File _patchinfo of Package patchinfo.42242
<patchinfo incident="42242"> <issue tracker="cve" id="2025-60876"/> <issue tracker="cve" id="2025-46394"/> <issue tracker="bnc" id="1236670">busybox-addgroup: allocates GIDs outside SYS_GID_MIN/MAX range</issue> <issue tracker="bnc" id="1249237">busybox dumps core when called as unshare -mrpf sh on ppc64le</issue> <issue tracker="bnc" id="1253245">VUL-0: CVE-2025-60876: busybox: request line incorrectly neutralized mat lead to header injection</issue> <issue tracker="bnc" id="1241661">VUL-0: CVE-2025-46394: busybox: files in a TAR archive can have their filenames hidden from a listing if terminal escape sequences are used when naming other files included in the archive</issue> <issue tracker="bnc" id="1247779">[Build 20250806][SELinux] openQA test fails in _root_BCI-tests_busybox_</issue> <packager>radolin</packager> <rating>important</rating> <category>security</category> <summary>Security update for busybox</summary> <description>This update for busybox fixes the following issues: This update for busybox fixes the following issues: Security issues: - CVE-2025-46394: Fixed tar hidden files via escape sequence (CVE-2025-46394, bsc#1241661) - CVE-2025-60876: Fixed HTTP request header injection in wget (CVE-2025-60876, bsc#1253245) Other issues: - Set CONFIG_FIRST_SYSTEM_ID to 201 to avoid confclict (bsc#1236670) - Fixed unshare -mrpf sh core dump on ppc64le (bsc#1249237) - Fixed adduser inside containers on an SELinux host (bsc#1247779) </description> </patchinfo>