Back to bug 2080958
| Who | When | What | Removed | Added |
|---|---|---|---|---|
| Marian Rehak | 2022-05-02 13:23:17 UTC | Blocks | 2080963 | |
| Sandipan Roy | 2022-05-06 04:35:40 UTC | Severity | high | medium |
| Priority | high | medium | ||
| Sage McTaggart | 2022-05-19 20:06:34 UTC | Doc Text | An escape sequence injection attack was discovered for BusyBox on Alpine. A remote host's virtual terminal must contain a escape sequence, and the victim must then execute netstat. In doing so, an attacker can inject arbitrary code. This could lead to a loss of integrity. | |
| Fixed In Version | alpine v 3.15.4 | |||
| RaTasha Tillery-Smith | 2022-05-23 12:05:25 UTC | Doc Text | An escape sequence injection attack was discovered for BusyBox on Alpine. A remote host's virtual terminal must contain a escape sequence, and the victim must then execute netstat. In doing so, an attacker can inject arbitrary code. This could lead to a loss of integrity. | An escape sequence injection attack was found in BusyBox on Alpine. For this issue to occur, a remote host's virtual terminal must contain an escape sequence, and the victim must then execute netstat. This flaw allows an attacker can inject arbitrary code, leading to a loss of integrity. |
| Red Hat Bugzilla | 2023-07-07 08:31:30 UTC | Assignee | security-response-team | nobody |
Back to bug 2080958