Bug 14811 - networking/nslookup.c parse_reply() CVE-2022-28391 patch query
Summary: networking/nslookup.c parse_reply() CVE-2022-28391 patch query
Status: NEW
Alias: None
Product: Busybox
Classification: Unclassified
Component: Networking (show other bugs)
Version: unspecified
Hardware: All Linux
: P5 normal
Target Milestone: ---
Assignee: unassigned
URL:
Keywords:
Depends on:
Blocks:
 
Reported: 2022-05-18 14:23 UTC by john.simner
Modified: 2022-12-14 11:39 UTC (History)
2 users (show)

See Also:
Host:
Target:
Build:


Attachments

Note You need to log in before you can comment on or make changes to this bug.
Description john.simner 2022-05-18 14:23:16 UTC
Is BusyBox affected by CVE-2022-28391 (BusyBox networking/nslookup.c parse_reply() Function DNS PTR Record Escape Sequence Handling Arbitrary Command Execution) and  BusyBox networking/nslookup.c parse_reply() Function DNS PTR Record Escape Sequence Handling Arbitrary Command Execution)?

If so, is there an official patch or update that fixes these vulnerabilities from BusyBox rather than git.alpinelinux.org?

If https://git.alpinelinux.org/aports/plain/main/busybox/0001-libbb-sockaddr2str-ensure-only-printable-characters-.patch details a patch that can be applied to BusyBox, should the change from  "xasprintf("%s:%s", host, serv);" to "xasprintf("%s:%s", printable_string(host), serv);" also be applied to ...

#if ENABLE_FEATURE_IPV6
	if (sa->sa_family == AF_INET6) {
		if (strchr(host, ':')) /* heh, it's not a resolved hostname */
			return xasprintf("[%s]:%s", host, serv);
		/*return xasprintf("%s:%s", host, serv);*/
		/* - fall through instead */
	}
#endif

Thanks for your assistance and look forward to your response.
Comment 1 Mark Esler 2022-07-08 19:19:32 UTC
> Is BusyBox affected

Appears so. The vulnerability was reproduced on arch: https://gitlab.alpinelinux.org/alpine/aports/-/issues/13661
Comment 3 nikoleta.chalvatzi@atos.net 2022-12-14 11:39:33 UTC
Thank you Mark for your effort. Mr. John Simner has retired, and i replaced him.