<?xml version="1.0" encoding="UTF-8"?>
<cvrfdoc xmlns="http://www.icasi.org/CVRF/schema/cvrf/1.1" xmlns:cvrf="http://www.icasi.org/CVRF/schema/cvrf/1.1">
  <DocumentTitle xml:lang="en">Security update for busybox</DocumentTitle>
  <DocumentType>SUSE Patch</DocumentType>
  <DocumentPublisher Type="Vendor">
    <ContactDetails>security@suse.de</ContactDetails>
    <IssuingAuthority>SUSE Security Team</IssuingAuthority>
  </DocumentPublisher>
  <DocumentTracking>
    <Identification>
      <ID>SUSE-SU-2026:0872-1</ID>
    </Identification>
    <Status>Final</Status>
    <Version>1</Version>
    <RevisionHistory>
      <Revision>
        <Number>1</Number>
        <Date>2026-03-11T17:06:34Z</Date>
        <Description>current</Description>
      </Revision>
    </RevisionHistory>
    <InitialReleaseDate>2026-03-11T17:06:34Z</InitialReleaseDate>
    <CurrentReleaseDate>2026-03-11T17:06:34Z</CurrentReleaseDate>
    <Generator>
      <Engine>cve-database/bin/generate-cvrf.pl</Engine>
      <Date>2017-02-24T01:00:00Z</Date>
    </Generator>
  </DocumentTracking>
  <DocumentNotes>
    <Note Title="Topic" Type="Summary" Ordinal="1" xml:lang="en">Security update for busybox</Note>
    <Note Title="Details" Type="General" Ordinal="2" xml:lang="en">This update for busybox fixes the following issues:

- CVE-2023-42363: use-after-free vulnerability in xasprintf function in xfuncs_printf.c (bsc#1217580).
- CVE-2023-42364: use-after-free in the awk.c evaluate function (bsc#1217584).
- CVE-2023-42365: use-after-free in the awk.c copyvar function (bsc#1217585).
- CVE-2025-46394: files in a TAR archive can have their filenames hidden from a listing if terminal escape sequences are
  used when naming other files included in the archive (bsc#1241661).
- CVE-2025-60876: request line incorrectly neutralized mat lead to header injection (bsc#1253245).
- CVE-2026-26157: Arbitrary file overwrite and potential code execution via incomplete path sanitization (bsc#1258163).
- CVE-2026-26158: Arbitrary file modification and privilege escalation via unvalidated tar archive entries
  (bsc#1258167).
- CVE-2021-42380: Additional fix for use-after-realloc in awk (bsc#1192869).
</Note>
    <Note Title="Terms of Use" Type="Legal Disclaimer" Ordinal="3" xml:lang="en">The CVRF data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).</Note>
    <Note Title="Patchnames" Type="Details" Ordinal="4" xml:lang="en">SUSE-2026-872,SUSE-SLE-Product-HPC-15-SP4-ESPOS-2026-872,SUSE-SLE-Product-HPC-15-SP4-LTSS-2026-872,SUSE-SLE-Product-SLES-15-SP4-LTSS-2026-872,SUSE-SLE-Product-SLES_SAP-15-SP4-2026-872</Note>
  </DocumentNotes>
  <DocumentDistribution xml:lang="en">Copyright SUSE LLC under the Creative Commons License 4.0 with Attribution (CC-BY-4.0)</DocumentDistribution>
  <DocumentReferences>
    <Reference Type="Self">
      <URL>https://www.suse.com/support/update/announcement/2026/suse-su-20260872-1/</URL>
      <Description>Link for SUSE-SU-2026:0872-1</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://lists.suse.com/pipermail/sle-security-updates/2026-March/024677.html</URL>
      <Description>E-Mail link for SUSE-SU-2026:0872-1</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/support/security/rating/</URL>
      <Description>SUSE Security Ratings</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1192869</URL>
      <Description>SUSE Bug 1192869</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1217580</URL>
      <Description>SUSE Bug 1217580</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1217584</URL>
      <Description>SUSE Bug 1217584</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1217585</URL>
      <Description>SUSE Bug 1217585</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1241661</URL>
      <Description>SUSE Bug 1241661</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1253245</URL>
      <Description>SUSE Bug 1253245</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1258163</URL>
      <Description>SUSE Bug 1258163</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1258167</URL>
      <Description>SUSE Bug 1258167</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2021-42380/</URL>
      <Description>SUSE CVE CVE-2021-42380 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2023-42363/</URL>
      <Description>SUSE CVE CVE-2023-42363 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2023-42364/</URL>
      <Description>SUSE CVE CVE-2023-42364 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2023-42365/</URL>
      <Description>SUSE CVE CVE-2023-42365 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2025-46394/</URL>
      <Description>SUSE CVE CVE-2025-46394 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2025-60876/</URL>
      <Description>SUSE CVE CVE-2025-60876 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2026-26157/</URL>
      <Description>SUSE CVE CVE-2026-26157 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2026-26158/</URL>
      <Description>SUSE CVE CVE-2026-26158 page</Description>
    </Reference>
  </DocumentReferences>
  <ProductTree xmlns="http://www.icasi.org/CVRF/schema/prod/1.1">
    <Branch Type="Product Family" Name="SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS">
      <Branch Type="Product Name" Name="SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS">
        <FullProductName ProductID="SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS" CPE="cpe:/o:suse:sle_hpc-espos:15:sp4">SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS</FullProductName>
      </Branch>
    </Branch>
    <Branch Type="Product Family" Name="SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS">
      <Branch Type="Product Name" Name="SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS">
        <FullProductName ProductID="SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS" CPE="cpe:/o:suse:sle_hpc-ltss:15:sp4">SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS</FullProductName>
      </Branch>
    </Branch>
    <Branch Type="Product Family" Name="SUSE Linux Enterprise Server 15 SP4-LTSS">
      <Branch Type="Product Name" Name="SUSE Linux Enterprise Server 15 SP4-LTSS">
        <FullProductName ProductID="SUSE Linux Enterprise Server 15 SP4-LTSS" CPE="cpe:/o:suse:sles-ltss:15:sp4">SUSE Linux Enterprise Server 15 SP4-LTSS</FullProductName>
      </Branch>
    </Branch>
    <Branch Type="Product Family" Name="SUSE Linux Enterprise Server for SAP Applications 15 SP4">
      <Branch Type="Product Name" Name="SUSE Linux Enterprise Server for SAP Applications 15 SP4">
        <FullProductName ProductID="SUSE Linux Enterprise Server for SAP Applications 15 SP4" CPE="cpe:/o:suse:sles_sap:15:sp4">SUSE Linux Enterprise Server for SAP Applications 15 SP4</FullProductName>
      </Branch>
    </Branch>
    <Branch Type="Product Version" Name="busybox-1.35.0-150400.3.14.1">
      <FullProductName ProductID="busybox-1.35.0-150400.3.14.1">busybox-1.35.0-150400.3.14.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="busybox-adduser-1.35.0-150400.4.7.1">
      <FullProductName ProductID="busybox-adduser-1.35.0-150400.4.7.1">busybox-adduser-1.35.0-150400.4.7.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="busybox-attr-1.35.0-150400.4.7.1">
      <FullProductName ProductID="busybox-attr-1.35.0-150400.4.7.1">busybox-attr-1.35.0-150400.4.7.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="busybox-bc-1.35.0-150400.4.7.1">
      <FullProductName ProductID="busybox-bc-1.35.0-150400.4.7.1">busybox-bc-1.35.0-150400.4.7.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="busybox-bind-utils-1.35.0-150400.4.7.1">
      <FullProductName ProductID="busybox-bind-utils-1.35.0-150400.4.7.1">busybox-bind-utils-1.35.0-150400.4.7.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="busybox-bzip2-1.35.0-150400.4.7.1">
      <FullProductName ProductID="busybox-bzip2-1.35.0-150400.4.7.1">busybox-bzip2-1.35.0-150400.4.7.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="busybox-coreutils-1.35.0-150400.4.7.1">
      <FullProductName ProductID="busybox-coreutils-1.35.0-150400.4.7.1">busybox-coreutils-1.35.0-150400.4.7.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="busybox-cpio-1.35.0-150400.4.7.1">
      <FullProductName ProductID="busybox-cpio-1.35.0-150400.4.7.1">busybox-cpio-1.35.0-150400.4.7.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="busybox-diffutils-1.35.0-150400.4.7.1">
      <FullProductName ProductID="busybox-diffutils-1.35.0-150400.4.7.1">busybox-diffutils-1.35.0-150400.4.7.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="busybox-dos2unix-1.35.0-150400.4.7.1">
      <FullProductName ProductID="busybox-dos2unix-1.35.0-150400.4.7.1">busybox-dos2unix-1.35.0-150400.4.7.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="busybox-ed-1.35.0-150400.4.7.1">
      <FullProductName ProductID="busybox-ed-1.35.0-150400.4.7.1">busybox-ed-1.35.0-150400.4.7.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="busybox-findutils-1.35.0-150400.4.7.1">
      <FullProductName ProductID="busybox-findutils-1.35.0-150400.4.7.1">busybox-findutils-1.35.0-150400.4.7.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="busybox-gawk-1.35.0-150400.4.7.1">
      <FullProductName ProductID="busybox-gawk-1.35.0-150400.4.7.1">busybox-gawk-1.35.0-150400.4.7.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="busybox-grep-1.35.0-150400.4.7.1">
      <FullProductName ProductID="busybox-grep-1.35.0-150400.4.7.1">busybox-grep-1.35.0-150400.4.7.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="busybox-gzip-1.35.0-150400.4.7.1">
      <FullProductName ProductID="busybox-gzip-1.35.0-150400.4.7.1">busybox-gzip-1.35.0-150400.4.7.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="busybox-hostname-1.35.0-150400.4.7.1">
      <FullProductName ProductID="busybox-hostname-1.35.0-150400.4.7.1">busybox-hostname-1.35.0-150400.4.7.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="busybox-iproute2-1.35.0-150400.4.7.1">
      <FullProductName ProductID="busybox-iproute2-1.35.0-150400.4.7.1">busybox-iproute2-1.35.0-150400.4.7.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="busybox-iputils-1.35.0-150400.4.7.1">
      <FullProductName ProductID="busybox-iputils-1.35.0-150400.4.7.1">busybox-iputils-1.35.0-150400.4.7.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="busybox-kbd-1.35.0-150400.4.7.1">
      <FullProductName ProductID="busybox-kbd-1.35.0-150400.4.7.1">busybox-kbd-1.35.0-150400.4.7.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="busybox-kmod-1.35.0-150400.4.7.1">
      <FullProductName ProductID="busybox-kmod-1.35.0-150400.4.7.1">busybox-kmod-1.35.0-150400.4.7.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="busybox-less-1.35.0-150400.4.7.1">
      <FullProductName ProductID="busybox-less-1.35.0-150400.4.7.1">busybox-less-1.35.0-150400.4.7.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="busybox-links-1.35.0-150400.4.7.1">
      <FullProductName ProductID="busybox-links-1.35.0-150400.4.7.1">busybox-links-1.35.0-150400.4.7.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="busybox-man-1.35.0-150400.4.7.1">
      <FullProductName ProductID="busybox-man-1.35.0-150400.4.7.1">busybox-man-1.35.0-150400.4.7.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="busybox-misc-1.35.0-150400.4.7.1">
      <FullProductName ProductID="busybox-misc-1.35.0-150400.4.7.1">busybox-misc-1.35.0-150400.4.7.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="busybox-ncurses-utils-1.35.0-150400.4.7.1">
      <FullProductName ProductID="busybox-ncurses-utils-1.35.0-150400.4.7.1">busybox-ncurses-utils-1.35.0-150400.4.7.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="busybox-net-tools-1.35.0-150400.4.7.1">
      <FullProductName ProductID="busybox-net-tools-1.35.0-150400.4.7.1">busybox-net-tools-1.35.0-150400.4.7.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="busybox-netcat-1.35.0-150400.4.7.1">
      <FullProductName ProductID="busybox-netcat-1.35.0-150400.4.7.1">busybox-netcat-1.35.0-150400.4.7.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="busybox-patch-1.35.0-150400.4.7.1">
      <FullProductName ProductID="busybox-patch-1.35.0-150400.4.7.1">busybox-patch-1.35.0-150400.4.7.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="busybox-policycoreutils-1.35.0-150400.4.7.1">
      <FullProductName ProductID="busybox-policycoreutils-1.35.0-150400.4.7.1">busybox-policycoreutils-1.35.0-150400.4.7.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="busybox-procps-1.35.0-150400.4.7.1">
      <FullProductName ProductID="busybox-procps-1.35.0-150400.4.7.1">busybox-procps-1.35.0-150400.4.7.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="busybox-psmisc-1.35.0-150400.4.7.1">
      <FullProductName ProductID="busybox-psmisc-1.35.0-150400.4.7.1">busybox-psmisc-1.35.0-150400.4.7.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="busybox-sed-1.35.0-150400.4.7.1">
      <FullProductName ProductID="busybox-sed-1.35.0-150400.4.7.1">busybox-sed-1.35.0-150400.4.7.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="busybox-selinux-tools-1.35.0-150400.4.7.1">
      <FullProductName ProductID="busybox-selinux-tools-1.35.0-150400.4.7.1">busybox-selinux-tools-1.35.0-150400.4.7.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="busybox-sendmail-1.35.0-150400.4.7.1">
      <FullProductName ProductID="busybox-sendmail-1.35.0-150400.4.7.1">busybox-sendmail-1.35.0-150400.4.7.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="busybox-sh-1.35.0-150400.4.7.1">
      <FullProductName ProductID="busybox-sh-1.35.0-150400.4.7.1">busybox-sh-1.35.0-150400.4.7.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="busybox-sharutils-1.35.0-150400.4.7.1">
      <FullProductName ProductID="busybox-sharutils-1.35.0-150400.4.7.1">busybox-sharutils-1.35.0-150400.4.7.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="busybox-static-1.35.0-150400.3.14.1">
      <FullProductName ProductID="busybox-static-1.35.0-150400.3.14.1">busybox-static-1.35.0-150400.3.14.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="busybox-syslogd-1.35.0-150400.4.7.1">
      <FullProductName ProductID="busybox-syslogd-1.35.0-150400.4.7.1">busybox-syslogd-1.35.0-150400.4.7.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="busybox-sysvinit-tools-1.35.0-150400.4.7.1">
      <FullProductName ProductID="busybox-sysvinit-tools-1.35.0-150400.4.7.1">busybox-sysvinit-tools-1.35.0-150400.4.7.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="busybox-tar-1.35.0-150400.4.7.1">
      <FullProductName ProductID="busybox-tar-1.35.0-150400.4.7.1">busybox-tar-1.35.0-150400.4.7.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="busybox-telnet-1.35.0-150400.4.7.1">
      <FullProductName ProductID="busybox-telnet-1.35.0-150400.4.7.1">busybox-telnet-1.35.0-150400.4.7.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="busybox-testsuite-1.35.0-150400.3.14.1">
      <FullProductName ProductID="busybox-testsuite-1.35.0-150400.3.14.1">busybox-testsuite-1.35.0-150400.3.14.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="busybox-tftp-1.35.0-150400.4.7.1">
      <FullProductName ProductID="busybox-tftp-1.35.0-150400.4.7.1">busybox-tftp-1.35.0-150400.4.7.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="busybox-time-1.35.0-150400.4.7.1">
      <FullProductName ProductID="busybox-time-1.35.0-150400.4.7.1">busybox-time-1.35.0-150400.4.7.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="busybox-traceroute-1.35.0-150400.4.7.1">
      <FullProductName ProductID="busybox-traceroute-1.35.0-150400.4.7.1">busybox-traceroute-1.35.0-150400.4.7.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="busybox-tunctl-1.35.0-150400.4.7.1">
      <FullProductName ProductID="busybox-tunctl-1.35.0-150400.4.7.1">busybox-tunctl-1.35.0-150400.4.7.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="busybox-unzip-1.35.0-150400.4.7.1">
      <FullProductName ProductID="busybox-unzip-1.35.0-150400.4.7.1">busybox-unzip-1.35.0-150400.4.7.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="busybox-util-linux-1.35.0-150400.4.7.1">
      <FullProductName ProductID="busybox-util-linux-1.35.0-150400.4.7.1">busybox-util-linux-1.35.0-150400.4.7.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="busybox-vi-1.35.0-150400.4.7.1">
      <FullProductName ProductID="busybox-vi-1.35.0-150400.4.7.1">busybox-vi-1.35.0-150400.4.7.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="busybox-vlan-1.35.0-150400.4.7.1">
      <FullProductName ProductID="busybox-vlan-1.35.0-150400.4.7.1">busybox-vlan-1.35.0-150400.4.7.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="busybox-warewulf3-1.35.0-150400.3.14.1">
      <FullProductName ProductID="busybox-warewulf3-1.35.0-150400.3.14.1">busybox-warewulf3-1.35.0-150400.3.14.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="busybox-wget-1.35.0-150400.4.7.1">
      <FullProductName ProductID="busybox-wget-1.35.0-150400.4.7.1">busybox-wget-1.35.0-150400.4.7.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="busybox-which-1.35.0-150400.4.7.1">
      <FullProductName ProductID="busybox-which-1.35.0-150400.4.7.1">busybox-which-1.35.0-150400.4.7.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="busybox-whois-1.35.0-150400.4.7.1">
      <FullProductName ProductID="busybox-whois-1.35.0-150400.4.7.1">busybox-whois-1.35.0-150400.4.7.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="busybox-xz-1.35.0-150400.4.7.1">
      <FullProductName ProductID="busybox-xz-1.35.0-150400.4.7.1">busybox-xz-1.35.0-150400.4.7.1</FullProductName>
    </Branch>
    <Relationship ProductReference="busybox-1.35.0-150400.3.14.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS">
      <FullProductName ProductID="SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:busybox-1.35.0-150400.3.14.1">busybox-1.35.0-150400.3.14.1 as a component of SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS</FullProductName>
    </Relationship>
    <Relationship ProductReference="busybox-static-1.35.0-150400.3.14.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS">
      <FullProductName ProductID="SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:busybox-static-1.35.0-150400.3.14.1">busybox-static-1.35.0-150400.3.14.1 as a component of SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS</FullProductName>
    </Relationship>
    <Relationship ProductReference="busybox-1.35.0-150400.3.14.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS">
      <FullProductName ProductID="SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:busybox-1.35.0-150400.3.14.1">busybox-1.35.0-150400.3.14.1 as a component of SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS</FullProductName>
    </Relationship>
    <Relationship ProductReference="busybox-static-1.35.0-150400.3.14.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS">
      <FullProductName ProductID="SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:busybox-static-1.35.0-150400.3.14.1">busybox-static-1.35.0-150400.3.14.1 as a component of SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS</FullProductName>
    </Relationship>
    <Relationship ProductReference="busybox-1.35.0-150400.3.14.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise Server 15 SP4-LTSS">
      <FullProductName ProductID="SUSE Linux Enterprise Server 15 SP4-LTSS:busybox-1.35.0-150400.3.14.1">busybox-1.35.0-150400.3.14.1 as a component of SUSE Linux Enterprise Server 15 SP4-LTSS</FullProductName>
    </Relationship>
    <Relationship ProductReference="busybox-static-1.35.0-150400.3.14.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise Server 15 SP4-LTSS">
      <FullProductName ProductID="SUSE Linux Enterprise Server 15 SP4-LTSS:busybox-static-1.35.0-150400.3.14.1">busybox-static-1.35.0-150400.3.14.1 as a component of SUSE Linux Enterprise Server 15 SP4-LTSS</FullProductName>
    </Relationship>
    <Relationship ProductReference="busybox-1.35.0-150400.3.14.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise Server for SAP Applications 15 SP4">
      <FullProductName ProductID="SUSE Linux Enterprise Server for SAP Applications 15 SP4:busybox-1.35.0-150400.3.14.1">busybox-1.35.0-150400.3.14.1 as a component of SUSE Linux Enterprise Server for SAP Applications 15 SP4</FullProductName>
    </Relationship>
    <Relationship ProductReference="busybox-static-1.35.0-150400.3.14.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise Server for SAP Applications 15 SP4">
      <FullProductName ProductID="SUSE Linux Enterprise Server for SAP Applications 15 SP4:busybox-static-1.35.0-150400.3.14.1">busybox-static-1.35.0-150400.3.14.1 as a component of SUSE Linux Enterprise Server for SAP Applications 15 SP4</FullProductName>
    </Relationship>
  </ProductTree>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="1">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">A use-after-free in Busybox's awk applet leads to denial of service and possibly code execution when processing a crafted awk pattern in the clrvar function</Note>
    </Notes>
    <CVE>CVE-2021-42380</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:busybox-1.35.0-150400.3.14.1</ProductID>
        <ProductID>SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:busybox-static-1.35.0-150400.3.14.1</ProductID>
        <ProductID>SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:busybox-1.35.0-150400.3.14.1</ProductID>
        <ProductID>SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:busybox-static-1.35.0-150400.3.14.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 15 SP4-LTSS:busybox-1.35.0-150400.3.14.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 15 SP4-LTSS:busybox-static-1.35.0-150400.3.14.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 15 SP4:busybox-1.35.0-150400.3.14.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 15 SP4:busybox-static-1.35.0-150400.3.14.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>6.5</BaseScore>
        <Vector>AV:N/AC:L/Au:S/C:P/I:P/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2026/suse-su-20260872-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2021-42380.html</URL>
        <Description>CVE-2021-42380</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1192869</URL>
        <Description>SUSE Bug 1192869</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="2">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">A use-after-free vulnerability was discovered in xasprintf function in xfuncs_printf.c:344 in BusyBox v.1.36.1.</Note>
    </Notes>
    <CVE>CVE-2023-42363</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:busybox-1.35.0-150400.3.14.1</ProductID>
        <ProductID>SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:busybox-static-1.35.0-150400.3.14.1</ProductID>
        <ProductID>SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:busybox-1.35.0-150400.3.14.1</ProductID>
        <ProductID>SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:busybox-static-1.35.0-150400.3.14.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 15 SP4-LTSS:busybox-1.35.0-150400.3.14.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 15 SP4-LTSS:busybox-static-1.35.0-150400.3.14.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 15 SP4:busybox-1.35.0-150400.3.14.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 15 SP4:busybox-static-1.35.0-150400.3.14.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2026/suse-su-20260872-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2023-42363.html</URL>
        <Description>CVE-2023-42363</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1217580</URL>
        <Description>SUSE Bug 1217580</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="3">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">A use-after-free vulnerability in BusyBox v.1.36.1 allows attackers to cause a denial of service via a crafted awk pattern in the awk.c evaluate function.</Note>
    </Notes>
    <CVE>CVE-2023-42364</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:busybox-1.35.0-150400.3.14.1</ProductID>
        <ProductID>SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:busybox-static-1.35.0-150400.3.14.1</ProductID>
        <ProductID>SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:busybox-1.35.0-150400.3.14.1</ProductID>
        <ProductID>SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:busybox-static-1.35.0-150400.3.14.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 15 SP4-LTSS:busybox-1.35.0-150400.3.14.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 15 SP4-LTSS:busybox-static-1.35.0-150400.3.14.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 15 SP4:busybox-1.35.0-150400.3.14.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 15 SP4:busybox-static-1.35.0-150400.3.14.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2026/suse-su-20260872-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2023-42364.html</URL>
        <Description>CVE-2023-42364</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1217584</URL>
        <Description>SUSE Bug 1217584</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="4">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">A use-after-free vulnerability was discovered in BusyBox v.1.36.1 via a crafted awk pattern in the awk.c copyvar function.</Note>
    </Notes>
    <CVE>CVE-2023-42365</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:busybox-1.35.0-150400.3.14.1</ProductID>
        <ProductID>SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:busybox-static-1.35.0-150400.3.14.1</ProductID>
        <ProductID>SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:busybox-1.35.0-150400.3.14.1</ProductID>
        <ProductID>SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:busybox-static-1.35.0-150400.3.14.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 15 SP4-LTSS:busybox-1.35.0-150400.3.14.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 15 SP4-LTSS:busybox-static-1.35.0-150400.3.14.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 15 SP4:busybox-1.35.0-150400.3.14.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 15 SP4:busybox-static-1.35.0-150400.3.14.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2026/suse-su-20260872-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2023-42365.html</URL>
        <Description>CVE-2023-42365</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1217585</URL>
        <Description>SUSE Bug 1217585</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="5">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In tar in BusyBox through 1.37.0, a TAR archive can have filenames hidden from a listing through the use of terminal escape sequences.</Note>
    </Notes>
    <CVE>CVE-2025-46394</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:busybox-1.35.0-150400.3.14.1</ProductID>
        <ProductID>SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:busybox-static-1.35.0-150400.3.14.1</ProductID>
        <ProductID>SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:busybox-1.35.0-150400.3.14.1</ProductID>
        <ProductID>SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:busybox-static-1.35.0-150400.3.14.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 15 SP4-LTSS:busybox-1.35.0-150400.3.14.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 15 SP4-LTSS:busybox-static-1.35.0-150400.3.14.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 15 SP4:busybox-1.35.0-150400.3.14.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 15 SP4:busybox-static-1.35.0-150400.3.14.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2026/suse-su-20260872-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2025-46394.html</URL>
        <Description>CVE-2025-46394</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1241661</URL>
        <Description>SUSE Bug 1241661</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="6">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">BusyBox wget thru 1.3.7 accepted raw CR (0x0D)/LF (0x0A) and other C0 control bytes in the HTTP request-target (path/query), allowing the request line to be split and attacker-controlled headers to be injected. To preserve the HTTP/1.1 request-line shape METHOD SP request-target SP HTTP/1.1, a raw space (0x20) in the request-target must also be rejected (clients should use %20).</Note>
    </Notes>
    <CVE>CVE-2025-60876</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:busybox-1.35.0-150400.3.14.1</ProductID>
        <ProductID>SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:busybox-static-1.35.0-150400.3.14.1</ProductID>
        <ProductID>SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:busybox-1.35.0-150400.3.14.1</ProductID>
        <ProductID>SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:busybox-static-1.35.0-150400.3.14.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 15 SP4-LTSS:busybox-1.35.0-150400.3.14.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 15 SP4-LTSS:busybox-static-1.35.0-150400.3.14.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 15 SP4:busybox-1.35.0-150400.3.14.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 15 SP4:busybox-static-1.35.0-150400.3.14.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2026/suse-su-20260872-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2025-60876.html</URL>
        <Description>CVE-2025-60876</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1253245</URL>
        <Description>SUSE Bug 1253245</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="7">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">A flaw was found in BusyBox. Incomplete path sanitization in its archive extraction utilities allows an attacker to craft malicious archives that when extracted, and under specific conditions, may write to files outside the intended directory. This can lead to arbitrary file overwrite, potentially enabling code execution through the modification of sensitive system files.</Note>
    </Notes>
    <CVE>CVE-2026-26157</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:busybox-1.35.0-150400.3.14.1</ProductID>
        <ProductID>SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:busybox-static-1.35.0-150400.3.14.1</ProductID>
        <ProductID>SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:busybox-1.35.0-150400.3.14.1</ProductID>
        <ProductID>SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:busybox-static-1.35.0-150400.3.14.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 15 SP4-LTSS:busybox-1.35.0-150400.3.14.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 15 SP4-LTSS:busybox-static-1.35.0-150400.3.14.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 15 SP4:busybox-1.35.0-150400.3.14.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 15 SP4:busybox-static-1.35.0-150400.3.14.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2026/suse-su-20260872-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2026-26157.html</URL>
        <Description>CVE-2026-26157</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1258163</URL>
        <Description>SUSE Bug 1258163</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="8">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">A flaw was found in BusyBox. This vulnerability allows an attacker to modify files outside of the intended extraction directory by crafting a malicious tar archive containing unvalidated hardlink or symlink entries. If the tar archive is extracted with elevated privileges, this flaw can lead to privilege escalation, enabling an attacker to gain unauthorized access to critical system files.</Note>
    </Notes>
    <CVE>CVE-2026-26158</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:busybox-1.35.0-150400.3.14.1</ProductID>
        <ProductID>SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:busybox-static-1.35.0-150400.3.14.1</ProductID>
        <ProductID>SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:busybox-1.35.0-150400.3.14.1</ProductID>
        <ProductID>SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:busybox-static-1.35.0-150400.3.14.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 15 SP4-LTSS:busybox-1.35.0-150400.3.14.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 15 SP4-LTSS:busybox-static-1.35.0-150400.3.14.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 15 SP4:busybox-1.35.0-150400.3.14.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 15 SP4:busybox-static-1.35.0-150400.3.14.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2026/suse-su-20260872-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2026-26158.html</URL>
        <Description>CVE-2026-26158</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1258167</URL>
        <Description>SUSE Bug 1258167</Description>
      </Reference>
    </References>
  </Vulnerability>
</cvrfdoc>
