vulnerability
SUSE: CVE-2022-48174: SUSE Linux Security Advisory
Severity | CVSS | Published | Added | Modified |
---|---|---|---|---|
10 | (AV:N/AC:L/Au:N/C:C/I:C/A:C) | 2023-08-22 | 2023-09-06 | 2025-01-28 |
Severity
10
CVSS
(AV:N/AC:L/Au:N/C:C/I:C/A:C)
Published
2023-08-22
Added
2023-09-06
Modified
2025-01-28
Description
There is a stack overflow vulnerability in ash.c:6030 in busybox before 1.35. In the environment of Internet of Vehicles, this vulnerability can be executed from command to arbitrary code execution.
Solution(s)
suse-upgrade-busyboxsuse-upgrade-busybox-addusersuse-upgrade-busybox-attrsuse-upgrade-busybox-bcsuse-upgrade-busybox-bind-utilssuse-upgrade-busybox-bzip2suse-upgrade-busybox-coreutilssuse-upgrade-busybox-cpiosuse-upgrade-busybox-diffutilssuse-upgrade-busybox-dos2unixsuse-upgrade-busybox-edsuse-upgrade-busybox-findutilssuse-upgrade-busybox-gawksuse-upgrade-busybox-grepsuse-upgrade-busybox-gzipsuse-upgrade-busybox-hostnamesuse-upgrade-busybox-iproute2suse-upgrade-busybox-iputilssuse-upgrade-busybox-kbdsuse-upgrade-busybox-kmodsuse-upgrade-busybox-lesssuse-upgrade-busybox-linkssuse-upgrade-busybox-mansuse-upgrade-busybox-miscsuse-upgrade-busybox-ncurses-utilssuse-upgrade-busybox-net-toolssuse-upgrade-busybox-netcatsuse-upgrade-busybox-patchsuse-upgrade-busybox-policycoreutilssuse-upgrade-busybox-procpssuse-upgrade-busybox-psmiscsuse-upgrade-busybox-sedsuse-upgrade-busybox-selinux-toolssuse-upgrade-busybox-sendmailsuse-upgrade-busybox-shsuse-upgrade-busybox-sharutilssuse-upgrade-busybox-staticsuse-upgrade-busybox-syslogdsuse-upgrade-busybox-sysvinit-toolssuse-upgrade-busybox-tarsuse-upgrade-busybox-telnetsuse-upgrade-busybox-testsuitesuse-upgrade-busybox-tftpsuse-upgrade-busybox-timesuse-upgrade-busybox-traceroutesuse-upgrade-busybox-tunctlsuse-upgrade-busybox-unzipsuse-upgrade-busybox-util-linuxsuse-upgrade-busybox-visuse-upgrade-busybox-vlansuse-upgrade-busybox-warewulf3suse-upgrade-busybox-wgetsuse-upgrade-busybox-whichsuse-upgrade-busybox-whoissuse-upgrade-busybox-xz

NEW
Explore Exposure Command
Confidently identify and prioritize exposures from endpoint to cloud with full attack surface visibility and threat-aware risk context.