warewulf3-1.35.0-1.1.s390x", "openSUSE Tumbleweed:busybox-warewulf3-1.35.0-1.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "important", }, ], title: "CVE-2017-16544", }, { cve: "CVE-2018-1000500", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2018-1000500", }, ], notes: [ { category: "general", text: "Busybox contains a Missing SSL certificate validation vulnerability in The \"busybox wget\" applet that can result in arbitrary code execution. This attack appear to be exploitable via Simply download any file over HTTPS using \"busybox wget https://compromised-domain.com/important-file\".", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:busybox-1.35.0-1.1.aarch64", "openSUSE Tumbleweed:busybox-1.35.0-1.1.ppc64le", "openSUSE Tumbleweed:busybox-1.35.0-1.1.s390x", "openSUSE Tumbleweed:busybox-1.35.0-1.1.x86_64", "openSUSE Tumbleweed:busybox-static-1.35.0-1.1.aarch64", "openSUSE Tumbleweed:busybox-static-1.35.0-1.1.ppc64le", "openSUSE Tumbleweed:busybox-static-1.35.0-1.1.s390x", "openSUSE Tumbleweed:busybox-static-1.35.0-1.1.x86_64", "openSUSE Tumbleweed:busybox-testsuite-1.35.0-1.1.aarch64", "openSUSE Tumbleweed:busybox-testsuite-1.35.0-1.1.ppc64le", "openSUSE Tumbleweed:busybox-testsuite-1.35.0-1.1.s390x", "openSUSE Tumbleweed:busybox-testsuite-1.35.0-1.1.x86_64", "openSUSE Tumbleweed:busybox-warewulf3-1.35.0-1.1.aarch64", "openSUSE Tumbleweed:busybox-warewulf3-1.35.0-1.1.ppc64le", "openSUSE Tumbleweed:busybox-warewulf3-1.35.0-1.1.s390x", "openSUSE Tumbleweed:busybox-warewulf3-1.35.0-1.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2018-1000500", url: "https://www.suse.com/security/cve/CVE-2018-1000500", }, { category: "external", summary: "SUSE Bug 1099263 for CVE-2018-1000500", url: "https://bugzilla.suse.com/1099263", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:busybox-1.35.0-1.1.aarch64", "openSUSE Tumbleweed:busybox-1.35.0-1.1.ppc64le", "openSUSE Tumbleweed:busybox-1.35.0-1.1.s390x", "openSUSE Tumbleweed:busybox-1.35.0-1.1.x86_64", "openSUSE Tumbleweed:busybox-static-1.35.0-1.1.aarch64", "openSUSE Tumbleweed:busybox-static-1.35.0-1.1.ppc64le", "openSUSE Tumbleweed:busybox-static-1.35.0-1.1.s390x", "openSUSE Tumbleweed:busybox-static-1.35.0-1.1.x86_64", "openSUSE Tumbleweed:busybox-testsuite-1.35.0-1.1.aarch64", "openSUSE Tumbleweed:busybox-testsuite-1.35.0-1.1.ppc64le", "openSUSE Tumbleweed:busybox-testsuite-1.35.0-1.1.s390x", "openSUSE Tumbleweed:busybox-testsuite-1.35.0-1.1.x86_64", "openSUSE Tumbleweed:busybox-warewulf3-1.35.0-1.1.aarch64", "openSUSE Tumbleweed:busybox-warewulf3-1.35.0-1.1.ppc64le", "openSUSE Tumbleweed:busybox-warewulf3-1.35.0-1.1.s390x", "openSUSE Tumbleweed:busybox-warewulf3-1.35.0-1.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 7.5, baseSeverity: "HIGH", vectorString: "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N", version: "3.0", }, products: [ "openSUSE Tumbleweed:busybox-1.35.0-1.1.aarch64", "openSUSE Tumbleweed:busybox-1.35.0-1.1.ppc64le", "openSUSE Tumbleweed:busybox-1.35.0-1.1.s390x", "openSUSE Tumbleweed:busybox-1.35.0-1.1.x86_64", "openSUSE Tumbleweed:busybox-static-1.35.0-1.1.aarch64", "openSUSE Tumbleweed:busybox-static-1.35.0-1.1.ppc64le", "openSUSE Tumbleweed:busybox-static-1.35.0-1.1.s390x", "openSUSE Tumbleweed:busybox-static-1.35.0-1.1.x86_64", "openSUSE Tumbleweed:busybox-testsuite-1.35.0-1.1.aarch64", "openSUSE Tumbleweed:busybox-testsuite-1.35.0-1.1.ppc64le", "openSUSE Tumbleweed:busybox-testsuite-1.35.0-1.1.s390x", "openSUSE Tumbleweed:busybox-testsuite-1.35.0-1.1.x86_64", "openSUSE Tumbleweed:busybox-warewulf3-1.35.0-1.1.aarch64", "openSUSE Tumbleweed:busybox-warewulf3-1.35.0-1.1.ppc64le", "openSUSE Tumbleweed:busybox-warewulf3-1.35.0-1.1.s390x", "openSUSE Tumbleweed:busybox-warewulf3-1.35.0-1.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "important", }, ], title: "CVE-2018-1000500", }, { cve: "CVE-2018-1000517", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2018-1000517", }, ], notes: [ { category: "general", text: "BusyBox project BusyBox wget version prior to commit 8e2174e9bd836e53c8b9c6e00d1bc6e2a718686e contains a Buffer Overflow vulnerability in Busybox wget that can result in heap buffer overflow. This attack appear to be exploitable via network connectivity. This vulnerability appears to have been fixed in after commit 8e2174e9bd836e53c8b9c6e00d1bc6e2a718686e.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:busybox-1.35.0-1.1.aarch64", "openSUSE Tumbleweed:busybox-1.35.0-1.1.ppc64le", "openSUSE Tumbleweed:busybox-1.35.0-1.1.s390x", "openSUSE Tumbleweed:busybox-1.35.0-1.1.x86_64", "openSUSE Tumbleweed:busybox-static-1.35.0-1.1.aarch64", "openSUSE Tumbleweed:busybox-static-1.35.0-1.1.ppc64le", "openSUSE Tumbleweed:busybox-static-1.35.0-1.1.s390x", "openSUSE Tumbleweed:busybox-static-1.35.0-1.1.x86_64", "openSUSE Tumbleweed:busybox-testsuite-1.35.0-1.1.aarch64", "openSUSE Tumbleweed:busybox-testsuite-1.35.0-1.1.ppc64le", "openSUSE Tumbleweed:busybox-testsuite-1.35.0-1.1.s390x", "openSUSE Tumbleweed:busybox-testsuite-1.35.0-1.1.x86_64", "openSUSE Tumbleweed:busybox-warewulf3-1.35.0-1.1.aarch64", "openSUSE Tumbleweed:busybox-warewulf3-1.35.0-1.1.ppc64le", "openSUSE Tumbleweed:busybox-warewulf3-1.35.0-1.1.s390x", "openSUSE Tumbleweed:busybox-warewulf3-1.35.0-1.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2018-1000517", url: "https://www.suse.com/security/cve/CVE-2018-1000517", }, { category: "external", summary: "SUSE Bug 1099260 for CVE-2018-1000517", url: "https://bugzilla.suse.com/1099260", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:busybox-1.35.0-1.1.aarch64", "openSUSE Tumbleweed:busybox-1.35.0-1.1.ppc64le", "openSUSE Tumbleweed:busybox-1.35.0-1.1.s390x", "openSUSE Tumbleweed:busybox-1.35.0-1.1.x86_64", "openSUSE Tumbleweed:busybox-static-1.35.0-1.1.aarch64", "openSUSE Tumbleweed:busybox-static-1.35.0-1.1.ppc64le", "openSUSE Tumbleweed:busybox-static-1.35.0-1.1.s390x", "openSUSE Tumbleweed:busybox-static-1.35.0-1.1.x86_64", "openSUSE Tumbleweed:busybox-testsuite-1.35.0-1.1.aarch64", "openSUSE Tumbleweed:busybox-testsuite-1.35.0-1.1.ppc64le", "openSUSE Tumbleweed:busybox-testsuite-1.35.0-1.1.s390x", "openSUSE Tumbleweed:busybox-testsuite-1.35.0-1.1.x86_64", "openSUSE Tumbleweed:busybox-warewulf3-1.35.0-1.1.aarch64", "openSUSE Tumbleweed:busybox-warewulf3-1.35.0-1.1.ppc64le", "openSUSE Tumbleweed:busybox-warewulf3-1.35.0-1.1.s390x", "openSUSE Tumbleweed:busybox-warewulf3-1.35.0-1.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.6, baseSeverity: "MEDIUM", vectorString: "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L", version: "3.0", }, products: [ "openSUSE Tumbleweed:busybox-1.35.0-1.1.aarch64", "openSUSE Tumbleweed:busybox-1.35.0-1.1.ppc64le", "openSUSE Tumbleweed:busybox-1.35.0-1.1.s390x", "openSUSE Tumbleweed:busybox-1.35.0-1.1.x86_64", "openSUSE Tumbleweed:busybox-static-1.35.0-1.1.aarch64", "openSUSE Tumbleweed:busybox-static-1.35.0-1.1.ppc64le", "openSUSE Tumbleweed:busybox-static-1.35.0-1.1.s390x", "openSUSE Tumbleweed:busybox-static-1.35.0-1.1.x86_64", "openSUSE Tumbleweed:busybox-testsuite-1.35.0-1.1.aarch64", "openSUSE Tumbleweed:busybox-testsuite-1.35.0-1.1.ppc64le", "openSUSE Tumbleweed:busybox-testsuite-1.35.0-1.1.s390x", "openSUSE Tumbleweed:busybox-testsuite-1.35.0-1.1.x86_64", "openSUSE Tumbleweed:busybox-warewulf3-1.35.0-1.1.aarch64", "openSUSE Tumbleweed:busybox-warewulf3-1.35.0-1.1.ppc64le", "openSUSE Tumbleweed:busybox-warewulf3-1.35.0-1.1.s390x", "openSUSE Tumbleweed:busybox-warewulf3-1.35.0-1.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "important", }, ], title: "CVE-2018-1000517", }, { cve: "CVE-2018-20679", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2018-20679", }, ], notes: [ { category: "general", text: "An issue was discovered in BusyBox before 1.30.0. An out of bounds read in udhcp components (consumed by the DHCP server, client, and relay) allows a remote attacker to leak sensitive information from the stack by sending a crafted DHCP message. This is related to verification in udhcp_get_option() in networking/udhcp/common.c that 4-byte options are indeed 4 bytes.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:busybox-1.35.0-1.1.aarch64", "openSUSE Tumbleweed:busybox-1.35.0-1.1.ppc64le", "openSUSE Tumbleweed:busybox-1.35.0-1.1.s390x", "openSUSE Tumbleweed:busybox-1.35.0-1.1.x86_64", "openSUSE Tumbleweed:busybox-static-1.35.0-1.1.aarch64", "openSUSE Tumbleweed:busybox-static-1.35.0-1.1.ppc64le", "openSUSE Tumbleweed:busybox-static-1.35.0-1.1.s390x", "openSUSE Tumbleweed:busybox-static-1.35.0-1.1.x86_64", "openSUSE Tumbleweed:busybox-testsuite-1.35.0-1.1.aarch64", "openSUSE Tumbleweed:busybox-testsuite-1.35.0-1.1.ppc64le", "openSUSE Tumbleweed:busybox-testsuite-1.35.0-1.1.s390x", "openSUSE Tumbleweed:busybox-testsuite-1.35.0-1.1.x86_64", "openSUSE Tumbleweed:busybox-warewulf3-1.35.0-1.1.aarch64", "openSUSE Tumbleweed:busybox-warewulf3-1.35.0-1.1.ppc64le", "openSUSE Tumbleweed:busybox-warewulf3-1.35.0-1.1.s390x", "openSUSE Tumbleweed:busybox-warewulf3-1.35.0-1.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2018-20679", url: "https://www.suse.com/security/cve/CVE-2018-20679", }, { category: "external", summary: "SUSE Bug 1121426 for CVE-2018-20679", url: "https://bugzilla.suse.com/1121426", }, { category: "external", summary: "SUSE Bug 1121428 for CVE-2018-20679", url: "https://bugzilla.suse.com/1121428", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:busybox-1.35.0-1.1.aarch64", "openSUSE Tumbleweed:busybox-1.35.0-1.1.ppc64le", "openSUSE Tumbleweed:busybox-1.35.0-1.1.s390x", "openSUSE Tumbleweed:busybox-1.35.0-1.1.x86_64", "openSUSE Tumbleweed:busybox-static-1.35.0-1.1.aarch64", "openSUSE Tumbleweed:busybox-static-1.35.0-1.1.ppc64le", "openSUSE Tumbleweed:busybox-static-1.35.0-1.1.s390x", "openSUSE Tumbleweed:busybox-static-1.35.0-1.1.x86_64", "openSUSE Tumbleweed:busybox-testsuite-1.35.0-1.1.aarch64", "openSUSE Tumbleweed:busybox-testsuite-1.35.0-1.1.ppc64le", "openSUSE Tumbleweed:busybox-testsuite-1.35.0-1.1.s390x", "openSUSE Tumbleweed:busybox-testsuite-1.35.0-1.1.x86_64", "openSUSE Tumbleweed:busybox-warewulf3-1.35.0-1.1.aarch64", "openSUSE Tumbleweed:busybox-warewulf3-1.35.0-1.1.ppc64le", "openSUSE Tumbleweed:busybox-warewulf3-1.35.0-1.1.s390x", "openSUSE Tumbleweed:busybox-warewulf3-1.35.0-1.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.3, baseSeverity: "MEDIUM", vectorString: "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N", version: "3.0", }, products: [ "openSUSE Tumbleweed:busybox-1.35.0-1.1.aarch64", "openSUSE Tumbleweed:busybox-1.35.0-1.1.ppc64le", "openSUSE Tumbleweed:busybox-1.35.0-1.1.s390x", "openSUSE Tumbleweed:busybox-1.35.0-1.1.x86_64", "openSUSE Tumbleweed:busybox-static-1.35.0-1.1.aarch64", "openSUSE Tumbleweed:busybox-static-1.35.0-1.1.ppc64le", "openSUSE Tumbleweed:busybox-static-1.35.0-1.1.s390x", "openSUSE Tumbleweed:busybox-static-1.35.0-1.1.x86_64", "openSUSE Tumbleweed:busybox-testsuite-1.35.0-1.1.aarch64", "openSUSE Tumbleweed:busybox-testsuite-1.35.0-1.1.ppc64le", "openSUSE Tumbleweed:busybox-testsuite-1.35.0-1.1.s390x", "openSUSE Tumbleweed:busybox-testsuite-1.35.0-1.1.x86_64", "openSUSE Tumbleweed:busybox-warewulf3-1.35.0-1.1.aarch64", "openSUSE Tumbleweed:busybox-warewulf3-1.35.0-1.1.ppc64le", "openSUSE Tumbleweed:busybox-warewulf3-1.35.0-1.1.s390x", "openSUSE Tumbleweed:busybox-warewulf3-1.35.0-1.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "moderate", }, ], title: "CVE-2018-20679", }, { cve: "CVE-2019-5747", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2019-5747", }, ], notes: [ { category: "general", text: "An issue was discovered in BusyBox through 1.30.0. An out of bounds read in udhcp components (consumed by the DHCP client, server, and/or relay) might allow a remote attacker to leak sensitive information from the stack by sending a crafted DHCP message. This is related to assurance of a 4-byte length when decoding DHCP_SUBNET. NOTE: this issue exists because of an incomplete fix for CVE-2018-20679.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:busybox-1.35.0-1.1.aarch64", "openSUSE Tumbleweed:busybox-1.35.0-1.1.ppc64le", "openSUSE Tumbleweed:busybox-1.35.0-1.1.s390x", "openSUSE Tumbleweed:busybox-1.35.0-1.1.x86_64", "openSUSE Tumbleweed:busybox-static-1.35.0-1.1.aarch64", "openSUSE Tumbleweed:busybox-static-1.35.0-1.1.ppc64le", "openSUSE Tumbleweed:busybox-static-1.35.0-1.1.s390x", "openSUSE Tumbleweed:busybox-static-1.35.0-1.1.x86_64", "openSUSE Tumbleweed:busybox-testsuite-1.35.0-1.1.aarch64", "openSUSE Tumbleweed:busybox-testsuite-1.35.0-1.1.ppc64le", "openSUSE Tumbleweed:busybox-testsuite-1.35.0-1.1.s390x", "openSUSE Tumbleweed:busybox-testsuite-1.35.0-1.1.x86_64", "openSUSE Tumbleweed:busybox-warewulf3-1.35.0-1.1.aarch64", "openSUSE Tumbleweed:busybox-warewulf3-1.35.0-1.1.ppc64le", "openSUSE Tumbleweed:busybox-warewulf3-1.35.0-1.1.s390x", "openSUSE Tumbleweed:busybox-warewulf3-1.35.0-1.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2019-5747", url: "https://www.suse.com/security/cve/CVE-2019-5747", }, { category: "external", summary: "SUSE Bug 1121426 for CVE-2019-5747", url: "https://bugzilla.suse.com/1121426", }, { category: "external", summary: "SUSE Bug 1121428 for CVE-2019-5747", url: "https://bugzilla.suse.com/1121428", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:busybox-1.35.0-1.1.aarch64", "openSUSE Tumbleweed:busybox-1.35.0-1.1.ppc64le", "openSUSE Tumbleweed:busybox-1.35.0-1.1.s390x", "openSUSE Tumbleweed:busybox-1.35.0-1.1.x86_64", "openSUSE Tumbleweed:busybox-static-1.35.0-1.1.aarch64", "openSUSE Tumbleweed:busybox-static-1.35.0-1.1.ppc64le", "openSUSE Tumbleweed:busybox-static-1.35.0-1.1.s390x", "openSUSE Tumbleweed:busybox-static-1.35.0-1.1.x86_64", "openSUSE Tumbleweed:busybox-testsuite-1.35.0-1.1.aarch64", "openSUSE Tumbleweed:busybox-testsuite-1.35.0-1.1.ppc64le", "openSUSE Tumbleweed:busybox-testsuite-1.35.0-1.1.s390x", "openSUSE Tumbleweed:busybox-testsuite-1.35.0-1.1.x86_64", "openSUSE Tumbleweed:busybox-warewulf3-1.35.0-1.1.aarch64", "openSUSE Tumbleweed:busybox-warewulf3-1.35.0-1.1.ppc64le", "openSUSE Tumbleweed:busybox-warewulf3-1.35.0-1.1.s390x", "openSUSE Tumbleweed:busybox-warewulf3-1.35.0-1.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 3.5, baseSeverity: "LOW", vectorString: "CVSS:3.1/AV:A/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N", version: "3.1", }, products: [ "openSUSE Tumbleweed:busybox-1.35.0-1.1.aarch64", "openSUSE Tumbleweed:busybox-1.35.0-1.1.ppc64le", "openSUSE Tumbleweed:busybox-1.35.0-1.1.s390x", "openSUSE Tumbleweed:busybox-1.35.0-1.1.x86_64", "openSUSE Tumbleweed:busybox-static-1.35.0-1.1.aarch64", "openSUSE Tumbleweed:busybox-static-1.35.0-1.1.ppc64le", "openSUSE Tumbleweed:busybox-static-1.35.0-1.1.s390x", "openSUSE Tumbleweed:busybox-static-1.35.0-1.1.x86_64", "openSUSE Tumbleweed:busybox-testsuite-1.35.0-1.1.aarch64", "openSUSE Tumbleweed:busybox-testsuite-1.35.0-1.1.ppc64le", "openSUSE Tumbleweed:busybox-testsuite-1.35.0-1.1.s390x", "openSUSE Tumbleweed:busybox-testsuite-1.35.0-1.1.x86_64", "openSUSE Tumbleweed:busybox-warewulf3-1.35.0-1.1.aarch64", "openSUSE Tumbleweed:busybox-warewulf3-1.35.0-1.1.ppc64le", "openSUSE Tumbleweed:busybox-warewulf3-1.35.0-1.1.s390x", "openSUSE Tumbleweed:busybox-warewulf3-1.35.0-1.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "low", }, ], title: "CVE-2019-5747", }, { cve: "CVE-2021-28831", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2021-28831", }, ], notes: [ { category: "general", text: "decompress_gunzip.c in BusyBox through 1.32.1 mishandles the error bit on the huft_build result pointer, with a resultant invalid free or segmentation fault, via malformed gzip data.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:busybox-1.35.0-1.1.aarch64", "openSUSE Tumbleweed:busybox-1.35.0-1.1.ppc64le", "openSUSE Tumbleweed:busybox-1.35.0-1.1.s390x", "openSUSE Tumbleweed:busybox-1.35.0-1.1.x86_64", "openSUSE Tumbleweed:busybox-static-1.35.0-1.1.aarch64", "openSUSE Tumbleweed:busybox-static-1.35.0-1.1.ppc64le", "openSUSE Tumbleweed:busybox-static-1.35.0-1.1.s390x", "openSUSE Tumbleweed:busybox-static-1.35.0-1.1.x86_64", "openSUSE Tumbleweed:busybox-testsuite-1.35.0-1.1.aarch64", "openSUSE Tumbleweed:busybox-testsuite-1.35.0-1.1.ppc64le", "openSUSE Tumbleweed:busybox-testsuite-1.35.0-1.1.s390x", "openSUSE Tumbleweed:busybox-testsuite-1.35.0-1.1.x86_64", "openSUSE Tumbleweed:busybox-warewulf3-1.35.0-1.1.aarch64", "openSUSE Tumbleweed:busybox-warewulf3-1.35.0-1.1.ppc64le", "openSUSE Tumbleweed:busybox-warewulf3-1.35.0-1.1.s390x", "openSUSE Tumbleweed:busybox-warewulf3-1.35.0-1.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2021-28831", url: "https://www.suse.com/security/cve/CVE-2021-28831", }, { category: "external", summary: "SUSE Bug 1184522 for CVE-2021-28831", url: "https://bugzilla.suse.com/1184522", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:busybox-1.35.0-1.1.aarch64", "openSUSE Tumbleweed:busybox-1.35.0-1.1.ppc64le", "openSUSE Tumbleweed:busybox-1.35.0-1.1.s390x", "openSUSE Tumbleweed:busybox-1.35.0-1.1.x86_64", "openSUSE Tumbleweed:busybox-static-1.35.0-1.1.aarch64", "openSUSE Tumbleweed:busybox-static-1.35.0-1.1.ppc64le", "openSUSE Tumbleweed:busybox-static-1.35.0-1.1.s390x", "openSUSE Tumbleweed:busybox-static-1.35.0-1.1.x86_64", "openSUSE Tumbleweed:busybox-testsuite-1.35.0-1.1.aarch64", "openSUSE Tumbleweed:busybox-testsuite-1.35.0-1.1.ppc64le", "openSUSE Tumbleweed:busybox-testsuite-1.35.0-1.1.s390x", "openSUSE Tumbleweed:busybox-testsuite-1.35.0-1.1.x86_64", "openSUSE Tumbleweed:busybox-warewulf3-1.35.0-1.1.aarch64", "openSUSE Tumbleweed:busybox-warewulf3-1.35.0-1.1.ppc64le", "openSUSE Tumbleweed:busybox-warewulf3-1.35.0-1.1.s390x", "openSUSE Tumbleweed:busybox-warewulf3-1.35.0-1.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 7.5, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "openSUSE Tumbleweed:busybox-1.35.0-1.1.aarch64", "openSUSE Tumbleweed:busybox-1.35.0-1.1.ppc64le", "openSUSE Tumbleweed:busybox-1.35.0-1.1.s390x", "openSUSE Tumbleweed:busybox-1.35.0-1.1.x86_64", "openSUSE Tumbleweed:busybox-static-1.35.0-1.1.aarch64", "openSUSE Tumbleweed:busybox-static-1.35.0-1.1.ppc64le", "openSUSE Tumbleweed:busybox-static-1.35.0-1.1.s390x", "openSUSE Tumbleweed:busybox-static-1.35.0-1.1.x86_64", "openSUSE Tumbleweed:busybox-testsuite-1.35.0-1.1.aarch64", "openSUSE Tumbleweed:busybox-testsuite-1.35.0-1.1.ppc64le", "openSUSE Tumbleweed:busybox-testsuite-1.35.0-1.1.s390x", "openSUSE Tumbleweed:busybox-testsuite-1.35.0-1.1.x86_64", "openSUSE Tumbleweed:busybox-warewulf3-1.35.0-1.1.aarch64", "openSUSE Tumbleweed:busybox-warewulf3-1.35.0-1.1.ppc64le", "openSUSE Tumbleweed:busybox-warewulf3-1.35.0-1.1.s390x", "openSUSE Tumbleweed:busybox-warewulf3-1.35.0-1.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "important", }, ], title: "CVE-2021-28831", }, { cve: "CVE-2021-42373", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2021-42373", }, ], notes: [ { category: "general", text: "A NULL pointer dereference in Busybox's man applet leads to denial of service when a section name is supplied but no page argument is given", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:busybox-1.35.0-1.1.aarch64", "openSUSE Tumbleweed:busybox-1.35.0-1.1.ppc64le", "openSUSE Tumbleweed:busybox-1.35.0-1.1.s390x", "openSUSE Tumbleweed:busybox-1.35.0-1.1.x86_64", "openSUSE Tumbleweed:busybox-static-1.35.0-1.1.aarch64", "openSUSE Tumbleweed:busybox-static-1.35.0-1.1.ppc64le", "openSUSE Tumbleweed:busybox-static-1.35.0-1.1.s390x", "openSUSE Tumbleweed:busybox-static-1.35.0-1.1.x86_64", "openSUSE Tumbleweed:busybox-testsuite-1.35.0-1.1.aarch64", "openSUSE Tumbleweed:busybox-testsuite-1.35.0-1.1.ppc64le", "openSUSE Tumbleweed:busybox-testsuite-1.35.0-1.1.s390x", "openSUSE Tumbleweed:busybox-testsuite-1.35.0-1.1.x86_64", "openSUSE Tumbleweed:busybox-warewulf3-1.35.0-1.1.aarch64", "openSUSE Tumbleweed:busybox-warewulf3-1.35.0-1.1.ppc64le", "openSUSE Tumbleweed:busybox-warewulf3-1.35.0-1.1.s390x", "openSUSE Tumbleweed:busybox-warewulf3-1.35.0-1.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2021-42373", url: "https://www.suse.com/security/cve/CVE-2021-42373", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:busybox-1.35.0-1.1.aarch64", "openSUSE Tumbleweed:busybox-1.35.0-1.1.ppc64le", "openSUSE Tumbleweed:busybox-1.35.0-1.1.s390x", "openSUSE Tumbleweed:busybox-1.35.0-1.1.x86_64", "openSUSE Tumbleweed:busybox-static-1.35.0-1.1.aarch64", "openSUSE Tumbleweed:busybox-static-1.35.0-1.1.ppc64le", "openSUSE Tumbleweed:busybox-static-1.35.0-1.1.s390x", "openSUSE Tumbleweed:busybox-static-1.35.0-1.1.x86_64", "openSUSE Tumbleweed:busybox-testsuite-1.35.0-1.1.aarch64", "openSUSE Tumbleweed:busybox-testsuite-1.35.0-1.1.ppc64le", "openSUSE Tumbleweed:busybox-testsuite-1.35.0-1.1.s390x", "openSUSE Tumbleweed:busybox-testsuite-1.35.0-1.1.x86_64", "openSUSE Tumbleweed:busybox-warewulf3-1.35.0-1.1.aarch64", "openSUSE Tumbleweed:busybox-warewulf3-1.35.0-1.1.ppc64le", "openSUSE Tumbleweed:busybox-warewulf3-1.35.0-1.1.s390x", "openSUSE Tumbleweed:busybox-warewulf3-1.35.0-1.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.5, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "openSUSE Tumbleweed:busybox-1.35.0-1.1.aarch64", "openSUSE Tumbleweed:busybox-1.35.0-1.1.ppc64le", "openSUSE Tumbleweed:busybox-1.35.0-1.1.s390x", "openSUSE Tumbleweed:busybox-1.35.0-1.1.x86_64", "openSUSE Tumbleweed:busybox-static-1.35.0-1.1.aarch64", "openSUSE Tumbleweed:busybox-static-1.35.0-1.1.ppc64le", "openSUSE Tumbleweed:busybox-static-1.35.0-1.1.s390x", "openSUSE Tumbleweed:busybox-static-1.35.0-1.1.x86_64", "openSUSE Tumbleweed:busybox-testsuite-1.35.0-1.1.aarch64", "openSUSE Tumbleweed:busybox-testsuite-1.35.0-1.1.ppc64le", "openSUSE Tumbleweed:busybox-testsuite-1.35.0-1.1.s390x", "openSUSE Tumbleweed:busybox-testsuite-1.35.0-1.1.x86_64", "openSUSE Tumbleweed:busybox-warewulf3-1.35.0-1.1.aarch64", "openSUSE Tumbleweed:busybox-warewulf3-1.35.0-1.1.ppc64le", "openSUSE Tumbleweed:busybox-warewulf3-1.35.0-1.1.s390x", "openSUSE Tumbleweed:busybox-warewulf3-1.35.0-1.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "moderate", }, ], title: "CVE-2021-42373", }, { cve: "CVE-2021-42377", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2021-42377", }, ], notes: [ { category: "general", text: "An attacker-controlled pointer free in Busybox's hush applet leads to denial of service and possible code execution when processing a crafted shell command, due to the shell mishandling the &&& string. This may be used for remote code execution under rare conditions of filtered command input.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:busybox-1.35.0-1.1.aarch64", "openSUSE Tumbleweed:busybox-1.35.0-1.1.ppc64le", "openSUSE Tumbleweed:busybox-1.35.0-1.1.s390x", "openSUSE Tumbleweed:busybox-1.35.0-1.1.x86_64", "openSUSE Tumbleweed:busybox-static-1.35.0-1.1.aarch64", "openSUSE Tumbleweed:busybox-static-1.35.0-1.1.ppc64le", "openSUSE Tumbleweed:busybox-static-1.35.0-1.1.s390x", "openSUSE Tumbleweed:busybox-static-1.35.0-1.1.x86_64", "openSUSE Tumbleweed:busybox-testsuite-1.35.0-1.1.aarch64", "openSUSE Tumbleweed:busybox-testsuite-1.35.0-1.1.ppc64le", "openSUSE Tumbleweed:busybox-testsuite-1.35.0-1.1.s390x", "openSUSE Tumbleweed:busybox-testsuite-1.35.0-1.1.x86_64", "openSUSE Tumbleweed:busybox-warewulf3-1.35.0-1.1.aarch64", "openSUSE Tumbleweed:busybox-warewulf3-1.35.0-1.1.ppc64le", "openSUSE Tumbleweed:busybox-warewulf3-1.35.0-1.1.s390x", "openSUSE Tumbleweed:busybox-warewulf3-1.35.0-1.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2021-42377", url: "https://www.suse.com/security/cve/CVE-2021-42377", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:busybox-1.35.0-1.1.aarch64", "openSUSE Tumbleweed:busybox-1.35.0-1.1.ppc64le", "openSUSE Tumbleweed:busybox-1.35.0-1.1.s390x", "openSUSE Tumbleweed:busybox-1.35.0-1.1.x86_64", "openSUSE Tumbleweed:busybox-static-1.35.0-1.1.aarch64", "openSUSE Tumbleweed:busybox-static-1.35.0-1.1.ppc64le", "openSUSE Tumbleweed:busybox-static-1.35.0-1.1.s390x", "openSUSE Tumbleweed:busybox-static-1.35.0-1.1.x86_64", "openSUSE Tumbleweed:busybox-testsuite-1.35.0-1.1.aarch64", "openSUSE Tumbleweed:busybox-testsuite-1.35.0-1.1.ppc64le", "openSUSE Tumbleweed:busybox-testsuite-1.35.0-1.1.s390x", "openSUSE Tumbleweed:busybox-testsuite-1.35.0-1.1.x86_64", "openSUSE Tumbleweed:busybox-warewulf3-1.35.0-1.1.aarch64", "openSUSE Tumbleweed:busybox-warewulf3-1.35.0-1.1.ppc64le", "openSUSE Tumbleweed:busybox-warewulf3-1.35.0-1.1.s390x", "openSUSE Tumbleweed:busybox-warewulf3-1.35.0-1.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 6.4, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, products: [ "openSUSE Tumbleweed:busybox-1.35.0-1.1.aarch64", "openSUSE Tumbleweed:busybox-1.35.0-1.1.ppc64le", "openSUSE Tumbleweed:busybox-1.35.0-1.1.s390x", "openSUSE Tumbleweed:busybox-1.35.0-1.1.x86_64", "openSUSE Tumbleweed:busybox-static-1.35.0-1.1.aarch64", "openSUSE Tumbleweed:busybox-static-1.35.0-1.1.ppc64le", "openSUSE Tumbleweed:busybox-static-1.35.0-1.1.s390x", "openSUSE Tumbleweed:busybox-static-1.35.0-1.1.x86_64", "openSUSE Tumbleweed:busybox-testsuite-1.35.0-1.1.aarch64", "openSUSE Tumbleweed:busybox-testsuite-1.35.0-1.1.ppc64le", "openSUSE Tumbleweed:busybox-testsuite-1.35.0-1.1.s390x", "openSUSE Tumbleweed:busybox-testsuite-1.35.0-1.1.x86_64", "openSUSE Tumbleweed:busybox-warewulf3-1.35.0-1.1.aarch64", "openSUSE Tumbleweed:busybox-warewulf3-1.35.0-1.1.ppc64le", "openSUSE Tumbleweed:busybox-warewulf3-1.35.0-1.1.s390x", "openSUSE Tumbleweed:busybox-warewulf3-1.35.0-1.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "moderate", }, ], title: "CVE-2021-42377", }, { cve: "CVE-2021-42381", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2021-42381", }, ], notes: [ { category: "general", text: "A use-after-free in Busybox's awk applet leads to denial of service and possibly code execution when processing a crafted awk pattern in the hash_init function", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:busybox-1.35.0-1.1.aarch64", "openSUSE Tumbleweed:busybox-1.35.0-1.1.ppc64le", "openSUSE Tumbleweed:busybox-1.35.0-1.1.s390x", "openSUSE Tumbleweed:busybox-1.35.0-1.1.x86_64", "openSUSE Tumbleweed:busybox-static-1.35.0-1.1.aarch64", "openSUSE Tumbleweed:busybox-static-1.35.0-1.1.ppc64le", "openSUSE Tumbleweed:busybox-static-1.35.0-1.1.s390x", "openSUSE Tumbleweed:busybox-static-1.35.0-1.1.x86_64", "openSUSE Tumbleweed:busybox-testsuite-1.35.0-1.1.aarch64", "openSUSE Tumbleweed:busybox-testsuite-1.35.0-1.1.ppc64le", "openSUSE Tumbleweed:busybox-testsuite-1.35.0-1.1.s390x", "openSUSE Tumbleweed:busybox-testsuite-1.35.0-1.1.x86_64", "openSUSE Tumbleweed:busybox-warewulf3-1.35.0-1.1.aarch64", "openSUSE Tumbleweed:busybox-warewulf3-1.35.0-1.1.ppc64le", "openSUSE Tumbleweed:busybox-warewulf3-1.35.0-1.1.s390x", "openSUSE Tumbleweed:busybox-warewulf3-1.35.0-1.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2021-42381", url: "https://www.suse.com/security/cve/CVE-2021-42381", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:busybox-1.35.0-1.1.aarch64", "openSUSE Tumbleweed:busybox-1.35.0-1.1.ppc64le", "openSUSE Tumbleweed:busybox-1.35.0-1.1.s390x", "openSUSE Tumbleweed:busybox-1.35.0-1.1.x86_64", "openSUSE Tumbleweed:busybox-static-1.35.0-1.1.aarch64", "openSUSE Tumbleweed:busybox-static-1.35.0-1.1.ppc64le", "openSUSE Tumbleweed:busybox-static-1.35.0-1.1.s390x", "openSUSE Tumbleweed:busybox-static-1.35.0-1.1.x86_64", "openSUSE Tumbleweed:busybox-testsuite-1.35.0-1.1.aarch64", "openSUSE Tumbleweed:busybox-testsuite-1.35.0-1.1.ppc64le", "openSUSE Tumbleweed:busybox-testsuite-1.35.0-1.1.s390x", "openSUSE Tumbleweed:busybox-testsuite-1.35.0-1.1.x86_64", "openSUSE Tumbleweed:busybox-warewulf3-1.35.0-1.1.aarch64", "openSUSE Tumbleweed:busybox-warewulf3-1.35.0-1.1.ppc64le", "openSUSE Tumbleweed:busybox-warewulf3-1.35.0-1.1.s390x", "openSUSE Tumbleweed:busybox-warewulf3-1.35.0-1.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 6.6, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, products: [ "openSUSE Tumbleweed:busybox-1.35.0-1.1.aarch64", "openSUSE Tumbleweed:busybox-1.35.0-1.1.ppc64le", "openSUSE Tumbleweed:busybox-1.35.0-1.1.s390x", "openSUSE Tumbleweed:busybox-1.35.0-1.1.x86_64", "openSUSE Tumbleweed:busybox-static-1.35.0-1.1.aarch64", "openSUSE Tumbleweed:busybox-static-1.35.0-1.1.ppc64le", "openSUSE Tumbleweed:busybox-static-1.35.0-1.1.s390x", "openSUSE Tumbleweed:busybox-static-1.35.0-1.1.x86_64", "openSUSE Tumbleweed:busybox-testsuite-1.35.0-1.1.aarch64", "openSUSE Tumbleweed:busybox-testsuite-1.35.0-1.1.ppc64le", "openSUSE Tumbleweed:busybox-testsuite-1.35.0-1.1.s390x", "openSUSE Tumbleweed:busybox-testsuite-1.35.0-1.1.x86_64", "openSUSE Tumbleweed:busybox-warewulf3-1.35.0-1.1.aarch64", "openSUSE Tumbleweed:busybox-warewulf3-1.35.0-1.1.ppc64le", "openSUSE Tumbleweed:busybox-warewulf3-1.35.0-1.1.s390x", "openSUSE Tumbleweed:busybox-warewulf3-1.35.0-1.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "moderate", }, ], title: "CVE-2021-42381", }, { cve: "CVE-2021-42385", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2021-42385", }, ], notes: [ { category: "general", text: "A use-after-free in Busybox's awk applet leads to denial of service and possibly code execution when processing a crafted awk pattern in the evaluate function", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:busybox-1.35.0-1.1.aarch64", "openSUSE Tumbleweed:busybox-1.35.0-1.1.ppc64le", "openSUSE Tumbleweed:busybox-1.35.0-1.1.s390x", "openSUSE Tumbleweed:busybox-1.35.0-1.1.x86_64", "openSUSE Tumbleweed:busybox-static-1.35.0-1.1.aarch64", "openSUSE Tumbleweed:busybox-static-1.35.0-1.1.ppc64le", "openSUSE Tumbleweed:busybox-static-1.35.0-1.1.s390x", "openSUSE Tumbleweed:busybox-static-1.35.0-1.1.x86_64", "openSUSE Tumbleweed:busybox-testsuite-1.35.0-1.1.aarch64", "openSUSE Tumbleweed:busybox-testsuite-1.35.0-1.1.ppc64le", "openSUSE Tumbleweed:busybox-testsuite-1.35.0-1.1.s390x", "openSUSE Tumbleweed:busybox-testsuite-1.35.0-1.1.x86_64", "openSUSE Tumbleweed:busybox-warewulf3-1.35.0-1.1.aarch64", "openSUSE Tumbleweed:busybox-warewulf3-1.35.0-1.1.ppc64le", "openSUSE Tumbleweed:busybox-warewulf3-1.35.0-1.1.s390x", "openSUSE Tumbleweed:busybox-warewulf3-1.35.0-1.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2021-42385", url: "https://www.suse.com/security/cve/CVE-2021-42385", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:busybox-1.35.0-1.1.aarch64", "openSUSE Tumbleweed:busybox-1.35.0-1.1.ppc64le", "openSUSE Tumbleweed:busybox-1.35.0-1.1.s390x", "openSUSE Tumbleweed:busybox-1.35.0-1.1.x86_64", "openSUSE Tumbleweed:busybox-static-1.35.0-1.1.aarch64", "openSUSE Tumbleweed:busybox-static-1.35.0-1.1.ppc64le", "openSUSE Tumbleweed:busybox-static-1.35.0-1.1.s390x", "openSUSE Tumbleweed:busybox-static-1.35.0-1.1.x86_64", "openSUSE Tumbleweed:busybox-testsuite-1.35.0-1.1.aarch64", "openSUSE Tumbleweed:busybox-testsuite-1.35.0-1.1.ppc64le", "openSUSE Tumbleweed:busybox-testsuite-1.35.0-1.1.s390x", "openSUSE Tumbleweed:busybox-testsuite-1.35.0-1.1.x86_64", "openSUSE Tumbleweed:busybox-warewulf3-1.35.0-1.1.aarch64", "openSUSE Tumbleweed:busybox-warewulf3-1.35.0-1.1.ppc64le", "openSUSE Tumbleweed:busybox-warewulf3-1.35.0-1.1.s390x", "openSUSE Tumbleweed:busybox-warewulf3-1.35.0-1.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 6.6, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, products: [ "openSUSE Tumbleweed:busybox-1.35.0-1.1.aarch64", "openSUSE Tumbleweed:busybox-1.35.0-1.1.ppc64le", "openSUSE Tumbleweed:busybox-1.35.0-1.1.s390x", "openSUSE Tumbleweed:busybox-1.35.0-1.1.x86_64", "openSUSE Tumbleweed:busybox-static-1.35.0-1.1.aarch64", "openSUSE Tumbleweed:busybox-static-1.35.0-1.1.ppc64le", "openSUSE Tumbleweed:busybox-static-1.35.0-1.1.s390x", "openSUSE Tumbleweed:busybox-static-1.35.0-1.1.x86_64", "openSUSE Tumbleweed:busybox-testsuite-1.35.0-1.1.aarch64", "openSUSE Tumbleweed:busybox-testsuite-1.35.0-1.1.ppc64le", "openSUSE Tumbleweed:busybox-testsuite-1.35.0-1.1.s390x", "openSUSE Tumbleweed:busybox-testsuite-1.35.0-1.1.x86_64", "openSUSE Tumbleweed:busybox-warewulf3-1.35.0-1.1.aarch64", "openSUSE Tumbleweed:busybox-warewulf3-1.35.0-1.1.ppc64le", "openSUSE Tumbleweed:busybox-warewulf3-1.35.0-1.1.s390x", "openSUSE Tumbleweed:busybox-warewulf3-1.35.0-1.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "moderate", }, ], title: "CVE-2021-42385", }, ], }
ghsa-7w53-225r-6vxv
Vulnerability from github
Published
2022-05-24 17:44
Modified
2022-05-24 17:44
Severity ?
Details
decompress_gunzip.c in BusyBox through 1.32.1 mishandles the error bit on the huft_build result pointer, with a resultant invalid free or segmentation fault, via malformed gzip data.
{ affected: [], aliases: [ "CVE-2021-28831", ], database_specific: { cwe_ids: [ "CWE-755", ], github_reviewed: false, github_reviewed_at: null, nvd_published_at: "2021-03-19T05:15:00Z", severity: "HIGH", }, details: "decompress_gunzip.c in BusyBox through 1.32.1 mishandles the error bit on the huft_build result pointer, with a resultant invalid free or segmentation fault, via malformed gzip data.", id: "GHSA-7w53-225r-6vxv", modified: "2022-05-24T17:44:57Z", published: "2022-05-24T17:44:57Z", references: [ { type: "ADVISORY", url: "https://nvd.nist.gov/vuln/detail/CVE-2021-28831", }, { type: "WEB", url: "https://git.busybox.net/busybox/commit/?id=f25d254dfd4243698c31a4f3153d4ac72aa9e9bd", }, { type: "WEB", url: "https://lists.debian.org/debian-lts-announce/2021/04/msg00001.html", }, { type: "WEB", url: "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/3UDQGJRECXFS5EZVDH2OI45FMO436AC4", }, { type: "WEB", url: "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/Z7ZIFKPRR32ZYA3WAA2NXFA3QHHOU6FJ", }, { type: "WEB", url: "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ZASBW7QRRLY5V2R44MQ4QQM4CZIDHM2U", }, { type: "WEB", url: "https://security.gentoo.org/glsa/202105-09", }, ], schema_version: "1.4.0", severity: [ { score: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", type: "CVSS_V3", }, ], }
suse-su-2022:0135-2
Vulnerability from csaf_suse
Published
2022-02-14 10:50
Modified
2022-02-14 10:50
Summary
Security update for busybox
Notes
Title of the patch
Security update for busybox
Description of the patch
This update for busybox fixes the following issues:
- CVE-2011-5325: Fixed tar directory traversal (bsc#951562).
- CVE-2015-9261: Fixed segfalts and application crashes in huft_build (bsc#1102912).
- CVE-2016-2147: Fixed out of bounds write (heap) due to integer underflow in udhcpc (bsc#970663).
- CVE-2016-2148: Fixed heap-based buffer overflow in OPTION_6RD parsing (bsc#970662).
- CVE-2016-6301: Fixed NTP server denial of service flaw (bsc#991940).
- CVE-2017-15873: Fixed integer overflow in get_next_block function in archival/libarchive/decompress_bunzip2.c (bsc#1064976).
- CVE-2017-15874: Fixed integer underflow in archival/libarchive/decompress_unlzma.c (bsc#1064978).
- CVE-2017-16544: Fixed Insufficient sanitization of filenames when autocompleting (bsc#1069412).
- CVE-2018-1000500 : Fixed missing SSL certificate validation in wget (bsc#1099263).
- CVE-2018-1000517: Fixed heap-based buffer overflow in the retrieve_file_data() (bsc#1099260).
- CVE-2018-20679: Fixed out of bounds read in udhcp (bsc#1121426).
- CVE-2019-5747: Fixed out of bounds read in udhcp components (bsc#1121428).
- CVE-2021-28831: Fixed invalid free or segmentation fault via malformed gzip data (bsc#1184522).
- CVE-2021-42373: Fixed NULL pointer dereference in man leading to DoS when a section name is supplied but no page argument is given (bsc#1192869).
- CVE-2021-42374: Fixed out-of-bounds heap read in unlzma leading to information leak and DoS when crafted LZMA-compressed input is decompressed (bsc#1192869).
- CVE-2021-42375: Fixed incorrect handling of a special element in ash leading to DoS when processing a crafted shell command, due to the shell mistaking specific characters for reserved characters (bsc#1192869).
- CVE-2021-42376: Fixed NULL pointer dereference in hush leading to DoS when processing a crafted shell command (bsc#1192869).
- CVE-2021-42377: Fixed attacker-controlled pointer free in hush leading to DoS and possible code execution when processing a crafted shell command (bsc#1192869).
- CVE-2021-42378: Fixed use-after-free in awk leading to DoS and possibly code execution when processing a crafted awk pattern in the getvar_i function (bsc#1192869).
- CVE-2021-42379: Fixed use-after-free in awk leading to DoS and possibly code execution when processing a crafted awk pattern in the next_input_file function (bsc#1192869).
- CVE-2021-42380: Fixed use-after-free in awk leading to DoS and possibly code execution when processing a crafted awk pattern in the clrvar function (bsc#1192869).
- CVE-2021-42381: Fixed use-after-free in awk leading to DoS and possibly code execution when processing a crafted awk pattern in the hash_init function (bsc#1192869).
- CVE-2021-42382: Fixed use-after-free in awk leading to DoS and possibly code execution when processing a crafted awk pattern in the getvar_s function (bsc#1192869).
- CVE-2021-42383: Fixed use-after-free in awk leading to DoS and possibly code execution when processing a crafted awk pattern in the evaluate function (bsc#1192869).
- CVE-2021-42384: Fixed use-after-free in awk leading to DoS and possibly code execution when processing a crafted awk pattern in the handle_special function (bsc#1192869).
- CVE-2021-42385: Fixed use-after-free in awk leading to DoS and possibly code execution when processing a crafted awk pattern in the evaluate function (bsc#1192869).
- CVE-2021-42386: Fixed use-after-free in awk leading to DoS and possibly code execution when processing a crafted awk pattern in the nvalloc function (bsc#1192869).
Patchnames
SUSE-2022-135,SUSE-SLE-Product-RT-15-SP2-2022-135
Terms of use
CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
{ document: { aggregate_severity: { namespace: "https://www.suse.com/support/security/rating/", text: "important", }, category: "csaf_security_advisory", csaf_version: "2.0", distribution: { text: "Copyright 2024 SUSE LLC. All rights reserved.", tlp: { label: "WHITE", url: "https://www.first.org/tlp/", }, }, lang: "en", notes: [ { category: "summary", text: "Security update for busybox", title: "Title of the patch", }, { category: "description", text: "This update for busybox fixes the following issues:\n\n- CVE-2011-5325: Fixed tar directory traversal (bsc#951562).\n- CVE-2015-9261: Fixed segfalts and application crashes in huft_build (bsc#1102912).\n- CVE-2016-2147: Fixed out of bounds write (heap) due to integer underflow in udhcpc (bsc#970663).\n- CVE-2016-2148: Fixed heap-based buffer overflow in OPTION_6RD parsing (bsc#970662).\n- CVE-2016-6301: Fixed NTP server denial of service flaw (bsc#991940).\n- CVE-2017-15873: Fixed integer overflow in get_next_block function in archival/libarchive/decompress_bunzip2.c (bsc#1064976).\n- CVE-2017-15874: Fixed integer underflow in archival/libarchive/decompress_unlzma.c (bsc#1064978).\n- CVE-2017-16544: Fixed Insufficient sanitization of filenames when autocompleting (bsc#1069412).\n- CVE-2018-1000500 : Fixed missing SSL certificate validation in wget (bsc#1099263).\n- CVE-2018-1000517: Fixed heap-based buffer overflow in the retrieve_file_data() (bsc#1099260).\n- CVE-2018-20679: Fixed out of bounds read in udhcp (bsc#1121426).\n- CVE-2019-5747: Fixed out of bounds read in udhcp components (bsc#1121428).\n- CVE-2021-28831: Fixed invalid free or segmentation fault via malformed gzip data (bsc#1184522).\n- CVE-2021-42373: Fixed NULL pointer dereference in man leading to DoS when a section name is supplied but no page argument is given (bsc#1192869).\n- CVE-2021-42374: Fixed out-of-bounds heap read in unlzma leading to information leak and DoS when crafted LZMA-compressed input is decompressed (bsc#1192869).\n- CVE-2021-42375: Fixed incorrect handling of a special element in ash leading to DoS when processing a crafted shell command, due to the shell mistaking specific characters for reserved characters (bsc#1192869).\n- CVE-2021-42376: Fixed NULL pointer dereference in hush leading to DoS when processing a crafted shell command (bsc#1192869).\n- CVE-2021-42377: Fixed attacker-controlled pointer free in hush leading to DoS and possible code execution when processing a crafted shell command (bsc#1192869).\n- CVE-2021-42378: Fixed use-after-free in awk leading to DoS and possibly code execution when processing a crafted awk pattern in the getvar_i function (bsc#1192869).\n- CVE-2021-42379: Fixed use-after-free in awk leading to DoS and possibly code execution when processing a crafted awk pattern in the next_input_file function (bsc#1192869).\n- CVE-2021-42380: Fixed use-after-free in awk leading to DoS and possibly code execution when processing a crafted awk pattern in the clrvar function (bsc#1192869).\n- CVE-2021-42381: Fixed use-after-free in awk leading to DoS and possibly code execution when processing a crafted awk pattern in the hash_init function (bsc#1192869).\n- CVE-2021-42382: Fixed use-after-free in awk leading to DoS and possibly code execution when processing a crafted awk pattern in the getvar_s function (bsc#1192869).\n- CVE-2021-42383: Fixed use-after-free in awk leading to DoS and possibly code execution when processing a crafted awk pattern in the evaluate function (bsc#1192869).\n- CVE-2021-42384: Fixed use-after-free in awk leading to DoS and possibly code execution when processing a crafted awk pattern in the handle_special function (bsc#1192869).\n- CVE-2021-42385: Fixed use-after-free in awk leading to DoS and possibly code execution when processing a crafted awk pattern in the evaluate function (bsc#1192869).\n- CVE-2021-42386: Fixed use-after-free in awk leading to DoS and possibly code execution when processing a crafted awk pattern in the nvalloc function (bsc#1192869).\n", title: "Description of the patch", }, { category: "details", text: "SUSE-2022-135,SUSE-SLE-Product-RT-15-SP2-2022-135", title: "Patchnames", }, { category: "legal_disclaimer", text: "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", title: "Terms of use", }, ], publisher: { category: "vendor", contact_details: "https://www.suse.com/support/security/contact/", name: "SUSE Product Security Team", namespace: "https://www.suse.com/", }, references: [ { category: "external", summary: "SUSE ratings", url: "https://www.suse.com/support/security/rating/", }, { category: "self", summary: "URL of this CSAF notice", url: "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2022_0135-2.json", }, { category: "self", summary: "URL for SUSE-SU-2022:0135-2", url: "https://www.suse.com/support/update/announcement/2022/suse-su-20220135-2/", }, { category: "self", summary: "E-Mail link for SUSE-SU-2022:0135-2", url: "https://lists.suse.com/pipermail/sle-security-updates/2022-February/010220.html", }, { category: "self", summary: "SUSE Bug 1064976", url: "https://bugzilla.suse.com/1064976", }, { category: "self", summary: "SUSE Bug 1064978", url: "https://bugzilla.suse.com/1064978", }, { category: "self", summary: "SUSE Bug 1069412", url: "https://bugzilla.suse.com/1069412", }, { category: "self", summary: "SUSE Bug 1099260", url: "https://bugzilla.suse.com/1099260", }, { category: "self", summary: "SUSE Bug 1099263", url: "https://bugzilla.suse.com/1099263", }, { category: "self", summary: "SUSE Bug 1102912", url: "https://bugzilla.suse.com/1102912", }, { category: "self", summary: "SUSE Bug 1121426", url: "https://bugzilla.suse.com/1121426", }, { category: "self", summary: "SUSE Bug 1121428", url: "https://bugzilla.suse.com/1121428", }, { category: "self", summary: "SUSE Bug 1184522", url: "https://bugzilla.suse.com/1184522", }, { category: "self", summary: "SUSE Bug 1192869", url: "https://bugzilla.suse.com/1192869", }, { category: "self", summary: "SUSE Bug 951562", url: "https://bugzilla.suse.com/951562", }, { category: "self", summary: "SUSE Bug 970662", url: "https://bugzilla.suse.com/970662", }, { category: "self", summary: "SUSE Bug 970663", url: "https://bugzilla.suse.com/970663", }, { category: "self", summary: "SUSE Bug 991940", url: "https://bugzilla.suse.com/991940", }, { category: "self", summary: "SUSE CVE CVE-2011-5325 page", url: "https://www.suse.com/security/cve/CVE-2011-5325/", }, { category: "self", summary: "SUSE CVE CVE-2015-9261 page", url: "https://www.suse.com/security/cve/CVE-2015-9261/", }, { category: "self", summary: "SUSE CVE CVE-2016-2147 page", url: "https://www.suse.com/security/cve/CVE-2016-2147/", }, { category: "self", summary: "SUSE CVE CVE-2016-2148 page", url: "https://www.suse.com/security/cve/CVE-2016-2148/", }, { category: "self", summary: "SUSE CVE CVE-2016-6301 page", url: "https://www.suse.com/security/cve/CVE-2016-6301/", }, { category: "self", summary: "SUSE CVE CVE-2017-15873 page", url: "https://www.suse.com/security/cve/CVE-2017-15873/", }, { category: "self", summary: "SUSE CVE CVE-2017-15874 page", url: "https://www.suse.com/security/cve/CVE-2017-15874/", }, { category: "self", summary: "SUSE CVE CVE-2017-16544 page", url: "https://www.suse.com/security/cve/CVE-2017-16544/", }, { category: "self", summary: "SUSE CVE CVE-2018-1000500 page", url: "https://www.suse.com/security/cve/CVE-2018-1000500/", }, { category: "self", summary: "SUSE CVE CVE-2018-1000517 page", url: "https://www.suse.com/security/cve/CVE-2018-1000517/", }, { category: "self", summary: "SUSE CVE CVE-2018-20679 page", url: "https://www.suse.com/security/cve/CVE-2018-20679/", }, { category: "self", summary: "SUSE CVE CVE-2019-5747 page", url: "https://www.suse.com/security/cve/CVE-2019-5747/", }, { category: "self", summary: "SUSE CVE CVE-2021-28831 page", url: "https://www.suse.com/security/cve/CVE-2021-28831/", }, { category: "self", summary: "SUSE CVE CVE-2021-42373 page", url: "https://www.suse.com/security/cve/CVE-2021-42373/", }, { category: "self", summary: "SUSE CVE CVE-2021-42374 page", url: "https://www.suse.com/security/cve/CVE-2021-42374/", }, { category: "self", summary: "SUSE CVE CVE-2021-42375 page", url: "https://www.suse.com/security/cve/CVE-2021-42375/", }, { category: "self", summary: "SUSE CVE CVE-2021-42376 page", url: "https://www.suse.com/security/cve/CVE-2021-42376/", }, { category: "self", summary: "SUSE CVE CVE-2021-42377 page", url: "https://www.suse.com/security/cve/CVE-2021-42377/", }, { category: "self", summary: "SUSE CVE CVE-2021-42378 page", url: "https://www.suse.com/security/cve/CVE-2021-42378/", }, { category: "self", summary: "SUSE CVE CVE-2021-42379 page", url: "https://www.suse.com/security/cve/CVE-2021-42379/", }, { category: "self", summary: "SUSE CVE CVE-2021-42380 page", url: "https://www.suse.com/security/cve/CVE-2021-42380/", }, { category: "self", summary: "SUSE CVE CVE-2021-42381 page", url: "https://www.suse.com/security/cve/CVE-2021-42381/", }, { category: "self", summary: "SUSE CVE CVE-2021-42382 page", url: "https://www.suse.com/security/cve/CVE-2021-42382/", }, { category: "self", summary: "SUSE CVE CVE-2021-42383 page", url: "https://www.suse.com/security/cve/CVE-2021-42383/", }, { category: "self", summary: "SUSE CVE CVE-2021-42384 page", url: "https://www.suse.com/security/cve/CVE-2021-42384/", }, { category: "self", summary: "SUSE CVE CVE-2021-42385 page", url: "https://www.suse.com/security/cve/CVE-2021-42385/", }, { category: "self", summary: "SUSE CVE CVE-2021-42386 page", url: "https://www.suse.com/security/cve/CVE-2021-42386/", }, ], title: "Security update for busybox", tracking: { current_release_date: "2022-02-14T10:50:28Z", generator: { date: "2022-02-14T10:50:28Z", engine: { name: "cve-database.git:bin/generate-csaf.pl", version: "1", }, }, id: "SUSE-SU-2022:0135-2", initial_release_date: "2022-02-14T10:50:28Z", revision_history: [ { date: "2022-02-14T10:50:28Z", number: "1", summary: "Current version", }, ], status: "final", version: "1", }, }, product_tree: { branches: [ { branches: [ { branches: [ { category: "product_version", name: "busybox-1.34.1-4.9.1.aarch64", product: { name: "busybox-1.34.1-4.9.1.aarch64", product_id: "busybox-1.34.1-4.9.1.aarch64", }, }, { category: "product_version", name: "busybox-static-1.34.1-4.9.1.aarch64", product: { name: "busybox-static-1.34.1-4.9.1.aarch64", product_id: "busybox-static-1.34.1-4.9.1.aarch64", }, }, { category: "product_version", name: "busybox-testsuite-1.34.1-4.9.1.aarch64", product: { name: "busybox-testsuite-1.34.1-4.9.1.aarch64", product_id: "busybox-testsuite-1.34.1-4.9.1.aarch64", }, }, { category: "product_version", name: "busybox-warewulf3-1.34.1-4.9.1.aarch64", product: { name: "busybox-warewulf3-1.34.1-4.9.1.aarch64", product_id: "busybox-warewulf3-1.34.1-4.9.1.aarch64", }, }, ], category: "architecture", name: "aarch64", }, { branches: [ { category: "product_version", name: "busybox-1.34.1-4.9.1.i586", product: { name: "busybox-1.34.1-4.9.1.i586", product_id: "busybox-1.34.1-4.9.1.i586", }, }, { category: "product_version", name: "busybox-static-1.34.1-4.9.1.i586", product: { name: "busybox-static-1.34.1-4.9.1.i586", product_id: "busybox-static-1.34.1-4.9.1.i586", }, }, { category: "product_version", name: "busybox-testsuite-1.34.1-4.9.1.i586", product: { name: "busybox-testsuite-1.34.1-4.9.1.i586", product_id: "busybox-testsuite-1.34.1-4.9.1.i586", }, }, { category: "product_version", name: "busybox-warewulf3-1.34.1-4.9.1.i586", product: { name: "busybox-warewulf3-1.34.1-4.9.1.i586", product_id: "busybox-warewulf3-1.34.1-4.9.1.i586", }, }, ], category: "architecture", name: "i586", }, { branches: [ { category: "product_version", name: "busybox-1.34.1-4.9.1.ppc64le", product: { name: "busybox-1.34.1-4.9.1.ppc64le", product_id: "busybox-1.34.1-4.9.1.ppc64le", }, }, { category: "product_version", name: "busybox-static-1.34.1-4.9.1.ppc64le", product: { name: "busybox-static-1.34.1-4.9.1.ppc64le", product_id: "busybox-static-1.34.1-4.9.1.ppc64le", }, }, { category: "product_version", name: "busybox-testsuite-1.34.1-4.9.1.ppc64le", product: { name: "busybox-testsuite-1.34.1-4.9.1.ppc64le", product_id: "busybox-testsuite-1.34.1-4.9.1.ppc64le", }, }, ], category: "architecture", name: "ppc64le", }, { branches: [ { category: "product_version", name: "busybox-1.34.1-4.9.1.s390x", product: { name: "busybox-1.34.1-4.9.1.s390x", product_id: "busybox-1.34.1-4.9.1.s390x", }, }, { category: "product_version", name: "busybox-static-1.34.1-4.9.1.s390x", product: { name: "busybox-static-1.34.1-4.9.1.s390x", product_id: "busybox-static-1.34.1-4.9.1.s390x", }, }, { category: "product_version", name: "busybox-testsuite-1.34.1-4.9.1.s390x", product: { name: "busybox-testsuite-1.34.1-4.9.1.s390x", product_id: "busybox-testsuite-1.34.1-4.9.1.s390x", }, }, ], category: "architecture", name: "s390x", }, { branches: [ { category: "product_version", name: "busybox-1.34.1-4.9.1.x86_64", product: { name: "busybox-1.34.1-4.9.1.x86_64", product_id: "busybox-1.34.1-4.9.1.x86_64", }, }, { category: "product_version", name: "busybox-static-1.34.1-4.9.1.x86_64", product: { name: "busybox-static-1.34.1-4.9.1.x86_64", product_id: "busybox-static-1.34.1-4.9.1.x86_64", }, }, { category: "product_version", name: "busybox-testsuite-1.34.1-4.9.1.x86_64", product: { name: "busybox-testsuite-1.34.1-4.9.1.x86_64", product_id: "busybox-testsuite-1.34.1-4.9.1.x86_64", }, }, { category: "product_version", name: "busybox-warewulf3-1.34.1-4.9.1.x86_64", product: { name: "busybox-warewulf3-1.34.1-4.9.1.x86_64", product_id: "busybox-warewulf3-1.34.1-4.9.1.x86_64", }, }, ], category: "architecture", name: "x86_64", }, { branches: [ { category: "product_name", name: "SUSE Linux Enterprise Real Time 15 SP2", product: { name: "SUSE Linux Enterprise Real Time 15 SP2", product_id: "SUSE Linux Enterprise Real Time 15 SP2", product_identification_helper: { cpe: "cpe:/o:suse:sle_rt:15:sp2", }, }, }, ], category: "product_family", name: "SUSE Linux Enterprise", }, ], category: "vendor", name: "SUSE", }, ], relationships: [ { category: "default_component_of", full_product_name: { name: "busybox-1.34.1-4.9.1.x86_64 as component of SUSE Linux Enterprise Real Time 15 SP2", product_id: "SUSE Linux Enterprise Real Time 15 SP2:busybox-1.34.1-4.9.1.x86_64", }, product_reference: "busybox-1.34.1-4.9.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Real Time 15 SP2", }, { category: "default_component_of", full_product_name: { name: "busybox-static-1.34.1-4.9.1.x86_64 as component of SUSE Linux Enterprise Real Time 15 SP2", product_id: "SUSE Linux Enterprise Real Time 15 SP2:busybox-static-1.34.1-4.9.1.x86_64", }, product_reference: "busybox-static-1.34.1-4.9.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Real Time 15 SP2", }, ], }, vulnerabilities: [ { cve: "CVE-2011-5325", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2011-5325", }, ], notes: [ { category: "general", text: "Directory traversal vulnerability in the BusyBox implementation of tar before 1.22.0 v5 allows remote attackers to point to files outside the current working directory via a symlink.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Real Time 15 SP2:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:busybox-static-1.34.1-4.9.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2011-5325", url: "https://www.suse.com/security/cve/CVE-2011-5325", }, { category: "external", summary: "SUSE Bug 951562 for CVE-2011-5325", url: "https://bugzilla.suse.com/951562", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Real Time 15 SP2:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:busybox-static-1.34.1-4.9.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 7.5, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N", version: "3.1", }, products: [ "SUSE Linux Enterprise Real Time 15 SP2:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:busybox-static-1.34.1-4.9.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2022-02-14T10:50:28Z", details: "moderate", }, ], title: "CVE-2011-5325", }, { cve: "CVE-2015-9261", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2015-9261", }, ], notes: [ { category: "general", text: "huft_build in archival/libarchive/decompress_gunzip.c in BusyBox before 1.27.2 misuses a pointer, causing segfaults and an application crash during an unzip operation on a specially crafted ZIP file.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Real Time 15 SP2:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:busybox-static-1.34.1-4.9.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2015-9261", url: "https://www.suse.com/security/cve/CVE-2015-9261", }, { category: "external", summary: "SUSE Bug 1102912 for CVE-2015-9261", url: "https://bugzilla.suse.com/1102912", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Real Time 15 SP2:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:busybox-static-1.34.1-4.9.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.5, baseSeverity: "MEDIUM", vectorString: "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", version: "3.0", }, products: [ "SUSE Linux Enterprise Real Time 15 SP2:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:busybox-static-1.34.1-4.9.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2022-02-14T10:50:28Z", details: "moderate", }, ], title: "CVE-2015-9261", }, { cve: "CVE-2016-2147", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2016-2147", }, ], notes: [ { category: "general", text: "Integer overflow in the DHCP client (udhcpc) in BusyBox before 1.25.0 allows remote attackers to cause a denial of service (crash) via a malformed RFC1035-encoded domain name, which triggers an out-of-bounds heap write.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Real Time 15 SP2:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:busybox-static-1.34.1-4.9.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2016-2147", url: "https://www.suse.com/security/cve/CVE-2016-2147", }, { category: "external", summary: "SUSE Bug 970663 for CVE-2016-2147", url: "https://bugzilla.suse.com/970663", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Real Time 15 SP2:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:busybox-static-1.34.1-4.9.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 7.5, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Real Time 15 SP2:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:busybox-static-1.34.1-4.9.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2022-02-14T10:50:28Z", details: "important", }, ], title: "CVE-2016-2147", }, { cve: "CVE-2016-2148", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2016-2148", }, ], notes: [ { category: "general", text: "Heap-based buffer overflow in the DHCP client (udhcpc) in BusyBox before 1.25.0 allows remote attackers to have unspecified impact via vectors involving OPTION_6RD parsing.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Real Time 15 SP2:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:busybox-static-1.34.1-4.9.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2016-2148", url: "https://www.suse.com/security/cve/CVE-2016-2148", }, { category: "external", summary: "SUSE Bug 970662 for CVE-2016-2148", url: "https://bugzilla.suse.com/970662", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Real Time 15 SP2:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:busybox-static-1.34.1-4.9.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 9.8, baseSeverity: "CRITICAL", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Real Time 15 SP2:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:busybox-static-1.34.1-4.9.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2022-02-14T10:50:28Z", details: "moderate", }, ], title: "CVE-2016-2148", }, { cve: "CVE-2016-6301", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2016-6301", }, ], notes: [ { category: "general", text: "The recv_and_process_client_pkt function in networking/ntpd.c in busybox allows remote attackers to cause a denial of service (CPU and bandwidth consumption) via a forged NTP packet, which triggers a communication loop.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Real Time 15 SP2:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:busybox-static-1.34.1-4.9.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2016-6301", url: "https://www.suse.com/security/cve/CVE-2016-6301", }, { category: "external", summary: "SUSE Bug 991940 for CVE-2016-6301", url: "https://bugzilla.suse.com/991940", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Real Time 15 SP2:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:busybox-static-1.34.1-4.9.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 7.5, baseSeverity: "HIGH", vectorString: "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", version: "3.0", }, products: [ "SUSE Linux Enterprise Real Time 15 SP2:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:busybox-static-1.34.1-4.9.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2022-02-14T10:50:28Z", details: "moderate", }, ], title: "CVE-2016-6301", }, { cve: "CVE-2017-15873", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2017-15873", }, ], notes: [ { category: "general", text: "The get_next_block function in archival/libarchive/decompress_bunzip2.c in BusyBox 1.27.2 has an Integer Overflow that may lead to a write access violation.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Real Time 15 SP2:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:busybox-static-1.34.1-4.9.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2017-15873", url: "https://www.suse.com/security/cve/CVE-2017-15873", }, { category: "external", summary: "SUSE Bug 1064976 for CVE-2017-15873", url: "https://bugzilla.suse.com/1064976", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Real Time 15 SP2:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:busybox-static-1.34.1-4.9.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 7.8, baseSeverity: "HIGH", vectorString: "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", version: "3.0", }, products: [ "SUSE Linux Enterprise Real Time 15 SP2:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:busybox-static-1.34.1-4.9.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2022-02-14T10:50:28Z", details: "moderate", }, ], title: "CVE-2017-15873", }, { cve: "CVE-2017-15874", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2017-15874", }, ], notes: [ { category: "general", text: "archival/libarchive/decompress_unlzma.c in BusyBox 1.27.2 has an Integer Underflow that leads to a read access violation.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Real Time 15 SP2:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:busybox-static-1.34.1-4.9.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2017-15874", url: "https://www.suse.com/security/cve/CVE-2017-15874", }, { category: "external", summary: "SUSE Bug 1064978 for CVE-2017-15874", url: "https://bugzilla.suse.com/1064978", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Real Time 15 SP2:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:busybox-static-1.34.1-4.9.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 3.3, baseSeverity: "LOW", vectorString: "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L", version: "3.0", }, products: [ "SUSE Linux Enterprise Real Time 15 SP2:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:busybox-static-1.34.1-4.9.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2022-02-14T10:50:28Z", details: "low", }, ], title: "CVE-2017-15874", }, { cve: "CVE-2017-16544", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2017-16544", }, ], notes: [ { category: "general", text: "In the add_match function in libbb/lineedit.c in BusyBox through 1.27.2, the tab autocomplete feature of the shell, used to get a list of filenames in a directory, does not sanitize filenames and results in executing any escape sequence in the terminal. This could potentially result in code execution, arbitrary file writes, or other attacks.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Real Time 15 SP2:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:busybox-static-1.34.1-4.9.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2017-16544", url: "https://www.suse.com/security/cve/CVE-2017-16544", }, { category: "external", summary: "SUSE Bug 1069412 for CVE-2017-16544", url: "https://bugzilla.suse.com/1069412", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Real Time 15 SP2:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:busybox-static-1.34.1-4.9.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 7.8, baseSeverity: "HIGH", vectorString: "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", version: "3.0", }, products: [ "SUSE Linux Enterprise Real Time 15 SP2:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:busybox-static-1.34.1-4.9.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2022-02-14T10:50:28Z", details: "important", }, ], title: "CVE-2017-16544", }, { cve: "CVE-2018-1000500", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2018-1000500", }, ], notes: [ { category: "general", text: "Busybox contains a Missing SSL certificate validation vulnerability in The \"busybox wget\" applet that can result in arbitrary code execution. This attack appear to be exploitable via Simply download any file over HTTPS using \"busybox wget https://compromised-domain.com/important-file\".", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Real Time 15 SP2:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:busybox-static-1.34.1-4.9.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2018-1000500", url: "https://www.suse.com/security/cve/CVE-2018-1000500", }, { category: "external", summary: "SUSE Bug 1099263 for CVE-2018-1000500", url: "https://bugzilla.suse.com/1099263", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Real Time 15 SP2:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:busybox-static-1.34.1-4.9.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 7.5, baseSeverity: "HIGH", vectorString: "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N", version: "3.0", }, products: [ "SUSE Linux Enterprise Real Time 15 SP2:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:busybox-static-1.34.1-4.9.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2022-02-14T10:50:28Z", details: "important", }, ], title: "CVE-2018-1000500", }, { cve: "CVE-2018-1000517", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2018-1000517", }, ], notes: [ { category: "general", text: "BusyBox project BusyBox wget version prior to commit 8e2174e9bd836e53c8b9c6e00d1bc6e2a718686e contains a Buffer Overflow vulnerability in Busybox wget that can result in heap buffer overflow. This attack appear to be exploitable via network connectivity. This vulnerability appears to have been fixed in after commit 8e2174e9bd836e53c8b9c6e00d1bc6e2a718686e.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Real Time 15 SP2:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:busybox-static-1.34.1-4.9.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2018-1000517", url: "https://www.suse.com/security/cve/CVE-2018-1000517", }, { category: "external", summary: "SUSE Bug 1099260 for CVE-2018-1000517", url: "https://bugzilla.suse.com/1099260", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Real Time 15 SP2:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:busybox-static-1.34.1-4.9.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.6, baseSeverity: "MEDIUM", vectorString: "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L", version: "3.0", }, products: [ "SUSE Linux Enterprise Real Time 15 SP2:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:busybox-static-1.34.1-4.9.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2022-02-14T10:50:28Z", details: "important", }, ], title: "CVE-2018-1000517", }, { cve: "CVE-2018-20679", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2018-20679", }, ], notes: [ { category: "general", text: "An issue was discovered in BusyBox before 1.30.0. An out of bounds read in udhcp components (consumed by the DHCP server, client, and relay) allows a remote attacker to leak sensitive information from the stack by sending a crafted DHCP message. This is related to verification in udhcp_get_option() in networking/udhcp/common.c that 4-byte options are indeed 4 bytes.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Real Time 15 SP2:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:busybox-static-1.34.1-4.9.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2018-20679", url: "https://www.suse.com/security/cve/CVE-2018-20679", }, { category: "external", summary: "SUSE Bug 1121426 for CVE-2018-20679", url: "https://bugzilla.suse.com/1121426", }, { category: "external", summary: "SUSE Bug 1121428 for CVE-2018-20679", url: "https://bugzilla.suse.com/1121428", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Real Time 15 SP2:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:busybox-static-1.34.1-4.9.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.3, baseSeverity: "MEDIUM", vectorString: "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N", version: "3.0", }, products: [ "SUSE Linux Enterprise Real Time 15 SP2:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:busybox-static-1.34.1-4.9.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2022-02-14T10:50:28Z", details: "moderate", }, ], title: "CVE-2018-20679", }, { cve: "CVE-2019-5747", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2019-5747", }, ], notes: [ { category: "general", text: "An issue was discovered in BusyBox through 1.30.0. An out of bounds read in udhcp components (consumed by the DHCP client, server, and/or relay) might allow a remote attacker to leak sensitive information from the stack by sending a crafted DHCP message. This is related to assurance of a 4-byte length when decoding DHCP_SUBNET. NOTE: this issue exists because of an incomplete fix for CVE-2018-20679.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Real Time 15 SP2:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:busybox-static-1.34.1-4.9.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2019-5747", url: "https://www.suse.com/security/cve/CVE-2019-5747", }, { category: "external", summary: "SUSE Bug 1121426 for CVE-2019-5747", url: "https://bugzilla.suse.com/1121426", }, { category: "external", summary: "SUSE Bug 1121428 for CVE-2019-5747", url: "https://bugzilla.suse.com/1121428", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Real Time 15 SP2:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:busybox-static-1.34.1-4.9.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 3.5, baseSeverity: "LOW", vectorString: "CVSS:3.1/AV:A/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N", version: "3.1", }, products: [ "SUSE Linux Enterprise Real Time 15 SP2:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:busybox-static-1.34.1-4.9.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2022-02-14T10:50:28Z", details: "low", }, ], title: "CVE-2019-5747", }, { cve: "CVE-2021-28831", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2021-28831", }, ], notes: [ { category: "general", text: "decompress_gunzip.c in BusyBox through 1.32.1 mishandles the error bit on the huft_build result pointer, with a resultant invalid free or segmentation fault, via malformed gzip data.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Real Time 15 SP2:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:busybox-static-1.34.1-4.9.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2021-28831", url: "https://www.suse.com/security/cve/CVE-2021-28831", }, { category: "external", summary: "SUSE Bug 1184522 for CVE-2021-28831", url: "https://bugzilla.suse.com/1184522", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Real Time 15 SP2:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:busybox-static-1.34.1-4.9.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 7.5, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Real Time 15 SP2:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:busybox-static-1.34.1-4.9.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2022-02-14T10:50:28Z", details: "important", }, ], title: "CVE-2021-28831", }, { cve: "CVE-2021-42373", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2021-42373", }, ], notes: [ { category: "general", text: "A NULL pointer dereference in Busybox's man applet leads to denial of service when a section name is supplied but no page argument is given", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Real Time 15 SP2:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:busybox-static-1.34.1-4.9.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2021-42373", url: "https://www.suse.com/security/cve/CVE-2021-42373", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Real Time 15 SP2:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:busybox-static-1.34.1-4.9.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.5, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Real Time 15 SP2:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:busybox-static-1.34.1-4.9.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2022-02-14T10:50:28Z", details: "moderate", }, ], title: "CVE-2021-42373", }, { cve: "CVE-2021-42374", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2021-42374", }, ], notes: [ { category: "general", text: "An out-of-bounds heap read in Busybox's unlzma applet leads to information leak and denial of service when crafted LZMA-compressed input is decompressed. This can be triggered by any applet/format that", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Real Time 15 SP2:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:busybox-static-1.34.1-4.9.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2021-42374", url: "https://www.suse.com/security/cve/CVE-2021-42374", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Real Time 15 SP2:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:busybox-static-1.34.1-4.9.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.7, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Real Time 15 SP2:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:busybox-static-1.34.1-4.9.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2022-02-14T10:50:28Z", details: "moderate", }, ], title: "CVE-2021-42374", }, { cve: "CVE-2021-42375", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2021-42375", }, ], notes: [ { category: "general", text: "An incorrect handling of a special element in Busybox's ash applet leads to denial of service when processing a crafted shell command, due to the shell mistaking specific characters for reserved characters. This may be used for DoS under rare conditions of filtered command input.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Real Time 15 SP2:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:busybox-static-1.34.1-4.9.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2021-42375", url: "https://www.suse.com/security/cve/CVE-2021-42375", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Real Time 15 SP2:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:busybox-static-1.34.1-4.9.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 4.1, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Real Time 15 SP2:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:busybox-static-1.34.1-4.9.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2022-02-14T10:50:28Z", details: "moderate", }, ], title: "CVE-2021-42375", }, { cve: "CVE-2021-42376", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2021-42376", }, ], notes: [ { category: "general", text: "A NULL pointer dereference in Busybox's hush applet leads to denial of service when processing a crafted shell command, due to missing validation after a \\x03 delimiter character. This may be used for DoS under very rare conditions of filtered command input.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Real Time 15 SP2:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:busybox-static-1.34.1-4.9.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2021-42376", url: "https://www.suse.com/security/cve/CVE-2021-42376", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Real Time 15 SP2:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:busybox-static-1.34.1-4.9.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 4.1, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Real Time 15 SP2:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:busybox-static-1.34.1-4.9.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2022-02-14T10:50:28Z", details: "moderate", }, ], title: "CVE-2021-42376", }, { cve: "CVE-2021-42377", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2021-42377", }, ], notes: [ { category: "general", text: "An attacker-controlled pointer free in Busybox's hush applet leads to denial of service and possible code execution when processing a crafted shell command, due to the shell mishandling the &&& string. This may be used for remote code execution under rare conditions of filtered command input.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Real Time 15 SP2:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:busybox-static-1.34.1-4.9.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2021-42377", url: "https://www.suse.com/security/cve/CVE-2021-42377", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Real Time 15 SP2:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:busybox-static-1.34.1-4.9.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 6.4, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Real Time 15 SP2:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:busybox-static-1.34.1-4.9.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2022-02-14T10:50:28Z", details: "moderate", }, ], title: "CVE-2021-42377", }, { cve: "CVE-2021-42378", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2021-42378", }, ], notes: [ { category: "general", text: "A use-after-free in Busybox's awk applet leads to denial of service and possibly code execution when processing a crafted awk pattern in the getvar_i function", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Real Time 15 SP2:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:busybox-static-1.34.1-4.9.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2021-42378", url: "https://www.suse.com/security/cve/CVE-2021-42378", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Real Time 15 SP2:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:busybox-static-1.34.1-4.9.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 6.6, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Real Time 15 SP2:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:busybox-static-1.34.1-4.9.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2022-02-14T10:50:28Z", details: "moderate", }, ], title: "CVE-2021-42378", }, { cve: "CVE-2021-42379", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2021-42379", }, ], notes: [ { category: "general", text: "A use-after-free in Busybox's awk applet leads to denial of service and possibly code execution when processing a crafted awk pattern in the next_input_file function", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Real Time 15 SP2:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:busybox-static-1.34.1-4.9.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2021-42379", url: "https://www.suse.com/security/cve/CVE-2021-42379", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Real Time 15 SP2:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:busybox-static-1.34.1-4.9.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 6.6, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Real Time 15 SP2:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:busybox-static-1.34.1-4.9.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2022-02-14T10:50:28Z", details: "moderate", }, ], title: "CVE-2021-42379", }, { cve: "CVE-2021-42380", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2021-42380", }, ], notes: [ { category: "general", text: "A use-after-free in Busybox's awk applet leads to denial of service and possibly code execution when processing a crafted awk pattern in the clrvar function", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Real Time 15 SP2:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:busybox-static-1.34.1-4.9.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2021-42380", url: "https://www.suse.com/security/cve/CVE-2021-42380", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Real Time 15 SP2:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:busybox-static-1.34.1-4.9.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 6.6, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Real Time 15 SP2:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:busybox-static-1.34.1-4.9.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2022-02-14T10:50:28Z", details: "moderate", }, ], title: "CVE-2021-42380", }, { cve: "CVE-2021-42381", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2021-42381", }, ], notes: [ { category: "general", text: "A use-after-free in Busybox's awk applet leads to denial of service and possibly code execution when processing a crafted awk pattern in the hash_init function", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Real Time 15 SP2:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:busybox-static-1.34.1-4.9.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2021-42381", url: "https://www.suse.com/security/cve/CVE-2021-42381", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Real Time 15 SP2:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:busybox-static-1.34.1-4.9.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 6.6, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Real Time 15 SP2:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:busybox-static-1.34.1-4.9.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2022-02-14T10:50:28Z", details: "moderate", }, ], title: "CVE-2021-42381", }, { cve: "CVE-2021-42382", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2021-42382", }, ], notes: [ { category: "general", text: "A use-after-free in Busybox's awk applet leads to denial of service and possibly code execution when processing a crafted awk pattern in the getvar_s function", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Real Time 15 SP2:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:busybox-static-1.34.1-4.9.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2021-42382", url: "https://www.suse.com/security/cve/CVE-2021-42382", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Real Time 15 SP2:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:busybox-static-1.34.1-4.9.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 6.6, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Real Time 15 SP2:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:busybox-static-1.34.1-4.9.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2022-02-14T10:50:28Z", details: "moderate", }, ], title: "CVE-2021-42382", }, { cve: "CVE-2021-42383", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2021-42383", }, ], notes: [ { category: "general", text: "A use-after-free in Busybox's awk applet leads to denial of service and possibly code execution when processing a crafted awk pattern in the evaluate function", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Real Time 15 SP2:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:busybox-static-1.34.1-4.9.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2021-42383", url: "https://www.suse.com/security/cve/CVE-2021-42383", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Real Time 15 SP2:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:busybox-static-1.34.1-4.9.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 6.6, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Real Time 15 SP2:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:busybox-static-1.34.1-4.9.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2022-02-14T10:50:28Z", details: "moderate", }, ], title: "CVE-2021-42383", }, { cve: "CVE-2021-42384", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2021-42384", }, ], notes: [ { category: "general", text: "A use-after-free in Busybox's awk applet leads to denial of service and possibly code execution when processing a crafted awk pattern in the handle_special function", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Real Time 15 SP2:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:busybox-static-1.34.1-4.9.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2021-42384", url: "https://www.suse.com/security/cve/CVE-2021-42384", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Real Time 15 SP2:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:busybox-static-1.34.1-4.9.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 6.6, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Real Time 15 SP2:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:busybox-static-1.34.1-4.9.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2022-02-14T10:50:28Z", details: "moderate", }, ], title: "CVE-2021-42384", }, { cve: "CVE-2021-42385", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2021-42385", }, ], notes: [ { category: "general", text: "A use-after-free in Busybox's awk applet leads to denial of service and possibly code execution when processing a crafted awk pattern in the evaluate function", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Real Time 15 SP2:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:busybox-static-1.34.1-4.9.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2021-42385", url: "https://www.suse.com/security/cve/CVE-2021-42385", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Real Time 15 SP2:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:busybox-static-1.34.1-4.9.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 6.6, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Real Time 15 SP2:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:busybox-static-1.34.1-4.9.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2022-02-14T10:50:28Z", details: "moderate", }, ], title: "CVE-2021-42385", }, { cve: "CVE-2021-42386", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2021-42386", }, ], notes: [ { category: "general", text: "A use-after-free in Busybox's awk applet leads to denial of service and possibly code execution when processing a crafted awk pattern in the nvalloc function", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Real Time 15 SP2:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:busybox-static-1.34.1-4.9.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2021-42386", url: "https://www.suse.com/security/cve/CVE-2021-42386", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Real Time 15 SP2:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:busybox-static-1.34.1-4.9.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 6.6, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Real Time 15 SP2:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:busybox-static-1.34.1-4.9.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2022-02-14T10:50:28Z", details: "moderate", }, ], title: "CVE-2021-42386", }, ], }
suse-su-2022:3959-1
Vulnerability from csaf_suse
Published
2022-11-11 14:38
Modified
2022-11-11 14:38
Summary
Security update for busybox
Notes
Title of the patch
Security update for busybox
Description of the patch
This update for busybox fixes the following issues:
- Enable switch_root
With this change virtme --force-initramfs works as expected.
- Enable udhcpc
busybox was updated to 1.35.0
- Adjust busybox.config for new features in find, date and cpio
- Annotate CVEs already fixed in upstream, but not mentioned in .changes yet:
* CVE-2017-16544 (bsc#1069412): Insufficient sanitization of filenames when autocompleting
* CVE-2015-9261 (bsc#1102912): huft_build misuses a pointer, causing segfaults
* CVE-2016-2147 (bsc#970663): out of bounds write (heap) due to integer underflow in udhcpc
* CVE-2016-2148 (bsc#970662): heap-based buffer overflow in OPTION_6RD parsing
* CVE-2016-6301 (bsc#991940): NTP server denial of service flaw
* CVE-2017-15873 (bsc#1064976): The get_next_block function in archival/libarchive/decompress_bunzip2.c has an Integer Overflow
* CVE-2017-15874 (bsc#1064978): archival/libarchive/decompress_unlzma.c has an Integer Underflow
* CVE-2019-5747 (bsc#1121428): out of bounds read in udhcp components
* CVE-2021-42373, CVE-2021-42374, CVE-2021-42375, CVE-2021-42376,
CVE-2021-42377, CVE-2021-42378, CVE-2021-42379, CVE-2021-42380,
CVE-2021-42381, CVE-2021-42382, CVE-2021-42383, CVE-2021-42384,
CVE-2021-42385, CVE-2021-42386 (bsc#1192869) : v1.34.0 bugfixes
* CVE-2021-28831 (bsc#1184522): invalid free or segmentation fault via malformed gzip data
* CVE-2018-20679 (bsc#1121426): out of bounds read in udhcp
* CVE-2018-1000517 (bsc#1099260): Heap-based buffer overflow in the retrieve_file_data()
* CVE-2011-5325 (bsc#951562): tar directory traversal
* CVE-2018-1000500 (bsc#1099263): wget: Missing SSL certificate validation
Patchnames
SUSE-2022-3959,SUSE-SLE-Module-Basesystem-15-SP4-2022-3959,openSUSE-SLE-15.4-2022-3959
Terms of use
CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
{ document: { aggregate_severity: { namespace: "https://www.suse.com/support/security/rating/", text: "important", }, category: "csaf_security_advisory", csaf_version: "2.0", distribution: { text: "Copyright 2024 SUSE LLC. All rights reserved.", tlp: { label: "WHITE", url: "https://www.first.org/tlp/", }, }, lang: "en", notes: [ { category: "summary", text: "Security update for busybox", title: "Title of the patch", }, { category: "description", text: "This update for busybox fixes the following issues:\n\n- Enable switch_root\n With this change virtme --force-initramfs works as expected.\n- Enable udhcpc\n\nbusybox was updated to 1.35.0\n\n- Adjust busybox.config for new features in find, date and cpio \n\n- Annotate CVEs already fixed in upstream, but not mentioned in .changes yet:\n\n* CVE-2017-16544 (bsc#1069412): Insufficient sanitization of filenames when autocompleting\n* CVE-2015-9261 (bsc#1102912): huft_build misuses a pointer, causing segfaults\n* CVE-2016-2147 (bsc#970663): out of bounds write (heap) due to integer underflow in udhcpc\n* CVE-2016-2148 (bsc#970662): heap-based buffer overflow in OPTION_6RD parsing\n* CVE-2016-6301 (bsc#991940): NTP server denial of service flaw\n* CVE-2017-15873 (bsc#1064976): The get_next_block function in archival/libarchive/decompress_bunzip2.c has an Integer Overflow\n* CVE-2017-15874 (bsc#1064978): archival/libarchive/decompress_unlzma.c has an Integer Underflow\n* CVE-2019-5747 (bsc#1121428): out of bounds read in udhcp components\n* CVE-2021-42373, CVE-2021-42374, CVE-2021-42375, CVE-2021-42376,\n CVE-2021-42377, CVE-2021-42378, CVE-2021-42379, CVE-2021-42380,\n CVE-2021-42381, CVE-2021-42382, CVE-2021-42383, CVE-2021-42384,\n CVE-2021-42385, CVE-2021-42386 (bsc#1192869) : v1.34.0 bugfixes\n* CVE-2021-28831 (bsc#1184522): invalid free or segmentation fault via malformed gzip data\n* CVE-2018-20679 (bsc#1121426): out of bounds read in udhcp\n* CVE-2018-1000517 (bsc#1099260): Heap-based buffer overflow in the retrieve_file_data()\n* CVE-2011-5325 (bsc#951562): tar directory traversal\n* CVE-2018-1000500 (bsc#1099263): wget: Missing SSL certificate validation\n", title: "Description of the patch", }, { category: "details", text: "SUSE-2022-3959,SUSE-SLE-Module-Basesystem-15-SP4-2022-3959,openSUSE-SLE-15.4-2022-3959", title: "Patchnames", }, { category: "legal_disclaimer", text: "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", title: "Terms of use", }, ], publisher: { category: "vendor", contact_details: "https://www.suse.com/support/security/contact/", name: "SUSE Product Security Team", namespace: "https://www.suse.com/", }, references: [ { category: "external", summary: "SUSE ratings", url: "https://www.suse.com/support/security/rating/", }, { category: "self", summary: "URL of this CSAF notice", url: "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2022_3959-1.json", }, { category: "self", summary: "URL for SUSE-SU-2022:3959-1", url: "https://www.suse.com/support/update/announcement/2022/suse-su-20223959-1/", }, { category: "self", summary: "E-Mail link for SUSE-SU-2022:3959-1", url: "https://lists.suse.com/pipermail/sle-security-updates/2022-November/012904.html", }, { category: "self", summary: "SUSE Bug 1064976", url: "https://bugzilla.suse.com/1064976", }, { category: "self", summary: "SUSE Bug 1064978", url: "https://bugzilla.suse.com/1064978", }, { category: "self", summary: "SUSE Bug 1069412", url: "https://bugzilla.suse.com/1069412", }, { category: "self", summary: "SUSE Bug 1099260", url: "https://bugzilla.suse.com/1099260", }, { category: "self", summary: "SUSE Bug 1099263", url: "https://bugzilla.suse.com/1099263", }, { category: "self", summary: "SUSE Bug 1102912", url: "https://bugzilla.suse.com/1102912", }, { category: "self", summary: "SUSE Bug 1121426", url: "https://bugzilla.suse.com/1121426", }, { category: "self", summary: "SUSE Bug 1121428", url: "https://bugzilla.suse.com/1121428", }, { category: "self", summary: "SUSE Bug 1184522", url: "https://bugzilla.suse.com/1184522", }, { category: "self", summary: "SUSE Bug 1192869", url: "https://bugzilla.suse.com/1192869", }, { category: "self", summary: "SUSE Bug 951562", url: "https://bugzilla.suse.com/951562", }, { category: "self", summary: "SUSE Bug 970662", url: "https://bugzilla.suse.com/970662", }, { category: "self", summary: "SUSE Bug 970663", url: "https://bugzilla.suse.com/970663", }, { category: "self", summary: "SUSE Bug 991940", url: "https://bugzilla.suse.com/991940", }, { category: "self", summary: "SUSE CVE CVE-2011-5325 page", url: "https://www.suse.com/security/cve/CVE-2011-5325/", }, { category: "self", summary: "SUSE CVE CVE-2015-9261 page", url: "https://www.suse.com/security/cve/CVE-2015-9261/", }, { category: "self", summary: "SUSE CVE CVE-2016-2147 page", url: "https://www.suse.com/security/cve/CVE-2016-2147/", }, { category: "self", summary: "SUSE CVE CVE-2016-2148 page", url: "https://www.suse.com/security/cve/CVE-2016-2148/", }, { category: "self", summary: "SUSE CVE CVE-2016-6301 page", url: "https://www.suse.com/security/cve/CVE-2016-6301/", }, { category: "self", summary: "SUSE CVE CVE-2017-15873 page", url: "https://www.suse.com/security/cve/CVE-2017-15873/", }, { category: "self", summary: "SUSE CVE CVE-2017-15874 page", url: "https://www.suse.com/security/cve/CVE-2017-15874/", }, { category: "self", summary: "SUSE CVE CVE-2017-16544 page", url: "https://www.suse.com/security/cve/CVE-2017-16544/", }, { category: "self", summary: "SUSE CVE CVE-2018-1000500 page", url: "https://www.suse.com/security/cve/CVE-2018-1000500/", }, { category: "self", summary: "SUSE CVE CVE-2018-1000517 page", url: "https://www.suse.com/security/cve/CVE-2018-1000517/", }, { category: "self", summary: "SUSE CVE CVE-2018-20679 page", url: "https://www.suse.com/security/cve/CVE-2018-20679/", }, { category: "self", summary: "SUSE CVE CVE-2019-5747 page", url: "https://www.suse.com/security/cve/CVE-2019-5747/", }, { category: "self", summary: "SUSE CVE CVE-2021-28831 page", url: "https://www.suse.com/security/cve/CVE-2021-28831/", }, { category: "self", summary: "SUSE CVE CVE-2021-42373 page", url: "https://www.suse.com/security/cve/CVE-2021-42373/", }, { category: "self", summary: "SUSE CVE CVE-2021-42374 page", url: "https://www.suse.com/security/cve/CVE-2021-42374/", }, { category: "self", summary: "SUSE CVE CVE-2021-42375 page", url: "https://www.suse.com/security/cve/CVE-2021-42375/", }, { category: "self", summary: "SUSE CVE CVE-2021-42376 page", url: "https://www.suse.com/security/cve/CVE-2021-42376/", }, { category: "self", summary: "SUSE CVE CVE-2021-42377 page", url: "https://www.suse.com/security/cve/CVE-2021-42377/", }, { category: "self", summary: "SUSE CVE CVE-2021-42378 page", url: "https://www.suse.com/security/cve/CVE-2021-42378/", }, { category: "self", summary: "SUSE CVE CVE-2021-42379 page", url: "https://www.suse.com/security/cve/CVE-2021-42379/", }, { category: "self", summary: "SUSE CVE CVE-2021-42380 page", url: "https://www.suse.com/security/cve/CVE-2021-42380/", }, { category: "self", summary: "SUSE CVE CVE-2021-42381 page", url: "https://www.suse.com/security/cve/CVE-2021-42381/", }, { category: "self", summary: "SUSE CVE CVE-2021-42382 page", url: "https://www.suse.com/security/cve/CVE-2021-42382/", }, { category: "self", summary: "SUSE CVE CVE-2021-42383 page", url: "https://www.suse.com/security/cve/CVE-2021-42383/", }, { category: "self", summary: "SUSE CVE CVE-2021-42384 page", url: "https://www.suse.com/security/cve/CVE-2021-42384/", }, { category: "self", summary: "SUSE CVE CVE-2021-42385 page", url: "https://www.suse.com/security/cve/CVE-2021-42385/", }, { category: "self", summary: "SUSE CVE CVE-2021-42386 page", url: "https://www.suse.com/security/cve/CVE-2021-42386/", }, ], title: "Security update for busybox", tracking: { current_release_date: "2022-11-11T14:38:22Z", generator: { date: "2022-11-11T14:38:22Z", engine: { name: "cve-database.git:bin/generate-csaf.pl", version: "1", }, }, id: "SUSE-SU-2022:3959-1", initial_release_date: "2022-11-11T14:38:22Z", revision_history: [ { date: "2022-11-11T14:38:22Z", number: "1", summary: "Current version", }, ], status: "final", version: "1", }, }, product_tree: { branches: [ { branches: [ { branches: [ { category: "product_version", name: "busybox-1.35.0-150400.3.3.1.aarch64", product: { name: "busybox-1.35.0-150400.3.3.1.aarch64", product_id: "busybox-1.35.0-150400.3.3.1.aarch64", }, }, { category: "product_version", name: "busybox-static-1.35.0-150400.3.3.1.aarch64", product: { name: "busybox-static-1.35.0-150400.3.3.1.aarch64", product_id: "busybox-static-1.35.0-150400.3.3.1.aarch64", }, }, { category: "product_version", name: "busybox-testsuite-1.35.0-150400.3.3.1.aarch64", product: { name: "busybox-testsuite-1.35.0-150400.3.3.1.aarch64", product_id: "busybox-testsuite-1.35.0-150400.3.3.1.aarch64", }, }, { category: "product_version", name: "busybox-warewulf3-1.35.0-150400.3.3.1.aarch64", product: { name: "busybox-warewulf3-1.35.0-150400.3.3.1.aarch64", product_id: "busybox-warewulf3-1.35.0-150400.3.3.1.aarch64", }, }, ], category: "architecture", name: "aarch64", }, { branches: [ { category: "product_version", name: "busybox-1.35.0-150400.3.3.1.i586", product: { name: "busybox-1.35.0-150400.3.3.1.i586", product_id: "busybox-1.35.0-150400.3.3.1.i586", }, }, { category: "product_version", name: "busybox-static-1.35.0-150400.3.3.1.i586", product: { name: "busybox-static-1.35.0-150400.3.3.1.i586", product_id: "busybox-static-1.35.0-150400.3.3.1.i586", }, }, { category: "product_version", name: "busybox-testsuite-1.35.0-150400.3.3.1.i586", product: { name: "busybox-testsuite-1.35.0-150400.3.3.1.i586", product_id: "busybox-testsuite-1.35.0-150400.3.3.1.i586", }, }, { category: "product_version", name: "busybox-warewulf3-1.35.0-150400.3.3.1.i586", product: { name: "busybox-warewulf3-1.35.0-150400.3.3.1.i586", product_id: "busybox-warewulf3-1.35.0-150400.3.3.1.i586", }, }, ], category: "architecture", name: "i586", }, { branches: [ { category: "product_version", name: "busybox-1.35.0-150400.3.3.1.ppc64le", product: { name: "busybox-1.35.0-150400.3.3.1.ppc64le", product_id: "busybox-1.35.0-150400.3.3.1.ppc64le", }, }, { category: "product_version", name: "busybox-static-1.35.0-150400.3.3.1.ppc64le", product: { name: "busybox-static-1.35.0-150400.3.3.1.ppc64le", product_id: "busybox-static-1.35.0-150400.3.3.1.ppc64le", }, }, { category: "product_version", name: "busybox-testsuite-1.35.0-150400.3.3.1.ppc64le", product: { name: "busybox-testsuite-1.35.0-150400.3.3.1.ppc64le", product_id: "busybox-testsuite-1.35.0-150400.3.3.1.ppc64le", }, }, ], category: "architecture", name: "ppc64le", }, { branches: [ { category: "product_version", name: "busybox-1.35.0-150400.3.3.1.s390x", product: { name: "busybox-1.35.0-150400.3.3.1.s390x", product_id: "busybox-1.35.0-150400.3.3.1.s390x", }, }, { category: "product_version", name: "busybox-static-1.35.0-150400.3.3.1.s390x", product: { name: "busybox-static-1.35.0-150400.3.3.1.s390x", product_id: "busybox-static-1.35.0-150400.3.3.1.s390x", }, }, { category: "product_version", name: "busybox-testsuite-1.35.0-150400.3.3.1.s390x", product: { name: "busybox-testsuite-1.35.0-150400.3.3.1.s390x", product_id: "busybox-testsuite-1.35.0-150400.3.3.1.s390x", }, }, ], category: "architecture", name: "s390x", }, { branches: [ { category: "product_version", name: "busybox-1.35.0-150400.3.3.1.x86_64", product: { name: "busybox-1.35.0-150400.3.3.1.x86_64", product_id: "busybox-1.35.0-150400.3.3.1.x86_64", }, }, { category: "product_version", name: "busybox-static-1.35.0-150400.3.3.1.x86_64", product: { name: "busybox-static-1.35.0-150400.3.3.1.x86_64", product_id: "busybox-static-1.35.0-150400.3.3.1.x86_64", }, }, { category: "product_version", name: "busybox-testsuite-1.35.0-150400.3.3.1.x86_64", product: { name: "busybox-testsuite-1.35.0-150400.3.3.1.x86_64", product_id: "busybox-testsuite-1.35.0-150400.3.3.1.x86_64", }, }, { category: "product_version", name: "busybox-warewulf3-1.35.0-150400.3.3.1.x86_64", product: { name: "busybox-warewulf3-1.35.0-150400.3.3.1.x86_64", product_id: "busybox-warewulf3-1.35.0-150400.3.3.1.x86_64", }, }, ], category: "architecture", name: "x86_64", }, { branches: [ { category: "product_name", name: "SUSE Linux Enterprise Module for Basesystem 15 SP4", product: { name: "SUSE Linux Enterprise Module for Basesystem 15 SP4", product_id: "SUSE Linux Enterprise Module for Basesystem 15 SP4", product_identification_helper: { cpe: "cpe:/o:suse:sle-module-basesystem:15:sp4", }, }, }, { category: "product_name", name: "openSUSE Leap 15.4", product: { name: "openSUSE Leap 15.4", product_id: "openSUSE Leap 15.4", product_identification_helper: { cpe: "cpe:/o:opensuse:leap:15.4", }, }, }, ], category: "product_family", name: "SUSE Linux Enterprise", }, ], category: "vendor", name: "SUSE", }, ], relationships: [ { category: "default_component_of", full_product_name: { name: "busybox-1.35.0-150400.3.3.1.aarch64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP4", product_id: "SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-1.35.0-150400.3.3.1.aarch64", }, product_reference: "busybox-1.35.0-150400.3.3.1.aarch64", relates_to_product_reference: "SUSE Linux Enterprise Module for Basesystem 15 SP4", }, { category: "default_component_of", full_product_name: { name: "busybox-1.35.0-150400.3.3.1.ppc64le as component of SUSE Linux Enterprise Module for Basesystem 15 SP4", product_id: "SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-1.35.0-150400.3.3.1.ppc64le", }, product_reference: "busybox-1.35.0-150400.3.3.1.ppc64le", relates_to_product_reference: "SUSE Linux Enterprise Module for Basesystem 15 SP4", }, { category: "default_component_of", full_product_name: { name: "busybox-1.35.0-150400.3.3.1.s390x as component of SUSE Linux Enterprise Module for Basesystem 15 SP4", product_id: "SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-1.35.0-150400.3.3.1.s390x", }, product_reference: "busybox-1.35.0-150400.3.3.1.s390x", relates_to_product_reference: "SUSE Linux Enterprise Module for Basesystem 15 SP4", }, { category: "default_component_of", full_product_name: { name: "busybox-1.35.0-150400.3.3.1.x86_64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP4", product_id: "SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-1.35.0-150400.3.3.1.x86_64", }, product_reference: "busybox-1.35.0-150400.3.3.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Module for Basesystem 15 SP4", }, { category: "default_component_of", full_product_name: { name: "busybox-static-1.35.0-150400.3.3.1.aarch64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP4", product_id: "SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-static-1.35.0-150400.3.3.1.aarch64", }, product_reference: "busybox-static-1.35.0-150400.3.3.1.aarch64", relates_to_product_reference: "SUSE Linux Enterprise Module for Basesystem 15 SP4", }, { category: "default_component_of", full_product_name: { name: "busybox-static-1.35.0-150400.3.3.1.ppc64le as component of SUSE Linux Enterprise Module for Basesystem 15 SP4", product_id: "SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-static-1.35.0-150400.3.3.1.ppc64le", }, product_reference: "busybox-static-1.35.0-150400.3.3.1.ppc64le", relates_to_product_reference: "SUSE Linux Enterprise Module for Basesystem 15 SP4", }, { category: "default_component_of", full_product_name: { name: "busybox-static-1.35.0-150400.3.3.1.s390x as component of SUSE Linux Enterprise Module for Basesystem 15 SP4", product_id: "SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-static-1.35.0-150400.3.3.1.s390x", }, product_reference: "busybox-static-1.35.0-150400.3.3.1.s390x", relates_to_product_reference: "SUSE Linux Enterprise Module for Basesystem 15 SP4", }, { category: "default_component_of", full_product_name: { name: "busybox-static-1.35.0-150400.3.3.1.x86_64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP4", product_id: "SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-static-1.35.0-150400.3.3.1.x86_64", }, product_reference: "busybox-static-1.35.0-150400.3.3.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Module for Basesystem 15 SP4", }, { category: "default_component_of", full_product_name: { name: "busybox-1.35.0-150400.3.3.1.aarch64 as component of openSUSE Leap 15.4", product_id: "openSUSE Leap 15.4:busybox-1.35.0-150400.3.3.1.aarch64", }, product_reference: "busybox-1.35.0-150400.3.3.1.aarch64", relates_to_product_reference: "openSUSE Leap 15.4", }, { category: "default_component_of", full_product_name: { name: "busybox-1.35.0-150400.3.3.1.ppc64le as component of openSUSE Leap 15.4", product_id: "openSUSE Leap 15.4:busybox-1.35.0-150400.3.3.1.ppc64le", }, product_reference: "busybox-1.35.0-150400.3.3.1.ppc64le", relates_to_product_reference: "openSUSE Leap 15.4", }, { category: "default_component_of", full_product_name: { name: "busybox-1.35.0-150400.3.3.1.s390x as component of openSUSE Leap 15.4", product_id: "openSUSE Leap 15.4:busybox-1.35.0-150400.3.3.1.s390x", }, product_reference: "busybox-1.35.0-150400.3.3.1.s390x", relates_to_product_reference: "openSUSE Leap 15.4", }, { category: "default_component_of", full_product_name: { name: "busybox-1.35.0-150400.3.3.1.x86_64 as component of openSUSE Leap 15.4", product_id: "openSUSE Leap 15.4:busybox-1.35.0-150400.3.3.1.x86_64", }, product_reference: "busybox-1.35.0-150400.3.3.1.x86_64", relates_to_product_reference: "openSUSE Leap 15.4", }, { category: "default_component_of", full_product_name: { name: "busybox-static-1.35.0-150400.3.3.1.aarch64 as component of openSUSE Leap 15.4", product_id: "openSUSE Leap 15.4:busybox-static-1.35.0-150400.3.3.1.aarch64", }, product_reference: "busybox-static-1.35.0-150400.3.3.1.aarch64", relates_to_product_reference: "openSUSE Leap 15.4", }, { category: "default_component_of", full_product_name: { name: "busybox-static-1.35.0-150400.3.3.1.ppc64le as component of openSUSE Leap 15.4", product_id: "openSUSE Leap 15.4:busybox-static-1.35.0-150400.3.3.1.ppc64le", }, product_reference: "busybox-static-1.35.0-150400.3.3.1.ppc64le", relates_to_product_reference: "openSUSE Leap 15.4", }, { category: "default_component_of", full_product_name: { name: "busybox-static-1.35.0-150400.3.3.1.s390x as component of openSUSE Leap 15.4", product_id: "openSUSE Leap 15.4:busybox-static-1.35.0-150400.3.3.1.s390x", }, product_reference: "busybox-static-1.35.0-150400.3.3.1.s390x", relates_to_product_reference: "openSUSE Leap 15.4", }, { category: "default_component_of", full_product_name: { name: "busybox-static-1.35.0-150400.3.3.1.x86_64 as component of openSUSE Leap 15.4", product_id: "openSUSE Leap 15.4:busybox-static-1.35.0-150400.3.3.1.x86_64", }, product_reference: "busybox-static-1.35.0-150400.3.3.1.x86_64", relates_to_product_reference: "openSUSE Leap 15.4", }, { category: "default_component_of", full_product_name: { name: "busybox-testsuite-1.35.0-150400.3.3.1.aarch64 as component of openSUSE Leap 15.4", product_id: "openSUSE Leap 15.4:busybox-testsuite-1.35.0-150400.3.3.1.aarch64", }, product_reference: "busybox-testsuite-1.35.0-150400.3.3.1.aarch64", relates_to_product_reference: "openSUSE Leap 15.4", }, { category: "default_component_of", full_product_name: { name: "busybox-testsuite-1.35.0-150400.3.3.1.ppc64le as component of openSUSE Leap 15.4", product_id: "openSUSE Leap 15.4:busybox-testsuite-1.35.0-150400.3.3.1.ppc64le", }, product_reference: "busybox-testsuite-1.35.0-150400.3.3.1.ppc64le", relates_to_product_reference: "openSUSE Leap 15.4", }, { category: "default_component_of", full_product_name: { name: "busybox-testsuite-1.35.0-150400.3.3.1.s390x as component of openSUSE Leap 15.4", product_id: "openSUSE Leap 15.4:busybox-testsuite-1.35.0-150400.3.3.1.s390x", }, product_reference: "busybox-testsuite-1.35.0-150400.3.3.1.s390x", relates_to_product_reference: "openSUSE Leap 15.4", }, { category: "default_component_of", full_product_name: { name: "busybox-testsuite-1.35.0-150400.3.3.1.x86_64 as component of openSUSE Leap 15.4", product_id: "openSUSE Leap 15.4:busybox-testsuite-1.35.0-150400.3.3.1.x86_64", }, product_reference: "busybox-testsuite-1.35.0-150400.3.3.1.x86_64", relates_to_product_reference: "openSUSE Leap 15.4", }, { category: "default_component_of", full_product_name: { name: "busybox-warewulf3-1.35.0-150400.3.3.1.aarch64 as component of openSUSE Leap 15.4", product_id: "openSUSE Leap 15.4:busybox-warewulf3-1.35.0-150400.3.3.1.aarch64", }, product_reference: "busybox-warewulf3-1.35.0-150400.3.3.1.aarch64", relates_to_product_reference: "openSUSE Leap 15.4", }, { category: "default_component_of", full_product_name: { name: "busybox-warewulf3-1.35.0-150400.3.3.1.x86_64 as component of openSUSE Leap 15.4", product_id: "openSUSE Leap 15.4:busybox-warewulf3-1.35.0-150400.3.3.1.x86_64", }, product_reference: "busybox-warewulf3-1.35.0-150400.3.3.1.x86_64", relates_to_product_reference: "openSUSE Leap 15.4", }, ], }, vulnerabilities: [ { cve: "CVE-2011-5325", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2011-5325", }, ], notes: [ { category: "general", text: "Directory traversal vulnerability in the BusyBox implementation of tar before 1.22.0 v5 allows remote attackers to point to files outside the current working directory via a symlink.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-1.35.0-150400.3.3.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-1.35.0-150400.3.3.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-1.35.0-150400.3.3.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-1.35.0-150400.3.3.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-static-1.35.0-150400.3.3.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-static-1.35.0-150400.3.3.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-static-1.35.0-150400.3.3.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-static-1.35.0-150400.3.3.1.x86_64", "openSUSE Leap 15.4:busybox-1.35.0-150400.3.3.1.aarch64", "openSUSE Leap 15.4:busybox-1.35.0-150400.3.3.1.ppc64le", "openSUSE Leap 15.4:busybox-1.35.0-150400.3.3.1.s390x", "openSUSE Leap 15.4:busybox-1.35.0-150400.3.3.1.x86_64", "openSUSE Leap 15.4:busybox-static-1.35.0-150400.3.3.1.aarch64", "openSUSE Leap 15.4:busybox-static-1.35.0-150400.3.3.1.ppc64le", "openSUSE Leap 15.4:busybox-static-1.35.0-150400.3.3.1.s390x", "openSUSE Leap 15.4:busybox-static-1.35.0-150400.3.3.1.x86_64", "openSUSE Leap 15.4:busybox-testsuite-1.35.0-150400.3.3.1.aarch64", "openSUSE Leap 15.4:busybox-testsuite-1.35.0-150400.3.3.1.ppc64le", "openSUSE Leap 15.4:busybox-testsuite-1.35.0-150400.3.3.1.s390x", "openSUSE Leap 15.4:busybox-testsuite-1.35.0-150400.3.3.1.x86_64", "openSUSE Leap 15.4:busybox-warewulf3-1.35.0-150400.3.3.1.aarch64", "openSUSE Leap 15.4:busybox-warewulf3-1.35.0-150400.3.3.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2011-5325", url: "https://www.suse.com/security/cve/CVE-2011-5325", }, { category: "external", summary: "SUSE Bug 951562 for CVE-2011-5325", url: "https://bugzilla.suse.com/951562", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-1.35.0-150400.3.3.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-1.35.0-150400.3.3.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-1.35.0-150400.3.3.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-1.35.0-150400.3.3.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-static-1.35.0-150400.3.3.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-static-1.35.0-150400.3.3.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-static-1.35.0-150400.3.3.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-static-1.35.0-150400.3.3.1.x86_64", "openSUSE Leap 15.4:busybox-1.35.0-150400.3.3.1.aarch64", "openSUSE Leap 15.4:busybox-1.35.0-150400.3.3.1.ppc64le", "openSUSE Leap 15.4:busybox-1.35.0-150400.3.3.1.s390x", "openSUSE Leap 15.4:busybox-1.35.0-150400.3.3.1.x86_64", "openSUSE Leap 15.4:busybox-static-1.35.0-150400.3.3.1.aarch64", "openSUSE Leap 15.4:busybox-static-1.35.0-150400.3.3.1.ppc64le", "openSUSE Leap 15.4:busybox-static-1.35.0-150400.3.3.1.s390x", "openSUSE Leap 15.4:busybox-static-1.35.0-150400.3.3.1.x86_64", "openSUSE Leap 15.4:busybox-testsuite-1.35.0-150400.3.3.1.aarch64", "openSUSE Leap 15.4:busybox-testsuite-1.35.0-150400.3.3.1.ppc64le", "openSUSE Leap 15.4:busybox-testsuite-1.35.0-150400.3.3.1.s390x", "openSUSE Leap 15.4:busybox-testsuite-1.35.0-150400.3.3.1.x86_64", "openSUSE Leap 15.4:busybox-warewulf3-1.35.0-150400.3.3.1.aarch64", "openSUSE Leap 15.4:busybox-warewulf3-1.35.0-150400.3.3.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 7.5, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N", version: "3.1", }, products: [ "SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-1.35.0-150400.3.3.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-1.35.0-150400.3.3.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-1.35.0-150400.3.3.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-1.35.0-150400.3.3.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-static-1.35.0-150400.3.3.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-static-1.35.0-150400.3.3.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-static-1.35.0-150400.3.3.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-static-1.35.0-150400.3.3.1.x86_64", "openSUSE Leap 15.4:busybox-1.35.0-150400.3.3.1.aarch64", "openSUSE Leap 15.4:busybox-1.35.0-150400.3.3.1.ppc64le", "openSUSE Leap 15.4:busybox-1.35.0-150400.3.3.1.s390x", "openSUSE Leap 15.4:busybox-1.35.0-150400.3.3.1.x86_64", "openSUSE Leap 15.4:busybox-static-1.35.0-150400.3.3.1.aarch64", "openSUSE Leap 15.4:busybox-static-1.35.0-150400.3.3.1.ppc64le", "openSUSE Leap 15.4:busybox-static-1.35.0-150400.3.3.1.s390x", "openSUSE Leap 15.4:busybox-static-1.35.0-150400.3.3.1.x86_64", "openSUSE Leap 15.4:busybox-testsuite-1.35.0-150400.3.3.1.aarch64", "openSUSE Leap 15.4:busybox-testsuite-1.35.0-150400.3.3.1.ppc64le", "openSUSE Leap 15.4:busybox-testsuite-1.35.0-150400.3.3.1.s390x", "openSUSE Leap 15.4:busybox-testsuite-1.35.0-150400.3.3.1.x86_64", "openSUSE Leap 15.4:busybox-warewulf3-1.35.0-150400.3.3.1.aarch64", "openSUSE Leap 15.4:busybox-warewulf3-1.35.0-150400.3.3.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2022-11-11T14:38:22Z", details: "moderate", }, ], title: "CVE-2011-5325", }, { cve: "CVE-2015-9261", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2015-9261", }, ], notes: [ { category: "general", text: "huft_build in archival/libarchive/decompress_gunzip.c in BusyBox before 1.27.2 misuses a pointer, causing segfaults and an application crash during an unzip operation on a specially crafted ZIP file.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-1.35.0-150400.3.3.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-1.35.0-150400.3.3.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-1.35.0-150400.3.3.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-1.35.0-150400.3.3.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-static-1.35.0-150400.3.3.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-static-1.35.0-150400.3.3.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-static-1.35.0-150400.3.3.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-static-1.35.0-150400.3.3.1.x86_64", "openSUSE Leap 15.4:busybox-1.35.0-150400.3.3.1.aarch64", "openSUSE Leap 15.4:busybox-1.35.0-150400.3.3.1.ppc64le", "openSUSE Leap 15.4:busybox-1.35.0-150400.3.3.1.s390x", "openSUSE Leap 15.4:busybox-1.35.0-150400.3.3.1.x86_64", "openSUSE Leap 15.4:busybox-static-1.35.0-150400.3.3.1.aarch64", "openSUSE Leap 15.4:busybox-static-1.35.0-150400.3.3.1.ppc64le", "openSUSE Leap 15.4:busybox-static-1.35.0-150400.3.3.1.s390x", "openSUSE Leap 15.4:busybox-static-1.35.0-150400.3.3.1.x86_64", "openSUSE Leap 15.4:busybox-testsuite-1.35.0-150400.3.3.1.aarch64", "openSUSE Leap 15.4:busybox-testsuite-1.35.0-150400.3.3.1.ppc64le", "openSUSE Leap 15.4:busybox-testsuite-1.35.0-150400.3.3.1.s390x", "openSUSE Leap 15.4:busybox-testsuite-1.35.0-150400.3.3.1.x86_64", "openSUSE Leap 15.4:busybox-warewulf3-1.35.0-150400.3.3.1.aarch64", "openSUSE Leap 15.4:busybox-warewulf3-1.35.0-150400.3.3.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2015-9261", url: "https://www.suse.com/security/cve/CVE-2015-9261", }, { category: "external", summary: "SUSE Bug 1102912 for CVE-2015-9261", url: "https://bugzilla.suse.com/1102912", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-1.35.0-150400.3.3.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-1.35.0-150400.3.3.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-1.35.0-150400.3.3.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-1.35.0-150400.3.3.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-static-1.35.0-150400.3.3.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-static-1.35.0-150400.3.3.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-static-1.35.0-150400.3.3.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-static-1.35.0-150400.3.3.1.x86_64", "openSUSE Leap 15.4:busybox-1.35.0-150400.3.3.1.aarch64", "openSUSE Leap 15.4:busybox-1.35.0-150400.3.3.1.ppc64le", "openSUSE Leap 15.4:busybox-1.35.0-150400.3.3.1.s390x", "openSUSE Leap 15.4:busybox-1.35.0-150400.3.3.1.x86_64", "openSUSE Leap 15.4:busybox-static-1.35.0-150400.3.3.1.aarch64", "openSUSE Leap 15.4:busybox-static-1.35.0-150400.3.3.1.ppc64le", "openSUSE Leap 15.4:busybox-static-1.35.0-150400.3.3.1.s390x", "openSUSE Leap 15.4:busybox-static-1.35.0-150400.3.3.1.x86_64", "openSUSE Leap 15.4:busybox-testsuite-1.35.0-150400.3.3.1.aarch64", "openSUSE Leap 15.4:busybox-testsuite-1.35.0-150400.3.3.1.ppc64le", "openSUSE Leap 15.4:busybox-testsuite-1.35.0-150400.3.3.1.s390x", "openSUSE Leap 15.4:busybox-testsuite-1.35.0-150400.3.3.1.x86_64", "openSUSE Leap 15.4:busybox-warewulf3-1.35.0-150400.3.3.1.aarch64", "openSUSE Leap 15.4:busybox-warewulf3-1.35.0-150400.3.3.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.5, baseSeverity: "MEDIUM", vectorString: "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", version: "3.0", }, products: [ "SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-1.35.0-150400.3.3.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-1.35.0-150400.3.3.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-1.35.0-150400.3.3.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-1.35.0-150400.3.3.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-static-1.35.0-150400.3.3.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-static-1.35.0-150400.3.3.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-static-1.35.0-150400.3.3.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-static-1.35.0-150400.3.3.1.x86_64", "openSUSE Leap 15.4:busybox-1.35.0-150400.3.3.1.aarch64", "openSUSE Leap 15.4:busybox-1.35.0-150400.3.3.1.ppc64le", "openSUSE Leap 15.4:busybox-1.35.0-150400.3.3.1.s390x", "openSUSE Leap 15.4:busybox-1.35.0-150400.3.3.1.x86_64", "openSUSE Leap 15.4:busybox-static-1.35.0-150400.3.3.1.aarch64", "openSUSE Leap 15.4:busybox-static-1.35.0-150400.3.3.1.ppc64le", "openSUSE Leap 15.4:busybox-static-1.35.0-150400.3.3.1.s390x", "openSUSE Leap 15.4:busybox-static-1.35.0-150400.3.3.1.x86_64", "openSUSE Leap 15.4:busybox-testsuite-1.35.0-150400.3.3.1.aarch64", "openSUSE Leap 15.4:busybox-testsuite-1.35.0-150400.3.3.1.ppc64le", "openSUSE Leap 15.4:busybox-testsuite-1.35.0-150400.3.3.1.s390x", "openSUSE Leap 15.4:busybox-testsuite-1.35.0-150400.3.3.1.x86_64", "openSUSE Leap 15.4:busybox-warewulf3-1.35.0-150400.3.3.1.aarch64", "openSUSE Leap 15.4:busybox-warewulf3-1.35.0-150400.3.3.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2022-11-11T14:38:22Z", details: "moderate", }, ], title: "CVE-2015-9261", }, { cve: "CVE-2016-2147", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2016-2147", }, ], notes: [ { category: "general", text: "Integer overflow in the DHCP client (udhcpc) in BusyBox before 1.25.0 allows remote attackers to cause a denial of service (crash) via a malformed RFC1035-encoded domain name, which triggers an out-of-bounds heap write.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-1.35.0-150400.3.3.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-1.35.0-150400.3.3.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-1.35.0-150400.3.3.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-1.35.0-150400.3.3.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-static-1.35.0-150400.3.3.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-static-1.35.0-150400.3.3.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-static-1.35.0-150400.3.3.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-static-1.35.0-150400.3.3.1.x86_64", "openSUSE Leap 15.4:busybox-1.35.0-150400.3.3.1.aarch64", "openSUSE Leap 15.4:busybox-1.35.0-150400.3.3.1.ppc64le", "openSUSE Leap 15.4:busybox-1.35.0-150400.3.3.1.s390x", "openSUSE Leap 15.4:busybox-1.35.0-150400.3.3.1.x86_64", "openSUSE Leap 15.4:busybox-static-1.35.0-150400.3.3.1.aarch64", "openSUSE Leap 15.4:busybox-static-1.35.0-150400.3.3.1.ppc64le", "openSUSE Leap 15.4:busybox-static-1.35.0-150400.3.3.1.s390x", "openSUSE Leap 15.4:busybox-static-1.35.0-150400.3.3.1.x86_64", "openSUSE Leap 15.4:busybox-testsuite-1.35.0-150400.3.3.1.aarch64", "openSUSE Leap 15.4:busybox-testsuite-1.35.0-150400.3.3.1.ppc64le", "openSUSE Leap 15.4:busybox-testsuite-1.35.0-150400.3.3.1.s390x", "openSUSE Leap 15.4:busybox-testsuite-1.35.0-150400.3.3.1.x86_64", "openSUSE Leap 15.4:busybox-warewulf3-1.35.0-150400.3.3.1.aarch64", "openSUSE Leap 15.4:busybox-warewulf3-1.35.0-150400.3.3.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2016-2147", url: "https://www.suse.com/security/cve/CVE-2016-2147", }, { category: "external", summary: "SUSE Bug 970663 for CVE-2016-2147", url: "https://bugzilla.suse.com/970663", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-1.35.0-150400.3.3.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-1.35.0-150400.3.3.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-1.35.0-150400.3.3.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-1.35.0-150400.3.3.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-static-1.35.0-150400.3.3.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-static-1.35.0-150400.3.3.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-static-1.35.0-150400.3.3.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-static-1.35.0-150400.3.3.1.x86_64", "openSUSE Leap 15.4:busybox-1.35.0-150400.3.3.1.aarch64", "openSUSE Leap 15.4:busybox-1.35.0-150400.3.3.1.ppc64le", "openSUSE Leap 15.4:busybox-1.35.0-150400.3.3.1.s390x", "openSUSE Leap 15.4:busybox-1.35.0-150400.3.3.1.x86_64", "openSUSE Leap 15.4:busybox-static-1.35.0-150400.3.3.1.aarch64", "openSUSE Leap 15.4:busybox-static-1.35.0-150400.3.3.1.ppc64le", "openSUSE Leap 15.4:busybox-static-1.35.0-150400.3.3.1.s390x", "openSUSE Leap 15.4:busybox-static-1.35.0-150400.3.3.1.x86_64", "openSUSE Leap 15.4:busybox-testsuite-1.35.0-150400.3.3.1.aarch64", "openSUSE Leap 15.4:busybox-testsuite-1.35.0-150400.3.3.1.ppc64le", "openSUSE Leap 15.4:busybox-testsuite-1.35.0-150400.3.3.1.s390x", "openSUSE Leap 15.4:busybox-testsuite-1.35.0-150400.3.3.1.x86_64", "openSUSE Leap 15.4:busybox-warewulf3-1.35.0-150400.3.3.1.aarch64", "openSUSE Leap 15.4:busybox-warewulf3-1.35.0-150400.3.3.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 7.5, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-1.35.0-150400.3.3.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-1.35.0-150400.3.3.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-1.35.0-150400.3.3.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-1.35.0-150400.3.3.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-static-1.35.0-150400.3.3.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-static-1.35.0-150400.3.3.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-static-1.35.0-150400.3.3.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-static-1.35.0-150400.3.3.1.x86_64", "openSUSE Leap 15.4:busybox-1.35.0-150400.3.3.1.aarch64", "openSUSE Leap 15.4:busybox-1.35.0-150400.3.3.1.ppc64le", "openSUSE Leap 15.4:busybox-1.35.0-150400.3.3.1.s390x", "openSUSE Leap 15.4:busybox-1.35.0-150400.3.3.1.x86_64", "openSUSE Leap 15.4:busybox-static-1.35.0-150400.3.3.1.aarch64", "openSUSE Leap 15.4:busybox-static-1.35.0-150400.3.3.1.ppc64le", "openSUSE Leap 15.4:busybox-static-1.35.0-150400.3.3.1.s390x", "openSUSE Leap 15.4:busybox-static-1.35.0-150400.3.3.1.x86_64", "openSUSE Leap 15.4:busybox-testsuite-1.35.0-150400.3.3.1.aarch64", "openSUSE Leap 15.4:busybox-testsuite-1.35.0-150400.3.3.1.ppc64le", "openSUSE Leap 15.4:busybox-testsuite-1.35.0-150400.3.3.1.s390x", "openSUSE Leap 15.4:busybox-testsuite-1.35.0-150400.3.3.1.x86_64", "openSUSE Leap 15.4:busybox-warewulf3-1.35.0-150400.3.3.1.aarch64", "openSUSE Leap 15.4:busybox-warewulf3-1.35.0-150400.3.3.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2022-11-11T14:38:22Z", details: "important", }, ], title: "CVE-2016-2147", }, { cve: "CVE-2016-2148", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2016-2148", }, ], notes: [ { category: "general", text: "Heap-based buffer overflow in the DHCP client (udhcpc) in BusyBox before 1.25.0 allows remote attackers to have unspecified impact via vectors involving OPTION_6RD parsing.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-1.35.0-150400.3.3.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-1.35.0-150400.3.3.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-1.35.0-150400.3.3.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-1.35.0-150400.3.3.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-static-1.35.0-150400.3.3.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-static-1.35.0-150400.3.3.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-static-1.35.0-150400.3.3.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-static-1.35.0-150400.3.3.1.x86_64", "openSUSE Leap 15.4:busybox-1.35.0-150400.3.3.1.aarch64", "openSUSE Leap 15.4:busybox-1.35.0-150400.3.3.1.ppc64le", "openSUSE Leap 15.4:busybox-1.35.0-150400.3.3.1.s390x", "openSUSE Leap 15.4:busybox-1.35.0-150400.3.3.1.x86_64", "openSUSE Leap 15.4:busybox-static-1.35.0-150400.3.3.1.aarch64", "openSUSE Leap 15.4:busybox-static-1.35.0-150400.3.3.1.ppc64le", "openSUSE Leap 15.4:busybox-static-1.35.0-150400.3.3.1.s390x", "openSUSE Leap 15.4:busybox-static-1.35.0-150400.3.3.1.x86_64", "openSUSE Leap 15.4:busybox-testsuite-1.35.0-150400.3.3.1.aarch64", "openSUSE Leap 15.4:busybox-testsuite-1.35.0-150400.3.3.1.ppc64le", "openSUSE Leap 15.4:busybox-testsuite-1.35.0-150400.3.3.1.s390x", "openSUSE Leap 15.4:busybox-testsuite-1.35.0-150400.3.3.1.x86_64", "openSUSE Leap 15.4:busybox-warewulf3-1.35.0-150400.3.3.1.aarch64", "openSUSE Leap 15.4:busybox-warewulf3-1.35.0-150400.3.3.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2016-2148", url: "https://www.suse.com/security/cve/CVE-2016-2148", }, { category: "external", summary: "SUSE Bug 970662 for CVE-2016-2148", url: "https://bugzilla.suse.com/970662", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-1.35.0-150400.3.3.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-1.35.0-150400.3.3.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-1.35.0-150400.3.3.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-1.35.0-150400.3.3.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-static-1.35.0-150400.3.3.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-static-1.35.0-150400.3.3.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-static-1.35.0-150400.3.3.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-static-1.35.0-150400.3.3.1.x86_64", "openSUSE Leap 15.4:busybox-1.35.0-150400.3.3.1.aarch64", "openSUSE Leap 15.4:busybox-1.35.0-150400.3.3.1.ppc64le", "openSUSE Leap 15.4:busybox-1.35.0-150400.3.3.1.s390x", "openSUSE Leap 15.4:busybox-1.35.0-150400.3.3.1.x86_64", "openSUSE Leap 15.4:busybox-static-1.35.0-150400.3.3.1.aarch64", "openSUSE Leap 15.4:busybox-static-1.35.0-150400.3.3.1.ppc64le", "openSUSE Leap 15.4:busybox-static-1.35.0-150400.3.3.1.s390x", "openSUSE Leap 15.4:busybox-static-1.35.0-150400.3.3.1.x86_64", "openSUSE Leap 15.4:busybox-testsuite-1.35.0-150400.3.3.1.aarch64", "openSUSE Leap 15.4:busybox-testsuite-1.35.0-150400.3.3.1.ppc64le", "openSUSE Leap 15.4:busybox-testsuite-1.35.0-150400.3.3.1.s390x", "openSUSE Leap 15.4:busybox-testsuite-1.35.0-150400.3.3.1.x86_64", "openSUSE Leap 15.4:busybox-warewulf3-1.35.0-150400.3.3.1.aarch64", "openSUSE Leap 15.4:busybox-warewulf3-1.35.0-150400.3.3.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 9.8, baseSeverity: "CRITICAL", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-1.35.0-150400.3.3.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-1.35.0-150400.3.3.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-1.35.0-150400.3.3.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-1.35.0-150400.3.3.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-static-1.35.0-150400.3.3.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-static-1.35.0-150400.3.3.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-static-1.35.0-150400.3.3.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-static-1.35.0-150400.3.3.1.x86_64", "openSUSE Leap 15.4:busybox-1.35.0-150400.3.3.1.aarch64", "openSUSE Leap 15.4:busybox-1.35.0-150400.3.3.1.ppc64le", "openSUSE Leap 15.4:busybox-1.35.0-150400.3.3.1.s390x", "openSUSE Leap 15.4:busybox-1.35.0-150400.3.3.1.x86_64", "openSUSE Leap 15.4:busybox-static-1.35.0-150400.3.3.1.aarch64", "openSUSE Leap 15.4:busybox-static-1.35.0-150400.3.3.1.ppc64le", "openSUSE Leap 15.4:busybox-static-1.35.0-150400.3.3.1.s390x", "openSUSE Leap 15.4:busybox-static-1.35.0-150400.3.3.1.x86_64", "openSUSE Leap 15.4:busybox-testsuite-1.35.0-150400.3.3.1.aarch64", "openSUSE Leap 15.4:busybox-testsuite-1.35.0-150400.3.3.1.ppc64le", "openSUSE Leap 15.4:busybox-testsuite-1.35.0-150400.3.3.1.s390x", "openSUSE Leap 15.4:busybox-testsuite-1.35.0-150400.3.3.1.x86_64", "openSUSE Leap 15.4:busybox-warewulf3-1.35.0-150400.3.3.1.aarch64", "openSUSE Leap 15.4:busybox-warewulf3-1.35.0-150400.3.3.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2022-11-11T14:38:22Z", details: "moderate", }, ], title: "CVE-2016-2148", }, { cve: "CVE-2016-6301", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2016-6301", }, ], notes: [ { category: "general", text: "The recv_and_process_client_pkt function in networking/ntpd.c in busybox allows remote attackers to cause a denial of service (CPU and bandwidth consumption) via a forged NTP packet, which triggers a communication loop.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-1.35.0-150400.3.3.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-1.35.0-150400.3.3.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-1.35.0-150400.3.3.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-1.35.0-150400.3.3.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-static-1.35.0-150400.3.3.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-static-1.35.0-150400.3.3.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-static-1.35.0-150400.3.3.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-static-1.35.0-150400.3.3.1.x86_64", "openSUSE Leap 15.4:busybox-1.35.0-150400.3.3.1.aarch64", "openSUSE Leap 15.4:busybox-1.35.0-150400.3.3.1.ppc64le", "openSUSE Leap 15.4:busybox-1.35.0-150400.3.3.1.s390x", "openSUSE Leap 15.4:busybox-1.35.0-150400.3.3.1.x86_64", "openSUSE Leap 15.4:busybox-static-1.35.0-150400.3.3.1.aarch64", "openSUSE Leap 15.4:busybox-static-1.35.0-150400.3.3.1.ppc64le", "openSUSE Leap 15.4:busybox-static-1.35.0-150400.3.3.1.s390x", "openSUSE Leap 15.4:busybox-static-1.35.0-150400.3.3.1.x86_64", "openSUSE Leap 15.4:busybox-testsuite-1.35.0-150400.3.3.1.aarch64", "openSUSE Leap 15.4:busybox-testsuite-1.35.0-150400.3.3.1.ppc64le", "openSUSE Leap 15.4:busybox-testsuite-1.35.0-150400.3.3.1.s390x", "openSUSE Leap 15.4:busybox-testsuite-1.35.0-150400.3.3.1.x86_64", "openSUSE Leap 15.4:busybox-warewulf3-1.35.0-150400.3.3.1.aarch64", "openSUSE Leap 15.4:busybox-warewulf3-1.35.0-150400.3.3.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2016-6301", url: "https://www.suse.com/security/cve/CVE-2016-6301", }, { category: "external", summary: "SUSE Bug 991940 for CVE-2016-6301", url: "https://bugzilla.suse.com/991940", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-1.35.0-150400.3.3.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-1.35.0-150400.3.3.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-1.35.0-150400.3.3.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-1.35.0-150400.3.3.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-static-1.35.0-150400.3.3.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-static-1.35.0-150400.3.3.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-static-1.35.0-150400.3.3.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-static-1.35.0-150400.3.3.1.x86_64", "openSUSE Leap 15.4:busybox-1.35.0-150400.3.3.1.aarch64", "openSUSE Leap 15.4:busybox-1.35.0-150400.3.3.1.ppc64le", "openSUSE Leap 15.4:busybox-1.35.0-150400.3.3.1.s390x", "openSUSE Leap 15.4:busybox-1.35.0-150400.3.3.1.x86_64", "openSUSE Leap 15.4:busybox-static-1.35.0-150400.3.3.1.aarch64", "openSUSE Leap 15.4:busybox-static-1.35.0-150400.3.3.1.ppc64le", "openSUSE Leap 15.4:busybox-static-1.35.0-150400.3.3.1.s390x", "openSUSE Leap 15.4:busybox-static-1.35.0-150400.3.3.1.x86_64", "openSUSE Leap 15.4:busybox-testsuite-1.35.0-150400.3.3.1.aarch64", "openSUSE Leap 15.4:busybox-testsuite-1.35.0-150400.3.3.1.ppc64le", "openSUSE Leap 15.4:busybox-testsuite-1.35.0-150400.3.3.1.s390x", "openSUSE Leap 15.4:busybox-testsuite-1.35.0-150400.3.3.1.x86_64", "openSUSE Leap 15.4:busybox-warewulf3-1.35.0-150400.3.3.1.aarch64", "openSUSE Leap 15.4:busybox-warewulf3-1.35.0-150400.3.3.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 7.5, baseSeverity: "HIGH", vectorString: "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", version: "3.0", }, products: [ "SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-1.35.0-150400.3.3.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-1.35.0-150400.3.3.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-1.35.0-150400.3.3.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-1.35.0-150400.3.3.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-static-1.35.0-150400.3.3.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-static-1.35.0-150400.3.3.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-static-1.35.0-150400.3.3.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-static-1.35.0-150400.3.3.1.x86_64", "openSUSE Leap 15.4:busybox-1.35.0-150400.3.3.1.aarch64", "openSUSE Leap 15.4:busybox-1.35.0-150400.3.3.1.ppc64le", "openSUSE Leap 15.4:busybox-1.35.0-150400.3.3.1.s390x", "openSUSE Leap 15.4:busybox-1.35.0-150400.3.3.1.x86_64", "openSUSE Leap 15.4:busybox-static-1.35.0-150400.3.3.1.aarch64", "openSUSE Leap 15.4:busybox-static-1.35.0-150400.3.3.1.ppc64le", "openSUSE Leap 15.4:busybox-static-1.35.0-150400.3.3.1.s390x", "openSUSE Leap 15.4:busybox-static-1.35.0-150400.3.3.1.x86_64", "openSUSE Leap 15.4:busybox-testsuite-1.35.0-150400.3.3.1.aarch64", "openSUSE Leap 15.4:busybox-testsuite-1.35.0-150400.3.3.1.ppc64le", "openSUSE Leap 15.4:busybox-testsuite-1.35.0-150400.3.3.1.s390x", "openSUSE Leap 15.4:busybox-testsuite-1.35.0-150400.3.3.1.x86_64", "openSUSE Leap 15.4:busybox-warewulf3-1.35.0-150400.3.3.1.aarch64", "openSUSE Leap 15.4:busybox-warewulf3-1.35.0-150400.3.3.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2022-11-11T14:38:22Z", details: "moderate", }, ], title: "CVE-2016-6301", }, { cve: "CVE-2017-15873", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2017-15873", }, ], notes: [ { category: "general", text: "The get_next_block function in archival/libarchive/decompress_bunzip2.c in BusyBox 1.27.2 has an Integer Overflow that may lead to a write access violation.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-1.35.0-150400.3.3.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-1.35.0-150400.3.3.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-1.35.0-150400.3.3.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-1.35.0-150400.3.3.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-static-1.35.0-150400.3.3.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-static-1.35.0-150400.3.3.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-static-1.35.0-150400.3.3.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-static-1.35.0-150400.3.3.1.x86_64", "openSUSE Leap 15.4:busybox-1.35.0-150400.3.3.1.aarch64", "openSUSE Leap 15.4:busybox-1.35.0-150400.3.3.1.ppc64le", "openSUSE Leap 15.4:busybox-1.35.0-150400.3.3.1.s390x", "openSUSE Leap 15.4:busybox-1.35.0-150400.3.3.1.x86_64", "openSUSE Leap 15.4:busybox-static-1.35.0-150400.3.3.1.aarch64", "openSUSE Leap 15.4:busybox-static-1.35.0-150400.3.3.1.ppc64le", "openSUSE Leap 15.4:busybox-static-1.35.0-150400.3.3.1.s390x", "openSUSE Leap 15.4:busybox-static-1.35.0-150400.3.3.1.x86_64", "openSUSE Leap 15.4:busybox-testsuite-1.35.0-150400.3.3.1.aarch64", "openSUSE Leap 15.4:busybox-testsuite-1.35.0-150400.3.3.1.ppc64le", "openSUSE Leap 15.4:busybox-testsuite-1.35.0-150400.3.3.1.s390x", "openSUSE Leap 15.4:busybox-testsuite-1.35.0-150400.3.3.1.x86_64", "openSUSE Leap 15.4:busybox-warewulf3-1.35.0-150400.3.3.1.aarch64", "openSUSE Leap 15.4:busybox-warewulf3-1.35.0-150400.3.3.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2017-15873", url: "https://www.suse.com/security/cve/CVE-2017-15873", }, { category: "external", summary: "SUSE Bug 1064976 for CVE-2017-15873", url: "https://bugzilla.suse.com/1064976", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-1.35.0-150400.3.3.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-1.35.0-150400.3.3.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-1.35.0-150400.3.3.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-1.35.0-150400.3.3.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-static-1.35.0-150400.3.3.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-static-1.35.0-150400.3.3.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-static-1.35.0-150400.3.3.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-static-1.35.0-150400.3.3.1.x86_64", "openSUSE Leap 15.4:busybox-1.35.0-150400.3.3.1.aarch64", "openSUSE Leap 15.4:busybox-1.35.0-150400.3.3.1.ppc64le", "openSUSE Leap 15.4:busybox-1.35.0-150400.3.3.1.s390x", "openSUSE Leap 15.4:busybox-1.35.0-150400.3.3.1.x86_64", "openSUSE Leap 15.4:busybox-static-1.35.0-150400.3.3.1.aarch64", "openSUSE Leap 15.4:busybox-static-1.35.0-150400.3.3.1.ppc64le", "openSUSE Leap 15.4:busybox-static-1.35.0-150400.3.3.1.s390x", "openSUSE Leap 15.4:busybox-static-1.35.0-150400.3.3.1.x86_64", "openSUSE Leap 15.4:busybox-testsuite-1.35.0-150400.3.3.1.aarch64", "openSUSE Leap 15.4:busybox-testsuite-1.35.0-150400.3.3.1.ppc64le", "openSUSE Leap 15.4:busybox-testsuite-1.35.0-150400.3.3.1.s390x", "openSUSE Leap 15.4:busybox-testsuite-1.35.0-150400.3.3.1.x86_64", "openSUSE Leap 15.4:busybox-warewulf3-1.35.0-150400.3.3.1.aarch64", "openSUSE Leap 15.4:busybox-warewulf3-1.35.0-150400.3.3.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 7.8, baseSeverity: "HIGH", vectorString: "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", version: "3.0", }, products: [ "SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-1.35.0-150400.3.3.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-1.35.0-150400.3.3.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-1.35.0-150400.3.3.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-1.35.0-150400.3.3.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-static-1.35.0-150400.3.3.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-static-1.35.0-150400.3.3.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-static-1.35.0-150400.3.3.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-static-1.35.0-150400.3.3.1.x86_64", "openSUSE Leap 15.4:busybox-1.35.0-150400.3.3.1.aarch64", "openSUSE Leap 15.4:busybox-1.35.0-150400.3.3.1.ppc64le", "openSUSE Leap 15.4:busybox-1.35.0-150400.3.3.1.s390x", "openSUSE Leap 15.4:busybox-1.35.0-150400.3.3.1.x86_64", "openSUSE Leap 15.4:busybox-static-1.35.0-150400.3.3.1.aarch64", "openSUSE Leap 15.4:busybox-static-1.35.0-150400.3.3.1.ppc64le", "openSUSE Leap 15.4:busybox-static-1.35.0-150400.3.3.1.s390x", "openSUSE Leap 15.4:busybox-static-1.35.0-150400.3.3.1.x86_64", "openSUSE Leap 15.4:busybox-testsuite-1.35.0-150400.3.3.1.aarch64", "openSUSE Leap 15.4:busybox-testsuite-1.35.0-150400.3.3.1.ppc64le", "openSUSE Leap 15.4:busybox-testsuite-1.35.0-150400.3.3.1.s390x", "openSUSE Leap 15.4:busybox-testsuite-1.35.0-150400.3.3.1.x86_64", "openSUSE Leap 15.4:busybox-warewulf3-1.35.0-150400.3.3.1.aarch64", "openSUSE Leap 15.4:busybox-warewulf3-1.35.0-150400.3.3.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2022-11-11T14:38:22Z", details: "moderate", }, ], title: "CVE-2017-15873", }, { cve: "CVE-2017-15874", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2017-15874", }, ], notes: [ { category: "general", text: "archival/libarchive/decompress_unlzma.c in BusyBox 1.27.2 has an Integer Underflow that leads to a read access violation.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-1.35.0-150400.3.3.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-1.35.0-150400.3.3.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-1.35.0-150400.3.3.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-1.35.0-150400.3.3.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-static-1.35.0-150400.3.3.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-static-1.35.0-150400.3.3.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-static-1.35.0-150400.3.3.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-static-1.35.0-150400.3.3.1.x86_64", "openSUSE Leap 15.4:busybox-1.35.0-150400.3.3.1.aarch64", "openSUSE Leap 15.4:busybox-1.35.0-150400.3.3.1.ppc64le", "openSUSE Leap 15.4:busybox-1.35.0-150400.3.3.1.s390x", "openSUSE Leap 15.4:busybox-1.35.0-150400.3.3.1.x86_64", "openSUSE Leap 15.4:busybox-static-1.35.0-150400.3.3.1.aarch64", "openSUSE Leap 15.4:busybox-static-1.35.0-150400.3.3.1.ppc64le", "openSUSE Leap 15.4:busybox-static-1.35.0-150400.3.3.1.s390x", "openSUSE Leap 15.4:busybox-static-1.35.0-150400.3.3.1.x86_64", "openSUSE Leap 15.4:busybox-testsuite-1.35.0-150400.3.3.1.aarch64", "openSUSE Leap 15.4:busybox-testsuite-1.35.0-150400.3.3.1.ppc64le", "openSUSE Leap 15.4:busybox-testsuite-1.35.0-150400.3.3.1.s390x", "openSUSE Leap 15.4:busybox-testsuite-1.35.0-150400.3.3.1.x86_64", "openSUSE Leap 15.4:busybox-warewulf3-1.35.0-150400.3.3.1.aarch64", "openSUSE Leap 15.4:busybox-warewulf3-1.35.0-150400.3.3.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2017-15874", url: "https://www.suse.com/security/cve/CVE-2017-15874", }, { category: "external", summary: "SUSE Bug 1064978 for CVE-2017-15874", url: "https://bugzilla.suse.com/1064978", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-1.35.0-150400.3.3.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-1.35.0-150400.3.3.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-1.35.0-150400.3.3.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-1.35.0-150400.3.3.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-static-1.35.0-150400.3.3.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-static-1.35.0-150400.3.3.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-static-1.35.0-150400.3.3.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-static-1.35.0-150400.3.3.1.x86_64", "openSUSE Leap 15.4:busybox-1.35.0-150400.3.3.1.aarch64", "openSUSE Leap 15.4:busybox-1.35.0-150400.3.3.1.ppc64le", "openSUSE Leap 15.4:busybox-1.35.0-150400.3.3.1.s390x", "openSUSE Leap 15.4:busybox-1.35.0-150400.3.3.1.x86_64", "openSUSE Leap 15.4:busybox-static-1.35.0-150400.3.3.1.aarch64", "openSUSE Leap 15.4:busybox-static-1.35.0-150400.3.3.1.ppc64le", "openSUSE Leap 15.4:busybox-static-1.35.0-150400.3.3.1.s390x", "openSUSE Leap 15.4:busybox-static-1.35.0-150400.3.3.1.x86_64", "openSUSE Leap 15.4:busybox-testsuite-1.35.0-150400.3.3.1.aarch64", "openSUSE Leap 15.4:busybox-testsuite-1.35.0-150400.3.3.1.ppc64le", "openSUSE Leap 15.4:busybox-testsuite-1.35.0-150400.3.3.1.s390x", "openSUSE Leap 15.4:busybox-testsuite-1.35.0-150400.3.3.1.x86_64", "openSUSE Leap 15.4:busybox-warewulf3-1.35.0-150400.3.3.1.aarch64", "openSUSE Leap 15.4:busybox-warewulf3-1.35.0-150400.3.3.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 3.3, baseSeverity: "LOW", vectorString: "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L", version: "3.0", }, products: [ "SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-1.35.0-150400.3.3.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-1.35.0-150400.3.3.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-1.35.0-150400.3.3.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-1.35.0-150400.3.3.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-static-1.35.0-150400.3.3.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-static-1.35.0-150400.3.3.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-static-1.35.0-150400.3.3.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-static-1.35.0-150400.3.3.1.x86_64", "openSUSE Leap 15.4:busybox-1.35.0-150400.3.3.1.aarch64", "openSUSE Leap 15.4:busybox-1.35.0-150400.3.3.1.ppc64le", "openSUSE Leap 15.4:busybox-1.35.0-150400.3.3.1.s390x", "openSUSE Leap 15.4:busybox-1.35.0-150400.3.3.1.x86_64", "openSUSE Leap 15.4:busybox-static-1.35.0-150400.3.3.1.aarch64", "openSUSE Leap 15.4:busybox-static-1.35.0-150400.3.3.1.ppc64le", "openSUSE Leap 15.4:busybox-static-1.35.0-150400.3.3.1.s390x", "openSUSE Leap 15.4:busybox-static-1.35.0-150400.3.3.1.x86_64", "openSUSE Leap 15.4:busybox-testsuite-1.35.0-150400.3.3.1.aarch64", "openSUSE Leap 15.4:busybox-testsuite-1.35.0-150400.3.3.1.ppc64le", "openSUSE Leap 15.4:busybox-testsuite-1.35.0-150400.3.3.1.s390x", "openSUSE Leap 15.4:busybox-testsuite-1.35.0-150400.3.3.1.x86_64", "openSUSE Leap 15.4:busybox-warewulf3-1.35.0-150400.3.3.1.aarch64", "openSUSE Leap 15.4:busybox-warewulf3-1.35.0-150400.3.3.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2022-11-11T14:38:22Z", details: "low", }, ], title: "CVE-2017-15874", }, { cve: "CVE-2017-16544", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2017-16544", }, ], notes: [ { category: "general", text: "In the add_match function in libbb/lineedit.c in BusyBox through 1.27.2, the tab autocomplete feature of the shell, used to get a list of filenames in a directory, does not sanitize filenames and results in executing any escape sequence in the terminal. This could potentially result in code execution, arbitrary file writes, or other attacks.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-1.35.0-150400.3.3.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-1.35.0-150400.3.3.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-1.35.0-150400.3.3.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-1.35.0-150400.3.3.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-static-1.35.0-150400.3.3.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-static-1.35.0-150400.3.3.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-static-1.35.0-150400.3.3.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-static-1.35.0-150400.3.3.1.x86_64", "openSUSE Leap 15.4:busybox-1.35.0-150400.3.3.1.aarch64", "openSUSE Leap 15.4:busybox-1.35.0-150400.3.3.1.ppc64le", "openSUSE Leap 15.4:busybox-1.35.0-150400.3.3.1.s390x", "openSUSE Leap 15.4:busybox-1.35.0-150400.3.3.1.x86_64", "openSUSE Leap 15.4:busybox-static-1.35.0-150400.3.3.1.aarch64", "openSUSE Leap 15.4:busybox-static-1.35.0-150400.3.3.1.ppc64le", "openSUSE Leap 15.4:busybox-static-1.35.0-150400.3.3.1.s390x", "openSUSE Leap 15.4:busybox-static-1.35.0-150400.3.3.1.x86_64", "openSUSE Leap 15.4:busybox-testsuite-1.35.0-150400.3.3.1.aarch64", "openSUSE Leap 15.4:busybox-testsuite-1.35.0-150400.3.3.1.ppc64le", "openSUSE Leap 15.4:busybox-testsuite-1.35.0-150400.3.3.1.s390x", "openSUSE Leap 15.4:busybox-testsuite-1.35.0-150400.3.3.1.x86_64", "openSUSE Leap 15.4:busybox-warewulf3-1.35.0-150400.3.3.1.aarch64", "openSUSE Leap 15.4:busybox-warewulf3-1.35.0-150400.3.3.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2017-16544", url: "https://www.suse.com/security/cve/CVE-2017-16544", }, { category: "external", summary: "SUSE Bug 1069412 for CVE-2017-16544", url: "https://bugzilla.suse.com/1069412", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-1.35.0-150400.3.3.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-1.35.0-150400.3.3.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-1.35.0-150400.3.3.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-1.35.0-150400.3.3.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-static-1.35.0-150400.3.3.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-static-1.35.0-150400.3.3.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-static-1.35.0-150400.3.3.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-static-1.35.0-150400.3.3.1.x86_64", "openSUSE Leap 15.4:busybox-1.35.0-150400.3.3.1.aarch64", "openSUSE Leap 15.4:busybox-1.35.0-150400.3.3.1.ppc64le", "openSUSE Leap 15.4:busybox-1.35.0-150400.3.3.1.s390x", "openSUSE Leap 15.4:busybox-1.35.0-150400.3.3.1.x86_64", "openSUSE Leap 15.4:busybox-static-1.35.0-150400.3.3.1.aarch64", "openSUSE Leap 15.4:busybox-static-1.35.0-150400.3.3.1.ppc64le", "openSUSE Leap 15.4:busybox-static-1.35.0-150400.3.3.1.s390x", "openSUSE Leap 15.4:busybox-static-1.35.0-150400.3.3.1.x86_64", "openSUSE Leap 15.4:busybox-testsuite-1.35.0-150400.3.3.1.aarch64", "openSUSE Leap 15.4:busybox-testsuite-1.35.0-150400.3.3.1.ppc64le", "openSUSE Leap 15.4:busybox-testsuite-1.35.0-150400.3.3.1.s390x", "openSUSE Leap 15.4:busybox-testsuite-1.35.0-150400.3.3.1.x86_64", "openSUSE Leap 15.4:busybox-warewulf3-1.35.0-150400.3.3.1.aarch64", "openSUSE Leap 15.4:busybox-warewulf3-1.35.0-150400.3.3.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 7.8, baseSeverity: "HIGH", vectorString: "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", version: "3.0", }, products: [ "SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-1.35.0-150400.3.3.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-1.35.0-150400.3.3.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-1.35.0-150400.3.3.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-1.35.0-150400.3.3.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-static-1.35.0-150400.3.3.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-static-1.35.0-150400.3.3.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-static-1.35.0-150400.3.3.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-static-1.35.0-150400.3.3.1.x86_64", "openSUSE Leap 15.4:busybox-1.35.0-150400.3.3.1.aarch64", "openSUSE Leap 15.4:busybox-1.35.0-150400.3.3.1.ppc64le", "openSUSE Leap 15.4:busybox-1.35.0-150400.3.3.1.s390x", "openSUSE Leap 15.4:busybox-1.35.0-150400.3.3.1.x86_64", "openSUSE Leap 15.4:busybox-static-1.35.0-150400.3.3.1.aarch64", "openSUSE Leap 15.4:busybox-static-1.35.0-150400.3.3.1.ppc64le", "openSUSE Leap 15.4:busybox-static-1.35.0-150400.3.3.1.s390x", "openSUSE Leap 15.4:busybox-static-1.35.0-150400.3.3.1.x86_64", "openSUSE Leap 15.4:busybox-testsuite-1.35.0-150400.3.3.1.aarch64", "openSUSE Leap 15.4:busybox-testsuite-1.35.0-150400.3.3.1.ppc64le", "openSUSE Leap 15.4:busybox-testsuite-1.35.0-150400.3.3.1.s390x", "openSUSE Leap 15.4:busybox-testsuite-1.35.0-150400.3.3.1.x86_64", "openSUSE Leap 15.4:busybox-warewulf3-1.35.0-150400.3.3.1.aarch64", "openSUSE Leap 15.4:busybox-warewulf3-1.35.0-150400.3.3.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2022-11-11T14:38:22Z", details: "important", }, ], title: "CVE-2017-16544", }, { cve: "CVE-2018-1000500", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2018-1000500", }, ], notes: [ { category: "general", text: "Busybox contains a Missing SSL certificate validation vulnerability in The \"busybox wget\" applet that can result in arbitrary code execution. This attack appear to be exploitable via Simply download any file over HTTPS using \"busybox wget https://compromised-domain.com/important-file\".", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-1.35.0-150400.3.3.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-1.35.0-150400.3.3.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-1.35.0-150400.3.3.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-1.35.0-150400.3.3.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-static-1.35.0-150400.3.3.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-static-1.35.0-150400.3.3.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-static-1.35.0-150400.3.3.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-static-1.35.0-150400.3.3.1.x86_64", "openSUSE Leap 15.4:busybox-1.35.0-150400.3.3.1.aarch64", "openSUSE Leap 15.4:busybox-1.35.0-150400.3.3.1.ppc64le", "openSUSE Leap 15.4:busybox-1.35.0-150400.3.3.1.s390x", "openSUSE Leap 15.4:busybox-1.35.0-150400.3.3.1.x86_64", "openSUSE Leap 15.4:busybox-static-1.35.0-150400.3.3.1.aarch64", "openSUSE Leap 15.4:busybox-static-1.35.0-150400.3.3.1.ppc64le", "openSUSE Leap 15.4:busybox-static-1.35.0-150400.3.3.1.s390x", "openSUSE Leap 15.4:busybox-static-1.35.0-150400.3.3.1.x86_64", "openSUSE Leap 15.4:busybox-testsuite-1.35.0-150400.3.3.1.aarch64", "openSUSE Leap 15.4:busybox-testsuite-1.35.0-150400.3.3.1.ppc64le", "openSUSE Leap 15.4:busybox-testsuite-1.35.0-150400.3.3.1.s390x", "openSUSE Leap 15.4:busybox-testsuite-1.35.0-150400.3.3.1.x86_64", "openSUSE Leap 15.4:busybox-warewulf3-1.35.0-150400.3.3.1.aarch64", "openSUSE Leap 15.4:busybox-warewulf3-1.35.0-150400.3.3.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2018-1000500", url: "https://www.suse.com/security/cve/CVE-2018-1000500", }, { category: "external", summary: "SUSE Bug 1099263 for CVE-2018-1000500", url: "https://bugzilla.suse.com/1099263", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-1.35.0-150400.3.3.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-1.35.0-150400.3.3.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-1.35.0-150400.3.3.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-1.35.0-150400.3.3.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-static-1.35.0-150400.3.3.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-static-1.35.0-150400.3.3.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-static-1.35.0-150400.3.3.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-static-1.35.0-150400.3.3.1.x86_64", "openSUSE Leap 15.4:busybox-1.35.0-150400.3.3.1.aarch64", "openSUSE Leap 15.4:busybox-1.35.0-150400.3.3.1.ppc64le", "openSUSE Leap 15.4:busybox-1.35.0-150400.3.3.1.s390x", "openSUSE Leap 15.4:busybox-1.35.0-150400.3.3.1.x86_64", "openSUSE Leap 15.4:busybox-static-1.35.0-150400.3.3.1.aarch64", "openSUSE Leap 15.4:busybox-static-1.35.0-150400.3.3.1.ppc64le", "openSUSE Leap 15.4:busybox-static-1.35.0-150400.3.3.1.s390x", "openSUSE Leap 15.4:busybox-static-1.35.0-150400.3.3.1.x86_64", "openSUSE Leap 15.4:busybox-testsuite-1.35.0-150400.3.3.1.aarch64", "openSUSE Leap 15.4:busybox-testsuite-1.35.0-150400.3.3.1.ppc64le", "openSUSE Leap 15.4:busybox-testsuite-1.35.0-150400.3.3.1.s390x", "openSUSE Leap 15.4:busybox-testsuite-1.35.0-150400.3.3.1.x86_64", "openSUSE Leap 15.4:busybox-warewulf3-1.35.0-150400.3.3.1.aarch64", "openSUSE Leap 15.4:busybox-warewulf3-1.35.0-150400.3.3.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 7.5, baseSeverity: "HIGH", vectorString: "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N", version: "3.0", }, products: [ "SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-1.35.0-150400.3.3.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-1.35.0-150400.3.3.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-1.35.0-150400.3.3.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-1.35.0-150400.3.3.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-static-1.35.0-150400.3.3.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-static-1.35.0-150400.3.3.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-static-1.35.0-150400.3.3.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-static-1.35.0-150400.3.3.1.x86_64", "openSUSE Leap 15.4:busybox-1.35.0-150400.3.3.1.aarch64", "openSUSE Leap 15.4:busybox-1.35.0-150400.3.3.1.ppc64le", "openSUSE Leap 15.4:busybox-1.35.0-150400.3.3.1.s390x", "openSUSE Leap 15.4:busybox-1.35.0-150400.3.3.1.x86_64", "openSUSE Leap 15.4:busybox-static-1.35.0-150400.3.3.1.aarch64", "openSUSE Leap 15.4:busybox-static-1.35.0-150400.3.3.1.ppc64le", "openSUSE Leap 15.4:busybox-static-1.35.0-150400.3.3.1.s390x", "openSUSE Leap 15.4:busybox-static-1.35.0-150400.3.3.1.x86_64", "openSUSE Leap 15.4:busybox-testsuite-1.35.0-150400.3.3.1.aarch64", "openSUSE Leap 15.4:busybox-testsuite-1.35.0-150400.3.3.1.ppc64le", "openSUSE Leap 15.4:busybox-testsuite-1.35.0-150400.3.3.1.s390x", "openSUSE Leap 15.4:busybox-testsuite-1.35.0-150400.3.3.1.x86_64", "openSUSE Leap 15.4:busybox-warewulf3-1.35.0-150400.3.3.1.aarch64", "openSUSE Leap 15.4:busybox-warewulf3-1.35.0-150400.3.3.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2022-11-11T14:38:22Z", details: "important", }, ], title: "CVE-2018-1000500", }, { cve: "CVE-2018-1000517", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2018-1000517", }, ], notes: [ { category: "general", text: "BusyBox project BusyBox wget version prior to commit 8e2174e9bd836e53c8b9c6e00d1bc6e2a718686e contains a Buffer Overflow vulnerability in Busybox wget that can result in heap buffer overflow. This attack appear to be exploitable via network connectivity. This vulnerability appears to have been fixed in after commit 8e2174e9bd836e53c8b9c6e00d1bc6e2a718686e.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-1.35.0-150400.3.3.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-1.35.0-150400.3.3.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-1.35.0-150400.3.3.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-1.35.0-150400.3.3.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-static-1.35.0-150400.3.3.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-static-1.35.0-150400.3.3.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-static-1.35.0-150400.3.3.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-static-1.35.0-150400.3.3.1.x86_64", "openSUSE Leap 15.4:busybox-1.35.0-150400.3.3.1.aarch64", "openSUSE Leap 15.4:busybox-1.35.0-150400.3.3.1.ppc64le", "openSUSE Leap 15.4:busybox-1.35.0-150400.3.3.1.s390x", "openSUSE Leap 15.4:busybox-1.35.0-150400.3.3.1.x86_64", "openSUSE Leap 15.4:busybox-static-1.35.0-150400.3.3.1.aarch64", "openSUSE Leap 15.4:busybox-static-1.35.0-150400.3.3.1.ppc64le", "openSUSE Leap 15.4:busybox-static-1.35.0-150400.3.3.1.s390x", "openSUSE Leap 15.4:busybox-static-1.35.0-150400.3.3.1.x86_64", "openSUSE Leap 15.4:busybox-testsuite-1.35.0-150400.3.3.1.aarch64", "openSUSE Leap 15.4:busybox-testsuite-1.35.0-150400.3.3.1.ppc64le", "openSUSE Leap 15.4:busybox-testsuite-1.35.0-150400.3.3.1.s390x", "openSUSE Leap 15.4:busybox-testsuite-1.35.0-150400.3.3.1.x86_64", "openSUSE Leap 15.4:busybox-warewulf3-1.35.0-150400.3.3.1.aarch64", "openSUSE Leap 15.4:busybox-warewulf3-1.35.0-150400.3.3.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2018-1000517", url: "https://www.suse.com/security/cve/CVE-2018-1000517", }, { category: "external", summary: "SUSE Bug 1099260 for CVE-2018-1000517", url: "https://bugzilla.suse.com/1099260", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-1.35.0-150400.3.3.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-1.35.0-150400.3.3.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-1.35.0-150400.3.3.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-1.35.0-150400.3.3.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-static-1.35.0-150400.3.3.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-static-1.35.0-150400.3.3.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-static-1.35.0-150400.3.3.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-static-1.35.0-150400.3.3.1.x86_64", "openSUSE Leap 15.4:busybox-1.35.0-150400.3.3.1.aarch64", "openSUSE Leap 15.4:busybox-1.35.0-150400.3.3.1.ppc64le", "openSUSE Leap 15.4:busybox-1.35.0-150400.3.3.1.s390x", "openSUSE Leap 15.4:busybox-1.35.0-150400.3.3.1.x86_64", "openSUSE Leap 15.4:busybox-static-1.35.0-150400.3.3.1.aarch64", "openSUSE Leap 15.4:busybox-static-1.35.0-150400.3.3.1.ppc64le", "openSUSE Leap 15.4:busybox-static-1.35.0-150400.3.3.1.s390x", "openSUSE Leap 15.4:busybox-static-1.35.0-150400.3.3.1.x86_64", "openSUSE Leap 15.4:busybox-testsuite-1.35.0-150400.3.3.1.aarch64", "openSUSE Leap 15.4:busybox-testsuite-1.35.0-150400.3.3.1.ppc64le", "openSUSE Leap 15.4:busybox-testsuite-1.35.0-150400.3.3.1.s390x", "openSUSE Leap 15.4:busybox-testsuite-1.35.0-150400.3.3.1.x86_64", "openSUSE Leap 15.4:busybox-warewulf3-1.35.0-150400.3.3.1.aarch64", "openSUSE Leap 15.4:busybox-warewulf3-1.35.0-150400.3.3.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.6, baseSeverity: "MEDIUM", vectorString: "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L", version: "3.0", }, products: [ "SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-1.35.0-150400.3.3.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-1.35.0-150400.3.3.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-1.35.0-150400.3.3.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-1.35.0-150400.3.3.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-static-1.35.0-150400.3.3.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-static-1.35.0-150400.3.3.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-static-1.35.0-150400.3.3.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-static-1.35.0-150400.3.3.1.x86_64", "openSUSE Leap 15.4:busybox-1.35.0-150400.3.3.1.aarch64", "openSUSE Leap 15.4:busybox-1.35.0-150400.3.3.1.ppc64le", "openSUSE Leap 15.4:busybox-1.35.0-150400.3.3.1.s390x", "openSUSE Leap 15.4:busybox-1.35.0-150400.3.3.1.x86_64", "openSUSE Leap 15.4:busybox-static-1.35.0-150400.3.3.1.aarch64", "openSUSE Leap 15.4:busybox-static-1.35.0-150400.3.3.1.ppc64le", "openSUSE Leap 15.4:busybox-static-1.35.0-150400.3.3.1.s390x", "openSUSE Leap 15.4:busybox-static-1.35.0-150400.3.3.1.x86_64", "openSUSE Leap 15.4:busybox-testsuite-1.35.0-150400.3.3.1.aarch64", "openSUSE Leap 15.4:busybox-testsuite-1.35.0-150400.3.3.1.ppc64le", "openSUSE Leap 15.4:busybox-testsuite-1.35.0-150400.3.3.1.s390x", "openSUSE Leap 15.4:busybox-testsuite-1.35.0-150400.3.3.1.x86_64", "openSUSE Leap 15.4:busybox-warewulf3-1.35.0-150400.3.3.1.aarch64", "openSUSE Leap 15.4:busybox-warewulf3-1.35.0-150400.3.3.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2022-11-11T14:38:22Z", details: "important", }, ], title: "CVE-2018-1000517", }, { cve: "CVE-2018-20679", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2018-20679", }, ], notes: [ { category: "general", text: "An issue was discovered in BusyBox before 1.30.0. An out of bounds read in udhcp components (consumed by the DHCP server, client, and relay) allows a remote attacker to leak sensitive information from the stack by sending a crafted DHCP message. This is related to verification in udhcp_get_option() in networking/udhcp/common.c that 4-byte options are indeed 4 bytes.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-1.35.0-150400.3.3.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-1.35.0-150400.3.3.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-1.35.0-150400.3.3.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-1.35.0-150400.3.3.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-static-1.35.0-150400.3.3.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-static-1.35.0-150400.3.3.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-static-1.35.0-150400.3.3.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-static-1.35.0-150400.3.3.1.x86_64", "openSUSE Leap 15.4:busybox-1.35.0-150400.3.3.1.aarch64", "openSUSE Leap 15.4:busybox-1.35.0-150400.3.3.1.ppc64le", "openSUSE Leap 15.4:busybox-1.35.0-150400.3.3.1.s390x", "openSUSE Leap 15.4:busybox-1.35.0-150400.3.3.1.x86_64", "openSUSE Leap 15.4:busybox-static-1.35.0-150400.3.3.1.aarch64", "openSUSE Leap 15.4:busybox-static-1.35.0-150400.3.3.1.ppc64le", "openSUSE Leap 15.4:busybox-static-1.35.0-150400.3.3.1.s390x", "openSUSE Leap 15.4:busybox-static-1.35.0-150400.3.3.1.x86_64", "openSUSE Leap 15.4:busybox-testsuite-1.35.0-150400.3.3.1.aarch64", "openSUSE Leap 15.4:busybox-testsuite-1.35.0-150400.3.3.1.ppc64le", "openSUSE Leap 15.4:busybox-testsuite-1.35.0-150400.3.3.1.s390x", "openSUSE Leap 15.4:busybox-testsuite-1.35.0-150400.3.3.1.x86_64", "openSUSE Leap 15.4:busybox-warewulf3-1.35.0-150400.3.3.1.aarch64", "openSUSE Leap 15.4:busybox-warewulf3-1.35.0-150400.3.3.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2018-20679", url: "https://www.suse.com/security/cve/CVE-2018-20679", }, { category: "external", summary: "SUSE Bug 1121426 for CVE-2018-20679", url: "https://bugzilla.suse.com/1121426", }, { category: "external", summary: "SUSE Bug 1121428 for CVE-2018-20679", url: "https://bugzilla.suse.com/1121428", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-1.35.0-150400.3.3.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-1.35.0-150400.3.3.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-1.35.0-150400.3.3.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-1.35.0-150400.3.3.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-static-1.35.0-150400.3.3.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-static-1.35.0-150400.3.3.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-static-1.35.0-150400.3.3.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-static-1.35.0-150400.3.3.1.x86_64", "openSUSE Leap 15.4:busybox-1.35.0-150400.3.3.1.aarch64", "openSUSE Leap 15.4:busybox-1.35.0-150400.3.3.1.ppc64le", "openSUSE Leap 15.4:busybox-1.35.0-150400.3.3.1.s390x", "openSUSE Leap 15.4:busybox-1.35.0-150400.3.3.1.x86_64", "openSUSE Leap 15.4:busybox-static-1.35.0-150400.3.3.1.aarch64", "openSUSE Leap 15.4:busybox-static-1.35.0-150400.3.3.1.ppc64le", "openSUSE Leap 15.4:busybox-static-1.35.0-150400.3.3.1.s390x", "openSUSE Leap 15.4:busybox-static-1.35.0-150400.3.3.1.x86_64", "openSUSE Leap 15.4:busybox-testsuite-1.35.0-150400.3.3.1.aarch64", "openSUSE Leap 15.4:busybox-testsuite-1.35.0-150400.3.3.1.ppc64le", "openSUSE Leap 15.4:busybox-testsuite-1.35.0-150400.3.3.1.s390x", "openSUSE Leap 15.4:busybox-testsuite-1.35.0-150400.3.3.1.x86_64", "openSUSE Leap 15.4:busybox-warewulf3-1.35.0-150400.3.3.1.aarch64", "openSUSE Leap 15.4:busybox-warewulf3-1.35.0-150400.3.3.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.3, baseSeverity: "MEDIUM", vectorString: "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N", version: "3.0", }, products: [ "SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-1.35.0-150400.3.3.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-1.35.0-150400.3.3.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-1.35.0-150400.3.3.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-1.35.0-150400.3.3.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-static-1.35.0-150400.3.3.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-static-1.35.0-150400.3.3.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-static-1.35.0-150400.3.3.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-static-1.35.0-150400.3.3.1.x86_64", "openSUSE Leap 15.4:busybox-1.35.0-150400.3.3.1.aarch64", "openSUSE Leap 15.4:busybox-1.35.0-150400.3.3.1.ppc64le", "openSUSE Leap 15.4:busybox-1.35.0-150400.3.3.1.s390x", "openSUSE Leap 15.4:busybox-1.35.0-150400.3.3.1.x86_64", "openSUSE Leap 15.4:busybox-static-1.35.0-150400.3.3.1.aarch64", "openSUSE Leap 15.4:busybox-static-1.35.0-150400.3.3.1.ppc64le", "openSUSE Leap 15.4:busybox-static-1.35.0-150400.3.3.1.s390x", "openSUSE Leap 15.4:busybox-static-1.35.0-150400.3.3.1.x86_64", "openSUSE Leap 15.4:busybox-testsuite-1.35.0-150400.3.3.1.aarch64", "openSUSE Leap 15.4:busybox-testsuite-1.35.0-150400.3.3.1.ppc64le", "openSUSE Leap 15.4:busybox-testsuite-1.35.0-150400.3.3.1.s390x", "openSUSE Leap 15.4:busybox-testsuite-1.35.0-150400.3.3.1.x86_64", "openSUSE Leap 15.4:busybox-warewulf3-1.35.0-150400.3.3.1.aarch64", "openSUSE Leap 15.4:busybox-warewulf3-1.35.0-150400.3.3.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2022-11-11T14:38:22Z", details: "moderate", }, ], title: "CVE-2018-20679", }, { cve: "CVE-2019-5747", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2019-5747", }, ], notes: [ { category: "general", text: "An issue was discovered in BusyBox through 1.30.0. An out of bounds read in udhcp components (consumed by the DHCP client, server, and/or relay) might allow a remote attacker to leak sensitive information from the stack by sending a crafted DHCP message. This is related to assurance of a 4-byte length when decoding DHCP_SUBNET. NOTE: this issue exists because of an incomplete fix for CVE-2018-20679.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-1.35.0-150400.3.3.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-1.35.0-150400.3.3.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-1.35.0-150400.3.3.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-1.35.0-150400.3.3.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-static-1.35.0-150400.3.3.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-static-1.35.0-150400.3.3.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-static-1.35.0-150400.3.3.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-static-1.35.0-150400.3.3.1.x86_64", "openSUSE Leap 15.4:busybox-1.35.0-150400.3.3.1.aarch64", "openSUSE Leap 15.4:busybox-1.35.0-150400.3.3.1.ppc64le", "openSUSE Leap 15.4:busybox-1.35.0-150400.3.3.1.s390x", "openSUSE Leap 15.4:busybox-1.35.0-150400.3.3.1.x86_64", "openSUSE Leap 15.4:busybox-static-1.35.0-150400.3.3.1.aarch64", "openSUSE Leap 15.4:busybox-static-1.35.0-150400.3.3.1.ppc64le", "openSUSE Leap 15.4:busybox-static-1.35.0-150400.3.3.1.s390x", "openSUSE Leap 15.4:busybox-static-1.35.0-150400.3.3.1.x86_64", "openSUSE Leap 15.4:busybox-testsuite-1.35.0-150400.3.3.1.aarch64", "openSUSE Leap 15.4:busybox-testsuite-1.35.0-150400.3.3.1.ppc64le", "openSUSE Leap 15.4:busybox-testsuite-1.35.0-150400.3.3.1.s390x", "openSUSE Leap 15.4:busybox-testsuite-1.35.0-150400.3.3.1.x86_64", "openSUSE Leap 15.4:busybox-warewulf3-1.35.0-150400.3.3.1.aarch64", "openSUSE Leap 15.4:busybox-warewulf3-1.35.0-150400.3.3.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2019-5747", url: "https://www.suse.com/security/cve/CVE-2019-5747", }, { category: "external", summary: "SUSE Bug 1121426 for CVE-2019-5747", url: "https://bugzilla.suse.com/1121426", }, { category: "external", summary: "SUSE Bug 1121428 for CVE-2019-5747", url: "https://bugzilla.suse.com/1121428", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-1.35.0-150400.3.3.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-1.35.0-150400.3.3.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-1.35.0-150400.3.3.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-1.35.0-150400.3.3.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-static-1.35.0-150400.3.3.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-static-1.35.0-150400.3.3.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-static-1.35.0-150400.3.3.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-static-1.35.0-150400.3.3.1.x86_64", "openSUSE Leap 15.4:busybox-1.35.0-150400.3.3.1.aarch64", "openSUSE Leap 15.4:busybox-1.35.0-150400.3.3.1.ppc64le", "openSUSE Leap 15.4:busybox-1.35.0-150400.3.3.1.s390x", "openSUSE Leap 15.4:busybox-1.35.0-150400.3.3.1.x86_64", "openSUSE Leap 15.4:busybox-static-1.35.0-150400.3.3.1.aarch64", "openSUSE Leap 15.4:busybox-static-1.35.0-150400.3.3.1.ppc64le", "openSUSE Leap 15.4:busybox-static-1.35.0-150400.3.3.1.s390x", "openSUSE Leap 15.4:busybox-static-1.35.0-150400.3.3.1.x86_64", "openSUSE Leap 15.4:busybox-testsuite-1.35.0-150400.3.3.1.aarch64", "openSUSE Leap 15.4:busybox-testsuite-1.35.0-150400.3.3.1.ppc64le", "openSUSE Leap 15.4:busybox-testsuite-1.35.0-150400.3.3.1.s390x", "openSUSE Leap 15.4:busybox-testsuite-1.35.0-150400.3.3.1.x86_64", "openSUSE Leap 15.4:busybox-warewulf3-1.35.0-150400.3.3.1.aarch64", "openSUSE Leap 15.4:busybox-warewulf3-1.35.0-150400.3.3.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 3.5, baseSeverity: "LOW", vectorString: "CVSS:3.1/AV:A/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N", version: "3.1", }, products: [ "SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-1.35.0-150400.3.3.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-1.35.0-150400.3.3.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-1.35.0-150400.3.3.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-1.35.0-150400.3.3.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-static-1.35.0-150400.3.3.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-static-1.35.0-150400.3.3.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-static-1.35.0-150400.3.3.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-static-1.35.0-150400.3.3.1.x86_64", "openSUSE Leap 15.4:busybox-1.35.0-150400.3.3.1.aarch64", "openSUSE Leap 15.4:busybox-1.35.0-150400.3.3.1.ppc64le", "openSUSE Leap 15.4:busybox-1.35.0-150400.3.3.1.s390x", "openSUSE Leap 15.4:busybox-1.35.0-150400.3.3.1.x86_64", "openSUSE Leap 15.4:busybox-static-1.35.0-150400.3.3.1.aarch64", "openSUSE Leap 15.4:busybox-static-1.35.0-150400.3.3.1.ppc64le", "openSUSE Leap 15.4:busybox-static-1.35.0-150400.3.3.1.s390x", "openSUSE Leap 15.4:busybox-static-1.35.0-150400.3.3.1.x86_64", "openSUSE Leap 15.4:busybox-testsuite-1.35.0-150400.3.3.1.aarch64", "openSUSE Leap 15.4:busybox-testsuite-1.35.0-150400.3.3.1.ppc64le", "openSUSE Leap 15.4:busybox-testsuite-1.35.0-150400.3.3.1.s390x", "openSUSE Leap 15.4:busybox-testsuite-1.35.0-150400.3.3.1.x86_64", "openSUSE Leap 15.4:busybox-warewulf3-1.35.0-150400.3.3.1.aarch64", "openSUSE Leap 15.4:busybox-warewulf3-1.35.0-150400.3.3.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2022-11-11T14:38:22Z", details: "low", }, ], title: "CVE-2019-5747", }, { cve: "CVE-2021-28831", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2021-28831", }, ], notes: [ { category: "general", text: "decompress_gunzip.c in BusyBox through 1.32.1 mishandles the error bit on the huft_build result pointer, with a resultant invalid free or segmentation fault, via malformed gzip data.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-1.35.0-150400.3.3.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-1.35.0-150400.3.3.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-1.35.0-150400.3.3.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-1.35.0-150400.3.3.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-static-1.35.0-150400.3.3.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-static-1.35.0-150400.3.3.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-static-1.35.0-150400.3.3.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-static-1.35.0-150400.3.3.1.x86_64", "openSUSE Leap 15.4:busybox-1.35.0-150400.3.3.1.aarch64", "openSUSE Leap 15.4:busybox-1.35.0-150400.3.3.1.ppc64le", "openSUSE Leap 15.4:busybox-1.35.0-150400.3.3.1.s390x", "openSUSE Leap 15.4:busybox-1.35.0-150400.3.3.1.x86_64", "openSUSE Leap 15.4:busybox-static-1.35.0-150400.3.3.1.aarch64", "openSUSE Leap 15.4:busybox-static-1.35.0-150400.3.3.1.ppc64le", "openSUSE Leap 15.4:busybox-static-1.35.0-150400.3.3.1.s390x", "openSUSE Leap 15.4:busybox-static-1.35.0-150400.3.3.1.x86_64", "openSUSE Leap 15.4:busybox-testsuite-1.35.0-150400.3.3.1.aarch64", "openSUSE Leap 15.4:busybox-testsuite-1.35.0-150400.3.3.1.ppc64le", "openSUSE Leap 15.4:busybox-testsuite-1.35.0-150400.3.3.1.s390x", "openSUSE Leap 15.4:busybox-testsuite-1.35.0-150400.3.3.1.x86_64", "openSUSE Leap 15.4:busybox-warewulf3-1.35.0-150400.3.3.1.aarch64", "openSUSE Leap 15.4:busybox-warewulf3-1.35.0-150400.3.3.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2021-28831", url: "https://www.suse.com/security/cve/CVE-2021-28831", }, { category: "external", summary: "SUSE Bug 1184522 for CVE-2021-28831", url: "https://bugzilla.suse.com/1184522", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-1.35.0-150400.3.3.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-1.35.0-150400.3.3.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-1.35.0-150400.3.3.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-1.35.0-150400.3.3.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-static-1.35.0-150400.3.3.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-static-1.35.0-150400.3.3.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-static-1.35.0-150400.3.3.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-static-1.35.0-150400.3.3.1.x86_64", "openSUSE Leap 15.4:busybox-1.35.0-150400.3.3.1.aarch64", "openSUSE Leap 15.4:busybox-1.35.0-150400.3.3.1.ppc64le", "openSUSE Leap 15.4:busybox-1.35.0-150400.3.3.1.s390x", "openSUSE Leap 15.4:busybox-1.35.0-150400.3.3.1.x86_64", "openSUSE Leap 15.4:busybox-static-1.35.0-150400.3.3.1.aarch64", "openSUSE Leap 15.4:busybox-static-1.35.0-150400.3.3.1.ppc64le", "openSUSE Leap 15.4:busybox-static-1.35.0-150400.3.3.1.s390x", "openSUSE Leap 15.4:busybox-static-1.35.0-150400.3.3.1.x86_64", "openSUSE Leap 15.4:busybox-testsuite-1.35.0-150400.3.3.1.aarch64", "openSUSE Leap 15.4:busybox-testsuite-1.35.0-150400.3.3.1.ppc64le", "openSUSE Leap 15.4:busybox-testsuite-1.35.0-150400.3.3.1.s390x", "openSUSE Leap 15.4:busybox-testsuite-1.35.0-150400.3.3.1.x86_64", "openSUSE Leap 15.4:busybox-warewulf3-1.35.0-150400.3.3.1.aarch64", "openSUSE Leap 15.4:busybox-warewulf3-1.35.0-150400.3.3.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 7.5, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-1.35.0-150400.3.3.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-1.35.0-150400.3.3.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-1.35.0-150400.3.3.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-1.35.0-150400.3.3.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-static-1.35.0-150400.3.3.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-static-1.35.0-150400.3.3.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-static-1.35.0-150400.3.3.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-static-1.35.0-150400.3.3.1.x86_64", "openSUSE Leap 15.4:busybox-1.35.0-150400.3.3.1.aarch64", "openSUSE Leap 15.4:busybox-1.35.0-150400.3.3.1.ppc64le", "openSUSE Leap 15.4:busybox-1.35.0-150400.3.3.1.s390x", "openSUSE Leap 15.4:busybox-1.35.0-150400.3.3.1.x86_64", "openSUSE Leap 15.4:busybox-static-1.35.0-150400.3.3.1.aarch64", "openSUSE Leap 15.4:busybox-static-1.35.0-150400.3.3.1.ppc64le", "openSUSE Leap 15.4:busybox-static-1.35.0-150400.3.3.1.s390x", "openSUSE Leap 15.4:busybox-static-1.35.0-150400.3.3.1.x86_64", "openSUSE Leap 15.4:busybox-testsuite-1.35.0-150400.3.3.1.aarch64", "openSUSE Leap 15.4:busybox-testsuite-1.35.0-150400.3.3.1.ppc64le", "openSUSE Leap 15.4:busybox-testsuite-1.35.0-150400.3.3.1.s390x", "openSUSE Leap 15.4:busybox-testsuite-1.35.0-150400.3.3.1.x86_64", "openSUSE Leap 15.4:busybox-warewulf3-1.35.0-150400.3.3.1.aarch64", "openSUSE Leap 15.4:busybox-warewulf3-1.35.0-150400.3.3.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2022-11-11T14:38:22Z", details: "important", }, ], title: "CVE-2021-28831", }, { cve: "CVE-2021-42373", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2021-42373", }, ], notes: [ { category: "general", text: "A NULL pointer dereference in Busybox's man applet leads to denial of service when a section name is supplied but no page argument is given", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-1.35.0-150400.3.3.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-1.35.0-150400.3.3.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-1.35.0-150400.3.3.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-1.35.0-150400.3.3.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-static-1.35.0-150400.3.3.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-static-1.35.0-150400.3.3.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-static-1.35.0-150400.3.3.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-static-1.35.0-150400.3.3.1.x86_64", "openSUSE Leap 15.4:busybox-1.35.0-150400.3.3.1.aarch64", "openSUSE Leap 15.4:busybox-1.35.0-150400.3.3.1.ppc64le", "openSUSE Leap 15.4:busybox-1.35.0-150400.3.3.1.s390x", "openSUSE Leap 15.4:busybox-1.35.0-150400.3.3.1.x86_64", "openSUSE Leap 15.4:busybox-static-1.35.0-150400.3.3.1.aarch64", "openSUSE Leap 15.4:busybox-static-1.35.0-150400.3.3.1.ppc64le", "openSUSE Leap 15.4:busybox-static-1.35.0-150400.3.3.1.s390x", "openSUSE Leap 15.4:busybox-static-1.35.0-150400.3.3.1.x86_64", "openSUSE Leap 15.4:busybox-testsuite-1.35.0-150400.3.3.1.aarch64", "openSUSE Leap 15.4:busybox-testsuite-1.35.0-150400.3.3.1.ppc64le", "openSUSE Leap 15.4:busybox-testsuite-1.35.0-150400.3.3.1.s390x", "openSUSE Leap 15.4:busybox-testsuite-1.35.0-150400.3.3.1.x86_64", "openSUSE Leap 15.4:busybox-warewulf3-1.35.0-150400.3.3.1.aarch64", "openSUSE Leap 15.4:busybox-warewulf3-1.35.0-150400.3.3.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2021-42373", url: "https://www.suse.com/security/cve/CVE-2021-42373", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-1.35.0-150400.3.3.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-1.35.0-150400.3.3.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-1.35.0-150400.3.3.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-1.35.0-150400.3.3.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-static-1.35.0-150400.3.3.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-static-1.35.0-150400.3.3.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-static-1.35.0-150400.3.3.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-static-1.35.0-150400.3.3.1.x86_64", "openSUSE Leap 15.4:busybox-1.35.0-150400.3.3.1.aarch64", "openSUSE Leap 15.4:busybox-1.35.0-150400.3.3.1.ppc64le", "openSUSE Leap 15.4:busybox-1.35.0-150400.3.3.1.s390x", "openSUSE Leap 15.4:busybox-1.35.0-150400.3.3.1.x86_64", "openSUSE Leap 15.4:busybox-static-1.35.0-150400.3.3.1.aarch64", "openSUSE Leap 15.4:busybox-static-1.35.0-150400.3.3.1.ppc64le", "openSUSE Leap 15.4:busybox-static-1.35.0-150400.3.3.1.s390x", "openSUSE Leap 15.4:busybox-static-1.35.0-150400.3.3.1.x86_64", "openSUSE Leap 15.4:busybox-testsuite-1.35.0-150400.3.3.1.aarch64", "openSUSE Leap 15.4:busybox-testsuite-1.35.0-150400.3.3.1.ppc64le", "openSUSE Leap 15.4:busybox-testsuite-1.35.0-150400.3.3.1.s390x", "openSUSE Leap 15.4:busybox-testsuite-1.35.0-150400.3.3.1.x86_64", "openSUSE Leap 15.4:busybox-warewulf3-1.35.0-150400.3.3.1.aarch64", "openSUSE Leap 15.4:busybox-warewulf3-1.35.0-150400.3.3.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.5, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-1.35.0-150400.3.3.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-1.35.0-150400.3.3.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-1.35.0-150400.3.3.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-1.35.0-150400.3.3.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-static-1.35.0-150400.3.3.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-static-1.35.0-150400.3.3.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-static-1.35.0-150400.3.3.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-static-1.35.0-150400.3.3.1.x86_64", "openSUSE Leap 15.4:busybox-1.35.0-150400.3.3.1.aarch64", "openSUSE Leap 15.4:busybox-1.35.0-150400.3.3.1.ppc64le", "openSUSE Leap 15.4:busybox-1.35.0-150400.3.3.1.s390x", "openSUSE Leap 15.4:busybox-1.35.0-150400.3.3.1.x86_64", "openSUSE Leap 15.4:busybox-static-1.35.0-150400.3.3.1.aarch64", "openSUSE Leap 15.4:busybox-static-1.35.0-150400.3.3.1.ppc64le", "openSUSE Leap 15.4:busybox-static-1.35.0-150400.3.3.1.s390x", "openSUSE Leap 15.4:busybox-static-1.35.0-150400.3.3.1.x86_64", "openSUSE Leap 15.4:busybox-testsuite-1.35.0-150400.3.3.1.aarch64", "openSUSE Leap 15.4:busybox-testsuite-1.35.0-150400.3.3.1.ppc64le", "openSUSE Leap 15.4:busybox-testsuite-1.35.0-150400.3.3.1.s390x", "openSUSE Leap 15.4:busybox-testsuite-1.35.0-150400.3.3.1.x86_64", "openSUSE Leap 15.4:busybox-warewulf3-1.35.0-150400.3.3.1.aarch64", "openSUSE Leap 15.4:busybox-warewulf3-1.35.0-150400.3.3.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2022-11-11T14:38:22Z", details: "moderate", }, ], title: "CVE-2021-42373", }, { cve: "CVE-2021-42374", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2021-42374", }, ], notes: [ { category: "general", text: "An out-of-bounds heap read in Busybox's unlzma applet leads to information leak and denial of service when crafted LZMA-compressed input is decompressed. This can be triggered by any applet/format that", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-1.35.0-150400.3.3.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-1.35.0-150400.3.3.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-1.35.0-150400.3.3.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-1.35.0-150400.3.3.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-static-1.35.0-150400.3.3.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-static-1.35.0-150400.3.3.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-static-1.35.0-150400.3.3.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-static-1.35.0-150400.3.3.1.x86_64", "openSUSE Leap 15.4:busybox-1.35.0-150400.3.3.1.aarch64", "openSUSE Leap 15.4:busybox-1.35.0-150400.3.3.1.ppc64le", "openSUSE Leap 15.4:busybox-1.35.0-150400.3.3.1.s390x", "openSUSE Leap 15.4:busybox-1.35.0-150400.3.3.1.x86_64", "openSUSE Leap 15.4:busybox-static-1.35.0-150400.3.3.1.aarch64", "openSUSE Leap 15.4:busybox-static-1.35.0-150400.3.3.1.ppc64le", "openSUSE Leap 15.4:busybox-static-1.35.0-150400.3.3.1.s390x", "openSUSE Leap 15.4:busybox-static-1.35.0-150400.3.3.1.x86_64", "openSUSE Leap 15.4:busybox-testsuite-1.35.0-150400.3.3.1.aarch64", "openSUSE Leap 15.4:busybox-testsuite-1.35.0-150400.3.3.1.ppc64le", "openSUSE Leap 15.4:busybox-testsuite-1.35.0-150400.3.3.1.s390x", "openSUSE Leap 15.4:busybox-testsuite-1.35.0-150400.3.3.1.x86_64", "openSUSE Leap 15.4:busybox-warewulf3-1.35.0-150400.3.3.1.aarch64", "openSUSE Leap 15.4:busybox-warewulf3-1.35.0-150400.3.3.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2021-42374", url: "https://www.suse.com/security/cve/CVE-2021-42374", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-1.35.0-150400.3.3.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-1.35.0-150400.3.3.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-1.35.0-150400.3.3.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-1.35.0-150400.3.3.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-static-1.35.0-150400.3.3.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-static-1.35.0-150400.3.3.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-static-1.35.0-150400.3.3.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-static-1.35.0-150400.3.3.1.x86_64", "openSUSE Leap 15.4:busybox-1.35.0-150400.3.3.1.aarch64", "openSUSE Leap 15.4:busybox-1.35.0-150400.3.3.1.ppc64le", "openSUSE Leap 15.4:busybox-1.35.0-150400.3.3.1.s390x", "openSUSE Leap 15.4:busybox-1.35.0-150400.3.3.1.x86_64", "openSUSE Leap 15.4:busybox-static-1.35.0-150400.3.3.1.aarch64", "openSUSE Leap 15.4:busybox-static-1.35.0-150400.3.3.1.ppc64le", "openSUSE Leap 15.4:busybox-static-1.35.0-150400.3.3.1.s390x", "openSUSE Leap 15.4:busybox-static-1.35.0-150400.3.3.1.x86_64", "openSUSE Leap 15.4:busybox-testsuite-1.35.0-150400.3.3.1.aarch64", "openSUSE Leap 15.4:busybox-testsuite-1.35.0-150400.3.3.1.ppc64le", "openSUSE Leap 15.4:busybox-testsuite-1.35.0-150400.3.3.1.s390x", "openSUSE Leap 15.4:busybox-testsuite-1.35.0-150400.3.3.1.x86_64", "openSUSE Leap 15.4:busybox-warewulf3-1.35.0-150400.3.3.1.aarch64", "openSUSE Leap 15.4:busybox-warewulf3-1.35.0-150400.3.3.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.7, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-1.35.0-150400.3.3.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-1.35.0-150400.3.3.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-1.35.0-150400.3.3.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-1.35.0-150400.3.3.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-static-1.35.0-150400.3.3.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-static-1.35.0-150400.3.3.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-static-1.35.0-150400.3.3.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-static-1.35.0-150400.3.3.1.x86_64", "openSUSE Leap 15.4:busybox-1.35.0-150400.3.3.1.aarch64", "openSUSE Leap 15.4:busybox-1.35.0-150400.3.3.1.ppc64le", "openSUSE Leap 15.4:busybox-1.35.0-150400.3.3.1.s390x", "openSUSE Leap 15.4:busybox-1.35.0-150400.3.3.1.x86_64", "openSUSE Leap 15.4:busybox-static-1.35.0-150400.3.3.1.aarch64", "openSUSE Leap 15.4:busybox-static-1.35.0-150400.3.3.1.ppc64le", "openSUSE Leap 15.4:busybox-static-1.35.0-150400.3.3.1.s390x", "openSUSE Leap 15.4:busybox-static-1.35.0-150400.3.3.1.x86_64", "openSUSE Leap 15.4:busybox-testsuite-1.35.0-150400.3.3.1.aarch64", "openSUSE Leap 15.4:busybox-testsuite-1.35.0-150400.3.3.1.ppc64le", "openSUSE Leap 15.4:busybox-testsuite-1.35.0-150400.3.3.1.s390x", "openSUSE Leap 15.4:busybox-testsuite-1.35.0-150400.3.3.1.x86_64", "openSUSE Leap 15.4:busybox-warewulf3-1.35.0-150400.3.3.1.aarch64", "openSUSE Leap 15.4:busybox-warewulf3-1.35.0-150400.3.3.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2022-11-11T14:38:22Z", details: "moderate", }, ], title: "CVE-2021-42374", }, { cve: "CVE-2021-42375", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2021-42375", }, ], notes: [ { category: "general", text: "An incorrect handling of a special element in Busybox's ash applet leads to denial of service when processing a crafted shell command, due to the shell mistaking specific characters for reserved characters. This may be used for DoS under rare conditions of filtered command input.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-1.35.0-150400.3.3.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-1.35.0-150400.3.3.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-1.35.0-150400.3.3.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-1.35.0-150400.3.3.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-static-1.35.0-150400.3.3.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-static-1.35.0-150400.3.3.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-static-1.35.0-150400.3.3.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-static-1.35.0-150400.3.3.1.x86_64", "openSUSE Leap 15.4:busybox-1.35.0-150400.3.3.1.aarch64", "openSUSE Leap 15.4:busybox-1.35.0-150400.3.3.1.ppc64le", "openSUSE Leap 15.4:busybox-1.35.0-150400.3.3.1.s390x", "openSUSE Leap 15.4:busybox-1.35.0-150400.3.3.1.x86_64", "openSUSE Leap 15.4:busybox-static-1.35.0-150400.3.3.1.aarch64", "openSUSE Leap 15.4:busybox-static-1.35.0-150400.3.3.1.ppc64le", "openSUSE Leap 15.4:busybox-static-1.35.0-150400.3.3.1.s390x", "openSUSE Leap 15.4:busybox-static-1.35.0-150400.3.3.1.x86_64", "openSUSE Leap 15.4:busybox-testsuite-1.35.0-150400.3.3.1.aarch64", "openSUSE Leap 15.4:busybox-testsuite-1.35.0-150400.3.3.1.ppc64le", "openSUSE Leap 15.4:busybox-testsuite-1.35.0-150400.3.3.1.s390x", "openSUSE Leap 15.4:busybox-testsuite-1.35.0-150400.3.3.1.x86_64", "openSUSE Leap 15.4:busybox-warewulf3-1.35.0-150400.3.3.1.aarch64", "openSUSE Leap 15.4:busybox-warewulf3-1.35.0-150400.3.3.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2021-42375", url: "https://www.suse.com/security/cve/CVE-2021-42375", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-1.35.0-150400.3.3.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-1.35.0-150400.3.3.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-1.35.0-150400.3.3.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-1.35.0-150400.3.3.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-static-1.35.0-150400.3.3.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-static-1.35.0-150400.3.3.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-static-1.35.0-150400.3.3.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-static-1.35.0-150400.3.3.1.x86_64", "openSUSE Leap 15.4:busybox-1.35.0-150400.3.3.1.aarch64", "openSUSE Leap 15.4:busybox-1.35.0-150400.3.3.1.ppc64le", "openSUSE Leap 15.4:busybox-1.35.0-150400.3.3.1.s390x", "openSUSE Leap 15.4:busybox-1.35.0-150400.3.3.1.x86_64", "openSUSE Leap 15.4:busybox-static-1.35.0-150400.3.3.1.aarch64", "openSUSE Leap 15.4:busybox-static-1.35.0-150400.3.3.1.ppc64le", "openSUSE Leap 15.4:busybox-static-1.35.0-150400.3.3.1.s390x", "openSUSE Leap 15.4:busybox-static-1.35.0-150400.3.3.1.x86_64", "openSUSE Leap 15.4:busybox-testsuite-1.35.0-150400.3.3.1.aarch64", "openSUSE Leap 15.4:busybox-testsuite-1.35.0-150400.3.3.1.ppc64le", "openSUSE Leap 15.4:busybox-testsuite-1.35.0-150400.3.3.1.s390x", "openSUSE Leap 15.4:busybox-testsuite-1.35.0-150400.3.3.1.x86_64", "openSUSE Leap 15.4:busybox-warewulf3-1.35.0-150400.3.3.1.aarch64", "openSUSE Leap 15.4:busybox-warewulf3-1.35.0-150400.3.3.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 4.1, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-1.35.0-150400.3.3.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-1.35.0-150400.3.3.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-1.35.0-150400.3.3.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-1.35.0-150400.3.3.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-static-1.35.0-150400.3.3.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-static-1.35.0-150400.3.3.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-static-1.35.0-150400.3.3.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-static-1.35.0-150400.3.3.1.x86_64", "openSUSE Leap 15.4:busybox-1.35.0-150400.3.3.1.aarch64", "openSUSE Leap 15.4:busybox-1.35.0-150400.3.3.1.ppc64le", "openSUSE Leap 15.4:busybox-1.35.0-150400.3.3.1.s390x", "openSUSE Leap 15.4:busybox-1.35.0-150400.3.3.1.x86_64", "openSUSE Leap 15.4:busybox-static-1.35.0-150400.3.3.1.aarch64", "openSUSE Leap 15.4:busybox-static-1.35.0-150400.3.3.1.ppc64le", "openSUSE Leap 15.4:busybox-static-1.35.0-150400.3.3.1.s390x", "openSUSE Leap 15.4:busybox-static-1.35.0-150400.3.3.1.x86_64", "openSUSE Leap 15.4:busybox-testsuite-1.35.0-150400.3.3.1.aarch64", "openSUSE Leap 15.4:busybox-testsuite-1.35.0-150400.3.3.1.ppc64le", "openSUSE Leap 15.4:busybox-testsuite-1.35.0-150400.3.3.1.s390x", "openSUSE Leap 15.4:busybox-testsuite-1.35.0-150400.3.3.1.x86_64", "openSUSE Leap 15.4:busybox-warewulf3-1.35.0-150400.3.3.1.aarch64", "openSUSE Leap 15.4:busybox-warewulf3-1.35.0-150400.3.3.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2022-11-11T14:38:22Z", details: "moderate", }, ], title: "CVE-2021-42375", }, { cve: "CVE-2021-42376", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2021-42376", }, ], notes: [ { category: "general", text: "A NULL pointer dereference in Busybox's hush applet leads to denial of service when processing a crafted shell command, due to missing validation after a \\x03 delimiter character. This may be used for DoS under very rare conditions of filtered command input.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-1.35.0-150400.3.3.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-1.35.0-150400.3.3.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-1.35.0-150400.3.3.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-1.35.0-150400.3.3.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-static-1.35.0-150400.3.3.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-static-1.35.0-150400.3.3.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-static-1.35.0-150400.3.3.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-static-1.35.0-150400.3.3.1.x86_64", "openSUSE Leap 15.4:busybox-1.35.0-150400.3.3.1.aarch64", "openSUSE Leap 15.4:busybox-1.35.0-150400.3.3.1.ppc64le", "openSUSE Leap 15.4:busybox-1.35.0-150400.3.3.1.s390x", "openSUSE Leap 15.4:busybox-1.35.0-150400.3.3.1.x86_64", "openSUSE Leap 15.4:busybox-static-1.35.0-150400.3.3.1.aarch64", "openSUSE Leap 15.4:busybox-static-1.35.0-150400.3.3.1.ppc64le", "openSUSE Leap 15.4:busybox-static-1.35.0-150400.3.3.1.s390x", "openSUSE Leap 15.4:busybox-static-1.35.0-150400.3.3.1.x86_64", "openSUSE Leap 15.4:busybox-testsuite-1.35.0-150400.3.3.1.aarch64", "openSUSE Leap 15.4:busybox-testsuite-1.35.0-150400.3.3.1.ppc64le", "openSUSE Leap 15.4:busybox-testsuite-1.35.0-150400.3.3.1.s390x", "openSUSE Leap 15.4:busybox-testsuite-1.35.0-150400.3.3.1.x86_64", "openSUSE Leap 15.4:busybox-warewulf3-1.35.0-150400.3.3.1.aarch64", "openSUSE Leap 15.4:busybox-warewulf3-1.35.0-150400.3.3.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2021-42376", url: "https://www.suse.com/security/cve/CVE-2021-42376", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-1.35.0-150400.3.3.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-1.35.0-150400.3.3.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-1.35.0-150400.3.3.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-1.35.0-150400.3.3.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-static-1.35.0-150400.3.3.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-static-1.35.0-150400.3.3.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-static-1.35.0-150400.3.3.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-static-1.35.0-150400.3.3.1.x86_64", "openSUSE Leap 15.4:busybox-1.35.0-150400.3.3.1.aarch64", "openSUSE Leap 15.4:busybox-1.35.0-150400.3.3.1.ppc64le", "openSUSE Leap 15.4:busybox-1.35.0-150400.3.3.1.s390x", "openSUSE Leap 15.4:busybox-1.35.0-150400.3.3.1.x86_64", "openSUSE Leap 15.4:busybox-static-1.35.0-150400.3.3.1.aarch64", "openSUSE Leap 15.4:busybox-static-1.35.0-150400.3.3.1.ppc64le", "openSUSE Leap 15.4:busybox-static-1.35.0-150400.3.3.1.s390x", "openSUSE Leap 15.4:busybox-static-1.35.0-150400.3.3.1.x86_64", "openSUSE Leap 15.4:busybox-testsuite-1.35.0-150400.3.3.1.aarch64", "openSUSE Leap 15.4:busybox-testsuite-1.35.0-150400.3.3.1.ppc64le", "openSUSE Leap 15.4:busybox-testsuite-1.35.0-150400.3.3.1.s390x", "openSUSE Leap 15.4:busybox-testsuite-1.35.0-150400.3.3.1.x86_64", "openSUSE Leap 15.4:busybox-warewulf3-1.35.0-150400.3.3.1.aarch64", "openSUSE Leap 15.4:busybox-warewulf3-1.35.0-150400.3.3.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 4.1, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-1.35.0-150400.3.3.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-1.35.0-150400.3.3.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-1.35.0-150400.3.3.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-1.35.0-150400.3.3.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-static-1.35.0-150400.3.3.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-static-1.35.0-150400.3.3.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-static-1.35.0-150400.3.3.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-static-1.35.0-150400.3.3.1.x86_64", "openSUSE Leap 15.4:busybox-1.35.0-150400.3.3.1.aarch64", "openSUSE Leap 15.4:busybox-1.35.0-150400.3.3.1.ppc64le", "openSUSE Leap 15.4:busybox-1.35.0-150400.3.3.1.s390x", "openSUSE Leap 15.4:busybox-1.35.0-150400.3.3.1.x86_64", "openSUSE Leap 15.4:busybox-static-1.35.0-150400.3.3.1.aarch64", "openSUSE Leap 15.4:busybox-static-1.35.0-150400.3.3.1.ppc64le", "openSUSE Leap 15.4:busybox-static-1.35.0-150400.3.3.1.s390x", "openSUSE Leap 15.4:busybox-static-1.35.0-150400.3.3.1.x86_64", "openSUSE Leap 15.4:busybox-testsuite-1.35.0-150400.3.3.1.aarch64", "openSUSE Leap 15.4:busybox-testsuite-1.35.0-150400.3.3.1.ppc64le", "openSUSE Leap 15.4:busybox-testsuite-1.35.0-150400.3.3.1.s390x", "openSUSE Leap 15.4:busybox-testsuite-1.35.0-150400.3.3.1.x86_64", "openSUSE Leap 15.4:busybox-warewulf3-1.35.0-150400.3.3.1.aarch64", "openSUSE Leap 15.4:busybox-warewulf3-1.35.0-150400.3.3.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2022-11-11T14:38:22Z", details: "moderate", }, ], title: "CVE-2021-42376", }, { cve: "CVE-2021-42377", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2021-42377", }, ], notes: [ { category: "general", text: "An attacker-controlled pointer free in Busybox's hush applet leads to denial of service and possible code execution when processing a crafted shell command, due to the shell mishandling the &&& string. This may be used for remote code execution under rare conditions of filtered command input.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-1.35.0-150400.3.3.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-1.35.0-150400.3.3.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-1.35.0-150400.3.3.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-1.35.0-150400.3.3.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-static-1.35.0-150400.3.3.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-static-1.35.0-150400.3.3.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-static-1.35.0-150400.3.3.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-static-1.35.0-150400.3.3.1.x86_64", "openSUSE Leap 15.4:busybox-1.35.0-150400.3.3.1.aarch64", "openSUSE Leap 15.4:busybox-1.35.0-150400.3.3.1.ppc64le", "openSUSE Leap 15.4:busybox-1.35.0-150400.3.3.1.s390x", "openSUSE Leap 15.4:busybox-1.35.0-150400.3.3.1.x86_64", "openSUSE Leap 15.4:busybox-static-1.35.0-150400.3.3.1.aarch64", "openSUSE Leap 15.4:busybox-static-1.35.0-150400.3.3.1.ppc64le", "openSUSE Leap 15.4:busybox-static-1.35.0-150400.3.3.1.s390x", "openSUSE Leap 15.4:busybox-static-1.35.0-150400.3.3.1.x86_64", "openSUSE Leap 15.4:busybox-testsuite-1.35.0-150400.3.3.1.aarch64", "openSUSE Leap 15.4:busybox-testsuite-1.35.0-150400.3.3.1.ppc64le", "openSUSE Leap 15.4:busybox-testsuite-1.35.0-150400.3.3.1.s390x", "openSUSE Leap 15.4:busybox-testsuite-1.35.0-150400.3.3.1.x86_64", "openSUSE Leap 15.4:busybox-warewulf3-1.35.0-150400.3.3.1.aarch64", "openSUSE Leap 15.4:busybox-warewulf3-1.35.0-150400.3.3.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2021-42377", url: "https://www.suse.com/security/cve/CVE-2021-42377", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-1.35.0-150400.3.3.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-1.35.0-150400.3.3.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-1.35.0-150400.3.3.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-1.35.0-150400.3.3.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-static-1.35.0-150400.3.3.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-static-1.35.0-150400.3.3.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-static-1.35.0-150400.3.3.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-static-1.35.0-150400.3.3.1.x86_64", "openSUSE Leap 15.4:busybox-1.35.0-150400.3.3.1.aarch64", "openSUSE Leap 15.4:busybox-1.35.0-150400.3.3.1.ppc64le", "openSUSE Leap 15.4:busybox-1.35.0-150400.3.3.1.s390x", "openSUSE Leap 15.4:busybox-1.35.0-150400.3.3.1.x86_64", "openSUSE Leap 15.4:busybox-static-1.35.0-150400.3.3.1.aarch64", "openSUSE Leap 15.4:busybox-static-1.35.0-150400.3.3.1.ppc64le", "openSUSE Leap 15.4:busybox-static-1.35.0-150400.3.3.1.s390x", "openSUSE Leap 15.4:busybox-static-1.35.0-150400.3.3.1.x86_64", "openSUSE Leap 15.4:busybox-testsuite-1.35.0-150400.3.3.1.aarch64", "openSUSE Leap 15.4:busybox-testsuite-1.35.0-150400.3.3.1.ppc64le", "openSUSE Leap 15.4:busybox-testsuite-1.35.0-150400.3.3.1.s390x", "openSUSE Leap 15.4:busybox-testsuite-1.35.0-150400.3.3.1.x86_64", "openSUSE Leap 15.4:busybox-warewulf3-1.35.0-150400.3.3.1.aarch64", "openSUSE Leap 15.4:busybox-warewulf3-1.35.0-150400.3.3.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 6.4, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-1.35.0-150400.3.3.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-1.35.0-150400.3.3.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-1.35.0-150400.3.3.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-1.35.0-150400.3.3.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-static-1.35.0-150400.3.3.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-static-1.35.0-150400.3.3.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-static-1.35.0-150400.3.3.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-static-1.35.0-150400.3.3.1.x86_64", "openSUSE Leap 15.4:busybox-1.35.0-150400.3.3.1.aarch64", "openSUSE Leap 15.4:busybox-1.35.0-150400.3.3.1.ppc64le", "openSUSE Leap 15.4:busybox-1.35.0-150400.3.3.1.s390x", "openSUSE Leap 15.4:busybox-1.35.0-150400.3.3.1.x86_64", "openSUSE Leap 15.4:busybox-static-1.35.0-150400.3.3.1.aarch64", "openSUSE Leap 15.4:busybox-static-1.35.0-150400.3.3.1.ppc64le", "openSUSE Leap 15.4:busybox-static-1.35.0-150400.3.3.1.s390x", "openSUSE Leap 15.4:busybox-static-1.35.0-150400.3.3.1.x86_64", "openSUSE Leap 15.4:busybox-testsuite-1.35.0-150400.3.3.1.aarch64", "openSUSE Leap 15.4:busybox-testsuite-1.35.0-150400.3.3.1.ppc64le", "openSUSE Leap 15.4:busybox-testsuite-1.35.0-150400.3.3.1.s390x", "openSUSE Leap 15.4:busybox-testsuite-1.35.0-150400.3.3.1.x86_64", "openSUSE Leap 15.4:busybox-warewulf3-1.35.0-150400.3.3.1.aarch64", "openSUSE Leap 15.4:busybox-warewulf3-1.35.0-150400.3.3.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2022-11-11T14:38:22Z", details: "moderate", }, ], title: "CVE-2021-42377", }, { cve: "CVE-2021-42378", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2021-42378", }, ], notes: [ { category: "general", text: "A use-after-free in Busybox's awk applet leads to denial of service and possibly code execution when processing a crafted awk pattern in the getvar_i function", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-1.35.0-150400.3.3.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-1.35.0-150400.3.3.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-1.35.0-150400.3.3.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-1.35.0-150400.3.3.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-static-1.35.0-150400.3.3.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-static-1.35.0-150400.3.3.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-static-1.35.0-150400.3.3.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-static-1.35.0-150400.3.3.1.x86_64", "openSUSE Leap 15.4:busybox-1.35.0-150400.3.3.1.aarch64", "openSUSE Leap 15.4:busybox-1.35.0-150400.3.3.1.ppc64le", "openSUSE Leap 15.4:busybox-1.35.0-150400.3.3.1.s390x", "openSUSE Leap 15.4:busybox-1.35.0-150400.3.3.1.x86_64", "openSUSE Leap 15.4:busybox-static-1.35.0-150400.3.3.1.aarch64", "openSUSE Leap 15.4:busybox-static-1.35.0-150400.3.3.1.ppc64le", "openSUSE Leap 15.4:busybox-static-1.35.0-150400.3.3.1.s390x", "openSUSE Leap 15.4:busybox-static-1.35.0-150400.3.3.1.x86_64", "openSUSE Leap 15.4:busybox-testsuite-1.35.0-150400.3.3.1.aarch64", "openSUSE Leap 15.4:busybox-testsuite-1.35.0-150400.3.3.1.ppc64le", "openSUSE Leap 15.4:busybox-testsuite-1.35.0-150400.3.3.1.s390x", "openSUSE Leap 15.4:busybox-testsuite-1.35.0-150400.3.3.1.x86_64", "openSUSE Leap 15.4:busybox-warewulf3-1.35.0-150400.3.3.1.aarch64", "openSUSE Leap 15.4:busybox-warewulf3-1.35.0-150400.3.3.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2021-42378", url: "https://www.suse.com/security/cve/CVE-2021-42378", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-1.35.0-150400.3.3.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-1.35.0-150400.3.3.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-1.35.0-150400.3.3.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-1.35.0-150400.3.3.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-static-1.35.0-150400.3.3.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-static-1.35.0-150400.3.3.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-static-1.35.0-150400.3.3.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-static-1.35.0-150400.3.3.1.x86_64", "openSUSE Leap 15.4:busybox-1.35.0-150400.3.3.1.aarch64", "openSUSE Leap 15.4:busybox-1.35.0-150400.3.3.1.ppc64le", "openSUSE Leap 15.4:busybox-1.35.0-150400.3.3.1.s390x", "openSUSE Leap 15.4:busybox-1.35.0-150400.3.3.1.x86_64", "openSUSE Leap 15.4:busybox-static-1.35.0-150400.3.3.1.aarch64", "openSUSE Leap 15.4:busybox-static-1.35.0-150400.3.3.1.ppc64le", "openSUSE Leap 15.4:busybox-static-1.35.0-150400.3.3.1.s390x", "openSUSE Leap 15.4:busybox-static-1.35.0-150400.3.3.1.x86_64", "openSUSE Leap 15.4:busybox-testsuite-1.35.0-150400.3.3.1.aarch64", "openSUSE Leap 15.4:busybox-testsuite-1.35.0-150400.3.3.1.ppc64le", "openSUSE Leap 15.4:busybox-testsuite-1.35.0-150400.3.3.1.s390x", "openSUSE Leap 15.4:busybox-testsuite-1.35.0-150400.3.3.1.x86_64", "openSUSE Leap 15.4:busybox-warewulf3-1.35.0-150400.3.3.1.aarch64", "openSUSE Leap 15.4:busybox-warewulf3-1.35.0-150400.3.3.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 6.6, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-1.35.0-150400.3.3.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-1.35.0-150400.3.3.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-1.35.0-150400.3.3.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-1.35.0-150400.3.3.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-static-1.35.0-150400.3.3.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-static-1.35.0-150400.3.3.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-static-1.35.0-150400.3.3.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-static-1.35.0-150400.3.3.1.x86_64", "openSUSE Leap 15.4:busybox-1.35.0-150400.3.3.1.aarch64", "openSUSE Leap 15.4:busybox-1.35.0-150400.3.3.1.ppc64le", "openSUSE Leap 15.4:busybox-1.35.0-150400.3.3.1.s390x", "openSUSE Leap 15.4:busybox-1.35.0-150400.3.3.1.x86_64", "openSUSE Leap 15.4:busybox-static-1.35.0-150400.3.3.1.aarch64", "openSUSE Leap 15.4:busybox-static-1.35.0-150400.3.3.1.ppc64le", "openSUSE Leap 15.4:busybox-static-1.35.0-150400.3.3.1.s390x", "openSUSE Leap 15.4:busybox-static-1.35.0-150400.3.3.1.x86_64", "openSUSE Leap 15.4:busybox-testsuite-1.35.0-150400.3.3.1.aarch64", "openSUSE Leap 15.4:busybox-testsuite-1.35.0-150400.3.3.1.ppc64le", "openSUSE Leap 15.4:busybox-testsuite-1.35.0-150400.3.3.1.s390x", "openSUSE Leap 15.4:busybox-testsuite-1.35.0-150400.3.3.1.x86_64", "openSUSE Leap 15.4:busybox-warewulf3-1.35.0-150400.3.3.1.aarch64", "openSUSE Leap 15.4:busybox-warewulf3-1.35.0-150400.3.3.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2022-11-11T14:38:22Z", details: "moderate", }, ], title: "CVE-2021-42378", }, { cve: "CVE-2021-42379", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2021-42379", }, ], notes: [ { category: "general", text: "A use-after-free in Busybox's awk applet leads to denial of service and possibly code execution when processing a crafted awk pattern in the next_input_file function", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-1.35.0-150400.3.3.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-1.35.0-150400.3.3.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-1.35.0-150400.3.3.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-1.35.0-150400.3.3.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-static-1.35.0-150400.3.3.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-static-1.35.0-150400.3.3.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-static-1.35.0-150400.3.3.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-static-1.35.0-150400.3.3.1.x86_64", "openSUSE Leap 15.4:busybox-1.35.0-150400.3.3.1.aarch64", "openSUSE Leap 15.4:busybox-1.35.0-150400.3.3.1.ppc64le", "openSUSE Leap 15.4:busybox-1.35.0-150400.3.3.1.s390x", "openSUSE Leap 15.4:busybox-1.35.0-150400.3.3.1.x86_64", "openSUSE Leap 15.4:busybox-static-1.35.0-150400.3.3.1.aarch64", "openSUSE Leap 15.4:busybox-static-1.35.0-150400.3.3.1.ppc64le", "openSUSE Leap 15.4:busybox-static-1.35.0-150400.3.3.1.s390x", "openSUSE Leap 15.4:busybox-static-1.35.0-150400.3.3.1.x86_64", "openSUSE Leap 15.4:busybox-testsuite-1.35.0-150400.3.3.1.aarch64", "openSUSE Leap 15.4:busybox-testsuite-1.35.0-150400.3.3.1.ppc64le", "openSUSE Leap 15.4:busybox-testsuite-1.35.0-150400.3.3.1.s390x", "openSUSE Leap 15.4:busybox-testsuite-1.35.0-150400.3.3.1.x86_64", "openSUSE Leap 15.4:busybox-warewulf3-1.35.0-150400.3.3.1.aarch64", "openSUSE Leap 15.4:busybox-warewulf3-1.35.0-150400.3.3.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2021-42379", url: "https://www.suse.com/security/cve/CVE-2021-42379", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-1.35.0-150400.3.3.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-1.35.0-150400.3.3.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-1.35.0-150400.3.3.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-1.35.0-150400.3.3.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-static-1.35.0-150400.3.3.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-static-1.35.0-150400.3.3.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-static-1.35.0-150400.3.3.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-static-1.35.0-150400.3.3.1.x86_64", "openSUSE Leap 15.4:busybox-1.35.0-150400.3.3.1.aarch64", "openSUSE Leap 15.4:busybox-1.35.0-150400.3.3.1.ppc64le", "openSUSE Leap 15.4:busybox-1.35.0-150400.3.3.1.s390x", "openSUSE Leap 15.4:busybox-1.35.0-150400.3.3.1.x86_64", "openSUSE Leap 15.4:busybox-static-1.35.0-150400.3.3.1.aarch64", "openSUSE Leap 15.4:busybox-static-1.35.0-150400.3.3.1.ppc64le", "openSUSE Leap 15.4:busybox-static-1.35.0-150400.3.3.1.s390x", "openSUSE Leap 15.4:busybox-static-1.35.0-150400.3.3.1.x86_64", "openSUSE Leap 15.4:busybox-testsuite-1.35.0-150400.3.3.1.aarch64", "openSUSE Leap 15.4:busybox-testsuite-1.35.0-150400.3.3.1.ppc64le", "openSUSE Leap 15.4:busybox-testsuite-1.35.0-150400.3.3.1.s390x", "openSUSE Leap 15.4:busybox-testsuite-1.35.0-150400.3.3.1.x86_64", "openSUSE Leap 15.4:busybox-warewulf3-1.35.0-150400.3.3.1.aarch64", "openSUSE Leap 15.4:busybox-warewulf3-1.35.0-150400.3.3.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 6.6, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-1.35.0-150400.3.3.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-1.35.0-150400.3.3.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-1.35.0-150400.3.3.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-1.35.0-150400.3.3.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-static-1.35.0-150400.3.3.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-static-1.35.0-150400.3.3.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-static-1.35.0-150400.3.3.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-static-1.35.0-150400.3.3.1.x86_64", "openSUSE Leap 15.4:busybox-1.35.0-150400.3.3.1.aarch64", "openSUSE Leap 15.4:busybox-1.35.0-150400.3.3.1.ppc64le", "openSUSE Leap 15.4:busybox-1.35.0-150400.3.3.1.s390x", "openSUSE Leap 15.4:busybox-1.35.0-150400.3.3.1.x86_64", "openSUSE Leap 15.4:busybox-static-1.35.0-150400.3.3.1.aarch64", "openSUSE Leap 15.4:busybox-static-1.35.0-150400.3.3.1.ppc64le", "openSUSE Leap 15.4:busybox-static-1.35.0-150400.3.3.1.s390x", "openSUSE Leap 15.4:busybox-static-1.35.0-150400.3.3.1.x86_64", "openSUSE Leap 15.4:busybox-testsuite-1.35.0-150400.3.3.1.aarch64", "openSUSE Leap 15.4:busybox-testsuite-1.35.0-150400.3.3.1.ppc64le", "openSUSE Leap 15.4:busybox-testsuite-1.35.0-150400.3.3.1.s390x", "openSUSE Leap 15.4:busybox-testsuite-1.35.0-150400.3.3.1.x86_64", "openSUSE Leap 15.4:busybox-warewulf3-1.35.0-150400.3.3.1.aarch64", "openSUSE Leap 15.4:busybox-warewulf3-1.35.0-150400.3.3.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2022-11-11T14:38:22Z", details: "moderate", }, ], title: "CVE-2021-42379", }, { cve: "CVE-2021-42380", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2021-42380", }, ], notes: [ { category: "general", text: "A use-after-free in Busybox's awk applet leads to denial of service and possibly code execution when processing a crafted awk pattern in the clrvar function", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-1.35.0-150400.3.3.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-1.35.0-150400.3.3.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-1.35.0-150400.3.3.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-1.35.0-150400.3.3.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-static-1.35.0-150400.3.3.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-static-1.35.0-150400.3.3.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-static-1.35.0-150400.3.3.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-static-1.35.0-150400.3.3.1.x86_64", "openSUSE Leap 15.4:busybox-1.35.0-150400.3.3.1.aarch64", "openSUSE Leap 15.4:busybox-1.35.0-150400.3.3.1.ppc64le", "openSUSE Leap 15.4:busybox-1.35.0-150400.3.3.1.s390x", "openSUSE Leap 15.4:busybox-1.35.0-150400.3.3.1.x86_64", "openSUSE Leap 15.4:busybox-static-1.35.0-150400.3.3.1.aarch64", "openSUSE Leap 15.4:busybox-static-1.35.0-150400.3.3.1.ppc64le", "openSUSE Leap 15.4:busybox-static-1.35.0-150400.3.3.1.s390x", "openSUSE Leap 15.4:busybox-static-1.35.0-150400.3.3.1.x86_64", "openSUSE Leap 15.4:busybox-testsuite-1.35.0-150400.3.3.1.aarch64", "openSUSE Leap 15.4:busybox-testsuite-1.35.0-150400.3.3.1.ppc64le", "openSUSE Leap 15.4:busybox-testsuite-1.35.0-150400.3.3.1.s390x", "openSUSE Leap 15.4:busybox-testsuite-1.35.0-150400.3.3.1.x86_64", "openSUSE Leap 15.4:busybox-warewulf3-1.35.0-150400.3.3.1.aarch64", "openSUSE Leap 15.4:busybox-warewulf3-1.35.0-150400.3.3.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2021-42380", url: "https://www.suse.com/security/cve/CVE-2021-42380", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-1.35.0-150400.3.3.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-1.35.0-150400.3.3.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-1.35.0-150400.3.3.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-1.35.0-150400.3.3.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-static-1.35.0-150400.3.3.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-static-1.35.0-150400.3.3.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-static-1.35.0-150400.3.3.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-static-1.35.0-150400.3.3.1.x86_64", "openSUSE Leap 15.4:busybox-1.35.0-150400.3.3.1.aarch64", "openSUSE Leap 15.4:busybox-1.35.0-150400.3.3.1.ppc64le", "openSUSE Leap 15.4:busybox-1.35.0-150400.3.3.1.s390x", "openSUSE Leap 15.4:busybox-1.35.0-150400.3.3.1.x86_64", "openSUSE Leap 15.4:busybox-static-1.35.0-150400.3.3.1.aarch64", "openSUSE Leap 15.4:busybox-static-1.35.0-150400.3.3.1.ppc64le", "openSUSE Leap 15.4:busybox-static-1.35.0-150400.3.3.1.s390x", "openSUSE Leap 15.4:busybox-static-1.35.0-150400.3.3.1.x86_64", "openSUSE Leap 15.4:busybox-testsuite-1.35.0-150400.3.3.1.aarch64", "openSUSE Leap 15.4:busybox-testsuite-1.35.0-150400.3.3.1.ppc64le", "openSUSE Leap 15.4:busybox-testsuite-1.35.0-150400.3.3.1.s390x", "openSUSE Leap 15.4:busybox-testsuite-1.35.0-150400.3.3.1.x86_64", "openSUSE Leap 15.4:busybox-warewulf3-1.35.0-150400.3.3.1.aarch64", "openSUSE Leap 15.4:busybox-warewulf3-1.35.0-150400.3.3.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 6.6, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-1.35.0-150400.3.3.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-1.35.0-150400.3.3.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-1.35.0-150400.3.3.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-1.35.0-150400.3.3.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-static-1.35.0-150400.3.3.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-static-1.35.0-150400.3.3.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-static-1.35.0-150400.3.3.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-static-1.35.0-150400.3.3.1.x86_64", "openSUSE Leap 15.4:busybox-1.35.0-150400.3.3.1.aarch64", "openSUSE Leap 15.4:busybox-1.35.0-150400.3.3.1.ppc64le", "openSUSE Leap 15.4:busybox-1.35.0-150400.3.3.1.s390x", "openSUSE Leap 15.4:busybox-1.35.0-150400.3.3.1.x86_64", "openSUSE Leap 15.4:busybox-static-1.35.0-150400.3.3.1.aarch64", "openSUSE Leap 15.4:busybox-static-1.35.0-150400.3.3.1.ppc64le", "openSUSE Leap 15.4:busybox-static-1.35.0-150400.3.3.1.s390x", "openSUSE Leap 15.4:busybox-static-1.35.0-150400.3.3.1.x86_64", "openSUSE Leap 15.4:busybox-testsuite-1.35.0-150400.3.3.1.aarch64", "openSUSE Leap 15.4:busybox-testsuite-1.35.0-150400.3.3.1.ppc64le", "openSUSE Leap 15.4:busybox-testsuite-1.35.0-150400.3.3.1.s390x", "openSUSE Leap 15.4:busybox-testsuite-1.35.0-150400.3.3.1.x86_64", "openSUSE Leap 15.4:busybox-warewulf3-1.35.0-150400.3.3.1.aarch64", "openSUSE Leap 15.4:busybox-warewulf3-1.35.0-150400.3.3.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2022-11-11T14:38:22Z", details: "moderate", }, ], title: "CVE-2021-42380", }, { cve: "CVE-2021-42381", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2021-42381", }, ], notes: [ { category: "general", text: "A use-after-free in Busybox's awk applet leads to denial of service and possibly code execution when processing a crafted awk pattern in the hash_init function", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-1.35.0-150400.3.3.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-1.35.0-150400.3.3.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-1.35.0-150400.3.3.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-1.35.0-150400.3.3.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-static-1.35.0-150400.3.3.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-static-1.35.0-150400.3.3.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-static-1.35.0-150400.3.3.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-static-1.35.0-150400.3.3.1.x86_64", "openSUSE Leap 15.4:busybox-1.35.0-150400.3.3.1.aarch64", "openSUSE Leap 15.4:busybox-1.35.0-150400.3.3.1.ppc64le", "openSUSE Leap 15.4:busybox-1.35.0-150400.3.3.1.s390x", "openSUSE Leap 15.4:busybox-1.35.0-150400.3.3.1.x86_64", "openSUSE Leap 15.4:busybox-static-1.35.0-150400.3.3.1.aarch64", "openSUSE Leap 15.4:busybox-static-1.35.0-150400.3.3.1.ppc64le", "openSUSE Leap 15.4:busybox-static-1.35.0-150400.3.3.1.s390x", "openSUSE Leap 15.4:busybox-static-1.35.0-150400.3.3.1.x86_64", "openSUSE Leap 15.4:busybox-testsuite-1.35.0-150400.3.3.1.aarch64", "openSUSE Leap 15.4:busybox-testsuite-1.35.0-150400.3.3.1.ppc64le", "openSUSE Leap 15.4:busybox-testsuite-1.35.0-150400.3.3.1.s390x", "openSUSE Leap 15.4:busybox-testsuite-1.35.0-150400.3.3.1.x86_64", "openSUSE Leap 15.4:busybox-warewulf3-1.35.0-150400.3.3.1.aarch64", "openSUSE Leap 15.4:busybox-warewulf3-1.35.0-150400.3.3.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2021-42381", url: "https://www.suse.com/security/cve/CVE-2021-42381", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-1.35.0-150400.3.3.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-1.35.0-150400.3.3.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-1.35.0-150400.3.3.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-1.35.0-150400.3.3.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-static-1.35.0-150400.3.3.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-static-1.35.0-150400.3.3.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-static-1.35.0-150400.3.3.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-static-1.35.0-150400.3.3.1.x86_64", "openSUSE Leap 15.4:busybox-1.35.0-150400.3.3.1.aarch64", "openSUSE Leap 15.4:busybox-1.35.0-150400.3.3.1.ppc64le", "openSUSE Leap 15.4:busybox-1.35.0-150400.3.3.1.s390x", "openSUSE Leap 15.4:busybox-1.35.0-150400.3.3.1.x86_64", "openSUSE Leap 15.4:busybox-static-1.35.0-150400.3.3.1.aarch64", "openSUSE Leap 15.4:busybox-static-1.35.0-150400.3.3.1.ppc64le", "openSUSE Leap 15.4:busybox-static-1.35.0-150400.3.3.1.s390x", "openSUSE Leap 15.4:busybox-static-1.35.0-150400.3.3.1.x86_64", "openSUSE Leap 15.4:busybox-testsuite-1.35.0-150400.3.3.1.aarch64", "openSUSE Leap 15.4:busybox-testsuite-1.35.0-150400.3.3.1.ppc64le", "openSUSE Leap 15.4:busybox-testsuite-1.35.0-150400.3.3.1.s390x", "openSUSE Leap 15.4:busybox-testsuite-1.35.0-150400.3.3.1.x86_64", "openSUSE Leap 15.4:busybox-warewulf3-1.35.0-150400.3.3.1.aarch64", "openSUSE Leap 15.4:busybox-warewulf3-1.35.0-150400.3.3.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 6.6, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-1.35.0-150400.3.3.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-1.35.0-150400.3.3.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-1.35.0-150400.3.3.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-1.35.0-150400.3.3.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-static-1.35.0-150400.3.3.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-static-1.35.0-150400.3.3.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-static-1.35.0-150400.3.3.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-static-1.35.0-150400.3.3.1.x86_64", "openSUSE Leap 15.4:busybox-1.35.0-150400.3.3.1.aarch64", "openSUSE Leap 15.4:busybox-1.35.0-150400.3.3.1.ppc64le", "openSUSE Leap 15.4:busybox-1.35.0-150400.3.3.1.s390x", "openSUSE Leap 15.4:busybox-1.35.0-150400.3.3.1.x86_64", "openSUSE Leap 15.4:busybox-static-1.35.0-150400.3.3.1.aarch64", "openSUSE Leap 15.4:busybox-static-1.35.0-150400.3.3.1.ppc64le", "openSUSE Leap 15.4:busybox-static-1.35.0-150400.3.3.1.s390x", "openSUSE Leap 15.4:busybox-static-1.35.0-150400.3.3.1.x86_64", "openSUSE Leap 15.4:busybox-testsuite-1.35.0-150400.3.3.1.aarch64", "openSUSE Leap 15.4:busybox-testsuite-1.35.0-150400.3.3.1.ppc64le", "openSUSE Leap 15.4:busybox-testsuite-1.35.0-150400.3.3.1.s390x", "openSUSE Leap 15.4:busybox-testsuite-1.35.0-150400.3.3.1.x86_64", "openSUSE Leap 15.4:busybox-warewulf3-1.35.0-150400.3.3.1.aarch64", "openSUSE Leap 15.4:busybox-warewulf3-1.35.0-150400.3.3.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2022-11-11T14:38:22Z", details: "moderate", }, ], title: "CVE-2021-42381", }, { cve: "CVE-2021-42382", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2021-42382", }, ], notes: [ { category: "general", text: "A use-after-free in Busybox's awk applet leads to denial of service and possibly code execution when processing a crafted awk pattern in the getvar_s function", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-1.35.0-150400.3.3.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-1.35.0-150400.3.3.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-1.35.0-150400.3.3.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-1.35.0-150400.3.3.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-static-1.35.0-150400.3.3.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-static-1.35.0-150400.3.3.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-static-1.35.0-150400.3.3.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-static-1.35.0-150400.3.3.1.x86_64", "openSUSE Leap 15.4:busybox-1.35.0-150400.3.3.1.aarch64", "openSUSE Leap 15.4:busybox-1.35.0-150400.3.3.1.ppc64le", "openSUSE Leap 15.4:busybox-1.35.0-150400.3.3.1.s390x", "openSUSE Leap 15.4:busybox-1.35.0-150400.3.3.1.x86_64", "openSUSE Leap 15.4:busybox-static-1.35.0-150400.3.3.1.aarch64", "openSUSE Leap 15.4:busybox-static-1.35.0-150400.3.3.1.ppc64le", "openSUSE Leap 15.4:busybox-static-1.35.0-150400.3.3.1.s390x", "openSUSE Leap 15.4:busybox-static-1.35.0-150400.3.3.1.x86_64", "openSUSE Leap 15.4:busybox-testsuite-1.35.0-150400.3.3.1.aarch64", "openSUSE Leap 15.4:busybox-testsuite-1.35.0-150400.3.3.1.ppc64le", "openSUSE Leap 15.4:busybox-testsuite-1.35.0-150400.3.3.1.s390x", "openSUSE Leap 15.4:busybox-testsuite-1.35.0-150400.3.3.1.x86_64", "openSUSE Leap 15.4:busybox-warewulf3-1.35.0-150400.3.3.1.aarch64", "openSUSE Leap 15.4:busybox-warewulf3-1.35.0-150400.3.3.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2021-42382", url: "https://www.suse.com/security/cve/CVE-2021-42382", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-1.35.0-150400.3.3.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-1.35.0-150400.3.3.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-1.35.0-150400.3.3.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-1.35.0-150400.3.3.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-static-1.35.0-150400.3.3.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-static-1.35.0-150400.3.3.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-static-1.35.0-150400.3.3.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-static-1.35.0-150400.3.3.1.x86_64", "openSUSE Leap 15.4:busybox-1.35.0-150400.3.3.1.aarch64", "openSUSE Leap 15.4:busybox-1.35.0-150400.3.3.1.ppc64le", "openSUSE Leap 15.4:busybox-1.35.0-150400.3.3.1.s390x", "openSUSE Leap 15.4:busybox-1.35.0-150400.3.3.1.x86_64", "openSUSE Leap 15.4:busybox-static-1.35.0-150400.3.3.1.aarch64", "openSUSE Leap 15.4:busybox-static-1.35.0-150400.3.3.1.ppc64le", "openSUSE Leap 15.4:busybox-static-1.35.0-150400.3.3.1.s390x", "openSUSE Leap 15.4:busybox-static-1.35.0-150400.3.3.1.x86_64", "openSUSE Leap 15.4:busybox-testsuite-1.35.0-150400.3.3.1.aarch64", "openSUSE Leap 15.4:busybox-testsuite-1.35.0-150400.3.3.1.ppc64le", "openSUSE Leap 15.4:busybox-testsuite-1.35.0-150400.3.3.1.s390x", "openSUSE Leap 15.4:busybox-testsuite-1.35.0-150400.3.3.1.x86_64", "openSUSE Leap 15.4:busybox-warewulf3-1.35.0-150400.3.3.1.aarch64", "openSUSE Leap 15.4:busybox-warewulf3-1.35.0-150400.3.3.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 6.6, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-1.35.0-150400.3.3.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-1.35.0-150400.3.3.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-1.35.0-150400.3.3.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-1.35.0-150400.3.3.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-static-1.35.0-150400.3.3.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-static-1.35.0-150400.3.3.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-static-1.35.0-150400.3.3.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-static-1.35.0-150400.3.3.1.x86_64", "openSUSE Leap 15.4:busybox-1.35.0-150400.3.3.1.aarch64", "openSUSE Leap 15.4:busybox-1.35.0-150400.3.3.1.ppc64le", "openSUSE Leap 15.4:busybox-1.35.0-150400.3.3.1.s390x", "openSUSE Leap 15.4:busybox-1.35.0-150400.3.3.1.x86_64", "openSUSE Leap 15.4:busybox-static-1.35.0-150400.3.3.1.aarch64", "openSUSE Leap 15.4:busybox-static-1.35.0-150400.3.3.1.ppc64le", "openSUSE Leap 15.4:busybox-static-1.35.0-150400.3.3.1.s390x", "openSUSE Leap 15.4:busybox-static-1.35.0-150400.3.3.1.x86_64", "openSUSE Leap 15.4:busybox-testsuite-1.35.0-150400.3.3.1.aarch64", "openSUSE Leap 15.4:busybox-testsuite-1.35.0-150400.3.3.1.ppc64le", "openSUSE Leap 15.4:busybox-testsuite-1.35.0-150400.3.3.1.s390x", "openSUSE Leap 15.4:busybox-testsuite-1.35.0-150400.3.3.1.x86_64", "openSUSE Leap 15.4:busybox-warewulf3-1.35.0-150400.3.3.1.aarch64", "openSUSE Leap 15.4:busybox-warewulf3-1.35.0-150400.3.3.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2022-11-11T14:38:22Z", details: "moderate", }, ], title: "CVE-2021-42382", }, { cve: "CVE-2021-42383", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2021-42383", }, ], notes: [ { category: "general", text: "A use-after-free in Busybox's awk applet leads to denial of service and possibly code execution when processing a crafted awk pattern in the evaluate function", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-1.35.0-150400.3.3.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-1.35.0-150400.3.3.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-1.35.0-150400.3.3.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-1.35.0-150400.3.3.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-static-1.35.0-150400.3.3.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-static-1.35.0-150400.3.3.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-static-1.35.0-150400.3.3.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-static-1.35.0-150400.3.3.1.x86_64", "openSUSE Leap 15.4:busybox-1.35.0-150400.3.3.1.aarch64", "openSUSE Leap 15.4:busybox-1.35.0-150400.3.3.1.ppc64le", "openSUSE Leap 15.4:busybox-1.35.0-150400.3.3.1.s390x", "openSUSE Leap 15.4:busybox-1.35.0-150400.3.3.1.x86_64", "openSUSE Leap 15.4:busybox-static-1.35.0-150400.3.3.1.aarch64", "openSUSE Leap 15.4:busybox-static-1.35.0-150400.3.3.1.ppc64le", "openSUSE Leap 15.4:busybox-static-1.35.0-150400.3.3.1.s390x", "openSUSE Leap 15.4:busybox-static-1.35.0-150400.3.3.1.x86_64", "openSUSE Leap 15.4:busybox-testsuite-1.35.0-150400.3.3.1.aarch64", "openSUSE Leap 15.4:busybox-testsuite-1.35.0-150400.3.3.1.ppc64le", "openSUSE Leap 15.4:busybox-testsuite-1.35.0-150400.3.3.1.s390x", "openSUSE Leap 15.4:busybox-testsuite-1.35.0-150400.3.3.1.x86_64", "openSUSE Leap 15.4:busybox-warewulf3-1.35.0-150400.3.3.1.aarch64", "openSUSE Leap 15.4:busybox-warewulf3-1.35.0-150400.3.3.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2021-42383", url: "https://www.suse.com/security/cve/CVE-2021-42383", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-1.35.0-150400.3.3.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-1.35.0-150400.3.3.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-1.35.0-150400.3.3.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-1.35.0-150400.3.3.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-static-1.35.0-150400.3.3.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-static-1.35.0-150400.3.3.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-static-1.35.0-150400.3.3.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-static-1.35.0-150400.3.3.1.x86_64", "openSUSE Leap 15.4:busybox-1.35.0-150400.3.3.1.aarch64", "openSUSE Leap 15.4:busybox-1.35.0-150400.3.3.1.ppc64le", "openSUSE Leap 15.4:busybox-1.35.0-150400.3.3.1.s390x", "openSUSE Leap 15.4:busybox-1.35.0-150400.3.3.1.x86_64", "openSUSE Leap 15.4:busybox-static-1.35.0-150400.3.3.1.aarch64", "openSUSE Leap 15.4:busybox-static-1.35.0-150400.3.3.1.ppc64le", "openSUSE Leap 15.4:busybox-static-1.35.0-150400.3.3.1.s390x", "openSUSE Leap 15.4:busybox-static-1.35.0-150400.3.3.1.x86_64", "openSUSE Leap 15.4:busybox-testsuite-1.35.0-150400.3.3.1.aarch64", "openSUSE Leap 15.4:busybox-testsuite-1.35.0-150400.3.3.1.ppc64le", "openSUSE Leap 15.4:busybox-testsuite-1.35.0-150400.3.3.1.s390x", "openSUSE Leap 15.4:busybox-testsuite-1.35.0-150400.3.3.1.x86_64", "openSUSE Leap 15.4:busybox-warewulf3-1.35.0-150400.3.3.1.aarch64", "openSUSE Leap 15.4:busybox-warewulf3-1.35.0-150400.3.3.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 6.6, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-1.35.0-150400.3.3.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-1.35.0-150400.3.3.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-1.35.0-150400.3.3.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-1.35.0-150400.3.3.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-static-1.35.0-150400.3.3.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-static-1.35.0-150400.3.3.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-static-1.35.0-150400.3.3.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-static-1.35.0-150400.3.3.1.x86_64", "openSUSE Leap 15.4:busybox-1.35.0-150400.3.3.1.aarch64", "openSUSE Leap 15.4:busybox-1.35.0-150400.3.3.1.ppc64le", "openSUSE Leap 15.4:busybox-1.35.0-150400.3.3.1.s390x", "openSUSE Leap 15.4:busybox-1.35.0-150400.3.3.1.x86_64", "openSUSE Leap 15.4:busybox-static-1.35.0-150400.3.3.1.aarch64", "openSUSE Leap 15.4:busybox-static-1.35.0-150400.3.3.1.ppc64le", "openSUSE Leap 15.4:busybox-static-1.35.0-150400.3.3.1.s390x", "openSUSE Leap 15.4:busybox-static-1.35.0-150400.3.3.1.x86_64", "openSUSE Leap 15.4:busybox-testsuite-1.35.0-150400.3.3.1.aarch64", "openSUSE Leap 15.4:busybox-testsuite-1.35.0-150400.3.3.1.ppc64le", "openSUSE Leap 15.4:busybox-testsuite-1.35.0-150400.3.3.1.s390x", "openSUSE Leap 15.4:busybox-testsuite-1.35.0-150400.3.3.1.x86_64", "openSUSE Leap 15.4:busybox-warewulf3-1.35.0-150400.3.3.1.aarch64", "openSUSE Leap 15.4:busybox-warewulf3-1.35.0-150400.3.3.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2022-11-11T14:38:22Z", details: "moderate", }, ], title: "CVE-2021-42383", }, { cve: "CVE-2021-42384", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2021-42384", }, ], notes: [ { category: "general", text: "A use-after-free in Busybox's awk applet leads to denial of service and possibly code execution when processing a crafted awk pattern in the handle_special function", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-1.35.0-150400.3.3.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-1.35.0-150400.3.3.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-1.35.0-150400.3.3.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-1.35.0-150400.3.3.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-static-1.35.0-150400.3.3.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-static-1.35.0-150400.3.3.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-static-1.35.0-150400.3.3.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-static-1.35.0-150400.3.3.1.x86_64", "openSUSE Leap 15.4:busybox-1.35.0-150400.3.3.1.aarch64", "openSUSE Leap 15.4:busybox-1.35.0-150400.3.3.1.ppc64le", "openSUSE Leap 15.4:busybox-1.35.0-150400.3.3.1.s390x", "openSUSE Leap 15.4:busybox-1.35.0-150400.3.3.1.x86_64", "openSUSE Leap 15.4:busybox-static-1.35.0-150400.3.3.1.aarch64", "openSUSE Leap 15.4:busybox-static-1.35.0-150400.3.3.1.ppc64le", "openSUSE Leap 15.4:busybox-static-1.35.0-150400.3.3.1.s390x", "openSUSE Leap 15.4:busybox-static-1.35.0-150400.3.3.1.x86_64", "openSUSE Leap 15.4:busybox-testsuite-1.35.0-150400.3.3.1.aarch64", "openSUSE Leap 15.4:busybox-testsuite-1.35.0-150400.3.3.1.ppc64le", "openSUSE Leap 15.4:busybox-testsuite-1.35.0-150400.3.3.1.s390x", "openSUSE Leap 15.4:busybox-testsuite-1.35.0-150400.3.3.1.x86_64", "openSUSE Leap 15.4:busybox-warewulf3-1.35.0-150400.3.3.1.aarch64", "openSUSE Leap 15.4:busybox-warewulf3-1.35.0-150400.3.3.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2021-42384", url: "https://www.suse.com/security/cve/CVE-2021-42384", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-1.35.0-150400.3.3.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-1.35.0-150400.3.3.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-1.35.0-150400.3.3.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-1.35.0-150400.3.3.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-static-1.35.0-150400.3.3.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-static-1.35.0-150400.3.3.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-static-1.35.0-150400.3.3.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-static-1.35.0-150400.3.3.1.x86_64", "openSUSE Leap 15.4:busybox-1.35.0-150400.3.3.1.aarch64", "openSUSE Leap 15.4:busybox-1.35.0-150400.3.3.1.ppc64le", "openSUSE Leap 15.4:busybox-1.35.0-150400.3.3.1.s390x", "openSUSE Leap 15.4:busybox-1.35.0-150400.3.3.1.x86_64", "openSUSE Leap 15.4:busybox-static-1.35.0-150400.3.3.1.aarch64", "openSUSE Leap 15.4:busybox-static-1.35.0-150400.3.3.1.ppc64le", "openSUSE Leap 15.4:busybox-static-1.35.0-150400.3.3.1.s390x", "openSUSE Leap 15.4:busybox-static-1.35.0-150400.3.3.1.x86_64", "openSUSE Leap 15.4:busybox-testsuite-1.35.0-150400.3.3.1.aarch64", "openSUSE Leap 15.4:busybox-testsuite-1.35.0-150400.3.3.1.ppc64le", "openSUSE Leap 15.4:busybox-testsuite-1.35.0-150400.3.3.1.s390x", "openSUSE Leap 15.4:busybox-testsuite-1.35.0-150400.3.3.1.x86_64", "openSUSE Leap 15.4:busybox-warewulf3-1.35.0-150400.3.3.1.aarch64", "openSUSE Leap 15.4:busybox-warewulf3-1.35.0-150400.3.3.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 6.6, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-1.35.0-150400.3.3.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-1.35.0-150400.3.3.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-1.35.0-150400.3.3.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-1.35.0-150400.3.3.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-static-1.35.0-150400.3.3.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-static-1.35.0-150400.3.3.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-static-1.35.0-150400.3.3.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-static-1.35.0-150400.3.3.1.x86_64", "openSUSE Leap 15.4:busybox-1.35.0-150400.3.3.1.aarch64", "openSUSE Leap 15.4:busybox-1.35.0-150400.3.3.1.ppc64le", "openSUSE Leap 15.4:busybox-1.35.0-150400.3.3.1.s390x", "openSUSE Leap 15.4:busybox-1.35.0-150400.3.3.1.x86_64", "openSUSE Leap 15.4:busybox-static-1.35.0-150400.3.3.1.aarch64", "openSUSE Leap 15.4:busybox-static-1.35.0-150400.3.3.1.ppc64le", "openSUSE Leap 15.4:busybox-static-1.35.0-150400.3.3.1.s390x", "openSUSE Leap 15.4:busybox-static-1.35.0-150400.3.3.1.x86_64", "openSUSE Leap 15.4:busybox-testsuite-1.35.0-150400.3.3.1.aarch64", "openSUSE Leap 15.4:busybox-testsuite-1.35.0-150400.3.3.1.ppc64le", "openSUSE Leap 15.4:busybox-testsuite-1.35.0-150400.3.3.1.s390x", "openSUSE Leap 15.4:busybox-testsuite-1.35.0-150400.3.3.1.x86_64", "openSUSE Leap 15.4:busybox-warewulf3-1.35.0-150400.3.3.1.aarch64", "openSUSE Leap 15.4:busybox-warewulf3-1.35.0-150400.3.3.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2022-11-11T14:38:22Z", details: "moderate", }, ], title: "CVE-2021-42384", }, { cve: "CVE-2021-42385", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2021-42385", }, ], notes: [ { category: "general", text: "A use-after-free in Busybox's awk applet leads to denial of service and possibly code execution when processing a crafted awk pattern in the evaluate function", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-1.35.0-150400.3.3.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-1.35.0-150400.3.3.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-1.35.0-150400.3.3.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-1.35.0-150400.3.3.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-static-1.35.0-150400.3.3.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-static-1.35.0-150400.3.3.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-static-1.35.0-150400.3.3.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-static-1.35.0-150400.3.3.1.x86_64", "openSUSE Leap 15.4:busybox-1.35.0-150400.3.3.1.aarch64", "openSUSE Leap 15.4:busybox-1.35.0-150400.3.3.1.ppc64le", "openSUSE Leap 15.4:busybox-1.35.0-150400.3.3.1.s390x", "openSUSE Leap 15.4:busybox-1.35.0-150400.3.3.1.x86_64", "openSUSE Leap 15.4:busybox-static-1.35.0-150400.3.3.1.aarch64", "openSUSE Leap 15.4:busybox-static-1.35.0-150400.3.3.1.ppc64le", "openSUSE Leap 15.4:busybox-static-1.35.0-150400.3.3.1.s390x", "openSUSE Leap 15.4:busybox-static-1.35.0-150400.3.3.1.x86_64", "openSUSE Leap 15.4:busybox-testsuite-1.35.0-150400.3.3.1.aarch64", "openSUSE Leap 15.4:busybox-testsuite-1.35.0-150400.3.3.1.ppc64le", "openSUSE Leap 15.4:busybox-testsuite-1.35.0-150400.3.3.1.s390x", "openSUSE Leap 15.4:busybox-testsuite-1.35.0-150400.3.3.1.x86_64", "openSUSE Leap 15.4:busybox-warewulf3-1.35.0-150400.3.3.1.aarch64", "openSUSE Leap 15.4:busybox-warewulf3-1.35.0-150400.3.3.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2021-42385", url: "https://www.suse.com/security/cve/CVE-2021-42385", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-1.35.0-150400.3.3.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-1.35.0-150400.3.3.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-1.35.0-150400.3.3.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-1.35.0-150400.3.3.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-static-1.35.0-150400.3.3.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-static-1.35.0-150400.3.3.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-static-1.35.0-150400.3.3.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-static-1.35.0-150400.3.3.1.x86_64", "openSUSE Leap 15.4:busybox-1.35.0-150400.3.3.1.aarch64", "openSUSE Leap 15.4:busybox-1.35.0-150400.3.3.1.ppc64le", "openSUSE Leap 15.4:busybox-1.35.0-150400.3.3.1.s390x", "openSUSE Leap 15.4:busybox-1.35.0-150400.3.3.1.x86_64", "openSUSE Leap 15.4:busybox-static-1.35.0-150400.3.3.1.aarch64", "openSUSE Leap 15.4:busybox-static-1.35.0-150400.3.3.1.ppc64le", "openSUSE Leap 15.4:busybox-static-1.35.0-150400.3.3.1.s390x", "openSUSE Leap 15.4:busybox-static-1.35.0-150400.3.3.1.x86_64", "openSUSE Leap 15.4:busybox-testsuite-1.35.0-150400.3.3.1.aarch64", "openSUSE Leap 15.4:busybox-testsuite-1.35.0-150400.3.3.1.ppc64le", "openSUSE Leap 15.4:busybox-testsuite-1.35.0-150400.3.3.1.s390x", "openSUSE Leap 15.4:busybox-testsuite-1.35.0-150400.3.3.1.x86_64", "openSUSE Leap 15.4:busybox-warewulf3-1.35.0-150400.3.3.1.aarch64", "openSUSE Leap 15.4:busybox-warewulf3-1.35.0-150400.3.3.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 6.6, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-1.35.0-150400.3.3.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-1.35.0-150400.3.3.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-1.35.0-150400.3.3.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-1.35.0-150400.3.3.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-static-1.35.0-150400.3.3.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-static-1.35.0-150400.3.3.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-static-1.35.0-150400.3.3.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-static-1.35.0-150400.3.3.1.x86_64", "openSUSE Leap 15.4:busybox-1.35.0-150400.3.3.1.aarch64", "openSUSE Leap 15.4:busybox-1.35.0-150400.3.3.1.ppc64le", "openSUSE Leap 15.4:busybox-1.35.0-150400.3.3.1.s390x", "openSUSE Leap 15.4:busybox-1.35.0-150400.3.3.1.x86_64", "openSUSE Leap 15.4:busybox-static-1.35.0-150400.3.3.1.aarch64", "openSUSE Leap 15.4:busybox-static-1.35.0-150400.3.3.1.ppc64le", "openSUSE Leap 15.4:busybox-static-1.35.0-150400.3.3.1.s390x", "openSUSE Leap 15.4:busybox-static-1.35.0-150400.3.3.1.x86_64", "openSUSE Leap 15.4:busybox-testsuite-1.35.0-150400.3.3.1.aarch64", "openSUSE Leap 15.4:busybox-testsuite-1.35.0-150400.3.3.1.ppc64le", "openSUSE Leap 15.4:busybox-testsuite-1.35.0-150400.3.3.1.s390x", "openSUSE Leap 15.4:busybox-testsuite-1.35.0-150400.3.3.1.x86_64", "openSUSE Leap 15.4:busybox-warewulf3-1.35.0-150400.3.3.1.aarch64", "openSUSE Leap 15.4:busybox-warewulf3-1.35.0-150400.3.3.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2022-11-11T14:38:22Z", details: "moderate", }, ], title: "CVE-2021-42385", }, { cve: "CVE-2021-42386", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2021-42386", }, ], notes: [ { category: "general", text: "A use-after-free in Busybox's awk applet leads to denial of service and possibly code execution when processing a crafted awk pattern in the nvalloc function", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-1.35.0-150400.3.3.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-1.35.0-150400.3.3.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-1.35.0-150400.3.3.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-1.35.0-150400.3.3.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-static-1.35.0-150400.3.3.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-static-1.35.0-150400.3.3.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-static-1.35.0-150400.3.3.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-static-1.35.0-150400.3.3.1.x86_64", "openSUSE Leap 15.4:busybox-1.35.0-150400.3.3.1.aarch64", "openSUSE Leap 15.4:busybox-1.35.0-150400.3.3.1.ppc64le", "openSUSE Leap 15.4:busybox-1.35.0-150400.3.3.1.s390x", "openSUSE Leap 15.4:busybox-1.35.0-150400.3.3.1.x86_64", "openSUSE Leap 15.4:busybox-static-1.35.0-150400.3.3.1.aarch64", "openSUSE Leap 15.4:busybox-static-1.35.0-150400.3.3.1.ppc64le", "openSUSE Leap 15.4:busybox-static-1.35.0-150400.3.3.1.s390x", "openSUSE Leap 15.4:busybox-static-1.35.0-150400.3.3.1.x86_64", "openSUSE Leap 15.4:busybox-testsuite-1.35.0-150400.3.3.1.aarch64", "openSUSE Leap 15.4:busybox-testsuite-1.35.0-150400.3.3.1.ppc64le", "openSUSE Leap 15.4:busybox-testsuite-1.35.0-150400.3.3.1.s390x", "openSUSE Leap 15.4:busybox-testsuite-1.35.0-150400.3.3.1.x86_64", "openSUSE Leap 15.4:busybox-warewulf3-1.35.0-150400.3.3.1.aarch64", "openSUSE Leap 15.4:busybox-warewulf3-1.35.0-150400.3.3.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2021-42386", url: "https://www.suse.com/security/cve/CVE-2021-42386", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-1.35.0-150400.3.3.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-1.35.0-150400.3.3.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-1.35.0-150400.3.3.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-1.35.0-150400.3.3.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-static-1.35.0-150400.3.3.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-static-1.35.0-150400.3.3.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-static-1.35.0-150400.3.3.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-static-1.35.0-150400.3.3.1.x86_64", "openSUSE Leap 15.4:busybox-1.35.0-150400.3.3.1.aarch64", "openSUSE Leap 15.4:busybox-1.35.0-150400.3.3.1.ppc64le", "openSUSE Leap 15.4:busybox-1.35.0-150400.3.3.1.s390x", "openSUSE Leap 15.4:busybox-1.35.0-150400.3.3.1.x86_64", "openSUSE Leap 15.4:busybox-static-1.35.0-150400.3.3.1.aarch64", "openSUSE Leap 15.4:busybox-static-1.35.0-150400.3.3.1.ppc64le", "openSUSE Leap 15.4:busybox-static-1.35.0-150400.3.3.1.s390x", "openSUSE Leap 15.4:busybox-static-1.35.0-150400.3.3.1.x86_64", "openSUSE Leap 15.4:busybox-testsuite-1.35.0-150400.3.3.1.aarch64", "openSUSE Leap 15.4:busybox-testsuite-1.35.0-150400.3.3.1.ppc64le", "openSUSE Leap 15.4:busybox-testsuite-1.35.0-150400.3.3.1.s390x", "openSUSE Leap 15.4:busybox-testsuite-1.35.0-150400.3.3.1.x86_64", "openSUSE Leap 15.4:busybox-warewulf3-1.35.0-150400.3.3.1.aarch64", "openSUSE Leap 15.4:busybox-warewulf3-1.35.0-150400.3.3.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 6.6, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-1.35.0-150400.3.3.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-1.35.0-150400.3.3.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-1.35.0-150400.3.3.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-1.35.0-150400.3.3.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-static-1.35.0-150400.3.3.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-static-1.35.0-150400.3.3.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-static-1.35.0-150400.3.3.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-static-1.35.0-150400.3.3.1.x86_64", "openSUSE Leap 15.4:busybox-1.35.0-150400.3.3.1.aarch64", "openSUSE Leap 15.4:busybox-1.35.0-150400.3.3.1.ppc64le", "openSUSE Leap 15.4:busybox-1.35.0-150400.3.3.1.s390x", "openSUSE Leap 15.4:busybox-1.35.0-150400.3.3.1.x86_64", "openSUSE Leap 15.4:busybox-static-1.35.0-150400.3.3.1.aarch64", "openSUSE Leap 15.4:busybox-static-1.35.0-150400.3.3.1.ppc64le", "openSUSE Leap 15.4:busybox-static-1.35.0-150400.3.3.1.s390x", "openSUSE Leap 15.4:busybox-static-1.35.0-150400.3.3.1.x86_64", "openSUSE Leap 15.4:busybox-testsuite-1.35.0-150400.3.3.1.aarch64", "openSUSE Leap 15.4:busybox-testsuite-1.35.0-150400.3.3.1.ppc64le", "openSUSE Leap 15.4:busybox-testsuite-1.35.0-150400.3.3.1.s390x", "openSUSE Leap 15.4:busybox-testsuite-1.35.0-150400.3.3.1.x86_64", "openSUSE Leap 15.4:busybox-warewulf3-1.35.0-150400.3.3.1.aarch64", "openSUSE Leap 15.4:busybox-warewulf3-1.35.0-150400.3.3.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2022-11-11T14:38:22Z", details: "moderate", }, ], title: "CVE-2021-42386", }, ], }
suse-su-2022:4253-1
Vulnerability from csaf_suse
Published
2022-11-28 10:23
Modified
2022-11-28 10:23
Summary
Security update for busybox
Notes
Title of the patch
Security update for busybox
Description of the patch
This update for busybox fixes the following issues:
- CVE-2014-9645: Fixed loading of unwanted modules with / (bsc#914660).
- CVE-2017-16544: Fixed insufficient sanitization of filenames when autocompleting (bsc#1069412).
- CVE-2015-9261: Fixed huft_build misuses a pointer, causing segfaults (bsc#1102912).
- CVE-2016-2147: Fixed out of bounds write (heap) due to integer underflow in udhcpc (bsc#970663).
- CVE-2016-2148: Fixed heap-based buffer overflow in OPTION_6RD parsing (bsc#970662).
- CVE-2016-6301: Fixed NTP server denial of service flaw (bsc#991940).
- CVE-2017-15873: Fixed integer overflow in get_next_block function in archival/libarchive/decompress_bunzip2.c (bsc#1064976).
- CVE-2017-15874: Fixed integer overflow in archival/libarchive/decompress_unlzma (bsc#1064978).
- CVE-2019-5747: Fixed out of bounds read in udhcp components (bsc#1121428).
- CVE-2021-42373, CVE-2021-42374, CVE-2021-42375, CVE-2021-42376, CVE-2021-42377, CVE-2021-42378, CVE-2021-42379, CVE-2021-42380, CVE-2021-42381, CVE-2021-42382, CVE-2021-42383, CVE-2021-42384, CVE-2021-42385, CVE-2021-42386: v1.34.0 bugfixes (bsc#1192869).
- CVE-2021-28831: Fixed invalid free or segmentation fault via malformed gzip data (bsc#1184522).
- CVE-2018-20679: Fixed out of bounds read in udhcp (bsc#1121426).
- CVE-2018-1000517: Fixed heap-based buffer overflow in the retrieve_file_data() (bsc#1099260).
- CVE-2011-5325: Fixed tar directory traversal (bsc#951562).
- CVE-2018-1000500: Fixed missing SSL certificate validation in wget (bsc#1099263).
- Update to 1.35.0
- awk: fix printf %%, fix read beyond end of buffer
- chrt: silence analyzer warning
- libarchive: remove duplicate forward declaration
- mount: 'mount -o rw ....' should not fall back to RO mount
- ps: fix -o pid=PID,args interpreting entire 'PID,args' as header
- tar: prevent malicious archives with long name sizes causing OOM
- udhcpc6: fix udhcp_find_option to actually find DHCP6 options
- xxd: fix -p -r
- support for new optoins added to basename, cpio, date, find,
mktemp, wget and others
- Enable fdisk (jsc#CAR-16)
- Update to 1.34.1:
* build system: use SOURCE_DATE_EPOCH for timestamp if available
* many bug fixes and new features
* touch: make FEATURE_TOUCH_NODEREF unconditional
- update to 1.33.1:
* httpd: fix sendfile
* ash: fix HISTFILE corruptio
* ash: fix unset variable pattern expansion
* traceroute: fix option parsing
* gunzip: fix for archive corruption
- Update to version 1.33.0
- many bug fixes and new features
- Update to version 1.32.1
- fixes a case where in ash, 'wait' never finishes.
- prepare usrmerge (bsc#1029961)
- Enable testsuite and package it for later rerun (for QA, jsc#CAR-15)
- Update to version 1.31.1:
+ Bug fix release. 1.30.1 has fixes for dc, ash (PS1 expansion
fix), hush, dpkg-deb, telnet and wget.
- Changes from version 1.31.0:
+ many bugfixes and new features.
- Add busybox-no-stime.patch: stime() has been deprecated in glibc
2.31 and replaced with clock_settime().
- update to 1.25.1:
* fixes for hush, gunzip, ip route, ntpd
- includes changes from 1.25.0:
* many added and expanded implementations of command options
- includes changes from 1.24.2:
* fixes for build system (static build with glibc fixed),
truncate, gunzip and unzip.
- Update to version 1.24.1
* for a full list of changes see http://www.busybox.net/news.html
- Refresh busybox.install.patch
- Update to 1.23.2
* for a full list of changes see http://www.busybox.net/news.html
- Cleaned up spec file with spec-cleaner
- Refreshed patches
- update to 1.22.1:
Many updates and fixes for most included tools, see
see http://www.busybox.net/news.html
Patchnames
SUSE-2022-4253,SUSE-OpenStack-Cloud-9-2022-4253,SUSE-OpenStack-Cloud-Crowbar-9-2022-4253,SUSE-SLE-SAP-12-SP4-2022-4253,SUSE-SLE-SERVER-12-SP2-BCL-2022-4253,SUSE-SLE-SERVER-12-SP3-BCL-2022-4253,SUSE-SLE-SERVER-12-SP4-LTSS-2022-4253,SUSE-SLE-SERVER-12-SP5-2022-4253
Terms of use
CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
{ document: { aggregate_severity: { namespace: "https://www.suse.com/support/security/rating/", text: "important", }, category: "csaf_security_advisory", csaf_version: "2.0", distribution: { text: "Copyright 2024 SUSE LLC. All rights reserved.", tlp: { label: "WHITE", url: "https://www.first.org/tlp/", }, }, lang: "en", notes: [ { category: "summary", text: "Security update for busybox", title: "Title of the patch", }, { category: "description", text: "This update for busybox fixes the following issues:\n\n- CVE-2014-9645: Fixed loading of unwanted modules with / (bsc#914660).\n- CVE-2017-16544: Fixed insufficient sanitization of filenames when autocompleting (bsc#1069412).\n- CVE-2015-9261: Fixed huft_build misuses a pointer, causing segfaults (bsc#1102912).\n- CVE-2016-2147: Fixed out of bounds write (heap) due to integer underflow in udhcpc (bsc#970663).\n- CVE-2016-2148: Fixed heap-based buffer overflow in OPTION_6RD parsing (bsc#970662).\n- CVE-2016-6301: Fixed NTP server denial of service flaw (bsc#991940).\n- CVE-2017-15873: Fixed integer overflow in get_next_block function in archival/libarchive/decompress_bunzip2.c (bsc#1064976).\n- CVE-2017-15874: Fixed integer overflow in archival/libarchive/decompress_unlzma (bsc#1064978).\n- CVE-2019-5747: Fixed out of bounds read in udhcp components (bsc#1121428).\n- CVE-2021-42373, CVE-2021-42374, CVE-2021-42375, CVE-2021-42376, CVE-2021-42377, CVE-2021-42378, CVE-2021-42379, CVE-2021-42380, CVE-2021-42381, CVE-2021-42382, CVE-2021-42383, CVE-2021-42384, CVE-2021-42385, CVE-2021-42386: v1.34.0 bugfixes (bsc#1192869).\n- CVE-2021-28831: Fixed invalid free or segmentation fault via malformed gzip data (bsc#1184522).\n- CVE-2018-20679: Fixed out of bounds read in udhcp (bsc#1121426).\n- CVE-2018-1000517: Fixed heap-based buffer overflow in the retrieve_file_data() (bsc#1099260).\n- CVE-2011-5325: Fixed tar directory traversal (bsc#951562).\n- CVE-2018-1000500: Fixed missing SSL certificate validation in wget (bsc#1099263).\n \n- Update to 1.35.0\n - awk: fix printf %%, fix read beyond end of buffer\n - chrt: silence analyzer warning\n - libarchive: remove duplicate forward declaration\n - mount: 'mount -o rw ....' should not fall back to RO mount\n - ps: fix -o pid=PID,args interpreting entire 'PID,args' as header\n - tar: prevent malicious archives with long name sizes causing OOM\n - udhcpc6: fix udhcp_find_option to actually find DHCP6 options\n - xxd: fix -p -r\n - support for new optoins added to basename, cpio, date, find, \n mktemp, wget and others\n\n- Enable fdisk (jsc#CAR-16)\n\n- Update to 1.34.1:\n * build system: use SOURCE_DATE_EPOCH for timestamp if available\n * many bug fixes and new features\n * touch: make FEATURE_TOUCH_NODEREF unconditional\n \n- update to 1.33.1:\n * httpd: fix sendfile\n * ash: fix HISTFILE corruptio\n * ash: fix unset variable pattern expansion\n * traceroute: fix option parsing\n * gunzip: fix for archive corruption\n\n- Update to version 1.33.0\n - many bug fixes and new features\n\n- Update to version 1.32.1\n - fixes a case where in ash, 'wait' never finishes. \n\n- prepare usrmerge (bsc#1029961)\n\n- Enable testsuite and package it for later rerun (for QA, jsc#CAR-15)\n\n- Update to version 1.31.1:\n + Bug fix release. 1.30.1 has fixes for dc, ash (PS1 expansion\n fix), hush, dpkg-deb, telnet and wget.\n- Changes from version 1.31.0:\n + many bugfixes and new features.\n- Add busybox-no-stime.patch: stime() has been deprecated in glibc\n 2.31 and replaced with clock_settime().\n\n- update to 1.25.1:\n * fixes for hush, gunzip, ip route, ntpd\n- includes changes from 1.25.0:\n * many added and expanded implementations of command options\n- includes changes from 1.24.2:\n * fixes for build system (static build with glibc fixed),\n truncate, gunzip and unzip. \n\n- Update to version 1.24.1\n * for a full list of changes see http://www.busybox.net/news.html\n- Refresh busybox.install.patch \n\n- Update to 1.23.2\n * for a full list of changes see http://www.busybox.net/news.html\n- Cleaned up spec file with spec-cleaner\n- Refreshed patches\n\n- update to 1.22.1:\n Many updates and fixes for most included tools, see\n see http://www.busybox.net/news.html\n", title: "Description of the patch", }, { category: "details", text: "SUSE-2022-4253,SUSE-OpenStack-Cloud-9-2022-4253,SUSE-OpenStack-Cloud-Crowbar-9-2022-4253,SUSE-SLE-SAP-12-SP4-2022-4253,SUSE-SLE-SERVER-12-SP2-BCL-2022-4253,SUSE-SLE-SERVER-12-SP3-BCL-2022-4253,SUSE-SLE-SERVER-12-SP4-LTSS-2022-4253,SUSE-SLE-SERVER-12-SP5-2022-4253", title: "Patchnames", }, { category: "legal_disclaimer", text: "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", title: "Terms of use", }, ], publisher: { category: "vendor", contact_details: "https://www.suse.com/support/security/contact/", name: "SUSE Product Security Team", namespace: "https://www.suse.com/", }, references: [ { category: "external", summary: "SUSE ratings", url: "https://www.suse.com/support/security/rating/", }, { category: "self", summary: "URL of this CSAF notice", url: "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2022_4253-1.json", }, { category: "self", summary: "URL for SUSE-SU-2022:4253-1", url: "https://www.suse.com/support/update/announcement/2022/suse-su-20224253-1/", }, { category: "self", summary: "E-Mail link for SUSE-SU-2022:4253-1", url: "https://lists.suse.com/pipermail/sle-security-updates/2022-November/013126.html", }, { category: "self", summary: "SUSE Bug 1029961", url: "https://bugzilla.suse.com/1029961", }, { category: "self", summary: "SUSE Bug 1064976", url: "https://bugzilla.suse.com/1064976", }, { category: "self", summary: "SUSE Bug 1064978", url: "https://bugzilla.suse.com/1064978", }, { category: "self", summary: "SUSE Bug 1069412", url: "https://bugzilla.suse.com/1069412", }, { category: "self", summary: "SUSE Bug 1099260", url: "https://bugzilla.suse.com/1099260", }, { category: "self", summary: "SUSE Bug 1099263", url: "https://bugzilla.suse.com/1099263", }, { category: "self", summary: "SUSE Bug 1102912", url: "https://bugzilla.suse.com/1102912", }, { category: "self", summary: "SUSE Bug 1121426", url: "https://bugzilla.suse.com/1121426", }, { category: "self", summary: "SUSE Bug 1121428", url: "https://bugzilla.suse.com/1121428", }, { category: "self", summary: "SUSE Bug 1184522", url: "https://bugzilla.suse.com/1184522", }, { category: "self", summary: "SUSE Bug 1191514", url: "https://bugzilla.suse.com/1191514", }, { category: "self", summary: "SUSE Bug 1192869", url: "https://bugzilla.suse.com/1192869", }, { category: "self", summary: "SUSE Bug 914660", url: "https://bugzilla.suse.com/914660", }, { category: "self", summary: "SUSE Bug 951562", url: "https://bugzilla.suse.com/951562", }, { category: "self", summary: "SUSE Bug 970662", url: "https://bugzilla.suse.com/970662", }, { category: "self", summary: "SUSE Bug 970663", url: "https://bugzilla.suse.com/970663", }, { category: "self", summary: "SUSE Bug 991940", url: "https://bugzilla.suse.com/991940", }, { category: "self", summary: "SUSE CVE CVE-2011-5325 page", url: "https://www.suse.com/security/cve/CVE-2011-5325/", }, { category: "self", summary: "SUSE CVE CVE-2014-9645 page", url: "https://www.suse.com/security/cve/CVE-2014-9645/", }, { category: "self", summary: "SUSE CVE CVE-2015-9261 page", url: "https://www.suse.com/security/cve/CVE-2015-9261/", }, { category: "self", summary: "SUSE CVE CVE-2016-2147 page", url: "https://www.suse.com/security/cve/CVE-2016-2147/", }, { category: "self", summary: "SUSE CVE CVE-2016-2148 page", url: "https://www.suse.com/security/cve/CVE-2016-2148/", }, { category: "self", summary: "SUSE CVE CVE-2016-6301 page", url: "https://www.suse.com/security/cve/CVE-2016-6301/", }, { category: "self", summary: "SUSE CVE CVE-2017-15873 page", url: "https://www.suse.com/security/cve/CVE-2017-15873/", }, { category: "self", summary: "SUSE CVE CVE-2017-15874 page", url: "https://www.suse.com/security/cve/CVE-2017-15874/", }, { category: "self", summary: "SUSE CVE CVE-2017-16544 page", url: "https://www.suse.com/security/cve/CVE-2017-16544/", }, { category: "self", summary: "SUSE CVE CVE-2018-1000500 page", url: "https://www.suse.com/security/cve/CVE-2018-1000500/", }, { category: "self", summary: "SUSE CVE CVE-2018-1000517 page", url: "https://www.suse.com/security/cve/CVE-2018-1000517/", }, { category: "self", summary: "SUSE CVE CVE-2018-20679 page", url: "https://www.suse.com/security/cve/CVE-2018-20679/", }, { category: "self", summary: "SUSE CVE CVE-2019-5747 page", url: "https://www.suse.com/security/cve/CVE-2019-5747/", }, { category: "self", summary: "SUSE CVE CVE-2021-28831 page", url: "https://www.suse.com/security/cve/CVE-2021-28831/", }, { category: "self", summary: "SUSE CVE CVE-2021-42373 page", url: "https://www.suse.com/security/cve/CVE-2021-42373/", }, { category: "self", summary: "SUSE CVE CVE-2021-42374 page", url: "https://www.suse.com/security/cve/CVE-2021-42374/", }, { category: "self", summary: "SUSE CVE CVE-2021-42375 page", url: "https://www.suse.com/security/cve/CVE-2021-42375/", }, { category: "self", summary: "SUSE CVE CVE-2021-42376 page", url: "https://www.suse.com/security/cve/CVE-2021-42376/", }, { category: "self", summary: "SUSE CVE CVE-2021-42377 page", url: "https://www.suse.com/security/cve/CVE-2021-42377/", }, { category: "self", summary: "SUSE CVE CVE-2021-42378 page", url: "https://www.suse.com/security/cve/CVE-2021-42378/", }, { category: "self", summary: "SUSE CVE CVE-2021-42379 page", url: "https://www.suse.com/security/cve/CVE-2021-42379/", }, { category: "self", summary: "SUSE CVE CVE-2021-42380 page", url: "https://www.suse.com/security/cve/CVE-2021-42380/", }, { category: "self", summary: "SUSE CVE CVE-2021-42381 page", url: "https://www.suse.com/security/cve/CVE-2021-42381/", }, { category: "self", summary: "SUSE CVE CVE-2021-42382 page", url: "https://www.suse.com/security/cve/CVE-2021-42382/", }, { category: "self", summary: "SUSE CVE CVE-2021-42383 page", url: "https://www.suse.com/security/cve/CVE-2021-42383/", }, { category: "self", summary: "SUSE CVE CVE-2021-42384 page", url: "https://www.suse.com/security/cve/CVE-2021-42384/", }, { category: "self", summary: "SUSE CVE CVE-2021-42385 page", url: "https://www.suse.com/security/cve/CVE-2021-42385/", }, { category: "self", summary: "SUSE CVE CVE-2021-42386 page", url: "https://www.suse.com/security/cve/CVE-2021-42386/", }, ], title: "Security update for busybox", tracking: { current_release_date: "2022-11-28T10:23:47Z", generator: { date: "2022-11-28T10:23:47Z", engine: { name: "cve-database.git:bin/generate-csaf.pl", version: "1", }, }, id: "SUSE-SU-2022:4253-1", initial_release_date: "2022-11-28T10:23:47Z", revision_history: [ { date: "2022-11-28T10:23:47Z", number: "1", summary: "Current version", }, ], status: "final", version: "1", }, }, product_tree: { branches: [ { branches: [ { branches: [ { category: "product_version", name: "busybox-1.35.0-4.3.1.aarch64", product: { name: "busybox-1.35.0-4.3.1.aarch64", product_id: "busybox-1.35.0-4.3.1.aarch64", }, }, { category: "product_version", name: "busybox-static-1.35.0-4.3.1.aarch64", product: { name: "busybox-static-1.35.0-4.3.1.aarch64", product_id: "busybox-static-1.35.0-4.3.1.aarch64", }, }, { category: "product_version", name: "busybox-testsuite-1.35.0-4.3.1.aarch64", product: { name: "busybox-testsuite-1.35.0-4.3.1.aarch64", product_id: "busybox-testsuite-1.35.0-4.3.1.aarch64", }, }, { category: "product_version", name: "busybox-warewulf3-1.35.0-4.3.1.aarch64", product: { name: "busybox-warewulf3-1.35.0-4.3.1.aarch64", product_id: "busybox-warewulf3-1.35.0-4.3.1.aarch64", }, }, ], category: "architecture", name: "aarch64", }, { branches: [ { category: "product_version", name: "busybox-1.35.0-4.3.1.i586", product: { name: "busybox-1.35.0-4.3.1.i586", product_id: "busybox-1.35.0-4.3.1.i586", }, }, { category: "product_version", name: "busybox-static-1.35.0-4.3.1.i586", product: { name: "busybox-static-1.35.0-4.3.1.i586", product_id: "busybox-static-1.35.0-4.3.1.i586", }, }, { category: "product_version", name: "busybox-testsuite-1.35.0-4.3.1.i586", product: { name: "busybox-testsuite-1.35.0-4.3.1.i586", product_id: "busybox-testsuite-1.35.0-4.3.1.i586", }, }, { category: "product_version", name: "busybox-warewulf3-1.35.0-4.3.1.i586", product: { name: "busybox-warewulf3-1.35.0-4.3.1.i586", product_id: "busybox-warewulf3-1.35.0-4.3.1.i586", }, }, ], category: "architecture", name: "i586", }, { branches: [ { category: "product_version", name: "busybox-1.35.0-4.3.1.ppc64le", product: { name: "busybox-1.35.0-4.3.1.ppc64le", product_id: "busybox-1.35.0-4.3.1.ppc64le", }, }, { category: "product_version", name: "busybox-static-1.35.0-4.3.1.ppc64le", product: { name: "busybox-static-1.35.0-4.3.1.ppc64le", product_id: "busybox-static-1.35.0-4.3.1.ppc64le", }, }, { category: "product_version", name: "busybox-testsuite-1.35.0-4.3.1.ppc64le", product: { name: "busybox-testsuite-1.35.0-4.3.1.ppc64le", product_id: "busybox-testsuite-1.35.0-4.3.1.ppc64le", }, }, ], category: "architecture", name: "ppc64le", }, { branches: [ { category: "product_version", name: "busybox-1.35.0-4.3.1.s390", product: { name: "busybox-1.35.0-4.3.1.s390", product_id: "busybox-1.35.0-4.3.1.s390", }, }, { category: "product_version", name: "busybox-static-1.35.0-4.3.1.s390", product: { name: "busybox-static-1.35.0-4.3.1.s390", product_id: "busybox-static-1.35.0-4.3.1.s390", }, }, { category: "product_version", name: "busybox-testsuite-1.35.0-4.3.1.s390", product: { name: "busybox-testsuite-1.35.0-4.3.1.s390", product_id: "busybox-testsuite-1.35.0-4.3.1.s390", }, }, ], category: "architecture", name: "s390", }, { branches: [ { category: "product_version", name: "busybox-1.35.0-4.3.1.s390x", product: { name: "busybox-1.35.0-4.3.1.s390x", product_id: "busybox-1.35.0-4.3.1.s390x", }, }, { category: "product_version", name: "busybox-static-1.35.0-4.3.1.s390x", product: { name: "busybox-static-1.35.0-4.3.1.s390x", product_id: "busybox-static-1.35.0-4.3.1.s390x", }, }, { category: "product_version", name: "busybox-testsuite-1.35.0-4.3.1.s390x", product: { name: "busybox-testsuite-1.35.0-4.3.1.s390x", product_id: "busybox-testsuite-1.35.0-4.3.1.s390x", }, }, ], category: "architecture", name: "s390x", }, { branches: [ { category: "product_version", name: "busybox-1.35.0-4.3.1.x86_64", product: { name: "busybox-1.35.0-4.3.1.x86_64", product_id: "busybox-1.35.0-4.3.1.x86_64", }, }, { category: "product_version", name: "busybox-static-1.35.0-4.3.1.x86_64", product: { name: "busybox-static-1.35.0-4.3.1.x86_64", product_id: "busybox-static-1.35.0-4.3.1.x86_64", }, }, { category: "product_version", name: "busybox-testsuite-1.35.0-4.3.1.x86_64", product: { name: "busybox-testsuite-1.35.0-4.3.1.x86_64", product_id: "busybox-testsuite-1.35.0-4.3.1.x86_64", }, }, { category: "product_version", name: "busybox-warewulf3-1.35.0-4.3.1.x86_64", product: { name: "busybox-warewulf3-1.35.0-4.3.1.x86_64", product_id: "busybox-warewulf3-1.35.0-4.3.1.x86_64", }, }, ], category: "architecture", name: "x86_64", }, { branches: [ { category: "product_name", name: "SUSE OpenStack Cloud 9", product: { name: "SUSE OpenStack Cloud 9", product_id: "SUSE OpenStack Cloud 9", product_identification_helper: { cpe: "cpe:/o:suse:suse-openstack-cloud:9", }, }, }, { category: "product_name", name: "SUSE OpenStack Cloud Crowbar 9", product: { name: "SUSE OpenStack Cloud Crowbar 9", product_id: "SUSE OpenStack Cloud Crowbar 9", product_identification_helper: { cpe: "cpe:/o:suse:suse-openstack-cloud-crowbar:9", }, }, }, { category: "product_name", name: "SUSE Linux Enterprise Server for SAP Applications 12 SP4", product: { name: "SUSE Linux Enterprise Server for SAP Applications 12 SP4", product_id: "SUSE Linux Enterprise Server for SAP Applications 12 SP4", product_identification_helper: { cpe: "cpe:/o:suse:sles_sap:12:sp4", }, }, }, { category: "product_name", name: "SUSE Linux Enterprise Server 12 SP2-BCL", product: { name: "SUSE Linux Enterprise Server 12 SP2-BCL", product_id: "SUSE Linux Enterprise Server 12 SP2-BCL", product_identification_helper: { cpe: "cpe:/o:suse:sles-bcl:12:sp2", }, }, }, { category: "product_name", name: "SUSE Linux Enterprise Server 12 SP3-BCL", product: { name: "SUSE Linux Enterprise Server 12 SP3-BCL", product_id: "SUSE Linux Enterprise Server 12 SP3-BCL", product_identification_helper: { cpe: "cpe:/o:suse:sles-bcl:12:sp3", }, }, }, { category: "product_name", name: "SUSE Linux Enterprise Server 12 SP4-LTSS", product: { name: "SUSE Linux Enterprise Server 12 SP4-LTSS", product_id: "SUSE Linux Enterprise Server 12 SP4-LTSS", product_identification_helper: { cpe: "cpe:/o:suse:sles-ltss:12:sp4", }, }, }, { category: "product_name", name: "SUSE Linux Enterprise Server 12 SP5", product: { name: "SUSE Linux Enterprise Server 12 SP5", product_id: "SUSE Linux Enterprise Server 12 SP5", product_identification_helper: { cpe: "cpe:/o:suse:sles:12:sp5", }, }, }, { category: "product_name", name: "SUSE Linux Enterprise Server for SAP Applications 12 SP5", product: { name: "SUSE Linux Enterprise Server for SAP Applications 12 SP5", product_id: "SUSE Linux Enterprise Server for SAP Applications 12 SP5", product_identification_helper: { cpe: "cpe:/o:suse:sles_sap:12:sp5", }, }, }, ], category: "product_family", name: "SUSE Linux Enterprise", }, ], category: "vendor", name: "SUSE", }, ], relationships: [ { category: "default_component_of", full_product_name: { name: "busybox-1.35.0-4.3.1.x86_64 as component of SUSE OpenStack Cloud 9", product_id: "SUSE OpenStack Cloud 9:busybox-1.35.0-4.3.1.x86_64", }, product_reference: "busybox-1.35.0-4.3.1.x86_64", relates_to_product_reference: "SUSE OpenStack Cloud 9", }, { category: "default_component_of", full_product_name: { name: "busybox-1.35.0-4.3.1.x86_64 as component of SUSE OpenStack Cloud Crowbar 9", product_id: "SUSE OpenStack Cloud Crowbar 9:busybox-1.35.0-4.3.1.x86_64", }, product_reference: "busybox-1.35.0-4.3.1.x86_64", relates_to_product_reference: "SUSE OpenStack Cloud Crowbar 9", }, { category: "default_component_of", full_product_name: { name: "busybox-1.35.0-4.3.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP4", product_id: "SUSE Linux Enterprise Server for SAP Applications 12 SP4:busybox-1.35.0-4.3.1.ppc64le", }, product_reference: "busybox-1.35.0-4.3.1.ppc64le", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 12 SP4", }, { category: "default_component_of", full_product_name: { name: "busybox-1.35.0-4.3.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP4", product_id: "SUSE Linux Enterprise Server for SAP Applications 12 SP4:busybox-1.35.0-4.3.1.x86_64", }, product_reference: "busybox-1.35.0-4.3.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 12 SP4", }, { category: "default_component_of", full_product_name: { name: "busybox-1.35.0-4.3.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP2-BCL", product_id: "SUSE Linux Enterprise Server 12 SP2-BCL:busybox-1.35.0-4.3.1.x86_64", }, product_reference: "busybox-1.35.0-4.3.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Server 12 SP2-BCL", }, { category: "default_component_of", full_product_name: { name: "busybox-1.35.0-4.3.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP3-BCL", product_id: "SUSE Linux Enterprise Server 12 SP3-BCL:busybox-1.35.0-4.3.1.x86_64", }, product_reference: "busybox-1.35.0-4.3.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Server 12 SP3-BCL", }, { category: "default_component_of", full_product_name: { name: "busybox-1.35.0-4.3.1.aarch64 as component of SUSE Linux Enterprise Server 12 SP4-LTSS", product_id: "SUSE Linux Enterprise Server 12 SP4-LTSS:busybox-1.35.0-4.3.1.aarch64", }, product_reference: "busybox-1.35.0-4.3.1.aarch64", relates_to_product_reference: "SUSE Linux Enterprise Server 12 SP4-LTSS", }, { category: "default_component_of", full_product_name: { name: "busybox-1.35.0-4.3.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP4-LTSS", product_id: "SUSE Linux Enterprise Server 12 SP4-LTSS:busybox-1.35.0-4.3.1.ppc64le", }, product_reference: "busybox-1.35.0-4.3.1.ppc64le", relates_to_product_reference: "SUSE Linux Enterprise Server 12 SP4-LTSS", }, { category: "default_component_of", full_product_name: { name: "busybox-1.35.0-4.3.1.s390x as component of SUSE Linux Enterprise Server 12 SP4-LTSS", product_id: "SUSE Linux Enterprise Server 12 SP4-LTSS:busybox-1.35.0-4.3.1.s390x", }, product_reference: "busybox-1.35.0-4.3.1.s390x", relates_to_product_reference: "SUSE Linux Enterprise Server 12 SP4-LTSS", }, { category: "default_component_of", full_product_name: { name: "busybox-1.35.0-4.3.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP4-LTSS", product_id: "SUSE Linux Enterprise Server 12 SP4-LTSS:busybox-1.35.0-4.3.1.x86_64", }, product_reference: "busybox-1.35.0-4.3.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Server 12 SP4-LTSS", }, { category: "default_component_of", full_product_name: { name: "busybox-1.35.0-4.3.1.aarch64 as component of SUSE Linux Enterprise Server 12 SP5", product_id: "SUSE Linux Enterprise Server 12 SP5:busybox-1.35.0-4.3.1.aarch64", }, product_reference: "busybox-1.35.0-4.3.1.aarch64", relates_to_product_reference: "SUSE Linux Enterprise Server 12 SP5", }, { category: "default_component_of", full_product_name: { name: "busybox-1.35.0-4.3.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP5", product_id: "SUSE Linux Enterprise Server 12 SP5:busybox-1.35.0-4.3.1.ppc64le", }, product_reference: "busybox-1.35.0-4.3.1.ppc64le", relates_to_product_reference: "SUSE Linux Enterprise Server 12 SP5", }, { category: "default_component_of", full_product_name: { name: "busybox-1.35.0-4.3.1.s390x as component of SUSE Linux Enterprise Server 12 SP5", product_id: "SUSE Linux Enterprise Server 12 SP5:busybox-1.35.0-4.3.1.s390x", }, product_reference: "busybox-1.35.0-4.3.1.s390x", relates_to_product_reference: "SUSE Linux Enterprise Server 12 SP5", }, { category: "default_component_of", full_product_name: { name: "busybox-1.35.0-4.3.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP5", product_id: "SUSE Linux Enterprise Server 12 SP5:busybox-1.35.0-4.3.1.x86_64", }, product_reference: "busybox-1.35.0-4.3.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Server 12 SP5", }, { category: "default_component_of", full_product_name: { name: "busybox-1.35.0-4.3.1.aarch64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5", product_id: "SUSE Linux Enterprise Server for SAP Applications 12 SP5:busybox-1.35.0-4.3.1.aarch64", }, product_reference: "busybox-1.35.0-4.3.1.aarch64", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 12 SP5", }, { category: "default_component_of", full_product_name: { name: "busybox-1.35.0-4.3.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5", product_id: "SUSE Linux Enterprise Server for SAP Applications 12 SP5:busybox-1.35.0-4.3.1.ppc64le", }, product_reference: "busybox-1.35.0-4.3.1.ppc64le", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 12 SP5", }, { category: "default_component_of", full_product_name: { name: "busybox-1.35.0-4.3.1.s390x as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5", product_id: "SUSE Linux Enterprise Server for SAP Applications 12 SP5:busybox-1.35.0-4.3.1.s390x", }, product_reference: "busybox-1.35.0-4.3.1.s390x", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 12 SP5", }, { category: "default_component_of", full_product_name: { name: "busybox-1.35.0-4.3.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5", product_id: "SUSE Linux Enterprise Server for SAP Applications 12 SP5:busybox-1.35.0-4.3.1.x86_64", }, product_reference: "busybox-1.35.0-4.3.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 12 SP5", }, ], }, vulnerabilities: [ { cve: "CVE-2011-5325", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2011-5325", }, ], notes: [ { category: "general", text: "Directory traversal vulnerability in the BusyBox implementation of tar before 1.22.0 v5 allows remote attackers to point to files outside the current working directory via a symlink.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Server 12 SP2-BCL:busybox-1.35.0-4.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:busybox-1.35.0-4.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:busybox-1.35.0-4.3.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:busybox-1.35.0-4.3.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:busybox-1.35.0-4.3.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:busybox-1.35.0-4.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:busybox-1.35.0-4.3.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:busybox-1.35.0-4.3.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:busybox-1.35.0-4.3.1.s390x", "SUSE Linux Enterprise Server 12 SP5:busybox-1.35.0-4.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:busybox-1.35.0-4.3.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:busybox-1.35.0-4.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:busybox-1.35.0-4.3.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:busybox-1.35.0-4.3.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:busybox-1.35.0-4.3.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:busybox-1.35.0-4.3.1.x86_64", "SUSE OpenStack Cloud 9:busybox-1.35.0-4.3.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:busybox-1.35.0-4.3.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2011-5325", url: "https://www.suse.com/security/cve/CVE-2011-5325", }, { category: "external", summary: "SUSE Bug 951562 for CVE-2011-5325", url: "https://bugzilla.suse.com/951562", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Server 12 SP2-BCL:busybox-1.35.0-4.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:busybox-1.35.0-4.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:busybox-1.35.0-4.3.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:busybox-1.35.0-4.3.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:busybox-1.35.0-4.3.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:busybox-1.35.0-4.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:busybox-1.35.0-4.3.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:busybox-1.35.0-4.3.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:busybox-1.35.0-4.3.1.s390x", "SUSE Linux Enterprise Server 12 SP5:busybox-1.35.0-4.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:busybox-1.35.0-4.3.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:busybox-1.35.0-4.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:busybox-1.35.0-4.3.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:busybox-1.35.0-4.3.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:busybox-1.35.0-4.3.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:busybox-1.35.0-4.3.1.x86_64", "SUSE OpenStack Cloud 9:busybox-1.35.0-4.3.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:busybox-1.35.0-4.3.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 7.5, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N", version: "3.1", }, products: [ "SUSE Linux Enterprise Server 12 SP2-BCL:busybox-1.35.0-4.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:busybox-1.35.0-4.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:busybox-1.35.0-4.3.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:busybox-1.35.0-4.3.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:busybox-1.35.0-4.3.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:busybox-1.35.0-4.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:busybox-1.35.0-4.3.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:busybox-1.35.0-4.3.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:busybox-1.35.0-4.3.1.s390x", "SUSE Linux Enterprise Server 12 SP5:busybox-1.35.0-4.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:busybox-1.35.0-4.3.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:busybox-1.35.0-4.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:busybox-1.35.0-4.3.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:busybox-1.35.0-4.3.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:busybox-1.35.0-4.3.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:busybox-1.35.0-4.3.1.x86_64", "SUSE OpenStack Cloud 9:busybox-1.35.0-4.3.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:busybox-1.35.0-4.3.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2022-11-28T10:23:47Z", details: "moderate", }, ], title: "CVE-2011-5325", }, { cve: "CVE-2014-9645", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2014-9645", }, ], notes: [ { category: "general", text: "The add_probe function in modutils/modprobe.c in BusyBox before 1.23.0 allows local users to bypass intended restrictions on loading kernel modules via a / (slash) character in a module name, as demonstrated by an \"ifconfig /usbserial up\" command or a \"mount -t /snd_pcm none /\" command.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Server 12 SP2-BCL:busybox-1.35.0-4.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:busybox-1.35.0-4.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:busybox-1.35.0-4.3.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:busybox-1.35.0-4.3.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:busybox-1.35.0-4.3.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:busybox-1.35.0-4.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:busybox-1.35.0-4.3.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:busybox-1.35.0-4.3.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:busybox-1.35.0-4.3.1.s390x", "SUSE Linux Enterprise Server 12 SP5:busybox-1.35.0-4.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:busybox-1.35.0-4.3.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:busybox-1.35.0-4.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:busybox-1.35.0-4.3.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:busybox-1.35.0-4.3.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:busybox-1.35.0-4.3.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:busybox-1.35.0-4.3.1.x86_64", "SUSE OpenStack Cloud 9:busybox-1.35.0-4.3.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:busybox-1.35.0-4.3.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2014-9645", url: "https://www.suse.com/security/cve/CVE-2014-9645", }, { category: "external", summary: "SUSE Bug 914423 for CVE-2014-9645", url: "https://bugzilla.suse.com/914423", }, { category: "external", summary: "SUSE Bug 914660 for CVE-2014-9645", url: "https://bugzilla.suse.com/914660", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Server 12 SP2-BCL:busybox-1.35.0-4.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:busybox-1.35.0-4.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:busybox-1.35.0-4.3.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:busybox-1.35.0-4.3.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:busybox-1.35.0-4.3.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:busybox-1.35.0-4.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:busybox-1.35.0-4.3.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:busybox-1.35.0-4.3.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:busybox-1.35.0-4.3.1.s390x", "SUSE Linux Enterprise Server 12 SP5:busybox-1.35.0-4.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:busybox-1.35.0-4.3.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:busybox-1.35.0-4.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:busybox-1.35.0-4.3.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:busybox-1.35.0-4.3.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:busybox-1.35.0-4.3.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:busybox-1.35.0-4.3.1.x86_64", "SUSE OpenStack Cloud 9:busybox-1.35.0-4.3.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:busybox-1.35.0-4.3.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.5, baseSeverity: "MEDIUM", vectorString: "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N", version: "3.0", }, products: [ "SUSE Linux Enterprise Server 12 SP2-BCL:busybox-1.35.0-4.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:busybox-1.35.0-4.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:busybox-1.35.0-4.3.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:busybox-1.35.0-4.3.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:busybox-1.35.0-4.3.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:busybox-1.35.0-4.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:busybox-1.35.0-4.3.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:busybox-1.35.0-4.3.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:busybox-1.35.0-4.3.1.s390x", "SUSE Linux Enterprise Server 12 SP5:busybox-1.35.0-4.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:busybox-1.35.0-4.3.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:busybox-1.35.0-4.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:busybox-1.35.0-4.3.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:busybox-1.35.0-4.3.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:busybox-1.35.0-4.3.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:busybox-1.35.0-4.3.1.x86_64", "SUSE OpenStack Cloud 9:busybox-1.35.0-4.3.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:busybox-1.35.0-4.3.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2022-11-28T10:23:47Z", details: "moderate", }, ], title: "CVE-2014-9645", }, { cve: "CVE-2015-9261", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2015-9261", }, ], notes: [ { category: "general", text: "huft_build in archival/libarchive/decompress_gunzip.c in BusyBox before 1.27.2 misuses a pointer, causing segfaults and an application crash during an unzip operation on a specially crafted ZIP file.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Server 12 SP2-BCL:busybox-1.35.0-4.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:busybox-1.35.0-4.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:busybox-1.35.0-4.3.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:busybox-1.35.0-4.3.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:busybox-1.35.0-4.3.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:busybox-1.35.0-4.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:busybox-1.35.0-4.3.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:busybox-1.35.0-4.3.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:busybox-1.35.0-4.3.1.s390x", "SUSE Linux Enterprise Server 12 SP5:busybox-1.35.0-4.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:busybox-1.35.0-4.3.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:busybox-1.35.0-4.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:busybox-1.35.0-4.3.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:busybox-1.35.0-4.3.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:busybox-1.35.0-4.3.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:busybox-1.35.0-4.3.1.x86_64", "SUSE OpenStack Cloud 9:busybox-1.35.0-4.3.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:busybox-1.35.0-4.3.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2015-9261", url: "https://www.suse.com/security/cve/CVE-2015-9261", }, { category: "external", summary: "SUSE Bug 1102912 for CVE-2015-9261", url: "https://bugzilla.suse.com/1102912", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Server 12 SP2-BCL:busybox-1.35.0-4.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:busybox-1.35.0-4.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:busybox-1.35.0-4.3.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:busybox-1.35.0-4.3.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:busybox-1.35.0-4.3.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:busybox-1.35.0-4.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:busybox-1.35.0-4.3.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:busybox-1.35.0-4.3.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:busybox-1.35.0-4.3.1.s390x", "SUSE Linux Enterprise Server 12 SP5:busybox-1.35.0-4.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:busybox-1.35.0-4.3.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:busybox-1.35.0-4.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:busybox-1.35.0-4.3.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:busybox-1.35.0-4.3.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:busybox-1.35.0-4.3.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:busybox-1.35.0-4.3.1.x86_64", "SUSE OpenStack Cloud 9:busybox-1.35.0-4.3.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:busybox-1.35.0-4.3.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.5, baseSeverity: "MEDIUM", vectorString: "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", version: "3.0", }, products: [ "SUSE Linux Enterprise Server 12 SP2-BCL:busybox-1.35.0-4.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:busybox-1.35.0-4.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:busybox-1.35.0-4.3.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:busybox-1.35.0-4.3.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:busybox-1.35.0-4.3.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:busybox-1.35.0-4.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:busybox-1.35.0-4.3.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:busybox-1.35.0-4.3.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:busybox-1.35.0-4.3.1.s390x", "SUSE Linux Enterprise Server 12 SP5:busybox-1.35.0-4.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:busybox-1.35.0-4.3.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:busybox-1.35.0-4.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:busybox-1.35.0-4.3.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:busybox-1.35.0-4.3.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:busybox-1.35.0-4.3.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:busybox-1.35.0-4.3.1.x86_64", "SUSE OpenStack Cloud 9:busybox-1.35.0-4.3.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:busybox-1.35.0-4.3.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2022-11-28T10:23:47Z", details: "moderate", }, ], title: "CVE-2015-9261", }, { cve: "CVE-2016-2147", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2016-2147", }, ], notes: [ { category: "general", text: "Integer overflow in the DHCP client (udhcpc) in BusyBox before 1.25.0 allows remote attackers to cause a denial of service (crash) via a malformed RFC1035-encoded domain name, which triggers an out-of-bounds heap write.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Server 12 SP2-BCL:busybox-1.35.0-4.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:busybox-1.35.0-4.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:busybox-1.35.0-4.3.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:busybox-1.35.0-4.3.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:busybox-1.35.0-4.3.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:busybox-1.35.0-4.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:busybox-1.35.0-4.3.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:busybox-1.35.0-4.3.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:busybox-1.35.0-4.3.1.s390x", "SUSE Linux Enterprise Server 12 SP5:busybox-1.35.0-4.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:busybox-1.35.0-4.3.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:busybox-1.35.0-4.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:busybox-1.35.0-4.3.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:busybox-1.35.0-4.3.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:busybox-1.35.0-4.3.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:busybox-1.35.0-4.3.1.x86_64", "SUSE OpenStack Cloud 9:busybox-1.35.0-4.3.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:busybox-1.35.0-4.3.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2016-2147", url: "https://www.suse.com/security/cve/CVE-2016-2147", }, { category: "external", summary: "SUSE Bug 970663 for CVE-2016-2147", url: "https://bugzilla.suse.com/970663", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Server 12 SP2-BCL:busybox-1.35.0-4.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:busybox-1.35.0-4.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:busybox-1.35.0-4.3.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:busybox-1.35.0-4.3.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:busybox-1.35.0-4.3.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:busybox-1.35.0-4.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:busybox-1.35.0-4.3.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:busybox-1.35.0-4.3.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:busybox-1.35.0-4.3.1.s390x", "SUSE Linux Enterprise Server 12 SP5:busybox-1.35.0-4.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:busybox-1.35.0-4.3.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:busybox-1.35.0-4.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:busybox-1.35.0-4.3.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:busybox-1.35.0-4.3.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:busybox-1.35.0-4.3.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:busybox-1.35.0-4.3.1.x86_64", "SUSE OpenStack Cloud 9:busybox-1.35.0-4.3.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:busybox-1.35.0-4.3.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 7.5, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Server 12 SP2-BCL:busybox-1.35.0-4.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:busybox-1.35.0-4.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:busybox-1.35.0-4.3.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:busybox-1.35.0-4.3.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:busybox-1.35.0-4.3.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:busybox-1.35.0-4.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:busybox-1.35.0-4.3.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:busybox-1.35.0-4.3.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:busybox-1.35.0-4.3.1.s390x", "SUSE Linux Enterprise Server 12 SP5:busybox-1.35.0-4.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:busybox-1.35.0-4.3.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:busybox-1.35.0-4.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:busybox-1.35.0-4.3.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:busybox-1.35.0-4.3.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:busybox-1.35.0-4.3.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:busybox-1.35.0-4.3.1.x86_64", "SUSE OpenStack Cloud 9:busybox-1.35.0-4.3.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:busybox-1.35.0-4.3.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2022-11-28T10:23:47Z", details: "important", }, ], title: "CVE-2016-2147", }, { cve: "CVE-2016-2148", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2016-2148", }, ], notes: [ { category: "general", text: "Heap-based buffer overflow in the DHCP client (udhcpc) in BusyBox before 1.25.0 allows remote attackers to have unspecified impact via vectors involving OPTION_6RD parsing.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Server 12 SP2-BCL:busybox-1.35.0-4.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:busybox-1.35.0-4.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:busybox-1.35.0-4.3.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:busybox-1.35.0-4.3.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:busybox-1.35.0-4.3.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:busybox-1.35.0-4.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:busybox-1.35.0-4.3.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:busybox-1.35.0-4.3.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:busybox-1.35.0-4.3.1.s390x", "SUSE Linux Enterprise Server 12 SP5:busybox-1.35.0-4.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:busybox-1.35.0-4.3.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:busybox-1.35.0-4.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:busybox-1.35.0-4.3.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:busybox-1.35.0-4.3.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:busybox-1.35.0-4.3.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:busybox-1.35.0-4.3.1.x86_64", "SUSE OpenStack Cloud 9:busybox-1.35.0-4.3.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:busybox-1.35.0-4.3.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2016-2148", url: "https://www.suse.com/security/cve/CVE-2016-2148", }, { category: "external", summary: "SUSE Bug 970662 for CVE-2016-2148", url: "https://bugzilla.suse.com/970662", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Server 12 SP2-BCL:busybox-1.35.0-4.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:busybox-1.35.0-4.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:busybox-1.35.0-4.3.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:busybox-1.35.0-4.3.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:busybox-1.35.0-4.3.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:busybox-1.35.0-4.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:busybox-1.35.0-4.3.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:busybox-1.35.0-4.3.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:busybox-1.35.0-4.3.1.s390x", "SUSE Linux Enterprise Server 12 SP5:busybox-1.35.0-4.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:busybox-1.35.0-4.3.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:busybox-1.35.0-4.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:busybox-1.35.0-4.3.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:busybox-1.35.0-4.3.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:busybox-1.35.0-4.3.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:busybox-1.35.0-4.3.1.x86_64", "SUSE OpenStack Cloud 9:busybox-1.35.0-4.3.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:busybox-1.35.0-4.3.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 9.8, baseSeverity: "CRITICAL", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Server 12 SP2-BCL:busybox-1.35.0-4.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:busybox-1.35.0-4.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:busybox-1.35.0-4.3.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:busybox-1.35.0-4.3.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:busybox-1.35.0-4.3.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:busybox-1.35.0-4.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:busybox-1.35.0-4.3.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:busybox-1.35.0-4.3.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:busybox-1.35.0-4.3.1.s390x", "SUSE Linux Enterprise Server 12 SP5:busybox-1.35.0-4.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:busybox-1.35.0-4.3.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:busybox-1.35.0-4.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:busybox-1.35.0-4.3.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:busybox-1.35.0-4.3.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:busybox-1.35.0-4.3.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:busybox-1.35.0-4.3.1.x86_64", "SUSE OpenStack Cloud 9:busybox-1.35.0-4.3.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:busybox-1.35.0-4.3.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2022-11-28T10:23:47Z", details: "moderate", }, ], title: "CVE-2016-2148", }, { cve: "CVE-2016-6301", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2016-6301", }, ], notes: [ { category: "general", text: "The recv_and_process_client_pkt function in networking/ntpd.c in busybox allows remote attackers to cause a denial of service (CPU and bandwidth consumption) via a forged NTP packet, which triggers a communication loop.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Server 12 SP2-BCL:busybox-1.35.0-4.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:busybox-1.35.0-4.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:busybox-1.35.0-4.3.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:busybox-1.35.0-4.3.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:busybox-1.35.0-4.3.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:busybox-1.35.0-4.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:busybox-1.35.0-4.3.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:busybox-1.35.0-4.3.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:busybox-1.35.0-4.3.1.s390x", "SUSE Linux Enterprise Server 12 SP5:busybox-1.35.0-4.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:busybox-1.35.0-4.3.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:busybox-1.35.0-4.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:busybox-1.35.0-4.3.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:busybox-1.35.0-4.3.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:busybox-1.35.0-4.3.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:busybox-1.35.0-4.3.1.x86_64", "SUSE OpenStack Cloud 9:busybox-1.35.0-4.3.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:busybox-1.35.0-4.3.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2016-6301", url: "https://www.suse.com/security/cve/CVE-2016-6301", }, { category: "external", summary: "SUSE Bug 991940 for CVE-2016-6301", url: "https://bugzilla.suse.com/991940", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Server 12 SP2-BCL:busybox-1.35.0-4.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:busybox-1.35.0-4.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:busybox-1.35.0-4.3.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:busybox-1.35.0-4.3.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:busybox-1.35.0-4.3.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:busybox-1.35.0-4.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:busybox-1.35.0-4.3.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:busybox-1.35.0-4.3.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:busybox-1.35.0-4.3.1.s390x", "SUSE Linux Enterprise Server 12 SP5:busybox-1.35.0-4.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:busybox-1.35.0-4.3.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:busybox-1.35.0-4.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:busybox-1.35.0-4.3.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:busybox-1.35.0-4.3.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:busybox-1.35.0-4.3.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:busybox-1.35.0-4.3.1.x86_64", "SUSE OpenStack Cloud 9:busybox-1.35.0-4.3.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:busybox-1.35.0-4.3.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 7.5, baseSeverity: "HIGH", vectorString: "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", version: "3.0", }, products: [ "SUSE Linux Enterprise Server 12 SP2-BCL:busybox-1.35.0-4.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:busybox-1.35.0-4.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:busybox-1.35.0-4.3.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:busybox-1.35.0-4.3.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:busybox-1.35.0-4.3.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:busybox-1.35.0-4.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:busybox-1.35.0-4.3.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:busybox-1.35.0-4.3.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:busybox-1.35.0-4.3.1.s390x", "SUSE Linux Enterprise Server 12 SP5:busybox-1.35.0-4.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:busybox-1.35.0-4.3.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:busybox-1.35.0-4.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:busybox-1.35.0-4.3.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:busybox-1.35.0-4.3.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:busybox-1.35.0-4.3.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:busybox-1.35.0-4.3.1.x86_64", "SUSE OpenStack Cloud 9:busybox-1.35.0-4.3.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:busybox-1.35.0-4.3.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2022-11-28T10:23:47Z", details: "moderate", }, ], title: "CVE-2016-6301", }, { cve: "CVE-2017-15873", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2017-15873", }, ], notes: [ { category: "general", text: "The get_next_block function in archival/libarchive/decompress_bunzip2.c in BusyBox 1.27.2 has an Integer Overflow that may lead to a write access violation.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Server 12 SP2-BCL:busybox-1.35.0-4.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:busybox-1.35.0-4.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:busybox-1.35.0-4.3.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:busybox-1.35.0-4.3.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:busybox-1.35.0-4.3.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:busybox-1.35.0-4.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:busybox-1.35.0-4.3.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:busybox-1.35.0-4.3.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:busybox-1.35.0-4.3.1.s390x", "SUSE Linux Enterprise Server 12 SP5:busybox-1.35.0-4.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:busybox-1.35.0-4.3.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:busybox-1.35.0-4.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:busybox-1.35.0-4.3.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:busybox-1.35.0-4.3.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:busybox-1.35.0-4.3.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:busybox-1.35.0-4.3.1.x86_64", "SUSE OpenStack Cloud 9:busybox-1.35.0-4.3.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:busybox-1.35.0-4.3.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2017-15873", url: "https://www.suse.com/security/cve/CVE-2017-15873", }, { category: "external", summary: "SUSE Bug 1064976 for CVE-2017-15873", url: "https://bugzilla.suse.com/1064976", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Server 12 SP2-BCL:busybox-1.35.0-4.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:busybox-1.35.0-4.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:busybox-1.35.0-4.3.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:busybox-1.35.0-4.3.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:busybox-1.35.0-4.3.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:busybox-1.35.0-4.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:busybox-1.35.0-4.3.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:busybox-1.35.0-4.3.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:busybox-1.35.0-4.3.1.s390x", "SUSE Linux Enterprise Server 12 SP5:busybox-1.35.0-4.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:busybox-1.35.0-4.3.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:busybox-1.35.0-4.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:busybox-1.35.0-4.3.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:busybox-1.35.0-4.3.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:busybox-1.35.0-4.3.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:busybox-1.35.0-4.3.1.x86_64", "SUSE OpenStack Cloud 9:busybox-1.35.0-4.3.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:busybox-1.35.0-4.3.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 7.8, baseSeverity: "HIGH", vectorString: "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", version: "3.0", }, products: [ "SUSE Linux Enterprise Server 12 SP2-BCL:busybox-1.35.0-4.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:busybox-1.35.0-4.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:busybox-1.35.0-4.3.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:busybox-1.35.0-4.3.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:busybox-1.35.0-4.3.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:busybox-1.35.0-4.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:busybox-1.35.0-4.3.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:busybox-1.35.0-4.3.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:busybox-1.35.0-4.3.1.s390x", "SUSE Linux Enterprise Server 12 SP5:busybox-1.35.0-4.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:busybox-1.35.0-4.3.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:busybox-1.35.0-4.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:busybox-1.35.0-4.3.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:busybox-1.35.0-4.3.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:busybox-1.35.0-4.3.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:busybox-1.35.0-4.3.1.x86_64", "SUSE OpenStack Cloud 9:busybox-1.35.0-4.3.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:busybox-1.35.0-4.3.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2022-11-28T10:23:47Z", details: "moderate", }, ], title: "CVE-2017-15873", }, { cve: "CVE-2017-15874", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2017-15874", }, ], notes: [ { category: "general", text: "archival/libarchive/decompress_unlzma.c in BusyBox 1.27.2 has an Integer Underflow that leads to a read access violation.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Server 12 SP2-BCL:busybox-1.35.0-4.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:busybox-1.35.0-4.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:busybox-1.35.0-4.3.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:busybox-1.35.0-4.3.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:busybox-1.35.0-4.3.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:busybox-1.35.0-4.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:busybox-1.35.0-4.3.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:busybox-1.35.0-4.3.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:busybox-1.35.0-4.3.1.s390x", "SUSE Linux Enterprise Server 12 SP5:busybox-1.35.0-4.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:busybox-1.35.0-4.3.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:busybox-1.35.0-4.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:busybox-1.35.0-4.3.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:busybox-1.35.0-4.3.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:busybox-1.35.0-4.3.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:busybox-1.35.0-4.3.1.x86_64", "SUSE OpenStack Cloud 9:busybox-1.35.0-4.3.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:busybox-1.35.0-4.3.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2017-15874", url: "https://www.suse.com/security/cve/CVE-2017-15874", }, { category: "external", summary: "SUSE Bug 1064978 for CVE-2017-15874", url: "https://bugzilla.suse.com/1064978", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Server 12 SP2-BCL:busybox-1.35.0-4.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:busybox-1.35.0-4.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:busybox-1.35.0-4.3.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:busybox-1.35.0-4.3.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:busybox-1.35.0-4.3.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:busybox-1.35.0-4.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:busybox-1.35.0-4.3.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:busybox-1.35.0-4.3.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:busybox-1.35.0-4.3.1.s390x", "SUSE Linux Enterprise Server 12 SP5:busybox-1.35.0-4.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:busybox-1.35.0-4.3.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:busybox-1.35.0-4.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:busybox-1.35.0-4.3.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:busybox-1.35.0-4.3.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:busybox-1.35.0-4.3.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:busybox-1.35.0-4.3.1.x86_64", "SUSE OpenStack Cloud 9:busybox-1.35.0-4.3.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:busybox-1.35.0-4.3.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 3.3, baseSeverity: "LOW", vectorString: "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L", version: "3.0", }, products: [ "SUSE Linux Enterprise Server 12 SP2-BCL:busybox-1.35.0-4.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:busybox-1.35.0-4.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:busybox-1.35.0-4.3.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:busybox-1.35.0-4.3.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:busybox-1.35.0-4.3.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:busybox-1.35.0-4.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:busybox-1.35.0-4.3.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:busybox-1.35.0-4.3.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:busybox-1.35.0-4.3.1.s390x", "SUSE Linux Enterprise Server 12 SP5:busybox-1.35.0-4.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:busybox-1.35.0-4.3.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:busybox-1.35.0-4.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:busybox-1.35.0-4.3.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:busybox-1.35.0-4.3.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:busybox-1.35.0-4.3.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:busybox-1.35.0-4.3.1.x86_64", "SUSE OpenStack Cloud 9:busybox-1.35.0-4.3.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:busybox-1.35.0-4.3.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2022-11-28T10:23:47Z", details: "low", }, ], title: "CVE-2017-15874", }, { cve: "CVE-2017-16544", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2017-16544", }, ], notes: [ { category: "general", text: "In the add_match function in libbb/lineedit.c in BusyBox through 1.27.2, the tab autocomplete feature of the shell, used to get a list of filenames in a directory, does not sanitize filenames and results in executing any escape sequence in the terminal. This could potentially result in code execution, arbitrary file writes, or other attacks.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Server 12 SP2-BCL:busybox-1.35.0-4.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:busybox-1.35.0-4.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:busybox-1.35.0-4.3.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:busybox-1.35.0-4.3.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:busybox-1.35.0-4.3.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:busybox-1.35.0-4.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:busybox-1.35.0-4.3.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:busybox-1.35.0-4.3.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:busybox-1.35.0-4.3.1.s390x", "SUSE Linux Enterprise Server 12 SP5:busybox-1.35.0-4.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:busybox-1.35.0-4.3.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:busybox-1.35.0-4.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:busybox-1.35.0-4.3.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:busybox-1.35.0-4.3.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:busybox-1.35.0-4.3.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:busybox-1.35.0-4.3.1.x86_64", "SUSE OpenStack Cloud 9:busybox-1.35.0-4.3.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:busybox-1.35.0-4.3.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2017-16544", url: "https://www.suse.com/security/cve/CVE-2017-16544", }, { category: "external", summary: "SUSE Bug 1069412 for CVE-2017-16544", url: "https://bugzilla.suse.com/1069412", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Server 12 SP2-BCL:busybox-1.35.0-4.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:busybox-1.35.0-4.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:busybox-1.35.0-4.3.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:busybox-1.35.0-4.3.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:busybox-1.35.0-4.3.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:busybox-1.35.0-4.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:busybox-1.35.0-4.3.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:busybox-1.35.0-4.3.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:busybox-1.35.0-4.3.1.s390x", "SUSE Linux Enterprise Server 12 SP5:busybox-1.35.0-4.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:busybox-1.35.0-4.3.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:busybox-1.35.0-4.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:busybox-1.35.0-4.3.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:busybox-1.35.0-4.3.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:busybox-1.35.0-4.3.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:busybox-1.35.0-4.3.1.x86_64", "SUSE OpenStack Cloud 9:busybox-1.35.0-4.3.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:busybox-1.35.0-4.3.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 7.8, baseSeverity: "HIGH", vectorString: "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", version: "3.0", }, products: [ "SUSE Linux Enterprise Server 12 SP2-BCL:busybox-1.35.0-4.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:busybox-1.35.0-4.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:busybox-1.35.0-4.3.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:busybox-1.35.0-4.3.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:busybox-1.35.0-4.3.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:busybox-1.35.0-4.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:busybox-1.35.0-4.3.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:busybox-1.35.0-4.3.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:busybox-1.35.0-4.3.1.s390x", "SUSE Linux Enterprise Server 12 SP5:busybox-1.35.0-4.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:busybox-1.35.0-4.3.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:busybox-1.35.0-4.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:busybox-1.35.0-4.3.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:busybox-1.35.0-4.3.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:busybox-1.35.0-4.3.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:busybox-1.35.0-4.3.1.x86_64", "SUSE OpenStack Cloud 9:busybox-1.35.0-4.3.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:busybox-1.35.0-4.3.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2022-11-28T10:23:47Z", details: "important", }, ], title: "CVE-2017-16544", }, { cve: "CVE-2018-1000500", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2018-1000500", }, ], notes: [ { category: "general", text: "Busybox contains a Missing SSL certificate validation vulnerability in The \"busybox wget\" applet that can result in arbitrary code execution. This attack appear to be exploitable via Simply download any file over HTTPS using \"busybox wget https://compromised-domain.com/important-file\".", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Server 12 SP2-BCL:busybox-1.35.0-4.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:busybox-1.35.0-4.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:busybox-1.35.0-4.3.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:busybox-1.35.0-4.3.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:busybox-1.35.0-4.3.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:busybox-1.35.0-4.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:busybox-1.35.0-4.3.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:busybox-1.35.0-4.3.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:busybox-1.35.0-4.3.1.s390x", "SUSE Linux Enterprise Server 12 SP5:busybox-1.35.0-4.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:busybox-1.35.0-4.3.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:busybox-1.35.0-4.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:busybox-1.35.0-4.3.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:busybox-1.35.0-4.3.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:busybox-1.35.0-4.3.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:busybox-1.35.0-4.3.1.x86_64", "SUSE OpenStack Cloud 9:busybox-1.35.0-4.3.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:busybox-1.35.0-4.3.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2018-1000500", url: "https://www.suse.com/security/cve/CVE-2018-1000500", }, { category: "external", summary: "SUSE Bug 1099263 for CVE-2018-1000500", url: "https://bugzilla.suse.com/1099263", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Server 12 SP2-BCL:busybox-1.35.0-4.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:busybox-1.35.0-4.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:busybox-1.35.0-4.3.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:busybox-1.35.0-4.3.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:busybox-1.35.0-4.3.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:busybox-1.35.0-4.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:busybox-1.35.0-4.3.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:busybox-1.35.0-4.3.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:busybox-1.35.0-4.3.1.s390x", "SUSE Linux Enterprise Server 12 SP5:busybox-1.35.0-4.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:busybox-1.35.0-4.3.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:busybox-1.35.0-4.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:busybox-1.35.0-4.3.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:busybox-1.35.0-4.3.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:busybox-1.35.0-4.3.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:busybox-1.35.0-4.3.1.x86_64", "SUSE OpenStack Cloud 9:busybox-1.35.0-4.3.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:busybox-1.35.0-4.3.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 7.5, baseSeverity: "HIGH", vectorString: "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N", version: "3.0", }, products: [ "SUSE Linux Enterprise Server 12 SP2-BCL:busybox-1.35.0-4.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:busybox-1.35.0-4.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:busybox-1.35.0-4.3.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:busybox-1.35.0-4.3.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:busybox-1.35.0-4.3.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:busybox-1.35.0-4.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:busybox-1.35.0-4.3.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:busybox-1.35.0-4.3.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:busybox-1.35.0-4.3.1.s390x", "SUSE Linux Enterprise Server 12 SP5:busybox-1.35.0-4.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:busybox-1.35.0-4.3.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:busybox-1.35.0-4.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:busybox-1.35.0-4.3.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:busybox-1.35.0-4.3.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:busybox-1.35.0-4.3.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:busybox-1.35.0-4.3.1.x86_64", "SUSE OpenStack Cloud 9:busybox-1.35.0-4.3.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:busybox-1.35.0-4.3.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2022-11-28T10:23:47Z", details: "important", }, ], title: "CVE-2018-1000500", }, { cve: "CVE-2018-1000517", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2018-1000517", }, ], notes: [ { category: "general", text: "BusyBox project BusyBox wget version prior to commit 8e2174e9bd836e53c8b9c6e00d1bc6e2a718686e contains a Buffer Overflow vulnerability in Busybox wget that can result in heap buffer overflow. This attack appear to be exploitable via network connectivity. This vulnerability appears to have been fixed in after commit 8e2174e9bd836e53c8b9c6e00d1bc6e2a718686e.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Server 12 SP2-BCL:busybox-1.35.0-4.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:busybox-1.35.0-4.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:busybox-1.35.0-4.3.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:busybox-1.35.0-4.3.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:busybox-1.35.0-4.3.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:busybox-1.35.0-4.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:busybox-1.35.0-4.3.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:busybox-1.35.0-4.3.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:busybox-1.35.0-4.3.1.s390x", "SUSE Linux Enterprise Server 12 SP5:busybox-1.35.0-4.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:busybox-1.35.0-4.3.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:busybox-1.35.0-4.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:busybox-1.35.0-4.3.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:busybox-1.35.0-4.3.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:busybox-1.35.0-4.3.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:busybox-1.35.0-4.3.1.x86_64", "SUSE OpenStack Cloud 9:busybox-1.35.0-4.3.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:busybox-1.35.0-4.3.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2018-1000517", url: "https://www.suse.com/security/cve/CVE-2018-1000517", }, { category: "external", summary: "SUSE Bug 1099260 for CVE-2018-1000517", url: "https://bugzilla.suse.com/1099260", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Server 12 SP2-BCL:busybox-1.35.0-4.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:busybox-1.35.0-4.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:busybox-1.35.0-4.3.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:busybox-1.35.0-4.3.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:busybox-1.35.0-4.3.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:busybox-1.35.0-4.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:busybox-1.35.0-4.3.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:busybox-1.35.0-4.3.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:busybox-1.35.0-4.3.1.s390x", "SUSE Linux Enterprise Server 12 SP5:busybox-1.35.0-4.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:busybox-1.35.0-4.3.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:busybox-1.35.0-4.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:busybox-1.35.0-4.3.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:busybox-1.35.0-4.3.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:busybox-1.35.0-4.3.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:busybox-1.35.0-4.3.1.x86_64", "SUSE OpenStack Cloud 9:busybox-1.35.0-4.3.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:busybox-1.35.0-4.3.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.6, baseSeverity: "MEDIUM", vectorString: "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L", version: "3.0", }, products: [ "SUSE Linux Enterprise Server 12 SP2-BCL:busybox-1.35.0-4.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:busybox-1.35.0-4.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:busybox-1.35.0-4.3.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:busybox-1.35.0-4.3.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:busybox-1.35.0-4.3.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:busybox-1.35.0-4.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:busybox-1.35.0-4.3.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:busybox-1.35.0-4.3.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:busybox-1.35.0-4.3.1.s390x", "SUSE Linux Enterprise Server 12 SP5:busybox-1.35.0-4.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:busybox-1.35.0-4.3.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:busybox-1.35.0-4.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:busybox-1.35.0-4.3.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:busybox-1.35.0-4.3.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:busybox-1.35.0-4.3.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:busybox-1.35.0-4.3.1.x86_64", "SUSE OpenStack Cloud 9:busybox-1.35.0-4.3.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:busybox-1.35.0-4.3.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2022-11-28T10:23:47Z", details: "important", }, ], title: "CVE-2018-1000517", }, { cve: "CVE-2018-20679", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2018-20679", }, ], notes: [ { category: "general", text: "An issue was discovered in BusyBox before 1.30.0. An out of bounds read in udhcp components (consumed by the DHCP server, client, and relay) allows a remote attacker to leak sensitive information from the stack by sending a crafted DHCP message. This is related to verification in udhcp_get_option() in networking/udhcp/common.c that 4-byte options are indeed 4 bytes.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Server 12 SP2-BCL:busybox-1.35.0-4.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:busybox-1.35.0-4.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:busybox-1.35.0-4.3.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:busybox-1.35.0-4.3.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:busybox-1.35.0-4.3.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:busybox-1.35.0-4.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:busybox-1.35.0-4.3.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:busybox-1.35.0-4.3.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:busybox-1.35.0-4.3.1.s390x", "SUSE Linux Enterprise Server 12 SP5:busybox-1.35.0-4.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:busybox-1.35.0-4.3.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:busybox-1.35.0-4.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:busybox-1.35.0-4.3.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:busybox-1.35.0-4.3.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:busybox-1.35.0-4.3.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:busybox-1.35.0-4.3.1.x86_64", "SUSE OpenStack Cloud 9:busybox-1.35.0-4.3.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:busybox-1.35.0-4.3.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2018-20679", url: "https://www.suse.com/security/cve/CVE-2018-20679", }, { category: "external", summary: "SUSE Bug 1121426 for CVE-2018-20679", url: "https://bugzilla.suse.com/1121426", }, { category: "external", summary: "SUSE Bug 1121428 for CVE-2018-20679", url: "https://bugzilla.suse.com/1121428", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Server 12 SP2-BCL:busybox-1.35.0-4.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:busybox-1.35.0-4.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:busybox-1.35.0-4.3.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:busybox-1.35.0-4.3.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:busybox-1.35.0-4.3.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:busybox-1.35.0-4.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:busybox-1.35.0-4.3.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:busybox-1.35.0-4.3.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:busybox-1.35.0-4.3.1.s390x", "SUSE Linux Enterprise Server 12 SP5:busybox-1.35.0-4.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:busybox-1.35.0-4.3.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:busybox-1.35.0-4.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:busybox-1.35.0-4.3.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:busybox-1.35.0-4.3.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:busybox-1.35.0-4.3.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:busybox-1.35.0-4.3.1.x86_64", "SUSE OpenStack Cloud 9:busybox-1.35.0-4.3.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:busybox-1.35.0-4.3.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.3, baseSeverity: "MEDIUM", vectorString: "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N", version: "3.0", }, products: [ "SUSE Linux Enterprise Server 12 SP2-BCL:busybox-1.35.0-4.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:busybox-1.35.0-4.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:busybox-1.35.0-4.3.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:busybox-1.35.0-4.3.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:busybox-1.35.0-4.3.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:busybox-1.35.0-4.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:busybox-1.35.0-4.3.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:busybox-1.35.0-4.3.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:busybox-1.35.0-4.3.1.s390x", "SUSE Linux Enterprise Server 12 SP5:busybox-1.35.0-4.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:busybox-1.35.0-4.3.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:busybox-1.35.0-4.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:busybox-1.35.0-4.3.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:busybox-1.35.0-4.3.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:busybox-1.35.0-4.3.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:busybox-1.35.0-4.3.1.x86_64", "SUSE OpenStack Cloud 9:busybox-1.35.0-4.3.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:busybox-1.35.0-4.3.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2022-11-28T10:23:47Z", details: "moderate", }, ], title: "CVE-2018-20679", }, { cve: "CVE-2019-5747", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2019-5747", }, ], notes: [ { category: "general", text: "An issue was discovered in BusyBox through 1.30.0. An out of bounds read in udhcp components (consumed by the DHCP client, server, and/or relay) might allow a remote attacker to leak sensitive information from the stack by sending a crafted DHCP message. This is related to assurance of a 4-byte length when decoding DHCP_SUBNET. NOTE: this issue exists because of an incomplete fix for CVE-2018-20679.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Server 12 SP2-BCL:busybox-1.35.0-4.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:busybox-1.35.0-4.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:busybox-1.35.0-4.3.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:busybox-1.35.0-4.3.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:busybox-1.35.0-4.3.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:busybox-1.35.0-4.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:busybox-1.35.0-4.3.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:busybox-1.35.0-4.3.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:busybox-1.35.0-4.3.1.s390x", "SUSE Linux Enterprise Server 12 SP5:busybox-1.35.0-4.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:busybox-1.35.0-4.3.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:busybox-1.35.0-4.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:busybox-1.35.0-4.3.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:busybox-1.35.0-4.3.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:busybox-1.35.0-4.3.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:busybox-1.35.0-4.3.1.x86_64", "SUSE OpenStack Cloud 9:busybox-1.35.0-4.3.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:busybox-1.35.0-4.3.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2019-5747", url: "https://www.suse.com/security/cve/CVE-2019-5747", }, { category: "external", summary: "SUSE Bug 1121426 for CVE-2019-5747", url: "https://bugzilla.suse.com/1121426", }, { category: "external", summary: "SUSE Bug 1121428 for CVE-2019-5747", url: "https://bugzilla.suse.com/1121428", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Server 12 SP2-BCL:busybox-1.35.0-4.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:busybox-1.35.0-4.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:busybox-1.35.0-4.3.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:busybox-1.35.0-4.3.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:busybox-1.35.0-4.3.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:busybox-1.35.0-4.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:busybox-1.35.0-4.3.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:busybox-1.35.0-4.3.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:busybox-1.35.0-4.3.1.s390x", "SUSE Linux Enterprise Server 12 SP5:busybox-1.35.0-4.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:busybox-1.35.0-4.3.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:busybox-1.35.0-4.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:busybox-1.35.0-4.3.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:busybox-1.35.0-4.3.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:busybox-1.35.0-4.3.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:busybox-1.35.0-4.3.1.x86_64", "SUSE OpenStack Cloud 9:busybox-1.35.0-4.3.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:busybox-1.35.0-4.3.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 3.5, baseSeverity: "LOW", vectorString: "CVSS:3.1/AV:A/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N", version: "3.1", }, products: [ "SUSE Linux Enterprise Server 12 SP2-BCL:busybox-1.35.0-4.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:busybox-1.35.0-4.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:busybox-1.35.0-4.3.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:busybox-1.35.0-4.3.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:busybox-1.35.0-4.3.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:busybox-1.35.0-4.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:busybox-1.35.0-4.3.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:busybox-1.35.0-4.3.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:busybox-1.35.0-4.3.1.s390x", "SUSE Linux Enterprise Server 12 SP5:busybox-1.35.0-4.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:busybox-1.35.0-4.3.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:busybox-1.35.0-4.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:busybox-1.35.0-4.3.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:busybox-1.35.0-4.3.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:busybox-1.35.0-4.3.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:busybox-1.35.0-4.3.1.x86_64", "SUSE OpenStack Cloud 9:busybox-1.35.0-4.3.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:busybox-1.35.0-4.3.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2022-11-28T10:23:47Z", details: "low", }, ], title: "CVE-2019-5747", }, { cve: "CVE-2021-28831", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2021-28831", }, ], notes: [ { category: "general", text: "decompress_gunzip.c in BusyBox through 1.32.1 mishandles the error bit on the huft_build result pointer, with a resultant invalid free or segmentation fault, via malformed gzip data.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Server 12 SP2-BCL:busybox-1.35.0-4.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:busybox-1.35.0-4.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:busybox-1.35.0-4.3.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:busybox-1.35.0-4.3.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:busybox-1.35.0-4.3.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:busybox-1.35.0-4.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:busybox-1.35.0-4.3.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:busybox-1.35.0-4.3.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:busybox-1.35.0-4.3.1.s390x", "SUSE Linux Enterprise Server 12 SP5:busybox-1.35.0-4.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:busybox-1.35.0-4.3.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:busybox-1.35.0-4.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:busybox-1.35.0-4.3.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:busybox-1.35.0-4.3.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:busybox-1.35.0-4.3.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:busybox-1.35.0-4.3.1.x86_64", "SUSE OpenStack Cloud 9:busybox-1.35.0-4.3.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:busybox-1.35.0-4.3.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2021-28831", url: "https://www.suse.com/security/cve/CVE-2021-28831", }, { category: "external", summary: "SUSE Bug 1184522 for CVE-2021-28831", url: "https://bugzilla.suse.com/1184522", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Server 12 SP2-BCL:busybox-1.35.0-4.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:busybox-1.35.0-4.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:busybox-1.35.0-4.3.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:busybox-1.35.0-4.3.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:busybox-1.35.0-4.3.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:busybox-1.35.0-4.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:busybox-1.35.0-4.3.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:busybox-1.35.0-4.3.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:busybox-1.35.0-4.3.1.s390x", "SUSE Linux Enterprise Server 12 SP5:busybox-1.35.0-4.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:busybox-1.35.0-4.3.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:busybox-1.35.0-4.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:busybox-1.35.0-4.3.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:busybox-1.35.0-4.3.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:busybox-1.35.0-4.3.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:busybox-1.35.0-4.3.1.x86_64", "SUSE OpenStack Cloud 9:busybox-1.35.0-4.3.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:busybox-1.35.0-4.3.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 7.5, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Server 12 SP2-BCL:busybox-1.35.0-4.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:busybox-1.35.0-4.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:busybox-1.35.0-4.3.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:busybox-1.35.0-4.3.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:busybox-1.35.0-4.3.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:busybox-1.35.0-4.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:busybox-1.35.0-4.3.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:busybox-1.35.0-4.3.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:busybox-1.35.0-4.3.1.s390x", "SUSE Linux Enterprise Server 12 SP5:busybox-1.35.0-4.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:busybox-1.35.0-4.3.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:busybox-1.35.0-4.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:busybox-1.35.0-4.3.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:busybox-1.35.0-4.3.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:busybox-1.35.0-4.3.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:busybox-1.35.0-4.3.1.x86_64", "SUSE OpenStack Cloud 9:busybox-1.35.0-4.3.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:busybox-1.35.0-4.3.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2022-11-28T10:23:47Z", details: "important", }, ], title: "CVE-2021-28831", }, { cve: "CVE-2021-42373", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2021-42373", }, ], notes: [ { category: "general", text: "A NULL pointer dereference in Busybox's man applet leads to denial of service when a section name is supplied but no page argument is given", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Server 12 SP2-BCL:busybox-1.35.0-4.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:busybox-1.35.0-4.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:busybox-1.35.0-4.3.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:busybox-1.35.0-4.3.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:busybox-1.35.0-4.3.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:busybox-1.35.0-4.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:busybox-1.35.0-4.3.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:busybox-1.35.0-4.3.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:busybox-1.35.0-4.3.1.s390x", "SUSE Linux Enterprise Server 12 SP5:busybox-1.35.0-4.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:busybox-1.35.0-4.3.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:busybox-1.35.0-4.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:busybox-1.35.0-4.3.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:busybox-1.35.0-4.3.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:busybox-1.35.0-4.3.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:busybox-1.35.0-4.3.1.x86_64", "SUSE OpenStack Cloud 9:busybox-1.35.0-4.3.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:busybox-1.35.0-4.3.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2021-42373", url: "https://www.suse.com/security/cve/CVE-2021-42373", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Server 12 SP2-BCL:busybox-1.35.0-4.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:busybox-1.35.0-4.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:busybox-1.35.0-4.3.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:busybox-1.35.0-4.3.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:busybox-1.35.0-4.3.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:busybox-1.35.0-4.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:busybox-1.35.0-4.3.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:busybox-1.35.0-4.3.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:busybox-1.35.0-4.3.1.s390x", "SUSE Linux Enterprise Server 12 SP5:busybox-1.35.0-4.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:busybox-1.35.0-4.3.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:busybox-1.35.0-4.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:busybox-1.35.0-4.3.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:busybox-1.35.0-4.3.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:busybox-1.35.0-4.3.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:busybox-1.35.0-4.3.1.x86_64", "SUSE OpenStack Cloud 9:busybox-1.35.0-4.3.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:busybox-1.35.0-4.3.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.5, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Server 12 SP2-BCL:busybox-1.35.0-4.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:busybox-1.35.0-4.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:busybox-1.35.0-4.3.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:busybox-1.35.0-4.3.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:busybox-1.35.0-4.3.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:busybox-1.35.0-4.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:busybox-1.35.0-4.3.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:busybox-1.35.0-4.3.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:busybox-1.35.0-4.3.1.s390x", "SUSE Linux Enterprise Server 12 SP5:busybox-1.35.0-4.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:busybox-1.35.0-4.3.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:busybox-1.35.0-4.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:busybox-1.35.0-4.3.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:busybox-1.35.0-4.3.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:busybox-1.35.0-4.3.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:busybox-1.35.0-4.3.1.x86_64", "SUSE OpenStack Cloud 9:busybox-1.35.0-4.3.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:busybox-1.35.0-4.3.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2022-11-28T10:23:47Z", details: "moderate", }, ], title: "CVE-2021-42373", }, { cve: "CVE-2021-42374", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2021-42374", }, ], notes: [ { category: "general", text: "An out-of-bounds heap read in Busybox's unlzma applet leads to information leak and denial of service when crafted LZMA-compressed input is decompressed. This can be triggered by any applet/format that", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Server 12 SP2-BCL:busybox-1.35.0-4.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:busybox-1.35.0-4.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:busybox-1.35.0-4.3.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:busybox-1.35.0-4.3.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:busybox-1.35.0-4.3.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:busybox-1.35.0-4.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:busybox-1.35.0-4.3.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:busybox-1.35.0-4.3.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:busybox-1.35.0-4.3.1.s390x", "SUSE Linux Enterprise Server 12 SP5:busybox-1.35.0-4.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:busybox-1.35.0-4.3.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:busybox-1.35.0-4.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:busybox-1.35.0-4.3.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:busybox-1.35.0-4.3.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:busybox-1.35.0-4.3.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:busybox-1.35.0-4.3.1.x86_64", "SUSE OpenStack Cloud 9:busybox-1.35.0-4.3.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:busybox-1.35.0-4.3.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2021-42374", url: "https://www.suse.com/security/cve/CVE-2021-42374", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Server 12 SP2-BCL:busybox-1.35.0-4.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:busybox-1.35.0-4.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:busybox-1.35.0-4.3.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:busybox-1.35.0-4.3.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:busybox-1.35.0-4.3.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:busybox-1.35.0-4.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:busybox-1.35.0-4.3.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:busybox-1.35.0-4.3.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:busybox-1.35.0-4.3.1.s390x", "SUSE Linux Enterprise Server 12 SP5:busybox-1.35.0-4.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:busybox-1.35.0-4.3.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:busybox-1.35.0-4.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:busybox-1.35.0-4.3.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:busybox-1.35.0-4.3.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:busybox-1.35.0-4.3.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:busybox-1.35.0-4.3.1.x86_64", "SUSE OpenStack Cloud 9:busybox-1.35.0-4.3.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:busybox-1.35.0-4.3.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.7, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Server 12 SP2-BCL:busybox-1.35.0-4.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:busybox-1.35.0-4.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:busybox-1.35.0-4.3.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:busybox-1.35.0-4.3.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:busybox-1.35.0-4.3.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:busybox-1.35.0-4.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:busybox-1.35.0-4.3.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:busybox-1.35.0-4.3.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:busybox-1.35.0-4.3.1.s390x", "SUSE Linux Enterprise Server 12 SP5:busybox-1.35.0-4.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:busybox-1.35.0-4.3.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:busybox-1.35.0-4.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:busybox-1.35.0-4.3.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:busybox-1.35.0-4.3.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:busybox-1.35.0-4.3.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:busybox-1.35.0-4.3.1.x86_64", "SUSE OpenStack Cloud 9:busybox-1.35.0-4.3.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:busybox-1.35.0-4.3.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2022-11-28T10:23:47Z", details: "moderate", }, ], title: "CVE-2021-42374", }, { cve: "CVE-2021-42375", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2021-42375", }, ], notes: [ { category: "general", text: "An incorrect handling of a special element in Busybox's ash applet leads to denial of service when processing a crafted shell command, due to the shell mistaking specific characters for reserved characters. This may be used for DoS under rare conditions of filtered command input.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Server 12 SP2-BCL:busybox-1.35.0-4.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:busybox-1.35.0-4.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:busybox-1.35.0-4.3.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:busybox-1.35.0-4.3.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:busybox-1.35.0-4.3.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:busybox-1.35.0-4.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:busybox-1.35.0-4.3.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:busybox-1.35.0-4.3.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:busybox-1.35.0-4.3.1.s390x", "SUSE Linux Enterprise Server 12 SP5:busybox-1.35.0-4.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:busybox-1.35.0-4.3.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:busybox-1.35.0-4.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:busybox-1.35.0-4.3.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:busybox-1.35.0-4.3.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:busybox-1.35.0-4.3.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:busybox-1.35.0-4.3.1.x86_64", "SUSE OpenStack Cloud 9:busybox-1.35.0-4.3.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:busybox-1.35.0-4.3.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2021-42375", url: "https://www.suse.com/security/cve/CVE-2021-42375", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Server 12 SP2-BCL:busybox-1.35.0-4.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:busybox-1.35.0-4.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:busybox-1.35.0-4.3.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:busybox-1.35.0-4.3.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:busybox-1.35.0-4.3.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:busybox-1.35.0-4.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:busybox-1.35.0-4.3.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:busybox-1.35.0-4.3.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:busybox-1.35.0-4.3.1.s390x", "SUSE Linux Enterprise Server 12 SP5:busybox-1.35.0-4.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:busybox-1.35.0-4.3.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:busybox-1.35.0-4.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:busybox-1.35.0-4.3.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:busybox-1.35.0-4.3.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:busybox-1.35.0-4.3.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:busybox-1.35.0-4.3.1.x86_64", "SUSE OpenStack Cloud 9:busybox-1.35.0-4.3.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:busybox-1.35.0-4.3.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 4.1, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Server 12 SP2-BCL:busybox-1.35.0-4.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:busybox-1.35.0-4.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:busybox-1.35.0-4.3.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:busybox-1.35.0-4.3.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:busybox-1.35.0-4.3.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:busybox-1.35.0-4.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:busybox-1.35.0-4.3.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:busybox-1.35.0-4.3.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:busybox-1.35.0-4.3.1.s390x", "SUSE Linux Enterprise Server 12 SP5:busybox-1.35.0-4.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:busybox-1.35.0-4.3.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:busybox-1.35.0-4.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:busybox-1.35.0-4.3.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:busybox-1.35.0-4.3.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:busybox-1.35.0-4.3.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:busybox-1.35.0-4.3.1.x86_64", "SUSE OpenStack Cloud 9:busybox-1.35.0-4.3.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:busybox-1.35.0-4.3.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2022-11-28T10:23:47Z", details: "moderate", }, ], title: "CVE-2021-42375", }, { cve: "CVE-2021-42376", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2021-42376", }, ], notes: [ { category: "general", text: "A NULL pointer dereference in Busybox's hush applet leads to denial of service when processing a crafted shell command, due to missing validation after a \\x03 delimiter character. This may be used for DoS under very rare conditions of filtered command input.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Server 12 SP2-BCL:busybox-1.35.0-4.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:busybox-1.35.0-4.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:busybox-1.35.0-4.3.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:busybox-1.35.0-4.3.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:busybox-1.35.0-4.3.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:busybox-1.35.0-4.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:busybox-1.35.0-4.3.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:busybox-1.35.0-4.3.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:busybox-1.35.0-4.3.1.s390x", "SUSE Linux Enterprise Server 12 SP5:busybox-1.35.0-4.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:busybox-1.35.0-4.3.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:busybox-1.35.0-4.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:busybox-1.35.0-4.3.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:busybox-1.35.0-4.3.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:busybox-1.35.0-4.3.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:busybox-1.35.0-4.3.1.x86_64", "SUSE OpenStack Cloud 9:busybox-1.35.0-4.3.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:busybox-1.35.0-4.3.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2021-42376", url: "https://www.suse.com/security/cve/CVE-2021-42376", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Server 12 SP2-BCL:busybox-1.35.0-4.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:busybox-1.35.0-4.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:busybox-1.35.0-4.3.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:busybox-1.35.0-4.3.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:busybox-1.35.0-4.3.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:busybox-1.35.0-4.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:busybox-1.35.0-4.3.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:busybox-1.35.0-4.3.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:busybox-1.35.0-4.3.1.s390x", "SUSE Linux Enterprise Server 12 SP5:busybox-1.35.0-4.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:busybox-1.35.0-4.3.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:busybox-1.35.0-4.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:busybox-1.35.0-4.3.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:busybox-1.35.0-4.3.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:busybox-1.35.0-4.3.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:busybox-1.35.0-4.3.1.x86_64", "SUSE OpenStack Cloud 9:busybox-1.35.0-4.3.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:busybox-1.35.0-4.3.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 4.1, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Server 12 SP2-BCL:busybox-1.35.0-4.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:busybox-1.35.0-4.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:busybox-1.35.0-4.3.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:busybox-1.35.0-4.3.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:busybox-1.35.0-4.3.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:busybox-1.35.0-4.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:busybox-1.35.0-4.3.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:busybox-1.35.0-4.3.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:busybox-1.35.0-4.3.1.s390x", "SUSE Linux Enterprise Server 12 SP5:busybox-1.35.0-4.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:busybox-1.35.0-4.3.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:busybox-1.35.0-4.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:busybox-1.35.0-4.3.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:busybox-1.35.0-4.3.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:busybox-1.35.0-4.3.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:busybox-1.35.0-4.3.1.x86_64", "SUSE OpenStack Cloud 9:busybox-1.35.0-4.3.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:busybox-1.35.0-4.3.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2022-11-28T10:23:47Z", details: "moderate", }, ], title: "CVE-2021-42376", }, { cve: "CVE-2021-42377", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2021-42377", }, ], notes: [ { category: "general", text: "An attacker-controlled pointer free in Busybox's hush applet leads to denial of service and possible code execution when processing a crafted shell command, due to the shell mishandling the &&& string. This may be used for remote code execution under rare conditions of filtered command input.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Server 12 SP2-BCL:busybox-1.35.0-4.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:busybox-1.35.0-4.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:busybox-1.35.0-4.3.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:busybox-1.35.0-4.3.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:busybox-1.35.0-4.3.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:busybox-1.35.0-4.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:busybox-1.35.0-4.3.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:busybox-1.35.0-4.3.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:busybox-1.35.0-4.3.1.s390x", "SUSE Linux Enterprise Server 12 SP5:busybox-1.35.0-4.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:busybox-1.35.0-4.3.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:busybox-1.35.0-4.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:busybox-1.35.0-4.3.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:busybox-1.35.0-4.3.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:busybox-1.35.0-4.3.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:busybox-1.35.0-4.3.1.x86_64", "SUSE OpenStack Cloud 9:busybox-1.35.0-4.3.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:busybox-1.35.0-4.3.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2021-42377", url: "https://www.suse.com/security/cve/CVE-2021-42377", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Server 12 SP2-BCL:busybox-1.35.0-4.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:busybox-1.35.0-4.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:busybox-1.35.0-4.3.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:busybox-1.35.0-4.3.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:busybox-1.35.0-4.3.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:busybox-1.35.0-4.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:busybox-1.35.0-4.3.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:busybox-1.35.0-4.3.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:busybox-1.35.0-4.3.1.s390x", "SUSE Linux Enterprise Server 12 SP5:busybox-1.35.0-4.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:busybox-1.35.0-4.3.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:busybox-1.35.0-4.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:busybox-1.35.0-4.3.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:busybox-1.35.0-4.3.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:busybox-1.35.0-4.3.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:busybox-1.35.0-4.3.1.x86_64", "SUSE OpenStack Cloud 9:busybox-1.35.0-4.3.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:busybox-1.35.0-4.3.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 6.4, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Server 12 SP2-BCL:busybox-1.35.0-4.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:busybox-1.35.0-4.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:busybox-1.35.0-4.3.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:busybox-1.35.0-4.3.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:busybox-1.35.0-4.3.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:busybox-1.35.0-4.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:busybox-1.35.0-4.3.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:busybox-1.35.0-4.3.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:busybox-1.35.0-4.3.1.s390x", "SUSE Linux Enterprise Server 12 SP5:busybox-1.35.0-4.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:busybox-1.35.0-4.3.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:busybox-1.35.0-4.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:busybox-1.35.0-4.3.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:busybox-1.35.0-4.3.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:busybox-1.35.0-4.3.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:busybox-1.35.0-4.3.1.x86_64", "SUSE OpenStack Cloud 9:busybox-1.35.0-4.3.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:busybox-1.35.0-4.3.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2022-11-28T10:23:47Z", details: "moderate", }, ], title: "CVE-2021-42377", }, { cve: "CVE-2021-42378", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2021-42378", }, ], notes: [ { category: "general", text: "A use-after-free in Busybox's awk applet leads to denial of service and possibly code execution when processing a crafted awk pattern in the getvar_i function", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Server 12 SP2-BCL:busybox-1.35.0-4.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:busybox-1.35.0-4.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:busybox-1.35.0-4.3.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:busybox-1.35.0-4.3.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:busybox-1.35.0-4.3.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:busybox-1.35.0-4.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:busybox-1.35.0-4.3.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:busybox-1.35.0-4.3.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:busybox-1.35.0-4.3.1.s390x", "SUSE Linux Enterprise Server 12 SP5:busybox-1.35.0-4.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:busybox-1.35.0-4.3.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:busybox-1.35.0-4.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:busybox-1.35.0-4.3.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:busybox-1.35.0-4.3.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:busybox-1.35.0-4.3.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:busybox-1.35.0-4.3.1.x86_64", "SUSE OpenStack Cloud 9:busybox-1.35.0-4.3.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:busybox-1.35.0-4.3.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2021-42378", url: "https://www.suse.com/security/cve/CVE-2021-42378", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Server 12 SP2-BCL:busybox-1.35.0-4.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:busybox-1.35.0-4.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:busybox-1.35.0-4.3.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:busybox-1.35.0-4.3.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:busybox-1.35.0-4.3.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:busybox-1.35.0-4.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:busybox-1.35.0-4.3.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:busybox-1.35.0-4.3.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:busybox-1.35.0-4.3.1.s390x", "SUSE Linux Enterprise Server 12 SP5:busybox-1.35.0-4.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:busybox-1.35.0-4.3.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:busybox-1.35.0-4.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:busybox-1.35.0-4.3.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:busybox-1.35.0-4.3.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:busybox-1.35.0-4.3.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:busybox-1.35.0-4.3.1.x86_64", "SUSE OpenStack Cloud 9:busybox-1.35.0-4.3.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:busybox-1.35.0-4.3.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 6.6, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Server 12 SP2-BCL:busybox-1.35.0-4.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:busybox-1.35.0-4.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:busybox-1.35.0-4.3.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:busybox-1.35.0-4.3.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:busybox-1.35.0-4.3.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:busybox-1.35.0-4.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:busybox-1.35.0-4.3.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:busybox-1.35.0-4.3.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:busybox-1.35.0-4.3.1.s390x", "SUSE Linux Enterprise Server 12 SP5:busybox-1.35.0-4.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:busybox-1.35.0-4.3.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:busybox-1.35.0-4.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:busybox-1.35.0-4.3.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:busybox-1.35.0-4.3.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:busybox-1.35.0-4.3.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:busybox-1.35.0-4.3.1.x86_64", "SUSE OpenStack Cloud 9:busybox-1.35.0-4.3.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:busybox-1.35.0-4.3.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2022-11-28T10:23:47Z", details: "moderate", }, ], title: "CVE-2021-42378", }, { cve: "CVE-2021-42379", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2021-42379", }, ], notes: [ { category: "general", text: "A use-after-free in Busybox's awk applet leads to denial of service and possibly code execution when processing a crafted awk pattern in the next_input_file function", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Server 12 SP2-BCL:busybox-1.35.0-4.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:busybox-1.35.0-4.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:busybox-1.35.0-4.3.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:busybox-1.35.0-4.3.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:busybox-1.35.0-4.3.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:busybox-1.35.0-4.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:busybox-1.35.0-4.3.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:busybox-1.35.0-4.3.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:busybox-1.35.0-4.3.1.s390x", "SUSE Linux Enterprise Server 12 SP5:busybox-1.35.0-4.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:busybox-1.35.0-4.3.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:busybox-1.35.0-4.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:busybox-1.35.0-4.3.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:busybox-1.35.0-4.3.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:busybox-1.35.0-4.3.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:busybox-1.35.0-4.3.1.x86_64", "SUSE OpenStack Cloud 9:busybox-1.35.0-4.3.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:busybox-1.35.0-4.3.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2021-42379", url: "https://www.suse.com/security/cve/CVE-2021-42379", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Server 12 SP2-BCL:busybox-1.35.0-4.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:busybox-1.35.0-4.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:busybox-1.35.0-4.3.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:busybox-1.35.0-4.3.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:busybox-1.35.0-4.3.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:busybox-1.35.0-4.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:busybox-1.35.0-4.3.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:busybox-1.35.0-4.3.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:busybox-1.35.0-4.3.1.s390x", "SUSE Linux Enterprise Server 12 SP5:busybox-1.35.0-4.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:busybox-1.35.0-4.3.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:busybox-1.35.0-4.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:busybox-1.35.0-4.3.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:busybox-1.35.0-4.3.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:busybox-1.35.0-4.3.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:busybox-1.35.0-4.3.1.x86_64", "SUSE OpenStack Cloud 9:busybox-1.35.0-4.3.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:busybox-1.35.0-4.3.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 6.6, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Server 12 SP2-BCL:busybox-1.35.0-4.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:busybox-1.35.0-4.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:busybox-1.35.0-4.3.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:busybox-1.35.0-4.3.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:busybox-1.35.0-4.3.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:busybox-1.35.0-4.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:busybox-1.35.0-4.3.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:busybox-1.35.0-4.3.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:busybox-1.35.0-4.3.1.s390x", "SUSE Linux Enterprise Server 12 SP5:busybox-1.35.0-4.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:busybox-1.35.0-4.3.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:busybox-1.35.0-4.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:busybox-1.35.0-4.3.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:busybox-1.35.0-4.3.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:busybox-1.35.0-4.3.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:busybox-1.35.0-4.3.1.x86_64", "SUSE OpenStack Cloud 9:busybox-1.35.0-4.3.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:busybox-1.35.0-4.3.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2022-11-28T10:23:47Z", details: "moderate", }, ], title: "CVE-2021-42379", }, { cve: "CVE-2021-42380", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2021-42380", }, ], notes: [ { category: "general", text: "A use-after-free in Busybox's awk applet leads to denial of service and possibly code execution when processing a crafted awk pattern in the clrvar function", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Server 12 SP2-BCL:busybox-1.35.0-4.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:busybox-1.35.0-4.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:busybox-1.35.0-4.3.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:busybox-1.35.0-4.3.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:busybox-1.35.0-4.3.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:busybox-1.35.0-4.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:busybox-1.35.0-4.3.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:busybox-1.35.0-4.3.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:busybox-1.35.0-4.3.1.s390x", "SUSE Linux Enterprise Server 12 SP5:busybox-1.35.0-4.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:busybox-1.35.0-4.3.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:busybox-1.35.0-4.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:busybox-1.35.0-4.3.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:busybox-1.35.0-4.3.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:busybox-1.35.0-4.3.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:busybox-1.35.0-4.3.1.x86_64", "SUSE OpenStack Cloud 9:busybox-1.35.0-4.3.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:busybox-1.35.0-4.3.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2021-42380", url: "https://www.suse.com/security/cve/CVE-2021-42380", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Server 12 SP2-BCL:busybox-1.35.0-4.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:busybox-1.35.0-4.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:busybox-1.35.0-4.3.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:busybox-1.35.0-4.3.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:busybox-1.35.0-4.3.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:busybox-1.35.0-4.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:busybox-1.35.0-4.3.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:busybox-1.35.0-4.3.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:busybox-1.35.0-4.3.1.s390x", "SUSE Linux Enterprise Server 12 SP5:busybox-1.35.0-4.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:busybox-1.35.0-4.3.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:busybox-1.35.0-4.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:busybox-1.35.0-4.3.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:busybox-1.35.0-4.3.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:busybox-1.35.0-4.3.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:busybox-1.35.0-4.3.1.x86_64", "SUSE OpenStack Cloud 9:busybox-1.35.0-4.3.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:busybox-1.35.0-4.3.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 6.6, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Server 12 SP2-BCL:busybox-1.35.0-4.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:busybox-1.35.0-4.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:busybox-1.35.0-4.3.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:busybox-1.35.0-4.3.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:busybox-1.35.0-4.3.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:busybox-1.35.0-4.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:busybox-1.35.0-4.3.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:busybox-1.35.0-4.3.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:busybox-1.35.0-4.3.1.s390x", "SUSE Linux Enterprise Server 12 SP5:busybox-1.35.0-4.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:busybox-1.35.0-4.3.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:busybox-1.35.0-4.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:busybox-1.35.0-4.3.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:busybox-1.35.0-4.3.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:busybox-1.35.0-4.3.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:busybox-1.35.0-4.3.1.x86_64", "SUSE OpenStack Cloud 9:busybox-1.35.0-4.3.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:busybox-1.35.0-4.3.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2022-11-28T10:23:47Z", details: "moderate", }, ], title: "CVE-2021-42380", }, { cve: "CVE-2021-42381", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2021-42381", }, ], notes: [ { category: "general", text: "A use-after-free in Busybox's awk applet leads to denial of service and possibly code execution when processing a crafted awk pattern in the hash_init function", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Server 12 SP2-BCL:busybox-1.35.0-4.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:busybox-1.35.0-4.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:busybox-1.35.0-4.3.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:busybox-1.35.0-4.3.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:busybox-1.35.0-4.3.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:busybox-1.35.0-4.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:busybox-1.35.0-4.3.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:busybox-1.35.0-4.3.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:busybox-1.35.0-4.3.1.s390x", "SUSE Linux Enterprise Server 12 SP5:busybox-1.35.0-4.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:busybox-1.35.0-4.3.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:busybox-1.35.0-4.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:busybox-1.35.0-4.3.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:busybox-1.35.0-4.3.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:busybox-1.35.0-4.3.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:busybox-1.35.0-4.3.1.x86_64", "SUSE OpenStack Cloud 9:busybox-1.35.0-4.3.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:busybox-1.35.0-4.3.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2021-42381", url: "https://www.suse.com/security/cve/CVE-2021-42381", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Server 12 SP2-BCL:busybox-1.35.0-4.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:busybox-1.35.0-4.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:busybox-1.35.0-4.3.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:busybox-1.35.0-4.3.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:busybox-1.35.0-4.3.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:busybox-1.35.0-4.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:busybox-1.35.0-4.3.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:busybox-1.35.0-4.3.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:busybox-1.35.0-4.3.1.s390x", "SUSE Linux Enterprise Server 12 SP5:busybox-1.35.0-4.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:busybox-1.35.0-4.3.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:busybox-1.35.0-4.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:busybox-1.35.0-4.3.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:busybox-1.35.0-4.3.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:busybox-1.35.0-4.3.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:busybox-1.35.0-4.3.1.x86_64", "SUSE OpenStack Cloud 9:busybox-1.35.0-4.3.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:busybox-1.35.0-4.3.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 6.6, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Server 12 SP2-BCL:busybox-1.35.0-4.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:busybox-1.35.0-4.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:busybox-1.35.0-4.3.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:busybox-1.35.0-4.3.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:busybox-1.35.0-4.3.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:busybox-1.35.0-4.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:busybox-1.35.0-4.3.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:busybox-1.35.0-4.3.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:busybox-1.35.0-4.3.1.s390x", "SUSE Linux Enterprise Server 12 SP5:busybox-1.35.0-4.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:busybox-1.35.0-4.3.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:busybox-1.35.0-4.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:busybox-1.35.0-4.3.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:busybox-1.35.0-4.3.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:busybox-1.35.0-4.3.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:busybox-1.35.0-4.3.1.x86_64", "SUSE OpenStack Cloud 9:busybox-1.35.0-4.3.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:busybox-1.35.0-4.3.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2022-11-28T10:23:47Z", details: "moderate", }, ], title: "CVE-2021-42381", }, { cve: "CVE-2021-42382", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2021-42382", }, ], notes: [ { category: "general", text: "A use-after-free in Busybox's awk applet leads to denial of service and possibly code execution when processing a crafted awk pattern in the getvar_s function", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Server 12 SP2-BCL:busybox-1.35.0-4.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:busybox-1.35.0-4.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:busybox-1.35.0-4.3.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:busybox-1.35.0-4.3.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:busybox-1.35.0-4.3.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:busybox-1.35.0-4.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:busybox-1.35.0-4.3.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:busybox-1.35.0-4.3.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:busybox-1.35.0-4.3.1.s390x", "SUSE Linux Enterprise Server 12 SP5:busybox-1.35.0-4.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:busybox-1.35.0-4.3.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:busybox-1.35.0-4.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:busybox-1.35.0-4.3.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:busybox-1.35.0-4.3.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:busybox-1.35.0-4.3.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:busybox-1.35.0-4.3.1.x86_64", "SUSE OpenStack Cloud 9:busybox-1.35.0-4.3.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:busybox-1.35.0-4.3.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2021-42382", url: "https://www.suse.com/security/cve/CVE-2021-42382", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Server 12 SP2-BCL:busybox-1.35.0-4.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:busybox-1.35.0-4.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:busybox-1.35.0-4.3.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:busybox-1.35.0-4.3.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:busybox-1.35.0-4.3.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:busybox-1.35.0-4.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:busybox-1.35.0-4.3.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:busybox-1.35.0-4.3.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:busybox-1.35.0-4.3.1.s390x", "SUSE Linux Enterprise Server 12 SP5:busybox-1.35.0-4.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:busybox-1.35.0-4.3.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:busybox-1.35.0-4.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:busybox-1.35.0-4.3.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:busybox-1.35.0-4.3.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:busybox-1.35.0-4.3.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:busybox-1.35.0-4.3.1.x86_64", "SUSE OpenStack Cloud 9:busybox-1.35.0-4.3.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:busybox-1.35.0-4.3.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 6.6, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Server 12 SP2-BCL:busybox-1.35.0-4.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:busybox-1.35.0-4.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:busybox-1.35.0-4.3.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:busybox-1.35.0-4.3.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:busybox-1.35.0-4.3.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:busybox-1.35.0-4.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:busybox-1.35.0-4.3.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:busybox-1.35.0-4.3.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:busybox-1.35.0-4.3.1.s390x", "SUSE Linux Enterprise Server 12 SP5:busybox-1.35.0-4.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:busybox-1.35.0-4.3.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:busybox-1.35.0-4.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:busybox-1.35.0-4.3.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:busybox-1.35.0-4.3.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:busybox-1.35.0-4.3.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:busybox-1.35.0-4.3.1.x86_64", "SUSE OpenStack Cloud 9:busybox-1.35.0-4.3.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:busybox-1.35.0-4.3.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2022-11-28T10:23:47Z", details: "moderate", }, ], title: "CVE-2021-42382", }, { cve: "CVE-2021-42383", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2021-42383", }, ], notes: [ { category: "general", text: "A use-after-free in Busybox's awk applet leads to denial of service and possibly code execution when processing a crafted awk pattern in the evaluate function", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Server 12 SP2-BCL:busybox-1.35.0-4.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:busybox-1.35.0-4.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:busybox-1.35.0-4.3.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:busybox-1.35.0-4.3.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:busybox-1.35.0-4.3.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:busybox-1.35.0-4.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:busybox-1.35.0-4.3.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:busybox-1.35.0-4.3.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:busybox-1.35.0-4.3.1.s390x", "SUSE Linux Enterprise Server 12 SP5:busybox-1.35.0-4.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:busybox-1.35.0-4.3.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:busybox-1.35.0-4.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:busybox-1.35.0-4.3.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:busybox-1.35.0-4.3.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:busybox-1.35.0-4.3.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:busybox-1.35.0-4.3.1.x86_64", "SUSE OpenStack Cloud 9:busybox-1.35.0-4.3.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:busybox-1.35.0-4.3.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2021-42383", url: "https://www.suse.com/security/cve/CVE-2021-42383", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Server 12 SP2-BCL:busybox-1.35.0-4.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:busybox-1.35.0-4.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:busybox-1.35.0-4.3.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:busybox-1.35.0-4.3.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:busybox-1.35.0-4.3.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:busybox-1.35.0-4.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:busybox-1.35.0-4.3.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:busybox-1.35.0-4.3.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:busybox-1.35.0-4.3.1.s390x", "SUSE Linux Enterprise Server 12 SP5:busybox-1.35.0-4.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:busybox-1.35.0-4.3.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:busybox-1.35.0-4.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:busybox-1.35.0-4.3.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:busybox-1.35.0-4.3.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:busybox-1.35.0-4.3.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:busybox-1.35.0-4.3.1.x86_64", "SUSE OpenStack Cloud 9:busybox-1.35.0-4.3.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:busybox-1.35.0-4.3.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 6.6, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Server 12 SP2-BCL:busybox-1.35.0-4.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:busybox-1.35.0-4.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:busybox-1.35.0-4.3.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:busybox-1.35.0-4.3.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:busybox-1.35.0-4.3.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:busybox-1.35.0-4.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:busybox-1.35.0-4.3.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:busybox-1.35.0-4.3.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:busybox-1.35.0-4.3.1.s390x", "SUSE Linux Enterprise Server 12 SP5:busybox-1.35.0-4.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:busybox-1.35.0-4.3.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:busybox-1.35.0-4.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:busybox-1.35.0-4.3.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:busybox-1.35.0-4.3.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:busybox-1.35.0-4.3.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:busybox-1.35.0-4.3.1.x86_64", "SUSE OpenStack Cloud 9:busybox-1.35.0-4.3.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:busybox-1.35.0-4.3.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2022-11-28T10:23:47Z", details: "moderate", }, ], title: "CVE-2021-42383", }, { cve: "CVE-2021-42384", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2021-42384", }, ], notes: [ { category: "general", text: "A use-after-free in Busybox's awk applet leads to denial of service and possibly code execution when processing a crafted awk pattern in the handle_special function", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Server 12 SP2-BCL:busybox-1.35.0-4.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:busybox-1.35.0-4.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:busybox-1.35.0-4.3.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:busybox-1.35.0-4.3.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:busybox-1.35.0-4.3.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:busybox-1.35.0-4.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:busybox-1.35.0-4.3.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:busybox-1.35.0-4.3.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:busybox-1.35.0-4.3.1.s390x", "SUSE Linux Enterprise Server 12 SP5:busybox-1.35.0-4.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:busybox-1.35.0-4.3.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:busybox-1.35.0-4.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:busybox-1.35.0-4.3.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:busybox-1.35.0-4.3.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:busybox-1.35.0-4.3.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:busybox-1.35.0-4.3.1.x86_64", "SUSE OpenStack Cloud 9:busybox-1.35.0-4.3.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:busybox-1.35.0-4.3.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2021-42384", url: "https://www.suse.com/security/cve/CVE-2021-42384", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Server 12 SP2-BCL:busybox-1.35.0-4.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:busybox-1.35.0-4.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:busybox-1.35.0-4.3.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:busybox-1.35.0-4.3.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:busybox-1.35.0-4.3.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:busybox-1.35.0-4.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:busybox-1.35.0-4.3.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:busybox-1.35.0-4.3.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:busybox-1.35.0-4.3.1.s390x", "SUSE Linux Enterprise Server 12 SP5:busybox-1.35.0-4.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:busybox-1.35.0-4.3.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:busybox-1.35.0-4.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:busybox-1.35.0-4.3.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:busybox-1.35.0-4.3.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:busybox-1.35.0-4.3.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:busybox-1.35.0-4.3.1.x86_64", "SUSE OpenStack Cloud 9:busybox-1.35.0-4.3.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:busybox-1.35.0-4.3.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 6.6, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Server 12 SP2-BCL:busybox-1.35.0-4.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:busybox-1.35.0-4.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:busybox-1.35.0-4.3.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:busybox-1.35.0-4.3.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:busybox-1.35.0-4.3.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:busybox-1.35.0-4.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:busybox-1.35.0-4.3.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:busybox-1.35.0-4.3.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:busybox-1.35.0-4.3.1.s390x", "SUSE Linux Enterprise Server 12 SP5:busybox-1.35.0-4.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:busybox-1.35.0-4.3.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:busybox-1.35.0-4.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:busybox-1.35.0-4.3.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:busybox-1.35.0-4.3.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:busybox-1.35.0-4.3.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:busybox-1.35.0-4.3.1.x86_64", "SUSE OpenStack Cloud 9:busybox-1.35.0-4.3.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:busybox-1.35.0-4.3.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2022-11-28T10:23:47Z", details: "moderate", }, ], title: "CVE-2021-42384", }, { cve: "CVE-2021-42385", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2021-42385", }, ], notes: [ { category: "general", text: "A use-after-free in Busybox's awk applet leads to denial of service and possibly code execution when processing a crafted awk pattern in the evaluate function", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Server 12 SP2-BCL:busybox-1.35.0-4.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:busybox-1.35.0-4.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:busybox-1.35.0-4.3.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:busybox-1.35.0-4.3.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:busybox-1.35.0-4.3.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:busybox-1.35.0-4.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:busybox-1.35.0-4.3.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:busybox-1.35.0-4.3.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:busybox-1.35.0-4.3.1.s390x", "SUSE Linux Enterprise Server 12 SP5:busybox-1.35.0-4.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:busybox-1.35.0-4.3.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:busybox-1.35.0-4.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:busybox-1.35.0-4.3.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:busybox-1.35.0-4.3.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:busybox-1.35.0-4.3.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:busybox-1.35.0-4.3.1.x86_64", "SUSE OpenStack Cloud 9:busybox-1.35.0-4.3.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:busybox-1.35.0-4.3.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2021-42385", url: "https://www.suse.com/security/cve/CVE-2021-42385", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Server 12 SP2-BCL:busybox-1.35.0-4.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:busybox-1.35.0-4.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:busybox-1.35.0-4.3.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:busybox-1.35.0-4.3.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:busybox-1.35.0-4.3.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:busybox-1.35.0-4.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:busybox-1.35.0-4.3.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:busybox-1.35.0-4.3.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:busybox-1.35.0-4.3.1.s390x", "SUSE Linux Enterprise Server 12 SP5:busybox-1.35.0-4.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:busybox-1.35.0-4.3.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:busybox-1.35.0-4.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:busybox-1.35.0-4.3.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:busybox-1.35.0-4.3.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:busybox-1.35.0-4.3.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:busybox-1.35.0-4.3.1.x86_64", "SUSE OpenStack Cloud 9:busybox-1.35.0-4.3.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:busybox-1.35.0-4.3.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 6.6, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Server 12 SP2-BCL:busybox-1.35.0-4.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:busybox-1.35.0-4.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:busybox-1.35.0-4.3.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:busybox-1.35.0-4.3.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:busybox-1.35.0-4.3.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:busybox-1.35.0-4.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:busybox-1.35.0-4.3.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:busybox-1.35.0-4.3.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:busybox-1.35.0-4.3.1.s390x", "SUSE Linux Enterprise Server 12 SP5:busybox-1.35.0-4.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:busybox-1.35.0-4.3.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:busybox-1.35.0-4.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:busybox-1.35.0-4.3.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:busybox-1.35.0-4.3.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:busybox-1.35.0-4.3.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:busybox-1.35.0-4.3.1.x86_64", "SUSE OpenStack Cloud 9:busybox-1.35.0-4.3.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:busybox-1.35.0-4.3.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2022-11-28T10:23:47Z", details: "moderate", }, ], title: "CVE-2021-42385", }, { cve: "CVE-2021-42386", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2021-42386", }, ], notes: [ { category: "general", text: "A use-after-free in Busybox's awk applet leads to denial of service and possibly code execution when processing a crafted awk pattern in the nvalloc function", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Server 12 SP2-BCL:busybox-1.35.0-4.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:busybox-1.35.0-4.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:busybox-1.35.0-4.3.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:busybox-1.35.0-4.3.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:busybox-1.35.0-4.3.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:busybox-1.35.0-4.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:busybox-1.35.0-4.3.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:busybox-1.35.0-4.3.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:busybox-1.35.0-4.3.1.s390x", "SUSE Linux Enterprise Server 12 SP5:busybox-1.35.0-4.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:busybox-1.35.0-4.3.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:busybox-1.35.0-4.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:busybox-1.35.0-4.3.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:busybox-1.35.0-4.3.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:busybox-1.35.0-4.3.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:busybox-1.35.0-4.3.1.x86_64", "SUSE OpenStack Cloud 9:busybox-1.35.0-4.3.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:busybox-1.35.0-4.3.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2021-42386", url: "https://www.suse.com/security/cve/CVE-2021-42386", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Server 12 SP2-BCL:busybox-1.35.0-4.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:busybox-1.35.0-4.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:busybox-1.35.0-4.3.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:busybox-1.35.0-4.3.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:busybox-1.35.0-4.3.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:busybox-1.35.0-4.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:busybox-1.35.0-4.3.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:busybox-1.35.0-4.3.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:busybox-1.35.0-4.3.1.s390x", "SUSE Linux Enterprise Server 12 SP5:busybox-1.35.0-4.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:busybox-1.35.0-4.3.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:busybox-1.35.0-4.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:busybox-1.35.0-4.3.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:busybox-1.35.0-4.3.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:busybox-1.35.0-4.3.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:busybox-1.35.0-4.3.1.x86_64", "SUSE OpenStack Cloud 9:busybox-1.35.0-4.3.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:busybox-1.35.0-4.3.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 6.6, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Server 12 SP2-BCL:busybox-1.35.0-4.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:busybox-1.35.0-4.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:busybox-1.35.0-4.3.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:busybox-1.35.0-4.3.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:busybox-1.35.0-4.3.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:busybox-1.35.0-4.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:busybox-1.35.0-4.3.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:busybox-1.35.0-4.3.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:busybox-1.35.0-4.3.1.s390x", "SUSE Linux Enterprise Server 12 SP5:busybox-1.35.0-4.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:busybox-1.35.0-4.3.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:busybox-1.35.0-4.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:busybox-1.35.0-4.3.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:busybox-1.35.0-4.3.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:busybox-1.35.0-4.3.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:busybox-1.35.0-4.3.1.x86_64", "SUSE OpenStack Cloud 9:busybox-1.35.0-4.3.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:busybox-1.35.0-4.3.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2022-11-28T10:23:47Z", details: "moderate", }, ], title: "CVE-2021-42386", }, ], }
suse-su-2021:3531-1
Vulnerability from csaf_suse
Published
2021-10-27 08:08
Modified
2021-10-27 08:08
Summary
Security update for busybox
Notes
Title of the patch
Security update for busybox
Description of the patch
This update for busybox fixes the following issues:
- CVE-2021-28831: Fixed invalid free or segmentation fault via malformed gzip data (bsc#1184522).
- CVE-2018-20679: Fixed out of bounds read in udhcp (bsc#1121426).
- CVE-2018-1000517: Fixed buffer overflow in the retrieve_file_data() (bsc#1099260).
- CVE-2011-5325: Fixed a directory traversal related to 'tar' command (bsc#951562).
- CVE-2018-1000500: Fixed missing SSL certificate validation related to the 'wget' command (bsc#1099263).
Patchnames
SUSE-2021-3531,SUSE-SLE-Module-Basesystem-15-SP2-2021-3531,SUSE-SLE-Module-Basesystem-15-SP3-2021-3531,SUSE-SLE-Product-HPC-15-2021-3531,SUSE-SLE-Product-HPC-15-SP1-ESPOS-2021-3531,SUSE-SLE-Product-HPC-15-SP1-LTSS-2021-3531,SUSE-SLE-Product-SLES-15-2021-3531,SUSE-SLE-Product-SLES-15-SP1-BCL-2021-3531,SUSE-SLE-Product-SLES-15-SP1-LTSS-2021-3531,SUSE-SLE-Product-SLES_SAP-15-2021-3531,SUSE-SLE-Product-SLES_SAP-15-SP1-2021-3531,SUSE-Storage-6-2021-3531
Terms of use
CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
{ document: { aggregate_severity: { namespace: "https://www.suse.com/support/security/rating/", text: "important", }, category: "csaf_security_advisory", csaf_version: "2.0", distribution: { text: "Copyright 2024 SUSE LLC. All rights reserved.", tlp: { label: "WHITE", url: "https://www.first.org/tlp/", }, }, lang: "en", notes: [ { category: "summary", text: "Security update for busybox", title: "Title of the patch", }, { category: "description", text: "This update for busybox fixes the following issues:\n\n- CVE-2021-28831: Fixed invalid free or segmentation fault via malformed gzip data (bsc#1184522).\n- CVE-2018-20679: Fixed out of bounds read in udhcp (bsc#1121426).\n- CVE-2018-1000517: Fixed buffer overflow in the retrieve_file_data() (bsc#1099260).\n- CVE-2011-5325: Fixed a directory traversal related to 'tar' command (bsc#951562).\n- CVE-2018-1000500: Fixed missing SSL certificate validation related to the 'wget' command (bsc#1099263).\n", title: "Description of the patch", }, { category: "details", text: "SUSE-2021-3531,SUSE-SLE-Module-Basesystem-15-SP2-2021-3531,SUSE-SLE-Module-Basesystem-15-SP3-2021-3531,SUSE-SLE-Product-HPC-15-2021-3531,SUSE-SLE-Product-HPC-15-SP1-ESPOS-2021-3531,SUSE-SLE-Product-HPC-15-SP1-LTSS-2021-3531,SUSE-SLE-Product-SLES-15-2021-3531,SUSE-SLE-Product-SLES-15-SP1-BCL-2021-3531,SUSE-SLE-Product-SLES-15-SP1-LTSS-2021-3531,SUSE-SLE-Product-SLES_SAP-15-2021-3531,SUSE-SLE-Product-SLES_SAP-15-SP1-2021-3531,SUSE-Storage-6-2021-3531", title: "Patchnames", }, { category: "legal_disclaimer", text: "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", title: "Terms of use", }, ], publisher: { category: "vendor", contact_details: "https://www.suse.com/support/security/contact/", name: "SUSE Product Security Team", namespace: "https://www.suse.com/", }, references: [ { category: "external", summary: "SUSE ratings", url: "https://www.suse.com/support/security/rating/", }, { category: "self", summary: "URL of this CSAF notice", url: "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2021_3531-1.json", }, { category: "self", summary: "URL for SUSE-SU-2021:3531-1", url: "https://www.suse.com/support/update/announcement/2021/suse-su-20213531-1/", }, { category: "self", summary: "E-Mail link for SUSE-SU-2021:3531-1", url: "https://lists.suse.com/pipermail/sle-security-updates/2021-October/009658.html", }, { category: "self", summary: "SUSE Bug 1099260", url: "https://bugzilla.suse.com/1099260", }, { category: "self", summary: "SUSE Bug 1099263", url: "https://bugzilla.suse.com/1099263", }, { category: "self", summary: "SUSE Bug 1121426", url: "https://bugzilla.suse.com/1121426", }, { category: "self", summary: "SUSE Bug 1184522", url: "https://bugzilla.suse.com/1184522", }, { category: "self", summary: "SUSE Bug 951562", url: "https://bugzilla.suse.com/951562", }, { category: "self", summary: "SUSE CVE CVE-2011-5325 page", url: "https://www.suse.com/security/cve/CVE-2011-5325/", }, { category: "self", summary: "SUSE CVE CVE-2018-1000500 page", url: "https://www.suse.com/security/cve/CVE-2018-1000500/", }, { category: "self", summary: "SUSE CVE CVE-2018-1000517 page", url: "https://www.suse.com/security/cve/CVE-2018-1000517/", }, { category: "self", summary: "SUSE CVE CVE-2018-20679 page", url: "https://www.suse.com/security/cve/CVE-2018-20679/", }, { category: "self", summary: "SUSE CVE CVE-2021-28831 page", url: "https://www.suse.com/security/cve/CVE-2021-28831/", }, ], title: "Security update for busybox", tracking: { current_release_date: "2021-10-27T08:08:18Z", generator: { date: "2021-10-27T08:08:18Z", engine: { name: "cve-database.git:bin/generate-csaf.pl", version: "1", }, }, id: "SUSE-SU-2021:3531-1", initial_release_date: "2021-10-27T08:08:18Z", revision_history: [ { date: "2021-10-27T08:08:18Z", number: "1", summary: "Current version", }, ], status: "final", version: "1", }, }, product_tree: { branches: [ { branches: [ { branches: [ { category: "product_version", name: "busybox-1.26.2-4.5.1.aarch64", product: { name: "busybox-1.26.2-4.5.1.aarch64", product_id: "busybox-1.26.2-4.5.1.aarch64", }, }, { category: "product_version", name: "busybox-static-1.26.2-4.5.1.aarch64", product: { name: "busybox-static-1.26.2-4.5.1.aarch64", product_id: "busybox-static-1.26.2-4.5.1.aarch64", }, }, ], category: "architecture", name: "aarch64", }, { branches: [ { category: "product_version", name: "busybox-1.26.2-4.5.1.i586", product: { name: "busybox-1.26.2-4.5.1.i586", product_id: "busybox-1.26.2-4.5.1.i586", }, }, { category: "product_version", name: "busybox-static-1.26.2-4.5.1.i586", product: { name: "busybox-static-1.26.2-4.5.1.i586", product_id: "busybox-static-1.26.2-4.5.1.i586", }, }, ], category: "architecture", name: "i586", }, { branches: [ { category: "product_version", name: "busybox-1.26.2-4.5.1.ppc64le", product: { name: "busybox-1.26.2-4.5.1.ppc64le", product_id: "busybox-1.26.2-4.5.1.ppc64le", }, }, { category: "product_version", name: "busybox-static-1.26.2-4.5.1.ppc64le", product: { name: "busybox-static-1.26.2-4.5.1.ppc64le", product_id: "busybox-static-1.26.2-4.5.1.ppc64le", }, }, ], category: "architecture", name: "ppc64le", }, { branches: [ { category: "product_version", name: "busybox-1.26.2-4.5.1.s390x", product: { name: "busybox-1.26.2-4.5.1.s390x", product_id: "busybox-1.26.2-4.5.1.s390x", }, }, { category: "product_version", name: "busybox-static-1.26.2-4.5.1.s390x", product: { name: "busybox-static-1.26.2-4.5.1.s390x", product_id: "busybox-static-1.26.2-4.5.1.s390x", }, }, ], category: "architecture", name: "s390x", }, { branches: [ { category: "product_version", name: "busybox-1.26.2-4.5.1.x86_64", product: { name: "busybox-1.26.2-4.5.1.x86_64", product_id: "busybox-1.26.2-4.5.1.x86_64", }, }, { category: "product_version", name: "busybox-static-1.26.2-4.5.1.x86_64", product: { name: "busybox-static-1.26.2-4.5.1.x86_64", product_id: "busybox-static-1.26.2-4.5.1.x86_64", }, }, ], category: "architecture", name: "x86_64", }, { branches: [ { category: "product_name", name: "SUSE Linux Enterprise Module for Basesystem 15 SP2", product: { name: "SUSE Linux Enterprise Module for Basesystem 15 SP2", product_id: "SUSE Linux Enterprise Module for Basesystem 15 SP2", product_identification_helper: { cpe: "cpe:/o:suse:sle-module-basesystem:15:sp2", }, }, }, { category: "product_name", name: "SUSE Linux Enterprise Module for Basesystem 15 SP3", product: { name: "SUSE Linux Enterprise Module for Basesystem 15 SP3", product_id: "SUSE Linux Enterprise Module for Basesystem 15 SP3", product_identification_helper: { cpe: "cpe:/o:suse:sle-module-basesystem:15:sp3", }, }, }, { category: "product_name", name: "SUSE Linux Enterprise High Performance Computing 15-ESPOS", product: { name: "SUSE Linux Enterprise High Performance Computing 15-ESPOS", product_id: "SUSE Linux Enterprise High Performance Computing 15-ESPOS", product_identification_helper: { cpe: "cpe:/o:suse:sle_hpc-espos:15", }, }, }, { category: "product_name", name: "SUSE Linux Enterprise High Performance Computing 15-LTSS", product: { name: "SUSE Linux Enterprise High Performance Computing 15-LTSS", product_id: "SUSE Linux Enterprise High Performance Computing 15-LTSS", product_identification_helper: { cpe: "cpe:/o:suse:sle_hpc-ltss:15", }, }, }, { category: "product_name", name: "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS", product: { name: "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS", product_id: "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS", product_identification_helper: { cpe: "cpe:/o:suse:sle_hpc-espos:15:sp1", }, }, }, { category: "product_name", name: "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS", product: { name: "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS", product_id: "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS", product_identification_helper: { cpe: "cpe:/o:suse:sle_hpc-ltss:15:sp1", }, }, }, { category: "product_name", name: "SUSE Linux Enterprise Server 15-LTSS", product: { name: "SUSE Linux Enterprise Server 15-LTSS", product_id: "SUSE Linux Enterprise Server 15-LTSS", product_identification_helper: { cpe: "cpe:/o:suse:sles-ltss:15", }, }, }, { category: "product_name", name: "SUSE Linux Enterprise Server 15 SP1-BCL", product: { name: "SUSE Linux Enterprise Server 15 SP1-BCL", product_id: "SUSE Linux Enterprise Server 15 SP1-BCL", product_identification_helper: { cpe: "cpe:/o:suse:sles_bcl:15:sp1", }, }, }, { category: "product_name", name: "SUSE Linux Enterprise Server 15 SP1-LTSS", product: { name: "SUSE Linux Enterprise Server 15 SP1-LTSS", product_id: "SUSE Linux Enterprise Server 15 SP1-LTSS", product_identification_helper: { cpe: "cpe:/o:suse:sles-ltss:15:sp1", }, }, }, { category: "product_name", name: "SUSE Linux Enterprise Server for SAP Applications 15", product: { name: "SUSE Linux Enterprise Server for SAP Applications 15", product_id: "SUSE Linux Enterprise Server for SAP Applications 15", product_identification_helper: { cpe: "cpe:/o:suse:sles_sap:15", }, }, }, { category: "product_name", name: "SUSE Linux Enterprise Server for SAP Applications 15 SP1", product: { name: "SUSE Linux Enterprise Server for SAP Applications 15 SP1", product_id: "SUSE Linux Enterprise Server for SAP Applications 15 SP1", product_identification_helper: { cpe: "cpe:/o:suse:sles_sap:15:sp1", }, }, }, { category: "product_name", name: "SUSE Enterprise Storage 6", product: { name: "SUSE Enterprise Storage 6", product_id: "SUSE Enterprise Storage 6", product_identification_helper: { cpe: "cpe:/o:suse:ses:6", }, }, }, ], category: "product_family", name: "SUSE Linux Enterprise", }, ], category: "vendor", name: "SUSE", }, ], relationships: [ { category: "default_component_of", full_product_name: { name: "busybox-1.26.2-4.5.1.aarch64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP2", product_id: "SUSE Linux Enterprise Module for Basesystem 15 SP2:busybox-1.26.2-4.5.1.aarch64", }, product_reference: "busybox-1.26.2-4.5.1.aarch64", relates_to_product_reference: "SUSE Linux Enterprise Module for Basesystem 15 SP2", }, { category: "default_component_of", full_product_name: { name: "busybox-1.26.2-4.5.1.ppc64le as component of SUSE Linux Enterprise Module for Basesystem 15 SP2", product_id: "SUSE Linux Enterprise Module for Basesystem 15 SP2:busybox-1.26.2-4.5.1.ppc64le", }, product_reference: "busybox-1.26.2-4.5.1.ppc64le", relates_to_product_reference: "SUSE Linux Enterprise Module for Basesystem 15 SP2", }, { category: "default_component_of", full_product_name: { name: "busybox-1.26.2-4.5.1.s390x as component of SUSE Linux Enterprise Module for Basesystem 15 SP2", product_id: "SUSE Linux Enterprise Module for Basesystem 15 SP2:busybox-1.26.2-4.5.1.s390x", }, product_reference: "busybox-1.26.2-4.5.1.s390x", relates_to_product_reference: "SUSE Linux Enterprise Module for Basesystem 15 SP2", }, { category: "default_component_of", full_product_name: { name: "busybox-1.26.2-4.5.1.x86_64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP2", product_id: "SUSE Linux Enterprise Module for Basesystem 15 SP2:busybox-1.26.2-4.5.1.x86_64", }, product_reference: "busybox-1.26.2-4.5.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Module for Basesystem 15 SP2", }, { category: "default_component_of", full_product_name: { name: "busybox-static-1.26.2-4.5.1.aarch64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP2", product_id: "SUSE Linux Enterprise Module for Basesystem 15 SP2:busybox-static-1.26.2-4.5.1.aarch64", }, product_reference: "busybox-static-1.26.2-4.5.1.aarch64", relates_to_product_reference: "SUSE Linux Enterprise Module for Basesystem 15 SP2", }, { category: "default_component_of", full_product_name: { name: "busybox-static-1.26.2-4.5.1.ppc64le as component of SUSE Linux Enterprise Module for Basesystem 15 SP2", product_id: "SUSE Linux Enterprise Module for Basesystem 15 SP2:busybox-static-1.26.2-4.5.1.ppc64le", }, product_reference: "busybox-static-1.26.2-4.5.1.ppc64le", relates_to_product_reference: "SUSE Linux Enterprise Module for Basesystem 15 SP2", }, { category: "default_component_of", full_product_name: { name: "busybox-static-1.26.2-4.5.1.s390x as component of SUSE Linux Enterprise Module for Basesystem 15 SP2", product_id: "SUSE Linux Enterprise Module for Basesystem 15 SP2:busybox-static-1.26.2-4.5.1.s390x", }, product_reference: "busybox-static-1.26.2-4.5.1.s390x", relates_to_product_reference: "SUSE Linux Enterprise Module for Basesystem 15 SP2", }, { category: "default_component_of", full_product_name: { name: "busybox-static-1.26.2-4.5.1.x86_64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP2", product_id: "SUSE Linux Enterprise Module for Basesystem 15 SP2:busybox-static-1.26.2-4.5.1.x86_64", }, product_reference: "busybox-static-1.26.2-4.5.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Module for Basesystem 15 SP2", }, { category: "default_component_of", full_product_name: { name: "busybox-1.26.2-4.5.1.aarch64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP3", product_id: "SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-1.26.2-4.5.1.aarch64", }, product_reference: "busybox-1.26.2-4.5.1.aarch64", relates_to_product_reference: "SUSE Linux Enterprise Module for Basesystem 15 SP3", }, { category: "default_component_of", full_product_name: { name: "busybox-1.26.2-4.5.1.ppc64le as component of SUSE Linux Enterprise Module for Basesystem 15 SP3", product_id: "SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-1.26.2-4.5.1.ppc64le", }, product_reference: "busybox-1.26.2-4.5.1.ppc64le", relates_to_product_reference: "SUSE Linux Enterprise Module for Basesystem 15 SP3", }, { category: "default_component_of", full_product_name: { name: "busybox-1.26.2-4.5.1.s390x as component of SUSE Linux Enterprise Module for Basesystem 15 SP3", product_id: "SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-1.26.2-4.5.1.s390x", }, product_reference: "busybox-1.26.2-4.5.1.s390x", relates_to_product_reference: "SUSE Linux Enterprise Module for Basesystem 15 SP3", }, { category: "default_component_of", full_product_name: { name: "busybox-1.26.2-4.5.1.x86_64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP3", product_id: "SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-1.26.2-4.5.1.x86_64", }, product_reference: "busybox-1.26.2-4.5.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Module for Basesystem 15 SP3", }, { category: "default_component_of", full_product_name: { name: "busybox-static-1.26.2-4.5.1.aarch64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP3", product_id: "SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-static-1.26.2-4.5.1.aarch64", }, product_reference: "busybox-static-1.26.2-4.5.1.aarch64", relates_to_product_reference: "SUSE Linux Enterprise Module for Basesystem 15 SP3", }, { category: "default_component_of", full_product_name: { name: "busybox-static-1.26.2-4.5.1.ppc64le as component of SUSE Linux Enterprise Module for Basesystem 15 SP3", product_id: "SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-static-1.26.2-4.5.1.ppc64le", }, product_reference: "busybox-static-1.26.2-4.5.1.ppc64le", relates_to_product_reference: "SUSE Linux Enterprise Module for Basesystem 15 SP3", }, { category: "default_component_of", full_product_name: { name: "busybox-static-1.26.2-4.5.1.s390x as component of SUSE Linux Enterprise Module for Basesystem 15 SP3", product_id: "SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-static-1.26.2-4.5.1.s390x", }, product_reference: "busybox-static-1.26.2-4.5.1.s390x", relates_to_product_reference: "SUSE Linux Enterprise Module for Basesystem 15 SP3", }, { category: "default_component_of", full_product_name: { name: "busybox-static-1.26.2-4.5.1.x86_64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP3", product_id: "SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-static-1.26.2-4.5.1.x86_64", }, product_reference: "busybox-static-1.26.2-4.5.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Module for Basesystem 15 SP3", }, { category: "default_component_of", full_product_name: { name: "busybox-1.26.2-4.5.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15-ESPOS", product_id: "SUSE Linux Enterprise High Performance Computing 15-ESPOS:busybox-1.26.2-4.5.1.aarch64", }, product_reference: "busybox-1.26.2-4.5.1.aarch64", relates_to_product_reference: "SUSE Linux Enterprise High Performance Computing 15-ESPOS", }, { category: "default_component_of", full_product_name: { name: "busybox-1.26.2-4.5.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15-ESPOS", product_id: "SUSE Linux Enterprise High Performance Computing 15-ESPOS:busybox-1.26.2-4.5.1.x86_64", }, product_reference: "busybox-1.26.2-4.5.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise High Performance Computing 15-ESPOS", }, { category: "default_component_of", full_product_name: { name: "busybox-1.26.2-4.5.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15-LTSS", product_id: "SUSE Linux Enterprise High Performance Computing 15-LTSS:busybox-1.26.2-4.5.1.aarch64", }, product_reference: "busybox-1.26.2-4.5.1.aarch64", relates_to_product_reference: "SUSE Linux Enterprise High Performance Computing 15-LTSS", }, { category: "default_component_of", full_product_name: { name: "busybox-1.26.2-4.5.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15-LTSS", product_id: "SUSE Linux Enterprise High Performance Computing 15-LTSS:busybox-1.26.2-4.5.1.x86_64", }, product_reference: "busybox-1.26.2-4.5.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise High Performance Computing 15-LTSS", }, { category: "default_component_of", full_product_name: { name: "busybox-1.26.2-4.5.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS", product_id: "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:busybox-1.26.2-4.5.1.aarch64", }, product_reference: "busybox-1.26.2-4.5.1.aarch64", relates_to_product_reference: "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS", }, { category: "default_component_of", full_product_name: { name: "busybox-1.26.2-4.5.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS", product_id: "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:busybox-1.26.2-4.5.1.x86_64", }, product_reference: "busybox-1.26.2-4.5.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS", }, { category: "default_component_of", full_product_name: { name: "busybox-static-1.26.2-4.5.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS", product_id: "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:busybox-static-1.26.2-4.5.1.aarch64", }, product_reference: "busybox-static-1.26.2-4.5.1.aarch64", relates_to_product_reference: "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS", }, { category: "default_component_of", full_product_name: { name: "busybox-static-1.26.2-4.5.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS", product_id: "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:busybox-static-1.26.2-4.5.1.x86_64", }, product_reference: "busybox-static-1.26.2-4.5.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS", }, { category: "default_component_of", full_product_name: { name: "busybox-1.26.2-4.5.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS", product_id: "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:busybox-1.26.2-4.5.1.aarch64", }, product_reference: "busybox-1.26.2-4.5.1.aarch64", relates_to_product_reference: "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS", }, { category: "default_component_of", full_product_name: { name: "busybox-1.26.2-4.5.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS", product_id: "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:busybox-1.26.2-4.5.1.x86_64", }, product_reference: "busybox-1.26.2-4.5.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS", }, { category: "default_component_of", full_product_name: { name: "busybox-static-1.26.2-4.5.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS", product_id: "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:busybox-static-1.26.2-4.5.1.aarch64", }, product_reference: "busybox-static-1.26.2-4.5.1.aarch64", relates_to_product_reference: "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS", }, { category: "default_component_of", full_product_name: { name: "busybox-static-1.26.2-4.5.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS", product_id: "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:busybox-static-1.26.2-4.5.1.x86_64", }, product_reference: "busybox-static-1.26.2-4.5.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS", }, { category: "default_component_of", full_product_name: { name: "busybox-1.26.2-4.5.1.aarch64 as component of SUSE Linux Enterprise Server 15-LTSS", product_id: "SUSE Linux Enterprise Server 15-LTSS:busybox-1.26.2-4.5.1.aarch64", }, product_reference: "busybox-1.26.2-4.5.1.aarch64", relates_to_product_reference: "SUSE Linux Enterprise Server 15-LTSS", }, { category: "default_component_of", full_product_name: { name: "busybox-1.26.2-4.5.1.ppc64le as component of SUSE Linux Enterprise Server 15-LTSS", product_id: "SUSE Linux Enterprise Server 15-LTSS:busybox-1.26.2-4.5.1.ppc64le", }, product_reference: "busybox-1.26.2-4.5.1.ppc64le", relates_to_product_reference: "SUSE Linux Enterprise Server 15-LTSS", }, { category: "default_component_of", full_product_name: { name: "busybox-1.26.2-4.5.1.s390x as component of SUSE Linux Enterprise Server 15-LTSS", product_id: "SUSE Linux Enterprise Server 15-LTSS:busybox-1.26.2-4.5.1.s390x", }, product_reference: "busybox-1.26.2-4.5.1.s390x", relates_to_product_reference: "SUSE Linux Enterprise Server 15-LTSS", }, { category: "default_component_of", full_product_name: { name: "busybox-1.26.2-4.5.1.x86_64 as component of SUSE Linux Enterprise Server 15-LTSS", product_id: "SUSE Linux Enterprise Server 15-LTSS:busybox-1.26.2-4.5.1.x86_64", }, product_reference: "busybox-1.26.2-4.5.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Server 15-LTSS", }, { category: "default_component_of", full_product_name: { name: "busybox-1.26.2-4.5.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP1-BCL", product_id: "SUSE Linux Enterprise Server 15 SP1-BCL:busybox-1.26.2-4.5.1.x86_64", }, product_reference: "busybox-1.26.2-4.5.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Server 15 SP1-BCL", }, { category: "default_component_of", full_product_name: { name: "busybox-static-1.26.2-4.5.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP1-BCL", product_id: "SUSE Linux Enterprise Server 15 SP1-BCL:busybox-static-1.26.2-4.5.1.x86_64", }, product_reference: "busybox-static-1.26.2-4.5.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Server 15 SP1-BCL", }, { category: "default_component_of", full_product_name: { name: "busybox-1.26.2-4.5.1.aarch64 as component of SUSE Linux Enterprise Server 15 SP1-LTSS", product_id: "SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-1.26.2-4.5.1.aarch64", }, product_reference: "busybox-1.26.2-4.5.1.aarch64", relates_to_product_reference: "SUSE Linux Enterprise Server 15 SP1-LTSS", }, { category: "default_component_of", full_product_name: { name: "busybox-1.26.2-4.5.1.ppc64le as component of SUSE Linux Enterprise Server 15 SP1-LTSS", product_id: "SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-1.26.2-4.5.1.ppc64le", }, product_reference: "busybox-1.26.2-4.5.1.ppc64le", relates_to_product_reference: "SUSE Linux Enterprise Server 15 SP1-LTSS", }, { category: "default_component_of", full_product_name: { name: "busybox-1.26.2-4.5.1.s390x as component of SUSE Linux Enterprise Server 15 SP1-LTSS", product_id: "SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-1.26.2-4.5.1.s390x", }, product_reference: "busybox-1.26.2-4.5.1.s390x", relates_to_product_reference: "SUSE Linux Enterprise Server 15 SP1-LTSS", }, { category: "default_component_of", full_product_name: { name: "busybox-1.26.2-4.5.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP1-LTSS", product_id: "SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-1.26.2-4.5.1.x86_64", }, product_reference: "busybox-1.26.2-4.5.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Server 15 SP1-LTSS", }, { category: "default_component_of", full_product_name: { name: "busybox-static-1.26.2-4.5.1.aarch64 as component of SUSE Linux Enterprise Server 15 SP1-LTSS", product_id: "SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-static-1.26.2-4.5.1.aarch64", }, product_reference: "busybox-static-1.26.2-4.5.1.aarch64", relates_to_product_reference: "SUSE Linux Enterprise Server 15 SP1-LTSS", }, { category: "default_component_of", full_product_name: { name: "busybox-static-1.26.2-4.5.1.ppc64le as component of SUSE Linux Enterprise Server 15 SP1-LTSS", product_id: "SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-static-1.26.2-4.5.1.ppc64le", }, product_reference: "busybox-static-1.26.2-4.5.1.ppc64le", relates_to_product_reference: "SUSE Linux Enterprise Server 15 SP1-LTSS", }, { category: "default_component_of", full_product_name: { name: "busybox-static-1.26.2-4.5.1.s390x as component of SUSE Linux Enterprise Server 15 SP1-LTSS", product_id: "SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-static-1.26.2-4.5.1.s390x", }, product_reference: "busybox-static-1.26.2-4.5.1.s390x", relates_to_product_reference: "SUSE Linux Enterprise Server 15 SP1-LTSS", }, { category: "default_component_of", full_product_name: { name: "busybox-static-1.26.2-4.5.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP1-LTSS", product_id: "SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-static-1.26.2-4.5.1.x86_64", }, product_reference: "busybox-static-1.26.2-4.5.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Server 15 SP1-LTSS", }, { category: "default_component_of", full_product_name: { name: "busybox-1.26.2-4.5.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 15", product_id: "SUSE Linux Enterprise Server for SAP Applications 15:busybox-1.26.2-4.5.1.ppc64le", }, product_reference: "busybox-1.26.2-4.5.1.ppc64le", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 15", }, { category: "default_component_of", full_product_name: { name: "busybox-1.26.2-4.5.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15", product_id: "SUSE Linux Enterprise Server for SAP Applications 15:busybox-1.26.2-4.5.1.x86_64", }, product_reference: "busybox-1.26.2-4.5.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 15", }, { category: "default_component_of", full_product_name: { name: "busybox-1.26.2-4.5.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 15 SP1", product_id: "SUSE Linux Enterprise Server for SAP Applications 15 SP1:busybox-1.26.2-4.5.1.ppc64le", }, product_reference: "busybox-1.26.2-4.5.1.ppc64le", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 15 SP1", }, { category: "default_component_of", full_product_name: { name: "busybox-1.26.2-4.5.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15 SP1", product_id: "SUSE Linux Enterprise Server for SAP Applications 15 SP1:busybox-1.26.2-4.5.1.x86_64", }, product_reference: "busybox-1.26.2-4.5.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 15 SP1", }, { category: "default_component_of", full_product_name: { name: "busybox-static-1.26.2-4.5.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 15 SP1", product_id: "SUSE Linux Enterprise Server for SAP Applications 15 SP1:busybox-static-1.26.2-4.5.1.ppc64le", }, product_reference: "busybox-static-1.26.2-4.5.1.ppc64le", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 15 SP1", }, { category: "default_component_of", full_product_name: { name: "busybox-static-1.26.2-4.5.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15 SP1", product_id: "SUSE Linux Enterprise Server for SAP Applications 15 SP1:busybox-static-1.26.2-4.5.1.x86_64", }, product_reference: "busybox-static-1.26.2-4.5.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 15 SP1", }, { category: "default_component_of", full_product_name: { name: "busybox-1.26.2-4.5.1.aarch64 as component of SUSE Enterprise Storage 6", product_id: "SUSE Enterprise Storage 6:busybox-1.26.2-4.5.1.aarch64", }, product_reference: "busybox-1.26.2-4.5.1.aarch64", relates_to_product_reference: "SUSE Enterprise Storage 6", }, { category: "default_component_of", full_product_name: { name: "busybox-1.26.2-4.5.1.x86_64 as component of SUSE Enterprise Storage 6", product_id: "SUSE Enterprise Storage 6:busybox-1.26.2-4.5.1.x86_64", }, product_reference: "busybox-1.26.2-4.5.1.x86_64", relates_to_product_reference: "SUSE Enterprise Storage 6", }, { category: "default_component_of", full_product_name: { name: "busybox-static-1.26.2-4.5.1.aarch64 as component of SUSE Enterprise Storage 6", product_id: "SUSE Enterprise Storage 6:busybox-static-1.26.2-4.5.1.aarch64", }, product_reference: "busybox-static-1.26.2-4.5.1.aarch64", relates_to_product_reference: "SUSE Enterprise Storage 6", }, { category: "default_component_of", full_product_name: { name: "busybox-static-1.26.2-4.5.1.x86_64 as component of SUSE Enterprise Storage 6", product_id: "SUSE Enterprise Storage 6:busybox-static-1.26.2-4.5.1.x86_64", }, product_reference: "busybox-static-1.26.2-4.5.1.x86_64", relates_to_product_reference: "SUSE Enterprise Storage 6", }, ], }, vulnerabilities: [ { cve: "CVE-2011-5325", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2011-5325", }, ], notes: [ { category: "general", text: "Directory traversal vulnerability in the BusyBox implementation of tar before 1.22.0 v5 allows remote attackers to point to files outside the current working directory via a symlink.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Enterprise Storage 6:busybox-1.26.2-4.5.1.aarch64", "SUSE Enterprise Storage 6:busybox-1.26.2-4.5.1.x86_64", "SUSE Enterprise Storage 6:busybox-static-1.26.2-4.5.1.aarch64", "SUSE Enterprise Storage 6:busybox-static-1.26.2-4.5.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:busybox-1.26.2-4.5.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:busybox-1.26.2-4.5.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:busybox-static-1.26.2-4.5.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:busybox-static-1.26.2-4.5.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:busybox-1.26.2-4.5.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:busybox-1.26.2-4.5.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:busybox-static-1.26.2-4.5.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:busybox-static-1.26.2-4.5.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:busybox-1.26.2-4.5.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:busybox-1.26.2-4.5.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:busybox-1.26.2-4.5.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:busybox-1.26.2-4.5.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:busybox-1.26.2-4.5.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:busybox-1.26.2-4.5.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP2:busybox-1.26.2-4.5.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP2:busybox-1.26.2-4.5.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:busybox-static-1.26.2-4.5.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:busybox-static-1.26.2-4.5.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP2:busybox-static-1.26.2-4.5.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP2:busybox-static-1.26.2-4.5.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-1.26.2-4.5.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-1.26.2-4.5.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-1.26.2-4.5.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-1.26.2-4.5.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-static-1.26.2-4.5.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-static-1.26.2-4.5.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-static-1.26.2-4.5.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-static-1.26.2-4.5.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:busybox-1.26.2-4.5.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:busybox-static-1.26.2-4.5.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-1.26.2-4.5.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-1.26.2-4.5.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-1.26.2-4.5.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-1.26.2-4.5.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-static-1.26.2-4.5.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-static-1.26.2-4.5.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-static-1.26.2-4.5.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-static-1.26.2-4.5.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:busybox-1.26.2-4.5.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:busybox-1.26.2-4.5.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:busybox-1.26.2-4.5.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:busybox-1.26.2-4.5.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:busybox-1.26.2-4.5.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:busybox-1.26.2-4.5.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:busybox-static-1.26.2-4.5.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:busybox-static-1.26.2-4.5.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:busybox-1.26.2-4.5.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:busybox-1.26.2-4.5.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2011-5325", url: "https://www.suse.com/security/cve/CVE-2011-5325", }, { category: "external", summary: "SUSE Bug 951562 for CVE-2011-5325", url: "https://bugzilla.suse.com/951562", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Enterprise Storage 6:busybox-1.26.2-4.5.1.aarch64", "SUSE Enterprise Storage 6:busybox-1.26.2-4.5.1.x86_64", "SUSE Enterprise Storage 6:busybox-static-1.26.2-4.5.1.aarch64", "SUSE Enterprise Storage 6:busybox-static-1.26.2-4.5.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:busybox-1.26.2-4.5.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:busybox-1.26.2-4.5.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:busybox-static-1.26.2-4.5.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:busybox-static-1.26.2-4.5.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:busybox-1.26.2-4.5.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:busybox-1.26.2-4.5.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:busybox-static-1.26.2-4.5.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:busybox-static-1.26.2-4.5.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:busybox-1.26.2-4.5.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:busybox-1.26.2-4.5.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:busybox-1.26.2-4.5.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:busybox-1.26.2-4.5.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:busybox-1.26.2-4.5.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:busybox-1.26.2-4.5.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP2:busybox-1.26.2-4.5.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP2:busybox-1.26.2-4.5.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:busybox-static-1.26.2-4.5.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:busybox-static-1.26.2-4.5.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP2:busybox-static-1.26.2-4.5.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP2:busybox-static-1.26.2-4.5.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-1.26.2-4.5.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-1.26.2-4.5.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-1.26.2-4.5.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-1.26.2-4.5.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-static-1.26.2-4.5.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-static-1.26.2-4.5.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-static-1.26.2-4.5.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-static-1.26.2-4.5.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:busybox-1.26.2-4.5.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:busybox-static-1.26.2-4.5.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-1.26.2-4.5.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-1.26.2-4.5.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-1.26.2-4.5.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-1.26.2-4.5.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-static-1.26.2-4.5.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-static-1.26.2-4.5.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-static-1.26.2-4.5.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-static-1.26.2-4.5.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:busybox-1.26.2-4.5.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:busybox-1.26.2-4.5.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:busybox-1.26.2-4.5.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:busybox-1.26.2-4.5.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:busybox-1.26.2-4.5.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:busybox-1.26.2-4.5.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:busybox-static-1.26.2-4.5.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:busybox-static-1.26.2-4.5.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:busybox-1.26.2-4.5.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:busybox-1.26.2-4.5.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 7.5, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N", version: "3.1", }, products: [ "SUSE Enterprise Storage 6:busybox-1.26.2-4.5.1.aarch64", "SUSE Enterprise Storage 6:busybox-1.26.2-4.5.1.x86_64", "SUSE Enterprise Storage 6:busybox-static-1.26.2-4.5.1.aarch64", "SUSE Enterprise Storage 6:busybox-static-1.26.2-4.5.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:busybox-1.26.2-4.5.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:busybox-1.26.2-4.5.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:busybox-static-1.26.2-4.5.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:busybox-static-1.26.2-4.5.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:busybox-1.26.2-4.5.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:busybox-1.26.2-4.5.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:busybox-static-1.26.2-4.5.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:busybox-static-1.26.2-4.5.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:busybox-1.26.2-4.5.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:busybox-1.26.2-4.5.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:busybox-1.26.2-4.5.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:busybox-1.26.2-4.5.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:busybox-1.26.2-4.5.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:busybox-1.26.2-4.5.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP2:busybox-1.26.2-4.5.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP2:busybox-1.26.2-4.5.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:busybox-static-1.26.2-4.5.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:busybox-static-1.26.2-4.5.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP2:busybox-static-1.26.2-4.5.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP2:busybox-static-1.26.2-4.5.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-1.26.2-4.5.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-1.26.2-4.5.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-1.26.2-4.5.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-1.26.2-4.5.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-static-1.26.2-4.5.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-static-1.26.2-4.5.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-static-1.26.2-4.5.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-static-1.26.2-4.5.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:busybox-1.26.2-4.5.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:busybox-static-1.26.2-4.5.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-1.26.2-4.5.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-1.26.2-4.5.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-1.26.2-4.5.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-1.26.2-4.5.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-static-1.26.2-4.5.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-static-1.26.2-4.5.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-static-1.26.2-4.5.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-static-1.26.2-4.5.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:busybox-1.26.2-4.5.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:busybox-1.26.2-4.5.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:busybox-1.26.2-4.5.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:busybox-1.26.2-4.5.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:busybox-1.26.2-4.5.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:busybox-1.26.2-4.5.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:busybox-static-1.26.2-4.5.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:busybox-static-1.26.2-4.5.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:busybox-1.26.2-4.5.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:busybox-1.26.2-4.5.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2021-10-27T08:08:18Z", details: "moderate", }, ], title: "CVE-2011-5325", }, { cve: "CVE-2018-1000500", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2018-1000500", }, ], notes: [ { category: "general", text: "Busybox contains a Missing SSL certificate validation vulnerability in The \"busybox wget\" applet that can result in arbitrary code execution. This attack appear to be exploitable via Simply download any file over HTTPS using \"busybox wget https://compromised-domain.com/important-file\".", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Enterprise Storage 6:busybox-1.26.2-4.5.1.aarch64", "SUSE Enterprise Storage 6:busybox-1.26.2-4.5.1.x86_64", "SUSE Enterprise Storage 6:busybox-static-1.26.2-4.5.1.aarch64", "SUSE Enterprise Storage 6:busybox-static-1.26.2-4.5.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:busybox-1.26.2-4.5.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:busybox-1.26.2-4.5.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:busybox-static-1.26.2-4.5.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:busybox-static-1.26.2-4.5.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:busybox-1.26.2-4.5.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:busybox-1.26.2-4.5.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:busybox-static-1.26.2-4.5.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:busybox-static-1.26.2-4.5.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:busybox-1.26.2-4.5.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:busybox-1.26.2-4.5.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:busybox-1.26.2-4.5.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:busybox-1.26.2-4.5.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:busybox-1.26.2-4.5.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:busybox-1.26.2-4.5.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP2:busybox-1.26.2-4.5.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP2:busybox-1.26.2-4.5.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:busybox-static-1.26.2-4.5.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:busybox-static-1.26.2-4.5.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP2:busybox-static-1.26.2-4.5.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP2:busybox-static-1.26.2-4.5.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-1.26.2-4.5.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-1.26.2-4.5.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-1.26.2-4.5.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-1.26.2-4.5.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-static-1.26.2-4.5.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-static-1.26.2-4.5.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-static-1.26.2-4.5.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-static-1.26.2-4.5.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:busybox-1.26.2-4.5.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:busybox-static-1.26.2-4.5.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-1.26.2-4.5.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-1.26.2-4.5.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-1.26.2-4.5.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-1.26.2-4.5.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-static-1.26.2-4.5.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-static-1.26.2-4.5.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-static-1.26.2-4.5.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-static-1.26.2-4.5.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:busybox-1.26.2-4.5.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:busybox-1.26.2-4.5.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:busybox-1.26.2-4.5.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:busybox-1.26.2-4.5.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:busybox-1.26.2-4.5.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:busybox-1.26.2-4.5.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:busybox-static-1.26.2-4.5.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:busybox-static-1.26.2-4.5.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:busybox-1.26.2-4.5.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:busybox-1.26.2-4.5.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2018-1000500", url: "https://www.suse.com/security/cve/CVE-2018-1000500", }, { category: "external", summary: "SUSE Bug 1099263 for CVE-2018-1000500", url: "https://bugzilla.suse.com/1099263", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Enterprise Storage 6:busybox-1.26.2-4.5.1.aarch64", "SUSE Enterprise Storage 6:busybox-1.26.2-4.5.1.x86_64", "SUSE Enterprise Storage 6:busybox-static-1.26.2-4.5.1.aarch64", "SUSE Enterprise Storage 6:busybox-static-1.26.2-4.5.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:busybox-1.26.2-4.5.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:busybox-1.26.2-4.5.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:busybox-static-1.26.2-4.5.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:busybox-static-1.26.2-4.5.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:busybox-1.26.2-4.5.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:busybox-1.26.2-4.5.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:busybox-static-1.26.2-4.5.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:busybox-static-1.26.2-4.5.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:busybox-1.26.2-4.5.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:busybox-1.26.2-4.5.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:busybox-1.26.2-4.5.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:busybox-1.26.2-4.5.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:busybox-1.26.2-4.5.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:busybox-1.26.2-4.5.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP2:busybox-1.26.2-4.5.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP2:busybox-1.26.2-4.5.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:busybox-static-1.26.2-4.5.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:busybox-static-1.26.2-4.5.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP2:busybox-static-1.26.2-4.5.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP2:busybox-static-1.26.2-4.5.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-1.26.2-4.5.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-1.26.2-4.5.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-1.26.2-4.5.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-1.26.2-4.5.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-static-1.26.2-4.5.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-static-1.26.2-4.5.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-static-1.26.2-4.5.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-static-1.26.2-4.5.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:busybox-1.26.2-4.5.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:busybox-static-1.26.2-4.5.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-1.26.2-4.5.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-1.26.2-4.5.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-1.26.2-4.5.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-1.26.2-4.5.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-static-1.26.2-4.5.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-static-1.26.2-4.5.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-static-1.26.2-4.5.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-static-1.26.2-4.5.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:busybox-1.26.2-4.5.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:busybox-1.26.2-4.5.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:busybox-1.26.2-4.5.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:busybox-1.26.2-4.5.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:busybox-1.26.2-4.5.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:busybox-1.26.2-4.5.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:busybox-static-1.26.2-4.5.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:busybox-static-1.26.2-4.5.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:busybox-1.26.2-4.5.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:busybox-1.26.2-4.5.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 7.5, baseSeverity: "HIGH", vectorString: "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N", version: "3.0", }, products: [ "SUSE Enterprise Storage 6:busybox-1.26.2-4.5.1.aarch64", "SUSE Enterprise Storage 6:busybox-1.26.2-4.5.1.x86_64", "SUSE Enterprise Storage 6:busybox-static-1.26.2-4.5.1.aarch64", "SUSE Enterprise Storage 6:busybox-static-1.26.2-4.5.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:busybox-1.26.2-4.5.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:busybox-1.26.2-4.5.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:busybox-static-1.26.2-4.5.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:busybox-static-1.26.2-4.5.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:busybox-1.26.2-4.5.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:busybox-1.26.2-4.5.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:busybox-static-1.26.2-4.5.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:busybox-static-1.26.2-4.5.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:busybox-1.26.2-4.5.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:busybox-1.26.2-4.5.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:busybox-1.26.2-4.5.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:busybox-1.26.2-4.5.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:busybox-1.26.2-4.5.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:busybox-1.26.2-4.5.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP2:busybox-1.26.2-4.5.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP2:busybox-1.26.2-4.5.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:busybox-static-1.26.2-4.5.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:busybox-static-1.26.2-4.5.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP2:busybox-static-1.26.2-4.5.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP2:busybox-static-1.26.2-4.5.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-1.26.2-4.5.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-1.26.2-4.5.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-1.26.2-4.5.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-1.26.2-4.5.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-static-1.26.2-4.5.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-static-1.26.2-4.5.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-static-1.26.2-4.5.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-static-1.26.2-4.5.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:busybox-1.26.2-4.5.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:busybox-static-1.26.2-4.5.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-1.26.2-4.5.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-1.26.2-4.5.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-1.26.2-4.5.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-1.26.2-4.5.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-static-1.26.2-4.5.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-static-1.26.2-4.5.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-static-1.26.2-4.5.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-static-1.26.2-4.5.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:busybox-1.26.2-4.5.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:busybox-1.26.2-4.5.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:busybox-1.26.2-4.5.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:busybox-1.26.2-4.5.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:busybox-1.26.2-4.5.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:busybox-1.26.2-4.5.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:busybox-static-1.26.2-4.5.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:busybox-static-1.26.2-4.5.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:busybox-1.26.2-4.5.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:busybox-1.26.2-4.5.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2021-10-27T08:08:18Z", details: "important", }, ], title: "CVE-2018-1000500", }, { cve: "CVE-2018-1000517", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2018-1000517", }, ], notes: [ { category: "general", text: "BusyBox project BusyBox wget version prior to commit 8e2174e9bd836e53c8b9c6e00d1bc6e2a718686e contains a Buffer Overflow vulnerability in Busybox wget that can result in heap buffer overflow. This attack appear to be exploitable via network connectivity. This vulnerability appears to have been fixed in after commit 8e2174e9bd836e53c8b9c6e00d1bc6e2a718686e.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Enterprise Storage 6:busybox-1.26.2-4.5.1.aarch64", "SUSE Enterprise Storage 6:busybox-1.26.2-4.5.1.x86_64", "SUSE Enterprise Storage 6:busybox-static-1.26.2-4.5.1.aarch64", "SUSE Enterprise Storage 6:busybox-static-1.26.2-4.5.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:busybox-1.26.2-4.5.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:busybox-1.26.2-4.5.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:busybox-static-1.26.2-4.5.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:busybox-static-1.26.2-4.5.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:busybox-1.26.2-4.5.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:busybox-1.26.2-4.5.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:busybox-static-1.26.2-4.5.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:busybox-static-1.26.2-4.5.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:busybox-1.26.2-4.5.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:busybox-1.26.2-4.5.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:busybox-1.26.2-4.5.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:busybox-1.26.2-4.5.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:busybox-1.26.2-4.5.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:busybox-1.26.2-4.5.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP2:busybox-1.26.2-4.5.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP2:busybox-1.26.2-4.5.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:busybox-static-1.26.2-4.5.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:busybox-static-1.26.2-4.5.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP2:busybox-static-1.26.2-4.5.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP2:busybox-static-1.26.2-4.5.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-1.26.2-4.5.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-1.26.2-4.5.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-1.26.2-4.5.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-1.26.2-4.5.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-static-1.26.2-4.5.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-static-1.26.2-4.5.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-static-1.26.2-4.5.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-static-1.26.2-4.5.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:busybox-1.26.2-4.5.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:busybox-static-1.26.2-4.5.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-1.26.2-4.5.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-1.26.2-4.5.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-1.26.2-4.5.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-1.26.2-4.5.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-static-1.26.2-4.5.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-static-1.26.2-4.5.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-static-1.26.2-4.5.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-static-1.26.2-4.5.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:busybox-1.26.2-4.5.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:busybox-1.26.2-4.5.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:busybox-1.26.2-4.5.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:busybox-1.26.2-4.5.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:busybox-1.26.2-4.5.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:busybox-1.26.2-4.5.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:busybox-static-1.26.2-4.5.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:busybox-static-1.26.2-4.5.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:busybox-1.26.2-4.5.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:busybox-1.26.2-4.5.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2018-1000517", url: "https://www.suse.com/security/cve/CVE-2018-1000517", }, { category: "external", summary: "SUSE Bug 1099260 for CVE-2018-1000517", url: "https://bugzilla.suse.com/1099260", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Enterprise Storage 6:busybox-1.26.2-4.5.1.aarch64", "SUSE Enterprise Storage 6:busybox-1.26.2-4.5.1.x86_64", "SUSE Enterprise Storage 6:busybox-static-1.26.2-4.5.1.aarch64", "SUSE Enterprise Storage 6:busybox-static-1.26.2-4.5.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:busybox-1.26.2-4.5.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:busybox-1.26.2-4.5.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:busybox-static-1.26.2-4.5.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:busybox-static-1.26.2-4.5.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:busybox-1.26.2-4.5.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:busybox-1.26.2-4.5.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:busybox-static-1.26.2-4.5.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:busybox-static-1.26.2-4.5.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:busybox-1.26.2-4.5.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:busybox-1.26.2-4.5.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:busybox-1.26.2-4.5.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:busybox-1.26.2-4.5.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:busybox-1.26.2-4.5.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:busybox-1.26.2-4.5.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP2:busybox-1.26.2-4.5.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP2:busybox-1.26.2-4.5.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:busybox-static-1.26.2-4.5.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:busybox-static-1.26.2-4.5.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP2:busybox-static-1.26.2-4.5.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP2:busybox-static-1.26.2-4.5.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-1.26.2-4.5.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-1.26.2-4.5.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-1.26.2-4.5.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-1.26.2-4.5.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-static-1.26.2-4.5.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-static-1.26.2-4.5.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-static-1.26.2-4.5.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-static-1.26.2-4.5.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:busybox-1.26.2-4.5.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:busybox-static-1.26.2-4.5.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-1.26.2-4.5.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-1.26.2-4.5.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-1.26.2-4.5.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-1.26.2-4.5.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-static-1.26.2-4.5.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-static-1.26.2-4.5.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-static-1.26.2-4.5.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-static-1.26.2-4.5.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:busybox-1.26.2-4.5.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:busybox-1.26.2-4.5.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:busybox-1.26.2-4.5.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:busybox-1.26.2-4.5.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:busybox-1.26.2-4.5.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:busybox-1.26.2-4.5.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:busybox-static-1.26.2-4.5.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:busybox-static-1.26.2-4.5.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:busybox-1.26.2-4.5.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:busybox-1.26.2-4.5.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.6, baseSeverity: "MEDIUM", vectorString: "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L", version: "3.0", }, products: [ "SUSE Enterprise Storage 6:busybox-1.26.2-4.5.1.aarch64", "SUSE Enterprise Storage 6:busybox-1.26.2-4.5.1.x86_64", "SUSE Enterprise Storage 6:busybox-static-1.26.2-4.5.1.aarch64", "SUSE Enterprise Storage 6:busybox-static-1.26.2-4.5.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:busybox-1.26.2-4.5.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:busybox-1.26.2-4.5.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:busybox-static-1.26.2-4.5.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:busybox-static-1.26.2-4.5.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:busybox-1.26.2-4.5.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:busybox-1.26.2-4.5.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:busybox-static-1.26.2-4.5.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:busybox-static-1.26.2-4.5.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:busybox-1.26.2-4.5.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:busybox-1.26.2-4.5.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:busybox-1.26.2-4.5.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:busybox-1.26.2-4.5.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:busybox-1.26.2-4.5.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:busybox-1.26.2-4.5.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP2:busybox-1.26.2-4.5.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP2:busybox-1.26.2-4.5.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:busybox-static-1.26.2-4.5.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:busybox-static-1.26.2-4.5.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP2:busybox-static-1.26.2-4.5.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP2:busybox-static-1.26.2-4.5.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-1.26.2-4.5.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-1.26.2-4.5.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-1.26.2-4.5.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-1.26.2-4.5.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-static-1.26.2-4.5.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-static-1.26.2-4.5.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-static-1.26.2-4.5.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-static-1.26.2-4.5.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:busybox-1.26.2-4.5.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:busybox-static-1.26.2-4.5.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-1.26.2-4.5.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-1.26.2-4.5.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-1.26.2-4.5.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-1.26.2-4.5.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-static-1.26.2-4.5.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-static-1.26.2-4.5.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-static-1.26.2-4.5.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-static-1.26.2-4.5.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:busybox-1.26.2-4.5.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:busybox-1.26.2-4.5.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:busybox-1.26.2-4.5.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:busybox-1.26.2-4.5.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:busybox-1.26.2-4.5.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:busybox-1.26.2-4.5.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:busybox-static-1.26.2-4.5.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:busybox-static-1.26.2-4.5.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:busybox-1.26.2-4.5.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:busybox-1.26.2-4.5.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2021-10-27T08:08:18Z", details: "important", }, ], title: "CVE-2018-1000517", }, { cve: "CVE-2018-20679", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2018-20679", }, ], notes: [ { category: "general", text: "An issue was discovered in BusyBox before 1.30.0. An out of bounds read in udhcp components (consumed by the DHCP server, client, and relay) allows a remote attacker to leak sensitive information from the stack by sending a crafted DHCP message. This is related to verification in udhcp_get_option() in networking/udhcp/common.c that 4-byte options are indeed 4 bytes.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Enterprise Storage 6:busybox-1.26.2-4.5.1.aarch64", "SUSE Enterprise Storage 6:busybox-1.26.2-4.5.1.x86_64", "SUSE Enterprise Storage 6:busybox-static-1.26.2-4.5.1.aarch64", "SUSE Enterprise Storage 6:busybox-static-1.26.2-4.5.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:busybox-1.26.2-4.5.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:busybox-1.26.2-4.5.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:busybox-static-1.26.2-4.5.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:busybox-static-1.26.2-4.5.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:busybox-1.26.2-4.5.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:busybox-1.26.2-4.5.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:busybox-static-1.26.2-4.5.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:busybox-static-1.26.2-4.5.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:busybox-1.26.2-4.5.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:busybox-1.26.2-4.5.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:busybox-1.26.2-4.5.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:busybox-1.26.2-4.5.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:busybox-1.26.2-4.5.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:busybox-1.26.2-4.5.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP2:busybox-1.26.2-4.5.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP2:busybox-1.26.2-4.5.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:busybox-static-1.26.2-4.5.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:busybox-static-1.26.2-4.5.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP2:busybox-static-1.26.2-4.5.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP2:busybox-static-1.26.2-4.5.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-1.26.2-4.5.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-1.26.2-4.5.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-1.26.2-4.5.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-1.26.2-4.5.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-static-1.26.2-4.5.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-static-1.26.2-4.5.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-static-1.26.2-4.5.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-static-1.26.2-4.5.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:busybox-1.26.2-4.5.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:busybox-static-1.26.2-4.5.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-1.26.2-4.5.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-1.26.2-4.5.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-1.26.2-4.5.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-1.26.2-4.5.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-static-1.26.2-4.5.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-static-1.26.2-4.5.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-static-1.26.2-4.5.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-static-1.26.2-4.5.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:busybox-1.26.2-4.5.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:busybox-1.26.2-4.5.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:busybox-1.26.2-4.5.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:busybox-1.26.2-4.5.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:busybox-1.26.2-4.5.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:busybox-1.26.2-4.5.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:busybox-static-1.26.2-4.5.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:busybox-static-1.26.2-4.5.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:busybox-1.26.2-4.5.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:busybox-1.26.2-4.5.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2018-20679", url: "https://www.suse.com/security/cve/CVE-2018-20679", }, { category: "external", summary: "SUSE Bug 1121426 for CVE-2018-20679", url: "https://bugzilla.suse.com/1121426", }, { category: "external", summary: "SUSE Bug 1121428 for CVE-2018-20679", url: "https://bugzilla.suse.com/1121428", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Enterprise Storage 6:busybox-1.26.2-4.5.1.aarch64", "SUSE Enterprise Storage 6:busybox-1.26.2-4.5.1.x86_64", "SUSE Enterprise Storage 6:busybox-static-1.26.2-4.5.1.aarch64", "SUSE Enterprise Storage 6:busybox-static-1.26.2-4.5.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:busybox-1.26.2-4.5.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:busybox-1.26.2-4.5.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:busybox-static-1.26.2-4.5.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:busybox-static-1.26.2-4.5.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:busybox-1.26.2-4.5.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:busybox-1.26.2-4.5.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:busybox-static-1.26.2-4.5.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:busybox-static-1.26.2-4.5.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:busybox-1.26.2-4.5.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:busybox-1.26.2-4.5.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:busybox-1.26.2-4.5.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:busybox-1.26.2-4.5.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:busybox-1.26.2-4.5.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:busybox-1.26.2-4.5.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP2:busybox-1.26.2-4.5.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP2:busybox-1.26.2-4.5.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:busybox-static-1.26.2-4.5.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:busybox-static-1.26.2-4.5.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP2:busybox-static-1.26.2-4.5.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP2:busybox-static-1.26.2-4.5.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-1.26.2-4.5.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-1.26.2-4.5.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-1.26.2-4.5.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-1.26.2-4.5.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-static-1.26.2-4.5.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-static-1.26.2-4.5.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-static-1.26.2-4.5.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-static-1.26.2-4.5.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:busybox-1.26.2-4.5.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:busybox-static-1.26.2-4.5.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-1.26.2-4.5.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-1.26.2-4.5.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-1.26.2-4.5.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-1.26.2-4.5.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-static-1.26.2-4.5.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-static-1.26.2-4.5.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-static-1.26.2-4.5.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-static-1.26.2-4.5.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:busybox-1.26.2-4.5.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:busybox-1.26.2-4.5.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:busybox-1.26.2-4.5.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:busybox-1.26.2-4.5.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:busybox-1.26.2-4.5.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:busybox-1.26.2-4.5.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:busybox-static-1.26.2-4.5.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:busybox-static-1.26.2-4.5.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:busybox-1.26.2-4.5.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:busybox-1.26.2-4.5.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.3, baseSeverity: "MEDIUM", vectorString: "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N", version: "3.0", }, products: [ "SUSE Enterprise Storage 6:busybox-1.26.2-4.5.1.aarch64", "SUSE Enterprise Storage 6:busybox-1.26.2-4.5.1.x86_64", "SUSE Enterprise Storage 6:busybox-static-1.26.2-4.5.1.aarch64", "SUSE Enterprise Storage 6:busybox-static-1.26.2-4.5.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:busybox-1.26.2-4.5.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:busybox-1.26.2-4.5.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:busybox-static-1.26.2-4.5.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:busybox-static-1.26.2-4.5.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:busybox-1.26.2-4.5.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:busybox-1.26.2-4.5.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:busybox-static-1.26.2-4.5.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:busybox-static-1.26.2-4.5.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:busybox-1.26.2-4.5.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:busybox-1.26.2-4.5.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:busybox-1.26.2-4.5.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:busybox-1.26.2-4.5.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:busybox-1.26.2-4.5.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:busybox-1.26.2-4.5.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP2:busybox-1.26.2-4.5.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP2:busybox-1.26.2-4.5.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:busybox-static-1.26.2-4.5.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:busybox-static-1.26.2-4.5.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP2:busybox-static-1.26.2-4.5.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP2:busybox-static-1.26.2-4.5.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-1.26.2-4.5.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-1.26.2-4.5.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-1.26.2-4.5.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-1.26.2-4.5.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-static-1.26.2-4.5.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-static-1.26.2-4.5.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-static-1.26.2-4.5.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-static-1.26.2-4.5.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:busybox-1.26.2-4.5.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:busybox-static-1.26.2-4.5.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-1.26.2-4.5.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-1.26.2-4.5.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-1.26.2-4.5.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-1.26.2-4.5.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-static-1.26.2-4.5.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-static-1.26.2-4.5.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-static-1.26.2-4.5.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-static-1.26.2-4.5.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:busybox-1.26.2-4.5.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:busybox-1.26.2-4.5.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:busybox-1.26.2-4.5.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:busybox-1.26.2-4.5.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:busybox-1.26.2-4.5.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:busybox-1.26.2-4.5.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:busybox-static-1.26.2-4.5.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:busybox-static-1.26.2-4.5.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:busybox-1.26.2-4.5.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:busybox-1.26.2-4.5.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2021-10-27T08:08:18Z", details: "moderate", }, ], title: "CVE-2018-20679", }, { cve: "CVE-2021-28831", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2021-28831", }, ], notes: [ { category: "general", text: "decompress_gunzip.c in BusyBox through 1.32.1 mishandles the error bit on the huft_build result pointer, with a resultant invalid free or segmentation fault, via malformed gzip data.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Enterprise Storage 6:busybox-1.26.2-4.5.1.aarch64", "SUSE Enterprise Storage 6:busybox-1.26.2-4.5.1.x86_64", "SUSE Enterprise Storage 6:busybox-static-1.26.2-4.5.1.aarch64", "SUSE Enterprise Storage 6:busybox-static-1.26.2-4.5.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:busybox-1.26.2-4.5.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:busybox-1.26.2-4.5.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:busybox-static-1.26.2-4.5.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:busybox-static-1.26.2-4.5.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:busybox-1.26.2-4.5.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:busybox-1.26.2-4.5.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:busybox-static-1.26.2-4.5.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:busybox-static-1.26.2-4.5.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:busybox-1.26.2-4.5.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:busybox-1.26.2-4.5.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:busybox-1.26.2-4.5.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:busybox-1.26.2-4.5.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:busybox-1.26.2-4.5.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:busybox-1.26.2-4.5.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP2:busybox-1.26.2-4.5.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP2:busybox-1.26.2-4.5.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:busybox-static-1.26.2-4.5.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:busybox-static-1.26.2-4.5.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP2:busybox-static-1.26.2-4.5.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP2:busybox-static-1.26.2-4.5.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-1.26.2-4.5.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-1.26.2-4.5.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-1.26.2-4.5.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-1.26.2-4.5.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-static-1.26.2-4.5.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-static-1.26.2-4.5.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-static-1.26.2-4.5.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-static-1.26.2-4.5.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:busybox-1.26.2-4.5.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:busybox-static-1.26.2-4.5.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-1.26.2-4.5.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-1.26.2-4.5.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-1.26.2-4.5.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-1.26.2-4.5.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-static-1.26.2-4.5.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-static-1.26.2-4.5.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-static-1.26.2-4.5.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-static-1.26.2-4.5.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:busybox-1.26.2-4.5.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:busybox-1.26.2-4.5.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:busybox-1.26.2-4.5.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:busybox-1.26.2-4.5.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:busybox-1.26.2-4.5.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:busybox-1.26.2-4.5.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:busybox-static-1.26.2-4.5.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:busybox-static-1.26.2-4.5.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:busybox-1.26.2-4.5.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:busybox-1.26.2-4.5.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2021-28831", url: "https://www.suse.com/security/cve/CVE-2021-28831", }, { category: "external", summary: "SUSE Bug 1184522 for CVE-2021-28831", url: "https://bugzilla.suse.com/1184522", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Enterprise Storage 6:busybox-1.26.2-4.5.1.aarch64", "SUSE Enterprise Storage 6:busybox-1.26.2-4.5.1.x86_64", "SUSE Enterprise Storage 6:busybox-static-1.26.2-4.5.1.aarch64", "SUSE Enterprise Storage 6:busybox-static-1.26.2-4.5.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:busybox-1.26.2-4.5.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:busybox-1.26.2-4.5.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:busybox-static-1.26.2-4.5.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:busybox-static-1.26.2-4.5.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:busybox-1.26.2-4.5.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:busybox-1.26.2-4.5.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:busybox-static-1.26.2-4.5.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:busybox-static-1.26.2-4.5.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:busybox-1.26.2-4.5.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:busybox-1.26.2-4.5.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:busybox-1.26.2-4.5.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:busybox-1.26.2-4.5.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:busybox-1.26.2-4.5.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:busybox-1.26.2-4.5.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP2:busybox-1.26.2-4.5.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP2:busybox-1.26.2-4.5.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:busybox-static-1.26.2-4.5.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:busybox-static-1.26.2-4.5.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP2:busybox-static-1.26.2-4.5.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP2:busybox-static-1.26.2-4.5.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-1.26.2-4.5.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-1.26.2-4.5.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-1.26.2-4.5.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-1.26.2-4.5.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-static-1.26.2-4.5.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-static-1.26.2-4.5.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-static-1.26.2-4.5.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-static-1.26.2-4.5.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:busybox-1.26.2-4.5.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:busybox-static-1.26.2-4.5.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-1.26.2-4.5.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-1.26.2-4.5.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-1.26.2-4.5.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-1.26.2-4.5.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-static-1.26.2-4.5.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-static-1.26.2-4.5.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-static-1.26.2-4.5.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-static-1.26.2-4.5.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:busybox-1.26.2-4.5.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:busybox-1.26.2-4.5.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:busybox-1.26.2-4.5.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:busybox-1.26.2-4.5.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:busybox-1.26.2-4.5.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:busybox-1.26.2-4.5.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:busybox-static-1.26.2-4.5.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:busybox-static-1.26.2-4.5.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:busybox-1.26.2-4.5.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:busybox-1.26.2-4.5.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 7.5, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "SUSE Enterprise Storage 6:busybox-1.26.2-4.5.1.aarch64", "SUSE Enterprise Storage 6:busybox-1.26.2-4.5.1.x86_64", "SUSE Enterprise Storage 6:busybox-static-1.26.2-4.5.1.aarch64", "SUSE Enterprise Storage 6:busybox-static-1.26.2-4.5.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:busybox-1.26.2-4.5.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:busybox-1.26.2-4.5.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:busybox-static-1.26.2-4.5.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:busybox-static-1.26.2-4.5.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:busybox-1.26.2-4.5.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:busybox-1.26.2-4.5.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:busybox-static-1.26.2-4.5.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:busybox-static-1.26.2-4.5.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:busybox-1.26.2-4.5.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:busybox-1.26.2-4.5.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:busybox-1.26.2-4.5.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:busybox-1.26.2-4.5.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:busybox-1.26.2-4.5.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:busybox-1.26.2-4.5.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP2:busybox-1.26.2-4.5.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP2:busybox-1.26.2-4.5.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:busybox-static-1.26.2-4.5.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:busybox-static-1.26.2-4.5.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP2:busybox-static-1.26.2-4.5.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP2:busybox-static-1.26.2-4.5.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-1.26.2-4.5.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-1.26.2-4.5.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-1.26.2-4.5.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-1.26.2-4.5.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-static-1.26.2-4.5.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-static-1.26.2-4.5.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-static-1.26.2-4.5.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-static-1.26.2-4.5.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:busybox-1.26.2-4.5.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:busybox-static-1.26.2-4.5.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-1.26.2-4.5.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-1.26.2-4.5.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-1.26.2-4.5.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-1.26.2-4.5.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-static-1.26.2-4.5.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-static-1.26.2-4.5.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-static-1.26.2-4.5.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-static-1.26.2-4.5.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:busybox-1.26.2-4.5.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:busybox-1.26.2-4.5.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:busybox-1.26.2-4.5.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:busybox-1.26.2-4.5.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:busybox-1.26.2-4.5.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:busybox-1.26.2-4.5.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:busybox-static-1.26.2-4.5.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:busybox-static-1.26.2-4.5.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:busybox-1.26.2-4.5.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:busybox-1.26.2-4.5.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2021-10-27T08:08:18Z", details: "important", }, ], title: "CVE-2021-28831", }, ], }
suse-su-2022:0135-1
Vulnerability from csaf_suse
Published
2022-01-20 09:05
Modified
2022-01-20 09:05
Summary
Security update for busybox
Notes
Title of the patch
Security update for busybox
Description of the patch
This update for busybox fixes the following issues:
- CVE-2011-5325: Fixed tar directory traversal (bsc#951562).
- CVE-2015-9261: Fixed segfalts and application crashes in huft_build (bsc#1102912).
- CVE-2016-2147: Fixed out of bounds write (heap) due to integer underflow in udhcpc (bsc#970663).
- CVE-2016-2148: Fixed heap-based buffer overflow in OPTION_6RD parsing (bsc#970662).
- CVE-2016-6301: Fixed NTP server denial of service flaw (bsc#991940).
- CVE-2017-15873: Fixed integer overflow in get_next_block function in archival/libarchive/decompress_bunzip2.c (bsc#1064976).
- CVE-2017-15874: Fixed integer underflow in archival/libarchive/decompress_unlzma.c (bsc#1064978).
- CVE-2017-16544: Fixed Insufficient sanitization of filenames when autocompleting (bsc#1069412).
- CVE-2018-1000500 : Fixed missing SSL certificate validation in wget (bsc#1099263).
- CVE-2018-1000517: Fixed heap-based buffer overflow in the retrieve_file_data() (bsc#1099260).
- CVE-2018-20679: Fixed out of bounds read in udhcp (bsc#1121426).
- CVE-2019-5747: Fixed out of bounds read in udhcp components (bsc#1121428).
- CVE-2021-28831: Fixed invalid free or segmentation fault via malformed gzip data (bsc#1184522).
- CVE-2021-42373: Fixed NULL pointer dereference in man leading to DoS when a section name is supplied but no page argument is given (bsc#1192869).
- CVE-2021-42374: Fixed out-of-bounds heap read in unlzma leading to information leak and DoS when crafted LZMA-compressed input is decompressed (bsc#1192869).
- CVE-2021-42375: Fixed incorrect handling of a special element in ash leading to DoS when processing a crafted shell command, due to the shell mistaking specific characters for reserved characters (bsc#1192869).
- CVE-2021-42376: Fixed NULL pointer dereference in hush leading to DoS when processing a crafted shell command (bsc#1192869).
- CVE-2021-42377: Fixed attacker-controlled pointer free in hush leading to DoS and possible code execution when processing a crafted shell command (bsc#1192869).
- CVE-2021-42378: Fixed use-after-free in awk leading to DoS and possibly code execution when processing a crafted awk pattern in the getvar_i function (bsc#1192869).
- CVE-2021-42379: Fixed use-after-free in awk leading to DoS and possibly code execution when processing a crafted awk pattern in the next_input_file function (bsc#1192869).
- CVE-2021-42380: Fixed use-after-free in awk leading to DoS and possibly code execution when processing a crafted awk pattern in the clrvar function (bsc#1192869).
- CVE-2021-42381: Fixed use-after-free in awk leading to DoS and possibly code execution when processing a crafted awk pattern in the hash_init function (bsc#1192869).
- CVE-2021-42382: Fixed use-after-free in awk leading to DoS and possibly code execution when processing a crafted awk pattern in the getvar_s function (bsc#1192869).
- CVE-2021-42383: Fixed use-after-free in awk leading to DoS and possibly code execution when processing a crafted awk pattern in the evaluate function (bsc#1192869).
- CVE-2021-42384: Fixed use-after-free in awk leading to DoS and possibly code execution when processing a crafted awk pattern in the handle_special function (bsc#1192869).
- CVE-2021-42385: Fixed use-after-free in awk leading to DoS and possibly code execution when processing a crafted awk pattern in the evaluate function (bsc#1192869).
- CVE-2021-42386: Fixed use-after-free in awk leading to DoS and possibly code execution when processing a crafted awk pattern in the nvalloc function (bsc#1192869).
Patchnames
SUSE-2022-135,SUSE-SLE-Module-Basesystem-15-SP3-2022-135,SUSE-SLE-Product-HPC-15-2022-135,SUSE-SLE-Product-HPC-15-SP1-ESPOS-2022-135,SUSE-SLE-Product-HPC-15-SP1-LTSS-2022-135,SUSE-SLE-Product-HPC-15-SP2-ESPOS-2022-135,SUSE-SLE-Product-HPC-15-SP2-LTSS-2022-135,SUSE-SLE-Product-SLES-15-2022-135,SUSE-SLE-Product-SLES-15-SP1-BCL-2022-135,SUSE-SLE-Product-SLES-15-SP1-LTSS-2022-135,SUSE-SLE-Product-SLES-15-SP2-BCL-2022-135,SUSE-SLE-Product-SLES-15-SP2-LTSS-2022-135,SUSE-SLE-Product-SLES_SAP-15-2022-135,SUSE-SLE-Product-SLES_SAP-15-SP1-2022-135,SUSE-SLE-Product-SLES_SAP-15-SP2-2022-135,SUSE-SLE-Product-SUSE-Manager-Proxy-4.1-2022-135,SUSE-SLE-Product-SUSE-Manager-Retail-Branch-Server-4.1-2022-135,SUSE-SLE-Product-SUSE-Manager-Server-4.1-2022-135,SUSE-Storage-6-2022-135,SUSE-Storage-7-2022-135
Terms of use
CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
{ document: { aggregate_severity: { namespace: "https://www.suse.com/support/security/rating/", text: "important", }, category: "csaf_security_advisory", csaf_version: "2.0", distribution: { text: "Copyright 2024 SUSE LLC. All rights reserved.", tlp: { label: "WHITE", url: "https://www.first.org/tlp/", }, }, lang: "en", notes: [ { category: "summary", text: "Security update for busybox", title: "Title of the patch", }, { category: "description", text: "This update for busybox fixes the following issues:\n\n- CVE-2011-5325: Fixed tar directory traversal (bsc#951562).\n- CVE-2015-9261: Fixed segfalts and application crashes in huft_build (bsc#1102912).\n- CVE-2016-2147: Fixed out of bounds write (heap) due to integer underflow in udhcpc (bsc#970663).\n- CVE-2016-2148: Fixed heap-based buffer overflow in OPTION_6RD parsing (bsc#970662).\n- CVE-2016-6301: Fixed NTP server denial of service flaw (bsc#991940).\n- CVE-2017-15873: Fixed integer overflow in get_next_block function in archival/libarchive/decompress_bunzip2.c (bsc#1064976).\n- CVE-2017-15874: Fixed integer underflow in archival/libarchive/decompress_unlzma.c (bsc#1064978).\n- CVE-2017-16544: Fixed Insufficient sanitization of filenames when autocompleting (bsc#1069412).\n- CVE-2018-1000500 : Fixed missing SSL certificate validation in wget (bsc#1099263).\n- CVE-2018-1000517: Fixed heap-based buffer overflow in the retrieve_file_data() (bsc#1099260).\n- CVE-2018-20679: Fixed out of bounds read in udhcp (bsc#1121426).\n- CVE-2019-5747: Fixed out of bounds read in udhcp components (bsc#1121428).\n- CVE-2021-28831: Fixed invalid free or segmentation fault via malformed gzip data (bsc#1184522).\n- CVE-2021-42373: Fixed NULL pointer dereference in man leading to DoS when a section name is supplied but no page argument is given (bsc#1192869).\n- CVE-2021-42374: Fixed out-of-bounds heap read in unlzma leading to information leak and DoS when crafted LZMA-compressed input is decompressed (bsc#1192869).\n- CVE-2021-42375: Fixed incorrect handling of a special element in ash leading to DoS when processing a crafted shell command, due to the shell mistaking specific characters for reserved characters (bsc#1192869).\n- CVE-2021-42376: Fixed NULL pointer dereference in hush leading to DoS when processing a crafted shell command (bsc#1192869).\n- CVE-2021-42377: Fixed attacker-controlled pointer free in hush leading to DoS and possible code execution when processing a crafted shell command (bsc#1192869).\n- CVE-2021-42378: Fixed use-after-free in awk leading to DoS and possibly code execution when processing a crafted awk pattern in the getvar_i function (bsc#1192869).\n- CVE-2021-42379: Fixed use-after-free in awk leading to DoS and possibly code execution when processing a crafted awk pattern in the next_input_file function (bsc#1192869).\n- CVE-2021-42380: Fixed use-after-free in awk leading to DoS and possibly code execution when processing a crafted awk pattern in the clrvar function (bsc#1192869).\n- CVE-2021-42381: Fixed use-after-free in awk leading to DoS and possibly code execution when processing a crafted awk pattern in the hash_init function (bsc#1192869).\n- CVE-2021-42382: Fixed use-after-free in awk leading to DoS and possibly code execution when processing a crafted awk pattern in the getvar_s function (bsc#1192869).\n- CVE-2021-42383: Fixed use-after-free in awk leading to DoS and possibly code execution when processing a crafted awk pattern in the evaluate function (bsc#1192869).\n- CVE-2021-42384: Fixed use-after-free in awk leading to DoS and possibly code execution when processing a crafted awk pattern in the handle_special function (bsc#1192869).\n- CVE-2021-42385: Fixed use-after-free in awk leading to DoS and possibly code execution when processing a crafted awk pattern in the evaluate function (bsc#1192869).\n- CVE-2021-42386: Fixed use-after-free in awk leading to DoS and possibly code execution when processing a crafted awk pattern in the nvalloc function (bsc#1192869).\n", title: "Description of the patch", }, { category: "details", text: "SUSE-2022-135,SUSE-SLE-Module-Basesystem-15-SP3-2022-135,SUSE-SLE-Product-HPC-15-2022-135,SUSE-SLE-Product-HPC-15-SP1-ESPOS-2022-135,SUSE-SLE-Product-HPC-15-SP1-LTSS-2022-135,SUSE-SLE-Product-HPC-15-SP2-ESPOS-2022-135,SUSE-SLE-Product-HPC-15-SP2-LTSS-2022-135,SUSE-SLE-Product-SLES-15-2022-135,SUSE-SLE-Product-SLES-15-SP1-BCL-2022-135,SUSE-SLE-Product-SLES-15-SP1-LTSS-2022-135,SUSE-SLE-Product-SLES-15-SP2-BCL-2022-135,SUSE-SLE-Product-SLES-15-SP2-LTSS-2022-135,SUSE-SLE-Product-SLES_SAP-15-2022-135,SUSE-SLE-Product-SLES_SAP-15-SP1-2022-135,SUSE-SLE-Product-SLES_SAP-15-SP2-2022-135,SUSE-SLE-Product-SUSE-Manager-Proxy-4.1-2022-135,SUSE-SLE-Product-SUSE-Manager-Retail-Branch-Server-4.1-2022-135,SUSE-SLE-Product-SUSE-Manager-Server-4.1-2022-135,SUSE-Storage-6-2022-135,SUSE-Storage-7-2022-135", title: "Patchnames", }, { category: "legal_disclaimer", text: "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", title: "Terms of use", }, ], publisher: { category: "vendor", contact_details: "https://www.suse.com/support/security/contact/", name: "SUSE Product Security Team", namespace: "https://www.suse.com/", }, references: [ { category: "external", summary: "SUSE ratings", url: "https://www.suse.com/support/security/rating/", }, { category: "self", summary: "URL of this CSAF notice", url: "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2022_0135-1.json", }, { category: "self", summary: "URL for SUSE-SU-2022:0135-1", url: "https://www.suse.com/support/update/announcement/2022/suse-su-20220135-1/", }, { category: "self", summary: "E-Mail link for SUSE-SU-2022:0135-1", url: "https://lists.suse.com/pipermail/sle-security-updates/2022-January/010031.html", }, { category: "self", summary: "SUSE Bug 1064976", url: "https://bugzilla.suse.com/1064976", }, { category: "self", summary: "SUSE Bug 1064978", url: "https://bugzilla.suse.com/1064978", }, { category: "self", summary: "SUSE Bug 1069412", url: "https://bugzilla.suse.com/1069412", }, { category: "self", summary: "SUSE Bug 1099260", url: "https://bugzilla.suse.com/1099260", }, { category: "self", summary: "SUSE Bug 1099263", url: "https://bugzilla.suse.com/1099263", }, { category: "self", summary: "SUSE Bug 1102912", url: "https://bugzilla.suse.com/1102912", }, { category: "self", summary: "SUSE Bug 1121426", url: "https://bugzilla.suse.com/1121426", }, { category: "self", summary: "SUSE Bug 1121428", url: "https://bugzilla.suse.com/1121428", }, { category: "self", summary: "SUSE Bug 1184522", url: "https://bugzilla.suse.com/1184522", }, { category: "self", summary: "SUSE Bug 1192869", url: "https://bugzilla.suse.com/1192869", }, { category: "self", summary: "SUSE Bug 951562", url: "https://bugzilla.suse.com/951562", }, { category: "self", summary: "SUSE Bug 970662", url: "https://bugzilla.suse.com/970662", }, { category: "self", summary: "SUSE Bug 970663", url: "https://bugzilla.suse.com/970663", }, { category: "self", summary: "SUSE Bug 991940", url: "https://bugzilla.suse.com/991940", }, { category: "self", summary: "SUSE CVE CVE-2011-5325 page", url: "https://www.suse.com/security/cve/CVE-2011-5325/", }, { category: "self", summary: "SUSE CVE CVE-2015-9261 page", url: "https://www.suse.com/security/cve/CVE-2015-9261/", }, { category: "self", summary: "SUSE CVE CVE-2016-2147 page", url: "https://www.suse.com/security/cve/CVE-2016-2147/", }, { category: "self", summary: "SUSE CVE CVE-2016-2148 page", url: "https://www.suse.com/security/cve/CVE-2016-2148/", }, { category: "self", summary: "SUSE CVE CVE-2016-6301 page", url: "https://www.suse.com/security/cve/CVE-2016-6301/", }, { category: "self", summary: "SUSE CVE CVE-2017-15873 page", url: "https://www.suse.com/security/cve/CVE-2017-15873/", }, { category: "self", summary: "SUSE CVE CVE-2017-15874 page", url: "https://www.suse.com/security/cve/CVE-2017-15874/", }, { category: "self", summary: "SUSE CVE CVE-2017-16544 page", url: "https://www.suse.com/security/cve/CVE-2017-16544/", }, { category: "self", summary: "SUSE CVE CVE-2018-1000500 page", url: "https://www.suse.com/security/cve/CVE-2018-1000500/", }, { category: "self", summary: "SUSE CVE CVE-2018-1000517 page", url: "https://www.suse.com/security/cve/CVE-2018-1000517/", }, { category: "self", summary: "SUSE CVE CVE-2018-20679 page", url: "https://www.suse.com/security/cve/CVE-2018-20679/", }, { category: "self", summary: "SUSE CVE CVE-2019-5747 page", url: "https://www.suse.com/security/cve/CVE-2019-5747/", }, { category: "self", summary: "SUSE CVE CVE-2021-28831 page", url: "https://www.suse.com/security/cve/CVE-2021-28831/", }, { category: "self", summary: "SUSE CVE CVE-2021-42373 page", url: "https://www.suse.com/security/cve/CVE-2021-42373/", }, { category: "self", summary: "SUSE CVE CVE-2021-42374 page", url: "https://www.suse.com/security/cve/CVE-2021-42374/", }, { category: "self", summary: "SUSE CVE CVE-2021-42375 page", url: "https://www.suse.com/security/cve/CVE-2021-42375/", }, { category: "self", summary: "SUSE CVE CVE-2021-42376 page", url: "https://www.suse.com/security/cve/CVE-2021-42376/", }, { category: "self", summary: "SUSE CVE CVE-2021-42377 page", url: "https://www.suse.com/security/cve/CVE-2021-42377/", }, { category: "self", summary: "SUSE CVE CVE-2021-42378 page", url: "https://www.suse.com/security/cve/CVE-2021-42378/", }, { category: "self", summary: "SUSE CVE CVE-2021-42379 page", url: "https://www.suse.com/security/cve/CVE-2021-42379/", }, { category: "self", summary: "SUSE CVE CVE-2021-42380 page", url: "https://www.suse.com/security/cve/CVE-2021-42380/", }, { category: "self", summary: "SUSE CVE CVE-2021-42381 page", url: "https://www.suse.com/security/cve/CVE-2021-42381/", }, { category: "self", summary: "SUSE CVE CVE-2021-42382 page", url: "https://www.suse.com/security/cve/CVE-2021-42382/", }, { category: "self", summary: "SUSE CVE CVE-2021-42383 page", url: "https://www.suse.com/security/cve/CVE-2021-42383/", }, { category: "self", summary: "SUSE CVE CVE-2021-42384 page", url: "https://www.suse.com/security/cve/CVE-2021-42384/", }, { category: "self", summary: "SUSE CVE CVE-2021-42385 page", url: "https://www.suse.com/security/cve/CVE-2021-42385/", }, { category: "self", summary: "SUSE CVE CVE-2021-42386 page", url: "https://www.suse.com/security/cve/CVE-2021-42386/", }, ], title: "Security update for busybox", tracking: { current_release_date: "2022-01-20T09:05:15Z", generator: { date: "2022-01-20T09:05:15Z", engine: { name: "cve-database.git:bin/generate-csaf.pl", version: "1", }, }, id: "SUSE-SU-2022:0135-1", initial_release_date: "2022-01-20T09:05:15Z", revision_history: [ { date: "2022-01-20T09:05:15Z", number: "1", summary: "Current version", }, ], status: "final", version: "1", }, }, product_tree: { branches: [ { branches: [ { branches: [ { category: "product_version", name: "busybox-1.34.1-4.9.1.aarch64", product: { name: "busybox-1.34.1-4.9.1.aarch64", product_id: "busybox-1.34.1-4.9.1.aarch64", }, }, { category: "product_version", name: "busybox-static-1.34.1-4.9.1.aarch64", product: { name: "busybox-static-1.34.1-4.9.1.aarch64", product_id: "busybox-static-1.34.1-4.9.1.aarch64", }, }, { category: "product_version", name: "busybox-testsuite-1.34.1-4.9.1.aarch64", product: { name: "busybox-testsuite-1.34.1-4.9.1.aarch64", product_id: "busybox-testsuite-1.34.1-4.9.1.aarch64", }, }, { category: "product_version", name: "busybox-warewulf3-1.34.1-4.9.1.aarch64", product: { name: "busybox-warewulf3-1.34.1-4.9.1.aarch64", product_id: "busybox-warewulf3-1.34.1-4.9.1.aarch64", }, }, ], category: "architecture", name: "aarch64", }, { branches: [ { category: "product_version", name: "busybox-1.34.1-4.9.1.i586", product: { name: "busybox-1.34.1-4.9.1.i586", product_id: "busybox-1.34.1-4.9.1.i586", }, }, { category: "product_version", name: "busybox-static-1.34.1-4.9.1.i586", product: { name: "busybox-static-1.34.1-4.9.1.i586", product_id: "busybox-static-1.34.1-4.9.1.i586", }, }, { category: "product_version", name: "busybox-testsuite-1.34.1-4.9.1.i586", product: { name: "busybox-testsuite-1.34.1-4.9.1.i586", product_id: "busybox-testsuite-1.34.1-4.9.1.i586", }, }, { category: "product_version", name: "busybox-warewulf3-1.34.1-4.9.1.i586", product: { name: "busybox-warewulf3-1.34.1-4.9.1.i586", product_id: "busybox-warewulf3-1.34.1-4.9.1.i586", }, }, ], category: "architecture", name: "i586", }, { branches: [ { category: "product_version", name: "busybox-1.34.1-4.9.1.ppc64le", product: { name: "busybox-1.34.1-4.9.1.ppc64le", product_id: "busybox-1.34.1-4.9.1.ppc64le", }, }, { category: "product_version", name: "busybox-static-1.34.1-4.9.1.ppc64le", product: { name: "busybox-static-1.34.1-4.9.1.ppc64le", product_id: "busybox-static-1.34.1-4.9.1.ppc64le", }, }, { category: "product_version", name: "busybox-testsuite-1.34.1-4.9.1.ppc64le", product: { name: "busybox-testsuite-1.34.1-4.9.1.ppc64le", product_id: "busybox-testsuite-1.34.1-4.9.1.ppc64le", }, }, ], category: "architecture", name: "ppc64le", }, { branches: [ { category: "product_version", name: "busybox-1.34.1-4.9.1.s390x", product: { name: "busybox-1.34.1-4.9.1.s390x", product_id: "busybox-1.34.1-4.9.1.s390x", }, }, { category: "product_version", name: "busybox-static-1.34.1-4.9.1.s390x", product: { name: "busybox-static-1.34.1-4.9.1.s390x", product_id: "busybox-static-1.34.1-4.9.1.s390x", }, }, { category: "product_version", name: "busybox-testsuite-1.34.1-4.9.1.s390x", product: { name: "busybox-testsuite-1.34.1-4.9.1.s390x", product_id: "busybox-testsuite-1.34.1-4.9.1.s390x", }, }, ], category: "architecture", name: "s390x", }, { branches: [ { category: "product_version", name: "busybox-1.34.1-4.9.1.x86_64", product: { name: "busybox-1.34.1-4.9.1.x86_64", product_id: "busybox-1.34.1-4.9.1.x86_64", }, }, { category: "product_version", name: "busybox-static-1.34.1-4.9.1.x86_64", product: { name: "busybox-static-1.34.1-4.9.1.x86_64", product_id: "busybox-static-1.34.1-4.9.1.x86_64", }, }, { category: "product_version", name: "busybox-testsuite-1.34.1-4.9.1.x86_64", product: { name: "busybox-testsuite-1.34.1-4.9.1.x86_64", product_id: "busybox-testsuite-1.34.1-4.9.1.x86_64", }, }, { category: "product_version", name: "busybox-warewulf3-1.34.1-4.9.1.x86_64", product: { name: "busybox-warewulf3-1.34.1-4.9.1.x86_64", product_id: "busybox-warewulf3-1.34.1-4.9.1.x86_64", }, }, ], category: "architecture", name: "x86_64", }, { branches: [ { category: "product_name", name: "SUSE Linux Enterprise Module for Basesystem 15 SP3", product: { name: "SUSE Linux Enterprise Module for Basesystem 15 SP3", product_id: "SUSE Linux Enterprise Module for Basesystem 15 SP3", product_identification_helper: { cpe: "cpe:/o:suse:sle-module-basesystem:15:sp3", }, }, }, { category: "product_name", name: "SUSE Linux Enterprise High Performance Computing 15-ESPOS", product: { name: "SUSE Linux Enterprise High Performance Computing 15-ESPOS", product_id: "SUSE Linux Enterprise High Performance Computing 15-ESPOS", product_identification_helper: { cpe: "cpe:/o:suse:sle_hpc-espos:15", }, }, }, { category: "product_name", name: "SUSE Linux Enterprise High Performance Computing 15-LTSS", product: { name: "SUSE Linux Enterprise High Performance Computing 15-LTSS", product_id: "SUSE Linux Enterprise High Performance Computing 15-LTSS", product_identification_helper: { cpe: "cpe:/o:suse:sle_hpc-ltss:15", }, }, }, { category: "product_name", name: "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS", product: { name: "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS", product_id: "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS", product_identification_helper: { cpe: "cpe:/o:suse:sle_hpc-espos:15:sp1", }, }, }, { category: "product_name", name: "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS", product: { name: "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS", product_id: "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS", product_identification_helper: { cpe: "cpe:/o:suse:sle_hpc-ltss:15:sp1", }, }, }, { category: "product_name", name: "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS", product: { name: "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS", product_id: "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS", product_identification_helper: { cpe: "cpe:/o:suse:sle_hpc-espos:15:sp2", }, }, }, { category: "product_name", name: "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS", product: { name: "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS", product_id: "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS", product_identification_helper: { cpe: "cpe:/o:suse:sle_hpc-ltss:15:sp2", }, }, }, { category: "product_name", name: "SUSE Linux Enterprise Server 15-LTSS", product: { name: "SUSE Linux Enterprise Server 15-LTSS", product_id: "SUSE Linux Enterprise Server 15-LTSS", product_identification_helper: { cpe: "cpe:/o:suse:sles-ltss:15", }, }, }, { category: "product_name", name: "SUSE Linux Enterprise Server 15 SP1-BCL", product: { name: "SUSE Linux Enterprise Server 15 SP1-BCL", product_id: "SUSE Linux Enterprise Server 15 SP1-BCL", product_identification_helper: { cpe: "cpe:/o:suse:sles_bcl:15:sp1", }, }, }, { category: "product_name", name: "SUSE Linux Enterprise Server 15 SP1-LTSS", product: { name: "SUSE Linux Enterprise Server 15 SP1-LTSS", product_id: "SUSE Linux Enterprise Server 15 SP1-LTSS", product_identification_helper: { cpe: "cpe:/o:suse:sles-ltss:15:sp1", }, }, }, { category: "product_name", name: "SUSE Linux Enterprise Server 15 SP2-BCL", product: { name: "SUSE Linux Enterprise Server 15 SP2-BCL", product_id: "SUSE Linux Enterprise Server 15 SP2-BCL", product_identification_helper: { cpe: "cpe:/o:suse:sles_bcl:15:sp2", }, }, }, { category: "product_name", name: "SUSE Linux Enterprise Server 15 SP2-LTSS", product: { name: "SUSE Linux Enterprise Server 15 SP2-LTSS", product_id: "SUSE Linux Enterprise Server 15 SP2-LTSS", product_identification_helper: { cpe: "cpe:/o:suse:sles-ltss:15:sp2", }, }, }, { category: "product_name", name: "SUSE Linux Enterprise Server for SAP Applications 15", product: { name: "SUSE Linux Enterprise Server for SAP Applications 15", product_id: "SUSE Linux Enterprise Server for SAP Applications 15", product_identification_helper: { cpe: "cpe:/o:suse:sles_sap:15", }, }, }, { category: "product_name", name: "SUSE Linux Enterprise Server for SAP Applications 15 SP1", product: { name: "SUSE Linux Enterprise Server for SAP Applications 15 SP1", product_id: "SUSE Linux Enterprise Server for SAP Applications 15 SP1", product_identification_helper: { cpe: "cpe:/o:suse:sles_sap:15:sp1", }, }, }, { category: "product_name", name: "SUSE Linux Enterprise Server for SAP Applications 15 SP2", product: { name: "SUSE Linux Enterprise Server for SAP Applications 15 SP2", product_id: "SUSE Linux Enterprise Server for SAP Applications 15 SP2", product_identification_helper: { cpe: "cpe:/o:suse:sles_sap:15:sp2", }, }, }, { category: "product_name", name: "SUSE Manager Proxy 4.1", product: { name: "SUSE Manager Proxy 4.1", product_id: "SUSE Manager Proxy 4.1", product_identification_helper: { cpe: "cpe:/o:suse:suse-manager-proxy:4.1", }, }, }, { category: "product_name", name: "SUSE Manager Retail Branch Server 4.1", product: { name: "SUSE Manager Retail Branch Server 4.1", product_id: "SUSE Manager Retail Branch Server 4.1", product_identification_helper: { cpe: "cpe:/o:suse:suse-manager-retail-branch-server:4.1", }, }, }, { category: "product_name", name: "SUSE Manager Server 4.1", product: { name: "SUSE Manager Server 4.1", product_id: "SUSE Manager Server 4.1", product_identification_helper: { cpe: "cpe:/o:suse:suse-manager-server:4.1", }, }, }, { category: "product_name", name: "SUSE Enterprise Storage 6", product: { name: "SUSE Enterprise Storage 6", product_id: "SUSE Enterprise Storage 6", product_identification_helper: { cpe: "cpe:/o:suse:ses:6", }, }, }, { category: "product_name", name: "SUSE Enterprise Storage 7", product: { name: "SUSE Enterprise Storage 7", product_id: "SUSE Enterprise Storage 7", product_identification_helper: { cpe: "cpe:/o:suse:ses:7", }, }, }, ], category: "product_family", name: "SUSE Linux Enterprise", }, ], category: "vendor", name: "SUSE", }, ], relationships: [ { category: "default_component_of", full_product_name: { name: "busybox-1.34.1-4.9.1.aarch64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP3", product_id: "SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-1.34.1-4.9.1.aarch64", }, product_reference: "busybox-1.34.1-4.9.1.aarch64", relates_to_product_reference: "SUSE Linux Enterprise Module for Basesystem 15 SP3", }, { category: "default_component_of", full_product_name: { name: "busybox-1.34.1-4.9.1.ppc64le as component of SUSE Linux Enterprise Module for Basesystem 15 SP3", product_id: "SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-1.34.1-4.9.1.ppc64le", }, product_reference: "busybox-1.34.1-4.9.1.ppc64le", relates_to_product_reference: "SUSE Linux Enterprise Module for Basesystem 15 SP3", }, { category: "default_component_of", full_product_name: { name: "busybox-1.34.1-4.9.1.s390x as component of SUSE Linux Enterprise Module for Basesystem 15 SP3", product_id: "SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-1.34.1-4.9.1.s390x", }, product_reference: "busybox-1.34.1-4.9.1.s390x", relates_to_product_reference: "SUSE Linux Enterprise Module for Basesystem 15 SP3", }, { category: "default_component_of", full_product_name: { name: "busybox-1.34.1-4.9.1.x86_64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP3", product_id: "SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-1.34.1-4.9.1.x86_64", }, product_reference: "busybox-1.34.1-4.9.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Module for Basesystem 15 SP3", }, { category: "default_component_of", full_product_name: { name: "busybox-static-1.34.1-4.9.1.aarch64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP3", product_id: "SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-static-1.34.1-4.9.1.aarch64", }, product_reference: "busybox-static-1.34.1-4.9.1.aarch64", relates_to_product_reference: "SUSE Linux Enterprise Module for Basesystem 15 SP3", }, { category: "default_component_of", full_product_name: { name: "busybox-static-1.34.1-4.9.1.ppc64le as component of SUSE Linux Enterprise Module for Basesystem 15 SP3", product_id: "SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-static-1.34.1-4.9.1.ppc64le", }, product_reference: "busybox-static-1.34.1-4.9.1.ppc64le", relates_to_product_reference: "SUSE Linux Enterprise Module for Basesystem 15 SP3", }, { category: "default_component_of", full_product_name: { name: "busybox-static-1.34.1-4.9.1.s390x as component of SUSE Linux Enterprise Module for Basesystem 15 SP3", product_id: "SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-static-1.34.1-4.9.1.s390x", }, product_reference: "busybox-static-1.34.1-4.9.1.s390x", relates_to_product_reference: "SUSE Linux Enterprise Module for Basesystem 15 SP3", }, { category: "default_component_of", full_product_name: { name: "busybox-static-1.34.1-4.9.1.x86_64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP3", product_id: "SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-static-1.34.1-4.9.1.x86_64", }, product_reference: "busybox-static-1.34.1-4.9.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Module for Basesystem 15 SP3", }, { category: "default_component_of", full_product_name: { name: "busybox-1.34.1-4.9.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15-ESPOS", product_id: "SUSE Linux Enterprise High Performance Computing 15-ESPOS:busybox-1.34.1-4.9.1.aarch64", }, product_reference: "busybox-1.34.1-4.9.1.aarch64", relates_to_product_reference: "SUSE Linux Enterprise High Performance Computing 15-ESPOS", }, { category: "default_component_of", full_product_name: { name: "busybox-1.34.1-4.9.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15-ESPOS", product_id: "SUSE Linux Enterprise High Performance Computing 15-ESPOS:busybox-1.34.1-4.9.1.x86_64", }, product_reference: "busybox-1.34.1-4.9.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise High Performance Computing 15-ESPOS", }, { category: "default_component_of", full_product_name: { name: "busybox-1.34.1-4.9.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15-LTSS", product_id: "SUSE Linux Enterprise High Performance Computing 15-LTSS:busybox-1.34.1-4.9.1.aarch64", }, product_reference: "busybox-1.34.1-4.9.1.aarch64", relates_to_product_reference: "SUSE Linux Enterprise High Performance Computing 15-LTSS", }, { category: "default_component_of", full_product_name: { name: "busybox-1.34.1-4.9.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15-LTSS", product_id: "SUSE Linux Enterprise High Performance Computing 15-LTSS:busybox-1.34.1-4.9.1.x86_64", }, product_reference: "busybox-1.34.1-4.9.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise High Performance Computing 15-LTSS", }, { category: "default_component_of", full_product_name: { name: "busybox-1.34.1-4.9.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS", product_id: "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:busybox-1.34.1-4.9.1.aarch64", }, product_reference: "busybox-1.34.1-4.9.1.aarch64", relates_to_product_reference: "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS", }, { category: "default_component_of", full_product_name: { name: "busybox-1.34.1-4.9.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS", product_id: "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:busybox-1.34.1-4.9.1.x86_64", }, product_reference: "busybox-1.34.1-4.9.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS", }, { category: "default_component_of", full_product_name: { name: "busybox-static-1.34.1-4.9.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS", product_id: "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:busybox-static-1.34.1-4.9.1.aarch64", }, product_reference: "busybox-static-1.34.1-4.9.1.aarch64", relates_to_product_reference: "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS", }, { category: "default_component_of", full_product_name: { name: "busybox-static-1.34.1-4.9.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS", product_id: "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:busybox-static-1.34.1-4.9.1.x86_64", }, product_reference: "busybox-static-1.34.1-4.9.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS", }, { category: "default_component_of", full_product_name: { name: "busybox-1.34.1-4.9.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS", product_id: "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:busybox-1.34.1-4.9.1.aarch64", }, product_reference: "busybox-1.34.1-4.9.1.aarch64", relates_to_product_reference: "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS", }, { category: "default_component_of", full_product_name: { name: "busybox-1.34.1-4.9.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS", product_id: "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:busybox-1.34.1-4.9.1.x86_64", }, product_reference: "busybox-1.34.1-4.9.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS", }, { category: "default_component_of", full_product_name: { name: "busybox-static-1.34.1-4.9.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS", product_id: "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:busybox-static-1.34.1-4.9.1.aarch64", }, product_reference: "busybox-static-1.34.1-4.9.1.aarch64", relates_to_product_reference: "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS", }, { category: "default_component_of", full_product_name: { name: "busybox-static-1.34.1-4.9.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS", product_id: "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:busybox-static-1.34.1-4.9.1.x86_64", }, product_reference: "busybox-static-1.34.1-4.9.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS", }, { category: "default_component_of", full_product_name: { name: "busybox-1.34.1-4.9.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS", product_id: "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:busybox-1.34.1-4.9.1.aarch64", }, product_reference: "busybox-1.34.1-4.9.1.aarch64", relates_to_product_reference: "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS", }, { category: "default_component_of", full_product_name: { name: "busybox-1.34.1-4.9.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS", product_id: "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:busybox-1.34.1-4.9.1.x86_64", }, product_reference: "busybox-1.34.1-4.9.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS", }, { category: "default_component_of", full_product_name: { name: "busybox-static-1.34.1-4.9.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS", product_id: "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:busybox-static-1.34.1-4.9.1.aarch64", }, product_reference: "busybox-static-1.34.1-4.9.1.aarch64", relates_to_product_reference: "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS", }, { category: "default_component_of", full_product_name: { name: "busybox-static-1.34.1-4.9.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS", product_id: "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:busybox-static-1.34.1-4.9.1.x86_64", }, product_reference: "busybox-static-1.34.1-4.9.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS", }, { category: "default_component_of", full_product_name: { name: "busybox-1.34.1-4.9.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS", product_id: "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:busybox-1.34.1-4.9.1.aarch64", }, product_reference: "busybox-1.34.1-4.9.1.aarch64", relates_to_product_reference: "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS", }, { category: "default_component_of", full_product_name: { name: "busybox-1.34.1-4.9.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS", product_id: "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:busybox-1.34.1-4.9.1.x86_64", }, product_reference: "busybox-1.34.1-4.9.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS", }, { category: "default_component_of", full_product_name: { name: "busybox-static-1.34.1-4.9.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS", product_id: "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:busybox-static-1.34.1-4.9.1.aarch64", }, product_reference: "busybox-static-1.34.1-4.9.1.aarch64", relates_to_product_reference: "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS", }, { category: "default_component_of", full_product_name: { name: "busybox-static-1.34.1-4.9.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS", product_id: "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:busybox-static-1.34.1-4.9.1.x86_64", }, product_reference: "busybox-static-1.34.1-4.9.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS", }, { category: "default_component_of", full_product_name: { name: "busybox-1.34.1-4.9.1.aarch64 as component of SUSE Linux Enterprise Server 15-LTSS", product_id: "SUSE Linux Enterprise Server 15-LTSS:busybox-1.34.1-4.9.1.aarch64", }, product_reference: "busybox-1.34.1-4.9.1.aarch64", relates_to_product_reference: "SUSE Linux Enterprise Server 15-LTSS", }, { category: "default_component_of", full_product_name: { name: "busybox-1.34.1-4.9.1.ppc64le as component of SUSE Linux Enterprise Server 15-LTSS", product_id: "SUSE Linux Enterprise Server 15-LTSS:busybox-1.34.1-4.9.1.ppc64le", }, product_reference: "busybox-1.34.1-4.9.1.ppc64le", relates_to_product_reference: "SUSE Linux Enterprise Server 15-LTSS", }, { category: "default_component_of", full_product_name: { name: "busybox-1.34.1-4.9.1.s390x as component of SUSE Linux Enterprise Server 15-LTSS", product_id: "SUSE Linux Enterprise Server 15-LTSS:busybox-1.34.1-4.9.1.s390x", }, product_reference: "busybox-1.34.1-4.9.1.s390x", relates_to_product_reference: "SUSE Linux Enterprise Server 15-LTSS", }, { category: "default_component_of", full_product_name: { name: "busybox-1.34.1-4.9.1.x86_64 as component of SUSE Linux Enterprise Server 15-LTSS", product_id: "SUSE Linux Enterprise Server 15-LTSS:busybox-1.34.1-4.9.1.x86_64", }, product_reference: "busybox-1.34.1-4.9.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Server 15-LTSS", }, { category: "default_component_of", full_product_name: { name: "busybox-1.34.1-4.9.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP1-BCL", product_id: "SUSE Linux Enterprise Server 15 SP1-BCL:busybox-1.34.1-4.9.1.x86_64", }, product_reference: "busybox-1.34.1-4.9.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Server 15 SP1-BCL", }, { category: "default_component_of", full_product_name: { name: "busybox-static-1.34.1-4.9.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP1-BCL", product_id: "SUSE Linux Enterprise Server 15 SP1-BCL:busybox-static-1.34.1-4.9.1.x86_64", }, product_reference: "busybox-static-1.34.1-4.9.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Server 15 SP1-BCL", }, { category: "default_component_of", full_product_name: { name: "busybox-1.34.1-4.9.1.aarch64 as component of SUSE Linux Enterprise Server 15 SP1-LTSS", product_id: "SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-1.34.1-4.9.1.aarch64", }, product_reference: "busybox-1.34.1-4.9.1.aarch64", relates_to_product_reference: "SUSE Linux Enterprise Server 15 SP1-LTSS", }, { category: "default_component_of", full_product_name: { name: "busybox-1.34.1-4.9.1.ppc64le as component of SUSE Linux Enterprise Server 15 SP1-LTSS", product_id: "SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-1.34.1-4.9.1.ppc64le", }, product_reference: "busybox-1.34.1-4.9.1.ppc64le", relates_to_product_reference: "SUSE Linux Enterprise Server 15 SP1-LTSS", }, { category: "default_component_of", full_product_name: { name: "busybox-1.34.1-4.9.1.s390x as component of SUSE Linux Enterprise Server 15 SP1-LTSS", product_id: "SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-1.34.1-4.9.1.s390x", }, product_reference: "busybox-1.34.1-4.9.1.s390x", relates_to_product_reference: "SUSE Linux Enterprise Server 15 SP1-LTSS", }, { category: "default_component_of", full_product_name: { name: "busybox-1.34.1-4.9.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP1-LTSS", product_id: "SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-1.34.1-4.9.1.x86_64", }, product_reference: "busybox-1.34.1-4.9.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Server 15 SP1-LTSS", }, { category: "default_component_of", full_product_name: { name: "busybox-static-1.34.1-4.9.1.aarch64 as component of SUSE Linux Enterprise Server 15 SP1-LTSS", product_id: "SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-static-1.34.1-4.9.1.aarch64", }, product_reference: "busybox-static-1.34.1-4.9.1.aarch64", relates_to_product_reference: "SUSE Linux Enterprise Server 15 SP1-LTSS", }, { category: "default_component_of", full_product_name: { name: "busybox-static-1.34.1-4.9.1.ppc64le as component of SUSE Linux Enterprise Server 15 SP1-LTSS", product_id: "SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-static-1.34.1-4.9.1.ppc64le", }, product_reference: "busybox-static-1.34.1-4.9.1.ppc64le", relates_to_product_reference: "SUSE Linux Enterprise Server 15 SP1-LTSS", }, { category: "default_component_of", full_product_name: { name: "busybox-static-1.34.1-4.9.1.s390x as component of SUSE Linux Enterprise Server 15 SP1-LTSS", product_id: "SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-static-1.34.1-4.9.1.s390x", }, product_reference: "busybox-static-1.34.1-4.9.1.s390x", relates_to_product_reference: "SUSE Linux Enterprise Server 15 SP1-LTSS", }, { category: "default_component_of", full_product_name: { name: "busybox-static-1.34.1-4.9.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP1-LTSS", product_id: "SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-static-1.34.1-4.9.1.x86_64", }, product_reference: "busybox-static-1.34.1-4.9.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Server 15 SP1-LTSS", }, { category: "default_component_of", full_product_name: { name: "busybox-1.34.1-4.9.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP2-BCL", product_id: "SUSE Linux Enterprise Server 15 SP2-BCL:busybox-1.34.1-4.9.1.x86_64", }, product_reference: "busybox-1.34.1-4.9.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Server 15 SP2-BCL", }, { category: "default_component_of", full_product_name: { name: "busybox-static-1.34.1-4.9.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP2-BCL", product_id: "SUSE Linux Enterprise Server 15 SP2-BCL:busybox-static-1.34.1-4.9.1.x86_64", }, product_reference: "busybox-static-1.34.1-4.9.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Server 15 SP2-BCL", }, { category: "default_component_of", full_product_name: { name: "busybox-1.34.1-4.9.1.aarch64 as component of SUSE Linux Enterprise Server 15 SP2-LTSS", product_id: "SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-1.34.1-4.9.1.aarch64", }, product_reference: "busybox-1.34.1-4.9.1.aarch64", relates_to_product_reference: "SUSE Linux Enterprise Server 15 SP2-LTSS", }, { category: "default_component_of", full_product_name: { name: "busybox-1.34.1-4.9.1.ppc64le as component of SUSE Linux Enterprise Server 15 SP2-LTSS", product_id: "SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-1.34.1-4.9.1.ppc64le", }, product_reference: "busybox-1.34.1-4.9.1.ppc64le", relates_to_product_reference: "SUSE Linux Enterprise Server 15 SP2-LTSS", }, { category: "default_component_of", full_product_name: { name: "busybox-1.34.1-4.9.1.s390x as component of SUSE Linux Enterprise Server 15 SP2-LTSS", product_id: "SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-1.34.1-4.9.1.s390x", }, product_reference: "busybox-1.34.1-4.9.1.s390x", relates_to_product_reference: "SUSE Linux Enterprise Server 15 SP2-LTSS", }, { category: "default_component_of", full_product_name: { name: "busybox-1.34.1-4.9.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP2-LTSS", product_id: "SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-1.34.1-4.9.1.x86_64", }, product_reference: "busybox-1.34.1-4.9.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Server 15 SP2-LTSS", }, { category: "default_component_of", full_product_name: { name: "busybox-static-1.34.1-4.9.1.aarch64 as component of SUSE Linux Enterprise Server 15 SP2-LTSS", product_id: "SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-static-1.34.1-4.9.1.aarch64", }, product_reference: "busybox-static-1.34.1-4.9.1.aarch64", relates_to_product_reference: "SUSE Linux Enterprise Server 15 SP2-LTSS", }, { category: "default_component_of", full_product_name: { name: "busybox-static-1.34.1-4.9.1.ppc64le as component of SUSE Linux Enterprise Server 15 SP2-LTSS", product_id: "SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-static-1.34.1-4.9.1.ppc64le", }, product_reference: "busybox-static-1.34.1-4.9.1.ppc64le", relates_to_product_reference: "SUSE Linux Enterprise Server 15 SP2-LTSS", }, { category: "default_component_of", full_product_name: { name: "busybox-static-1.34.1-4.9.1.s390x as component of SUSE Linux Enterprise Server 15 SP2-LTSS", product_id: "SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-static-1.34.1-4.9.1.s390x", }, product_reference: "busybox-static-1.34.1-4.9.1.s390x", relates_to_product_reference: "SUSE Linux Enterprise Server 15 SP2-LTSS", }, { category: "default_component_of", full_product_name: { name: "busybox-static-1.34.1-4.9.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP2-LTSS", product_id: "SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-static-1.34.1-4.9.1.x86_64", }, product_reference: "busybox-static-1.34.1-4.9.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Server 15 SP2-LTSS", }, { category: "default_component_of", full_product_name: { name: "busybox-1.34.1-4.9.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 15", product_id: "SUSE Linux Enterprise Server for SAP Applications 15:busybox-1.34.1-4.9.1.ppc64le", }, product_reference: "busybox-1.34.1-4.9.1.ppc64le", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 15", }, { category: "default_component_of", full_product_name: { name: "busybox-1.34.1-4.9.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15", product_id: "SUSE Linux Enterprise Server for SAP Applications 15:busybox-1.34.1-4.9.1.x86_64", }, product_reference: "busybox-1.34.1-4.9.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 15", }, { category: "default_component_of", full_product_name: { name: "busybox-1.34.1-4.9.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 15 SP1", product_id: "SUSE Linux Enterprise Server for SAP Applications 15 SP1:busybox-1.34.1-4.9.1.ppc64le", }, product_reference: "busybox-1.34.1-4.9.1.ppc64le", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 15 SP1", }, { category: "default_component_of", full_product_name: { name: "busybox-1.34.1-4.9.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15 SP1", product_id: "SUSE Linux Enterprise Server for SAP Applications 15 SP1:busybox-1.34.1-4.9.1.x86_64", }, product_reference: "busybox-1.34.1-4.9.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 15 SP1", }, { category: "default_component_of", full_product_name: { name: "busybox-static-1.34.1-4.9.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 15 SP1", product_id: "SUSE Linux Enterprise Server for SAP Applications 15 SP1:busybox-static-1.34.1-4.9.1.ppc64le", }, product_reference: "busybox-static-1.34.1-4.9.1.ppc64le", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 15 SP1", }, { category: "default_component_of", full_product_name: { name: "busybox-static-1.34.1-4.9.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15 SP1", product_id: "SUSE Linux Enterprise Server for SAP Applications 15 SP1:busybox-static-1.34.1-4.9.1.x86_64", }, product_reference: "busybox-static-1.34.1-4.9.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 15 SP1", }, { category: "default_component_of", full_product_name: { name: "busybox-1.34.1-4.9.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 15 SP2", product_id: "SUSE Linux Enterprise Server for SAP Applications 15 SP2:busybox-1.34.1-4.9.1.ppc64le", }, product_reference: "busybox-1.34.1-4.9.1.ppc64le", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 15 SP2", }, { category: "default_component_of", full_product_name: { name: "busybox-1.34.1-4.9.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15 SP2", product_id: "SUSE Linux Enterprise Server for SAP Applications 15 SP2:busybox-1.34.1-4.9.1.x86_64", }, product_reference: "busybox-1.34.1-4.9.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 15 SP2", }, { category: "default_component_of", full_product_name: { name: "busybox-static-1.34.1-4.9.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 15 SP2", product_id: "SUSE Linux Enterprise Server for SAP Applications 15 SP2:busybox-static-1.34.1-4.9.1.ppc64le", }, product_reference: "busybox-static-1.34.1-4.9.1.ppc64le", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 15 SP2", }, { category: "default_component_of", full_product_name: { name: "busybox-static-1.34.1-4.9.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15 SP2", product_id: "SUSE Linux Enterprise Server for SAP Applications 15 SP2:busybox-static-1.34.1-4.9.1.x86_64", }, product_reference: "busybox-static-1.34.1-4.9.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 15 SP2", }, { category: "default_component_of", full_product_name: { name: "busybox-1.34.1-4.9.1.x86_64 as component of SUSE Manager Proxy 4.1", product_id: "SUSE Manager Proxy 4.1:busybox-1.34.1-4.9.1.x86_64", }, product_reference: "busybox-1.34.1-4.9.1.x86_64", relates_to_product_reference: "SUSE Manager Proxy 4.1", }, { category: "default_component_of", full_product_name: { name: "busybox-static-1.34.1-4.9.1.x86_64 as component of SUSE Manager Proxy 4.1", product_id: "SUSE Manager Proxy 4.1:busybox-static-1.34.1-4.9.1.x86_64", }, product_reference: "busybox-static-1.34.1-4.9.1.x86_64", relates_to_product_reference: "SUSE Manager Proxy 4.1", }, { category: "default_component_of", full_product_name: { name: "busybox-1.34.1-4.9.1.x86_64 as component of SUSE Manager Retail Branch Server 4.1", product_id: "SUSE Manager Retail Branch Server 4.1:busybox-1.34.1-4.9.1.x86_64", }, product_reference: "busybox-1.34.1-4.9.1.x86_64", relates_to_product_reference: "SUSE Manager Retail Branch Server 4.1", }, { category: "default_component_of", full_product_name: { name: "busybox-static-1.34.1-4.9.1.x86_64 as component of SUSE Manager Retail Branch Server 4.1", product_id: "SUSE Manager Retail Branch Server 4.1:busybox-static-1.34.1-4.9.1.x86_64", }, product_reference: "busybox-static-1.34.1-4.9.1.x86_64", relates_to_product_reference: "SUSE Manager Retail Branch Server 4.1", }, { category: "default_component_of", full_product_name: { name: "busybox-1.34.1-4.9.1.ppc64le as component of SUSE Manager Server 4.1", product_id: "SUSE Manager Server 4.1:busybox-1.34.1-4.9.1.ppc64le", }, product_reference: "busybox-1.34.1-4.9.1.ppc64le", relates_to_product_reference: "SUSE Manager Server 4.1", }, { category: "default_component_of", full_product_name: { name: "busybox-1.34.1-4.9.1.s390x as component of SUSE Manager Server 4.1", product_id: "SUSE Manager Server 4.1:busybox-1.34.1-4.9.1.s390x", }, product_reference: "busybox-1.34.1-4.9.1.s390x", relates_to_product_reference: "SUSE Manager Server 4.1", }, { category: "default_component_of", full_product_name: { name: "busybox-1.34.1-4.9.1.x86_64 as component of SUSE Manager Server 4.1", product_id: "SUSE Manager Server 4.1:busybox-1.34.1-4.9.1.x86_64", }, product_reference: "busybox-1.34.1-4.9.1.x86_64", relates_to_product_reference: "SUSE Manager Server 4.1", }, { category: "default_component_of", full_product_name: { name: "busybox-static-1.34.1-4.9.1.ppc64le as component of SUSE Manager Server 4.1", product_id: "SUSE Manager Server 4.1:busybox-static-1.34.1-4.9.1.ppc64le", }, product_reference: "busybox-static-1.34.1-4.9.1.ppc64le", relates_to_product_reference: "SUSE Manager Server 4.1", }, { category: "default_component_of", full_product_name: { name: "busybox-static-1.34.1-4.9.1.s390x as component of SUSE Manager Server 4.1", product_id: "SUSE Manager Server 4.1:busybox-static-1.34.1-4.9.1.s390x", }, product_reference: "busybox-static-1.34.1-4.9.1.s390x", relates_to_product_reference: "SUSE Manager Server 4.1", }, { category: "default_component_of", full_product_name: { name: "busybox-static-1.34.1-4.9.1.x86_64 as component of SUSE Manager Server 4.1", product_id: "SUSE Manager Server 4.1:busybox-static-1.34.1-4.9.1.x86_64", }, product_reference: "busybox-static-1.34.1-4.9.1.x86_64", relates_to_product_reference: "SUSE Manager Server 4.1", }, { category: "default_component_of", full_product_name: { name: "busybox-1.34.1-4.9.1.aarch64 as component of SUSE Enterprise Storage 6", product_id: "SUSE Enterprise Storage 6:busybox-1.34.1-4.9.1.aarch64", }, product_reference: "busybox-1.34.1-4.9.1.aarch64", relates_to_product_reference: "SUSE Enterprise Storage 6", }, { category: "default_component_of", full_product_name: { name: "busybox-1.34.1-4.9.1.x86_64 as component of SUSE Enterprise Storage 6", product_id: "SUSE Enterprise Storage 6:busybox-1.34.1-4.9.1.x86_64", }, product_reference: "busybox-1.34.1-4.9.1.x86_64", relates_to_product_reference: "SUSE Enterprise Storage 6", }, { category: "default_component_of", full_product_name: { name: "busybox-static-1.34.1-4.9.1.aarch64 as component of SUSE Enterprise Storage 6", product_id: "SUSE Enterprise Storage 6:busybox-static-1.34.1-4.9.1.aarch64", }, product_reference: "busybox-static-1.34.1-4.9.1.aarch64", relates_to_product_reference: "SUSE Enterprise Storage 6", }, { category: "default_component_of", full_product_name: { name: "busybox-static-1.34.1-4.9.1.x86_64 as component of SUSE Enterprise Storage 6", product_id: "SUSE Enterprise Storage 6:busybox-static-1.34.1-4.9.1.x86_64", }, product_reference: "busybox-static-1.34.1-4.9.1.x86_64", relates_to_product_reference: "SUSE Enterprise Storage 6", }, { category: "default_component_of", full_product_name: { name: "busybox-1.34.1-4.9.1.aarch64 as component of SUSE Enterprise Storage 7", product_id: "SUSE Enterprise Storage 7:busybox-1.34.1-4.9.1.aarch64", }, product_reference: "busybox-1.34.1-4.9.1.aarch64", relates_to_product_reference: "SUSE Enterprise Storage 7", }, { category: "default_component_of", full_product_name: { name: "busybox-1.34.1-4.9.1.x86_64 as component of SUSE Enterprise Storage 7", product_id: "SUSE Enterprise Storage 7:busybox-1.34.1-4.9.1.x86_64", }, product_reference: "busybox-1.34.1-4.9.1.x86_64", relates_to_product_reference: "SUSE Enterprise Storage 7", }, { category: "default_component_of", full_product_name: { name: "busybox-static-1.34.1-4.9.1.aarch64 as component of SUSE Enterprise Storage 7", product_id: "SUSE Enterprise Storage 7:busybox-static-1.34.1-4.9.1.aarch64", }, product_reference: "busybox-static-1.34.1-4.9.1.aarch64", relates_to_product_reference: "SUSE Enterprise Storage 7", }, { category: "default_component_of", full_product_name: { name: "busybox-static-1.34.1-4.9.1.x86_64 as component of SUSE Enterprise Storage 7", product_id: "SUSE Enterprise Storage 7:busybox-static-1.34.1-4.9.1.x86_64", }, product_reference: "busybox-static-1.34.1-4.9.1.x86_64", relates_to_product_reference: "SUSE Enterprise Storage 7", }, ], }, vulnerabilities: [ { cve: "CVE-2011-5325", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2011-5325", }, ], notes: [ { category: "general", text: "Directory traversal vulnerability in the BusyBox implementation of tar before 1.22.0 v5 allows remote attackers to point to files outside the current working directory via a symlink.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Enterprise Storage 6:busybox-1.34.1-4.9.1.aarch64", "SUSE Enterprise Storage 6:busybox-1.34.1-4.9.1.x86_64", "SUSE Enterprise Storage 6:busybox-static-1.34.1-4.9.1.aarch64", "SUSE Enterprise Storage 6:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Enterprise Storage 7:busybox-1.34.1-4.9.1.aarch64", "SUSE Enterprise Storage 7:busybox-1.34.1-4.9.1.x86_64", "SUSE Enterprise Storage 7:busybox-static-1.34.1-4.9.1.aarch64", "SUSE Enterprise Storage 7:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:busybox-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:busybox-static-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:busybox-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:busybox-static-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:busybox-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:busybox-static-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:busybox-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:busybox-static-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:busybox-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:busybox-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-1.34.1-4.9.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-static-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-static-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-static-1.34.1-4.9.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-1.34.1-4.9.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-static-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-static-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-static-1.34.1-4.9.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-1.34.1-4.9.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-static-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-static-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-static-1.34.1-4.9.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:busybox-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:busybox-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:busybox-1.34.1-4.9.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:busybox-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:busybox-static-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:busybox-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:busybox-static-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:busybox-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:busybox-1.34.1-4.9.1.x86_64", "SUSE Manager Proxy 4.1:busybox-1.34.1-4.9.1.x86_64", "SUSE Manager Proxy 4.1:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Manager Retail Branch Server 4.1:busybox-1.34.1-4.9.1.x86_64", "SUSE Manager Retail Branch Server 4.1:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Manager Server 4.1:busybox-1.34.1-4.9.1.ppc64le", "SUSE Manager Server 4.1:busybox-1.34.1-4.9.1.s390x", "SUSE Manager Server 4.1:busybox-1.34.1-4.9.1.x86_64", "SUSE Manager Server 4.1:busybox-static-1.34.1-4.9.1.ppc64le", "SUSE Manager Server 4.1:busybox-static-1.34.1-4.9.1.s390x", "SUSE Manager Server 4.1:busybox-static-1.34.1-4.9.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2011-5325", url: "https://www.suse.com/security/cve/CVE-2011-5325", }, { category: "external", summary: "SUSE Bug 951562 for CVE-2011-5325", url: "https://bugzilla.suse.com/951562", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Enterprise Storage 6:busybox-1.34.1-4.9.1.aarch64", "SUSE Enterprise Storage 6:busybox-1.34.1-4.9.1.x86_64", "SUSE Enterprise Storage 6:busybox-static-1.34.1-4.9.1.aarch64", "SUSE Enterprise Storage 6:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Enterprise Storage 7:busybox-1.34.1-4.9.1.aarch64", "SUSE Enterprise Storage 7:busybox-1.34.1-4.9.1.x86_64", "SUSE Enterprise Storage 7:busybox-static-1.34.1-4.9.1.aarch64", "SUSE Enterprise Storage 7:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:busybox-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:busybox-static-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:busybox-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:busybox-static-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:busybox-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:busybox-static-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:busybox-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:busybox-static-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:busybox-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:busybox-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-1.34.1-4.9.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-static-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-static-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-static-1.34.1-4.9.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-1.34.1-4.9.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-static-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-static-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-static-1.34.1-4.9.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-1.34.1-4.9.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-static-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-static-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-static-1.34.1-4.9.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:busybox-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:busybox-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:busybox-1.34.1-4.9.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:busybox-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:busybox-static-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:busybox-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:busybox-static-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:busybox-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:busybox-1.34.1-4.9.1.x86_64", "SUSE Manager Proxy 4.1:busybox-1.34.1-4.9.1.x86_64", "SUSE Manager Proxy 4.1:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Manager Retail Branch Server 4.1:busybox-1.34.1-4.9.1.x86_64", "SUSE Manager Retail Branch Server 4.1:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Manager Server 4.1:busybox-1.34.1-4.9.1.ppc64le", "SUSE Manager Server 4.1:busybox-1.34.1-4.9.1.s390x", "SUSE Manager Server 4.1:busybox-1.34.1-4.9.1.x86_64", "SUSE Manager Server 4.1:busybox-static-1.34.1-4.9.1.ppc64le", "SUSE Manager Server 4.1:busybox-static-1.34.1-4.9.1.s390x", "SUSE Manager Server 4.1:busybox-static-1.34.1-4.9.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 7.5, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N", version: "3.1", }, products: [ "SUSE Enterprise Storage 6:busybox-1.34.1-4.9.1.aarch64", "SUSE Enterprise Storage 6:busybox-1.34.1-4.9.1.x86_64", "SUSE Enterprise Storage 6:busybox-static-1.34.1-4.9.1.aarch64", "SUSE Enterprise Storage 6:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Enterprise Storage 7:busybox-1.34.1-4.9.1.aarch64", "SUSE Enterprise Storage 7:busybox-1.34.1-4.9.1.x86_64", "SUSE Enterprise Storage 7:busybox-static-1.34.1-4.9.1.aarch64", "SUSE Enterprise Storage 7:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:busybox-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:busybox-static-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:busybox-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:busybox-static-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:busybox-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:busybox-static-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:busybox-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:busybox-static-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:busybox-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:busybox-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-1.34.1-4.9.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-static-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-static-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-static-1.34.1-4.9.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-1.34.1-4.9.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-static-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-static-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-static-1.34.1-4.9.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-1.34.1-4.9.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-static-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-static-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-static-1.34.1-4.9.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:busybox-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:busybox-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:busybox-1.34.1-4.9.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:busybox-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:busybox-static-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:busybox-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:busybox-static-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:busybox-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:busybox-1.34.1-4.9.1.x86_64", "SUSE Manager Proxy 4.1:busybox-1.34.1-4.9.1.x86_64", "SUSE Manager Proxy 4.1:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Manager Retail Branch Server 4.1:busybox-1.34.1-4.9.1.x86_64", "SUSE Manager Retail Branch Server 4.1:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Manager Server 4.1:busybox-1.34.1-4.9.1.ppc64le", "SUSE Manager Server 4.1:busybox-1.34.1-4.9.1.s390x", "SUSE Manager Server 4.1:busybox-1.34.1-4.9.1.x86_64", "SUSE Manager Server 4.1:busybox-static-1.34.1-4.9.1.ppc64le", "SUSE Manager Server 4.1:busybox-static-1.34.1-4.9.1.s390x", "SUSE Manager Server 4.1:busybox-static-1.34.1-4.9.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2022-01-20T09:05:15Z", details: "moderate", }, ], title: "CVE-2011-5325", }, { cve: "CVE-2015-9261", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2015-9261", }, ], notes: [ { category: "general", text: "huft_build in archival/libarchive/decompress_gunzip.c in BusyBox before 1.27.2 misuses a pointer, causing segfaults and an application crash during an unzip operation on a specially crafted ZIP file.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Enterprise Storage 6:busybox-1.34.1-4.9.1.aarch64", "SUSE Enterprise Storage 6:busybox-1.34.1-4.9.1.x86_64", "SUSE Enterprise Storage 6:busybox-static-1.34.1-4.9.1.aarch64", "SUSE Enterprise Storage 6:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Enterprise Storage 7:busybox-1.34.1-4.9.1.aarch64", "SUSE Enterprise Storage 7:busybox-1.34.1-4.9.1.x86_64", "SUSE Enterprise Storage 7:busybox-static-1.34.1-4.9.1.aarch64", "SUSE Enterprise Storage 7:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:busybox-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:busybox-static-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:busybox-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:busybox-static-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:busybox-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:busybox-static-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:busybox-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:busybox-static-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:busybox-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:busybox-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-1.34.1-4.9.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-static-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-static-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-static-1.34.1-4.9.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-1.34.1-4.9.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-static-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-static-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-static-1.34.1-4.9.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-1.34.1-4.9.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-static-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-static-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-static-1.34.1-4.9.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:busybox-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:busybox-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:busybox-1.34.1-4.9.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:busybox-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:busybox-static-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:busybox-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:busybox-static-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:busybox-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:busybox-1.34.1-4.9.1.x86_64", "SUSE Manager Proxy 4.1:busybox-1.34.1-4.9.1.x86_64", "SUSE Manager Proxy 4.1:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Manager Retail Branch Server 4.1:busybox-1.34.1-4.9.1.x86_64", "SUSE Manager Retail Branch Server 4.1:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Manager Server 4.1:busybox-1.34.1-4.9.1.ppc64le", "SUSE Manager Server 4.1:busybox-1.34.1-4.9.1.s390x", "SUSE Manager Server 4.1:busybox-1.34.1-4.9.1.x86_64", "SUSE Manager Server 4.1:busybox-static-1.34.1-4.9.1.ppc64le", "SUSE Manager Server 4.1:busybox-static-1.34.1-4.9.1.s390x", "SUSE Manager Server 4.1:busybox-static-1.34.1-4.9.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2015-9261", url: "https://www.suse.com/security/cve/CVE-2015-9261", }, { category: "external", summary: "SUSE Bug 1102912 for CVE-2015-9261", url: "https://bugzilla.suse.com/1102912", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Enterprise Storage 6:busybox-1.34.1-4.9.1.aarch64", "SUSE Enterprise Storage 6:busybox-1.34.1-4.9.1.x86_64", "SUSE Enterprise Storage 6:busybox-static-1.34.1-4.9.1.aarch64", "SUSE Enterprise Storage 6:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Enterprise Storage 7:busybox-1.34.1-4.9.1.aarch64", "SUSE Enterprise Storage 7:busybox-1.34.1-4.9.1.x86_64", "SUSE Enterprise Storage 7:busybox-static-1.34.1-4.9.1.aarch64", "SUSE Enterprise Storage 7:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:busybox-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:busybox-static-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:busybox-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:busybox-static-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:busybox-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:busybox-static-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:busybox-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:busybox-static-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:busybox-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:busybox-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-1.34.1-4.9.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-static-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-static-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-static-1.34.1-4.9.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-1.34.1-4.9.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-static-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-static-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-static-1.34.1-4.9.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-1.34.1-4.9.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-static-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-static-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-static-1.34.1-4.9.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:busybox-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:busybox-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:busybox-1.34.1-4.9.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:busybox-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:busybox-static-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:busybox-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:busybox-static-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:busybox-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:busybox-1.34.1-4.9.1.x86_64", "SUSE Manager Proxy 4.1:busybox-1.34.1-4.9.1.x86_64", "SUSE Manager Proxy 4.1:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Manager Retail Branch Server 4.1:busybox-1.34.1-4.9.1.x86_64", "SUSE Manager Retail Branch Server 4.1:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Manager Server 4.1:busybox-1.34.1-4.9.1.ppc64le", "SUSE Manager Server 4.1:busybox-1.34.1-4.9.1.s390x", "SUSE Manager Server 4.1:busybox-1.34.1-4.9.1.x86_64", "SUSE Manager Server 4.1:busybox-static-1.34.1-4.9.1.ppc64le", "SUSE Manager Server 4.1:busybox-static-1.34.1-4.9.1.s390x", "SUSE Manager Server 4.1:busybox-static-1.34.1-4.9.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.5, baseSeverity: "MEDIUM", vectorString: "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", version: "3.0", }, products: [ "SUSE Enterprise Storage 6:busybox-1.34.1-4.9.1.aarch64", "SUSE Enterprise Storage 6:busybox-1.34.1-4.9.1.x86_64", "SUSE Enterprise Storage 6:busybox-static-1.34.1-4.9.1.aarch64", "SUSE Enterprise Storage 6:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Enterprise Storage 7:busybox-1.34.1-4.9.1.aarch64", "SUSE Enterprise Storage 7:busybox-1.34.1-4.9.1.x86_64", "SUSE Enterprise Storage 7:busybox-static-1.34.1-4.9.1.aarch64", "SUSE Enterprise Storage 7:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:busybox-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:busybox-static-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:busybox-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:busybox-static-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:busybox-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:busybox-static-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:busybox-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:busybox-static-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:busybox-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:busybox-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-1.34.1-4.9.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-static-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-static-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-static-1.34.1-4.9.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-1.34.1-4.9.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-static-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-static-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-static-1.34.1-4.9.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-1.34.1-4.9.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-static-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-static-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-static-1.34.1-4.9.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:busybox-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:busybox-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:busybox-1.34.1-4.9.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:busybox-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:busybox-static-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:busybox-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:busybox-static-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:busybox-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:busybox-1.34.1-4.9.1.x86_64", "SUSE Manager Proxy 4.1:busybox-1.34.1-4.9.1.x86_64", "SUSE Manager Proxy 4.1:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Manager Retail Branch Server 4.1:busybox-1.34.1-4.9.1.x86_64", "SUSE Manager Retail Branch Server 4.1:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Manager Server 4.1:busybox-1.34.1-4.9.1.ppc64le", "SUSE Manager Server 4.1:busybox-1.34.1-4.9.1.s390x", "SUSE Manager Server 4.1:busybox-1.34.1-4.9.1.x86_64", "SUSE Manager Server 4.1:busybox-static-1.34.1-4.9.1.ppc64le", "SUSE Manager Server 4.1:busybox-static-1.34.1-4.9.1.s390x", "SUSE Manager Server 4.1:busybox-static-1.34.1-4.9.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2022-01-20T09:05:15Z", details: "moderate", }, ], title: "CVE-2015-9261", }, { cve: "CVE-2016-2147", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2016-2147", }, ], notes: [ { category: "general", text: "Integer overflow in the DHCP client (udhcpc) in BusyBox before 1.25.0 allows remote attackers to cause a denial of service (crash) via a malformed RFC1035-encoded domain name, which triggers an out-of-bounds heap write.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Enterprise Storage 6:busybox-1.34.1-4.9.1.aarch64", "SUSE Enterprise Storage 6:busybox-1.34.1-4.9.1.x86_64", "SUSE Enterprise Storage 6:busybox-static-1.34.1-4.9.1.aarch64", "SUSE Enterprise Storage 6:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Enterprise Storage 7:busybox-1.34.1-4.9.1.aarch64", "SUSE Enterprise Storage 7:busybox-1.34.1-4.9.1.x86_64", "SUSE Enterprise Storage 7:busybox-static-1.34.1-4.9.1.aarch64", "SUSE Enterprise Storage 7:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:busybox-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:busybox-static-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:busybox-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:busybox-static-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:busybox-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:busybox-static-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:busybox-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:busybox-static-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:busybox-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:busybox-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-1.34.1-4.9.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-static-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-static-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-static-1.34.1-4.9.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-1.34.1-4.9.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-static-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-static-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-static-1.34.1-4.9.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-1.34.1-4.9.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-static-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-static-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-static-1.34.1-4.9.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:busybox-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:busybox-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:busybox-1.34.1-4.9.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:busybox-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:busybox-static-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:busybox-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:busybox-static-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:busybox-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:busybox-1.34.1-4.9.1.x86_64", "SUSE Manager Proxy 4.1:busybox-1.34.1-4.9.1.x86_64", "SUSE Manager Proxy 4.1:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Manager Retail Branch Server 4.1:busybox-1.34.1-4.9.1.x86_64", "SUSE Manager Retail Branch Server 4.1:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Manager Server 4.1:busybox-1.34.1-4.9.1.ppc64le", "SUSE Manager Server 4.1:busybox-1.34.1-4.9.1.s390x", "SUSE Manager Server 4.1:busybox-1.34.1-4.9.1.x86_64", "SUSE Manager Server 4.1:busybox-static-1.34.1-4.9.1.ppc64le", "SUSE Manager Server 4.1:busybox-static-1.34.1-4.9.1.s390x", "SUSE Manager Server 4.1:busybox-static-1.34.1-4.9.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2016-2147", url: "https://www.suse.com/security/cve/CVE-2016-2147", }, { category: "external", summary: "SUSE Bug 970663 for CVE-2016-2147", url: "https://bugzilla.suse.com/970663", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Enterprise Storage 6:busybox-1.34.1-4.9.1.aarch64", "SUSE Enterprise Storage 6:busybox-1.34.1-4.9.1.x86_64", "SUSE Enterprise Storage 6:busybox-static-1.34.1-4.9.1.aarch64", "SUSE Enterprise Storage 6:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Enterprise Storage 7:busybox-1.34.1-4.9.1.aarch64", "SUSE Enterprise Storage 7:busybox-1.34.1-4.9.1.x86_64", "SUSE Enterprise Storage 7:busybox-static-1.34.1-4.9.1.aarch64", "SUSE Enterprise Storage 7:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:busybox-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:busybox-static-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:busybox-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:busybox-static-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:busybox-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:busybox-static-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:busybox-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:busybox-static-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:busybox-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:busybox-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-1.34.1-4.9.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-static-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-static-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-static-1.34.1-4.9.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-1.34.1-4.9.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-static-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-static-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-static-1.34.1-4.9.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-1.34.1-4.9.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-static-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-static-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-static-1.34.1-4.9.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:busybox-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:busybox-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:busybox-1.34.1-4.9.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:busybox-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:busybox-static-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:busybox-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:busybox-static-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:busybox-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:busybox-1.34.1-4.9.1.x86_64", "SUSE Manager Proxy 4.1:busybox-1.34.1-4.9.1.x86_64", "SUSE Manager Proxy 4.1:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Manager Retail Branch Server 4.1:busybox-1.34.1-4.9.1.x86_64", "SUSE Manager Retail Branch Server 4.1:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Manager Server 4.1:busybox-1.34.1-4.9.1.ppc64le", "SUSE Manager Server 4.1:busybox-1.34.1-4.9.1.s390x", "SUSE Manager Server 4.1:busybox-1.34.1-4.9.1.x86_64", "SUSE Manager Server 4.1:busybox-static-1.34.1-4.9.1.ppc64le", "SUSE Manager Server 4.1:busybox-static-1.34.1-4.9.1.s390x", "SUSE Manager Server 4.1:busybox-static-1.34.1-4.9.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 7.5, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "SUSE Enterprise Storage 6:busybox-1.34.1-4.9.1.aarch64", "SUSE Enterprise Storage 6:busybox-1.34.1-4.9.1.x86_64", "SUSE Enterprise Storage 6:busybox-static-1.34.1-4.9.1.aarch64", "SUSE Enterprise Storage 6:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Enterprise Storage 7:busybox-1.34.1-4.9.1.aarch64", "SUSE Enterprise Storage 7:busybox-1.34.1-4.9.1.x86_64", "SUSE Enterprise Storage 7:busybox-static-1.34.1-4.9.1.aarch64", "SUSE Enterprise Storage 7:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:busybox-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:busybox-static-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:busybox-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:busybox-static-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:busybox-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:busybox-static-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:busybox-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:busybox-static-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:busybox-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:busybox-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-1.34.1-4.9.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-static-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-static-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-static-1.34.1-4.9.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-1.34.1-4.9.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-static-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-static-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-static-1.34.1-4.9.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-1.34.1-4.9.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-static-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-static-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-static-1.34.1-4.9.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:busybox-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:busybox-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:busybox-1.34.1-4.9.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:busybox-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:busybox-static-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:busybox-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:busybox-static-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:busybox-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:busybox-1.34.1-4.9.1.x86_64", "SUSE Manager Proxy 4.1:busybox-1.34.1-4.9.1.x86_64", "SUSE Manager Proxy 4.1:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Manager Retail Branch Server 4.1:busybox-1.34.1-4.9.1.x86_64", "SUSE Manager Retail Branch Server 4.1:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Manager Server 4.1:busybox-1.34.1-4.9.1.ppc64le", "SUSE Manager Server 4.1:busybox-1.34.1-4.9.1.s390x", "SUSE Manager Server 4.1:busybox-1.34.1-4.9.1.x86_64", "SUSE Manager Server 4.1:busybox-static-1.34.1-4.9.1.ppc64le", "SUSE Manager Server 4.1:busybox-static-1.34.1-4.9.1.s390x", "SUSE Manager Server 4.1:busybox-static-1.34.1-4.9.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2022-01-20T09:05:15Z", details: "important", }, ], title: "CVE-2016-2147", }, { cve: "CVE-2016-2148", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2016-2148", }, ], notes: [ { category: "general", text: "Heap-based buffer overflow in the DHCP client (udhcpc) in BusyBox before 1.25.0 allows remote attackers to have unspecified impact via vectors involving OPTION_6RD parsing.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Enterprise Storage 6:busybox-1.34.1-4.9.1.aarch64", "SUSE Enterprise Storage 6:busybox-1.34.1-4.9.1.x86_64", "SUSE Enterprise Storage 6:busybox-static-1.34.1-4.9.1.aarch64", "SUSE Enterprise Storage 6:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Enterprise Storage 7:busybox-1.34.1-4.9.1.aarch64", "SUSE Enterprise Storage 7:busybox-1.34.1-4.9.1.x86_64", "SUSE Enterprise Storage 7:busybox-static-1.34.1-4.9.1.aarch64", "SUSE Enterprise Storage 7:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:busybox-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:busybox-static-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:busybox-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:busybox-static-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:busybox-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:busybox-static-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:busybox-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:busybox-static-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:busybox-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:busybox-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-1.34.1-4.9.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-static-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-static-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-static-1.34.1-4.9.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-1.34.1-4.9.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-static-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-static-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-static-1.34.1-4.9.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-1.34.1-4.9.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-static-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-static-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-static-1.34.1-4.9.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:busybox-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:busybox-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:busybox-1.34.1-4.9.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:busybox-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:busybox-static-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:busybox-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:busybox-static-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:busybox-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:busybox-1.34.1-4.9.1.x86_64", "SUSE Manager Proxy 4.1:busybox-1.34.1-4.9.1.x86_64", "SUSE Manager Proxy 4.1:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Manager Retail Branch Server 4.1:busybox-1.34.1-4.9.1.x86_64", "SUSE Manager Retail Branch Server 4.1:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Manager Server 4.1:busybox-1.34.1-4.9.1.ppc64le", "SUSE Manager Server 4.1:busybox-1.34.1-4.9.1.s390x", "SUSE Manager Server 4.1:busybox-1.34.1-4.9.1.x86_64", "SUSE Manager Server 4.1:busybox-static-1.34.1-4.9.1.ppc64le", "SUSE Manager Server 4.1:busybox-static-1.34.1-4.9.1.s390x", "SUSE Manager Server 4.1:busybox-static-1.34.1-4.9.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2016-2148", url: "https://www.suse.com/security/cve/CVE-2016-2148", }, { category: "external", summary: "SUSE Bug 970662 for CVE-2016-2148", url: "https://bugzilla.suse.com/970662", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Enterprise Storage 6:busybox-1.34.1-4.9.1.aarch64", "SUSE Enterprise Storage 6:busybox-1.34.1-4.9.1.x86_64", "SUSE Enterprise Storage 6:busybox-static-1.34.1-4.9.1.aarch64", "SUSE Enterprise Storage 6:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Enterprise Storage 7:busybox-1.34.1-4.9.1.aarch64", "SUSE Enterprise Storage 7:busybox-1.34.1-4.9.1.x86_64", "SUSE Enterprise Storage 7:busybox-static-1.34.1-4.9.1.aarch64", "SUSE Enterprise Storage 7:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:busybox-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:busybox-static-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:busybox-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:busybox-static-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:busybox-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:busybox-static-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:busybox-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:busybox-static-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:busybox-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:busybox-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-1.34.1-4.9.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-static-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-static-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-static-1.34.1-4.9.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-1.34.1-4.9.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-static-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-static-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-static-1.34.1-4.9.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-1.34.1-4.9.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-static-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-static-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-static-1.34.1-4.9.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:busybox-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:busybox-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:busybox-1.34.1-4.9.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:busybox-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:busybox-static-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:busybox-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:busybox-static-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:busybox-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:busybox-1.34.1-4.9.1.x86_64", "SUSE Manager Proxy 4.1:busybox-1.34.1-4.9.1.x86_64", "SUSE Manager Proxy 4.1:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Manager Retail Branch Server 4.1:busybox-1.34.1-4.9.1.x86_64", "SUSE Manager Retail Branch Server 4.1:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Manager Server 4.1:busybox-1.34.1-4.9.1.ppc64le", "SUSE Manager Server 4.1:busybox-1.34.1-4.9.1.s390x", "SUSE Manager Server 4.1:busybox-1.34.1-4.9.1.x86_64", "SUSE Manager Server 4.1:busybox-static-1.34.1-4.9.1.ppc64le", "SUSE Manager Server 4.1:busybox-static-1.34.1-4.9.1.s390x", "SUSE Manager Server 4.1:busybox-static-1.34.1-4.9.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 9.8, baseSeverity: "CRITICAL", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, products: [ "SUSE Enterprise Storage 6:busybox-1.34.1-4.9.1.aarch64", "SUSE Enterprise Storage 6:busybox-1.34.1-4.9.1.x86_64", "SUSE Enterprise Storage 6:busybox-static-1.34.1-4.9.1.aarch64", "SUSE Enterprise Storage 6:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Enterprise Storage 7:busybox-1.34.1-4.9.1.aarch64", "SUSE Enterprise Storage 7:busybox-1.34.1-4.9.1.x86_64", "SUSE Enterprise Storage 7:busybox-static-1.34.1-4.9.1.aarch64", "SUSE Enterprise Storage 7:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:busybox-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:busybox-static-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:busybox-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:busybox-static-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:busybox-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:busybox-static-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:busybox-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:busybox-static-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:busybox-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:busybox-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-1.34.1-4.9.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-static-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-static-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-static-1.34.1-4.9.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-1.34.1-4.9.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-static-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-static-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-static-1.34.1-4.9.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-1.34.1-4.9.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-static-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-static-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-static-1.34.1-4.9.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:busybox-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:busybox-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:busybox-1.34.1-4.9.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:busybox-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:busybox-static-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:busybox-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:busybox-static-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:busybox-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:busybox-1.34.1-4.9.1.x86_64", "SUSE Manager Proxy 4.1:busybox-1.34.1-4.9.1.x86_64", "SUSE Manager Proxy 4.1:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Manager Retail Branch Server 4.1:busybox-1.34.1-4.9.1.x86_64", "SUSE Manager Retail Branch Server 4.1:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Manager Server 4.1:busybox-1.34.1-4.9.1.ppc64le", "SUSE Manager Server 4.1:busybox-1.34.1-4.9.1.s390x", "SUSE Manager Server 4.1:busybox-1.34.1-4.9.1.x86_64", "SUSE Manager Server 4.1:busybox-static-1.34.1-4.9.1.ppc64le", "SUSE Manager Server 4.1:busybox-static-1.34.1-4.9.1.s390x", "SUSE Manager Server 4.1:busybox-static-1.34.1-4.9.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2022-01-20T09:05:15Z", details: "moderate", }, ], title: "CVE-2016-2148", }, { cve: "CVE-2016-6301", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2016-6301", }, ], notes: [ { category: "general", text: "The recv_and_process_client_pkt function in networking/ntpd.c in busybox allows remote attackers to cause a denial of service (CPU and bandwidth consumption) via a forged NTP packet, which triggers a communication loop.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Enterprise Storage 6:busybox-1.34.1-4.9.1.aarch64", "SUSE Enterprise Storage 6:busybox-1.34.1-4.9.1.x86_64", "SUSE Enterprise Storage 6:busybox-static-1.34.1-4.9.1.aarch64", "SUSE Enterprise Storage 6:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Enterprise Storage 7:busybox-1.34.1-4.9.1.aarch64", "SUSE Enterprise Storage 7:busybox-1.34.1-4.9.1.x86_64", "SUSE Enterprise Storage 7:busybox-static-1.34.1-4.9.1.aarch64", "SUSE Enterprise Storage 7:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:busybox-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:busybox-static-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:busybox-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:busybox-static-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:busybox-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:busybox-static-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:busybox-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:busybox-static-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:busybox-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:busybox-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-1.34.1-4.9.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-static-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-static-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-static-1.34.1-4.9.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-1.34.1-4.9.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-static-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-static-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-static-1.34.1-4.9.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-1.34.1-4.9.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-static-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-static-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-static-1.34.1-4.9.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:busybox-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:busybox-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:busybox-1.34.1-4.9.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:busybox-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:busybox-static-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:busybox-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:busybox-static-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:busybox-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:busybox-1.34.1-4.9.1.x86_64", "SUSE Manager Proxy 4.1:busybox-1.34.1-4.9.1.x86_64", "SUSE Manager Proxy 4.1:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Manager Retail Branch Server 4.1:busybox-1.34.1-4.9.1.x86_64", "SUSE Manager Retail Branch Server 4.1:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Manager Server 4.1:busybox-1.34.1-4.9.1.ppc64le", "SUSE Manager Server 4.1:busybox-1.34.1-4.9.1.s390x", "SUSE Manager Server 4.1:busybox-1.34.1-4.9.1.x86_64", "SUSE Manager Server 4.1:busybox-static-1.34.1-4.9.1.ppc64le", "SUSE Manager Server 4.1:busybox-static-1.34.1-4.9.1.s390x", "SUSE Manager Server 4.1:busybox-static-1.34.1-4.9.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2016-6301", url: "https://www.suse.com/security/cve/CVE-2016-6301", }, { category: "external", summary: "SUSE Bug 991940 for CVE-2016-6301", url: "https://bugzilla.suse.com/991940", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Enterprise Storage 6:busybox-1.34.1-4.9.1.aarch64", "SUSE Enterprise Storage 6:busybox-1.34.1-4.9.1.x86_64", "SUSE Enterprise Storage 6:busybox-static-1.34.1-4.9.1.aarch64", "SUSE Enterprise Storage 6:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Enterprise Storage 7:busybox-1.34.1-4.9.1.aarch64", "SUSE Enterprise Storage 7:busybox-1.34.1-4.9.1.x86_64", "SUSE Enterprise Storage 7:busybox-static-1.34.1-4.9.1.aarch64", "SUSE Enterprise Storage 7:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:busybox-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:busybox-static-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:busybox-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:busybox-static-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:busybox-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:busybox-static-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:busybox-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:busybox-static-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:busybox-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:busybox-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-1.34.1-4.9.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-static-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-static-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-static-1.34.1-4.9.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-1.34.1-4.9.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-static-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-static-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-static-1.34.1-4.9.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-1.34.1-4.9.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-static-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-static-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-static-1.34.1-4.9.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:busybox-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:busybox-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:busybox-1.34.1-4.9.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:busybox-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:busybox-static-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:busybox-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:busybox-static-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:busybox-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:busybox-1.34.1-4.9.1.x86_64", "SUSE Manager Proxy 4.1:busybox-1.34.1-4.9.1.x86_64", "SUSE Manager Proxy 4.1:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Manager Retail Branch Server 4.1:busybox-1.34.1-4.9.1.x86_64", "SUSE Manager Retail Branch Server 4.1:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Manager Server 4.1:busybox-1.34.1-4.9.1.ppc64le", "SUSE Manager Server 4.1:busybox-1.34.1-4.9.1.s390x", "SUSE Manager Server 4.1:busybox-1.34.1-4.9.1.x86_64", "SUSE Manager Server 4.1:busybox-static-1.34.1-4.9.1.ppc64le", "SUSE Manager Server 4.1:busybox-static-1.34.1-4.9.1.s390x", "SUSE Manager Server 4.1:busybox-static-1.34.1-4.9.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 7.5, baseSeverity: "HIGH", vectorString: "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", version: "3.0", }, products: [ "SUSE Enterprise Storage 6:busybox-1.34.1-4.9.1.aarch64", "SUSE Enterprise Storage 6:busybox-1.34.1-4.9.1.x86_64", "SUSE Enterprise Storage 6:busybox-static-1.34.1-4.9.1.aarch64", "SUSE Enterprise Storage 6:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Enterprise Storage 7:busybox-1.34.1-4.9.1.aarch64", "SUSE Enterprise Storage 7:busybox-1.34.1-4.9.1.x86_64", "SUSE Enterprise Storage 7:busybox-static-1.34.1-4.9.1.aarch64", "SUSE Enterprise Storage 7:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:busybox-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:busybox-static-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:busybox-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:busybox-static-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:busybox-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:busybox-static-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:busybox-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:busybox-static-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:busybox-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:busybox-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-1.34.1-4.9.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-static-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-static-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-static-1.34.1-4.9.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-1.34.1-4.9.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-static-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-static-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-static-1.34.1-4.9.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-1.34.1-4.9.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-static-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-static-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-static-1.34.1-4.9.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:busybox-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:busybox-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:busybox-1.34.1-4.9.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:busybox-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:busybox-static-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:busybox-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:busybox-static-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:busybox-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:busybox-1.34.1-4.9.1.x86_64", "SUSE Manager Proxy 4.1:busybox-1.34.1-4.9.1.x86_64", "SUSE Manager Proxy 4.1:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Manager Retail Branch Server 4.1:busybox-1.34.1-4.9.1.x86_64", "SUSE Manager Retail Branch Server 4.1:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Manager Server 4.1:busybox-1.34.1-4.9.1.ppc64le", "SUSE Manager Server 4.1:busybox-1.34.1-4.9.1.s390x", "SUSE Manager Server 4.1:busybox-1.34.1-4.9.1.x86_64", "SUSE Manager Server 4.1:busybox-static-1.34.1-4.9.1.ppc64le", "SUSE Manager Server 4.1:busybox-static-1.34.1-4.9.1.s390x", "SUSE Manager Server 4.1:busybox-static-1.34.1-4.9.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2022-01-20T09:05:15Z", details: "moderate", }, ], title: "CVE-2016-6301", }, { cve: "CVE-2017-15873", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2017-15873", }, ], notes: [ { category: "general", text: "The get_next_block function in archival/libarchive/decompress_bunzip2.c in BusyBox 1.27.2 has an Integer Overflow that may lead to a write access violation.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Enterprise Storage 6:busybox-1.34.1-4.9.1.aarch64", "SUSE Enterprise Storage 6:busybox-1.34.1-4.9.1.x86_64", "SUSE Enterprise Storage 6:busybox-static-1.34.1-4.9.1.aarch64", "SUSE Enterprise Storage 6:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Enterprise Storage 7:busybox-1.34.1-4.9.1.aarch64", "SUSE Enterprise Storage 7:busybox-1.34.1-4.9.1.x86_64", "SUSE Enterprise Storage 7:busybox-static-1.34.1-4.9.1.aarch64", "SUSE Enterprise Storage 7:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:busybox-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:busybox-static-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:busybox-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:busybox-static-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:busybox-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:busybox-static-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:busybox-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:busybox-static-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:busybox-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:busybox-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-1.34.1-4.9.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-static-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-static-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-static-1.34.1-4.9.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-1.34.1-4.9.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-static-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-static-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-static-1.34.1-4.9.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-1.34.1-4.9.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-static-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-static-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-static-1.34.1-4.9.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:busybox-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:busybox-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:busybox-1.34.1-4.9.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:busybox-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:busybox-static-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:busybox-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:busybox-static-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:busybox-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:busybox-1.34.1-4.9.1.x86_64", "SUSE Manager Proxy 4.1:busybox-1.34.1-4.9.1.x86_64", "SUSE Manager Proxy 4.1:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Manager Retail Branch Server 4.1:busybox-1.34.1-4.9.1.x86_64", "SUSE Manager Retail Branch Server 4.1:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Manager Server 4.1:busybox-1.34.1-4.9.1.ppc64le", "SUSE Manager Server 4.1:busybox-1.34.1-4.9.1.s390x", "SUSE Manager Server 4.1:busybox-1.34.1-4.9.1.x86_64", "SUSE Manager Server 4.1:busybox-static-1.34.1-4.9.1.ppc64le", "SUSE Manager Server 4.1:busybox-static-1.34.1-4.9.1.s390x", "SUSE Manager Server 4.1:busybox-static-1.34.1-4.9.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2017-15873", url: "https://www.suse.com/security/cve/CVE-2017-15873", }, { category: "external", summary: "SUSE Bug 1064976 for CVE-2017-15873", url: "https://bugzilla.suse.com/1064976", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Enterprise Storage 6:busybox-1.34.1-4.9.1.aarch64", "SUSE Enterprise Storage 6:busybox-1.34.1-4.9.1.x86_64", "SUSE Enterprise Storage 6:busybox-static-1.34.1-4.9.1.aarch64", "SUSE Enterprise Storage 6:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Enterprise Storage 7:busybox-1.34.1-4.9.1.aarch64", "SUSE Enterprise Storage 7:busybox-1.34.1-4.9.1.x86_64", "SUSE Enterprise Storage 7:busybox-static-1.34.1-4.9.1.aarch64", "SUSE Enterprise Storage 7:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:busybox-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:busybox-static-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:busybox-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:busybox-static-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:busybox-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:busybox-static-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:busybox-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:busybox-static-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:busybox-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:busybox-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-1.34.1-4.9.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-static-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-static-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-static-1.34.1-4.9.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-1.34.1-4.9.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-static-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-static-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-static-1.34.1-4.9.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-1.34.1-4.9.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-static-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-static-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-static-1.34.1-4.9.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:busybox-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:busybox-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:busybox-1.34.1-4.9.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:busybox-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:busybox-static-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:busybox-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:busybox-static-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:busybox-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:busybox-1.34.1-4.9.1.x86_64", "SUSE Manager Proxy 4.1:busybox-1.34.1-4.9.1.x86_64", "SUSE Manager Proxy 4.1:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Manager Retail Branch Server 4.1:busybox-1.34.1-4.9.1.x86_64", "SUSE Manager Retail Branch Server 4.1:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Manager Server 4.1:busybox-1.34.1-4.9.1.ppc64le", "SUSE Manager Server 4.1:busybox-1.34.1-4.9.1.s390x", "SUSE Manager Server 4.1:busybox-1.34.1-4.9.1.x86_64", "SUSE Manager Server 4.1:busybox-static-1.34.1-4.9.1.ppc64le", "SUSE Manager Server 4.1:busybox-static-1.34.1-4.9.1.s390x", "SUSE Manager Server 4.1:busybox-static-1.34.1-4.9.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 7.8, baseSeverity: "HIGH", vectorString: "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", version: "3.0", }, products: [ "SUSE Enterprise Storage 6:busybox-1.34.1-4.9.1.aarch64", "SUSE Enterprise Storage 6:busybox-1.34.1-4.9.1.x86_64", "SUSE Enterprise Storage 6:busybox-static-1.34.1-4.9.1.aarch64", "SUSE Enterprise Storage 6:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Enterprise Storage 7:busybox-1.34.1-4.9.1.aarch64", "SUSE Enterprise Storage 7:busybox-1.34.1-4.9.1.x86_64", "SUSE Enterprise Storage 7:busybox-static-1.34.1-4.9.1.aarch64", "SUSE Enterprise Storage 7:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:busybox-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:busybox-static-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:busybox-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:busybox-static-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:busybox-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:busybox-static-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:busybox-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:busybox-static-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:busybox-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:busybox-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-1.34.1-4.9.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-static-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-static-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-static-1.34.1-4.9.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-1.34.1-4.9.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-static-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-static-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-static-1.34.1-4.9.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-1.34.1-4.9.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-static-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-static-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-static-1.34.1-4.9.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:busybox-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:busybox-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:busybox-1.34.1-4.9.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:busybox-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:busybox-static-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:busybox-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:busybox-static-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:busybox-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:busybox-1.34.1-4.9.1.x86_64", "SUSE Manager Proxy 4.1:busybox-1.34.1-4.9.1.x86_64", "SUSE Manager Proxy 4.1:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Manager Retail Branch Server 4.1:busybox-1.34.1-4.9.1.x86_64", "SUSE Manager Retail Branch Server 4.1:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Manager Server 4.1:busybox-1.34.1-4.9.1.ppc64le", "SUSE Manager Server 4.1:busybox-1.34.1-4.9.1.s390x", "SUSE Manager Server 4.1:busybox-1.34.1-4.9.1.x86_64", "SUSE Manager Server 4.1:busybox-static-1.34.1-4.9.1.ppc64le", "SUSE Manager Server 4.1:busybox-static-1.34.1-4.9.1.s390x", "SUSE Manager Server 4.1:busybox-static-1.34.1-4.9.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2022-01-20T09:05:15Z", details: "moderate", }, ], title: "CVE-2017-15873", }, { cve: "CVE-2017-15874", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2017-15874", }, ], notes: [ { category: "general", text: "archival/libarchive/decompress_unlzma.c in BusyBox 1.27.2 has an Integer Underflow that leads to a read access violation.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Enterprise Storage 6:busybox-1.34.1-4.9.1.aarch64", "SUSE Enterprise Storage 6:busybox-1.34.1-4.9.1.x86_64", "SUSE Enterprise Storage 6:busybox-static-1.34.1-4.9.1.aarch64", "SUSE Enterprise Storage 6:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Enterprise Storage 7:busybox-1.34.1-4.9.1.aarch64", "SUSE Enterprise Storage 7:busybox-1.34.1-4.9.1.x86_64", "SUSE Enterprise Storage 7:busybox-static-1.34.1-4.9.1.aarch64", "SUSE Enterprise Storage 7:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:busybox-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:busybox-static-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:busybox-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:busybox-static-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:busybox-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:busybox-static-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:busybox-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:busybox-static-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:busybox-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:busybox-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-1.34.1-4.9.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-static-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-static-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-static-1.34.1-4.9.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-1.34.1-4.9.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-static-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-static-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-static-1.34.1-4.9.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-1.34.1-4.9.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-static-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-static-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-static-1.34.1-4.9.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:busybox-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:busybox-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:busybox-1.34.1-4.9.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:busybox-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:busybox-static-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:busybox-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:busybox-static-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:busybox-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:busybox-1.34.1-4.9.1.x86_64", "SUSE Manager Proxy 4.1:busybox-1.34.1-4.9.1.x86_64", "SUSE Manager Proxy 4.1:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Manager Retail Branch Server 4.1:busybox-1.34.1-4.9.1.x86_64", "SUSE Manager Retail Branch Server 4.1:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Manager Server 4.1:busybox-1.34.1-4.9.1.ppc64le", "SUSE Manager Server 4.1:busybox-1.34.1-4.9.1.s390x", "SUSE Manager Server 4.1:busybox-1.34.1-4.9.1.x86_64", "SUSE Manager Server 4.1:busybox-static-1.34.1-4.9.1.ppc64le", "SUSE Manager Server 4.1:busybox-static-1.34.1-4.9.1.s390x", "SUSE Manager Server 4.1:busybox-static-1.34.1-4.9.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2017-15874", url: "https://www.suse.com/security/cve/CVE-2017-15874", }, { category: "external", summary: "SUSE Bug 1064978 for CVE-2017-15874", url: "https://bugzilla.suse.com/1064978", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Enterprise Storage 6:busybox-1.34.1-4.9.1.aarch64", "SUSE Enterprise Storage 6:busybox-1.34.1-4.9.1.x86_64", "SUSE Enterprise Storage 6:busybox-static-1.34.1-4.9.1.aarch64", "SUSE Enterprise Storage 6:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Enterprise Storage 7:busybox-1.34.1-4.9.1.aarch64", "SUSE Enterprise Storage 7:busybox-1.34.1-4.9.1.x86_64", "SUSE Enterprise Storage 7:busybox-static-1.34.1-4.9.1.aarch64", "SUSE Enterprise Storage 7:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:busybox-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:busybox-static-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:busybox-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:busybox-static-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:busybox-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:busybox-static-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:busybox-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:busybox-static-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:busybox-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:busybox-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-1.34.1-4.9.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-static-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-static-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-static-1.34.1-4.9.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-1.34.1-4.9.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-static-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-static-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-static-1.34.1-4.9.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-1.34.1-4.9.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-static-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-static-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-static-1.34.1-4.9.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:busybox-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:busybox-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:busybox-1.34.1-4.9.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:busybox-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:busybox-static-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:busybox-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:busybox-static-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:busybox-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:busybox-1.34.1-4.9.1.x86_64", "SUSE Manager Proxy 4.1:busybox-1.34.1-4.9.1.x86_64", "SUSE Manager Proxy 4.1:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Manager Retail Branch Server 4.1:busybox-1.34.1-4.9.1.x86_64", "SUSE Manager Retail Branch Server 4.1:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Manager Server 4.1:busybox-1.34.1-4.9.1.ppc64le", "SUSE Manager Server 4.1:busybox-1.34.1-4.9.1.s390x", "SUSE Manager Server 4.1:busybox-1.34.1-4.9.1.x86_64", "SUSE Manager Server 4.1:busybox-static-1.34.1-4.9.1.ppc64le", "SUSE Manager Server 4.1:busybox-static-1.34.1-4.9.1.s390x", "SUSE Manager Server 4.1:busybox-static-1.34.1-4.9.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 3.3, baseSeverity: "LOW", vectorString: "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L", version: "3.0", }, products: [ "SUSE Enterprise Storage 6:busybox-1.34.1-4.9.1.aarch64", "SUSE Enterprise Storage 6:busybox-1.34.1-4.9.1.x86_64", "SUSE Enterprise Storage 6:busybox-static-1.34.1-4.9.1.aarch64", "SUSE Enterprise Storage 6:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Enterprise Storage 7:busybox-1.34.1-4.9.1.aarch64", "SUSE Enterprise Storage 7:busybox-1.34.1-4.9.1.x86_64", "SUSE Enterprise Storage 7:busybox-static-1.34.1-4.9.1.aarch64", "SUSE Enterprise Storage 7:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:busybox-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:busybox-static-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:busybox-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:busybox-static-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:busybox-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:busybox-static-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:busybox-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:busybox-static-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:busybox-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:busybox-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-1.34.1-4.9.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-static-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-static-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-static-1.34.1-4.9.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-1.34.1-4.9.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-static-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-static-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-static-1.34.1-4.9.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-1.34.1-4.9.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-static-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-static-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-static-1.34.1-4.9.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:busybox-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:busybox-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:busybox-1.34.1-4.9.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:busybox-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:busybox-static-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:busybox-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:busybox-static-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:busybox-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:busybox-1.34.1-4.9.1.x86_64", "SUSE Manager Proxy 4.1:busybox-1.34.1-4.9.1.x86_64", "SUSE Manager Proxy 4.1:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Manager Retail Branch Server 4.1:busybox-1.34.1-4.9.1.x86_64", "SUSE Manager Retail Branch Server 4.1:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Manager Server 4.1:busybox-1.34.1-4.9.1.ppc64le", "SUSE Manager Server 4.1:busybox-1.34.1-4.9.1.s390x", "SUSE Manager Server 4.1:busybox-1.34.1-4.9.1.x86_64", "SUSE Manager Server 4.1:busybox-static-1.34.1-4.9.1.ppc64le", "SUSE Manager Server 4.1:busybox-static-1.34.1-4.9.1.s390x", "SUSE Manager Server 4.1:busybox-static-1.34.1-4.9.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2022-01-20T09:05:15Z", details: "low", }, ], title: "CVE-2017-15874", }, { cve: "CVE-2017-16544", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2017-16544", }, ], notes: [ { category: "general", text: "In the add_match function in libbb/lineedit.c in BusyBox through 1.27.2, the tab autocomplete feature of the shell, used to get a list of filenames in a directory, does not sanitize filenames and results in executing any escape sequence in the terminal. This could potentially result in code execution, arbitrary file writes, or other attacks.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Enterprise Storage 6:busybox-1.34.1-4.9.1.aarch64", "SUSE Enterprise Storage 6:busybox-1.34.1-4.9.1.x86_64", "SUSE Enterprise Storage 6:busybox-static-1.34.1-4.9.1.aarch64", "SUSE Enterprise Storage 6:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Enterprise Storage 7:busybox-1.34.1-4.9.1.aarch64", "SUSE Enterprise Storage 7:busybox-1.34.1-4.9.1.x86_64", "SUSE Enterprise Storage 7:busybox-static-1.34.1-4.9.1.aarch64", "SUSE Enterprise Storage 7:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:busybox-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:busybox-static-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:busybox-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:busybox-static-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:busybox-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:busybox-static-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:busybox-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:busybox-static-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:busybox-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:busybox-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-1.34.1-4.9.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-static-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-static-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-static-1.34.1-4.9.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-1.34.1-4.9.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-static-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-static-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-static-1.34.1-4.9.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-1.34.1-4.9.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-static-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-static-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-static-1.34.1-4.9.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:busybox-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:busybox-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:busybox-1.34.1-4.9.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:busybox-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:busybox-static-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:busybox-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:busybox-static-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:busybox-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:busybox-1.34.1-4.9.1.x86_64", "SUSE Manager Proxy 4.1:busybox-1.34.1-4.9.1.x86_64", "SUSE Manager Proxy 4.1:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Manager Retail Branch Server 4.1:busybox-1.34.1-4.9.1.x86_64", "SUSE Manager Retail Branch Server 4.1:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Manager Server 4.1:busybox-1.34.1-4.9.1.ppc64le", "SUSE Manager Server 4.1:busybox-1.34.1-4.9.1.s390x", "SUSE Manager Server 4.1:busybox-1.34.1-4.9.1.x86_64", "SUSE Manager Server 4.1:busybox-static-1.34.1-4.9.1.ppc64le", "SUSE Manager Server 4.1:busybox-static-1.34.1-4.9.1.s390x", "SUSE Manager Server 4.1:busybox-static-1.34.1-4.9.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2017-16544", url: "https://www.suse.com/security/cve/CVE-2017-16544", }, { category: "external", summary: "SUSE Bug 1069412 for CVE-2017-16544", url: "https://bugzilla.suse.com/1069412", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Enterprise Storage 6:busybox-1.34.1-4.9.1.aarch64", "SUSE Enterprise Storage 6:busybox-1.34.1-4.9.1.x86_64", "SUSE Enterprise Storage 6:busybox-static-1.34.1-4.9.1.aarch64", "SUSE Enterprise Storage 6:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Enterprise Storage 7:busybox-1.34.1-4.9.1.aarch64", "SUSE Enterprise Storage 7:busybox-1.34.1-4.9.1.x86_64", "SUSE Enterprise Storage 7:busybox-static-1.34.1-4.9.1.aarch64", "SUSE Enterprise Storage 7:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:busybox-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:busybox-static-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:busybox-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:busybox-static-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:busybox-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:busybox-static-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:busybox-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:busybox-static-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:busybox-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:busybox-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-1.34.1-4.9.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-static-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-static-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-static-1.34.1-4.9.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-1.34.1-4.9.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-static-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-static-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-static-1.34.1-4.9.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-1.34.1-4.9.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-static-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-static-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-static-1.34.1-4.9.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:busybox-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:busybox-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:busybox-1.34.1-4.9.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:busybox-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:busybox-static-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:busybox-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:busybox-static-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:busybox-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:busybox-1.34.1-4.9.1.x86_64", "SUSE Manager Proxy 4.1:busybox-1.34.1-4.9.1.x86_64", "SUSE Manager Proxy 4.1:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Manager Retail Branch Server 4.1:busybox-1.34.1-4.9.1.x86_64", "SUSE Manager Retail Branch Server 4.1:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Manager Server 4.1:busybox-1.34.1-4.9.1.ppc64le", "SUSE Manager Server 4.1:busybox-1.34.1-4.9.1.s390x", "SUSE Manager Server 4.1:busybox-1.34.1-4.9.1.x86_64", "SUSE Manager Server 4.1:busybox-static-1.34.1-4.9.1.ppc64le", "SUSE Manager Server 4.1:busybox-static-1.34.1-4.9.1.s390x", "SUSE Manager Server 4.1:busybox-static-1.34.1-4.9.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 7.8, baseSeverity: "HIGH", vectorString: "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", version: "3.0", }, products: [ "SUSE Enterprise Storage 6:busybox-1.34.1-4.9.1.aarch64", "SUSE Enterprise Storage 6:busybox-1.34.1-4.9.1.x86_64", "SUSE Enterprise Storage 6:busybox-static-1.34.1-4.9.1.aarch64", "SUSE Enterprise Storage 6:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Enterprise Storage 7:busybox-1.34.1-4.9.1.aarch64", "SUSE Enterprise Storage 7:busybox-1.34.1-4.9.1.x86_64", "SUSE Enterprise Storage 7:busybox-static-1.34.1-4.9.1.aarch64", "SUSE Enterprise Storage 7:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:busybox-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:busybox-static-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:busybox-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:busybox-static-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:busybox-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:busybox-static-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:busybox-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:busybox-static-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:busybox-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:busybox-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-1.34.1-4.9.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-static-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-static-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-static-1.34.1-4.9.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-1.34.1-4.9.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-static-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-static-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-static-1.34.1-4.9.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-1.34.1-4.9.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-static-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-static-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-static-1.34.1-4.9.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:busybox-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:busybox-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:busybox-1.34.1-4.9.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:busybox-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:busybox-static-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:busybox-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:busybox-static-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:busybox-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:busybox-1.34.1-4.9.1.x86_64", "SUSE Manager Proxy 4.1:busybox-1.34.1-4.9.1.x86_64", "SUSE Manager Proxy 4.1:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Manager Retail Branch Server 4.1:busybox-1.34.1-4.9.1.x86_64", "SUSE Manager Retail Branch Server 4.1:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Manager Server 4.1:busybox-1.34.1-4.9.1.ppc64le", "SUSE Manager Server 4.1:busybox-1.34.1-4.9.1.s390x", "SUSE Manager Server 4.1:busybox-1.34.1-4.9.1.x86_64", "SUSE Manager Server 4.1:busybox-static-1.34.1-4.9.1.ppc64le", "SUSE Manager Server 4.1:busybox-static-1.34.1-4.9.1.s390x", "SUSE Manager Server 4.1:busybox-static-1.34.1-4.9.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2022-01-20T09:05:15Z", details: "important", }, ], title: "CVE-2017-16544", }, { cve: "CVE-2018-1000500", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2018-1000500", }, ], notes: [ { category: "general", text: "Busybox contains a Missing SSL certificate validation vulnerability in The \"busybox wget\" applet that can result in arbitrary code execution. This attack appear to be exploitable via Simply download any file over HTTPS using \"busybox wget https://compromised-domain.com/important-file\".", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Enterprise Storage 6:busybox-1.34.1-4.9.1.aarch64", "SUSE Enterprise Storage 6:busybox-1.34.1-4.9.1.x86_64", "SUSE Enterprise Storage 6:busybox-static-1.34.1-4.9.1.aarch64", "SUSE Enterprise Storage 6:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Enterprise Storage 7:busybox-1.34.1-4.9.1.aarch64", "SUSE Enterprise Storage 7:busybox-1.34.1-4.9.1.x86_64", "SUSE Enterprise Storage 7:busybox-static-1.34.1-4.9.1.aarch64", "SUSE Enterprise Storage 7:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:busybox-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:busybox-static-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:busybox-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:busybox-static-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:busybox-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:busybox-static-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:busybox-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:busybox-static-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:busybox-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:busybox-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-1.34.1-4.9.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-static-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-static-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-static-1.34.1-4.9.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-1.34.1-4.9.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-static-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-static-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-static-1.34.1-4.9.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-1.34.1-4.9.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-static-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-static-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-static-1.34.1-4.9.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:busybox-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:busybox-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:busybox-1.34.1-4.9.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:busybox-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:busybox-static-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:busybox-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:busybox-static-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:busybox-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:busybox-1.34.1-4.9.1.x86_64", "SUSE Manager Proxy 4.1:busybox-1.34.1-4.9.1.x86_64", "SUSE Manager Proxy 4.1:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Manager Retail Branch Server 4.1:busybox-1.34.1-4.9.1.x86_64", "SUSE Manager Retail Branch Server 4.1:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Manager Server 4.1:busybox-1.34.1-4.9.1.ppc64le", "SUSE Manager Server 4.1:busybox-1.34.1-4.9.1.s390x", "SUSE Manager Server 4.1:busybox-1.34.1-4.9.1.x86_64", "SUSE Manager Server 4.1:busybox-static-1.34.1-4.9.1.ppc64le", "SUSE Manager Server 4.1:busybox-static-1.34.1-4.9.1.s390x", "SUSE Manager Server 4.1:busybox-static-1.34.1-4.9.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2018-1000500", url: "https://www.suse.com/security/cve/CVE-2018-1000500", }, { category: "external", summary: "SUSE Bug 1099263 for CVE-2018-1000500", url: "https://bugzilla.suse.com/1099263", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Enterprise Storage 6:busybox-1.34.1-4.9.1.aarch64", "SUSE Enterprise Storage 6:busybox-1.34.1-4.9.1.x86_64", "SUSE Enterprise Storage 6:busybox-static-1.34.1-4.9.1.aarch64", "SUSE Enterprise Storage 6:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Enterprise Storage 7:busybox-1.34.1-4.9.1.aarch64", "SUSE Enterprise Storage 7:busybox-1.34.1-4.9.1.x86_64", "SUSE Enterprise Storage 7:busybox-static-1.34.1-4.9.1.aarch64", "SUSE Enterprise Storage 7:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:busybox-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:busybox-static-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:busybox-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:busybox-static-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:busybox-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:busybox-static-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:busybox-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:busybox-static-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:busybox-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:busybox-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-1.34.1-4.9.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-static-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-static-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-static-1.34.1-4.9.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-1.34.1-4.9.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-static-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-static-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-static-1.34.1-4.9.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-1.34.1-4.9.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-static-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-static-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-static-1.34.1-4.9.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:busybox-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:busybox-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:busybox-1.34.1-4.9.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:busybox-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:busybox-static-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:busybox-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:busybox-static-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:busybox-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:busybox-1.34.1-4.9.1.x86_64", "SUSE Manager Proxy 4.1:busybox-1.34.1-4.9.1.x86_64", "SUSE Manager Proxy 4.1:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Manager Retail Branch Server 4.1:busybox-1.34.1-4.9.1.x86_64", "SUSE Manager Retail Branch Server 4.1:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Manager Server 4.1:busybox-1.34.1-4.9.1.ppc64le", "SUSE Manager Server 4.1:busybox-1.34.1-4.9.1.s390x", "SUSE Manager Server 4.1:busybox-1.34.1-4.9.1.x86_64", "SUSE Manager Server 4.1:busybox-static-1.34.1-4.9.1.ppc64le", "SUSE Manager Server 4.1:busybox-static-1.34.1-4.9.1.s390x", "SUSE Manager Server 4.1:busybox-static-1.34.1-4.9.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 7.5, baseSeverity: "HIGH", vectorString: "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N", version: "3.0", }, products: [ "SUSE Enterprise Storage 6:busybox-1.34.1-4.9.1.aarch64", "SUSE Enterprise Storage 6:busybox-1.34.1-4.9.1.x86_64", "SUSE Enterprise Storage 6:busybox-static-1.34.1-4.9.1.aarch64", "SUSE Enterprise Storage 6:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Enterprise Storage 7:busybox-1.34.1-4.9.1.aarch64", "SUSE Enterprise Storage 7:busybox-1.34.1-4.9.1.x86_64", "SUSE Enterprise Storage 7:busybox-static-1.34.1-4.9.1.aarch64", "SUSE Enterprise Storage 7:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:busybox-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:busybox-static-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:busybox-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:busybox-static-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:busybox-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:busybox-static-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:busybox-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:busybox-static-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:busybox-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:busybox-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-1.34.1-4.9.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-static-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-static-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-static-1.34.1-4.9.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-1.34.1-4.9.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-static-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-static-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-static-1.34.1-4.9.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-1.34.1-4.9.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-static-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-static-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-static-1.34.1-4.9.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:busybox-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:busybox-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:busybox-1.34.1-4.9.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:busybox-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:busybox-static-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:busybox-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:busybox-static-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:busybox-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:busybox-1.34.1-4.9.1.x86_64", "SUSE Manager Proxy 4.1:busybox-1.34.1-4.9.1.x86_64", "SUSE Manager Proxy 4.1:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Manager Retail Branch Server 4.1:busybox-1.34.1-4.9.1.x86_64", "SUSE Manager Retail Branch Server 4.1:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Manager Server 4.1:busybox-1.34.1-4.9.1.ppc64le", "SUSE Manager Server 4.1:busybox-1.34.1-4.9.1.s390x", "SUSE Manager Server 4.1:busybox-1.34.1-4.9.1.x86_64", "SUSE Manager Server 4.1:busybox-static-1.34.1-4.9.1.ppc64le", "SUSE Manager Server 4.1:busybox-static-1.34.1-4.9.1.s390x", "SUSE Manager Server 4.1:busybox-static-1.34.1-4.9.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2022-01-20T09:05:15Z", details: "important", }, ], title: "CVE-2018-1000500", }, { cve: "CVE-2018-1000517", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2018-1000517", }, ], notes: [ { category: "general", text: "BusyBox project BusyBox wget version prior to commit 8e2174e9bd836e53c8b9c6e00d1bc6e2a718686e contains a Buffer Overflow vulnerability in Busybox wget that can result in heap buffer overflow. This attack appear to be exploitable via network connectivity. This vulnerability appears to have been fixed in after commit 8e2174e9bd836e53c8b9c6e00d1bc6e2a718686e.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Enterprise Storage 6:busybox-1.34.1-4.9.1.aarch64", "SUSE Enterprise Storage 6:busybox-1.34.1-4.9.1.x86_64", "SUSE Enterprise Storage 6:busybox-static-1.34.1-4.9.1.aarch64", "SUSE Enterprise Storage 6:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Enterprise Storage 7:busybox-1.34.1-4.9.1.aarch64", "SUSE Enterprise Storage 7:busybox-1.34.1-4.9.1.x86_64", "SUSE Enterprise Storage 7:busybox-static-1.34.1-4.9.1.aarch64", "SUSE Enterprise Storage 7:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:busybox-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:busybox-static-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:busybox-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:busybox-static-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:busybox-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:busybox-static-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:busybox-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:busybox-static-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:busybox-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:busybox-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-1.34.1-4.9.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-static-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-static-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-static-1.34.1-4.9.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-1.34.1-4.9.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-static-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-static-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-static-1.34.1-4.9.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-1.34.1-4.9.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-static-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-static-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-static-1.34.1-4.9.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:busybox-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:busybox-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:busybox-1.34.1-4.9.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:busybox-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:busybox-static-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:busybox-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:busybox-static-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:busybox-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:busybox-1.34.1-4.9.1.x86_64", "SUSE Manager Proxy 4.1:busybox-1.34.1-4.9.1.x86_64", "SUSE Manager Proxy 4.1:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Manager Retail Branch Server 4.1:busybox-1.34.1-4.9.1.x86_64", "SUSE Manager Retail Branch Server 4.1:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Manager Server 4.1:busybox-1.34.1-4.9.1.ppc64le", "SUSE Manager Server 4.1:busybox-1.34.1-4.9.1.s390x", "SUSE Manager Server 4.1:busybox-1.34.1-4.9.1.x86_64", "SUSE Manager Server 4.1:busybox-static-1.34.1-4.9.1.ppc64le", "SUSE Manager Server 4.1:busybox-static-1.34.1-4.9.1.s390x", "SUSE Manager Server 4.1:busybox-static-1.34.1-4.9.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2018-1000517", url: "https://www.suse.com/security/cve/CVE-2018-1000517", }, { category: "external", summary: "SUSE Bug 1099260 for CVE-2018-1000517", url: "https://bugzilla.suse.com/1099260", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Enterprise Storage 6:busybox-1.34.1-4.9.1.aarch64", "SUSE Enterprise Storage 6:busybox-1.34.1-4.9.1.x86_64", "SUSE Enterprise Storage 6:busybox-static-1.34.1-4.9.1.aarch64", "SUSE Enterprise Storage 6:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Enterprise Storage 7:busybox-1.34.1-4.9.1.aarch64", "SUSE Enterprise Storage 7:busybox-1.34.1-4.9.1.x86_64", "SUSE Enterprise Storage 7:busybox-static-1.34.1-4.9.1.aarch64", "SUSE Enterprise Storage 7:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:busybox-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:busybox-static-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:busybox-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:busybox-static-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:busybox-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:busybox-static-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:busybox-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:busybox-static-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:busybox-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:busybox-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-1.34.1-4.9.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-static-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-static-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-static-1.34.1-4.9.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-1.34.1-4.9.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-static-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-static-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-static-1.34.1-4.9.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-1.34.1-4.9.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-static-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-static-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-static-1.34.1-4.9.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:busybox-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:busybox-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:busybox-1.34.1-4.9.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:busybox-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:busybox-static-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:busybox-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:busybox-static-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:busybox-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:busybox-1.34.1-4.9.1.x86_64", "SUSE Manager Proxy 4.1:busybox-1.34.1-4.9.1.x86_64", "SUSE Manager Proxy 4.1:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Manager Retail Branch Server 4.1:busybox-1.34.1-4.9.1.x86_64", "SUSE Manager Retail Branch Server 4.1:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Manager Server 4.1:busybox-1.34.1-4.9.1.ppc64le", "SUSE Manager Server 4.1:busybox-1.34.1-4.9.1.s390x", "SUSE Manager Server 4.1:busybox-1.34.1-4.9.1.x86_64", "SUSE Manager Server 4.1:busybox-static-1.34.1-4.9.1.ppc64le", "SUSE Manager Server 4.1:busybox-static-1.34.1-4.9.1.s390x", "SUSE Manager Server 4.1:busybox-static-1.34.1-4.9.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.6, baseSeverity: "MEDIUM", vectorString: "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L", version: "3.0", }, products: [ "SUSE Enterprise Storage 6:busybox-1.34.1-4.9.1.aarch64", "SUSE Enterprise Storage 6:busybox-1.34.1-4.9.1.x86_64", "SUSE Enterprise Storage 6:busybox-static-1.34.1-4.9.1.aarch64", "SUSE Enterprise Storage 6:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Enterprise Storage 7:busybox-1.34.1-4.9.1.aarch64", "SUSE Enterprise Storage 7:busybox-1.34.1-4.9.1.x86_64", "SUSE Enterprise Storage 7:busybox-static-1.34.1-4.9.1.aarch64", "SUSE Enterprise Storage 7:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:busybox-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:busybox-static-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:busybox-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:busybox-static-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:busybox-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:busybox-static-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:busybox-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:busybox-static-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:busybox-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:busybox-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-1.34.1-4.9.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-static-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-static-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-static-1.34.1-4.9.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-1.34.1-4.9.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-static-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-static-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-static-1.34.1-4.9.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-1.34.1-4.9.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-static-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-static-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-static-1.34.1-4.9.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:busybox-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:busybox-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:busybox-1.34.1-4.9.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:busybox-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:busybox-static-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:busybox-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:busybox-static-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:busybox-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:busybox-1.34.1-4.9.1.x86_64", "SUSE Manager Proxy 4.1:busybox-1.34.1-4.9.1.x86_64", "SUSE Manager Proxy 4.1:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Manager Retail Branch Server 4.1:busybox-1.34.1-4.9.1.x86_64", "SUSE Manager Retail Branch Server 4.1:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Manager Server 4.1:busybox-1.34.1-4.9.1.ppc64le", "SUSE Manager Server 4.1:busybox-1.34.1-4.9.1.s390x", "SUSE Manager Server 4.1:busybox-1.34.1-4.9.1.x86_64", "SUSE Manager Server 4.1:busybox-static-1.34.1-4.9.1.ppc64le", "SUSE Manager Server 4.1:busybox-static-1.34.1-4.9.1.s390x", "SUSE Manager Server 4.1:busybox-static-1.34.1-4.9.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2022-01-20T09:05:15Z", details: "important", }, ], title: "CVE-2018-1000517", }, { cve: "CVE-2018-20679", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2018-20679", }, ], notes: [ { category: "general", text: "An issue was discovered in BusyBox before 1.30.0. An out of bounds read in udhcp components (consumed by the DHCP server, client, and relay) allows a remote attacker to leak sensitive information from the stack by sending a crafted DHCP message. This is related to verification in udhcp_get_option() in networking/udhcp/common.c that 4-byte options are indeed 4 bytes.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Enterprise Storage 6:busybox-1.34.1-4.9.1.aarch64", "SUSE Enterprise Storage 6:busybox-1.34.1-4.9.1.x86_64", "SUSE Enterprise Storage 6:busybox-static-1.34.1-4.9.1.aarch64", "SUSE Enterprise Storage 6:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Enterprise Storage 7:busybox-1.34.1-4.9.1.aarch64", "SUSE Enterprise Storage 7:busybox-1.34.1-4.9.1.x86_64", "SUSE Enterprise Storage 7:busybox-static-1.34.1-4.9.1.aarch64", "SUSE Enterprise Storage 7:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:busybox-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:busybox-static-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:busybox-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:busybox-static-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:busybox-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:busybox-static-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:busybox-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:busybox-static-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:busybox-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:busybox-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-1.34.1-4.9.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-static-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-static-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-static-1.34.1-4.9.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-1.34.1-4.9.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-static-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-static-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-static-1.34.1-4.9.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-1.34.1-4.9.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-static-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-static-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-static-1.34.1-4.9.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:busybox-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:busybox-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:busybox-1.34.1-4.9.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:busybox-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:busybox-static-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:busybox-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:busybox-static-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:busybox-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:busybox-1.34.1-4.9.1.x86_64", "SUSE Manager Proxy 4.1:busybox-1.34.1-4.9.1.x86_64", "SUSE Manager Proxy 4.1:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Manager Retail Branch Server 4.1:busybox-1.34.1-4.9.1.x86_64", "SUSE Manager Retail Branch Server 4.1:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Manager Server 4.1:busybox-1.34.1-4.9.1.ppc64le", "SUSE Manager Server 4.1:busybox-1.34.1-4.9.1.s390x", "SUSE Manager Server 4.1:busybox-1.34.1-4.9.1.x86_64", "SUSE Manager Server 4.1:busybox-static-1.34.1-4.9.1.ppc64le", "SUSE Manager Server 4.1:busybox-static-1.34.1-4.9.1.s390x", "SUSE Manager Server 4.1:busybox-static-1.34.1-4.9.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2018-20679", url: "https://www.suse.com/security/cve/CVE-2018-20679", }, { category: "external", summary: "SUSE Bug 1121426 for CVE-2018-20679", url: "https://bugzilla.suse.com/1121426", }, { category: "external", summary: "SUSE Bug 1121428 for CVE-2018-20679", url: "https://bugzilla.suse.com/1121428", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Enterprise Storage 6:busybox-1.34.1-4.9.1.aarch64", "SUSE Enterprise Storage 6:busybox-1.34.1-4.9.1.x86_64", "SUSE Enterprise Storage 6:busybox-static-1.34.1-4.9.1.aarch64", "SUSE Enterprise Storage 6:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Enterprise Storage 7:busybox-1.34.1-4.9.1.aarch64", "SUSE Enterprise Storage 7:busybox-1.34.1-4.9.1.x86_64", "SUSE Enterprise Storage 7:busybox-static-1.34.1-4.9.1.aarch64", "SUSE Enterprise Storage 7:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:busybox-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:busybox-static-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:busybox-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:busybox-static-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:busybox-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:busybox-static-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:busybox-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:busybox-static-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:busybox-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:busybox-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-1.34.1-4.9.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-static-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-static-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-static-1.34.1-4.9.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-1.34.1-4.9.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-static-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-static-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-static-1.34.1-4.9.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-1.34.1-4.9.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-static-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-static-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-static-1.34.1-4.9.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:busybox-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:busybox-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:busybox-1.34.1-4.9.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:busybox-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:busybox-static-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:busybox-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:busybox-static-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:busybox-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:busybox-1.34.1-4.9.1.x86_64", "SUSE Manager Proxy 4.1:busybox-1.34.1-4.9.1.x86_64", "SUSE Manager Proxy 4.1:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Manager Retail Branch Server 4.1:busybox-1.34.1-4.9.1.x86_64", "SUSE Manager Retail Branch Server 4.1:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Manager Server 4.1:busybox-1.34.1-4.9.1.ppc64le", "SUSE Manager Server 4.1:busybox-1.34.1-4.9.1.s390x", "SUSE Manager Server 4.1:busybox-1.34.1-4.9.1.x86_64", "SUSE Manager Server 4.1:busybox-static-1.34.1-4.9.1.ppc64le", "SUSE Manager Server 4.1:busybox-static-1.34.1-4.9.1.s390x", "SUSE Manager Server 4.1:busybox-static-1.34.1-4.9.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.3, baseSeverity: "MEDIUM", vectorString: "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N", version: "3.0", }, products: [ "SUSE Enterprise Storage 6:busybox-1.34.1-4.9.1.aarch64", "SUSE Enterprise Storage 6:busybox-1.34.1-4.9.1.x86_64", "SUSE Enterprise Storage 6:busybox-static-1.34.1-4.9.1.aarch64", "SUSE Enterprise Storage 6:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Enterprise Storage 7:busybox-1.34.1-4.9.1.aarch64", "SUSE Enterprise Storage 7:busybox-1.34.1-4.9.1.x86_64", "SUSE Enterprise Storage 7:busybox-static-1.34.1-4.9.1.aarch64", "SUSE Enterprise Storage 7:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:busybox-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:busybox-static-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:busybox-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:busybox-static-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:busybox-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:busybox-static-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:busybox-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:busybox-static-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:busybox-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:busybox-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-1.34.1-4.9.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-static-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-static-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-static-1.34.1-4.9.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-1.34.1-4.9.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-static-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-static-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-static-1.34.1-4.9.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-1.34.1-4.9.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-static-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-static-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-static-1.34.1-4.9.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:busybox-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:busybox-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:busybox-1.34.1-4.9.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:busybox-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:busybox-static-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:busybox-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:busybox-static-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:busybox-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:busybox-1.34.1-4.9.1.x86_64", "SUSE Manager Proxy 4.1:busybox-1.34.1-4.9.1.x86_64", "SUSE Manager Proxy 4.1:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Manager Retail Branch Server 4.1:busybox-1.34.1-4.9.1.x86_64", "SUSE Manager Retail Branch Server 4.1:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Manager Server 4.1:busybox-1.34.1-4.9.1.ppc64le", "SUSE Manager Server 4.1:busybox-1.34.1-4.9.1.s390x", "SUSE Manager Server 4.1:busybox-1.34.1-4.9.1.x86_64", "SUSE Manager Server 4.1:busybox-static-1.34.1-4.9.1.ppc64le", "SUSE Manager Server 4.1:busybox-static-1.34.1-4.9.1.s390x", "SUSE Manager Server 4.1:busybox-static-1.34.1-4.9.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2022-01-20T09:05:15Z", details: "moderate", }, ], title: "CVE-2018-20679", }, { cve: "CVE-2019-5747", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2019-5747", }, ], notes: [ { category: "general", text: "An issue was discovered in BusyBox through 1.30.0. An out of bounds read in udhcp components (consumed by the DHCP client, server, and/or relay) might allow a remote attacker to leak sensitive information from the stack by sending a crafted DHCP message. This is related to assurance of a 4-byte length when decoding DHCP_SUBNET. NOTE: this issue exists because of an incomplete fix for CVE-2018-20679.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Enterprise Storage 6:busybox-1.34.1-4.9.1.aarch64", "SUSE Enterprise Storage 6:busybox-1.34.1-4.9.1.x86_64", "SUSE Enterprise Storage 6:busybox-static-1.34.1-4.9.1.aarch64", "SUSE Enterprise Storage 6:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Enterprise Storage 7:busybox-1.34.1-4.9.1.aarch64", "SUSE Enterprise Storage 7:busybox-1.34.1-4.9.1.x86_64", "SUSE Enterprise Storage 7:busybox-static-1.34.1-4.9.1.aarch64", "SUSE Enterprise Storage 7:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:busybox-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:busybox-static-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:busybox-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:busybox-static-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:busybox-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:busybox-static-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:busybox-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:busybox-static-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:busybox-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:busybox-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-1.34.1-4.9.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-static-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-static-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-static-1.34.1-4.9.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-1.34.1-4.9.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-static-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-static-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-static-1.34.1-4.9.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-1.34.1-4.9.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-static-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-static-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-static-1.34.1-4.9.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:busybox-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:busybox-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:busybox-1.34.1-4.9.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:busybox-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:busybox-static-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:busybox-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:busybox-static-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:busybox-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:busybox-1.34.1-4.9.1.x86_64", "SUSE Manager Proxy 4.1:busybox-1.34.1-4.9.1.x86_64", "SUSE Manager Proxy 4.1:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Manager Retail Branch Server 4.1:busybox-1.34.1-4.9.1.x86_64", "SUSE Manager Retail Branch Server 4.1:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Manager Server 4.1:busybox-1.34.1-4.9.1.ppc64le", "SUSE Manager Server 4.1:busybox-1.34.1-4.9.1.s390x", "SUSE Manager Server 4.1:busybox-1.34.1-4.9.1.x86_64", "SUSE Manager Server 4.1:busybox-static-1.34.1-4.9.1.ppc64le", "SUSE Manager Server 4.1:busybox-static-1.34.1-4.9.1.s390x", "SUSE Manager Server 4.1:busybox-static-1.34.1-4.9.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2019-5747", url: "https://www.suse.com/security/cve/CVE-2019-5747", }, { category: "external", summary: "SUSE Bug 1121426 for CVE-2019-5747", url: "https://bugzilla.suse.com/1121426", }, { category: "external", summary: "SUSE Bug 1121428 for CVE-2019-5747", url: "https://bugzilla.suse.com/1121428", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Enterprise Storage 6:busybox-1.34.1-4.9.1.aarch64", "SUSE Enterprise Storage 6:busybox-1.34.1-4.9.1.x86_64", "SUSE Enterprise Storage 6:busybox-static-1.34.1-4.9.1.aarch64", "SUSE Enterprise Storage 6:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Enterprise Storage 7:busybox-1.34.1-4.9.1.aarch64", "SUSE Enterprise Storage 7:busybox-1.34.1-4.9.1.x86_64", "SUSE Enterprise Storage 7:busybox-static-1.34.1-4.9.1.aarch64", "SUSE Enterprise Storage 7:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:busybox-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:busybox-static-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:busybox-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:busybox-static-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:busybox-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:busybox-static-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:busybox-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:busybox-static-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:busybox-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:busybox-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-1.34.1-4.9.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-static-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-static-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-static-1.34.1-4.9.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-1.34.1-4.9.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-static-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-static-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-static-1.34.1-4.9.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-1.34.1-4.9.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-static-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-static-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-static-1.34.1-4.9.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:busybox-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:busybox-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:busybox-1.34.1-4.9.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:busybox-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:busybox-static-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:busybox-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:busybox-static-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:busybox-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:busybox-1.34.1-4.9.1.x86_64", "SUSE Manager Proxy 4.1:busybox-1.34.1-4.9.1.x86_64", "SUSE Manager Proxy 4.1:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Manager Retail Branch Server 4.1:busybox-1.34.1-4.9.1.x86_64", "SUSE Manager Retail Branch Server 4.1:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Manager Server 4.1:busybox-1.34.1-4.9.1.ppc64le", "SUSE Manager Server 4.1:busybox-1.34.1-4.9.1.s390x", "SUSE Manager Server 4.1:busybox-1.34.1-4.9.1.x86_64", "SUSE Manager Server 4.1:busybox-static-1.34.1-4.9.1.ppc64le", "SUSE Manager Server 4.1:busybox-static-1.34.1-4.9.1.s390x", "SUSE Manager Server 4.1:busybox-static-1.34.1-4.9.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 3.5, baseSeverity: "LOW", vectorString: "CVSS:3.1/AV:A/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N", version: "3.1", }, products: [ "SUSE Enterprise Storage 6:busybox-1.34.1-4.9.1.aarch64", "SUSE Enterprise Storage 6:busybox-1.34.1-4.9.1.x86_64", "SUSE Enterprise Storage 6:busybox-static-1.34.1-4.9.1.aarch64", "SUSE Enterprise Storage 6:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Enterprise Storage 7:busybox-1.34.1-4.9.1.aarch64", "SUSE Enterprise Storage 7:busybox-1.34.1-4.9.1.x86_64", "SUSE Enterprise Storage 7:busybox-static-1.34.1-4.9.1.aarch64", "SUSE Enterprise Storage 7:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:busybox-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:busybox-static-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:busybox-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:busybox-static-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:busybox-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:busybox-static-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:busybox-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:busybox-static-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:busybox-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:busybox-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-1.34.1-4.9.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-static-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-static-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-static-1.34.1-4.9.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-1.34.1-4.9.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-static-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-static-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-static-1.34.1-4.9.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-1.34.1-4.9.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-static-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-static-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-static-1.34.1-4.9.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:busybox-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:busybox-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:busybox-1.34.1-4.9.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:busybox-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:busybox-static-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:busybox-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:busybox-static-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:busybox-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:busybox-1.34.1-4.9.1.x86_64", "SUSE Manager Proxy 4.1:busybox-1.34.1-4.9.1.x86_64", "SUSE Manager Proxy 4.1:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Manager Retail Branch Server 4.1:busybox-1.34.1-4.9.1.x86_64", "SUSE Manager Retail Branch Server 4.1:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Manager Server 4.1:busybox-1.34.1-4.9.1.ppc64le", "SUSE Manager Server 4.1:busybox-1.34.1-4.9.1.s390x", "SUSE Manager Server 4.1:busybox-1.34.1-4.9.1.x86_64", "SUSE Manager Server 4.1:busybox-static-1.34.1-4.9.1.ppc64le", "SUSE Manager Server 4.1:busybox-static-1.34.1-4.9.1.s390x", "SUSE Manager Server 4.1:busybox-static-1.34.1-4.9.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2022-01-20T09:05:15Z", details: "low", }, ], title: "CVE-2019-5747", }, { cve: "CVE-2021-28831", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2021-28831", }, ], notes: [ { category: "general", text: "decompress_gunzip.c in BusyBox through 1.32.1 mishandles the error bit on the huft_build result pointer, with a resultant invalid free or segmentation fault, via malformed gzip data.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Enterprise Storage 6:busybox-1.34.1-4.9.1.aarch64", "SUSE Enterprise Storage 6:busybox-1.34.1-4.9.1.x86_64", "SUSE Enterprise Storage 6:busybox-static-1.34.1-4.9.1.aarch64", "SUSE Enterprise Storage 6:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Enterprise Storage 7:busybox-1.34.1-4.9.1.aarch64", "SUSE Enterprise Storage 7:busybox-1.34.1-4.9.1.x86_64", "SUSE Enterprise Storage 7:busybox-static-1.34.1-4.9.1.aarch64", "SUSE Enterprise Storage 7:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:busybox-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:busybox-static-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:busybox-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:busybox-static-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:busybox-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:busybox-static-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:busybox-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:busybox-static-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:busybox-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:busybox-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-1.34.1-4.9.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-static-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-static-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-static-1.34.1-4.9.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-1.34.1-4.9.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-static-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-static-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-static-1.34.1-4.9.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-1.34.1-4.9.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-static-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-static-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-static-1.34.1-4.9.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:busybox-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:busybox-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:busybox-1.34.1-4.9.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:busybox-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:busybox-static-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:busybox-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:busybox-static-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:busybox-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:busybox-1.34.1-4.9.1.x86_64", "SUSE Manager Proxy 4.1:busybox-1.34.1-4.9.1.x86_64", "SUSE Manager Proxy 4.1:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Manager Retail Branch Server 4.1:busybox-1.34.1-4.9.1.x86_64", "SUSE Manager Retail Branch Server 4.1:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Manager Server 4.1:busybox-1.34.1-4.9.1.ppc64le", "SUSE Manager Server 4.1:busybox-1.34.1-4.9.1.s390x", "SUSE Manager Server 4.1:busybox-1.34.1-4.9.1.x86_64", "SUSE Manager Server 4.1:busybox-static-1.34.1-4.9.1.ppc64le", "SUSE Manager Server 4.1:busybox-static-1.34.1-4.9.1.s390x", "SUSE Manager Server 4.1:busybox-static-1.34.1-4.9.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2021-28831", url: "https://www.suse.com/security/cve/CVE-2021-28831", }, { category: "external", summary: "SUSE Bug 1184522 for CVE-2021-28831", url: "https://bugzilla.suse.com/1184522", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Enterprise Storage 6:busybox-1.34.1-4.9.1.aarch64", "SUSE Enterprise Storage 6:busybox-1.34.1-4.9.1.x86_64", "SUSE Enterprise Storage 6:busybox-static-1.34.1-4.9.1.aarch64", "SUSE Enterprise Storage 6:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Enterprise Storage 7:busybox-1.34.1-4.9.1.aarch64", "SUSE Enterprise Storage 7:busybox-1.34.1-4.9.1.x86_64", "SUSE Enterprise Storage 7:busybox-static-1.34.1-4.9.1.aarch64", "SUSE Enterprise Storage 7:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:busybox-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:busybox-static-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:busybox-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:busybox-static-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:busybox-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:busybox-static-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:busybox-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:busybox-static-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:busybox-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:busybox-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-1.34.1-4.9.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-static-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-static-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-static-1.34.1-4.9.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-1.34.1-4.9.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-static-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-static-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-static-1.34.1-4.9.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-1.34.1-4.9.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-static-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-static-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-static-1.34.1-4.9.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:busybox-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:busybox-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:busybox-1.34.1-4.9.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:busybox-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:busybox-static-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:busybox-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:busybox-static-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:busybox-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:busybox-1.34.1-4.9.1.x86_64", "SUSE Manager Proxy 4.1:busybox-1.34.1-4.9.1.x86_64", "SUSE Manager Proxy 4.1:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Manager Retail Branch Server 4.1:busybox-1.34.1-4.9.1.x86_64", "SUSE Manager Retail Branch Server 4.1:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Manager Server 4.1:busybox-1.34.1-4.9.1.ppc64le", "SUSE Manager Server 4.1:busybox-1.34.1-4.9.1.s390x", "SUSE Manager Server 4.1:busybox-1.34.1-4.9.1.x86_64", "SUSE Manager Server 4.1:busybox-static-1.34.1-4.9.1.ppc64le", "SUSE Manager Server 4.1:busybox-static-1.34.1-4.9.1.s390x", "SUSE Manager Server 4.1:busybox-static-1.34.1-4.9.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 7.5, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "SUSE Enterprise Storage 6:busybox-1.34.1-4.9.1.aarch64", "SUSE Enterprise Storage 6:busybox-1.34.1-4.9.1.x86_64", "SUSE Enterprise Storage 6:busybox-static-1.34.1-4.9.1.aarch64", "SUSE Enterprise Storage 6:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Enterprise Storage 7:busybox-1.34.1-4.9.1.aarch64", "SUSE Enterprise Storage 7:busybox-1.34.1-4.9.1.x86_64", "SUSE Enterprise Storage 7:busybox-static-1.34.1-4.9.1.aarch64", "SUSE Enterprise Storage 7:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:busybox-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:busybox-static-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:busybox-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:busybox-static-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:busybox-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:busybox-static-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:busybox-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:busybox-static-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:busybox-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:busybox-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-1.34.1-4.9.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-static-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-static-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-static-1.34.1-4.9.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-1.34.1-4.9.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-static-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-static-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-static-1.34.1-4.9.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-1.34.1-4.9.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-static-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-static-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-static-1.34.1-4.9.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:busybox-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:busybox-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:busybox-1.34.1-4.9.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:busybox-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:busybox-static-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:busybox-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:busybox-static-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:busybox-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:busybox-1.34.1-4.9.1.x86_64", "SUSE Manager Proxy 4.1:busybox-1.34.1-4.9.1.x86_64", "SUSE Manager Proxy 4.1:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Manager Retail Branch Server 4.1:busybox-1.34.1-4.9.1.x86_64", "SUSE Manager Retail Branch Server 4.1:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Manager Server 4.1:busybox-1.34.1-4.9.1.ppc64le", "SUSE Manager Server 4.1:busybox-1.34.1-4.9.1.s390x", "SUSE Manager Server 4.1:busybox-1.34.1-4.9.1.x86_64", "SUSE Manager Server 4.1:busybox-static-1.34.1-4.9.1.ppc64le", "SUSE Manager Server 4.1:busybox-static-1.34.1-4.9.1.s390x", "SUSE Manager Server 4.1:busybox-static-1.34.1-4.9.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2022-01-20T09:05:15Z", details: "important", }, ], title: "CVE-2021-28831", }, { cve: "CVE-2021-42373", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2021-42373", }, ], notes: [ { category: "general", text: "A NULL pointer dereference in Busybox's man applet leads to denial of service when a section name is supplied but no page argument is given", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Enterprise Storage 6:busybox-1.34.1-4.9.1.aarch64", "SUSE Enterprise Storage 6:busybox-1.34.1-4.9.1.x86_64", "SUSE Enterprise Storage 6:busybox-static-1.34.1-4.9.1.aarch64", "SUSE Enterprise Storage 6:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Enterprise Storage 7:busybox-1.34.1-4.9.1.aarch64", "SUSE Enterprise Storage 7:busybox-1.34.1-4.9.1.x86_64", "SUSE Enterprise Storage 7:busybox-static-1.34.1-4.9.1.aarch64", "SUSE Enterprise Storage 7:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:busybox-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:busybox-static-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:busybox-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:busybox-static-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:busybox-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:busybox-static-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:busybox-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:busybox-static-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:busybox-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:busybox-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-1.34.1-4.9.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-static-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-static-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-static-1.34.1-4.9.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-1.34.1-4.9.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-static-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-static-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-static-1.34.1-4.9.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-1.34.1-4.9.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-static-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-static-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-static-1.34.1-4.9.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:busybox-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:busybox-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:busybox-1.34.1-4.9.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:busybox-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:busybox-static-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:busybox-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:busybox-static-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:busybox-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:busybox-1.34.1-4.9.1.x86_64", "SUSE Manager Proxy 4.1:busybox-1.34.1-4.9.1.x86_64", "SUSE Manager Proxy 4.1:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Manager Retail Branch Server 4.1:busybox-1.34.1-4.9.1.x86_64", "SUSE Manager Retail Branch Server 4.1:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Manager Server 4.1:busybox-1.34.1-4.9.1.ppc64le", "SUSE Manager Server 4.1:busybox-1.34.1-4.9.1.s390x", "SUSE Manager Server 4.1:busybox-1.34.1-4.9.1.x86_64", "SUSE Manager Server 4.1:busybox-static-1.34.1-4.9.1.ppc64le", "SUSE Manager Server 4.1:busybox-static-1.34.1-4.9.1.s390x", "SUSE Manager Server 4.1:busybox-static-1.34.1-4.9.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2021-42373", url: "https://www.suse.com/security/cve/CVE-2021-42373", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Enterprise Storage 6:busybox-1.34.1-4.9.1.aarch64", "SUSE Enterprise Storage 6:busybox-1.34.1-4.9.1.x86_64", "SUSE Enterprise Storage 6:busybox-static-1.34.1-4.9.1.aarch64", "SUSE Enterprise Storage 6:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Enterprise Storage 7:busybox-1.34.1-4.9.1.aarch64", "SUSE Enterprise Storage 7:busybox-1.34.1-4.9.1.x86_64", "SUSE Enterprise Storage 7:busybox-static-1.34.1-4.9.1.aarch64", "SUSE Enterprise Storage 7:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:busybox-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:busybox-static-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:busybox-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:busybox-static-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:busybox-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:busybox-static-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:busybox-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:busybox-static-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:busybox-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:busybox-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-1.34.1-4.9.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-static-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-static-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-static-1.34.1-4.9.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-1.34.1-4.9.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-static-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-static-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-static-1.34.1-4.9.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-1.34.1-4.9.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-static-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-static-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-static-1.34.1-4.9.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:busybox-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:busybox-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:busybox-1.34.1-4.9.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:busybox-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:busybox-static-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:busybox-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:busybox-static-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:busybox-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:busybox-1.34.1-4.9.1.x86_64", "SUSE Manager Proxy 4.1:busybox-1.34.1-4.9.1.x86_64", "SUSE Manager Proxy 4.1:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Manager Retail Branch Server 4.1:busybox-1.34.1-4.9.1.x86_64", "SUSE Manager Retail Branch Server 4.1:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Manager Server 4.1:busybox-1.34.1-4.9.1.ppc64le", "SUSE Manager Server 4.1:busybox-1.34.1-4.9.1.s390x", "SUSE Manager Server 4.1:busybox-1.34.1-4.9.1.x86_64", "SUSE Manager Server 4.1:busybox-static-1.34.1-4.9.1.ppc64le", "SUSE Manager Server 4.1:busybox-static-1.34.1-4.9.1.s390x", "SUSE Manager Server 4.1:busybox-static-1.34.1-4.9.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.5, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "SUSE Enterprise Storage 6:busybox-1.34.1-4.9.1.aarch64", "SUSE Enterprise Storage 6:busybox-1.34.1-4.9.1.x86_64", "SUSE Enterprise Storage 6:busybox-static-1.34.1-4.9.1.aarch64", "SUSE Enterprise Storage 6:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Enterprise Storage 7:busybox-1.34.1-4.9.1.aarch64", "SUSE Enterprise Storage 7:busybox-1.34.1-4.9.1.x86_64", "SUSE Enterprise Storage 7:busybox-static-1.34.1-4.9.1.aarch64", "SUSE Enterprise Storage 7:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:busybox-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:busybox-static-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:busybox-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:busybox-static-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:busybox-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:busybox-static-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:busybox-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:busybox-static-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:busybox-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:busybox-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-1.34.1-4.9.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-static-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-static-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-static-1.34.1-4.9.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-1.34.1-4.9.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-static-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-static-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-static-1.34.1-4.9.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-1.34.1-4.9.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-static-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-static-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-static-1.34.1-4.9.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:busybox-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:busybox-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:busybox-1.34.1-4.9.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:busybox-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:busybox-static-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:busybox-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:busybox-static-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:busybox-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:busybox-1.34.1-4.9.1.x86_64", "SUSE Manager Proxy 4.1:busybox-1.34.1-4.9.1.x86_64", "SUSE Manager Proxy 4.1:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Manager Retail Branch Server 4.1:busybox-1.34.1-4.9.1.x86_64", "SUSE Manager Retail Branch Server 4.1:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Manager Server 4.1:busybox-1.34.1-4.9.1.ppc64le", "SUSE Manager Server 4.1:busybox-1.34.1-4.9.1.s390x", "SUSE Manager Server 4.1:busybox-1.34.1-4.9.1.x86_64", "SUSE Manager Server 4.1:busybox-static-1.34.1-4.9.1.ppc64le", "SUSE Manager Server 4.1:busybox-static-1.34.1-4.9.1.s390x", "SUSE Manager Server 4.1:busybox-static-1.34.1-4.9.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2022-01-20T09:05:15Z", details: "moderate", }, ], title: "CVE-2021-42373", }, { cve: "CVE-2021-42374", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2021-42374", }, ], notes: [ { category: "general", text: "An out-of-bounds heap read in Busybox's unlzma applet leads to information leak and denial of service when crafted LZMA-compressed input is decompressed. This can be triggered by any applet/format that", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Enterprise Storage 6:busybox-1.34.1-4.9.1.aarch64", "SUSE Enterprise Storage 6:busybox-1.34.1-4.9.1.x86_64", "SUSE Enterprise Storage 6:busybox-static-1.34.1-4.9.1.aarch64", "SUSE Enterprise Storage 6:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Enterprise Storage 7:busybox-1.34.1-4.9.1.aarch64", "SUSE Enterprise Storage 7:busybox-1.34.1-4.9.1.x86_64", "SUSE Enterprise Storage 7:busybox-static-1.34.1-4.9.1.aarch64", "SUSE Enterprise Storage 7:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:busybox-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:busybox-static-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:busybox-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:busybox-static-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:busybox-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:busybox-static-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:busybox-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:busybox-static-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:busybox-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:busybox-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-1.34.1-4.9.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-static-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-static-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-static-1.34.1-4.9.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-1.34.1-4.9.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-static-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-static-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-static-1.34.1-4.9.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-1.34.1-4.9.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-static-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-static-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-static-1.34.1-4.9.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:busybox-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:busybox-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:busybox-1.34.1-4.9.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:busybox-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:busybox-static-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:busybox-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:busybox-static-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:busybox-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:busybox-1.34.1-4.9.1.x86_64", "SUSE Manager Proxy 4.1:busybox-1.34.1-4.9.1.x86_64", "SUSE Manager Proxy 4.1:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Manager Retail Branch Server 4.1:busybox-1.34.1-4.9.1.x86_64", "SUSE Manager Retail Branch Server 4.1:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Manager Server 4.1:busybox-1.34.1-4.9.1.ppc64le", "SUSE Manager Server 4.1:busybox-1.34.1-4.9.1.s390x", "SUSE Manager Server 4.1:busybox-1.34.1-4.9.1.x86_64", "SUSE Manager Server 4.1:busybox-static-1.34.1-4.9.1.ppc64le", "SUSE Manager Server 4.1:busybox-static-1.34.1-4.9.1.s390x", "SUSE Manager Server 4.1:busybox-static-1.34.1-4.9.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2021-42374", url: "https://www.suse.com/security/cve/CVE-2021-42374", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Enterprise Storage 6:busybox-1.34.1-4.9.1.aarch64", "SUSE Enterprise Storage 6:busybox-1.34.1-4.9.1.x86_64", "SUSE Enterprise Storage 6:busybox-static-1.34.1-4.9.1.aarch64", "SUSE Enterprise Storage 6:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Enterprise Storage 7:busybox-1.34.1-4.9.1.aarch64", "SUSE Enterprise Storage 7:busybox-1.34.1-4.9.1.x86_64", "SUSE Enterprise Storage 7:busybox-static-1.34.1-4.9.1.aarch64", "SUSE Enterprise Storage 7:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:busybox-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:busybox-static-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:busybox-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:busybox-static-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:busybox-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:busybox-static-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:busybox-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:busybox-static-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:busybox-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:busybox-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-1.34.1-4.9.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-static-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-static-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-static-1.34.1-4.9.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-1.34.1-4.9.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-static-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-static-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-static-1.34.1-4.9.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-1.34.1-4.9.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-static-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-static-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-static-1.34.1-4.9.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:busybox-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:busybox-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:busybox-1.34.1-4.9.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:busybox-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:busybox-static-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:busybox-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:busybox-static-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:busybox-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:busybox-1.34.1-4.9.1.x86_64", "SUSE Manager Proxy 4.1:busybox-1.34.1-4.9.1.x86_64", "SUSE Manager Proxy 4.1:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Manager Retail Branch Server 4.1:busybox-1.34.1-4.9.1.x86_64", "SUSE Manager Retail Branch Server 4.1:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Manager Server 4.1:busybox-1.34.1-4.9.1.ppc64le", "SUSE Manager Server 4.1:busybox-1.34.1-4.9.1.s390x", "SUSE Manager Server 4.1:busybox-1.34.1-4.9.1.x86_64", "SUSE Manager Server 4.1:busybox-static-1.34.1-4.9.1.ppc64le", "SUSE Manager Server 4.1:busybox-static-1.34.1-4.9.1.s390x", "SUSE Manager Server 4.1:busybox-static-1.34.1-4.9.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.7, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:H", version: "3.1", }, products: [ "SUSE Enterprise Storage 6:busybox-1.34.1-4.9.1.aarch64", "SUSE Enterprise Storage 6:busybox-1.34.1-4.9.1.x86_64", "SUSE Enterprise Storage 6:busybox-static-1.34.1-4.9.1.aarch64", "SUSE Enterprise Storage 6:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Enterprise Storage 7:busybox-1.34.1-4.9.1.aarch64", "SUSE Enterprise Storage 7:busybox-1.34.1-4.9.1.x86_64", "SUSE Enterprise Storage 7:busybox-static-1.34.1-4.9.1.aarch64", "SUSE Enterprise Storage 7:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:busybox-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:busybox-static-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:busybox-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:busybox-static-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:busybox-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:busybox-static-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:busybox-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:busybox-static-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:busybox-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:busybox-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-1.34.1-4.9.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-static-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-static-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-static-1.34.1-4.9.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-1.34.1-4.9.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-static-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-static-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-static-1.34.1-4.9.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-1.34.1-4.9.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-static-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-static-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-static-1.34.1-4.9.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:busybox-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:busybox-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:busybox-1.34.1-4.9.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:busybox-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:busybox-static-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:busybox-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:busybox-static-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:busybox-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:busybox-1.34.1-4.9.1.x86_64", "SUSE Manager Proxy 4.1:busybox-1.34.1-4.9.1.x86_64", "SUSE Manager Proxy 4.1:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Manager Retail Branch Server 4.1:busybox-1.34.1-4.9.1.x86_64", "SUSE Manager Retail Branch Server 4.1:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Manager Server 4.1:busybox-1.34.1-4.9.1.ppc64le", "SUSE Manager Server 4.1:busybox-1.34.1-4.9.1.s390x", "SUSE Manager Server 4.1:busybox-1.34.1-4.9.1.x86_64", "SUSE Manager Server 4.1:busybox-static-1.34.1-4.9.1.ppc64le", "SUSE Manager Server 4.1:busybox-static-1.34.1-4.9.1.s390x", "SUSE Manager Server 4.1:busybox-static-1.34.1-4.9.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2022-01-20T09:05:15Z", details: "moderate", }, ], title: "CVE-2021-42374", }, { cve: "CVE-2021-42375", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2021-42375", }, ], notes: [ { category: "general", text: "An incorrect handling of a special element in Busybox's ash applet leads to denial of service when processing a crafted shell command, due to the shell mistaking specific characters for reserved characters. This may be used for DoS under rare conditions of filtered command input.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Enterprise Storage 6:busybox-1.34.1-4.9.1.aarch64", "SUSE Enterprise Storage 6:busybox-1.34.1-4.9.1.x86_64", "SUSE Enterprise Storage 6:busybox-static-1.34.1-4.9.1.aarch64", "SUSE Enterprise Storage 6:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Enterprise Storage 7:busybox-1.34.1-4.9.1.aarch64", "SUSE Enterprise Storage 7:busybox-1.34.1-4.9.1.x86_64", "SUSE Enterprise Storage 7:busybox-static-1.34.1-4.9.1.aarch64", "SUSE Enterprise Storage 7:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:busybox-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:busybox-static-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:busybox-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:busybox-static-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:busybox-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:busybox-static-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:busybox-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:busybox-static-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:busybox-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:busybox-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-1.34.1-4.9.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-static-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-static-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-static-1.34.1-4.9.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-1.34.1-4.9.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-static-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-static-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-static-1.34.1-4.9.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-1.34.1-4.9.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-static-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-static-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-static-1.34.1-4.9.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:busybox-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:busybox-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:busybox-1.34.1-4.9.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:busybox-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:busybox-static-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:busybox-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:busybox-static-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:busybox-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:busybox-1.34.1-4.9.1.x86_64", "SUSE Manager Proxy 4.1:busybox-1.34.1-4.9.1.x86_64", "SUSE Manager Proxy 4.1:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Manager Retail Branch Server 4.1:busybox-1.34.1-4.9.1.x86_64", "SUSE Manager Retail Branch Server 4.1:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Manager Server 4.1:busybox-1.34.1-4.9.1.ppc64le", "SUSE Manager Server 4.1:busybox-1.34.1-4.9.1.s390x", "SUSE Manager Server 4.1:busybox-1.34.1-4.9.1.x86_64", "SUSE Manager Server 4.1:busybox-static-1.34.1-4.9.1.ppc64le", "SUSE Manager Server 4.1:busybox-static-1.34.1-4.9.1.s390x", "SUSE Manager Server 4.1:busybox-static-1.34.1-4.9.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2021-42375", url: "https://www.suse.com/security/cve/CVE-2021-42375", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Enterprise Storage 6:busybox-1.34.1-4.9.1.aarch64", "SUSE Enterprise Storage 6:busybox-1.34.1-4.9.1.x86_64", "SUSE Enterprise Storage 6:busybox-static-1.34.1-4.9.1.aarch64", "SUSE Enterprise Storage 6:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Enterprise Storage 7:busybox-1.34.1-4.9.1.aarch64", "SUSE Enterprise Storage 7:busybox-1.34.1-4.9.1.x86_64", "SUSE Enterprise Storage 7:busybox-static-1.34.1-4.9.1.aarch64", "SUSE Enterprise Storage 7:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:busybox-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:busybox-static-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:busybox-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:busybox-static-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:busybox-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:busybox-static-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:busybox-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:busybox-static-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:busybox-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:busybox-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-1.34.1-4.9.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-static-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-static-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-static-1.34.1-4.9.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-1.34.1-4.9.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-static-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-static-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-static-1.34.1-4.9.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-1.34.1-4.9.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-static-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-static-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-static-1.34.1-4.9.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:busybox-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:busybox-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:busybox-1.34.1-4.9.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:busybox-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:busybox-static-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:busybox-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:busybox-static-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:busybox-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:busybox-1.34.1-4.9.1.x86_64", "SUSE Manager Proxy 4.1:busybox-1.34.1-4.9.1.x86_64", "SUSE Manager Proxy 4.1:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Manager Retail Branch Server 4.1:busybox-1.34.1-4.9.1.x86_64", "SUSE Manager Retail Branch Server 4.1:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Manager Server 4.1:busybox-1.34.1-4.9.1.ppc64le", "SUSE Manager Server 4.1:busybox-1.34.1-4.9.1.s390x", "SUSE Manager Server 4.1:busybox-1.34.1-4.9.1.x86_64", "SUSE Manager Server 4.1:busybox-static-1.34.1-4.9.1.ppc64le", "SUSE Manager Server 4.1:busybox-static-1.34.1-4.9.1.s390x", "SUSE Manager Server 4.1:busybox-static-1.34.1-4.9.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 4.1, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "SUSE Enterprise Storage 6:busybox-1.34.1-4.9.1.aarch64", "SUSE Enterprise Storage 6:busybox-1.34.1-4.9.1.x86_64", "SUSE Enterprise Storage 6:busybox-static-1.34.1-4.9.1.aarch64", "SUSE Enterprise Storage 6:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Enterprise Storage 7:busybox-1.34.1-4.9.1.aarch64", "SUSE Enterprise Storage 7:busybox-1.34.1-4.9.1.x86_64", "SUSE Enterprise Storage 7:busybox-static-1.34.1-4.9.1.aarch64", "SUSE Enterprise Storage 7:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:busybox-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:busybox-static-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:busybox-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:busybox-static-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:busybox-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:busybox-static-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:busybox-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:busybox-static-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:busybox-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:busybox-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-1.34.1-4.9.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-static-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-static-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-static-1.34.1-4.9.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-1.34.1-4.9.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-static-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-static-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-static-1.34.1-4.9.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-1.34.1-4.9.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-static-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-static-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-static-1.34.1-4.9.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:busybox-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:busybox-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:busybox-1.34.1-4.9.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:busybox-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:busybox-static-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:busybox-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:busybox-static-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:busybox-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:busybox-1.34.1-4.9.1.x86_64", "SUSE Manager Proxy 4.1:busybox-1.34.1-4.9.1.x86_64", "SUSE Manager Proxy 4.1:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Manager Retail Branch Server 4.1:busybox-1.34.1-4.9.1.x86_64", "SUSE Manager Retail Branch Server 4.1:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Manager Server 4.1:busybox-1.34.1-4.9.1.ppc64le", "SUSE Manager Server 4.1:busybox-1.34.1-4.9.1.s390x", "SUSE Manager Server 4.1:busybox-1.34.1-4.9.1.x86_64", "SUSE Manager Server 4.1:busybox-static-1.34.1-4.9.1.ppc64le", "SUSE Manager Server 4.1:busybox-static-1.34.1-4.9.1.s390x", "SUSE Manager Server 4.1:busybox-static-1.34.1-4.9.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2022-01-20T09:05:15Z", details: "moderate", }, ], title: "CVE-2021-42375", }, { cve: "CVE-2021-42376", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2021-42376", }, ], notes: [ { category: "general", text: "A NULL pointer dereference in Busybox's hush applet leads to denial of service when processing a crafted shell command, due to missing validation after a \\x03 delimiter character. This may be used for DoS under very rare conditions of filtered command input.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Enterprise Storage 6:busybox-1.34.1-4.9.1.aarch64", "SUSE Enterprise Storage 6:busybox-1.34.1-4.9.1.x86_64", "SUSE Enterprise Storage 6:busybox-static-1.34.1-4.9.1.aarch64", "SUSE Enterprise Storage 6:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Enterprise Storage 7:busybox-1.34.1-4.9.1.aarch64", "SUSE Enterprise Storage 7:busybox-1.34.1-4.9.1.x86_64", "SUSE Enterprise Storage 7:busybox-static-1.34.1-4.9.1.aarch64", "SUSE Enterprise Storage 7:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:busybox-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:busybox-static-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:busybox-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:busybox-static-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:busybox-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:busybox-static-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:busybox-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:busybox-static-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:busybox-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:busybox-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-1.34.1-4.9.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-static-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-static-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-static-1.34.1-4.9.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-1.34.1-4.9.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-static-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-static-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-static-1.34.1-4.9.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-1.34.1-4.9.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-static-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-static-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-static-1.34.1-4.9.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:busybox-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:busybox-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:busybox-1.34.1-4.9.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:busybox-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:busybox-static-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:busybox-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:busybox-static-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:busybox-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:busybox-1.34.1-4.9.1.x86_64", "SUSE Manager Proxy 4.1:busybox-1.34.1-4.9.1.x86_64", "SUSE Manager Proxy 4.1:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Manager Retail Branch Server 4.1:busybox-1.34.1-4.9.1.x86_64", "SUSE Manager Retail Branch Server 4.1:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Manager Server 4.1:busybox-1.34.1-4.9.1.ppc64le", "SUSE Manager Server 4.1:busybox-1.34.1-4.9.1.s390x", "SUSE Manager Server 4.1:busybox-1.34.1-4.9.1.x86_64", "SUSE Manager Server 4.1:busybox-static-1.34.1-4.9.1.ppc64le", "SUSE Manager Server 4.1:busybox-static-1.34.1-4.9.1.s390x", "SUSE Manager Server 4.1:busybox-static-1.34.1-4.9.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2021-42376", url: "https://www.suse.com/security/cve/CVE-2021-42376", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Enterprise Storage 6:busybox-1.34.1-4.9.1.aarch64", "SUSE Enterprise Storage 6:busybox-1.34.1-4.9.1.x86_64", "SUSE Enterprise Storage 6:busybox-static-1.34.1-4.9.1.aarch64", "SUSE Enterprise Storage 6:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Enterprise Storage 7:busybox-1.34.1-4.9.1.aarch64", "SUSE Enterprise Storage 7:busybox-1.34.1-4.9.1.x86_64", "SUSE Enterprise Storage 7:busybox-static-1.34.1-4.9.1.aarch64", "SUSE Enterprise Storage 7:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:busybox-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:busybox-static-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:busybox-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:busybox-static-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:busybox-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:busybox-static-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:busybox-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:busybox-static-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:busybox-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:busybox-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-1.34.1-4.9.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-static-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-static-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-static-1.34.1-4.9.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-1.34.1-4.9.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-static-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-static-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-static-1.34.1-4.9.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-1.34.1-4.9.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-static-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-static-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-static-1.34.1-4.9.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:busybox-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:busybox-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:busybox-1.34.1-4.9.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:busybox-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:busybox-static-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:busybox-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:busybox-static-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:busybox-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:busybox-1.34.1-4.9.1.x86_64", "SUSE Manager Proxy 4.1:busybox-1.34.1-4.9.1.x86_64", "SUSE Manager Proxy 4.1:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Manager Retail Branch Server 4.1:busybox-1.34.1-4.9.1.x86_64", "SUSE Manager Retail Branch Server 4.1:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Manager Server 4.1:busybox-1.34.1-4.9.1.ppc64le", "SUSE Manager Server 4.1:busybox-1.34.1-4.9.1.s390x", "SUSE Manager Server 4.1:busybox-1.34.1-4.9.1.x86_64", "SUSE Manager Server 4.1:busybox-static-1.34.1-4.9.1.ppc64le", "SUSE Manager Server 4.1:busybox-static-1.34.1-4.9.1.s390x", "SUSE Manager Server 4.1:busybox-static-1.34.1-4.9.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 4.1, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "SUSE Enterprise Storage 6:busybox-1.34.1-4.9.1.aarch64", "SUSE Enterprise Storage 6:busybox-1.34.1-4.9.1.x86_64", "SUSE Enterprise Storage 6:busybox-static-1.34.1-4.9.1.aarch64", "SUSE Enterprise Storage 6:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Enterprise Storage 7:busybox-1.34.1-4.9.1.aarch64", "SUSE Enterprise Storage 7:busybox-1.34.1-4.9.1.x86_64", "SUSE Enterprise Storage 7:busybox-static-1.34.1-4.9.1.aarch64", "SUSE Enterprise Storage 7:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:busybox-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:busybox-static-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:busybox-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:busybox-static-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:busybox-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:busybox-static-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:busybox-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:busybox-static-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:busybox-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:busybox-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-1.34.1-4.9.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-static-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-static-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-static-1.34.1-4.9.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-1.34.1-4.9.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-static-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-static-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-static-1.34.1-4.9.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-1.34.1-4.9.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-static-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-static-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-static-1.34.1-4.9.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:busybox-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:busybox-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:busybox-1.34.1-4.9.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:busybox-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:busybox-static-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:busybox-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:busybox-static-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:busybox-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:busybox-1.34.1-4.9.1.x86_64", "SUSE Manager Proxy 4.1:busybox-1.34.1-4.9.1.x86_64", "SUSE Manager Proxy 4.1:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Manager Retail Branch Server 4.1:busybox-1.34.1-4.9.1.x86_64", "SUSE Manager Retail Branch Server 4.1:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Manager Server 4.1:busybox-1.34.1-4.9.1.ppc64le", "SUSE Manager Server 4.1:busybox-1.34.1-4.9.1.s390x", "SUSE Manager Server 4.1:busybox-1.34.1-4.9.1.x86_64", "SUSE Manager Server 4.1:busybox-static-1.34.1-4.9.1.ppc64le", "SUSE Manager Server 4.1:busybox-static-1.34.1-4.9.1.s390x", "SUSE Manager Server 4.1:busybox-static-1.34.1-4.9.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2022-01-20T09:05:15Z", details: "moderate", }, ], title: "CVE-2021-42376", }, { cve: "CVE-2021-42377", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2021-42377", }, ], notes: [ { category: "general", text: "An attacker-controlled pointer free in Busybox's hush applet leads to denial of service and possible code execution when processing a crafted shell command, due to the shell mishandling the &&& string. This may be used for remote code execution under rare conditions of filtered command input.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Enterprise Storage 6:busybox-1.34.1-4.9.1.aarch64", "SUSE Enterprise Storage 6:busybox-1.34.1-4.9.1.x86_64", "SUSE Enterprise Storage 6:busybox-static-1.34.1-4.9.1.aarch64", "SUSE Enterprise Storage 6:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Enterprise Storage 7:busybox-1.34.1-4.9.1.aarch64", "SUSE Enterprise Storage 7:busybox-1.34.1-4.9.1.x86_64", "SUSE Enterprise Storage 7:busybox-static-1.34.1-4.9.1.aarch64", "SUSE Enterprise Storage 7:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:busybox-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:busybox-static-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:busybox-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:busybox-static-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:busybox-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:busybox-static-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:busybox-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:busybox-static-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:busybox-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:busybox-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-1.34.1-4.9.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-static-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-static-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-static-1.34.1-4.9.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-1.34.1-4.9.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-static-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-static-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-static-1.34.1-4.9.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-1.34.1-4.9.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-static-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-static-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-static-1.34.1-4.9.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:busybox-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:busybox-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:busybox-1.34.1-4.9.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:busybox-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:busybox-static-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:busybox-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:busybox-static-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:busybox-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:busybox-1.34.1-4.9.1.x86_64", "SUSE Manager Proxy 4.1:busybox-1.34.1-4.9.1.x86_64", "SUSE Manager Proxy 4.1:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Manager Retail Branch Server 4.1:busybox-1.34.1-4.9.1.x86_64", "SUSE Manager Retail Branch Server 4.1:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Manager Server 4.1:busybox-1.34.1-4.9.1.ppc64le", "SUSE Manager Server 4.1:busybox-1.34.1-4.9.1.s390x", "SUSE Manager Server 4.1:busybox-1.34.1-4.9.1.x86_64", "SUSE Manager Server 4.1:busybox-static-1.34.1-4.9.1.ppc64le", "SUSE Manager Server 4.1:busybox-static-1.34.1-4.9.1.s390x", "SUSE Manager Server 4.1:busybox-static-1.34.1-4.9.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2021-42377", url: "https://www.suse.com/security/cve/CVE-2021-42377", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Enterprise Storage 6:busybox-1.34.1-4.9.1.aarch64", "SUSE Enterprise Storage 6:busybox-1.34.1-4.9.1.x86_64", "SUSE Enterprise Storage 6:busybox-static-1.34.1-4.9.1.aarch64", "SUSE Enterprise Storage 6:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Enterprise Storage 7:busybox-1.34.1-4.9.1.aarch64", "SUSE Enterprise Storage 7:busybox-1.34.1-4.9.1.x86_64", "SUSE Enterprise Storage 7:busybox-static-1.34.1-4.9.1.aarch64", "SUSE Enterprise Storage 7:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:busybox-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:busybox-static-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:busybox-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:busybox-static-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:busybox-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:busybox-static-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:busybox-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:busybox-static-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:busybox-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:busybox-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-1.34.1-4.9.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-static-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-static-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-static-1.34.1-4.9.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-1.34.1-4.9.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-static-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-static-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-static-1.34.1-4.9.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-1.34.1-4.9.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-static-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-static-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-static-1.34.1-4.9.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:busybox-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:busybox-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:busybox-1.34.1-4.9.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:busybox-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:busybox-static-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:busybox-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:busybox-static-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:busybox-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:busybox-1.34.1-4.9.1.x86_64", "SUSE Manager Proxy 4.1:busybox-1.34.1-4.9.1.x86_64", "SUSE Manager Proxy 4.1:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Manager Retail Branch Server 4.1:busybox-1.34.1-4.9.1.x86_64", "SUSE Manager Retail Branch Server 4.1:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Manager Server 4.1:busybox-1.34.1-4.9.1.ppc64le", "SUSE Manager Server 4.1:busybox-1.34.1-4.9.1.s390x", "SUSE Manager Server 4.1:busybox-1.34.1-4.9.1.x86_64", "SUSE Manager Server 4.1:busybox-static-1.34.1-4.9.1.ppc64le", "SUSE Manager Server 4.1:busybox-static-1.34.1-4.9.1.s390x", "SUSE Manager Server 4.1:busybox-static-1.34.1-4.9.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 6.4, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, products: [ "SUSE Enterprise Storage 6:busybox-1.34.1-4.9.1.aarch64", "SUSE Enterprise Storage 6:busybox-1.34.1-4.9.1.x86_64", "SUSE Enterprise Storage 6:busybox-static-1.34.1-4.9.1.aarch64", "SUSE Enterprise Storage 6:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Enterprise Storage 7:busybox-1.34.1-4.9.1.aarch64", "SUSE Enterprise Storage 7:busybox-1.34.1-4.9.1.x86_64", "SUSE Enterprise Storage 7:busybox-static-1.34.1-4.9.1.aarch64", "SUSE Enterprise Storage 7:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:busybox-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:busybox-static-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:busybox-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:busybox-static-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:busybox-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:busybox-static-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:busybox-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:busybox-static-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:busybox-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:busybox-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-1.34.1-4.9.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-static-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-static-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-static-1.34.1-4.9.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-1.34.1-4.9.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-static-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-static-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-static-1.34.1-4.9.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-1.34.1-4.9.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-static-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-static-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-static-1.34.1-4.9.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:busybox-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:busybox-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:busybox-1.34.1-4.9.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:busybox-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:busybox-static-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:busybox-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:busybox-static-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:busybox-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:busybox-1.34.1-4.9.1.x86_64", "SUSE Manager Proxy 4.1:busybox-1.34.1-4.9.1.x86_64", "SUSE Manager Proxy 4.1:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Manager Retail Branch Server 4.1:busybox-1.34.1-4.9.1.x86_64", "SUSE Manager Retail Branch Server 4.1:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Manager Server 4.1:busybox-1.34.1-4.9.1.ppc64le", "SUSE Manager Server 4.1:busybox-1.34.1-4.9.1.s390x", "SUSE Manager Server 4.1:busybox-1.34.1-4.9.1.x86_64", "SUSE Manager Server 4.1:busybox-static-1.34.1-4.9.1.ppc64le", "SUSE Manager Server 4.1:busybox-static-1.34.1-4.9.1.s390x", "SUSE Manager Server 4.1:busybox-static-1.34.1-4.9.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2022-01-20T09:05:15Z", details: "moderate", }, ], title: "CVE-2021-42377", }, { cve: "CVE-2021-42378", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2021-42378", }, ], notes: [ { category: "general", text: "A use-after-free in Busybox's awk applet leads to denial of service and possibly code execution when processing a crafted awk pattern in the getvar_i function", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Enterprise Storage 6:busybox-1.34.1-4.9.1.aarch64", "SUSE Enterprise Storage 6:busybox-1.34.1-4.9.1.x86_64", "SUSE Enterprise Storage 6:busybox-static-1.34.1-4.9.1.aarch64", "SUSE Enterprise Storage 6:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Enterprise Storage 7:busybox-1.34.1-4.9.1.aarch64", "SUSE Enterprise Storage 7:busybox-1.34.1-4.9.1.x86_64", "SUSE Enterprise Storage 7:busybox-static-1.34.1-4.9.1.aarch64", "SUSE Enterprise Storage 7:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:busybox-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:busybox-static-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:busybox-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:busybox-static-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:busybox-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:busybox-static-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:busybox-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:busybox-static-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:busybox-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:busybox-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-1.34.1-4.9.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-static-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-static-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-static-1.34.1-4.9.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-1.34.1-4.9.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-static-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-static-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-static-1.34.1-4.9.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-1.34.1-4.9.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-static-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-static-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-static-1.34.1-4.9.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:busybox-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:busybox-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:busybox-1.34.1-4.9.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:busybox-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:busybox-static-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:busybox-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:busybox-static-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:busybox-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:busybox-1.34.1-4.9.1.x86_64", "SUSE Manager Proxy 4.1:busybox-1.34.1-4.9.1.x86_64", "SUSE Manager Proxy 4.1:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Manager Retail Branch Server 4.1:busybox-1.34.1-4.9.1.x86_64", "SUSE Manager Retail Branch Server 4.1:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Manager Server 4.1:busybox-1.34.1-4.9.1.ppc64le", "SUSE Manager Server 4.1:busybox-1.34.1-4.9.1.s390x", "SUSE Manager Server 4.1:busybox-1.34.1-4.9.1.x86_64", "SUSE Manager Server 4.1:busybox-static-1.34.1-4.9.1.ppc64le", "SUSE Manager Server 4.1:busybox-static-1.34.1-4.9.1.s390x", "SUSE Manager Server 4.1:busybox-static-1.34.1-4.9.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2021-42378", url: "https://www.suse.com/security/cve/CVE-2021-42378", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Enterprise Storage 6:busybox-1.34.1-4.9.1.aarch64", "SUSE Enterprise Storage 6:busybox-1.34.1-4.9.1.x86_64", "SUSE Enterprise Storage 6:busybox-static-1.34.1-4.9.1.aarch64", "SUSE Enterprise Storage 6:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Enterprise Storage 7:busybox-1.34.1-4.9.1.aarch64", "SUSE Enterprise Storage 7:busybox-1.34.1-4.9.1.x86_64", "SUSE Enterprise Storage 7:busybox-static-1.34.1-4.9.1.aarch64", "SUSE Enterprise Storage 7:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:busybox-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:busybox-static-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:busybox-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:busybox-static-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:busybox-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:busybox-static-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:busybox-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:busybox-static-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:busybox-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:busybox-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-1.34.1-4.9.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-static-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-static-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-static-1.34.1-4.9.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-1.34.1-4.9.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-static-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-static-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-static-1.34.1-4.9.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-1.34.1-4.9.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-static-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-static-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-static-1.34.1-4.9.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:busybox-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:busybox-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:busybox-1.34.1-4.9.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:busybox-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:busybox-static-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:busybox-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:busybox-static-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:busybox-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:busybox-1.34.1-4.9.1.x86_64", "SUSE Manager Proxy 4.1:busybox-1.34.1-4.9.1.x86_64", "SUSE Manager Proxy 4.1:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Manager Retail Branch Server 4.1:busybox-1.34.1-4.9.1.x86_64", "SUSE Manager Retail Branch Server 4.1:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Manager Server 4.1:busybox-1.34.1-4.9.1.ppc64le", "SUSE Manager Server 4.1:busybox-1.34.1-4.9.1.s390x", "SUSE Manager Server 4.1:busybox-1.34.1-4.9.1.x86_64", "SUSE Manager Server 4.1:busybox-static-1.34.1-4.9.1.ppc64le", "SUSE Manager Server 4.1:busybox-static-1.34.1-4.9.1.s390x", "SUSE Manager Server 4.1:busybox-static-1.34.1-4.9.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 6.6, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, products: [ "SUSE Enterprise Storage 6:busybox-1.34.1-4.9.1.aarch64", "SUSE Enterprise Storage 6:busybox-1.34.1-4.9.1.x86_64", "SUSE Enterprise Storage 6:busybox-static-1.34.1-4.9.1.aarch64", "SUSE Enterprise Storage 6:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Enterprise Storage 7:busybox-1.34.1-4.9.1.aarch64", "SUSE Enterprise Storage 7:busybox-1.34.1-4.9.1.x86_64", "SUSE Enterprise Storage 7:busybox-static-1.34.1-4.9.1.aarch64", "SUSE Enterprise Storage 7:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:busybox-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:busybox-static-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:busybox-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:busybox-static-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:busybox-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:busybox-static-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:busybox-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:busybox-static-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:busybox-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:busybox-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-1.34.1-4.9.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-static-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-static-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-static-1.34.1-4.9.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-1.34.1-4.9.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-static-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-static-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-static-1.34.1-4.9.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-1.34.1-4.9.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-static-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-static-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-static-1.34.1-4.9.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:busybox-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:busybox-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:busybox-1.34.1-4.9.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:busybox-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:busybox-static-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:busybox-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:busybox-static-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:busybox-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:busybox-1.34.1-4.9.1.x86_64", "SUSE Manager Proxy 4.1:busybox-1.34.1-4.9.1.x86_64", "SUSE Manager Proxy 4.1:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Manager Retail Branch Server 4.1:busybox-1.34.1-4.9.1.x86_64", "SUSE Manager Retail Branch Server 4.1:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Manager Server 4.1:busybox-1.34.1-4.9.1.ppc64le", "SUSE Manager Server 4.1:busybox-1.34.1-4.9.1.s390x", "SUSE Manager Server 4.1:busybox-1.34.1-4.9.1.x86_64", "SUSE Manager Server 4.1:busybox-static-1.34.1-4.9.1.ppc64le", "SUSE Manager Server 4.1:busybox-static-1.34.1-4.9.1.s390x", "SUSE Manager Server 4.1:busybox-static-1.34.1-4.9.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2022-01-20T09:05:15Z", details: "moderate", }, ], title: "CVE-2021-42378", }, { cve: "CVE-2021-42379", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2021-42379", }, ], notes: [ { category: "general", text: "A use-after-free in Busybox's awk applet leads to denial of service and possibly code execution when processing a crafted awk pattern in the next_input_file function", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Enterprise Storage 6:busybox-1.34.1-4.9.1.aarch64", "SUSE Enterprise Storage 6:busybox-1.34.1-4.9.1.x86_64", "SUSE Enterprise Storage 6:busybox-static-1.34.1-4.9.1.aarch64", "SUSE Enterprise Storage 6:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Enterprise Storage 7:busybox-1.34.1-4.9.1.aarch64", "SUSE Enterprise Storage 7:busybox-1.34.1-4.9.1.x86_64", "SUSE Enterprise Storage 7:busybox-static-1.34.1-4.9.1.aarch64", "SUSE Enterprise Storage 7:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:busybox-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:busybox-static-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:busybox-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:busybox-static-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:busybox-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:busybox-static-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:busybox-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:busybox-static-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:busybox-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:busybox-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-1.34.1-4.9.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-static-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-static-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-static-1.34.1-4.9.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-1.34.1-4.9.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-static-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-static-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-static-1.34.1-4.9.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-1.34.1-4.9.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-static-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-static-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-static-1.34.1-4.9.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:busybox-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:busybox-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:busybox-1.34.1-4.9.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:busybox-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:busybox-static-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:busybox-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:busybox-static-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:busybox-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:busybox-1.34.1-4.9.1.x86_64", "SUSE Manager Proxy 4.1:busybox-1.34.1-4.9.1.x86_64", "SUSE Manager Proxy 4.1:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Manager Retail Branch Server 4.1:busybox-1.34.1-4.9.1.x86_64", "SUSE Manager Retail Branch Server 4.1:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Manager Server 4.1:busybox-1.34.1-4.9.1.ppc64le", "SUSE Manager Server 4.1:busybox-1.34.1-4.9.1.s390x", "SUSE Manager Server 4.1:busybox-1.34.1-4.9.1.x86_64", "SUSE Manager Server 4.1:busybox-static-1.34.1-4.9.1.ppc64le", "SUSE Manager Server 4.1:busybox-static-1.34.1-4.9.1.s390x", "SUSE Manager Server 4.1:busybox-static-1.34.1-4.9.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2021-42379", url: "https://www.suse.com/security/cve/CVE-2021-42379", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Enterprise Storage 6:busybox-1.34.1-4.9.1.aarch64", "SUSE Enterprise Storage 6:busybox-1.34.1-4.9.1.x86_64", "SUSE Enterprise Storage 6:busybox-static-1.34.1-4.9.1.aarch64", "SUSE Enterprise Storage 6:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Enterprise Storage 7:busybox-1.34.1-4.9.1.aarch64", "SUSE Enterprise Storage 7:busybox-1.34.1-4.9.1.x86_64", "SUSE Enterprise Storage 7:busybox-static-1.34.1-4.9.1.aarch64", "SUSE Enterprise Storage 7:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:busybox-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:busybox-static-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:busybox-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:busybox-static-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:busybox-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:busybox-static-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:busybox-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:busybox-static-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:busybox-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:busybox-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-1.34.1-4.9.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-static-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-static-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-static-1.34.1-4.9.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-1.34.1-4.9.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-static-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-static-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-static-1.34.1-4.9.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-1.34.1-4.9.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-static-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-static-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-static-1.34.1-4.9.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:busybox-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:busybox-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:busybox-1.34.1-4.9.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:busybox-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:busybox-static-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:busybox-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:busybox-static-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:busybox-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:busybox-1.34.1-4.9.1.x86_64", "SUSE Manager Proxy 4.1:busybox-1.34.1-4.9.1.x86_64", "SUSE Manager Proxy 4.1:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Manager Retail Branch Server 4.1:busybox-1.34.1-4.9.1.x86_64", "SUSE Manager Retail Branch Server 4.1:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Manager Server 4.1:busybox-1.34.1-4.9.1.ppc64le", "SUSE Manager Server 4.1:busybox-1.34.1-4.9.1.s390x", "SUSE Manager Server 4.1:busybox-1.34.1-4.9.1.x86_64", "SUSE Manager Server 4.1:busybox-static-1.34.1-4.9.1.ppc64le", "SUSE Manager Server 4.1:busybox-static-1.34.1-4.9.1.s390x", "SUSE Manager Server 4.1:busybox-static-1.34.1-4.9.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 6.6, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, products: [ "SUSE Enterprise Storage 6:busybox-1.34.1-4.9.1.aarch64", "SUSE Enterprise Storage 6:busybox-1.34.1-4.9.1.x86_64", "SUSE Enterprise Storage 6:busybox-static-1.34.1-4.9.1.aarch64", "SUSE Enterprise Storage 6:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Enterprise Storage 7:busybox-1.34.1-4.9.1.aarch64", "SUSE Enterprise Storage 7:busybox-1.34.1-4.9.1.x86_64", "SUSE Enterprise Storage 7:busybox-static-1.34.1-4.9.1.aarch64", "SUSE Enterprise Storage 7:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:busybox-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:busybox-static-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:busybox-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:busybox-static-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:busybox-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:busybox-static-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:busybox-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:busybox-static-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:busybox-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:busybox-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-1.34.1-4.9.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-static-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-static-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-static-1.34.1-4.9.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-1.34.1-4.9.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-static-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-static-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-static-1.34.1-4.9.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-1.34.1-4.9.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-static-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-static-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-static-1.34.1-4.9.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:busybox-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:busybox-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:busybox-1.34.1-4.9.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:busybox-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:busybox-static-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:busybox-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:busybox-static-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:busybox-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:busybox-1.34.1-4.9.1.x86_64", "SUSE Manager Proxy 4.1:busybox-1.34.1-4.9.1.x86_64", "SUSE Manager Proxy 4.1:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Manager Retail Branch Server 4.1:busybox-1.34.1-4.9.1.x86_64", "SUSE Manager Retail Branch Server 4.1:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Manager Server 4.1:busybox-1.34.1-4.9.1.ppc64le", "SUSE Manager Server 4.1:busybox-1.34.1-4.9.1.s390x", "SUSE Manager Server 4.1:busybox-1.34.1-4.9.1.x86_64", "SUSE Manager Server 4.1:busybox-static-1.34.1-4.9.1.ppc64le", "SUSE Manager Server 4.1:busybox-static-1.34.1-4.9.1.s390x", "SUSE Manager Server 4.1:busybox-static-1.34.1-4.9.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2022-01-20T09:05:15Z", details: "moderate", }, ], title: "CVE-2021-42379", }, { cve: "CVE-2021-42380", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2021-42380", }, ], notes: [ { category: "general", text: "A use-after-free in Busybox's awk applet leads to denial of service and possibly code execution when processing a crafted awk pattern in the clrvar function", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Enterprise Storage 6:busybox-1.34.1-4.9.1.aarch64", "SUSE Enterprise Storage 6:busybox-1.34.1-4.9.1.x86_64", "SUSE Enterprise Storage 6:busybox-static-1.34.1-4.9.1.aarch64", "SUSE Enterprise Storage 6:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Enterprise Storage 7:busybox-1.34.1-4.9.1.aarch64", "SUSE Enterprise Storage 7:busybox-1.34.1-4.9.1.x86_64", "SUSE Enterprise Storage 7:busybox-static-1.34.1-4.9.1.aarch64", "SUSE Enterprise Storage 7:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:busybox-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:busybox-static-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:busybox-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:busybox-static-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:busybox-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:busybox-static-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:busybox-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:busybox-static-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:busybox-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:busybox-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-1.34.1-4.9.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-static-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-static-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-static-1.34.1-4.9.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-1.34.1-4.9.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-static-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-static-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-static-1.34.1-4.9.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-1.34.1-4.9.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-static-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-static-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-static-1.34.1-4.9.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:busybox-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:busybox-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:busybox-1.34.1-4.9.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:busybox-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:busybox-static-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:busybox-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:busybox-static-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:busybox-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:busybox-1.34.1-4.9.1.x86_64", "SUSE Manager Proxy 4.1:busybox-1.34.1-4.9.1.x86_64", "SUSE Manager Proxy 4.1:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Manager Retail Branch Server 4.1:busybox-1.34.1-4.9.1.x86_64", "SUSE Manager Retail Branch Server 4.1:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Manager Server 4.1:busybox-1.34.1-4.9.1.ppc64le", "SUSE Manager Server 4.1:busybox-1.34.1-4.9.1.s390x", "SUSE Manager Server 4.1:busybox-1.34.1-4.9.1.x86_64", "SUSE Manager Server 4.1:busybox-static-1.34.1-4.9.1.ppc64le", "SUSE Manager Server 4.1:busybox-static-1.34.1-4.9.1.s390x", "SUSE Manager Server 4.1:busybox-static-1.34.1-4.9.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2021-42380", url: "https://www.suse.com/security/cve/CVE-2021-42380", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Enterprise Storage 6:busybox-1.34.1-4.9.1.aarch64", "SUSE Enterprise Storage 6:busybox-1.34.1-4.9.1.x86_64", "SUSE Enterprise Storage 6:busybox-static-1.34.1-4.9.1.aarch64", "SUSE Enterprise Storage 6:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Enterprise Storage 7:busybox-1.34.1-4.9.1.aarch64", "SUSE Enterprise Storage 7:busybox-1.34.1-4.9.1.x86_64", "SUSE Enterprise Storage 7:busybox-static-1.34.1-4.9.1.aarch64", "SUSE Enterprise Storage 7:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:busybox-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:busybox-static-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:busybox-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:busybox-static-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:busybox-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:busybox-static-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:busybox-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:busybox-static-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:busybox-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:busybox-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-1.34.1-4.9.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-static-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-static-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-static-1.34.1-4.9.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-1.34.1-4.9.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-static-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-static-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-static-1.34.1-4.9.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-1.34.1-4.9.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-static-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-static-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-static-1.34.1-4.9.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:busybox-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:busybox-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:busybox-1.34.1-4.9.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:busybox-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:busybox-static-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:busybox-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:busybox-static-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:busybox-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:busybox-1.34.1-4.9.1.x86_64", "SUSE Manager Proxy 4.1:busybox-1.34.1-4.9.1.x86_64", "SUSE Manager Proxy 4.1:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Manager Retail Branch Server 4.1:busybox-1.34.1-4.9.1.x86_64", "SUSE Manager Retail Branch Server 4.1:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Manager Server 4.1:busybox-1.34.1-4.9.1.ppc64le", "SUSE Manager Server 4.1:busybox-1.34.1-4.9.1.s390x", "SUSE Manager Server 4.1:busybox-1.34.1-4.9.1.x86_64", "SUSE Manager Server 4.1:busybox-static-1.34.1-4.9.1.ppc64le", "SUSE Manager Server 4.1:busybox-static-1.34.1-4.9.1.s390x", "SUSE Manager Server 4.1:busybox-static-1.34.1-4.9.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 6.6, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, products: [ "SUSE Enterprise Storage 6:busybox-1.34.1-4.9.1.aarch64", "SUSE Enterprise Storage 6:busybox-1.34.1-4.9.1.x86_64", "SUSE Enterprise Storage 6:busybox-static-1.34.1-4.9.1.aarch64", "SUSE Enterprise Storage 6:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Enterprise Storage 7:busybox-1.34.1-4.9.1.aarch64", "SUSE Enterprise Storage 7:busybox-1.34.1-4.9.1.x86_64", "SUSE Enterprise Storage 7:busybox-static-1.34.1-4.9.1.aarch64", "SUSE Enterprise Storage 7:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:busybox-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:busybox-static-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:busybox-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:busybox-static-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:busybox-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:busybox-static-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:busybox-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:busybox-static-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:busybox-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:busybox-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-1.34.1-4.9.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-static-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-static-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-static-1.34.1-4.9.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-1.34.1-4.9.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-static-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-static-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-static-1.34.1-4.9.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-1.34.1-4.9.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-static-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-static-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-static-1.34.1-4.9.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:busybox-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:busybox-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:busybox-1.34.1-4.9.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:busybox-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:busybox-static-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:busybox-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:busybox-static-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:busybox-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:busybox-1.34.1-4.9.1.x86_64", "SUSE Manager Proxy 4.1:busybox-1.34.1-4.9.1.x86_64", "SUSE Manager Proxy 4.1:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Manager Retail Branch Server 4.1:busybox-1.34.1-4.9.1.x86_64", "SUSE Manager Retail Branch Server 4.1:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Manager Server 4.1:busybox-1.34.1-4.9.1.ppc64le", "SUSE Manager Server 4.1:busybox-1.34.1-4.9.1.s390x", "SUSE Manager Server 4.1:busybox-1.34.1-4.9.1.x86_64", "SUSE Manager Server 4.1:busybox-static-1.34.1-4.9.1.ppc64le", "SUSE Manager Server 4.1:busybox-static-1.34.1-4.9.1.s390x", "SUSE Manager Server 4.1:busybox-static-1.34.1-4.9.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2022-01-20T09:05:15Z", details: "moderate", }, ], title: "CVE-2021-42380", }, { cve: "CVE-2021-42381", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2021-42381", }, ], notes: [ { category: "general", text: "A use-after-free in Busybox's awk applet leads to denial of service and possibly code execution when processing a crafted awk pattern in the hash_init function", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Enterprise Storage 6:busybox-1.34.1-4.9.1.aarch64", "SUSE Enterprise Storage 6:busybox-1.34.1-4.9.1.x86_64", "SUSE Enterprise Storage 6:busybox-static-1.34.1-4.9.1.aarch64", "SUSE Enterprise Storage 6:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Enterprise Storage 7:busybox-1.34.1-4.9.1.aarch64", "SUSE Enterprise Storage 7:busybox-1.34.1-4.9.1.x86_64", "SUSE Enterprise Storage 7:busybox-static-1.34.1-4.9.1.aarch64", "SUSE Enterprise Storage 7:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:busybox-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:busybox-static-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:busybox-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:busybox-static-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:busybox-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:busybox-static-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:busybox-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:busybox-static-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:busybox-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:busybox-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-1.34.1-4.9.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-static-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-static-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-static-1.34.1-4.9.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-1.34.1-4.9.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-static-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-static-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-static-1.34.1-4.9.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-1.34.1-4.9.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-static-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-static-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-static-1.34.1-4.9.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:busybox-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:busybox-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:busybox-1.34.1-4.9.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:busybox-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:busybox-static-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:busybox-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:busybox-static-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:busybox-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:busybox-1.34.1-4.9.1.x86_64", "SUSE Manager Proxy 4.1:busybox-1.34.1-4.9.1.x86_64", "SUSE Manager Proxy 4.1:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Manager Retail Branch Server 4.1:busybox-1.34.1-4.9.1.x86_64", "SUSE Manager Retail Branch Server 4.1:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Manager Server 4.1:busybox-1.34.1-4.9.1.ppc64le", "SUSE Manager Server 4.1:busybox-1.34.1-4.9.1.s390x", "SUSE Manager Server 4.1:busybox-1.34.1-4.9.1.x86_64", "SUSE Manager Server 4.1:busybox-static-1.34.1-4.9.1.ppc64le", "SUSE Manager Server 4.1:busybox-static-1.34.1-4.9.1.s390x", "SUSE Manager Server 4.1:busybox-static-1.34.1-4.9.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2021-42381", url: "https://www.suse.com/security/cve/CVE-2021-42381", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Enterprise Storage 6:busybox-1.34.1-4.9.1.aarch64", "SUSE Enterprise Storage 6:busybox-1.34.1-4.9.1.x86_64", "SUSE Enterprise Storage 6:busybox-static-1.34.1-4.9.1.aarch64", "SUSE Enterprise Storage 6:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Enterprise Storage 7:busybox-1.34.1-4.9.1.aarch64", "SUSE Enterprise Storage 7:busybox-1.34.1-4.9.1.x86_64", "SUSE Enterprise Storage 7:busybox-static-1.34.1-4.9.1.aarch64", "SUSE Enterprise Storage 7:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:busybox-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:busybox-static-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:busybox-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:busybox-static-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:busybox-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:busybox-static-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:busybox-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:busybox-static-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:busybox-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:busybox-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-1.34.1-4.9.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-static-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-static-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-static-1.34.1-4.9.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-1.34.1-4.9.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-static-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-static-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-static-1.34.1-4.9.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-1.34.1-4.9.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-static-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-static-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-static-1.34.1-4.9.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:busybox-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:busybox-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:busybox-1.34.1-4.9.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:busybox-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:busybox-static-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:busybox-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:busybox-static-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:busybox-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:busybox-1.34.1-4.9.1.x86_64", "SUSE Manager Proxy 4.1:busybox-1.34.1-4.9.1.x86_64", "SUSE Manager Proxy 4.1:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Manager Retail Branch Server 4.1:busybox-1.34.1-4.9.1.x86_64", "SUSE Manager Retail Branch Server 4.1:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Manager Server 4.1:busybox-1.34.1-4.9.1.ppc64le", "SUSE Manager Server 4.1:busybox-1.34.1-4.9.1.s390x", "SUSE Manager Server 4.1:busybox-1.34.1-4.9.1.x86_64", "SUSE Manager Server 4.1:busybox-static-1.34.1-4.9.1.ppc64le", "SUSE Manager Server 4.1:busybox-static-1.34.1-4.9.1.s390x", "SUSE Manager Server 4.1:busybox-static-1.34.1-4.9.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 6.6, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, products: [ "SUSE Enterprise Storage 6:busybox-1.34.1-4.9.1.aarch64", "SUSE Enterprise Storage 6:busybox-1.34.1-4.9.1.x86_64", "SUSE Enterprise Storage 6:busybox-static-1.34.1-4.9.1.aarch64", "SUSE Enterprise Storage 6:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Enterprise Storage 7:busybox-1.34.1-4.9.1.aarch64", "SUSE Enterprise Storage 7:busybox-1.34.1-4.9.1.x86_64", "SUSE Enterprise Storage 7:busybox-static-1.34.1-4.9.1.aarch64", "SUSE Enterprise Storage 7:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:busybox-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:busybox-static-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:busybox-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:busybox-static-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:busybox-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:busybox-static-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:busybox-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:busybox-static-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:busybox-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:busybox-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-1.34.1-4.9.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-static-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-static-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-static-1.34.1-4.9.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-1.34.1-4.9.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-static-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-static-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-static-1.34.1-4.9.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-1.34.1-4.9.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-static-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-static-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-static-1.34.1-4.9.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:busybox-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:busybox-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:busybox-1.34.1-4.9.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:busybox-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:busybox-static-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:busybox-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:busybox-static-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:busybox-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:busybox-1.34.1-4.9.1.x86_64", "SUSE Manager Proxy 4.1:busybox-1.34.1-4.9.1.x86_64", "SUSE Manager Proxy 4.1:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Manager Retail Branch Server 4.1:busybox-1.34.1-4.9.1.x86_64", "SUSE Manager Retail Branch Server 4.1:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Manager Server 4.1:busybox-1.34.1-4.9.1.ppc64le", "SUSE Manager Server 4.1:busybox-1.34.1-4.9.1.s390x", "SUSE Manager Server 4.1:busybox-1.34.1-4.9.1.x86_64", "SUSE Manager Server 4.1:busybox-static-1.34.1-4.9.1.ppc64le", "SUSE Manager Server 4.1:busybox-static-1.34.1-4.9.1.s390x", "SUSE Manager Server 4.1:busybox-static-1.34.1-4.9.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2022-01-20T09:05:15Z", details: "moderate", }, ], title: "CVE-2021-42381", }, { cve: "CVE-2021-42382", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2021-42382", }, ], notes: [ { category: "general", text: "A use-after-free in Busybox's awk applet leads to denial of service and possibly code execution when processing a crafted awk pattern in the getvar_s function", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Enterprise Storage 6:busybox-1.34.1-4.9.1.aarch64", "SUSE Enterprise Storage 6:busybox-1.34.1-4.9.1.x86_64", "SUSE Enterprise Storage 6:busybox-static-1.34.1-4.9.1.aarch64", "SUSE Enterprise Storage 6:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Enterprise Storage 7:busybox-1.34.1-4.9.1.aarch64", "SUSE Enterprise Storage 7:busybox-1.34.1-4.9.1.x86_64", "SUSE Enterprise Storage 7:busybox-static-1.34.1-4.9.1.aarch64", "SUSE Enterprise Storage 7:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:busybox-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:busybox-static-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:busybox-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:busybox-static-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:busybox-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:busybox-static-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:busybox-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:busybox-static-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:busybox-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:busybox-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-1.34.1-4.9.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-static-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-static-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-static-1.34.1-4.9.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-1.34.1-4.9.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-static-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-static-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-static-1.34.1-4.9.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-1.34.1-4.9.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-static-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-static-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-static-1.34.1-4.9.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:busybox-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:busybox-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:busybox-1.34.1-4.9.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:busybox-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:busybox-static-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:busybox-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:busybox-static-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:busybox-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:busybox-1.34.1-4.9.1.x86_64", "SUSE Manager Proxy 4.1:busybox-1.34.1-4.9.1.x86_64", "SUSE Manager Proxy 4.1:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Manager Retail Branch Server 4.1:busybox-1.34.1-4.9.1.x86_64", "SUSE Manager Retail Branch Server 4.1:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Manager Server 4.1:busybox-1.34.1-4.9.1.ppc64le", "SUSE Manager Server 4.1:busybox-1.34.1-4.9.1.s390x", "SUSE Manager Server 4.1:busybox-1.34.1-4.9.1.x86_64", "SUSE Manager Server 4.1:busybox-static-1.34.1-4.9.1.ppc64le", "SUSE Manager Server 4.1:busybox-static-1.34.1-4.9.1.s390x", "SUSE Manager Server 4.1:busybox-static-1.34.1-4.9.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2021-42382", url: "https://www.suse.com/security/cve/CVE-2021-42382", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Enterprise Storage 6:busybox-1.34.1-4.9.1.aarch64", "SUSE Enterprise Storage 6:busybox-1.34.1-4.9.1.x86_64", "SUSE Enterprise Storage 6:busybox-static-1.34.1-4.9.1.aarch64", "SUSE Enterprise Storage 6:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Enterprise Storage 7:busybox-1.34.1-4.9.1.aarch64", "SUSE Enterprise Storage 7:busybox-1.34.1-4.9.1.x86_64", "SUSE Enterprise Storage 7:busybox-static-1.34.1-4.9.1.aarch64", "SUSE Enterprise Storage 7:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:busybox-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:busybox-static-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:busybox-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:busybox-static-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:busybox-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:busybox-static-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:busybox-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:busybox-static-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:busybox-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:busybox-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-1.34.1-4.9.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-static-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-static-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-static-1.34.1-4.9.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-1.34.1-4.9.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-static-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-static-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-static-1.34.1-4.9.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-1.34.1-4.9.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-static-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-static-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-static-1.34.1-4.9.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:busybox-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:busybox-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:busybox-1.34.1-4.9.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:busybox-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:busybox-static-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:busybox-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:busybox-static-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:busybox-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:busybox-1.34.1-4.9.1.x86_64", "SUSE Manager Proxy 4.1:busybox-1.34.1-4.9.1.x86_64", "SUSE Manager Proxy 4.1:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Manager Retail Branch Server 4.1:busybox-1.34.1-4.9.1.x86_64", "SUSE Manager Retail Branch Server 4.1:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Manager Server 4.1:busybox-1.34.1-4.9.1.ppc64le", "SUSE Manager Server 4.1:busybox-1.34.1-4.9.1.s390x", "SUSE Manager Server 4.1:busybox-1.34.1-4.9.1.x86_64", "SUSE Manager Server 4.1:busybox-static-1.34.1-4.9.1.ppc64le", "SUSE Manager Server 4.1:busybox-static-1.34.1-4.9.1.s390x", "SUSE Manager Server 4.1:busybox-static-1.34.1-4.9.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 6.6, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, products: [ "SUSE Enterprise Storage 6:busybox-1.34.1-4.9.1.aarch64", "SUSE Enterprise Storage 6:busybox-1.34.1-4.9.1.x86_64", "SUSE Enterprise Storage 6:busybox-static-1.34.1-4.9.1.aarch64", "SUSE Enterprise Storage 6:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Enterprise Storage 7:busybox-1.34.1-4.9.1.aarch64", "SUSE Enterprise Storage 7:busybox-1.34.1-4.9.1.x86_64", "SUSE Enterprise Storage 7:busybox-static-1.34.1-4.9.1.aarch64", "SUSE Enterprise Storage 7:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:busybox-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:busybox-static-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:busybox-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:busybox-static-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:busybox-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:busybox-static-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:busybox-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:busybox-static-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:busybox-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:busybox-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-1.34.1-4.9.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-static-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-static-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-static-1.34.1-4.9.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-1.34.1-4.9.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-static-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-static-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-static-1.34.1-4.9.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-1.34.1-4.9.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-static-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-static-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-static-1.34.1-4.9.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:busybox-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:busybox-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:busybox-1.34.1-4.9.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:busybox-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:busybox-static-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:busybox-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:busybox-static-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:busybox-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:busybox-1.34.1-4.9.1.x86_64", "SUSE Manager Proxy 4.1:busybox-1.34.1-4.9.1.x86_64", "SUSE Manager Proxy 4.1:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Manager Retail Branch Server 4.1:busybox-1.34.1-4.9.1.x86_64", "SUSE Manager Retail Branch Server 4.1:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Manager Server 4.1:busybox-1.34.1-4.9.1.ppc64le", "SUSE Manager Server 4.1:busybox-1.34.1-4.9.1.s390x", "SUSE Manager Server 4.1:busybox-1.34.1-4.9.1.x86_64", "SUSE Manager Server 4.1:busybox-static-1.34.1-4.9.1.ppc64le", "SUSE Manager Server 4.1:busybox-static-1.34.1-4.9.1.s390x", "SUSE Manager Server 4.1:busybox-static-1.34.1-4.9.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2022-01-20T09:05:15Z", details: "moderate", }, ], title: "CVE-2021-42382", }, { cve: "CVE-2021-42383", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2021-42383", }, ], notes: [ { category: "general", text: "A use-after-free in Busybox's awk applet leads to denial of service and possibly code execution when processing a crafted awk pattern in the evaluate function", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Enterprise Storage 6:busybox-1.34.1-4.9.1.aarch64", "SUSE Enterprise Storage 6:busybox-1.34.1-4.9.1.x86_64", "SUSE Enterprise Storage 6:busybox-static-1.34.1-4.9.1.aarch64", "SUSE Enterprise Storage 6:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Enterprise Storage 7:busybox-1.34.1-4.9.1.aarch64", "SUSE Enterprise Storage 7:busybox-1.34.1-4.9.1.x86_64", "SUSE Enterprise Storage 7:busybox-static-1.34.1-4.9.1.aarch64", "SUSE Enterprise Storage 7:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:busybox-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:busybox-static-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:busybox-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:busybox-static-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:busybox-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:busybox-static-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:busybox-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:busybox-static-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:busybox-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:busybox-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-1.34.1-4.9.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-static-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-static-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-static-1.34.1-4.9.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-1.34.1-4.9.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-static-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-static-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-static-1.34.1-4.9.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-1.34.1-4.9.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-static-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-static-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-static-1.34.1-4.9.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:busybox-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:busybox-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:busybox-1.34.1-4.9.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:busybox-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:busybox-static-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:busybox-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:busybox-static-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:busybox-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:busybox-1.34.1-4.9.1.x86_64", "SUSE Manager Proxy 4.1:busybox-1.34.1-4.9.1.x86_64", "SUSE Manager Proxy 4.1:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Manager Retail Branch Server 4.1:busybox-1.34.1-4.9.1.x86_64", "SUSE Manager Retail Branch Server 4.1:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Manager Server 4.1:busybox-1.34.1-4.9.1.ppc64le", "SUSE Manager Server 4.1:busybox-1.34.1-4.9.1.s390x", "SUSE Manager Server 4.1:busybox-1.34.1-4.9.1.x86_64", "SUSE Manager Server 4.1:busybox-static-1.34.1-4.9.1.ppc64le", "SUSE Manager Server 4.1:busybox-static-1.34.1-4.9.1.s390x", "SUSE Manager Server 4.1:busybox-static-1.34.1-4.9.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2021-42383", url: "https://www.suse.com/security/cve/CVE-2021-42383", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Enterprise Storage 6:busybox-1.34.1-4.9.1.aarch64", "SUSE Enterprise Storage 6:busybox-1.34.1-4.9.1.x86_64", "SUSE Enterprise Storage 6:busybox-static-1.34.1-4.9.1.aarch64", "SUSE Enterprise Storage 6:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Enterprise Storage 7:busybox-1.34.1-4.9.1.aarch64", "SUSE Enterprise Storage 7:busybox-1.34.1-4.9.1.x86_64", "SUSE Enterprise Storage 7:busybox-static-1.34.1-4.9.1.aarch64", "SUSE Enterprise Storage 7:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:busybox-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:busybox-static-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:busybox-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:busybox-static-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:busybox-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:busybox-static-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:busybox-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:busybox-static-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:busybox-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:busybox-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-1.34.1-4.9.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-static-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-static-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-static-1.34.1-4.9.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-1.34.1-4.9.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-static-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-static-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-static-1.34.1-4.9.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-1.34.1-4.9.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-static-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-static-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-static-1.34.1-4.9.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:busybox-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:busybox-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:busybox-1.34.1-4.9.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:busybox-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:busybox-static-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:busybox-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:busybox-static-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:busybox-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:busybox-1.34.1-4.9.1.x86_64", "SUSE Manager Proxy 4.1:busybox-1.34.1-4.9.1.x86_64", "SUSE Manager Proxy 4.1:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Manager Retail Branch Server 4.1:busybox-1.34.1-4.9.1.x86_64", "SUSE Manager Retail Branch Server 4.1:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Manager Server 4.1:busybox-1.34.1-4.9.1.ppc64le", "SUSE Manager Server 4.1:busybox-1.34.1-4.9.1.s390x", "SUSE Manager Server 4.1:busybox-1.34.1-4.9.1.x86_64", "SUSE Manager Server 4.1:busybox-static-1.34.1-4.9.1.ppc64le", "SUSE Manager Server 4.1:busybox-static-1.34.1-4.9.1.s390x", "SUSE Manager Server 4.1:busybox-static-1.34.1-4.9.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 6.6, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, products: [ "SUSE Enterprise Storage 6:busybox-1.34.1-4.9.1.aarch64", "SUSE Enterprise Storage 6:busybox-1.34.1-4.9.1.x86_64", "SUSE Enterprise Storage 6:busybox-static-1.34.1-4.9.1.aarch64", "SUSE Enterprise Storage 6:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Enterprise Storage 7:busybox-1.34.1-4.9.1.aarch64", "SUSE Enterprise Storage 7:busybox-1.34.1-4.9.1.x86_64", "SUSE Enterprise Storage 7:busybox-static-1.34.1-4.9.1.aarch64", "SUSE Enterprise Storage 7:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:busybox-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:busybox-static-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:busybox-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:busybox-static-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:busybox-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:busybox-static-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:busybox-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:busybox-static-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:busybox-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:busybox-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-1.34.1-4.9.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-static-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-static-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-static-1.34.1-4.9.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-1.34.1-4.9.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-static-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-static-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-static-1.34.1-4.9.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-1.34.1-4.9.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-static-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-static-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-static-1.34.1-4.9.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:busybox-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:busybox-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:busybox-1.34.1-4.9.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:busybox-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:busybox-static-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:busybox-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:busybox-static-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:busybox-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:busybox-1.34.1-4.9.1.x86_64", "SUSE Manager Proxy 4.1:busybox-1.34.1-4.9.1.x86_64", "SUSE Manager Proxy 4.1:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Manager Retail Branch Server 4.1:busybox-1.34.1-4.9.1.x86_64", "SUSE Manager Retail Branch Server 4.1:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Manager Server 4.1:busybox-1.34.1-4.9.1.ppc64le", "SUSE Manager Server 4.1:busybox-1.34.1-4.9.1.s390x", "SUSE Manager Server 4.1:busybox-1.34.1-4.9.1.x86_64", "SUSE Manager Server 4.1:busybox-static-1.34.1-4.9.1.ppc64le", "SUSE Manager Server 4.1:busybox-static-1.34.1-4.9.1.s390x", "SUSE Manager Server 4.1:busybox-static-1.34.1-4.9.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2022-01-20T09:05:15Z", details: "moderate", }, ], title: "CVE-2021-42383", }, { cve: "CVE-2021-42384", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2021-42384", }, ], notes: [ { category: "general", text: "A use-after-free in Busybox's awk applet leads to denial of service and possibly code execution when processing a crafted awk pattern in the handle_special function", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Enterprise Storage 6:busybox-1.34.1-4.9.1.aarch64", "SUSE Enterprise Storage 6:busybox-1.34.1-4.9.1.x86_64", "SUSE Enterprise Storage 6:busybox-static-1.34.1-4.9.1.aarch64", "SUSE Enterprise Storage 6:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Enterprise Storage 7:busybox-1.34.1-4.9.1.aarch64", "SUSE Enterprise Storage 7:busybox-1.34.1-4.9.1.x86_64", "SUSE Enterprise Storage 7:busybox-static-1.34.1-4.9.1.aarch64", "SUSE Enterprise Storage 7:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:busybox-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:busybox-static-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:busybox-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:busybox-static-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:busybox-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:busybox-static-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:busybox-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:busybox-static-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:busybox-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:busybox-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-1.34.1-4.9.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-static-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-static-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-static-1.34.1-4.9.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-1.34.1-4.9.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-static-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-static-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-static-1.34.1-4.9.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-1.34.1-4.9.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-static-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-static-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-static-1.34.1-4.9.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:busybox-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:busybox-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:busybox-1.34.1-4.9.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:busybox-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:busybox-static-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:busybox-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:busybox-static-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:busybox-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:busybox-1.34.1-4.9.1.x86_64", "SUSE Manager Proxy 4.1:busybox-1.34.1-4.9.1.x86_64", "SUSE Manager Proxy 4.1:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Manager Retail Branch Server 4.1:busybox-1.34.1-4.9.1.x86_64", "SUSE Manager Retail Branch Server 4.1:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Manager Server 4.1:busybox-1.34.1-4.9.1.ppc64le", "SUSE Manager Server 4.1:busybox-1.34.1-4.9.1.s390x", "SUSE Manager Server 4.1:busybox-1.34.1-4.9.1.x86_64", "SUSE Manager Server 4.1:busybox-static-1.34.1-4.9.1.ppc64le", "SUSE Manager Server 4.1:busybox-static-1.34.1-4.9.1.s390x", "SUSE Manager Server 4.1:busybox-static-1.34.1-4.9.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2021-42384", url: "https://www.suse.com/security/cve/CVE-2021-42384", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Enterprise Storage 6:busybox-1.34.1-4.9.1.aarch64", "SUSE Enterprise Storage 6:busybox-1.34.1-4.9.1.x86_64", "SUSE Enterprise Storage 6:busybox-static-1.34.1-4.9.1.aarch64", "SUSE Enterprise Storage 6:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Enterprise Storage 7:busybox-1.34.1-4.9.1.aarch64", "SUSE Enterprise Storage 7:busybox-1.34.1-4.9.1.x86_64", "SUSE Enterprise Storage 7:busybox-static-1.34.1-4.9.1.aarch64", "SUSE Enterprise Storage 7:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:busybox-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:busybox-static-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:busybox-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:busybox-static-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:busybox-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:busybox-static-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:busybox-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:busybox-static-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:busybox-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:busybox-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-1.34.1-4.9.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-static-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-static-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-static-1.34.1-4.9.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-1.34.1-4.9.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-static-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-static-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-static-1.34.1-4.9.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-1.34.1-4.9.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-static-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-static-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-static-1.34.1-4.9.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:busybox-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:busybox-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:busybox-1.34.1-4.9.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:busybox-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:busybox-static-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:busybox-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:busybox-static-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:busybox-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:busybox-1.34.1-4.9.1.x86_64", "SUSE Manager Proxy 4.1:busybox-1.34.1-4.9.1.x86_64", "SUSE Manager Proxy 4.1:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Manager Retail Branch Server 4.1:busybox-1.34.1-4.9.1.x86_64", "SUSE Manager Retail Branch Server 4.1:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Manager Server 4.1:busybox-1.34.1-4.9.1.ppc64le", "SUSE Manager Server 4.1:busybox-1.34.1-4.9.1.s390x", "SUSE Manager Server 4.1:busybox-1.34.1-4.9.1.x86_64", "SUSE Manager Server 4.1:busybox-static-1.34.1-4.9.1.ppc64le", "SUSE Manager Server 4.1:busybox-static-1.34.1-4.9.1.s390x", "SUSE Manager Server 4.1:busybox-static-1.34.1-4.9.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 6.6, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, products: [ "SUSE Enterprise Storage 6:busybox-1.34.1-4.9.1.aarch64", "SUSE Enterprise Storage 6:busybox-1.34.1-4.9.1.x86_64", "SUSE Enterprise Storage 6:busybox-static-1.34.1-4.9.1.aarch64", "SUSE Enterprise Storage 6:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Enterprise Storage 7:busybox-1.34.1-4.9.1.aarch64", "SUSE Enterprise Storage 7:busybox-1.34.1-4.9.1.x86_64", "SUSE Enterprise Storage 7:busybox-static-1.34.1-4.9.1.aarch64", "SUSE Enterprise Storage 7:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:busybox-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:busybox-static-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:busybox-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:busybox-static-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:busybox-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:busybox-static-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:busybox-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:busybox-static-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:busybox-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:busybox-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-1.34.1-4.9.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-static-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-static-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-static-1.34.1-4.9.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-1.34.1-4.9.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-static-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-static-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-static-1.34.1-4.9.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-1.34.1-4.9.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-static-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-static-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-static-1.34.1-4.9.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:busybox-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:busybox-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:busybox-1.34.1-4.9.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:busybox-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:busybox-static-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:busybox-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:busybox-static-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:busybox-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:busybox-1.34.1-4.9.1.x86_64", "SUSE Manager Proxy 4.1:busybox-1.34.1-4.9.1.x86_64", "SUSE Manager Proxy 4.1:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Manager Retail Branch Server 4.1:busybox-1.34.1-4.9.1.x86_64", "SUSE Manager Retail Branch Server 4.1:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Manager Server 4.1:busybox-1.34.1-4.9.1.ppc64le", "SUSE Manager Server 4.1:busybox-1.34.1-4.9.1.s390x", "SUSE Manager Server 4.1:busybox-1.34.1-4.9.1.x86_64", "SUSE Manager Server 4.1:busybox-static-1.34.1-4.9.1.ppc64le", "SUSE Manager Server 4.1:busybox-static-1.34.1-4.9.1.s390x", "SUSE Manager Server 4.1:busybox-static-1.34.1-4.9.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2022-01-20T09:05:15Z", details: "moderate", }, ], title: "CVE-2021-42384", }, { cve: "CVE-2021-42385", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2021-42385", }, ], notes: [ { category: "general", text: "A use-after-free in Busybox's awk applet leads to denial of service and possibly code execution when processing a crafted awk pattern in the evaluate function", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Enterprise Storage 6:busybox-1.34.1-4.9.1.aarch64", "SUSE Enterprise Storage 6:busybox-1.34.1-4.9.1.x86_64", "SUSE Enterprise Storage 6:busybox-static-1.34.1-4.9.1.aarch64", "SUSE Enterprise Storage 6:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Enterprise Storage 7:busybox-1.34.1-4.9.1.aarch64", "SUSE Enterprise Storage 7:busybox-1.34.1-4.9.1.x86_64", "SUSE Enterprise Storage 7:busybox-static-1.34.1-4.9.1.aarch64", "SUSE Enterprise Storage 7:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:busybox-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:busybox-static-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:busybox-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:busybox-static-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:busybox-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:busybox-static-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:busybox-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:busybox-static-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:busybox-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:busybox-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-1.34.1-4.9.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-static-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-static-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-static-1.34.1-4.9.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-1.34.1-4.9.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-static-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-static-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-static-1.34.1-4.9.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-1.34.1-4.9.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-static-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-static-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-static-1.34.1-4.9.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:busybox-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:busybox-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:busybox-1.34.1-4.9.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:busybox-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:busybox-static-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:busybox-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:busybox-static-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:busybox-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:busybox-1.34.1-4.9.1.x86_64", "SUSE Manager Proxy 4.1:busybox-1.34.1-4.9.1.x86_64", "SUSE Manager Proxy 4.1:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Manager Retail Branch Server 4.1:busybox-1.34.1-4.9.1.x86_64", "SUSE Manager Retail Branch Server 4.1:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Manager Server 4.1:busybox-1.34.1-4.9.1.ppc64le", "SUSE Manager Server 4.1:busybox-1.34.1-4.9.1.s390x", "SUSE Manager Server 4.1:busybox-1.34.1-4.9.1.x86_64", "SUSE Manager Server 4.1:busybox-static-1.34.1-4.9.1.ppc64le", "SUSE Manager Server 4.1:busybox-static-1.34.1-4.9.1.s390x", "SUSE Manager Server 4.1:busybox-static-1.34.1-4.9.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2021-42385", url: "https://www.suse.com/security/cve/CVE-2021-42385", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Enterprise Storage 6:busybox-1.34.1-4.9.1.aarch64", "SUSE Enterprise Storage 6:busybox-1.34.1-4.9.1.x86_64", "SUSE Enterprise Storage 6:busybox-static-1.34.1-4.9.1.aarch64", "SUSE Enterprise Storage 6:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Enterprise Storage 7:busybox-1.34.1-4.9.1.aarch64", "SUSE Enterprise Storage 7:busybox-1.34.1-4.9.1.x86_64", "SUSE Enterprise Storage 7:busybox-static-1.34.1-4.9.1.aarch64", "SUSE Enterprise Storage 7:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:busybox-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:busybox-static-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:busybox-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:busybox-static-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:busybox-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:busybox-static-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:busybox-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:busybox-static-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:busybox-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:busybox-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-1.34.1-4.9.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-static-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-static-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-static-1.34.1-4.9.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-1.34.1-4.9.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-static-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-static-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-static-1.34.1-4.9.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-1.34.1-4.9.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-static-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-static-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-static-1.34.1-4.9.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:busybox-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:busybox-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:busybox-1.34.1-4.9.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:busybox-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:busybox-static-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:busybox-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:busybox-static-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:busybox-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:busybox-1.34.1-4.9.1.x86_64", "SUSE Manager Proxy 4.1:busybox-1.34.1-4.9.1.x86_64", "SUSE Manager Proxy 4.1:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Manager Retail Branch Server 4.1:busybox-1.34.1-4.9.1.x86_64", "SUSE Manager Retail Branch Server 4.1:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Manager Server 4.1:busybox-1.34.1-4.9.1.ppc64le", "SUSE Manager Server 4.1:busybox-1.34.1-4.9.1.s390x", "SUSE Manager Server 4.1:busybox-1.34.1-4.9.1.x86_64", "SUSE Manager Server 4.1:busybox-static-1.34.1-4.9.1.ppc64le", "SUSE Manager Server 4.1:busybox-static-1.34.1-4.9.1.s390x", "SUSE Manager Server 4.1:busybox-static-1.34.1-4.9.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 6.6, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, products: [ "SUSE Enterprise Storage 6:busybox-1.34.1-4.9.1.aarch64", "SUSE Enterprise Storage 6:busybox-1.34.1-4.9.1.x86_64", "SUSE Enterprise Storage 6:busybox-static-1.34.1-4.9.1.aarch64", "SUSE Enterprise Storage 6:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Enterprise Storage 7:busybox-1.34.1-4.9.1.aarch64", "SUSE Enterprise Storage 7:busybox-1.34.1-4.9.1.x86_64", "SUSE Enterprise Storage 7:busybox-static-1.34.1-4.9.1.aarch64", "SUSE Enterprise Storage 7:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:busybox-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:busybox-static-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:busybox-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:busybox-static-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:busybox-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:busybox-static-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:busybox-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:busybox-static-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:busybox-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:busybox-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-1.34.1-4.9.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-static-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-static-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-static-1.34.1-4.9.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-1.34.1-4.9.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-static-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-static-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-static-1.34.1-4.9.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-1.34.1-4.9.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-static-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-static-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-static-1.34.1-4.9.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:busybox-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:busybox-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:busybox-1.34.1-4.9.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:busybox-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:busybox-static-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:busybox-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:busybox-static-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:busybox-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:busybox-1.34.1-4.9.1.x86_64", "SUSE Manager Proxy 4.1:busybox-1.34.1-4.9.1.x86_64", "SUSE Manager Proxy 4.1:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Manager Retail Branch Server 4.1:busybox-1.34.1-4.9.1.x86_64", "SUSE Manager Retail Branch Server 4.1:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Manager Server 4.1:busybox-1.34.1-4.9.1.ppc64le", "SUSE Manager Server 4.1:busybox-1.34.1-4.9.1.s390x", "SUSE Manager Server 4.1:busybox-1.34.1-4.9.1.x86_64", "SUSE Manager Server 4.1:busybox-static-1.34.1-4.9.1.ppc64le", "SUSE Manager Server 4.1:busybox-static-1.34.1-4.9.1.s390x", "SUSE Manager Server 4.1:busybox-static-1.34.1-4.9.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2022-01-20T09:05:15Z", details: "moderate", }, ], title: "CVE-2021-42385", }, { cve: "CVE-2021-42386", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2021-42386", }, ], notes: [ { category: "general", text: "A use-after-free in Busybox's awk applet leads to denial of service and possibly code execution when processing a crafted awk pattern in the nvalloc function", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Enterprise Storage 6:busybox-1.34.1-4.9.1.aarch64", "SUSE Enterprise Storage 6:busybox-1.34.1-4.9.1.x86_64", "SUSE Enterprise Storage 6:busybox-static-1.34.1-4.9.1.aarch64", "SUSE Enterprise Storage 6:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Enterprise Storage 7:busybox-1.34.1-4.9.1.aarch64", "SUSE Enterprise Storage 7:busybox-1.34.1-4.9.1.x86_64", "SUSE Enterprise Storage 7:busybox-static-1.34.1-4.9.1.aarch64", "SUSE Enterprise Storage 7:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:busybox-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:busybox-static-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:busybox-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:busybox-static-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:busybox-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:busybox-static-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:busybox-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:busybox-static-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:busybox-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:busybox-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-1.34.1-4.9.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-static-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-static-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-static-1.34.1-4.9.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-1.34.1-4.9.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-static-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-static-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-static-1.34.1-4.9.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-1.34.1-4.9.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-static-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-static-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-static-1.34.1-4.9.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:busybox-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:busybox-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:busybox-1.34.1-4.9.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:busybox-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:busybox-static-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:busybox-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:busybox-static-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:busybox-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:busybox-1.34.1-4.9.1.x86_64", "SUSE Manager Proxy 4.1:busybox-1.34.1-4.9.1.x86_64", "SUSE Manager Proxy 4.1:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Manager Retail Branch Server 4.1:busybox-1.34.1-4.9.1.x86_64", "SUSE Manager Retail Branch Server 4.1:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Manager Server 4.1:busybox-1.34.1-4.9.1.ppc64le", "SUSE Manager Server 4.1:busybox-1.34.1-4.9.1.s390x", "SUSE Manager Server 4.1:busybox-1.34.1-4.9.1.x86_64", "SUSE Manager Server 4.1:busybox-static-1.34.1-4.9.1.ppc64le", "SUSE Manager Server 4.1:busybox-static-1.34.1-4.9.1.s390x", "SUSE Manager Server 4.1:busybox-static-1.34.1-4.9.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2021-42386", url: "https://www.suse.com/security/cve/CVE-2021-42386", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Enterprise Storage 6:busybox-1.34.1-4.9.1.aarch64", "SUSE Enterprise Storage 6:busybox-1.34.1-4.9.1.x86_64", "SUSE Enterprise Storage 6:busybox-static-1.34.1-4.9.1.aarch64", "SUSE Enterprise Storage 6:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Enterprise Storage 7:busybox-1.34.1-4.9.1.aarch64", "SUSE Enterprise Storage 7:busybox-1.34.1-4.9.1.x86_64", "SUSE Enterprise Storage 7:busybox-static-1.34.1-4.9.1.aarch64", "SUSE Enterprise Storage 7:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:busybox-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:busybox-static-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:busybox-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:busybox-static-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:busybox-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:busybox-static-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:busybox-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:busybox-static-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:busybox-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:busybox-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-1.34.1-4.9.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-static-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-static-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-static-1.34.1-4.9.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-1.34.1-4.9.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-static-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-static-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-static-1.34.1-4.9.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-1.34.1-4.9.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-static-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-static-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-static-1.34.1-4.9.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:busybox-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:busybox-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:busybox-1.34.1-4.9.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:busybox-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:busybox-static-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:busybox-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:busybox-static-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:busybox-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:busybox-1.34.1-4.9.1.x86_64", "SUSE Manager Proxy 4.1:busybox-1.34.1-4.9.1.x86_64", "SUSE Manager Proxy 4.1:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Manager Retail Branch Server 4.1:busybox-1.34.1-4.9.1.x86_64", "SUSE Manager Retail Branch Server 4.1:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Manager Server 4.1:busybox-1.34.1-4.9.1.ppc64le", "SUSE Manager Server 4.1:busybox-1.34.1-4.9.1.s390x", "SUSE Manager Server 4.1:busybox-1.34.1-4.9.1.x86_64", "SUSE Manager Server 4.1:busybox-static-1.34.1-4.9.1.ppc64le", "SUSE Manager Server 4.1:busybox-static-1.34.1-4.9.1.s390x", "SUSE Manager Server 4.1:busybox-static-1.34.1-4.9.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 6.6, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, products: [ "SUSE Enterprise Storage 6:busybox-1.34.1-4.9.1.aarch64", "SUSE Enterprise Storage 6:busybox-1.34.1-4.9.1.x86_64", "SUSE Enterprise Storage 6:busybox-static-1.34.1-4.9.1.aarch64", "SUSE Enterprise Storage 6:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Enterprise Storage 7:busybox-1.34.1-4.9.1.aarch64", "SUSE Enterprise Storage 7:busybox-1.34.1-4.9.1.x86_64", "SUSE Enterprise Storage 7:busybox-static-1.34.1-4.9.1.aarch64", "SUSE Enterprise Storage 7:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:busybox-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:busybox-static-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:busybox-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:busybox-static-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:busybox-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:busybox-static-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:busybox-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:busybox-static-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:busybox-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:busybox-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-1.34.1-4.9.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-static-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-static-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-static-1.34.1-4.9.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-1.34.1-4.9.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-static-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-static-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-static-1.34.1-4.9.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-1.34.1-4.9.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-static-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-static-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-static-1.34.1-4.9.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:busybox-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:busybox-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:busybox-1.34.1-4.9.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:busybox-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:busybox-static-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:busybox-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:busybox-static-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:busybox-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:busybox-1.34.1-4.9.1.x86_64", "SUSE Manager Proxy 4.1:busybox-1.34.1-4.9.1.x86_64", "SUSE Manager Proxy 4.1:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Manager Retail Branch Server 4.1:busybox-1.34.1-4.9.1.x86_64", "SUSE Manager Retail Branch Server 4.1:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Manager Server 4.1:busybox-1.34.1-4.9.1.ppc64le", "SUSE Manager Server 4.1:busybox-1.34.1-4.9.1.s390x", "SUSE Manager Server 4.1:busybox-1.34.1-4.9.1.x86_64", "SUSE Manager Server 4.1:busybox-static-1.34.1-4.9.1.ppc64le", "SUSE Manager Server 4.1:busybox-static-1.34.1-4.9.1.s390x", "SUSE Manager Server 4.1:busybox-static-1.34.1-4.9.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2022-01-20T09:05:15Z", details: "moderate", }, ], title: "CVE-2021-42386", }, ], }
icsa-23-166-10
Vulnerability from csaf_cisa
Published
2023-06-13 00:00
Modified
2023-06-13 00:00
Summary
Siemens SIMATIC S7-1500 TM MFP BIOS
Notes
CISA Disclaimer
This CSAF advisory was extracted from unstructured data and may contain inaccuracies. If you notice any errors, please reach out to the designated contact at CISA CSAF: central@cisa.dhs.gov
Summary
Multiple vulnerabilities have been identified in the BIOS of the SIMATIC S7-1500 TM MFP V1.0.
Siemens is preparing updates and recommends countermeasures for products where updates are not, or not yet available.
General Recommendations
As a general security measure, Siemens strongly recommends to protect network access to devices with appropriate mechanisms. In order to operate the devices in a protected IT environment, Siemens recommends to configure the environment according to Siemens' operational guidelines for Industrial Security (Download:
https://www.siemens.com/cert/operational-guidelines-industrial-security), and to follow the recommendations in the product manuals.
Additional information on Industrial Security by Siemens can be found at: https://www.siemens.com/industrialsecurity
Additional Resources
For further inquiries on security vulnerabilities in Siemens products and solutions, please contact the Siemens ProductCERT: https://www.siemens.com/cert/advisories
Terms of Use
Siemens Security Advisories are subject to the terms and conditions contained in Siemens' underlying license terms or other applicable agreements previously agreed to with Siemens (hereinafter "License Terms"). To the extent applicable to information, software or documentation made available in or through a Siemens Security Advisory, the Terms of Use of Siemens' Global Website (https://www.siemens.com/terms_of_use, hereinafter "Terms of Use"), in particular Sections 8-10 of the Terms of Use, shall apply additionally. In case of conflicts, the License Terms shall prevail over the Terms of Use.
Legal Notice
All information products included in https://us-cert.cisa.gov/ics are provided "as is" for informational purposes only. The Department of Homeland Security (DHS) does not provide any warranties of any kind regarding any information contained within. DHS does not endorse any commercial product or service, referenced in this product or otherwise. Further dissemination of this product is governed by the Traffic Light Protocol (TLP) marking in the header. For more information about TLP, see https://us-cert.cisa.gov/tlp/.
Advisory Conversion Disclaimer
This CISA CSAF advisory was converted from Siemens ProductCERT's CSAF advisory.
Critical infrastructure sectors
Multiple
Countries/areas deployed
Worldwide
Company headquarters location
Germany
Recommended Practices
CISA recommends users take defensive measures to minimize the exploitation risk of this vulnerability.
Recommended Practices
Minimizing network exposure for all control system devices and/or systems, ensuring they are not accessible from the internet.
Recommended Practices
Locating control system networks and remote devices behind firewalls and isolating them from business networks.
Recommended Practices
When remote access is required, using more secure methods, such as Virtual Private Networks (VPNs). Recognize VPNs may have vulnerabilities, should be updated to the most recent version available, and are only as secure as the connected devices.
Recommended Practices
CISA reminds organizations to perform proper impact analysis and risk assessment prior to deploying defensive measures.
Recommended Practices
CISA also provides a section for control systems security recommended practices on the ICS webpage on cisa.gov. Several CISA products detailing cyber defense best practices are available for reading and download, including Improving Industrial Control Systems Cybersecurity with Defense-in-Depth Strategies.
Recommended Practices
CISA encourages organizations to implement recommended cybersecurity strategies for proactive defense of ICS assets. Additional mitigation guidance and recommended practices are publicly available on the ICS webpage at cisa.gov in the technical information paper, ICS-TIP-12-146-01B--Targeted Cyber Intrusion Detection and Mitigation Strategies.
Recommended Practices
Organizations observing suspected malicious activity should follow established internal procedures and report findings to CISA for tracking and correlation against other incidents.
Exploitability
No known public exploits specifically target these vulnerabilities. These vulnerabilities are exploitable remotely. These vulnerabilities have low attack complexity.
{ document: { acknowledgments: [ { organization: "Siemens ProductCERT", summary: "reporting these vulnerabilities to CISA.", }, ], category: "csaf_security_advisory", csaf_version: "2.0", distribution: { text: "Disclosure is not limited", tlp: { label: "WHITE", url: "https://us-cert.cisa.gov/tlp/", }, }, lang: "en", notes: [ { category: "general", text: "This CSAF advisory was extracted from unstructured data and may contain inaccuracies. If you notice any errors, please reach out to the designated contact at CISA CSAF: central@cisa.dhs.gov", title: "CISA Disclaimer", }, { category: "summary", text: "Multiple vulnerabilities have been identified in the BIOS of the SIMATIC S7-1500 TM MFP V1.0.\n\nSiemens is preparing updates and recommends countermeasures for products where updates are not, or not yet available.", title: "Summary", }, { category: "general", text: "As a general security measure, Siemens strongly recommends to protect network access to devices with appropriate mechanisms. In order to operate the devices in a protected IT environment, Siemens recommends to configure the environment according to Siemens' operational guidelines for Industrial Security (Download: \nhttps://www.siemens.com/cert/operational-guidelines-industrial-security), and to follow the recommendations in the product manuals.\nAdditional information on Industrial Security by Siemens can be found at: https://www.siemens.com/industrialsecurity", title: "General Recommendations", }, { category: "general", text: "For further inquiries on security vulnerabilities in Siemens products and solutions, please contact the Siemens ProductCERT: https://www.siemens.com/cert/advisories", title: "Additional Resources", }, { category: "legal_disclaimer", text: "Siemens Security Advisories are subject to the terms and conditions contained in Siemens' underlying license terms or other applicable agreements previously agreed to with Siemens (hereinafter \"License Terms\"). To the extent applicable to information, software or documentation made available in or through a Siemens Security Advisory, the Terms of Use of Siemens' Global Website (https://www.siemens.com/terms_of_use, hereinafter \"Terms of Use\"), in particular Sections 8-10 of the Terms of Use, shall apply additionally. In case of conflicts, the License Terms shall prevail over the Terms of Use.", title: "Terms of Use", }, { category: "legal_disclaimer", text: "All information products included in https://us-cert.cisa.gov/ics are provided \"as is\" for informational purposes only. The Department of Homeland Security (DHS) does not provide any warranties of any kind regarding any information contained within. DHS does not endorse any commercial product or service, referenced in this product or otherwise. Further dissemination of this product is governed by the Traffic Light Protocol (TLP) marking in the header. For more information about TLP, see https://us-cert.cisa.gov/tlp/.", title: "Legal Notice", }, { category: "other", text: "This CISA CSAF advisory was converted from Siemens ProductCERT's CSAF advisory.", title: "Advisory Conversion Disclaimer", }, { category: "other", text: "Multiple", title: "Critical infrastructure sectors", }, { category: "other", text: "Worldwide", title: "Countries/areas deployed", }, { category: "other", text: "Germany", title: "Company headquarters location", }, { category: "general", text: "CISA recommends users take defensive measures to minimize the exploitation risk of this vulnerability.", title: "Recommended Practices", }, { category: "general", text: "Minimizing network exposure for all control system devices and/or systems, ensuring they are not accessible from the internet.", title: "Recommended Practices", }, { category: "general", text: "Locating control system networks and remote devices behind firewalls and isolating them from business networks.", title: "Recommended Practices", }, { category: "general", text: "When remote access is required, using more secure methods, such as Virtual Private Networks (VPNs). Recognize VPNs may have vulnerabilities, should be updated to the most recent version available, and are only as secure as the connected devices.", title: "Recommended Practices", }, { category: "general", text: "CISA reminds organizations to perform proper impact analysis and risk assessment prior to deploying defensive measures.", title: "Recommended Practices", }, { category: "general", text: "CISA also provides a section for control systems security recommended practices on the ICS webpage on cisa.gov. Several CISA products detailing cyber defense best practices are available for reading and download, including Improving Industrial Control Systems Cybersecurity with Defense-in-Depth Strategies.", title: "Recommended Practices", }, { category: "general", text: "CISA encourages organizations to implement recommended cybersecurity strategies for proactive defense of ICS assets. Additional mitigation guidance and recommended practices are publicly available on the ICS webpage at cisa.gov in the technical information paper, ICS-TIP-12-146-01B--Targeted Cyber Intrusion Detection and Mitigation Strategies.", title: "Recommended Practices", }, { category: "general", text: "Organizations observing suspected malicious activity should follow established internal procedures and report findings to CISA for tracking and correlation against other incidents.", title: "Recommended Practices", }, { category: "other", text: "No known public exploits specifically target these vulnerabilities. These vulnerabilities are exploitable remotely. These vulnerabilities have low attack complexity.", title: "Exploitability", }, ], publisher: { category: "other", contact_details: "Email: CISAservicedesk@cisa.dhs.gov;\n Toll Free: 1-888-282-0870", name: "CISA", namespace: "https://www.cisa.gov/", }, references: [ { category: "self", summary: "SSA-831302: Vulnerabilities in the BIOS of the SIMATIC S7-1500 TM MFP V1.0 - CSAF Version", url: "https://cert-portal.siemens.com/productcert/csaf/ssa-831302.json", }, { category: "self", summary: "ICS Advisory ICSA-23-166-10 JSON", url: "https://raw.githubusercontent.com/cisagov/CSAF/develop/csaf_files/OT/white/2023/icsa-23-166-10.json", }, { category: "self", summary: "SSA-831302: Vulnerabilities in the BIOS of the SIMATIC S7-1500 TM MFP V1.0 - HTML Version", url: "https://cert-portal.siemens.com/productcert/html/ssa-831302.html", }, { category: "self", summary: "SSA-831302: Vulnerabilities in the BIOS of the SIMATIC S7-1500 TM MFP V1.0 - PDF Version", url: "https://cert-portal.siemens.com/productcert/pdf/ssa-831302.pdf", }, { category: "self", summary: "SSA-831302: Vulnerabilities in the BIOS of the SIMATIC S7-1500 TM MFP V1.0 - TXT Version", url: "https://cert-portal.siemens.com/productcert/txt/ssa-831302.txt", }, { category: "self", summary: "ICS Advisory ICSA-23-166-10 - Web Version", url: "https://www.cisa.gov/news-events/ics-advisories/icsa-23-166-10", }, { category: "external", summary: "Recommended Practices", url: "https://www.cisa.gov/uscert/ics/alerts/ICS-ALERT-10-301-01", }, { category: "external", summary: "Recommended Practices", url: "https://www.cisa.gov/resources-tools/resources/ics-recommended-practices", }, { category: "external", summary: "Recommended Practices", url: "https://www.cisa.gov/topics/industrial-control-systems", }, { category: "external", summary: "Recommended Practices", url: "https://us-cert.cisa.gov/sites/default/files/recommended_practices/NCCIC_ICS-CERT_Defense_in_Depth_2016_S508C.pdf", }, { category: "external", summary: "Recommended Practices", url: "https://www.cisa.gov/sites/default/files/publications/Cybersecurity_Best_Practices_for_Industrial_Control_Systems.pdf", }, { category: "external", summary: "Recommended Practices", url: "https://www.cisa.gov/uscert/ics/tips/ICS-TIP-12-146-01B", }, ], title: "Siemens SIMATIC S7-1500 TM MFP BIOS", tracking: { current_release_date: "2023-06-13T00:00:00.000000Z", generator: { engine: { name: "CISA CSAF Generator", version: "1", }, }, id: "ICSA-23-166-10", initial_release_date: "2023-06-13T00:00:00.000000Z", revision_history: [ { date: "2023-06-13T00:00:00.000000Z", legacy_version: "1.0", number: "1", summary: "Publication Date", }, ], status: "interim", version: "1", }, }, product_tree: { branches: [ { branches: [ { branches: [ { category: "product_version_range", name: "vers:all/*", product: { name: "SIMATIC S7-1500 TM MFP - BIOS", product_id: "1", }, }, ], category: "product_name", name: "SIMATIC S7-1500 TM MFP - BIOS", }, ], category: "vendor", name: "Siemens", }, ], }, vulnerabilities: [ { cve: "CVE-2016-10228", cwe: { id: "CWE-20", name: "Improper Input Validation", }, notes: [ { category: "summary", text: "The iconv program in the GNU C Library (aka glibc or libc6) 2.31 and earlier, when invoked with multiple suffixes in the destination encoding (TRANSLATE or IGNORE) along with the -c option, enters an infinite loop when processing invalid multi-byte input sequences, leading to a denial of service.", title: "Summary", }, ], product_status: { known_affected: [ "1", ], }, remediations: [ { category: "none_available", details: "Currently no fix is available", product_ids: [ "1", ], }, { category: "workaround", details: "Only build and run applications from trusted sources", product_ids: [ "1", ], }, ], scores: [ { cvss_v3: { baseScore: 5.9, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C", version: "3.1", }, products: [ "1", ], }, ], title: "CVE-2016-10228", }, { cve: "CVE-2019-25013", cwe: { id: "CWE-125", name: "Out-of-bounds Read", }, notes: [ { category: "summary", text: "The iconv feature in the GNU C Library (aka glibc or libc6) through 2.32, when processing invalid multi-byte input sequences in the EUC-KR encoding, may have a buffer over-read.", title: "Summary", }, ], product_status: { known_affected: [ "1", ], }, remediations: [ { category: "none_available", details: "Currently no fix is available", product_ids: [ "1", ], }, { category: "workaround", details: "Only build and run applications from trusted sources", product_ids: [ "1", ], }, ], scores: [ { cvss_v3: { baseScore: 5.9, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C", version: "3.1", }, products: [ "1", ], }, ], title: "CVE-2019-25013", }, { cve: "CVE-2020-1752", cwe: { id: "CWE-416", name: "Use After Free", }, notes: [ { category: "summary", text: "A use-after-free vulnerability introduced in glibc upstream version 2.14 was found in the way the tilde expansion was carried out. Directory paths containing an initial tilde followed by a valid username were affected by this issue. A local attacker could exploit this flaw by creating a specially crafted path that, when processed by the glob function, would potentially lead to arbitrary code execution. This was fixed in version 2.32.", title: "Summary", }, ], product_status: { known_affected: [ "1", ], }, remediations: [ { category: "none_available", details: "Currently no fix is available", product_ids: [ "1", ], }, { category: "workaround", details: "Only build and run applications from trusted sources", product_ids: [ "1", ], }, ], scores: [ { cvss_v3: { baseScore: 7, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C", version: "3.1", }, products: [ "1", ], }, ], title: "CVE-2020-1752", }, { cve: "CVE-2020-10029", cwe: { id: "CWE-787", name: "Out-of-bounds Write", }, notes: [ { category: "summary", text: "The GNU C Library (aka glibc or libc6) before 2.32 could overflow an on-stack buffer during range reduction if an input to an 80-bit long double function contains a non-canonical bit pattern, a seen when passing a 0x5d414141414141410000 value to sinl on x86 targets. This is related to sysdeps/ieee754/ldbl-96/e_rem_pio2l.c.", title: "Summary", }, ], product_status: { known_affected: [ "1", ], }, remediations: [ { category: "none_available", details: "Currently no fix is available", product_ids: [ "1", ], }, { category: "workaround", details: "Only build and run applications from trusted sources", product_ids: [ "1", ], }, ], scores: [ { cvss_v3: { baseScore: 5.5, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C", version: "3.1", }, products: [ "1", ], }, ], title: "CVE-2020-10029", }, { cve: "CVE-2020-27618", cwe: { id: "CWE-835", name: "Loop with Unreachable Exit Condition ('Infinite Loop')", }, notes: [ { category: "summary", text: "The iconv function in the GNU C Library (aka glibc or libc6) 2.32 and earlier, when processing invalid multi-byte input sequences in IBM1364, IBM1371, IBM1388, IBM1390, and IBM1399 encodings, fails to advance the input state, which could lead to an infinite loop in applications, resulting in a denial of service, a different vulnerability from CVE-2016-10228.", title: "Summary", }, ], product_status: { known_affected: [ "1", ], }, remediations: [ { category: "none_available", details: "Currently no fix is available", product_ids: [ "1", ], }, { category: "workaround", details: "Only build and run applications from trusted sources", product_ids: [ "1", ], }, ], scores: [ { cvss_v3: { baseScore: 5.5, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C", version: "3.1", }, products: [ "1", ], }, ], title: "CVE-2020-27618", }, { cve: "CVE-2020-29562", cwe: { id: "CWE-617", name: "Reachable Assertion", }, notes: [ { category: "summary", text: "The iconv function in the GNU C Library (aka glibc or libc6) 2.30 to 2.32, when converting UCS4 text containing an irreversible character, fails an assertion in the code path and aborts the program, potentially resulting in a denial of service.", title: "Summary", }, ], product_status: { known_affected: [ "1", ], }, remediations: [ { category: "none_available", details: "Currently no fix is available", product_ids: [ "1", ], }, { category: "workaround", details: "Only build and run applications from trusted sources", product_ids: [ "1", ], }, ], scores: [ { cvss_v3: { baseScore: 4.8, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C", version: "3.1", }, products: [ "1", ], }, ], title: "CVE-2020-29562", }, { cve: "CVE-2021-3326", cwe: { id: "CWE-617", name: "Reachable Assertion", }, notes: [ { category: "summary", text: "The iconv function in the GNU C Library (aka glibc or libc6) 2.32 and earlier, when processing invalid input sequences in the ISO-2022-JP-3 encoding, fails an assertion in the code path and aborts the program, potentially resulting in a denial of service.", title: "Summary", }, ], product_status: { known_affected: [ "1", ], }, remediations: [ { category: "none_available", details: "Currently no fix is available", product_ids: [ "1", ], }, { category: "workaround", details: "Only build and run applications from trusted sources", product_ids: [ "1", ], }, ], scores: [ { cvss_v3: { baseScore: 7.5, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C", version: "3.1", }, products: [ "1", ], }, ], title: "CVE-2021-3326", }, { cve: "CVE-2021-3998", cwe: { id: "CWE-125", name: "Out-of-bounds Read", }, notes: [ { category: "summary", text: "A flaw was found in glibc. The realpath() function can mistakenly return an unexpected value, potentially leading to information leakage and disclosure of sensitive data.", title: "Summary", }, ], product_status: { known_affected: [ "1", ], }, remediations: [ { category: "none_available", details: "Currently no fix is available", product_ids: [ "1", ], }, { category: "workaround", details: "Only build and run applications from trusted sources", product_ids: [ "1", ], }, ], scores: [ { cvss_v3: { baseScore: 7.5, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N/E:P/RL:O/RC:C", version: "3.1", }, products: [ "1", ], }, ], title: "CVE-2021-3998", }, { cve: "CVE-2021-3999", cwe: { id: "CWE-193", name: "Off-by-one Error", }, notes: [ { category: "summary", text: "A flaw was found in glibc. An off-by-one buffer overflow and underflow in getcwd() may lead to memory corruption when the size of the buffer is exactly 1. A local attacker who can control the input buffer and size passed to getcwd() in a setuid program could use this flaw to potentially execute arbitrary code and escalate their privileges on the system.", title: "Summary", }, ], product_status: { known_affected: [ "1", ], }, remediations: [ { category: "none_available", details: "Currently no fix is available", product_ids: [ "1", ], }, { category: "workaround", details: "Only build and run applications from trusted sources", product_ids: [ "1", ], }, ], scores: [ { cvss_v3: { baseScore: 7.8, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C", version: "3.1", }, products: [ "1", ], }, ], title: "CVE-2021-3999", }, { cve: "CVE-2021-20269", cwe: { id: "CWE-276", name: "Incorrect Default Permissions", }, notes: [ { category: "summary", text: "A flaw was found in the permissions of a log file created by kexec-tools. This flaw allows a local unprivileged user to read this file and leak kernel internal information from a previous panic. The highest threat from this vulnerability is to confidentiality. This flaw affects kexec-tools shipped by Fedora versions prior to 2.0.21-8 and RHEL versions prior to 2.0.20-47.", title: "Summary", }, ], product_status: { known_affected: [ "1", ], }, remediations: [ { category: "none_available", details: "Currently no fix is available", product_ids: [ "1", ], }, { category: "workaround", details: "Only build and run applications from trusted sources", product_ids: [ "1", ], }, ], scores: [ { cvss_v3: { baseScore: 5.5, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:P/RL:O/RC:C", version: "3.1", }, products: [ "1", ], }, ], title: "CVE-2021-20269", }, { cve: "CVE-2021-27645", cwe: { id: "CWE-415", name: "Double Free", }, notes: [ { category: "summary", text: "The nameserver caching daemon (nscd) in the GNU C Library (aka glibc or libc6) 2.29 through 2.33, when processing a request for netgroup lookup, may crash due to a double-free, potentially resulting in degraded service or Denial of Service on the local system. This is related to netgroupcache.c.", title: "Summary", }, ], product_status: { known_affected: [ "1", ], }, remediations: [ { category: "none_available", details: "Currently no fix is available", product_ids: [ "1", ], }, { category: "workaround", details: "Only build and run applications from trusted sources", product_ids: [ "1", ], }, ], scores: [ { cvss_v3: { baseScore: 2.5, baseSeverity: "LOW", vectorString: "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:L/E:P/RL:O/RC:C", version: "3.1", }, products: [ "1", ], }, ], title: "CVE-2021-27645", }, { cve: "CVE-2021-28831", cwe: { id: "CWE-755", name: "Improper Handling of Exceptional Conditions", }, notes: [ { category: "summary", text: "decompress_gunzip.c in BusyBox through 1.32.1 mishandles the error bit on the huft_build result pointer, with a resultant invalid free or segmentation fault, via malformed gzip data.", title: "Summary", }, ], product_status: { known_affected: [ "1", ], }, remediations: [ { category: "none_available", details: "Currently no fix is available", product_ids: [ "1", ], }, { category: "workaround", details: "Only build and run applications from trusted sources", product_ids: [ "1", ], }, ], scores: [ { cvss_v3: { baseScore: 7.5, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C", version: "3.1", }, products: [ "1", ], }, ], title: "CVE-2021-28831", }, { cve: "CVE-2021-33574", cwe: { id: "CWE-416", name: "Use After Free", }, notes: [ { category: "summary", text: "The mq_notify function in the GNU C Library (aka glibc) versions 2.32 and 2.33 has a use-after-free. It may use the notification thread attributes object (passed through its struct sigevent parameter) after it has been freed by the caller, leading to a denial of service (application crash) or possibly unspecified other impact.", title: "Summary", }, ], product_status: { known_affected: [ "1", ], }, remediations: [ { category: "none_available", details: "Currently no fix is available", product_ids: [ "1", ], }, { category: "workaround", details: "Only build and run applications from trusted sources", product_ids: [ "1", ], }, ], scores: [ { cvss_v3: { baseScore: 9.8, baseSeverity: "CRITICAL", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C", version: "3.1", }, products: [ "1", ], }, ], title: "CVE-2021-33574", }, { cve: "CVE-2021-35942", cwe: { id: "CWE-190", name: "Integer Overflow or Wraparound", }, notes: [ { category: "summary", text: "The wordexp function in the GNU C Library (aka glibc) through 2.33 may crash or read arbitrary memory in parse_param (in posix/wordexp.c) when called with an untrusted, crafted pattern, potentially resulting in a denial of service or disclosure of information. This occurs because atoi was used but strtoul should have been used to ensure correct calculations.", title: "Summary", }, ], product_status: { known_affected: [ "1", ], }, remediations: [ { category: "none_available", details: "Currently no fix is available", product_ids: [ "1", ], }, { category: "workaround", details: "Only build and run applications from trusted sources", product_ids: [ "1", ], }, ], scores: [ { cvss_v3: { baseScore: 9.1, baseSeverity: "CRITICAL", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H/E:P/RL:O/RC:C", version: "3.1", }, products: [ "1", ], }, ], title: "CVE-2021-35942", }, { cve: "CVE-2021-38604", cwe: { id: "CWE-476", name: "NULL Pointer Dereference", }, notes: [ { category: "summary", text: "In librt in the GNU C Library (aka glibc) through 2.34, sysdeps/unix/sysv/linux/mq_notify.c mishandles certain NOTIFY_REMOVED data, leading to a NULL pointer dereference. NOTE: this vulnerability was introduced as a side effect of the CVE-2021-33574 fix.", title: "Summary", }, ], product_status: { known_affected: [ "1", ], }, remediations: [ { category: "none_available", details: "Currently no fix is available", product_ids: [ "1", ], }, { category: "workaround", details: "Only build and run applications from trusted sources", product_ids: [ "1", ], }, ], scores: [ { cvss_v3: { baseScore: 7.5, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C", version: "3.1", }, products: [ "1", ], }, ], title: "CVE-2021-38604", }, { cve: "CVE-2021-42373", cwe: { id: "CWE-476", name: "NULL Pointer Dereference", }, notes: [ { category: "summary", text: "A NULL pointer dereference in Busybox's man applet leads to denial of service when a section name is supplied but no page argument is given.", title: "Summary", }, ], product_status: { known_affected: [ "1", ], }, remediations: [ { category: "none_available", details: "Currently no fix is available", product_ids: [ "1", ], }, { category: "workaround", details: "Only build and run applications from trusted sources", product_ids: [ "1", ], }, ], scores: [ { cvss_v3: { baseScore: 5.1, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C", version: "3.1", }, products: [ "1", ], }, ], title: "CVE-2021-42373", }, { cve: "CVE-2021-42374", cwe: { id: "CWE-125", name: "Out-of-bounds Read", }, notes: [ { category: "summary", text: "An out-of-bounds heap read in Busybox's unlzma applet leads to information leak and denial of service when crafted LZMA-compressed input is decompressed. This can be triggered by any applet/format that internally supports LZMA compression.", title: "Summary", }, ], product_status: { known_affected: [ "1", ], }, remediations: [ { category: "none_available", details: "Currently no fix is available", product_ids: [ "1", ], }, { category: "workaround", details: "Only build and run applications from trusted sources", product_ids: [ "1", ], }, ], scores: [ { cvss_v3: { baseScore: 6.5, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:H/E:P/RL:O/RC:C", version: "3.1", }, products: [ "1", ], }, ], title: "CVE-2021-42374", }, { cve: "CVE-2021-42375", cwe: { id: "CWE-20", name: "Improper Input Validation", }, notes: [ { category: "summary", text: "An incorrect handling of a special element in Busybox's ash applet leads to denial of service when processing a crafted shell command, due to the shell mistaking specific characters for reserved characters. This may be used for DoS under rare conditions of filtered command input.", title: "Summary", }, ], product_status: { known_affected: [ "1", ], }, remediations: [ { category: "none_available", details: "Currently no fix is available", product_ids: [ "1", ], }, { category: "workaround", details: "Only build and run applications from trusted sources", product_ids: [ "1", ], }, ], scores: [ { cvss_v3: { baseScore: 4.1, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C", version: "3.1", }, products: [ "1", ], }, ], title: "CVE-2021-42375", }, { cve: "CVE-2021-42376", cwe: { id: "CWE-476", name: "NULL Pointer Dereference", }, notes: [ { category: "summary", text: "A NULL pointer dereference in Busybox's hush applet leads to denial of service when processing a crafted shell command, due to missing validation after a \\x03 delimiter character. This may be used for DoS under very rare conditions of filtered command input.", title: "Summary", }, ], product_status: { known_affected: [ "1", ], }, remediations: [ { category: "none_available", details: "Currently no fix is available", product_ids: [ "1", ], }, { category: "workaround", details: "Only build and run applications from trusted sources", product_ids: [ "1", ], }, ], scores: [ { cvss_v3: { baseScore: 4.1, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C", version: "3.1", }, products: [ "1", ], }, ], title: "CVE-2021-42376", }, { cve: "CVE-2021-42377", cwe: { id: "CWE-763", name: "Release of Invalid Pointer or Reference", }, notes: [ { category: "summary", text: "An attacker-controlled pointer free in Busybox's hush applet leads to denial of service and possible code execution when processing a crafted shell command, due to the shell mishandling the &&& string. This may be used for remote code execution under rare conditions of filtered command input.", title: "Summary", }, ], product_status: { known_affected: [ "1", ], }, remediations: [ { category: "none_available", details: "Currently no fix is available", product_ids: [ "1", ], }, { category: "workaround", details: "Only build and run applications from trusted sources", product_ids: [ "1", ], }, ], scores: [ { cvss_v3: { baseScore: 6.4, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C", version: "3.1", }, products: [ "1", ], }, ], title: "CVE-2021-42377", }, { cve: "CVE-2021-42378", cwe: { id: "CWE-416", name: "Use After Free", }, notes: [ { category: "summary", text: "A use-after-free in Busybox's awk applet leads to denial of service and possibly code execution when processing a crafted awk pattern in the getvar_i function.", title: "Summary", }, ], product_status: { known_affected: [ "1", ], }, remediations: [ { category: "none_available", details: "Currently no fix is available", product_ids: [ "1", ], }, { category: "workaround", details: "Only build and run applications from trusted sources", product_ids: [ "1", ], }, ], scores: [ { cvss_v3: { baseScore: 6.6, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C", version: "3.1", }, products: [ "1", ], }, ], title: "CVE-2021-42378", }, { cve: "CVE-2021-42379", cwe: { id: "CWE-416", name: "Use After Free", }, notes: [ { category: "summary", text: "A use-after-free in Busybox's awk applet leads to denial of service and possibly code execution when processing a crafted awk pattern in the next_input_file function.", title: "Summary", }, ], product_status: { known_affected: [ "1", ], }, remediations: [ { category: "none_available", details: "Currently no fix is available", product_ids: [ "1", ], }, { category: "workaround", details: "Only build and run applications from trusted sources", product_ids: [ "1", ], }, ], scores: [ { cvss_v3: { baseScore: 6.6, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C", version: "3.1", }, products: [ "1", ], }, ], title: "CVE-2021-42379", }, { cve: "CVE-2021-42380", cwe: { id: "CWE-416", name: "Use After Free", }, notes: [ { category: "summary", text: "A use-after-free in awk leads to denial of service and possibly code execution when processing a crafted awk pattern in the clrvar function.", title: "Summary", }, ], product_status: { known_affected: [ "1", ], }, remediations: [ { category: "none_available", details: "Currently no fix is available", product_ids: [ "1", ], }, { category: "workaround", details: "Only build and run applications from trusted sources", product_ids: [ "1", ], }, ], scores: [ { cvss_v3: { baseScore: 6.6, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C", version: "3.1", }, products: [ "1", ], }, ], title: "CVE-2021-42380", }, { cve: "CVE-2021-42381", cwe: { id: "CWE-416", name: "Use After Free", }, notes: [ { category: "summary", text: "A use-after-free in awk leads to denial of service and possibly code execution when processing a crafted awk pattern in the hash_init function.", title: "Summary", }, ], product_status: { known_affected: [ "1", ], }, remediations: [ { category: "none_available", details: "Currently no fix is available", product_ids: [ "1", ], }, { category: "workaround", details: "Only build and run applications from trusted sources", product_ids: [ "1", ], }, ], scores: [ { cvss_v3: { baseScore: 6.6, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C", version: "3.1", }, products: [ "1", ], }, ], title: "CVE-2021-42381", }, { cve: "CVE-2021-42382", cwe: { id: "CWE-416", name: "Use After Free", }, notes: [ { category: "summary", text: "A use-after-free in awk leads to denial of service and possibly code execution when processing a crafted awk pattern in the getvar_s function.", title: "Summary", }, ], product_status: { known_affected: [ "1", ], }, remediations: [ { category: "none_available", details: "Currently no fix is available", product_ids: [ "1", ], }, { category: "workaround", details: "Only build and run applications from trusted sources", product_ids: [ "1", ], }, ], scores: [ { cvss_v3: { baseScore: 6.6, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C", version: "3.1", }, products: [ "1", ], }, ], title: "CVE-2021-42382", }, { cve: "CVE-2021-42383", cwe: { id: "CWE-416", name: "Use After Free", }, notes: [ { category: "summary", text: "A use-after-free in awk leads to denial of service and possibly code execution when processing a crafted awk pattern in the evaluate function.", title: "Summary", }, ], product_status: { known_affected: [ "1", ], }, remediations: [ { category: "none_available", details: "Currently no fix is available", product_ids: [ "1", ], }, { category: "workaround", details: "Only build and run applications from trusted sources", product_ids: [ "1", ], }, ], scores: [ { cvss_v3: { baseScore: 6.6, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C", version: "3.1", }, products: [ "1", ], }, ], title: "CVE-2021-42383", }, { cve: "CVE-2021-42384", cwe: { id: "CWE-416", name: "Use After Free", }, notes: [ { category: "summary", text: "A use-after-free in Busybox's awk applet leads to denial of service and possibly code execution when processing a crafted awk pattern in the handle_special function.", title: "Summary", }, ], product_status: { known_affected: [ "1", ], }, remediations: [ { category: "none_available", details: "Currently no fix is available", product_ids: [ "1", ], }, { category: "workaround", details: "Only build and run applications from trusted sources", product_ids: [ "1", ], }, ], scores: [ { cvss_v3: { baseScore: 6.6, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C", version: "3.1", }, products: [ "1", ], }, ], title: "CVE-2021-42384", }, { cve: "CVE-2021-42385", cwe: { id: "CWE-416", name: "Use After Free", }, notes: [ { category: "summary", text: "A use-after-free in awk leads to denial of service and possibly code execution when processing a crafted awk pattern in the evaluate function.", title: "Summary", }, ], product_status: { known_affected: [ "1", ], }, remediations: [ { category: "none_available", details: "Currently no fix is available", product_ids: [ "1", ], }, { category: "workaround", details: "Only build and run applications from trusted sources", product_ids: [ "1", ], }, ], scores: [ { cvss_v3: { baseScore: 6.6, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C", version: "3.1", }, products: [ "1", ], }, ], title: "CVE-2021-42385", }, { cve: "CVE-2021-42386", cwe: { id: "CWE-416", name: "Use After Free", }, notes: [ { category: "summary", text: "A use-after-free in awk leads to denial of service and possibly code execution when processing a crafted awk pattern in the nvalloc function.", title: "Summary", }, ], product_status: { known_affected: [ "1", ], }, remediations: [ { category: "none_available", details: "Currently no fix is available", product_ids: [ "1", ], }, { category: "workaround", details: "Only build and run applications from trusted sources", product_ids: [ "1", ], }, ], scores: [ { cvss_v3: { baseScore: 6.6, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C", version: "3.1", }, products: [ "1", ], }, ], title: "CVE-2021-42386", }, { cve: "CVE-2022-1882", cwe: { id: "CWE-416", name: "Use After Free", }, notes: [ { category: "summary", text: "A use-after-free flaw was found in the Linux kernel’s pipes functionality in how a user performs manipulations with the pipe post_one_notification() after free_pipe_info() that is already called. This flaw allows a local user to crash or potentially escalate their privileges on the system.", title: "Summary", }, ], product_status: { known_affected: [ "1", ], }, remediations: [ { category: "none_available", details: "Currently no fix is available", product_ids: [ "1", ], }, { category: "workaround", details: "Only build and run applications from trusted sources", product_ids: [ "1", ], }, ], scores: [ { cvss_v3: { baseScore: 7.8, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C", version: "3.1", }, products: [ "1", ], }, ], title: "CVE-2022-1882", }, { cve: "CVE-2022-2585", cwe: { id: "CWE-416", name: "Use After Free", }, notes: [ { category: "summary", text: "A use-after-free flaw was found in the Linux kernel’s POSIX CPU timers functionality in the way a user creates and then deletes the timer in the non-leader thread of the program. This flaw allows a local user to crash or potentially escalate their privileges on the system.", title: "Summary", }, ], product_status: { known_affected: [ "1", ], }, remediations: [ { category: "none_available", details: "Currently no fix is available", product_ids: [ "1", ], }, { category: "workaround", details: "Only build and run applications from trusted sources", product_ids: [ "1", ], }, ], scores: [ { cvss_v3: { baseScore: 7.8, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C", version: "3.1", }, products: [ "1", ], }, ], title: "CVE-2022-2585", }, { cve: "CVE-2022-2588", cwe: { id: "CWE-20", name: "Improper Input Validation", }, notes: [ { category: "summary", text: "Zhenpeng Lin discovered that the network packet scheduler implementation in the Linux kernel did not properly remove all references to a route filter before freeing it in some situations. A local attacker could use this to cause a denial of service (system crash) or execute arbitrary code.", title: "Summary", }, ], product_status: { known_affected: [ "1", ], }, remediations: [ { category: "none_available", details: "Currently no fix is available", product_ids: [ "1", ], }, { category: "workaround", details: "Only build and run applications from trusted sources", product_ids: [ "1", ], }, ], scores: [ { cvss_v3: { baseScore: 7.8, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C", version: "3.1", }, products: [ "1", ], }, ], title: "CVE-2022-2588", }, { cve: "CVE-2022-2905", cwe: { id: "CWE-125", name: "Out-of-bounds Read", }, notes: [ { category: "summary", text: "An out-of-bounds memory read flaw was found in the Linux kernel's BPF subsystem in how a user calls the bpf_tail_call function with a key larger than the max_entries of the map. This flaw allows a local user to gain unauthorized access to data.", title: "Summary", }, ], product_status: { known_affected: [ "1", ], }, remediations: [ { category: "none_available", details: "Currently no fix is available", product_ids: [ "1", ], }, { category: "workaround", details: "Only build and run applications from trusted sources", product_ids: [ "1", ], }, ], scores: [ { cvss_v3: { baseScore: 5.5, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:P/RL:O/RC:C", version: "3.1", }, products: [ "1", ], }, ], title: "CVE-2022-2905", }, { cve: "CVE-2022-3028", cwe: { id: "CWE-362", name: "Concurrent Execution using Shared Resource with Improper Synchronization ('Race Condition')", }, notes: [ { category: "summary", text: "A race condition was found in the Linux kernel's IP framework for transforming packets (XFRM subsystem) when multiple calls to xfrm_probe_algs occurred simultaneously. This flaw could allow a local attacker to potentially trigger an out-of-bounds write or leak kernel heap memory by performing an out-of-bounds read and copying it into a socket.", title: "Summary", }, ], product_status: { known_affected: [ "1", ], }, remediations: [ { category: "none_available", details: "Currently no fix is available", product_ids: [ "1", ], }, { category: "workaround", details: "Only build and run applications from trusted sources", product_ids: [ "1", ], }, ], scores: [ { cvss_v3: { baseScore: 7, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C", version: "3.1", }, products: [ "1", ], }, ], title: "CVE-2022-3028", }, { cve: "CVE-2022-3435", cwe: { id: "CWE-119", name: "Improper Restriction of Operations within the Bounds of a Memory Buffer", }, notes: [ { category: "summary", text: "A vulnerability classified as problematic has been found in Linux Kernel. This affects the function fib_nh_match of the file net/ipv4/fib_semantics.c of the component IPv4 Handler. The manipulation leads to out-of-bounds read. It is possible to initiate the attack remotely. It is recommended to apply a patch to fix this issue. The identifier VDB-210357 was assigned to this vulnerability.", title: "Summary", }, ], product_status: { known_affected: [ "1", ], }, remediations: [ { category: "none_available", details: "Currently no fix is available", product_ids: [ "1", ], }, { category: "workaround", details: "Only build and run applications from trusted sources", product_ids: [ "1", ], }, ], scores: [ { cvss_v3: { baseScore: 4.3, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N/E:P/RL:O/RC:C", version: "3.1", }, products: [ "1", ], }, ], title: "CVE-2022-3435", }, { cve: "CVE-2022-3586", cwe: { id: "CWE-416", name: "Use After Free", }, notes: [ { category: "summary", text: "A flaw was found in the Linux kernel’s networking code. A use-after-free was found in the way the sch_sfb enqueue function used the socket buffer (SKB) cb field after the same SKB had been enqueued (and freed) into a child qdisc. This flaw allows a local, unprivileged user to crash the system, causing a denial of service.", title: "Summary", }, ], product_status: { known_affected: [ "1", ], }, remediations: [ { category: "none_available", details: "Currently no fix is available", product_ids: [ "1", ], }, { category: "workaround", details: "Only build and run applications from trusted sources", product_ids: [ "1", ], }, ], scores: [ { cvss_v3: { baseScore: 5.5, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C", version: "3.1", }, products: [ "1", ], }, ], title: "CVE-2022-3586", }, { cve: "CVE-2022-4378", cwe: { id: "CWE-787", name: "Out-of-bounds Write", }, notes: [ { category: "summary", text: "A stack overflow flaw was found in the Linux kernel's SYSCTL subsystem in how a user changes certain kernel parameters and variables. This flaw allows a local user to crash or potentially escalate their privileges on the system.", title: "Summary", }, ], product_status: { known_affected: [ "1", ], }, remediations: [ { category: "none_available", details: "Currently no fix is available", product_ids: [ "1", ], }, { category: "workaround", details: "Only build and run applications from trusted sources", product_ids: [ "1", ], }, ], scores: [ { cvss_v3: { baseScore: 7.8, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C", version: "3.1", }, products: [ "1", ], }, ], title: "CVE-2022-4378", }, { cve: "CVE-2022-4662", cwe: { id: "CWE-455", name: "Non-exit on Failed Initialization", }, notes: [ { category: "summary", text: "A flaw incorrect access control in the Linux kernel USB core subsystem was found in the way user attaches usb device. A local user could use this flaw to crash the system.", title: "Summary", }, ], product_status: { known_affected: [ "1", ], }, remediations: [ { category: "none_available", details: "Currently no fix is available", product_ids: [ "1", ], }, { category: "workaround", details: "Only build and run applications from trusted sources", product_ids: [ "1", ], }, ], scores: [ { cvss_v3: { baseScore: 5.5, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C", version: "3.1", }, products: [ "1", ], }, ], title: "CVE-2022-4662", }, { cve: "CVE-2022-20421", cwe: { id: "CWE-416", name: "Use After Free", }, notes: [ { category: "summary", text: "In binder_inc_ref_for_node of binder.c, there is a possible way to corrupt memory due to a use after free. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-239630375References: Upstream kernel", title: "Summary", }, ], product_status: { known_affected: [ "1", ], }, remediations: [ { category: "none_available", details: "Currently no fix is available", product_ids: [ "1", ], }, { category: "workaround", details: "Only build and run applications from trusted sources", product_ids: [ "1", ], }, ], scores: [ { cvss_v3: { baseScore: 7.8, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C", version: "3.1", }, products: [ "1", ], }, ], title: "CVE-2022-20421", }, { cve: "CVE-2022-20422", cwe: { id: "CWE-362", name: "Concurrent Execution using Shared Resource with Improper Synchronization ('Race Condition')", }, notes: [ { category: "summary", text: "In emulation_proc_handler of armv8_deprecated.c, there is a possible way to corrupt memory due to a race condition. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-237540956References: Upstream kernel", title: "Summary", }, ], product_status: { known_affected: [ "1", ], }, remediations: [ { category: "none_available", details: "Currently no fix is available", product_ids: [ "1", ], }, { category: "workaround", details: "Only build and run applications from trusted sources", product_ids: [ "1", ], }, ], scores: [ { cvss_v3: { baseScore: 7, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C", version: "3.1", }, products: [ "1", ], }, ], title: "CVE-2022-20422", }, { cve: "CVE-2022-21233", cwe: { id: "CWE-311", name: "Missing Encryption of Sensitive Data", }, notes: [ { category: "summary", text: "Improper isolation of shared resources in some Intel(R) Processors may allow a privileged user to potentially enable information disclosure via local access.", title: "Summary", }, ], product_status: { known_affected: [ "1", ], }, remediations: [ { category: "none_available", details: "Currently no fix is available", product_ids: [ "1", ], }, { category: "workaround", details: "Only build and run applications from trusted sources", product_ids: [ "1", ], }, ], scores: [ { cvss_v3: { baseScore: 5.5, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:P/RL:O/RC:C", version: "3.1", }, products: [ "1", ], }, ], title: "CVE-2022-21233", }, { cve: "CVE-2022-23218", cwe: { id: "CWE-120", name: "Buffer Copy without Checking Size of Input ('Classic Buffer Overflow')", }, notes: [ { category: "summary", text: "The deprecated compatibility function svcunix_create in the sunrpc module of the GNU C Library (aka glibc) through 2.34 copies its path argument on the stack without validating its length, which may result in a buffer overflow, potentially resulting in a denial of service or (if an application is not built with a stack protector enabled) arbitrary code execution.", title: "Summary", }, ], product_status: { known_affected: [ "1", ], }, remediations: [ { category: "none_available", details: "Currently no fix is available", product_ids: [ "1", ], }, { category: "workaround", details: "Only build and run applications from trusted sources", product_ids: [ "1", ], }, ], scores: [ { cvss_v3: { baseScore: 9.8, baseSeverity: "CRITICAL", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C", version: "3.1", }, products: [ "1", ], }, ], title: "CVE-2022-23218", }, { cve: "CVE-2022-23219", cwe: { id: "CWE-120", name: "Buffer Copy without Checking Size of Input ('Classic Buffer Overflow')", }, notes: [ { category: "summary", text: "The deprecated compatibility function clnt_create in the sunrpc module of the GNU C Library (aka glibc) through 2.34 copies its hostname argument on the stack without validating its length, which may result in a buffer overflow, potentially resulting in a denial of service or (if an application is not built with a stack protector enabled) arbitrary code execution.", title: "Summary", }, ], product_status: { known_affected: [ "1", ], }, remediations: [ { category: "none_available", details: "Currently no fix is available", product_ids: [ "1", ], }, { category: "workaround", details: "Only build and run applications from trusted sources", product_ids: [ "1", ], }, ], scores: [ { cvss_v3: { baseScore: 9.8, baseSeverity: "CRITICAL", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C", version: "3.1", }, products: [ "1", ], }, ], title: "CVE-2022-23219", }, { cve: "CVE-2022-28391", cwe: { id: "CWE-311", name: "Missing Encryption of Sensitive Data", }, notes: [ { category: "summary", text: "BusyBox through 1.35.0 allows remote attackers to execute arbitrary code if netstat is used to print a DNS PTR record's value to a VT compatible terminal. Alternatively, the attacker could choose to change the terminal's colors.", title: "Summary", }, ], product_status: { known_affected: [ "1", ], }, remediations: [ { category: "none_available", details: "Currently no fix is available", product_ids: [ "1", ], }, { category: "workaround", details: "Only build and run applications from trusted sources", product_ids: [ "1", ], }, ], scores: [ { cvss_v3: { baseScore: 8.8, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C", version: "3.1", }, products: [ "1", ], }, ], title: "CVE-2022-28391", }, { cve: "CVE-2022-30065", cwe: { id: "CWE-416", name: "Use After Free", }, notes: [ { category: "summary", text: "A use-after-free in Busybox 1.35-x's awk applet leads to denial of service and possibly code execution when processing a crafted awk pattern in the copyvar function.", title: "Summary", }, ], product_status: { known_affected: [ "1", ], }, remediations: [ { category: "none_available", details: "Currently no fix is available", product_ids: [ "1", ], }, { category: "workaround", details: "Only build and run applications from trusted sources", product_ids: [ "1", ], }, ], scores: [ { cvss_v3: { baseScore: 7.8, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C", version: "3.1", }, products: [ "1", ], }, ], title: "CVE-2022-30065", }, { cve: "CVE-2022-39188", cwe: { id: "CWE-362", name: "Concurrent Execution using Shared Resource with Improper Synchronization ('Race Condition')", }, notes: [ { category: "summary", text: "An issue was discovered in include/asm-generic/tlb.h in the Linux kernel before 5.19. Because of a race condition (unmap_mapping_range versus munmap), a device driver can free a page while it still has stale TLB entries. This only occurs in situations with VM_PFNMAP VMAs.", title: "Summary", }, ], product_status: { known_affected: [ "1", ], }, remediations: [ { category: "none_available", details: "Currently no fix is available", product_ids: [ "1", ], }, { category: "workaround", details: "Only build and run applications from trusted sources", product_ids: [ "1", ], }, ], scores: [ { cvss_v3: { baseScore: 4.7, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C", version: "3.1", }, products: [ "1", ], }, ], title: "CVE-2022-39188", }, { cve: "CVE-2022-39190", cwe: { id: "CWE-400", name: "Uncontrolled Resource Consumption", }, notes: [ { category: "summary", text: "An issue was discovered in net/netfilter/nf_tables_api.c in the Linux kernel before 5.19.6. A denial of service can occur upon binding to an already bound chain.", title: "Summary", }, ], product_status: { known_affected: [ "1", ], }, remediations: [ { category: "none_available", details: "Currently no fix is available", product_ids: [ "1", ], }, { category: "workaround", details: "Only build and run applications from trusted sources", product_ids: [ "1", ], }, ], scores: [ { cvss_v3: { baseScore: 5.5, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C", version: "3.1", }, products: [ "1", ], }, ], title: "CVE-2022-39190", }, { cve: "CVE-2022-40307", cwe: { id: "CWE-416", name: "Use After Free", }, notes: [ { category: "summary", text: "An issue was discovered in the Linux kernel through 5.19.8. drivers/firmware/efi/capsule-loader.c has a race condition with a resultant use-after-free.", title: "Summary", }, ], product_status: { known_affected: [ "1", ], }, remediations: [ { category: "none_available", details: "Currently no fix is available", product_ids: [ "1", ], }, { category: "workaround", details: "Only build and run applications from trusted sources", product_ids: [ "1", ], }, ], scores: [ { cvss_v3: { baseScore: 4.7, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C", version: "3.1", }, products: [ "1", ], }, ], title: "CVE-2022-40307", }, { cve: "CVE-2022-41222", cwe: { id: "CWE-416", name: "Use After Free", }, notes: [ { category: "summary", text: "mm/mremap.c in the Linux kernel before 5.13.3 has a use-after-free via a stale TLB because an rmap lock is not held during a PUD move.", title: "Summary", }, ], product_status: { known_affected: [ "1", ], }, remediations: [ { category: "none_available", details: "Currently no fix is available", product_ids: [ "1", ], }, { category: "workaround", details: "Only build and run applications from trusted sources", product_ids: [ "1", ], }, ], scores: [ { cvss_v3: { baseScore: 7, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C", version: "3.1", }, products: [ "1", ], }, ], title: "CVE-2022-41222", }, { cve: "CVE-2022-42703", cwe: { id: "CWE-416", name: "Use After Free", }, notes: [ { category: "summary", text: "mm/rmap.c in the Linux kernel before 5.19.7 has a use-after-free related to leaf anon_vma double reuse.", title: "Summary", }, ], product_status: { known_affected: [ "1", ], }, remediations: [ { category: "none_available", details: "Currently no fix is available", product_ids: [ "1", ], }, { category: "workaround", details: "Only build and run applications from trusted sources", product_ids: [ "1", ], }, ], scores: [ { cvss_v3: { baseScore: 5.5, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C", version: "3.1", }, products: [ "1", ], }, ], title: "CVE-2022-42703", }, { cve: "CVE-2023-0179", cwe: { id: "CWE-190", name: "Integer Overflow or Wraparound", }, notes: [ { category: "summary", text: "A buffer overflow vulnerability was found in the Netfilter subsystem in the Linux Kernel. This issue could allow the leakage of both stack and heap addresses, and potentially allow Local Privilege Escalation to the root user via arbitrary code execution.", title: "Summary", }, ], product_status: { known_affected: [ "1", ], }, remediations: [ { category: "none_available", details: "Currently no fix is available", product_ids: [ "1", ], }, { category: "workaround", details: "Only build and run applications from trusted sources", product_ids: [ "1", ], }, ], scores: [ { cvss_v3: { baseScore: 7.8, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C", version: "3.1", }, products: [ "1", ], }, ], title: "CVE-2023-0179", }, { cve: "CVE-2023-0394", cwe: { id: "CWE-311", name: "Missing Encryption of Sensitive Data", }, notes: [ { category: "summary", text: "A NULL pointer dereference flaw was found in rawv6_push_pending_frames in net/ipv6/raw.c in the network subcomponent in the Linux kernel. This flaw causes the system to crash.", title: "Summary", }, ], product_status: { known_affected: [ "1", ], }, remediations: [ { category: "none_available", details: "Currently no fix is available", product_ids: [ "1", ], }, { category: "workaround", details: "Only build and run applications from trusted sources", product_ids: [ "1", ], }, ], scores: [ { cvss_v3: { baseScore: 5.5, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C", version: "3.1", }, products: [ "1", ], }, ], title: "CVE-2023-0394", }, { cve: "CVE-2023-1073", cwe: { id: "CWE-787", name: "Out-of-bounds Write", }, notes: [ { category: "summary", text: "A memory corruption flaw was found in the Linux kernel’s human interface device (HID) subsystem in how a user inserts a malicious USB device. This flaw allows a local user to crash or potentially escalate their privileges on the system.", title: "Summary", }, ], product_status: { known_affected: [ "1", ], }, remediations: [ { category: "none_available", details: "Currently no fix is available", product_ids: [ "1", ], }, { category: "workaround", details: "Only build and run applications from trusted sources", product_ids: [ "1", ], }, ], scores: [ { cvss_v3: { baseScore: 6.6, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C", version: "3.1", }, products: [ "1", ], }, ], title: "CVE-2023-1073", }, ], }
ICSA-23-166-10
Vulnerability from csaf_cisa
Published
2023-06-13 00:00
Modified
2023-06-13 00:00
Summary
Siemens SIMATIC S7-1500 TM MFP BIOS
Notes
CISA Disclaimer
This CSAF advisory was extracted from unstructured data and may contain inaccuracies. If you notice any errors, please reach out to the designated contact at CISA CSAF: central@cisa.dhs.gov
Summary
Multiple vulnerabilities have been identified in the BIOS of the SIMATIC S7-1500 TM MFP V1.0.
Siemens is preparing updates and recommends countermeasures for products where updates are not, or not yet available.
General Recommendations
As a general security measure, Siemens strongly recommends to protect network access to devices with appropriate mechanisms. In order to operate the devices in a protected IT environment, Siemens recommends to configure the environment according to Siemens' operational guidelines for Industrial Security (Download:
https://www.siemens.com/cert/operational-guidelines-industrial-security), and to follow the recommendations in the product manuals.
Additional information on Industrial Security by Siemens can be found at: https://www.siemens.com/industrialsecurity
Additional Resources
For further inquiries on security vulnerabilities in Siemens products and solutions, please contact the Siemens ProductCERT: https://www.siemens.com/cert/advisories
Terms of Use
Siemens Security Advisories are subject to the terms and conditions contained in Siemens' underlying license terms or other applicable agreements previously agreed to with Siemens (hereinafter "License Terms"). To the extent applicable to information, software or documentation made available in or through a Siemens Security Advisory, the Terms of Use of Siemens' Global Website (https://www.siemens.com/terms_of_use, hereinafter "Terms of Use"), in particular Sections 8-10 of the Terms of Use, shall apply additionally. In case of conflicts, the License Terms shall prevail over the Terms of Use.
Legal Notice
All information products included in https://us-cert.cisa.gov/ics are provided "as is" for informational purposes only. The Department of Homeland Security (DHS) does not provide any warranties of any kind regarding any information contained within. DHS does not endorse any commercial product or service, referenced in this product or otherwise. Further dissemination of this product is governed by the Traffic Light Protocol (TLP) marking in the header. For more information about TLP, see https://us-cert.cisa.gov/tlp/.
Advisory Conversion Disclaimer
This CISA CSAF advisory was converted from Siemens ProductCERT's CSAF advisory.
Critical infrastructure sectors
Multiple
Countries/areas deployed
Worldwide
Company headquarters location
Germany
Recommended Practices
CISA recommends users take defensive measures to minimize the exploitation risk of this vulnerability.
Recommended Practices
Minimizing network exposure for all control system devices and/or systems, ensuring they are not accessible from the internet.
Recommended Practices
Locating control system networks and remote devices behind firewalls and isolating them from business networks.
Recommended Practices
When remote access is required, using more secure methods, such as Virtual Private Networks (VPNs). Recognize VPNs may have vulnerabilities, should be updated to the most recent version available, and are only as secure as the connected devices.
Recommended Practices
CISA reminds organizations to perform proper impact analysis and risk assessment prior to deploying defensive measures.
Recommended Practices
CISA also provides a section for control systems security recommended practices on the ICS webpage on cisa.gov. Several CISA products detailing cyber defense best practices are available for reading and download, including Improving Industrial Control Systems Cybersecurity with Defense-in-Depth Strategies.
Recommended Practices
CISA encourages organizations to implement recommended cybersecurity strategies for proactive defense of ICS assets. Additional mitigation guidance and recommended practices are publicly available on the ICS webpage at cisa.gov in the technical information paper, ICS-TIP-12-146-01B--Targeted Cyber Intrusion Detection and Mitigation Strategies.
Recommended Practices
Organizations observing suspected malicious activity should follow established internal procedures and report findings to CISA for tracking and correlation against other incidents.
Exploitability
No known public exploits specifically target these vulnerabilities. These vulnerabilities are exploitable remotely. These vulnerabilities have low attack complexity.
{ document: { acknowledgments: [ { organization: "Siemens ProductCERT", summary: "reporting these vulnerabilities to CISA.", }, ], category: "csaf_security_advisory", csaf_version: "2.0", distribution: { text: "Disclosure is not limited", tlp: { label: "WHITE", url: "https://us-cert.cisa.gov/tlp/", }, }, lang: "en", notes: [ { category: "general", text: "This CSAF advisory was extracted from unstructured data and may contain inaccuracies. If you notice any errors, please reach out to the designated contact at CISA CSAF: central@cisa.dhs.gov", title: "CISA Disclaimer", }, { category: "summary", text: "Multiple vulnerabilities have been identified in the BIOS of the SIMATIC S7-1500 TM MFP V1.0.\n\nSiemens is preparing updates and recommends countermeasures for products where updates are not, or not yet available.", title: "Summary", }, { category: "general", text: "As a general security measure, Siemens strongly recommends to protect network access to devices with appropriate mechanisms. In order to operate the devices in a protected IT environment, Siemens recommends to configure the environment according to Siemens' operational guidelines for Industrial Security (Download: \nhttps://www.siemens.com/cert/operational-guidelines-industrial-security), and to follow the recommendations in the product manuals.\nAdditional information on Industrial Security by Siemens can be found at: https://www.siemens.com/industrialsecurity", title: "General Recommendations", }, { category: "general", text: "For further inquiries on security vulnerabilities in Siemens products and solutions, please contact the Siemens ProductCERT: https://www.siemens.com/cert/advisories", title: "Additional Resources", }, { category: "legal_disclaimer", text: "Siemens Security Advisories are subject to the terms and conditions contained in Siemens' underlying license terms or other applicable agreements previously agreed to with Siemens (hereinafter \"License Terms\"). To the extent applicable to information, software or documentation made available in or through a Siemens Security Advisory, the Terms of Use of Siemens' Global Website (https://www.siemens.com/terms_of_use, hereinafter \"Terms of Use\"), in particular Sections 8-10 of the Terms of Use, shall apply additionally. In case of conflicts, the License Terms shall prevail over the Terms of Use.", title: "Terms of Use", }, { category: "legal_disclaimer", text: "All information products included in https://us-cert.cisa.gov/ics are provided \"as is\" for informational purposes only. The Department of Homeland Security (DHS) does not provide any warranties of any kind regarding any information contained within. DHS does not endorse any commercial product or service, referenced in this product or otherwise. Further dissemination of this product is governed by the Traffic Light Protocol (TLP) marking in the header. For more information about TLP, see https://us-cert.cisa.gov/tlp/.", title: "Legal Notice", }, { category: "other", text: "This CISA CSAF advisory was converted from Siemens ProductCERT's CSAF advisory.", title: "Advisory Conversion Disclaimer", }, { category: "other", text: "Multiple", title: "Critical infrastructure sectors", }, { category: "other", text: "Worldwide", title: "Countries/areas deployed", }, { category: "other", text: "Germany", title: "Company headquarters location", }, { category: "general", text: "CISA recommends users take defensive measures to minimize the exploitation risk of this vulnerability.", title: "Recommended Practices", }, { category: "general", text: "Minimizing network exposure for all control system devices and/or systems, ensuring they are not accessible from the internet.", title: "Recommended Practices", }, { category: "general", text: "Locating control system networks and remote devices behind firewalls and isolating them from business networks.", title: "Recommended Practices", }, { category: "general", text: "When remote access is required, using more secure methods, such as Virtual Private Networks (VPNs). Recognize VPNs may have vulnerabilities, should be updated to the most recent version available, and are only as secure as the connected devices.", title: "Recommended Practices", }, { category: "general", text: "CISA reminds organizations to perform proper impact analysis and risk assessment prior to deploying defensive measures.", title: "Recommended Practices", }, { category: "general", text: "CISA also provides a section for control systems security recommended practices on the ICS webpage on cisa.gov. Several CISA products detailing cyber defense best practices are available for reading and download, including Improving Industrial Control Systems Cybersecurity with Defense-in-Depth Strategies.", title: "Recommended Practices", }, { category: "general", text: "CISA encourages organizations to implement recommended cybersecurity strategies for proactive defense of ICS assets. Additional mitigation guidance and recommended practices are publicly available on the ICS webpage at cisa.gov in the technical information paper, ICS-TIP-12-146-01B--Targeted Cyber Intrusion Detection and Mitigation Strategies.", title: "Recommended Practices", }, { category: "general", text: "Organizations observing suspected malicious activity should follow established internal procedures and report findings to CISA for tracking and correlation against other incidents.", title: "Recommended Practices", }, { category: "other", text: "No known public exploits specifically target these vulnerabilities. These vulnerabilities are exploitable remotely. These vulnerabilities have low attack complexity.", title: "Exploitability", }, ], publisher: { category: "other", contact_details: "Email: CISAservicedesk@cisa.dhs.gov;\n Toll Free: 1-888-282-0870", name: "CISA", namespace: "https://www.cisa.gov/", }, references: [ { category: "self", summary: "SSA-831302: Vulnerabilities in the BIOS of the SIMATIC S7-1500 TM MFP V1.0 - CSAF Version", url: "https://cert-portal.siemens.com/productcert/csaf/ssa-831302.json", }, { category: "self", summary: "ICS Advisory ICSA-23-166-10 JSON", url: "https://raw.githubusercontent.com/cisagov/CSAF/develop/csaf_files/OT/white/2023/icsa-23-166-10.json", }, { category: "self", summary: "SSA-831302: Vulnerabilities in the BIOS of the SIMATIC S7-1500 TM MFP V1.0 - HTML Version", url: "https://cert-portal.siemens.com/productcert/html/ssa-831302.html", }, { category: "self", summary: "SSA-831302: Vulnerabilities in the BIOS of the SIMATIC S7-1500 TM MFP V1.0 - PDF Version", url: "https://cert-portal.siemens.com/productcert/pdf/ssa-831302.pdf", }, { category: "self", summary: "SSA-831302: Vulnerabilities in the BIOS of the SIMATIC S7-1500 TM MFP V1.0 - TXT Version", url: "https://cert-portal.siemens.com/productcert/txt/ssa-831302.txt", }, { category: "self", summary: "ICS Advisory ICSA-23-166-10 - Web Version", url: "https://www.cisa.gov/news-events/ics-advisories/icsa-23-166-10", }, { category: "external", summary: "Recommended Practices", url: "https://www.cisa.gov/uscert/ics/alerts/ICS-ALERT-10-301-01", }, { category: "external", summary: "Recommended Practices", url: "https://www.cisa.gov/resources-tools/resources/ics-recommended-practices", }, { category: "external", summary: "Recommended Practices", url: "https://www.cisa.gov/topics/industrial-control-systems", }, { category: "external", summary: "Recommended Practices", url: "https://us-cert.cisa.gov/sites/default/files/recommended_practices/NCCIC_ICS-CERT_Defense_in_Depth_2016_S508C.pdf", }, { category: "external", summary: "Recommended Practices", url: "https://www.cisa.gov/sites/default/files/publications/Cybersecurity_Best_Practices_for_Industrial_Control_Systems.pdf", }, { category: "external", summary: "Recommended Practices", url: "https://www.cisa.gov/uscert/ics/tips/ICS-TIP-12-146-01B", }, ], title: "Siemens SIMATIC S7-1500 TM MFP BIOS", tracking: { current_release_date: "2023-06-13T00:00:00.000000Z", generator: { engine: { name: "CISA CSAF Generator", version: "1", }, }, id: "ICSA-23-166-10", initial_release_date: "2023-06-13T00:00:00.000000Z", revision_history: [ { date: "2023-06-13T00:00:00.000000Z", legacy_version: "1.0", number: "1", summary: "Publication Date", }, ], status: "interim", version: "1", }, }, product_tree: { branches: [ { branches: [ { branches: [ { category: "product_version_range", name: "vers:all/*", product: { name: "SIMATIC S7-1500 TM MFP - BIOS", product_id: "1", }, }, ], category: "product_name", name: "SIMATIC S7-1500 TM MFP - BIOS", }, ], category: "vendor", name: "Siemens", }, ], }, vulnerabilities: [ { cve: "CVE-2016-10228", cwe: { id: "CWE-20", name: "Improper Input Validation", }, notes: [ { category: "summary", text: "The iconv program in the GNU C Library (aka glibc or libc6) 2.31 and earlier, when invoked with multiple suffixes in the destination encoding (TRANSLATE or IGNORE) along with the -c option, enters an infinite loop when processing invalid multi-byte input sequences, leading to a denial of service.", title: "Summary", }, ], product_status: { known_affected: [ "1", ], }, remediations: [ { category: "none_available", details: "Currently no fix is available", product_ids: [ "1", ], }, { category: "workaround", details: "Only build and run applications from trusted sources", product_ids: [ "1", ], }, ], scores: [ { cvss_v3: { baseScore: 5.9, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C", version: "3.1", }, products: [ "1", ], }, ], title: "CVE-2016-10228", }, { cve: "CVE-2019-25013", cwe: { id: "CWE-125", name: "Out-of-bounds Read", }, notes: [ { category: "summary", text: "The iconv feature in the GNU C Library (aka glibc or libc6) through 2.32, when processing invalid multi-byte input sequences in the EUC-KR encoding, may have a buffer over-read.", title: "Summary", }, ], product_status: { known_affected: [ "1", ], }, remediations: [ { category: "none_available", details: "Currently no fix is available", product_ids: [ "1", ], }, { category: "workaround", details: "Only build and run applications from trusted sources", product_ids: [ "1", ], }, ], scores: [ { cvss_v3: { baseScore: 5.9, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C", version: "3.1", }, products: [ "1", ], }, ], title: "CVE-2019-25013", }, { cve: "CVE-2020-1752", cwe: { id: "CWE-416", name: "Use After Free", }, notes: [ { category: "summary", text: "A use-after-free vulnerability introduced in glibc upstream version 2.14 was found in the way the tilde expansion was carried out. Directory paths containing an initial tilde followed by a valid username were affected by this issue. A local attacker could exploit this flaw by creating a specially crafted path that, when processed by the glob function, would potentially lead to arbitrary code execution. This was fixed in version 2.32.", title: "Summary", }, ], product_status: { known_affected: [ "1", ], }, remediations: [ { category: "none_available", details: "Currently no fix is available", product_ids: [ "1", ], }, { category: "workaround", details: "Only build and run applications from trusted sources", product_ids: [ "1", ], }, ], scores: [ { cvss_v3: { baseScore: 7, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C", version: "3.1", }, products: [ "1", ], }, ], title: "CVE-2020-1752", }, { cve: "CVE-2020-10029", cwe: { id: "CWE-787", name: "Out-of-bounds Write", }, notes: [ { category: "summary", text: "The GNU C Library (aka glibc or libc6) before 2.32 could overflow an on-stack buffer during range reduction if an input to an 80-bit long double function contains a non-canonical bit pattern, a seen when passing a 0x5d414141414141410000 value to sinl on x86 targets. This is related to sysdeps/ieee754/ldbl-96/e_rem_pio2l.c.", title: "Summary", }, ], product_status: { known_affected: [ "1", ], }, remediations: [ { category: "none_available", details: "Currently no fix is available", product_ids: [ "1", ], }, { category: "workaround", details: "Only build and run applications from trusted sources", product_ids: [ "1", ], }, ], scores: [ { cvss_v3: { baseScore: 5.5, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C", version: "3.1", }, products: [ "1", ], }, ], title: "CVE-2020-10029", }, { cve: "CVE-2020-27618", cwe: { id: "CWE-835", name: "Loop with Unreachable Exit Condition ('Infinite Loop')", }, notes: [ { category: "summary", text: "The iconv function in the GNU C Library (aka glibc or libc6) 2.32 and earlier, when processing invalid multi-byte input sequences in IBM1364, IBM1371, IBM1388, IBM1390, and IBM1399 encodings, fails to advance the input state, which could lead to an infinite loop in applications, resulting in a denial of service, a different vulnerability from CVE-2016-10228.", title: "Summary", }, ], product_status: { known_affected: [ "1", ], }, remediations: [ { category: "none_available", details: "Currently no fix is available", product_ids: [ "1", ], }, { category: "workaround", details: "Only build and run applications from trusted sources", product_ids: [ "1", ], }, ], scores: [ { cvss_v3: { baseScore: 5.5, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C", version: "3.1", }, products: [ "1", ], }, ], title: "CVE-2020-27618", }, { cve: "CVE-2020-29562", cwe: { id: "CWE-617", name: "Reachable Assertion", }, notes: [ { category: "summary", text: "The iconv function in the GNU C Library (aka glibc or libc6) 2.30 to 2.32, when converting UCS4 text containing an irreversible character, fails an assertion in the code path and aborts the program, potentially resulting in a denial of service.", title: "Summary", }, ], product_status: { known_affected: [ "1", ], }, remediations: [ { category: "none_available", details: "Currently no fix is available", product_ids: [ "1", ], }, { category: "workaround", details: "Only build and run applications from trusted sources", product_ids: [ "1", ], }, ], scores: [ { cvss_v3: { baseScore: 4.8, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C", version: "3.1", }, products: [ "1", ], }, ], title: "CVE-2020-29562", }, { cve: "CVE-2021-3326", cwe: { id: "CWE-617", name: "Reachable Assertion", }, notes: [ { category: "summary", text: "The iconv function in the GNU C Library (aka glibc or libc6) 2.32 and earlier, when processing invalid input sequences in the ISO-2022-JP-3 encoding, fails an assertion in the code path and aborts the program, potentially resulting in a denial of service.", title: "Summary", }, ], product_status: { known_affected: [ "1", ], }, remediations: [ { category: "none_available", details: "Currently no fix is available", product_ids: [ "1", ], }, { category: "workaround", details: "Only build and run applications from trusted sources", product_ids: [ "1", ], }, ], scores: [ { cvss_v3: { baseScore: 7.5, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C", version: "3.1", }, products: [ "1", ], }, ], title: "CVE-2021-3326", }, { cve: "CVE-2021-3998", cwe: { id: "CWE-125", name: "Out-of-bounds Read", }, notes: [ { category: "summary", text: "A flaw was found in glibc. The realpath() function can mistakenly return an unexpected value, potentially leading to information leakage and disclosure of sensitive data.", title: "Summary", }, ], product_status: { known_affected: [ "1", ], }, remediations: [ { category: "none_available", details: "Currently no fix is available", product_ids: [ "1", ], }, { category: "workaround", details: "Only build and run applications from trusted sources", product_ids: [ "1", ], }, ], scores: [ { cvss_v3: { baseScore: 7.5, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N/E:P/RL:O/RC:C", version: "3.1", }, products: [ "1", ], }, ], title: "CVE-2021-3998", }, { cve: "CVE-2021-3999", cwe: { id: "CWE-193", name: "Off-by-one Error", }, notes: [ { category: "summary", text: "A flaw was found in glibc. An off-by-one buffer overflow and underflow in getcwd() may lead to memory corruption when the size of the buffer is exactly 1. A local attacker who can control the input buffer and size passed to getcwd() in a setuid program could use this flaw to potentially execute arbitrary code and escalate their privileges on the system.", title: "Summary", }, ], product_status: { known_affected: [ "1", ], }, remediations: [ { category: "none_available", details: "Currently no fix is available", product_ids: [ "1", ], }, { category: "workaround", details: "Only build and run applications from trusted sources", product_ids: [ "1", ], }, ], scores: [ { cvss_v3: { baseScore: 7.8, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C", version: "3.1", }, products: [ "1", ], }, ], title: "CVE-2021-3999", }, { cve: "CVE-2021-20269", cwe: { id: "CWE-276", name: "Incorrect Default Permissions", }, notes: [ { category: "summary", text: "A flaw was found in the permissions of a log file created by kexec-tools. This flaw allows a local unprivileged user to read this file and leak kernel internal information from a previous panic. The highest threat from this vulnerability is to confidentiality. This flaw affects kexec-tools shipped by Fedora versions prior to 2.0.21-8 and RHEL versions prior to 2.0.20-47.", title: "Summary", }, ], product_status: { known_affected: [ "1", ], }, remediations: [ { category: "none_available", details: "Currently no fix is available", product_ids: [ "1", ], }, { category: "workaround", details: "Only build and run applications from trusted sources", product_ids: [ "1", ], }, ], scores: [ { cvss_v3: { baseScore: 5.5, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:P/RL:O/RC:C", version: "3.1", }, products: [ "1", ], }, ], title: "CVE-2021-20269", }, { cve: "CVE-2021-27645", cwe: { id: "CWE-415", name: "Double Free", }, notes: [ { category: "summary", text: "The nameserver caching daemon (nscd) in the GNU C Library (aka glibc or libc6) 2.29 through 2.33, when processing a request for netgroup lookup, may crash due to a double-free, potentially resulting in degraded service or Denial of Service on the local system. This is related to netgroupcache.c.", title: "Summary", }, ], product_status: { known_affected: [ "1", ], }, remediations: [ { category: "none_available", details: "Currently no fix is available", product_ids: [ "1", ], }, { category: "workaround", details: "Only build and run applications from trusted sources", product_ids: [ "1", ], }, ], scores: [ { cvss_v3: { baseScore: 2.5, baseSeverity: "LOW", vectorString: "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:L/E:P/RL:O/RC:C", version: "3.1", }, products: [ "1", ], }, ], title: "CVE-2021-27645", }, { cve: "CVE-2021-28831", cwe: { id: "CWE-755", name: "Improper Handling of Exceptional Conditions", }, notes: [ { category: "summary", text: "decompress_gunzip.c in BusyBox through 1.32.1 mishandles the error bit on the huft_build result pointer, with a resultant invalid free or segmentation fault, via malformed gzip data.", title: "Summary", }, ], product_status: { known_affected: [ "1", ], }, remediations: [ { category: "none_available", details: "Currently no fix is available", product_ids: [ "1", ], }, { category: "workaround", details: "Only build and run applications from trusted sources", product_ids: [ "1", ], }, ], scores: [ { cvss_v3: { baseScore: 7.5, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C", version: "3.1", }, products: [ "1", ], }, ], title: "CVE-2021-28831", }, { cve: "CVE-2021-33574", cwe: { id: "CWE-416", name: "Use After Free", }, notes: [ { category: "summary", text: "The mq_notify function in the GNU C Library (aka glibc) versions 2.32 and 2.33 has a use-after-free. It may use the notification thread attributes object (passed through its struct sigevent parameter) after it has been freed by the caller, leading to a denial of service (application crash) or possibly unspecified other impact.", title: "Summary", }, ], product_status: { known_affected: [ "1", ], }, remediations: [ { category: "none_available", details: "Currently no fix is available", product_ids: [ "1", ], }, { category: "workaround", details: "Only build and run applications from trusted sources", product_ids: [ "1", ], }, ], scores: [ { cvss_v3: { baseScore: 9.8, baseSeverity: "CRITICAL", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C", version: "3.1", }, products: [ "1", ], }, ], title: "CVE-2021-33574", }, { cve: "CVE-2021-35942", cwe: { id: "CWE-190", name: "Integer Overflow or Wraparound", }, notes: [ { category: "summary", text: "The wordexp function in the GNU C Library (aka glibc) through 2.33 may crash or read arbitrary memory in parse_param (in posix/wordexp.c) when called with an untrusted, crafted pattern, potentially resulting in a denial of service or disclosure of information. This occurs because atoi was used but strtoul should have been used to ensure correct calculations.", title: "Summary", }, ], product_status: { known_affected: [ "1", ], }, remediations: [ { category: "none_available", details: "Currently no fix is available", product_ids: [ "1", ], }, { category: "workaround", details: "Only build and run applications from trusted sources", product_ids: [ "1", ], }, ], scores: [ { cvss_v3: { baseScore: 9.1, baseSeverity: "CRITICAL", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H/E:P/RL:O/RC:C", version: "3.1", }, products: [ "1", ], }, ], title: "CVE-2021-35942", }, { cve: "CVE-2021-38604", cwe: { id: "CWE-476", name: "NULL Pointer Dereference", }, notes: [ { category: "summary", text: "In librt in the GNU C Library (aka glibc) through 2.34, sysdeps/unix/sysv/linux/mq_notify.c mishandles certain NOTIFY_REMOVED data, leading to a NULL pointer dereference. NOTE: this vulnerability was introduced as a side effect of the CVE-2021-33574 fix.", title: "Summary", }, ], product_status: { known_affected: [ "1", ], }, remediations: [ { category: "none_available", details: "Currently no fix is available", product_ids: [ "1", ], }, { category: "workaround", details: "Only build and run applications from trusted sources", product_ids: [ "1", ], }, ], scores: [ { cvss_v3: { baseScore: 7.5, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C", version: "3.1", }, products: [ "1", ], }, ], title: "CVE-2021-38604", }, { cve: "CVE-2021-42373", cwe: { id: "CWE-476", name: "NULL Pointer Dereference", }, notes: [ { category: "summary", text: "A NULL pointer dereference in Busybox's man applet leads to denial of service when a section name is supplied but no page argument is given.", title: "Summary", }, ], product_status: { known_affected: [ "1", ], }, remediations: [ { category: "none_available", details: "Currently no fix is available", product_ids: [ "1", ], }, { category: "workaround", details: "Only build and run applications from trusted sources", product_ids: [ "1", ], }, ], scores: [ { cvss_v3: { baseScore: 5.1, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C", version: "3.1", }, products: [ "1", ], }, ], title: "CVE-2021-42373", }, { cve: "CVE-2021-42374", cwe: { id: "CWE-125", name: "Out-of-bounds Read", }, notes: [ { category: "summary", text: "An out-of-bounds heap read in Busybox's unlzma applet leads to information leak and denial of service when crafted LZMA-compressed input is decompressed. This can be triggered by any applet/format that internally supports LZMA compression.", title: "Summary", }, ], product_status: { known_affected: [ "1", ], }, remediations: [ { category: "none_available", details: "Currently no fix is available", product_ids: [ "1", ], }, { category: "workaround", details: "Only build and run applications from trusted sources", product_ids: [ "1", ], }, ], scores: [ { cvss_v3: { baseScore: 6.5, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:H/E:P/RL:O/RC:C", version: "3.1", }, products: [ "1", ], }, ], title: "CVE-2021-42374", }, { cve: "CVE-2021-42375", cwe: { id: "CWE-20", name: "Improper Input Validation", }, notes: [ { category: "summary", text: "An incorrect handling of a special element in Busybox's ash applet leads to denial of service when processing a crafted shell command, due to the shell mistaking specific characters for reserved characters. This may be used for DoS under rare conditions of filtered command input.", title: "Summary", }, ], product_status: { known_affected: [ "1", ], }, remediations: [ { category: "none_available", details: "Currently no fix is available", product_ids: [ "1", ], }, { category: "workaround", details: "Only build and run applications from trusted sources", product_ids: [ "1", ], }, ], scores: [ { cvss_v3: { baseScore: 4.1, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C", version: "3.1", }, products: [ "1", ], }, ], title: "CVE-2021-42375", }, { cve: "CVE-2021-42376", cwe: { id: "CWE-476", name: "NULL Pointer Dereference", }, notes: [ { category: "summary", text: "A NULL pointer dereference in Busybox's hush applet leads to denial of service when processing a crafted shell command, due to missing validation after a \\x03 delimiter character. This may be used for DoS under very rare conditions of filtered command input.", title: "Summary", }, ], product_status: { known_affected: [ "1", ], }, remediations: [ { category: "none_available", details: "Currently no fix is available", product_ids: [ "1", ], }, { category: "workaround", details: "Only build and run applications from trusted sources", product_ids: [ "1", ], }, ], scores: [ { cvss_v3: { baseScore: 4.1, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C", version: "3.1", }, products: [ "1", ], }, ], title: "CVE-2021-42376", }, { cve: "CVE-2021-42377", cwe: { id: "CWE-763", name: "Release of Invalid Pointer or Reference", }, notes: [ { category: "summary", text: "An attacker-controlled pointer free in Busybox's hush applet leads to denial of service and possible code execution when processing a crafted shell command, due to the shell mishandling the &&& string. This may be used for remote code execution under rare conditions of filtered command input.", title: "Summary", }, ], product_status: { known_affected: [ "1", ], }, remediations: [ { category: "none_available", details: "Currently no fix is available", product_ids: [ "1", ], }, { category: "workaround", details: "Only build and run applications from trusted sources", product_ids: [ "1", ], }, ], scores: [ { cvss_v3: { baseScore: 6.4, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C", version: "3.1", }, products: [ "1", ], }, ], title: "CVE-2021-42377", }, { cve: "CVE-2021-42378", cwe: { id: "CWE-416", name: "Use After Free", }, notes: [ { category: "summary", text: "A use-after-free in Busybox's awk applet leads to denial of service and possibly code execution when processing a crafted awk pattern in the getvar_i function.", title: "Summary", }, ], product_status: { known_affected: [ "1", ], }, remediations: [ { category: "none_available", details: "Currently no fix is available", product_ids: [ "1", ], }, { category: "workaround", details: "Only build and run applications from trusted sources", product_ids: [ "1", ], }, ], scores: [ { cvss_v3: { baseScore: 6.6, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C", version: "3.1", }, products: [ "1", ], }, ], title: "CVE-2021-42378", }, { cve: "CVE-2021-42379", cwe: { id: "CWE-416", name: "Use After Free", }, notes: [ { category: "summary", text: "A use-after-free in Busybox's awk applet leads to denial of service and possibly code execution when processing a crafted awk pattern in the next_input_file function.", title: "Summary", }, ], product_status: { known_affected: [ "1", ], }, remediations: [ { category: "none_available", details: "Currently no fix is available", product_ids: [ "1", ], }, { category: "workaround", details: "Only build and run applications from trusted sources", product_ids: [ "1", ], }, ], scores: [ { cvss_v3: { baseScore: 6.6, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C", version: "3.1", }, products: [ "1", ], }, ], title: "CVE-2021-42379", }, { cve: "CVE-2021-42380", cwe: { id: "CWE-416", name: "Use After Free", }, notes: [ { category: "summary", text: "A use-after-free in awk leads to denial of service and possibly code execution when processing a crafted awk pattern in the clrvar function.", title: "Summary", }, ], product_status: { known_affected: [ "1", ], }, remediations: [ { category: "none_available", details: "Currently no fix is available", product_ids: [ "1", ], }, { category: "workaround", details: "Only build and run applications from trusted sources", product_ids: [ "1", ], }, ], scores: [ { cvss_v3: { baseScore: 6.6, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C", version: "3.1", }, products: [ "1", ], }, ], title: "CVE-2021-42380", }, { cve: "CVE-2021-42381", cwe: { id: "CWE-416", name: "Use After Free", }, notes: [ { category: "summary", text: "A use-after-free in awk leads to denial of service and possibly code execution when processing a crafted awk pattern in the hash_init function.", title: "Summary", }, ], product_status: { known_affected: [ "1", ], }, remediations: [ { category: "none_available", details: "Currently no fix is available", product_ids: [ "1", ], }, { category: "workaround", details: "Only build and run applications from trusted sources", product_ids: [ "1", ], }, ], scores: [ { cvss_v3: { baseScore: 6.6, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C", version: "3.1", }, products: [ "1", ], }, ], title: "CVE-2021-42381", }, { cve: "CVE-2021-42382", cwe: { id: "CWE-416", name: "Use After Free", }, notes: [ { category: "summary", text: "A use-after-free in awk leads to denial of service and possibly code execution when processing a crafted awk pattern in the getvar_s function.", title: "Summary", }, ], product_status: { known_affected: [ "1", ], }, remediations: [ { category: "none_available", details: "Currently no fix is available", product_ids: [ "1", ], }, { category: "workaround", details: "Only build and run applications from trusted sources", product_ids: [ "1", ], }, ], scores: [ { cvss_v3: { baseScore: 6.6, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C", version: "3.1", }, products: [ "1", ], }, ], title: "CVE-2021-42382", }, { cve: "CVE-2021-42383", cwe: { id: "CWE-416", name: "Use After Free", }, notes: [ { category: "summary", text: "A use-after-free in awk leads to denial of service and possibly code execution when processing a crafted awk pattern in the evaluate function.", title: "Summary", }, ], product_status: { known_affected: [ "1", ], }, remediations: [ { category: "none_available", details: "Currently no fix is available", product_ids: [ "1", ], }, { category: "workaround", details: "Only build and run applications from trusted sources", product_ids: [ "1", ], }, ], scores: [ { cvss_v3: { baseScore: 6.6, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C", version: "3.1", }, products: [ "1", ], }, ], title: "CVE-2021-42383", }, { cve: "CVE-2021-42384", cwe: { id: "CWE-416", name: "Use After Free", }, notes: [ { category: "summary", text: "A use-after-free in Busybox's awk applet leads to denial of service and possibly code execution when processing a crafted awk pattern in the handle_special function.", title: "Summary", }, ], product_status: { known_affected: [ "1", ], }, remediations: [ { category: "none_available", details: "Currently no fix is available", product_ids: [ "1", ], }, { category: "workaround", details: "Only build and run applications from trusted sources", product_ids: [ "1", ], }, ], scores: [ { cvss_v3: { baseScore: 6.6, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C", version: "3.1", }, products: [ "1", ], }, ], title: "CVE-2021-42384", }, { cve: "CVE-2021-42385", cwe: { id: "CWE-416", name: "Use After Free", }, notes: [ { category: "summary", text: "A use-after-free in awk leads to denial of service and possibly code execution when processing a crafted awk pattern in the evaluate function.", title: "Summary", }, ], product_status: { known_affected: [ "1", ], }, remediations: [ { category: "none_available", details: "Currently no fix is available", product_ids: [ "1", ], }, { category: "workaround", details: "Only build and run applications from trusted sources", product_ids: [ "1", ], }, ], scores: [ { cvss_v3: { baseScore: 6.6, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C", version: "3.1", }, products: [ "1", ], }, ], title: "CVE-2021-42385", }, { cve: "CVE-2021-42386", cwe: { id: "CWE-416", name: "Use After Free", }, notes: [ { category: "summary", text: "A use-after-free in awk leads to denial of service and possibly code execution when processing a crafted awk pattern in the nvalloc function.", title: "Summary", }, ], product_status: { known_affected: [ "1", ], }, remediations: [ { category: "none_available", details: "Currently no fix is available", product_ids: [ "1", ], }, { category: "workaround", details: "Only build and run applications from trusted sources", product_ids: [ "1", ], }, ], scores: [ { cvss_v3: { baseScore: 6.6, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C", version: "3.1", }, products: [ "1", ], }, ], title: "CVE-2021-42386", }, { cve: "CVE-2022-1882", cwe: { id: "CWE-416", name: "Use After Free", }, notes: [ { category: "summary", text: "A use-after-free flaw was found in the Linux kernel’s pipes functionality in how a user performs manipulations with the pipe post_one_notification() after free_pipe_info() that is already called. This flaw allows a local user to crash or potentially escalate their privileges on the system.", title: "Summary", }, ], product_status: { known_affected: [ "1", ], }, remediations: [ { category: "none_available", details: "Currently no fix is available", product_ids: [ "1", ], }, { category: "workaround", details: "Only build and run applications from trusted sources", product_ids: [ "1", ], }, ], scores: [ { cvss_v3: { baseScore: 7.8, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C", version: "3.1", }, products: [ "1", ], }, ], title: "CVE-2022-1882", }, { cve: "CVE-2022-2585", cwe: { id: "CWE-416", name: "Use After Free", }, notes: [ { category: "summary", text: "A use-after-free flaw was found in the Linux kernel’s POSIX CPU timers functionality in the way a user creates and then deletes the timer in the non-leader thread of the program. This flaw allows a local user to crash or potentially escalate their privileges on the system.", title: "Summary", }, ], product_status: { known_affected: [ "1", ], }, remediations: [ { category: "none_available", details: "Currently no fix is available", product_ids: [ "1", ], }, { category: "workaround", details: "Only build and run applications from trusted sources", product_ids: [ "1", ], }, ], scores: [ { cvss_v3: { baseScore: 7.8, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C", version: "3.1", }, products: [ "1", ], }, ], title: "CVE-2022-2585", }, { cve: "CVE-2022-2588", cwe: { id: "CWE-20", name: "Improper Input Validation", }, notes: [ { category: "summary", text: "Zhenpeng Lin discovered that the network packet scheduler implementation in the Linux kernel did not properly remove all references to a route filter before freeing it in some situations. A local attacker could use this to cause a denial of service (system crash) or execute arbitrary code.", title: "Summary", }, ], product_status: { known_affected: [ "1", ], }, remediations: [ { category: "none_available", details: "Currently no fix is available", product_ids: [ "1", ], }, { category: "workaround", details: "Only build and run applications from trusted sources", product_ids: [ "1", ], }, ], scores: [ { cvss_v3: { baseScore: 7.8, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C", version: "3.1", }, products: [ "1", ], }, ], title: "CVE-2022-2588", }, { cve: "CVE-2022-2905", cwe: { id: "CWE-125", name: "Out-of-bounds Read", }, notes: [ { category: "summary", text: "An out-of-bounds memory read flaw was found in the Linux kernel's BPF subsystem in how a user calls the bpf_tail_call function with a key larger than the max_entries of the map. This flaw allows a local user to gain unauthorized access to data.", title: "Summary", }, ], product_status: { known_affected: [ "1", ], }, remediations: [ { category: "none_available", details: "Currently no fix is available", product_ids: [ "1", ], }, { category: "workaround", details: "Only build and run applications from trusted sources", product_ids: [ "1", ], }, ], scores: [ { cvss_v3: { baseScore: 5.5, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:P/RL:O/RC:C", version: "3.1", }, products: [ "1", ], }, ], title: "CVE-2022-2905", }, { cve: "CVE-2022-3028", cwe: { id: "CWE-362", name: "Concurrent Execution using Shared Resource with Improper Synchronization ('Race Condition')", }, notes: [ { category: "summary", text: "A race condition was found in the Linux kernel's IP framework for transforming packets (XFRM subsystem) when multiple calls to xfrm_probe_algs occurred simultaneously. This flaw could allow a local attacker to potentially trigger an out-of-bounds write or leak kernel heap memory by performing an out-of-bounds read and copying it into a socket.", title: "Summary", }, ], product_status: { known_affected: [ "1", ], }, remediations: [ { category: "none_available", details: "Currently no fix is available", product_ids: [ "1", ], }, { category: "workaround", details: "Only build and run applications from trusted sources", product_ids: [ "1", ], }, ], scores: [ { cvss_v3: { baseScore: 7, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C", version: "3.1", }, products: [ "1", ], }, ], title: "CVE-2022-3028", }, { cve: "CVE-2022-3435", cwe: { id: "CWE-119", name: "Improper Restriction of Operations within the Bounds of a Memory Buffer", }, notes: [ { category: "summary", text: "A vulnerability classified as problematic has been found in Linux Kernel. This affects the function fib_nh_match of the file net/ipv4/fib_semantics.c of the component IPv4 Handler. The manipulation leads to out-of-bounds read. It is possible to initiate the attack remotely. It is recommended to apply a patch to fix this issue. The identifier VDB-210357 was assigned to this vulnerability.", title: "Summary", }, ], product_status: { known_affected: [ "1", ], }, remediations: [ { category: "none_available", details: "Currently no fix is available", product_ids: [ "1", ], }, { category: "workaround", details: "Only build and run applications from trusted sources", product_ids: [ "1", ], }, ], scores: [ { cvss_v3: { baseScore: 4.3, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N/E:P/RL:O/RC:C", version: "3.1", }, products: [ "1", ], }, ], title: "CVE-2022-3435", }, { cve: "CVE-2022-3586", cwe: { id: "CWE-416", name: "Use After Free", }, notes: [ { category: "summary", text: "A flaw was found in the Linux kernel’s networking code. A use-after-free was found in the way the sch_sfb enqueue function used the socket buffer (SKB) cb field after the same SKB had been enqueued (and freed) into a child qdisc. This flaw allows a local, unprivileged user to crash the system, causing a denial of service.", title: "Summary", }, ], product_status: { known_affected: [ "1", ], }, remediations: [ { category: "none_available", details: "Currently no fix is available", product_ids: [ "1", ], }, { category: "workaround", details: "Only build and run applications from trusted sources", product_ids: [ "1", ], }, ], scores: [ { cvss_v3: { baseScore: 5.5, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C", version: "3.1", }, products: [ "1", ], }, ], title: "CVE-2022-3586", }, { cve: "CVE-2022-4378", cwe: { id: "CWE-787", name: "Out-of-bounds Write", }, notes: [ { category: "summary", text: "A stack overflow flaw was found in the Linux kernel's SYSCTL subsystem in how a user changes certain kernel parameters and variables. This flaw allows a local user to crash or potentially escalate their privileges on the system.", title: "Summary", }, ], product_status: { known_affected: [ "1", ], }, remediations: [ { category: "none_available", details: "Currently no fix is available", product_ids: [ "1", ], }, { category: "workaround", details: "Only build and run applications from trusted sources", product_ids: [ "1", ], }, ], scores: [ { cvss_v3: { baseScore: 7.8, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C", version: "3.1", }, products: [ "1", ], }, ], title: "CVE-2022-4378", }, { cve: "CVE-2022-4662", cwe: { id: "CWE-455", name: "Non-exit on Failed Initialization", }, notes: [ { category: "summary", text: "A flaw incorrect access control in the Linux kernel USB core subsystem was found in the way user attaches usb device. A local user could use this flaw to crash the system.", title: "Summary", }, ], product_status: { known_affected: [ "1", ], }, remediations: [ { category: "none_available", details: "Currently no fix is available", product_ids: [ "1", ], }, { category: "workaround", details: "Only build and run applications from trusted sources", product_ids: [ "1", ], }, ], scores: [ { cvss_v3: { baseScore: 5.5, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C", version: "3.1", }, products: [ "1", ], }, ], title: "CVE-2022-4662", }, { cve: "CVE-2022-20421", cwe: { id: "CWE-416", name: "Use After Free", }, notes: [ { category: "summary", text: "In binder_inc_ref_for_node of binder.c, there is a possible way to corrupt memory due to a use after free. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-239630375References: Upstream kernel", title: "Summary", }, ], product_status: { known_affected: [ "1", ], }, remediations: [ { category: "none_available", details: "Currently no fix is available", product_ids: [ "1", ], }, { category: "workaround", details: "Only build and run applications from trusted sources", product_ids: [ "1", ], }, ], scores: [ { cvss_v3: { baseScore: 7.8, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C", version: "3.1", }, products: [ "1", ], }, ], title: "CVE-2022-20421", }, { cve: "CVE-2022-20422", cwe: { id: "CWE-362", name: "Concurrent Execution using Shared Resource with Improper Synchronization ('Race Condition')", }, notes: [ { category: "summary", text: "In emulation_proc_handler of armv8_deprecated.c, there is a possible way to corrupt memory due to a race condition. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-237540956References: Upstream kernel", title: "Summary", }, ], product_status: { known_affected: [ "1", ], }, remediations: [ { category: "none_available", details: "Currently no fix is available", product_ids: [ "1", ], }, { category: "workaround", details: "Only build and run applications from trusted sources", product_ids: [ "1", ], }, ], scores: [ { cvss_v3: { baseScore: 7, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C", version: "3.1", }, products: [ "1", ], }, ], title: "CVE-2022-20422", }, { cve: "CVE-2022-21233", cwe: { id: "CWE-311", name: "Missing Encryption of Sensitive Data", }, notes: [ { category: "summary", text: "Improper isolation of shared resources in some Intel(R) Processors may allow a privileged user to potentially enable information disclosure via local access.", title: "Summary", }, ], product_status: { known_affected: [ "1", ], }, remediations: [ { category: "none_available", details: "Currently no fix is available", product_ids: [ "1", ], }, { category: "workaround", details: "Only build and run applications from trusted sources", product_ids: [ "1", ], }, ], scores: [ { cvss_v3: { baseScore: 5.5, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:P/RL:O/RC:C", version: "3.1", }, products: [ "1", ], }, ], title: "CVE-2022-21233", }, { cve: "CVE-2022-23218", cwe: { id: "CWE-120", name: "Buffer Copy without Checking Size of Input ('Classic Buffer Overflow')", }, notes: [ { category: "summary", text: "The deprecated compatibility function svcunix_create in the sunrpc module of the GNU C Library (aka glibc) through 2.34 copies its path argument on the stack without validating its length, which may result in a buffer overflow, potentially resulting in a denial of service or (if an application is not built with a stack protector enabled) arbitrary code execution.", title: "Summary", }, ], product_status: { known_affected: [ "1", ], }, remediations: [ { category: "none_available", details: "Currently no fix is available", product_ids: [ "1", ], }, { category: "workaround", details: "Only build and run applications from trusted sources", product_ids: [ "1", ], }, ], scores: [ { cvss_v3: { baseScore: 9.8, baseSeverity: "CRITICAL", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C", version: "3.1", }, products: [ "1", ], }, ], title: "CVE-2022-23218", }, { cve: "CVE-2022-23219", cwe: { id: "CWE-120", name: "Buffer Copy without Checking Size of Input ('Classic Buffer Overflow')", }, notes: [ { category: "summary", text: "The deprecated compatibility function clnt_create in the sunrpc module of the GNU C Library (aka glibc) through 2.34 copies its hostname argument on the stack without validating its length, which may result in a buffer overflow, potentially resulting in a denial of service or (if an application is not built with a stack protector enabled) arbitrary code execution.", title: "Summary", }, ], product_status: { known_affected: [ "1", ], }, remediations: [ { category: "none_available", details: "Currently no fix is available", product_ids: [ "1", ], }, { category: "workaround", details: "Only build and run applications from trusted sources", product_ids: [ "1", ], }, ], scores: [ { cvss_v3: { baseScore: 9.8, baseSeverity: "CRITICAL", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C", version: "3.1", }, products: [ "1", ], }, ], title: "CVE-2022-23219", }, { cve: "CVE-2022-28391", cwe: { id: "CWE-311", name: "Missing Encryption of Sensitive Data", }, notes: [ { category: "summary", text: "BusyBox through 1.35.0 allows remote attackers to execute arbitrary code if netstat is used to print a DNS PTR record's value to a VT compatible terminal. Alternatively, the attacker could choose to change the terminal's colors.", title: "Summary", }, ], product_status: { known_affected: [ "1", ], }, remediations: [ { category: "none_available", details: "Currently no fix is available", product_ids: [ "1", ], }, { category: "workaround", details: "Only build and run applications from trusted sources", product_ids: [ "1", ], }, ], scores: [ { cvss_v3: { baseScore: 8.8, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C", version: "3.1", }, products: [ "1", ], }, ], title: "CVE-2022-28391", }, { cve: "CVE-2022-30065", cwe: { id: "CWE-416", name: "Use After Free", }, notes: [ { category: "summary", text: "A use-after-free in Busybox 1.35-x's awk applet leads to denial of service and possibly code execution when processing a crafted awk pattern in the copyvar function.", title: "Summary", }, ], product_status: { known_affected: [ "1", ], }, remediations: [ { category: "none_available", details: "Currently no fix is available", product_ids: [ "1", ], }, { category: "workaround", details: "Only build and run applications from trusted sources", product_ids: [ "1", ], }, ], scores: [ { cvss_v3: { baseScore: 7.8, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C", version: "3.1", }, products: [ "1", ], }, ], title: "CVE-2022-30065", }, { cve: "CVE-2022-39188", cwe: { id: "CWE-362", name: "Concurrent Execution using Shared Resource with Improper Synchronization ('Race Condition')", }, notes: [ { category: "summary", text: "An issue was discovered in include/asm-generic/tlb.h in the Linux kernel before 5.19. Because of a race condition (unmap_mapping_range versus munmap), a device driver can free a page while it still has stale TLB entries. This only occurs in situations with VM_PFNMAP VMAs.", title: "Summary", }, ], product_status: { known_affected: [ "1", ], }, remediations: [ { category: "none_available", details: "Currently no fix is available", product_ids: [ "1", ], }, { category: "workaround", details: "Only build and run applications from trusted sources", product_ids: [ "1", ], }, ], scores: [ { cvss_v3: { baseScore: 4.7, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C", version: "3.1", }, products: [ "1", ], }, ], title: "CVE-2022-39188", }, { cve: "CVE-2022-39190", cwe: { id: "CWE-400", name: "Uncontrolled Resource Consumption", }, notes: [ { category: "summary", text: "An issue was discovered in net/netfilter/nf_tables_api.c in the Linux kernel before 5.19.6. A denial of service can occur upon binding to an already bound chain.", title: "Summary", }, ], product_status: { known_affected: [ "1", ], }, remediations: [ { category: "none_available", details: "Currently no fix is available", product_ids: [ "1", ], }, { category: "workaround", details: "Only build and run applications from trusted sources", product_ids: [ "1", ], }, ], scores: [ { cvss_v3: { baseScore: 5.5, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C", version: "3.1", }, products: [ "1", ], }, ], title: "CVE-2022-39190", }, { cve: "CVE-2022-40307", cwe: { id: "CWE-416", name: "Use After Free", }, notes: [ { category: "summary", text: "An issue was discovered in the Linux kernel through 5.19.8. drivers/firmware/efi/capsule-loader.c has a race condition with a resultant use-after-free.", title: "Summary", }, ], product_status: { known_affected: [ "1", ], }, remediations: [ { category: "none_available", details: "Currently no fix is available", product_ids: [ "1", ], }, { category: "workaround", details: "Only build and run applications from trusted sources", product_ids: [ "1", ], }, ], scores: [ { cvss_v3: { baseScore: 4.7, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C", version: "3.1", }, products: [ "1", ], }, ], title: "CVE-2022-40307", }, { cve: "CVE-2022-41222", cwe: { id: "CWE-416", name: "Use After Free", }, notes: [ { category: "summary", text: "mm/mremap.c in the Linux kernel before 5.13.3 has a use-after-free via a stale TLB because an rmap lock is not held during a PUD move.", title: "Summary", }, ], product_status: { known_affected: [ "1", ], }, remediations: [ { category: "none_available", details: "Currently no fix is available", product_ids: [ "1", ], }, { category: "workaround", details: "Only build and run applications from trusted sources", product_ids: [ "1", ], }, ], scores: [ { cvss_v3: { baseScore: 7, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C", version: "3.1", }, products: [ "1", ], }, ], title: "CVE-2022-41222", }, { cve: "CVE-2022-42703", cwe: { id: "CWE-416", name: "Use After Free", }, notes: [ { category: "summary", text: "mm/rmap.c in the Linux kernel before 5.19.7 has a use-after-free related to leaf anon_vma double reuse.", title: "Summary", }, ], product_status: { known_affected: [ "1", ], }, remediations: [ { category: "none_available", details: "Currently no fix is available", product_ids: [ "1", ], }, { category: "workaround", details: "Only build and run applications from trusted sources", product_ids: [ "1", ], }, ], scores: [ { cvss_v3: { baseScore: 5.5, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C", version: "3.1", }, products: [ "1", ], }, ], title: "CVE-2022-42703", }, { cve: "CVE-2023-0179", cwe: { id: "CWE-190", name: "Integer Overflow or Wraparound", }, notes: [ { category: "summary", text: "A buffer overflow vulnerability was found in the Netfilter subsystem in the Linux Kernel. This issue could allow the leakage of both stack and heap addresses, and potentially allow Local Privilege Escalation to the root user via arbitrary code execution.", title: "Summary", }, ], product_status: { known_affected: [ "1", ], }, remediations: [ { category: "none_available", details: "Currently no fix is available", product_ids: [ "1", ], }, { category: "workaround", details: "Only build and run applications from trusted sources", product_ids: [ "1", ], }, ], scores: [ { cvss_v3: { baseScore: 7.8, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C", version: "3.1", }, products: [ "1", ], }, ], title: "CVE-2023-0179", }, { cve: "CVE-2023-0394", cwe: { id: "CWE-311", name: "Missing Encryption of Sensitive Data", }, notes: [ { category: "summary", text: "A NULL pointer dereference flaw was found in rawv6_push_pending_frames in net/ipv6/raw.c in the network subcomponent in the Linux kernel. This flaw causes the system to crash.", title: "Summary", }, ], product_status: { known_affected: [ "1", ], }, remediations: [ { category: "none_available", details: "Currently no fix is available", product_ids: [ "1", ], }, { category: "workaround", details: "Only build and run applications from trusted sources", product_ids: [ "1", ], }, ], scores: [ { cvss_v3: { baseScore: 5.5, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C", version: "3.1", }, products: [ "1", ], }, ], title: "CVE-2023-0394", }, { cve: "CVE-2023-1073", cwe: { id: "CWE-787", name: "Out-of-bounds Write", }, notes: [ { category: "summary", text: "A memory corruption flaw was found in the Linux kernel’s human interface device (HID) subsystem in how a user inserts a malicious USB device. This flaw allows a local user to crash or potentially escalate their privileges on the system.", title: "Summary", }, ], product_status: { known_affected: [ "1", ], }, remediations: [ { category: "none_available", details: "Currently no fix is available", product_ids: [ "1", ], }, { category: "workaround", details: "Only build and run applications from trusted sources", product_ids: [ "1", ], }, ], scores: [ { cvss_v3: { baseScore: 6.6, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C", version: "3.1", }, products: [ "1", ], }, ], title: "CVE-2023-1073", }, ], }
WID-SEC-W-2022-2029
Vulnerability from csaf_certbund
Published
2021-03-25 23:00
Modified
2025-01-19 23:00
Summary
BusyBox: Schwachstelle ermöglicht Denial of Service
Notes
Das BSI ist als Anbieter für die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch dafür verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgfältig im Einzelfall zu prüfen.
Produktbeschreibung
BusyBox ist ein Computerprogramm, das verschiedene Standard-Unix-Dienstprogramme in einem einzelnen Programm vereint.
Angriff
Ein entfernter, anonymer Angreifer kann eine Schwachstelle in BusyBox ausnutzen, um einen Denial of Service Angriff durchzuführen.
Betroffene Betriebssysteme
- Linux
- UNIX
{ document: { aggregate_severity: { text: "mittel", }, category: "csaf_base", csaf_version: "2.0", distribution: { tlp: { label: "WHITE", url: "https://www.first.org/tlp/", }, }, lang: "de-DE", notes: [ { category: "legal_disclaimer", text: "Das BSI ist als Anbieter für die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch dafür verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgfältig im Einzelfall zu prüfen.", }, { category: "description", text: "BusyBox ist ein Computerprogramm, das verschiedene Standard-Unix-Dienstprogramme in einem einzelnen Programm vereint.", title: "Produktbeschreibung", }, { category: "summary", text: "Ein entfernter, anonymer Angreifer kann eine Schwachstelle in BusyBox ausnutzen, um einen Denial of Service Angriff durchzuführen.", title: "Angriff", }, { category: "general", text: "- Linux\n- UNIX", title: "Betroffene Betriebssysteme", }, ], publisher: { category: "other", contact_details: "csaf-provider@cert-bund.de", name: "Bundesamt für Sicherheit in der Informationstechnik", namespace: "https://www.bsi.bund.de", }, references: [ { category: "self", summary: "WID-SEC-W-2022-2029 - CSAF Version", url: "https://wid.cert-bund.de/.well-known/csaf/white/2021/wid-sec-w-2022-2029.json", }, { category: "self", summary: "WID-SEC-2022-2029 - Portal Version", url: "https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2022-2029", }, { category: "external", summary: "git.busybox.net vom 2021-03-25", url: "https://git.busybox.net/busybox/commit/?id=f25d254dfd4243698c31a4f3153d4ac72aa9e9bd", }, { category: "external", summary: "Arch Linux Security Advisory ASA-202103-12 vom 2021-03-26", url: "https://www.cybersecurity-help.cz/vdb/SB2021032626", }, { category: "external", summary: "Debian Security Advisory DLA-2614 vom 2021-04-02", url: "https://lists.debian.org/debian-lts-announce/2021/04/msg00001.html", }, { category: "external", summary: "Amazon Linux Security Advisory ALAS-2021-1496 vom 2021-05-10", url: "https://alas.aws.amazon.com/ALAS-2021-1496.html", }, { category: "external", summary: "SUSE Security Update SUSE-SU-2021:3531-1 vom 2021-10-27", url: "https://lists.suse.com/pipermail/sle-security-updates/2021-October/009658.html", }, { category: "external", summary: "Ubuntu Security Notice USN-5179-1 vom 2021-12-07", url: "https://ubuntu.com/security/notices/USN-5179-1", }, { category: "external", summary: "SUSE Security Update SUSE-SU-2022:0135-1 vom 2022-01-20", url: "https://lists.suse.com/pipermail/sle-security-updates/2022-January/010031.html", }, { category: "external", summary: "Ubuntu Security Notice USN-5179-2 vom 2022-05-10", url: "https://ubuntu.com/security/notices/USN-5179-2", }, { category: "external", summary: "SUSE Security Update SUSE-SU-2022:3959-1 vom 2022-11-11", url: "https://lists.suse.com/pipermail/sle-security-updates/2022-November/012904.html", }, { category: "external", summary: "SUSE Security Update SUSE-SU-2022:4253-1 vom 2022-11-28", url: "https://lists.suse.com/pipermail/sle-security-updates/2022-November/013126.html", }, { category: "external", summary: "Ubuntu Security Notice USN-6335-1 vom 2023-09-04", url: "https://ubuntu.com/security/notices/USN-6335-1", }, { category: "external", summary: "Belden Security Advisory BSECV-2022-17 vom 2024-05-13", url: "https://assets.belden.com/m/118aa564206e89d4/original/Belden_Security_Bulletin_BSECV-2022-17_1v0.pdf", }, { category: "external", summary: "Debian Security Advisory DLA-4019 vom 2025-01-19", url: "https://lists.debian.org/debian-lts-announce/2025/01/msg00012.html", }, ], source_lang: "en-US", title: "BusyBox: Schwachstelle ermöglicht Denial of Service", tracking: { current_release_date: "2025-01-19T23:00:00.000+00:00", generator: { date: "2025-01-20T09:28:11.715+00:00", engine: { name: "BSI-WID", version: "1.3.10", }, }, id: "WID-SEC-W-2022-2029", initial_release_date: "2021-03-25T23:00:00.000+00:00", revision_history: [ { date: "2021-03-25T23:00:00.000+00:00", number: "1", summary: "Initiale Fassung", }, { date: "2021-03-28T22:00:00.000+00:00", number: "2", summary: "Neue Updates von Arch Linux aufgenommen", }, { date: "2021-04-05T22:00:00.000+00:00", number: "3", summary: "Neue Updates von Debian aufgenommen", }, { date: "2021-05-10T22:00:00.000+00:00", number: "4", summary: "Neue Updates von Amazon aufgenommen", }, { date: "2021-10-27T22:00:00.000+00:00", number: "5", summary: "Neue Updates von SUSE aufgenommen", }, { date: "2021-12-07T23:00:00.000+00:00", number: "6", summary: "Neue Updates von Ubuntu aufgenommen", }, { date: "2022-01-20T23:00:00.000+00:00", number: "7", summary: "Neue Updates von SUSE aufgenommen", }, { date: "2022-05-10T22:00:00.000+00:00", number: "8", summary: "Neue Updates von Ubuntu aufgenommen", }, { date: "2022-11-13T23:00:00.000+00:00", number: "9", summary: "Neue Updates von SUSE aufgenommen", }, { date: "2022-11-28T23:00:00.000+00:00", number: "10", summary: "Neue Updates von SUSE aufgenommen", }, { date: "2023-09-04T22:00:00.000+00:00", number: "11", summary: "Neue Updates von Ubuntu aufgenommen", }, { date: "2024-05-13T22:00:00.000+00:00", number: "12", summary: "Neue Updates von Belden aufgenommen", }, { date: "2025-01-19T23:00:00.000+00:00", number: "13", summary: "Neue Updates von Debian aufgenommen", }, ], status: "final", version: "13", }, }, product_tree: { branches: [ { branches: [ { category: "product_name", name: "Amazon Linux 2", product: { name: "Amazon Linux 2", product_id: "398363", product_identification_helper: { cpe: "cpe:/o:amazon:linux_2:-", }, }, }, ], category: "vendor", name: "Amazon", }, { branches: [ { category: "product_name", name: "Debian Linux", product: { name: "Debian Linux", product_id: "2951", product_identification_helper: { cpe: "cpe:/o:debian:debian_linux:-", }, }, }, ], category: "vendor", name: "Debian", }, { branches: [ { branches: [ { category: "product_version_range", name: "<9.13.1.0R2", product: { name: "Hirschmann BAT-C2 <9.13.1.0R2", product_id: "T034718", }, }, { category: "product_version", name: "9.13.1.0R2", product: { name: "Hirschmann BAT-C2 9.13.1.0R2", product_id: "T034718-fixed", product_identification_helper: { cpe: "cpe:/h:hirschmann:bat-c2:9.13.1.0r2", }, }, }, ], category: "product_name", name: "BAT-C2", }, { branches: [ { category: "product_version_range", name: "<6.3.7", product: { name: "Hirschmann owl <6.3.7", product_id: "T034719", }, }, { category: "product_version", name: "6.3.7", product: { name: "Hirschmann owl 6.3.7", product_id: "T034719-fixed", product_identification_helper: { cpe: "cpe:/h:hirschmann:owl:6.3.7", }, }, }, ], category: "product_name", name: "owl", }, ], category: "vendor", name: "Hirschmann", }, { branches: [ { category: "product_name", name: "Open Source Arch Linux", product: { name: "Open Source Arch Linux", product_id: "T013312", product_identification_helper: { cpe: "cpe:/o:archlinux:archlinux:-", }, }, }, { branches: [ { category: "product_version_range", name: "<=1.32.1", product: { name: "Open Source BusyBox <=1.32.1", product_id: "T018714", }, }, { category: "product_version_range", name: "<=1.32.1", product: { name: "Open Source BusyBox <=1.32.1", product_id: "T018714-fixed", }, }, ], category: "product_name", name: "BusyBox", }, ], category: "vendor", name: "Open Source", }, { branches: [ { category: "product_name", name: "SUSE Linux", product: { name: "SUSE Linux", product_id: "T002207", product_identification_helper: { cpe: "cpe:/o:suse:suse_linux:-", }, }, }, ], category: "vendor", name: "SUSE", }, { branches: [ { category: "product_name", name: "Ubuntu Linux", product: { name: "Ubuntu Linux", product_id: "T000126", product_identification_helper: { cpe: "cpe:/o:canonical:ubuntu_linux:-", }, }, }, ], category: "vendor", name: "Ubuntu", }, ], }, vulnerabilities: [ { cve: "CVE-2021-28831", notes: [ { category: "description", text: "Es existiert eine Schwachstelle in BusyBox. Diese besteht aufgrund einer unsachgemäßen Behandlung des Fehlerbits auf dem huft_build-Ergebniszeiger mit einem resultierenden ungültigen freien oder Segmentierungsfehler über fehlerhafte gzip-Daten. Ein entfernter anonymer Angreifer kann diese Schwachstelle ausnutzen, um einen Denial of Service zu verursachen.", }, ], product_status: { known_affected: [ "2951", "T002207", "T000126", "T013312", "T034719", "398363", "T034718", ], last_affected: [ "T018714", ], }, release_date: "2021-03-25T23:00:00.000+00:00", title: "CVE-2021-28831", }, ], }
WID-SEC-W-2023-1432
Vulnerability from csaf_certbund
Published
2023-06-12 22:00
Modified
2023-06-22 22:00
Summary
Siemens SIMATIC S7: Mehrere Schwachstellen
Notes
Das BSI ist als Anbieter für die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch dafür verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgfältig im Einzelfall zu prüfen.
Produktbeschreibung
Die SIMATIC S7 ist eine Serie von SPS (Speicherprogrammierbare Steuerungen) für Automatisierungsanwendungen.
Angriff
Ein Angreifer aus dem angrenzenden Netzwerk oder ein entfernter, anonymer, authentisierter, physischer oder lokaler Angreifer kann mehrere Schwachstellen in Siemens SIMATIC S7 ausnutzen, um beliebigen Code auszuführen, Sicherheitsmaßnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand herbeizuführen, seine Privilegien zu erweitern und Daten zu manipulieren.
Betroffene Betriebssysteme
- BIOS/Firmware
{ document: { aggregate_severity: { text: "kritisch", }, category: "csaf_base", csaf_version: "2.0", distribution: { tlp: { label: "WHITE", url: "https://www.first.org/tlp/", }, }, lang: "de-DE", notes: [ { category: "legal_disclaimer", text: "Das BSI ist als Anbieter für die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch dafür verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgfältig im Einzelfall zu prüfen.", }, { category: "description", text: "Die SIMATIC S7 ist eine Serie von SPS (Speicherprogrammierbare Steuerungen) für Automatisierungsanwendungen.", title: "Produktbeschreibung", }, { category: "summary", text: "Ein Angreifer aus dem angrenzenden Netzwerk oder ein entfernter, anonymer, authentisierter, physischer oder lokaler Angreifer kann mehrere Schwachstellen in Siemens SIMATIC S7 ausnutzen, um beliebigen Code auszuführen, Sicherheitsmaßnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand herbeizuführen, seine Privilegien zu erweitern und Daten zu manipulieren.", title: "Angriff", }, { category: "general", text: "- BIOS/Firmware", title: "Betroffene Betriebssysteme", }, ], publisher: { category: "other", contact_details: "csaf-provider@cert-bund.de", name: "Bundesamt für Sicherheit in der Informationstechnik", namespace: "https://www.bsi.bund.de", }, references: [ { category: "self", summary: "WID-SEC-W-2023-1432 - CSAF Version", url: "https://wid.cert-bund.de/.well-known/csaf/white/2023/wid-sec-w-2023-1432.json", }, { category: "self", summary: "WID-SEC-2023-1432 - Portal Version", url: "https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2023-1432", }, { category: "external", summary: "Ubuntu Security Notice USN-6187-1 vom 2023-06-22", url: "https://ubuntu.com/security/notices/USN-6187-1", }, { category: "external", summary: "Siemens Security Advisory vom 2023-06-12", url: "https://cert-portal.siemens.com/productcert/html/ssa-831302.html", }, { category: "external", summary: "Siemens Security Advisory vom 2023-06-12", url: "https://cert-portal.siemens.com/productcert/html/ssa-794697.html", }, ], source_lang: "en-US", title: "Siemens SIMATIC S7: Mehrere Schwachstellen", tracking: { current_release_date: "2023-06-22T22:00:00.000+00:00", generator: { date: "2024-08-15T17:52:18.956+00:00", engine: { name: "BSI-WID", version: "1.3.5", }, }, id: "WID-SEC-W-2023-1432", initial_release_date: "2023-06-12T22:00:00.000+00:00", revision_history: [ { date: "2023-06-12T22:00:00.000+00:00", number: "1", summary: "Initiale Fassung", }, { date: "2023-06-22T22:00:00.000+00:00", number: "2", summary: "Neue Updates von Ubuntu aufgenommen", }, ], status: "final", version: "2", }, }, product_tree: { branches: [ { branches: [ { category: "product_name", name: "Siemens SIMATIC S7 1500 TM MFP", product: { name: "Siemens SIMATIC S7 1500 TM MFP", product_id: "T028071", product_identification_helper: { cpe: "cpe:/h:siemens:simatic_s7:1500_tm_mfp", }, }, }, ], category: "vendor", name: "Siemens", }, { branches: [ { category: "product_name", name: "Ubuntu Linux", product: { name: "Ubuntu Linux", product_id: "T000126", product_identification_helper: { cpe: "cpe:/o:canonical:ubuntu_linux:-", }, }, }, ], category: "vendor", name: "Ubuntu", }, ], }, vulnerabilities: [ { cve: "CVE-2023-26607", notes: [ { category: "description", text: "In Siemens SIMATIC S7 existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem aufgrund von unzulässigen Einschränkungen, Pufferüberläufen, fehlenden Freigaben und use-after-free-Problemen. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuführen, Sicherheitsmaßnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand herbeizuführen, seine Privilegien zu erweitern und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erhöhte Privilegien.", }, ], product_status: { known_affected: [ "T000126", "T028071", ], }, release_date: "2023-06-12T22:00:00.000+00:00", title: "CVE-2023-26607", }, { cve: "CVE-2023-23559", notes: [ { category: "description", text: "In Siemens SIMATIC S7 existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem aufgrund von unzulässigen Einschränkungen, Pufferüberläufen, fehlenden Freigaben und use-after-free-Problemen. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuführen, Sicherheitsmaßnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand herbeizuführen, seine Privilegien zu erweitern und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erhöhte Privilegien.", }, ], product_status: { known_affected: [ "T000126", "T028071", ], }, release_date: "2023-06-12T22:00:00.000+00:00", title: "CVE-2023-23559", }, { cve: "CVE-2023-23455", notes: [ { category: "description", text: "In Siemens SIMATIC S7 existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem aufgrund von unzulässigen Einschränkungen, Pufferüberläufen, fehlenden Freigaben und use-after-free-Problemen. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuführen, Sicherheitsmaßnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand herbeizuführen, seine Privilegien zu erweitern und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erhöhte Privilegien.", }, ], product_status: { known_affected: [ "T000126", "T028071", ], }, release_date: "2023-06-12T22:00:00.000+00:00", title: "CVE-2023-23455", }, { cve: "CVE-2023-23454", notes: [ { category: "description", text: "In Siemens SIMATIC S7 existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem aufgrund von unzulässigen Einschränkungen, Pufferüberläufen, fehlenden Freigaben und use-after-free-Problemen. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuführen, Sicherheitsmaßnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand herbeizuführen, seine Privilegien zu erweitern und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erhöhte Privilegien.", }, ], product_status: { known_affected: [ "T000126", "T028071", ], }, release_date: "2023-06-12T22:00:00.000+00:00", title: "CVE-2023-23454", }, { cve: "CVE-2023-1095", notes: [ { category: "description", text: "In Siemens SIMATIC S7 existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem aufgrund von unzulässigen Einschränkungen, Pufferüberläufen, fehlenden Freigaben und use-after-free-Problemen. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuführen, Sicherheitsmaßnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand herbeizuführen, seine Privilegien zu erweitern und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erhöhte Privilegien.", }, ], product_status: { known_affected: [ "T000126", "T028071", ], }, release_date: "2023-06-12T22:00:00.000+00:00", title: "CVE-2023-1095", }, { cve: "CVE-2023-1077", notes: [ { category: "description", text: "In Siemens SIMATIC S7 existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem aufgrund von unzulässigen Einschränkungen, Pufferüberläufen, fehlenden Freigaben und use-after-free-Problemen. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuführen, Sicherheitsmaßnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand herbeizuführen, seine Privilegien zu erweitern und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erhöhte Privilegien.", }, ], product_status: { known_affected: [ "T000126", "T028071", ], }, release_date: "2023-06-12T22:00:00.000+00:00", title: "CVE-2023-1077", }, { cve: "CVE-2023-1073", notes: [ { category: "description", text: "In Siemens SIMATIC S7 existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem aufgrund von unzulässigen Einschränkungen, Pufferüberläufen, fehlenden Freigaben und use-after-free-Problemen. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuführen, Sicherheitsmaßnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand herbeizuführen, seine Privilegien zu erweitern und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erhöhte Privilegien.", }, ], product_status: { known_affected: [ "T000126", "T028071", ], }, release_date: "2023-06-12T22:00:00.000+00:00", title: "CVE-2023-1073", }, { cve: "CVE-2023-0590", notes: [ { category: "description", text: "In Siemens SIMATIC S7 existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem aufgrund von unzulässigen Einschränkungen, Pufferüberläufen, fehlenden Freigaben und use-after-free-Problemen. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuführen, Sicherheitsmaßnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand herbeizuführen, seine Privilegien zu erweitern und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erhöhte Privilegien.", }, ], product_status: { known_affected: [ "T000126", "T028071", ], }, release_date: "2023-06-12T22:00:00.000+00:00", title: "CVE-2023-0590", }, { cve: "CVE-2023-0466", notes: [ { category: "description", text: "In Siemens SIMATIC S7 existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem aufgrund von unzulässigen Einschränkungen, Pufferüberläufen, fehlenden Freigaben und use-after-free-Problemen. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuführen, Sicherheitsmaßnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand herbeizuführen, seine Privilegien zu erweitern und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erhöhte Privilegien.", }, ], product_status: { known_affected: [ "T000126", "T028071", ], }, release_date: "2023-06-12T22:00:00.000+00:00", title: "CVE-2023-0466", }, { cve: "CVE-2023-0465", notes: [ { category: "description", text: "In Siemens SIMATIC S7 existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem aufgrund von unzulässigen Einschränkungen, Pufferüberläufen, fehlenden Freigaben und use-after-free-Problemen. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuführen, Sicherheitsmaßnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand herbeizuführen, seine Privilegien zu erweitern und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erhöhte Privilegien.", }, ], product_status: { known_affected: [ "T000126", "T028071", ], }, release_date: "2023-06-12T22:00:00.000+00:00", title: "CVE-2023-0465", }, { cve: "CVE-2023-0464", notes: [ { category: "description", text: "In Siemens SIMATIC S7 existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem aufgrund von unzulässigen Einschränkungen, Pufferüberläufen, fehlenden Freigaben und use-after-free-Problemen. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuführen, Sicherheitsmaßnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand herbeizuführen, seine Privilegien zu erweitern und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erhöhte Privilegien.", }, ], product_status: { known_affected: [ "T000126", "T028071", ], }, release_date: "2023-06-12T22:00:00.000+00:00", title: "CVE-2023-0464", }, { cve: "CVE-2023-0394", notes: [ { category: "description", text: "In Siemens SIMATIC S7 existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem aufgrund von unzulässigen Einschränkungen, Pufferüberläufen, fehlenden Freigaben und use-after-free-Problemen. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuführen, Sicherheitsmaßnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand herbeizuführen, seine Privilegien zu erweitern und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erhöhte Privilegien.", }, ], product_status: { known_affected: [ "T000126", "T028071", ], }, release_date: "2023-06-12T22:00:00.000+00:00", title: "CVE-2023-0394", }, { cve: "CVE-2023-0286", notes: [ { category: "description", text: "In Siemens SIMATIC S7 existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem aufgrund von unzulässigen Einschränkungen, Pufferüberläufen, fehlenden Freigaben und use-after-free-Problemen. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuführen, Sicherheitsmaßnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand herbeizuführen, seine Privilegien zu erweitern und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erhöhte Privilegien.", }, ], product_status: { known_affected: [ "T000126", "T028071", ], }, release_date: "2023-06-12T22:00:00.000+00:00", title: "CVE-2023-0286", }, { cve: "CVE-2023-0215", notes: [ { category: "description", text: "In Siemens SIMATIC S7 existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem aufgrund von unzulässigen Einschränkungen, Pufferüberläufen, fehlenden Freigaben und use-after-free-Problemen. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuführen, Sicherheitsmaßnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand herbeizuführen, seine Privilegien zu erweitern und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erhöhte Privilegien.", }, ], product_status: { known_affected: [ "T000126", "T028071", ], }, release_date: "2023-06-12T22:00:00.000+00:00", title: "CVE-2023-0215", }, { cve: "CVE-2023-0179", notes: [ { category: "description", text: "In Siemens SIMATIC S7 existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem aufgrund von unzulässigen Einschränkungen, Pufferüberläufen, fehlenden Freigaben und use-after-free-Problemen. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuführen, Sicherheitsmaßnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand herbeizuführen, seine Privilegien zu erweitern und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erhöhte Privilegien.", }, ], product_status: { known_affected: [ "T000126", "T028071", ], }, release_date: "2023-06-12T22:00:00.000+00:00", title: "CVE-2023-0179", }, { cve: "CVE-2022-47946", notes: [ { category: "description", text: "In Siemens SIMATIC S7 existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem aufgrund von unzulässigen Einschränkungen, Pufferüberläufen, fehlenden Freigaben und use-after-free-Problemen. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuführen, Sicherheitsmaßnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand herbeizuführen, seine Privilegien zu erweitern und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erhöhte Privilegien.", }, ], product_status: { known_affected: [ "T000126", "T028071", ], }, release_date: "2023-06-12T22:00:00.000+00:00", title: "CVE-2022-47946", }, { cve: "CVE-2022-47929", notes: [ { category: "description", text: "In Siemens SIMATIC S7 existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem aufgrund von unzulässigen Einschränkungen, Pufferüberläufen, fehlenden Freigaben und use-after-free-Problemen. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuführen, Sicherheitsmaßnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand herbeizuführen, seine Privilegien zu erweitern und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erhöhte Privilegien.", }, ], product_status: { known_affected: [ "T000126", "T028071", ], }, release_date: "2023-06-12T22:00:00.000+00:00", title: "CVE-2022-47929", }, { cve: "CVE-2022-47520", notes: [ { category: "description", text: "In Siemens SIMATIC S7 existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem aufgrund von unzulässigen Einschränkungen, Pufferüberläufen, fehlenden Freigaben und use-after-free-Problemen. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuführen, Sicherheitsmaßnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand herbeizuführen, seine Privilegien zu erweitern und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erhöhte Privilegien.", }, ], product_status: { known_affected: [ "T000126", "T028071", ], }, release_date: "2023-06-12T22:00:00.000+00:00", title: "CVE-2022-47520", }, { cve: "CVE-2022-47518", notes: [ { category: "description", text: "In Siemens SIMATIC S7 existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem aufgrund von unzulässigen Einschränkungen, Pufferüberläufen, fehlenden Freigaben und use-after-free-Problemen. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuführen, Sicherheitsmaßnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand herbeizuführen, seine Privilegien zu erweitern und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erhöhte Privilegien.", }, ], product_status: { known_affected: [ "T000126", "T028071", ], }, release_date: "2023-06-12T22:00:00.000+00:00", title: "CVE-2022-47518", }, { cve: "CVE-2022-4662", notes: [ { category: "description", text: "In Siemens SIMATIC S7 existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem aufgrund von unzulässigen Einschränkungen, Pufferüberläufen, fehlenden Freigaben und use-after-free-Problemen. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuführen, Sicherheitsmaßnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand herbeizuführen, seine Privilegien zu erweitern und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erhöhte Privilegien.", }, ], product_status: { known_affected: [ "T000126", "T028071", ], }, release_date: "2023-06-12T22:00:00.000+00:00", title: "CVE-2022-4662", }, { cve: "CVE-2022-4450", notes: [ { category: "description", text: "In Siemens SIMATIC S7 existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem aufgrund von unzulässigen Einschränkungen, Pufferüberläufen, fehlenden Freigaben und use-after-free-Problemen. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuführen, Sicherheitsmaßnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand herbeizuführen, seine Privilegien zu erweitern und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erhöhte Privilegien.", }, ], product_status: { known_affected: [ "T000126", "T028071", ], }, release_date: "2023-06-12T22:00:00.000+00:00", title: "CVE-2022-4450", }, { cve: "CVE-2022-4378", notes: [ { category: "description", text: "In Siemens SIMATIC S7 existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem aufgrund von unzulässigen Einschränkungen, Pufferüberläufen, fehlenden Freigaben und use-after-free-Problemen. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuführen, Sicherheitsmaßnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand herbeizuführen, seine Privilegien zu erweitern und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erhöhte Privilegien.", }, ], product_status: { known_affected: [ "T000126", "T028071", ], }, release_date: "2023-06-12T22:00:00.000+00:00", title: "CVE-2022-4378", }, { cve: "CVE-2022-43750", notes: [ { category: "description", text: "In Siemens SIMATIC S7 existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem aufgrund von unzulässigen Einschränkungen, Pufferüberläufen, fehlenden Freigaben und use-after-free-Problemen. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuführen, Sicherheitsmaßnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand herbeizuführen, seine Privilegien zu erweitern und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erhöhte Privilegien.", }, ], product_status: { known_affected: [ "T000126", "T028071", ], }, release_date: "2023-06-12T22:00:00.000+00:00", title: "CVE-2022-43750", }, { cve: "CVE-2022-4304", notes: [ { category: "description", text: "In Siemens SIMATIC S7 existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem aufgrund von unzulässigen Einschränkungen, Pufferüberläufen, fehlenden Freigaben und use-after-free-Problemen. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuführen, Sicherheitsmaßnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand herbeizuführen, seine Privilegien zu erweitern und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erhöhte Privilegien.", }, ], product_status: { known_affected: [ "T000126", "T028071", ], }, release_date: "2023-06-12T22:00:00.000+00:00", title: "CVE-2022-4304", }, { cve: "CVE-2022-42896", notes: [ { category: "description", text: "In Siemens SIMATIC S7 existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem aufgrund von unzulässigen Einschränkungen, Pufferüberläufen, fehlenden Freigaben und use-after-free-Problemen. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuführen, Sicherheitsmaßnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand herbeizuführen, seine Privilegien zu erweitern und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erhöhte Privilegien.", }, ], product_status: { known_affected: [ "T000126", "T028071", ], }, release_date: "2023-06-12T22:00:00.000+00:00", title: "CVE-2022-42896", }, { cve: "CVE-2022-42895", notes: [ { category: "description", text: "In Siemens SIMATIC S7 existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem aufgrund von unzulässigen Einschränkungen, Pufferüberläufen, fehlenden Freigaben und use-after-free-Problemen. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuführen, Sicherheitsmaßnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand herbeizuführen, seine Privilegien zu erweitern und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erhöhte Privilegien.", }, ], product_status: { known_affected: [ "T000126", "T028071", ], }, release_date: "2023-06-12T22:00:00.000+00:00", title: "CVE-2022-42895", }, { cve: "CVE-2022-42722", notes: [ { category: "description", text: "In Siemens SIMATIC S7 existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem aufgrund von unzulässigen Einschränkungen, Pufferüberläufen, fehlenden Freigaben und use-after-free-Problemen. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuführen, Sicherheitsmaßnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand herbeizuführen, seine Privilegien zu erweitern und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erhöhte Privilegien.", }, ], product_status: { known_affected: [ "T000126", "T028071", ], }, release_date: "2023-06-12T22:00:00.000+00:00", title: "CVE-2022-42722", }, { cve: "CVE-2022-42721", notes: [ { category: "description", text: "In Siemens SIMATIC S7 existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem aufgrund von unzulässigen Einschränkungen, Pufferüberläufen, fehlenden Freigaben und use-after-free-Problemen. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuführen, Sicherheitsmaßnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand herbeizuführen, seine Privilegien zu erweitern und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erhöhte Privilegien.", }, ], product_status: { known_affected: [ "T000126", "T028071", ], }, release_date: "2023-06-12T22:00:00.000+00:00", title: "CVE-2022-42721", }, { cve: "CVE-2022-42720", notes: [ { category: "description", text: "In Siemens SIMATIC S7 existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem aufgrund von unzulässigen Einschränkungen, Pufferüberläufen, fehlenden Freigaben und use-after-free-Problemen. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuführen, Sicherheitsmaßnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand herbeizuführen, seine Privilegien zu erweitern und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erhöhte Privilegien.", }, ], product_status: { known_affected: [ "T000126", "T028071", ], }, release_date: "2023-06-12T22:00:00.000+00:00", title: "CVE-2022-42720", }, { cve: "CVE-2022-42719", notes: [ { category: "description", text: "In Siemens SIMATIC S7 existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem aufgrund von unzulässigen Einschränkungen, Pufferüberläufen, fehlenden Freigaben und use-after-free-Problemen. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuführen, Sicherheitsmaßnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand herbeizuführen, seine Privilegien zu erweitern und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erhöhte Privilegien.", }, ], product_status: { known_affected: [ "T000126", "T028071", ], }, release_date: "2023-06-12T22:00:00.000+00:00", title: "CVE-2022-42719", }, { cve: "CVE-2022-42703", notes: [ { category: "description", text: "In Siemens SIMATIC S7 existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem aufgrund von unzulässigen Einschränkungen, Pufferüberläufen, fehlenden Freigaben und use-after-free-Problemen. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuführen, Sicherheitsmaßnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand herbeizuführen, seine Privilegien zu erweitern und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erhöhte Privilegien.", }, ], product_status: { known_affected: [ "T000126", "T028071", ], }, release_date: "2023-06-12T22:00:00.000+00:00", title: "CVE-2022-42703", }, { cve: "CVE-2022-42432", notes: [ { category: "description", text: "In Siemens SIMATIC S7 existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem aufgrund von unzulässigen Einschränkungen, Pufferüberläufen, fehlenden Freigaben und use-after-free-Problemen. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuführen, Sicherheitsmaßnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand herbeizuführen, seine Privilegien zu erweitern und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erhöhte Privilegien.", }, ], product_status: { known_affected: [ "T000126", "T028071", ], }, release_date: "2023-06-12T22:00:00.000+00:00", title: "CVE-2022-42432", }, { cve: "CVE-2022-42329", notes: [ { category: "description", text: "In Siemens SIMATIC S7 existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem aufgrund von unzulässigen Einschränkungen, Pufferüberläufen, fehlenden Freigaben und use-after-free-Problemen. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuführen, Sicherheitsmaßnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand herbeizuführen, seine Privilegien zu erweitern und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erhöhte Privilegien.", }, ], product_status: { known_affected: [ "T000126", "T028071", ], }, release_date: "2023-06-12T22:00:00.000+00:00", title: "CVE-2022-42329", }, { cve: "CVE-2022-42328", notes: [ { category: "description", text: "In Siemens SIMATIC S7 existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem aufgrund von unzulässigen Einschränkungen, Pufferüberläufen, fehlenden Freigaben und use-after-free-Problemen. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuführen, Sicherheitsmaßnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand herbeizuführen, seine Privilegien zu erweitern und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erhöhte Privilegien.", }, ], product_status: { known_affected: [ "T000126", "T028071", ], }, release_date: "2023-06-12T22:00:00.000+00:00", title: "CVE-2022-42328", }, { cve: "CVE-2022-41850", notes: [ { category: "description", text: "In Siemens SIMATIC S7 existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem aufgrund von unzulässigen Einschränkungen, Pufferüberläufen, fehlenden Freigaben und use-after-free-Problemen. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuführen, Sicherheitsmaßnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand herbeizuführen, seine Privilegien zu erweitern und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erhöhte Privilegien.", }, ], product_status: { known_affected: [ "T000126", "T028071", ], }, release_date: "2023-06-12T22:00:00.000+00:00", title: "CVE-2022-41850", }, { cve: "CVE-2022-41849", notes: [ { category: "description", text: "In Siemens SIMATIC S7 existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem aufgrund von unzulässigen Einschränkungen, Pufferüberläufen, fehlenden Freigaben und use-after-free-Problemen. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuführen, Sicherheitsmaßnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand herbeizuführen, seine Privilegien zu erweitern und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erhöhte Privilegien.", }, ], product_status: { known_affected: [ "T000126", "T028071", ], }, release_date: "2023-06-12T22:00:00.000+00:00", title: "CVE-2022-41849", }, { cve: "CVE-2022-41674", notes: [ { category: "description", text: "In Siemens SIMATIC S7 existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem aufgrund von unzulässigen Einschränkungen, Pufferüberläufen, fehlenden Freigaben und use-after-free-Problemen. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuführen, Sicherheitsmaßnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand herbeizuführen, seine Privilegien zu erweitern und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erhöhte Privilegien.", }, ], product_status: { known_affected: [ "T000126", "T028071", ], }, release_date: "2023-06-12T22:00:00.000+00:00", title: "CVE-2022-41674", }, { cve: "CVE-2022-4139", notes: [ { category: "description", text: "In Siemens SIMATIC S7 existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem aufgrund von unzulässigen Einschränkungen, Pufferüberläufen, fehlenden Freigaben und use-after-free-Problemen. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuführen, Sicherheitsmaßnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand herbeizuführen, seine Privilegien zu erweitern und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erhöhte Privilegien.", }, ], product_status: { known_affected: [ "T000126", "T028071", ], }, release_date: "2023-06-12T22:00:00.000+00:00", title: "CVE-2022-4139", }, { cve: "CVE-2022-4129", notes: [ { category: "description", text: "In Siemens SIMATIC S7 existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem aufgrund von unzulässigen Einschränkungen, Pufferüberläufen, fehlenden Freigaben und use-after-free-Problemen. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuführen, Sicherheitsmaßnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand herbeizuführen, seine Privilegien zu erweitern und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erhöhte Privilegien.", }, ], product_status: { known_affected: [ "T000126", "T028071", ], }, release_date: "2023-06-12T22:00:00.000+00:00", title: "CVE-2022-4129", }, { cve: "CVE-2022-41222", notes: [ { category: "description", text: "In Siemens SIMATIC S7 existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem aufgrund von unzulässigen Einschränkungen, Pufferüberläufen, fehlenden Freigaben und use-after-free-Problemen. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuführen, Sicherheitsmaßnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand herbeizuführen, seine Privilegien zu erweitern und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erhöhte Privilegien.", }, ], product_status: { known_affected: [ "T000126", "T028071", ], }, release_date: "2023-06-12T22:00:00.000+00:00", title: "CVE-2022-41222", }, { cve: "CVE-2022-41218", notes: [ { category: "description", text: "In Siemens SIMATIC S7 existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem aufgrund von unzulässigen Einschränkungen, Pufferüberläufen, fehlenden Freigaben und use-after-free-Problemen. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuführen, Sicherheitsmaßnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand herbeizuführen, seine Privilegien zu erweitern und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erhöhte Privilegien.", }, ], product_status: { known_affected: [ "T000126", "T028071", ], }, release_date: "2023-06-12T22:00:00.000+00:00", title: "CVE-2022-41218", }, { cve: "CVE-2022-4095", notes: [ { category: "description", text: "In Siemens SIMATIC S7 existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem aufgrund von unzulässigen Einschränkungen, Pufferüberläufen, fehlenden Freigaben und use-after-free-Problemen. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuführen, Sicherheitsmaßnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand herbeizuführen, seine Privilegien zu erweitern und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erhöhte Privilegien.", }, ], product_status: { known_affected: [ "T000126", "T028071", ], }, release_date: "2023-06-12T22:00:00.000+00:00", title: "CVE-2022-4095", }, { cve: "CVE-2022-40768", notes: [ { category: "description", text: "In Siemens SIMATIC S7 existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem aufgrund von unzulässigen Einschränkungen, Pufferüberläufen, fehlenden Freigaben und use-after-free-Problemen. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuführen, Sicherheitsmaßnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand herbeizuführen, seine Privilegien zu erweitern und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erhöhte Privilegien.", }, ], product_status: { known_affected: [ "T000126", "T028071", ], }, release_date: "2023-06-12T22:00:00.000+00:00", title: "CVE-2022-40768", }, { cve: "CVE-2022-40307", notes: [ { category: "description", text: "In Siemens SIMATIC S7 existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem aufgrund von unzulässigen Einschränkungen, Pufferüberläufen, fehlenden Freigaben und use-after-free-Problemen. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuführen, Sicherheitsmaßnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand herbeizuführen, seine Privilegien zu erweitern und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erhöhte Privilegien.", }, ], product_status: { known_affected: [ "T000126", "T028071", ], }, release_date: "2023-06-12T22:00:00.000+00:00", title: "CVE-2022-40307", }, { cve: "CVE-2022-39190", notes: [ { category: "description", text: "In Siemens SIMATIC S7 existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem aufgrund von unzulässigen Einschränkungen, Pufferüberläufen, fehlenden Freigaben und use-after-free-Problemen. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuführen, Sicherheitsmaßnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand herbeizuführen, seine Privilegien zu erweitern und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erhöhte Privilegien.", }, ], product_status: { known_affected: [ "T000126", "T028071", ], }, release_date: "2023-06-12T22:00:00.000+00:00", title: "CVE-2022-39190", }, { cve: "CVE-2022-39188", notes: [ { category: "description", text: "In Siemens SIMATIC S7 existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem aufgrund von unzulässigen Einschränkungen, Pufferüberläufen, fehlenden Freigaben und use-after-free-Problemen. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuführen, Sicherheitsmaßnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand herbeizuführen, seine Privilegien zu erweitern und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erhöhte Privilegien.", }, ], product_status: { known_affected: [ "T000126", "T028071", ], }, release_date: "2023-06-12T22:00:00.000+00:00", title: "CVE-2022-39188", }, { cve: "CVE-2022-36946", notes: [ { category: "description", text: "In Siemens SIMATIC S7 existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem aufgrund von unzulässigen Einschränkungen, Pufferüberläufen, fehlenden Freigaben und use-after-free-Problemen. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuführen, Sicherheitsmaßnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand herbeizuführen, seine Privilegien zu erweitern und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erhöhte Privilegien.", }, ], product_status: { known_affected: [ "T000126", "T028071", ], }, release_date: "2023-06-12T22:00:00.000+00:00", title: "CVE-2022-36946", }, { cve: "CVE-2022-36879", notes: [ { category: "description", text: "In Siemens SIMATIC S7 existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem aufgrund von unzulässigen Einschränkungen, Pufferüberläufen, fehlenden Freigaben und use-after-free-Problemen. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuführen, Sicherheitsmaßnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand herbeizuführen, seine Privilegien zu erweitern und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erhöhte Privilegien.", }, ], product_status: { known_affected: [ "T000126", "T028071", ], }, release_date: "2023-06-12T22:00:00.000+00:00", title: "CVE-2022-36879", }, { cve: "CVE-2022-3649", notes: [ { category: "description", text: "In Siemens SIMATIC S7 existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem aufgrund von unzulässigen Einschränkungen, Pufferüberläufen, fehlenden Freigaben und use-after-free-Problemen. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuführen, Sicherheitsmaßnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand herbeizuführen, seine Privilegien zu erweitern und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erhöhte Privilegien.", }, ], product_status: { known_affected: [ "T000126", "T028071", ], }, release_date: "2023-06-12T22:00:00.000+00:00", title: "CVE-2022-3649", }, { cve: "CVE-2022-3646", notes: [ { category: "description", text: "In Siemens SIMATIC S7 existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem aufgrund von unzulässigen Einschränkungen, Pufferüberläufen, fehlenden Freigaben und use-after-free-Problemen. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuführen, Sicherheitsmaßnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand herbeizuführen, seine Privilegien zu erweitern und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erhöhte Privilegien.", }, ], product_status: { known_affected: [ "T000126", "T028071", ], }, release_date: "2023-06-12T22:00:00.000+00:00", title: "CVE-2022-3646", }, { cve: "CVE-2022-3635", notes: [ { category: "description", text: "In Siemens SIMATIC S7 existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem aufgrund von unzulässigen Einschränkungen, Pufferüberläufen, fehlenden Freigaben und use-after-free-Problemen. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuführen, Sicherheitsmaßnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand herbeizuführen, seine Privilegien zu erweitern und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erhöhte Privilegien.", }, ], product_status: { known_affected: [ "T000126", "T028071", ], }, release_date: "2023-06-12T22:00:00.000+00:00", title: "CVE-2022-3635", }, { cve: "CVE-2022-3633", notes: [ { category: "description", text: "In Siemens SIMATIC S7 existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem aufgrund von unzulässigen Einschränkungen, Pufferüberläufen, fehlenden Freigaben und use-after-free-Problemen. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuführen, Sicherheitsmaßnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand herbeizuführen, seine Privilegien zu erweitern und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erhöhte Privilegien.", }, ], product_status: { known_affected: [ "T000126", "T028071", ], }, release_date: "2023-06-12T22:00:00.000+00:00", title: "CVE-2022-3633", }, { cve: "CVE-2022-3629", notes: [ { category: "description", text: "In Siemens SIMATIC S7 existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem aufgrund von unzulässigen Einschränkungen, Pufferüberläufen, fehlenden Freigaben und use-after-free-Problemen. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuführen, Sicherheitsmaßnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand herbeizuführen, seine Privilegien zu erweitern und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erhöhte Privilegien.", }, ], product_status: { known_affected: [ "T000126", "T028071", ], }, release_date: "2023-06-12T22:00:00.000+00:00", title: "CVE-2022-3629", }, { cve: "CVE-2022-36280", notes: [ { category: "description", text: "In Siemens SIMATIC S7 existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem aufgrund von unzulässigen Einschränkungen, Pufferüberläufen, fehlenden Freigaben und use-after-free-Problemen. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuführen, Sicherheitsmaßnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand herbeizuführen, seine Privilegien zu erweitern und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erhöhte Privilegien.", }, ], product_status: { known_affected: [ "T000126", "T028071", ], }, release_date: "2023-06-12T22:00:00.000+00:00", title: "CVE-2022-36280", }, { cve: "CVE-2022-3628", notes: [ { category: "description", text: "In Siemens SIMATIC S7 existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem aufgrund von unzulässigen Einschränkungen, Pufferüberläufen, fehlenden Freigaben und use-after-free-Problemen. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuführen, Sicherheitsmaßnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand herbeizuführen, seine Privilegien zu erweitern und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erhöhte Privilegien.", }, ], product_status: { known_affected: [ "T000126", "T028071", ], }, release_date: "2023-06-12T22:00:00.000+00:00", title: "CVE-2022-3628", }, { cve: "CVE-2022-3625", notes: [ { category: "description", text: "In Siemens SIMATIC S7 existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem aufgrund von unzulässigen Einschränkungen, Pufferüberläufen, fehlenden Freigaben und use-after-free-Problemen. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuführen, Sicherheitsmaßnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand herbeizuführen, seine Privilegien zu erweitern und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erhöhte Privilegien.", }, ], product_status: { known_affected: [ "T000126", "T028071", ], }, release_date: "2023-06-12T22:00:00.000+00:00", title: "CVE-2022-3625", }, { cve: "CVE-2022-3621", notes: [ { category: "description", text: "In Siemens SIMATIC S7 existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem aufgrund von unzulässigen Einschränkungen, Pufferüberläufen, fehlenden Freigaben und use-after-free-Problemen. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuführen, Sicherheitsmaßnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand herbeizuführen, seine Privilegien zu erweitern und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erhöhte Privilegien.", }, ], product_status: { known_affected: [ "T000126", "T028071", ], }, release_date: "2023-06-12T22:00:00.000+00:00", title: "CVE-2022-3621", }, { cve: "CVE-2022-36123", notes: [ { category: "description", text: "In Siemens SIMATIC S7 existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem aufgrund von unzulässigen Einschränkungen, Pufferüberläufen, fehlenden Freigaben und use-after-free-Problemen. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuführen, Sicherheitsmaßnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand herbeizuführen, seine Privilegien zu erweitern und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erhöhte Privilegien.", }, ], product_status: { known_affected: [ "T000126", "T028071", ], }, release_date: "2023-06-12T22:00:00.000+00:00", title: "CVE-2022-36123", }, { cve: "CVE-2022-3606", notes: [ { category: "description", text: "In Siemens SIMATIC S7 existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem aufgrund von unzulässigen Einschränkungen, Pufferüberläufen, fehlenden Freigaben und use-after-free-Problemen. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuführen, Sicherheitsmaßnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand herbeizuführen, seine Privilegien zu erweitern und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erhöhte Privilegien.", }, ], product_status: { known_affected: [ "T000126", "T028071", ], }, release_date: "2023-06-12T22:00:00.000+00:00", title: "CVE-2022-3606", }, { cve: "CVE-2022-3594", notes: [ { category: "description", text: "In Siemens SIMATIC S7 existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem aufgrund von unzulässigen Einschränkungen, Pufferüberläufen, fehlenden Freigaben und use-after-free-Problemen. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuführen, Sicherheitsmaßnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand herbeizuführen, seine Privilegien zu erweitern und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erhöhte Privilegien.", }, ], product_status: { known_affected: [ "T000126", "T028071", ], }, release_date: "2023-06-12T22:00:00.000+00:00", title: "CVE-2022-3594", }, { cve: "CVE-2022-3586", notes: [ { category: "description", text: "In Siemens SIMATIC S7 existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem aufgrund von unzulässigen Einschränkungen, Pufferüberläufen, fehlenden Freigaben und use-after-free-Problemen. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuführen, Sicherheitsmaßnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand herbeizuführen, seine Privilegien zu erweitern und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erhöhte Privilegien.", }, ], product_status: { known_affected: [ "T000126", "T028071", ], }, release_date: "2023-06-12T22:00:00.000+00:00", title: "CVE-2022-3586", }, { cve: "CVE-2022-3565", notes: [ { category: "description", text: "In Siemens SIMATIC S7 existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem aufgrund von unzulässigen Einschränkungen, Pufferüberläufen, fehlenden Freigaben und use-after-free-Problemen. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuführen, Sicherheitsmaßnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand herbeizuführen, seine Privilegien zu erweitern und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erhöhte Privilegien.", }, ], product_status: { known_affected: [ "T000126", "T028071", ], }, release_date: "2023-06-12T22:00:00.000+00:00", title: "CVE-2022-3565", }, { cve: "CVE-2022-3564", notes: [ { category: "description", text: "In Siemens SIMATIC S7 existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem aufgrund von unzulässigen Einschränkungen, Pufferüberläufen, fehlenden Freigaben und use-after-free-Problemen. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuführen, Sicherheitsmaßnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand herbeizuführen, seine Privilegien zu erweitern und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erhöhte Privilegien.", }, ], product_status: { known_affected: [ "T000126", "T028071", ], }, release_date: "2023-06-12T22:00:00.000+00:00", title: "CVE-2022-3564", }, { cve: "CVE-2022-3545", notes: [ { category: "description", text: "In Siemens SIMATIC S7 existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem aufgrund von unzulässigen Einschränkungen, Pufferüberläufen, fehlenden Freigaben und use-after-free-Problemen. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuführen, Sicherheitsmaßnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand herbeizuführen, seine Privilegien zu erweitern und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erhöhte Privilegien.", }, ], product_status: { known_affected: [ "T000126", "T028071", ], }, release_date: "2023-06-12T22:00:00.000+00:00", title: "CVE-2022-3545", }, { cve: "CVE-2022-3534", notes: [ { category: "description", text: "In Siemens SIMATIC S7 existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem aufgrund von unzulässigen Einschränkungen, Pufferüberläufen, fehlenden Freigaben und use-after-free-Problemen. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuführen, Sicherheitsmaßnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand herbeizuführen, seine Privilegien zu erweitern und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erhöhte Privilegien.", }, ], product_status: { known_affected: [ "T000126", "T028071", ], }, release_date: "2023-06-12T22:00:00.000+00:00", title: "CVE-2022-3534", }, { cve: "CVE-2022-3524", notes: [ { category: "description", text: "In Siemens SIMATIC S7 existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem aufgrund von unzulässigen Einschränkungen, Pufferüberläufen, fehlenden Freigaben und use-after-free-Problemen. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuführen, Sicherheitsmaßnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand herbeizuführen, seine Privilegien zu erweitern und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erhöhte Privilegien.", }, ], product_status: { known_affected: [ "T000126", "T028071", ], }, release_date: "2023-06-12T22:00:00.000+00:00", title: "CVE-2022-3524", }, { cve: "CVE-2022-3521", notes: [ { category: "description", text: "In Siemens SIMATIC S7 existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem aufgrund von unzulässigen Einschränkungen, Pufferüberläufen, fehlenden Freigaben und use-after-free-Problemen. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuführen, Sicherheitsmaßnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand herbeizuführen, seine Privilegien zu erweitern und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erhöhte Privilegien.", }, ], product_status: { known_affected: [ "T000126", "T028071", ], }, release_date: "2023-06-12T22:00:00.000+00:00", title: "CVE-2022-3521", }, { cve: "CVE-2022-34918", notes: [ { category: "description", text: "In Siemens SIMATIC S7 existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem aufgrund von unzulässigen Einschränkungen, Pufferüberläufen, fehlenden Freigaben und use-after-free-Problemen. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuführen, Sicherheitsmaßnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand herbeizuführen, seine Privilegien zu erweitern und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erhöhte Privilegien.", }, ], product_status: { known_affected: [ "T000126", "T028071", ], }, release_date: "2023-06-12T22:00:00.000+00:00", title: "CVE-2022-34918", }, { cve: "CVE-2022-3435", notes: [ { category: "description", text: "In Siemens SIMATIC S7 existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem aufgrund von unzulässigen Einschränkungen, Pufferüberläufen, fehlenden Freigaben und use-after-free-Problemen. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuführen, Sicherheitsmaßnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand herbeizuführen, seine Privilegien zu erweitern und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erhöhte Privilegien.", }, ], product_status: { known_affected: [ "T000126", "T028071", ], }, release_date: "2023-06-12T22:00:00.000+00:00", title: "CVE-2022-3435", }, { cve: "CVE-2022-3303", notes: [ { category: "description", text: "In Siemens SIMATIC S7 existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem aufgrund von unzulässigen Einschränkungen, Pufferüberläufen, fehlenden Freigaben und use-after-free-Problemen. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuführen, Sicherheitsmaßnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand herbeizuführen, seine Privilegien zu erweitern und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erhöhte Privilegien.", }, ], product_status: { known_affected: [ "T000126", "T028071", ], }, release_date: "2023-06-12T22:00:00.000+00:00", title: "CVE-2022-3303", }, { cve: "CVE-2022-32296", notes: [ { category: "description", text: "In Siemens SIMATIC S7 existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem aufgrund von unzulässigen Einschränkungen, Pufferüberläufen, fehlenden Freigaben und use-after-free-Problemen. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuführen, Sicherheitsmaßnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand herbeizuführen, seine Privilegien zu erweitern und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erhöhte Privilegien.", }, ], product_status: { known_affected: [ "T000126", "T028071", ], }, release_date: "2023-06-12T22:00:00.000+00:00", title: "CVE-2022-32296", }, { cve: "CVE-2022-32250", notes: [ { category: "description", text: "In Siemens SIMATIC S7 existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem aufgrund von unzulässigen Einschränkungen, Pufferüberläufen, fehlenden Freigaben und use-after-free-Problemen. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuführen, Sicherheitsmaßnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand herbeizuführen, seine Privilegien zu erweitern und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erhöhte Privilegien.", }, ], product_status: { known_affected: [ "T000126", "T028071", ], }, release_date: "2023-06-12T22:00:00.000+00:00", title: "CVE-2022-32250", }, { cve: "CVE-2022-3169", notes: [ { category: "description", text: "In Siemens SIMATIC S7 existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem aufgrund von unzulässigen Einschränkungen, Pufferüberläufen, fehlenden Freigaben und use-after-free-Problemen. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuführen, Sicherheitsmaßnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand herbeizuführen, seine Privilegien zu erweitern und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erhöhte Privilegien.", }, ], product_status: { known_affected: [ "T000126", "T028071", ], }, release_date: "2023-06-12T22:00:00.000+00:00", title: "CVE-2022-3169", }, { cve: "CVE-2022-3115", notes: [ { category: "description", text: "In Siemens SIMATIC S7 existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem aufgrund von unzulässigen Einschränkungen, Pufferüberläufen, fehlenden Freigaben und use-after-free-Problemen. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuführen, Sicherheitsmaßnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand herbeizuführen, seine Privilegien zu erweitern und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erhöhte Privilegien.", }, ], product_status: { known_affected: [ "T000126", "T028071", ], }, release_date: "2023-06-12T22:00:00.000+00:00", title: "CVE-2022-3115", }, { cve: "CVE-2022-3104", notes: [ { category: "description", text: "In Siemens SIMATIC S7 existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem aufgrund von unzulässigen Einschränkungen, Pufferüberläufen, fehlenden Freigaben und use-after-free-Problemen. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuführen, Sicherheitsmaßnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand herbeizuführen, seine Privilegien zu erweitern und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erhöhte Privilegien.", }, ], product_status: { known_affected: [ "T000126", "T028071", ], }, release_date: "2023-06-12T22:00:00.000+00:00", title: "CVE-2022-3104", }, { cve: "CVE-2022-3028", notes: [ { category: "description", text: "In Siemens SIMATIC S7 existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem aufgrund von unzulässigen Einschränkungen, Pufferüberläufen, fehlenden Freigaben und use-after-free-Problemen. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuführen, Sicherheitsmaßnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand herbeizuführen, seine Privilegien zu erweitern und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erhöhte Privilegien.", }, ], product_status: { known_affected: [ "T000126", "T028071", ], }, release_date: "2023-06-12T22:00:00.000+00:00", title: "CVE-2022-3028", }, { cve: "CVE-2022-30065", notes: [ { category: "description", text: "In Siemens SIMATIC S7 existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem aufgrund von unzulässigen Einschränkungen, Pufferüberläufen, fehlenden Freigaben und use-after-free-Problemen. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuführen, Sicherheitsmaßnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand herbeizuführen, seine Privilegien zu erweitern und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erhöhte Privilegien.", }, ], product_status: { known_affected: [ "T000126", "T028071", ], }, release_date: "2023-06-12T22:00:00.000+00:00", title: "CVE-2022-30065", }, { cve: "CVE-2022-2978", notes: [ { category: "description", text: "In Siemens SIMATIC S7 existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem aufgrund von unzulässigen Einschränkungen, Pufferüberläufen, fehlenden Freigaben und use-after-free-Problemen. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuführen, Sicherheitsmaßnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand herbeizuführen, seine Privilegien zu erweitern und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erhöhte Privilegien.", }, ], product_status: { known_affected: [ "T000126", "T028071", ], }, release_date: "2023-06-12T22:00:00.000+00:00", title: "CVE-2022-2978", }, { cve: "CVE-2022-2959", notes: [ { category: "description", text: "In Siemens SIMATIC S7 existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem aufgrund von unzulässigen Einschränkungen, Pufferüberläufen, fehlenden Freigaben und use-after-free-Problemen. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuführen, Sicherheitsmaßnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand herbeizuführen, seine Privilegien zu erweitern und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erhöhte Privilegien.", }, ], product_status: { known_affected: [ "T000126", "T028071", ], }, release_date: "2023-06-12T22:00:00.000+00:00", title: "CVE-2022-2959", }, { cve: "CVE-2022-2905", notes: [ { category: "description", text: "In Siemens SIMATIC S7 existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem aufgrund von unzulässigen Einschränkungen, Pufferüberläufen, fehlenden Freigaben und use-after-free-Problemen. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuführen, Sicherheitsmaßnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand herbeizuführen, seine Privilegien zu erweitern und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erhöhte Privilegien.", }, ], product_status: { known_affected: [ "T000126", "T028071", ], }, release_date: "2023-06-12T22:00:00.000+00:00", title: "CVE-2022-2905", }, { cve: "CVE-2022-28391", notes: [ { category: "description", text: "In Siemens SIMATIC S7 existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem aufgrund von unzulässigen Einschränkungen, Pufferüberläufen, fehlenden Freigaben und use-after-free-Problemen. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuführen, Sicherheitsmaßnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand herbeizuführen, seine Privilegien zu erweitern und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erhöhte Privilegien.", }, ], product_status: { known_affected: [ "T000126", "T028071", ], }, release_date: "2023-06-12T22:00:00.000+00:00", title: "CVE-2022-28391", }, { cve: "CVE-2022-2663", notes: [ { category: "description", text: "In Siemens SIMATIC S7 existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem aufgrund von unzulässigen Einschränkungen, Pufferüberläufen, fehlenden Freigaben und use-after-free-Problemen. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuführen, Sicherheitsmaßnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand herbeizuführen, seine Privilegien zu erweitern und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erhöhte Privilegien.", }, ], product_status: { known_affected: [ "T000126", "T028071", ], }, release_date: "2023-06-12T22:00:00.000+00:00", title: "CVE-2022-2663", }, { cve: "CVE-2022-26373", notes: [ { category: "description", text: "In Siemens SIMATIC S7 existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem aufgrund von unzulässigen Einschränkungen, Pufferüberläufen, fehlenden Freigaben und use-after-free-Problemen. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuführen, Sicherheitsmaßnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand herbeizuführen, seine Privilegien zu erweitern und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erhöhte Privilegien.", }, ], product_status: { known_affected: [ "T000126", "T028071", ], }, release_date: "2023-06-12T22:00:00.000+00:00", title: "CVE-2022-26373", }, { cve: "CVE-2022-2602", notes: [ { category: "description", text: "In Siemens SIMATIC S7 existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem aufgrund von unzulässigen Einschränkungen, Pufferüberläufen, fehlenden Freigaben und use-after-free-Problemen. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuführen, Sicherheitsmaßnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand herbeizuführen, seine Privilegien zu erweitern und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erhöhte Privilegien.", }, ], product_status: { known_affected: [ "T000126", "T028071", ], }, release_date: "2023-06-12T22:00:00.000+00:00", title: "CVE-2022-2602", }, { cve: "CVE-2022-2588", notes: [ { category: "description", text: "In Siemens SIMATIC S7 existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem aufgrund von unzulässigen Einschränkungen, Pufferüberläufen, fehlenden Freigaben und use-after-free-Problemen. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuführen, Sicherheitsmaßnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand herbeizuführen, seine Privilegien zu erweitern und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erhöhte Privilegien.", }, ], product_status: { known_affected: [ "T000126", "T028071", ], }, release_date: "2023-06-12T22:00:00.000+00:00", title: "CVE-2022-2588", }, { cve: "CVE-2022-2586", notes: [ { category: "description", text: "In Siemens SIMATIC S7 existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem aufgrund von unzulässigen Einschränkungen, Pufferüberläufen, fehlenden Freigaben und use-after-free-Problemen. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuführen, Sicherheitsmaßnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand herbeizuführen, seine Privilegien zu erweitern und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erhöhte Privilegien.", }, ], product_status: { known_affected: [ "T000126", "T028071", ], }, release_date: "2023-06-12T22:00:00.000+00:00", title: "CVE-2022-2586", }, { cve: "CVE-2022-2585", notes: [ { category: "description", text: "In Siemens SIMATIC S7 existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem aufgrund von unzulässigen Einschränkungen, Pufferüberläufen, fehlenden Freigaben und use-after-free-Problemen. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuführen, Sicherheitsmaßnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand herbeizuführen, seine Privilegien zu erweitern und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erhöhte Privilegien.", }, ], product_status: { known_affected: [ "T000126", "T028071", ], }, release_date: "2023-06-12T22:00:00.000+00:00", title: "CVE-2022-2585", }, { cve: "CVE-2022-2503", notes: [ { category: "description", text: "In Siemens SIMATIC S7 existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem aufgrund von unzulässigen Einschränkungen, Pufferüberläufen, fehlenden Freigaben und use-after-free-Problemen. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuführen, Sicherheitsmaßnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand herbeizuführen, seine Privilegien zu erweitern und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erhöhte Privilegien.", }, ], product_status: { known_affected: [ "T000126", "T028071", ], }, release_date: "2023-06-12T22:00:00.000+00:00", title: "CVE-2022-2503", }, { cve: "CVE-2022-2327", notes: [ { category: "description", text: "In Siemens SIMATIC S7 existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem aufgrund von unzulässigen Einschränkungen, Pufferüberläufen, fehlenden Freigaben und use-after-free-Problemen. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuführen, Sicherheitsmaßnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand herbeizuführen, seine Privilegien zu erweitern und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erhöhte Privilegien.", }, ], product_status: { known_affected: [ "T000126", "T028071", ], }, release_date: "2023-06-12T22:00:00.000+00:00", title: "CVE-2022-2327", }, { cve: "CVE-2022-23219", notes: [ { category: "description", text: "In Siemens SIMATIC S7 existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem aufgrund von unzulässigen Einschränkungen, Pufferüberläufen, fehlenden Freigaben und use-after-free-Problemen. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuführen, Sicherheitsmaßnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand herbeizuführen, seine Privilegien zu erweitern und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erhöhte Privilegien.", }, ], product_status: { known_affected: [ "T000126", "T028071", ], }, release_date: "2023-06-12T22:00:00.000+00:00", title: "CVE-2022-23219", }, { cve: "CVE-2022-23218", notes: [ { category: "description", text: "In Siemens SIMATIC S7 existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem aufgrund von unzulässigen Einschränkungen, Pufferüberläufen, fehlenden Freigaben und use-after-free-Problemen. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuführen, Sicherheitsmaßnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand herbeizuführen, seine Privilegien zu erweitern und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erhöhte Privilegien.", }, ], product_status: { known_affected: [ "T000126", "T028071", ], }, release_date: "2023-06-12T22:00:00.000+00:00", title: "CVE-2022-23218", }, { cve: "CVE-2022-2274", notes: [ { category: "description", text: "In Siemens SIMATIC S7 existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem aufgrund von unzulässigen Einschränkungen, Pufferüberläufen, fehlenden Freigaben und use-after-free-Problemen. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuführen, Sicherheitsmaßnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand herbeizuführen, seine Privilegien zu erweitern und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erhöhte Privilegien.", }, ], product_status: { known_affected: [ "T000126", "T028071", ], }, release_date: "2023-06-12T22:00:00.000+00:00", title: "CVE-2022-2274", }, { cve: "CVE-2022-2153", notes: [ { category: "description", text: "In Siemens SIMATIC S7 existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem aufgrund von unzulässigen Einschränkungen, Pufferüberläufen, fehlenden Freigaben und use-after-free-Problemen. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuführen, Sicherheitsmaßnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand herbeizuführen, seine Privilegien zu erweitern und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erhöhte Privilegien.", }, ], product_status: { known_affected: [ "T000126", "T028071", ], }, release_date: "2023-06-12T22:00:00.000+00:00", title: "CVE-2022-2153", }, { cve: "CVE-2022-21505", notes: [ { category: "description", text: "In Siemens SIMATIC S7 existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem aufgrund von unzulässigen Einschränkungen, Pufferüberläufen, fehlenden Freigaben und use-after-free-Problemen. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuführen, Sicherheitsmaßnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand herbeizuführen, seine Privilegien zu erweitern und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erhöhte Privilegien.", }, ], product_status: { known_affected: [ "T000126", "T028071", ], }, release_date: "2023-06-12T22:00:00.000+00:00", title: "CVE-2022-21505", }, { cve: "CVE-2022-21233", notes: [ { category: "description", text: "In Siemens SIMATIC S7 existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem aufgrund von unzulässigen Einschränkungen, Pufferüberläufen, fehlenden Freigaben und use-after-free-Problemen. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuführen, Sicherheitsmaßnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand herbeizuführen, seine Privilegien zu erweitern und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erhöhte Privilegien.", }, ], product_status: { known_affected: [ "T000126", "T028071", ], }, release_date: "2023-06-12T22:00:00.000+00:00", title: "CVE-2022-21233", }, { cve: "CVE-2022-21166", notes: [ { category: "description", text: "In Siemens SIMATIC S7 existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem aufgrund von unzulässigen Einschränkungen, Pufferüberläufen, fehlenden Freigaben und use-after-free-Problemen. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuführen, Sicherheitsmaßnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand herbeizuführen, seine Privilegien zu erweitern und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erhöhte Privilegien.", }, ], product_status: { known_affected: [ "T000126", "T028071", ], }, release_date: "2023-06-12T22:00:00.000+00:00", title: "CVE-2022-21166", }, { cve: "CVE-2022-21125", notes: [ { category: "description", text: "In Siemens SIMATIC S7 existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem aufgrund von unzulässigen Einschränkungen, Pufferüberläufen, fehlenden Freigaben und use-after-free-Problemen. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuführen, Sicherheitsmaßnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand herbeizuführen, seine Privilegien zu erweitern und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erhöhte Privilegien.", }, ], product_status: { known_affected: [ "T000126", "T028071", ], }, release_date: "2023-06-12T22:00:00.000+00:00", title: "CVE-2022-21125", }, { cve: "CVE-2022-21123", notes: [ { category: "description", text: "In Siemens SIMATIC S7 existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem aufgrund von unzulässigen Einschränkungen, Pufferüberläufen, fehlenden Freigaben und use-after-free-Problemen. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuführen, Sicherheitsmaßnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand herbeizuführen, seine Privilegien zu erweitern und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erhöhte Privilegien.", }, ], product_status: { known_affected: [ "T000126", "T028071", ], }, release_date: "2023-06-12T22:00:00.000+00:00", title: "CVE-2022-21123", }, { cve: "CVE-2022-2097", notes: [ { category: "description", text: "In Siemens SIMATIC S7 existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem aufgrund von unzulässigen Einschränkungen, Pufferüberläufen, fehlenden Freigaben und use-after-free-Problemen. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuführen, Sicherheitsmaßnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand herbeizuführen, seine Privilegien zu erweitern und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erhöhte Privilegien.", }, ], product_status: { known_affected: [ "T000126", "T028071", ], }, release_date: "2023-06-12T22:00:00.000+00:00", title: "CVE-2022-2097", }, { cve: "CVE-2022-2078", notes: [ { category: "description", text: "In Siemens SIMATIC S7 existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem aufgrund von unzulässigen Einschränkungen, Pufferüberläufen, fehlenden Freigaben und use-after-free-Problemen. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuführen, Sicherheitsmaßnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand herbeizuführen, seine Privilegien zu erweitern und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erhöhte Privilegien.", }, ], product_status: { known_affected: [ "T000126", "T028071", ], }, release_date: "2023-06-12T22:00:00.000+00:00", title: "CVE-2022-2078", }, { cve: "CVE-2022-2068", notes: [ { category: "description", text: "In Siemens SIMATIC S7 existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem aufgrund von unzulässigen Einschränkungen, Pufferüberläufen, fehlenden Freigaben und use-after-free-Problemen. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuführen, Sicherheitsmaßnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand herbeizuführen, seine Privilegien zu erweitern und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erhöhte Privilegien.", }, ], product_status: { known_affected: [ "T000126", "T028071", ], }, release_date: "2023-06-12T22:00:00.000+00:00", title: "CVE-2022-2068", }, { cve: "CVE-2022-20572", notes: [ { category: "description", text: "In Siemens SIMATIC S7 existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem aufgrund von unzulässigen Einschränkungen, Pufferüberläufen, fehlenden Freigaben und use-after-free-Problemen. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuführen, Sicherheitsmaßnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand herbeizuführen, seine Privilegien zu erweitern und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erhöhte Privilegien.", }, ], product_status: { known_affected: [ "T000126", "T028071", ], }, release_date: "2023-06-12T22:00:00.000+00:00", title: "CVE-2022-20572", }, { cve: "CVE-2022-20566", notes: [ { category: "description", text: "In Siemens SIMATIC S7 existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem aufgrund von unzulässigen Einschränkungen, Pufferüberläufen, fehlenden Freigaben und use-after-free-Problemen. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuführen, Sicherheitsmaßnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand herbeizuführen, seine Privilegien zu erweitern und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erhöhte Privilegien.", }, ], product_status: { known_affected: [ "T000126", "T028071", ], }, release_date: "2023-06-12T22:00:00.000+00:00", title: "CVE-2022-20566", }, { cve: "CVE-2022-20422", notes: [ { category: "description", text: "In Siemens SIMATIC S7 existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem aufgrund von unzulässigen Einschränkungen, Pufferüberläufen, fehlenden Freigaben und use-after-free-Problemen. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuführen, Sicherheitsmaßnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand herbeizuführen, seine Privilegien zu erweitern und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erhöhte Privilegien.", }, ], product_status: { known_affected: [ "T000126", "T028071", ], }, release_date: "2023-06-12T22:00:00.000+00:00", title: "CVE-2022-20422", }, { cve: "CVE-2022-20421", notes: [ { category: "description", text: "In Siemens SIMATIC S7 existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem aufgrund von unzulässigen Einschränkungen, Pufferüberläufen, fehlenden Freigaben und use-after-free-Problemen. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuführen, Sicherheitsmaßnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand herbeizuführen, seine Privilegien zu erweitern und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erhöhte Privilegien.", }, ], product_status: { known_affected: [ "T000126", "T028071", ], }, release_date: "2023-06-12T22:00:00.000+00:00", title: "CVE-2022-20421", }, { cve: "CVE-2022-1882", notes: [ { category: "description", text: "In Siemens SIMATIC S7 existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem aufgrund von unzulässigen Einschränkungen, Pufferüberläufen, fehlenden Freigaben und use-after-free-Problemen. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuführen, Sicherheitsmaßnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand herbeizuführen, seine Privilegien zu erweitern und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erhöhte Privilegien.", }, ], product_status: { known_affected: [ "T000126", "T028071", ], }, release_date: "2023-06-12T22:00:00.000+00:00", title: "CVE-2022-1882", }, { cve: "CVE-2022-1852", notes: [ { category: "description", text: "In Siemens SIMATIC S7 existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem aufgrund von unzulässigen Einschränkungen, Pufferüberläufen, fehlenden Freigaben und use-after-free-Problemen. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuführen, Sicherheitsmaßnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand herbeizuführen, seine Privilegien zu erweitern und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erhöhte Privilegien.", }, ], product_status: { known_affected: [ "T000126", "T028071", ], }, release_date: "2023-06-12T22:00:00.000+00:00", title: "CVE-2022-1852", }, { cve: "CVE-2022-1679", notes: [ { category: "description", text: "In Siemens SIMATIC S7 existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem aufgrund von unzulässigen Einschränkungen, Pufferüberläufen, fehlenden Freigaben und use-after-free-Problemen. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuführen, Sicherheitsmaßnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand herbeizuführen, seine Privilegien zu erweitern und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erhöhte Privilegien.", }, ], product_status: { known_affected: [ "T000126", "T028071", ], }, release_date: "2023-06-12T22:00:00.000+00:00", title: "CVE-2022-1679", }, { cve: "CVE-2022-1473", notes: [ { category: "description", text: "In Siemens SIMATIC S7 existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem aufgrund von unzulässigen Einschränkungen, Pufferüberläufen, fehlenden Freigaben und use-after-free-Problemen. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuführen, Sicherheitsmaßnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand herbeizuführen, seine Privilegien zu erweitern und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erhöhte Privilegien.", }, ], product_status: { known_affected: [ "T000126", "T028071", ], }, release_date: "2023-06-12T22:00:00.000+00:00", title: "CVE-2022-1473", }, { cve: "CVE-2022-1462", notes: [ { category: "description", text: "In Siemens SIMATIC S7 existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem aufgrund von unzulässigen Einschränkungen, Pufferüberläufen, fehlenden Freigaben und use-after-free-Problemen. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuführen, Sicherheitsmaßnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand herbeizuführen, seine Privilegien zu erweitern und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erhöhte Privilegien.", }, ], product_status: { known_affected: [ "T000126", "T028071", ], }, release_date: "2023-06-12T22:00:00.000+00:00", title: "CVE-2022-1462", }, { cve: "CVE-2022-1434", notes: [ { category: "description", text: "In Siemens SIMATIC S7 existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem aufgrund von unzulässigen Einschränkungen, Pufferüberläufen, fehlenden Freigaben und use-after-free-Problemen. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuführen, Sicherheitsmaßnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand herbeizuführen, seine Privilegien zu erweitern und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erhöhte Privilegien.", }, ], product_status: { known_affected: [ "T000126", "T028071", ], }, release_date: "2023-06-12T22:00:00.000+00:00", title: "CVE-2022-1434", }, { cve: "CVE-2022-1343", notes: [ { category: "description", text: "In Siemens SIMATIC S7 existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem aufgrund von unzulässigen Einschränkungen, Pufferüberläufen, fehlenden Freigaben und use-after-free-Problemen. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuführen, Sicherheitsmaßnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand herbeizuführen, seine Privilegien zu erweitern und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erhöhte Privilegien.", }, ], product_status: { known_affected: [ "T000126", "T028071", ], }, release_date: "2023-06-12T22:00:00.000+00:00", title: "CVE-2022-1343", }, { cve: "CVE-2022-1292", notes: [ { category: "description", text: "In Siemens SIMATIC S7 existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem aufgrund von unzulässigen Einschränkungen, Pufferüberläufen, fehlenden Freigaben und use-after-free-Problemen. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuführen, Sicherheitsmaßnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand herbeizuführen, seine Privilegien zu erweitern und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erhöhte Privilegien.", }, ], product_status: { known_affected: [ "T000126", "T028071", ], }, release_date: "2023-06-12T22:00:00.000+00:00", title: "CVE-2022-1292", }, { cve: "CVE-2022-1184", notes: [ { category: "description", text: "In Siemens SIMATIC S7 existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem aufgrund von unzulässigen Einschränkungen, Pufferüberläufen, fehlenden Freigaben und use-after-free-Problemen. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuführen, Sicherheitsmaßnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand herbeizuführen, seine Privilegien zu erweitern und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erhöhte Privilegien.", }, ], product_status: { known_affected: [ "T000126", "T028071", ], }, release_date: "2023-06-12T22:00:00.000+00:00", title: "CVE-2022-1184", }, { cve: "CVE-2022-1012", notes: [ { category: "description", text: "In Siemens SIMATIC S7 existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem aufgrund von unzulässigen Einschränkungen, Pufferüberläufen, fehlenden Freigaben und use-after-free-Problemen. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuführen, Sicherheitsmaßnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand herbeizuführen, seine Privilegien zu erweitern und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erhöhte Privilegien.", }, ], product_status: { known_affected: [ "T000126", "T028071", ], }, release_date: "2023-06-12T22:00:00.000+00:00", title: "CVE-2022-1012", }, { cve: "CVE-2022-0171", notes: [ { category: "description", text: "In Siemens SIMATIC S7 existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem aufgrund von unzulässigen Einschränkungen, Pufferüberläufen, fehlenden Freigaben und use-after-free-Problemen. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuführen, Sicherheitsmaßnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand herbeizuführen, seine Privilegien zu erweitern und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erhöhte Privilegien.", }, ], product_status: { known_affected: [ "T000126", "T028071", ], }, release_date: "2023-06-12T22:00:00.000+00:00", title: "CVE-2022-0171", }, { cve: "CVE-2021-42386", notes: [ { category: "description", text: "In Siemens SIMATIC S7 existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem aufgrund von unzulässigen Einschränkungen, Pufferüberläufen, fehlenden Freigaben und use-after-free-Problemen. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuführen, Sicherheitsmaßnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand herbeizuführen, seine Privilegien zu erweitern und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erhöhte Privilegien.", }, ], product_status: { known_affected: [ "T000126", "T028071", ], }, release_date: "2023-06-12T22:00:00.000+00:00", title: "CVE-2021-42386", }, { cve: "CVE-2021-42385", notes: [ { category: "description", text: "In Siemens SIMATIC S7 existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem aufgrund von unzulässigen Einschränkungen, Pufferüberläufen, fehlenden Freigaben und use-after-free-Problemen. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuführen, Sicherheitsmaßnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand herbeizuführen, seine Privilegien zu erweitern und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erhöhte Privilegien.", }, ], product_status: { known_affected: [ "T000126", "T028071", ], }, release_date: "2023-06-12T22:00:00.000+00:00", title: "CVE-2021-42385", }, { cve: "CVE-2021-42384", notes: [ { category: "description", text: "In Siemens SIMATIC S7 existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem aufgrund von unzulässigen Einschränkungen, Pufferüberläufen, fehlenden Freigaben und use-after-free-Problemen. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuführen, Sicherheitsmaßnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand herbeizuführen, seine Privilegien zu erweitern und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erhöhte Privilegien.", }, ], product_status: { known_affected: [ "T000126", "T028071", ], }, release_date: "2023-06-12T22:00:00.000+00:00", title: "CVE-2021-42384", }, { cve: "CVE-2021-42383", notes: [ { category: "description", text: "In Siemens SIMATIC S7 existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem aufgrund von unzulässigen Einschränkungen, Pufferüberläufen, fehlenden Freigaben und use-after-free-Problemen. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuführen, Sicherheitsmaßnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand herbeizuführen, seine Privilegien zu erweitern und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erhöhte Privilegien.", }, ], product_status: { known_affected: [ "T000126", "T028071", ], }, release_date: "2023-06-12T22:00:00.000+00:00", title: "CVE-2021-42383", }, { cve: "CVE-2021-42382", notes: [ { category: "description", text: "In Siemens SIMATIC S7 existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem aufgrund von unzulässigen Einschränkungen, Pufferüberläufen, fehlenden Freigaben und use-after-free-Problemen. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuführen, Sicherheitsmaßnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand herbeizuführen, seine Privilegien zu erweitern und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erhöhte Privilegien.", }, ], product_status: { known_affected: [ "T000126", "T028071", ], }, release_date: "2023-06-12T22:00:00.000+00:00", title: "CVE-2021-42382", }, { cve: "CVE-2021-42381", notes: [ { category: "description", text: "In Siemens SIMATIC S7 existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem aufgrund von unzulässigen Einschränkungen, Pufferüberläufen, fehlenden Freigaben und use-after-free-Problemen. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuführen, Sicherheitsmaßnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand herbeizuführen, seine Privilegien zu erweitern und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erhöhte Privilegien.", }, ], product_status: { known_affected: [ "T000126", "T028071", ], }, release_date: "2023-06-12T22:00:00.000+00:00", title: "CVE-2021-42381", }, { cve: "CVE-2021-42380", notes: [ { category: "description", text: "In Siemens SIMATIC S7 existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem aufgrund von unzulässigen Einschränkungen, Pufferüberläufen, fehlenden Freigaben und use-after-free-Problemen. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuführen, Sicherheitsmaßnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand herbeizuführen, seine Privilegien zu erweitern und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erhöhte Privilegien.", }, ], product_status: { known_affected: [ "T000126", "T028071", ], }, release_date: "2023-06-12T22:00:00.000+00:00", title: "CVE-2021-42380", }, { cve: "CVE-2021-42379", notes: [ { category: "description", text: "In Siemens SIMATIC S7 existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem aufgrund von unzulässigen Einschränkungen, Pufferüberläufen, fehlenden Freigaben und use-after-free-Problemen. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuführen, Sicherheitsmaßnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand herbeizuführen, seine Privilegien zu erweitern und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erhöhte Privilegien.", }, ], product_status: { known_affected: [ "T000126", "T028071", ], }, release_date: "2023-06-12T22:00:00.000+00:00", title: "CVE-2021-42379", }, { cve: "CVE-2021-42378", notes: [ { category: "description", text: "In Siemens SIMATIC S7 existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem aufgrund von unzulässigen Einschränkungen, Pufferüberläufen, fehlenden Freigaben und use-after-free-Problemen. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuführen, Sicherheitsmaßnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand herbeizuführen, seine Privilegien zu erweitern und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erhöhte Privilegien.", }, ], product_status: { known_affected: [ "T000126", "T028071", ], }, release_date: "2023-06-12T22:00:00.000+00:00", title: "CVE-2021-42378", }, { cve: "CVE-2021-42377", notes: [ { category: "description", text: "In Siemens SIMATIC S7 existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem aufgrund von unzulässigen Einschränkungen, Pufferüberläufen, fehlenden Freigaben und use-after-free-Problemen. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuführen, Sicherheitsmaßnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand herbeizuführen, seine Privilegien zu erweitern und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erhöhte Privilegien.", }, ], product_status: { known_affected: [ "T000126", "T028071", ], }, release_date: "2023-06-12T22:00:00.000+00:00", title: "CVE-2021-42377", }, { cve: "CVE-2021-42376", notes: [ { category: "description", text: "In Siemens SIMATIC S7 existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem aufgrund von unzulässigen Einschränkungen, Pufferüberläufen, fehlenden Freigaben und use-after-free-Problemen. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuführen, Sicherheitsmaßnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand herbeizuführen, seine Privilegien zu erweitern und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erhöhte Privilegien.", }, ], product_status: { known_affected: [ "T000126", "T028071", ], }, release_date: "2023-06-12T22:00:00.000+00:00", title: "CVE-2021-42376", }, { cve: "CVE-2021-42375", notes: [ { category: "description", text: "In Siemens SIMATIC S7 existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem aufgrund von unzulässigen Einschränkungen, Pufferüberläufen, fehlenden Freigaben und use-after-free-Problemen. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuführen, Sicherheitsmaßnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand herbeizuführen, seine Privilegien zu erweitern und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erhöhte Privilegien.", }, ], product_status: { known_affected: [ "T000126", "T028071", ], }, release_date: "2023-06-12T22:00:00.000+00:00", title: "CVE-2021-42375", }, { cve: "CVE-2021-42374", notes: [ { category: "description", text: "In Siemens SIMATIC S7 existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem aufgrund von unzulässigen Einschränkungen, Pufferüberläufen, fehlenden Freigaben und use-after-free-Problemen. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuführen, Sicherheitsmaßnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand herbeizuführen, seine Privilegien zu erweitern und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erhöhte Privilegien.", }, ], product_status: { known_affected: [ "T000126", "T028071", ], }, release_date: "2023-06-12T22:00:00.000+00:00", title: "CVE-2021-42374", }, { cve: "CVE-2021-42373", notes: [ { category: "description", text: "In Siemens SIMATIC S7 existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem aufgrund von unzulässigen Einschränkungen, Pufferüberläufen, fehlenden Freigaben und use-after-free-Problemen. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuführen, Sicherheitsmaßnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand herbeizuführen, seine Privilegien zu erweitern und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erhöhte Privilegien.", }, ], product_status: { known_affected: [ "T000126", "T028071", ], }, release_date: "2023-06-12T22:00:00.000+00:00", title: "CVE-2021-42373", }, { cve: "CVE-2021-4037", notes: [ { category: "description", text: "In Siemens SIMATIC S7 existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem aufgrund von unzulässigen Einschränkungen, Pufferüberläufen, fehlenden Freigaben und use-after-free-Problemen. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuführen, Sicherheitsmaßnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand herbeizuführen, seine Privilegien zu erweitern und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erhöhte Privilegien.", }, ], product_status: { known_affected: [ "T000126", "T028071", ], }, release_date: "2023-06-12T22:00:00.000+00:00", title: "CVE-2021-4037", }, { cve: "CVE-2021-3999", notes: [ { category: "description", text: "In Siemens SIMATIC S7 existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem aufgrund von unzulässigen Einschränkungen, Pufferüberläufen, fehlenden Freigaben und use-after-free-Problemen. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuführen, Sicherheitsmaßnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand herbeizuführen, seine Privilegien zu erweitern und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erhöhte Privilegien.", }, ], product_status: { known_affected: [ "T000126", "T028071", ], }, release_date: "2023-06-12T22:00:00.000+00:00", title: "CVE-2021-3999", }, { cve: "CVE-2021-3998", notes: [ { category: "description", text: "In Siemens SIMATIC S7 existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem aufgrund von unzulässigen Einschränkungen, Pufferüberläufen, fehlenden Freigaben und use-after-free-Problemen. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuführen, Sicherheitsmaßnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand herbeizuführen, seine Privilegien zu erweitern und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erhöhte Privilegien.", }, ], product_status: { known_affected: [ "T000126", "T028071", ], }, release_date: "2023-06-12T22:00:00.000+00:00", title: "CVE-2021-3998", }, { cve: "CVE-2021-38604", notes: [ { category: "description", text: "In Siemens SIMATIC S7 existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem aufgrund von unzulässigen Einschränkungen, Pufferüberläufen, fehlenden Freigaben und use-after-free-Problemen. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuführen, Sicherheitsmaßnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand herbeizuführen, seine Privilegien zu erweitern und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erhöhte Privilegien.", }, ], product_status: { known_affected: [ "T000126", "T028071", ], }, release_date: "2023-06-12T22:00:00.000+00:00", title: "CVE-2021-38604", }, { cve: "CVE-2021-3759", notes: [ { category: "description", text: "In Siemens SIMATIC S7 existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem aufgrund von unzulässigen Einschränkungen, Pufferüberläufen, fehlenden Freigaben und use-after-free-Problemen. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuführen, Sicherheitsmaßnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand herbeizuführen, seine Privilegien zu erweitern und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erhöhte Privilegien.", }, ], product_status: { known_affected: [ "T000126", "T028071", ], }, release_date: "2023-06-12T22:00:00.000+00:00", title: "CVE-2021-3759", }, { cve: "CVE-2021-35942", notes: [ { category: "description", text: "In Siemens SIMATIC S7 existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem aufgrund von unzulässigen Einschränkungen, Pufferüberläufen, fehlenden Freigaben und use-after-free-Problemen. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuführen, Sicherheitsmaßnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand herbeizuführen, seine Privilegien zu erweitern und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erhöhte Privilegien.", }, ], product_status: { known_affected: [ "T000126", "T028071", ], }, release_date: "2023-06-12T22:00:00.000+00:00", title: "CVE-2021-35942", }, { cve: "CVE-2021-33655", notes: [ { category: "description", text: "In Siemens SIMATIC S7 existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem aufgrund von unzulässigen Einschränkungen, Pufferüberläufen, fehlenden Freigaben und use-after-free-Problemen. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuführen, Sicherheitsmaßnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand herbeizuführen, seine Privilegien zu erweitern und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erhöhte Privilegien.", }, ], product_status: { known_affected: [ "T000126", "T028071", ], }, release_date: "2023-06-12T22:00:00.000+00:00", title: "CVE-2021-33655", }, { cve: "CVE-2021-33574", notes: [ { category: "description", text: "In Siemens SIMATIC S7 existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem aufgrund von unzulässigen Einschränkungen, Pufferüberläufen, fehlenden Freigaben und use-after-free-Problemen. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuführen, Sicherheitsmaßnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand herbeizuführen, seine Privilegien zu erweitern und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erhöhte Privilegien.", }, ], product_status: { known_affected: [ "T000126", "T028071", ], }, release_date: "2023-06-12T22:00:00.000+00:00", title: "CVE-2021-33574", }, { cve: "CVE-2021-3326", notes: [ { category: "description", text: "In Siemens SIMATIC S7 existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem aufgrund von unzulässigen Einschränkungen, Pufferüberläufen, fehlenden Freigaben und use-after-free-Problemen. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuführen, Sicherheitsmaßnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand herbeizuführen, seine Privilegien zu erweitern und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erhöhte Privilegien.", }, ], product_status: { known_affected: [ "T000126", "T028071", ], }, release_date: "2023-06-12T22:00:00.000+00:00", title: "CVE-2021-3326", }, { cve: "CVE-2021-28831", notes: [ { category: "description", text: "In Siemens SIMATIC S7 existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem aufgrund von unzulässigen Einschränkungen, Pufferüberläufen, fehlenden Freigaben und use-after-free-Problemen. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuführen, Sicherheitsmaßnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand herbeizuführen, seine Privilegien zu erweitern und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erhöhte Privilegien.", }, ], product_status: { known_affected: [ "T000126", "T028071", ], }, release_date: "2023-06-12T22:00:00.000+00:00", title: "CVE-2021-28831", }, { cve: "CVE-2021-27645", notes: [ { category: "description", text: "In Siemens SIMATIC S7 existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem aufgrund von unzulässigen Einschränkungen, Pufferüberläufen, fehlenden Freigaben und use-after-free-Problemen. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuführen, Sicherheitsmaßnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand herbeizuführen, seine Privilegien zu erweitern und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erhöhte Privilegien.", }, ], product_status: { known_affected: [ "T000126", "T028071", ], }, release_date: "2023-06-12T22:00:00.000+00:00", title: "CVE-2021-27645", }, { cve: "CVE-2021-20269", notes: [ { category: "description", text: "In Siemens SIMATIC S7 existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem aufgrund von unzulässigen Einschränkungen, Pufferüberläufen, fehlenden Freigaben und use-after-free-Problemen. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuführen, Sicherheitsmaßnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand herbeizuführen, seine Privilegien zu erweitern und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erhöhte Privilegien.", }, ], product_status: { known_affected: [ "T000126", "T028071", ], }, release_date: "2023-06-12T22:00:00.000+00:00", title: "CVE-2021-20269", }, { cve: "CVE-2020-29562", notes: [ { category: "description", text: "In Siemens SIMATIC S7 existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem aufgrund von unzulässigen Einschränkungen, Pufferüberläufen, fehlenden Freigaben und use-after-free-Problemen. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuführen, Sicherheitsmaßnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand herbeizuführen, seine Privilegien zu erweitern und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erhöhte Privilegien.", }, ], product_status: { known_affected: [ "T000126", "T028071", ], }, release_date: "2023-06-12T22:00:00.000+00:00", title: "CVE-2020-29562", }, { cve: "CVE-2020-27618", notes: [ { category: "description", text: "In Siemens SIMATIC S7 existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem aufgrund von unzulässigen Einschränkungen, Pufferüberläufen, fehlenden Freigaben und use-after-free-Problemen. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuführen, Sicherheitsmaßnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand herbeizuführen, seine Privilegien zu erweitern und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erhöhte Privilegien.", }, ], product_status: { known_affected: [ "T000126", "T028071", ], }, release_date: "2023-06-12T22:00:00.000+00:00", title: "CVE-2020-27618", }, { cve: "CVE-2020-1752", notes: [ { category: "description", text: "In Siemens SIMATIC S7 existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem aufgrund von unzulässigen Einschränkungen, Pufferüberläufen, fehlenden Freigaben und use-after-free-Problemen. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuführen, Sicherheitsmaßnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand herbeizuführen, seine Privilegien zu erweitern und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erhöhte Privilegien.", }, ], product_status: { known_affected: [ "T000126", "T028071", ], }, release_date: "2023-06-12T22:00:00.000+00:00", title: "CVE-2020-1752", }, { cve: "CVE-2020-10029", notes: [ { category: "description", text: "In Siemens SIMATIC S7 existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem aufgrund von unzulässigen Einschränkungen, Pufferüberläufen, fehlenden Freigaben und use-after-free-Problemen. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuführen, Sicherheitsmaßnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand herbeizuführen, seine Privilegien zu erweitern und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erhöhte Privilegien.", }, ], product_status: { known_affected: [ "T000126", "T028071", ], }, release_date: "2023-06-12T22:00:00.000+00:00", title: "CVE-2020-10029", }, { cve: "CVE-2019-25013", notes: [ { category: "description", text: "In Siemens SIMATIC S7 existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem aufgrund von unzulässigen Einschränkungen, Pufferüberläufen, fehlenden Freigaben und use-after-free-Problemen. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuführen, Sicherheitsmaßnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand herbeizuführen, seine Privilegien zu erweitern und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erhöhte Privilegien.", }, ], product_status: { known_affected: [ "T000126", "T028071", ], }, release_date: "2023-06-12T22:00:00.000+00:00", title: "CVE-2019-25013", }, { cve: "CVE-2018-13405", notes: [ { category: "description", text: "In Siemens SIMATIC S7 existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem aufgrund von unzulässigen Einschränkungen, Pufferüberläufen, fehlenden Freigaben und use-after-free-Problemen. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuführen, Sicherheitsmaßnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand herbeizuführen, seine Privilegien zu erweitern und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erhöhte Privilegien.", }, ], product_status: { known_affected: [ "T000126", "T028071", ], }, release_date: "2023-06-12T22:00:00.000+00:00", title: "CVE-2018-13405", }, { cve: "CVE-2016-10228", notes: [ { category: "description", text: "In Siemens SIMATIC S7 existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem aufgrund von unzulässigen Einschränkungen, Pufferüberläufen, fehlenden Freigaben und use-after-free-Problemen. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuführen, Sicherheitsmaßnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand herbeizuführen, seine Privilegien zu erweitern und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erhöhte Privilegien.", }, ], product_status: { known_affected: [ "T000126", "T028071", ], }, release_date: "2023-06-12T22:00:00.000+00:00", title: "CVE-2016-10228", }, ], }
wid-sec-w-2022-2029
Vulnerability from csaf_certbund
Published
2021-03-25 23:00
Modified
2025-01-19 23:00
Summary
BusyBox: Schwachstelle ermöglicht Denial of Service
Notes
Das BSI ist als Anbieter für die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch dafür verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgfältig im Einzelfall zu prüfen.
Produktbeschreibung
BusyBox ist ein Computerprogramm, das verschiedene Standard-Unix-Dienstprogramme in einem einzelnen Programm vereint.
Angriff
Ein entfernter, anonymer Angreifer kann eine Schwachstelle in BusyBox ausnutzen, um einen Denial of Service Angriff durchzuführen.
Betroffene Betriebssysteme
- Linux
- UNIX
{ document: { aggregate_severity: { text: "mittel", }, category: "csaf_base", csaf_version: "2.0", distribution: { tlp: { label: "WHITE", url: "https://www.first.org/tlp/", }, }, lang: "de-DE", notes: [ { category: "legal_disclaimer", text: "Das BSI ist als Anbieter für die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch dafür verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgfältig im Einzelfall zu prüfen.", }, { category: "description", text: "BusyBox ist ein Computerprogramm, das verschiedene Standard-Unix-Dienstprogramme in einem einzelnen Programm vereint.", title: "Produktbeschreibung", }, { category: "summary", text: "Ein entfernter, anonymer Angreifer kann eine Schwachstelle in BusyBox ausnutzen, um einen Denial of Service Angriff durchzuführen.", title: "Angriff", }, { category: "general", text: "- Linux\n- UNIX", title: "Betroffene Betriebssysteme", }, ], publisher: { category: "other", contact_details: "csaf-provider@cert-bund.de", name: "Bundesamt für Sicherheit in der Informationstechnik", namespace: "https://www.bsi.bund.de", }, references: [ { category: "self", summary: "WID-SEC-W-2022-2029 - CSAF Version", url: "https://wid.cert-bund.de/.well-known/csaf/white/2021/wid-sec-w-2022-2029.json", }, { category: "self", summary: "WID-SEC-2022-2029 - Portal Version", url: "https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2022-2029", }, { category: "external", summary: "git.busybox.net vom 2021-03-25", url: "https://git.busybox.net/busybox/commit/?id=f25d254dfd4243698c31a4f3153d4ac72aa9e9bd", }, { category: "external", summary: "Arch Linux Security Advisory ASA-202103-12 vom 2021-03-26", url: "https://www.cybersecurity-help.cz/vdb/SB2021032626", }, { category: "external", summary: "Debian Security Advisory DLA-2614 vom 2021-04-02", url: "https://lists.debian.org/debian-lts-announce/2021/04/msg00001.html", }, { category: "external", summary: "Amazon Linux Security Advisory ALAS-2021-1496 vom 2021-05-10", url: "https://alas.aws.amazon.com/ALAS-2021-1496.html", }, { category: "external", summary: "SUSE Security Update SUSE-SU-2021:3531-1 vom 2021-10-27", url: "https://lists.suse.com/pipermail/sle-security-updates/2021-October/009658.html", }, { category: "external", summary: "Ubuntu Security Notice USN-5179-1 vom 2021-12-07", url: "https://ubuntu.com/security/notices/USN-5179-1", }, { category: "external", summary: "SUSE Security Update SUSE-SU-2022:0135-1 vom 2022-01-20", url: "https://lists.suse.com/pipermail/sle-security-updates/2022-January/010031.html", }, { category: "external", summary: "Ubuntu Security Notice USN-5179-2 vom 2022-05-10", url: "https://ubuntu.com/security/notices/USN-5179-2", }, { category: "external", summary: "SUSE Security Update SUSE-SU-2022:3959-1 vom 2022-11-11", url: "https://lists.suse.com/pipermail/sle-security-updates/2022-November/012904.html", }, { category: "external", summary: "SUSE Security Update SUSE-SU-2022:4253-1 vom 2022-11-28", url: "https://lists.suse.com/pipermail/sle-security-updates/2022-November/013126.html", }, { category: "external", summary: "Ubuntu Security Notice USN-6335-1 vom 2023-09-04", url: "https://ubuntu.com/security/notices/USN-6335-1", }, { category: "external", summary: "Belden Security Advisory BSECV-2022-17 vom 2024-05-13", url: "https://assets.belden.com/m/118aa564206e89d4/original/Belden_Security_Bulletin_BSECV-2022-17_1v0.pdf", }, { category: "external", summary: "Debian Security Advisory DLA-4019 vom 2025-01-19", url: "https://lists.debian.org/debian-lts-announce/2025/01/msg00012.html", }, ], source_lang: "en-US", title: "BusyBox: Schwachstelle ermöglicht Denial of Service", tracking: { current_release_date: "2025-01-19T23:00:00.000+00:00", generator: { date: "2025-01-20T09:28:11.715+00:00", engine: { name: "BSI-WID", version: "1.3.10", }, }, id: "WID-SEC-W-2022-2029", initial_release_date: "2021-03-25T23:00:00.000+00:00", revision_history: [ { date: "2021-03-25T23:00:00.000+00:00", number: "1", summary: "Initiale Fassung", }, { date: "2021-03-28T22:00:00.000+00:00", number: "2", summary: "Neue Updates von Arch Linux aufgenommen", }, { date: "2021-04-05T22:00:00.000+00:00", number: "3", summary: "Neue Updates von Debian aufgenommen", }, { date: "2021-05-10T22:00:00.000+00:00", number: "4", summary: "Neue Updates von Amazon aufgenommen", }, { date: "2021-10-27T22:00:00.000+00:00", number: "5", summary: "Neue Updates von SUSE aufgenommen", }, { date: "2021-12-07T23:00:00.000+00:00", number: "6", summary: "Neue Updates von Ubuntu aufgenommen", }, { date: "2022-01-20T23:00:00.000+00:00", number: "7", summary: "Neue Updates von SUSE aufgenommen", }, { date: "2022-05-10T22:00:00.000+00:00", number: "8", summary: "Neue Updates von Ubuntu aufgenommen", }, { date: "2022-11-13T23:00:00.000+00:00", number: "9", summary: "Neue Updates von SUSE aufgenommen", }, { date: "2022-11-28T23:00:00.000+00:00", number: "10", summary: "Neue Updates von SUSE aufgenommen", }, { date: "2023-09-04T22:00:00.000+00:00", number: "11", summary: "Neue Updates von Ubuntu aufgenommen", }, { date: "2024-05-13T22:00:00.000+00:00", number: "12", summary: "Neue Updates von Belden aufgenommen", }, { date: "2025-01-19T23:00:00.000+00:00", number: "13", summary: "Neue Updates von Debian aufgenommen", }, ], status: "final", version: "13", }, }, product_tree: { branches: [ { branches: [ { category: "product_name", name: "Amazon Linux 2", product: { name: "Amazon Linux 2", product_id: "398363", product_identification_helper: { cpe: "cpe:/o:amazon:linux_2:-", }, }, }, ], category: "vendor", name: "Amazon", }, { branches: [ { category: "product_name", name: "Debian Linux", product: { name: "Debian Linux", product_id: "2951", product_identification_helper: { cpe: "cpe:/o:debian:debian_linux:-", }, }, }, ], category: "vendor", name: "Debian", }, { branches: [ { branches: [ { category: "product_version_range", name: "<9.13.1.0R2", product: { name: "Hirschmann BAT-C2 <9.13.1.0R2", product_id: "T034718", }, }, { category: "product_version", name: "9.13.1.0R2", product: { name: "Hirschmann BAT-C2 9.13.1.0R2", product_id: "T034718-fixed", product_identification_helper: { cpe: "cpe:/h:hirschmann:bat-c2:9.13.1.0r2", }, }, }, ], category: "product_name", name: "BAT-C2", }, { branches: [ { category: "product_version_range", name: "<6.3.7", product: { name: "Hirschmann owl <6.3.7", product_id: "T034719", }, }, { category: "product_version", name: "6.3.7", product: { name: "Hirschmann owl 6.3.7", product_id: "T034719-fixed", product_identification_helper: { cpe: "cpe:/h:hirschmann:owl:6.3.7", }, }, }, ], category: "product_name", name: "owl", }, ], category: "vendor", name: "Hirschmann", }, { branches: [ { category: "product_name", name: "Open Source Arch Linux", product: { name: "Open Source Arch Linux", product_id: "T013312", product_identification_helper: { cpe: "cpe:/o:archlinux:archlinux:-", }, }, }, { branches: [ { category: "product_version_range", name: "<=1.32.1", product: { name: "Open Source BusyBox <=1.32.1", product_id: "T018714", }, }, { category: "product_version_range", name: "<=1.32.1", product: { name: "Open Source BusyBox <=1.32.1", product_id: "T018714-fixed", }, }, ], category: "product_name", name: "BusyBox", }, ], category: "vendor", name: "Open Source", }, { branches: [ { category: "product_name", name: "SUSE Linux", product: { name: "SUSE Linux", product_id: "T002207", product_identification_helper: { cpe: "cpe:/o:suse:suse_linux:-", }, }, }, ], category: "vendor", name: "SUSE", }, { branches: [ { category: "product_name", name: "Ubuntu Linux", product: { name: "Ubuntu Linux", product_id: "T000126", product_identification_helper: { cpe: "cpe:/o:canonical:ubuntu_linux:-", }, }, }, ], category: "vendor", name: "Ubuntu", }, ], }, vulnerabilities: [ { cve: "CVE-2021-28831", notes: [ { category: "description", text: "Es existiert eine Schwachstelle in BusyBox. Diese besteht aufgrund einer unsachgemäßen Behandlung des Fehlerbits auf dem huft_build-Ergebniszeiger mit einem resultierenden ungültigen freien oder Segmentierungsfehler über fehlerhafte gzip-Daten. Ein entfernter anonymer Angreifer kann diese Schwachstelle ausnutzen, um einen Denial of Service zu verursachen.", }, ], product_status: { known_affected: [ "2951", "T002207", "T000126", "T013312", "T034719", "398363", "T034718", ], last_affected: [ "T018714", ], }, release_date: "2021-03-25T23:00:00.000+00:00", title: "CVE-2021-28831", }, ], }
wid-sec-w-2023-1432
Vulnerability from csaf_certbund
Published
2023-06-12 22:00
Modified
2023-06-22 22:00
Summary
Siemens SIMATIC S7: Mehrere Schwachstellen
Notes
Das BSI ist als Anbieter für die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch dafür verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgfältig im Einzelfall zu prüfen.
Produktbeschreibung
Die SIMATIC S7 ist eine Serie von SPS (Speicherprogrammierbare Steuerungen) für Automatisierungsanwendungen.
Angriff
Ein Angreifer aus dem angrenzenden Netzwerk oder ein entfernter, anonymer, authentisierter, physischer oder lokaler Angreifer kann mehrere Schwachstellen in Siemens SIMATIC S7 ausnutzen, um beliebigen Code auszuführen, Sicherheitsmaßnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand herbeizuführen, seine Privilegien zu erweitern und Daten zu manipulieren.
Betroffene Betriebssysteme
- BIOS/Firmware
{ document: { aggregate_severity: { text: "kritisch", }, category: "csaf_base", csaf_version: "2.0", distribution: { tlp: { label: "WHITE", url: "https://www.first.org/tlp/", }, }, lang: "de-DE", notes: [ { category: "legal_disclaimer", text: "Das BSI ist als Anbieter für die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch dafür verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgfältig im Einzelfall zu prüfen.", }, { category: "description", text: "Die SIMATIC S7 ist eine Serie von SPS (Speicherprogrammierbare Steuerungen) für Automatisierungsanwendungen.", title: "Produktbeschreibung", }, { category: "summary", text: "Ein Angreifer aus dem angrenzenden Netzwerk oder ein entfernter, anonymer, authentisierter, physischer oder lokaler Angreifer kann mehrere Schwachstellen in Siemens SIMATIC S7 ausnutzen, um beliebigen Code auszuführen, Sicherheitsmaßnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand herbeizuführen, seine Privilegien zu erweitern und Daten zu manipulieren.", title: "Angriff", }, { category: "general", text: "- BIOS/Firmware", title: "Betroffene Betriebssysteme", }, ], publisher: { category: "other", contact_details: "csaf-provider@cert-bund.de", name: "Bundesamt für Sicherheit in der Informationstechnik", namespace: "https://www.bsi.bund.de", }, references: [ { category: "self", summary: "WID-SEC-W-2023-1432 - CSAF Version", url: "https://wid.cert-bund.de/.well-known/csaf/white/2023/wid-sec-w-2023-1432.json", }, { category: "self", summary: "WID-SEC-2023-1432 - Portal Version", url: "https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2023-1432", }, { category: "external", summary: "Ubuntu Security Notice USN-6187-1 vom 2023-06-22", url: "https://ubuntu.com/security/notices/USN-6187-1", }, { category: "external", summary: "Siemens Security Advisory vom 2023-06-12", url: "https://cert-portal.siemens.com/productcert/html/ssa-831302.html", }, { category: "external", summary: "Siemens Security Advisory vom 2023-06-12", url: "https://cert-portal.siemens.com/productcert/html/ssa-794697.html", }, ], source_lang: "en-US", title: "Siemens SIMATIC S7: Mehrere Schwachstellen", tracking: { current_release_date: "2023-06-22T22:00:00.000+00:00", generator: { date: "2024-08-15T17:52:18.956+00:00", engine: { name: "BSI-WID", version: "1.3.5", }, }, id: "WID-SEC-W-2023-1432", initial_release_date: "2023-06-12T22:00:00.000+00:00", revision_history: [ { date: "2023-06-12T22:00:00.000+00:00", number: "1", summary: "Initiale Fassung", }, { date: "2023-06-22T22:00:00.000+00:00", number: "2", summary: "Neue Updates von Ubuntu aufgenommen", }, ], status: "final", version: "2", }, }, product_tree: { branches: [ { branches: [ { category: "product_name", name: "Siemens SIMATIC S7 1500 TM MFP", product: { name: "Siemens SIMATIC S7 1500 TM MFP", product_id: "T028071", product_identification_helper: { cpe: "cpe:/h:siemens:simatic_s7:1500_tm_mfp", }, }, }, ], category: "vendor", name: "Siemens", }, { branches: [ { category: "product_name", name: "Ubuntu Linux", product: { name: "Ubuntu Linux", product_id: "T000126", product_identification_helper: { cpe: "cpe:/o:canonical:ubuntu_linux:-", }, }, }, ], category: "vendor", name: "Ubuntu", }, ], }, vulnerabilities: [ { cve: "CVE-2023-26607", notes: [ { category: "description", text: "In Siemens SIMATIC S7 existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem aufgrund von unzulässigen Einschränkungen, Pufferüberläufen, fehlenden Freigaben und use-after-free-Problemen. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuführen, Sicherheitsmaßnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand herbeizuführen, seine Privilegien zu erweitern und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erhöhte Privilegien.", }, ], product_status: { known_affected: [ "T000126", "T028071", ], }, release_date: "2023-06-12T22:00:00.000+00:00", title: "CVE-2023-26607", }, { cve: "CVE-2023-23559", notes: [ { category: "description", text: "In Siemens SIMATIC S7 existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem aufgrund von unzulässigen Einschränkungen, Pufferüberläufen, fehlenden Freigaben und use-after-free-Problemen. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuführen, Sicherheitsmaßnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand herbeizuführen, seine Privilegien zu erweitern und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erhöhte Privilegien.", }, ], product_status: { known_affected: [ "T000126", "T028071", ], }, release_date: "2023-06-12T22:00:00.000+00:00", title: "CVE-2023-23559", }, { cve: "CVE-2023-23455", notes: [ { category: "description", text: "In Siemens SIMATIC S7 existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem aufgrund von unzulässigen Einschränkungen, Pufferüberläufen, fehlenden Freigaben und use-after-free-Problemen. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuführen, Sicherheitsmaßnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand herbeizuführen, seine Privilegien zu erweitern und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erhöhte Privilegien.", }, ], product_status: { known_affected: [ "T000126", "T028071", ], }, release_date: "2023-06-12T22:00:00.000+00:00", title: "CVE-2023-23455", }, { cve: "CVE-2023-23454", notes: [ { category: "description", text: "In Siemens SIMATIC S7 existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem aufgrund von unzulässigen Einschränkungen, Pufferüberläufen, fehlenden Freigaben und use-after-free-Problemen. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuführen, Sicherheitsmaßnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand herbeizuführen, seine Privilegien zu erweitern und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erhöhte Privilegien.", }, ], product_status: { known_affected: [ "T000126", "T028071", ], }, release_date: "2023-06-12T22:00:00.000+00:00", title: "CVE-2023-23454", }, { cve: "CVE-2023-1095", notes: [ { category: "description", text: "In Siemens SIMATIC S7 existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem aufgrund von unzulässigen Einschränkungen, Pufferüberläufen, fehlenden Freigaben und use-after-free-Problemen. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuführen, Sicherheitsmaßnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand herbeizuführen, seine Privilegien zu erweitern und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erhöhte Privilegien.", }, ], product_status: { known_affected: [ "T000126", "T028071", ], }, release_date: "2023-06-12T22:00:00.000+00:00", title: "CVE-2023-1095", }, { cve: "CVE-2023-1077", notes: [ { category: "description", text: "In Siemens SIMATIC S7 existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem aufgrund von unzulässigen Einschränkungen, Pufferüberläufen, fehlenden Freigaben und use-after-free-Problemen. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuführen, Sicherheitsmaßnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand herbeizuführen, seine Privilegien zu erweitern und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erhöhte Privilegien.", }, ], product_status: { known_affected: [ "T000126", "T028071", ], }, release_date: "2023-06-12T22:00:00.000+00:00", title: "CVE-2023-1077", }, { cve: "CVE-2023-1073", notes: [ { category: "description", text: "In Siemens SIMATIC S7 existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem aufgrund von unzulässigen Einschränkungen, Pufferüberläufen, fehlenden Freigaben und use-after-free-Problemen. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuführen, Sicherheitsmaßnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand herbeizuführen, seine Privilegien zu erweitern und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erhöhte Privilegien.", }, ], product_status: { known_affected: [ "T000126", "T028071", ], }, release_date: "2023-06-12T22:00:00.000+00:00", title: "CVE-2023-1073", }, { cve: "CVE-2023-0590", notes: [ { category: "description", text: "In Siemens SIMATIC S7 existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem aufgrund von unzulässigen Einschränkungen, Pufferüberläufen, fehlenden Freigaben und use-after-free-Problemen. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuführen, Sicherheitsmaßnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand herbeizuführen, seine Privilegien zu erweitern und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erhöhte Privilegien.", }, ], product_status: { known_affected: [ "T000126", "T028071", ], }, release_date: "2023-06-12T22:00:00.000+00:00", title: "CVE-2023-0590", }, { cve: "CVE-2023-0466", notes: [ { category: "description", text: "In Siemens SIMATIC S7 existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem aufgrund von unzulässigen Einschränkungen, Pufferüberläufen, fehlenden Freigaben und use-after-free-Problemen. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuführen, Sicherheitsmaßnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand herbeizuführen, seine Privilegien zu erweitern und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erhöhte Privilegien.", }, ], product_status: { known_affected: [ "T000126", "T028071", ], }, release_date: "2023-06-12T22:00:00.000+00:00", title: "CVE-2023-0466", }, { cve: "CVE-2023-0465", notes: [ { category: "description", text: "In Siemens SIMATIC S7 existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem aufgrund von unzulässigen Einschränkungen, Pufferüberläufen, fehlenden Freigaben und use-after-free-Problemen. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuführen, Sicherheitsmaßnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand herbeizuführen, seine Privilegien zu erweitern und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erhöhte Privilegien.", }, ], product_status: { known_affected: [ "T000126", "T028071", ], }, release_date: "2023-06-12T22:00:00.000+00:00", title: "CVE-2023-0465", }, { cve: "CVE-2023-0464", notes: [ { category: "description", text: "In Siemens SIMATIC S7 existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem aufgrund von unzulässigen Einschränkungen, Pufferüberläufen, fehlenden Freigaben und use-after-free-Problemen. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuführen, Sicherheitsmaßnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand herbeizuführen, seine Privilegien zu erweitern und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erhöhte Privilegien.", }, ], product_status: { known_affected: [ "T000126", "T028071", ], }, release_date: "2023-06-12T22:00:00.000+00:00", title: "CVE-2023-0464", }, { cve: "CVE-2023-0394", notes: [ { category: "description", text: "In Siemens SIMATIC S7 existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem aufgrund von unzulässigen Einschränkungen, Pufferüberläufen, fehlenden Freigaben und use-after-free-Problemen. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuführen, Sicherheitsmaßnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand herbeizuführen, seine Privilegien zu erweitern und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erhöhte Privilegien.", }, ], product_status: { known_affected: [ "T000126", "T028071", ], }, release_date: "2023-06-12T22:00:00.000+00:00", title: "CVE-2023-0394", }, { cve: "CVE-2023-0286", notes: [ { category: "description", text: "In Siemens SIMATIC S7 existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem aufgrund von unzulässigen Einschränkungen, Pufferüberläufen, fehlenden Freigaben und use-after-free-Problemen. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuführen, Sicherheitsmaßnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand herbeizuführen, seine Privilegien zu erweitern und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erhöhte Privilegien.", }, ], product_status: { known_affected: [ "T000126", "T028071", ], }, release_date: "2023-06-12T22:00:00.000+00:00", title: "CVE-2023-0286", }, { cve: "CVE-2023-0215", notes: [ { category: "description", text: "In Siemens SIMATIC S7 existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem aufgrund von unzulässigen Einschränkungen, Pufferüberläufen, fehlenden Freigaben und use-after-free-Problemen. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuführen, Sicherheitsmaßnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand herbeizuführen, seine Privilegien zu erweitern und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erhöhte Privilegien.", }, ], product_status: { known_affected: [ "T000126", "T028071", ], }, release_date: "2023-06-12T22:00:00.000+00:00", title: "CVE-2023-0215", }, { cve: "CVE-2023-0179", notes: [ { category: "description", text: "In Siemens SIMATIC S7 existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem aufgrund von unzulässigen Einschränkungen, Pufferüberläufen, fehlenden Freigaben und use-after-free-Problemen. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuführen, Sicherheitsmaßnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand herbeizuführen, seine Privilegien zu erweitern und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erhöhte Privilegien.", }, ], product_status: { known_affected: [ "T000126", "T028071", ], }, release_date: "2023-06-12T22:00:00.000+00:00", title: "CVE-2023-0179", }, { cve: "CVE-2022-47946", notes: [ { category: "description", text: "In Siemens SIMATIC S7 existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem aufgrund von unzulässigen Einschränkungen, Pufferüberläufen, fehlenden Freigaben und use-after-free-Problemen. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuführen, Sicherheitsmaßnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand herbeizuführen, seine Privilegien zu erweitern und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erhöhte Privilegien.", }, ], product_status: { known_affected: [ "T000126", "T028071", ], }, release_date: "2023-06-12T22:00:00.000+00:00", title: "CVE-2022-47946", }, { cve: "CVE-2022-47929", notes: [ { category: "description", text: "In Siemens SIMATIC S7 existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem aufgrund von unzulässigen Einschränkungen, Pufferüberläufen, fehlenden Freigaben und use-after-free-Problemen. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuführen, Sicherheitsmaßnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand herbeizuführen, seine Privilegien zu erweitern und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erhöhte Privilegien.", }, ], product_status: { known_affected: [ "T000126", "T028071", ], }, release_date: "2023-06-12T22:00:00.000+00:00", title: "CVE-2022-47929", }, { cve: "CVE-2022-47520", notes: [ { category: "description", text: "In Siemens SIMATIC S7 existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem aufgrund von unzulässigen Einschränkungen, Pufferüberläufen, fehlenden Freigaben und use-after-free-Problemen. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuführen, Sicherheitsmaßnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand herbeizuführen, seine Privilegien zu erweitern und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erhöhte Privilegien.", }, ], product_status: { known_affected: [ "T000126", "T028071", ], }, release_date: "2023-06-12T22:00:00.000+00:00", title: "CVE-2022-47520", }, { cve: "CVE-2022-47518", notes: [ { category: "description", text: "In Siemens SIMATIC S7 existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem aufgrund von unzulässigen Einschränkungen, Pufferüberläufen, fehlenden Freigaben und use-after-free-Problemen. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuführen, Sicherheitsmaßnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand herbeizuführen, seine Privilegien zu erweitern und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erhöhte Privilegien.", }, ], product_status: { known_affected: [ "T000126", "T028071", ], }, release_date: "2023-06-12T22:00:00.000+00:00", title: "CVE-2022-47518", }, { cve: "CVE-2022-4662", notes: [ { category: "description", text: "In Siemens SIMATIC S7 existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem aufgrund von unzulässigen Einschränkungen, Pufferüberläufen, fehlenden Freigaben und use-after-free-Problemen. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuführen, Sicherheitsmaßnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand herbeizuführen, seine Privilegien zu erweitern und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erhöhte Privilegien.", }, ], product_status: { known_affected: [ "T000126", "T028071", ], }, release_date: "2023-06-12T22:00:00.000+00:00", title: "CVE-2022-4662", }, { cve: "CVE-2022-4450", notes: [ { category: "description", text: "In Siemens SIMATIC S7 existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem aufgrund von unzulässigen Einschränkungen, Pufferüberläufen, fehlenden Freigaben und use-after-free-Problemen. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuführen, Sicherheitsmaßnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand herbeizuführen, seine Privilegien zu erweitern und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erhöhte Privilegien.", }, ], product_status: { known_affected: [ "T000126", "T028071", ], }, release_date: "2023-06-12T22:00:00.000+00:00", title: "CVE-2022-4450", }, { cve: "CVE-2022-4378", notes: [ { category: "description", text: "In Siemens SIMATIC S7 existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem aufgrund von unzulässigen Einschränkungen, Pufferüberläufen, fehlenden Freigaben und use-after-free-Problemen. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuführen, Sicherheitsmaßnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand herbeizuführen, seine Privilegien zu erweitern und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erhöhte Privilegien.", }, ], product_status: { known_affected: [ "T000126", "T028071", ], }, release_date: "2023-06-12T22:00:00.000+00:00", title: "CVE-2022-4378", }, { cve: "CVE-2022-43750", notes: [ { category: "description", text: "In Siemens SIMATIC S7 existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem aufgrund von unzulässigen Einschränkungen, Pufferüberläufen, fehlenden Freigaben und use-after-free-Problemen. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuführen, Sicherheitsmaßnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand herbeizuführen, seine Privilegien zu erweitern und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erhöhte Privilegien.", }, ], product_status: { known_affected: [ "T000126", "T028071", ], }, release_date: "2023-06-12T22:00:00.000+00:00", title: "CVE-2022-43750", }, { cve: "CVE-2022-4304", notes: [ { category: "description", text: "In Siemens SIMATIC S7 existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem aufgrund von unzulässigen Einschränkungen, Pufferüberläufen, fehlenden Freigaben und use-after-free-Problemen. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuführen, Sicherheitsmaßnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand herbeizuführen, seine Privilegien zu erweitern und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erhöhte Privilegien.", }, ], product_status: { known_affected: [ "T000126", "T028071", ], }, release_date: "2023-06-12T22:00:00.000+00:00", title: "CVE-2022-4304", }, { cve: "CVE-2022-42896", notes: [ { category: "description", text: "In Siemens SIMATIC S7 existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem aufgrund von unzulässigen Einschränkungen, Pufferüberläufen, fehlenden Freigaben und use-after-free-Problemen. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuführen, Sicherheitsmaßnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand herbeizuführen, seine Privilegien zu erweitern und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erhöhte Privilegien.", }, ], product_status: { known_affected: [ "T000126", "T028071", ], }, release_date: "2023-06-12T22:00:00.000+00:00", title: "CVE-2022-42896", }, { cve: "CVE-2022-42895", notes: [ { category: "description", text: "In Siemens SIMATIC S7 existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem aufgrund von unzulässigen Einschränkungen, Pufferüberläufen, fehlenden Freigaben und use-after-free-Problemen. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuführen, Sicherheitsmaßnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand herbeizuführen, seine Privilegien zu erweitern und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erhöhte Privilegien.", }, ], product_status: { known_affected: [ "T000126", "T028071", ], }, release_date: "2023-06-12T22:00:00.000+00:00", title: "CVE-2022-42895", }, { cve: "CVE-2022-42722", notes: [ { category: "description", text: "In Siemens SIMATIC S7 existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem aufgrund von unzulässigen Einschränkungen, Pufferüberläufen, fehlenden Freigaben und use-after-free-Problemen. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuführen, Sicherheitsmaßnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand herbeizuführen, seine Privilegien zu erweitern und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erhöhte Privilegien.", }, ], product_status: { known_affected: [ "T000126", "T028071", ], }, release_date: "2023-06-12T22:00:00.000+00:00", title: "CVE-2022-42722", }, { cve: "CVE-2022-42721", notes: [ { category: "description", text: "In Siemens SIMATIC S7 existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem aufgrund von unzulässigen Einschränkungen, Pufferüberläufen, fehlenden Freigaben und use-after-free-Problemen. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuführen, Sicherheitsmaßnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand herbeizuführen, seine Privilegien zu erweitern und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erhöhte Privilegien.", }, ], product_status: { known_affected: [ "T000126", "T028071", ], }, release_date: "2023-06-12T22:00:00.000+00:00", title: "CVE-2022-42721", }, { cve: "CVE-2022-42720", notes: [ { category: "description", text: "In Siemens SIMATIC S7 existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem aufgrund von unzulässigen Einschränkungen, Pufferüberläufen, fehlenden Freigaben und use-after-free-Problemen. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuführen, Sicherheitsmaßnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand herbeizuführen, seine Privilegien zu erweitern und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erhöhte Privilegien.", }, ], product_status: { known_affected: [ "T000126", "T028071", ], }, release_date: "2023-06-12T22:00:00.000+00:00", title: "CVE-2022-42720", }, { cve: "CVE-2022-42719", notes: [ { category: "description", text: "In Siemens SIMATIC S7 existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem aufgrund von unzulässigen Einschränkungen, Pufferüberläufen, fehlenden Freigaben und use-after-free-Problemen. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuführen, Sicherheitsmaßnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand herbeizuführen, seine Privilegien zu erweitern und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erhöhte Privilegien.", }, ], product_status: { known_affected: [ "T000126", "T028071", ], }, release_date: "2023-06-12T22:00:00.000+00:00", title: "CVE-2022-42719", }, { cve: "CVE-2022-42703", notes: [ { category: "description", text: "In Siemens SIMATIC S7 existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem aufgrund von unzulässigen Einschränkungen, Pufferüberläufen, fehlenden Freigaben und use-after-free-Problemen. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuführen, Sicherheitsmaßnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand herbeizuführen, seine Privilegien zu erweitern und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erhöhte Privilegien.", }, ], product_status: { known_affected: [ "T000126", "T028071", ], }, release_date: "2023-06-12T22:00:00.000+00:00", title: "CVE-2022-42703", }, { cve: "CVE-2022-42432", notes: [ { category: "description", text: "In Siemens SIMATIC S7 existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem aufgrund von unzulässigen Einschränkungen, Pufferüberläufen, fehlenden Freigaben und use-after-free-Problemen. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuführen, Sicherheitsmaßnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand herbeizuführen, seine Privilegien zu erweitern und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erhöhte Privilegien.", }, ], product_status: { known_affected: [ "T000126", "T028071", ], }, release_date: "2023-06-12T22:00:00.000+00:00", title: "CVE-2022-42432", }, { cve: "CVE-2022-42329", notes: [ { category: "description", text: "In Siemens SIMATIC S7 existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem aufgrund von unzulässigen Einschränkungen, Pufferüberläufen, fehlenden Freigaben und use-after-free-Problemen. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuführen, Sicherheitsmaßnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand herbeizuführen, seine Privilegien zu erweitern und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erhöhte Privilegien.", }, ], product_status: { known_affected: [ "T000126", "T028071", ], }, release_date: "2023-06-12T22:00:00.000+00:00", title: "CVE-2022-42329", }, { cve: "CVE-2022-42328", notes: [ { category: "description", text: "In Siemens SIMATIC S7 existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem aufgrund von unzulässigen Einschränkungen, Pufferüberläufen, fehlenden Freigaben und use-after-free-Problemen. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuführen, Sicherheitsmaßnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand herbeizuführen, seine Privilegien zu erweitern und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erhöhte Privilegien.", }, ], product_status: { known_affected: [ "T000126", "T028071", ], }, release_date: "2023-06-12T22:00:00.000+00:00", title: "CVE-2022-42328", }, { cve: "CVE-2022-41850", notes: [ { category: "description", text: "In Siemens SIMATIC S7 existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem aufgrund von unzulässigen Einschränkungen, Pufferüberläufen, fehlenden Freigaben und use-after-free-Problemen. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuführen, Sicherheitsmaßnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand herbeizuführen, seine Privilegien zu erweitern und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erhöhte Privilegien.", }, ], product_status: { known_affected: [ "T000126", "T028071", ], }, release_date: "2023-06-12T22:00:00.000+00:00", title: "CVE-2022-41850", }, { cve: "CVE-2022-41849", notes: [ { category: "description", text: "In Siemens SIMATIC S7 existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem aufgrund von unzulässigen Einschränkungen, Pufferüberläufen, fehlenden Freigaben und use-after-free-Problemen. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuführen, Sicherheitsmaßnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand herbeizuführen, seine Privilegien zu erweitern und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erhöhte Privilegien.", }, ], product_status: { known_affected: [ "T000126", "T028071", ], }, release_date: "2023-06-12T22:00:00.000+00:00", title: "CVE-2022-41849", }, { cve: "CVE-2022-41674", notes: [ { category: "description", text: "In Siemens SIMATIC S7 existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem aufgrund von unzulässigen Einschränkungen, Pufferüberläufen, fehlenden Freigaben und use-after-free-Problemen. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuführen, Sicherheitsmaßnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand herbeizuführen, seine Privilegien zu erweitern und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erhöhte Privilegien.", }, ], product_status: { known_affected: [ "T000126", "T028071", ], }, release_date: "2023-06-12T22:00:00.000+00:00", title: "CVE-2022-41674", }, { cve: "CVE-2022-4139", notes: [ { category: "description", text: "In Siemens SIMATIC S7 existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem aufgrund von unzulässigen Einschränkungen, Pufferüberläufen, fehlenden Freigaben und use-after-free-Problemen. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuführen, Sicherheitsmaßnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand herbeizuführen, seine Privilegien zu erweitern und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erhöhte Privilegien.", }, ], product_status: { known_affected: [ "T000126", "T028071", ], }, release_date: "2023-06-12T22:00:00.000+00:00", title: "CVE-2022-4139", }, { cve: "CVE-2022-4129", notes: [ { category: "description", text: "In Siemens SIMATIC S7 existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem aufgrund von unzulässigen Einschränkungen, Pufferüberläufen, fehlenden Freigaben und use-after-free-Problemen. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuführen, Sicherheitsmaßnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand herbeizuführen, seine Privilegien zu erweitern und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erhöhte Privilegien.", }, ], product_status: { known_affected: [ "T000126", "T028071", ], }, release_date: "2023-06-12T22:00:00.000+00:00", title: "CVE-2022-4129", }, { cve: "CVE-2022-41222", notes: [ { category: "description", text: "In Siemens SIMATIC S7 existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem aufgrund von unzulässigen Einschränkungen, Pufferüberläufen, fehlenden Freigaben und use-after-free-Problemen. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuführen, Sicherheitsmaßnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand herbeizuführen, seine Privilegien zu erweitern und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erhöhte Privilegien.", }, ], product_status: { known_affected: [ "T000126", "T028071", ], }, release_date: "2023-06-12T22:00:00.000+00:00", title: "CVE-2022-41222", }, { cve: "CVE-2022-41218", notes: [ { category: "description", text: "In Siemens SIMATIC S7 existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem aufgrund von unzulässigen Einschränkungen, Pufferüberläufen, fehlenden Freigaben und use-after-free-Problemen. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuführen, Sicherheitsmaßnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand herbeizuführen, seine Privilegien zu erweitern und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erhöhte Privilegien.", }, ], product_status: { known_affected: [ "T000126", "T028071", ], }, release_date: "2023-06-12T22:00:00.000+00:00", title: "CVE-2022-41218", }, { cve: "CVE-2022-4095", notes: [ { category: "description", text: "In Siemens SIMATIC S7 existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem aufgrund von unzulässigen Einschränkungen, Pufferüberläufen, fehlenden Freigaben und use-after-free-Problemen. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuführen, Sicherheitsmaßnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand herbeizuführen, seine Privilegien zu erweitern und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erhöhte Privilegien.", }, ], product_status: { known_affected: [ "T000126", "T028071", ], }, release_date: "2023-06-12T22:00:00.000+00:00", title: "CVE-2022-4095", }, { cve: "CVE-2022-40768", notes: [ { category: "description", text: "In Siemens SIMATIC S7 existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem aufgrund von unzulässigen Einschränkungen, Pufferüberläufen, fehlenden Freigaben und use-after-free-Problemen. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuführen, Sicherheitsmaßnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand herbeizuführen, seine Privilegien zu erweitern und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erhöhte Privilegien.", }, ], product_status: { known_affected: [ "T000126", "T028071", ], }, release_date: "2023-06-12T22:00:00.000+00:00", title: "CVE-2022-40768", }, { cve: "CVE-2022-40307", notes: [ { category: "description", text: "In Siemens SIMATIC S7 existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem aufgrund von unzulässigen Einschränkungen, Pufferüberläufen, fehlenden Freigaben und use-after-free-Problemen. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuführen, Sicherheitsmaßnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand herbeizuführen, seine Privilegien zu erweitern und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erhöhte Privilegien.", }, ], product_status: { known_affected: [ "T000126", "T028071", ], }, release_date: "2023-06-12T22:00:00.000+00:00", title: "CVE-2022-40307", }, { cve: "CVE-2022-39190", notes: [ { category: "description", text: "In Siemens SIMATIC S7 existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem aufgrund von unzulässigen Einschränkungen, Pufferüberläufen, fehlenden Freigaben und use-after-free-Problemen. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuführen, Sicherheitsmaßnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand herbeizuführen, seine Privilegien zu erweitern und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erhöhte Privilegien.", }, ], product_status: { known_affected: [ "T000126", "T028071", ], }, release_date: "2023-06-12T22:00:00.000+00:00", title: "CVE-2022-39190", }, { cve: "CVE-2022-39188", notes: [ { category: "description", text: "In Siemens SIMATIC S7 existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem aufgrund von unzulässigen Einschränkungen, Pufferüberläufen, fehlenden Freigaben und use-after-free-Problemen. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuführen, Sicherheitsmaßnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand herbeizuführen, seine Privilegien zu erweitern und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erhöhte Privilegien.", }, ], product_status: { known_affected: [ "T000126", "T028071", ], }, release_date: "2023-06-12T22:00:00.000+00:00", title: "CVE-2022-39188", }, { cve: "CVE-2022-36946", notes: [ { category: "description", text: "In Siemens SIMATIC S7 existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem aufgrund von unzulässigen Einschränkungen, Pufferüberläufen, fehlenden Freigaben und use-after-free-Problemen. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuführen, Sicherheitsmaßnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand herbeizuführen, seine Privilegien zu erweitern und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erhöhte Privilegien.", }, ], product_status: { known_affected: [ "T000126", "T028071", ], }, release_date: "2023-06-12T22:00:00.000+00:00", title: "CVE-2022-36946", }, { cve: "CVE-2022-36879", notes: [ { category: "description", text: "In Siemens SIMATIC S7 existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem aufgrund von unzulässigen Einschränkungen, Pufferüberläufen, fehlenden Freigaben und use-after-free-Problemen. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuführen, Sicherheitsmaßnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand herbeizuführen, seine Privilegien zu erweitern und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erhöhte Privilegien.", }, ], product_status: { known_affected: [ "T000126", "T028071", ], }, release_date: "2023-06-12T22:00:00.000+00:00", title: "CVE-2022-36879", }, { cve: "CVE-2022-3649", notes: [ { category: "description", text: "In Siemens SIMATIC S7 existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem aufgrund von unzulässigen Einschränkungen, Pufferüberläufen, fehlenden Freigaben und use-after-free-Problemen. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuführen, Sicherheitsmaßnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand herbeizuführen, seine Privilegien zu erweitern und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erhöhte Privilegien.", }, ], product_status: { known_affected: [ "T000126", "T028071", ], }, release_date: "2023-06-12T22:00:00.000+00:00", title: "CVE-2022-3649", }, { cve: "CVE-2022-3646", notes: [ { category: "description", text: "In Siemens SIMATIC S7 existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem aufgrund von unzulässigen Einschränkungen, Pufferüberläufen, fehlenden Freigaben und use-after-free-Problemen. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuführen, Sicherheitsmaßnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand herbeizuführen, seine Privilegien zu erweitern und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erhöhte Privilegien.", }, ], product_status: { known_affected: [ "T000126", "T028071", ], }, release_date: "2023-06-12T22:00:00.000+00:00", title: "CVE-2022-3646", }, { cve: "CVE-2022-3635", notes: [ { category: "description", text: "In Siemens SIMATIC S7 existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem aufgrund von unzulässigen Einschränkungen, Pufferüberläufen, fehlenden Freigaben und use-after-free-Problemen. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuführen, Sicherheitsmaßnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand herbeizuführen, seine Privilegien zu erweitern und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erhöhte Privilegien.", }, ], product_status: { known_affected: [ "T000126", "T028071", ], }, release_date: "2023-06-12T22:00:00.000+00:00", title: "CVE-2022-3635", }, { cve: "CVE-2022-3633", notes: [ { category: "description", text: "In Siemens SIMATIC S7 existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem aufgrund von unzulässigen Einschränkungen, Pufferüberläufen, fehlenden Freigaben und use-after-free-Problemen. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuführen, Sicherheitsmaßnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand herbeizuführen, seine Privilegien zu erweitern und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erhöhte Privilegien.", }, ], product_status: { known_affected: [ "T000126", "T028071", ], }, release_date: "2023-06-12T22:00:00.000+00:00", title: "CVE-2022-3633", }, { cve: "CVE-2022-3629", notes: [ { category: "description", text: "In Siemens SIMATIC S7 existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem aufgrund von unzulässigen Einschränkungen, Pufferüberläufen, fehlenden Freigaben und use-after-free-Problemen. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuführen, Sicherheitsmaßnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand herbeizuführen, seine Privilegien zu erweitern und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erhöhte Privilegien.", }, ], product_status: { known_affected: [ "T000126", "T028071", ], }, release_date: "2023-06-12T22:00:00.000+00:00", title: "CVE-2022-3629", }, { cve: "CVE-2022-36280", notes: [ { category: "description", text: "In Siemens SIMATIC S7 existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem aufgrund von unzulässigen Einschränkungen, Pufferüberläufen, fehlenden Freigaben und use-after-free-Problemen. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuführen, Sicherheitsmaßnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand herbeizuführen, seine Privilegien zu erweitern und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erhöhte Privilegien.", }, ], product_status: { known_affected: [ "T000126", "T028071", ], }, release_date: "2023-06-12T22:00:00.000+00:00", title: "CVE-2022-36280", }, { cve: "CVE-2022-3628", notes: [ { category: "description", text: "In Siemens SIMATIC S7 existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem aufgrund von unzulässigen Einschränkungen, Pufferüberläufen, fehlenden Freigaben und use-after-free-Problemen. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuführen, Sicherheitsmaßnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand herbeizuführen, seine Privilegien zu erweitern und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erhöhte Privilegien.", }, ], product_status: { known_affected: [ "T000126", "T028071", ], }, release_date: "2023-06-12T22:00:00.000+00:00", title: "CVE-2022-3628", }, { cve: "CVE-2022-3625", notes: [ { category: "description", text: "In Siemens SIMATIC S7 existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem aufgrund von unzulässigen Einschränkungen, Pufferüberläufen, fehlenden Freigaben und use-after-free-Problemen. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuführen, Sicherheitsmaßnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand herbeizuführen, seine Privilegien zu erweitern und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erhöhte Privilegien.", }, ], product_status: { known_affected: [ "T000126", "T028071", ], }, release_date: "2023-06-12T22:00:00.000+00:00", title: "CVE-2022-3625", }, { cve: "CVE-2022-3621", notes: [ { category: "description", text: "In Siemens SIMATIC S7 existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem aufgrund von unzulässigen Einschränkungen, Pufferüberläufen, fehlenden Freigaben und use-after-free-Problemen. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuführen, Sicherheitsmaßnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand herbeizuführen, seine Privilegien zu erweitern und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erhöhte Privilegien.", }, ], product_status: { known_affected: [ "T000126", "T028071", ], }, release_date: "2023-06-12T22:00:00.000+00:00", title: "CVE-2022-3621", }, { cve: "CVE-2022-36123", notes: [ { category: "description", text: "In Siemens SIMATIC S7 existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem aufgrund von unzulässigen Einschränkungen, Pufferüberläufen, fehlenden Freigaben und use-after-free-Problemen. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuführen, Sicherheitsmaßnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand herbeizuführen, seine Privilegien zu erweitern und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erhöhte Privilegien.", }, ], product_status: { known_affected: [ "T000126", "T028071", ], }, release_date: "2023-06-12T22:00:00.000+00:00", title: "CVE-2022-36123", }, { cve: "CVE-2022-3606", notes: [ { category: "description", text: "In Siemens SIMATIC S7 existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem aufgrund von unzulässigen Einschränkungen, Pufferüberläufen, fehlenden Freigaben und use-after-free-Problemen. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuführen, Sicherheitsmaßnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand herbeizuführen, seine Privilegien zu erweitern und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erhöhte Privilegien.", }, ], product_status: { known_affected: [ "T000126", "T028071", ], }, release_date: "2023-06-12T22:00:00.000+00:00", title: "CVE-2022-3606", }, { cve: "CVE-2022-3594", notes: [ { category: "description", text: "In Siemens SIMATIC S7 existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem aufgrund von unzulässigen Einschränkungen, Pufferüberläufen, fehlenden Freigaben und use-after-free-Problemen. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuführen, Sicherheitsmaßnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand herbeizuführen, seine Privilegien zu erweitern und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erhöhte Privilegien.", }, ], product_status: { known_affected: [ "T000126", "T028071", ], }, release_date: "2023-06-12T22:00:00.000+00:00", title: "CVE-2022-3594", }, { cve: "CVE-2022-3586", notes: [ { category: "description", text: "In Siemens SIMATIC S7 existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem aufgrund von unzulässigen Einschränkungen, Pufferüberläufen, fehlenden Freigaben und use-after-free-Problemen. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuführen, Sicherheitsmaßnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand herbeizuführen, seine Privilegien zu erweitern und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erhöhte Privilegien.", }, ], product_status: { known_affected: [ "T000126", "T028071", ], }, release_date: "2023-06-12T22:00:00.000+00:00", title: "CVE-2022-3586", }, { cve: "CVE-2022-3565", notes: [ { category: "description", text: "In Siemens SIMATIC S7 existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem aufgrund von unzulässigen Einschränkungen, Pufferüberläufen, fehlenden Freigaben und use-after-free-Problemen. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuführen, Sicherheitsmaßnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand herbeizuführen, seine Privilegien zu erweitern und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erhöhte Privilegien.", }, ], product_status: { known_affected: [ "T000126", "T028071", ], }, release_date: "2023-06-12T22:00:00.000+00:00", title: "CVE-2022-3565", }, { cve: "CVE-2022-3564", notes: [ { category: "description", text: "In Siemens SIMATIC S7 existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem aufgrund von unzulässigen Einschränkungen, Pufferüberläufen, fehlenden Freigaben und use-after-free-Problemen. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuführen, Sicherheitsmaßnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand herbeizuführen, seine Privilegien zu erweitern und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erhöhte Privilegien.", }, ], product_status: { known_affected: [ "T000126", "T028071", ], }, release_date: "2023-06-12T22:00:00.000+00:00", title: "CVE-2022-3564", }, { cve: "CVE-2022-3545", notes: [ { category: "description", text: "In Siemens SIMATIC S7 existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem aufgrund von unzulässigen Einschränkungen, Pufferüberläufen, fehlenden Freigaben und use-after-free-Problemen. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuführen, Sicherheitsmaßnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand herbeizuführen, seine Privilegien zu erweitern und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erhöhte Privilegien.", }, ], product_status: { known_affected: [ "T000126", "T028071", ], }, release_date: "2023-06-12T22:00:00.000+00:00", title: "CVE-2022-3545", }, { cve: "CVE-2022-3534", notes: [ { category: "description", text: "In Siemens SIMATIC S7 existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem aufgrund von unzulässigen Einschränkungen, Pufferüberläufen, fehlenden Freigaben und use-after-free-Problemen. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuführen, Sicherheitsmaßnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand herbeizuführen, seine Privilegien zu erweitern und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erhöhte Privilegien.", }, ], product_status: { known_affected: [ "T000126", "T028071", ], }, release_date: "2023-06-12T22:00:00.000+00:00", title: "CVE-2022-3534", }, { cve: "CVE-2022-3524", notes: [ { category: "description", text: "In Siemens SIMATIC S7 existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem aufgrund von unzulässigen Einschränkungen, Pufferüberläufen, fehlenden Freigaben und use-after-free-Problemen. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuführen, Sicherheitsmaßnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand herbeizuführen, seine Privilegien zu erweitern und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erhöhte Privilegien.", }, ], product_status: { known_affected: [ "T000126", "T028071", ], }, release_date: "2023-06-12T22:00:00.000+00:00", title: "CVE-2022-3524", }, { cve: "CVE-2022-3521", notes: [ { category: "description", text: "In Siemens SIMATIC S7 existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem aufgrund von unzulässigen Einschränkungen, Pufferüberläufen, fehlenden Freigaben und use-after-free-Problemen. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuführen, Sicherheitsmaßnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand herbeizuführen, seine Privilegien zu erweitern und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erhöhte Privilegien.", }, ], product_status: { known_affected: [ "T000126", "T028071", ], }, release_date: "2023-06-12T22:00:00.000+00:00", title: "CVE-2022-3521", }, { cve: "CVE-2022-34918", notes: [ { category: "description", text: "In Siemens SIMATIC S7 existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem aufgrund von unzulässigen Einschränkungen, Pufferüberläufen, fehlenden Freigaben und use-after-free-Problemen. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuführen, Sicherheitsmaßnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand herbeizuführen, seine Privilegien zu erweitern und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erhöhte Privilegien.", }, ], product_status: { known_affected: [ "T000126", "T028071", ], }, release_date: "2023-06-12T22:00:00.000+00:00", title: "CVE-2022-34918", }, { cve: "CVE-2022-3435", notes: [ { category: "description", text: "In Siemens SIMATIC S7 existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem aufgrund von unzulässigen Einschränkungen, Pufferüberläufen, fehlenden Freigaben und use-after-free-Problemen. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuführen, Sicherheitsmaßnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand herbeizuführen, seine Privilegien zu erweitern und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erhöhte Privilegien.", }, ], product_status: { known_affected: [ "T000126", "T028071", ], }, release_date: "2023-06-12T22:00:00.000+00:00", title: "CVE-2022-3435", }, { cve: "CVE-2022-3303", notes: [ { category: "description", text: "In Siemens SIMATIC S7 existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem aufgrund von unzulässigen Einschränkungen, Pufferüberläufen, fehlenden Freigaben und use-after-free-Problemen. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuführen, Sicherheitsmaßnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand herbeizuführen, seine Privilegien zu erweitern und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erhöhte Privilegien.", }, ], product_status: { known_affected: [ "T000126", "T028071", ], }, release_date: "2023-06-12T22:00:00.000+00:00", title: "CVE-2022-3303", }, { cve: "CVE-2022-32296", notes: [ { category: "description", text: "In Siemens SIMATIC S7 existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem aufgrund von unzulässigen Einschränkungen, Pufferüberläufen, fehlenden Freigaben und use-after-free-Problemen. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuführen, Sicherheitsmaßnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand herbeizuführen, seine Privilegien zu erweitern und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erhöhte Privilegien.", }, ], product_status: { known_affected: [ "T000126", "T028071", ], }, release_date: "2023-06-12T22:00:00.000+00:00", title: "CVE-2022-32296", }, { cve: "CVE-2022-32250", notes: [ { category: "description", text: "In Siemens SIMATIC S7 existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem aufgrund von unzulässigen Einschränkungen, Pufferüberläufen, fehlenden Freigaben und use-after-free-Problemen. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuführen, Sicherheitsmaßnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand herbeizuführen, seine Privilegien zu erweitern und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erhöhte Privilegien.", }, ], product_status: { known_affected: [ "T000126", "T028071", ], }, release_date: "2023-06-12T22:00:00.000+00:00", title: "CVE-2022-32250", }, { cve: "CVE-2022-3169", notes: [ { category: "description", text: "In Siemens SIMATIC S7 existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem aufgrund von unzulässigen Einschränkungen, Pufferüberläufen, fehlenden Freigaben und use-after-free-Problemen. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuführen, Sicherheitsmaßnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand herbeizuführen, seine Privilegien zu erweitern und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erhöhte Privilegien.", }, ], product_status: { known_affected: [ "T000126", "T028071", ], }, release_date: "2023-06-12T22:00:00.000+00:00", title: "CVE-2022-3169", }, { cve: "CVE-2022-3115", notes: [ { category: "description", text: "In Siemens SIMATIC S7 existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem aufgrund von unzulässigen Einschränkungen, Pufferüberläufen, fehlenden Freigaben und use-after-free-Problemen. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuführen, Sicherheitsmaßnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand herbeizuführen, seine Privilegien zu erweitern und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erhöhte Privilegien.", }, ], product_status: { known_affected: [ "T000126", "T028071", ], }, release_date: "2023-06-12T22:00:00.000+00:00", title: "CVE-2022-3115", }, { cve: "CVE-2022-3104", notes: [ { category: "description", text: "In Siemens SIMATIC S7 existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem aufgrund von unzulässigen Einschränkungen, Pufferüberläufen, fehlenden Freigaben und use-after-free-Problemen. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuführen, Sicherheitsmaßnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand herbeizuführen, seine Privilegien zu erweitern und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erhöhte Privilegien.", }, ], product_status: { known_affected: [ "T000126", "T028071", ], }, release_date: "2023-06-12T22:00:00.000+00:00", title: "CVE-2022-3104", }, { cve: "CVE-2022-3028", notes: [ { category: "description", text: "In Siemens SIMATIC S7 existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem aufgrund von unzulässigen Einschränkungen, Pufferüberläufen, fehlenden Freigaben und use-after-free-Problemen. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuführen, Sicherheitsmaßnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand herbeizuführen, seine Privilegien zu erweitern und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erhöhte Privilegien.", }, ], product_status: { known_affected: [ "T000126", "T028071", ], }, release_date: "2023-06-12T22:00:00.000+00:00", title: "CVE-2022-3028", }, { cve: "CVE-2022-30065", notes: [ { category: "description", text: "In Siemens SIMATIC S7 existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem aufgrund von unzulässigen Einschränkungen, Pufferüberläufen, fehlenden Freigaben und use-after-free-Problemen. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuführen, Sicherheitsmaßnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand herbeizuführen, seine Privilegien zu erweitern und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erhöhte Privilegien.", }, ], product_status: { known_affected: [ "T000126", "T028071", ], }, release_date: "2023-06-12T22:00:00.000+00:00", title: "CVE-2022-30065", }, { cve: "CVE-2022-2978", notes: [ { category: "description", text: "In Siemens SIMATIC S7 existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem aufgrund von unzulässigen Einschränkungen, Pufferüberläufen, fehlenden Freigaben und use-after-free-Problemen. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuführen, Sicherheitsmaßnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand herbeizuführen, seine Privilegien zu erweitern und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erhöhte Privilegien.", }, ], product_status: { known_affected: [ "T000126", "T028071", ], }, release_date: "2023-06-12T22:00:00.000+00:00", title: "CVE-2022-2978", }, { cve: "CVE-2022-2959", notes: [ { category: "description", text: "In Siemens SIMATIC S7 existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem aufgrund von unzulässigen Einschränkungen, Pufferüberläufen, fehlenden Freigaben und use-after-free-Problemen. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuführen, Sicherheitsmaßnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand herbeizuführen, seine Privilegien zu erweitern und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erhöhte Privilegien.", }, ], product_status: { known_affected: [ "T000126", "T028071", ], }, release_date: "2023-06-12T22:00:00.000+00:00", title: "CVE-2022-2959", }, { cve: "CVE-2022-2905", notes: [ { category: "description", text: "In Siemens SIMATIC S7 existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem aufgrund von unzulässigen Einschränkungen, Pufferüberläufen, fehlenden Freigaben und use-after-free-Problemen. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuführen, Sicherheitsmaßnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand herbeizuführen, seine Privilegien zu erweitern und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erhöhte Privilegien.", }, ], product_status: { known_affected: [ "T000126", "T028071", ], }, release_date: "2023-06-12T22:00:00.000+00:00", title: "CVE-2022-2905", }, { cve: "CVE-2022-28391", notes: [ { category: "description", text: "In Siemens SIMATIC S7 existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem aufgrund von unzulässigen Einschränkungen, Pufferüberläufen, fehlenden Freigaben und use-after-free-Problemen. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuführen, Sicherheitsmaßnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand herbeizuführen, seine Privilegien zu erweitern und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erhöhte Privilegien.", }, ], product_status: { known_affected: [ "T000126", "T028071", ], }, release_date: "2023-06-12T22:00:00.000+00:00", title: "CVE-2022-28391", }, { cve: "CVE-2022-2663", notes: [ { category: "description", text: "In Siemens SIMATIC S7 existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem aufgrund von unzulässigen Einschränkungen, Pufferüberläufen, fehlenden Freigaben und use-after-free-Problemen. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuführen, Sicherheitsmaßnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand herbeizuführen, seine Privilegien zu erweitern und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erhöhte Privilegien.", }, ], product_status: { known_affected: [ "T000126", "T028071", ], }, release_date: "2023-06-12T22:00:00.000+00:00", title: "CVE-2022-2663", }, { cve: "CVE-2022-26373", notes: [ { category: "description", text: "In Siemens SIMATIC S7 existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem aufgrund von unzulässigen Einschränkungen, Pufferüberläufen, fehlenden Freigaben und use-after-free-Problemen. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuführen, Sicherheitsmaßnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand herbeizuführen, seine Privilegien zu erweitern und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erhöhte Privilegien.", }, ], product_status: { known_affected: [ "T000126", "T028071", ], }, release_date: "2023-06-12T22:00:00.000+00:00", title: "CVE-2022-26373", }, { cve: "CVE-2022-2602", notes: [ { category: "description", text: "In Siemens SIMATIC S7 existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem aufgrund von unzulässigen Einschränkungen, Pufferüberläufen, fehlenden Freigaben und use-after-free-Problemen. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuführen, Sicherheitsmaßnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand herbeizuführen, seine Privilegien zu erweitern und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erhöhte Privilegien.", }, ], product_status: { known_affected: [ "T000126", "T028071", ], }, release_date: "2023-06-12T22:00:00.000+00:00", title: "CVE-2022-2602", }, { cve: "CVE-2022-2588", notes: [ { category: "description", text: "In Siemens SIMATIC S7 existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem aufgrund von unzulässigen Einschränkungen, Pufferüberläufen, fehlenden Freigaben und use-after-free-Problemen. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuführen, Sicherheitsmaßnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand herbeizuführen, seine Privilegien zu erweitern und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erhöhte Privilegien.", }, ], product_status: { known_affected: [ "T000126", "T028071", ], }, release_date: "2023-06-12T22:00:00.000+00:00", title: "CVE-2022-2588", }, { cve: "CVE-2022-2586", notes: [ { category: "description", text: "In Siemens SIMATIC S7 existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem aufgrund von unzulässigen Einschränkungen, Pufferüberläufen, fehlenden Freigaben und use-after-free-Problemen. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuführen, Sicherheitsmaßnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand herbeizuführen, seine Privilegien zu erweitern und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erhöhte Privilegien.", }, ], product_status: { known_affected: [ "T000126", "T028071", ], }, release_date: "2023-06-12T22:00:00.000+00:00", title: "CVE-2022-2586", }, { cve: "CVE-2022-2585", notes: [ { category: "description", text: "In Siemens SIMATIC S7 existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem aufgrund von unzulässigen Einschränkungen, Pufferüberläufen, fehlenden Freigaben und use-after-free-Problemen. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuführen, Sicherheitsmaßnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand herbeizuführen, seine Privilegien zu erweitern und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erhöhte Privilegien.", }, ], product_status: { known_affected: [ "T000126", "T028071", ], }, release_date: "2023-06-12T22:00:00.000+00:00", title: "CVE-2022-2585", }, { cve: "CVE-2022-2503", notes: [ { category: "description", text: "In Siemens SIMATIC S7 existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem aufgrund von unzulässigen Einschränkungen, Pufferüberläufen, fehlenden Freigaben und use-after-free-Problemen. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuführen, Sicherheitsmaßnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand herbeizuführen, seine Privilegien zu erweitern und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erhöhte Privilegien.", }, ], product_status: { known_affected: [ "T000126", "T028071", ], }, release_date: "2023-06-12T22:00:00.000+00:00", title: "CVE-2022-2503", }, { cve: "CVE-2022-2327", notes: [ { category: "description", text: "In Siemens SIMATIC S7 existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem aufgrund von unzulässigen Einschränkungen, Pufferüberläufen, fehlenden Freigaben und use-after-free-Problemen. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuführen, Sicherheitsmaßnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand herbeizuführen, seine Privilegien zu erweitern und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erhöhte Privilegien.", }, ], product_status: { known_affected: [ "T000126", "T028071", ], }, release_date: "2023-06-12T22:00:00.000+00:00", title: "CVE-2022-2327", }, { cve: "CVE-2022-23219", notes: [ { category: "description", text: "In Siemens SIMATIC S7 existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem aufgrund von unzulässigen Einschränkungen, Pufferüberläufen, fehlenden Freigaben und use-after-free-Problemen. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuführen, Sicherheitsmaßnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand herbeizuführen, seine Privilegien zu erweitern und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erhöhte Privilegien.", }, ], product_status: { known_affected: [ "T000126", "T028071", ], }, release_date: "2023-06-12T22:00:00.000+00:00", title: "CVE-2022-23219", }, { cve: "CVE-2022-23218", notes: [ { category: "description", text: "In Siemens SIMATIC S7 existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem aufgrund von unzulässigen Einschränkungen, Pufferüberläufen, fehlenden Freigaben und use-after-free-Problemen. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuführen, Sicherheitsmaßnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand herbeizuführen, seine Privilegien zu erweitern und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erhöhte Privilegien.", }, ], product_status: { known_affected: [ "T000126", "T028071", ], }, release_date: "2023-06-12T22:00:00.000+00:00", title: "CVE-2022-23218", }, { cve: "CVE-2022-2274", notes: [ { category: "description", text: "In Siemens SIMATIC S7 existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem aufgrund von unzulässigen Einschränkungen, Pufferüberläufen, fehlenden Freigaben und use-after-free-Problemen. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuführen, Sicherheitsmaßnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand herbeizuführen, seine Privilegien zu erweitern und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erhöhte Privilegien.", }, ], product_status: { known_affected: [ "T000126", "T028071", ], }, release_date: "2023-06-12T22:00:00.000+00:00", title: "CVE-2022-2274", }, { cve: "CVE-2022-2153", notes: [ { category: "description", text: "In Siemens SIMATIC S7 existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem aufgrund von unzulässigen Einschränkungen, Pufferüberläufen, fehlenden Freigaben und use-after-free-Problemen. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuführen, Sicherheitsmaßnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand herbeizuführen, seine Privilegien zu erweitern und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erhöhte Privilegien.", }, ], product_status: { known_affected: [ "T000126", "T028071", ], }, release_date: "2023-06-12T22:00:00.000+00:00", title: "CVE-2022-2153", }, { cve: "CVE-2022-21505", notes: [ { category: "description", text: "In Siemens SIMATIC S7 existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem aufgrund von unzulässigen Einschränkungen, Pufferüberläufen, fehlenden Freigaben und use-after-free-Problemen. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuführen, Sicherheitsmaßnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand herbeizuführen, seine Privilegien zu erweitern und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erhöhte Privilegien.", }, ], product_status: { known_affected: [ "T000126", "T028071", ], }, release_date: "2023-06-12T22:00:00.000+00:00", title: "CVE-2022-21505", }, { cve: "CVE-2022-21233", notes: [ { category: "description", text: "In Siemens SIMATIC S7 existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem aufgrund von unzulässigen Einschränkungen, Pufferüberläufen, fehlenden Freigaben und use-after-free-Problemen. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuführen, Sicherheitsmaßnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand herbeizuführen, seine Privilegien zu erweitern und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erhöhte Privilegien.", }, ], product_status: { known_affected: [ "T000126", "T028071", ], }, release_date: "2023-06-12T22:00:00.000+00:00", title: "CVE-2022-21233", }, { cve: "CVE-2022-21166", notes: [ { category: "description", text: "In Siemens SIMATIC S7 existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem aufgrund von unzulässigen Einschränkungen, Pufferüberläufen, fehlenden Freigaben und use-after-free-Problemen. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuführen, Sicherheitsmaßnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand herbeizuführen, seine Privilegien zu erweitern und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erhöhte Privilegien.", }, ], product_status: { known_affected: [ "T000126", "T028071", ], }, release_date: "2023-06-12T22:00:00.000+00:00", title: "CVE-2022-21166", }, { cve: "CVE-2022-21125", notes: [ { category: "description", text: "In Siemens SIMATIC S7 existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem aufgrund von unzulässigen Einschränkungen, Pufferüberläufen, fehlenden Freigaben und use-after-free-Problemen. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuführen, Sicherheitsmaßnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand herbeizuführen, seine Privilegien zu erweitern und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erhöhte Privilegien.", }, ], product_status: { known_affected: [ "T000126", "T028071", ], }, release_date: "2023-06-12T22:00:00.000+00:00", title: "CVE-2022-21125", }, { cve: "CVE-2022-21123", notes: [ { category: "description", text: "In Siemens SIMATIC S7 existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem aufgrund von unzulässigen Einschränkungen, Pufferüberläufen, fehlenden Freigaben und use-after-free-Problemen. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuführen, Sicherheitsmaßnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand herbeizuführen, seine Privilegien zu erweitern und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erhöhte Privilegien.", }, ], product_status: { known_affected: [ "T000126", "T028071", ], }, release_date: "2023-06-12T22:00:00.000+00:00", title: "CVE-2022-21123", }, { cve: "CVE-2022-2097", notes: [ { category: "description", text: "In Siemens SIMATIC S7 existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem aufgrund von unzulässigen Einschränkungen, Pufferüberläufen, fehlenden Freigaben und use-after-free-Problemen. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuführen, Sicherheitsmaßnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand herbeizuführen, seine Privilegien zu erweitern und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erhöhte Privilegien.", }, ], product_status: { known_affected: [ "T000126", "T028071", ], }, release_date: "2023-06-12T22:00:00.000+00:00", title: "CVE-2022-2097", }, { cve: "CVE-2022-2078", notes: [ { category: "description", text: "In Siemens SIMATIC S7 existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem aufgrund von unzulässigen Einschränkungen, Pufferüberläufen, fehlenden Freigaben und use-after-free-Problemen. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuführen, Sicherheitsmaßnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand herbeizuführen, seine Privilegien zu erweitern und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erhöhte Privilegien.", }, ], product_status: { known_affected: [ "T000126", "T028071", ], }, release_date: "2023-06-12T22:00:00.000+00:00", title: "CVE-2022-2078", }, { cve: "CVE-2022-2068", notes: [ { category: "description", text: "In Siemens SIMATIC S7 existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem aufgrund von unzulässigen Einschränkungen, Pufferüberläufen, fehlenden Freigaben und use-after-free-Problemen. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuführen, Sicherheitsmaßnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand herbeizuführen, seine Privilegien zu erweitern und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erhöhte Privilegien.", }, ], product_status: { known_affected: [ "T000126", "T028071", ], }, release_date: "2023-06-12T22:00:00.000+00:00", title: "CVE-2022-2068", }, { cve: "CVE-2022-20572", notes: [ { category: "description", text: "In Siemens SIMATIC S7 existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem aufgrund von unzulässigen Einschränkungen, Pufferüberläufen, fehlenden Freigaben und use-after-free-Problemen. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuführen, Sicherheitsmaßnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand herbeizuführen, seine Privilegien zu erweitern und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erhöhte Privilegien.", }, ], product_status: { known_affected: [ "T000126", "T028071", ], }, release_date: "2023-06-12T22:00:00.000+00:00", title: "CVE-2022-20572", }, { cve: "CVE-2022-20566", notes: [ { category: "description", text: "In Siemens SIMATIC S7 existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem aufgrund von unzulässigen Einschränkungen, Pufferüberläufen, fehlenden Freigaben und use-after-free-Problemen. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuführen, Sicherheitsmaßnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand herbeizuführen, seine Privilegien zu erweitern und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erhöhte Privilegien.", }, ], product_status: { known_affected: [ "T000126", "T028071", ], }, release_date: "2023-06-12T22:00:00.000+00:00", title: "CVE-2022-20566", }, { cve: "CVE-2022-20422", notes: [ { category: "description", text: "In Siemens SIMATIC S7 existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem aufgrund von unzulässigen Einschränkungen, Pufferüberläufen, fehlenden Freigaben und use-after-free-Problemen. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuführen, Sicherheitsmaßnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand herbeizuführen, seine Privilegien zu erweitern und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erhöhte Privilegien.", }, ], product_status: { known_affected: [ "T000126", "T028071", ], }, release_date: "2023-06-12T22:00:00.000+00:00", title: "CVE-2022-20422", }, { cve: "CVE-2022-20421", notes: [ { category: "description", text: "In Siemens SIMATIC S7 existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem aufgrund von unzulässigen Einschränkungen, Pufferüberläufen, fehlenden Freigaben und use-after-free-Problemen. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuführen, Sicherheitsmaßnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand herbeizuführen, seine Privilegien zu erweitern und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erhöhte Privilegien.", }, ], product_status: { known_affected: [ "T000126", "T028071", ], }, release_date: "2023-06-12T22:00:00.000+00:00", title: "CVE-2022-20421", }, { cve: "CVE-2022-1882", notes: [ { category: "description", text: "In Siemens SIMATIC S7 existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem aufgrund von unzulässigen Einschränkungen, Pufferüberläufen, fehlenden Freigaben und use-after-free-Problemen. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuführen, Sicherheitsmaßnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand herbeizuführen, seine Privilegien zu erweitern und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erhöhte Privilegien.", }, ], product_status: { known_affected: [ "T000126", "T028071", ], }, release_date: "2023-06-12T22:00:00.000+00:00", title: "CVE-2022-1882", }, { cve: "CVE-2022-1852", notes: [ { category: "description", text: "In Siemens SIMATIC S7 existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem aufgrund von unzulässigen Einschränkungen, Pufferüberläufen, fehlenden Freigaben und use-after-free-Problemen. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuführen, Sicherheitsmaßnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand herbeizuführen, seine Privilegien zu erweitern und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erhöhte Privilegien.", }, ], product_status: { known_affected: [ "T000126", "T028071", ], }, release_date: "2023-06-12T22:00:00.000+00:00", title: "CVE-2022-1852", }, { cve: "CVE-2022-1679", notes: [ { category: "description", text: "In Siemens SIMATIC S7 existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem aufgrund von unzulässigen Einschränkungen, Pufferüberläufen, fehlenden Freigaben und use-after-free-Problemen. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuführen, Sicherheitsmaßnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand herbeizuführen, seine Privilegien zu erweitern und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erhöhte Privilegien.", }, ], product_status: { known_affected: [ "T000126", "T028071", ], }, release_date: "2023-06-12T22:00:00.000+00:00", title: "CVE-2022-1679", }, { cve: "CVE-2022-1473", notes: [ { category: "description", text: "In Siemens SIMATIC S7 existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem aufgrund von unzulässigen Einschränkungen, Pufferüberläufen, fehlenden Freigaben und use-after-free-Problemen. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuführen, Sicherheitsmaßnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand herbeizuführen, seine Privilegien zu erweitern und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erhöhte Privilegien.", }, ], product_status: { known_affected: [ "T000126", "T028071", ], }, release_date: "2023-06-12T22:00:00.000+00:00", title: "CVE-2022-1473", }, { cve: "CVE-2022-1462", notes: [ { category: "description", text: "In Siemens SIMATIC S7 existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem aufgrund von unzulässigen Einschränkungen, Pufferüberläufen, fehlenden Freigaben und use-after-free-Problemen. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuführen, Sicherheitsmaßnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand herbeizuführen, seine Privilegien zu erweitern und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erhöhte Privilegien.", }, ], product_status: { known_affected: [ "T000126", "T028071", ], }, release_date: "2023-06-12T22:00:00.000+00:00", title: "CVE-2022-1462", }, { cve: "CVE-2022-1434", notes: [ { category: "description", text: "In Siemens SIMATIC S7 existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem aufgrund von unzulässigen Einschränkungen, Pufferüberläufen, fehlenden Freigaben und use-after-free-Problemen. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuführen, Sicherheitsmaßnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand herbeizuführen, seine Privilegien zu erweitern und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erhöhte Privilegien.", }, ], product_status: { known_affected: [ "T000126", "T028071", ], }, release_date: "2023-06-12T22:00:00.000+00:00", title: "CVE-2022-1434", }, { cve: "CVE-2022-1343", notes: [ { category: "description", text: "In Siemens SIMATIC S7 existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem aufgrund von unzulässigen Einschränkungen, Pufferüberläufen, fehlenden Freigaben und use-after-free-Problemen. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuführen, Sicherheitsmaßnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand herbeizuführen, seine Privilegien zu erweitern und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erhöhte Privilegien.", }, ], product_status: { known_affected: [ "T000126", "T028071", ], }, release_date: "2023-06-12T22:00:00.000+00:00", title: "CVE-2022-1343", }, { cve: "CVE-2022-1292", notes: [ { category: "description", text: "In Siemens SIMATIC S7 existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem aufgrund von unzulässigen Einschränkungen, Pufferüberläufen, fehlenden Freigaben und use-after-free-Problemen. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuführen, Sicherheitsmaßnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand herbeizuführen, seine Privilegien zu erweitern und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erhöhte Privilegien.", }, ], product_status: { known_affected: [ "T000126", "T028071", ], }, release_date: "2023-06-12T22:00:00.000+00:00", title: "CVE-2022-1292", }, { cve: "CVE-2022-1184", notes: [ { category: "description", text: "In Siemens SIMATIC S7 existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem aufgrund von unzulässigen Einschränkungen, Pufferüberläufen, fehlenden Freigaben und use-after-free-Problemen. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuführen, Sicherheitsmaßnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand herbeizuführen, seine Privilegien zu erweitern und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erhöhte Privilegien.", }, ], product_status: { known_affected: [ "T000126", "T028071", ], }, release_date: "2023-06-12T22:00:00.000+00:00", title: "CVE-2022-1184", }, { cve: "CVE-2022-1012", notes: [ { category: "description", text: "In Siemens SIMATIC S7 existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem aufgrund von unzulässigen Einschränkungen, Pufferüberläufen, fehlenden Freigaben und use-after-free-Problemen. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuführen, Sicherheitsmaßnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand herbeizuführen, seine Privilegien zu erweitern und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erhöhte Privilegien.", }, ], product_status: { known_affected: [ "T000126", "T028071", ], }, release_date: "2023-06-12T22:00:00.000+00:00", title: "CVE-2022-1012", }, { cve: "CVE-2022-0171", notes: [ { category: "description", text: "In Siemens SIMATIC S7 existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem aufgrund von unzulässigen Einschränkungen, Pufferüberläufen, fehlenden Freigaben und use-after-free-Problemen. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuführen, Sicherheitsmaßnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand herbeizuführen, seine Privilegien zu erweitern und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erhöhte Privilegien.", }, ], product_status: { known_affected: [ "T000126", "T028071", ], }, release_date: "2023-06-12T22:00:00.000+00:00", title: "CVE-2022-0171", }, { cve: "CVE-2021-42386", notes: [ { category: "description", text: "In Siemens SIMATIC S7 existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem aufgrund von unzulässigen Einschränkungen, Pufferüberläufen, fehlenden Freigaben und use-after-free-Problemen. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuführen, Sicherheitsmaßnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand herbeizuführen, seine Privilegien zu erweitern und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erhöhte Privilegien.", }, ], product_status: { known_affected: [ "T000126", "T028071", ], }, release_date: "2023-06-12T22:00:00.000+00:00", title: "CVE-2021-42386", }, { cve: "CVE-2021-42385", notes: [ { category: "description", text: "In Siemens SIMATIC S7 existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem aufgrund von unzulässigen Einschränkungen, Pufferüberläufen, fehlenden Freigaben und use-after-free-Problemen. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuführen, Sicherheitsmaßnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand herbeizuführen, seine Privilegien zu erweitern und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erhöhte Privilegien.", }, ], product_status: { known_affected: [ "T000126", "T028071", ], }, release_date: "2023-06-12T22:00:00.000+00:00", title: "CVE-2021-42385", }, { cve: "CVE-2021-42384", notes: [ { category: "description", text: "In Siemens SIMATIC S7 existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem aufgrund von unzulässigen Einschränkungen, Pufferüberläufen, fehlenden Freigaben und use-after-free-Problemen. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuführen, Sicherheitsmaßnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand herbeizuführen, seine Privilegien zu erweitern und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erhöhte Privilegien.", }, ], product_status: { known_affected: [ "T000126", "T028071", ], }, release_date: "2023-06-12T22:00:00.000+00:00", title: "CVE-2021-42384", }, { cve: "CVE-2021-42383", notes: [ { category: "description", text: "In Siemens SIMATIC S7 existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem aufgrund von unzulässigen Einschränkungen, Pufferüberläufen, fehlenden Freigaben und use-after-free-Problemen. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuführen, Sicherheitsmaßnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand herbeizuführen, seine Privilegien zu erweitern und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erhöhte Privilegien.", }, ], product_status: { known_affected: [ "T000126", "T028071", ], }, release_date: "2023-06-12T22:00:00.000+00:00", title: "CVE-2021-42383", }, { cve: "CVE-2021-42382", notes: [ { category: "description", text: "In Siemens SIMATIC S7 existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem aufgrund von unzulässigen Einschränkungen, Pufferüberläufen, fehlenden Freigaben und use-after-free-Problemen. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuführen, Sicherheitsmaßnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand herbeizuführen, seine Privilegien zu erweitern und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erhöhte Privilegien.", }, ], product_status: { known_affected: [ "T000126", "T028071", ], }, release_date: "2023-06-12T22:00:00.000+00:00", title: "CVE-2021-42382", }, { cve: "CVE-2021-42381", notes: [ { category: "description", text: "In Siemens SIMATIC S7 existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem aufgrund von unzulässigen Einschränkungen, Pufferüberläufen, fehlenden Freigaben und use-after-free-Problemen. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuführen, Sicherheitsmaßnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand herbeizuführen, seine Privilegien zu erweitern und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erhöhte Privilegien.", }, ], product_status: { known_affected: [ "T000126", "T028071", ], }, release_date: "2023-06-12T22:00:00.000+00:00", title: "CVE-2021-42381", }, { cve: "CVE-2021-42380", notes: [ { category: "description", text: "In Siemens SIMATIC S7 existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem aufgrund von unzulässigen Einschränkungen, Pufferüberläufen, fehlenden Freigaben und use-after-free-Problemen. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuführen, Sicherheitsmaßnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand herbeizuführen, seine Privilegien zu erweitern und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erhöhte Privilegien.", }, ], product_status: { known_affected: [ "T000126", "T028071", ], }, release_date: "2023-06-12T22:00:00.000+00:00", title: "CVE-2021-42380", }, { cve: "CVE-2021-42379", notes: [ { category: "description", text: "In Siemens SIMATIC S7 existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem aufgrund von unzulässigen Einschränkungen, Pufferüberläufen, fehlenden Freigaben und use-after-free-Problemen. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuführen, Sicherheitsmaßnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand herbeizuführen, seine Privilegien zu erweitern und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erhöhte Privilegien.", }, ], product_status: { known_affected: [ "T000126", "T028071", ], }, release_date: "2023-06-12T22:00:00.000+00:00", title: "CVE-2021-42379", }, { cve: "CVE-2021-42378", notes: [ { category: "description", text: "In Siemens SIMATIC S7 existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem aufgrund von unzulässigen Einschränkungen, Pufferüberläufen, fehlenden Freigaben und use-after-free-Problemen. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuführen, Sicherheitsmaßnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand herbeizuführen, seine Privilegien zu erweitern und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erhöhte Privilegien.", }, ], product_status: { known_affected: [ "T000126", "T028071", ], }, release_date: "2023-06-12T22:00:00.000+00:00", title: "CVE-2021-42378", }, { cve: "CVE-2021-42377", notes: [ { category: "description", text: "In Siemens SIMATIC S7 existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem aufgrund von unzulässigen Einschränkungen, Pufferüberläufen, fehlenden Freigaben und use-after-free-Problemen. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuführen, Sicherheitsmaßnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand herbeizuführen, seine Privilegien zu erweitern und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erhöhte Privilegien.", }, ], product_status: { known_affected: [ "T000126", "T028071", ], }, release_date: "2023-06-12T22:00:00.000+00:00", title: "CVE-2021-42377", }, { cve: "CVE-2021-42376", notes: [ { category: "description", text: "In Siemens SIMATIC S7 existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem aufgrund von unzulässigen Einschränkungen, Pufferüberläufen, fehlenden Freigaben und use-after-free-Problemen. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuführen, Sicherheitsmaßnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand herbeizuführen, seine Privilegien zu erweitern und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erhöhte Privilegien.", }, ], product_status: { known_affected: [ "T000126", "T028071", ], }, release_date: "2023-06-12T22:00:00.000+00:00", title: "CVE-2021-42376", }, { cve: "CVE-2021-42375", notes: [ { category: "description", text: "In Siemens SIMATIC S7 existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem aufgrund von unzulässigen Einschränkungen, Pufferüberläufen, fehlenden Freigaben und use-after-free-Problemen. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuführen, Sicherheitsmaßnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand herbeizuführen, seine Privilegien zu erweitern und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erhöhte Privilegien.", }, ], product_status: { known_affected: [ "T000126", "T028071", ], }, release_date: "2023-06-12T22:00:00.000+00:00", title: "CVE-2021-42375", }, { cve: "CVE-2021-42374", notes: [ { category: "description", text: "In Siemens SIMATIC S7 existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem aufgrund von unzulässigen Einschränkungen, Pufferüberläufen, fehlenden Freigaben und use-after-free-Problemen. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuführen, Sicherheitsmaßnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand herbeizuführen, seine Privilegien zu erweitern und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erhöhte Privilegien.", }, ], product_status: { known_affected: [ "T000126", "T028071", ], }, release_date: "2023-06-12T22:00:00.000+00:00", title: "CVE-2021-42374", }, { cve: "CVE-2021-42373", notes: [ { category: "description", text: "In Siemens SIMATIC S7 existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem aufgrund von unzulässigen Einschränkungen, Pufferüberläufen, fehlenden Freigaben und use-after-free-Problemen. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuführen, Sicherheitsmaßnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand herbeizuführen, seine Privilegien zu erweitern und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erhöhte Privilegien.", }, ], product_status: { known_affected: [ "T000126", "T028071", ], }, release_date: "2023-06-12T22:00:00.000+00:00", title: "CVE-2021-42373", }, { cve: "CVE-2021-4037", notes: [ { category: "description", text: "In Siemens SIMATIC S7 existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem aufgrund von unzulässigen Einschränkungen, Pufferüberläufen, fehlenden Freigaben und use-after-free-Problemen. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuführen, Sicherheitsmaßnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand herbeizuführen, seine Privilegien zu erweitern und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erhöhte Privilegien.", }, ], product_status: { known_affected: [ "T000126", "T028071", ], }, release_date: "2023-06-12T22:00:00.000+00:00", title: "CVE-2021-4037", }, { cve: "CVE-2021-3999", notes: [ { category: "description", text: "In Siemens SIMATIC S7 existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem aufgrund von unzulässigen Einschränkungen, Pufferüberläufen, fehlenden Freigaben und use-after-free-Problemen. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuführen, Sicherheitsmaßnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand herbeizuführen, seine Privilegien zu erweitern und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erhöhte Privilegien.", }, ], product_status: { known_affected: [ "T000126", "T028071", ], }, release_date: "2023-06-12T22:00:00.000+00:00", title: "CVE-2021-3999", }, { cve: "CVE-2021-3998", notes: [ { category: "description", text: "In Siemens SIMATIC S7 existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem aufgrund von unzulässigen Einschränkungen, Pufferüberläufen, fehlenden Freigaben und use-after-free-Problemen. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuführen, Sicherheitsmaßnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand herbeizuführen, seine Privilegien zu erweitern und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erhöhte Privilegien.", }, ], product_status: { known_affected: [ "T000126", "T028071", ], }, release_date: "2023-06-12T22:00:00.000+00:00", title: "CVE-2021-3998", }, { cve: "CVE-2021-38604", notes: [ { category: "description", text: "In Siemens SIMATIC S7 existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem aufgrund von unzulässigen Einschränkungen, Pufferüberläufen, fehlenden Freigaben und use-after-free-Problemen. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuführen, Sicherheitsmaßnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand herbeizuführen, seine Privilegien zu erweitern und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erhöhte Privilegien.", }, ], product_status: { known_affected: [ "T000126", "T028071", ], }, release_date: "2023-06-12T22:00:00.000+00:00", title: "CVE-2021-38604", }, { cve: "CVE-2021-3759", notes: [ { category: "description", text: "In Siemens SIMATIC S7 existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem aufgrund von unzulässigen Einschränkungen, Pufferüberläufen, fehlenden Freigaben und use-after-free-Problemen. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuführen, Sicherheitsmaßnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand herbeizuführen, seine Privilegien zu erweitern und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erhöhte Privilegien.", }, ], product_status: { known_affected: [ "T000126", "T028071", ], }, release_date: "2023-06-12T22:00:00.000+00:00", title: "CVE-2021-3759", }, { cve: "CVE-2021-35942", notes: [ { category: "description", text: "In Siemens SIMATIC S7 existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem aufgrund von unzulässigen Einschränkungen, Pufferüberläufen, fehlenden Freigaben und use-after-free-Problemen. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuführen, Sicherheitsmaßnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand herbeizuführen, seine Privilegien zu erweitern und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erhöhte Privilegien.", }, ], product_status: { known_affected: [ "T000126", "T028071", ], }, release_date: "2023-06-12T22:00:00.000+00:00", title: "CVE-2021-35942", }, { cve: "CVE-2021-33655", notes: [ { category: "description", text: "In Siemens SIMATIC S7 existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem aufgrund von unzulässigen Einschränkungen, Pufferüberläufen, fehlenden Freigaben und use-after-free-Problemen. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuführen, Sicherheitsmaßnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand herbeizuführen, seine Privilegien zu erweitern und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erhöhte Privilegien.", }, ], product_status: { known_affected: [ "T000126", "T028071", ], }, release_date: "2023-06-12T22:00:00.000+00:00", title: "CVE-2021-33655", }, { cve: "CVE-2021-33574", notes: [ { category: "description", text: "In Siemens SIMATIC S7 existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem aufgrund von unzulässigen Einschränkungen, Pufferüberläufen, fehlenden Freigaben und use-after-free-Problemen. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuführen, Sicherheitsmaßnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand herbeizuführen, seine Privilegien zu erweitern und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erhöhte Privilegien.", }, ], product_status: { known_affected: [ "T000126", "T028071", ], }, release_date: "2023-06-12T22:00:00.000+00:00", title: "CVE-2021-33574", }, { cve: "CVE-2021-3326", notes: [ { category: "description", text: "In Siemens SIMATIC S7 existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem aufgrund von unzulässigen Einschränkungen, Pufferüberläufen, fehlenden Freigaben und use-after-free-Problemen. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuführen, Sicherheitsmaßnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand herbeizuführen, seine Privilegien zu erweitern und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erhöhte Privilegien.", }, ], product_status: { known_affected: [ "T000126", "T028071", ], }, release_date: "2023-06-12T22:00:00.000+00:00", title: "CVE-2021-3326", }, { cve: "CVE-2021-28831", notes: [ { category: "description", text: "In Siemens SIMATIC S7 existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem aufgrund von unzulässigen Einschränkungen, Pufferüberläufen, fehlenden Freigaben und use-after-free-Problemen. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuführen, Sicherheitsmaßnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand herbeizuführen, seine Privilegien zu erweitern und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erhöhte Privilegien.", }, ], product_status: { known_affected: [ "T000126", "T028071", ], }, release_date: "2023-06-12T22:00:00.000+00:00", title: "CVE-2021-28831", }, { cve: "CVE-2021-27645", notes: [ { category: "description", text: "In Siemens SIMATIC S7 existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem aufgrund von unzulässigen Einschränkungen, Pufferüberläufen, fehlenden Freigaben und use-after-free-Problemen. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuführen, Sicherheitsmaßnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand herbeizuführen, seine Privilegien zu erweitern und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erhöhte Privilegien.", }, ], product_status: { known_affected: [ "T000126", "T028071", ], }, release_date: "2023-06-12T22:00:00.000+00:00", title: "CVE-2021-27645", }, { cve: "CVE-2021-20269", notes: [ { category: "description", text: "In Siemens SIMATIC S7 existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem aufgrund von unzulässigen Einschränkungen, Pufferüberläufen, fehlenden Freigaben und use-after-free-Problemen. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuführen, Sicherheitsmaßnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand herbeizuführen, seine Privilegien zu erweitern und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erhöhte Privilegien.", }, ], product_status: { known_affected: [ "T000126", "T028071", ], }, release_date: "2023-06-12T22:00:00.000+00:00", title: "CVE-2021-20269", }, { cve: "CVE-2020-29562", notes: [ { category: "description", text: "In Siemens SIMATIC S7 existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem aufgrund von unzulässigen Einschränkungen, Pufferüberläufen, fehlenden Freigaben und use-after-free-Problemen. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuführen, Sicherheitsmaßnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand herbeizuführen, seine Privilegien zu erweitern und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erhöhte Privilegien.", }, ], product_status: { known_affected: [ "T000126", "T028071", ], }, release_date: "2023-06-12T22:00:00.000+00:00", title: "CVE-2020-29562", }, { cve: "CVE-2020-27618", notes: [ { category: "description", text: "In Siemens SIMATIC S7 existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem aufgrund von unzulässigen Einschränkungen, Pufferüberläufen, fehlenden Freigaben und use-after-free-Problemen. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuführen, Sicherheitsmaßnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand herbeizuführen, seine Privilegien zu erweitern und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erhöhte Privilegien.", }, ], product_status: { known_affected: [ "T000126", "T028071", ], }, release_date: "2023-06-12T22:00:00.000+00:00", title: "CVE-2020-27618", }, { cve: "CVE-2020-1752", notes: [ { category: "description", text: "In Siemens SIMATIC S7 existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem aufgrund von unzulässigen Einschränkungen, Pufferüberläufen, fehlenden Freigaben und use-after-free-Problemen. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuführen, Sicherheitsmaßnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand herbeizuführen, seine Privilegien zu erweitern und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erhöhte Privilegien.", }, ], product_status: { known_affected: [ "T000126", "T028071", ], }, release_date: "2023-06-12T22:00:00.000+00:00", title: "CVE-2020-1752", }, { cve: "CVE-2020-10029", notes: [ { category: "description", text: "In Siemens SIMATIC S7 existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem aufgrund von unzulässigen Einschränkungen, Pufferüberläufen, fehlenden Freigaben und use-after-free-Problemen. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuführen, Sicherheitsmaßnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand herbeizuführen, seine Privilegien zu erweitern und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erhöhte Privilegien.", }, ], product_status: { known_affected: [ "T000126", "T028071", ], }, release_date: "2023-06-12T22:00:00.000+00:00", title: "CVE-2020-10029", }, { cve: "CVE-2019-25013", notes: [ { category: "description", text: "In Siemens SIMATIC S7 existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem aufgrund von unzulässigen Einschränkungen, Pufferüberläufen, fehlenden Freigaben und use-after-free-Problemen. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuführen, Sicherheitsmaßnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand herbeizuführen, seine Privilegien zu erweitern und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erhöhte Privilegien.", }, ], product_status: { known_affected: [ "T000126", "T028071", ], }, release_date: "2023-06-12T22:00:00.000+00:00", title: "CVE-2019-25013", }, { cve: "CVE-2018-13405", notes: [ { category: "description", text: "In Siemens SIMATIC S7 existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem aufgrund von unzulässigen Einschränkungen, Pufferüberläufen, fehlenden Freigaben und use-after-free-Problemen. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuführen, Sicherheitsmaßnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand herbeizuführen, seine Privilegien zu erweitern und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erhöhte Privilegien.", }, ], product_status: { known_affected: [ "T000126", "T028071", ], }, release_date: "2023-06-12T22:00:00.000+00:00", title: "CVE-2018-13405", }, { cve: "CVE-2016-10228", notes: [ { category: "description", text: "In Siemens SIMATIC S7 existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem aufgrund von unzulässigen Einschränkungen, Pufferüberläufen, fehlenden Freigaben und use-after-free-Problemen. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuführen, Sicherheitsmaßnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand herbeizuführen, seine Privilegien zu erweitern und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erhöhte Privilegien.", }, ], product_status: { known_affected: [ "T000126", "T028071", ], }, release_date: "2023-06-12T22:00:00.000+00:00", title: "CVE-2016-10228", }, ], }
fkie_cve-2021-28831
Vulnerability from fkie_nvd
Published
2021-03-19 05:15
Modified
2024-11-21 06:00
Severity ?
7.5 (High) - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
7.5 (High) - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
7.5 (High) - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
Summary
decompress_gunzip.c in BusyBox through 1.32.1 mishandles the error bit on the huft_build result pointer, with a resultant invalid free or segmentation fault, via malformed gzip data.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
busybox | busybox | * | |
fedoraproject | fedora | 32 | |
fedoraproject | fedora | 33 | |
fedoraproject | fedora | 34 | |
debian | debian_linux | 9.0 |
{ configurations: [ { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:a:busybox:busybox:*:*:*:*:*:*:*:*", matchCriteriaId: "3F45843F-3E26-4DE5-B89B-E83623AB8054", versionEndIncluding: "1.32.1", versionStartIncluding: "1.32.0", vulnerable: true, }, ], negate: false, operator: "OR", }, ], }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:fedoraproject:fedora:32:*:*:*:*:*:*:*", matchCriteriaId: "36D96259-24BD-44E2-96D9-78CE1D41F956", vulnerable: true, }, { criteria: "cpe:2.3:o:fedoraproject:fedora:33:*:*:*:*:*:*:*", matchCriteriaId: "E460AA51-FCDA-46B9-AE97-E6676AA5E194", vulnerable: true, }, { criteria: "cpe:2.3:o:fedoraproject:fedora:34:*:*:*:*:*:*:*", matchCriteriaId: "A930E247-0B43-43CB-98FF-6CE7B8189835", vulnerable: true, }, ], negate: false, operator: "OR", }, ], }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*", matchCriteriaId: "DEECE5FC-CACF-4496-A3E7-164736409252", vulnerable: true, }, ], negate: false, operator: "OR", }, ], }, ], cveTags: [], descriptions: [ { lang: "en", value: "decompress_gunzip.c in BusyBox through 1.32.1 mishandles the error bit on the huft_build result pointer, with a resultant invalid free or segmentation fault, via malformed gzip data.", }, { lang: "es", value: "El archivo decompress_gunzip.c en BusyBox versiones hasta 1.32.1, maneja inapropiadamente el bit de error en el puntero de resultado de huft_build, con un fallo liberación invalida o de segmentación resultante, por medio de datos gzip malformados", }, ], id: "CVE-2021-28831", lastModified: "2024-11-21T06:00:17.377", metrics: { cvssMetricV2: [ { acInsufInfo: false, baseSeverity: "MEDIUM", cvssData: { accessComplexity: "LOW", accessVector: "NETWORK", authentication: "NONE", availabilityImpact: "PARTIAL", baseScore: 5, confidentialityImpact: "NONE", integrityImpact: "NONE", vectorString: "AV:N/AC:L/Au:N/C:N/I:N/A:P", version: "2.0", }, exploitabilityScore: 10, impactScore: 2.9, obtainAllPrivilege: false, obtainOtherPrivilege: false, obtainUserPrivilege: false, source: "nvd@nist.gov", type: "Primary", userInteractionRequired: false, }, ], cvssMetricV31: [ { cvssData: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "HIGH", baseScore: 7.5, baseSeverity: "HIGH", confidentialityImpact: "NONE", integrityImpact: "NONE", privilegesRequired: "NONE", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, exploitabilityScore: 3.9, impactScore: 3.6, source: "cve@mitre.org", type: "Secondary", }, { cvssData: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "HIGH", baseScore: 7.5, baseSeverity: "HIGH", confidentialityImpact: "NONE", integrityImpact: "NONE", privilegesRequired: "NONE", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, exploitabilityScore: 3.9, impactScore: 3.6, source: "nvd@nist.gov", type: "Primary", }, ], }, published: "2021-03-19T05:15:13.150", references: [ { source: "cve@mitre.org", tags: [ "Mailing List", "Patch", "Vendor Advisory", ], url: "https://git.busybox.net/busybox/commit/?id=f25d254dfd4243698c31a4f3153d4ac72aa9e9bd", }, { source: "cve@mitre.org", tags: [ "Mailing List", "Third Party Advisory", ], url: "https://lists.debian.org/debian-lts-announce/2021/04/msg00001.html", }, { source: "cve@mitre.org", url: "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/3UDQGJRECXFS5EZVDH2OI45FMO436AC4/", }, { source: "cve@mitre.org", url: "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/Z7ZIFKPRR32ZYA3WAA2NXFA3QHHOU6FJ/", }, { source: "cve@mitre.org", url: "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ZASBW7QRRLY5V2R44MQ4QQM4CZIDHM2U/", }, { source: "cve@mitre.org", tags: [ "Third Party Advisory", ], url: "https://security.gentoo.org/glsa/202105-09", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Mailing List", "Patch", "Vendor Advisory", ], url: "https://git.busybox.net/busybox/commit/?id=f25d254dfd4243698c31a4f3153d4ac72aa9e9bd", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Mailing List", "Third Party Advisory", ], url: "https://lists.debian.org/debian-lts-announce/2021/04/msg00001.html", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/3UDQGJRECXFS5EZVDH2OI45FMO436AC4/", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/Z7ZIFKPRR32ZYA3WAA2NXFA3QHHOU6FJ/", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ZASBW7QRRLY5V2R44MQ4QQM4CZIDHM2U/", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Third Party Advisory", ], url: "https://security.gentoo.org/glsa/202105-09", }, ], sourceIdentifier: "cve@mitre.org", vulnStatus: "Modified", weaknesses: [ { description: [ { lang: "en", value: "CWE-755", }, ], source: "nvd@nist.gov", type: "Primary", }, ], }
ssa-831302
Vulnerability from csaf_siemens
Published
2023-06-13 00:00
Modified
2024-04-09 00:00
Summary
SSA-831302: Vulnerabilities in the BIOS of the SIMATIC S7-1500 TM MFP before V1.3.0
Notes
Summary
Multiple vulnerabilities have been identified in the BIOS of the SIMATIC S7-1500 TM MFP before V1.3.0.
Siemens has released a new version for SIMATIC S7-1500 TM MFP - BIOS and recommends to update to the latest version.
General Recommendations
As a general security measure, Siemens strongly recommends to protect network access to devices with appropriate mechanisms. In order to operate the devices in a protected IT environment, Siemens recommends to configure the environment according to Siemens' operational guidelines for Industrial Security (Download:
https://www.siemens.com/cert/operational-guidelines-industrial-security), and to follow the recommendations in the product manuals.
Additional information on Industrial Security by Siemens can be found at: https://www.siemens.com/industrialsecurity
Additional Resources
For further inquiries on security vulnerabilities in Siemens products and solutions, please contact the Siemens ProductCERT: https://www.siemens.com/cert/advisories
Terms of Use
Siemens Security Advisories are subject to the terms and conditions contained in Siemens' underlying license terms or other applicable agreements previously agreed to with Siemens (hereinafter "License Terms"). To the extent applicable to information, software or documentation made available in or through a Siemens Security Advisory, the Terms of Use of Siemens' Global Website (https://www.siemens.com/terms_of_use, hereinafter "Terms of Use"), in particular Sections 8-10 of the Terms of Use, shall apply additionally. In case of conflicts, the License Terms shall prevail over the Terms of Use.
{ document: { category: "csaf_security_advisory", csaf_version: "2.0", distribution: { text: "Disclosure is not limited. (TLPv2: TLP:CLEAR)", tlp: { label: "WHITE", }, }, lang: "en", notes: [ { category: "summary", text: "Multiple vulnerabilities have been identified in the BIOS of the SIMATIC S7-1500 TM MFP before V1.3.0.\n\nSiemens has released a new version for SIMATIC S7-1500 TM MFP - BIOS and recommends to update to the latest version.", title: "Summary", }, { category: "general", text: "As a general security measure, Siemens strongly recommends to protect network access to devices with appropriate mechanisms. In order to operate the devices in a protected IT environment, Siemens recommends to configure the environment according to Siemens' operational guidelines for Industrial Security (Download: \nhttps://www.siemens.com/cert/operational-guidelines-industrial-security), and to follow the recommendations in the product manuals.\nAdditional information on Industrial Security by Siemens can be found at: https://www.siemens.com/industrialsecurity", title: "General Recommendations", }, { category: "general", text: "For further inquiries on security vulnerabilities in Siemens products and solutions, please contact the Siemens ProductCERT: https://www.siemens.com/cert/advisories", title: "Additional Resources", }, { category: "legal_disclaimer", text: "Siemens Security Advisories are subject to the terms and conditions contained in Siemens' underlying license terms or other applicable agreements previously agreed to with Siemens (hereinafter \"License Terms\"). To the extent applicable to information, software or documentation made available in or through a Siemens Security Advisory, the Terms of Use of Siemens' Global Website (https://www.siemens.com/terms_of_use, hereinafter \"Terms of Use\"), in particular Sections 8-10 of the Terms of Use, shall apply additionally. In case of conflicts, the License Terms shall prevail over the Terms of Use.", title: "Terms of Use", }, ], publisher: { category: "vendor", contact_details: "productcert@siemens.com", name: "Siemens ProductCERT", namespace: "https://www.siemens.com", }, references: [ { category: "self", summary: "SSA-831302: Vulnerabilities in the BIOS of the SIMATIC S7-1500 TM MFP before V1.3.0 - HTML Version", url: "https://cert-portal.siemens.com/productcert/html/ssa-831302.html", }, { category: "self", summary: "SSA-831302: Vulnerabilities in the BIOS of the SIMATIC S7-1500 TM MFP before V1.3.0 - CSAF Version", url: "https://cert-portal.siemens.com/productcert/csaf/ssa-831302.json", }, { category: "self", summary: "SSA-831302: Vulnerabilities in the BIOS of the SIMATIC S7-1500 TM MFP before V1.3.0 - PDF Version", url: "https://cert-portal.siemens.com/productcert/pdf/ssa-831302.pdf", }, { category: "self", summary: "SSA-831302: Vulnerabilities in the BIOS of the SIMATIC S7-1500 TM MFP before V1.3.0 - TXT Version", url: "https://cert-portal.siemens.com/productcert/txt/ssa-831302.txt", }, ], title: "SSA-831302: Vulnerabilities in the BIOS of the SIMATIC S7-1500 TM MFP before V1.3.0", tracking: { current_release_date: "2024-04-09T00:00:00Z", generator: { engine: { name: "Siemens ProductCERT CSAF Generator", version: "1", }, }, id: "SSA-831302", initial_release_date: "2023-06-13T00:00:00Z", revision_history: [ { date: "2023-06-13T00:00:00Z", legacy_version: "1.0", number: "1", summary: "Publication Date", }, { date: "2023-09-12T00:00:00Z", legacy_version: "1.1", number: "2", summary: "Added CVE-2022-1015, CVE-2023-2898, CVE-2023-31248, CVE-2023-3390, CVE-2023-35001, CVE-2023-3610, CVE-2023-3611, CVE-2023-3776, CVE-2023-4004, CVE-2023-4015, CVE-2023-4128, CVE-2023-4147, CVE-2023-4273", }, { date: "2023-11-14T00:00:00Z", legacy_version: "1.2", number: "3", summary: "Added CVE-2023-4527, CVE-2023-4806, CVE-2023-4911, CVE-2023-5156", }, { date: "2023-12-12T00:00:00Z", legacy_version: "1.3", number: "4", summary: "Added CVE-2021-44879, CVE-2023-45863", }, { date: "2024-04-09T00:00:00Z", legacy_version: "1.4", number: "5", summary: "Added fix for SIMATIC S7-1500 TM MFP - BIOS", }, ], status: "interim", version: "5", }, }, product_tree: { branches: [ { branches: [ { branches: [ { category: "product_version_range", name: "<V1.3.0", product: { name: "SIMATIC S7-1500 TM MFP - BIOS", product_id: "1", }, }, ], category: "product_name", name: "SIMATIC S7-1500 TM MFP - BIOS", }, ], category: "vendor", name: "Siemens", }, ], }, vulnerabilities: [ { cve: "CVE-2016-10228", cwe: { id: "CWE-20", name: "Improper Input Validation", }, notes: [ { category: "summary", text: "The iconv program in the GNU C Library (aka glibc or libc6) 2.31 and earlier, when invoked with multiple suffixes in the destination encoding (TRANSLATE or IGNORE) along with the -c option, enters an infinite loop when processing invalid multi-byte input sequences, leading to a denial of service.", title: "Summary", }, ], product_status: { known_affected: [ "1", ], }, remediations: [ { category: "vendor_fix", details: "Update to V1.3.0 or later version", product_ids: [ "1", ], url: "https://support.industry.siemens.com/cs/ww/en/view/109945851/", }, { category: "workaround", details: "Only build and run applications from trusted sources", product_ids: [ "1", ], }, ], scores: [ { cvss_v3: { baseScore: 5.9, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C", version: "3.1", }, products: [ "1", ], }, ], title: "CVE-2016-10228", }, { cve: "CVE-2019-25013", cwe: { id: "CWE-125", name: "Out-of-bounds Read", }, notes: [ { category: "summary", text: "The iconv feature in the GNU C Library (aka glibc or libc6) through 2.32, when processing invalid multi-byte input sequences in the EUC-KR encoding, may have a buffer over-read.", title: "Summary", }, ], product_status: { known_affected: [ "1", ], }, remediations: [ { category: "vendor_fix", details: "Update to V1.3.0 or later version", product_ids: [ "1", ], url: "https://support.industry.siemens.com/cs/ww/en/view/109945851/", }, { category: "workaround", details: "Only build and run applications from trusted sources", product_ids: [ "1", ], }, ], scores: [ { cvss_v3: { baseScore: 5.9, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C", version: "3.1", }, products: [ "1", ], }, ], title: "CVE-2019-25013", }, { cve: "CVE-2020-1752", cwe: { id: "CWE-416", name: "Use After Free", }, notes: [ { category: "summary", text: "A use-after-free vulnerability introduced in glibc upstream version 2.14 was found in the way the tilde expansion was carried out. Directory paths containing an initial tilde followed by a valid username were affected by this issue. A local attacker could exploit this flaw by creating a specially crafted path that, when processed by the glob function, would potentially lead to arbitrary code execution. This was fixed in version 2.32.", title: "Summary", }, ], product_status: { known_affected: [ "1", ], }, remediations: [ { category: "vendor_fix", details: "Update to V1.3.0 or later version", product_ids: [ "1", ], url: "https://support.industry.siemens.com/cs/ww/en/view/109945851/", }, { category: "workaround", details: "Only build and run applications from trusted sources", product_ids: [ "1", ], }, ], scores: [ { cvss_v3: { baseScore: 7, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C", version: "3.1", }, products: [ "1", ], }, ], title: "CVE-2020-1752", }, { cve: "CVE-2020-10029", cwe: { id: "CWE-787", name: "Out-of-bounds Write", }, notes: [ { category: "summary", text: "The GNU C Library (aka glibc or libc6) before 2.32 could overflow an on-stack buffer during range reduction if an input to an 80-bit long double function contains a non-canonical bit pattern, a seen when passing a 0x5d414141414141410000 value to sinl on x86 targets. This is related to sysdeps/ieee754/ldbl-96/e_rem_pio2l.c.", title: "Summary", }, ], product_status: { known_affected: [ "1", ], }, remediations: [ { category: "vendor_fix", details: "Update to V1.3.0 or later version", product_ids: [ "1", ], url: "https://support.industry.siemens.com/cs/ww/en/view/109945851/", }, { category: "workaround", details: "Only build and run applications from trusted sources", product_ids: [ "1", ], }, ], scores: [ { cvss_v3: { baseScore: 5.5, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C", version: "3.1", }, products: [ "1", ], }, ], title: "CVE-2020-10029", }, { cve: "CVE-2020-27618", cwe: { id: "CWE-835", name: "Loop with Unreachable Exit Condition ('Infinite Loop')", }, notes: [ { category: "summary", text: "The iconv function in the GNU C Library (aka glibc or libc6) 2.32 and earlier, when processing invalid multi-byte input sequences in IBM1364, IBM1371, IBM1388, IBM1390, and IBM1399 encodings, fails to advance the input state, which could lead to an infinite loop in applications, resulting in a denial of service, a different vulnerability from CVE-2016-10228.", title: "Summary", }, ], product_status: { known_affected: [ "1", ], }, remediations: [ { category: "vendor_fix", details: "Update to V1.3.0 or later version", product_ids: [ "1", ], url: "https://support.industry.siemens.com/cs/ww/en/view/109945851/", }, { category: "workaround", details: "Only build and run applications from trusted sources", product_ids: [ "1", ], }, ], scores: [ { cvss_v3: { baseScore: 5.5, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C", version: "3.1", }, products: [ "1", ], }, ], title: "CVE-2020-27618", }, { cve: "CVE-2020-29562", cwe: { id: "CWE-617", name: "Reachable Assertion", }, notes: [ { category: "summary", text: "The iconv function in the GNU C Library (aka glibc or libc6) 2.30 to 2.32, when converting UCS4 text containing an irreversible character, fails an assertion in the code path and aborts the program, potentially resulting in a denial of service.", title: "Summary", }, ], product_status: { known_affected: [ "1", ], }, remediations: [ { category: "vendor_fix", details: "Update to V1.3.0 or later version", product_ids: [ "1", ], url: "https://support.industry.siemens.com/cs/ww/en/view/109945851/", }, { category: "workaround", details: "Only build and run applications from trusted sources", product_ids: [ "1", ], }, ], scores: [ { cvss_v3: { baseScore: 4.8, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C", version: "3.1", }, products: [ "1", ], }, ], title: "CVE-2020-29562", }, { cve: "CVE-2021-3326", cwe: { id: "CWE-617", name: "Reachable Assertion", }, notes: [ { category: "summary", text: "The iconv function in the GNU C Library (aka glibc or libc6) 2.32 and earlier, when processing invalid input sequences in the ISO-2022-JP-3 encoding, fails an assertion in the code path and aborts the program, potentially resulting in a denial of service.", title: "Summary", }, ], product_status: { known_affected: [ "1", ], }, remediations: [ { category: "vendor_fix", details: "Update to V1.3.0 or later version", product_ids: [ "1", ], url: "https://support.industry.siemens.com/cs/ww/en/view/109945851/", }, { category: "workaround", details: "Only build and run applications from trusted sources", product_ids: [ "1", ], }, ], scores: [ { cvss_v3: { baseScore: 7.5, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C", version: "3.1", }, products: [ "1", ], }, ], title: "CVE-2021-3326", }, { cve: "CVE-2021-3998", cwe: { id: "CWE-125", name: "Out-of-bounds Read", }, notes: [ { category: "summary", text: "A flaw was found in glibc. The realpath() function can mistakenly return an unexpected value, potentially leading to information leakage and disclosure of sensitive data.", title: "Summary", }, ], product_status: { known_affected: [ "1", ], }, remediations: [ { category: "vendor_fix", details: "Update to V1.3.0 or later version", product_ids: [ "1", ], url: "https://support.industry.siemens.com/cs/ww/en/view/109945851/", }, { category: "workaround", details: "Only build and run applications from trusted sources", product_ids: [ "1", ], }, ], scores: [ { cvss_v3: { baseScore: 7.5, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N/E:P/RL:O/RC:C", version: "3.1", }, products: [ "1", ], }, ], title: "CVE-2021-3998", }, { cve: "CVE-2021-3999", cwe: { id: "CWE-193", name: "Off-by-one Error", }, notes: [ { category: "summary", text: "A flaw was found in glibc. An off-by-one buffer overflow and underflow in getcwd() may lead to memory corruption when the size of the buffer is exactly 1. A local attacker who can control the input buffer and size passed to getcwd() in a setuid program could use this flaw to potentially execute arbitrary code and escalate their privileges on the system.", title: "Summary", }, ], product_status: { known_affected: [ "1", ], }, remediations: [ { category: "vendor_fix", details: "Update to V1.3.0 or later version", product_ids: [ "1", ], url: "https://support.industry.siemens.com/cs/ww/en/view/109945851/", }, { category: "workaround", details: "Only build and run applications from trusted sources", product_ids: [ "1", ], }, ], scores: [ { cvss_v3: { baseScore: 7.8, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C", version: "3.1", }, products: [ "1", ], }, ], title: "CVE-2021-3999", }, { cve: "CVE-2021-20269", cwe: { id: "CWE-276", name: "Incorrect Default Permissions", }, notes: [ { category: "summary", text: "A flaw was found in the permissions of a log file created by kexec-tools. This flaw allows a local unprivileged user to read this file and leak kernel internal information from a previous panic. The highest threat from this vulnerability is to confidentiality. This flaw affects kexec-tools shipped by Fedora versions prior to 2.0.21-8 and RHEL versions prior to 2.0.20-47.", title: "Summary", }, ], product_status: { known_affected: [ "1", ], }, remediations: [ { category: "vendor_fix", details: "Update to V1.3.0 or later version", product_ids: [ "1", ], url: "https://support.industry.siemens.com/cs/ww/en/view/109945851/", }, { category: "workaround", details: "Only build and run applications from trusted sources", product_ids: [ "1", ], }, ], scores: [ { cvss_v3: { baseScore: 5.5, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:P/RL:O/RC:C", version: "3.1", }, products: [ "1", ], }, ], title: "CVE-2021-20269", }, { cve: "CVE-2021-27645", cwe: { id: "CWE-415", name: "Double Free", }, notes: [ { category: "summary", text: "The nameserver caching daemon (nscd) in the GNU C Library (aka glibc or libc6) 2.29 through 2.33, when processing a request for netgroup lookup, may crash due to a double-free, potentially resulting in degraded service or Denial of Service on the local system. This is related to netgroupcache.c.", title: "Summary", }, ], product_status: { known_affected: [ "1", ], }, remediations: [ { category: "vendor_fix", details: "Update to V1.3.0 or later version", product_ids: [ "1", ], url: "https://support.industry.siemens.com/cs/ww/en/view/109945851/", }, { category: "workaround", details: "Only build and run applications from trusted sources", product_ids: [ "1", ], }, ], scores: [ { cvss_v3: { baseScore: 2.5, baseSeverity: "LOW", vectorString: "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:L/E:P/RL:O/RC:C", version: "3.1", }, products: [ "1", ], }, ], title: "CVE-2021-27645", }, { cve: "CVE-2021-28831", cwe: { id: "CWE-755", name: "Improper Handling of Exceptional Conditions", }, notes: [ { category: "summary", text: "decompress_gunzip.c in BusyBox through 1.32.1 mishandles the error bit on the huft_build result pointer, with a resultant invalid free or segmentation fault, via malformed gzip data.", title: "Summary", }, ], product_status: { known_affected: [ "1", ], }, remediations: [ { category: "vendor_fix", details: "Update to V1.3.0 or later version", product_ids: [ "1", ], url: "https://support.industry.siemens.com/cs/ww/en/view/109945851/", }, { category: "workaround", details: "Only build and run applications from trusted sources", product_ids: [ "1", ], }, ], scores: [ { cvss_v3: { baseScore: 7.5, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C", version: "3.1", }, products: [ "1", ], }, ], title: "CVE-2021-28831", }, { cve: "CVE-2021-33574", cwe: { id: "CWE-416", name: "Use After Free", }, notes: [ { category: "summary", text: "The mq_notify function in the GNU C Library (aka glibc) versions 2.32 and 2.33 has a use-after-free. It may use the notification thread attributes object (passed through its struct sigevent parameter) after it has been freed by the caller, leading to a denial of service (application crash) or possibly unspecified other impact.", title: "Summary", }, ], product_status: { known_affected: [ "1", ], }, remediations: [ { category: "vendor_fix", details: "Update to V1.3.0 or later version", product_ids: [ "1", ], url: "https://support.industry.siemens.com/cs/ww/en/view/109945851/", }, { category: "workaround", details: "Only build and run applications from trusted sources", product_ids: [ "1", ], }, ], scores: [ { cvss_v3: { baseScore: 9.8, baseSeverity: "CRITICAL", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C", version: "3.1", }, products: [ "1", ], }, ], title: "CVE-2021-33574", }, { cve: "CVE-2021-35942", cwe: { id: "CWE-190", name: "Integer Overflow or Wraparound", }, notes: [ { category: "summary", text: "The wordexp function in the GNU C Library (aka glibc) through 2.33 may crash or read arbitrary memory in parse_param (in posix/wordexp.c) when called with an untrusted, crafted pattern, potentially resulting in a denial of service or disclosure of information. This occurs because atoi was used but strtoul should have been used to ensure correct calculations.", title: "Summary", }, ], product_status: { known_affected: [ "1", ], }, remediations: [ { category: "vendor_fix", details: "Update to V1.3.0 or later version", product_ids: [ "1", ], url: "https://support.industry.siemens.com/cs/ww/en/view/109945851/", }, { category: "workaround", details: "Only build and run applications from trusted sources", product_ids: [ "1", ], }, ], scores: [ { cvss_v3: { baseScore: 9.1, baseSeverity: "CRITICAL", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H/E:P/RL:O/RC:C", version: "3.1", }, products: [ "1", ], }, ], title: "CVE-2021-35942", }, { cve: "CVE-2021-38604", cwe: { id: "CWE-476", name: "NULL Pointer Dereference", }, notes: [ { category: "summary", text: "In librt in the GNU C Library (aka glibc) through 2.34, sysdeps/unix/sysv/linux/mq_notify.c mishandles certain NOTIFY_REMOVED data, leading to a NULL pointer dereference. NOTE: this vulnerability was introduced as a side effect of the CVE-2021-33574 fix.", title: "Summary", }, ], product_status: { known_affected: [ "1", ], }, remediations: [ { category: "vendor_fix", details: "Update to V1.3.0 or later version", product_ids: [ "1", ], url: "https://support.industry.siemens.com/cs/ww/en/view/109945851/", }, { category: "workaround", details: "Only build and run applications from trusted sources", product_ids: [ "1", ], }, ], scores: [ { cvss_v3: { baseScore: 7.5, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C", version: "3.1", }, products: [ "1", ], }, ], title: "CVE-2021-38604", }, { cve: "CVE-2021-42373", cwe: { id: "CWE-476", name: "NULL Pointer Dereference", }, notes: [ { category: "summary", text: "A NULL pointer dereference in Busybox's man applet leads to denial of service when a section name is supplied but no page argument is given.", title: "Summary", }, ], product_status: { known_affected: [ "1", ], }, remediations: [ { category: "vendor_fix", details: "Update to V1.3.0 or later version", product_ids: [ "1", ], url: "https://support.industry.siemens.com/cs/ww/en/view/109945851/", }, { category: "workaround", details: "Only build and run applications from trusted sources", product_ids: [ "1", ], }, ], scores: [ { cvss_v3: { baseScore: 5.1, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C", version: "3.1", }, products: [ "1", ], }, ], title: "CVE-2021-42373", }, { cve: "CVE-2021-42374", cwe: { id: "CWE-125", name: "Out-of-bounds Read", }, notes: [ { category: "summary", text: "An out-of-bounds heap read in Busybox's unlzma applet leads to information leak and denial of service when crafted LZMA-compressed input is decompressed. This can be triggered by any applet/format that internally supports LZMA compression.", title: "Summary", }, ], product_status: { known_affected: [ "1", ], }, remediations: [ { category: "vendor_fix", details: "Update to V1.3.0 or later version", product_ids: [ "1", ], url: "https://support.industry.siemens.com/cs/ww/en/view/109945851/", }, { category: "workaround", details: "Only build and run applications from trusted sources", product_ids: [ "1", ], }, ], scores: [ { cvss_v3: { baseScore: 6.5, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:H/E:P/RL:O/RC:C", version: "3.1", }, products: [ "1", ], }, ], title: "CVE-2021-42374", }, { cve: "CVE-2021-42375", cwe: { id: "CWE-20", name: "Improper Input Validation", }, notes: [ { category: "summary", text: "An incorrect handling of a special element in Busybox's ash applet leads to denial of service when processing a crafted shell command, due to the shell mistaking specific characters for reserved characters. This may be used for DoS under rare conditions of filtered command input.", title: "Summary", }, ], product_status: { known_affected: [ "1", ], }, remediations: [ { category: "vendor_fix", details: "Update to V1.3.0 or later version", product_ids: [ "1", ], url: "https://support.industry.siemens.com/cs/ww/en/view/109945851/", }, { category: "workaround", details: "Only build and run applications from trusted sources", product_ids: [ "1", ], }, ], scores: [ { cvss_v3: { baseScore: 4.1, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C", version: "3.1", }, products: [ "1", ], }, ], title: "CVE-2021-42375", }, { cve: "CVE-2021-42376", cwe: { id: "CWE-476", name: "NULL Pointer Dereference", }, notes: [ { category: "summary", text: "A NULL pointer dereference in Busybox's hush applet leads to denial of service when processing a crafted shell command, due to missing validation after a \\x03 delimiter character. This may be used for DoS under very rare conditions of filtered command input.", title: "Summary", }, ], product_status: { known_affected: [ "1", ], }, remediations: [ { category: "vendor_fix", details: "Update to V1.3.0 or later version", product_ids: [ "1", ], url: "https://support.industry.siemens.com/cs/ww/en/view/109945851/", }, { category: "workaround", details: "Only build and run applications from trusted sources", product_ids: [ "1", ], }, ], scores: [ { cvss_v3: { baseScore: 4.1, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C", version: "3.1", }, products: [ "1", ], }, ], title: "CVE-2021-42376", }, { cve: "CVE-2021-42377", cwe: { id: "CWE-763", name: "Release of Invalid Pointer or Reference", }, notes: [ { category: "summary", text: "An attacker-controlled pointer free in Busybox's hush applet leads to denial of service and possible code execution when processing a crafted shell command, due to the shell mishandling the &&& string. This may be used for remote code execution under rare conditions of filtered command input.", title: "Summary", }, ], product_status: { known_affected: [ "1", ], }, remediations: [ { category: "vendor_fix", details: "Update to V1.3.0 or later version", product_ids: [ "1", ], url: "https://support.industry.siemens.com/cs/ww/en/view/109945851/", }, { category: "workaround", details: "Only build and run applications from trusted sources", product_ids: [ "1", ], }, ], scores: [ { cvss_v3: { baseScore: 6.4, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C", version: "3.1", }, products: [ "1", ], }, ], title: "CVE-2021-42377", }, { cve: "CVE-2021-42378", cwe: { id: "CWE-416", name: "Use After Free", }, notes: [ { category: "summary", text: "A use-after-free in Busybox's awk applet leads to denial of service and possibly code execution when processing a crafted awk pattern in the getvar_i function.", title: "Summary", }, ], product_status: { known_affected: [ "1", ], }, remediations: [ { category: "vendor_fix", details: "Update to V1.3.0 or later version", product_ids: [ "1", ], url: "https://support.industry.siemens.com/cs/ww/en/view/109945851/", }, { category: "workaround", details: "Only build and run applications from trusted sources", product_ids: [ "1", ], }, ], scores: [ { cvss_v3: { baseScore: 6.6, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C", version: "3.1", }, products: [ "1", ], }, ], title: "CVE-2021-42378", }, { cve: "CVE-2021-42379", cwe: { id: "CWE-416", name: "Use After Free", }, notes: [ { category: "summary", text: "A use-after-free in Busybox's awk applet leads to denial of service and possibly code execution when processing a crafted awk pattern in the next_input_file function.", title: "Summary", }, ], product_status: { known_affected: [ "1", ], }, remediations: [ { category: "vendor_fix", details: "Update to V1.3.0 or later version", product_ids: [ "1", ], url: "https://support.industry.siemens.com/cs/ww/en/view/109945851/", }, { category: "workaround", details: "Only build and run applications from trusted sources", product_ids: [ "1", ], }, ], scores: [ { cvss_v3: { baseScore: 6.6, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C", version: "3.1", }, products: [ "1", ], }, ], title: "CVE-2021-42379", }, { cve: "CVE-2021-42380", cwe: { id: "CWE-416", name: "Use After Free", }, notes: [ { category: "summary", text: "A use-after-free in awk leads to denial of service and possibly code execution when processing a crafted awk pattern in the clrvar function.", title: "Summary", }, ], product_status: { known_affected: [ "1", ], }, remediations: [ { category: "vendor_fix", details: "Update to V1.3.0 or later version", product_ids: [ "1", ], url: "https://support.industry.siemens.com/cs/ww/en/view/109945851/", }, { category: "workaround", details: "Only build and run applications from trusted sources", product_ids: [ "1", ], }, ], scores: [ { cvss_v3: { baseScore: 6.6, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C", version: "3.1", }, products: [ "1", ], }, ], title: "CVE-2021-42380", }, { cve: "CVE-2021-42381", cwe: { id: "CWE-416", name: "Use After Free", }, notes: [ { category: "summary", text: "A use-after-free in awk leads to denial of service and possibly code execution when processing a crafted awk pattern in the hash_init function.", title: "Summary", }, ], product_status: { known_affected: [ "1", ], }, remediations: [ { category: "vendor_fix", details: "Update to V1.3.0 or later version", product_ids: [ "1", ], url: "https://support.industry.siemens.com/cs/ww/en/view/109945851/", }, { category: "workaround", details: "Only build and run applications from trusted sources", product_ids: [ "1", ], }, ], scores: [ { cvss_v3: { baseScore: 6.6, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C", version: "3.1", }, products: [ "1", ], }, ], title: "CVE-2021-42381", }, { cve: "CVE-2021-42382", cwe: { id: "CWE-416", name: "Use After Free", }, notes: [ { category: "summary", text: "A use-after-free in awk leads to denial of service and possibly code execution when processing a crafted awk pattern in the getvar_s function.", title: "Summary", }, ], product_status: { known_affected: [ "1", ], }, remediations: [ { category: "vendor_fix", details: "Update to V1.3.0 or later version", product_ids: [ "1", ], url: "https://support.industry.siemens.com/cs/ww/en/view/109945851/", }, { category: "workaround", details: "Only build and run applications from trusted sources", product_ids: [ "1", ], }, ], scores: [ { cvss_v3: { baseScore: 6.6, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C", version: "3.1", }, products: [ "1", ], }, ], title: "CVE-2021-42382", }, { cve: "CVE-2021-42383", cwe: { id: "CWE-416", name: "Use After Free", }, notes: [ { category: "summary", text: "A use-after-free in awk leads to denial of service and possibly code execution when processing a crafted awk pattern in the evaluate function.", title: "Summary", }, ], product_status: { known_affected: [ "1", ], }, remediations: [ { category: "vendor_fix", details: "Update to V1.3.0 or later version", product_ids: [ "1", ], url: "https://support.industry.siemens.com/cs/ww/en/view/109945851/", }, { category: "workaround", details: "Only build and run applications from trusted sources", product_ids: [ "1", ], }, ], scores: [ { cvss_v3: { baseScore: 6.6, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C", version: "3.1", }, products: [ "1", ], }, ], title: "CVE-2021-42383", }, { cve: "CVE-2021-42384", cwe: { id: "CWE-416", name: "Use After Free", }, notes: [ { category: "summary", text: "A use-after-free in Busybox's awk applet leads to denial of service and possibly code execution when processing a crafted awk pattern in the handle_special function.", title: "Summary", }, ], product_status: { known_affected: [ "1", ], }, remediations: [ { category: "vendor_fix", details: "Update to V1.3.0 or later version", product_ids: [ "1", ], url: "https://support.industry.siemens.com/cs/ww/en/view/109945851/", }, { category: "workaround", details: "Only build and run applications from trusted sources", product_ids: [ "1", ], }, ], scores: [ { cvss_v3: { baseScore: 6.6, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C", version: "3.1", }, products: [ "1", ], }, ], title: "CVE-2021-42384", }, { cve: "CVE-2021-42385", cwe: { id: "CWE-416", name: "Use After Free", }, notes: [ { category: "summary", text: "A use-after-free in awk leads to denial of service and possibly code execution when processing a crafted awk pattern in the evaluate function.", title: "Summary", }, ], product_status: { known_affected: [ "1", ], }, remediations: [ { category: "vendor_fix", details: "Update to V1.3.0 or later version", product_ids: [ "1", ], url: "https://support.industry.siemens.com/cs/ww/en/view/109945851/", }, { category: "workaround", details: "Only build and run applications from trusted sources", product_ids: [ "1", ], }, ], scores: [ { cvss_v3: { baseScore: 6.6, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C", version: "3.1", }, products: [ "1", ], }, ], title: "CVE-2021-42385", }, { cve: "CVE-2021-42386", cwe: { id: "CWE-416", name: "Use After Free", }, notes: [ { category: "summary", text: "A use-after-free in awk leads to denial of service and possibly code execution when processing a crafted awk pattern in the nvalloc function.", title: "Summary", }, ], product_status: { known_affected: [ "1", ], }, remediations: [ { category: "vendor_fix", details: "Update to V1.3.0 or later version", product_ids: [ "1", ], url: "https://support.industry.siemens.com/cs/ww/en/view/109945851/", }, { category: "workaround", details: "Only build and run applications from trusted sources", product_ids: [ "1", ], }, ], scores: [ { cvss_v3: { baseScore: 6.6, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C", version: "3.1", }, products: [ "1", ], }, ], title: "CVE-2021-42386", }, { cve: "CVE-2021-44879", cwe: { id: "CWE-476", name: "NULL Pointer Dereference", }, notes: [ { category: "summary", text: "In gc_data_segment in fs/f2fs/gc.c in the Linux kernel before 5.16.3, special files are not considered, leading to a move_data_page NULL pointer dereference.", title: "Summary", }, ], product_status: { known_affected: [ "1", ], }, remediations: [ { category: "vendor_fix", details: "Update to V1.3.0 or later version", product_ids: [ "1", ], url: "https://support.industry.siemens.com/cs/ww/en/view/109945851/", }, { category: "workaround", details: "Only build and run applications from trusted sources", product_ids: [ "1", ], }, ], scores: [ { cvss_v3: { baseScore: 5.5, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C", version: "3.1", }, products: [ "1", ], }, ], title: "CVE-2021-44879", }, { cve: "CVE-2022-1015", cwe: { id: "CWE-787", name: "Out-of-bounds Write", }, notes: [ { category: "summary", text: "A flaw was found in the Linux kernel in linux/net/netfilter/nf_tables_api.c of the netfilter subsystem. This flaw allows a local user to cause an out-of-bounds write issue.", title: "Summary", }, ], product_status: { known_affected: [ "1", ], }, remediations: [ { category: "vendor_fix", details: "Update to V1.3.0 or later version", product_ids: [ "1", ], url: "https://support.industry.siemens.com/cs/ww/en/view/109945851/", }, { category: "workaround", details: "Only build and run applications from trusted sources", product_ids: [ "1", ], }, ], scores: [ { cvss_v3: { baseScore: 6.6, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H/E:P/RL:O/RC:C", version: "3.1", }, products: [ "1", ], }, ], title: "CVE-2022-1015", }, { cve: "CVE-2022-1882", cwe: { id: "CWE-416", name: "Use After Free", }, notes: [ { category: "summary", text: "A use-after-free flaw was found in the Linux kernel’s pipes functionality in how a user performs manipulations with the pipe post_one_notification() after free_pipe_info() that is already called. This flaw allows a local user to crash or potentially escalate their privileges on the system.", title: "Summary", }, ], product_status: { known_affected: [ "1", ], }, remediations: [ { category: "vendor_fix", details: "Update to V1.3.0 or later version", product_ids: [ "1", ], url: "https://support.industry.siemens.com/cs/ww/en/view/109945851/", }, { category: "workaround", details: "Only build and run applications from trusted sources", product_ids: [ "1", ], }, ], scores: [ { cvss_v3: { baseScore: 7.8, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C", version: "3.1", }, products: [ "1", ], }, ], title: "CVE-2022-1882", }, { cve: "CVE-2022-2585", cwe: { id: "CWE-416", name: "Use After Free", }, notes: [ { category: "summary", text: "A use-after-free flaw was found in the Linux kernel’s POSIX CPU timers functionality in the way a user creates and then deletes the timer in the non-leader thread of the program. This flaw allows a local user to crash or potentially escalate their privileges on the system.", title: "Summary", }, ], product_status: { known_affected: [ "1", ], }, remediations: [ { category: "vendor_fix", details: "Update to V1.3.0 or later version", product_ids: [ "1", ], url: "https://support.industry.siemens.com/cs/ww/en/view/109945851/", }, { category: "workaround", details: "Only build and run applications from trusted sources", product_ids: [ "1", ], }, ], scores: [ { cvss_v3: { baseScore: 7.8, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C", version: "3.1", }, products: [ "1", ], }, ], title: "CVE-2022-2585", }, { cve: "CVE-2022-2588", cwe: { id: "CWE-20", name: "Improper Input Validation", }, notes: [ { category: "summary", text: "Zhenpeng Lin discovered that the network packet scheduler implementation in the Linux kernel did not properly remove all references to a route filter before freeing it in some situations. A local attacker could use this to cause a denial of service (system crash) or execute arbitrary code.", title: "Summary", }, ], product_status: { known_affected: [ "1", ], }, remediations: [ { category: "vendor_fix", details: "Update to V1.3.0 or later version", product_ids: [ "1", ], url: "https://support.industry.siemens.com/cs/ww/en/view/109945851/", }, { category: "workaround", details: "Only build and run applications from trusted sources", product_ids: [ "1", ], }, ], scores: [ { cvss_v3: { baseScore: 7.8, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C", version: "3.1", }, products: [ "1", ], }, ], title: "CVE-2022-2588", }, { cve: "CVE-2022-2905", cwe: { id: "CWE-125", name: "Out-of-bounds Read", }, notes: [ { category: "summary", text: "An out-of-bounds memory read flaw was found in the Linux kernel's BPF subsystem in how a user calls the bpf_tail_call function with a key larger than the max_entries of the map. This flaw allows a local user to gain unauthorized access to data.", title: "Summary", }, ], product_status: { known_affected: [ "1", ], }, remediations: [ { category: "vendor_fix", details: "Update to V1.3.0 or later version", product_ids: [ "1", ], url: "https://support.industry.siemens.com/cs/ww/en/view/109945851/", }, { category: "workaround", details: "Only build and run applications from trusted sources", product_ids: [ "1", ], }, ], scores: [ { cvss_v3: { baseScore: 5.5, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:P/RL:O/RC:C", version: "3.1", }, products: [ "1", ], }, ], title: "CVE-2022-2905", }, { cve: "CVE-2022-3028", cwe: { id: "CWE-362", name: "Concurrent Execution using Shared Resource with Improper Synchronization ('Race Condition')", }, notes: [ { category: "summary", text: "A race condition was found in the Linux kernel's IP framework for transforming packets (XFRM subsystem) when multiple calls to xfrm_probe_algs occurred simultaneously. This flaw could allow a local attacker to potentially trigger an out-of-bounds write or leak kernel heap memory by performing an out-of-bounds read and copying it into a socket.", title: "Summary", }, ], product_status: { known_affected: [ "1", ], }, remediations: [ { category: "vendor_fix", details: "Update to V1.3.0 or later version", product_ids: [ "1", ], url: "https://support.industry.siemens.com/cs/ww/en/view/109945851/", }, { category: "workaround", details: "Only build and run applications from trusted sources", product_ids: [ "1", ], }, ], scores: [ { cvss_v3: { baseScore: 7, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C", version: "3.1", }, products: [ "1", ], }, ], title: "CVE-2022-3028", }, { cve: "CVE-2022-3435", cwe: { id: "CWE-119", name: "Improper Restriction of Operations within the Bounds of a Memory Buffer", }, notes: [ { category: "summary", text: "A vulnerability classified as problematic has been found in Linux Kernel. This affects the function fib_nh_match of the file net/ipv4/fib_semantics.c of the component IPv4 Handler. The manipulation leads to out-of-bounds read. It is possible to initiate the attack remotely. It is recommended to apply a patch to fix this issue. The identifier VDB-210357 was assigned to this vulnerability.", title: "Summary", }, ], product_status: { known_affected: [ "1", ], }, remediations: [ { category: "vendor_fix", details: "Update to V1.3.0 or later version", product_ids: [ "1", ], url: "https://support.industry.siemens.com/cs/ww/en/view/109945851/", }, { category: "workaround", details: "Only build and run applications from trusted sources", product_ids: [ "1", ], }, ], scores: [ { cvss_v3: { baseScore: 4.3, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N/E:P/RL:O/RC:C", version: "3.1", }, products: [ "1", ], }, ], title: "CVE-2022-3435", }, { cve: "CVE-2022-3586", cwe: { id: "CWE-416", name: "Use After Free", }, notes: [ { category: "summary", text: "A flaw was found in the Linux kernel’s networking code. A use-after-free was found in the way the sch_sfb enqueue function used the socket buffer (SKB) cb field after the same SKB had been enqueued (and freed) into a child qdisc. This flaw allows a local, unprivileged user to crash the system, causing a denial of service.", title: "Summary", }, ], product_status: { known_affected: [ "1", ], }, remediations: [ { category: "vendor_fix", details: "Update to V1.3.0 or later version", product_ids: [ "1", ], url: "https://support.industry.siemens.com/cs/ww/en/view/109945851/", }, { category: "workaround", details: "Only build and run applications from trusted sources", product_ids: [ "1", ], }, ], scores: [ { cvss_v3: { baseScore: 5.5, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C", version: "3.1", }, products: [ "1", ], }, ], title: "CVE-2022-3586", }, { cve: "CVE-2022-4378", cwe: { id: "CWE-787", name: "Out-of-bounds Write", }, notes: [ { category: "summary", text: "A stack overflow flaw was found in the Linux kernel's SYSCTL subsystem in how a user changes certain kernel parameters and variables. This flaw allows a local user to crash or potentially escalate their privileges on the system.", title: "Summary", }, ], product_status: { known_affected: [ "1", ], }, remediations: [ { category: "vendor_fix", details: "Update to V1.3.0 or later version", product_ids: [ "1", ], url: "https://support.industry.siemens.com/cs/ww/en/view/109945851/", }, { category: "workaround", details: "Only build and run applications from trusted sources", product_ids: [ "1", ], }, ], scores: [ { cvss_v3: { baseScore: 7.8, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C", version: "3.1", }, products: [ "1", ], }, ], title: "CVE-2022-4378", }, { cve: "CVE-2022-4662", cwe: { id: "CWE-455", name: "Non-exit on Failed Initialization", }, notes: [ { category: "summary", text: "A flaw incorrect access control in the Linux kernel USB core subsystem was found in the way user attaches usb device. A local user could use this flaw to crash the system.", title: "Summary", }, ], product_status: { known_affected: [ "1", ], }, remediations: [ { category: "vendor_fix", details: "Update to V1.3.0 or later version", product_ids: [ "1", ], url: "https://support.industry.siemens.com/cs/ww/en/view/109945851/", }, { category: "workaround", details: "Only build and run applications from trusted sources", product_ids: [ "1", ], }, ], scores: [ { cvss_v3: { baseScore: 5.5, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C", version: "3.1", }, products: [ "1", ], }, ], title: "CVE-2022-4662", }, { cve: "CVE-2022-20421", cwe: { id: "CWE-416", name: "Use After Free", }, notes: [ { category: "summary", text: "In binder_inc_ref_for_node of binder.c, there is a possible way to corrupt memory due to a use after free. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-239630375References: Upstream kernel", title: "Summary", }, ], product_status: { known_affected: [ "1", ], }, remediations: [ { category: "vendor_fix", details: "Update to V1.3.0 or later version", product_ids: [ "1", ], url: "https://support.industry.siemens.com/cs/ww/en/view/109945851/", }, { category: "workaround", details: "Only build and run applications from trusted sources", product_ids: [ "1", ], }, ], scores: [ { cvss_v3: { baseScore: 7.8, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C", version: "3.1", }, products: [ "1", ], }, ], title: "CVE-2022-20421", }, { cve: "CVE-2022-20422", cwe: { id: "CWE-362", name: "Concurrent Execution using Shared Resource with Improper Synchronization ('Race Condition')", }, notes: [ { category: "summary", text: "In emulation_proc_handler of armv8_deprecated.c, there is a possible way to corrupt memory due to a race condition. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-237540956References: Upstream kernel", title: "Summary", }, ], product_status: { known_affected: [ "1", ], }, remediations: [ { category: "vendor_fix", details: "Update to V1.3.0 or later version", product_ids: [ "1", ], url: "https://support.industry.siemens.com/cs/ww/en/view/109945851/", }, { category: "workaround", details: "Only build and run applications from trusted sources", product_ids: [ "1", ], }, ], scores: [ { cvss_v3: { baseScore: 7, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C", version: "3.1", }, products: [ "1", ], }, ], title: "CVE-2022-20422", }, { cve: "CVE-2022-21233", cwe: { id: "CWE-311", name: "Missing Encryption of Sensitive Data", }, notes: [ { category: "summary", text: "Improper isolation of shared resources in some Intel(R) Processors may allow a privileged user to potentially enable information disclosure via local access.", title: "Summary", }, ], product_status: { known_affected: [ "1", ], }, remediations: [ { category: "vendor_fix", details: "Update to V1.3.0 or later version", product_ids: [ "1", ], url: "https://support.industry.siemens.com/cs/ww/en/view/109945851/", }, { category: "workaround", details: "Only build and run applications from trusted sources", product_ids: [ "1", ], }, ], scores: [ { cvss_v3: { baseScore: 5.5, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:P/RL:O/RC:C", version: "3.1", }, products: [ "1", ], }, ], title: "CVE-2022-21233", }, { cve: "CVE-2022-23218", cwe: { id: "CWE-120", name: "Buffer Copy without Checking Size of Input ('Classic Buffer Overflow')", }, notes: [ { category: "summary", text: "The deprecated compatibility function svcunix_create in the sunrpc module of the GNU C Library (aka glibc) through 2.34 copies its path argument on the stack without validating its length, which may result in a buffer overflow, potentially resulting in a denial of service or (if an application is not built with a stack protector enabled) arbitrary code execution.", title: "Summary", }, ], product_status: { known_affected: [ "1", ], }, remediations: [ { category: "vendor_fix", details: "Update to V1.3.0 or later version", product_ids: [ "1", ], url: "https://support.industry.siemens.com/cs/ww/en/view/109945851/", }, { category: "workaround", details: "Only build and run applications from trusted sources", product_ids: [ "1", ], }, ], scores: [ { cvss_v3: { baseScore: 9.8, baseSeverity: "CRITICAL", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C", version: "3.1", }, products: [ "1", ], }, ], title: "CVE-2022-23218", }, { cve: "CVE-2022-23219", cwe: { id: "CWE-120", name: "Buffer Copy without Checking Size of Input ('Classic Buffer Overflow')", }, notes: [ { category: "summary", text: "The deprecated compatibility function clnt_create in the sunrpc module of the GNU C Library (aka glibc) through 2.34 copies its hostname argument on the stack without validating its length, which may result in a buffer overflow, potentially resulting in a denial of service or (if an application is not built with a stack protector enabled) arbitrary code execution.", title: "Summary", }, ], product_status: { known_affected: [ "1", ], }, remediations: [ { category: "vendor_fix", details: "Update to V1.3.0 or later version", product_ids: [ "1", ], url: "https://support.industry.siemens.com/cs/ww/en/view/109945851/", }, { category: "workaround", details: "Only build and run applications from trusted sources", product_ids: [ "1", ], }, ], scores: [ { cvss_v3: { baseScore: 9.8, baseSeverity: "CRITICAL", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C", version: "3.1", }, products: [ "1", ], }, ], title: "CVE-2022-23219", }, { cve: "CVE-2022-28391", cwe: { id: "CWE-311", name: "Missing Encryption of Sensitive Data", }, notes: [ { category: "summary", text: "BusyBox through 1.35.0 allows remote attackers to execute arbitrary code if netstat is used to print a DNS PTR record's value to a VT compatible terminal. Alternatively, the attacker could choose to change the terminal's colors.", title: "Summary", }, ], product_status: { known_affected: [ "1", ], }, remediations: [ { category: "vendor_fix", details: "Update to V1.3.0 or later version", product_ids: [ "1", ], url: "https://support.industry.siemens.com/cs/ww/en/view/109945851/", }, { category: "workaround", details: "Only build and run applications from trusted sources", product_ids: [ "1", ], }, ], scores: [ { cvss_v3: { baseScore: 8.8, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C", version: "3.1", }, products: [ "1", ], }, ], title: "CVE-2022-28391", }, { cve: "CVE-2022-30065", cwe: { id: "CWE-416", name: "Use After Free", }, notes: [ { category: "summary", text: "A use-after-free in Busybox 1.35-x's awk applet leads to denial of service and possibly code execution when processing a crafted awk pattern in the copyvar function.", title: "Summary", }, ], product_status: { known_affected: [ "1", ], }, remediations: [ { category: "vendor_fix", details: "Update to V1.3.0 or later version", product_ids: [ "1", ], url: "https://support.industry.siemens.com/cs/ww/en/view/109945851/", }, { category: "workaround", details: "Only build and run applications from trusted sources", product_ids: [ "1", ], }, ], scores: [ { cvss_v3: { baseScore: 7.8, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C", version: "3.1", }, products: [ "1", ], }, ], title: "CVE-2022-30065", }, { cve: "CVE-2022-39188", cwe: { id: "CWE-362", name: "Concurrent Execution using Shared Resource with Improper Synchronization ('Race Condition')", }, notes: [ { category: "summary", text: "An issue was discovered in include/asm-generic/tlb.h in the Linux kernel before 5.19. Because of a race condition (unmap_mapping_range versus munmap), a device driver can free a page while it still has stale TLB entries. This only occurs in situations with VM_PFNMAP VMAs.", title: "Summary", }, ], product_status: { known_affected: [ "1", ], }, remediations: [ { category: "vendor_fix", details: "Update to V1.3.0 or later version", product_ids: [ "1", ], url: "https://support.industry.siemens.com/cs/ww/en/view/109945851/", }, { category: "workaround", details: "Only build and run applications from trusted sources", product_ids: [ "1", ], }, ], scores: [ { cvss_v3: { baseScore: 4.7, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C", version: "3.1", }, products: [ "1", ], }, ], title: "CVE-2022-39188", }, { cve: "CVE-2022-39190", cwe: { id: "CWE-400", name: "Uncontrolled Resource Consumption", }, notes: [ { category: "summary", text: "An issue was discovered in net/netfilter/nf_tables_api.c in the Linux kernel before 5.19.6. A denial of service can occur upon binding to an already bound chain.", title: "Summary", }, ], product_status: { known_affected: [ "1", ], }, remediations: [ { category: "vendor_fix", details: "Update to V1.3.0 or later version", product_ids: [ "1", ], url: "https://support.industry.siemens.com/cs/ww/en/view/109945851/", }, { category: "workaround", details: "Only build and run applications from trusted sources", product_ids: [ "1", ], }, ], scores: [ { cvss_v3: { baseScore: 5.5, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C", version: "3.1", }, products: [ "1", ], }, ], title: "CVE-2022-39190", }, { cve: "CVE-2022-40307", cwe: { id: "CWE-416", name: "Use After Free", }, notes: [ { category: "summary", text: "An issue was discovered in the Linux kernel through 5.19.8. drivers/firmware/efi/capsule-loader.c has a race condition with a resultant use-after-free.", title: "Summary", }, ], product_status: { known_affected: [ "1", ], }, remediations: [ { category: "vendor_fix", details: "Update to V1.3.0 or later version", product_ids: [ "1", ], url: "https://support.industry.siemens.com/cs/ww/en/view/109945851/", }, { category: "workaround", details: "Only build and run applications from trusted sources", product_ids: [ "1", ], }, ], scores: [ { cvss_v3: { baseScore: 4.7, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C", version: "3.1", }, products: [ "1", ], }, ], title: "CVE-2022-40307", }, { cve: "CVE-2022-41222", cwe: { id: "CWE-416", name: "Use After Free", }, notes: [ { category: "summary", text: "mm/mremap.c in the Linux kernel before 5.13.3 has a use-after-free via a stale TLB because an rmap lock is not held during a PUD move.", title: "Summary", }, ], product_status: { known_affected: [ "1", ], }, remediations: [ { category: "vendor_fix", details: "Update to V1.3.0 or later version", product_ids: [ "1", ], url: "https://support.industry.siemens.com/cs/ww/en/view/109945851/", }, { category: "workaround", details: "Only build and run applications from trusted sources", product_ids: [ "1", ], }, ], scores: [ { cvss_v3: { baseScore: 7, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C", version: "3.1", }, products: [ "1", ], }, ], title: "CVE-2022-41222", }, { cve: "CVE-2022-42703", cwe: { id: "CWE-416", name: "Use After Free", }, notes: [ { category: "summary", text: "mm/rmap.c in the Linux kernel before 5.19.7 has a use-after-free related to leaf anon_vma double reuse.", title: "Summary", }, ], product_status: { known_affected: [ "1", ], }, remediations: [ { category: "vendor_fix", details: "Update to V1.3.0 or later version", product_ids: [ "1", ], url: "https://support.industry.siemens.com/cs/ww/en/view/109945851/", }, { category: "workaround", details: "Only build and run applications from trusted sources", product_ids: [ "1", ], }, ], scores: [ { cvss_v3: { baseScore: 5.5, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C", version: "3.1", }, products: [ "1", ], }, ], title: "CVE-2022-42703", }, { cve: "CVE-2023-0179", cwe: { id: "CWE-190", name: "Integer Overflow or Wraparound", }, notes: [ { category: "summary", text: "A buffer overflow vulnerability was found in the Netfilter subsystem in the Linux Kernel. This issue could allow the leakage of both stack and heap addresses, and potentially allow Local Privilege Escalation to the root user via arbitrary code execution.", title: "Summary", }, ], product_status: { known_affected: [ "1", ], }, remediations: [ { category: "vendor_fix", details: "Update to V1.3.0 or later version", product_ids: [ "1", ], url: "https://support.industry.siemens.com/cs/ww/en/view/109945851/", }, { category: "workaround", details: "Only build and run applications from trusted sources", product_ids: [ "1", ], }, ], scores: [ { cvss_v3: { baseScore: 7.8, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C", version: "3.1", }, products: [ "1", ], }, ], title: "CVE-2023-0179", }, { cve: "CVE-2023-0394", cwe: { id: "CWE-311", name: "Missing Encryption of Sensitive Data", }, notes: [ { category: "summary", text: "A NULL pointer dereference flaw was found in rawv6_push_pending_frames in net/ipv6/raw.c in the network subcomponent in the Linux kernel. This flaw causes the system to crash.", title: "Summary", }, ], product_status: { known_affected: [ "1", ], }, remediations: [ { category: "vendor_fix", details: "Update to V1.3.0 or later version", product_ids: [ "1", ], url: "https://support.industry.siemens.com/cs/ww/en/view/109945851/", }, { category: "workaround", details: "Only build and run applications from trusted sources", product_ids: [ "1", ], }, ], scores: [ { cvss_v3: { baseScore: 5.5, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C", version: "3.1", }, products: [ "1", ], }, ], title: "CVE-2023-0394", }, { cve: "CVE-2023-1073", cwe: { id: "CWE-787", name: "Out-of-bounds Write", }, notes: [ { category: "summary", text: "A memory corruption flaw was found in the Linux kernel’s human interface device (HID) subsystem in how a user inserts a malicious USB device. This flaw allows a local user to crash or potentially escalate their privileges on the system.", title: "Summary", }, ], product_status: { known_affected: [ "1", ], }, remediations: [ { category: "vendor_fix", details: "Update to V1.3.0 or later version", product_ids: [ "1", ], url: "https://support.industry.siemens.com/cs/ww/en/view/109945851/", }, { category: "workaround", details: "Only build and run applications from trusted sources", product_ids: [ "1", ], }, ], scores: [ { cvss_v3: { baseScore: 6.6, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C", version: "3.1", }, products: [ "1", ], }, ], title: "CVE-2023-1073", }, { cve: "CVE-2023-2898", cwe: { id: "CWE-476", name: "NULL Pointer Dereference", }, notes: [ { category: "summary", text: "There is a null-pointer-dereference flaw found in f2fs_write_end_io in fs/f2fs/data.c in the Linux kernel. This flaw allows a local privileged user to cause a denial of service problem.", title: "Summary", }, ], product_status: { known_affected: [ "1", ], }, remediations: [ { category: "vendor_fix", details: "Update to V1.3.0 or later version", product_ids: [ "1", ], url: "https://support.industry.siemens.com/cs/ww/en/view/109945851/", }, { category: "workaround", details: "Only build and run applications from trusted sources", product_ids: [ "1", ], }, ], scores: [ { cvss_v3: { baseScore: 4.7, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C", version: "3.1", }, products: [ "1", ], }, ], title: "CVE-2023-2898", }, { cve: "CVE-2023-3390", cwe: { id: "CWE-416", name: "Use After Free", }, notes: [ { category: "summary", text: "A use-after-free vulnerability was found in the Linux kernel's netfilter subsystem in net/netfilter/nf_tables_api.c.\n\nMishandled error handling with NFT_MSG_NEWRULE makes it possible to use a dangling pointer in the same transaction causing a use-after-free vulnerability. This flaw allows a local attacker with user access to cause a privilege escalation issue.\n\nWe recommend upgrading past commit 1240eb93f0616b21c675416516ff3d74798fdc97.", title: "Summary", }, ], product_status: { known_affected: [ "1", ], }, remediations: [ { category: "vendor_fix", details: "Update to V1.3.0 or later version", product_ids: [ "1", ], url: "https://support.industry.siemens.com/cs/ww/en/view/109945851/", }, { category: "workaround", details: "Only build and run applications from trusted sources", product_ids: [ "1", ], }, ], scores: [ { cvss_v3: { baseScore: 7.8, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, products: [ "1", ], }, ], title: "CVE-2023-3390", }, { cve: "CVE-2023-3610", cwe: { id: "CWE-416", name: "Use After Free", }, notes: [ { category: "summary", text: "A use-after-free vulnerability in the Linux kernel's netfilter: nf_tables component can be exploited to achieve local privilege escalation.\r\n\r\nFlaw in the error handling of bound chains causes a use-after-free in the abort path of NFT_MSG_NEWRULE. The vulnerability requires CAP_NET_ADMIN to be triggered.", title: "Summary", }, ], product_status: { known_affected: [ "1", ], }, remediations: [ { category: "vendor_fix", details: "Update to V1.3.0 or later version", product_ids: [ "1", ], url: "https://support.industry.siemens.com/cs/ww/en/view/109945851/", }, { category: "workaround", details: "Only build and run applications from trusted sources", product_ids: [ "1", ], }, ], scores: [ { cvss_v3: { baseScore: 7.8, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, products: [ "1", ], }, ], title: "CVE-2023-3610", }, { cve: "CVE-2023-3611", cwe: { id: "CWE-787", name: "Out-of-bounds Write", }, notes: [ { category: "summary", text: "An out-of-bounds write vulnerability in the Linux kernel's net/sched: sch_qfq component can be exploited to achieve local privilege escalation.\r\n\r\nThe qfq_change_agg() function in net/sched/sch_qfq.c allows an out-of-bounds write because lmax is updated according to packet sizes without bounds checks.", title: "Summary", }, ], product_status: { known_affected: [ "1", ], }, remediations: [ { category: "vendor_fix", details: "Update to V1.3.0 or later version", product_ids: [ "1", ], url: "https://support.industry.siemens.com/cs/ww/en/view/109945851/", }, { category: "workaround", details: "Only build and run applications from trusted sources", product_ids: [ "1", ], }, ], scores: [ { cvss_v3: { baseScore: 7.8, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, products: [ "1", ], }, ], title: "CVE-2023-3611", }, { cve: "CVE-2023-3776", cwe: { id: "CWE-416", name: "Use After Free", }, notes: [ { category: "summary", text: "A use-after-free vulnerability in the Linux kernel's net/sched: cls_fw component can be exploited to achieve local privilege escalation.\r\n\r\nIf tcf_change_indev() fails, fw_set_parms() will immediately return an error after incrementing or decrementing the reference counter in tcf_bind_filter(). If an attacker can control the reference counter and set it to zero, they can cause the reference to be freed, leading to a use-after-free vulnerability.", title: "Summary", }, ], product_status: { known_affected: [ "1", ], }, remediations: [ { category: "vendor_fix", details: "Update to V1.3.0 or later version", product_ids: [ "1", ], url: "https://support.industry.siemens.com/cs/ww/en/view/109945851/", }, { category: "workaround", details: "Only build and run applications from trusted sources", product_ids: [ "1", ], }, ], scores: [ { cvss_v3: { baseScore: 7.8, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, products: [ "1", ], }, ], title: "CVE-2023-3776", }, { cve: "CVE-2023-4004", cwe: { id: "CWE-20", name: "Improper Input Validation", }, notes: [ { category: "summary", text: "A use-after-free flaw was found in the Linux kernel's netfilter in the way a user triggers the nft_pipapo_remove function with the element, without a NFT_SET_EXT_KEY_END. This issue could allow a local user to crash the system or potentially escalate their privileges on the system.", title: "Summary", }, ], product_status: { known_affected: [ "1", ], }, remediations: [ { category: "vendor_fix", details: "Update to V1.3.0 or later version", product_ids: [ "1", ], url: "https://support.industry.siemens.com/cs/ww/en/view/109945851/", }, { category: "workaround", details: "Only build and run applications from trusted sources", product_ids: [ "1", ], }, ], scores: [ { cvss_v3: { baseScore: 7.8, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C", version: "3.1", }, products: [ "1", ], }, ], title: "CVE-2023-4004", }, { cve: "CVE-2023-4015", cwe: { id: "CWE-20", name: "Improper Input Validation", }, notes: [ { category: "summary", text: "The netfilter subsystem in the Linux kernel did not properly handle bound chain deactivation in certain circumstances. A local attacker could possibly use this to cause a denial of service (system crash) or execute arbitrary code.", title: "Summary", }, ], product_status: { known_affected: [ "1", ], }, remediations: [ { category: "vendor_fix", details: "Update to V1.3.0 or later version", product_ids: [ "1", ], url: "https://support.industry.siemens.com/cs/ww/en/view/109945851/", }, { category: "workaround", details: "Only build and run applications from trusted sources", product_ids: [ "1", ], }, ], scores: [ { cvss_v3: { baseScore: 8.4, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C", version: "3.1", }, products: [ "1", ], }, ], title: "CVE-2023-4015", }, { cve: "CVE-2023-4128", cwe: { id: "CWE-416", name: "Use After Free", }, notes: [ { category: "summary", text: "A use-after-free vulnerability in net/sched/cls_fw.c in classifiers (cls_fw, cls_u32, and cls_route) in the Linux Kernel allows a local attacker to perform a local privilege escalation due to incorrect handling of the existing filter, leading to a kernel information leak.", title: "Summary", }, ], product_status: { known_affected: [ "1", ], }, remediations: [ { category: "vendor_fix", details: "Update to V1.3.0 or later version", product_ids: [ "1", ], url: "https://support.industry.siemens.com/cs/ww/en/view/109945851/", }, { category: "workaround", details: "Only build and run applications from trusted sources", product_ids: [ "1", ], }, ], scores: [ { cvss_v3: { baseScore: 7.8, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C", version: "3.1", }, products: [ "1", ], }, ], title: "CVE-2023-4128", }, { cve: "CVE-2023-4147", cwe: { id: "CWE-416", name: "Use After Free", }, notes: [ { category: "summary", text: "A use-after-free vulnerability in the Linux kernel’s Netfilter functionality when adding a rule with NFTA_RULE_CHAIN_ID allows a local user to crash or escalate their privileges on the system.", title: "Summary", }, ], product_status: { known_affected: [ "1", ], }, remediations: [ { category: "vendor_fix", details: "Update to V1.3.0 or later version", product_ids: [ "1", ], url: "https://support.industry.siemens.com/cs/ww/en/view/109945851/", }, { category: "workaround", details: "Only build and run applications from trusted sources", product_ids: [ "1", ], }, ], scores: [ { cvss_v3: { baseScore: 7.8, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C", version: "3.1", }, products: [ "1", ], }, ], title: "CVE-2023-4147", }, { cve: "CVE-2023-4273", cwe: { id: "CWE-121", name: "Stack-based Buffer Overflow", }, notes: [ { category: "summary", text: "This vulnerability exists in the implementation of the file name reconstruction function, which is responsible for reading file name entries from a directory index and merging file name parts belonging to one file into a single long file name. Since the file name characters are copied into a stack variable, a local privileged attacker could use this vulnerability to overflow the kernel stack.", title: "Summary", }, ], product_status: { known_affected: [ "1", ], }, remediations: [ { category: "vendor_fix", details: "Update to V1.3.0 or later version", product_ids: [ "1", ], url: "https://support.industry.siemens.com/cs/ww/en/view/109945851/", }, { category: "workaround", details: "Only build and run applications from trusted sources", product_ids: [ "1", ], }, ], scores: [ { cvss_v3: { baseScore: 6, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:N/E:U/RL:O/RC:C", version: "3.1", }, products: [ "1", ], }, ], title: "CVE-2023-4273", }, { cve: "CVE-2023-4527", cwe: { id: "CWE-125", name: "Out-of-bounds Read", }, notes: [ { category: "summary", text: "A flaw was found in glibc. When the getaddrinfo function is called with the AF_UNSPEC address family and the system is configured with no-aaaa mode via /etc/resolv.conf, a DNS response via TCP larger than 2048 bytes can potentially disclose stack contents through the function returned address data, and may cause a crash.", title: "Summary", }, ], product_status: { known_affected: [ "1", ], }, remediations: [ { category: "vendor_fix", details: "Update to V1.3.0 or later version", product_ids: [ "1", ], url: "https://support.industry.siemens.com/cs/ww/en/view/109945851/", }, { category: "workaround", details: "Only build and run applications from trusted sources", product_ids: [ "1", ], }, ], scores: [ { cvss_v3: { baseScore: 6.5, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:H", version: "3.1", }, products: [ "1", ], }, ], title: "CVE-2023-4527", }, { cve: "CVE-2023-4806", cwe: { id: "CWE-416", name: "Use After Free", }, notes: [ { category: "summary", text: "A flaw was found in glibc. In an extremely rare situation, the getaddrinfo function may access memory that has been freed, resulting in an application crash. This issue is only exploitable when a NSS module implements only the _nss_*_gethostbyname2_r and _nss_*_getcanonname_r hooks without implementing the _nss_*_gethostbyname3_r hook. The resolved name should return a large number of IPv6 and IPv4, and the call to the getaddrinfo function should have the AF_INET6 address family with AI_CANONNAME, AI_ALL and AI_V4MAPPED as flags.", title: "Summary", }, ], product_status: { known_affected: [ "1", ], }, remediations: [ { category: "vendor_fix", details: "Update to V1.3.0 or later version", product_ids: [ "1", ], url: "https://support.industry.siemens.com/cs/ww/en/view/109945851/", }, { category: "workaround", details: "Only build and run applications from trusted sources", product_ids: [ "1", ], }, ], scores: [ { cvss_v3: { baseScore: 5.9, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "1", ], }, ], title: "CVE-2023-4806", }, { cve: "CVE-2023-4911", cwe: { id: "CWE-121", name: "Stack-based Buffer Overflow", }, notes: [ { category: "summary", text: "A buffer overflow was discovered in the GNU C Library's dynamic loader ld.so while processing the GLIBC_TUNABLES environment variable. This issue could allow a local attacker to use maliciously crafted GLIBC_TUNABLES environment variables when launching binaries with SUID permission to execute code with elevated privileges.", title: "Summary", }, ], product_status: { known_affected: [ "1", ], }, remediations: [ { category: "vendor_fix", details: "Update to V1.3.0 or later version", product_ids: [ "1", ], url: "https://support.industry.siemens.com/cs/ww/en/view/109945851/", }, { category: "workaround", details: "Only build and run applications from trusted sources", product_ids: [ "1", ], }, ], scores: [ { cvss_v3: { baseScore: 7.8, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C", version: "3.1", }, products: [ "1", ], }, ], title: "CVE-2023-4911", }, { cve: "CVE-2023-5156", cwe: { id: "CWE-401", name: "Missing Release of Memory after Effective Lifetime", }, notes: [ { category: "summary", text: "A flaw was found in the GNU C Library. A recent fix for CVE-2023-4806 introduced the potential for a memory leak, which may result in an application crash.", title: "Summary", }, ], product_status: { known_affected: [ "1", ], }, remediations: [ { category: "vendor_fix", details: "Update to V1.3.0 or later version", product_ids: [ "1", ], url: "https://support.industry.siemens.com/cs/ww/en/view/109945851/", }, { category: "workaround", details: "Only build and run applications from trusted sources", product_ids: [ "1", ], }, ], scores: [ { cvss_v3: { baseScore: 5.3, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L", version: "3.1", }, products: [ "1", ], }, ], title: "CVE-2023-5156", }, { cve: "CVE-2023-31248", cwe: { id: "CWE-416", name: "Use After Free", }, notes: [ { category: "summary", text: "Linux Kernel nftables Use-After-Free Local Privilege Escalation Vulnerability; `nft_chain_lookup_byid()` failed to check whether a chain was active and CAP_NET_ADMIN is in any user or network namespace", title: "Summary", }, ], product_status: { known_affected: [ "1", ], }, remediations: [ { category: "vendor_fix", details: "Update to V1.3.0 or later version", product_ids: [ "1", ], url: "https://support.industry.siemens.com/cs/ww/en/view/109945851/", }, { category: "workaround", details: "Only build and run applications from trusted sources", product_ids: [ "1", ], }, ], scores: [ { cvss_v3: { baseScore: 7.8, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, products: [ "1", ], }, ], title: "CVE-2023-31248", }, { cve: "CVE-2023-35001", cwe: { id: "CWE-787", name: "Out-of-bounds Write", }, notes: [ { category: "summary", text: "Linux Kernel nftables Out-Of-Bounds Read/Write Vulnerability; nft_byteorder poorly handled vm register contents when CAP_NET_ADMIN is in any user or network namespace", title: "Summary", }, ], product_status: { known_affected: [ "1", ], }, remediations: [ { category: "vendor_fix", details: "Update to V1.3.0 or later version", product_ids: [ "1", ], url: "https://support.industry.siemens.com/cs/ww/en/view/109945851/", }, { category: "workaround", details: "Only build and run applications from trusted sources", product_ids: [ "1", ], }, ], scores: [ { cvss_v3: { baseScore: 7.8, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, products: [ "1", ], }, ], title: "CVE-2023-35001", }, { cve: "CVE-2023-45863", cwe: { id: "CWE-787", name: "Out-of-bounds Write", }, notes: [ { category: "summary", text: "An issue was discovered in lib/kobject.c in the Linux kernel before 6.2.3. With root access, an attacker can trigger a race condition that results in a fill_kobj_path out-of-bounds write.", title: "Summary", }, ], product_status: { known_affected: [ "1", ], }, remediations: [ { category: "vendor_fix", details: "Update to V1.3.0 or later version", product_ids: [ "1", ], url: "https://support.industry.siemens.com/cs/ww/en/view/109945851/", }, { category: "workaround", details: "Only build and run applications from trusted sources", product_ids: [ "1", ], }, ], scores: [ { cvss_v3: { baseScore: 6.4, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C", version: "3.1", }, products: [ "1", ], }, ], title: "CVE-2023-45863", }, ], }
SSA-831302
Vulnerability from csaf_siemens
Published
2023-06-13 00:00
Modified
2024-04-09 00:00
Summary
SSA-831302: Vulnerabilities in the BIOS of the SIMATIC S7-1500 TM MFP before V1.3.0
Notes
Summary
Multiple vulnerabilities have been identified in the BIOS of the SIMATIC S7-1500 TM MFP before V1.3.0.
Siemens has released a new version for SIMATIC S7-1500 TM MFP - BIOS and recommends to update to the latest version.
General Recommendations
As a general security measure, Siemens strongly recommends to protect network access to devices with appropriate mechanisms. In order to operate the devices in a protected IT environment, Siemens recommends to configure the environment according to Siemens' operational guidelines for Industrial Security (Download:
https://www.siemens.com/cert/operational-guidelines-industrial-security), and to follow the recommendations in the product manuals.
Additional information on Industrial Security by Siemens can be found at: https://www.siemens.com/industrialsecurity
Additional Resources
For further inquiries on security vulnerabilities in Siemens products and solutions, please contact the Siemens ProductCERT: https://www.siemens.com/cert/advisories
Terms of Use
Siemens Security Advisories are subject to the terms and conditions contained in Siemens' underlying license terms or other applicable agreements previously agreed to with Siemens (hereinafter "License Terms"). To the extent applicable to information, software or documentation made available in or through a Siemens Security Advisory, the Terms of Use of Siemens' Global Website (https://www.siemens.com/terms_of_use, hereinafter "Terms of Use"), in particular Sections 8-10 of the Terms of Use, shall apply additionally. In case of conflicts, the License Terms shall prevail over the Terms of Use.
{ document: { category: "csaf_security_advisory", csaf_version: "2.0", distribution: { text: "Disclosure is not limited. (TLPv2: TLP:CLEAR)", tlp: { label: "WHITE", }, }, lang: "en", notes: [ { category: "summary", text: "Multiple vulnerabilities have been identified in the BIOS of the SIMATIC S7-1500 TM MFP before V1.3.0.\n\nSiemens has released a new version for SIMATIC S7-1500 TM MFP - BIOS and recommends to update to the latest version.", title: "Summary", }, { category: "general", text: "As a general security measure, Siemens strongly recommends to protect network access to devices with appropriate mechanisms. In order to operate the devices in a protected IT environment, Siemens recommends to configure the environment according to Siemens' operational guidelines for Industrial Security (Download: \nhttps://www.siemens.com/cert/operational-guidelines-industrial-security), and to follow the recommendations in the product manuals.\nAdditional information on Industrial Security by Siemens can be found at: https://www.siemens.com/industrialsecurity", title: "General Recommendations", }, { category: "general", text: "For further inquiries on security vulnerabilities in Siemens products and solutions, please contact the Siemens ProductCERT: https://www.siemens.com/cert/advisories", title: "Additional Resources", }, { category: "legal_disclaimer", text: "Siemens Security Advisories are subject to the terms and conditions contained in Siemens' underlying license terms or other applicable agreements previously agreed to with Siemens (hereinafter \"License Terms\"). To the extent applicable to information, software or documentation made available in or through a Siemens Security Advisory, the Terms of Use of Siemens' Global Website (https://www.siemens.com/terms_of_use, hereinafter \"Terms of Use\"), in particular Sections 8-10 of the Terms of Use, shall apply additionally. In case of conflicts, the License Terms shall prevail over the Terms of Use.", title: "Terms of Use", }, ], publisher: { category: "vendor", contact_details: "productcert@siemens.com", name: "Siemens ProductCERT", namespace: "https://www.siemens.com", }, references: [ { category: "self", summary: "SSA-831302: Vulnerabilities in the BIOS of the SIMATIC S7-1500 TM MFP before V1.3.0 - HTML Version", url: "https://cert-portal.siemens.com/productcert/html/ssa-831302.html", }, { category: "self", summary: "SSA-831302: Vulnerabilities in the BIOS of the SIMATIC S7-1500 TM MFP before V1.3.0 - CSAF Version", url: "https://cert-portal.siemens.com/productcert/csaf/ssa-831302.json", }, { category: "self", summary: "SSA-831302: Vulnerabilities in the BIOS of the SIMATIC S7-1500 TM MFP before V1.3.0 - PDF Version", url: "https://cert-portal.siemens.com/productcert/pdf/ssa-831302.pdf", }, { category: "self", summary: "SSA-831302: Vulnerabilities in the BIOS of the SIMATIC S7-1500 TM MFP before V1.3.0 - TXT Version", url: "https://cert-portal.siemens.com/productcert/txt/ssa-831302.txt", }, ], title: "SSA-831302: Vulnerabilities in the BIOS of the SIMATIC S7-1500 TM MFP before V1.3.0", tracking: { current_release_date: "2024-04-09T00:00:00Z", generator: { engine: { name: "Siemens ProductCERT CSAF Generator", version: "1", }, }, id: "SSA-831302", initial_release_date: "2023-06-13T00:00:00Z", revision_history: [ { date: "2023-06-13T00:00:00Z", legacy_version: "1.0", number: "1", summary: "Publication Date", }, { date: "2023-09-12T00:00:00Z", legacy_version: "1.1", number: "2", summary: "Added CVE-2022-1015, CVE-2023-2898, CVE-2023-31248, CVE-2023-3390, CVE-2023-35001, CVE-2023-3610, CVE-2023-3611, CVE-2023-3776, CVE-2023-4004, CVE-2023-4015, CVE-2023-4128, CVE-2023-4147, CVE-2023-4273", }, { date: "2023-11-14T00:00:00Z", legacy_version: "1.2", number: "3", summary: "Added CVE-2023-4527, CVE-2023-4806, CVE-2023-4911, CVE-2023-5156", }, { date: "2023-12-12T00:00:00Z", legacy_version: "1.3", number: "4", summary: "Added CVE-2021-44879, CVE-2023-45863", }, { date: "2024-04-09T00:00:00Z", legacy_version: "1.4", number: "5", summary: "Added fix for SIMATIC S7-1500 TM MFP - BIOS", }, ], status: "interim", version: "5", }, }, product_tree: { branches: [ { branches: [ { branches: [ { category: "product_version_range", name: "<V1.3.0", product: { name: "SIMATIC S7-1500 TM MFP - BIOS", product_id: "1", }, }, ], category: "product_name", name: "SIMATIC S7-1500 TM MFP - BIOS", }, ], category: "vendor", name: "Siemens", }, ], }, vulnerabilities: [ { cve: "CVE-2016-10228", cwe: { id: "CWE-20", name: "Improper Input Validation", }, notes: [ { category: "summary", text: "The iconv program in the GNU C Library (aka glibc or libc6) 2.31 and earlier, when invoked with multiple suffixes in the destination encoding (TRANSLATE or IGNORE) along with the -c option, enters an infinite loop when processing invalid multi-byte input sequences, leading to a denial of service.", title: "Summary", }, ], product_status: { known_affected: [ "1", ], }, remediations: [ { category: "vendor_fix", details: "Update to V1.3.0 or later version", product_ids: [ "1", ], url: "https://support.industry.siemens.com/cs/ww/en/view/109945851/", }, { category: "workaround", details: "Only build and run applications from trusted sources", product_ids: [ "1", ], }, ], scores: [ { cvss_v3: { baseScore: 5.9, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C", version: "3.1", }, products: [ "1", ], }, ], title: "CVE-2016-10228", }, { cve: "CVE-2019-25013", cwe: { id: "CWE-125", name: "Out-of-bounds Read", }, notes: [ { category: "summary", text: "The iconv feature in the GNU C Library (aka glibc or libc6) through 2.32, when processing invalid multi-byte input sequences in the EUC-KR encoding, may have a buffer over-read.", title: "Summary", }, ], product_status: { known_affected: [ "1", ], }, remediations: [ { category: "vendor_fix", details: "Update to V1.3.0 or later version", product_ids: [ "1", ], url: "https://support.industry.siemens.com/cs/ww/en/view/109945851/", }, { category: "workaround", details: "Only build and run applications from trusted sources", product_ids: [ "1", ], }, ], scores: [ { cvss_v3: { baseScore: 5.9, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C", version: "3.1", }, products: [ "1", ], }, ], title: "CVE-2019-25013", }, { cve: "CVE-2020-1752", cwe: { id: "CWE-416", name: "Use After Free", }, notes: [ { category: "summary", text: "A use-after-free vulnerability introduced in glibc upstream version 2.14 was found in the way the tilde expansion was carried out. Directory paths containing an initial tilde followed by a valid username were affected by this issue. A local attacker could exploit this flaw by creating a specially crafted path that, when processed by the glob function, would potentially lead to arbitrary code execution. This was fixed in version 2.32.", title: "Summary", }, ], product_status: { known_affected: [ "1", ], }, remediations: [ { category: "vendor_fix", details: "Update to V1.3.0 or later version", product_ids: [ "1", ], url: "https://support.industry.siemens.com/cs/ww/en/view/109945851/", }, { category: "workaround", details: "Only build and run applications from trusted sources", product_ids: [ "1", ], }, ], scores: [ { cvss_v3: { baseScore: 7, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C", version: "3.1", }, products: [ "1", ], }, ], title: "CVE-2020-1752", }, { cve: "CVE-2020-10029", cwe: { id: "CWE-787", name: "Out-of-bounds Write", }, notes: [ { category: "summary", text: "The GNU C Library (aka glibc or libc6) before 2.32 could overflow an on-stack buffer during range reduction if an input to an 80-bit long double function contains a non-canonical bit pattern, a seen when passing a 0x5d414141414141410000 value to sinl on x86 targets. This is related to sysdeps/ieee754/ldbl-96/e_rem_pio2l.c.", title: "Summary", }, ], product_status: { known_affected: [ "1", ], }, remediations: [ { category: "vendor_fix", details: "Update to V1.3.0 or later version", product_ids: [ "1", ], url: "https://support.industry.siemens.com/cs/ww/en/view/109945851/", }, { category: "workaround", details: "Only build and run applications from trusted sources", product_ids: [ "1", ], }, ], scores: [ { cvss_v3: { baseScore: 5.5, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C", version: "3.1", }, products: [ "1", ], }, ], title: "CVE-2020-10029", }, { cve: "CVE-2020-27618", cwe: { id: "CWE-835", name: "Loop with Unreachable Exit Condition ('Infinite Loop')", }, notes: [ { category: "summary", text: "The iconv function in the GNU C Library (aka glibc or libc6) 2.32 and earlier, when processing invalid multi-byte input sequences in IBM1364, IBM1371, IBM1388, IBM1390, and IBM1399 encodings, fails to advance the input state, which could lead to an infinite loop in applications, resulting in a denial of service, a different vulnerability from CVE-2016-10228.", title: "Summary", }, ], product_status: { known_affected: [ "1", ], }, remediations: [ { category: "vendor_fix", details: "Update to V1.3.0 or later version", product_ids: [ "1", ], url: "https://support.industry.siemens.com/cs/ww/en/view/109945851/", }, { category: "workaround", details: "Only build and run applications from trusted sources", product_ids: [ "1", ], }, ], scores: [ { cvss_v3: { baseScore: 5.5, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C", version: "3.1", }, products: [ "1", ], }, ], title: "CVE-2020-27618", }, { cve: "CVE-2020-29562", cwe: { id: "CWE-617", name: "Reachable Assertion", }, notes: [ { category: "summary", text: "The iconv function in the GNU C Library (aka glibc or libc6) 2.30 to 2.32, when converting UCS4 text containing an irreversible character, fails an assertion in the code path and aborts the program, potentially resulting in a denial of service.", title: "Summary", }, ], product_status: { known_affected: [ "1", ], }, remediations: [ { category: "vendor_fix", details: "Update to V1.3.0 or later version", product_ids: [ "1", ], url: "https://support.industry.siemens.com/cs/ww/en/view/109945851/", }, { category: "workaround", details: "Only build and run applications from trusted sources", product_ids: [ "1", ], }, ], scores: [ { cvss_v3: { baseScore: 4.8, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C", version: "3.1", }, products: [ "1", ], }, ], title: "CVE-2020-29562", }, { cve: "CVE-2021-3326", cwe: { id: "CWE-617", name: "Reachable Assertion", }, notes: [ { category: "summary", text: "The iconv function in the GNU C Library (aka glibc or libc6) 2.32 and earlier, when processing invalid input sequences in the ISO-2022-JP-3 encoding, fails an assertion in the code path and aborts the program, potentially resulting in a denial of service.", title: "Summary", }, ], product_status: { known_affected: [ "1", ], }, remediations: [ { category: "vendor_fix", details: "Update to V1.3.0 or later version", product_ids: [ "1", ], url: "https://support.industry.siemens.com/cs/ww/en/view/109945851/", }, { category: "workaround", details: "Only build and run applications from trusted sources", product_ids: [ "1", ], }, ], scores: [ { cvss_v3: { baseScore: 7.5, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C", version: "3.1", }, products: [ "1", ], }, ], title: "CVE-2021-3326", }, { cve: "CVE-2021-3998", cwe: { id: "CWE-125", name: "Out-of-bounds Read", }, notes: [ { category: "summary", text: "A flaw was found in glibc. The realpath() function can mistakenly return an unexpected value, potentially leading to information leakage and disclosure of sensitive data.", title: "Summary", }, ], product_status: { known_affected: [ "1", ], }, remediations: [ { category: "vendor_fix", details: "Update to V1.3.0 or later version", product_ids: [ "1", ], url: "https://support.industry.siemens.com/cs/ww/en/view/109945851/", }, { category: "workaround", details: "Only build and run applications from trusted sources", product_ids: [ "1", ], }, ], scores: [ { cvss_v3: { baseScore: 7.5, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N/E:P/RL:O/RC:C", version: "3.1", }, products: [ "1", ], }, ], title: "CVE-2021-3998", }, { cve: "CVE-2021-3999", cwe: { id: "CWE-193", name: "Off-by-one Error", }, notes: [ { category: "summary", text: "A flaw was found in glibc. An off-by-one buffer overflow and underflow in getcwd() may lead to memory corruption when the size of the buffer is exactly 1. A local attacker who can control the input buffer and size passed to getcwd() in a setuid program could use this flaw to potentially execute arbitrary code and escalate their privileges on the system.", title: "Summary", }, ], product_status: { known_affected: [ "1", ], }, remediations: [ { category: "vendor_fix", details: "Update to V1.3.0 or later version", product_ids: [ "1", ], url: "https://support.industry.siemens.com/cs/ww/en/view/109945851/", }, { category: "workaround", details: "Only build and run applications from trusted sources", product_ids: [ "1", ], }, ], scores: [ { cvss_v3: { baseScore: 7.8, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C", version: "3.1", }, products: [ "1", ], }, ], title: "CVE-2021-3999", }, { cve: "CVE-2021-20269", cwe: { id: "CWE-276", name: "Incorrect Default Permissions", }, notes: [ { category: "summary", text: "A flaw was found in the permissions of a log file created by kexec-tools. This flaw allows a local unprivileged user to read this file and leak kernel internal information from a previous panic. The highest threat from this vulnerability is to confidentiality. This flaw affects kexec-tools shipped by Fedora versions prior to 2.0.21-8 and RHEL versions prior to 2.0.20-47.", title: "Summary", }, ], product_status: { known_affected: [ "1", ], }, remediations: [ { category: "vendor_fix", details: "Update to V1.3.0 or later version", product_ids: [ "1", ], url: "https://support.industry.siemens.com/cs/ww/en/view/109945851/", }, { category: "workaround", details: "Only build and run applications from trusted sources", product_ids: [ "1", ], }, ], scores: [ { cvss_v3: { baseScore: 5.5, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:P/RL:O/RC:C", version: "3.1", }, products: [ "1", ], }, ], title: "CVE-2021-20269", }, { cve: "CVE-2021-27645", cwe: { id: "CWE-415", name: "Double Free", }, notes: [ { category: "summary", text: "The nameserver caching daemon (nscd) in the GNU C Library (aka glibc or libc6) 2.29 through 2.33, when processing a request for netgroup lookup, may crash due to a double-free, potentially resulting in degraded service or Denial of Service on the local system. This is related to netgroupcache.c.", title: "Summary", }, ], product_status: { known_affected: [ "1", ], }, remediations: [ { category: "vendor_fix", details: "Update to V1.3.0 or later version", product_ids: [ "1", ], url: "https://support.industry.siemens.com/cs/ww/en/view/109945851/", }, { category: "workaround", details: "Only build and run applications from trusted sources", product_ids: [ "1", ], }, ], scores: [ { cvss_v3: { baseScore: 2.5, baseSeverity: "LOW", vectorString: "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:L/E:P/RL:O/RC:C", version: "3.1", }, products: [ "1", ], }, ], title: "CVE-2021-27645", }, { cve: "CVE-2021-28831", cwe: { id: "CWE-755", name: "Improper Handling of Exceptional Conditions", }, notes: [ { category: "summary", text: "decompress_gunzip.c in BusyBox through 1.32.1 mishandles the error bit on the huft_build result pointer, with a resultant invalid free or segmentation fault, via malformed gzip data.", title: "Summary", }, ], product_status: { known_affected: [ "1", ], }, remediations: [ { category: "vendor_fix", details: "Update to V1.3.0 or later version", product_ids: [ "1", ], url: "https://support.industry.siemens.com/cs/ww/en/view/109945851/", }, { category: "workaround", details: "Only build and run applications from trusted sources", product_ids: [ "1", ], }, ], scores: [ { cvss_v3: { baseScore: 7.5, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C", version: "3.1", }, products: [ "1", ], }, ], title: "CVE-2021-28831", }, { cve: "CVE-2021-33574", cwe: { id: "CWE-416", name: "Use After Free", }, notes: [ { category: "summary", text: "The mq_notify function in the GNU C Library (aka glibc) versions 2.32 and 2.33 has a use-after-free. It may use the notification thread attributes object (passed through its struct sigevent parameter) after it has been freed by the caller, leading to a denial of service (application crash) or possibly unspecified other impact.", title: "Summary", }, ], product_status: { known_affected: [ "1", ], }, remediations: [ { category: "vendor_fix", details: "Update to V1.3.0 or later version", product_ids: [ "1", ], url: "https://support.industry.siemens.com/cs/ww/en/view/109945851/", }, { category: "workaround", details: "Only build and run applications from trusted sources", product_ids: [ "1", ], }, ], scores: [ { cvss_v3: { baseScore: 9.8, baseSeverity: "CRITICAL", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C", version: "3.1", }, products: [ "1", ], }, ], title: "CVE-2021-33574", }, { cve: "CVE-2021-35942", cwe: { id: "CWE-190", name: "Integer Overflow or Wraparound", }, notes: [ { category: "summary", text: "The wordexp function in the GNU C Library (aka glibc) through 2.33 may crash or read arbitrary memory in parse_param (in posix/wordexp.c) when called with an untrusted, crafted pattern, potentially resulting in a denial of service or disclosure of information. This occurs because atoi was used but strtoul should have been used to ensure correct calculations.", title: "Summary", }, ], product_status: { known_affected: [ "1", ], }, remediations: [ { category: "vendor_fix", details: "Update to V1.3.0 or later version", product_ids: [ "1", ], url: "https://support.industry.siemens.com/cs/ww/en/view/109945851/", }, { category: "workaround", details: "Only build and run applications from trusted sources", product_ids: [ "1", ], }, ], scores: [ { cvss_v3: { baseScore: 9.1, baseSeverity: "CRITICAL", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H/E:P/RL:O/RC:C", version: "3.1", }, products: [ "1", ], }, ], title: "CVE-2021-35942", }, { cve: "CVE-2021-38604", cwe: { id: "CWE-476", name: "NULL Pointer Dereference", }, notes: [ { category: "summary", text: "In librt in the GNU C Library (aka glibc) through 2.34, sysdeps/unix/sysv/linux/mq_notify.c mishandles certain NOTIFY_REMOVED data, leading to a NULL pointer dereference. NOTE: this vulnerability was introduced as a side effect of the CVE-2021-33574 fix.", title: "Summary", }, ], product_status: { known_affected: [ "1", ], }, remediations: [ { category: "vendor_fix", details: "Update to V1.3.0 or later version", product_ids: [ "1", ], url: "https://support.industry.siemens.com/cs/ww/en/view/109945851/", }, { category: "workaround", details: "Only build and run applications from trusted sources", product_ids: [ "1", ], }, ], scores: [ { cvss_v3: { baseScore: 7.5, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C", version: "3.1", }, products: [ "1", ], }, ], title: "CVE-2021-38604", }, { cve: "CVE-2021-42373", cwe: { id: "CWE-476", name: "NULL Pointer Dereference", }, notes: [ { category: "summary", text: "A NULL pointer dereference in Busybox's man applet leads to denial of service when a section name is supplied but no page argument is given.", title: "Summary", }, ], product_status: { known_affected: [ "1", ], }, remediations: [ { category: "vendor_fix", details: "Update to V1.3.0 or later version", product_ids: [ "1", ], url: "https://support.industry.siemens.com/cs/ww/en/view/109945851/", }, { category: "workaround", details: "Only build and run applications from trusted sources", product_ids: [ "1", ], }, ], scores: [ { cvss_v3: { baseScore: 5.1, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C", version: "3.1", }, products: [ "1", ], }, ], title: "CVE-2021-42373", }, { cve: "CVE-2021-42374", cwe: { id: "CWE-125", name: "Out-of-bounds Read", }, notes: [ { category: "summary", text: "An out-of-bounds heap read in Busybox's unlzma applet leads to information leak and denial of service when crafted LZMA-compressed input is decompressed. This can be triggered by any applet/format that internally supports LZMA compression.", title: "Summary", }, ], product_status: { known_affected: [ "1", ], }, remediations: [ { category: "vendor_fix", details: "Update to V1.3.0 or later version", product_ids: [ "1", ], url: "https://support.industry.siemens.com/cs/ww/en/view/109945851/", }, { category: "workaround", details: "Only build and run applications from trusted sources", product_ids: [ "1", ], }, ], scores: [ { cvss_v3: { baseScore: 6.5, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:H/E:P/RL:O/RC:C", version: "3.1", }, products: [ "1", ], }, ], title: "CVE-2021-42374", }, { cve: "CVE-2021-42375", cwe: { id: "CWE-20", name: "Improper Input Validation", }, notes: [ { category: "summary", text: "An incorrect handling of a special element in Busybox's ash applet leads to denial of service when processing a crafted shell command, due to the shell mistaking specific characters for reserved characters. This may be used for DoS under rare conditions of filtered command input.", title: "Summary", }, ], product_status: { known_affected: [ "1", ], }, remediations: [ { category: "vendor_fix", details: "Update to V1.3.0 or later version", product_ids: [ "1", ], url: "https://support.industry.siemens.com/cs/ww/en/view/109945851/", }, { category: "workaround", details: "Only build and run applications from trusted sources", product_ids: [ "1", ], }, ], scores: [ { cvss_v3: { baseScore: 4.1, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C", version: "3.1", }, products: [ "1", ], }, ], title: "CVE-2021-42375", }, { cve: "CVE-2021-42376", cwe: { id: "CWE-476", name: "NULL Pointer Dereference", }, notes: [ { category: "summary", text: "A NULL pointer dereference in Busybox's hush applet leads to denial of service when processing a crafted shell command, due to missing validation after a \\x03 delimiter character. This may be used for DoS under very rare conditions of filtered command input.", title: "Summary", }, ], product_status: { known_affected: [ "1", ], }, remediations: [ { category: "vendor_fix", details: "Update to V1.3.0 or later version", product_ids: [ "1", ], url: "https://support.industry.siemens.com/cs/ww/en/view/109945851/", }, { category: "workaround", details: "Only build and run applications from trusted sources", product_ids: [ "1", ], }, ], scores: [ { cvss_v3: { baseScore: 4.1, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C", version: "3.1", }, products: [ "1", ], }, ], title: "CVE-2021-42376", }, { cve: "CVE-2021-42377", cwe: { id: "CWE-763", name: "Release of Invalid Pointer or Reference", }, notes: [ { category: "summary", text: "An attacker-controlled pointer free in Busybox's hush applet leads to denial of service and possible code execution when processing a crafted shell command, due to the shell mishandling the &&& string. This may be used for remote code execution under rare conditions of filtered command input.", title: "Summary", }, ], product_status: { known_affected: [ "1", ], }, remediations: [ { category: "vendor_fix", details: "Update to V1.3.0 or later version", product_ids: [ "1", ], url: "https://support.industry.siemens.com/cs/ww/en/view/109945851/", }, { category: "workaround", details: "Only build and run applications from trusted sources", product_ids: [ "1", ], }, ], scores: [ { cvss_v3: { baseScore: 6.4, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C", version: "3.1", }, products: [ "1", ], }, ], title: "CVE-2021-42377", }, { cve: "CVE-2021-42378", cwe: { id: "CWE-416", name: "Use After Free", }, notes: [ { category: "summary", text: "A use-after-free in Busybox's awk applet leads to denial of service and possibly code execution when processing a crafted awk pattern in the getvar_i function.", title: "Summary", }, ], product_status: { known_affected: [ "1", ], }, remediations: [ { category: "vendor_fix", details: "Update to V1.3.0 or later version", product_ids: [ "1", ], url: "https://support.industry.siemens.com/cs/ww/en/view/109945851/", }, { category: "workaround", details: "Only build and run applications from trusted sources", product_ids: [ "1", ], }, ], scores: [ { cvss_v3: { baseScore: 6.6, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C", version: "3.1", }, products: [ "1", ], }, ], title: "CVE-2021-42378", }, { cve: "CVE-2021-42379", cwe: { id: "CWE-416", name: "Use After Free", }, notes: [ { category: "summary", text: "A use-after-free in Busybox's awk applet leads to denial of service and possibly code execution when processing a crafted awk pattern in the next_input_file function.", title: "Summary", }, ], product_status: { known_affected: [ "1", ], }, remediations: [ { category: "vendor_fix", details: "Update to V1.3.0 or later version", product_ids: [ "1", ], url: "https://support.industry.siemens.com/cs/ww/en/view/109945851/", }, { category: "workaround", details: "Only build and run applications from trusted sources", product_ids: [ "1", ], }, ], scores: [ { cvss_v3: { baseScore: 6.6, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C", version: "3.1", }, products: [ "1", ], }, ], title: "CVE-2021-42379", }, { cve: "CVE-2021-42380", cwe: { id: "CWE-416", name: "Use After Free", }, notes: [ { category: "summary", text: "A use-after-free in awk leads to denial of service and possibly code execution when processing a crafted awk pattern in the clrvar function.", title: "Summary", }, ], product_status: { known_affected: [ "1", ], }, remediations: [ { category: "vendor_fix", details: "Update to V1.3.0 or later version", product_ids: [ "1", ], url: "https://support.industry.siemens.com/cs/ww/en/view/109945851/", }, { category: "workaround", details: "Only build and run applications from trusted sources", product_ids: [ "1", ], }, ], scores: [ { cvss_v3: { baseScore: 6.6, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C", version: "3.1", }, products: [ "1", ], }, ], title: "CVE-2021-42380", }, { cve: "CVE-2021-42381", cwe: { id: "CWE-416", name: "Use After Free", }, notes: [ { category: "summary", text: "A use-after-free in awk leads to denial of service and possibly code execution when processing a crafted awk pattern in the hash_init function.", title: "Summary", }, ], product_status: { known_affected: [ "1", ], }, remediations: [ { category: "vendor_fix", details: "Update to V1.3.0 or later version", product_ids: [ "1", ], url: "https://support.industry.siemens.com/cs/ww/en/view/109945851/", }, { category: "workaround", details: "Only build and run applications from trusted sources", product_ids: [ "1", ], }, ], scores: [ { cvss_v3: { baseScore: 6.6, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C", version: "3.1", }, products: [ "1", ], }, ], title: "CVE-2021-42381", }, { cve: "CVE-2021-42382", cwe: { id: "CWE-416", name: "Use After Free", }, notes: [ { category: "summary", text: "A use-after-free in awk leads to denial of service and possibly code execution when processing a crafted awk pattern in the getvar_s function.", title: "Summary", }, ], product_status: { known_affected: [ "1", ], }, remediations: [ { category: "vendor_fix", details: "Update to V1.3.0 or later version", product_ids: [ "1", ], url: "https://support.industry.siemens.com/cs/ww/en/view/109945851/", }, { category: "workaround", details: "Only build and run applications from trusted sources", product_ids: [ "1", ], }, ], scores: [ { cvss_v3: { baseScore: 6.6, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C", version: "3.1", }, products: [ "1", ], }, ], title: "CVE-2021-42382", }, { cve: "CVE-2021-42383", cwe: { id: "CWE-416", name: "Use After Free", }, notes: [ { category: "summary", text: "A use-after-free in awk leads to denial of service and possibly code execution when processing a crafted awk pattern in the evaluate function.", title: "Summary", }, ], product_status: { known_affected: [ "1", ], }, remediations: [ { category: "vendor_fix", details: "Update to V1.3.0 or later version", product_ids: [ "1", ], url: "https://support.industry.siemens.com/cs/ww/en/view/109945851/", }, { category: "workaround", details: "Only build and run applications from trusted sources", product_ids: [ "1", ], }, ], scores: [ { cvss_v3: { baseScore: 6.6, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C", version: "3.1", }, products: [ "1", ], }, ], title: "CVE-2021-42383", }, { cve: "CVE-2021-42384", cwe: { id: "CWE-416", name: "Use After Free", }, notes: [ { category: "summary", text: "A use-after-free in Busybox's awk applet leads to denial of service and possibly code execution when processing a crafted awk pattern in the handle_special function.", title: "Summary", }, ], product_status: { known_affected: [ "1", ], }, remediations: [ { category: "vendor_fix", details: "Update to V1.3.0 or later version", product_ids: [ "1", ], url: "https://support.industry.siemens.com/cs/ww/en/view/109945851/", }, { category: "workaround", details: "Only build and run applications from trusted sources", product_ids: [ "1", ], }, ], scores: [ { cvss_v3: { baseScore: 6.6, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C", version: "3.1", }, products: [ "1", ], }, ], title: "CVE-2021-42384", }, { cve: "CVE-2021-42385", cwe: { id: "CWE-416", name: "Use After Free", }, notes: [ { category: "summary", text: "A use-after-free in awk leads to denial of service and possibly code execution when processing a crafted awk pattern in the evaluate function.", title: "Summary", }, ], product_status: { known_affected: [ "1", ], }, remediations: [ { category: "vendor_fix", details: "Update to V1.3.0 or later version", product_ids: [ "1", ], url: "https://support.industry.siemens.com/cs/ww/en/view/109945851/", }, { category: "workaround", details: "Only build and run applications from trusted sources", product_ids: [ "1", ], }, ], scores: [ { cvss_v3: { baseScore: 6.6, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C", version: "3.1", }, products: [ "1", ], }, ], title: "CVE-2021-42385", }, { cve: "CVE-2021-42386", cwe: { id: "CWE-416", name: "Use After Free", }, notes: [ { category: "summary", text: "A use-after-free in awk leads to denial of service and possibly code execution when processing a crafted awk pattern in the nvalloc function.", title: "Summary", }, ], product_status: { known_affected: [ "1", ], }, remediations: [ { category: "vendor_fix", details: "Update to V1.3.0 or later version", product_ids: [ "1", ], url: "https://support.industry.siemens.com/cs/ww/en/view/109945851/", }, { category: "workaround", details: "Only build and run applications from trusted sources", product_ids: [ "1", ], }, ], scores: [ { cvss_v3: { baseScore: 6.6, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C", version: "3.1", }, products: [ "1", ], }, ], title: "CVE-2021-42386", }, { cve: "CVE-2021-44879", cwe: { id: "CWE-476", name: "NULL Pointer Dereference", }, notes: [ { category: "summary", text: "In gc_data_segment in fs/f2fs/gc.c in the Linux kernel before 5.16.3, special files are not considered, leading to a move_data_page NULL pointer dereference.", title: "Summary", }, ], product_status: { known_affected: [ "1", ], }, remediations: [ { category: "vendor_fix", details: "Update to V1.3.0 or later version", product_ids: [ "1", ], url: "https://support.industry.siemens.com/cs/ww/en/view/109945851/", }, { category: "workaround", details: "Only build and run applications from trusted sources", product_ids: [ "1", ], }, ], scores: [ { cvss_v3: { baseScore: 5.5, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C", version: "3.1", }, products: [ "1", ], }, ], title: "CVE-2021-44879", }, { cve: "CVE-2022-1015", cwe: { id: "CWE-787", name: "Out-of-bounds Write", }, notes: [ { category: "summary", text: "A flaw was found in the Linux kernel in linux/net/netfilter/nf_tables_api.c of the netfilter subsystem. This flaw allows a local user to cause an out-of-bounds write issue.", title: "Summary", }, ], product_status: { known_affected: [ "1", ], }, remediations: [ { category: "vendor_fix", details: "Update to V1.3.0 or later version", product_ids: [ "1", ], url: "https://support.industry.siemens.com/cs/ww/en/view/109945851/", }, { category: "workaround", details: "Only build and run applications from trusted sources", product_ids: [ "1", ], }, ], scores: [ { cvss_v3: { baseScore: 6.6, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H/E:P/RL:O/RC:C", version: "3.1", }, products: [ "1", ], }, ], title: "CVE-2022-1015", }, { cve: "CVE-2022-1882", cwe: { id: "CWE-416", name: "Use After Free", }, notes: [ { category: "summary", text: "A use-after-free flaw was found in the Linux kernel’s pipes functionality in how a user performs manipulations with the pipe post_one_notification() after free_pipe_info() that is already called. This flaw allows a local user to crash or potentially escalate their privileges on the system.", title: "Summary", }, ], product_status: { known_affected: [ "1", ], }, remediations: [ { category: "vendor_fix", details: "Update to V1.3.0 or later version", product_ids: [ "1", ], url: "https://support.industry.siemens.com/cs/ww/en/view/109945851/", }, { category: "workaround", details: "Only build and run applications from trusted sources", product_ids: [ "1", ], }, ], scores: [ { cvss_v3: { baseScore: 7.8, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C", version: "3.1", }, products: [ "1", ], }, ], title: "CVE-2022-1882", }, { cve: "CVE-2022-2585", cwe: { id: "CWE-416", name: "Use After Free", }, notes: [ { category: "summary", text: "A use-after-free flaw was found in the Linux kernel’s POSIX CPU timers functionality in the way a user creates and then deletes the timer in the non-leader thread of the program. This flaw allows a local user to crash or potentially escalate their privileges on the system.", title: "Summary", }, ], product_status: { known_affected: [ "1", ], }, remediations: [ { category: "vendor_fix", details: "Update to V1.3.0 or later version", product_ids: [ "1", ], url: "https://support.industry.siemens.com/cs/ww/en/view/109945851/", }, { category: "workaround", details: "Only build and run applications from trusted sources", product_ids: [ "1", ], }, ], scores: [ { cvss_v3: { baseScore: 7.8, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C", version: "3.1", }, products: [ "1", ], }, ], title: "CVE-2022-2585", }, { cve: "CVE-2022-2588", cwe: { id: "CWE-20", name: "Improper Input Validation", }, notes: [ { category: "summary", text: "Zhenpeng Lin discovered that the network packet scheduler implementation in the Linux kernel did not properly remove all references to a route filter before freeing it in some situations. A local attacker could use this to cause a denial of service (system crash) or execute arbitrary code.", title: "Summary", }, ], product_status: { known_affected: [ "1", ], }, remediations: [ { category: "vendor_fix", details: "Update to V1.3.0 or later version", product_ids: [ "1", ], url: "https://support.industry.siemens.com/cs/ww/en/view/109945851/", }, { category: "workaround", details: "Only build and run applications from trusted sources", product_ids: [ "1", ], }, ], scores: [ { cvss_v3: { baseScore: 7.8, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C", version: "3.1", }, products: [ "1", ], }, ], title: "CVE-2022-2588", }, { cve: "CVE-2022-2905", cwe: { id: "CWE-125", name: "Out-of-bounds Read", }, notes: [ { category: "summary", text: "An out-of-bounds memory read flaw was found in the Linux kernel's BPF subsystem in how a user calls the bpf_tail_call function with a key larger than the max_entries of the map. This flaw allows a local user to gain unauthorized access to data.", title: "Summary", }, ], product_status: { known_affected: [ "1", ], }, remediations: [ { category: "vendor_fix", details: "Update to V1.3.0 or later version", product_ids: [ "1", ], url: "https://support.industry.siemens.com/cs/ww/en/view/109945851/", }, { category: "workaround", details: "Only build and run applications from trusted sources", product_ids: [ "1", ], }, ], scores: [ { cvss_v3: { baseScore: 5.5, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:P/RL:O/RC:C", version: "3.1", }, products: [ "1", ], }, ], title: "CVE-2022-2905", }, { cve: "CVE-2022-3028", cwe: { id: "CWE-362", name: "Concurrent Execution using Shared Resource with Improper Synchronization ('Race Condition')", }, notes: [ { category: "summary", text: "A race condition was found in the Linux kernel's IP framework for transforming packets (XFRM subsystem) when multiple calls to xfrm_probe_algs occurred simultaneously. This flaw could allow a local attacker to potentially trigger an out-of-bounds write or leak kernel heap memory by performing an out-of-bounds read and copying it into a socket.", title: "Summary", }, ], product_status: { known_affected: [ "1", ], }, remediations: [ { category: "vendor_fix", details: "Update to V1.3.0 or later version", product_ids: [ "1", ], url: "https://support.industry.siemens.com/cs/ww/en/view/109945851/", }, { category: "workaround", details: "Only build and run applications from trusted sources", product_ids: [ "1", ], }, ], scores: [ { cvss_v3: { baseScore: 7, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C", version: "3.1", }, products: [ "1", ], }, ], title: "CVE-2022-3028", }, { cve: "CVE-2022-3435", cwe: { id: "CWE-119", name: "Improper Restriction of Operations within the Bounds of a Memory Buffer", }, notes: [ { category: "summary", text: "A vulnerability classified as problematic has been found in Linux Kernel. This affects the function fib_nh_match of the file net/ipv4/fib_semantics.c of the component IPv4 Handler. The manipulation leads to out-of-bounds read. It is possible to initiate the attack remotely. It is recommended to apply a patch to fix this issue. The identifier VDB-210357 was assigned to this vulnerability.", title: "Summary", }, ], product_status: { known_affected: [ "1", ], }, remediations: [ { category: "vendor_fix", details: "Update to V1.3.0 or later version", product_ids: [ "1", ], url: "https://support.industry.siemens.com/cs/ww/en/view/109945851/", }, { category: "workaround", details: "Only build and run applications from trusted sources", product_ids: [ "1", ], }, ], scores: [ { cvss_v3: { baseScore: 4.3, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N/E:P/RL:O/RC:C", version: "3.1", }, products: [ "1", ], }, ], title: "CVE-2022-3435", }, { cve: "CVE-2022-3586", cwe: { id: "CWE-416", name: "Use After Free", }, notes: [ { category: "summary", text: "A flaw was found in the Linux kernel’s networking code. A use-after-free was found in the way the sch_sfb enqueue function used the socket buffer (SKB) cb field after the same SKB had been enqueued (and freed) into a child qdisc. This flaw allows a local, unprivileged user to crash the system, causing a denial of service.", title: "Summary", }, ], product_status: { known_affected: [ "1", ], }, remediations: [ { category: "vendor_fix", details: "Update to V1.3.0 or later version", product_ids: [ "1", ], url: "https://support.industry.siemens.com/cs/ww/en/view/109945851/", }, { category: "workaround", details: "Only build and run applications from trusted sources", product_ids: [ "1", ], }, ], scores: [ { cvss_v3: { baseScore: 5.5, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C", version: "3.1", }, products: [ "1", ], }, ], title: "CVE-2022-3586", }, { cve: "CVE-2022-4378", cwe: { id: "CWE-787", name: "Out-of-bounds Write", }, notes: [ { category: "summary", text: "A stack overflow flaw was found in the Linux kernel's SYSCTL subsystem in how a user changes certain kernel parameters and variables. This flaw allows a local user to crash or potentially escalate their privileges on the system.", title: "Summary", }, ], product_status: { known_affected: [ "1", ], }, remediations: [ { category: "vendor_fix", details: "Update to V1.3.0 or later version", product_ids: [ "1", ], url: "https://support.industry.siemens.com/cs/ww/en/view/109945851/", }, { category: "workaround", details: "Only build and run applications from trusted sources", product_ids: [ "1", ], }, ], scores: [ { cvss_v3: { baseScore: 7.8, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C", version: "3.1", }, products: [ "1", ], }, ], title: "CVE-2022-4378", }, { cve: "CVE-2022-4662", cwe: { id: "CWE-455", name: "Non-exit on Failed Initialization", }, notes: [ { category: "summary", text: "A flaw incorrect access control in the Linux kernel USB core subsystem was found in the way user attaches usb device. A local user could use this flaw to crash the system.", title: "Summary", }, ], product_status: { known_affected: [ "1", ], }, remediations: [ { category: "vendor_fix", details: "Update to V1.3.0 or later version", product_ids: [ "1", ], url: "https://support.industry.siemens.com/cs/ww/en/view/109945851/", }, { category: "workaround", details: "Only build and run applications from trusted sources", product_ids: [ "1", ], }, ], scores: [ { cvss_v3: { baseScore: 5.5, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C", version: "3.1", }, products: [ "1", ], }, ], title: "CVE-2022-4662", }, { cve: "CVE-2022-20421", cwe: { id: "CWE-416", name: "Use After Free", }, notes: [ { category: "summary", text: "In binder_inc_ref_for_node of binder.c, there is a possible way to corrupt memory due to a use after free. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-239630375References: Upstream kernel", title: "Summary", }, ], product_status: { known_affected: [ "1", ], }, remediations: [ { category: "vendor_fix", details: "Update to V1.3.0 or later version", product_ids: [ "1", ], url: "https://support.industry.siemens.com/cs/ww/en/view/109945851/", }, { category: "workaround", details: "Only build and run applications from trusted sources", product_ids: [ "1", ], }, ], scores: [ { cvss_v3: { baseScore: 7.8, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C", version: "3.1", }, products: [ "1", ], }, ], title: "CVE-2022-20421", }, { cve: "CVE-2022-20422", cwe: { id: "CWE-362", name: "Concurrent Execution using Shared Resource with Improper Synchronization ('Race Condition')", }, notes: [ { category: "summary", text: "In emulation_proc_handler of armv8_deprecated.c, there is a possible way to corrupt memory due to a race condition. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-237540956References: Upstream kernel", title: "Summary", }, ], product_status: { known_affected: [ "1", ], }, remediations: [ { category: "vendor_fix", details: "Update to V1.3.0 or later version", product_ids: [ "1", ], url: "https://support.industry.siemens.com/cs/ww/en/view/109945851/", }, { category: "workaround", details: "Only build and run applications from trusted sources", product_ids: [ "1", ], }, ], scores: [ { cvss_v3: { baseScore: 7, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C", version: "3.1", }, products: [ "1", ], }, ], title: "CVE-2022-20422", }, { cve: "CVE-2022-21233", cwe: { id: "CWE-311", name: "Missing Encryption of Sensitive Data", }, notes: [ { category: "summary", text: "Improper isolation of shared resources in some Intel(R) Processors may allow a privileged user to potentially enable information disclosure via local access.", title: "Summary", }, ], product_status: { known_affected: [ "1", ], }, remediations: [ { category: "vendor_fix", details: "Update to V1.3.0 or later version", product_ids: [ "1", ], url: "https://support.industry.siemens.com/cs/ww/en/view/109945851/", }, { category: "workaround", details: "Only build and run applications from trusted sources", product_ids: [ "1", ], }, ], scores: [ { cvss_v3: { baseScore: 5.5, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:P/RL:O/RC:C", version: "3.1", }, products: [ "1", ], }, ], title: "CVE-2022-21233", }, { cve: "CVE-2022-23218", cwe: { id: "CWE-120", name: "Buffer Copy without Checking Size of Input ('Classic Buffer Overflow')", }, notes: [ { category: "summary", text: "The deprecated compatibility function svcunix_create in the sunrpc module of the GNU C Library (aka glibc) through 2.34 copies its path argument on the stack without validating its length, which may result in a buffer overflow, potentially resulting in a denial of service or (if an application is not built with a stack protector enabled) arbitrary code execution.", title: "Summary", }, ], product_status: { known_affected: [ "1", ], }, remediations: [ { category: "vendor_fix", details: "Update to V1.3.0 or later version", product_ids: [ "1", ], url: "https://support.industry.siemens.com/cs/ww/en/view/109945851/", }, { category: "workaround", details: "Only build and run applications from trusted sources", product_ids: [ "1", ], }, ], scores: [ { cvss_v3: { baseScore: 9.8, baseSeverity: "CRITICAL", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C", version: "3.1", }, products: [ "1", ], }, ], title: "CVE-2022-23218", }, { cve: "CVE-2022-23219", cwe: { id: "CWE-120", name: "Buffer Copy without Checking Size of Input ('Classic Buffer Overflow')", }, notes: [ { category: "summary", text: "The deprecated compatibility function clnt_create in the sunrpc module of the GNU C Library (aka glibc) through 2.34 copies its hostname argument on the stack without validating its length, which may result in a buffer overflow, potentially resulting in a denial of service or (if an application is not built with a stack protector enabled) arbitrary code execution.", title: "Summary", }, ], product_status: { known_affected: [ "1", ], }, remediations: [ { category: "vendor_fix", details: "Update to V1.3.0 or later version", product_ids: [ "1", ], url: "https://support.industry.siemens.com/cs/ww/en/view/109945851/", }, { category: "workaround", details: "Only build and run applications from trusted sources", product_ids: [ "1", ], }, ], scores: [ { cvss_v3: { baseScore: 9.8, baseSeverity: "CRITICAL", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C", version: "3.1", }, products: [ "1", ], }, ], title: "CVE-2022-23219", }, { cve: "CVE-2022-28391", cwe: { id: "CWE-311", name: "Missing Encryption of Sensitive Data", }, notes: [ { category: "summary", text: "BusyBox through 1.35.0 allows remote attackers to execute arbitrary code if netstat is used to print a DNS PTR record's value to a VT compatible terminal. Alternatively, the attacker could choose to change the terminal's colors.", title: "Summary", }, ], product_status: { known_affected: [ "1", ], }, remediations: [ { category: "vendor_fix", details: "Update to V1.3.0 or later version", product_ids: [ "1", ], url: "https://support.industry.siemens.com/cs/ww/en/view/109945851/", }, { category: "workaround", details: "Only build and run applications from trusted sources", product_ids: [ "1", ], }, ], scores: [ { cvss_v3: { baseScore: 8.8, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C", version: "3.1", }, products: [ "1", ], }, ], title: "CVE-2022-28391", }, { cve: "CVE-2022-30065", cwe: { id: "CWE-416", name: "Use After Free", }, notes: [ { category: "summary", text: "A use-after-free in Busybox 1.35-x's awk applet leads to denial of service and possibly code execution when processing a crafted awk pattern in the copyvar function.", title: "Summary", }, ], product_status: { known_affected: [ "1", ], }, remediations: [ { category: "vendor_fix", details: "Update to V1.3.0 or later version", product_ids: [ "1", ], url: "https://support.industry.siemens.com/cs/ww/en/view/109945851/", }, { category: "workaround", details: "Only build and run applications from trusted sources", product_ids: [ "1", ], }, ], scores: [ { cvss_v3: { baseScore: 7.8, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C", version: "3.1", }, products: [ "1", ], }, ], title: "CVE-2022-30065", }, { cve: "CVE-2022-39188", cwe: { id: "CWE-362", name: "Concurrent Execution using Shared Resource with Improper Synchronization ('Race Condition')", }, notes: [ { category: "summary", text: "An issue was discovered in include/asm-generic/tlb.h in the Linux kernel before 5.19. Because of a race condition (unmap_mapping_range versus munmap), a device driver can free a page while it still has stale TLB entries. This only occurs in situations with VM_PFNMAP VMAs.", title: "Summary", }, ], product_status: { known_affected: [ "1", ], }, remediations: [ { category: "vendor_fix", details: "Update to V1.3.0 or later version", product_ids: [ "1", ], url: "https://support.industry.siemens.com/cs/ww/en/view/109945851/", }, { category: "workaround", details: "Only build and run applications from trusted sources", product_ids: [ "1", ], }, ], scores: [ { cvss_v3: { baseScore: 4.7, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C", version: "3.1", }, products: [ "1", ], }, ], title: "CVE-2022-39188", }, { cve: "CVE-2022-39190", cwe: { id: "CWE-400", name: "Uncontrolled Resource Consumption", }, notes: [ { category: "summary", text: "An issue was discovered in net/netfilter/nf_tables_api.c in the Linux kernel before 5.19.6. A denial of service can occur upon binding to an already bound chain.", title: "Summary", }, ], product_status: { known_affected: [ "1", ], }, remediations: [ { category: "vendor_fix", details: "Update to V1.3.0 or later version", product_ids: [ "1", ], url: "https://support.industry.siemens.com/cs/ww/en/view/109945851/", }, { category: "workaround", details: "Only build and run applications from trusted sources", product_ids: [ "1", ], }, ], scores: [ { cvss_v3: { baseScore: 5.5, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C", version: "3.1", }, products: [ "1", ], }, ], title: "CVE-2022-39190", }, { cve: "CVE-2022-40307", cwe: { id: "CWE-416", name: "Use After Free", }, notes: [ { category: "summary", text: "An issue was discovered in the Linux kernel through 5.19.8. drivers/firmware/efi/capsule-loader.c has a race condition with a resultant use-after-free.", title: "Summary", }, ], product_status: { known_affected: [ "1", ], }, remediations: [ { category: "vendor_fix", details: "Update to V1.3.0 or later version", product_ids: [ "1", ], url: "https://support.industry.siemens.com/cs/ww/en/view/109945851/", }, { category: "workaround", details: "Only build and run applications from trusted sources", product_ids: [ "1", ], }, ], scores: [ { cvss_v3: { baseScore: 4.7, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C", version: "3.1", }, products: [ "1", ], }, ], title: "CVE-2022-40307", }, { cve: "CVE-2022-41222", cwe: { id: "CWE-416", name: "Use After Free", }, notes: [ { category: "summary", text: "mm/mremap.c in the Linux kernel before 5.13.3 has a use-after-free via a stale TLB because an rmap lock is not held during a PUD move.", title: "Summary", }, ], product_status: { known_affected: [ "1", ], }, remediations: [ { category: "vendor_fix", details: "Update to V1.3.0 or later version", product_ids: [ "1", ], url: "https://support.industry.siemens.com/cs/ww/en/view/109945851/", }, { category: "workaround", details: "Only build and run applications from trusted sources", product_ids: [ "1", ], }, ], scores: [ { cvss_v3: { baseScore: 7, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C", version: "3.1", }, products: [ "1", ], }, ], title: "CVE-2022-41222", }, { cve: "CVE-2022-42703", cwe: { id: "CWE-416", name: "Use After Free", }, notes: [ { category: "summary", text: "mm/rmap.c in the Linux kernel before 5.19.7 has a use-after-free related to leaf anon_vma double reuse.", title: "Summary", }, ], product_status: { known_affected: [ "1", ], }, remediations: [ { category: "vendor_fix", details: "Update to V1.3.0 or later version", product_ids: [ "1", ], url: "https://support.industry.siemens.com/cs/ww/en/view/109945851/", }, { category: "workaround", details: "Only build and run applications from trusted sources", product_ids: [ "1", ], }, ], scores: [ { cvss_v3: { baseScore: 5.5, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C", version: "3.1", }, products: [ "1", ], }, ], title: "CVE-2022-42703", }, { cve: "CVE-2023-0179", cwe: { id: "CWE-190", name: "Integer Overflow or Wraparound", }, notes: [ { category: "summary", text: "A buffer overflow vulnerability was found in the Netfilter subsystem in the Linux Kernel. This issue could allow the leakage of both stack and heap addresses, and potentially allow Local Privilege Escalation to the root user via arbitrary code execution.", title: "Summary", }, ], product_status: { known_affected: [ "1", ], }, remediations: [ { category: "vendor_fix", details: "Update to V1.3.0 or later version", product_ids: [ "1", ], url: "https://support.industry.siemens.com/cs/ww/en/view/109945851/", }, { category: "workaround", details: "Only build and run applications from trusted sources", product_ids: [ "1", ], }, ], scores: [ { cvss_v3: { baseScore: 7.8, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C", version: "3.1", }, products: [ "1", ], }, ], title: "CVE-2023-0179", }, { cve: "CVE-2023-0394", cwe: { id: "CWE-311", name: "Missing Encryption of Sensitive Data", }, notes: [ { category: "summary", text: "A NULL pointer dereference flaw was found in rawv6_push_pending_frames in net/ipv6/raw.c in the network subcomponent in the Linux kernel. This flaw causes the system to crash.", title: "Summary", }, ], product_status: { known_affected: [ "1", ], }, remediations: [ { category: "vendor_fix", details: "Update to V1.3.0 or later version", product_ids: [ "1", ], url: "https://support.industry.siemens.com/cs/ww/en/view/109945851/", }, { category: "workaround", details: "Only build and run applications from trusted sources", product_ids: [ "1", ], }, ], scores: [ { cvss_v3: { baseScore: 5.5, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C", version: "3.1", }, products: [ "1", ], }, ], title: "CVE-2023-0394", }, { cve: "CVE-2023-1073", cwe: { id: "CWE-787", name: "Out-of-bounds Write", }, notes: [ { category: "summary", text: "A memory corruption flaw was found in the Linux kernel’s human interface device (HID) subsystem in how a user inserts a malicious USB device. This flaw allows a local user to crash or potentially escalate their privileges on the system.", title: "Summary", }, ], product_status: { known_affected: [ "1", ], }, remediations: [ { category: "vendor_fix", details: "Update to V1.3.0 or later version", product_ids: [ "1", ], url: "https://support.industry.siemens.com/cs/ww/en/view/109945851/", }, { category: "workaround", details: "Only build and run applications from trusted sources", product_ids: [ "1", ], }, ], scores: [ { cvss_v3: { baseScore: 6.6, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C", version: "3.1", }, products: [ "1", ], }, ], title: "CVE-2023-1073", }, { cve: "CVE-2023-2898", cwe: { id: "CWE-476", name: "NULL Pointer Dereference", }, notes: [ { category: "summary", text: "There is a null-pointer-dereference flaw found in f2fs_write_end_io in fs/f2fs/data.c in the Linux kernel. This flaw allows a local privileged user to cause a denial of service problem.", title: "Summary", }, ], product_status: { known_affected: [ "1", ], }, remediations: [ { category: "vendor_fix", details: "Update to V1.3.0 or later version", product_ids: [ "1", ], url: "https://support.industry.siemens.com/cs/ww/en/view/109945851/", }, { category: "workaround", details: "Only build and run applications from trusted sources", product_ids: [ "1", ], }, ], scores: [ { cvss_v3: { baseScore: 4.7, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C", version: "3.1", }, products: [ "1", ], }, ], title: "CVE-2023-2898", }, { cve: "CVE-2023-3390", cwe: { id: "CWE-416", name: "Use After Free", }, notes: [ { category: "summary", text: "A use-after-free vulnerability was found in the Linux kernel's netfilter subsystem in net/netfilter/nf_tables_api.c.\n\nMishandled error handling with NFT_MSG_NEWRULE makes it possible to use a dangling pointer in the same transaction causing a use-after-free vulnerability. This flaw allows a local attacker with user access to cause a privilege escalation issue.\n\nWe recommend upgrading past commit 1240eb93f0616b21c675416516ff3d74798fdc97.", title: "Summary", }, ], product_status: { known_affected: [ "1", ], }, remediations: [ { category: "vendor_fix", details: "Update to V1.3.0 or later version", product_ids: [ "1", ], url: "https://support.industry.siemens.com/cs/ww/en/view/109945851/", }, { category: "workaround", details: "Only build and run applications from trusted sources", product_ids: [ "1", ], }, ], scores: [ { cvss_v3: { baseScore: 7.8, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, products: [ "1", ], }, ], title: "CVE-2023-3390", }, { cve: "CVE-2023-3610", cwe: { id: "CWE-416", name: "Use After Free", }, notes: [ { category: "summary", text: "A use-after-free vulnerability in the Linux kernel's netfilter: nf_tables component can be exploited to achieve local privilege escalation.\r\n\r\nFlaw in the error handling of bound chains causes a use-after-free in the abort path of NFT_MSG_NEWRULE. The vulnerability requires CAP_NET_ADMIN to be triggered.", title: "Summary", }, ], product_status: { known_affected: [ "1", ], }, remediations: [ { category: "vendor_fix", details: "Update to V1.3.0 or later version", product_ids: [ "1", ], url: "https://support.industry.siemens.com/cs/ww/en/view/109945851/", }, { category: "workaround", details: "Only build and run applications from trusted sources", product_ids: [ "1", ], }, ], scores: [ { cvss_v3: { baseScore: 7.8, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, products: [ "1", ], }, ], title: "CVE-2023-3610", }, { cve: "CVE-2023-3611", cwe: { id: "CWE-787", name: "Out-of-bounds Write", }, notes: [ { category: "summary", text: "An out-of-bounds write vulnerability in the Linux kernel's net/sched: sch_qfq component can be exploited to achieve local privilege escalation.\r\n\r\nThe qfq_change_agg() function in net/sched/sch_qfq.c allows an out-of-bounds write because lmax is updated according to packet sizes without bounds checks.", title: "Summary", }, ], product_status: { known_affected: [ "1", ], }, remediations: [ { category: "vendor_fix", details: "Update to V1.3.0 or later version", product_ids: [ "1", ], url: "https://support.industry.siemens.com/cs/ww/en/view/109945851/", }, { category: "workaround", details: "Only build and run applications from trusted sources", product_ids: [ "1", ], }, ], scores: [ { cvss_v3: { baseScore: 7.8, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, products: [ "1", ], }, ], title: "CVE-2023-3611", }, { cve: "CVE-2023-3776", cwe: { id: "CWE-416", name: "Use After Free", }, notes: [ { category: "summary", text: "A use-after-free vulnerability in the Linux kernel's net/sched: cls_fw component can be exploited to achieve local privilege escalation.\r\n\r\nIf tcf_change_indev() fails, fw_set_parms() will immediately return an error after incrementing or decrementing the reference counter in tcf_bind_filter(). If an attacker can control the reference counter and set it to zero, they can cause the reference to be freed, leading to a use-after-free vulnerability.", title: "Summary", }, ], product_status: { known_affected: [ "1", ], }, remediations: [ { category: "vendor_fix", details: "Update to V1.3.0 or later version", product_ids: [ "1", ], url: "https://support.industry.siemens.com/cs/ww/en/view/109945851/", }, { category: "workaround", details: "Only build and run applications from trusted sources", product_ids: [ "1", ], }, ], scores: [ { cvss_v3: { baseScore: 7.8, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, products: [ "1", ], }, ], title: "CVE-2023-3776", }, { cve: "CVE-2023-4004", cwe: { id: "CWE-20", name: "Improper Input Validation", }, notes: [ { category: "summary", text: "A use-after-free flaw was found in the Linux kernel's netfilter in the way a user triggers the nft_pipapo_remove function with the element, without a NFT_SET_EXT_KEY_END. This issue could allow a local user to crash the system or potentially escalate their privileges on the system.", title: "Summary", }, ], product_status: { known_affected: [ "1", ], }, remediations: [ { category: "vendor_fix", details: "Update to V1.3.0 or later version", product_ids: [ "1", ], url: "https://support.industry.siemens.com/cs/ww/en/view/109945851/", }, { category: "workaround", details: "Only build and run applications from trusted sources", product_ids: [ "1", ], }, ], scores: [ { cvss_v3: { baseScore: 7.8, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C", version: "3.1", }, products: [ "1", ], }, ], title: "CVE-2023-4004", }, { cve: "CVE-2023-4015", cwe: { id: "CWE-20", name: "Improper Input Validation", }, notes: [ { category: "summary", text: "The netfilter subsystem in the Linux kernel did not properly handle bound chain deactivation in certain circumstances. A local attacker could possibly use this to cause a denial of service (system crash) or execute arbitrary code.", title: "Summary", }, ], product_status: { known_affected: [ "1", ], }, remediations: [ { category: "vendor_fix", details: "Update to V1.3.0 or later version", product_ids: [ "1", ], url: "https://support.industry.siemens.com/cs/ww/en/view/109945851/", }, { category: "workaround", details: "Only build and run applications from trusted sources", product_ids: [ "1", ], }, ], scores: [ { cvss_v3: { baseScore: 8.4, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C", version: "3.1", }, products: [ "1", ], }, ], title: "CVE-2023-4015", }, { cve: "CVE-2023-4128", cwe: { id: "CWE-416", name: "Use After Free", }, notes: [ { category: "summary", text: "A use-after-free vulnerability in net/sched/cls_fw.c in classifiers (cls_fw, cls_u32, and cls_route) in the Linux Kernel allows a local attacker to perform a local privilege escalation due to incorrect handling of the existing filter, leading to a kernel information leak.", title: "Summary", }, ], product_status: { known_affected: [ "1", ], }, remediations: [ { category: "vendor_fix", details: "Update to V1.3.0 or later version", product_ids: [ "1", ], url: "https://support.industry.siemens.com/cs/ww/en/view/109945851/", }, { category: "workaround", details: "Only build and run applications from trusted sources", product_ids: [ "1", ], }, ], scores: [ { cvss_v3: { baseScore: 7.8, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C", version: "3.1", }, products: [ "1", ], }, ], title: "CVE-2023-4128", }, { cve: "CVE-2023-4147", cwe: { id: "CWE-416", name: "Use After Free", }, notes: [ { category: "summary", text: "A use-after-free vulnerability in the Linux kernel’s Netfilter functionality when adding a rule with NFTA_RULE_CHAIN_ID allows a local user to crash or escalate their privileges on the system.", title: "Summary", }, ], product_status: { known_affected: [ "1", ], }, remediations: [ { category: "vendor_fix", details: "Update to V1.3.0 or later version", product_ids: [ "1", ], url: "https://support.industry.siemens.com/cs/ww/en/view/109945851/", }, { category: "workaround", details: "Only build and run applications from trusted sources", product_ids: [ "1", ], }, ], scores: [ { cvss_v3: { baseScore: 7.8, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C", version: "3.1", }, products: [ "1", ], }, ], title: "CVE-2023-4147", }, { cve: "CVE-2023-4273", cwe: { id: "CWE-121", name: "Stack-based Buffer Overflow", }, notes: [ { category: "summary", text: "This vulnerability exists in the implementation of the file name reconstruction function, which is responsible for reading file name entries from a directory index and merging file name parts belonging to one file into a single long file name. Since the file name characters are copied into a stack variable, a local privileged attacker could use this vulnerability to overflow the kernel stack.", title: "Summary", }, ], product_status: { known_affected: [ "1", ], }, remediations: [ { category: "vendor_fix", details: "Update to V1.3.0 or later version", product_ids: [ "1", ], url: "https://support.industry.siemens.com/cs/ww/en/view/109945851/", }, { category: "workaround", details: "Only build and run applications from trusted sources", product_ids: [ "1", ], }, ], scores: [ { cvss_v3: { baseScore: 6, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:N/E:U/RL:O/RC:C", version: "3.1", }, products: [ "1", ], }, ], title: "CVE-2023-4273", }, { cve: "CVE-2023-4527", cwe: { id: "CWE-125", name: "Out-of-bounds Read", }, notes: [ { category: "summary", text: "A flaw was found in glibc. When the getaddrinfo function is called with the AF_UNSPEC address family and the system is configured with no-aaaa mode via /etc/resolv.conf, a DNS response via TCP larger than 2048 bytes can potentially disclose stack contents through the function returned address data, and may cause a crash.", title: "Summary", }, ], product_status: { known_affected: [ "1", ], }, remediations: [ { category: "vendor_fix", details: "Update to V1.3.0 or later version", product_ids: [ "1", ], url: "https://support.industry.siemens.com/cs/ww/en/view/109945851/", }, { category: "workaround", details: "Only build and run applications from trusted sources", product_ids: [ "1", ], }, ], scores: [ { cvss_v3: { baseScore: 6.5, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:H", version: "3.1", }, products: [ "1", ], }, ], title: "CVE-2023-4527", }, { cve: "CVE-2023-4806", cwe: { id: "CWE-416", name: "Use After Free", }, notes: [ { category: "summary", text: "A flaw was found in glibc. In an extremely rare situation, the getaddrinfo function may access memory that has been freed, resulting in an application crash. This issue is only exploitable when a NSS module implements only the _nss_*_gethostbyname2_r and _nss_*_getcanonname_r hooks without implementing the _nss_*_gethostbyname3_r hook. The resolved name should return a large number of IPv6 and IPv4, and the call to the getaddrinfo function should have the AF_INET6 address family with AI_CANONNAME, AI_ALL and AI_V4MAPPED as flags.", title: "Summary", }, ], product_status: { known_affected: [ "1", ], }, remediations: [ { category: "vendor_fix", details: "Update to V1.3.0 or later version", product_ids: [ "1", ], url: "https://support.industry.siemens.com/cs/ww/en/view/109945851/", }, { category: "workaround", details: "Only build and run applications from trusted sources", product_ids: [ "1", ], }, ], scores: [ { cvss_v3: { baseScore: 5.9, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "1", ], }, ], title: "CVE-2023-4806", }, { cve: "CVE-2023-4911", cwe: { id: "CWE-121", name: "Stack-based Buffer Overflow", }, notes: [ { category: "summary", text: "A buffer overflow was discovered in the GNU C Library's dynamic loader ld.so while processing the GLIBC_TUNABLES environment variable. This issue could allow a local attacker to use maliciously crafted GLIBC_TUNABLES environment variables when launching binaries with SUID permission to execute code with elevated privileges.", title: "Summary", }, ], product_status: { known_affected: [ "1", ], }, remediations: [ { category: "vendor_fix", details: "Update to V1.3.0 or later version", product_ids: [ "1", ], url: "https://support.industry.siemens.com/cs/ww/en/view/109945851/", }, { category: "workaround", details: "Only build and run applications from trusted sources", product_ids: [ "1", ], }, ], scores: [ { cvss_v3: { baseScore: 7.8, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C", version: "3.1", }, products: [ "1", ], }, ], title: "CVE-2023-4911", }, { cve: "CVE-2023-5156", cwe: { id: "CWE-401", name: "Missing Release of Memory after Effective Lifetime", }, notes: [ { category: "summary", text: "A flaw was found in the GNU C Library. A recent fix for CVE-2023-4806 introduced the potential for a memory leak, which may result in an application crash.", title: "Summary", }, ], product_status: { known_affected: [ "1", ], }, remediations: [ { category: "vendor_fix", details: "Update to V1.3.0 or later version", product_ids: [ "1", ], url: "https://support.industry.siemens.com/cs/ww/en/view/109945851/", }, { category: "workaround", details: "Only build and run applications from trusted sources", product_ids: [ "1", ], }, ], scores: [ { cvss_v3: { baseScore: 5.3, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L", version: "3.1", }, products: [ "1", ], }, ], title: "CVE-2023-5156", }, { cve: "CVE-2023-31248", cwe: { id: "CWE-416", name: "Use After Free", }, notes: [ { category: "summary", text: "Linux Kernel nftables Use-After-Free Local Privilege Escalation Vulnerability; `nft_chain_lookup_byid()` failed to check whether a chain was active and CAP_NET_ADMIN is in any user or network namespace", title: "Summary", }, ], product_status: { known_affected: [ "1", ], }, remediations: [ { category: "vendor_fix", details: "Update to V1.3.0 or later version", product_ids: [ "1", ], url: "https://support.industry.siemens.com/cs/ww/en/view/109945851/", }, { category: "workaround", details: "Only build and run applications from trusted sources", product_ids: [ "1", ], }, ], scores: [ { cvss_v3: { baseScore: 7.8, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, products: [ "1", ], }, ], title: "CVE-2023-31248", }, { cve: "CVE-2023-35001", cwe: { id: "CWE-787", name: "Out-of-bounds Write", }, notes: [ { category: "summary", text: "Linux Kernel nftables Out-Of-Bounds Read/Write Vulnerability; nft_byteorder poorly handled vm register contents when CAP_NET_ADMIN is in any user or network namespace", title: "Summary", }, ], product_status: { known_affected: [ "1", ], }, remediations: [ { category: "vendor_fix", details: "Update to V1.3.0 or later version", product_ids: [ "1", ], url: "https://support.industry.siemens.com/cs/ww/en/view/109945851/", }, { category: "workaround", details: "Only build and run applications from trusted sources", product_ids: [ "1", ], }, ], scores: [ { cvss_v3: { baseScore: 7.8, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, products: [ "1", ], }, ], title: "CVE-2023-35001", }, { cve: "CVE-2023-45863", cwe: { id: "CWE-787", name: "Out-of-bounds Write", }, notes: [ { category: "summary", text: "An issue was discovered in lib/kobject.c in the Linux kernel before 6.2.3. With root access, an attacker can trigger a race condition that results in a fill_kobj_path out-of-bounds write.", title: "Summary", }, ], product_status: { known_affected: [ "1", ], }, remediations: [ { category: "vendor_fix", details: "Update to V1.3.0 or later version", product_ids: [ "1", ], url: "https://support.industry.siemens.com/cs/ww/en/view/109945851/", }, { category: "workaround", details: "Only build and run applications from trusted sources", product_ids: [ "1", ], }, ], scores: [ { cvss_v3: { baseScore: 6.4, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C", version: "3.1", }, products: [ "1", ], }, ], title: "CVE-2023-45863", }, ], }
gsd-2021-28831
Vulnerability from gsd
Modified
2023-12-13 01:23
Details
decompress_gunzip.c in BusyBox through 1.32.1 mishandles the error bit on the huft_build result pointer, with a resultant invalid free or segmentation fault, via malformed gzip data.
Aliases
Aliases
{ GSD: { alias: "CVE-2021-28831", description: "decompress_gunzip.c in BusyBox through 1.32.1 mishandles the error bit on the huft_build result pointer, with a resultant invalid free or segmentation fault, via malformed gzip data.", id: "GSD-2021-28831", references: [ "https://www.suse.com/security/cve/CVE-2021-28831.html", "https://ubuntu.com/security/CVE-2021-28831", "https://advisories.mageia.org/CVE-2021-28831.html", "https://security.archlinux.org/CVE-2021-28831", "https://alas.aws.amazon.com/cve/html/CVE-2021-28831.html", ], }, gsd: { metadata: { exploitCode: "unknown", remediation: "unknown", reportConfidence: "confirmed", type: "vulnerability", }, osvSchema: { aliases: [ "CVE-2021-28831", ], details: "decompress_gunzip.c in BusyBox through 1.32.1 mishandles the error bit on the huft_build result pointer, with a resultant invalid free or segmentation fault, via malformed gzip data.", id: "GSD-2021-28831", modified: "2023-12-13T01:23:28.699052Z", schema_version: "1.4.0", }, }, namespaces: { "cve.org": { CVE_data_meta: { ASSIGNER: "cve@mitre.org", ID: "CVE-2021-28831", STATE: "PUBLIC", }, affects: { vendor: { vendor_data: [ { product: { product_data: [ { product_name: "n/a", version: { version_data: [ { version_value: "n/a", }, ], }, }, ], }, vendor_name: "n/a", }, ], }, }, data_format: "MITRE", data_type: "CVE", data_version: "4.0", description: { description_data: [ { lang: "eng", value: "decompress_gunzip.c in BusyBox through 1.32.1 mishandles the error bit on the huft_build result pointer, with a resultant invalid free or segmentation fault, via malformed gzip data.", }, ], }, impact: { cvss: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "HIGH", confidentialityImpact: "NONE", integrityImpact: "NONE", privilegesRequired: "NONE", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.1/AC:L/AV:N/A:H/C:N/I:N/PR:N/S:U/UI:N", version: "3.1", }, }, problemtype: { problemtype_data: [ { description: [ { lang: "eng", value: "n/a", }, ], }, ], }, references: { reference_data: [ { name: "https://git.busybox.net/busybox/commit/?id=f25d254dfd4243698c31a4f3153d4ac72aa9e9bd", refsource: "MISC", url: "https://git.busybox.net/busybox/commit/?id=f25d254dfd4243698c31a4f3153d4ac72aa9e9bd", }, { name: "FEDORA-2021-e82915eee1", refsource: "FEDORA", url: "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ZASBW7QRRLY5V2R44MQ4QQM4CZIDHM2U/", }, { name: "FEDORA-2021-d20c8a4730", refsource: "FEDORA", url: "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/Z7ZIFKPRR32ZYA3WAA2NXFA3QHHOU6FJ/", }, { name: "FEDORA-2021-2024803354", refsource: "FEDORA", url: "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/3UDQGJRECXFS5EZVDH2OI45FMO436AC4/", }, { name: "[debian-lts-announce] 20210401 [SECURITY] [DLA 2614-1] busybox security update", refsource: "MLIST", url: "https://lists.debian.org/debian-lts-announce/2021/04/msg00001.html", }, { name: "GLSA-202105-09", refsource: "GENTOO", url: "https://security.gentoo.org/glsa/202105-09", }, ], }, }, "nvd.nist.gov": { configurations: { CVE_data_version: "4.0", nodes: [ { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:a:busybox:busybox:*:*:*:*:*:*:*:*", cpe_name: [], versionEndIncluding: "1.32.1", versionStartIncluding: "1.32.0", vulnerable: true, }, ], operator: "OR", }, { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:o:fedoraproject:fedora:32:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:fedoraproject:fedora:33:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:fedoraproject:fedora:34:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, ], operator: "OR", }, { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, ], operator: "OR", }, ], }, cve: { CVE_data_meta: { ASSIGNER: "cve@mitre.org", ID: "CVE-2021-28831", }, data_format: "MITRE", data_type: "CVE", data_version: "4.0", description: { description_data: [ { lang: "en", value: "decompress_gunzip.c in BusyBox through 1.32.1 mishandles the error bit on the huft_build result pointer, with a resultant invalid free or segmentation fault, via malformed gzip data.", }, ], }, problemtype: { problemtype_data: [ { description: [ { lang: "en", value: "CWE-755", }, ], }, ], }, references: { reference_data: [ { name: "https://git.busybox.net/busybox/commit/?id=f25d254dfd4243698c31a4f3153d4ac72aa9e9bd", refsource: "MISC", tags: [ "Mailing List", "Patch", "Vendor Advisory", ], url: "https://git.busybox.net/busybox/commit/?id=f25d254dfd4243698c31a4f3153d4ac72aa9e9bd", }, { name: "FEDORA-2021-e82915eee1", refsource: "FEDORA", tags: [ "Mailing List", "Third Party Advisory", ], url: "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ZASBW7QRRLY5V2R44MQ4QQM4CZIDHM2U/", }, { name: "FEDORA-2021-d20c8a4730", refsource: "FEDORA", tags: [ "Mailing List", "Third Party Advisory", ], url: "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/Z7ZIFKPRR32ZYA3WAA2NXFA3QHHOU6FJ/", }, { name: "FEDORA-2021-2024803354", refsource: "FEDORA", tags: [ "Third Party Advisory", ], url: "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/3UDQGJRECXFS5EZVDH2OI45FMO436AC4/", }, { name: "[debian-lts-announce] 20210401 [SECURITY] [DLA 2614-1] busybox security update", refsource: "MLIST", tags: [ "Mailing List", "Third Party Advisory", ], url: "https://lists.debian.org/debian-lts-announce/2021/04/msg00001.html", }, { name: "GLSA-202105-09", refsource: "GENTOO", tags: [ "Third Party Advisory", ], url: "https://security.gentoo.org/glsa/202105-09", }, ], }, }, impact: { baseMetricV2: { acInsufInfo: false, cvssV2: { accessComplexity: "LOW", accessVector: "NETWORK", authentication: "NONE", availabilityImpact: "PARTIAL", baseScore: 5, confidentialityImpact: "NONE", integrityImpact: "NONE", vectorString: "AV:N/AC:L/Au:N/C:N/I:N/A:P", version: "2.0", }, exploitabilityScore: 10, impactScore: 2.9, obtainAllPrivilege: false, obtainOtherPrivilege: false, obtainUserPrivilege: false, severity: "MEDIUM", userInteractionRequired: false, }, baseMetricV3: { cvssV3: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "HIGH", baseScore: 7.5, baseSeverity: "HIGH", confidentialityImpact: "NONE", integrityImpact: "NONE", privilegesRequired: "NONE", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, exploitabilityScore: 3.9, impactScore: 3.6, }, }, lastModifiedDate: "2022-05-20T20:56Z", publishedDate: "2021-03-19T05:15Z", }, }, }
Log in or create an account to share your comment.
Security Advisory comment format.
This schema specifies the format of a comment related to a security advisory.
UUIDv4 of the comment
UUIDv4 of the Vulnerability-Lookup instance
When the comment was created originally
When the comment was last updated
Title of the comment
Description of the comment
The identifier of the vulnerability (CVE ID, GHSA-ID, PYSEC ID, etc.).
Loading…
Loading…
Loading…
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.