Action not permitted
Modal body text goes here.
Modal Title
Modal Body
cve-2018-20679
Vulnerability from cvelistv5
Published
2019-01-09 16:00
Modified
2024-08-05 12:05
Severity ?
EPSS score ?
7.09%
(0.90687)
Summary
An issue was discovered in BusyBox before 1.30.0. An out of bounds read in udhcp components (consumed by the DHCP server, client, and relay) allows a remote attacker to leak sensitive information from the stack by sending a crafted DHCP message. This is related to verification in udhcp_get_option() in networking/udhcp/common.c that 4-byte options are indeed 4 bytes.
References
{ containers: { adp: [ { providerMetadata: { dateUpdated: "2024-08-05T12:05:17.686Z", orgId: "af854a3a-2127-422b-91ae-364da2661108", shortName: "CVE", }, references: [ { tags: [ "x_refsource_MISC", "x_transferred", ], url: "https://git.busybox.net/busybox/commit/?id=6d3b4bb24da9a07c263f3c1acf8df85382ff562c", }, { tags: [ "x_refsource_MISC", "x_transferred", ], url: "https://busybox.net/news.html", }, { tags: [ "x_refsource_MISC", "x_transferred", ], url: "https://bugs.busybox.net/show_bug.cgi?id=11506", }, { name: "USN-3935-1", tags: [ "vendor-advisory", "x_refsource_UBUNTU", "x_transferred", ], url: "https://usn.ubuntu.com/3935-1/", }, { name: "20190904 SEC Consult SA-20190904-0 :: Multiple vulnerabilities in Cisco router series RV34X, RV26X and RV16X", tags: [ "mailing-list", "x_refsource_FULLDISC", "x_transferred", ], url: "http://seclists.org/fulldisclosure/2019/Sep/7", }, { name: "20190904 SEC Consult SA-20190904-0 :: Multiple vulnerabilities in Cisco router series RV34X, RV26X and RV16X", tags: [ "mailing-list", "x_refsource_BUGTRAQ", "x_transferred", ], url: "https://seclists.org/bugtraq/2019/Sep/7", }, { tags: [ "x_refsource_MISC", "x_transferred", ], url: "http://packetstormsecurity.com/files/154361/Cisco-Device-Hardcoded-Credentials-GNU-glibc-BusyBox.html", }, ], title: "CVE Program Container", }, ], cna: { affected: [ { product: "n/a", vendor: "n/a", versions: [ { status: "affected", version: "n/a", }, ], }, ], datePublic: "2019-01-09T00:00:00", descriptions: [ { lang: "en", value: "An issue was discovered in BusyBox before 1.30.0. An out of bounds read in udhcp components (consumed by the DHCP server, client, and relay) allows a remote attacker to leak sensitive information from the stack by sending a crafted DHCP message. This is related to verification in udhcp_get_option() in networking/udhcp/common.c that 4-byte options are indeed 4 bytes.", }, ], problemTypes: [ { descriptions: [ { description: "n/a", lang: "en", type: "text", }, ], }, ], providerMetadata: { dateUpdated: "2019-09-05T01:06:06", orgId: "8254265b-2729-46b6-b9e3-3dfca2d5bfca", shortName: "mitre", }, references: [ { tags: [ "x_refsource_MISC", ], url: "https://git.busybox.net/busybox/commit/?id=6d3b4bb24da9a07c263f3c1acf8df85382ff562c", }, { tags: [ "x_refsource_MISC", ], url: "https://busybox.net/news.html", }, { tags: [ "x_refsource_MISC", ], url: "https://bugs.busybox.net/show_bug.cgi?id=11506", }, { name: "USN-3935-1", tags: [ "vendor-advisory", "x_refsource_UBUNTU", ], url: "https://usn.ubuntu.com/3935-1/", }, { name: "20190904 SEC Consult SA-20190904-0 :: Multiple vulnerabilities in Cisco router series RV34X, RV26X and RV16X", tags: [ "mailing-list", "x_refsource_FULLDISC", ], url: "http://seclists.org/fulldisclosure/2019/Sep/7", }, { name: "20190904 SEC Consult SA-20190904-0 :: Multiple vulnerabilities in Cisco router series RV34X, RV26X and RV16X", tags: [ "mailing-list", "x_refsource_BUGTRAQ", ], url: "https://seclists.org/bugtraq/2019/Sep/7", }, { tags: [ "x_refsource_MISC", ], url: "http://packetstormsecurity.com/files/154361/Cisco-Device-Hardcoded-Credentials-GNU-glibc-BusyBox.html", }, ], x_legacyV4Record: { CVE_data_meta: { ASSIGNER: "cve@mitre.org", ID: "CVE-2018-20679", STATE: "PUBLIC", }, affects: { vendor: { vendor_data: [ { product: { product_data: [ { product_name: "n/a", version: { version_data: [ { version_value: "n/a", }, ], }, }, ], }, vendor_name: "n/a", }, ], }, }, data_format: "MITRE", data_type: "CVE", data_version: "4.0", description: { description_data: [ { lang: "eng", value: "An issue was discovered in BusyBox before 1.30.0. An out of bounds read in udhcp components (consumed by the DHCP server, client, and relay) allows a remote attacker to leak sensitive information from the stack by sending a crafted DHCP message. This is related to verification in udhcp_get_option() in networking/udhcp/common.c that 4-byte options are indeed 4 bytes.", }, ], }, problemtype: { problemtype_data: [ { description: [ { lang: "eng", value: "n/a", }, ], }, ], }, references: { reference_data: [ { name: "https://git.busybox.net/busybox/commit/?id=6d3b4bb24da9a07c263f3c1acf8df85382ff562c", refsource: "MISC", url: "https://git.busybox.net/busybox/commit/?id=6d3b4bb24da9a07c263f3c1acf8df85382ff562c", }, { name: "https://busybox.net/news.html", refsource: "MISC", url: "https://busybox.net/news.html", }, { name: "https://bugs.busybox.net/show_bug.cgi?id=11506", refsource: "MISC", url: "https://bugs.busybox.net/show_bug.cgi?id=11506", }, { name: "USN-3935-1", refsource: "UBUNTU", url: "https://usn.ubuntu.com/3935-1/", }, { name: "20190904 SEC Consult SA-20190904-0 :: Multiple vulnerabilities in Cisco router series RV34X, RV26X and RV16X", refsource: "FULLDISC", url: "http://seclists.org/fulldisclosure/2019/Sep/7", }, { name: "20190904 SEC Consult SA-20190904-0 :: Multiple vulnerabilities in Cisco router series RV34X, RV26X and RV16X", refsource: "BUGTRAQ", url: "https://seclists.org/bugtraq/2019/Sep/7", }, { name: "http://packetstormsecurity.com/files/154361/Cisco-Device-Hardcoded-Credentials-GNU-glibc-BusyBox.html", refsource: "MISC", url: "http://packetstormsecurity.com/files/154361/Cisco-Device-Hardcoded-Credentials-GNU-glibc-BusyBox.html", }, ], }, }, }, }, cveMetadata: { assignerOrgId: "8254265b-2729-46b6-b9e3-3dfca2d5bfca", assignerShortName: "mitre", cveId: "CVE-2018-20679", datePublished: "2019-01-09T16:00:00", dateReserved: "2019-01-09T00:00:00", dateUpdated: "2024-08-05T12:05:17.686Z", state: "PUBLISHED", }, dataType: "CVE_RECORD", dataVersion: "5.1", "vulnerability-lookup:meta": { fkie_nvd: { configurations: "[{\"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:busybox:busybox:*:*:*:*:*:*:*:*\", \"versionEndExcluding\": \"1.30.0\", \"matchCriteriaId\": \"9CC63993-043C-41D2-A9E6-D377F2FFBFF1\"}]}]}, {\"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*\", \"matchCriteriaId\": \"B5A6F2F3-4894-4392-8296-3B8DD2679084\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*\", \"matchCriteriaId\": \"F7016A2A-8365-4F1A-89A2-7A19F2BCAE5B\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*\", \"matchCriteriaId\": \"23A7C53F-B80F-4E6A-AFA9-58EEA84BE11D\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:canonical:ubuntu_linux:18.10:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"07C312A0-CD2C-4B9C-B064-6409B25C278F\"}]}]}]", descriptions: "[{\"lang\": \"en\", \"value\": \"An issue was discovered in BusyBox before 1.30.0. An out of bounds read in udhcp components (consumed by the DHCP server, client, and relay) allows a remote attacker to leak sensitive information from the stack by sending a crafted DHCP message. This is related to verification in udhcp_get_option() in networking/udhcp/common.c that 4-byte options are indeed 4 bytes.\"}, {\"lang\": \"es\", \"value\": \"Se ha descubierto un problema en versiones anteriores a la 1.30.0 de BusyBox. Una lectura fuera de l\\u00edmites en los componentes udhcp (consumidos por el servidor, cliente y relays DHCP) permite que un atacante remoto filtre informaci\\u00f3n sensible de la pila mediante el env\\u00edo de un mensaje DHCP manipulado. Esto est\\u00e1 relacionado con la verificaci\\u00f3n en udhcp_get_option() en networking/udhcp/common.c de que las opciones 4-byte tienen, efectivamente, 4 bytes.\"}]", id: "CVE-2018-20679", lastModified: "2024-11-21T04:01:58.893", metrics: "{\"cvssMetricV30\": [{\"source\": \"nvd@nist.gov\", \"type\": \"Primary\", \"cvssData\": {\"version\": \"3.0\", \"vectorString\": \"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N\", \"baseScore\": 7.5, \"baseSeverity\": \"HIGH\", \"attackVector\": \"NETWORK\", \"attackComplexity\": \"LOW\", \"privilegesRequired\": \"NONE\", \"userInteraction\": \"NONE\", \"scope\": \"UNCHANGED\", \"confidentialityImpact\": \"HIGH\", \"integrityImpact\": \"NONE\", \"availabilityImpact\": \"NONE\"}, \"exploitabilityScore\": 3.9, \"impactScore\": 3.6}], \"cvssMetricV2\": [{\"source\": \"nvd@nist.gov\", \"type\": \"Primary\", \"cvssData\": {\"version\": \"2.0\", \"vectorString\": \"AV:N/AC:L/Au:N/C:P/I:N/A:N\", \"baseScore\": 5.0, \"accessVector\": \"NETWORK\", \"accessComplexity\": \"LOW\", \"authentication\": \"NONE\", \"confidentialityImpact\": \"PARTIAL\", \"integrityImpact\": \"NONE\", \"availabilityImpact\": \"NONE\"}, \"baseSeverity\": \"MEDIUM\", \"exploitabilityScore\": 10.0, \"impactScore\": 2.9, \"acInsufInfo\": false, \"obtainAllPrivilege\": false, \"obtainUserPrivilege\": false, \"obtainOtherPrivilege\": false, \"userInteractionRequired\": false}]}", published: "2019-01-09T16:29:00.273", references: "[{\"url\": \"http://packetstormsecurity.com/files/154361/Cisco-Device-Hardcoded-Credentials-GNU-glibc-BusyBox.html\", \"source\": \"cve@mitre.org\"}, {\"url\": \"http://seclists.org/fulldisclosure/2019/Sep/7\", \"source\": \"cve@mitre.org\"}, {\"url\": \"https://bugs.busybox.net/show_bug.cgi?id=11506\", \"source\": \"cve@mitre.org\", \"tags\": [\"Exploit\", \"Issue Tracking\", \"Third Party Advisory\"]}, {\"url\": \"https://busybox.net/news.html\", \"source\": \"cve@mitre.org\", \"tags\": [\"Release Notes\", \"Third Party Advisory\"]}, {\"url\": \"https://git.busybox.net/busybox/commit/?id=6d3b4bb24da9a07c263f3c1acf8df85382ff562c\", \"source\": \"cve@mitre.org\", \"tags\": [\"Patch\", \"Third Party Advisory\"]}, {\"url\": \"https://seclists.org/bugtraq/2019/Sep/7\", \"source\": \"cve@mitre.org\"}, {\"url\": \"https://usn.ubuntu.com/3935-1/\", \"source\": \"cve@mitre.org\", \"tags\": [\"Third Party Advisory\"]}, {\"url\": \"http://packetstormsecurity.com/files/154361/Cisco-Device-Hardcoded-Credentials-GNU-glibc-BusyBox.html\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"http://seclists.org/fulldisclosure/2019/Sep/7\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"https://bugs.busybox.net/show_bug.cgi?id=11506\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Exploit\", \"Issue Tracking\", \"Third Party Advisory\"]}, {\"url\": \"https://busybox.net/news.html\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Release Notes\", \"Third Party Advisory\"]}, {\"url\": \"https://git.busybox.net/busybox/commit/?id=6d3b4bb24da9a07c263f3c1acf8df85382ff562c\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Patch\", \"Third Party Advisory\"]}, {\"url\": \"https://seclists.org/bugtraq/2019/Sep/7\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"https://usn.ubuntu.com/3935-1/\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Third Party Advisory\"]}]", sourceIdentifier: "cve@mitre.org", vulnStatus: "Modified", weaknesses: "[{\"source\": \"nvd@nist.gov\", \"type\": \"Primary\", \"description\": [{\"lang\": \"en\", \"value\": \"CWE-125\"}]}]", }, nvd: "{\"cve\":{\"id\":\"CVE-2018-20679\",\"sourceIdentifier\":\"cve@mitre.org\",\"published\":\"2019-01-09T16:29:00.273\",\"lastModified\":\"2024-11-21T04:01:58.893\",\"vulnStatus\":\"Modified\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"An issue was discovered in BusyBox before 1.30.0. An out of bounds read in udhcp components (consumed by the DHCP server, client, and relay) allows a remote attacker to leak sensitive information from the stack by sending a crafted DHCP message. This is related to verification in udhcp_get_option() in networking/udhcp/common.c that 4-byte options are indeed 4 bytes.\"},{\"lang\":\"es\",\"value\":\"Se ha descubierto un problema en versiones anteriores a la 1.30.0 de BusyBox. Una lectura fuera de límites en los componentes udhcp (consumidos por el servidor, cliente y relays DHCP) permite que un atacante remoto filtre información sensible de la pila mediante el envío de un mensaje DHCP manipulado. Esto está relacionado con la verificación en udhcp_get_option() en networking/udhcp/common.c de que las opciones 4-byte tienen, efectivamente, 4 bytes.\"}],\"metrics\":{\"cvssMetricV30\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"3.0\",\"vectorString\":\"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N\",\"baseScore\":7.5,\"baseSeverity\":\"HIGH\",\"attackVector\":\"NETWORK\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"NONE\",\"userInteraction\":\"NONE\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"HIGH\",\"integrityImpact\":\"NONE\",\"availabilityImpact\":\"NONE\"},\"exploitabilityScore\":3.9,\"impactScore\":3.6}],\"cvssMetricV2\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"2.0\",\"vectorString\":\"AV:N/AC:L/Au:N/C:P/I:N/A:N\",\"baseScore\":5.0,\"accessVector\":\"NETWORK\",\"accessComplexity\":\"LOW\",\"authentication\":\"NONE\",\"confidentialityImpact\":\"PARTIAL\",\"integrityImpact\":\"NONE\",\"availabilityImpact\":\"NONE\"},\"baseSeverity\":\"MEDIUM\",\"exploitabilityScore\":10.0,\"impactScore\":2.9,\"acInsufInfo\":false,\"obtainAllPrivilege\":false,\"obtainUserPrivilege\":false,\"obtainOtherPrivilege\":false,\"userInteractionRequired\":false}]},\"weaknesses\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-125\"}]}],\"configurations\":[{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:busybox:busybox:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"1.30.0\",\"matchCriteriaId\":\"9CC63993-043C-41D2-A9E6-D377F2FFBFF1\"}]}]},{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*\",\"matchCriteriaId\":\"B5A6F2F3-4894-4392-8296-3B8DD2679084\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*\",\"matchCriteriaId\":\"F7016A2A-8365-4F1A-89A2-7A19F2BCAE5B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*\",\"matchCriteriaId\":\"23A7C53F-B80F-4E6A-AFA9-58EEA84BE11D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:canonical:ubuntu_linux:18.10:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"07C312A0-CD2C-4B9C-B064-6409B25C278F\"}]}]}],\"references\":[{\"url\":\"http://packetstormsecurity.com/files/154361/Cisco-Device-Hardcoded-Credentials-GNU-glibc-BusyBox.html\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://seclists.org/fulldisclosure/2019/Sep/7\",\"source\":\"cve@mitre.org\"},{\"url\":\"https://bugs.busybox.net/show_bug.cgi?id=11506\",\"source\":\"cve@mitre.org\",\"tags\":[\"Exploit\",\"Issue Tracking\",\"Third Party Advisory\"]},{\"url\":\"https://busybox.net/news.html\",\"source\":\"cve@mitre.org\",\"tags\":[\"Release Notes\",\"Third Party Advisory\"]},{\"url\":\"https://git.busybox.net/busybox/commit/?id=6d3b4bb24da9a07c263f3c1acf8df85382ff562c\",\"source\":\"cve@mitre.org\",\"tags\":[\"Patch\",\"Third Party Advisory\"]},{\"url\":\"https://seclists.org/bugtraq/2019/Sep/7\",\"source\":\"cve@mitre.org\"},{\"url\":\"https://usn.ubuntu.com/3935-1/\",\"source\":\"cve@mitre.org\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://packetstormsecurity.com/files/154361/Cisco-Device-Hardcoded-Credentials-GNU-glibc-BusyBox.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://seclists.org/fulldisclosure/2019/Sep/7\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://bugs.busybox.net/show_bug.cgi?id=11506\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Exploit\",\"Issue Tracking\",\"Third Party Advisory\"]},{\"url\":\"https://busybox.net/news.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Release Notes\",\"Third Party Advisory\"]},{\"url\":\"https://git.busybox.net/busybox/commit/?id=6d3b4bb24da9a07c263f3c1acf8df85382ff562c\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Patch\",\"Third Party Advisory\"]},{\"url\":\"https://seclists.org/bugtraq/2019/Sep/7\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://usn.ubuntu.com/3935-1/\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]}]}}", }, }
suse-su-2022:0135-1
Vulnerability from csaf_suse
Published
2022-01-20 09:05
Modified
2022-01-20 09:05
Summary
Security update for busybox
Notes
Title of the patch
Security update for busybox
Description of the patch
This update for busybox fixes the following issues:
- CVE-2011-5325: Fixed tar directory traversal (bsc#951562).
- CVE-2015-9261: Fixed segfalts and application crashes in huft_build (bsc#1102912).
- CVE-2016-2147: Fixed out of bounds write (heap) due to integer underflow in udhcpc (bsc#970663).
- CVE-2016-2148: Fixed heap-based buffer overflow in OPTION_6RD parsing (bsc#970662).
- CVE-2016-6301: Fixed NTP server denial of service flaw (bsc#991940).
- CVE-2017-15873: Fixed integer overflow in get_next_block function in archival/libarchive/decompress_bunzip2.c (bsc#1064976).
- CVE-2017-15874: Fixed integer underflow in archival/libarchive/decompress_unlzma.c (bsc#1064978).
- CVE-2017-16544: Fixed Insufficient sanitization of filenames when autocompleting (bsc#1069412).
- CVE-2018-1000500 : Fixed missing SSL certificate validation in wget (bsc#1099263).
- CVE-2018-1000517: Fixed heap-based buffer overflow in the retrieve_file_data() (bsc#1099260).
- CVE-2018-20679: Fixed out of bounds read in udhcp (bsc#1121426).
- CVE-2019-5747: Fixed out of bounds read in udhcp components (bsc#1121428).
- CVE-2021-28831: Fixed invalid free or segmentation fault via malformed gzip data (bsc#1184522).
- CVE-2021-42373: Fixed NULL pointer dereference in man leading to DoS when a section name is supplied but no page argument is given (bsc#1192869).
- CVE-2021-42374: Fixed out-of-bounds heap read in unlzma leading to information leak and DoS when crafted LZMA-compressed input is decompressed (bsc#1192869).
- CVE-2021-42375: Fixed incorrect handling of a special element in ash leading to DoS when processing a crafted shell command, due to the shell mistaking specific characters for reserved characters (bsc#1192869).
- CVE-2021-42376: Fixed NULL pointer dereference in hush leading to DoS when processing a crafted shell command (bsc#1192869).
- CVE-2021-42377: Fixed attacker-controlled pointer free in hush leading to DoS and possible code execution when processing a crafted shell command (bsc#1192869).
- CVE-2021-42378: Fixed use-after-free in awk leading to DoS and possibly code execution when processing a crafted awk pattern in the getvar_i function (bsc#1192869).
- CVE-2021-42379: Fixed use-after-free in awk leading to DoS and possibly code execution when processing a crafted awk pattern in the next_input_file function (bsc#1192869).
- CVE-2021-42380: Fixed use-after-free in awk leading to DoS and possibly code execution when processing a crafted awk pattern in the clrvar function (bsc#1192869).
- CVE-2021-42381: Fixed use-after-free in awk leading to DoS and possibly code execution when processing a crafted awk pattern in the hash_init function (bsc#1192869).
- CVE-2021-42382: Fixed use-after-free in awk leading to DoS and possibly code execution when processing a crafted awk pattern in the getvar_s function (bsc#1192869).
- CVE-2021-42383: Fixed use-after-free in awk leading to DoS and possibly code execution when processing a crafted awk pattern in the evaluate function (bsc#1192869).
- CVE-2021-42384: Fixed use-after-free in awk leading to DoS and possibly code execution when processing a crafted awk pattern in the handle_special function (bsc#1192869).
- CVE-2021-42385: Fixed use-after-free in awk leading to DoS and possibly code execution when processing a crafted awk pattern in the evaluate function (bsc#1192869).
- CVE-2021-42386: Fixed use-after-free in awk leading to DoS and possibly code execution when processing a crafted awk pattern in the nvalloc function (bsc#1192869).
Patchnames
SUSE-2022-135,SUSE-SLE-Module-Basesystem-15-SP3-2022-135,SUSE-SLE-Product-HPC-15-2022-135,SUSE-SLE-Product-HPC-15-SP1-ESPOS-2022-135,SUSE-SLE-Product-HPC-15-SP1-LTSS-2022-135,SUSE-SLE-Product-HPC-15-SP2-ESPOS-2022-135,SUSE-SLE-Product-HPC-15-SP2-LTSS-2022-135,SUSE-SLE-Product-SLES-15-2022-135,SUSE-SLE-Product-SLES-15-SP1-BCL-2022-135,SUSE-SLE-Product-SLES-15-SP1-LTSS-2022-135,SUSE-SLE-Product-SLES-15-SP2-BCL-2022-135,SUSE-SLE-Product-SLES-15-SP2-LTSS-2022-135,SUSE-SLE-Product-SLES_SAP-15-2022-135,SUSE-SLE-Product-SLES_SAP-15-SP1-2022-135,SUSE-SLE-Product-SLES_SAP-15-SP2-2022-135,SUSE-SLE-Product-SUSE-Manager-Proxy-4.1-2022-135,SUSE-SLE-Product-SUSE-Manager-Retail-Branch-Server-4.1-2022-135,SUSE-SLE-Product-SUSE-Manager-Server-4.1-2022-135,SUSE-Storage-6-2022-135,SUSE-Storage-7-2022-135
Terms of use
CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
{ document: { aggregate_severity: { namespace: "https://www.suse.com/support/security/rating/", text: "important", }, category: "csaf_security_advisory", csaf_version: "2.0", distribution: { text: "Copyright 2024 SUSE LLC. All rights reserved.", tlp: { label: "WHITE", url: "https://www.first.org/tlp/", }, }, lang: "en", notes: [ { category: "summary", text: "Security update for busybox", title: "Title of the patch", }, { category: "description", text: "This update for busybox fixes the following issues:\n\n- CVE-2011-5325: Fixed tar directory traversal (bsc#951562).\n- CVE-2015-9261: Fixed segfalts and application crashes in huft_build (bsc#1102912).\n- CVE-2016-2147: Fixed out of bounds write (heap) due to integer underflow in udhcpc (bsc#970663).\n- CVE-2016-2148: Fixed heap-based buffer overflow in OPTION_6RD parsing (bsc#970662).\n- CVE-2016-6301: Fixed NTP server denial of service flaw (bsc#991940).\n- CVE-2017-15873: Fixed integer overflow in get_next_block function in archival/libarchive/decompress_bunzip2.c (bsc#1064976).\n- CVE-2017-15874: Fixed integer underflow in archival/libarchive/decompress_unlzma.c (bsc#1064978).\n- CVE-2017-16544: Fixed Insufficient sanitization of filenames when autocompleting (bsc#1069412).\n- CVE-2018-1000500 : Fixed missing SSL certificate validation in wget (bsc#1099263).\n- CVE-2018-1000517: Fixed heap-based buffer overflow in the retrieve_file_data() (bsc#1099260).\n- CVE-2018-20679: Fixed out of bounds read in udhcp (bsc#1121426).\n- CVE-2019-5747: Fixed out of bounds read in udhcp components (bsc#1121428).\n- CVE-2021-28831: Fixed invalid free or segmentation fault via malformed gzip data (bsc#1184522).\n- CVE-2021-42373: Fixed NULL pointer dereference in man leading to DoS when a section name is supplied but no page argument is given (bsc#1192869).\n- CVE-2021-42374: Fixed out-of-bounds heap read in unlzma leading to information leak and DoS when crafted LZMA-compressed input is decompressed (bsc#1192869).\n- CVE-2021-42375: Fixed incorrect handling of a special element in ash leading to DoS when processing a crafted shell command, due to the shell mistaking specific characters for reserved characters (bsc#1192869).\n- CVE-2021-42376: Fixed NULL pointer dereference in hush leading to DoS when processing a crafted shell command (bsc#1192869).\n- CVE-2021-42377: Fixed attacker-controlled pointer free in hush leading to DoS and possible code execution when processing a crafted shell command (bsc#1192869).\n- CVE-2021-42378: Fixed use-after-free in awk leading to DoS and possibly code execution when processing a crafted awk pattern in the getvar_i function (bsc#1192869).\n- CVE-2021-42379: Fixed use-after-free in awk leading to DoS and possibly code execution when processing a crafted awk pattern in the next_input_file function (bsc#1192869).\n- CVE-2021-42380: Fixed use-after-free in awk leading to DoS and possibly code execution when processing a crafted awk pattern in the clrvar function (bsc#1192869).\n- CVE-2021-42381: Fixed use-after-free in awk leading to DoS and possibly code execution when processing a crafted awk pattern in the hash_init function (bsc#1192869).\n- CVE-2021-42382: Fixed use-after-free in awk leading to DoS and possibly code execution when processing a crafted awk pattern in the getvar_s function (bsc#1192869).\n- CVE-2021-42383: Fixed use-after-free in awk leading to DoS and possibly code execution when processing a crafted awk pattern in the evaluate function (bsc#1192869).\n- CVE-2021-42384: Fixed use-after-free in awk leading to DoS and possibly code execution when processing a crafted awk pattern in the handle_special function (bsc#1192869).\n- CVE-2021-42385: Fixed use-after-free in awk leading to DoS and possibly code execution when processing a crafted awk pattern in the evaluate function (bsc#1192869).\n- CVE-2021-42386: Fixed use-after-free in awk leading to DoS and possibly code execution when processing a crafted awk pattern in the nvalloc function (bsc#1192869).\n", title: "Description of the patch", }, { category: "details", text: "SUSE-2022-135,SUSE-SLE-Module-Basesystem-15-SP3-2022-135,SUSE-SLE-Product-HPC-15-2022-135,SUSE-SLE-Product-HPC-15-SP1-ESPOS-2022-135,SUSE-SLE-Product-HPC-15-SP1-LTSS-2022-135,SUSE-SLE-Product-HPC-15-SP2-ESPOS-2022-135,SUSE-SLE-Product-HPC-15-SP2-LTSS-2022-135,SUSE-SLE-Product-SLES-15-2022-135,SUSE-SLE-Product-SLES-15-SP1-BCL-2022-135,SUSE-SLE-Product-SLES-15-SP1-LTSS-2022-135,SUSE-SLE-Product-SLES-15-SP2-BCL-2022-135,SUSE-SLE-Product-SLES-15-SP2-LTSS-2022-135,SUSE-SLE-Product-SLES_SAP-15-2022-135,SUSE-SLE-Product-SLES_SAP-15-SP1-2022-135,SUSE-SLE-Product-SLES_SAP-15-SP2-2022-135,SUSE-SLE-Product-SUSE-Manager-Proxy-4.1-2022-135,SUSE-SLE-Product-SUSE-Manager-Retail-Branch-Server-4.1-2022-135,SUSE-SLE-Product-SUSE-Manager-Server-4.1-2022-135,SUSE-Storage-6-2022-135,SUSE-Storage-7-2022-135", title: "Patchnames", }, { category: "legal_disclaimer", text: "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", title: "Terms of use", }, ], publisher: { category: "vendor", contact_details: "https://www.suse.com/support/security/contact/", name: "SUSE Product Security Team", namespace: "https://www.suse.com/", }, references: [ { category: "external", summary: "SUSE ratings", url: "https://www.suse.com/support/security/rating/", }, { category: "self", summary: "URL of this CSAF notice", url: "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2022_0135-1.json", }, { category: "self", summary: "URL for SUSE-SU-2022:0135-1", url: "https://www.suse.com/support/update/announcement/2022/suse-su-20220135-1/", }, { category: "self", summary: "E-Mail link for SUSE-SU-2022:0135-1", url: "https://lists.suse.com/pipermail/sle-security-updates/2022-January/010031.html", }, { category: "self", summary: "SUSE Bug 1064976", url: "https://bugzilla.suse.com/1064976", }, { category: "self", summary: "SUSE Bug 1064978", url: "https://bugzilla.suse.com/1064978", }, { category: "self", summary: "SUSE Bug 1069412", url: "https://bugzilla.suse.com/1069412", }, { category: "self", summary: "SUSE Bug 1099260", url: "https://bugzilla.suse.com/1099260", }, { category: "self", summary: "SUSE Bug 1099263", url: "https://bugzilla.suse.com/1099263", }, { category: "self", summary: "SUSE Bug 1102912", url: "https://bugzilla.suse.com/1102912", }, { category: "self", summary: "SUSE Bug 1121426", url: "https://bugzilla.suse.com/1121426", }, { category: "self", summary: "SUSE Bug 1121428", url: "https://bugzilla.suse.com/1121428", }, { category: "self", summary: "SUSE Bug 1184522", url: "https://bugzilla.suse.com/1184522", }, { category: "self", summary: "SUSE Bug 1192869", url: "https://bugzilla.suse.com/1192869", }, { category: "self", summary: "SUSE Bug 951562", url: "https://bugzilla.suse.com/951562", }, { category: "self", summary: "SUSE Bug 970662", url: "https://bugzilla.suse.com/970662", }, { category: "self", summary: "SUSE Bug 970663", url: "https://bugzilla.suse.com/970663", }, { category: "self", summary: "SUSE Bug 991940", url: "https://bugzilla.suse.com/991940", }, { category: "self", summary: "SUSE CVE CVE-2011-5325 page", url: "https://www.suse.com/security/cve/CVE-2011-5325/", }, { category: "self", summary: "SUSE CVE CVE-2015-9261 page", url: "https://www.suse.com/security/cve/CVE-2015-9261/", }, { category: "self", summary: "SUSE CVE CVE-2016-2147 page", url: "https://www.suse.com/security/cve/CVE-2016-2147/", }, { category: "self", summary: "SUSE CVE CVE-2016-2148 page", url: "https://www.suse.com/security/cve/CVE-2016-2148/", }, { category: "self", summary: "SUSE CVE CVE-2016-6301 page", url: "https://www.suse.com/security/cve/CVE-2016-6301/", }, { category: "self", summary: "SUSE CVE CVE-2017-15873 page", url: "https://www.suse.com/security/cve/CVE-2017-15873/", }, { category: "self", summary: "SUSE CVE CVE-2017-15874 page", url: "https://www.suse.com/security/cve/CVE-2017-15874/", }, { category: "self", summary: "SUSE CVE CVE-2017-16544 page", url: "https://www.suse.com/security/cve/CVE-2017-16544/", }, { category: "self", summary: "SUSE CVE CVE-2018-1000500 page", url: "https://www.suse.com/security/cve/CVE-2018-1000500/", }, { category: "self", summary: "SUSE CVE CVE-2018-1000517 page", url: "https://www.suse.com/security/cve/CVE-2018-1000517/", }, { category: "self", summary: "SUSE CVE CVE-2018-20679 page", url: "https://www.suse.com/security/cve/CVE-2018-20679/", }, { category: "self", summary: "SUSE CVE CVE-2019-5747 page", url: "https://www.suse.com/security/cve/CVE-2019-5747/", }, { category: "self", summary: "SUSE CVE CVE-2021-28831 page", url: "https://www.suse.com/security/cve/CVE-2021-28831/", }, { category: "self", summary: "SUSE CVE CVE-2021-42373 page", url: "https://www.suse.com/security/cve/CVE-2021-42373/", }, { category: "self", summary: "SUSE CVE CVE-2021-42374 page", url: "https://www.suse.com/security/cve/CVE-2021-42374/", }, { category: "self", summary: "SUSE CVE CVE-2021-42375 page", url: "https://www.suse.com/security/cve/CVE-2021-42375/", }, { category: "self", summary: "SUSE CVE CVE-2021-42376 page", url: "https://www.suse.com/security/cve/CVE-2021-42376/", }, { category: "self", summary: "SUSE CVE CVE-2021-42377 page", url: "https://www.suse.com/security/cve/CVE-2021-42377/", }, { category: "self", summary: "SUSE CVE CVE-2021-42378 page", url: "https://www.suse.com/security/cve/CVE-2021-42378/", }, { category: "self", summary: "SUSE CVE CVE-2021-42379 page", url: "https://www.suse.com/security/cve/CVE-2021-42379/", }, { category: "self", summary: "SUSE CVE CVE-2021-42380 page", url: "https://www.suse.com/security/cve/CVE-2021-42380/", }, { category: "self", summary: "SUSE CVE CVE-2021-42381 page", url: "https://www.suse.com/security/cve/CVE-2021-42381/", }, { category: "self", summary: "SUSE CVE CVE-2021-42382 page", url: "https://www.suse.com/security/cve/CVE-2021-42382/", }, { category: "self", summary: "SUSE CVE CVE-2021-42383 page", url: "https://www.suse.com/security/cve/CVE-2021-42383/", }, { category: "self", summary: "SUSE CVE CVE-2021-42384 page", url: "https://www.suse.com/security/cve/CVE-2021-42384/", }, { category: "self", summary: "SUSE CVE CVE-2021-42385 page", url: "https://www.suse.com/security/cve/CVE-2021-42385/", }, { category: "self", summary: "SUSE CVE CVE-2021-42386 page", url: "https://www.suse.com/security/cve/CVE-2021-42386/", }, ], title: "Security update for busybox", tracking: { current_release_date: "2022-01-20T09:05:15Z", generator: { date: "2022-01-20T09:05:15Z", engine: { name: "cve-database.git:bin/generate-csaf.pl", version: "1", }, }, id: "SUSE-SU-2022:0135-1", initial_release_date: "2022-01-20T09:05:15Z", revision_history: [ { date: "2022-01-20T09:05:15Z", number: "1", summary: "Current version", }, ], status: "final", version: "1", }, }, product_tree: { branches: [ { branches: [ { branches: [ { category: "product_version", name: "busybox-1.34.1-4.9.1.aarch64", product: { name: "busybox-1.34.1-4.9.1.aarch64", product_id: "busybox-1.34.1-4.9.1.aarch64", }, }, { category: "product_version", name: "busybox-static-1.34.1-4.9.1.aarch64", product: { name: "busybox-static-1.34.1-4.9.1.aarch64", product_id: "busybox-static-1.34.1-4.9.1.aarch64", }, }, { category: "product_version", name: "busybox-testsuite-1.34.1-4.9.1.aarch64", product: { name: "busybox-testsuite-1.34.1-4.9.1.aarch64", product_id: "busybox-testsuite-1.34.1-4.9.1.aarch64", }, }, { category: "product_version", name: "busybox-warewulf3-1.34.1-4.9.1.aarch64", product: { name: "busybox-warewulf3-1.34.1-4.9.1.aarch64", product_id: "busybox-warewulf3-1.34.1-4.9.1.aarch64", }, }, ], category: "architecture", name: "aarch64", }, { branches: [ { category: "product_version", name: "busybox-1.34.1-4.9.1.i586", product: { name: "busybox-1.34.1-4.9.1.i586", product_id: "busybox-1.34.1-4.9.1.i586", }, }, { category: "product_version", name: "busybox-static-1.34.1-4.9.1.i586", product: { name: "busybox-static-1.34.1-4.9.1.i586", product_id: "busybox-static-1.34.1-4.9.1.i586", }, }, { category: "product_version", name: "busybox-testsuite-1.34.1-4.9.1.i586", product: { name: "busybox-testsuite-1.34.1-4.9.1.i586", product_id: "busybox-testsuite-1.34.1-4.9.1.i586", }, }, { category: "product_version", name: "busybox-warewulf3-1.34.1-4.9.1.i586", product: { name: "busybox-warewulf3-1.34.1-4.9.1.i586", product_id: "busybox-warewulf3-1.34.1-4.9.1.i586", }, }, ], category: "architecture", name: "i586", }, { branches: [ { category: "product_version", name: "busybox-1.34.1-4.9.1.ppc64le", product: { name: "busybox-1.34.1-4.9.1.ppc64le", product_id: "busybox-1.34.1-4.9.1.ppc64le", }, }, { category: "product_version", name: "busybox-static-1.34.1-4.9.1.ppc64le", product: { name: "busybox-static-1.34.1-4.9.1.ppc64le", product_id: "busybox-static-1.34.1-4.9.1.ppc64le", }, }, { category: "product_version", name: "busybox-testsuite-1.34.1-4.9.1.ppc64le", product: { name: "busybox-testsuite-1.34.1-4.9.1.ppc64le", product_id: "busybox-testsuite-1.34.1-4.9.1.ppc64le", }, }, ], category: "architecture", name: "ppc64le", }, { branches: [ { category: "product_version", name: "busybox-1.34.1-4.9.1.s390x", product: { name: "busybox-1.34.1-4.9.1.s390x", product_id: "busybox-1.34.1-4.9.1.s390x", }, }, { category: "product_version", name: "busybox-static-1.34.1-4.9.1.s390x", product: { name: "busybox-static-1.34.1-4.9.1.s390x", product_id: "busybox-static-1.34.1-4.9.1.s390x", }, }, { category: "product_version", name: "busybox-testsuite-1.34.1-4.9.1.s390x", product: { name: "busybox-testsuite-1.34.1-4.9.1.s390x", product_id: "busybox-testsuite-1.34.1-4.9.1.s390x", }, }, ], category: "architecture", name: "s390x", }, { branches: [ { category: "product_version", name: "busybox-1.34.1-4.9.1.x86_64", product: { name: "busybox-1.34.1-4.9.1.x86_64", product_id: "busybox-1.34.1-4.9.1.x86_64", }, }, { category: "product_version", name: "busybox-static-1.34.1-4.9.1.x86_64", product: { name: "busybox-static-1.34.1-4.9.1.x86_64", product_id: "busybox-static-1.34.1-4.9.1.x86_64", }, }, { category: "product_version", name: "busybox-testsuite-1.34.1-4.9.1.x86_64", product: { name: "busybox-testsuite-1.34.1-4.9.1.x86_64", product_id: "busybox-testsuite-1.34.1-4.9.1.x86_64", }, }, { category: "product_version", name: "busybox-warewulf3-1.34.1-4.9.1.x86_64", product: { name: "busybox-warewulf3-1.34.1-4.9.1.x86_64", product_id: "busybox-warewulf3-1.34.1-4.9.1.x86_64", }, }, ], category: "architecture", name: "x86_64", }, { branches: [ { category: "product_name", name: "SUSE Linux Enterprise Module for Basesystem 15 SP3", product: { name: "SUSE Linux Enterprise Module for Basesystem 15 SP3", product_id: "SUSE Linux Enterprise Module for Basesystem 15 SP3", product_identification_helper: { cpe: "cpe:/o:suse:sle-module-basesystem:15:sp3", }, }, }, { category: "product_name", name: "SUSE Linux Enterprise High Performance Computing 15-ESPOS", product: { name: "SUSE Linux Enterprise High Performance Computing 15-ESPOS", product_id: "SUSE Linux Enterprise High Performance Computing 15-ESPOS", product_identification_helper: { cpe: "cpe:/o:suse:sle_hpc-espos:15", }, }, }, { category: "product_name", name: "SUSE Linux Enterprise High Performance Computing 15-LTSS", product: { name: "SUSE Linux Enterprise High Performance Computing 15-LTSS", product_id: "SUSE Linux Enterprise High Performance Computing 15-LTSS", product_identification_helper: { cpe: "cpe:/o:suse:sle_hpc-ltss:15", }, }, }, { category: "product_name", name: "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS", product: { name: "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS", product_id: "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS", product_identification_helper: { cpe: "cpe:/o:suse:sle_hpc-espos:15:sp1", }, }, }, { category: "product_name", name: "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS", product: { name: "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS", product_id: "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS", product_identification_helper: { cpe: "cpe:/o:suse:sle_hpc-ltss:15:sp1", }, }, }, { category: "product_name", name: "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS", product: { name: "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS", product_id: "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS", product_identification_helper: { cpe: "cpe:/o:suse:sle_hpc-espos:15:sp2", }, }, }, { category: "product_name", name: "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS", product: { name: "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS", product_id: "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS", product_identification_helper: { cpe: "cpe:/o:suse:sle_hpc-ltss:15:sp2", }, }, }, { category: "product_name", name: "SUSE Linux Enterprise Server 15-LTSS", product: { name: "SUSE Linux Enterprise Server 15-LTSS", product_id: "SUSE Linux Enterprise Server 15-LTSS", product_identification_helper: { cpe: "cpe:/o:suse:sles-ltss:15", }, }, }, { category: "product_name", name: "SUSE Linux Enterprise Server 15 SP1-BCL", product: { name: "SUSE Linux Enterprise Server 15 SP1-BCL", product_id: "SUSE Linux Enterprise Server 15 SP1-BCL", product_identification_helper: { cpe: "cpe:/o:suse:sles_bcl:15:sp1", }, }, }, { category: "product_name", name: "SUSE Linux Enterprise Server 15 SP1-LTSS", product: { name: "SUSE Linux Enterprise Server 15 SP1-LTSS", product_id: "SUSE Linux Enterprise Server 15 SP1-LTSS", product_identification_helper: { cpe: "cpe:/o:suse:sles-ltss:15:sp1", }, }, }, { category: "product_name", name: "SUSE Linux Enterprise Server 15 SP2-BCL", product: { name: "SUSE Linux Enterprise Server 15 SP2-BCL", product_id: "SUSE Linux Enterprise Server 15 SP2-BCL", product_identification_helper: { cpe: "cpe:/o:suse:sles_bcl:15:sp2", }, }, }, { category: "product_name", name: "SUSE Linux Enterprise Server 15 SP2-LTSS", product: { name: "SUSE Linux Enterprise Server 15 SP2-LTSS", product_id: "SUSE Linux Enterprise Server 15 SP2-LTSS", product_identification_helper: { cpe: "cpe:/o:suse:sles-ltss:15:sp2", }, }, }, { category: "product_name", name: "SUSE Linux Enterprise Server for SAP Applications 15", product: { name: "SUSE Linux Enterprise Server for SAP Applications 15", product_id: "SUSE Linux Enterprise Server for SAP Applications 15", product_identification_helper: { cpe: "cpe:/o:suse:sles_sap:15", }, }, }, { category: "product_name", name: "SUSE Linux Enterprise Server for SAP Applications 15 SP1", product: { name: "SUSE Linux Enterprise Server for SAP Applications 15 SP1", product_id: "SUSE Linux Enterprise Server for SAP Applications 15 SP1", product_identification_helper: { cpe: "cpe:/o:suse:sles_sap:15:sp1", }, }, }, { category: "product_name", name: "SUSE Linux Enterprise Server for SAP Applications 15 SP2", product: { name: "SUSE Linux Enterprise Server for SAP Applications 15 SP2", product_id: "SUSE Linux Enterprise Server for SAP Applications 15 SP2", product_identification_helper: { cpe: "cpe:/o:suse:sles_sap:15:sp2", }, }, }, { category: "product_name", name: "SUSE Manager Proxy 4.1", product: { name: "SUSE Manager Proxy 4.1", product_id: "SUSE Manager Proxy 4.1", product_identification_helper: { cpe: "cpe:/o:suse:suse-manager-proxy:4.1", }, }, }, { category: "product_name", name: "SUSE Manager Retail Branch Server 4.1", product: { name: "SUSE Manager Retail Branch Server 4.1", product_id: "SUSE Manager Retail Branch Server 4.1", product_identification_helper: { cpe: "cpe:/o:suse:suse-manager-retail-branch-server:4.1", }, }, }, { category: "product_name", name: "SUSE Manager Server 4.1", product: { name: "SUSE Manager Server 4.1", product_id: "SUSE Manager Server 4.1", product_identification_helper: { cpe: "cpe:/o:suse:suse-manager-server:4.1", }, }, }, { category: "product_name", name: "SUSE Enterprise Storage 6", product: { name: "SUSE Enterprise Storage 6", product_id: "SUSE Enterprise Storage 6", product_identification_helper: { cpe: "cpe:/o:suse:ses:6", }, }, }, { category: "product_name", name: "SUSE Enterprise Storage 7", product: { name: "SUSE Enterprise Storage 7", product_id: "SUSE Enterprise Storage 7", product_identification_helper: { cpe: "cpe:/o:suse:ses:7", }, }, }, ], category: "product_family", name: "SUSE Linux Enterprise", }, ], category: "vendor", name: "SUSE", }, ], relationships: [ { category: "default_component_of", full_product_name: { name: "busybox-1.34.1-4.9.1.aarch64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP3", product_id: "SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-1.34.1-4.9.1.aarch64", }, product_reference: "busybox-1.34.1-4.9.1.aarch64", relates_to_product_reference: "SUSE Linux Enterprise Module for Basesystem 15 SP3", }, { category: "default_component_of", full_product_name: { name: "busybox-1.34.1-4.9.1.ppc64le as component of SUSE Linux Enterprise Module for Basesystem 15 SP3", product_id: "SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-1.34.1-4.9.1.ppc64le", }, product_reference: "busybox-1.34.1-4.9.1.ppc64le", relates_to_product_reference: "SUSE Linux Enterprise Module for Basesystem 15 SP3", }, { category: "default_component_of", full_product_name: { name: "busybox-1.34.1-4.9.1.s390x as component of SUSE Linux Enterprise Module for Basesystem 15 SP3", product_id: "SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-1.34.1-4.9.1.s390x", }, product_reference: "busybox-1.34.1-4.9.1.s390x", relates_to_product_reference: "SUSE Linux Enterprise Module for Basesystem 15 SP3", }, { category: "default_component_of", full_product_name: { name: "busybox-1.34.1-4.9.1.x86_64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP3", product_id: "SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-1.34.1-4.9.1.x86_64", }, product_reference: "busybox-1.34.1-4.9.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Module for Basesystem 15 SP3", }, { category: "default_component_of", full_product_name: { name: "busybox-static-1.34.1-4.9.1.aarch64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP3", product_id: "SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-static-1.34.1-4.9.1.aarch64", }, product_reference: "busybox-static-1.34.1-4.9.1.aarch64", relates_to_product_reference: "SUSE Linux Enterprise Module for Basesystem 15 SP3", }, { category: "default_component_of", full_product_name: { name: "busybox-static-1.34.1-4.9.1.ppc64le as component of SUSE Linux Enterprise Module for Basesystem 15 SP3", product_id: "SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-static-1.34.1-4.9.1.ppc64le", }, product_reference: "busybox-static-1.34.1-4.9.1.ppc64le", relates_to_product_reference: "SUSE Linux Enterprise Module for Basesystem 15 SP3", }, { category: "default_component_of", full_product_name: { name: "busybox-static-1.34.1-4.9.1.s390x as component of SUSE Linux Enterprise Module for Basesystem 15 SP3", product_id: "SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-static-1.34.1-4.9.1.s390x", }, product_reference: "busybox-static-1.34.1-4.9.1.s390x", relates_to_product_reference: "SUSE Linux Enterprise Module for Basesystem 15 SP3", }, { category: "default_component_of", full_product_name: { name: "busybox-static-1.34.1-4.9.1.x86_64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP3", product_id: "SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-static-1.34.1-4.9.1.x86_64", }, product_reference: "busybox-static-1.34.1-4.9.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Module for Basesystem 15 SP3", }, { category: "default_component_of", full_product_name: { name: "busybox-1.34.1-4.9.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15-ESPOS", product_id: "SUSE Linux Enterprise High Performance Computing 15-ESPOS:busybox-1.34.1-4.9.1.aarch64", }, product_reference: "busybox-1.34.1-4.9.1.aarch64", relates_to_product_reference: "SUSE Linux Enterprise High Performance Computing 15-ESPOS", }, { category: "default_component_of", full_product_name: { name: "busybox-1.34.1-4.9.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15-ESPOS", product_id: "SUSE Linux Enterprise High Performance Computing 15-ESPOS:busybox-1.34.1-4.9.1.x86_64", }, product_reference: "busybox-1.34.1-4.9.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise High Performance Computing 15-ESPOS", }, { category: "default_component_of", full_product_name: { name: "busybox-1.34.1-4.9.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15-LTSS", product_id: "SUSE Linux Enterprise High Performance Computing 15-LTSS:busybox-1.34.1-4.9.1.aarch64", }, product_reference: "busybox-1.34.1-4.9.1.aarch64", relates_to_product_reference: "SUSE Linux Enterprise High Performance Computing 15-LTSS", }, { category: "default_component_of", full_product_name: { name: "busybox-1.34.1-4.9.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15-LTSS", product_id: "SUSE Linux Enterprise High Performance Computing 15-LTSS:busybox-1.34.1-4.9.1.x86_64", }, product_reference: "busybox-1.34.1-4.9.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise High Performance Computing 15-LTSS", }, { category: "default_component_of", full_product_name: { name: "busybox-1.34.1-4.9.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS", product_id: "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:busybox-1.34.1-4.9.1.aarch64", }, product_reference: "busybox-1.34.1-4.9.1.aarch64", relates_to_product_reference: "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS", }, { category: "default_component_of", full_product_name: { name: "busybox-1.34.1-4.9.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS", product_id: "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:busybox-1.34.1-4.9.1.x86_64", }, product_reference: "busybox-1.34.1-4.9.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS", }, { category: "default_component_of", full_product_name: { name: "busybox-static-1.34.1-4.9.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS", product_id: "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:busybox-static-1.34.1-4.9.1.aarch64", }, product_reference: "busybox-static-1.34.1-4.9.1.aarch64", relates_to_product_reference: "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS", }, { category: "default_component_of", full_product_name: { name: "busybox-static-1.34.1-4.9.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS", product_id: "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:busybox-static-1.34.1-4.9.1.x86_64", }, product_reference: "busybox-static-1.34.1-4.9.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS", }, { category: "default_component_of", full_product_name: { name: "busybox-1.34.1-4.9.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS", product_id: "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:busybox-1.34.1-4.9.1.aarch64", }, product_reference: "busybox-1.34.1-4.9.1.aarch64", relates_to_product_reference: "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS", }, { category: "default_component_of", full_product_name: { name: "busybox-1.34.1-4.9.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS", product_id: "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:busybox-1.34.1-4.9.1.x86_64", }, product_reference: "busybox-1.34.1-4.9.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS", }, { category: "default_component_of", full_product_name: { name: "busybox-static-1.34.1-4.9.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS", product_id: "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:busybox-static-1.34.1-4.9.1.aarch64", }, product_reference: "busybox-static-1.34.1-4.9.1.aarch64", relates_to_product_reference: "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS", }, { category: "default_component_of", full_product_name: { name: "busybox-static-1.34.1-4.9.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS", product_id: "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:busybox-static-1.34.1-4.9.1.x86_64", }, product_reference: "busybox-static-1.34.1-4.9.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS", }, { category: "default_component_of", full_product_name: { name: "busybox-1.34.1-4.9.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS", product_id: "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:busybox-1.34.1-4.9.1.aarch64", }, product_reference: "busybox-1.34.1-4.9.1.aarch64", relates_to_product_reference: "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS", }, { category: "default_component_of", full_product_name: { name: "busybox-1.34.1-4.9.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS", product_id: "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:busybox-1.34.1-4.9.1.x86_64", }, product_reference: "busybox-1.34.1-4.9.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS", }, { category: "default_component_of", full_product_name: { name: "busybox-static-1.34.1-4.9.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS", product_id: "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:busybox-static-1.34.1-4.9.1.aarch64", }, product_reference: "busybox-static-1.34.1-4.9.1.aarch64", relates_to_product_reference: "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS", }, { category: "default_component_of", full_product_name: { name: "busybox-static-1.34.1-4.9.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS", product_id: "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:busybox-static-1.34.1-4.9.1.x86_64", }, product_reference: "busybox-static-1.34.1-4.9.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS", }, { category: "default_component_of", full_product_name: { name: "busybox-1.34.1-4.9.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS", product_id: "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:busybox-1.34.1-4.9.1.aarch64", }, product_reference: "busybox-1.34.1-4.9.1.aarch64", relates_to_product_reference: "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS", }, { category: "default_component_of", full_product_name: { name: "busybox-1.34.1-4.9.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS", product_id: "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:busybox-1.34.1-4.9.1.x86_64", }, product_reference: "busybox-1.34.1-4.9.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS", }, { category: "default_component_of", full_product_name: { name: "busybox-static-1.34.1-4.9.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS", product_id: "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:busybox-static-1.34.1-4.9.1.aarch64", }, product_reference: "busybox-static-1.34.1-4.9.1.aarch64", relates_to_product_reference: "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS", }, { category: "default_component_of", full_product_name: { name: "busybox-static-1.34.1-4.9.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS", product_id: "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:busybox-static-1.34.1-4.9.1.x86_64", }, product_reference: "busybox-static-1.34.1-4.9.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS", }, { category: "default_component_of", full_product_name: { name: "busybox-1.34.1-4.9.1.aarch64 as component of SUSE Linux Enterprise Server 15-LTSS", product_id: "SUSE Linux Enterprise Server 15-LTSS:busybox-1.34.1-4.9.1.aarch64", }, product_reference: "busybox-1.34.1-4.9.1.aarch64", relates_to_product_reference: "SUSE Linux Enterprise Server 15-LTSS", }, { category: "default_component_of", full_product_name: { name: "busybox-1.34.1-4.9.1.ppc64le as component of SUSE Linux Enterprise Server 15-LTSS", product_id: "SUSE Linux Enterprise Server 15-LTSS:busybox-1.34.1-4.9.1.ppc64le", }, product_reference: "busybox-1.34.1-4.9.1.ppc64le", relates_to_product_reference: "SUSE Linux Enterprise Server 15-LTSS", }, { category: "default_component_of", full_product_name: { name: "busybox-1.34.1-4.9.1.s390x as component of SUSE Linux Enterprise Server 15-LTSS", product_id: "SUSE Linux Enterprise Server 15-LTSS:busybox-1.34.1-4.9.1.s390x", }, product_reference: "busybox-1.34.1-4.9.1.s390x", relates_to_product_reference: "SUSE Linux Enterprise Server 15-LTSS", }, { category: "default_component_of", full_product_name: { name: "busybox-1.34.1-4.9.1.x86_64 as component of SUSE Linux Enterprise Server 15-LTSS", product_id: "SUSE Linux Enterprise Server 15-LTSS:busybox-1.34.1-4.9.1.x86_64", }, product_reference: "busybox-1.34.1-4.9.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Server 15-LTSS", }, { category: "default_component_of", full_product_name: { name: "busybox-1.34.1-4.9.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP1-BCL", product_id: "SUSE Linux Enterprise Server 15 SP1-BCL:busybox-1.34.1-4.9.1.x86_64", }, product_reference: "busybox-1.34.1-4.9.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Server 15 SP1-BCL", }, { category: "default_component_of", full_product_name: { name: "busybox-static-1.34.1-4.9.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP1-BCL", product_id: "SUSE Linux Enterprise Server 15 SP1-BCL:busybox-static-1.34.1-4.9.1.x86_64", }, product_reference: "busybox-static-1.34.1-4.9.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Server 15 SP1-BCL", }, { category: "default_component_of", full_product_name: { name: "busybox-1.34.1-4.9.1.aarch64 as component of SUSE Linux Enterprise Server 15 SP1-LTSS", product_id: "SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-1.34.1-4.9.1.aarch64", }, product_reference: "busybox-1.34.1-4.9.1.aarch64", relates_to_product_reference: "SUSE Linux Enterprise Server 15 SP1-LTSS", }, { category: "default_component_of", full_product_name: { name: "busybox-1.34.1-4.9.1.ppc64le as component of SUSE Linux Enterprise Server 15 SP1-LTSS", product_id: "SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-1.34.1-4.9.1.ppc64le", }, product_reference: "busybox-1.34.1-4.9.1.ppc64le", relates_to_product_reference: "SUSE Linux Enterprise Server 15 SP1-LTSS", }, { category: "default_component_of", full_product_name: { name: "busybox-1.34.1-4.9.1.s390x as component of SUSE Linux Enterprise Server 15 SP1-LTSS", product_id: "SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-1.34.1-4.9.1.s390x", }, product_reference: "busybox-1.34.1-4.9.1.s390x", relates_to_product_reference: "SUSE Linux Enterprise Server 15 SP1-LTSS", }, { category: "default_component_of", full_product_name: { name: "busybox-1.34.1-4.9.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP1-LTSS", product_id: "SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-1.34.1-4.9.1.x86_64", }, product_reference: "busybox-1.34.1-4.9.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Server 15 SP1-LTSS", }, { category: "default_component_of", full_product_name: { name: "busybox-static-1.34.1-4.9.1.aarch64 as component of SUSE Linux Enterprise Server 15 SP1-LTSS", product_id: "SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-static-1.34.1-4.9.1.aarch64", }, product_reference: "busybox-static-1.34.1-4.9.1.aarch64", relates_to_product_reference: "SUSE Linux Enterprise Server 15 SP1-LTSS", }, { category: "default_component_of", full_product_name: { name: "busybox-static-1.34.1-4.9.1.ppc64le as component of SUSE Linux Enterprise Server 15 SP1-LTSS", product_id: "SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-static-1.34.1-4.9.1.ppc64le", }, product_reference: "busybox-static-1.34.1-4.9.1.ppc64le", relates_to_product_reference: "SUSE Linux Enterprise Server 15 SP1-LTSS", }, { category: "default_component_of", full_product_name: { name: "busybox-static-1.34.1-4.9.1.s390x as component of SUSE Linux Enterprise Server 15 SP1-LTSS", product_id: "SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-static-1.34.1-4.9.1.s390x", }, product_reference: "busybox-static-1.34.1-4.9.1.s390x", relates_to_product_reference: "SUSE Linux Enterprise Server 15 SP1-LTSS", }, { category: "default_component_of", full_product_name: { name: "busybox-static-1.34.1-4.9.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP1-LTSS", product_id: "SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-static-1.34.1-4.9.1.x86_64", }, product_reference: "busybox-static-1.34.1-4.9.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Server 15 SP1-LTSS", }, { category: "default_component_of", full_product_name: { name: "busybox-1.34.1-4.9.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP2-BCL", product_id: "SUSE Linux Enterprise Server 15 SP2-BCL:busybox-1.34.1-4.9.1.x86_64", }, product_reference: "busybox-1.34.1-4.9.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Server 15 SP2-BCL", }, { category: "default_component_of", full_product_name: { name: "busybox-static-1.34.1-4.9.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP2-BCL", product_id: "SUSE Linux Enterprise Server 15 SP2-BCL:busybox-static-1.34.1-4.9.1.x86_64", }, product_reference: "busybox-static-1.34.1-4.9.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Server 15 SP2-BCL", }, { category: "default_component_of", full_product_name: { name: "busybox-1.34.1-4.9.1.aarch64 as component of SUSE Linux Enterprise Server 15 SP2-LTSS", product_id: "SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-1.34.1-4.9.1.aarch64", }, product_reference: "busybox-1.34.1-4.9.1.aarch64", relates_to_product_reference: "SUSE Linux Enterprise Server 15 SP2-LTSS", }, { category: "default_component_of", full_product_name: { name: "busybox-1.34.1-4.9.1.ppc64le as component of SUSE Linux Enterprise Server 15 SP2-LTSS", product_id: "SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-1.34.1-4.9.1.ppc64le", }, product_reference: "busybox-1.34.1-4.9.1.ppc64le", relates_to_product_reference: "SUSE Linux Enterprise Server 15 SP2-LTSS", }, { category: "default_component_of", full_product_name: { name: "busybox-1.34.1-4.9.1.s390x as component of SUSE Linux Enterprise Server 15 SP2-LTSS", product_id: "SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-1.34.1-4.9.1.s390x", }, product_reference: "busybox-1.34.1-4.9.1.s390x", relates_to_product_reference: "SUSE Linux Enterprise Server 15 SP2-LTSS", }, { category: "default_component_of", full_product_name: { name: "busybox-1.34.1-4.9.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP2-LTSS", product_id: "SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-1.34.1-4.9.1.x86_64", }, product_reference: "busybox-1.34.1-4.9.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Server 15 SP2-LTSS", }, { category: "default_component_of", full_product_name: { name: "busybox-static-1.34.1-4.9.1.aarch64 as component of SUSE Linux Enterprise Server 15 SP2-LTSS", product_id: "SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-static-1.34.1-4.9.1.aarch64", }, product_reference: "busybox-static-1.34.1-4.9.1.aarch64", relates_to_product_reference: "SUSE Linux Enterprise Server 15 SP2-LTSS", }, { category: "default_component_of", full_product_name: { name: "busybox-static-1.34.1-4.9.1.ppc64le as component of SUSE Linux Enterprise Server 15 SP2-LTSS", product_id: "SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-static-1.34.1-4.9.1.ppc64le", }, product_reference: "busybox-static-1.34.1-4.9.1.ppc64le", relates_to_product_reference: "SUSE Linux Enterprise Server 15 SP2-LTSS", }, { category: "default_component_of", full_product_name: { name: "busybox-static-1.34.1-4.9.1.s390x as component of SUSE Linux Enterprise Server 15 SP2-LTSS", product_id: "SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-static-1.34.1-4.9.1.s390x", }, product_reference: "busybox-static-1.34.1-4.9.1.s390x", relates_to_product_reference: "SUSE Linux Enterprise Server 15 SP2-LTSS", }, { category: "default_component_of", full_product_name: { name: "busybox-static-1.34.1-4.9.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP2-LTSS", product_id: "SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-static-1.34.1-4.9.1.x86_64", }, product_reference: "busybox-static-1.34.1-4.9.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Server 15 SP2-LTSS", }, { category: "default_component_of", full_product_name: { name: "busybox-1.34.1-4.9.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 15", product_id: "SUSE Linux Enterprise Server for SAP Applications 15:busybox-1.34.1-4.9.1.ppc64le", }, product_reference: "busybox-1.34.1-4.9.1.ppc64le", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 15", }, { category: "default_component_of", full_product_name: { name: "busybox-1.34.1-4.9.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15", product_id: "SUSE Linux Enterprise Server for SAP Applications 15:busybox-1.34.1-4.9.1.x86_64", }, product_reference: "busybox-1.34.1-4.9.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 15", }, { category: "default_component_of", full_product_name: { name: "busybox-1.34.1-4.9.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 15 SP1", product_id: "SUSE Linux Enterprise Server for SAP Applications 15 SP1:busybox-1.34.1-4.9.1.ppc64le", }, product_reference: "busybox-1.34.1-4.9.1.ppc64le", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 15 SP1", }, { category: "default_component_of", full_product_name: { name: "busybox-1.34.1-4.9.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15 SP1", product_id: "SUSE Linux Enterprise Server for SAP Applications 15 SP1:busybox-1.34.1-4.9.1.x86_64", }, product_reference: "busybox-1.34.1-4.9.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 15 SP1", }, { category: "default_component_of", full_product_name: { name: "busybox-static-1.34.1-4.9.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 15 SP1", product_id: "SUSE Linux Enterprise Server for SAP Applications 15 SP1:busybox-static-1.34.1-4.9.1.ppc64le", }, product_reference: "busybox-static-1.34.1-4.9.1.ppc64le", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 15 SP1", }, { category: "default_component_of", full_product_name: { name: "busybox-static-1.34.1-4.9.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15 SP1", product_id: "SUSE Linux Enterprise Server for SAP Applications 15 SP1:busybox-static-1.34.1-4.9.1.x86_64", }, product_reference: "busybox-static-1.34.1-4.9.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 15 SP1", }, { category: "default_component_of", full_product_name: { name: "busybox-1.34.1-4.9.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 15 SP2", product_id: "SUSE Linux Enterprise Server for SAP Applications 15 SP2:busybox-1.34.1-4.9.1.ppc64le", }, product_reference: "busybox-1.34.1-4.9.1.ppc64le", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 15 SP2", }, { category: "default_component_of", full_product_name: { name: "busybox-1.34.1-4.9.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15 SP2", product_id: "SUSE Linux Enterprise Server for SAP Applications 15 SP2:busybox-1.34.1-4.9.1.x86_64", }, product_reference: "busybox-1.34.1-4.9.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 15 SP2", }, { category: "default_component_of", full_product_name: { name: "busybox-static-1.34.1-4.9.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 15 SP2", product_id: "SUSE Linux Enterprise Server for SAP Applications 15 SP2:busybox-static-1.34.1-4.9.1.ppc64le", }, product_reference: "busybox-static-1.34.1-4.9.1.ppc64le", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 15 SP2", }, { category: "default_component_of", full_product_name: { name: "busybox-static-1.34.1-4.9.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15 SP2", product_id: "SUSE Linux Enterprise Server for SAP Applications 15 SP2:busybox-static-1.34.1-4.9.1.x86_64", }, product_reference: "busybox-static-1.34.1-4.9.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 15 SP2", }, { category: "default_component_of", full_product_name: { name: "busybox-1.34.1-4.9.1.x86_64 as component of SUSE Manager Proxy 4.1", product_id: "SUSE Manager Proxy 4.1:busybox-1.34.1-4.9.1.x86_64", }, product_reference: "busybox-1.34.1-4.9.1.x86_64", relates_to_product_reference: "SUSE Manager Proxy 4.1", }, { category: "default_component_of", full_product_name: { name: "busybox-static-1.34.1-4.9.1.x86_64 as component of SUSE Manager Proxy 4.1", product_id: "SUSE Manager Proxy 4.1:busybox-static-1.34.1-4.9.1.x86_64", }, product_reference: "busybox-static-1.34.1-4.9.1.x86_64", relates_to_product_reference: "SUSE Manager Proxy 4.1", }, { category: "default_component_of", full_product_name: { name: "busybox-1.34.1-4.9.1.x86_64 as component of SUSE Manager Retail Branch Server 4.1", product_id: "SUSE Manager Retail Branch Server 4.1:busybox-1.34.1-4.9.1.x86_64", }, product_reference: "busybox-1.34.1-4.9.1.x86_64", relates_to_product_reference: "SUSE Manager Retail Branch Server 4.1", }, { category: "default_component_of", full_product_name: { name: "busybox-static-1.34.1-4.9.1.x86_64 as component of SUSE Manager Retail Branch Server 4.1", product_id: "SUSE Manager Retail Branch Server 4.1:busybox-static-1.34.1-4.9.1.x86_64", }, product_reference: "busybox-static-1.34.1-4.9.1.x86_64", relates_to_product_reference: "SUSE Manager Retail Branch Server 4.1", }, { category: "default_component_of", full_product_name: { name: "busybox-1.34.1-4.9.1.ppc64le as component of SUSE Manager Server 4.1", product_id: "SUSE Manager Server 4.1:busybox-1.34.1-4.9.1.ppc64le", }, product_reference: "busybox-1.34.1-4.9.1.ppc64le", relates_to_product_reference: "SUSE Manager Server 4.1", }, { category: "default_component_of", full_product_name: { name: "busybox-1.34.1-4.9.1.s390x as component of SUSE Manager Server 4.1", product_id: "SUSE Manager Server 4.1:busybox-1.34.1-4.9.1.s390x", }, product_reference: "busybox-1.34.1-4.9.1.s390x", relates_to_product_reference: "SUSE Manager Server 4.1", }, { category: "default_component_of", full_product_name: { name: "busybox-1.34.1-4.9.1.x86_64 as component of SUSE Manager Server 4.1", product_id: "SUSE Manager Server 4.1:busybox-1.34.1-4.9.1.x86_64", }, product_reference: "busybox-1.34.1-4.9.1.x86_64", relates_to_product_reference: "SUSE Manager Server 4.1", }, { category: "default_component_of", full_product_name: { name: "busybox-static-1.34.1-4.9.1.ppc64le as component of SUSE Manager Server 4.1", product_id: "SUSE Manager Server 4.1:busybox-static-1.34.1-4.9.1.ppc64le", }, product_reference: "busybox-static-1.34.1-4.9.1.ppc64le", relates_to_product_reference: "SUSE Manager Server 4.1", }, { category: "default_component_of", full_product_name: { name: "busybox-static-1.34.1-4.9.1.s390x as component of SUSE Manager Server 4.1", product_id: "SUSE Manager Server 4.1:busybox-static-1.34.1-4.9.1.s390x", }, product_reference: "busybox-static-1.34.1-4.9.1.s390x", relates_to_product_reference: "SUSE Manager Server 4.1", }, { category: "default_component_of", full_product_name: { name: "busybox-static-1.34.1-4.9.1.x86_64 as component of SUSE Manager Server 4.1", product_id: "SUSE Manager Server 4.1:busybox-static-1.34.1-4.9.1.x86_64", }, product_reference: "busybox-static-1.34.1-4.9.1.x86_64", relates_to_product_reference: "SUSE Manager Server 4.1", }, { category: "default_component_of", full_product_name: { name: "busybox-1.34.1-4.9.1.aarch64 as component of SUSE Enterprise Storage 6", product_id: "SUSE Enterprise Storage 6:busybox-1.34.1-4.9.1.aarch64", }, product_reference: "busybox-1.34.1-4.9.1.aarch64", relates_to_product_reference: "SUSE Enterprise Storage 6", }, { category: "default_component_of", full_product_name: { name: "busybox-1.34.1-4.9.1.x86_64 as component of SUSE Enterprise Storage 6", product_id: "SUSE Enterprise Storage 6:busybox-1.34.1-4.9.1.x86_64", }, product_reference: "busybox-1.34.1-4.9.1.x86_64", relates_to_product_reference: "SUSE Enterprise Storage 6", }, { category: "default_component_of", full_product_name: { name: "busybox-static-1.34.1-4.9.1.aarch64 as component of SUSE Enterprise Storage 6", product_id: "SUSE Enterprise Storage 6:busybox-static-1.34.1-4.9.1.aarch64", }, product_reference: "busybox-static-1.34.1-4.9.1.aarch64", relates_to_product_reference: "SUSE Enterprise Storage 6", }, { category: "default_component_of", full_product_name: { name: "busybox-static-1.34.1-4.9.1.x86_64 as component of SUSE Enterprise Storage 6", product_id: "SUSE Enterprise Storage 6:busybox-static-1.34.1-4.9.1.x86_64", }, product_reference: "busybox-static-1.34.1-4.9.1.x86_64", relates_to_product_reference: "SUSE Enterprise Storage 6", }, { category: "default_component_of", full_product_name: { name: "busybox-1.34.1-4.9.1.aarch64 as component of SUSE Enterprise Storage 7", product_id: "SUSE Enterprise Storage 7:busybox-1.34.1-4.9.1.aarch64", }, product_reference: "busybox-1.34.1-4.9.1.aarch64", relates_to_product_reference: "SUSE Enterprise Storage 7", }, { category: "default_component_of", full_product_name: { name: "busybox-1.34.1-4.9.1.x86_64 as component of SUSE Enterprise Storage 7", product_id: "SUSE Enterprise Storage 7:busybox-1.34.1-4.9.1.x86_64", }, product_reference: "busybox-1.34.1-4.9.1.x86_64", relates_to_product_reference: "SUSE Enterprise Storage 7", }, { category: "default_component_of", full_product_name: { name: "busybox-static-1.34.1-4.9.1.aarch64 as component of SUSE Enterprise Storage 7", product_id: "SUSE Enterprise Storage 7:busybox-static-1.34.1-4.9.1.aarch64", }, product_reference: "busybox-static-1.34.1-4.9.1.aarch64", relates_to_product_reference: "SUSE Enterprise Storage 7", }, { category: "default_component_of", full_product_name: { name: "busybox-static-1.34.1-4.9.1.x86_64 as component of SUSE Enterprise Storage 7", product_id: "SUSE Enterprise Storage 7:busybox-static-1.34.1-4.9.1.x86_64", }, product_reference: "busybox-static-1.34.1-4.9.1.x86_64", relates_to_product_reference: "SUSE Enterprise Storage 7", }, ], }, vulnerabilities: [ { cve: "CVE-2011-5325", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2011-5325", }, ], notes: [ { category: "general", text: "Directory traversal vulnerability in the BusyBox implementation of tar before 1.22.0 v5 allows remote attackers to point to files outside the current working directory via a symlink.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Enterprise Storage 6:busybox-1.34.1-4.9.1.aarch64", "SUSE Enterprise Storage 6:busybox-1.34.1-4.9.1.x86_64", "SUSE Enterprise Storage 6:busybox-static-1.34.1-4.9.1.aarch64", "SUSE Enterprise Storage 6:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Enterprise Storage 7:busybox-1.34.1-4.9.1.aarch64", "SUSE Enterprise Storage 7:busybox-1.34.1-4.9.1.x86_64", "SUSE Enterprise Storage 7:busybox-static-1.34.1-4.9.1.aarch64", "SUSE Enterprise Storage 7:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:busybox-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:busybox-static-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:busybox-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:busybox-static-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:busybox-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:busybox-static-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:busybox-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:busybox-static-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:busybox-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:busybox-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-1.34.1-4.9.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-static-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-static-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-static-1.34.1-4.9.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-1.34.1-4.9.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-static-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-static-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-static-1.34.1-4.9.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-1.34.1-4.9.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-static-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-static-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-static-1.34.1-4.9.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:busybox-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:busybox-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:busybox-1.34.1-4.9.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:busybox-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:busybox-static-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:busybox-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:busybox-static-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:busybox-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:busybox-1.34.1-4.9.1.x86_64", "SUSE Manager Proxy 4.1:busybox-1.34.1-4.9.1.x86_64", "SUSE Manager Proxy 4.1:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Manager Retail Branch Server 4.1:busybox-1.34.1-4.9.1.x86_64", "SUSE Manager Retail Branch Server 4.1:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Manager Server 4.1:busybox-1.34.1-4.9.1.ppc64le", "SUSE Manager Server 4.1:busybox-1.34.1-4.9.1.s390x", "SUSE Manager Server 4.1:busybox-1.34.1-4.9.1.x86_64", "SUSE Manager Server 4.1:busybox-static-1.34.1-4.9.1.ppc64le", "SUSE Manager Server 4.1:busybox-static-1.34.1-4.9.1.s390x", "SUSE Manager Server 4.1:busybox-static-1.34.1-4.9.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2011-5325", url: "https://www.suse.com/security/cve/CVE-2011-5325", }, { category: "external", summary: "SUSE Bug 951562 for CVE-2011-5325", url: "https://bugzilla.suse.com/951562", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Enterprise Storage 6:busybox-1.34.1-4.9.1.aarch64", "SUSE Enterprise Storage 6:busybox-1.34.1-4.9.1.x86_64", "SUSE Enterprise Storage 6:busybox-static-1.34.1-4.9.1.aarch64", "SUSE Enterprise Storage 6:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Enterprise Storage 7:busybox-1.34.1-4.9.1.aarch64", "SUSE Enterprise Storage 7:busybox-1.34.1-4.9.1.x86_64", "SUSE Enterprise Storage 7:busybox-static-1.34.1-4.9.1.aarch64", "SUSE Enterprise Storage 7:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:busybox-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:busybox-static-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:busybox-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:busybox-static-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:busybox-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:busybox-static-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:busybox-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:busybox-static-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:busybox-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:busybox-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-1.34.1-4.9.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-static-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-static-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-static-1.34.1-4.9.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-1.34.1-4.9.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-static-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-static-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-static-1.34.1-4.9.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-1.34.1-4.9.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-static-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-static-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-static-1.34.1-4.9.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:busybox-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:busybox-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:busybox-1.34.1-4.9.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:busybox-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:busybox-static-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:busybox-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:busybox-static-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:busybox-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:busybox-1.34.1-4.9.1.x86_64", "SUSE Manager Proxy 4.1:busybox-1.34.1-4.9.1.x86_64", "SUSE Manager Proxy 4.1:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Manager Retail Branch Server 4.1:busybox-1.34.1-4.9.1.x86_64", "SUSE Manager Retail Branch Server 4.1:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Manager Server 4.1:busybox-1.34.1-4.9.1.ppc64le", "SUSE Manager Server 4.1:busybox-1.34.1-4.9.1.s390x", "SUSE Manager Server 4.1:busybox-1.34.1-4.9.1.x86_64", "SUSE Manager Server 4.1:busybox-static-1.34.1-4.9.1.ppc64le", "SUSE Manager Server 4.1:busybox-static-1.34.1-4.9.1.s390x", "SUSE Manager Server 4.1:busybox-static-1.34.1-4.9.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 7.5, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N", version: "3.1", }, products: [ "SUSE Enterprise Storage 6:busybox-1.34.1-4.9.1.aarch64", "SUSE Enterprise Storage 6:busybox-1.34.1-4.9.1.x86_64", "SUSE Enterprise Storage 6:busybox-static-1.34.1-4.9.1.aarch64", "SUSE Enterprise Storage 6:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Enterprise Storage 7:busybox-1.34.1-4.9.1.aarch64", "SUSE Enterprise Storage 7:busybox-1.34.1-4.9.1.x86_64", "SUSE Enterprise Storage 7:busybox-static-1.34.1-4.9.1.aarch64", "SUSE Enterprise Storage 7:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:busybox-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:busybox-static-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:busybox-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:busybox-static-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:busybox-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:busybox-static-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:busybox-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:busybox-static-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:busybox-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:busybox-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-1.34.1-4.9.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-static-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-static-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-static-1.34.1-4.9.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-1.34.1-4.9.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-static-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-static-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-static-1.34.1-4.9.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-1.34.1-4.9.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-static-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-static-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-static-1.34.1-4.9.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:busybox-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:busybox-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:busybox-1.34.1-4.9.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:busybox-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:busybox-static-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:busybox-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:busybox-static-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:busybox-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:busybox-1.34.1-4.9.1.x86_64", "SUSE Manager Proxy 4.1:busybox-1.34.1-4.9.1.x86_64", "SUSE Manager Proxy 4.1:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Manager Retail Branch Server 4.1:busybox-1.34.1-4.9.1.x86_64", "SUSE Manager Retail Branch Server 4.1:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Manager Server 4.1:busybox-1.34.1-4.9.1.ppc64le", "SUSE Manager Server 4.1:busybox-1.34.1-4.9.1.s390x", "SUSE Manager Server 4.1:busybox-1.34.1-4.9.1.x86_64", "SUSE Manager Server 4.1:busybox-static-1.34.1-4.9.1.ppc64le", "SUSE Manager Server 4.1:busybox-static-1.34.1-4.9.1.s390x", "SUSE Manager Server 4.1:busybox-static-1.34.1-4.9.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2022-01-20T09:05:15Z", details: "moderate", }, ], title: "CVE-2011-5325", }, { cve: "CVE-2015-9261", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2015-9261", }, ], notes: [ { category: "general", text: "huft_build in archival/libarchive/decompress_gunzip.c in BusyBox before 1.27.2 misuses a pointer, causing segfaults and an application crash during an unzip operation on a specially crafted ZIP file.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Enterprise Storage 6:busybox-1.34.1-4.9.1.aarch64", "SUSE Enterprise Storage 6:busybox-1.34.1-4.9.1.x86_64", "SUSE Enterprise Storage 6:busybox-static-1.34.1-4.9.1.aarch64", "SUSE Enterprise Storage 6:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Enterprise Storage 7:busybox-1.34.1-4.9.1.aarch64", "SUSE Enterprise Storage 7:busybox-1.34.1-4.9.1.x86_64", "SUSE Enterprise Storage 7:busybox-static-1.34.1-4.9.1.aarch64", "SUSE Enterprise Storage 7:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:busybox-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:busybox-static-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:busybox-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:busybox-static-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:busybox-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:busybox-static-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:busybox-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:busybox-static-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:busybox-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:busybox-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-1.34.1-4.9.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-static-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-static-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-static-1.34.1-4.9.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-1.34.1-4.9.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-static-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-static-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-static-1.34.1-4.9.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-1.34.1-4.9.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-static-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-static-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-static-1.34.1-4.9.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:busybox-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:busybox-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:busybox-1.34.1-4.9.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:busybox-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:busybox-static-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:busybox-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:busybox-static-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:busybox-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:busybox-1.34.1-4.9.1.x86_64", "SUSE Manager Proxy 4.1:busybox-1.34.1-4.9.1.x86_64", "SUSE Manager Proxy 4.1:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Manager Retail Branch Server 4.1:busybox-1.34.1-4.9.1.x86_64", "SUSE Manager Retail Branch Server 4.1:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Manager Server 4.1:busybox-1.34.1-4.9.1.ppc64le", "SUSE Manager Server 4.1:busybox-1.34.1-4.9.1.s390x", "SUSE Manager Server 4.1:busybox-1.34.1-4.9.1.x86_64", "SUSE Manager Server 4.1:busybox-static-1.34.1-4.9.1.ppc64le", "SUSE Manager Server 4.1:busybox-static-1.34.1-4.9.1.s390x", "SUSE Manager Server 4.1:busybox-static-1.34.1-4.9.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2015-9261", url: "https://www.suse.com/security/cve/CVE-2015-9261", }, { category: "external", summary: "SUSE Bug 1102912 for CVE-2015-9261", url: "https://bugzilla.suse.com/1102912", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Enterprise Storage 6:busybox-1.34.1-4.9.1.aarch64", "SUSE Enterprise Storage 6:busybox-1.34.1-4.9.1.x86_64", "SUSE Enterprise Storage 6:busybox-static-1.34.1-4.9.1.aarch64", "SUSE Enterprise Storage 6:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Enterprise Storage 7:busybox-1.34.1-4.9.1.aarch64", "SUSE Enterprise Storage 7:busybox-1.34.1-4.9.1.x86_64", "SUSE Enterprise Storage 7:busybox-static-1.34.1-4.9.1.aarch64", "SUSE Enterprise Storage 7:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:busybox-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:busybox-static-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:busybox-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:busybox-static-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:busybox-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:busybox-static-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:busybox-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:busybox-static-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:busybox-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:busybox-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-1.34.1-4.9.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-static-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-static-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-static-1.34.1-4.9.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-1.34.1-4.9.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-static-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-static-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-static-1.34.1-4.9.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-1.34.1-4.9.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-static-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-static-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-static-1.34.1-4.9.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:busybox-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:busybox-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:busybox-1.34.1-4.9.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:busybox-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:busybox-static-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:busybox-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:busybox-static-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:busybox-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:busybox-1.34.1-4.9.1.x86_64", "SUSE Manager Proxy 4.1:busybox-1.34.1-4.9.1.x86_64", "SUSE Manager Proxy 4.1:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Manager Retail Branch Server 4.1:busybox-1.34.1-4.9.1.x86_64", "SUSE Manager Retail Branch Server 4.1:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Manager Server 4.1:busybox-1.34.1-4.9.1.ppc64le", "SUSE Manager Server 4.1:busybox-1.34.1-4.9.1.s390x", "SUSE Manager Server 4.1:busybox-1.34.1-4.9.1.x86_64", "SUSE Manager Server 4.1:busybox-static-1.34.1-4.9.1.ppc64le", "SUSE Manager Server 4.1:busybox-static-1.34.1-4.9.1.s390x", "SUSE Manager Server 4.1:busybox-static-1.34.1-4.9.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.5, baseSeverity: "MEDIUM", vectorString: "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", version: "3.0", }, products: [ "SUSE Enterprise Storage 6:busybox-1.34.1-4.9.1.aarch64", "SUSE Enterprise Storage 6:busybox-1.34.1-4.9.1.x86_64", "SUSE Enterprise Storage 6:busybox-static-1.34.1-4.9.1.aarch64", "SUSE Enterprise Storage 6:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Enterprise Storage 7:busybox-1.34.1-4.9.1.aarch64", "SUSE Enterprise Storage 7:busybox-1.34.1-4.9.1.x86_64", "SUSE Enterprise Storage 7:busybox-static-1.34.1-4.9.1.aarch64", "SUSE Enterprise Storage 7:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:busybox-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:busybox-static-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:busybox-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:busybox-static-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:busybox-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:busybox-static-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:busybox-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:busybox-static-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:busybox-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:busybox-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-1.34.1-4.9.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-static-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-static-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-static-1.34.1-4.9.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-1.34.1-4.9.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-static-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-static-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-static-1.34.1-4.9.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-1.34.1-4.9.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-static-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-static-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-static-1.34.1-4.9.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:busybox-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:busybox-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:busybox-1.34.1-4.9.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:busybox-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:busybox-static-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:busybox-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:busybox-static-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:busybox-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:busybox-1.34.1-4.9.1.x86_64", "SUSE Manager Proxy 4.1:busybox-1.34.1-4.9.1.x86_64", "SUSE Manager Proxy 4.1:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Manager Retail Branch Server 4.1:busybox-1.34.1-4.9.1.x86_64", "SUSE Manager Retail Branch Server 4.1:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Manager Server 4.1:busybox-1.34.1-4.9.1.ppc64le", "SUSE Manager Server 4.1:busybox-1.34.1-4.9.1.s390x", "SUSE Manager Server 4.1:busybox-1.34.1-4.9.1.x86_64", "SUSE Manager Server 4.1:busybox-static-1.34.1-4.9.1.ppc64le", "SUSE Manager Server 4.1:busybox-static-1.34.1-4.9.1.s390x", "SUSE Manager Server 4.1:busybox-static-1.34.1-4.9.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2022-01-20T09:05:15Z", details: "moderate", }, ], title: "CVE-2015-9261", }, { cve: "CVE-2016-2147", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2016-2147", }, ], notes: [ { category: "general", text: "Integer overflow in the DHCP client (udhcpc) in BusyBox before 1.25.0 allows remote attackers to cause a denial of service (crash) via a malformed RFC1035-encoded domain name, which triggers an out-of-bounds heap write.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Enterprise Storage 6:busybox-1.34.1-4.9.1.aarch64", "SUSE Enterprise Storage 6:busybox-1.34.1-4.9.1.x86_64", "SUSE Enterprise Storage 6:busybox-static-1.34.1-4.9.1.aarch64", "SUSE Enterprise Storage 6:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Enterprise Storage 7:busybox-1.34.1-4.9.1.aarch64", "SUSE Enterprise Storage 7:busybox-1.34.1-4.9.1.x86_64", "SUSE Enterprise Storage 7:busybox-static-1.34.1-4.9.1.aarch64", "SUSE Enterprise Storage 7:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:busybox-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:busybox-static-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:busybox-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:busybox-static-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:busybox-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:busybox-static-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:busybox-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:busybox-static-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:busybox-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:busybox-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-1.34.1-4.9.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-static-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-static-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-static-1.34.1-4.9.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-1.34.1-4.9.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-static-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-static-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-static-1.34.1-4.9.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-1.34.1-4.9.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-static-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-static-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-static-1.34.1-4.9.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:busybox-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:busybox-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:busybox-1.34.1-4.9.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:busybox-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:busybox-static-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:busybox-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:busybox-static-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:busybox-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:busybox-1.34.1-4.9.1.x86_64", "SUSE Manager Proxy 4.1:busybox-1.34.1-4.9.1.x86_64", "SUSE Manager Proxy 4.1:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Manager Retail Branch Server 4.1:busybox-1.34.1-4.9.1.x86_64", "SUSE Manager Retail Branch Server 4.1:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Manager Server 4.1:busybox-1.34.1-4.9.1.ppc64le", "SUSE Manager Server 4.1:busybox-1.34.1-4.9.1.s390x", "SUSE Manager Server 4.1:busybox-1.34.1-4.9.1.x86_64", "SUSE Manager Server 4.1:busybox-static-1.34.1-4.9.1.ppc64le", "SUSE Manager Server 4.1:busybox-static-1.34.1-4.9.1.s390x", "SUSE Manager Server 4.1:busybox-static-1.34.1-4.9.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2016-2147", url: "https://www.suse.com/security/cve/CVE-2016-2147", }, { category: "external", summary: "SUSE Bug 970663 for CVE-2016-2147", url: "https://bugzilla.suse.com/970663", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Enterprise Storage 6:busybox-1.34.1-4.9.1.aarch64", "SUSE Enterprise Storage 6:busybox-1.34.1-4.9.1.x86_64", "SUSE Enterprise Storage 6:busybox-static-1.34.1-4.9.1.aarch64", "SUSE Enterprise Storage 6:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Enterprise Storage 7:busybox-1.34.1-4.9.1.aarch64", "SUSE Enterprise Storage 7:busybox-1.34.1-4.9.1.x86_64", "SUSE Enterprise Storage 7:busybox-static-1.34.1-4.9.1.aarch64", "SUSE Enterprise Storage 7:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:busybox-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:busybox-static-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:busybox-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:busybox-static-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:busybox-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:busybox-static-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:busybox-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:busybox-static-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:busybox-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:busybox-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-1.34.1-4.9.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-static-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-static-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-static-1.34.1-4.9.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-1.34.1-4.9.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-static-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-static-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-static-1.34.1-4.9.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-1.34.1-4.9.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-static-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-static-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-static-1.34.1-4.9.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:busybox-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:busybox-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:busybox-1.34.1-4.9.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:busybox-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:busybox-static-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:busybox-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:busybox-static-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:busybox-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:busybox-1.34.1-4.9.1.x86_64", "SUSE Manager Proxy 4.1:busybox-1.34.1-4.9.1.x86_64", "SUSE Manager Proxy 4.1:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Manager Retail Branch Server 4.1:busybox-1.34.1-4.9.1.x86_64", "SUSE Manager Retail Branch Server 4.1:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Manager Server 4.1:busybox-1.34.1-4.9.1.ppc64le", "SUSE Manager Server 4.1:busybox-1.34.1-4.9.1.s390x", "SUSE Manager Server 4.1:busybox-1.34.1-4.9.1.x86_64", "SUSE Manager Server 4.1:busybox-static-1.34.1-4.9.1.ppc64le", "SUSE Manager Server 4.1:busybox-static-1.34.1-4.9.1.s390x", "SUSE Manager Server 4.1:busybox-static-1.34.1-4.9.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 7.5, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "SUSE Enterprise Storage 6:busybox-1.34.1-4.9.1.aarch64", "SUSE Enterprise Storage 6:busybox-1.34.1-4.9.1.x86_64", "SUSE Enterprise Storage 6:busybox-static-1.34.1-4.9.1.aarch64", "SUSE Enterprise Storage 6:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Enterprise Storage 7:busybox-1.34.1-4.9.1.aarch64", "SUSE Enterprise Storage 7:busybox-1.34.1-4.9.1.x86_64", "SUSE Enterprise Storage 7:busybox-static-1.34.1-4.9.1.aarch64", "SUSE Enterprise Storage 7:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:busybox-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:busybox-static-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:busybox-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:busybox-static-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:busybox-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:busybox-static-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:busybox-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:busybox-static-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:busybox-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:busybox-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-1.34.1-4.9.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-static-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-static-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-static-1.34.1-4.9.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-1.34.1-4.9.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-static-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-static-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-static-1.34.1-4.9.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-1.34.1-4.9.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-static-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-static-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-static-1.34.1-4.9.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:busybox-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:busybox-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:busybox-1.34.1-4.9.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:busybox-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:busybox-static-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:busybox-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:busybox-static-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:busybox-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:busybox-1.34.1-4.9.1.x86_64", "SUSE Manager Proxy 4.1:busybox-1.34.1-4.9.1.x86_64", "SUSE Manager Proxy 4.1:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Manager Retail Branch Server 4.1:busybox-1.34.1-4.9.1.x86_64", "SUSE Manager Retail Branch Server 4.1:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Manager Server 4.1:busybox-1.34.1-4.9.1.ppc64le", "SUSE Manager Server 4.1:busybox-1.34.1-4.9.1.s390x", "SUSE Manager Server 4.1:busybox-1.34.1-4.9.1.x86_64", "SUSE Manager Server 4.1:busybox-static-1.34.1-4.9.1.ppc64le", "SUSE Manager Server 4.1:busybox-static-1.34.1-4.9.1.s390x", "SUSE Manager Server 4.1:busybox-static-1.34.1-4.9.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2022-01-20T09:05:15Z", details: "important", }, ], title: "CVE-2016-2147", }, { cve: "CVE-2016-2148", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2016-2148", }, ], notes: [ { category: "general", text: "Heap-based buffer overflow in the DHCP client (udhcpc) in BusyBox before 1.25.0 allows remote attackers to have unspecified impact via vectors involving OPTION_6RD parsing.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Enterprise Storage 6:busybox-1.34.1-4.9.1.aarch64", "SUSE Enterprise Storage 6:busybox-1.34.1-4.9.1.x86_64", "SUSE Enterprise Storage 6:busybox-static-1.34.1-4.9.1.aarch64", "SUSE Enterprise Storage 6:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Enterprise Storage 7:busybox-1.34.1-4.9.1.aarch64", "SUSE Enterprise Storage 7:busybox-1.34.1-4.9.1.x86_64", "SUSE Enterprise Storage 7:busybox-static-1.34.1-4.9.1.aarch64", "SUSE Enterprise Storage 7:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:busybox-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:busybox-static-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:busybox-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:busybox-static-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:busybox-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:busybox-static-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:busybox-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:busybox-static-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:busybox-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:busybox-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-1.34.1-4.9.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-static-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-static-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-static-1.34.1-4.9.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-1.34.1-4.9.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-static-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-static-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-static-1.34.1-4.9.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-1.34.1-4.9.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-static-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-static-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-static-1.34.1-4.9.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:busybox-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:busybox-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:busybox-1.34.1-4.9.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:busybox-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:busybox-static-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:busybox-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:busybox-static-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:busybox-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:busybox-1.34.1-4.9.1.x86_64", "SUSE Manager Proxy 4.1:busybox-1.34.1-4.9.1.x86_64", "SUSE Manager Proxy 4.1:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Manager Retail Branch Server 4.1:busybox-1.34.1-4.9.1.x86_64", "SUSE Manager Retail Branch Server 4.1:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Manager Server 4.1:busybox-1.34.1-4.9.1.ppc64le", "SUSE Manager Server 4.1:busybox-1.34.1-4.9.1.s390x", "SUSE Manager Server 4.1:busybox-1.34.1-4.9.1.x86_64", "SUSE Manager Server 4.1:busybox-static-1.34.1-4.9.1.ppc64le", "SUSE Manager Server 4.1:busybox-static-1.34.1-4.9.1.s390x", "SUSE Manager Server 4.1:busybox-static-1.34.1-4.9.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2016-2148", url: "https://www.suse.com/security/cve/CVE-2016-2148", }, { category: "external", summary: "SUSE Bug 970662 for CVE-2016-2148", url: "https://bugzilla.suse.com/970662", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Enterprise Storage 6:busybox-1.34.1-4.9.1.aarch64", "SUSE Enterprise Storage 6:busybox-1.34.1-4.9.1.x86_64", "SUSE Enterprise Storage 6:busybox-static-1.34.1-4.9.1.aarch64", "SUSE Enterprise Storage 6:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Enterprise Storage 7:busybox-1.34.1-4.9.1.aarch64", "SUSE Enterprise Storage 7:busybox-1.34.1-4.9.1.x86_64", "SUSE Enterprise Storage 7:busybox-static-1.34.1-4.9.1.aarch64", "SUSE Enterprise Storage 7:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:busybox-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:busybox-static-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:busybox-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:busybox-static-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:busybox-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:busybox-static-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:busybox-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:busybox-static-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:busybox-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:busybox-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-1.34.1-4.9.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-static-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-static-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-static-1.34.1-4.9.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-1.34.1-4.9.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-static-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-static-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-static-1.34.1-4.9.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-1.34.1-4.9.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-static-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-static-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-static-1.34.1-4.9.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:busybox-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:busybox-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:busybox-1.34.1-4.9.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:busybox-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:busybox-static-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:busybox-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:busybox-static-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:busybox-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:busybox-1.34.1-4.9.1.x86_64", "SUSE Manager Proxy 4.1:busybox-1.34.1-4.9.1.x86_64", "SUSE Manager Proxy 4.1:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Manager Retail Branch Server 4.1:busybox-1.34.1-4.9.1.x86_64", "SUSE Manager Retail Branch Server 4.1:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Manager Server 4.1:busybox-1.34.1-4.9.1.ppc64le", "SUSE Manager Server 4.1:busybox-1.34.1-4.9.1.s390x", "SUSE Manager Server 4.1:busybox-1.34.1-4.9.1.x86_64", "SUSE Manager Server 4.1:busybox-static-1.34.1-4.9.1.ppc64le", "SUSE Manager Server 4.1:busybox-static-1.34.1-4.9.1.s390x", "SUSE Manager Server 4.1:busybox-static-1.34.1-4.9.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 9.8, baseSeverity: "CRITICAL", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, products: [ "SUSE Enterprise Storage 6:busybox-1.34.1-4.9.1.aarch64", "SUSE Enterprise Storage 6:busybox-1.34.1-4.9.1.x86_64", "SUSE Enterprise Storage 6:busybox-static-1.34.1-4.9.1.aarch64", "SUSE Enterprise Storage 6:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Enterprise Storage 7:busybox-1.34.1-4.9.1.aarch64", "SUSE Enterprise Storage 7:busybox-1.34.1-4.9.1.x86_64", "SUSE Enterprise Storage 7:busybox-static-1.34.1-4.9.1.aarch64", "SUSE Enterprise Storage 7:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:busybox-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:busybox-static-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:busybox-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:busybox-static-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:busybox-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:busybox-static-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:busybox-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:busybox-static-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:busybox-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:busybox-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-1.34.1-4.9.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-static-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-static-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-static-1.34.1-4.9.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-1.34.1-4.9.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-static-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-static-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-static-1.34.1-4.9.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-1.34.1-4.9.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-static-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-static-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-static-1.34.1-4.9.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:busybox-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:busybox-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:busybox-1.34.1-4.9.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:busybox-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:busybox-static-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:busybox-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:busybox-static-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:busybox-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:busybox-1.34.1-4.9.1.x86_64", "SUSE Manager Proxy 4.1:busybox-1.34.1-4.9.1.x86_64", "SUSE Manager Proxy 4.1:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Manager Retail Branch Server 4.1:busybox-1.34.1-4.9.1.x86_64", "SUSE Manager Retail Branch Server 4.1:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Manager Server 4.1:busybox-1.34.1-4.9.1.ppc64le", "SUSE Manager Server 4.1:busybox-1.34.1-4.9.1.s390x", "SUSE Manager Server 4.1:busybox-1.34.1-4.9.1.x86_64", "SUSE Manager Server 4.1:busybox-static-1.34.1-4.9.1.ppc64le", "SUSE Manager Server 4.1:busybox-static-1.34.1-4.9.1.s390x", "SUSE Manager Server 4.1:busybox-static-1.34.1-4.9.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2022-01-20T09:05:15Z", details: "moderate", }, ], title: "CVE-2016-2148", }, { cve: "CVE-2016-6301", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2016-6301", }, ], notes: [ { category: "general", text: "The recv_and_process_client_pkt function in networking/ntpd.c in busybox allows remote attackers to cause a denial of service (CPU and bandwidth consumption) via a forged NTP packet, which triggers a communication loop.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Enterprise Storage 6:busybox-1.34.1-4.9.1.aarch64", "SUSE Enterprise Storage 6:busybox-1.34.1-4.9.1.x86_64", "SUSE Enterprise Storage 6:busybox-static-1.34.1-4.9.1.aarch64", "SUSE Enterprise Storage 6:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Enterprise Storage 7:busybox-1.34.1-4.9.1.aarch64", "SUSE Enterprise Storage 7:busybox-1.34.1-4.9.1.x86_64", "SUSE Enterprise Storage 7:busybox-static-1.34.1-4.9.1.aarch64", "SUSE Enterprise Storage 7:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:busybox-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:busybox-static-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:busybox-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:busybox-static-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:busybox-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:busybox-static-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:busybox-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:busybox-static-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:busybox-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:busybox-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-1.34.1-4.9.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-static-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-static-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-static-1.34.1-4.9.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-1.34.1-4.9.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-static-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-static-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-static-1.34.1-4.9.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-1.34.1-4.9.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-static-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-static-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-static-1.34.1-4.9.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:busybox-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:busybox-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:busybox-1.34.1-4.9.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:busybox-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:busybox-static-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:busybox-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:busybox-static-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:busybox-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:busybox-1.34.1-4.9.1.x86_64", "SUSE Manager Proxy 4.1:busybox-1.34.1-4.9.1.x86_64", "SUSE Manager Proxy 4.1:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Manager Retail Branch Server 4.1:busybox-1.34.1-4.9.1.x86_64", "SUSE Manager Retail Branch Server 4.1:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Manager Server 4.1:busybox-1.34.1-4.9.1.ppc64le", "SUSE Manager Server 4.1:busybox-1.34.1-4.9.1.s390x", "SUSE Manager Server 4.1:busybox-1.34.1-4.9.1.x86_64", "SUSE Manager Server 4.1:busybox-static-1.34.1-4.9.1.ppc64le", "SUSE Manager Server 4.1:busybox-static-1.34.1-4.9.1.s390x", "SUSE Manager Server 4.1:busybox-static-1.34.1-4.9.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2016-6301", url: "https://www.suse.com/security/cve/CVE-2016-6301", }, { category: "external", summary: "SUSE Bug 991940 for CVE-2016-6301", url: "https://bugzilla.suse.com/991940", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Enterprise Storage 6:busybox-1.34.1-4.9.1.aarch64", "SUSE Enterprise Storage 6:busybox-1.34.1-4.9.1.x86_64", "SUSE Enterprise Storage 6:busybox-static-1.34.1-4.9.1.aarch64", "SUSE Enterprise Storage 6:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Enterprise Storage 7:busybox-1.34.1-4.9.1.aarch64", "SUSE Enterprise Storage 7:busybox-1.34.1-4.9.1.x86_64", "SUSE Enterprise Storage 7:busybox-static-1.34.1-4.9.1.aarch64", "SUSE Enterprise Storage 7:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:busybox-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:busybox-static-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:busybox-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:busybox-static-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:busybox-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:busybox-static-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:busybox-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:busybox-static-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:busybox-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:busybox-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-1.34.1-4.9.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-static-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-static-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-static-1.34.1-4.9.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-1.34.1-4.9.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-static-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-static-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-static-1.34.1-4.9.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-1.34.1-4.9.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-static-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-static-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-static-1.34.1-4.9.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:busybox-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:busybox-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:busybox-1.34.1-4.9.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:busybox-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:busybox-static-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:busybox-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:busybox-static-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:busybox-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:busybox-1.34.1-4.9.1.x86_64", "SUSE Manager Proxy 4.1:busybox-1.34.1-4.9.1.x86_64", "SUSE Manager Proxy 4.1:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Manager Retail Branch Server 4.1:busybox-1.34.1-4.9.1.x86_64", "SUSE Manager Retail Branch Server 4.1:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Manager Server 4.1:busybox-1.34.1-4.9.1.ppc64le", "SUSE Manager Server 4.1:busybox-1.34.1-4.9.1.s390x", "SUSE Manager Server 4.1:busybox-1.34.1-4.9.1.x86_64", "SUSE Manager Server 4.1:busybox-static-1.34.1-4.9.1.ppc64le", "SUSE Manager Server 4.1:busybox-static-1.34.1-4.9.1.s390x", "SUSE Manager Server 4.1:busybox-static-1.34.1-4.9.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 7.5, baseSeverity: "HIGH", vectorString: "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", version: "3.0", }, products: [ "SUSE Enterprise Storage 6:busybox-1.34.1-4.9.1.aarch64", "SUSE Enterprise Storage 6:busybox-1.34.1-4.9.1.x86_64", "SUSE Enterprise Storage 6:busybox-static-1.34.1-4.9.1.aarch64", "SUSE Enterprise Storage 6:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Enterprise Storage 7:busybox-1.34.1-4.9.1.aarch64", "SUSE Enterprise Storage 7:busybox-1.34.1-4.9.1.x86_64", "SUSE Enterprise Storage 7:busybox-static-1.34.1-4.9.1.aarch64", "SUSE Enterprise Storage 7:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:busybox-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:busybox-static-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:busybox-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:busybox-static-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:busybox-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:busybox-static-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:busybox-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:busybox-static-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:busybox-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:busybox-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-1.34.1-4.9.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-static-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-static-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-static-1.34.1-4.9.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-1.34.1-4.9.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-static-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-static-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-static-1.34.1-4.9.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-1.34.1-4.9.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-static-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-static-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-static-1.34.1-4.9.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:busybox-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:busybox-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:busybox-1.34.1-4.9.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:busybox-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:busybox-static-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:busybox-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:busybox-static-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:busybox-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:busybox-1.34.1-4.9.1.x86_64", "SUSE Manager Proxy 4.1:busybox-1.34.1-4.9.1.x86_64", "SUSE Manager Proxy 4.1:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Manager Retail Branch Server 4.1:busybox-1.34.1-4.9.1.x86_64", "SUSE Manager Retail Branch Server 4.1:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Manager Server 4.1:busybox-1.34.1-4.9.1.ppc64le", "SUSE Manager Server 4.1:busybox-1.34.1-4.9.1.s390x", "SUSE Manager Server 4.1:busybox-1.34.1-4.9.1.x86_64", "SUSE Manager Server 4.1:busybox-static-1.34.1-4.9.1.ppc64le", "SUSE Manager Server 4.1:busybox-static-1.34.1-4.9.1.s390x", "SUSE Manager Server 4.1:busybox-static-1.34.1-4.9.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2022-01-20T09:05:15Z", details: "moderate", }, ], title: "CVE-2016-6301", }, { cve: "CVE-2017-15873", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2017-15873", }, ], notes: [ { category: "general", text: "The get_next_block function in archival/libarchive/decompress_bunzip2.c in BusyBox 1.27.2 has an Integer Overflow that may lead to a write access violation.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Enterprise Storage 6:busybox-1.34.1-4.9.1.aarch64", "SUSE Enterprise Storage 6:busybox-1.34.1-4.9.1.x86_64", "SUSE Enterprise Storage 6:busybox-static-1.34.1-4.9.1.aarch64", "SUSE Enterprise Storage 6:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Enterprise Storage 7:busybox-1.34.1-4.9.1.aarch64", "SUSE Enterprise Storage 7:busybox-1.34.1-4.9.1.x86_64", "SUSE Enterprise Storage 7:busybox-static-1.34.1-4.9.1.aarch64", "SUSE Enterprise Storage 7:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:busybox-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:busybox-static-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:busybox-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:busybox-static-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:busybox-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:busybox-static-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:busybox-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:busybox-static-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:busybox-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:busybox-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-1.34.1-4.9.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-static-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-static-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-static-1.34.1-4.9.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-1.34.1-4.9.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-static-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-static-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-static-1.34.1-4.9.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-1.34.1-4.9.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-static-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-static-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-static-1.34.1-4.9.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:busybox-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:busybox-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:busybox-1.34.1-4.9.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:busybox-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:busybox-static-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:busybox-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:busybox-static-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:busybox-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:busybox-1.34.1-4.9.1.x86_64", "SUSE Manager Proxy 4.1:busybox-1.34.1-4.9.1.x86_64", "SUSE Manager Proxy 4.1:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Manager Retail Branch Server 4.1:busybox-1.34.1-4.9.1.x86_64", "SUSE Manager Retail Branch Server 4.1:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Manager Server 4.1:busybox-1.34.1-4.9.1.ppc64le", "SUSE Manager Server 4.1:busybox-1.34.1-4.9.1.s390x", "SUSE Manager Server 4.1:busybox-1.34.1-4.9.1.x86_64", "SUSE Manager Server 4.1:busybox-static-1.34.1-4.9.1.ppc64le", "SUSE Manager Server 4.1:busybox-static-1.34.1-4.9.1.s390x", "SUSE Manager Server 4.1:busybox-static-1.34.1-4.9.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2017-15873", url: "https://www.suse.com/security/cve/CVE-2017-15873", }, { category: "external", summary: "SUSE Bug 1064976 for CVE-2017-15873", url: "https://bugzilla.suse.com/1064976", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Enterprise Storage 6:busybox-1.34.1-4.9.1.aarch64", "SUSE Enterprise Storage 6:busybox-1.34.1-4.9.1.x86_64", "SUSE Enterprise Storage 6:busybox-static-1.34.1-4.9.1.aarch64", "SUSE Enterprise Storage 6:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Enterprise Storage 7:busybox-1.34.1-4.9.1.aarch64", "SUSE Enterprise Storage 7:busybox-1.34.1-4.9.1.x86_64", "SUSE Enterprise Storage 7:busybox-static-1.34.1-4.9.1.aarch64", "SUSE Enterprise Storage 7:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:busybox-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:busybox-static-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:busybox-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:busybox-static-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:busybox-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:busybox-static-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:busybox-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:busybox-static-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:busybox-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:busybox-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-1.34.1-4.9.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-static-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-static-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-static-1.34.1-4.9.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-1.34.1-4.9.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-static-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-static-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-static-1.34.1-4.9.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-1.34.1-4.9.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-static-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-static-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-static-1.34.1-4.9.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:busybox-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:busybox-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:busybox-1.34.1-4.9.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:busybox-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:busybox-static-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:busybox-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:busybox-static-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:busybox-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:busybox-1.34.1-4.9.1.x86_64", "SUSE Manager Proxy 4.1:busybox-1.34.1-4.9.1.x86_64", "SUSE Manager Proxy 4.1:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Manager Retail Branch Server 4.1:busybox-1.34.1-4.9.1.x86_64", "SUSE Manager Retail Branch Server 4.1:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Manager Server 4.1:busybox-1.34.1-4.9.1.ppc64le", "SUSE Manager Server 4.1:busybox-1.34.1-4.9.1.s390x", "SUSE Manager Server 4.1:busybox-1.34.1-4.9.1.x86_64", "SUSE Manager Server 4.1:busybox-static-1.34.1-4.9.1.ppc64le", "SUSE Manager Server 4.1:busybox-static-1.34.1-4.9.1.s390x", "SUSE Manager Server 4.1:busybox-static-1.34.1-4.9.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 7.8, baseSeverity: "HIGH", vectorString: "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", version: "3.0", }, products: [ "SUSE Enterprise Storage 6:busybox-1.34.1-4.9.1.aarch64", "SUSE Enterprise Storage 6:busybox-1.34.1-4.9.1.x86_64", "SUSE Enterprise Storage 6:busybox-static-1.34.1-4.9.1.aarch64", "SUSE Enterprise Storage 6:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Enterprise Storage 7:busybox-1.34.1-4.9.1.aarch64", "SUSE Enterprise Storage 7:busybox-1.34.1-4.9.1.x86_64", "SUSE Enterprise Storage 7:busybox-static-1.34.1-4.9.1.aarch64", "SUSE Enterprise Storage 7:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:busybox-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:busybox-static-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:busybox-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:busybox-static-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:busybox-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:busybox-static-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:busybox-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:busybox-static-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:busybox-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:busybox-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-1.34.1-4.9.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-static-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-static-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-static-1.34.1-4.9.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-1.34.1-4.9.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-static-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-static-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-static-1.34.1-4.9.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-1.34.1-4.9.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-static-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-static-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-static-1.34.1-4.9.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:busybox-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:busybox-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:busybox-1.34.1-4.9.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:busybox-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:busybox-static-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:busybox-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:busybox-static-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:busybox-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:busybox-1.34.1-4.9.1.x86_64", "SUSE Manager Proxy 4.1:busybox-1.34.1-4.9.1.x86_64", "SUSE Manager Proxy 4.1:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Manager Retail Branch Server 4.1:busybox-1.34.1-4.9.1.x86_64", "SUSE Manager Retail Branch Server 4.1:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Manager Server 4.1:busybox-1.34.1-4.9.1.ppc64le", "SUSE Manager Server 4.1:busybox-1.34.1-4.9.1.s390x", "SUSE Manager Server 4.1:busybox-1.34.1-4.9.1.x86_64", "SUSE Manager Server 4.1:busybox-static-1.34.1-4.9.1.ppc64le", "SUSE Manager Server 4.1:busybox-static-1.34.1-4.9.1.s390x", "SUSE Manager Server 4.1:busybox-static-1.34.1-4.9.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2022-01-20T09:05:15Z", details: "moderate", }, ], title: "CVE-2017-15873", }, { cve: "CVE-2017-15874", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2017-15874", }, ], notes: [ { category: "general", text: "archival/libarchive/decompress_unlzma.c in BusyBox 1.27.2 has an Integer Underflow that leads to a read access violation.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Enterprise Storage 6:busybox-1.34.1-4.9.1.aarch64", "SUSE Enterprise Storage 6:busybox-1.34.1-4.9.1.x86_64", "SUSE Enterprise Storage 6:busybox-static-1.34.1-4.9.1.aarch64", "SUSE Enterprise Storage 6:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Enterprise Storage 7:busybox-1.34.1-4.9.1.aarch64", "SUSE Enterprise Storage 7:busybox-1.34.1-4.9.1.x86_64", "SUSE Enterprise Storage 7:busybox-static-1.34.1-4.9.1.aarch64", "SUSE Enterprise Storage 7:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:busybox-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:busybox-static-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:busybox-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:busybox-static-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:busybox-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:busybox-static-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:busybox-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:busybox-static-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:busybox-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:busybox-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-1.34.1-4.9.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-static-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-static-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-static-1.34.1-4.9.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-1.34.1-4.9.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-static-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-static-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-static-1.34.1-4.9.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-1.34.1-4.9.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-static-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-static-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-static-1.34.1-4.9.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:busybox-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:busybox-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:busybox-1.34.1-4.9.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:busybox-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:busybox-static-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:busybox-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:busybox-static-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:busybox-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:busybox-1.34.1-4.9.1.x86_64", "SUSE Manager Proxy 4.1:busybox-1.34.1-4.9.1.x86_64", "SUSE Manager Proxy 4.1:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Manager Retail Branch Server 4.1:busybox-1.34.1-4.9.1.x86_64", "SUSE Manager Retail Branch Server 4.1:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Manager Server 4.1:busybox-1.34.1-4.9.1.ppc64le", "SUSE Manager Server 4.1:busybox-1.34.1-4.9.1.s390x", "SUSE Manager Server 4.1:busybox-1.34.1-4.9.1.x86_64", "SUSE Manager Server 4.1:busybox-static-1.34.1-4.9.1.ppc64le", "SUSE Manager Server 4.1:busybox-static-1.34.1-4.9.1.s390x", "SUSE Manager Server 4.1:busybox-static-1.34.1-4.9.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2017-15874", url: "https://www.suse.com/security/cve/CVE-2017-15874", }, { category: "external", summary: "SUSE Bug 1064978 for CVE-2017-15874", url: "https://bugzilla.suse.com/1064978", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Enterprise Storage 6:busybox-1.34.1-4.9.1.aarch64", "SUSE Enterprise Storage 6:busybox-1.34.1-4.9.1.x86_64", "SUSE Enterprise Storage 6:busybox-static-1.34.1-4.9.1.aarch64", "SUSE Enterprise Storage 6:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Enterprise Storage 7:busybox-1.34.1-4.9.1.aarch64", "SUSE Enterprise Storage 7:busybox-1.34.1-4.9.1.x86_64", "SUSE Enterprise Storage 7:busybox-static-1.34.1-4.9.1.aarch64", "SUSE Enterprise Storage 7:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:busybox-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:busybox-static-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:busybox-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:busybox-static-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:busybox-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:busybox-static-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:busybox-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:busybox-static-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:busybox-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:busybox-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-1.34.1-4.9.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-static-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-static-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-static-1.34.1-4.9.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-1.34.1-4.9.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-static-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-static-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-static-1.34.1-4.9.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-1.34.1-4.9.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-static-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-static-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-static-1.34.1-4.9.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:busybox-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:busybox-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:busybox-1.34.1-4.9.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:busybox-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:busybox-static-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:busybox-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:busybox-static-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:busybox-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:busybox-1.34.1-4.9.1.x86_64", "SUSE Manager Proxy 4.1:busybox-1.34.1-4.9.1.x86_64", "SUSE Manager Proxy 4.1:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Manager Retail Branch Server 4.1:busybox-1.34.1-4.9.1.x86_64", "SUSE Manager Retail Branch Server 4.1:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Manager Server 4.1:busybox-1.34.1-4.9.1.ppc64le", "SUSE Manager Server 4.1:busybox-1.34.1-4.9.1.s390x", "SUSE Manager Server 4.1:busybox-1.34.1-4.9.1.x86_64", "SUSE Manager Server 4.1:busybox-static-1.34.1-4.9.1.ppc64le", "SUSE Manager Server 4.1:busybox-static-1.34.1-4.9.1.s390x", "SUSE Manager Server 4.1:busybox-static-1.34.1-4.9.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 3.3, baseSeverity: "LOW", vectorString: "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L", version: "3.0", }, products: [ "SUSE Enterprise Storage 6:busybox-1.34.1-4.9.1.aarch64", "SUSE Enterprise Storage 6:busybox-1.34.1-4.9.1.x86_64", "SUSE Enterprise Storage 6:busybox-static-1.34.1-4.9.1.aarch64", "SUSE Enterprise Storage 6:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Enterprise Storage 7:busybox-1.34.1-4.9.1.aarch64", "SUSE Enterprise Storage 7:busybox-1.34.1-4.9.1.x86_64", "SUSE Enterprise Storage 7:busybox-static-1.34.1-4.9.1.aarch64", "SUSE Enterprise Storage 7:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:busybox-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:busybox-static-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:busybox-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:busybox-static-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:busybox-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:busybox-static-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:busybox-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:busybox-static-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:busybox-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:busybox-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-1.34.1-4.9.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-static-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-static-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-static-1.34.1-4.9.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-1.34.1-4.9.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-static-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-static-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-static-1.34.1-4.9.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-1.34.1-4.9.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-static-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-static-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-static-1.34.1-4.9.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:busybox-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:busybox-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:busybox-1.34.1-4.9.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:busybox-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:busybox-static-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:busybox-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:busybox-static-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:busybox-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:busybox-1.34.1-4.9.1.x86_64", "SUSE Manager Proxy 4.1:busybox-1.34.1-4.9.1.x86_64", "SUSE Manager Proxy 4.1:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Manager Retail Branch Server 4.1:busybox-1.34.1-4.9.1.x86_64", "SUSE Manager Retail Branch Server 4.1:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Manager Server 4.1:busybox-1.34.1-4.9.1.ppc64le", "SUSE Manager Server 4.1:busybox-1.34.1-4.9.1.s390x", "SUSE Manager Server 4.1:busybox-1.34.1-4.9.1.x86_64", "SUSE Manager Server 4.1:busybox-static-1.34.1-4.9.1.ppc64le", "SUSE Manager Server 4.1:busybox-static-1.34.1-4.9.1.s390x", "SUSE Manager Server 4.1:busybox-static-1.34.1-4.9.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2022-01-20T09:05:15Z", details: "low", }, ], title: "CVE-2017-15874", }, { cve: "CVE-2017-16544", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2017-16544", }, ], notes: [ { category: "general", text: "In the add_match function in libbb/lineedit.c in BusyBox through 1.27.2, the tab autocomplete feature of the shell, used to get a list of filenames in a directory, does not sanitize filenames and results in executing any escape sequence in the terminal. This could potentially result in code execution, arbitrary file writes, or other attacks.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Enterprise Storage 6:busybox-1.34.1-4.9.1.aarch64", "SUSE Enterprise Storage 6:busybox-1.34.1-4.9.1.x86_64", "SUSE Enterprise Storage 6:busybox-static-1.34.1-4.9.1.aarch64", "SUSE Enterprise Storage 6:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Enterprise Storage 7:busybox-1.34.1-4.9.1.aarch64", "SUSE Enterprise Storage 7:busybox-1.34.1-4.9.1.x86_64", "SUSE Enterprise Storage 7:busybox-static-1.34.1-4.9.1.aarch64", "SUSE Enterprise Storage 7:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:busybox-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:busybox-static-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:busybox-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:busybox-static-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:busybox-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:busybox-static-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:busybox-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:busybox-static-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:busybox-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:busybox-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-1.34.1-4.9.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-static-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-static-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-static-1.34.1-4.9.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-1.34.1-4.9.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-static-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-static-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-static-1.34.1-4.9.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-1.34.1-4.9.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-static-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-static-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-static-1.34.1-4.9.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:busybox-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:busybox-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:busybox-1.34.1-4.9.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:busybox-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:busybox-static-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:busybox-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:busybox-static-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:busybox-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:busybox-1.34.1-4.9.1.x86_64", "SUSE Manager Proxy 4.1:busybox-1.34.1-4.9.1.x86_64", "SUSE Manager Proxy 4.1:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Manager Retail Branch Server 4.1:busybox-1.34.1-4.9.1.x86_64", "SUSE Manager Retail Branch Server 4.1:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Manager Server 4.1:busybox-1.34.1-4.9.1.ppc64le", "SUSE Manager Server 4.1:busybox-1.34.1-4.9.1.s390x", "SUSE Manager Server 4.1:busybox-1.34.1-4.9.1.x86_64", "SUSE Manager Server 4.1:busybox-static-1.34.1-4.9.1.ppc64le", "SUSE Manager Server 4.1:busybox-static-1.34.1-4.9.1.s390x", "SUSE Manager Server 4.1:busybox-static-1.34.1-4.9.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2017-16544", url: "https://www.suse.com/security/cve/CVE-2017-16544", }, { category: "external", summary: "SUSE Bug 1069412 for CVE-2017-16544", url: "https://bugzilla.suse.com/1069412", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Enterprise Storage 6:busybox-1.34.1-4.9.1.aarch64", "SUSE Enterprise Storage 6:busybox-1.34.1-4.9.1.x86_64", "SUSE Enterprise Storage 6:busybox-static-1.34.1-4.9.1.aarch64", "SUSE Enterprise Storage 6:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Enterprise Storage 7:busybox-1.34.1-4.9.1.aarch64", "SUSE Enterprise Storage 7:busybox-1.34.1-4.9.1.x86_64", "SUSE Enterprise Storage 7:busybox-static-1.34.1-4.9.1.aarch64", "SUSE Enterprise Storage 7:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:busybox-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:busybox-static-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:busybox-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:busybox-static-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:busybox-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:busybox-static-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:busybox-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:busybox-static-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:busybox-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:busybox-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-1.34.1-4.9.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-static-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-static-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-static-1.34.1-4.9.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-1.34.1-4.9.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-static-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-static-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-static-1.34.1-4.9.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-1.34.1-4.9.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-static-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-static-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-static-1.34.1-4.9.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:busybox-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:busybox-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:busybox-1.34.1-4.9.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:busybox-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:busybox-static-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:busybox-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:busybox-static-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:busybox-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:busybox-1.34.1-4.9.1.x86_64", "SUSE Manager Proxy 4.1:busybox-1.34.1-4.9.1.x86_64", "SUSE Manager Proxy 4.1:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Manager Retail Branch Server 4.1:busybox-1.34.1-4.9.1.x86_64", "SUSE Manager Retail Branch Server 4.1:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Manager Server 4.1:busybox-1.34.1-4.9.1.ppc64le", "SUSE Manager Server 4.1:busybox-1.34.1-4.9.1.s390x", "SUSE Manager Server 4.1:busybox-1.34.1-4.9.1.x86_64", "SUSE Manager Server 4.1:busybox-static-1.34.1-4.9.1.ppc64le", "SUSE Manager Server 4.1:busybox-static-1.34.1-4.9.1.s390x", "SUSE Manager Server 4.1:busybox-static-1.34.1-4.9.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 7.8, baseSeverity: "HIGH", vectorString: "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", version: "3.0", }, products: [ "SUSE Enterprise Storage 6:busybox-1.34.1-4.9.1.aarch64", "SUSE Enterprise Storage 6:busybox-1.34.1-4.9.1.x86_64", "SUSE Enterprise Storage 6:busybox-static-1.34.1-4.9.1.aarch64", "SUSE Enterprise Storage 6:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Enterprise Storage 7:busybox-1.34.1-4.9.1.aarch64", "SUSE Enterprise Storage 7:busybox-1.34.1-4.9.1.x86_64", "SUSE Enterprise Storage 7:busybox-static-1.34.1-4.9.1.aarch64", "SUSE Enterprise Storage 7:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:busybox-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:busybox-static-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:busybox-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:busybox-static-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:busybox-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:busybox-static-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:busybox-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:busybox-static-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:busybox-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:busybox-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-1.34.1-4.9.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-static-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-static-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-static-1.34.1-4.9.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-1.34.1-4.9.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-static-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-static-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-static-1.34.1-4.9.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-1.34.1-4.9.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-static-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-static-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-static-1.34.1-4.9.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:busybox-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:busybox-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:busybox-1.34.1-4.9.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:busybox-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:busybox-static-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:busybox-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:busybox-static-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:busybox-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:busybox-1.34.1-4.9.1.x86_64", "SUSE Manager Proxy 4.1:busybox-1.34.1-4.9.1.x86_64", "SUSE Manager Proxy 4.1:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Manager Retail Branch Server 4.1:busybox-1.34.1-4.9.1.x86_64", "SUSE Manager Retail Branch Server 4.1:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Manager Server 4.1:busybox-1.34.1-4.9.1.ppc64le", "SUSE Manager Server 4.1:busybox-1.34.1-4.9.1.s390x", "SUSE Manager Server 4.1:busybox-1.34.1-4.9.1.x86_64", "SUSE Manager Server 4.1:busybox-static-1.34.1-4.9.1.ppc64le", "SUSE Manager Server 4.1:busybox-static-1.34.1-4.9.1.s390x", "SUSE Manager Server 4.1:busybox-static-1.34.1-4.9.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2022-01-20T09:05:15Z", details: "important", }, ], title: "CVE-2017-16544", }, { cve: "CVE-2018-1000500", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2018-1000500", }, ], notes: [ { category: "general", text: "Busybox contains a Missing SSL certificate validation vulnerability in The \"busybox wget\" applet that can result in arbitrary code execution. This attack appear to be exploitable via Simply download any file over HTTPS using \"busybox wget https://compromised-domain.com/important-file\".", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Enterprise Storage 6:busybox-1.34.1-4.9.1.aarch64", "SUSE Enterprise Storage 6:busybox-1.34.1-4.9.1.x86_64", "SUSE Enterprise Storage 6:busybox-static-1.34.1-4.9.1.aarch64", "SUSE Enterprise Storage 6:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Enterprise Storage 7:busybox-1.34.1-4.9.1.aarch64", "SUSE Enterprise Storage 7:busybox-1.34.1-4.9.1.x86_64", "SUSE Enterprise Storage 7:busybox-static-1.34.1-4.9.1.aarch64", "SUSE Enterprise Storage 7:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:busybox-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:busybox-static-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:busybox-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:busybox-static-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:busybox-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:busybox-static-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:busybox-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:busybox-static-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:busybox-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:busybox-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-1.34.1-4.9.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-static-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-static-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-static-1.34.1-4.9.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-1.34.1-4.9.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-static-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-static-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-static-1.34.1-4.9.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-1.34.1-4.9.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-static-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-static-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-static-1.34.1-4.9.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:busybox-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:busybox-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:busybox-1.34.1-4.9.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:busybox-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:busybox-static-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:busybox-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:busybox-static-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:busybox-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:busybox-1.34.1-4.9.1.x86_64", "SUSE Manager Proxy 4.1:busybox-1.34.1-4.9.1.x86_64", "SUSE Manager Proxy 4.1:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Manager Retail Branch Server 4.1:busybox-1.34.1-4.9.1.x86_64", "SUSE Manager Retail Branch Server 4.1:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Manager Server 4.1:busybox-1.34.1-4.9.1.ppc64le", "SUSE Manager Server 4.1:busybox-1.34.1-4.9.1.s390x", "SUSE Manager Server 4.1:busybox-1.34.1-4.9.1.x86_64", "SUSE Manager Server 4.1:busybox-static-1.34.1-4.9.1.ppc64le", "SUSE Manager Server 4.1:busybox-static-1.34.1-4.9.1.s390x", "SUSE Manager Server 4.1:busybox-static-1.34.1-4.9.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2018-1000500", url: "https://www.suse.com/security/cve/CVE-2018-1000500", }, { category: "external", summary: "SUSE Bug 1099263 for CVE-2018-1000500", url: "https://bugzilla.suse.com/1099263", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Enterprise Storage 6:busybox-1.34.1-4.9.1.aarch64", "SUSE Enterprise Storage 6:busybox-1.34.1-4.9.1.x86_64", "SUSE Enterprise Storage 6:busybox-static-1.34.1-4.9.1.aarch64", "SUSE Enterprise Storage 6:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Enterprise Storage 7:busybox-1.34.1-4.9.1.aarch64", "SUSE Enterprise Storage 7:busybox-1.34.1-4.9.1.x86_64", "SUSE Enterprise Storage 7:busybox-static-1.34.1-4.9.1.aarch64", "SUSE Enterprise Storage 7:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:busybox-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:busybox-static-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:busybox-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:busybox-static-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:busybox-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:busybox-static-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:busybox-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:busybox-static-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:busybox-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:busybox-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-1.34.1-4.9.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-static-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-static-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-static-1.34.1-4.9.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-1.34.1-4.9.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-static-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-static-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-static-1.34.1-4.9.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-1.34.1-4.9.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-static-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-static-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-static-1.34.1-4.9.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:busybox-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:busybox-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:busybox-1.34.1-4.9.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:busybox-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:busybox-static-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:busybox-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:busybox-static-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:busybox-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:busybox-1.34.1-4.9.1.x86_64", "SUSE Manager Proxy 4.1:busybox-1.34.1-4.9.1.x86_64", "SUSE Manager Proxy 4.1:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Manager Retail Branch Server 4.1:busybox-1.34.1-4.9.1.x86_64", "SUSE Manager Retail Branch Server 4.1:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Manager Server 4.1:busybox-1.34.1-4.9.1.ppc64le", "SUSE Manager Server 4.1:busybox-1.34.1-4.9.1.s390x", "SUSE Manager Server 4.1:busybox-1.34.1-4.9.1.x86_64", "SUSE Manager Server 4.1:busybox-static-1.34.1-4.9.1.ppc64le", "SUSE Manager Server 4.1:busybox-static-1.34.1-4.9.1.s390x", "SUSE Manager Server 4.1:busybox-static-1.34.1-4.9.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 7.5, baseSeverity: "HIGH", vectorString: "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N", version: "3.0", }, products: [ "SUSE Enterprise Storage 6:busybox-1.34.1-4.9.1.aarch64", "SUSE Enterprise Storage 6:busybox-1.34.1-4.9.1.x86_64", "SUSE Enterprise Storage 6:busybox-static-1.34.1-4.9.1.aarch64", "SUSE Enterprise Storage 6:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Enterprise Storage 7:busybox-1.34.1-4.9.1.aarch64", "SUSE Enterprise Storage 7:busybox-1.34.1-4.9.1.x86_64", "SUSE Enterprise Storage 7:busybox-static-1.34.1-4.9.1.aarch64", "SUSE Enterprise Storage 7:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:busybox-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:busybox-static-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:busybox-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:busybox-static-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:busybox-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:busybox-static-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:busybox-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:busybox-static-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:busybox-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:busybox-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-1.34.1-4.9.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-static-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-static-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-static-1.34.1-4.9.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-1.34.1-4.9.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-static-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-static-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-static-1.34.1-4.9.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-1.34.1-4.9.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-static-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-static-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-static-1.34.1-4.9.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:busybox-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:busybox-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:busybox-1.34.1-4.9.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:busybox-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:busybox-static-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:busybox-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:busybox-static-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:busybox-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:busybox-1.34.1-4.9.1.x86_64", "SUSE Manager Proxy 4.1:busybox-1.34.1-4.9.1.x86_64", "SUSE Manager Proxy 4.1:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Manager Retail Branch Server 4.1:busybox-1.34.1-4.9.1.x86_64", "SUSE Manager Retail Branch Server 4.1:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Manager Server 4.1:busybox-1.34.1-4.9.1.ppc64le", "SUSE Manager Server 4.1:busybox-1.34.1-4.9.1.s390x", "SUSE Manager Server 4.1:busybox-1.34.1-4.9.1.x86_64", "SUSE Manager Server 4.1:busybox-static-1.34.1-4.9.1.ppc64le", "SUSE Manager Server 4.1:busybox-static-1.34.1-4.9.1.s390x", "SUSE Manager Server 4.1:busybox-static-1.34.1-4.9.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2022-01-20T09:05:15Z", details: "important", }, ], title: "CVE-2018-1000500", }, { cve: "CVE-2018-1000517", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2018-1000517", }, ], notes: [ { category: "general", text: "BusyBox project BusyBox wget version prior to commit 8e2174e9bd836e53c8b9c6e00d1bc6e2a718686e contains a Buffer Overflow vulnerability in Busybox wget that can result in heap buffer overflow. This attack appear to be exploitable via network connectivity. This vulnerability appears to have been fixed in after commit 8e2174e9bd836e53c8b9c6e00d1bc6e2a718686e.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Enterprise Storage 6:busybox-1.34.1-4.9.1.aarch64", "SUSE Enterprise Storage 6:busybox-1.34.1-4.9.1.x86_64", "SUSE Enterprise Storage 6:busybox-static-1.34.1-4.9.1.aarch64", "SUSE Enterprise Storage 6:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Enterprise Storage 7:busybox-1.34.1-4.9.1.aarch64", "SUSE Enterprise Storage 7:busybox-1.34.1-4.9.1.x86_64", "SUSE Enterprise Storage 7:busybox-static-1.34.1-4.9.1.aarch64", "SUSE Enterprise Storage 7:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:busybox-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:busybox-static-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:busybox-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:busybox-static-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:busybox-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:busybox-static-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:busybox-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:busybox-static-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:busybox-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:busybox-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-1.34.1-4.9.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-static-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-static-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-static-1.34.1-4.9.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-1.34.1-4.9.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-static-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-static-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-static-1.34.1-4.9.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-1.34.1-4.9.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-static-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-static-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-static-1.34.1-4.9.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:busybox-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:busybox-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:busybox-1.34.1-4.9.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:busybox-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:busybox-static-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:busybox-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:busybox-static-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:busybox-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:busybox-1.34.1-4.9.1.x86_64", "SUSE Manager Proxy 4.1:busybox-1.34.1-4.9.1.x86_64", "SUSE Manager Proxy 4.1:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Manager Retail Branch Server 4.1:busybox-1.34.1-4.9.1.x86_64", "SUSE Manager Retail Branch Server 4.1:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Manager Server 4.1:busybox-1.34.1-4.9.1.ppc64le", "SUSE Manager Server 4.1:busybox-1.34.1-4.9.1.s390x", "SUSE Manager Server 4.1:busybox-1.34.1-4.9.1.x86_64", "SUSE Manager Server 4.1:busybox-static-1.34.1-4.9.1.ppc64le", "SUSE Manager Server 4.1:busybox-static-1.34.1-4.9.1.s390x", "SUSE Manager Server 4.1:busybox-static-1.34.1-4.9.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2018-1000517", url: "https://www.suse.com/security/cve/CVE-2018-1000517", }, { category: "external", summary: "SUSE Bug 1099260 for CVE-2018-1000517", url: "https://bugzilla.suse.com/1099260", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Enterprise Storage 6:busybox-1.34.1-4.9.1.aarch64", "SUSE Enterprise Storage 6:busybox-1.34.1-4.9.1.x86_64", "SUSE Enterprise Storage 6:busybox-static-1.34.1-4.9.1.aarch64", "SUSE Enterprise Storage 6:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Enterprise Storage 7:busybox-1.34.1-4.9.1.aarch64", "SUSE Enterprise Storage 7:busybox-1.34.1-4.9.1.x86_64", "SUSE Enterprise Storage 7:busybox-static-1.34.1-4.9.1.aarch64", "SUSE Enterprise Storage 7:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:busybox-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:busybox-static-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:busybox-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:busybox-static-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:busybox-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:busybox-static-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:busybox-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:busybox-static-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:busybox-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:busybox-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-1.34.1-4.9.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-static-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-static-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-static-1.34.1-4.9.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-1.34.1-4.9.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-static-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-static-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-static-1.34.1-4.9.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-1.34.1-4.9.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-static-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-static-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-static-1.34.1-4.9.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:busybox-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:busybox-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:busybox-1.34.1-4.9.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:busybox-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:busybox-static-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:busybox-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:busybox-static-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:busybox-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:busybox-1.34.1-4.9.1.x86_64", "SUSE Manager Proxy 4.1:busybox-1.34.1-4.9.1.x86_64", "SUSE Manager Proxy 4.1:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Manager Retail Branch Server 4.1:busybox-1.34.1-4.9.1.x86_64", "SUSE Manager Retail Branch Server 4.1:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Manager Server 4.1:busybox-1.34.1-4.9.1.ppc64le", "SUSE Manager Server 4.1:busybox-1.34.1-4.9.1.s390x", "SUSE Manager Server 4.1:busybox-1.34.1-4.9.1.x86_64", "SUSE Manager Server 4.1:busybox-static-1.34.1-4.9.1.ppc64le", "SUSE Manager Server 4.1:busybox-static-1.34.1-4.9.1.s390x", "SUSE Manager Server 4.1:busybox-static-1.34.1-4.9.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.6, baseSeverity: "MEDIUM", vectorString: "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L", version: "3.0", }, products: [ "SUSE Enterprise Storage 6:busybox-1.34.1-4.9.1.aarch64", "SUSE Enterprise Storage 6:busybox-1.34.1-4.9.1.x86_64", "SUSE Enterprise Storage 6:busybox-static-1.34.1-4.9.1.aarch64", "SUSE Enterprise Storage 6:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Enterprise Storage 7:busybox-1.34.1-4.9.1.aarch64", "SUSE Enterprise Storage 7:busybox-1.34.1-4.9.1.x86_64", "SUSE Enterprise Storage 7:busybox-static-1.34.1-4.9.1.aarch64", "SUSE Enterprise Storage 7:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:busybox-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:busybox-static-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:busybox-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:busybox-static-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:busybox-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:busybox-static-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:busybox-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:busybox-static-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:busybox-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:busybox-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-1.34.1-4.9.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-static-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-static-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-static-1.34.1-4.9.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-1.34.1-4.9.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-static-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-static-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-static-1.34.1-4.9.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-1.34.1-4.9.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-static-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-static-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-static-1.34.1-4.9.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:busybox-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:busybox-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:busybox-1.34.1-4.9.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:busybox-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:busybox-static-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:busybox-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:busybox-static-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:busybox-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:busybox-1.34.1-4.9.1.x86_64", "SUSE Manager Proxy 4.1:busybox-1.34.1-4.9.1.x86_64", "SUSE Manager Proxy 4.1:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Manager Retail Branch Server 4.1:busybox-1.34.1-4.9.1.x86_64", "SUSE Manager Retail Branch Server 4.1:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Manager Server 4.1:busybox-1.34.1-4.9.1.ppc64le", "SUSE Manager Server 4.1:busybox-1.34.1-4.9.1.s390x", "SUSE Manager Server 4.1:busybox-1.34.1-4.9.1.x86_64", "SUSE Manager Server 4.1:busybox-static-1.34.1-4.9.1.ppc64le", "SUSE Manager Server 4.1:busybox-static-1.34.1-4.9.1.s390x", "SUSE Manager Server 4.1:busybox-static-1.34.1-4.9.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2022-01-20T09:05:15Z", details: "important", }, ], title: "CVE-2018-1000517", }, { cve: "CVE-2018-20679", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2018-20679", }, ], notes: [ { category: "general", text: "An issue was discovered in BusyBox before 1.30.0. An out of bounds read in udhcp components (consumed by the DHCP server, client, and relay) allows a remote attacker to leak sensitive information from the stack by sending a crafted DHCP message. This is related to verification in udhcp_get_option() in networking/udhcp/common.c that 4-byte options are indeed 4 bytes.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Enterprise Storage 6:busybox-1.34.1-4.9.1.aarch64", "SUSE Enterprise Storage 6:busybox-1.34.1-4.9.1.x86_64", "SUSE Enterprise Storage 6:busybox-static-1.34.1-4.9.1.aarch64", "SUSE Enterprise Storage 6:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Enterprise Storage 7:busybox-1.34.1-4.9.1.aarch64", "SUSE Enterprise Storage 7:busybox-1.34.1-4.9.1.x86_64", "SUSE Enterprise Storage 7:busybox-static-1.34.1-4.9.1.aarch64", "SUSE Enterprise Storage 7:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:busybox-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:busybox-static-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:busybox-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:busybox-static-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:busybox-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:busybox-static-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:busybox-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:busybox-static-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:busybox-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:busybox-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-1.34.1-4.9.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-static-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-static-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-static-1.34.1-4.9.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-1.34.1-4.9.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-static-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-static-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-static-1.34.1-4.9.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-1.34.1-4.9.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-static-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-static-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-static-1.34.1-4.9.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:busybox-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:busybox-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:busybox-1.34.1-4.9.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:busybox-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:busybox-static-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:busybox-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:busybox-static-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:busybox-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:busybox-1.34.1-4.9.1.x86_64", "SUSE Manager Proxy 4.1:busybox-1.34.1-4.9.1.x86_64", "SUSE Manager Proxy 4.1:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Manager Retail Branch Server 4.1:busybox-1.34.1-4.9.1.x86_64", "SUSE Manager Retail Branch Server 4.1:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Manager Server 4.1:busybox-1.34.1-4.9.1.ppc64le", "SUSE Manager Server 4.1:busybox-1.34.1-4.9.1.s390x", "SUSE Manager Server 4.1:busybox-1.34.1-4.9.1.x86_64", "SUSE Manager Server 4.1:busybox-static-1.34.1-4.9.1.ppc64le", "SUSE Manager Server 4.1:busybox-static-1.34.1-4.9.1.s390x", "SUSE Manager Server 4.1:busybox-static-1.34.1-4.9.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2018-20679", url: "https://www.suse.com/security/cve/CVE-2018-20679", }, { category: "external", summary: "SUSE Bug 1121426 for CVE-2018-20679", url: "https://bugzilla.suse.com/1121426", }, { category: "external", summary: "SUSE Bug 1121428 for CVE-2018-20679", url: "https://bugzilla.suse.com/1121428", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Enterprise Storage 6:busybox-1.34.1-4.9.1.aarch64", "SUSE Enterprise Storage 6:busybox-1.34.1-4.9.1.x86_64", "SUSE Enterprise Storage 6:busybox-static-1.34.1-4.9.1.aarch64", "SUSE Enterprise Storage 6:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Enterprise Storage 7:busybox-1.34.1-4.9.1.aarch64", "SUSE Enterprise Storage 7:busybox-1.34.1-4.9.1.x86_64", "SUSE Enterprise Storage 7:busybox-static-1.34.1-4.9.1.aarch64", "SUSE Enterprise Storage 7:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:busybox-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:busybox-static-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:busybox-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:busybox-static-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:busybox-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:busybox-static-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:busybox-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:busybox-static-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:busybox-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:busybox-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-1.34.1-4.9.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-static-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-static-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-static-1.34.1-4.9.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-1.34.1-4.9.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-static-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-static-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-static-1.34.1-4.9.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-1.34.1-4.9.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-static-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-static-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-static-1.34.1-4.9.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:busybox-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:busybox-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:busybox-1.34.1-4.9.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:busybox-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:busybox-static-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:busybox-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:busybox-static-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:busybox-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:busybox-1.34.1-4.9.1.x86_64", "SUSE Manager Proxy 4.1:busybox-1.34.1-4.9.1.x86_64", "SUSE Manager Proxy 4.1:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Manager Retail Branch Server 4.1:busybox-1.34.1-4.9.1.x86_64", "SUSE Manager Retail Branch Server 4.1:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Manager Server 4.1:busybox-1.34.1-4.9.1.ppc64le", "SUSE Manager Server 4.1:busybox-1.34.1-4.9.1.s390x", "SUSE Manager Server 4.1:busybox-1.34.1-4.9.1.x86_64", "SUSE Manager Server 4.1:busybox-static-1.34.1-4.9.1.ppc64le", "SUSE Manager Server 4.1:busybox-static-1.34.1-4.9.1.s390x", "SUSE Manager Server 4.1:busybox-static-1.34.1-4.9.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.3, baseSeverity: "MEDIUM", vectorString: "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N", version: "3.0", }, products: [ "SUSE Enterprise Storage 6:busybox-1.34.1-4.9.1.aarch64", "SUSE Enterprise Storage 6:busybox-1.34.1-4.9.1.x86_64", "SUSE Enterprise Storage 6:busybox-static-1.34.1-4.9.1.aarch64", "SUSE Enterprise Storage 6:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Enterprise Storage 7:busybox-1.34.1-4.9.1.aarch64", "SUSE Enterprise Storage 7:busybox-1.34.1-4.9.1.x86_64", "SUSE Enterprise Storage 7:busybox-static-1.34.1-4.9.1.aarch64", "SUSE Enterprise Storage 7:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:busybox-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:busybox-static-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:busybox-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:busybox-static-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:busybox-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:busybox-static-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:busybox-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:busybox-static-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:busybox-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:busybox-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-1.34.1-4.9.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-static-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-static-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-static-1.34.1-4.9.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-1.34.1-4.9.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-static-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-static-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-static-1.34.1-4.9.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-1.34.1-4.9.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-static-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-static-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-static-1.34.1-4.9.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:busybox-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:busybox-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:busybox-1.34.1-4.9.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:busybox-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:busybox-static-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:busybox-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:busybox-static-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:busybox-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:busybox-1.34.1-4.9.1.x86_64", "SUSE Manager Proxy 4.1:busybox-1.34.1-4.9.1.x86_64", "SUSE Manager Proxy 4.1:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Manager Retail Branch Server 4.1:busybox-1.34.1-4.9.1.x86_64", "SUSE Manager Retail Branch Server 4.1:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Manager Server 4.1:busybox-1.34.1-4.9.1.ppc64le", "SUSE Manager Server 4.1:busybox-1.34.1-4.9.1.s390x", "SUSE Manager Server 4.1:busybox-1.34.1-4.9.1.x86_64", "SUSE Manager Server 4.1:busybox-static-1.34.1-4.9.1.ppc64le", "SUSE Manager Server 4.1:busybox-static-1.34.1-4.9.1.s390x", "SUSE Manager Server 4.1:busybox-static-1.34.1-4.9.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2022-01-20T09:05:15Z", details: "moderate", }, ], title: "CVE-2018-20679", }, { cve: "CVE-2019-5747", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2019-5747", }, ], notes: [ { category: "general", text: "An issue was discovered in BusyBox through 1.30.0. An out of bounds read in udhcp components (consumed by the DHCP client, server, and/or relay) might allow a remote attacker to leak sensitive information from the stack by sending a crafted DHCP message. This is related to assurance of a 4-byte length when decoding DHCP_SUBNET. NOTE: this issue exists because of an incomplete fix for CVE-2018-20679.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Enterprise Storage 6:busybox-1.34.1-4.9.1.aarch64", "SUSE Enterprise Storage 6:busybox-1.34.1-4.9.1.x86_64", "SUSE Enterprise Storage 6:busybox-static-1.34.1-4.9.1.aarch64", "SUSE Enterprise Storage 6:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Enterprise Storage 7:busybox-1.34.1-4.9.1.aarch64", "SUSE Enterprise Storage 7:busybox-1.34.1-4.9.1.x86_64", "SUSE Enterprise Storage 7:busybox-static-1.34.1-4.9.1.aarch64", "SUSE Enterprise Storage 7:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:busybox-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:busybox-static-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:busybox-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:busybox-static-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:busybox-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:busybox-static-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:busybox-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:busybox-static-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:busybox-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:busybox-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-1.34.1-4.9.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-static-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-static-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-static-1.34.1-4.9.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-1.34.1-4.9.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-static-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-static-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-static-1.34.1-4.9.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-1.34.1-4.9.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-static-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-static-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-static-1.34.1-4.9.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:busybox-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:busybox-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:busybox-1.34.1-4.9.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:busybox-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:busybox-static-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:busybox-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:busybox-static-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:busybox-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:busybox-1.34.1-4.9.1.x86_64", "SUSE Manager Proxy 4.1:busybox-1.34.1-4.9.1.x86_64", "SUSE Manager Proxy 4.1:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Manager Retail Branch Server 4.1:busybox-1.34.1-4.9.1.x86_64", "SUSE Manager Retail Branch Server 4.1:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Manager Server 4.1:busybox-1.34.1-4.9.1.ppc64le", "SUSE Manager Server 4.1:busybox-1.34.1-4.9.1.s390x", "SUSE Manager Server 4.1:busybox-1.34.1-4.9.1.x86_64", "SUSE Manager Server 4.1:busybox-static-1.34.1-4.9.1.ppc64le", "SUSE Manager Server 4.1:busybox-static-1.34.1-4.9.1.s390x", "SUSE Manager Server 4.1:busybox-static-1.34.1-4.9.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2019-5747", url: "https://www.suse.com/security/cve/CVE-2019-5747", }, { category: "external", summary: "SUSE Bug 1121426 for CVE-2019-5747", url: "https://bugzilla.suse.com/1121426", }, { category: "external", summary: "SUSE Bug 1121428 for CVE-2019-5747", url: "https://bugzilla.suse.com/1121428", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Enterprise Storage 6:busybox-1.34.1-4.9.1.aarch64", "SUSE Enterprise Storage 6:busybox-1.34.1-4.9.1.x86_64", "SUSE Enterprise Storage 6:busybox-static-1.34.1-4.9.1.aarch64", "SUSE Enterprise Storage 6:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Enterprise Storage 7:busybox-1.34.1-4.9.1.aarch64", "SUSE Enterprise Storage 7:busybox-1.34.1-4.9.1.x86_64", "SUSE Enterprise Storage 7:busybox-static-1.34.1-4.9.1.aarch64", "SUSE Enterprise Storage 7:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:busybox-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:busybox-static-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:busybox-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:busybox-static-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:busybox-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:busybox-static-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:busybox-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:busybox-static-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:busybox-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:busybox-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-1.34.1-4.9.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-static-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-static-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-static-1.34.1-4.9.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-1.34.1-4.9.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-static-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-static-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-static-1.34.1-4.9.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-1.34.1-4.9.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-static-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-static-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-static-1.34.1-4.9.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:busybox-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:busybox-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:busybox-1.34.1-4.9.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:busybox-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:busybox-static-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:busybox-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:busybox-static-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:busybox-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:busybox-1.34.1-4.9.1.x86_64", "SUSE Manager Proxy 4.1:busybox-1.34.1-4.9.1.x86_64", "SUSE Manager Proxy 4.1:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Manager Retail Branch Server 4.1:busybox-1.34.1-4.9.1.x86_64", "SUSE Manager Retail Branch Server 4.1:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Manager Server 4.1:busybox-1.34.1-4.9.1.ppc64le", "SUSE Manager Server 4.1:busybox-1.34.1-4.9.1.s390x", "SUSE Manager Server 4.1:busybox-1.34.1-4.9.1.x86_64", "SUSE Manager Server 4.1:busybox-static-1.34.1-4.9.1.ppc64le", "SUSE Manager Server 4.1:busybox-static-1.34.1-4.9.1.s390x", "SUSE Manager Server 4.1:busybox-static-1.34.1-4.9.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 3.5, baseSeverity: "LOW", vectorString: "CVSS:3.1/AV:A/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N", version: "3.1", }, products: [ "SUSE Enterprise Storage 6:busybox-1.34.1-4.9.1.aarch64", "SUSE Enterprise Storage 6:busybox-1.34.1-4.9.1.x86_64", "SUSE Enterprise Storage 6:busybox-static-1.34.1-4.9.1.aarch64", "SUSE Enterprise Storage 6:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Enterprise Storage 7:busybox-1.34.1-4.9.1.aarch64", "SUSE Enterprise Storage 7:busybox-1.34.1-4.9.1.x86_64", "SUSE Enterprise Storage 7:busybox-static-1.34.1-4.9.1.aarch64", "SUSE Enterprise Storage 7:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:busybox-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:busybox-static-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:busybox-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:busybox-static-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:busybox-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:busybox-static-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:busybox-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:busybox-static-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:busybox-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:busybox-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-1.34.1-4.9.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-static-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-static-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-static-1.34.1-4.9.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-1.34.1-4.9.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-static-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-static-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-static-1.34.1-4.9.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-1.34.1-4.9.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-static-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-static-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-static-1.34.1-4.9.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:busybox-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:busybox-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:busybox-1.34.1-4.9.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:busybox-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:busybox-static-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:busybox-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:busybox-static-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:busybox-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:busybox-1.34.1-4.9.1.x86_64", "SUSE Manager Proxy 4.1:busybox-1.34.1-4.9.1.x86_64", "SUSE Manager Proxy 4.1:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Manager Retail Branch Server 4.1:busybox-1.34.1-4.9.1.x86_64", "SUSE Manager Retail Branch Server 4.1:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Manager Server 4.1:busybox-1.34.1-4.9.1.ppc64le", "SUSE Manager Server 4.1:busybox-1.34.1-4.9.1.s390x", "SUSE Manager Server 4.1:busybox-1.34.1-4.9.1.x86_64", "SUSE Manager Server 4.1:busybox-static-1.34.1-4.9.1.ppc64le", "SUSE Manager Server 4.1:busybox-static-1.34.1-4.9.1.s390x", "SUSE Manager Server 4.1:busybox-static-1.34.1-4.9.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2022-01-20T09:05:15Z", details: "low", }, ], title: "CVE-2019-5747", }, { cve: "CVE-2021-28831", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2021-28831", }, ], notes: [ { category: "general", text: "decompress_gunzip.c in BusyBox through 1.32.1 mishandles the error bit on the huft_build result pointer, with a resultant invalid free or segmentation fault, via malformed gzip data.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Enterprise Storage 6:busybox-1.34.1-4.9.1.aarch64", "SUSE Enterprise Storage 6:busybox-1.34.1-4.9.1.x86_64", "SUSE Enterprise Storage 6:busybox-static-1.34.1-4.9.1.aarch64", "SUSE Enterprise Storage 6:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Enterprise Storage 7:busybox-1.34.1-4.9.1.aarch64", "SUSE Enterprise Storage 7:busybox-1.34.1-4.9.1.x86_64", "SUSE Enterprise Storage 7:busybox-static-1.34.1-4.9.1.aarch64", "SUSE Enterprise Storage 7:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:busybox-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:busybox-static-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:busybox-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:busybox-static-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:busybox-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:busybox-static-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:busybox-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:busybox-static-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:busybox-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:busybox-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-1.34.1-4.9.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-static-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-static-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-static-1.34.1-4.9.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-1.34.1-4.9.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-static-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-static-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-static-1.34.1-4.9.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-1.34.1-4.9.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-static-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-static-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-static-1.34.1-4.9.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:busybox-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:busybox-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:busybox-1.34.1-4.9.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:busybox-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:busybox-static-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:busybox-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:busybox-static-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:busybox-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:busybox-1.34.1-4.9.1.x86_64", "SUSE Manager Proxy 4.1:busybox-1.34.1-4.9.1.x86_64", "SUSE Manager Proxy 4.1:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Manager Retail Branch Server 4.1:busybox-1.34.1-4.9.1.x86_64", "SUSE Manager Retail Branch Server 4.1:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Manager Server 4.1:busybox-1.34.1-4.9.1.ppc64le", "SUSE Manager Server 4.1:busybox-1.34.1-4.9.1.s390x", "SUSE Manager Server 4.1:busybox-1.34.1-4.9.1.x86_64", "SUSE Manager Server 4.1:busybox-static-1.34.1-4.9.1.ppc64le", "SUSE Manager Server 4.1:busybox-static-1.34.1-4.9.1.s390x", "SUSE Manager Server 4.1:busybox-static-1.34.1-4.9.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2021-28831", url: "https://www.suse.com/security/cve/CVE-2021-28831", }, { category: "external", summary: "SUSE Bug 1184522 for CVE-2021-28831", url: "https://bugzilla.suse.com/1184522", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Enterprise Storage 6:busybox-1.34.1-4.9.1.aarch64", "SUSE Enterprise Storage 6:busybox-1.34.1-4.9.1.x86_64", "SUSE Enterprise Storage 6:busybox-static-1.34.1-4.9.1.aarch64", "SUSE Enterprise Storage 6:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Enterprise Storage 7:busybox-1.34.1-4.9.1.aarch64", "SUSE Enterprise Storage 7:busybox-1.34.1-4.9.1.x86_64", "SUSE Enterprise Storage 7:busybox-static-1.34.1-4.9.1.aarch64", "SUSE Enterprise Storage 7:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:busybox-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:busybox-static-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:busybox-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:busybox-static-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:busybox-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:busybox-static-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:busybox-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:busybox-static-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:busybox-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:busybox-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-1.34.1-4.9.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-static-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-static-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-static-1.34.1-4.9.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-1.34.1-4.9.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-static-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-static-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-static-1.34.1-4.9.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-1.34.1-4.9.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-static-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-static-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-static-1.34.1-4.9.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:busybox-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:busybox-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:busybox-1.34.1-4.9.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:busybox-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:busybox-static-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:busybox-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:busybox-static-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:busybox-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:busybox-1.34.1-4.9.1.x86_64", "SUSE Manager Proxy 4.1:busybox-1.34.1-4.9.1.x86_64", "SUSE Manager Proxy 4.1:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Manager Retail Branch Server 4.1:busybox-1.34.1-4.9.1.x86_64", "SUSE Manager Retail Branch Server 4.1:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Manager Server 4.1:busybox-1.34.1-4.9.1.ppc64le", "SUSE Manager Server 4.1:busybox-1.34.1-4.9.1.s390x", "SUSE Manager Server 4.1:busybox-1.34.1-4.9.1.x86_64", "SUSE Manager Server 4.1:busybox-static-1.34.1-4.9.1.ppc64le", "SUSE Manager Server 4.1:busybox-static-1.34.1-4.9.1.s390x", "SUSE Manager Server 4.1:busybox-static-1.34.1-4.9.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 7.5, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "SUSE Enterprise Storage 6:busybox-1.34.1-4.9.1.aarch64", "SUSE Enterprise Storage 6:busybox-1.34.1-4.9.1.x86_64", "SUSE Enterprise Storage 6:busybox-static-1.34.1-4.9.1.aarch64", "SUSE Enterprise Storage 6:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Enterprise Storage 7:busybox-1.34.1-4.9.1.aarch64", "SUSE Enterprise Storage 7:busybox-1.34.1-4.9.1.x86_64", "SUSE Enterprise Storage 7:busybox-static-1.34.1-4.9.1.aarch64", "SUSE Enterprise Storage 7:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:busybox-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:busybox-static-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:busybox-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:busybox-static-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:busybox-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:busybox-static-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:busybox-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:busybox-static-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:busybox-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:busybox-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-1.34.1-4.9.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-static-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-static-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-static-1.34.1-4.9.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-1.34.1-4.9.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-static-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-static-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-static-1.34.1-4.9.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-1.34.1-4.9.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-static-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-static-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-static-1.34.1-4.9.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:busybox-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:busybox-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:busybox-1.34.1-4.9.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:busybox-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:busybox-static-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:busybox-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:busybox-static-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:busybox-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:busybox-1.34.1-4.9.1.x86_64", "SUSE Manager Proxy 4.1:busybox-1.34.1-4.9.1.x86_64", "SUSE Manager Proxy 4.1:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Manager Retail Branch Server 4.1:busybox-1.34.1-4.9.1.x86_64", "SUSE Manager Retail Branch Server 4.1:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Manager Server 4.1:busybox-1.34.1-4.9.1.ppc64le", "SUSE Manager Server 4.1:busybox-1.34.1-4.9.1.s390x", "SUSE Manager Server 4.1:busybox-1.34.1-4.9.1.x86_64", "SUSE Manager Server 4.1:busybox-static-1.34.1-4.9.1.ppc64le", "SUSE Manager Server 4.1:busybox-static-1.34.1-4.9.1.s390x", "SUSE Manager Server 4.1:busybox-static-1.34.1-4.9.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2022-01-20T09:05:15Z", details: "important", }, ], title: "CVE-2021-28831", }, { cve: "CVE-2021-42373", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2021-42373", }, ], notes: [ { category: "general", text: "A NULL pointer dereference in Busybox's man applet leads to denial of service when a section name is supplied but no page argument is given", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Enterprise Storage 6:busybox-1.34.1-4.9.1.aarch64", "SUSE Enterprise Storage 6:busybox-1.34.1-4.9.1.x86_64", "SUSE Enterprise Storage 6:busybox-static-1.34.1-4.9.1.aarch64", "SUSE Enterprise Storage 6:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Enterprise Storage 7:busybox-1.34.1-4.9.1.aarch64", "SUSE Enterprise Storage 7:busybox-1.34.1-4.9.1.x86_64", "SUSE Enterprise Storage 7:busybox-static-1.34.1-4.9.1.aarch64", "SUSE Enterprise Storage 7:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:busybox-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:busybox-static-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:busybox-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:busybox-static-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:busybox-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:busybox-static-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:busybox-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:busybox-static-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:busybox-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:busybox-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-1.34.1-4.9.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-static-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-static-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-static-1.34.1-4.9.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-1.34.1-4.9.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-static-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-static-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-static-1.34.1-4.9.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-1.34.1-4.9.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-static-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-static-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-static-1.34.1-4.9.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:busybox-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:busybox-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:busybox-1.34.1-4.9.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:busybox-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:busybox-static-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:busybox-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:busybox-static-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:busybox-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:busybox-1.34.1-4.9.1.x86_64", "SUSE Manager Proxy 4.1:busybox-1.34.1-4.9.1.x86_64", "SUSE Manager Proxy 4.1:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Manager Retail Branch Server 4.1:busybox-1.34.1-4.9.1.x86_64", "SUSE Manager Retail Branch Server 4.1:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Manager Server 4.1:busybox-1.34.1-4.9.1.ppc64le", "SUSE Manager Server 4.1:busybox-1.34.1-4.9.1.s390x", "SUSE Manager Server 4.1:busybox-1.34.1-4.9.1.x86_64", "SUSE Manager Server 4.1:busybox-static-1.34.1-4.9.1.ppc64le", "SUSE Manager Server 4.1:busybox-static-1.34.1-4.9.1.s390x", "SUSE Manager Server 4.1:busybox-static-1.34.1-4.9.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2021-42373", url: "https://www.suse.com/security/cve/CVE-2021-42373", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Enterprise Storage 6:busybox-1.34.1-4.9.1.aarch64", "SUSE Enterprise Storage 6:busybox-1.34.1-4.9.1.x86_64", "SUSE Enterprise Storage 6:busybox-static-1.34.1-4.9.1.aarch64", "SUSE Enterprise Storage 6:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Enterprise Storage 7:busybox-1.34.1-4.9.1.aarch64", "SUSE Enterprise Storage 7:busybox-1.34.1-4.9.1.x86_64", "SUSE Enterprise Storage 7:busybox-static-1.34.1-4.9.1.aarch64", "SUSE Enterprise Storage 7:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:busybox-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:busybox-static-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:busybox-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:busybox-static-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:busybox-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:busybox-static-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:busybox-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:busybox-static-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:busybox-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:busybox-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-1.34.1-4.9.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-static-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-static-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-static-1.34.1-4.9.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-1.34.1-4.9.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-static-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-static-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-static-1.34.1-4.9.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-1.34.1-4.9.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-static-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-static-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-static-1.34.1-4.9.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:busybox-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:busybox-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:busybox-1.34.1-4.9.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:busybox-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:busybox-static-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:busybox-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:busybox-static-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:busybox-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:busybox-1.34.1-4.9.1.x86_64", "SUSE Manager Proxy 4.1:busybox-1.34.1-4.9.1.x86_64", "SUSE Manager Proxy 4.1:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Manager Retail Branch Server 4.1:busybox-1.34.1-4.9.1.x86_64", "SUSE Manager Retail Branch Server 4.1:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Manager Server 4.1:busybox-1.34.1-4.9.1.ppc64le", "SUSE Manager Server 4.1:busybox-1.34.1-4.9.1.s390x", "SUSE Manager Server 4.1:busybox-1.34.1-4.9.1.x86_64", "SUSE Manager Server 4.1:busybox-static-1.34.1-4.9.1.ppc64le", "SUSE Manager Server 4.1:busybox-static-1.34.1-4.9.1.s390x", "SUSE Manager Server 4.1:busybox-static-1.34.1-4.9.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.5, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "SUSE Enterprise Storage 6:busybox-1.34.1-4.9.1.aarch64", "SUSE Enterprise Storage 6:busybox-1.34.1-4.9.1.x86_64", "SUSE Enterprise Storage 6:busybox-static-1.34.1-4.9.1.aarch64", "SUSE Enterprise Storage 6:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Enterprise Storage 7:busybox-1.34.1-4.9.1.aarch64", "SUSE Enterprise Storage 7:busybox-1.34.1-4.9.1.x86_64", "SUSE Enterprise Storage 7:busybox-static-1.34.1-4.9.1.aarch64", "SUSE Enterprise Storage 7:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:busybox-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:busybox-static-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:busybox-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:busybox-static-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:busybox-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:busybox-static-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:busybox-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:busybox-static-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:busybox-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:busybox-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-1.34.1-4.9.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-static-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-static-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-static-1.34.1-4.9.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-1.34.1-4.9.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-static-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-static-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-static-1.34.1-4.9.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-1.34.1-4.9.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-static-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-static-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-static-1.34.1-4.9.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:busybox-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:busybox-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:busybox-1.34.1-4.9.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:busybox-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:busybox-static-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:busybox-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:busybox-static-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:busybox-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:busybox-1.34.1-4.9.1.x86_64", "SUSE Manager Proxy 4.1:busybox-1.34.1-4.9.1.x86_64", "SUSE Manager Proxy 4.1:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Manager Retail Branch Server 4.1:busybox-1.34.1-4.9.1.x86_64", "SUSE Manager Retail Branch Server 4.1:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Manager Server 4.1:busybox-1.34.1-4.9.1.ppc64le", "SUSE Manager Server 4.1:busybox-1.34.1-4.9.1.s390x", "SUSE Manager Server 4.1:busybox-1.34.1-4.9.1.x86_64", "SUSE Manager Server 4.1:busybox-static-1.34.1-4.9.1.ppc64le", "SUSE Manager Server 4.1:busybox-static-1.34.1-4.9.1.s390x", "SUSE Manager Server 4.1:busybox-static-1.34.1-4.9.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2022-01-20T09:05:15Z", details: "moderate", }, ], title: "CVE-2021-42373", }, { cve: "CVE-2021-42374", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2021-42374", }, ], notes: [ { category: "general", text: "An out-of-bounds heap read in Busybox's unlzma applet leads to information leak and denial of service when crafted LZMA-compressed input is decompressed. This can be triggered by any applet/format that", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Enterprise Storage 6:busybox-1.34.1-4.9.1.aarch64", "SUSE Enterprise Storage 6:busybox-1.34.1-4.9.1.x86_64", "SUSE Enterprise Storage 6:busybox-static-1.34.1-4.9.1.aarch64", "SUSE Enterprise Storage 6:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Enterprise Storage 7:busybox-1.34.1-4.9.1.aarch64", "SUSE Enterprise Storage 7:busybox-1.34.1-4.9.1.x86_64", "SUSE Enterprise Storage 7:busybox-static-1.34.1-4.9.1.aarch64", "SUSE Enterprise Storage 7:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:busybox-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:busybox-static-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:busybox-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:busybox-static-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:busybox-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:busybox-static-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:busybox-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:busybox-static-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:busybox-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:busybox-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-1.34.1-4.9.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-static-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-static-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-static-1.34.1-4.9.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-1.34.1-4.9.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-static-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-static-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-static-1.34.1-4.9.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-1.34.1-4.9.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-static-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-static-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-static-1.34.1-4.9.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:busybox-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:busybox-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:busybox-1.34.1-4.9.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:busybox-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:busybox-static-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:busybox-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:busybox-static-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:busybox-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:busybox-1.34.1-4.9.1.x86_64", "SUSE Manager Proxy 4.1:busybox-1.34.1-4.9.1.x86_64", "SUSE Manager Proxy 4.1:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Manager Retail Branch Server 4.1:busybox-1.34.1-4.9.1.x86_64", "SUSE Manager Retail Branch Server 4.1:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Manager Server 4.1:busybox-1.34.1-4.9.1.ppc64le", "SUSE Manager Server 4.1:busybox-1.34.1-4.9.1.s390x", "SUSE Manager Server 4.1:busybox-1.34.1-4.9.1.x86_64", "SUSE Manager Server 4.1:busybox-static-1.34.1-4.9.1.ppc64le", "SUSE Manager Server 4.1:busybox-static-1.34.1-4.9.1.s390x", "SUSE Manager Server 4.1:busybox-static-1.34.1-4.9.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2021-42374", url: "https://www.suse.com/security/cve/CVE-2021-42374", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Enterprise Storage 6:busybox-1.34.1-4.9.1.aarch64", "SUSE Enterprise Storage 6:busybox-1.34.1-4.9.1.x86_64", "SUSE Enterprise Storage 6:busybox-static-1.34.1-4.9.1.aarch64", "SUSE Enterprise Storage 6:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Enterprise Storage 7:busybox-1.34.1-4.9.1.aarch64", "SUSE Enterprise Storage 7:busybox-1.34.1-4.9.1.x86_64", "SUSE Enterprise Storage 7:busybox-static-1.34.1-4.9.1.aarch64", "SUSE Enterprise Storage 7:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:busybox-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:busybox-static-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:busybox-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:busybox-static-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:busybox-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:busybox-static-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:busybox-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:busybox-static-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:busybox-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:busybox-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-1.34.1-4.9.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-static-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-static-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-static-1.34.1-4.9.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-1.34.1-4.9.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-static-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-static-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-static-1.34.1-4.9.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-1.34.1-4.9.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-static-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-static-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-static-1.34.1-4.9.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:busybox-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:busybox-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:busybox-1.34.1-4.9.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:busybox-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:busybox-static-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:busybox-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:busybox-static-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:busybox-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:busybox-1.34.1-4.9.1.x86_64", "SUSE Manager Proxy 4.1:busybox-1.34.1-4.9.1.x86_64", "SUSE Manager Proxy 4.1:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Manager Retail Branch Server 4.1:busybox-1.34.1-4.9.1.x86_64", "SUSE Manager Retail Branch Server 4.1:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Manager Server 4.1:busybox-1.34.1-4.9.1.ppc64le", "SUSE Manager Server 4.1:busybox-1.34.1-4.9.1.s390x", "SUSE Manager Server 4.1:busybox-1.34.1-4.9.1.x86_64", "SUSE Manager Server 4.1:busybox-static-1.34.1-4.9.1.ppc64le", "SUSE Manager Server 4.1:busybox-static-1.34.1-4.9.1.s390x", "SUSE Manager Server 4.1:busybox-static-1.34.1-4.9.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.7, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:H", version: "3.1", }, products: [ "SUSE Enterprise Storage 6:busybox-1.34.1-4.9.1.aarch64", "SUSE Enterprise Storage 6:busybox-1.34.1-4.9.1.x86_64", "SUSE Enterprise Storage 6:busybox-static-1.34.1-4.9.1.aarch64", "SUSE Enterprise Storage 6:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Enterprise Storage 7:busybox-1.34.1-4.9.1.aarch64", "SUSE Enterprise Storage 7:busybox-1.34.1-4.9.1.x86_64", "SUSE Enterprise Storage 7:busybox-static-1.34.1-4.9.1.aarch64", "SUSE Enterprise Storage 7:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:busybox-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:busybox-static-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:busybox-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:busybox-static-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:busybox-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:busybox-static-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:busybox-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:busybox-static-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:busybox-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:busybox-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-1.34.1-4.9.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-static-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-static-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-static-1.34.1-4.9.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-1.34.1-4.9.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-static-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-static-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-static-1.34.1-4.9.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-1.34.1-4.9.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-static-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-static-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-static-1.34.1-4.9.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:busybox-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:busybox-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:busybox-1.34.1-4.9.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:busybox-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:busybox-static-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:busybox-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:busybox-static-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:busybox-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:busybox-1.34.1-4.9.1.x86_64", "SUSE Manager Proxy 4.1:busybox-1.34.1-4.9.1.x86_64", "SUSE Manager Proxy 4.1:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Manager Retail Branch Server 4.1:busybox-1.34.1-4.9.1.x86_64", "SUSE Manager Retail Branch Server 4.1:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Manager Server 4.1:busybox-1.34.1-4.9.1.ppc64le", "SUSE Manager Server 4.1:busybox-1.34.1-4.9.1.s390x", "SUSE Manager Server 4.1:busybox-1.34.1-4.9.1.x86_64", "SUSE Manager Server 4.1:busybox-static-1.34.1-4.9.1.ppc64le", "SUSE Manager Server 4.1:busybox-static-1.34.1-4.9.1.s390x", "SUSE Manager Server 4.1:busybox-static-1.34.1-4.9.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2022-01-20T09:05:15Z", details: "moderate", }, ], title: "CVE-2021-42374", }, { cve: "CVE-2021-42375", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2021-42375", }, ], notes: [ { category: "general", text: "An incorrect handling of a special element in Busybox's ash applet leads to denial of service when processing a crafted shell command, due to the shell mistaking specific characters for reserved characters. This may be used for DoS under rare conditions of filtered command input.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Enterprise Storage 6:busybox-1.34.1-4.9.1.aarch64", "SUSE Enterprise Storage 6:busybox-1.34.1-4.9.1.x86_64", "SUSE Enterprise Storage 6:busybox-static-1.34.1-4.9.1.aarch64", "SUSE Enterprise Storage 6:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Enterprise Storage 7:busybox-1.34.1-4.9.1.aarch64", "SUSE Enterprise Storage 7:busybox-1.34.1-4.9.1.x86_64", "SUSE Enterprise Storage 7:busybox-static-1.34.1-4.9.1.aarch64", "SUSE Enterprise Storage 7:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:busybox-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:busybox-static-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:busybox-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:busybox-static-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:busybox-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:busybox-static-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:busybox-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:busybox-static-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:busybox-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:busybox-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-1.34.1-4.9.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-static-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-static-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-static-1.34.1-4.9.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-1.34.1-4.9.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-static-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-static-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-static-1.34.1-4.9.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-1.34.1-4.9.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-static-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-static-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-static-1.34.1-4.9.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:busybox-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:busybox-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:busybox-1.34.1-4.9.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:busybox-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:busybox-static-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:busybox-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:busybox-static-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:busybox-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:busybox-1.34.1-4.9.1.x86_64", "SUSE Manager Proxy 4.1:busybox-1.34.1-4.9.1.x86_64", "SUSE Manager Proxy 4.1:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Manager Retail Branch Server 4.1:busybox-1.34.1-4.9.1.x86_64", "SUSE Manager Retail Branch Server 4.1:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Manager Server 4.1:busybox-1.34.1-4.9.1.ppc64le", "SUSE Manager Server 4.1:busybox-1.34.1-4.9.1.s390x", "SUSE Manager Server 4.1:busybox-1.34.1-4.9.1.x86_64", "SUSE Manager Server 4.1:busybox-static-1.34.1-4.9.1.ppc64le", "SUSE Manager Server 4.1:busybox-static-1.34.1-4.9.1.s390x", "SUSE Manager Server 4.1:busybox-static-1.34.1-4.9.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2021-42375", url: "https://www.suse.com/security/cve/CVE-2021-42375", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Enterprise Storage 6:busybox-1.34.1-4.9.1.aarch64", "SUSE Enterprise Storage 6:busybox-1.34.1-4.9.1.x86_64", "SUSE Enterprise Storage 6:busybox-static-1.34.1-4.9.1.aarch64", "SUSE Enterprise Storage 6:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Enterprise Storage 7:busybox-1.34.1-4.9.1.aarch64", "SUSE Enterprise Storage 7:busybox-1.34.1-4.9.1.x86_64", "SUSE Enterprise Storage 7:busybox-static-1.34.1-4.9.1.aarch64", "SUSE Enterprise Storage 7:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:busybox-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:busybox-static-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:busybox-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:busybox-static-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:busybox-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:busybox-static-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:busybox-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:busybox-static-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:busybox-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:busybox-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-1.34.1-4.9.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-static-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-static-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-static-1.34.1-4.9.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-1.34.1-4.9.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-static-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-static-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-static-1.34.1-4.9.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-1.34.1-4.9.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-static-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-static-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-static-1.34.1-4.9.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:busybox-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:busybox-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:busybox-1.34.1-4.9.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:busybox-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:busybox-static-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:busybox-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:busybox-static-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:busybox-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:busybox-1.34.1-4.9.1.x86_64", "SUSE Manager Proxy 4.1:busybox-1.34.1-4.9.1.x86_64", "SUSE Manager Proxy 4.1:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Manager Retail Branch Server 4.1:busybox-1.34.1-4.9.1.x86_64", "SUSE Manager Retail Branch Server 4.1:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Manager Server 4.1:busybox-1.34.1-4.9.1.ppc64le", "SUSE Manager Server 4.1:busybox-1.34.1-4.9.1.s390x", "SUSE Manager Server 4.1:busybox-1.34.1-4.9.1.x86_64", "SUSE Manager Server 4.1:busybox-static-1.34.1-4.9.1.ppc64le", "SUSE Manager Server 4.1:busybox-static-1.34.1-4.9.1.s390x", "SUSE Manager Server 4.1:busybox-static-1.34.1-4.9.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 4.1, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "SUSE Enterprise Storage 6:busybox-1.34.1-4.9.1.aarch64", "SUSE Enterprise Storage 6:busybox-1.34.1-4.9.1.x86_64", "SUSE Enterprise Storage 6:busybox-static-1.34.1-4.9.1.aarch64", "SUSE Enterprise Storage 6:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Enterprise Storage 7:busybox-1.34.1-4.9.1.aarch64", "SUSE Enterprise Storage 7:busybox-1.34.1-4.9.1.x86_64", "SUSE Enterprise Storage 7:busybox-static-1.34.1-4.9.1.aarch64", "SUSE Enterprise Storage 7:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:busybox-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:busybox-static-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:busybox-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:busybox-static-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:busybox-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:busybox-static-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:busybox-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:busybox-static-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:busybox-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:busybox-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-1.34.1-4.9.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-static-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-static-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-static-1.34.1-4.9.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-1.34.1-4.9.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-static-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-static-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-static-1.34.1-4.9.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-1.34.1-4.9.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-static-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-static-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-static-1.34.1-4.9.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:busybox-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:busybox-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:busybox-1.34.1-4.9.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:busybox-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:busybox-static-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:busybox-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:busybox-static-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:busybox-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:busybox-1.34.1-4.9.1.x86_64", "SUSE Manager Proxy 4.1:busybox-1.34.1-4.9.1.x86_64", "SUSE Manager Proxy 4.1:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Manager Retail Branch Server 4.1:busybox-1.34.1-4.9.1.x86_64", "SUSE Manager Retail Branch Server 4.1:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Manager Server 4.1:busybox-1.34.1-4.9.1.ppc64le", "SUSE Manager Server 4.1:busybox-1.34.1-4.9.1.s390x", "SUSE Manager Server 4.1:busybox-1.34.1-4.9.1.x86_64", "SUSE Manager Server 4.1:busybox-static-1.34.1-4.9.1.ppc64le", "SUSE Manager Server 4.1:busybox-static-1.34.1-4.9.1.s390x", "SUSE Manager Server 4.1:busybox-static-1.34.1-4.9.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2022-01-20T09:05:15Z", details: "moderate", }, ], title: "CVE-2021-42375", }, { cve: "CVE-2021-42376", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2021-42376", }, ], notes: [ { category: "general", text: "A NULL pointer dereference in Busybox's hush applet leads to denial of service when processing a crafted shell command, due to missing validation after a \\x03 delimiter character. This may be used for DoS under very rare conditions of filtered command input.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Enterprise Storage 6:busybox-1.34.1-4.9.1.aarch64", "SUSE Enterprise Storage 6:busybox-1.34.1-4.9.1.x86_64", "SUSE Enterprise Storage 6:busybox-static-1.34.1-4.9.1.aarch64", "SUSE Enterprise Storage 6:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Enterprise Storage 7:busybox-1.34.1-4.9.1.aarch64", "SUSE Enterprise Storage 7:busybox-1.34.1-4.9.1.x86_64", "SUSE Enterprise Storage 7:busybox-static-1.34.1-4.9.1.aarch64", "SUSE Enterprise Storage 7:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:busybox-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:busybox-static-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:busybox-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:busybox-static-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:busybox-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:busybox-static-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:busybox-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:busybox-static-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:busybox-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:busybox-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-1.34.1-4.9.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-static-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-static-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-static-1.34.1-4.9.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-1.34.1-4.9.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-static-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-static-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-static-1.34.1-4.9.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-1.34.1-4.9.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-static-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-static-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-static-1.34.1-4.9.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:busybox-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:busybox-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:busybox-1.34.1-4.9.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:busybox-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:busybox-static-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:busybox-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:busybox-static-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:busybox-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:busybox-1.34.1-4.9.1.x86_64", "SUSE Manager Proxy 4.1:busybox-1.34.1-4.9.1.x86_64", "SUSE Manager Proxy 4.1:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Manager Retail Branch Server 4.1:busybox-1.34.1-4.9.1.x86_64", "SUSE Manager Retail Branch Server 4.1:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Manager Server 4.1:busybox-1.34.1-4.9.1.ppc64le", "SUSE Manager Server 4.1:busybox-1.34.1-4.9.1.s390x", "SUSE Manager Server 4.1:busybox-1.34.1-4.9.1.x86_64", "SUSE Manager Server 4.1:busybox-static-1.34.1-4.9.1.ppc64le", "SUSE Manager Server 4.1:busybox-static-1.34.1-4.9.1.s390x", "SUSE Manager Server 4.1:busybox-static-1.34.1-4.9.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2021-42376", url: "https://www.suse.com/security/cve/CVE-2021-42376", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Enterprise Storage 6:busybox-1.34.1-4.9.1.aarch64", "SUSE Enterprise Storage 6:busybox-1.34.1-4.9.1.x86_64", "SUSE Enterprise Storage 6:busybox-static-1.34.1-4.9.1.aarch64", "SUSE Enterprise Storage 6:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Enterprise Storage 7:busybox-1.34.1-4.9.1.aarch64", "SUSE Enterprise Storage 7:busybox-1.34.1-4.9.1.x86_64", "SUSE Enterprise Storage 7:busybox-static-1.34.1-4.9.1.aarch64", "SUSE Enterprise Storage 7:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:busybox-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:busybox-static-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:busybox-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:busybox-static-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:busybox-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:busybox-static-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:busybox-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:busybox-static-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:busybox-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:busybox-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-1.34.1-4.9.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-static-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-static-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-static-1.34.1-4.9.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-1.34.1-4.9.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-static-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-static-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-static-1.34.1-4.9.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-1.34.1-4.9.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-static-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-static-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-static-1.34.1-4.9.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:busybox-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:busybox-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:busybox-1.34.1-4.9.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:busybox-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:busybox-static-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:busybox-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:busybox-static-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:busybox-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:busybox-1.34.1-4.9.1.x86_64", "SUSE Manager Proxy 4.1:busybox-1.34.1-4.9.1.x86_64", "SUSE Manager Proxy 4.1:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Manager Retail Branch Server 4.1:busybox-1.34.1-4.9.1.x86_64", "SUSE Manager Retail Branch Server 4.1:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Manager Server 4.1:busybox-1.34.1-4.9.1.ppc64le", "SUSE Manager Server 4.1:busybox-1.34.1-4.9.1.s390x", "SUSE Manager Server 4.1:busybox-1.34.1-4.9.1.x86_64", "SUSE Manager Server 4.1:busybox-static-1.34.1-4.9.1.ppc64le", "SUSE Manager Server 4.1:busybox-static-1.34.1-4.9.1.s390x", "SUSE Manager Server 4.1:busybox-static-1.34.1-4.9.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 4.1, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "SUSE Enterprise Storage 6:busybox-1.34.1-4.9.1.aarch64", "SUSE Enterprise Storage 6:busybox-1.34.1-4.9.1.x86_64", "SUSE Enterprise Storage 6:busybox-static-1.34.1-4.9.1.aarch64", "SUSE Enterprise Storage 6:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Enterprise Storage 7:busybox-1.34.1-4.9.1.aarch64", "SUSE Enterprise Storage 7:busybox-1.34.1-4.9.1.x86_64", "SUSE Enterprise Storage 7:busybox-static-1.34.1-4.9.1.aarch64", "SUSE Enterprise Storage 7:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:busybox-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:busybox-static-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:busybox-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:busybox-static-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:busybox-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:busybox-static-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:busybox-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:busybox-static-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:busybox-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:busybox-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-1.34.1-4.9.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-static-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-static-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-static-1.34.1-4.9.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-1.34.1-4.9.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-static-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-static-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-static-1.34.1-4.9.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-1.34.1-4.9.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-static-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-static-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-static-1.34.1-4.9.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:busybox-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:busybox-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:busybox-1.34.1-4.9.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:busybox-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:busybox-static-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:busybox-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:busybox-static-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:busybox-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:busybox-1.34.1-4.9.1.x86_64", "SUSE Manager Proxy 4.1:busybox-1.34.1-4.9.1.x86_64", "SUSE Manager Proxy 4.1:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Manager Retail Branch Server 4.1:busybox-1.34.1-4.9.1.x86_64", "SUSE Manager Retail Branch Server 4.1:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Manager Server 4.1:busybox-1.34.1-4.9.1.ppc64le", "SUSE Manager Server 4.1:busybox-1.34.1-4.9.1.s390x", "SUSE Manager Server 4.1:busybox-1.34.1-4.9.1.x86_64", "SUSE Manager Server 4.1:busybox-static-1.34.1-4.9.1.ppc64le", "SUSE Manager Server 4.1:busybox-static-1.34.1-4.9.1.s390x", "SUSE Manager Server 4.1:busybox-static-1.34.1-4.9.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2022-01-20T09:05:15Z", details: "moderate", }, ], title: "CVE-2021-42376", }, { cve: "CVE-2021-42377", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2021-42377", }, ], notes: [ { category: "general", text: "An attacker-controlled pointer free in Busybox's hush applet leads to denial of service and possible code execution when processing a crafted shell command, due to the shell mishandling the &&& string. This may be used for remote code execution under rare conditions of filtered command input.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Enterprise Storage 6:busybox-1.34.1-4.9.1.aarch64", "SUSE Enterprise Storage 6:busybox-1.34.1-4.9.1.x86_64", "SUSE Enterprise Storage 6:busybox-static-1.34.1-4.9.1.aarch64", "SUSE Enterprise Storage 6:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Enterprise Storage 7:busybox-1.34.1-4.9.1.aarch64", "SUSE Enterprise Storage 7:busybox-1.34.1-4.9.1.x86_64", "SUSE Enterprise Storage 7:busybox-static-1.34.1-4.9.1.aarch64", "SUSE Enterprise Storage 7:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:busybox-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:busybox-static-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:busybox-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:busybox-static-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:busybox-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:busybox-static-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:busybox-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:busybox-static-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:busybox-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:busybox-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-1.34.1-4.9.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-static-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-static-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-static-1.34.1-4.9.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-1.34.1-4.9.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-static-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-static-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-static-1.34.1-4.9.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-1.34.1-4.9.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-static-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-static-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-static-1.34.1-4.9.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:busybox-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:busybox-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:busybox-1.34.1-4.9.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:busybox-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:busybox-static-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:busybox-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:busybox-static-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:busybox-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:busybox-1.34.1-4.9.1.x86_64", "SUSE Manager Proxy 4.1:busybox-1.34.1-4.9.1.x86_64", "SUSE Manager Proxy 4.1:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Manager Retail Branch Server 4.1:busybox-1.34.1-4.9.1.x86_64", "SUSE Manager Retail Branch Server 4.1:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Manager Server 4.1:busybox-1.34.1-4.9.1.ppc64le", "SUSE Manager Server 4.1:busybox-1.34.1-4.9.1.s390x", "SUSE Manager Server 4.1:busybox-1.34.1-4.9.1.x86_64", "SUSE Manager Server 4.1:busybox-static-1.34.1-4.9.1.ppc64le", "SUSE Manager Server 4.1:busybox-static-1.34.1-4.9.1.s390x", "SUSE Manager Server 4.1:busybox-static-1.34.1-4.9.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2021-42377", url: "https://www.suse.com/security/cve/CVE-2021-42377", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Enterprise Storage 6:busybox-1.34.1-4.9.1.aarch64", "SUSE Enterprise Storage 6:busybox-1.34.1-4.9.1.x86_64", "SUSE Enterprise Storage 6:busybox-static-1.34.1-4.9.1.aarch64", "SUSE Enterprise Storage 6:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Enterprise Storage 7:busybox-1.34.1-4.9.1.aarch64", "SUSE Enterprise Storage 7:busybox-1.34.1-4.9.1.x86_64", "SUSE Enterprise Storage 7:busybox-static-1.34.1-4.9.1.aarch64", "SUSE Enterprise Storage 7:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:busybox-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:busybox-static-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:busybox-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:busybox-static-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:busybox-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:busybox-static-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:busybox-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:busybox-static-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:busybox-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:busybox-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-1.34.1-4.9.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-static-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-static-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-static-1.34.1-4.9.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-1.34.1-4.9.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-static-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-static-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-static-1.34.1-4.9.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-1.34.1-4.9.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-static-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-static-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-static-1.34.1-4.9.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:busybox-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:busybox-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:busybox-1.34.1-4.9.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:busybox-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:busybox-static-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:busybox-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:busybox-static-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:busybox-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:busybox-1.34.1-4.9.1.x86_64", "SUSE Manager Proxy 4.1:busybox-1.34.1-4.9.1.x86_64", "SUSE Manager Proxy 4.1:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Manager Retail Branch Server 4.1:busybox-1.34.1-4.9.1.x86_64", "SUSE Manager Retail Branch Server 4.1:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Manager Server 4.1:busybox-1.34.1-4.9.1.ppc64le", "SUSE Manager Server 4.1:busybox-1.34.1-4.9.1.s390x", "SUSE Manager Server 4.1:busybox-1.34.1-4.9.1.x86_64", "SUSE Manager Server 4.1:busybox-static-1.34.1-4.9.1.ppc64le", "SUSE Manager Server 4.1:busybox-static-1.34.1-4.9.1.s390x", "SUSE Manager Server 4.1:busybox-static-1.34.1-4.9.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 6.4, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, products: [ "SUSE Enterprise Storage 6:busybox-1.34.1-4.9.1.aarch64", "SUSE Enterprise Storage 6:busybox-1.34.1-4.9.1.x86_64", "SUSE Enterprise Storage 6:busybox-static-1.34.1-4.9.1.aarch64", "SUSE Enterprise Storage 6:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Enterprise Storage 7:busybox-1.34.1-4.9.1.aarch64", "SUSE Enterprise Storage 7:busybox-1.34.1-4.9.1.x86_64", "SUSE Enterprise Storage 7:busybox-static-1.34.1-4.9.1.aarch64", "SUSE Enterprise Storage 7:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:busybox-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:busybox-static-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:busybox-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:busybox-static-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:busybox-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:busybox-static-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:busybox-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:busybox-static-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:busybox-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:busybox-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-1.34.1-4.9.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-static-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-static-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-static-1.34.1-4.9.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-1.34.1-4.9.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-static-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-static-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-static-1.34.1-4.9.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-1.34.1-4.9.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-static-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-static-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-static-1.34.1-4.9.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:busybox-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:busybox-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:busybox-1.34.1-4.9.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:busybox-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:busybox-static-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:busybox-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:busybox-static-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:busybox-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:busybox-1.34.1-4.9.1.x86_64", "SUSE Manager Proxy 4.1:busybox-1.34.1-4.9.1.x86_64", "SUSE Manager Proxy 4.1:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Manager Retail Branch Server 4.1:busybox-1.34.1-4.9.1.x86_64", "SUSE Manager Retail Branch Server 4.1:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Manager Server 4.1:busybox-1.34.1-4.9.1.ppc64le", "SUSE Manager Server 4.1:busybox-1.34.1-4.9.1.s390x", "SUSE Manager Server 4.1:busybox-1.34.1-4.9.1.x86_64", "SUSE Manager Server 4.1:busybox-static-1.34.1-4.9.1.ppc64le", "SUSE Manager Server 4.1:busybox-static-1.34.1-4.9.1.s390x", "SUSE Manager Server 4.1:busybox-static-1.34.1-4.9.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2022-01-20T09:05:15Z", details: "moderate", }, ], title: "CVE-2021-42377", }, { cve: "CVE-2021-42378", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2021-42378", }, ], notes: [ { category: "general", text: "A use-after-free in Busybox's awk applet leads to denial of service and possibly code execution when processing a crafted awk pattern in the getvar_i function", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Enterprise Storage 6:busybox-1.34.1-4.9.1.aarch64", "SUSE Enterprise Storage 6:busybox-1.34.1-4.9.1.x86_64", "SUSE Enterprise Storage 6:busybox-static-1.34.1-4.9.1.aarch64", "SUSE Enterprise Storage 6:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Enterprise Storage 7:busybox-1.34.1-4.9.1.aarch64", "SUSE Enterprise Storage 7:busybox-1.34.1-4.9.1.x86_64", "SUSE Enterprise Storage 7:busybox-static-1.34.1-4.9.1.aarch64", "SUSE Enterprise Storage 7:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:busybox-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:busybox-static-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:busybox-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:busybox-static-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:busybox-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:busybox-static-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:busybox-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:busybox-static-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:busybox-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:busybox-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-1.34.1-4.9.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-static-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-static-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-static-1.34.1-4.9.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-1.34.1-4.9.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-static-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-static-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-static-1.34.1-4.9.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-1.34.1-4.9.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-static-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-static-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-static-1.34.1-4.9.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:busybox-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:busybox-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:busybox-1.34.1-4.9.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:busybox-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:busybox-static-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:busybox-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:busybox-static-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:busybox-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:busybox-1.34.1-4.9.1.x86_64", "SUSE Manager Proxy 4.1:busybox-1.34.1-4.9.1.x86_64", "SUSE Manager Proxy 4.1:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Manager Retail Branch Server 4.1:busybox-1.34.1-4.9.1.x86_64", "SUSE Manager Retail Branch Server 4.1:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Manager Server 4.1:busybox-1.34.1-4.9.1.ppc64le", "SUSE Manager Server 4.1:busybox-1.34.1-4.9.1.s390x", "SUSE Manager Server 4.1:busybox-1.34.1-4.9.1.x86_64", "SUSE Manager Server 4.1:busybox-static-1.34.1-4.9.1.ppc64le", "SUSE Manager Server 4.1:busybox-static-1.34.1-4.9.1.s390x", "SUSE Manager Server 4.1:busybox-static-1.34.1-4.9.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2021-42378", url: "https://www.suse.com/security/cve/CVE-2021-42378", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Enterprise Storage 6:busybox-1.34.1-4.9.1.aarch64", "SUSE Enterprise Storage 6:busybox-1.34.1-4.9.1.x86_64", "SUSE Enterprise Storage 6:busybox-static-1.34.1-4.9.1.aarch64", "SUSE Enterprise Storage 6:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Enterprise Storage 7:busybox-1.34.1-4.9.1.aarch64", "SUSE Enterprise Storage 7:busybox-1.34.1-4.9.1.x86_64", "SUSE Enterprise Storage 7:busybox-static-1.34.1-4.9.1.aarch64", "SUSE Enterprise Storage 7:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:busybox-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:busybox-static-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:busybox-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:busybox-static-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:busybox-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:busybox-static-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:busybox-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:busybox-static-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:busybox-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:busybox-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-1.34.1-4.9.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-static-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-static-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-static-1.34.1-4.9.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-1.34.1-4.9.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-static-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-static-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-static-1.34.1-4.9.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-1.34.1-4.9.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-static-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-static-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-static-1.34.1-4.9.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:busybox-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:busybox-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:busybox-1.34.1-4.9.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:busybox-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:busybox-static-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:busybox-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:busybox-static-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:busybox-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:busybox-1.34.1-4.9.1.x86_64", "SUSE Manager Proxy 4.1:busybox-1.34.1-4.9.1.x86_64", "SUSE Manager Proxy 4.1:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Manager Retail Branch Server 4.1:busybox-1.34.1-4.9.1.x86_64", "SUSE Manager Retail Branch Server 4.1:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Manager Server 4.1:busybox-1.34.1-4.9.1.ppc64le", "SUSE Manager Server 4.1:busybox-1.34.1-4.9.1.s390x", "SUSE Manager Server 4.1:busybox-1.34.1-4.9.1.x86_64", "SUSE Manager Server 4.1:busybox-static-1.34.1-4.9.1.ppc64le", "SUSE Manager Server 4.1:busybox-static-1.34.1-4.9.1.s390x", "SUSE Manager Server 4.1:busybox-static-1.34.1-4.9.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 6.6, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, products: [ "SUSE Enterprise Storage 6:busybox-1.34.1-4.9.1.aarch64", "SUSE Enterprise Storage 6:busybox-1.34.1-4.9.1.x86_64", "SUSE Enterprise Storage 6:busybox-static-1.34.1-4.9.1.aarch64", "SUSE Enterprise Storage 6:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Enterprise Storage 7:busybox-1.34.1-4.9.1.aarch64", "SUSE Enterprise Storage 7:busybox-1.34.1-4.9.1.x86_64", "SUSE Enterprise Storage 7:busybox-static-1.34.1-4.9.1.aarch64", "SUSE Enterprise Storage 7:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:busybox-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:busybox-static-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:busybox-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:busybox-static-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:busybox-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:busybox-static-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:busybox-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:busybox-static-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:busybox-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:busybox-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-1.34.1-4.9.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-static-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-static-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-static-1.34.1-4.9.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-1.34.1-4.9.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-static-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-static-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-static-1.34.1-4.9.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-1.34.1-4.9.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-static-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-static-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-static-1.34.1-4.9.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:busybox-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:busybox-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:busybox-1.34.1-4.9.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:busybox-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:busybox-static-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:busybox-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:busybox-static-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:busybox-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:busybox-1.34.1-4.9.1.x86_64", "SUSE Manager Proxy 4.1:busybox-1.34.1-4.9.1.x86_64", "SUSE Manager Proxy 4.1:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Manager Retail Branch Server 4.1:busybox-1.34.1-4.9.1.x86_64", "SUSE Manager Retail Branch Server 4.1:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Manager Server 4.1:busybox-1.34.1-4.9.1.ppc64le", "SUSE Manager Server 4.1:busybox-1.34.1-4.9.1.s390x", "SUSE Manager Server 4.1:busybox-1.34.1-4.9.1.x86_64", "SUSE Manager Server 4.1:busybox-static-1.34.1-4.9.1.ppc64le", "SUSE Manager Server 4.1:busybox-static-1.34.1-4.9.1.s390x", "SUSE Manager Server 4.1:busybox-static-1.34.1-4.9.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2022-01-20T09:05:15Z", details: "moderate", }, ], title: "CVE-2021-42378", }, { cve: "CVE-2021-42379", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2021-42379", }, ], notes: [ { category: "general", text: "A use-after-free in Busybox's awk applet leads to denial of service and possibly code execution when processing a crafted awk pattern in the next_input_file function", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Enterprise Storage 6:busybox-1.34.1-4.9.1.aarch64", "SUSE Enterprise Storage 6:busybox-1.34.1-4.9.1.x86_64", "SUSE Enterprise Storage 6:busybox-static-1.34.1-4.9.1.aarch64", "SUSE Enterprise Storage 6:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Enterprise Storage 7:busybox-1.34.1-4.9.1.aarch64", "SUSE Enterprise Storage 7:busybox-1.34.1-4.9.1.x86_64", "SUSE Enterprise Storage 7:busybox-static-1.34.1-4.9.1.aarch64", "SUSE Enterprise Storage 7:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:busybox-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:busybox-static-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:busybox-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:busybox-static-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:busybox-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:busybox-static-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:busybox-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:busybox-static-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:busybox-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:busybox-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-1.34.1-4.9.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-static-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-static-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-static-1.34.1-4.9.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-1.34.1-4.9.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-static-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-static-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-static-1.34.1-4.9.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-1.34.1-4.9.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-static-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-static-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-static-1.34.1-4.9.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:busybox-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:busybox-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:busybox-1.34.1-4.9.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:busybox-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:busybox-static-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:busybox-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:busybox-static-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:busybox-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:busybox-1.34.1-4.9.1.x86_64", "SUSE Manager Proxy 4.1:busybox-1.34.1-4.9.1.x86_64", "SUSE Manager Proxy 4.1:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Manager Retail Branch Server 4.1:busybox-1.34.1-4.9.1.x86_64", "SUSE Manager Retail Branch Server 4.1:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Manager Server 4.1:busybox-1.34.1-4.9.1.ppc64le", "SUSE Manager Server 4.1:busybox-1.34.1-4.9.1.s390x", "SUSE Manager Server 4.1:busybox-1.34.1-4.9.1.x86_64", "SUSE Manager Server 4.1:busybox-static-1.34.1-4.9.1.ppc64le", "SUSE Manager Server 4.1:busybox-static-1.34.1-4.9.1.s390x", "SUSE Manager Server 4.1:busybox-static-1.34.1-4.9.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2021-42379", url: "https://www.suse.com/security/cve/CVE-2021-42379", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Enterprise Storage 6:busybox-1.34.1-4.9.1.aarch64", "SUSE Enterprise Storage 6:busybox-1.34.1-4.9.1.x86_64", "SUSE Enterprise Storage 6:busybox-static-1.34.1-4.9.1.aarch64", "SUSE Enterprise Storage 6:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Enterprise Storage 7:busybox-1.34.1-4.9.1.aarch64", "SUSE Enterprise Storage 7:busybox-1.34.1-4.9.1.x86_64", "SUSE Enterprise Storage 7:busybox-static-1.34.1-4.9.1.aarch64", "SUSE Enterprise Storage 7:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:busybox-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:busybox-static-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:busybox-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:busybox-static-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:busybox-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:busybox-static-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:busybox-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:busybox-static-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:busybox-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:busybox-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-1.34.1-4.9.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-static-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-static-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-static-1.34.1-4.9.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-1.34.1-4.9.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-static-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-static-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-static-1.34.1-4.9.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-1.34.1-4.9.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-static-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-static-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-static-1.34.1-4.9.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:busybox-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:busybox-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:busybox-1.34.1-4.9.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:busybox-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:busybox-static-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:busybox-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:busybox-static-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:busybox-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:busybox-1.34.1-4.9.1.x86_64", "SUSE Manager Proxy 4.1:busybox-1.34.1-4.9.1.x86_64", "SUSE Manager Proxy 4.1:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Manager Retail Branch Server 4.1:busybox-1.34.1-4.9.1.x86_64", "SUSE Manager Retail Branch Server 4.1:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Manager Server 4.1:busybox-1.34.1-4.9.1.ppc64le", "SUSE Manager Server 4.1:busybox-1.34.1-4.9.1.s390x", "SUSE Manager Server 4.1:busybox-1.34.1-4.9.1.x86_64", "SUSE Manager Server 4.1:busybox-static-1.34.1-4.9.1.ppc64le", "SUSE Manager Server 4.1:busybox-static-1.34.1-4.9.1.s390x", "SUSE Manager Server 4.1:busybox-static-1.34.1-4.9.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 6.6, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, products: [ "SUSE Enterprise Storage 6:busybox-1.34.1-4.9.1.aarch64", "SUSE Enterprise Storage 6:busybox-1.34.1-4.9.1.x86_64", "SUSE Enterprise Storage 6:busybox-static-1.34.1-4.9.1.aarch64", "SUSE Enterprise Storage 6:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Enterprise Storage 7:busybox-1.34.1-4.9.1.aarch64", "SUSE Enterprise Storage 7:busybox-1.34.1-4.9.1.x86_64", "SUSE Enterprise Storage 7:busybox-static-1.34.1-4.9.1.aarch64", "SUSE Enterprise Storage 7:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:busybox-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:busybox-static-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:busybox-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:busybox-static-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:busybox-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:busybox-static-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:busybox-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:busybox-static-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:busybox-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:busybox-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-1.34.1-4.9.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-static-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-static-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-static-1.34.1-4.9.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-1.34.1-4.9.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-static-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-static-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-static-1.34.1-4.9.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-1.34.1-4.9.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-static-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-static-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-static-1.34.1-4.9.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:busybox-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:busybox-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:busybox-1.34.1-4.9.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:busybox-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:busybox-static-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:busybox-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:busybox-static-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:busybox-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:busybox-1.34.1-4.9.1.x86_64", "SUSE Manager Proxy 4.1:busybox-1.34.1-4.9.1.x86_64", "SUSE Manager Proxy 4.1:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Manager Retail Branch Server 4.1:busybox-1.34.1-4.9.1.x86_64", "SUSE Manager Retail Branch Server 4.1:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Manager Server 4.1:busybox-1.34.1-4.9.1.ppc64le", "SUSE Manager Server 4.1:busybox-1.34.1-4.9.1.s390x", "SUSE Manager Server 4.1:busybox-1.34.1-4.9.1.x86_64", "SUSE Manager Server 4.1:busybox-static-1.34.1-4.9.1.ppc64le", "SUSE Manager Server 4.1:busybox-static-1.34.1-4.9.1.s390x", "SUSE Manager Server 4.1:busybox-static-1.34.1-4.9.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2022-01-20T09:05:15Z", details: "moderate", }, ], title: "CVE-2021-42379", }, { cve: "CVE-2021-42380", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2021-42380", }, ], notes: [ { category: "general", text: "A use-after-free in Busybox's awk applet leads to denial of service and possibly code execution when processing a crafted awk pattern in the clrvar function", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Enterprise Storage 6:busybox-1.34.1-4.9.1.aarch64", "SUSE Enterprise Storage 6:busybox-1.34.1-4.9.1.x86_64", "SUSE Enterprise Storage 6:busybox-static-1.34.1-4.9.1.aarch64", "SUSE Enterprise Storage 6:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Enterprise Storage 7:busybox-1.34.1-4.9.1.aarch64", "SUSE Enterprise Storage 7:busybox-1.34.1-4.9.1.x86_64", "SUSE Enterprise Storage 7:busybox-static-1.34.1-4.9.1.aarch64", "SUSE Enterprise Storage 7:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:busybox-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:busybox-static-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:busybox-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:busybox-static-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:busybox-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:busybox-static-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:busybox-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:busybox-static-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:busybox-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:busybox-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-1.34.1-4.9.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-static-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-static-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-static-1.34.1-4.9.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-1.34.1-4.9.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-static-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-static-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-static-1.34.1-4.9.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-1.34.1-4.9.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-static-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-static-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-static-1.34.1-4.9.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:busybox-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:busybox-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:busybox-1.34.1-4.9.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:busybox-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:busybox-static-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:busybox-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:busybox-static-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:busybox-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:busybox-1.34.1-4.9.1.x86_64", "SUSE Manager Proxy 4.1:busybox-1.34.1-4.9.1.x86_64", "SUSE Manager Proxy 4.1:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Manager Retail Branch Server 4.1:busybox-1.34.1-4.9.1.x86_64", "SUSE Manager Retail Branch Server 4.1:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Manager Server 4.1:busybox-1.34.1-4.9.1.ppc64le", "SUSE Manager Server 4.1:busybox-1.34.1-4.9.1.s390x", "SUSE Manager Server 4.1:busybox-1.34.1-4.9.1.x86_64", "SUSE Manager Server 4.1:busybox-static-1.34.1-4.9.1.ppc64le", "SUSE Manager Server 4.1:busybox-static-1.34.1-4.9.1.s390x", "SUSE Manager Server 4.1:busybox-static-1.34.1-4.9.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2021-42380", url: "https://www.suse.com/security/cve/CVE-2021-42380", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Enterprise Storage 6:busybox-1.34.1-4.9.1.aarch64", "SUSE Enterprise Storage 6:busybox-1.34.1-4.9.1.x86_64", "SUSE Enterprise Storage 6:busybox-static-1.34.1-4.9.1.aarch64", "SUSE Enterprise Storage 6:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Enterprise Storage 7:busybox-1.34.1-4.9.1.aarch64", "SUSE Enterprise Storage 7:busybox-1.34.1-4.9.1.x86_64", "SUSE Enterprise Storage 7:busybox-static-1.34.1-4.9.1.aarch64", "SUSE Enterprise Storage 7:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:busybox-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:busybox-static-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:busybox-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:busybox-static-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:busybox-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:busybox-static-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:busybox-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:busybox-static-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:busybox-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:busybox-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-1.34.1-4.9.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-static-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-static-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-static-1.34.1-4.9.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-1.34.1-4.9.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-static-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-static-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-static-1.34.1-4.9.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-1.34.1-4.9.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-static-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-static-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-static-1.34.1-4.9.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:busybox-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:busybox-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:busybox-1.34.1-4.9.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:busybox-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:busybox-static-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:busybox-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:busybox-static-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:busybox-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:busybox-1.34.1-4.9.1.x86_64", "SUSE Manager Proxy 4.1:busybox-1.34.1-4.9.1.x86_64", "SUSE Manager Proxy 4.1:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Manager Retail Branch Server 4.1:busybox-1.34.1-4.9.1.x86_64", "SUSE Manager Retail Branch Server 4.1:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Manager Server 4.1:busybox-1.34.1-4.9.1.ppc64le", "SUSE Manager Server 4.1:busybox-1.34.1-4.9.1.s390x", "SUSE Manager Server 4.1:busybox-1.34.1-4.9.1.x86_64", "SUSE Manager Server 4.1:busybox-static-1.34.1-4.9.1.ppc64le", "SUSE Manager Server 4.1:busybox-static-1.34.1-4.9.1.s390x", "SUSE Manager Server 4.1:busybox-static-1.34.1-4.9.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 6.6, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, products: [ "SUSE Enterprise Storage 6:busybox-1.34.1-4.9.1.aarch64", "SUSE Enterprise Storage 6:busybox-1.34.1-4.9.1.x86_64", "SUSE Enterprise Storage 6:busybox-static-1.34.1-4.9.1.aarch64", "SUSE Enterprise Storage 6:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Enterprise Storage 7:busybox-1.34.1-4.9.1.aarch64", "SUSE Enterprise Storage 7:busybox-1.34.1-4.9.1.x86_64", "SUSE Enterprise Storage 7:busybox-static-1.34.1-4.9.1.aarch64", "SUSE Enterprise Storage 7:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:busybox-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:busybox-static-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:busybox-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:busybox-static-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:busybox-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:busybox-static-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:busybox-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:busybox-static-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:busybox-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:busybox-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-1.34.1-4.9.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-static-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-static-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-static-1.34.1-4.9.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-1.34.1-4.9.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-static-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-static-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-static-1.34.1-4.9.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-1.34.1-4.9.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-static-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-static-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-static-1.34.1-4.9.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:busybox-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:busybox-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:busybox-1.34.1-4.9.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:busybox-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:busybox-static-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:busybox-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:busybox-static-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:busybox-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:busybox-1.34.1-4.9.1.x86_64", "SUSE Manager Proxy 4.1:busybox-1.34.1-4.9.1.x86_64", "SUSE Manager Proxy 4.1:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Manager Retail Branch Server 4.1:busybox-1.34.1-4.9.1.x86_64", "SUSE Manager Retail Branch Server 4.1:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Manager Server 4.1:busybox-1.34.1-4.9.1.ppc64le", "SUSE Manager Server 4.1:busybox-1.34.1-4.9.1.s390x", "SUSE Manager Server 4.1:busybox-1.34.1-4.9.1.x86_64", "SUSE Manager Server 4.1:busybox-static-1.34.1-4.9.1.ppc64le", "SUSE Manager Server 4.1:busybox-static-1.34.1-4.9.1.s390x", "SUSE Manager Server 4.1:busybox-static-1.34.1-4.9.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2022-01-20T09:05:15Z", details: "moderate", }, ], title: "CVE-2021-42380", }, { cve: "CVE-2021-42381", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2021-42381", }, ], notes: [ { category: "general", text: "A use-after-free in Busybox's awk applet leads to denial of service and possibly code execution when processing a crafted awk pattern in the hash_init function", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Enterprise Storage 6:busybox-1.34.1-4.9.1.aarch64", "SUSE Enterprise Storage 6:busybox-1.34.1-4.9.1.x86_64", "SUSE Enterprise Storage 6:busybox-static-1.34.1-4.9.1.aarch64", "SUSE Enterprise Storage 6:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Enterprise Storage 7:busybox-1.34.1-4.9.1.aarch64", "SUSE Enterprise Storage 7:busybox-1.34.1-4.9.1.x86_64", "SUSE Enterprise Storage 7:busybox-static-1.34.1-4.9.1.aarch64", "SUSE Enterprise Storage 7:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:busybox-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:busybox-static-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:busybox-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:busybox-static-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:busybox-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:busybox-static-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:busybox-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:busybox-static-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:busybox-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:busybox-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-1.34.1-4.9.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-static-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-static-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-static-1.34.1-4.9.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-1.34.1-4.9.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-static-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-static-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-static-1.34.1-4.9.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-1.34.1-4.9.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-static-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-static-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-static-1.34.1-4.9.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:busybox-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:busybox-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:busybox-1.34.1-4.9.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:busybox-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:busybox-static-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:busybox-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:busybox-static-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:busybox-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:busybox-1.34.1-4.9.1.x86_64", "SUSE Manager Proxy 4.1:busybox-1.34.1-4.9.1.x86_64", "SUSE Manager Proxy 4.1:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Manager Retail Branch Server 4.1:busybox-1.34.1-4.9.1.x86_64", "SUSE Manager Retail Branch Server 4.1:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Manager Server 4.1:busybox-1.34.1-4.9.1.ppc64le", "SUSE Manager Server 4.1:busybox-1.34.1-4.9.1.s390x", "SUSE Manager Server 4.1:busybox-1.34.1-4.9.1.x86_64", "SUSE Manager Server 4.1:busybox-static-1.34.1-4.9.1.ppc64le", "SUSE Manager Server 4.1:busybox-static-1.34.1-4.9.1.s390x", "SUSE Manager Server 4.1:busybox-static-1.34.1-4.9.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2021-42381", url: "https://www.suse.com/security/cve/CVE-2021-42381", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Enterprise Storage 6:busybox-1.34.1-4.9.1.aarch64", "SUSE Enterprise Storage 6:busybox-1.34.1-4.9.1.x86_64", "SUSE Enterprise Storage 6:busybox-static-1.34.1-4.9.1.aarch64", "SUSE Enterprise Storage 6:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Enterprise Storage 7:busybox-1.34.1-4.9.1.aarch64", "SUSE Enterprise Storage 7:busybox-1.34.1-4.9.1.x86_64", "SUSE Enterprise Storage 7:busybox-static-1.34.1-4.9.1.aarch64", "SUSE Enterprise Storage 7:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:busybox-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:busybox-static-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:busybox-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:busybox-static-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:busybox-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:busybox-static-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:busybox-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:busybox-static-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:busybox-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:busybox-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-1.34.1-4.9.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-static-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-static-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-static-1.34.1-4.9.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-1.34.1-4.9.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-static-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-static-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-static-1.34.1-4.9.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-1.34.1-4.9.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-static-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-static-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-static-1.34.1-4.9.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:busybox-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:busybox-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:busybox-1.34.1-4.9.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:busybox-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:busybox-static-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:busybox-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:busybox-static-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:busybox-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:busybox-1.34.1-4.9.1.x86_64", "SUSE Manager Proxy 4.1:busybox-1.34.1-4.9.1.x86_64", "SUSE Manager Proxy 4.1:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Manager Retail Branch Server 4.1:busybox-1.34.1-4.9.1.x86_64", "SUSE Manager Retail Branch Server 4.1:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Manager Server 4.1:busybox-1.34.1-4.9.1.ppc64le", "SUSE Manager Server 4.1:busybox-1.34.1-4.9.1.s390x", "SUSE Manager Server 4.1:busybox-1.34.1-4.9.1.x86_64", "SUSE Manager Server 4.1:busybox-static-1.34.1-4.9.1.ppc64le", "SUSE Manager Server 4.1:busybox-static-1.34.1-4.9.1.s390x", "SUSE Manager Server 4.1:busybox-static-1.34.1-4.9.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 6.6, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, products: [ "SUSE Enterprise Storage 6:busybox-1.34.1-4.9.1.aarch64", "SUSE Enterprise Storage 6:busybox-1.34.1-4.9.1.x86_64", "SUSE Enterprise Storage 6:busybox-static-1.34.1-4.9.1.aarch64", "SUSE Enterprise Storage 6:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Enterprise Storage 7:busybox-1.34.1-4.9.1.aarch64", "SUSE Enterprise Storage 7:busybox-1.34.1-4.9.1.x86_64", "SUSE Enterprise Storage 7:busybox-static-1.34.1-4.9.1.aarch64", "SUSE Enterprise Storage 7:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:busybox-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:busybox-static-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:busybox-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:busybox-static-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:busybox-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:busybox-static-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:busybox-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:busybox-static-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:busybox-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:busybox-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-1.34.1-4.9.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-static-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-static-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-static-1.34.1-4.9.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-1.34.1-4.9.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-static-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-static-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-static-1.34.1-4.9.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-1.34.1-4.9.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-static-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-static-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-static-1.34.1-4.9.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:busybox-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:busybox-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:busybox-1.34.1-4.9.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:busybox-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:busybox-static-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:busybox-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:busybox-static-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:busybox-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:busybox-1.34.1-4.9.1.x86_64", "SUSE Manager Proxy 4.1:busybox-1.34.1-4.9.1.x86_64", "SUSE Manager Proxy 4.1:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Manager Retail Branch Server 4.1:busybox-1.34.1-4.9.1.x86_64", "SUSE Manager Retail Branch Server 4.1:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Manager Server 4.1:busybox-1.34.1-4.9.1.ppc64le", "SUSE Manager Server 4.1:busybox-1.34.1-4.9.1.s390x", "SUSE Manager Server 4.1:busybox-1.34.1-4.9.1.x86_64", "SUSE Manager Server 4.1:busybox-static-1.34.1-4.9.1.ppc64le", "SUSE Manager Server 4.1:busybox-static-1.34.1-4.9.1.s390x", "SUSE Manager Server 4.1:busybox-static-1.34.1-4.9.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2022-01-20T09:05:15Z", details: "moderate", }, ], title: "CVE-2021-42381", }, { cve: "CVE-2021-42382", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2021-42382", }, ], notes: [ { category: "general", text: "A use-after-free in Busybox's awk applet leads to denial of service and possibly code execution when processing a crafted awk pattern in the getvar_s function", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Enterprise Storage 6:busybox-1.34.1-4.9.1.aarch64", "SUSE Enterprise Storage 6:busybox-1.34.1-4.9.1.x86_64", "SUSE Enterprise Storage 6:busybox-static-1.34.1-4.9.1.aarch64", "SUSE Enterprise Storage 6:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Enterprise Storage 7:busybox-1.34.1-4.9.1.aarch64", "SUSE Enterprise Storage 7:busybox-1.34.1-4.9.1.x86_64", "SUSE Enterprise Storage 7:busybox-static-1.34.1-4.9.1.aarch64", "SUSE Enterprise Storage 7:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:busybox-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:busybox-static-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:busybox-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:busybox-static-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:busybox-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:busybox-static-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:busybox-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:busybox-static-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:busybox-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:busybox-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-1.34.1-4.9.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-static-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-static-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-static-1.34.1-4.9.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-1.34.1-4.9.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-static-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-static-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-static-1.34.1-4.9.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-1.34.1-4.9.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-static-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-static-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-static-1.34.1-4.9.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:busybox-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:busybox-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:busybox-1.34.1-4.9.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:busybox-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:busybox-static-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:busybox-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:busybox-static-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:busybox-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:busybox-1.34.1-4.9.1.x86_64", "SUSE Manager Proxy 4.1:busybox-1.34.1-4.9.1.x86_64", "SUSE Manager Proxy 4.1:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Manager Retail Branch Server 4.1:busybox-1.34.1-4.9.1.x86_64", "SUSE Manager Retail Branch Server 4.1:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Manager Server 4.1:busybox-1.34.1-4.9.1.ppc64le", "SUSE Manager Server 4.1:busybox-1.34.1-4.9.1.s390x", "SUSE Manager Server 4.1:busybox-1.34.1-4.9.1.x86_64", "SUSE Manager Server 4.1:busybox-static-1.34.1-4.9.1.ppc64le", "SUSE Manager Server 4.1:busybox-static-1.34.1-4.9.1.s390x", "SUSE Manager Server 4.1:busybox-static-1.34.1-4.9.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2021-42382", url: "https://www.suse.com/security/cve/CVE-2021-42382", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Enterprise Storage 6:busybox-1.34.1-4.9.1.aarch64", "SUSE Enterprise Storage 6:busybox-1.34.1-4.9.1.x86_64", "SUSE Enterprise Storage 6:busybox-static-1.34.1-4.9.1.aarch64", "SUSE Enterprise Storage 6:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Enterprise Storage 7:busybox-1.34.1-4.9.1.aarch64", "SUSE Enterprise Storage 7:busybox-1.34.1-4.9.1.x86_64", "SUSE Enterprise Storage 7:busybox-static-1.34.1-4.9.1.aarch64", "SUSE Enterprise Storage 7:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:busybox-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:busybox-static-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:busybox-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:busybox-static-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:busybox-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:busybox-static-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:busybox-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:busybox-static-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:busybox-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:busybox-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-1.34.1-4.9.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-static-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-static-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-static-1.34.1-4.9.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-1.34.1-4.9.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-static-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-static-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-static-1.34.1-4.9.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-1.34.1-4.9.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-static-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-static-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-static-1.34.1-4.9.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:busybox-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:busybox-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:busybox-1.34.1-4.9.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:busybox-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:busybox-static-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:busybox-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:busybox-static-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:busybox-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:busybox-1.34.1-4.9.1.x86_64", "SUSE Manager Proxy 4.1:busybox-1.34.1-4.9.1.x86_64", "SUSE Manager Proxy 4.1:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Manager Retail Branch Server 4.1:busybox-1.34.1-4.9.1.x86_64", "SUSE Manager Retail Branch Server 4.1:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Manager Server 4.1:busybox-1.34.1-4.9.1.ppc64le", "SUSE Manager Server 4.1:busybox-1.34.1-4.9.1.s390x", "SUSE Manager Server 4.1:busybox-1.34.1-4.9.1.x86_64", "SUSE Manager Server 4.1:busybox-static-1.34.1-4.9.1.ppc64le", "SUSE Manager Server 4.1:busybox-static-1.34.1-4.9.1.s390x", "SUSE Manager Server 4.1:busybox-static-1.34.1-4.9.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 6.6, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, products: [ "SUSE Enterprise Storage 6:busybox-1.34.1-4.9.1.aarch64", "SUSE Enterprise Storage 6:busybox-1.34.1-4.9.1.x86_64", "SUSE Enterprise Storage 6:busybox-static-1.34.1-4.9.1.aarch64", "SUSE Enterprise Storage 6:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Enterprise Storage 7:busybox-1.34.1-4.9.1.aarch64", "SUSE Enterprise Storage 7:busybox-1.34.1-4.9.1.x86_64", "SUSE Enterprise Storage 7:busybox-static-1.34.1-4.9.1.aarch64", "SUSE Enterprise Storage 7:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:busybox-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:busybox-static-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:busybox-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:busybox-static-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:busybox-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:busybox-static-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:busybox-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:busybox-static-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:busybox-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:busybox-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-1.34.1-4.9.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-static-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-static-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-static-1.34.1-4.9.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-1.34.1-4.9.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-static-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-static-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-static-1.34.1-4.9.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-1.34.1-4.9.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-static-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-static-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-static-1.34.1-4.9.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:busybox-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:busybox-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:busybox-1.34.1-4.9.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:busybox-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:busybox-static-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:busybox-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:busybox-static-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:busybox-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:busybox-1.34.1-4.9.1.x86_64", "SUSE Manager Proxy 4.1:busybox-1.34.1-4.9.1.x86_64", "SUSE Manager Proxy 4.1:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Manager Retail Branch Server 4.1:busybox-1.34.1-4.9.1.x86_64", "SUSE Manager Retail Branch Server 4.1:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Manager Server 4.1:busybox-1.34.1-4.9.1.ppc64le", "SUSE Manager Server 4.1:busybox-1.34.1-4.9.1.s390x", "SUSE Manager Server 4.1:busybox-1.34.1-4.9.1.x86_64", "SUSE Manager Server 4.1:busybox-static-1.34.1-4.9.1.ppc64le", "SUSE Manager Server 4.1:busybox-static-1.34.1-4.9.1.s390x", "SUSE Manager Server 4.1:busybox-static-1.34.1-4.9.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2022-01-20T09:05:15Z", details: "moderate", }, ], title: "CVE-2021-42382", }, { cve: "CVE-2021-42383", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2021-42383", }, ], notes: [ { category: "general", text: "A use-after-free in Busybox's awk applet leads to denial of service and possibly code execution when processing a crafted awk pattern in the evaluate function", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Enterprise Storage 6:busybox-1.34.1-4.9.1.aarch64", "SUSE Enterprise Storage 6:busybox-1.34.1-4.9.1.x86_64", "SUSE Enterprise Storage 6:busybox-static-1.34.1-4.9.1.aarch64", "SUSE Enterprise Storage 6:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Enterprise Storage 7:busybox-1.34.1-4.9.1.aarch64", "SUSE Enterprise Storage 7:busybox-1.34.1-4.9.1.x86_64", "SUSE Enterprise Storage 7:busybox-static-1.34.1-4.9.1.aarch64", "SUSE Enterprise Storage 7:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:busybox-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:busybox-static-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:busybox-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:busybox-static-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:busybox-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:busybox-static-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:busybox-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:busybox-static-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:busybox-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:busybox-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-1.34.1-4.9.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-static-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-static-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-static-1.34.1-4.9.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-1.34.1-4.9.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-static-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-static-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-static-1.34.1-4.9.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-1.34.1-4.9.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-static-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-static-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-static-1.34.1-4.9.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:busybox-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:busybox-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:busybox-1.34.1-4.9.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:busybox-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:busybox-static-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:busybox-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:busybox-static-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:busybox-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:busybox-1.34.1-4.9.1.x86_64", "SUSE Manager Proxy 4.1:busybox-1.34.1-4.9.1.x86_64", "SUSE Manager Proxy 4.1:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Manager Retail Branch Server 4.1:busybox-1.34.1-4.9.1.x86_64", "SUSE Manager Retail Branch Server 4.1:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Manager Server 4.1:busybox-1.34.1-4.9.1.ppc64le", "SUSE Manager Server 4.1:busybox-1.34.1-4.9.1.s390x", "SUSE Manager Server 4.1:busybox-1.34.1-4.9.1.x86_64", "SUSE Manager Server 4.1:busybox-static-1.34.1-4.9.1.ppc64le", "SUSE Manager Server 4.1:busybox-static-1.34.1-4.9.1.s390x", "SUSE Manager Server 4.1:busybox-static-1.34.1-4.9.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2021-42383", url: "https://www.suse.com/security/cve/CVE-2021-42383", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Enterprise Storage 6:busybox-1.34.1-4.9.1.aarch64", "SUSE Enterprise Storage 6:busybox-1.34.1-4.9.1.x86_64", "SUSE Enterprise Storage 6:busybox-static-1.34.1-4.9.1.aarch64", "SUSE Enterprise Storage 6:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Enterprise Storage 7:busybox-1.34.1-4.9.1.aarch64", "SUSE Enterprise Storage 7:busybox-1.34.1-4.9.1.x86_64", "SUSE Enterprise Storage 7:busybox-static-1.34.1-4.9.1.aarch64", "SUSE Enterprise Storage 7:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:busybox-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:busybox-static-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:busybox-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:busybox-static-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:busybox-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:busybox-static-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:busybox-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:busybox-static-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:busybox-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:busybox-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-1.34.1-4.9.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-static-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-static-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-static-1.34.1-4.9.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-1.34.1-4.9.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-static-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-static-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-static-1.34.1-4.9.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-1.34.1-4.9.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-static-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-static-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-static-1.34.1-4.9.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:busybox-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:busybox-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:busybox-1.34.1-4.9.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:busybox-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:busybox-static-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:busybox-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:busybox-static-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:busybox-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:busybox-1.34.1-4.9.1.x86_64", "SUSE Manager Proxy 4.1:busybox-1.34.1-4.9.1.x86_64", "SUSE Manager Proxy 4.1:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Manager Retail Branch Server 4.1:busybox-1.34.1-4.9.1.x86_64", "SUSE Manager Retail Branch Server 4.1:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Manager Server 4.1:busybox-1.34.1-4.9.1.ppc64le", "SUSE Manager Server 4.1:busybox-1.34.1-4.9.1.s390x", "SUSE Manager Server 4.1:busybox-1.34.1-4.9.1.x86_64", "SUSE Manager Server 4.1:busybox-static-1.34.1-4.9.1.ppc64le", "SUSE Manager Server 4.1:busybox-static-1.34.1-4.9.1.s390x", "SUSE Manager Server 4.1:busybox-static-1.34.1-4.9.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 6.6, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, products: [ "SUSE Enterprise Storage 6:busybox-1.34.1-4.9.1.aarch64", "SUSE Enterprise Storage 6:busybox-1.34.1-4.9.1.x86_64", "SUSE Enterprise Storage 6:busybox-static-1.34.1-4.9.1.aarch64", "SUSE Enterprise Storage 6:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Enterprise Storage 7:busybox-1.34.1-4.9.1.aarch64", "SUSE Enterprise Storage 7:busybox-1.34.1-4.9.1.x86_64", "SUSE Enterprise Storage 7:busybox-static-1.34.1-4.9.1.aarch64", "SUSE Enterprise Storage 7:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:busybox-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:busybox-static-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:busybox-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:busybox-static-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:busybox-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:busybox-static-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:busybox-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:busybox-static-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:busybox-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:busybox-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-1.34.1-4.9.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-static-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-static-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-static-1.34.1-4.9.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-1.34.1-4.9.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-static-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-static-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-static-1.34.1-4.9.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-1.34.1-4.9.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-static-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-static-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-static-1.34.1-4.9.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:busybox-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:busybox-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:busybox-1.34.1-4.9.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:busybox-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:busybox-static-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:busybox-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:busybox-static-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:busybox-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:busybox-1.34.1-4.9.1.x86_64", "SUSE Manager Proxy 4.1:busybox-1.34.1-4.9.1.x86_64", "SUSE Manager Proxy 4.1:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Manager Retail Branch Server 4.1:busybox-1.34.1-4.9.1.x86_64", "SUSE Manager Retail Branch Server 4.1:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Manager Server 4.1:busybox-1.34.1-4.9.1.ppc64le", "SUSE Manager Server 4.1:busybox-1.34.1-4.9.1.s390x", "SUSE Manager Server 4.1:busybox-1.34.1-4.9.1.x86_64", "SUSE Manager Server 4.1:busybox-static-1.34.1-4.9.1.ppc64le", "SUSE Manager Server 4.1:busybox-static-1.34.1-4.9.1.s390x", "SUSE Manager Server 4.1:busybox-static-1.34.1-4.9.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2022-01-20T09:05:15Z", details: "moderate", }, ], title: "CVE-2021-42383", }, { cve: "CVE-2021-42384", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2021-42384", }, ], notes: [ { category: "general", text: "A use-after-free in Busybox's awk applet leads to denial of service and possibly code execution when processing a crafted awk pattern in the handle_special function", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Enterprise Storage 6:busybox-1.34.1-4.9.1.aarch64", "SUSE Enterprise Storage 6:busybox-1.34.1-4.9.1.x86_64", "SUSE Enterprise Storage 6:busybox-static-1.34.1-4.9.1.aarch64", "SUSE Enterprise Storage 6:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Enterprise Storage 7:busybox-1.34.1-4.9.1.aarch64", "SUSE Enterprise Storage 7:busybox-1.34.1-4.9.1.x86_64", "SUSE Enterprise Storage 7:busybox-static-1.34.1-4.9.1.aarch64", "SUSE Enterprise Storage 7:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:busybox-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:busybox-static-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:busybox-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:busybox-static-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:busybox-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:busybox-static-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:busybox-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:busybox-static-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:busybox-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:busybox-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-1.34.1-4.9.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-static-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-static-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-static-1.34.1-4.9.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-1.34.1-4.9.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-static-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-static-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-static-1.34.1-4.9.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-1.34.1-4.9.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-static-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-static-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-static-1.34.1-4.9.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:busybox-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:busybox-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:busybox-1.34.1-4.9.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:busybox-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:busybox-static-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:busybox-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:busybox-static-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:busybox-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:busybox-1.34.1-4.9.1.x86_64", "SUSE Manager Proxy 4.1:busybox-1.34.1-4.9.1.x86_64", "SUSE Manager Proxy 4.1:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Manager Retail Branch Server 4.1:busybox-1.34.1-4.9.1.x86_64", "SUSE Manager Retail Branch Server 4.1:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Manager Server 4.1:busybox-1.34.1-4.9.1.ppc64le", "SUSE Manager Server 4.1:busybox-1.34.1-4.9.1.s390x", "SUSE Manager Server 4.1:busybox-1.34.1-4.9.1.x86_64", "SUSE Manager Server 4.1:busybox-static-1.34.1-4.9.1.ppc64le", "SUSE Manager Server 4.1:busybox-static-1.34.1-4.9.1.s390x", "SUSE Manager Server 4.1:busybox-static-1.34.1-4.9.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2021-42384", url: "https://www.suse.com/security/cve/CVE-2021-42384", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Enterprise Storage 6:busybox-1.34.1-4.9.1.aarch64", "SUSE Enterprise Storage 6:busybox-1.34.1-4.9.1.x86_64", "SUSE Enterprise Storage 6:busybox-static-1.34.1-4.9.1.aarch64", "SUSE Enterprise Storage 6:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Enterprise Storage 7:busybox-1.34.1-4.9.1.aarch64", "SUSE Enterprise Storage 7:busybox-1.34.1-4.9.1.x86_64", "SUSE Enterprise Storage 7:busybox-static-1.34.1-4.9.1.aarch64", "SUSE Enterprise Storage 7:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:busybox-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:busybox-static-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:busybox-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:busybox-static-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:busybox-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:busybox-static-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:busybox-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:busybox-static-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:busybox-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:busybox-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-1.34.1-4.9.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-static-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-static-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-static-1.34.1-4.9.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-1.34.1-4.9.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-static-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-static-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-static-1.34.1-4.9.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-1.34.1-4.9.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-static-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-static-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-static-1.34.1-4.9.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:busybox-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:busybox-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:busybox-1.34.1-4.9.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:busybox-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:busybox-static-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:busybox-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:busybox-static-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:busybox-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:busybox-1.34.1-4.9.1.x86_64", "SUSE Manager Proxy 4.1:busybox-1.34.1-4.9.1.x86_64", "SUSE Manager Proxy 4.1:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Manager Retail Branch Server 4.1:busybox-1.34.1-4.9.1.x86_64", "SUSE Manager Retail Branch Server 4.1:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Manager Server 4.1:busybox-1.34.1-4.9.1.ppc64le", "SUSE Manager Server 4.1:busybox-1.34.1-4.9.1.s390x", "SUSE Manager Server 4.1:busybox-1.34.1-4.9.1.x86_64", "SUSE Manager Server 4.1:busybox-static-1.34.1-4.9.1.ppc64le", "SUSE Manager Server 4.1:busybox-static-1.34.1-4.9.1.s390x", "SUSE Manager Server 4.1:busybox-static-1.34.1-4.9.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 6.6, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, products: [ "SUSE Enterprise Storage 6:busybox-1.34.1-4.9.1.aarch64", "SUSE Enterprise Storage 6:busybox-1.34.1-4.9.1.x86_64", "SUSE Enterprise Storage 6:busybox-static-1.34.1-4.9.1.aarch64", "SUSE Enterprise Storage 6:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Enterprise Storage 7:busybox-1.34.1-4.9.1.aarch64", "SUSE Enterprise Storage 7:busybox-1.34.1-4.9.1.x86_64", "SUSE Enterprise Storage 7:busybox-static-1.34.1-4.9.1.aarch64", "SUSE Enterprise Storage 7:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:busybox-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:busybox-static-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:busybox-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:busybox-static-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:busybox-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:busybox-static-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:busybox-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:busybox-static-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:busybox-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:busybox-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-1.34.1-4.9.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-static-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-static-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-static-1.34.1-4.9.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-1.34.1-4.9.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-static-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-static-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-static-1.34.1-4.9.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-1.34.1-4.9.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-static-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-static-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-static-1.34.1-4.9.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:busybox-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:busybox-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:busybox-1.34.1-4.9.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:busybox-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:busybox-static-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:busybox-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:busybox-static-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:busybox-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:busybox-1.34.1-4.9.1.x86_64", "SUSE Manager Proxy 4.1:busybox-1.34.1-4.9.1.x86_64", "SUSE Manager Proxy 4.1:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Manager Retail Branch Server 4.1:busybox-1.34.1-4.9.1.x86_64", "SUSE Manager Retail Branch Server 4.1:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Manager Server 4.1:busybox-1.34.1-4.9.1.ppc64le", "SUSE Manager Server 4.1:busybox-1.34.1-4.9.1.s390x", "SUSE Manager Server 4.1:busybox-1.34.1-4.9.1.x86_64", "SUSE Manager Server 4.1:busybox-static-1.34.1-4.9.1.ppc64le", "SUSE Manager Server 4.1:busybox-static-1.34.1-4.9.1.s390x", "SUSE Manager Server 4.1:busybox-static-1.34.1-4.9.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2022-01-20T09:05:15Z", details: "moderate", }, ], title: "CVE-2021-42384", }, { cve: "CVE-2021-42385", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2021-42385", }, ], notes: [ { category: "general", text: "A use-after-free in Busybox's awk applet leads to denial of service and possibly code execution when processing a crafted awk pattern in the evaluate function", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Enterprise Storage 6:busybox-1.34.1-4.9.1.aarch64", "SUSE Enterprise Storage 6:busybox-1.34.1-4.9.1.x86_64", "SUSE Enterprise Storage 6:busybox-static-1.34.1-4.9.1.aarch64", "SUSE Enterprise Storage 6:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Enterprise Storage 7:busybox-1.34.1-4.9.1.aarch64", "SUSE Enterprise Storage 7:busybox-1.34.1-4.9.1.x86_64", "SUSE Enterprise Storage 7:busybox-static-1.34.1-4.9.1.aarch64", "SUSE Enterprise Storage 7:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:busybox-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:busybox-static-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:busybox-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:busybox-static-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:busybox-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:busybox-static-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:busybox-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:busybox-static-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:busybox-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:busybox-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-1.34.1-4.9.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-static-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-static-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-static-1.34.1-4.9.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-1.34.1-4.9.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-static-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-static-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-static-1.34.1-4.9.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-1.34.1-4.9.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-static-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-static-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-static-1.34.1-4.9.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:busybox-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:busybox-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:busybox-1.34.1-4.9.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:busybox-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:busybox-static-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:busybox-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:busybox-static-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:busybox-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:busybox-1.34.1-4.9.1.x86_64", "SUSE Manager Proxy 4.1:busybox-1.34.1-4.9.1.x86_64", "SUSE Manager Proxy 4.1:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Manager Retail Branch Server 4.1:busybox-1.34.1-4.9.1.x86_64", "SUSE Manager Retail Branch Server 4.1:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Manager Server 4.1:busybox-1.34.1-4.9.1.ppc64le", "SUSE Manager Server 4.1:busybox-1.34.1-4.9.1.s390x", "SUSE Manager Server 4.1:busybox-1.34.1-4.9.1.x86_64", "SUSE Manager Server 4.1:busybox-static-1.34.1-4.9.1.ppc64le", "SUSE Manager Server 4.1:busybox-static-1.34.1-4.9.1.s390x", "SUSE Manager Server 4.1:busybox-static-1.34.1-4.9.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2021-42385", url: "https://www.suse.com/security/cve/CVE-2021-42385", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Enterprise Storage 6:busybox-1.34.1-4.9.1.aarch64", "SUSE Enterprise Storage 6:busybox-1.34.1-4.9.1.x86_64", "SUSE Enterprise Storage 6:busybox-static-1.34.1-4.9.1.aarch64", "SUSE Enterprise Storage 6:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Enterprise Storage 7:busybox-1.34.1-4.9.1.aarch64", "SUSE Enterprise Storage 7:busybox-1.34.1-4.9.1.x86_64", "SUSE Enterprise Storage 7:busybox-static-1.34.1-4.9.1.aarch64", "SUSE Enterprise Storage 7:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:busybox-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:busybox-static-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:busybox-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:busybox-static-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:busybox-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:busybox-static-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:busybox-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:busybox-static-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:busybox-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:busybox-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-1.34.1-4.9.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-static-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-static-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-static-1.34.1-4.9.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-1.34.1-4.9.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-static-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-static-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-static-1.34.1-4.9.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-1.34.1-4.9.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-static-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-static-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-static-1.34.1-4.9.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:busybox-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:busybox-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:busybox-1.34.1-4.9.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:busybox-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:busybox-static-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:busybox-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:busybox-static-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:busybox-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:busybox-1.34.1-4.9.1.x86_64", "SUSE Manager Proxy 4.1:busybox-1.34.1-4.9.1.x86_64", "SUSE Manager Proxy 4.1:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Manager Retail Branch Server 4.1:busybox-1.34.1-4.9.1.x86_64", "SUSE Manager Retail Branch Server 4.1:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Manager Server 4.1:busybox-1.34.1-4.9.1.ppc64le", "SUSE Manager Server 4.1:busybox-1.34.1-4.9.1.s390x", "SUSE Manager Server 4.1:busybox-1.34.1-4.9.1.x86_64", "SUSE Manager Server 4.1:busybox-static-1.34.1-4.9.1.ppc64le", "SUSE Manager Server 4.1:busybox-static-1.34.1-4.9.1.s390x", "SUSE Manager Server 4.1:busybox-static-1.34.1-4.9.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 6.6, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, products: [ "SUSE Enterprise Storage 6:busybox-1.34.1-4.9.1.aarch64", "SUSE Enterprise Storage 6:busybox-1.34.1-4.9.1.x86_64", "SUSE Enterprise Storage 6:busybox-static-1.34.1-4.9.1.aarch64", "SUSE Enterprise Storage 6:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Enterprise Storage 7:busybox-1.34.1-4.9.1.aarch64", "SUSE Enterprise Storage 7:busybox-1.34.1-4.9.1.x86_64", "SUSE Enterprise Storage 7:busybox-static-1.34.1-4.9.1.aarch64", "SUSE Enterprise Storage 7:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:busybox-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:busybox-static-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:busybox-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:busybox-static-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:busybox-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:busybox-static-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:busybox-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:busybox-static-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:busybox-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:busybox-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-1.34.1-4.9.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-static-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-static-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-static-1.34.1-4.9.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-1.34.1-4.9.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-static-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-static-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-static-1.34.1-4.9.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-1.34.1-4.9.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-static-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-static-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-static-1.34.1-4.9.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:busybox-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:busybox-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:busybox-1.34.1-4.9.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:busybox-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:busybox-static-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:busybox-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:busybox-static-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:busybox-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:busybox-1.34.1-4.9.1.x86_64", "SUSE Manager Proxy 4.1:busybox-1.34.1-4.9.1.x86_64", "SUSE Manager Proxy 4.1:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Manager Retail Branch Server 4.1:busybox-1.34.1-4.9.1.x86_64", "SUSE Manager Retail Branch Server 4.1:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Manager Server 4.1:busybox-1.34.1-4.9.1.ppc64le", "SUSE Manager Server 4.1:busybox-1.34.1-4.9.1.s390x", "SUSE Manager Server 4.1:busybox-1.34.1-4.9.1.x86_64", "SUSE Manager Server 4.1:busybox-static-1.34.1-4.9.1.ppc64le", "SUSE Manager Server 4.1:busybox-static-1.34.1-4.9.1.s390x", "SUSE Manager Server 4.1:busybox-static-1.34.1-4.9.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2022-01-20T09:05:15Z", details: "moderate", }, ], title: "CVE-2021-42385", }, { cve: "CVE-2021-42386", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2021-42386", }, ], notes: [ { category: "general", text: "A use-after-free in Busybox's awk applet leads to denial of service and possibly code execution when processing a crafted awk pattern in the nvalloc function", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Enterprise Storage 6:busybox-1.34.1-4.9.1.aarch64", "SUSE Enterprise Storage 6:busybox-1.34.1-4.9.1.x86_64", "SUSE Enterprise Storage 6:busybox-static-1.34.1-4.9.1.aarch64", "SUSE Enterprise Storage 6:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Enterprise Storage 7:busybox-1.34.1-4.9.1.aarch64", "SUSE Enterprise Storage 7:busybox-1.34.1-4.9.1.x86_64", "SUSE Enterprise Storage 7:busybox-static-1.34.1-4.9.1.aarch64", "SUSE Enterprise Storage 7:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:busybox-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:busybox-static-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:busybox-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:busybox-static-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:busybox-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:busybox-static-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:busybox-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:busybox-static-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:busybox-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:busybox-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-1.34.1-4.9.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-static-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-static-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-static-1.34.1-4.9.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-1.34.1-4.9.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-static-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-static-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-static-1.34.1-4.9.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-1.34.1-4.9.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-static-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-static-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-static-1.34.1-4.9.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:busybox-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:busybox-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:busybox-1.34.1-4.9.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:busybox-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:busybox-static-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:busybox-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:busybox-static-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:busybox-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:busybox-1.34.1-4.9.1.x86_64", "SUSE Manager Proxy 4.1:busybox-1.34.1-4.9.1.x86_64", "SUSE Manager Proxy 4.1:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Manager Retail Branch Server 4.1:busybox-1.34.1-4.9.1.x86_64", "SUSE Manager Retail Branch Server 4.1:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Manager Server 4.1:busybox-1.34.1-4.9.1.ppc64le", "SUSE Manager Server 4.1:busybox-1.34.1-4.9.1.s390x", "SUSE Manager Server 4.1:busybox-1.34.1-4.9.1.x86_64", "SUSE Manager Server 4.1:busybox-static-1.34.1-4.9.1.ppc64le", "SUSE Manager Server 4.1:busybox-static-1.34.1-4.9.1.s390x", "SUSE Manager Server 4.1:busybox-static-1.34.1-4.9.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2021-42386", url: "https://www.suse.com/security/cve/CVE-2021-42386", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Enterprise Storage 6:busybox-1.34.1-4.9.1.aarch64", "SUSE Enterprise Storage 6:busybox-1.34.1-4.9.1.x86_64", "SUSE Enterprise Storage 6:busybox-static-1.34.1-4.9.1.aarch64", "SUSE Enterprise Storage 6:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Enterprise Storage 7:busybox-1.34.1-4.9.1.aarch64", "SUSE Enterprise Storage 7:busybox-1.34.1-4.9.1.x86_64", "SUSE Enterprise Storage 7:busybox-static-1.34.1-4.9.1.aarch64", "SUSE Enterprise Storage 7:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:busybox-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:busybox-static-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:busybox-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:busybox-static-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:busybox-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:busybox-static-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:busybox-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:busybox-static-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:busybox-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:busybox-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-1.34.1-4.9.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-static-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-static-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-static-1.34.1-4.9.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-1.34.1-4.9.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-static-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-static-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-static-1.34.1-4.9.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-1.34.1-4.9.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-static-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-static-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-static-1.34.1-4.9.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:busybox-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:busybox-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:busybox-1.34.1-4.9.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:busybox-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:busybox-static-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:busybox-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:busybox-static-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:busybox-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:busybox-1.34.1-4.9.1.x86_64", "SUSE Manager Proxy 4.1:busybox-1.34.1-4.9.1.x86_64", "SUSE Manager Proxy 4.1:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Manager Retail Branch Server 4.1:busybox-1.34.1-4.9.1.x86_64", "SUSE Manager Retail Branch Server 4.1:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Manager Server 4.1:busybox-1.34.1-4.9.1.ppc64le", "SUSE Manager Server 4.1:busybox-1.34.1-4.9.1.s390x", "SUSE Manager Server 4.1:busybox-1.34.1-4.9.1.x86_64", "SUSE Manager Server 4.1:busybox-static-1.34.1-4.9.1.ppc64le", "SUSE Manager Server 4.1:busybox-static-1.34.1-4.9.1.s390x", "SUSE Manager Server 4.1:busybox-static-1.34.1-4.9.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 6.6, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, products: [ "SUSE Enterprise Storage 6:busybox-1.34.1-4.9.1.aarch64", "SUSE Enterprise Storage 6:busybox-1.34.1-4.9.1.x86_64", "SUSE Enterprise Storage 6:busybox-static-1.34.1-4.9.1.aarch64", "SUSE Enterprise Storage 6:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Enterprise Storage 7:busybox-1.34.1-4.9.1.aarch64", "SUSE Enterprise Storage 7:busybox-1.34.1-4.9.1.x86_64", "SUSE Enterprise Storage 7:busybox-static-1.34.1-4.9.1.aarch64", "SUSE Enterprise Storage 7:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:busybox-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:busybox-static-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:busybox-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:busybox-static-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:busybox-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:busybox-static-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:busybox-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:busybox-static-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:busybox-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:busybox-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-1.34.1-4.9.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-static-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-static-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-static-1.34.1-4.9.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-1.34.1-4.9.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-static-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-static-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-static-1.34.1-4.9.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-1.34.1-4.9.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-static-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-static-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-static-1.34.1-4.9.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:busybox-1.34.1-4.9.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:busybox-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:busybox-1.34.1-4.9.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:busybox-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:busybox-static-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:busybox-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:busybox-static-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:busybox-1.34.1-4.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:busybox-1.34.1-4.9.1.x86_64", "SUSE Manager Proxy 4.1:busybox-1.34.1-4.9.1.x86_64", "SUSE Manager Proxy 4.1:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Manager Retail Branch Server 4.1:busybox-1.34.1-4.9.1.x86_64", "SUSE Manager Retail Branch Server 4.1:busybox-static-1.34.1-4.9.1.x86_64", "SUSE Manager Server 4.1:busybox-1.34.1-4.9.1.ppc64le", "SUSE Manager Server 4.1:busybox-1.34.1-4.9.1.s390x", "SUSE Manager Server 4.1:busybox-1.34.1-4.9.1.x86_64", "SUSE Manager Server 4.1:busybox-static-1.34.1-4.9.1.ppc64le", "SUSE Manager Server 4.1:busybox-static-1.34.1-4.9.1.s390x", "SUSE Manager Server 4.1:busybox-static-1.34.1-4.9.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2022-01-20T09:05:15Z", details: "moderate", }, ], title: "CVE-2021-42386", }, ], }
suse-su-2022:4253-1
Vulnerability from csaf_suse
Published
2022-11-28 10:23
Modified
2022-11-28 10:23
Summary
Security update for busybox
Notes
Title of the patch
Security update for busybox
Description of the patch
This update for busybox fixes the following issues:
- CVE-2014-9645: Fixed loading of unwanted modules with / (bsc#914660).
- CVE-2017-16544: Fixed insufficient sanitization of filenames when autocompleting (bsc#1069412).
- CVE-2015-9261: Fixed huft_build misuses a pointer, causing segfaults (bsc#1102912).
- CVE-2016-2147: Fixed out of bounds write (heap) due to integer underflow in udhcpc (bsc#970663).
- CVE-2016-2148: Fixed heap-based buffer overflow in OPTION_6RD parsing (bsc#970662).
- CVE-2016-6301: Fixed NTP server denial of service flaw (bsc#991940).
- CVE-2017-15873: Fixed integer overflow in get_next_block function in archival/libarchive/decompress_bunzip2.c (bsc#1064976).
- CVE-2017-15874: Fixed integer overflow in archival/libarchive/decompress_unlzma (bsc#1064978).
- CVE-2019-5747: Fixed out of bounds read in udhcp components (bsc#1121428).
- CVE-2021-42373, CVE-2021-42374, CVE-2021-42375, CVE-2021-42376, CVE-2021-42377, CVE-2021-42378, CVE-2021-42379, CVE-2021-42380, CVE-2021-42381, CVE-2021-42382, CVE-2021-42383, CVE-2021-42384, CVE-2021-42385, CVE-2021-42386: v1.34.0 bugfixes (bsc#1192869).
- CVE-2021-28831: Fixed invalid free or segmentation fault via malformed gzip data (bsc#1184522).
- CVE-2018-20679: Fixed out of bounds read in udhcp (bsc#1121426).
- CVE-2018-1000517: Fixed heap-based buffer overflow in the retrieve_file_data() (bsc#1099260).
- CVE-2011-5325: Fixed tar directory traversal (bsc#951562).
- CVE-2018-1000500: Fixed missing SSL certificate validation in wget (bsc#1099263).
- Update to 1.35.0
- awk: fix printf %%, fix read beyond end of buffer
- chrt: silence analyzer warning
- libarchive: remove duplicate forward declaration
- mount: 'mount -o rw ....' should not fall back to RO mount
- ps: fix -o pid=PID,args interpreting entire 'PID,args' as header
- tar: prevent malicious archives with long name sizes causing OOM
- udhcpc6: fix udhcp_find_option to actually find DHCP6 options
- xxd: fix -p -r
- support for new optoins added to basename, cpio, date, find,
mktemp, wget and others
- Enable fdisk (jsc#CAR-16)
- Update to 1.34.1:
* build system: use SOURCE_DATE_EPOCH for timestamp if available
* many bug fixes and new features
* touch: make FEATURE_TOUCH_NODEREF unconditional
- update to 1.33.1:
* httpd: fix sendfile
* ash: fix HISTFILE corruptio
* ash: fix unset variable pattern expansion
* traceroute: fix option parsing
* gunzip: fix for archive corruption
- Update to version 1.33.0
- many bug fixes and new features
- Update to version 1.32.1
- fixes a case where in ash, 'wait' never finishes.
- prepare usrmerge (bsc#1029961)
- Enable testsuite and package it for later rerun (for QA, jsc#CAR-15)
- Update to version 1.31.1:
+ Bug fix release. 1.30.1 has fixes for dc, ash (PS1 expansion
fix), hush, dpkg-deb, telnet and wget.
- Changes from version 1.31.0:
+ many bugfixes and new features.
- Add busybox-no-stime.patch: stime() has been deprecated in glibc
2.31 and replaced with clock_settime().
- update to 1.25.1:
* fixes for hush, gunzip, ip route, ntpd
- includes changes from 1.25.0:
* many added and expanded implementations of command options
- includes changes from 1.24.2:
* fixes for build system (static build with glibc fixed),
truncate, gunzip and unzip.
- Update to version 1.24.1
* for a full list of changes see http://www.busybox.net/news.html
- Refresh busybox.install.patch
- Update to 1.23.2
* for a full list of changes see http://www.busybox.net/news.html
- Cleaned up spec file with spec-cleaner
- Refreshed patches
- update to 1.22.1:
Many updates and fixes for most included tools, see
see http://www.busybox.net/news.html
Patchnames
SUSE-2022-4253,SUSE-OpenStack-Cloud-9-2022-4253,SUSE-OpenStack-Cloud-Crowbar-9-2022-4253,SUSE-SLE-SAP-12-SP4-2022-4253,SUSE-SLE-SERVER-12-SP2-BCL-2022-4253,SUSE-SLE-SERVER-12-SP3-BCL-2022-4253,SUSE-SLE-SERVER-12-SP4-LTSS-2022-4253,SUSE-SLE-SERVER-12-SP5-2022-4253
Terms of use
CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
{ document: { aggregate_severity: { namespace: "https://www.suse.com/support/security/rating/", text: "important", }, category: "csaf_security_advisory", csaf_version: "2.0", distribution: { text: "Copyright 2024 SUSE LLC. All rights reserved.", tlp: { label: "WHITE", url: "https://www.first.org/tlp/", }, }, lang: "en", notes: [ { category: "summary", text: "Security update for busybox", title: "Title of the patch", }, { category: "description", text: "This update for busybox fixes the following issues:\n\n- CVE-2014-9645: Fixed loading of unwanted modules with / (bsc#914660).\n- CVE-2017-16544: Fixed insufficient sanitization of filenames when autocompleting (bsc#1069412).\n- CVE-2015-9261: Fixed huft_build misuses a pointer, causing segfaults (bsc#1102912).\n- CVE-2016-2147: Fixed out of bounds write (heap) due to integer underflow in udhcpc (bsc#970663).\n- CVE-2016-2148: Fixed heap-based buffer overflow in OPTION_6RD parsing (bsc#970662).\n- CVE-2016-6301: Fixed NTP server denial of service flaw (bsc#991940).\n- CVE-2017-15873: Fixed integer overflow in get_next_block function in archival/libarchive/decompress_bunzip2.c (bsc#1064976).\n- CVE-2017-15874: Fixed integer overflow in archival/libarchive/decompress_unlzma (bsc#1064978).\n- CVE-2019-5747: Fixed out of bounds read in udhcp components (bsc#1121428).\n- CVE-2021-42373, CVE-2021-42374, CVE-2021-42375, CVE-2021-42376, CVE-2021-42377, CVE-2021-42378, CVE-2021-42379, CVE-2021-42380, CVE-2021-42381, CVE-2021-42382, CVE-2021-42383, CVE-2021-42384, CVE-2021-42385, CVE-2021-42386: v1.34.0 bugfixes (bsc#1192869).\n- CVE-2021-28831: Fixed invalid free or segmentation fault via malformed gzip data (bsc#1184522).\n- CVE-2018-20679: Fixed out of bounds read in udhcp (bsc#1121426).\n- CVE-2018-1000517: Fixed heap-based buffer overflow in the retrieve_file_data() (bsc#1099260).\n- CVE-2011-5325: Fixed tar directory traversal (bsc#951562).\n- CVE-2018-1000500: Fixed missing SSL certificate validation in wget (bsc#1099263).\n \n- Update to 1.35.0\n - awk: fix printf %%, fix read beyond end of buffer\n - chrt: silence analyzer warning\n - libarchive: remove duplicate forward declaration\n - mount: 'mount -o rw ....' should not fall back to RO mount\n - ps: fix -o pid=PID,args interpreting entire 'PID,args' as header\n - tar: prevent malicious archives with long name sizes causing OOM\n - udhcpc6: fix udhcp_find_option to actually find DHCP6 options\n - xxd: fix -p -r\n - support for new optoins added to basename, cpio, date, find, \n mktemp, wget and others\n\n- Enable fdisk (jsc#CAR-16)\n\n- Update to 1.34.1:\n * build system: use SOURCE_DATE_EPOCH for timestamp if available\n * many bug fixes and new features\n * touch: make FEATURE_TOUCH_NODEREF unconditional\n \n- update to 1.33.1:\n * httpd: fix sendfile\n * ash: fix HISTFILE corruptio\n * ash: fix unset variable pattern expansion\n * traceroute: fix option parsing\n * gunzip: fix for archive corruption\n\n- Update to version 1.33.0\n - many bug fixes and new features\n\n- Update to version 1.32.1\n - fixes a case where in ash, 'wait' never finishes. \n\n- prepare usrmerge (bsc#1029961)\n\n- Enable testsuite and package it for later rerun (for QA, jsc#CAR-15)\n\n- Update to version 1.31.1:\n + Bug fix release. 1.30.1 has fixes for dc, ash (PS1 expansion\n fix), hush, dpkg-deb, telnet and wget.\n- Changes from version 1.31.0:\n + many bugfixes and new features.\n- Add busybox-no-stime.patch: stime() has been deprecated in glibc\n 2.31 and replaced with clock_settime().\n\n- update to 1.25.1:\n * fixes for hush, gunzip, ip route, ntpd\n- includes changes from 1.25.0:\n * many added and expanded implementations of command options\n- includes changes from 1.24.2:\n * fixes for build system (static build with glibc fixed),\n truncate, gunzip and unzip. \n\n- Update to version 1.24.1\n * for a full list of changes see http://www.busybox.net/news.html\n- Refresh busybox.install.patch \n\n- Update to 1.23.2\n * for a full list of changes see http://www.busybox.net/news.html\n- Cleaned up spec file with spec-cleaner\n- Refreshed patches\n\n- update to 1.22.1:\n Many updates and fixes for most included tools, see\n see http://www.busybox.net/news.html\n", title: "Description of the patch", }, { category: "details", text: "SUSE-2022-4253,SUSE-OpenStack-Cloud-9-2022-4253,SUSE-OpenStack-Cloud-Crowbar-9-2022-4253,SUSE-SLE-SAP-12-SP4-2022-4253,SUSE-SLE-SERVER-12-SP2-BCL-2022-4253,SUSE-SLE-SERVER-12-SP3-BCL-2022-4253,SUSE-SLE-SERVER-12-SP4-LTSS-2022-4253,SUSE-SLE-SERVER-12-SP5-2022-4253", title: "Patchnames", }, { category: "legal_disclaimer", text: "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", title: "Terms of use", }, ], publisher: { category: "vendor", contact_details: "https://www.suse.com/support/security/contact/", name: "SUSE Product Security Team", namespace: "https://www.suse.com/", }, references: [ { category: "external", summary: "SUSE ratings", url: "https://www.suse.com/support/security/rating/", }, { category: "self", summary: "URL of this CSAF notice", url: "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2022_4253-1.json", }, { category: "self", summary: "URL for SUSE-SU-2022:4253-1", url: "https://www.suse.com/support/update/announcement/2022/suse-su-20224253-1/", }, { category: "self", summary: "E-Mail link for SUSE-SU-2022:4253-1", url: "https://lists.suse.com/pipermail/sle-security-updates/2022-November/013126.html", }, { category: "self", summary: "SUSE Bug 1029961", url: "https://bugzilla.suse.com/1029961", }, { category: "self", summary: "SUSE Bug 1064976", url: "https://bugzilla.suse.com/1064976", }, { category: "self", summary: "SUSE Bug 1064978", url: "https://bugzilla.suse.com/1064978", }, { category: "self", summary: "SUSE Bug 1069412", url: "https://bugzilla.suse.com/1069412", }, { category: "self", summary: "SUSE Bug 1099260", url: "https://bugzilla.suse.com/1099260", }, { category: "self", summary: "SUSE Bug 1099263", url: "https://bugzilla.suse.com/1099263", }, { category: "self", summary: "SUSE Bug 1102912", url: "https://bugzilla.suse.com/1102912", }, { category: "self", summary: "SUSE Bug 1121426", url: "https://bugzilla.suse.com/1121426", }, { category: "self", summary: "SUSE Bug 1121428", url: "https://bugzilla.suse.com/1121428", }, { category: "self", summary: "SUSE Bug 1184522", url: "https://bugzilla.suse.com/1184522", }, { category: "self", summary: "SUSE Bug 1191514", url: "https://bugzilla.suse.com/1191514", }, { category: "self", summary: "SUSE Bug 1192869", url: "https://bugzilla.suse.com/1192869", }, { category: "self", summary: "SUSE Bug 914660", url: "https://bugzilla.suse.com/914660", }, { category: "self", summary: "SUSE Bug 951562", url: "https://bugzilla.suse.com/951562", }, { category: "self", summary: "SUSE Bug 970662", url: "https://bugzilla.suse.com/970662", }, { category: "self", summary: "SUSE Bug 970663", url: "https://bugzilla.suse.com/970663", }, { category: "self", summary: "SUSE Bug 991940", url: "https://bugzilla.suse.com/991940", }, { category: "self", summary: "SUSE CVE CVE-2011-5325 page", url: "https://www.suse.com/security/cve/CVE-2011-5325/", }, { category: "self", summary: "SUSE CVE CVE-2014-9645 page", url: "https://www.suse.com/security/cve/CVE-2014-9645/", }, { category: "self", summary: "SUSE CVE CVE-2015-9261 page", url: "https://www.suse.com/security/cve/CVE-2015-9261/", }, { category: "self", summary: "SUSE CVE CVE-2016-2147 page", url: "https://www.suse.com/security/cve/CVE-2016-2147/", }, { category: "self", summary: "SUSE CVE CVE-2016-2148 page", url: "https://www.suse.com/security/cve/CVE-2016-2148/", }, { category: "self", summary: "SUSE CVE CVE-2016-6301 page", url: "https://www.suse.com/security/cve/CVE-2016-6301/", }, { category: "self", summary: "SUSE CVE CVE-2017-15873 page", url: "https://www.suse.com/security/cve/CVE-2017-15873/", }, { category: "self", summary: "SUSE CVE CVE-2017-15874 page", url: "https://www.suse.com/security/cve/CVE-2017-15874/", }, { category: "self", summary: "SUSE CVE CVE-2017-16544 page", url: "https://www.suse.com/security/cve/CVE-2017-16544/", }, { category: "self", summary: "SUSE CVE CVE-2018-1000500 page", url: "https://www.suse.com/security/cve/CVE-2018-1000500/", }, { category: "self", summary: "SUSE CVE CVE-2018-1000517 page", url: "https://www.suse.com/security/cve/CVE-2018-1000517/", }, { category: "self", summary: "SUSE CVE CVE-2018-20679 page", url: "https://www.suse.com/security/cve/CVE-2018-20679/", }, { category: "self", summary: "SUSE CVE CVE-2019-5747 page", url: "https://www.suse.com/security/cve/CVE-2019-5747/", }, { category: "self", summary: "SUSE CVE CVE-2021-28831 page", url: "https://www.suse.com/security/cve/CVE-2021-28831/", }, { category: "self", summary: "SUSE CVE CVE-2021-42373 page", url: "https://www.suse.com/security/cve/CVE-2021-42373/", }, { category: "self", summary: "SUSE CVE CVE-2021-42374 page", url: "https://www.suse.com/security/cve/CVE-2021-42374/", }, { category: "self", summary: "SUSE CVE CVE-2021-42375 page", url: "https://www.suse.com/security/cve/CVE-2021-42375/", }, { category: "self", summary: "SUSE CVE CVE-2021-42376 page", url: "https://www.suse.com/security/cve/CVE-2021-42376/", }, { category: "self", summary: "SUSE CVE CVE-2021-42377 page", url: "https://www.suse.com/security/cve/CVE-2021-42377/", }, { category: "self", summary: "SUSE CVE CVE-2021-42378 page", url: "https://www.suse.com/security/cve/CVE-2021-42378/", }, { category: "self", summary: "SUSE CVE CVE-2021-42379 page", url: "https://www.suse.com/security/cve/CVE-2021-42379/", }, { category: "self", summary: "SUSE CVE CVE-2021-42380 page", url: "https://www.suse.com/security/cve/CVE-2021-42380/", }, { category: "self", summary: "SUSE CVE CVE-2021-42381 page", url: "https://www.suse.com/security/cve/CVE-2021-42381/", }, { category: "self", summary: "SUSE CVE CVE-2021-42382 page", url: "https://www.suse.com/security/cve/CVE-2021-42382/", }, { category: "self", summary: "SUSE CVE CVE-2021-42383 page", url: "https://www.suse.com/security/cve/CVE-2021-42383/", }, { category: "self", summary: "SUSE CVE CVE-2021-42384 page", url: "https://www.suse.com/security/cve/CVE-2021-42384/", }, { category: "self", summary: "SUSE CVE CVE-2021-42385 page", url: "https://www.suse.com/security/cve/CVE-2021-42385/", }, { category: "self", summary: "SUSE CVE CVE-2021-42386 page", url: "https://www.suse.com/security/cve/CVE-2021-42386/", }, ], title: "Security update for busybox", tracking: { current_release_date: "2022-11-28T10:23:47Z", generator: { date: "2022-11-28T10:23:47Z", engine: { name: "cve-database.git:bin/generate-csaf.pl", version: "1", }, }, id: "SUSE-SU-2022:4253-1", initial_release_date: "2022-11-28T10:23:47Z", revision_history: [ { date: "2022-11-28T10:23:47Z", number: "1", summary: "Current version", }, ], status: "final", version: "1", }, }, product_tree: { branches: [ { branches: [ { branches: [ { category: "product_version", name: "busybox-1.35.0-4.3.1.aarch64", product: { name: "busybox-1.35.0-4.3.1.aarch64", product_id: "busybox-1.35.0-4.3.1.aarch64", }, }, { category: "product_version", name: "busybox-static-1.35.0-4.3.1.aarch64", product: { name: "busybox-static-1.35.0-4.3.1.aarch64", product_id: "busybox-static-1.35.0-4.3.1.aarch64", }, }, { category: "product_version", name: "busybox-testsuite-1.35.0-4.3.1.aarch64", product: { name: "busybox-testsuite-1.35.0-4.3.1.aarch64", product_id: "busybox-testsuite-1.35.0-4.3.1.aarch64", }, }, { category: "product_version", name: "busybox-warewulf3-1.35.0-4.3.1.aarch64", product: { name: "busybox-warewulf3-1.35.0-4.3.1.aarch64", product_id: "busybox-warewulf3-1.35.0-4.3.1.aarch64", }, }, ], category: "architecture", name: "aarch64", }, { branches: [ { category: "product_version", name: "busybox-1.35.0-4.3.1.i586", product: { name: "busybox-1.35.0-4.3.1.i586", product_id: "busybox-1.35.0-4.3.1.i586", }, }, { category: "product_version", name: "busybox-static-1.35.0-4.3.1.i586", product: { name: "busybox-static-1.35.0-4.3.1.i586", product_id: "busybox-static-1.35.0-4.3.1.i586", }, }, { category: "product_version", name: "busybox-testsuite-1.35.0-4.3.1.i586", product: { name: "busybox-testsuite-1.35.0-4.3.1.i586", product_id: "busybox-testsuite-1.35.0-4.3.1.i586", }, }, { category: "product_version", name: "busybox-warewulf3-1.35.0-4.3.1.i586", product: { name: "busybox-warewulf3-1.35.0-4.3.1.i586", product_id: "busybox-warewulf3-1.35.0-4.3.1.i586", }, }, ], category: "architecture", name: "i586", }, { branches: [ { category: "product_version", name: "busybox-1.35.0-4.3.1.ppc64le", product: { name: "busybox-1.35.0-4.3.1.ppc64le", product_id: "busybox-1.35.0-4.3.1.ppc64le", }, }, { category: "product_version", name: "busybox-static-1.35.0-4.3.1.ppc64le", product: { name: "busybox-static-1.35.0-4.3.1.ppc64le", product_id: "busybox-static-1.35.0-4.3.1.ppc64le", }, }, { category: "product_version", name: "busybox-testsuite-1.35.0-4.3.1.ppc64le", product: { name: "busybox-testsuite-1.35.0-4.3.1.ppc64le", product_id: "busybox-testsuite-1.35.0-4.3.1.ppc64le", }, }, ], category: "architecture", name: "ppc64le", }, { branches: [ { category: "product_version", name: "busybox-1.35.0-4.3.1.s390", product: { name: "busybox-1.35.0-4.3.1.s390", product_id: "busybox-1.35.0-4.3.1.s390", }, }, { category: "product_version", name: "busybox-static-1.35.0-4.3.1.s390", product: { name: "busybox-static-1.35.0-4.3.1.s390", product_id: "busybox-static-1.35.0-4.3.1.s390", }, }, { category: "product_version", name: "busybox-testsuite-1.35.0-4.3.1.s390", product: { name: "busybox-testsuite-1.35.0-4.3.1.s390", product_id: "busybox-testsuite-1.35.0-4.3.1.s390", }, }, ], category: "architecture", name: "s390", }, { branches: [ { category: "product_version", name: "busybox-1.35.0-4.3.1.s390x", product: { name: "busybox-1.35.0-4.3.1.s390x", product_id: "busybox-1.35.0-4.3.1.s390x", }, }, { category: "product_version", name: "busybox-static-1.35.0-4.3.1.s390x", product: { name: "busybox-static-1.35.0-4.3.1.s390x", product_id: "busybox-static-1.35.0-4.3.1.s390x", }, }, { category: "product_version", name: "busybox-testsuite-1.35.0-4.3.1.s390x", product: { name: "busybox-testsuite-1.35.0-4.3.1.s390x", product_id: "busybox-testsuite-1.35.0-4.3.1.s390x", }, }, ], category: "architecture", name: "s390x", }, { branches: [ { category: "product_version", name: "busybox-1.35.0-4.3.1.x86_64", product: { name: "busybox-1.35.0-4.3.1.x86_64", product_id: "busybox-1.35.0-4.3.1.x86_64", }, }, { category: "product_version", name: "busybox-static-1.35.0-4.3.1.x86_64", product: { name: "busybox-static-1.35.0-4.3.1.x86_64", product_id: "busybox-static-1.35.0-4.3.1.x86_64", }, }, { category: "product_version", name: "busybox-testsuite-1.35.0-4.3.1.x86_64", product: { name: "busybox-testsuite-1.35.0-4.3.1.x86_64", product_id: "busybox-testsuite-1.35.0-4.3.1.x86_64", }, }, { category: "product_version", name: "busybox-warewulf3-1.35.0-4.3.1.x86_64", product: { name: "busybox-warewulf3-1.35.0-4.3.1.x86_64", product_id: "busybox-warewulf3-1.35.0-4.3.1.x86_64", }, }, ], category: "architecture", name: "x86_64", }, { branches: [ { category: "product_name", name: "SUSE OpenStack Cloud 9", product: { name: "SUSE OpenStack Cloud 9", product_id: "SUSE OpenStack Cloud 9", product_identification_helper: { cpe: "cpe:/o:suse:suse-openstack-cloud:9", }, }, }, { category: "product_name", name: "SUSE OpenStack Cloud Crowbar 9", product: { name: "SUSE OpenStack Cloud Crowbar 9", product_id: "SUSE OpenStack Cloud Crowbar 9", product_identification_helper: { cpe: "cpe:/o:suse:suse-openstack-cloud-crowbar:9", }, }, }, { category: "product_name", name: "SUSE Linux Enterprise Server for SAP Applications 12 SP4", product: { name: "SUSE Linux Enterprise Server for SAP Applications 12 SP4", product_id: "SUSE Linux Enterprise Server for SAP Applications 12 SP4", product_identification_helper: { cpe: "cpe:/o:suse:sles_sap:12:sp4", }, }, }, { category: "product_name", name: "SUSE Linux Enterprise Server 12 SP2-BCL", product: { name: "SUSE Linux Enterprise Server 12 SP2-BCL", product_id: "SUSE Linux Enterprise Server 12 SP2-BCL", product_identification_helper: { cpe: "cpe:/o:suse:sles-bcl:12:sp2", }, }, }, { category: "product_name", name: "SUSE Linux Enterprise Server 12 SP3-BCL", product: { name: "SUSE Linux Enterprise Server 12 SP3-BCL", product_id: "SUSE Linux Enterprise Server 12 SP3-BCL", product_identification_helper: { cpe: "cpe:/o:suse:sles-bcl:12:sp3", }, }, }, { category: "product_name", name: "SUSE Linux Enterprise Server 12 SP4-LTSS", product: { name: "SUSE Linux Enterprise Server 12 SP4-LTSS", product_id: "SUSE Linux Enterprise Server 12 SP4-LTSS", product_identification_helper: { cpe: "cpe:/o:suse:sles-ltss:12:sp4", }, }, }, { category: "product_name", name: "SUSE Linux Enterprise Server 12 SP5", product: { name: "SUSE Linux Enterprise Server 12 SP5", product_id: "SUSE Linux Enterprise Server 12 SP5", product_identification_helper: { cpe: "cpe:/o:suse:sles:12:sp5", }, }, }, { category: "product_name", name: "SUSE Linux Enterprise Server for SAP Applications 12 SP5", product: { name: "SUSE Linux Enterprise Server for SAP Applications 12 SP5", product_id: "SUSE Linux Enterprise Server for SAP Applications 12 SP5", product_identification_helper: { cpe: "cpe:/o:suse:sles_sap:12:sp5", }, }, }, ], category: "product_family", name: "SUSE Linux Enterprise", }, ], category: "vendor", name: "SUSE", }, ], relationships: [ { category: "default_component_of", full_product_name: { name: "busybox-1.35.0-4.3.1.x86_64 as component of SUSE OpenStack Cloud 9", product_id: "SUSE OpenStack Cloud 9:busybox-1.35.0-4.3.1.x86_64", }, product_reference: "busybox-1.35.0-4.3.1.x86_64", relates_to_product_reference: "SUSE OpenStack Cloud 9", }, { category: "default_component_of", full_product_name: { name: "busybox-1.35.0-4.3.1.x86_64 as component of SUSE OpenStack Cloud Crowbar 9", product_id: "SUSE OpenStack Cloud Crowbar 9:busybox-1.35.0-4.3.1.x86_64", }, product_reference: "busybox-1.35.0-4.3.1.x86_64", relates_to_product_reference: "SUSE OpenStack Cloud Crowbar 9", }, { category: "default_component_of", full_product_name: { name: "busybox-1.35.0-4.3.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP4", product_id: "SUSE Linux Enterprise Server for SAP Applications 12 SP4:busybox-1.35.0-4.3.1.ppc64le", }, product_reference: "busybox-1.35.0-4.3.1.ppc64le", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 12 SP4", }, { category: "default_component_of", full_product_name: { name: "busybox-1.35.0-4.3.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP4", product_id: "SUSE Linux Enterprise Server for SAP Applications 12 SP4:busybox-1.35.0-4.3.1.x86_64", }, product_reference: "busybox-1.35.0-4.3.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 12 SP4", }, { category: "default_component_of", full_product_name: { name: "busybox-1.35.0-4.3.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP2-BCL", product_id: "SUSE Linux Enterprise Server 12 SP2-BCL:busybox-1.35.0-4.3.1.x86_64", }, product_reference: "busybox-1.35.0-4.3.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Server 12 SP2-BCL", }, { category: "default_component_of", full_product_name: { name: "busybox-1.35.0-4.3.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP3-BCL", product_id: "SUSE Linux Enterprise Server 12 SP3-BCL:busybox-1.35.0-4.3.1.x86_64", }, product_reference: "busybox-1.35.0-4.3.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Server 12 SP3-BCL", }, { category: "default_component_of", full_product_name: { name: "busybox-1.35.0-4.3.1.aarch64 as component of SUSE Linux Enterprise Server 12 SP4-LTSS", product_id: "SUSE Linux Enterprise Server 12 SP4-LTSS:busybox-1.35.0-4.3.1.aarch64", }, product_reference: "busybox-1.35.0-4.3.1.aarch64", relates_to_product_reference: "SUSE Linux Enterprise Server 12 SP4-LTSS", }, { category: "default_component_of", full_product_name: { name: "busybox-1.35.0-4.3.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP4-LTSS", product_id: "SUSE Linux Enterprise Server 12 SP4-LTSS:busybox-1.35.0-4.3.1.ppc64le", }, product_reference: "busybox-1.35.0-4.3.1.ppc64le", relates_to_product_reference: "SUSE Linux Enterprise Server 12 SP4-LTSS", }, { category: "default_component_of", full_product_name: { name: "busybox-1.35.0-4.3.1.s390x as component of SUSE Linux Enterprise Server 12 SP4-LTSS", product_id: "SUSE Linux Enterprise Server 12 SP4-LTSS:busybox-1.35.0-4.3.1.s390x", }, product_reference: "busybox-1.35.0-4.3.1.s390x", relates_to_product_reference: "SUSE Linux Enterprise Server 12 SP4-LTSS", }, { category: "default_component_of", full_product_name: { name: "busybox-1.35.0-4.3.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP4-LTSS", product_id: "SUSE Linux Enterprise Server 12 SP4-LTSS:busybox-1.35.0-4.3.1.x86_64", }, product_reference: "busybox-1.35.0-4.3.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Server 12 SP4-LTSS", }, { category: "default_component_of", full_product_name: { name: "busybox-1.35.0-4.3.1.aarch64 as component of SUSE Linux Enterprise Server 12 SP5", product_id: "SUSE Linux Enterprise Server 12 SP5:busybox-1.35.0-4.3.1.aarch64", }, product_reference: "busybox-1.35.0-4.3.1.aarch64", relates_to_product_reference: "SUSE Linux Enterprise Server 12 SP5", }, { category: "default_component_of", full_product_name: { name: "busybox-1.35.0-4.3.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP5", product_id: "SUSE Linux Enterprise Server 12 SP5:busybox-1.35.0-4.3.1.ppc64le", }, product_reference: "busybox-1.35.0-4.3.1.ppc64le", relates_to_product_reference: "SUSE Linux Enterprise Server 12 SP5", }, { category: "default_component_of", full_product_name: { name: "busybox-1.35.0-4.3.1.s390x as component of SUSE Linux Enterprise Server 12 SP5", product_id: "SUSE Linux Enterprise Server 12 SP5:busybox-1.35.0-4.3.1.s390x", }, product_reference: "busybox-1.35.0-4.3.1.s390x", relates_to_product_reference: "SUSE Linux Enterprise Server 12 SP5", }, { category: "default_component_of", full_product_name: { name: "busybox-1.35.0-4.3.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP5", product_id: "SUSE Linux Enterprise Server 12 SP5:busybox-1.35.0-4.3.1.x86_64", }, product_reference: "busybox-1.35.0-4.3.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Server 12 SP5", }, { category: "default_component_of", full_product_name: { name: "busybox-1.35.0-4.3.1.aarch64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5", product_id: "SUSE Linux Enterprise Server for SAP Applications 12 SP5:busybox-1.35.0-4.3.1.aarch64", }, product_reference: "busybox-1.35.0-4.3.1.aarch64", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 12 SP5", }, { category: "default_component_of", full_product_name: { name: "busybox-1.35.0-4.3.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5", product_id: "SUSE Linux Enterprise Server for SAP Applications 12 SP5:busybox-1.35.0-4.3.1.ppc64le", }, product_reference: "busybox-1.35.0-4.3.1.ppc64le", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 12 SP5", }, { category: "default_component_of", full_product_name: { name: "busybox-1.35.0-4.3.1.s390x as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5", product_id: "SUSE Linux Enterprise Server for SAP Applications 12 SP5:busybox-1.35.0-4.3.1.s390x", }, product_reference: "busybox-1.35.0-4.3.1.s390x", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 12 SP5", }, { category: "default_component_of", full_product_name: { name: "busybox-1.35.0-4.3.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5", product_id: "SUSE Linux Enterprise Server for SAP Applications 12 SP5:busybox-1.35.0-4.3.1.x86_64", }, product_reference: "busybox-1.35.0-4.3.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 12 SP5", }, ], }, vulnerabilities: [ { cve: "CVE-2011-5325", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2011-5325", }, ], notes: [ { category: "general", text: "Directory traversal vulnerability in the BusyBox implementation of tar before 1.22.0 v5 allows remote attackers to point to files outside the current working directory via a symlink.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Server 12 SP2-BCL:busybox-1.35.0-4.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:busybox-1.35.0-4.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:busybox-1.35.0-4.3.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:busybox-1.35.0-4.3.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:busybox-1.35.0-4.3.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:busybox-1.35.0-4.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:busybox-1.35.0-4.3.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:busybox-1.35.0-4.3.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:busybox-1.35.0-4.3.1.s390x", "SUSE Linux Enterprise Server 12 SP5:busybox-1.35.0-4.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:busybox-1.35.0-4.3.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:busybox-1.35.0-4.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:busybox-1.35.0-4.3.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:busybox-1.35.0-4.3.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:busybox-1.35.0-4.3.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:busybox-1.35.0-4.3.1.x86_64", "SUSE OpenStack Cloud 9:busybox-1.35.0-4.3.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:busybox-1.35.0-4.3.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2011-5325", url: "https://www.suse.com/security/cve/CVE-2011-5325", }, { category: "external", summary: "SUSE Bug 951562 for CVE-2011-5325", url: "https://bugzilla.suse.com/951562", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Server 12 SP2-BCL:busybox-1.35.0-4.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:busybox-1.35.0-4.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:busybox-1.35.0-4.3.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:busybox-1.35.0-4.3.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:busybox-1.35.0-4.3.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:busybox-1.35.0-4.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:busybox-1.35.0-4.3.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:busybox-1.35.0-4.3.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:busybox-1.35.0-4.3.1.s390x", "SUSE Linux Enterprise Server 12 SP5:busybox-1.35.0-4.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:busybox-1.35.0-4.3.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:busybox-1.35.0-4.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:busybox-1.35.0-4.3.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:busybox-1.35.0-4.3.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:busybox-1.35.0-4.3.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:busybox-1.35.0-4.3.1.x86_64", "SUSE OpenStack Cloud 9:busybox-1.35.0-4.3.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:busybox-1.35.0-4.3.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 7.5, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N", version: "3.1", }, products: [ "SUSE Linux Enterprise Server 12 SP2-BCL:busybox-1.35.0-4.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:busybox-1.35.0-4.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:busybox-1.35.0-4.3.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:busybox-1.35.0-4.3.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:busybox-1.35.0-4.3.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:busybox-1.35.0-4.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:busybox-1.35.0-4.3.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:busybox-1.35.0-4.3.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:busybox-1.35.0-4.3.1.s390x", "SUSE Linux Enterprise Server 12 SP5:busybox-1.35.0-4.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:busybox-1.35.0-4.3.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:busybox-1.35.0-4.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:busybox-1.35.0-4.3.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:busybox-1.35.0-4.3.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:busybox-1.35.0-4.3.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:busybox-1.35.0-4.3.1.x86_64", "SUSE OpenStack Cloud 9:busybox-1.35.0-4.3.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:busybox-1.35.0-4.3.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2022-11-28T10:23:47Z", details: "moderate", }, ], title: "CVE-2011-5325", }, { cve: "CVE-2014-9645", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2014-9645", }, ], notes: [ { category: "general", text: "The add_probe function in modutils/modprobe.c in BusyBox before 1.23.0 allows local users to bypass intended restrictions on loading kernel modules via a / (slash) character in a module name, as demonstrated by an \"ifconfig /usbserial up\" command or a \"mount -t /snd_pcm none /\" command.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Server 12 SP2-BCL:busybox-1.35.0-4.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:busybox-1.35.0-4.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:busybox-1.35.0-4.3.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:busybox-1.35.0-4.3.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:busybox-1.35.0-4.3.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:busybox-1.35.0-4.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:busybox-1.35.0-4.3.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:busybox-1.35.0-4.3.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:busybox-1.35.0-4.3.1.s390x", "SUSE Linux Enterprise Server 12 SP5:busybox-1.35.0-4.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:busybox-1.35.0-4.3.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:busybox-1.35.0-4.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:busybox-1.35.0-4.3.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:busybox-1.35.0-4.3.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:busybox-1.35.0-4.3.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:busybox-1.35.0-4.3.1.x86_64", "SUSE OpenStack Cloud 9:busybox-1.35.0-4.3.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:busybox-1.35.0-4.3.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2014-9645", url: "https://www.suse.com/security/cve/CVE-2014-9645", }, { category: "external", summary: "SUSE Bug 914423 for CVE-2014-9645", url: "https://bugzilla.suse.com/914423", }, { category: "external", summary: "SUSE Bug 914660 for CVE-2014-9645", url: "https://bugzilla.suse.com/914660", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Server 12 SP2-BCL:busybox-1.35.0-4.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:busybox-1.35.0-4.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:busybox-1.35.0-4.3.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:busybox-1.35.0-4.3.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:busybox-1.35.0-4.3.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:busybox-1.35.0-4.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:busybox-1.35.0-4.3.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:busybox-1.35.0-4.3.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:busybox-1.35.0-4.3.1.s390x", "SUSE Linux Enterprise Server 12 SP5:busybox-1.35.0-4.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:busybox-1.35.0-4.3.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:busybox-1.35.0-4.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:busybox-1.35.0-4.3.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:busybox-1.35.0-4.3.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:busybox-1.35.0-4.3.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:busybox-1.35.0-4.3.1.x86_64", "SUSE OpenStack Cloud 9:busybox-1.35.0-4.3.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:busybox-1.35.0-4.3.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.5, baseSeverity: "MEDIUM", vectorString: "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N", version: "3.0", }, products: [ "SUSE Linux Enterprise Server 12 SP2-BCL:busybox-1.35.0-4.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:busybox-1.35.0-4.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:busybox-1.35.0-4.3.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:busybox-1.35.0-4.3.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:busybox-1.35.0-4.3.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:busybox-1.35.0-4.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:busybox-1.35.0-4.3.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:busybox-1.35.0-4.3.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:busybox-1.35.0-4.3.1.s390x", "SUSE Linux Enterprise Server 12 SP5:busybox-1.35.0-4.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:busybox-1.35.0-4.3.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:busybox-1.35.0-4.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:busybox-1.35.0-4.3.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:busybox-1.35.0-4.3.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:busybox-1.35.0-4.3.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:busybox-1.35.0-4.3.1.x86_64", "SUSE OpenStack Cloud 9:busybox-1.35.0-4.3.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:busybox-1.35.0-4.3.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2022-11-28T10:23:47Z", details: "moderate", }, ], title: "CVE-2014-9645", }, { cve: "CVE-2015-9261", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2015-9261", }, ], notes: [ { category: "general", text: "huft_build in archival/libarchive/decompress_gunzip.c in BusyBox before 1.27.2 misuses a pointer, causing segfaults and an application crash during an unzip operation on a specially crafted ZIP file.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Server 12 SP2-BCL:busybox-1.35.0-4.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:busybox-1.35.0-4.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:busybox-1.35.0-4.3.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:busybox-1.35.0-4.3.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:busybox-1.35.0-4.3.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:busybox-1.35.0-4.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:busybox-1.35.0-4.3.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:busybox-1.35.0-4.3.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:busybox-1.35.0-4.3.1.s390x", "SUSE Linux Enterprise Server 12 SP5:busybox-1.35.0-4.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:busybox-1.35.0-4.3.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:busybox-1.35.0-4.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:busybox-1.35.0-4.3.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:busybox-1.35.0-4.3.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:busybox-1.35.0-4.3.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:busybox-1.35.0-4.3.1.x86_64", "SUSE OpenStack Cloud 9:busybox-1.35.0-4.3.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:busybox-1.35.0-4.3.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2015-9261", url: "https://www.suse.com/security/cve/CVE-2015-9261", }, { category: "external", summary: "SUSE Bug 1102912 for CVE-2015-9261", url: "https://bugzilla.suse.com/1102912", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Server 12 SP2-BCL:busybox-1.35.0-4.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:busybox-1.35.0-4.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:busybox-1.35.0-4.3.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:busybox-1.35.0-4.3.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:busybox-1.35.0-4.3.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:busybox-1.35.0-4.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:busybox-1.35.0-4.3.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:busybox-1.35.0-4.3.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:busybox-1.35.0-4.3.1.s390x", "SUSE Linux Enterprise Server 12 SP5:busybox-1.35.0-4.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:busybox-1.35.0-4.3.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:busybox-1.35.0-4.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:busybox-1.35.0-4.3.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:busybox-1.35.0-4.3.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:busybox-1.35.0-4.3.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:busybox-1.35.0-4.3.1.x86_64", "SUSE OpenStack Cloud 9:busybox-1.35.0-4.3.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:busybox-1.35.0-4.3.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.5, baseSeverity: "MEDIUM", vectorString: "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", version: "3.0", }, products: [ "SUSE Linux Enterprise Server 12 SP2-BCL:busybox-1.35.0-4.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:busybox-1.35.0-4.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:busybox-1.35.0-4.3.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:busybox-1.35.0-4.3.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:busybox-1.35.0-4.3.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:busybox-1.35.0-4.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:busybox-1.35.0-4.3.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:busybox-1.35.0-4.3.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:busybox-1.35.0-4.3.1.s390x", "SUSE Linux Enterprise Server 12 SP5:busybox-1.35.0-4.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:busybox-1.35.0-4.3.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:busybox-1.35.0-4.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:busybox-1.35.0-4.3.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:busybox-1.35.0-4.3.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:busybox-1.35.0-4.3.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:busybox-1.35.0-4.3.1.x86_64", "SUSE OpenStack Cloud 9:busybox-1.35.0-4.3.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:busybox-1.35.0-4.3.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2022-11-28T10:23:47Z", details: "moderate", }, ], title: "CVE-2015-9261", }, { cve: "CVE-2016-2147", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2016-2147", }, ], notes: [ { category: "general", text: "Integer overflow in the DHCP client (udhcpc) in BusyBox before 1.25.0 allows remote attackers to cause a denial of service (crash) via a malformed RFC1035-encoded domain name, which triggers an out-of-bounds heap write.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Server 12 SP2-BCL:busybox-1.35.0-4.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:busybox-1.35.0-4.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:busybox-1.35.0-4.3.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:busybox-1.35.0-4.3.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:busybox-1.35.0-4.3.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:busybox-1.35.0-4.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:busybox-1.35.0-4.3.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:busybox-1.35.0-4.3.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:busybox-1.35.0-4.3.1.s390x", "SUSE Linux Enterprise Server 12 SP5:busybox-1.35.0-4.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:busybox-1.35.0-4.3.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:busybox-1.35.0-4.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:busybox-1.35.0-4.3.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:busybox-1.35.0-4.3.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:busybox-1.35.0-4.3.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:busybox-1.35.0-4.3.1.x86_64", "SUSE OpenStack Cloud 9:busybox-1.35.0-4.3.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:busybox-1.35.0-4.3.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2016-2147", url: "https://www.suse.com/security/cve/CVE-2016-2147", }, { category: "external", summary: "SUSE Bug 970663 for CVE-2016-2147", url: "https://bugzilla.suse.com/970663", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Server 12 SP2-BCL:busybox-1.35.0-4.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:busybox-1.35.0-4.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:busybox-1.35.0-4.3.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:busybox-1.35.0-4.3.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:busybox-1.35.0-4.3.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:busybox-1.35.0-4.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:busybox-1.35.0-4.3.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:busybox-1.35.0-4.3.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:busybox-1.35.0-4.3.1.s390x", "SUSE Linux Enterprise Server 12 SP5:busybox-1.35.0-4.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:busybox-1.35.0-4.3.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:busybox-1.35.0-4.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:busybox-1.35.0-4.3.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:busybox-1.35.0-4.3.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:busybox-1.35.0-4.3.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:busybox-1.35.0-4.3.1.x86_64", "SUSE OpenStack Cloud 9:busybox-1.35.0-4.3.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:busybox-1.35.0-4.3.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 7.5, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Server 12 SP2-BCL:busybox-1.35.0-4.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:busybox-1.35.0-4.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:busybox-1.35.0-4.3.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:busybox-1.35.0-4.3.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:busybox-1.35.0-4.3.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:busybox-1.35.0-4.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:busybox-1.35.0-4.3.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:busybox-1.35.0-4.3.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:busybox-1.35.0-4.3.1.s390x", "SUSE Linux Enterprise Server 12 SP5:busybox-1.35.0-4.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:busybox-1.35.0-4.3.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:busybox-1.35.0-4.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:busybox-1.35.0-4.3.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:busybox-1.35.0-4.3.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:busybox-1.35.0-4.3.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:busybox-1.35.0-4.3.1.x86_64", "SUSE OpenStack Cloud 9:busybox-1.35.0-4.3.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:busybox-1.35.0-4.3.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2022-11-28T10:23:47Z", details: "important", }, ], title: "CVE-2016-2147", }, { cve: "CVE-2016-2148", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2016-2148", }, ], notes: [ { category: "general", text: "Heap-based buffer overflow in the DHCP client (udhcpc) in BusyBox before 1.25.0 allows remote attackers to have unspecified impact via vectors involving OPTION_6RD parsing.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Server 12 SP2-BCL:busybox-1.35.0-4.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:busybox-1.35.0-4.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:busybox-1.35.0-4.3.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:busybox-1.35.0-4.3.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:busybox-1.35.0-4.3.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:busybox-1.35.0-4.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:busybox-1.35.0-4.3.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:busybox-1.35.0-4.3.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:busybox-1.35.0-4.3.1.s390x", "SUSE Linux Enterprise Server 12 SP5:busybox-1.35.0-4.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:busybox-1.35.0-4.3.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:busybox-1.35.0-4.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:busybox-1.35.0-4.3.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:busybox-1.35.0-4.3.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:busybox-1.35.0-4.3.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:busybox-1.35.0-4.3.1.x86_64", "SUSE OpenStack Cloud 9:busybox-1.35.0-4.3.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:busybox-1.35.0-4.3.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2016-2148", url: "https://www.suse.com/security/cve/CVE-2016-2148", }, { category: "external", summary: "SUSE Bug 970662 for CVE-2016-2148", url: "https://bugzilla.suse.com/970662", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Server 12 SP2-BCL:busybox-1.35.0-4.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:busybox-1.35.0-4.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:busybox-1.35.0-4.3.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:busybox-1.35.0-4.3.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:busybox-1.35.0-4.3.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:busybox-1.35.0-4.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:busybox-1.35.0-4.3.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:busybox-1.35.0-4.3.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:busybox-1.35.0-4.3.1.s390x", "SUSE Linux Enterprise Server 12 SP5:busybox-1.35.0-4.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:busybox-1.35.0-4.3.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:busybox-1.35.0-4.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:busybox-1.35.0-4.3.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:busybox-1.35.0-4.3.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:busybox-1.35.0-4.3.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:busybox-1.35.0-4.3.1.x86_64", "SUSE OpenStack Cloud 9:busybox-1.35.0-4.3.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:busybox-1.35.0-4.3.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 9.8, baseSeverity: "CRITICAL", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Server 12 SP2-BCL:busybox-1.35.0-4.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:busybox-1.35.0-4.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:busybox-1.35.0-4.3.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:busybox-1.35.0-4.3.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:busybox-1.35.0-4.3.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:busybox-1.35.0-4.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:busybox-1.35.0-4.3.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:busybox-1.35.0-4.3.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:busybox-1.35.0-4.3.1.s390x", "SUSE Linux Enterprise Server 12 SP5:busybox-1.35.0-4.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:busybox-1.35.0-4.3.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:busybox-1.35.0-4.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:busybox-1.35.0-4.3.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:busybox-1.35.0-4.3.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:busybox-1.35.0-4.3.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:busybox-1.35.0-4.3.1.x86_64", "SUSE OpenStack Cloud 9:busybox-1.35.0-4.3.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:busybox-1.35.0-4.3.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2022-11-28T10:23:47Z", details: "moderate", }, ], title: "CVE-2016-2148", }, { cve: "CVE-2016-6301", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2016-6301", }, ], notes: [ { category: "general", text: "The recv_and_process_client_pkt function in networking/ntpd.c in busybox allows remote attackers to cause a denial of service (CPU and bandwidth consumption) via a forged NTP packet, which triggers a communication loop.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Server 12 SP2-BCL:busybox-1.35.0-4.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:busybox-1.35.0-4.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:busybox-1.35.0-4.3.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:busybox-1.35.0-4.3.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:busybox-1.35.0-4.3.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:busybox-1.35.0-4.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:busybox-1.35.0-4.3.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:busybox-1.35.0-4.3.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:busybox-1.35.0-4.3.1.s390x", "SUSE Linux Enterprise Server 12 SP5:busybox-1.35.0-4.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:busybox-1.35.0-4.3.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:busybox-1.35.0-4.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:busybox-1.35.0-4.3.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:busybox-1.35.0-4.3.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:busybox-1.35.0-4.3.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:busybox-1.35.0-4.3.1.x86_64", "SUSE OpenStack Cloud 9:busybox-1.35.0-4.3.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:busybox-1.35.0-4.3.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2016-6301", url: "https://www.suse.com/security/cve/CVE-2016-6301", }, { category: "external", summary: "SUSE Bug 991940 for CVE-2016-6301", url: "https://bugzilla.suse.com/991940", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Server 12 SP2-BCL:busybox-1.35.0-4.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:busybox-1.35.0-4.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:busybox-1.35.0-4.3.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:busybox-1.35.0-4.3.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:busybox-1.35.0-4.3.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:busybox-1.35.0-4.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:busybox-1.35.0-4.3.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:busybox-1.35.0-4.3.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:busybox-1.35.0-4.3.1.s390x", "SUSE Linux Enterprise Server 12 SP5:busybox-1.35.0-4.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:busybox-1.35.0-4.3.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:busybox-1.35.0-4.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:busybox-1.35.0-4.3.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:busybox-1.35.0-4.3.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:busybox-1.35.0-4.3.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:busybox-1.35.0-4.3.1.x86_64", "SUSE OpenStack Cloud 9:busybox-1.35.0-4.3.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:busybox-1.35.0-4.3.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 7.5, baseSeverity: "HIGH", vectorString: "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", version: "3.0", }, products: [ "SUSE Linux Enterprise Server 12 SP2-BCL:busybox-1.35.0-4.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:busybox-1.35.0-4.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:busybox-1.35.0-4.3.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:busybox-1.35.0-4.3.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:busybox-1.35.0-4.3.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:busybox-1.35.0-4.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:busybox-1.35.0-4.3.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:busybox-1.35.0-4.3.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:busybox-1.35.0-4.3.1.s390x", "SUSE Linux Enterprise Server 12 SP5:busybox-1.35.0-4.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:busybox-1.35.0-4.3.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:busybox-1.35.0-4.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:busybox-1.35.0-4.3.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:busybox-1.35.0-4.3.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:busybox-1.35.0-4.3.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:busybox-1.35.0-4.3.1.x86_64", "SUSE OpenStack Cloud 9:busybox-1.35.0-4.3.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:busybox-1.35.0-4.3.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2022-11-28T10:23:47Z", details: "moderate", }, ], title: "CVE-2016-6301", }, { cve: "CVE-2017-15873", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2017-15873", }, ], notes: [ { category: "general", text: "The get_next_block function in archival/libarchive/decompress_bunzip2.c in BusyBox 1.27.2 has an Integer Overflow that may lead to a write access violation.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Server 12 SP2-BCL:busybox-1.35.0-4.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:busybox-1.35.0-4.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:busybox-1.35.0-4.3.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:busybox-1.35.0-4.3.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:busybox-1.35.0-4.3.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:busybox-1.35.0-4.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:busybox-1.35.0-4.3.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:busybox-1.35.0-4.3.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:busybox-1.35.0-4.3.1.s390x", "SUSE Linux Enterprise Server 12 SP5:busybox-1.35.0-4.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:busybox-1.35.0-4.3.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:busybox-1.35.0-4.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:busybox-1.35.0-4.3.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:busybox-1.35.0-4.3.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:busybox-1.35.0-4.3.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:busybox-1.35.0-4.3.1.x86_64", "SUSE OpenStack Cloud 9:busybox-1.35.0-4.3.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:busybox-1.35.0-4.3.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2017-15873", url: "https://www.suse.com/security/cve/CVE-2017-15873", }, { category: "external", summary: "SUSE Bug 1064976 for CVE-2017-15873", url: "https://bugzilla.suse.com/1064976", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Server 12 SP2-BCL:busybox-1.35.0-4.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:busybox-1.35.0-4.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:busybox-1.35.0-4.3.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:busybox-1.35.0-4.3.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:busybox-1.35.0-4.3.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:busybox-1.35.0-4.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:busybox-1.35.0-4.3.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:busybox-1.35.0-4.3.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:busybox-1.35.0-4.3.1.s390x", "SUSE Linux Enterprise Server 12 SP5:busybox-1.35.0-4.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:busybox-1.35.0-4.3.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:busybox-1.35.0-4.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:busybox-1.35.0-4.3.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:busybox-1.35.0-4.3.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:busybox-1.35.0-4.3.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:busybox-1.35.0-4.3.1.x86_64", "SUSE OpenStack Cloud 9:busybox-1.35.0-4.3.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:busybox-1.35.0-4.3.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 7.8, baseSeverity: "HIGH", vectorString: "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", version: "3.0", }, products: [ "SUSE Linux Enterprise Server 12 SP2-BCL:busybox-1.35.0-4.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:busybox-1.35.0-4.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:busybox-1.35.0-4.3.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:busybox-1.35.0-4.3.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:busybox-1.35.0-4.3.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:busybox-1.35.0-4.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:busybox-1.35.0-4.3.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:busybox-1.35.0-4.3.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:busybox-1.35.0-4.3.1.s390x", "SUSE Linux Enterprise Server 12 SP5:busybox-1.35.0-4.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:busybox-1.35.0-4.3.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:busybox-1.35.0-4.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:busybox-1.35.0-4.3.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:busybox-1.35.0-4.3.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:busybox-1.35.0-4.3.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:busybox-1.35.0-4.3.1.x86_64", "SUSE OpenStack Cloud 9:busybox-1.35.0-4.3.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:busybox-1.35.0-4.3.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2022-11-28T10:23:47Z", details: "moderate", }, ], title: "CVE-2017-15873", }, { cve: "CVE-2017-15874", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2017-15874", }, ], notes: [ { category: "general", text: "archival/libarchive/decompress_unlzma.c in BusyBox 1.27.2 has an Integer Underflow that leads to a read access violation.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Server 12 SP2-BCL:busybox-1.35.0-4.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:busybox-1.35.0-4.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:busybox-1.35.0-4.3.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:busybox-1.35.0-4.3.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:busybox-1.35.0-4.3.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:busybox-1.35.0-4.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:busybox-1.35.0-4.3.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:busybox-1.35.0-4.3.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:busybox-1.35.0-4.3.1.s390x", "SUSE Linux Enterprise Server 12 SP5:busybox-1.35.0-4.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:busybox-1.35.0-4.3.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:busybox-1.35.0-4.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:busybox-1.35.0-4.3.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:busybox-1.35.0-4.3.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:busybox-1.35.0-4.3.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:busybox-1.35.0-4.3.1.x86_64", "SUSE OpenStack Cloud 9:busybox-1.35.0-4.3.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:busybox-1.35.0-4.3.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2017-15874", url: "https://www.suse.com/security/cve/CVE-2017-15874", }, { category: "external", summary: "SUSE Bug 1064978 for CVE-2017-15874", url: "https://bugzilla.suse.com/1064978", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Server 12 SP2-BCL:busybox-1.35.0-4.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:busybox-1.35.0-4.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:busybox-1.35.0-4.3.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:busybox-1.35.0-4.3.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:busybox-1.35.0-4.3.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:busybox-1.35.0-4.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:busybox-1.35.0-4.3.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:busybox-1.35.0-4.3.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:busybox-1.35.0-4.3.1.s390x", "SUSE Linux Enterprise Server 12 SP5:busybox-1.35.0-4.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:busybox-1.35.0-4.3.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:busybox-1.35.0-4.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:busybox-1.35.0-4.3.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:busybox-1.35.0-4.3.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:busybox-1.35.0-4.3.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:busybox-1.35.0-4.3.1.x86_64", "SUSE OpenStack Cloud 9:busybox-1.35.0-4.3.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:busybox-1.35.0-4.3.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 3.3, baseSeverity: "LOW", vectorString: "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L", version: "3.0", }, products: [ "SUSE Linux Enterprise Server 12 SP2-BCL:busybox-1.35.0-4.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:busybox-1.35.0-4.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:busybox-1.35.0-4.3.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:busybox-1.35.0-4.3.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:busybox-1.35.0-4.3.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:busybox-1.35.0-4.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:busybox-1.35.0-4.3.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:busybox-1.35.0-4.3.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:busybox-1.35.0-4.3.1.s390x", "SUSE Linux Enterprise Server 12 SP5:busybox-1.35.0-4.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:busybox-1.35.0-4.3.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:busybox-1.35.0-4.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:busybox-1.35.0-4.3.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:busybox-1.35.0-4.3.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:busybox-1.35.0-4.3.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:busybox-1.35.0-4.3.1.x86_64", "SUSE OpenStack Cloud 9:busybox-1.35.0-4.3.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:busybox-1.35.0-4.3.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2022-11-28T10:23:47Z", details: "low", }, ], title: "CVE-2017-15874", }, { cve: "CVE-2017-16544", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2017-16544", }, ], notes: [ { category: "general", text: "In the add_match function in libbb/lineedit.c in BusyBox through 1.27.2, the tab autocomplete feature of the shell, used to get a list of filenames in a directory, does not sanitize filenames and results in executing any escape sequence in the terminal. This could potentially result in code execution, arbitrary file writes, or other attacks.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Server 12 SP2-BCL:busybox-1.35.0-4.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:busybox-1.35.0-4.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:busybox-1.35.0-4.3.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:busybox-1.35.0-4.3.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:busybox-1.35.0-4.3.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:busybox-1.35.0-4.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:busybox-1.35.0-4.3.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:busybox-1.35.0-4.3.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:busybox-1.35.0-4.3.1.s390x", "SUSE Linux Enterprise Server 12 SP5:busybox-1.35.0-4.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:busybox-1.35.0-4.3.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:busybox-1.35.0-4.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:busybox-1.35.0-4.3.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:busybox-1.35.0-4.3.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:busybox-1.35.0-4.3.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:busybox-1.35.0-4.3.1.x86_64", "SUSE OpenStack Cloud 9:busybox-1.35.0-4.3.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:busybox-1.35.0-4.3.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2017-16544", url: "https://www.suse.com/security/cve/CVE-2017-16544", }, { category: "external", summary: "SUSE Bug 1069412 for CVE-2017-16544", url: "https://bugzilla.suse.com/1069412", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Server 12 SP2-BCL:busybox-1.35.0-4.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:busybox-1.35.0-4.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:busybox-1.35.0-4.3.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:busybox-1.35.0-4.3.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:busybox-1.35.0-4.3.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:busybox-1.35.0-4.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:busybox-1.35.0-4.3.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:busybox-1.35.0-4.3.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:busybox-1.35.0-4.3.1.s390x", "SUSE Linux Enterprise Server 12 SP5:busybox-1.35.0-4.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:busybox-1.35.0-4.3.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:busybox-1.35.0-4.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:busybox-1.35.0-4.3.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:busybox-1.35.0-4.3.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:busybox-1.35.0-4.3.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:busybox-1.35.0-4.3.1.x86_64", "SUSE OpenStack Cloud 9:busybox-1.35.0-4.3.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:busybox-1.35.0-4.3.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 7.8, baseSeverity: "HIGH", vectorString: "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", version: "3.0", }, products: [ "SUSE Linux Enterprise Server 12 SP2-BCL:busybox-1.35.0-4.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:busybox-1.35.0-4.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:busybox-1.35.0-4.3.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:busybox-1.35.0-4.3.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:busybox-1.35.0-4.3.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:busybox-1.35.0-4.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:busybox-1.35.0-4.3.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:busybox-1.35.0-4.3.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:busybox-1.35.0-4.3.1.s390x", "SUSE Linux Enterprise Server 12 SP5:busybox-1.35.0-4.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:busybox-1.35.0-4.3.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:busybox-1.35.0-4.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:busybox-1.35.0-4.3.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:busybox-1.35.0-4.3.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:busybox-1.35.0-4.3.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:busybox-1.35.0-4.3.1.x86_64", "SUSE OpenStack Cloud 9:busybox-1.35.0-4.3.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:busybox-1.35.0-4.3.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2022-11-28T10:23:47Z", details: "important", }, ], title: "CVE-2017-16544", }, { cve: "CVE-2018-1000500", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2018-1000500", }, ], notes: [ { category: "general", text: "Busybox contains a Missing SSL certificate validation vulnerability in The \"busybox wget\" applet that can result in arbitrary code execution. This attack appear to be exploitable via Simply download any file over HTTPS using \"busybox wget https://compromised-domain.com/important-file\".", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Server 12 SP2-BCL:busybox-1.35.0-4.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:busybox-1.35.0-4.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:busybox-1.35.0-4.3.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:busybox-1.35.0-4.3.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:busybox-1.35.0-4.3.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:busybox-1.35.0-4.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:busybox-1.35.0-4.3.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:busybox-1.35.0-4.3.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:busybox-1.35.0-4.3.1.s390x", "SUSE Linux Enterprise Server 12 SP5:busybox-1.35.0-4.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:busybox-1.35.0-4.3.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:busybox-1.35.0-4.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:busybox-1.35.0-4.3.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:busybox-1.35.0-4.3.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:busybox-1.35.0-4.3.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:busybox-1.35.0-4.3.1.x86_64", "SUSE OpenStack Cloud 9:busybox-1.35.0-4.3.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:busybox-1.35.0-4.3.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2018-1000500", url: "https://www.suse.com/security/cve/CVE-2018-1000500", }, { category: "external", summary: "SUSE Bug 1099263 for CVE-2018-1000500", url: "https://bugzilla.suse.com/1099263", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Server 12 SP2-BCL:busybox-1.35.0-4.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:busybox-1.35.0-4.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:busybox-1.35.0-4.3.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:busybox-1.35.0-4.3.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:busybox-1.35.0-4.3.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:busybox-1.35.0-4.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:busybox-1.35.0-4.3.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:busybox-1.35.0-4.3.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:busybox-1.35.0-4.3.1.s390x", "SUSE Linux Enterprise Server 12 SP5:busybox-1.35.0-4.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:busybox-1.35.0-4.3.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:busybox-1.35.0-4.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:busybox-1.35.0-4.3.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:busybox-1.35.0-4.3.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:busybox-1.35.0-4.3.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:busybox-1.35.0-4.3.1.x86_64", "SUSE OpenStack Cloud 9:busybox-1.35.0-4.3.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:busybox-1.35.0-4.3.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 7.5, baseSeverity: "HIGH", vectorString: "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N", version: "3.0", }, products: [ "SUSE Linux Enterprise Server 12 SP2-BCL:busybox-1.35.0-4.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:busybox-1.35.0-4.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:busybox-1.35.0-4.3.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:busybox-1.35.0-4.3.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:busybox-1.35.0-4.3.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:busybox-1.35.0-4.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:busybox-1.35.0-4.3.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:busybox-1.35.0-4.3.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:busybox-1.35.0-4.3.1.s390x", "SUSE Linux Enterprise Server 12 SP5:busybox-1.35.0-4.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:busybox-1.35.0-4.3.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:busybox-1.35.0-4.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:busybox-1.35.0-4.3.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:busybox-1.35.0-4.3.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:busybox-1.35.0-4.3.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:busybox-1.35.0-4.3.1.x86_64", "SUSE OpenStack Cloud 9:busybox-1.35.0-4.3.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:busybox-1.35.0-4.3.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2022-11-28T10:23:47Z", details: "important", }, ], title: "CVE-2018-1000500", }, { cve: "CVE-2018-1000517", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2018-1000517", }, ], notes: [ { category: "general", text: "BusyBox project BusyBox wget version prior to commit 8e2174e9bd836e53c8b9c6e00d1bc6e2a718686e contains a Buffer Overflow vulnerability in Busybox wget that can result in heap buffer overflow. This attack appear to be exploitable via network connectivity. This vulnerability appears to have been fixed in after commit 8e2174e9bd836e53c8b9c6e00d1bc6e2a718686e.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Server 12 SP2-BCL:busybox-1.35.0-4.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:busybox-1.35.0-4.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:busybox-1.35.0-4.3.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:busybox-1.35.0-4.3.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:busybox-1.35.0-4.3.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:busybox-1.35.0-4.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:busybox-1.35.0-4.3.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:busybox-1.35.0-4.3.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:busybox-1.35.0-4.3.1.s390x", "SUSE Linux Enterprise Server 12 SP5:busybox-1.35.0-4.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:busybox-1.35.0-4.3.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:busybox-1.35.0-4.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:busybox-1.35.0-4.3.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:busybox-1.35.0-4.3.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:busybox-1.35.0-4.3.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:busybox-1.35.0-4.3.1.x86_64", "SUSE OpenStack Cloud 9:busybox-1.35.0-4.3.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:busybox-1.35.0-4.3.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2018-1000517", url: "https://www.suse.com/security/cve/CVE-2018-1000517", }, { category: "external", summary: "SUSE Bug 1099260 for CVE-2018-1000517", url: "https://bugzilla.suse.com/1099260", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Server 12 SP2-BCL:busybox-1.35.0-4.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:busybox-1.35.0-4.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:busybox-1.35.0-4.3.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:busybox-1.35.0-4.3.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:busybox-1.35.0-4.3.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:busybox-1.35.0-4.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:busybox-1.35.0-4.3.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:busybox-1.35.0-4.3.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:busybox-1.35.0-4.3.1.s390x", "SUSE Linux Enterprise Server 12 SP5:busybox-1.35.0-4.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:busybox-1.35.0-4.3.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:busybox-1.35.0-4.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:busybox-1.35.0-4.3.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:busybox-1.35.0-4.3.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:busybox-1.35.0-4.3.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:busybox-1.35.0-4.3.1.x86_64", "SUSE OpenStack Cloud 9:busybox-1.35.0-4.3.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:busybox-1.35.0-4.3.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.6, baseSeverity: "MEDIUM", vectorString: "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L", version: "3.0", }, products: [ "SUSE Linux Enterprise Server 12 SP2-BCL:busybox-1.35.0-4.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:busybox-1.35.0-4.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:busybox-1.35.0-4.3.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:busybox-1.35.0-4.3.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:busybox-1.35.0-4.3.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:busybox-1.35.0-4.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:busybox-1.35.0-4.3.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:busybox-1.35.0-4.3.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:busybox-1.35.0-4.3.1.s390x", "SUSE Linux Enterprise Server 12 SP5:busybox-1.35.0-4.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:busybox-1.35.0-4.3.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:busybox-1.35.0-4.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:busybox-1.35.0-4.3.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:busybox-1.35.0-4.3.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:busybox-1.35.0-4.3.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:busybox-1.35.0-4.3.1.x86_64", "SUSE OpenStack Cloud 9:busybox-1.35.0-4.3.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:busybox-1.35.0-4.3.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2022-11-28T10:23:47Z", details: "important", }, ], title: "CVE-2018-1000517", }, { cve: "CVE-2018-20679", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2018-20679", }, ], notes: [ { category: "general", text: "An issue was discovered in BusyBox before 1.30.0. An out of bounds read in udhcp components (consumed by the DHCP server, client, and relay) allows a remote attacker to leak sensitive information from the stack by sending a crafted DHCP message. This is related to verification in udhcp_get_option() in networking/udhcp/common.c that 4-byte options are indeed 4 bytes.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Server 12 SP2-BCL:busybox-1.35.0-4.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:busybox-1.35.0-4.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:busybox-1.35.0-4.3.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:busybox-1.35.0-4.3.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:busybox-1.35.0-4.3.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:busybox-1.35.0-4.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:busybox-1.35.0-4.3.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:busybox-1.35.0-4.3.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:busybox-1.35.0-4.3.1.s390x", "SUSE Linux Enterprise Server 12 SP5:busybox-1.35.0-4.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:busybox-1.35.0-4.3.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:busybox-1.35.0-4.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:busybox-1.35.0-4.3.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:busybox-1.35.0-4.3.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:busybox-1.35.0-4.3.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:busybox-1.35.0-4.3.1.x86_64", "SUSE OpenStack Cloud 9:busybox-1.35.0-4.3.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:busybox-1.35.0-4.3.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2018-20679", url: "https://www.suse.com/security/cve/CVE-2018-20679", }, { category: "external", summary: "SUSE Bug 1121426 for CVE-2018-20679", url: "https://bugzilla.suse.com/1121426", }, { category: "external", summary: "SUSE Bug 1121428 for CVE-2018-20679", url: "https://bugzilla.suse.com/1121428", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Server 12 SP2-BCL:busybox-1.35.0-4.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:busybox-1.35.0-4.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:busybox-1.35.0-4.3.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:busybox-1.35.0-4.3.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:busybox-1.35.0-4.3.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:busybox-1.35.0-4.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:busybox-1.35.0-4.3.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:busybox-1.35.0-4.3.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:busybox-1.35.0-4.3.1.s390x", "SUSE Linux Enterprise Server 12 SP5:busybox-1.35.0-4.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:busybox-1.35.0-4.3.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:busybox-1.35.0-4.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:busybox-1.35.0-4.3.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:busybox-1.35.0-4.3.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:busybox-1.35.0-4.3.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:busybox-1.35.0-4.3.1.x86_64", "SUSE OpenStack Cloud 9:busybox-1.35.0-4.3.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:busybox-1.35.0-4.3.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.3, baseSeverity: "MEDIUM", vectorString: "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N", version: "3.0", }, products: [ "SUSE Linux Enterprise Server 12 SP2-BCL:busybox-1.35.0-4.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:busybox-1.35.0-4.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:busybox-1.35.0-4.3.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:busybox-1.35.0-4.3.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:busybox-1.35.0-4.3.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:busybox-1.35.0-4.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:busybox-1.35.0-4.3.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:busybox-1.35.0-4.3.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:busybox-1.35.0-4.3.1.s390x", "SUSE Linux Enterprise Server 12 SP5:busybox-1.35.0-4.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:busybox-1.35.0-4.3.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:busybox-1.35.0-4.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:busybox-1.35.0-4.3.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:busybox-1.35.0-4.3.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:busybox-1.35.0-4.3.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:busybox-1.35.0-4.3.1.x86_64", "SUSE OpenStack Cloud 9:busybox-1.35.0-4.3.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:busybox-1.35.0-4.3.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2022-11-28T10:23:47Z", details: "moderate", }, ], title: "CVE-2018-20679", }, { cve: "CVE-2019-5747", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2019-5747", }, ], notes: [ { category: "general", text: "An issue was discovered in BusyBox through 1.30.0. An out of bounds read in udhcp components (consumed by the DHCP client, server, and/or relay) might allow a remote attacker to leak sensitive information from the stack by sending a crafted DHCP message. This is related to assurance of a 4-byte length when decoding DHCP_SUBNET. NOTE: this issue exists because of an incomplete fix for CVE-2018-20679.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Server 12 SP2-BCL:busybox-1.35.0-4.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:busybox-1.35.0-4.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:busybox-1.35.0-4.3.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:busybox-1.35.0-4.3.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:busybox-1.35.0-4.3.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:busybox-1.35.0-4.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:busybox-1.35.0-4.3.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:busybox-1.35.0-4.3.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:busybox-1.35.0-4.3.1.s390x", "SUSE Linux Enterprise Server 12 SP5:busybox-1.35.0-4.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:busybox-1.35.0-4.3.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:busybox-1.35.0-4.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:busybox-1.35.0-4.3.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:busybox-1.35.0-4.3.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:busybox-1.35.0-4.3.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:busybox-1.35.0-4.3.1.x86_64", "SUSE OpenStack Cloud 9:busybox-1.35.0-4.3.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:busybox-1.35.0-4.3.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2019-5747", url: "https://www.suse.com/security/cve/CVE-2019-5747", }, { category: "external", summary: "SUSE Bug 1121426 for CVE-2019-5747", url: "https://bugzilla.suse.com/1121426", }, { category: "external", summary: "SUSE Bug 1121428 for CVE-2019-5747", url: "https://bugzilla.suse.com/1121428", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Server 12 SP2-BCL:busybox-1.35.0-4.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:busybox-1.35.0-4.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:busybox-1.35.0-4.3.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:busybox-1.35.0-4.3.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:busybox-1.35.0-4.3.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:busybox-1.35.0-4.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:busybox-1.35.0-4.3.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:busybox-1.35.0-4.3.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:busybox-1.35.0-4.3.1.s390x", "SUSE Linux Enterprise Server 12 SP5:busybox-1.35.0-4.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:busybox-1.35.0-4.3.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:busybox-1.35.0-4.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:busybox-1.35.0-4.3.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:busybox-1.35.0-4.3.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:busybox-1.35.0-4.3.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:busybox-1.35.0-4.3.1.x86_64", "SUSE OpenStack Cloud 9:busybox-1.35.0-4.3.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:busybox-1.35.0-4.3.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 3.5, baseSeverity: "LOW", vectorString: "CVSS:3.1/AV:A/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N", version: "3.1", }, products: [ "SUSE Linux Enterprise Server 12 SP2-BCL:busybox-1.35.0-4.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:busybox-1.35.0-4.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:busybox-1.35.0-4.3.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:busybox-1.35.0-4.3.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:busybox-1.35.0-4.3.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:busybox-1.35.0-4.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:busybox-1.35.0-4.3.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:busybox-1.35.0-4.3.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:busybox-1.35.0-4.3.1.s390x", "SUSE Linux Enterprise Server 12 SP5:busybox-1.35.0-4.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:busybox-1.35.0-4.3.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:busybox-1.35.0-4.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:busybox-1.35.0-4.3.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:busybox-1.35.0-4.3.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:busybox-1.35.0-4.3.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:busybox-1.35.0-4.3.1.x86_64", "SUSE OpenStack Cloud 9:busybox-1.35.0-4.3.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:busybox-1.35.0-4.3.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2022-11-28T10:23:47Z", details: "low", }, ], title: "CVE-2019-5747", }, { cve: "CVE-2021-28831", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2021-28831", }, ], notes: [ { category: "general", text: "decompress_gunzip.c in BusyBox through 1.32.1 mishandles the error bit on the huft_build result pointer, with a resultant invalid free or segmentation fault, via malformed gzip data.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Server 12 SP2-BCL:busybox-1.35.0-4.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:busybox-1.35.0-4.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:busybox-1.35.0-4.3.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:busybox-1.35.0-4.3.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:busybox-1.35.0-4.3.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:busybox-1.35.0-4.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:busybox-1.35.0-4.3.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:busybox-1.35.0-4.3.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:busybox-1.35.0-4.3.1.s390x", "SUSE Linux Enterprise Server 12 SP5:busybox-1.35.0-4.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:busybox-1.35.0-4.3.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:busybox-1.35.0-4.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:busybox-1.35.0-4.3.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:busybox-1.35.0-4.3.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:busybox-1.35.0-4.3.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:busybox-1.35.0-4.3.1.x86_64", "SUSE OpenStack Cloud 9:busybox-1.35.0-4.3.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:busybox-1.35.0-4.3.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2021-28831", url: "https://www.suse.com/security/cve/CVE-2021-28831", }, { category: "external", summary: "SUSE Bug 1184522 for CVE-2021-28831", url: "https://bugzilla.suse.com/1184522", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Server 12 SP2-BCL:busybox-1.35.0-4.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:busybox-1.35.0-4.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:busybox-1.35.0-4.3.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:busybox-1.35.0-4.3.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:busybox-1.35.0-4.3.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:busybox-1.35.0-4.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:busybox-1.35.0-4.3.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:busybox-1.35.0-4.3.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:busybox-1.35.0-4.3.1.s390x", "SUSE Linux Enterprise Server 12 SP5:busybox-1.35.0-4.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:busybox-1.35.0-4.3.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:busybox-1.35.0-4.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:busybox-1.35.0-4.3.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:busybox-1.35.0-4.3.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:busybox-1.35.0-4.3.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:busybox-1.35.0-4.3.1.x86_64", "SUSE OpenStack Cloud 9:busybox-1.35.0-4.3.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:busybox-1.35.0-4.3.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 7.5, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Server 12 SP2-BCL:busybox-1.35.0-4.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:busybox-1.35.0-4.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:busybox-1.35.0-4.3.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:busybox-1.35.0-4.3.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:busybox-1.35.0-4.3.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:busybox-1.35.0-4.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:busybox-1.35.0-4.3.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:busybox-1.35.0-4.3.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:busybox-1.35.0-4.3.1.s390x", "SUSE Linux Enterprise Server 12 SP5:busybox-1.35.0-4.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:busybox-1.35.0-4.3.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:busybox-1.35.0-4.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:busybox-1.35.0-4.3.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:busybox-1.35.0-4.3.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:busybox-1.35.0-4.3.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:busybox-1.35.0-4.3.1.x86_64", "SUSE OpenStack Cloud 9:busybox-1.35.0-4.3.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:busybox-1.35.0-4.3.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2022-11-28T10:23:47Z", details: "important", }, ], title: "CVE-2021-28831", }, { cve: "CVE-2021-42373", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2021-42373", }, ], notes: [ { category: "general", text: "A NULL pointer dereference in Busybox's man applet leads to denial of service when a section name is supplied but no page argument is given", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Server 12 SP2-BCL:busybox-1.35.0-4.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:busybox-1.35.0-4.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:busybox-1.35.0-4.3.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:busybox-1.35.0-4.3.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:busybox-1.35.0-4.3.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:busybox-1.35.0-4.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:busybox-1.35.0-4.3.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:busybox-1.35.0-4.3.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:busybox-1.35.0-4.3.1.s390x", "SUSE Linux Enterprise Server 12 SP5:busybox-1.35.0-4.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:busybox-1.35.0-4.3.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:busybox-1.35.0-4.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:busybox-1.35.0-4.3.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:busybox-1.35.0-4.3.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:busybox-1.35.0-4.3.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:busybox-1.35.0-4.3.1.x86_64", "SUSE OpenStack Cloud 9:busybox-1.35.0-4.3.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:busybox-1.35.0-4.3.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2021-42373", url: "https://www.suse.com/security/cve/CVE-2021-42373", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Server 12 SP2-BCL:busybox-1.35.0-4.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:busybox-1.35.0-4.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:busybox-1.35.0-4.3.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:busybox-1.35.0-4.3.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:busybox-1.35.0-4.3.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:busybox-1.35.0-4.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:busybox-1.35.0-4.3.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:busybox-1.35.0-4.3.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:busybox-1.35.0-4.3.1.s390x", "SUSE Linux Enterprise Server 12 SP5:busybox-1.35.0-4.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:busybox-1.35.0-4.3.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:busybox-1.35.0-4.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:busybox-1.35.0-4.3.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:busybox-1.35.0-4.3.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:busybox-1.35.0-4.3.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:busybox-1.35.0-4.3.1.x86_64", "SUSE OpenStack Cloud 9:busybox-1.35.0-4.3.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:busybox-1.35.0-4.3.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.5, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Server 12 SP2-BCL:busybox-1.35.0-4.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:busybox-1.35.0-4.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:busybox-1.35.0-4.3.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:busybox-1.35.0-4.3.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:busybox-1.35.0-4.3.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:busybox-1.35.0-4.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:busybox-1.35.0-4.3.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:busybox-1.35.0-4.3.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:busybox-1.35.0-4.3.1.s390x", "SUSE Linux Enterprise Server 12 SP5:busybox-1.35.0-4.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:busybox-1.35.0-4.3.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:busybox-1.35.0-4.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:busybox-1.35.0-4.3.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:busybox-1.35.0-4.3.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:busybox-1.35.0-4.3.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:busybox-1.35.0-4.3.1.x86_64", "SUSE OpenStack Cloud 9:busybox-1.35.0-4.3.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:busybox-1.35.0-4.3.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2022-11-28T10:23:47Z", details: "moderate", }, ], title: "CVE-2021-42373", }, { cve: "CVE-2021-42374", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2021-42374", }, ], notes: [ { category: "general", text: "An out-of-bounds heap read in Busybox's unlzma applet leads to information leak and denial of service when crafted LZMA-compressed input is decompressed. This can be triggered by any applet/format that", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Server 12 SP2-BCL:busybox-1.35.0-4.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:busybox-1.35.0-4.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:busybox-1.35.0-4.3.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:busybox-1.35.0-4.3.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:busybox-1.35.0-4.3.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:busybox-1.35.0-4.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:busybox-1.35.0-4.3.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:busybox-1.35.0-4.3.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:busybox-1.35.0-4.3.1.s390x", "SUSE Linux Enterprise Server 12 SP5:busybox-1.35.0-4.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:busybox-1.35.0-4.3.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:busybox-1.35.0-4.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:busybox-1.35.0-4.3.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:busybox-1.35.0-4.3.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:busybox-1.35.0-4.3.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:busybox-1.35.0-4.3.1.x86_64", "SUSE OpenStack Cloud 9:busybox-1.35.0-4.3.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:busybox-1.35.0-4.3.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2021-42374", url: "https://www.suse.com/security/cve/CVE-2021-42374", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Server 12 SP2-BCL:busybox-1.35.0-4.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:busybox-1.35.0-4.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:busybox-1.35.0-4.3.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:busybox-1.35.0-4.3.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:busybox-1.35.0-4.3.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:busybox-1.35.0-4.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:busybox-1.35.0-4.3.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:busybox-1.35.0-4.3.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:busybox-1.35.0-4.3.1.s390x", "SUSE Linux Enterprise Server 12 SP5:busybox-1.35.0-4.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:busybox-1.35.0-4.3.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:busybox-1.35.0-4.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:busybox-1.35.0-4.3.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:busybox-1.35.0-4.3.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:busybox-1.35.0-4.3.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:busybox-1.35.0-4.3.1.x86_64", "SUSE OpenStack Cloud 9:busybox-1.35.0-4.3.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:busybox-1.35.0-4.3.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.7, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Server 12 SP2-BCL:busybox-1.35.0-4.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:busybox-1.35.0-4.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:busybox-1.35.0-4.3.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:busybox-1.35.0-4.3.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:busybox-1.35.0-4.3.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:busybox-1.35.0-4.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:busybox-1.35.0-4.3.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:busybox-1.35.0-4.3.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:busybox-1.35.0-4.3.1.s390x", "SUSE Linux Enterprise Server 12 SP5:busybox-1.35.0-4.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:busybox-1.35.0-4.3.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:busybox-1.35.0-4.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:busybox-1.35.0-4.3.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:busybox-1.35.0-4.3.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:busybox-1.35.0-4.3.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:busybox-1.35.0-4.3.1.x86_64", "SUSE OpenStack Cloud 9:busybox-1.35.0-4.3.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:busybox-1.35.0-4.3.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2022-11-28T10:23:47Z", details: "moderate", }, ], title: "CVE-2021-42374", }, { cve: "CVE-2021-42375", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2021-42375", }, ], notes: [ { category: "general", text: "An incorrect handling of a special element in Busybox's ash applet leads to denial of service when processing a crafted shell command, due to the shell mistaking specific characters for reserved characters. This may be used for DoS under rare conditions of filtered command input.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Server 12 SP2-BCL:busybox-1.35.0-4.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:busybox-1.35.0-4.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:busybox-1.35.0-4.3.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:busybox-1.35.0-4.3.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:busybox-1.35.0-4.3.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:busybox-1.35.0-4.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:busybox-1.35.0-4.3.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:busybox-1.35.0-4.3.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:busybox-1.35.0-4.3.1.s390x", "SUSE Linux Enterprise Server 12 SP5:busybox-1.35.0-4.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:busybox-1.35.0-4.3.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:busybox-1.35.0-4.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:busybox-1.35.0-4.3.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:busybox-1.35.0-4.3.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:busybox-1.35.0-4.3.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:busybox-1.35.0-4.3.1.x86_64", "SUSE OpenStack Cloud 9:busybox-1.35.0-4.3.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:busybox-1.35.0-4.3.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2021-42375", url: "https://www.suse.com/security/cve/CVE-2021-42375", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Server 12 SP2-BCL:busybox-1.35.0-4.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:busybox-1.35.0-4.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:busybox-1.35.0-4.3.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:busybox-1.35.0-4.3.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:busybox-1.35.0-4.3.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:busybox-1.35.0-4.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:busybox-1.35.0-4.3.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:busybox-1.35.0-4.3.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:busybox-1.35.0-4.3.1.s390x", "SUSE Linux Enterprise Server 12 SP5:busybox-1.35.0-4.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:busybox-1.35.0-4.3.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:busybox-1.35.0-4.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:busybox-1.35.0-4.3.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:busybox-1.35.0-4.3.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:busybox-1.35.0-4.3.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:busybox-1.35.0-4.3.1.x86_64", "SUSE OpenStack Cloud 9:busybox-1.35.0-4.3.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:busybox-1.35.0-4.3.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 4.1, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Server 12 SP2-BCL:busybox-1.35.0-4.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:busybox-1.35.0-4.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:busybox-1.35.0-4.3.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:busybox-1.35.0-4.3.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:busybox-1.35.0-4.3.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:busybox-1.35.0-4.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:busybox-1.35.0-4.3.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:busybox-1.35.0-4.3.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:busybox-1.35.0-4.3.1.s390x", "SUSE Linux Enterprise Server 12 SP5:busybox-1.35.0-4.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:busybox-1.35.0-4.3.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:busybox-1.35.0-4.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:busybox-1.35.0-4.3.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:busybox-1.35.0-4.3.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:busybox-1.35.0-4.3.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:busybox-1.35.0-4.3.1.x86_64", "SUSE OpenStack Cloud 9:busybox-1.35.0-4.3.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:busybox-1.35.0-4.3.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2022-11-28T10:23:47Z", details: "moderate", }, ], title: "CVE-2021-42375", }, { cve: "CVE-2021-42376", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2021-42376", }, ], notes: [ { category: "general", text: "A NULL pointer dereference in Busybox's hush applet leads to denial of service when processing a crafted shell command, due to missing validation after a \\x03 delimiter character. This may be used for DoS under very rare conditions of filtered command input.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Server 12 SP2-BCL:busybox-1.35.0-4.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:busybox-1.35.0-4.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:busybox-1.35.0-4.3.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:busybox-1.35.0-4.3.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:busybox-1.35.0-4.3.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:busybox-1.35.0-4.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:busybox-1.35.0-4.3.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:busybox-1.35.0-4.3.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:busybox-1.35.0-4.3.1.s390x", "SUSE Linux Enterprise Server 12 SP5:busybox-1.35.0-4.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:busybox-1.35.0-4.3.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:busybox-1.35.0-4.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:busybox-1.35.0-4.3.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:busybox-1.35.0-4.3.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:busybox-1.35.0-4.3.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:busybox-1.35.0-4.3.1.x86_64", "SUSE OpenStack Cloud 9:busybox-1.35.0-4.3.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:busybox-1.35.0-4.3.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2021-42376", url: "https://www.suse.com/security/cve/CVE-2021-42376", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Server 12 SP2-BCL:busybox-1.35.0-4.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:busybox-1.35.0-4.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:busybox-1.35.0-4.3.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:busybox-1.35.0-4.3.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:busybox-1.35.0-4.3.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:busybox-1.35.0-4.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:busybox-1.35.0-4.3.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:busybox-1.35.0-4.3.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:busybox-1.35.0-4.3.1.s390x", "SUSE Linux Enterprise Server 12 SP5:busybox-1.35.0-4.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:busybox-1.35.0-4.3.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:busybox-1.35.0-4.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:busybox-1.35.0-4.3.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:busybox-1.35.0-4.3.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:busybox-1.35.0-4.3.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:busybox-1.35.0-4.3.1.x86_64", "SUSE OpenStack Cloud 9:busybox-1.35.0-4.3.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:busybox-1.35.0-4.3.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 4.1, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Server 12 SP2-BCL:busybox-1.35.0-4.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:busybox-1.35.0-4.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:busybox-1.35.0-4.3.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:busybox-1.35.0-4.3.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:busybox-1.35.0-4.3.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:busybox-1.35.0-4.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:busybox-1.35.0-4.3.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:busybox-1.35.0-4.3.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:busybox-1.35.0-4.3.1.s390x", "SUSE Linux Enterprise Server 12 SP5:busybox-1.35.0-4.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:busybox-1.35.0-4.3.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:busybox-1.35.0-4.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:busybox-1.35.0-4.3.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:busybox-1.35.0-4.3.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:busybox-1.35.0-4.3.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:busybox-1.35.0-4.3.1.x86_64", "SUSE OpenStack Cloud 9:busybox-1.35.0-4.3.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:busybox-1.35.0-4.3.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2022-11-28T10:23:47Z", details: "moderate", }, ], title: "CVE-2021-42376", }, { cve: "CVE-2021-42377", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2021-42377", }, ], notes: [ { category: "general", text: "An attacker-controlled pointer free in Busybox's hush applet leads to denial of service and possible code execution when processing a crafted shell command, due to the shell mishandling the &&& string. This may be used for remote code execution under rare conditions of filtered command input.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Server 12 SP2-BCL:busybox-1.35.0-4.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:busybox-1.35.0-4.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:busybox-1.35.0-4.3.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:busybox-1.35.0-4.3.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:busybox-1.35.0-4.3.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:busybox-1.35.0-4.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:busybox-1.35.0-4.3.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:busybox-1.35.0-4.3.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:busybox-1.35.0-4.3.1.s390x", "SUSE Linux Enterprise Server 12 SP5:busybox-1.35.0-4.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:busybox-1.35.0-4.3.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:busybox-1.35.0-4.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:busybox-1.35.0-4.3.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:busybox-1.35.0-4.3.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:busybox-1.35.0-4.3.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:busybox-1.35.0-4.3.1.x86_64", "SUSE OpenStack Cloud 9:busybox-1.35.0-4.3.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:busybox-1.35.0-4.3.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2021-42377", url: "https://www.suse.com/security/cve/CVE-2021-42377", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Server 12 SP2-BCL:busybox-1.35.0-4.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:busybox-1.35.0-4.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:busybox-1.35.0-4.3.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:busybox-1.35.0-4.3.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:busybox-1.35.0-4.3.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:busybox-1.35.0-4.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:busybox-1.35.0-4.3.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:busybox-1.35.0-4.3.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:busybox-1.35.0-4.3.1.s390x", "SUSE Linux Enterprise Server 12 SP5:busybox-1.35.0-4.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:busybox-1.35.0-4.3.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:busybox-1.35.0-4.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:busybox-1.35.0-4.3.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:busybox-1.35.0-4.3.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:busybox-1.35.0-4.3.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:busybox-1.35.0-4.3.1.x86_64", "SUSE OpenStack Cloud 9:busybox-1.35.0-4.3.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:busybox-1.35.0-4.3.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 6.4, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Server 12 SP2-BCL:busybox-1.35.0-4.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:busybox-1.35.0-4.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:busybox-1.35.0-4.3.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:busybox-1.35.0-4.3.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:busybox-1.35.0-4.3.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:busybox-1.35.0-4.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:busybox-1.35.0-4.3.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:busybox-1.35.0-4.3.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:busybox-1.35.0-4.3.1.s390x", "SUSE Linux Enterprise Server 12 SP5:busybox-1.35.0-4.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:busybox-1.35.0-4.3.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:busybox-1.35.0-4.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:busybox-1.35.0-4.3.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:busybox-1.35.0-4.3.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:busybox-1.35.0-4.3.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:busybox-1.35.0-4.3.1.x86_64", "SUSE OpenStack Cloud 9:busybox-1.35.0-4.3.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:busybox-1.35.0-4.3.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2022-11-28T10:23:47Z", details: "moderate", }, ], title: "CVE-2021-42377", }, { cve: "CVE-2021-42378", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2021-42378", }, ], notes: [ { category: "general", text: "A use-after-free in Busybox's awk applet leads to denial of service and possibly code execution when processing a crafted awk pattern in the getvar_i function", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Server 12 SP2-BCL:busybox-1.35.0-4.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:busybox-1.35.0-4.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:busybox-1.35.0-4.3.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:busybox-1.35.0-4.3.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:busybox-1.35.0-4.3.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:busybox-1.35.0-4.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:busybox-1.35.0-4.3.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:busybox-1.35.0-4.3.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:busybox-1.35.0-4.3.1.s390x", "SUSE Linux Enterprise Server 12 SP5:busybox-1.35.0-4.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:busybox-1.35.0-4.3.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:busybox-1.35.0-4.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:busybox-1.35.0-4.3.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:busybox-1.35.0-4.3.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:busybox-1.35.0-4.3.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:busybox-1.35.0-4.3.1.x86_64", "SUSE OpenStack Cloud 9:busybox-1.35.0-4.3.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:busybox-1.35.0-4.3.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2021-42378", url: "https://www.suse.com/security/cve/CVE-2021-42378", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Server 12 SP2-BCL:busybox-1.35.0-4.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:busybox-1.35.0-4.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:busybox-1.35.0-4.3.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:busybox-1.35.0-4.3.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:busybox-1.35.0-4.3.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:busybox-1.35.0-4.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:busybox-1.35.0-4.3.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:busybox-1.35.0-4.3.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:busybox-1.35.0-4.3.1.s390x", "SUSE Linux Enterprise Server 12 SP5:busybox-1.35.0-4.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:busybox-1.35.0-4.3.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:busybox-1.35.0-4.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:busybox-1.35.0-4.3.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:busybox-1.35.0-4.3.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:busybox-1.35.0-4.3.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:busybox-1.35.0-4.3.1.x86_64", "SUSE OpenStack Cloud 9:busybox-1.35.0-4.3.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:busybox-1.35.0-4.3.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 6.6, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Server 12 SP2-BCL:busybox-1.35.0-4.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:busybox-1.35.0-4.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:busybox-1.35.0-4.3.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:busybox-1.35.0-4.3.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:busybox-1.35.0-4.3.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:busybox-1.35.0-4.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:busybox-1.35.0-4.3.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:busybox-1.35.0-4.3.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:busybox-1.35.0-4.3.1.s390x", "SUSE Linux Enterprise Server 12 SP5:busybox-1.35.0-4.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:busybox-1.35.0-4.3.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:busybox-1.35.0-4.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:busybox-1.35.0-4.3.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:busybox-1.35.0-4.3.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:busybox-1.35.0-4.3.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:busybox-1.35.0-4.3.1.x86_64", "SUSE OpenStack Cloud 9:busybox-1.35.0-4.3.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:busybox-1.35.0-4.3.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2022-11-28T10:23:47Z", details: "moderate", }, ], title: "CVE-2021-42378", }, { cve: "CVE-2021-42379", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2021-42379", }, ], notes: [ { category: "general", text: "A use-after-free in Busybox's awk applet leads to denial of service and possibly code execution when processing a crafted awk pattern in the next_input_file function", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Server 12 SP2-BCL:busybox-1.35.0-4.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:busybox-1.35.0-4.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:busybox-1.35.0-4.3.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:busybox-1.35.0-4.3.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:busybox-1.35.0-4.3.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:busybox-1.35.0-4.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:busybox-1.35.0-4.3.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:busybox-1.35.0-4.3.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:busybox-1.35.0-4.3.1.s390x", "SUSE Linux Enterprise Server 12 SP5:busybox-1.35.0-4.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:busybox-1.35.0-4.3.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:busybox-1.35.0-4.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:busybox-1.35.0-4.3.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:busybox-1.35.0-4.3.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:busybox-1.35.0-4.3.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:busybox-1.35.0-4.3.1.x86_64", "SUSE OpenStack Cloud 9:busybox-1.35.0-4.3.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:busybox-1.35.0-4.3.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2021-42379", url: "https://www.suse.com/security/cve/CVE-2021-42379", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Server 12 SP2-BCL:busybox-1.35.0-4.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:busybox-1.35.0-4.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:busybox-1.35.0-4.3.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:busybox-1.35.0-4.3.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:busybox-1.35.0-4.3.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:busybox-1.35.0-4.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:busybox-1.35.0-4.3.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:busybox-1.35.0-4.3.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:busybox-1.35.0-4.3.1.s390x", "SUSE Linux Enterprise Server 12 SP5:busybox-1.35.0-4.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:busybox-1.35.0-4.3.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:busybox-1.35.0-4.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:busybox-1.35.0-4.3.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:busybox-1.35.0-4.3.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:busybox-1.35.0-4.3.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:busybox-1.35.0-4.3.1.x86_64", "SUSE OpenStack Cloud 9:busybox-1.35.0-4.3.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:busybox-1.35.0-4.3.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 6.6, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Server 12 SP2-BCL:busybox-1.35.0-4.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:busybox-1.35.0-4.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:busybox-1.35.0-4.3.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:busybox-1.35.0-4.3.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:busybox-1.35.0-4.3.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:busybox-1.35.0-4.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:busybox-1.35.0-4.3.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:busybox-1.35.0-4.3.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:busybox-1.35.0-4.3.1.s390x", "SUSE Linux Enterprise Server 12 SP5:busybox-1.35.0-4.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:busybox-1.35.0-4.3.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:busybox-1.35.0-4.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:busybox-1.35.0-4.3.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:busybox-1.35.0-4.3.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:busybox-1.35.0-4.3.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:busybox-1.35.0-4.3.1.x86_64", "SUSE OpenStack Cloud 9:busybox-1.35.0-4.3.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:busybox-1.35.0-4.3.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2022-11-28T10:23:47Z", details: "moderate", }, ], title: "CVE-2021-42379", }, { cve: "CVE-2021-42380", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2021-42380", }, ], notes: [ { category: "general", text: "A use-after-free in Busybox's awk applet leads to denial of service and possibly code execution when processing a crafted awk pattern in the clrvar function", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Server 12 SP2-BCL:busybox-1.35.0-4.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:busybox-1.35.0-4.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:busybox-1.35.0-4.3.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:busybox-1.35.0-4.3.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:busybox-1.35.0-4.3.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:busybox-1.35.0-4.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:busybox-1.35.0-4.3.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:busybox-1.35.0-4.3.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:busybox-1.35.0-4.3.1.s390x", "SUSE Linux Enterprise Server 12 SP5:busybox-1.35.0-4.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:busybox-1.35.0-4.3.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:busybox-1.35.0-4.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:busybox-1.35.0-4.3.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:busybox-1.35.0-4.3.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:busybox-1.35.0-4.3.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:busybox-1.35.0-4.3.1.x86_64", "SUSE OpenStack Cloud 9:busybox-1.35.0-4.3.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:busybox-1.35.0-4.3.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2021-42380", url: "https://www.suse.com/security/cve/CVE-2021-42380", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Server 12 SP2-BCL:busybox-1.35.0-4.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:busybox-1.35.0-4.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:busybox-1.35.0-4.3.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:busybox-1.35.0-4.3.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:busybox-1.35.0-4.3.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:busybox-1.35.0-4.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:busybox-1.35.0-4.3.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:busybox-1.35.0-4.3.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:busybox-1.35.0-4.3.1.s390x", "SUSE Linux Enterprise Server 12 SP5:busybox-1.35.0-4.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:busybox-1.35.0-4.3.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:busybox-1.35.0-4.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:busybox-1.35.0-4.3.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:busybox-1.35.0-4.3.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:busybox-1.35.0-4.3.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:busybox-1.35.0-4.3.1.x86_64", "SUSE OpenStack Cloud 9:busybox-1.35.0-4.3.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:busybox-1.35.0-4.3.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 6.6, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Server 12 SP2-BCL:busybox-1.35.0-4.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:busybox-1.35.0-4.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:busybox-1.35.0-4.3.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:busybox-1.35.0-4.3.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:busybox-1.35.0-4.3.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:busybox-1.35.0-4.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:busybox-1.35.0-4.3.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:busybox-1.35.0-4.3.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:busybox-1.35.0-4.3.1.s390x", "SUSE Linux Enterprise Server 12 SP5:busybox-1.35.0-4.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:busybox-1.35.0-4.3.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:busybox-1.35.0-4.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:busybox-1.35.0-4.3.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:busybox-1.35.0-4.3.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:busybox-1.35.0-4.3.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:busybox-1.35.0-4.3.1.x86_64", "SUSE OpenStack Cloud 9:busybox-1.35.0-4.3.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:busybox-1.35.0-4.3.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2022-11-28T10:23:47Z", details: "moderate", }, ], title: "CVE-2021-42380", }, { cve: "CVE-2021-42381", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2021-42381", }, ], notes: [ { category: "general", text: "A use-after-free in Busybox's awk applet leads to denial of service and possibly code execution when processing a crafted awk pattern in the hash_init function", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Server 12 SP2-BCL:busybox-1.35.0-4.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:busybox-1.35.0-4.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:busybox-1.35.0-4.3.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:busybox-1.35.0-4.3.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:busybox-1.35.0-4.3.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:busybox-1.35.0-4.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:busybox-1.35.0-4.3.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:busybox-1.35.0-4.3.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:busybox-1.35.0-4.3.1.s390x", "SUSE Linux Enterprise Server 12 SP5:busybox-1.35.0-4.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:busybox-1.35.0-4.3.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:busybox-1.35.0-4.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:busybox-1.35.0-4.3.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:busybox-1.35.0-4.3.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:busybox-1.35.0-4.3.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:busybox-1.35.0-4.3.1.x86_64", "SUSE OpenStack Cloud 9:busybox-1.35.0-4.3.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:busybox-1.35.0-4.3.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2021-42381", url: "https://www.suse.com/security/cve/CVE-2021-42381", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Server 12 SP2-BCL:busybox-1.35.0-4.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:busybox-1.35.0-4.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:busybox-1.35.0-4.3.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:busybox-1.35.0-4.3.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:busybox-1.35.0-4.3.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:busybox-1.35.0-4.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:busybox-1.35.0-4.3.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:busybox-1.35.0-4.3.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:busybox-1.35.0-4.3.1.s390x", "SUSE Linux Enterprise Server 12 SP5:busybox-1.35.0-4.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:busybox-1.35.0-4.3.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:busybox-1.35.0-4.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:busybox-1.35.0-4.3.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:busybox-1.35.0-4.3.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:busybox-1.35.0-4.3.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:busybox-1.35.0-4.3.1.x86_64", "SUSE OpenStack Cloud 9:busybox-1.35.0-4.3.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:busybox-1.35.0-4.3.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 6.6, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Server 12 SP2-BCL:busybox-1.35.0-4.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:busybox-1.35.0-4.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:busybox-1.35.0-4.3.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:busybox-1.35.0-4.3.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:busybox-1.35.0-4.3.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:busybox-1.35.0-4.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:busybox-1.35.0-4.3.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:busybox-1.35.0-4.3.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:busybox-1.35.0-4.3.1.s390x", "SUSE Linux Enterprise Server 12 SP5:busybox-1.35.0-4.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:busybox-1.35.0-4.3.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:busybox-1.35.0-4.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:busybox-1.35.0-4.3.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:busybox-1.35.0-4.3.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:busybox-1.35.0-4.3.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:busybox-1.35.0-4.3.1.x86_64", "SUSE OpenStack Cloud 9:busybox-1.35.0-4.3.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:busybox-1.35.0-4.3.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2022-11-28T10:23:47Z", details: "moderate", }, ], title: "CVE-2021-42381", }, { cve: "CVE-2021-42382", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2021-42382", }, ], notes: [ { category: "general", text: "A use-after-free in Busybox's awk applet leads to denial of service and possibly code execution when processing a crafted awk pattern in the getvar_s function", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Server 12 SP2-BCL:busybox-1.35.0-4.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:busybox-1.35.0-4.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:busybox-1.35.0-4.3.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:busybox-1.35.0-4.3.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:busybox-1.35.0-4.3.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:busybox-1.35.0-4.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:busybox-1.35.0-4.3.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:busybox-1.35.0-4.3.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:busybox-1.35.0-4.3.1.s390x", "SUSE Linux Enterprise Server 12 SP5:busybox-1.35.0-4.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:busybox-1.35.0-4.3.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:busybox-1.35.0-4.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:busybox-1.35.0-4.3.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:busybox-1.35.0-4.3.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:busybox-1.35.0-4.3.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:busybox-1.35.0-4.3.1.x86_64", "SUSE OpenStack Cloud 9:busybox-1.35.0-4.3.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:busybox-1.35.0-4.3.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2021-42382", url: "https://www.suse.com/security/cve/CVE-2021-42382", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Server 12 SP2-BCL:busybox-1.35.0-4.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:busybox-1.35.0-4.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:busybox-1.35.0-4.3.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:busybox-1.35.0-4.3.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:busybox-1.35.0-4.3.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:busybox-1.35.0-4.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:busybox-1.35.0-4.3.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:busybox-1.35.0-4.3.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:busybox-1.35.0-4.3.1.s390x", "SUSE Linux Enterprise Server 12 SP5:busybox-1.35.0-4.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:busybox-1.35.0-4.3.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:busybox-1.35.0-4.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:busybox-1.35.0-4.3.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:busybox-1.35.0-4.3.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:busybox-1.35.0-4.3.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:busybox-1.35.0-4.3.1.x86_64", "SUSE OpenStack Cloud 9:busybox-1.35.0-4.3.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:busybox-1.35.0-4.3.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 6.6, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Server 12 SP2-BCL:busybox-1.35.0-4.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:busybox-1.35.0-4.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:busybox-1.35.0-4.3.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:busybox-1.35.0-4.3.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:busybox-1.35.0-4.3.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:busybox-1.35.0-4.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:busybox-1.35.0-4.3.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:busybox-1.35.0-4.3.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:busybox-1.35.0-4.3.1.s390x", "SUSE Linux Enterprise Server 12 SP5:busybox-1.35.0-4.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:busybox-1.35.0-4.3.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:busybox-1.35.0-4.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:busybox-1.35.0-4.3.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:busybox-1.35.0-4.3.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:busybox-1.35.0-4.3.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:busybox-1.35.0-4.3.1.x86_64", "SUSE OpenStack Cloud 9:busybox-1.35.0-4.3.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:busybox-1.35.0-4.3.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2022-11-28T10:23:47Z", details: "moderate", }, ], title: "CVE-2021-42382", }, { cve: "CVE-2021-42383", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2021-42383", }, ], notes: [ { category: "general", text: "A use-after-free in Busybox's awk applet leads to denial of service and possibly code execution when processing a crafted awk pattern in the evaluate function", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Server 12 SP2-BCL:busybox-1.35.0-4.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:busybox-1.35.0-4.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:busybox-1.35.0-4.3.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:busybox-1.35.0-4.3.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:busybox-1.35.0-4.3.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:busybox-1.35.0-4.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:busybox-1.35.0-4.3.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:busybox-1.35.0-4.3.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:busybox-1.35.0-4.3.1.s390x", "SUSE Linux Enterprise Server 12 SP5:busybox-1.35.0-4.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:busybox-1.35.0-4.3.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:busybox-1.35.0-4.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:busybox-1.35.0-4.3.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:busybox-1.35.0-4.3.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:busybox-1.35.0-4.3.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:busybox-1.35.0-4.3.1.x86_64", "SUSE OpenStack Cloud 9:busybox-1.35.0-4.3.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:busybox-1.35.0-4.3.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2021-42383", url: "https://www.suse.com/security/cve/CVE-2021-42383", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Server 12 SP2-BCL:busybox-1.35.0-4.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:busybox-1.35.0-4.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:busybox-1.35.0-4.3.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:busybox-1.35.0-4.3.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:busybox-1.35.0-4.3.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:busybox-1.35.0-4.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:busybox-1.35.0-4.3.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:busybox-1.35.0-4.3.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:busybox-1.35.0-4.3.1.s390x", "SUSE Linux Enterprise Server 12 SP5:busybox-1.35.0-4.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:busybox-1.35.0-4.3.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:busybox-1.35.0-4.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:busybox-1.35.0-4.3.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:busybox-1.35.0-4.3.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:busybox-1.35.0-4.3.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:busybox-1.35.0-4.3.1.x86_64", "SUSE OpenStack Cloud 9:busybox-1.35.0-4.3.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:busybox-1.35.0-4.3.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 6.6, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Server 12 SP2-BCL:busybox-1.35.0-4.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:busybox-1.35.0-4.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:busybox-1.35.0-4.3.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:busybox-1.35.0-4.3.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:busybox-1.35.0-4.3.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:busybox-1.35.0-4.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:busybox-1.35.0-4.3.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:busybox-1.35.0-4.3.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:busybox-1.35.0-4.3.1.s390x", "SUSE Linux Enterprise Server 12 SP5:busybox-1.35.0-4.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:busybox-1.35.0-4.3.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:busybox-1.35.0-4.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:busybox-1.35.0-4.3.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:busybox-1.35.0-4.3.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:busybox-1.35.0-4.3.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:busybox-1.35.0-4.3.1.x86_64", "SUSE OpenStack Cloud 9:busybox-1.35.0-4.3.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:busybox-1.35.0-4.3.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2022-11-28T10:23:47Z", details: "moderate", }, ], title: "CVE-2021-42383", }, { cve: "CVE-2021-42384", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2021-42384", }, ], notes: [ { category: "general", text: "A use-after-free in Busybox's awk applet leads to denial of service and possibly code execution when processing a crafted awk pattern in the handle_special function", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Server 12 SP2-BCL:busybox-1.35.0-4.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:busybox-1.35.0-4.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:busybox-1.35.0-4.3.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:busybox-1.35.0-4.3.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:busybox-1.35.0-4.3.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:busybox-1.35.0-4.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:busybox-1.35.0-4.3.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:busybox-1.35.0-4.3.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:busybox-1.35.0-4.3.1.s390x", "SUSE Linux Enterprise Server 12 SP5:busybox-1.35.0-4.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:busybox-1.35.0-4.3.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:busybox-1.35.0-4.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:busybox-1.35.0-4.3.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:busybox-1.35.0-4.3.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:busybox-1.35.0-4.3.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:busybox-1.35.0-4.3.1.x86_64", "SUSE OpenStack Cloud 9:busybox-1.35.0-4.3.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:busybox-1.35.0-4.3.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2021-42384", url: "https://www.suse.com/security/cve/CVE-2021-42384", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Server 12 SP2-BCL:busybox-1.35.0-4.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:busybox-1.35.0-4.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:busybox-1.35.0-4.3.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:busybox-1.35.0-4.3.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:busybox-1.35.0-4.3.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:busybox-1.35.0-4.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:busybox-1.35.0-4.3.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:busybox-1.35.0-4.3.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:busybox-1.35.0-4.3.1.s390x", "SUSE Linux Enterprise Server 12 SP5:busybox-1.35.0-4.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:busybox-1.35.0-4.3.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:busybox-1.35.0-4.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:busybox-1.35.0-4.3.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:busybox-1.35.0-4.3.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:busybox-1.35.0-4.3.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:busybox-1.35.0-4.3.1.x86_64", "SUSE OpenStack Cloud 9:busybox-1.35.0-4.3.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:busybox-1.35.0-4.3.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 6.6, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Server 12 SP2-BCL:busybox-1.35.0-4.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:busybox-1.35.0-4.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:busybox-1.35.0-4.3.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:busybox-1.35.0-4.3.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:busybox-1.35.0-4.3.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:busybox-1.35.0-4.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:busybox-1.35.0-4.3.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:busybox-1.35.0-4.3.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:busybox-1.35.0-4.3.1.s390x", "SUSE Linux Enterprise Server 12 SP5:busybox-1.35.0-4.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:busybox-1.35.0-4.3.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:busybox-1.35.0-4.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:busybox-1.35.0-4.3.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:busybox-1.35.0-4.3.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:busybox-1.35.0-4.3.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:busybox-1.35.0-4.3.1.x86_64", "SUSE OpenStack Cloud 9:busybox-1.35.0-4.3.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:busybox-1.35.0-4.3.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2022-11-28T10:23:47Z", details: "moderate", }, ], title: "CVE-2021-42384", }, { cve: "CVE-2021-42385", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2021-42385", }, ], notes: [ { category: "general", text: "A use-after-free in Busybox's awk applet leads to denial of service and possibly code execution when processing a crafted awk pattern in the evaluate function", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Server 12 SP2-BCL:busybox-1.35.0-4.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:busybox-1.35.0-4.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:busybox-1.35.0-4.3.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:busybox-1.35.0-4.3.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:busybox-1.35.0-4.3.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:busybox-1.35.0-4.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:busybox-1.35.0-4.3.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:busybox-1.35.0-4.3.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:busybox-1.35.0-4.3.1.s390x", "SUSE Linux Enterprise Server 12 SP5:busybox-1.35.0-4.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:busybox-1.35.0-4.3.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:busybox-1.35.0-4.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:busybox-1.35.0-4.3.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:busybox-1.35.0-4.3.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:busybox-1.35.0-4.3.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:busybox-1.35.0-4.3.1.x86_64", "SUSE OpenStack Cloud 9:busybox-1.35.0-4.3.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:busybox-1.35.0-4.3.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2021-42385", url: "https://www.suse.com/security/cve/CVE-2021-42385", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Server 12 SP2-BCL:busybox-1.35.0-4.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:busybox-1.35.0-4.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:busybox-1.35.0-4.3.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:busybox-1.35.0-4.3.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:busybox-1.35.0-4.3.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:busybox-1.35.0-4.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:busybox-1.35.0-4.3.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:busybox-1.35.0-4.3.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:busybox-1.35.0-4.3.1.s390x", "SUSE Linux Enterprise Server 12 SP5:busybox-1.35.0-4.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:busybox-1.35.0-4.3.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:busybox-1.35.0-4.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:busybox-1.35.0-4.3.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:busybox-1.35.0-4.3.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:busybox-1.35.0-4.3.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:busybox-1.35.0-4.3.1.x86_64", "SUSE OpenStack Cloud 9:busybox-1.35.0-4.3.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:busybox-1.35.0-4.3.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 6.6, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Server 12 SP2-BCL:busybox-1.35.0-4.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:busybox-1.35.0-4.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:busybox-1.35.0-4.3.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:busybox-1.35.0-4.3.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:busybox-1.35.0-4.3.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:busybox-1.35.0-4.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:busybox-1.35.0-4.3.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:busybox-1.35.0-4.3.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:busybox-1.35.0-4.3.1.s390x", "SUSE Linux Enterprise Server 12 SP5:busybox-1.35.0-4.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:busybox-1.35.0-4.3.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:busybox-1.35.0-4.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:busybox-1.35.0-4.3.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:busybox-1.35.0-4.3.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:busybox-1.35.0-4.3.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:busybox-1.35.0-4.3.1.x86_64", "SUSE OpenStack Cloud 9:busybox-1.35.0-4.3.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:busybox-1.35.0-4.3.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2022-11-28T10:23:47Z", details: "moderate", }, ], title: "CVE-2021-42385", }, { cve: "CVE-2021-42386", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2021-42386", }, ], notes: [ { category: "general", text: "A use-after-free in Busybox's awk applet leads to denial of service and possibly code execution when processing a crafted awk pattern in the nvalloc function", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Server 12 SP2-BCL:busybox-1.35.0-4.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:busybox-1.35.0-4.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:busybox-1.35.0-4.3.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:busybox-1.35.0-4.3.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:busybox-1.35.0-4.3.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:busybox-1.35.0-4.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:busybox-1.35.0-4.3.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:busybox-1.35.0-4.3.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:busybox-1.35.0-4.3.1.s390x", "SUSE Linux Enterprise Server 12 SP5:busybox-1.35.0-4.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:busybox-1.35.0-4.3.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:busybox-1.35.0-4.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:busybox-1.35.0-4.3.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:busybox-1.35.0-4.3.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:busybox-1.35.0-4.3.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:busybox-1.35.0-4.3.1.x86_64", "SUSE OpenStack Cloud 9:busybox-1.35.0-4.3.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:busybox-1.35.0-4.3.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2021-42386", url: "https://www.suse.com/security/cve/CVE-2021-42386", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Server 12 SP2-BCL:busybox-1.35.0-4.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:busybox-1.35.0-4.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:busybox-1.35.0-4.3.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:busybox-1.35.0-4.3.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:busybox-1.35.0-4.3.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:busybox-1.35.0-4.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:busybox-1.35.0-4.3.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:busybox-1.35.0-4.3.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:busybox-1.35.0-4.3.1.s390x", "SUSE Linux Enterprise Server 12 SP5:busybox-1.35.0-4.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:busybox-1.35.0-4.3.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:busybox-1.35.0-4.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:busybox-1.35.0-4.3.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:busybox-1.35.0-4.3.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:busybox-1.35.0-4.3.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:busybox-1.35.0-4.3.1.x86_64", "SUSE OpenStack Cloud 9:busybox-1.35.0-4.3.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:busybox-1.35.0-4.3.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 6.6, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Server 12 SP2-BCL:busybox-1.35.0-4.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:busybox-1.35.0-4.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:busybox-1.35.0-4.3.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:busybox-1.35.0-4.3.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:busybox-1.35.0-4.3.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:busybox-1.35.0-4.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:busybox-1.35.0-4.3.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:busybox-1.35.0-4.3.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:busybox-1.35.0-4.3.1.s390x", "SUSE Linux Enterprise Server 12 SP5:busybox-1.35.0-4.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:busybox-1.35.0-4.3.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:busybox-1.35.0-4.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:busybox-1.35.0-4.3.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:busybox-1.35.0-4.3.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:busybox-1.35.0-4.3.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:busybox-1.35.0-4.3.1.x86_64", "SUSE OpenStack Cloud 9:busybox-1.35.0-4.3.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:busybox-1.35.0-4.3.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2022-11-28T10:23:47Z", details: "moderate", }, ], title: "CVE-2021-42386", }, ], }
suse-su-2021:3531-1
Vulnerability from csaf_suse
Published
2021-10-27 08:08
Modified
2021-10-27 08:08
Summary
Security update for busybox
Notes
Title of the patch
Security update for busybox
Description of the patch
This update for busybox fixes the following issues:
- CVE-2021-28831: Fixed invalid free or segmentation fault via malformed gzip data (bsc#1184522).
- CVE-2018-20679: Fixed out of bounds read in udhcp (bsc#1121426).
- CVE-2018-1000517: Fixed buffer overflow in the retrieve_file_data() (bsc#1099260).
- CVE-2011-5325: Fixed a directory traversal related to 'tar' command (bsc#951562).
- CVE-2018-1000500: Fixed missing SSL certificate validation related to the 'wget' command (bsc#1099263).
Patchnames
SUSE-2021-3531,SUSE-SLE-Module-Basesystem-15-SP2-2021-3531,SUSE-SLE-Module-Basesystem-15-SP3-2021-3531,SUSE-SLE-Product-HPC-15-2021-3531,SUSE-SLE-Product-HPC-15-SP1-ESPOS-2021-3531,SUSE-SLE-Product-HPC-15-SP1-LTSS-2021-3531,SUSE-SLE-Product-SLES-15-2021-3531,SUSE-SLE-Product-SLES-15-SP1-BCL-2021-3531,SUSE-SLE-Product-SLES-15-SP1-LTSS-2021-3531,SUSE-SLE-Product-SLES_SAP-15-2021-3531,SUSE-SLE-Product-SLES_SAP-15-SP1-2021-3531,SUSE-Storage-6-2021-3531
Terms of use
CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
{ document: { aggregate_severity: { namespace: "https://www.suse.com/support/security/rating/", text: "important", }, category: "csaf_security_advisory", csaf_version: "2.0", distribution: { text: "Copyright 2024 SUSE LLC. All rights reserved.", tlp: { label: "WHITE", url: "https://www.first.org/tlp/", }, }, lang: "en", notes: [ { category: "summary", text: "Security update for busybox", title: "Title of the patch", }, { category: "description", text: "This update for busybox fixes the following issues:\n\n- CVE-2021-28831: Fixed invalid free or segmentation fault via malformed gzip data (bsc#1184522).\n- CVE-2018-20679: Fixed out of bounds read in udhcp (bsc#1121426).\n- CVE-2018-1000517: Fixed buffer overflow in the retrieve_file_data() (bsc#1099260).\n- CVE-2011-5325: Fixed a directory traversal related to 'tar' command (bsc#951562).\n- CVE-2018-1000500: Fixed missing SSL certificate validation related to the 'wget' command (bsc#1099263).\n", title: "Description of the patch", }, { category: "details", text: "SUSE-2021-3531,SUSE-SLE-Module-Basesystem-15-SP2-2021-3531,SUSE-SLE-Module-Basesystem-15-SP3-2021-3531,SUSE-SLE-Product-HPC-15-2021-3531,SUSE-SLE-Product-HPC-15-SP1-ESPOS-2021-3531,SUSE-SLE-Product-HPC-15-SP1-LTSS-2021-3531,SUSE-SLE-Product-SLES-15-2021-3531,SUSE-SLE-Product-SLES-15-SP1-BCL-2021-3531,SUSE-SLE-Product-SLES-15-SP1-LTSS-2021-3531,SUSE-SLE-Product-SLES_SAP-15-2021-3531,SUSE-SLE-Product-SLES_SAP-15-SP1-2021-3531,SUSE-Storage-6-2021-3531", title: "Patchnames", }, { category: "legal_disclaimer", text: "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", title: "Terms of use", }, ], publisher: { category: "vendor", contact_details: "https://www.suse.com/support/security/contact/", name: "SUSE Product Security Team", namespace: "https://www.suse.com/", }, references: [ { category: "external", summary: "SUSE ratings", url: "https://www.suse.com/support/security/rating/", }, { category: "self", summary: "URL of this CSAF notice", url: "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2021_3531-1.json", }, { category: "self", summary: "URL for SUSE-SU-2021:3531-1", url: "https://www.suse.com/support/update/announcement/2021/suse-su-20213531-1/", }, { category: "self", summary: "E-Mail link for SUSE-SU-2021:3531-1", url: "https://lists.suse.com/pipermail/sle-security-updates/2021-October/009658.html", }, { category: "self", summary: "SUSE Bug 1099260", url: "https://bugzilla.suse.com/1099260", }, { category: "self", summary: "SUSE Bug 1099263", url: "https://bugzilla.suse.com/1099263", }, { category: "self", summary: "SUSE Bug 1121426", url: "https://bugzilla.suse.com/1121426", }, { category: "self", summary: "SUSE Bug 1184522", url: "https://bugzilla.suse.com/1184522", }, { category: "self", summary: "SUSE Bug 951562", url: "https://bugzilla.suse.com/951562", }, { category: "self", summary: "SUSE CVE CVE-2011-5325 page", url: "https://www.suse.com/security/cve/CVE-2011-5325/", }, { category: "self", summary: "SUSE CVE CVE-2018-1000500 page", url: "https://www.suse.com/security/cve/CVE-2018-1000500/", }, { category: "self", summary: "SUSE CVE CVE-2018-1000517 page", url: "https://www.suse.com/security/cve/CVE-2018-1000517/", }, { category: "self", summary: "SUSE CVE CVE-2018-20679 page", url: "https://www.suse.com/security/cve/CVE-2018-20679/", }, { category: "self", summary: "SUSE CVE CVE-2021-28831 page", url: "https://www.suse.com/security/cve/CVE-2021-28831/", }, ], title: "Security update for busybox", tracking: { current_release_date: "2021-10-27T08:08:18Z", generator: { date: "2021-10-27T08:08:18Z", engine: { name: "cve-database.git:bin/generate-csaf.pl", version: "1", }, }, id: "SUSE-SU-2021:3531-1", initial_release_date: "2021-10-27T08:08:18Z", revision_history: [ { date: "2021-10-27T08:08:18Z", number: "1", summary: "Current version", }, ], status: "final", version: "1", }, }, product_tree: { branches: [ { branches: [ { branches: [ { category: "product_version", name: "busybox-1.26.2-4.5.1.aarch64", product: { name: "busybox-1.26.2-4.5.1.aarch64", product_id: "busybox-1.26.2-4.5.1.aarch64", }, }, { category: "product_version", name: "busybox-static-1.26.2-4.5.1.aarch64", product: { name: "busybox-static-1.26.2-4.5.1.aarch64", product_id: "busybox-static-1.26.2-4.5.1.aarch64", }, }, ], category: "architecture", name: "aarch64", }, { branches: [ { category: "product_version", name: "busybox-1.26.2-4.5.1.i586", product: { name: "busybox-1.26.2-4.5.1.i586", product_id: "busybox-1.26.2-4.5.1.i586", }, }, { category: "product_version", name: "busybox-static-1.26.2-4.5.1.i586", product: { name: "busybox-static-1.26.2-4.5.1.i586", product_id: "busybox-static-1.26.2-4.5.1.i586", }, }, ], category: "architecture", name: "i586", }, { branches: [ { category: "product_version", name: "busybox-1.26.2-4.5.1.ppc64le", product: { name: "busybox-1.26.2-4.5.1.ppc64le", product_id: "busybox-1.26.2-4.5.1.ppc64le", }, }, { category: "product_version", name: "busybox-static-1.26.2-4.5.1.ppc64le", product: { name: "busybox-static-1.26.2-4.5.1.ppc64le", product_id: "busybox-static-1.26.2-4.5.1.ppc64le", }, }, ], category: "architecture", name: "ppc64le", }, { branches: [ { category: "product_version", name: "busybox-1.26.2-4.5.1.s390x", product: { name: "busybox-1.26.2-4.5.1.s390x", product_id: "busybox-1.26.2-4.5.1.s390x", }, }, { category: "product_version", name: "busybox-static-1.26.2-4.5.1.s390x", product: { name: "busybox-static-1.26.2-4.5.1.s390x", product_id: "busybox-static-1.26.2-4.5.1.s390x", }, }, ], category: "architecture", name: "s390x", }, { branches: [ { category: "product_version", name: "busybox-1.26.2-4.5.1.x86_64", product: { name: "busybox-1.26.2-4.5.1.x86_64", product_id: "busybox-1.26.2-4.5.1.x86_64", }, }, { category: "product_version", name: "busybox-static-1.26.2-4.5.1.x86_64", product: { name: "busybox-static-1.26.2-4.5.1.x86_64", product_id: "busybox-static-1.26.2-4.5.1.x86_64", }, }, ], category: "architecture", name: "x86_64", }, { branches: [ { category: "product_name", name: "SUSE Linux Enterprise Module for Basesystem 15 SP2", product: { name: "SUSE Linux Enterprise Module for Basesystem 15 SP2", product_id: "SUSE Linux Enterprise Module for Basesystem 15 SP2", product_identification_helper: { cpe: "cpe:/o:suse:sle-module-basesystem:15:sp2", }, }, }, { category: "product_name", name: "SUSE Linux Enterprise Module for Basesystem 15 SP3", product: { name: "SUSE Linux Enterprise Module for Basesystem 15 SP3", product_id: "SUSE Linux Enterprise Module for Basesystem 15 SP3", product_identification_helper: { cpe: "cpe:/o:suse:sle-module-basesystem:15:sp3", }, }, }, { category: "product_name", name: "SUSE Linux Enterprise High Performance Computing 15-ESPOS", product: { name: "SUSE Linux Enterprise High Performance Computing 15-ESPOS", product_id: "SUSE Linux Enterprise High Performance Computing 15-ESPOS", product_identification_helper: { cpe: "cpe:/o:suse:sle_hpc-espos:15", }, }, }, { category: "product_name", name: "SUSE Linux Enterprise High Performance Computing 15-LTSS", product: { name: "SUSE Linux Enterprise High Performance Computing 15-LTSS", product_id: "SUSE Linux Enterprise High Performance Computing 15-LTSS", product_identification_helper: { cpe: "cpe:/o:suse:sle_hpc-ltss:15", }, }, }, { category: "product_name", name: "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS", product: { name: "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS", product_id: "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS", product_identification_helper: { cpe: "cpe:/o:suse:sle_hpc-espos:15:sp1", }, }, }, { category: "product_name", name: "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS", product: { name: "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS", product_id: "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS", product_identification_helper: { cpe: "cpe:/o:suse:sle_hpc-ltss:15:sp1", }, }, }, { category: "product_name", name: "SUSE Linux Enterprise Server 15-LTSS", product: { name: "SUSE Linux Enterprise Server 15-LTSS", product_id: "SUSE Linux Enterprise Server 15-LTSS", product_identification_helper: { cpe: "cpe:/o:suse:sles-ltss:15", }, }, }, { category: "product_name", name: "SUSE Linux Enterprise Server 15 SP1-BCL", product: { name: "SUSE Linux Enterprise Server 15 SP1-BCL", product_id: "SUSE Linux Enterprise Server 15 SP1-BCL", product_identification_helper: { cpe: "cpe:/o:suse:sles_bcl:15:sp1", }, }, }, { category: "product_name", name: "SUSE Linux Enterprise Server 15 SP1-LTSS", product: { name: "SUSE Linux Enterprise Server 15 SP1-LTSS", product_id: "SUSE Linux Enterprise Server 15 SP1-LTSS", product_identification_helper: { cpe: "cpe:/o:suse:sles-ltss:15:sp1", }, }, }, { category: "product_name", name: "SUSE Linux Enterprise Server for SAP Applications 15", product: { name: "SUSE Linux Enterprise Server for SAP Applications 15", product_id: "SUSE Linux Enterprise Server for SAP Applications 15", product_identification_helper: { cpe: "cpe:/o:suse:sles_sap:15", }, }, }, { category: "product_name", name: "SUSE Linux Enterprise Server for SAP Applications 15 SP1", product: { name: "SUSE Linux Enterprise Server for SAP Applications 15 SP1", product_id: "SUSE Linux Enterprise Server for SAP Applications 15 SP1", product_identification_helper: { cpe: "cpe:/o:suse:sles_sap:15:sp1", }, }, }, { category: "product_name", name: "SUSE Enterprise Storage 6", product: { name: "SUSE Enterprise Storage 6", product_id: "SUSE Enterprise Storage 6", product_identification_helper: { cpe: "cpe:/o:suse:ses:6", }, }, }, ], category: "product_family", name: "SUSE Linux Enterprise", }, ], category: "vendor", name: "SUSE", }, ], relationships: [ { category: "default_component_of", full_product_name: { name: "busybox-1.26.2-4.5.1.aarch64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP2", product_id: "SUSE Linux Enterprise Module for Basesystem 15 SP2:busybox-1.26.2-4.5.1.aarch64", }, product_reference: "busybox-1.26.2-4.5.1.aarch64", relates_to_product_reference: "SUSE Linux Enterprise Module for Basesystem 15 SP2", }, { category: "default_component_of", full_product_name: { name: "busybox-1.26.2-4.5.1.ppc64le as component of SUSE Linux Enterprise Module for Basesystem 15 SP2", product_id: "SUSE Linux Enterprise Module for Basesystem 15 SP2:busybox-1.26.2-4.5.1.ppc64le", }, product_reference: "busybox-1.26.2-4.5.1.ppc64le", relates_to_product_reference: "SUSE Linux Enterprise Module for Basesystem 15 SP2", }, { category: "default_component_of", full_product_name: { name: "busybox-1.26.2-4.5.1.s390x as component of SUSE Linux Enterprise Module for Basesystem 15 SP2", product_id: "SUSE Linux Enterprise Module for Basesystem 15 SP2:busybox-1.26.2-4.5.1.s390x", }, product_reference: "busybox-1.26.2-4.5.1.s390x", relates_to_product_reference: "SUSE Linux Enterprise Module for Basesystem 15 SP2", }, { category: "default_component_of", full_product_name: { name: "busybox-1.26.2-4.5.1.x86_64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP2", product_id: "SUSE Linux Enterprise Module for Basesystem 15 SP2:busybox-1.26.2-4.5.1.x86_64", }, product_reference: "busybox-1.26.2-4.5.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Module for Basesystem 15 SP2", }, { category: "default_component_of", full_product_name: { name: "busybox-static-1.26.2-4.5.1.aarch64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP2", product_id: "SUSE Linux Enterprise Module for Basesystem 15 SP2:busybox-static-1.26.2-4.5.1.aarch64", }, product_reference: "busybox-static-1.26.2-4.5.1.aarch64", relates_to_product_reference: "SUSE Linux Enterprise Module for Basesystem 15 SP2", }, { category: "default_component_of", full_product_name: { name: "busybox-static-1.26.2-4.5.1.ppc64le as component of SUSE Linux Enterprise Module for Basesystem 15 SP2", product_id: "SUSE Linux Enterprise Module for Basesystem 15 SP2:busybox-static-1.26.2-4.5.1.ppc64le", }, product_reference: "busybox-static-1.26.2-4.5.1.ppc64le", relates_to_product_reference: "SUSE Linux Enterprise Module for Basesystem 15 SP2", }, { category: "default_component_of", full_product_name: { name: "busybox-static-1.26.2-4.5.1.s390x as component of SUSE Linux Enterprise Module for Basesystem 15 SP2", product_id: "SUSE Linux Enterprise Module for Basesystem 15 SP2:busybox-static-1.26.2-4.5.1.s390x", }, product_reference: "busybox-static-1.26.2-4.5.1.s390x", relates_to_product_reference: "SUSE Linux Enterprise Module for Basesystem 15 SP2", }, { category: "default_component_of", full_product_name: { name: "busybox-static-1.26.2-4.5.1.x86_64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP2", product_id: "SUSE Linux Enterprise Module for Basesystem 15 SP2:busybox-static-1.26.2-4.5.1.x86_64", }, product_reference: "busybox-static-1.26.2-4.5.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Module for Basesystem 15 SP2", }, { category: "default_component_of", full_product_name: { name: "busybox-1.26.2-4.5.1.aarch64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP3", product_id: "SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-1.26.2-4.5.1.aarch64", }, product_reference: "busybox-1.26.2-4.5.1.aarch64", relates_to_product_reference: "SUSE Linux Enterprise Module for Basesystem 15 SP3", }, { category: "default_component_of", full_product_name: { name: "busybox-1.26.2-4.5.1.ppc64le as component of SUSE Linux Enterprise Module for Basesystem 15 SP3", product_id: "SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-1.26.2-4.5.1.ppc64le", }, product_reference: "busybox-1.26.2-4.5.1.ppc64le", relates_to_product_reference: "SUSE Linux Enterprise Module for Basesystem 15 SP3", }, { category: "default_component_of", full_product_name: { name: "busybox-1.26.2-4.5.1.s390x as component of SUSE Linux Enterprise Module for Basesystem 15 SP3", product_id: "SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-1.26.2-4.5.1.s390x", }, product_reference: "busybox-1.26.2-4.5.1.s390x", relates_to_product_reference: "SUSE Linux Enterprise Module for Basesystem 15 SP3", }, { category: "default_component_of", full_product_name: { name: "busybox-1.26.2-4.5.1.x86_64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP3", product_id: "SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-1.26.2-4.5.1.x86_64", }, product_reference: "busybox-1.26.2-4.5.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Module for Basesystem 15 SP3", }, { category: "default_component_of", full_product_name: { name: "busybox-static-1.26.2-4.5.1.aarch64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP3", product_id: "SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-static-1.26.2-4.5.1.aarch64", }, product_reference: "busybox-static-1.26.2-4.5.1.aarch64", relates_to_product_reference: "SUSE Linux Enterprise Module for Basesystem 15 SP3", }, { category: "default_component_of", full_product_name: { name: "busybox-static-1.26.2-4.5.1.ppc64le as component of SUSE Linux Enterprise Module for Basesystem 15 SP3", product_id: "SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-static-1.26.2-4.5.1.ppc64le", }, product_reference: "busybox-static-1.26.2-4.5.1.ppc64le", relates_to_product_reference: "SUSE Linux Enterprise Module for Basesystem 15 SP3", }, { category: "default_component_of", full_product_name: { name: "busybox-static-1.26.2-4.5.1.s390x as component of SUSE Linux Enterprise Module for Basesystem 15 SP3", product_id: "SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-static-1.26.2-4.5.1.s390x", }, product_reference: "busybox-static-1.26.2-4.5.1.s390x", relates_to_product_reference: "SUSE Linux Enterprise Module for Basesystem 15 SP3", }, { category: "default_component_of", full_product_name: { name: "busybox-static-1.26.2-4.5.1.x86_64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP3", product_id: "SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-static-1.26.2-4.5.1.x86_64", }, product_reference: "busybox-static-1.26.2-4.5.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Module for Basesystem 15 SP3", }, { category: "default_component_of", full_product_name: { name: "busybox-1.26.2-4.5.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15-ESPOS", product_id: "SUSE Linux Enterprise High Performance Computing 15-ESPOS:busybox-1.26.2-4.5.1.aarch64", }, product_reference: "busybox-1.26.2-4.5.1.aarch64", relates_to_product_reference: "SUSE Linux Enterprise High Performance Computing 15-ESPOS", }, { category: "default_component_of", full_product_name: { name: "busybox-1.26.2-4.5.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15-ESPOS", product_id: "SUSE Linux Enterprise High Performance Computing 15-ESPOS:busybox-1.26.2-4.5.1.x86_64", }, product_reference: "busybox-1.26.2-4.5.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise High Performance Computing 15-ESPOS", }, { category: "default_component_of", full_product_name: { name: "busybox-1.26.2-4.5.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15-LTSS", product_id: "SUSE Linux Enterprise High Performance Computing 15-LTSS:busybox-1.26.2-4.5.1.aarch64", }, product_reference: "busybox-1.26.2-4.5.1.aarch64", relates_to_product_reference: "SUSE Linux Enterprise High Performance Computing 15-LTSS", }, { category: "default_component_of", full_product_name: { name: "busybox-1.26.2-4.5.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15-LTSS", product_id: "SUSE Linux Enterprise High Performance Computing 15-LTSS:busybox-1.26.2-4.5.1.x86_64", }, product_reference: "busybox-1.26.2-4.5.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise High Performance Computing 15-LTSS", }, { category: "default_component_of", full_product_name: { name: "busybox-1.26.2-4.5.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS", product_id: "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:busybox-1.26.2-4.5.1.aarch64", }, product_reference: "busybox-1.26.2-4.5.1.aarch64", relates_to_product_reference: "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS", }, { category: "default_component_of", full_product_name: { name: "busybox-1.26.2-4.5.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS", product_id: "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:busybox-1.26.2-4.5.1.x86_64", }, product_reference: "busybox-1.26.2-4.5.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS", }, { category: "default_component_of", full_product_name: { name: "busybox-static-1.26.2-4.5.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS", product_id: "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:busybox-static-1.26.2-4.5.1.aarch64", }, product_reference: "busybox-static-1.26.2-4.5.1.aarch64", relates_to_product_reference: "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS", }, { category: "default_component_of", full_product_name: { name: "busybox-static-1.26.2-4.5.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS", product_id: "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:busybox-static-1.26.2-4.5.1.x86_64", }, product_reference: "busybox-static-1.26.2-4.5.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS", }, { category: "default_component_of", full_product_name: { name: "busybox-1.26.2-4.5.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS", product_id: "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:busybox-1.26.2-4.5.1.aarch64", }, product_reference: "busybox-1.26.2-4.5.1.aarch64", relates_to_product_reference: "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS", }, { category: "default_component_of", full_product_name: { name: "busybox-1.26.2-4.5.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS", product_id: "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:busybox-1.26.2-4.5.1.x86_64", }, product_reference: "busybox-1.26.2-4.5.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS", }, { category: "default_component_of", full_product_name: { name: "busybox-static-1.26.2-4.5.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS", product_id: "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:busybox-static-1.26.2-4.5.1.aarch64", }, product_reference: "busybox-static-1.26.2-4.5.1.aarch64", relates_to_product_reference: "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS", }, { category: "default_component_of", full_product_name: { name: "busybox-static-1.26.2-4.5.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS", product_id: "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:busybox-static-1.26.2-4.5.1.x86_64", }, product_reference: "busybox-static-1.26.2-4.5.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS", }, { category: "default_component_of", full_product_name: { name: "busybox-1.26.2-4.5.1.aarch64 as component of SUSE Linux Enterprise Server 15-LTSS", product_id: "SUSE Linux Enterprise Server 15-LTSS:busybox-1.26.2-4.5.1.aarch64", }, product_reference: "busybox-1.26.2-4.5.1.aarch64", relates_to_product_reference: "SUSE Linux Enterprise Server 15-LTSS", }, { category: "default_component_of", full_product_name: { name: "busybox-1.26.2-4.5.1.ppc64le as component of SUSE Linux Enterprise Server 15-LTSS", product_id: "SUSE Linux Enterprise Server 15-LTSS:busybox-1.26.2-4.5.1.ppc64le", }, product_reference: "busybox-1.26.2-4.5.1.ppc64le", relates_to_product_reference: "SUSE Linux Enterprise Server 15-LTSS", }, { category: "default_component_of", full_product_name: { name: "busybox-1.26.2-4.5.1.s390x as component of SUSE Linux Enterprise Server 15-LTSS", product_id: "SUSE Linux Enterprise Server 15-LTSS:busybox-1.26.2-4.5.1.s390x", }, product_reference: "busybox-1.26.2-4.5.1.s390x", relates_to_product_reference: "SUSE Linux Enterprise Server 15-LTSS", }, { category: "default_component_of", full_product_name: { name: "busybox-1.26.2-4.5.1.x86_64 as component of SUSE Linux Enterprise Server 15-LTSS", product_id: "SUSE Linux Enterprise Server 15-LTSS:busybox-1.26.2-4.5.1.x86_64", }, product_reference: "busybox-1.26.2-4.5.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Server 15-LTSS", }, { category: "default_component_of", full_product_name: { name: "busybox-1.26.2-4.5.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP1-BCL", product_id: "SUSE Linux Enterprise Server 15 SP1-BCL:busybox-1.26.2-4.5.1.x86_64", }, product_reference: "busybox-1.26.2-4.5.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Server 15 SP1-BCL", }, { category: "default_component_of", full_product_name: { name: "busybox-static-1.26.2-4.5.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP1-BCL", product_id: "SUSE Linux Enterprise Server 15 SP1-BCL:busybox-static-1.26.2-4.5.1.x86_64", }, product_reference: "busybox-static-1.26.2-4.5.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Server 15 SP1-BCL", }, { category: "default_component_of", full_product_name: { name: "busybox-1.26.2-4.5.1.aarch64 as component of SUSE Linux Enterprise Server 15 SP1-LTSS", product_id: "SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-1.26.2-4.5.1.aarch64", }, product_reference: "busybox-1.26.2-4.5.1.aarch64", relates_to_product_reference: "SUSE Linux Enterprise Server 15 SP1-LTSS", }, { category: "default_component_of", full_product_name: { name: "busybox-1.26.2-4.5.1.ppc64le as component of SUSE Linux Enterprise Server 15 SP1-LTSS", product_id: "SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-1.26.2-4.5.1.ppc64le", }, product_reference: "busybox-1.26.2-4.5.1.ppc64le", relates_to_product_reference: "SUSE Linux Enterprise Server 15 SP1-LTSS", }, { category: "default_component_of", full_product_name: { name: "busybox-1.26.2-4.5.1.s390x as component of SUSE Linux Enterprise Server 15 SP1-LTSS", product_id: "SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-1.26.2-4.5.1.s390x", }, product_reference: "busybox-1.26.2-4.5.1.s390x", relates_to_product_reference: "SUSE Linux Enterprise Server 15 SP1-LTSS", }, { category: "default_component_of", full_product_name: { name: "busybox-1.26.2-4.5.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP1-LTSS", product_id: "SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-1.26.2-4.5.1.x86_64", }, product_reference: "busybox-1.26.2-4.5.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Server 15 SP1-LTSS", }, { category: "default_component_of", full_product_name: { name: "busybox-static-1.26.2-4.5.1.aarch64 as component of SUSE Linux Enterprise Server 15 SP1-LTSS", product_id: "SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-static-1.26.2-4.5.1.aarch64", }, product_reference: "busybox-static-1.26.2-4.5.1.aarch64", relates_to_product_reference: "SUSE Linux Enterprise Server 15 SP1-LTSS", }, { category: "default_component_of", full_product_name: { name: "busybox-static-1.26.2-4.5.1.ppc64le as component of SUSE Linux Enterprise Server 15 SP1-LTSS", product_id: "SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-static-1.26.2-4.5.1.ppc64le", }, product_reference: "busybox-static-1.26.2-4.5.1.ppc64le", relates_to_product_reference: "SUSE Linux Enterprise Server 15 SP1-LTSS", }, { category: "default_component_of", full_product_name: { name: "busybox-static-1.26.2-4.5.1.s390x as component of SUSE Linux Enterprise Server 15 SP1-LTSS", product_id: "SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-static-1.26.2-4.5.1.s390x", }, product_reference: "busybox-static-1.26.2-4.5.1.s390x", relates_to_product_reference: "SUSE Linux Enterprise Server 15 SP1-LTSS", }, { category: "default_component_of", full_product_name: { name: "busybox-static-1.26.2-4.5.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP1-LTSS", product_id: "SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-static-1.26.2-4.5.1.x86_64", }, product_reference: "busybox-static-1.26.2-4.5.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Server 15 SP1-LTSS", }, { category: "default_component_of", full_product_name: { name: "busybox-1.26.2-4.5.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 15", product_id: "SUSE Linux Enterprise Server for SAP Applications 15:busybox-1.26.2-4.5.1.ppc64le", }, product_reference: "busybox-1.26.2-4.5.1.ppc64le", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 15", }, { category: "default_component_of", full_product_name: { name: "busybox-1.26.2-4.5.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15", product_id: "SUSE Linux Enterprise Server for SAP Applications 15:busybox-1.26.2-4.5.1.x86_64", }, product_reference: "busybox-1.26.2-4.5.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 15", }, { category: "default_component_of", full_product_name: { name: "busybox-1.26.2-4.5.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 15 SP1", product_id: "SUSE Linux Enterprise Server for SAP Applications 15 SP1:busybox-1.26.2-4.5.1.ppc64le", }, product_reference: "busybox-1.26.2-4.5.1.ppc64le", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 15 SP1", }, { category: "default_component_of", full_product_name: { name: "busybox-1.26.2-4.5.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15 SP1", product_id: "SUSE Linux Enterprise Server for SAP Applications 15 SP1:busybox-1.26.2-4.5.1.x86_64", }, product_reference: "busybox-1.26.2-4.5.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 15 SP1", }, { category: "default_component_of", full_product_name: { name: "busybox-static-1.26.2-4.5.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 15 SP1", product_id: "SUSE Linux Enterprise Server for SAP Applications 15 SP1:busybox-static-1.26.2-4.5.1.ppc64le", }, product_reference: "busybox-static-1.26.2-4.5.1.ppc64le", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 15 SP1", }, { category: "default_component_of", full_product_name: { name: "busybox-static-1.26.2-4.5.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15 SP1", product_id: "SUSE Linux Enterprise Server for SAP Applications 15 SP1:busybox-static-1.26.2-4.5.1.x86_64", }, product_reference: "busybox-static-1.26.2-4.5.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 15 SP1", }, { category: "default_component_of", full_product_name: { name: "busybox-1.26.2-4.5.1.aarch64 as component of SUSE Enterprise Storage 6", product_id: "SUSE Enterprise Storage 6:busybox-1.26.2-4.5.1.aarch64", }, product_reference: "busybox-1.26.2-4.5.1.aarch64", relates_to_product_reference: "SUSE Enterprise Storage 6", }, { category: "default_component_of", full_product_name: { name: "busybox-1.26.2-4.5.1.x86_64 as component of SUSE Enterprise Storage 6", product_id: "SUSE Enterprise Storage 6:busybox-1.26.2-4.5.1.x86_64", }, product_reference: "busybox-1.26.2-4.5.1.x86_64", relates_to_product_reference: "SUSE Enterprise Storage 6", }, { category: "default_component_of", full_product_name: { name: "busybox-static-1.26.2-4.5.1.aarch64 as component of SUSE Enterprise Storage 6", product_id: "SUSE Enterprise Storage 6:busybox-static-1.26.2-4.5.1.aarch64", }, product_reference: "busybox-static-1.26.2-4.5.1.aarch64", relates_to_product_reference: "SUSE Enterprise Storage 6", }, { category: "default_component_of", full_product_name: { name: "busybox-static-1.26.2-4.5.1.x86_64 as component of SUSE Enterprise Storage 6", product_id: "SUSE Enterprise Storage 6:busybox-static-1.26.2-4.5.1.x86_64", }, product_reference: "busybox-static-1.26.2-4.5.1.x86_64", relates_to_product_reference: "SUSE Enterprise Storage 6", }, ], }, vulnerabilities: [ { cve: "CVE-2011-5325", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2011-5325", }, ], notes: [ { category: "general", text: "Directory traversal vulnerability in the BusyBox implementation of tar before 1.22.0 v5 allows remote attackers to point to files outside the current working directory via a symlink.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Enterprise Storage 6:busybox-1.26.2-4.5.1.aarch64", "SUSE Enterprise Storage 6:busybox-1.26.2-4.5.1.x86_64", "SUSE Enterprise Storage 6:busybox-static-1.26.2-4.5.1.aarch64", "SUSE Enterprise Storage 6:busybox-static-1.26.2-4.5.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:busybox-1.26.2-4.5.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:busybox-1.26.2-4.5.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:busybox-static-1.26.2-4.5.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:busybox-static-1.26.2-4.5.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:busybox-1.26.2-4.5.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:busybox-1.26.2-4.5.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:busybox-static-1.26.2-4.5.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:busybox-static-1.26.2-4.5.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:busybox-1.26.2-4.5.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:busybox-1.26.2-4.5.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:busybox-1.26.2-4.5.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:busybox-1.26.2-4.5.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:busybox-1.26.2-4.5.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:busybox-1.26.2-4.5.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP2:busybox-1.26.2-4.5.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP2:busybox-1.26.2-4.5.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:busybox-static-1.26.2-4.5.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:busybox-static-1.26.2-4.5.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP2:busybox-static-1.26.2-4.5.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP2:busybox-static-1.26.2-4.5.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-1.26.2-4.5.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-1.26.2-4.5.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-1.26.2-4.5.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-1.26.2-4.5.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-static-1.26.2-4.5.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-static-1.26.2-4.5.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-static-1.26.2-4.5.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-static-1.26.2-4.5.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:busybox-1.26.2-4.5.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:busybox-static-1.26.2-4.5.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-1.26.2-4.5.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-1.26.2-4.5.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-1.26.2-4.5.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-1.26.2-4.5.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-static-1.26.2-4.5.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-static-1.26.2-4.5.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-static-1.26.2-4.5.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-static-1.26.2-4.5.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:busybox-1.26.2-4.5.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:busybox-1.26.2-4.5.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:busybox-1.26.2-4.5.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:busybox-1.26.2-4.5.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:busybox-1.26.2-4.5.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:busybox-1.26.2-4.5.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:busybox-static-1.26.2-4.5.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:busybox-static-1.26.2-4.5.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:busybox-1.26.2-4.5.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:busybox-1.26.2-4.5.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2011-5325", url: "https://www.suse.com/security/cve/CVE-2011-5325", }, { category: "external", summary: "SUSE Bug 951562 for CVE-2011-5325", url: "https://bugzilla.suse.com/951562", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Enterprise Storage 6:busybox-1.26.2-4.5.1.aarch64", "SUSE Enterprise Storage 6:busybox-1.26.2-4.5.1.x86_64", "SUSE Enterprise Storage 6:busybox-static-1.26.2-4.5.1.aarch64", "SUSE Enterprise Storage 6:busybox-static-1.26.2-4.5.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:busybox-1.26.2-4.5.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:busybox-1.26.2-4.5.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:busybox-static-1.26.2-4.5.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:busybox-static-1.26.2-4.5.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:busybox-1.26.2-4.5.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:busybox-1.26.2-4.5.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:busybox-static-1.26.2-4.5.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:busybox-static-1.26.2-4.5.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:busybox-1.26.2-4.5.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:busybox-1.26.2-4.5.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:busybox-1.26.2-4.5.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:busybox-1.26.2-4.5.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:busybox-1.26.2-4.5.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:busybox-1.26.2-4.5.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP2:busybox-1.26.2-4.5.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP2:busybox-1.26.2-4.5.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:busybox-static-1.26.2-4.5.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:busybox-static-1.26.2-4.5.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP2:busybox-static-1.26.2-4.5.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP2:busybox-static-1.26.2-4.5.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-1.26.2-4.5.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-1.26.2-4.5.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-1.26.2-4.5.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-1.26.2-4.5.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-static-1.26.2-4.5.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-static-1.26.2-4.5.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-static-1.26.2-4.5.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-static-1.26.2-4.5.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:busybox-1.26.2-4.5.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:busybox-static-1.26.2-4.5.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-1.26.2-4.5.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-1.26.2-4.5.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-1.26.2-4.5.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-1.26.2-4.5.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-static-1.26.2-4.5.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-static-1.26.2-4.5.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-static-1.26.2-4.5.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-static-1.26.2-4.5.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:busybox-1.26.2-4.5.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:busybox-1.26.2-4.5.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:busybox-1.26.2-4.5.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:busybox-1.26.2-4.5.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:busybox-1.26.2-4.5.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:busybox-1.26.2-4.5.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:busybox-static-1.26.2-4.5.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:busybox-static-1.26.2-4.5.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:busybox-1.26.2-4.5.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:busybox-1.26.2-4.5.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 7.5, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N", version: "3.1", }, products: [ "SUSE Enterprise Storage 6:busybox-1.26.2-4.5.1.aarch64", "SUSE Enterprise Storage 6:busybox-1.26.2-4.5.1.x86_64", "SUSE Enterprise Storage 6:busybox-static-1.26.2-4.5.1.aarch64", "SUSE Enterprise Storage 6:busybox-static-1.26.2-4.5.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:busybox-1.26.2-4.5.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:busybox-1.26.2-4.5.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:busybox-static-1.26.2-4.5.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:busybox-static-1.26.2-4.5.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:busybox-1.26.2-4.5.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:busybox-1.26.2-4.5.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:busybox-static-1.26.2-4.5.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:busybox-static-1.26.2-4.5.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:busybox-1.26.2-4.5.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:busybox-1.26.2-4.5.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:busybox-1.26.2-4.5.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:busybox-1.26.2-4.5.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:busybox-1.26.2-4.5.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:busybox-1.26.2-4.5.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP2:busybox-1.26.2-4.5.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP2:busybox-1.26.2-4.5.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:busybox-static-1.26.2-4.5.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:busybox-static-1.26.2-4.5.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP2:busybox-static-1.26.2-4.5.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP2:busybox-static-1.26.2-4.5.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-1.26.2-4.5.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-1.26.2-4.5.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-1.26.2-4.5.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-1.26.2-4.5.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-static-1.26.2-4.5.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-static-1.26.2-4.5.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-static-1.26.2-4.5.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-static-1.26.2-4.5.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:busybox-1.26.2-4.5.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:busybox-static-1.26.2-4.5.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-1.26.2-4.5.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-1.26.2-4.5.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-1.26.2-4.5.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-1.26.2-4.5.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-static-1.26.2-4.5.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-static-1.26.2-4.5.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-static-1.26.2-4.5.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-static-1.26.2-4.5.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:busybox-1.26.2-4.5.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:busybox-1.26.2-4.5.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:busybox-1.26.2-4.5.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:busybox-1.26.2-4.5.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:busybox-1.26.2-4.5.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:busybox-1.26.2-4.5.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:busybox-static-1.26.2-4.5.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:busybox-static-1.26.2-4.5.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:busybox-1.26.2-4.5.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:busybox-1.26.2-4.5.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2021-10-27T08:08:18Z", details: "moderate", }, ], title: "CVE-2011-5325", }, { cve: "CVE-2018-1000500", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2018-1000500", }, ], notes: [ { category: "general", text: "Busybox contains a Missing SSL certificate validation vulnerability in The \"busybox wget\" applet that can result in arbitrary code execution. This attack appear to be exploitable via Simply download any file over HTTPS using \"busybox wget https://compromised-domain.com/important-file\".", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Enterprise Storage 6:busybox-1.26.2-4.5.1.aarch64", "SUSE Enterprise Storage 6:busybox-1.26.2-4.5.1.x86_64", "SUSE Enterprise Storage 6:busybox-static-1.26.2-4.5.1.aarch64", "SUSE Enterprise Storage 6:busybox-static-1.26.2-4.5.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:busybox-1.26.2-4.5.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:busybox-1.26.2-4.5.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:busybox-static-1.26.2-4.5.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:busybox-static-1.26.2-4.5.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:busybox-1.26.2-4.5.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:busybox-1.26.2-4.5.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:busybox-static-1.26.2-4.5.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:busybox-static-1.26.2-4.5.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:busybox-1.26.2-4.5.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:busybox-1.26.2-4.5.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:busybox-1.26.2-4.5.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:busybox-1.26.2-4.5.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:busybox-1.26.2-4.5.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:busybox-1.26.2-4.5.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP2:busybox-1.26.2-4.5.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP2:busybox-1.26.2-4.5.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:busybox-static-1.26.2-4.5.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:busybox-static-1.26.2-4.5.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP2:busybox-static-1.26.2-4.5.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP2:busybox-static-1.26.2-4.5.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-1.26.2-4.5.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-1.26.2-4.5.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-1.26.2-4.5.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-1.26.2-4.5.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-static-1.26.2-4.5.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-static-1.26.2-4.5.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-static-1.26.2-4.5.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-static-1.26.2-4.5.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:busybox-1.26.2-4.5.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:busybox-static-1.26.2-4.5.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-1.26.2-4.5.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-1.26.2-4.5.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-1.26.2-4.5.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-1.26.2-4.5.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-static-1.26.2-4.5.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-static-1.26.2-4.5.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-static-1.26.2-4.5.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-static-1.26.2-4.5.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:busybox-1.26.2-4.5.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:busybox-1.26.2-4.5.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:busybox-1.26.2-4.5.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:busybox-1.26.2-4.5.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:busybox-1.26.2-4.5.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:busybox-1.26.2-4.5.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:busybox-static-1.26.2-4.5.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:busybox-static-1.26.2-4.5.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:busybox-1.26.2-4.5.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:busybox-1.26.2-4.5.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2018-1000500", url: "https://www.suse.com/security/cve/CVE-2018-1000500", }, { category: "external", summary: "SUSE Bug 1099263 for CVE-2018-1000500", url: "https://bugzilla.suse.com/1099263", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Enterprise Storage 6:busybox-1.26.2-4.5.1.aarch64", "SUSE Enterprise Storage 6:busybox-1.26.2-4.5.1.x86_64", "SUSE Enterprise Storage 6:busybox-static-1.26.2-4.5.1.aarch64", "SUSE Enterprise Storage 6:busybox-static-1.26.2-4.5.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:busybox-1.26.2-4.5.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:busybox-1.26.2-4.5.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:busybox-static-1.26.2-4.5.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:busybox-static-1.26.2-4.5.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:busybox-1.26.2-4.5.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:busybox-1.26.2-4.5.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:busybox-static-1.26.2-4.5.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:busybox-static-1.26.2-4.5.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:busybox-1.26.2-4.5.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:busybox-1.26.2-4.5.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:busybox-1.26.2-4.5.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:busybox-1.26.2-4.5.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:busybox-1.26.2-4.5.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:busybox-1.26.2-4.5.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP2:busybox-1.26.2-4.5.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP2:busybox-1.26.2-4.5.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:busybox-static-1.26.2-4.5.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:busybox-static-1.26.2-4.5.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP2:busybox-static-1.26.2-4.5.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP2:busybox-static-1.26.2-4.5.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-1.26.2-4.5.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-1.26.2-4.5.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-1.26.2-4.5.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-1.26.2-4.5.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-static-1.26.2-4.5.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-static-1.26.2-4.5.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-static-1.26.2-4.5.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-static-1.26.2-4.5.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:busybox-1.26.2-4.5.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:busybox-static-1.26.2-4.5.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-1.26.2-4.5.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-1.26.2-4.5.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-1.26.2-4.5.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-1.26.2-4.5.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-static-1.26.2-4.5.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-static-1.26.2-4.5.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-static-1.26.2-4.5.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-static-1.26.2-4.5.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:busybox-1.26.2-4.5.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:busybox-1.26.2-4.5.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:busybox-1.26.2-4.5.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:busybox-1.26.2-4.5.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:busybox-1.26.2-4.5.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:busybox-1.26.2-4.5.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:busybox-static-1.26.2-4.5.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:busybox-static-1.26.2-4.5.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:busybox-1.26.2-4.5.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:busybox-1.26.2-4.5.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 7.5, baseSeverity: "HIGH", vectorString: "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N", version: "3.0", }, products: [ "SUSE Enterprise Storage 6:busybox-1.26.2-4.5.1.aarch64", "SUSE Enterprise Storage 6:busybox-1.26.2-4.5.1.x86_64", "SUSE Enterprise Storage 6:busybox-static-1.26.2-4.5.1.aarch64", "SUSE Enterprise Storage 6:busybox-static-1.26.2-4.5.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:busybox-1.26.2-4.5.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:busybox-1.26.2-4.5.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:busybox-static-1.26.2-4.5.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:busybox-static-1.26.2-4.5.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:busybox-1.26.2-4.5.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:busybox-1.26.2-4.5.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:busybox-static-1.26.2-4.5.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:busybox-static-1.26.2-4.5.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:busybox-1.26.2-4.5.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:busybox-1.26.2-4.5.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:busybox-1.26.2-4.5.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:busybox-1.26.2-4.5.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:busybox-1.26.2-4.5.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:busybox-1.26.2-4.5.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP2:busybox-1.26.2-4.5.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP2:busybox-1.26.2-4.5.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:busybox-static-1.26.2-4.5.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:busybox-static-1.26.2-4.5.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP2:busybox-static-1.26.2-4.5.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP2:busybox-static-1.26.2-4.5.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-1.26.2-4.5.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-1.26.2-4.5.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-1.26.2-4.5.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-1.26.2-4.5.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-static-1.26.2-4.5.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-static-1.26.2-4.5.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-static-1.26.2-4.5.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-static-1.26.2-4.5.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:busybox-1.26.2-4.5.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:busybox-static-1.26.2-4.5.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-1.26.2-4.5.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-1.26.2-4.5.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-1.26.2-4.5.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-1.26.2-4.5.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-static-1.26.2-4.5.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-static-1.26.2-4.5.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-static-1.26.2-4.5.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-static-1.26.2-4.5.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:busybox-1.26.2-4.5.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:busybox-1.26.2-4.5.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:busybox-1.26.2-4.5.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:busybox-1.26.2-4.5.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:busybox-1.26.2-4.5.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:busybox-1.26.2-4.5.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:busybox-static-1.26.2-4.5.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:busybox-static-1.26.2-4.5.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:busybox-1.26.2-4.5.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:busybox-1.26.2-4.5.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2021-10-27T08:08:18Z", details: "important", }, ], title: "CVE-2018-1000500", }, { cve: "CVE-2018-1000517", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2018-1000517", }, ], notes: [ { category: "general", text: "BusyBox project BusyBox wget version prior to commit 8e2174e9bd836e53c8b9c6e00d1bc6e2a718686e contains a Buffer Overflow vulnerability in Busybox wget that can result in heap buffer overflow. This attack appear to be exploitable via network connectivity. This vulnerability appears to have been fixed in after commit 8e2174e9bd836e53c8b9c6e00d1bc6e2a718686e.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Enterprise Storage 6:busybox-1.26.2-4.5.1.aarch64", "SUSE Enterprise Storage 6:busybox-1.26.2-4.5.1.x86_64", "SUSE Enterprise Storage 6:busybox-static-1.26.2-4.5.1.aarch64", "SUSE Enterprise Storage 6:busybox-static-1.26.2-4.5.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:busybox-1.26.2-4.5.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:busybox-1.26.2-4.5.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:busybox-static-1.26.2-4.5.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:busybox-static-1.26.2-4.5.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:busybox-1.26.2-4.5.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:busybox-1.26.2-4.5.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:busybox-static-1.26.2-4.5.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:busybox-static-1.26.2-4.5.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:busybox-1.26.2-4.5.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:busybox-1.26.2-4.5.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:busybox-1.26.2-4.5.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:busybox-1.26.2-4.5.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:busybox-1.26.2-4.5.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:busybox-1.26.2-4.5.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP2:busybox-1.26.2-4.5.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP2:busybox-1.26.2-4.5.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:busybox-static-1.26.2-4.5.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:busybox-static-1.26.2-4.5.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP2:busybox-static-1.26.2-4.5.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP2:busybox-static-1.26.2-4.5.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-1.26.2-4.5.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-1.26.2-4.5.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-1.26.2-4.5.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-1.26.2-4.5.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-static-1.26.2-4.5.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-static-1.26.2-4.5.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-static-1.26.2-4.5.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-static-1.26.2-4.5.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:busybox-1.26.2-4.5.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:busybox-static-1.26.2-4.5.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-1.26.2-4.5.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-1.26.2-4.5.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-1.26.2-4.5.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-1.26.2-4.5.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-static-1.26.2-4.5.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-static-1.26.2-4.5.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-static-1.26.2-4.5.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-static-1.26.2-4.5.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:busybox-1.26.2-4.5.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:busybox-1.26.2-4.5.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:busybox-1.26.2-4.5.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:busybox-1.26.2-4.5.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:busybox-1.26.2-4.5.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:busybox-1.26.2-4.5.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:busybox-static-1.26.2-4.5.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:busybox-static-1.26.2-4.5.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:busybox-1.26.2-4.5.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:busybox-1.26.2-4.5.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2018-1000517", url: "https://www.suse.com/security/cve/CVE-2018-1000517", }, { category: "external", summary: "SUSE Bug 1099260 for CVE-2018-1000517", url: "https://bugzilla.suse.com/1099260", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Enterprise Storage 6:busybox-1.26.2-4.5.1.aarch64", "SUSE Enterprise Storage 6:busybox-1.26.2-4.5.1.x86_64", "SUSE Enterprise Storage 6:busybox-static-1.26.2-4.5.1.aarch64", "SUSE Enterprise Storage 6:busybox-static-1.26.2-4.5.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:busybox-1.26.2-4.5.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:busybox-1.26.2-4.5.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:busybox-static-1.26.2-4.5.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:busybox-static-1.26.2-4.5.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:busybox-1.26.2-4.5.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:busybox-1.26.2-4.5.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:busybox-static-1.26.2-4.5.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:busybox-static-1.26.2-4.5.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:busybox-1.26.2-4.5.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:busybox-1.26.2-4.5.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:busybox-1.26.2-4.5.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:busybox-1.26.2-4.5.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:busybox-1.26.2-4.5.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:busybox-1.26.2-4.5.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP2:busybox-1.26.2-4.5.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP2:busybox-1.26.2-4.5.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:busybox-static-1.26.2-4.5.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:busybox-static-1.26.2-4.5.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP2:busybox-static-1.26.2-4.5.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP2:busybox-static-1.26.2-4.5.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-1.26.2-4.5.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-1.26.2-4.5.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-1.26.2-4.5.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-1.26.2-4.5.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-static-1.26.2-4.5.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-static-1.26.2-4.5.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-static-1.26.2-4.5.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-static-1.26.2-4.5.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:busybox-1.26.2-4.5.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:busybox-static-1.26.2-4.5.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-1.26.2-4.5.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-1.26.2-4.5.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-1.26.2-4.5.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-1.26.2-4.5.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-static-1.26.2-4.5.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-static-1.26.2-4.5.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-static-1.26.2-4.5.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-static-1.26.2-4.5.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:busybox-1.26.2-4.5.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:busybox-1.26.2-4.5.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:busybox-1.26.2-4.5.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:busybox-1.26.2-4.5.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:busybox-1.26.2-4.5.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:busybox-1.26.2-4.5.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:busybox-static-1.26.2-4.5.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:busybox-static-1.26.2-4.5.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:busybox-1.26.2-4.5.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:busybox-1.26.2-4.5.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.6, baseSeverity: "MEDIUM", vectorString: "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L", version: "3.0", }, products: [ "SUSE Enterprise Storage 6:busybox-1.26.2-4.5.1.aarch64", "SUSE Enterprise Storage 6:busybox-1.26.2-4.5.1.x86_64", "SUSE Enterprise Storage 6:busybox-static-1.26.2-4.5.1.aarch64", "SUSE Enterprise Storage 6:busybox-static-1.26.2-4.5.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:busybox-1.26.2-4.5.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:busybox-1.26.2-4.5.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:busybox-static-1.26.2-4.5.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:busybox-static-1.26.2-4.5.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:busybox-1.26.2-4.5.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:busybox-1.26.2-4.5.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:busybox-static-1.26.2-4.5.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:busybox-static-1.26.2-4.5.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:busybox-1.26.2-4.5.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:busybox-1.26.2-4.5.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:busybox-1.26.2-4.5.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:busybox-1.26.2-4.5.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:busybox-1.26.2-4.5.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:busybox-1.26.2-4.5.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP2:busybox-1.26.2-4.5.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP2:busybox-1.26.2-4.5.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:busybox-static-1.26.2-4.5.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:busybox-static-1.26.2-4.5.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP2:busybox-static-1.26.2-4.5.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP2:busybox-static-1.26.2-4.5.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-1.26.2-4.5.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-1.26.2-4.5.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-1.26.2-4.5.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-1.26.2-4.5.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-static-1.26.2-4.5.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-static-1.26.2-4.5.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-static-1.26.2-4.5.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-static-1.26.2-4.5.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:busybox-1.26.2-4.5.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:busybox-static-1.26.2-4.5.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-1.26.2-4.5.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-1.26.2-4.5.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-1.26.2-4.5.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-1.26.2-4.5.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-static-1.26.2-4.5.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-static-1.26.2-4.5.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-static-1.26.2-4.5.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-static-1.26.2-4.5.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:busybox-1.26.2-4.5.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:busybox-1.26.2-4.5.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:busybox-1.26.2-4.5.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:busybox-1.26.2-4.5.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:busybox-1.26.2-4.5.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:busybox-1.26.2-4.5.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:busybox-static-1.26.2-4.5.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:busybox-static-1.26.2-4.5.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:busybox-1.26.2-4.5.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:busybox-1.26.2-4.5.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2021-10-27T08:08:18Z", details: "important", }, ], title: "CVE-2018-1000517", }, { cve: "CVE-2018-20679", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2018-20679", }, ], notes: [ { category: "general", text: "An issue was discovered in BusyBox before 1.30.0. An out of bounds read in udhcp components (consumed by the DHCP server, client, and relay) allows a remote attacker to leak sensitive information from the stack by sending a crafted DHCP message. This is related to verification in udhcp_get_option() in networking/udhcp/common.c that 4-byte options are indeed 4 bytes.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Enterprise Storage 6:busybox-1.26.2-4.5.1.aarch64", "SUSE Enterprise Storage 6:busybox-1.26.2-4.5.1.x86_64", "SUSE Enterprise Storage 6:busybox-static-1.26.2-4.5.1.aarch64", "SUSE Enterprise Storage 6:busybox-static-1.26.2-4.5.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:busybox-1.26.2-4.5.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:busybox-1.26.2-4.5.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:busybox-static-1.26.2-4.5.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:busybox-static-1.26.2-4.5.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:busybox-1.26.2-4.5.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:busybox-1.26.2-4.5.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:busybox-static-1.26.2-4.5.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:busybox-static-1.26.2-4.5.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:busybox-1.26.2-4.5.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:busybox-1.26.2-4.5.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:busybox-1.26.2-4.5.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:busybox-1.26.2-4.5.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:busybox-1.26.2-4.5.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:busybox-1.26.2-4.5.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP2:busybox-1.26.2-4.5.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP2:busybox-1.26.2-4.5.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:busybox-static-1.26.2-4.5.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:busybox-static-1.26.2-4.5.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP2:busybox-static-1.26.2-4.5.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP2:busybox-static-1.26.2-4.5.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-1.26.2-4.5.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-1.26.2-4.5.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-1.26.2-4.5.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-1.26.2-4.5.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-static-1.26.2-4.5.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-static-1.26.2-4.5.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-static-1.26.2-4.5.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-static-1.26.2-4.5.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:busybox-1.26.2-4.5.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:busybox-static-1.26.2-4.5.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-1.26.2-4.5.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-1.26.2-4.5.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-1.26.2-4.5.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-1.26.2-4.5.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-static-1.26.2-4.5.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-static-1.26.2-4.5.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-static-1.26.2-4.5.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-static-1.26.2-4.5.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:busybox-1.26.2-4.5.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:busybox-1.26.2-4.5.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:busybox-1.26.2-4.5.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:busybox-1.26.2-4.5.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:busybox-1.26.2-4.5.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:busybox-1.26.2-4.5.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:busybox-static-1.26.2-4.5.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:busybox-static-1.26.2-4.5.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:busybox-1.26.2-4.5.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:busybox-1.26.2-4.5.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2018-20679", url: "https://www.suse.com/security/cve/CVE-2018-20679", }, { category: "external", summary: "SUSE Bug 1121426 for CVE-2018-20679", url: "https://bugzilla.suse.com/1121426", }, { category: "external", summary: "SUSE Bug 1121428 for CVE-2018-20679", url: "https://bugzilla.suse.com/1121428", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Enterprise Storage 6:busybox-1.26.2-4.5.1.aarch64", "SUSE Enterprise Storage 6:busybox-1.26.2-4.5.1.x86_64", "SUSE Enterprise Storage 6:busybox-static-1.26.2-4.5.1.aarch64", "SUSE Enterprise Storage 6:busybox-static-1.26.2-4.5.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:busybox-1.26.2-4.5.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:busybox-1.26.2-4.5.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:busybox-static-1.26.2-4.5.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:busybox-static-1.26.2-4.5.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:busybox-1.26.2-4.5.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:busybox-1.26.2-4.5.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:busybox-static-1.26.2-4.5.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:busybox-static-1.26.2-4.5.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:busybox-1.26.2-4.5.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:busybox-1.26.2-4.5.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:busybox-1.26.2-4.5.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:busybox-1.26.2-4.5.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:busybox-1.26.2-4.5.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:busybox-1.26.2-4.5.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP2:busybox-1.26.2-4.5.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP2:busybox-1.26.2-4.5.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:busybox-static-1.26.2-4.5.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:busybox-static-1.26.2-4.5.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP2:busybox-static-1.26.2-4.5.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP2:busybox-static-1.26.2-4.5.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-1.26.2-4.5.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-1.26.2-4.5.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-1.26.2-4.5.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-1.26.2-4.5.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-static-1.26.2-4.5.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-static-1.26.2-4.5.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-static-1.26.2-4.5.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-static-1.26.2-4.5.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:busybox-1.26.2-4.5.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:busybox-static-1.26.2-4.5.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-1.26.2-4.5.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-1.26.2-4.5.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-1.26.2-4.5.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-1.26.2-4.5.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-static-1.26.2-4.5.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-static-1.26.2-4.5.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-static-1.26.2-4.5.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-static-1.26.2-4.5.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:busybox-1.26.2-4.5.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:busybox-1.26.2-4.5.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:busybox-1.26.2-4.5.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:busybox-1.26.2-4.5.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:busybox-1.26.2-4.5.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:busybox-1.26.2-4.5.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:busybox-static-1.26.2-4.5.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:busybox-static-1.26.2-4.5.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:busybox-1.26.2-4.5.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:busybox-1.26.2-4.5.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.3, baseSeverity: "MEDIUM", vectorString: "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N", version: "3.0", }, products: [ "SUSE Enterprise Storage 6:busybox-1.26.2-4.5.1.aarch64", "SUSE Enterprise Storage 6:busybox-1.26.2-4.5.1.x86_64", "SUSE Enterprise Storage 6:busybox-static-1.26.2-4.5.1.aarch64", "SUSE Enterprise Storage 6:busybox-static-1.26.2-4.5.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:busybox-1.26.2-4.5.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:busybox-1.26.2-4.5.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:busybox-static-1.26.2-4.5.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:busybox-static-1.26.2-4.5.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:busybox-1.26.2-4.5.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:busybox-1.26.2-4.5.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:busybox-static-1.26.2-4.5.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:busybox-static-1.26.2-4.5.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:busybox-1.26.2-4.5.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:busybox-1.26.2-4.5.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:busybox-1.26.2-4.5.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:busybox-1.26.2-4.5.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:busybox-1.26.2-4.5.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:busybox-1.26.2-4.5.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP2:busybox-1.26.2-4.5.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP2:busybox-1.26.2-4.5.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:busybox-static-1.26.2-4.5.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:busybox-static-1.26.2-4.5.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP2:busybox-static-1.26.2-4.5.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP2:busybox-static-1.26.2-4.5.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-1.26.2-4.5.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-1.26.2-4.5.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-1.26.2-4.5.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-1.26.2-4.5.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-static-1.26.2-4.5.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-static-1.26.2-4.5.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-static-1.26.2-4.5.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-static-1.26.2-4.5.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:busybox-1.26.2-4.5.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:busybox-static-1.26.2-4.5.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-1.26.2-4.5.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-1.26.2-4.5.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-1.26.2-4.5.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-1.26.2-4.5.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-static-1.26.2-4.5.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-static-1.26.2-4.5.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-static-1.26.2-4.5.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-static-1.26.2-4.5.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:busybox-1.26.2-4.5.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:busybox-1.26.2-4.5.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:busybox-1.26.2-4.5.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:busybox-1.26.2-4.5.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:busybox-1.26.2-4.5.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:busybox-1.26.2-4.5.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:busybox-static-1.26.2-4.5.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:busybox-static-1.26.2-4.5.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:busybox-1.26.2-4.5.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:busybox-1.26.2-4.5.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2021-10-27T08:08:18Z", details: "moderate", }, ], title: "CVE-2018-20679", }, { cve: "CVE-2021-28831", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2021-28831", }, ], notes: [ { category: "general", text: "decompress_gunzip.c in BusyBox through 1.32.1 mishandles the error bit on the huft_build result pointer, with a resultant invalid free or segmentation fault, via malformed gzip data.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Enterprise Storage 6:busybox-1.26.2-4.5.1.aarch64", "SUSE Enterprise Storage 6:busybox-1.26.2-4.5.1.x86_64", "SUSE Enterprise Storage 6:busybox-static-1.26.2-4.5.1.aarch64", "SUSE Enterprise Storage 6:busybox-static-1.26.2-4.5.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:busybox-1.26.2-4.5.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:busybox-1.26.2-4.5.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:busybox-static-1.26.2-4.5.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:busybox-static-1.26.2-4.5.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:busybox-1.26.2-4.5.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:busybox-1.26.2-4.5.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:busybox-static-1.26.2-4.5.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:busybox-static-1.26.2-4.5.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:busybox-1.26.2-4.5.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:busybox-1.26.2-4.5.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:busybox-1.26.2-4.5.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:busybox-1.26.2-4.5.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:busybox-1.26.2-4.5.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:busybox-1.26.2-4.5.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP2:busybox-1.26.2-4.5.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP2:busybox-1.26.2-4.5.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:busybox-static-1.26.2-4.5.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:busybox-static-1.26.2-4.5.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP2:busybox-static-1.26.2-4.5.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP2:busybox-static-1.26.2-4.5.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-1.26.2-4.5.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-1.26.2-4.5.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-1.26.2-4.5.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-1.26.2-4.5.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-static-1.26.2-4.5.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-static-1.26.2-4.5.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-static-1.26.2-4.5.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-static-1.26.2-4.5.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:busybox-1.26.2-4.5.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:busybox-static-1.26.2-4.5.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-1.26.2-4.5.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-1.26.2-4.5.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-1.26.2-4.5.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-1.26.2-4.5.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-static-1.26.2-4.5.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-static-1.26.2-4.5.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-static-1.26.2-4.5.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-static-1.26.2-4.5.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:busybox-1.26.2-4.5.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:busybox-1.26.2-4.5.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:busybox-1.26.2-4.5.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:busybox-1.26.2-4.5.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:busybox-1.26.2-4.5.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:busybox-1.26.2-4.5.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:busybox-static-1.26.2-4.5.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:busybox-static-1.26.2-4.5.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:busybox-1.26.2-4.5.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:busybox-1.26.2-4.5.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2021-28831", url: "https://www.suse.com/security/cve/CVE-2021-28831", }, { category: "external", summary: "SUSE Bug 1184522 for CVE-2021-28831", url: "https://bugzilla.suse.com/1184522", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Enterprise Storage 6:busybox-1.26.2-4.5.1.aarch64", "SUSE Enterprise Storage 6:busybox-1.26.2-4.5.1.x86_64", "SUSE Enterprise Storage 6:busybox-static-1.26.2-4.5.1.aarch64", "SUSE Enterprise Storage 6:busybox-static-1.26.2-4.5.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:busybox-1.26.2-4.5.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:busybox-1.26.2-4.5.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:busybox-static-1.26.2-4.5.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:busybox-static-1.26.2-4.5.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:busybox-1.26.2-4.5.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:busybox-1.26.2-4.5.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:busybox-static-1.26.2-4.5.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:busybox-static-1.26.2-4.5.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:busybox-1.26.2-4.5.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:busybox-1.26.2-4.5.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:busybox-1.26.2-4.5.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:busybox-1.26.2-4.5.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:busybox-1.26.2-4.5.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:busybox-1.26.2-4.5.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP2:busybox-1.26.2-4.5.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP2:busybox-1.26.2-4.5.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:busybox-static-1.26.2-4.5.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:busybox-static-1.26.2-4.5.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP2:busybox-static-1.26.2-4.5.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP2:busybox-static-1.26.2-4.5.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-1.26.2-4.5.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-1.26.2-4.5.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-1.26.2-4.5.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-1.26.2-4.5.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-static-1.26.2-4.5.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-static-1.26.2-4.5.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-static-1.26.2-4.5.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-static-1.26.2-4.5.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:busybox-1.26.2-4.5.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:busybox-static-1.26.2-4.5.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-1.26.2-4.5.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-1.26.2-4.5.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-1.26.2-4.5.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-1.26.2-4.5.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-static-1.26.2-4.5.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-static-1.26.2-4.5.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-static-1.26.2-4.5.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-static-1.26.2-4.5.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:busybox-1.26.2-4.5.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:busybox-1.26.2-4.5.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:busybox-1.26.2-4.5.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:busybox-1.26.2-4.5.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:busybox-1.26.2-4.5.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:busybox-1.26.2-4.5.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:busybox-static-1.26.2-4.5.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:busybox-static-1.26.2-4.5.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:busybox-1.26.2-4.5.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:busybox-1.26.2-4.5.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 7.5, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "SUSE Enterprise Storage 6:busybox-1.26.2-4.5.1.aarch64", "SUSE Enterprise Storage 6:busybox-1.26.2-4.5.1.x86_64", "SUSE Enterprise Storage 6:busybox-static-1.26.2-4.5.1.aarch64", "SUSE Enterprise Storage 6:busybox-static-1.26.2-4.5.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:busybox-1.26.2-4.5.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:busybox-1.26.2-4.5.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:busybox-static-1.26.2-4.5.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:busybox-static-1.26.2-4.5.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:busybox-1.26.2-4.5.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:busybox-1.26.2-4.5.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:busybox-static-1.26.2-4.5.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:busybox-static-1.26.2-4.5.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:busybox-1.26.2-4.5.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:busybox-1.26.2-4.5.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:busybox-1.26.2-4.5.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:busybox-1.26.2-4.5.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:busybox-1.26.2-4.5.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:busybox-1.26.2-4.5.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP2:busybox-1.26.2-4.5.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP2:busybox-1.26.2-4.5.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:busybox-static-1.26.2-4.5.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:busybox-static-1.26.2-4.5.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP2:busybox-static-1.26.2-4.5.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP2:busybox-static-1.26.2-4.5.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-1.26.2-4.5.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-1.26.2-4.5.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-1.26.2-4.5.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-1.26.2-4.5.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-static-1.26.2-4.5.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-static-1.26.2-4.5.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-static-1.26.2-4.5.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-static-1.26.2-4.5.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:busybox-1.26.2-4.5.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:busybox-static-1.26.2-4.5.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-1.26.2-4.5.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-1.26.2-4.5.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-1.26.2-4.5.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-1.26.2-4.5.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-static-1.26.2-4.5.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-static-1.26.2-4.5.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-static-1.26.2-4.5.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-static-1.26.2-4.5.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:busybox-1.26.2-4.5.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:busybox-1.26.2-4.5.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:busybox-1.26.2-4.5.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:busybox-1.26.2-4.5.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:busybox-1.26.2-4.5.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:busybox-1.26.2-4.5.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:busybox-static-1.26.2-4.5.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:busybox-static-1.26.2-4.5.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:busybox-1.26.2-4.5.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:busybox-1.26.2-4.5.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2021-10-27T08:08:18Z", details: "important", }, ], title: "CVE-2021-28831", }, ], }
suse-su-2022:3959-1
Vulnerability from csaf_suse
Published
2022-11-11 14:38
Modified
2022-11-11 14:38
Summary
Security update for busybox
Notes
Title of the patch
Security update for busybox
Description of the patch
This update for busybox fixes the following issues:
- Enable switch_root
With this change virtme --force-initramfs works as expected.
- Enable udhcpc
busybox was updated to 1.35.0
- Adjust busybox.config for new features in find, date and cpio
- Annotate CVEs already fixed in upstream, but not mentioned in .changes yet:
* CVE-2017-16544 (bsc#1069412): Insufficient sanitization of filenames when autocompleting
* CVE-2015-9261 (bsc#1102912): huft_build misuses a pointer, causing segfaults
* CVE-2016-2147 (bsc#970663): out of bounds write (heap) due to integer underflow in udhcpc
* CVE-2016-2148 (bsc#970662): heap-based buffer overflow in OPTION_6RD parsing
* CVE-2016-6301 (bsc#991940): NTP server denial of service flaw
* CVE-2017-15873 (bsc#1064976): The get_next_block function in archival/libarchive/decompress_bunzip2.c has an Integer Overflow
* CVE-2017-15874 (bsc#1064978): archival/libarchive/decompress_unlzma.c has an Integer Underflow
* CVE-2019-5747 (bsc#1121428): out of bounds read in udhcp components
* CVE-2021-42373, CVE-2021-42374, CVE-2021-42375, CVE-2021-42376,
CVE-2021-42377, CVE-2021-42378, CVE-2021-42379, CVE-2021-42380,
CVE-2021-42381, CVE-2021-42382, CVE-2021-42383, CVE-2021-42384,
CVE-2021-42385, CVE-2021-42386 (bsc#1192869) : v1.34.0 bugfixes
* CVE-2021-28831 (bsc#1184522): invalid free or segmentation fault via malformed gzip data
* CVE-2018-20679 (bsc#1121426): out of bounds read in udhcp
* CVE-2018-1000517 (bsc#1099260): Heap-based buffer overflow in the retrieve_file_data()
* CVE-2011-5325 (bsc#951562): tar directory traversal
* CVE-2018-1000500 (bsc#1099263): wget: Missing SSL certificate validation
Patchnames
SUSE-2022-3959,SUSE-SLE-Module-Basesystem-15-SP4-2022-3959,openSUSE-SLE-15.4-2022-3959
Terms of use
CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
{ document: { aggregate_severity: { namespace: "https://www.suse.com/support/security/rating/", text: "important", }, category: "csaf_security_advisory", csaf_version: "2.0", distribution: { text: "Copyright 2024 SUSE LLC. All rights reserved.", tlp: { label: "WHITE", url: "https://www.first.org/tlp/", }, }, lang: "en", notes: [ { category: "summary", text: "Security update for busybox", title: "Title of the patch", }, { category: "description", text: "This update for busybox fixes the following issues:\n\n- Enable switch_root\n With this change virtme --force-initramfs works as expected.\n- Enable udhcpc\n\nbusybox was updated to 1.35.0\n\n- Adjust busybox.config for new features in find, date and cpio \n\n- Annotate CVEs already fixed in upstream, but not mentioned in .changes yet:\n\n* CVE-2017-16544 (bsc#1069412): Insufficient sanitization of filenames when autocompleting\n* CVE-2015-9261 (bsc#1102912): huft_build misuses a pointer, causing segfaults\n* CVE-2016-2147 (bsc#970663): out of bounds write (heap) due to integer underflow in udhcpc\n* CVE-2016-2148 (bsc#970662): heap-based buffer overflow in OPTION_6RD parsing\n* CVE-2016-6301 (bsc#991940): NTP server denial of service flaw\n* CVE-2017-15873 (bsc#1064976): The get_next_block function in archival/libarchive/decompress_bunzip2.c has an Integer Overflow\n* CVE-2017-15874 (bsc#1064978): archival/libarchive/decompress_unlzma.c has an Integer Underflow\n* CVE-2019-5747 (bsc#1121428): out of bounds read in udhcp components\n* CVE-2021-42373, CVE-2021-42374, CVE-2021-42375, CVE-2021-42376,\n CVE-2021-42377, CVE-2021-42378, CVE-2021-42379, CVE-2021-42380,\n CVE-2021-42381, CVE-2021-42382, CVE-2021-42383, CVE-2021-42384,\n CVE-2021-42385, CVE-2021-42386 (bsc#1192869) : v1.34.0 bugfixes\n* CVE-2021-28831 (bsc#1184522): invalid free or segmentation fault via malformed gzip data\n* CVE-2018-20679 (bsc#1121426): out of bounds read in udhcp\n* CVE-2018-1000517 (bsc#1099260): Heap-based buffer overflow in the retrieve_file_data()\n* CVE-2011-5325 (bsc#951562): tar directory traversal\n* CVE-2018-1000500 (bsc#1099263): wget: Missing SSL certificate validation\n", title: "Description of the patch", }, { category: "details", text: "SUSE-2022-3959,SUSE-SLE-Module-Basesystem-15-SP4-2022-3959,openSUSE-SLE-15.4-2022-3959", title: "Patchnames", }, { category: "legal_disclaimer", text: "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", title: "Terms of use", }, ], publisher: { category: "vendor", contact_details: "https://www.suse.com/support/security/contact/", name: "SUSE Product Security Team", namespace: "https://www.suse.com/", }, references: [ { category: "external", summary: "SUSE ratings", url: "https://www.suse.com/support/security/rating/", }, { category: "self", summary: "URL of this CSAF notice", url: "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2022_3959-1.json", }, { category: "self", summary: "URL for SUSE-SU-2022:3959-1", url: "https://www.suse.com/support/update/announcement/2022/suse-su-20223959-1/", }, { category: "self", summary: "E-Mail link for SUSE-SU-2022:3959-1", url: "https://lists.suse.com/pipermail/sle-security-updates/2022-November/012904.html", }, { category: "self", summary: "SUSE Bug 1064976", url: "https://bugzilla.suse.com/1064976", }, { category: "self", summary: "SUSE Bug 1064978", url: "https://bugzilla.suse.com/1064978", }, { category: "self", summary: "SUSE Bug 1069412", url: "https://bugzilla.suse.com/1069412", }, { category: "self", summary: "SUSE Bug 1099260", url: "https://bugzilla.suse.com/1099260", }, { category: "self", summary: "SUSE Bug 1099263", url: "https://bugzilla.suse.com/1099263", }, { category: "self", summary: "SUSE Bug 1102912", url: "https://bugzilla.suse.com/1102912", }, { category: "self", summary: "SUSE Bug 1121426", url: "https://bugzilla.suse.com/1121426", }, { category: "self", summary: "SUSE Bug 1121428", url: "https://bugzilla.suse.com/1121428", }, { category: "self", summary: "SUSE Bug 1184522", url: "https://bugzilla.suse.com/1184522", }, { category: "self", summary: "SUSE Bug 1192869", url: "https://bugzilla.suse.com/1192869", }, { category: "self", summary: "SUSE Bug 951562", url: "https://bugzilla.suse.com/951562", }, { category: "self", summary: "SUSE Bug 970662", url: "https://bugzilla.suse.com/970662", }, { category: "self", summary: "SUSE Bug 970663", url: "https://bugzilla.suse.com/970663", }, { category: "self", summary: "SUSE Bug 991940", url: "https://bugzilla.suse.com/991940", }, { category: "self", summary: "SUSE CVE CVE-2011-5325 page", url: "https://www.suse.com/security/cve/CVE-2011-5325/", }, { category: "self", summary: "SUSE CVE CVE-2015-9261 page", url: "https://www.suse.com/security/cve/CVE-2015-9261/", }, { category: "self", summary: "SUSE CVE CVE-2016-2147 page", url: "https://www.suse.com/security/cve/CVE-2016-2147/", }, { category: "self", summary: "SUSE CVE CVE-2016-2148 page", url: "https://www.suse.com/security/cve/CVE-2016-2148/", }, { category: "self", summary: "SUSE CVE CVE-2016-6301 page", url: "https://www.suse.com/security/cve/CVE-2016-6301/", }, { category: "self", summary: "SUSE CVE CVE-2017-15873 page", url: "https://www.suse.com/security/cve/CVE-2017-15873/", }, { category: "self", summary: "SUSE CVE CVE-2017-15874 page", url: "https://www.suse.com/security/cve/CVE-2017-15874/", }, { category: "self", summary: "SUSE CVE CVE-2017-16544 page", url: "https://www.suse.com/security/cve/CVE-2017-16544/", }, { category: "self", summary: "SUSE CVE CVE-2018-1000500 page", url: "https://www.suse.com/security/cve/CVE-2018-1000500/", }, { category: "self", summary: "SUSE CVE CVE-2018-1000517 page", url: "https://www.suse.com/security/cve/CVE-2018-1000517/", }, { category: "self", summary: "SUSE CVE CVE-2018-20679 page", url: "https://www.suse.com/security/cve/CVE-2018-20679/", }, { category: "self", summary: "SUSE CVE CVE-2019-5747 page", url: "https://www.suse.com/security/cve/CVE-2019-5747/", }, { category: "self", summary: "SUSE CVE CVE-2021-28831 page", url: "https://www.suse.com/security/cve/CVE-2021-28831/", }, { category: "self", summary: "SUSE CVE CVE-2021-42373 page", url: "https://www.suse.com/security/cve/CVE-2021-42373/", }, { category: "self", summary: "SUSE CVE CVE-2021-42374 page", url: "https://www.suse.com/security/cve/CVE-2021-42374/", }, { category: "self", summary: "SUSE CVE CVE-2021-42375 page", url: "https://www.suse.com/security/cve/CVE-2021-42375/", }, { category: "self", summary: "SUSE CVE CVE-2021-42376 page", url: "https://www.suse.com/security/cve/CVE-2021-42376/", }, { category: "self", summary: "SUSE CVE CVE-2021-42377 page", url: "https://www.suse.com/security/cve/CVE-2021-42377/", }, { category: "self", summary: "SUSE CVE CVE-2021-42378 page", url: "https://www.suse.com/security/cve/CVE-2021-42378/", }, { category: "self", summary: "SUSE CVE CVE-2021-42379 page", url: "https://www.suse.com/security/cve/CVE-2021-42379/", }, { category: "self", summary: "SUSE CVE CVE-2021-42380 page", url: "https://www.suse.com/security/cve/CVE-2021-42380/", }, { category: "self", summary: "SUSE CVE CVE-2021-42381 page", url: "https://www.suse.com/security/cve/CVE-2021-42381/", }, { category: "self", summary: "SUSE CVE CVE-2021-42382 page", url: "https://www.suse.com/security/cve/CVE-2021-42382/", }, { category: "self", summary: "SUSE CVE CVE-2021-42383 page", url: "https://www.suse.com/security/cve/CVE-2021-42383/", }, { category: "self", summary: "SUSE CVE CVE-2021-42384 page", url: "https://www.suse.com/security/cve/CVE-2021-42384/", }, { category: "self", summary: "SUSE CVE CVE-2021-42385 page", url: "https://www.suse.com/security/cve/CVE-2021-42385/", }, { category: "self", summary: "SUSE CVE CVE-2021-42386 page", url: "https://www.suse.com/security/cve/CVE-2021-42386/", }, ], title: "Security update for busybox", tracking: { current_release_date: "2022-11-11T14:38:22Z", generator: { date: "2022-11-11T14:38:22Z", engine: { name: "cve-database.git:bin/generate-csaf.pl", version: "1", }, }, id: "SUSE-SU-2022:3959-1", initial_release_date: "2022-11-11T14:38:22Z", revision_history: [ { date: "2022-11-11T14:38:22Z", number: "1", summary: "Current version", }, ], status: "final", version: "1", }, }, product_tree: { branches: [ { branches: [ { branches: [ { category: "product_version", name: "busybox-1.35.0-150400.3.3.1.aarch64", product: { name: "busybox-1.35.0-150400.3.3.1.aarch64", product_id: "busybox-1.35.0-150400.3.3.1.aarch64", }, }, { category: "product_version", name: "busybox-static-1.35.0-150400.3.3.1.aarch64", product: { name: "busybox-static-1.35.0-150400.3.3.1.aarch64", product_id: "busybox-static-1.35.0-150400.3.3.1.aarch64", }, }, { category: "product_version", name: "busybox-testsuite-1.35.0-150400.3.3.1.aarch64", product: { name: "busybox-testsuite-1.35.0-150400.3.3.1.aarch64", product_id: "busybox-testsuite-1.35.0-150400.3.3.1.aarch64", }, }, { category: "product_version", name: "busybox-warewulf3-1.35.0-150400.3.3.1.aarch64", product: { name: "busybox-warewulf3-1.35.0-150400.3.3.1.aarch64", product_id: "busybox-warewulf3-1.35.0-150400.3.3.1.aarch64", }, }, ], category: "architecture", name: "aarch64", }, { branches: [ { category: "product_version", name: "busybox-1.35.0-150400.3.3.1.i586", product: { name: "busybox-1.35.0-150400.3.3.1.i586", product_id: "busybox-1.35.0-150400.3.3.1.i586", }, }, { category: "product_version", name: "busybox-static-1.35.0-150400.3.3.1.i586", product: { name: "busybox-static-1.35.0-150400.3.3.1.i586", product_id: "busybox-static-1.35.0-150400.3.3.1.i586", }, }, { category: "product_version", name: "busybox-testsuite-1.35.0-150400.3.3.1.i586", product: { name: "busybox-testsuite-1.35.0-150400.3.3.1.i586", product_id: "busybox-testsuite-1.35.0-150400.3.3.1.i586", }, }, { category: "product_version", name: "busybox-warewulf3-1.35.0-150400.3.3.1.i586", product: { name: "busybox-warewulf3-1.35.0-150400.3.3.1.i586", product_id: "busybox-warewulf3-1.35.0-150400.3.3.1.i586", }, }, ], category: "architecture", name: "i586", }, { branches: [ { category: "product_version", name: "busybox-1.35.0-150400.3.3.1.ppc64le", product: { name: "busybox-1.35.0-150400.3.3.1.ppc64le", product_id: "busybox-1.35.0-150400.3.3.1.ppc64le", }, }, { category: "product_version", name: "busybox-static-1.35.0-150400.3.3.1.ppc64le", product: { name: "busybox-static-1.35.0-150400.3.3.1.ppc64le", product_id: "busybox-static-1.35.0-150400.3.3.1.ppc64le", }, }, { category: "product_version", name: "busybox-testsuite-1.35.0-150400.3.3.1.ppc64le", product: { name: "busybox-testsuite-1.35.0-150400.3.3.1.ppc64le", product_id: "busybox-testsuite-1.35.0-150400.3.3.1.ppc64le", }, }, ], category: "architecture", name: "ppc64le", }, { branches: [ { category: "product_version", name: "busybox-1.35.0-150400.3.3.1.s390x", product: { name: "busybox-1.35.0-150400.3.3.1.s390x", product_id: "busybox-1.35.0-150400.3.3.1.s390x", }, }, { category: "product_version", name: "busybox-static-1.35.0-150400.3.3.1.s390x", product: { name: "busybox-static-1.35.0-150400.3.3.1.s390x", product_id: "busybox-static-1.35.0-150400.3.3.1.s390x", }, }, { category: "product_version", name: "busybox-testsuite-1.35.0-150400.3.3.1.s390x", product: { name: "busybox-testsuite-1.35.0-150400.3.3.1.s390x", product_id: "busybox-testsuite-1.35.0-150400.3.3.1.s390x", }, }, ], category: "architecture", name: "s390x", }, { branches: [ { category: "product_version", name: "busybox-1.35.0-150400.3.3.1.x86_64", product: { name: "busybox-1.35.0-150400.3.3.1.x86_64", product_id: "busybox-1.35.0-150400.3.3.1.x86_64", }, }, { category: "product_version", name: "busybox-static-1.35.0-150400.3.3.1.x86_64", product: { name: "busybox-static-1.35.0-150400.3.3.1.x86_64", product_id: "busybox-static-1.35.0-150400.3.3.1.x86_64", }, }, { category: "product_version", name: "busybox-testsuite-1.35.0-150400.3.3.1.x86_64", product: { name: "busybox-testsuite-1.35.0-150400.3.3.1.x86_64", product_id: "busybox-testsuite-1.35.0-150400.3.3.1.x86_64", }, }, { category: "product_version", name: "busybox-warewulf3-1.35.0-150400.3.3.1.x86_64", product: { name: "busybox-warewulf3-1.35.0-150400.3.3.1.x86_64", product_id: "busybox-warewulf3-1.35.0-150400.3.3.1.x86_64", }, }, ], category: "architecture", name: "x86_64", }, { branches: [ { category: "product_name", name: "SUSE Linux Enterprise Module for Basesystem 15 SP4", product: { name: "SUSE Linux Enterprise Module for Basesystem 15 SP4", product_id: "SUSE Linux Enterprise Module for Basesystem 15 SP4", product_identification_helper: { cpe: "cpe:/o:suse:sle-module-basesystem:15:sp4", }, }, }, { category: "product_name", name: "openSUSE Leap 15.4", product: { name: "openSUSE Leap 15.4", product_id: "openSUSE Leap 15.4", product_identification_helper: { cpe: "cpe:/o:opensuse:leap:15.4", }, }, }, ], category: "product_family", name: "SUSE Linux Enterprise", }, ], category: "vendor", name: "SUSE", }, ], relationships: [ { category: "default_component_of", full_product_name: { name: "busybox-1.35.0-150400.3.3.1.aarch64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP4", product_id: "SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-1.35.0-150400.3.3.1.aarch64", }, product_reference: "busybox-1.35.0-150400.3.3.1.aarch64", relates_to_product_reference: "SUSE Linux Enterprise Module for Basesystem 15 SP4", }, { category: "default_component_of", full_product_name: { name: "busybox-1.35.0-150400.3.3.1.ppc64le as component of SUSE Linux Enterprise Module for Basesystem 15 SP4", product_id: "SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-1.35.0-150400.3.3.1.ppc64le", }, product_reference: "busybox-1.35.0-150400.3.3.1.ppc64le", relates_to_product_reference: "SUSE Linux Enterprise Module for Basesystem 15 SP4", }, { category: "default_component_of", full_product_name: { name: "busybox-1.35.0-150400.3.3.1.s390x as component of SUSE Linux Enterprise Module for Basesystem 15 SP4", product_id: "SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-1.35.0-150400.3.3.1.s390x", }, product_reference: "busybox-1.35.0-150400.3.3.1.s390x", relates_to_product_reference: "SUSE Linux Enterprise Module for Basesystem 15 SP4", }, { category: "default_component_of", full_product_name: { name: "busybox-1.35.0-150400.3.3.1.x86_64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP4", product_id: "SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-1.35.0-150400.3.3.1.x86_64", }, product_reference: "busybox-1.35.0-150400.3.3.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Module for Basesystem 15 SP4", }, { category: "default_component_of", full_product_name: { name: "busybox-static-1.35.0-150400.3.3.1.aarch64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP4", product_id: "SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-static-1.35.0-150400.3.3.1.aarch64", }, product_reference: "busybox-static-1.35.0-150400.3.3.1.aarch64", relates_to_product_reference: "SUSE Linux Enterprise Module for Basesystem 15 SP4", }, { category: "default_component_of", full_product_name: { name: "busybox-static-1.35.0-150400.3.3.1.ppc64le as component of SUSE Linux Enterprise Module for Basesystem 15 SP4", product_id: "SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-static-1.35.0-150400.3.3.1.ppc64le", }, product_reference: "busybox-static-1.35.0-150400.3.3.1.ppc64le", relates_to_product_reference: "SUSE Linux Enterprise Module for Basesystem 15 SP4", }, { category: "default_component_of", full_product_name: { name: "busybox-static-1.35.0-150400.3.3.1.s390x as component of SUSE Linux Enterprise Module for Basesystem 15 SP4", product_id: "SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-static-1.35.0-150400.3.3.1.s390x", }, product_reference: "busybox-static-1.35.0-150400.3.3.1.s390x", relates_to_product_reference: "SUSE Linux Enterprise Module for Basesystem 15 SP4", }, { category: "default_component_of", full_product_name: { name: "busybox-static-1.35.0-150400.3.3.1.x86_64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP4", product_id: "SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-static-1.35.0-150400.3.3.1.x86_64", }, product_reference: "busybox-static-1.35.0-150400.3.3.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Module for Basesystem 15 SP4", }, { category: "default_component_of", full_product_name: { name: "busybox-1.35.0-150400.3.3.1.aarch64 as component of openSUSE Leap 15.4", product_id: "openSUSE Leap 15.4:busybox-1.35.0-150400.3.3.1.aarch64", }, product_reference: "busybox-1.35.0-150400.3.3.1.aarch64", relates_to_product_reference: "openSUSE Leap 15.4", }, { category: "default_component_of", full_product_name: { name: "busybox-1.35.0-150400.3.3.1.ppc64le as component of openSUSE Leap 15.4", product_id: "openSUSE Leap 15.4:busybox-1.35.0-150400.3.3.1.ppc64le", }, product_reference: "busybox-1.35.0-150400.3.3.1.ppc64le", relates_to_product_reference: "openSUSE Leap 15.4", }, { category: "default_component_of", full_product_name: { name: "busybox-1.35.0-150400.3.3.1.s390x as component of openSUSE Leap 15.4", product_id: "openSUSE Leap 15.4:busybox-1.35.0-150400.3.3.1.s390x", }, product_reference: "busybox-1.35.0-150400.3.3.1.s390x", relates_to_product_reference: "openSUSE Leap 15.4", }, { category: "default_component_of", full_product_name: { name: "busybox-1.35.0-150400.3.3.1.x86_64 as component of openSUSE Leap 15.4", product_id: "openSUSE Leap 15.4:busybox-1.35.0-150400.3.3.1.x86_64", }, product_reference: "busybox-1.35.0-150400.3.3.1.x86_64", relates_to_product_reference: "openSUSE Leap 15.4", }, { category: "default_component_of", full_product_name: { name: "busybox-static-1.35.0-150400.3.3.1.aarch64 as component of openSUSE Leap 15.4", product_id: "openSUSE Leap 15.4:busybox-static-1.35.0-150400.3.3.1.aarch64", }, product_reference: "busybox-static-1.35.0-150400.3.3.1.aarch64", relates_to_product_reference: "openSUSE Leap 15.4", }, { category: "default_component_of", full_product_name: { name: "busybox-static-1.35.0-150400.3.3.1.ppc64le as component of openSUSE Leap 15.4", product_id: "openSUSE Leap 15.4:busybox-static-1.35.0-150400.3.3.1.ppc64le", }, product_reference: "busybox-static-1.35.0-150400.3.3.1.ppc64le", relates_to_product_reference: "openSUSE Leap 15.4", }, { category: "default_component_of", full_product_name: { name: "busybox-static-1.35.0-150400.3.3.1.s390x as component of openSUSE Leap 15.4", product_id: "openSUSE Leap 15.4:busybox-static-1.35.0-150400.3.3.1.s390x", }, product_reference: "busybox-static-1.35.0-150400.3.3.1.s390x", relates_to_product_reference: "openSUSE Leap 15.4", }, { category: "default_component_of", full_product_name: { name: "busybox-static-1.35.0-150400.3.3.1.x86_64 as component of openSUSE Leap 15.4", product_id: "openSUSE Leap 15.4:busybox-static-1.35.0-150400.3.3.1.x86_64", }, product_reference: "busybox-static-1.35.0-150400.3.3.1.x86_64", relates_to_product_reference: "openSUSE Leap 15.4", }, { category: "default_component_of", full_product_name: { name: "busybox-testsuite-1.35.0-150400.3.3.1.aarch64 as component of openSUSE Leap 15.4", product_id: "openSUSE Leap 15.4:busybox-testsuite-1.35.0-150400.3.3.1.aarch64", }, product_reference: "busybox-testsuite-1.35.0-150400.3.3.1.aarch64", relates_to_product_reference: "openSUSE Leap 15.4", }, { category: "default_component_of", full_product_name: { name: "busybox-testsuite-1.35.0-150400.3.3.1.ppc64le as component of openSUSE Leap 15.4", product_id: "openSUSE Leap 15.4:busybox-testsuite-1.35.0-150400.3.3.1.ppc64le", }, product_reference: "busybox-testsuite-1.35.0-150400.3.3.1.ppc64le", relates_to_product_reference: "openSUSE Leap 15.4", }, { category: "default_component_of", full_product_name: { name: "busybox-testsuite-1.35.0-150400.3.3.1.s390x as component of openSUSE Leap 15.4", product_id: "openSUSE Leap 15.4:busybox-testsuite-1.35.0-150400.3.3.1.s390x", }, product_reference: "busybox-testsuite-1.35.0-150400.3.3.1.s390x", relates_to_product_reference: "openSUSE Leap 15.4", }, { category: "default_component_of", full_product_name: { name: "busybox-testsuite-1.35.0-150400.3.3.1.x86_64 as component of openSUSE Leap 15.4", product_id: "openSUSE Leap 15.4:busybox-testsuite-1.35.0-150400.3.3.1.x86_64", }, product_reference: "busybox-testsuite-1.35.0-150400.3.3.1.x86_64", relates_to_product_reference: "openSUSE Leap 15.4", }, { category: "default_component_of", full_product_name: { name: "busybox-warewulf3-1.35.0-150400.3.3.1.aarch64 as component of openSUSE Leap 15.4", product_id: "openSUSE Leap 15.4:busybox-warewulf3-1.35.0-150400.3.3.1.aarch64", }, product_reference: "busybox-warewulf3-1.35.0-150400.3.3.1.aarch64", relates_to_product_reference: "openSUSE Leap 15.4", }, { category: "default_component_of", full_product_name: { name: "busybox-warewulf3-1.35.0-150400.3.3.1.x86_64 as component of openSUSE Leap 15.4", product_id: "openSUSE Leap 15.4:busybox-warewulf3-1.35.0-150400.3.3.1.x86_64", }, product_reference: "busybox-warewulf3-1.35.0-150400.3.3.1.x86_64", relates_to_product_reference: "openSUSE Leap 15.4", }, ], }, vulnerabilities: [ { cve: "CVE-2011-5325", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2011-5325", }, ], notes: [ { category: "general", text: "Directory traversal vulnerability in the BusyBox implementation of tar before 1.22.0 v5 allows remote attackers to point to files outside the current working directory via a symlink.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-1.35.0-150400.3.3.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-1.35.0-150400.3.3.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-1.35.0-150400.3.3.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-1.35.0-150400.3.3.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-static-1.35.0-150400.3.3.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-static-1.35.0-150400.3.3.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-static-1.35.0-150400.3.3.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-static-1.35.0-150400.3.3.1.x86_64", "openSUSE Leap 15.4:busybox-1.35.0-150400.3.3.1.aarch64", "openSUSE Leap 15.4:busybox-1.35.0-150400.3.3.1.ppc64le", "openSUSE Leap 15.4:busybox-1.35.0-150400.3.3.1.s390x", "openSUSE Leap 15.4:busybox-1.35.0-150400.3.3.1.x86_64", "openSUSE Leap 15.4:busybox-static-1.35.0-150400.3.3.1.aarch64", "openSUSE Leap 15.4:busybox-static-1.35.0-150400.3.3.1.ppc64le", "openSUSE Leap 15.4:busybox-static-1.35.0-150400.3.3.1.s390x", "openSUSE Leap 15.4:busybox-static-1.35.0-150400.3.3.1.x86_64", "openSUSE Leap 15.4:busybox-testsuite-1.35.0-150400.3.3.1.aarch64", "openSUSE Leap 15.4:busybox-testsuite-1.35.0-150400.3.3.1.ppc64le", "openSUSE Leap 15.4:busybox-testsuite-1.35.0-150400.3.3.1.s390x", "openSUSE Leap 15.4:busybox-testsuite-1.35.0-150400.3.3.1.x86_64", "openSUSE Leap 15.4:busybox-warewulf3-1.35.0-150400.3.3.1.aarch64", "openSUSE Leap 15.4:busybox-warewulf3-1.35.0-150400.3.3.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2011-5325", url: "https://www.suse.com/security/cve/CVE-2011-5325", }, { category: "external", summary: "SUSE Bug 951562 for CVE-2011-5325", url: "https://bugzilla.suse.com/951562", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-1.35.0-150400.3.3.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-1.35.0-150400.3.3.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-1.35.0-150400.3.3.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-1.35.0-150400.3.3.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-static-1.35.0-150400.3.3.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-static-1.35.0-150400.3.3.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-static-1.35.0-150400.3.3.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-static-1.35.0-150400.3.3.1.x86_64", "openSUSE Leap 15.4:busybox-1.35.0-150400.3.3.1.aarch64", "openSUSE Leap 15.4:busybox-1.35.0-150400.3.3.1.ppc64le", "openSUSE Leap 15.4:busybox-1.35.0-150400.3.3.1.s390x", "openSUSE Leap 15.4:busybox-1.35.0-150400.3.3.1.x86_64", "openSUSE Leap 15.4:busybox-static-1.35.0-150400.3.3.1.aarch64", "openSUSE Leap 15.4:busybox-static-1.35.0-150400.3.3.1.ppc64le", "openSUSE Leap 15.4:busybox-static-1.35.0-150400.3.3.1.s390x", "openSUSE Leap 15.4:busybox-static-1.35.0-150400.3.3.1.x86_64", "openSUSE Leap 15.4:busybox-testsuite-1.35.0-150400.3.3.1.aarch64", "openSUSE Leap 15.4:busybox-testsuite-1.35.0-150400.3.3.1.ppc64le", "openSUSE Leap 15.4:busybox-testsuite-1.35.0-150400.3.3.1.s390x", "openSUSE Leap 15.4:busybox-testsuite-1.35.0-150400.3.3.1.x86_64", "openSUSE Leap 15.4:busybox-warewulf3-1.35.0-150400.3.3.1.aarch64", "openSUSE Leap 15.4:busybox-warewulf3-1.35.0-150400.3.3.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 7.5, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N", version: "3.1", }, products: [ "SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-1.35.0-150400.3.3.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-1.35.0-150400.3.3.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-1.35.0-150400.3.3.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-1.35.0-150400.3.3.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-static-1.35.0-150400.3.3.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-static-1.35.0-150400.3.3.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-static-1.35.0-150400.3.3.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-static-1.35.0-150400.3.3.1.x86_64", "openSUSE Leap 15.4:busybox-1.35.0-150400.3.3.1.aarch64", "openSUSE Leap 15.4:busybox-1.35.0-150400.3.3.1.ppc64le", "openSUSE Leap 15.4:busybox-1.35.0-150400.3.3.1.s390x", "openSUSE Leap 15.4:busybox-1.35.0-150400.3.3.1.x86_64", "openSUSE Leap 15.4:busybox-static-1.35.0-150400.3.3.1.aarch64", "openSUSE Leap 15.4:busybox-static-1.35.0-150400.3.3.1.ppc64le", "openSUSE Leap 15.4:busybox-static-1.35.0-150400.3.3.1.s390x", "openSUSE Leap 15.4:busybox-static-1.35.0-150400.3.3.1.x86_64", "openSUSE Leap 15.4:busybox-testsuite-1.35.0-150400.3.3.1.aarch64", "openSUSE Leap 15.4:busybox-testsuite-1.35.0-150400.3.3.1.ppc64le", "openSUSE Leap 15.4:busybox-testsuite-1.35.0-150400.3.3.1.s390x", "openSUSE Leap 15.4:busybox-testsuite-1.35.0-150400.3.3.1.x86_64", "openSUSE Leap 15.4:busybox-warewulf3-1.35.0-150400.3.3.1.aarch64", "openSUSE Leap 15.4:busybox-warewulf3-1.35.0-150400.3.3.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2022-11-11T14:38:22Z", details: "moderate", }, ], title: "CVE-2011-5325", }, { cve: "CVE-2015-9261", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2015-9261", }, ], notes: [ { category: "general", text: "huft_build in archival/libarchive/decompress_gunzip.c in BusyBox before 1.27.2 misuses a pointer, causing segfaults and an application crash during an unzip operation on a specially crafted ZIP file.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-1.35.0-150400.3.3.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-1.35.0-150400.3.3.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-1.35.0-150400.3.3.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-1.35.0-150400.3.3.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-static-1.35.0-150400.3.3.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-static-1.35.0-150400.3.3.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-static-1.35.0-150400.3.3.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-static-1.35.0-150400.3.3.1.x86_64", "openSUSE Leap 15.4:busybox-1.35.0-150400.3.3.1.aarch64", "openSUSE Leap 15.4:busybox-1.35.0-150400.3.3.1.ppc64le", "openSUSE Leap 15.4:busybox-1.35.0-150400.3.3.1.s390x", "openSUSE Leap 15.4:busybox-1.35.0-150400.3.3.1.x86_64", "openSUSE Leap 15.4:busybox-static-1.35.0-150400.3.3.1.aarch64", "openSUSE Leap 15.4:busybox-static-1.35.0-150400.3.3.1.ppc64le", "openSUSE Leap 15.4:busybox-static-1.35.0-150400.3.3.1.s390x", "openSUSE Leap 15.4:busybox-static-1.35.0-150400.3.3.1.x86_64", "openSUSE Leap 15.4:busybox-testsuite-1.35.0-150400.3.3.1.aarch64", "openSUSE Leap 15.4:busybox-testsuite-1.35.0-150400.3.3.1.ppc64le", "openSUSE Leap 15.4:busybox-testsuite-1.35.0-150400.3.3.1.s390x", "openSUSE Leap 15.4:busybox-testsuite-1.35.0-150400.3.3.1.x86_64", "openSUSE Leap 15.4:busybox-warewulf3-1.35.0-150400.3.3.1.aarch64", "openSUSE Leap 15.4:busybox-warewulf3-1.35.0-150400.3.3.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2015-9261", url: "https://www.suse.com/security/cve/CVE-2015-9261", }, { category: "external", summary: "SUSE Bug 1102912 for CVE-2015-9261", url: "https://bugzilla.suse.com/1102912", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-1.35.0-150400.3.3.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-1.35.0-150400.3.3.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-1.35.0-150400.3.3.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-1.35.0-150400.3.3.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-static-1.35.0-150400.3.3.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-static-1.35.0-150400.3.3.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-static-1.35.0-150400.3.3.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-static-1.35.0-150400.3.3.1.x86_64", "openSUSE Leap 15.4:busybox-1.35.0-150400.3.3.1.aarch64", "openSUSE Leap 15.4:busybox-1.35.0-150400.3.3.1.ppc64le", "openSUSE Leap 15.4:busybox-1.35.0-150400.3.3.1.s390x", "openSUSE Leap 15.4:busybox-1.35.0-150400.3.3.1.x86_64", "openSUSE Leap 15.4:busybox-static-1.35.0-150400.3.3.1.aarch64", "openSUSE Leap 15.4:busybox-static-1.35.0-150400.3.3.1.ppc64le", "openSUSE Leap 15.4:busybox-static-1.35.0-150400.3.3.1.s390x", "openSUSE Leap 15.4:busybox-static-1.35.0-150400.3.3.1.x86_64", "openSUSE Leap 15.4:busybox-testsuite-1.35.0-150400.3.3.1.aarch64", "openSUSE Leap 15.4:busybox-testsuite-1.35.0-150400.3.3.1.ppc64le", "openSUSE Leap 15.4:busybox-testsuite-1.35.0-150400.3.3.1.s390x", "openSUSE Leap 15.4:busybox-testsuite-1.35.0-150400.3.3.1.x86_64", "openSUSE Leap 15.4:busybox-warewulf3-1.35.0-150400.3.3.1.aarch64", "openSUSE Leap 15.4:busybox-warewulf3-1.35.0-150400.3.3.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.5, baseSeverity: "MEDIUM", vectorString: "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", version: "3.0", }, products: [ "SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-1.35.0-150400.3.3.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-1.35.0-150400.3.3.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-1.35.0-150400.3.3.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-1.35.0-150400.3.3.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-static-1.35.0-150400.3.3.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-static-1.35.0-150400.3.3.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-static-1.35.0-150400.3.3.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-static-1.35.0-150400.3.3.1.x86_64", "openSUSE Leap 15.4:busybox-1.35.0-150400.3.3.1.aarch64", "openSUSE Leap 15.4:busybox-1.35.0-150400.3.3.1.ppc64le", "openSUSE Leap 15.4:busybox-1.35.0-150400.3.3.1.s390x", "openSUSE Leap 15.4:busybox-1.35.0-150400.3.3.1.x86_64", "openSUSE Leap 15.4:busybox-static-1.35.0-150400.3.3.1.aarch64", "openSUSE Leap 15.4:busybox-static-1.35.0-150400.3.3.1.ppc64le", "openSUSE Leap 15.4:busybox-static-1.35.0-150400.3.3.1.s390x", "openSUSE Leap 15.4:busybox-static-1.35.0-150400.3.3.1.x86_64", "openSUSE Leap 15.4:busybox-testsuite-1.35.0-150400.3.3.1.aarch64", "openSUSE Leap 15.4:busybox-testsuite-1.35.0-150400.3.3.1.ppc64le", "openSUSE Leap 15.4:busybox-testsuite-1.35.0-150400.3.3.1.s390x", "openSUSE Leap 15.4:busybox-testsuite-1.35.0-150400.3.3.1.x86_64", "openSUSE Leap 15.4:busybox-warewulf3-1.35.0-150400.3.3.1.aarch64", "openSUSE Leap 15.4:busybox-warewulf3-1.35.0-150400.3.3.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2022-11-11T14:38:22Z", details: "moderate", }, ], title: "CVE-2015-9261", }, { cve: "CVE-2016-2147", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2016-2147", }, ], notes: [ { category: "general", text: "Integer overflow in the DHCP client (udhcpc) in BusyBox before 1.25.0 allows remote attackers to cause a denial of service (crash) via a malformed RFC1035-encoded domain name, which triggers an out-of-bounds heap write.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-1.35.0-150400.3.3.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-1.35.0-150400.3.3.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-1.35.0-150400.3.3.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-1.35.0-150400.3.3.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-static-1.35.0-150400.3.3.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-static-1.35.0-150400.3.3.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-static-1.35.0-150400.3.3.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-static-1.35.0-150400.3.3.1.x86_64", "openSUSE Leap 15.4:busybox-1.35.0-150400.3.3.1.aarch64", "openSUSE Leap 15.4:busybox-1.35.0-150400.3.3.1.ppc64le", "openSUSE Leap 15.4:busybox-1.35.0-150400.3.3.1.s390x", "openSUSE Leap 15.4:busybox-1.35.0-150400.3.3.1.x86_64", "openSUSE Leap 15.4:busybox-static-1.35.0-150400.3.3.1.aarch64", "openSUSE Leap 15.4:busybox-static-1.35.0-150400.3.3.1.ppc64le", "openSUSE Leap 15.4:busybox-static-1.35.0-150400.3.3.1.s390x", "openSUSE Leap 15.4:busybox-static-1.35.0-150400.3.3.1.x86_64", "openSUSE Leap 15.4:busybox-testsuite-1.35.0-150400.3.3.1.aarch64", "openSUSE Leap 15.4:busybox-testsuite-1.35.0-150400.3.3.1.ppc64le", "openSUSE Leap 15.4:busybox-testsuite-1.35.0-150400.3.3.1.s390x", "openSUSE Leap 15.4:busybox-testsuite-1.35.0-150400.3.3.1.x86_64", "openSUSE Leap 15.4:busybox-warewulf3-1.35.0-150400.3.3.1.aarch64", "openSUSE Leap 15.4:busybox-warewulf3-1.35.0-150400.3.3.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2016-2147", url: "https://www.suse.com/security/cve/CVE-2016-2147", }, { category: "external", summary: "SUSE Bug 970663 for CVE-2016-2147", url: "https://bugzilla.suse.com/970663", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-1.35.0-150400.3.3.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-1.35.0-150400.3.3.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-1.35.0-150400.3.3.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-1.35.0-150400.3.3.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-static-1.35.0-150400.3.3.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-static-1.35.0-150400.3.3.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-static-1.35.0-150400.3.3.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-static-1.35.0-150400.3.3.1.x86_64", "openSUSE Leap 15.4:busybox-1.35.0-150400.3.3.1.aarch64", "openSUSE Leap 15.4:busybox-1.35.0-150400.3.3.1.ppc64le", "openSUSE Leap 15.4:busybox-1.35.0-150400.3.3.1.s390x", "openSUSE Leap 15.4:busybox-1.35.0-150400.3.3.1.x86_64", "openSUSE Leap 15.4:busybox-static-1.35.0-150400.3.3.1.aarch64", "openSUSE Leap 15.4:busybox-static-1.35.0-150400.3.3.1.ppc64le", "openSUSE Leap 15.4:busybox-static-1.35.0-150400.3.3.1.s390x", "openSUSE Leap 15.4:busybox-static-1.35.0-150400.3.3.1.x86_64", "openSUSE Leap 15.4:busybox-testsuite-1.35.0-150400.3.3.1.aarch64", "openSUSE Leap 15.4:busybox-testsuite-1.35.0-150400.3.3.1.ppc64le", "openSUSE Leap 15.4:busybox-testsuite-1.35.0-150400.3.3.1.s390x", "openSUSE Leap 15.4:busybox-testsuite-1.35.0-150400.3.3.1.x86_64", "openSUSE Leap 15.4:busybox-warewulf3-1.35.0-150400.3.3.1.aarch64", "openSUSE Leap 15.4:busybox-warewulf3-1.35.0-150400.3.3.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 7.5, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-1.35.0-150400.3.3.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-1.35.0-150400.3.3.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-1.35.0-150400.3.3.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-1.35.0-150400.3.3.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-static-1.35.0-150400.3.3.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-static-1.35.0-150400.3.3.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-static-1.35.0-150400.3.3.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-static-1.35.0-150400.3.3.1.x86_64", "openSUSE Leap 15.4:busybox-1.35.0-150400.3.3.1.aarch64", "openSUSE Leap 15.4:busybox-1.35.0-150400.3.3.1.ppc64le", "openSUSE Leap 15.4:busybox-1.35.0-150400.3.3.1.s390x", "openSUSE Leap 15.4:busybox-1.35.0-150400.3.3.1.x86_64", "openSUSE Leap 15.4:busybox-static-1.35.0-150400.3.3.1.aarch64", "openSUSE Leap 15.4:busybox-static-1.35.0-150400.3.3.1.ppc64le", "openSUSE Leap 15.4:busybox-static-1.35.0-150400.3.3.1.s390x", "openSUSE Leap 15.4:busybox-static-1.35.0-150400.3.3.1.x86_64", "openSUSE Leap 15.4:busybox-testsuite-1.35.0-150400.3.3.1.aarch64", "openSUSE Leap 15.4:busybox-testsuite-1.35.0-150400.3.3.1.ppc64le", "openSUSE Leap 15.4:busybox-testsuite-1.35.0-150400.3.3.1.s390x", "openSUSE Leap 15.4:busybox-testsuite-1.35.0-150400.3.3.1.x86_64", "openSUSE Leap 15.4:busybox-warewulf3-1.35.0-150400.3.3.1.aarch64", "openSUSE Leap 15.4:busybox-warewulf3-1.35.0-150400.3.3.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2022-11-11T14:38:22Z", details: "important", }, ], title: "CVE-2016-2147", }, { cve: "CVE-2016-2148", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2016-2148", }, ], notes: [ { category: "general", text: "Heap-based buffer overflow in the DHCP client (udhcpc) in BusyBox before 1.25.0 allows remote attackers to have unspecified impact via vectors involving OPTION_6RD parsing.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-1.35.0-150400.3.3.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-1.35.0-150400.3.3.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-1.35.0-150400.3.3.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-1.35.0-150400.3.3.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-static-1.35.0-150400.3.3.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-static-1.35.0-150400.3.3.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-static-1.35.0-150400.3.3.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-static-1.35.0-150400.3.3.1.x86_64", "openSUSE Leap 15.4:busybox-1.35.0-150400.3.3.1.aarch64", "openSUSE Leap 15.4:busybox-1.35.0-150400.3.3.1.ppc64le", "openSUSE Leap 15.4:busybox-1.35.0-150400.3.3.1.s390x", "openSUSE Leap 15.4:busybox-1.35.0-150400.3.3.1.x86_64", "openSUSE Leap 15.4:busybox-static-1.35.0-150400.3.3.1.aarch64", "openSUSE Leap 15.4:busybox-static-1.35.0-150400.3.3.1.ppc64le", "openSUSE Leap 15.4:busybox-static-1.35.0-150400.3.3.1.s390x", "openSUSE Leap 15.4:busybox-static-1.35.0-150400.3.3.1.x86_64", "openSUSE Leap 15.4:busybox-testsuite-1.35.0-150400.3.3.1.aarch64", "openSUSE Leap 15.4:busybox-testsuite-1.35.0-150400.3.3.1.ppc64le", "openSUSE Leap 15.4:busybox-testsuite-1.35.0-150400.3.3.1.s390x", "openSUSE Leap 15.4:busybox-testsuite-1.35.0-150400.3.3.1.x86_64", "openSUSE Leap 15.4:busybox-warewulf3-1.35.0-150400.3.3.1.aarch64", "openSUSE Leap 15.4:busybox-warewulf3-1.35.0-150400.3.3.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2016-2148", url: "https://www.suse.com/security/cve/CVE-2016-2148", }, { category: "external", summary: "SUSE Bug 970662 for CVE-2016-2148", url: "https://bugzilla.suse.com/970662", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-1.35.0-150400.3.3.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-1.35.0-150400.3.3.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-1.35.0-150400.3.3.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-1.35.0-150400.3.3.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-static-1.35.0-150400.3.3.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-static-1.35.0-150400.3.3.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-static-1.35.0-150400.3.3.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-static-1.35.0-150400.3.3.1.x86_64", "openSUSE Leap 15.4:busybox-1.35.0-150400.3.3.1.aarch64", "openSUSE Leap 15.4:busybox-1.35.0-150400.3.3.1.ppc64le", "openSUSE Leap 15.4:busybox-1.35.0-150400.3.3.1.s390x", "openSUSE Leap 15.4:busybox-1.35.0-150400.3.3.1.x86_64", "openSUSE Leap 15.4:busybox-static-1.35.0-150400.3.3.1.aarch64", "openSUSE Leap 15.4:busybox-static-1.35.0-150400.3.3.1.ppc64le", "openSUSE Leap 15.4:busybox-static-1.35.0-150400.3.3.1.s390x", "openSUSE Leap 15.4:busybox-static-1.35.0-150400.3.3.1.x86_64", "openSUSE Leap 15.4:busybox-testsuite-1.35.0-150400.3.3.1.aarch64", "openSUSE Leap 15.4:busybox-testsuite-1.35.0-150400.3.3.1.ppc64le", "openSUSE Leap 15.4:busybox-testsuite-1.35.0-150400.3.3.1.s390x", "openSUSE Leap 15.4:busybox-testsuite-1.35.0-150400.3.3.1.x86_64", "openSUSE Leap 15.4:busybox-warewulf3-1.35.0-150400.3.3.1.aarch64", "openSUSE Leap 15.4:busybox-warewulf3-1.35.0-150400.3.3.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 9.8, baseSeverity: "CRITICAL", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-1.35.0-150400.3.3.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-1.35.0-150400.3.3.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-1.35.0-150400.3.3.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-1.35.0-150400.3.3.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-static-1.35.0-150400.3.3.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-static-1.35.0-150400.3.3.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-static-1.35.0-150400.3.3.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-static-1.35.0-150400.3.3.1.x86_64", "openSUSE Leap 15.4:busybox-1.35.0-150400.3.3.1.aarch64", "openSUSE Leap 15.4:busybox-1.35.0-150400.3.3.1.ppc64le", "openSUSE Leap 15.4:busybox-1.35.0-150400.3.3.1.s390x", "openSUSE Leap 15.4:busybox-1.35.0-150400.3.3.1.x86_64", "openSUSE Leap 15.4:busybox-static-1.35.0-150400.3.3.1.aarch64", "openSUSE Leap 15.4:busybox-static-1.35.0-150400.3.3.1.ppc64le", "openSUSE Leap 15.4:busybox-static-1.35.0-150400.3.3.1.s390x", "openSUSE Leap 15.4:busybox-static-1.35.0-150400.3.3.1.x86_64", "openSUSE Leap 15.4:busybox-testsuite-1.35.0-150400.3.3.1.aarch64", "openSUSE Leap 15.4:busybox-testsuite-1.35.0-150400.3.3.1.ppc64le", "openSUSE Leap 15.4:busybox-testsuite-1.35.0-150400.3.3.1.s390x", "openSUSE Leap 15.4:busybox-testsuite-1.35.0-150400.3.3.1.x86_64", "openSUSE Leap 15.4:busybox-warewulf3-1.35.0-150400.3.3.1.aarch64", "openSUSE Leap 15.4:busybox-warewulf3-1.35.0-150400.3.3.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2022-11-11T14:38:22Z", details: "moderate", }, ], title: "CVE-2016-2148", }, { cve: "CVE-2016-6301", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2016-6301", }, ], notes: [ { category: "general", text: "The recv_and_process_client_pkt function in networking/ntpd.c in busybox allows remote attackers to cause a denial of service (CPU and bandwidth consumption) via a forged NTP packet, which triggers a communication loop.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-1.35.0-150400.3.3.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-1.35.0-150400.3.3.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-1.35.0-150400.3.3.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-1.35.0-150400.3.3.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-static-1.35.0-150400.3.3.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-static-1.35.0-150400.3.3.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-static-1.35.0-150400.3.3.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-static-1.35.0-150400.3.3.1.x86_64", "openSUSE Leap 15.4:busybox-1.35.0-150400.3.3.1.aarch64", "openSUSE Leap 15.4:busybox-1.35.0-150400.3.3.1.ppc64le", "openSUSE Leap 15.4:busybox-1.35.0-150400.3.3.1.s390x", "openSUSE Leap 15.4:busybox-1.35.0-150400.3.3.1.x86_64", "openSUSE Leap 15.4:busybox-static-1.35.0-150400.3.3.1.aarch64", "openSUSE Leap 15.4:busybox-static-1.35.0-150400.3.3.1.ppc64le", "openSUSE Leap 15.4:busybox-static-1.35.0-150400.3.3.1.s390x", "openSUSE Leap 15.4:busybox-static-1.35.0-150400.3.3.1.x86_64", "openSUSE Leap 15.4:busybox-testsuite-1.35.0-150400.3.3.1.aarch64", "openSUSE Leap 15.4:busybox-testsuite-1.35.0-150400.3.3.1.ppc64le", "openSUSE Leap 15.4:busybox-testsuite-1.35.0-150400.3.3.1.s390x", "openSUSE Leap 15.4:busybox-testsuite-1.35.0-150400.3.3.1.x86_64", "openSUSE Leap 15.4:busybox-warewulf3-1.35.0-150400.3.3.1.aarch64", "openSUSE Leap 15.4:busybox-warewulf3-1.35.0-150400.3.3.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2016-6301", url: "https://www.suse.com/security/cve/CVE-2016-6301", }, { category: "external", summary: "SUSE Bug 991940 for CVE-2016-6301", url: "https://bugzilla.suse.com/991940", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-1.35.0-150400.3.3.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-1.35.0-150400.3.3.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-1.35.0-150400.3.3.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-1.35.0-150400.3.3.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-static-1.35.0-150400.3.3.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-static-1.35.0-150400.3.3.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-static-1.35.0-150400.3.3.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-static-1.35.0-150400.3.3.1.x86_64", "openSUSE Leap 15.4:busybox-1.35.0-150400.3.3.1.aarch64", "openSUSE Leap 15.4:busybox-1.35.0-150400.3.3.1.ppc64le", "openSUSE Leap 15.4:busybox-1.35.0-150400.3.3.1.s390x", "openSUSE Leap 15.4:busybox-1.35.0-150400.3.3.1.x86_64", "openSUSE Leap 15.4:busybox-static-1.35.0-150400.3.3.1.aarch64", "openSUSE Leap 15.4:busybox-static-1.35.0-150400.3.3.1.ppc64le", "openSUSE Leap 15.4:busybox-static-1.35.0-150400.3.3.1.s390x", "openSUSE Leap 15.4:busybox-static-1.35.0-150400.3.3.1.x86_64", "openSUSE Leap 15.4:busybox-testsuite-1.35.0-150400.3.3.1.aarch64", "openSUSE Leap 15.4:busybox-testsuite-1.35.0-150400.3.3.1.ppc64le", "openSUSE Leap 15.4:busybox-testsuite-1.35.0-150400.3.3.1.s390x", "openSUSE Leap 15.4:busybox-testsuite-1.35.0-150400.3.3.1.x86_64", "openSUSE Leap 15.4:busybox-warewulf3-1.35.0-150400.3.3.1.aarch64", "openSUSE Leap 15.4:busybox-warewulf3-1.35.0-150400.3.3.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 7.5, baseSeverity: "HIGH", vectorString: "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", version: "3.0", }, products: [ "SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-1.35.0-150400.3.3.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-1.35.0-150400.3.3.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-1.35.0-150400.3.3.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-1.35.0-150400.3.3.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-static-1.35.0-150400.3.3.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-static-1.35.0-150400.3.3.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-static-1.35.0-150400.3.3.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-static-1.35.0-150400.3.3.1.x86_64", "openSUSE Leap 15.4:busybox-1.35.0-150400.3.3.1.aarch64", "openSUSE Leap 15.4:busybox-1.35.0-150400.3.3.1.ppc64le", "openSUSE Leap 15.4:busybox-1.35.0-150400.3.3.1.s390x", "openSUSE Leap 15.4:busybox-1.35.0-150400.3.3.1.x86_64", "openSUSE Leap 15.4:busybox-static-1.35.0-150400.3.3.1.aarch64", "openSUSE Leap 15.4:busybox-static-1.35.0-150400.3.3.1.ppc64le", "openSUSE Leap 15.4:busybox-static-1.35.0-150400.3.3.1.s390x", "openSUSE Leap 15.4:busybox-static-1.35.0-150400.3.3.1.x86_64", "openSUSE Leap 15.4:busybox-testsuite-1.35.0-150400.3.3.1.aarch64", "openSUSE Leap 15.4:busybox-testsuite-1.35.0-150400.3.3.1.ppc64le", "openSUSE Leap 15.4:busybox-testsuite-1.35.0-150400.3.3.1.s390x", "openSUSE Leap 15.4:busybox-testsuite-1.35.0-150400.3.3.1.x86_64", "openSUSE Leap 15.4:busybox-warewulf3-1.35.0-150400.3.3.1.aarch64", "openSUSE Leap 15.4:busybox-warewulf3-1.35.0-150400.3.3.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2022-11-11T14:38:22Z", details: "moderate", }, ], title: "CVE-2016-6301", }, { cve: "CVE-2017-15873", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2017-15873", }, ], notes: [ { category: "general", text: "The get_next_block function in archival/libarchive/decompress_bunzip2.c in BusyBox 1.27.2 has an Integer Overflow that may lead to a write access violation.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-1.35.0-150400.3.3.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-1.35.0-150400.3.3.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-1.35.0-150400.3.3.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-1.35.0-150400.3.3.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-static-1.35.0-150400.3.3.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-static-1.35.0-150400.3.3.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-static-1.35.0-150400.3.3.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-static-1.35.0-150400.3.3.1.x86_64", "openSUSE Leap 15.4:busybox-1.35.0-150400.3.3.1.aarch64", "openSUSE Leap 15.4:busybox-1.35.0-150400.3.3.1.ppc64le", "openSUSE Leap 15.4:busybox-1.35.0-150400.3.3.1.s390x", "openSUSE Leap 15.4:busybox-1.35.0-150400.3.3.1.x86_64", "openSUSE Leap 15.4:busybox-static-1.35.0-150400.3.3.1.aarch64", "openSUSE Leap 15.4:busybox-static-1.35.0-150400.3.3.1.ppc64le", "openSUSE Leap 15.4:busybox-static-1.35.0-150400.3.3.1.s390x", "openSUSE Leap 15.4:busybox-static-1.35.0-150400.3.3.1.x86_64", "openSUSE Leap 15.4:busybox-testsuite-1.35.0-150400.3.3.1.aarch64", "openSUSE Leap 15.4:busybox-testsuite-1.35.0-150400.3.3.1.ppc64le", "openSUSE Leap 15.4:busybox-testsuite-1.35.0-150400.3.3.1.s390x", "openSUSE Leap 15.4:busybox-testsuite-1.35.0-150400.3.3.1.x86_64", "openSUSE Leap 15.4:busybox-warewulf3-1.35.0-150400.3.3.1.aarch64", "openSUSE Leap 15.4:busybox-warewulf3-1.35.0-150400.3.3.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2017-15873", url: "https://www.suse.com/security/cve/CVE-2017-15873", }, { category: "external", summary: "SUSE Bug 1064976 for CVE-2017-15873", url: "https://bugzilla.suse.com/1064976", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-1.35.0-150400.3.3.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-1.35.0-150400.3.3.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-1.35.0-150400.3.3.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-1.35.0-150400.3.3.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-static-1.35.0-150400.3.3.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-static-1.35.0-150400.3.3.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-static-1.35.0-150400.3.3.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-static-1.35.0-150400.3.3.1.x86_64", "openSUSE Leap 15.4:busybox-1.35.0-150400.3.3.1.aarch64", "openSUSE Leap 15.4:busybox-1.35.0-150400.3.3.1.ppc64le", "openSUSE Leap 15.4:busybox-1.35.0-150400.3.3.1.s390x", "openSUSE Leap 15.4:busybox-1.35.0-150400.3.3.1.x86_64", "openSUSE Leap 15.4:busybox-static-1.35.0-150400.3.3.1.aarch64", "openSUSE Leap 15.4:busybox-static-1.35.0-150400.3.3.1.ppc64le", "openSUSE Leap 15.4:busybox-static-1.35.0-150400.3.3.1.s390x", "openSUSE Leap 15.4:busybox-static-1.35.0-150400.3.3.1.x86_64", "openSUSE Leap 15.4:busybox-testsuite-1.35.0-150400.3.3.1.aarch64", "openSUSE Leap 15.4:busybox-testsuite-1.35.0-150400.3.3.1.ppc64le", "openSUSE Leap 15.4:busybox-testsuite-1.35.0-150400.3.3.1.s390x", "openSUSE Leap 15.4:busybox-testsuite-1.35.0-150400.3.3.1.x86_64", "openSUSE Leap 15.4:busybox-warewulf3-1.35.0-150400.3.3.1.aarch64", "openSUSE Leap 15.4:busybox-warewulf3-1.35.0-150400.3.3.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 7.8, baseSeverity: "HIGH", vectorString: "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", version: "3.0", }, products: [ "SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-1.35.0-150400.3.3.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-1.35.0-150400.3.3.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-1.35.0-150400.3.3.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-1.35.0-150400.3.3.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-static-1.35.0-150400.3.3.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-static-1.35.0-150400.3.3.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-static-1.35.0-150400.3.3.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-static-1.35.0-150400.3.3.1.x86_64", "openSUSE Leap 15.4:busybox-1.35.0-150400.3.3.1.aarch64", "openSUSE Leap 15.4:busybox-1.35.0-150400.3.3.1.ppc64le", "openSUSE Leap 15.4:busybox-1.35.0-150400.3.3.1.s390x", "openSUSE Leap 15.4:busybox-1.35.0-150400.3.3.1.x86_64", "openSUSE Leap 15.4:busybox-static-1.35.0-150400.3.3.1.aarch64", "openSUSE Leap 15.4:busybox-static-1.35.0-150400.3.3.1.ppc64le", "openSUSE Leap 15.4:busybox-static-1.35.0-150400.3.3.1.s390x", "openSUSE Leap 15.4:busybox-static-1.35.0-150400.3.3.1.x86_64", "openSUSE Leap 15.4:busybox-testsuite-1.35.0-150400.3.3.1.aarch64", "openSUSE Leap 15.4:busybox-testsuite-1.35.0-150400.3.3.1.ppc64le", "openSUSE Leap 15.4:busybox-testsuite-1.35.0-150400.3.3.1.s390x", "openSUSE Leap 15.4:busybox-testsuite-1.35.0-150400.3.3.1.x86_64", "openSUSE Leap 15.4:busybox-warewulf3-1.35.0-150400.3.3.1.aarch64", "openSUSE Leap 15.4:busybox-warewulf3-1.35.0-150400.3.3.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2022-11-11T14:38:22Z", details: "moderate", }, ], title: "CVE-2017-15873", }, { cve: "CVE-2017-15874", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2017-15874", }, ], notes: [ { category: "general", text: "archival/libarchive/decompress_unlzma.c in BusyBox 1.27.2 has an Integer Underflow that leads to a read access violation.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-1.35.0-150400.3.3.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-1.35.0-150400.3.3.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-1.35.0-150400.3.3.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-1.35.0-150400.3.3.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-static-1.35.0-150400.3.3.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-static-1.35.0-150400.3.3.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-static-1.35.0-150400.3.3.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-static-1.35.0-150400.3.3.1.x86_64", "openSUSE Leap 15.4:busybox-1.35.0-150400.3.3.1.aarch64", "openSUSE Leap 15.4:busybox-1.35.0-150400.3.3.1.ppc64le", "openSUSE Leap 15.4:busybox-1.35.0-150400.3.3.1.s390x", "openSUSE Leap 15.4:busybox-1.35.0-150400.3.3.1.x86_64", "openSUSE Leap 15.4:busybox-static-1.35.0-150400.3.3.1.aarch64", "openSUSE Leap 15.4:busybox-static-1.35.0-150400.3.3.1.ppc64le", "openSUSE Leap 15.4:busybox-static-1.35.0-150400.3.3.1.s390x", "openSUSE Leap 15.4:busybox-static-1.35.0-150400.3.3.1.x86_64", "openSUSE Leap 15.4:busybox-testsuite-1.35.0-150400.3.3.1.aarch64", "openSUSE Leap 15.4:busybox-testsuite-1.35.0-150400.3.3.1.ppc64le", "openSUSE Leap 15.4:busybox-testsuite-1.35.0-150400.3.3.1.s390x", "openSUSE Leap 15.4:busybox-testsuite-1.35.0-150400.3.3.1.x86_64", "openSUSE Leap 15.4:busybox-warewulf3-1.35.0-150400.3.3.1.aarch64", "openSUSE Leap 15.4:busybox-warewulf3-1.35.0-150400.3.3.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2017-15874", url: "https://www.suse.com/security/cve/CVE-2017-15874", }, { category: "external", summary: "SUSE Bug 1064978 for CVE-2017-15874", url: "https://bugzilla.suse.com/1064978", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-1.35.0-150400.3.3.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-1.35.0-150400.3.3.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-1.35.0-150400.3.3.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-1.35.0-150400.3.3.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-static-1.35.0-150400.3.3.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-static-1.35.0-150400.3.3.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-static-1.35.0-150400.3.3.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-static-1.35.0-150400.3.3.1.x86_64", "openSUSE Leap 15.4:busybox-1.35.0-150400.3.3.1.aarch64", "openSUSE Leap 15.4:busybox-1.35.0-150400.3.3.1.ppc64le", "openSUSE Leap 15.4:busybox-1.35.0-150400.3.3.1.s390x", "openSUSE Leap 15.4:busybox-1.35.0-150400.3.3.1.x86_64", "openSUSE Leap 15.4:busybox-static-1.35.0-150400.3.3.1.aarch64", "openSUSE Leap 15.4:busybox-static-1.35.0-150400.3.3.1.ppc64le", "openSUSE Leap 15.4:busybox-static-1.35.0-150400.3.3.1.s390x", "openSUSE Leap 15.4:busybox-static-1.35.0-150400.3.3.1.x86_64", "openSUSE Leap 15.4:busybox-testsuite-1.35.0-150400.3.3.1.aarch64", "openSUSE Leap 15.4:busybox-testsuite-1.35.0-150400.3.3.1.ppc64le", "openSUSE Leap 15.4:busybox-testsuite-1.35.0-150400.3.3.1.s390x", "openSUSE Leap 15.4:busybox-testsuite-1.35.0-150400.3.3.1.x86_64", "openSUSE Leap 15.4:busybox-warewulf3-1.35.0-150400.3.3.1.aarch64", "openSUSE Leap 15.4:busybox-warewulf3-1.35.0-150400.3.3.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 3.3, baseSeverity: "LOW", vectorString: "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L", version: "3.0", }, products: [ "SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-1.35.0-150400.3.3.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-1.35.0-150400.3.3.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-1.35.0-150400.3.3.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-1.35.0-150400.3.3.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-static-1.35.0-150400.3.3.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-static-1.35.0-150400.3.3.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-static-1.35.0-150400.3.3.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-static-1.35.0-150400.3.3.1.x86_64", "openSUSE Leap 15.4:busybox-1.35.0-150400.3.3.1.aarch64", "openSUSE Leap 15.4:busybox-1.35.0-150400.3.3.1.ppc64le", "openSUSE Leap 15.4:busybox-1.35.0-150400.3.3.1.s390x", "openSUSE Leap 15.4:busybox-1.35.0-150400.3.3.1.x86_64", "openSUSE Leap 15.4:busybox-static-1.35.0-150400.3.3.1.aarch64", "openSUSE Leap 15.4:busybox-static-1.35.0-150400.3.3.1.ppc64le", "openSUSE Leap 15.4:busybox-static-1.35.0-150400.3.3.1.s390x", "openSUSE Leap 15.4:busybox-static-1.35.0-150400.3.3.1.x86_64", "openSUSE Leap 15.4:busybox-testsuite-1.35.0-150400.3.3.1.aarch64", "openSUSE Leap 15.4:busybox-testsuite-1.35.0-150400.3.3.1.ppc64le", "openSUSE Leap 15.4:busybox-testsuite-1.35.0-150400.3.3.1.s390x", "openSUSE Leap 15.4:busybox-testsuite-1.35.0-150400.3.3.1.x86_64", "openSUSE Leap 15.4:busybox-warewulf3-1.35.0-150400.3.3.1.aarch64", "openSUSE Leap 15.4:busybox-warewulf3-1.35.0-150400.3.3.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2022-11-11T14:38:22Z", details: "low", }, ], title: "CVE-2017-15874", }, { cve: "CVE-2017-16544", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2017-16544", }, ], notes: [ { category: "general", text: "In the add_match function in libbb/lineedit.c in BusyBox through 1.27.2, the tab autocomplete feature of the shell, used to get a list of filenames in a directory, does not sanitize filenames and results in executing any escape sequence in the terminal. This could potentially result in code execution, arbitrary file writes, or other attacks.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-1.35.0-150400.3.3.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-1.35.0-150400.3.3.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-1.35.0-150400.3.3.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-1.35.0-150400.3.3.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-static-1.35.0-150400.3.3.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-static-1.35.0-150400.3.3.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-static-1.35.0-150400.3.3.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-static-1.35.0-150400.3.3.1.x86_64", "openSUSE Leap 15.4:busybox-1.35.0-150400.3.3.1.aarch64", "openSUSE Leap 15.4:busybox-1.35.0-150400.3.3.1.ppc64le", "openSUSE Leap 15.4:busybox-1.35.0-150400.3.3.1.s390x", "openSUSE Leap 15.4:busybox-1.35.0-150400.3.3.1.x86_64", "openSUSE Leap 15.4:busybox-static-1.35.0-150400.3.3.1.aarch64", "openSUSE Leap 15.4:busybox-static-1.35.0-150400.3.3.1.ppc64le", "openSUSE Leap 15.4:busybox-static-1.35.0-150400.3.3.1.s390x", "openSUSE Leap 15.4:busybox-static-1.35.0-150400.3.3.1.x86_64", "openSUSE Leap 15.4:busybox-testsuite-1.35.0-150400.3.3.1.aarch64", "openSUSE Leap 15.4:busybox-testsuite-1.35.0-150400.3.3.1.ppc64le", "openSUSE Leap 15.4:busybox-testsuite-1.35.0-150400.3.3.1.s390x", "openSUSE Leap 15.4:busybox-testsuite-1.35.0-150400.3.3.1.x86_64", "openSUSE Leap 15.4:busybox-warewulf3-1.35.0-150400.3.3.1.aarch64", "openSUSE Leap 15.4:busybox-warewulf3-1.35.0-150400.3.3.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2017-16544", url: "https://www.suse.com/security/cve/CVE-2017-16544", }, { category: "external", summary: "SUSE Bug 1069412 for CVE-2017-16544", url: "https://bugzilla.suse.com/1069412", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-1.35.0-150400.3.3.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-1.35.0-150400.3.3.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-1.35.0-150400.3.3.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-1.35.0-150400.3.3.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-static-1.35.0-150400.3.3.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-static-1.35.0-150400.3.3.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-static-1.35.0-150400.3.3.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-static-1.35.0-150400.3.3.1.x86_64", "openSUSE Leap 15.4:busybox-1.35.0-150400.3.3.1.aarch64", "openSUSE Leap 15.4:busybox-1.35.0-150400.3.3.1.ppc64le", "openSUSE Leap 15.4:busybox-1.35.0-150400.3.3.1.s390x", "openSUSE Leap 15.4:busybox-1.35.0-150400.3.3.1.x86_64", "openSUSE Leap 15.4:busybox-static-1.35.0-150400.3.3.1.aarch64", "openSUSE Leap 15.4:busybox-static-1.35.0-150400.3.3.1.ppc64le", "openSUSE Leap 15.4:busybox-static-1.35.0-150400.3.3.1.s390x", "openSUSE Leap 15.4:busybox-static-1.35.0-150400.3.3.1.x86_64", "openSUSE Leap 15.4:busybox-testsuite-1.35.0-150400.3.3.1.aarch64", "openSUSE Leap 15.4:busybox-testsuite-1.35.0-150400.3.3.1.ppc64le", "openSUSE Leap 15.4:busybox-testsuite-1.35.0-150400.3.3.1.s390x", "openSUSE Leap 15.4:busybox-testsuite-1.35.0-150400.3.3.1.x86_64", "openSUSE Leap 15.4:busybox-warewulf3-1.35.0-150400.3.3.1.aarch64", "openSUSE Leap 15.4:busybox-warewulf3-1.35.0-150400.3.3.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 7.8, baseSeverity: "HIGH", vectorString: "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", version: "3.0", }, products: [ "SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-1.35.0-150400.3.3.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-1.35.0-150400.3.3.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-1.35.0-150400.3.3.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-1.35.0-150400.3.3.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-static-1.35.0-150400.3.3.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-static-1.35.0-150400.3.3.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-static-1.35.0-150400.3.3.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-static-1.35.0-150400.3.3.1.x86_64", "openSUSE Leap 15.4:busybox-1.35.0-150400.3.3.1.aarch64", "openSUSE Leap 15.4:busybox-1.35.0-150400.3.3.1.ppc64le", "openSUSE Leap 15.4:busybox-1.35.0-150400.3.3.1.s390x", "openSUSE Leap 15.4:busybox-1.35.0-150400.3.3.1.x86_64", "openSUSE Leap 15.4:busybox-static-1.35.0-150400.3.3.1.aarch64", "openSUSE Leap 15.4:busybox-static-1.35.0-150400.3.3.1.ppc64le", "openSUSE Leap 15.4:busybox-static-1.35.0-150400.3.3.1.s390x", "openSUSE Leap 15.4:busybox-static-1.35.0-150400.3.3.1.x86_64", "openSUSE Leap 15.4:busybox-testsuite-1.35.0-150400.3.3.1.aarch64", "openSUSE Leap 15.4:busybox-testsuite-1.35.0-150400.3.3.1.ppc64le", "openSUSE Leap 15.4:busybox-testsuite-1.35.0-150400.3.3.1.s390x", "openSUSE Leap 15.4:busybox-testsuite-1.35.0-150400.3.3.1.x86_64", "openSUSE Leap 15.4:busybox-warewulf3-1.35.0-150400.3.3.1.aarch64", "openSUSE Leap 15.4:busybox-warewulf3-1.35.0-150400.3.3.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2022-11-11T14:38:22Z", details: "important", }, ], title: "CVE-2017-16544", }, { cve: "CVE-2018-1000500", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2018-1000500", }, ], notes: [ { category: "general", text: "Busybox contains a Missing SSL certificate validation vulnerability in The \"busybox wget\" applet that can result in arbitrary code execution. This attack appear to be exploitable via Simply download any file over HTTPS using \"busybox wget https://compromised-domain.com/important-file\".", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-1.35.0-150400.3.3.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-1.35.0-150400.3.3.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-1.35.0-150400.3.3.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-1.35.0-150400.3.3.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-static-1.35.0-150400.3.3.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-static-1.35.0-150400.3.3.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-static-1.35.0-150400.3.3.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-static-1.35.0-150400.3.3.1.x86_64", "openSUSE Leap 15.4:busybox-1.35.0-150400.3.3.1.aarch64", "openSUSE Leap 15.4:busybox-1.35.0-150400.3.3.1.ppc64le", "openSUSE Leap 15.4:busybox-1.35.0-150400.3.3.1.s390x", "openSUSE Leap 15.4:busybox-1.35.0-150400.3.3.1.x86_64", "openSUSE Leap 15.4:busybox-static-1.35.0-150400.3.3.1.aarch64", "openSUSE Leap 15.4:busybox-static-1.35.0-150400.3.3.1.ppc64le", "openSUSE Leap 15.4:busybox-static-1.35.0-150400.3.3.1.s390x", "openSUSE Leap 15.4:busybox-static-1.35.0-150400.3.3.1.x86_64", "openSUSE Leap 15.4:busybox-testsuite-1.35.0-150400.3.3.1.aarch64", "openSUSE Leap 15.4:busybox-testsuite-1.35.0-150400.3.3.1.ppc64le", "openSUSE Leap 15.4:busybox-testsuite-1.35.0-150400.3.3.1.s390x", "openSUSE Leap 15.4:busybox-testsuite-1.35.0-150400.3.3.1.x86_64", "openSUSE Leap 15.4:busybox-warewulf3-1.35.0-150400.3.3.1.aarch64", "openSUSE Leap 15.4:busybox-warewulf3-1.35.0-150400.3.3.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2018-1000500", url: "https://www.suse.com/security/cve/CVE-2018-1000500", }, { category: "external", summary: "SUSE Bug 1099263 for CVE-2018-1000500", url: "https://bugzilla.suse.com/1099263", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-1.35.0-150400.3.3.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-1.35.0-150400.3.3.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-1.35.0-150400.3.3.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-1.35.0-150400.3.3.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-static-1.35.0-150400.3.3.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-static-1.35.0-150400.3.3.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-static-1.35.0-150400.3.3.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-static-1.35.0-150400.3.3.1.x86_64", "openSUSE Leap 15.4:busybox-1.35.0-150400.3.3.1.aarch64", "openSUSE Leap 15.4:busybox-1.35.0-150400.3.3.1.ppc64le", "openSUSE Leap 15.4:busybox-1.35.0-150400.3.3.1.s390x", "openSUSE Leap 15.4:busybox-1.35.0-150400.3.3.1.x86_64", "openSUSE Leap 15.4:busybox-static-1.35.0-150400.3.3.1.aarch64", "openSUSE Leap 15.4:busybox-static-1.35.0-150400.3.3.1.ppc64le", "openSUSE Leap 15.4:busybox-static-1.35.0-150400.3.3.1.s390x", "openSUSE Leap 15.4:busybox-static-1.35.0-150400.3.3.1.x86_64", "openSUSE Leap 15.4:busybox-testsuite-1.35.0-150400.3.3.1.aarch64", "openSUSE Leap 15.4:busybox-testsuite-1.35.0-150400.3.3.1.ppc64le", "openSUSE Leap 15.4:busybox-testsuite-1.35.0-150400.3.3.1.s390x", "openSUSE Leap 15.4:busybox-testsuite-1.35.0-150400.3.3.1.x86_64", "openSUSE Leap 15.4:busybox-warewulf3-1.35.0-150400.3.3.1.aarch64", "openSUSE Leap 15.4:busybox-warewulf3-1.35.0-150400.3.3.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 7.5, baseSeverity: "HIGH", vectorString: "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N", version: "3.0", }, products: [ "SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-1.35.0-150400.3.3.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-1.35.0-150400.3.3.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-1.35.0-150400.3.3.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-1.35.0-150400.3.3.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-static-1.35.0-150400.3.3.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-static-1.35.0-150400.3.3.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-static-1.35.0-150400.3.3.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-static-1.35.0-150400.3.3.1.x86_64", "openSUSE Leap 15.4:busybox-1.35.0-150400.3.3.1.aarch64", "openSUSE Leap 15.4:busybox-1.35.0-150400.3.3.1.ppc64le", "openSUSE Leap 15.4:busybox-1.35.0-150400.3.3.1.s390x", "openSUSE Leap 15.4:busybox-1.35.0-150400.3.3.1.x86_64", "openSUSE Leap 15.4:busybox-static-1.35.0-150400.3.3.1.aarch64", "openSUSE Leap 15.4:busybox-static-1.35.0-150400.3.3.1.ppc64le", "openSUSE Leap 15.4:busybox-static-1.35.0-150400.3.3.1.s390x", "openSUSE Leap 15.4:busybox-static-1.35.0-150400.3.3.1.x86_64", "openSUSE Leap 15.4:busybox-testsuite-1.35.0-150400.3.3.1.aarch64", "openSUSE Leap 15.4:busybox-testsuite-1.35.0-150400.3.3.1.ppc64le", "openSUSE Leap 15.4:busybox-testsuite-1.35.0-150400.3.3.1.s390x", "openSUSE Leap 15.4:busybox-testsuite-1.35.0-150400.3.3.1.x86_64", "openSUSE Leap 15.4:busybox-warewulf3-1.35.0-150400.3.3.1.aarch64", "openSUSE Leap 15.4:busybox-warewulf3-1.35.0-150400.3.3.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2022-11-11T14:38:22Z", details: "important", }, ], title: "CVE-2018-1000500", }, { cve: "CVE-2018-1000517", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2018-1000517", }, ], notes: [ { category: "general", text: "BusyBox project BusyBox wget version prior to commit 8e2174e9bd836e53c8b9c6e00d1bc6e2a718686e contains a Buffer Overflow vulnerability in Busybox wget that can result in heap buffer overflow. This attack appear to be exploitable via network connectivity. This vulnerability appears to have been fixed in after commit 8e2174e9bd836e53c8b9c6e00d1bc6e2a718686e.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-1.35.0-150400.3.3.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-1.35.0-150400.3.3.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-1.35.0-150400.3.3.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-1.35.0-150400.3.3.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-static-1.35.0-150400.3.3.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-static-1.35.0-150400.3.3.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-static-1.35.0-150400.3.3.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-static-1.35.0-150400.3.3.1.x86_64", "openSUSE Leap 15.4:busybox-1.35.0-150400.3.3.1.aarch64", "openSUSE Leap 15.4:busybox-1.35.0-150400.3.3.1.ppc64le", "openSUSE Leap 15.4:busybox-1.35.0-150400.3.3.1.s390x", "openSUSE Leap 15.4:busybox-1.35.0-150400.3.3.1.x86_64", "openSUSE Leap 15.4:busybox-static-1.35.0-150400.3.3.1.aarch64", "openSUSE Leap 15.4:busybox-static-1.35.0-150400.3.3.1.ppc64le", "openSUSE Leap 15.4:busybox-static-1.35.0-150400.3.3.1.s390x", "openSUSE Leap 15.4:busybox-static-1.35.0-150400.3.3.1.x86_64", "openSUSE Leap 15.4:busybox-testsuite-1.35.0-150400.3.3.1.aarch64", "openSUSE Leap 15.4:busybox-testsuite-1.35.0-150400.3.3.1.ppc64le", "openSUSE Leap 15.4:busybox-testsuite-1.35.0-150400.3.3.1.s390x", "openSUSE Leap 15.4:busybox-testsuite-1.35.0-150400.3.3.1.x86_64", "openSUSE Leap 15.4:busybox-warewulf3-1.35.0-150400.3.3.1.aarch64", "openSUSE Leap 15.4:busybox-warewulf3-1.35.0-150400.3.3.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2018-1000517", url: "https://www.suse.com/security/cve/CVE-2018-1000517", }, { category: "external", summary: "SUSE Bug 1099260 for CVE-2018-1000517", url: "https://bugzilla.suse.com/1099260", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-1.35.0-150400.3.3.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-1.35.0-150400.3.3.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-1.35.0-150400.3.3.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-1.35.0-150400.3.3.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-static-1.35.0-150400.3.3.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-static-1.35.0-150400.3.3.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-static-1.35.0-150400.3.3.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-static-1.35.0-150400.3.3.1.x86_64", "openSUSE Leap 15.4:busybox-1.35.0-150400.3.3.1.aarch64", "openSUSE Leap 15.4:busybox-1.35.0-150400.3.3.1.ppc64le", "openSUSE Leap 15.4:busybox-1.35.0-150400.3.3.1.s390x", "openSUSE Leap 15.4:busybox-1.35.0-150400.3.3.1.x86_64", "openSUSE Leap 15.4:busybox-static-1.35.0-150400.3.3.1.aarch64", "openSUSE Leap 15.4:busybox-static-1.35.0-150400.3.3.1.ppc64le", "openSUSE Leap 15.4:busybox-static-1.35.0-150400.3.3.1.s390x", "openSUSE Leap 15.4:busybox-static-1.35.0-150400.3.3.1.x86_64", "openSUSE Leap 15.4:busybox-testsuite-1.35.0-150400.3.3.1.aarch64", "openSUSE Leap 15.4:busybox-testsuite-1.35.0-150400.3.3.1.ppc64le", "openSUSE Leap 15.4:busybox-testsuite-1.35.0-150400.3.3.1.s390x", "openSUSE Leap 15.4:busybox-testsuite-1.35.0-150400.3.3.1.x86_64", "openSUSE Leap 15.4:busybox-warewulf3-1.35.0-150400.3.3.1.aarch64", "openSUSE Leap 15.4:busybox-warewulf3-1.35.0-150400.3.3.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.6, baseSeverity: "MEDIUM", vectorString: "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L", version: "3.0", }, products: [ "SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-1.35.0-150400.3.3.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-1.35.0-150400.3.3.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-1.35.0-150400.3.3.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-1.35.0-150400.3.3.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-static-1.35.0-150400.3.3.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-static-1.35.0-150400.3.3.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-static-1.35.0-150400.3.3.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-static-1.35.0-150400.3.3.1.x86_64", "openSUSE Leap 15.4:busybox-1.35.0-150400.3.3.1.aarch64", "openSUSE Leap 15.4:busybox-1.35.0-150400.3.3.1.ppc64le", "openSUSE Leap 15.4:busybox-1.35.0-150400.3.3.1.s390x", "openSUSE Leap 15.4:busybox-1.35.0-150400.3.3.1.x86_64", "openSUSE Leap 15.4:busybox-static-1.35.0-150400.3.3.1.aarch64", "openSUSE Leap 15.4:busybox-static-1.35.0-150400.3.3.1.ppc64le", "openSUSE Leap 15.4:busybox-static-1.35.0-150400.3.3.1.s390x", "openSUSE Leap 15.4:busybox-static-1.35.0-150400.3.3.1.x86_64", "openSUSE Leap 15.4:busybox-testsuite-1.35.0-150400.3.3.1.aarch64", "openSUSE Leap 15.4:busybox-testsuite-1.35.0-150400.3.3.1.ppc64le", "openSUSE Leap 15.4:busybox-testsuite-1.35.0-150400.3.3.1.s390x", "openSUSE Leap 15.4:busybox-testsuite-1.35.0-150400.3.3.1.x86_64", "openSUSE Leap 15.4:busybox-warewulf3-1.35.0-150400.3.3.1.aarch64", "openSUSE Leap 15.4:busybox-warewulf3-1.35.0-150400.3.3.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2022-11-11T14:38:22Z", details: "important", }, ], title: "CVE-2018-1000517", }, { cve: "CVE-2018-20679", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2018-20679", }, ], notes: [ { category: "general", text: "An issue was discovered in BusyBox before 1.30.0. An out of bounds read in udhcp components (consumed by the DHCP server, client, and relay) allows a remote attacker to leak sensitive information from the stack by sending a crafted DHCP message. This is related to verification in udhcp_get_option() in networking/udhcp/common.c that 4-byte options are indeed 4 bytes.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-1.35.0-150400.3.3.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-1.35.0-150400.3.3.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-1.35.0-150400.3.3.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-1.35.0-150400.3.3.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-static-1.35.0-150400.3.3.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-static-1.35.0-150400.3.3.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-static-1.35.0-150400.3.3.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-static-1.35.0-150400.3.3.1.x86_64", "openSUSE Leap 15.4:busybox-1.35.0-150400.3.3.1.aarch64", "openSUSE Leap 15.4:busybox-1.35.0-150400.3.3.1.ppc64le", "openSUSE Leap 15.4:busybox-1.35.0-150400.3.3.1.s390x", "openSUSE Leap 15.4:busybox-1.35.0-150400.3.3.1.x86_64", "openSUSE Leap 15.4:busybox-static-1.35.0-150400.3.3.1.aarch64", "openSUSE Leap 15.4:busybox-static-1.35.0-150400.3.3.1.ppc64le", "openSUSE Leap 15.4:busybox-static-1.35.0-150400.3.3.1.s390x", "openSUSE Leap 15.4:busybox-static-1.35.0-150400.3.3.1.x86_64", "openSUSE Leap 15.4:busybox-testsuite-1.35.0-150400.3.3.1.aarch64", "openSUSE Leap 15.4:busybox-testsuite-1.35.0-150400.3.3.1.ppc64le", "openSUSE Leap 15.4:busybox-testsuite-1.35.0-150400.3.3.1.s390x", "openSUSE Leap 15.4:busybox-testsuite-1.35.0-150400.3.3.1.x86_64", "openSUSE Leap 15.4:busybox-warewulf3-1.35.0-150400.3.3.1.aarch64", "openSUSE Leap 15.4:busybox-warewulf3-1.35.0-150400.3.3.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2018-20679", url: "https://www.suse.com/security/cve/CVE-2018-20679", }, { category: "external", summary: "SUSE Bug 1121426 for CVE-2018-20679", url: "https://bugzilla.suse.com/1121426", }, { category: "external", summary: "SUSE Bug 1121428 for CVE-2018-20679", url: "https://bugzilla.suse.com/1121428", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-1.35.0-150400.3.3.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-1.35.0-150400.3.3.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-1.35.0-150400.3.3.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-1.35.0-150400.3.3.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-static-1.35.0-150400.3.3.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-static-1.35.0-150400.3.3.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-static-1.35.0-150400.3.3.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-static-1.35.0-150400.3.3.1.x86_64", "openSUSE Leap 15.4:busybox-1.35.0-150400.3.3.1.aarch64", "openSUSE Leap 15.4:busybox-1.35.0-150400.3.3.1.ppc64le", "openSUSE Leap 15.4:busybox-1.35.0-150400.3.3.1.s390x", "openSUSE Leap 15.4:busybox-1.35.0-150400.3.3.1.x86_64", "openSUSE Leap 15.4:busybox-static-1.35.0-150400.3.3.1.aarch64", "openSUSE Leap 15.4:busybox-static-1.35.0-150400.3.3.1.ppc64le", "openSUSE Leap 15.4:busybox-static-1.35.0-150400.3.3.1.s390x", "openSUSE Leap 15.4:busybox-static-1.35.0-150400.3.3.1.x86_64", "openSUSE Leap 15.4:busybox-testsuite-1.35.0-150400.3.3.1.aarch64", "openSUSE Leap 15.4:busybox-testsuite-1.35.0-150400.3.3.1.ppc64le", "openSUSE Leap 15.4:busybox-testsuite-1.35.0-150400.3.3.1.s390x", "openSUSE Leap 15.4:busybox-testsuite-1.35.0-150400.3.3.1.x86_64", "openSUSE Leap 15.4:busybox-warewulf3-1.35.0-150400.3.3.1.aarch64", "openSUSE Leap 15.4:busybox-warewulf3-1.35.0-150400.3.3.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.3, baseSeverity: "MEDIUM", vectorString: "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N", version: "3.0", }, products: [ "SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-1.35.0-150400.3.3.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-1.35.0-150400.3.3.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-1.35.0-150400.3.3.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-1.35.0-150400.3.3.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-static-1.35.0-150400.3.3.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-static-1.35.0-150400.3.3.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-static-1.35.0-150400.3.3.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-static-1.35.0-150400.3.3.1.x86_64", "openSUSE Leap 15.4:busybox-1.35.0-150400.3.3.1.aarch64", "openSUSE Leap 15.4:busybox-1.35.0-150400.3.3.1.ppc64le", "openSUSE Leap 15.4:busybox-1.35.0-150400.3.3.1.s390x", "openSUSE Leap 15.4:busybox-1.35.0-150400.3.3.1.x86_64", "openSUSE Leap 15.4:busybox-static-1.35.0-150400.3.3.1.aarch64", "openSUSE Leap 15.4:busybox-static-1.35.0-150400.3.3.1.ppc64le", "openSUSE Leap 15.4:busybox-static-1.35.0-150400.3.3.1.s390x", "openSUSE Leap 15.4:busybox-static-1.35.0-150400.3.3.1.x86_64", "openSUSE Leap 15.4:busybox-testsuite-1.35.0-150400.3.3.1.aarch64", "openSUSE Leap 15.4:busybox-testsuite-1.35.0-150400.3.3.1.ppc64le", "openSUSE Leap 15.4:busybox-testsuite-1.35.0-150400.3.3.1.s390x", "openSUSE Leap 15.4:busybox-testsuite-1.35.0-150400.3.3.1.x86_64", "openSUSE Leap 15.4:busybox-warewulf3-1.35.0-150400.3.3.1.aarch64", "openSUSE Leap 15.4:busybox-warewulf3-1.35.0-150400.3.3.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2022-11-11T14:38:22Z", details: "moderate", }, ], title: "CVE-2018-20679", }, { cve: "CVE-2019-5747", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2019-5747", }, ], notes: [ { category: "general", text: "An issue was discovered in BusyBox through 1.30.0. An out of bounds read in udhcp components (consumed by the DHCP client, server, and/or relay) might allow a remote attacker to leak sensitive information from the stack by sending a crafted DHCP message. This is related to assurance of a 4-byte length when decoding DHCP_SUBNET. NOTE: this issue exists because of an incomplete fix for CVE-2018-20679.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-1.35.0-150400.3.3.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-1.35.0-150400.3.3.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-1.35.0-150400.3.3.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-1.35.0-150400.3.3.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-static-1.35.0-150400.3.3.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-static-1.35.0-150400.3.3.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-static-1.35.0-150400.3.3.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-static-1.35.0-150400.3.3.1.x86_64", "openSUSE Leap 15.4:busybox-1.35.0-150400.3.3.1.aarch64", "openSUSE Leap 15.4:busybox-1.35.0-150400.3.3.1.ppc64le", "openSUSE Leap 15.4:busybox-1.35.0-150400.3.3.1.s390x", "openSUSE Leap 15.4:busybox-1.35.0-150400.3.3.1.x86_64", "openSUSE Leap 15.4:busybox-static-1.35.0-150400.3.3.1.aarch64", "openSUSE Leap 15.4:busybox-static-1.35.0-150400.3.3.1.ppc64le", "openSUSE Leap 15.4:busybox-static-1.35.0-150400.3.3.1.s390x", "openSUSE Leap 15.4:busybox-static-1.35.0-150400.3.3.1.x86_64", "openSUSE Leap 15.4:busybox-testsuite-1.35.0-150400.3.3.1.aarch64", "openSUSE Leap 15.4:busybox-testsuite-1.35.0-150400.3.3.1.ppc64le", "openSUSE Leap 15.4:busybox-testsuite-1.35.0-150400.3.3.1.s390x", "openSUSE Leap 15.4:busybox-testsuite-1.35.0-150400.3.3.1.x86_64", "openSUSE Leap 15.4:busybox-warewulf3-1.35.0-150400.3.3.1.aarch64", "openSUSE Leap 15.4:busybox-warewulf3-1.35.0-150400.3.3.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2019-5747", url: "https://www.suse.com/security/cve/CVE-2019-5747", }, { category: "external", summary: "SUSE Bug 1121426 for CVE-2019-5747", url: "https://bugzilla.suse.com/1121426", }, { category: "external", summary: "SUSE Bug 1121428 for CVE-2019-5747", url: "https://bugzilla.suse.com/1121428", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-1.35.0-150400.3.3.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-1.35.0-150400.3.3.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-1.35.0-150400.3.3.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-1.35.0-150400.3.3.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-static-1.35.0-150400.3.3.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-static-1.35.0-150400.3.3.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-static-1.35.0-150400.3.3.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-static-1.35.0-150400.3.3.1.x86_64", "openSUSE Leap 15.4:busybox-1.35.0-150400.3.3.1.aarch64", "openSUSE Leap 15.4:busybox-1.35.0-150400.3.3.1.ppc64le", "openSUSE Leap 15.4:busybox-1.35.0-150400.3.3.1.s390x", "openSUSE Leap 15.4:busybox-1.35.0-150400.3.3.1.x86_64", "openSUSE Leap 15.4:busybox-static-1.35.0-150400.3.3.1.aarch64", "openSUSE Leap 15.4:busybox-static-1.35.0-150400.3.3.1.ppc64le", "openSUSE Leap 15.4:busybox-static-1.35.0-150400.3.3.1.s390x", "openSUSE Leap 15.4:busybox-static-1.35.0-150400.3.3.1.x86_64", "openSUSE Leap 15.4:busybox-testsuite-1.35.0-150400.3.3.1.aarch64", "openSUSE Leap 15.4:busybox-testsuite-1.35.0-150400.3.3.1.ppc64le", "openSUSE Leap 15.4:busybox-testsuite-1.35.0-150400.3.3.1.s390x", "openSUSE Leap 15.4:busybox-testsuite-1.35.0-150400.3.3.1.x86_64", "openSUSE Leap 15.4:busybox-warewulf3-1.35.0-150400.3.3.1.aarch64", "openSUSE Leap 15.4:busybox-warewulf3-1.35.0-150400.3.3.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 3.5, baseSeverity: "LOW", vectorString: "CVSS:3.1/AV:A/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N", version: "3.1", }, products: [ "SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-1.35.0-150400.3.3.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-1.35.0-150400.3.3.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-1.35.0-150400.3.3.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-1.35.0-150400.3.3.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-static-1.35.0-150400.3.3.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-static-1.35.0-150400.3.3.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-static-1.35.0-150400.3.3.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-static-1.35.0-150400.3.3.1.x86_64", "openSUSE Leap 15.4:busybox-1.35.0-150400.3.3.1.aarch64", "openSUSE Leap 15.4:busybox-1.35.0-150400.3.3.1.ppc64le", "openSUSE Leap 15.4:busybox-1.35.0-150400.3.3.1.s390x", "openSUSE Leap 15.4:busybox-1.35.0-150400.3.3.1.x86_64", "openSUSE Leap 15.4:busybox-static-1.35.0-150400.3.3.1.aarch64", "openSUSE Leap 15.4:busybox-static-1.35.0-150400.3.3.1.ppc64le", "openSUSE Leap 15.4:busybox-static-1.35.0-150400.3.3.1.s390x", "openSUSE Leap 15.4:busybox-static-1.35.0-150400.3.3.1.x86_64", "openSUSE Leap 15.4:busybox-testsuite-1.35.0-150400.3.3.1.aarch64", "openSUSE Leap 15.4:busybox-testsuite-1.35.0-150400.3.3.1.ppc64le", "openSUSE Leap 15.4:busybox-testsuite-1.35.0-150400.3.3.1.s390x", "openSUSE Leap 15.4:busybox-testsuite-1.35.0-150400.3.3.1.x86_64", "openSUSE Leap 15.4:busybox-warewulf3-1.35.0-150400.3.3.1.aarch64", "openSUSE Leap 15.4:busybox-warewulf3-1.35.0-150400.3.3.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2022-11-11T14:38:22Z", details: "low", }, ], title: "CVE-2019-5747", }, { cve: "CVE-2021-28831", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2021-28831", }, ], notes: [ { category: "general", text: "decompress_gunzip.c in BusyBox through 1.32.1 mishandles the error bit on the huft_build result pointer, with a resultant invalid free or segmentation fault, via malformed gzip data.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-1.35.0-150400.3.3.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-1.35.0-150400.3.3.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-1.35.0-150400.3.3.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-1.35.0-150400.3.3.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-static-1.35.0-150400.3.3.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-static-1.35.0-150400.3.3.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-static-1.35.0-150400.3.3.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-static-1.35.0-150400.3.3.1.x86_64", "openSUSE Leap 15.4:busybox-1.35.0-150400.3.3.1.aarch64", "openSUSE Leap 15.4:busybox-1.35.0-150400.3.3.1.ppc64le", "openSUSE Leap 15.4:busybox-1.35.0-150400.3.3.1.s390x", "openSUSE Leap 15.4:busybox-1.35.0-150400.3.3.1.x86_64", "openSUSE Leap 15.4:busybox-static-1.35.0-150400.3.3.1.aarch64", "openSUSE Leap 15.4:busybox-static-1.35.0-150400.3.3.1.ppc64le", "openSUSE Leap 15.4:busybox-static-1.35.0-150400.3.3.1.s390x", "openSUSE Leap 15.4:busybox-static-1.35.0-150400.3.3.1.x86_64", "openSUSE Leap 15.4:busybox-testsuite-1.35.0-150400.3.3.1.aarch64", "openSUSE Leap 15.4:busybox-testsuite-1.35.0-150400.3.3.1.ppc64le", "openSUSE Leap 15.4:busybox-testsuite-1.35.0-150400.3.3.1.s390x", "openSUSE Leap 15.4:busybox-testsuite-1.35.0-150400.3.3.1.x86_64", "openSUSE Leap 15.4:busybox-warewulf3-1.35.0-150400.3.3.1.aarch64", "openSUSE Leap 15.4:busybox-warewulf3-1.35.0-150400.3.3.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2021-28831", url: "https://www.suse.com/security/cve/CVE-2021-28831", }, { category: "external", summary: "SUSE Bug 1184522 for CVE-2021-28831", url: "https://bugzilla.suse.com/1184522", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-1.35.0-150400.3.3.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-1.35.0-150400.3.3.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-1.35.0-150400.3.3.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-1.35.0-150400.3.3.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-static-1.35.0-150400.3.3.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-static-1.35.0-150400.3.3.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-static-1.35.0-150400.3.3.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-static-1.35.0-150400.3.3.1.x86_64", "openSUSE Leap 15.4:busybox-1.35.0-150400.3.3.1.aarch64", "openSUSE Leap 15.4:busybox-1.35.0-150400.3.3.1.ppc64le", "openSUSE Leap 15.4:busybox-1.35.0-150400.3.3.1.s390x", "openSUSE Leap 15.4:busybox-1.35.0-150400.3.3.1.x86_64", "openSUSE Leap 15.4:busybox-static-1.35.0-150400.3.3.1.aarch64", "openSUSE Leap 15.4:busybox-static-1.35.0-150400.3.3.1.ppc64le", "openSUSE Leap 15.4:busybox-static-1.35.0-150400.3.3.1.s390x", "openSUSE Leap 15.4:busybox-static-1.35.0-150400.3.3.1.x86_64", "openSUSE Leap 15.4:busybox-testsuite-1.35.0-150400.3.3.1.aarch64", "openSUSE Leap 15.4:busybox-testsuite-1.35.0-150400.3.3.1.ppc64le", "openSUSE Leap 15.4:busybox-testsuite-1.35.0-150400.3.3.1.s390x", "openSUSE Leap 15.4:busybox-testsuite-1.35.0-150400.3.3.1.x86_64", "openSUSE Leap 15.4:busybox-warewulf3-1.35.0-150400.3.3.1.aarch64", "openSUSE Leap 15.4:busybox-warewulf3-1.35.0-150400.3.3.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 7.5, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-1.35.0-150400.3.3.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-1.35.0-150400.3.3.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-1.35.0-150400.3.3.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-1.35.0-150400.3.3.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-static-1.35.0-150400.3.3.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-static-1.35.0-150400.3.3.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-static-1.35.0-150400.3.3.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-static-1.35.0-150400.3.3.1.x86_64", "openSUSE Leap 15.4:busybox-1.35.0-150400.3.3.1.aarch64", "openSUSE Leap 15.4:busybox-1.35.0-150400.3.3.1.ppc64le", "openSUSE Leap 15.4:busybox-1.35.0-150400.3.3.1.s390x", "openSUSE Leap 15.4:busybox-1.35.0-150400.3.3.1.x86_64", "openSUSE Leap 15.4:busybox-static-1.35.0-150400.3.3.1.aarch64", "openSUSE Leap 15.4:busybox-static-1.35.0-150400.3.3.1.ppc64le", "openSUSE Leap 15.4:busybox-static-1.35.0-150400.3.3.1.s390x", "openSUSE Leap 15.4:busybox-static-1.35.0-150400.3.3.1.x86_64", "openSUSE Leap 15.4:busybox-testsuite-1.35.0-150400.3.3.1.aarch64", "openSUSE Leap 15.4:busybox-testsuite-1.35.0-150400.3.3.1.ppc64le", "openSUSE Leap 15.4:busybox-testsuite-1.35.0-150400.3.3.1.s390x", "openSUSE Leap 15.4:busybox-testsuite-1.35.0-150400.3.3.1.x86_64", "openSUSE Leap 15.4:busybox-warewulf3-1.35.0-150400.3.3.1.aarch64", "openSUSE Leap 15.4:busybox-warewulf3-1.35.0-150400.3.3.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2022-11-11T14:38:22Z", details: "important", }, ], title: "CVE-2021-28831", }, { cve: "CVE-2021-42373", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2021-42373", }, ], notes: [ { category: "general", text: "A NULL pointer dereference in Busybox's man applet leads to denial of service when a section name is supplied but no page argument is given", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-1.35.0-150400.3.3.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-1.35.0-150400.3.3.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-1.35.0-150400.3.3.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-1.35.0-150400.3.3.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-static-1.35.0-150400.3.3.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-static-1.35.0-150400.3.3.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-static-1.35.0-150400.3.3.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-static-1.35.0-150400.3.3.1.x86_64", "openSUSE Leap 15.4:busybox-1.35.0-150400.3.3.1.aarch64", "openSUSE Leap 15.4:busybox-1.35.0-150400.3.3.1.ppc64le", "openSUSE Leap 15.4:busybox-1.35.0-150400.3.3.1.s390x", "openSUSE Leap 15.4:busybox-1.35.0-150400.3.3.1.x86_64", "openSUSE Leap 15.4:busybox-static-1.35.0-150400.3.3.1.aarch64", "openSUSE Leap 15.4:busybox-static-1.35.0-150400.3.3.1.ppc64le", "openSUSE Leap 15.4:busybox-static-1.35.0-150400.3.3.1.s390x", "openSUSE Leap 15.4:busybox-static-1.35.0-150400.3.3.1.x86_64", "openSUSE Leap 15.4:busybox-testsuite-1.35.0-150400.3.3.1.aarch64", "openSUSE Leap 15.4:busybox-testsuite-1.35.0-150400.3.3.1.ppc64le", "openSUSE Leap 15.4:busybox-testsuite-1.35.0-150400.3.3.1.s390x", "openSUSE Leap 15.4:busybox-testsuite-1.35.0-150400.3.3.1.x86_64", "openSUSE Leap 15.4:busybox-warewulf3-1.35.0-150400.3.3.1.aarch64", "openSUSE Leap 15.4:busybox-warewulf3-1.35.0-150400.3.3.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2021-42373", url: "https://www.suse.com/security/cve/CVE-2021-42373", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-1.35.0-150400.3.3.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-1.35.0-150400.3.3.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-1.35.0-150400.3.3.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-1.35.0-150400.3.3.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-static-1.35.0-150400.3.3.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-static-1.35.0-150400.3.3.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-static-1.35.0-150400.3.3.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-static-1.35.0-150400.3.3.1.x86_64", "openSUSE Leap 15.4:busybox-1.35.0-150400.3.3.1.aarch64", "openSUSE Leap 15.4:busybox-1.35.0-150400.3.3.1.ppc64le", "openSUSE Leap 15.4:busybox-1.35.0-150400.3.3.1.s390x", "openSUSE Leap 15.4:busybox-1.35.0-150400.3.3.1.x86_64", "openSUSE Leap 15.4:busybox-static-1.35.0-150400.3.3.1.aarch64", "openSUSE Leap 15.4:busybox-static-1.35.0-150400.3.3.1.ppc64le", "openSUSE Leap 15.4:busybox-static-1.35.0-150400.3.3.1.s390x", "openSUSE Leap 15.4:busybox-static-1.35.0-150400.3.3.1.x86_64", "openSUSE Leap 15.4:busybox-testsuite-1.35.0-150400.3.3.1.aarch64", "openSUSE Leap 15.4:busybox-testsuite-1.35.0-150400.3.3.1.ppc64le", "openSUSE Leap 15.4:busybox-testsuite-1.35.0-150400.3.3.1.s390x", "openSUSE Leap 15.4:busybox-testsuite-1.35.0-150400.3.3.1.x86_64", "openSUSE Leap 15.4:busybox-warewulf3-1.35.0-150400.3.3.1.aarch64", "openSUSE Leap 15.4:busybox-warewulf3-1.35.0-150400.3.3.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.5, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-1.35.0-150400.3.3.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-1.35.0-150400.3.3.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-1.35.0-150400.3.3.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-1.35.0-150400.3.3.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-static-1.35.0-150400.3.3.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-static-1.35.0-150400.3.3.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-static-1.35.0-150400.3.3.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-static-1.35.0-150400.3.3.1.x86_64", "openSUSE Leap 15.4:busybox-1.35.0-150400.3.3.1.aarch64", "openSUSE Leap 15.4:busybox-1.35.0-150400.3.3.1.ppc64le", "openSUSE Leap 15.4:busybox-1.35.0-150400.3.3.1.s390x", "openSUSE Leap 15.4:busybox-1.35.0-150400.3.3.1.x86_64", "openSUSE Leap 15.4:busybox-static-1.35.0-150400.3.3.1.aarch64", "openSUSE Leap 15.4:busybox-static-1.35.0-150400.3.3.1.ppc64le", "openSUSE Leap 15.4:busybox-static-1.35.0-150400.3.3.1.s390x", "openSUSE Leap 15.4:busybox-static-1.35.0-150400.3.3.1.x86_64", "openSUSE Leap 15.4:busybox-testsuite-1.35.0-150400.3.3.1.aarch64", "openSUSE Leap 15.4:busybox-testsuite-1.35.0-150400.3.3.1.ppc64le", "openSUSE Leap 15.4:busybox-testsuite-1.35.0-150400.3.3.1.s390x", "openSUSE Leap 15.4:busybox-testsuite-1.35.0-150400.3.3.1.x86_64", "openSUSE Leap 15.4:busybox-warewulf3-1.35.0-150400.3.3.1.aarch64", "openSUSE Leap 15.4:busybox-warewulf3-1.35.0-150400.3.3.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2022-11-11T14:38:22Z", details: "moderate", }, ], title: "CVE-2021-42373", }, { cve: "CVE-2021-42374", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2021-42374", }, ], notes: [ { category: "general", text: "An out-of-bounds heap read in Busybox's unlzma applet leads to information leak and denial of service when crafted LZMA-compressed input is decompressed. This can be triggered by any applet/format that", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-1.35.0-150400.3.3.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-1.35.0-150400.3.3.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-1.35.0-150400.3.3.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-1.35.0-150400.3.3.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-static-1.35.0-150400.3.3.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-static-1.35.0-150400.3.3.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-static-1.35.0-150400.3.3.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-static-1.35.0-150400.3.3.1.x86_64", "openSUSE Leap 15.4:busybox-1.35.0-150400.3.3.1.aarch64", "openSUSE Leap 15.4:busybox-1.35.0-150400.3.3.1.ppc64le", "openSUSE Leap 15.4:busybox-1.35.0-150400.3.3.1.s390x", "openSUSE Leap 15.4:busybox-1.35.0-150400.3.3.1.x86_64", "openSUSE Leap 15.4:busybox-static-1.35.0-150400.3.3.1.aarch64", "openSUSE Leap 15.4:busybox-static-1.35.0-150400.3.3.1.ppc64le", "openSUSE Leap 15.4:busybox-static-1.35.0-150400.3.3.1.s390x", "openSUSE Leap 15.4:busybox-static-1.35.0-150400.3.3.1.x86_64", "openSUSE Leap 15.4:busybox-testsuite-1.35.0-150400.3.3.1.aarch64", "openSUSE Leap 15.4:busybox-testsuite-1.35.0-150400.3.3.1.ppc64le", "openSUSE Leap 15.4:busybox-testsuite-1.35.0-150400.3.3.1.s390x", "openSUSE Leap 15.4:busybox-testsuite-1.35.0-150400.3.3.1.x86_64", "openSUSE Leap 15.4:busybox-warewulf3-1.35.0-150400.3.3.1.aarch64", "openSUSE Leap 15.4:busybox-warewulf3-1.35.0-150400.3.3.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2021-42374", url: "https://www.suse.com/security/cve/CVE-2021-42374", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-1.35.0-150400.3.3.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-1.35.0-150400.3.3.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-1.35.0-150400.3.3.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-1.35.0-150400.3.3.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-static-1.35.0-150400.3.3.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-static-1.35.0-150400.3.3.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-static-1.35.0-150400.3.3.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-static-1.35.0-150400.3.3.1.x86_64", "openSUSE Leap 15.4:busybox-1.35.0-150400.3.3.1.aarch64", "openSUSE Leap 15.4:busybox-1.35.0-150400.3.3.1.ppc64le", "openSUSE Leap 15.4:busybox-1.35.0-150400.3.3.1.s390x", "openSUSE Leap 15.4:busybox-1.35.0-150400.3.3.1.x86_64", "openSUSE Leap 15.4:busybox-static-1.35.0-150400.3.3.1.aarch64", "openSUSE Leap 15.4:busybox-static-1.35.0-150400.3.3.1.ppc64le", "openSUSE Leap 15.4:busybox-static-1.35.0-150400.3.3.1.s390x", "openSUSE Leap 15.4:busybox-static-1.35.0-150400.3.3.1.x86_64", "openSUSE Leap 15.4:busybox-testsuite-1.35.0-150400.3.3.1.aarch64", "openSUSE Leap 15.4:busybox-testsuite-1.35.0-150400.3.3.1.ppc64le", "openSUSE Leap 15.4:busybox-testsuite-1.35.0-150400.3.3.1.s390x", "openSUSE Leap 15.4:busybox-testsuite-1.35.0-150400.3.3.1.x86_64", "openSUSE Leap 15.4:busybox-warewulf3-1.35.0-150400.3.3.1.aarch64", "openSUSE Leap 15.4:busybox-warewulf3-1.35.0-150400.3.3.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.7, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-1.35.0-150400.3.3.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-1.35.0-150400.3.3.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-1.35.0-150400.3.3.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-1.35.0-150400.3.3.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-static-1.35.0-150400.3.3.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-static-1.35.0-150400.3.3.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-static-1.35.0-150400.3.3.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-static-1.35.0-150400.3.3.1.x86_64", "openSUSE Leap 15.4:busybox-1.35.0-150400.3.3.1.aarch64", "openSUSE Leap 15.4:busybox-1.35.0-150400.3.3.1.ppc64le", "openSUSE Leap 15.4:busybox-1.35.0-150400.3.3.1.s390x", "openSUSE Leap 15.4:busybox-1.35.0-150400.3.3.1.x86_64", "openSUSE Leap 15.4:busybox-static-1.35.0-150400.3.3.1.aarch64", "openSUSE Leap 15.4:busybox-static-1.35.0-150400.3.3.1.ppc64le", "openSUSE Leap 15.4:busybox-static-1.35.0-150400.3.3.1.s390x", "openSUSE Leap 15.4:busybox-static-1.35.0-150400.3.3.1.x86_64", "openSUSE Leap 15.4:busybox-testsuite-1.35.0-150400.3.3.1.aarch64", "openSUSE Leap 15.4:busybox-testsuite-1.35.0-150400.3.3.1.ppc64le", "openSUSE Leap 15.4:busybox-testsuite-1.35.0-150400.3.3.1.s390x", "openSUSE Leap 15.4:busybox-testsuite-1.35.0-150400.3.3.1.x86_64", "openSUSE Leap 15.4:busybox-warewulf3-1.35.0-150400.3.3.1.aarch64", "openSUSE Leap 15.4:busybox-warewulf3-1.35.0-150400.3.3.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2022-11-11T14:38:22Z", details: "moderate", }, ], title: "CVE-2021-42374", }, { cve: "CVE-2021-42375", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2021-42375", }, ], notes: [ { category: "general", text: "An incorrect handling of a special element in Busybox's ash applet leads to denial of service when processing a crafted shell command, due to the shell mistaking specific characters for reserved characters. This may be used for DoS under rare conditions of filtered command input.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-1.35.0-150400.3.3.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-1.35.0-150400.3.3.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-1.35.0-150400.3.3.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-1.35.0-150400.3.3.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-static-1.35.0-150400.3.3.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-static-1.35.0-150400.3.3.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-static-1.35.0-150400.3.3.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-static-1.35.0-150400.3.3.1.x86_64", "openSUSE Leap 15.4:busybox-1.35.0-150400.3.3.1.aarch64", "openSUSE Leap 15.4:busybox-1.35.0-150400.3.3.1.ppc64le", "openSUSE Leap 15.4:busybox-1.35.0-150400.3.3.1.s390x", "openSUSE Leap 15.4:busybox-1.35.0-150400.3.3.1.x86_64", "openSUSE Leap 15.4:busybox-static-1.35.0-150400.3.3.1.aarch64", "openSUSE Leap 15.4:busybox-static-1.35.0-150400.3.3.1.ppc64le", "openSUSE Leap 15.4:busybox-static-1.35.0-150400.3.3.1.s390x", "openSUSE Leap 15.4:busybox-static-1.35.0-150400.3.3.1.x86_64", "openSUSE Leap 15.4:busybox-testsuite-1.35.0-150400.3.3.1.aarch64", "openSUSE Leap 15.4:busybox-testsuite-1.35.0-150400.3.3.1.ppc64le", "openSUSE Leap 15.4:busybox-testsuite-1.35.0-150400.3.3.1.s390x", "openSUSE Leap 15.4:busybox-testsuite-1.35.0-150400.3.3.1.x86_64", "openSUSE Leap 15.4:busybox-warewulf3-1.35.0-150400.3.3.1.aarch64", "openSUSE Leap 15.4:busybox-warewulf3-1.35.0-150400.3.3.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2021-42375", url: "https://www.suse.com/security/cve/CVE-2021-42375", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-1.35.0-150400.3.3.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-1.35.0-150400.3.3.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-1.35.0-150400.3.3.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-1.35.0-150400.3.3.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-static-1.35.0-150400.3.3.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-static-1.35.0-150400.3.3.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-static-1.35.0-150400.3.3.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-static-1.35.0-150400.3.3.1.x86_64", "openSUSE Leap 15.4:busybox-1.35.0-150400.3.3.1.aarch64", "openSUSE Leap 15.4:busybox-1.35.0-150400.3.3.1.ppc64le", "openSUSE Leap 15.4:busybox-1.35.0-150400.3.3.1.s390x", "openSUSE Leap 15.4:busybox-1.35.0-150400.3.3.1.x86_64", "openSUSE Leap 15.4:busybox-static-1.35.0-150400.3.3.1.aarch64", "openSUSE Leap 15.4:busybox-static-1.35.0-150400.3.3.1.ppc64le", "openSUSE Leap 15.4:busybox-static-1.35.0-150400.3.3.1.s390x", "openSUSE Leap 15.4:busybox-static-1.35.0-150400.3.3.1.x86_64", "openSUSE Leap 15.4:busybox-testsuite-1.35.0-150400.3.3.1.aarch64", "openSUSE Leap 15.4:busybox-testsuite-1.35.0-150400.3.3.1.ppc64le", "openSUSE Leap 15.4:busybox-testsuite-1.35.0-150400.3.3.1.s390x", "openSUSE Leap 15.4:busybox-testsuite-1.35.0-150400.3.3.1.x86_64", "openSUSE Leap 15.4:busybox-warewulf3-1.35.0-150400.3.3.1.aarch64", "openSUSE Leap 15.4:busybox-warewulf3-1.35.0-150400.3.3.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 4.1, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-1.35.0-150400.3.3.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-1.35.0-150400.3.3.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-1.35.0-150400.3.3.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-1.35.0-150400.3.3.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-static-1.35.0-150400.3.3.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-static-1.35.0-150400.3.3.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-static-1.35.0-150400.3.3.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-static-1.35.0-150400.3.3.1.x86_64", "openSUSE Leap 15.4:busybox-1.35.0-150400.3.3.1.aarch64", "openSUSE Leap 15.4:busybox-1.35.0-150400.3.3.1.ppc64le", "openSUSE Leap 15.4:busybox-1.35.0-150400.3.3.1.s390x", "openSUSE Leap 15.4:busybox-1.35.0-150400.3.3.1.x86_64", "openSUSE Leap 15.4:busybox-static-1.35.0-150400.3.3.1.aarch64", "openSUSE Leap 15.4:busybox-static-1.35.0-150400.3.3.1.ppc64le", "openSUSE Leap 15.4:busybox-static-1.35.0-150400.3.3.1.s390x", "openSUSE Leap 15.4:busybox-static-1.35.0-150400.3.3.1.x86_64", "openSUSE Leap 15.4:busybox-testsuite-1.35.0-150400.3.3.1.aarch64", "openSUSE Leap 15.4:busybox-testsuite-1.35.0-150400.3.3.1.ppc64le", "openSUSE Leap 15.4:busybox-testsuite-1.35.0-150400.3.3.1.s390x", "openSUSE Leap 15.4:busybox-testsuite-1.35.0-150400.3.3.1.x86_64", "openSUSE Leap 15.4:busybox-warewulf3-1.35.0-150400.3.3.1.aarch64", "openSUSE Leap 15.4:busybox-warewulf3-1.35.0-150400.3.3.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2022-11-11T14:38:22Z", details: "moderate", }, ], title: "CVE-2021-42375", }, { cve: "CVE-2021-42376", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2021-42376", }, ], notes: [ { category: "general", text: "A NULL pointer dereference in Busybox's hush applet leads to denial of service when processing a crafted shell command, due to missing validation after a \\x03 delimiter character. This may be used for DoS under very rare conditions of filtered command input.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-1.35.0-150400.3.3.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-1.35.0-150400.3.3.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-1.35.0-150400.3.3.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-1.35.0-150400.3.3.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-static-1.35.0-150400.3.3.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-static-1.35.0-150400.3.3.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-static-1.35.0-150400.3.3.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-static-1.35.0-150400.3.3.1.x86_64", "openSUSE Leap 15.4:busybox-1.35.0-150400.3.3.1.aarch64", "openSUSE Leap 15.4:busybox-1.35.0-150400.3.3.1.ppc64le", "openSUSE Leap 15.4:busybox-1.35.0-150400.3.3.1.s390x", "openSUSE Leap 15.4:busybox-1.35.0-150400.3.3.1.x86_64", "openSUSE Leap 15.4:busybox-static-1.35.0-150400.3.3.1.aarch64", "openSUSE Leap 15.4:busybox-static-1.35.0-150400.3.3.1.ppc64le", "openSUSE Leap 15.4:busybox-static-1.35.0-150400.3.3.1.s390x", "openSUSE Leap 15.4:busybox-static-1.35.0-150400.3.3.1.x86_64", "openSUSE Leap 15.4:busybox-testsuite-1.35.0-150400.3.3.1.aarch64", "openSUSE Leap 15.4:busybox-testsuite-1.35.0-150400.3.3.1.ppc64le", "openSUSE Leap 15.4:busybox-testsuite-1.35.0-150400.3.3.1.s390x", "openSUSE Leap 15.4:busybox-testsuite-1.35.0-150400.3.3.1.x86_64", "openSUSE Leap 15.4:busybox-warewulf3-1.35.0-150400.3.3.1.aarch64", "openSUSE Leap 15.4:busybox-warewulf3-1.35.0-150400.3.3.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2021-42376", url: "https://www.suse.com/security/cve/CVE-2021-42376", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-1.35.0-150400.3.3.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-1.35.0-150400.3.3.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-1.35.0-150400.3.3.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-1.35.0-150400.3.3.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-static-1.35.0-150400.3.3.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-static-1.35.0-150400.3.3.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-static-1.35.0-150400.3.3.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-static-1.35.0-150400.3.3.1.x86_64", "openSUSE Leap 15.4:busybox-1.35.0-150400.3.3.1.aarch64", "openSUSE Leap 15.4:busybox-1.35.0-150400.3.3.1.ppc64le", "openSUSE Leap 15.4:busybox-1.35.0-150400.3.3.1.s390x", "openSUSE Leap 15.4:busybox-1.35.0-150400.3.3.1.x86_64", "openSUSE Leap 15.4:busybox-static-1.35.0-150400.3.3.1.aarch64", "openSUSE Leap 15.4:busybox-static-1.35.0-150400.3.3.1.ppc64le", "openSUSE Leap 15.4:busybox-static-1.35.0-150400.3.3.1.s390x", "openSUSE Leap 15.4:busybox-static-1.35.0-150400.3.3.1.x86_64", "openSUSE Leap 15.4:busybox-testsuite-1.35.0-150400.3.3.1.aarch64", "openSUSE Leap 15.4:busybox-testsuite-1.35.0-150400.3.3.1.ppc64le", "openSUSE Leap 15.4:busybox-testsuite-1.35.0-150400.3.3.1.s390x", "openSUSE Leap 15.4:busybox-testsuite-1.35.0-150400.3.3.1.x86_64", "openSUSE Leap 15.4:busybox-warewulf3-1.35.0-150400.3.3.1.aarch64", "openSUSE Leap 15.4:busybox-warewulf3-1.35.0-150400.3.3.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 4.1, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-1.35.0-150400.3.3.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-1.35.0-150400.3.3.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-1.35.0-150400.3.3.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-1.35.0-150400.3.3.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-static-1.35.0-150400.3.3.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-static-1.35.0-150400.3.3.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-static-1.35.0-150400.3.3.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-static-1.35.0-150400.3.3.1.x86_64", "openSUSE Leap 15.4:busybox-1.35.0-150400.3.3.1.aarch64", "openSUSE Leap 15.4:busybox-1.35.0-150400.3.3.1.ppc64le", "openSUSE Leap 15.4:busybox-1.35.0-150400.3.3.1.s390x", "openSUSE Leap 15.4:busybox-1.35.0-150400.3.3.1.x86_64", "openSUSE Leap 15.4:busybox-static-1.35.0-150400.3.3.1.aarch64", "openSUSE Leap 15.4:busybox-static-1.35.0-150400.3.3.1.ppc64le", "openSUSE Leap 15.4:busybox-static-1.35.0-150400.3.3.1.s390x", "openSUSE Leap 15.4:busybox-static-1.35.0-150400.3.3.1.x86_64", "openSUSE Leap 15.4:busybox-testsuite-1.35.0-150400.3.3.1.aarch64", "openSUSE Leap 15.4:busybox-testsuite-1.35.0-150400.3.3.1.ppc64le", "openSUSE Leap 15.4:busybox-testsuite-1.35.0-150400.3.3.1.s390x", "openSUSE Leap 15.4:busybox-testsuite-1.35.0-150400.3.3.1.x86_64", "openSUSE Leap 15.4:busybox-warewulf3-1.35.0-150400.3.3.1.aarch64", "openSUSE Leap 15.4:busybox-warewulf3-1.35.0-150400.3.3.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2022-11-11T14:38:22Z", details: "moderate", }, ], title: "CVE-2021-42376", }, { cve: "CVE-2021-42377", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2021-42377", }, ], notes: [ { category: "general", text: "An attacker-controlled pointer free in Busybox's hush applet leads to denial of service and possible code execution when processing a crafted shell command, due to the shell mishandling the &&& string. This may be used for remote code execution under rare conditions of filtered command input.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-1.35.0-150400.3.3.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-1.35.0-150400.3.3.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-1.35.0-150400.3.3.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-1.35.0-150400.3.3.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-static-1.35.0-150400.3.3.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-static-1.35.0-150400.3.3.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-static-1.35.0-150400.3.3.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-static-1.35.0-150400.3.3.1.x86_64", "openSUSE Leap 15.4:busybox-1.35.0-150400.3.3.1.aarch64", "openSUSE Leap 15.4:busybox-1.35.0-150400.3.3.1.ppc64le", "openSUSE Leap 15.4:busybox-1.35.0-150400.3.3.1.s390x", "openSUSE Leap 15.4:busybox-1.35.0-150400.3.3.1.x86_64", "openSUSE Leap 15.4:busybox-static-1.35.0-150400.3.3.1.aarch64", "openSUSE Leap 15.4:busybox-static-1.35.0-150400.3.3.1.ppc64le", "openSUSE Leap 15.4:busybox-static-1.35.0-150400.3.3.1.s390x", "openSUSE Leap 15.4:busybox-static-1.35.0-150400.3.3.1.x86_64", "openSUSE Leap 15.4:busybox-testsuite-1.35.0-150400.3.3.1.aarch64", "openSUSE Leap 15.4:busybox-testsuite-1.35.0-150400.3.3.1.ppc64le", "openSUSE Leap 15.4:busybox-testsuite-1.35.0-150400.3.3.1.s390x", "openSUSE Leap 15.4:busybox-testsuite-1.35.0-150400.3.3.1.x86_64", "openSUSE Leap 15.4:busybox-warewulf3-1.35.0-150400.3.3.1.aarch64", "openSUSE Leap 15.4:busybox-warewulf3-1.35.0-150400.3.3.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2021-42377", url: "https://www.suse.com/security/cve/CVE-2021-42377", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-1.35.0-150400.3.3.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-1.35.0-150400.3.3.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-1.35.0-150400.3.3.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-1.35.0-150400.3.3.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-static-1.35.0-150400.3.3.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-static-1.35.0-150400.3.3.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-static-1.35.0-150400.3.3.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-static-1.35.0-150400.3.3.1.x86_64", "openSUSE Leap 15.4:busybox-1.35.0-150400.3.3.1.aarch64", "openSUSE Leap 15.4:busybox-1.35.0-150400.3.3.1.ppc64le", "openSUSE Leap 15.4:busybox-1.35.0-150400.3.3.1.s390x", "openSUSE Leap 15.4:busybox-1.35.0-150400.3.3.1.x86_64", "openSUSE Leap 15.4:busybox-static-1.35.0-150400.3.3.1.aarch64", "openSUSE Leap 15.4:busybox-static-1.35.0-150400.3.3.1.ppc64le", "openSUSE Leap 15.4:busybox-static-1.35.0-150400.3.3.1.s390x", "openSUSE Leap 15.4:busybox-static-1.35.0-150400.3.3.1.x86_64", "openSUSE Leap 15.4:busybox-testsuite-1.35.0-150400.3.3.1.aarch64", "openSUSE Leap 15.4:busybox-testsuite-1.35.0-150400.3.3.1.ppc64le", "openSUSE Leap 15.4:busybox-testsuite-1.35.0-150400.3.3.1.s390x", "openSUSE Leap 15.4:busybox-testsuite-1.35.0-150400.3.3.1.x86_64", "openSUSE Leap 15.4:busybox-warewulf3-1.35.0-150400.3.3.1.aarch64", "openSUSE Leap 15.4:busybox-warewulf3-1.35.0-150400.3.3.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 6.4, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-1.35.0-150400.3.3.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-1.35.0-150400.3.3.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-1.35.0-150400.3.3.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-1.35.0-150400.3.3.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-static-1.35.0-150400.3.3.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-static-1.35.0-150400.3.3.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-static-1.35.0-150400.3.3.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-static-1.35.0-150400.3.3.1.x86_64", "openSUSE Leap 15.4:busybox-1.35.0-150400.3.3.1.aarch64", "openSUSE Leap 15.4:busybox-1.35.0-150400.3.3.1.ppc64le", "openSUSE Leap 15.4:busybox-1.35.0-150400.3.3.1.s390x", "openSUSE Leap 15.4:busybox-1.35.0-150400.3.3.1.x86_64", "openSUSE Leap 15.4:busybox-static-1.35.0-150400.3.3.1.aarch64", "openSUSE Leap 15.4:busybox-static-1.35.0-150400.3.3.1.ppc64le", "openSUSE Leap 15.4:busybox-static-1.35.0-150400.3.3.1.s390x", "openSUSE Leap 15.4:busybox-static-1.35.0-150400.3.3.1.x86_64", "openSUSE Leap 15.4:busybox-testsuite-1.35.0-150400.3.3.1.aarch64", "openSUSE Leap 15.4:busybox-testsuite-1.35.0-150400.3.3.1.ppc64le", "openSUSE Leap 15.4:busybox-testsuite-1.35.0-150400.3.3.1.s390x", "openSUSE Leap 15.4:busybox-testsuite-1.35.0-150400.3.3.1.x86_64", "openSUSE Leap 15.4:busybox-warewulf3-1.35.0-150400.3.3.1.aarch64", "openSUSE Leap 15.4:busybox-warewulf3-1.35.0-150400.3.3.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2022-11-11T14:38:22Z", details: "moderate", }, ], title: "CVE-2021-42377", }, { cve: "CVE-2021-42378", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2021-42378", }, ], notes: [ { category: "general", text: "A use-after-free in Busybox's awk applet leads to denial of service and possibly code execution when processing a crafted awk pattern in the getvar_i function", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-1.35.0-150400.3.3.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-1.35.0-150400.3.3.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-1.35.0-150400.3.3.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-1.35.0-150400.3.3.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-static-1.35.0-150400.3.3.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-static-1.35.0-150400.3.3.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-static-1.35.0-150400.3.3.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-static-1.35.0-150400.3.3.1.x86_64", "openSUSE Leap 15.4:busybox-1.35.0-150400.3.3.1.aarch64", "openSUSE Leap 15.4:busybox-1.35.0-150400.3.3.1.ppc64le", "openSUSE Leap 15.4:busybox-1.35.0-150400.3.3.1.s390x", "openSUSE Leap 15.4:busybox-1.35.0-150400.3.3.1.x86_64", "openSUSE Leap 15.4:busybox-static-1.35.0-150400.3.3.1.aarch64", "openSUSE Leap 15.4:busybox-static-1.35.0-150400.3.3.1.ppc64le", "openSUSE Leap 15.4:busybox-static-1.35.0-150400.3.3.1.s390x", "openSUSE Leap 15.4:busybox-static-1.35.0-150400.3.3.1.x86_64", "openSUSE Leap 15.4:busybox-testsuite-1.35.0-150400.3.3.1.aarch64", "openSUSE Leap 15.4:busybox-testsuite-1.35.0-150400.3.3.1.ppc64le", "openSUSE Leap 15.4:busybox-testsuite-1.35.0-150400.3.3.1.s390x", "openSUSE Leap 15.4:busybox-testsuite-1.35.0-150400.3.3.1.x86_64", "openSUSE Leap 15.4:busybox-warewulf3-1.35.0-150400.3.3.1.aarch64", "openSUSE Leap 15.4:busybox-warewulf3-1.35.0-150400.3.3.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2021-42378", url: "https://www.suse.com/security/cve/CVE-2021-42378", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-1.35.0-150400.3.3.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-1.35.0-150400.3.3.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-1.35.0-150400.3.3.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-1.35.0-150400.3.3.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-static-1.35.0-150400.3.3.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-static-1.35.0-150400.3.3.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-static-1.35.0-150400.3.3.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-static-1.35.0-150400.3.3.1.x86_64", "openSUSE Leap 15.4:busybox-1.35.0-150400.3.3.1.aarch64", "openSUSE Leap 15.4:busybox-1.35.0-150400.3.3.1.ppc64le", "openSUSE Leap 15.4:busybox-1.35.0-150400.3.3.1.s390x", "openSUSE Leap 15.4:busybox-1.35.0-150400.3.3.1.x86_64", "openSUSE Leap 15.4:busybox-static-1.35.0-150400.3.3.1.aarch64", "openSUSE Leap 15.4:busybox-static-1.35.0-150400.3.3.1.ppc64le", "openSUSE Leap 15.4:busybox-static-1.35.0-150400.3.3.1.s390x", "openSUSE Leap 15.4:busybox-static-1.35.0-150400.3.3.1.x86_64", "openSUSE Leap 15.4:busybox-testsuite-1.35.0-150400.3.3.1.aarch64", "openSUSE Leap 15.4:busybox-testsuite-1.35.0-150400.3.3.1.ppc64le", "openSUSE Leap 15.4:busybox-testsuite-1.35.0-150400.3.3.1.s390x", "openSUSE Leap 15.4:busybox-testsuite-1.35.0-150400.3.3.1.x86_64", "openSUSE Leap 15.4:busybox-warewulf3-1.35.0-150400.3.3.1.aarch64", "openSUSE Leap 15.4:busybox-warewulf3-1.35.0-150400.3.3.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 6.6, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-1.35.0-150400.3.3.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-1.35.0-150400.3.3.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-1.35.0-150400.3.3.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-1.35.0-150400.3.3.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-static-1.35.0-150400.3.3.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-static-1.35.0-150400.3.3.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-static-1.35.0-150400.3.3.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-static-1.35.0-150400.3.3.1.x86_64", "openSUSE Leap 15.4:busybox-1.35.0-150400.3.3.1.aarch64", "openSUSE Leap 15.4:busybox-1.35.0-150400.3.3.1.ppc64le", "openSUSE Leap 15.4:busybox-1.35.0-150400.3.3.1.s390x", "openSUSE Leap 15.4:busybox-1.35.0-150400.3.3.1.x86_64", "openSUSE Leap 15.4:busybox-static-1.35.0-150400.3.3.1.aarch64", "openSUSE Leap 15.4:busybox-static-1.35.0-150400.3.3.1.ppc64le", "openSUSE Leap 15.4:busybox-static-1.35.0-150400.3.3.1.s390x", "openSUSE Leap 15.4:busybox-static-1.35.0-150400.3.3.1.x86_64", "openSUSE Leap 15.4:busybox-testsuite-1.35.0-150400.3.3.1.aarch64", "openSUSE Leap 15.4:busybox-testsuite-1.35.0-150400.3.3.1.ppc64le", "openSUSE Leap 15.4:busybox-testsuite-1.35.0-150400.3.3.1.s390x", "openSUSE Leap 15.4:busybox-testsuite-1.35.0-150400.3.3.1.x86_64", "openSUSE Leap 15.4:busybox-warewulf3-1.35.0-150400.3.3.1.aarch64", "openSUSE Leap 15.4:busybox-warewulf3-1.35.0-150400.3.3.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2022-11-11T14:38:22Z", details: "moderate", }, ], title: "CVE-2021-42378", }, { cve: "CVE-2021-42379", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2021-42379", }, ], notes: [ { category: "general", text: "A use-after-free in Busybox's awk applet leads to denial of service and possibly code execution when processing a crafted awk pattern in the next_input_file function", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-1.35.0-150400.3.3.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-1.35.0-150400.3.3.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-1.35.0-150400.3.3.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-1.35.0-150400.3.3.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-static-1.35.0-150400.3.3.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-static-1.35.0-150400.3.3.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-static-1.35.0-150400.3.3.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-static-1.35.0-150400.3.3.1.x86_64", "openSUSE Leap 15.4:busybox-1.35.0-150400.3.3.1.aarch64", "openSUSE Leap 15.4:busybox-1.35.0-150400.3.3.1.ppc64le", "openSUSE Leap 15.4:busybox-1.35.0-150400.3.3.1.s390x", "openSUSE Leap 15.4:busybox-1.35.0-150400.3.3.1.x86_64", "openSUSE Leap 15.4:busybox-static-1.35.0-150400.3.3.1.aarch64", "openSUSE Leap 15.4:busybox-static-1.35.0-150400.3.3.1.ppc64le", "openSUSE Leap 15.4:busybox-static-1.35.0-150400.3.3.1.s390x", "openSUSE Leap 15.4:busybox-static-1.35.0-150400.3.3.1.x86_64", "openSUSE Leap 15.4:busybox-testsuite-1.35.0-150400.3.3.1.aarch64", "openSUSE Leap 15.4:busybox-testsuite-1.35.0-150400.3.3.1.ppc64le", "openSUSE Leap 15.4:busybox-testsuite-1.35.0-150400.3.3.1.s390x", "openSUSE Leap 15.4:busybox-testsuite-1.35.0-150400.3.3.1.x86_64", "openSUSE Leap 15.4:busybox-warewulf3-1.35.0-150400.3.3.1.aarch64", "openSUSE Leap 15.4:busybox-warewulf3-1.35.0-150400.3.3.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2021-42379", url: "https://www.suse.com/security/cve/CVE-2021-42379", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-1.35.0-150400.3.3.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-1.35.0-150400.3.3.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-1.35.0-150400.3.3.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-1.35.0-150400.3.3.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-static-1.35.0-150400.3.3.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-static-1.35.0-150400.3.3.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-static-1.35.0-150400.3.3.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-static-1.35.0-150400.3.3.1.x86_64", "openSUSE Leap 15.4:busybox-1.35.0-150400.3.3.1.aarch64", "openSUSE Leap 15.4:busybox-1.35.0-150400.3.3.1.ppc64le", "openSUSE Leap 15.4:busybox-1.35.0-150400.3.3.1.s390x", "openSUSE Leap 15.4:busybox-1.35.0-150400.3.3.1.x86_64", "openSUSE Leap 15.4:busybox-static-1.35.0-150400.3.3.1.aarch64", "openSUSE Leap 15.4:busybox-static-1.35.0-150400.3.3.1.ppc64le", "openSUSE Leap 15.4:busybox-static-1.35.0-150400.3.3.1.s390x", "openSUSE Leap 15.4:busybox-static-1.35.0-150400.3.3.1.x86_64", "openSUSE Leap 15.4:busybox-testsuite-1.35.0-150400.3.3.1.aarch64", "openSUSE Leap 15.4:busybox-testsuite-1.35.0-150400.3.3.1.ppc64le", "openSUSE Leap 15.4:busybox-testsuite-1.35.0-150400.3.3.1.s390x", "openSUSE Leap 15.4:busybox-testsuite-1.35.0-150400.3.3.1.x86_64", "openSUSE Leap 15.4:busybox-warewulf3-1.35.0-150400.3.3.1.aarch64", "openSUSE Leap 15.4:busybox-warewulf3-1.35.0-150400.3.3.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 6.6, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-1.35.0-150400.3.3.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-1.35.0-150400.3.3.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-1.35.0-150400.3.3.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-1.35.0-150400.3.3.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-static-1.35.0-150400.3.3.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-static-1.35.0-150400.3.3.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-static-1.35.0-150400.3.3.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-static-1.35.0-150400.3.3.1.x86_64", "openSUSE Leap 15.4:busybox-1.35.0-150400.3.3.1.aarch64", "openSUSE Leap 15.4:busybox-1.35.0-150400.3.3.1.ppc64le", "openSUSE Leap 15.4:busybox-1.35.0-150400.3.3.1.s390x", "openSUSE Leap 15.4:busybox-1.35.0-150400.3.3.1.x86_64", "openSUSE Leap 15.4:busybox-static-1.35.0-150400.3.3.1.aarch64", "openSUSE Leap 15.4:busybox-static-1.35.0-150400.3.3.1.ppc64le", "openSUSE Leap 15.4:busybox-static-1.35.0-150400.3.3.1.s390x", "openSUSE Leap 15.4:busybox-static-1.35.0-150400.3.3.1.x86_64", "openSUSE Leap 15.4:busybox-testsuite-1.35.0-150400.3.3.1.aarch64", "openSUSE Leap 15.4:busybox-testsuite-1.35.0-150400.3.3.1.ppc64le", "openSUSE Leap 15.4:busybox-testsuite-1.35.0-150400.3.3.1.s390x", "openSUSE Leap 15.4:busybox-testsuite-1.35.0-150400.3.3.1.x86_64", "openSUSE Leap 15.4:busybox-warewulf3-1.35.0-150400.3.3.1.aarch64", "openSUSE Leap 15.4:busybox-warewulf3-1.35.0-150400.3.3.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2022-11-11T14:38:22Z", details: "moderate", }, ], title: "CVE-2021-42379", }, { cve: "CVE-2021-42380", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2021-42380", }, ], notes: [ { category: "general", text: "A use-after-free in Busybox's awk applet leads to denial of service and possibly code execution when processing a crafted awk pattern in the clrvar function", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-1.35.0-150400.3.3.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-1.35.0-150400.3.3.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-1.35.0-150400.3.3.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-1.35.0-150400.3.3.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-static-1.35.0-150400.3.3.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-static-1.35.0-150400.3.3.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-static-1.35.0-150400.3.3.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-static-1.35.0-150400.3.3.1.x86_64", "openSUSE Leap 15.4:busybox-1.35.0-150400.3.3.1.aarch64", "openSUSE Leap 15.4:busybox-1.35.0-150400.3.3.1.ppc64le", "openSUSE Leap 15.4:busybox-1.35.0-150400.3.3.1.s390x", "openSUSE Leap 15.4:busybox-1.35.0-150400.3.3.1.x86_64", "openSUSE Leap 15.4:busybox-static-1.35.0-150400.3.3.1.aarch64", "openSUSE Leap 15.4:busybox-static-1.35.0-150400.3.3.1.ppc64le", "openSUSE Leap 15.4:busybox-static-1.35.0-150400.3.3.1.s390x", "openSUSE Leap 15.4:busybox-static-1.35.0-150400.3.3.1.x86_64", "openSUSE Leap 15.4:busybox-testsuite-1.35.0-150400.3.3.1.aarch64", "openSUSE Leap 15.4:busybox-testsuite-1.35.0-150400.3.3.1.ppc64le", "openSUSE Leap 15.4:busybox-testsuite-1.35.0-150400.3.3.1.s390x", "openSUSE Leap 15.4:busybox-testsuite-1.35.0-150400.3.3.1.x86_64", "openSUSE Leap 15.4:busybox-warewulf3-1.35.0-150400.3.3.1.aarch64", "openSUSE Leap 15.4:busybox-warewulf3-1.35.0-150400.3.3.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2021-42380", url: "https://www.suse.com/security/cve/CVE-2021-42380", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-1.35.0-150400.3.3.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-1.35.0-150400.3.3.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-1.35.0-150400.3.3.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-1.35.0-150400.3.3.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-static-1.35.0-150400.3.3.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-static-1.35.0-150400.3.3.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-static-1.35.0-150400.3.3.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-static-1.35.0-150400.3.3.1.x86_64", "openSUSE Leap 15.4:busybox-1.35.0-150400.3.3.1.aarch64", "openSUSE Leap 15.4:busybox-1.35.0-150400.3.3.1.ppc64le", "openSUSE Leap 15.4:busybox-1.35.0-150400.3.3.1.s390x", "openSUSE Leap 15.4:busybox-1.35.0-150400.3.3.1.x86_64", "openSUSE Leap 15.4:busybox-static-1.35.0-150400.3.3.1.aarch64", "openSUSE Leap 15.4:busybox-static-1.35.0-150400.3.3.1.ppc64le", "openSUSE Leap 15.4:busybox-static-1.35.0-150400.3.3.1.s390x", "openSUSE Leap 15.4:busybox-static-1.35.0-150400.3.3.1.x86_64", "openSUSE Leap 15.4:busybox-testsuite-1.35.0-150400.3.3.1.aarch64", "openSUSE Leap 15.4:busybox-testsuite-1.35.0-150400.3.3.1.ppc64le", "openSUSE Leap 15.4:busybox-testsuite-1.35.0-150400.3.3.1.s390x", "openSUSE Leap 15.4:busybox-testsuite-1.35.0-150400.3.3.1.x86_64", "openSUSE Leap 15.4:busybox-warewulf3-1.35.0-150400.3.3.1.aarch64", "openSUSE Leap 15.4:busybox-warewulf3-1.35.0-150400.3.3.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 6.6, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-1.35.0-150400.3.3.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-1.35.0-150400.3.3.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-1.35.0-150400.3.3.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-1.35.0-150400.3.3.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-static-1.35.0-150400.3.3.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-static-1.35.0-150400.3.3.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-static-1.35.0-150400.3.3.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-static-1.35.0-150400.3.3.1.x86_64", "openSUSE Leap 15.4:busybox-1.35.0-150400.3.3.1.aarch64", "openSUSE Leap 15.4:busybox-1.35.0-150400.3.3.1.ppc64le", "openSUSE Leap 15.4:busybox-1.35.0-150400.3.3.1.s390x", "openSUSE Leap 15.4:busybox-1.35.0-150400.3.3.1.x86_64", "openSUSE Leap 15.4:busybox-static-1.35.0-150400.3.3.1.aarch64", "openSUSE Leap 15.4:busybox-static-1.35.0-150400.3.3.1.ppc64le", "openSUSE Leap 15.4:busybox-static-1.35.0-150400.3.3.1.s390x", "openSUSE Leap 15.4:busybox-static-1.35.0-150400.3.3.1.x86_64", "openSUSE Leap 15.4:busybox-testsuite-1.35.0-150400.3.3.1.aarch64", "openSUSE Leap 15.4:busybox-testsuite-1.35.0-150400.3.3.1.ppc64le", "openSUSE Leap 15.4:busybox-testsuite-1.35.0-150400.3.3.1.s390x", "openSUSE Leap 15.4:busybox-testsuite-1.35.0-150400.3.3.1.x86_64", "openSUSE Leap 15.4:busybox-warewulf3-1.35.0-150400.3.3.1.aarch64", "openSUSE Leap 15.4:busybox-warewulf3-1.35.0-150400.3.3.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2022-11-11T14:38:22Z", details: "moderate", }, ], title: "CVE-2021-42380", }, { cve: "CVE-2021-42381", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2021-42381", }, ], notes: [ { category: "general", text: "A use-after-free in Busybox's awk applet leads to denial of service and possibly code execution when processing a crafted awk pattern in the hash_init function", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-1.35.0-150400.3.3.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-1.35.0-150400.3.3.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-1.35.0-150400.3.3.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-1.35.0-150400.3.3.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-static-1.35.0-150400.3.3.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-static-1.35.0-150400.3.3.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-static-1.35.0-150400.3.3.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-static-1.35.0-150400.3.3.1.x86_64", "openSUSE Leap 15.4:busybox-1.35.0-150400.3.3.1.aarch64", "openSUSE Leap 15.4:busybox-1.35.0-150400.3.3.1.ppc64le", "openSUSE Leap 15.4:busybox-1.35.0-150400.3.3.1.s390x", "openSUSE Leap 15.4:busybox-1.35.0-150400.3.3.1.x86_64", "openSUSE Leap 15.4:busybox-static-1.35.0-150400.3.3.1.aarch64", "openSUSE Leap 15.4:busybox-static-1.35.0-150400.3.3.1.ppc64le", "openSUSE Leap 15.4:busybox-static-1.35.0-150400.3.3.1.s390x", "openSUSE Leap 15.4:busybox-static-1.35.0-150400.3.3.1.x86_64", "openSUSE Leap 15.4:busybox-testsuite-1.35.0-150400.3.3.1.aarch64", "openSUSE Leap 15.4:busybox-testsuite-1.35.0-150400.3.3.1.ppc64le", "openSUSE Leap 15.4:busybox-testsuite-1.35.0-150400.3.3.1.s390x", "openSUSE Leap 15.4:busybox-testsuite-1.35.0-150400.3.3.1.x86_64", "openSUSE Leap 15.4:busybox-warewulf3-1.35.0-150400.3.3.1.aarch64", "openSUSE Leap 15.4:busybox-warewulf3-1.35.0-150400.3.3.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2021-42381", url: "https://www.suse.com/security/cve/CVE-2021-42381", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-1.35.0-150400.3.3.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-1.35.0-150400.3.3.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-1.35.0-150400.3.3.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-1.35.0-150400.3.3.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-static-1.35.0-150400.3.3.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-static-1.35.0-150400.3.3.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-static-1.35.0-150400.3.3.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-static-1.35.0-150400.3.3.1.x86_64", "openSUSE Leap 15.4:busybox-1.35.0-150400.3.3.1.aarch64", "openSUSE Leap 15.4:busybox-1.35.0-150400.3.3.1.ppc64le", "openSUSE Leap 15.4:busybox-1.35.0-150400.3.3.1.s390x", "openSUSE Leap 15.4:busybox-1.35.0-150400.3.3.1.x86_64", "openSUSE Leap 15.4:busybox-static-1.35.0-150400.3.3.1.aarch64", "openSUSE Leap 15.4:busybox-static-1.35.0-150400.3.3.1.ppc64le", "openSUSE Leap 15.4:busybox-static-1.35.0-150400.3.3.1.s390x", "openSUSE Leap 15.4:busybox-static-1.35.0-150400.3.3.1.x86_64", "openSUSE Leap 15.4:busybox-testsuite-1.35.0-150400.3.3.1.aarch64", "openSUSE Leap 15.4:busybox-testsuite-1.35.0-150400.3.3.1.ppc64le", "openSUSE Leap 15.4:busybox-testsuite-1.35.0-150400.3.3.1.s390x", "openSUSE Leap 15.4:busybox-testsuite-1.35.0-150400.3.3.1.x86_64", "openSUSE Leap 15.4:busybox-warewulf3-1.35.0-150400.3.3.1.aarch64", "openSUSE Leap 15.4:busybox-warewulf3-1.35.0-150400.3.3.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 6.6, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-1.35.0-150400.3.3.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-1.35.0-150400.3.3.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-1.35.0-150400.3.3.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-1.35.0-150400.3.3.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-static-1.35.0-150400.3.3.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-static-1.35.0-150400.3.3.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-static-1.35.0-150400.3.3.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-static-1.35.0-150400.3.3.1.x86_64", "openSUSE Leap 15.4:busybox-1.35.0-150400.3.3.1.aarch64", "openSUSE Leap 15.4:busybox-1.35.0-150400.3.3.1.ppc64le", "openSUSE Leap 15.4:busybox-1.35.0-150400.3.3.1.s390x", "openSUSE Leap 15.4:busybox-1.35.0-150400.3.3.1.x86_64", "openSUSE Leap 15.4:busybox-static-1.35.0-150400.3.3.1.aarch64", "openSUSE Leap 15.4:busybox-static-1.35.0-150400.3.3.1.ppc64le", "openSUSE Leap 15.4:busybox-static-1.35.0-150400.3.3.1.s390x", "openSUSE Leap 15.4:busybox-static-1.35.0-150400.3.3.1.x86_64", "openSUSE Leap 15.4:busybox-testsuite-1.35.0-150400.3.3.1.aarch64", "openSUSE Leap 15.4:busybox-testsuite-1.35.0-150400.3.3.1.ppc64le", "openSUSE Leap 15.4:busybox-testsuite-1.35.0-150400.3.3.1.s390x", "openSUSE Leap 15.4:busybox-testsuite-1.35.0-150400.3.3.1.x86_64", "openSUSE Leap 15.4:busybox-warewulf3-1.35.0-150400.3.3.1.aarch64", "openSUSE Leap 15.4:busybox-warewulf3-1.35.0-150400.3.3.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2022-11-11T14:38:22Z", details: "moderate", }, ], title: "CVE-2021-42381", }, { cve: "CVE-2021-42382", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2021-42382", }, ], notes: [ { category: "general", text: "A use-after-free in Busybox's awk applet leads to denial of service and possibly code execution when processing a crafted awk pattern in the getvar_s function", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-1.35.0-150400.3.3.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-1.35.0-150400.3.3.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-1.35.0-150400.3.3.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-1.35.0-150400.3.3.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-static-1.35.0-150400.3.3.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-static-1.35.0-150400.3.3.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-static-1.35.0-150400.3.3.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-static-1.35.0-150400.3.3.1.x86_64", "openSUSE Leap 15.4:busybox-1.35.0-150400.3.3.1.aarch64", "openSUSE Leap 15.4:busybox-1.35.0-150400.3.3.1.ppc64le", "openSUSE Leap 15.4:busybox-1.35.0-150400.3.3.1.s390x", "openSUSE Leap 15.4:busybox-1.35.0-150400.3.3.1.x86_64", "openSUSE Leap 15.4:busybox-static-1.35.0-150400.3.3.1.aarch64", "openSUSE Leap 15.4:busybox-static-1.35.0-150400.3.3.1.ppc64le", "openSUSE Leap 15.4:busybox-static-1.35.0-150400.3.3.1.s390x", "openSUSE Leap 15.4:busybox-static-1.35.0-150400.3.3.1.x86_64", "openSUSE Leap 15.4:busybox-testsuite-1.35.0-150400.3.3.1.aarch64", "openSUSE Leap 15.4:busybox-testsuite-1.35.0-150400.3.3.1.ppc64le", "openSUSE Leap 15.4:busybox-testsuite-1.35.0-150400.3.3.1.s390x", "openSUSE Leap 15.4:busybox-testsuite-1.35.0-150400.3.3.1.x86_64", "openSUSE Leap 15.4:busybox-warewulf3-1.35.0-150400.3.3.1.aarch64", "openSUSE Leap 15.4:busybox-warewulf3-1.35.0-150400.3.3.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2021-42382", url: "https://www.suse.com/security/cve/CVE-2021-42382", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-1.35.0-150400.3.3.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-1.35.0-150400.3.3.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-1.35.0-150400.3.3.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-1.35.0-150400.3.3.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-static-1.35.0-150400.3.3.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-static-1.35.0-150400.3.3.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-static-1.35.0-150400.3.3.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-static-1.35.0-150400.3.3.1.x86_64", "openSUSE Leap 15.4:busybox-1.35.0-150400.3.3.1.aarch64", "openSUSE Leap 15.4:busybox-1.35.0-150400.3.3.1.ppc64le", "openSUSE Leap 15.4:busybox-1.35.0-150400.3.3.1.s390x", "openSUSE Leap 15.4:busybox-1.35.0-150400.3.3.1.x86_64", "openSUSE Leap 15.4:busybox-static-1.35.0-150400.3.3.1.aarch64", "openSUSE Leap 15.4:busybox-static-1.35.0-150400.3.3.1.ppc64le", "openSUSE Leap 15.4:busybox-static-1.35.0-150400.3.3.1.s390x", "openSUSE Leap 15.4:busybox-static-1.35.0-150400.3.3.1.x86_64", "openSUSE Leap 15.4:busybox-testsuite-1.35.0-150400.3.3.1.aarch64", "openSUSE Leap 15.4:busybox-testsuite-1.35.0-150400.3.3.1.ppc64le", "openSUSE Leap 15.4:busybox-testsuite-1.35.0-150400.3.3.1.s390x", "openSUSE Leap 15.4:busybox-testsuite-1.35.0-150400.3.3.1.x86_64", "openSUSE Leap 15.4:busybox-warewulf3-1.35.0-150400.3.3.1.aarch64", "openSUSE Leap 15.4:busybox-warewulf3-1.35.0-150400.3.3.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 6.6, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-1.35.0-150400.3.3.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-1.35.0-150400.3.3.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-1.35.0-150400.3.3.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-1.35.0-150400.3.3.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-static-1.35.0-150400.3.3.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-static-1.35.0-150400.3.3.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-static-1.35.0-150400.3.3.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-static-1.35.0-150400.3.3.1.x86_64", "openSUSE Leap 15.4:busybox-1.35.0-150400.3.3.1.aarch64", "openSUSE Leap 15.4:busybox-1.35.0-150400.3.3.1.ppc64le", "openSUSE Leap 15.4:busybox-1.35.0-150400.3.3.1.s390x", "openSUSE Leap 15.4:busybox-1.35.0-150400.3.3.1.x86_64", "openSUSE Leap 15.4:busybox-static-1.35.0-150400.3.3.1.aarch64", "openSUSE Leap 15.4:busybox-static-1.35.0-150400.3.3.1.ppc64le", "openSUSE Leap 15.4:busybox-static-1.35.0-150400.3.3.1.s390x", "openSUSE Leap 15.4:busybox-static-1.35.0-150400.3.3.1.x86_64", "openSUSE Leap 15.4:busybox-testsuite-1.35.0-150400.3.3.1.aarch64", "openSUSE Leap 15.4:busybox-testsuite-1.35.0-150400.3.3.1.ppc64le", "openSUSE Leap 15.4:busybox-testsuite-1.35.0-150400.3.3.1.s390x", "openSUSE Leap 15.4:busybox-testsuite-1.35.0-150400.3.3.1.x86_64", "openSUSE Leap 15.4:busybox-warewulf3-1.35.0-150400.3.3.1.aarch64", "openSUSE Leap 15.4:busybox-warewulf3-1.35.0-150400.3.3.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2022-11-11T14:38:22Z", details: "moderate", }, ], title: "CVE-2021-42382", }, { cve: "CVE-2021-42383", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2021-42383", }, ], notes: [ { category: "general", text: "A use-after-free in Busybox's awk applet leads to denial of service and possibly code execution when processing a crafted awk pattern in the evaluate function", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-1.35.0-150400.3.3.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-1.35.0-150400.3.3.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-1.35.0-150400.3.3.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-1.35.0-150400.3.3.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-static-1.35.0-150400.3.3.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-static-1.35.0-150400.3.3.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-static-1.35.0-150400.3.3.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-static-1.35.0-150400.3.3.1.x86_64", "openSUSE Leap 15.4:busybox-1.35.0-150400.3.3.1.aarch64", "openSUSE Leap 15.4:busybox-1.35.0-150400.3.3.1.ppc64le", "openSUSE Leap 15.4:busybox-1.35.0-150400.3.3.1.s390x", "openSUSE Leap 15.4:busybox-1.35.0-150400.3.3.1.x86_64", "openSUSE Leap 15.4:busybox-static-1.35.0-150400.3.3.1.aarch64", "openSUSE Leap 15.4:busybox-static-1.35.0-150400.3.3.1.ppc64le", "openSUSE Leap 15.4:busybox-static-1.35.0-150400.3.3.1.s390x", "openSUSE Leap 15.4:busybox-static-1.35.0-150400.3.3.1.x86_64", "openSUSE Leap 15.4:busybox-testsuite-1.35.0-150400.3.3.1.aarch64", "openSUSE Leap 15.4:busybox-testsuite-1.35.0-150400.3.3.1.ppc64le", "openSUSE Leap 15.4:busybox-testsuite-1.35.0-150400.3.3.1.s390x", "openSUSE Leap 15.4:busybox-testsuite-1.35.0-150400.3.3.1.x86_64", "openSUSE Leap 15.4:busybox-warewulf3-1.35.0-150400.3.3.1.aarch64", "openSUSE Leap 15.4:busybox-warewulf3-1.35.0-150400.3.3.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2021-42383", url: "https://www.suse.com/security/cve/CVE-2021-42383", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-1.35.0-150400.3.3.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-1.35.0-150400.3.3.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-1.35.0-150400.3.3.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-1.35.0-150400.3.3.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-static-1.35.0-150400.3.3.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-static-1.35.0-150400.3.3.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-static-1.35.0-150400.3.3.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-static-1.35.0-150400.3.3.1.x86_64", "openSUSE Leap 15.4:busybox-1.35.0-150400.3.3.1.aarch64", "openSUSE Leap 15.4:busybox-1.35.0-150400.3.3.1.ppc64le", "openSUSE Leap 15.4:busybox-1.35.0-150400.3.3.1.s390x", "openSUSE Leap 15.4:busybox-1.35.0-150400.3.3.1.x86_64", "openSUSE Leap 15.4:busybox-static-1.35.0-150400.3.3.1.aarch64", "openSUSE Leap 15.4:busybox-static-1.35.0-150400.3.3.1.ppc64le", "openSUSE Leap 15.4:busybox-static-1.35.0-150400.3.3.1.s390x", "openSUSE Leap 15.4:busybox-static-1.35.0-150400.3.3.1.x86_64", "openSUSE Leap 15.4:busybox-testsuite-1.35.0-150400.3.3.1.aarch64", "openSUSE Leap 15.4:busybox-testsuite-1.35.0-150400.3.3.1.ppc64le", "openSUSE Leap 15.4:busybox-testsuite-1.35.0-150400.3.3.1.s390x", "openSUSE Leap 15.4:busybox-testsuite-1.35.0-150400.3.3.1.x86_64", "openSUSE Leap 15.4:busybox-warewulf3-1.35.0-150400.3.3.1.aarch64", "openSUSE Leap 15.4:busybox-warewulf3-1.35.0-150400.3.3.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 6.6, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-1.35.0-150400.3.3.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-1.35.0-150400.3.3.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-1.35.0-150400.3.3.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-1.35.0-150400.3.3.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-static-1.35.0-150400.3.3.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-static-1.35.0-150400.3.3.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-static-1.35.0-150400.3.3.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-static-1.35.0-150400.3.3.1.x86_64", "openSUSE Leap 15.4:busybox-1.35.0-150400.3.3.1.aarch64", "openSUSE Leap 15.4:busybox-1.35.0-150400.3.3.1.ppc64le", "openSUSE Leap 15.4:busybox-1.35.0-150400.3.3.1.s390x", "openSUSE Leap 15.4:busybox-1.35.0-150400.3.3.1.x86_64", "openSUSE Leap 15.4:busybox-static-1.35.0-150400.3.3.1.aarch64", "openSUSE Leap 15.4:busybox-static-1.35.0-150400.3.3.1.ppc64le", "openSUSE Leap 15.4:busybox-static-1.35.0-150400.3.3.1.s390x", "openSUSE Leap 15.4:busybox-static-1.35.0-150400.3.3.1.x86_64", "openSUSE Leap 15.4:busybox-testsuite-1.35.0-150400.3.3.1.aarch64", "openSUSE Leap 15.4:busybox-testsuite-1.35.0-150400.3.3.1.ppc64le", "openSUSE Leap 15.4:busybox-testsuite-1.35.0-150400.3.3.1.s390x", "openSUSE Leap 15.4:busybox-testsuite-1.35.0-150400.3.3.1.x86_64", "openSUSE Leap 15.4:busybox-warewulf3-1.35.0-150400.3.3.1.aarch64", "openSUSE Leap 15.4:busybox-warewulf3-1.35.0-150400.3.3.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2022-11-11T14:38:22Z", details: "moderate", }, ], title: "CVE-2021-42383", }, { cve: "CVE-2021-42384", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2021-42384", }, ], notes: [ { category: "general", text: "A use-after-free in Busybox's awk applet leads to denial of service and possibly code execution when processing a crafted awk pattern in the handle_special function", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-1.35.0-150400.3.3.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-1.35.0-150400.3.3.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-1.35.0-150400.3.3.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-1.35.0-150400.3.3.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-static-1.35.0-150400.3.3.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-static-1.35.0-150400.3.3.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-static-1.35.0-150400.3.3.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-static-1.35.0-150400.3.3.1.x86_64", "openSUSE Leap 15.4:busybox-1.35.0-150400.3.3.1.aarch64", "openSUSE Leap 15.4:busybox-1.35.0-150400.3.3.1.ppc64le", "openSUSE Leap 15.4:busybox-1.35.0-150400.3.3.1.s390x", "openSUSE Leap 15.4:busybox-1.35.0-150400.3.3.1.x86_64", "openSUSE Leap 15.4:busybox-static-1.35.0-150400.3.3.1.aarch64", "openSUSE Leap 15.4:busybox-static-1.35.0-150400.3.3.1.ppc64le", "openSUSE Leap 15.4:busybox-static-1.35.0-150400.3.3.1.s390x", "openSUSE Leap 15.4:busybox-static-1.35.0-150400.3.3.1.x86_64", "openSUSE Leap 15.4:busybox-testsuite-1.35.0-150400.3.3.1.aarch64", "openSUSE Leap 15.4:busybox-testsuite-1.35.0-150400.3.3.1.ppc64le", "openSUSE Leap 15.4:busybox-testsuite-1.35.0-150400.3.3.1.s390x", "openSUSE Leap 15.4:busybox-testsuite-1.35.0-150400.3.3.1.x86_64", "openSUSE Leap 15.4:busybox-warewulf3-1.35.0-150400.3.3.1.aarch64", "openSUSE Leap 15.4:busybox-warewulf3-1.35.0-150400.3.3.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2021-42384", url: "https://www.suse.com/security/cve/CVE-2021-42384", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-1.35.0-150400.3.3.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-1.35.0-150400.3.3.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-1.35.0-150400.3.3.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-1.35.0-150400.3.3.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-static-1.35.0-150400.3.3.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-static-1.35.0-150400.3.3.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-static-1.35.0-150400.3.3.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-static-1.35.0-150400.3.3.1.x86_64", "openSUSE Leap 15.4:busybox-1.35.0-150400.3.3.1.aarch64", "openSUSE Leap 15.4:busybox-1.35.0-150400.3.3.1.ppc64le", "openSUSE Leap 15.4:busybox-1.35.0-150400.3.3.1.s390x", "openSUSE Leap 15.4:busybox-1.35.0-150400.3.3.1.x86_64", "openSUSE Leap 15.4:busybox-static-1.35.0-150400.3.3.1.aarch64", "openSUSE Leap 15.4:busybox-static-1.35.0-150400.3.3.1.ppc64le", "openSUSE Leap 15.4:busybox-static-1.35.0-150400.3.3.1.s390x", "openSUSE Leap 15.4:busybox-static-1.35.0-150400.3.3.1.x86_64", "openSUSE Leap 15.4:busybox-testsuite-1.35.0-150400.3.3.1.aarch64", "openSUSE Leap 15.4:busybox-testsuite-1.35.0-150400.3.3.1.ppc64le", "openSUSE Leap 15.4:busybox-testsuite-1.35.0-150400.3.3.1.s390x", "openSUSE Leap 15.4:busybox-testsuite-1.35.0-150400.3.3.1.x86_64", "openSUSE Leap 15.4:busybox-warewulf3-1.35.0-150400.3.3.1.aarch64", "openSUSE Leap 15.4:busybox-warewulf3-1.35.0-150400.3.3.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 6.6, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-1.35.0-150400.3.3.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-1.35.0-150400.3.3.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-1.35.0-150400.3.3.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-1.35.0-150400.3.3.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-static-1.35.0-150400.3.3.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-static-1.35.0-150400.3.3.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-static-1.35.0-150400.3.3.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-static-1.35.0-150400.3.3.1.x86_64", "openSUSE Leap 15.4:busybox-1.35.0-150400.3.3.1.aarch64", "openSUSE Leap 15.4:busybox-1.35.0-150400.3.3.1.ppc64le", "openSUSE Leap 15.4:busybox-1.35.0-150400.3.3.1.s390x", "openSUSE Leap 15.4:busybox-1.35.0-150400.3.3.1.x86_64", "openSUSE Leap 15.4:busybox-static-1.35.0-150400.3.3.1.aarch64", "openSUSE Leap 15.4:busybox-static-1.35.0-150400.3.3.1.ppc64le", "openSUSE Leap 15.4:busybox-static-1.35.0-150400.3.3.1.s390x", "openSUSE Leap 15.4:busybox-static-1.35.0-150400.3.3.1.x86_64", "openSUSE Leap 15.4:busybox-testsuite-1.35.0-150400.3.3.1.aarch64", "openSUSE Leap 15.4:busybox-testsuite-1.35.0-150400.3.3.1.ppc64le", "openSUSE Leap 15.4:busybox-testsuite-1.35.0-150400.3.3.1.s390x", "openSUSE Leap 15.4:busybox-testsuite-1.35.0-150400.3.3.1.x86_64", "openSUSE Leap 15.4:busybox-warewulf3-1.35.0-150400.3.3.1.aarch64", "openSUSE Leap 15.4:busybox-warewulf3-1.35.0-150400.3.3.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2022-11-11T14:38:22Z", details: "moderate", }, ], title: "CVE-2021-42384", }, { cve: "CVE-2021-42385", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2021-42385", }, ], notes: [ { category: "general", text: "A use-after-free in Busybox's awk applet leads to denial of service and possibly code execution when processing a crafted awk pattern in the evaluate function", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-1.35.0-150400.3.3.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-1.35.0-150400.3.3.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-1.35.0-150400.3.3.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-1.35.0-150400.3.3.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-static-1.35.0-150400.3.3.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-static-1.35.0-150400.3.3.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-static-1.35.0-150400.3.3.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-static-1.35.0-150400.3.3.1.x86_64", "openSUSE Leap 15.4:busybox-1.35.0-150400.3.3.1.aarch64", "openSUSE Leap 15.4:busybox-1.35.0-150400.3.3.1.ppc64le", "openSUSE Leap 15.4:busybox-1.35.0-150400.3.3.1.s390x", "openSUSE Leap 15.4:busybox-1.35.0-150400.3.3.1.x86_64", "openSUSE Leap 15.4:busybox-static-1.35.0-150400.3.3.1.aarch64", "openSUSE Leap 15.4:busybox-static-1.35.0-150400.3.3.1.ppc64le", "openSUSE Leap 15.4:busybox-static-1.35.0-150400.3.3.1.s390x", "openSUSE Leap 15.4:busybox-static-1.35.0-150400.3.3.1.x86_64", "openSUSE Leap 15.4:busybox-testsuite-1.35.0-150400.3.3.1.aarch64", "openSUSE Leap 15.4:busybox-testsuite-1.35.0-150400.3.3.1.ppc64le", "openSUSE Leap 15.4:busybox-testsuite-1.35.0-150400.3.3.1.s390x", "openSUSE Leap 15.4:busybox-testsuite-1.35.0-150400.3.3.1.x86_64", "openSUSE Leap 15.4:busybox-warewulf3-1.35.0-150400.3.3.1.aarch64", "openSUSE Leap 15.4:busybox-warewulf3-1.35.0-150400.3.3.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2021-42385", url: "https://www.suse.com/security/cve/CVE-2021-42385", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-1.35.0-150400.3.3.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-1.35.0-150400.3.3.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-1.35.0-150400.3.3.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-1.35.0-150400.3.3.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-static-1.35.0-150400.3.3.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-static-1.35.0-150400.3.3.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-static-1.35.0-150400.3.3.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-static-1.35.0-150400.3.3.1.x86_64", "openSUSE Leap 15.4:busybox-1.35.0-150400.3.3.1.aarch64", "openSUSE Leap 15.4:busybox-1.35.0-150400.3.3.1.ppc64le", "openSUSE Leap 15.4:busybox-1.35.0-150400.3.3.1.s390x", "openSUSE Leap 15.4:busybox-1.35.0-150400.3.3.1.x86_64", "openSUSE Leap 15.4:busybox-static-1.35.0-150400.3.3.1.aarch64", "openSUSE Leap 15.4:busybox-static-1.35.0-150400.3.3.1.ppc64le", "openSUSE Leap 15.4:busybox-static-1.35.0-150400.3.3.1.s390x", "openSUSE Leap 15.4:busybox-static-1.35.0-150400.3.3.1.x86_64", "openSUSE Leap 15.4:busybox-testsuite-1.35.0-150400.3.3.1.aarch64", "openSUSE Leap 15.4:busybox-testsuite-1.35.0-150400.3.3.1.ppc64le", "openSUSE Leap 15.4:busybox-testsuite-1.35.0-150400.3.3.1.s390x", "openSUSE Leap 15.4:busybox-testsuite-1.35.0-150400.3.3.1.x86_64", "openSUSE Leap 15.4:busybox-warewulf3-1.35.0-150400.3.3.1.aarch64", "openSUSE Leap 15.4:busybox-warewulf3-1.35.0-150400.3.3.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 6.6, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-1.35.0-150400.3.3.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-1.35.0-150400.3.3.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-1.35.0-150400.3.3.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-1.35.0-150400.3.3.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-static-1.35.0-150400.3.3.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-static-1.35.0-150400.3.3.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-static-1.35.0-150400.3.3.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-static-1.35.0-150400.3.3.1.x86_64", "openSUSE Leap 15.4:busybox-1.35.0-150400.3.3.1.aarch64", "openSUSE Leap 15.4:busybox-1.35.0-150400.3.3.1.ppc64le", "openSUSE Leap 15.4:busybox-1.35.0-150400.3.3.1.s390x", "openSUSE Leap 15.4:busybox-1.35.0-150400.3.3.1.x86_64", "openSUSE Leap 15.4:busybox-static-1.35.0-150400.3.3.1.aarch64", "openSUSE Leap 15.4:busybox-static-1.35.0-150400.3.3.1.ppc64le", "openSUSE Leap 15.4:busybox-static-1.35.0-150400.3.3.1.s390x", "openSUSE Leap 15.4:busybox-static-1.35.0-150400.3.3.1.x86_64", "openSUSE Leap 15.4:busybox-testsuite-1.35.0-150400.3.3.1.aarch64", "openSUSE Leap 15.4:busybox-testsuite-1.35.0-150400.3.3.1.ppc64le", "openSUSE Leap 15.4:busybox-testsuite-1.35.0-150400.3.3.1.s390x", "openSUSE Leap 15.4:busybox-testsuite-1.35.0-150400.3.3.1.x86_64", "openSUSE Leap 15.4:busybox-warewulf3-1.35.0-150400.3.3.1.aarch64", "openSUSE Leap 15.4:busybox-warewulf3-1.35.0-150400.3.3.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2022-11-11T14:38:22Z", details: "moderate", }, ], title: "CVE-2021-42385", }, { cve: "CVE-2021-42386", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2021-42386", }, ], notes: [ { category: "general", text: "A use-after-free in Busybox's awk applet leads to denial of service and possibly code execution when processing a crafted awk pattern in the nvalloc function", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-1.35.0-150400.3.3.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-1.35.0-150400.3.3.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-1.35.0-150400.3.3.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-1.35.0-150400.3.3.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-static-1.35.0-150400.3.3.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-static-1.35.0-150400.3.3.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-static-1.35.0-150400.3.3.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-static-1.35.0-150400.3.3.1.x86_64", "openSUSE Leap 15.4:busybox-1.35.0-150400.3.3.1.aarch64", "openSUSE Leap 15.4:busybox-1.35.0-150400.3.3.1.ppc64le", "openSUSE Leap 15.4:busybox-1.35.0-150400.3.3.1.s390x", "openSUSE Leap 15.4:busybox-1.35.0-150400.3.3.1.x86_64", "openSUSE Leap 15.4:busybox-static-1.35.0-150400.3.3.1.aarch64", "openSUSE Leap 15.4:busybox-static-1.35.0-150400.3.3.1.ppc64le", "openSUSE Leap 15.4:busybox-static-1.35.0-150400.3.3.1.s390x", "openSUSE Leap 15.4:busybox-static-1.35.0-150400.3.3.1.x86_64", "openSUSE Leap 15.4:busybox-testsuite-1.35.0-150400.3.3.1.aarch64", "openSUSE Leap 15.4:busybox-testsuite-1.35.0-150400.3.3.1.ppc64le", "openSUSE Leap 15.4:busybox-testsuite-1.35.0-150400.3.3.1.s390x", "openSUSE Leap 15.4:busybox-testsuite-1.35.0-150400.3.3.1.x86_64", "openSUSE Leap 15.4:busybox-warewulf3-1.35.0-150400.3.3.1.aarch64", "openSUSE Leap 15.4:busybox-warewulf3-1.35.0-150400.3.3.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2021-42386", url: "https://www.suse.com/security/cve/CVE-2021-42386", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-1.35.0-150400.3.3.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-1.35.0-150400.3.3.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-1.35.0-150400.3.3.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-1.35.0-150400.3.3.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-static-1.35.0-150400.3.3.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-static-1.35.0-150400.3.3.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-static-1.35.0-150400.3.3.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-static-1.35.0-150400.3.3.1.x86_64", "openSUSE Leap 15.4:busybox-1.35.0-150400.3.3.1.aarch64", "openSUSE Leap 15.4:busybox-1.35.0-150400.3.3.1.ppc64le", "openSUSE Leap 15.4:busybox-1.35.0-150400.3.3.1.s390x", "openSUSE Leap 15.4:busybox-1.35.0-150400.3.3.1.x86_64", "openSUSE Leap 15.4:busybox-static-1.35.0-150400.3.3.1.aarch64", "openSUSE Leap 15.4:busybox-static-1.35.0-150400.3.3.1.ppc64le", "openSUSE Leap 15.4:busybox-static-1.35.0-150400.3.3.1.s390x", "openSUSE Leap 15.4:busybox-static-1.35.0-150400.3.3.1.x86_64", "openSUSE Leap 15.4:busybox-testsuite-1.35.0-150400.3.3.1.aarch64", "openSUSE Leap 15.4:busybox-testsuite-1.35.0-150400.3.3.1.ppc64le", "openSUSE Leap 15.4:busybox-testsuite-1.35.0-150400.3.3.1.s390x", "openSUSE Leap 15.4:busybox-testsuite-1.35.0-150400.3.3.1.x86_64", "openSUSE Leap 15.4:busybox-warewulf3-1.35.0-150400.3.3.1.aarch64", "openSUSE Leap 15.4:busybox-warewulf3-1.35.0-150400.3.3.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 6.6, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-1.35.0-150400.3.3.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-1.35.0-150400.3.3.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-1.35.0-150400.3.3.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-1.35.0-150400.3.3.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-static-1.35.0-150400.3.3.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-static-1.35.0-150400.3.3.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-static-1.35.0-150400.3.3.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-static-1.35.0-150400.3.3.1.x86_64", "openSUSE Leap 15.4:busybox-1.35.0-150400.3.3.1.aarch64", "openSUSE Leap 15.4:busybox-1.35.0-150400.3.3.1.ppc64le", "openSUSE Leap 15.4:busybox-1.35.0-150400.3.3.1.s390x", "openSUSE Leap 15.4:busybox-1.35.0-150400.3.3.1.x86_64", "openSUSE Leap 15.4:busybox-static-1.35.0-150400.3.3.1.aarch64", "openSUSE Leap 15.4:busybox-static-1.35.0-150400.3.3.1.ppc64le", "openSUSE Leap 15.4:busybox-static-1.35.0-150400.3.3.1.s390x", "openSUSE Leap 15.4:busybox-static-1.35.0-150400.3.3.1.x86_64", "openSUSE Leap 15.4:busybox-testsuite-1.35.0-150400.3.3.1.aarch64", "openSUSE Leap 15.4:busybox-testsuite-1.35.0-150400.3.3.1.ppc64le", "openSUSE Leap 15.4:busybox-testsuite-1.35.0-150400.3.3.1.s390x", "openSUSE Leap 15.4:busybox-testsuite-1.35.0-150400.3.3.1.x86_64", "openSUSE Leap 15.4:busybox-warewulf3-1.35.0-150400.3.3.1.aarch64", "openSUSE Leap 15.4:busybox-warewulf3-1.35.0-150400.3.3.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2022-11-11T14:38:22Z", details: "moderate", }, ], title: "CVE-2021-42386", }, ], }
suse-su-2022:0135-2
Vulnerability from csaf_suse
Published
2022-02-14 10:50
Modified
2022-02-14 10:50
Summary
Security update for busybox
Notes
Title of the patch
Security update for busybox
Description of the patch
This update for busybox fixes the following issues:
- CVE-2011-5325: Fixed tar directory traversal (bsc#951562).
- CVE-2015-9261: Fixed segfalts and application crashes in huft_build (bsc#1102912).
- CVE-2016-2147: Fixed out of bounds write (heap) due to integer underflow in udhcpc (bsc#970663).
- CVE-2016-2148: Fixed heap-based buffer overflow in OPTION_6RD parsing (bsc#970662).
- CVE-2016-6301: Fixed NTP server denial of service flaw (bsc#991940).
- CVE-2017-15873: Fixed integer overflow in get_next_block function in archival/libarchive/decompress_bunzip2.c (bsc#1064976).
- CVE-2017-15874: Fixed integer underflow in archival/libarchive/decompress_unlzma.c (bsc#1064978).
- CVE-2017-16544: Fixed Insufficient sanitization of filenames when autocompleting (bsc#1069412).
- CVE-2018-1000500 : Fixed missing SSL certificate validation in wget (bsc#1099263).
- CVE-2018-1000517: Fixed heap-based buffer overflow in the retrieve_file_data() (bsc#1099260).
- CVE-2018-20679: Fixed out of bounds read in udhcp (bsc#1121426).
- CVE-2019-5747: Fixed out of bounds read in udhcp components (bsc#1121428).
- CVE-2021-28831: Fixed invalid free or segmentation fault via malformed gzip data (bsc#1184522).
- CVE-2021-42373: Fixed NULL pointer dereference in man leading to DoS when a section name is supplied but no page argument is given (bsc#1192869).
- CVE-2021-42374: Fixed out-of-bounds heap read in unlzma leading to information leak and DoS when crafted LZMA-compressed input is decompressed (bsc#1192869).
- CVE-2021-42375: Fixed incorrect handling of a special element in ash leading to DoS when processing a crafted shell command, due to the shell mistaking specific characters for reserved characters (bsc#1192869).
- CVE-2021-42376: Fixed NULL pointer dereference in hush leading to DoS when processing a crafted shell command (bsc#1192869).
- CVE-2021-42377: Fixed attacker-controlled pointer free in hush leading to DoS and possible code execution when processing a crafted shell command (bsc#1192869).
- CVE-2021-42378: Fixed use-after-free in awk leading to DoS and possibly code execution when processing a crafted awk pattern in the getvar_i function (bsc#1192869).
- CVE-2021-42379: Fixed use-after-free in awk leading to DoS and possibly code execution when processing a crafted awk pattern in the next_input_file function (bsc#1192869).
- CVE-2021-42380: Fixed use-after-free in awk leading to DoS and possibly code execution when processing a crafted awk pattern in the clrvar function (bsc#1192869).
- CVE-2021-42381: Fixed use-after-free in awk leading to DoS and possibly code execution when processing a crafted awk pattern in the hash_init function (bsc#1192869).
- CVE-2021-42382: Fixed use-after-free in awk leading to DoS and possibly code execution when processing a crafted awk pattern in the getvar_s function (bsc#1192869).
- CVE-2021-42383: Fixed use-after-free in awk leading to DoS and possibly code execution when processing a crafted awk pattern in the evaluate function (bsc#1192869).
- CVE-2021-42384: Fixed use-after-free in awk leading to DoS and possibly code execution when processing a crafted awk pattern in the handle_special function (bsc#1192869).
- CVE-2021-42385: Fixed use-after-free in awk leading to DoS and possibly code execution when processing a crafted awk pattern in the evaluate function (bsc#1192869).
- CVE-2021-42386: Fixed use-after-free in awk leading to DoS and possibly code execution when processing a crafted awk pattern in the nvalloc function (bsc#1192869).
Patchnames
SUSE-2022-135,SUSE-SLE-Product-RT-15-SP2-2022-135
Terms of use
CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
{ document: { aggregate_severity: { namespace: "https://www.suse.com/support/security/rating/", text: "important", }, category: "csaf_security_advisory", csaf_version: "2.0", distribution: { text: "Copyright 2024 SUSE LLC. All rights reserved.", tlp: { label: "WHITE", url: "https://www.first.org/tlp/", }, }, lang: "en", notes: [ { category: "summary", text: "Security update for busybox", title: "Title of the patch", }, { category: "description", text: "This update for busybox fixes the following issues:\n\n- CVE-2011-5325: Fixed tar directory traversal (bsc#951562).\n- CVE-2015-9261: Fixed segfalts and application crashes in huft_build (bsc#1102912).\n- CVE-2016-2147: Fixed out of bounds write (heap) due to integer underflow in udhcpc (bsc#970663).\n- CVE-2016-2148: Fixed heap-based buffer overflow in OPTION_6RD parsing (bsc#970662).\n- CVE-2016-6301: Fixed NTP server denial of service flaw (bsc#991940).\n- CVE-2017-15873: Fixed integer overflow in get_next_block function in archival/libarchive/decompress_bunzip2.c (bsc#1064976).\n- CVE-2017-15874: Fixed integer underflow in archival/libarchive/decompress_unlzma.c (bsc#1064978).\n- CVE-2017-16544: Fixed Insufficient sanitization of filenames when autocompleting (bsc#1069412).\n- CVE-2018-1000500 : Fixed missing SSL certificate validation in wget (bsc#1099263).\n- CVE-2018-1000517: Fixed heap-based buffer overflow in the retrieve_file_data() (bsc#1099260).\n- CVE-2018-20679: Fixed out of bounds read in udhcp (bsc#1121426).\n- CVE-2019-5747: Fixed out of bounds read in udhcp components (bsc#1121428).\n- CVE-2021-28831: Fixed invalid free or segmentation fault via malformed gzip data (bsc#1184522).\n- CVE-2021-42373: Fixed NULL pointer dereference in man leading to DoS when a section name is supplied but no page argument is given (bsc#1192869).\n- CVE-2021-42374: Fixed out-of-bounds heap read in unlzma leading to information leak and DoS when crafted LZMA-compressed input is decompressed (bsc#1192869).\n- CVE-2021-42375: Fixed incorrect handling of a special element in ash leading to DoS when processing a crafted shell command, due to the shell mistaking specific characters for reserved characters (bsc#1192869).\n- CVE-2021-42376: Fixed NULL pointer dereference in hush leading to DoS when processing a crafted shell command (bsc#1192869).\n- CVE-2021-42377: Fixed attacker-controlled pointer free in hush leading to DoS and possible code execution when processing a crafted shell command (bsc#1192869).\n- CVE-2021-42378: Fixed use-after-free in awk leading to DoS and possibly code execution when processing a crafted awk pattern in the getvar_i function (bsc#1192869).\n- CVE-2021-42379: Fixed use-after-free in awk leading to DoS and possibly code execution when processing a crafted awk pattern in the next_input_file function (bsc#1192869).\n- CVE-2021-42380: Fixed use-after-free in awk leading to DoS and possibly code execution when processing a crafted awk pattern in the clrvar function (bsc#1192869).\n- CVE-2021-42381: Fixed use-after-free in awk leading to DoS and possibly code execution when processing a crafted awk pattern in the hash_init function (bsc#1192869).\n- CVE-2021-42382: Fixed use-after-free in awk leading to DoS and possibly code execution when processing a crafted awk pattern in the getvar_s function (bsc#1192869).\n- CVE-2021-42383: Fixed use-after-free in awk leading to DoS and possibly code execution when processing a crafted awk pattern in the evaluate function (bsc#1192869).\n- CVE-2021-42384: Fixed use-after-free in awk leading to DoS and possibly code execution when processing a crafted awk pattern in the handle_special function (bsc#1192869).\n- CVE-2021-42385: Fixed use-after-free in awk leading to DoS and possibly code execution when processing a crafted awk pattern in the evaluate function (bsc#1192869).\n- CVE-2021-42386: Fixed use-after-free in awk leading to DoS and possibly code execution when processing a crafted awk pattern in the nvalloc function (bsc#1192869).\n", title: "Description of the patch", }, { category: "details", text: "SUSE-2022-135,SUSE-SLE-Product-RT-15-SP2-2022-135", title: "Patchnames", }, { category: "legal_disclaimer", text: "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", title: "Terms of use", }, ], publisher: { category: "vendor", contact_details: "https://www.suse.com/support/security/contact/", name: "SUSE Product Security Team", namespace: "https://www.suse.com/", }, references: [ { category: "external", summary: "SUSE ratings", url: "https://www.suse.com/support/security/rating/", }, { category: "self", summary: "URL of this CSAF notice", url: "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2022_0135-2.json", }, { category: "self", summary: "URL for SUSE-SU-2022:0135-2", url: "https://www.suse.com/support/update/announcement/2022/suse-su-20220135-2/", }, { category: "self", summary: "E-Mail link for SUSE-SU-2022:0135-2", url: "https://lists.suse.com/pipermail/sle-security-updates/2022-February/010220.html", }, { category: "self", summary: "SUSE Bug 1064976", url: "https://bugzilla.suse.com/1064976", }, { category: "self", summary: "SUSE Bug 1064978", url: "https://bugzilla.suse.com/1064978", }, { category: "self", summary: "SUSE Bug 1069412", url: "https://bugzilla.suse.com/1069412", }, { category: "self", summary: "SUSE Bug 1099260", url: "https://bugzilla.suse.com/1099260", }, { category: "self", summary: "SUSE Bug 1099263", url: "https://bugzilla.suse.com/1099263", }, { category: "self", summary: "SUSE Bug 1102912", url: "https://bugzilla.suse.com/1102912", }, { category: "self", summary: "SUSE Bug 1121426", url: "https://bugzilla.suse.com/1121426", }, { category: "self", summary: "SUSE Bug 1121428", url: "https://bugzilla.suse.com/1121428", }, { category: "self", summary: "SUSE Bug 1184522", url: "https://bugzilla.suse.com/1184522", }, { category: "self", summary: "SUSE Bug 1192869", url: "https://bugzilla.suse.com/1192869", }, { category: "self", summary: "SUSE Bug 951562", url: "https://bugzilla.suse.com/951562", }, { category: "self", summary: "SUSE Bug 970662", url: "https://bugzilla.suse.com/970662", }, { category: "self", summary: "SUSE Bug 970663", url: "https://bugzilla.suse.com/970663", }, { category: "self", summary: "SUSE Bug 991940", url: "https://bugzilla.suse.com/991940", }, { category: "self", summary: "SUSE CVE CVE-2011-5325 page", url: "https://www.suse.com/security/cve/CVE-2011-5325/", }, { category: "self", summary: "SUSE CVE CVE-2015-9261 page", url: "https://www.suse.com/security/cve/CVE-2015-9261/", }, { category: "self", summary: "SUSE CVE CVE-2016-2147 page", url: "https://www.suse.com/security/cve/CVE-2016-2147/", }, { category: "self", summary: "SUSE CVE CVE-2016-2148 page", url: "https://www.suse.com/security/cve/CVE-2016-2148/", }, { category: "self", summary: "SUSE CVE CVE-2016-6301 page", url: "https://www.suse.com/security/cve/CVE-2016-6301/", }, { category: "self", summary: "SUSE CVE CVE-2017-15873 page", url: "https://www.suse.com/security/cve/CVE-2017-15873/", }, { category: "self", summary: "SUSE CVE CVE-2017-15874 page", url: "https://www.suse.com/security/cve/CVE-2017-15874/", }, { category: "self", summary: "SUSE CVE CVE-2017-16544 page", url: "https://www.suse.com/security/cve/CVE-2017-16544/", }, { category: "self", summary: "SUSE CVE CVE-2018-1000500 page", url: "https://www.suse.com/security/cve/CVE-2018-1000500/", }, { category: "self", summary: "SUSE CVE CVE-2018-1000517 page", url: "https://www.suse.com/security/cve/CVE-2018-1000517/", }, { category: "self", summary: "SUSE CVE CVE-2018-20679 page", url: "https://www.suse.com/security/cve/CVE-2018-20679/", }, { category: "self", summary: "SUSE CVE CVE-2019-5747 page", url: "https://www.suse.com/security/cve/CVE-2019-5747/", }, { category: "self", summary: "SUSE CVE CVE-2021-28831 page", url: "https://www.suse.com/security/cve/CVE-2021-28831/", }, { category: "self", summary: "SUSE CVE CVE-2021-42373 page", url: "https://www.suse.com/security/cve/CVE-2021-42373/", }, { category: "self", summary: "SUSE CVE CVE-2021-42374 page", url: "https://www.suse.com/security/cve/CVE-2021-42374/", }, { category: "self", summary: "SUSE CVE CVE-2021-42375 page", url: "https://www.suse.com/security/cve/CVE-2021-42375/", }, { category: "self", summary: "SUSE CVE CVE-2021-42376 page", url: "https://www.suse.com/security/cve/CVE-2021-42376/", }, { category: "self", summary: "SUSE CVE CVE-2021-42377 page", url: "https://www.suse.com/security/cve/CVE-2021-42377/", }, { category: "self", summary: "SUSE CVE CVE-2021-42378 page", url: "https://www.suse.com/security/cve/CVE-2021-42378/", }, { category: "self", summary: "SUSE CVE CVE-2021-42379 page", url: "https://www.suse.com/security/cve/CVE-2021-42379/", }, { category: "self", summary: "SUSE CVE CVE-2021-42380 page", url: "https://www.suse.com/security/cve/CVE-2021-42380/", }, { category: "self", summary: "SUSE CVE CVE-2021-42381 page", url: "https://www.suse.com/security/cve/CVE-2021-42381/", }, { category: "self", summary: "SUSE CVE CVE-2021-42382 page", url: "https://www.suse.com/security/cve/CVE-2021-42382/", }, { category: "self", summary: "SUSE CVE CVE-2021-42383 page", url: "https://www.suse.com/security/cve/CVE-2021-42383/", }, { category: "self", summary: "SUSE CVE CVE-2021-42384 page", url: "https://www.suse.com/security/cve/CVE-2021-42384/", }, { category: "self", summary: "SUSE CVE CVE-2021-42385 page", url: "https://www.suse.com/security/cve/CVE-2021-42385/", }, { category: "self", summary: "SUSE CVE CVE-2021-42386 page", url: "https://www.suse.com/security/cve/CVE-2021-42386/", }, ], title: "Security update for busybox", tracking: { current_release_date: "2022-02-14T10:50:28Z", generator: { date: "2022-02-14T10:50:28Z", engine: { name: "cve-database.git:bin/generate-csaf.pl", version: "1", }, }, id: "SUSE-SU-2022:0135-2", initial_release_date: "2022-02-14T10:50:28Z", revision_history: [ { date: "2022-02-14T10:50:28Z", number: "1", summary: "Current version", }, ], status: "final", version: "1", }, }, product_tree: { branches: [ { branches: [ { branches: [ { category: "product_version", name: "busybox-1.34.1-4.9.1.aarch64", product: { name: "busybox-1.34.1-4.9.1.aarch64", product_id: "busybox-1.34.1-4.9.1.aarch64", }, }, { category: "product_version", name: "busybox-static-1.34.1-4.9.1.aarch64", product: { name: "busybox-static-1.34.1-4.9.1.aarch64", product_id: "busybox-static-1.34.1-4.9.1.aarch64", }, }, { category: "product_version", name: "busybox-testsuite-1.34.1-4.9.1.aarch64", product: { name: "busybox-testsuite-1.34.1-4.9.1.aarch64", product_id: "busybox-testsuite-1.34.1-4.9.1.aarch64", }, }, { category: "product_version", name: "busybox-warewulf3-1.34.1-4.9.1.aarch64", product: { name: "busybox-warewulf3-1.34.1-4.9.1.aarch64", product_id: "busybox-warewulf3-1.34.1-4.9.1.aarch64", }, }, ], category: "architecture", name: "aarch64", }, { branches: [ { category: "product_version", name: "busybox-1.34.1-4.9.1.i586", product: { name: "busybox-1.34.1-4.9.1.i586", product_id: "busybox-1.34.1-4.9.1.i586", }, }, { category: "product_version", name: "busybox-static-1.34.1-4.9.1.i586", product: { name: "busybox-static-1.34.1-4.9.1.i586", product_id: "busybox-static-1.34.1-4.9.1.i586", }, }, { category: "product_version", name: "busybox-testsuite-1.34.1-4.9.1.i586", product: { name: "busybox-testsuite-1.34.1-4.9.1.i586", product_id: "busybox-testsuite-1.34.1-4.9.1.i586", }, }, { category: "product_version", name: "busybox-warewulf3-1.34.1-4.9.1.i586", product: { name: "busybox-warewulf3-1.34.1-4.9.1.i586", product_id: "busybox-warewulf3-1.34.1-4.9.1.i586", }, }, ], category: "architecture", name: "i586", }, { branches: [ { category: "product_version", name: "busybox-1.34.1-4.9.1.ppc64le", product: { name: "busybox-1.34.1-4.9.1.ppc64le", product_id: "busybox-1.34.1-4.9.1.ppc64le", }, }, { category: "product_version", name: "busybox-static-1.34.1-4.9.1.ppc64le", product: { name: "busybox-static-1.34.1-4.9.1.ppc64le", product_id: "busybox-static-1.34.1-4.9.1.ppc64le", }, }, { category: "product_version", name: "busybox-testsuite-1.34.1-4.9.1.ppc64le", product: { name: "busybox-testsuite-1.34.1-4.9.1.ppc64le", product_id: "busybox-testsuite-1.34.1-4.9.1.ppc64le", }, }, ], category: "architecture", name: "ppc64le", }, { branches: [ { category: "product_version", name: "busybox-1.34.1-4.9.1.s390x", product: { name: "busybox-1.34.1-4.9.1.s390x", product_id: "busybox-1.34.1-4.9.1.s390x", }, }, { category: "product_version", name: "busybox-static-1.34.1-4.9.1.s390x", product: { name: "busybox-static-1.34.1-4.9.1.s390x", product_id: "busybox-static-1.34.1-4.9.1.s390x", }, }, { category: "product_version", name: "busybox-testsuite-1.34.1-4.9.1.s390x", product: { name: "busybox-testsuite-1.34.1-4.9.1.s390x", product_id: "busybox-testsuite-1.34.1-4.9.1.s390x", }, }, ], category: "architecture", name: "s390x", }, { branches: [ { category: "product_version", name: "busybox-1.34.1-4.9.1.x86_64", product: { name: "busybox-1.34.1-4.9.1.x86_64", product_id: "busybox-1.34.1-4.9.1.x86_64", }, }, { category: "product_version", name: "busybox-static-1.34.1-4.9.1.x86_64", product: { name: "busybox-static-1.34.1-4.9.1.x86_64", product_id: "busybox-static-1.34.1-4.9.1.x86_64", }, }, { category: "product_version", name: "busybox-testsuite-1.34.1-4.9.1.x86_64", product: { name: "busybox-testsuite-1.34.1-4.9.1.x86_64", product_id: "busybox-testsuite-1.34.1-4.9.1.x86_64", }, }, { category: "product_version", name: "busybox-warewulf3-1.34.1-4.9.1.x86_64", product: { name: "busybox-warewulf3-1.34.1-4.9.1.x86_64", product_id: "busybox-warewulf3-1.34.1-4.9.1.x86_64", }, }, ], category: "architecture", name: "x86_64", }, { branches: [ { category: "product_name", name: "SUSE Linux Enterprise Real Time 15 SP2", product: { name: "SUSE Linux Enterprise Real Time 15 SP2", product_id: "SUSE Linux Enterprise Real Time 15 SP2", product_identification_helper: { cpe: "cpe:/o:suse:sle_rt:15:sp2", }, }, }, ], category: "product_family", name: "SUSE Linux Enterprise", }, ], category: "vendor", name: "SUSE", }, ], relationships: [ { category: "default_component_of", full_product_name: { name: "busybox-1.34.1-4.9.1.x86_64 as component of SUSE Linux Enterprise Real Time 15 SP2", product_id: "SUSE Linux Enterprise Real Time 15 SP2:busybox-1.34.1-4.9.1.x86_64", }, product_reference: "busybox-1.34.1-4.9.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Real Time 15 SP2", }, { category: "default_component_of", full_product_name: { name: "busybox-static-1.34.1-4.9.1.x86_64 as component of SUSE Linux Enterprise Real Time 15 SP2", product_id: "SUSE Linux Enterprise Real Time 15 SP2:busybox-static-1.34.1-4.9.1.x86_64", }, product_reference: "busybox-static-1.34.1-4.9.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Real Time 15 SP2", }, ], }, vulnerabilities: [ { cve: "CVE-2011-5325", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2011-5325", }, ], notes: [ { category: "general", text: "Directory traversal vulnerability in the BusyBox implementation of tar before 1.22.0 v5 allows remote attackers to point to files outside the current working directory via a symlink.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Real Time 15 SP2:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:busybox-static-1.34.1-4.9.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2011-5325", url: "https://www.suse.com/security/cve/CVE-2011-5325", }, { category: "external", summary: "SUSE Bug 951562 for CVE-2011-5325", url: "https://bugzilla.suse.com/951562", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Real Time 15 SP2:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:busybox-static-1.34.1-4.9.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 7.5, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N", version: "3.1", }, products: [ "SUSE Linux Enterprise Real Time 15 SP2:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:busybox-static-1.34.1-4.9.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2022-02-14T10:50:28Z", details: "moderate", }, ], title: "CVE-2011-5325", }, { cve: "CVE-2015-9261", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2015-9261", }, ], notes: [ { category: "general", text: "huft_build in archival/libarchive/decompress_gunzip.c in BusyBox before 1.27.2 misuses a pointer, causing segfaults and an application crash during an unzip operation on a specially crafted ZIP file.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Real Time 15 SP2:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:busybox-static-1.34.1-4.9.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2015-9261", url: "https://www.suse.com/security/cve/CVE-2015-9261", }, { category: "external", summary: "SUSE Bug 1102912 for CVE-2015-9261", url: "https://bugzilla.suse.com/1102912", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Real Time 15 SP2:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:busybox-static-1.34.1-4.9.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.5, baseSeverity: "MEDIUM", vectorString: "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", version: "3.0", }, products: [ "SUSE Linux Enterprise Real Time 15 SP2:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:busybox-static-1.34.1-4.9.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2022-02-14T10:50:28Z", details: "moderate", }, ], title: "CVE-2015-9261", }, { cve: "CVE-2016-2147", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2016-2147", }, ], notes: [ { category: "general", text: "Integer overflow in the DHCP client (udhcpc) in BusyBox before 1.25.0 allows remote attackers to cause a denial of service (crash) via a malformed RFC1035-encoded domain name, which triggers an out-of-bounds heap write.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Real Time 15 SP2:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:busybox-static-1.34.1-4.9.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2016-2147", url: "https://www.suse.com/security/cve/CVE-2016-2147", }, { category: "external", summary: "SUSE Bug 970663 for CVE-2016-2147", url: "https://bugzilla.suse.com/970663", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Real Time 15 SP2:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:busybox-static-1.34.1-4.9.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 7.5, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Real Time 15 SP2:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:busybox-static-1.34.1-4.9.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2022-02-14T10:50:28Z", details: "important", }, ], title: "CVE-2016-2147", }, { cve: "CVE-2016-2148", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2016-2148", }, ], notes: [ { category: "general", text: "Heap-based buffer overflow in the DHCP client (udhcpc) in BusyBox before 1.25.0 allows remote attackers to have unspecified impact via vectors involving OPTION_6RD parsing.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Real Time 15 SP2:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:busybox-static-1.34.1-4.9.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2016-2148", url: "https://www.suse.com/security/cve/CVE-2016-2148", }, { category: "external", summary: "SUSE Bug 970662 for CVE-2016-2148", url: "https://bugzilla.suse.com/970662", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Real Time 15 SP2:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:busybox-static-1.34.1-4.9.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 9.8, baseSeverity: "CRITICAL", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Real Time 15 SP2:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:busybox-static-1.34.1-4.9.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2022-02-14T10:50:28Z", details: "moderate", }, ], title: "CVE-2016-2148", }, { cve: "CVE-2016-6301", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2016-6301", }, ], notes: [ { category: "general", text: "The recv_and_process_client_pkt function in networking/ntpd.c in busybox allows remote attackers to cause a denial of service (CPU and bandwidth consumption) via a forged NTP packet, which triggers a communication loop.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Real Time 15 SP2:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:busybox-static-1.34.1-4.9.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2016-6301", url: "https://www.suse.com/security/cve/CVE-2016-6301", }, { category: "external", summary: "SUSE Bug 991940 for CVE-2016-6301", url: "https://bugzilla.suse.com/991940", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Real Time 15 SP2:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:busybox-static-1.34.1-4.9.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 7.5, baseSeverity: "HIGH", vectorString: "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", version: "3.0", }, products: [ "SUSE Linux Enterprise Real Time 15 SP2:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:busybox-static-1.34.1-4.9.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2022-02-14T10:50:28Z", details: "moderate", }, ], title: "CVE-2016-6301", }, { cve: "CVE-2017-15873", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2017-15873", }, ], notes: [ { category: "general", text: "The get_next_block function in archival/libarchive/decompress_bunzip2.c in BusyBox 1.27.2 has an Integer Overflow that may lead to a write access violation.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Real Time 15 SP2:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:busybox-static-1.34.1-4.9.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2017-15873", url: "https://www.suse.com/security/cve/CVE-2017-15873", }, { category: "external", summary: "SUSE Bug 1064976 for CVE-2017-15873", url: "https://bugzilla.suse.com/1064976", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Real Time 15 SP2:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:busybox-static-1.34.1-4.9.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 7.8, baseSeverity: "HIGH", vectorString: "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", version: "3.0", }, products: [ "SUSE Linux Enterprise Real Time 15 SP2:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:busybox-static-1.34.1-4.9.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2022-02-14T10:50:28Z", details: "moderate", }, ], title: "CVE-2017-15873", }, { cve: "CVE-2017-15874", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2017-15874", }, ], notes: [ { category: "general", text: "archival/libarchive/decompress_unlzma.c in BusyBox 1.27.2 has an Integer Underflow that leads to a read access violation.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Real Time 15 SP2:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:busybox-static-1.34.1-4.9.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2017-15874", url: "https://www.suse.com/security/cve/CVE-2017-15874", }, { category: "external", summary: "SUSE Bug 1064978 for CVE-2017-15874", url: "https://bugzilla.suse.com/1064978", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Real Time 15 SP2:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:busybox-static-1.34.1-4.9.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 3.3, baseSeverity: "LOW", vectorString: "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L", version: "3.0", }, products: [ "SUSE Linux Enterprise Real Time 15 SP2:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:busybox-static-1.34.1-4.9.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2022-02-14T10:50:28Z", details: "low", }, ], title: "CVE-2017-15874", }, { cve: "CVE-2017-16544", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2017-16544", }, ], notes: [ { category: "general", text: "In the add_match function in libbb/lineedit.c in BusyBox through 1.27.2, the tab autocomplete feature of the shell, used to get a list of filenames in a directory, does not sanitize filenames and results in executing any escape sequence in the terminal. This could potentially result in code execution, arbitrary file writes, or other attacks.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Real Time 15 SP2:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:busybox-static-1.34.1-4.9.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2017-16544", url: "https://www.suse.com/security/cve/CVE-2017-16544", }, { category: "external", summary: "SUSE Bug 1069412 for CVE-2017-16544", url: "https://bugzilla.suse.com/1069412", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Real Time 15 SP2:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:busybox-static-1.34.1-4.9.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 7.8, baseSeverity: "HIGH", vectorString: "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", version: "3.0", }, products: [ "SUSE Linux Enterprise Real Time 15 SP2:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:busybox-static-1.34.1-4.9.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2022-02-14T10:50:28Z", details: "important", }, ], title: "CVE-2017-16544", }, { cve: "CVE-2018-1000500", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2018-1000500", }, ], notes: [ { category: "general", text: "Busybox contains a Missing SSL certificate validation vulnerability in The \"busybox wget\" applet that can result in arbitrary code execution. This attack appear to be exploitable via Simply download any file over HTTPS using \"busybox wget https://compromised-domain.com/important-file\".", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Real Time 15 SP2:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:busybox-static-1.34.1-4.9.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2018-1000500", url: "https://www.suse.com/security/cve/CVE-2018-1000500", }, { category: "external", summary: "SUSE Bug 1099263 for CVE-2018-1000500", url: "https://bugzilla.suse.com/1099263", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Real Time 15 SP2:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:busybox-static-1.34.1-4.9.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 7.5, baseSeverity: "HIGH", vectorString: "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N", version: "3.0", }, products: [ "SUSE Linux Enterprise Real Time 15 SP2:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:busybox-static-1.34.1-4.9.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2022-02-14T10:50:28Z", details: "important", }, ], title: "CVE-2018-1000500", }, { cve: "CVE-2018-1000517", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2018-1000517", }, ], notes: [ { category: "general", text: "BusyBox project BusyBox wget version prior to commit 8e2174e9bd836e53c8b9c6e00d1bc6e2a718686e contains a Buffer Overflow vulnerability in Busybox wget that can result in heap buffer overflow. This attack appear to be exploitable via network connectivity. This vulnerability appears to have been fixed in after commit 8e2174e9bd836e53c8b9c6e00d1bc6e2a718686e.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Real Time 15 SP2:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:busybox-static-1.34.1-4.9.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2018-1000517", url: "https://www.suse.com/security/cve/CVE-2018-1000517", }, { category: "external", summary: "SUSE Bug 1099260 for CVE-2018-1000517", url: "https://bugzilla.suse.com/1099260", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Real Time 15 SP2:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:busybox-static-1.34.1-4.9.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.6, baseSeverity: "MEDIUM", vectorString: "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L", version: "3.0", }, products: [ "SUSE Linux Enterprise Real Time 15 SP2:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:busybox-static-1.34.1-4.9.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2022-02-14T10:50:28Z", details: "important", }, ], title: "CVE-2018-1000517", }, { cve: "CVE-2018-20679", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2018-20679", }, ], notes: [ { category: "general", text: "An issue was discovered in BusyBox before 1.30.0. An out of bounds read in udhcp components (consumed by the DHCP server, client, and relay) allows a remote attacker to leak sensitive information from the stack by sending a crafted DHCP message. This is related to verification in udhcp_get_option() in networking/udhcp/common.c that 4-byte options are indeed 4 bytes.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Real Time 15 SP2:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:busybox-static-1.34.1-4.9.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2018-20679", url: "https://www.suse.com/security/cve/CVE-2018-20679", }, { category: "external", summary: "SUSE Bug 1121426 for CVE-2018-20679", url: "https://bugzilla.suse.com/1121426", }, { category: "external", summary: "SUSE Bug 1121428 for CVE-2018-20679", url: "https://bugzilla.suse.com/1121428", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Real Time 15 SP2:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:busybox-static-1.34.1-4.9.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.3, baseSeverity: "MEDIUM", vectorString: "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N", version: "3.0", }, products: [ "SUSE Linux Enterprise Real Time 15 SP2:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:busybox-static-1.34.1-4.9.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2022-02-14T10:50:28Z", details: "moderate", }, ], title: "CVE-2018-20679", }, { cve: "CVE-2019-5747", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2019-5747", }, ], notes: [ { category: "general", text: "An issue was discovered in BusyBox through 1.30.0. An out of bounds read in udhcp components (consumed by the DHCP client, server, and/or relay) might allow a remote attacker to leak sensitive information from the stack by sending a crafted DHCP message. This is related to assurance of a 4-byte length when decoding DHCP_SUBNET. NOTE: this issue exists because of an incomplete fix for CVE-2018-20679.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Real Time 15 SP2:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:busybox-static-1.34.1-4.9.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2019-5747", url: "https://www.suse.com/security/cve/CVE-2019-5747", }, { category: "external", summary: "SUSE Bug 1121426 for CVE-2019-5747", url: "https://bugzilla.suse.com/1121426", }, { category: "external", summary: "SUSE Bug 1121428 for CVE-2019-5747", url: "https://bugzilla.suse.com/1121428", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Real Time 15 SP2:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:busybox-static-1.34.1-4.9.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 3.5, baseSeverity: "LOW", vectorString: "CVSS:3.1/AV:A/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N", version: "3.1", }, products: [ "SUSE Linux Enterprise Real Time 15 SP2:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:busybox-static-1.34.1-4.9.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2022-02-14T10:50:28Z", details: "low", }, ], title: "CVE-2019-5747", }, { cve: "CVE-2021-28831", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2021-28831", }, ], notes: [ { category: "general", text: "decompress_gunzip.c in BusyBox through 1.32.1 mishandles the error bit on the huft_build result pointer, with a resultant invalid free or segmentation fault, via malformed gzip data.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Real Time 15 SP2:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:busybox-static-1.34.1-4.9.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2021-28831", url: "https://www.suse.com/security/cve/CVE-2021-28831", }, { category: "external", summary: "SUSE Bug 1184522 for CVE-2021-28831", url: "https://bugzilla.suse.com/1184522", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Real Time 15 SP2:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:busybox-static-1.34.1-4.9.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 7.5, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Real Time 15 SP2:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:busybox-static-1.34.1-4.9.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2022-02-14T10:50:28Z", details: "important", }, ], title: "CVE-2021-28831", }, { cve: "CVE-2021-42373", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2021-42373", }, ], notes: [ { category: "general", text: "A NULL pointer dereference in Busybox's man applet leads to denial of service when a section name is supplied but no page argument is given", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Real Time 15 SP2:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:busybox-static-1.34.1-4.9.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2021-42373", url: "https://www.suse.com/security/cve/CVE-2021-42373", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Real Time 15 SP2:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:busybox-static-1.34.1-4.9.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.5, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Real Time 15 SP2:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:busybox-static-1.34.1-4.9.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2022-02-14T10:50:28Z", details: "moderate", }, ], title: "CVE-2021-42373", }, { cve: "CVE-2021-42374", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2021-42374", }, ], notes: [ { category: "general", text: "An out-of-bounds heap read in Busybox's unlzma applet leads to information leak and denial of service when crafted LZMA-compressed input is decompressed. This can be triggered by any applet/format that", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Real Time 15 SP2:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:busybox-static-1.34.1-4.9.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2021-42374", url: "https://www.suse.com/security/cve/CVE-2021-42374", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Real Time 15 SP2:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:busybox-static-1.34.1-4.9.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.7, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Real Time 15 SP2:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:busybox-static-1.34.1-4.9.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2022-02-14T10:50:28Z", details: "moderate", }, ], title: "CVE-2021-42374", }, { cve: "CVE-2021-42375", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2021-42375", }, ], notes: [ { category: "general", text: "An incorrect handling of a special element in Busybox's ash applet leads to denial of service when processing a crafted shell command, due to the shell mistaking specific characters for reserved characters. This may be used for DoS under rare conditions of filtered command input.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Real Time 15 SP2:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:busybox-static-1.34.1-4.9.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2021-42375", url: "https://www.suse.com/security/cve/CVE-2021-42375", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Real Time 15 SP2:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:busybox-static-1.34.1-4.9.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 4.1, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Real Time 15 SP2:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:busybox-static-1.34.1-4.9.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2022-02-14T10:50:28Z", details: "moderate", }, ], title: "CVE-2021-42375", }, { cve: "CVE-2021-42376", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2021-42376", }, ], notes: [ { category: "general", text: "A NULL pointer dereference in Busybox's hush applet leads to denial of service when processing a crafted shell command, due to missing validation after a \\x03 delimiter character. This may be used for DoS under very rare conditions of filtered command input.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Real Time 15 SP2:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:busybox-static-1.34.1-4.9.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2021-42376", url: "https://www.suse.com/security/cve/CVE-2021-42376", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Real Time 15 SP2:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:busybox-static-1.34.1-4.9.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 4.1, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Real Time 15 SP2:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:busybox-static-1.34.1-4.9.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2022-02-14T10:50:28Z", details: "moderate", }, ], title: "CVE-2021-42376", }, { cve: "CVE-2021-42377", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2021-42377", }, ], notes: [ { category: "general", text: "An attacker-controlled pointer free in Busybox's hush applet leads to denial of service and possible code execution when processing a crafted shell command, due to the shell mishandling the &&& string. This may be used for remote code execution under rare conditions of filtered command input.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Real Time 15 SP2:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:busybox-static-1.34.1-4.9.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2021-42377", url: "https://www.suse.com/security/cve/CVE-2021-42377", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Real Time 15 SP2:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:busybox-static-1.34.1-4.9.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 6.4, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Real Time 15 SP2:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:busybox-static-1.34.1-4.9.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2022-02-14T10:50:28Z", details: "moderate", }, ], title: "CVE-2021-42377", }, { cve: "CVE-2021-42378", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2021-42378", }, ], notes: [ { category: "general", text: "A use-after-free in Busybox's awk applet leads to denial of service and possibly code execution when processing a crafted awk pattern in the getvar_i function", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Real Time 15 SP2:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:busybox-static-1.34.1-4.9.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2021-42378", url: "https://www.suse.com/security/cve/CVE-2021-42378", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Real Time 15 SP2:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:busybox-static-1.34.1-4.9.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 6.6, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Real Time 15 SP2:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:busybox-static-1.34.1-4.9.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2022-02-14T10:50:28Z", details: "moderate", }, ], title: "CVE-2021-42378", }, { cve: "CVE-2021-42379", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2021-42379", }, ], notes: [ { category: "general", text: "A use-after-free in Busybox's awk applet leads to denial of service and possibly code execution when processing a crafted awk pattern in the next_input_file function", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Real Time 15 SP2:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:busybox-static-1.34.1-4.9.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2021-42379", url: "https://www.suse.com/security/cve/CVE-2021-42379", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Real Time 15 SP2:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:busybox-static-1.34.1-4.9.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 6.6, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Real Time 15 SP2:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:busybox-static-1.34.1-4.9.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2022-02-14T10:50:28Z", details: "moderate", }, ], title: "CVE-2021-42379", }, { cve: "CVE-2021-42380", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2021-42380", }, ], notes: [ { category: "general", text: "A use-after-free in Busybox's awk applet leads to denial of service and possibly code execution when processing a crafted awk pattern in the clrvar function", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Real Time 15 SP2:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:busybox-static-1.34.1-4.9.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2021-42380", url: "https://www.suse.com/security/cve/CVE-2021-42380", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Real Time 15 SP2:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:busybox-static-1.34.1-4.9.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 6.6, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Real Time 15 SP2:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:busybox-static-1.34.1-4.9.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2022-02-14T10:50:28Z", details: "moderate", }, ], title: "CVE-2021-42380", }, { cve: "CVE-2021-42381", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2021-42381", }, ], notes: [ { category: "general", text: "A use-after-free in Busybox's awk applet leads to denial of service and possibly code execution when processing a crafted awk pattern in the hash_init function", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Real Time 15 SP2:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:busybox-static-1.34.1-4.9.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2021-42381", url: "https://www.suse.com/security/cve/CVE-2021-42381", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Real Time 15 SP2:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:busybox-static-1.34.1-4.9.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 6.6, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Real Time 15 SP2:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:busybox-static-1.34.1-4.9.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2022-02-14T10:50:28Z", details: "moderate", }, ], title: "CVE-2021-42381", }, { cve: "CVE-2021-42382", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2021-42382", }, ], notes: [ { category: "general", text: "A use-after-free in Busybox's awk applet leads to denial of service and possibly code execution when processing a crafted awk pattern in the getvar_s function", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Real Time 15 SP2:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:busybox-static-1.34.1-4.9.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2021-42382", url: "https://www.suse.com/security/cve/CVE-2021-42382", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Real Time 15 SP2:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:busybox-static-1.34.1-4.9.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 6.6, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Real Time 15 SP2:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:busybox-static-1.34.1-4.9.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2022-02-14T10:50:28Z", details: "moderate", }, ], title: "CVE-2021-42382", }, { cve: "CVE-2021-42383", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2021-42383", }, ], notes: [ { category: "general", text: "A use-after-free in Busybox's awk applet leads to denial of service and possibly code execution when processing a crafted awk pattern in the evaluate function", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Real Time 15 SP2:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:busybox-static-1.34.1-4.9.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2021-42383", url: "https://www.suse.com/security/cve/CVE-2021-42383", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Real Time 15 SP2:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:busybox-static-1.34.1-4.9.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 6.6, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Real Time 15 SP2:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:busybox-static-1.34.1-4.9.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2022-02-14T10:50:28Z", details: "moderate", }, ], title: "CVE-2021-42383", }, { cve: "CVE-2021-42384", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2021-42384", }, ], notes: [ { category: "general", text: "A use-after-free in Busybox's awk applet leads to denial of service and possibly code execution when processing a crafted awk pattern in the handle_special function", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Real Time 15 SP2:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:busybox-static-1.34.1-4.9.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2021-42384", url: "https://www.suse.com/security/cve/CVE-2021-42384", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Real Time 15 SP2:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:busybox-static-1.34.1-4.9.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 6.6, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Real Time 15 SP2:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:busybox-static-1.34.1-4.9.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2022-02-14T10:50:28Z", details: "moderate", }, ], title: "CVE-2021-42384", }, { cve: "CVE-2021-42385", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2021-42385", }, ], notes: [ { category: "general", text: "A use-after-free in Busybox's awk applet leads to denial of service and possibly code execution when processing a crafted awk pattern in the evaluate function", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Real Time 15 SP2:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:busybox-static-1.34.1-4.9.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2021-42385", url: "https://www.suse.com/security/cve/CVE-2021-42385", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Real Time 15 SP2:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:busybox-static-1.34.1-4.9.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 6.6, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Real Time 15 SP2:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:busybox-static-1.34.1-4.9.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2022-02-14T10:50:28Z", details: "moderate", }, ], title: "CVE-2021-42385", }, { cve: "CVE-2021-42386", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2021-42386", }, ], notes: [ { category: "general", text: "A use-after-free in Busybox's awk applet leads to denial of service and possibly code execution when processing a crafted awk pattern in the nvalloc function", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Real Time 15 SP2:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:busybox-static-1.34.1-4.9.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2021-42386", url: "https://www.suse.com/security/cve/CVE-2021-42386", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Real Time 15 SP2:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:busybox-static-1.34.1-4.9.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 6.6, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Real Time 15 SP2:busybox-1.34.1-4.9.1.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:busybox-static-1.34.1-4.9.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2022-02-14T10:50:28Z", details: "moderate", }, ], title: "CVE-2021-42386", }, ], }
icsa-21-054-03
Vulnerability from csaf_cisa
Published
2021-02-23 00:00
Modified
2021-02-23 00:00
Summary
Advantech Spectre RT Industrial Routers
Notes
CISA Disclaimer
This CSAF advisory was extracted from unstructured data and may contain inaccuracies. If you notice any errors, please reach out to the designated contact at CISA CSAF: central@cisa.dhs.gov
Legal Notice
All information products included in https://us-cert.cisa.gov/ics are provided "as is" for informational purposes only. The Department of Homeland Security (DHS) does not provide any warranties of any kind regarding any information contained within. DHS does not endorse any commercial product or service, referenced in this product or otherwise. Further dissemination of this product is governed by the Traffic Light Protocol (TLP) marking in the header. For more information about TLP, see https://us-cert.cisa.gov/tlp/.
Risk evaluation
Successful exploitation of these vulnerabilities may allow information disclosure, deletion of files, and remote code execution.
Critical infrastructure sectors
Critical Manufacturing, Energy, Water and Wastewater Systems
Countries/areas deployed
East Asia, Europe, United States, South America, Middle East
Company headquarters location
Taiwan
Recommended Practices
CISA recommends users take defensive measures to minimize the risk of exploitation of this vulnerability. Specifically, users should:
Recommended Practices
CISA reminds organizations to perform proper impact analysis and risk assessment prior to deploying defensive measures.
CISA also provides a section for control systems security recommended practices on the ICS webpage onus-cert.cisa.gov. Several recommended practices are available for reading and download, including Improving Industrial Control Systems Cybersecurity with Defense-in-Depth Strategies.
Recommended Practices
Additional mitigation guidance and recommended practices are publicly available on the ICS webpage on us-cert.cisa.gov in the Technical Information Paper, ICS-TIP-12-146-01B--Targeted Cyber Intrusion Detection and Mitigation Strategies.
Organizations observing any suspected malicious activity should follow their established internal procedures and report their findings to CISA for tracking and correlation against other incidents.
Exploitability
No known public exploits specifically target these vulnerabilities.
{ document: { acknowledgments: [ { names: [ "Ilya Karpov", "Evgeniy Druzhinin", ], organization: "Rostelecom-Solar", summary: "reporting these vulnerabilities to CISA", }, { names: [ "Vlad Komarov", ], organization: "ScadaX", summary: "reporting these vulnerabilities to CISA", }, ], category: "csaf_security_advisory", csaf_version: "2.0", distribution: { text: "Disclosure is not limited", tlp: { label: "WHITE", url: "https://us-cert.cisa.gov/tlp/", }, }, lang: "en-US", notes: [ { category: "general", text: "This CSAF advisory was extracted from unstructured data and may contain inaccuracies. If you notice any errors, please reach out to the designated contact at CISA CSAF: central@cisa.dhs.gov", title: "CISA Disclaimer", }, { category: "legal_disclaimer", text: "All information products included in https://us-cert.cisa.gov/ics are provided \"as is\" for informational purposes only. The Department of Homeland Security (DHS) does not provide any warranties of any kind regarding any information contained within. DHS does not endorse any commercial product or service, referenced in this product or otherwise. Further dissemination of this product is governed by the Traffic Light Protocol (TLP) marking in the header. For more information about TLP, see https://us-cert.cisa.gov/tlp/.", title: "Legal Notice", }, { category: "summary", text: "Successful exploitation of these vulnerabilities may allow information disclosure, deletion of files, and remote code execution.", title: "Risk evaluation", }, { category: "other", text: "Critical Manufacturing, Energy, Water and Wastewater Systems", title: "Critical infrastructure sectors", }, { category: "other", text: "East Asia, Europe, United States, South America, Middle East", title: "Countries/areas deployed", }, { category: "other", text: "Taiwan", title: "Company headquarters location", }, { category: "general", text: "CISA recommends users take defensive measures to minimize the risk of exploitation of this vulnerability. Specifically, users should:", title: "Recommended Practices", }, { category: "general", text: "CISA reminds organizations to perform proper impact analysis and risk assessment prior to deploying defensive measures.\nCISA also provides a section for control systems security recommended practices on the ICS webpage onus-cert.cisa.gov. Several recommended practices are available for reading and download, including Improving Industrial Control Systems Cybersecurity with Defense-in-Depth Strategies.", title: "Recommended Practices", }, { category: "general", text: "Additional mitigation guidance and recommended practices are publicly available on the ICS webpage on us-cert.cisa.gov in the Technical Information Paper, ICS-TIP-12-146-01B--Targeted Cyber Intrusion Detection and Mitigation Strategies.\nOrganizations observing any suspected malicious activity should follow their established internal procedures and report their findings to CISA for tracking and correlation against other incidents.", title: "Recommended Practices", }, { category: "other", text: "No known public exploits specifically target these vulnerabilities.", title: "Exploitability", }, ], publisher: { category: "coordinator", contact_details: "Email: CISAservicedesk@cisa.dhs.gov;\n Toll Free: 1-888-282-0870", name: "CISA", namespace: "https://www.cisa.gov/", }, references: [ { category: "self", summary: "ICS Advisory ICSA-21-054-03 JSON", url: "https://raw.githubusercontent.com/cisagov/CSAF/develop/csaf_files/OT/white/2021/icsa-21-054-03.json", }, { category: "self", summary: "ICS Advisory ICSA-21-054-03 Web Version", url: "https://www.cisa.gov/news-events/ics-advisories/icsa-21-054-03", }, { category: "external", summary: "Recommended Practices", url: "https://us-cert.cisa.gov/ics/alerts/ICS-ALERT-10-301-01", }, { category: "external", summary: "Recommended Practices", url: "https://us-cert.cisa.gov/sites/default/files/recommended_practices/NCCIC_ICS-CERT_Defense_in_Depth_2016_S508C.pdf", }, { category: "external", summary: "Recommended Practices", url: "https://us-cert.cisa.gov/ics/tips/ICS-TIP-12-146-01B", }, ], title: "Advantech Spectre RT Industrial Routers", tracking: { current_release_date: "2021-02-23T00:00:00.000000Z", generator: { engine: { name: "CISA CSAF Generator", version: "1.0.0", }, }, id: "ICSA-21-054-03", initial_release_date: "2021-02-23T00:00:00.000000Z", revision_history: [ { date: "2021-02-23T00:00:00.000000Z", legacy_version: "Initial", number: "1", summary: "ICSA-21-054-03 Advantech Spectre RT Industrial Routers", }, ], status: "final", version: "1", }, }, product_tree: { branches: [ { branches: [ { branches: [ { category: "product_version_range", name: "<= 5.1.3", product: { name: "Spectre RT ERT351: firmware Versions 5.1.3 and prior", product_id: "CSAFPID-0001", }, }, ], category: "product_name", name: "Spectre RT ERT351", }, ], category: "vendor", name: "Advantech", }, ], }, vulnerabilities: [ { cve: "CVE-2019-18233", cwe: { id: "CWE-79", name: "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')", }, notes: [ { category: "summary", text: "The affected product does not neutralize special characters in the error response, allowing attackers to use a reflected XSS attack.CVE-2019-18233 has been assigned to this vulnerability. A CVSS v3 base score of 4.3 has been calculated; the CVSS vector string is (AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N).", title: "Vulnerability Summary", }, ], product_status: { known_affected: [ "CSAFPID-0001", ], }, references: [ { category: "external", summary: "web.nvd.nist.gov", url: "http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2019-18233", }, { category: "external", summary: "www.first.org", url: "https://www.first.org/cvss/calculator/3.0#CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N", }, ], remediations: [ { category: "mitigation", details: "For additional information, please see Advantech Security Advisory SA-2021-01-01", product_ids: [ "CSAFPID-0001", ], url: "https://ep.advantech-bb.cz/support/router-models/download/511/sa-2021-01-fw-5.1.3-and-older-en.pdf", }, { category: "mitigation", details: "Advantech recommends users update to Version 6.2.7 or later.", product_ids: [ "CSAFPID-0001", ], url: "https://www.advantech-bb.cz/firmware", }, ], scores: [ { cvss_v3: { baseScore: 4.3, baseSeverity: "MEDIUM", vectorString: "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N", version: "3.0", }, products: [ "CSAFPID-0001", ], }, ], }, { cve: "CVE-2019-18231", cwe: { id: "CWE-319", name: "Cleartext Transmission of Sensitive Information", }, notes: [ { category: "summary", text: "Login and password are transmitted in clear text form, which may allow an attacker to intercept the request.CVE-2019-18231 has been assigned to this vulnerability. A CVSS v3 base score of 7.5 has been calculated; the CVSS vector string is (AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N).", title: "Vulnerability Summary", }, ], product_status: { known_affected: [ "CSAFPID-0001", ], }, references: [ { category: "external", summary: "web.nvd.nist.gov", url: "http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2019-18231", }, { category: "external", summary: "www.first.org", url: "https://www.first.org/cvss/calculator/3.0#CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", }, ], remediations: [ { category: "mitigation", details: "For additional information, please see Advantech Security Advisory SA-2021-01-01", product_ids: [ "CSAFPID-0001", ], url: "https://ep.advantech-bb.cz/support/router-models/download/511/sa-2021-01-fw-5.1.3-and-older-en.pdf", }, { category: "mitigation", details: "Advantech recommends users update to Version 6.2.7 or later.", product_ids: [ "CSAFPID-0001", ], url: "https://www.advantech-bb.cz/firmware", }, ], scores: [ { cvss_v3: { baseScore: 7.5, baseSeverity: "HIGH", vectorString: "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", version: "3.0", }, products: [ "CSAFPID-0001", ], }, ], }, { cve: "CVE-2019-18235", cwe: { id: "CWE-307", name: "Improper Restriction of Excessive Authentication Attempts", }, notes: [ { category: "summary", text: "Insufficient login authentication parameters required for the web application may allow an attacker to gain full access using a brute-force password attack.CVE-2019-18235 has been assigned to this vulnerability. A CVSS v3 base score of 9.8 has been calculated; the CVSS vector string is (AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H).", title: "Vulnerability Summary", }, ], product_status: { known_affected: [ "CSAFPID-0001", ], }, references: [ { category: "external", summary: "web.nvd.nist.gov", url: "http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2019-18235", }, { category: "external", summary: "www.first.org", url: "https://www.first.org/cvss/calculator/3.0#CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", }, ], remediations: [ { category: "mitigation", details: "For additional information, please see Advantech Security Advisory SA-2021-01-01", product_ids: [ "CSAFPID-0001", ], url: "https://ep.advantech-bb.cz/support/router-models/download/511/sa-2021-01-fw-5.1.3-and-older-en.pdf", }, { category: "mitigation", details: "Advantech recommends users update to Version 6.2.7 or later.", product_ids: [ "CSAFPID-0001", ], url: "https://www.advantech-bb.cz/firmware", }, ], scores: [ { cvss_v3: { baseScore: 9.8, baseSeverity: "CRITICAL", vectorString: "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", version: "3.0", }, products: [ "CSAFPID-0001", ], }, ], }, { cve: "CVE-2018-20679", cwe: { id: "CWE-327", name: "Use of a Broken or Risky Cryptographic Algorithm", }, notes: [ { category: "summary", text: "Outdated version of BusyBox password encryption is in use, which may allow an attacker to discover passwords.CVE-2018-20679, CVE-2016-6301, CVE-2015-9261, and others have been assigned to this version of BusyBox. A CVSS v3 base score of 7.5 has been calculated; the CVSS vector string is (AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H).", title: "Vulnerability Summary", }, ], product_status: { known_affected: [ "CSAFPID-0001", ], }, references: [ { category: "external", summary: "web.nvd.nist.gov", url: "http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2018-20679", }, { category: "external", summary: "web.nvd.nist.gov", url: "http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2016-6301", }, { category: "external", summary: "web.nvd.nist.gov", url: "http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2015-9261", }, { category: "external", summary: "www.first.org", url: "https://www.first.org/cvss/calculator/3.0#CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", }, ], remediations: [ { category: "mitigation", details: "For additional information, please see Advantech Security Advisory SA-2021-01-01", product_ids: [ "CSAFPID-0001", ], url: "https://ep.advantech-bb.cz/support/router-models/download/511/sa-2021-01-fw-5.1.3-and-older-en.pdf", }, { category: "mitigation", details: "Advantech recommends users update to Version 6.2.7 or later.", product_ids: [ "CSAFPID-0001", ], url: "https://www.advantech-bb.cz/firmware", }, ], scores: [ { cvss_v3: { baseScore: 7.5, baseSeverity: "HIGH", vectorString: "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", version: "3.0", }, products: [ "CSAFPID-0001", ], }, ], }, { cve: "CVE-2016-6301", cwe: { id: "CWE-1103", name: "Use of Platform-Dependent Third Party Components", }, notes: [ { category: "summary", text: "Outdated version of OpenSSL is in use, which may allow an attacker to exploit known vulnerabilities in OpenSSL.CVE-2016-2842, CVE-2016-0799, CVE-2016-6304 and others have been assigned to this version of OpenSSL. A CVSS v3 base score of 10.0 has been calculated; the CVSS vector string is (AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H).", title: "Vulnerability Summary", }, ], product_status: { known_affected: [ "CSAFPID-0001", ], }, references: [ { category: "external", summary: "web.nvd.nist.gov", url: "http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2016-2842", }, { category: "external", summary: "web.nvd.nist.gov", url: "http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2016-0799", }, { category: "external", summary: "web.nvd.nist.gov", url: "http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2016-6304", }, { category: "external", summary: "www.first.org", url: "https://www.first.org/cvss/calculator/3.0#CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H", }, ], remediations: [ { category: "mitigation", details: "For additional information, please see Advantech Security Advisory SA-2021-01-01", product_ids: [ "CSAFPID-0001", ], url: "https://ep.advantech-bb.cz/support/router-models/download/511/sa-2021-01-fw-5.1.3-and-older-en.pdf", }, { category: "mitigation", details: "Advantech recommends users update to Version 6.2.7 or later.", product_ids: [ "CSAFPID-0001", ], url: "https://www.advantech-bb.cz/firmware", }, ], scores: [ { cvss_v3: { baseScore: 10, baseSeverity: "CRITICAL", vectorString: "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H", version: "3.0", }, products: [ "CSAFPID-0001", ], }, ], }, ], }
ICSA-21-054-03
Vulnerability from csaf_cisa
Published
2021-02-23 00:00
Modified
2021-02-23 00:00
Summary
Advantech Spectre RT Industrial Routers
Notes
CISA Disclaimer
This CSAF advisory was extracted from unstructured data and may contain inaccuracies. If you notice any errors, please reach out to the designated contact at CISA CSAF: central@cisa.dhs.gov
Legal Notice
All information products included in https://us-cert.cisa.gov/ics are provided "as is" for informational purposes only. The Department of Homeland Security (DHS) does not provide any warranties of any kind regarding any information contained within. DHS does not endorse any commercial product or service, referenced in this product or otherwise. Further dissemination of this product is governed by the Traffic Light Protocol (TLP) marking in the header. For more information about TLP, see https://us-cert.cisa.gov/tlp/.
Risk evaluation
Successful exploitation of these vulnerabilities may allow information disclosure, deletion of files, and remote code execution.
Critical infrastructure sectors
Critical Manufacturing, Energy, Water and Wastewater Systems
Countries/areas deployed
East Asia, Europe, United States, South America, Middle East
Company headquarters location
Taiwan
Recommended Practices
CISA recommends users take defensive measures to minimize the risk of exploitation of this vulnerability. Specifically, users should:
Recommended Practices
CISA reminds organizations to perform proper impact analysis and risk assessment prior to deploying defensive measures.
CISA also provides a section for control systems security recommended practices on the ICS webpage onus-cert.cisa.gov. Several recommended practices are available for reading and download, including Improving Industrial Control Systems Cybersecurity with Defense-in-Depth Strategies.
Recommended Practices
Additional mitigation guidance and recommended practices are publicly available on the ICS webpage on us-cert.cisa.gov in the Technical Information Paper, ICS-TIP-12-146-01B--Targeted Cyber Intrusion Detection and Mitigation Strategies.
Organizations observing any suspected malicious activity should follow their established internal procedures and report their findings to CISA for tracking and correlation against other incidents.
Exploitability
No known public exploits specifically target these vulnerabilities.
{ document: { acknowledgments: [ { names: [ "Ilya Karpov", "Evgeniy Druzhinin", ], organization: "Rostelecom-Solar", summary: "reporting these vulnerabilities to CISA", }, { names: [ "Vlad Komarov", ], organization: "ScadaX", summary: "reporting these vulnerabilities to CISA", }, ], category: "csaf_security_advisory", csaf_version: "2.0", distribution: { text: "Disclosure is not limited", tlp: { label: "WHITE", url: "https://us-cert.cisa.gov/tlp/", }, }, lang: "en-US", notes: [ { category: "general", text: "This CSAF advisory was extracted from unstructured data and may contain inaccuracies. If you notice any errors, please reach out to the designated contact at CISA CSAF: central@cisa.dhs.gov", title: "CISA Disclaimer", }, { category: "legal_disclaimer", text: "All information products included in https://us-cert.cisa.gov/ics are provided \"as is\" for informational purposes only. The Department of Homeland Security (DHS) does not provide any warranties of any kind regarding any information contained within. DHS does not endorse any commercial product or service, referenced in this product or otherwise. Further dissemination of this product is governed by the Traffic Light Protocol (TLP) marking in the header. For more information about TLP, see https://us-cert.cisa.gov/tlp/.", title: "Legal Notice", }, { category: "summary", text: "Successful exploitation of these vulnerabilities may allow information disclosure, deletion of files, and remote code execution.", title: "Risk evaluation", }, { category: "other", text: "Critical Manufacturing, Energy, Water and Wastewater Systems", title: "Critical infrastructure sectors", }, { category: "other", text: "East Asia, Europe, United States, South America, Middle East", title: "Countries/areas deployed", }, { category: "other", text: "Taiwan", title: "Company headquarters location", }, { category: "general", text: "CISA recommends users take defensive measures to minimize the risk of exploitation of this vulnerability. Specifically, users should:", title: "Recommended Practices", }, { category: "general", text: "CISA reminds organizations to perform proper impact analysis and risk assessment prior to deploying defensive measures.\nCISA also provides a section for control systems security recommended practices on the ICS webpage onus-cert.cisa.gov. Several recommended practices are available for reading and download, including Improving Industrial Control Systems Cybersecurity with Defense-in-Depth Strategies.", title: "Recommended Practices", }, { category: "general", text: "Additional mitigation guidance and recommended practices are publicly available on the ICS webpage on us-cert.cisa.gov in the Technical Information Paper, ICS-TIP-12-146-01B--Targeted Cyber Intrusion Detection and Mitigation Strategies.\nOrganizations observing any suspected malicious activity should follow their established internal procedures and report their findings to CISA for tracking and correlation against other incidents.", title: "Recommended Practices", }, { category: "other", text: "No known public exploits specifically target these vulnerabilities.", title: "Exploitability", }, ], publisher: { category: "coordinator", contact_details: "Email: CISAservicedesk@cisa.dhs.gov;\n Toll Free: 1-888-282-0870", name: "CISA", namespace: "https://www.cisa.gov/", }, references: [ { category: "self", summary: "ICS Advisory ICSA-21-054-03 JSON", url: "https://raw.githubusercontent.com/cisagov/CSAF/develop/csaf_files/OT/white/2021/icsa-21-054-03.json", }, { category: "self", summary: "ICS Advisory ICSA-21-054-03 Web Version", url: "https://www.cisa.gov/news-events/ics-advisories/icsa-21-054-03", }, { category: "external", summary: "Recommended Practices", url: "https://us-cert.cisa.gov/ics/alerts/ICS-ALERT-10-301-01", }, { category: "external", summary: "Recommended Practices", url: "https://us-cert.cisa.gov/sites/default/files/recommended_practices/NCCIC_ICS-CERT_Defense_in_Depth_2016_S508C.pdf", }, { category: "external", summary: "Recommended Practices", url: "https://us-cert.cisa.gov/ics/tips/ICS-TIP-12-146-01B", }, ], title: "Advantech Spectre RT Industrial Routers", tracking: { current_release_date: "2021-02-23T00:00:00.000000Z", generator: { engine: { name: "CISA CSAF Generator", version: "1.0.0", }, }, id: "ICSA-21-054-03", initial_release_date: "2021-02-23T00:00:00.000000Z", revision_history: [ { date: "2021-02-23T00:00:00.000000Z", legacy_version: "Initial", number: "1", summary: "ICSA-21-054-03 Advantech Spectre RT Industrial Routers", }, ], status: "final", version: "1", }, }, product_tree: { branches: [ { branches: [ { branches: [ { category: "product_version_range", name: "<= 5.1.3", product: { name: "Spectre RT ERT351: firmware Versions 5.1.3 and prior", product_id: "CSAFPID-0001", }, }, ], category: "product_name", name: "Spectre RT ERT351", }, ], category: "vendor", name: "Advantech", }, ], }, vulnerabilities: [ { cve: "CVE-2019-18233", cwe: { id: "CWE-79", name: "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')", }, notes: [ { category: "summary", text: "The affected product does not neutralize special characters in the error response, allowing attackers to use a reflected XSS attack.CVE-2019-18233 has been assigned to this vulnerability. A CVSS v3 base score of 4.3 has been calculated; the CVSS vector string is (AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N).", title: "Vulnerability Summary", }, ], product_status: { known_affected: [ "CSAFPID-0001", ], }, references: [ { category: "external", summary: "web.nvd.nist.gov", url: "http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2019-18233", }, { category: "external", summary: "www.first.org", url: "https://www.first.org/cvss/calculator/3.0#CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N", }, ], remediations: [ { category: "mitigation", details: "For additional information, please see Advantech Security Advisory SA-2021-01-01", product_ids: [ "CSAFPID-0001", ], url: "https://ep.advantech-bb.cz/support/router-models/download/511/sa-2021-01-fw-5.1.3-and-older-en.pdf", }, { category: "mitigation", details: "Advantech recommends users update to Version 6.2.7 or later.", product_ids: [ "CSAFPID-0001", ], url: "https://www.advantech-bb.cz/firmware", }, ], scores: [ { cvss_v3: { baseScore: 4.3, baseSeverity: "MEDIUM", vectorString: "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N", version: "3.0", }, products: [ "CSAFPID-0001", ], }, ], }, { cve: "CVE-2019-18231", cwe: { id: "CWE-319", name: "Cleartext Transmission of Sensitive Information", }, notes: [ { category: "summary", text: "Login and password are transmitted in clear text form, which may allow an attacker to intercept the request.CVE-2019-18231 has been assigned to this vulnerability. A CVSS v3 base score of 7.5 has been calculated; the CVSS vector string is (AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N).", title: "Vulnerability Summary", }, ], product_status: { known_affected: [ "CSAFPID-0001", ], }, references: [ { category: "external", summary: "web.nvd.nist.gov", url: "http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2019-18231", }, { category: "external", summary: "www.first.org", url: "https://www.first.org/cvss/calculator/3.0#CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", }, ], remediations: [ { category: "mitigation", details: "For additional information, please see Advantech Security Advisory SA-2021-01-01", product_ids: [ "CSAFPID-0001", ], url: "https://ep.advantech-bb.cz/support/router-models/download/511/sa-2021-01-fw-5.1.3-and-older-en.pdf", }, { category: "mitigation", details: "Advantech recommends users update to Version 6.2.7 or later.", product_ids: [ "CSAFPID-0001", ], url: "https://www.advantech-bb.cz/firmware", }, ], scores: [ { cvss_v3: { baseScore: 7.5, baseSeverity: "HIGH", vectorString: "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", version: "3.0", }, products: [ "CSAFPID-0001", ], }, ], }, { cve: "CVE-2019-18235", cwe: { id: "CWE-307", name: "Improper Restriction of Excessive Authentication Attempts", }, notes: [ { category: "summary", text: "Insufficient login authentication parameters required for the web application may allow an attacker to gain full access using a brute-force password attack.CVE-2019-18235 has been assigned to this vulnerability. A CVSS v3 base score of 9.8 has been calculated; the CVSS vector string is (AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H).", title: "Vulnerability Summary", }, ], product_status: { known_affected: [ "CSAFPID-0001", ], }, references: [ { category: "external", summary: "web.nvd.nist.gov", url: "http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2019-18235", }, { category: "external", summary: "www.first.org", url: "https://www.first.org/cvss/calculator/3.0#CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", }, ], remediations: [ { category: "mitigation", details: "For additional information, please see Advantech Security Advisory SA-2021-01-01", product_ids: [ "CSAFPID-0001", ], url: "https://ep.advantech-bb.cz/support/router-models/download/511/sa-2021-01-fw-5.1.3-and-older-en.pdf", }, { category: "mitigation", details: "Advantech recommends users update to Version 6.2.7 or later.", product_ids: [ "CSAFPID-0001", ], url: "https://www.advantech-bb.cz/firmware", }, ], scores: [ { cvss_v3: { baseScore: 9.8, baseSeverity: "CRITICAL", vectorString: "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", version: "3.0", }, products: [ "CSAFPID-0001", ], }, ], }, { cve: "CVE-2018-20679", cwe: { id: "CWE-327", name: "Use of a Broken or Risky Cryptographic Algorithm", }, notes: [ { category: "summary", text: "Outdated version of BusyBox password encryption is in use, which may allow an attacker to discover passwords.CVE-2018-20679, CVE-2016-6301, CVE-2015-9261, and others have been assigned to this version of BusyBox. A CVSS v3 base score of 7.5 has been calculated; the CVSS vector string is (AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H).", title: "Vulnerability Summary", }, ], product_status: { known_affected: [ "CSAFPID-0001", ], }, references: [ { category: "external", summary: "web.nvd.nist.gov", url: "http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2018-20679", }, { category: "external", summary: "web.nvd.nist.gov", url: "http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2016-6301", }, { category: "external", summary: "web.nvd.nist.gov", url: "http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2015-9261", }, { category: "external", summary: "www.first.org", url: "https://www.first.org/cvss/calculator/3.0#CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", }, ], remediations: [ { category: "mitigation", details: "For additional information, please see Advantech Security Advisory SA-2021-01-01", product_ids: [ "CSAFPID-0001", ], url: "https://ep.advantech-bb.cz/support/router-models/download/511/sa-2021-01-fw-5.1.3-and-older-en.pdf", }, { category: "mitigation", details: "Advantech recommends users update to Version 6.2.7 or later.", product_ids: [ "CSAFPID-0001", ], url: "https://www.advantech-bb.cz/firmware", }, ], scores: [ { cvss_v3: { baseScore: 7.5, baseSeverity: "HIGH", vectorString: "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", version: "3.0", }, products: [ "CSAFPID-0001", ], }, ], }, { cve: "CVE-2016-6301", cwe: { id: "CWE-1103", name: "Use of Platform-Dependent Third Party Components", }, notes: [ { category: "summary", text: "Outdated version of OpenSSL is in use, which may allow an attacker to exploit known vulnerabilities in OpenSSL.CVE-2016-2842, CVE-2016-0799, CVE-2016-6304 and others have been assigned to this version of OpenSSL. A CVSS v3 base score of 10.0 has been calculated; the CVSS vector string is (AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H).", title: "Vulnerability Summary", }, ], product_status: { known_affected: [ "CSAFPID-0001", ], }, references: [ { category: "external", summary: "web.nvd.nist.gov", url: "http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2016-2842", }, { category: "external", summary: "web.nvd.nist.gov", url: "http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2016-0799", }, { category: "external", summary: "web.nvd.nist.gov", url: "http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2016-6304", }, { category: "external", summary: "www.first.org", url: "https://www.first.org/cvss/calculator/3.0#CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H", }, ], remediations: [ { category: "mitigation", details: "For additional information, please see Advantech Security Advisory SA-2021-01-01", product_ids: [ "CSAFPID-0001", ], url: "https://ep.advantech-bb.cz/support/router-models/download/511/sa-2021-01-fw-5.1.3-and-older-en.pdf", }, { category: "mitigation", details: "Advantech recommends users update to Version 6.2.7 or later.", product_ids: [ "CSAFPID-0001", ], url: "https://www.advantech-bb.cz/firmware", }, ], scores: [ { cvss_v3: { baseScore: 10, baseSeverity: "CRITICAL", vectorString: "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H", version: "3.0", }, products: [ "CSAFPID-0001", ], }, ], }, ], }
ghsa-73q8-6p6h-wvfh
Vulnerability from github
Published
2022-05-14 00:52
Modified
2022-05-14 00:52
Severity ?
Details
An issue was discovered in BusyBox before 1.30.0. An out of bounds read in udhcp components (consumed by the DHCP server, client, and relay) allows a remote attacker to leak sensitive information from the stack by sending a crafted DHCP message. This is related to verification in udhcp_get_option() in networking/udhcp/common.c that 4-byte options are indeed 4 bytes.
{ affected: [], aliases: [ "CVE-2018-20679", ], database_specific: { cwe_ids: [ "CWE-125", ], github_reviewed: false, github_reviewed_at: null, nvd_published_at: "2019-01-09T16:29:00Z", severity: "HIGH", }, details: "An issue was discovered in BusyBox before 1.30.0. An out of bounds read in udhcp components (consumed by the DHCP server, client, and relay) allows a remote attacker to leak sensitive information from the stack by sending a crafted DHCP message. This is related to verification in udhcp_get_option() in networking/udhcp/common.c that 4-byte options are indeed 4 bytes.", id: "GHSA-73q8-6p6h-wvfh", modified: "2022-05-14T00:52:07Z", published: "2022-05-14T00:52:07Z", references: [ { type: "ADVISORY", url: "https://nvd.nist.gov/vuln/detail/CVE-2018-20679", }, { type: "WEB", url: "https://bugs.busybox.net/show_bug.cgi?id=11506", }, { type: "WEB", url: "https://busybox.net/news.html", }, { type: "WEB", url: "https://git.busybox.net/busybox/commit/?id=6d3b4bb24da9a07c263f3c1acf8df85382ff562c", }, { type: "WEB", url: "https://seclists.org/bugtraq/2019/Sep/7", }, { type: "WEB", url: "https://usn.ubuntu.com/3935-1", }, { type: "WEB", url: "http://packetstormsecurity.com/files/154361/Cisco-Device-Hardcoded-Credentials-GNU-glibc-BusyBox.html", }, { type: "WEB", url: "http://seclists.org/fulldisclosure/2019/Sep/7", }, ], schema_version: "1.4.0", severity: [ { score: "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", type: "CVSS_V3", }, ], }
opensuse-su-2021:1408-1
Vulnerability from csaf_opensuse
Published
2021-10-31 14:53
Modified
2021-10-31 14:53
Summary
Security update for busybox
Notes
Title of the patch
Security update for busybox
Description of the patch
This update for busybox fixes the following issues:
- CVE-2021-28831: Fixed invalid free or segmentation fault via malformed gzip data (bsc#1184522).
- CVE-2018-20679: Fixed out of bounds read in udhcp (bsc#1121426).
- CVE-2018-1000517: Fixed buffer overflow in the retrieve_file_data() (bsc#1099260).
- CVE-2011-5325: Fixed a directory traversal related to 'tar' command (bsc#951562).
- CVE-2018-1000500: Fixed missing SSL certificate validation related to the 'wget' command (bsc#1099263).
This update was imported from the SUSE:SLE-15:Update update project.
Patchnames
openSUSE-2021-1408
Terms of use
CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
{ document: { aggregate_severity: { namespace: "https://www.suse.com/support/security/rating/", text: "important", }, category: "csaf_security_advisory", csaf_version: "2.0", distribution: { text: "Copyright 2024 SUSE LLC. All rights reserved.", tlp: { label: "WHITE", url: "https://www.first.org/tlp/", }, }, lang: "en", notes: [ { category: "summary", text: "Security update for busybox", title: "Title of the patch", }, { category: "description", text: "This update for busybox fixes the following issues:\n\n- CVE-2021-28831: Fixed invalid free or segmentation fault via malformed gzip data (bsc#1184522).\n- CVE-2018-20679: Fixed out of bounds read in udhcp (bsc#1121426).\n- CVE-2018-1000517: Fixed buffer overflow in the retrieve_file_data() (bsc#1099260).\n- CVE-2011-5325: Fixed a directory traversal related to 'tar' command (bsc#951562).\n- CVE-2018-1000500: Fixed missing SSL certificate validation related to the 'wget' command (bsc#1099263).\n\nThis update was imported from the SUSE:SLE-15:Update update project.", title: "Description of the patch", }, { category: "details", text: "openSUSE-2021-1408", title: "Patchnames", }, { category: "legal_disclaimer", text: "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", title: "Terms of use", }, ], publisher: { category: "vendor", contact_details: "https://www.suse.com/support/security/contact/", name: "SUSE Product Security Team", namespace: "https://www.suse.com/", }, references: [ { category: "external", summary: "SUSE ratings", url: "https://www.suse.com/support/security/rating/", }, { category: "self", summary: "URL of this CSAF notice", url: "https://ftp.suse.com/pub/projects/security/csaf/opensuse-su-2021_1408-1.json", }, { category: "self", summary: "URL for openSUSE-SU-2021:1408-1", url: "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/LTZHQ6OAWXY23IUCNO7X25C5CHHCWLOM/", }, { category: "self", summary: "E-Mail link for openSUSE-SU-2021:1408-1", url: "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/LTZHQ6OAWXY23IUCNO7X25C5CHHCWLOM/", }, { category: "self", summary: "SUSE Bug 1099260", url: "https://bugzilla.suse.com/1099260", }, { category: "self", summary: "SUSE Bug 1099263", url: "https://bugzilla.suse.com/1099263", }, { category: "self", summary: "SUSE Bug 1121426", url: "https://bugzilla.suse.com/1121426", }, { category: "self", summary: "SUSE Bug 1184522", url: "https://bugzilla.suse.com/1184522", }, { category: "self", summary: "SUSE Bug 951562", url: "https://bugzilla.suse.com/951562", }, { category: "self", summary: "SUSE CVE CVE-2011-5325 page", url: "https://www.suse.com/security/cve/CVE-2011-5325/", }, { category: "self", summary: "SUSE CVE CVE-2018-1000500 page", url: "https://www.suse.com/security/cve/CVE-2018-1000500/", }, { category: "self", summary: "SUSE CVE CVE-2018-1000517 page", url: "https://www.suse.com/security/cve/CVE-2018-1000517/", }, { category: "self", summary: "SUSE CVE CVE-2018-20679 page", url: "https://www.suse.com/security/cve/CVE-2018-20679/", }, { category: "self", summary: "SUSE CVE CVE-2021-28831 page", url: "https://www.suse.com/security/cve/CVE-2021-28831/", }, ], title: "Security update for busybox", tracking: { current_release_date: "2021-10-31T14:53:16Z", generator: { date: "2021-10-31T14:53:16Z", engine: { name: "cve-database.git:bin/generate-csaf.pl", version: "1", }, }, id: "openSUSE-SU-2021:1408-1", initial_release_date: "2021-10-31T14:53:16Z", revision_history: [ { date: "2021-10-31T14:53:16Z", number: "1", summary: "Current version", }, ], status: "final", version: "1", }, }, product_tree: { branches: [ { branches: [ { branches: [ { category: "product_version", name: "busybox-1.26.2-lp152.5.3.1.i586", product: { name: "busybox-1.26.2-lp152.5.3.1.i586", product_id: "busybox-1.26.2-lp152.5.3.1.i586", }, }, ], category: "architecture", name: "i586", }, { branches: [ { category: "product_version", name: "busybox-1.26.2-lp152.5.3.1.x86_64", product: { name: "busybox-1.26.2-lp152.5.3.1.x86_64", product_id: "busybox-1.26.2-lp152.5.3.1.x86_64", }, }, { category: "product_version", name: "busybox-static-1.26.2-lp152.5.3.1.x86_64", product: { name: "busybox-static-1.26.2-lp152.5.3.1.x86_64", product_id: "busybox-static-1.26.2-lp152.5.3.1.x86_64", }, }, ], category: "architecture", name: "x86_64", }, { branches: [ { category: "product_name", name: "openSUSE Leap 15.2", product: { name: "openSUSE Leap 15.2", product_id: "openSUSE Leap 15.2", product_identification_helper: { cpe: "cpe:/o:opensuse:leap:15.2", }, }, }, ], category: "product_family", name: "SUSE Linux Enterprise", }, ], category: "vendor", name: "SUSE", }, ], relationships: [ { category: "default_component_of", full_product_name: { name: "busybox-1.26.2-lp152.5.3.1.i586 as component of openSUSE Leap 15.2", product_id: "openSUSE Leap 15.2:busybox-1.26.2-lp152.5.3.1.i586", }, product_reference: "busybox-1.26.2-lp152.5.3.1.i586", relates_to_product_reference: "openSUSE Leap 15.2", }, { category: "default_component_of", full_product_name: { name: "busybox-1.26.2-lp152.5.3.1.x86_64 as component of openSUSE Leap 15.2", product_id: "openSUSE Leap 15.2:busybox-1.26.2-lp152.5.3.1.x86_64", }, product_reference: "busybox-1.26.2-lp152.5.3.1.x86_64", relates_to_product_reference: "openSUSE Leap 15.2", }, { category: "default_component_of", full_product_name: { name: "busybox-static-1.26.2-lp152.5.3.1.x86_64 as component of openSUSE Leap 15.2", product_id: "openSUSE Leap 15.2:busybox-static-1.26.2-lp152.5.3.1.x86_64", }, product_reference: "busybox-static-1.26.2-lp152.5.3.1.x86_64", relates_to_product_reference: "openSUSE Leap 15.2", }, ], }, vulnerabilities: [ { cve: "CVE-2011-5325", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2011-5325", }, ], notes: [ { category: "general", text: "Directory traversal vulnerability in the BusyBox implementation of tar before 1.22.0 v5 allows remote attackers to point to files outside the current working directory via a symlink.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Leap 15.2:busybox-1.26.2-lp152.5.3.1.i586", "openSUSE Leap 15.2:busybox-1.26.2-lp152.5.3.1.x86_64", "openSUSE Leap 15.2:busybox-static-1.26.2-lp152.5.3.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2011-5325", url: "https://www.suse.com/security/cve/CVE-2011-5325", }, { category: "external", summary: "SUSE Bug 951562 for CVE-2011-5325", url: "https://bugzilla.suse.com/951562", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Leap 15.2:busybox-1.26.2-lp152.5.3.1.i586", "openSUSE Leap 15.2:busybox-1.26.2-lp152.5.3.1.x86_64", "openSUSE Leap 15.2:busybox-static-1.26.2-lp152.5.3.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 7.5, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N", version: "3.1", }, products: [ "openSUSE Leap 15.2:busybox-1.26.2-lp152.5.3.1.i586", "openSUSE Leap 15.2:busybox-1.26.2-lp152.5.3.1.x86_64", "openSUSE Leap 15.2:busybox-static-1.26.2-lp152.5.3.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2021-10-31T14:53:16Z", details: "moderate", }, ], title: "CVE-2011-5325", }, { cve: "CVE-2018-1000500", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2018-1000500", }, ], notes: [ { category: "general", text: "Busybox contains a Missing SSL certificate validation vulnerability in The \"busybox wget\" applet that can result in arbitrary code execution. This attack appear to be exploitable via Simply download any file over HTTPS using \"busybox wget https://compromised-domain.com/important-file\".", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Leap 15.2:busybox-1.26.2-lp152.5.3.1.i586", "openSUSE Leap 15.2:busybox-1.26.2-lp152.5.3.1.x86_64", "openSUSE Leap 15.2:busybox-static-1.26.2-lp152.5.3.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2018-1000500", url: "https://www.suse.com/security/cve/CVE-2018-1000500", }, { category: "external", summary: "SUSE Bug 1099263 for CVE-2018-1000500", url: "https://bugzilla.suse.com/1099263", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Leap 15.2:busybox-1.26.2-lp152.5.3.1.i586", "openSUSE Leap 15.2:busybox-1.26.2-lp152.5.3.1.x86_64", "openSUSE Leap 15.2:busybox-static-1.26.2-lp152.5.3.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 7.5, baseSeverity: "HIGH", vectorString: "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N", version: "3.0", }, products: [ "openSUSE Leap 15.2:busybox-1.26.2-lp152.5.3.1.i586", "openSUSE Leap 15.2:busybox-1.26.2-lp152.5.3.1.x86_64", "openSUSE Leap 15.2:busybox-static-1.26.2-lp152.5.3.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2021-10-31T14:53:16Z", details: "important", }, ], title: "CVE-2018-1000500", }, { cve: "CVE-2018-1000517", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2018-1000517", }, ], notes: [ { category: "general", text: "BusyBox project BusyBox wget version prior to commit 8e2174e9bd836e53c8b9c6e00d1bc6e2a718686e contains a Buffer Overflow vulnerability in Busybox wget that can result in heap buffer overflow. This attack appear to be exploitable via network connectivity. This vulnerability appears to have been fixed in after commit 8e2174e9bd836e53c8b9c6e00d1bc6e2a718686e.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Leap 15.2:busybox-1.26.2-lp152.5.3.1.i586", "openSUSE Leap 15.2:busybox-1.26.2-lp152.5.3.1.x86_64", "openSUSE Leap 15.2:busybox-static-1.26.2-lp152.5.3.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2018-1000517", url: "https://www.suse.com/security/cve/CVE-2018-1000517", }, { category: "external", summary: "SUSE Bug 1099260 for CVE-2018-1000517", url: "https://bugzilla.suse.com/1099260", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Leap 15.2:busybox-1.26.2-lp152.5.3.1.i586", "openSUSE Leap 15.2:busybox-1.26.2-lp152.5.3.1.x86_64", "openSUSE Leap 15.2:busybox-static-1.26.2-lp152.5.3.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.6, baseSeverity: "MEDIUM", vectorString: "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L", version: "3.0", }, products: [ "openSUSE Leap 15.2:busybox-1.26.2-lp152.5.3.1.i586", "openSUSE Leap 15.2:busybox-1.26.2-lp152.5.3.1.x86_64", "openSUSE Leap 15.2:busybox-static-1.26.2-lp152.5.3.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2021-10-31T14:53:16Z", details: "important", }, ], title: "CVE-2018-1000517", }, { cve: "CVE-2018-20679", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2018-20679", }, ], notes: [ { category: "general", text: "An issue was discovered in BusyBox before 1.30.0. An out of bounds read in udhcp components (consumed by the DHCP server, client, and relay) allows a remote attacker to leak sensitive information from the stack by sending a crafted DHCP message. This is related to verification in udhcp_get_option() in networking/udhcp/common.c that 4-byte options are indeed 4 bytes.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Leap 15.2:busybox-1.26.2-lp152.5.3.1.i586", "openSUSE Leap 15.2:busybox-1.26.2-lp152.5.3.1.x86_64", "openSUSE Leap 15.2:busybox-static-1.26.2-lp152.5.3.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2018-20679", url: "https://www.suse.com/security/cve/CVE-2018-20679", }, { category: "external", summary: "SUSE Bug 1121426 for CVE-2018-20679", url: "https://bugzilla.suse.com/1121426", }, { category: "external", summary: "SUSE Bug 1121428 for CVE-2018-20679", url: "https://bugzilla.suse.com/1121428", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Leap 15.2:busybox-1.26.2-lp152.5.3.1.i586", "openSUSE Leap 15.2:busybox-1.26.2-lp152.5.3.1.x86_64", "openSUSE Leap 15.2:busybox-static-1.26.2-lp152.5.3.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.3, baseSeverity: "MEDIUM", vectorString: "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N", version: "3.0", }, products: [ "openSUSE Leap 15.2:busybox-1.26.2-lp152.5.3.1.i586", "openSUSE Leap 15.2:busybox-1.26.2-lp152.5.3.1.x86_64", "openSUSE Leap 15.2:busybox-static-1.26.2-lp152.5.3.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2021-10-31T14:53:16Z", details: "moderate", }, ], title: "CVE-2018-20679", }, { cve: "CVE-2021-28831", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2021-28831", }, ], notes: [ { category: "general", text: "decompress_gunzip.c in BusyBox through 1.32.1 mishandles the error bit on the huft_build result pointer, with a resultant invalid free or segmentation fault, via malformed gzip data.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Leap 15.2:busybox-1.26.2-lp152.5.3.1.i586", "openSUSE Leap 15.2:busybox-1.26.2-lp152.5.3.1.x86_64", "openSUSE Leap 15.2:busybox-static-1.26.2-lp152.5.3.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2021-28831", url: "https://www.suse.com/security/cve/CVE-2021-28831", }, { category: "external", summary: "SUSE Bug 1184522 for CVE-2021-28831", url: "https://bugzilla.suse.com/1184522", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Leap 15.2:busybox-1.26.2-lp152.5.3.1.i586", "openSUSE Leap 15.2:busybox-1.26.2-lp152.5.3.1.x86_64", "openSUSE Leap 15.2:busybox-static-1.26.2-lp152.5.3.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 7.5, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "openSUSE Leap 15.2:busybox-1.26.2-lp152.5.3.1.i586", "openSUSE Leap 15.2:busybox-1.26.2-lp152.5.3.1.x86_64", "openSUSE Leap 15.2:busybox-static-1.26.2-lp152.5.3.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2021-10-31T14:53:16Z", details: "important", }, ], title: "CVE-2021-28831", }, ], }
opensuse-su-2022:0135-1
Vulnerability from csaf_opensuse
Published
2022-01-20 09:04
Modified
2022-01-20 09:04
Summary
Security update for busybox
Notes
Title of the patch
Security update for busybox
Description of the patch
This update for busybox fixes the following issues:
- CVE-2011-5325: Fixed tar directory traversal (bsc#951562).
- CVE-2015-9261: Fixed segfalts and application crashes in huft_build (bsc#1102912).
- CVE-2016-2147: Fixed out of bounds write (heap) due to integer underflow in udhcpc (bsc#970663).
- CVE-2016-2148: Fixed heap-based buffer overflow in OPTION_6RD parsing (bsc#970662).
- CVE-2016-6301: Fixed NTP server denial of service flaw (bsc#991940).
- CVE-2017-15873: Fixed integer overflow in get_next_block function in archival/libarchive/decompress_bunzip2.c (bsc#1064976).
- CVE-2017-15874: Fixed integer underflow in archival/libarchive/decompress_unlzma.c (bsc#1064978).
- CVE-2017-16544: Fixed Insufficient sanitization of filenames when autocompleting (bsc#1069412).
- CVE-2018-1000500 : Fixed missing SSL certificate validation in wget (bsc#1099263).
- CVE-2018-1000517: Fixed heap-based buffer overflow in the retrieve_file_data() (bsc#1099260).
- CVE-2018-20679: Fixed out of bounds read in udhcp (bsc#1121426).
- CVE-2019-5747: Fixed out of bounds read in udhcp components (bsc#1121428).
- CVE-2021-28831: Fixed invalid free or segmentation fault via malformed gzip data (bsc#1184522).
- CVE-2021-42373: Fixed NULL pointer dereference in man leading to DoS when a section name is supplied but no page argument is given (bsc#1192869).
- CVE-2021-42374: Fixed out-of-bounds heap read in unlzma leading to information leak and DoS when crafted LZMA-compressed input is decompressed (bsc#1192869).
- CVE-2021-42375: Fixed incorrect handling of a special element in ash leading to DoS when processing a crafted shell command, due to the shell mistaking specific characters for reserved characters (bsc#1192869).
- CVE-2021-42376: Fixed NULL pointer dereference in hush leading to DoS when processing a crafted shell command (bsc#1192869).
- CVE-2021-42377: Fixed attacker-controlled pointer free in hush leading to DoS and possible code execution when processing a crafted shell command (bsc#1192869).
- CVE-2021-42378: Fixed use-after-free in awk leading to DoS and possibly code execution when processing a crafted awk pattern in the getvar_i function (bsc#1192869).
- CVE-2021-42379: Fixed use-after-free in awk leading to DoS and possibly code execution when processing a crafted awk pattern in the next_input_file function (bsc#1192869).
- CVE-2021-42380: Fixed use-after-free in awk leading to DoS and possibly code execution when processing a crafted awk pattern in the clrvar function (bsc#1192869).
- CVE-2021-42381: Fixed use-after-free in awk leading to DoS and possibly code execution when processing a crafted awk pattern in the hash_init function (bsc#1192869).
- CVE-2021-42382: Fixed use-after-free in awk leading to DoS and possibly code execution when processing a crafted awk pattern in the getvar_s function (bsc#1192869).
- CVE-2021-42383: Fixed use-after-free in awk leading to DoS and possibly code execution when processing a crafted awk pattern in the evaluate function (bsc#1192869).
- CVE-2021-42384: Fixed use-after-free in awk leading to DoS and possibly code execution when processing a crafted awk pattern in the handle_special function (bsc#1192869).
- CVE-2021-42385: Fixed use-after-free in awk leading to DoS and possibly code execution when processing a crafted awk pattern in the evaluate function (bsc#1192869).
- CVE-2021-42386: Fixed use-after-free in awk leading to DoS and possibly code execution when processing a crafted awk pattern in the nvalloc function (bsc#1192869).
Patchnames
openSUSE-2022-135,openSUSE-SLE-15.3-2022-135
Terms of use
CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
{ document: { aggregate_severity: { namespace: "https://www.suse.com/support/security/rating/", text: "important", }, category: "csaf_security_advisory", csaf_version: "2.0", distribution: { text: "Copyright 2024 SUSE LLC. All rights reserved.", tlp: { label: "WHITE", url: "https://www.first.org/tlp/", }, }, lang: "en", notes: [ { category: "summary", text: "Security update for busybox", title: "Title of the patch", }, { category: "description", text: "This update for busybox fixes the following issues:\n\n- CVE-2011-5325: Fixed tar directory traversal (bsc#951562).\n- CVE-2015-9261: Fixed segfalts and application crashes in huft_build (bsc#1102912).\n- CVE-2016-2147: Fixed out of bounds write (heap) due to integer underflow in udhcpc (bsc#970663).\n- CVE-2016-2148: Fixed heap-based buffer overflow in OPTION_6RD parsing (bsc#970662).\n- CVE-2016-6301: Fixed NTP server denial of service flaw (bsc#991940).\n- CVE-2017-15873: Fixed integer overflow in get_next_block function in archival/libarchive/decompress_bunzip2.c (bsc#1064976).\n- CVE-2017-15874: Fixed integer underflow in archival/libarchive/decompress_unlzma.c (bsc#1064978).\n- CVE-2017-16544: Fixed Insufficient sanitization of filenames when autocompleting (bsc#1069412).\n- CVE-2018-1000500 : Fixed missing SSL certificate validation in wget (bsc#1099263).\n- CVE-2018-1000517: Fixed heap-based buffer overflow in the retrieve_file_data() (bsc#1099260).\n- CVE-2018-20679: Fixed out of bounds read in udhcp (bsc#1121426).\n- CVE-2019-5747: Fixed out of bounds read in udhcp components (bsc#1121428).\n- CVE-2021-28831: Fixed invalid free or segmentation fault via malformed gzip data (bsc#1184522).\n- CVE-2021-42373: Fixed NULL pointer dereference in man leading to DoS when a section name is supplied but no page argument is given (bsc#1192869).\n- CVE-2021-42374: Fixed out-of-bounds heap read in unlzma leading to information leak and DoS when crafted LZMA-compressed input is decompressed (bsc#1192869).\n- CVE-2021-42375: Fixed incorrect handling of a special element in ash leading to DoS when processing a crafted shell command, due to the shell mistaking specific characters for reserved characters (bsc#1192869).\n- CVE-2021-42376: Fixed NULL pointer dereference in hush leading to DoS when processing a crafted shell command (bsc#1192869).\n- CVE-2021-42377: Fixed attacker-controlled pointer free in hush leading to DoS and possible code execution when processing a crafted shell command (bsc#1192869).\n- CVE-2021-42378: Fixed use-after-free in awk leading to DoS and possibly code execution when processing a crafted awk pattern in the getvar_i function (bsc#1192869).\n- CVE-2021-42379: Fixed use-after-free in awk leading to DoS and possibly code execution when processing a crafted awk pattern in the next_input_file function (bsc#1192869).\n- CVE-2021-42380: Fixed use-after-free in awk leading to DoS and possibly code execution when processing a crafted awk pattern in the clrvar function (bsc#1192869).\n- CVE-2021-42381: Fixed use-after-free in awk leading to DoS and possibly code execution when processing a crafted awk pattern in the hash_init function (bsc#1192869).\n- CVE-2021-42382: Fixed use-after-free in awk leading to DoS and possibly code execution when processing a crafted awk pattern in the getvar_s function (bsc#1192869).\n- CVE-2021-42383: Fixed use-after-free in awk leading to DoS and possibly code execution when processing a crafted awk pattern in the evaluate function (bsc#1192869).\n- CVE-2021-42384: Fixed use-after-free in awk leading to DoS and possibly code execution when processing a crafted awk pattern in the handle_special function (bsc#1192869).\n- CVE-2021-42385: Fixed use-after-free in awk leading to DoS and possibly code execution when processing a crafted awk pattern in the evaluate function (bsc#1192869).\n- CVE-2021-42386: Fixed use-after-free in awk leading to DoS and possibly code execution when processing a crafted awk pattern in the nvalloc function (bsc#1192869).\n", title: "Description of the patch", }, { category: "details", text: "openSUSE-2022-135,openSUSE-SLE-15.3-2022-135", title: "Patchnames", }, { category: "legal_disclaimer", text: "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", title: "Terms of use", }, ], publisher: { category: "vendor", contact_details: "https://www.suse.com/support/security/contact/", name: "SUSE Product Security Team", namespace: "https://www.suse.com/", }, references: [ { category: "external", summary: "SUSE ratings", url: "https://www.suse.com/support/security/rating/", }, { category: "self", summary: "URL of this CSAF notice", url: "https://ftp.suse.com/pub/projects/security/csaf/opensuse-su-2022_0135-1.json", }, { category: "self", summary: "URL for openSUSE-SU-2022:0135-1", url: "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/YB6DIPEMLRTDD3RU77DD7UYYKBEEKYDY/", }, { category: "self", summary: "E-Mail link for openSUSE-SU-2022:0135-1", url: "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/YB6DIPEMLRTDD3RU77DD7UYYKBEEKYDY/", }, { category: "self", summary: "SUSE Bug 1064976", url: "https://bugzilla.suse.com/1064976", }, { category: "self", summary: "SUSE Bug 1064978", url: "https://bugzilla.suse.com/1064978", }, { category: "self", summary: "SUSE Bug 1069412", url: "https://bugzilla.suse.com/1069412", }, { category: "self", summary: "SUSE Bug 1099260", url: "https://bugzilla.suse.com/1099260", }, { category: "self", summary: "SUSE Bug 1099263", url: "https://bugzilla.suse.com/1099263", }, { category: "self", summary: "SUSE Bug 1102912", url: "https://bugzilla.suse.com/1102912", }, { category: "self", summary: "SUSE Bug 1121426", url: "https://bugzilla.suse.com/1121426", }, { category: "self", summary: "SUSE Bug 1121428", url: "https://bugzilla.suse.com/1121428", }, { category: "self", summary: "SUSE Bug 1184522", url: "https://bugzilla.suse.com/1184522", }, { category: "self", summary: "SUSE Bug 1192869", url: "https://bugzilla.suse.com/1192869", }, { category: "self", summary: "SUSE Bug 951562", url: "https://bugzilla.suse.com/951562", }, { category: "self", summary: "SUSE Bug 970662", url: "https://bugzilla.suse.com/970662", }, { category: "self", summary: "SUSE Bug 970663", url: "https://bugzilla.suse.com/970663", }, { category: "self", summary: "SUSE Bug 991940", url: "https://bugzilla.suse.com/991940", }, { category: "self", summary: "SUSE CVE CVE-2011-5325 page", url: "https://www.suse.com/security/cve/CVE-2011-5325/", }, { category: "self", summary: "SUSE CVE CVE-2015-9261 page", url: "https://www.suse.com/security/cve/CVE-2015-9261/", }, { category: "self", summary: "SUSE CVE CVE-2016-2147 page", url: "https://www.suse.com/security/cve/CVE-2016-2147/", }, { category: "self", summary: "SUSE CVE CVE-2016-2148 page", url: "https://www.suse.com/security/cve/CVE-2016-2148/", }, { category: "self", summary: "SUSE CVE CVE-2016-6301 page", url: "https://www.suse.com/security/cve/CVE-2016-6301/", }, { category: "self", summary: "SUSE CVE CVE-2017-15873 page", url: "https://www.suse.com/security/cve/CVE-2017-15873/", }, { category: "self", summary: "SUSE CVE CVE-2017-15874 page", url: "https://www.suse.com/security/cve/CVE-2017-15874/", }, { category: "self", summary: "SUSE CVE CVE-2017-16544 page", url: "https://www.suse.com/security/cve/CVE-2017-16544/", }, { category: "self", summary: "SUSE CVE CVE-2018-1000500 page", url: "https://www.suse.com/security/cve/CVE-2018-1000500/", }, { category: "self", summary: "SUSE CVE CVE-2018-1000517 page", url: "https://www.suse.com/security/cve/CVE-2018-1000517/", }, { category: "self", summary: "SUSE CVE CVE-2018-20679 page", url: "https://www.suse.com/security/cve/CVE-2018-20679/", }, { category: "self", summary: "SUSE CVE CVE-2019-5747 page", url: "https://www.suse.com/security/cve/CVE-2019-5747/", }, { category: "self", summary: "SUSE CVE CVE-2021-28831 page", url: "https://www.suse.com/security/cve/CVE-2021-28831/", }, { category: "self", summary: "SUSE CVE CVE-2021-42373 page", url: "https://www.suse.com/security/cve/CVE-2021-42373/", }, { category: "self", summary: "SUSE CVE CVE-2021-42374 page", url: "https://www.suse.com/security/cve/CVE-2021-42374/", }, { category: "self", summary: "SUSE CVE CVE-2021-42375 page", url: "https://www.suse.com/security/cve/CVE-2021-42375/", }, { category: "self", summary: "SUSE CVE CVE-2021-42376 page", url: "https://www.suse.com/security/cve/CVE-2021-42376/", }, { category: "self", summary: "SUSE CVE CVE-2021-42377 page", url: "https://www.suse.com/security/cve/CVE-2021-42377/", }, { category: "self", summary: "SUSE CVE CVE-2021-42378 page", url: "https://www.suse.com/security/cve/CVE-2021-42378/", }, { category: "self", summary: "SUSE CVE CVE-2021-42379 page", url: "https://www.suse.com/security/cve/CVE-2021-42379/", }, { category: "self", summary: "SUSE CVE CVE-2021-42380 page", url: "https://www.suse.com/security/cve/CVE-2021-42380/", }, { category: "self", summary: "SUSE CVE CVE-2021-42381 page", url: "https://www.suse.com/security/cve/CVE-2021-42381/", }, { category: "self", summary: "SUSE CVE CVE-2021-42382 page", url: "https://www.suse.com/security/cve/CVE-2021-42382/", }, { category: "self", summary: "SUSE CVE CVE-2021-42383 page", url: "https://www.suse.com/security/cve/CVE-2021-42383/", }, { category: "self", summary: "SUSE CVE CVE-2021-42384 page", url: "https://www.suse.com/security/cve/CVE-2021-42384/", }, { category: "self", summary: "SUSE CVE CVE-2021-42385 page", url: "https://www.suse.com/security/cve/CVE-2021-42385/", }, { category: "self", summary: "SUSE CVE CVE-2021-42386 page", url: "https://www.suse.com/security/cve/CVE-2021-42386/", }, ], title: "Security update for busybox", tracking: { current_release_date: "2022-01-20T09:04:27Z", generator: { date: "2022-01-20T09:04:27Z", engine: { name: "cve-database.git:bin/generate-csaf.pl", version: "1", }, }, id: "openSUSE-SU-2022:0135-1", initial_release_date: "2022-01-20T09:04:27Z", revision_history: [ { date: "2022-01-20T09:04:27Z", number: "1", summary: "Current version", }, ], status: "final", version: "1", }, }, product_tree: { branches: [ { branches: [ { branches: [ { category: "product_version", name: "busybox-1.34.1-4.9.1.aarch64", product: { name: "busybox-1.34.1-4.9.1.aarch64", product_id: "busybox-1.34.1-4.9.1.aarch64", }, }, { category: "product_version", name: "busybox-static-1.34.1-4.9.1.aarch64", product: { name: "busybox-static-1.34.1-4.9.1.aarch64", product_id: "busybox-static-1.34.1-4.9.1.aarch64", }, }, ], category: "architecture", name: "aarch64", }, { branches: [ { category: "product_version", name: "virtualbox-guest-desktop-icons-6.1.34-lp153.2.27.2.noarch", product: { name: "virtualbox-guest-desktop-icons-6.1.34-lp153.2.27.2.noarch", product_id: "virtualbox-guest-desktop-icons-6.1.34-lp153.2.27.2.noarch", }, }, { category: "product_version", name: "virtualbox-guest-source-6.1.34-lp153.2.27.2.noarch", product: { name: "virtualbox-guest-source-6.1.34-lp153.2.27.2.noarch", product_id: "virtualbox-guest-source-6.1.34-lp153.2.27.2.noarch", }, }, { category: "product_version", name: "virtualbox-host-source-6.1.34-lp153.2.27.2.noarch", product: { name: "virtualbox-host-source-6.1.34-lp153.2.27.2.noarch", product_id: "virtualbox-host-source-6.1.34-lp153.2.27.2.noarch", }, }, ], category: "architecture", name: "noarch", }, { branches: [ { category: "product_version", name: "busybox-1.34.1-4.9.1.ppc64le", product: { name: "busybox-1.34.1-4.9.1.ppc64le", product_id: "busybox-1.34.1-4.9.1.ppc64le", }, }, { category: "product_version", name: "busybox-static-1.34.1-4.9.1.ppc64le", product: { name: "busybox-static-1.34.1-4.9.1.ppc64le", product_id: "busybox-static-1.34.1-4.9.1.ppc64le", }, }, ], category: "architecture", name: "ppc64le", }, { branches: [ { category: "product_version", name: "busybox-1.34.1-4.9.1.s390x", product: { name: "busybox-1.34.1-4.9.1.s390x", product_id: "busybox-1.34.1-4.9.1.s390x", }, }, { category: "product_version", name: "busybox-static-1.34.1-4.9.1.s390x", product: { name: "busybox-static-1.34.1-4.9.1.s390x", product_id: "busybox-static-1.34.1-4.9.1.s390x", }, }, ], category: "architecture", name: "s390x", }, { branches: [ { category: "product_version", name: "python3-virtualbox-6.1.34-lp153.2.27.2.x86_64", product: { name: "python3-virtualbox-6.1.34-lp153.2.27.2.x86_64", product_id: "python3-virtualbox-6.1.34-lp153.2.27.2.x86_64", }, }, { category: "product_version", name: "virtualbox-6.1.34-lp153.2.27.2.x86_64", product: { name: "virtualbox-6.1.34-lp153.2.27.2.x86_64", product_id: "virtualbox-6.1.34-lp153.2.27.2.x86_64", }, }, { category: "product_version", name: "virtualbox-devel-6.1.34-lp153.2.27.2.x86_64", product: { name: "virtualbox-devel-6.1.34-lp153.2.27.2.x86_64", product_id: "virtualbox-devel-6.1.34-lp153.2.27.2.x86_64", }, }, { category: "product_version", name: "virtualbox-guest-tools-6.1.34-lp153.2.27.2.x86_64", product: { name: "virtualbox-guest-tools-6.1.34-lp153.2.27.2.x86_64", product_id: "virtualbox-guest-tools-6.1.34-lp153.2.27.2.x86_64", }, }, { category: "product_version", name: "virtualbox-guest-x11-6.1.34-lp153.2.27.2.x86_64", product: { name: "virtualbox-guest-x11-6.1.34-lp153.2.27.2.x86_64", product_id: "virtualbox-guest-x11-6.1.34-lp153.2.27.2.x86_64", }, }, { category: "product_version", name: "virtualbox-kmp-default-6.1.34_k5.3.18_150300.59.63-lp153.2.27.1.x86_64", product: { name: "virtualbox-kmp-default-6.1.34_k5.3.18_150300.59.63-lp153.2.27.1.x86_64", product_id: "virtualbox-kmp-default-6.1.34_k5.3.18_150300.59.63-lp153.2.27.1.x86_64", }, }, { category: "product_version", name: "virtualbox-kmp-preempt-6.1.34_k5.3.18_150300.59.63-lp153.2.27.1.x86_64", product: { name: "virtualbox-kmp-preempt-6.1.34_k5.3.18_150300.59.63-lp153.2.27.1.x86_64", product_id: "virtualbox-kmp-preempt-6.1.34_k5.3.18_150300.59.63-lp153.2.27.1.x86_64", }, }, { category: "product_version", name: "virtualbox-qt-6.1.34-lp153.2.27.2.x86_64", product: { name: "virtualbox-qt-6.1.34-lp153.2.27.2.x86_64", product_id: "virtualbox-qt-6.1.34-lp153.2.27.2.x86_64", }, }, { category: "product_version", name: "virtualbox-vnc-6.1.34-lp153.2.27.2.x86_64", product: { name: "virtualbox-vnc-6.1.34-lp153.2.27.2.x86_64", product_id: "virtualbox-vnc-6.1.34-lp153.2.27.2.x86_64", }, }, { category: "product_version", name: "virtualbox-websrv-6.1.34-lp153.2.27.2.x86_64", product: { name: "virtualbox-websrv-6.1.34-lp153.2.27.2.x86_64", product_id: "virtualbox-websrv-6.1.34-lp153.2.27.2.x86_64", }, }, { category: "product_version", name: "busybox-1.34.1-4.9.1.x86_64", product: { name: "busybox-1.34.1-4.9.1.x86_64", product_id: "busybox-1.34.1-4.9.1.x86_64", }, }, { category: "product_version", name: "busybox-static-1.34.1-4.9.1.x86_64", product: { name: "busybox-static-1.34.1-4.9.1.x86_64", product_id: "busybox-static-1.34.1-4.9.1.x86_64", }, }, ], category: "architecture", name: "x86_64", }, { branches: [ { category: "product_name", name: "openSUSE Leap 15.3", product: { name: "openSUSE Leap 15.3", product_id: "openSUSE Leap 15.3", product_identification_helper: { cpe: "cpe:/o:opensuse:leap:15.3", }, }, }, { category: "product_name", name: "openSUSE Leap 15.3", product: { name: "openSUSE Leap 15.3", product_id: "openSUSE Leap 15.3", product_identification_helper: { cpe: "cpe:/o:opensuse:leap:15.3", }, }, }, ], category: "product_family", name: "SUSE Linux Enterprise", }, ], category: "vendor", name: "SUSE", }, ], relationships: [ { category: "default_component_of", full_product_name: { name: "python3-virtualbox-6.1.34-lp153.2.27.2.x86_64 as component of openSUSE Leap 15.3", product_id: "openSUSE Leap 15.3:python3-virtualbox-6.1.34-lp153.2.27.2.x86_64", }, product_reference: "python3-virtualbox-6.1.34-lp153.2.27.2.x86_64", relates_to_product_reference: "openSUSE Leap 15.3", }, { category: "default_component_of", full_product_name: { name: "virtualbox-6.1.34-lp153.2.27.2.x86_64 as component of openSUSE Leap 15.3", product_id: "openSUSE Leap 15.3:virtualbox-6.1.34-lp153.2.27.2.x86_64", }, product_reference: "virtualbox-6.1.34-lp153.2.27.2.x86_64", relates_to_product_reference: "openSUSE Leap 15.3", }, { category: "default_component_of", full_product_name: { name: "virtualbox-devel-6.1.34-lp153.2.27.2.x86_64 as component of openSUSE Leap 15.3", product_id: "openSUSE Leap 15.3:virtualbox-devel-6.1.34-lp153.2.27.2.x86_64", }, product_reference: "virtualbox-devel-6.1.34-lp153.2.27.2.x86_64", relates_to_product_reference: "openSUSE Leap 15.3", }, { category: "default_component_of", full_product_name: { name: "virtualbox-guest-desktop-icons-6.1.34-lp153.2.27.2.noarch as component of openSUSE Leap 15.3", product_id: "openSUSE Leap 15.3:virtualbox-guest-desktop-icons-6.1.34-lp153.2.27.2.noarch", }, product_reference: "virtualbox-guest-desktop-icons-6.1.34-lp153.2.27.2.noarch", relates_to_product_reference: "openSUSE Leap 15.3", }, { category: "default_component_of", full_product_name: { name: "virtualbox-guest-source-6.1.34-lp153.2.27.2.noarch as component of openSUSE Leap 15.3", product_id: "openSUSE Leap 15.3:virtualbox-guest-source-6.1.34-lp153.2.27.2.noarch", }, product_reference: "virtualbox-guest-source-6.1.34-lp153.2.27.2.noarch", relates_to_product_reference: "openSUSE Leap 15.3", }, { category: "default_component_of", full_product_name: { name: "virtualbox-guest-tools-6.1.34-lp153.2.27.2.x86_64 as component of openSUSE Leap 15.3", product_id: "openSUSE Leap 15.3:virtualbox-guest-tools-6.1.34-lp153.2.27.2.x86_64", }, product_reference: "virtualbox-guest-tools-6.1.34-lp153.2.27.2.x86_64", relates_to_product_reference: "openSUSE Leap 15.3", }, { category: "default_component_of", full_product_name: { name: "virtualbox-guest-x11-6.1.34-lp153.2.27.2.x86_64 as component of openSUSE Leap 15.3", product_id: "openSUSE Leap 15.3:virtualbox-guest-x11-6.1.34-lp153.2.27.2.x86_64", }, product_reference: "virtualbox-guest-x11-6.1.34-lp153.2.27.2.x86_64", relates_to_product_reference: "openSUSE Leap 15.3", }, { category: "default_component_of", full_product_name: { name: "virtualbox-host-source-6.1.34-lp153.2.27.2.noarch as component of openSUSE Leap 15.3", product_id: "openSUSE Leap 15.3:virtualbox-host-source-6.1.34-lp153.2.27.2.noarch", }, product_reference: "virtualbox-host-source-6.1.34-lp153.2.27.2.noarch", relates_to_product_reference: "openSUSE Leap 15.3", }, { category: "default_component_of", full_product_name: { name: "virtualbox-kmp-default-6.1.34_k5.3.18_150300.59.63-lp153.2.27.1.x86_64 as component of openSUSE Leap 15.3", product_id: "openSUSE Leap 15.3:virtualbox-kmp-default-6.1.34_k5.3.18_150300.59.63-lp153.2.27.1.x86_64", }, product_reference: "virtualbox-kmp-default-6.1.34_k5.3.18_150300.59.63-lp153.2.27.1.x86_64", relates_to_product_reference: "openSUSE Leap 15.3", }, { category: "default_component_of", full_product_name: { name: "virtualbox-kmp-preempt-6.1.34_k5.3.18_150300.59.63-lp153.2.27.1.x86_64 as component of openSUSE Leap 15.3", product_id: "openSUSE Leap 15.3:virtualbox-kmp-preempt-6.1.34_k5.3.18_150300.59.63-lp153.2.27.1.x86_64", }, product_reference: "virtualbox-kmp-preempt-6.1.34_k5.3.18_150300.59.63-lp153.2.27.1.x86_64", relates_to_product_reference: "openSUSE Leap 15.3", }, { category: "default_component_of", full_product_name: { name: "virtualbox-qt-6.1.34-lp153.2.27.2.x86_64 as component of openSUSE Leap 15.3", product_id: "openSUSE Leap 15.3:virtualbox-qt-6.1.34-lp153.2.27.2.x86_64", }, product_reference: "virtualbox-qt-6.1.34-lp153.2.27.2.x86_64", relates_to_product_reference: "openSUSE Leap 15.3", }, { category: "default_component_of", full_product_name: { name: "virtualbox-vnc-6.1.34-lp153.2.27.2.x86_64 as component of openSUSE Leap 15.3", product_id: "openSUSE Leap 15.3:virtualbox-vnc-6.1.34-lp153.2.27.2.x86_64", }, product_reference: "virtualbox-vnc-6.1.34-lp153.2.27.2.x86_64", relates_to_product_reference: "openSUSE Leap 15.3", }, { category: "default_component_of", full_product_name: { name: "virtualbox-websrv-6.1.34-lp153.2.27.2.x86_64 as component of openSUSE Leap 15.3", product_id: "openSUSE Leap 15.3:virtualbox-websrv-6.1.34-lp153.2.27.2.x86_64", }, product_reference: "virtualbox-websrv-6.1.34-lp153.2.27.2.x86_64", relates_to_product_reference: "openSUSE Leap 15.3", }, { category: "default_component_of", full_product_name: { name: "busybox-1.34.1-4.9.1.aarch64 as component of openSUSE Leap 15.3", product_id: "openSUSE Leap 15.3:busybox-1.34.1-4.9.1.aarch64", }, product_reference: "busybox-1.34.1-4.9.1.aarch64", relates_to_product_reference: "openSUSE Leap 15.3", }, { category: "default_component_of", full_product_name: { name: "busybox-1.34.1-4.9.1.ppc64le as component of openSUSE Leap 15.3", product_id: "openSUSE Leap 15.3:busybox-1.34.1-4.9.1.ppc64le", }, product_reference: "busybox-1.34.1-4.9.1.ppc64le", relates_to_product_reference: "openSUSE Leap 15.3", }, { category: "default_component_of", full_product_name: { name: "busybox-1.34.1-4.9.1.s390x as component of openSUSE Leap 15.3", product_id: "openSUSE Leap 15.3:busybox-1.34.1-4.9.1.s390x", }, product_reference: "busybox-1.34.1-4.9.1.s390x", relates_to_product_reference: "openSUSE Leap 15.3", }, { category: "default_component_of", full_product_name: { name: "busybox-1.34.1-4.9.1.x86_64 as component of openSUSE Leap 15.3", product_id: "openSUSE Leap 15.3:busybox-1.34.1-4.9.1.x86_64", }, product_reference: "busybox-1.34.1-4.9.1.x86_64", relates_to_product_reference: "openSUSE Leap 15.3", }, { category: "default_component_of", full_product_name: { name: "busybox-static-1.34.1-4.9.1.aarch64 as component of openSUSE Leap 15.3", product_id: "openSUSE Leap 15.3:busybox-static-1.34.1-4.9.1.aarch64", }, product_reference: "busybox-static-1.34.1-4.9.1.aarch64", relates_to_product_reference: "openSUSE Leap 15.3", }, { category: "default_component_of", full_product_name: { name: "busybox-static-1.34.1-4.9.1.ppc64le as component of openSUSE Leap 15.3", product_id: "openSUSE Leap 15.3:busybox-static-1.34.1-4.9.1.ppc64le", }, product_reference: "busybox-static-1.34.1-4.9.1.ppc64le", relates_to_product_reference: "openSUSE Leap 15.3", }, { category: "default_component_of", full_product_name: { name: "busybox-static-1.34.1-4.9.1.s390x as component of openSUSE Leap 15.3", product_id: "openSUSE Leap 15.3:busybox-static-1.34.1-4.9.1.s390x", }, product_reference: "busybox-static-1.34.1-4.9.1.s390x", relates_to_product_reference: "openSUSE Leap 15.3", }, { category: "default_component_of", full_product_name: { name: "busybox-static-1.34.1-4.9.1.x86_64 as component of openSUSE Leap 15.3", product_id: "openSUSE Leap 15.3:busybox-static-1.34.1-4.9.1.x86_64", }, product_reference: "busybox-static-1.34.1-4.9.1.x86_64", relates_to_product_reference: "openSUSE Leap 15.3", }, { category: "default_component_of", full_product_name: { name: "python3-virtualbox-6.1.34-lp153.2.27.2.x86_64 as component of openSUSE Leap 15.3", product_id: "openSUSE Leap 15.3:python3-virtualbox-6.1.34-lp153.2.27.2.x86_64", }, product_reference: "python3-virtualbox-6.1.34-lp153.2.27.2.x86_64", relates_to_product_reference: "openSUSE Leap 15.3", }, { category: "default_component_of", full_product_name: { name: "virtualbox-6.1.34-lp153.2.27.2.x86_64 as component of openSUSE Leap 15.3", product_id: "openSUSE Leap 15.3:virtualbox-6.1.34-lp153.2.27.2.x86_64", }, product_reference: "virtualbox-6.1.34-lp153.2.27.2.x86_64", relates_to_product_reference: "openSUSE Leap 15.3", }, { category: "default_component_of", full_product_name: { name: "virtualbox-devel-6.1.34-lp153.2.27.2.x86_64 as component of openSUSE Leap 15.3", product_id: "openSUSE Leap 15.3:virtualbox-devel-6.1.34-lp153.2.27.2.x86_64", }, product_reference: "virtualbox-devel-6.1.34-lp153.2.27.2.x86_64", relates_to_product_reference: "openSUSE Leap 15.3", }, { category: "default_component_of", full_product_name: { name: "virtualbox-guest-desktop-icons-6.1.34-lp153.2.27.2.noarch as component of openSUSE Leap 15.3", product_id: "openSUSE Leap 15.3:virtualbox-guest-desktop-icons-6.1.34-lp153.2.27.2.noarch", }, product_reference: "virtualbox-guest-desktop-icons-6.1.34-lp153.2.27.2.noarch", relates_to_product_reference: "openSUSE Leap 15.3", }, { category: "default_component_of", full_product_name: { name: "virtualbox-guest-source-6.1.34-lp153.2.27.2.noarch as component of openSUSE Leap 15.3", product_id: "openSUSE Leap 15.3:virtualbox-guest-source-6.1.34-lp153.2.27.2.noarch", }, product_reference: "virtualbox-guest-source-6.1.34-lp153.2.27.2.noarch", relates_to_product_reference: "openSUSE Leap 15.3", }, { category: "default_component_of", full_product_name: { name: "virtualbox-guest-tools-6.1.34-lp153.2.27.2.x86_64 as component of openSUSE Leap 15.3", product_id: "openSUSE Leap 15.3:virtualbox-guest-tools-6.1.34-lp153.2.27.2.x86_64", }, product_reference: "virtualbox-guest-tools-6.1.34-lp153.2.27.2.x86_64", relates_to_product_reference: "openSUSE Leap 15.3", }, { category: "default_component_of", full_product_name: { name: "virtualbox-guest-x11-6.1.34-lp153.2.27.2.x86_64 as component of openSUSE Leap 15.3", product_id: "openSUSE Leap 15.3:virtualbox-guest-x11-6.1.34-lp153.2.27.2.x86_64", }, product_reference: "virtualbox-guest-x11-6.1.34-lp153.2.27.2.x86_64", relates_to_product_reference: "openSUSE Leap 15.3", }, { category: "default_component_of", full_product_name: { name: "virtualbox-host-source-6.1.34-lp153.2.27.2.noarch as component of openSUSE Leap 15.3", product_id: "openSUSE Leap 15.3:virtualbox-host-source-6.1.34-lp153.2.27.2.noarch", }, product_reference: "virtualbox-host-source-6.1.34-lp153.2.27.2.noarch", relates_to_product_reference: "openSUSE Leap 15.3", }, { category: "default_component_of", full_product_name: { name: "virtualbox-kmp-default-6.1.34_k5.3.18_150300.59.63-lp153.2.27.1.x86_64 as component of openSUSE Leap 15.3", product_id: "openSUSE Leap 15.3:virtualbox-kmp-default-6.1.34_k5.3.18_150300.59.63-lp153.2.27.1.x86_64", }, product_reference: "virtualbox-kmp-default-6.1.34_k5.3.18_150300.59.63-lp153.2.27.1.x86_64", relates_to_product_reference: "openSUSE Leap 15.3", }, { category: "default_component_of", full_product_name: { name: "virtualbox-kmp-preempt-6.1.34_k5.3.18_150300.59.63-lp153.2.27.1.x86_64 as component of openSUSE Leap 15.3", product_id: "openSUSE Leap 15.3:virtualbox-kmp-preempt-6.1.34_k5.3.18_150300.59.63-lp153.2.27.1.x86_64", }, product_reference: "virtualbox-kmp-preempt-6.1.34_k5.3.18_150300.59.63-lp153.2.27.1.x86_64", relates_to_product_reference: "openSUSE Leap 15.3", }, { category: "default_component_of", full_product_name: { name: "virtualbox-qt-6.1.34-lp153.2.27.2.x86_64 as component of openSUSE Leap 15.3", product_id: "openSUSE Leap 15.3:virtualbox-qt-6.1.34-lp153.2.27.2.x86_64", }, product_reference: "virtualbox-qt-6.1.34-lp153.2.27.2.x86_64", relates_to_product_reference: "openSUSE Leap 15.3", }, { category: "default_component_of", full_product_name: { name: "virtualbox-vnc-6.1.34-lp153.2.27.2.x86_64 as component of openSUSE Leap 15.3", product_id: "openSUSE Leap 15.3:virtualbox-vnc-6.1.34-lp153.2.27.2.x86_64", }, product_reference: "virtualbox-vnc-6.1.34-lp153.2.27.2.x86_64", relates_to_product_reference: "openSUSE Leap 15.3", }, { category: "default_component_of", full_product_name: { name: "virtualbox-websrv-6.1.34-lp153.2.27.2.x86_64 as component of openSUSE Leap 15.3", product_id: "openSUSE Leap 15.3:virtualbox-websrv-6.1.34-lp153.2.27.2.x86_64", }, product_reference: "virtualbox-websrv-6.1.34-lp153.2.27.2.x86_64", relates_to_product_reference: "openSUSE Leap 15.3", }, { category: "default_component_of", full_product_name: { name: "busybox-1.34.1-4.9.1.aarch64 as component of openSUSE Leap 15.3", product_id: "openSUSE Leap 15.3:busybox-1.34.1-4.9.1.aarch64", }, product_reference: "busybox-1.34.1-4.9.1.aarch64", relates_to_product_reference: "openSUSE Leap 15.3", }, { category: "default_component_of", full_product_name: { name: "busybox-1.34.1-4.9.1.ppc64le as component of openSUSE Leap 15.3", product_id: "openSUSE Leap 15.3:busybox-1.34.1-4.9.1.ppc64le", }, product_reference: "busybox-1.34.1-4.9.1.ppc64le", relates_to_product_reference: "openSUSE Leap 15.3", }, { category: "default_component_of", full_product_name: { name: "busybox-1.34.1-4.9.1.s390x as component of openSUSE Leap 15.3", product_id: "openSUSE Leap 15.3:busybox-1.34.1-4.9.1.s390x", }, product_reference: "busybox-1.34.1-4.9.1.s390x", relates_to_product_reference: "openSUSE Leap 15.3", }, { category: "default_component_of", full_product_name: { name: "busybox-1.34.1-4.9.1.x86_64 as component of openSUSE Leap 15.3", product_id: "openSUSE Leap 15.3:busybox-1.34.1-4.9.1.x86_64", }, product_reference: "busybox-1.34.1-4.9.1.x86_64", relates_to_product_reference: "openSUSE Leap 15.3", }, { category: "default_component_of", full_product_name: { name: "busybox-static-1.34.1-4.9.1.aarch64 as component of openSUSE Leap 15.3", product_id: "openSUSE Leap 15.3:busybox-static-1.34.1-4.9.1.aarch64", }, product_reference: "busybox-static-1.34.1-4.9.1.aarch64", relates_to_product_reference: "openSUSE Leap 15.3", }, { category: "default_component_of", full_product_name: { name: "busybox-static-1.34.1-4.9.1.ppc64le as component of openSUSE Leap 15.3", product_id: "openSUSE Leap 15.3:busybox-static-1.34.1-4.9.1.ppc64le", }, product_reference: "busybox-static-1.34.1-4.9.1.ppc64le", relates_to_product_reference: "openSUSE Leap 15.3", }, { category: "default_component_of", full_product_name: { name: "busybox-static-1.34.1-4.9.1.s390x as component of openSUSE Leap 15.3", product_id: "openSUSE Leap 15.3:busybox-static-1.34.1-4.9.1.s390x", }, product_reference: "busybox-static-1.34.1-4.9.1.s390x", relates_to_product_reference: "openSUSE Leap 15.3", }, { category: "default_component_of", full_product_name: { name: "busybox-static-1.34.1-4.9.1.x86_64 as component of openSUSE Leap 15.3", product_id: "openSUSE Leap 15.3:busybox-static-1.34.1-4.9.1.x86_64", }, product_reference: "busybox-static-1.34.1-4.9.1.x86_64", relates_to_product_reference: "openSUSE Leap 15.3", }, ], }, vulnerabilities: [ { cve: "CVE-2011-5325", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2011-5325", }, ], notes: [ { category: "general", text: "Directory traversal vulnerability in the BusyBox implementation of tar before 1.22.0 v5 allows remote attackers to point to files outside the current working directory via a symlink.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Leap 15.3:busybox-1.34.1-4.9.1.aarch64", "openSUSE Leap 15.3:busybox-1.34.1-4.9.1.ppc64le", "openSUSE Leap 15.3:busybox-1.34.1-4.9.1.s390x", "openSUSE Leap 15.3:busybox-1.34.1-4.9.1.x86_64", "openSUSE Leap 15.3:busybox-static-1.34.1-4.9.1.aarch64", "openSUSE Leap 15.3:busybox-static-1.34.1-4.9.1.ppc64le", "openSUSE Leap 15.3:busybox-static-1.34.1-4.9.1.s390x", "openSUSE Leap 15.3:busybox-static-1.34.1-4.9.1.x86_64", "openSUSE Leap 15.3:python3-virtualbox-6.1.34-lp153.2.27.2.x86_64", "openSUSE Leap 15.3:virtualbox-6.1.34-lp153.2.27.2.x86_64", "openSUSE Leap 15.3:virtualbox-devel-6.1.34-lp153.2.27.2.x86_64", "openSUSE Leap 15.3:virtualbox-guest-desktop-icons-6.1.34-lp153.2.27.2.noarch", "openSUSE Leap 15.3:virtualbox-guest-source-6.1.34-lp153.2.27.2.noarch", "openSUSE Leap 15.3:virtualbox-guest-tools-6.1.34-lp153.2.27.2.x86_64", "openSUSE Leap 15.3:virtualbox-guest-x11-6.1.34-lp153.2.27.2.x86_64", "openSUSE Leap 15.3:virtualbox-host-source-6.1.34-lp153.2.27.2.noarch", "openSUSE Leap 15.3:virtualbox-kmp-default-6.1.34_k5.3.18_150300.59.63-lp153.2.27.1.x86_64", "openSUSE Leap 15.3:virtualbox-kmp-preempt-6.1.34_k5.3.18_150300.59.63-lp153.2.27.1.x86_64", "openSUSE Leap 15.3:virtualbox-qt-6.1.34-lp153.2.27.2.x86_64", "openSUSE Leap 15.3:virtualbox-vnc-6.1.34-lp153.2.27.2.x86_64", "openSUSE Leap 15.3:virtualbox-websrv-6.1.34-lp153.2.27.2.x86_64", ], }, references: [ { category: "external", summary: "CVE-2011-5325", url: "https://www.suse.com/security/cve/CVE-2011-5325", }, { category: "external", summary: "SUSE Bug 951562 for CVE-2011-5325", url: "https://bugzilla.suse.com/951562", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Leap 15.3:busybox-1.34.1-4.9.1.aarch64", "openSUSE Leap 15.3:busybox-1.34.1-4.9.1.ppc64le", "openSUSE Leap 15.3:busybox-1.34.1-4.9.1.s390x", "openSUSE Leap 15.3:busybox-1.34.1-4.9.1.x86_64", "openSUSE Leap 15.3:busybox-static-1.34.1-4.9.1.aarch64", "openSUSE Leap 15.3:busybox-static-1.34.1-4.9.1.ppc64le", "openSUSE Leap 15.3:busybox-static-1.34.1-4.9.1.s390x", "openSUSE Leap 15.3:busybox-static-1.34.1-4.9.1.x86_64", "openSUSE Leap 15.3:python3-virtualbox-6.1.34-lp153.2.27.2.x86_64", "openSUSE Leap 15.3:virtualbox-6.1.34-lp153.2.27.2.x86_64", "openSUSE Leap 15.3:virtualbox-devel-6.1.34-lp153.2.27.2.x86_64", "openSUSE Leap 15.3:virtualbox-guest-desktop-icons-6.1.34-lp153.2.27.2.noarch", "openSUSE Leap 15.3:virtualbox-guest-source-6.1.34-lp153.2.27.2.noarch", "openSUSE Leap 15.3:virtualbox-guest-tools-6.1.34-lp153.2.27.2.x86_64", "openSUSE Leap 15.3:virtualbox-guest-x11-6.1.34-lp153.2.27.2.x86_64", "openSUSE Leap 15.3:virtualbox-host-source-6.1.34-lp153.2.27.2.noarch", "openSUSE Leap 15.3:virtualbox-kmp-default-6.1.34_k5.3.18_150300.59.63-lp153.2.27.1.x86_64", "openSUSE Leap 15.3:virtualbox-kmp-preempt-6.1.34_k5.3.18_150300.59.63-lp153.2.27.1.x86_64", "openSUSE Leap 15.3:virtualbox-qt-6.1.34-lp153.2.27.2.x86_64", "openSUSE Leap 15.3:virtualbox-vnc-6.1.34-lp153.2.27.2.x86_64", "openSUSE Leap 15.3:virtualbox-websrv-6.1.34-lp153.2.27.2.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 7.5, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N", version: "3.1", }, products: [ "openSUSE Leap 15.3:busybox-1.34.1-4.9.1.aarch64", "openSUSE Leap 15.3:busybox-1.34.1-4.9.1.ppc64le", "openSUSE Leap 15.3:busybox-1.34.1-4.9.1.s390x", "openSUSE Leap 15.3:busybox-1.34.1-4.9.1.x86_64", "openSUSE Leap 15.3:busybox-static-1.34.1-4.9.1.aarch64", "openSUSE Leap 15.3:busybox-static-1.34.1-4.9.1.ppc64le", "openSUSE Leap 15.3:busybox-static-1.34.1-4.9.1.s390x", "openSUSE Leap 15.3:busybox-static-1.34.1-4.9.1.x86_64", "openSUSE Leap 15.3:python3-virtualbox-6.1.34-lp153.2.27.2.x86_64", "openSUSE Leap 15.3:virtualbox-6.1.34-lp153.2.27.2.x86_64", "openSUSE Leap 15.3:virtualbox-devel-6.1.34-lp153.2.27.2.x86_64", "openSUSE Leap 15.3:virtualbox-guest-desktop-icons-6.1.34-lp153.2.27.2.noarch", "openSUSE Leap 15.3:virtualbox-guest-source-6.1.34-lp153.2.27.2.noarch", "openSUSE Leap 15.3:virtualbox-guest-tools-6.1.34-lp153.2.27.2.x86_64", "openSUSE Leap 15.3:virtualbox-guest-x11-6.1.34-lp153.2.27.2.x86_64", "openSUSE Leap 15.3:virtualbox-host-source-6.1.34-lp153.2.27.2.noarch", "openSUSE Leap 15.3:virtualbox-kmp-default-6.1.34_k5.3.18_150300.59.63-lp153.2.27.1.x86_64", "openSUSE Leap 15.3:virtualbox-kmp-preempt-6.1.34_k5.3.18_150300.59.63-lp153.2.27.1.x86_64", "openSUSE Leap 15.3:virtualbox-qt-6.1.34-lp153.2.27.2.x86_64", "openSUSE Leap 15.3:virtualbox-vnc-6.1.34-lp153.2.27.2.x86_64", "openSUSE Leap 15.3:virtualbox-websrv-6.1.34-lp153.2.27.2.x86_64", ], }, ], threats: [ { category: "impact", date: "2022-01-20T09:04:27Z", details: "moderate", }, ], title: "CVE-2011-5325", }, { cve: "CVE-2015-9261", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2015-9261", }, ], notes: [ { category: "general", text: "huft_build in archival/libarchive/decompress_gunzip.c in BusyBox before 1.27.2 misuses a pointer, causing segfaults and an application crash during an unzip operation on a specially crafted ZIP file.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Leap 15.3:busybox-1.34.1-4.9.1.aarch64", "openSUSE Leap 15.3:busybox-1.34.1-4.9.1.ppc64le", "openSUSE Leap 15.3:busybox-1.34.1-4.9.1.s390x", "openSUSE Leap 15.3:busybox-1.34.1-4.9.1.x86_64", "openSUSE Leap 15.3:busybox-static-1.34.1-4.9.1.aarch64", "openSUSE Leap 15.3:busybox-static-1.34.1-4.9.1.ppc64le", "openSUSE Leap 15.3:busybox-static-1.34.1-4.9.1.s390x", "openSUSE Leap 15.3:busybox-static-1.34.1-4.9.1.x86_64", "openSUSE Leap 15.3:python3-virtualbox-6.1.34-lp153.2.27.2.x86_64", "openSUSE Leap 15.3:virtualbox-6.1.34-lp153.2.27.2.x86_64", "openSUSE Leap 15.3:virtualbox-devel-6.1.34-lp153.2.27.2.x86_64", "openSUSE Leap 15.3:virtualbox-guest-desktop-icons-6.1.34-lp153.2.27.2.noarch", "openSUSE Leap 15.3:virtualbox-guest-source-6.1.34-lp153.2.27.2.noarch", "openSUSE Leap 15.3:virtualbox-guest-tools-6.1.34-lp153.2.27.2.x86_64", "openSUSE Leap 15.3:virtualbox-guest-x11-6.1.34-lp153.2.27.2.x86_64", "openSUSE Leap 15.3:virtualbox-host-source-6.1.34-lp153.2.27.2.noarch", "openSUSE Leap 15.3:virtualbox-kmp-default-6.1.34_k5.3.18_150300.59.63-lp153.2.27.1.x86_64", "openSUSE Leap 15.3:virtualbox-kmp-preempt-6.1.34_k5.3.18_150300.59.63-lp153.2.27.1.x86_64", "openSUSE Leap 15.3:virtualbox-qt-6.1.34-lp153.2.27.2.x86_64", "openSUSE Leap 15.3:virtualbox-vnc-6.1.34-lp153.2.27.2.x86_64", "openSUSE Leap 15.3:virtualbox-websrv-6.1.34-lp153.2.27.2.x86_64", ], }, references: [ { category: "external", summary: "CVE-2015-9261", url: "https://www.suse.com/security/cve/CVE-2015-9261", }, { category: "external", summary: "SUSE Bug 1102912 for CVE-2015-9261", url: "https://bugzilla.suse.com/1102912", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Leap 15.3:busybox-1.34.1-4.9.1.aarch64", "openSUSE Leap 15.3:busybox-1.34.1-4.9.1.ppc64le", "openSUSE Leap 15.3:busybox-1.34.1-4.9.1.s390x", "openSUSE Leap 15.3:busybox-1.34.1-4.9.1.x86_64", "openSUSE Leap 15.3:busybox-static-1.34.1-4.9.1.aarch64", "openSUSE Leap 15.3:busybox-static-1.34.1-4.9.1.ppc64le", "openSUSE Leap 15.3:busybox-static-1.34.1-4.9.1.s390x", "openSUSE Leap 15.3:busybox-static-1.34.1-4.9.1.x86_64", "openSUSE Leap 15.3:python3-virtualbox-6.1.34-lp153.2.27.2.x86_64", "openSUSE Leap 15.3:virtualbox-6.1.34-lp153.2.27.2.x86_64", "openSUSE Leap 15.3:virtualbox-devel-6.1.34-lp153.2.27.2.x86_64", "openSUSE Leap 15.3:virtualbox-guest-desktop-icons-6.1.34-lp153.2.27.2.noarch", "openSUSE Leap 15.3:virtualbox-guest-source-6.1.34-lp153.2.27.2.noarch", "openSUSE Leap 15.3:virtualbox-guest-tools-6.1.34-lp153.2.27.2.x86_64", "openSUSE Leap 15.3:virtualbox-guest-x11-6.1.34-lp153.2.27.2.x86_64", "openSUSE Leap 15.3:virtualbox-host-source-6.1.34-lp153.2.27.2.noarch", "openSUSE Leap 15.3:virtualbox-kmp-default-6.1.34_k5.3.18_150300.59.63-lp153.2.27.1.x86_64", "openSUSE Leap 15.3:virtualbox-kmp-preempt-6.1.34_k5.3.18_150300.59.63-lp153.2.27.1.x86_64", "openSUSE Leap 15.3:virtualbox-qt-6.1.34-lp153.2.27.2.x86_64", "openSUSE Leap 15.3:virtualbox-vnc-6.1.34-lp153.2.27.2.x86_64", "openSUSE Leap 15.3:virtualbox-websrv-6.1.34-lp153.2.27.2.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.5, baseSeverity: "MEDIUM", vectorString: "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", version: "3.0", }, products: [ "openSUSE Leap 15.3:busybox-1.34.1-4.9.1.aarch64", "openSUSE Leap 15.3:busybox-1.34.1-4.9.1.ppc64le", "openSUSE Leap 15.3:busybox-1.34.1-4.9.1.s390x", "openSUSE Leap 15.3:busybox-1.34.1-4.9.1.x86_64", "openSUSE Leap 15.3:busybox-static-1.34.1-4.9.1.aarch64", "openSUSE Leap 15.3:busybox-static-1.34.1-4.9.1.ppc64le", "openSUSE Leap 15.3:busybox-static-1.34.1-4.9.1.s390x", "openSUSE Leap 15.3:busybox-static-1.34.1-4.9.1.x86_64", "openSUSE Leap 15.3:python3-virtualbox-6.1.34-lp153.2.27.2.x86_64", "openSUSE Leap 15.3:virtualbox-6.1.34-lp153.2.27.2.x86_64", "openSUSE Leap 15.3:virtualbox-devel-6.1.34-lp153.2.27.2.x86_64", "openSUSE Leap 15.3:virtualbox-guest-desktop-icons-6.1.34-lp153.2.27.2.noarch", "openSUSE Leap 15.3:virtualbox-guest-source-6.1.34-lp153.2.27.2.noarch", "openSUSE Leap 15.3:virtualbox-guest-tools-6.1.34-lp153.2.27.2.x86_64", "openSUSE Leap 15.3:virtualbox-guest-x11-6.1.34-lp153.2.27.2.x86_64", "openSUSE Leap 15.3:virtualbox-host-source-6.1.34-lp153.2.27.2.noarch", "openSUSE Leap 15.3:virtualbox-kmp-default-6.1.34_k5.3.18_150300.59.63-lp153.2.27.1.x86_64", "openSUSE Leap 15.3:virtualbox-kmp-preempt-6.1.34_k5.3.18_150300.59.63-lp153.2.27.1.x86_64", "openSUSE Leap 15.3:virtualbox-qt-6.1.34-lp153.2.27.2.x86_64", "openSUSE Leap 15.3:virtualbox-vnc-6.1.34-lp153.2.27.2.x86_64", "openSUSE Leap 15.3:virtualbox-websrv-6.1.34-lp153.2.27.2.x86_64", ], }, ], threats: [ { category: "impact", date: "2022-01-20T09:04:27Z", details: "moderate", }, ], title: "CVE-2015-9261", }, { cve: "CVE-2016-2147", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2016-2147", }, ], notes: [ { category: "general", text: "Integer overflow in the DHCP client (udhcpc) in BusyBox before 1.25.0 allows remote attackers to cause a denial of service (crash) via a malformed RFC1035-encoded domain name, which triggers an out-of-bounds heap write.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Leap 15.3:busybox-1.34.1-4.9.1.aarch64", "openSUSE Leap 15.3:busybox-1.34.1-4.9.1.ppc64le", "openSUSE Leap 15.3:busybox-1.34.1-4.9.1.s390x", "openSUSE Leap 15.3:busybox-1.34.1-4.9.1.x86_64", "openSUSE Leap 15.3:busybox-static-1.34.1-4.9.1.aarch64", "openSUSE Leap 15.3:busybox-static-1.34.1-4.9.1.ppc64le", "openSUSE Leap 15.3:busybox-static-1.34.1-4.9.1.s390x", "openSUSE Leap 15.3:busybox-static-1.34.1-4.9.1.x86_64", "openSUSE Leap 15.3:python3-virtualbox-6.1.34-lp153.2.27.2.x86_64", "openSUSE Leap 15.3:virtualbox-6.1.34-lp153.2.27.2.x86_64", "openSUSE Leap 15.3:virtualbox-devel-6.1.34-lp153.2.27.2.x86_64", "openSUSE Leap 15.3:virtualbox-guest-desktop-icons-6.1.34-lp153.2.27.2.noarch", "openSUSE Leap 15.3:virtualbox-guest-source-6.1.34-lp153.2.27.2.noarch", "openSUSE Leap 15.3:virtualbox-guest-tools-6.1.34-lp153.2.27.2.x86_64", "openSUSE Leap 15.3:virtualbox-guest-x11-6.1.34-lp153.2.27.2.x86_64", "openSUSE Leap 15.3:virtualbox-host-source-6.1.34-lp153.2.27.2.noarch", "openSUSE Leap 15.3:virtualbox-kmp-default-6.1.34_k5.3.18_150300.59.63-lp153.2.27.1.x86_64", "openSUSE Leap 15.3:virtualbox-kmp-preempt-6.1.34_k5.3.18_150300.59.63-lp153.2.27.1.x86_64", "openSUSE Leap 15.3:virtualbox-qt-6.1.34-lp153.2.27.2.x86_64", "openSUSE Leap 15.3:virtualbox-vnc-6.1.34-lp153.2.27.2.x86_64", "openSUSE Leap 15.3:virtualbox-websrv-6.1.34-lp153.2.27.2.x86_64", ], }, references: [ { category: "external", summary: "CVE-2016-2147", url: "https://www.suse.com/security/cve/CVE-2016-2147", }, { category: "external", summary: "SUSE Bug 970663 for CVE-2016-2147", url: "https://bugzilla.suse.com/970663", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Leap 15.3:busybox-1.34.1-4.9.1.aarch64", "openSUSE Leap 15.3:busybox-1.34.1-4.9.1.ppc64le", "openSUSE Leap 15.3:busybox-1.34.1-4.9.1.s390x", "openSUSE Leap 15.3:busybox-1.34.1-4.9.1.x86_64", "openSUSE Leap 15.3:busybox-static-1.34.1-4.9.1.aarch64", "openSUSE Leap 15.3:busybox-static-1.34.1-4.9.1.ppc64le", "openSUSE Leap 15.3:busybox-static-1.34.1-4.9.1.s390x", "openSUSE Leap 15.3:busybox-static-1.34.1-4.9.1.x86_64", "openSUSE Leap 15.3:python3-virtualbox-6.1.34-lp153.2.27.2.x86_64", "openSUSE Leap 15.3:virtualbox-6.1.34-lp153.2.27.2.x86_64", "openSUSE Leap 15.3:virtualbox-devel-6.1.34-lp153.2.27.2.x86_64", "openSUSE Leap 15.3:virtualbox-guest-desktop-icons-6.1.34-lp153.2.27.2.noarch", "openSUSE Leap 15.3:virtualbox-guest-source-6.1.34-lp153.2.27.2.noarch", "openSUSE Leap 15.3:virtualbox-guest-tools-6.1.34-lp153.2.27.2.x86_64", "openSUSE Leap 15.3:virtualbox-guest-x11-6.1.34-lp153.2.27.2.x86_64", "openSUSE Leap 15.3:virtualbox-host-source-6.1.34-lp153.2.27.2.noarch", "openSUSE Leap 15.3:virtualbox-kmp-default-6.1.34_k5.3.18_150300.59.63-lp153.2.27.1.x86_64", "openSUSE Leap 15.3:virtualbox-kmp-preempt-6.1.34_k5.3.18_150300.59.63-lp153.2.27.1.x86_64", "openSUSE Leap 15.3:virtualbox-qt-6.1.34-lp153.2.27.2.x86_64", "openSUSE Leap 15.3:virtualbox-vnc-6.1.34-lp153.2.27.2.x86_64", "openSUSE Leap 15.3:virtualbox-websrv-6.1.34-lp153.2.27.2.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 7.5, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "openSUSE Leap 15.3:busybox-1.34.1-4.9.1.aarch64", "openSUSE Leap 15.3:busybox-1.34.1-4.9.1.ppc64le", "openSUSE Leap 15.3:busybox-1.34.1-4.9.1.s390x", "openSUSE Leap 15.3:busybox-1.34.1-4.9.1.x86_64", "openSUSE Leap 15.3:busybox-static-1.34.1-4.9.1.aarch64", "openSUSE Leap 15.3:busybox-static-1.34.1-4.9.1.ppc64le", "openSUSE Leap 15.3:busybox-static-1.34.1-4.9.1.s390x", "openSUSE Leap 15.3:busybox-static-1.34.1-4.9.1.x86_64", "openSUSE Leap 15.3:python3-virtualbox-6.1.34-lp153.2.27.2.x86_64", "openSUSE Leap 15.3:virtualbox-6.1.34-lp153.2.27.2.x86_64", "openSUSE Leap 15.3:virtualbox-devel-6.1.34-lp153.2.27.2.x86_64", "openSUSE Leap 15.3:virtualbox-guest-desktop-icons-6.1.34-lp153.2.27.2.noarch", "openSUSE Leap 15.3:virtualbox-guest-source-6.1.34-lp153.2.27.2.noarch", "openSUSE Leap 15.3:virtualbox-guest-tools-6.1.34-lp153.2.27.2.x86_64", "openSUSE Leap 15.3:virtualbox-guest-x11-6.1.34-lp153.2.27.2.x86_64", "openSUSE Leap 15.3:virtualbox-host-source-6.1.34-lp153.2.27.2.noarch", "openSUSE Leap 15.3:virtualbox-kmp-default-6.1.34_k5.3.18_150300.59.63-lp153.2.27.1.x86_64", "openSUSE Leap 15.3:virtualbox-kmp-preempt-6.1.34_k5.3.18_150300.59.63-lp153.2.27.1.x86_64", "openSUSE Leap 15.3:virtualbox-qt-6.1.34-lp153.2.27.2.x86_64", "openSUSE Leap 15.3:virtualbox-vnc-6.1.34-lp153.2.27.2.x86_64", "openSUSE Leap 15.3:virtualbox-websrv-6.1.34-lp153.2.27.2.x86_64", ], }, ], threats: [ { category: "impact", date: "2022-01-20T09:04:27Z", details: "important", }, ], title: "CVE-2016-2147", }, { cve: "CVE-2016-2148", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2016-2148", }, ], notes: [ { category: "general", text: "Heap-based buffer overflow in the DHCP client (udhcpc) in BusyBox before 1.25.0 allows remote attackers to have unspecified impact via vectors involving OPTION_6RD parsing.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Leap 15.3:busybox-1.34.1-4.9.1.aarch64", "openSUSE Leap 15.3:busybox-1.34.1-4.9.1.ppc64le", "openSUSE Leap 15.3:busybox-1.34.1-4.9.1.s390x", "openSUSE Leap 15.3:busybox-1.34.1-4.9.1.x86_64", "openSUSE Leap 15.3:busybox-static-1.34.1-4.9.1.aarch64", "openSUSE Leap 15.3:busybox-static-1.34.1-4.9.1.ppc64le", "openSUSE Leap 15.3:busybox-static-1.34.1-4.9.1.s390x", "openSUSE Leap 15.3:busybox-static-1.34.1-4.9.1.x86_64", "openSUSE Leap 15.3:python3-virtualbox-6.1.34-lp153.2.27.2.x86_64", "openSUSE Leap 15.3:virtualbox-6.1.34-lp153.2.27.2.x86_64", "openSUSE Leap 15.3:virtualbox-devel-6.1.34-lp153.2.27.2.x86_64", "openSUSE Leap 15.3:virtualbox-guest-desktop-icons-6.1.34-lp153.2.27.2.noarch", "openSUSE Leap 15.3:virtualbox-guest-source-6.1.34-lp153.2.27.2.noarch", "openSUSE Leap 15.3:virtualbox-guest-tools-6.1.34-lp153.2.27.2.x86_64", "openSUSE Leap 15.3:virtualbox-guest-x11-6.1.34-lp153.2.27.2.x86_64", "openSUSE Leap 15.3:virtualbox-host-source-6.1.34-lp153.2.27.2.noarch", "openSUSE Leap 15.3:virtualbox-kmp-default-6.1.34_k5.3.18_150300.59.63-lp153.2.27.1.x86_64", "openSUSE Leap 15.3:virtualbox-kmp-preempt-6.1.34_k5.3.18_150300.59.63-lp153.2.27.1.x86_64", "openSUSE Leap 15.3:virtualbox-qt-6.1.34-lp153.2.27.2.x86_64", "openSUSE Leap 15.3:virtualbox-vnc-6.1.34-lp153.2.27.2.x86_64", "openSUSE Leap 15.3:virtualbox-websrv-6.1.34-lp153.2.27.2.x86_64", ], }, references: [ { category: "external", summary: "CVE-2016-2148", url: "https://www.suse.com/security/cve/CVE-2016-2148", }, { category: "external", summary: "SUSE Bug 970662 for CVE-2016-2148", url: "https://bugzilla.suse.com/970662", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Leap 15.3:busybox-1.34.1-4.9.1.aarch64", "openSUSE Leap 15.3:busybox-1.34.1-4.9.1.ppc64le", "openSUSE Leap 15.3:busybox-1.34.1-4.9.1.s390x", "openSUSE Leap 15.3:busybox-1.34.1-4.9.1.x86_64", "openSUSE Leap 15.3:busybox-static-1.34.1-4.9.1.aarch64", "openSUSE Leap 15.3:busybox-static-1.34.1-4.9.1.ppc64le", "openSUSE Leap 15.3:busybox-static-1.34.1-4.9.1.s390x", "openSUSE Leap 15.3:busybox-static-1.34.1-4.9.1.x86_64", "openSUSE Leap 15.3:python3-virtualbox-6.1.34-lp153.2.27.2.x86_64", "openSUSE Leap 15.3:virtualbox-6.1.34-lp153.2.27.2.x86_64", "openSUSE Leap 15.3:virtualbox-devel-6.1.34-lp153.2.27.2.x86_64", "openSUSE Leap 15.3:virtualbox-guest-desktop-icons-6.1.34-lp153.2.27.2.noarch", "openSUSE Leap 15.3:virtualbox-guest-source-6.1.34-lp153.2.27.2.noarch", "openSUSE Leap 15.3:virtualbox-guest-tools-6.1.34-lp153.2.27.2.x86_64", "openSUSE Leap 15.3:virtualbox-guest-x11-6.1.34-lp153.2.27.2.x86_64", "openSUSE Leap 15.3:virtualbox-host-source-6.1.34-lp153.2.27.2.noarch", "openSUSE Leap 15.3:virtualbox-kmp-default-6.1.34_k5.3.18_150300.59.63-lp153.2.27.1.x86_64", "openSUSE Leap 15.3:virtualbox-kmp-preempt-6.1.34_k5.3.18_150300.59.63-lp153.2.27.1.x86_64", "openSUSE Leap 15.3:virtualbox-qt-6.1.34-lp153.2.27.2.x86_64", "openSUSE Leap 15.3:virtualbox-vnc-6.1.34-lp153.2.27.2.x86_64", "openSUSE Leap 15.3:virtualbox-websrv-6.1.34-lp153.2.27.2.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 9.8, baseSeverity: "CRITICAL", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, products: [ "openSUSE Leap 15.3:busybox-1.34.1-4.9.1.aarch64", "openSUSE Leap 15.3:busybox-1.34.1-4.9.1.ppc64le", "openSUSE Leap 15.3:busybox-1.34.1-4.9.1.s390x", "openSUSE Leap 15.3:busybox-1.34.1-4.9.1.x86_64", "openSUSE Leap 15.3:busybox-static-1.34.1-4.9.1.aarch64", "openSUSE Leap 15.3:busybox-static-1.34.1-4.9.1.ppc64le", "openSUSE Leap 15.3:busybox-static-1.34.1-4.9.1.s390x", "openSUSE Leap 15.3:busybox-static-1.34.1-4.9.1.x86_64", "openSUSE Leap 15.3:python3-virtualbox-6.1.34-lp153.2.27.2.x86_64", "openSUSE Leap 15.3:virtualbox-6.1.34-lp153.2.27.2.x86_64", "openSUSE Leap 15.3:virtualbox-devel-6.1.34-lp153.2.27.2.x86_64", "openSUSE Leap 15.3:virtualbox-guest-desktop-icons-6.1.34-lp153.2.27.2.noarch", "openSUSE Leap 15.3:virtualbox-guest-source-6.1.34-lp153.2.27.2.noarch", "openSUSE Leap 15.3:virtualbox-guest-tools-6.1.34-lp153.2.27.2.x86_64", "openSUSE Leap 15.3:virtualbox-guest-x11-6.1.34-lp153.2.27.2.x86_64", "openSUSE Leap 15.3:virtualbox-host-source-6.1.34-lp153.2.27.2.noarch", "openSUSE Leap 15.3:virtualbox-kmp-default-6.1.34_k5.3.18_150300.59.63-lp153.2.27.1.x86_64", "openSUSE Leap 15.3:virtualbox-kmp-preempt-6.1.34_k5.3.18_150300.59.63-lp153.2.27.1.x86_64", "openSUSE Leap 15.3:virtualbox-qt-6.1.34-lp153.2.27.2.x86_64", "openSUSE Leap 15.3:virtualbox-vnc-6.1.34-lp153.2.27.2.x86_64", "openSUSE Leap 15.3:virtualbox-websrv-6.1.34-lp153.2.27.2.x86_64", ], }, ], threats: [ { category: "impact", date: "2022-01-20T09:04:27Z", details: "moderate", }, ], title: "CVE-2016-2148", }, { cve: "CVE-2016-6301", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2016-6301", }, ], notes: [ { category: "general", text: "The recv_and_process_client_pkt function in networking/ntpd.c in busybox allows remote attackers to cause a denial of service (CPU and bandwidth consumption) via a forged NTP packet, which triggers a communication loop.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Leap 15.3:busybox-1.34.1-4.9.1.aarch64", "openSUSE Leap 15.3:busybox-1.34.1-4.9.1.ppc64le", "openSUSE Leap 15.3:busybox-1.34.1-4.9.1.s390x", "openSUSE Leap 15.3:busybox-1.34.1-4.9.1.x86_64", "openSUSE Leap 15.3:busybox-static-1.34.1-4.9.1.aarch64", "openSUSE Leap 15.3:busybox-static-1.34.1-4.9.1.ppc64le", "openSUSE Leap 15.3:busybox-static-1.34.1-4.9.1.s390x", "openSUSE Leap 15.3:busybox-static-1.34.1-4.9.1.x86_64", "openSUSE Leap 15.3:python3-virtualbox-6.1.34-lp153.2.27.2.x86_64", "openSUSE Leap 15.3:virtualbox-6.1.34-lp153.2.27.2.x86_64", "openSUSE Leap 15.3:virtualbox-devel-6.1.34-lp153.2.27.2.x86_64", "openSUSE Leap 15.3:virtualbox-guest-desktop-icons-6.1.34-lp153.2.27.2.noarch", "openSUSE Leap 15.3:virtualbox-guest-source-6.1.34-lp153.2.27.2.noarch", "openSUSE Leap 15.3:virtualbox-guest-tools-6.1.34-lp153.2.27.2.x86_64", "openSUSE Leap 15.3:virtualbox-guest-x11-6.1.34-lp153.2.27.2.x86_64", "openSUSE Leap 15.3:virtualbox-host-source-6.1.34-lp153.2.27.2.noarch", "openSUSE Leap 15.3:virtualbox-kmp-default-6.1.34_k5.3.18_150300.59.63-lp153.2.27.1.x86_64", "openSUSE Leap 15.3:virtualbox-kmp-preempt-6.1.34_k5.3.18_150300.59.63-lp153.2.27.1.x86_64", "openSUSE Leap 15.3:virtualbox-qt-6.1.34-lp153.2.27.2.x86_64", "openSUSE Leap 15.3:virtualbox-vnc-6.1.34-lp153.2.27.2.x86_64", "openSUSE Leap 15.3:virtualbox-websrv-6.1.34-lp153.2.27.2.x86_64", ], }, references: [ { category: "external", summary: "CVE-2016-6301", url: "https://www.suse.com/security/cve/CVE-2016-6301", }, { category: "external", summary: "SUSE Bug 991940 for CVE-2016-6301", url: "https://bugzilla.suse.com/991940", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Leap 15.3:busybox-1.34.1-4.9.1.aarch64", "openSUSE Leap 15.3:busybox-1.34.1-4.9.1.ppc64le", "openSUSE Leap 15.3:busybox-1.34.1-4.9.1.s390x", "openSUSE Leap 15.3:busybox-1.34.1-4.9.1.x86_64", "openSUSE Leap 15.3:busybox-static-1.34.1-4.9.1.aarch64", "openSUSE Leap 15.3:busybox-static-1.34.1-4.9.1.ppc64le", "openSUSE Leap 15.3:busybox-static-1.34.1-4.9.1.s390x", "openSUSE Leap 15.3:busybox-static-1.34.1-4.9.1.x86_64", "openSUSE Leap 15.3:python3-virtualbox-6.1.34-lp153.2.27.2.x86_64", "openSUSE Leap 15.3:virtualbox-6.1.34-lp153.2.27.2.x86_64", "openSUSE Leap 15.3:virtualbox-devel-6.1.34-lp153.2.27.2.x86_64", "openSUSE Leap 15.3:virtualbox-guest-desktop-icons-6.1.34-lp153.2.27.2.noarch", "openSUSE Leap 15.3:virtualbox-guest-source-6.1.34-lp153.2.27.2.noarch", "openSUSE Leap 15.3:virtualbox-guest-tools-6.1.34-lp153.2.27.2.x86_64", "openSUSE Leap 15.3:virtualbox-guest-x11-6.1.34-lp153.2.27.2.x86_64", "openSUSE Leap 15.3:virtualbox-host-source-6.1.34-lp153.2.27.2.noarch", "openSUSE Leap 15.3:virtualbox-kmp-default-6.1.34_k5.3.18_150300.59.63-lp153.2.27.1.x86_64", "openSUSE Leap 15.3:virtualbox-kmp-preempt-6.1.34_k5.3.18_150300.59.63-lp153.2.27.1.x86_64", "openSUSE Leap 15.3:virtualbox-qt-6.1.34-lp153.2.27.2.x86_64", "openSUSE Leap 15.3:virtualbox-vnc-6.1.34-lp153.2.27.2.x86_64", "openSUSE Leap 15.3:virtualbox-websrv-6.1.34-lp153.2.27.2.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 7.5, baseSeverity: "HIGH", vectorString: "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", version: "3.0", }, products: [ "openSUSE Leap 15.3:busybox-1.34.1-4.9.1.aarch64", "openSUSE Leap 15.3:busybox-1.34.1-4.9.1.ppc64le", "openSUSE Leap 15.3:busybox-1.34.1-4.9.1.s390x", "openSUSE Leap 15.3:busybox-1.34.1-4.9.1.x86_64", "openSUSE Leap 15.3:busybox-static-1.34.1-4.9.1.aarch64", "openSUSE Leap 15.3:busybox-static-1.34.1-4.9.1.ppc64le", "openSUSE Leap 15.3:busybox-static-1.34.1-4.9.1.s390x", "openSUSE Leap 15.3:busybox-static-1.34.1-4.9.1.x86_64", "openSUSE Leap 15.3:python3-virtualbox-6.1.34-lp153.2.27.2.x86_64", "openSUSE Leap 15.3:virtualbox-6.1.34-lp153.2.27.2.x86_64", "openSUSE Leap 15.3:virtualbox-devel-6.1.34-lp153.2.27.2.x86_64", "openSUSE Leap 15.3:virtualbox-guest-desktop-icons-6.1.34-lp153.2.27.2.noarch", "openSUSE Leap 15.3:virtualbox-guest-source-6.1.34-lp153.2.27.2.noarch", "openSUSE Leap 15.3:virtualbox-guest-tools-6.1.34-lp153.2.27.2.x86_64", "openSUSE Leap 15.3:virtualbox-guest-x11-6.1.34-lp153.2.27.2.x86_64", "openSUSE Leap 15.3:virtualbox-host-source-6.1.34-lp153.2.27.2.noarch", "openSUSE Leap 15.3:virtualbox-kmp-default-6.1.34_k5.3.18_150300.59.63-lp153.2.27.1.x86_64", "openSUSE Leap 15.3:virtualbox-kmp-preempt-6.1.34_k5.3.18_150300.59.63-lp153.2.27.1.x86_64", "openSUSE Leap 15.3:virtualbox-qt-6.1.34-lp153.2.27.2.x86_64", "openSUSE Leap 15.3:virtualbox-vnc-6.1.34-lp153.2.27.2.x86_64", "openSUSE Leap 15.3:virtualbox-websrv-6.1.34-lp153.2.27.2.x86_64", ], }, ], threats: [ { category: "impact", date: "2022-01-20T09:04:27Z", details: "moderate", }, ], title: "CVE-2016-6301", }, { cve: "CVE-2017-15873", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2017-15873", }, ], notes: [ { category: "general", text: "The get_next_block function in archival/libarchive/decompress_bunzip2.c in BusyBox 1.27.2 has an Integer Overflow that may lead to a write access violation.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Leap 15.3:busybox-1.34.1-4.9.1.aarch64", "openSUSE Leap 15.3:busybox-1.34.1-4.9.1.ppc64le", "openSUSE Leap 15.3:busybox-1.34.1-4.9.1.s390x", "openSUSE Leap 15.3:busybox-1.34.1-4.9.1.x86_64", "openSUSE Leap 15.3:busybox-static-1.34.1-4.9.1.aarch64", "openSUSE Leap 15.3:busybox-static-1.34.1-4.9.1.ppc64le", "openSUSE Leap 15.3:busybox-static-1.34.1-4.9.1.s390x", "openSUSE Leap 15.3:busybox-static-1.34.1-4.9.1.x86_64", "openSUSE Leap 15.3:python3-virtualbox-6.1.34-lp153.2.27.2.x86_64", "openSUSE Leap 15.3:virtualbox-6.1.34-lp153.2.27.2.x86_64", "openSUSE Leap 15.3:virtualbox-devel-6.1.34-lp153.2.27.2.x86_64", "openSUSE Leap 15.3:virtualbox-guest-desktop-icons-6.1.34-lp153.2.27.2.noarch", "openSUSE Leap 15.3:virtualbox-guest-source-6.1.34-lp153.2.27.2.noarch", "openSUSE Leap 15.3:virtualbox-guest-tools-6.1.34-lp153.2.27.2.x86_64", "openSUSE Leap 15.3:virtualbox-guest-x11-6.1.34-lp153.2.27.2.x86_64", "openSUSE Leap 15.3:virtualbox-host-source-6.1.34-lp153.2.27.2.noarch", "openSUSE Leap 15.3:virtualbox-kmp-default-6.1.34_k5.3.18_150300.59.63-lp153.2.27.1.x86_64", "openSUSE Leap 15.3:virtualbox-kmp-preempt-6.1.34_k5.3.18_150300.59.63-lp153.2.27.1.x86_64", "openSUSE Leap 15.3:virtualbox-qt-6.1.34-lp153.2.27.2.x86_64", "openSUSE Leap 15.3:virtualbox-vnc-6.1.34-lp153.2.27.2.x86_64", "openSUSE Leap 15.3:virtualbox-websrv-6.1.34-lp153.2.27.2.x86_64", ], }, references: [ { category: "external", summary: "CVE-2017-15873", url: "https://www.suse.com/security/cve/CVE-2017-15873", }, { category: "external", summary: "SUSE Bug 1064976 for CVE-2017-15873", url: "https://bugzilla.suse.com/1064976", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Leap 15.3:busybox-1.34.1-4.9.1.aarch64", "openSUSE Leap 15.3:busybox-1.34.1-4.9.1.ppc64le", "openSUSE Leap 15.3:busybox-1.34.1-4.9.1.s390x", "openSUSE Leap 15.3:busybox-1.34.1-4.9.1.x86_64", "openSUSE Leap 15.3:busybox-static-1.34.1-4.9.1.aarch64", "openSUSE Leap 15.3:busybox-static-1.34.1-4.9.1.ppc64le", "openSUSE Leap 15.3:busybox-static-1.34.1-4.9.1.s390x", "openSUSE Leap 15.3:busybox-static-1.34.1-4.9.1.x86_64", "openSUSE Leap 15.3:python3-virtualbox-6.1.34-lp153.2.27.2.x86_64", "openSUSE Leap 15.3:virtualbox-6.1.34-lp153.2.27.2.x86_64", "openSUSE Leap 15.3:virtualbox-devel-6.1.34-lp153.2.27.2.x86_64", "openSUSE Leap 15.3:virtualbox-guest-desktop-icons-6.1.34-lp153.2.27.2.noarch", "openSUSE Leap 15.3:virtualbox-guest-source-6.1.34-lp153.2.27.2.noarch", "openSUSE Leap 15.3:virtualbox-guest-tools-6.1.34-lp153.2.27.2.x86_64", "openSUSE Leap 15.3:virtualbox-guest-x11-6.1.34-lp153.2.27.2.x86_64", "openSUSE Leap 15.3:virtualbox-host-source-6.1.34-lp153.2.27.2.noarch", "openSUSE Leap 15.3:virtualbox-kmp-default-6.1.34_k5.3.18_150300.59.63-lp153.2.27.1.x86_64", "openSUSE Leap 15.3:virtualbox-kmp-preempt-6.1.34_k5.3.18_150300.59.63-lp153.2.27.1.x86_64", "openSUSE Leap 15.3:virtualbox-qt-6.1.34-lp153.2.27.2.x86_64", "openSUSE Leap 15.3:virtualbox-vnc-6.1.34-lp153.2.27.2.x86_64", "openSUSE Leap 15.3:virtualbox-websrv-6.1.34-lp153.2.27.2.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 7.8, baseSeverity: "HIGH", vectorString: "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", version: "3.0", }, products: [ "openSUSE Leap 15.3:busybox-1.34.1-4.9.1.aarch64", "openSUSE Leap 15.3:busybox-1.34.1-4.9.1.ppc64le", "openSUSE Leap 15.3:busybox-1.34.1-4.9.1.s390x", "openSUSE Leap 15.3:busybox-1.34.1-4.9.1.x86_64", "openSUSE Leap 15.3:busybox-static-1.34.1-4.9.1.aarch64", "openSUSE Leap 15.3:busybox-static-1.34.1-4.9.1.ppc64le", "openSUSE Leap 15.3:busybox-static-1.34.1-4.9.1.s390x", "openSUSE Leap 15.3:busybox-static-1.34.1-4.9.1.x86_64", "openSUSE Leap 15.3:python3-virtualbox-6.1.34-lp153.2.27.2.x86_64", "openSUSE Leap 15.3:virtualbox-6.1.34-lp153.2.27.2.x86_64", "openSUSE Leap 15.3:virtualbox-devel-6.1.34-lp153.2.27.2.x86_64", "openSUSE Leap 15.3:virtualbox-guest-desktop-icons-6.1.34-lp153.2.27.2.noarch", "openSUSE Leap 15.3:virtualbox-guest-source-6.1.34-lp153.2.27.2.noarch", "openSUSE Leap 15.3:virtualbox-guest-tools-6.1.34-lp153.2.27.2.x86_64", "openSUSE Leap 15.3:virtualbox-guest-x11-6.1.34-lp153.2.27.2.x86_64", "openSUSE Leap 15.3:virtualbox-host-source-6.1.34-lp153.2.27.2.noarch", "openSUSE Leap 15.3:virtualbox-kmp-default-6.1.34_k5.3.18_150300.59.63-lp153.2.27.1.x86_64", "openSUSE Leap 15.3:virtualbox-kmp-preempt-6.1.34_k5.3.18_150300.59.63-lp153.2.27.1.x86_64", "openSUSE Leap 15.3:virtualbox-qt-6.1.34-lp153.2.27.2.x86_64", "openSUSE Leap 15.3:virtualbox-vnc-6.1.34-lp153.2.27.2.x86_64", "openSUSE Leap 15.3:virtualbox-websrv-6.1.34-lp153.2.27.2.x86_64", ], }, ], threats: [ { category: "impact", date: "2022-01-20T09:04:27Z", details: "moderate", }, ], title: "CVE-2017-15873", }, { cve: "CVE-2017-15874", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2017-15874", }, ], notes: [ { category: "general", text: "archival/libarchive/decompress_unlzma.c in BusyBox 1.27.2 has an Integer Underflow that leads to a read access violation.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Leap 15.3:busybox-1.34.1-4.9.1.aarch64", "openSUSE Leap 15.3:busybox-1.34.1-4.9.1.ppc64le", "openSUSE Leap 15.3:busybox-1.34.1-4.9.1.s390x", "openSUSE Leap 15.3:busybox-1.34.1-4.9.1.x86_64", "openSUSE Leap 15.3:busybox-static-1.34.1-4.9.1.aarch64", "openSUSE Leap 15.3:busybox-static-1.34.1-4.9.1.ppc64le", "openSUSE Leap 15.3:busybox-static-1.34.1-4.9.1.s390x", "openSUSE Leap 15.3:busybox-static-1.34.1-4.9.1.x86_64", "openSUSE Leap 15.3:python3-virtualbox-6.1.34-lp153.2.27.2.x86_64", "openSUSE Leap 15.3:virtualbox-6.1.34-lp153.2.27.2.x86_64", "openSUSE Leap 15.3:virtualbox-devel-6.1.34-lp153.2.27.2.x86_64", "openSUSE Leap 15.3:virtualbox-guest-desktop-icons-6.1.34-lp153.2.27.2.noarch", "openSUSE Leap 15.3:virtualbox-guest-source-6.1.34-lp153.2.27.2.noarch", "openSUSE Leap 15.3:virtualbox-guest-tools-6.1.34-lp153.2.27.2.x86_64", "openSUSE Leap 15.3:virtualbox-guest-x11-6.1.34-lp153.2.27.2.x86_64", "openSUSE Leap 15.3:virtualbox-host-source-6.1.34-lp153.2.27.2.noarch", "openSUSE Leap 15.3:virtualbox-kmp-default-6.1.34_k5.3.18_150300.59.63-lp153.2.27.1.x86_64", "openSUSE Leap 15.3:virtualbox-kmp-preempt-6.1.34_k5.3.18_150300.59.63-lp153.2.27.1.x86_64", "openSUSE Leap 15.3:virtualbox-qt-6.1.34-lp153.2.27.2.x86_64", "openSUSE Leap 15.3:virtualbox-vnc-6.1.34-lp153.2.27.2.x86_64", "openSUSE Leap 15.3:virtualbox-websrv-6.1.34-lp153.2.27.2.x86_64", ], }, references: [ { category: "external", summary: "CVE-2017-15874", url: "https://www.suse.com/security/cve/CVE-2017-15874", }, { category: "external", summary: "SUSE Bug 1064978 for CVE-2017-15874", url: "https://bugzilla.suse.com/1064978", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Leap 15.3:busybox-1.34.1-4.9.1.aarch64", "openSUSE Leap 15.3:busybox-1.34.1-4.9.1.ppc64le", "openSUSE Leap 15.3:busybox-1.34.1-4.9.1.s390x", "openSUSE Leap 15.3:busybox-1.34.1-4.9.1.x86_64", "openSUSE Leap 15.3:busybox-static-1.34.1-4.9.1.aarch64", "openSUSE Leap 15.3:busybox-static-1.34.1-4.9.1.ppc64le", "openSUSE Leap 15.3:busybox-static-1.34.1-4.9.1.s390x", "openSUSE Leap 15.3:busybox-static-1.34.1-4.9.1.x86_64", "openSUSE Leap 15.3:python3-virtualbox-6.1.34-lp153.2.27.2.x86_64", "openSUSE Leap 15.3:virtualbox-6.1.34-lp153.2.27.2.x86_64", "openSUSE Leap 15.3:virtualbox-devel-6.1.34-lp153.2.27.2.x86_64", "openSUSE Leap 15.3:virtualbox-guest-desktop-icons-6.1.34-lp153.2.27.2.noarch", "openSUSE Leap 15.3:virtualbox-guest-source-6.1.34-lp153.2.27.2.noarch", "openSUSE Leap 15.3:virtualbox-guest-tools-6.1.34-lp153.2.27.2.x86_64", "openSUSE Leap 15.3:virtualbox-guest-x11-6.1.34-lp153.2.27.2.x86_64", "openSUSE Leap 15.3:virtualbox-host-source-6.1.34-lp153.2.27.2.noarch", "openSUSE Leap 15.3:virtualbox-kmp-default-6.1.34_k5.3.18_150300.59.63-lp153.2.27.1.x86_64", "openSUSE Leap 15.3:virtualbox-kmp-preempt-6.1.34_k5.3.18_150300.59.63-lp153.2.27.1.x86_64", "openSUSE Leap 15.3:virtualbox-qt-6.1.34-lp153.2.27.2.x86_64", "openSUSE Leap 15.3:virtualbox-vnc-6.1.34-lp153.2.27.2.x86_64", "openSUSE Leap 15.3:virtualbox-websrv-6.1.34-lp153.2.27.2.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 3.3, baseSeverity: "LOW", vectorString: "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L", version: "3.0", }, products: [ "openSUSE Leap 15.3:busybox-1.34.1-4.9.1.aarch64", "openSUSE Leap 15.3:busybox-1.34.1-4.9.1.ppc64le", "openSUSE Leap 15.3:busybox-1.34.1-4.9.1.s390x", "openSUSE Leap 15.3:busybox-1.34.1-4.9.1.x86_64", "openSUSE Leap 15.3:busybox-static-1.34.1-4.9.1.aarch64", "openSUSE Leap 15.3:busybox-static-1.34.1-4.9.1.ppc64le", "openSUSE Leap 15.3:busybox-static-1.34.1-4.9.1.s390x", "openSUSE Leap 15.3:busybox-static-1.34.1-4.9.1.x86_64", "openSUSE Leap 15.3:python3-virtualbox-6.1.34-lp153.2.27.2.x86_64", "openSUSE Leap 15.3:virtualbox-6.1.34-lp153.2.27.2.x86_64", "openSUSE Leap 15.3:virtualbox-devel-6.1.34-lp153.2.27.2.x86_64", "openSUSE Leap 15.3:virtualbox-guest-desktop-icons-6.1.34-lp153.2.27.2.noarch", "openSUSE Leap 15.3:virtualbox-guest-source-6.1.34-lp153.2.27.2.noarch", "openSUSE Leap 15.3:virtualbox-guest-tools-6.1.34-lp153.2.27.2.x86_64", "openSUSE Leap 15.3:virtualbox-guest-x11-6.1.34-lp153.2.27.2.x86_64", "openSUSE Leap 15.3:virtualbox-host-source-6.1.34-lp153.2.27.2.noarch", "openSUSE Leap 15.3:virtualbox-kmp-default-6.1.34_k5.3.18_150300.59.63-lp153.2.27.1.x86_64", "openSUSE Leap 15.3:virtualbox-kmp-preempt-6.1.34_k5.3.18_150300.59.63-lp153.2.27.1.x86_64", "openSUSE Leap 15.3:virtualbox-qt-6.1.34-lp153.2.27.2.x86_64", "openSUSE Leap 15.3:virtualbox-vnc-6.1.34-lp153.2.27.2.x86_64", "openSUSE Leap 15.3:virtualbox-websrv-6.1.34-lp153.2.27.2.x86_64", ], }, ], threats: [ { category: "impact", date: "2022-01-20T09:04:27Z", details: "low", }, ], title: "CVE-2017-15874", }, { cve: "CVE-2017-16544", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2017-16544", }, ], notes: [ { category: "general", text: "In the add_match function in libbb/lineedit.c in BusyBox through 1.27.2, the tab autocomplete feature of the shell, used to get a list of filenames in a directory, does not sanitize filenames and results in executing any escape sequence in the terminal. This could potentially result in code execution, arbitrary file writes, or other attacks.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Leap 15.3:busybox-1.34.1-4.9.1.aarch64", "openSUSE Leap 15.3:busybox-1.34.1-4.9.1.ppc64le", "openSUSE Leap 15.3:busybox-1.34.1-4.9.1.s390x", "openSUSE Leap 15.3:busybox-1.34.1-4.9.1.x86_64", "openSUSE Leap 15.3:busybox-static-1.34.1-4.9.1.aarch64", "openSUSE Leap 15.3:busybox-static-1.34.1-4.9.1.ppc64le", "openSUSE Leap 15.3:busybox-static-1.34.1-4.9.1.s390x", "openSUSE Leap 15.3:busybox-static-1.34.1-4.9.1.x86_64", "openSUSE Leap 15.3:python3-virtualbox-6.1.34-lp153.2.27.2.x86_64", "openSUSE Leap 15.3:virtualbox-6.1.34-lp153.2.27.2.x86_64", "openSUSE Leap 15.3:virtualbox-devel-6.1.34-lp153.2.27.2.x86_64", "openSUSE Leap 15.3:virtualbox-guest-desktop-icons-6.1.34-lp153.2.27.2.noarch", "openSUSE Leap 15.3:virtualbox-guest-source-6.1.34-lp153.2.27.2.noarch", "openSUSE Leap 15.3:virtualbox-guest-tools-6.1.34-lp153.2.27.2.x86_64", "openSUSE Leap 15.3:virtualbox-guest-x11-6.1.34-lp153.2.27.2.x86_64", "openSUSE Leap 15.3:virtualbox-host-source-6.1.34-lp153.2.27.2.noarch", "openSUSE Leap 15.3:virtualbox-kmp-default-6.1.34_k5.3.18_150300.59.63-lp153.2.27.1.x86_64", "openSUSE Leap 15.3:virtualbox-kmp-preempt-6.1.34_k5.3.18_150300.59.63-lp153.2.27.1.x86_64", "openSUSE Leap 15.3:virtualbox-qt-6.1.34-lp153.2.27.2.x86_64", "openSUSE Leap 15.3:virtualbox-vnc-6.1.34-lp153.2.27.2.x86_64", "openSUSE Leap 15.3:virtualbox-websrv-6.1.34-lp153.2.27.2.x86_64", ], }, references: [ { category: "external", summary: "CVE-2017-16544", url: "https://www.suse.com/security/cve/CVE-2017-16544", }, { category: "external", summary: "SUSE Bug 1069412 for CVE-2017-16544", url: "https://bugzilla.suse.com/1069412", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Leap 15.3:busybox-1.34.1-4.9.1.aarch64", "openSUSE Leap 15.3:busybox-1.34.1-4.9.1.ppc64le", "openSUSE Leap 15.3:busybox-1.34.1-4.9.1.s390x", "openSUSE Leap 15.3:busybox-1.34.1-4.9.1.x86_64", "openSUSE Leap 15.3:busybox-static-1.34.1-4.9.1.aarch64", "openSUSE Leap 15.3:busybox-static-1.34.1-4.9.1.ppc64le", "openSUSE Leap 15.3:busybox-static-1.34.1-4.9.1.s390x", "openSUSE Leap 15.3:busybox-static-1.34.1-4.9.1.x86_64", "openSUSE Leap 15.3:python3-virtualbox-6.1.34-lp153.2.27.2.x86_64", "openSUSE Leap 15.3:virtualbox-6.1.34-lp153.2.27.2.x86_64", "openSUSE Leap 15.3:virtualbox-devel-6.1.34-lp153.2.27.2.x86_64", "openSUSE Leap 15.3:virtualbox-guest-desktop-icons-6.1.34-lp153.2.27.2.noarch", "openSUSE Leap 15.3:virtualbox-guest-source-6.1.34-lp153.2.27.2.noarch", "openSUSE Leap 15.3:virtualbox-guest-tools-6.1.34-lp153.2.27.2.x86_64", "openSUSE Leap 15.3:virtualbox-guest-x11-6.1.34-lp153.2.27.2.x86_64", "openSUSE Leap 15.3:virtualbox-host-source-6.1.34-lp153.2.27.2.noarch", "openSUSE Leap 15.3:virtualbox-kmp-default-6.1.34_k5.3.18_150300.59.63-lp153.2.27.1.x86_64", "openSUSE Leap 15.3:virtualbox-kmp-preempt-6.1.34_k5.3.18_150300.59.63-lp153.2.27.1.x86_64", "openSUSE Leap 15.3:virtualbox-qt-6.1.34-lp153.2.27.2.x86_64", "openSUSE Leap 15.3:virtualbox-vnc-6.1.34-lp153.2.27.2.x86_64", "openSUSE Leap 15.3:virtualbox-websrv-6.1.34-lp153.2.27.2.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 7.8, baseSeverity: "HIGH", vectorString: "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", version: "3.0", }, products: [ "openSUSE Leap 15.3:busybox-1.34.1-4.9.1.aarch64", "openSUSE Leap 15.3:busybox-1.34.1-4.9.1.ppc64le", "openSUSE Leap 15.3:busybox-1.34.1-4.9.1.s390x", "openSUSE Leap 15.3:busybox-1.34.1-4.9.1.x86_64", "openSUSE Leap 15.3:busybox-static-1.34.1-4.9.1.aarch64", "openSUSE Leap 15.3:busybox-static-1.34.1-4.9.1.ppc64le", "openSUSE Leap 15.3:busybox-static-1.34.1-4.9.1.s390x", "openSUSE Leap 15.3:busybox-static-1.34.1-4.9.1.x86_64", "openSUSE Leap 15.3:python3-virtualbox-6.1.34-lp153.2.27.2.x86_64", "openSUSE Leap 15.3:virtualbox-6.1.34-lp153.2.27.2.x86_64", "openSUSE Leap 15.3:virtualbox-devel-6.1.34-lp153.2.27.2.x86_64", "openSUSE Leap 15.3:virtualbox-guest-desktop-icons-6.1.34-lp153.2.27.2.noarch", "openSUSE Leap 15.3:virtualbox-guest-source-6.1.34-lp153.2.27.2.noarch", "openSUSE Leap 15.3:virtualbox-guest-tools-6.1.34-lp153.2.27.2.x86_64", "openSUSE Leap 15.3:virtualbox-guest-x11-6.1.34-lp153.2.27.2.x86_64", "openSUSE Leap 15.3:virtualbox-host-source-6.1.34-lp153.2.27.2.noarch", "openSUSE Leap 15.3:virtualbox-kmp-default-6.1.34_k5.3.18_150300.59.63-lp153.2.27.1.x86_64", "openSUSE Leap 15.3:virtualbox-kmp-preempt-6.1.34_k5.3.18_150300.59.63-lp153.2.27.1.x86_64", "openSUSE Leap 15.3:virtualbox-qt-6.1.34-lp153.2.27.2.x86_64", "openSUSE Leap 15.3:virtualbox-vnc-6.1.34-lp153.2.27.2.x86_64", "openSUSE Leap 15.3:virtualbox-websrv-6.1.34-lp153.2.27.2.x86_64", ], }, ], threats: [ { category: "impact", date: "2022-01-20T09:04:27Z", details: "important", }, ], title: "CVE-2017-16544", }, { cve: "CVE-2018-1000500", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2018-1000500", }, ], notes: [ { category: "general", text: "Busybox contains a Missing SSL certificate validation vulnerability in The \"busybox wget\" applet that can result in arbitrary code execution. This attack appear to be exploitable via Simply download any file over HTTPS using \"busybox wget https://compromised-domain.com/important-file\".", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Leap 15.3:busybox-1.34.1-4.9.1.aarch64", "openSUSE Leap 15.3:busybox-1.34.1-4.9.1.ppc64le", "openSUSE Leap 15.3:busybox-1.34.1-4.9.1.s390x", "openSUSE Leap 15.3:busybox-1.34.1-4.9.1.x86_64", "openSUSE Leap 15.3:busybox-static-1.34.1-4.9.1.aarch64", "openSUSE Leap 15.3:busybox-static-1.34.1-4.9.1.ppc64le", "openSUSE Leap 15.3:busybox-static-1.34.1-4.9.1.s390x", "openSUSE Leap 15.3:busybox-static-1.34.1-4.9.1.x86_64", "openSUSE Leap 15.3:python3-virtualbox-6.1.34-lp153.2.27.2.x86_64", "openSUSE Leap 15.3:virtualbox-6.1.34-lp153.2.27.2.x86_64", "openSUSE Leap 15.3:virtualbox-devel-6.1.34-lp153.2.27.2.x86_64", "openSUSE Leap 15.3:virtualbox-guest-desktop-icons-6.1.34-lp153.2.27.2.noarch", "openSUSE Leap 15.3:virtualbox-guest-source-6.1.34-lp153.2.27.2.noarch", "openSUSE Leap 15.3:virtualbox-guest-tools-6.1.34-lp153.2.27.2.x86_64", "openSUSE Leap 15.3:virtualbox-guest-x11-6.1.34-lp153.2.27.2.x86_64", "openSUSE Leap 15.3:virtualbox-host-source-6.1.34-lp153.2.27.2.noarch", "openSUSE Leap 15.3:virtualbox-kmp-default-6.1.34_k5.3.18_150300.59.63-lp153.2.27.1.x86_64", "openSUSE Leap 15.3:virtualbox-kmp-preempt-6.1.34_k5.3.18_150300.59.63-lp153.2.27.1.x86_64", "openSUSE Leap 15.3:virtualbox-qt-6.1.34-lp153.2.27.2.x86_64", "openSUSE Leap 15.3:virtualbox-vnc-6.1.34-lp153.2.27.2.x86_64", "openSUSE Leap 15.3:virtualbox-websrv-6.1.34-lp153.2.27.2.x86_64", ], }, references: [ { category: "external", summary: "CVE-2018-1000500", url: "https://www.suse.com/security/cve/CVE-2018-1000500", }, { category: "external", summary: "SUSE Bug 1099263 for CVE-2018-1000500", url: "https://bugzilla.suse.com/1099263", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Leap 15.3:busybox-1.34.1-4.9.1.aarch64", "openSUSE Leap 15.3:busybox-1.34.1-4.9.1.ppc64le", "openSUSE Leap 15.3:busybox-1.34.1-4.9.1.s390x", "openSUSE Leap 15.3:busybox-1.34.1-4.9.1.x86_64", "openSUSE Leap 15.3:busybox-static-1.34.1-4.9.1.aarch64", "openSUSE Leap 15.3:busybox-static-1.34.1-4.9.1.ppc64le", "openSUSE Leap 15.3:busybox-static-1.34.1-4.9.1.s390x", "openSUSE Leap 15.3:busybox-static-1.34.1-4.9.1.x86_64", "openSUSE Leap 15.3:python3-virtualbox-6.1.34-lp153.2.27.2.x86_64", "openSUSE Leap 15.3:virtualbox-6.1.34-lp153.2.27.2.x86_64", "openSUSE Leap 15.3:virtualbox-devel-6.1.34-lp153.2.27.2.x86_64", "openSUSE Leap 15.3:virtualbox-guest-desktop-icons-6.1.34-lp153.2.27.2.noarch", "openSUSE Leap 15.3:virtualbox-guest-source-6.1.34-lp153.2.27.2.noarch", "openSUSE Leap 15.3:virtualbox-guest-tools-6.1.34-lp153.2.27.2.x86_64", "openSUSE Leap 15.3:virtualbox-guest-x11-6.1.34-lp153.2.27.2.x86_64", "openSUSE Leap 15.3:virtualbox-host-source-6.1.34-lp153.2.27.2.noarch", "openSUSE Leap 15.3:virtualbox-kmp-default-6.1.34_k5.3.18_150300.59.63-lp153.2.27.1.x86_64", "openSUSE Leap 15.3:virtualbox-kmp-preempt-6.1.34_k5.3.18_150300.59.63-lp153.2.27.1.x86_64", "openSUSE Leap 15.3:virtualbox-qt-6.1.34-lp153.2.27.2.x86_64", "openSUSE Leap 15.3:virtualbox-vnc-6.1.34-lp153.2.27.2.x86_64", "openSUSE Leap 15.3:virtualbox-websrv-6.1.34-lp153.2.27.2.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 7.5, baseSeverity: "HIGH", vectorString: "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N", version: "3.0", }, products: [ "openSUSE Leap 15.3:busybox-1.34.1-4.9.1.aarch64", "openSUSE Leap 15.3:busybox-1.34.1-4.9.1.ppc64le", "openSUSE Leap 15.3:busybox-1.34.1-4.9.1.s390x", "openSUSE Leap 15.3:busybox-1.34.1-4.9.1.x86_64", "openSUSE Leap 15.3:busybox-static-1.34.1-4.9.1.aarch64", "openSUSE Leap 15.3:busybox-static-1.34.1-4.9.1.ppc64le", "openSUSE Leap 15.3:busybox-static-1.34.1-4.9.1.s390x", "openSUSE Leap 15.3:busybox-static-1.34.1-4.9.1.x86_64", "openSUSE Leap 15.3:python3-virtualbox-6.1.34-lp153.2.27.2.x86_64", "openSUSE Leap 15.3:virtualbox-6.1.34-lp153.2.27.2.x86_64", "openSUSE Leap 15.3:virtualbox-devel-6.1.34-lp153.2.27.2.x86_64", "openSUSE Leap 15.3:virtualbox-guest-desktop-icons-6.1.34-lp153.2.27.2.noarch", "openSUSE Leap 15.3:virtualbox-guest-source-6.1.34-lp153.2.27.2.noarch", "openSUSE Leap 15.3:virtualbox-guest-tools-6.1.34-lp153.2.27.2.x86_64", "openSUSE Leap 15.3:virtualbox-guest-x11-6.1.34-lp153.2.27.2.x86_64", "openSUSE Leap 15.3:virtualbox-host-source-6.1.34-lp153.2.27.2.noarch", "openSUSE Leap 15.3:virtualbox-kmp-default-6.1.34_k5.3.18_150300.59.63-lp153.2.27.1.x86_64", "openSUSE Leap 15.3:virtualbox-kmp-preempt-6.1.34_k5.3.18_150300.59.63-lp153.2.27.1.x86_64", "openSUSE Leap 15.3:virtualbox-qt-6.1.34-lp153.2.27.2.x86_64", "openSUSE Leap 15.3:virtualbox-vnc-6.1.34-lp153.2.27.2.x86_64", "openSUSE Leap 15.3:virtualbox-websrv-6.1.34-lp153.2.27.2.x86_64", ], }, ], threats: [ { category: "impact", date: "2022-01-20T09:04:27Z", details: "important", }, ], title: "CVE-2018-1000500", }, { cve: "CVE-2018-1000517", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2018-1000517", }, ], notes: [ { category: "general", text: "BusyBox project BusyBox wget version prior to commit 8e2174e9bd836e53c8b9c6e00d1bc6e2a718686e contains a Buffer Overflow vulnerability in Busybox wget that can result in heap buffer overflow. This attack appear to be exploitable via network connectivity. This vulnerability appears to have been fixed in after commit 8e2174e9bd836e53c8b9c6e00d1bc6e2a718686e.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Leap 15.3:busybox-1.34.1-4.9.1.aarch64", "openSUSE Leap 15.3:busybox-1.34.1-4.9.1.ppc64le", "openSUSE Leap 15.3:busybox-1.34.1-4.9.1.s390x", "openSUSE Leap 15.3:busybox-1.34.1-4.9.1.x86_64", "openSUSE Leap 15.3:busybox-static-1.34.1-4.9.1.aarch64", "openSUSE Leap 15.3:busybox-static-1.34.1-4.9.1.ppc64le", "openSUSE Leap 15.3:busybox-static-1.34.1-4.9.1.s390x", "openSUSE Leap 15.3:busybox-static-1.34.1-4.9.1.x86_64", "openSUSE Leap 15.3:python3-virtualbox-6.1.34-lp153.2.27.2.x86_64", "openSUSE Leap 15.3:virtualbox-6.1.34-lp153.2.27.2.x86_64", "openSUSE Leap 15.3:virtualbox-devel-6.1.34-lp153.2.27.2.x86_64", "openSUSE Leap 15.3:virtualbox-guest-desktop-icons-6.1.34-lp153.2.27.2.noarch", "openSUSE Leap 15.3:virtualbox-guest-source-6.1.34-lp153.2.27.2.noarch", "openSUSE Leap 15.3:virtualbox-guest-tools-6.1.34-lp153.2.27.2.x86_64", "openSUSE Leap 15.3:virtualbox-guest-x11-6.1.34-lp153.2.27.2.x86_64", "openSUSE Leap 15.3:virtualbox-host-source-6.1.34-lp153.2.27.2.noarch", "openSUSE Leap 15.3:virtualbox-kmp-default-6.1.34_k5.3.18_150300.59.63-lp153.2.27.1.x86_64", "openSUSE Leap 15.3:virtualbox-kmp-preempt-6.1.34_k5.3.18_150300.59.63-lp153.2.27.1.x86_64", "openSUSE Leap 15.3:virtualbox-qt-6.1.34-lp153.2.27.2.x86_64", "openSUSE Leap 15.3:virtualbox-vnc-6.1.34-lp153.2.27.2.x86_64", "openSUSE Leap 15.3:virtualbox-websrv-6.1.34-lp153.2.27.2.x86_64", ], }, references: [ { category: "external", summary: "CVE-2018-1000517", url: "https://www.suse.com/security/cve/CVE-2018-1000517", }, { category: "external", summary: "SUSE Bug 1099260 for CVE-2018-1000517", url: "https://bugzilla.suse.com/1099260", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Leap 15.3:busybox-1.34.1-4.9.1.aarch64", "openSUSE Leap 15.3:busybox-1.34.1-4.9.1.ppc64le", "openSUSE Leap 15.3:busybox-1.34.1-4.9.1.s390x", "openSUSE Leap 15.3:busybox-1.34.1-4.9.1.x86_64", "openSUSE Leap 15.3:busybox-static-1.34.1-4.9.1.aarch64", "openSUSE Leap 15.3:busybox-static-1.34.1-4.9.1.ppc64le", "openSUSE Leap 15.3:busybox-static-1.34.1-4.9.1.s390x", "openSUSE Leap 15.3:busybox-static-1.34.1-4.9.1.x86_64", "openSUSE Leap 15.3:python3-virtualbox-6.1.34-lp153.2.27.2.x86_64", "openSUSE Leap 15.3:virtualbox-6.1.34-lp153.2.27.2.x86_64", "openSUSE Leap 15.3:virtualbox-devel-6.1.34-lp153.2.27.2.x86_64", "openSUSE Leap 15.3:virtualbox-guest-desktop-icons-6.1.34-lp153.2.27.2.noarch", "openSUSE Leap 15.3:virtualbox-guest-source-6.1.34-lp153.2.27.2.noarch", "openSUSE Leap 15.3:virtualbox-guest-tools-6.1.34-lp153.2.27.2.x86_64", "openSUSE Leap 15.3:virtualbox-guest-x11-6.1.34-lp153.2.27.2.x86_64", "openSUSE Leap 15.3:virtualbox-host-source-6.1.34-lp153.2.27.2.noarch", "openSUSE Leap 15.3:virtualbox-kmp-default-6.1.34_k5.3.18_150300.59.63-lp153.2.27.1.x86_64", "openSUSE Leap 15.3:virtualbox-kmp-preempt-6.1.34_k5.3.18_150300.59.63-lp153.2.27.1.x86_64", "openSUSE Leap 15.3:virtualbox-qt-6.1.34-lp153.2.27.2.x86_64", "openSUSE Leap 15.3:virtualbox-vnc-6.1.34-lp153.2.27.2.x86_64", "openSUSE Leap 15.3:virtualbox-websrv-6.1.34-lp153.2.27.2.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.6, baseSeverity: "MEDIUM", vectorString: "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L", version: "3.0", }, products: [ "openSUSE Leap 15.3:busybox-1.34.1-4.9.1.aarch64", "openSUSE Leap 15.3:busybox-1.34.1-4.9.1.ppc64le", "openSUSE Leap 15.3:busybox-1.34.1-4.9.1.s390x", "openSUSE Leap 15.3:busybox-1.34.1-4.9.1.x86_64", "openSUSE Leap 15.3:busybox-static-1.34.1-4.9.1.aarch64", "openSUSE Leap 15.3:busybox-static-1.34.1-4.9.1.ppc64le", "openSUSE Leap 15.3:busybox-static-1.34.1-4.9.1.s390x", "openSUSE Leap 15.3:busybox-static-1.34.1-4.9.1.x86_64", "openSUSE Leap 15.3:python3-virtualbox-6.1.34-lp153.2.27.2.x86_64", "openSUSE Leap 15.3:virtualbox-6.1.34-lp153.2.27.2.x86_64", "openSUSE Leap 15.3:virtualbox-devel-6.1.34-lp153.2.27.2.x86_64", "openSUSE Leap 15.3:virtualbox-guest-desktop-icons-6.1.34-lp153.2.27.2.noarch", "openSUSE Leap 15.3:virtualbox-guest-source-6.1.34-lp153.2.27.2.noarch", "openSUSE Leap 15.3:virtualbox-guest-tools-6.1.34-lp153.2.27.2.x86_64", "openSUSE Leap 15.3:virtualbox-guest-x11-6.1.34-lp153.2.27.2.x86_64", "openSUSE Leap 15.3:virtualbox-host-source-6.1.34-lp153.2.27.2.noarch", "openSUSE Leap 15.3:virtualbox-kmp-default-6.1.34_k5.3.18_150300.59.63-lp153.2.27.1.x86_64", "openSUSE Leap 15.3:virtualbox-kmp-preempt-6.1.34_k5.3.18_150300.59.63-lp153.2.27.1.x86_64", "openSUSE Leap 15.3:virtualbox-qt-6.1.34-lp153.2.27.2.x86_64", "openSUSE Leap 15.3:virtualbox-vnc-6.1.34-lp153.2.27.2.x86_64", "openSUSE Leap 15.3:virtualbox-websrv-6.1.34-lp153.2.27.2.x86_64", ], }, ], threats: [ { category: "impact", date: "2022-01-20T09:04:27Z", details: "important", }, ], title: "CVE-2018-1000517", }, { cve: "CVE-2018-20679", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2018-20679", }, ], notes: [ { category: "general", text: "An issue was discovered in BusyBox before 1.30.0. An out of bounds read in udhcp components (consumed by the DHCP server, client, and relay) allows a remote attacker to leak sensitive information from the stack by sending a crafted DHCP message. This is related to verification in udhcp_get_option() in networking/udhcp/common.c that 4-byte options are indeed 4 bytes.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Leap 15.3:busybox-1.34.1-4.9.1.aarch64", "openSUSE Leap 15.3:busybox-1.34.1-4.9.1.ppc64le", "openSUSE Leap 15.3:busybox-1.34.1-4.9.1.s390x", "openSUSE Leap 15.3:busybox-1.34.1-4.9.1.x86_64", "openSUSE Leap 15.3:busybox-static-1.34.1-4.9.1.aarch64", "openSUSE Leap 15.3:busybox-static-1.34.1-4.9.1.ppc64le", "openSUSE Leap 15.3:busybox-static-1.34.1-4.9.1.s390x", "openSUSE Leap 15.3:busybox-static-1.34.1-4.9.1.x86_64", "openSUSE Leap 15.3:python3-virtualbox-6.1.34-lp153.2.27.2.x86_64", "openSUSE Leap 15.3:virtualbox-6.1.34-lp153.2.27.2.x86_64", "openSUSE Leap 15.3:virtualbox-devel-6.1.34-lp153.2.27.2.x86_64", "openSUSE Leap 15.3:virtualbox-guest-desktop-icons-6.1.34-lp153.2.27.2.noarch", "openSUSE Leap 15.3:virtualbox-guest-source-6.1.34-lp153.2.27.2.noarch", "openSUSE Leap 15.3:virtualbox-guest-tools-6.1.34-lp153.2.27.2.x86_64", "openSUSE Leap 15.3:virtualbox-guest-x11-6.1.34-lp153.2.27.2.x86_64", "openSUSE Leap 15.3:virtualbox-host-source-6.1.34-lp153.2.27.2.noarch", "openSUSE Leap 15.3:virtualbox-kmp-default-6.1.34_k5.3.18_150300.59.63-lp153.2.27.1.x86_64", "openSUSE Leap 15.3:virtualbox-kmp-preempt-6.1.34_k5.3.18_150300.59.63-lp153.2.27.1.x86_64", "openSUSE Leap 15.3:virtualbox-qt-6.1.34-lp153.2.27.2.x86_64", "openSUSE Leap 15.3:virtualbox-vnc-6.1.34-lp153.2.27.2.x86_64", "openSUSE Leap 15.3:virtualbox-websrv-6.1.34-lp153.2.27.2.x86_64", ], }, references: [ { category: "external", summary: "CVE-2018-20679", url: "https://www.suse.com/security/cve/CVE-2018-20679", }, { category: "external", summary: "SUSE Bug 1121426 for CVE-2018-20679", url: "https://bugzilla.suse.com/1121426", }, { category: "external", summary: "SUSE Bug 1121428 for CVE-2018-20679", url: "https://bugzilla.suse.com/1121428", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Leap 15.3:busybox-1.34.1-4.9.1.aarch64", "openSUSE Leap 15.3:busybox-1.34.1-4.9.1.ppc64le", "openSUSE Leap 15.3:busybox-1.34.1-4.9.1.s390x", "openSUSE Leap 15.3:busybox-1.34.1-4.9.1.x86_64", "openSUSE Leap 15.3:busybox-static-1.34.1-4.9.1.aarch64", "openSUSE Leap 15.3:busybox-static-1.34.1-4.9.1.ppc64le", "openSUSE Leap 15.3:busybox-static-1.34.1-4.9.1.s390x", "openSUSE Leap 15.3:busybox-static-1.34.1-4.9.1.x86_64", "openSUSE Leap 15.3:python3-virtualbox-6.1.34-lp153.2.27.2.x86_64", "openSUSE Leap 15.3:virtualbox-6.1.34-lp153.2.27.2.x86_64", "openSUSE Leap 15.3:virtualbox-devel-6.1.34-lp153.2.27.2.x86_64", "openSUSE Leap 15.3:virtualbox-guest-desktop-icons-6.1.34-lp153.2.27.2.noarch", "openSUSE Leap 15.3:virtualbox-guest-source-6.1.34-lp153.2.27.2.noarch", "openSUSE Leap 15.3:virtualbox-guest-tools-6.1.34-lp153.2.27.2.x86_64", "openSUSE Leap 15.3:virtualbox-guest-x11-6.1.34-lp153.2.27.2.x86_64", "openSUSE Leap 15.3:virtualbox-host-source-6.1.34-lp153.2.27.2.noarch", "openSUSE Leap 15.3:virtualbox-kmp-default-6.1.34_k5.3.18_150300.59.63-lp153.2.27.1.x86_64", "openSUSE Leap 15.3:virtualbox-kmp-preempt-6.1.34_k5.3.18_150300.59.63-lp153.2.27.1.x86_64", "openSUSE Leap 15.3:virtualbox-qt-6.1.34-lp153.2.27.2.x86_64", "openSUSE Leap 15.3:virtualbox-vnc-6.1.34-lp153.2.27.2.x86_64", "openSUSE Leap 15.3:virtualbox-websrv-6.1.34-lp153.2.27.2.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.3, baseSeverity: "MEDIUM", vectorString: "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N", version: "3.0", }, products: [ "openSUSE Leap 15.3:busybox-1.34.1-4.9.1.aarch64", "openSUSE Leap 15.3:busybox-1.34.1-4.9.1.ppc64le", "openSUSE Leap 15.3:busybox-1.34.1-4.9.1.s390x", "openSUSE Leap 15.3:busybox-1.34.1-4.9.1.x86_64", "openSUSE Leap 15.3:busybox-static-1.34.1-4.9.1.aarch64", "openSUSE Leap 15.3:busybox-static-1.34.1-4.9.1.ppc64le", "openSUSE Leap 15.3:busybox-static-1.34.1-4.9.1.s390x", "openSUSE Leap 15.3:busybox-static-1.34.1-4.9.1.x86_64", "openSUSE Leap 15.3:python3-virtualbox-6.1.34-lp153.2.27.2.x86_64", "openSUSE Leap 15.3:virtualbox-6.1.34-lp153.2.27.2.x86_64", "openSUSE Leap 15.3:virtualbox-devel-6.1.34-lp153.2.27.2.x86_64", "openSUSE Leap 15.3:virtualbox-guest-desktop-icons-6.1.34-lp153.2.27.2.noarch", "openSUSE Leap 15.3:virtualbox-guest-source-6.1.34-lp153.2.27.2.noarch", "openSUSE Leap 15.3:virtualbox-guest-tools-6.1.34-lp153.2.27.2.x86_64", "openSUSE Leap 15.3:virtualbox-guest-x11-6.1.34-lp153.2.27.2.x86_64", "openSUSE Leap 15.3:virtualbox-host-source-6.1.34-lp153.2.27.2.noarch", "openSUSE Leap 15.3:virtualbox-kmp-default-6.1.34_k5.3.18_150300.59.63-lp153.2.27.1.x86_64", "openSUSE Leap 15.3:virtualbox-kmp-preempt-6.1.34_k5.3.18_150300.59.63-lp153.2.27.1.x86_64", "openSUSE Leap 15.3:virtualbox-qt-6.1.34-lp153.2.27.2.x86_64", "openSUSE Leap 15.3:virtualbox-vnc-6.1.34-lp153.2.27.2.x86_64", "openSUSE Leap 15.3:virtualbox-websrv-6.1.34-lp153.2.27.2.x86_64", ], }, ], threats: [ { category: "impact", date: "2022-01-20T09:04:27Z", details: "moderate", }, ], title: "CVE-2018-20679", }, { cve: "CVE-2019-5747", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2019-5747", }, ], notes: [ { category: "general", text: "An issue was discovered in BusyBox through 1.30.0. An out of bounds read in udhcp components (consumed by the DHCP client, server, and/or relay) might allow a remote attacker to leak sensitive information from the stack by sending a crafted DHCP message. This is related to assurance of a 4-byte length when decoding DHCP_SUBNET. NOTE: this issue exists because of an incomplete fix for CVE-2018-20679.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Leap 15.3:busybox-1.34.1-4.9.1.aarch64", "openSUSE Leap 15.3:busybox-1.34.1-4.9.1.ppc64le", "openSUSE Leap 15.3:busybox-1.34.1-4.9.1.s390x", "openSUSE Leap 15.3:busybox-1.34.1-4.9.1.x86_64", "openSUSE Leap 15.3:busybox-static-1.34.1-4.9.1.aarch64", "openSUSE Leap 15.3:busybox-static-1.34.1-4.9.1.ppc64le", "openSUSE Leap 15.3:busybox-static-1.34.1-4.9.1.s390x", "openSUSE Leap 15.3:busybox-static-1.34.1-4.9.1.x86_64", "openSUSE Leap 15.3:python3-virtualbox-6.1.34-lp153.2.27.2.x86_64", "openSUSE Leap 15.3:virtualbox-6.1.34-lp153.2.27.2.x86_64", "openSUSE Leap 15.3:virtualbox-devel-6.1.34-lp153.2.27.2.x86_64", "openSUSE Leap 15.3:virtualbox-guest-desktop-icons-6.1.34-lp153.2.27.2.noarch", "openSUSE Leap 15.3:virtualbox-guest-source-6.1.34-lp153.2.27.2.noarch", "openSUSE Leap 15.3:virtualbox-guest-tools-6.1.34-lp153.2.27.2.x86_64", "openSUSE Leap 15.3:virtualbox-guest-x11-6.1.34-lp153.2.27.2.x86_64", "openSUSE Leap 15.3:virtualbox-host-source-6.1.34-lp153.2.27.2.noarch", "openSUSE Leap 15.3:virtualbox-kmp-default-6.1.34_k5.3.18_150300.59.63-lp153.2.27.1.x86_64", "openSUSE Leap 15.3:virtualbox-kmp-preempt-6.1.34_k5.3.18_150300.59.63-lp153.2.27.1.x86_64", "openSUSE Leap 15.3:virtualbox-qt-6.1.34-lp153.2.27.2.x86_64", "openSUSE Leap 15.3:virtualbox-vnc-6.1.34-lp153.2.27.2.x86_64", "openSUSE Leap 15.3:virtualbox-websrv-6.1.34-lp153.2.27.2.x86_64", ], }, references: [ { category: "external", summary: "CVE-2019-5747", url: "https://www.suse.com/security/cve/CVE-2019-5747", }, { category: "external", summary: "SUSE Bug 1121426 for CVE-2019-5747", url: "https://bugzilla.suse.com/1121426", }, { category: "external", summary: "SUSE Bug 1121428 for CVE-2019-5747", url: "https://bugzilla.suse.com/1121428", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Leap 15.3:busybox-1.34.1-4.9.1.aarch64", "openSUSE Leap 15.3:busybox-1.34.1-4.9.1.ppc64le", "openSUSE Leap 15.3:busybox-1.34.1-4.9.1.s390x", "openSUSE Leap 15.3:busybox-1.34.1-4.9.1.x86_64", "openSUSE Leap 15.3:busybox-static-1.34.1-4.9.1.aarch64", "openSUSE Leap 15.3:busybox-static-1.34.1-4.9.1.ppc64le", "openSUSE Leap 15.3:busybox-static-1.34.1-4.9.1.s390x", "openSUSE Leap 15.3:busybox-static-1.34.1-4.9.1.x86_64", "openSUSE Leap 15.3:python3-virtualbox-6.1.34-lp153.2.27.2.x86_64", "openSUSE Leap 15.3:virtualbox-6.1.34-lp153.2.27.2.x86_64", "openSUSE Leap 15.3:virtualbox-devel-6.1.34-lp153.2.27.2.x86_64", "openSUSE Leap 15.3:virtualbox-guest-desktop-icons-6.1.34-lp153.2.27.2.noarch", "openSUSE Leap 15.3:virtualbox-guest-source-6.1.34-lp153.2.27.2.noarch", "openSUSE Leap 15.3:virtualbox-guest-tools-6.1.34-lp153.2.27.2.x86_64", "openSUSE Leap 15.3:virtualbox-guest-x11-6.1.34-lp153.2.27.2.x86_64", "openSUSE Leap 15.3:virtualbox-host-source-6.1.34-lp153.2.27.2.noarch", "openSUSE Leap 15.3:virtualbox-kmp-default-6.1.34_k5.3.18_150300.59.63-lp153.2.27.1.x86_64", "openSUSE Leap 15.3:virtualbox-kmp-preempt-6.1.34_k5.3.18_150300.59.63-lp153.2.27.1.x86_64", "openSUSE Leap 15.3:virtualbox-qt-6.1.34-lp153.2.27.2.x86_64", "openSUSE Leap 15.3:virtualbox-vnc-6.1.34-lp153.2.27.2.x86_64", "openSUSE Leap 15.3:virtualbox-websrv-6.1.34-lp153.2.27.2.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 3.5, baseSeverity: "LOW", vectorString: "CVSS:3.1/AV:A/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N", version: "3.1", }, products: [ "openSUSE Leap 15.3:busybox-1.34.1-4.9.1.aarch64", "openSUSE Leap 15.3:busybox-1.34.1-4.9.1.ppc64le", "openSUSE Leap 15.3:busybox-1.34.1-4.9.1.s390x", "openSUSE Leap 15.3:busybox-1.34.1-4.9.1.x86_64", "openSUSE Leap 15.3:busybox-static-1.34.1-4.9.1.aarch64", "openSUSE Leap 15.3:busybox-static-1.34.1-4.9.1.ppc64le", "openSUSE Leap 15.3:busybox-static-1.34.1-4.9.1.s390x", "openSUSE Leap 15.3:busybox-static-1.34.1-4.9.1.x86_64", "openSUSE Leap 15.3:python3-virtualbox-6.1.34-lp153.2.27.2.x86_64", "openSUSE Leap 15.3:virtualbox-6.1.34-lp153.2.27.2.x86_64", "openSUSE Leap 15.3:virtualbox-devel-6.1.34-lp153.2.27.2.x86_64", "openSUSE Leap 15.3:virtualbox-guest-desktop-icons-6.1.34-lp153.2.27.2.noarch", "openSUSE Leap 15.3:virtualbox-guest-source-6.1.34-lp153.2.27.2.noarch", "openSUSE Leap 15.3:virtualbox-guest-tools-6.1.34-lp153.2.27.2.x86_64", "openSUSE Leap 15.3:virtualbox-guest-x11-6.1.34-lp153.2.27.2.x86_64", "openSUSE Leap 15.3:virtualbox-host-source-6.1.34-lp153.2.27.2.noarch", "openSUSE Leap 15.3:virtualbox-kmp-default-6.1.34_k5.3.18_150300.59.63-lp153.2.27.1.x86_64", "openSUSE Leap 15.3:virtualbox-kmp-preempt-6.1.34_k5.3.18_150300.59.63-lp153.2.27.1.x86_64", "openSUSE Leap 15.3:virtualbox-qt-6.1.34-lp153.2.27.2.x86_64", "openSUSE Leap 15.3:virtualbox-vnc-6.1.34-lp153.2.27.2.x86_64", "openSUSE Leap 15.3:virtualbox-websrv-6.1.34-lp153.2.27.2.x86_64", ], }, ], threats: [ { category: "impact", date: "2022-01-20T09:04:27Z", details: "low", }, ], title: "CVE-2019-5747", }, { cve: "CVE-2021-28831", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2021-28831", }, ], notes: [ { category: "general", text: "decompress_gunzip.c in BusyBox through 1.32.1 mishandles the error bit on the huft_build result pointer, with a resultant invalid free or segmentation fault, via malformed gzip data.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Leap 15.3:busybox-1.34.1-4.9.1.aarch64", "openSUSE Leap 15.3:busybox-1.34.1-4.9.1.ppc64le", "openSUSE Leap 15.3:busybox-1.34.1-4.9.1.s390x", "openSUSE Leap 15.3:busybox-1.34.1-4.9.1.x86_64", "openSUSE Leap 15.3:busybox-static-1.34.1-4.9.1.aarch64", "openSUSE Leap 15.3:busybox-static-1.34.1-4.9.1.ppc64le", "openSUSE Leap 15.3:busybox-static-1.34.1-4.9.1.s390x", "openSUSE Leap 15.3:busybox-static-1.34.1-4.9.1.x86_64", "openSUSE Leap 15.3:python3-virtualbox-6.1.34-lp153.2.27.2.x86_64", "openSUSE Leap 15.3:virtualbox-6.1.34-lp153.2.27.2.x86_64", "openSUSE Leap 15.3:virtualbox-devel-6.1.34-lp153.2.27.2.x86_64", "openSUSE Leap 15.3:virtualbox-guest-desktop-icons-6.1.34-lp153.2.27.2.noarch", "openSUSE Leap 15.3:virtualbox-guest-source-6.1.34-lp153.2.27.2.noarch", "openSUSE Leap 15.3:virtualbox-guest-tools-6.1.34-lp153.2.27.2.x86_64", "openSUSE Leap 15.3:virtualbox-guest-x11-6.1.34-lp153.2.27.2.x86_64", "openSUSE Leap 15.3:virtualbox-host-source-6.1.34-lp153.2.27.2.noarch", "openSUSE Leap 15.3:virtualbox-kmp-default-6.1.34_k5.3.18_150300.59.63-lp153.2.27.1.x86_64", "openSUSE Leap 15.3:virtualbox-kmp-preempt-6.1.34_k5.3.18_150300.59.63-lp153.2.27.1.x86_64", "openSUSE Leap 15.3:virtualbox-qt-6.1.34-lp153.2.27.2.x86_64", "openSUSE Leap 15.3:virtualbox-vnc-6.1.34-lp153.2.27.2.x86_64", "openSUSE Leap 15.3:virtualbox-websrv-6.1.34-lp153.2.27.2.x86_64", ], }, references: [ { category: "external", summary: "CVE-2021-28831", url: "https://www.suse.com/security/cve/CVE-2021-28831", }, { category: "external", summary: "SUSE Bug 1184522 for CVE-2021-28831", url: "https://bugzilla.suse.com/1184522", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Leap 15.3:busybox-1.34.1-4.9.1.aarch64", "openSUSE Leap 15.3:busybox-1.34.1-4.9.1.ppc64le", "openSUSE Leap 15.3:busybox-1.34.1-4.9.1.s390x", "openSUSE Leap 15.3:busybox-1.34.1-4.9.1.x86_64", "openSUSE Leap 15.3:busybox-static-1.34.1-4.9.1.aarch64", "openSUSE Leap 15.3:busybox-static-1.34.1-4.9.1.ppc64le", "openSUSE Leap 15.3:busybox-static-1.34.1-4.9.1.s390x", "openSUSE Leap 15.3:busybox-static-1.34.1-4.9.1.x86_64", "openSUSE Leap 15.3:python3-virtualbox-6.1.34-lp153.2.27.2.x86_64", "openSUSE Leap 15.3:virtualbox-6.1.34-lp153.2.27.2.x86_64", "openSUSE Leap 15.3:virtualbox-devel-6.1.34-lp153.2.27.2.x86_64", "openSUSE Leap 15.3:virtualbox-guest-desktop-icons-6.1.34-lp153.2.27.2.noarch", "openSUSE Leap 15.3:virtualbox-guest-source-6.1.34-lp153.2.27.2.noarch", "openSUSE Leap 15.3:virtualbox-guest-tools-6.1.34-lp153.2.27.2.x86_64", "openSUSE Leap 15.3:virtualbox-guest-x11-6.1.34-lp153.2.27.2.x86_64", "openSUSE Leap 15.3:virtualbox-host-source-6.1.34-lp153.2.27.2.noarch", "openSUSE Leap 15.3:virtualbox-kmp-default-6.1.34_k5.3.18_150300.59.63-lp153.2.27.1.x86_64", "openSUSE Leap 15.3:virtualbox-kmp-preempt-6.1.34_k5.3.18_150300.59.63-lp153.2.27.1.x86_64", "openSUSE Leap 15.3:virtualbox-qt-6.1.34-lp153.2.27.2.x86_64", "openSUSE Leap 15.3:virtualbox-vnc-6.1.34-lp153.2.27.2.x86_64", "openSUSE Leap 15.3:virtualbox-websrv-6.1.34-lp153.2.27.2.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 7.5, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "openSUSE Leap 15.3:busybox-1.34.1-4.9.1.aarch64", "openSUSE Leap 15.3:busybox-1.34.1-4.9.1.ppc64le", "openSUSE Leap 15.3:busybox-1.34.1-4.9.1.s390x", "openSUSE Leap 15.3:busybox-1.34.1-4.9.1.x86_64", "openSUSE Leap 15.3:busybox-static-1.34.1-4.9.1.aarch64", "openSUSE Leap 15.3:busybox-static-1.34.1-4.9.1.ppc64le", "openSUSE Leap 15.3:busybox-static-1.34.1-4.9.1.s390x", "openSUSE Leap 15.3:busybox-static-1.34.1-4.9.1.x86_64", "openSUSE Leap 15.3:python3-virtualbox-6.1.34-lp153.2.27.2.x86_64", "openSUSE Leap 15.3:virtualbox-6.1.34-lp153.2.27.2.x86_64", "openSUSE Leap 15.3:virtualbox-devel-6.1.34-lp153.2.27.2.x86_64", "openSUSE Leap 15.3:virtualbox-guest-desktop-icons-6.1.34-lp153.2.27.2.noarch", "openSUSE Leap 15.3:virtualbox-guest-source-6.1.34-lp153.2.27.2.noarch", "openSUSE Leap 15.3:virtualbox-guest-tools-6.1.34-lp153.2.27.2.x86_64", "openSUSE Leap 15.3:virtualbox-guest-x11-6.1.34-lp153.2.27.2.x86_64", "openSUSE Leap 15.3:virtualbox-host-source-6.1.34-lp153.2.27.2.noarch", "openSUSE Leap 15.3:virtualbox-kmp-default-6.1.34_k5.3.18_150300.59.63-lp153.2.27.1.x86_64", "openSUSE Leap 15.3:virtualbox-kmp-preempt-6.1.34_k5.3.18_150300.59.63-lp153.2.27.1.x86_64", "openSUSE Leap 15.3:virtualbox-qt-6.1.34-lp153.2.27.2.x86_64", "openSUSE Leap 15.3:virtualbox-vnc-6.1.34-lp153.2.27.2.x86_64", "openSUSE Leap 15.3:virtualbox-websrv-6.1.34-lp153.2.27.2.x86_64", ], }, ], threats: [ { category: "impact", date: "2022-01-20T09:04:27Z", details: "important", }, ], title: "CVE-2021-28831", }, { cve: "CVE-2021-42373", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2021-42373", }, ], notes: [ { category: "general", text: "A NULL pointer dereference in Busybox's man applet leads to denial of service when a section name is supplied but no page argument is given", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Leap 15.3:busybox-1.34.1-4.9.1.aarch64", "openSUSE Leap 15.3:busybox-1.34.1-4.9.1.ppc64le", "openSUSE Leap 15.3:busybox-1.34.1-4.9.1.s390x", "openSUSE Leap 15.3:busybox-1.34.1-4.9.1.x86_64", "openSUSE Leap 15.3:busybox-static-1.34.1-4.9.1.aarch64", "openSUSE Leap 15.3:busybox-static-1.34.1-4.9.1.ppc64le", "openSUSE Leap 15.3:busybox-static-1.34.1-4.9.1.s390x", "openSUSE Leap 15.3:busybox-static-1.34.1-4.9.1.x86_64", "openSUSE Leap 15.3:python3-virtualbox-6.1.34-lp153.2.27.2.x86_64", "openSUSE Leap 15.3:virtualbox-6.1.34-lp153.2.27.2.x86_64", "openSUSE Leap 15.3:virtualbox-devel-6.1.34-lp153.2.27.2.x86_64", "openSUSE Leap 15.3:virtualbox-guest-desktop-icons-6.1.34-lp153.2.27.2.noarch", "openSUSE Leap 15.3:virtualbox-guest-source-6.1.34-lp153.2.27.2.noarch", "openSUSE Leap 15.3:virtualbox-guest-tools-6.1.34-lp153.2.27.2.x86_64", "openSUSE Leap 15.3:virtualbox-guest-x11-6.1.34-lp153.2.27.2.x86_64", "openSUSE Leap 15.3:virtualbox-host-source-6.1.34-lp153.2.27.2.noarch", "openSUSE Leap 15.3:virtualbox-kmp-default-6.1.34_k5.3.18_150300.59.63-lp153.2.27.1.x86_64", "openSUSE Leap 15.3:virtualbox-kmp-preempt-6.1.34_k5.3.18_150300.59.63-lp153.2.27.1.x86_64", "openSUSE Leap 15.3:virtualbox-qt-6.1.34-lp153.2.27.2.x86_64", "openSUSE Leap 15.3:virtualbox-vnc-6.1.34-lp153.2.27.2.x86_64", "openSUSE Leap 15.3:virtualbox-websrv-6.1.34-lp153.2.27.2.x86_64", ], }, references: [ { category: "external", summary: "CVE-2021-42373", url: "https://www.suse.com/security/cve/CVE-2021-42373", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Leap 15.3:busybox-1.34.1-4.9.1.aarch64", "openSUSE Leap 15.3:busybox-1.34.1-4.9.1.ppc64le", "openSUSE Leap 15.3:busybox-1.34.1-4.9.1.s390x", "openSUSE Leap 15.3:busybox-1.34.1-4.9.1.x86_64", "openSUSE Leap 15.3:busybox-static-1.34.1-4.9.1.aarch64", "openSUSE Leap 15.3:busybox-static-1.34.1-4.9.1.ppc64le", "openSUSE Leap 15.3:busybox-static-1.34.1-4.9.1.s390x", "openSUSE Leap 15.3:busybox-static-1.34.1-4.9.1.x86_64", "openSUSE Leap 15.3:python3-virtualbox-6.1.34-lp153.2.27.2.x86_64", "openSUSE Leap 15.3:virtualbox-6.1.34-lp153.2.27.2.x86_64", "openSUSE Leap 15.3:virtualbox-devel-6.1.34-lp153.2.27.2.x86_64", "openSUSE Leap 15.3:virtualbox-guest-desktop-icons-6.1.34-lp153.2.27.2.noarch", "openSUSE Leap 15.3:virtualbox-guest-source-6.1.34-lp153.2.27.2.noarch", "openSUSE Leap 15.3:virtualbox-guest-tools-6.1.34-lp153.2.27.2.x86_64", "openSUSE Leap 15.3:virtualbox-guest-x11-6.1.34-lp153.2.27.2.x86_64", "openSUSE Leap 15.3:virtualbox-host-source-6.1.34-lp153.2.27.2.noarch", "openSUSE Leap 15.3:virtualbox-kmp-default-6.1.34_k5.3.18_150300.59.63-lp153.2.27.1.x86_64", "openSUSE Leap 15.3:virtualbox-kmp-preempt-6.1.34_k5.3.18_150300.59.63-lp153.2.27.1.x86_64", "openSUSE Leap 15.3:virtualbox-qt-6.1.34-lp153.2.27.2.x86_64", "openSUSE Leap 15.3:virtualbox-vnc-6.1.34-lp153.2.27.2.x86_64", "openSUSE Leap 15.3:virtualbox-websrv-6.1.34-lp153.2.27.2.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.5, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "openSUSE Leap 15.3:busybox-1.34.1-4.9.1.aarch64", "openSUSE Leap 15.3:busybox-1.34.1-4.9.1.ppc64le", "openSUSE Leap 15.3:busybox-1.34.1-4.9.1.s390x", "openSUSE Leap 15.3:busybox-1.34.1-4.9.1.x86_64", "openSUSE Leap 15.3:busybox-static-1.34.1-4.9.1.aarch64", "openSUSE Leap 15.3:busybox-static-1.34.1-4.9.1.ppc64le", "openSUSE Leap 15.3:busybox-static-1.34.1-4.9.1.s390x", "openSUSE Leap 15.3:busybox-static-1.34.1-4.9.1.x86_64", "openSUSE Leap 15.3:python3-virtualbox-6.1.34-lp153.2.27.2.x86_64", "openSUSE Leap 15.3:virtualbox-6.1.34-lp153.2.27.2.x86_64", "openSUSE Leap 15.3:virtualbox-devel-6.1.34-lp153.2.27.2.x86_64", "openSUSE Leap 15.3:virtualbox-guest-desktop-icons-6.1.34-lp153.2.27.2.noarch", "openSUSE Leap 15.3:virtualbox-guest-source-6.1.34-lp153.2.27.2.noarch", "openSUSE Leap 15.3:virtualbox-guest-tools-6.1.34-lp153.2.27.2.x86_64", "openSUSE Leap 15.3:virtualbox-guest-x11-6.1.34-lp153.2.27.2.x86_64", "openSUSE Leap 15.3:virtualbox-host-source-6.1.34-lp153.2.27.2.noarch", "openSUSE Leap 15.3:virtualbox-kmp-default-6.1.34_k5.3.18_150300.59.63-lp153.2.27.1.x86_64", "openSUSE Leap 15.3:virtualbox-kmp-preempt-6.1.34_k5.3.18_150300.59.63-lp153.2.27.1.x86_64", "openSUSE Leap 15.3:virtualbox-qt-6.1.34-lp153.2.27.2.x86_64", "openSUSE Leap 15.3:virtualbox-vnc-6.1.34-lp153.2.27.2.x86_64", "openSUSE Leap 15.3:virtualbox-websrv-6.1.34-lp153.2.27.2.x86_64", ], }, ], threats: [ { category: "impact", date: "2022-01-20T09:04:27Z", details: "moderate", }, ], title: "CVE-2021-42373", }, { cve: "CVE-2021-42374", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2021-42374", }, ], notes: [ { category: "general", text: "An out-of-bounds heap read in Busybox's unlzma applet leads to information leak and denial of service when crafted LZMA-compressed input is decompressed. This can be triggered by any applet/format that", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Leap 15.3:busybox-1.34.1-4.9.1.aarch64", "openSUSE Leap 15.3:busybox-1.34.1-4.9.1.ppc64le", "openSUSE Leap 15.3:busybox-1.34.1-4.9.1.s390x", "openSUSE Leap 15.3:busybox-1.34.1-4.9.1.x86_64", "openSUSE Leap 15.3:busybox-static-1.34.1-4.9.1.aarch64", "openSUSE Leap 15.3:busybox-static-1.34.1-4.9.1.ppc64le", "openSUSE Leap 15.3:busybox-static-1.34.1-4.9.1.s390x", "openSUSE Leap 15.3:busybox-static-1.34.1-4.9.1.x86_64", "openSUSE Leap 15.3:python3-virtualbox-6.1.34-lp153.2.27.2.x86_64", "openSUSE Leap 15.3:virtualbox-6.1.34-lp153.2.27.2.x86_64", "openSUSE Leap 15.3:virtualbox-devel-6.1.34-lp153.2.27.2.x86_64", "openSUSE Leap 15.3:virtualbox-guest-desktop-icons-6.1.34-lp153.2.27.2.noarch", "openSUSE Leap 15.3:virtualbox-guest-source-6.1.34-lp153.2.27.2.noarch", "openSUSE Leap 15.3:virtualbox-guest-tools-6.1.34-lp153.2.27.2.x86_64", "openSUSE Leap 15.3:virtualbox-guest-x11-6.1.34-lp153.2.27.2.x86_64", "openSUSE Leap 15.3:virtualbox-host-source-6.1.34-lp153.2.27.2.noarch", "openSUSE Leap 15.3:virtualbox-kmp-default-6.1.34_k5.3.18_150300.59.63-lp153.2.27.1.x86_64", "openSUSE Leap 15.3:virtualbox-kmp-preempt-6.1.34_k5.3.18_150300.59.63-lp153.2.27.1.x86_64", "openSUSE Leap 15.3:virtualbox-qt-6.1.34-lp153.2.27.2.x86_64", "openSUSE Leap 15.3:virtualbox-vnc-6.1.34-lp153.2.27.2.x86_64", "openSUSE Leap 15.3:virtualbox-websrv-6.1.34-lp153.2.27.2.x86_64", ], }, references: [ { category: "external", summary: "CVE-2021-42374", url: "https://www.suse.com/security/cve/CVE-2021-42374", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Leap 15.3:busybox-1.34.1-4.9.1.aarch64", "openSUSE Leap 15.3:busybox-1.34.1-4.9.1.ppc64le", "openSUSE Leap 15.3:busybox-1.34.1-4.9.1.s390x", "openSUSE Leap 15.3:busybox-1.34.1-4.9.1.x86_64", "openSUSE Leap 15.3:busybox-static-1.34.1-4.9.1.aarch64", "openSUSE Leap 15.3:busybox-static-1.34.1-4.9.1.ppc64le", "openSUSE Leap 15.3:busybox-static-1.34.1-4.9.1.s390x", "openSUSE Leap 15.3:busybox-static-1.34.1-4.9.1.x86_64", "openSUSE Leap 15.3:python3-virtualbox-6.1.34-lp153.2.27.2.x86_64", "openSUSE Leap 15.3:virtualbox-6.1.34-lp153.2.27.2.x86_64", "openSUSE Leap 15.3:virtualbox-devel-6.1.34-lp153.2.27.2.x86_64", "openSUSE Leap 15.3:virtualbox-guest-desktop-icons-6.1.34-lp153.2.27.2.noarch", "openSUSE Leap 15.3:virtualbox-guest-source-6.1.34-lp153.2.27.2.noarch", "openSUSE Leap 15.3:virtualbox-guest-tools-6.1.34-lp153.2.27.2.x86_64", "openSUSE Leap 15.3:virtualbox-guest-x11-6.1.34-lp153.2.27.2.x86_64", "openSUSE Leap 15.3:virtualbox-host-source-6.1.34-lp153.2.27.2.noarch", "openSUSE Leap 15.3:virtualbox-kmp-default-6.1.34_k5.3.18_150300.59.63-lp153.2.27.1.x86_64", "openSUSE Leap 15.3:virtualbox-kmp-preempt-6.1.34_k5.3.18_150300.59.63-lp153.2.27.1.x86_64", "openSUSE Leap 15.3:virtualbox-qt-6.1.34-lp153.2.27.2.x86_64", "openSUSE Leap 15.3:virtualbox-vnc-6.1.34-lp153.2.27.2.x86_64", "openSUSE Leap 15.3:virtualbox-websrv-6.1.34-lp153.2.27.2.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.7, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:H", version: "3.1", }, products: [ "openSUSE Leap 15.3:busybox-1.34.1-4.9.1.aarch64", "openSUSE Leap 15.3:busybox-1.34.1-4.9.1.ppc64le", "openSUSE Leap 15.3:busybox-1.34.1-4.9.1.s390x", "openSUSE Leap 15.3:busybox-1.34.1-4.9.1.x86_64", "openSUSE Leap 15.3:busybox-static-1.34.1-4.9.1.aarch64", "openSUSE Leap 15.3:busybox-static-1.34.1-4.9.1.ppc64le", "openSUSE Leap 15.3:busybox-static-1.34.1-4.9.1.s390x", "openSUSE Leap 15.3:busybox-static-1.34.1-4.9.1.x86_64", "openSUSE Leap 15.3:python3-virtualbox-6.1.34-lp153.2.27.2.x86_64", "openSUSE Leap 15.3:virtualbox-6.1.34-lp153.2.27.2.x86_64", "openSUSE Leap 15.3:virtualbox-devel-6.1.34-lp153.2.27.2.x86_64", "openSUSE Leap 15.3:virtualbox-guest-desktop-icons-6.1.34-lp153.2.27.2.noarch", "openSUSE Leap 15.3:virtualbox-guest-source-6.1.34-lp153.2.27.2.noarch", "openSUSE Leap 15.3:virtualbox-guest-tools-6.1.34-lp153.2.27.2.x86_64", "openSUSE Leap 15.3:virtualbox-guest-x11-6.1.34-lp153.2.27.2.x86_64", "openSUSE Leap 15.3:virtualbox-host-source-6.1.34-lp153.2.27.2.noarch", "openSUSE Leap 15.3:virtualbox-kmp-default-6.1.34_k5.3.18_150300.59.63-lp153.2.27.1.x86_64", "openSUSE Leap 15.3:virtualbox-kmp-preempt-6.1.34_k5.3.18_150300.59.63-lp153.2.27.1.x86_64", "openSUSE Leap 15.3:virtualbox-qt-6.1.34-lp153.2.27.2.x86_64", "openSUSE Leap 15.3:virtualbox-vnc-6.1.34-lp153.2.27.2.x86_64", "openSUSE Leap 15.3:virtualbox-websrv-6.1.34-lp153.2.27.2.x86_64", ], }, ], threats: [ { category: "impact", date: "2022-01-20T09:04:27Z", details: "moderate", }, ], title: "CVE-2021-42374", }, { cve: "CVE-2021-42375", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2021-42375", }, ], notes: [ { category: "general", text: "An incorrect handling of a special element in Busybox's ash applet leads to denial of service when processing a crafted shell command, due to the shell mistaking specific characters for reserved characters. This may be used for DoS under rare conditions of filtered command input.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Leap 15.3:busybox-1.34.1-4.9.1.aarch64", "openSUSE Leap 15.3:busybox-1.34.1-4.9.1.ppc64le", "openSUSE Leap 15.3:busybox-1.34.1-4.9.1.s390x", "openSUSE Leap 15.3:busybox-1.34.1-4.9.1.x86_64", "openSUSE Leap 15.3:busybox-static-1.34.1-4.9.1.aarch64", "openSUSE Leap 15.3:busybox-static-1.34.1-4.9.1.ppc64le", "openSUSE Leap 15.3:busybox-static-1.34.1-4.9.1.s390x", "openSUSE Leap 15.3:busybox-static-1.34.1-4.9.1.x86_64", "openSUSE Leap 15.3:python3-virtualbox-6.1.34-lp153.2.27.2.x86_64", "openSUSE Leap 15.3:virtualbox-6.1.34-lp153.2.27.2.x86_64", "openSUSE Leap 15.3:virtualbox-devel-6.1.34-lp153.2.27.2.x86_64", "openSUSE Leap 15.3:virtualbox-guest-desktop-icons-6.1.34-lp153.2.27.2.noarch", "openSUSE Leap 15.3:virtualbox-guest-source-6.1.34-lp153.2.27.2.noarch", "openSUSE Leap 15.3:virtualbox-guest-tools-6.1.34-lp153.2.27.2.x86_64", "openSUSE Leap 15.3:virtualbox-guest-x11-6.1.34-lp153.2.27.2.x86_64", "openSUSE Leap 15.3:virtualbox-host-source-6.1.34-lp153.2.27.2.noarch", "openSUSE Leap 15.3:virtualbox-kmp-default-6.1.34_k5.3.18_150300.59.63-lp153.2.27.1.x86_64", "openSUSE Leap 15.3:virtualbox-kmp-preempt-6.1.34_k5.3.18_150300.59.63-lp153.2.27.1.x86_64", "openSUSE Leap 15.3:virtualbox-qt-6.1.34-lp153.2.27.2.x86_64", "openSUSE Leap 15.3:virtualbox-vnc-6.1.34-lp153.2.27.2.x86_64", "openSUSE Leap 15.3:virtualbox-websrv-6.1.34-lp153.2.27.2.x86_64", ], }, references: [ { category: "external", summary: "CVE-2021-42375", url: "https://www.suse.com/security/cve/CVE-2021-42375", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Leap 15.3:busybox-1.34.1-4.9.1.aarch64", "openSUSE Leap 15.3:busybox-1.34.1-4.9.1.ppc64le", "openSUSE Leap 15.3:busybox-1.34.1-4.9.1.s390x", "openSUSE Leap 15.3:busybox-1.34.1-4.9.1.x86_64", "openSUSE Leap 15.3:busybox-static-1.34.1-4.9.1.aarch64", "openSUSE Leap 15.3:busybox-static-1.34.1-4.9.1.ppc64le", "openSUSE Leap 15.3:busybox-static-1.34.1-4.9.1.s390x", "openSUSE Leap 15.3:busybox-static-1.34.1-4.9.1.x86_64", "openSUSE Leap 15.3:python3-virtualbox-6.1.34-lp153.2.27.2.x86_64", "openSUSE Leap 15.3:virtualbox-6.1.34-lp153.2.27.2.x86_64", "openSUSE Leap 15.3:virtualbox-devel-6.1.34-lp153.2.27.2.x86_64", "openSUSE Leap 15.3:virtualbox-guest-desktop-icons-6.1.34-lp153.2.27.2.noarch", "openSUSE Leap 15.3:virtualbox-guest-source-6.1.34-lp153.2.27.2.noarch", "openSUSE Leap 15.3:virtualbox-guest-tools-6.1.34-lp153.2.27.2.x86_64", "openSUSE Leap 15.3:virtualbox-guest-x11-6.1.34-lp153.2.27.2.x86_64", "openSUSE Leap 15.3:virtualbox-host-source-6.1.34-lp153.2.27.2.noarch", "openSUSE Leap 15.3:virtualbox-kmp-default-6.1.34_k5.3.18_150300.59.63-lp153.2.27.1.x86_64", "openSUSE Leap 15.3:virtualbox-kmp-preempt-6.1.34_k5.3.18_150300.59.63-lp153.2.27.1.x86_64", "openSUSE Leap 15.3:virtualbox-qt-6.1.34-lp153.2.27.2.x86_64", "openSUSE Leap 15.3:virtualbox-vnc-6.1.34-lp153.2.27.2.x86_64", "openSUSE Leap 15.3:virtualbox-websrv-6.1.34-lp153.2.27.2.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 4.1, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "openSUSE Leap 15.3:busybox-1.34.1-4.9.1.aarch64", "openSUSE Leap 15.3:busybox-1.34.1-4.9.1.ppc64le", "openSUSE Leap 15.3:busybox-1.34.1-4.9.1.s390x", "openSUSE Leap 15.3:busybox-1.34.1-4.9.1.x86_64", "openSUSE Leap 15.3:busybox-static-1.34.1-4.9.1.aarch64", "openSUSE Leap 15.3:busybox-static-1.34.1-4.9.1.ppc64le", "openSUSE Leap 15.3:busybox-static-1.34.1-4.9.1.s390x", "openSUSE Leap 15.3:busybox-static-1.34.1-4.9.1.x86_64", "openSUSE Leap 15.3:python3-virtualbox-6.1.34-lp153.2.27.2.x86_64", "openSUSE Leap 15.3:virtualbox-6.1.34-lp153.2.27.2.x86_64", "openSUSE Leap 15.3:virtualbox-devel-6.1.34-lp153.2.27.2.x86_64", "openSUSE Leap 15.3:virtualbox-guest-desktop-icons-6.1.34-lp153.2.27.2.noarch", "openSUSE Leap 15.3:virtualbox-guest-source-6.1.34-lp153.2.27.2.noarch", "openSUSE Leap 15.3:virtualbox-guest-tools-6.1.34-lp153.2.27.2.x86_64", "openSUSE Leap 15.3:virtualbox-guest-x11-6.1.34-lp153.2.27.2.x86_64", "openSUSE Leap 15.3:virtualbox-host-source-6.1.34-lp153.2.27.2.noarch", "openSUSE Leap 15.3:virtualbox-kmp-default-6.1.34_k5.3.18_150300.59.63-lp153.2.27.1.x86_64", "openSUSE Leap 15.3:virtualbox-kmp-preempt-6.1.34_k5.3.18_150300.59.63-lp153.2.27.1.x86_64", "openSUSE Leap 15.3:virtualbox-qt-6.1.34-lp153.2.27.2.x86_64", "openSUSE Leap 15.3:virtualbox-vnc-6.1.34-lp153.2.27.2.x86_64", "openSUSE Leap 15.3:virtualbox-websrv-6.1.34-lp153.2.27.2.x86_64", ], }, ], threats: [ { category: "impact", date: "2022-01-20T09:04:27Z", details: "moderate", }, ], title: "CVE-2021-42375", }, { cve: "CVE-2021-42376", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2021-42376", }, ], notes: [ { category: "general", text: "A NULL pointer dereference in Busybox's hush applet leads to denial of service when processing a crafted shell command, due to missing validation after a \\x03 delimiter character. This may be used for DoS under very rare conditions of filtered command input.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Leap 15.3:busybox-1.34.1-4.9.1.aarch64", "openSUSE Leap 15.3:busybox-1.34.1-4.9.1.ppc64le", "openSUSE Leap 15.3:busybox-1.34.1-4.9.1.s390x", "openSUSE Leap 15.3:busybox-1.34.1-4.9.1.x86_64", "openSUSE Leap 15.3:busybox-static-1.34.1-4.9.1.aarch64", "openSUSE Leap 15.3:busybox-static-1.34.1-4.9.1.ppc64le", "openSUSE Leap 15.3:busybox-static-1.34.1-4.9.1.s390x", "openSUSE Leap 15.3:busybox-static-1.34.1-4.9.1.x86_64", "openSUSE Leap 15.3:python3-virtualbox-6.1.34-lp153.2.27.2.x86_64", "openSUSE Leap 15.3:virtualbox-6.1.34-lp153.2.27.2.x86_64", "openSUSE Leap 15.3:virtualbox-devel-6.1.34-lp153.2.27.2.x86_64", "openSUSE Leap 15.3:virtualbox-guest-desktop-icons-6.1.34-lp153.2.27.2.noarch", "openSUSE Leap 15.3:virtualbox-guest-source-6.1.34-lp153.2.27.2.noarch", "openSUSE Leap 15.3:virtualbox-guest-tools-6.1.34-lp153.2.27.2.x86_64", "openSUSE Leap 15.3:virtualbox-guest-x11-6.1.34-lp153.2.27.2.x86_64", "openSUSE Leap 15.3:virtualbox-host-source-6.1.34-lp153.2.27.2.noarch", "openSUSE Leap 15.3:virtualbox-kmp-default-6.1.34_k5.3.18_150300.59.63-lp153.2.27.1.x86_64", "openSUSE Leap 15.3:virtualbox-kmp-preempt-6.1.34_k5.3.18_150300.59.63-lp153.2.27.1.x86_64", "openSUSE Leap 15.3:virtualbox-qt-6.1.34-lp153.2.27.2.x86_64", "openSUSE Leap 15.3:virtualbox-vnc-6.1.34-lp153.2.27.2.x86_64", "openSUSE Leap 15.3:virtualbox-websrv-6.1.34-lp153.2.27.2.x86_64", ], }, references: [ { category: "external", summary: "CVE-2021-42376", url: "https://www.suse.com/security/cve/CVE-2021-42376", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Leap 15.3:busybox-1.34.1-4.9.1.aarch64", "openSUSE Leap 15.3:busybox-1.34.1-4.9.1.ppc64le", "openSUSE Leap 15.3:busybox-1.34.1-4.9.1.s390x", "openSUSE Leap 15.3:busybox-1.34.1-4.9.1.x86_64", "openSUSE Leap 15.3:busybox-static-1.34.1-4.9.1.aarch64", "openSUSE Leap 15.3:busybox-static-1.34.1-4.9.1.ppc64le", "openSUSE Leap 15.3:busybox-static-1.34.1-4.9.1.s390x", "openSUSE Leap 15.3:busybox-static-1.34.1-4.9.1.x86_64", "openSUSE Leap 15.3:python3-virtualbox-6.1.34-lp153.2.27.2.x86_64", "openSUSE Leap 15.3:virtualbox-6.1.34-lp153.2.27.2.x86_64", "openSUSE Leap 15.3:virtualbox-devel-6.1.34-lp153.2.27.2.x86_64", "openSUSE Leap 15.3:virtualbox-guest-desktop-icons-6.1.34-lp153.2.27.2.noarch", "openSUSE Leap 15.3:virtualbox-guest-source-6.1.34-lp153.2.27.2.noarch", "openSUSE Leap 15.3:virtualbox-guest-tools-6.1.34-lp153.2.27.2.x86_64", "openSUSE Leap 15.3:virtualbox-guest-x11-6.1.34-lp153.2.27.2.x86_64", "openSUSE Leap 15.3:virtualbox-host-source-6.1.34-lp153.2.27.2.noarch", "openSUSE Leap 15.3:virtualbox-kmp-default-6.1.34_k5.3.18_150300.59.63-lp153.2.27.1.x86_64", "openSUSE Leap 15.3:virtualbox-kmp-preempt-6.1.34_k5.3.18_150300.59.63-lp153.2.27.1.x86_64", "openSUSE Leap 15.3:virtualbox-qt-6.1.34-lp153.2.27.2.x86_64", "openSUSE Leap 15.3:virtualbox-vnc-6.1.34-lp153.2.27.2.x86_64", "openSUSE Leap 15.3:virtualbox-websrv-6.1.34-lp153.2.27.2.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 4.1, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "openSUSE Leap 15.3:busybox-1.34.1-4.9.1.aarch64", "openSUSE Leap 15.3:busybox-1.34.1-4.9.1.ppc64le", "openSUSE Leap 15.3:busybox-1.34.1-4.9.1.s390x", "openSUSE Leap 15.3:busybox-1.34.1-4.9.1.x86_64", "openSUSE Leap 15.3:busybox-static-1.34.1-4.9.1.aarch64", "openSUSE Leap 15.3:busybox-static-1.34.1-4.9.1.ppc64le", "openSUSE Leap 15.3:busybox-static-1.34.1-4.9.1.s390x", "openSUSE Leap 15.3:busybox-static-1.34.1-4.9.1.x86_64", "openSUSE Leap 15.3:python3-virtualbox-6.1.34-lp153.2.27.2.x86_64", "openSUSE Leap 15.3:virtualbox-6.1.34-lp153.2.27.2.x86_64", "openSUSE Leap 15.3:virtualbox-devel-6.1.34-lp153.2.27.2.x86_64", "openSUSE Leap 15.3:virtualbox-guest-desktop-icons-6.1.34-lp153.2.27.2.noarch", "openSUSE Leap 15.3:virtualbox-guest-source-6.1.34-lp153.2.27.2.noarch", "openSUSE Leap 15.3:virtualbox-guest-tools-6.1.34-lp153.2.27.2.x86_64", "openSUSE Leap 15.3:virtualbox-guest-x11-6.1.34-lp153.2.27.2.x86_64", "openSUSE Leap 15.3:virtualbox-host-source-6.1.34-lp153.2.27.2.noarch", "openSUSE Leap 15.3:virtualbox-kmp-default-6.1.34_k5.3.18_150300.59.63-lp153.2.27.1.x86_64", "openSUSE Leap 15.3:virtualbox-kmp-preempt-6.1.34_k5.3.18_150300.59.63-lp153.2.27.1.x86_64", "openSUSE Leap 15.3:virtualbox-qt-6.1.34-lp153.2.27.2.x86_64", "openSUSE Leap 15.3:virtualbox-vnc-6.1.34-lp153.2.27.2.x86_64", "openSUSE Leap 15.3:virtualbox-websrv-6.1.34-lp153.2.27.2.x86_64", ], }, ], threats: [ { category: "impact", date: "2022-01-20T09:04:27Z", details: "moderate", }, ], title: "CVE-2021-42376", }, { cve: "CVE-2021-42377", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2021-42377", }, ], notes: [ { category: "general", text: "An attacker-controlled pointer free in Busybox's hush applet leads to denial of service and possible code execution when processing a crafted shell command, due to the shell mishandling the &&& string. This may be used for remote code execution under rare conditions of filtered command input.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Leap 15.3:busybox-1.34.1-4.9.1.aarch64", "openSUSE Leap 15.3:busybox-1.34.1-4.9.1.ppc64le", "openSUSE Leap 15.3:busybox-1.34.1-4.9.1.s390x", "openSUSE Leap 15.3:busybox-1.34.1-4.9.1.x86_64", "openSUSE Leap 15.3:busybox-static-1.34.1-4.9.1.aarch64", "openSUSE Leap 15.3:busybox-static-1.34.1-4.9.1.ppc64le", "openSUSE Leap 15.3:busybox-static-1.34.1-4.9.1.s390x", "openSUSE Leap 15.3:busybox-static-1.34.1-4.9.1.x86_64", "openSUSE Leap 15.3:python3-virtualbox-6.1.34-lp153.2.27.2.x86_64", "openSUSE Leap 15.3:virtualbox-6.1.34-lp153.2.27.2.x86_64", "openSUSE Leap 15.3:virtualbox-devel-6.1.34-lp153.2.27.2.x86_64", "openSUSE Leap 15.3:virtualbox-guest-desktop-icons-6.1.34-lp153.2.27.2.noarch", "openSUSE Leap 15.3:virtualbox-guest-source-6.1.34-lp153.2.27.2.noarch", "openSUSE Leap 15.3:virtualbox-guest-tools-6.1.34-lp153.2.27.2.x86_64", "openSUSE Leap 15.3:virtualbox-guest-x11-6.1.34-lp153.2.27.2.x86_64", "openSUSE Leap 15.3:virtualbox-host-source-6.1.34-lp153.2.27.2.noarch", "openSUSE Leap 15.3:virtualbox-kmp-default-6.1.34_k5.3.18_150300.59.63-lp153.2.27.1.x86_64", "openSUSE Leap 15.3:virtualbox-kmp-preempt-6.1.34_k5.3.18_150300.59.63-lp153.2.27.1.x86_64", "openSUSE Leap 15.3:virtualbox-qt-6.1.34-lp153.2.27.2.x86_64", "openSUSE Leap 15.3:virtualbox-vnc-6.1.34-lp153.2.27.2.x86_64", "openSUSE Leap 15.3:virtualbox-websrv-6.1.34-lp153.2.27.2.x86_64", ], }, references: [ { category: "external", summary: "CVE-2021-42377", url: "https://www.suse.com/security/cve/CVE-2021-42377", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Leap 15.3:busybox-1.34.1-4.9.1.aarch64", "openSUSE Leap 15.3:busybox-1.34.1-4.9.1.ppc64le", "openSUSE Leap 15.3:busybox-1.34.1-4.9.1.s390x", "openSUSE Leap 15.3:busybox-1.34.1-4.9.1.x86_64", "openSUSE Leap 15.3:busybox-static-1.34.1-4.9.1.aarch64", "openSUSE Leap 15.3:busybox-static-1.34.1-4.9.1.ppc64le", "openSUSE Leap 15.3:busybox-static-1.34.1-4.9.1.s390x", "openSUSE Leap 15.3:busybox-static-1.34.1-4.9.1.x86_64", "openSUSE Leap 15.3:python3-virtualbox-6.1.34-lp153.2.27.2.x86_64", "openSUSE Leap 15.3:virtualbox-6.1.34-lp153.2.27.2.x86_64", "openSUSE Leap 15.3:virtualbox-devel-6.1.34-lp153.2.27.2.x86_64", "openSUSE Leap 15.3:virtualbox-guest-desktop-icons-6.1.34-lp153.2.27.2.noarch", "openSUSE Leap 15.3:virtualbox-guest-source-6.1.34-lp153.2.27.2.noarch", "openSUSE Leap 15.3:virtualbox-guest-tools-6.1.34-lp153.2.27.2.x86_64", "openSUSE Leap 15.3:virtualbox-guest-x11-6.1.34-lp153.2.27.2.x86_64", "openSUSE Leap 15.3:virtualbox-host-source-6.1.34-lp153.2.27.2.noarch", "openSUSE Leap 15.3:virtualbox-kmp-default-6.1.34_k5.3.18_150300.59.63-lp153.2.27.1.x86_64", "openSUSE Leap 15.3:virtualbox-kmp-preempt-6.1.34_k5.3.18_150300.59.63-lp153.2.27.1.x86_64", "openSUSE Leap 15.3:virtualbox-qt-6.1.34-lp153.2.27.2.x86_64", "openSUSE Leap 15.3:virtualbox-vnc-6.1.34-lp153.2.27.2.x86_64", "openSUSE Leap 15.3:virtualbox-websrv-6.1.34-lp153.2.27.2.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 6.4, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, products: [ "openSUSE Leap 15.3:busybox-1.34.1-4.9.1.aarch64", "openSUSE Leap 15.3:busybox-1.34.1-4.9.1.ppc64le", "openSUSE Leap 15.3:busybox-1.34.1-4.9.1.s390x", "openSUSE Leap 15.3:busybox-1.34.1-4.9.1.x86_64", "openSUSE Leap 15.3:busybox-static-1.34.1-4.9.1.aarch64", "openSUSE Leap 15.3:busybox-static-1.34.1-4.9.1.ppc64le", "openSUSE Leap 15.3:busybox-static-1.34.1-4.9.1.s390x", "openSUSE Leap 15.3:busybox-static-1.34.1-4.9.1.x86_64", "openSUSE Leap 15.3:python3-virtualbox-6.1.34-lp153.2.27.2.x86_64", "openSUSE Leap 15.3:virtualbox-6.1.34-lp153.2.27.2.x86_64", "openSUSE Leap 15.3:virtualbox-devel-6.1.34-lp153.2.27.2.x86_64", "openSUSE Leap 15.3:virtualbox-guest-desktop-icons-6.1.34-lp153.2.27.2.noarch", "openSUSE Leap 15.3:virtualbox-guest-source-6.1.34-lp153.2.27.2.noarch", "openSUSE Leap 15.3:virtualbox-guest-tools-6.1.34-lp153.2.27.2.x86_64", "openSUSE Leap 15.3:virtualbox-guest-x11-6.1.34-lp153.2.27.2.x86_64", "openSUSE Leap 15.3:virtualbox-host-source-6.1.34-lp153.2.27.2.noarch", "openSUSE Leap 15.3:virtualbox-kmp-default-6.1.34_k5.3.18_150300.59.63-lp153.2.27.1.x86_64", "openSUSE Leap 15.3:virtualbox-kmp-preempt-6.1.34_k5.3.18_150300.59.63-lp153.2.27.1.x86_64", "openSUSE Leap 15.3:virtualbox-qt-6.1.34-lp153.2.27.2.x86_64", "openSUSE Leap 15.3:virtualbox-vnc-6.1.34-lp153.2.27.2.x86_64", "openSUSE Leap 15.3:virtualbox-websrv-6.1.34-lp153.2.27.2.x86_64", ], }, ], threats: [ { category: "impact", date: "2022-01-20T09:04:27Z", details: "moderate", }, ], title: "CVE-2021-42377", }, { cve: "CVE-2021-42378", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2021-42378", }, ], notes: [ { category: "general", text: "A use-after-free in Busybox's awk applet leads to denial of service and possibly code execution when processing a crafted awk pattern in the getvar_i function", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Leap 15.3:busybox-1.34.1-4.9.1.aarch64", "openSUSE Leap 15.3:busybox-1.34.1-4.9.1.ppc64le", "openSUSE Leap 15.3:busybox-1.34.1-4.9.1.s390x", "openSUSE Leap 15.3:busybox-1.34.1-4.9.1.x86_64", "openSUSE Leap 15.3:busybox-static-1.34.1-4.9.1.aarch64", "openSUSE Leap 15.3:busybox-static-1.34.1-4.9.1.ppc64le", "openSUSE Leap 15.3:busybox-static-1.34.1-4.9.1.s390x", "openSUSE Leap 15.3:busybox-static-1.34.1-4.9.1.x86_64", "openSUSE Leap 15.3:python3-virtualbox-6.1.34-lp153.2.27.2.x86_64", "openSUSE Leap 15.3:virtualbox-6.1.34-lp153.2.27.2.x86_64", "openSUSE Leap 15.3:virtualbox-devel-6.1.34-lp153.2.27.2.x86_64", "openSUSE Leap 15.3:virtualbox-guest-desktop-icons-6.1.34-lp153.2.27.2.noarch", "openSUSE Leap 15.3:virtualbox-guest-source-6.1.34-lp153.2.27.2.noarch", "openSUSE Leap 15.3:virtualbox-guest-tools-6.1.34-lp153.2.27.2.x86_64", "openSUSE Leap 15.3:virtualbox-guest-x11-6.1.34-lp153.2.27.2.x86_64", "openSUSE Leap 15.3:virtualbox-host-source-6.1.34-lp153.2.27.2.noarch", "openSUSE Leap 15.3:virtualbox-kmp-default-6.1.34_k5.3.18_150300.59.63-lp153.2.27.1.x86_64", "openSUSE Leap 15.3:virtualbox-kmp-preempt-6.1.34_k5.3.18_150300.59.63-lp153.2.27.1.x86_64", "openSUSE Leap 15.3:virtualbox-qt-6.1.34-lp153.2.27.2.x86_64", "openSUSE Leap 15.3:virtualbox-vnc-6.1.34-lp153.2.27.2.x86_64", "openSUSE Leap 15.3:virtualbox-websrv-6.1.34-lp153.2.27.2.x86_64", ], }, references: [ { category: "external", summary: "CVE-2021-42378", url: "https://www.suse.com/security/cve/CVE-2021-42378", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Leap 15.3:busybox-1.34.1-4.9.1.aarch64", "openSUSE Leap 15.3:busybox-1.34.1-4.9.1.ppc64le", "openSUSE Leap 15.3:busybox-1.34.1-4.9.1.s390x", "openSUSE Leap 15.3:busybox-1.34.1-4.9.1.x86_64", "openSUSE Leap 15.3:busybox-static-1.34.1-4.9.1.aarch64", "openSUSE Leap 15.3:busybox-static-1.34.1-4.9.1.ppc64le", "openSUSE Leap 15.3:busybox-static-1.34.1-4.9.1.s390x", "openSUSE Leap 15.3:busybox-static-1.34.1-4.9.1.x86_64", "openSUSE Leap 15.3:python3-virtualbox-6.1.34-lp153.2.27.2.x86_64", "openSUSE Leap 15.3:virtualbox-6.1.34-lp153.2.27.2.x86_64", "openSUSE Leap 15.3:virtualbox-devel-6.1.34-lp153.2.27.2.x86_64", "openSUSE Leap 15.3:virtualbox-guest-desktop-icons-6.1.34-lp153.2.27.2.noarch", "openSUSE Leap 15.3:virtualbox-guest-source-6.1.34-lp153.2.27.2.noarch", "openSUSE Leap 15.3:virtualbox-guest-tools-6.1.34-lp153.2.27.2.x86_64", "openSUSE Leap 15.3:virtualbox-guest-x11-6.1.34-lp153.2.27.2.x86_64", "openSUSE Leap 15.3:virtualbox-host-source-6.1.34-lp153.2.27.2.noarch", "openSUSE Leap 15.3:virtualbox-kmp-default-6.1.34_k5.3.18_150300.59.63-lp153.2.27.1.x86_64", "openSUSE Leap 15.3:virtualbox-kmp-preempt-6.1.34_k5.3.18_150300.59.63-lp153.2.27.1.x86_64", "openSUSE Leap 15.3:virtualbox-qt-6.1.34-lp153.2.27.2.x86_64", "openSUSE Leap 15.3:virtualbox-vnc-6.1.34-lp153.2.27.2.x86_64", "openSUSE Leap 15.3:virtualbox-websrv-6.1.34-lp153.2.27.2.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 6.6, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, products: [ "openSUSE Leap 15.3:busybox-1.34.1-4.9.1.aarch64", "openSUSE Leap 15.3:busybox-1.34.1-4.9.1.ppc64le", "openSUSE Leap 15.3:busybox-1.34.1-4.9.1.s390x", "openSUSE Leap 15.3:busybox-1.34.1-4.9.1.x86_64", "openSUSE Leap 15.3:busybox-static-1.34.1-4.9.1.aarch64", "openSUSE Leap 15.3:busybox-static-1.34.1-4.9.1.ppc64le", "openSUSE Leap 15.3:busybox-static-1.34.1-4.9.1.s390x", "openSUSE Leap 15.3:busybox-static-1.34.1-4.9.1.x86_64", "openSUSE Leap 15.3:python3-virtualbox-6.1.34-lp153.2.27.2.x86_64", "openSUSE Leap 15.3:virtualbox-6.1.34-lp153.2.27.2.x86_64", "openSUSE Leap 15.3:virtualbox-devel-6.1.34-lp153.2.27.2.x86_64", "openSUSE Leap 15.3:virtualbox-guest-desktop-icons-6.1.34-lp153.2.27.2.noarch", "openSUSE Leap 15.3:virtualbox-guest-source-6.1.34-lp153.2.27.2.noarch", "openSUSE Leap 15.3:virtualbox-guest-tools-6.1.34-lp153.2.27.2.x86_64", "openSUSE Leap 15.3:virtualbox-guest-x11-6.1.34-lp153.2.27.2.x86_64", "openSUSE Leap 15.3:virtualbox-host-source-6.1.34-lp153.2.27.2.noarch", "openSUSE Leap 15.3:virtualbox-kmp-default-6.1.34_k5.3.18_150300.59.63-lp153.2.27.1.x86_64", "openSUSE Leap 15.3:virtualbox-kmp-preempt-6.1.34_k5.3.18_150300.59.63-lp153.2.27.1.x86_64", "openSUSE Leap 15.3:virtualbox-qt-6.1.34-lp153.2.27.2.x86_64", "openSUSE Leap 15.3:virtualbox-vnc-6.1.34-lp153.2.27.2.x86_64", "openSUSE Leap 15.3:virtualbox-websrv-6.1.34-lp153.2.27.2.x86_64", ], }, ], threats: [ { category: "impact", date: "2022-01-20T09:04:27Z", details: "moderate", }, ], title: "CVE-2021-42378", }, { cve: "CVE-2021-42379", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2021-42379", }, ], notes: [ { category: "general", text: "A use-after-free in Busybox's awk applet leads to denial of service and possibly code execution when processing a crafted awk pattern in the next_input_file function", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Leap 15.3:busybox-1.34.1-4.9.1.aarch64", "openSUSE Leap 15.3:busybox-1.34.1-4.9.1.ppc64le", "openSUSE Leap 15.3:busybox-1.34.1-4.9.1.s390x", "openSUSE Leap 15.3:busybox-1.34.1-4.9.1.x86_64", "openSUSE Leap 15.3:busybox-static-1.34.1-4.9.1.aarch64", "openSUSE Leap 15.3:busybox-static-1.34.1-4.9.1.ppc64le", "openSUSE Leap 15.3:busybox-static-1.34.1-4.9.1.s390x", "openSUSE Leap 15.3:busybox-static-1.34.1-4.9.1.x86_64", "openSUSE Leap 15.3:python3-virtualbox-6.1.34-lp153.2.27.2.x86_64", "openSUSE Leap 15.3:virtualbox-6.1.34-lp153.2.27.2.x86_64", "openSUSE Leap 15.3:virtualbox-devel-6.1.34-lp153.2.27.2.x86_64", "openSUSE Leap 15.3:virtualbox-guest-desktop-icons-6.1.34-lp153.2.27.2.noarch", "openSUSE Leap 15.3:virtualbox-guest-source-6.1.34-lp153.2.27.2.noarch", "openSUSE Leap 15.3:virtualbox-guest-tools-6.1.34-lp153.2.27.2.x86_64", "openSUSE Leap 15.3:virtualbox-guest-x11-6.1.34-lp153.2.27.2.x86_64", "openSUSE Leap 15.3:virtualbox-host-source-6.1.34-lp153.2.27.2.noarch", "openSUSE Leap 15.3:virtualbox-kmp-default-6.1.34_k5.3.18_150300.59.63-lp153.2.27.1.x86_64", "openSUSE Leap 15.3:virtualbox-kmp-preempt-6.1.34_k5.3.18_150300.59.63-lp153.2.27.1.x86_64", "openSUSE Leap 15.3:virtualbox-qt-6.1.34-lp153.2.27.2.x86_64", "openSUSE Leap 15.3:virtualbox-vnc-6.1.34-lp153.2.27.2.x86_64", "openSUSE Leap 15.3:virtualbox-websrv-6.1.34-lp153.2.27.2.x86_64", ], }, references: [ { category: "external", summary: "CVE-2021-42379", url: "https://www.suse.com/security/cve/CVE-2021-42379", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Leap 15.3:busybox-1.34.1-4.9.1.aarch64", "openSUSE Leap 15.3:busybox-1.34.1-4.9.1.ppc64le", "openSUSE Leap 15.3:busybox-1.34.1-4.9.1.s390x", "openSUSE Leap 15.3:busybox-1.34.1-4.9.1.x86_64", "openSUSE Leap 15.3:busybox-static-1.34.1-4.9.1.aarch64", "openSUSE Leap 15.3:busybox-static-1.34.1-4.9.1.ppc64le", "openSUSE Leap 15.3:busybox-static-1.34.1-4.9.1.s390x", "openSUSE Leap 15.3:busybox-static-1.34.1-4.9.1.x86_64", "openSUSE Leap 15.3:python3-virtualbox-6.1.34-lp153.2.27.2.x86_64", "openSUSE Leap 15.3:virtualbox-6.1.34-lp153.2.27.2.x86_64", "openSUSE Leap 15.3:virtualbox-devel-6.1.34-lp153.2.27.2.x86_64", "openSUSE Leap 15.3:virtualbox-guest-desktop-icons-6.1.34-lp153.2.27.2.noarch", "openSUSE Leap 15.3:virtualbox-guest-source-6.1.34-lp153.2.27.2.noarch", "openSUSE Leap 15.3:virtualbox-guest-tools-6.1.34-lp153.2.27.2.x86_64", "openSUSE Leap 15.3:virtualbox-guest-x11-6.1.34-lp153.2.27.2.x86_64", "openSUSE Leap 15.3:virtualbox-host-source-6.1.34-lp153.2.27.2.noarch", "openSUSE Leap 15.3:virtualbox-kmp-default-6.1.34_k5.3.18_150300.59.63-lp153.2.27.1.x86_64", "openSUSE Leap 15.3:virtualbox-kmp-preempt-6.1.34_k5.3.18_150300.59.63-lp153.2.27.1.x86_64", "openSUSE Leap 15.3:virtualbox-qt-6.1.34-lp153.2.27.2.x86_64", "openSUSE Leap 15.3:virtualbox-vnc-6.1.34-lp153.2.27.2.x86_64", "openSUSE Leap 15.3:virtualbox-websrv-6.1.34-lp153.2.27.2.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 6.6, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, products: [ "openSUSE Leap 15.3:busybox-1.34.1-4.9.1.aarch64", "openSUSE Leap 15.3:busybox-1.34.1-4.9.1.ppc64le", "openSUSE Leap 15.3:busybox-1.34.1-4.9.1.s390x", "openSUSE Leap 15.3:busybox-1.34.1-4.9.1.x86_64", "openSUSE Leap 15.3:busybox-static-1.34.1-4.9.1.aarch64", "openSUSE Leap 15.3:busybox-static-1.34.1-4.9.1.ppc64le", "openSUSE Leap 15.3:busybox-static-1.34.1-4.9.1.s390x", "openSUSE Leap 15.3:busybox-static-1.34.1-4.9.1.x86_64", "openSUSE Leap 15.3:python3-virtualbox-6.1.34-lp153.2.27.2.x86_64", "openSUSE Leap 15.3:virtualbox-6.1.34-lp153.2.27.2.x86_64", "openSUSE Leap 15.3:virtualbox-devel-6.1.34-lp153.2.27.2.x86_64", "openSUSE Leap 15.3:virtualbox-guest-desktop-icons-6.1.34-lp153.2.27.2.noarch", "openSUSE Leap 15.3:virtualbox-guest-source-6.1.34-lp153.2.27.2.noarch", "openSUSE Leap 15.3:virtualbox-guest-tools-6.1.34-lp153.2.27.2.x86_64", "openSUSE Leap 15.3:virtualbox-guest-x11-6.1.34-lp153.2.27.2.x86_64", "openSUSE Leap 15.3:virtualbox-host-source-6.1.34-lp153.2.27.2.noarch", "openSUSE Leap 15.3:virtualbox-kmp-default-6.1.34_k5.3.18_150300.59.63-lp153.2.27.1.x86_64", "openSUSE Leap 15.3:virtualbox-kmp-preempt-6.1.34_k5.3.18_150300.59.63-lp153.2.27.1.x86_64", "openSUSE Leap 15.3:virtualbox-qt-6.1.34-lp153.2.27.2.x86_64", "openSUSE Leap 15.3:virtualbox-vnc-6.1.34-lp153.2.27.2.x86_64", "openSUSE Leap 15.3:virtualbox-websrv-6.1.34-lp153.2.27.2.x86_64", ], }, ], threats: [ { category: "impact", date: "2022-01-20T09:04:27Z", details: "moderate", }, ], title: "CVE-2021-42379", }, { cve: "CVE-2021-42380", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2021-42380", }, ], notes: [ { category: "general", text: "A use-after-free in Busybox's awk applet leads to denial of service and possibly code execution when processing a crafted awk pattern in the clrvar function", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Leap 15.3:busybox-1.34.1-4.9.1.aarch64", "openSUSE Leap 15.3:busybox-1.34.1-4.9.1.ppc64le", "openSUSE Leap 15.3:busybox-1.34.1-4.9.1.s390x", "openSUSE Leap 15.3:busybox-1.34.1-4.9.1.x86_64", "openSUSE Leap 15.3:busybox-static-1.34.1-4.9.1.aarch64", "openSUSE Leap 15.3:busybox-static-1.34.1-4.9.1.ppc64le", "openSUSE Leap 15.3:busybox-static-1.34.1-4.9.1.s390x", "openSUSE Leap 15.3:busybox-static-1.34.1-4.9.1.x86_64", "openSUSE Leap 15.3:python3-virtualbox-6.1.34-lp153.2.27.2.x86_64", "openSUSE Leap 15.3:virtualbox-6.1.34-lp153.2.27.2.x86_64", "openSUSE Leap 15.3:virtualbox-devel-6.1.34-lp153.2.27.2.x86_64", "openSUSE Leap 15.3:virtualbox-guest-desktop-icons-6.1.34-lp153.2.27.2.noarch", "openSUSE Leap 15.3:virtualbox-guest-source-6.1.34-lp153.2.27.2.noarch", "openSUSE Leap 15.3:virtualbox-guest-tools-6.1.34-lp153.2.27.2.x86_64", "openSUSE Leap 15.3:virtualbox-guest-x11-6.1.34-lp153.2.27.2.x86_64", "openSUSE Leap 15.3:virtualbox-host-source-6.1.34-lp153.2.27.2.noarch", "openSUSE Leap 15.3:virtualbox-kmp-default-6.1.34_k5.3.18_150300.59.63-lp153.2.27.1.x86_64", "openSUSE Leap 15.3:virtualbox-kmp-preempt-6.1.34_k5.3.18_150300.59.63-lp153.2.27.1.x86_64", "openSUSE Leap 15.3:virtualbox-qt-6.1.34-lp153.2.27.2.x86_64", "openSUSE Leap 15.3:virtualbox-vnc-6.1.34-lp153.2.27.2.x86_64", "openSUSE Leap 15.3:virtualbox-websrv-6.1.34-lp153.2.27.2.x86_64", ], }, references: [ { category: "external", summary: "CVE-2021-42380", url: "https://www.suse.com/security/cve/CVE-2021-42380", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Leap 15.3:busybox-1.34.1-4.9.1.aarch64", "openSUSE Leap 15.3:busybox-1.34.1-4.9.1.ppc64le", "openSUSE Leap 15.3:busybox-1.34.1-4.9.1.s390x", "openSUSE Leap 15.3:busybox-1.34.1-4.9.1.x86_64", "openSUSE Leap 15.3:busybox-static-1.34.1-4.9.1.aarch64", "openSUSE Leap 15.3:busybox-static-1.34.1-4.9.1.ppc64le", "openSUSE Leap 15.3:busybox-static-1.34.1-4.9.1.s390x", "openSUSE Leap 15.3:busybox-static-1.34.1-4.9.1.x86_64", "openSUSE Leap 15.3:python3-virtualbox-6.1.34-lp153.2.27.2.x86_64", "openSUSE Leap 15.3:virtualbox-6.1.34-lp153.2.27.2.x86_64", "openSUSE Leap 15.3:virtualbox-devel-6.1.34-lp153.2.27.2.x86_64", "openSUSE Leap 15.3:virtualbox-guest-desktop-icons-6.1.34-lp153.2.27.2.noarch", "openSUSE Leap 15.3:virtualbox-guest-source-6.1.34-lp153.2.27.2.noarch", "openSUSE Leap 15.3:virtualbox-guest-tools-6.1.34-lp153.2.27.2.x86_64", "openSUSE Leap 15.3:virtualbox-guest-x11-6.1.34-lp153.2.27.2.x86_64", "openSUSE Leap 15.3:virtualbox-host-source-6.1.34-lp153.2.27.2.noarch", "openSUSE Leap 15.3:virtualbox-kmp-default-6.1.34_k5.3.18_150300.59.63-lp153.2.27.1.x86_64", "openSUSE Leap 15.3:virtualbox-kmp-preempt-6.1.34_k5.3.18_150300.59.63-lp153.2.27.1.x86_64", "openSUSE Leap 15.3:virtualbox-qt-6.1.34-lp153.2.27.2.x86_64", "openSUSE Leap 15.3:virtualbox-vnc-6.1.34-lp153.2.27.2.x86_64", "openSUSE Leap 15.3:virtualbox-websrv-6.1.34-lp153.2.27.2.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 6.6, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, products: [ "openSUSE Leap 15.3:busybox-1.34.1-4.9.1.aarch64", "openSUSE Leap 15.3:busybox-1.34.1-4.9.1.ppc64le", "openSUSE Leap 15.3:busybox-1.34.1-4.9.1.s390x", "openSUSE Leap 15.3:busybox-1.34.1-4.9.1.x86_64", "openSUSE Leap 15.3:busybox-static-1.34.1-4.9.1.aarch64", "openSUSE Leap 15.3:busybox-static-1.34.1-4.9.1.ppc64le", "openSUSE Leap 15.3:busybox-static-1.34.1-4.9.1.s390x", "openSUSE Leap 15.3:busybox-static-1.34.1-4.9.1.x86_64", "openSUSE Leap 15.3:python3-virtualbox-6.1.34-lp153.2.27.2.x86_64", "openSUSE Leap 15.3:virtualbox-6.1.34-lp153.2.27.2.x86_64", "openSUSE Leap 15.3:virtualbox-devel-6.1.34-lp153.2.27.2.x86_64", "openSUSE Leap 15.3:virtualbox-guest-desktop-icons-6.1.34-lp153.2.27.2.noarch", "openSUSE Leap 15.3:virtualbox-guest-source-6.1.34-lp153.2.27.2.noarch", "openSUSE Leap 15.3:virtualbox-guest-tools-6.1.34-lp153.2.27.2.x86_64", "openSUSE Leap 15.3:virtualbox-guest-x11-6.1.34-lp153.2.27.2.x86_64", "openSUSE Leap 15.3:virtualbox-host-source-6.1.34-lp153.2.27.2.noarch", "openSUSE Leap 15.3:virtualbox-kmp-default-6.1.34_k5.3.18_150300.59.63-lp153.2.27.1.x86_64", "openSUSE Leap 15.3:virtualbox-kmp-preempt-6.1.34_k5.3.18_150300.59.63-lp153.2.27.1.x86_64", "openSUSE Leap 15.3:virtualbox-qt-6.1.34-lp153.2.27.2.x86_64", "openSUSE Leap 15.3:virtualbox-vnc-6.1.34-lp153.2.27.2.x86_64", "openSUSE Leap 15.3:virtualbox-websrv-6.1.34-lp153.2.27.2.x86_64", ], }, ], threats: [ { category: "impact", date: "2022-01-20T09:04:27Z", details: "moderate", }, ], title: "CVE-2021-42380", }, { cve: "CVE-2021-42381", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2021-42381", }, ], notes: [ { category: "general", text: "A use-after-free in Busybox's awk applet leads to denial of service and possibly code execution when processing a crafted awk pattern in the hash_init function", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Leap 15.3:busybox-1.34.1-4.9.1.aarch64", "openSUSE Leap 15.3:busybox-1.34.1-4.9.1.ppc64le", "openSUSE Leap 15.3:busybox-1.34.1-4.9.1.s390x", "openSUSE Leap 15.3:busybox-1.34.1-4.9.1.x86_64", "openSUSE Leap 15.3:busybox-static-1.34.1-4.9.1.aarch64", "openSUSE Leap 15.3:busybox-static-1.34.1-4.9.1.ppc64le", "openSUSE Leap 15.3:busybox-static-1.34.1-4.9.1.s390x", "openSUSE Leap 15.3:busybox-static-1.34.1-4.9.1.x86_64", "openSUSE Leap 15.3:python3-virtualbox-6.1.34-lp153.2.27.2.x86_64", "openSUSE Leap 15.3:virtualbox-6.1.34-lp153.2.27.2.x86_64", "openSUSE Leap 15.3:virtualbox-devel-6.1.34-lp153.2.27.2.x86_64", "openSUSE Leap 15.3:virtualbox-guest-desktop-icons-6.1.34-lp153.2.27.2.noarch", "openSUSE Leap 15.3:virtualbox-guest-source-6.1.34-lp153.2.27.2.noarch", "openSUSE Leap 15.3:virtualbox-guest-tools-6.1.34-lp153.2.27.2.x86_64", "openSUSE Leap 15.3:virtualbox-guest-x11-6.1.34-lp153.2.27.2.x86_64", "openSUSE Leap 15.3:virtualbox-host-source-6.1.34-lp153.2.27.2.noarch", "openSUSE Leap 15.3:virtualbox-kmp-default-6.1.34_k5.3.18_150300.59.63-lp153.2.27.1.x86_64", "openSUSE Leap 15.3:virtualbox-kmp-preempt-6.1.34_k5.3.18_150300.59.63-lp153.2.27.1.x86_64", "openSUSE Leap 15.3:virtualbox-qt-6.1.34-lp153.2.27.2.x86_64", "openSUSE Leap 15.3:virtualbox-vnc-6.1.34-lp153.2.27.2.x86_64", "openSUSE Leap 15.3:virtualbox-websrv-6.1.34-lp153.2.27.2.x86_64", ], }, references: [ { category: "external", summary: "CVE-2021-42381", url: "https://www.suse.com/security/cve/CVE-2021-42381", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Leap 15.3:busybox-1.34.1-4.9.1.aarch64", "openSUSE Leap 15.3:busybox-1.34.1-4.9.1.ppc64le", "openSUSE Leap 15.3:busybox-1.34.1-4.9.1.s390x", "openSUSE Leap 15.3:busybox-1.34.1-4.9.1.x86_64", "openSUSE Leap 15.3:busybox-static-1.34.1-4.9.1.aarch64", "openSUSE Leap 15.3:busybox-static-1.34.1-4.9.1.ppc64le", "openSUSE Leap 15.3:busybox-static-1.34.1-4.9.1.s390x", "openSUSE Leap 15.3:busybox-static-1.34.1-4.9.1.x86_64", "openSUSE Leap 15.3:python3-virtualbox-6.1.34-lp153.2.27.2.x86_64", "openSUSE Leap 15.3:virtualbox-6.1.34-lp153.2.27.2.x86_64", "openSUSE Leap 15.3:virtualbox-devel-6.1.34-lp153.2.27.2.x86_64", "openSUSE Leap 15.3:virtualbox-guest-desktop-icons-6.1.34-lp153.2.27.2.noarch", "openSUSE Leap 15.3:virtualbox-guest-source-6.1.34-lp153.2.27.2.noarch", "openSUSE Leap 15.3:virtualbox-guest-tools-6.1.34-lp153.2.27.2.x86_64", "openSUSE Leap 15.3:virtualbox-guest-x11-6.1.34-lp153.2.27.2.x86_64", "openSUSE Leap 15.3:virtualbox-host-source-6.1.34-lp153.2.27.2.noarch", "openSUSE Leap 15.3:virtualbox-kmp-default-6.1.34_k5.3.18_150300.59.63-lp153.2.27.1.x86_64", "openSUSE Leap 15.3:virtualbox-kmp-preempt-6.1.34_k5.3.18_150300.59.63-lp153.2.27.1.x86_64", "openSUSE Leap 15.3:virtualbox-qt-6.1.34-lp153.2.27.2.x86_64", "openSUSE Leap 15.3:virtualbox-vnc-6.1.34-lp153.2.27.2.x86_64", "openSUSE Leap 15.3:virtualbox-websrv-6.1.34-lp153.2.27.2.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 6.6, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, products: [ "openSUSE Leap 15.3:busybox-1.34.1-4.9.1.aarch64", "openSUSE Leap 15.3:busybox-1.34.1-4.9.1.ppc64le", "openSUSE Leap 15.3:busybox-1.34.1-4.9.1.s390x", "openSUSE Leap 15.3:busybox-1.34.1-4.9.1.x86_64", "openSUSE Leap 15.3:busybox-static-1.34.1-4.9.1.aarch64", "openSUSE Leap 15.3:busybox-static-1.34.1-4.9.1.ppc64le", "openSUSE Leap 15.3:busybox-static-1.34.1-4.9.1.s390x", "openSUSE Leap 15.3:busybox-static-1.34.1-4.9.1.x86_64", "openSUSE Leap 15.3:python3-virtualbox-6.1.34-lp153.2.27.2.x86_64", "openSUSE Leap 15.3:virtualbox-6.1.34-lp153.2.27.2.x86_64", "openSUSE Leap 15.3:virtualbox-devel-6.1.34-lp153.2.27.2.x86_64", "openSUSE Leap 15.3:virtualbox-guest-desktop-icons-6.1.34-lp153.2.27.2.noarch", "openSUSE Leap 15.3:virtualbox-guest-source-6.1.34-lp153.2.27.2.noarch", "openSUSE Leap 15.3:virtualbox-guest-tools-6.1.34-lp153.2.27.2.x86_64", "openSUSE Leap 15.3:virtualbox-guest-x11-6.1.34-lp153.2.27.2.x86_64", "openSUSE Leap 15.3:virtualbox-host-source-6.1.34-lp153.2.27.2.noarch", "openSUSE Leap 15.3:virtualbox-kmp-default-6.1.34_k5.3.18_150300.59.63-lp153.2.27.1.x86_64", "openSUSE Leap 15.3:virtualbox-kmp-preempt-6.1.34_k5.3.18_150300.59.63-lp153.2.27.1.x86_64", "openSUSE Leap 15.3:virtualbox-qt-6.1.34-lp153.2.27.2.x86_64", "openSUSE Leap 15.3:virtualbox-vnc-6.1.34-lp153.2.27.2.x86_64", "openSUSE Leap 15.3:virtualbox-websrv-6.1.34-lp153.2.27.2.x86_64", ], }, ], threats: [ { category: "impact", date: "2022-01-20T09:04:27Z", details: "moderate", }, ], title: "CVE-2021-42381", }, { cve: "CVE-2021-42382", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2021-42382", }, ], notes: [ { category: "general", text: "A use-after-free in Busybox's awk applet leads to denial of service and possibly code execution when processing a crafted awk pattern in the getvar_s function", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Leap 15.3:busybox-1.34.1-4.9.1.aarch64", "openSUSE Leap 15.3:busybox-1.34.1-4.9.1.ppc64le", "openSUSE Leap 15.3:busybox-1.34.1-4.9.1.s390x", "openSUSE Leap 15.3:busybox-1.34.1-4.9.1.x86_64", "openSUSE Leap 15.3:busybox-static-1.34.1-4.9.1.aarch64", "openSUSE Leap 15.3:busybox-static-1.34.1-4.9.1.ppc64le", "openSUSE Leap 15.3:busybox-static-1.34.1-4.9.1.s390x", "openSUSE Leap 15.3:busybox-static-1.34.1-4.9.1.x86_64", "openSUSE Leap 15.3:python3-virtualbox-6.1.34-lp153.2.27.2.x86_64", "openSUSE Leap 15.3:virtualbox-6.1.34-lp153.2.27.2.x86_64", "openSUSE Leap 15.3:virtualbox-devel-6.1.34-lp153.2.27.2.x86_64", "openSUSE Leap 15.3:virtualbox-guest-desktop-icons-6.1.34-lp153.2.27.2.noarch", "openSUSE Leap 15.3:virtualbox-guest-source-6.1.34-lp153.2.27.2.noarch", "openSUSE Leap 15.3:virtualbox-guest-tools-6.1.34-lp153.2.27.2.x86_64", "openSUSE Leap 15.3:virtualbox-guest-x11-6.1.34-lp153.2.27.2.x86_64", "openSUSE Leap 15.3:virtualbox-host-source-6.1.34-lp153.2.27.2.noarch", "openSUSE Leap 15.3:virtualbox-kmp-default-6.1.34_k5.3.18_150300.59.63-lp153.2.27.1.x86_64", "openSUSE Leap 15.3:virtualbox-kmp-preempt-6.1.34_k5.3.18_150300.59.63-lp153.2.27.1.x86_64", "openSUSE Leap 15.3:virtualbox-qt-6.1.34-lp153.2.27.2.x86_64", "openSUSE Leap 15.3:virtualbox-vnc-6.1.34-lp153.2.27.2.x86_64", "openSUSE Leap 15.3:virtualbox-websrv-6.1.34-lp153.2.27.2.x86_64", ], }, references: [ { category: "external", summary: "CVE-2021-42382", url: "https://www.suse.com/security/cve/CVE-2021-42382", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Leap 15.3:busybox-1.34.1-4.9.1.aarch64", "openSUSE Leap 15.3:busybox-1.34.1-4.9.1.ppc64le", "openSUSE Leap 15.3:busybox-1.34.1-4.9.1.s390x", "openSUSE Leap 15.3:busybox-1.34.1-4.9.1.x86_64", "openSUSE Leap 15.3:busybox-static-1.34.1-4.9.1.aarch64", "openSUSE Leap 15.3:busybox-static-1.34.1-4.9.1.ppc64le", "openSUSE Leap 15.3:busybox-static-1.34.1-4.9.1.s390x", "openSUSE Leap 15.3:busybox-static-1.34.1-4.9.1.x86_64", "openSUSE Leap 15.3:python3-virtualbox-6.1.34-lp153.2.27.2.x86_64", "openSUSE Leap 15.3:virtualbox-6.1.34-lp153.2.27.2.x86_64", "openSUSE Leap 15.3:virtualbox-devel-6.1.34-lp153.2.27.2.x86_64", "openSUSE Leap 15.3:virtualbox-guest-desktop-icons-6.1.34-lp153.2.27.2.noarch", "openSUSE Leap 15.3:virtualbox-guest-source-6.1.34-lp153.2.27.2.noarch", "openSUSE Leap 15.3:virtualbox-guest-tools-6.1.34-lp153.2.27.2.x86_64", "openSUSE Leap 15.3:virtualbox-guest-x11-6.1.34-lp153.2.27.2.x86_64", "openSUSE Leap 15.3:virtualbox-host-source-6.1.34-lp153.2.27.2.noarch", "openSUSE Leap 15.3:virtualbox-kmp-default-6.1.34_k5.3.18_150300.59.63-lp153.2.27.1.x86_64", "openSUSE Leap 15.3:virtualbox-kmp-preempt-6.1.34_k5.3.18_150300.59.63-lp153.2.27.1.x86_64", "openSUSE Leap 15.3:virtualbox-qt-6.1.34-lp153.2.27.2.x86_64", "openSUSE Leap 15.3:virtualbox-vnc-6.1.34-lp153.2.27.2.x86_64", "openSUSE Leap 15.3:virtualbox-websrv-6.1.34-lp153.2.27.2.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 6.6, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, products: [ "openSUSE Leap 15.3:busybox-1.34.1-4.9.1.aarch64", "openSUSE Leap 15.3:busybox-1.34.1-4.9.1.ppc64le", "openSUSE Leap 15.3:busybox-1.34.1-4.9.1.s390x", "openSUSE Leap 15.3:busybox-1.34.1-4.9.1.x86_64", "openSUSE Leap 15.3:busybox-static-1.34.1-4.9.1.aarch64", "openSUSE Leap 15.3:busybox-static-1.34.1-4.9.1.ppc64le", "openSUSE Leap 15.3:busybox-static-1.34.1-4.9.1.s390x", "openSUSE Leap 15.3:busybox-static-1.34.1-4.9.1.x86_64", "openSUSE Leap 15.3:python3-virtualbox-6.1.34-lp153.2.27.2.x86_64", "openSUSE Leap 15.3:virtualbox-6.1.34-lp153.2.27.2.x86_64", "openSUSE Leap 15.3:virtualbox-devel-6.1.34-lp153.2.27.2.x86_64", "openSUSE Leap 15.3:virtualbox-guest-desktop-icons-6.1.34-lp153.2.27.2.noarch", "openSUSE Leap 15.3:virtualbox-guest-source-6.1.34-lp153.2.27.2.noarch", "openSUSE Leap 15.3:virtualbox-guest-tools-6.1.34-lp153.2.27.2.x86_64", "openSUSE Leap 15.3:virtualbox-guest-x11-6.1.34-lp153.2.27.2.x86_64", "openSUSE Leap 15.3:virtualbox-host-source-6.1.34-lp153.2.27.2.noarch", "openSUSE Leap 15.3:virtualbox-kmp-default-6.1.34_k5.3.18_150300.59.63-lp153.2.27.1.x86_64", "openSUSE Leap 15.3:virtualbox-kmp-preempt-6.1.34_k5.3.18_150300.59.63-lp153.2.27.1.x86_64", "openSUSE Leap 15.3:virtualbox-qt-6.1.34-lp153.2.27.2.x86_64", "openSUSE Leap 15.3:virtualbox-vnc-6.1.34-lp153.2.27.2.x86_64", "openSUSE Leap 15.3:virtualbox-websrv-6.1.34-lp153.2.27.2.x86_64", ], }, ], threats: [ { category: "impact", date: "2022-01-20T09:04:27Z", details: "moderate", }, ], title: "CVE-2021-42382", }, { cve: "CVE-2021-42383", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2021-42383", }, ], notes: [ { category: "general", text: "A use-after-free in Busybox's awk applet leads to denial of service and possibly code execution when processing a crafted awk pattern in the evaluate function", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Leap 15.3:busybox-1.34.1-4.9.1.aarch64", "openSUSE Leap 15.3:busybox-1.34.1-4.9.1.ppc64le", "openSUSE Leap 15.3:busybox-1.34.1-4.9.1.s390x", "openSUSE Leap 15.3:busybox-1.34.1-4.9.1.x86_64", "openSUSE Leap 15.3:busybox-static-1.34.1-4.9.1.aarch64", "openSUSE Leap 15.3:busybox-static-1.34.1-4.9.1.ppc64le", "openSUSE Leap 15.3:busybox-static-1.34.1-4.9.1.s390x", "openSUSE Leap 15.3:busybox-static-1.34.1-4.9.1.x86_64", "openSUSE Leap 15.3:python3-virtualbox-6.1.34-lp153.2.27.2.x86_64", "openSUSE Leap 15.3:virtualbox-6.1.34-lp153.2.27.2.x86_64", "openSUSE Leap 15.3:virtualbox-devel-6.1.34-lp153.2.27.2.x86_64", "openSUSE Leap 15.3:virtualbox-guest-desktop-icons-6.1.34-lp153.2.27.2.noarch", "openSUSE Leap 15.3:virtualbox-guest-source-6.1.34-lp153.2.27.2.noarch", "openSUSE Leap 15.3:virtualbox-guest-tools-6.1.34-lp153.2.27.2.x86_64", "openSUSE Leap 15.3:virtualbox-guest-x11-6.1.34-lp153.2.27.2.x86_64", "openSUSE Leap 15.3:virtualbox-host-source-6.1.34-lp153.2.27.2.noarch", "openSUSE Leap 15.3:virtualbox-kmp-default-6.1.34_k5.3.18_150300.59.63-lp153.2.27.1.x86_64", "openSUSE Leap 15.3:virtualbox-kmp-preempt-6.1.34_k5.3.18_150300.59.63-lp153.2.27.1.x86_64", "openSUSE Leap 15.3:virtualbox-qt-6.1.34-lp153.2.27.2.x86_64", "openSUSE Leap 15.3:virtualbox-vnc-6.1.34-lp153.2.27.2.x86_64", "openSUSE Leap 15.3:virtualbox-websrv-6.1.34-lp153.2.27.2.x86_64", ], }, references: [ { category: "external", summary: "CVE-2021-42383", url: "https://www.suse.com/security/cve/CVE-2021-42383", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Leap 15.3:busybox-1.34.1-4.9.1.aarch64", "openSUSE Leap 15.3:busybox-1.34.1-4.9.1.ppc64le", "openSUSE Leap 15.3:busybox-1.34.1-4.9.1.s390x", "openSUSE Leap 15.3:busybox-1.34.1-4.9.1.x86_64", "openSUSE Leap 15.3:busybox-static-1.34.1-4.9.1.aarch64", "openSUSE Leap 15.3:busybox-static-1.34.1-4.9.1.ppc64le", "openSUSE Leap 15.3:busybox-static-1.34.1-4.9.1.s390x", "openSUSE Leap 15.3:busybox-static-1.34.1-4.9.1.x86_64", "openSUSE Leap 15.3:python3-virtualbox-6.1.34-lp153.2.27.2.x86_64", "openSUSE Leap 15.3:virtualbox-6.1.34-lp153.2.27.2.x86_64", "openSUSE Leap 15.3:virtualbox-devel-6.1.34-lp153.2.27.2.x86_64", "openSUSE Leap 15.3:virtualbox-guest-desktop-icons-6.1.34-lp153.2.27.2.noarch", "openSUSE Leap 15.3:virtualbox-guest-source-6.1.34-lp153.2.27.2.noarch", "openSUSE Leap 15.3:virtualbox-guest-tools-6.1.34-lp153.2.27.2.x86_64", "openSUSE Leap 15.3:virtualbox-guest-x11-6.1.34-lp153.2.27.2.x86_64", "openSUSE Leap 15.3:virtualbox-host-source-6.1.34-lp153.2.27.2.noarch", "openSUSE Leap 15.3:virtualbox-kmp-default-6.1.34_k5.3.18_150300.59.63-lp153.2.27.1.x86_64", "openSUSE Leap 15.3:virtualbox-kmp-preempt-6.1.34_k5.3.18_150300.59.63-lp153.2.27.1.x86_64", "openSUSE Leap 15.3:virtualbox-qt-6.1.34-lp153.2.27.2.x86_64", "openSUSE Leap 15.3:virtualbox-vnc-6.1.34-lp153.2.27.2.x86_64", "openSUSE Leap 15.3:virtualbox-websrv-6.1.34-lp153.2.27.2.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 6.6, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, products: [ "openSUSE Leap 15.3:busybox-1.34.1-4.9.1.aarch64", "openSUSE Leap 15.3:busybox-1.34.1-4.9.1.ppc64le", "openSUSE Leap 15.3:busybox-1.34.1-4.9.1.s390x", "openSUSE Leap 15.3:busybox-1.34.1-4.9.1.x86_64", "openSUSE Leap 15.3:busybox-static-1.34.1-4.9.1.aarch64", "openSUSE Leap 15.3:busybox-static-1.34.1-4.9.1.ppc64le", "openSUSE Leap 15.3:busybox-static-1.34.1-4.9.1.s390x", "openSUSE Leap 15.3:busybox-static-1.34.1-4.9.1.x86_64", "openSUSE Leap 15.3:python3-virtualbox-6.1.34-lp153.2.27.2.x86_64", "openSUSE Leap 15.3:virtualbox-6.1.34-lp153.2.27.2.x86_64", "openSUSE Leap 15.3:virtualbox-devel-6.1.34-lp153.2.27.2.x86_64", "openSUSE Leap 15.3:virtualbox-guest-desktop-icons-6.1.34-lp153.2.27.2.noarch", "openSUSE Leap 15.3:virtualbox-guest-source-6.1.34-lp153.2.27.2.noarch", "openSUSE Leap 15.3:virtualbox-guest-tools-6.1.34-lp153.2.27.2.x86_64", "openSUSE Leap 15.3:virtualbox-guest-x11-6.1.34-lp153.2.27.2.x86_64", "openSUSE Leap 15.3:virtualbox-host-source-6.1.34-lp153.2.27.2.noarch", "openSUSE Leap 15.3:virtualbox-kmp-default-6.1.34_k5.3.18_150300.59.63-lp153.2.27.1.x86_64", "openSUSE Leap 15.3:virtualbox-kmp-preempt-6.1.34_k5.3.18_150300.59.63-lp153.2.27.1.x86_64", "openSUSE Leap 15.3:virtualbox-qt-6.1.34-lp153.2.27.2.x86_64", "openSUSE Leap 15.3:virtualbox-vnc-6.1.34-lp153.2.27.2.x86_64", "openSUSE Leap 15.3:virtualbox-websrv-6.1.34-lp153.2.27.2.x86_64", ], }, ], threats: [ { category: "impact", date: "2022-01-20T09:04:27Z", details: "moderate", }, ], title: "CVE-2021-42383", }, { cve: "CVE-2021-42384", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2021-42384", }, ], notes: [ { category: "general", text: "A use-after-free in Busybox's awk applet leads to denial of service and possibly code execution when processing a crafted awk pattern in the handle_special function", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Leap 15.3:busybox-1.34.1-4.9.1.aarch64", "openSUSE Leap 15.3:busybox-1.34.1-4.9.1.ppc64le", "openSUSE Leap 15.3:busybox-1.34.1-4.9.1.s390x", "openSUSE Leap 15.3:busybox-1.34.1-4.9.1.x86_64", "openSUSE Leap 15.3:busybox-static-1.34.1-4.9.1.aarch64", "openSUSE Leap 15.3:busybox-static-1.34.1-4.9.1.ppc64le", "openSUSE Leap 15.3:busybox-static-1.34.1-4.9.1.s390x", "openSUSE Leap 15.3:busybox-static-1.34.1-4.9.1.x86_64", "openSUSE Leap 15.3:python3-virtualbox-6.1.34-lp153.2.27.2.x86_64", "openSUSE Leap 15.3:virtualbox-6.1.34-lp153.2.27.2.x86_64", "openSUSE Leap 15.3:virtualbox-devel-6.1.34-lp153.2.27.2.x86_64", "openSUSE Leap 15.3:virtualbox-guest-desktop-icons-6.1.34-lp153.2.27.2.noarch", "openSUSE Leap 15.3:virtualbox-guest-source-6.1.34-lp153.2.27.2.noarch", "openSUSE Leap 15.3:virtualbox-guest-tools-6.1.34-lp153.2.27.2.x86_64", "openSUSE Leap 15.3:virtualbox-guest-x11-6.1.34-lp153.2.27.2.x86_64", "openSUSE Leap 15.3:virtualbox-host-source-6.1.34-lp153.2.27.2.noarch", "openSUSE Leap 15.3:virtualbox-kmp-default-6.1.34_k5.3.18_150300.59.63-lp153.2.27.1.x86_64", "openSUSE Leap 15.3:virtualbox-kmp-preempt-6.1.34_k5.3.18_150300.59.63-lp153.2.27.1.x86_64", "openSUSE Leap 15.3:virtualbox-qt-6.1.34-lp153.2.27.2.x86_64", "openSUSE Leap 15.3:virtualbox-vnc-6.1.34-lp153.2.27.2.x86_64", "openSUSE Leap 15.3:virtualbox-websrv-6.1.34-lp153.2.27.2.x86_64", ], }, references: [ { category: "external", summary: "CVE-2021-42384", url: "https://www.suse.com/security/cve/CVE-2021-42384", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Leap 15.3:busybox-1.34.1-4.9.1.aarch64", "openSUSE Leap 15.3:busybox-1.34.1-4.9.1.ppc64le", "openSUSE Leap 15.3:busybox-1.34.1-4.9.1.s390x", "openSUSE Leap 15.3:busybox-1.34.1-4.9.1.x86_64", "openSUSE Leap 15.3:busybox-static-1.34.1-4.9.1.aarch64", "openSUSE Leap 15.3:busybox-static-1.34.1-4.9.1.ppc64le", "openSUSE Leap 15.3:busybox-static-1.34.1-4.9.1.s390x", "openSUSE Leap 15.3:busybox-static-1.34.1-4.9.1.x86_64", "openSUSE Leap 15.3:python3-virtualbox-6.1.34-lp153.2.27.2.x86_64", "openSUSE Leap 15.3:virtualbox-6.1.34-lp153.2.27.2.x86_64", "openSUSE Leap 15.3:virtualbox-devel-6.1.34-lp153.2.27.2.x86_64", "openSUSE Leap 15.3:virtualbox-guest-desktop-icons-6.1.34-lp153.2.27.2.noarch", "openSUSE Leap 15.3:virtualbox-guest-source-6.1.34-lp153.2.27.2.noarch", "openSUSE Leap 15.3:virtualbox-guest-tools-6.1.34-lp153.2.27.2.x86_64", "openSUSE Leap 15.3:virtualbox-guest-x11-6.1.34-lp153.2.27.2.x86_64", "openSUSE Leap 15.3:virtualbox-host-source-6.1.34-lp153.2.27.2.noarch", "openSUSE Leap 15.3:virtualbox-kmp-default-6.1.34_k5.3.18_150300.59.63-lp153.2.27.1.x86_64", "openSUSE Leap 15.3:virtualbox-kmp-preempt-6.1.34_k5.3.18_150300.59.63-lp153.2.27.1.x86_64", "openSUSE Leap 15.3:virtualbox-qt-6.1.34-lp153.2.27.2.x86_64", "openSUSE Leap 15.3:virtualbox-vnc-6.1.34-lp153.2.27.2.x86_64", "openSUSE Leap 15.3:virtualbox-websrv-6.1.34-lp153.2.27.2.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 6.6, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, products: [ "openSUSE Leap 15.3:busybox-1.34.1-4.9.1.aarch64", "openSUSE Leap 15.3:busybox-1.34.1-4.9.1.ppc64le", "openSUSE Leap 15.3:busybox-1.34.1-4.9.1.s390x", "openSUSE Leap 15.3:busybox-1.34.1-4.9.1.x86_64", "openSUSE Leap 15.3:busybox-static-1.34.1-4.9.1.aarch64", "openSUSE Leap 15.3:busybox-static-1.34.1-4.9.1.ppc64le", "openSUSE Leap 15.3:busybox-static-1.34.1-4.9.1.s390x", "openSUSE Leap 15.3:busybox-static-1.34.1-4.9.1.x86_64", "openSUSE Leap 15.3:python3-virtualbox-6.1.34-lp153.2.27.2.x86_64", "openSUSE Leap 15.3:virtualbox-6.1.34-lp153.2.27.2.x86_64", "openSUSE Leap 15.3:virtualbox-devel-6.1.34-lp153.2.27.2.x86_64", "openSUSE Leap 15.3:virtualbox-guest-desktop-icons-6.1.34-lp153.2.27.2.noarch", "openSUSE Leap 15.3:virtualbox-guest-source-6.1.34-lp153.2.27.2.noarch", "openSUSE Leap 15.3:virtualbox-guest-tools-6.1.34-lp153.2.27.2.x86_64", "openSUSE Leap 15.3:virtualbox-guest-x11-6.1.34-lp153.2.27.2.x86_64", "openSUSE Leap 15.3:virtualbox-host-source-6.1.34-lp153.2.27.2.noarch", "openSUSE Leap 15.3:virtualbox-kmp-default-6.1.34_k5.3.18_150300.59.63-lp153.2.27.1.x86_64", "openSUSE Leap 15.3:virtualbox-kmp-preempt-6.1.34_k5.3.18_150300.59.63-lp153.2.27.1.x86_64", "openSUSE Leap 15.3:virtualbox-qt-6.1.34-lp153.2.27.2.x86_64", "openSUSE Leap 15.3:virtualbox-vnc-6.1.34-lp153.2.27.2.x86_64", "openSUSE Leap 15.3:virtualbox-websrv-6.1.34-lp153.2.27.2.x86_64", ], }, ], threats: [ { category: "impact", date: "2022-01-20T09:04:27Z", details: "moderate", }, ], title: "CVE-2021-42384", }, { cve: "CVE-2021-42385", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2021-42385", }, ], notes: [ { category: "general", text: "A use-after-free in Busybox's awk applet leads to denial of service and possibly code execution when processing a crafted awk pattern in the evaluate function", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Leap 15.3:busybox-1.34.1-4.9.1.aarch64", "openSUSE Leap 15.3:busybox-1.34.1-4.9.1.ppc64le", "openSUSE Leap 15.3:busybox-1.34.1-4.9.1.s390x", "openSUSE Leap 15.3:busybox-1.34.1-4.9.1.x86_64", "openSUSE Leap 15.3:busybox-static-1.34.1-4.9.1.aarch64", "openSUSE Leap 15.3:busybox-static-1.34.1-4.9.1.ppc64le", "openSUSE Leap 15.3:busybox-static-1.34.1-4.9.1.s390x", "openSUSE Leap 15.3:busybox-static-1.34.1-4.9.1.x86_64", "openSUSE Leap 15.3:python3-virtualbox-6.1.34-lp153.2.27.2.x86_64", "openSUSE Leap 15.3:virtualbox-6.1.34-lp153.2.27.2.x86_64", "openSUSE Leap 15.3:virtualbox-devel-6.1.34-lp153.2.27.2.x86_64", "openSUSE Leap 15.3:virtualbox-guest-desktop-icons-6.1.34-lp153.2.27.2.noarch", "openSUSE Leap 15.3:virtualbox-guest-source-6.1.34-lp153.2.27.2.noarch", "openSUSE Leap 15.3:virtualbox-guest-tools-6.1.34-lp153.2.27.2.x86_64", "openSUSE Leap 15.3:virtualbox-guest-x11-6.1.34-lp153.2.27.2.x86_64", "openSUSE Leap 15.3:virtualbox-host-source-6.1.34-lp153.2.27.2.noarch", "openSUSE Leap 15.3:virtualbox-kmp-default-6.1.34_k5.3.18_150300.59.63-lp153.2.27.1.x86_64", "openSUSE Leap 15.3:virtualbox-kmp-preempt-6.1.34_k5.3.18_150300.59.63-lp153.2.27.1.x86_64", "openSUSE Leap 15.3:virtualbox-qt-6.1.34-lp153.2.27.2.x86_64", "openSUSE Leap 15.3:virtualbox-vnc-6.1.34-lp153.2.27.2.x86_64", "openSUSE Leap 15.3:virtualbox-websrv-6.1.34-lp153.2.27.2.x86_64", ], }, references: [ { category: "external", summary: "CVE-2021-42385", url: "https://www.suse.com/security/cve/CVE-2021-42385", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Leap 15.3:busybox-1.34.1-4.9.1.aarch64", "openSUSE Leap 15.3:busybox-1.34.1-4.9.1.ppc64le", "openSUSE Leap 15.3:busybox-1.34.1-4.9.1.s390x", "openSUSE Leap 15.3:busybox-1.34.1-4.9.1.x86_64", "openSUSE Leap 15.3:busybox-static-1.34.1-4.9.1.aarch64", "openSUSE Leap 15.3:busybox-static-1.34.1-4.9.1.ppc64le", "openSUSE Leap 15.3:busybox-static-1.34.1-4.9.1.s390x", "openSUSE Leap 15.3:busybox-static-1.34.1-4.9.1.x86_64", "openSUSE Leap 15.3:python3-virtualbox-6.1.34-lp153.2.27.2.x86_64", "openSUSE Leap 15.3:virtualbox-6.1.34-lp153.2.27.2.x86_64", "openSUSE Leap 15.3:virtualbox-devel-6.1.34-lp153.2.27.2.x86_64", "openSUSE Leap 15.3:virtualbox-guest-desktop-icons-6.1.34-lp153.2.27.2.noarch", "openSUSE Leap 15.3:virtualbox-guest-source-6.1.34-lp153.2.27.2.noarch", "openSUSE Leap 15.3:virtualbox-guest-tools-6.1.34-lp153.2.27.2.x86_64", "openSUSE Leap 15.3:virtualbox-guest-x11-6.1.34-lp153.2.27.2.x86_64", "openSUSE Leap 15.3:virtualbox-host-source-6.1.34-lp153.2.27.2.noarch", "openSUSE Leap 15.3:virtualbox-kmp-default-6.1.34_k5.3.18_150300.59.63-lp153.2.27.1.x86_64", "openSUSE Leap 15.3:virtualbox-kmp-preempt-6.1.34_k5.3.18_150300.59.63-lp153.2.27.1.x86_64", "openSUSE Leap 15.3:virtualbox-qt-6.1.34-lp153.2.27.2.x86_64", "openSUSE Leap 15.3:virtualbox-vnc-6.1.34-lp153.2.27.2.x86_64", "openSUSE Leap 15.3:virtualbox-websrv-6.1.34-lp153.2.27.2.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 6.6, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, products: [ "openSUSE Leap 15.3:busybox-1.34.1-4.9.1.aarch64", "openSUSE Leap 15.3:busybox-1.34.1-4.9.1.ppc64le", "openSUSE Leap 15.3:busybox-1.34.1-4.9.1.s390x", "openSUSE Leap 15.3:busybox-1.34.1-4.9.1.x86_64", "openSUSE Leap 15.3:busybox-static-1.34.1-4.9.1.aarch64", "openSUSE Leap 15.3:busybox-static-1.34.1-4.9.1.ppc64le", "openSUSE Leap 15.3:busybox-static-1.34.1-4.9.1.s390x", "openSUSE Leap 15.3:busybox-static-1.34.1-4.9.1.x86_64", "openSUSE Leap 15.3:python3-virtualbox-6.1.34-lp153.2.27.2.x86_64", "openSUSE Leap 15.3:virtualbox-6.1.34-lp153.2.27.2.x86_64", "openSUSE Leap 15.3:virtualbox-devel-6.1.34-lp153.2.27.2.x86_64", "openSUSE Leap 15.3:virtualbox-guest-desktop-icons-6.1.34-lp153.2.27.2.noarch", "openSUSE Leap 15.3:virtualbox-guest-source-6.1.34-lp153.2.27.2.noarch", "openSUSE Leap 15.3:virtualbox-guest-tools-6.1.34-lp153.2.27.2.x86_64", "openSUSE Leap 15.3:virtualbox-guest-x11-6.1.34-lp153.2.27.2.x86_64", "openSUSE Leap 15.3:virtualbox-host-source-6.1.34-lp153.2.27.2.noarch", "openSUSE Leap 15.3:virtualbox-kmp-default-6.1.34_k5.3.18_150300.59.63-lp153.2.27.1.x86_64", "openSUSE Leap 15.3:virtualbox-kmp-preempt-6.1.34_k5.3.18_150300.59.63-lp153.2.27.1.x86_64", "openSUSE Leap 15.3:virtualbox-qt-6.1.34-lp153.2.27.2.x86_64", "openSUSE Leap 15.3:virtualbox-vnc-6.1.34-lp153.2.27.2.x86_64", "openSUSE Leap 15.3:virtualbox-websrv-6.1.34-lp153.2.27.2.x86_64", ], }, ], threats: [ { category: "impact", date: "2022-01-20T09:04:27Z", details: "moderate", }, ], title: "CVE-2021-42385", }, { cve: "CVE-2021-42386", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2021-42386", }, ], notes: [ { category: "general", text: "A use-after-free in Busybox's awk applet leads to denial of service and possibly code execution when processing a crafted awk pattern in the nvalloc function", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Leap 15.3:busybox-1.34.1-4.9.1.aarch64", "openSUSE Leap 15.3:busybox-1.34.1-4.9.1.ppc64le", "openSUSE Leap 15.3:busybox-1.34.1-4.9.1.s390x", "openSUSE Leap 15.3:busybox-1.34.1-4.9.1.x86_64", "openSUSE Leap 15.3:busybox-static-1.34.1-4.9.1.aarch64", "openSUSE Leap 15.3:busybox-static-1.34.1-4.9.1.ppc64le", "openSUSE Leap 15.3:busybox-static-1.34.1-4.9.1.s390x", "openSUSE Leap 15.3:busybox-static-1.34.1-4.9.1.x86_64", "openSUSE Leap 15.3:python3-virtualbox-6.1.34-lp153.2.27.2.x86_64", "openSUSE Leap 15.3:virtualbox-6.1.34-lp153.2.27.2.x86_64", "openSUSE Leap 15.3:virtualbox-devel-6.1.34-lp153.2.27.2.x86_64", "openSUSE Leap 15.3:virtualbox-guest-desktop-icons-6.1.34-lp153.2.27.2.noarch", "openSUSE Leap 15.3:virtualbox-guest-source-6.1.34-lp153.2.27.2.noarch", "openSUSE Leap 15.3:virtualbox-guest-tools-6.1.34-lp153.2.27.2.x86_64", "openSUSE Leap 15.3:virtualbox-guest-x11-6.1.34-lp153.2.27.2.x86_64", "openSUSE Leap 15.3:virtualbox-host-source-6.1.34-lp153.2.27.2.noarch", "openSUSE Leap 15.3:virtualbox-kmp-default-6.1.34_k5.3.18_150300.59.63-lp153.2.27.1.x86_64", "openSUSE Leap 15.3:virtualbox-kmp-preempt-6.1.34_k5.3.18_150300.59.63-lp153.2.27.1.x86_64", "openSUSE Leap 15.3:virtualbox-qt-6.1.34-lp153.2.27.2.x86_64", "openSUSE Leap 15.3:virtualbox-vnc-6.1.34-lp153.2.27.2.x86_64", "openSUSE Leap 15.3:virtualbox-websrv-6.1.34-lp153.2.27.2.x86_64", ], }, references: [ { category: "external", summary: "CVE-2021-42386", url: "https://www.suse.com/security/cve/CVE-2021-42386", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Leap 15.3:busybox-1.34.1-4.9.1.aarch64", "openSUSE Leap 15.3:busybox-1.34.1-4.9.1.ppc64le", "openSUSE Leap 15.3:busybox-1.34.1-4.9.1.s390x", "openSUSE Leap 15.3:busybox-1.34.1-4.9.1.x86_64", "openSUSE Leap 15.3:busybox-static-1.34.1-4.9.1.aarch64", "openSUSE Leap 15.3:busybox-static-1.34.1-4.9.1.ppc64le", "openSUSE Leap 15.3:busybox-static-1.34.1-4.9.1.s390x", "openSUSE Leap 15.3:busybox-static-1.34.1-4.9.1.x86_64", "openSUSE Leap 15.3:python3-virtualbox-6.1.34-lp153.2.27.2.x86_64", "openSUSE Leap 15.3:virtualbox-6.1.34-lp153.2.27.2.x86_64", "openSUSE Leap 15.3:virtualbox-devel-6.1.34-lp153.2.27.2.x86_64", "openSUSE Leap 15.3:virtualbox-guest-desktop-icons-6.1.34-lp153.2.27.2.noarch", "openSUSE Leap 15.3:virtualbox-guest-source-6.1.34-lp153.2.27.2.noarch", "openSUSE Leap 15.3:virtualbox-guest-tools-6.1.34-lp153.2.27.2.x86_64", "openSUSE Leap 15.3:virtualbox-guest-x11-6.1.34-lp153.2.27.2.x86_64", "openSUSE Leap 15.3:virtualbox-host-source-6.1.34-lp153.2.27.2.noarch", "openSUSE Leap 15.3:virtualbox-kmp-default-6.1.34_k5.3.18_150300.59.63-lp153.2.27.1.x86_64", "openSUSE Leap 15.3:virtualbox-kmp-preempt-6.1.34_k5.3.18_150300.59.63-lp153.2.27.1.x86_64", "openSUSE Leap 15.3:virtualbox-qt-6.1.34-lp153.2.27.2.x86_64", "openSUSE Leap 15.3:virtualbox-vnc-6.1.34-lp153.2.27.2.x86_64", "openSUSE Leap 15.3:virtualbox-websrv-6.1.34-lp153.2.27.2.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 6.6, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, products: [ "openSUSE Leap 15.3:busybox-1.34.1-4.9.1.aarch64", "openSUSE Leap 15.3:busybox-1.34.1-4.9.1.ppc64le", "openSUSE Leap 15.3:busybox-1.34.1-4.9.1.s390x", "openSUSE Leap 15.3:busybox-1.34.1-4.9.1.x86_64", "openSUSE Leap 15.3:busybox-static-1.34.1-4.9.1.aarch64", "openSUSE Leap 15.3:busybox-static-1.34.1-4.9.1.ppc64le", "openSUSE Leap 15.3:busybox-static-1.34.1-4.9.1.s390x", "openSUSE Leap 15.3:busybox-static-1.34.1-4.9.1.x86_64", "openSUSE Leap 15.3:python3-virtualbox-6.1.34-lp153.2.27.2.x86_64", "openSUSE Leap 15.3:virtualbox-6.1.34-lp153.2.27.2.x86_64", "openSUSE Leap 15.3:virtualbox-devel-6.1.34-lp153.2.27.2.x86_64", "openSUSE Leap 15.3:virtualbox-guest-desktop-icons-6.1.34-lp153.2.27.2.noarch", "openSUSE Leap 15.3:virtualbox-guest-source-6.1.34-lp153.2.27.2.noarch", "openSUSE Leap 15.3:virtualbox-guest-tools-6.1.34-lp153.2.27.2.x86_64", "openSUSE Leap 15.3:virtualbox-guest-x11-6.1.34-lp153.2.27.2.x86_64", "openSUSE Leap 15.3:virtualbox-host-source-6.1.34-lp153.2.27.2.noarch", "openSUSE Leap 15.3:virtualbox-kmp-default-6.1.34_k5.3.18_150300.59.63-lp153.2.27.1.x86_64", "openSUSE Leap 15.3:virtualbox-kmp-preempt-6.1.34_k5.3.18_150300.59.63-lp153.2.27.1.x86_64", "openSUSE Leap 15.3:virtualbox-qt-6.1.34-lp153.2.27.2.x86_64", "openSUSE Leap 15.3:virtualbox-vnc-6.1.34-lp153.2.27.2.x86_64", "openSUSE Leap 15.3:virtualbox-websrv-6.1.34-lp153.2.27.2.x86_64", ], }, ], threats: [ { category: "impact", date: "2022-01-20T09:04:27Z", details: "moderate", }, ], title: "CVE-2021-42386", }, ], }
opensuse-su-2021:3531-1
Vulnerability from csaf_opensuse
Published
2021-10-27 08:07
Modified
2021-10-27 08:07
Summary
Security update for busybox
Notes
Title of the patch
Security update for busybox
Description of the patch
This update for busybox fixes the following issues:
- CVE-2021-28831: Fixed invalid free or segmentation fault via malformed gzip data (bsc#1184522).
- CVE-2018-20679: Fixed out of bounds read in udhcp (bsc#1121426).
- CVE-2018-1000517: Fixed buffer overflow in the retrieve_file_data() (bsc#1099260).
- CVE-2011-5325: Fixed a directory traversal related to 'tar' command (bsc#951562).
- CVE-2018-1000500: Fixed missing SSL certificate validation related to the 'wget' command (bsc#1099263).
Patchnames
openSUSE-SLE-15.3-2021-3531
Terms of use
CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
{ document: { aggregate_severity: { namespace: "https://www.suse.com/support/security/rating/", text: "important", }, category: "csaf_security_advisory", csaf_version: "2.0", distribution: { text: "Copyright 2024 SUSE LLC. All rights reserved.", tlp: { label: "WHITE", url: "https://www.first.org/tlp/", }, }, lang: "en", notes: [ { category: "summary", text: "Security update for busybox", title: "Title of the patch", }, { category: "description", text: "This update for busybox fixes the following issues:\n\n- CVE-2021-28831: Fixed invalid free or segmentation fault via malformed gzip data (bsc#1184522).\n- CVE-2018-20679: Fixed out of bounds read in udhcp (bsc#1121426).\n- CVE-2018-1000517: Fixed buffer overflow in the retrieve_file_data() (bsc#1099260).\n- CVE-2011-5325: Fixed a directory traversal related to 'tar' command (bsc#951562).\n- CVE-2018-1000500: Fixed missing SSL certificate validation related to the 'wget' command (bsc#1099263).\n", title: "Description of the patch", }, { category: "details", text: "openSUSE-SLE-15.3-2021-3531", title: "Patchnames", }, { category: "legal_disclaimer", text: "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", title: "Terms of use", }, ], publisher: { category: "vendor", contact_details: "https://www.suse.com/support/security/contact/", name: "SUSE Product Security Team", namespace: "https://www.suse.com/", }, references: [ { category: "external", summary: "SUSE ratings", url: "https://www.suse.com/support/security/rating/", }, { category: "self", summary: "URL of this CSAF notice", url: "https://ftp.suse.com/pub/projects/security/csaf/opensuse-su-2021_3531-1.json", }, { category: "self", summary: "URL for openSUSE-SU-2021:3531-1", url: "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/EXGVAQ34C33F4R3O65TKB73FYUDCIM6B/", }, { category: "self", summary: "E-Mail link for openSUSE-SU-2021:3531-1", url: "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/EXGVAQ34C33F4R3O65TKB73FYUDCIM6B/", }, { category: "self", summary: "SUSE Bug 1099260", url: "https://bugzilla.suse.com/1099260", }, { category: "self", summary: "SUSE Bug 1099263", url: "https://bugzilla.suse.com/1099263", }, { category: "self", summary: "SUSE Bug 1121426", url: "https://bugzilla.suse.com/1121426", }, { category: "self", summary: "SUSE Bug 1184522", url: "https://bugzilla.suse.com/1184522", }, { category: "self", summary: "SUSE Bug 951562", url: "https://bugzilla.suse.com/951562", }, { category: "self", summary: "SUSE CVE CVE-2011-5325 page", url: "https://www.suse.com/security/cve/CVE-2011-5325/", }, { category: "self", summary: "SUSE CVE CVE-2018-1000500 page", url: "https://www.suse.com/security/cve/CVE-2018-1000500/", }, { category: "self", summary: "SUSE CVE CVE-2018-1000517 page", url: "https://www.suse.com/security/cve/CVE-2018-1000517/", }, { category: "self", summary: "SUSE CVE CVE-2018-20679 page", url: "https://www.suse.com/security/cve/CVE-2018-20679/", }, { category: "self", summary: "SUSE CVE CVE-2021-28831 page", url: "https://www.suse.com/security/cve/CVE-2021-28831/", }, ], title: "Security update for busybox", tracking: { current_release_date: "2021-10-27T08:07:47Z", generator: { date: "2021-10-27T08:07:47Z", engine: { name: "cve-database.git:bin/generate-csaf.pl", version: "1", }, }, id: "openSUSE-SU-2021:3531-1", initial_release_date: "2021-10-27T08:07:47Z", revision_history: [ { date: "2021-10-27T08:07:47Z", number: "1", summary: "Current version", }, ], status: "final", version: "1", }, }, product_tree: { branches: [ { branches: [ { branches: [ { category: "product_version", name: "busybox-1.26.2-4.5.1.aarch64", product: { name: "busybox-1.26.2-4.5.1.aarch64", product_id: "busybox-1.26.2-4.5.1.aarch64", }, }, { category: "product_version", name: "busybox-static-1.26.2-4.5.1.aarch64", product: { name: "busybox-static-1.26.2-4.5.1.aarch64", product_id: "busybox-static-1.26.2-4.5.1.aarch64", }, }, ], category: "architecture", name: "aarch64", }, { branches: [ { category: "product_version", name: "busybox-1.26.2-4.5.1.ppc64le", product: { name: "busybox-1.26.2-4.5.1.ppc64le", product_id: "busybox-1.26.2-4.5.1.ppc64le", }, }, { category: "product_version", name: "busybox-static-1.26.2-4.5.1.ppc64le", product: { name: "busybox-static-1.26.2-4.5.1.ppc64le", product_id: "busybox-static-1.26.2-4.5.1.ppc64le", }, }, ], category: "architecture", name: "ppc64le", }, { branches: [ { category: "product_version", name: "busybox-1.26.2-4.5.1.s390x", product: { name: "busybox-1.26.2-4.5.1.s390x", product_id: "busybox-1.26.2-4.5.1.s390x", }, }, { category: "product_version", name: "busybox-static-1.26.2-4.5.1.s390x", product: { name: "busybox-static-1.26.2-4.5.1.s390x", product_id: "busybox-static-1.26.2-4.5.1.s390x", }, }, ], category: "architecture", name: "s390x", }, { branches: [ { category: "product_version", name: "busybox-1.26.2-4.5.1.x86_64", product: { name: "busybox-1.26.2-4.5.1.x86_64", product_id: "busybox-1.26.2-4.5.1.x86_64", }, }, { category: "product_version", name: "busybox-static-1.26.2-4.5.1.x86_64", product: { name: "busybox-static-1.26.2-4.5.1.x86_64", product_id: "busybox-static-1.26.2-4.5.1.x86_64", }, }, ], category: "architecture", name: "x86_64", }, { branches: [ { category: "product_name", name: "openSUSE Leap 15.3", product: { name: "openSUSE Leap 15.3", product_id: "openSUSE Leap 15.3", product_identification_helper: { cpe: "cpe:/o:opensuse:leap:15.3", }, }, }, ], category: "product_family", name: "SUSE Linux Enterprise", }, ], category: "vendor", name: "SUSE", }, ], relationships: [ { category: "default_component_of", full_product_name: { name: "busybox-1.26.2-4.5.1.aarch64 as component of openSUSE Leap 15.3", product_id: "openSUSE Leap 15.3:busybox-1.26.2-4.5.1.aarch64", }, product_reference: "busybox-1.26.2-4.5.1.aarch64", relates_to_product_reference: "openSUSE Leap 15.3", }, { category: "default_component_of", full_product_name: { name: "busybox-1.26.2-4.5.1.ppc64le as component of openSUSE Leap 15.3", product_id: "openSUSE Leap 15.3:busybox-1.26.2-4.5.1.ppc64le", }, product_reference: "busybox-1.26.2-4.5.1.ppc64le", relates_to_product_reference: "openSUSE Leap 15.3", }, { category: "default_component_of", full_product_name: { name: "busybox-1.26.2-4.5.1.s390x as component of openSUSE Leap 15.3", product_id: "openSUSE Leap 15.3:busybox-1.26.2-4.5.1.s390x", }, product_reference: "busybox-1.26.2-4.5.1.s390x", relates_to_product_reference: "openSUSE Leap 15.3", }, { category: "default_component_of", full_product_name: { name: "busybox-1.26.2-4.5.1.x86_64 as component of openSUSE Leap 15.3", product_id: "openSUSE Leap 15.3:busybox-1.26.2-4.5.1.x86_64", }, product_reference: "busybox-1.26.2-4.5.1.x86_64", relates_to_product_reference: "openSUSE Leap 15.3", }, { category: "default_component_of", full_product_name: { name: "busybox-static-1.26.2-4.5.1.aarch64 as component of openSUSE Leap 15.3", product_id: "openSUSE Leap 15.3:busybox-static-1.26.2-4.5.1.aarch64", }, product_reference: "busybox-static-1.26.2-4.5.1.aarch64", relates_to_product_reference: "openSUSE Leap 15.3", }, { category: "default_component_of", full_product_name: { name: "busybox-static-1.26.2-4.5.1.ppc64le as component of openSUSE Leap 15.3", product_id: "openSUSE Leap 15.3:busybox-static-1.26.2-4.5.1.ppc64le", }, product_reference: "busybox-static-1.26.2-4.5.1.ppc64le", relates_to_product_reference: "openSUSE Leap 15.3", }, { category: "default_component_of", full_product_name: { name: "busybox-static-1.26.2-4.5.1.s390x as component of openSUSE Leap 15.3", product_id: "openSUSE Leap 15.3:busybox-static-1.26.2-4.5.1.s390x", }, product_reference: "busybox-static-1.26.2-4.5.1.s390x", relates_to_product_reference: "openSUSE Leap 15.3", }, { category: "default_component_of", full_product_name: { name: "busybox-static-1.26.2-4.5.1.x86_64 as component of openSUSE Leap 15.3", product_id: "openSUSE Leap 15.3:busybox-static-1.26.2-4.5.1.x86_64", }, product_reference: "busybox-static-1.26.2-4.5.1.x86_64", relates_to_product_reference: "openSUSE Leap 15.3", }, ], }, vulnerabilities: [ { cve: "CVE-2011-5325", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2011-5325", }, ], notes: [ { category: "general", text: "Directory traversal vulnerability in the BusyBox implementation of tar before 1.22.0 v5 allows remote attackers to point to files outside the current working directory via a symlink.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Leap 15.3:busybox-1.26.2-4.5.1.aarch64", "openSUSE Leap 15.3:busybox-1.26.2-4.5.1.ppc64le", "openSUSE Leap 15.3:busybox-1.26.2-4.5.1.s390x", "openSUSE Leap 15.3:busybox-1.26.2-4.5.1.x86_64", "openSUSE Leap 15.3:busybox-static-1.26.2-4.5.1.aarch64", "openSUSE Leap 15.3:busybox-static-1.26.2-4.5.1.ppc64le", "openSUSE Leap 15.3:busybox-static-1.26.2-4.5.1.s390x", "openSUSE Leap 15.3:busybox-static-1.26.2-4.5.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2011-5325", url: "https://www.suse.com/security/cve/CVE-2011-5325", }, { category: "external", summary: "SUSE Bug 951562 for CVE-2011-5325", url: "https://bugzilla.suse.com/951562", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Leap 15.3:busybox-1.26.2-4.5.1.aarch64", "openSUSE Leap 15.3:busybox-1.26.2-4.5.1.ppc64le", "openSUSE Leap 15.3:busybox-1.26.2-4.5.1.s390x", "openSUSE Leap 15.3:busybox-1.26.2-4.5.1.x86_64", "openSUSE Leap 15.3:busybox-static-1.26.2-4.5.1.aarch64", "openSUSE Leap 15.3:busybox-static-1.26.2-4.5.1.ppc64le", "openSUSE Leap 15.3:busybox-static-1.26.2-4.5.1.s390x", "openSUSE Leap 15.3:busybox-static-1.26.2-4.5.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 7.5, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N", version: "3.1", }, products: [ "openSUSE Leap 15.3:busybox-1.26.2-4.5.1.aarch64", "openSUSE Leap 15.3:busybox-1.26.2-4.5.1.ppc64le", "openSUSE Leap 15.3:busybox-1.26.2-4.5.1.s390x", "openSUSE Leap 15.3:busybox-1.26.2-4.5.1.x86_64", "openSUSE Leap 15.3:busybox-static-1.26.2-4.5.1.aarch64", "openSUSE Leap 15.3:busybox-static-1.26.2-4.5.1.ppc64le", "openSUSE Leap 15.3:busybox-static-1.26.2-4.5.1.s390x", "openSUSE Leap 15.3:busybox-static-1.26.2-4.5.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2021-10-27T08:07:47Z", details: "moderate", }, ], title: "CVE-2011-5325", }, { cve: "CVE-2018-1000500", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2018-1000500", }, ], notes: [ { category: "general", text: "Busybox contains a Missing SSL certificate validation vulnerability in The \"busybox wget\" applet that can result in arbitrary code execution. This attack appear to be exploitable via Simply download any file over HTTPS using \"busybox wget https://compromised-domain.com/important-file\".", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Leap 15.3:busybox-1.26.2-4.5.1.aarch64", "openSUSE Leap 15.3:busybox-1.26.2-4.5.1.ppc64le", "openSUSE Leap 15.3:busybox-1.26.2-4.5.1.s390x", "openSUSE Leap 15.3:busybox-1.26.2-4.5.1.x86_64", "openSUSE Leap 15.3:busybox-static-1.26.2-4.5.1.aarch64", "openSUSE Leap 15.3:busybox-static-1.26.2-4.5.1.ppc64le", "openSUSE Leap 15.3:busybox-static-1.26.2-4.5.1.s390x", "openSUSE Leap 15.3:busybox-static-1.26.2-4.5.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2018-1000500", url: "https://www.suse.com/security/cve/CVE-2018-1000500", }, { category: "external", summary: "SUSE Bug 1099263 for CVE-2018-1000500", url: "https://bugzilla.suse.com/1099263", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Leap 15.3:busybox-1.26.2-4.5.1.aarch64", "openSUSE Leap 15.3:busybox-1.26.2-4.5.1.ppc64le", "openSUSE Leap 15.3:busybox-1.26.2-4.5.1.s390x", "openSUSE Leap 15.3:busybox-1.26.2-4.5.1.x86_64", "openSUSE Leap 15.3:busybox-static-1.26.2-4.5.1.aarch64", "openSUSE Leap 15.3:busybox-static-1.26.2-4.5.1.ppc64le", "openSUSE Leap 15.3:busybox-static-1.26.2-4.5.1.s390x", "openSUSE Leap 15.3:busybox-static-1.26.2-4.5.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 7.5, baseSeverity: "HIGH", vectorString: "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N", version: "3.0", }, products: [ "openSUSE Leap 15.3:busybox-1.26.2-4.5.1.aarch64", "openSUSE Leap 15.3:busybox-1.26.2-4.5.1.ppc64le", "openSUSE Leap 15.3:busybox-1.26.2-4.5.1.s390x", "openSUSE Leap 15.3:busybox-1.26.2-4.5.1.x86_64", "openSUSE Leap 15.3:busybox-static-1.26.2-4.5.1.aarch64", "openSUSE Leap 15.3:busybox-static-1.26.2-4.5.1.ppc64le", "openSUSE Leap 15.3:busybox-static-1.26.2-4.5.1.s390x", "openSUSE Leap 15.3:busybox-static-1.26.2-4.5.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2021-10-27T08:07:47Z", details: "important", }, ], title: "CVE-2018-1000500", }, { cve: "CVE-2018-1000517", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2018-1000517", }, ], notes: [ { category: "general", text: "BusyBox project BusyBox wget version prior to commit 8e2174e9bd836e53c8b9c6e00d1bc6e2a718686e contains a Buffer Overflow vulnerability in Busybox wget that can result in heap buffer overflow. This attack appear to be exploitable via network connectivity. This vulnerability appears to have been fixed in after commit 8e2174e9bd836e53c8b9c6e00d1bc6e2a718686e.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Leap 15.3:busybox-1.26.2-4.5.1.aarch64", "openSUSE Leap 15.3:busybox-1.26.2-4.5.1.ppc64le", "openSUSE Leap 15.3:busybox-1.26.2-4.5.1.s390x", "openSUSE Leap 15.3:busybox-1.26.2-4.5.1.x86_64", "openSUSE Leap 15.3:busybox-static-1.26.2-4.5.1.aarch64", "openSUSE Leap 15.3:busybox-static-1.26.2-4.5.1.ppc64le", "openSUSE Leap 15.3:busybox-static-1.26.2-4.5.1.s390x", "openSUSE Leap 15.3:busybox-static-1.26.2-4.5.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2018-1000517", url: "https://www.suse.com/security/cve/CVE-2018-1000517", }, { category: "external", summary: "SUSE Bug 1099260 for CVE-2018-1000517", url: "https://bugzilla.suse.com/1099260", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Leap 15.3:busybox-1.26.2-4.5.1.aarch64", "openSUSE Leap 15.3:busybox-1.26.2-4.5.1.ppc64le", "openSUSE Leap 15.3:busybox-1.26.2-4.5.1.s390x", "openSUSE Leap 15.3:busybox-1.26.2-4.5.1.x86_64", "openSUSE Leap 15.3:busybox-static-1.26.2-4.5.1.aarch64", "openSUSE Leap 15.3:busybox-static-1.26.2-4.5.1.ppc64le", "openSUSE Leap 15.3:busybox-static-1.26.2-4.5.1.s390x", "openSUSE Leap 15.3:busybox-static-1.26.2-4.5.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.6, baseSeverity: "MEDIUM", vectorString: "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L", version: "3.0", }, products: [ "openSUSE Leap 15.3:busybox-1.26.2-4.5.1.aarch64", "openSUSE Leap 15.3:busybox-1.26.2-4.5.1.ppc64le", "openSUSE Leap 15.3:busybox-1.26.2-4.5.1.s390x", "openSUSE Leap 15.3:busybox-1.26.2-4.5.1.x86_64", "openSUSE Leap 15.3:busybox-static-1.26.2-4.5.1.aarch64", "openSUSE Leap 15.3:busybox-static-1.26.2-4.5.1.ppc64le", "openSUSE Leap 15.3:busybox-static-1.26.2-4.5.1.s390x", "openSUSE Leap 15.3:busybox-static-1.26.2-4.5.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2021-10-27T08:07:47Z", details: "important", }, ], title: "CVE-2018-1000517", }, { cve: "CVE-2018-20679", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2018-20679", }, ], notes: [ { category: "general", text: "An issue was discovered in BusyBox before 1.30.0. An out of bounds read in udhcp components (consumed by the DHCP server, client, and relay) allows a remote attacker to leak sensitive information from the stack by sending a crafted DHCP message. This is related to verification in udhcp_get_option() in networking/udhcp/common.c that 4-byte options are indeed 4 bytes.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Leap 15.3:busybox-1.26.2-4.5.1.aarch64", "openSUSE Leap 15.3:busybox-1.26.2-4.5.1.ppc64le", "openSUSE Leap 15.3:busybox-1.26.2-4.5.1.s390x", "openSUSE Leap 15.3:busybox-1.26.2-4.5.1.x86_64", "openSUSE Leap 15.3:busybox-static-1.26.2-4.5.1.aarch64", "openSUSE Leap 15.3:busybox-static-1.26.2-4.5.1.ppc64le", "openSUSE Leap 15.3:busybox-static-1.26.2-4.5.1.s390x", "openSUSE Leap 15.3:busybox-static-1.26.2-4.5.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2018-20679", url: "https://www.suse.com/security/cve/CVE-2018-20679", }, { category: "external", summary: "SUSE Bug 1121426 for CVE-2018-20679", url: "https://bugzilla.suse.com/1121426", }, { category: "external", summary: "SUSE Bug 1121428 for CVE-2018-20679", url: "https://bugzilla.suse.com/1121428", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Leap 15.3:busybox-1.26.2-4.5.1.aarch64", "openSUSE Leap 15.3:busybox-1.26.2-4.5.1.ppc64le", "openSUSE Leap 15.3:busybox-1.26.2-4.5.1.s390x", "openSUSE Leap 15.3:busybox-1.26.2-4.5.1.x86_64", "openSUSE Leap 15.3:busybox-static-1.26.2-4.5.1.aarch64", "openSUSE Leap 15.3:busybox-static-1.26.2-4.5.1.ppc64le", "openSUSE Leap 15.3:busybox-static-1.26.2-4.5.1.s390x", "openSUSE Leap 15.3:busybox-static-1.26.2-4.5.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.3, baseSeverity: "MEDIUM", vectorString: "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N", version: "3.0", }, products: [ "openSUSE Leap 15.3:busybox-1.26.2-4.5.1.aarch64", "openSUSE Leap 15.3:busybox-1.26.2-4.5.1.ppc64le", "openSUSE Leap 15.3:busybox-1.26.2-4.5.1.s390x", "openSUSE Leap 15.3:busybox-1.26.2-4.5.1.x86_64", "openSUSE Leap 15.3:busybox-static-1.26.2-4.5.1.aarch64", "openSUSE Leap 15.3:busybox-static-1.26.2-4.5.1.ppc64le", "openSUSE Leap 15.3:busybox-static-1.26.2-4.5.1.s390x", "openSUSE Leap 15.3:busybox-static-1.26.2-4.5.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2021-10-27T08:07:47Z", details: "moderate", }, ], title: "CVE-2018-20679", }, { cve: "CVE-2021-28831", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2021-28831", }, ], notes: [ { category: "general", text: "decompress_gunzip.c in BusyBox through 1.32.1 mishandles the error bit on the huft_build result pointer, with a resultant invalid free or segmentation fault, via malformed gzip data.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Leap 15.3:busybox-1.26.2-4.5.1.aarch64", "openSUSE Leap 15.3:busybox-1.26.2-4.5.1.ppc64le", "openSUSE Leap 15.3:busybox-1.26.2-4.5.1.s390x", "openSUSE Leap 15.3:busybox-1.26.2-4.5.1.x86_64", "openSUSE Leap 15.3:busybox-static-1.26.2-4.5.1.aarch64", "openSUSE Leap 15.3:busybox-static-1.26.2-4.5.1.ppc64le", "openSUSE Leap 15.3:busybox-static-1.26.2-4.5.1.s390x", "openSUSE Leap 15.3:busybox-static-1.26.2-4.5.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2021-28831", url: "https://www.suse.com/security/cve/CVE-2021-28831", }, { category: "external", summary: "SUSE Bug 1184522 for CVE-2021-28831", url: "https://bugzilla.suse.com/1184522", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Leap 15.3:busybox-1.26.2-4.5.1.aarch64", "openSUSE Leap 15.3:busybox-1.26.2-4.5.1.ppc64le", "openSUSE Leap 15.3:busybox-1.26.2-4.5.1.s390x", "openSUSE Leap 15.3:busybox-1.26.2-4.5.1.x86_64", "openSUSE Leap 15.3:busybox-static-1.26.2-4.5.1.aarch64", "openSUSE Leap 15.3:busybox-static-1.26.2-4.5.1.ppc64le", "openSUSE Leap 15.3:busybox-static-1.26.2-4.5.1.s390x", "openSUSE Leap 15.3:busybox-static-1.26.2-4.5.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 7.5, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "openSUSE Leap 15.3:busybox-1.26.2-4.5.1.aarch64", "openSUSE Leap 15.3:busybox-1.26.2-4.5.1.ppc64le", "openSUSE Leap 15.3:busybox-1.26.2-4.5.1.s390x", "openSUSE Leap 15.3:busybox-1.26.2-4.5.1.x86_64", "openSUSE Leap 15.3:busybox-static-1.26.2-4.5.1.aarch64", "openSUSE Leap 15.3:busybox-static-1.26.2-4.5.1.ppc64le", "openSUSE Leap 15.3:busybox-static-1.26.2-4.5.1.s390x", "openSUSE Leap 15.3:busybox-static-1.26.2-4.5.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2021-10-27T08:07:47Z", details: "important", }, ], title: "CVE-2021-28831", }, ], }
opensuse-su-2024:11738-1
Vulnerability from csaf_opensuse
Published
2024-06-15 00:00
Modified
2024-06-15 00:00
Summary
busybox-1.35.0-1.1 on GA media
Notes
Title of the patch
busybox-1.35.0-1.1 on GA media
Description of the patch
These are all security issues fixed in the busybox-1.35.0-1.1 package on the GA media of openSUSE Tumbleweed.
Patchnames
openSUSE-Tumbleweed-2024-11738
Terms of use
CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
{ document: { aggregate_severity: { namespace: "https://www.suse.com/support/security/rating/", text: "moderate", }, category: "csaf_security_advisory", csaf_version: "2.0", distribution: { text: "Copyright 2024 SUSE LLC. All rights reserved.", tlp: { label: "WHITE", url: "https://www.first.org/tlp/", }, }, lang: "en", notes: [ { category: "summary", text: "busybox-1.35.0-1.1 on GA media", title: "Title of the patch", }, { category: "description", text: "These are all security issues fixed in the busybox-1.35.0-1.1 package on the GA media of openSUSE Tumbleweed.", title: "Description of the patch", }, { category: "details", text: "openSUSE-Tumbleweed-2024-11738", title: "Patchnames", }, { category: "legal_disclaimer", text: "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", title: "Terms of use", }, ], publisher: { category: "vendor", contact_details: "https://www.suse.com/support/security/contact/", name: "SUSE Product Security Team", namespace: "https://www.suse.com/", }, references: [ { category: "external", summary: "SUSE ratings", url: "https://www.suse.com/support/security/rating/", }, { category: "self", summary: "URL of this CSAF notice", url: "https://ftp.suse.com/pub/projects/security/csaf/opensuse-su-2024_11738-1.json", }, { category: "self", summary: "SUSE CVE CVE-2011-5325 page", url: "https://www.suse.com/security/cve/CVE-2011-5325/", }, { category: "self", summary: "SUSE CVE CVE-2015-9261 page", url: "https://www.suse.com/security/cve/CVE-2015-9261/", }, { category: "self", summary: "SUSE CVE CVE-2016-2147 page", url: "https://www.suse.com/security/cve/CVE-2016-2147/", }, { category: "self", summary: "SUSE CVE CVE-2016-2148 page", url: "https://www.suse.com/security/cve/CVE-2016-2148/", }, { category: "self", summary: "SUSE CVE CVE-2016-6301 page", url: "https://www.suse.com/security/cve/CVE-2016-6301/", }, { category: "self", summary: "SUSE CVE CVE-2017-15873 page", url: "https://www.suse.com/security/cve/CVE-2017-15873/", }, { category: "self", summary: "SUSE CVE CVE-2017-15874 page", url: "https://www.suse.com/security/cve/CVE-2017-15874/", }, { category: "self", summary: "SUSE CVE CVE-2017-16544 page", url: "https://www.suse.com/security/cve/CVE-2017-16544/", }, { category: "self", summary: "SUSE CVE CVE-2018-1000500 page", url: "https://www.suse.com/security/cve/CVE-2018-1000500/", }, { category: "self", summary: "SUSE CVE CVE-2018-1000517 page", url: "https://www.suse.com/security/cve/CVE-2018-1000517/", }, { category: "self", summary: "SUSE CVE CVE-2018-20679 page", url: "https://www.suse.com/security/cve/CVE-2018-20679/", }, { category: "self", summary: "SUSE CVE CVE-2019-5747 page", url: "https://www.suse.com/security/cve/CVE-2019-5747/", }, { category: "self", summary: "SUSE CVE CVE-2021-28831 page", url: "https://www.suse.com/security/cve/CVE-2021-28831/", }, { category: "self", summary: "SUSE CVE CVE-2021-42373 page", url: "https://www.suse.com/security/cve/CVE-2021-42373/", }, { category: "self", summary: "SUSE CVE CVE-2021-42377 page", url: "https://www.suse.com/security/cve/CVE-2021-42377/", }, { category: "self", summary: "SUSE CVE CVE-2021-42381 page", url: "https://www.suse.com/security/cve/CVE-2021-42381/", }, { category: "self", summary: "SUSE CVE CVE-2021-42385 page", url: "https://www.suse.com/security/cve/CVE-2021-42385/", }, ], title: "busybox-1.35.0-1.1 on GA media", tracking: { current_release_date: "2024-06-15T00:00:00Z", generator: { date: "2024-06-15T00:00:00Z", engine: { name: "cve-database.git:bin/generate-csaf.pl", version: "1", }, }, id: "openSUSE-SU-2024:11738-1", initial_release_date: "2024-06-15T00:00:00Z", revision_history: [ { date: "2024-06-15T00:00:00Z", number: "1", summary: "Current version", }, ], status: "final", version: "1", }, }, product_tree: { branches: [ { branches: [ { branches: [ { category: "product_version", name: "busybox-1.35.0-1.1.aarch64", product: { name: "busybox-1.35.0-1.1.aarch64", product_id: "busybox-1.35.0-1.1.aarch64", }, }, { category: "product_version", name: "busybox-static-1.35.0-1.1.aarch64", product: { name: "busybox-static-1.35.0-1.1.aarch64", product_id: "busybox-static-1.35.0-1.1.aarch64", }, }, { category: "product_version", name: "busybox-testsuite-1.35.0-1.1.aarch64", product: { name: "busybox-testsuite-1.35.0-1.1.aarch64", product_id: "busybox-testsuite-1.35.0-1.1.aarch64", }, }, { category: "product_version", name: "busybox-warewulf3-1.35.0-1.1.aarch64", product: { name: "busybox-warewulf3-1.35.0-1.1.aarch64", product_id: "busybox-warewulf3-1.35.0-1.1.aarch64", }, }, ], category: "architecture", name: "aarch64", }, { branches: [ { category: "product_version", name: "busybox-1.35.0-1.1.ppc64le", product: { name: "busybox-1.35.0-1.1.ppc64le", product_id: "busybox-1.35.0-1.1.ppc64le", }, }, { category: "product_version", name: "busybox-static-1.35.0-1.1.ppc64le", product: { name: "busybox-static-1.35.0-1.1.ppc64le", product_id: "busybox-static-1.35.0-1.1.ppc64le", }, }, { category: "product_version", name: "busybox-testsuite-1.35.0-1.1.ppc64le", product: { name: "busybox-testsuite-1.35.0-1.1.ppc64le", product_id: "busybox-testsuite-1.35.0-1.1.ppc64le", }, }, { category: "product_version", name: "busybox-warewulf3-1.35.0-1.1.ppc64le", product: { name: "busybox-warewulf3-1.35.0-1.1.ppc64le", product_id: "busybox-warewulf3-1.35.0-1.1.ppc64le", }, }, ], category: "architecture", name: "ppc64le", }, { branches: [ { category: "product_version", name: "busybox-1.35.0-1.1.s390x", product: { name: "busybox-1.35.0-1.1.s390x", product_id: "busybox-1.35.0-1.1.s390x", }, }, { category: "product_version", name: "busybox-static-1.35.0-1.1.s390x", product: { name: "busybox-static-1.35.0-1.1.s390x", product_id: "busybox-static-1.35.0-1.1.s390x", }, }, { category: "product_version", name: "busybox-testsuite-1.35.0-1.1.s390x", product: { name: "busybox-testsuite-1.35.0-1.1.s390x", product_id: "busybox-testsuite-1.35.0-1.1.s390x", }, }, { category: "product_version", name: "busybox-warewulf3-1.35.0-1.1.s390x", product: { name: "busybox-warewulf3-1.35.0-1.1.s390x", product_id: "busybox-warewulf3-1.35.0-1.1.s390x", }, }, ], category: "architecture", name: "s390x", }, { branches: [ { category: "product_version", name: "busybox-1.35.0-1.1.x86_64", product: { name: "busybox-1.35.0-1.1.x86_64", product_id: "busybox-1.35.0-1.1.x86_64", }, }, { category: "product_version", name: "busybox-static-1.35.0-1.1.x86_64", product: { name: "busybox-static-1.35.0-1.1.x86_64", product_id: "busybox-static-1.35.0-1.1.x86_64", }, }, { category: "product_version", name: "busybox-testsuite-1.35.0-1.1.x86_64", product: { name: "busybox-testsuite-1.35.0-1.1.x86_64", product_id: "busybox-testsuite-1.35.0-1.1.x86_64", }, }, { category: "product_version", name: "busybox-warewulf3-1.35.0-1.1.x86_64", product: { name: "busybox-warewulf3-1.35.0-1.1.x86_64", product_id: "busybox-warewulf3-1.35.0-1.1.x86_64", }, }, ], category: "architecture", name: "x86_64", }, { branches: [ { category: "product_name", name: "openSUSE Tumbleweed", product: { name: "openSUSE Tumbleweed", product_id: "openSUSE Tumbleweed", product_identification_helper: { cpe: "cpe:/o:opensuse:tumbleweed", }, }, }, ], category: "product_family", name: "SUSE Linux Enterprise", }, ], category: "vendor", name: "SUSE", }, ], relationships: [ { category: "default_component_of", full_product_name: { name: "busybox-1.35.0-1.1.aarch64 as component of openSUSE Tumbleweed", product_id: "openSUSE Tumbleweed:busybox-1.35.0-1.1.aarch64", }, product_reference: "busybox-1.35.0-1.1.aarch64", relates_to_product_reference: "openSUSE Tumbleweed", }, { category: "default_component_of", full_product_name: { name: "busybox-1.35.0-1.1.ppc64le as component of openSUSE Tumbleweed", product_id: "openSUSE Tumbleweed:busybox-1.35.0-1.1.ppc64le", }, product_reference: "busybox-1.35.0-1.1.ppc64le", relates_to_product_reference: "openSUSE Tumbleweed", }, { category: "default_component_of", full_product_name: { name: "busybox-1.35.0-1.1.s390x as component of openSUSE Tumbleweed", product_id: "openSUSE Tumbleweed:busybox-1.35.0-1.1.s390x", }, product_reference: "busybox-1.35.0-1.1.s390x", relates_to_product_reference: "openSUSE Tumbleweed", }, { category: "default_component_of", full_product_name: { name: "busybox-1.35.0-1.1.x86_64 as component of openSUSE Tumbleweed", product_id: "openSUSE Tumbleweed:busybox-1.35.0-1.1.x86_64", }, product_reference: "busybox-1.35.0-1.1.x86_64", relates_to_product_reference: "openSUSE Tumbleweed", }, { category: "default_component_of", full_product_name: { name: "busybox-static-1.35.0-1.1.aarch64 as component of openSUSE Tumbleweed", product_id: "openSUSE Tumbleweed:busybox-static-1.35.0-1.1.aarch64", }, product_reference: "busybox-static-1.35.0-1.1.aarch64", relates_to_product_reference: "openSUSE Tumbleweed", }, { category: "default_component_of", full_product_name: { name: "busybox-static-1.35.0-1.1.ppc64le as component of openSUSE Tumbleweed", product_id: "openSUSE Tumbleweed:busybox-static-1.35.0-1.1.ppc64le", }, product_reference: "busybox-static-1.35.0-1.1.ppc64le", relates_to_product_reference: "openSUSE Tumbleweed", }, { category: "default_component_of", full_product_name: { name: "busybox-static-1.35.0-1.1.s390x as component of openSUSE Tumbleweed", product_id: "openSUSE Tumbleweed:busybox-static-1.35.0-1.1.s390x", }, product_reference: "busybox-static-1.35.0-1.1.s390x", relates_to_product_reference: "openSUSE Tumbleweed", }, { category: "default_component_of", full_product_name: { name: "busybox-static-1.35.0-1.1.x86_64 as component of openSUSE Tumbleweed", product_id: "openSUSE Tumbleweed:busybox-static-1.35.0-1.1.x86_64", }, product_reference: "busybox-static-1.35.0-1.1.x86_64", relates_to_product_reference: "openSUSE Tumbleweed", }, { category: "default_component_of", full_product_name: { name: "busybox-testsuite-1.35.0-1.1.aarch64 as component of openSUSE Tumbleweed", product_id: "openSUSE Tumbleweed:busybox-testsuite-1.35.0-1.1.aarch64", }, product_reference: "busybox-testsuite-1.35.0-1.1.aarch64", relates_to_product_reference: "openSUSE Tumbleweed", }, { category: "default_component_of", full_product_name: { name: "busybox-testsuite-1.35.0-1.1.ppc64le as component of openSUSE Tumbleweed", product_id: "openSUSE Tumbleweed:busybox-testsuite-1.35.0-1.1.ppc64le", }, product_reference: "busybox-testsuite-1.35.0-1.1.ppc64le", relates_to_product_reference: "openSUSE Tumbleweed", }, { category: "default_component_of", full_product_name: { name: "busybox-testsuite-1.35.0-1.1.s390x as component of openSUSE Tumbleweed", product_id: "openSUSE Tumbleweed:busybox-testsuite-1.35.0-1.1.s390x", }, product_reference: "busybox-testsuite-1.35.0-1.1.s390x", relates_to_product_reference: "openSUSE Tumbleweed", }, { category: "default_component_of", full_product_name: { name: "busybox-testsuite-1.35.0-1.1.x86_64 as component of openSUSE Tumbleweed", product_id: "openSUSE Tumbleweed:busybox-testsuite-1.35.0-1.1.x86_64", }, product_reference: "busybox-testsuite-1.35.0-1.1.x86_64", relates_to_product_reference: "openSUSE Tumbleweed", }, { category: "default_component_of", full_product_name: { name: "busybox-warewulf3-1.35.0-1.1.aarch64 as component of openSUSE Tumbleweed", product_id: "openSUSE Tumbleweed:busybox-warewulf3-1.35.0-1.1.aarch64", }, product_reference: "busybox-warewulf3-1.35.0-1.1.aarch64", relates_to_product_reference: "openSUSE Tumbleweed", }, { category: "default_component_of", full_product_name: { name: "busybox-warewulf3-1.35.0-1.1.ppc64le as component of openSUSE Tumbleweed", product_id: "openSUSE Tumbleweed:busybox-warewulf3-1.35.0-1.1.ppc64le", }, product_reference: "busybox-warewulf3-1.35.0-1.1.ppc64le", relates_to_product_reference: "openSUSE Tumbleweed", }, { category: "default_component_of", full_product_name: { name: "busybox-warewulf3-1.35.0-1.1.s390x as component of openSUSE Tumbleweed", product_id: "openSUSE Tumbleweed:busybox-warewulf3-1.35.0-1.1.s390x", }, product_reference: "busybox-warewulf3-1.35.0-1.1.s390x", relates_to_product_reference: "openSUSE Tumbleweed", }, { category: "default_component_of", full_product_name: { name: "busybox-warewulf3-1.35.0-1.1.x86_64 as component of openSUSE Tumbleweed", product_id: "openSUSE Tumbleweed:busybox-warewulf3-1.35.0-1.1.x86_64", }, product_reference: "busybox-warewulf3-1.35.0-1.1.x86_64", relates_to_product_reference: "openSUSE Tumbleweed", }, ], }, vulnerabilities: [ { cve: "CVE-2011-5325", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2011-5325", }, ], notes: [ { category: "general", text: "Directory traversal vulnerability in the BusyBox implementation of tar before 1.22.0 v5 allows remote attackers to point to files outside the current working directory via a symlink.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:busybox-1.35.0-1.1.aarch64", "openSUSE Tumbleweed:busybox-1.35.0-1.1.ppc64le", "openSUSE Tumbleweed:busybox-1.35.0-1.1.s390x", "openSUSE Tumbleweed:busybox-1.35.0-1.1.x86_64", "openSUSE Tumbleweed:busybox-static-1.35.0-1.1.aarch64", "openSUSE Tumbleweed:busybox-static-1.35.0-1.1.ppc64le", "openSUSE Tumbleweed:busybox-static-1.35.0-1.1.s390x", "openSUSE Tumbleweed:busybox-static-1.35.0-1.1.x86_64", "openSUSE Tumbleweed:busybox-testsuite-1.35.0-1.1.aarch64", "openSUSE Tumbleweed:busybox-testsuite-1.35.0-1.1.ppc64le", "openSUSE Tumbleweed:busybox-testsuite-1.35.0-1.1.s390x", "openSUSE Tumbleweed:busybox-testsuite-1.35.0-1.1.x86_64", "openSUSE Tumbleweed:busybox-warewulf3-1.35.0-1.1.aarch64", "openSUSE Tumbleweed:busybox-warewulf3-1.35.0-1.1.ppc64le", "openSUSE Tumbleweed:busybox-warewulf3-1.35.0-1.1.s390x", "openSUSE Tumbleweed:busybox-warewulf3-1.35.0-1.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2011-5325", url: "https://www.suse.com/security/cve/CVE-2011-5325", }, { category: "external", summary: "SUSE Bug 951562 for CVE-2011-5325", url: "https://bugzilla.suse.com/951562", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:busybox-1.35.0-1.1.aarch64", "openSUSE Tumbleweed:busybox-1.35.0-1.1.ppc64le", "openSUSE Tumbleweed:busybox-1.35.0-1.1.s390x", "openSUSE Tumbleweed:busybox-1.35.0-1.1.x86_64", "openSUSE Tumbleweed:busybox-static-1.35.0-1.1.aarch64", "openSUSE Tumbleweed:busybox-static-1.35.0-1.1.ppc64le", "openSUSE Tumbleweed:busybox-static-1.35.0-1.1.s390x", "openSUSE Tumbleweed:busybox-static-1.35.0-1.1.x86_64", "openSUSE Tumbleweed:busybox-testsuite-1.35.0-1.1.aarch64", "openSUSE Tumbleweed:busybox-testsuite-1.35.0-1.1.ppc64le", "openSUSE Tumbleweed:busybox-testsuite-1.35.0-1.1.s390x", "openSUSE Tumbleweed:busybox-testsuite-1.35.0-1.1.x86_64", "openSUSE Tumbleweed:busybox-warewulf3-1.35.0-1.1.aarch64", "openSUSE Tumbleweed:busybox-warewulf3-1.35.0-1.1.ppc64le", "openSUSE Tumbleweed:busybox-warewulf3-1.35.0-1.1.s390x", "openSUSE Tumbleweed:busybox-warewulf3-1.35.0-1.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 7.5, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N", version: "3.1", }, products: [ "openSUSE Tumbleweed:busybox-1.35.0-1.1.aarch64", "openSUSE Tumbleweed:busybox-1.35.0-1.1.ppc64le", "openSUSE Tumbleweed:busybox-1.35.0-1.1.s390x", "openSUSE Tumbleweed:busybox-1.35.0-1.1.x86_64", "openSUSE Tumbleweed:busybox-static-1.35.0-1.1.aarch64", "openSUSE Tumbleweed:busybox-static-1.35.0-1.1.ppc64le", "openSUSE Tumbleweed:busybox-static-1.35.0-1.1.s390x", "openSUSE Tumbleweed:busybox-static-1.35.0-1.1.x86_64", "openSUSE Tumbleweed:busybox-testsuite-1.35.0-1.1.aarch64", "openSUSE Tumbleweed:busybox-testsuite-1.35.0-1.1.ppc64le", "openSUSE Tumbleweed:busybox-testsuite-1.35.0-1.1.s390x", "openSUSE Tumbleweed:busybox-testsuite-1.35.0-1.1.x86_64", "openSUSE Tumbleweed:busybox-warewulf3-1.35.0-1.1.aarch64", "openSUSE Tumbleweed:busybox-warewulf3-1.35.0-1.1.ppc64le", "openSUSE Tumbleweed:busybox-warewulf3-1.35.0-1.1.s390x", "openSUSE Tumbleweed:busybox-warewulf3-1.35.0-1.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "moderate", }, ], title: "CVE-2011-5325", }, { cve: "CVE-2015-9261", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2015-9261", }, ], notes: [ { category: "general", text: "huft_build in archival/libarchive/decompress_gunzip.c in BusyBox before 1.27.2 misuses a pointer, causing segfaults and an application crash during an unzip operation on a specially crafted ZIP file.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:busybox-1.35.0-1.1.aarch64", "openSUSE Tumbleweed:busybox-1.35.0-1.1.ppc64le", "openSUSE Tumbleweed:busybox-1.35.0-1.1.s390x", "openSUSE Tumbleweed:busybox-1.35.0-1.1.x86_64", "openSUSE Tumbleweed:busybox-static-1.35.0-1.1.aarch64", "openSUSE Tumbleweed:busybox-static-1.35.0-1.1.ppc64le", "openSUSE Tumbleweed:busybox-static-1.35.0-1.1.s390x", "openSUSE Tumbleweed:busybox-static-1.35.0-1.1.x86_64", "openSUSE Tumbleweed:busybox-testsuite-1.35.0-1.1.aarch64", "openSUSE Tumbleweed:busybox-testsuite-1.35.0-1.1.ppc64le", "openSUSE Tumbleweed:busybox-testsuite-1.35.0-1.1.s390x", "openSUSE Tumbleweed:busybox-testsuite-1.35.0-1.1.x86_64", "openSUSE Tumbleweed:busybox-warewulf3-1.35.0-1.1.aarch64", "openSUSE Tumbleweed:busybox-warewulf3-1.35.0-1.1.ppc64le", "openSUSE Tumbleweed:busybox-warewulf3-1.35.0-1.1.s390x", "openSUSE Tumbleweed:busybox-warewulf3-1.35.0-1.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2015-9261", url: "https://www.suse.com/security/cve/CVE-2015-9261", }, { category: "external", summary: "SUSE Bug 1102912 for CVE-2015-9261", url: "https://bugzilla.suse.com/1102912", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:busybox-1.35.0-1.1.aarch64", "openSUSE Tumbleweed:busybox-1.35.0-1.1.ppc64le", "openSUSE Tumbleweed:busybox-1.35.0-1.1.s390x", "openSUSE Tumbleweed:busybox-1.35.0-1.1.x86_64", "openSUSE Tumbleweed:busybox-static-1.35.0-1.1.aarch64", "openSUSE Tumbleweed:busybox-static-1.35.0-1.1.ppc64le", "openSUSE Tumbleweed:busybox-static-1.35.0-1.1.s390x", "openSUSE Tumbleweed:busybox-static-1.35.0-1.1.x86_64", "openSUSE Tumbleweed:busybox-testsuite-1.35.0-1.1.aarch64", "openSUSE Tumbleweed:busybox-testsuite-1.35.0-1.1.ppc64le", "openSUSE Tumbleweed:busybox-testsuite-1.35.0-1.1.s390x", "openSUSE Tumbleweed:busybox-testsuite-1.35.0-1.1.x86_64", "openSUSE Tumbleweed:busybox-warewulf3-1.35.0-1.1.aarch64", "openSUSE Tumbleweed:busybox-warewulf3-1.35.0-1.1.ppc64le", "openSUSE Tumbleweed:busybox-warewulf3-1.35.0-1.1.s390x", "openSUSE Tumbleweed:busybox-warewulf3-1.35.0-1.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.5, baseSeverity: "MEDIUM", vectorString: "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", version: "3.0", }, products: [ "openSUSE Tumbleweed:busybox-1.35.0-1.1.aarch64", "openSUSE Tumbleweed:busybox-1.35.0-1.1.ppc64le", "openSUSE Tumbleweed:busybox-1.35.0-1.1.s390x", "openSUSE Tumbleweed:busybox-1.35.0-1.1.x86_64", "openSUSE Tumbleweed:busybox-static-1.35.0-1.1.aarch64", "openSUSE Tumbleweed:busybox-static-1.35.0-1.1.ppc64le", "openSUSE Tumbleweed:busybox-static-1.35.0-1.1.s390x", "openSUSE Tumbleweed:busybox-static-1.35.0-1.1.x86_64", "openSUSE Tumbleweed:busybox-testsuite-1.35.0-1.1.aarch64", "openSUSE Tumbleweed:busybox-testsuite-1.35.0-1.1.ppc64le", "openSUSE Tumbleweed:busybox-testsuite-1.35.0-1.1.s390x", "openSUSE Tumbleweed:busybox-testsuite-1.35.0-1.1.x86_64", "openSUSE Tumbleweed:busybox-warewulf3-1.35.0-1.1.aarch64", "openSUSE Tumbleweed:busybox-warewulf3-1.35.0-1.1.ppc64le", "openSUSE Tumbleweed:busybox-warewulf3-1.35.0-1.1.s390x", "openSUSE Tumbleweed:busybox-warewulf3-1.35.0-1.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "moderate", }, ], title: "CVE-2015-9261", }, { cve: "CVE-2016-2147", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2016-2147", }, ], notes: [ { category: "general", text: "Integer overflow in the DHCP client (udhcpc) in BusyBox before 1.25.0 allows remote attackers to cause a denial of service (crash) via a malformed RFC1035-encoded domain name, which triggers an out-of-bounds heap write.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:busybox-1.35.0-1.1.aarch64", "openSUSE Tumbleweed:busybox-1.35.0-1.1.ppc64le", "openSUSE Tumbleweed:busybox-1.35.0-1.1.s390x", "openSUSE Tumbleweed:busybox-1.35.0-1.1.x86_64", "openSUSE Tumbleweed:busybox-static-1.35.0-1.1.aarch64", "openSUSE Tumbleweed:busybox-static-1.35.0-1.1.ppc64le", "openSUSE Tumbleweed:busybox-static-1.35.0-1.1.s390x", "openSUSE Tumbleweed:busybox-static-1.35.0-1.1.x86_64", "openSUSE Tumbleweed:busybox-testsuite-1.35.0-1.1.aarch64", "openSUSE Tumbleweed:busybox-testsuite-1.35.0-1.1.ppc64le", "openSUSE Tumbleweed:busybox-testsuite-1.35.0-1.1.s390x", "openSUSE Tumbleweed:busybox-testsuite-1.35.0-1.1.x86_64", "openSUSE Tumbleweed:busybox-warewulf3-1.35.0-1.1.aarch64", "openSUSE Tumbleweed:busybox-warewulf3-1.35.0-1.1.ppc64le", "openSUSE Tumbleweed:busybox-warewulf3-1.35.0-1.1.s390x", "openSUSE Tumbleweed:busybox-warewulf3-1.35.0-1.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2016-2147", url: "https://www.suse.com/security/cve/CVE-2016-2147", }, { category: "external", summary: "SUSE Bug 970663 for CVE-2016-2147", url: "https://bugzilla.suse.com/970663", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:busybox-1.35.0-1.1.aarch64", "openSUSE Tumbleweed:busybox-1.35.0-1.1.ppc64le", "openSUSE Tumbleweed:busybox-1.35.0-1.1.s390x", "openSUSE Tumbleweed:busybox-1.35.0-1.1.x86_64", "openSUSE Tumbleweed:busybox-static-1.35.0-1.1.aarch64", "openSUSE Tumbleweed:busybox-static-1.35.0-1.1.ppc64le", "openSUSE Tumbleweed:busybox-static-1.35.0-1.1.s390x", "openSUSE Tumbleweed:busybox-static-1.35.0-1.1.x86_64", "openSUSE Tumbleweed:busybox-testsuite-1.35.0-1.1.aarch64", "openSUSE Tumbleweed:busybox-testsuite-1.35.0-1.1.ppc64le", "openSUSE Tumbleweed:busybox-testsuite-1.35.0-1.1.s390x", "openSUSE Tumbleweed:busybox-testsuite-1.35.0-1.1.x86_64", "openSUSE Tumbleweed:busybox-warewulf3-1.35.0-1.1.aarch64", "openSUSE Tumbleweed:busybox-warewulf3-1.35.0-1.1.ppc64le", "openSUSE Tumbleweed:busybox-warewulf3-1.35.0-1.1.s390x", "openSUSE Tumbleweed:busybox-warewulf3-1.35.0-1.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 7.5, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "openSUSE Tumbleweed:busybox-1.35.0-1.1.aarch64", "openSUSE Tumbleweed:busybox-1.35.0-1.1.ppc64le", "openSUSE Tumbleweed:busybox-1.35.0-1.1.s390x", "openSUSE Tumbleweed:busybox-1.35.0-1.1.x86_64", "openSUSE Tumbleweed:busybox-static-1.35.0-1.1.aarch64", "openSUSE Tumbleweed:busybox-static-1.35.0-1.1.ppc64le", "openSUSE Tumbleweed:busybox-static-1.35.0-1.1.s390x", "openSUSE Tumbleweed:busybox-static-1.35.0-1.1.x86_64", "openSUSE Tumbleweed:busybox-testsuite-1.35.0-1.1.aarch64", "openSUSE Tumbleweed:busybox-testsuite-1.35.0-1.1.ppc64le", "openSUSE Tumbleweed:busybox-testsuite-1.35.0-1.1.s390x", "openSUSE Tumbleweed:busybox-testsuite-1.35.0-1.1.x86_64", "openSUSE Tumbleweed:busybox-warewulf3-1.35.0-1.1.aarch64", "openSUSE Tumbleweed:busybox-warewulf3-1.35.0-1.1.ppc64le", "openSUSE Tumbleweed:busybox-warewulf3-1.35.0-1.1.s390x", "openSUSE Tumbleweed:busybox-warewulf3-1.35.0-1.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "important", }, ], title: "CVE-2016-2147", }, { cve: "CVE-2016-2148", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2016-2148", }, ], notes: [ { category: "general", text: "Heap-based buffer overflow in the DHCP client (udhcpc) in BusyBox before 1.25.0 allows remote attackers to have unspecified impact via vectors involving OPTION_6RD parsing.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:busybox-1.35.0-1.1.aarch64", "openSUSE Tumbleweed:busybox-1.35.0-1.1.ppc64le", "openSUSE Tumbleweed:busybox-1.35.0-1.1.s390x", "openSUSE Tumbleweed:busybox-1.35.0-1.1.x86_64", "openSUSE Tumbleweed:busybox-static-1.35.0-1.1.aarch64", "openSUSE Tumbleweed:busybox-static-1.35.0-1.1.ppc64le", "openSUSE Tumbleweed:busybox-static-1.35.0-1.1.s390x", "openSUSE Tumbleweed:busybox-static-1.35.0-1.1.x86_64", "openSUSE Tumbleweed:busybox-testsuite-1.35.0-1.1.aarch64", "openSUSE Tumbleweed:busybox-testsuite-1.35.0-1.1.ppc64le", "openSUSE Tumbleweed:busybox-testsuite-1.35.0-1.1.s390x", "openSUSE Tumbleweed:busybox-testsuite-1.35.0-1.1.x86_64", "openSUSE Tumbleweed:busybox-warewulf3-1.35.0-1.1.aarch64", "openSUSE Tumbleweed:busybox-warewulf3-1.35.0-1.1.ppc64le", "openSUSE Tumbleweed:busybox-warewulf3-1.35.0-1.1.s390x", "openSUSE Tumbleweed:busybox-warewulf3-1.35.0-1.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2016-2148", url: "https://www.suse.com/security/cve/CVE-2016-2148", }, { category: "external", summary: "SUSE Bug 970662 for CVE-2016-2148", url: "https://bugzilla.suse.com/970662", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:busybox-1.35.0-1.1.aarch64", "openSUSE Tumbleweed:busybox-1.35.0-1.1.ppc64le", "openSUSE Tumbleweed:busybox-1.35.0-1.1.s390x", "openSUSE Tumbleweed:busybox-1.35.0-1.1.x86_64", "openSUSE Tumbleweed:busybox-static-1.35.0-1.1.aarch64", "openSUSE Tumbleweed:busybox-static-1.35.0-1.1.ppc64le", "openSUSE Tumbleweed:busybox-static-1.35.0-1.1.s390x", "openSUSE Tumbleweed:busybox-static-1.35.0-1.1.x86_64", "openSUSE Tumbleweed:busybox-testsuite-1.35.0-1.1.aarch64", "openSUSE Tumbleweed:busybox-testsuite-1.35.0-1.1.ppc64le", "openSUSE Tumbleweed:busybox-testsuite-1.35.0-1.1.s390x", "openSUSE Tumbleweed:busybox-testsuite-1.35.0-1.1.x86_64", "openSUSE Tumbleweed:busybox-warewulf3-1.35.0-1.1.aarch64", "openSUSE Tumbleweed:busybox-warewulf3-1.35.0-1.1.ppc64le", "openSUSE Tumbleweed:busybox-warewulf3-1.35.0-1.1.s390x", "openSUSE Tumbleweed:busybox-warewulf3-1.35.0-1.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 9.8, baseSeverity: "CRITICAL", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, products: [ "openSUSE Tumbleweed:busybox-1.35.0-1.1.aarch64", "openSUSE Tumbleweed:busybox-1.35.0-1.1.ppc64le", "openSUSE Tumbleweed:busybox-1.35.0-1.1.s390x", "openSUSE Tumbleweed:busybox-1.35.0-1.1.x86_64", "openSUSE Tumbleweed:busybox-static-1.35.0-1.1.aarch64", "openSUSE Tumbleweed:busybox-static-1.35.0-1.1.ppc64le", "openSUSE Tumbleweed:busybox-static-1.35.0-1.1.s390x", "openSUSE Tumbleweed:busybox-static-1.35.0-1.1.x86_64", "openSUSE Tumbleweed:busybox-testsuite-1.35.0-1.1.aarch64", "openSUSE Tumbleweed:busybox-testsuite-1.35.0-1.1.ppc64le", "openSUSE Tumbleweed:busybox-testsuite-1.35.0-1.1.s390x", "openSUSE Tumbleweed:busybox-testsuite-1.35.0-1.1.x86_64", "openSUSE Tumbleweed:busybox-warewulf3-1.35.0-1.1.aarch64", "openSUSE Tumbleweed:busybox-warewulf3-1.35.0-1.1.ppc64le", "openSUSE Tumbleweed:busybox-warewulf3-1.35.0-1.1.s390x", "openSUSE Tumbleweed:busybox-warewulf3-1.35.0-1.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "moderate", }, ], title: "CVE-2016-2148", }, { cve: "CVE-2016-6301", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2016-6301", }, ], notes: [ { category: "general", text: "The recv_and_process_client_pkt function in networking/ntpd.c in busybox allows remote attackers to cause a denial of service (CPU and bandwidth consumption) via a forged NTP packet, which triggers a communication loop.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:busybox-1.35.0-1.1.aarch64", "openSUSE Tumbleweed:busybox-1.35.0-1.1.ppc64le", "openSUSE Tumbleweed:busybox-1.35.0-1.1.s390x", "openSUSE Tumbleweed:busybox-1.35.0-1.1.x86_64", "openSUSE Tumbleweed:busybox-static-1.35.0-1.1.aarch64", "openSUSE Tumbleweed:busybox-static-1.35.0-1.1.ppc64le", "openSUSE Tumbleweed:busybox-static-1.35.0-1.1.s390x", "openSUSE Tumbleweed:busybox-static-1.35.0-1.1.x86_64", "openSUSE Tumbleweed:busybox-testsuite-1.35.0-1.1.aarch64", "openSUSE Tumbleweed:busybox-testsuite-1.35.0-1.1.ppc64le", "openSUSE Tumbleweed:busybox-testsuite-1.35.0-1.1.s390x", "openSUSE Tumbleweed:busybox-testsuite-1.35.0-1.1.x86_64", "openSUSE Tumbleweed:busybox-warewulf3-1.35.0-1.1.aarch64", "openSUSE Tumbleweed:busybox-warewulf3-1.35.0-1.1.ppc64le", "openSUSE Tumbleweed:busybox-warewulf3-1.35.0-1.1.s390x", "openSUSE Tumbleweed:busybox-warewulf3-1.35.0-1.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2016-6301", url: "https://www.suse.com/security/cve/CVE-2016-6301", }, { category: "external", summary: "SUSE Bug 991940 for CVE-2016-6301", url: "https://bugzilla.suse.com/991940", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:busybox-1.35.0-1.1.aarch64", "openSUSE Tumbleweed:busybox-1.35.0-1.1.ppc64le", "openSUSE Tumbleweed:busybox-1.35.0-1.1.s390x", "openSUSE Tumbleweed:busybox-1.35.0-1.1.x86_64", "openSUSE Tumbleweed:busybox-static-1.35.0-1.1.aarch64", "openSUSE Tumbleweed:busybox-static-1.35.0-1.1.ppc64le", "openSUSE Tumbleweed:busybox-static-1.35.0-1.1.s390x", "openSUSE Tumbleweed:busybox-static-1.35.0-1.1.x86_64", "openSUSE Tumbleweed:busybox-testsuite-1.35.0-1.1.aarch64", "openSUSE Tumbleweed:busybox-testsuite-1.35.0-1.1.ppc64le", "openSUSE Tumbleweed:busybox-testsuite-1.35.0-1.1.s390x", "openSUSE Tumbleweed:busybox-testsuite-1.35.0-1.1.x86_64", "openSUSE Tumbleweed:busybox-warewulf3-1.35.0-1.1.aarch64", "openSUSE Tumbleweed:busybox-warewulf3-1.35.0-1.1.ppc64le", "openSUSE Tumbleweed:busybox-warewulf3-1.35.0-1.1.s390x", "openSUSE Tumbleweed:busybox-warewulf3-1.35.0-1.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 7.5, baseSeverity: "HIGH", vectorString: "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", version: "3.0", }, products: [ "openSUSE Tumbleweed:busybox-1.35.0-1.1.aarch64", "openSUSE Tumbleweed:busybox-1.35.0-1.1.ppc64le", "openSUSE Tumbleweed:busybox-1.35.0-1.1.s390x", "openSUSE Tumbleweed:busybox-1.35.0-1.1.x86_64", "openSUSE Tumbleweed:busybox-static-1.35.0-1.1.aarch64", "openSUSE Tumbleweed:busybox-static-1.35.0-1.1.ppc64le", "openSUSE Tumbleweed:busybox-static-1.35.0-1.1.s390x", "openSUSE Tumbleweed:busybox-static-1.35.0-1.1.x86_64", "openSUSE Tumbleweed:busybox-testsuite-1.35.0-1.1.aarch64", "openSUSE Tumbleweed:busybox-testsuite-1.35.0-1.1.ppc64le", "openSUSE Tumbleweed:busybox-testsuite-1.35.0-1.1.s390x", "openSUSE Tumbleweed:busybox-testsuite-1.35.0-1.1.x86_64", "openSUSE Tumbleweed:busybox-warewulf3-1.35.0-1.1.aarch64", "openSUSE Tumbleweed:busybox-warewulf3-1.35.0-1.1.ppc64le", "openSUSE Tumbleweed:busybox-warewulf3-1.35.0-1.1.s390x", "openSUSE Tumbleweed:busybox-warewulf3-1.35.0-1.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "moderate", }, ], title: "CVE-2016-6301", }, { cve: "CVE-2017-15873", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2017-15873", }, ], notes: [ { category: "general", text: "The get_next_block function in archival/libarchive/decompress_bunzip2.c in BusyBox 1.27.2 has an Integer Overflow that may lead to a write access violation.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:busybox-1.35.0-1.1.aarch64", "openSUSE Tumbleweed:busybox-1.35.0-1.1.ppc64le", "openSUSE Tumbleweed:busybox-1.35.0-1.1.s390x", "openSUSE Tumbleweed:busybox-1.35.0-1.1.x86_64", "openSUSE Tumbleweed:busybox-static-1.35.0-1.1.aarch64", "openSUSE Tumbleweed:busybox-static-1.35.0-1.1.ppc64le", "openSUSE Tumbleweed:busybox-static-1.35.0-1.1.s390x", "openSUSE Tumbleweed:busybox-static-1.35.0-1.1.x86_64", "openSUSE Tumbleweed:busybox-testsuite-1.35.0-1.1.aarch64", "openSUSE Tumbleweed:busybox-testsuite-1.35.0-1.1.ppc64le", "openSUSE Tumbleweed:busybox-testsuite-1.35.0-1.1.s390x", "openSUSE Tumbleweed:busybox-testsuite-1.35.0-1.1.x86_64", "openSUSE Tumbleweed:busybox-warewulf3-1.35.0-1.1.aarch64", "openSUSE Tumbleweed:busybox-warewulf3-1.35.0-1.1.ppc64le", "openSUSE Tumbleweed:busybox-warewulf3-1.35.0-1.1.s390x", "openSUSE Tumbleweed:busybox-warewulf3-1.35.0-1.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2017-15873", url: "https://www.suse.com/security/cve/CVE-2017-15873", }, { category: "external", summary: "SUSE Bug 1064976 for CVE-2017-15873", url: "https://bugzilla.suse.com/1064976", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:busybox-1.35.0-1.1.aarch64", "openSUSE Tumbleweed:busybox-1.35.0-1.1.ppc64le", "openSUSE Tumbleweed:busybox-1.35.0-1.1.s390x", "openSUSE Tumbleweed:busybox-1.35.0-1.1.x86_64", "openSUSE Tumbleweed:busybox-static-1.35.0-1.1.aarch64", "openSUSE Tumbleweed:busybox-static-1.35.0-1.1.ppc64le", "openSUSE Tumbleweed:busybox-static-1.35.0-1.1.s390x", "openSUSE Tumbleweed:busybox-static-1.35.0-1.1.x86_64", "openSUSE Tumbleweed:busybox-testsuite-1.35.0-1.1.aarch64", "openSUSE Tumbleweed:busybox-testsuite-1.35.0-1.1.ppc64le", "openSUSE Tumbleweed:busybox-testsuite-1.35.0-1.1.s390x", "openSUSE Tumbleweed:busybox-testsuite-1.35.0-1.1.x86_64", "openSUSE Tumbleweed:busybox-warewulf3-1.35.0-1.1.aarch64", "openSUSE Tumbleweed:busybox-warewulf3-1.35.0-1.1.ppc64le", "openSUSE Tumbleweed:busybox-warewulf3-1.35.0-1.1.s390x", "openSUSE Tumbleweed:busybox-warewulf3-1.35.0-1.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 7.8, baseSeverity: "HIGH", vectorString: "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", version: "3.0", }, products: [ "openSUSE Tumbleweed:busybox-1.35.0-1.1.aarch64", "openSUSE Tumbleweed:busybox-1.35.0-1.1.ppc64le", "openSUSE Tumbleweed:busybox-1.35.0-1.1.s390x", "openSUSE Tumbleweed:busybox-1.35.0-1.1.x86_64", "openSUSE Tumbleweed:busybox-static-1.35.0-1.1.aarch64", "openSUSE Tumbleweed:busybox-static-1.35.0-1.1.ppc64le", "openSUSE Tumbleweed:busybox-static-1.35.0-1.1.s390x", "openSUSE Tumbleweed:busybox-static-1.35.0-1.1.x86_64", "openSUSE Tumbleweed:busybox-testsuite-1.35.0-1.1.aarch64", "openSUSE Tumbleweed:busybox-testsuite-1.35.0-1.1.ppc64le", "openSUSE Tumbleweed:busybox-testsuite-1.35.0-1.1.s390x", "openSUSE Tumbleweed:busybox-testsuite-1.35.0-1.1.x86_64", "openSUSE Tumbleweed:busybox-warewulf3-1.35.0-1.1.aarch64", "openSUSE Tumbleweed:busybox-warewulf3-1.35.0-1.1.ppc64le", "openSUSE Tumbleweed:busybox-warewulf3-1.35.0-1.1.s390x", "openSUSE Tumbleweed:busybox-warewulf3-1.35.0-1.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "moderate", }, ], title: "CVE-2017-15873", }, { cve: "CVE-2017-15874", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2017-15874", }, ], notes: [ { category: "general", text: "archival/libarchive/decompress_unlzma.c in BusyBox 1.27.2 has an Integer Underflow that leads to a read access violation.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:busybox-1.35.0-1.1.aarch64", "openSUSE Tumbleweed:busybox-1.35.0-1.1.ppc64le", "openSUSE Tumbleweed:busybox-1.35.0-1.1.s390x", "openSUSE Tumbleweed:busybox-1.35.0-1.1.x86_64", "openSUSE Tumbleweed:busybox-static-1.35.0-1.1.aarch64", "openSUSE Tumbleweed:busybox-static-1.35.0-1.1.ppc64le", "openSUSE Tumbleweed:busybox-static-1.35.0-1.1.s390x", "openSUSE Tumbleweed:busybox-static-1.35.0-1.1.x86_64", "openSUSE Tumbleweed:busybox-testsuite-1.35.0-1.1.aarch64", "openSUSE Tumbleweed:busybox-testsuite-1.35.0-1.1.ppc64le", "openSUSE Tumbleweed:busybox-testsuite-1.35.0-1.1.s390x", "openSUSE Tumbleweed:busybox-testsuite-1.35.0-1.1.x86_64", "openSUSE Tumbleweed:busybox-warewulf3-1.35.0-1.1.aarch64", "openSUSE Tumbleweed:busybox-warewulf3-1.35.0-1.1.ppc64le", "openSUSE Tumbleweed:busybox-warewulf3-1.35.0-1.1.s390x", "openSUSE Tumbleweed:busybox-warewulf3-1.35.0-1.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2017-15874", url: "https://www.suse.com/security/cve/CVE-2017-15874", }, { category: "external", summary: "SUSE Bug 1064978 for CVE-2017-15874", url: "https://bugzilla.suse.com/1064978", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:busybox-1.35.0-1.1.aarch64", "openSUSE Tumbleweed:busybox-1.35.0-1.1.ppc64le", "openSUSE Tumbleweed:busybox-1.35.0-1.1.s390x", "openSUSE Tumbleweed:busybox-1.35.0-1.1.x86_64", "openSUSE Tumbleweed:busybox-static-1.35.0-1.1.aarch64", "openSUSE Tumbleweed:busybox-static-1.35.0-1.1.ppc64le", "openSUSE Tumbleweed:busybox-static-1.35.0-1.1.s390x", "openSUSE Tumbleweed:busybox-static-1.35.0-1.1.x86_64", "openSUSE Tumbleweed:busybox-testsuite-1.35.0-1.1.aarch64", "openSUSE Tumbleweed:busybox-testsuite-1.35.0-1.1.ppc64le", "openSUSE Tumbleweed:busybox-testsuite-1.35.0-1.1.s390x", "openSUSE Tumbleweed:busybox-testsuite-1.35.0-1.1.x86_64", "openSUSE Tumbleweed:busybox-warewulf3-1.35.0-1.1.aarch64", "openSUSE Tumbleweed:busybox-warewulf3-1.35.0-1.1.ppc64le", "openSUSE Tumbleweed:busybox-warewulf3-1.35.0-1.1.s390x", "openSUSE Tumbleweed:busybox-warewulf3-1.35.0-1.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 3.3, baseSeverity: "LOW", vectorString: "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L", version: "3.0", }, products: [ "openSUSE Tumbleweed:busybox-1.35.0-1.1.aarch64", "openSUSE Tumbleweed:busybox-1.35.0-1.1.ppc64le", "openSUSE Tumbleweed:busybox-1.35.0-1.1.s390x", "openSUSE Tumbleweed:busybox-1.35.0-1.1.x86_64", "openSUSE Tumbleweed:busybox-static-1.35.0-1.1.aarch64", "openSUSE Tumbleweed:busybox-static-1.35.0-1.1.ppc64le", "openSUSE Tumbleweed:busybox-static-1.35.0-1.1.s390x", "openSUSE Tumbleweed:busybox-static-1.35.0-1.1.x86_64", "openSUSE Tumbleweed:busybox-testsuite-1.35.0-1.1.aarch64", "openSUSE Tumbleweed:busybox-testsuite-1.35.0-1.1.ppc64le", "openSUSE Tumbleweed:busybox-testsuite-1.35.0-1.1.s390x", "openSUSE Tumbleweed:busybox-testsuite-1.35.0-1.1.x86_64", "openSUSE Tumbleweed:busybox-warewulf3-1.35.0-1.1.aarch64", "openSUSE Tumbleweed:busybox-warewulf3-1.35.0-1.1.ppc64le", "openSUSE Tumbleweed:busybox-warewulf3-1.35.0-1.1.s390x", "openSUSE Tumbleweed:busybox-warewulf3-1.35.0-1.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "low", }, ], title: "CVE-2017-15874", }, { cve: "CVE-2017-16544", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2017-16544", }, ], notes: [ { category: "general", text: "In the add_match function in libbb/lineedit.c in BusyBox through 1.27.2, the tab autocomplete feature of the shell, used to get a list of filenames in a directory, does not sanitize filenames and results in executing any escape sequence in the terminal. This could potentially result in code execution, arbitrary file writes, or other attacks.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:busybox-1.35.0-1.1.aarch64", "openSUSE Tumbleweed:busybox-1.35.0-1.1.ppc64le", "openSUSE Tumbleweed:busybox-1.35.0-1.1.s390x", "openSUSE Tumbleweed:busybox-1.35.0-1.1.x86_64", "openSUSE Tumbleweed:busybox-static-1.35.0-1.1.aarch64", "openSUSE Tumbleweed:busybox-static-1.35.0-1.1.ppc64le", "openSUSE Tumbleweed:busybox-static-1.35.0-1.1.s390x", "openSUSE Tumbleweed:busybox-static-1.35.0-1.1.x86_64", "openSUSE Tumbleweed:busybox-testsuite-1.35.0-1.1.aarch64", "openSUSE Tumbleweed:busybox-testsuite-1.35.0-1.1.ppc64le", "openSUSE Tumbleweed:busybox-testsuite-1.35.0-1.1.s390x", "openSUSE Tumbleweed:busybox-testsuite-1.35.0-1.1.x86_64", "openSUSE Tumbleweed:busybox-warewulf3-1.35.0-1.1.aarch64", "openSUSE Tumbleweed:busybox-warewulf3-1.35.0-1.1.ppc64le", "openSUSE Tumbleweed:busybox-warewulf3-1.35.0-1.1.s390x", "openSUSE Tumbleweed:busybox-warewulf3-1.35.0-1.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2017-16544", url: "https://www.suse.com/security/cve/CVE-2017-16544", }, { category: "external", summary: "SUSE Bug 1069412 for CVE-2017-16544", url: "https://bugzilla.suse.com/1069412", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:busybox-1.35.0-1.1.aarch64", "openSUSE Tumbleweed:busybox-1.35.0-1.1.ppc64le", "openSUSE Tumbleweed:busybox-1.35.0-1.1.s390x", "openSUSE Tumbleweed:busybox-1.35.0-1.1.x86_64", "openSUSE Tumbleweed:busybox-static-1.35.0-1.1.aarch64", "openSUSE Tumbleweed:busybox-static-1.35.0-1.1.ppc64le", "openSUSE Tumbleweed:busybox-static-1.35.0-1.1.s390x", "openSUSE Tumbleweed:busybox-static-1.35.0-1.1.x86_64", "openSUSE Tumbleweed:busybox-testsuite-1.35.0-1.1.aarch64", "openSUSE Tumbleweed:busybox-testsuite-1.35.0-1.1.ppc64le", "openSUSE Tumbleweed:busybox-testsuite-1.35.0-1.1.s390x", "openSUSE Tumbleweed:busybox-testsuite-1.35.0-1.1.x86_64", "openSUSE Tumbleweed:busybox-warewulf3-1.35.0-1.1.aarch64", "openSUSE Tumbleweed:busybox-warewulf3-1.35.0-1.1.ppc64le", "openSUSE Tumbleweed:busybox-warewulf3-1.35.0-1.1.s390x", "openSUSE Tumbleweed:busybox-warewulf3-1.35.0-1.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 7.8, baseSeverity: "HIGH", vectorString: "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", version: "3.0", }, products: [ "openSUSE Tumbleweed:busybox-1.35.0-1.1.aarch64", "openSUSE Tumbleweed:busybox-1.35.0-1.1.ppc64le", "openSUSE Tumbleweed:busybox-1.35.0-1.1.s390x", "openSUSE Tumbleweed:busybox-1.35.0-1.1.x86_64", "openSUSE Tumbleweed:busybox-static-1.35.0-1.1.aarch64", "openSUSE Tumbleweed:busybox-static-1.35.0-1.1.ppc64le", "openSUSE Tumbleweed:busybox-static-1.35.0-1.1.s390x", "openSUSE Tumbleweed:busybox-static-1.35.0-1.1.x86_64", "openSUSE Tumbleweed:busybox-testsuite-1.35.0-1.1.aarch64", "openSUSE Tumbleweed:busybox-testsuite-1.35.0-1.1.ppc64le", "openSUSE Tumbleweed:busybox-testsuite-1.35.0-1.1.s390x", "openSUSE Tumbleweed:busybox-testsuite-1.35.0-1.1.x86_64", "openSUSE Tumbleweed:busybox-warewulf3-1.35.0-1.1.aarch64", "openSUSE Tumbleweed:busybox-warewulf3-1.35.0-1.1.ppc64le", "openSUSE Tumbleweed:busybox-warewulf3-1.35.0-1.1.s390x", "openSUSE Tumbleweed:busybox-warewulf3-1.35.0-1.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "important", }, ], title: "CVE-2017-16544", }, { cve: "CVE-2018-1000500", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2018-1000500", }, ], notes: [ { category: "general", text: "Busybox contains a Missing SSL certificate validation vulnerability in The \"busybox wget\" applet that can result in arbitrary code execution. This attack appear to be exploitable via Simply download any file over HTTPS using \"busybox wget https://compromised-domain.com/important-file\".", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:busybox-1.35.0-1.1.aarch64", "openSUSE Tumbleweed:busybox-1.35.0-1.1.ppc64le", "openSUSE Tumbleweed:busybox-1.35.0-1.1.s390x", "openSUSE Tumbleweed:busybox-1.35.0-1.1.x86_64", "openSUSE Tumbleweed:busybox-static-1.35.0-1.1.aarch64", "openSUSE Tumbleweed:busybox-static-1.35.0-1.1.ppc64le", "openSUSE Tumbleweed:busybox-static-1.35.0-1.1.s390x", "openSUSE Tumbleweed:busybox-static-1.35.0-1.1.x86_64", "openSUSE Tumbleweed:busybox-testsuite-1.35.0-1.1.aarch64", "openSUSE Tumbleweed:busybox-testsuite-1.35.0-1.1.ppc64le", "openSUSE Tumbleweed:busybox-testsuite-1.35.0-1.1.s390x", "openSUSE Tumbleweed:busybox-testsuite-1.35.0-1.1.x86_64", "openSUSE Tumbleweed:busybox-warewulf3-1.35.0-1.1.aarch64", "openSUSE Tumbleweed:busybox-warewulf3-1.35.0-1.1.ppc64le", "openSUSE Tumbleweed:busybox-warewulf3-1.35.0-1.1.s390x", "openSUSE Tumbleweed:busybox-warewulf3-1.35.0-1.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2018-1000500", url: "https://www.suse.com/security/cve/CVE-2018-1000500", }, { category: "external", summary: "SUSE Bug 1099263 for CVE-2018-1000500", url: "https://bugzilla.suse.com/1099263", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:busybox-1.35.0-1.1.aarch64", "openSUSE Tumbleweed:busybox-1.35.0-1.1.ppc64le", "openSUSE Tumbleweed:busybox-1.35.0-1.1.s390x", "openSUSE Tumbleweed:busybox-1.35.0-1.1.x86_64", "openSUSE Tumbleweed:busybox-static-1.35.0-1.1.aarch64", "openSUSE Tumbleweed:busybox-static-1.35.0-1.1.ppc64le", "openSUSE Tumbleweed:busybox-static-1.35.0-1.1.s390x", "openSUSE Tumbleweed:busybox-static-1.35.0-1.1.x86_64", "openSUSE Tumbleweed:busybox-testsuite-1.35.0-1.1.aarch64", "openSUSE Tumbleweed:busybox-testsuite-1.35.0-1.1.ppc64le", "openSUSE Tumbleweed:busybox-testsuite-1.35.0-1.1.s390x", "openSUSE Tumbleweed:busybox-testsuite-1.35.0-1.1.x86_64", "openSUSE Tumbleweed:busybox-warewulf3-1.35.0-1.1.aarch64", "openSUSE Tumbleweed:busybox-warewulf3-1.35.0-1.1.ppc64le", "openSUSE Tumbleweed:busybox-warewulf3-1.35.0-1.1.s390x", "openSUSE Tumbleweed:busybox-warewulf3-1.35.0-1.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 7.5, baseSeverity: "HIGH", vectorString: "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N", version: "3.0", }, products: [ "openSUSE Tumbleweed:busybox-1.35.0-1.1.aarch64", "openSUSE Tumbleweed:busybox-1.35.0-1.1.ppc64le", "openSUSE Tumbleweed:busybox-1.35.0-1.1.s390x", "openSUSE Tumbleweed:busybox-1.35.0-1.1.x86_64", "openSUSE Tumbleweed:busybox-static-1.35.0-1.1.aarch64", "openSUSE Tumbleweed:busybox-static-1.35.0-1.1.ppc64le", "openSUSE Tumbleweed:busybox-static-1.35.0-1.1.s390x", "openSUSE Tumbleweed:busybox-static-1.35.0-1.1.x86_64", "openSUSE Tumbleweed:busybox-testsuite-1.35.0-1.1.aarch64", "openSUSE Tumbleweed:busybox-testsuite-1.35.0-1.1.ppc64le", "openSUSE Tumbleweed:busybox-testsuite-1.35.0-1.1.s390x", "openSUSE Tumbleweed:busybox-testsuite-1.35.0-1.1.x86_64", "openSUSE Tumbleweed:busybox-warewulf3-1.35.0-1.1.aarch64", "openSUSE Tumbleweed:busybox-warewulf3-1.35.0-1.1.ppc64le", "openSUSE Tumbleweed:busybox-warewulf3-1.35.0-1.1.s390x", "openSUSE Tumbleweed:busybox-warewulf3-1.35.0-1.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "important", }, ], title: "CVE-2018-1000500", }, { cve: "CVE-2018-1000517", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2018-1000517", }, ], notes: [ { category: "general", text: "BusyBox project BusyBox wget version prior to commit 8e2174e9bd836e53c8b9c6e00d1bc6e2a718686e contains a Buffer Overflow vulnerability in Busybox wget that can result in heap buffer overflow. This attack appear to be exploitable via network connectivity. This vulnerability appears to have been fixed in after commit 8e2174e9bd836e53c8b9c6e00d1bc6e2a718686e.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:busybox-1.35.0-1.1.aarch64", "openSUSE Tumbleweed:busybox-1.35.0-1.1.ppc64le", "openSUSE Tumbleweed:busybox-1.35.0-1.1.s390x", "openSUSE Tumbleweed:busybox-1.35.0-1.1.x86_64", "openSUSE Tumbleweed:busybox-static-1.35.0-1.1.aarch64", "openSUSE Tumbleweed:busybox-static-1.35.0-1.1.ppc64le", "openSUSE Tumbleweed:busybox-static-1.35.0-1.1.s390x", "openSUSE Tumbleweed:busybox-static-1.35.0-1.1.x86_64", "openSUSE Tumbleweed:busybox-testsuite-1.35.0-1.1.aarch64", "openSUSE Tumbleweed:busybox-testsuite-1.35.0-1.1.ppc64le", "openSUSE Tumbleweed:busybox-testsuite-1.35.0-1.1.s390x", "openSUSE Tumbleweed:busybox-testsuite-1.35.0-1.1.x86_64", "openSUSE Tumbleweed:busybox-warewulf3-1.35.0-1.1.aarch64", "openSUSE Tumbleweed:busybox-warewulf3-1.35.0-1.1.ppc64le", "openSUSE Tumbleweed:busybox-warewulf3-1.35.0-1.1.s390x", "openSUSE Tumbleweed:busybox-warewulf3-1.35.0-1.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2018-1000517", url: "https://www.suse.com/security/cve/CVE-2018-1000517", }, { category: "external", summary: "SUSE Bug 1099260 for CVE-2018-1000517", url: "https://bugzilla.suse.com/1099260", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:busybox-1.35.0-1.1.aarch64", "openSUSE Tumbleweed:busybox-1.35.0-1.1.ppc64le", "openSUSE Tumbleweed:busybox-1.35.0-1.1.s390x", "openSUSE Tumbleweed:busybox-1.35.0-1.1.x86_64", "openSUSE Tumbleweed:busybox-static-1.35.0-1.1.aarch64", "openSUSE Tumbleweed:busybox-static-1.35.0-1.1.ppc64le", "openSUSE Tumbleweed:busybox-static-1.35.0-1.1.s390x", "openSUSE Tumbleweed:busybox-static-1.35.0-1.1.x86_64", "openSUSE Tumbleweed:busybox-testsuite-1.35.0-1.1.aarch64", "openSUSE Tumbleweed:busybox-testsuite-1.35.0-1.1.ppc64le", "openSUSE Tumbleweed:busybox-testsuite-1.35.0-1.1.s390x", "openSUSE Tumbleweed:busybox-testsuite-1.35.0-1.1.x86_64", "openSUSE Tumbleweed:busybox-warewulf3-1.35.0-1.1.aarch64", "openSUSE Tumbleweed:busybox-warewulf3-1.35.0-1.1.ppc64le", "openSUSE Tumbleweed:busybox-warewulf3-1.35.0-1.1.s390x", "openSUSE Tumbleweed:busybox-warewulf3-1.35.0-1.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.6, baseSeverity: "MEDIUM", vectorString: "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L", version: "3.0", }, products: [ "openSUSE Tumbleweed:busybox-1.35.0-1.1.aarch64", "openSUSE Tumbleweed:busybox-1.35.0-1.1.ppc64le", "openSUSE Tumbleweed:busybox-1.35.0-1.1.s390x", "openSUSE Tumbleweed:busybox-1.35.0-1.1.x86_64", "openSUSE Tumbleweed:busybox-static-1.35.0-1.1.aarch64", "openSUSE Tumbleweed:busybox-static-1.35.0-1.1.ppc64le", "openSUSE Tumbleweed:busybox-static-1.35.0-1.1.s390x", "openSUSE Tumbleweed:busybox-static-1.35.0-1.1.x86_64", "openSUSE Tumbleweed:busybox-testsuite-1.35.0-1.1.aarch64", "openSUSE Tumbleweed:busybox-testsuite-1.35.0-1.1.ppc64le", "openSUSE Tumbleweed:busybox-testsuite-1.35.0-1.1.s390x", "openSUSE Tumbleweed:busybox-testsuite-1.35.0-1.1.x86_64", "openSUSE Tumbleweed:busybox-warewulf3-1.35.0-1.1.aarch64", "openSUSE Tumbleweed:busybox-warewulf3-1.35.0-1.1.ppc64le", "openSUSE Tumbleweed:busybox-warewulf3-1.35.0-1.1.s390x", "openSUSE Tumbleweed:busybox-warewulf3-1.35.0-1.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "important", }, ], title: "CVE-2018-1000517", }, { cve: "CVE-2018-20679", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2018-20679", }, ], notes: [ { category: "general", text: "An issue was discovered in BusyBox before 1.30.0. An out of bounds read in udhcp components (consumed by the DHCP server, client, and relay) allows a remote attacker to leak sensitive information from the stack by sending a crafted DHCP message. This is related to verification in udhcp_get_option() in networking/udhcp/common.c that 4-byte options are indeed 4 bytes.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:busybox-1.35.0-1.1.aarch64", "openSUSE Tumbleweed:busybox-1.35.0-1.1.ppc64le", "openSUSE Tumbleweed:busybox-1.35.0-1.1.s390x", "openSUSE Tumbleweed:busybox-1.35.0-1.1.x86_64", "openSUSE Tumbleweed:busybox-static-1.35.0-1.1.aarch64", "openSUSE Tumbleweed:busybox-static-1.35.0-1.1.ppc64le", "openSUSE Tumbleweed:busybox-static-1.35.0-1.1.s390x", "openSUSE Tumbleweed:busybox-static-1.35.0-1.1.x86_64", "openSUSE Tumbleweed:busybox-testsuite-1.35.0-1.1.aarch64", "openSUSE Tumbleweed:busybox-testsuite-1.35.0-1.1.ppc64le", "openSUSE Tumbleweed:busybox-testsuite-1.35.0-1.1.s390x", "openSUSE Tumbleweed:busybox-testsuite-1.35.0-1.1.x86_64", "openSUSE Tumbleweed:busybox-warewulf3-1.35.0-1.1.aarch64", "openSUSE Tumbleweed:busybox-warewulf3-1.35.0-1.1.ppc64le", "openSUSE Tumbleweed:busybox-warewulf3-1.35.0-1.1.s390x", "openSUSE Tumbleweed:busybox-warewulf3-1.35.0-1.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2018-20679", url: "https://www.suse.com/security/cve/CVE-2018-20679", }, { category: "external", summary: "SUSE Bug 1121426 for CVE-2018-20679", url: "https://bugzilla.suse.com/1121426", }, { category: "external", summary: "SUSE Bug 1121428 for CVE-2018-20679", url: "https://bugzilla.suse.com/1121428", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:busybox-1.35.0-1.1.aarch64", "openSUSE Tumbleweed:busybox-1.35.0-1.1.ppc64le", "openSUSE Tumbleweed:busybox-1.35.0-1.1.s390x", "openSUSE Tumbleweed:busybox-1.35.0-1.1.x86_64", "openSUSE Tumbleweed:busybox-static-1.35.0-1.1.aarch64", "openSUSE Tumbleweed:busybox-static-1.35.0-1.1.ppc64le", "openSUSE Tumbleweed:busybox-static-1.35.0-1.1.s390x", "openSUSE Tumbleweed:busybox-static-1.35.0-1.1.x86_64", "openSUSE Tumbleweed:busybox-testsuite-1.35.0-1.1.aarch64", "openSUSE Tumbleweed:busybox-testsuite-1.35.0-1.1.ppc64le", "openSUSE Tumbleweed:busybox-testsuite-1.35.0-1.1.s390x", "openSUSE Tumbleweed:busybox-testsuite-1.35.0-1.1.x86_64", "openSUSE Tumbleweed:busybox-warewulf3-1.35.0-1.1.aarch64", "openSUSE Tumbleweed:busybox-warewulf3-1.35.0-1.1.ppc64le", "openSUSE Tumbleweed:busybox-warewulf3-1.35.0-1.1.s390x", "openSUSE Tumbleweed:busybox-warewulf3-1.35.0-1.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.3, baseSeverity: "MEDIUM", vectorString: "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N", version: "3.0", }, products: [ "openSUSE Tumbleweed:busybox-1.35.0-1.1.aarch64", "openSUSE Tumbleweed:busybox-1.35.0-1.1.ppc64le", "openSUSE Tumbleweed:busybox-1.35.0-1.1.s390x", "openSUSE Tumbleweed:busybox-1.35.0-1.1.x86_64", "openSUSE Tumbleweed:busybox-static-1.35.0-1.1.aarch64", "openSUSE Tumbleweed:busybox-static-1.35.0-1.1.ppc64le", "openSUSE Tumbleweed:busybox-static-1.35.0-1.1.s390x", "openSUSE Tumbleweed:busybox-static-1.35.0-1.1.x86_64", "openSUSE Tumbleweed:busybox-testsuite-1.35.0-1.1.aarch64", "openSUSE Tumbleweed:busybox-testsuite-1.35.0-1.1.ppc64le", "openSUSE Tumbleweed:busybox-testsuite-1.35.0-1.1.s390x", "openSUSE Tumbleweed:busybox-testsuite-1.35.0-1.1.x86_64", "openSUSE Tumbleweed:busybox-warewulf3-1.35.0-1.1.aarch64", "openSUSE Tumbleweed:busybox-warewulf3-1.35.0-1.1.ppc64le", "openSUSE Tumbleweed:busybox-warewulf3-1.35.0-1.1.s390x", "openSUSE Tumbleweed:busybox-warewulf3-1.35.0-1.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "moderate", }, ], title: "CVE-2018-20679", }, { cve: "CVE-2019-5747", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2019-5747", }, ], notes: [ { category: "general", text: "An issue was discovered in BusyBox through 1.30.0. An out of bounds read in udhcp components (consumed by the DHCP client, server, and/or relay) might allow a remote attacker to leak sensitive information from the stack by sending a crafted DHCP message. This is related to assurance of a 4-byte length when decoding DHCP_SUBNET. NOTE: this issue exists because of an incomplete fix for CVE-2018-20679.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:busybox-1.35.0-1.1.aarch64", "openSUSE Tumbleweed:busybox-1.35.0-1.1.ppc64le", "openSUSE Tumbleweed:busybox-1.35.0-1.1.s390x", "openSUSE Tumbleweed:busybox-1.35.0-1.1.x86_64", "openSUSE Tumbleweed:busybox-static-1.35.0-1.1.aarch64", "openSUSE Tumbleweed:busybox-static-1.35.0-1.1.ppc64le", "openSUSE Tumbleweed:busybox-static-1.35.0-1.1.s390x", "openSUSE Tumbleweed:busybox-static-1.35.0-1.1.x86_64", "openSUSE Tumbleweed:busybox-testsuite-1.35.0-1.1.aarch64", "openSUSE Tumbleweed:busybox-testsuite-1.35.0-1.1.ppc64le", "openSUSE Tumbleweed:busybox-testsuite-1.35.0-1.1.s390x", "openSUSE Tumbleweed:busybox-testsuite-1.35.0-1.1.x86_64", "openSUSE Tumbleweed:busybox-warewulf3-1.35.0-1.1.aarch64", "openSUSE Tumbleweed:busybox-warewulf3-1.35.0-1.1.ppc64le", "openSUSE Tumbleweed:busybox-warewulf3-1.35.0-1.1.s390x", "openSUSE Tumbleweed:busybox-warewulf3-1.35.0-1.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2019-5747", url: "https://www.suse.com/security/cve/CVE-2019-5747", }, { category: "external", summary: "SUSE Bug 1121426 for CVE-2019-5747", url: "https://bugzilla.suse.com/1121426", }, { category: "external", summary: "SUSE Bug 1121428 for CVE-2019-5747", url: "https://bugzilla.suse.com/1121428", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:busybox-1.35.0-1.1.aarch64", "openSUSE Tumbleweed:busybox-1.35.0-1.1.ppc64le", "openSUSE Tumbleweed:busybox-1.35.0-1.1.s390x", "openSUSE Tumbleweed:busybox-1.35.0-1.1.x86_64", "openSUSE Tumbleweed:busybox-static-1.35.0-1.1.aarch64", "openSUSE Tumbleweed:busybox-static-1.35.0-1.1.ppc64le", "openSUSE Tumbleweed:busybox-static-1.35.0-1.1.s390x", "openSUSE Tumbleweed:busybox-static-1.35.0-1.1.x86_64", "openSUSE Tumbleweed:busybox-testsuite-1.35.0-1.1.aarch64", "openSUSE Tumbleweed:busybox-testsuite-1.35.0-1.1.ppc64le", "openSUSE Tumbleweed:busybox-testsuite-1.35.0-1.1.s390x", "openSUSE Tumbleweed:busybox-testsuite-1.35.0-1.1.x86_64", "openSUSE Tumbleweed:busybox-warewulf3-1.35.0-1.1.aarch64", "openSUSE Tumbleweed:busybox-warewulf3-1.35.0-1.1.ppc64le", "openSUSE Tumbleweed:busybox-warewulf3-1.35.0-1.1.s390x", "openSUSE Tumbleweed:busybox-warewulf3-1.35.0-1.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 3.5, baseSeverity: "LOW", vectorString: "CVSS:3.1/AV:A/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N", version: "3.1", }, products: [ "openSUSE Tumbleweed:busybox-1.35.0-1.1.aarch64", "openSUSE Tumbleweed:busybox-1.35.0-1.1.ppc64le", "openSUSE Tumbleweed:busybox-1.35.0-1.1.s390x", "openSUSE Tumbleweed:busybox-1.35.0-1.1.x86_64", "openSUSE Tumbleweed:busybox-static-1.35.0-1.1.aarch64", "openSUSE Tumbleweed:busybox-static-1.35.0-1.1.ppc64le", "openSUSE Tumbleweed:busybox-static-1.35.0-1.1.s390x", "openSUSE Tumbleweed:busybox-static-1.35.0-1.1.x86_64", "openSUSE Tumbleweed:busybox-testsuite-1.35.0-1.1.aarch64", "openSUSE Tumbleweed:busybox-testsuite-1.35.0-1.1.ppc64le", "openSUSE Tumbleweed:busybox-testsuite-1.35.0-1.1.s390x", "openSUSE Tumbleweed:busybox-testsuite-1.35.0-1.1.x86_64", "openSUSE Tumbleweed:busybox-warewulf3-1.35.0-1.1.aarch64", "openSUSE Tumbleweed:busybox-warewulf3-1.35.0-1.1.ppc64le", "openSUSE Tumbleweed:busybox-warewulf3-1.35.0-1.1.s390x", "openSUSE Tumbleweed:busybox-warewulf3-1.35.0-1.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "low", }, ], title: "CVE-2019-5747", }, { cve: "CVE-2021-28831", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2021-28831", }, ], notes: [ { category: "general", text: "decompress_gunzip.c in BusyBox through 1.32.1 mishandles the error bit on the huft_build result pointer, with a resultant invalid free or segmentation fault, via malformed gzip data.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:busybox-1.35.0-1.1.aarch64", "openSUSE Tumbleweed:busybox-1.35.0-1.1.ppc64le", "openSUSE Tumbleweed:busybox-1.35.0-1.1.s390x", "openSUSE Tumbleweed:busybox-1.35.0-1.1.x86_64", "openSUSE Tumbleweed:busybox-static-1.35.0-1.1.aarch64", "openSUSE Tumbleweed:busybox-static-1.35.0-1.1.ppc64le", "openSUSE Tumbleweed:busybox-static-1.35.0-1.1.s390x", "openSUSE Tumbleweed:busybox-static-1.35.0-1.1.x86_64", "openSUSE Tumbleweed:busybox-testsuite-1.35.0-1.1.aarch64", "openSUSE Tumbleweed:busybox-testsuite-1.35.0-1.1.ppc64le", "openSUSE Tumbleweed:busybox-testsuite-1.35.0-1.1.s390x", "openSUSE Tumbleweed:busybox-testsuite-1.35.0-1.1.x86_64", "openSUSE Tumbleweed:busybox-warewulf3-1.35.0-1.1.aarch64", "openSUSE Tumbleweed:busybox-warewulf3-1.35.0-1.1.ppc64le", "openSUSE Tumbleweed:busybox-warewulf3-1.35.0-1.1.s390x", "openSUSE Tumbleweed:busybox-warewulf3-1.35.0-1.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2021-28831", url: "https://www.suse.com/security/cve/CVE-2021-28831", }, { category: "external", summary: "SUSE Bug 1184522 for CVE-2021-28831", url: "https://bugzilla.suse.com/1184522", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:busybox-1.35.0-1.1.aarch64", "openSUSE Tumbleweed:busybox-1.35.0-1.1.ppc64le", "openSUSE Tumbleweed:busybox-1.35.0-1.1.s390x", "openSUSE Tumbleweed:busybox-1.35.0-1.1.x86_64", "openSUSE Tumbleweed:busybox-static-1.35.0-1.1.aarch64", "openSUSE Tumbleweed:busybox-static-1.35.0-1.1.ppc64le", "openSUSE Tumbleweed:busybox-static-1.35.0-1.1.s390x", "openSUSE Tumbleweed:busybox-static-1.35.0-1.1.x86_64", "openSUSE Tumbleweed:busybox-testsuite-1.35.0-1.1.aarch64", "openSUSE Tumbleweed:busybox-testsuite-1.35.0-1.1.ppc64le", "openSUSE Tumbleweed:busybox-testsuite-1.35.0-1.1.s390x", "openSUSE Tumbleweed:busybox-testsuite-1.35.0-1.1.x86_64", "openSUSE Tumbleweed:busybox-warewulf3-1.35.0-1.1.aarch64", "openSUSE Tumbleweed:busybox-warewulf3-1.35.0-1.1.ppc64le", "openSUSE Tumbleweed:busybox-warewulf3-1.35.0-1.1.s390x", "openSUSE Tumbleweed:busybox-warewulf3-1.35.0-1.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 7.5, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "openSUSE Tumbleweed:busybox-1.35.0-1.1.aarch64", "openSUSE Tumbleweed:busybox-1.35.0-1.1.ppc64le", "openSUSE Tumbleweed:busybox-1.35.0-1.1.s390x", "openSUSE Tumbleweed:busybox-1.35.0-1.1.x86_64", "openSUSE Tumbleweed:busybox-static-1.35.0-1.1.aarch64", "openSUSE Tumbleweed:busybox-static-1.35.0-1.1.ppc64le", "openSUSE Tumbleweed:busybox-static-1.35.0-1.1.s390x", "openSUSE Tumbleweed:busybox-static-1.35.0-1.1.x86_64", "openSUSE Tumbleweed:busybox-testsuite-1.35.0-1.1.aarch64", "openSUSE Tumbleweed:busybox-testsuite-1.35.0-1.1.ppc64le", "openSUSE Tumbleweed:busybox-testsuite-1.35.0-1.1.s390x", "openSUSE Tumbleweed:busybox-testsuite-1.35.0-1.1.x86_64", "openSUSE Tumbleweed:busybox-warewulf3-1.35.0-1.1.aarch64", "openSUSE Tumbleweed:busybox-warewulf3-1.35.0-1.1.ppc64le", "openSUSE Tumbleweed:busybox-warewulf3-1.35.0-1.1.s390x", "openSUSE Tumbleweed:busybox-warewulf3-1.35.0-1.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "important", }, ], title: "CVE-2021-28831", }, { cve: "CVE-2021-42373", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2021-42373", }, ], notes: [ { category: "general", text: "A NULL pointer dereference in Busybox's man applet leads to denial of service when a section name is supplied but no page argument is given", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:busybox-1.35.0-1.1.aarch64", "openSUSE Tumbleweed:busybox-1.35.0-1.1.ppc64le", "openSUSE Tumbleweed:busybox-1.35.0-1.1.s390x", "openSUSE Tumbleweed:busybox-1.35.0-1.1.x86_64", "openSUSE Tumbleweed:busybox-static-1.35.0-1.1.aarch64", "openSUSE Tumbleweed:busybox-static-1.35.0-1.1.ppc64le", "openSUSE Tumbleweed:busybox-static-1.35.0-1.1.s390x", "openSUSE Tumbleweed:busybox-static-1.35.0-1.1.x86_64", "openSUSE Tumbleweed:busybox-testsuite-1.35.0-1.1.aarch64", "openSUSE Tumbleweed:busybox-testsuite-1.35.0-1.1.ppc64le", "openSUSE Tumbleweed:busybox-testsuite-1.35.0-1.1.s390x", "openSUSE Tumbleweed:busybox-testsuite-1.35.0-1.1.x86_64", "openSUSE Tumbleweed:busybox-warewulf3-1.35.0-1.1.aarch64", "openSUSE Tumbleweed:busybox-warewulf3-1.35.0-1.1.ppc64le", "openSUSE Tumbleweed:busybox-warewulf3-1.35.0-1.1.s390x", "openSUSE Tumbleweed:busybox-warewulf3-1.35.0-1.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2021-42373", url: "https://www.suse.com/security/cve/CVE-2021-42373", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:busybox-1.35.0-1.1.aarch64", "openSUSE Tumbleweed:busybox-1.35.0-1.1.ppc64le", "openSUSE Tumbleweed:busybox-1.35.0-1.1.s390x", "openSUSE Tumbleweed:busybox-1.35.0-1.1.x86_64", "openSUSE Tumbleweed:busybox-static-1.35.0-1.1.aarch64", "openSUSE Tumbleweed:busybox-static-1.35.0-1.1.ppc64le", "openSUSE Tumbleweed:busybox-static-1.35.0-1.1.s390x", "openSUSE Tumbleweed:busybox-static-1.35.0-1.1.x86_64", "openSUSE Tumbleweed:busybox-testsuite-1.35.0-1.1.aarch64", "openSUSE Tumbleweed:busybox-testsuite-1.35.0-1.1.ppc64le", "openSUSE Tumbleweed:busybox-testsuite-1.35.0-1.1.s390x", "openSUSE Tumbleweed:busybox-testsuite-1.35.0-1.1.x86_64", "openSUSE Tumbleweed:busybox-warewulf3-1.35.0-1.1.aarch64", "openSUSE Tumbleweed:busybox-warewulf3-1.35.0-1.1.ppc64le", "openSUSE Tumbleweed:busybox-warewulf3-1.35.0-1.1.s390x", "openSUSE Tumbleweed:busybox-warewulf3-1.35.0-1.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.5, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "openSUSE Tumbleweed:busybox-1.35.0-1.1.aarch64", "openSUSE Tumbleweed:busybox-1.35.0-1.1.ppc64le", "openSUSE Tumbleweed:busybox-1.35.0-1.1.s390x", "openSUSE Tumbleweed:busybox-1.35.0-1.1.x86_64", "openSUSE Tumbleweed:busybox-static-1.35.0-1.1.aarch64", "openSUSE Tumbleweed:busybox-static-1.35.0-1.1.ppc64le", "openSUSE Tumbleweed:busybox-static-1.35.0-1.1.s390x", "openSUSE Tumbleweed:busybox-static-1.35.0-1.1.x86_64", "openSUSE Tumbleweed:busybox-testsuite-1.35.0-1.1.aarch64", "openSUSE Tumbleweed:busybox-testsuite-1.35.0-1.1.ppc64le", "openSUSE Tumbleweed:busybox-testsuite-1.35.0-1.1.s390x", "openSUSE Tumbleweed:busybox-testsuite-1.35.0-1.1.x86_64", "openSUSE Tumbleweed:busybox-warewulf3-1.35.0-1.1.aarch64", "openSUSE Tumbleweed:busybox-warewulf3-1.35.0-1.1.ppc64le", "openSUSE Tumbleweed:busybox-warewulf3-1.35.0-1.1.s390x", "openSUSE Tumbleweed:busybox-warewulf3-1.35.0-1.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "moderate", }, ], title: "CVE-2021-42373", }, { cve: "CVE-2021-42377", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2021-42377", }, ], notes: [ { category: "general", text: "An attacker-controlled pointer free in Busybox's hush applet leads to denial of service and possible code execution when processing a crafted shell command, due to the shell mishandling the &&& string. This may be used for remote code execution under rare conditions of filtered command input.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:busybox-1.35.0-1.1.aarch64", "openSUSE Tumbleweed:busybox-1.35.0-1.1.ppc64le", "openSUSE Tumbleweed:busybox-1.35.0-1.1.s390x", "openSUSE Tumbleweed:busybox-1.35.0-1.1.x86_64", "openSUSE Tumbleweed:busybox-static-1.35.0-1.1.aarch64", "openSUSE Tumbleweed:busybox-static-1.35.0-1.1.ppc64le", "openSUSE Tumbleweed:busybox-static-1.35.0-1.1.s390x", "openSUSE Tumbleweed:busybox-static-1.35.0-1.1.x86_64", "openSUSE Tumbleweed:busybox-testsuite-1.35.0-1.1.aarch64", "openSUSE Tumbleweed:busybox-testsuite-1.35.0-1.1.ppc64le", "openSUSE Tumbleweed:busybox-testsuite-1.35.0-1.1.s390x", "openSUSE Tumbleweed:busybox-testsuite-1.35.0-1.1.x86_64", "openSUSE Tumbleweed:busybox-warewulf3-1.35.0-1.1.aarch64", "openSUSE Tumbleweed:busybox-warewulf3-1.35.0-1.1.ppc64le", "openSUSE Tumbleweed:busybox-warewulf3-1.35.0-1.1.s390x", "openSUSE Tumbleweed:busybox-warewulf3-1.35.0-1.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2021-42377", url: "https://www.suse.com/security/cve/CVE-2021-42377", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:busybox-1.35.0-1.1.aarch64", "openSUSE Tumbleweed:busybox-1.35.0-1.1.ppc64le", "openSUSE Tumbleweed:busybox-1.35.0-1.1.s390x", "openSUSE Tumbleweed:busybox-1.35.0-1.1.x86_64", "openSUSE Tumbleweed:busybox-static-1.35.0-1.1.aarch64", "openSUSE Tumbleweed:busybox-static-1.35.0-1.1.ppc64le", "openSUSE Tumbleweed:busybox-static-1.35.0-1.1.s390x", "openSUSE Tumbleweed:busybox-static-1.35.0-1.1.x86_64", "openSUSE Tumbleweed:busybox-testsuite-1.35.0-1.1.aarch64", "openSUSE Tumbleweed:busybox-testsuite-1.35.0-1.1.ppc64le", "openSUSE Tumbleweed:busybox-testsuite-1.35.0-1.1.s390x", "openSUSE Tumbleweed:busybox-testsuite-1.35.0-1.1.x86_64", "openSUSE Tumbleweed:busybox-warewulf3-1.35.0-1.1.aarch64", "openSUSE Tumbleweed:busybox-warewulf3-1.35.0-1.1.ppc64le", "openSUSE Tumbleweed:busybox-warewulf3-1.35.0-1.1.s390x", "openSUSE Tumbleweed:busybox-warewulf3-1.35.0-1.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 6.4, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, products: [ "openSUSE Tumbleweed:busybox-1.35.0-1.1.aarch64", "openSUSE Tumbleweed:busybox-1.35.0-1.1.ppc64le", "openSUSE Tumbleweed:busybox-1.35.0-1.1.s390x", "openSUSE Tumbleweed:busybox-1.35.0-1.1.x86_64", "openSUSE Tumbleweed:busybox-static-1.35.0-1.1.aarch64", "openSUSE Tumbleweed:busybox-static-1.35.0-1.1.ppc64le", "openSUSE Tumbleweed:busybox-static-1.35.0-1.1.s390x", "openSUSE Tumbleweed:busybox-static-1.35.0-1.1.x86_64", "openSUSE Tumbleweed:busybox-testsuite-1.35.0-1.1.aarch64", "openSUSE Tumbleweed:busybox-testsuite-1.35.0-1.1.ppc64le", "openSUSE Tumbleweed:busybox-testsuite-1.35.0-1.1.s390x", "openSUSE Tumbleweed:busybox-testsuite-1.35.0-1.1.x86_64", "openSUSE Tumbleweed:busybox-warewulf3-1.35.0-1.1.aarch64", "openSUSE Tumbleweed:busybox-warewulf3-1.35.0-1.1.ppc64le", "openSUSE Tumbleweed:busybox-warewulf3-1.35.0-1.1.s390x", "openSUSE Tumbleweed:busybox-warewulf3-1.35.0-1.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "moderate", }, ], title: "CVE-2021-42377", }, { cve: "CVE-2021-42381", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2021-42381", }, ], notes: [ { category: "general", text: "A use-after-free in Busybox's awk applet leads to denial of service and possibly code execution when processing a crafted awk pattern in the hash_init function", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:busybox-1.35.0-1.1.aarch64", "openSUSE Tumbleweed:busybox-1.35.0-1.1.ppc64le", "openSUSE Tumbleweed:busybox-1.35.0-1.1.s390x", "openSUSE Tumbleweed:busybox-1.35.0-1.1.x86_64", "openSUSE Tumbleweed:busybox-static-1.35.0-1.1.aarch64", "openSUSE Tumbleweed:busybox-static-1.35.0-1.1.ppc64le", "openSUSE Tumbleweed:busybox-static-1.35.0-1.1.s390x", "openSUSE Tumbleweed:busybox-static-1.35.0-1.1.x86_64", "openSUSE Tumbleweed:busybox-testsuite-1.35.0-1.1.aarch64", "openSUSE Tumbleweed:busybox-testsuite-1.35.0-1.1.ppc64le", "openSUSE Tumbleweed:busybox-testsuite-1.35.0-1.1.s390x", "openSUSE Tumbleweed:busybox-testsuite-1.35.0-1.1.x86_64", "openSUSE Tumbleweed:busybox-warewulf3-1.35.0-1.1.aarch64", "openSUSE Tumbleweed:busybox-warewulf3-1.35.0-1.1.ppc64le", "openSUSE Tumbleweed:busybox-warewulf3-1.35.0-1.1.s390x", "openSUSE Tumbleweed:busybox-warewulf3-1.35.0-1.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2021-42381", url: "https://www.suse.com/security/cve/CVE-2021-42381", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:busybox-1.35.0-1.1.aarch64", "openSUSE Tumbleweed:busybox-1.35.0-1.1.ppc64le", "openSUSE Tumbleweed:busybox-1.35.0-1.1.s390x", "openSUSE Tumbleweed:busybox-1.35.0-1.1.x86_64", "openSUSE Tumbleweed:busybox-static-1.35.0-1.1.aarch64", "openSUSE Tumbleweed:busybox-static-1.35.0-1.1.ppc64le", "openSUSE Tumbleweed:busybox-static-1.35.0-1.1.s390x", "openSUSE Tumbleweed:busybox-static-1.35.0-1.1.x86_64", "openSUSE Tumbleweed:busybox-testsuite-1.35.0-1.1.aarch64", "openSUSE Tumbleweed:busybox-testsuite-1.35.0-1.1.ppc64le", "openSUSE Tumbleweed:busybox-testsuite-1.35.0-1.1.s390x", "openSUSE Tumbleweed:busybox-testsuite-1.35.0-1.1.x86_64", "openSUSE Tumbleweed:busybox-warewulf3-1.35.0-1.1.aarch64", "openSUSE Tumbleweed:busybox-warewulf3-1.35.0-1.1.ppc64le", "openSUSE Tumbleweed:busybox-warewulf3-1.35.0-1.1.s390x", "openSUSE Tumbleweed:busybox-warewulf3-1.35.0-1.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 6.6, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, products: [ "openSUSE Tumbleweed:busybox-1.35.0-1.1.aarch64", "openSUSE Tumbleweed:busybox-1.35.0-1.1.ppc64le", "openSUSE Tumbleweed:busybox-1.35.0-1.1.s390x", "openSUSE Tumbleweed:busybox-1.35.0-1.1.x86_64", "openSUSE Tumbleweed:busybox-static-1.35.0-1.1.aarch64", "openSUSE Tumbleweed:busybox-static-1.35.0-1.1.ppc64le", "openSUSE Tumbleweed:busybox-static-1.35.0-1.1.s390x", "openSUSE Tumbleweed:busybox-static-1.35.0-1.1.x86_64", "openSUSE Tumbleweed:busybox-testsuite-1.35.0-1.1.aarch64", "openSUSE Tumbleweed:busybox-testsuite-1.35.0-1.1.ppc64le", "openSUSE Tumbleweed:busybox-testsuite-1.35.0-1.1.s390x", "openSUSE Tumbleweed:busybox-testsuite-1.35.0-1.1.x86_64", "openSUSE Tumbleweed:busybox-warewulf3-1.35.0-1.1.aarch64", "openSUSE Tumbleweed:busybox-warewulf3-1.35.0-1.1.ppc64le", "openSUSE Tumbleweed:busybox-warewulf3-1.35.0-1.1.s390x", "openSUSE Tumbleweed:busybox-warewulf3-1.35.0-1.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "moderate", }, ], title: "CVE-2021-42381", }, { cve: "CVE-2021-42385", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2021-42385", }, ], notes: [ { category: "general", text: "A use-after-free in Busybox's awk applet leads to denial of service and possibly code execution when processing a crafted awk pattern in the evaluate function", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:busybox-1.35.0-1.1.aarch64", "openSUSE Tumbleweed:busybox-1.35.0-1.1.ppc64le", "openSUSE Tumbleweed:busybox-1.35.0-1.1.s390x", "openSUSE Tumbleweed:busybox-1.35.0-1.1.x86_64", "openSUSE Tumbleweed:busybox-static-1.35.0-1.1.aarch64", "openSUSE Tumbleweed:busybox-static-1.35.0-1.1.ppc64le", "openSUSE Tumbleweed:busybox-static-1.35.0-1.1.s390x", "openSUSE Tumbleweed:busybox-static-1.35.0-1.1.x86_64", "openSUSE Tumbleweed:busybox-testsuite-1.35.0-1.1.aarch64", "openSUSE Tumbleweed:busybox-testsuite-1.35.0-1.1.ppc64le", "openSUSE Tumbleweed:busybox-testsuite-1.35.0-1.1.s390x", "openSUSE Tumbleweed:busybox-testsuite-1.35.0-1.1.x86_64", "openSUSE Tumbleweed:busybox-warewulf3-1.35.0-1.1.aarch64", "openSUSE Tumbleweed:busybox-warewulf3-1.35.0-1.1.ppc64le", "openSUSE Tumbleweed:busybox-warewulf3-1.35.0-1.1.s390x", "openSUSE Tumbleweed:busybox-warewulf3-1.35.0-1.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2021-42385", url: "https://www.suse.com/security/cve/CVE-2021-42385", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:busybox-1.35.0-1.1.aarch64", "openSUSE Tumbleweed:busybox-1.35.0-1.1.ppc64le", "openSUSE Tumbleweed:busybox-1.35.0-1.1.s390x", "openSUSE Tumbleweed:busybox-1.35.0-1.1.x86_64", "openSUSE Tumbleweed:busybox-static-1.35.0-1.1.aarch64", "openSUSE Tumbleweed:busybox-static-1.35.0-1.1.ppc64le", "openSUSE Tumbleweed:busybox-static-1.35.0-1.1.s390x", "openSUSE Tumbleweed:busybox-static-1.35.0-1.1.x86_64", "openSUSE Tumbleweed:busybox-testsuite-1.35.0-1.1.aarch64", "openSUSE Tumbleweed:busybox-testsuite-1.35.0-1.1.ppc64le", "openSUSE Tumbleweed:busybox-testsuite-1.35.0-1.1.s390x", "openSUSE Tumbleweed:busybox-testsuite-1.35.0-1.1.x86_64", "openSUSE Tumbleweed:busybox-warewulf3-1.35.0-1.1.aarch64", "openSUSE Tumbleweed:busybox-warewulf3-1.35.0-1.1.ppc64le", "openSUSE Tumbleweed:busybox-warewulf3-1.35.0-1.1.s390x", "openSUSE Tumbleweed:busybox-warewulf3-1.35.0-1.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 6.6, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, products: [ "openSUSE Tumbleweed:busybox-1.35.0-1.1.aarch64", "openSUSE Tumbleweed:busybox-1.35.0-1.1.ppc64le", "openSUSE Tumbleweed:busybox-1.35.0-1.1.s390x", "openSUSE Tumbleweed:busybox-1.35.0-1.1.x86_64", "openSUSE Tumbleweed:busybox-static-1.35.0-1.1.aarch64", "openSUSE Tumbleweed:busybox-static-1.35.0-1.1.ppc64le", "openSUSE Tumbleweed:busybox-static-1.35.0-1.1.s390x", "openSUSE Tumbleweed:busybox-static-1.35.0-1.1.x86_64", "openSUSE Tumbleweed:busybox-testsuite-1.35.0-1.1.aarch64", "openSUSE Tumbleweed:busybox-testsuite-1.35.0-1.1.ppc64le", "openSUSE Tumbleweed:busybox-testsuite-1.35.0-1.1.s390x", "openSUSE Tumbleweed:busybox-testsuite-1.35.0-1.1.x86_64", "openSUSE Tumbleweed:busybox-warewulf3-1.35.0-1.1.aarch64", "openSUSE Tumbleweed:busybox-warewulf3-1.35.0-1.1.ppc64le", "openSUSE Tumbleweed:busybox-warewulf3-1.35.0-1.1.s390x", "openSUSE Tumbleweed:busybox-warewulf3-1.35.0-1.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "moderate", }, ], title: "CVE-2021-42385", }, ], }
gsd-2018-20679
Vulnerability from gsd
Modified
2023-12-13 01:22
Details
An issue was discovered in BusyBox before 1.30.0. An out of bounds read in udhcp components (consumed by the DHCP server, client, and relay) allows a remote attacker to leak sensitive information from the stack by sending a crafted DHCP message. This is related to verification in udhcp_get_option() in networking/udhcp/common.c that 4-byte options are indeed 4 bytes.
Aliases
Aliases
{ GSD: { alias: "CVE-2018-20679", description: "An issue was discovered in BusyBox before 1.30.0. An out of bounds read in udhcp components (consumed by the DHCP server, client, and relay) allows a remote attacker to leak sensitive information from the stack by sending a crafted DHCP message. This is related to verification in udhcp_get_option() in networking/udhcp/common.c that 4-byte options are indeed 4 bytes.", id: "GSD-2018-20679", references: [ "https://www.suse.com/security/cve/CVE-2018-20679.html", "https://ubuntu.com/security/CVE-2018-20679", "https://packetstormsecurity.com/files/cve/CVE-2018-20679", ], }, gsd: { metadata: { exploitCode: "unknown", remediation: "unknown", reportConfidence: "confirmed", type: "vulnerability", }, osvSchema: { aliases: [ "CVE-2018-20679", ], details: "An issue was discovered in BusyBox before 1.30.0. An out of bounds read in udhcp components (consumed by the DHCP server, client, and relay) allows a remote attacker to leak sensitive information from the stack by sending a crafted DHCP message. This is related to verification in udhcp_get_option() in networking/udhcp/common.c that 4-byte options are indeed 4 bytes.", id: "GSD-2018-20679", modified: "2023-12-13T01:22:29.302975Z", schema_version: "1.4.0", }, }, namespaces: { "cve.org": { CVE_data_meta: { ASSIGNER: "cve@mitre.org", ID: "CVE-2018-20679", STATE: "PUBLIC", }, affects: { vendor: { vendor_data: [ { product: { product_data: [ { product_name: "n/a", version: { version_data: [ { version_value: "n/a", }, ], }, }, ], }, vendor_name: "n/a", }, ], }, }, data_format: "MITRE", data_type: "CVE", data_version: "4.0", description: { description_data: [ { lang: "eng", value: "An issue was discovered in BusyBox before 1.30.0. An out of bounds read in udhcp components (consumed by the DHCP server, client, and relay) allows a remote attacker to leak sensitive information from the stack by sending a crafted DHCP message. This is related to verification in udhcp_get_option() in networking/udhcp/common.c that 4-byte options are indeed 4 bytes.", }, ], }, problemtype: { problemtype_data: [ { description: [ { lang: "eng", value: "n/a", }, ], }, ], }, references: { reference_data: [ { name: "https://git.busybox.net/busybox/commit/?id=6d3b4bb24da9a07c263f3c1acf8df85382ff562c", refsource: "MISC", url: "https://git.busybox.net/busybox/commit/?id=6d3b4bb24da9a07c263f3c1acf8df85382ff562c", }, { name: "https://busybox.net/news.html", refsource: "MISC", url: "https://busybox.net/news.html", }, { name: "https://bugs.busybox.net/show_bug.cgi?id=11506", refsource: "MISC", url: "https://bugs.busybox.net/show_bug.cgi?id=11506", }, { name: "USN-3935-1", refsource: "UBUNTU", url: "https://usn.ubuntu.com/3935-1/", }, { name: "20190904 SEC Consult SA-20190904-0 :: Multiple vulnerabilities in Cisco router series RV34X, RV26X and RV16X", refsource: "FULLDISC", url: "http://seclists.org/fulldisclosure/2019/Sep/7", }, { name: "20190904 SEC Consult SA-20190904-0 :: Multiple vulnerabilities in Cisco router series RV34X, RV26X and RV16X", refsource: "BUGTRAQ", url: "https://seclists.org/bugtraq/2019/Sep/7", }, { name: "http://packetstormsecurity.com/files/154361/Cisco-Device-Hardcoded-Credentials-GNU-glibc-BusyBox.html", refsource: "MISC", url: "http://packetstormsecurity.com/files/154361/Cisco-Device-Hardcoded-Credentials-GNU-glibc-BusyBox.html", }, ], }, }, "nvd.nist.gov": { configurations: { CVE_data_version: "4.0", nodes: [ { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:a:busybox:busybox:*:*:*:*:*:*:*:*", cpe_name: [], versionEndExcluding: "1.30.0", vulnerable: true, }, ], operator: "OR", }, { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:canonical:ubuntu_linux:18.10:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, ], operator: "OR", }, ], }, cve: { CVE_data_meta: { ASSIGNER: "cve@mitre.org", ID: "CVE-2018-20679", }, data_format: "MITRE", data_type: "CVE", data_version: "4.0", description: { description_data: [ { lang: "en", value: "An issue was discovered in BusyBox before 1.30.0. An out of bounds read in udhcp components (consumed by the DHCP server, client, and relay) allows a remote attacker to leak sensitive information from the stack by sending a crafted DHCP message. This is related to verification in udhcp_get_option() in networking/udhcp/common.c that 4-byte options are indeed 4 bytes.", }, ], }, problemtype: { problemtype_data: [ { description: [ { lang: "en", value: "CWE-125", }, ], }, ], }, references: { reference_data: [ { name: "https://git.busybox.net/busybox/commit/?id=6d3b4bb24da9a07c263f3c1acf8df85382ff562c", refsource: "MISC", tags: [ "Patch", "Third Party Advisory", ], url: "https://git.busybox.net/busybox/commit/?id=6d3b4bb24da9a07c263f3c1acf8df85382ff562c", }, { name: "https://busybox.net/news.html", refsource: "MISC", tags: [ "Release Notes", "Third Party Advisory", ], url: "https://busybox.net/news.html", }, { name: "https://bugs.busybox.net/show_bug.cgi?id=11506", refsource: "MISC", tags: [ "Issue Tracking", "Exploit", "Third Party Advisory", ], url: "https://bugs.busybox.net/show_bug.cgi?id=11506", }, { name: "USN-3935-1", refsource: "UBUNTU", tags: [ "Third Party Advisory", ], url: "https://usn.ubuntu.com/3935-1/", }, { name: "20190904 SEC Consult SA-20190904-0 :: Multiple vulnerabilities in Cisco router series RV34X, RV26X and RV16X", refsource: "FULLDISC", tags: [], url: "http://seclists.org/fulldisclosure/2019/Sep/7", }, { name: "20190904 SEC Consult SA-20190904-0 :: Multiple vulnerabilities in Cisco router series RV34X, RV26X and RV16X", refsource: "BUGTRAQ", tags: [], url: "https://seclists.org/bugtraq/2019/Sep/7", }, { name: "http://packetstormsecurity.com/files/154361/Cisco-Device-Hardcoded-Credentials-GNU-glibc-BusyBox.html", refsource: "MISC", tags: [], url: "http://packetstormsecurity.com/files/154361/Cisco-Device-Hardcoded-Credentials-GNU-glibc-BusyBox.html", }, ], }, }, impact: { baseMetricV2: { acInsufInfo: false, cvssV2: { accessComplexity: "LOW", accessVector: "NETWORK", authentication: "NONE", availabilityImpact: "NONE", baseScore: 5, confidentialityImpact: "PARTIAL", integrityImpact: "NONE", vectorString: "AV:N/AC:L/Au:N/C:P/I:N/A:N", version: "2.0", }, exploitabilityScore: 10, impactScore: 2.9, obtainAllPrivilege: false, obtainOtherPrivilege: false, obtainUserPrivilege: false, severity: "MEDIUM", userInteractionRequired: false, }, baseMetricV3: { cvssV3: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "NONE", baseScore: 7.5, baseSeverity: "HIGH", confidentialityImpact: "HIGH", integrityImpact: "NONE", privilegesRequired: "NONE", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", version: "3.0", }, exploitabilityScore: 3.9, impactScore: 3.6, }, }, lastModifiedDate: "2019-09-04T23:15Z", publishedDate: "2019-01-09T16:29Z", }, }, }
fkie_cve-2018-20679
Vulnerability from fkie_nvd
Published
2019-01-09 16:29
Modified
2024-11-21 04:01
Severity ?
Summary
An issue was discovered in BusyBox before 1.30.0. An out of bounds read in udhcp components (consumed by the DHCP server, client, and relay) allows a remote attacker to leak sensitive information from the stack by sending a crafted DHCP message. This is related to verification in udhcp_get_option() in networking/udhcp/common.c that 4-byte options are indeed 4 bytes.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
busybox | busybox | * | |
canonical | ubuntu_linux | 14.04 | |
canonical | ubuntu_linux | 16.04 | |
canonical | ubuntu_linux | 18.04 | |
canonical | ubuntu_linux | 18.10 |
{ configurations: [ { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:a:busybox:busybox:*:*:*:*:*:*:*:*", matchCriteriaId: "9CC63993-043C-41D2-A9E6-D377F2FFBFF1", versionEndExcluding: "1.30.0", vulnerable: true, }, ], negate: false, operator: "OR", }, ], }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*", matchCriteriaId: "B5A6F2F3-4894-4392-8296-3B8DD2679084", vulnerable: true, }, { criteria: "cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*", matchCriteriaId: "F7016A2A-8365-4F1A-89A2-7A19F2BCAE5B", vulnerable: true, }, { criteria: "cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*", matchCriteriaId: "23A7C53F-B80F-4E6A-AFA9-58EEA84BE11D", vulnerable: true, }, { criteria: "cpe:2.3:o:canonical:ubuntu_linux:18.10:*:*:*:*:*:*:*", matchCriteriaId: "07C312A0-CD2C-4B9C-B064-6409B25C278F", vulnerable: true, }, ], negate: false, operator: "OR", }, ], }, ], cveTags: [], descriptions: [ { lang: "en", value: "An issue was discovered in BusyBox before 1.30.0. An out of bounds read in udhcp components (consumed by the DHCP server, client, and relay) allows a remote attacker to leak sensitive information from the stack by sending a crafted DHCP message. This is related to verification in udhcp_get_option() in networking/udhcp/common.c that 4-byte options are indeed 4 bytes.", }, { lang: "es", value: "Se ha descubierto un problema en versiones anteriores a la 1.30.0 de BusyBox. Una lectura fuera de límites en los componentes udhcp (consumidos por el servidor, cliente y relays DHCP) permite que un atacante remoto filtre información sensible de la pila mediante el envío de un mensaje DHCP manipulado. Esto está relacionado con la verificación en udhcp_get_option() en networking/udhcp/common.c de que las opciones 4-byte tienen, efectivamente, 4 bytes.", }, ], id: "CVE-2018-20679", lastModified: "2024-11-21T04:01:58.893", metrics: { cvssMetricV2: [ { acInsufInfo: false, baseSeverity: "MEDIUM", cvssData: { accessComplexity: "LOW", accessVector: "NETWORK", authentication: "NONE", availabilityImpact: "NONE", baseScore: 5, confidentialityImpact: "PARTIAL", integrityImpact: "NONE", vectorString: "AV:N/AC:L/Au:N/C:P/I:N/A:N", version: "2.0", }, exploitabilityScore: 10, impactScore: 2.9, obtainAllPrivilege: false, obtainOtherPrivilege: false, obtainUserPrivilege: false, source: "nvd@nist.gov", type: "Primary", userInteractionRequired: false, }, ], cvssMetricV30: [ { cvssData: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "NONE", baseScore: 7.5, baseSeverity: "HIGH", confidentialityImpact: "HIGH", integrityImpact: "NONE", privilegesRequired: "NONE", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", version: "3.0", }, exploitabilityScore: 3.9, impactScore: 3.6, source: "nvd@nist.gov", type: "Primary", }, ], }, published: "2019-01-09T16:29:00.273", references: [ { source: "cve@mitre.org", url: "http://packetstormsecurity.com/files/154361/Cisco-Device-Hardcoded-Credentials-GNU-glibc-BusyBox.html", }, { source: "cve@mitre.org", url: "http://seclists.org/fulldisclosure/2019/Sep/7", }, { source: "cve@mitre.org", tags: [ "Exploit", "Issue Tracking", "Third Party Advisory", ], url: "https://bugs.busybox.net/show_bug.cgi?id=11506", }, { source: "cve@mitre.org", tags: [ "Release Notes", "Third Party Advisory", ], url: "https://busybox.net/news.html", }, { source: "cve@mitre.org", tags: [ "Patch", "Third Party Advisory", ], url: "https://git.busybox.net/busybox/commit/?id=6d3b4bb24da9a07c263f3c1acf8df85382ff562c", }, { source: "cve@mitre.org", url: "https://seclists.org/bugtraq/2019/Sep/7", }, { source: "cve@mitre.org", tags: [ "Third Party Advisory", ], url: "https://usn.ubuntu.com/3935-1/", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "http://packetstormsecurity.com/files/154361/Cisco-Device-Hardcoded-Credentials-GNU-glibc-BusyBox.html", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "http://seclists.org/fulldisclosure/2019/Sep/7", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Exploit", "Issue Tracking", "Third Party Advisory", ], url: "https://bugs.busybox.net/show_bug.cgi?id=11506", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Release Notes", "Third Party Advisory", ], url: "https://busybox.net/news.html", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Patch", "Third Party Advisory", ], url: "https://git.busybox.net/busybox/commit/?id=6d3b4bb24da9a07c263f3c1acf8df85382ff562c", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "https://seclists.org/bugtraq/2019/Sep/7", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Third Party Advisory", ], url: "https://usn.ubuntu.com/3935-1/", }, ], sourceIdentifier: "cve@mitre.org", vulnStatus: "Modified", weaknesses: [ { description: [ { lang: "en", value: "CWE-125", }, ], source: "nvd@nist.gov", type: "Primary", }, ], }
Log in or create an account to share your comment.
Security Advisory comment format.
This schema specifies the format of a comment related to a security advisory.
UUIDv4 of the comment
UUIDv4 of the Vulnerability-Lookup instance
When the comment was created originally
When the comment was last updated
Title of the comment
Description of the comment
The identifier of the vulnerability (CVE ID, GHSA-ID, PYSEC ID, etc.).
Loading…
Loading…
Loading…
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.