Lucene search

K
rosalinuxROSA LABROSA-SA-2024-2426
HistoryMay 28, 2024 - 8:29 a.m.

Advisory ROSA-SA-2024-2426

2024-05-2808:29:45
ROSA LAB
abf.rosalinux.ru
9
rosa-sa-2024-2426
busybox
os
cve-2022-30065
bdu-2023-02631
critical
vulnerability
resolved
command
update
cve-2022-28391
bdu-2022-04487
unix

CVSS2

6.8

Attack Vector

NETWORK

Attack Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:M/Au:N/C:P/I:P/A:P

CVSS3

8.8

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

REQUIRED

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H

AI Score

8.1

Confidence

High

EPSS

0.011

Percentile

84.7%

software: busybox 1.36.1
OS: ROSA-CHROME

package_evr_string: busybox-1.36.1-3

CVE-ID: CVE-2022-30065
BDU-ID: 2023-02631
CVE-Crit: CRITICAL.
CVE-DESC.: A vulnerability in the copyvar function of the BusyBox suite of UNIX command line utilities is related to incorrect processing of a template created by awk. Exploitation of the vulnerability allows a remote attacker to gain access to sensitive data, compromise its integrity, and cause a denial of service.
CVE-STATUS: Resolved
CVE-REV: To close, run the command: sudo dnf update busybox

CVE-ID: CVE-2022-28391
BDU-ID: 2022-04487
CVE-Crit: CRITICAL.
CVE-DESC.: A vulnerability in the BusyBox command line utility suite is related to errors in validating the input of PTR DNS records output in the netstat utility when executed on a VT-compatible terminal. Exploitation of the vulnerability could allow an attacker acting remotely to execute arbitrary shell commands on the target system
CVE-STATUS: Resolved
CVE-REV: To close, run the command: sudo dnf update busybox

OSVersionArchitecturePackageVersionFilename
ROSAanynoarchbusybox< 1.36.1UNKNOWN

CVSS2

6.8

Attack Vector

NETWORK

Attack Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:M/Au:N/C:P/I:P/A:P

CVSS3

8.8

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

REQUIRED

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H

AI Score

8.1

Confidence

High

EPSS

0.011

Percentile

84.7%