Groups | Search | Server Info | Keyboard shortcuts | Login | Register [http] [https] [nntp] [nntps]
Groups > linux.debian.maint.boot > #77466
| Path | csiph.com!weretis.net!feeder8.news.weretis.net!news.samoylyk.net!gothmog.csi.it!bofh.it!news.nic.it!robomod |
|---|---|
| From | Moritz Mühlenhoff <jmm@inutil.org> |
| Newsgroups | linux.debian.bugs.dist, linux.debian.maint.boot |
| Subject | Bug#1136012: busybox: CVE-2026-29004 |
| Date | Fri, 08 May 2026 15:30:02 +0200 |
| Message-ID | <MStrb-3zJ8-13@gated-at.bofh.it> (permalink) |
| X-Original-To | submit@bugs.debian.org |
| X-Mailbox-Line | From debian-bugs-dist-request@lists.debian.org Fri May 8 13:29:08 2026 |
| Old-Return-Path | <debbugs@buxtehude.debian.org> |
| X-Spam-Flag | NO |
| X-Spam-Score | 1.685 |
| Reply-To | Moritz Mühlenhoff <jmm@inutil.org>, 1136012@bugs.debian.org |
| Resent-To | debian-bugs-dist@lists.debian.org |
| Resent-Cc | team@security.debian.org, debian-boot@lists.debian.org |
| X-Debian-Pr-Message | report 1136012 |
| X-Debian-Pr-Package | src:busybox |
| X-Debian-Pr-Keywords | security |
| X-Debian-Pr-Source | busybox |
| MIME-Version | 1.0 |
| Content-Type | text/plain; charset=us-ascii |
| Content-Disposition | inline |
| X-Debian-Message | from BTS |
| X-Mailing-List | <debian-bugs-dist@lists.debian.org> archive/latest/1968604 |
| List-ID | <debian-bugs-dist.lists.debian.org> |
| List-URL | <https://lists.debian.org/debian-bugs-dist/> |
| Approved | robomod@news.nic.it |
| Lines | 32 |
| Organization | linux.* mail to news gateway |
| Sender | robomod@news.nic.it |
| X-Original-Date | Fri, 8 May 2026 15:27:00 +0200 |
| X-Original-Message-ID | <af3kpD_XTFbQulmm@pisco.westfalen.local> |
| Xref | csiph.com linux.debian.bugs.dist:1292812 linux.debian.maint.boot:77466 |
Cross-posted to 2 groups.
Show key headers only | View raw
Source: busybox
X-Debbugs-CC: team@security.debian.org
Severity: important
Tags: security
Hi,
The following vulnerability was published for busybox.
CVE-2026-29004[0]:
| BusyBox before commit 42202bf contains a heap buffer overflow
| vulnerability in the DHCPv6 client (udhcpc6) DNS_SERVERS option
| handler in networking/udhcp/d6_dhcpc.c that allows network-adjacent
| attackers to trigger memory corruption by sending a crafted DHCPv6
| response with a malformed D6_OPT_DNS_SERVERS option. Attackers can
| exploit incorrect heap buffer allocation calculations in the
| option_to_env() function to cause denial of service or achieve
| arbitrary code execution on embedded systems without heap hardening.
https://git.busybox.net/busybox/commit/archival?id=42202bfb1e6ac51fa995beda8be4d7b654aeee2a
https://git.busybox.net/busybox/commit/archival?id=d368f3f7836d1c2484c8f839316e5c93e76d4409
If you fix the vulnerability please also make sure to include the
CVE (Common Vulnerabilities & Exposures) id in your changelog entry.
For further information see:
[0] https://security-tracker.debian.org/tracker/CVE-2026-29004
https://www.cve.org/CVERecord?id=CVE-2026-29004
Please adjust the affected versions in the BTS as needed.
Back to linux.debian.maint.boot | Previous | Next | Find similar
Bug#1136012: busybox: CVE-2026-29004 Moritz Mühlenhoff <jmm@inutil.org> - 2026-05-08 15:30 +0200
csiph-web