Back to bug 2080958

Who When What Removed Added
Marian Rehak 2022-05-02 13:23:17 UTC Blocks 2080963
Sandipan Roy 2022-05-06 04:35:40 UTC Severity high medium
Priority high medium
Sage McTaggart 2022-05-19 20:06:34 UTC Doc Text An escape sequence injection attack was discovered for BusyBox on Alpine. A remote host's virtual terminal must contain a escape sequence, and the victim must then execute netstat. In doing so, an attacker can inject arbitrary code. This could lead to a loss of integrity.
Fixed In Version alpine v 3.15.4
RaTasha Tillery-Smith 2022-05-23 12:05:25 UTC Doc Text An escape sequence injection attack was discovered for BusyBox on Alpine. A remote host's virtual terminal must contain a escape sequence, and the victim must then execute netstat. In doing so, an attacker can inject arbitrary code. This could lead to a loss of integrity. An escape sequence injection attack was found in BusyBox on Alpine. For this issue to occur, a remote host's virtual terminal must contain an escape sequence, and the victim must then execute netstat. This flaw allows an attacker can inject arbitrary code, leading to a loss of integrity.
Red Hat Bugzilla 2023-07-07 08:31:30 UTC Assignee security-response-team nobody

Back to bug 2080958