| Summary: | netstat is vulnerable to escape sequence injection (busybox) | ||
|---|---|---|---|
| Product: | Busybox | Reporter: | John Helmert III <ajak> |
| Component: | Other | Assignee: | unassigned |
| Status: | NEW --- | ||
| Severity: | normal | CC: | alex.kanavin, busybox-cvs |
| Priority: | P5 | ||
| Version: | unspecified | ||
| Target Milestone: | --- | ||
| Hardware: | All | ||
| OS: | Linux | ||
| URL: | https://gitlab.alpinelinux.org/alpine/aports/-/issues/13661 | ||
| Host: | Target: | ||
| Build: | |||
| Attachments: |
patch 1/2
patch 2/2 |
||
|
Description
John Helmert III
2022-09-19 15:41:51 UTC
CVE-2022-28391 is still shown as 'Fix not available' per different scanners for Busybox, is this something that will be fixed soon? Created attachment 9718 [details]
patch 1/2
Created attachment 9721 [details]
patch 2/2
I have attached the two patches originating from Alpine and rebased on current busybox master. I'm not sure if they're correct, so reluctant to submit them formally. Please consider and adjust as needed. |