Security update for busybox, busybox-links
| Announcement ID: | SUSE-SU-2025:03205-1 |
|---|---|
| Release Date: | 2025-09-12T15:57:35Z |
| Rating: | moderate |
| References: | |
| Cross-References: | |
| CVSS scores: |
|
| Affected Products: |
|
An update that solves three vulnerabilities, contains three features and has six security fixes can now be installed.
Description:
This update for busybox, busybox-links fixes the following issues:
Updated to version 1.37.0 (jsc#PED-13039): - CVE-2023-42363: Fixed use-after-free vulnerability in xasprintf function in xfuncs_printf.c (bsc#1217580) - CVE-2023-42364: Fixed use-after-free in the awk.c evaluate function (bsc#1217584) - CVE-2023-42365: Fixed use-after-free in the awk.c copyvar function (bsc#1217585)
Other fixes: - fix generation of file lists via Dockerfile - add copy of busybox.links from the container to catch changes to busybox config - Blacklist creating links for halt, reboot, shutdown commands to avoid accidental use in a fully booted system (bsc#1243201) - Add getfattr applet to attr filelist - busybox-udhcpc conflicts with udhcp. - Add new sub-package for udhcpc - zgrep: don't set the label option as only the real grep supports it (bsc#1215943) - Add conflict for coreutils-systemd, package got splitted - Check in filelists instead of buildrequiring all non-busybox utils - Replace transitional %usrmerged macro with regular version check (bsc#1206798) - Create sub-package "hexedit" [bsc#1203399] - Create sub-package "sha3sum" [bsc#1203397] - Drop update-alternatives support - Add provides smtp_daemon to busybox-sendmail - Add conflicts: mawk to busybox-gawk - fix mkdir path to point to /usr/bin instead of /bin - add placeholder variable and ignore applet logic to busybox.install - enable halt, poweroff, reboot commands (bsc#1243201) - Fully enable udhcpc and document that this tool needs special configuration and does not work out of the box [bsc#1217883] - Replace transitional %usrmerged macro with regular version check (bsc#1206798)
Patch Instructions:
To install this SUSE update use the SUSE recommended
installation methods like YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
-
Basesystem Module 15-SP7
zypper in -t patch SUSE-SLE-Module-Basesystem-15-SP7-2025-3205=1
Package List:
-
Basesystem Module 15-SP7 (aarch64 ppc64le s390x x86_64)
- busybox-static-1.37.0-150700.18.4.1
- busybox-1.37.0-150700.18.4.1
References:
- https://www.suse.com/security/cve/CVE-2023-42363.html
- https://www.suse.com/security/cve/CVE-2023-42364.html
- https://www.suse.com/security/cve/CVE-2023-42365.html
- https://bugzilla.suse.com/show_bug.cgi?id=1203397
- https://bugzilla.suse.com/show_bug.cgi?id=1203399
- https://bugzilla.suse.com/show_bug.cgi?id=1206798
- https://bugzilla.suse.com/show_bug.cgi?id=1215943
- https://bugzilla.suse.com/show_bug.cgi?id=1217580
- https://bugzilla.suse.com/show_bug.cgi?id=1217584
- https://bugzilla.suse.com/show_bug.cgi?id=1217585
- https://bugzilla.suse.com/show_bug.cgi?id=1217883
- https://bugzilla.suse.com/show_bug.cgi?id=1243201
- https://jira.suse.com/browse/PED-13039
- https://jira.suse.com/browse/SLE-24210
- https://jira.suse.com/browse/SLE-24211