| Summary: | networking/nslookup.c parse_reply() CVE-2022-28391 patch query | ||
|---|---|---|---|
| Product: | Busybox | Reporter: | john.simner |
| Component: | Networking | Assignee: | unassigned |
| Status: | NEW --- | ||
| Severity: | normal | CC: | busybox-cvs, mark.esler |
| Priority: | P5 | ||
| Version: | unspecified | ||
| Target Milestone: | --- | ||
| Hardware: | All | ||
| OS: | Linux | ||
| Host: | Target: | ||
| Build: | |||
|
Description
john.simner
2022-05-18 14:23:16 UTC
> Is BusyBox affected Appears so. The vulnerability was reproduced on arch: https://gitlab.alpinelinux.org/alpine/aports/-/issues/13661 Could the below patches be reviewed for their applicability to bug 14811 and CVE-2022-28391? https://git.alpinelinux.org/aports/plain/main/busybox/0001-libbb-sockaddr2str-ensure-only-printable-characters-.patch https://git.alpinelinux.org/aports/plain/main/busybox/0002-nslookup-sanitize-all-printed-strings-with-printable.patch Thank you Mark for your effort. Mr. John Simner has retired, and i replaced him. |