-
Notifications
You must be signed in to change notification settings - Fork 232
Closed
Description
Twistlock scan of the jdk revealed that busy box that is being used in ssl client is 1.28.4-r1 version and it has serious vulnerability. By upgrading busy box to 1.30 the vulnerability will be removed. Here is the description of current vulnerability:
An issue was discovered in BusyBox before 1.30.0. An out of bounds read in udhcp components (consumed by the DHCP server, client, and relay) allows a remote attacker to leak sensitive information from the stack by sending a crafted DHCP message. This is related to verification in udhcp_get_option() in networking/udhcp/common.c that 4-byte options are indeed 4 bytes.
When you get a chance could you please upgrade the busy box in the ssl client. I believe its coming from alpine:3.9 image.
Reactions are currently unavailable