Security update for busybox
| Announcement ID: | SUSE-SU-2026:0892-1 |
|---|---|
| Release Date: | 2026-03-13T09:05:11Z |
| Rating: | important |
| References: | |
| Cross-References: | |
| CVSS scores: |
|
| Affected Products: |
|
An update that solves eight vulnerabilities can now be installed.
Description:
This update for busybox fixes the following issues:
- CVE-2023-42363: use-after-free vulnerability in xasprintf function in xfuncs_printf.c (bsc#1217580).
- CVE-2023-42364: use-after-free in the awk.c evaluate function (bsc#1217584).
- CVE-2023-42365: use-after-free in the awk.c copyvar function (bsc#1217585).
- CVE-2025-46394: files in a TAR archive can have their filenames hidden from a listing if terminal escape sequences are used when naming other files included in the archive (bsc#1241661).
- CVE-2025-60876: request line incorrectly neutralized mat lead to header injection (bsc#1253245).
- CVE-2026-26157: Arbitrary file overwrite and potential code execution via incomplete path sanitization (bsc#1258163).
- CVE-2026-26158: Arbitrary file modification and privilege escalation via unvalidated tar archive entries (bsc#1258167).
- CVE-2021-42380: Additional fix for use-after-realloc in awk (bsc#1192869).
Patch Instructions:
To install this SUSE update use the SUSE recommended
installation methods like YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
-
SUSE Linux Enterprise Server 12 SP5 LTSS
zypper in -t patch SUSE-SLE-SERVER-12-SP5-LTSS-2026-892=1 -
SUSE Linux Enterprise Server 12 SP5 LTSS Extended Security
zypper in -t patch SUSE-SLE-SERVER-12-SP5-LTSS-EXTENDED-SECURITY-2026-892=1
Package List:
-
SUSE Linux Enterprise Server 12 SP5 LTSS (aarch64 ppc64le s390x x86_64)
- busybox-1.35.0-10.3.1
-
SUSE Linux Enterprise Server 12 SP5 LTSS Extended Security (x86_64)
- busybox-1.35.0-10.3.1
References:
- https://www.suse.com/security/cve/CVE-2021-42380.html
- https://www.suse.com/security/cve/CVE-2023-42363.html
- https://www.suse.com/security/cve/CVE-2023-42364.html
- https://www.suse.com/security/cve/CVE-2023-42365.html
- https://www.suse.com/security/cve/CVE-2025-46394.html
- https://www.suse.com/security/cve/CVE-2025-60876.html
- https://www.suse.com/security/cve/CVE-2026-26157.html
- https://www.suse.com/security/cve/CVE-2026-26158.html
- https://bugzilla.suse.com/show_bug.cgi?id=1192869
- https://bugzilla.suse.com/show_bug.cgi?id=1217580
- https://bugzilla.suse.com/show_bug.cgi?id=1217584
- https://bugzilla.suse.com/show_bug.cgi?id=1217585
- https://bugzilla.suse.com/show_bug.cgi?id=1241661
- https://bugzilla.suse.com/show_bug.cgi?id=1253245
- https://bugzilla.suse.com/show_bug.cgi?id=1258163
- https://bugzilla.suse.com/show_bug.cgi?id=1258167