Source: busybox
Version: 1:1.37.0-10
Severity: important
Tags: security upstream
X-Debbugs-Cc: [email protected], Debian Security Team <[email protected]>

Hi,

The following vulnerabilities were published for busybox.

CVE-2026-26157[0]:
| A flaw was found in BusyBox. Incomplete path sanitization in its
| archive extraction utilities allows an attacker to craft malicious
| archives that when extracted, and under specific conditions, may
| write to files outside the intended directory. This can lead to
| arbitrary file overwrite, potentially enabling code execution
| through the modification of sensitive system files.


CVE-2026-26158[1]:
| A flaw was found in BusyBox. This vulnerability allows an attacker
| to modify files outside of the intended extraction directory by
| crafting a malicious tar archive containing unvalidated hardlink or
| symlink entries. If the tar archive is extracted with elevated
| privileges, this flaw can lead to privilege escalation, enabling an
| attacker to gain unauthorized access to critical system files.


If you fix the vulnerabilities please also make sure to include the
CVE (Common Vulnerabilities & Exposures) ids in your changelog entry.

For further information see:

[0] https://security-tracker.debian.org/tracker/CVE-2026-26157
    https://www.cve.org/CVERecord?id=CVE-2026-26157
[1] https://security-tracker.debian.org/tracker/CVE-2026-26158
    https://www.cve.org/CVERecord?id=CVE-2026-26158
[2] 
https://git.busybox.net/busybox/commit/archival?id=3fb6b31c716669e12f75a2accd31bb7685b1a1cb

Please adjust the affected versions in the BTS as needed.

Regards,
Salvatore

Reply via email to