{"schema_version":"1.7.2","id":"OESA-2026-2357","modified":"2026-05-15T14:03:40Z","published":"2026-05-15T14:03:40Z","upstream":["CVE-2026-29004"],"summary":"busybox security update","details":"The Swiss Army Knife of Embedded Linux\r\n\r\nSecurity Fix(es):\n\nBusyBox before commit 42202bf contains a heap buffer overflow vulnerability in the DHCPv6 client (udhcpc6) DNS_SERVERS option handler in networking/udhcp/d6_dhcpc.c that allows network-adjacent attackers to trigger memory corruption by sending a crafted DHCPv6 response with a malformed D6_OPT_DNS_SERVERS option. Attackers can exploit incorrect heap buffer allocation calculations in the option_to_env() function to cause denial of service or achieve arbitrary code execution on embedded systems without heap hardening.(CVE-2026-29004)","affected":[{"package":{"ecosystem":"openEuler:24.03-LTS-SP3","name":"busybox","purl":"pkg:rpm/openEuler/busybox&distro=openEuler-24.03-LTS-SP3"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"1.36.1-16.oe2403sp3"}]}],"ecosystem_specific":{"aarch64":["busybox-1.36.1-16.oe2403sp3.aarch64.rpm","busybox-debuginfo-1.36.1-16.oe2403sp3.aarch64.rpm","busybox-debugsource-1.36.1-16.oe2403sp3.aarch64.rpm","busybox-petitboot-1.36.1-16.oe2403sp3.aarch64.rpm"],"noarch":["busybox-help-1.36.1-16.oe2403sp3.noarch.rpm"],"src":["busybox-1.36.1-16.oe2403sp3.src.rpm"],"x86_64":["busybox-1.36.1-16.oe2403sp3.x86_64.rpm","busybox-debuginfo-1.36.1-16.oe2403sp3.x86_64.rpm","busybox-debugsource-1.36.1-16.oe2403sp3.x86_64.rpm","busybox-petitboot-1.36.1-16.oe2403sp3.x86_64.rpm"]}},{"package":{"ecosystem":"openEuler:20.03-LTS-SP4","name":"busybox","purl":"pkg:rpm/openEuler/busybox&distro=openEuler-20.03-LTS-SP4"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"1.31.1-30.oe2003sp4"}]}],"ecosystem_specific":{"aarch64":["busybox-1.31.1-30.oe2003sp4.aarch64.rpm","busybox-debuginfo-1.31.1-30.oe2003sp4.aarch64.rpm","busybox-debugsource-1.31.1-30.oe2003sp4.aarch64.rpm","busybox-help-1.31.1-30.oe2003sp4.aarch64.rpm","busybox-petitboot-1.31.1-30.oe2003sp4.aarch64.rpm"],"src":["busybox-1.31.1-30.oe2003sp4.src.rpm"],"x86_64":["busybox-1.31.1-30.oe2003sp4.x86_64.rpm","busybox-debuginfo-1.31.1-30.oe2003sp4.x86_64.rpm","busybox-debugsource-1.31.1-30.oe2003sp4.x86_64.rpm","busybox-help-1.31.1-30.oe2003sp4.x86_64.rpm","busybox-petitboot-1.31.1-30.oe2003sp4.x86_64.rpm"]}},{"package":{"ecosystem":"openEuler:22.03-LTS-SP4","name":"busybox","purl":"pkg:rpm/openEuler/busybox&distro=openEuler-22.03-LTS-SP4"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"1.34.1-30.oe2203sp4"}]}],"ecosystem_specific":{"aarch64":["busybox-1.34.1-30.oe2203sp4.aarch64.rpm","busybox-debuginfo-1.34.1-30.oe2203sp4.aarch64.rpm","busybox-debugsource-1.34.1-30.oe2203sp4.aarch64.rpm","busybox-help-1.34.1-30.oe2203sp4.aarch64.rpm","busybox-petitboot-1.34.1-30.oe2203sp4.aarch64.rpm"],"src":["busybox-1.34.1-30.oe2203sp4.src.rpm"],"x86_64":["busybox-1.34.1-30.oe2203sp4.x86_64.rpm","busybox-debuginfo-1.34.1-30.oe2203sp4.x86_64.rpm","busybox-debugsource-1.34.1-30.oe2203sp4.x86_64.rpm","busybox-help-1.34.1-30.oe2203sp4.x86_64.rpm","busybox-petitboot-1.34.1-30.oe2203sp4.x86_64.rpm"]}},{"package":{"ecosystem":"openEuler:24.03-LTS","name":"busybox","purl":"pkg:rpm/openEuler/busybox&distro=openEuler-24.03-LTS"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"1.36.1-16.oe2403sp1"}]}],"ecosystem_specific":{"aarch64":["busybox-1.36.1-16.oe2403sp3.aarch64.rpm","busybox-debuginfo-1.36.1-16.oe2403sp3.aarch64.rpm","busybox-debugsource-1.36.1-16.oe2403sp3.aarch64.rpm","busybox-petitboot-1.36.1-16.oe2403sp3.aarch64.rpm","busybox-1.36.1-16.oe2403.aarch64.rpm","busybox-debuginfo-1.36.1-16.oe2403.aarch64.rpm","busybox-debugsource-1.36.1-16.oe2403.aarch64.rpm","busybox-petitboot-1.36.1-16.oe2403.aarch64.rpm","busybox-1.36.1-16.oe2403sp1.aarch64.rpm","busybox-debuginfo-1.36.1-16.oe2403sp1.aarch64.rpm","busybox-debugsource-1.36.1-16.oe2403sp1.aarch64.rpm","busybox-petitboot-1.36.1-16.oe2403sp1.aarch64.rpm"],"noarch":["busybox-help-1.36.1-16.oe2403sp3.noarch.rpm","busybox-help-1.36.1-16.oe2403.noarch.rpm","busybox-help-1.36.1-16.oe2403sp1.noarch.rpm"],"src":["busybox-1.36.1-16.oe2403sp3.src.rpm","busybox-1.36.1-16.oe2403.src.rpm","busybox-1.36.1-16.oe2403sp1.src.rpm"],"x86_64":["busybox-1.36.1-16.oe2403sp3.x86_64.rpm","busybox-debuginfo-1.36.1-16.oe2403sp3.x86_64.rpm","busybox-debugsource-1.36.1-16.oe2403sp3.x86_64.rpm","busybox-petitboot-1.36.1-16.oe2403sp3.x86_64.rpm","busybox-1.36.1-16.oe2403.x86_64.rpm","busybox-debuginfo-1.36.1-16.oe2403.x86_64.rpm","busybox-debugsource-1.36.1-16.oe2403.x86_64.rpm","busybox-petitboot-1.36.1-16.oe2403.x86_64.rpm","busybox-1.36.1-16.oe2403sp1.x86_64.rpm","busybox-debuginfo-1.36.1-16.oe2403sp1.x86_64.rpm","busybox-debugsource-1.36.1-16.oe2403sp1.x86_64.rpm","busybox-petitboot-1.36.1-16.oe2403sp1.x86_64.rpm"]}},{"package":{"ecosystem":"openEuler:24.03-LTS-SP1","name":"busybox","purl":"pkg:rpm/openEuler/busybox&distro=openEuler-24.03-LTS-SP1"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"1.36.1-16.oe2403sp1"}]}],"ecosystem_specific":{"aarch64":["busybox-1.36.1-16.oe2403sp1.aarch64.rpm","busybox-debuginfo-1.36.1-16.oe2403sp1.aarch64.rpm","busybox-debugsource-1.36.1-16.oe2403sp1.aarch64.rpm","busybox-petitboot-1.36.1-16.oe2403sp1.aarch64.rpm"],"noarch":["busybox-help-1.36.1-16.oe2403sp1.noarch.rpm"],"src":["busybox-1.36.1-16.oe2403sp1.src.rpm"],"x86_64":["busybox-1.36.1-16.oe2403sp1.x86_64.rpm","busybox-debuginfo-1.36.1-16.oe2403sp1.x86_64.rpm","busybox-debugsource-1.36.1-16.oe2403sp1.x86_64.rpm","busybox-petitboot-1.36.1-16.oe2403sp1.x86_64.rpm"]}}],"references":[{"type":"ADVISORY","url":"https://www.openeuler.org/zh/security/security-bulletins/detail/?id=openEuler-SA-2026-2357"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2026-29004"}],"database_specific":{"severity":"High"}}
