Action not permitted
Modal body text goes here.
Modal Title
Modal Body
CVE-2016-6301 (GCVE-0-2016-6301)
Vulnerability from cvelistv5 – Published: 2016-12-09 20:00 – Updated: 2025-12-04 16:45- n/a
| URL | Tags |
|---|---|
| http://www.openwall.com/lists/oss-security/2016/08/03/7 | mailing-listx_refsource_MLIST |
| https://bugzilla.redhat.com/show_bug.cgi?id=1363710 | x_refsource_CONFIRM |
| http://www.securityfocus.com/bid/92277 | vdb-entryx_refsource_BID |
| https://security.gentoo.org/glsa/201701-05 | vendor-advisoryx_refsource_GENTOO |
| https://git.busybox.net/busybox/commit/?id=150dc7… | x_refsource_CONFIRM |
| http://seclists.org/fulldisclosure/2019/Jun/18 | mailing-listx_refsource_FULLDISC |
| https://seclists.org/bugtraq/2019/Jun/14 | mailing-listx_refsource_BUGTRAQ |
| http://packetstormsecurity.com/files/153278/WAGO-… | x_refsource_MISC |
| http://seclists.org/fulldisclosure/2019/Sep/7 | mailing-listx_refsource_FULLDISC |
| https://seclists.org/bugtraq/2019/Sep/7 | mailing-listx_refsource_BUGTRAQ |
| http://packetstormsecurity.com/files/154361/Cisco… | x_refsource_MISC |
| http://seclists.org/fulldisclosure/2020/Mar/15 | mailing-listx_refsource_FULLDISC |
| http://seclists.org/fulldisclosure/2020/Aug/20 | mailing-listx_refsource_FULLDISC |
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-06T01:22:20.879Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"name": "[oss-security] 20160803 CVE-2016-6301: busybox: NTP server denial of service flaw",
"tags": [
"mailing-list",
"x_refsource_MLIST",
"x_transferred"
],
"url": "http://www.openwall.com/lists/oss-security/2016/08/03/7"
},
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1363710"
},
{
"name": "92277",
"tags": [
"vdb-entry",
"x_refsource_BID",
"x_transferred"
],
"url": "http://www.securityfocus.com/bid/92277"
},
{
"name": "GLSA-201701-05",
"tags": [
"vendor-advisory",
"x_refsource_GENTOO",
"x_transferred"
],
"url": "https://security.gentoo.org/glsa/201701-05"
},
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "https://git.busybox.net/busybox/commit/?id=150dc7a2b483b8338a3e185c478b4b23ee884e71"
},
{
"name": "20190612 SEC Consult SA-20190612-0 :: Multiple vulnerabilities in WAGO 852 Industrial Managed Switch Series",
"tags": [
"mailing-list",
"x_refsource_FULLDISC",
"x_transferred"
],
"url": "http://seclists.org/fulldisclosure/2019/Jun/18"
},
{
"name": "20190613 SEC Consult SA-20190612-0 :: Multiple vulnerabilities in WAGO 852 Industrial Managed Switch Series",
"tags": [
"mailing-list",
"x_refsource_BUGTRAQ",
"x_transferred"
],
"url": "https://seclists.org/bugtraq/2019/Jun/14"
},
{
"tags": [
"x_refsource_MISC",
"x_transferred"
],
"url": "http://packetstormsecurity.com/files/153278/WAGO-852-Industrial-Managed-Switch-Series-Code-Execution-Hardcoded-Credentials.html"
},
{
"name": "20190904 SEC Consult SA-20190904-0 :: Multiple vulnerabilities in Cisco router series RV34X, RV26X and RV16X",
"tags": [
"mailing-list",
"x_refsource_FULLDISC",
"x_transferred"
],
"url": "http://seclists.org/fulldisclosure/2019/Sep/7"
},
{
"name": "20190904 SEC Consult SA-20190904-0 :: Multiple vulnerabilities in Cisco router series RV34X, RV26X and RV16X",
"tags": [
"mailing-list",
"x_refsource_BUGTRAQ",
"x_transferred"
],
"url": "https://seclists.org/bugtraq/2019/Sep/7"
},
{
"tags": [
"x_refsource_MISC",
"x_transferred"
],
"url": "http://packetstormsecurity.com/files/154361/Cisco-Device-Hardcoded-Credentials-GNU-glibc-BusyBox.html"
},
{
"name": "20200313 SEC Consult SA-20200312-0 :: Authenticated Command Injection in Phoenix Contact TC Router \u0026 TC Cloud Client",
"tags": [
"mailing-list",
"x_refsource_FULLDISC",
"x_transferred"
],
"url": "http://seclists.org/fulldisclosure/2020/Mar/15"
},
{
"name": "20200827 SEC Consult SA-20200827-0 :: Multiple Vulnerabilities in ZTE mobile Hotspot MS910S",
"tags": [
"mailing-list",
"x_refsource_FULLDISC",
"x_transferred"
],
"url": "http://seclists.org/fulldisclosure/2020/Aug/20"
}
],
"title": "CVE Program Container"
},
{
"metrics": [
{
"cvssV3_1": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
}
},
{
"other": {
"content": {
"id": "CVE-2016-6301",
"options": [
{
"Exploitation": "poc"
},
{
"Automatable": "yes"
},
{
"Technical Impact": "partial"
}
],
"role": "CISA Coordinator",
"timestamp": "2025-12-04T16:45:35.894997Z",
"version": "2.0.3"
},
"type": "ssvc"
}
}
],
"problemTypes": [
{
"descriptions": [
{
"cweId": "CWE-835",
"description": "CWE-835 Loop with Unreachable Exit Condition (\u0027Infinite Loop\u0027)",
"lang": "en",
"type": "CWE"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2025-12-04T16:45:40.416Z",
"orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"shortName": "CISA-ADP"
},
"title": "CISA ADP Vulnrichment"
}
],
"cna": {
"affected": [
{
"product": "n/a",
"vendor": "n/a",
"versions": [
{
"status": "affected",
"version": "n/a"
}
]
}
],
"datePublic": "2016-08-03T00:00:00.000Z",
"descriptions": [
{
"lang": "en",
"value": "The recv_and_process_client_pkt function in networking/ntpd.c in busybox allows remote attackers to cause a denial of service (CPU and bandwidth consumption) via a forged NTP packet, which triggers a communication loop."
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "n/a",
"lang": "en",
"type": "text"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2020-08-27T19:06:09.000Z",
"orgId": "53f830b8-0a3f-465b-8143-3b8a9948e749",
"shortName": "redhat"
},
"references": [
{
"name": "[oss-security] 20160803 CVE-2016-6301: busybox: NTP server denial of service flaw",
"tags": [
"mailing-list",
"x_refsource_MLIST"
],
"url": "http://www.openwall.com/lists/oss-security/2016/08/03/7"
},
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1363710"
},
{
"name": "92277",
"tags": [
"vdb-entry",
"x_refsource_BID"
],
"url": "http://www.securityfocus.com/bid/92277"
},
{
"name": "GLSA-201701-05",
"tags": [
"vendor-advisory",
"x_refsource_GENTOO"
],
"url": "https://security.gentoo.org/glsa/201701-05"
},
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "https://git.busybox.net/busybox/commit/?id=150dc7a2b483b8338a3e185c478b4b23ee884e71"
},
{
"name": "20190612 SEC Consult SA-20190612-0 :: Multiple vulnerabilities in WAGO 852 Industrial Managed Switch Series",
"tags": [
"mailing-list",
"x_refsource_FULLDISC"
],
"url": "http://seclists.org/fulldisclosure/2019/Jun/18"
},
{
"name": "20190613 SEC Consult SA-20190612-0 :: Multiple vulnerabilities in WAGO 852 Industrial Managed Switch Series",
"tags": [
"mailing-list",
"x_refsource_BUGTRAQ"
],
"url": "https://seclists.org/bugtraq/2019/Jun/14"
},
{
"tags": [
"x_refsource_MISC"
],
"url": "http://packetstormsecurity.com/files/153278/WAGO-852-Industrial-Managed-Switch-Series-Code-Execution-Hardcoded-Credentials.html"
},
{
"name": "20190904 SEC Consult SA-20190904-0 :: Multiple vulnerabilities in Cisco router series RV34X, RV26X and RV16X",
"tags": [
"mailing-list",
"x_refsource_FULLDISC"
],
"url": "http://seclists.org/fulldisclosure/2019/Sep/7"
},
{
"name": "20190904 SEC Consult SA-20190904-0 :: Multiple vulnerabilities in Cisco router series RV34X, RV26X and RV16X",
"tags": [
"mailing-list",
"x_refsource_BUGTRAQ"
],
"url": "https://seclists.org/bugtraq/2019/Sep/7"
},
{
"tags": [
"x_refsource_MISC"
],
"url": "http://packetstormsecurity.com/files/154361/Cisco-Device-Hardcoded-Credentials-GNU-glibc-BusyBox.html"
},
{
"name": "20200313 SEC Consult SA-20200312-0 :: Authenticated Command Injection in Phoenix Contact TC Router \u0026 TC Cloud Client",
"tags": [
"mailing-list",
"x_refsource_FULLDISC"
],
"url": "http://seclists.org/fulldisclosure/2020/Mar/15"
},
{
"name": "20200827 SEC Consult SA-20200827-0 :: Multiple Vulnerabilities in ZTE mobile Hotspot MS910S",
"tags": [
"mailing-list",
"x_refsource_FULLDISC"
],
"url": "http://seclists.org/fulldisclosure/2020/Aug/20"
}
]
}
},
"cveMetadata": {
"assignerOrgId": "53f830b8-0a3f-465b-8143-3b8a9948e749",
"assignerShortName": "redhat",
"cveId": "CVE-2016-6301",
"datePublished": "2016-12-09T20:00:00.000Z",
"dateReserved": "2016-07-26T00:00:00.000Z",
"dateUpdated": "2025-12-04T16:45:40.416Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.2",
"vulnerability-lookup:meta": {
"epss": {
"cve": "CVE-2016-6301",
"date": "2026-05-21",
"epss": "0.03277",
"percentile": "0.8733"
},
"fkie_nvd": {
"configurations": "[{\"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:busybox:busybox:*:*:*:*:*:*:*:*\", \"versionEndExcluding\": \"1.25.1\", \"matchCriteriaId\": \"494CF56D-8670-4AFE-B6A9-7C80A76997C3\"}]}]}]",
"descriptions": "[{\"lang\": \"en\", \"value\": \"The recv_and_process_client_pkt function in networking/ntpd.c in busybox allows remote attackers to cause a denial of service (CPU and bandwidth consumption) via a forged NTP packet, which triggers a communication loop.\"}, {\"lang\": \"es\", \"value\": \"La funci\\u00f3n recv_and_process_client_pkt en networking/ntpd.c en busybox permite a atacantes remotos provocar una denegaci\\u00f3n de servicio (consumo de CPU y ancho de banda) a trav\\u00e9s de un paquete NTP falsificado, lo que desencadena un bucle de comunicaci\\u00f3n.\"}]",
"id": "CVE-2016-6301",
"lastModified": "2024-11-21T02:55:51.170",
"metrics": "{\"cvssMetricV30\": [{\"source\": \"nvd@nist.gov\", \"type\": \"Primary\", \"cvssData\": {\"version\": \"3.0\", \"vectorString\": \"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H\", \"baseScore\": 7.5, \"baseSeverity\": \"HIGH\", \"attackVector\": \"NETWORK\", \"attackComplexity\": \"LOW\", \"privilegesRequired\": \"NONE\", \"userInteraction\": \"NONE\", \"scope\": \"UNCHANGED\", \"confidentialityImpact\": \"NONE\", \"integrityImpact\": \"NONE\", \"availabilityImpact\": \"HIGH\"}, \"exploitabilityScore\": 3.9, \"impactScore\": 3.6}], \"cvssMetricV2\": [{\"source\": \"nvd@nist.gov\", \"type\": \"Primary\", \"cvssData\": {\"version\": \"2.0\", \"vectorString\": \"AV:N/AC:L/Au:N/C:N/I:N/A:C\", \"baseScore\": 7.8, \"accessVector\": \"NETWORK\", \"accessComplexity\": \"LOW\", \"authentication\": \"NONE\", \"confidentialityImpact\": \"NONE\", \"integrityImpact\": \"NONE\", \"availabilityImpact\": \"COMPLETE\"}, \"baseSeverity\": \"HIGH\", \"exploitabilityScore\": 10.0, \"impactScore\": 6.9, \"acInsufInfo\": false, \"obtainAllPrivilege\": false, \"obtainUserPrivilege\": false, \"obtainOtherPrivilege\": false, \"userInteractionRequired\": false}]}",
"published": "2016-12-09T20:59:01.827",
"references": "[{\"url\": \"http://packetstormsecurity.com/files/153278/WAGO-852-Industrial-Managed-Switch-Series-Code-Execution-Hardcoded-Credentials.html\", \"source\": \"secalert@redhat.com\"}, {\"url\": \"http://packetstormsecurity.com/files/154361/Cisco-Device-Hardcoded-Credentials-GNU-glibc-BusyBox.html\", \"source\": \"secalert@redhat.com\"}, {\"url\": \"http://seclists.org/fulldisclosure/2019/Jun/18\", \"source\": \"secalert@redhat.com\"}, {\"url\": \"http://seclists.org/fulldisclosure/2019/Sep/7\", \"source\": \"secalert@redhat.com\"}, {\"url\": \"http://seclists.org/fulldisclosure/2020/Aug/20\", \"source\": \"secalert@redhat.com\"}, {\"url\": \"http://seclists.org/fulldisclosure/2020/Mar/15\", \"source\": \"secalert@redhat.com\"}, {\"url\": \"http://www.openwall.com/lists/oss-security/2016/08/03/7\", \"source\": \"secalert@redhat.com\", \"tags\": [\"Mailing List\", \"Third Party Advisory\"]}, {\"url\": \"http://www.securityfocus.com/bid/92277\", \"source\": \"secalert@redhat.com\", \"tags\": [\"Third Party Advisory\", \"VDB Entry\"]}, {\"url\": \"https://bugzilla.redhat.com/show_bug.cgi?id=1363710\", \"source\": \"secalert@redhat.com\", \"tags\": [\"Issue Tracking\", \"Third Party Advisory\"]}, {\"url\": \"https://git.busybox.net/busybox/commit/?id=150dc7a2b483b8338a3e185c478b4b23ee884e71\", \"source\": \"secalert@redhat.com\", \"tags\": [\"Issue Tracking\", \"Patch\"]}, {\"url\": \"https://seclists.org/bugtraq/2019/Jun/14\", \"source\": \"secalert@redhat.com\"}, {\"url\": \"https://seclists.org/bugtraq/2019/Sep/7\", \"source\": \"secalert@redhat.com\"}, {\"url\": \"https://security.gentoo.org/glsa/201701-05\", \"source\": \"secalert@redhat.com\", \"tags\": [\"Third Party Advisory\"]}, {\"url\": \"http://packetstormsecurity.com/files/153278/WAGO-852-Industrial-Managed-Switch-Series-Code-Execution-Hardcoded-Credentials.html\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"http://packetstormsecurity.com/files/154361/Cisco-Device-Hardcoded-Credentials-GNU-glibc-BusyBox.html\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"http://seclists.org/fulldisclosure/2019/Jun/18\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"http://seclists.org/fulldisclosure/2019/Sep/7\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"http://seclists.org/fulldisclosure/2020/Aug/20\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"http://seclists.org/fulldisclosure/2020/Mar/15\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"http://www.openwall.com/lists/oss-security/2016/08/03/7\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Mailing List\", \"Third Party Advisory\"]}, {\"url\": \"http://www.securityfocus.com/bid/92277\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Third Party Advisory\", \"VDB Entry\"]}, {\"url\": \"https://bugzilla.redhat.com/show_bug.cgi?id=1363710\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Issue Tracking\", \"Third Party Advisory\"]}, {\"url\": \"https://git.busybox.net/busybox/commit/?id=150dc7a2b483b8338a3e185c478b4b23ee884e71\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Issue Tracking\", \"Patch\"]}, {\"url\": \"https://seclists.org/bugtraq/2019/Jun/14\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"https://seclists.org/bugtraq/2019/Sep/7\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"https://security.gentoo.org/glsa/201701-05\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Third Party Advisory\"]}]",
"sourceIdentifier": "secalert@redhat.com",
"vulnStatus": "Modified",
"weaknesses": "[{\"source\": \"nvd@nist.gov\", \"type\": \"Primary\", \"description\": [{\"lang\": \"en\", \"value\": \"CWE-399\"}]}]"
},
"nvd": "{\"cve\":{\"id\":\"CVE-2016-6301\",\"sourceIdentifier\":\"secalert@redhat.com\",\"published\":\"2016-12-09T20:59:01.827\",\"lastModified\":\"2026-05-06T22:30:45.220\",\"vulnStatus\":\"Modified\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"The recv_and_process_client_pkt function in networking/ntpd.c in busybox allows remote attackers to cause a denial of service (CPU and bandwidth consumption) via a forged NTP packet, which triggers a communication loop.\"},{\"lang\":\"es\",\"value\":\"La funci\u00f3n recv_and_process_client_pkt en networking/ntpd.c en busybox permite a atacantes remotos provocar una denegaci\u00f3n de servicio (consumo de CPU y ancho de banda) a trav\u00e9s de un paquete NTP falsificado, lo que desencadena un bucle de comunicaci\u00f3n.\"}],\"metrics\":{\"cvssMetricV31\":[{\"source\":\"134c704f-9b21-4f2e-91b3-4a467353bcc0\",\"type\":\"Secondary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H\",\"baseScore\":7.5,\"baseSeverity\":\"HIGH\",\"attackVector\":\"NETWORK\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"NONE\",\"userInteraction\":\"NONE\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"NONE\",\"integrityImpact\":\"NONE\",\"availabilityImpact\":\"HIGH\"},\"exploitabilityScore\":3.9,\"impactScore\":3.6}],\"cvssMetricV30\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"3.0\",\"vectorString\":\"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H\",\"baseScore\":7.5,\"baseSeverity\":\"HIGH\",\"attackVector\":\"NETWORK\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"NONE\",\"userInteraction\":\"NONE\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"NONE\",\"integrityImpact\":\"NONE\",\"availabilityImpact\":\"HIGH\"},\"exploitabilityScore\":3.9,\"impactScore\":3.6}],\"cvssMetricV2\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"2.0\",\"vectorString\":\"AV:N/AC:L/Au:N/C:N/I:N/A:C\",\"baseScore\":7.8,\"accessVector\":\"NETWORK\",\"accessComplexity\":\"LOW\",\"authentication\":\"NONE\",\"confidentialityImpact\":\"NONE\",\"integrityImpact\":\"NONE\",\"availabilityImpact\":\"COMPLETE\"},\"baseSeverity\":\"HIGH\",\"exploitabilityScore\":10.0,\"impactScore\":6.9,\"acInsufInfo\":false,\"obtainAllPrivilege\":false,\"obtainUserPrivilege\":false,\"obtainOtherPrivilege\":false,\"userInteractionRequired\":false}]},\"weaknesses\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-399\"}]},{\"source\":\"134c704f-9b21-4f2e-91b3-4a467353bcc0\",\"type\":\"Secondary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-835\"}]}],\"configurations\":[{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:busybox:busybox:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"1.25.1\",\"matchCriteriaId\":\"494CF56D-8670-4AFE-B6A9-7C80A76997C3\"}]}]}],\"references\":[{\"url\":\"http://packetstormsecurity.com/files/153278/WAGO-852-Industrial-Managed-Switch-Series-Code-Execution-Hardcoded-Credentials.html\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://packetstormsecurity.com/files/154361/Cisco-Device-Hardcoded-Credentials-GNU-glibc-BusyBox.html\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://seclists.org/fulldisclosure/2019/Jun/18\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://seclists.org/fulldisclosure/2019/Sep/7\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://seclists.org/fulldisclosure/2020/Aug/20\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://seclists.org/fulldisclosure/2020/Mar/15\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://www.openwall.com/lists/oss-security/2016/08/03/7\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"http://www.securityfocus.com/bid/92277\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Third Party Advisory\",\"VDB Entry\"]},{\"url\":\"https://bugzilla.redhat.com/show_bug.cgi?id=1363710\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Issue Tracking\",\"Third Party Advisory\"]},{\"url\":\"https://git.busybox.net/busybox/commit/?id=150dc7a2b483b8338a3e185c478b4b23ee884e71\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Issue Tracking\",\"Patch\"]},{\"url\":\"https://seclists.org/bugtraq/2019/Jun/14\",\"source\":\"secalert@redhat.com\"},{\"url\":\"https://seclists.org/bugtraq/2019/Sep/7\",\"source\":\"secalert@redhat.com\"},{\"url\":\"https://security.gentoo.org/glsa/201701-05\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://packetstormsecurity.com/files/153278/WAGO-852-Industrial-Managed-Switch-Series-Code-Execution-Hardcoded-Credentials.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://packetstormsecurity.com/files/154361/Cisco-Device-Hardcoded-Credentials-GNU-glibc-BusyBox.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://seclists.org/fulldisclosure/2019/Jun/18\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://seclists.org/fulldisclosure/2019/Sep/7\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://seclists.org/fulldisclosure/2020/Aug/20\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://seclists.org/fulldisclosure/2020/Mar/15\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.openwall.com/lists/oss-security/2016/08/03/7\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"http://www.securityfocus.com/bid/92277\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\",\"VDB Entry\"]},{\"url\":\"https://bugzilla.redhat.com/show_bug.cgi?id=1363710\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Issue Tracking\",\"Third Party Advisory\"]},{\"url\":\"https://git.busybox.net/busybox/commit/?id=150dc7a2b483b8338a3e185c478b4b23ee884e71\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Issue Tracking\",\"Patch\"]},{\"url\":\"https://seclists.org/bugtraq/2019/Jun/14\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://seclists.org/bugtraq/2019/Sep/7\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://security.gentoo.org/glsa/201701-05\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]}]}}",
"vulnrichment": {
"containers": "{\"adp\": [{\"title\": \"CVE Program Container\", \"references\": [{\"url\": \"http://www.openwall.com/lists/oss-security/2016/08/03/7\", \"name\": \"[oss-security] 20160803 CVE-2016-6301: busybox: NTP server denial of service flaw\", \"tags\": [\"mailing-list\", \"x_refsource_MLIST\", \"x_transferred\"]}, {\"url\": \"https://bugzilla.redhat.com/show_bug.cgi?id=1363710\", \"tags\": [\"x_refsource_CONFIRM\", \"x_transferred\"]}, {\"url\": \"http://www.securityfocus.com/bid/92277\", \"name\": \"92277\", \"tags\": [\"vdb-entry\", \"x_refsource_BID\", \"x_transferred\"]}, {\"url\": \"https://security.gentoo.org/glsa/201701-05\", \"name\": \"GLSA-201701-05\", \"tags\": [\"vendor-advisory\", \"x_refsource_GENTOO\", \"x_transferred\"]}, {\"url\": \"https://git.busybox.net/busybox/commit/?id=150dc7a2b483b8338a3e185c478b4b23ee884e71\", \"tags\": [\"x_refsource_CONFIRM\", \"x_transferred\"]}, {\"url\": \"http://seclists.org/fulldisclosure/2019/Jun/18\", \"name\": \"20190612 SEC Consult SA-20190612-0 :: Multiple vulnerabilities in WAGO 852 Industrial Managed Switch Series\", \"tags\": [\"mailing-list\", \"x_refsource_FULLDISC\", \"x_transferred\"]}, {\"url\": \"https://seclists.org/bugtraq/2019/Jun/14\", \"name\": \"20190613 SEC Consult SA-20190612-0 :: Multiple vulnerabilities in WAGO 852 Industrial Managed Switch Series\", \"tags\": [\"mailing-list\", \"x_refsource_BUGTRAQ\", \"x_transferred\"]}, {\"url\": \"http://packetstormsecurity.com/files/153278/WAGO-852-Industrial-Managed-Switch-Series-Code-Execution-Hardcoded-Credentials.html\", \"tags\": [\"x_refsource_MISC\", \"x_transferred\"]}, {\"url\": \"http://seclists.org/fulldisclosure/2019/Sep/7\", \"name\": \"20190904 SEC Consult SA-20190904-0 :: Multiple vulnerabilities in Cisco router series RV34X, RV26X and RV16X\", \"tags\": [\"mailing-list\", \"x_refsource_FULLDISC\", \"x_transferred\"]}, {\"url\": \"https://seclists.org/bugtraq/2019/Sep/7\", \"name\": \"20190904 SEC Consult SA-20190904-0 :: Multiple vulnerabilities in Cisco router series RV34X, RV26X and RV16X\", \"tags\": [\"mailing-list\", \"x_refsource_BUGTRAQ\", \"x_transferred\"]}, {\"url\": \"http://packetstormsecurity.com/files/154361/Cisco-Device-Hardcoded-Credentials-GNU-glibc-BusyBox.html\", \"tags\": [\"x_refsource_MISC\", \"x_transferred\"]}, {\"url\": \"http://seclists.org/fulldisclosure/2020/Mar/15\", \"name\": \"20200313 SEC Consult SA-20200312-0 :: Authenticated Command Injection in Phoenix Contact TC Router \u0026 TC Cloud Client\", \"tags\": [\"mailing-list\", \"x_refsource_FULLDISC\", \"x_transferred\"]}, {\"url\": \"http://seclists.org/fulldisclosure/2020/Aug/20\", \"name\": \"20200827 SEC Consult SA-20200827-0 :: Multiple Vulnerabilities in ZTE mobile Hotspot MS910S\", \"tags\": [\"mailing-list\", \"x_refsource_FULLDISC\", \"x_transferred\"]}], \"providerMetadata\": {\"orgId\": \"af854a3a-2127-422b-91ae-364da2661108\", \"shortName\": \"CVE\", \"dateUpdated\": \"2024-08-06T01:22:20.879Z\"}}, {\"title\": \"CISA ADP Vulnrichment\", \"metrics\": [{\"cvssV3_1\": {\"scope\": \"UNCHANGED\", \"version\": \"3.1\", \"baseScore\": 7.5, \"attackVector\": \"NETWORK\", \"baseSeverity\": \"HIGH\", \"vectorString\": \"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H\", \"integrityImpact\": \"NONE\", \"userInteraction\": \"NONE\", \"attackComplexity\": \"LOW\", \"availabilityImpact\": \"HIGH\", \"privilegesRequired\": \"NONE\", \"confidentialityImpact\": \"NONE\"}}, {\"other\": {\"type\": \"ssvc\", \"content\": {\"id\": \"CVE-2016-6301\", \"role\": \"CISA Coordinator\", \"options\": [{\"Exploitation\": \"poc\"}, {\"Automatable\": \"yes\"}, {\"Technical Impact\": \"partial\"}], \"version\": \"2.0.3\", \"timestamp\": \"2025-12-04T16:45:35.894997Z\"}}}], \"problemTypes\": [{\"descriptions\": [{\"lang\": \"en\", \"type\": \"CWE\", \"cweId\": \"CWE-835\", \"description\": \"CWE-835 Loop with Unreachable Exit Condition (\u0027Infinite Loop\u0027)\"}]}], \"providerMetadata\": {\"orgId\": \"134c704f-9b21-4f2e-91b3-4a467353bcc0\", \"shortName\": \"CISA-ADP\", \"dateUpdated\": \"2025-12-04T16:43:43.611Z\"}}], \"cna\": {\"affected\": [{\"vendor\": \"n/a\", \"product\": \"n/a\", \"versions\": [{\"status\": \"affected\", \"version\": \"n/a\"}]}], \"datePublic\": \"2016-08-03T00:00:00.000Z\", \"references\": [{\"url\": \"http://www.openwall.com/lists/oss-security/2016/08/03/7\", \"name\": \"[oss-security] 20160803 CVE-2016-6301: busybox: NTP server denial of service flaw\", \"tags\": [\"mailing-list\", \"x_refsource_MLIST\"]}, {\"url\": \"https://bugzilla.redhat.com/show_bug.cgi?id=1363710\", \"tags\": [\"x_refsource_CONFIRM\"]}, {\"url\": \"http://www.securityfocus.com/bid/92277\", \"name\": \"92277\", \"tags\": [\"vdb-entry\", \"x_refsource_BID\"]}, {\"url\": \"https://security.gentoo.org/glsa/201701-05\", \"name\": \"GLSA-201701-05\", \"tags\": [\"vendor-advisory\", \"x_refsource_GENTOO\"]}, {\"url\": \"https://git.busybox.net/busybox/commit/?id=150dc7a2b483b8338a3e185c478b4b23ee884e71\", \"tags\": [\"x_refsource_CONFIRM\"]}, {\"url\": \"http://seclists.org/fulldisclosure/2019/Jun/18\", \"name\": \"20190612 SEC Consult SA-20190612-0 :: Multiple vulnerabilities in WAGO 852 Industrial Managed Switch Series\", \"tags\": [\"mailing-list\", \"x_refsource_FULLDISC\"]}, {\"url\": \"https://seclists.org/bugtraq/2019/Jun/14\", \"name\": \"20190613 SEC Consult SA-20190612-0 :: Multiple vulnerabilities in WAGO 852 Industrial Managed Switch Series\", \"tags\": [\"mailing-list\", \"x_refsource_BUGTRAQ\"]}, {\"url\": \"http://packetstormsecurity.com/files/153278/WAGO-852-Industrial-Managed-Switch-Series-Code-Execution-Hardcoded-Credentials.html\", \"tags\": [\"x_refsource_MISC\"]}, {\"url\": \"http://seclists.org/fulldisclosure/2019/Sep/7\", \"name\": \"20190904 SEC Consult SA-20190904-0 :: Multiple vulnerabilities in Cisco router series RV34X, RV26X and RV16X\", \"tags\": [\"mailing-list\", \"x_refsource_FULLDISC\"]}, {\"url\": \"https://seclists.org/bugtraq/2019/Sep/7\", \"name\": \"20190904 SEC Consult SA-20190904-0 :: Multiple vulnerabilities in Cisco router series RV34X, RV26X and RV16X\", \"tags\": [\"mailing-list\", \"x_refsource_BUGTRAQ\"]}, {\"url\": \"http://packetstormsecurity.com/files/154361/Cisco-Device-Hardcoded-Credentials-GNU-glibc-BusyBox.html\", \"tags\": [\"x_refsource_MISC\"]}, {\"url\": \"http://seclists.org/fulldisclosure/2020/Mar/15\", \"name\": \"20200313 SEC Consult SA-20200312-0 :: Authenticated Command Injection in Phoenix Contact TC Router \u0026 TC Cloud Client\", \"tags\": [\"mailing-list\", \"x_refsource_FULLDISC\"]}, {\"url\": \"http://seclists.org/fulldisclosure/2020/Aug/20\", \"name\": \"20200827 SEC Consult SA-20200827-0 :: Multiple Vulnerabilities in ZTE mobile Hotspot MS910S\", \"tags\": [\"mailing-list\", \"x_refsource_FULLDISC\"]}], \"descriptions\": [{\"lang\": \"en\", \"value\": \"The recv_and_process_client_pkt function in networking/ntpd.c in busybox allows remote attackers to cause a denial of service (CPU and bandwidth consumption) via a forged NTP packet, which triggers a communication loop.\"}], \"problemTypes\": [{\"descriptions\": [{\"lang\": \"en\", \"type\": \"text\", \"description\": \"n/a\"}]}], \"providerMetadata\": {\"orgId\": \"53f830b8-0a3f-465b-8143-3b8a9948e749\", \"shortName\": \"redhat\", \"dateUpdated\": \"2020-08-27T19:06:09.000Z\"}}}",
"cveMetadata": "{\"cveId\": \"CVE-2016-6301\", \"state\": \"PUBLISHED\", \"dateUpdated\": \"2025-12-04T16:45:40.416Z\", \"dateReserved\": \"2016-07-26T00:00:00.000Z\", \"assignerOrgId\": \"53f830b8-0a3f-465b-8143-3b8a9948e749\", \"datePublished\": \"2016-12-09T20:00:00.000Z\", \"assignerShortName\": \"redhat\"}",
"dataType": "CVE_RECORD",
"dataVersion": "5.2"
}
}
}
SUSE-SU-2022:3959-1
Vulnerability from csaf_suse - Published: 2022-11-11 14:38 - Updated: 2022-11-11 14:38| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-1.35.0-150400.3.3.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-1.35.0-150400.3.3.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-1.35.0-150400.3.3.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-1.35.0-150400.3.3.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-static-1.35.0-150400.3.3.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-static-1.35.0-150400.3.3.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-static-1.35.0-150400.3.3.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-static-1.35.0-150400.3.3.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.4:busybox-1.35.0-150400.3.3.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.4:busybox-1.35.0-150400.3.3.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.4:busybox-1.35.0-150400.3.3.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.4:busybox-1.35.0-150400.3.3.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.4:busybox-static-1.35.0-150400.3.3.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.4:busybox-static-1.35.0-150400.3.3.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.4:busybox-static-1.35.0-150400.3.3.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.4:busybox-static-1.35.0-150400.3.3.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.4:busybox-testsuite-1.35.0-150400.3.3.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.4:busybox-testsuite-1.35.0-150400.3.3.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.4:busybox-testsuite-1.35.0-150400.3.3.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.4:busybox-testsuite-1.35.0-150400.3.3.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.4:busybox-warewulf3-1.35.0-150400.3.3.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.4:busybox-warewulf3-1.35.0-150400.3.3.1.x86_64 | — |
Vendor Fix
|
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-1.35.0-150400.3.3.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-1.35.0-150400.3.3.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-1.35.0-150400.3.3.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-1.35.0-150400.3.3.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-static-1.35.0-150400.3.3.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-static-1.35.0-150400.3.3.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-static-1.35.0-150400.3.3.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-static-1.35.0-150400.3.3.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.4:busybox-1.35.0-150400.3.3.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.4:busybox-1.35.0-150400.3.3.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.4:busybox-1.35.0-150400.3.3.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.4:busybox-1.35.0-150400.3.3.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.4:busybox-static-1.35.0-150400.3.3.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.4:busybox-static-1.35.0-150400.3.3.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.4:busybox-static-1.35.0-150400.3.3.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.4:busybox-static-1.35.0-150400.3.3.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.4:busybox-testsuite-1.35.0-150400.3.3.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.4:busybox-testsuite-1.35.0-150400.3.3.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.4:busybox-testsuite-1.35.0-150400.3.3.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.4:busybox-testsuite-1.35.0-150400.3.3.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.4:busybox-warewulf3-1.35.0-150400.3.3.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.4:busybox-warewulf3-1.35.0-150400.3.3.1.x86_64 | — |
Vendor Fix
|
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-1.35.0-150400.3.3.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-1.35.0-150400.3.3.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-1.35.0-150400.3.3.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-1.35.0-150400.3.3.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-static-1.35.0-150400.3.3.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-static-1.35.0-150400.3.3.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-static-1.35.0-150400.3.3.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-static-1.35.0-150400.3.3.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.4:busybox-1.35.0-150400.3.3.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.4:busybox-1.35.0-150400.3.3.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.4:busybox-1.35.0-150400.3.3.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.4:busybox-1.35.0-150400.3.3.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.4:busybox-static-1.35.0-150400.3.3.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.4:busybox-static-1.35.0-150400.3.3.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.4:busybox-static-1.35.0-150400.3.3.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.4:busybox-static-1.35.0-150400.3.3.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.4:busybox-testsuite-1.35.0-150400.3.3.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.4:busybox-testsuite-1.35.0-150400.3.3.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.4:busybox-testsuite-1.35.0-150400.3.3.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.4:busybox-testsuite-1.35.0-150400.3.3.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.4:busybox-warewulf3-1.35.0-150400.3.3.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.4:busybox-warewulf3-1.35.0-150400.3.3.1.x86_64 | — |
Vendor Fix
|
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-1.35.0-150400.3.3.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-1.35.0-150400.3.3.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-1.35.0-150400.3.3.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-1.35.0-150400.3.3.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-static-1.35.0-150400.3.3.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-static-1.35.0-150400.3.3.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-static-1.35.0-150400.3.3.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-static-1.35.0-150400.3.3.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.4:busybox-1.35.0-150400.3.3.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.4:busybox-1.35.0-150400.3.3.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.4:busybox-1.35.0-150400.3.3.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.4:busybox-1.35.0-150400.3.3.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.4:busybox-static-1.35.0-150400.3.3.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.4:busybox-static-1.35.0-150400.3.3.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.4:busybox-static-1.35.0-150400.3.3.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.4:busybox-static-1.35.0-150400.3.3.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.4:busybox-testsuite-1.35.0-150400.3.3.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.4:busybox-testsuite-1.35.0-150400.3.3.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.4:busybox-testsuite-1.35.0-150400.3.3.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.4:busybox-testsuite-1.35.0-150400.3.3.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.4:busybox-warewulf3-1.35.0-150400.3.3.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.4:busybox-warewulf3-1.35.0-150400.3.3.1.x86_64 | — |
Vendor Fix
|
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-1.35.0-150400.3.3.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-1.35.0-150400.3.3.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-1.35.0-150400.3.3.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-1.35.0-150400.3.3.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-static-1.35.0-150400.3.3.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-static-1.35.0-150400.3.3.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-static-1.35.0-150400.3.3.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-static-1.35.0-150400.3.3.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.4:busybox-1.35.0-150400.3.3.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.4:busybox-1.35.0-150400.3.3.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.4:busybox-1.35.0-150400.3.3.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.4:busybox-1.35.0-150400.3.3.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.4:busybox-static-1.35.0-150400.3.3.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.4:busybox-static-1.35.0-150400.3.3.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.4:busybox-static-1.35.0-150400.3.3.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.4:busybox-static-1.35.0-150400.3.3.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.4:busybox-testsuite-1.35.0-150400.3.3.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.4:busybox-testsuite-1.35.0-150400.3.3.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.4:busybox-testsuite-1.35.0-150400.3.3.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.4:busybox-testsuite-1.35.0-150400.3.3.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.4:busybox-warewulf3-1.35.0-150400.3.3.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.4:busybox-warewulf3-1.35.0-150400.3.3.1.x86_64 | — |
Vendor Fix
|
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-1.35.0-150400.3.3.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-1.35.0-150400.3.3.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-1.35.0-150400.3.3.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-1.35.0-150400.3.3.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-static-1.35.0-150400.3.3.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-static-1.35.0-150400.3.3.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-static-1.35.0-150400.3.3.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-static-1.35.0-150400.3.3.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.4:busybox-1.35.0-150400.3.3.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.4:busybox-1.35.0-150400.3.3.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.4:busybox-1.35.0-150400.3.3.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.4:busybox-1.35.0-150400.3.3.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.4:busybox-static-1.35.0-150400.3.3.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.4:busybox-static-1.35.0-150400.3.3.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.4:busybox-static-1.35.0-150400.3.3.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.4:busybox-static-1.35.0-150400.3.3.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.4:busybox-testsuite-1.35.0-150400.3.3.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.4:busybox-testsuite-1.35.0-150400.3.3.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.4:busybox-testsuite-1.35.0-150400.3.3.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.4:busybox-testsuite-1.35.0-150400.3.3.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.4:busybox-warewulf3-1.35.0-150400.3.3.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.4:busybox-warewulf3-1.35.0-150400.3.3.1.x86_64 | — |
Vendor Fix
|
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-1.35.0-150400.3.3.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-1.35.0-150400.3.3.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-1.35.0-150400.3.3.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-1.35.0-150400.3.3.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-static-1.35.0-150400.3.3.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-static-1.35.0-150400.3.3.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-static-1.35.0-150400.3.3.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-static-1.35.0-150400.3.3.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.4:busybox-1.35.0-150400.3.3.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.4:busybox-1.35.0-150400.3.3.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.4:busybox-1.35.0-150400.3.3.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.4:busybox-1.35.0-150400.3.3.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.4:busybox-static-1.35.0-150400.3.3.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.4:busybox-static-1.35.0-150400.3.3.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.4:busybox-static-1.35.0-150400.3.3.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.4:busybox-static-1.35.0-150400.3.3.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.4:busybox-testsuite-1.35.0-150400.3.3.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.4:busybox-testsuite-1.35.0-150400.3.3.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.4:busybox-testsuite-1.35.0-150400.3.3.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.4:busybox-testsuite-1.35.0-150400.3.3.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.4:busybox-warewulf3-1.35.0-150400.3.3.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.4:busybox-warewulf3-1.35.0-150400.3.3.1.x86_64 | — |
Vendor Fix
|
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-1.35.0-150400.3.3.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-1.35.0-150400.3.3.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-1.35.0-150400.3.3.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-1.35.0-150400.3.3.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-static-1.35.0-150400.3.3.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-static-1.35.0-150400.3.3.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-static-1.35.0-150400.3.3.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-static-1.35.0-150400.3.3.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.4:busybox-1.35.0-150400.3.3.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.4:busybox-1.35.0-150400.3.3.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.4:busybox-1.35.0-150400.3.3.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.4:busybox-1.35.0-150400.3.3.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.4:busybox-static-1.35.0-150400.3.3.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.4:busybox-static-1.35.0-150400.3.3.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.4:busybox-static-1.35.0-150400.3.3.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.4:busybox-static-1.35.0-150400.3.3.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.4:busybox-testsuite-1.35.0-150400.3.3.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.4:busybox-testsuite-1.35.0-150400.3.3.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.4:busybox-testsuite-1.35.0-150400.3.3.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.4:busybox-testsuite-1.35.0-150400.3.3.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.4:busybox-warewulf3-1.35.0-150400.3.3.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.4:busybox-warewulf3-1.35.0-150400.3.3.1.x86_64 | — |
Vendor Fix
|
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-1.35.0-150400.3.3.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-1.35.0-150400.3.3.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-1.35.0-150400.3.3.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-1.35.0-150400.3.3.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-static-1.35.0-150400.3.3.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-static-1.35.0-150400.3.3.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-static-1.35.0-150400.3.3.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-static-1.35.0-150400.3.3.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.4:busybox-1.35.0-150400.3.3.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.4:busybox-1.35.0-150400.3.3.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.4:busybox-1.35.0-150400.3.3.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.4:busybox-1.35.0-150400.3.3.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.4:busybox-static-1.35.0-150400.3.3.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.4:busybox-static-1.35.0-150400.3.3.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.4:busybox-static-1.35.0-150400.3.3.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.4:busybox-static-1.35.0-150400.3.3.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.4:busybox-testsuite-1.35.0-150400.3.3.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.4:busybox-testsuite-1.35.0-150400.3.3.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.4:busybox-testsuite-1.35.0-150400.3.3.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.4:busybox-testsuite-1.35.0-150400.3.3.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.4:busybox-warewulf3-1.35.0-150400.3.3.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.4:busybox-warewulf3-1.35.0-150400.3.3.1.x86_64 | — |
Vendor Fix
|
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-1.35.0-150400.3.3.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-1.35.0-150400.3.3.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-1.35.0-150400.3.3.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-1.35.0-150400.3.3.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-static-1.35.0-150400.3.3.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-static-1.35.0-150400.3.3.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-static-1.35.0-150400.3.3.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-static-1.35.0-150400.3.3.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.4:busybox-1.35.0-150400.3.3.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.4:busybox-1.35.0-150400.3.3.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.4:busybox-1.35.0-150400.3.3.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.4:busybox-1.35.0-150400.3.3.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.4:busybox-static-1.35.0-150400.3.3.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.4:busybox-static-1.35.0-150400.3.3.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.4:busybox-static-1.35.0-150400.3.3.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.4:busybox-static-1.35.0-150400.3.3.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.4:busybox-testsuite-1.35.0-150400.3.3.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.4:busybox-testsuite-1.35.0-150400.3.3.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.4:busybox-testsuite-1.35.0-150400.3.3.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.4:busybox-testsuite-1.35.0-150400.3.3.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.4:busybox-warewulf3-1.35.0-150400.3.3.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.4:busybox-warewulf3-1.35.0-150400.3.3.1.x86_64 | — |
Vendor Fix
|
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-1.35.0-150400.3.3.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-1.35.0-150400.3.3.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-1.35.0-150400.3.3.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-1.35.0-150400.3.3.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-static-1.35.0-150400.3.3.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-static-1.35.0-150400.3.3.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-static-1.35.0-150400.3.3.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-static-1.35.0-150400.3.3.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.4:busybox-1.35.0-150400.3.3.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.4:busybox-1.35.0-150400.3.3.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.4:busybox-1.35.0-150400.3.3.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.4:busybox-1.35.0-150400.3.3.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.4:busybox-static-1.35.0-150400.3.3.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.4:busybox-static-1.35.0-150400.3.3.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.4:busybox-static-1.35.0-150400.3.3.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.4:busybox-static-1.35.0-150400.3.3.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.4:busybox-testsuite-1.35.0-150400.3.3.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.4:busybox-testsuite-1.35.0-150400.3.3.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.4:busybox-testsuite-1.35.0-150400.3.3.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.4:busybox-testsuite-1.35.0-150400.3.3.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.4:busybox-warewulf3-1.35.0-150400.3.3.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.4:busybox-warewulf3-1.35.0-150400.3.3.1.x86_64 | — |
Vendor Fix
|
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-1.35.0-150400.3.3.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-1.35.0-150400.3.3.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-1.35.0-150400.3.3.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-1.35.0-150400.3.3.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-static-1.35.0-150400.3.3.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-static-1.35.0-150400.3.3.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-static-1.35.0-150400.3.3.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-static-1.35.0-150400.3.3.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.4:busybox-1.35.0-150400.3.3.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.4:busybox-1.35.0-150400.3.3.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.4:busybox-1.35.0-150400.3.3.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.4:busybox-1.35.0-150400.3.3.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.4:busybox-static-1.35.0-150400.3.3.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.4:busybox-static-1.35.0-150400.3.3.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.4:busybox-static-1.35.0-150400.3.3.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.4:busybox-static-1.35.0-150400.3.3.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.4:busybox-testsuite-1.35.0-150400.3.3.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.4:busybox-testsuite-1.35.0-150400.3.3.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.4:busybox-testsuite-1.35.0-150400.3.3.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.4:busybox-testsuite-1.35.0-150400.3.3.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.4:busybox-warewulf3-1.35.0-150400.3.3.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.4:busybox-warewulf3-1.35.0-150400.3.3.1.x86_64 | — |
Vendor Fix
|
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-1.35.0-150400.3.3.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-1.35.0-150400.3.3.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-1.35.0-150400.3.3.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-1.35.0-150400.3.3.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-static-1.35.0-150400.3.3.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-static-1.35.0-150400.3.3.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-static-1.35.0-150400.3.3.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-static-1.35.0-150400.3.3.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.4:busybox-1.35.0-150400.3.3.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.4:busybox-1.35.0-150400.3.3.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.4:busybox-1.35.0-150400.3.3.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.4:busybox-1.35.0-150400.3.3.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.4:busybox-static-1.35.0-150400.3.3.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.4:busybox-static-1.35.0-150400.3.3.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.4:busybox-static-1.35.0-150400.3.3.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.4:busybox-static-1.35.0-150400.3.3.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.4:busybox-testsuite-1.35.0-150400.3.3.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.4:busybox-testsuite-1.35.0-150400.3.3.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.4:busybox-testsuite-1.35.0-150400.3.3.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.4:busybox-testsuite-1.35.0-150400.3.3.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.4:busybox-warewulf3-1.35.0-150400.3.3.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.4:busybox-warewulf3-1.35.0-150400.3.3.1.x86_64 | — |
Vendor Fix
|
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-1.35.0-150400.3.3.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-1.35.0-150400.3.3.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-1.35.0-150400.3.3.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-1.35.0-150400.3.3.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-static-1.35.0-150400.3.3.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-static-1.35.0-150400.3.3.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-static-1.35.0-150400.3.3.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-static-1.35.0-150400.3.3.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.4:busybox-1.35.0-150400.3.3.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.4:busybox-1.35.0-150400.3.3.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.4:busybox-1.35.0-150400.3.3.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.4:busybox-1.35.0-150400.3.3.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.4:busybox-static-1.35.0-150400.3.3.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.4:busybox-static-1.35.0-150400.3.3.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.4:busybox-static-1.35.0-150400.3.3.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.4:busybox-static-1.35.0-150400.3.3.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.4:busybox-testsuite-1.35.0-150400.3.3.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.4:busybox-testsuite-1.35.0-150400.3.3.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.4:busybox-testsuite-1.35.0-150400.3.3.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.4:busybox-testsuite-1.35.0-150400.3.3.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.4:busybox-warewulf3-1.35.0-150400.3.3.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.4:busybox-warewulf3-1.35.0-150400.3.3.1.x86_64 | — |
Vendor Fix
|
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-1.35.0-150400.3.3.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-1.35.0-150400.3.3.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-1.35.0-150400.3.3.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-1.35.0-150400.3.3.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-static-1.35.0-150400.3.3.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-static-1.35.0-150400.3.3.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-static-1.35.0-150400.3.3.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-static-1.35.0-150400.3.3.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.4:busybox-1.35.0-150400.3.3.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.4:busybox-1.35.0-150400.3.3.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.4:busybox-1.35.0-150400.3.3.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.4:busybox-1.35.0-150400.3.3.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.4:busybox-static-1.35.0-150400.3.3.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.4:busybox-static-1.35.0-150400.3.3.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.4:busybox-static-1.35.0-150400.3.3.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.4:busybox-static-1.35.0-150400.3.3.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.4:busybox-testsuite-1.35.0-150400.3.3.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.4:busybox-testsuite-1.35.0-150400.3.3.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.4:busybox-testsuite-1.35.0-150400.3.3.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.4:busybox-testsuite-1.35.0-150400.3.3.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.4:busybox-warewulf3-1.35.0-150400.3.3.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.4:busybox-warewulf3-1.35.0-150400.3.3.1.x86_64 | — |
Vendor Fix
|
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-1.35.0-150400.3.3.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-1.35.0-150400.3.3.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-1.35.0-150400.3.3.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-1.35.0-150400.3.3.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-static-1.35.0-150400.3.3.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-static-1.35.0-150400.3.3.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-static-1.35.0-150400.3.3.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-static-1.35.0-150400.3.3.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.4:busybox-1.35.0-150400.3.3.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.4:busybox-1.35.0-150400.3.3.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.4:busybox-1.35.0-150400.3.3.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.4:busybox-1.35.0-150400.3.3.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.4:busybox-static-1.35.0-150400.3.3.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.4:busybox-static-1.35.0-150400.3.3.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.4:busybox-static-1.35.0-150400.3.3.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.4:busybox-static-1.35.0-150400.3.3.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.4:busybox-testsuite-1.35.0-150400.3.3.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.4:busybox-testsuite-1.35.0-150400.3.3.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.4:busybox-testsuite-1.35.0-150400.3.3.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.4:busybox-testsuite-1.35.0-150400.3.3.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.4:busybox-warewulf3-1.35.0-150400.3.3.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.4:busybox-warewulf3-1.35.0-150400.3.3.1.x86_64 | — |
Vendor Fix
|
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-1.35.0-150400.3.3.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-1.35.0-150400.3.3.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-1.35.0-150400.3.3.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-1.35.0-150400.3.3.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-static-1.35.0-150400.3.3.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-static-1.35.0-150400.3.3.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-static-1.35.0-150400.3.3.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-static-1.35.0-150400.3.3.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.4:busybox-1.35.0-150400.3.3.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.4:busybox-1.35.0-150400.3.3.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.4:busybox-1.35.0-150400.3.3.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.4:busybox-1.35.0-150400.3.3.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.4:busybox-static-1.35.0-150400.3.3.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.4:busybox-static-1.35.0-150400.3.3.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.4:busybox-static-1.35.0-150400.3.3.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.4:busybox-static-1.35.0-150400.3.3.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.4:busybox-testsuite-1.35.0-150400.3.3.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.4:busybox-testsuite-1.35.0-150400.3.3.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.4:busybox-testsuite-1.35.0-150400.3.3.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.4:busybox-testsuite-1.35.0-150400.3.3.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.4:busybox-warewulf3-1.35.0-150400.3.3.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.4:busybox-warewulf3-1.35.0-150400.3.3.1.x86_64 | — |
Vendor Fix
|
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-1.35.0-150400.3.3.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-1.35.0-150400.3.3.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-1.35.0-150400.3.3.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-1.35.0-150400.3.3.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-static-1.35.0-150400.3.3.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-static-1.35.0-150400.3.3.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-static-1.35.0-150400.3.3.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-static-1.35.0-150400.3.3.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.4:busybox-1.35.0-150400.3.3.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.4:busybox-1.35.0-150400.3.3.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.4:busybox-1.35.0-150400.3.3.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.4:busybox-1.35.0-150400.3.3.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.4:busybox-static-1.35.0-150400.3.3.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.4:busybox-static-1.35.0-150400.3.3.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.4:busybox-static-1.35.0-150400.3.3.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.4:busybox-static-1.35.0-150400.3.3.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.4:busybox-testsuite-1.35.0-150400.3.3.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.4:busybox-testsuite-1.35.0-150400.3.3.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.4:busybox-testsuite-1.35.0-150400.3.3.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.4:busybox-testsuite-1.35.0-150400.3.3.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.4:busybox-warewulf3-1.35.0-150400.3.3.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.4:busybox-warewulf3-1.35.0-150400.3.3.1.x86_64 | — |
Vendor Fix
|
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-1.35.0-150400.3.3.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-1.35.0-150400.3.3.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-1.35.0-150400.3.3.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-1.35.0-150400.3.3.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-static-1.35.0-150400.3.3.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-static-1.35.0-150400.3.3.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-static-1.35.0-150400.3.3.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-static-1.35.0-150400.3.3.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.4:busybox-1.35.0-150400.3.3.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.4:busybox-1.35.0-150400.3.3.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.4:busybox-1.35.0-150400.3.3.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.4:busybox-1.35.0-150400.3.3.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.4:busybox-static-1.35.0-150400.3.3.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.4:busybox-static-1.35.0-150400.3.3.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.4:busybox-static-1.35.0-150400.3.3.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.4:busybox-static-1.35.0-150400.3.3.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.4:busybox-testsuite-1.35.0-150400.3.3.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.4:busybox-testsuite-1.35.0-150400.3.3.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.4:busybox-testsuite-1.35.0-150400.3.3.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.4:busybox-testsuite-1.35.0-150400.3.3.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.4:busybox-warewulf3-1.35.0-150400.3.3.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.4:busybox-warewulf3-1.35.0-150400.3.3.1.x86_64 | — |
Vendor Fix
|
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-1.35.0-150400.3.3.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-1.35.0-150400.3.3.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-1.35.0-150400.3.3.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-1.35.0-150400.3.3.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-static-1.35.0-150400.3.3.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-static-1.35.0-150400.3.3.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-static-1.35.0-150400.3.3.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-static-1.35.0-150400.3.3.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.4:busybox-1.35.0-150400.3.3.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.4:busybox-1.35.0-150400.3.3.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.4:busybox-1.35.0-150400.3.3.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.4:busybox-1.35.0-150400.3.3.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.4:busybox-static-1.35.0-150400.3.3.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.4:busybox-static-1.35.0-150400.3.3.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.4:busybox-static-1.35.0-150400.3.3.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.4:busybox-static-1.35.0-150400.3.3.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.4:busybox-testsuite-1.35.0-150400.3.3.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.4:busybox-testsuite-1.35.0-150400.3.3.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.4:busybox-testsuite-1.35.0-150400.3.3.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.4:busybox-testsuite-1.35.0-150400.3.3.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.4:busybox-warewulf3-1.35.0-150400.3.3.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.4:busybox-warewulf3-1.35.0-150400.3.3.1.x86_64 | — |
Vendor Fix
|
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-1.35.0-150400.3.3.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-1.35.0-150400.3.3.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-1.35.0-150400.3.3.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-1.35.0-150400.3.3.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-static-1.35.0-150400.3.3.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-static-1.35.0-150400.3.3.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-static-1.35.0-150400.3.3.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-static-1.35.0-150400.3.3.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.4:busybox-1.35.0-150400.3.3.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.4:busybox-1.35.0-150400.3.3.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.4:busybox-1.35.0-150400.3.3.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.4:busybox-1.35.0-150400.3.3.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.4:busybox-static-1.35.0-150400.3.3.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.4:busybox-static-1.35.0-150400.3.3.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.4:busybox-static-1.35.0-150400.3.3.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.4:busybox-static-1.35.0-150400.3.3.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.4:busybox-testsuite-1.35.0-150400.3.3.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.4:busybox-testsuite-1.35.0-150400.3.3.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.4:busybox-testsuite-1.35.0-150400.3.3.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.4:busybox-testsuite-1.35.0-150400.3.3.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.4:busybox-warewulf3-1.35.0-150400.3.3.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.4:busybox-warewulf3-1.35.0-150400.3.3.1.x86_64 | — |
Vendor Fix
|
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-1.35.0-150400.3.3.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-1.35.0-150400.3.3.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-1.35.0-150400.3.3.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-1.35.0-150400.3.3.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-static-1.35.0-150400.3.3.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-static-1.35.0-150400.3.3.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-static-1.35.0-150400.3.3.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-static-1.35.0-150400.3.3.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.4:busybox-1.35.0-150400.3.3.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.4:busybox-1.35.0-150400.3.3.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.4:busybox-1.35.0-150400.3.3.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.4:busybox-1.35.0-150400.3.3.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.4:busybox-static-1.35.0-150400.3.3.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.4:busybox-static-1.35.0-150400.3.3.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.4:busybox-static-1.35.0-150400.3.3.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.4:busybox-static-1.35.0-150400.3.3.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.4:busybox-testsuite-1.35.0-150400.3.3.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.4:busybox-testsuite-1.35.0-150400.3.3.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.4:busybox-testsuite-1.35.0-150400.3.3.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.4:busybox-testsuite-1.35.0-150400.3.3.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.4:busybox-warewulf3-1.35.0-150400.3.3.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.4:busybox-warewulf3-1.35.0-150400.3.3.1.x86_64 | — |
Vendor Fix
|
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-1.35.0-150400.3.3.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-1.35.0-150400.3.3.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-1.35.0-150400.3.3.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-1.35.0-150400.3.3.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-static-1.35.0-150400.3.3.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-static-1.35.0-150400.3.3.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-static-1.35.0-150400.3.3.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-static-1.35.0-150400.3.3.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.4:busybox-1.35.0-150400.3.3.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.4:busybox-1.35.0-150400.3.3.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.4:busybox-1.35.0-150400.3.3.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.4:busybox-1.35.0-150400.3.3.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.4:busybox-static-1.35.0-150400.3.3.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.4:busybox-static-1.35.0-150400.3.3.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.4:busybox-static-1.35.0-150400.3.3.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.4:busybox-static-1.35.0-150400.3.3.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.4:busybox-testsuite-1.35.0-150400.3.3.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.4:busybox-testsuite-1.35.0-150400.3.3.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.4:busybox-testsuite-1.35.0-150400.3.3.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.4:busybox-testsuite-1.35.0-150400.3.3.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.4:busybox-warewulf3-1.35.0-150400.3.3.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.4:busybox-warewulf3-1.35.0-150400.3.3.1.x86_64 | — |
Vendor Fix
|
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-1.35.0-150400.3.3.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-1.35.0-150400.3.3.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-1.35.0-150400.3.3.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-1.35.0-150400.3.3.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-static-1.35.0-150400.3.3.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-static-1.35.0-150400.3.3.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-static-1.35.0-150400.3.3.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-static-1.35.0-150400.3.3.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.4:busybox-1.35.0-150400.3.3.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.4:busybox-1.35.0-150400.3.3.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.4:busybox-1.35.0-150400.3.3.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.4:busybox-1.35.0-150400.3.3.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.4:busybox-static-1.35.0-150400.3.3.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.4:busybox-static-1.35.0-150400.3.3.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.4:busybox-static-1.35.0-150400.3.3.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.4:busybox-static-1.35.0-150400.3.3.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.4:busybox-testsuite-1.35.0-150400.3.3.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.4:busybox-testsuite-1.35.0-150400.3.3.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.4:busybox-testsuite-1.35.0-150400.3.3.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.4:busybox-testsuite-1.35.0-150400.3.3.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.4:busybox-warewulf3-1.35.0-150400.3.3.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.4:busybox-warewulf3-1.35.0-150400.3.3.1.x86_64 | — |
Vendor Fix
|
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-1.35.0-150400.3.3.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-1.35.0-150400.3.3.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-1.35.0-150400.3.3.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-1.35.0-150400.3.3.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-static-1.35.0-150400.3.3.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-static-1.35.0-150400.3.3.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-static-1.35.0-150400.3.3.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-static-1.35.0-150400.3.3.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.4:busybox-1.35.0-150400.3.3.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.4:busybox-1.35.0-150400.3.3.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.4:busybox-1.35.0-150400.3.3.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.4:busybox-1.35.0-150400.3.3.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.4:busybox-static-1.35.0-150400.3.3.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.4:busybox-static-1.35.0-150400.3.3.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.4:busybox-static-1.35.0-150400.3.3.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.4:busybox-static-1.35.0-150400.3.3.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.4:busybox-testsuite-1.35.0-150400.3.3.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.4:busybox-testsuite-1.35.0-150400.3.3.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.4:busybox-testsuite-1.35.0-150400.3.3.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.4:busybox-testsuite-1.35.0-150400.3.3.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.4:busybox-warewulf3-1.35.0-150400.3.3.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.4:busybox-warewulf3-1.35.0-150400.3.3.1.x86_64 | — |
Vendor Fix
|
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-1.35.0-150400.3.3.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-1.35.0-150400.3.3.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-1.35.0-150400.3.3.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-1.35.0-150400.3.3.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-static-1.35.0-150400.3.3.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-static-1.35.0-150400.3.3.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-static-1.35.0-150400.3.3.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-static-1.35.0-150400.3.3.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.4:busybox-1.35.0-150400.3.3.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.4:busybox-1.35.0-150400.3.3.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.4:busybox-1.35.0-150400.3.3.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.4:busybox-1.35.0-150400.3.3.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.4:busybox-static-1.35.0-150400.3.3.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.4:busybox-static-1.35.0-150400.3.3.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.4:busybox-static-1.35.0-150400.3.3.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.4:busybox-static-1.35.0-150400.3.3.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.4:busybox-testsuite-1.35.0-150400.3.3.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.4:busybox-testsuite-1.35.0-150400.3.3.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.4:busybox-testsuite-1.35.0-150400.3.3.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.4:busybox-testsuite-1.35.0-150400.3.3.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.4:busybox-warewulf3-1.35.0-150400.3.3.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.4:busybox-warewulf3-1.35.0-150400.3.3.1.x86_64 | — |
Vendor Fix
|
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-1.35.0-150400.3.3.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-1.35.0-150400.3.3.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-1.35.0-150400.3.3.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-1.35.0-150400.3.3.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-static-1.35.0-150400.3.3.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-static-1.35.0-150400.3.3.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-static-1.35.0-150400.3.3.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-static-1.35.0-150400.3.3.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.4:busybox-1.35.0-150400.3.3.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.4:busybox-1.35.0-150400.3.3.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.4:busybox-1.35.0-150400.3.3.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.4:busybox-1.35.0-150400.3.3.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.4:busybox-static-1.35.0-150400.3.3.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.4:busybox-static-1.35.0-150400.3.3.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.4:busybox-static-1.35.0-150400.3.3.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.4:busybox-static-1.35.0-150400.3.3.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.4:busybox-testsuite-1.35.0-150400.3.3.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.4:busybox-testsuite-1.35.0-150400.3.3.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.4:busybox-testsuite-1.35.0-150400.3.3.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.4:busybox-testsuite-1.35.0-150400.3.3.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.4:busybox-warewulf3-1.35.0-150400.3.3.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.4:busybox-warewulf3-1.35.0-150400.3.3.1.x86_64 | — |
Vendor Fix
|
{
"document": {
"aggregate_severity": {
"namespace": "https://www.suse.com/support/security/rating/",
"text": "important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright 2024 SUSE LLC. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Security update for busybox",
"title": "Title of the patch"
},
{
"category": "description",
"text": "This update for busybox fixes the following issues:\n\n- Enable switch_root\n With this change virtme --force-initramfs works as expected.\n- Enable udhcpc\n\nbusybox was updated to 1.35.0\n\n- Adjust busybox.config for new features in find, date and cpio \n\n- Annotate CVEs already fixed in upstream, but not mentioned in .changes yet:\n\n* CVE-2017-16544 (bsc#1069412): Insufficient sanitization of filenames when autocompleting\n* CVE-2015-9261 (bsc#1102912): huft_build misuses a pointer, causing segfaults\n* CVE-2016-2147 (bsc#970663): out of bounds write (heap) due to integer underflow in udhcpc\n* CVE-2016-2148 (bsc#970662): heap-based buffer overflow in OPTION_6RD parsing\n* CVE-2016-6301 (bsc#991940): NTP server denial of service flaw\n* CVE-2017-15873 (bsc#1064976): The get_next_block function in archival/libarchive/decompress_bunzip2.c has an Integer Overflow\n* CVE-2017-15874 (bsc#1064978): archival/libarchive/decompress_unlzma.c has an Integer Underflow\n* CVE-2019-5747 (bsc#1121428): out of bounds read in udhcp components\n* CVE-2021-42373, CVE-2021-42374, CVE-2021-42375, CVE-2021-42376,\n CVE-2021-42377, CVE-2021-42378, CVE-2021-42379, CVE-2021-42380,\n CVE-2021-42381, CVE-2021-42382, CVE-2021-42383, CVE-2021-42384,\n CVE-2021-42385, CVE-2021-42386 (bsc#1192869) : v1.34.0 bugfixes\n* CVE-2021-28831 (bsc#1184522): invalid free or segmentation fault via malformed gzip data\n* CVE-2018-20679 (bsc#1121426): out of bounds read in udhcp\n* CVE-2018-1000517 (bsc#1099260): Heap-based buffer overflow in the retrieve_file_data()\n* CVE-2011-5325 (bsc#951562): tar directory traversal\n* CVE-2018-1000500 (bsc#1099263): wget: Missing SSL certificate validation\n",
"title": "Description of the patch"
},
{
"category": "details",
"text": "SUSE-2022-3959,SUSE-SLE-Module-Basesystem-15-SP4-2022-3959,openSUSE-SLE-15.4-2022-3959",
"title": "Patchnames"
},
{
"category": "legal_disclaimer",
"text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
"title": "Terms of use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://www.suse.com/support/security/contact/",
"name": "SUSE Product Security Team",
"namespace": "https://www.suse.com/"
},
"references": [
{
"category": "external",
"summary": "SUSE ratings",
"url": "https://www.suse.com/support/security/rating/"
},
{
"category": "self",
"summary": "URL of this CSAF notice",
"url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2022_3959-1.json"
},
{
"category": "self",
"summary": "URL for SUSE-SU-2022:3959-1",
"url": "https://www.suse.com/support/update/announcement/2022/suse-su-20223959-1/"
},
{
"category": "self",
"summary": "E-Mail link for SUSE-SU-2022:3959-1",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2022-November/012904.html"
},
{
"category": "self",
"summary": "SUSE Bug 1064976",
"url": "https://bugzilla.suse.com/1064976"
},
{
"category": "self",
"summary": "SUSE Bug 1064978",
"url": "https://bugzilla.suse.com/1064978"
},
{
"category": "self",
"summary": "SUSE Bug 1069412",
"url": "https://bugzilla.suse.com/1069412"
},
{
"category": "self",
"summary": "SUSE Bug 1099260",
"url": "https://bugzilla.suse.com/1099260"
},
{
"category": "self",
"summary": "SUSE Bug 1099263",
"url": "https://bugzilla.suse.com/1099263"
},
{
"category": "self",
"summary": "SUSE Bug 1102912",
"url": "https://bugzilla.suse.com/1102912"
},
{
"category": "self",
"summary": "SUSE Bug 1121426",
"url": "https://bugzilla.suse.com/1121426"
},
{
"category": "self",
"summary": "SUSE Bug 1121428",
"url": "https://bugzilla.suse.com/1121428"
},
{
"category": "self",
"summary": "SUSE Bug 1184522",
"url": "https://bugzilla.suse.com/1184522"
},
{
"category": "self",
"summary": "SUSE Bug 1192869",
"url": "https://bugzilla.suse.com/1192869"
},
{
"category": "self",
"summary": "SUSE Bug 951562",
"url": "https://bugzilla.suse.com/951562"
},
{
"category": "self",
"summary": "SUSE Bug 970662",
"url": "https://bugzilla.suse.com/970662"
},
{
"category": "self",
"summary": "SUSE Bug 970663",
"url": "https://bugzilla.suse.com/970663"
},
{
"category": "self",
"summary": "SUSE Bug 991940",
"url": "https://bugzilla.suse.com/991940"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2011-5325 page",
"url": "https://www.suse.com/security/cve/CVE-2011-5325/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2015-9261 page",
"url": "https://www.suse.com/security/cve/CVE-2015-9261/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2016-2147 page",
"url": "https://www.suse.com/security/cve/CVE-2016-2147/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2016-2148 page",
"url": "https://www.suse.com/security/cve/CVE-2016-2148/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2016-6301 page",
"url": "https://www.suse.com/security/cve/CVE-2016-6301/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2017-15873 page",
"url": "https://www.suse.com/security/cve/CVE-2017-15873/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2017-15874 page",
"url": "https://www.suse.com/security/cve/CVE-2017-15874/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2017-16544 page",
"url": "https://www.suse.com/security/cve/CVE-2017-16544/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2018-1000500 page",
"url": "https://www.suse.com/security/cve/CVE-2018-1000500/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2018-1000517 page",
"url": "https://www.suse.com/security/cve/CVE-2018-1000517/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2018-20679 page",
"url": "https://www.suse.com/security/cve/CVE-2018-20679/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-5747 page",
"url": "https://www.suse.com/security/cve/CVE-2019-5747/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-28831 page",
"url": "https://www.suse.com/security/cve/CVE-2021-28831/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-42373 page",
"url": "https://www.suse.com/security/cve/CVE-2021-42373/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-42374 page",
"url": "https://www.suse.com/security/cve/CVE-2021-42374/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-42375 page",
"url": "https://www.suse.com/security/cve/CVE-2021-42375/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-42376 page",
"url": "https://www.suse.com/security/cve/CVE-2021-42376/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-42377 page",
"url": "https://www.suse.com/security/cve/CVE-2021-42377/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-42378 page",
"url": "https://www.suse.com/security/cve/CVE-2021-42378/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-42379 page",
"url": "https://www.suse.com/security/cve/CVE-2021-42379/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-42380 page",
"url": "https://www.suse.com/security/cve/CVE-2021-42380/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-42381 page",
"url": "https://www.suse.com/security/cve/CVE-2021-42381/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-42382 page",
"url": "https://www.suse.com/security/cve/CVE-2021-42382/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-42383 page",
"url": "https://www.suse.com/security/cve/CVE-2021-42383/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-42384 page",
"url": "https://www.suse.com/security/cve/CVE-2021-42384/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-42385 page",
"url": "https://www.suse.com/security/cve/CVE-2021-42385/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-42386 page",
"url": "https://www.suse.com/security/cve/CVE-2021-42386/"
}
],
"title": "Security update for busybox",
"tracking": {
"current_release_date": "2022-11-11T14:38:22Z",
"generator": {
"date": "2022-11-11T14:38:22Z",
"engine": {
"name": "cve-database.git:bin/generate-csaf.pl",
"version": "1"
}
},
"id": "SUSE-SU-2022:3959-1",
"initial_release_date": "2022-11-11T14:38:22Z",
"revision_history": [
{
"date": "2022-11-11T14:38:22Z",
"number": "1",
"summary": "Current version"
}
],
"status": "final",
"version": "1"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "busybox-1.35.0-150400.3.3.1.aarch64",
"product": {
"name": "busybox-1.35.0-150400.3.3.1.aarch64",
"product_id": "busybox-1.35.0-150400.3.3.1.aarch64"
}
},
{
"category": "product_version",
"name": "busybox-static-1.35.0-150400.3.3.1.aarch64",
"product": {
"name": "busybox-static-1.35.0-150400.3.3.1.aarch64",
"product_id": "busybox-static-1.35.0-150400.3.3.1.aarch64"
}
},
{
"category": "product_version",
"name": "busybox-testsuite-1.35.0-150400.3.3.1.aarch64",
"product": {
"name": "busybox-testsuite-1.35.0-150400.3.3.1.aarch64",
"product_id": "busybox-testsuite-1.35.0-150400.3.3.1.aarch64"
}
},
{
"category": "product_version",
"name": "busybox-warewulf3-1.35.0-150400.3.3.1.aarch64",
"product": {
"name": "busybox-warewulf3-1.35.0-150400.3.3.1.aarch64",
"product_id": "busybox-warewulf3-1.35.0-150400.3.3.1.aarch64"
}
}
],
"category": "architecture",
"name": "aarch64"
},
{
"branches": [
{
"category": "product_version",
"name": "busybox-1.35.0-150400.3.3.1.i586",
"product": {
"name": "busybox-1.35.0-150400.3.3.1.i586",
"product_id": "busybox-1.35.0-150400.3.3.1.i586"
}
},
{
"category": "product_version",
"name": "busybox-static-1.35.0-150400.3.3.1.i586",
"product": {
"name": "busybox-static-1.35.0-150400.3.3.1.i586",
"product_id": "busybox-static-1.35.0-150400.3.3.1.i586"
}
},
{
"category": "product_version",
"name": "busybox-testsuite-1.35.0-150400.3.3.1.i586",
"product": {
"name": "busybox-testsuite-1.35.0-150400.3.3.1.i586",
"product_id": "busybox-testsuite-1.35.0-150400.3.3.1.i586"
}
},
{
"category": "product_version",
"name": "busybox-warewulf3-1.35.0-150400.3.3.1.i586",
"product": {
"name": "busybox-warewulf3-1.35.0-150400.3.3.1.i586",
"product_id": "busybox-warewulf3-1.35.0-150400.3.3.1.i586"
}
}
],
"category": "architecture",
"name": "i586"
},
{
"branches": [
{
"category": "product_version",
"name": "busybox-1.35.0-150400.3.3.1.ppc64le",
"product": {
"name": "busybox-1.35.0-150400.3.3.1.ppc64le",
"product_id": "busybox-1.35.0-150400.3.3.1.ppc64le"
}
},
{
"category": "product_version",
"name": "busybox-static-1.35.0-150400.3.3.1.ppc64le",
"product": {
"name": "busybox-static-1.35.0-150400.3.3.1.ppc64le",
"product_id": "busybox-static-1.35.0-150400.3.3.1.ppc64le"
}
},
{
"category": "product_version",
"name": "busybox-testsuite-1.35.0-150400.3.3.1.ppc64le",
"product": {
"name": "busybox-testsuite-1.35.0-150400.3.3.1.ppc64le",
"product_id": "busybox-testsuite-1.35.0-150400.3.3.1.ppc64le"
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "busybox-1.35.0-150400.3.3.1.s390x",
"product": {
"name": "busybox-1.35.0-150400.3.3.1.s390x",
"product_id": "busybox-1.35.0-150400.3.3.1.s390x"
}
},
{
"category": "product_version",
"name": "busybox-static-1.35.0-150400.3.3.1.s390x",
"product": {
"name": "busybox-static-1.35.0-150400.3.3.1.s390x",
"product_id": "busybox-static-1.35.0-150400.3.3.1.s390x"
}
},
{
"category": "product_version",
"name": "busybox-testsuite-1.35.0-150400.3.3.1.s390x",
"product": {
"name": "busybox-testsuite-1.35.0-150400.3.3.1.s390x",
"product_id": "busybox-testsuite-1.35.0-150400.3.3.1.s390x"
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "busybox-1.35.0-150400.3.3.1.x86_64",
"product": {
"name": "busybox-1.35.0-150400.3.3.1.x86_64",
"product_id": "busybox-1.35.0-150400.3.3.1.x86_64"
}
},
{
"category": "product_version",
"name": "busybox-static-1.35.0-150400.3.3.1.x86_64",
"product": {
"name": "busybox-static-1.35.0-150400.3.3.1.x86_64",
"product_id": "busybox-static-1.35.0-150400.3.3.1.x86_64"
}
},
{
"category": "product_version",
"name": "busybox-testsuite-1.35.0-150400.3.3.1.x86_64",
"product": {
"name": "busybox-testsuite-1.35.0-150400.3.3.1.x86_64",
"product_id": "busybox-testsuite-1.35.0-150400.3.3.1.x86_64"
}
},
{
"category": "product_version",
"name": "busybox-warewulf3-1.35.0-150400.3.3.1.x86_64",
"product": {
"name": "busybox-warewulf3-1.35.0-150400.3.3.1.x86_64",
"product_id": "busybox-warewulf3-1.35.0-150400.3.3.1.x86_64"
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_name",
"name": "SUSE Linux Enterprise Module for Basesystem 15 SP4",
"product": {
"name": "SUSE Linux Enterprise Module for Basesystem 15 SP4",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP4",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sle-module-basesystem:15:sp4"
}
}
},
{
"category": "product_name",
"name": "openSUSE Leap 15.4",
"product": {
"name": "openSUSE Leap 15.4",
"product_id": "openSUSE Leap 15.4",
"product_identification_helper": {
"cpe": "cpe:/o:opensuse:leap:15.4"
}
}
}
],
"category": "product_family",
"name": "SUSE Linux Enterprise"
}
],
"category": "vendor",
"name": "SUSE"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "busybox-1.35.0-150400.3.3.1.aarch64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP4",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-1.35.0-150400.3.3.1.aarch64"
},
"product_reference": "busybox-1.35.0-150400.3.3.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "busybox-1.35.0-150400.3.3.1.ppc64le as component of SUSE Linux Enterprise Module for Basesystem 15 SP4",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-1.35.0-150400.3.3.1.ppc64le"
},
"product_reference": "busybox-1.35.0-150400.3.3.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "busybox-1.35.0-150400.3.3.1.s390x as component of SUSE Linux Enterprise Module for Basesystem 15 SP4",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-1.35.0-150400.3.3.1.s390x"
},
"product_reference": "busybox-1.35.0-150400.3.3.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "busybox-1.35.0-150400.3.3.1.x86_64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP4",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-1.35.0-150400.3.3.1.x86_64"
},
"product_reference": "busybox-1.35.0-150400.3.3.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "busybox-static-1.35.0-150400.3.3.1.aarch64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP4",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-static-1.35.0-150400.3.3.1.aarch64"
},
"product_reference": "busybox-static-1.35.0-150400.3.3.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "busybox-static-1.35.0-150400.3.3.1.ppc64le as component of SUSE Linux Enterprise Module for Basesystem 15 SP4",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-static-1.35.0-150400.3.3.1.ppc64le"
},
"product_reference": "busybox-static-1.35.0-150400.3.3.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "busybox-static-1.35.0-150400.3.3.1.s390x as component of SUSE Linux Enterprise Module for Basesystem 15 SP4",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-static-1.35.0-150400.3.3.1.s390x"
},
"product_reference": "busybox-static-1.35.0-150400.3.3.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "busybox-static-1.35.0-150400.3.3.1.x86_64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP4",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-static-1.35.0-150400.3.3.1.x86_64"
},
"product_reference": "busybox-static-1.35.0-150400.3.3.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "busybox-1.35.0-150400.3.3.1.aarch64 as component of openSUSE Leap 15.4",
"product_id": "openSUSE Leap 15.4:busybox-1.35.0-150400.3.3.1.aarch64"
},
"product_reference": "busybox-1.35.0-150400.3.3.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "busybox-1.35.0-150400.3.3.1.ppc64le as component of openSUSE Leap 15.4",
"product_id": "openSUSE Leap 15.4:busybox-1.35.0-150400.3.3.1.ppc64le"
},
"product_reference": "busybox-1.35.0-150400.3.3.1.ppc64le",
"relates_to_product_reference": "openSUSE Leap 15.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "busybox-1.35.0-150400.3.3.1.s390x as component of openSUSE Leap 15.4",
"product_id": "openSUSE Leap 15.4:busybox-1.35.0-150400.3.3.1.s390x"
},
"product_reference": "busybox-1.35.0-150400.3.3.1.s390x",
"relates_to_product_reference": "openSUSE Leap 15.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "busybox-1.35.0-150400.3.3.1.x86_64 as component of openSUSE Leap 15.4",
"product_id": "openSUSE Leap 15.4:busybox-1.35.0-150400.3.3.1.x86_64"
},
"product_reference": "busybox-1.35.0-150400.3.3.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "busybox-static-1.35.0-150400.3.3.1.aarch64 as component of openSUSE Leap 15.4",
"product_id": "openSUSE Leap 15.4:busybox-static-1.35.0-150400.3.3.1.aarch64"
},
"product_reference": "busybox-static-1.35.0-150400.3.3.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "busybox-static-1.35.0-150400.3.3.1.ppc64le as component of openSUSE Leap 15.4",
"product_id": "openSUSE Leap 15.4:busybox-static-1.35.0-150400.3.3.1.ppc64le"
},
"product_reference": "busybox-static-1.35.0-150400.3.3.1.ppc64le",
"relates_to_product_reference": "openSUSE Leap 15.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "busybox-static-1.35.0-150400.3.3.1.s390x as component of openSUSE Leap 15.4",
"product_id": "openSUSE Leap 15.4:busybox-static-1.35.0-150400.3.3.1.s390x"
},
"product_reference": "busybox-static-1.35.0-150400.3.3.1.s390x",
"relates_to_product_reference": "openSUSE Leap 15.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "busybox-static-1.35.0-150400.3.3.1.x86_64 as component of openSUSE Leap 15.4",
"product_id": "openSUSE Leap 15.4:busybox-static-1.35.0-150400.3.3.1.x86_64"
},
"product_reference": "busybox-static-1.35.0-150400.3.3.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "busybox-testsuite-1.35.0-150400.3.3.1.aarch64 as component of openSUSE Leap 15.4",
"product_id": "openSUSE Leap 15.4:busybox-testsuite-1.35.0-150400.3.3.1.aarch64"
},
"product_reference": "busybox-testsuite-1.35.0-150400.3.3.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "busybox-testsuite-1.35.0-150400.3.3.1.ppc64le as component of openSUSE Leap 15.4",
"product_id": "openSUSE Leap 15.4:busybox-testsuite-1.35.0-150400.3.3.1.ppc64le"
},
"product_reference": "busybox-testsuite-1.35.0-150400.3.3.1.ppc64le",
"relates_to_product_reference": "openSUSE Leap 15.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "busybox-testsuite-1.35.0-150400.3.3.1.s390x as component of openSUSE Leap 15.4",
"product_id": "openSUSE Leap 15.4:busybox-testsuite-1.35.0-150400.3.3.1.s390x"
},
"product_reference": "busybox-testsuite-1.35.0-150400.3.3.1.s390x",
"relates_to_product_reference": "openSUSE Leap 15.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "busybox-testsuite-1.35.0-150400.3.3.1.x86_64 as component of openSUSE Leap 15.4",
"product_id": "openSUSE Leap 15.4:busybox-testsuite-1.35.0-150400.3.3.1.x86_64"
},
"product_reference": "busybox-testsuite-1.35.0-150400.3.3.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "busybox-warewulf3-1.35.0-150400.3.3.1.aarch64 as component of openSUSE Leap 15.4",
"product_id": "openSUSE Leap 15.4:busybox-warewulf3-1.35.0-150400.3.3.1.aarch64"
},
"product_reference": "busybox-warewulf3-1.35.0-150400.3.3.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "busybox-warewulf3-1.35.0-150400.3.3.1.x86_64 as component of openSUSE Leap 15.4",
"product_id": "openSUSE Leap 15.4:busybox-warewulf3-1.35.0-150400.3.3.1.x86_64"
},
"product_reference": "busybox-warewulf3-1.35.0-150400.3.3.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.4"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2011-5325",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2011-5325"
}
],
"notes": [
{
"category": "general",
"text": "Directory traversal vulnerability in the BusyBox implementation of tar before 1.22.0 v5 allows remote attackers to point to files outside the current working directory via a symlink.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-1.35.0-150400.3.3.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-1.35.0-150400.3.3.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-1.35.0-150400.3.3.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-1.35.0-150400.3.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-static-1.35.0-150400.3.3.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-static-1.35.0-150400.3.3.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-static-1.35.0-150400.3.3.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-static-1.35.0-150400.3.3.1.x86_64",
"openSUSE Leap 15.4:busybox-1.35.0-150400.3.3.1.aarch64",
"openSUSE Leap 15.4:busybox-1.35.0-150400.3.3.1.ppc64le",
"openSUSE Leap 15.4:busybox-1.35.0-150400.3.3.1.s390x",
"openSUSE Leap 15.4:busybox-1.35.0-150400.3.3.1.x86_64",
"openSUSE Leap 15.4:busybox-static-1.35.0-150400.3.3.1.aarch64",
"openSUSE Leap 15.4:busybox-static-1.35.0-150400.3.3.1.ppc64le",
"openSUSE Leap 15.4:busybox-static-1.35.0-150400.3.3.1.s390x",
"openSUSE Leap 15.4:busybox-static-1.35.0-150400.3.3.1.x86_64",
"openSUSE Leap 15.4:busybox-testsuite-1.35.0-150400.3.3.1.aarch64",
"openSUSE Leap 15.4:busybox-testsuite-1.35.0-150400.3.3.1.ppc64le",
"openSUSE Leap 15.4:busybox-testsuite-1.35.0-150400.3.3.1.s390x",
"openSUSE Leap 15.4:busybox-testsuite-1.35.0-150400.3.3.1.x86_64",
"openSUSE Leap 15.4:busybox-warewulf3-1.35.0-150400.3.3.1.aarch64",
"openSUSE Leap 15.4:busybox-warewulf3-1.35.0-150400.3.3.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2011-5325",
"url": "https://www.suse.com/security/cve/CVE-2011-5325"
},
{
"category": "external",
"summary": "SUSE Bug 951562 for CVE-2011-5325",
"url": "https://bugzilla.suse.com/951562"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-1.35.0-150400.3.3.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-1.35.0-150400.3.3.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-1.35.0-150400.3.3.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-1.35.0-150400.3.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-static-1.35.0-150400.3.3.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-static-1.35.0-150400.3.3.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-static-1.35.0-150400.3.3.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-static-1.35.0-150400.3.3.1.x86_64",
"openSUSE Leap 15.4:busybox-1.35.0-150400.3.3.1.aarch64",
"openSUSE Leap 15.4:busybox-1.35.0-150400.3.3.1.ppc64le",
"openSUSE Leap 15.4:busybox-1.35.0-150400.3.3.1.s390x",
"openSUSE Leap 15.4:busybox-1.35.0-150400.3.3.1.x86_64",
"openSUSE Leap 15.4:busybox-static-1.35.0-150400.3.3.1.aarch64",
"openSUSE Leap 15.4:busybox-static-1.35.0-150400.3.3.1.ppc64le",
"openSUSE Leap 15.4:busybox-static-1.35.0-150400.3.3.1.s390x",
"openSUSE Leap 15.4:busybox-static-1.35.0-150400.3.3.1.x86_64",
"openSUSE Leap 15.4:busybox-testsuite-1.35.0-150400.3.3.1.aarch64",
"openSUSE Leap 15.4:busybox-testsuite-1.35.0-150400.3.3.1.ppc64le",
"openSUSE Leap 15.4:busybox-testsuite-1.35.0-150400.3.3.1.s390x",
"openSUSE Leap 15.4:busybox-testsuite-1.35.0-150400.3.3.1.x86_64",
"openSUSE Leap 15.4:busybox-warewulf3-1.35.0-150400.3.3.1.aarch64",
"openSUSE Leap 15.4:busybox-warewulf3-1.35.0-150400.3.3.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-1.35.0-150400.3.3.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-1.35.0-150400.3.3.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-1.35.0-150400.3.3.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-1.35.0-150400.3.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-static-1.35.0-150400.3.3.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-static-1.35.0-150400.3.3.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-static-1.35.0-150400.3.3.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-static-1.35.0-150400.3.3.1.x86_64",
"openSUSE Leap 15.4:busybox-1.35.0-150400.3.3.1.aarch64",
"openSUSE Leap 15.4:busybox-1.35.0-150400.3.3.1.ppc64le",
"openSUSE Leap 15.4:busybox-1.35.0-150400.3.3.1.s390x",
"openSUSE Leap 15.4:busybox-1.35.0-150400.3.3.1.x86_64",
"openSUSE Leap 15.4:busybox-static-1.35.0-150400.3.3.1.aarch64",
"openSUSE Leap 15.4:busybox-static-1.35.0-150400.3.3.1.ppc64le",
"openSUSE Leap 15.4:busybox-static-1.35.0-150400.3.3.1.s390x",
"openSUSE Leap 15.4:busybox-static-1.35.0-150400.3.3.1.x86_64",
"openSUSE Leap 15.4:busybox-testsuite-1.35.0-150400.3.3.1.aarch64",
"openSUSE Leap 15.4:busybox-testsuite-1.35.0-150400.3.3.1.ppc64le",
"openSUSE Leap 15.4:busybox-testsuite-1.35.0-150400.3.3.1.s390x",
"openSUSE Leap 15.4:busybox-testsuite-1.35.0-150400.3.3.1.x86_64",
"openSUSE Leap 15.4:busybox-warewulf3-1.35.0-150400.3.3.1.aarch64",
"openSUSE Leap 15.4:busybox-warewulf3-1.35.0-150400.3.3.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-11-11T14:38:22Z",
"details": "moderate"
}
],
"title": "CVE-2011-5325"
},
{
"cve": "CVE-2015-9261",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2015-9261"
}
],
"notes": [
{
"category": "general",
"text": "huft_build in archival/libarchive/decompress_gunzip.c in BusyBox before 1.27.2 misuses a pointer, causing segfaults and an application crash during an unzip operation on a specially crafted ZIP file.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-1.35.0-150400.3.3.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-1.35.0-150400.3.3.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-1.35.0-150400.3.3.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-1.35.0-150400.3.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-static-1.35.0-150400.3.3.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-static-1.35.0-150400.3.3.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-static-1.35.0-150400.3.3.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-static-1.35.0-150400.3.3.1.x86_64",
"openSUSE Leap 15.4:busybox-1.35.0-150400.3.3.1.aarch64",
"openSUSE Leap 15.4:busybox-1.35.0-150400.3.3.1.ppc64le",
"openSUSE Leap 15.4:busybox-1.35.0-150400.3.3.1.s390x",
"openSUSE Leap 15.4:busybox-1.35.0-150400.3.3.1.x86_64",
"openSUSE Leap 15.4:busybox-static-1.35.0-150400.3.3.1.aarch64",
"openSUSE Leap 15.4:busybox-static-1.35.0-150400.3.3.1.ppc64le",
"openSUSE Leap 15.4:busybox-static-1.35.0-150400.3.3.1.s390x",
"openSUSE Leap 15.4:busybox-static-1.35.0-150400.3.3.1.x86_64",
"openSUSE Leap 15.4:busybox-testsuite-1.35.0-150400.3.3.1.aarch64",
"openSUSE Leap 15.4:busybox-testsuite-1.35.0-150400.3.3.1.ppc64le",
"openSUSE Leap 15.4:busybox-testsuite-1.35.0-150400.3.3.1.s390x",
"openSUSE Leap 15.4:busybox-testsuite-1.35.0-150400.3.3.1.x86_64",
"openSUSE Leap 15.4:busybox-warewulf3-1.35.0-150400.3.3.1.aarch64",
"openSUSE Leap 15.4:busybox-warewulf3-1.35.0-150400.3.3.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2015-9261",
"url": "https://www.suse.com/security/cve/CVE-2015-9261"
},
{
"category": "external",
"summary": "SUSE Bug 1102912 for CVE-2015-9261",
"url": "https://bugzilla.suse.com/1102912"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-1.35.0-150400.3.3.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-1.35.0-150400.3.3.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-1.35.0-150400.3.3.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-1.35.0-150400.3.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-static-1.35.0-150400.3.3.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-static-1.35.0-150400.3.3.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-static-1.35.0-150400.3.3.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-static-1.35.0-150400.3.3.1.x86_64",
"openSUSE Leap 15.4:busybox-1.35.0-150400.3.3.1.aarch64",
"openSUSE Leap 15.4:busybox-1.35.0-150400.3.3.1.ppc64le",
"openSUSE Leap 15.4:busybox-1.35.0-150400.3.3.1.s390x",
"openSUSE Leap 15.4:busybox-1.35.0-150400.3.3.1.x86_64",
"openSUSE Leap 15.4:busybox-static-1.35.0-150400.3.3.1.aarch64",
"openSUSE Leap 15.4:busybox-static-1.35.0-150400.3.3.1.ppc64le",
"openSUSE Leap 15.4:busybox-static-1.35.0-150400.3.3.1.s390x",
"openSUSE Leap 15.4:busybox-static-1.35.0-150400.3.3.1.x86_64",
"openSUSE Leap 15.4:busybox-testsuite-1.35.0-150400.3.3.1.aarch64",
"openSUSE Leap 15.4:busybox-testsuite-1.35.0-150400.3.3.1.ppc64le",
"openSUSE Leap 15.4:busybox-testsuite-1.35.0-150400.3.3.1.s390x",
"openSUSE Leap 15.4:busybox-testsuite-1.35.0-150400.3.3.1.x86_64",
"openSUSE Leap 15.4:busybox-warewulf3-1.35.0-150400.3.3.1.aarch64",
"openSUSE Leap 15.4:busybox-warewulf3-1.35.0-150400.3.3.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-1.35.0-150400.3.3.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-1.35.0-150400.3.3.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-1.35.0-150400.3.3.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-1.35.0-150400.3.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-static-1.35.0-150400.3.3.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-static-1.35.0-150400.3.3.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-static-1.35.0-150400.3.3.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-static-1.35.0-150400.3.3.1.x86_64",
"openSUSE Leap 15.4:busybox-1.35.0-150400.3.3.1.aarch64",
"openSUSE Leap 15.4:busybox-1.35.0-150400.3.3.1.ppc64le",
"openSUSE Leap 15.4:busybox-1.35.0-150400.3.3.1.s390x",
"openSUSE Leap 15.4:busybox-1.35.0-150400.3.3.1.x86_64",
"openSUSE Leap 15.4:busybox-static-1.35.0-150400.3.3.1.aarch64",
"openSUSE Leap 15.4:busybox-static-1.35.0-150400.3.3.1.ppc64le",
"openSUSE Leap 15.4:busybox-static-1.35.0-150400.3.3.1.s390x",
"openSUSE Leap 15.4:busybox-static-1.35.0-150400.3.3.1.x86_64",
"openSUSE Leap 15.4:busybox-testsuite-1.35.0-150400.3.3.1.aarch64",
"openSUSE Leap 15.4:busybox-testsuite-1.35.0-150400.3.3.1.ppc64le",
"openSUSE Leap 15.4:busybox-testsuite-1.35.0-150400.3.3.1.s390x",
"openSUSE Leap 15.4:busybox-testsuite-1.35.0-150400.3.3.1.x86_64",
"openSUSE Leap 15.4:busybox-warewulf3-1.35.0-150400.3.3.1.aarch64",
"openSUSE Leap 15.4:busybox-warewulf3-1.35.0-150400.3.3.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-11-11T14:38:22Z",
"details": "low"
}
],
"title": "CVE-2015-9261"
},
{
"cve": "CVE-2016-2147",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2016-2147"
}
],
"notes": [
{
"category": "general",
"text": "Integer overflow in the DHCP client (udhcpc) in BusyBox before 1.25.0 allows remote attackers to cause a denial of service (crash) via a malformed RFC1035-encoded domain name, which triggers an out-of-bounds heap write.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-1.35.0-150400.3.3.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-1.35.0-150400.3.3.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-1.35.0-150400.3.3.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-1.35.0-150400.3.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-static-1.35.0-150400.3.3.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-static-1.35.0-150400.3.3.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-static-1.35.0-150400.3.3.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-static-1.35.0-150400.3.3.1.x86_64",
"openSUSE Leap 15.4:busybox-1.35.0-150400.3.3.1.aarch64",
"openSUSE Leap 15.4:busybox-1.35.0-150400.3.3.1.ppc64le",
"openSUSE Leap 15.4:busybox-1.35.0-150400.3.3.1.s390x",
"openSUSE Leap 15.4:busybox-1.35.0-150400.3.3.1.x86_64",
"openSUSE Leap 15.4:busybox-static-1.35.0-150400.3.3.1.aarch64",
"openSUSE Leap 15.4:busybox-static-1.35.0-150400.3.3.1.ppc64le",
"openSUSE Leap 15.4:busybox-static-1.35.0-150400.3.3.1.s390x",
"openSUSE Leap 15.4:busybox-static-1.35.0-150400.3.3.1.x86_64",
"openSUSE Leap 15.4:busybox-testsuite-1.35.0-150400.3.3.1.aarch64",
"openSUSE Leap 15.4:busybox-testsuite-1.35.0-150400.3.3.1.ppc64le",
"openSUSE Leap 15.4:busybox-testsuite-1.35.0-150400.3.3.1.s390x",
"openSUSE Leap 15.4:busybox-testsuite-1.35.0-150400.3.3.1.x86_64",
"openSUSE Leap 15.4:busybox-warewulf3-1.35.0-150400.3.3.1.aarch64",
"openSUSE Leap 15.4:busybox-warewulf3-1.35.0-150400.3.3.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2016-2147",
"url": "https://www.suse.com/security/cve/CVE-2016-2147"
},
{
"category": "external",
"summary": "SUSE Bug 970663 for CVE-2016-2147",
"url": "https://bugzilla.suse.com/970663"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-1.35.0-150400.3.3.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-1.35.0-150400.3.3.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-1.35.0-150400.3.3.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-1.35.0-150400.3.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-static-1.35.0-150400.3.3.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-static-1.35.0-150400.3.3.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-static-1.35.0-150400.3.3.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-static-1.35.0-150400.3.3.1.x86_64",
"openSUSE Leap 15.4:busybox-1.35.0-150400.3.3.1.aarch64",
"openSUSE Leap 15.4:busybox-1.35.0-150400.3.3.1.ppc64le",
"openSUSE Leap 15.4:busybox-1.35.0-150400.3.3.1.s390x",
"openSUSE Leap 15.4:busybox-1.35.0-150400.3.3.1.x86_64",
"openSUSE Leap 15.4:busybox-static-1.35.0-150400.3.3.1.aarch64",
"openSUSE Leap 15.4:busybox-static-1.35.0-150400.3.3.1.ppc64le",
"openSUSE Leap 15.4:busybox-static-1.35.0-150400.3.3.1.s390x",
"openSUSE Leap 15.4:busybox-static-1.35.0-150400.3.3.1.x86_64",
"openSUSE Leap 15.4:busybox-testsuite-1.35.0-150400.3.3.1.aarch64",
"openSUSE Leap 15.4:busybox-testsuite-1.35.0-150400.3.3.1.ppc64le",
"openSUSE Leap 15.4:busybox-testsuite-1.35.0-150400.3.3.1.s390x",
"openSUSE Leap 15.4:busybox-testsuite-1.35.0-150400.3.3.1.x86_64",
"openSUSE Leap 15.4:busybox-warewulf3-1.35.0-150400.3.3.1.aarch64",
"openSUSE Leap 15.4:busybox-warewulf3-1.35.0-150400.3.3.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-1.35.0-150400.3.3.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-1.35.0-150400.3.3.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-1.35.0-150400.3.3.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-1.35.0-150400.3.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-static-1.35.0-150400.3.3.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-static-1.35.0-150400.3.3.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-static-1.35.0-150400.3.3.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-static-1.35.0-150400.3.3.1.x86_64",
"openSUSE Leap 15.4:busybox-1.35.0-150400.3.3.1.aarch64",
"openSUSE Leap 15.4:busybox-1.35.0-150400.3.3.1.ppc64le",
"openSUSE Leap 15.4:busybox-1.35.0-150400.3.3.1.s390x",
"openSUSE Leap 15.4:busybox-1.35.0-150400.3.3.1.x86_64",
"openSUSE Leap 15.4:busybox-static-1.35.0-150400.3.3.1.aarch64",
"openSUSE Leap 15.4:busybox-static-1.35.0-150400.3.3.1.ppc64le",
"openSUSE Leap 15.4:busybox-static-1.35.0-150400.3.3.1.s390x",
"openSUSE Leap 15.4:busybox-static-1.35.0-150400.3.3.1.x86_64",
"openSUSE Leap 15.4:busybox-testsuite-1.35.0-150400.3.3.1.aarch64",
"openSUSE Leap 15.4:busybox-testsuite-1.35.0-150400.3.3.1.ppc64le",
"openSUSE Leap 15.4:busybox-testsuite-1.35.0-150400.3.3.1.s390x",
"openSUSE Leap 15.4:busybox-testsuite-1.35.0-150400.3.3.1.x86_64",
"openSUSE Leap 15.4:busybox-warewulf3-1.35.0-150400.3.3.1.aarch64",
"openSUSE Leap 15.4:busybox-warewulf3-1.35.0-150400.3.3.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-11-11T14:38:22Z",
"details": "important"
}
],
"title": "CVE-2016-2147"
},
{
"cve": "CVE-2016-2148",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2016-2148"
}
],
"notes": [
{
"category": "general",
"text": "Heap-based buffer overflow in the DHCP client (udhcpc) in BusyBox before 1.25.0 allows remote attackers to have unspecified impact via vectors involving OPTION_6RD parsing.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-1.35.0-150400.3.3.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-1.35.0-150400.3.3.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-1.35.0-150400.3.3.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-1.35.0-150400.3.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-static-1.35.0-150400.3.3.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-static-1.35.0-150400.3.3.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-static-1.35.0-150400.3.3.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-static-1.35.0-150400.3.3.1.x86_64",
"openSUSE Leap 15.4:busybox-1.35.0-150400.3.3.1.aarch64",
"openSUSE Leap 15.4:busybox-1.35.0-150400.3.3.1.ppc64le",
"openSUSE Leap 15.4:busybox-1.35.0-150400.3.3.1.s390x",
"openSUSE Leap 15.4:busybox-1.35.0-150400.3.3.1.x86_64",
"openSUSE Leap 15.4:busybox-static-1.35.0-150400.3.3.1.aarch64",
"openSUSE Leap 15.4:busybox-static-1.35.0-150400.3.3.1.ppc64le",
"openSUSE Leap 15.4:busybox-static-1.35.0-150400.3.3.1.s390x",
"openSUSE Leap 15.4:busybox-static-1.35.0-150400.3.3.1.x86_64",
"openSUSE Leap 15.4:busybox-testsuite-1.35.0-150400.3.3.1.aarch64",
"openSUSE Leap 15.4:busybox-testsuite-1.35.0-150400.3.3.1.ppc64le",
"openSUSE Leap 15.4:busybox-testsuite-1.35.0-150400.3.3.1.s390x",
"openSUSE Leap 15.4:busybox-testsuite-1.35.0-150400.3.3.1.x86_64",
"openSUSE Leap 15.4:busybox-warewulf3-1.35.0-150400.3.3.1.aarch64",
"openSUSE Leap 15.4:busybox-warewulf3-1.35.0-150400.3.3.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2016-2148",
"url": "https://www.suse.com/security/cve/CVE-2016-2148"
},
{
"category": "external",
"summary": "SUSE Bug 970662 for CVE-2016-2148",
"url": "https://bugzilla.suse.com/970662"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-1.35.0-150400.3.3.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-1.35.0-150400.3.3.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-1.35.0-150400.3.3.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-1.35.0-150400.3.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-static-1.35.0-150400.3.3.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-static-1.35.0-150400.3.3.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-static-1.35.0-150400.3.3.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-static-1.35.0-150400.3.3.1.x86_64",
"openSUSE Leap 15.4:busybox-1.35.0-150400.3.3.1.aarch64",
"openSUSE Leap 15.4:busybox-1.35.0-150400.3.3.1.ppc64le",
"openSUSE Leap 15.4:busybox-1.35.0-150400.3.3.1.s390x",
"openSUSE Leap 15.4:busybox-1.35.0-150400.3.3.1.x86_64",
"openSUSE Leap 15.4:busybox-static-1.35.0-150400.3.3.1.aarch64",
"openSUSE Leap 15.4:busybox-static-1.35.0-150400.3.3.1.ppc64le",
"openSUSE Leap 15.4:busybox-static-1.35.0-150400.3.3.1.s390x",
"openSUSE Leap 15.4:busybox-static-1.35.0-150400.3.3.1.x86_64",
"openSUSE Leap 15.4:busybox-testsuite-1.35.0-150400.3.3.1.aarch64",
"openSUSE Leap 15.4:busybox-testsuite-1.35.0-150400.3.3.1.ppc64le",
"openSUSE Leap 15.4:busybox-testsuite-1.35.0-150400.3.3.1.s390x",
"openSUSE Leap 15.4:busybox-testsuite-1.35.0-150400.3.3.1.x86_64",
"openSUSE Leap 15.4:busybox-warewulf3-1.35.0-150400.3.3.1.aarch64",
"openSUSE Leap 15.4:busybox-warewulf3-1.35.0-150400.3.3.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-1.35.0-150400.3.3.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-1.35.0-150400.3.3.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-1.35.0-150400.3.3.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-1.35.0-150400.3.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-static-1.35.0-150400.3.3.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-static-1.35.0-150400.3.3.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-static-1.35.0-150400.3.3.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-static-1.35.0-150400.3.3.1.x86_64",
"openSUSE Leap 15.4:busybox-1.35.0-150400.3.3.1.aarch64",
"openSUSE Leap 15.4:busybox-1.35.0-150400.3.3.1.ppc64le",
"openSUSE Leap 15.4:busybox-1.35.0-150400.3.3.1.s390x",
"openSUSE Leap 15.4:busybox-1.35.0-150400.3.3.1.x86_64",
"openSUSE Leap 15.4:busybox-static-1.35.0-150400.3.3.1.aarch64",
"openSUSE Leap 15.4:busybox-static-1.35.0-150400.3.3.1.ppc64le",
"openSUSE Leap 15.4:busybox-static-1.35.0-150400.3.3.1.s390x",
"openSUSE Leap 15.4:busybox-static-1.35.0-150400.3.3.1.x86_64",
"openSUSE Leap 15.4:busybox-testsuite-1.35.0-150400.3.3.1.aarch64",
"openSUSE Leap 15.4:busybox-testsuite-1.35.0-150400.3.3.1.ppc64le",
"openSUSE Leap 15.4:busybox-testsuite-1.35.0-150400.3.3.1.s390x",
"openSUSE Leap 15.4:busybox-testsuite-1.35.0-150400.3.3.1.x86_64",
"openSUSE Leap 15.4:busybox-warewulf3-1.35.0-150400.3.3.1.aarch64",
"openSUSE Leap 15.4:busybox-warewulf3-1.35.0-150400.3.3.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-11-11T14:38:22Z",
"details": "moderate"
}
],
"title": "CVE-2016-2148"
},
{
"cve": "CVE-2016-6301",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2016-6301"
}
],
"notes": [
{
"category": "general",
"text": "The recv_and_process_client_pkt function in networking/ntpd.c in busybox allows remote attackers to cause a denial of service (CPU and bandwidth consumption) via a forged NTP packet, which triggers a communication loop.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-1.35.0-150400.3.3.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-1.35.0-150400.3.3.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-1.35.0-150400.3.3.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-1.35.0-150400.3.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-static-1.35.0-150400.3.3.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-static-1.35.0-150400.3.3.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-static-1.35.0-150400.3.3.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-static-1.35.0-150400.3.3.1.x86_64",
"openSUSE Leap 15.4:busybox-1.35.0-150400.3.3.1.aarch64",
"openSUSE Leap 15.4:busybox-1.35.0-150400.3.3.1.ppc64le",
"openSUSE Leap 15.4:busybox-1.35.0-150400.3.3.1.s390x",
"openSUSE Leap 15.4:busybox-1.35.0-150400.3.3.1.x86_64",
"openSUSE Leap 15.4:busybox-static-1.35.0-150400.3.3.1.aarch64",
"openSUSE Leap 15.4:busybox-static-1.35.0-150400.3.3.1.ppc64le",
"openSUSE Leap 15.4:busybox-static-1.35.0-150400.3.3.1.s390x",
"openSUSE Leap 15.4:busybox-static-1.35.0-150400.3.3.1.x86_64",
"openSUSE Leap 15.4:busybox-testsuite-1.35.0-150400.3.3.1.aarch64",
"openSUSE Leap 15.4:busybox-testsuite-1.35.0-150400.3.3.1.ppc64le",
"openSUSE Leap 15.4:busybox-testsuite-1.35.0-150400.3.3.1.s390x",
"openSUSE Leap 15.4:busybox-testsuite-1.35.0-150400.3.3.1.x86_64",
"openSUSE Leap 15.4:busybox-warewulf3-1.35.0-150400.3.3.1.aarch64",
"openSUSE Leap 15.4:busybox-warewulf3-1.35.0-150400.3.3.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2016-6301",
"url": "https://www.suse.com/security/cve/CVE-2016-6301"
},
{
"category": "external",
"summary": "SUSE Bug 991940 for CVE-2016-6301",
"url": "https://bugzilla.suse.com/991940"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-1.35.0-150400.3.3.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-1.35.0-150400.3.3.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-1.35.0-150400.3.3.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-1.35.0-150400.3.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-static-1.35.0-150400.3.3.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-static-1.35.0-150400.3.3.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-static-1.35.0-150400.3.3.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-static-1.35.0-150400.3.3.1.x86_64",
"openSUSE Leap 15.4:busybox-1.35.0-150400.3.3.1.aarch64",
"openSUSE Leap 15.4:busybox-1.35.0-150400.3.3.1.ppc64le",
"openSUSE Leap 15.4:busybox-1.35.0-150400.3.3.1.s390x",
"openSUSE Leap 15.4:busybox-1.35.0-150400.3.3.1.x86_64",
"openSUSE Leap 15.4:busybox-static-1.35.0-150400.3.3.1.aarch64",
"openSUSE Leap 15.4:busybox-static-1.35.0-150400.3.3.1.ppc64le",
"openSUSE Leap 15.4:busybox-static-1.35.0-150400.3.3.1.s390x",
"openSUSE Leap 15.4:busybox-static-1.35.0-150400.3.3.1.x86_64",
"openSUSE Leap 15.4:busybox-testsuite-1.35.0-150400.3.3.1.aarch64",
"openSUSE Leap 15.4:busybox-testsuite-1.35.0-150400.3.3.1.ppc64le",
"openSUSE Leap 15.4:busybox-testsuite-1.35.0-150400.3.3.1.s390x",
"openSUSE Leap 15.4:busybox-testsuite-1.35.0-150400.3.3.1.x86_64",
"openSUSE Leap 15.4:busybox-warewulf3-1.35.0-150400.3.3.1.aarch64",
"openSUSE Leap 15.4:busybox-warewulf3-1.35.0-150400.3.3.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-1.35.0-150400.3.3.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-1.35.0-150400.3.3.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-1.35.0-150400.3.3.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-1.35.0-150400.3.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-static-1.35.0-150400.3.3.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-static-1.35.0-150400.3.3.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-static-1.35.0-150400.3.3.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-static-1.35.0-150400.3.3.1.x86_64",
"openSUSE Leap 15.4:busybox-1.35.0-150400.3.3.1.aarch64",
"openSUSE Leap 15.4:busybox-1.35.0-150400.3.3.1.ppc64le",
"openSUSE Leap 15.4:busybox-1.35.0-150400.3.3.1.s390x",
"openSUSE Leap 15.4:busybox-1.35.0-150400.3.3.1.x86_64",
"openSUSE Leap 15.4:busybox-static-1.35.0-150400.3.3.1.aarch64",
"openSUSE Leap 15.4:busybox-static-1.35.0-150400.3.3.1.ppc64le",
"openSUSE Leap 15.4:busybox-static-1.35.0-150400.3.3.1.s390x",
"openSUSE Leap 15.4:busybox-static-1.35.0-150400.3.3.1.x86_64",
"openSUSE Leap 15.4:busybox-testsuite-1.35.0-150400.3.3.1.aarch64",
"openSUSE Leap 15.4:busybox-testsuite-1.35.0-150400.3.3.1.ppc64le",
"openSUSE Leap 15.4:busybox-testsuite-1.35.0-150400.3.3.1.s390x",
"openSUSE Leap 15.4:busybox-testsuite-1.35.0-150400.3.3.1.x86_64",
"openSUSE Leap 15.4:busybox-warewulf3-1.35.0-150400.3.3.1.aarch64",
"openSUSE Leap 15.4:busybox-warewulf3-1.35.0-150400.3.3.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-11-11T14:38:22Z",
"details": "moderate"
}
],
"title": "CVE-2016-6301"
},
{
"cve": "CVE-2017-15873",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2017-15873"
}
],
"notes": [
{
"category": "general",
"text": "The get_next_block function in archival/libarchive/decompress_bunzip2.c in BusyBox 1.27.2 has an Integer Overflow that may lead to a write access violation.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-1.35.0-150400.3.3.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-1.35.0-150400.3.3.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-1.35.0-150400.3.3.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-1.35.0-150400.3.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-static-1.35.0-150400.3.3.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-static-1.35.0-150400.3.3.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-static-1.35.0-150400.3.3.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-static-1.35.0-150400.3.3.1.x86_64",
"openSUSE Leap 15.4:busybox-1.35.0-150400.3.3.1.aarch64",
"openSUSE Leap 15.4:busybox-1.35.0-150400.3.3.1.ppc64le",
"openSUSE Leap 15.4:busybox-1.35.0-150400.3.3.1.s390x",
"openSUSE Leap 15.4:busybox-1.35.0-150400.3.3.1.x86_64",
"openSUSE Leap 15.4:busybox-static-1.35.0-150400.3.3.1.aarch64",
"openSUSE Leap 15.4:busybox-static-1.35.0-150400.3.3.1.ppc64le",
"openSUSE Leap 15.4:busybox-static-1.35.0-150400.3.3.1.s390x",
"openSUSE Leap 15.4:busybox-static-1.35.0-150400.3.3.1.x86_64",
"openSUSE Leap 15.4:busybox-testsuite-1.35.0-150400.3.3.1.aarch64",
"openSUSE Leap 15.4:busybox-testsuite-1.35.0-150400.3.3.1.ppc64le",
"openSUSE Leap 15.4:busybox-testsuite-1.35.0-150400.3.3.1.s390x",
"openSUSE Leap 15.4:busybox-testsuite-1.35.0-150400.3.3.1.x86_64",
"openSUSE Leap 15.4:busybox-warewulf3-1.35.0-150400.3.3.1.aarch64",
"openSUSE Leap 15.4:busybox-warewulf3-1.35.0-150400.3.3.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2017-15873",
"url": "https://www.suse.com/security/cve/CVE-2017-15873"
},
{
"category": "external",
"summary": "SUSE Bug 1064976 for CVE-2017-15873",
"url": "https://bugzilla.suse.com/1064976"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-1.35.0-150400.3.3.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-1.35.0-150400.3.3.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-1.35.0-150400.3.3.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-1.35.0-150400.3.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-static-1.35.0-150400.3.3.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-static-1.35.0-150400.3.3.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-static-1.35.0-150400.3.3.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-static-1.35.0-150400.3.3.1.x86_64",
"openSUSE Leap 15.4:busybox-1.35.0-150400.3.3.1.aarch64",
"openSUSE Leap 15.4:busybox-1.35.0-150400.3.3.1.ppc64le",
"openSUSE Leap 15.4:busybox-1.35.0-150400.3.3.1.s390x",
"openSUSE Leap 15.4:busybox-1.35.0-150400.3.3.1.x86_64",
"openSUSE Leap 15.4:busybox-static-1.35.0-150400.3.3.1.aarch64",
"openSUSE Leap 15.4:busybox-static-1.35.0-150400.3.3.1.ppc64le",
"openSUSE Leap 15.4:busybox-static-1.35.0-150400.3.3.1.s390x",
"openSUSE Leap 15.4:busybox-static-1.35.0-150400.3.3.1.x86_64",
"openSUSE Leap 15.4:busybox-testsuite-1.35.0-150400.3.3.1.aarch64",
"openSUSE Leap 15.4:busybox-testsuite-1.35.0-150400.3.3.1.ppc64le",
"openSUSE Leap 15.4:busybox-testsuite-1.35.0-150400.3.3.1.s390x",
"openSUSE Leap 15.4:busybox-testsuite-1.35.0-150400.3.3.1.x86_64",
"openSUSE Leap 15.4:busybox-warewulf3-1.35.0-150400.3.3.1.aarch64",
"openSUSE Leap 15.4:busybox-warewulf3-1.35.0-150400.3.3.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-1.35.0-150400.3.3.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-1.35.0-150400.3.3.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-1.35.0-150400.3.3.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-1.35.0-150400.3.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-static-1.35.0-150400.3.3.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-static-1.35.0-150400.3.3.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-static-1.35.0-150400.3.3.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-static-1.35.0-150400.3.3.1.x86_64",
"openSUSE Leap 15.4:busybox-1.35.0-150400.3.3.1.aarch64",
"openSUSE Leap 15.4:busybox-1.35.0-150400.3.3.1.ppc64le",
"openSUSE Leap 15.4:busybox-1.35.0-150400.3.3.1.s390x",
"openSUSE Leap 15.4:busybox-1.35.0-150400.3.3.1.x86_64",
"openSUSE Leap 15.4:busybox-static-1.35.0-150400.3.3.1.aarch64",
"openSUSE Leap 15.4:busybox-static-1.35.0-150400.3.3.1.ppc64le",
"openSUSE Leap 15.4:busybox-static-1.35.0-150400.3.3.1.s390x",
"openSUSE Leap 15.4:busybox-static-1.35.0-150400.3.3.1.x86_64",
"openSUSE Leap 15.4:busybox-testsuite-1.35.0-150400.3.3.1.aarch64",
"openSUSE Leap 15.4:busybox-testsuite-1.35.0-150400.3.3.1.ppc64le",
"openSUSE Leap 15.4:busybox-testsuite-1.35.0-150400.3.3.1.s390x",
"openSUSE Leap 15.4:busybox-testsuite-1.35.0-150400.3.3.1.x86_64",
"openSUSE Leap 15.4:busybox-warewulf3-1.35.0-150400.3.3.1.aarch64",
"openSUSE Leap 15.4:busybox-warewulf3-1.35.0-150400.3.3.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-11-11T14:38:22Z",
"details": "moderate"
}
],
"title": "CVE-2017-15873"
},
{
"cve": "CVE-2017-15874",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2017-15874"
}
],
"notes": [
{
"category": "general",
"text": "archival/libarchive/decompress_unlzma.c in BusyBox 1.27.2 has an Integer Underflow that leads to a read access violation.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-1.35.0-150400.3.3.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-1.35.0-150400.3.3.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-1.35.0-150400.3.3.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-1.35.0-150400.3.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-static-1.35.0-150400.3.3.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-static-1.35.0-150400.3.3.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-static-1.35.0-150400.3.3.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-static-1.35.0-150400.3.3.1.x86_64",
"openSUSE Leap 15.4:busybox-1.35.0-150400.3.3.1.aarch64",
"openSUSE Leap 15.4:busybox-1.35.0-150400.3.3.1.ppc64le",
"openSUSE Leap 15.4:busybox-1.35.0-150400.3.3.1.s390x",
"openSUSE Leap 15.4:busybox-1.35.0-150400.3.3.1.x86_64",
"openSUSE Leap 15.4:busybox-static-1.35.0-150400.3.3.1.aarch64",
"openSUSE Leap 15.4:busybox-static-1.35.0-150400.3.3.1.ppc64le",
"openSUSE Leap 15.4:busybox-static-1.35.0-150400.3.3.1.s390x",
"openSUSE Leap 15.4:busybox-static-1.35.0-150400.3.3.1.x86_64",
"openSUSE Leap 15.4:busybox-testsuite-1.35.0-150400.3.3.1.aarch64",
"openSUSE Leap 15.4:busybox-testsuite-1.35.0-150400.3.3.1.ppc64le",
"openSUSE Leap 15.4:busybox-testsuite-1.35.0-150400.3.3.1.s390x",
"openSUSE Leap 15.4:busybox-testsuite-1.35.0-150400.3.3.1.x86_64",
"openSUSE Leap 15.4:busybox-warewulf3-1.35.0-150400.3.3.1.aarch64",
"openSUSE Leap 15.4:busybox-warewulf3-1.35.0-150400.3.3.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2017-15874",
"url": "https://www.suse.com/security/cve/CVE-2017-15874"
},
{
"category": "external",
"summary": "SUSE Bug 1064978 for CVE-2017-15874",
"url": "https://bugzilla.suse.com/1064978"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-1.35.0-150400.3.3.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-1.35.0-150400.3.3.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-1.35.0-150400.3.3.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-1.35.0-150400.3.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-static-1.35.0-150400.3.3.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-static-1.35.0-150400.3.3.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-static-1.35.0-150400.3.3.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-static-1.35.0-150400.3.3.1.x86_64",
"openSUSE Leap 15.4:busybox-1.35.0-150400.3.3.1.aarch64",
"openSUSE Leap 15.4:busybox-1.35.0-150400.3.3.1.ppc64le",
"openSUSE Leap 15.4:busybox-1.35.0-150400.3.3.1.s390x",
"openSUSE Leap 15.4:busybox-1.35.0-150400.3.3.1.x86_64",
"openSUSE Leap 15.4:busybox-static-1.35.0-150400.3.3.1.aarch64",
"openSUSE Leap 15.4:busybox-static-1.35.0-150400.3.3.1.ppc64le",
"openSUSE Leap 15.4:busybox-static-1.35.0-150400.3.3.1.s390x",
"openSUSE Leap 15.4:busybox-static-1.35.0-150400.3.3.1.x86_64",
"openSUSE Leap 15.4:busybox-testsuite-1.35.0-150400.3.3.1.aarch64",
"openSUSE Leap 15.4:busybox-testsuite-1.35.0-150400.3.3.1.ppc64le",
"openSUSE Leap 15.4:busybox-testsuite-1.35.0-150400.3.3.1.s390x",
"openSUSE Leap 15.4:busybox-testsuite-1.35.0-150400.3.3.1.x86_64",
"openSUSE Leap 15.4:busybox-warewulf3-1.35.0-150400.3.3.1.aarch64",
"openSUSE Leap 15.4:busybox-warewulf3-1.35.0-150400.3.3.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 3.3,
"baseSeverity": "LOW",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-1.35.0-150400.3.3.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-1.35.0-150400.3.3.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-1.35.0-150400.3.3.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-1.35.0-150400.3.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-static-1.35.0-150400.3.3.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-static-1.35.0-150400.3.3.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-static-1.35.0-150400.3.3.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-static-1.35.0-150400.3.3.1.x86_64",
"openSUSE Leap 15.4:busybox-1.35.0-150400.3.3.1.aarch64",
"openSUSE Leap 15.4:busybox-1.35.0-150400.3.3.1.ppc64le",
"openSUSE Leap 15.4:busybox-1.35.0-150400.3.3.1.s390x",
"openSUSE Leap 15.4:busybox-1.35.0-150400.3.3.1.x86_64",
"openSUSE Leap 15.4:busybox-static-1.35.0-150400.3.3.1.aarch64",
"openSUSE Leap 15.4:busybox-static-1.35.0-150400.3.3.1.ppc64le",
"openSUSE Leap 15.4:busybox-static-1.35.0-150400.3.3.1.s390x",
"openSUSE Leap 15.4:busybox-static-1.35.0-150400.3.3.1.x86_64",
"openSUSE Leap 15.4:busybox-testsuite-1.35.0-150400.3.3.1.aarch64",
"openSUSE Leap 15.4:busybox-testsuite-1.35.0-150400.3.3.1.ppc64le",
"openSUSE Leap 15.4:busybox-testsuite-1.35.0-150400.3.3.1.s390x",
"openSUSE Leap 15.4:busybox-testsuite-1.35.0-150400.3.3.1.x86_64",
"openSUSE Leap 15.4:busybox-warewulf3-1.35.0-150400.3.3.1.aarch64",
"openSUSE Leap 15.4:busybox-warewulf3-1.35.0-150400.3.3.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-11-11T14:38:22Z",
"details": "low"
}
],
"title": "CVE-2017-15874"
},
{
"cve": "CVE-2017-16544",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2017-16544"
}
],
"notes": [
{
"category": "general",
"text": "In the add_match function in libbb/lineedit.c in BusyBox through 1.27.2, the tab autocomplete feature of the shell, used to get a list of filenames in a directory, does not sanitize filenames and results in executing any escape sequence in the terminal. This could potentially result in code execution, arbitrary file writes, or other attacks.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-1.35.0-150400.3.3.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-1.35.0-150400.3.3.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-1.35.0-150400.3.3.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-1.35.0-150400.3.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-static-1.35.0-150400.3.3.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-static-1.35.0-150400.3.3.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-static-1.35.0-150400.3.3.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-static-1.35.0-150400.3.3.1.x86_64",
"openSUSE Leap 15.4:busybox-1.35.0-150400.3.3.1.aarch64",
"openSUSE Leap 15.4:busybox-1.35.0-150400.3.3.1.ppc64le",
"openSUSE Leap 15.4:busybox-1.35.0-150400.3.3.1.s390x",
"openSUSE Leap 15.4:busybox-1.35.0-150400.3.3.1.x86_64",
"openSUSE Leap 15.4:busybox-static-1.35.0-150400.3.3.1.aarch64",
"openSUSE Leap 15.4:busybox-static-1.35.0-150400.3.3.1.ppc64le",
"openSUSE Leap 15.4:busybox-static-1.35.0-150400.3.3.1.s390x",
"openSUSE Leap 15.4:busybox-static-1.35.0-150400.3.3.1.x86_64",
"openSUSE Leap 15.4:busybox-testsuite-1.35.0-150400.3.3.1.aarch64",
"openSUSE Leap 15.4:busybox-testsuite-1.35.0-150400.3.3.1.ppc64le",
"openSUSE Leap 15.4:busybox-testsuite-1.35.0-150400.3.3.1.s390x",
"openSUSE Leap 15.4:busybox-testsuite-1.35.0-150400.3.3.1.x86_64",
"openSUSE Leap 15.4:busybox-warewulf3-1.35.0-150400.3.3.1.aarch64",
"openSUSE Leap 15.4:busybox-warewulf3-1.35.0-150400.3.3.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2017-16544",
"url": "https://www.suse.com/security/cve/CVE-2017-16544"
},
{
"category": "external",
"summary": "SUSE Bug 1069412 for CVE-2017-16544",
"url": "https://bugzilla.suse.com/1069412"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-1.35.0-150400.3.3.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-1.35.0-150400.3.3.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-1.35.0-150400.3.3.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-1.35.0-150400.3.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-static-1.35.0-150400.3.3.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-static-1.35.0-150400.3.3.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-static-1.35.0-150400.3.3.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-static-1.35.0-150400.3.3.1.x86_64",
"openSUSE Leap 15.4:busybox-1.35.0-150400.3.3.1.aarch64",
"openSUSE Leap 15.4:busybox-1.35.0-150400.3.3.1.ppc64le",
"openSUSE Leap 15.4:busybox-1.35.0-150400.3.3.1.s390x",
"openSUSE Leap 15.4:busybox-1.35.0-150400.3.3.1.x86_64",
"openSUSE Leap 15.4:busybox-static-1.35.0-150400.3.3.1.aarch64",
"openSUSE Leap 15.4:busybox-static-1.35.0-150400.3.3.1.ppc64le",
"openSUSE Leap 15.4:busybox-static-1.35.0-150400.3.3.1.s390x",
"openSUSE Leap 15.4:busybox-static-1.35.0-150400.3.3.1.x86_64",
"openSUSE Leap 15.4:busybox-testsuite-1.35.0-150400.3.3.1.aarch64",
"openSUSE Leap 15.4:busybox-testsuite-1.35.0-150400.3.3.1.ppc64le",
"openSUSE Leap 15.4:busybox-testsuite-1.35.0-150400.3.3.1.s390x",
"openSUSE Leap 15.4:busybox-testsuite-1.35.0-150400.3.3.1.x86_64",
"openSUSE Leap 15.4:busybox-warewulf3-1.35.0-150400.3.3.1.aarch64",
"openSUSE Leap 15.4:busybox-warewulf3-1.35.0-150400.3.3.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-1.35.0-150400.3.3.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-1.35.0-150400.3.3.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-1.35.0-150400.3.3.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-1.35.0-150400.3.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-static-1.35.0-150400.3.3.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-static-1.35.0-150400.3.3.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-static-1.35.0-150400.3.3.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-static-1.35.0-150400.3.3.1.x86_64",
"openSUSE Leap 15.4:busybox-1.35.0-150400.3.3.1.aarch64",
"openSUSE Leap 15.4:busybox-1.35.0-150400.3.3.1.ppc64le",
"openSUSE Leap 15.4:busybox-1.35.0-150400.3.3.1.s390x",
"openSUSE Leap 15.4:busybox-1.35.0-150400.3.3.1.x86_64",
"openSUSE Leap 15.4:busybox-static-1.35.0-150400.3.3.1.aarch64",
"openSUSE Leap 15.4:busybox-static-1.35.0-150400.3.3.1.ppc64le",
"openSUSE Leap 15.4:busybox-static-1.35.0-150400.3.3.1.s390x",
"openSUSE Leap 15.4:busybox-static-1.35.0-150400.3.3.1.x86_64",
"openSUSE Leap 15.4:busybox-testsuite-1.35.0-150400.3.3.1.aarch64",
"openSUSE Leap 15.4:busybox-testsuite-1.35.0-150400.3.3.1.ppc64le",
"openSUSE Leap 15.4:busybox-testsuite-1.35.0-150400.3.3.1.s390x",
"openSUSE Leap 15.4:busybox-testsuite-1.35.0-150400.3.3.1.x86_64",
"openSUSE Leap 15.4:busybox-warewulf3-1.35.0-150400.3.3.1.aarch64",
"openSUSE Leap 15.4:busybox-warewulf3-1.35.0-150400.3.3.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-11-11T14:38:22Z",
"details": "moderate"
}
],
"title": "CVE-2017-16544"
},
{
"cve": "CVE-2018-1000500",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2018-1000500"
}
],
"notes": [
{
"category": "general",
"text": "Busybox contains a Missing SSL certificate validation vulnerability in The \"busybox wget\" applet that can result in arbitrary code execution. This attack appear to be exploitable via Simply download any file over HTTPS using \"busybox wget https://compromised-domain.com/important-file\".",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-1.35.0-150400.3.3.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-1.35.0-150400.3.3.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-1.35.0-150400.3.3.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-1.35.0-150400.3.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-static-1.35.0-150400.3.3.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-static-1.35.0-150400.3.3.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-static-1.35.0-150400.3.3.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-static-1.35.0-150400.3.3.1.x86_64",
"openSUSE Leap 15.4:busybox-1.35.0-150400.3.3.1.aarch64",
"openSUSE Leap 15.4:busybox-1.35.0-150400.3.3.1.ppc64le",
"openSUSE Leap 15.4:busybox-1.35.0-150400.3.3.1.s390x",
"openSUSE Leap 15.4:busybox-1.35.0-150400.3.3.1.x86_64",
"openSUSE Leap 15.4:busybox-static-1.35.0-150400.3.3.1.aarch64",
"openSUSE Leap 15.4:busybox-static-1.35.0-150400.3.3.1.ppc64le",
"openSUSE Leap 15.4:busybox-static-1.35.0-150400.3.3.1.s390x",
"openSUSE Leap 15.4:busybox-static-1.35.0-150400.3.3.1.x86_64",
"openSUSE Leap 15.4:busybox-testsuite-1.35.0-150400.3.3.1.aarch64",
"openSUSE Leap 15.4:busybox-testsuite-1.35.0-150400.3.3.1.ppc64le",
"openSUSE Leap 15.4:busybox-testsuite-1.35.0-150400.3.3.1.s390x",
"openSUSE Leap 15.4:busybox-testsuite-1.35.0-150400.3.3.1.x86_64",
"openSUSE Leap 15.4:busybox-warewulf3-1.35.0-150400.3.3.1.aarch64",
"openSUSE Leap 15.4:busybox-warewulf3-1.35.0-150400.3.3.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2018-1000500",
"url": "https://www.suse.com/security/cve/CVE-2018-1000500"
},
{
"category": "external",
"summary": "SUSE Bug 1099263 for CVE-2018-1000500",
"url": "https://bugzilla.suse.com/1099263"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-1.35.0-150400.3.3.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-1.35.0-150400.3.3.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-1.35.0-150400.3.3.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-1.35.0-150400.3.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-static-1.35.0-150400.3.3.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-static-1.35.0-150400.3.3.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-static-1.35.0-150400.3.3.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-static-1.35.0-150400.3.3.1.x86_64",
"openSUSE Leap 15.4:busybox-1.35.0-150400.3.3.1.aarch64",
"openSUSE Leap 15.4:busybox-1.35.0-150400.3.3.1.ppc64le",
"openSUSE Leap 15.4:busybox-1.35.0-150400.3.3.1.s390x",
"openSUSE Leap 15.4:busybox-1.35.0-150400.3.3.1.x86_64",
"openSUSE Leap 15.4:busybox-static-1.35.0-150400.3.3.1.aarch64",
"openSUSE Leap 15.4:busybox-static-1.35.0-150400.3.3.1.ppc64le",
"openSUSE Leap 15.4:busybox-static-1.35.0-150400.3.3.1.s390x",
"openSUSE Leap 15.4:busybox-static-1.35.0-150400.3.3.1.x86_64",
"openSUSE Leap 15.4:busybox-testsuite-1.35.0-150400.3.3.1.aarch64",
"openSUSE Leap 15.4:busybox-testsuite-1.35.0-150400.3.3.1.ppc64le",
"openSUSE Leap 15.4:busybox-testsuite-1.35.0-150400.3.3.1.s390x",
"openSUSE Leap 15.4:busybox-testsuite-1.35.0-150400.3.3.1.x86_64",
"openSUSE Leap 15.4:busybox-warewulf3-1.35.0-150400.3.3.1.aarch64",
"openSUSE Leap 15.4:busybox-warewulf3-1.35.0-150400.3.3.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-1.35.0-150400.3.3.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-1.35.0-150400.3.3.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-1.35.0-150400.3.3.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-1.35.0-150400.3.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-static-1.35.0-150400.3.3.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-static-1.35.0-150400.3.3.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-static-1.35.0-150400.3.3.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-static-1.35.0-150400.3.3.1.x86_64",
"openSUSE Leap 15.4:busybox-1.35.0-150400.3.3.1.aarch64",
"openSUSE Leap 15.4:busybox-1.35.0-150400.3.3.1.ppc64le",
"openSUSE Leap 15.4:busybox-1.35.0-150400.3.3.1.s390x",
"openSUSE Leap 15.4:busybox-1.35.0-150400.3.3.1.x86_64",
"openSUSE Leap 15.4:busybox-static-1.35.0-150400.3.3.1.aarch64",
"openSUSE Leap 15.4:busybox-static-1.35.0-150400.3.3.1.ppc64le",
"openSUSE Leap 15.4:busybox-static-1.35.0-150400.3.3.1.s390x",
"openSUSE Leap 15.4:busybox-static-1.35.0-150400.3.3.1.x86_64",
"openSUSE Leap 15.4:busybox-testsuite-1.35.0-150400.3.3.1.aarch64",
"openSUSE Leap 15.4:busybox-testsuite-1.35.0-150400.3.3.1.ppc64le",
"openSUSE Leap 15.4:busybox-testsuite-1.35.0-150400.3.3.1.s390x",
"openSUSE Leap 15.4:busybox-testsuite-1.35.0-150400.3.3.1.x86_64",
"openSUSE Leap 15.4:busybox-warewulf3-1.35.0-150400.3.3.1.aarch64",
"openSUSE Leap 15.4:busybox-warewulf3-1.35.0-150400.3.3.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-11-11T14:38:22Z",
"details": "important"
}
],
"title": "CVE-2018-1000500"
},
{
"cve": "CVE-2018-1000517",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2018-1000517"
}
],
"notes": [
{
"category": "general",
"text": "BusyBox project BusyBox wget version prior to commit 8e2174e9bd836e53c8b9c6e00d1bc6e2a718686e contains a Buffer Overflow vulnerability in Busybox wget that can result in heap buffer overflow. This attack appear to be exploitable via network connectivity. This vulnerability appears to have been fixed in after commit 8e2174e9bd836e53c8b9c6e00d1bc6e2a718686e.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-1.35.0-150400.3.3.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-1.35.0-150400.3.3.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-1.35.0-150400.3.3.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-1.35.0-150400.3.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-static-1.35.0-150400.3.3.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-static-1.35.0-150400.3.3.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-static-1.35.0-150400.3.3.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-static-1.35.0-150400.3.3.1.x86_64",
"openSUSE Leap 15.4:busybox-1.35.0-150400.3.3.1.aarch64",
"openSUSE Leap 15.4:busybox-1.35.0-150400.3.3.1.ppc64le",
"openSUSE Leap 15.4:busybox-1.35.0-150400.3.3.1.s390x",
"openSUSE Leap 15.4:busybox-1.35.0-150400.3.3.1.x86_64",
"openSUSE Leap 15.4:busybox-static-1.35.0-150400.3.3.1.aarch64",
"openSUSE Leap 15.4:busybox-static-1.35.0-150400.3.3.1.ppc64le",
"openSUSE Leap 15.4:busybox-static-1.35.0-150400.3.3.1.s390x",
"openSUSE Leap 15.4:busybox-static-1.35.0-150400.3.3.1.x86_64",
"openSUSE Leap 15.4:busybox-testsuite-1.35.0-150400.3.3.1.aarch64",
"openSUSE Leap 15.4:busybox-testsuite-1.35.0-150400.3.3.1.ppc64le",
"openSUSE Leap 15.4:busybox-testsuite-1.35.0-150400.3.3.1.s390x",
"openSUSE Leap 15.4:busybox-testsuite-1.35.0-150400.3.3.1.x86_64",
"openSUSE Leap 15.4:busybox-warewulf3-1.35.0-150400.3.3.1.aarch64",
"openSUSE Leap 15.4:busybox-warewulf3-1.35.0-150400.3.3.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2018-1000517",
"url": "https://www.suse.com/security/cve/CVE-2018-1000517"
},
{
"category": "external",
"summary": "SUSE Bug 1099260 for CVE-2018-1000517",
"url": "https://bugzilla.suse.com/1099260"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-1.35.0-150400.3.3.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-1.35.0-150400.3.3.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-1.35.0-150400.3.3.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-1.35.0-150400.3.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-static-1.35.0-150400.3.3.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-static-1.35.0-150400.3.3.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-static-1.35.0-150400.3.3.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-static-1.35.0-150400.3.3.1.x86_64",
"openSUSE Leap 15.4:busybox-1.35.0-150400.3.3.1.aarch64",
"openSUSE Leap 15.4:busybox-1.35.0-150400.3.3.1.ppc64le",
"openSUSE Leap 15.4:busybox-1.35.0-150400.3.3.1.s390x",
"openSUSE Leap 15.4:busybox-1.35.0-150400.3.3.1.x86_64",
"openSUSE Leap 15.4:busybox-static-1.35.0-150400.3.3.1.aarch64",
"openSUSE Leap 15.4:busybox-static-1.35.0-150400.3.3.1.ppc64le",
"openSUSE Leap 15.4:busybox-static-1.35.0-150400.3.3.1.s390x",
"openSUSE Leap 15.4:busybox-static-1.35.0-150400.3.3.1.x86_64",
"openSUSE Leap 15.4:busybox-testsuite-1.35.0-150400.3.3.1.aarch64",
"openSUSE Leap 15.4:busybox-testsuite-1.35.0-150400.3.3.1.ppc64le",
"openSUSE Leap 15.4:busybox-testsuite-1.35.0-150400.3.3.1.s390x",
"openSUSE Leap 15.4:busybox-testsuite-1.35.0-150400.3.3.1.x86_64",
"openSUSE Leap 15.4:busybox-warewulf3-1.35.0-150400.3.3.1.aarch64",
"openSUSE Leap 15.4:busybox-warewulf3-1.35.0-150400.3.3.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.6,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-1.35.0-150400.3.3.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-1.35.0-150400.3.3.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-1.35.0-150400.3.3.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-1.35.0-150400.3.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-static-1.35.0-150400.3.3.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-static-1.35.0-150400.3.3.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-static-1.35.0-150400.3.3.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-static-1.35.0-150400.3.3.1.x86_64",
"openSUSE Leap 15.4:busybox-1.35.0-150400.3.3.1.aarch64",
"openSUSE Leap 15.4:busybox-1.35.0-150400.3.3.1.ppc64le",
"openSUSE Leap 15.4:busybox-1.35.0-150400.3.3.1.s390x",
"openSUSE Leap 15.4:busybox-1.35.0-150400.3.3.1.x86_64",
"openSUSE Leap 15.4:busybox-static-1.35.0-150400.3.3.1.aarch64",
"openSUSE Leap 15.4:busybox-static-1.35.0-150400.3.3.1.ppc64le",
"openSUSE Leap 15.4:busybox-static-1.35.0-150400.3.3.1.s390x",
"openSUSE Leap 15.4:busybox-static-1.35.0-150400.3.3.1.x86_64",
"openSUSE Leap 15.4:busybox-testsuite-1.35.0-150400.3.3.1.aarch64",
"openSUSE Leap 15.4:busybox-testsuite-1.35.0-150400.3.3.1.ppc64le",
"openSUSE Leap 15.4:busybox-testsuite-1.35.0-150400.3.3.1.s390x",
"openSUSE Leap 15.4:busybox-testsuite-1.35.0-150400.3.3.1.x86_64",
"openSUSE Leap 15.4:busybox-warewulf3-1.35.0-150400.3.3.1.aarch64",
"openSUSE Leap 15.4:busybox-warewulf3-1.35.0-150400.3.3.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-11-11T14:38:22Z",
"details": "important"
}
],
"title": "CVE-2018-1000517"
},
{
"cve": "CVE-2018-20679",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2018-20679"
}
],
"notes": [
{
"category": "general",
"text": "An issue was discovered in BusyBox before 1.30.0. An out of bounds read in udhcp components (consumed by the DHCP server, client, and relay) allows a remote attacker to leak sensitive information from the stack by sending a crafted DHCP message. This is related to verification in udhcp_get_option() in networking/udhcp/common.c that 4-byte options are indeed 4 bytes.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-1.35.0-150400.3.3.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-1.35.0-150400.3.3.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-1.35.0-150400.3.3.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-1.35.0-150400.3.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-static-1.35.0-150400.3.3.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-static-1.35.0-150400.3.3.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-static-1.35.0-150400.3.3.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-static-1.35.0-150400.3.3.1.x86_64",
"openSUSE Leap 15.4:busybox-1.35.0-150400.3.3.1.aarch64",
"openSUSE Leap 15.4:busybox-1.35.0-150400.3.3.1.ppc64le",
"openSUSE Leap 15.4:busybox-1.35.0-150400.3.3.1.s390x",
"openSUSE Leap 15.4:busybox-1.35.0-150400.3.3.1.x86_64",
"openSUSE Leap 15.4:busybox-static-1.35.0-150400.3.3.1.aarch64",
"openSUSE Leap 15.4:busybox-static-1.35.0-150400.3.3.1.ppc64le",
"openSUSE Leap 15.4:busybox-static-1.35.0-150400.3.3.1.s390x",
"openSUSE Leap 15.4:busybox-static-1.35.0-150400.3.3.1.x86_64",
"openSUSE Leap 15.4:busybox-testsuite-1.35.0-150400.3.3.1.aarch64",
"openSUSE Leap 15.4:busybox-testsuite-1.35.0-150400.3.3.1.ppc64le",
"openSUSE Leap 15.4:busybox-testsuite-1.35.0-150400.3.3.1.s390x",
"openSUSE Leap 15.4:busybox-testsuite-1.35.0-150400.3.3.1.x86_64",
"openSUSE Leap 15.4:busybox-warewulf3-1.35.0-150400.3.3.1.aarch64",
"openSUSE Leap 15.4:busybox-warewulf3-1.35.0-150400.3.3.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2018-20679",
"url": "https://www.suse.com/security/cve/CVE-2018-20679"
},
{
"category": "external",
"summary": "SUSE Bug 1121426 for CVE-2018-20679",
"url": "https://bugzilla.suse.com/1121426"
},
{
"category": "external",
"summary": "SUSE Bug 1121428 for CVE-2018-20679",
"url": "https://bugzilla.suse.com/1121428"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-1.35.0-150400.3.3.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-1.35.0-150400.3.3.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-1.35.0-150400.3.3.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-1.35.0-150400.3.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-static-1.35.0-150400.3.3.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-static-1.35.0-150400.3.3.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-static-1.35.0-150400.3.3.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-static-1.35.0-150400.3.3.1.x86_64",
"openSUSE Leap 15.4:busybox-1.35.0-150400.3.3.1.aarch64",
"openSUSE Leap 15.4:busybox-1.35.0-150400.3.3.1.ppc64le",
"openSUSE Leap 15.4:busybox-1.35.0-150400.3.3.1.s390x",
"openSUSE Leap 15.4:busybox-1.35.0-150400.3.3.1.x86_64",
"openSUSE Leap 15.4:busybox-static-1.35.0-150400.3.3.1.aarch64",
"openSUSE Leap 15.4:busybox-static-1.35.0-150400.3.3.1.ppc64le",
"openSUSE Leap 15.4:busybox-static-1.35.0-150400.3.3.1.s390x",
"openSUSE Leap 15.4:busybox-static-1.35.0-150400.3.3.1.x86_64",
"openSUSE Leap 15.4:busybox-testsuite-1.35.0-150400.3.3.1.aarch64",
"openSUSE Leap 15.4:busybox-testsuite-1.35.0-150400.3.3.1.ppc64le",
"openSUSE Leap 15.4:busybox-testsuite-1.35.0-150400.3.3.1.s390x",
"openSUSE Leap 15.4:busybox-testsuite-1.35.0-150400.3.3.1.x86_64",
"openSUSE Leap 15.4:busybox-warewulf3-1.35.0-150400.3.3.1.aarch64",
"openSUSE Leap 15.4:busybox-warewulf3-1.35.0-150400.3.3.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-1.35.0-150400.3.3.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-1.35.0-150400.3.3.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-1.35.0-150400.3.3.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-1.35.0-150400.3.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-static-1.35.0-150400.3.3.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-static-1.35.0-150400.3.3.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-static-1.35.0-150400.3.3.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-static-1.35.0-150400.3.3.1.x86_64",
"openSUSE Leap 15.4:busybox-1.35.0-150400.3.3.1.aarch64",
"openSUSE Leap 15.4:busybox-1.35.0-150400.3.3.1.ppc64le",
"openSUSE Leap 15.4:busybox-1.35.0-150400.3.3.1.s390x",
"openSUSE Leap 15.4:busybox-1.35.0-150400.3.3.1.x86_64",
"openSUSE Leap 15.4:busybox-static-1.35.0-150400.3.3.1.aarch64",
"openSUSE Leap 15.4:busybox-static-1.35.0-150400.3.3.1.ppc64le",
"openSUSE Leap 15.4:busybox-static-1.35.0-150400.3.3.1.s390x",
"openSUSE Leap 15.4:busybox-static-1.35.0-150400.3.3.1.x86_64",
"openSUSE Leap 15.4:busybox-testsuite-1.35.0-150400.3.3.1.aarch64",
"openSUSE Leap 15.4:busybox-testsuite-1.35.0-150400.3.3.1.ppc64le",
"openSUSE Leap 15.4:busybox-testsuite-1.35.0-150400.3.3.1.s390x",
"openSUSE Leap 15.4:busybox-testsuite-1.35.0-150400.3.3.1.x86_64",
"openSUSE Leap 15.4:busybox-warewulf3-1.35.0-150400.3.3.1.aarch64",
"openSUSE Leap 15.4:busybox-warewulf3-1.35.0-150400.3.3.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-11-11T14:38:22Z",
"details": "moderate"
}
],
"title": "CVE-2018-20679"
},
{
"cve": "CVE-2019-5747",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-5747"
}
],
"notes": [
{
"category": "general",
"text": "An issue was discovered in BusyBox through 1.30.0. An out of bounds read in udhcp components (consumed by the DHCP client, server, and/or relay) might allow a remote attacker to leak sensitive information from the stack by sending a crafted DHCP message. This is related to assurance of a 4-byte length when decoding DHCP_SUBNET. NOTE: this issue exists because of an incomplete fix for CVE-2018-20679.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-1.35.0-150400.3.3.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-1.35.0-150400.3.3.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-1.35.0-150400.3.3.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-1.35.0-150400.3.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-static-1.35.0-150400.3.3.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-static-1.35.0-150400.3.3.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-static-1.35.0-150400.3.3.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-static-1.35.0-150400.3.3.1.x86_64",
"openSUSE Leap 15.4:busybox-1.35.0-150400.3.3.1.aarch64",
"openSUSE Leap 15.4:busybox-1.35.0-150400.3.3.1.ppc64le",
"openSUSE Leap 15.4:busybox-1.35.0-150400.3.3.1.s390x",
"openSUSE Leap 15.4:busybox-1.35.0-150400.3.3.1.x86_64",
"openSUSE Leap 15.4:busybox-static-1.35.0-150400.3.3.1.aarch64",
"openSUSE Leap 15.4:busybox-static-1.35.0-150400.3.3.1.ppc64le",
"openSUSE Leap 15.4:busybox-static-1.35.0-150400.3.3.1.s390x",
"openSUSE Leap 15.4:busybox-static-1.35.0-150400.3.3.1.x86_64",
"openSUSE Leap 15.4:busybox-testsuite-1.35.0-150400.3.3.1.aarch64",
"openSUSE Leap 15.4:busybox-testsuite-1.35.0-150400.3.3.1.ppc64le",
"openSUSE Leap 15.4:busybox-testsuite-1.35.0-150400.3.3.1.s390x",
"openSUSE Leap 15.4:busybox-testsuite-1.35.0-150400.3.3.1.x86_64",
"openSUSE Leap 15.4:busybox-warewulf3-1.35.0-150400.3.3.1.aarch64",
"openSUSE Leap 15.4:busybox-warewulf3-1.35.0-150400.3.3.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-5747",
"url": "https://www.suse.com/security/cve/CVE-2019-5747"
},
{
"category": "external",
"summary": "SUSE Bug 1121426 for CVE-2019-5747",
"url": "https://bugzilla.suse.com/1121426"
},
{
"category": "external",
"summary": "SUSE Bug 1121428 for CVE-2019-5747",
"url": "https://bugzilla.suse.com/1121428"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-1.35.0-150400.3.3.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-1.35.0-150400.3.3.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-1.35.0-150400.3.3.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-1.35.0-150400.3.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-static-1.35.0-150400.3.3.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-static-1.35.0-150400.3.3.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-static-1.35.0-150400.3.3.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-static-1.35.0-150400.3.3.1.x86_64",
"openSUSE Leap 15.4:busybox-1.35.0-150400.3.3.1.aarch64",
"openSUSE Leap 15.4:busybox-1.35.0-150400.3.3.1.ppc64le",
"openSUSE Leap 15.4:busybox-1.35.0-150400.3.3.1.s390x",
"openSUSE Leap 15.4:busybox-1.35.0-150400.3.3.1.x86_64",
"openSUSE Leap 15.4:busybox-static-1.35.0-150400.3.3.1.aarch64",
"openSUSE Leap 15.4:busybox-static-1.35.0-150400.3.3.1.ppc64le",
"openSUSE Leap 15.4:busybox-static-1.35.0-150400.3.3.1.s390x",
"openSUSE Leap 15.4:busybox-static-1.35.0-150400.3.3.1.x86_64",
"openSUSE Leap 15.4:busybox-testsuite-1.35.0-150400.3.3.1.aarch64",
"openSUSE Leap 15.4:busybox-testsuite-1.35.0-150400.3.3.1.ppc64le",
"openSUSE Leap 15.4:busybox-testsuite-1.35.0-150400.3.3.1.s390x",
"openSUSE Leap 15.4:busybox-testsuite-1.35.0-150400.3.3.1.x86_64",
"openSUSE Leap 15.4:busybox-warewulf3-1.35.0-150400.3.3.1.aarch64",
"openSUSE Leap 15.4:busybox-warewulf3-1.35.0-150400.3.3.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 3.5,
"baseSeverity": "LOW",
"vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-1.35.0-150400.3.3.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-1.35.0-150400.3.3.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-1.35.0-150400.3.3.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-1.35.0-150400.3.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-static-1.35.0-150400.3.3.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-static-1.35.0-150400.3.3.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-static-1.35.0-150400.3.3.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-static-1.35.0-150400.3.3.1.x86_64",
"openSUSE Leap 15.4:busybox-1.35.0-150400.3.3.1.aarch64",
"openSUSE Leap 15.4:busybox-1.35.0-150400.3.3.1.ppc64le",
"openSUSE Leap 15.4:busybox-1.35.0-150400.3.3.1.s390x",
"openSUSE Leap 15.4:busybox-1.35.0-150400.3.3.1.x86_64",
"openSUSE Leap 15.4:busybox-static-1.35.0-150400.3.3.1.aarch64",
"openSUSE Leap 15.4:busybox-static-1.35.0-150400.3.3.1.ppc64le",
"openSUSE Leap 15.4:busybox-static-1.35.0-150400.3.3.1.s390x",
"openSUSE Leap 15.4:busybox-static-1.35.0-150400.3.3.1.x86_64",
"openSUSE Leap 15.4:busybox-testsuite-1.35.0-150400.3.3.1.aarch64",
"openSUSE Leap 15.4:busybox-testsuite-1.35.0-150400.3.3.1.ppc64le",
"openSUSE Leap 15.4:busybox-testsuite-1.35.0-150400.3.3.1.s390x",
"openSUSE Leap 15.4:busybox-testsuite-1.35.0-150400.3.3.1.x86_64",
"openSUSE Leap 15.4:busybox-warewulf3-1.35.0-150400.3.3.1.aarch64",
"openSUSE Leap 15.4:busybox-warewulf3-1.35.0-150400.3.3.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-11-11T14:38:22Z",
"details": "low"
}
],
"title": "CVE-2019-5747"
},
{
"cve": "CVE-2021-28831",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-28831"
}
],
"notes": [
{
"category": "general",
"text": "decompress_gunzip.c in BusyBox through 1.32.1 mishandles the error bit on the huft_build result pointer, with a resultant invalid free or segmentation fault, via malformed gzip data.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-1.35.0-150400.3.3.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-1.35.0-150400.3.3.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-1.35.0-150400.3.3.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-1.35.0-150400.3.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-static-1.35.0-150400.3.3.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-static-1.35.0-150400.3.3.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-static-1.35.0-150400.3.3.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-static-1.35.0-150400.3.3.1.x86_64",
"openSUSE Leap 15.4:busybox-1.35.0-150400.3.3.1.aarch64",
"openSUSE Leap 15.4:busybox-1.35.0-150400.3.3.1.ppc64le",
"openSUSE Leap 15.4:busybox-1.35.0-150400.3.3.1.s390x",
"openSUSE Leap 15.4:busybox-1.35.0-150400.3.3.1.x86_64",
"openSUSE Leap 15.4:busybox-static-1.35.0-150400.3.3.1.aarch64",
"openSUSE Leap 15.4:busybox-static-1.35.0-150400.3.3.1.ppc64le",
"openSUSE Leap 15.4:busybox-static-1.35.0-150400.3.3.1.s390x",
"openSUSE Leap 15.4:busybox-static-1.35.0-150400.3.3.1.x86_64",
"openSUSE Leap 15.4:busybox-testsuite-1.35.0-150400.3.3.1.aarch64",
"openSUSE Leap 15.4:busybox-testsuite-1.35.0-150400.3.3.1.ppc64le",
"openSUSE Leap 15.4:busybox-testsuite-1.35.0-150400.3.3.1.s390x",
"openSUSE Leap 15.4:busybox-testsuite-1.35.0-150400.3.3.1.x86_64",
"openSUSE Leap 15.4:busybox-warewulf3-1.35.0-150400.3.3.1.aarch64",
"openSUSE Leap 15.4:busybox-warewulf3-1.35.0-150400.3.3.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-28831",
"url": "https://www.suse.com/security/cve/CVE-2021-28831"
},
{
"category": "external",
"summary": "SUSE Bug 1184522 for CVE-2021-28831",
"url": "https://bugzilla.suse.com/1184522"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-1.35.0-150400.3.3.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-1.35.0-150400.3.3.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-1.35.0-150400.3.3.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-1.35.0-150400.3.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-static-1.35.0-150400.3.3.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-static-1.35.0-150400.3.3.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-static-1.35.0-150400.3.3.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-static-1.35.0-150400.3.3.1.x86_64",
"openSUSE Leap 15.4:busybox-1.35.0-150400.3.3.1.aarch64",
"openSUSE Leap 15.4:busybox-1.35.0-150400.3.3.1.ppc64le",
"openSUSE Leap 15.4:busybox-1.35.0-150400.3.3.1.s390x",
"openSUSE Leap 15.4:busybox-1.35.0-150400.3.3.1.x86_64",
"openSUSE Leap 15.4:busybox-static-1.35.0-150400.3.3.1.aarch64",
"openSUSE Leap 15.4:busybox-static-1.35.0-150400.3.3.1.ppc64le",
"openSUSE Leap 15.4:busybox-static-1.35.0-150400.3.3.1.s390x",
"openSUSE Leap 15.4:busybox-static-1.35.0-150400.3.3.1.x86_64",
"openSUSE Leap 15.4:busybox-testsuite-1.35.0-150400.3.3.1.aarch64",
"openSUSE Leap 15.4:busybox-testsuite-1.35.0-150400.3.3.1.ppc64le",
"openSUSE Leap 15.4:busybox-testsuite-1.35.0-150400.3.3.1.s390x",
"openSUSE Leap 15.4:busybox-testsuite-1.35.0-150400.3.3.1.x86_64",
"openSUSE Leap 15.4:busybox-warewulf3-1.35.0-150400.3.3.1.aarch64",
"openSUSE Leap 15.4:busybox-warewulf3-1.35.0-150400.3.3.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-1.35.0-150400.3.3.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-1.35.0-150400.3.3.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-1.35.0-150400.3.3.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-1.35.0-150400.3.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-static-1.35.0-150400.3.3.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-static-1.35.0-150400.3.3.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-static-1.35.0-150400.3.3.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-static-1.35.0-150400.3.3.1.x86_64",
"openSUSE Leap 15.4:busybox-1.35.0-150400.3.3.1.aarch64",
"openSUSE Leap 15.4:busybox-1.35.0-150400.3.3.1.ppc64le",
"openSUSE Leap 15.4:busybox-1.35.0-150400.3.3.1.s390x",
"openSUSE Leap 15.4:busybox-1.35.0-150400.3.3.1.x86_64",
"openSUSE Leap 15.4:busybox-static-1.35.0-150400.3.3.1.aarch64",
"openSUSE Leap 15.4:busybox-static-1.35.0-150400.3.3.1.ppc64le",
"openSUSE Leap 15.4:busybox-static-1.35.0-150400.3.3.1.s390x",
"openSUSE Leap 15.4:busybox-static-1.35.0-150400.3.3.1.x86_64",
"openSUSE Leap 15.4:busybox-testsuite-1.35.0-150400.3.3.1.aarch64",
"openSUSE Leap 15.4:busybox-testsuite-1.35.0-150400.3.3.1.ppc64le",
"openSUSE Leap 15.4:busybox-testsuite-1.35.0-150400.3.3.1.s390x",
"openSUSE Leap 15.4:busybox-testsuite-1.35.0-150400.3.3.1.x86_64",
"openSUSE Leap 15.4:busybox-warewulf3-1.35.0-150400.3.3.1.aarch64",
"openSUSE Leap 15.4:busybox-warewulf3-1.35.0-150400.3.3.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-11-11T14:38:22Z",
"details": "important"
}
],
"title": "CVE-2021-28831"
},
{
"cve": "CVE-2021-42373",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-42373"
}
],
"notes": [
{
"category": "general",
"text": "A NULL pointer dereference in Busybox\u0027s man applet leads to denial of service when a section name is supplied but no page argument is given",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-1.35.0-150400.3.3.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-1.35.0-150400.3.3.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-1.35.0-150400.3.3.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-1.35.0-150400.3.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-static-1.35.0-150400.3.3.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-static-1.35.0-150400.3.3.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-static-1.35.0-150400.3.3.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-static-1.35.0-150400.3.3.1.x86_64",
"openSUSE Leap 15.4:busybox-1.35.0-150400.3.3.1.aarch64",
"openSUSE Leap 15.4:busybox-1.35.0-150400.3.3.1.ppc64le",
"openSUSE Leap 15.4:busybox-1.35.0-150400.3.3.1.s390x",
"openSUSE Leap 15.4:busybox-1.35.0-150400.3.3.1.x86_64",
"openSUSE Leap 15.4:busybox-static-1.35.0-150400.3.3.1.aarch64",
"openSUSE Leap 15.4:busybox-static-1.35.0-150400.3.3.1.ppc64le",
"openSUSE Leap 15.4:busybox-static-1.35.0-150400.3.3.1.s390x",
"openSUSE Leap 15.4:busybox-static-1.35.0-150400.3.3.1.x86_64",
"openSUSE Leap 15.4:busybox-testsuite-1.35.0-150400.3.3.1.aarch64",
"openSUSE Leap 15.4:busybox-testsuite-1.35.0-150400.3.3.1.ppc64le",
"openSUSE Leap 15.4:busybox-testsuite-1.35.0-150400.3.3.1.s390x",
"openSUSE Leap 15.4:busybox-testsuite-1.35.0-150400.3.3.1.x86_64",
"openSUSE Leap 15.4:busybox-warewulf3-1.35.0-150400.3.3.1.aarch64",
"openSUSE Leap 15.4:busybox-warewulf3-1.35.0-150400.3.3.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-42373",
"url": "https://www.suse.com/security/cve/CVE-2021-42373"
},
{
"category": "external",
"summary": "SUSE Bug 1192869 for CVE-2021-42373",
"url": "https://bugzilla.suse.com/1192869"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-1.35.0-150400.3.3.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-1.35.0-150400.3.3.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-1.35.0-150400.3.3.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-1.35.0-150400.3.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-static-1.35.0-150400.3.3.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-static-1.35.0-150400.3.3.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-static-1.35.0-150400.3.3.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-static-1.35.0-150400.3.3.1.x86_64",
"openSUSE Leap 15.4:busybox-1.35.0-150400.3.3.1.aarch64",
"openSUSE Leap 15.4:busybox-1.35.0-150400.3.3.1.ppc64le",
"openSUSE Leap 15.4:busybox-1.35.0-150400.3.3.1.s390x",
"openSUSE Leap 15.4:busybox-1.35.0-150400.3.3.1.x86_64",
"openSUSE Leap 15.4:busybox-static-1.35.0-150400.3.3.1.aarch64",
"openSUSE Leap 15.4:busybox-static-1.35.0-150400.3.3.1.ppc64le",
"openSUSE Leap 15.4:busybox-static-1.35.0-150400.3.3.1.s390x",
"openSUSE Leap 15.4:busybox-static-1.35.0-150400.3.3.1.x86_64",
"openSUSE Leap 15.4:busybox-testsuite-1.35.0-150400.3.3.1.aarch64",
"openSUSE Leap 15.4:busybox-testsuite-1.35.0-150400.3.3.1.ppc64le",
"openSUSE Leap 15.4:busybox-testsuite-1.35.0-150400.3.3.1.s390x",
"openSUSE Leap 15.4:busybox-testsuite-1.35.0-150400.3.3.1.x86_64",
"openSUSE Leap 15.4:busybox-warewulf3-1.35.0-150400.3.3.1.aarch64",
"openSUSE Leap 15.4:busybox-warewulf3-1.35.0-150400.3.3.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-1.35.0-150400.3.3.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-1.35.0-150400.3.3.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-1.35.0-150400.3.3.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-1.35.0-150400.3.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-static-1.35.0-150400.3.3.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-static-1.35.0-150400.3.3.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-static-1.35.0-150400.3.3.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-static-1.35.0-150400.3.3.1.x86_64",
"openSUSE Leap 15.4:busybox-1.35.0-150400.3.3.1.aarch64",
"openSUSE Leap 15.4:busybox-1.35.0-150400.3.3.1.ppc64le",
"openSUSE Leap 15.4:busybox-1.35.0-150400.3.3.1.s390x",
"openSUSE Leap 15.4:busybox-1.35.0-150400.3.3.1.x86_64",
"openSUSE Leap 15.4:busybox-static-1.35.0-150400.3.3.1.aarch64",
"openSUSE Leap 15.4:busybox-static-1.35.0-150400.3.3.1.ppc64le",
"openSUSE Leap 15.4:busybox-static-1.35.0-150400.3.3.1.s390x",
"openSUSE Leap 15.4:busybox-static-1.35.0-150400.3.3.1.x86_64",
"openSUSE Leap 15.4:busybox-testsuite-1.35.0-150400.3.3.1.aarch64",
"openSUSE Leap 15.4:busybox-testsuite-1.35.0-150400.3.3.1.ppc64le",
"openSUSE Leap 15.4:busybox-testsuite-1.35.0-150400.3.3.1.s390x",
"openSUSE Leap 15.4:busybox-testsuite-1.35.0-150400.3.3.1.x86_64",
"openSUSE Leap 15.4:busybox-warewulf3-1.35.0-150400.3.3.1.aarch64",
"openSUSE Leap 15.4:busybox-warewulf3-1.35.0-150400.3.3.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-11-11T14:38:22Z",
"details": "moderate"
}
],
"title": "CVE-2021-42373"
},
{
"cve": "CVE-2021-42374",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-42374"
}
],
"notes": [
{
"category": "general",
"text": "An out-of-bounds heap read in Busybox\u0027s unlzma applet leads to information leak and denial of service when crafted LZMA-compressed input is decompressed. This can be triggered by any applet/format that",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-1.35.0-150400.3.3.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-1.35.0-150400.3.3.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-1.35.0-150400.3.3.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-1.35.0-150400.3.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-static-1.35.0-150400.3.3.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-static-1.35.0-150400.3.3.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-static-1.35.0-150400.3.3.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-static-1.35.0-150400.3.3.1.x86_64",
"openSUSE Leap 15.4:busybox-1.35.0-150400.3.3.1.aarch64",
"openSUSE Leap 15.4:busybox-1.35.0-150400.3.3.1.ppc64le",
"openSUSE Leap 15.4:busybox-1.35.0-150400.3.3.1.s390x",
"openSUSE Leap 15.4:busybox-1.35.0-150400.3.3.1.x86_64",
"openSUSE Leap 15.4:busybox-static-1.35.0-150400.3.3.1.aarch64",
"openSUSE Leap 15.4:busybox-static-1.35.0-150400.3.3.1.ppc64le",
"openSUSE Leap 15.4:busybox-static-1.35.0-150400.3.3.1.s390x",
"openSUSE Leap 15.4:busybox-static-1.35.0-150400.3.3.1.x86_64",
"openSUSE Leap 15.4:busybox-testsuite-1.35.0-150400.3.3.1.aarch64",
"openSUSE Leap 15.4:busybox-testsuite-1.35.0-150400.3.3.1.ppc64le",
"openSUSE Leap 15.4:busybox-testsuite-1.35.0-150400.3.3.1.s390x",
"openSUSE Leap 15.4:busybox-testsuite-1.35.0-150400.3.3.1.x86_64",
"openSUSE Leap 15.4:busybox-warewulf3-1.35.0-150400.3.3.1.aarch64",
"openSUSE Leap 15.4:busybox-warewulf3-1.35.0-150400.3.3.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-42374",
"url": "https://www.suse.com/security/cve/CVE-2021-42374"
},
{
"category": "external",
"summary": "SUSE Bug 1192869 for CVE-2021-42374",
"url": "https://bugzilla.suse.com/1192869"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-1.35.0-150400.3.3.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-1.35.0-150400.3.3.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-1.35.0-150400.3.3.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-1.35.0-150400.3.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-static-1.35.0-150400.3.3.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-static-1.35.0-150400.3.3.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-static-1.35.0-150400.3.3.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-static-1.35.0-150400.3.3.1.x86_64",
"openSUSE Leap 15.4:busybox-1.35.0-150400.3.3.1.aarch64",
"openSUSE Leap 15.4:busybox-1.35.0-150400.3.3.1.ppc64le",
"openSUSE Leap 15.4:busybox-1.35.0-150400.3.3.1.s390x",
"openSUSE Leap 15.4:busybox-1.35.0-150400.3.3.1.x86_64",
"openSUSE Leap 15.4:busybox-static-1.35.0-150400.3.3.1.aarch64",
"openSUSE Leap 15.4:busybox-static-1.35.0-150400.3.3.1.ppc64le",
"openSUSE Leap 15.4:busybox-static-1.35.0-150400.3.3.1.s390x",
"openSUSE Leap 15.4:busybox-static-1.35.0-150400.3.3.1.x86_64",
"openSUSE Leap 15.4:busybox-testsuite-1.35.0-150400.3.3.1.aarch64",
"openSUSE Leap 15.4:busybox-testsuite-1.35.0-150400.3.3.1.ppc64le",
"openSUSE Leap 15.4:busybox-testsuite-1.35.0-150400.3.3.1.s390x",
"openSUSE Leap 15.4:busybox-testsuite-1.35.0-150400.3.3.1.x86_64",
"openSUSE Leap 15.4:busybox-warewulf3-1.35.0-150400.3.3.1.aarch64",
"openSUSE Leap 15.4:busybox-warewulf3-1.35.0-150400.3.3.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.7,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-1.35.0-150400.3.3.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-1.35.0-150400.3.3.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-1.35.0-150400.3.3.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-1.35.0-150400.3.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-static-1.35.0-150400.3.3.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-static-1.35.0-150400.3.3.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-static-1.35.0-150400.3.3.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-static-1.35.0-150400.3.3.1.x86_64",
"openSUSE Leap 15.4:busybox-1.35.0-150400.3.3.1.aarch64",
"openSUSE Leap 15.4:busybox-1.35.0-150400.3.3.1.ppc64le",
"openSUSE Leap 15.4:busybox-1.35.0-150400.3.3.1.s390x",
"openSUSE Leap 15.4:busybox-1.35.0-150400.3.3.1.x86_64",
"openSUSE Leap 15.4:busybox-static-1.35.0-150400.3.3.1.aarch64",
"openSUSE Leap 15.4:busybox-static-1.35.0-150400.3.3.1.ppc64le",
"openSUSE Leap 15.4:busybox-static-1.35.0-150400.3.3.1.s390x",
"openSUSE Leap 15.4:busybox-static-1.35.0-150400.3.3.1.x86_64",
"openSUSE Leap 15.4:busybox-testsuite-1.35.0-150400.3.3.1.aarch64",
"openSUSE Leap 15.4:busybox-testsuite-1.35.0-150400.3.3.1.ppc64le",
"openSUSE Leap 15.4:busybox-testsuite-1.35.0-150400.3.3.1.s390x",
"openSUSE Leap 15.4:busybox-testsuite-1.35.0-150400.3.3.1.x86_64",
"openSUSE Leap 15.4:busybox-warewulf3-1.35.0-150400.3.3.1.aarch64",
"openSUSE Leap 15.4:busybox-warewulf3-1.35.0-150400.3.3.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-11-11T14:38:22Z",
"details": "moderate"
}
],
"title": "CVE-2021-42374"
},
{
"cve": "CVE-2021-42375",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-42375"
}
],
"notes": [
{
"category": "general",
"text": "An incorrect handling of a special element in Busybox\u0027s ash applet leads to denial of service when processing a crafted shell command, due to the shell mistaking specific characters for reserved characters. This may be used for DoS under rare conditions of filtered command input.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-1.35.0-150400.3.3.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-1.35.0-150400.3.3.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-1.35.0-150400.3.3.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-1.35.0-150400.3.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-static-1.35.0-150400.3.3.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-static-1.35.0-150400.3.3.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-static-1.35.0-150400.3.3.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-static-1.35.0-150400.3.3.1.x86_64",
"openSUSE Leap 15.4:busybox-1.35.0-150400.3.3.1.aarch64",
"openSUSE Leap 15.4:busybox-1.35.0-150400.3.3.1.ppc64le",
"openSUSE Leap 15.4:busybox-1.35.0-150400.3.3.1.s390x",
"openSUSE Leap 15.4:busybox-1.35.0-150400.3.3.1.x86_64",
"openSUSE Leap 15.4:busybox-static-1.35.0-150400.3.3.1.aarch64",
"openSUSE Leap 15.4:busybox-static-1.35.0-150400.3.3.1.ppc64le",
"openSUSE Leap 15.4:busybox-static-1.35.0-150400.3.3.1.s390x",
"openSUSE Leap 15.4:busybox-static-1.35.0-150400.3.3.1.x86_64",
"openSUSE Leap 15.4:busybox-testsuite-1.35.0-150400.3.3.1.aarch64",
"openSUSE Leap 15.4:busybox-testsuite-1.35.0-150400.3.3.1.ppc64le",
"openSUSE Leap 15.4:busybox-testsuite-1.35.0-150400.3.3.1.s390x",
"openSUSE Leap 15.4:busybox-testsuite-1.35.0-150400.3.3.1.x86_64",
"openSUSE Leap 15.4:busybox-warewulf3-1.35.0-150400.3.3.1.aarch64",
"openSUSE Leap 15.4:busybox-warewulf3-1.35.0-150400.3.3.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-42375",
"url": "https://www.suse.com/security/cve/CVE-2021-42375"
},
{
"category": "external",
"summary": "SUSE Bug 1192869 for CVE-2021-42375",
"url": "https://bugzilla.suse.com/1192869"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-1.35.0-150400.3.3.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-1.35.0-150400.3.3.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-1.35.0-150400.3.3.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-1.35.0-150400.3.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-static-1.35.0-150400.3.3.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-static-1.35.0-150400.3.3.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-static-1.35.0-150400.3.3.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-static-1.35.0-150400.3.3.1.x86_64",
"openSUSE Leap 15.4:busybox-1.35.0-150400.3.3.1.aarch64",
"openSUSE Leap 15.4:busybox-1.35.0-150400.3.3.1.ppc64le",
"openSUSE Leap 15.4:busybox-1.35.0-150400.3.3.1.s390x",
"openSUSE Leap 15.4:busybox-1.35.0-150400.3.3.1.x86_64",
"openSUSE Leap 15.4:busybox-static-1.35.0-150400.3.3.1.aarch64",
"openSUSE Leap 15.4:busybox-static-1.35.0-150400.3.3.1.ppc64le",
"openSUSE Leap 15.4:busybox-static-1.35.0-150400.3.3.1.s390x",
"openSUSE Leap 15.4:busybox-static-1.35.0-150400.3.3.1.x86_64",
"openSUSE Leap 15.4:busybox-testsuite-1.35.0-150400.3.3.1.aarch64",
"openSUSE Leap 15.4:busybox-testsuite-1.35.0-150400.3.3.1.ppc64le",
"openSUSE Leap 15.4:busybox-testsuite-1.35.0-150400.3.3.1.s390x",
"openSUSE Leap 15.4:busybox-testsuite-1.35.0-150400.3.3.1.x86_64",
"openSUSE Leap 15.4:busybox-warewulf3-1.35.0-150400.3.3.1.aarch64",
"openSUSE Leap 15.4:busybox-warewulf3-1.35.0-150400.3.3.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.1,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-1.35.0-150400.3.3.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-1.35.0-150400.3.3.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-1.35.0-150400.3.3.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-1.35.0-150400.3.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-static-1.35.0-150400.3.3.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-static-1.35.0-150400.3.3.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-static-1.35.0-150400.3.3.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-static-1.35.0-150400.3.3.1.x86_64",
"openSUSE Leap 15.4:busybox-1.35.0-150400.3.3.1.aarch64",
"openSUSE Leap 15.4:busybox-1.35.0-150400.3.3.1.ppc64le",
"openSUSE Leap 15.4:busybox-1.35.0-150400.3.3.1.s390x",
"openSUSE Leap 15.4:busybox-1.35.0-150400.3.3.1.x86_64",
"openSUSE Leap 15.4:busybox-static-1.35.0-150400.3.3.1.aarch64",
"openSUSE Leap 15.4:busybox-static-1.35.0-150400.3.3.1.ppc64le",
"openSUSE Leap 15.4:busybox-static-1.35.0-150400.3.3.1.s390x",
"openSUSE Leap 15.4:busybox-static-1.35.0-150400.3.3.1.x86_64",
"openSUSE Leap 15.4:busybox-testsuite-1.35.0-150400.3.3.1.aarch64",
"openSUSE Leap 15.4:busybox-testsuite-1.35.0-150400.3.3.1.ppc64le",
"openSUSE Leap 15.4:busybox-testsuite-1.35.0-150400.3.3.1.s390x",
"openSUSE Leap 15.4:busybox-testsuite-1.35.0-150400.3.3.1.x86_64",
"openSUSE Leap 15.4:busybox-warewulf3-1.35.0-150400.3.3.1.aarch64",
"openSUSE Leap 15.4:busybox-warewulf3-1.35.0-150400.3.3.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-11-11T14:38:22Z",
"details": "moderate"
}
],
"title": "CVE-2021-42375"
},
{
"cve": "CVE-2021-42376",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-42376"
}
],
"notes": [
{
"category": "general",
"text": "A NULL pointer dereference in Busybox\u0027s hush applet leads to denial of service when processing a crafted shell command, due to missing validation after a \\x03 delimiter character. This may be used for DoS under very rare conditions of filtered command input.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-1.35.0-150400.3.3.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-1.35.0-150400.3.3.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-1.35.0-150400.3.3.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-1.35.0-150400.3.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-static-1.35.0-150400.3.3.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-static-1.35.0-150400.3.3.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-static-1.35.0-150400.3.3.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-static-1.35.0-150400.3.3.1.x86_64",
"openSUSE Leap 15.4:busybox-1.35.0-150400.3.3.1.aarch64",
"openSUSE Leap 15.4:busybox-1.35.0-150400.3.3.1.ppc64le",
"openSUSE Leap 15.4:busybox-1.35.0-150400.3.3.1.s390x",
"openSUSE Leap 15.4:busybox-1.35.0-150400.3.3.1.x86_64",
"openSUSE Leap 15.4:busybox-static-1.35.0-150400.3.3.1.aarch64",
"openSUSE Leap 15.4:busybox-static-1.35.0-150400.3.3.1.ppc64le",
"openSUSE Leap 15.4:busybox-static-1.35.0-150400.3.3.1.s390x",
"openSUSE Leap 15.4:busybox-static-1.35.0-150400.3.3.1.x86_64",
"openSUSE Leap 15.4:busybox-testsuite-1.35.0-150400.3.3.1.aarch64",
"openSUSE Leap 15.4:busybox-testsuite-1.35.0-150400.3.3.1.ppc64le",
"openSUSE Leap 15.4:busybox-testsuite-1.35.0-150400.3.3.1.s390x",
"openSUSE Leap 15.4:busybox-testsuite-1.35.0-150400.3.3.1.x86_64",
"openSUSE Leap 15.4:busybox-warewulf3-1.35.0-150400.3.3.1.aarch64",
"openSUSE Leap 15.4:busybox-warewulf3-1.35.0-150400.3.3.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-42376",
"url": "https://www.suse.com/security/cve/CVE-2021-42376"
},
{
"category": "external",
"summary": "SUSE Bug 1192869 for CVE-2021-42376",
"url": "https://bugzilla.suse.com/1192869"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-1.35.0-150400.3.3.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-1.35.0-150400.3.3.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-1.35.0-150400.3.3.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-1.35.0-150400.3.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-static-1.35.0-150400.3.3.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-static-1.35.0-150400.3.3.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-static-1.35.0-150400.3.3.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-static-1.35.0-150400.3.3.1.x86_64",
"openSUSE Leap 15.4:busybox-1.35.0-150400.3.3.1.aarch64",
"openSUSE Leap 15.4:busybox-1.35.0-150400.3.3.1.ppc64le",
"openSUSE Leap 15.4:busybox-1.35.0-150400.3.3.1.s390x",
"openSUSE Leap 15.4:busybox-1.35.0-150400.3.3.1.x86_64",
"openSUSE Leap 15.4:busybox-static-1.35.0-150400.3.3.1.aarch64",
"openSUSE Leap 15.4:busybox-static-1.35.0-150400.3.3.1.ppc64le",
"openSUSE Leap 15.4:busybox-static-1.35.0-150400.3.3.1.s390x",
"openSUSE Leap 15.4:busybox-static-1.35.0-150400.3.3.1.x86_64",
"openSUSE Leap 15.4:busybox-testsuite-1.35.0-150400.3.3.1.aarch64",
"openSUSE Leap 15.4:busybox-testsuite-1.35.0-150400.3.3.1.ppc64le",
"openSUSE Leap 15.4:busybox-testsuite-1.35.0-150400.3.3.1.s390x",
"openSUSE Leap 15.4:busybox-testsuite-1.35.0-150400.3.3.1.x86_64",
"openSUSE Leap 15.4:busybox-warewulf3-1.35.0-150400.3.3.1.aarch64",
"openSUSE Leap 15.4:busybox-warewulf3-1.35.0-150400.3.3.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.1,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-1.35.0-150400.3.3.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-1.35.0-150400.3.3.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-1.35.0-150400.3.3.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-1.35.0-150400.3.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-static-1.35.0-150400.3.3.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-static-1.35.0-150400.3.3.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-static-1.35.0-150400.3.3.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-static-1.35.0-150400.3.3.1.x86_64",
"openSUSE Leap 15.4:busybox-1.35.0-150400.3.3.1.aarch64",
"openSUSE Leap 15.4:busybox-1.35.0-150400.3.3.1.ppc64le",
"openSUSE Leap 15.4:busybox-1.35.0-150400.3.3.1.s390x",
"openSUSE Leap 15.4:busybox-1.35.0-150400.3.3.1.x86_64",
"openSUSE Leap 15.4:busybox-static-1.35.0-150400.3.3.1.aarch64",
"openSUSE Leap 15.4:busybox-static-1.35.0-150400.3.3.1.ppc64le",
"openSUSE Leap 15.4:busybox-static-1.35.0-150400.3.3.1.s390x",
"openSUSE Leap 15.4:busybox-static-1.35.0-150400.3.3.1.x86_64",
"openSUSE Leap 15.4:busybox-testsuite-1.35.0-150400.3.3.1.aarch64",
"openSUSE Leap 15.4:busybox-testsuite-1.35.0-150400.3.3.1.ppc64le",
"openSUSE Leap 15.4:busybox-testsuite-1.35.0-150400.3.3.1.s390x",
"openSUSE Leap 15.4:busybox-testsuite-1.35.0-150400.3.3.1.x86_64",
"openSUSE Leap 15.4:busybox-warewulf3-1.35.0-150400.3.3.1.aarch64",
"openSUSE Leap 15.4:busybox-warewulf3-1.35.0-150400.3.3.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-11-11T14:38:22Z",
"details": "moderate"
}
],
"title": "CVE-2021-42376"
},
{
"cve": "CVE-2021-42377",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-42377"
}
],
"notes": [
{
"category": "general",
"text": "An attacker-controlled pointer free in Busybox\u0027s hush applet leads to denial of service and possible code execution when processing a crafted shell command, due to the shell mishandling the \u0026\u0026\u0026 string. This may be used for remote code execution under rare conditions of filtered command input.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-1.35.0-150400.3.3.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-1.35.0-150400.3.3.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-1.35.0-150400.3.3.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-1.35.0-150400.3.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-static-1.35.0-150400.3.3.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-static-1.35.0-150400.3.3.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-static-1.35.0-150400.3.3.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-static-1.35.0-150400.3.3.1.x86_64",
"openSUSE Leap 15.4:busybox-1.35.0-150400.3.3.1.aarch64",
"openSUSE Leap 15.4:busybox-1.35.0-150400.3.3.1.ppc64le",
"openSUSE Leap 15.4:busybox-1.35.0-150400.3.3.1.s390x",
"openSUSE Leap 15.4:busybox-1.35.0-150400.3.3.1.x86_64",
"openSUSE Leap 15.4:busybox-static-1.35.0-150400.3.3.1.aarch64",
"openSUSE Leap 15.4:busybox-static-1.35.0-150400.3.3.1.ppc64le",
"openSUSE Leap 15.4:busybox-static-1.35.0-150400.3.3.1.s390x",
"openSUSE Leap 15.4:busybox-static-1.35.0-150400.3.3.1.x86_64",
"openSUSE Leap 15.4:busybox-testsuite-1.35.0-150400.3.3.1.aarch64",
"openSUSE Leap 15.4:busybox-testsuite-1.35.0-150400.3.3.1.ppc64le",
"openSUSE Leap 15.4:busybox-testsuite-1.35.0-150400.3.3.1.s390x",
"openSUSE Leap 15.4:busybox-testsuite-1.35.0-150400.3.3.1.x86_64",
"openSUSE Leap 15.4:busybox-warewulf3-1.35.0-150400.3.3.1.aarch64",
"openSUSE Leap 15.4:busybox-warewulf3-1.35.0-150400.3.3.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-42377",
"url": "https://www.suse.com/security/cve/CVE-2021-42377"
},
{
"category": "external",
"summary": "SUSE Bug 1192869 for CVE-2021-42377",
"url": "https://bugzilla.suse.com/1192869"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-1.35.0-150400.3.3.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-1.35.0-150400.3.3.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-1.35.0-150400.3.3.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-1.35.0-150400.3.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-static-1.35.0-150400.3.3.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-static-1.35.0-150400.3.3.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-static-1.35.0-150400.3.3.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-static-1.35.0-150400.3.3.1.x86_64",
"openSUSE Leap 15.4:busybox-1.35.0-150400.3.3.1.aarch64",
"openSUSE Leap 15.4:busybox-1.35.0-150400.3.3.1.ppc64le",
"openSUSE Leap 15.4:busybox-1.35.0-150400.3.3.1.s390x",
"openSUSE Leap 15.4:busybox-1.35.0-150400.3.3.1.x86_64",
"openSUSE Leap 15.4:busybox-static-1.35.0-150400.3.3.1.aarch64",
"openSUSE Leap 15.4:busybox-static-1.35.0-150400.3.3.1.ppc64le",
"openSUSE Leap 15.4:busybox-static-1.35.0-150400.3.3.1.s390x",
"openSUSE Leap 15.4:busybox-static-1.35.0-150400.3.3.1.x86_64",
"openSUSE Leap 15.4:busybox-testsuite-1.35.0-150400.3.3.1.aarch64",
"openSUSE Leap 15.4:busybox-testsuite-1.35.0-150400.3.3.1.ppc64le",
"openSUSE Leap 15.4:busybox-testsuite-1.35.0-150400.3.3.1.s390x",
"openSUSE Leap 15.4:busybox-testsuite-1.35.0-150400.3.3.1.x86_64",
"openSUSE Leap 15.4:busybox-warewulf3-1.35.0-150400.3.3.1.aarch64",
"openSUSE Leap 15.4:busybox-warewulf3-1.35.0-150400.3.3.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.4,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-1.35.0-150400.3.3.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-1.35.0-150400.3.3.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-1.35.0-150400.3.3.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-1.35.0-150400.3.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-static-1.35.0-150400.3.3.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-static-1.35.0-150400.3.3.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-static-1.35.0-150400.3.3.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-static-1.35.0-150400.3.3.1.x86_64",
"openSUSE Leap 15.4:busybox-1.35.0-150400.3.3.1.aarch64",
"openSUSE Leap 15.4:busybox-1.35.0-150400.3.3.1.ppc64le",
"openSUSE Leap 15.4:busybox-1.35.0-150400.3.3.1.s390x",
"openSUSE Leap 15.4:busybox-1.35.0-150400.3.3.1.x86_64",
"openSUSE Leap 15.4:busybox-static-1.35.0-150400.3.3.1.aarch64",
"openSUSE Leap 15.4:busybox-static-1.35.0-150400.3.3.1.ppc64le",
"openSUSE Leap 15.4:busybox-static-1.35.0-150400.3.3.1.s390x",
"openSUSE Leap 15.4:busybox-static-1.35.0-150400.3.3.1.x86_64",
"openSUSE Leap 15.4:busybox-testsuite-1.35.0-150400.3.3.1.aarch64",
"openSUSE Leap 15.4:busybox-testsuite-1.35.0-150400.3.3.1.ppc64le",
"openSUSE Leap 15.4:busybox-testsuite-1.35.0-150400.3.3.1.s390x",
"openSUSE Leap 15.4:busybox-testsuite-1.35.0-150400.3.3.1.x86_64",
"openSUSE Leap 15.4:busybox-warewulf3-1.35.0-150400.3.3.1.aarch64",
"openSUSE Leap 15.4:busybox-warewulf3-1.35.0-150400.3.3.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-11-11T14:38:22Z",
"details": "moderate"
}
],
"title": "CVE-2021-42377"
},
{
"cve": "CVE-2021-42378",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-42378"
}
],
"notes": [
{
"category": "general",
"text": "A use-after-free in Busybox\u0027s awk applet leads to denial of service and possibly code execution when processing a crafted awk pattern in the getvar_i function",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-1.35.0-150400.3.3.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-1.35.0-150400.3.3.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-1.35.0-150400.3.3.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-1.35.0-150400.3.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-static-1.35.0-150400.3.3.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-static-1.35.0-150400.3.3.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-static-1.35.0-150400.3.3.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-static-1.35.0-150400.3.3.1.x86_64",
"openSUSE Leap 15.4:busybox-1.35.0-150400.3.3.1.aarch64",
"openSUSE Leap 15.4:busybox-1.35.0-150400.3.3.1.ppc64le",
"openSUSE Leap 15.4:busybox-1.35.0-150400.3.3.1.s390x",
"openSUSE Leap 15.4:busybox-1.35.0-150400.3.3.1.x86_64",
"openSUSE Leap 15.4:busybox-static-1.35.0-150400.3.3.1.aarch64",
"openSUSE Leap 15.4:busybox-static-1.35.0-150400.3.3.1.ppc64le",
"openSUSE Leap 15.4:busybox-static-1.35.0-150400.3.3.1.s390x",
"openSUSE Leap 15.4:busybox-static-1.35.0-150400.3.3.1.x86_64",
"openSUSE Leap 15.4:busybox-testsuite-1.35.0-150400.3.3.1.aarch64",
"openSUSE Leap 15.4:busybox-testsuite-1.35.0-150400.3.3.1.ppc64le",
"openSUSE Leap 15.4:busybox-testsuite-1.35.0-150400.3.3.1.s390x",
"openSUSE Leap 15.4:busybox-testsuite-1.35.0-150400.3.3.1.x86_64",
"openSUSE Leap 15.4:busybox-warewulf3-1.35.0-150400.3.3.1.aarch64",
"openSUSE Leap 15.4:busybox-warewulf3-1.35.0-150400.3.3.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-42378",
"url": "https://www.suse.com/security/cve/CVE-2021-42378"
},
{
"category": "external",
"summary": "SUSE Bug 1192869 for CVE-2021-42378",
"url": "https://bugzilla.suse.com/1192869"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-1.35.0-150400.3.3.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-1.35.0-150400.3.3.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-1.35.0-150400.3.3.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-1.35.0-150400.3.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-static-1.35.0-150400.3.3.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-static-1.35.0-150400.3.3.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-static-1.35.0-150400.3.3.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-static-1.35.0-150400.3.3.1.x86_64",
"openSUSE Leap 15.4:busybox-1.35.0-150400.3.3.1.aarch64",
"openSUSE Leap 15.4:busybox-1.35.0-150400.3.3.1.ppc64le",
"openSUSE Leap 15.4:busybox-1.35.0-150400.3.3.1.s390x",
"openSUSE Leap 15.4:busybox-1.35.0-150400.3.3.1.x86_64",
"openSUSE Leap 15.4:busybox-static-1.35.0-150400.3.3.1.aarch64",
"openSUSE Leap 15.4:busybox-static-1.35.0-150400.3.3.1.ppc64le",
"openSUSE Leap 15.4:busybox-static-1.35.0-150400.3.3.1.s390x",
"openSUSE Leap 15.4:busybox-static-1.35.0-150400.3.3.1.x86_64",
"openSUSE Leap 15.4:busybox-testsuite-1.35.0-150400.3.3.1.aarch64",
"openSUSE Leap 15.4:busybox-testsuite-1.35.0-150400.3.3.1.ppc64le",
"openSUSE Leap 15.4:busybox-testsuite-1.35.0-150400.3.3.1.s390x",
"openSUSE Leap 15.4:busybox-testsuite-1.35.0-150400.3.3.1.x86_64",
"openSUSE Leap 15.4:busybox-warewulf3-1.35.0-150400.3.3.1.aarch64",
"openSUSE Leap 15.4:busybox-warewulf3-1.35.0-150400.3.3.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.6,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-1.35.0-150400.3.3.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-1.35.0-150400.3.3.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-1.35.0-150400.3.3.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-1.35.0-150400.3.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-static-1.35.0-150400.3.3.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-static-1.35.0-150400.3.3.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-static-1.35.0-150400.3.3.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-static-1.35.0-150400.3.3.1.x86_64",
"openSUSE Leap 15.4:busybox-1.35.0-150400.3.3.1.aarch64",
"openSUSE Leap 15.4:busybox-1.35.0-150400.3.3.1.ppc64le",
"openSUSE Leap 15.4:busybox-1.35.0-150400.3.3.1.s390x",
"openSUSE Leap 15.4:busybox-1.35.0-150400.3.3.1.x86_64",
"openSUSE Leap 15.4:busybox-static-1.35.0-150400.3.3.1.aarch64",
"openSUSE Leap 15.4:busybox-static-1.35.0-150400.3.3.1.ppc64le",
"openSUSE Leap 15.4:busybox-static-1.35.0-150400.3.3.1.s390x",
"openSUSE Leap 15.4:busybox-static-1.35.0-150400.3.3.1.x86_64",
"openSUSE Leap 15.4:busybox-testsuite-1.35.0-150400.3.3.1.aarch64",
"openSUSE Leap 15.4:busybox-testsuite-1.35.0-150400.3.3.1.ppc64le",
"openSUSE Leap 15.4:busybox-testsuite-1.35.0-150400.3.3.1.s390x",
"openSUSE Leap 15.4:busybox-testsuite-1.35.0-150400.3.3.1.x86_64",
"openSUSE Leap 15.4:busybox-warewulf3-1.35.0-150400.3.3.1.aarch64",
"openSUSE Leap 15.4:busybox-warewulf3-1.35.0-150400.3.3.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-11-11T14:38:22Z",
"details": "moderate"
}
],
"title": "CVE-2021-42378"
},
{
"cve": "CVE-2021-42379",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-42379"
}
],
"notes": [
{
"category": "general",
"text": "A use-after-free in Busybox\u0027s awk applet leads to denial of service and possibly code execution when processing a crafted awk pattern in the next_input_file function",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-1.35.0-150400.3.3.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-1.35.0-150400.3.3.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-1.35.0-150400.3.3.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-1.35.0-150400.3.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-static-1.35.0-150400.3.3.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-static-1.35.0-150400.3.3.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-static-1.35.0-150400.3.3.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-static-1.35.0-150400.3.3.1.x86_64",
"openSUSE Leap 15.4:busybox-1.35.0-150400.3.3.1.aarch64",
"openSUSE Leap 15.4:busybox-1.35.0-150400.3.3.1.ppc64le",
"openSUSE Leap 15.4:busybox-1.35.0-150400.3.3.1.s390x",
"openSUSE Leap 15.4:busybox-1.35.0-150400.3.3.1.x86_64",
"openSUSE Leap 15.4:busybox-static-1.35.0-150400.3.3.1.aarch64",
"openSUSE Leap 15.4:busybox-static-1.35.0-150400.3.3.1.ppc64le",
"openSUSE Leap 15.4:busybox-static-1.35.0-150400.3.3.1.s390x",
"openSUSE Leap 15.4:busybox-static-1.35.0-150400.3.3.1.x86_64",
"openSUSE Leap 15.4:busybox-testsuite-1.35.0-150400.3.3.1.aarch64",
"openSUSE Leap 15.4:busybox-testsuite-1.35.0-150400.3.3.1.ppc64le",
"openSUSE Leap 15.4:busybox-testsuite-1.35.0-150400.3.3.1.s390x",
"openSUSE Leap 15.4:busybox-testsuite-1.35.0-150400.3.3.1.x86_64",
"openSUSE Leap 15.4:busybox-warewulf3-1.35.0-150400.3.3.1.aarch64",
"openSUSE Leap 15.4:busybox-warewulf3-1.35.0-150400.3.3.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-42379",
"url": "https://www.suse.com/security/cve/CVE-2021-42379"
},
{
"category": "external",
"summary": "SUSE Bug 1192869 for CVE-2021-42379",
"url": "https://bugzilla.suse.com/1192869"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-1.35.0-150400.3.3.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-1.35.0-150400.3.3.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-1.35.0-150400.3.3.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-1.35.0-150400.3.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-static-1.35.0-150400.3.3.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-static-1.35.0-150400.3.3.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-static-1.35.0-150400.3.3.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-static-1.35.0-150400.3.3.1.x86_64",
"openSUSE Leap 15.4:busybox-1.35.0-150400.3.3.1.aarch64",
"openSUSE Leap 15.4:busybox-1.35.0-150400.3.3.1.ppc64le",
"openSUSE Leap 15.4:busybox-1.35.0-150400.3.3.1.s390x",
"openSUSE Leap 15.4:busybox-1.35.0-150400.3.3.1.x86_64",
"openSUSE Leap 15.4:busybox-static-1.35.0-150400.3.3.1.aarch64",
"openSUSE Leap 15.4:busybox-static-1.35.0-150400.3.3.1.ppc64le",
"openSUSE Leap 15.4:busybox-static-1.35.0-150400.3.3.1.s390x",
"openSUSE Leap 15.4:busybox-static-1.35.0-150400.3.3.1.x86_64",
"openSUSE Leap 15.4:busybox-testsuite-1.35.0-150400.3.3.1.aarch64",
"openSUSE Leap 15.4:busybox-testsuite-1.35.0-150400.3.3.1.ppc64le",
"openSUSE Leap 15.4:busybox-testsuite-1.35.0-150400.3.3.1.s390x",
"openSUSE Leap 15.4:busybox-testsuite-1.35.0-150400.3.3.1.x86_64",
"openSUSE Leap 15.4:busybox-warewulf3-1.35.0-150400.3.3.1.aarch64",
"openSUSE Leap 15.4:busybox-warewulf3-1.35.0-150400.3.3.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.6,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-1.35.0-150400.3.3.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-1.35.0-150400.3.3.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-1.35.0-150400.3.3.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-1.35.0-150400.3.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-static-1.35.0-150400.3.3.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-static-1.35.0-150400.3.3.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-static-1.35.0-150400.3.3.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-static-1.35.0-150400.3.3.1.x86_64",
"openSUSE Leap 15.4:busybox-1.35.0-150400.3.3.1.aarch64",
"openSUSE Leap 15.4:busybox-1.35.0-150400.3.3.1.ppc64le",
"openSUSE Leap 15.4:busybox-1.35.0-150400.3.3.1.s390x",
"openSUSE Leap 15.4:busybox-1.35.0-150400.3.3.1.x86_64",
"openSUSE Leap 15.4:busybox-static-1.35.0-150400.3.3.1.aarch64",
"openSUSE Leap 15.4:busybox-static-1.35.0-150400.3.3.1.ppc64le",
"openSUSE Leap 15.4:busybox-static-1.35.0-150400.3.3.1.s390x",
"openSUSE Leap 15.4:busybox-static-1.35.0-150400.3.3.1.x86_64",
"openSUSE Leap 15.4:busybox-testsuite-1.35.0-150400.3.3.1.aarch64",
"openSUSE Leap 15.4:busybox-testsuite-1.35.0-150400.3.3.1.ppc64le",
"openSUSE Leap 15.4:busybox-testsuite-1.35.0-150400.3.3.1.s390x",
"openSUSE Leap 15.4:busybox-testsuite-1.35.0-150400.3.3.1.x86_64",
"openSUSE Leap 15.4:busybox-warewulf3-1.35.0-150400.3.3.1.aarch64",
"openSUSE Leap 15.4:busybox-warewulf3-1.35.0-150400.3.3.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-11-11T14:38:22Z",
"details": "moderate"
}
],
"title": "CVE-2021-42379"
},
{
"cve": "CVE-2021-42380",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-42380"
}
],
"notes": [
{
"category": "general",
"text": "A use-after-free in Busybox\u0027s awk applet leads to denial of service and possibly code execution when processing a crafted awk pattern in the clrvar function",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-1.35.0-150400.3.3.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-1.35.0-150400.3.3.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-1.35.0-150400.3.3.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-1.35.0-150400.3.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-static-1.35.0-150400.3.3.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-static-1.35.0-150400.3.3.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-static-1.35.0-150400.3.3.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-static-1.35.0-150400.3.3.1.x86_64",
"openSUSE Leap 15.4:busybox-1.35.0-150400.3.3.1.aarch64",
"openSUSE Leap 15.4:busybox-1.35.0-150400.3.3.1.ppc64le",
"openSUSE Leap 15.4:busybox-1.35.0-150400.3.3.1.s390x",
"openSUSE Leap 15.4:busybox-1.35.0-150400.3.3.1.x86_64",
"openSUSE Leap 15.4:busybox-static-1.35.0-150400.3.3.1.aarch64",
"openSUSE Leap 15.4:busybox-static-1.35.0-150400.3.3.1.ppc64le",
"openSUSE Leap 15.4:busybox-static-1.35.0-150400.3.3.1.s390x",
"openSUSE Leap 15.4:busybox-static-1.35.0-150400.3.3.1.x86_64",
"openSUSE Leap 15.4:busybox-testsuite-1.35.0-150400.3.3.1.aarch64",
"openSUSE Leap 15.4:busybox-testsuite-1.35.0-150400.3.3.1.ppc64le",
"openSUSE Leap 15.4:busybox-testsuite-1.35.0-150400.3.3.1.s390x",
"openSUSE Leap 15.4:busybox-testsuite-1.35.0-150400.3.3.1.x86_64",
"openSUSE Leap 15.4:busybox-warewulf3-1.35.0-150400.3.3.1.aarch64",
"openSUSE Leap 15.4:busybox-warewulf3-1.35.0-150400.3.3.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-42380",
"url": "https://www.suse.com/security/cve/CVE-2021-42380"
},
{
"category": "external",
"summary": "SUSE Bug 1192869 for CVE-2021-42380",
"url": "https://bugzilla.suse.com/1192869"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-1.35.0-150400.3.3.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-1.35.0-150400.3.3.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-1.35.0-150400.3.3.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-1.35.0-150400.3.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-static-1.35.0-150400.3.3.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-static-1.35.0-150400.3.3.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-static-1.35.0-150400.3.3.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-static-1.35.0-150400.3.3.1.x86_64",
"openSUSE Leap 15.4:busybox-1.35.0-150400.3.3.1.aarch64",
"openSUSE Leap 15.4:busybox-1.35.0-150400.3.3.1.ppc64le",
"openSUSE Leap 15.4:busybox-1.35.0-150400.3.3.1.s390x",
"openSUSE Leap 15.4:busybox-1.35.0-150400.3.3.1.x86_64",
"openSUSE Leap 15.4:busybox-static-1.35.0-150400.3.3.1.aarch64",
"openSUSE Leap 15.4:busybox-static-1.35.0-150400.3.3.1.ppc64le",
"openSUSE Leap 15.4:busybox-static-1.35.0-150400.3.3.1.s390x",
"openSUSE Leap 15.4:busybox-static-1.35.0-150400.3.3.1.x86_64",
"openSUSE Leap 15.4:busybox-testsuite-1.35.0-150400.3.3.1.aarch64",
"openSUSE Leap 15.4:busybox-testsuite-1.35.0-150400.3.3.1.ppc64le",
"openSUSE Leap 15.4:busybox-testsuite-1.35.0-150400.3.3.1.s390x",
"openSUSE Leap 15.4:busybox-testsuite-1.35.0-150400.3.3.1.x86_64",
"openSUSE Leap 15.4:busybox-warewulf3-1.35.0-150400.3.3.1.aarch64",
"openSUSE Leap 15.4:busybox-warewulf3-1.35.0-150400.3.3.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.6,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-1.35.0-150400.3.3.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-1.35.0-150400.3.3.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-1.35.0-150400.3.3.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-1.35.0-150400.3.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-static-1.35.0-150400.3.3.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-static-1.35.0-150400.3.3.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-static-1.35.0-150400.3.3.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-static-1.35.0-150400.3.3.1.x86_64",
"openSUSE Leap 15.4:busybox-1.35.0-150400.3.3.1.aarch64",
"openSUSE Leap 15.4:busybox-1.35.0-150400.3.3.1.ppc64le",
"openSUSE Leap 15.4:busybox-1.35.0-150400.3.3.1.s390x",
"openSUSE Leap 15.4:busybox-1.35.0-150400.3.3.1.x86_64",
"openSUSE Leap 15.4:busybox-static-1.35.0-150400.3.3.1.aarch64",
"openSUSE Leap 15.4:busybox-static-1.35.0-150400.3.3.1.ppc64le",
"openSUSE Leap 15.4:busybox-static-1.35.0-150400.3.3.1.s390x",
"openSUSE Leap 15.4:busybox-static-1.35.0-150400.3.3.1.x86_64",
"openSUSE Leap 15.4:busybox-testsuite-1.35.0-150400.3.3.1.aarch64",
"openSUSE Leap 15.4:busybox-testsuite-1.35.0-150400.3.3.1.ppc64le",
"openSUSE Leap 15.4:busybox-testsuite-1.35.0-150400.3.3.1.s390x",
"openSUSE Leap 15.4:busybox-testsuite-1.35.0-150400.3.3.1.x86_64",
"openSUSE Leap 15.4:busybox-warewulf3-1.35.0-150400.3.3.1.aarch64",
"openSUSE Leap 15.4:busybox-warewulf3-1.35.0-150400.3.3.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-11-11T14:38:22Z",
"details": "moderate"
}
],
"title": "CVE-2021-42380"
},
{
"cve": "CVE-2021-42381",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-42381"
}
],
"notes": [
{
"category": "general",
"text": "A use-after-free in Busybox\u0027s awk applet leads to denial of service and possibly code execution when processing a crafted awk pattern in the hash_init function",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-1.35.0-150400.3.3.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-1.35.0-150400.3.3.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-1.35.0-150400.3.3.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-1.35.0-150400.3.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-static-1.35.0-150400.3.3.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-static-1.35.0-150400.3.3.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-static-1.35.0-150400.3.3.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-static-1.35.0-150400.3.3.1.x86_64",
"openSUSE Leap 15.4:busybox-1.35.0-150400.3.3.1.aarch64",
"openSUSE Leap 15.4:busybox-1.35.0-150400.3.3.1.ppc64le",
"openSUSE Leap 15.4:busybox-1.35.0-150400.3.3.1.s390x",
"openSUSE Leap 15.4:busybox-1.35.0-150400.3.3.1.x86_64",
"openSUSE Leap 15.4:busybox-static-1.35.0-150400.3.3.1.aarch64",
"openSUSE Leap 15.4:busybox-static-1.35.0-150400.3.3.1.ppc64le",
"openSUSE Leap 15.4:busybox-static-1.35.0-150400.3.3.1.s390x",
"openSUSE Leap 15.4:busybox-static-1.35.0-150400.3.3.1.x86_64",
"openSUSE Leap 15.4:busybox-testsuite-1.35.0-150400.3.3.1.aarch64",
"openSUSE Leap 15.4:busybox-testsuite-1.35.0-150400.3.3.1.ppc64le",
"openSUSE Leap 15.4:busybox-testsuite-1.35.0-150400.3.3.1.s390x",
"openSUSE Leap 15.4:busybox-testsuite-1.35.0-150400.3.3.1.x86_64",
"openSUSE Leap 15.4:busybox-warewulf3-1.35.0-150400.3.3.1.aarch64",
"openSUSE Leap 15.4:busybox-warewulf3-1.35.0-150400.3.3.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-42381",
"url": "https://www.suse.com/security/cve/CVE-2021-42381"
},
{
"category": "external",
"summary": "SUSE Bug 1192869 for CVE-2021-42381",
"url": "https://bugzilla.suse.com/1192869"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-1.35.0-150400.3.3.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-1.35.0-150400.3.3.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-1.35.0-150400.3.3.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-1.35.0-150400.3.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-static-1.35.0-150400.3.3.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-static-1.35.0-150400.3.3.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-static-1.35.0-150400.3.3.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-static-1.35.0-150400.3.3.1.x86_64",
"openSUSE Leap 15.4:busybox-1.35.0-150400.3.3.1.aarch64",
"openSUSE Leap 15.4:busybox-1.35.0-150400.3.3.1.ppc64le",
"openSUSE Leap 15.4:busybox-1.35.0-150400.3.3.1.s390x",
"openSUSE Leap 15.4:busybox-1.35.0-150400.3.3.1.x86_64",
"openSUSE Leap 15.4:busybox-static-1.35.0-150400.3.3.1.aarch64",
"openSUSE Leap 15.4:busybox-static-1.35.0-150400.3.3.1.ppc64le",
"openSUSE Leap 15.4:busybox-static-1.35.0-150400.3.3.1.s390x",
"openSUSE Leap 15.4:busybox-static-1.35.0-150400.3.3.1.x86_64",
"openSUSE Leap 15.4:busybox-testsuite-1.35.0-150400.3.3.1.aarch64",
"openSUSE Leap 15.4:busybox-testsuite-1.35.0-150400.3.3.1.ppc64le",
"openSUSE Leap 15.4:busybox-testsuite-1.35.0-150400.3.3.1.s390x",
"openSUSE Leap 15.4:busybox-testsuite-1.35.0-150400.3.3.1.x86_64",
"openSUSE Leap 15.4:busybox-warewulf3-1.35.0-150400.3.3.1.aarch64",
"openSUSE Leap 15.4:busybox-warewulf3-1.35.0-150400.3.3.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.6,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-1.35.0-150400.3.3.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-1.35.0-150400.3.3.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-1.35.0-150400.3.3.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-1.35.0-150400.3.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-static-1.35.0-150400.3.3.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-static-1.35.0-150400.3.3.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-static-1.35.0-150400.3.3.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-static-1.35.0-150400.3.3.1.x86_64",
"openSUSE Leap 15.4:busybox-1.35.0-150400.3.3.1.aarch64",
"openSUSE Leap 15.4:busybox-1.35.0-150400.3.3.1.ppc64le",
"openSUSE Leap 15.4:busybox-1.35.0-150400.3.3.1.s390x",
"openSUSE Leap 15.4:busybox-1.35.0-150400.3.3.1.x86_64",
"openSUSE Leap 15.4:busybox-static-1.35.0-150400.3.3.1.aarch64",
"openSUSE Leap 15.4:busybox-static-1.35.0-150400.3.3.1.ppc64le",
"openSUSE Leap 15.4:busybox-static-1.35.0-150400.3.3.1.s390x",
"openSUSE Leap 15.4:busybox-static-1.35.0-150400.3.3.1.x86_64",
"openSUSE Leap 15.4:busybox-testsuite-1.35.0-150400.3.3.1.aarch64",
"openSUSE Leap 15.4:busybox-testsuite-1.35.0-150400.3.3.1.ppc64le",
"openSUSE Leap 15.4:busybox-testsuite-1.35.0-150400.3.3.1.s390x",
"openSUSE Leap 15.4:busybox-testsuite-1.35.0-150400.3.3.1.x86_64",
"openSUSE Leap 15.4:busybox-warewulf3-1.35.0-150400.3.3.1.aarch64",
"openSUSE Leap 15.4:busybox-warewulf3-1.35.0-150400.3.3.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-11-11T14:38:22Z",
"details": "moderate"
}
],
"title": "CVE-2021-42381"
},
{
"cve": "CVE-2021-42382",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-42382"
}
],
"notes": [
{
"category": "general",
"text": "A use-after-free in Busybox\u0027s awk applet leads to denial of service and possibly code execution when processing a crafted awk pattern in the getvar_s function",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-1.35.0-150400.3.3.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-1.35.0-150400.3.3.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-1.35.0-150400.3.3.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-1.35.0-150400.3.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-static-1.35.0-150400.3.3.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-static-1.35.0-150400.3.3.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-static-1.35.0-150400.3.3.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-static-1.35.0-150400.3.3.1.x86_64",
"openSUSE Leap 15.4:busybox-1.35.0-150400.3.3.1.aarch64",
"openSUSE Leap 15.4:busybox-1.35.0-150400.3.3.1.ppc64le",
"openSUSE Leap 15.4:busybox-1.35.0-150400.3.3.1.s390x",
"openSUSE Leap 15.4:busybox-1.35.0-150400.3.3.1.x86_64",
"openSUSE Leap 15.4:busybox-static-1.35.0-150400.3.3.1.aarch64",
"openSUSE Leap 15.4:busybox-static-1.35.0-150400.3.3.1.ppc64le",
"openSUSE Leap 15.4:busybox-static-1.35.0-150400.3.3.1.s390x",
"openSUSE Leap 15.4:busybox-static-1.35.0-150400.3.3.1.x86_64",
"openSUSE Leap 15.4:busybox-testsuite-1.35.0-150400.3.3.1.aarch64",
"openSUSE Leap 15.4:busybox-testsuite-1.35.0-150400.3.3.1.ppc64le",
"openSUSE Leap 15.4:busybox-testsuite-1.35.0-150400.3.3.1.s390x",
"openSUSE Leap 15.4:busybox-testsuite-1.35.0-150400.3.3.1.x86_64",
"openSUSE Leap 15.4:busybox-warewulf3-1.35.0-150400.3.3.1.aarch64",
"openSUSE Leap 15.4:busybox-warewulf3-1.35.0-150400.3.3.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-42382",
"url": "https://www.suse.com/security/cve/CVE-2021-42382"
},
{
"category": "external",
"summary": "SUSE Bug 1192869 for CVE-2021-42382",
"url": "https://bugzilla.suse.com/1192869"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-1.35.0-150400.3.3.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-1.35.0-150400.3.3.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-1.35.0-150400.3.3.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-1.35.0-150400.3.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-static-1.35.0-150400.3.3.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-static-1.35.0-150400.3.3.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-static-1.35.0-150400.3.3.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-static-1.35.0-150400.3.3.1.x86_64",
"openSUSE Leap 15.4:busybox-1.35.0-150400.3.3.1.aarch64",
"openSUSE Leap 15.4:busybox-1.35.0-150400.3.3.1.ppc64le",
"openSUSE Leap 15.4:busybox-1.35.0-150400.3.3.1.s390x",
"openSUSE Leap 15.4:busybox-1.35.0-150400.3.3.1.x86_64",
"openSUSE Leap 15.4:busybox-static-1.35.0-150400.3.3.1.aarch64",
"openSUSE Leap 15.4:busybox-static-1.35.0-150400.3.3.1.ppc64le",
"openSUSE Leap 15.4:busybox-static-1.35.0-150400.3.3.1.s390x",
"openSUSE Leap 15.4:busybox-static-1.35.0-150400.3.3.1.x86_64",
"openSUSE Leap 15.4:busybox-testsuite-1.35.0-150400.3.3.1.aarch64",
"openSUSE Leap 15.4:busybox-testsuite-1.35.0-150400.3.3.1.ppc64le",
"openSUSE Leap 15.4:busybox-testsuite-1.35.0-150400.3.3.1.s390x",
"openSUSE Leap 15.4:busybox-testsuite-1.35.0-150400.3.3.1.x86_64",
"openSUSE Leap 15.4:busybox-warewulf3-1.35.0-150400.3.3.1.aarch64",
"openSUSE Leap 15.4:busybox-warewulf3-1.35.0-150400.3.3.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.6,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-1.35.0-150400.3.3.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-1.35.0-150400.3.3.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-1.35.0-150400.3.3.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-1.35.0-150400.3.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-static-1.35.0-150400.3.3.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-static-1.35.0-150400.3.3.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-static-1.35.0-150400.3.3.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-static-1.35.0-150400.3.3.1.x86_64",
"openSUSE Leap 15.4:busybox-1.35.0-150400.3.3.1.aarch64",
"openSUSE Leap 15.4:busybox-1.35.0-150400.3.3.1.ppc64le",
"openSUSE Leap 15.4:busybox-1.35.0-150400.3.3.1.s390x",
"openSUSE Leap 15.4:busybox-1.35.0-150400.3.3.1.x86_64",
"openSUSE Leap 15.4:busybox-static-1.35.0-150400.3.3.1.aarch64",
"openSUSE Leap 15.4:busybox-static-1.35.0-150400.3.3.1.ppc64le",
"openSUSE Leap 15.4:busybox-static-1.35.0-150400.3.3.1.s390x",
"openSUSE Leap 15.4:busybox-static-1.35.0-150400.3.3.1.x86_64",
"openSUSE Leap 15.4:busybox-testsuite-1.35.0-150400.3.3.1.aarch64",
"openSUSE Leap 15.4:busybox-testsuite-1.35.0-150400.3.3.1.ppc64le",
"openSUSE Leap 15.4:busybox-testsuite-1.35.0-150400.3.3.1.s390x",
"openSUSE Leap 15.4:busybox-testsuite-1.35.0-150400.3.3.1.x86_64",
"openSUSE Leap 15.4:busybox-warewulf3-1.35.0-150400.3.3.1.aarch64",
"openSUSE Leap 15.4:busybox-warewulf3-1.35.0-150400.3.3.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-11-11T14:38:22Z",
"details": "moderate"
}
],
"title": "CVE-2021-42382"
},
{
"cve": "CVE-2021-42383",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-42383"
}
],
"notes": [
{
"category": "general",
"text": "A use-after-free in Busybox\u0027s awk applet leads to denial of service and possibly code execution when processing a crafted awk pattern in the evaluate function",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-1.35.0-150400.3.3.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-1.35.0-150400.3.3.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-1.35.0-150400.3.3.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-1.35.0-150400.3.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-static-1.35.0-150400.3.3.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-static-1.35.0-150400.3.3.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-static-1.35.0-150400.3.3.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-static-1.35.0-150400.3.3.1.x86_64",
"openSUSE Leap 15.4:busybox-1.35.0-150400.3.3.1.aarch64",
"openSUSE Leap 15.4:busybox-1.35.0-150400.3.3.1.ppc64le",
"openSUSE Leap 15.4:busybox-1.35.0-150400.3.3.1.s390x",
"openSUSE Leap 15.4:busybox-1.35.0-150400.3.3.1.x86_64",
"openSUSE Leap 15.4:busybox-static-1.35.0-150400.3.3.1.aarch64",
"openSUSE Leap 15.4:busybox-static-1.35.0-150400.3.3.1.ppc64le",
"openSUSE Leap 15.4:busybox-static-1.35.0-150400.3.3.1.s390x",
"openSUSE Leap 15.4:busybox-static-1.35.0-150400.3.3.1.x86_64",
"openSUSE Leap 15.4:busybox-testsuite-1.35.0-150400.3.3.1.aarch64",
"openSUSE Leap 15.4:busybox-testsuite-1.35.0-150400.3.3.1.ppc64le",
"openSUSE Leap 15.4:busybox-testsuite-1.35.0-150400.3.3.1.s390x",
"openSUSE Leap 15.4:busybox-testsuite-1.35.0-150400.3.3.1.x86_64",
"openSUSE Leap 15.4:busybox-warewulf3-1.35.0-150400.3.3.1.aarch64",
"openSUSE Leap 15.4:busybox-warewulf3-1.35.0-150400.3.3.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-42383",
"url": "https://www.suse.com/security/cve/CVE-2021-42383"
},
{
"category": "external",
"summary": "SUSE Bug 1192869 for CVE-2021-42383",
"url": "https://bugzilla.suse.com/1192869"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-1.35.0-150400.3.3.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-1.35.0-150400.3.3.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-1.35.0-150400.3.3.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-1.35.0-150400.3.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-static-1.35.0-150400.3.3.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-static-1.35.0-150400.3.3.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-static-1.35.0-150400.3.3.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-static-1.35.0-150400.3.3.1.x86_64",
"openSUSE Leap 15.4:busybox-1.35.0-150400.3.3.1.aarch64",
"openSUSE Leap 15.4:busybox-1.35.0-150400.3.3.1.ppc64le",
"openSUSE Leap 15.4:busybox-1.35.0-150400.3.3.1.s390x",
"openSUSE Leap 15.4:busybox-1.35.0-150400.3.3.1.x86_64",
"openSUSE Leap 15.4:busybox-static-1.35.0-150400.3.3.1.aarch64",
"openSUSE Leap 15.4:busybox-static-1.35.0-150400.3.3.1.ppc64le",
"openSUSE Leap 15.4:busybox-static-1.35.0-150400.3.3.1.s390x",
"openSUSE Leap 15.4:busybox-static-1.35.0-150400.3.3.1.x86_64",
"openSUSE Leap 15.4:busybox-testsuite-1.35.0-150400.3.3.1.aarch64",
"openSUSE Leap 15.4:busybox-testsuite-1.35.0-150400.3.3.1.ppc64le",
"openSUSE Leap 15.4:busybox-testsuite-1.35.0-150400.3.3.1.s390x",
"openSUSE Leap 15.4:busybox-testsuite-1.35.0-150400.3.3.1.x86_64",
"openSUSE Leap 15.4:busybox-warewulf3-1.35.0-150400.3.3.1.aarch64",
"openSUSE Leap 15.4:busybox-warewulf3-1.35.0-150400.3.3.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.6,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-1.35.0-150400.3.3.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-1.35.0-150400.3.3.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-1.35.0-150400.3.3.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-1.35.0-150400.3.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-static-1.35.0-150400.3.3.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-static-1.35.0-150400.3.3.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-static-1.35.0-150400.3.3.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-static-1.35.0-150400.3.3.1.x86_64",
"openSUSE Leap 15.4:busybox-1.35.0-150400.3.3.1.aarch64",
"openSUSE Leap 15.4:busybox-1.35.0-150400.3.3.1.ppc64le",
"openSUSE Leap 15.4:busybox-1.35.0-150400.3.3.1.s390x",
"openSUSE Leap 15.4:busybox-1.35.0-150400.3.3.1.x86_64",
"openSUSE Leap 15.4:busybox-static-1.35.0-150400.3.3.1.aarch64",
"openSUSE Leap 15.4:busybox-static-1.35.0-150400.3.3.1.ppc64le",
"openSUSE Leap 15.4:busybox-static-1.35.0-150400.3.3.1.s390x",
"openSUSE Leap 15.4:busybox-static-1.35.0-150400.3.3.1.x86_64",
"openSUSE Leap 15.4:busybox-testsuite-1.35.0-150400.3.3.1.aarch64",
"openSUSE Leap 15.4:busybox-testsuite-1.35.0-150400.3.3.1.ppc64le",
"openSUSE Leap 15.4:busybox-testsuite-1.35.0-150400.3.3.1.s390x",
"openSUSE Leap 15.4:busybox-testsuite-1.35.0-150400.3.3.1.x86_64",
"openSUSE Leap 15.4:busybox-warewulf3-1.35.0-150400.3.3.1.aarch64",
"openSUSE Leap 15.4:busybox-warewulf3-1.35.0-150400.3.3.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-11-11T14:38:22Z",
"details": "moderate"
}
],
"title": "CVE-2021-42383"
},
{
"cve": "CVE-2021-42384",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-42384"
}
],
"notes": [
{
"category": "general",
"text": "A use-after-free in Busybox\u0027s awk applet leads to denial of service and possibly code execution when processing a crafted awk pattern in the handle_special function",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-1.35.0-150400.3.3.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-1.35.0-150400.3.3.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-1.35.0-150400.3.3.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-1.35.0-150400.3.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-static-1.35.0-150400.3.3.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-static-1.35.0-150400.3.3.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-static-1.35.0-150400.3.3.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-static-1.35.0-150400.3.3.1.x86_64",
"openSUSE Leap 15.4:busybox-1.35.0-150400.3.3.1.aarch64",
"openSUSE Leap 15.4:busybox-1.35.0-150400.3.3.1.ppc64le",
"openSUSE Leap 15.4:busybox-1.35.0-150400.3.3.1.s390x",
"openSUSE Leap 15.4:busybox-1.35.0-150400.3.3.1.x86_64",
"openSUSE Leap 15.4:busybox-static-1.35.0-150400.3.3.1.aarch64",
"openSUSE Leap 15.4:busybox-static-1.35.0-150400.3.3.1.ppc64le",
"openSUSE Leap 15.4:busybox-static-1.35.0-150400.3.3.1.s390x",
"openSUSE Leap 15.4:busybox-static-1.35.0-150400.3.3.1.x86_64",
"openSUSE Leap 15.4:busybox-testsuite-1.35.0-150400.3.3.1.aarch64",
"openSUSE Leap 15.4:busybox-testsuite-1.35.0-150400.3.3.1.ppc64le",
"openSUSE Leap 15.4:busybox-testsuite-1.35.0-150400.3.3.1.s390x",
"openSUSE Leap 15.4:busybox-testsuite-1.35.0-150400.3.3.1.x86_64",
"openSUSE Leap 15.4:busybox-warewulf3-1.35.0-150400.3.3.1.aarch64",
"openSUSE Leap 15.4:busybox-warewulf3-1.35.0-150400.3.3.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-42384",
"url": "https://www.suse.com/security/cve/CVE-2021-42384"
},
{
"category": "external",
"summary": "SUSE Bug 1192869 for CVE-2021-42384",
"url": "https://bugzilla.suse.com/1192869"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-1.35.0-150400.3.3.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-1.35.0-150400.3.3.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-1.35.0-150400.3.3.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-1.35.0-150400.3.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-static-1.35.0-150400.3.3.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-static-1.35.0-150400.3.3.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-static-1.35.0-150400.3.3.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-static-1.35.0-150400.3.3.1.x86_64",
"openSUSE Leap 15.4:busybox-1.35.0-150400.3.3.1.aarch64",
"openSUSE Leap 15.4:busybox-1.35.0-150400.3.3.1.ppc64le",
"openSUSE Leap 15.4:busybox-1.35.0-150400.3.3.1.s390x",
"openSUSE Leap 15.4:busybox-1.35.0-150400.3.3.1.x86_64",
"openSUSE Leap 15.4:busybox-static-1.35.0-150400.3.3.1.aarch64",
"openSUSE Leap 15.4:busybox-static-1.35.0-150400.3.3.1.ppc64le",
"openSUSE Leap 15.4:busybox-static-1.35.0-150400.3.3.1.s390x",
"openSUSE Leap 15.4:busybox-static-1.35.0-150400.3.3.1.x86_64",
"openSUSE Leap 15.4:busybox-testsuite-1.35.0-150400.3.3.1.aarch64",
"openSUSE Leap 15.4:busybox-testsuite-1.35.0-150400.3.3.1.ppc64le",
"openSUSE Leap 15.4:busybox-testsuite-1.35.0-150400.3.3.1.s390x",
"openSUSE Leap 15.4:busybox-testsuite-1.35.0-150400.3.3.1.x86_64",
"openSUSE Leap 15.4:busybox-warewulf3-1.35.0-150400.3.3.1.aarch64",
"openSUSE Leap 15.4:busybox-warewulf3-1.35.0-150400.3.3.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.6,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-1.35.0-150400.3.3.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-1.35.0-150400.3.3.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-1.35.0-150400.3.3.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-1.35.0-150400.3.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-static-1.35.0-150400.3.3.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-static-1.35.0-150400.3.3.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-static-1.35.0-150400.3.3.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-static-1.35.0-150400.3.3.1.x86_64",
"openSUSE Leap 15.4:busybox-1.35.0-150400.3.3.1.aarch64",
"openSUSE Leap 15.4:busybox-1.35.0-150400.3.3.1.ppc64le",
"openSUSE Leap 15.4:busybox-1.35.0-150400.3.3.1.s390x",
"openSUSE Leap 15.4:busybox-1.35.0-150400.3.3.1.x86_64",
"openSUSE Leap 15.4:busybox-static-1.35.0-150400.3.3.1.aarch64",
"openSUSE Leap 15.4:busybox-static-1.35.0-150400.3.3.1.ppc64le",
"openSUSE Leap 15.4:busybox-static-1.35.0-150400.3.3.1.s390x",
"openSUSE Leap 15.4:busybox-static-1.35.0-150400.3.3.1.x86_64",
"openSUSE Leap 15.4:busybox-testsuite-1.35.0-150400.3.3.1.aarch64",
"openSUSE Leap 15.4:busybox-testsuite-1.35.0-150400.3.3.1.ppc64le",
"openSUSE Leap 15.4:busybox-testsuite-1.35.0-150400.3.3.1.s390x",
"openSUSE Leap 15.4:busybox-testsuite-1.35.0-150400.3.3.1.x86_64",
"openSUSE Leap 15.4:busybox-warewulf3-1.35.0-150400.3.3.1.aarch64",
"openSUSE Leap 15.4:busybox-warewulf3-1.35.0-150400.3.3.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-11-11T14:38:22Z",
"details": "moderate"
}
],
"title": "CVE-2021-42384"
},
{
"cve": "CVE-2021-42385",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-42385"
}
],
"notes": [
{
"category": "general",
"text": "A use-after-free in Busybox\u0027s awk applet leads to denial of service and possibly code execution when processing a crafted awk pattern in the evaluate function",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-1.35.0-150400.3.3.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-1.35.0-150400.3.3.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-1.35.0-150400.3.3.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-1.35.0-150400.3.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-static-1.35.0-150400.3.3.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-static-1.35.0-150400.3.3.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-static-1.35.0-150400.3.3.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-static-1.35.0-150400.3.3.1.x86_64",
"openSUSE Leap 15.4:busybox-1.35.0-150400.3.3.1.aarch64",
"openSUSE Leap 15.4:busybox-1.35.0-150400.3.3.1.ppc64le",
"openSUSE Leap 15.4:busybox-1.35.0-150400.3.3.1.s390x",
"openSUSE Leap 15.4:busybox-1.35.0-150400.3.3.1.x86_64",
"openSUSE Leap 15.4:busybox-static-1.35.0-150400.3.3.1.aarch64",
"openSUSE Leap 15.4:busybox-static-1.35.0-150400.3.3.1.ppc64le",
"openSUSE Leap 15.4:busybox-static-1.35.0-150400.3.3.1.s390x",
"openSUSE Leap 15.4:busybox-static-1.35.0-150400.3.3.1.x86_64",
"openSUSE Leap 15.4:busybox-testsuite-1.35.0-150400.3.3.1.aarch64",
"openSUSE Leap 15.4:busybox-testsuite-1.35.0-150400.3.3.1.ppc64le",
"openSUSE Leap 15.4:busybox-testsuite-1.35.0-150400.3.3.1.s390x",
"openSUSE Leap 15.4:busybox-testsuite-1.35.0-150400.3.3.1.x86_64",
"openSUSE Leap 15.4:busybox-warewulf3-1.35.0-150400.3.3.1.aarch64",
"openSUSE Leap 15.4:busybox-warewulf3-1.35.0-150400.3.3.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-42385",
"url": "https://www.suse.com/security/cve/CVE-2021-42385"
},
{
"category": "external",
"summary": "SUSE Bug 1192869 for CVE-2021-42385",
"url": "https://bugzilla.suse.com/1192869"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-1.35.0-150400.3.3.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-1.35.0-150400.3.3.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-1.35.0-150400.3.3.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-1.35.0-150400.3.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-static-1.35.0-150400.3.3.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-static-1.35.0-150400.3.3.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-static-1.35.0-150400.3.3.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-static-1.35.0-150400.3.3.1.x86_64",
"openSUSE Leap 15.4:busybox-1.35.0-150400.3.3.1.aarch64",
"openSUSE Leap 15.4:busybox-1.35.0-150400.3.3.1.ppc64le",
"openSUSE Leap 15.4:busybox-1.35.0-150400.3.3.1.s390x",
"openSUSE Leap 15.4:busybox-1.35.0-150400.3.3.1.x86_64",
"openSUSE Leap 15.4:busybox-static-1.35.0-150400.3.3.1.aarch64",
"openSUSE Leap 15.4:busybox-static-1.35.0-150400.3.3.1.ppc64le",
"openSUSE Leap 15.4:busybox-static-1.35.0-150400.3.3.1.s390x",
"openSUSE Leap 15.4:busybox-static-1.35.0-150400.3.3.1.x86_64",
"openSUSE Leap 15.4:busybox-testsuite-1.35.0-150400.3.3.1.aarch64",
"openSUSE Leap 15.4:busybox-testsuite-1.35.0-150400.3.3.1.ppc64le",
"openSUSE Leap 15.4:busybox-testsuite-1.35.0-150400.3.3.1.s390x",
"openSUSE Leap 15.4:busybox-testsuite-1.35.0-150400.3.3.1.x86_64",
"openSUSE Leap 15.4:busybox-warewulf3-1.35.0-150400.3.3.1.aarch64",
"openSUSE Leap 15.4:busybox-warewulf3-1.35.0-150400.3.3.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.6,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-1.35.0-150400.3.3.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-1.35.0-150400.3.3.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-1.35.0-150400.3.3.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-1.35.0-150400.3.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-static-1.35.0-150400.3.3.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-static-1.35.0-150400.3.3.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-static-1.35.0-150400.3.3.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-static-1.35.0-150400.3.3.1.x86_64",
"openSUSE Leap 15.4:busybox-1.35.0-150400.3.3.1.aarch64",
"openSUSE Leap 15.4:busybox-1.35.0-150400.3.3.1.ppc64le",
"openSUSE Leap 15.4:busybox-1.35.0-150400.3.3.1.s390x",
"openSUSE Leap 15.4:busybox-1.35.0-150400.3.3.1.x86_64",
"openSUSE Leap 15.4:busybox-static-1.35.0-150400.3.3.1.aarch64",
"openSUSE Leap 15.4:busybox-static-1.35.0-150400.3.3.1.ppc64le",
"openSUSE Leap 15.4:busybox-static-1.35.0-150400.3.3.1.s390x",
"openSUSE Leap 15.4:busybox-static-1.35.0-150400.3.3.1.x86_64",
"openSUSE Leap 15.4:busybox-testsuite-1.35.0-150400.3.3.1.aarch64",
"openSUSE Leap 15.4:busybox-testsuite-1.35.0-150400.3.3.1.ppc64le",
"openSUSE Leap 15.4:busybox-testsuite-1.35.0-150400.3.3.1.s390x",
"openSUSE Leap 15.4:busybox-testsuite-1.35.0-150400.3.3.1.x86_64",
"openSUSE Leap 15.4:busybox-warewulf3-1.35.0-150400.3.3.1.aarch64",
"openSUSE Leap 15.4:busybox-warewulf3-1.35.0-150400.3.3.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-11-11T14:38:22Z",
"details": "moderate"
}
],
"title": "CVE-2021-42385"
},
{
"cve": "CVE-2021-42386",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-42386"
}
],
"notes": [
{
"category": "general",
"text": "A use-after-free in Busybox\u0027s awk applet leads to denial of service and possibly code execution when processing a crafted awk pattern in the nvalloc function",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-1.35.0-150400.3.3.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-1.35.0-150400.3.3.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-1.35.0-150400.3.3.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-1.35.0-150400.3.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-static-1.35.0-150400.3.3.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-static-1.35.0-150400.3.3.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-static-1.35.0-150400.3.3.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-static-1.35.0-150400.3.3.1.x86_64",
"openSUSE Leap 15.4:busybox-1.35.0-150400.3.3.1.aarch64",
"openSUSE Leap 15.4:busybox-1.35.0-150400.3.3.1.ppc64le",
"openSUSE Leap 15.4:busybox-1.35.0-150400.3.3.1.s390x",
"openSUSE Leap 15.4:busybox-1.35.0-150400.3.3.1.x86_64",
"openSUSE Leap 15.4:busybox-static-1.35.0-150400.3.3.1.aarch64",
"openSUSE Leap 15.4:busybox-static-1.35.0-150400.3.3.1.ppc64le",
"openSUSE Leap 15.4:busybox-static-1.35.0-150400.3.3.1.s390x",
"openSUSE Leap 15.4:busybox-static-1.35.0-150400.3.3.1.x86_64",
"openSUSE Leap 15.4:busybox-testsuite-1.35.0-150400.3.3.1.aarch64",
"openSUSE Leap 15.4:busybox-testsuite-1.35.0-150400.3.3.1.ppc64le",
"openSUSE Leap 15.4:busybox-testsuite-1.35.0-150400.3.3.1.s390x",
"openSUSE Leap 15.4:busybox-testsuite-1.35.0-150400.3.3.1.x86_64",
"openSUSE Leap 15.4:busybox-warewulf3-1.35.0-150400.3.3.1.aarch64",
"openSUSE Leap 15.4:busybox-warewulf3-1.35.0-150400.3.3.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-42386",
"url": "https://www.suse.com/security/cve/CVE-2021-42386"
},
{
"category": "external",
"summary": "SUSE Bug 1192869 for CVE-2021-42386",
"url": "https://bugzilla.suse.com/1192869"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-1.35.0-150400.3.3.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-1.35.0-150400.3.3.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-1.35.0-150400.3.3.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-1.35.0-150400.3.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-static-1.35.0-150400.3.3.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-static-1.35.0-150400.3.3.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-static-1.35.0-150400.3.3.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-static-1.35.0-150400.3.3.1.x86_64",
"openSUSE Leap 15.4:busybox-1.35.0-150400.3.3.1.aarch64",
"openSUSE Leap 15.4:busybox-1.35.0-150400.3.3.1.ppc64le",
"openSUSE Leap 15.4:busybox-1.35.0-150400.3.3.1.s390x",
"openSUSE Leap 15.4:busybox-1.35.0-150400.3.3.1.x86_64",
"openSUSE Leap 15.4:busybox-static-1.35.0-150400.3.3.1.aarch64",
"openSUSE Leap 15.4:busybox-static-1.35.0-150400.3.3.1.ppc64le",
"openSUSE Leap 15.4:busybox-static-1.35.0-150400.3.3.1.s390x",
"openSUSE Leap 15.4:busybox-static-1.35.0-150400.3.3.1.x86_64",
"openSUSE Leap 15.4:busybox-testsuite-1.35.0-150400.3.3.1.aarch64",
"openSUSE Leap 15.4:busybox-testsuite-1.35.0-150400.3.3.1.ppc64le",
"openSUSE Leap 15.4:busybox-testsuite-1.35.0-150400.3.3.1.s390x",
"openSUSE Leap 15.4:busybox-testsuite-1.35.0-150400.3.3.1.x86_64",
"openSUSE Leap 15.4:busybox-warewulf3-1.35.0-150400.3.3.1.aarch64",
"openSUSE Leap 15.4:busybox-warewulf3-1.35.0-150400.3.3.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.6,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-1.35.0-150400.3.3.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-1.35.0-150400.3.3.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-1.35.0-150400.3.3.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-1.35.0-150400.3.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-static-1.35.0-150400.3.3.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-static-1.35.0-150400.3.3.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-static-1.35.0-150400.3.3.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-static-1.35.0-150400.3.3.1.x86_64",
"openSUSE Leap 15.4:busybox-1.35.0-150400.3.3.1.aarch64",
"openSUSE Leap 15.4:busybox-1.35.0-150400.3.3.1.ppc64le",
"openSUSE Leap 15.4:busybox-1.35.0-150400.3.3.1.s390x",
"openSUSE Leap 15.4:busybox-1.35.0-150400.3.3.1.x86_64",
"openSUSE Leap 15.4:busybox-static-1.35.0-150400.3.3.1.aarch64",
"openSUSE Leap 15.4:busybox-static-1.35.0-150400.3.3.1.ppc64le",
"openSUSE Leap 15.4:busybox-static-1.35.0-150400.3.3.1.s390x",
"openSUSE Leap 15.4:busybox-static-1.35.0-150400.3.3.1.x86_64",
"openSUSE Leap 15.4:busybox-testsuite-1.35.0-150400.3.3.1.aarch64",
"openSUSE Leap 15.4:busybox-testsuite-1.35.0-150400.3.3.1.ppc64le",
"openSUSE Leap 15.4:busybox-testsuite-1.35.0-150400.3.3.1.s390x",
"openSUSE Leap 15.4:busybox-testsuite-1.35.0-150400.3.3.1.x86_64",
"openSUSE Leap 15.4:busybox-warewulf3-1.35.0-150400.3.3.1.aarch64",
"openSUSE Leap 15.4:busybox-warewulf3-1.35.0-150400.3.3.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-11-11T14:38:22Z",
"details": "moderate"
}
],
"title": "CVE-2021-42386"
}
]
}
SUSE-SU-2022:4253-1
Vulnerability from csaf_suse - Published: 2022-11-28 10:23 - Updated: 2022-11-28 10:23| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: SUSE Linux Enterprise Server 12 SP2-BCL:busybox-1.35.0-4.3.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 12 SP3-BCL:busybox-1.35.0-4.3.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 12 SP4-LTSS:busybox-1.35.0-4.3.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 12 SP4-LTSS:busybox-1.35.0-4.3.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 12 SP4-LTSS:busybox-1.35.0-4.3.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 12 SP4-LTSS:busybox-1.35.0-4.3.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 12 SP5:busybox-1.35.0-4.3.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 12 SP5:busybox-1.35.0-4.3.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 12 SP5:busybox-1.35.0-4.3.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 12 SP5:busybox-1.35.0-4.3.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server for SAP Applications 12 SP4:busybox-1.35.0-4.3.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server for SAP Applications 12 SP4:busybox-1.35.0-4.3.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server for SAP Applications 12 SP5:busybox-1.35.0-4.3.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server for SAP Applications 12 SP5:busybox-1.35.0-4.3.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server for SAP Applications 12 SP5:busybox-1.35.0-4.3.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server for SAP Applications 12 SP5:busybox-1.35.0-4.3.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE OpenStack Cloud 9:busybox-1.35.0-4.3.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE OpenStack Cloud Crowbar 9:busybox-1.35.0-4.3.1.x86_64 | — |
Vendor Fix
|
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: SUSE Linux Enterprise Server 12 SP2-BCL:busybox-1.35.0-4.3.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 12 SP3-BCL:busybox-1.35.0-4.3.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 12 SP4-LTSS:busybox-1.35.0-4.3.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 12 SP4-LTSS:busybox-1.35.0-4.3.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 12 SP4-LTSS:busybox-1.35.0-4.3.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 12 SP4-LTSS:busybox-1.35.0-4.3.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 12 SP5:busybox-1.35.0-4.3.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 12 SP5:busybox-1.35.0-4.3.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 12 SP5:busybox-1.35.0-4.3.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 12 SP5:busybox-1.35.0-4.3.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server for SAP Applications 12 SP4:busybox-1.35.0-4.3.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server for SAP Applications 12 SP4:busybox-1.35.0-4.3.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server for SAP Applications 12 SP5:busybox-1.35.0-4.3.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server for SAP Applications 12 SP5:busybox-1.35.0-4.3.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server for SAP Applications 12 SP5:busybox-1.35.0-4.3.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server for SAP Applications 12 SP5:busybox-1.35.0-4.3.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE OpenStack Cloud 9:busybox-1.35.0-4.3.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE OpenStack Cloud Crowbar 9:busybox-1.35.0-4.3.1.x86_64 | — |
Vendor Fix
|
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: SUSE Linux Enterprise Server 12 SP2-BCL:busybox-1.35.0-4.3.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 12 SP3-BCL:busybox-1.35.0-4.3.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 12 SP4-LTSS:busybox-1.35.0-4.3.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 12 SP4-LTSS:busybox-1.35.0-4.3.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 12 SP4-LTSS:busybox-1.35.0-4.3.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 12 SP4-LTSS:busybox-1.35.0-4.3.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 12 SP5:busybox-1.35.0-4.3.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 12 SP5:busybox-1.35.0-4.3.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 12 SP5:busybox-1.35.0-4.3.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 12 SP5:busybox-1.35.0-4.3.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server for SAP Applications 12 SP4:busybox-1.35.0-4.3.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server for SAP Applications 12 SP4:busybox-1.35.0-4.3.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server for SAP Applications 12 SP5:busybox-1.35.0-4.3.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server for SAP Applications 12 SP5:busybox-1.35.0-4.3.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server for SAP Applications 12 SP5:busybox-1.35.0-4.3.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server for SAP Applications 12 SP5:busybox-1.35.0-4.3.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE OpenStack Cloud 9:busybox-1.35.0-4.3.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE OpenStack Cloud Crowbar 9:busybox-1.35.0-4.3.1.x86_64 | — |
Vendor Fix
|
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: SUSE Linux Enterprise Server 12 SP2-BCL:busybox-1.35.0-4.3.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 12 SP3-BCL:busybox-1.35.0-4.3.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 12 SP4-LTSS:busybox-1.35.0-4.3.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 12 SP4-LTSS:busybox-1.35.0-4.3.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 12 SP4-LTSS:busybox-1.35.0-4.3.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 12 SP4-LTSS:busybox-1.35.0-4.3.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 12 SP5:busybox-1.35.0-4.3.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 12 SP5:busybox-1.35.0-4.3.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 12 SP5:busybox-1.35.0-4.3.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 12 SP5:busybox-1.35.0-4.3.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server for SAP Applications 12 SP4:busybox-1.35.0-4.3.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server for SAP Applications 12 SP4:busybox-1.35.0-4.3.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server for SAP Applications 12 SP5:busybox-1.35.0-4.3.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server for SAP Applications 12 SP5:busybox-1.35.0-4.3.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server for SAP Applications 12 SP5:busybox-1.35.0-4.3.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server for SAP Applications 12 SP5:busybox-1.35.0-4.3.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE OpenStack Cloud 9:busybox-1.35.0-4.3.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE OpenStack Cloud Crowbar 9:busybox-1.35.0-4.3.1.x86_64 | — |
Vendor Fix
|
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: SUSE Linux Enterprise Server 12 SP2-BCL:busybox-1.35.0-4.3.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 12 SP3-BCL:busybox-1.35.0-4.3.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 12 SP4-LTSS:busybox-1.35.0-4.3.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 12 SP4-LTSS:busybox-1.35.0-4.3.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 12 SP4-LTSS:busybox-1.35.0-4.3.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 12 SP4-LTSS:busybox-1.35.0-4.3.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 12 SP5:busybox-1.35.0-4.3.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 12 SP5:busybox-1.35.0-4.3.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 12 SP5:busybox-1.35.0-4.3.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 12 SP5:busybox-1.35.0-4.3.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server for SAP Applications 12 SP4:busybox-1.35.0-4.3.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server for SAP Applications 12 SP4:busybox-1.35.0-4.3.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server for SAP Applications 12 SP5:busybox-1.35.0-4.3.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server for SAP Applications 12 SP5:busybox-1.35.0-4.3.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server for SAP Applications 12 SP5:busybox-1.35.0-4.3.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server for SAP Applications 12 SP5:busybox-1.35.0-4.3.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE OpenStack Cloud 9:busybox-1.35.0-4.3.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE OpenStack Cloud Crowbar 9:busybox-1.35.0-4.3.1.x86_64 | — |
Vendor Fix
|
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: SUSE Linux Enterprise Server 12 SP2-BCL:busybox-1.35.0-4.3.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 12 SP3-BCL:busybox-1.35.0-4.3.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 12 SP4-LTSS:busybox-1.35.0-4.3.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 12 SP4-LTSS:busybox-1.35.0-4.3.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 12 SP4-LTSS:busybox-1.35.0-4.3.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 12 SP4-LTSS:busybox-1.35.0-4.3.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 12 SP5:busybox-1.35.0-4.3.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 12 SP5:busybox-1.35.0-4.3.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 12 SP5:busybox-1.35.0-4.3.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 12 SP5:busybox-1.35.0-4.3.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server for SAP Applications 12 SP4:busybox-1.35.0-4.3.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server for SAP Applications 12 SP4:busybox-1.35.0-4.3.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server for SAP Applications 12 SP5:busybox-1.35.0-4.3.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server for SAP Applications 12 SP5:busybox-1.35.0-4.3.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server for SAP Applications 12 SP5:busybox-1.35.0-4.3.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server for SAP Applications 12 SP5:busybox-1.35.0-4.3.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE OpenStack Cloud 9:busybox-1.35.0-4.3.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE OpenStack Cloud Crowbar 9:busybox-1.35.0-4.3.1.x86_64 | — |
Vendor Fix
|
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: SUSE Linux Enterprise Server 12 SP2-BCL:busybox-1.35.0-4.3.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 12 SP3-BCL:busybox-1.35.0-4.3.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 12 SP4-LTSS:busybox-1.35.0-4.3.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 12 SP4-LTSS:busybox-1.35.0-4.3.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 12 SP4-LTSS:busybox-1.35.0-4.3.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 12 SP4-LTSS:busybox-1.35.0-4.3.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 12 SP5:busybox-1.35.0-4.3.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 12 SP5:busybox-1.35.0-4.3.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 12 SP5:busybox-1.35.0-4.3.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 12 SP5:busybox-1.35.0-4.3.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server for SAP Applications 12 SP4:busybox-1.35.0-4.3.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server for SAP Applications 12 SP4:busybox-1.35.0-4.3.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server for SAP Applications 12 SP5:busybox-1.35.0-4.3.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server for SAP Applications 12 SP5:busybox-1.35.0-4.3.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server for SAP Applications 12 SP5:busybox-1.35.0-4.3.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server for SAP Applications 12 SP5:busybox-1.35.0-4.3.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE OpenStack Cloud 9:busybox-1.35.0-4.3.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE OpenStack Cloud Crowbar 9:busybox-1.35.0-4.3.1.x86_64 | — |
Vendor Fix
|
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: SUSE Linux Enterprise Server 12 SP2-BCL:busybox-1.35.0-4.3.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 12 SP3-BCL:busybox-1.35.0-4.3.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 12 SP4-LTSS:busybox-1.35.0-4.3.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 12 SP4-LTSS:busybox-1.35.0-4.3.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 12 SP4-LTSS:busybox-1.35.0-4.3.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 12 SP4-LTSS:busybox-1.35.0-4.3.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 12 SP5:busybox-1.35.0-4.3.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 12 SP5:busybox-1.35.0-4.3.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 12 SP5:busybox-1.35.0-4.3.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 12 SP5:busybox-1.35.0-4.3.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server for SAP Applications 12 SP4:busybox-1.35.0-4.3.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server for SAP Applications 12 SP4:busybox-1.35.0-4.3.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server for SAP Applications 12 SP5:busybox-1.35.0-4.3.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server for SAP Applications 12 SP5:busybox-1.35.0-4.3.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server for SAP Applications 12 SP5:busybox-1.35.0-4.3.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server for SAP Applications 12 SP5:busybox-1.35.0-4.3.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE OpenStack Cloud 9:busybox-1.35.0-4.3.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE OpenStack Cloud Crowbar 9:busybox-1.35.0-4.3.1.x86_64 | — |
Vendor Fix
|
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: SUSE Linux Enterprise Server 12 SP2-BCL:busybox-1.35.0-4.3.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 12 SP3-BCL:busybox-1.35.0-4.3.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 12 SP4-LTSS:busybox-1.35.0-4.3.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 12 SP4-LTSS:busybox-1.35.0-4.3.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 12 SP4-LTSS:busybox-1.35.0-4.3.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 12 SP4-LTSS:busybox-1.35.0-4.3.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 12 SP5:busybox-1.35.0-4.3.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 12 SP5:busybox-1.35.0-4.3.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 12 SP5:busybox-1.35.0-4.3.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 12 SP5:busybox-1.35.0-4.3.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server for SAP Applications 12 SP4:busybox-1.35.0-4.3.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server for SAP Applications 12 SP4:busybox-1.35.0-4.3.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server for SAP Applications 12 SP5:busybox-1.35.0-4.3.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server for SAP Applications 12 SP5:busybox-1.35.0-4.3.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server for SAP Applications 12 SP5:busybox-1.35.0-4.3.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server for SAP Applications 12 SP5:busybox-1.35.0-4.3.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE OpenStack Cloud 9:busybox-1.35.0-4.3.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE OpenStack Cloud Crowbar 9:busybox-1.35.0-4.3.1.x86_64 | — |
Vendor Fix
|
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: SUSE Linux Enterprise Server 12 SP2-BCL:busybox-1.35.0-4.3.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 12 SP3-BCL:busybox-1.35.0-4.3.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 12 SP4-LTSS:busybox-1.35.0-4.3.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 12 SP4-LTSS:busybox-1.35.0-4.3.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 12 SP4-LTSS:busybox-1.35.0-4.3.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 12 SP4-LTSS:busybox-1.35.0-4.3.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 12 SP5:busybox-1.35.0-4.3.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 12 SP5:busybox-1.35.0-4.3.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 12 SP5:busybox-1.35.0-4.3.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 12 SP5:busybox-1.35.0-4.3.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server for SAP Applications 12 SP4:busybox-1.35.0-4.3.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server for SAP Applications 12 SP4:busybox-1.35.0-4.3.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server for SAP Applications 12 SP5:busybox-1.35.0-4.3.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server for SAP Applications 12 SP5:busybox-1.35.0-4.3.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server for SAP Applications 12 SP5:busybox-1.35.0-4.3.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server for SAP Applications 12 SP5:busybox-1.35.0-4.3.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE OpenStack Cloud 9:busybox-1.35.0-4.3.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE OpenStack Cloud Crowbar 9:busybox-1.35.0-4.3.1.x86_64 | — |
Vendor Fix
|
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: SUSE Linux Enterprise Server 12 SP2-BCL:busybox-1.35.0-4.3.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 12 SP3-BCL:busybox-1.35.0-4.3.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 12 SP4-LTSS:busybox-1.35.0-4.3.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 12 SP4-LTSS:busybox-1.35.0-4.3.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 12 SP4-LTSS:busybox-1.35.0-4.3.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 12 SP4-LTSS:busybox-1.35.0-4.3.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 12 SP5:busybox-1.35.0-4.3.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 12 SP5:busybox-1.35.0-4.3.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 12 SP5:busybox-1.35.0-4.3.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 12 SP5:busybox-1.35.0-4.3.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server for SAP Applications 12 SP4:busybox-1.35.0-4.3.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server for SAP Applications 12 SP4:busybox-1.35.0-4.3.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server for SAP Applications 12 SP5:busybox-1.35.0-4.3.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server for SAP Applications 12 SP5:busybox-1.35.0-4.3.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server for SAP Applications 12 SP5:busybox-1.35.0-4.3.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server for SAP Applications 12 SP5:busybox-1.35.0-4.3.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE OpenStack Cloud 9:busybox-1.35.0-4.3.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE OpenStack Cloud Crowbar 9:busybox-1.35.0-4.3.1.x86_64 | — |
Vendor Fix
|
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: SUSE Linux Enterprise Server 12 SP2-BCL:busybox-1.35.0-4.3.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 12 SP3-BCL:busybox-1.35.0-4.3.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 12 SP4-LTSS:busybox-1.35.0-4.3.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 12 SP4-LTSS:busybox-1.35.0-4.3.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 12 SP4-LTSS:busybox-1.35.0-4.3.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 12 SP4-LTSS:busybox-1.35.0-4.3.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 12 SP5:busybox-1.35.0-4.3.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 12 SP5:busybox-1.35.0-4.3.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 12 SP5:busybox-1.35.0-4.3.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 12 SP5:busybox-1.35.0-4.3.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server for SAP Applications 12 SP4:busybox-1.35.0-4.3.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server for SAP Applications 12 SP4:busybox-1.35.0-4.3.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server for SAP Applications 12 SP5:busybox-1.35.0-4.3.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server for SAP Applications 12 SP5:busybox-1.35.0-4.3.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server for SAP Applications 12 SP5:busybox-1.35.0-4.3.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server for SAP Applications 12 SP5:busybox-1.35.0-4.3.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE OpenStack Cloud 9:busybox-1.35.0-4.3.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE OpenStack Cloud Crowbar 9:busybox-1.35.0-4.3.1.x86_64 | — |
Vendor Fix
|
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: SUSE Linux Enterprise Server 12 SP2-BCL:busybox-1.35.0-4.3.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 12 SP3-BCL:busybox-1.35.0-4.3.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 12 SP4-LTSS:busybox-1.35.0-4.3.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 12 SP4-LTSS:busybox-1.35.0-4.3.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 12 SP4-LTSS:busybox-1.35.0-4.3.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 12 SP4-LTSS:busybox-1.35.0-4.3.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 12 SP5:busybox-1.35.0-4.3.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 12 SP5:busybox-1.35.0-4.3.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 12 SP5:busybox-1.35.0-4.3.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 12 SP5:busybox-1.35.0-4.3.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server for SAP Applications 12 SP4:busybox-1.35.0-4.3.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server for SAP Applications 12 SP4:busybox-1.35.0-4.3.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server for SAP Applications 12 SP5:busybox-1.35.0-4.3.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server for SAP Applications 12 SP5:busybox-1.35.0-4.3.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server for SAP Applications 12 SP5:busybox-1.35.0-4.3.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server for SAP Applications 12 SP5:busybox-1.35.0-4.3.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE OpenStack Cloud 9:busybox-1.35.0-4.3.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE OpenStack Cloud Crowbar 9:busybox-1.35.0-4.3.1.x86_64 | — |
Vendor Fix
|
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: SUSE Linux Enterprise Server 12 SP2-BCL:busybox-1.35.0-4.3.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 12 SP3-BCL:busybox-1.35.0-4.3.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 12 SP4-LTSS:busybox-1.35.0-4.3.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 12 SP4-LTSS:busybox-1.35.0-4.3.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 12 SP4-LTSS:busybox-1.35.0-4.3.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 12 SP4-LTSS:busybox-1.35.0-4.3.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 12 SP5:busybox-1.35.0-4.3.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 12 SP5:busybox-1.35.0-4.3.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 12 SP5:busybox-1.35.0-4.3.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 12 SP5:busybox-1.35.0-4.3.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server for SAP Applications 12 SP4:busybox-1.35.0-4.3.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server for SAP Applications 12 SP4:busybox-1.35.0-4.3.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server for SAP Applications 12 SP5:busybox-1.35.0-4.3.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server for SAP Applications 12 SP5:busybox-1.35.0-4.3.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server for SAP Applications 12 SP5:busybox-1.35.0-4.3.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server for SAP Applications 12 SP5:busybox-1.35.0-4.3.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE OpenStack Cloud 9:busybox-1.35.0-4.3.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE OpenStack Cloud Crowbar 9:busybox-1.35.0-4.3.1.x86_64 | — |
Vendor Fix
|
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: SUSE Linux Enterprise Server 12 SP2-BCL:busybox-1.35.0-4.3.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 12 SP3-BCL:busybox-1.35.0-4.3.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 12 SP4-LTSS:busybox-1.35.0-4.3.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 12 SP4-LTSS:busybox-1.35.0-4.3.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 12 SP4-LTSS:busybox-1.35.0-4.3.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 12 SP4-LTSS:busybox-1.35.0-4.3.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 12 SP5:busybox-1.35.0-4.3.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 12 SP5:busybox-1.35.0-4.3.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 12 SP5:busybox-1.35.0-4.3.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 12 SP5:busybox-1.35.0-4.3.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server for SAP Applications 12 SP4:busybox-1.35.0-4.3.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server for SAP Applications 12 SP4:busybox-1.35.0-4.3.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server for SAP Applications 12 SP5:busybox-1.35.0-4.3.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server for SAP Applications 12 SP5:busybox-1.35.0-4.3.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server for SAP Applications 12 SP5:busybox-1.35.0-4.3.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server for SAP Applications 12 SP5:busybox-1.35.0-4.3.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE OpenStack Cloud 9:busybox-1.35.0-4.3.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE OpenStack Cloud Crowbar 9:busybox-1.35.0-4.3.1.x86_64 | — |
Vendor Fix
|
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: SUSE Linux Enterprise Server 12 SP2-BCL:busybox-1.35.0-4.3.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 12 SP3-BCL:busybox-1.35.0-4.3.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 12 SP4-LTSS:busybox-1.35.0-4.3.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 12 SP4-LTSS:busybox-1.35.0-4.3.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 12 SP4-LTSS:busybox-1.35.0-4.3.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 12 SP4-LTSS:busybox-1.35.0-4.3.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 12 SP5:busybox-1.35.0-4.3.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 12 SP5:busybox-1.35.0-4.3.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 12 SP5:busybox-1.35.0-4.3.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 12 SP5:busybox-1.35.0-4.3.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server for SAP Applications 12 SP4:busybox-1.35.0-4.3.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server for SAP Applications 12 SP4:busybox-1.35.0-4.3.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server for SAP Applications 12 SP5:busybox-1.35.0-4.3.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server for SAP Applications 12 SP5:busybox-1.35.0-4.3.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server for SAP Applications 12 SP5:busybox-1.35.0-4.3.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server for SAP Applications 12 SP5:busybox-1.35.0-4.3.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE OpenStack Cloud 9:busybox-1.35.0-4.3.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE OpenStack Cloud Crowbar 9:busybox-1.35.0-4.3.1.x86_64 | — |
Vendor Fix
|
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: SUSE Linux Enterprise Server 12 SP2-BCL:busybox-1.35.0-4.3.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 12 SP3-BCL:busybox-1.35.0-4.3.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 12 SP4-LTSS:busybox-1.35.0-4.3.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 12 SP4-LTSS:busybox-1.35.0-4.3.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 12 SP4-LTSS:busybox-1.35.0-4.3.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 12 SP4-LTSS:busybox-1.35.0-4.3.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 12 SP5:busybox-1.35.0-4.3.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 12 SP5:busybox-1.35.0-4.3.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 12 SP5:busybox-1.35.0-4.3.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 12 SP5:busybox-1.35.0-4.3.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server for SAP Applications 12 SP4:busybox-1.35.0-4.3.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server for SAP Applications 12 SP4:busybox-1.35.0-4.3.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server for SAP Applications 12 SP5:busybox-1.35.0-4.3.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server for SAP Applications 12 SP5:busybox-1.35.0-4.3.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server for SAP Applications 12 SP5:busybox-1.35.0-4.3.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server for SAP Applications 12 SP5:busybox-1.35.0-4.3.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE OpenStack Cloud 9:busybox-1.35.0-4.3.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE OpenStack Cloud Crowbar 9:busybox-1.35.0-4.3.1.x86_64 | — |
Vendor Fix
|
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: SUSE Linux Enterprise Server 12 SP2-BCL:busybox-1.35.0-4.3.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 12 SP3-BCL:busybox-1.35.0-4.3.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 12 SP4-LTSS:busybox-1.35.0-4.3.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 12 SP4-LTSS:busybox-1.35.0-4.3.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 12 SP4-LTSS:busybox-1.35.0-4.3.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 12 SP4-LTSS:busybox-1.35.0-4.3.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 12 SP5:busybox-1.35.0-4.3.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 12 SP5:busybox-1.35.0-4.3.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 12 SP5:busybox-1.35.0-4.3.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 12 SP5:busybox-1.35.0-4.3.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server for SAP Applications 12 SP4:busybox-1.35.0-4.3.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server for SAP Applications 12 SP4:busybox-1.35.0-4.3.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server for SAP Applications 12 SP5:busybox-1.35.0-4.3.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server for SAP Applications 12 SP5:busybox-1.35.0-4.3.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server for SAP Applications 12 SP5:busybox-1.35.0-4.3.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server for SAP Applications 12 SP5:busybox-1.35.0-4.3.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE OpenStack Cloud 9:busybox-1.35.0-4.3.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE OpenStack Cloud Crowbar 9:busybox-1.35.0-4.3.1.x86_64 | — |
Vendor Fix
|
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: SUSE Linux Enterprise Server 12 SP2-BCL:busybox-1.35.0-4.3.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 12 SP3-BCL:busybox-1.35.0-4.3.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 12 SP4-LTSS:busybox-1.35.0-4.3.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 12 SP4-LTSS:busybox-1.35.0-4.3.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 12 SP4-LTSS:busybox-1.35.0-4.3.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 12 SP4-LTSS:busybox-1.35.0-4.3.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 12 SP5:busybox-1.35.0-4.3.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 12 SP5:busybox-1.35.0-4.3.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 12 SP5:busybox-1.35.0-4.3.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 12 SP5:busybox-1.35.0-4.3.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server for SAP Applications 12 SP4:busybox-1.35.0-4.3.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server for SAP Applications 12 SP4:busybox-1.35.0-4.3.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server for SAP Applications 12 SP5:busybox-1.35.0-4.3.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server for SAP Applications 12 SP5:busybox-1.35.0-4.3.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server for SAP Applications 12 SP5:busybox-1.35.0-4.3.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server for SAP Applications 12 SP5:busybox-1.35.0-4.3.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE OpenStack Cloud 9:busybox-1.35.0-4.3.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE OpenStack Cloud Crowbar 9:busybox-1.35.0-4.3.1.x86_64 | — |
Vendor Fix
|
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: SUSE Linux Enterprise Server 12 SP2-BCL:busybox-1.35.0-4.3.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 12 SP3-BCL:busybox-1.35.0-4.3.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 12 SP4-LTSS:busybox-1.35.0-4.3.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 12 SP4-LTSS:busybox-1.35.0-4.3.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 12 SP4-LTSS:busybox-1.35.0-4.3.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 12 SP4-LTSS:busybox-1.35.0-4.3.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 12 SP5:busybox-1.35.0-4.3.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 12 SP5:busybox-1.35.0-4.3.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 12 SP5:busybox-1.35.0-4.3.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 12 SP5:busybox-1.35.0-4.3.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server for SAP Applications 12 SP4:busybox-1.35.0-4.3.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server for SAP Applications 12 SP4:busybox-1.35.0-4.3.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server for SAP Applications 12 SP5:busybox-1.35.0-4.3.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server for SAP Applications 12 SP5:busybox-1.35.0-4.3.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server for SAP Applications 12 SP5:busybox-1.35.0-4.3.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server for SAP Applications 12 SP5:busybox-1.35.0-4.3.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE OpenStack Cloud 9:busybox-1.35.0-4.3.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE OpenStack Cloud Crowbar 9:busybox-1.35.0-4.3.1.x86_64 | — |
Vendor Fix
|
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: SUSE Linux Enterprise Server 12 SP2-BCL:busybox-1.35.0-4.3.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 12 SP3-BCL:busybox-1.35.0-4.3.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 12 SP4-LTSS:busybox-1.35.0-4.3.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 12 SP4-LTSS:busybox-1.35.0-4.3.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 12 SP4-LTSS:busybox-1.35.0-4.3.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 12 SP4-LTSS:busybox-1.35.0-4.3.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 12 SP5:busybox-1.35.0-4.3.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 12 SP5:busybox-1.35.0-4.3.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 12 SP5:busybox-1.35.0-4.3.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 12 SP5:busybox-1.35.0-4.3.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server for SAP Applications 12 SP4:busybox-1.35.0-4.3.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server for SAP Applications 12 SP4:busybox-1.35.0-4.3.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server for SAP Applications 12 SP5:busybox-1.35.0-4.3.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server for SAP Applications 12 SP5:busybox-1.35.0-4.3.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server for SAP Applications 12 SP5:busybox-1.35.0-4.3.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server for SAP Applications 12 SP5:busybox-1.35.0-4.3.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE OpenStack Cloud 9:busybox-1.35.0-4.3.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE OpenStack Cloud Crowbar 9:busybox-1.35.0-4.3.1.x86_64 | — |
Vendor Fix
|
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: SUSE Linux Enterprise Server 12 SP2-BCL:busybox-1.35.0-4.3.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 12 SP3-BCL:busybox-1.35.0-4.3.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 12 SP4-LTSS:busybox-1.35.0-4.3.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 12 SP4-LTSS:busybox-1.35.0-4.3.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 12 SP4-LTSS:busybox-1.35.0-4.3.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 12 SP4-LTSS:busybox-1.35.0-4.3.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 12 SP5:busybox-1.35.0-4.3.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 12 SP5:busybox-1.35.0-4.3.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 12 SP5:busybox-1.35.0-4.3.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 12 SP5:busybox-1.35.0-4.3.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server for SAP Applications 12 SP4:busybox-1.35.0-4.3.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server for SAP Applications 12 SP4:busybox-1.35.0-4.3.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server for SAP Applications 12 SP5:busybox-1.35.0-4.3.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server for SAP Applications 12 SP5:busybox-1.35.0-4.3.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server for SAP Applications 12 SP5:busybox-1.35.0-4.3.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server for SAP Applications 12 SP5:busybox-1.35.0-4.3.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE OpenStack Cloud 9:busybox-1.35.0-4.3.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE OpenStack Cloud Crowbar 9:busybox-1.35.0-4.3.1.x86_64 | — |
Vendor Fix
|
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: SUSE Linux Enterprise Server 12 SP2-BCL:busybox-1.35.0-4.3.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 12 SP3-BCL:busybox-1.35.0-4.3.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 12 SP4-LTSS:busybox-1.35.0-4.3.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 12 SP4-LTSS:busybox-1.35.0-4.3.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 12 SP4-LTSS:busybox-1.35.0-4.3.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 12 SP4-LTSS:busybox-1.35.0-4.3.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 12 SP5:busybox-1.35.0-4.3.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 12 SP5:busybox-1.35.0-4.3.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 12 SP5:busybox-1.35.0-4.3.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 12 SP5:busybox-1.35.0-4.3.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server for SAP Applications 12 SP4:busybox-1.35.0-4.3.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server for SAP Applications 12 SP4:busybox-1.35.0-4.3.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server for SAP Applications 12 SP5:busybox-1.35.0-4.3.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server for SAP Applications 12 SP5:busybox-1.35.0-4.3.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server for SAP Applications 12 SP5:busybox-1.35.0-4.3.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server for SAP Applications 12 SP5:busybox-1.35.0-4.3.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE OpenStack Cloud 9:busybox-1.35.0-4.3.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE OpenStack Cloud Crowbar 9:busybox-1.35.0-4.3.1.x86_64 | — |
Vendor Fix
|
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: SUSE Linux Enterprise Server 12 SP2-BCL:busybox-1.35.0-4.3.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 12 SP3-BCL:busybox-1.35.0-4.3.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 12 SP4-LTSS:busybox-1.35.0-4.3.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 12 SP4-LTSS:busybox-1.35.0-4.3.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 12 SP4-LTSS:busybox-1.35.0-4.3.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 12 SP4-LTSS:busybox-1.35.0-4.3.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 12 SP5:busybox-1.35.0-4.3.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 12 SP5:busybox-1.35.0-4.3.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 12 SP5:busybox-1.35.0-4.3.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 12 SP5:busybox-1.35.0-4.3.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server for SAP Applications 12 SP4:busybox-1.35.0-4.3.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server for SAP Applications 12 SP4:busybox-1.35.0-4.3.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server for SAP Applications 12 SP5:busybox-1.35.0-4.3.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server for SAP Applications 12 SP5:busybox-1.35.0-4.3.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server for SAP Applications 12 SP5:busybox-1.35.0-4.3.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server for SAP Applications 12 SP5:busybox-1.35.0-4.3.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE OpenStack Cloud 9:busybox-1.35.0-4.3.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE OpenStack Cloud Crowbar 9:busybox-1.35.0-4.3.1.x86_64 | — |
Vendor Fix
|
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: SUSE Linux Enterprise Server 12 SP2-BCL:busybox-1.35.0-4.3.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 12 SP3-BCL:busybox-1.35.0-4.3.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 12 SP4-LTSS:busybox-1.35.0-4.3.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 12 SP4-LTSS:busybox-1.35.0-4.3.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 12 SP4-LTSS:busybox-1.35.0-4.3.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 12 SP4-LTSS:busybox-1.35.0-4.3.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 12 SP5:busybox-1.35.0-4.3.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 12 SP5:busybox-1.35.0-4.3.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 12 SP5:busybox-1.35.0-4.3.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 12 SP5:busybox-1.35.0-4.3.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server for SAP Applications 12 SP4:busybox-1.35.0-4.3.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server for SAP Applications 12 SP4:busybox-1.35.0-4.3.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server for SAP Applications 12 SP5:busybox-1.35.0-4.3.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server for SAP Applications 12 SP5:busybox-1.35.0-4.3.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server for SAP Applications 12 SP5:busybox-1.35.0-4.3.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server for SAP Applications 12 SP5:busybox-1.35.0-4.3.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE OpenStack Cloud 9:busybox-1.35.0-4.3.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE OpenStack Cloud Crowbar 9:busybox-1.35.0-4.3.1.x86_64 | — |
Vendor Fix
|
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: SUSE Linux Enterprise Server 12 SP2-BCL:busybox-1.35.0-4.3.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 12 SP3-BCL:busybox-1.35.0-4.3.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 12 SP4-LTSS:busybox-1.35.0-4.3.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 12 SP4-LTSS:busybox-1.35.0-4.3.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 12 SP4-LTSS:busybox-1.35.0-4.3.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 12 SP4-LTSS:busybox-1.35.0-4.3.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 12 SP5:busybox-1.35.0-4.3.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 12 SP5:busybox-1.35.0-4.3.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 12 SP5:busybox-1.35.0-4.3.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 12 SP5:busybox-1.35.0-4.3.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server for SAP Applications 12 SP4:busybox-1.35.0-4.3.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server for SAP Applications 12 SP4:busybox-1.35.0-4.3.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server for SAP Applications 12 SP5:busybox-1.35.0-4.3.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server for SAP Applications 12 SP5:busybox-1.35.0-4.3.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server for SAP Applications 12 SP5:busybox-1.35.0-4.3.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server for SAP Applications 12 SP5:busybox-1.35.0-4.3.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE OpenStack Cloud 9:busybox-1.35.0-4.3.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE OpenStack Cloud Crowbar 9:busybox-1.35.0-4.3.1.x86_64 | — |
Vendor Fix
|
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: SUSE Linux Enterprise Server 12 SP2-BCL:busybox-1.35.0-4.3.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 12 SP3-BCL:busybox-1.35.0-4.3.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 12 SP4-LTSS:busybox-1.35.0-4.3.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 12 SP4-LTSS:busybox-1.35.0-4.3.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 12 SP4-LTSS:busybox-1.35.0-4.3.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 12 SP4-LTSS:busybox-1.35.0-4.3.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 12 SP5:busybox-1.35.0-4.3.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 12 SP5:busybox-1.35.0-4.3.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 12 SP5:busybox-1.35.0-4.3.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 12 SP5:busybox-1.35.0-4.3.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server for SAP Applications 12 SP4:busybox-1.35.0-4.3.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server for SAP Applications 12 SP4:busybox-1.35.0-4.3.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server for SAP Applications 12 SP5:busybox-1.35.0-4.3.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server for SAP Applications 12 SP5:busybox-1.35.0-4.3.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server for SAP Applications 12 SP5:busybox-1.35.0-4.3.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server for SAP Applications 12 SP5:busybox-1.35.0-4.3.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE OpenStack Cloud 9:busybox-1.35.0-4.3.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE OpenStack Cloud Crowbar 9:busybox-1.35.0-4.3.1.x86_64 | — |
Vendor Fix
|
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: SUSE Linux Enterprise Server 12 SP2-BCL:busybox-1.35.0-4.3.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 12 SP3-BCL:busybox-1.35.0-4.3.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 12 SP4-LTSS:busybox-1.35.0-4.3.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 12 SP4-LTSS:busybox-1.35.0-4.3.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 12 SP4-LTSS:busybox-1.35.0-4.3.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 12 SP4-LTSS:busybox-1.35.0-4.3.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 12 SP5:busybox-1.35.0-4.3.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 12 SP5:busybox-1.35.0-4.3.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 12 SP5:busybox-1.35.0-4.3.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 12 SP5:busybox-1.35.0-4.3.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server for SAP Applications 12 SP4:busybox-1.35.0-4.3.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server for SAP Applications 12 SP4:busybox-1.35.0-4.3.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server for SAP Applications 12 SP5:busybox-1.35.0-4.3.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server for SAP Applications 12 SP5:busybox-1.35.0-4.3.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server for SAP Applications 12 SP5:busybox-1.35.0-4.3.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server for SAP Applications 12 SP5:busybox-1.35.0-4.3.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE OpenStack Cloud 9:busybox-1.35.0-4.3.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE OpenStack Cloud Crowbar 9:busybox-1.35.0-4.3.1.x86_64 | — |
Vendor Fix
|
{
"document": {
"aggregate_severity": {
"namespace": "https://www.suse.com/support/security/rating/",
"text": "important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright 2024 SUSE LLC. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Security update for busybox",
"title": "Title of the patch"
},
{
"category": "description",
"text": "This update for busybox fixes the following issues:\n\n- CVE-2014-9645: Fixed loading of unwanted modules with / (bsc#914660).\n- CVE-2017-16544: Fixed insufficient sanitization of filenames when autocompleting (bsc#1069412).\n- CVE-2015-9261: Fixed huft_build misuses a pointer, causing segfaults (bsc#1102912).\n- CVE-2016-2147: Fixed out of bounds write (heap) due to integer underflow in udhcpc (bsc#970663).\n- CVE-2016-2148: Fixed heap-based buffer overflow in OPTION_6RD parsing (bsc#970662).\n- CVE-2016-6301: Fixed NTP server denial of service flaw (bsc#991940).\n- CVE-2017-15873: Fixed integer overflow in get_next_block function in archival/libarchive/decompress_bunzip2.c (bsc#1064976).\n- CVE-2017-15874: Fixed integer overflow in archival/libarchive/decompress_unlzma (bsc#1064978).\n- CVE-2019-5747: Fixed out of bounds read in udhcp components (bsc#1121428).\n- CVE-2021-42373, CVE-2021-42374, CVE-2021-42375, CVE-2021-42376, CVE-2021-42377, CVE-2021-42378, CVE-2021-42379, CVE-2021-42380, CVE-2021-42381, CVE-2021-42382, CVE-2021-42383, CVE-2021-42384, CVE-2021-42385, CVE-2021-42386: v1.34.0 bugfixes (bsc#1192869).\n- CVE-2021-28831: Fixed invalid free or segmentation fault via malformed gzip data (bsc#1184522).\n- CVE-2018-20679: Fixed out of bounds read in udhcp (bsc#1121426).\n- CVE-2018-1000517: Fixed heap-based buffer overflow in the retrieve_file_data() (bsc#1099260).\n- CVE-2011-5325: Fixed tar directory traversal (bsc#951562).\n- CVE-2018-1000500: Fixed missing SSL certificate validation in wget (bsc#1099263).\n \n- Update to 1.35.0\n - awk: fix printf %%, fix read beyond end of buffer\n - chrt: silence analyzer warning\n - libarchive: remove duplicate forward declaration\n - mount: \u0027mount -o rw ....\u0027 should not fall back to RO mount\n - ps: fix -o pid=PID,args interpreting entire \u0027PID,args\u0027 as header\n - tar: prevent malicious archives with long name sizes causing OOM\n - udhcpc6: fix udhcp_find_option to actually find DHCP6 options\n - xxd: fix -p -r\n - support for new optoins added to basename, cpio, date, find, \n mktemp, wget and others\n\n- Enable fdisk (jsc#CAR-16)\n\n- Update to 1.34.1:\n * build system: use SOURCE_DATE_EPOCH for timestamp if available\n * many bug fixes and new features\n * touch: make FEATURE_TOUCH_NODEREF unconditional\n \n- update to 1.33.1:\n * httpd: fix sendfile\n * ash: fix HISTFILE corruptio\n * ash: fix unset variable pattern expansion\n * traceroute: fix option parsing\n * gunzip: fix for archive corruption\n\n- Update to version 1.33.0\n - many bug fixes and new features\n\n- Update to version 1.32.1\n - fixes a case where in ash, \u0027wait\u0027 never finishes. \n\n- prepare usrmerge (bsc#1029961)\n\n- Enable testsuite and package it for later rerun (for QA, jsc#CAR-15)\n\n- Update to version 1.31.1:\n + Bug fix release. 1.30.1 has fixes for dc, ash (PS1 expansion\n fix), hush, dpkg-deb, telnet and wget.\n- Changes from version 1.31.0:\n + many bugfixes and new features.\n- Add busybox-no-stime.patch: stime() has been deprecated in glibc\n 2.31 and replaced with clock_settime().\n\n- update to 1.25.1:\n * fixes for hush, gunzip, ip route, ntpd\n- includes changes from 1.25.0:\n * many added and expanded implementations of command options\n- includes changes from 1.24.2:\n * fixes for build system (static build with glibc fixed),\n truncate, gunzip and unzip. \n\n- Update to version 1.24.1\n * for a full list of changes see http://www.busybox.net/news.html\n- Refresh busybox.install.patch \n\n- Update to 1.23.2\n * for a full list of changes see http://www.busybox.net/news.html\n- Cleaned up spec file with spec-cleaner\n- Refreshed patches\n\n- update to 1.22.1:\n Many updates and fixes for most included tools, see\n see http://www.busybox.net/news.html\n",
"title": "Description of the patch"
},
{
"category": "details",
"text": "SUSE-2022-4253,SUSE-OpenStack-Cloud-9-2022-4253,SUSE-OpenStack-Cloud-Crowbar-9-2022-4253,SUSE-SLE-SAP-12-SP4-2022-4253,SUSE-SLE-SERVER-12-SP2-BCL-2022-4253,SUSE-SLE-SERVER-12-SP3-BCL-2022-4253,SUSE-SLE-SERVER-12-SP4-LTSS-2022-4253,SUSE-SLE-SERVER-12-SP5-2022-4253",
"title": "Patchnames"
},
{
"category": "legal_disclaimer",
"text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
"title": "Terms of use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://www.suse.com/support/security/contact/",
"name": "SUSE Product Security Team",
"namespace": "https://www.suse.com/"
},
"references": [
{
"category": "external",
"summary": "SUSE ratings",
"url": "https://www.suse.com/support/security/rating/"
},
{
"category": "self",
"summary": "URL of this CSAF notice",
"url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2022_4253-1.json"
},
{
"category": "self",
"summary": "URL for SUSE-SU-2022:4253-1",
"url": "https://www.suse.com/support/update/announcement/2022/suse-su-20224253-1/"
},
{
"category": "self",
"summary": "E-Mail link for SUSE-SU-2022:4253-1",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2022-November/013126.html"
},
{
"category": "self",
"summary": "SUSE Bug 1029961",
"url": "https://bugzilla.suse.com/1029961"
},
{
"category": "self",
"summary": "SUSE Bug 1064976",
"url": "https://bugzilla.suse.com/1064976"
},
{
"category": "self",
"summary": "SUSE Bug 1064978",
"url": "https://bugzilla.suse.com/1064978"
},
{
"category": "self",
"summary": "SUSE Bug 1069412",
"url": "https://bugzilla.suse.com/1069412"
},
{
"category": "self",
"summary": "SUSE Bug 1099260",
"url": "https://bugzilla.suse.com/1099260"
},
{
"category": "self",
"summary": "SUSE Bug 1099263",
"url": "https://bugzilla.suse.com/1099263"
},
{
"category": "self",
"summary": "SUSE Bug 1102912",
"url": "https://bugzilla.suse.com/1102912"
},
{
"category": "self",
"summary": "SUSE Bug 1121426",
"url": "https://bugzilla.suse.com/1121426"
},
{
"category": "self",
"summary": "SUSE Bug 1121428",
"url": "https://bugzilla.suse.com/1121428"
},
{
"category": "self",
"summary": "SUSE Bug 1184522",
"url": "https://bugzilla.suse.com/1184522"
},
{
"category": "self",
"summary": "SUSE Bug 1191514",
"url": "https://bugzilla.suse.com/1191514"
},
{
"category": "self",
"summary": "SUSE Bug 1192869",
"url": "https://bugzilla.suse.com/1192869"
},
{
"category": "self",
"summary": "SUSE Bug 914660",
"url": "https://bugzilla.suse.com/914660"
},
{
"category": "self",
"summary": "SUSE Bug 951562",
"url": "https://bugzilla.suse.com/951562"
},
{
"category": "self",
"summary": "SUSE Bug 970662",
"url": "https://bugzilla.suse.com/970662"
},
{
"category": "self",
"summary": "SUSE Bug 970663",
"url": "https://bugzilla.suse.com/970663"
},
{
"category": "self",
"summary": "SUSE Bug 991940",
"url": "https://bugzilla.suse.com/991940"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2011-5325 page",
"url": "https://www.suse.com/security/cve/CVE-2011-5325/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2014-9645 page",
"url": "https://www.suse.com/security/cve/CVE-2014-9645/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2015-9261 page",
"url": "https://www.suse.com/security/cve/CVE-2015-9261/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2016-2147 page",
"url": "https://www.suse.com/security/cve/CVE-2016-2147/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2016-2148 page",
"url": "https://www.suse.com/security/cve/CVE-2016-2148/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2016-6301 page",
"url": "https://www.suse.com/security/cve/CVE-2016-6301/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2017-15873 page",
"url": "https://www.suse.com/security/cve/CVE-2017-15873/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2017-15874 page",
"url": "https://www.suse.com/security/cve/CVE-2017-15874/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2017-16544 page",
"url": "https://www.suse.com/security/cve/CVE-2017-16544/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2018-1000500 page",
"url": "https://www.suse.com/security/cve/CVE-2018-1000500/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2018-1000517 page",
"url": "https://www.suse.com/security/cve/CVE-2018-1000517/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2018-20679 page",
"url": "https://www.suse.com/security/cve/CVE-2018-20679/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-5747 page",
"url": "https://www.suse.com/security/cve/CVE-2019-5747/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-28831 page",
"url": "https://www.suse.com/security/cve/CVE-2021-28831/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-42373 page",
"url": "https://www.suse.com/security/cve/CVE-2021-42373/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-42374 page",
"url": "https://www.suse.com/security/cve/CVE-2021-42374/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-42375 page",
"url": "https://www.suse.com/security/cve/CVE-2021-42375/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-42376 page",
"url": "https://www.suse.com/security/cve/CVE-2021-42376/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-42377 page",
"url": "https://www.suse.com/security/cve/CVE-2021-42377/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-42378 page",
"url": "https://www.suse.com/security/cve/CVE-2021-42378/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-42379 page",
"url": "https://www.suse.com/security/cve/CVE-2021-42379/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-42380 page",
"url": "https://www.suse.com/security/cve/CVE-2021-42380/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-42381 page",
"url": "https://www.suse.com/security/cve/CVE-2021-42381/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-42382 page",
"url": "https://www.suse.com/security/cve/CVE-2021-42382/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-42383 page",
"url": "https://www.suse.com/security/cve/CVE-2021-42383/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-42384 page",
"url": "https://www.suse.com/security/cve/CVE-2021-42384/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-42385 page",
"url": "https://www.suse.com/security/cve/CVE-2021-42385/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-42386 page",
"url": "https://www.suse.com/security/cve/CVE-2021-42386/"
}
],
"title": "Security update for busybox",
"tracking": {
"current_release_date": "2022-11-28T10:23:47Z",
"generator": {
"date": "2022-11-28T10:23:47Z",
"engine": {
"name": "cve-database.git:bin/generate-csaf.pl",
"version": "1"
}
},
"id": "SUSE-SU-2022:4253-1",
"initial_release_date": "2022-11-28T10:23:47Z",
"revision_history": [
{
"date": "2022-11-28T10:23:47Z",
"number": "1",
"summary": "Current version"
}
],
"status": "final",
"version": "1"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "busybox-1.35.0-4.3.1.aarch64",
"product": {
"name": "busybox-1.35.0-4.3.1.aarch64",
"product_id": "busybox-1.35.0-4.3.1.aarch64"
}
},
{
"category": "product_version",
"name": "busybox-static-1.35.0-4.3.1.aarch64",
"product": {
"name": "busybox-static-1.35.0-4.3.1.aarch64",
"product_id": "busybox-static-1.35.0-4.3.1.aarch64"
}
},
{
"category": "product_version",
"name": "busybox-testsuite-1.35.0-4.3.1.aarch64",
"product": {
"name": "busybox-testsuite-1.35.0-4.3.1.aarch64",
"product_id": "busybox-testsuite-1.35.0-4.3.1.aarch64"
}
},
{
"category": "product_version",
"name": "busybox-warewulf3-1.35.0-4.3.1.aarch64",
"product": {
"name": "busybox-warewulf3-1.35.0-4.3.1.aarch64",
"product_id": "busybox-warewulf3-1.35.0-4.3.1.aarch64"
}
}
],
"category": "architecture",
"name": "aarch64"
},
{
"branches": [
{
"category": "product_version",
"name": "busybox-1.35.0-4.3.1.i586",
"product": {
"name": "busybox-1.35.0-4.3.1.i586",
"product_id": "busybox-1.35.0-4.3.1.i586"
}
},
{
"category": "product_version",
"name": "busybox-static-1.35.0-4.3.1.i586",
"product": {
"name": "busybox-static-1.35.0-4.3.1.i586",
"product_id": "busybox-static-1.35.0-4.3.1.i586"
}
},
{
"category": "product_version",
"name": "busybox-testsuite-1.35.0-4.3.1.i586",
"product": {
"name": "busybox-testsuite-1.35.0-4.3.1.i586",
"product_id": "busybox-testsuite-1.35.0-4.3.1.i586"
}
},
{
"category": "product_version",
"name": "busybox-warewulf3-1.35.0-4.3.1.i586",
"product": {
"name": "busybox-warewulf3-1.35.0-4.3.1.i586",
"product_id": "busybox-warewulf3-1.35.0-4.3.1.i586"
}
}
],
"category": "architecture",
"name": "i586"
},
{
"branches": [
{
"category": "product_version",
"name": "busybox-1.35.0-4.3.1.ppc64le",
"product": {
"name": "busybox-1.35.0-4.3.1.ppc64le",
"product_id": "busybox-1.35.0-4.3.1.ppc64le"
}
},
{
"category": "product_version",
"name": "busybox-static-1.35.0-4.3.1.ppc64le",
"product": {
"name": "busybox-static-1.35.0-4.3.1.ppc64le",
"product_id": "busybox-static-1.35.0-4.3.1.ppc64le"
}
},
{
"category": "product_version",
"name": "busybox-testsuite-1.35.0-4.3.1.ppc64le",
"product": {
"name": "busybox-testsuite-1.35.0-4.3.1.ppc64le",
"product_id": "busybox-testsuite-1.35.0-4.3.1.ppc64le"
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "busybox-1.35.0-4.3.1.s390",
"product": {
"name": "busybox-1.35.0-4.3.1.s390",
"product_id": "busybox-1.35.0-4.3.1.s390"
}
},
{
"category": "product_version",
"name": "busybox-static-1.35.0-4.3.1.s390",
"product": {
"name": "busybox-static-1.35.0-4.3.1.s390",
"product_id": "busybox-static-1.35.0-4.3.1.s390"
}
},
{
"category": "product_version",
"name": "busybox-testsuite-1.35.0-4.3.1.s390",
"product": {
"name": "busybox-testsuite-1.35.0-4.3.1.s390",
"product_id": "busybox-testsuite-1.35.0-4.3.1.s390"
}
}
],
"category": "architecture",
"name": "s390"
},
{
"branches": [
{
"category": "product_version",
"name": "busybox-1.35.0-4.3.1.s390x",
"product": {
"name": "busybox-1.35.0-4.3.1.s390x",
"product_id": "busybox-1.35.0-4.3.1.s390x"
}
},
{
"category": "product_version",
"name": "busybox-static-1.35.0-4.3.1.s390x",
"product": {
"name": "busybox-static-1.35.0-4.3.1.s390x",
"product_id": "busybox-static-1.35.0-4.3.1.s390x"
}
},
{
"category": "product_version",
"name": "busybox-testsuite-1.35.0-4.3.1.s390x",
"product": {
"name": "busybox-testsuite-1.35.0-4.3.1.s390x",
"product_id": "busybox-testsuite-1.35.0-4.3.1.s390x"
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "busybox-1.35.0-4.3.1.x86_64",
"product": {
"name": "busybox-1.35.0-4.3.1.x86_64",
"product_id": "busybox-1.35.0-4.3.1.x86_64"
}
},
{
"category": "product_version",
"name": "busybox-static-1.35.0-4.3.1.x86_64",
"product": {
"name": "busybox-static-1.35.0-4.3.1.x86_64",
"product_id": "busybox-static-1.35.0-4.3.1.x86_64"
}
},
{
"category": "product_version",
"name": "busybox-testsuite-1.35.0-4.3.1.x86_64",
"product": {
"name": "busybox-testsuite-1.35.0-4.3.1.x86_64",
"product_id": "busybox-testsuite-1.35.0-4.3.1.x86_64"
}
},
{
"category": "product_version",
"name": "busybox-warewulf3-1.35.0-4.3.1.x86_64",
"product": {
"name": "busybox-warewulf3-1.35.0-4.3.1.x86_64",
"product_id": "busybox-warewulf3-1.35.0-4.3.1.x86_64"
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_name",
"name": "SUSE OpenStack Cloud 9",
"product": {
"name": "SUSE OpenStack Cloud 9",
"product_id": "SUSE OpenStack Cloud 9",
"product_identification_helper": {
"cpe": "cpe:/o:suse:suse-openstack-cloud:9"
}
}
},
{
"category": "product_name",
"name": "SUSE OpenStack Cloud Crowbar 9",
"product": {
"name": "SUSE OpenStack Cloud Crowbar 9",
"product_id": "SUSE OpenStack Cloud Crowbar 9",
"product_identification_helper": {
"cpe": "cpe:/o:suse:suse-openstack-cloud-crowbar:9"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Server for SAP Applications 12 SP4",
"product": {
"name": "SUSE Linux Enterprise Server for SAP Applications 12 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP4",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sles_sap:12:sp4"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Server 12 SP2-BCL",
"product": {
"name": "SUSE Linux Enterprise Server 12 SP2-BCL",
"product_id": "SUSE Linux Enterprise Server 12 SP2-BCL",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sles-bcl:12:sp2"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Server 12 SP3-BCL",
"product": {
"name": "SUSE Linux Enterprise Server 12 SP3-BCL",
"product_id": "SUSE Linux Enterprise Server 12 SP3-BCL",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sles-bcl:12:sp3"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Server 12 SP4-LTSS",
"product": {
"name": "SUSE Linux Enterprise Server 12 SP4-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP4-LTSS",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sles-ltss:12:sp4"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Server 12 SP5",
"product": {
"name": "SUSE Linux Enterprise Server 12 SP5",
"product_id": "SUSE Linux Enterprise Server 12 SP5",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sles:12:sp5"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Server for SAP Applications 12 SP5",
"product": {
"name": "SUSE Linux Enterprise Server for SAP Applications 12 SP5",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP5",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sles_sap:12:sp5"
}
}
}
],
"category": "product_family",
"name": "SUSE Linux Enterprise"
}
],
"category": "vendor",
"name": "SUSE"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "busybox-1.35.0-4.3.1.x86_64 as component of SUSE OpenStack Cloud 9",
"product_id": "SUSE OpenStack Cloud 9:busybox-1.35.0-4.3.1.x86_64"
},
"product_reference": "busybox-1.35.0-4.3.1.x86_64",
"relates_to_product_reference": "SUSE OpenStack Cloud 9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "busybox-1.35.0-4.3.1.x86_64 as component of SUSE OpenStack Cloud Crowbar 9",
"product_id": "SUSE OpenStack Cloud Crowbar 9:busybox-1.35.0-4.3.1.x86_64"
},
"product_reference": "busybox-1.35.0-4.3.1.x86_64",
"relates_to_product_reference": "SUSE OpenStack Cloud Crowbar 9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "busybox-1.35.0-4.3.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP4:busybox-1.35.0-4.3.1.ppc64le"
},
"product_reference": "busybox-1.35.0-4.3.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "busybox-1.35.0-4.3.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP4:busybox-1.35.0-4.3.1.x86_64"
},
"product_reference": "busybox-1.35.0-4.3.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "busybox-1.35.0-4.3.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP2-BCL",
"product_id": "SUSE Linux Enterprise Server 12 SP2-BCL:busybox-1.35.0-4.3.1.x86_64"
},
"product_reference": "busybox-1.35.0-4.3.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2-BCL"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "busybox-1.35.0-4.3.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP3-BCL",
"product_id": "SUSE Linux Enterprise Server 12 SP3-BCL:busybox-1.35.0-4.3.1.x86_64"
},
"product_reference": "busybox-1.35.0-4.3.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3-BCL"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "busybox-1.35.0-4.3.1.aarch64 as component of SUSE Linux Enterprise Server 12 SP4-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP4-LTSS:busybox-1.35.0-4.3.1.aarch64"
},
"product_reference": "busybox-1.35.0-4.3.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "busybox-1.35.0-4.3.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP4-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP4-LTSS:busybox-1.35.0-4.3.1.ppc64le"
},
"product_reference": "busybox-1.35.0-4.3.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "busybox-1.35.0-4.3.1.s390x as component of SUSE Linux Enterprise Server 12 SP4-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP4-LTSS:busybox-1.35.0-4.3.1.s390x"
},
"product_reference": "busybox-1.35.0-4.3.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "busybox-1.35.0-4.3.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP4-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP4-LTSS:busybox-1.35.0-4.3.1.x86_64"
},
"product_reference": "busybox-1.35.0-4.3.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "busybox-1.35.0-4.3.1.aarch64 as component of SUSE Linux Enterprise Server 12 SP5",
"product_id": "SUSE Linux Enterprise Server 12 SP5:busybox-1.35.0-4.3.1.aarch64"
},
"product_reference": "busybox-1.35.0-4.3.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "busybox-1.35.0-4.3.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP5",
"product_id": "SUSE Linux Enterprise Server 12 SP5:busybox-1.35.0-4.3.1.ppc64le"
},
"product_reference": "busybox-1.35.0-4.3.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "busybox-1.35.0-4.3.1.s390x as component of SUSE Linux Enterprise Server 12 SP5",
"product_id": "SUSE Linux Enterprise Server 12 SP5:busybox-1.35.0-4.3.1.s390x"
},
"product_reference": "busybox-1.35.0-4.3.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "busybox-1.35.0-4.3.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP5",
"product_id": "SUSE Linux Enterprise Server 12 SP5:busybox-1.35.0-4.3.1.x86_64"
},
"product_reference": "busybox-1.35.0-4.3.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "busybox-1.35.0-4.3.1.aarch64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP5:busybox-1.35.0-4.3.1.aarch64"
},
"product_reference": "busybox-1.35.0-4.3.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "busybox-1.35.0-4.3.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP5:busybox-1.35.0-4.3.1.ppc64le"
},
"product_reference": "busybox-1.35.0-4.3.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "busybox-1.35.0-4.3.1.s390x as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP5:busybox-1.35.0-4.3.1.s390x"
},
"product_reference": "busybox-1.35.0-4.3.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "busybox-1.35.0-4.3.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP5:busybox-1.35.0-4.3.1.x86_64"
},
"product_reference": "busybox-1.35.0-4.3.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP5"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2011-5325",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2011-5325"
}
],
"notes": [
{
"category": "general",
"text": "Directory traversal vulnerability in the BusyBox implementation of tar before 1.22.0 v5 allows remote attackers to point to files outside the current working directory via a symlink.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 12 SP2-BCL:busybox-1.35.0-4.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:busybox-1.35.0-4.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:busybox-1.35.0-4.3.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:busybox-1.35.0-4.3.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:busybox-1.35.0-4.3.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:busybox-1.35.0-4.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:busybox-1.35.0-4.3.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:busybox-1.35.0-4.3.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:busybox-1.35.0-4.3.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:busybox-1.35.0-4.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:busybox-1.35.0-4.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:busybox-1.35.0-4.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:busybox-1.35.0-4.3.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:busybox-1.35.0-4.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:busybox-1.35.0-4.3.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:busybox-1.35.0-4.3.1.x86_64",
"SUSE OpenStack Cloud 9:busybox-1.35.0-4.3.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:busybox-1.35.0-4.3.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2011-5325",
"url": "https://www.suse.com/security/cve/CVE-2011-5325"
},
{
"category": "external",
"summary": "SUSE Bug 951562 for CVE-2011-5325",
"url": "https://bugzilla.suse.com/951562"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 12 SP2-BCL:busybox-1.35.0-4.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:busybox-1.35.0-4.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:busybox-1.35.0-4.3.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:busybox-1.35.0-4.3.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:busybox-1.35.0-4.3.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:busybox-1.35.0-4.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:busybox-1.35.0-4.3.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:busybox-1.35.0-4.3.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:busybox-1.35.0-4.3.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:busybox-1.35.0-4.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:busybox-1.35.0-4.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:busybox-1.35.0-4.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:busybox-1.35.0-4.3.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:busybox-1.35.0-4.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:busybox-1.35.0-4.3.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:busybox-1.35.0-4.3.1.x86_64",
"SUSE OpenStack Cloud 9:busybox-1.35.0-4.3.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:busybox-1.35.0-4.3.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 12 SP2-BCL:busybox-1.35.0-4.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:busybox-1.35.0-4.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:busybox-1.35.0-4.3.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:busybox-1.35.0-4.3.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:busybox-1.35.0-4.3.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:busybox-1.35.0-4.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:busybox-1.35.0-4.3.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:busybox-1.35.0-4.3.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:busybox-1.35.0-4.3.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:busybox-1.35.0-4.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:busybox-1.35.0-4.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:busybox-1.35.0-4.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:busybox-1.35.0-4.3.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:busybox-1.35.0-4.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:busybox-1.35.0-4.3.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:busybox-1.35.0-4.3.1.x86_64",
"SUSE OpenStack Cloud 9:busybox-1.35.0-4.3.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:busybox-1.35.0-4.3.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-11-28T10:23:47Z",
"details": "moderate"
}
],
"title": "CVE-2011-5325"
},
{
"cve": "CVE-2014-9645",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2014-9645"
}
],
"notes": [
{
"category": "general",
"text": "The add_probe function in modutils/modprobe.c in BusyBox before 1.23.0 allows local users to bypass intended restrictions on loading kernel modules via a / (slash) character in a module name, as demonstrated by an \"ifconfig /usbserial up\" command or a \"mount -t /snd_pcm none /\" command.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 12 SP2-BCL:busybox-1.35.0-4.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:busybox-1.35.0-4.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:busybox-1.35.0-4.3.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:busybox-1.35.0-4.3.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:busybox-1.35.0-4.3.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:busybox-1.35.0-4.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:busybox-1.35.0-4.3.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:busybox-1.35.0-4.3.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:busybox-1.35.0-4.3.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:busybox-1.35.0-4.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:busybox-1.35.0-4.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:busybox-1.35.0-4.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:busybox-1.35.0-4.3.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:busybox-1.35.0-4.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:busybox-1.35.0-4.3.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:busybox-1.35.0-4.3.1.x86_64",
"SUSE OpenStack Cloud 9:busybox-1.35.0-4.3.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:busybox-1.35.0-4.3.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2014-9645",
"url": "https://www.suse.com/security/cve/CVE-2014-9645"
},
{
"category": "external",
"summary": "SUSE Bug 914423 for CVE-2014-9645",
"url": "https://bugzilla.suse.com/914423"
},
{
"category": "external",
"summary": "SUSE Bug 914660 for CVE-2014-9645",
"url": "https://bugzilla.suse.com/914660"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 12 SP2-BCL:busybox-1.35.0-4.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:busybox-1.35.0-4.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:busybox-1.35.0-4.3.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:busybox-1.35.0-4.3.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:busybox-1.35.0-4.3.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:busybox-1.35.0-4.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:busybox-1.35.0-4.3.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:busybox-1.35.0-4.3.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:busybox-1.35.0-4.3.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:busybox-1.35.0-4.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:busybox-1.35.0-4.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:busybox-1.35.0-4.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:busybox-1.35.0-4.3.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:busybox-1.35.0-4.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:busybox-1.35.0-4.3.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:busybox-1.35.0-4.3.1.x86_64",
"SUSE OpenStack Cloud 9:busybox-1.35.0-4.3.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:busybox-1.35.0-4.3.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise Server 12 SP2-BCL:busybox-1.35.0-4.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:busybox-1.35.0-4.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:busybox-1.35.0-4.3.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:busybox-1.35.0-4.3.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:busybox-1.35.0-4.3.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:busybox-1.35.0-4.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:busybox-1.35.0-4.3.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:busybox-1.35.0-4.3.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:busybox-1.35.0-4.3.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:busybox-1.35.0-4.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:busybox-1.35.0-4.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:busybox-1.35.0-4.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:busybox-1.35.0-4.3.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:busybox-1.35.0-4.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:busybox-1.35.0-4.3.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:busybox-1.35.0-4.3.1.x86_64",
"SUSE OpenStack Cloud 9:busybox-1.35.0-4.3.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:busybox-1.35.0-4.3.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-11-28T10:23:47Z",
"details": "low"
}
],
"title": "CVE-2014-9645"
},
{
"cve": "CVE-2015-9261",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2015-9261"
}
],
"notes": [
{
"category": "general",
"text": "huft_build in archival/libarchive/decompress_gunzip.c in BusyBox before 1.27.2 misuses a pointer, causing segfaults and an application crash during an unzip operation on a specially crafted ZIP file.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 12 SP2-BCL:busybox-1.35.0-4.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:busybox-1.35.0-4.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:busybox-1.35.0-4.3.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:busybox-1.35.0-4.3.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:busybox-1.35.0-4.3.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:busybox-1.35.0-4.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:busybox-1.35.0-4.3.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:busybox-1.35.0-4.3.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:busybox-1.35.0-4.3.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:busybox-1.35.0-4.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:busybox-1.35.0-4.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:busybox-1.35.0-4.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:busybox-1.35.0-4.3.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:busybox-1.35.0-4.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:busybox-1.35.0-4.3.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:busybox-1.35.0-4.3.1.x86_64",
"SUSE OpenStack Cloud 9:busybox-1.35.0-4.3.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:busybox-1.35.0-4.3.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2015-9261",
"url": "https://www.suse.com/security/cve/CVE-2015-9261"
},
{
"category": "external",
"summary": "SUSE Bug 1102912 for CVE-2015-9261",
"url": "https://bugzilla.suse.com/1102912"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 12 SP2-BCL:busybox-1.35.0-4.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:busybox-1.35.0-4.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:busybox-1.35.0-4.3.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:busybox-1.35.0-4.3.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:busybox-1.35.0-4.3.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:busybox-1.35.0-4.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:busybox-1.35.0-4.3.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:busybox-1.35.0-4.3.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:busybox-1.35.0-4.3.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:busybox-1.35.0-4.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:busybox-1.35.0-4.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:busybox-1.35.0-4.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:busybox-1.35.0-4.3.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:busybox-1.35.0-4.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:busybox-1.35.0-4.3.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:busybox-1.35.0-4.3.1.x86_64",
"SUSE OpenStack Cloud 9:busybox-1.35.0-4.3.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:busybox-1.35.0-4.3.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise Server 12 SP2-BCL:busybox-1.35.0-4.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:busybox-1.35.0-4.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:busybox-1.35.0-4.3.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:busybox-1.35.0-4.3.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:busybox-1.35.0-4.3.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:busybox-1.35.0-4.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:busybox-1.35.0-4.3.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:busybox-1.35.0-4.3.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:busybox-1.35.0-4.3.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:busybox-1.35.0-4.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:busybox-1.35.0-4.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:busybox-1.35.0-4.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:busybox-1.35.0-4.3.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:busybox-1.35.0-4.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:busybox-1.35.0-4.3.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:busybox-1.35.0-4.3.1.x86_64",
"SUSE OpenStack Cloud 9:busybox-1.35.0-4.3.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:busybox-1.35.0-4.3.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-11-28T10:23:47Z",
"details": "low"
}
],
"title": "CVE-2015-9261"
},
{
"cve": "CVE-2016-2147",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2016-2147"
}
],
"notes": [
{
"category": "general",
"text": "Integer overflow in the DHCP client (udhcpc) in BusyBox before 1.25.0 allows remote attackers to cause a denial of service (crash) via a malformed RFC1035-encoded domain name, which triggers an out-of-bounds heap write.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 12 SP2-BCL:busybox-1.35.0-4.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:busybox-1.35.0-4.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:busybox-1.35.0-4.3.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:busybox-1.35.0-4.3.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:busybox-1.35.0-4.3.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:busybox-1.35.0-4.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:busybox-1.35.0-4.3.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:busybox-1.35.0-4.3.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:busybox-1.35.0-4.3.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:busybox-1.35.0-4.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:busybox-1.35.0-4.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:busybox-1.35.0-4.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:busybox-1.35.0-4.3.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:busybox-1.35.0-4.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:busybox-1.35.0-4.3.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:busybox-1.35.0-4.3.1.x86_64",
"SUSE OpenStack Cloud 9:busybox-1.35.0-4.3.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:busybox-1.35.0-4.3.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2016-2147",
"url": "https://www.suse.com/security/cve/CVE-2016-2147"
},
{
"category": "external",
"summary": "SUSE Bug 970663 for CVE-2016-2147",
"url": "https://bugzilla.suse.com/970663"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 12 SP2-BCL:busybox-1.35.0-4.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:busybox-1.35.0-4.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:busybox-1.35.0-4.3.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:busybox-1.35.0-4.3.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:busybox-1.35.0-4.3.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:busybox-1.35.0-4.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:busybox-1.35.0-4.3.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:busybox-1.35.0-4.3.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:busybox-1.35.0-4.3.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:busybox-1.35.0-4.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:busybox-1.35.0-4.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:busybox-1.35.0-4.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:busybox-1.35.0-4.3.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:busybox-1.35.0-4.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:busybox-1.35.0-4.3.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:busybox-1.35.0-4.3.1.x86_64",
"SUSE OpenStack Cloud 9:busybox-1.35.0-4.3.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:busybox-1.35.0-4.3.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 12 SP2-BCL:busybox-1.35.0-4.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:busybox-1.35.0-4.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:busybox-1.35.0-4.3.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:busybox-1.35.0-4.3.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:busybox-1.35.0-4.3.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:busybox-1.35.0-4.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:busybox-1.35.0-4.3.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:busybox-1.35.0-4.3.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:busybox-1.35.0-4.3.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:busybox-1.35.0-4.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:busybox-1.35.0-4.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:busybox-1.35.0-4.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:busybox-1.35.0-4.3.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:busybox-1.35.0-4.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:busybox-1.35.0-4.3.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:busybox-1.35.0-4.3.1.x86_64",
"SUSE OpenStack Cloud 9:busybox-1.35.0-4.3.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:busybox-1.35.0-4.3.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-11-28T10:23:47Z",
"details": "important"
}
],
"title": "CVE-2016-2147"
},
{
"cve": "CVE-2016-2148",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2016-2148"
}
],
"notes": [
{
"category": "general",
"text": "Heap-based buffer overflow in the DHCP client (udhcpc) in BusyBox before 1.25.0 allows remote attackers to have unspecified impact via vectors involving OPTION_6RD parsing.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 12 SP2-BCL:busybox-1.35.0-4.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:busybox-1.35.0-4.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:busybox-1.35.0-4.3.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:busybox-1.35.0-4.3.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:busybox-1.35.0-4.3.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:busybox-1.35.0-4.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:busybox-1.35.0-4.3.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:busybox-1.35.0-4.3.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:busybox-1.35.0-4.3.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:busybox-1.35.0-4.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:busybox-1.35.0-4.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:busybox-1.35.0-4.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:busybox-1.35.0-4.3.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:busybox-1.35.0-4.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:busybox-1.35.0-4.3.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:busybox-1.35.0-4.3.1.x86_64",
"SUSE OpenStack Cloud 9:busybox-1.35.0-4.3.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:busybox-1.35.0-4.3.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2016-2148",
"url": "https://www.suse.com/security/cve/CVE-2016-2148"
},
{
"category": "external",
"summary": "SUSE Bug 970662 for CVE-2016-2148",
"url": "https://bugzilla.suse.com/970662"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 12 SP2-BCL:busybox-1.35.0-4.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:busybox-1.35.0-4.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:busybox-1.35.0-4.3.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:busybox-1.35.0-4.3.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:busybox-1.35.0-4.3.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:busybox-1.35.0-4.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:busybox-1.35.0-4.3.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:busybox-1.35.0-4.3.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:busybox-1.35.0-4.3.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:busybox-1.35.0-4.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:busybox-1.35.0-4.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:busybox-1.35.0-4.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:busybox-1.35.0-4.3.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:busybox-1.35.0-4.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:busybox-1.35.0-4.3.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:busybox-1.35.0-4.3.1.x86_64",
"SUSE OpenStack Cloud 9:busybox-1.35.0-4.3.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:busybox-1.35.0-4.3.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 12 SP2-BCL:busybox-1.35.0-4.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:busybox-1.35.0-4.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:busybox-1.35.0-4.3.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:busybox-1.35.0-4.3.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:busybox-1.35.0-4.3.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:busybox-1.35.0-4.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:busybox-1.35.0-4.3.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:busybox-1.35.0-4.3.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:busybox-1.35.0-4.3.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:busybox-1.35.0-4.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:busybox-1.35.0-4.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:busybox-1.35.0-4.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:busybox-1.35.0-4.3.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:busybox-1.35.0-4.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:busybox-1.35.0-4.3.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:busybox-1.35.0-4.3.1.x86_64",
"SUSE OpenStack Cloud 9:busybox-1.35.0-4.3.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:busybox-1.35.0-4.3.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-11-28T10:23:47Z",
"details": "moderate"
}
],
"title": "CVE-2016-2148"
},
{
"cve": "CVE-2016-6301",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2016-6301"
}
],
"notes": [
{
"category": "general",
"text": "The recv_and_process_client_pkt function in networking/ntpd.c in busybox allows remote attackers to cause a denial of service (CPU and bandwidth consumption) via a forged NTP packet, which triggers a communication loop.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 12 SP2-BCL:busybox-1.35.0-4.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:busybox-1.35.0-4.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:busybox-1.35.0-4.3.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:busybox-1.35.0-4.3.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:busybox-1.35.0-4.3.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:busybox-1.35.0-4.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:busybox-1.35.0-4.3.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:busybox-1.35.0-4.3.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:busybox-1.35.0-4.3.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:busybox-1.35.0-4.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:busybox-1.35.0-4.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:busybox-1.35.0-4.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:busybox-1.35.0-4.3.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:busybox-1.35.0-4.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:busybox-1.35.0-4.3.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:busybox-1.35.0-4.3.1.x86_64",
"SUSE OpenStack Cloud 9:busybox-1.35.0-4.3.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:busybox-1.35.0-4.3.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2016-6301",
"url": "https://www.suse.com/security/cve/CVE-2016-6301"
},
{
"category": "external",
"summary": "SUSE Bug 991940 for CVE-2016-6301",
"url": "https://bugzilla.suse.com/991940"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 12 SP2-BCL:busybox-1.35.0-4.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:busybox-1.35.0-4.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:busybox-1.35.0-4.3.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:busybox-1.35.0-4.3.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:busybox-1.35.0-4.3.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:busybox-1.35.0-4.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:busybox-1.35.0-4.3.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:busybox-1.35.0-4.3.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:busybox-1.35.0-4.3.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:busybox-1.35.0-4.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:busybox-1.35.0-4.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:busybox-1.35.0-4.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:busybox-1.35.0-4.3.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:busybox-1.35.0-4.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:busybox-1.35.0-4.3.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:busybox-1.35.0-4.3.1.x86_64",
"SUSE OpenStack Cloud 9:busybox-1.35.0-4.3.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:busybox-1.35.0-4.3.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise Server 12 SP2-BCL:busybox-1.35.0-4.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:busybox-1.35.0-4.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:busybox-1.35.0-4.3.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:busybox-1.35.0-4.3.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:busybox-1.35.0-4.3.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:busybox-1.35.0-4.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:busybox-1.35.0-4.3.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:busybox-1.35.0-4.3.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:busybox-1.35.0-4.3.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:busybox-1.35.0-4.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:busybox-1.35.0-4.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:busybox-1.35.0-4.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:busybox-1.35.0-4.3.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:busybox-1.35.0-4.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:busybox-1.35.0-4.3.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:busybox-1.35.0-4.3.1.x86_64",
"SUSE OpenStack Cloud 9:busybox-1.35.0-4.3.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:busybox-1.35.0-4.3.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-11-28T10:23:47Z",
"details": "moderate"
}
],
"title": "CVE-2016-6301"
},
{
"cve": "CVE-2017-15873",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2017-15873"
}
],
"notes": [
{
"category": "general",
"text": "The get_next_block function in archival/libarchive/decompress_bunzip2.c in BusyBox 1.27.2 has an Integer Overflow that may lead to a write access violation.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 12 SP2-BCL:busybox-1.35.0-4.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:busybox-1.35.0-4.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:busybox-1.35.0-4.3.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:busybox-1.35.0-4.3.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:busybox-1.35.0-4.3.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:busybox-1.35.0-4.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:busybox-1.35.0-4.3.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:busybox-1.35.0-4.3.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:busybox-1.35.0-4.3.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:busybox-1.35.0-4.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:busybox-1.35.0-4.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:busybox-1.35.0-4.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:busybox-1.35.0-4.3.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:busybox-1.35.0-4.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:busybox-1.35.0-4.3.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:busybox-1.35.0-4.3.1.x86_64",
"SUSE OpenStack Cloud 9:busybox-1.35.0-4.3.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:busybox-1.35.0-4.3.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2017-15873",
"url": "https://www.suse.com/security/cve/CVE-2017-15873"
},
{
"category": "external",
"summary": "SUSE Bug 1064976 for CVE-2017-15873",
"url": "https://bugzilla.suse.com/1064976"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 12 SP2-BCL:busybox-1.35.0-4.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:busybox-1.35.0-4.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:busybox-1.35.0-4.3.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:busybox-1.35.0-4.3.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:busybox-1.35.0-4.3.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:busybox-1.35.0-4.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:busybox-1.35.0-4.3.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:busybox-1.35.0-4.3.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:busybox-1.35.0-4.3.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:busybox-1.35.0-4.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:busybox-1.35.0-4.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:busybox-1.35.0-4.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:busybox-1.35.0-4.3.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:busybox-1.35.0-4.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:busybox-1.35.0-4.3.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:busybox-1.35.0-4.3.1.x86_64",
"SUSE OpenStack Cloud 9:busybox-1.35.0-4.3.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:busybox-1.35.0-4.3.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise Server 12 SP2-BCL:busybox-1.35.0-4.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:busybox-1.35.0-4.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:busybox-1.35.0-4.3.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:busybox-1.35.0-4.3.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:busybox-1.35.0-4.3.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:busybox-1.35.0-4.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:busybox-1.35.0-4.3.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:busybox-1.35.0-4.3.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:busybox-1.35.0-4.3.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:busybox-1.35.0-4.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:busybox-1.35.0-4.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:busybox-1.35.0-4.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:busybox-1.35.0-4.3.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:busybox-1.35.0-4.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:busybox-1.35.0-4.3.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:busybox-1.35.0-4.3.1.x86_64",
"SUSE OpenStack Cloud 9:busybox-1.35.0-4.3.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:busybox-1.35.0-4.3.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-11-28T10:23:47Z",
"details": "moderate"
}
],
"title": "CVE-2017-15873"
},
{
"cve": "CVE-2017-15874",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2017-15874"
}
],
"notes": [
{
"category": "general",
"text": "archival/libarchive/decompress_unlzma.c in BusyBox 1.27.2 has an Integer Underflow that leads to a read access violation.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 12 SP2-BCL:busybox-1.35.0-4.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:busybox-1.35.0-4.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:busybox-1.35.0-4.3.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:busybox-1.35.0-4.3.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:busybox-1.35.0-4.3.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:busybox-1.35.0-4.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:busybox-1.35.0-4.3.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:busybox-1.35.0-4.3.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:busybox-1.35.0-4.3.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:busybox-1.35.0-4.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:busybox-1.35.0-4.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:busybox-1.35.0-4.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:busybox-1.35.0-4.3.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:busybox-1.35.0-4.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:busybox-1.35.0-4.3.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:busybox-1.35.0-4.3.1.x86_64",
"SUSE OpenStack Cloud 9:busybox-1.35.0-4.3.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:busybox-1.35.0-4.3.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2017-15874",
"url": "https://www.suse.com/security/cve/CVE-2017-15874"
},
{
"category": "external",
"summary": "SUSE Bug 1064978 for CVE-2017-15874",
"url": "https://bugzilla.suse.com/1064978"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 12 SP2-BCL:busybox-1.35.0-4.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:busybox-1.35.0-4.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:busybox-1.35.0-4.3.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:busybox-1.35.0-4.3.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:busybox-1.35.0-4.3.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:busybox-1.35.0-4.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:busybox-1.35.0-4.3.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:busybox-1.35.0-4.3.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:busybox-1.35.0-4.3.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:busybox-1.35.0-4.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:busybox-1.35.0-4.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:busybox-1.35.0-4.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:busybox-1.35.0-4.3.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:busybox-1.35.0-4.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:busybox-1.35.0-4.3.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:busybox-1.35.0-4.3.1.x86_64",
"SUSE OpenStack Cloud 9:busybox-1.35.0-4.3.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:busybox-1.35.0-4.3.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 3.3,
"baseSeverity": "LOW",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise Server 12 SP2-BCL:busybox-1.35.0-4.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:busybox-1.35.0-4.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:busybox-1.35.0-4.3.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:busybox-1.35.0-4.3.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:busybox-1.35.0-4.3.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:busybox-1.35.0-4.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:busybox-1.35.0-4.3.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:busybox-1.35.0-4.3.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:busybox-1.35.0-4.3.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:busybox-1.35.0-4.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:busybox-1.35.0-4.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:busybox-1.35.0-4.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:busybox-1.35.0-4.3.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:busybox-1.35.0-4.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:busybox-1.35.0-4.3.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:busybox-1.35.0-4.3.1.x86_64",
"SUSE OpenStack Cloud 9:busybox-1.35.0-4.3.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:busybox-1.35.0-4.3.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-11-28T10:23:47Z",
"details": "low"
}
],
"title": "CVE-2017-15874"
},
{
"cve": "CVE-2017-16544",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2017-16544"
}
],
"notes": [
{
"category": "general",
"text": "In the add_match function in libbb/lineedit.c in BusyBox through 1.27.2, the tab autocomplete feature of the shell, used to get a list of filenames in a directory, does not sanitize filenames and results in executing any escape sequence in the terminal. This could potentially result in code execution, arbitrary file writes, or other attacks.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 12 SP2-BCL:busybox-1.35.0-4.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:busybox-1.35.0-4.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:busybox-1.35.0-4.3.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:busybox-1.35.0-4.3.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:busybox-1.35.0-4.3.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:busybox-1.35.0-4.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:busybox-1.35.0-4.3.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:busybox-1.35.0-4.3.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:busybox-1.35.0-4.3.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:busybox-1.35.0-4.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:busybox-1.35.0-4.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:busybox-1.35.0-4.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:busybox-1.35.0-4.3.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:busybox-1.35.0-4.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:busybox-1.35.0-4.3.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:busybox-1.35.0-4.3.1.x86_64",
"SUSE OpenStack Cloud 9:busybox-1.35.0-4.3.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:busybox-1.35.0-4.3.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2017-16544",
"url": "https://www.suse.com/security/cve/CVE-2017-16544"
},
{
"category": "external",
"summary": "SUSE Bug 1069412 for CVE-2017-16544",
"url": "https://bugzilla.suse.com/1069412"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 12 SP2-BCL:busybox-1.35.0-4.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:busybox-1.35.0-4.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:busybox-1.35.0-4.3.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:busybox-1.35.0-4.3.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:busybox-1.35.0-4.3.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:busybox-1.35.0-4.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:busybox-1.35.0-4.3.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:busybox-1.35.0-4.3.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:busybox-1.35.0-4.3.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:busybox-1.35.0-4.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:busybox-1.35.0-4.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:busybox-1.35.0-4.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:busybox-1.35.0-4.3.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:busybox-1.35.0-4.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:busybox-1.35.0-4.3.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:busybox-1.35.0-4.3.1.x86_64",
"SUSE OpenStack Cloud 9:busybox-1.35.0-4.3.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:busybox-1.35.0-4.3.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise Server 12 SP2-BCL:busybox-1.35.0-4.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:busybox-1.35.0-4.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:busybox-1.35.0-4.3.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:busybox-1.35.0-4.3.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:busybox-1.35.0-4.3.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:busybox-1.35.0-4.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:busybox-1.35.0-4.3.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:busybox-1.35.0-4.3.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:busybox-1.35.0-4.3.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:busybox-1.35.0-4.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:busybox-1.35.0-4.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:busybox-1.35.0-4.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:busybox-1.35.0-4.3.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:busybox-1.35.0-4.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:busybox-1.35.0-4.3.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:busybox-1.35.0-4.3.1.x86_64",
"SUSE OpenStack Cloud 9:busybox-1.35.0-4.3.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:busybox-1.35.0-4.3.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-11-28T10:23:47Z",
"details": "moderate"
}
],
"title": "CVE-2017-16544"
},
{
"cve": "CVE-2018-1000500",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2018-1000500"
}
],
"notes": [
{
"category": "general",
"text": "Busybox contains a Missing SSL certificate validation vulnerability in The \"busybox wget\" applet that can result in arbitrary code execution. This attack appear to be exploitable via Simply download any file over HTTPS using \"busybox wget https://compromised-domain.com/important-file\".",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 12 SP2-BCL:busybox-1.35.0-4.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:busybox-1.35.0-4.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:busybox-1.35.0-4.3.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:busybox-1.35.0-4.3.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:busybox-1.35.0-4.3.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:busybox-1.35.0-4.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:busybox-1.35.0-4.3.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:busybox-1.35.0-4.3.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:busybox-1.35.0-4.3.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:busybox-1.35.0-4.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:busybox-1.35.0-4.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:busybox-1.35.0-4.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:busybox-1.35.0-4.3.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:busybox-1.35.0-4.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:busybox-1.35.0-4.3.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:busybox-1.35.0-4.3.1.x86_64",
"SUSE OpenStack Cloud 9:busybox-1.35.0-4.3.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:busybox-1.35.0-4.3.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2018-1000500",
"url": "https://www.suse.com/security/cve/CVE-2018-1000500"
},
{
"category": "external",
"summary": "SUSE Bug 1099263 for CVE-2018-1000500",
"url": "https://bugzilla.suse.com/1099263"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 12 SP2-BCL:busybox-1.35.0-4.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:busybox-1.35.0-4.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:busybox-1.35.0-4.3.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:busybox-1.35.0-4.3.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:busybox-1.35.0-4.3.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:busybox-1.35.0-4.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:busybox-1.35.0-4.3.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:busybox-1.35.0-4.3.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:busybox-1.35.0-4.3.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:busybox-1.35.0-4.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:busybox-1.35.0-4.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:busybox-1.35.0-4.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:busybox-1.35.0-4.3.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:busybox-1.35.0-4.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:busybox-1.35.0-4.3.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:busybox-1.35.0-4.3.1.x86_64",
"SUSE OpenStack Cloud 9:busybox-1.35.0-4.3.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:busybox-1.35.0-4.3.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise Server 12 SP2-BCL:busybox-1.35.0-4.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:busybox-1.35.0-4.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:busybox-1.35.0-4.3.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:busybox-1.35.0-4.3.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:busybox-1.35.0-4.3.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:busybox-1.35.0-4.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:busybox-1.35.0-4.3.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:busybox-1.35.0-4.3.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:busybox-1.35.0-4.3.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:busybox-1.35.0-4.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:busybox-1.35.0-4.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:busybox-1.35.0-4.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:busybox-1.35.0-4.3.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:busybox-1.35.0-4.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:busybox-1.35.0-4.3.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:busybox-1.35.0-4.3.1.x86_64",
"SUSE OpenStack Cloud 9:busybox-1.35.0-4.3.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:busybox-1.35.0-4.3.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-11-28T10:23:47Z",
"details": "important"
}
],
"title": "CVE-2018-1000500"
},
{
"cve": "CVE-2018-1000517",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2018-1000517"
}
],
"notes": [
{
"category": "general",
"text": "BusyBox project BusyBox wget version prior to commit 8e2174e9bd836e53c8b9c6e00d1bc6e2a718686e contains a Buffer Overflow vulnerability in Busybox wget that can result in heap buffer overflow. This attack appear to be exploitable via network connectivity. This vulnerability appears to have been fixed in after commit 8e2174e9bd836e53c8b9c6e00d1bc6e2a718686e.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 12 SP2-BCL:busybox-1.35.0-4.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:busybox-1.35.0-4.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:busybox-1.35.0-4.3.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:busybox-1.35.0-4.3.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:busybox-1.35.0-4.3.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:busybox-1.35.0-4.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:busybox-1.35.0-4.3.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:busybox-1.35.0-4.3.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:busybox-1.35.0-4.3.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:busybox-1.35.0-4.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:busybox-1.35.0-4.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:busybox-1.35.0-4.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:busybox-1.35.0-4.3.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:busybox-1.35.0-4.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:busybox-1.35.0-4.3.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:busybox-1.35.0-4.3.1.x86_64",
"SUSE OpenStack Cloud 9:busybox-1.35.0-4.3.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:busybox-1.35.0-4.3.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2018-1000517",
"url": "https://www.suse.com/security/cve/CVE-2018-1000517"
},
{
"category": "external",
"summary": "SUSE Bug 1099260 for CVE-2018-1000517",
"url": "https://bugzilla.suse.com/1099260"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 12 SP2-BCL:busybox-1.35.0-4.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:busybox-1.35.0-4.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:busybox-1.35.0-4.3.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:busybox-1.35.0-4.3.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:busybox-1.35.0-4.3.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:busybox-1.35.0-4.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:busybox-1.35.0-4.3.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:busybox-1.35.0-4.3.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:busybox-1.35.0-4.3.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:busybox-1.35.0-4.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:busybox-1.35.0-4.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:busybox-1.35.0-4.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:busybox-1.35.0-4.3.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:busybox-1.35.0-4.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:busybox-1.35.0-4.3.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:busybox-1.35.0-4.3.1.x86_64",
"SUSE OpenStack Cloud 9:busybox-1.35.0-4.3.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:busybox-1.35.0-4.3.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.6,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise Server 12 SP2-BCL:busybox-1.35.0-4.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:busybox-1.35.0-4.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:busybox-1.35.0-4.3.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:busybox-1.35.0-4.3.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:busybox-1.35.0-4.3.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:busybox-1.35.0-4.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:busybox-1.35.0-4.3.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:busybox-1.35.0-4.3.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:busybox-1.35.0-4.3.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:busybox-1.35.0-4.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:busybox-1.35.0-4.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:busybox-1.35.0-4.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:busybox-1.35.0-4.3.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:busybox-1.35.0-4.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:busybox-1.35.0-4.3.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:busybox-1.35.0-4.3.1.x86_64",
"SUSE OpenStack Cloud 9:busybox-1.35.0-4.3.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:busybox-1.35.0-4.3.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-11-28T10:23:47Z",
"details": "important"
}
],
"title": "CVE-2018-1000517"
},
{
"cve": "CVE-2018-20679",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2018-20679"
}
],
"notes": [
{
"category": "general",
"text": "An issue was discovered in BusyBox before 1.30.0. An out of bounds read in udhcp components (consumed by the DHCP server, client, and relay) allows a remote attacker to leak sensitive information from the stack by sending a crafted DHCP message. This is related to verification in udhcp_get_option() in networking/udhcp/common.c that 4-byte options are indeed 4 bytes.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 12 SP2-BCL:busybox-1.35.0-4.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:busybox-1.35.0-4.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:busybox-1.35.0-4.3.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:busybox-1.35.0-4.3.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:busybox-1.35.0-4.3.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:busybox-1.35.0-4.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:busybox-1.35.0-4.3.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:busybox-1.35.0-4.3.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:busybox-1.35.0-4.3.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:busybox-1.35.0-4.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:busybox-1.35.0-4.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:busybox-1.35.0-4.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:busybox-1.35.0-4.3.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:busybox-1.35.0-4.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:busybox-1.35.0-4.3.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:busybox-1.35.0-4.3.1.x86_64",
"SUSE OpenStack Cloud 9:busybox-1.35.0-4.3.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:busybox-1.35.0-4.3.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2018-20679",
"url": "https://www.suse.com/security/cve/CVE-2018-20679"
},
{
"category": "external",
"summary": "SUSE Bug 1121426 for CVE-2018-20679",
"url": "https://bugzilla.suse.com/1121426"
},
{
"category": "external",
"summary": "SUSE Bug 1121428 for CVE-2018-20679",
"url": "https://bugzilla.suse.com/1121428"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 12 SP2-BCL:busybox-1.35.0-4.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:busybox-1.35.0-4.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:busybox-1.35.0-4.3.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:busybox-1.35.0-4.3.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:busybox-1.35.0-4.3.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:busybox-1.35.0-4.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:busybox-1.35.0-4.3.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:busybox-1.35.0-4.3.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:busybox-1.35.0-4.3.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:busybox-1.35.0-4.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:busybox-1.35.0-4.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:busybox-1.35.0-4.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:busybox-1.35.0-4.3.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:busybox-1.35.0-4.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:busybox-1.35.0-4.3.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:busybox-1.35.0-4.3.1.x86_64",
"SUSE OpenStack Cloud 9:busybox-1.35.0-4.3.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:busybox-1.35.0-4.3.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise Server 12 SP2-BCL:busybox-1.35.0-4.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:busybox-1.35.0-4.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:busybox-1.35.0-4.3.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:busybox-1.35.0-4.3.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:busybox-1.35.0-4.3.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:busybox-1.35.0-4.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:busybox-1.35.0-4.3.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:busybox-1.35.0-4.3.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:busybox-1.35.0-4.3.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:busybox-1.35.0-4.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:busybox-1.35.0-4.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:busybox-1.35.0-4.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:busybox-1.35.0-4.3.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:busybox-1.35.0-4.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:busybox-1.35.0-4.3.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:busybox-1.35.0-4.3.1.x86_64",
"SUSE OpenStack Cloud 9:busybox-1.35.0-4.3.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:busybox-1.35.0-4.3.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-11-28T10:23:47Z",
"details": "moderate"
}
],
"title": "CVE-2018-20679"
},
{
"cve": "CVE-2019-5747",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-5747"
}
],
"notes": [
{
"category": "general",
"text": "An issue was discovered in BusyBox through 1.30.0. An out of bounds read in udhcp components (consumed by the DHCP client, server, and/or relay) might allow a remote attacker to leak sensitive information from the stack by sending a crafted DHCP message. This is related to assurance of a 4-byte length when decoding DHCP_SUBNET. NOTE: this issue exists because of an incomplete fix for CVE-2018-20679.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 12 SP2-BCL:busybox-1.35.0-4.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:busybox-1.35.0-4.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:busybox-1.35.0-4.3.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:busybox-1.35.0-4.3.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:busybox-1.35.0-4.3.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:busybox-1.35.0-4.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:busybox-1.35.0-4.3.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:busybox-1.35.0-4.3.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:busybox-1.35.0-4.3.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:busybox-1.35.0-4.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:busybox-1.35.0-4.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:busybox-1.35.0-4.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:busybox-1.35.0-4.3.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:busybox-1.35.0-4.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:busybox-1.35.0-4.3.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:busybox-1.35.0-4.3.1.x86_64",
"SUSE OpenStack Cloud 9:busybox-1.35.0-4.3.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:busybox-1.35.0-4.3.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-5747",
"url": "https://www.suse.com/security/cve/CVE-2019-5747"
},
{
"category": "external",
"summary": "SUSE Bug 1121426 for CVE-2019-5747",
"url": "https://bugzilla.suse.com/1121426"
},
{
"category": "external",
"summary": "SUSE Bug 1121428 for CVE-2019-5747",
"url": "https://bugzilla.suse.com/1121428"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 12 SP2-BCL:busybox-1.35.0-4.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:busybox-1.35.0-4.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:busybox-1.35.0-4.3.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:busybox-1.35.0-4.3.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:busybox-1.35.0-4.3.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:busybox-1.35.0-4.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:busybox-1.35.0-4.3.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:busybox-1.35.0-4.3.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:busybox-1.35.0-4.3.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:busybox-1.35.0-4.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:busybox-1.35.0-4.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:busybox-1.35.0-4.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:busybox-1.35.0-4.3.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:busybox-1.35.0-4.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:busybox-1.35.0-4.3.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:busybox-1.35.0-4.3.1.x86_64",
"SUSE OpenStack Cloud 9:busybox-1.35.0-4.3.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:busybox-1.35.0-4.3.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 3.5,
"baseSeverity": "LOW",
"vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 12 SP2-BCL:busybox-1.35.0-4.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:busybox-1.35.0-4.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:busybox-1.35.0-4.3.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:busybox-1.35.0-4.3.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:busybox-1.35.0-4.3.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:busybox-1.35.0-4.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:busybox-1.35.0-4.3.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:busybox-1.35.0-4.3.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:busybox-1.35.0-4.3.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:busybox-1.35.0-4.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:busybox-1.35.0-4.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:busybox-1.35.0-4.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:busybox-1.35.0-4.3.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:busybox-1.35.0-4.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:busybox-1.35.0-4.3.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:busybox-1.35.0-4.3.1.x86_64",
"SUSE OpenStack Cloud 9:busybox-1.35.0-4.3.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:busybox-1.35.0-4.3.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-11-28T10:23:47Z",
"details": "low"
}
],
"title": "CVE-2019-5747"
},
{
"cve": "CVE-2021-28831",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-28831"
}
],
"notes": [
{
"category": "general",
"text": "decompress_gunzip.c in BusyBox through 1.32.1 mishandles the error bit on the huft_build result pointer, with a resultant invalid free or segmentation fault, via malformed gzip data.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 12 SP2-BCL:busybox-1.35.0-4.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:busybox-1.35.0-4.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:busybox-1.35.0-4.3.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:busybox-1.35.0-4.3.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:busybox-1.35.0-4.3.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:busybox-1.35.0-4.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:busybox-1.35.0-4.3.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:busybox-1.35.0-4.3.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:busybox-1.35.0-4.3.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:busybox-1.35.0-4.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:busybox-1.35.0-4.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:busybox-1.35.0-4.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:busybox-1.35.0-4.3.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:busybox-1.35.0-4.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:busybox-1.35.0-4.3.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:busybox-1.35.0-4.3.1.x86_64",
"SUSE OpenStack Cloud 9:busybox-1.35.0-4.3.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:busybox-1.35.0-4.3.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-28831",
"url": "https://www.suse.com/security/cve/CVE-2021-28831"
},
{
"category": "external",
"summary": "SUSE Bug 1184522 for CVE-2021-28831",
"url": "https://bugzilla.suse.com/1184522"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 12 SP2-BCL:busybox-1.35.0-4.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:busybox-1.35.0-4.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:busybox-1.35.0-4.3.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:busybox-1.35.0-4.3.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:busybox-1.35.0-4.3.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:busybox-1.35.0-4.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:busybox-1.35.0-4.3.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:busybox-1.35.0-4.3.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:busybox-1.35.0-4.3.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:busybox-1.35.0-4.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:busybox-1.35.0-4.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:busybox-1.35.0-4.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:busybox-1.35.0-4.3.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:busybox-1.35.0-4.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:busybox-1.35.0-4.3.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:busybox-1.35.0-4.3.1.x86_64",
"SUSE OpenStack Cloud 9:busybox-1.35.0-4.3.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:busybox-1.35.0-4.3.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 12 SP2-BCL:busybox-1.35.0-4.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:busybox-1.35.0-4.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:busybox-1.35.0-4.3.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:busybox-1.35.0-4.3.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:busybox-1.35.0-4.3.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:busybox-1.35.0-4.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:busybox-1.35.0-4.3.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:busybox-1.35.0-4.3.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:busybox-1.35.0-4.3.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:busybox-1.35.0-4.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:busybox-1.35.0-4.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:busybox-1.35.0-4.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:busybox-1.35.0-4.3.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:busybox-1.35.0-4.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:busybox-1.35.0-4.3.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:busybox-1.35.0-4.3.1.x86_64",
"SUSE OpenStack Cloud 9:busybox-1.35.0-4.3.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:busybox-1.35.0-4.3.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-11-28T10:23:47Z",
"details": "important"
}
],
"title": "CVE-2021-28831"
},
{
"cve": "CVE-2021-42373",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-42373"
}
],
"notes": [
{
"category": "general",
"text": "A NULL pointer dereference in Busybox\u0027s man applet leads to denial of service when a section name is supplied but no page argument is given",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 12 SP2-BCL:busybox-1.35.0-4.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:busybox-1.35.0-4.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:busybox-1.35.0-4.3.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:busybox-1.35.0-4.3.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:busybox-1.35.0-4.3.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:busybox-1.35.0-4.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:busybox-1.35.0-4.3.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:busybox-1.35.0-4.3.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:busybox-1.35.0-4.3.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:busybox-1.35.0-4.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:busybox-1.35.0-4.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:busybox-1.35.0-4.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:busybox-1.35.0-4.3.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:busybox-1.35.0-4.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:busybox-1.35.0-4.3.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:busybox-1.35.0-4.3.1.x86_64",
"SUSE OpenStack Cloud 9:busybox-1.35.0-4.3.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:busybox-1.35.0-4.3.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-42373",
"url": "https://www.suse.com/security/cve/CVE-2021-42373"
},
{
"category": "external",
"summary": "SUSE Bug 1192869 for CVE-2021-42373",
"url": "https://bugzilla.suse.com/1192869"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 12 SP2-BCL:busybox-1.35.0-4.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:busybox-1.35.0-4.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:busybox-1.35.0-4.3.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:busybox-1.35.0-4.3.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:busybox-1.35.0-4.3.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:busybox-1.35.0-4.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:busybox-1.35.0-4.3.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:busybox-1.35.0-4.3.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:busybox-1.35.0-4.3.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:busybox-1.35.0-4.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:busybox-1.35.0-4.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:busybox-1.35.0-4.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:busybox-1.35.0-4.3.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:busybox-1.35.0-4.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:busybox-1.35.0-4.3.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:busybox-1.35.0-4.3.1.x86_64",
"SUSE OpenStack Cloud 9:busybox-1.35.0-4.3.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:busybox-1.35.0-4.3.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 12 SP2-BCL:busybox-1.35.0-4.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:busybox-1.35.0-4.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:busybox-1.35.0-4.3.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:busybox-1.35.0-4.3.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:busybox-1.35.0-4.3.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:busybox-1.35.0-4.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:busybox-1.35.0-4.3.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:busybox-1.35.0-4.3.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:busybox-1.35.0-4.3.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:busybox-1.35.0-4.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:busybox-1.35.0-4.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:busybox-1.35.0-4.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:busybox-1.35.0-4.3.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:busybox-1.35.0-4.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:busybox-1.35.0-4.3.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:busybox-1.35.0-4.3.1.x86_64",
"SUSE OpenStack Cloud 9:busybox-1.35.0-4.3.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:busybox-1.35.0-4.3.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-11-28T10:23:47Z",
"details": "moderate"
}
],
"title": "CVE-2021-42373"
},
{
"cve": "CVE-2021-42374",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-42374"
}
],
"notes": [
{
"category": "general",
"text": "An out-of-bounds heap read in Busybox\u0027s unlzma applet leads to information leak and denial of service when crafted LZMA-compressed input is decompressed. This can be triggered by any applet/format that",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 12 SP2-BCL:busybox-1.35.0-4.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:busybox-1.35.0-4.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:busybox-1.35.0-4.3.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:busybox-1.35.0-4.3.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:busybox-1.35.0-4.3.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:busybox-1.35.0-4.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:busybox-1.35.0-4.3.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:busybox-1.35.0-4.3.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:busybox-1.35.0-4.3.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:busybox-1.35.0-4.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:busybox-1.35.0-4.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:busybox-1.35.0-4.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:busybox-1.35.0-4.3.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:busybox-1.35.0-4.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:busybox-1.35.0-4.3.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:busybox-1.35.0-4.3.1.x86_64",
"SUSE OpenStack Cloud 9:busybox-1.35.0-4.3.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:busybox-1.35.0-4.3.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-42374",
"url": "https://www.suse.com/security/cve/CVE-2021-42374"
},
{
"category": "external",
"summary": "SUSE Bug 1192869 for CVE-2021-42374",
"url": "https://bugzilla.suse.com/1192869"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 12 SP2-BCL:busybox-1.35.0-4.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:busybox-1.35.0-4.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:busybox-1.35.0-4.3.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:busybox-1.35.0-4.3.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:busybox-1.35.0-4.3.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:busybox-1.35.0-4.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:busybox-1.35.0-4.3.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:busybox-1.35.0-4.3.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:busybox-1.35.0-4.3.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:busybox-1.35.0-4.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:busybox-1.35.0-4.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:busybox-1.35.0-4.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:busybox-1.35.0-4.3.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:busybox-1.35.0-4.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:busybox-1.35.0-4.3.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:busybox-1.35.0-4.3.1.x86_64",
"SUSE OpenStack Cloud 9:busybox-1.35.0-4.3.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:busybox-1.35.0-4.3.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.7,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 12 SP2-BCL:busybox-1.35.0-4.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:busybox-1.35.0-4.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:busybox-1.35.0-4.3.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:busybox-1.35.0-4.3.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:busybox-1.35.0-4.3.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:busybox-1.35.0-4.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:busybox-1.35.0-4.3.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:busybox-1.35.0-4.3.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:busybox-1.35.0-4.3.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:busybox-1.35.0-4.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:busybox-1.35.0-4.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:busybox-1.35.0-4.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:busybox-1.35.0-4.3.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:busybox-1.35.0-4.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:busybox-1.35.0-4.3.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:busybox-1.35.0-4.3.1.x86_64",
"SUSE OpenStack Cloud 9:busybox-1.35.0-4.3.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:busybox-1.35.0-4.3.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-11-28T10:23:47Z",
"details": "moderate"
}
],
"title": "CVE-2021-42374"
},
{
"cve": "CVE-2021-42375",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-42375"
}
],
"notes": [
{
"category": "general",
"text": "An incorrect handling of a special element in Busybox\u0027s ash applet leads to denial of service when processing a crafted shell command, due to the shell mistaking specific characters for reserved characters. This may be used for DoS under rare conditions of filtered command input.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 12 SP2-BCL:busybox-1.35.0-4.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:busybox-1.35.0-4.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:busybox-1.35.0-4.3.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:busybox-1.35.0-4.3.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:busybox-1.35.0-4.3.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:busybox-1.35.0-4.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:busybox-1.35.0-4.3.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:busybox-1.35.0-4.3.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:busybox-1.35.0-4.3.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:busybox-1.35.0-4.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:busybox-1.35.0-4.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:busybox-1.35.0-4.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:busybox-1.35.0-4.3.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:busybox-1.35.0-4.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:busybox-1.35.0-4.3.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:busybox-1.35.0-4.3.1.x86_64",
"SUSE OpenStack Cloud 9:busybox-1.35.0-4.3.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:busybox-1.35.0-4.3.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-42375",
"url": "https://www.suse.com/security/cve/CVE-2021-42375"
},
{
"category": "external",
"summary": "SUSE Bug 1192869 for CVE-2021-42375",
"url": "https://bugzilla.suse.com/1192869"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 12 SP2-BCL:busybox-1.35.0-4.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:busybox-1.35.0-4.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:busybox-1.35.0-4.3.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:busybox-1.35.0-4.3.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:busybox-1.35.0-4.3.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:busybox-1.35.0-4.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:busybox-1.35.0-4.3.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:busybox-1.35.0-4.3.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:busybox-1.35.0-4.3.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:busybox-1.35.0-4.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:busybox-1.35.0-4.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:busybox-1.35.0-4.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:busybox-1.35.0-4.3.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:busybox-1.35.0-4.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:busybox-1.35.0-4.3.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:busybox-1.35.0-4.3.1.x86_64",
"SUSE OpenStack Cloud 9:busybox-1.35.0-4.3.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:busybox-1.35.0-4.3.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.1,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 12 SP2-BCL:busybox-1.35.0-4.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:busybox-1.35.0-4.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:busybox-1.35.0-4.3.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:busybox-1.35.0-4.3.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:busybox-1.35.0-4.3.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:busybox-1.35.0-4.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:busybox-1.35.0-4.3.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:busybox-1.35.0-4.3.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:busybox-1.35.0-4.3.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:busybox-1.35.0-4.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:busybox-1.35.0-4.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:busybox-1.35.0-4.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:busybox-1.35.0-4.3.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:busybox-1.35.0-4.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:busybox-1.35.0-4.3.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:busybox-1.35.0-4.3.1.x86_64",
"SUSE OpenStack Cloud 9:busybox-1.35.0-4.3.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:busybox-1.35.0-4.3.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-11-28T10:23:47Z",
"details": "moderate"
}
],
"title": "CVE-2021-42375"
},
{
"cve": "CVE-2021-42376",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-42376"
}
],
"notes": [
{
"category": "general",
"text": "A NULL pointer dereference in Busybox\u0027s hush applet leads to denial of service when processing a crafted shell command, due to missing validation after a \\x03 delimiter character. This may be used for DoS under very rare conditions of filtered command input.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 12 SP2-BCL:busybox-1.35.0-4.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:busybox-1.35.0-4.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:busybox-1.35.0-4.3.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:busybox-1.35.0-4.3.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:busybox-1.35.0-4.3.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:busybox-1.35.0-4.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:busybox-1.35.0-4.3.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:busybox-1.35.0-4.3.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:busybox-1.35.0-4.3.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:busybox-1.35.0-4.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:busybox-1.35.0-4.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:busybox-1.35.0-4.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:busybox-1.35.0-4.3.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:busybox-1.35.0-4.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:busybox-1.35.0-4.3.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:busybox-1.35.0-4.3.1.x86_64",
"SUSE OpenStack Cloud 9:busybox-1.35.0-4.3.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:busybox-1.35.0-4.3.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-42376",
"url": "https://www.suse.com/security/cve/CVE-2021-42376"
},
{
"category": "external",
"summary": "SUSE Bug 1192869 for CVE-2021-42376",
"url": "https://bugzilla.suse.com/1192869"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 12 SP2-BCL:busybox-1.35.0-4.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:busybox-1.35.0-4.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:busybox-1.35.0-4.3.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:busybox-1.35.0-4.3.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:busybox-1.35.0-4.3.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:busybox-1.35.0-4.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:busybox-1.35.0-4.3.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:busybox-1.35.0-4.3.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:busybox-1.35.0-4.3.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:busybox-1.35.0-4.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:busybox-1.35.0-4.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:busybox-1.35.0-4.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:busybox-1.35.0-4.3.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:busybox-1.35.0-4.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:busybox-1.35.0-4.3.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:busybox-1.35.0-4.3.1.x86_64",
"SUSE OpenStack Cloud 9:busybox-1.35.0-4.3.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:busybox-1.35.0-4.3.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.1,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 12 SP2-BCL:busybox-1.35.0-4.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:busybox-1.35.0-4.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:busybox-1.35.0-4.3.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:busybox-1.35.0-4.3.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:busybox-1.35.0-4.3.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:busybox-1.35.0-4.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:busybox-1.35.0-4.3.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:busybox-1.35.0-4.3.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:busybox-1.35.0-4.3.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:busybox-1.35.0-4.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:busybox-1.35.0-4.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:busybox-1.35.0-4.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:busybox-1.35.0-4.3.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:busybox-1.35.0-4.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:busybox-1.35.0-4.3.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:busybox-1.35.0-4.3.1.x86_64",
"SUSE OpenStack Cloud 9:busybox-1.35.0-4.3.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:busybox-1.35.0-4.3.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-11-28T10:23:47Z",
"details": "moderate"
}
],
"title": "CVE-2021-42376"
},
{
"cve": "CVE-2021-42377",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-42377"
}
],
"notes": [
{
"category": "general",
"text": "An attacker-controlled pointer free in Busybox\u0027s hush applet leads to denial of service and possible code execution when processing a crafted shell command, due to the shell mishandling the \u0026\u0026\u0026 string. This may be used for remote code execution under rare conditions of filtered command input.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 12 SP2-BCL:busybox-1.35.0-4.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:busybox-1.35.0-4.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:busybox-1.35.0-4.3.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:busybox-1.35.0-4.3.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:busybox-1.35.0-4.3.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:busybox-1.35.0-4.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:busybox-1.35.0-4.3.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:busybox-1.35.0-4.3.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:busybox-1.35.0-4.3.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:busybox-1.35.0-4.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:busybox-1.35.0-4.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:busybox-1.35.0-4.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:busybox-1.35.0-4.3.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:busybox-1.35.0-4.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:busybox-1.35.0-4.3.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:busybox-1.35.0-4.3.1.x86_64",
"SUSE OpenStack Cloud 9:busybox-1.35.0-4.3.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:busybox-1.35.0-4.3.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-42377",
"url": "https://www.suse.com/security/cve/CVE-2021-42377"
},
{
"category": "external",
"summary": "SUSE Bug 1192869 for CVE-2021-42377",
"url": "https://bugzilla.suse.com/1192869"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 12 SP2-BCL:busybox-1.35.0-4.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:busybox-1.35.0-4.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:busybox-1.35.0-4.3.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:busybox-1.35.0-4.3.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:busybox-1.35.0-4.3.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:busybox-1.35.0-4.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:busybox-1.35.0-4.3.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:busybox-1.35.0-4.3.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:busybox-1.35.0-4.3.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:busybox-1.35.0-4.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:busybox-1.35.0-4.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:busybox-1.35.0-4.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:busybox-1.35.0-4.3.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:busybox-1.35.0-4.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:busybox-1.35.0-4.3.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:busybox-1.35.0-4.3.1.x86_64",
"SUSE OpenStack Cloud 9:busybox-1.35.0-4.3.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:busybox-1.35.0-4.3.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.4,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 12 SP2-BCL:busybox-1.35.0-4.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:busybox-1.35.0-4.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:busybox-1.35.0-4.3.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:busybox-1.35.0-4.3.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:busybox-1.35.0-4.3.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:busybox-1.35.0-4.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:busybox-1.35.0-4.3.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:busybox-1.35.0-4.3.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:busybox-1.35.0-4.3.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:busybox-1.35.0-4.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:busybox-1.35.0-4.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:busybox-1.35.0-4.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:busybox-1.35.0-4.3.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:busybox-1.35.0-4.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:busybox-1.35.0-4.3.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:busybox-1.35.0-4.3.1.x86_64",
"SUSE OpenStack Cloud 9:busybox-1.35.0-4.3.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:busybox-1.35.0-4.3.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-11-28T10:23:47Z",
"details": "moderate"
}
],
"title": "CVE-2021-42377"
},
{
"cve": "CVE-2021-42378",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-42378"
}
],
"notes": [
{
"category": "general",
"text": "A use-after-free in Busybox\u0027s awk applet leads to denial of service and possibly code execution when processing a crafted awk pattern in the getvar_i function",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 12 SP2-BCL:busybox-1.35.0-4.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:busybox-1.35.0-4.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:busybox-1.35.0-4.3.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:busybox-1.35.0-4.3.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:busybox-1.35.0-4.3.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:busybox-1.35.0-4.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:busybox-1.35.0-4.3.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:busybox-1.35.0-4.3.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:busybox-1.35.0-4.3.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:busybox-1.35.0-4.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:busybox-1.35.0-4.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:busybox-1.35.0-4.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:busybox-1.35.0-4.3.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:busybox-1.35.0-4.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:busybox-1.35.0-4.3.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:busybox-1.35.0-4.3.1.x86_64",
"SUSE OpenStack Cloud 9:busybox-1.35.0-4.3.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:busybox-1.35.0-4.3.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-42378",
"url": "https://www.suse.com/security/cve/CVE-2021-42378"
},
{
"category": "external",
"summary": "SUSE Bug 1192869 for CVE-2021-42378",
"url": "https://bugzilla.suse.com/1192869"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 12 SP2-BCL:busybox-1.35.0-4.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:busybox-1.35.0-4.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:busybox-1.35.0-4.3.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:busybox-1.35.0-4.3.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:busybox-1.35.0-4.3.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:busybox-1.35.0-4.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:busybox-1.35.0-4.3.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:busybox-1.35.0-4.3.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:busybox-1.35.0-4.3.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:busybox-1.35.0-4.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:busybox-1.35.0-4.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:busybox-1.35.0-4.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:busybox-1.35.0-4.3.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:busybox-1.35.0-4.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:busybox-1.35.0-4.3.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:busybox-1.35.0-4.3.1.x86_64",
"SUSE OpenStack Cloud 9:busybox-1.35.0-4.3.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:busybox-1.35.0-4.3.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.6,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 12 SP2-BCL:busybox-1.35.0-4.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:busybox-1.35.0-4.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:busybox-1.35.0-4.3.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:busybox-1.35.0-4.3.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:busybox-1.35.0-4.3.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:busybox-1.35.0-4.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:busybox-1.35.0-4.3.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:busybox-1.35.0-4.3.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:busybox-1.35.0-4.3.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:busybox-1.35.0-4.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:busybox-1.35.0-4.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:busybox-1.35.0-4.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:busybox-1.35.0-4.3.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:busybox-1.35.0-4.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:busybox-1.35.0-4.3.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:busybox-1.35.0-4.3.1.x86_64",
"SUSE OpenStack Cloud 9:busybox-1.35.0-4.3.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:busybox-1.35.0-4.3.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-11-28T10:23:47Z",
"details": "moderate"
}
],
"title": "CVE-2021-42378"
},
{
"cve": "CVE-2021-42379",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-42379"
}
],
"notes": [
{
"category": "general",
"text": "A use-after-free in Busybox\u0027s awk applet leads to denial of service and possibly code execution when processing a crafted awk pattern in the next_input_file function",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 12 SP2-BCL:busybox-1.35.0-4.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:busybox-1.35.0-4.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:busybox-1.35.0-4.3.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:busybox-1.35.0-4.3.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:busybox-1.35.0-4.3.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:busybox-1.35.0-4.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:busybox-1.35.0-4.3.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:busybox-1.35.0-4.3.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:busybox-1.35.0-4.3.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:busybox-1.35.0-4.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:busybox-1.35.0-4.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:busybox-1.35.0-4.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:busybox-1.35.0-4.3.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:busybox-1.35.0-4.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:busybox-1.35.0-4.3.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:busybox-1.35.0-4.3.1.x86_64",
"SUSE OpenStack Cloud 9:busybox-1.35.0-4.3.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:busybox-1.35.0-4.3.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-42379",
"url": "https://www.suse.com/security/cve/CVE-2021-42379"
},
{
"category": "external",
"summary": "SUSE Bug 1192869 for CVE-2021-42379",
"url": "https://bugzilla.suse.com/1192869"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 12 SP2-BCL:busybox-1.35.0-4.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:busybox-1.35.0-4.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:busybox-1.35.0-4.3.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:busybox-1.35.0-4.3.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:busybox-1.35.0-4.3.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:busybox-1.35.0-4.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:busybox-1.35.0-4.3.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:busybox-1.35.0-4.3.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:busybox-1.35.0-4.3.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:busybox-1.35.0-4.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:busybox-1.35.0-4.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:busybox-1.35.0-4.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:busybox-1.35.0-4.3.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:busybox-1.35.0-4.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:busybox-1.35.0-4.3.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:busybox-1.35.0-4.3.1.x86_64",
"SUSE OpenStack Cloud 9:busybox-1.35.0-4.3.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:busybox-1.35.0-4.3.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.6,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 12 SP2-BCL:busybox-1.35.0-4.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:busybox-1.35.0-4.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:busybox-1.35.0-4.3.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:busybox-1.35.0-4.3.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:busybox-1.35.0-4.3.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:busybox-1.35.0-4.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:busybox-1.35.0-4.3.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:busybox-1.35.0-4.3.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:busybox-1.35.0-4.3.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:busybox-1.35.0-4.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:busybox-1.35.0-4.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:busybox-1.35.0-4.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:busybox-1.35.0-4.3.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:busybox-1.35.0-4.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:busybox-1.35.0-4.3.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:busybox-1.35.0-4.3.1.x86_64",
"SUSE OpenStack Cloud 9:busybox-1.35.0-4.3.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:busybox-1.35.0-4.3.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-11-28T10:23:47Z",
"details": "moderate"
}
],
"title": "CVE-2021-42379"
},
{
"cve": "CVE-2021-42380",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-42380"
}
],
"notes": [
{
"category": "general",
"text": "A use-after-free in Busybox\u0027s awk applet leads to denial of service and possibly code execution when processing a crafted awk pattern in the clrvar function",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 12 SP2-BCL:busybox-1.35.0-4.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:busybox-1.35.0-4.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:busybox-1.35.0-4.3.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:busybox-1.35.0-4.3.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:busybox-1.35.0-4.3.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:busybox-1.35.0-4.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:busybox-1.35.0-4.3.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:busybox-1.35.0-4.3.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:busybox-1.35.0-4.3.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:busybox-1.35.0-4.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:busybox-1.35.0-4.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:busybox-1.35.0-4.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:busybox-1.35.0-4.3.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:busybox-1.35.0-4.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:busybox-1.35.0-4.3.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:busybox-1.35.0-4.3.1.x86_64",
"SUSE OpenStack Cloud 9:busybox-1.35.0-4.3.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:busybox-1.35.0-4.3.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-42380",
"url": "https://www.suse.com/security/cve/CVE-2021-42380"
},
{
"category": "external",
"summary": "SUSE Bug 1192869 for CVE-2021-42380",
"url": "https://bugzilla.suse.com/1192869"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 12 SP2-BCL:busybox-1.35.0-4.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:busybox-1.35.0-4.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:busybox-1.35.0-4.3.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:busybox-1.35.0-4.3.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:busybox-1.35.0-4.3.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:busybox-1.35.0-4.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:busybox-1.35.0-4.3.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:busybox-1.35.0-4.3.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:busybox-1.35.0-4.3.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:busybox-1.35.0-4.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:busybox-1.35.0-4.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:busybox-1.35.0-4.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:busybox-1.35.0-4.3.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:busybox-1.35.0-4.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:busybox-1.35.0-4.3.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:busybox-1.35.0-4.3.1.x86_64",
"SUSE OpenStack Cloud 9:busybox-1.35.0-4.3.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:busybox-1.35.0-4.3.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.6,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 12 SP2-BCL:busybox-1.35.0-4.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:busybox-1.35.0-4.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:busybox-1.35.0-4.3.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:busybox-1.35.0-4.3.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:busybox-1.35.0-4.3.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:busybox-1.35.0-4.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:busybox-1.35.0-4.3.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:busybox-1.35.0-4.3.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:busybox-1.35.0-4.3.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:busybox-1.35.0-4.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:busybox-1.35.0-4.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:busybox-1.35.0-4.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:busybox-1.35.0-4.3.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:busybox-1.35.0-4.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:busybox-1.35.0-4.3.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:busybox-1.35.0-4.3.1.x86_64",
"SUSE OpenStack Cloud 9:busybox-1.35.0-4.3.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:busybox-1.35.0-4.3.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-11-28T10:23:47Z",
"details": "moderate"
}
],
"title": "CVE-2021-42380"
},
{
"cve": "CVE-2021-42381",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-42381"
}
],
"notes": [
{
"category": "general",
"text": "A use-after-free in Busybox\u0027s awk applet leads to denial of service and possibly code execution when processing a crafted awk pattern in the hash_init function",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 12 SP2-BCL:busybox-1.35.0-4.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:busybox-1.35.0-4.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:busybox-1.35.0-4.3.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:busybox-1.35.0-4.3.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:busybox-1.35.0-4.3.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:busybox-1.35.0-4.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:busybox-1.35.0-4.3.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:busybox-1.35.0-4.3.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:busybox-1.35.0-4.3.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:busybox-1.35.0-4.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:busybox-1.35.0-4.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:busybox-1.35.0-4.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:busybox-1.35.0-4.3.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:busybox-1.35.0-4.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:busybox-1.35.0-4.3.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:busybox-1.35.0-4.3.1.x86_64",
"SUSE OpenStack Cloud 9:busybox-1.35.0-4.3.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:busybox-1.35.0-4.3.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-42381",
"url": "https://www.suse.com/security/cve/CVE-2021-42381"
},
{
"category": "external",
"summary": "SUSE Bug 1192869 for CVE-2021-42381",
"url": "https://bugzilla.suse.com/1192869"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 12 SP2-BCL:busybox-1.35.0-4.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:busybox-1.35.0-4.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:busybox-1.35.0-4.3.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:busybox-1.35.0-4.3.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:busybox-1.35.0-4.3.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:busybox-1.35.0-4.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:busybox-1.35.0-4.3.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:busybox-1.35.0-4.3.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:busybox-1.35.0-4.3.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:busybox-1.35.0-4.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:busybox-1.35.0-4.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:busybox-1.35.0-4.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:busybox-1.35.0-4.3.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:busybox-1.35.0-4.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:busybox-1.35.0-4.3.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:busybox-1.35.0-4.3.1.x86_64",
"SUSE OpenStack Cloud 9:busybox-1.35.0-4.3.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:busybox-1.35.0-4.3.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.6,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 12 SP2-BCL:busybox-1.35.0-4.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:busybox-1.35.0-4.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:busybox-1.35.0-4.3.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:busybox-1.35.0-4.3.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:busybox-1.35.0-4.3.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:busybox-1.35.0-4.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:busybox-1.35.0-4.3.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:busybox-1.35.0-4.3.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:busybox-1.35.0-4.3.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:busybox-1.35.0-4.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:busybox-1.35.0-4.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:busybox-1.35.0-4.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:busybox-1.35.0-4.3.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:busybox-1.35.0-4.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:busybox-1.35.0-4.3.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:busybox-1.35.0-4.3.1.x86_64",
"SUSE OpenStack Cloud 9:busybox-1.35.0-4.3.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:busybox-1.35.0-4.3.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-11-28T10:23:47Z",
"details": "moderate"
}
],
"title": "CVE-2021-42381"
},
{
"cve": "CVE-2021-42382",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-42382"
}
],
"notes": [
{
"category": "general",
"text": "A use-after-free in Busybox\u0027s awk applet leads to denial of service and possibly code execution when processing a crafted awk pattern in the getvar_s function",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 12 SP2-BCL:busybox-1.35.0-4.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:busybox-1.35.0-4.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:busybox-1.35.0-4.3.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:busybox-1.35.0-4.3.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:busybox-1.35.0-4.3.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:busybox-1.35.0-4.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:busybox-1.35.0-4.3.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:busybox-1.35.0-4.3.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:busybox-1.35.0-4.3.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:busybox-1.35.0-4.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:busybox-1.35.0-4.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:busybox-1.35.0-4.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:busybox-1.35.0-4.3.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:busybox-1.35.0-4.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:busybox-1.35.0-4.3.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:busybox-1.35.0-4.3.1.x86_64",
"SUSE OpenStack Cloud 9:busybox-1.35.0-4.3.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:busybox-1.35.0-4.3.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-42382",
"url": "https://www.suse.com/security/cve/CVE-2021-42382"
},
{
"category": "external",
"summary": "SUSE Bug 1192869 for CVE-2021-42382",
"url": "https://bugzilla.suse.com/1192869"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 12 SP2-BCL:busybox-1.35.0-4.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:busybox-1.35.0-4.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:busybox-1.35.0-4.3.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:busybox-1.35.0-4.3.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:busybox-1.35.0-4.3.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:busybox-1.35.0-4.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:busybox-1.35.0-4.3.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:busybox-1.35.0-4.3.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:busybox-1.35.0-4.3.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:busybox-1.35.0-4.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:busybox-1.35.0-4.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:busybox-1.35.0-4.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:busybox-1.35.0-4.3.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:busybox-1.35.0-4.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:busybox-1.35.0-4.3.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:busybox-1.35.0-4.3.1.x86_64",
"SUSE OpenStack Cloud 9:busybox-1.35.0-4.3.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:busybox-1.35.0-4.3.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.6,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 12 SP2-BCL:busybox-1.35.0-4.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:busybox-1.35.0-4.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:busybox-1.35.0-4.3.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:busybox-1.35.0-4.3.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:busybox-1.35.0-4.3.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:busybox-1.35.0-4.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:busybox-1.35.0-4.3.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:busybox-1.35.0-4.3.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:busybox-1.35.0-4.3.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:busybox-1.35.0-4.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:busybox-1.35.0-4.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:busybox-1.35.0-4.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:busybox-1.35.0-4.3.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:busybox-1.35.0-4.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:busybox-1.35.0-4.3.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:busybox-1.35.0-4.3.1.x86_64",
"SUSE OpenStack Cloud 9:busybox-1.35.0-4.3.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:busybox-1.35.0-4.3.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-11-28T10:23:47Z",
"details": "moderate"
}
],
"title": "CVE-2021-42382"
},
{
"cve": "CVE-2021-42383",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-42383"
}
],
"notes": [
{
"category": "general",
"text": "A use-after-free in Busybox\u0027s awk applet leads to denial of service and possibly code execution when processing a crafted awk pattern in the evaluate function",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 12 SP2-BCL:busybox-1.35.0-4.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:busybox-1.35.0-4.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:busybox-1.35.0-4.3.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:busybox-1.35.0-4.3.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:busybox-1.35.0-4.3.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:busybox-1.35.0-4.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:busybox-1.35.0-4.3.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:busybox-1.35.0-4.3.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:busybox-1.35.0-4.3.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:busybox-1.35.0-4.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:busybox-1.35.0-4.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:busybox-1.35.0-4.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:busybox-1.35.0-4.3.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:busybox-1.35.0-4.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:busybox-1.35.0-4.3.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:busybox-1.35.0-4.3.1.x86_64",
"SUSE OpenStack Cloud 9:busybox-1.35.0-4.3.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:busybox-1.35.0-4.3.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-42383",
"url": "https://www.suse.com/security/cve/CVE-2021-42383"
},
{
"category": "external",
"summary": "SUSE Bug 1192869 for CVE-2021-42383",
"url": "https://bugzilla.suse.com/1192869"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 12 SP2-BCL:busybox-1.35.0-4.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:busybox-1.35.0-4.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:busybox-1.35.0-4.3.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:busybox-1.35.0-4.3.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:busybox-1.35.0-4.3.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:busybox-1.35.0-4.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:busybox-1.35.0-4.3.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:busybox-1.35.0-4.3.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:busybox-1.35.0-4.3.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:busybox-1.35.0-4.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:busybox-1.35.0-4.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:busybox-1.35.0-4.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:busybox-1.35.0-4.3.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:busybox-1.35.0-4.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:busybox-1.35.0-4.3.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:busybox-1.35.0-4.3.1.x86_64",
"SUSE OpenStack Cloud 9:busybox-1.35.0-4.3.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:busybox-1.35.0-4.3.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.6,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 12 SP2-BCL:busybox-1.35.0-4.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:busybox-1.35.0-4.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:busybox-1.35.0-4.3.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:busybox-1.35.0-4.3.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:busybox-1.35.0-4.3.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:busybox-1.35.0-4.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:busybox-1.35.0-4.3.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:busybox-1.35.0-4.3.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:busybox-1.35.0-4.3.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:busybox-1.35.0-4.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:busybox-1.35.0-4.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:busybox-1.35.0-4.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:busybox-1.35.0-4.3.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:busybox-1.35.0-4.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:busybox-1.35.0-4.3.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:busybox-1.35.0-4.3.1.x86_64",
"SUSE OpenStack Cloud 9:busybox-1.35.0-4.3.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:busybox-1.35.0-4.3.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-11-28T10:23:47Z",
"details": "moderate"
}
],
"title": "CVE-2021-42383"
},
{
"cve": "CVE-2021-42384",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-42384"
}
],
"notes": [
{
"category": "general",
"text": "A use-after-free in Busybox\u0027s awk applet leads to denial of service and possibly code execution when processing a crafted awk pattern in the handle_special function",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 12 SP2-BCL:busybox-1.35.0-4.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:busybox-1.35.0-4.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:busybox-1.35.0-4.3.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:busybox-1.35.0-4.3.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:busybox-1.35.0-4.3.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:busybox-1.35.0-4.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:busybox-1.35.0-4.3.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:busybox-1.35.0-4.3.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:busybox-1.35.0-4.3.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:busybox-1.35.0-4.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:busybox-1.35.0-4.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:busybox-1.35.0-4.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:busybox-1.35.0-4.3.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:busybox-1.35.0-4.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:busybox-1.35.0-4.3.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:busybox-1.35.0-4.3.1.x86_64",
"SUSE OpenStack Cloud 9:busybox-1.35.0-4.3.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:busybox-1.35.0-4.3.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-42384",
"url": "https://www.suse.com/security/cve/CVE-2021-42384"
},
{
"category": "external",
"summary": "SUSE Bug 1192869 for CVE-2021-42384",
"url": "https://bugzilla.suse.com/1192869"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 12 SP2-BCL:busybox-1.35.0-4.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:busybox-1.35.0-4.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:busybox-1.35.0-4.3.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:busybox-1.35.0-4.3.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:busybox-1.35.0-4.3.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:busybox-1.35.0-4.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:busybox-1.35.0-4.3.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:busybox-1.35.0-4.3.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:busybox-1.35.0-4.3.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:busybox-1.35.0-4.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:busybox-1.35.0-4.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:busybox-1.35.0-4.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:busybox-1.35.0-4.3.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:busybox-1.35.0-4.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:busybox-1.35.0-4.3.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:busybox-1.35.0-4.3.1.x86_64",
"SUSE OpenStack Cloud 9:busybox-1.35.0-4.3.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:busybox-1.35.0-4.3.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.6,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 12 SP2-BCL:busybox-1.35.0-4.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:busybox-1.35.0-4.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:busybox-1.35.0-4.3.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:busybox-1.35.0-4.3.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:busybox-1.35.0-4.3.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:busybox-1.35.0-4.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:busybox-1.35.0-4.3.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:busybox-1.35.0-4.3.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:busybox-1.35.0-4.3.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:busybox-1.35.0-4.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:busybox-1.35.0-4.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:busybox-1.35.0-4.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:busybox-1.35.0-4.3.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:busybox-1.35.0-4.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:busybox-1.35.0-4.3.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:busybox-1.35.0-4.3.1.x86_64",
"SUSE OpenStack Cloud 9:busybox-1.35.0-4.3.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:busybox-1.35.0-4.3.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-11-28T10:23:47Z",
"details": "moderate"
}
],
"title": "CVE-2021-42384"
},
{
"cve": "CVE-2021-42385",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-42385"
}
],
"notes": [
{
"category": "general",
"text": "A use-after-free in Busybox\u0027s awk applet leads to denial of service and possibly code execution when processing a crafted awk pattern in the evaluate function",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 12 SP2-BCL:busybox-1.35.0-4.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:busybox-1.35.0-4.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:busybox-1.35.0-4.3.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:busybox-1.35.0-4.3.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:busybox-1.35.0-4.3.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:busybox-1.35.0-4.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:busybox-1.35.0-4.3.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:busybox-1.35.0-4.3.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:busybox-1.35.0-4.3.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:busybox-1.35.0-4.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:busybox-1.35.0-4.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:busybox-1.35.0-4.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:busybox-1.35.0-4.3.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:busybox-1.35.0-4.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:busybox-1.35.0-4.3.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:busybox-1.35.0-4.3.1.x86_64",
"SUSE OpenStack Cloud 9:busybox-1.35.0-4.3.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:busybox-1.35.0-4.3.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-42385",
"url": "https://www.suse.com/security/cve/CVE-2021-42385"
},
{
"category": "external",
"summary": "SUSE Bug 1192869 for CVE-2021-42385",
"url": "https://bugzilla.suse.com/1192869"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 12 SP2-BCL:busybox-1.35.0-4.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:busybox-1.35.0-4.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:busybox-1.35.0-4.3.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:busybox-1.35.0-4.3.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:busybox-1.35.0-4.3.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:busybox-1.35.0-4.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:busybox-1.35.0-4.3.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:busybox-1.35.0-4.3.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:busybox-1.35.0-4.3.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:busybox-1.35.0-4.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:busybox-1.35.0-4.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:busybox-1.35.0-4.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:busybox-1.35.0-4.3.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:busybox-1.35.0-4.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:busybox-1.35.0-4.3.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:busybox-1.35.0-4.3.1.x86_64",
"SUSE OpenStack Cloud 9:busybox-1.35.0-4.3.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:busybox-1.35.0-4.3.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.6,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 12 SP2-BCL:busybox-1.35.0-4.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:busybox-1.35.0-4.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:busybox-1.35.0-4.3.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:busybox-1.35.0-4.3.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:busybox-1.35.0-4.3.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:busybox-1.35.0-4.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:busybox-1.35.0-4.3.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:busybox-1.35.0-4.3.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:busybox-1.35.0-4.3.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:busybox-1.35.0-4.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:busybox-1.35.0-4.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:busybox-1.35.0-4.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:busybox-1.35.0-4.3.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:busybox-1.35.0-4.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:busybox-1.35.0-4.3.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:busybox-1.35.0-4.3.1.x86_64",
"SUSE OpenStack Cloud 9:busybox-1.35.0-4.3.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:busybox-1.35.0-4.3.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-11-28T10:23:47Z",
"details": "moderate"
}
],
"title": "CVE-2021-42385"
},
{
"cve": "CVE-2021-42386",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-42386"
}
],
"notes": [
{
"category": "general",
"text": "A use-after-free in Busybox\u0027s awk applet leads to denial of service and possibly code execution when processing a crafted awk pattern in the nvalloc function",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 12 SP2-BCL:busybox-1.35.0-4.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:busybox-1.35.0-4.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:busybox-1.35.0-4.3.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:busybox-1.35.0-4.3.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:busybox-1.35.0-4.3.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:busybox-1.35.0-4.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:busybox-1.35.0-4.3.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:busybox-1.35.0-4.3.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:busybox-1.35.0-4.3.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:busybox-1.35.0-4.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:busybox-1.35.0-4.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:busybox-1.35.0-4.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:busybox-1.35.0-4.3.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:busybox-1.35.0-4.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:busybox-1.35.0-4.3.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:busybox-1.35.0-4.3.1.x86_64",
"SUSE OpenStack Cloud 9:busybox-1.35.0-4.3.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:busybox-1.35.0-4.3.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-42386",
"url": "https://www.suse.com/security/cve/CVE-2021-42386"
},
{
"category": "external",
"summary": "SUSE Bug 1192869 for CVE-2021-42386",
"url": "https://bugzilla.suse.com/1192869"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 12 SP2-BCL:busybox-1.35.0-4.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:busybox-1.35.0-4.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:busybox-1.35.0-4.3.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:busybox-1.35.0-4.3.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:busybox-1.35.0-4.3.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:busybox-1.35.0-4.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:busybox-1.35.0-4.3.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:busybox-1.35.0-4.3.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:busybox-1.35.0-4.3.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:busybox-1.35.0-4.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:busybox-1.35.0-4.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:busybox-1.35.0-4.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:busybox-1.35.0-4.3.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:busybox-1.35.0-4.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:busybox-1.35.0-4.3.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:busybox-1.35.0-4.3.1.x86_64",
"SUSE OpenStack Cloud 9:busybox-1.35.0-4.3.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:busybox-1.35.0-4.3.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.6,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 12 SP2-BCL:busybox-1.35.0-4.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:busybox-1.35.0-4.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:busybox-1.35.0-4.3.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:busybox-1.35.0-4.3.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:busybox-1.35.0-4.3.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:busybox-1.35.0-4.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:busybox-1.35.0-4.3.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:busybox-1.35.0-4.3.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:busybox-1.35.0-4.3.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:busybox-1.35.0-4.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:busybox-1.35.0-4.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:busybox-1.35.0-4.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:busybox-1.35.0-4.3.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:busybox-1.35.0-4.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:busybox-1.35.0-4.3.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:busybox-1.35.0-4.3.1.x86_64",
"SUSE OpenStack Cloud 9:busybox-1.35.0-4.3.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:busybox-1.35.0-4.3.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-11-28T10:23:47Z",
"details": "moderate"
}
],
"title": "CVE-2021-42386"
}
]
}
VDE-2019-009
Vulnerability from csaf_phoenixcontactgmbhcokg - Published: 2019-06-04 10:22 - Updated: 2025-05-22 13:03A buffer overflow exists in curl 7.12.3 to and including curl 7.58.0 in the FTP URL handling that allows an attacker to cause a denial of service or worse.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: CSAFPID-32001 | — | ||
| Unresolved product id: CSAFPID-32002 | — |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: CSAFPID-31001 | — | ||
| Unresolved product id: CSAFPID-31002 | — |
While parsing an IPAddressFamily extension in an X.509 certificate, it is possible to do a one-byte overread. This would result in an incorrect text display of the certificate. This bug has been present since 2006 and is present in all versions of OpenSSL before 1.0.2m and 1.1.0g.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: CSAFPID-32001 | — | ||
| Unresolved product id: CSAFPID-32002 | — |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: CSAFPID-31001 | — | ||
| Unresolved product id: CSAFPID-31002 | — |
Cross-site scripting (XSS) vulnerability in jQuery UI before 1.12.0 might allow remote attackers to inject arbitrary web script or HTML via the closeText parameter of the dialog function.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: CSAFPID-32001 | — | ||
| Unresolved product id: CSAFPID-32002 | — |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: CSAFPID-31001 | — | ||
| Unresolved product id: CSAFPID-31002 | — |
jQuery before 3.0.0 is vulnerable to Cross-site Scripting (XSS) attacks when a cross-domain Ajax request is performed without the dataType option, causing text/javascript responses to be executed.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: CSAFPID-32001 | — | ||
| Unresolved product id: CSAFPID-32002 | — |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: CSAFPID-31001 | — | ||
| Unresolved product id: CSAFPID-31002 | — |
The nginx package before 1.6.2-5+deb8u3 on Debian jessie, the nginx packages before 1.4.6-1ubuntu3.6 on Ubuntu 14.04 LTS, before 1.10.0-0ubuntu0.16.04.3 on Ubuntu 16.04 LTS, and before 1.10.1-0ubuntu1.1 on Ubuntu 16.10, and the nginx ebuild before 1.10.2-r3 on Gentoo allow local users with access to the web server user account to gain root privileges via a symlink attack on the error log.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: CSAFPID-32001 | — | ||
| Unresolved product id: CSAFPID-32002 | — |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: CSAFPID-31001 | — | ||
| Unresolved product id: CSAFPID-31002 | — |
The recv_and_process_client_pkt function in networking/ntpd.c in busybox allows remote attackers to cause a denial of service (CPU and bandwidth consumption) via a forged NTP packet, which triggers a communication loop.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: CSAFPID-32001 | — | ||
| Unresolved product id: CSAFPID-32002 | — |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: CSAFPID-31001 | — | ||
| Unresolved product id: CSAFPID-31002 | — |
curl and libcurl before 7.50.2, when built with NSS and the libnsspem.so library is available at runtime, allow remote attackers to hijack the authentication of a TLS connection by leveraging reuse of a previously loaded client certificate from file for a connection for which no certificate has been set, a different vulnerability than CVE-2016-5420.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: CSAFPID-32001 | — | ||
| Unresolved product id: CSAFPID-32002 | — |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: CSAFPID-31001 | — | ||
| Unresolved product id: CSAFPID-31002 | — |
The gnutls_ocsp_resp_check_crt function in lib/x509/ocsp.c in GnuTLS before 3.4.15 and 3.5.x before 3.5.4 does not verify the serial length of an OCSP response, which might allow remote attackers to bypass an intended certificate validation mechanism via vectors involving trailing bytes left by gnutls_malloc.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: CSAFPID-32001 | — | ||
| Unresolved product id: CSAFPID-32002 | — |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: CSAFPID-31001 | — | ||
| Unresolved product id: CSAFPID-31002 | — |
inftrees.c in zlib 1.2.8 might allow context-dependent attackers to have unspecified impact by leveraging improper pointer arithmetic.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: CSAFPID-32001 | — | ||
| Unresolved product id: CSAFPID-32002 | — |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: CSAFPID-31001 | — | ||
| Unresolved product id: CSAFPID-31002 | — |
inffast.c in zlib 1.2.8 might allow context-dependent attackers to have unspecified impact by leveraging improper pointer arithmetic.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: CSAFPID-32001 | — | ||
| Unresolved product id: CSAFPID-32002 | — |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: CSAFPID-31001 | — | ||
| Unresolved product id: CSAFPID-31002 | — |
The inflateMark function in inflate.c in zlib 1.2.8 might allow context-dependent attackers to have unspecified impact via vectors involving left shifts of negative integers.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: CSAFPID-32001 | — | ||
| Unresolved product id: CSAFPID-32002 | — |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: CSAFPID-31001 | — | ||
| Unresolved product id: CSAFPID-31002 | — |
The crc32_big function in crc32.c in zlib 1.2.8 might allow context-dependent attackers to have unspecified impact via vectors involving big-endian CRC calculation.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: CSAFPID-32001 | — | ||
| Unresolved product id: CSAFPID-32002 | — |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: CSAFPID-31001 | — | ||
| Unresolved product id: CSAFPID-31002 | — |
The verify_certificate function in lib/vtls/schannel.c in libcurl 7.30.0 through 7.51.0, when built for Windows CE using the schannel TLS backend, makes it easier for remote attackers to conduct man-in-the-middle attacks via a crafted wildcard SAN in a server certificate, as demonstrated by "*.com."
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: CSAFPID-32001 | — | ||
| Unresolved product id: CSAFPID-32002 | — |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: CSAFPID-31001 | — | ||
| Unresolved product id: CSAFPID-31002 | — |
The verify_certificate function in lib/vtls/schannel.c in libcurl 7.30.0 through 7.51.0, when built for Windows CE using the schannel TLS backend, allows remote attackers to obtain sensitive information, cause a denial of service (crash), or possibly have unspecified other impact via a wildcard certificate name, which triggers an out-of-bounds read.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: CSAFPID-32001 | — | ||
| Unresolved product id: CSAFPID-32002 | — |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: CSAFPID-31001 | — | ||
| Unresolved product id: CSAFPID-31002 | — |
When doing a TFTP transfer and curl/libcurl is given a URL that contains a very long file name (longer than about 515 bytes), the file name is truncated to fit within the buffer boundaries, but the buffer size is still wrongly updated to use the untruncated length. This too large value is then used in the sendto() call, making curl attempt to send more data than what is actually put into the buffer. The endto() function will then read beyond the end of the heap based buffer. A malicious HTTP(S) server could redirect a vulnerable libcurl-using client to a crafted TFTP URL (if the client hasn't restricted which protocols it allows redirects to) and trick it to send private memory contents to a remote server over UDP. Limit curl's redirect protocols with --proto-redir and libcurl's with CURLOPT_REDIR_PROTOCOLS.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: CSAFPID-32001 | — | ||
| Unresolved product id: CSAFPID-32002 | — |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: CSAFPID-31001 | — | ||
| Unresolved product id: CSAFPID-31002 | — |
A NULL pointer dereference exists in curl 7.21.0 to and including curl 7.58.0 in the LDAP code that allows an attacker to cause a denial of service
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: CSAFPID-32001 | — | ||
| Unresolved product id: CSAFPID-32002 | — |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: CSAFPID-31001 | — | ||
| Unresolved product id: CSAFPID-31002 | — |
curl supports "globbing" of URLs, in which a user can pass a numerical range to have the tool iterate over those numbers to do a sequence of transfers. In the globbing function that parses the numerical range, there was an omission that made curl read a byte beyond the end of the URL if given a carefully crafted, or just wrongly written, URL. The URL is stored in a heap based buffer, so it could then be made to wrongly read something else instead of crashing. An example of a URL that triggers the flaw would be 'http://ur%20[0-60000000000000000000'.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: CSAFPID-32001 | — | ||
| Unresolved product id: CSAFPID-32002 | — |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: CSAFPID-31001 | — | ||
| Unresolved product id: CSAFPID-31002 | — |
curl version curl 7.20.0 to and including curl 7.59.0 contains a CWE-126: Buffer Over-read vulnerability in denial of service that can result in curl can be tricked into reading data beyond the end of a heap based buffer used to store downloaded RTSP content.. This vulnerability appears to have been fixed in curl < 7.20.0 and curl >= 7.60.0.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: CSAFPID-32001 | — | ||
| Unresolved product id: CSAFPID-32002 | — |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: CSAFPID-31001 | — | ||
| Unresolved product id: CSAFPID-31002 | — |
In stroke_socket.c in strongSwan before 5.6.3, a missing packet length check could allow a buffer underflow, which may lead to resource exhaustion and denial of service while reading from the socket.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: CSAFPID-32001 | — | ||
| Unresolved product id: CSAFPID-32002 | — |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: CSAFPID-31001 | — | ||
| Unresolved product id: CSAFPID-31002 | — |
libcurl may read outside of a heap allocated buffer when doing FTP. When libcurl connects to an FTP server and successfully logs in (anonymous or not), it asks the server for the current directory with the 'PWD' command. The server then responds with a 257 response containing the path, inside double quotes. The returned path name is then kept by libcurl for subsequent uses. Due to a flaw in the string parser for this directory name, a directory name passed like this but without a closing double quote would lead to libcurl not adding a trailing NUL byte to the buffer holding the name. When libcurl would then later access the string, it could read beyond the allocated heap buffer and crash or wrongly access data beyond the buffer, thinking it was part of the path. A malicious server could abuse this fact and effectively prevent libcurl-based clients to work with it - the PWD command is always issued on new FTP connections and the mistake has a high chance of causing a segfault. The simple fact that this has issue remained undiscovered for this long could suggest that malformed PWD responses are rare in benign servers. We are not aware of any exploit of this flaw. This bug was introduced in commit [415d2e7cb7](https://github.com/curl/curl/commit/415d2e7cb7), March 2005. In libcurl version 7.56.0, the parser always zero terminates the string but also rejects it if not terminated properly with a final double quote.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: CSAFPID-32001 | — | ||
| Unresolved product id: CSAFPID-32002 | — |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: CSAFPID-31001 | — | ||
| Unresolved product id: CSAFPID-31002 | — |
An IMAP FETCH response line indicates the size of the returned data, in number of bytes. When that response says the data is zero bytes, libcurl would pass on that (non-existing) data with a pointer and the size (zero) to the deliver-data function. libcurl's deliver-data function treats zero as a magic number and invokes strlen() on the data to figure out the length. The strlen() is called on a heap based buffer that might not be zero terminated so libcurl might read beyond the end of it into whatever memory lies after (or just crash) and then deliver that to the application as if it was actually downloaded.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: CSAFPID-32001 | — | ||
| Unresolved product id: CSAFPID-32002 | — |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: CSAFPID-31001 | — | ||
| Unresolved product id: CSAFPID-31002 | — |
tcpdump 4.9.0 allows remote attackers to cause a denial of service (heap-based buffer over-read and application crash) via crafted packet data. The crash occurs in the EXTRACT_16BITS function, called from the stp_print function for the Spanning Tree Protocol.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: CSAFPID-32001 | — | ||
| Unresolved product id: CSAFPID-32002 | — |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: CSAFPID-31001 | — | ||
| Unresolved product id: CSAFPID-31002 | — |
The gmp plugin in strongSwan before 5.6.0 allows remote attackers to cause a denial of service (NULL pointer dereference and daemon crash) via a crafted RSA signature.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: CSAFPID-32001 | — | ||
| Unresolved product id: CSAFPID-32002 | — |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: CSAFPID-31001 | — | ||
| Unresolved product id: CSAFPID-31002 | — |
tcpdump 4.9.0 has a heap-based buffer over-read in the lldp_print function in print-lldp.c, related to util-print.c.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: CSAFPID-32001 | — | ||
| Unresolved product id: CSAFPID-32002 | — |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: CSAFPID-31001 | — | ||
| Unresolved product id: CSAFPID-31002 | — |
tcpdump 4.9.0 has a heap-based buffer over-read in the pimv1_print function in print-pim.c.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: CSAFPID-32001 | — | ||
| Unresolved product id: CSAFPID-32002 | — |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: CSAFPID-31001 | — | ||
| Unresolved product id: CSAFPID-31002 | — |
tcpdump 4.9.0 has a buffer overflow in the sliplink_print function in print-sl.c.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: CSAFPID-32001 | — | ||
| Unresolved product id: CSAFPID-32002 | — |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: CSAFPID-31001 | — | ||
| Unresolved product id: CSAFPID-31002 | — |
The process_open function in sftp-server.c in OpenSSH before 7.6 does not properly prevent write operations in readonly mode, which allows attackers to create zero-length files.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: CSAFPID-32001 | — | ||
| Unresolved product id: CSAFPID-32002 | — |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: CSAFPID-31001 | — | ||
| Unresolved product id: CSAFPID-31002 | — |
If an SSL/TLS server or client is running on a 32-bit host, and a specific cipher is being used, then a truncated packet can cause that server or client to perform an out-of-bounds read, usually resulting in a crash. For OpenSSL 1.1.0, the crash can be triggered when using CHACHA20/POLY1305; users should upgrade to 1.1.0d. For Openssl 1.0.2, the crash can be triggered when using RC4-MD5; users who have not disabled that algorithm should update to 1.0.2k.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: CSAFPID-32001 | — | ||
| Unresolved product id: CSAFPID-32002 | — |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: CSAFPID-31001 | — | ||
| Unresolved product id: CSAFPID-31002 | — |
XML External Entity vulnerability in libexpat 2.2.0 and earlier (Expat XML Parser Library) allows attackers to put the parser in an infinite loop using a malformed external entity definition from an external DTD.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: CSAFPID-32001 | — | ||
| Unresolved product id: CSAFPID-32002 | — |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: CSAFPID-31001 | — | ||
| Unresolved product id: CSAFPID-31002 | — |
OpenSSL 1.0.2 (starting from version 1.0.2b) introduced an "error state" mechanism. The intent was that if a fatal error occurred during a handshake then OpenSSL would move into the error state and would immediately fail if you attempted to continue the handshake. This works as designed for the explicit handshake functions (SSL_do_handshake(), SSL_accept() and SSL_connect()), however due to a bug it does not work correctly if SSL_read() or SSL_write() is called directly. In that scenario, if the handshake fails then a fatal error will be returned in the initial function call. If SSL_read()/SSL_write() is subsequently called by the application for the same SSL object then it will succeed and the data is passed without being decrypted/encrypted directly from the SSL/TLS record layer. In order to exploit this issue an application bug would have to be present that resulted in a call to SSL_read()/SSL_write() being issued after having already received a fatal error. OpenSSL version 1.0.2b-1.0.2m are affected. Fixed in OpenSSL 1.0.2n. OpenSSL 1.1.0 is not affected.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: CSAFPID-32001 | — | ||
| Unresolved product id: CSAFPID-32002 | — |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: CSAFPID-31001 | — | ||
| Unresolved product id: CSAFPID-31002 | — |
A buffer over-read exists in curl 7.20.0 to and including curl 7.58.0 in the RTSP+RTP handling code that allows an attacker to cause a denial of service or information leakage
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: CSAFPID-32001 | — | ||
| Unresolved product id: CSAFPID-32002 | — |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: CSAFPID-31001 | — | ||
| Unresolved product id: CSAFPID-31002 | — |
An issue was discovered in OPC UA .NET Standard Stack and Sample Code before GitHub commit 2018-04-12, and OPC UA .NET Legacy Stack and Sample Code before GitHub commit 2018-03-13. A vulnerability in OPC UA applications can allow a remote attacker to determine a Server's private key by sending carefully constructed bad UserIdentityTokens as part of an oracle attack.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: CSAFPID-32001 | — | ||
| Unresolved product id: CSAFPID-32002 | — |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: CSAFPID-31001 | — | ||
| Unresolved product id: CSAFPID-31002 | — |
There is an overflow bug in the AVX2 Montgomery multiplication procedure used in exponentiation with 1024-bit moduli. No EC algorithms are affected. Analysis suggests that attacks against RSA and DSA as a result of this defect would be very difficult to perform and are not believed likely. Attacks against DH1024 are considered just feasible, because most of the work necessary to deduce information about a private key may be performed offline. The amount of resources required for such an attack would be significant. However, for an attack on TLS to be meaningful, the server would have to share the DH1024 private key among multiple clients, which is no longer an option since CVE-2016-0701. This only affects processors that support the AVX2 but not ADX extensions like Intel Haswell (4th generation). Note: The impact from this issue is similar to CVE-2017-3736, CVE-2017-3732 and CVE-2015-3193. OpenSSL version 1.0.2-1.0.2m and 1.1.0-1.1.0g are affected. Fixed in OpenSSL 1.0.2n. Due to the low severity of this issue we are not issuing a new release of OpenSSL 1.1.0 at this time. The fix will be included in OpenSSL 1.1.0h when it becomes available. The fix is also available in commit e502cc86d in the OpenSSL git repository.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: CSAFPID-32001 | — | ||
| Unresolved product id: CSAFPID-32002 | — |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: CSAFPID-31001 | — | ||
| Unresolved product id: CSAFPID-31002 | — |
Double free vulnerability in the gnutls_x509_ext_import_proxy function in GnuTLS before 3.3.26 and 3.5.x before 3.5.8 allows remote attackers to have unspecified impact via crafted policy language information in an X.509 certificate with a Proxy Certificate Information extension.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: CSAFPID-32001 | — | ||
| Unresolved product id: CSAFPID-32002 | — |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: CSAFPID-31001 | — | ||
| Unresolved product id: CSAFPID-31002 | — |
The stream reading functions in lib/opencdk/read-packet.c in GnuTLS before 3.3.26 and 3.5.x before 3.5.8 allow remote attackers to cause a denial of service (out-of-memory error and crash) via a crafted OpenPGP certificate.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: CSAFPID-32001 | — | ||
| Unresolved product id: CSAFPID-32002 | — |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: CSAFPID-31001 | — | ||
| Unresolved product id: CSAFPID-31002 | — |
Stack-based buffer overflow in the cdk_pk_get_keyid function in lib/opencdk/pubkey.c in GnuTLS before 3.3.26 and 3.5.x before 3.5.8 allows remote attackers to have unspecified impact via a crafted OpenPGP certificate.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: CSAFPID-32001 | — | ||
| Unresolved product id: CSAFPID-32002 | — |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: CSAFPID-31001 | — | ||
| Unresolved product id: CSAFPID-31002 | — |
Multiple heap-based buffer overflows in the read_attribute function in GnuTLS before 3.3.26 and 3.5.x before 3.5.8 allow remote attackers to have unspecified impact via a crafted OpenPGP certificate.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: CSAFPID-32001 | — | ||
| Unresolved product id: CSAFPID-32002 | — |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: CSAFPID-31001 | — | ||
| Unresolved product id: CSAFPID-31002 | — |
The NTLM authentication feature in curl and libcurl before 7.57.0 on 32-bit platforms allows attackers to cause a denial of service (integer overflow and resultant buffer overflow, and application crash) or possibly have unspecified other impact via vectors involving long user and password fields.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: CSAFPID-32001 | — | ||
| Unresolved product id: CSAFPID-32002 | — |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: CSAFPID-31001 | — | ||
| Unresolved product id: CSAFPID-31002 | — |
The FTP wildcard function in curl and libcurl before 7.57.0 allows remote attackers to cause a denial of service (out-of-bounds read and application crash) or possibly have unspecified other impact via a string that ends with an '[' character.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: CSAFPID-32001 | — | ||
| Unresolved product id: CSAFPID-32002 | — |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: CSAFPID-31001 | — | ||
| Unresolved product id: CSAFPID-31002 | — |
The gmp plugin in strongSwan before 5.5.3 does not properly validate RSA public keys before calling mpz_powm_sec, which allows remote peers to cause a denial of service (floating point exception and process crash) via a crafted certificate.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: CSAFPID-32001 | — | ||
| Unresolved product id: CSAFPID-32002 | — |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: CSAFPID-31001 | — | ||
| Unresolved product id: CSAFPID-31002 | — |
The ASN.1 parser in strongSwan before 5.5.3 improperly handles CHOICE types when the x509 plugin is enabled, which allows remote attackers to cause a denial of service (infinite loop) via a crafted certificate.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: CSAFPID-32001 | — | ||
| Unresolved product id: CSAFPID-32002 | — |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: CSAFPID-31001 | — | ||
| Unresolved product id: CSAFPID-31002 | — |
The OpenSSL RSA Key generation algorithm has been shown to be vulnerable to a cache timing side channel attack. An attacker with sufficient access to mount cache timing attacks during the RSA key generation process could recover the private key. Fixed in OpenSSL 1.1.0i-dev (Affected 1.1.0-1.1.0h). Fixed in OpenSSL 1.0.2p-dev (Affected 1.0.2b-1.0.2o).
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: CSAFPID-32001 | — | ||
| Unresolved product id: CSAFPID-32002 | — |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: CSAFPID-31001 | — | ||
| Unresolved product id: CSAFPID-31002 | — |
libcurl 7.49.0 to and including 7.57.0 contains an out bounds read in code handling HTTP/2 trailers. It was reported (https://github.com/curl/curl/pull/2231) that reading an HTTP/2 trailer could mess up future trailers since the stored size was one byte less than required. The problem is that the code that creates HTTP/1-like headers from the HTTP/2 trailer data once appended a string like ':' to the target buffer, while this was recently changed to ': ' (a space was added after the colon) but the following math wasn't updated correspondingly. When accessed, the data is read out of bounds and causes either a crash or that the (too large) data gets passed to client write. This could lead to a denial-of-service situation or an information disclosure if someone has a service that echoes back or uses the trailers for something.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: CSAFPID-32001 | — | ||
| Unresolved product id: CSAFPID-32002 | — |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: CSAFPID-31001 | — | ||
| Unresolved product id: CSAFPID-31002 | — |
Python Software Foundation CPython version From 3.2 until 3.6.4 on Windows contains a Buffer Overflow vulnerability in os.symlink() function on Windows that can result in Arbitrary code execution, likely escalation of privilege. This attack appears to be exploitable via a python script that creates a symlink with an attacker controlled name or location. This vulnerability appears to have been fixed in 3.7.0 and 3.6.5.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: CSAFPID-32001 | — | ||
| Unresolved product id: CSAFPID-32002 | — |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: CSAFPID-31001 | — | ||
| Unresolved product id: CSAFPID-31002 | — |
An issue was discovered on Phoenix Contact AXC F 2152 (No.2404267) before 2019.0 LTS and AXC F 2152 STARTERKIT (No.1046568) before 2019.0 LTS devices. Protocol Fuzzing on PC WORX Engineer by a man in the middle attacker stops the PLC service. The device must be rebooted, or the PLC service must be restarted manually via a Linux shell.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: CSAFPID-32001 | — | ||
| Unresolved product id: CSAFPID-32002 | — |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: CSAFPID-31001 | — | ||
| Unresolved product id: CSAFPID-31002 | — |
An issue was discovered on Phoenix Contact AXC F 2152 (No.2404267) before 2019.0 LTS and AXC F 2152 STARTERKIT (No.1046568) before 2019.0 LTS devices. Unlimited physical access to the PLC may lead to a manipulation of SD cards data. SD card manipulation may lead to an authentication bypass opportunity.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: CSAFPID-32001 | — | ||
| Unresolved product id: CSAFPID-32002 | — |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: CSAFPID-31001 | — | ||
| Unresolved product id: CSAFPID-31002 | — |
{
"document": {
"acknowledgments": [
{
"organization": "CERT@VDE",
"summary": "coordination",
"urls": [
"https://certvde.com"
]
},
{
"names": [
"Zahra Khani"
],
"organization": "firmwareanalyzer.com",
"summary": "reporting"
},
{
"organization": "OPC Foundation",
"summary": "reporting"
}
],
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en-GB",
"notes": [
{
"category": "summary",
"text": "Multiple vulnerabilities have been identified in PHOENIX CONTACT AXC F 2152 with firmware versions 1.x",
"title": "Summary"
},
{
"category": "description",
"text": "see CVEs for details.",
"title": "Impact"
},
{
"category": "description",
"text": "Customers using Phoenix Contact AXC F 2152 are recommended to operate the devices in closed networks or protected with a suitable firewall. For detailed information on our recommendations for measures to protect network-capable devices, please refer to our application note:\n\u0027Art.-Nr. 107913: AH EN INDUSTRIAL SECURITY \u0027Measures to protect network-capable devices with Ethernet connection against unauthorized access\u0027",
"title": "General Recommendation"
},
{
"category": "description",
"text": "Update to Firmware Release 2019.0 LTS or later.\n\nUpdate to PLCnext Engineer Release 2019.0 LTS or later.\n\nUpdate A, 30.08.2019\nWith Firmware Release 2019.6 an option was added to the web-based\nmanagement that allows the user to permanently disable storage of configuration data to the\nSD-Card. The device can now be operated without SD-Card and ignores any inserted SD-Card.\nWe recommend using this new configuration option for application scenarios where physical\naccess to the device cannot be restricted effectively.",
"title": "Remediation"
}
],
"publisher": {
"category": "vendor",
"contact_details": "psirt@phoenixcontact.com",
"name": "Phoenix Contact GmbH \u0026 Co. KG",
"namespace": "https://phoenixcontact.com/psirt"
},
"references": [
{
"category": "external",
"summary": "Phoenix Contact PSIRT ",
"url": "https://www.phoenixcontact.com/de-de/service-und-support/psirt"
},
{
"category": "external",
"summary": "CERT@VDE Security Advisories for Phoenix Contact GmbH \u0026 Co. KG",
"url": "https://certvde.com/en/advisories/vendor/phoenixcontact/"
},
{
"category": "self",
"summary": "VDE-2019-009: PHOENIX CONTACT: Multiple Vulnerabilities in AXC F 2152 - HTML",
"url": "https://certvde.com/en/advisories/VDE-2019-009/"
},
{
"category": "self",
"summary": "VDE-2019-009: PHOENIX CONTACT: Multiple Vulnerabilities in AXC F 2152 - CSAF",
"url": "https://phoenixcontact.csaf-tp.certvde.com/.well-known/csaf/white/2019/vde-2019-009.json"
}
],
"title": "PHOENIX CONTACT: Multiple Vulnerabilities in AXC F 2152",
"tracking": {
"aliases": [
"VDE-2019-009"
],
"current_release_date": "2025-05-22T13:03:10.000Z",
"generator": {
"date": "2025-04-09T08:04:53.514Z",
"engine": {
"name": "Secvisogram",
"version": "2.5.22"
}
},
"id": "VDE-2019-009",
"initial_release_date": "2019-06-04T10:22:00.000Z",
"revision_history": [
{
"date": "2019-06-04T10:22:00.000Z",
"number": "1",
"summary": "Initial revision."
},
{
"date": "2019-08-30T10:00:00.000Z",
"number": "2",
"summary": "Update A"
},
{
"date": "2025-05-22T13:03:10.000Z",
"number": "3",
"summary": "Fix: added distribution, status to final, quotation mark"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version_range",
"name": "\u003c2.0",
"product": {
"name": "Firmware \u003c2.0",
"product_id": "CSAFPID-21001"
}
},
{
"category": "product_version",
"name": "2019.0 LTS",
"product": {
"name": "Firmware 2019.0 LTS",
"product_id": "CSAFPID-22001"
}
}
],
"category": "product_family",
"name": "Firmware"
},
{
"branches": [
{
"category": "product_name",
"name": "AXC F 2152",
"product": {
"name": "AXC F 2152",
"product_id": "CSAFPID-11001",
"product_identification_helper": {
"model_numbers": [
"2404267"
]
}
}
},
{
"category": "product_name",
"name": "AXC F 2152 (Starterkit)",
"product": {
"name": "AXC F 2152 (Starterkit)",
"product_id": "CSAFPID-11002",
"product_identification_helper": {
"model_numbers": [
"1046568"
]
}
}
}
],
"category": "product_family",
"name": "Hardware"
}
],
"category": "vendor",
"name": "Phoenix Contact"
}
],
"product_groups": [
{
"group_id": "CSAFGID-0001",
"product_ids": [
"CSAFPID-31001",
"CSAFPID-31002"
],
"summary": "Affected products."
},
{
"group_id": "CSAFGID-0002",
"product_ids": [
"CSAFPID-32001",
"CSAFPID-32002"
],
"summary": "Fixed products."
}
],
"relationships": [
{
"category": "installed_on",
"full_product_name": {
"name": "Firmware \u003c2.0 installed on AXC F 2152",
"product_id": "CSAFPID-31001"
},
"product_reference": "CSAFPID-21001",
"relates_to_product_reference": "CSAFPID-11001"
},
{
"category": "installed_on",
"full_product_name": {
"name": "Firmware \u003c2.0 installed on AXC F 2152 (Starterkit)",
"product_id": "CSAFPID-31002"
},
"product_reference": "CSAFPID-21001",
"relates_to_product_reference": "CSAFPID-11002"
},
{
"category": "installed_on",
"full_product_name": {
"name": "Firmware 2019.0 LTS installed on AXC F 2152",
"product_id": "CSAFPID-32001"
},
"product_reference": "CSAFPID-22001",
"relates_to_product_reference": "CSAFPID-11001"
},
{
"category": "installed_on",
"full_product_name": {
"name": "Firmware 2019.0 LTS installed on AXC F 2152 (Starterkit)",
"product_id": "CSAFPID-32002"
},
"product_reference": "CSAFPID-22001",
"relates_to_product_reference": "CSAFPID-11002"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2018-1000120",
"cwe": {
"id": "CWE-787",
"name": "Out-of-bounds Write"
},
"notes": [
{
"audience": "all",
"category": "description",
"text": "A buffer overflow exists in curl 7.12.3 to and including curl 7.58.0 in the FTP URL handling that allows an attacker to cause a denial of service or worse.",
"title": "Vulnerability Description"
}
],
"product_status": {
"fixed": [
"CSAFPID-32001",
"CSAFPID-32002"
],
"known_affected": [
"CSAFPID-31001",
"CSAFPID-31002"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to Firmware Release 2019.0 LTS or later. Update to PLCnext Engineer Release 2019.0 LTS or later. Update A, 30.08.2019With Firmware Release 2019.6 an option was added to the web-basedmanagement that allows the user to permanently disable storage of configuration data to theSD-Card. The device can now be operated without SD-Card and ignores any inserted SD-Card.We recommend using this new configuration option for application scenarios where physicalaccess to the device cannot be restricted effectively. General Recommendation Customers using Phoenix Contact AXC F 2152 are recommended to operate the devices in closed networks or protected with a suitable firewall. For detailed information on our recommendations for measures to protect network-capable devices, please refer to our application note:\u0027Art.-Nr. 107913: AH EN INDUSTRIAL SECURITY \u0027Measures to protect network-capable devices with Ethernet connection against unauthorized access\u0027",
"group_ids": [
"CSAFGID-0001"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.0"
},
"products": [
"CSAFPID-31001",
"CSAFPID-31002"
]
}
],
"title": "CVE-2018-1000120"
},
{
"cve": "CVE-2017-3735",
"cwe": {
"id": "CWE-119",
"name": "Improper Restriction of Operations within the Bounds of a Memory Buffer"
},
"notes": [
{
"audience": "all",
"category": "description",
"text": "While parsing an IPAddressFamily extension in an X.509 certificate, it is possible to do a one-byte overread. This would result in an incorrect text display of the certificate. This bug has been present since 2006 and is present in all versions of OpenSSL before 1.0.2m and 1.1.0g.",
"title": "Vulnerability Description"
}
],
"product_status": {
"fixed": [
"CSAFPID-32001",
"CSAFPID-32002"
],
"known_affected": [
"CSAFPID-31001",
"CSAFPID-31002"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to Firmware Release 2019.0 LTS or later.\n\nUpdate to PLCnext Engineer Release 2019.0 LTS or later.\n\nUpdate A, 30.08.2019\nWith Firmware Release 2019.6 an option was added to the web-based\nmanagement that allows the user to permanently disable storage of configuration data to the\nSD-Card. The device can now be operated without SD-Card and ignores any inserted SD-Card.\nWe recommend using this new configuration option for application scenarios where physical\naccess to the device cannot be restricted effectively.",
"group_ids": [
"CSAFGID-0001"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "LOW",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N",
"version": "3.0"
},
"products": [
"CSAFPID-31001",
"CSAFPID-31002"
]
}
],
"title": "CVE-2017-3735"
},
{
"cve": "CVE-2016-7103",
"cwe": {
"id": "CWE-79",
"name": "Improper Neutralization of Input During Web Page Generation (\u0027Cross-site Scripting\u0027)"
},
"notes": [
{
"audience": "all",
"category": "description",
"text": "Cross-site scripting (XSS) vulnerability in jQuery UI before 1.12.0 might allow remote attackers to inject arbitrary web script or HTML via the closeText parameter of the dialog function.",
"title": "Vulnerability Description"
}
],
"product_status": {
"fixed": [
"CSAFPID-32001",
"CSAFPID-32002"
],
"known_affected": [
"CSAFPID-31001",
"CSAFPID-31002"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to Firmware Release 2019.0 LTS or later.\n\nUpdate to PLCnext Engineer Release 2019.0 LTS or later.\n\nUpdate A, 30.08.2019\nWith Firmware Release 2019.6 an option was added to the web-based\nmanagement that allows the user to permanently disable storage of configuration data to the\nSD-Card. The device can now be operated without SD-Card and ignores any inserted SD-Card.\nWe recommend using this new configuration option for application scenarios where physical\naccess to the device cannot be restricted effectively.",
"group_ids": [
"CSAFGID-0001"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 6.1,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"privilegesRequired": "NONE",
"scope": "CHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
"version": "3.1"
},
"products": [
"CSAFPID-31001",
"CSAFPID-31002"
]
}
],
"title": "CVE-2016-7103"
},
{
"cve": "CVE-2015-9251",
"cwe": {
"id": "CWE-79",
"name": "Improper Neutralization of Input During Web Page Generation (\u0027Cross-site Scripting\u0027)"
},
"notes": [
{
"audience": "all",
"category": "description",
"text": "jQuery before 3.0.0 is vulnerable to Cross-site Scripting (XSS) attacks when a cross-domain Ajax request is performed without the dataType option, causing text/javascript responses to be executed.",
"title": "Vulnerability Description"
}
],
"product_status": {
"fixed": [
"CSAFPID-32001",
"CSAFPID-32002"
],
"known_affected": [
"CSAFPID-31001",
"CSAFPID-31002"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to Firmware Release 2019.0 LTS or later.\n\nUpdate to PLCnext Engineer Release 2019.0 LTS or later.\n\nUpdate A, 30.08.2019\nWith Firmware Release 2019.6 an option was added to the web-based\nmanagement that allows the user to permanently disable storage of configuration data to the\nSD-Card. The device can now be operated without SD-Card and ignores any inserted SD-Card.\nWe recommend using this new configuration option for application scenarios where physical\naccess to the device cannot be restricted effectively.",
"group_ids": [
"CSAFGID-0001"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 6.1,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"privilegesRequired": "NONE",
"scope": "CHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
"version": "3.0"
},
"products": [
"CSAFPID-31001",
"CSAFPID-31002"
]
}
],
"title": "CVE-2015-9251"
},
{
"cve": "CVE-2016-1247",
"cwe": {
"id": "CWE-59",
"name": "Improper Link Resolution Before File Access (\u0027Link Following\u0027)"
},
"notes": [
{
"audience": "all",
"category": "description",
"text": "The nginx package before 1.6.2-5+deb8u3 on Debian jessie, the nginx packages before 1.4.6-1ubuntu3.6 on Ubuntu 14.04 LTS, before 1.10.0-0ubuntu0.16.04.3 on Ubuntu 16.04 LTS, and before 1.10.1-0ubuntu1.1 on Ubuntu 16.10, and the nginx ebuild before 1.10.2-r3 on Gentoo allow local users with access to the web server user account to gain root privileges via a symlink attack on the error log.",
"title": "Vulnerability Description"
}
],
"product_status": {
"fixed": [
"CSAFPID-32001",
"CSAFPID-32002"
],
"known_affected": [
"CSAFPID-31001",
"CSAFPID-31002"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to Firmware Release 2019.0 LTS or later.\n\nUpdate to PLCnext Engineer Release 2019.0 LTS or later.\n\nUpdate A, 30.08.2019\nWith Firmware Release 2019.6 an option was added to the web-based\nmanagement that allows the user to permanently disable storage of configuration data to the\nSD-Card. The device can now be operated without SD-Card and ignores any inserted SD-Card.\nWe recommend using this new configuration option for application scenarios where physical\naccess to the device cannot be restricted effectively.",
"group_ids": [
"CSAFGID-0001"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-31001",
"CSAFPID-31002"
]
}
],
"title": "CVE-2016-1247"
},
{
"cve": "CVE-2016-6301",
"notes": [
{
"audience": "all",
"category": "description",
"text": "The recv_and_process_client_pkt function in networking/ntpd.c in busybox allows remote attackers to cause a denial of service (CPU and bandwidth consumption) via a forged NTP packet, which triggers a communication loop.",
"title": "Vulnerability Description"
}
],
"product_status": {
"fixed": [
"CSAFPID-32001",
"CSAFPID-32002"
],
"known_affected": [
"CSAFPID-31001",
"CSAFPID-31002"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to Firmware Release 2019.0 LTS or later. Update to PLCnext Engineer Release 2019.0 LTS or later. Update A, 30.08.2019With Firmware Release 2019.6 an option was added to the web-basedmanagement that allows the user to permanently disable storage of configuration data to theSD-Card. The device can now be operated without SD-Card and ignores any inserted SD-Card.We recommend using this new configuration option for application scenarios where physicalaccess to the device cannot be restricted effectively. General Recommendation Customers using Phoenix Contact AXC F 2152 are recommended to operate the devices in closed networks or protected with a suitable firewall. For detailed information on our recommendations for measures to protect network-capable devices, please refer to our application note:\u0027Art.-Nr. 107913: AH EN INDUSTRIAL SECURITY \u0027Measures to protect network-capable devices with Ethernet connection against unauthorized access\u0027",
"group_ids": [
"CSAFGID-0001"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.0"
},
"products": [
"CSAFPID-31001",
"CSAFPID-31002"
]
}
],
"title": "CVE-2016-6301"
},
{
"cve": "CVE-2016-7141",
"cwe": {
"id": "CWE-287",
"name": "Improper Authentication"
},
"notes": [
{
"audience": "all",
"category": "description",
"text": "curl and libcurl before 7.50.2, when built with NSS and the libnsspem.so library is available at runtime, allow remote attackers to hijack the authentication of a TLS connection by leveraging reuse of a previously loaded client certificate from file for a connection for which no certificate has been set, a different vulnerability than CVE-2016-5420.",
"title": "Vulnerability Description"
}
],
"product_status": {
"fixed": [
"CSAFPID-32001",
"CSAFPID-32002"
],
"known_affected": [
"CSAFPID-31001",
"CSAFPID-31002"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to Firmware Release 2019.0 LTS or later.\n\nUpdate to PLCnext Engineer Release 2019.0 LTS or later.\n\nUpdate A, 30.08.2019\nWith Firmware Release 2019.6 an option was added to the web-based\nmanagement that allows the user to permanently disable storage of configuration data to the\nSD-Card. The device can now be operated without SD-Card and ignores any inserted SD-Card.\nWe recommend using this new configuration option for application scenarios where physical\naccess to the device cannot be restricted effectively.",
"group_ids": [
"CSAFGID-0001"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N",
"version": "3.0"
},
"products": [
"CSAFPID-31001",
"CSAFPID-31002"
]
}
],
"title": "CVE-2016-7141"
},
{
"cve": "CVE-2016-7444",
"notes": [
{
"audience": "all",
"category": "description",
"text": "The gnutls_ocsp_resp_check_crt function in lib/x509/ocsp.c in GnuTLS before 3.4.15 and 3.5.x before 3.5.4 does not verify the serial length of an OCSP response, which might allow remote attackers to bypass an intended certificate validation mechanism via vectors involving trailing bytes left by gnutls_malloc.",
"title": "Vulnerability Description"
}
],
"product_status": {
"fixed": [
"CSAFPID-32001",
"CSAFPID-32002"
],
"known_affected": [
"CSAFPID-31001",
"CSAFPID-31002"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to Firmware Release 2019.0 LTS or later.\n\nUpdate to PLCnext Engineer Release 2019.0 LTS or later.\n\nUpdate A, 30.08.2019\nWith Firmware Release 2019.6 an option was added to the web-based\nmanagement that allows the user to permanently disable storage of configuration data to the\nSD-Card. The device can now be operated without SD-Card and ignores any inserted SD-Card.\nWe recommend using this new configuration option for application scenarios where physical\naccess to the device cannot be restricted effectively.",
"group_ids": [
"CSAFGID-0001"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N",
"version": "3.0"
},
"products": [
"CSAFPID-31001",
"CSAFPID-31002"
]
}
],
"title": "CVE-2016-7444"
},
{
"cve": "CVE-2016-9840",
"notes": [
{
"audience": "all",
"category": "description",
"text": "inftrees.c in zlib 1.2.8 might allow context-dependent attackers to have unspecified impact by leveraging improper pointer arithmetic.",
"title": "Vulnerability Description"
}
],
"product_status": {
"fixed": [
"CSAFPID-32001",
"CSAFPID-32002"
],
"known_affected": [
"CSAFPID-31001",
"CSAFPID-31002"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to Firmware Release 2019.0 LTS or later.\n\nUpdate to PLCnext Engineer Release 2019.0 LTS or later.\n\nUpdate A, 30.08.2019\nWith Firmware Release 2019.6 an option was added to the web-based\nmanagement that allows the user to permanently disable storage of configuration data to the\nSD-Card. The device can now be operated without SD-Card and ignores any inserted SD-Card.\nWe recommend using this new configuration option for application scenarios where physical\naccess to the device cannot be restricted effectively.",
"group_ids": [
"CSAFGID-0001"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-31001",
"CSAFPID-31002"
]
}
],
"title": "CVE-2016-9840"
},
{
"cve": "CVE-2016-9841",
"notes": [
{
"audience": "all",
"category": "description",
"text": "inffast.c in zlib 1.2.8 might allow context-dependent attackers to have unspecified impact by leveraging improper pointer arithmetic.",
"title": "Vulnerability Description"
}
],
"product_status": {
"fixed": [
"CSAFPID-32001",
"CSAFPID-32002"
],
"known_affected": [
"CSAFPID-31001",
"CSAFPID-31002"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to Firmware Release 2019.0 LTS or later.\n\nUpdate to PLCnext Engineer Release 2019.0 LTS or later.\n\nUpdate A, 30.08.2019\nWith Firmware Release 2019.6 an option was added to the web-based\nmanagement that allows the user to permanently disable storage of configuration data to the\nSD-Card. The device can now be operated without SD-Card and ignores any inserted SD-Card.\nWe recommend using this new configuration option for application scenarios where physical\naccess to the device cannot be restricted effectively.",
"group_ids": [
"CSAFGID-0001"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-31001",
"CSAFPID-31002"
]
}
],
"title": "CVE-2016-9841"
},
{
"cve": "CVE-2016-9842",
"notes": [
{
"audience": "all",
"category": "description",
"text": "The inflateMark function in inflate.c in zlib 1.2.8 might allow context-dependent attackers to have unspecified impact via vectors involving left shifts of negative integers.",
"title": "Vulnerability Description"
}
],
"product_status": {
"fixed": [
"CSAFPID-32001",
"CSAFPID-32002"
],
"known_affected": [
"CSAFPID-31001",
"CSAFPID-31002"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to Firmware Release 2019.0 LTS or later.\n\nUpdate to PLCnext Engineer Release 2019.0 LTS or later.\n\nUpdate A, 30.08.2019\nWith Firmware Release 2019.6 an option was added to the web-based\nmanagement that allows the user to permanently disable storage of configuration data to the\nSD-Card. The device can now be operated without SD-Card and ignores any inserted SD-Card.\nWe recommend using this new configuration option for application scenarios where physical\naccess to the device cannot be restricted effectively.",
"group_ids": [
"CSAFGID-0001"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-31001",
"CSAFPID-31002"
]
}
],
"title": "CVE-2016-9842"
},
{
"cve": "CVE-2016-9843",
"notes": [
{
"audience": "all",
"category": "description",
"text": "The crc32_big function in crc32.c in zlib 1.2.8 might allow context-dependent attackers to have unspecified impact via vectors involving big-endian CRC calculation.",
"title": "Vulnerability Description"
}
],
"product_status": {
"fixed": [
"CSAFPID-32001",
"CSAFPID-32002"
],
"known_affected": [
"CSAFPID-31001",
"CSAFPID-31002"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to Firmware Release 2019.0 LTS or later.\n\nUpdate to PLCnext Engineer Release 2019.0 LTS or later.\n\nUpdate A, 30.08.2019\nWith Firmware Release 2019.6 an option was added to the web-based\nmanagement that allows the user to permanently disable storage of configuration data to the\nSD-Card. The device can now be operated without SD-Card and ignores any inserted SD-Card.\nWe recommend using this new configuration option for application scenarios where physical\naccess to the device cannot be restricted effectively.",
"group_ids": [
"CSAFGID-0001"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-31001",
"CSAFPID-31002"
]
}
],
"title": "CVE-2016-9843"
},
{
"cve": "CVE-2016-9952",
"cwe": {
"id": "CWE-295",
"name": "Improper Certificate Validation"
},
"notes": [
{
"audience": "all",
"category": "description",
"text": "The verify_certificate function in lib/vtls/schannel.c in libcurl 7.30.0 through 7.51.0, when built for Windows CE using the schannel TLS backend, makes it easier for remote attackers to conduct man-in-the-middle attacks via a crafted wildcard SAN in a server certificate, as demonstrated by \"*.com.\"",
"title": "Vulnerability Description"
}
],
"product_status": {
"fixed": [
"CSAFPID-32001",
"CSAFPID-32002"
],
"known_affected": [
"CSAFPID-31001",
"CSAFPID-31002"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to Firmware Release 2019.0 LTS or later.\n\nUpdate to PLCnext Engineer Release 2019.0 LTS or later.\n\nUpdate A, 30.08.2019\nWith Firmware Release 2019.6 an option was added to the web-based\nmanagement that allows the user to permanently disable storage of configuration data to the\nSD-Card. The device can now be operated without SD-Card and ignores any inserted SD-Card.\nWe recommend using this new configuration option for application scenarios where physical\naccess to the device cannot be restricted effectively.Update to Firmware Release 2019.0 LTS or later.\n\nUpdate to PLCnext Engineer Release 2019.0 LTS or later.\n\nUpdate A, 30.08.2019\nWith Firmware Release 2019.6 an option was added to the web-based\nmanagement that allows the user to permanently disable storage of configuration data to the\nSD-Card. The device can now be operated without SD-Card and ignores any inserted SD-Card.\nWe recommend using this new configuration option for application scenarios where physical\naccess to the device cannot be restricted effectively.",
"group_ids": [
"CSAFGID-0001"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 8.1,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.0"
},
"products": [
"CSAFPID-31001",
"CSAFPID-31002"
]
}
],
"title": "CVE-2016-9952"
},
{
"cve": "CVE-2016-9953",
"cwe": {
"id": "CWE-125",
"name": "Out-of-bounds Read"
},
"notes": [
{
"audience": "all",
"category": "description",
"text": "The verify_certificate function in lib/vtls/schannel.c in libcurl 7.30.0 through 7.51.0, when built for Windows CE using the schannel TLS backend, allows remote attackers to obtain sensitive information, cause a denial of service (crash), or possibly have unspecified other impact via a wildcard certificate name, which triggers an out-of-bounds read.",
"title": "Vulnerability Description"
}
],
"product_status": {
"fixed": [
"CSAFPID-32001",
"CSAFPID-32002"
],
"known_affected": [
"CSAFPID-31001",
"CSAFPID-31002"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to Firmware Release 2019.0 LTS or later.\n\nUpdate to PLCnext Engineer Release 2019.0 LTS or later.\n\nUpdate A, 30.08.2019\nWith Firmware Release 2019.6 an option was added to the web-based\nmanagement that allows the user to permanently disable storage of configuration data to the\nSD-Card. The device can now be operated without SD-Card and ignores any inserted SD-Card.\nWe recommend using this new configuration option for application scenarios where physical\naccess to the device cannot be restricted effectively.",
"group_ids": [
"CSAFGID-0001"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.0"
},
"products": [
"CSAFPID-31001",
"CSAFPID-31002"
]
}
],
"title": "CVE-2016-9953"
},
{
"cve": "CVE-2017-1000100",
"cwe": {
"id": "CWE-200",
"name": "Exposure of Sensitive Information to an Unauthorized Actor"
},
"notes": [
{
"audience": "all",
"category": "description",
"text": "When doing a TFTP transfer and curl/libcurl is given a URL that contains a very long file name (longer than about 515 bytes), the file name is truncated to fit within the buffer boundaries, but the buffer size is still wrongly updated to use the untruncated length. This too large value is then used in the sendto() call, making curl attempt to send more data than what is actually put into the buffer. The endto() function will then read beyond the end of the heap based buffer. A malicious HTTP(S) server could redirect a vulnerable libcurl-using client to a crafted TFTP URL (if the client hasn\u0027t restricted which protocols it allows redirects to) and trick it to send private memory contents to a remote server over UDP. Limit curl\u0027s redirect protocols with --proto-redir and libcurl\u0027s with CURLOPT_REDIR_PROTOCOLS.",
"title": "Vulnerability Description"
}
],
"product_status": {
"fixed": [
"CSAFPID-32001",
"CSAFPID-32002"
],
"known_affected": [
"CSAFPID-31001",
"CSAFPID-31002"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to Firmware Release 2019.0 LTS or later.\n\nUpdate to PLCnext Engineer Release 2019.0 LTS or later.\n\nUpdate A, 30.08.2019\nWith Firmware Release 2019.6 an option was added to the web-based\nmanagement that allows the user to permanently disable storage of configuration data to the\nSD-Card. The device can now be operated without SD-Card and ignores any inserted SD-Card.\nWe recommend using this new configuration option for application scenarios where physical\naccess to the device cannot be restricted effectively.",
"group_ids": [
"CSAFGID-0001"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N",
"version": "3.0"
},
"products": [
"CSAFPID-31001",
"CSAFPID-31002"
]
}
],
"title": "CVE-2017-1000100"
},
{
"cve": "CVE-2018-1000121",
"cwe": {
"id": "CWE-476",
"name": "NULL Pointer Dereference"
},
"notes": [
{
"audience": "all",
"category": "description",
"text": "A NULL pointer dereference exists in curl 7.21.0 to and including curl 7.58.0 in the LDAP code that allows an attacker to cause a denial of service",
"title": "Vulnerability Description"
}
],
"product_status": {
"fixed": [
"CSAFPID-32001",
"CSAFPID-32002"
],
"known_affected": [
"CSAFPID-31001",
"CSAFPID-31002"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to Firmware Release 2019.0 LTS or later.\n\nUpdate to PLCnext Engineer Release 2019.0 LTS or later.\n\nUpdate A, 30.08.2019\nWith Firmware Release 2019.6 an option was added to the web-based\nmanagement that allows the user to permanently disable storage of configuration data to the\nSD-Card. The device can now be operated without SD-Card and ignores any inserted SD-Card.\nWe recommend using this new configuration option for application scenarios where physical\naccess to the device cannot be restricted effectively.",
"group_ids": [
"CSAFGID-0001"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.0"
},
"products": [
"CSAFPID-31001",
"CSAFPID-31002"
]
}
],
"title": "CVE-2018-1000121"
},
{
"cve": "CVE-2017-1000101",
"cwe": {
"id": "CWE-119",
"name": "Improper Restriction of Operations within the Bounds of a Memory Buffer"
},
"notes": [
{
"audience": "all",
"category": "description",
"text": "curl supports \"globbing\" of URLs, in which a user can pass a numerical range to have the tool iterate over those numbers to do a sequence of transfers. In the globbing function that parses the numerical range, there was an omission that made curl read a byte beyond the end of the URL if given a carefully crafted, or just wrongly written, URL. The URL is stored in a heap based buffer, so it could then be made to wrongly read something else instead of crashing. An example of a URL that triggers the flaw would be \u0027http://ur%20[0-60000000000000000000\u0027.",
"title": "Vulnerability Description"
}
],
"product_status": {
"fixed": [
"CSAFPID-32001",
"CSAFPID-32002"
],
"known_affected": [
"CSAFPID-31001",
"CSAFPID-31002"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to Firmware Release 2019.0 LTS or later.\n\nUpdate to PLCnext Engineer Release 2019.0 LTS or later.\n\nUpdate A, 30.08.2019\nWith Firmware Release 2019.6 an option was added to the web-based\nmanagement that allows the user to permanently disable storage of configuration data to the\nSD-Card. The device can now be operated without SD-Card and ignores any inserted SD-Card.\nWe recommend using this new configuration option for application scenarios where physical\naccess to the device cannot be restricted effectively.",
"group_ids": [
"CSAFGID-0001"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N",
"version": "3.0"
},
"products": [
"CSAFPID-31001",
"CSAFPID-31002"
]
}
],
"title": "CVE-2017-1000101"
},
{
"cve": "CVE-2018-1000301",
"cwe": {
"id": "CWE-125",
"name": "Out-of-bounds Read"
},
"notes": [
{
"audience": "all",
"category": "description",
"text": "curl version curl 7.20.0 to and including curl 7.59.0 contains a CWE-126: Buffer Over-read vulnerability in denial of service that can result in curl can be tricked into reading data beyond the end of a heap based buffer used to store downloaded RTSP content.. This vulnerability appears to have been fixed in curl \u003c 7.20.0 and curl \u003e= 7.60.0.",
"title": "Vulnerability Description"
}
],
"product_status": {
"fixed": [
"CSAFPID-32001",
"CSAFPID-32002"
],
"known_affected": [
"CSAFPID-31001",
"CSAFPID-31002"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to Firmware Release 2019.0 LTS or later.\n\nUpdate to PLCnext Engineer Release 2019.0 LTS or later.\n\nUpdate A, 30.08.2019\nWith Firmware Release 2019.6 an option was added to the web-based\nmanagement that allows the user to permanently disable storage of configuration data to the\nSD-Card. The device can now be operated without SD-Card and ignores any inserted SD-Card.\nWe recommend using this new configuration option for application scenarios where physical\naccess to the device cannot be restricted effectively.",
"group_ids": [
"CSAFGID-0001"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 9.1,
"baseSeverity": "CRITICAL",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H",
"version": "3.0"
},
"products": [
"CSAFPID-31001",
"CSAFPID-31002"
]
}
],
"title": "CVE-2018-1000301"
},
{
"cve": "CVE-2018-5388",
"cwe": {
"id": "CWE-787",
"name": "Out-of-bounds Write"
},
"notes": [
{
"audience": "all",
"category": "description",
"text": "In stroke_socket.c in strongSwan before 5.6.3, a missing packet length check could allow a buffer underflow, which may lead to resource exhaustion and denial of service while reading from the socket.",
"title": "Vulnerability Description"
}
],
"product_status": {
"fixed": [
"CSAFPID-32001",
"CSAFPID-32002"
],
"known_affected": [
"CSAFPID-31001",
"CSAFPID-31002"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to Firmware Release 2019.0 LTS or later.\n\nUpdate to PLCnext Engineer Release 2019.0 LTS or later.\n\nUpdate A, 30.08.2019\nWith Firmware Release 2019.6 an option was added to the web-based\nmanagement that allows the user to permanently disable storage of configuration data to the\nSD-Card. The device can now be operated without SD-Card and ignores any inserted SD-Card.\nWe recommend using this new configuration option for application scenarios where physical\naccess to the device cannot be restricted effectively.",
"group_ids": [
"CSAFGID-0001"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.0"
},
"products": [
"CSAFPID-31001",
"CSAFPID-31002"
]
}
],
"title": "CVE-2018-5388"
},
{
"cve": "CVE-2017-1000254",
"cwe": {
"id": "CWE-119",
"name": "Improper Restriction of Operations within the Bounds of a Memory Buffer"
},
"notes": [
{
"audience": "all",
"category": "description",
"text": "libcurl may read outside of a heap allocated buffer when doing FTP. When libcurl connects to an FTP server and successfully logs in (anonymous or not), it asks the server for the current directory with the \u0027PWD\u0027 command. The server then responds with a 257 response containing the path, inside double quotes. The returned path name is then kept by libcurl for subsequent uses. Due to a flaw in the string parser for this directory name, a directory name passed like this but without a closing double quote would lead to libcurl not adding a trailing NUL byte to the buffer holding the name. When libcurl would then later access the string, it could read beyond the allocated heap buffer and crash or wrongly access data beyond the buffer, thinking it was part of the path. A malicious server could abuse this fact and effectively prevent libcurl-based clients to work with it - the PWD command is always issued on new FTP connections and the mistake has a high chance of causing a segfault. The simple fact that this has issue remained undiscovered for this long could suggest that malformed PWD responses are rare in benign servers. We are not aware of any exploit of this flaw. This bug was introduced in commit [415d2e7cb7](https://github.com/curl/curl/commit/415d2e7cb7), March 2005. In libcurl version 7.56.0, the parser always zero terminates the string but also rejects it if not terminated properly with a final double quote.",
"title": "Vulnerability Description"
}
],
"product_status": {
"fixed": [
"CSAFPID-32001",
"CSAFPID-32002"
],
"known_affected": [
"CSAFPID-31001",
"CSAFPID-31002"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to Firmware Release 2019.0 LTS or later.\n\nUpdate to PLCnext Engineer Release 2019.0 LTS or later.\n\nUpdate A, 30.08.2019\nWith Firmware Release 2019.6 an option was added to the web-based\nmanagement that allows the user to permanently disable storage of configuration data to the\nSD-Card. The device can now be operated without SD-Card and ignores any inserted SD-Card.\nWe recommend using this new configuration option for application scenarios where physical\naccess to the device cannot be restricted effectively.",
"group_ids": [
"CSAFGID-0001"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.0"
},
"products": [
"CSAFPID-31001",
"CSAFPID-31002"
]
}
],
"title": "CVE-2017-1000254"
},
{
"cve": "CVE-2017-1000257",
"cwe": {
"id": "CWE-119",
"name": "Improper Restriction of Operations within the Bounds of a Memory Buffer"
},
"notes": [
{
"audience": "all",
"category": "description",
"text": "An IMAP FETCH response line indicates the size of the returned data, in number of bytes. When that response says the data is zero bytes, libcurl would pass on that (non-existing) data with a pointer and the size (zero) to the deliver-data function. libcurl\u0027s deliver-data function treats zero as a magic number and invokes strlen() on the data to figure out the length. The strlen() is called on a heap based buffer that might not be zero terminated so libcurl might read beyond the end of it into whatever memory lies after (or just crash) and then deliver that to the application as if it was actually downloaded.",
"title": "Vulnerability Description"
}
],
"product_status": {
"fixed": [
"CSAFPID-32001",
"CSAFPID-32002"
],
"known_affected": [
"CSAFPID-31001",
"CSAFPID-31002"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to Firmware Release 2019.0 LTS or later.\n\nUpdate to PLCnext Engineer Release 2019.0 LTS or later.\n\nUpdate A, 30.08.2019\nWith Firmware Release 2019.6 an option was added to the web-based\nmanagement that allows the user to permanently disable storage of configuration data to the\nSD-Card. The device can now be operated without SD-Card and ignores any inserted SD-Card.\nWe recommend using this new configuration option for application scenarios where physical\naccess to the device cannot be restricted effectively.",
"group_ids": [
"CSAFGID-0001"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 9.1,
"baseSeverity": "CRITICAL",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H",
"version": "3.0"
},
"products": [
"CSAFPID-31001",
"CSAFPID-31002"
]
}
],
"title": "CVE-2017-1000257"
},
{
"cve": "CVE-2017-11108",
"cwe": {
"id": "CWE-125",
"name": "Out-of-bounds Read"
},
"notes": [
{
"audience": "all",
"category": "description",
"text": "tcpdump 4.9.0 allows remote attackers to cause a denial of service (heap-based buffer over-read and application crash) via crafted packet data. The crash occurs in the EXTRACT_16BITS function, called from the stp_print function for the Spanning Tree Protocol.",
"title": "Vulnerability Description"
}
],
"product_status": {
"fixed": [
"CSAFPID-32001",
"CSAFPID-32002"
],
"known_affected": [
"CSAFPID-31001",
"CSAFPID-31002"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to Firmware Release 2019.0 LTS or later.\n\nUpdate to PLCnext Engineer Release 2019.0 LTS or later.\n\nUpdate A, 30.08.2019\nWith Firmware Release 2019.6 an option was added to the web-based\nmanagement that allows the user to permanently disable storage of configuration data to the\nSD-Card. The device can now be operated without SD-Card and ignores any inserted SD-Card.\nWe recommend using this new configuration option for application scenarios where physical\naccess to the device cannot be restricted effectively.",
"group_ids": [
"CSAFGID-0001"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.0"
},
"products": [
"CSAFPID-31001",
"CSAFPID-31002"
]
}
],
"title": "CVE-2017-11108"
},
{
"cve": "CVE-2017-11185",
"cwe": {
"id": "CWE-476",
"name": "NULL Pointer Dereference"
},
"notes": [
{
"audience": "all",
"category": "description",
"text": "The gmp plugin in strongSwan before 5.6.0 allows remote attackers to cause a denial of service (NULL pointer dereference and daemon crash) via a crafted RSA signature.",
"title": "Vulnerability Description"
}
],
"product_status": {
"fixed": [
"CSAFPID-32001",
"CSAFPID-32002"
],
"known_affected": [
"CSAFPID-31001",
"CSAFPID-31002"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to Firmware Release 2019.0 LTS or later.\n\nUpdate to PLCnext Engineer Release 2019.0 LTS or later.\n\nUpdate A, 30.08.2019\nWith Firmware Release 2019.6 an option was added to the web-based\nmanagement that allows the user to permanently disable storage of configuration data to the\nSD-Card. The device can now be operated without SD-Card and ignores any inserted SD-Card.\nWe recommend using this new configuration option for application scenarios where physical\naccess to the device cannot be restricted effectively.",
"group_ids": [
"CSAFGID-0001"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.0"
},
"products": [
"CSAFPID-31001",
"CSAFPID-31002"
]
}
],
"title": "CVE-2017-11185"
},
{
"cve": "CVE-2017-11541",
"cwe": {
"id": "CWE-125",
"name": "Out-of-bounds Read"
},
"notes": [
{
"audience": "all",
"category": "description",
"text": "tcpdump 4.9.0 has a heap-based buffer over-read in the lldp_print function in print-lldp.c, related to util-print.c.",
"title": "Vulnerability Description"
}
],
"product_status": {
"fixed": [
"CSAFPID-32001",
"CSAFPID-32002"
],
"known_affected": [
"CSAFPID-31001",
"CSAFPID-31002"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to Firmware Release 2019.0 LTS or later.\n\nUpdate to PLCnext Engineer Release 2019.0 LTS or later.\n\nUpdate A, 30.08.2019\nWith Firmware Release 2019.6 an option was added to the web-based\nmanagement that allows the user to permanently disable storage of configuration data to the\nSD-Card. The device can now be operated without SD-Card and ignores any inserted SD-Card.\nWe recommend using this new configuration option for application scenarios where physical\naccess to the device cannot be restricted effectively.",
"group_ids": [
"CSAFGID-0001"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.0"
},
"products": [
"CSAFPID-31001",
"CSAFPID-31002"
]
}
],
"title": "CVE-2017-11541"
},
{
"cve": "CVE-2017-11542",
"cwe": {
"id": "CWE-125",
"name": "Out-of-bounds Read"
},
"notes": [
{
"audience": "all",
"category": "description",
"text": "tcpdump 4.9.0 has a heap-based buffer over-read in the pimv1_print function in print-pim.c.",
"title": "Vulnerability Description"
}
],
"product_status": {
"fixed": [
"CSAFPID-32001",
"CSAFPID-32002"
],
"known_affected": [
"CSAFPID-31001",
"CSAFPID-31002"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to Firmware Release 2019.0 LTS or later.\n\nUpdate to PLCnext Engineer Release 2019.0 LTS or later.\n\nUpdate A, 30.08.2019\nWith Firmware Release 2019.6 an option was added to the web-based\nmanagement that allows the user to permanently disable storage of configuration data to the\nSD-Card. The device can now be operated without SD-Card and ignores any inserted SD-Card.\nWe recommend using this new configuration option for application scenarios where physical\naccess to the device cannot be restricted effectively.",
"group_ids": [
"CSAFGID-0001"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.0"
},
"products": [
"CSAFPID-31001",
"CSAFPID-31002"
]
}
],
"title": "CVE-2017-11542"
},
{
"cve": "CVE-2017-11543",
"cwe": {
"id": "CWE-119",
"name": "Improper Restriction of Operations within the Bounds of a Memory Buffer"
},
"notes": [
{
"audience": "all",
"category": "description",
"text": "tcpdump 4.9.0 has a buffer overflow in the sliplink_print function in print-sl.c.",
"title": "Vulnerability Description"
}
],
"product_status": {
"fixed": [
"CSAFPID-32001",
"CSAFPID-32002"
],
"known_affected": [
"CSAFPID-31001",
"CSAFPID-31002"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to Firmware Release 2019.0 LTS or later.\n\nUpdate to PLCnext Engineer Release 2019.0 LTS or later.\n\nUpdate A, 30.08.2019\nWith Firmware Release 2019.6 an option was added to the web-based\nmanagement that allows the user to permanently disable storage of configuration data to the\nSD-Card. The device can now be operated without SD-Card and ignores any inserted SD-Card.\nWe recommend using this new configuration option for application scenarios where physical\naccess to the device cannot be restricted effectively.",
"group_ids": [
"CSAFGID-0001"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.0"
},
"products": [
"CSAFPID-31001",
"CSAFPID-31002"
]
}
],
"title": "CVE-2017-11543"
},
{
"cve": "CVE-2017-15906",
"cwe": {
"id": "CWE-732",
"name": "Incorrect Permission Assignment for Critical Resource"
},
"notes": [
{
"audience": "all",
"category": "description",
"text": "The process_open function in sftp-server.c in OpenSSH before 7.6 does not properly prevent write operations in readonly mode, which allows attackers to create zero-length files.",
"title": "Vulnerability Description"
}
],
"product_status": {
"fixed": [
"CSAFPID-32001",
"CSAFPID-32002"
],
"known_affected": [
"CSAFPID-31001",
"CSAFPID-31002"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to Firmware Release 2019.0 LTS or later.\n\nUpdate to PLCnext Engineer Release 2019.0 LTS or later.\n\nUpdate A, 30.08.2019\nWith Firmware Release 2019.6 an option was added to the web-based\nmanagement that allows the user to permanently disable storage of configuration data to the\nSD-Card. The device can now be operated without SD-Card and ignores any inserted SD-Card.\nWe recommend using this new configuration option for application scenarios where physical\naccess to the device cannot be restricted effectively.",
"group_ids": [
"CSAFGID-0001"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "LOW",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N",
"version": "3.1"
},
"products": [
"CSAFPID-31001",
"CSAFPID-31002"
]
}
],
"title": "CVE-2017-15906"
},
{
"cve": "CVE-2017-3731",
"cwe": {
"id": "CWE-125",
"name": "Out-of-bounds Read"
},
"notes": [
{
"audience": "all",
"category": "description",
"text": "If an SSL/TLS server or client is running on a 32-bit host, and a specific cipher is being used, then a truncated packet can cause that server or client to perform an out-of-bounds read, usually resulting in a crash. For OpenSSL 1.1.0, the crash can be triggered when using CHACHA20/POLY1305; users should upgrade to 1.1.0d. For Openssl 1.0.2, the crash can be triggered when using RC4-MD5; users who have not disabled that algorithm should update to 1.0.2k.",
"title": "Vulnerability Description"
}
],
"product_status": {
"fixed": [
"CSAFPID-32001",
"CSAFPID-32002"
],
"known_affected": [
"CSAFPID-31001",
"CSAFPID-31002"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to Firmware Release 2019.0 LTS or later.\n\nUpdate to PLCnext Engineer Release 2019.0 LTS or later.\n\nUpdate A, 30.08.2019\nWith Firmware Release 2019.6 an option was added to the web-based\nmanagement that allows the user to permanently disable storage of configuration data to the\nSD-Card. The device can now be operated without SD-Card and ignores any inserted SD-Card.\nWe recommend using this new configuration option for application scenarios where physical\naccess to the device cannot be restricted effectively.",
"group_ids": [
"CSAFGID-0001"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-31001",
"CSAFPID-31002"
]
}
],
"title": "CVE-2017-3731"
},
{
"cve": "CVE-2017-9233",
"cwe": {
"id": "CWE-611",
"name": "Improper Restriction of XML External Entity Reference"
},
"notes": [
{
"audience": "all",
"category": "description",
"text": "XML External Entity vulnerability in libexpat 2.2.0 and earlier (Expat XML Parser Library) allows attackers to put the parser in an infinite loop using a malformed external entity definition from an external DTD.",
"title": "Vulnerability Description"
}
],
"product_status": {
"fixed": [
"CSAFPID-32001",
"CSAFPID-32002"
],
"known_affected": [
"CSAFPID-31001",
"CSAFPID-31002"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to Firmware Release 2019.0 LTS or later.\n\nUpdate to PLCnext Engineer Release 2019.0 LTS or later.\n\nUpdate A, 30.08.2019\nWith Firmware Release 2019.6 an option was added to the web-based\nmanagement that allows the user to permanently disable storage of configuration data to the\nSD-Card. The device can now be operated without SD-Card and ignores any inserted SD-Card.\nWe recommend using this new configuration option for application scenarios where physical\naccess to the device cannot be restricted effectively.",
"group_ids": [
"CSAFGID-0001"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-31001",
"CSAFPID-31002"
]
}
],
"title": "CVE-2017-9233"
},
{
"cve": "CVE-2017-3737",
"cwe": {
"id": "CWE-125",
"name": "Out-of-bounds Read"
},
"notes": [
{
"audience": "all",
"category": "description",
"text": "OpenSSL 1.0.2 (starting from version 1.0.2b) introduced an \"error state\" mechanism. The intent was that if a fatal error occurred during a handshake then OpenSSL would move into the error state and would immediately fail if you attempted to continue the handshake. This works as designed for the explicit handshake functions (SSL_do_handshake(), SSL_accept() and SSL_connect()), however due to a bug it does not work correctly if SSL_read() or SSL_write() is called directly. In that scenario, if the handshake fails then a fatal error will be returned in the initial function call. If SSL_read()/SSL_write() is subsequently called by the application for the same SSL object then it will succeed and the data is passed without being decrypted/encrypted directly from the SSL/TLS record layer. In order to exploit this issue an application bug would have to be present that resulted in a call to SSL_read()/SSL_write() being issued after having already received a fatal error. OpenSSL version 1.0.2b-1.0.2m are affected. Fixed in OpenSSL 1.0.2n. OpenSSL 1.1.0 is not affected.",
"title": "Vulnerability Description"
}
],
"product_status": {
"fixed": [
"CSAFPID-32001",
"CSAFPID-32002"
],
"known_affected": [
"CSAFPID-31001",
"CSAFPID-31002"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to Firmware Release 2019.0 LTS or later.\n\nUpdate to PLCnext Engineer Release 2019.0 LTS or later.\n\nUpdate A, 30.08.2019\nWith Firmware Release 2019.6 an option was added to the web-based\nmanagement that allows the user to permanently disable storage of configuration data to the\nSD-Card. The device can now be operated without SD-Card and ignores any inserted SD-Card.\nWe recommend using this new configuration option for application scenarios where physical\naccess to the device cannot be restricted effectively.",
"group_ids": [
"CSAFGID-0001"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 5.9,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N",
"version": "3.0"
},
"products": [
"CSAFPID-31001",
"CSAFPID-31002"
]
}
],
"title": "CVE-2017-3737"
},
{
"cve": "CVE-2018-1000122",
"cwe": {
"id": "CWE-125",
"name": "Out-of-bounds Read"
},
"notes": [
{
"audience": "all",
"category": "description",
"text": "A buffer over-read exists in curl 7.20.0 to and including curl 7.58.0 in the RTSP+RTP handling code that allows an attacker to cause a denial of service or information leakage",
"title": "Vulnerability Description"
}
],
"product_status": {
"fixed": [
"CSAFPID-32001",
"CSAFPID-32002"
],
"known_affected": [
"CSAFPID-31001",
"CSAFPID-31002"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to Firmware Release 2019.0 LTS or later.\n\nUpdate to PLCnext Engineer Release 2019.0 LTS or later.\n\nUpdate A, 30.08.2019\nWith Firmware Release 2019.6 an option was added to the web-based\nmanagement that allows the user to permanently disable storage of configuration data to the\nSD-Card. The device can now be operated without SD-Card and ignores any inserted SD-Card.\nWe recommend using this new configuration option for application scenarios where physical\naccess to the device cannot be restricted effectively.",
"group_ids": [
"CSAFGID-0001"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 9.1,
"baseSeverity": "CRITICAL",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H",
"version": "3.0"
},
"products": [
"CSAFPID-31001",
"CSAFPID-31002"
]
}
],
"title": "CVE-2018-1000122"
},
{
"cve": "CVE-2018-7559",
"notes": [
{
"audience": "all",
"category": "description",
"text": "An issue was discovered in OPC UA .NET Standard Stack and Sample Code before GitHub commit 2018-04-12, and OPC UA .NET Legacy Stack and Sample Code before GitHub commit 2018-03-13. A vulnerability in OPC UA applications can allow a remote attacker to determine a Server\u0027s private key by sending carefully constructed bad UserIdentityTokens as part of an oracle attack.",
"title": "Vulnerability Description"
}
],
"product_status": {
"fixed": [
"CSAFPID-32001",
"CSAFPID-32002"
],
"known_affected": [
"CSAFPID-31001",
"CSAFPID-31002"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to Firmware Release 2019.0 LTS or later.\n\nUpdate to PLCnext Engineer Release 2019.0 LTS or later.\n\nUpdate A, 30.08.2019\nWith Firmware Release 2019.6 an option was added to the web-based\nmanagement that allows the user to permanently disable storage of configuration data to the\nSD-Card. The device can now be operated without SD-Card and ignores any inserted SD-Card.\nWe recommend using this new configuration option for application scenarios where physical\naccess to the device cannot be restricted effectively.",
"group_ids": [
"CSAFGID-0001"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N",
"version": "3.0"
},
"products": [
"CSAFPID-31001",
"CSAFPID-31002"
]
}
],
"title": "CVE-2018-7559"
},
{
"cve": "CVE-2017-3738",
"cwe": {
"id": "CWE-200",
"name": "Exposure of Sensitive Information to an Unauthorized Actor"
},
"notes": [
{
"audience": "all",
"category": "description",
"text": "There is an overflow bug in the AVX2 Montgomery multiplication procedure used in exponentiation with 1024-bit moduli. No EC algorithms are affected. Analysis suggests that attacks against RSA and DSA as a result of this defect would be very difficult to perform and are not believed likely. Attacks against DH1024 are considered just feasible, because most of the work necessary to deduce information about a private key may be performed offline. The amount of resources required for such an attack would be significant. However, for an attack on TLS to be meaningful, the server would have to share the DH1024 private key among multiple clients, which is no longer an option since CVE-2016-0701. This only affects processors that support the AVX2 but not ADX extensions like Intel Haswell (4th generation). Note: The impact from this issue is similar to CVE-2017-3736, CVE-2017-3732 and CVE-2015-3193. OpenSSL version 1.0.2-1.0.2m and 1.1.0-1.1.0g are affected. Fixed in OpenSSL 1.0.2n. Due to the low severity of this issue we are not issuing a new release of OpenSSL 1.1.0 at this time. The fix will be included in OpenSSL 1.1.0h when it becomes available. The fix is also available in commit e502cc86d in the OpenSSL git repository.",
"title": "Vulnerability Description"
}
],
"product_status": {
"fixed": [
"CSAFPID-32001",
"CSAFPID-32002"
],
"known_affected": [
"CSAFPID-31001",
"CSAFPID-31002"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to Firmware Release 2019.0 LTS or later.\n\nUpdate to PLCnext Engineer Release 2019.0 LTS or later.\n\nUpdate A, 30.08.2019\nWith Firmware Release 2019.6 an option was added to the web-based\nmanagement that allows the user to permanently disable storage of configuration data to the\nSD-Card. The device can now be operated without SD-Card and ignores any inserted SD-Card.\nWe recommend using this new configuration option for application scenarios where physical\naccess to the device cannot be restricted effectively.",
"group_ids": [
"CSAFGID-0001"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 5.9,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"CSAFPID-31001",
"CSAFPID-31002"
]
}
],
"title": "CVE-2017-3738"
},
{
"cve": "CVE-2017-5334",
"cwe": {
"id": "CWE-415",
"name": "Double Free"
},
"notes": [
{
"audience": "all",
"category": "description",
"text": "Double free vulnerability in the gnutls_x509_ext_import_proxy function in GnuTLS before 3.3.26 and 3.5.x before 3.5.8 allows remote attackers to have unspecified impact via crafted policy language information in an X.509 certificate with a Proxy Certificate Information extension.",
"title": "Vulnerability Description"
}
],
"product_status": {
"fixed": [
"CSAFPID-32001",
"CSAFPID-32002"
],
"known_affected": [
"CSAFPID-31001",
"CSAFPID-31002"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to Firmware Release 2019.0 LTS or later.\n\nUpdate to PLCnext Engineer Release 2019.0 LTS or later.\n\nUpdate A, 30.08.2019\nWith Firmware Release 2019.6 an option was added to the web-based\nmanagement that allows the user to permanently disable storage of configuration data to the\nSD-Card. The device can now be operated without SD-Card and ignores any inserted SD-Card.\nWe recommend using this new configuration option for application scenarios where physical\naccess to the device cannot be restricted effectively.",
"group_ids": [
"CSAFGID-0001"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.0"
},
"products": [
"CSAFPID-31001",
"CSAFPID-31002"
]
}
],
"title": "CVE-2017-5334"
},
{
"cve": "CVE-2017-5335",
"cwe": {
"id": "CWE-125",
"name": "Out-of-bounds Read"
},
"notes": [
{
"audience": "all",
"category": "description",
"text": "The stream reading functions in lib/opencdk/read-packet.c in GnuTLS before 3.3.26 and 3.5.x before 3.5.8 allow remote attackers to cause a denial of service (out-of-memory error and crash) via a crafted OpenPGP certificate.",
"title": "Vulnerability Description"
}
],
"product_status": {
"fixed": [
"CSAFPID-32001",
"CSAFPID-32002"
],
"known_affected": [
"CSAFPID-31001",
"CSAFPID-31002"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to Firmware Release 2019.0 LTS or later.\n\nUpdate to PLCnext Engineer Release 2019.0 LTS or later.\n\nUpdate A, 30.08.2019\nWith Firmware Release 2019.6 an option was added to the web-based\nmanagement that allows the user to permanently disable storage of configuration data to the\nSD-Card. The device can now be operated without SD-Card and ignores any inserted SD-Card.\nWe recommend using this new configuration option for application scenarios where physical\naccess to the device cannot be restricted effectively.",
"group_ids": [
"CSAFGID-0001"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.0"
},
"products": [
"CSAFPID-31001",
"CSAFPID-31002"
]
}
],
"title": "CVE-2017-5335"
},
{
"cve": "CVE-2017-5336",
"cwe": {
"id": "CWE-119",
"name": "Improper Restriction of Operations within the Bounds of a Memory Buffer"
},
"notes": [
{
"audience": "all",
"category": "description",
"text": "Stack-based buffer overflow in the cdk_pk_get_keyid function in lib/opencdk/pubkey.c in GnuTLS before 3.3.26 and 3.5.x before 3.5.8 allows remote attackers to have unspecified impact via a crafted OpenPGP certificate.",
"title": "Vulnerability Description"
}
],
"product_status": {
"fixed": [
"CSAFPID-32001",
"CSAFPID-32002"
],
"known_affected": [
"CSAFPID-31001",
"CSAFPID-31002"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to Firmware Release 2019.0 LTS or later.\n\nUpdate to PLCnext Engineer Release 2019.0 LTS or later.\n\nUpdate A, 30.08.2019\nWith Firmware Release 2019.6 an option was added to the web-based\nmanagement that allows the user to permanently disable storage of configuration data to the\nSD-Card. The device can now be operated without SD-Card and ignores any inserted SD-Card.\nWe recommend using this new configuration option for application scenarios where physical\naccess to the device cannot be restricted effectively.",
"group_ids": [
"CSAFGID-0001"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.0"
},
"products": [
"CSAFPID-31001",
"CSAFPID-31002"
]
}
],
"title": "CVE-2017-5336"
},
{
"cve": "CVE-2017-5337",
"cwe": {
"id": "CWE-119",
"name": "Improper Restriction of Operations within the Bounds of a Memory Buffer"
},
"notes": [
{
"audience": "all",
"category": "description",
"text": "Multiple heap-based buffer overflows in the read_attribute function in GnuTLS before 3.3.26 and 3.5.x before 3.5.8 allow remote attackers to have unspecified impact via a crafted OpenPGP certificate.",
"title": "Vulnerability Description"
}
],
"product_status": {
"fixed": [
"CSAFPID-32001",
"CSAFPID-32002"
],
"known_affected": [
"CSAFPID-31001",
"CSAFPID-31002"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to Firmware Release 2019.0 LTS or later.\n\nUpdate to PLCnext Engineer Release 2019.0 LTS or later.\n\nUpdate A, 30.08.2019\nWith Firmware Release 2019.6 an option was added to the web-based\nmanagement that allows the user to permanently disable storage of configuration data to the\nSD-Card. The device can now be operated without SD-Card and ignores any inserted SD-Card.\nWe recommend using this new configuration option for application scenarios where physical\naccess to the device cannot be restricted effectively.",
"group_ids": [
"CSAFGID-0001"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.0"
},
"products": [
"CSAFPID-31001",
"CSAFPID-31002"
]
}
],
"title": "CVE-2017-5337"
},
{
"cve": "CVE-2017-8816",
"cwe": {
"id": "CWE-190",
"name": "Integer Overflow or Wraparound"
},
"notes": [
{
"audience": "all",
"category": "description",
"text": "The NTLM authentication feature in curl and libcurl before 7.57.0 on 32-bit platforms allows attackers to cause a denial of service (integer overflow and resultant buffer overflow, and application crash) or possibly have unspecified other impact via vectors involving long user and password fields.",
"title": "Vulnerability Description"
}
],
"product_status": {
"fixed": [
"CSAFPID-32001",
"CSAFPID-32002"
],
"known_affected": [
"CSAFPID-31001",
"CSAFPID-31002"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to Firmware Release 2019.0 LTS or later.\n\nUpdate to PLCnext Engineer Release 2019.0 LTS or later.\n\nUpdate A, 30.08.2019\nWith Firmware Release 2019.6 an option was added to the web-based\nmanagement that allows the user to permanently disable storage of configuration data to the\nSD-Card. The device can now be operated without SD-Card and ignores any inserted SD-Card.\nWe recommend using this new configuration option for application scenarios where physical\naccess to the device cannot be restricted effectively.",
"group_ids": [
"CSAFGID-0001"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.0"
},
"products": [
"CSAFPID-31001",
"CSAFPID-31002"
]
}
],
"title": "CVE-2017-8816"
},
{
"cve": "CVE-2017-8817",
"cwe": {
"id": "CWE-125",
"name": "Out-of-bounds Read"
},
"notes": [
{
"audience": "all",
"category": "description",
"text": "The FTP wildcard function in curl and libcurl before 7.57.0 allows remote attackers to cause a denial of service (out-of-bounds read and application crash) or possibly have unspecified other impact via a string that ends with an \u0027[\u0027 character.",
"title": "Vulnerability Description"
}
],
"product_status": {
"fixed": [
"CSAFPID-32001",
"CSAFPID-32002"
],
"known_affected": [
"CSAFPID-31001",
"CSAFPID-31002"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to Firmware Release 2019.0 LTS or later.\n\nUpdate to PLCnext Engineer Release 2019.0 LTS or later.\n\nUpdate A, 30.08.2019\nWith Firmware Release 2019.6 an option was added to the web-based\nmanagement that allows the user to permanently disable storage of configuration data to the\nSD-Card. The device can now be operated without SD-Card and ignores any inserted SD-Card.\nWe recommend using this new configuration option for application scenarios where physical\naccess to the device cannot be restricted effectively.",
"group_ids": [
"CSAFGID-0001"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.0"
},
"products": [
"CSAFPID-31001",
"CSAFPID-31002"
]
}
],
"title": "CVE-2017-8817"
},
{
"cve": "CVE-2017-9022",
"cwe": {
"id": "CWE-20",
"name": "Improper Input Validation"
},
"notes": [
{
"audience": "all",
"category": "description",
"text": "The gmp plugin in strongSwan before 5.5.3 does not properly validate RSA public keys before calling mpz_powm_sec, which allows remote peers to cause a denial of service (floating point exception and process crash) via a crafted certificate.",
"title": "Vulnerability Description"
}
],
"product_status": {
"fixed": [
"CSAFPID-32001",
"CSAFPID-32002"
],
"known_affected": [
"CSAFPID-31001",
"CSAFPID-31002"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to Firmware Release 2019.0 LTS or later.\n\nUpdate to PLCnext Engineer Release 2019.0 LTS or later.\n\nUpdate A, 30.08.2019\nWith Firmware Release 2019.6 an option was added to the web-based\nmanagement that allows the user to permanently disable storage of configuration data to the\nSD-Card. The device can now be operated without SD-Card and ignores any inserted SD-Card.\nWe recommend using this new configuration option for application scenarios where physical\naccess to the device cannot be restricted effectively.",
"group_ids": [
"CSAFGID-0001"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.0"
},
"products": [
"CSAFPID-31001",
"CSAFPID-31002"
]
}
],
"title": "CVE-2017-9022"
},
{
"cve": "CVE-2017-9023",
"cwe": {
"id": "CWE-835",
"name": "Loop with Unreachable Exit Condition (\u0027Infinite Loop\u0027)"
},
"notes": [
{
"audience": "all",
"category": "description",
"text": "The ASN.1 parser in strongSwan before 5.5.3 improperly handles CHOICE types when the x509 plugin is enabled, which allows remote attackers to cause a denial of service (infinite loop) via a crafted certificate.",
"title": "Vulnerability Description"
}
],
"product_status": {
"fixed": [
"CSAFPID-32001",
"CSAFPID-32002"
],
"known_affected": [
"CSAFPID-31001",
"CSAFPID-31002"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to Firmware Release 2019.0 LTS or later.\n\nUpdate to PLCnext Engineer Release 2019.0 LTS or later.\n\nUpdate A, 30.08.2019\nWith Firmware Release 2019.6 an option was added to the web-based\nmanagement that allows the user to permanently disable storage of configuration data to the\nSD-Card. The device can now be operated without SD-Card and ignores any inserted SD-Card.\nWe recommend using this new configuration option for application scenarios where physical\naccess to the device cannot be restricted effectively.",
"group_ids": [
"CSAFGID-0001"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.0"
},
"products": [
"CSAFPID-31001",
"CSAFPID-31002"
]
}
],
"title": "CVE-2017-9023"
},
{
"cve": "CVE-2018-0737",
"cwe": {
"id": "CWE-327",
"name": "Use of a Broken or Risky Cryptographic Algorithm"
},
"notes": [
{
"audience": "all",
"category": "description",
"text": "The OpenSSL RSA Key generation algorithm has been shown to be vulnerable to a cache timing side channel attack. An attacker with sufficient access to mount cache timing attacks during the RSA key generation process could recover the private key. Fixed in OpenSSL 1.1.0i-dev (Affected 1.1.0-1.1.0h). Fixed in OpenSSL 1.0.2p-dev (Affected 1.0.2b-1.0.2o).",
"title": "Vulnerability Description"
}
],
"product_status": {
"fixed": [
"CSAFPID-32001",
"CSAFPID-32002"
],
"known_affected": [
"CSAFPID-31001",
"CSAFPID-31002"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to Firmware Release 2019.0 LTS or later.\n\nUpdate to PLCnext Engineer Release 2019.0 LTS or later.\n\nUpdate A, 30.08.2019\nWith Firmware Release 2019.6 an option was added to the web-based\nmanagement that allows the user to permanently disable storage of configuration data to the\nSD-Card. The device can now be operated without SD-Card and ignores any inserted SD-Card.\nWe recommend using this new configuration option for application scenarios where physical\naccess to the device cannot be restricted effectively.",
"group_ids": [
"CSAFGID-0001"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 5.9,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N",
"version": "3.0"
},
"products": [
"CSAFPID-31001",
"CSAFPID-31002"
]
}
],
"title": "CVE-2018-0737"
},
{
"cve": "CVE-2018-1000005",
"cwe": {
"id": "CWE-125",
"name": "Out-of-bounds Read"
},
"notes": [
{
"audience": "all",
"category": "description",
"text": "libcurl 7.49.0 to and including 7.57.0 contains an out bounds read in code handling HTTP/2 trailers. It was reported (https://github.com/curl/curl/pull/2231) that reading an HTTP/2 trailer could mess up future trailers since the stored size was one byte less than required. The problem is that the code that creates HTTP/1-like headers from the HTTP/2 trailer data once appended a string like \u0027:\u0027 to the target buffer, while this was recently changed to \u0027: \u0027 (a space was added after the colon) but the following math wasn\u0027t updated correspondingly. When accessed, the data is read out of bounds and causes either a crash or that the (too large) data gets passed to client write. This could lead to a denial-of-service situation or an information disclosure if someone has a service that echoes back or uses the trailers for something.",
"title": "Vulnerability Description"
}
],
"product_status": {
"fixed": [
"CSAFPID-32001",
"CSAFPID-32002"
],
"known_affected": [
"CSAFPID-31001",
"CSAFPID-31002"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to Firmware Release 2019.0 LTS or later.\n\nUpdate to PLCnext Engineer Release 2019.0 LTS or later.\n\nUpdate A, 30.08.2019\nWith Firmware Release 2019.6 an option was added to the web-based\nmanagement that allows the user to permanently disable storage of configuration data to the\nSD-Card. The device can now be operated without SD-Card and ignores any inserted SD-Card.\nWe recommend using this new configuration option for application scenarios where physical\naccess to the device cannot be restricted effectively.",
"group_ids": [
"CSAFGID-0001"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 9.1,
"baseSeverity": "CRITICAL",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H",
"version": "3.0"
},
"products": [
"CSAFPID-31001",
"CSAFPID-31002"
]
}
],
"title": "CVE-2018-1000005"
},
{
"cve": "CVE-2018-1000117",
"cwe": {
"id": "CWE-120",
"name": "Buffer Copy without Checking Size of Input (\u0027Classic Buffer Overflow\u0027)"
},
"notes": [
{
"audience": "all",
"category": "description",
"text": "Python Software Foundation CPython version From 3.2 until 3.6.4 on Windows contains a Buffer Overflow vulnerability in os.symlink() function on Windows that can result in Arbitrary code execution, likely escalation of privilege. This attack appears to be exploitable via a python script that creates a symlink with an attacker controlled name or location. This vulnerability appears to have been fixed in 3.7.0 and 3.6.5.",
"title": "Vulnerability Description"
}
],
"product_status": {
"fixed": [
"CSAFPID-32001",
"CSAFPID-32002"
],
"known_affected": [
"CSAFPID-31001",
"CSAFPID-31002"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to Firmware Release 2019.0 LTS or later.\n\nUpdate to PLCnext Engineer Release 2019.0 LTS or later.\n\nUpdate A, 30.08.2019\nWith Firmware Release 2019.6 an option was added to the web-based\nmanagement that allows the user to permanently disable storage of configuration data to the\nSD-Card. The device can now be operated without SD-Card and ignores any inserted SD-Card.\nWe recommend using this new configuration option for application scenarios where physical\naccess to the device cannot be restricted effectively.",
"group_ids": [
"CSAFGID-0001"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 6.7,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "HIGH",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-31001",
"CSAFPID-31002"
]
}
],
"title": "CVE-2018-1000117"
},
{
"cve": "CVE-2019-10997",
"cwe": {
"id": "CWE-119",
"name": "Improper Restriction of Operations within the Bounds of a Memory Buffer"
},
"notes": [
{
"audience": "all",
"category": "description",
"text": "An issue was discovered on Phoenix Contact AXC F 2152 (No.2404267) before 2019.0 LTS and AXC F 2152 STARTERKIT (No.1046568) before 2019.0 LTS devices. Protocol Fuzzing on PC WORX Engineer by a man in the middle attacker stops the PLC service. The device must be rebooted, or the PLC service must be restarted manually via a Linux shell.",
"title": "Vulnerability Description"
}
],
"product_status": {
"fixed": [
"CSAFPID-32001",
"CSAFPID-32002"
],
"known_affected": [
"CSAFPID-31001",
"CSAFPID-31002"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to Firmware Release 2019.0 LTS or later.\n\nUpdate to PLCnext Engineer Release 2019.0 LTS or later.\n\nUpdate A, 30.08.2019\nWith Firmware Release 2019.6 an option was added to the web-based\nmanagement that allows the user to permanently disable storage of configuration data to the\nSD-Card. The device can now be operated without SD-Card and ignores any inserted SD-Card.\nWe recommend using this new configuration option for application scenarios where physical\naccess to the device cannot be restricted effectively.",
"group_ids": [
"CSAFGID-0001"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 5.9,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.0"
},
"products": [
"CSAFPID-31001",
"CSAFPID-31002"
]
}
],
"title": "CVE-2019-10997"
},
{
"cve": "CVE-2019-10998",
"cwe": {
"id": "CWE-287",
"name": "Improper Authentication"
},
"notes": [
{
"audience": "all",
"category": "description",
"text": "An issue was discovered on Phoenix Contact AXC F 2152 (No.2404267) before 2019.0 LTS and AXC F 2152 STARTERKIT (No.1046568) before 2019.0 LTS devices. Unlimited physical access to the PLC may lead to a manipulation of SD cards data. SD card manipulation may lead to an authentication bypass opportunity.",
"title": "Vulnerability Description"
}
],
"product_status": {
"fixed": [
"CSAFPID-32001",
"CSAFPID-32002"
],
"known_affected": [
"CSAFPID-31001",
"CSAFPID-31002"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to Firmware Release 2019.0 LTS or later.\n\nUpdate to PLCnext Engineer Release 2019.0 LTS or later.\n\nUpdate A, 30.08.2019\nWith Firmware Release 2019.6 an option was added to the web-based\nmanagement that allows the user to permanently disable storage of configuration data to the\nSD-Card. The device can now be operated without SD-Card and ignores any inserted SD-Card.\nWe recommend using this new configuration option for application scenarios where physical\naccess to the device cannot be restricted effectively.",
"group_ids": [
"CSAFGID-0001"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "PHYSICAL",
"availabilityImpact": "HIGH",
"baseScore": 6.8,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.0"
},
"products": [
"CSAFPID-31001",
"CSAFPID-31002"
]
}
],
"title": "CVE-2019-10998"
}
]
}
VDE-2019-013
Vulnerability from csaf_wagogmbhcokg - Published: 2019-06-12 10:25 - Updated: 2019-06-12 10:25ld.so in the GNU C Library (aka glibc or libc6) before 2.11.3, and 2.12.x before 2.12.2, does not properly restrict use of the LD_AUDIT environment variable to reference dynamic shared objects (DSOs) as audit objects, which allows local users to gain privileges by leveraging an unsafe DSO located in a trusted library directory, as demonstrated by libpcprofile.so.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: CSAFPID-32001 | — | ||
| Unresolved product id: CSAFPID-32002 | — | ||
| Unresolved product id: CSAFPID-32003 | — |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: CSAFPID-31001 | — | ||
| Unresolved product id: CSAFPID-31002 | — | ||
| Unresolved product id: CSAFPID-31003 | — |
The DHCP client (udhcpc) in BusyBox before 1.20.0 allows remote DHCP servers to execute arbitrary commands via shell metacharacters in the (1) HOST_NAME, (2) DOMAIN_NAME, (3) NIS_DOMAIN, and (4) TFTP_SERVER_NAME host name options.
CWE-20 - Improper Input Validation| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: CSAFPID-32001 | — | ||
| Unresolved product id: CSAFPID-32002 | — | ||
| Unresolved product id: CSAFPID-32003 | — |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: CSAFPID-31001 | — | ||
| Unresolved product id: CSAFPID-31002 | — | ||
| Unresolved product id: CSAFPID-31003 | — |
Integer overflow in string/strcoll_l.c in the GNU C Library (aka glibc or libc6) 2.17 and earlier allows context-dependent attackers to cause a denial of service (crash) or possibly execute arbitrary code via a long string, which triggers a heap-based buffer overflow.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: CSAFPID-32001 | — | ||
| Unresolved product id: CSAFPID-32002 | — | ||
| Unresolved product id: CSAFPID-32003 | — |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: CSAFPID-31001 | — | ||
| Unresolved product id: CSAFPID-31002 | — | ||
| Unresolved product id: CSAFPID-31003 | — |
The posix_spawn_file_actions_addopen function in glibc before 2.20 does not copy its path argument in accordance with the POSIX specification, which allows context-dependent attackers to trigger use-after-free vulnerabilities.
CWE-94 - Improper Control of Generation of Code ('Code Injection')| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: CSAFPID-32001 | — | ||
| Unresolved product id: CSAFPID-32002 | — | ||
| Unresolved product id: CSAFPID-32003 | — |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: CSAFPID-31001 | — | ||
| Unresolved product id: CSAFPID-31002 | — | ||
| Unresolved product id: CSAFPID-31003 | — |
The nss_dns implementation of getnetbyname in GNU C Library (aka glibc) before 2.21, when the DNS backend in the Name Service Switch configuration is enabled, allows remote attackers to cause a denial of service (infinite loop) by sending a positive answer while a network name is being process.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: CSAFPID-32001 | — | ||
| Unresolved product id: CSAFPID-32002 | — | ||
| Unresolved product id: CSAFPID-32003 | — |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: CSAFPID-31001 | — | ||
| Unresolved product id: CSAFPID-31002 | — | ||
| Unresolved product id: CSAFPID-31003 | — |
The recv_and_process_client_pkt function in networking/ntpd.c in busybox allows remote attackers to cause a denial of service (CPU and bandwidth consumption) via a forged NTP packet, which triggers a communication loop.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: CSAFPID-32001 | — | ||
| Unresolved product id: CSAFPID-32002 | — | ||
| Unresolved product id: CSAFPID-32003 | — |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: CSAFPID-31001 | — | ||
| Unresolved product id: CSAFPID-31002 | — | ||
| Unresolved product id: CSAFPID-31003 | — |
The ADDW macro in stdio-common/vfscanf.c in the GNU C Library (aka glibc or libc6) before 2.21 does not properly consider data-type size during memory allocation, which allows context-dependent attackers to cause a denial of service (buffer overflow) or possibly have unspecified other impact via a long line containing wide characters that are improperly handled in a wscanf call.
CWE-119 - Improper Restriction of Operations within the Bounds of a Memory Buffer| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: CSAFPID-32001 | — | ||
| Unresolved product id: CSAFPID-32002 | — | ||
| Unresolved product id: CSAFPID-32003 | — |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: CSAFPID-31001 | — | ||
| Unresolved product id: CSAFPID-31002 | — | ||
| Unresolved product id: CSAFPID-31003 | — |
Directory traversal vulnerability in the BusyBox implementation of tar before 1.22.0 v5 allows remote attackers to point to files outside the current working directory via a symlink.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: CSAFPID-32001 | — | ||
| Unresolved product id: CSAFPID-32002 | — | ||
| Unresolved product id: CSAFPID-32003 | — |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: CSAFPID-31001 | — | ||
| Unresolved product id: CSAFPID-31002 | — | ||
| Unresolved product id: CSAFPID-31003 | — |
Multiple stack-based buffer overflows in the GNU C Library (aka glibc or libc6) before 2.23 allow context-dependent attackers to cause a denial of service (application crash) or possibly execute arbitrary code via a long argument to the (1) nan, (2) nanf, or (3) nanl function.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: CSAFPID-32001 | — | ||
| Unresolved product id: CSAFPID-32002 | — | ||
| Unresolved product id: CSAFPID-32003 | — |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: CSAFPID-31001 | — | ||
| Unresolved product id: CSAFPID-31002 | — | ||
| Unresolved product id: CSAFPID-31003 | — |
nscd in the GNU C Library (aka glibc or libc6) before version 2.20 does not correctly compute the size of an internal buffer when processing netgroup requests, possibly leading to an nscd daemon crash or code execution as the user running nscd.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: CSAFPID-32001 | — | ||
| Unresolved product id: CSAFPID-32002 | — | ||
| Unresolved product id: CSAFPID-32003 | — |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: CSAFPID-31001 | — | ||
| Unresolved product id: CSAFPID-31002 | — | ||
| Unresolved product id: CSAFPID-31003 | — |
huft_build in archival/libarchive/decompress_gunzip.c in BusyBox before 1.27.2 misuses a pointer, causing segfaults and an application crash during an unzip operation on a specially crafted ZIP file.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: CSAFPID-32001 | — | ||
| Unresolved product id: CSAFPID-32002 | — | ||
| Unresolved product id: CSAFPID-32003 | — |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: CSAFPID-31001 | — | ||
| Unresolved product id: CSAFPID-31002 | — | ||
| Unresolved product id: CSAFPID-31003 | — |
Integer overflow in the DHCP client (udhcpc) in BusyBox before 1.25.0 allows remote attackers to cause a denial of service (crash) via a malformed RFC1035-encoded domain name, which triggers an out-of-bounds heap write.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: CSAFPID-32001 | — | ||
| Unresolved product id: CSAFPID-32002 | — | ||
| Unresolved product id: CSAFPID-32003 | — |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: CSAFPID-31001 | — | ||
| Unresolved product id: CSAFPID-31002 | — | ||
| Unresolved product id: CSAFPID-31003 | — |
Heap-based buffer overflow in the DHCP client (udhcpc) in BusyBox before 1.25.0 allows remote attackers to have unspecified impact via vectors involving OPTION_6RD parsing.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: CSAFPID-32001 | — | ||
| Unresolved product id: CSAFPID-32002 | — | ||
| Unresolved product id: CSAFPID-32003 | — |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: CSAFPID-31001 | — | ||
| Unresolved product id: CSAFPID-31002 | — | ||
| Unresolved product id: CSAFPID-31003 | — |
In the add_match function in libbb/lineedit.c in BusyBox through 1.27.2, the tab autocomplete feature of the shell, used to get a list of filenames in a directory, does not sanitize filenames and results in executing any escape sequence in the terminal. This could potentially result in code execution, arbitrary file writes, or other attacks.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: CSAFPID-32001 | — | ||
| Unresolved product id: CSAFPID-32002 | — | ||
| Unresolved product id: CSAFPID-32003 | — |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: CSAFPID-31001 | — | ||
| Unresolved product id: CSAFPID-31002 | — | ||
| Unresolved product id: CSAFPID-31003 | — |
WAGO 852-303 before FW06, 852-1305 before FW06, and 852-1505 before FW03 devices contain hardcoded private keys for the SSH daemon. The fingerprint of the SSH host key from the corresponding SSH daemon matches the embedded private key.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: CSAFPID-32001 | — | ||
| Unresolved product id: CSAFPID-32002 | — | ||
| Unresolved product id: CSAFPID-32003 | — |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: CSAFPID-31001 | — | ||
| Unresolved product id: CSAFPID-31002 | — | ||
| Unresolved product id: CSAFPID-31003 | — |
WAGO 852-303 before FW06, 852-1305 before FW06, and 852-1505 before FW03 devices contain hardcoded users and passwords that can be used to login via SSH and TELNET.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: CSAFPID-32001 | — | ||
| Unresolved product id: CSAFPID-32002 | — | ||
| Unresolved product id: CSAFPID-32003 | — |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: CSAFPID-31001 | — | ||
| Unresolved product id: CSAFPID-31002 | — | ||
| Unresolved product id: CSAFPID-31003 | — |
Heap-based buffer overflow in the __nss_hostname_digits_dots function in glibc 2.2, and other 2.x versions before 2.18, allows context-dependent attackers to execute arbitrary code via vectors related to the (1) gethostbyname or (2) gethostbyname2 function, aka "GHOST."
CWE-787 - Out-of-bounds Write| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: CSAFPID-32001 | — | ||
| Unresolved product id: CSAFPID-32002 | — | ||
| Unresolved product id: CSAFPID-32003 | — |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: CSAFPID-31001 | — | ||
| Unresolved product id: CSAFPID-31002 | — | ||
| Unresolved product id: CSAFPID-31003 | — |
util-linux/mdev.c in BusyBox before 1.21.0 uses 0777 permissions for parent directories when creating nested directories under /dev/, which allows local users to have unknown impact and attack vectors.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: CSAFPID-32001 | — | ||
| Unresolved product id: CSAFPID-32002 | — | ||
| Unresolved product id: CSAFPID-32003 | — |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: CSAFPID-31001 | — | ||
| Unresolved product id: CSAFPID-31002 | — | ||
| Unresolved product id: CSAFPID-31003 | — |
The encode_name macro in misc/mntent_r.c in the GNU C Library (aka glibc or libc6) 2.11.1 and earlier, as used by ncpmount and mount.cifs, does not properly handle newline characters in mountpoint names, which allows local users to cause a denial of service (mtab corruption), or possibly modify mount options and gain privileges, via a crafted mount request.
CWE-20 - Improper Input Validation| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: CSAFPID-32001 | — | ||
| Unresolved product id: CSAFPID-32002 | — | ||
| Unresolved product id: CSAFPID-32003 | — |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: CSAFPID-31001 | — | ||
| Unresolved product id: CSAFPID-31002 | — | ||
| Unresolved product id: CSAFPID-31003 | — |
| URL | Category |
|---|---|
| https://certvde.com/en/advisories/VDE-2019-013/ | self |
| https://wago.csaf-tp.certvde.com/.well-known/csaf… | self |
| https://www.wago.com/psirt | external |
| https://certvde.com/en/advisories/vendor/wago/ | external |
{
"document": {
"acknowledgments": [
{
"organization": "CERT@VDE",
"summary": "coordination",
"urls": [
"https://certvde.com"
]
},
{
"names": [
"T. Weber"
],
"organization": "SEC Consult Vulnerability Lab",
"summary": "reporting"
}
],
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en-GB",
"notes": [
{
"category": "summary",
"text": "Multiple vulnerabilities have been identified in WAGO 852-303, 852-1305 and 852-1505 industrial managed ethernet switches.",
"title": "Summary"
},
{
"category": "description",
"text": "(see cve details)",
"title": "Impact"
},
{
"category": "description",
"text": "Update your managed switch to the latest firmware:\n\n852-303 (\u003e= V1.2.2.S0)\n\n852-1305 (\u003e= V1.1.6.S0)\n\n852-1505 (\u003e= V1.1.5.S0)\n\n\nFirmwares published on Jun 7, 2019 or later are fixed.\n\nPlease refer to the corresponding manual. ",
"title": "Remediation"
}
],
"publisher": {
"category": "vendor",
"contact_details": "psirt@wago.com",
"name": "WAGO GmbH \u0026 Co. KG",
"namespace": "https://www.wago.com/psirt"
},
"references": [
{
"category": "self",
"summary": "VDE-2019-013: WAGO: Multiple Vulnerabilities in industrial managed switches - HTML",
"url": "https://certvde.com/en/advisories/VDE-2019-013/"
},
{
"category": "self",
"summary": "VDE-2019-013: WAGO: Multiple Vulnerabilities in industrial managed switches - CSAF",
"url": "https://wago.csaf-tp.certvde.com/.well-known/csaf/white/2019/vde-2019-013.json"
},
{
"category": "external",
"summary": "Vendor PSIRT",
"url": "https://www.wago.com/psirt"
},
{
"category": "external",
"summary": "CERT@VDE Security Advisories for WAGO GmbH \u0026 Co. KG",
"url": "https://certvde.com/en/advisories/vendor/wago/"
}
],
"title": "WAGO: Multiple Vulnerabilities in industrial managed switches",
"tracking": {
"aliases": [
"VDE-2019-013"
],
"current_release_date": "2019-06-12T10:25:00.000Z",
"generator": {
"date": "2025-04-23T08:41:04.995Z",
"engine": {
"name": "Secvisogram",
"version": "2.5.23"
}
},
"id": "VDE-2019-013",
"initial_release_date": "2019-06-12T10:25:00.000Z",
"revision_history": [
{
"date": "2019-06-12T10:25:00.000Z",
"number": "1",
"summary": "Initial revision."
}
],
"status": "final",
"version": "1"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "852-1305",
"product": {
"name": "852-1305",
"product_id": "CSAFPID-11001"
}
},
{
"category": "product_name",
"name": "852-1505",
"product": {
"name": "852-1505",
"product_id": "CSAFPID-11002"
}
},
{
"category": "product_name",
"name": "852-303",
"product": {
"name": "852-303",
"product_id": "CSAFPID-11003"
}
}
],
"category": "product_family",
"name": "Hardware"
},
{
"branches": [
{
"category": "product_version_range",
"name": "\u003cV1.1.6.S0",
"product": {
"name": "Firmware \u003cV1.1.6.S0",
"product_id": "CSAFPID-21001"
}
},
{
"category": "product_version_range",
"name": "\u003cV1.1.5.S0",
"product": {
"name": "Firmware \u003cV1.1.5.S0",
"product_id": "CSAFPID-21002"
}
},
{
"category": "product_version_range",
"name": "\u003cV1.2.2.S0",
"product": {
"name": "Firmware \u003cV1.2.2.S0",
"product_id": "CSAFPID-21003"
}
},
{
"category": "product_version",
"name": "V1.1.6.S0",
"product": {
"name": "Firmware V1.1.6.S0",
"product_id": "CSAFPID-22001"
}
},
{
"category": "product_version",
"name": "V1.1.5.S0",
"product": {
"name": "Firmware V1.1.5.S0",
"product_id": "CSAFPID-22002"
}
},
{
"category": "product_version",
"name": "V1.2.2.S0",
"product": {
"name": "Firmware V1.2.2.S0",
"product_id": "CSAFPID-22003"
}
}
],
"category": "product_family",
"name": "Firmware"
}
],
"category": "vendor",
"name": "WAGO"
}
],
"product_groups": [
{
"group_id": "CSAFGID-0001",
"product_ids": [
"CSAFPID-31001",
"CSAFPID-31002",
"CSAFPID-31003"
],
"summary": "Affected products."
},
{
"group_id": "CSAFGID-0002",
"product_ids": [
"CSAFPID-32001",
"CSAFPID-32002",
"CSAFPID-32003"
],
"summary": "Fixed products."
}
],
"relationships": [
{
"category": "installed_on",
"full_product_name": {
"name": "Firmware \u003cV1.1.6.S0 installed on 852-1305",
"product_id": "CSAFPID-31001"
},
"product_reference": "CSAFPID-21001",
"relates_to_product_reference": "CSAFPID-11001"
},
{
"category": "installed_on",
"full_product_name": {
"name": "Firmware \u003cV1.1.5.S0 installed on 852-1505",
"product_id": "CSAFPID-31002"
},
"product_reference": "CSAFPID-21002",
"relates_to_product_reference": "CSAFPID-11002"
},
{
"category": "installed_on",
"full_product_name": {
"name": "Firmware \u003cV1.2.2.S0 installed on 852-303",
"product_id": "CSAFPID-31003"
},
"product_reference": "CSAFPID-21003",
"relates_to_product_reference": "CSAFPID-11003"
},
{
"category": "installed_on",
"full_product_name": {
"name": "Firmware V1.1.6.S0 installed on 852-1305",
"product_id": "CSAFPID-32001"
},
"product_reference": "CSAFPID-22001",
"relates_to_product_reference": "CSAFPID-11001"
},
{
"category": "installed_on",
"full_product_name": {
"name": "Firmware V1.1.5.S0 installed on 852-1505",
"product_id": "CSAFPID-32002"
},
"product_reference": "CSAFPID-22002",
"relates_to_product_reference": "CSAFPID-11002"
},
{
"category": "installed_on",
"full_product_name": {
"name": "Firmware V1.2.2.S0 installed on 852-303",
"product_id": "CSAFPID-32003"
},
"product_reference": "CSAFPID-22003",
"relates_to_product_reference": "CSAFPID-11003"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2010-3856",
"notes": [
{
"category": "description",
"text": "ld.so in the GNU C Library (aka glibc or libc6) before 2.11.3, and 2.12.x before 2.12.2, does not properly restrict use of the LD_AUDIT environment variable to reference dynamic shared objects (DSOs) as audit objects, which allows local users to gain privileges by leveraging an unsafe DSO located in a trusted library directory, as demonstrated by libpcprofile.so.",
"title": "Vulnerability Description"
}
],
"product_status": {
"fixed": [
"CSAFPID-32001",
"CSAFPID-32002",
"CSAFPID-32003"
],
"known_affected": [
"CSAFPID-31001",
"CSAFPID-31002",
"CSAFPID-31003"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update your managed switch to the latest firmware:\n\n852-303 (\u003e= V1.2.2.S0)\n\n852-1305 (\u003e= V1.1.6.S0)\n\n852-1505 (\u003e= V1.1.5.S0)\n\n\nFirmwares published on Jun 7, 2019 or later are fixed.\n\nPlease refer to the corresponding manual. ",
"group_ids": [
"CSAFGID-0001"
]
}
],
"title": "CVE-2010-3856"
},
{
"cve": "CVE-2011-2716",
"cwe": {
"id": "CWE-20",
"name": "Improper Input Validation"
},
"notes": [
{
"category": "description",
"text": "The DHCP client (udhcpc) in BusyBox before 1.20.0 allows remote DHCP servers to execute arbitrary commands via shell metacharacters in the (1) HOST_NAME, (2) DOMAIN_NAME, (3) NIS_DOMAIN, and (4) TFTP_SERVER_NAME host name options.",
"title": "Vulnerability Description"
}
],
"product_status": {
"fixed": [
"CSAFPID-32001",
"CSAFPID-32002",
"CSAFPID-32003"
],
"known_affected": [
"CSAFPID-31001",
"CSAFPID-31002",
"CSAFPID-31003"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update your managed switch to the latest firmware:\n\n852-303 (\u003e= V1.2.2.S0)\n\n852-1305 (\u003e= V1.1.6.S0)\n\n852-1505 (\u003e= V1.1.5.S0)\n\n\nFirmwares published on Jun 7, 2019 or later are fixed.\n\nPlease refer to the corresponding manual. ",
"group_ids": [
"CSAFGID-0001"
]
}
],
"title": "CVE-2011-2716"
},
{
"cve": "CVE-2012-4412",
"notes": [
{
"category": "description",
"text": "Integer overflow in string/strcoll_l.c in the GNU C Library (aka glibc or libc6) 2.17 and earlier allows context-dependent attackers to cause a denial of service (crash) or possibly execute arbitrary code via a long string, which triggers a heap-based buffer overflow.",
"title": "Vulnerability Description"
}
],
"product_status": {
"fixed": [
"CSAFPID-32001",
"CSAFPID-32002",
"CSAFPID-32003"
],
"known_affected": [
"CSAFPID-31001",
"CSAFPID-31002",
"CSAFPID-31003"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update your managed switch to the latest firmware:\n\n852-303 (\u003e= V1.2.2.S0)\n\n852-1305 (\u003e= V1.1.6.S0)\n\n852-1505 (\u003e= V1.1.5.S0)\n\n\nFirmwares published on Jun 7, 2019 or later are fixed.\n\nPlease refer to the corresponding manual. ",
"group_ids": [
"CSAFGID-0001"
]
}
],
"title": "CVE-2012-4412"
},
{
"cve": "CVE-2014-4043",
"cwe": {
"id": "CWE-94",
"name": "Improper Control of Generation of Code (\u0027Code Injection\u0027)"
},
"notes": [
{
"category": "description",
"text": "The posix_spawn_file_actions_addopen function in glibc before 2.20 does not copy its path argument in accordance with the POSIX specification, which allows context-dependent attackers to trigger use-after-free vulnerabilities.",
"title": "Vulnerability Description"
}
],
"product_status": {
"fixed": [
"CSAFPID-32001",
"CSAFPID-32002",
"CSAFPID-32003"
],
"known_affected": [
"CSAFPID-31001",
"CSAFPID-31002",
"CSAFPID-31003"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update your managed switch to the latest firmware:\n\n852-303 (\u003e= V1.2.2.S0)\n\n852-1305 (\u003e= V1.1.6.S0)\n\n852-1505 (\u003e= V1.1.5.S0)\n\n\nFirmwares published on Jun 7, 2019 or later are fixed.\n\nPlease refer to the corresponding manual. ",
"group_ids": [
"CSAFGID-0001"
]
}
],
"title": "CVE-2014-4043"
},
{
"cve": "CVE-2014-9402",
"notes": [
{
"category": "description",
"text": "The nss_dns implementation of getnetbyname in GNU C Library (aka glibc) before 2.21, when the DNS backend in the Name Service Switch configuration is enabled, allows remote attackers to cause a denial of service (infinite loop) by sending a positive answer while a network name is being process.",
"title": "Vulnerability Description"
}
],
"product_status": {
"fixed": [
"CSAFPID-32001",
"CSAFPID-32002",
"CSAFPID-32003"
],
"known_affected": [
"CSAFPID-31001",
"CSAFPID-31002",
"CSAFPID-31003"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update your managed switch to the latest firmware:\n\n852-303 (\u003e= V1.2.2.S0)\n\n852-1305 (\u003e= V1.1.6.S0)\n\n852-1505 (\u003e= V1.1.5.S0)\n\n\nFirmwares published on Jun 7, 2019 or later are fixed.\n\nPlease refer to the corresponding manual. ",
"group_ids": [
"CSAFGID-0001"
]
}
],
"title": "CVE-2014-9402"
},
{
"cve": "CVE-2016-6301",
"notes": [
{
"category": "description",
"text": "The recv_and_process_client_pkt function in networking/ntpd.c in busybox allows remote attackers to cause a denial of service (CPU and bandwidth consumption) via a forged NTP packet, which triggers a communication loop.",
"title": "Vulnerability Description"
}
],
"product_status": {
"fixed": [
"CSAFPID-32001",
"CSAFPID-32002",
"CSAFPID-32003"
],
"known_affected": [
"CSAFPID-31001",
"CSAFPID-31002",
"CSAFPID-31003"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update your managed switch to the latest firmware:\n\n852-303 (\u003e= V1.2.2.S0)\n\n852-1305 (\u003e= V1.1.6.S0)\n\n852-1505 (\u003e= V1.1.5.S0)\n\n\nFirmwares published on Jun 7, 2019 or later are fixed.\n\nPlease refer to the corresponding manual. ",
"group_ids": [
"CSAFGID-0001"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"environmentalScore": 7.5,
"environmentalSeverity": "HIGH",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"temporalScore": 7.5,
"temporalSeverity": "HIGH",
"userInteraction": "NONE",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.0"
},
"products": [
"CSAFPID-31001",
"CSAFPID-31002",
"CSAFPID-31003"
]
}
],
"title": "CVE-2016-6301"
},
{
"cve": "CVE-2015-1472",
"cwe": {
"id": "CWE-119",
"name": "Improper Restriction of Operations within the Bounds of a Memory Buffer"
},
"notes": [
{
"category": "description",
"text": "The ADDW macro in stdio-common/vfscanf.c in the GNU C Library (aka glibc or libc6) before 2.21 does not properly consider data-type size during memory allocation, which allows context-dependent attackers to cause a denial of service (buffer overflow) or possibly have unspecified other impact via a long line containing wide characters that are improperly handled in a wscanf call.",
"title": "Vulnerability Description"
}
],
"product_status": {
"fixed": [
"CSAFPID-32001",
"CSAFPID-32002",
"CSAFPID-32003"
],
"known_affected": [
"CSAFPID-31001",
"CSAFPID-31002",
"CSAFPID-31003"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update your managed switch to the latest firmware:\n\n852-303 (\u003e= V1.2.2.S0)\n\n852-1305 (\u003e= V1.1.6.S0)\n\n852-1505 (\u003e= V1.1.5.S0)\n\n\nFirmwares published on Jun 7, 2019 or later are fixed.\n\nPlease refer to the corresponding manual. ",
"group_ids": [
"CSAFGID-0001"
]
}
],
"title": "CVE-2015-1472"
},
{
"cve": "CVE-2011-5325",
"cwe": {
"id": "CWE-22",
"name": "Improper Limitation of a Pathname to a Restricted Directory (\u0027Path Traversal\u0027)"
},
"notes": [
{
"category": "description",
"text": "Directory traversal vulnerability in the BusyBox implementation of tar before 1.22.0 v5 allows remote attackers to point to files outside the current working directory via a symlink.",
"title": "Vulnerability Description"
}
],
"product_status": {
"fixed": [
"CSAFPID-32001",
"CSAFPID-32002",
"CSAFPID-32003"
],
"known_affected": [
"CSAFPID-31001",
"CSAFPID-31002",
"CSAFPID-31003"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update your managed switch to the latest firmware:\n\n852-303 (\u003e= V1.2.2.S0)\n\n852-1305 (\u003e= V1.1.6.S0)\n\n852-1505 (\u003e= V1.1.5.S0)\n\n\nFirmwares published on Jun 7, 2019 or later are fixed.\n\nPlease refer to the corresponding manual. ",
"group_ids": [
"CSAFGID-0001"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"environmentalScore": 7.5,
"environmentalSeverity": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"temporalScore": 7.5,
"temporalSeverity": "HIGH",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N",
"version": "3.1"
},
"products": [
"CSAFPID-31001",
"CSAFPID-31002",
"CSAFPID-31003"
]
}
],
"title": "CVE-2011-5325"
},
{
"cve": "CVE-2014-9761",
"cwe": {
"id": "CWE-119",
"name": "Improper Restriction of Operations within the Bounds of a Memory Buffer"
},
"notes": [
{
"category": "description",
"text": "Multiple stack-based buffer overflows in the GNU C Library (aka glibc or libc6) before 2.23 allow context-dependent attackers to cause a denial of service (application crash) or possibly execute arbitrary code via a long argument to the (1) nan, (2) nanf, or (3) nanl function.",
"title": "Vulnerability Description"
}
],
"product_status": {
"fixed": [
"CSAFPID-32001",
"CSAFPID-32002",
"CSAFPID-32003"
],
"known_affected": [
"CSAFPID-31001",
"CSAFPID-31002",
"CSAFPID-31003"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update your managed switch to the latest firmware:\n\n852-303 (\u003e= V1.2.2.S0)\n\n852-1305 (\u003e= V1.1.6.S0)\n\n852-1505 (\u003e= V1.1.5.S0)\n\n\nFirmwares published on Jun 7, 2019 or later are fixed.\n\nPlease refer to the corresponding manual. ",
"group_ids": [
"CSAFGID-0001"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"confidentialityImpact": "HIGH",
"environmentalScore": 9.8,
"environmentalSeverity": "CRITICAL",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"temporalScore": 9.8,
"temporalSeverity": "CRITICAL",
"userInteraction": "NONE",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.0"
},
"products": [
"CSAFPID-31001",
"CSAFPID-31002",
"CSAFPID-31003"
]
}
],
"title": "CVE-2014-9761"
},
{
"cve": "CVE-2014-9984",
"cwe": {
"id": "CWE-119",
"name": "Improper Restriction of Operations within the Bounds of a Memory Buffer"
},
"notes": [
{
"category": "description",
"text": "nscd in the GNU C Library (aka glibc or libc6) before version 2.20 does not correctly compute the size of an internal buffer when processing netgroup requests, possibly leading to an nscd daemon crash or code execution as the user running nscd.",
"title": "Vulnerability Description"
}
],
"product_status": {
"fixed": [
"CSAFPID-32001",
"CSAFPID-32002",
"CSAFPID-32003"
],
"known_affected": [
"CSAFPID-31001",
"CSAFPID-31002",
"CSAFPID-31003"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update your managed switch to the latest firmware:\n\n852-303 (\u003e= V1.2.2.S0)\n\n852-1305 (\u003e= V1.1.6.S0)\n\n852-1505 (\u003e= V1.1.5.S0)\n\n\nFirmwares published on Jun 7, 2019 or later are fixed.\n\nPlease refer to the corresponding manual. ",
"group_ids": [
"CSAFGID-0001"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"confidentialityImpact": "HIGH",
"environmentalScore": 9.8,
"environmentalSeverity": "CRITICAL",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"temporalScore": 9.8,
"temporalSeverity": "CRITICAL",
"userInteraction": "NONE",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.0"
},
"products": [
"CSAFPID-31001",
"CSAFPID-31002",
"CSAFPID-31003"
]
}
],
"title": "CVE-2014-9984"
},
{
"cve": "CVE-2015-9261",
"cwe": {
"id": "CWE-476",
"name": "NULL Pointer Dereference"
},
"notes": [
{
"category": "description",
"text": "huft_build in archival/libarchive/decompress_gunzip.c in BusyBox before 1.27.2 misuses a pointer, causing segfaults and an application crash during an unzip operation on a specially crafted ZIP file.",
"title": "Vulnerability Description"
}
],
"product_status": {
"fixed": [
"CSAFPID-32001",
"CSAFPID-32002",
"CSAFPID-32003"
],
"known_affected": [
"CSAFPID-31001",
"CSAFPID-31002",
"CSAFPID-31003"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update your managed switch to the latest firmware:\n\n852-303 (\u003e= V1.2.2.S0)\n\n852-1305 (\u003e= V1.1.6.S0)\n\n852-1505 (\u003e= V1.1.5.S0)\n\n\nFirmwares published on Jun 7, 2019 or later are fixed.\n\nPlease refer to the corresponding manual. ",
"group_ids": [
"CSAFGID-0001"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"environmentalScore": 5.5,
"environmentalSeverity": "MEDIUM",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"temporalScore": 5.5,
"temporalSeverity": "MEDIUM",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-31001",
"CSAFPID-31002",
"CSAFPID-31003"
]
}
],
"title": "CVE-2015-9261"
},
{
"cve": "CVE-2016-2147",
"cwe": {
"id": "CWE-190",
"name": "Integer Overflow or Wraparound"
},
"notes": [
{
"category": "description",
"text": "Integer overflow in the DHCP client (udhcpc) in BusyBox before 1.25.0 allows remote attackers to cause a denial of service (crash) via a malformed RFC1035-encoded domain name, which triggers an out-of-bounds heap write.",
"title": "Vulnerability Description"
}
],
"product_status": {
"fixed": [
"CSAFPID-32001",
"CSAFPID-32002",
"CSAFPID-32003"
],
"known_affected": [
"CSAFPID-31001",
"CSAFPID-31002",
"CSAFPID-31003"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update your managed switch to the latest firmware:\n\n852-303 (\u003e= V1.2.2.S0)\n\n852-1305 (\u003e= V1.1.6.S0)\n\n852-1505 (\u003e= V1.1.5.S0)\n\n\nFirmwares published on Jun 7, 2019 or later are fixed.\n\nPlease refer to the corresponding manual. ",
"group_ids": [
"CSAFGID-0001"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"environmentalScore": 7.5,
"environmentalSeverity": "HIGH",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"temporalScore": 7.5,
"temporalSeverity": "HIGH",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-31001",
"CSAFPID-31002",
"CSAFPID-31003"
]
}
],
"title": "CVE-2016-2147"
},
{
"cve": "CVE-2016-2148",
"cwe": {
"id": "CWE-119",
"name": "Improper Restriction of Operations within the Bounds of a Memory Buffer"
},
"notes": [
{
"category": "description",
"text": "Heap-based buffer overflow in the DHCP client (udhcpc) in BusyBox before 1.25.0 allows remote attackers to have unspecified impact via vectors involving OPTION_6RD parsing.",
"title": "Vulnerability Description"
}
],
"product_status": {
"fixed": [
"CSAFPID-32001",
"CSAFPID-32002",
"CSAFPID-32003"
],
"known_affected": [
"CSAFPID-31001",
"CSAFPID-31002",
"CSAFPID-31003"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update your managed switch to the latest firmware:\n\n852-303 (\u003e= V1.2.2.S0)\n\n852-1305 (\u003e= V1.1.6.S0)\n\n852-1505 (\u003e= V1.1.5.S0)\n\n\nFirmwares published on Jun 7, 2019 or later are fixed.\n\nPlease refer to the corresponding manual. ",
"group_ids": [
"CSAFGID-0001"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"confidentialityImpact": "HIGH",
"environmentalScore": 9.8,
"environmentalSeverity": "CRITICAL",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"temporalScore": 9.8,
"temporalSeverity": "CRITICAL",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-31001",
"CSAFPID-31002",
"CSAFPID-31003"
]
}
],
"title": "CVE-2016-2148"
},
{
"cve": "CVE-2017-16544",
"cwe": {
"id": "CWE-94",
"name": "Improper Control of Generation of Code (\u0027Code Injection\u0027)"
},
"notes": [
{
"category": "description",
"text": "In the add_match function in libbb/lineedit.c in BusyBox through 1.27.2, the tab autocomplete feature of the shell, used to get a list of filenames in a directory, does not sanitize filenames and results in executing any escape sequence in the terminal. This could potentially result in code execution, arbitrary file writes, or other attacks.",
"title": "Vulnerability Description"
}
],
"product_status": {
"fixed": [
"CSAFPID-32001",
"CSAFPID-32002",
"CSAFPID-32003"
],
"known_affected": [
"CSAFPID-31001",
"CSAFPID-31002",
"CSAFPID-31003"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update your managed switch to the latest firmware:\n\n852-303 (\u003e= V1.2.2.S0)\n\n852-1305 (\u003e= V1.1.6.S0)\n\n852-1505 (\u003e= V1.1.5.S0)\n\n\nFirmwares published on Jun 7, 2019 or later are fixed.\n\nPlease refer to the corresponding manual. ",
"group_ids": [
"CSAFGID-0001"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"environmentalScore": 8.8,
"environmentalSeverity": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"temporalScore": 8.8,
"temporalSeverity": "HIGH",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-31001",
"CSAFPID-31002",
"CSAFPID-31003"
]
}
],
"title": "CVE-2017-16544"
},
{
"cve": "CVE-2019-12549",
"cwe": {
"id": "CWE-798",
"name": "Use of Hard-coded Credentials"
},
"notes": [
{
"category": "description",
"text": "WAGO 852-303 before FW06, 852-1305 before FW06, and 852-1505 before FW03 devices contain hardcoded private keys for the SSH daemon. The fingerprint of the SSH host key from the corresponding SSH daemon matches the embedded private key.",
"title": "Vulnerability Description"
}
],
"product_status": {
"fixed": [
"CSAFPID-32001",
"CSAFPID-32002",
"CSAFPID-32003"
],
"known_affected": [
"CSAFPID-31001",
"CSAFPID-31002",
"CSAFPID-31003"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update your managed switch to the latest firmware:\n\n852-303 (\u003e= V1.2.2.S0)\n\n852-1305 (\u003e= V1.1.6.S0)\n\n852-1505 (\u003e= V1.1.5.S0)\n\n\nFirmwares published on Jun 7, 2019 or later are fixed.\n\nPlease refer to the corresponding manual. ",
"group_ids": [
"CSAFGID-0001"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"confidentialityImpact": "HIGH",
"environmentalScore": 9.8,
"environmentalSeverity": "CRITICAL",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"temporalScore": 9.8,
"temporalSeverity": "CRITICAL",
"userInteraction": "NONE",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.0"
},
"products": [
"CSAFPID-31001",
"CSAFPID-31002",
"CSAFPID-31003"
]
}
],
"title": "CVE-2019-12549"
},
{
"cve": "CVE-2019-12550",
"cwe": {
"id": "CWE-798",
"name": "Use of Hard-coded Credentials"
},
"notes": [
{
"category": "description",
"text": "WAGO 852-303 before FW06, 852-1305 before FW06, and 852-1505 before FW03 devices contain hardcoded users and passwords that can be used to login via SSH and TELNET.",
"title": "Vulnerability Description"
}
],
"product_status": {
"fixed": [
"CSAFPID-32001",
"CSAFPID-32002",
"CSAFPID-32003"
],
"known_affected": [
"CSAFPID-31001",
"CSAFPID-31002",
"CSAFPID-31003"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update your managed switch to the latest firmware:\n\n852-303 (\u003e= V1.2.2.S0)\n\n852-1305 (\u003e= V1.1.6.S0)\n\n852-1505 (\u003e= V1.1.5.S0)\n\n\nFirmwares published on Jun 7, 2019 or later are fixed.\n\nPlease refer to the corresponding manual. ",
"group_ids": [
"CSAFGID-0001"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"confidentialityImpact": "HIGH",
"environmentalScore": 9.8,
"environmentalSeverity": "CRITICAL",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"temporalScore": 9.8,
"temporalSeverity": "CRITICAL",
"userInteraction": "NONE",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.0"
},
"products": [
"CSAFPID-31001",
"CSAFPID-31002",
"CSAFPID-31003"
]
}
],
"title": "CVE-2019-12550"
},
{
"cve": "CVE-2015-0235",
"cwe": {
"id": "CWE-787",
"name": "Out-of-bounds Write"
},
"notes": [
{
"category": "description",
"text": "Heap-based buffer overflow in the __nss_hostname_digits_dots function in glibc 2.2, and other 2.x versions before 2.18, allows context-dependent attackers to execute arbitrary code via vectors related to the (1) gethostbyname or (2) gethostbyname2 function, aka \"GHOST.\"",
"title": "Vulnerability Description"
}
],
"product_status": {
"fixed": [
"CSAFPID-32001",
"CSAFPID-32002",
"CSAFPID-32003"
],
"known_affected": [
"CSAFPID-31001",
"CSAFPID-31002",
"CSAFPID-31003"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update your managed switch to the latest firmware:\n\n852-303 (\u003e= V1.2.2.S0)\n\n852-1305 (\u003e= V1.1.6.S0)\n\n852-1505 (\u003e= V1.1.5.S0)\n\n\nFirmwares published on Jun 7, 2019 or later are fixed.\n\nPlease refer to the corresponding manual. ",
"group_ids": [
"CSAFGID-0001"
]
}
],
"title": "CVE-2015-0235"
},
{
"cve": "CVE-2013-1813",
"notes": [
{
"category": "description",
"text": "util-linux/mdev.c in BusyBox before 1.21.0 uses 0777 permissions for parent directories when creating nested directories under /dev/, which allows local users to have unknown impact and attack vectors.",
"title": "Vulnerability Description"
}
],
"product_status": {
"fixed": [
"CSAFPID-32001",
"CSAFPID-32002",
"CSAFPID-32003"
],
"known_affected": [
"CSAFPID-31001",
"CSAFPID-31002",
"CSAFPID-31003"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update your managed switch to the latest firmware:\n\n852-303 (\u003e= V1.2.2.S0)\n\n852-1305 (\u003e= V1.1.6.S0)\n\n852-1505 (\u003e= V1.1.5.S0)\n\n\nFirmwares published on Jun 7, 2019 or later are fixed.\n\nPlease refer to the corresponding manual. ",
"group_ids": [
"CSAFGID-0001"
]
}
],
"title": "CVE-2013-1813"
},
{
"cve": "CVE-2010-0296",
"cwe": {
"id": "CWE-20",
"name": "Improper Input Validation"
},
"notes": [
{
"category": "description",
"text": "The encode_name macro in misc/mntent_r.c in the GNU C Library (aka glibc or libc6) 2.11.1 and earlier, as used by ncpmount and mount.cifs, does not properly handle newline characters in mountpoint names, which allows local users to cause a denial of service (mtab corruption), or possibly modify mount options and gain privileges, via a crafted mount request.",
"title": "Vulnerability Description"
}
],
"product_status": {
"fixed": [
"CSAFPID-32001",
"CSAFPID-32002",
"CSAFPID-32003"
],
"known_affected": [
"CSAFPID-31001",
"CSAFPID-31002",
"CSAFPID-31003"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update your managed switch to the latest firmware:\n\n852-303 (\u003e= V1.2.2.S0)\n\n852-1305 (\u003e= V1.1.6.S0)\n\n852-1505 (\u003e= V1.1.5.S0)\n\n\nFirmwares published on Jun 7, 2019 or later are fixed.\n\nPlease refer to the corresponding manual. ",
"group_ids": [
"CSAFGID-0001"
]
}
],
"title": "CVE-2010-0296"
}
]
}
Sightings
| Author | Source | Type | Date | Other |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or observed by the user.
- Confirmed: The vulnerability has been validated from an analyst's perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
- Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
- Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
- Not confirmed: The user expressed doubt about the validity of the vulnerability.
- Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.