Groups | Search | Server Info | Keyboard shortcuts | Login | Register [http] [https] [nntp] [nntps]


Groups > linux.debian.maint.boot > #77466

Bug#1136012: busybox: CVE-2026-29004

From Moritz Mühlenhoff <jmm@inutil.org>
Newsgroups linux.debian.bugs.dist, linux.debian.maint.boot
Subject Bug#1136012: busybox: CVE-2026-29004
Date 2026-05-08 15:30 +0200
Message-ID <MStrb-3zJ8-13@gated-at.bofh.it> (permalink)
Organization linux.* mail to news gateway

Cross-posted to 2 groups.

Show all headers | View raw


Source: busybox
X-Debbugs-CC: team@security.debian.org
Severity: important
Tags: security

Hi,

The following vulnerability was published for busybox.

CVE-2026-29004[0]:
| BusyBox before commit 42202bf contains a heap buffer overflow
| vulnerability in the DHCPv6 client (udhcpc6) DNS_SERVERS option
| handler in networking/udhcp/d6_dhcpc.c that allows network-adjacent
| attackers to trigger memory corruption by sending a crafted DHCPv6
| response with a malformed D6_OPT_DNS_SERVERS option. Attackers can
| exploit incorrect heap buffer allocation calculations in the
| option_to_env() function to cause denial of service or achieve
| arbitrary code execution on embedded systems without heap hardening.

https://git.busybox.net/busybox/commit/archival?id=42202bfb1e6ac51fa995beda8be4d7b654aeee2a
https://git.busybox.net/busybox/commit/archival?id=d368f3f7836d1c2484c8f839316e5c93e76d4409


If you fix the vulnerability please also make sure to include the
CVE (Common Vulnerabilities & Exposures) id in your changelog entry.

For further information see:

[0] https://security-tracker.debian.org/tracker/CVE-2026-29004
    https://www.cve.org/CVERecord?id=CVE-2026-29004

Please adjust the affected versions in the BTS as needed.

Back to linux.debian.maint.boot | Previous | Next | Find similar


Thread

Bug#1136012: busybox: CVE-2026-29004 Moritz Mühlenhoff <jmm@inutil.org> - 2026-05-08 15:30 +0200

csiph-web