Debian Package Tracker
Register | Log in
Subscribe

busybox

Tiny utilities for small and embedded systems

Choose email to subscribe with

general
  • source: busybox (main)
  • version: 1:1.35.0-1
  • maintainer: Debian Install System Team (archive) (DMD)
  • uploaders: Chris Boot [DMD] – Christoph Biedl [DMD] – Michael Tokarev [DMD]
  • arch: all any
  • std-ver: 4.1.5
  • VCS: Git (Browse, QA)
versions [more versions can be listed by madison] [old versions available from snapshot.debian.org]
[pool directory]
  • o-o-stable: 1:1.22.0-19
  • o-o-sec: 1:1.22.0-19+deb9u2
  • oldstable: 1:1.30.1-4
  • stable: 1:1.30.1-6
  • testing: 1:1.35.0-1
  • unstable: 1:1.35.0-1
versioned links
  • 1:1.22.0-19: [.dsc, use dget on this link to retrieve source package] [changelog] [copyright] [rules] [control]
  • 1:1.22.0-19+deb9u2: [.dsc, use dget on this link to retrieve source package] [changelog] [copyright] [rules] [control]
  • 1:1.30.1-4: [.dsc, use dget on this link to retrieve source package] [changelog] [copyright] [rules] [control]
  • 1:1.30.1-6: [.dsc, use dget on this link to retrieve source package] [changelog] [copyright] [rules] [control]
  • 1:1.35.0-1: [.dsc, use dget on this link to retrieve source package] [changelog] [copyright] [rules] [control]
binaries
  • busybox (21 bugs: 0, 10, 11, 0)
  • busybox-static (6 bugs: 0, 4, 2, 0)
  • busybox-syslogd (3 bugs: 0, 3, 0, 0)
  • busybox-udeb (3 bugs: 0, 1, 2, 0)
  • udhcpc (3 bugs: 0, 0, 3, 0)
  • udhcpd (5 bugs: 0, 4, 1, 0)
action needed
1 security issue in sid high

There is 1 open security issue in sid.

1 important issue:
  • CVE-2022-28391: BusyBox through 1.35.0 allows remote attackers to execute arbitrary code if netstat is used to print a DNS PTR record's value to a VT compatible terminal. Alternatively, the attacker could choose to change the terminal's colors.
Created: 2022-07-04 Last update: 2022-08-01 13:40
1 security issue in bookworm high

There is 1 open security issue in bookworm.

1 important issue:
  • CVE-2022-28391: BusyBox through 1.35.0 allows remote attackers to execute arbitrary code if netstat is used to print a DNS PTR record's value to a VT compatible terminal. Alternatively, the attacker could choose to change the terminal's colors.
Created: 2022-07-04 Last update: 2022-08-01 13:40
lintian reports 1 error and 7 warnings high
Lintian reports 1 error and 7 warnings about this package. You should make the package lintian clean getting rid of them.
Created: 2022-01-01 Last update: 2022-07-30 12:12
11 bugs tagged patch in the BTS normal
The BTS contains patches fixing 11 bugs, consider including or untagging them.
Created: 2022-07-27 Last update: 2022-08-20 05:32
Does not build reproducibly during testing normal
A package building reproducibly enables third parties to verify that the source matches the distributed binaries. It has been identified that this source package produced different results, failed to build or had other issues in a test environment. Please read about how to improve the situation!
Created: 2022-06-13 Last update: 2022-08-20 03:06
1 new commit since last upload, is it time to release? normal
vcswatch reports that this package seems to have new commits in its VCS but has not yet updated debian/changelog. You should consider updating the Debian changelog and uploading this new version into the archive.

Here are the relevant commit logs:
commit 1854ba7947141ebd56a70806c90ae098e1204619
Author: Michael Tokarev <mjt@tls.msk.ru>
Date:   Wed Jun 15 11:54:26 2022 +0300

    configs: enable (fast) sha3sum for regular and static builds (#1012828)
Created: 2022-06-15 Last update: 2022-08-16 08:33
12 low-priority security issues in bullseye low

There are 12 open security issues in bullseye.

12 issues left for the package maintainer to handle:
  • CVE-2021-28831: (needs triaging) decompress_gunzip.c in BusyBox through 1.32.1 mishandles the error bit on the huft_build result pointer, with a resultant invalid free or segmentation fault, via malformed gzip data.
  • CVE-2021-42377: (needs triaging) An attacker-controlled pointer free in Busybox's hush applet leads to denial of service and possible code execution when processing a crafted shell command, due to the shell mishandling the &&& string. This may be used for remote code execution under rare conditions of filtered command input.
  • CVE-2021-42378: (needs triaging) A use-after-free in Busybox's awk applet leads to denial of service and possibly code execution when processing a crafted awk pattern in the getvar_i function
  • CVE-2021-42379: (needs triaging) A use-after-free in Busybox's awk applet leads to denial of service and possibly code execution when processing a crafted awk pattern in the next_input_file function
  • CVE-2021-42380: (needs triaging) A use-after-free in Busybox's awk applet leads to denial of service and possibly code execution when processing a crafted awk pattern in the clrvar function
  • CVE-2021-42381: (needs triaging) A use-after-free in Busybox's awk applet leads to denial of service and possibly code execution when processing a crafted awk pattern in the hash_init function
  • CVE-2021-42382: (needs triaging) A use-after-free in Busybox's awk applet leads to denial of service and possibly code execution when processing a crafted awk pattern in the getvar_s function
  • CVE-2021-42383: (needs triaging) A use-after-free in Busybox's awk applet leads to denial of service and possibly code execution when processing a crafted awk pattern in the evaluate function
  • CVE-2021-42384: (needs triaging) A use-after-free in Busybox's awk applet leads to denial of service and possibly code execution when processing a crafted awk pattern in the handle_special function
  • CVE-2021-42385: (needs triaging) A use-after-free in Busybox's awk applet leads to denial of service and possibly code execution when processing a crafted awk pattern in the evaluate function
  • CVE-2021-42386: (needs triaging) A use-after-free in Busybox's awk applet leads to denial of service and possibly code execution when processing a crafted awk pattern in the nvalloc function
  • CVE-2022-28391: (needs triaging) BusyBox through 1.35.0 allows remote attackers to execute arbitrary code if netstat is used to print a DNS PTR record's value to a VT compatible terminal. Alternatively, the attacker could choose to change the terminal's colors.

You can find information about how to handle these issues in the security team's documentation.

Created: 2022-07-04 Last update: 2022-08-01 13:40
Build log checks report 1 warning low
Build log checks report 1 warning
Created: 2017-10-26 Last update: 2022-06-06 22:05
Standards version of the package is outdated. wishlist
The package should be updated to follow the last version of Debian Policy (Standards-Version 4.6.1 instead of 4.1.5).
Created: 2018-04-16 Last update: 2022-06-07 01:06
news
[rss feed]
  • [2022-06-12] busybox 1:1.35.0-1 MIGRATED to testing (Debian testing watch)
  • [2022-06-06] Accepted busybox 1:1.35.0-1 (source) into unstable (Michael Tokarev)
  • [2021-08-28] busybox 1:1.30.1-7 MIGRATED to testing (Debian testing watch)
  • [2021-08-22] Accepted busybox 1:1.30.1-7 (source) into unstable (Aurelien Jarno)
  • [2021-04-01] Accepted busybox 1:1.22.0-19+deb9u2 (source) into oldstable (Markus Koschany)
  • [2021-02-15] Accepted busybox 1:1.22.0-19+deb9u1 (source amd64 all) into oldstable (Markus Koschany)
  • [2020-08-21] busybox 1:1.30.1-6 MIGRATED to testing (Debian testing watch)
  • [2020-08-16] Accepted busybox 1:1.30.1-6 (source) into unstable (Aurelien Jarno)
  • [2020-07-19] busybox 1:1.30.1-5 MIGRATED to testing (Debian testing watch)
  • [2020-07-13] Accepted busybox 1:1.30.1-5 (source) into unstable (Aurelien Jarno)
  • [2019-04-04] busybox 1:1.30.1-4 MIGRATED to testing (Debian testing watch)
  • [2019-04-02] Accepted busybox 1:1.30.1-4 (source) into unstable (Christoph Biedl)
  • [2019-04-01] busybox 1:1.30.1-3 MIGRATED to testing (Debian testing watch)
  • [2019-03-24] Accepted busybox 1:1.30.1-3 (source) into unstable (Christoph Biedl)
  • [2019-03-12] busybox 1:1.30.1-2 MIGRATED to testing (Debian testing watch)
  • [2019-03-02] Accepted busybox 1:1.30.1-2 (source) into unstable (Christoph Biedl)
  • [2019-03-01] Accepted busybox 1:1.30.1-1 (source) into unstable (Christoph Biedl)
  • [2018-08-03] Accepted busybox 1:1.22.0-9+deb8u4 (source amd64 all) into oldstable (Markus Koschany)
  • [2018-08-02] Accepted busybox 1:1.22.0-9+deb8u3 (source amd64 all) into oldstable (Markus Koschany)
  • [2018-07-27] Accepted busybox 1:1.22.0-9+deb8u2 (source amd64 all) into oldstable (Markus Koschany)
  • [2018-07-18] busybox 1:1.27.2-3 MIGRATED to testing (Debian testing watch)
  • [2018-07-13] Accepted busybox 1:1.27.2-3 (source) into unstable (Ben Hutchings)
  • [2017-12-03] busybox 1:1.27.2-2 MIGRATED to testing (Debian testing watch)
  • [2017-11-28] Accepted busybox 1:1.27.2-2 (source) into unstable (Chris Boot)
  • [2017-09-24] busybox 1:1.27.2-1 MIGRATED to testing (Debian testing watch)
  • [2017-09-17] Accepted busybox 1:1.27.2-1 (source) into unstable (Chris Boot)
  • [2016-04-23] busybox 1:1.22.0-19 MIGRATED to testing (Debian testing watch)
  • [2016-04-17] Accepted busybox 1:1.22.0-19 (source) into unstable (Ben Hutchings)
  • [2016-02-09] busybox 1:1.22.0-18 MIGRATED to testing (Debian testing watch)
  • [2016-02-04] Accepted busybox 1:1.22.0-18 (source i386 all) into unstable (Christian Perrier)
  • 1
  • 2
bugs [bug history graph]
  • all: 46 47
  • RC: 0
  • I&N: 25 26
  • M&W: 20
  • F&P: 1
  • patch: 11
links
  • homepage
  • lintian (1, 7)
  • buildd: logs, checks, clang, reproducibility, cross
  • popcon
  • browse source code
  • edit tags
  • other distros
  • security tracker
  • screenshots
ubuntu Ubuntu logo [Information about Ubuntu for Debian Developers]
  • version: 1:1.30.1-7ubuntu3
  • 36 bugs (3 patches)
  • patches for 1:1.30.1-7ubuntu3

Debian Package Tracker — Copyright 2013-2018 The Distro Tracker Developers
Report problems to the tracker.debian.org pseudo-package in the Debian BTS.
Documentation — Bugs — Git Repository — Contributing