Bugzilla – Bug 1198092
VUL-0: CVE-2022-28391: busybox: arbitrary code execution if netstat is used to print a DNS PTR record's value to a VT compatible terminal
Last modified: 2024-06-06 09:05:10 UTC
CVE-2022-28391 BusyBox through 1.35.0 allows remote attackers to execute arbitrary code if netstat is used to print a DNS PTR record's value to a VT compatible terminal. Alternatively, the attacker could choose to change the terminal's colors. References: http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2022-28391 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-28391 https://git.alpinelinux.org/aports/plain/main/busybox/0002-nslookup-sanitize-all-printed-strings-with-printable.patch https://gitlab.alpinelinux.org/alpine/aports/-/issues/13661 https://git.alpinelinux.org/aports/plain/main/busybox/0001-libbb-sockaddr2str-ensure-only-printable-characters-.patch
tracking as affected, based on busybox.SuSE.config/busybox.config: - SUSE:SLE-11:Update/busybox - SUSE:SLE-12:Update/busybox - SUSE:SLE-15:Update/busybox - SUSE:SLE-15-SP4:Update/busybox - openSUSE:Factory/busybox
I investigated this further, and the problem seems to only be present when busybox is build against musl. At least I couldn't reproduce the issue with our busybox package in carwos, based on SLE15-SP2. With the exact same DNS server config the issue is reproducible on Alpine Linux, which uses musl.
SLE-12 is not affected. Fixed and released for all active code-streams.