Skip to content

vulnerability reported in busy box 1.28.4-r1 #118

@anoopswsib

Description

@anoopswsib

Twistlock scan of the jdk revealed that busy box that is being used in ssl client is 1.28.4-r1 version and it has serious vulnerability. By upgrading busy box to 1.30 the vulnerability will be removed. Here is the description of current vulnerability:
An issue was discovered in BusyBox before 1.30.0. An out of bounds read in udhcp components (consumed by the DHCP server, client, and relay) allows a remote attacker to leak sensitive information from the stack by sending a crafted DHCP message. This is related to verification in udhcp_get_option() in networking/udhcp/common.c that 4-byte options are indeed 4 bytes.

When you get a chance could you please upgrade the busy box in the ssl client. I believe its coming from alpine:3.9 image.

Metadata

Metadata

Assignees

No one assigned

    Labels

    Type

    No type

    Projects

    No projects

    Milestone

    Relationships

    None yet

    Development

    No branches or pull requests

    Issue actions