{"id":"USN-6335-1","summary":"busybox vulnerabilities","details":"It was discovered that BusyBox incorrectly handled certain malformed gzip\narchives. If a user or automated system were tricked into processing a\nspecially crafted gzip archive, a remote attacker could use this issue to\ncause BusyBox to crash, resulting in a denial of service, or execute\narbitrary code. This issue only affected Ubuntu 14.04 LTS.\n(CVE-2021-28831)\n\nIt was discovered that BusyBox did not properly validate user input when\nperforming certain arithmetic operations. If a user or automated system\nwere tricked into processing a specially crafted file, an attacker could\npossibly use this issue to cause BusyBox to crash, resulting in a denial\nof service, or execute arbitrary code. (CVE-2022-48174)\n","modified":"2026-05-20T16:03:31.700144942Z","published":"2023-09-04T11:50:38Z","related":["UBUNTU-CVE-2021-28831","UBUNTU-CVE-2022-48174"],"upstream":["CVE-2021-28831","CVE-2022-48174","UBUNTU-CVE-2021-28831","UBUNTU-CVE-2022-48174"],"references":[{"type":"ADVISORY","url":"https://ubuntu.com/security/notices/USN-6335-1"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2021-28831"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2022-48174"}],"affected":[{"package":{"name":"busybox","ecosystem":"Ubuntu:Pro:14.04:LTS","purl":"pkg:deb/ubuntu/busybox?arch=source&distro=trusty%2Fesm"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"1:1.21.0-1ubuntu1.4+esm1"}]}],"versions":["1:1.20.0-8.1ubuntu1","1:1.20.0-9ubuntu1","1:1.20.0-9ubuntu2","1:1.21.0-1ubuntu1","1:1.21.0-1ubuntu1.4"],"ecosystem_specific":{"binaries":[{"binary_name":"busybox","binary_version":"1:1.21.0-1ubuntu1.4+esm1"},{"binary_name":"busybox-initramfs","binary_version":"1:1.21.0-1ubuntu1.4+esm1"},{"binary_name":"busybox-static","binary_version":"1:1.21.0-1ubuntu1.4+esm1"},{"binary_name":"busybox-syslogd","binary_version":"1:1.21.0-1ubuntu1.4+esm1"},{"binary_name":"udhcpc","binary_version":"1:1.21.0-1ubuntu1.4+esm1"},{"binary_name":"udhcpd","binary_version":"1:1.21.0-1ubuntu1.4+esm1"}],"availability":"Available with Ubuntu Pro (Infra-only): https://ubuntu.com/pro"},"database_specific":{"cves_map":{"cves":[{"severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"},{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"},{"type":"Ubuntu","score":"low"}],"id":"CVE-2021-28831"},{"severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"},{"type":"Ubuntu","score":"low"}],"id":"CVE-2022-48174"}],"ecosystem":"Ubuntu:Pro:14.04:LTS"},"source":"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/usn/USN-6335-1.json"}},{"package":{"name":"busybox","ecosystem":"Ubuntu:Pro:16.04:LTS","purl":"pkg:deb/ubuntu/busybox?arch=source&distro=esm-apps%2Fxenial"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"1:1.22.0-15ubuntu1.4+esm2"}]}],"versions":["1:1.22.0-15ubuntu1","1:1.22.0-15ubuntu1.4","1:1.22.0-15ubuntu1.4+esm1"],"ecosystem_specific":{"binaries":[{"binary_name":"busybox","binary_version":"1:1.22.0-15ubuntu1.4+esm2"},{"binary_name":"busybox-initramfs","binary_version":"1:1.22.0-15ubuntu1.4+esm2"},{"binary_name":"udhcpd","binary_version":"1:1.22.0-15ubuntu1.4+esm2"},{"binary_name":"busybox-syslogd","binary_version":"1:1.22.0-15ubuntu1.4+esm2"},{"binary_name":"udhcpc","binary_version":"1:1.22.0-15ubuntu1.4+esm2"},{"binary_name":"busybox-static","binary_version":"1:1.22.0-15ubuntu1.4+esm2"}],"availability":"Available with Ubuntu Pro: https://ubuntu.com/pro"},"database_specific":{"cves_map":{"cves":[],"ecosystem":"Ubuntu:Pro:16.04:LTS"},"source":"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/usn/USN-6335-1.json"}},{"package":{"name":"busybox","ecosystem":"Ubuntu:Pro:18.04:LTS","purl":"pkg:deb/ubuntu/busybox?arch=source&distro=esm-infra%2Fbionic"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"1:1.27.2-2ubuntu3.4+esm1"}]}],"versions":["1:1.22.0-19ubuntu2","1:1.27.2-1ubuntu3","1:1.27.2-1ubuntu4","1:1.27.2-2ubuntu2","1:1.27.2-2ubuntu3","1:1.27.2-2ubuntu3.1","1:1.27.2-2ubuntu3.2","1:1.27.2-2ubuntu3.3","1:1.27.2-2ubuntu3.4"],"ecosystem_specific":{"binaries":[{"binary_name":"busybox","binary_version":"1:1.27.2-2ubuntu3.4+esm1"},{"binary_name":"busybox-initramfs","binary_version":"1:1.27.2-2ubuntu3.4+esm1"},{"binary_name":"busybox-static","binary_version":"1:1.27.2-2ubuntu3.4+esm1"},{"binary_name":"busybox-syslogd","binary_version":"1:1.27.2-2ubuntu3.4+esm1"},{"binary_name":"udhcpc","binary_version":"1:1.27.2-2ubuntu3.4+esm1"},{"binary_name":"udhcpd","binary_version":"1:1.27.2-2ubuntu3.4+esm1"}],"availability":"Available with Ubuntu Pro (Infra-only): https://ubuntu.com/pro"},"database_specific":{"cves_map":{"cves":[{"id":"CVE-2022-48174","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"},{"type":"Ubuntu","score":"low"}]}],"ecosystem":"Ubuntu:Pro:18.04:LTS"},"source":"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/usn/USN-6335-1.json"}}],"schema_version":"1.7.5"}