[CLSA-2025:1762269073] Fix CVE(s): CVE-2018-1000500, CVE-2022-28391, CVE-2023-39810
Type:
security
Severity:
Important
Release date:
2025-11-04 15:11:26 UTC
Description:
* SECURITY UPDATE: missing SSL certificate validation vulnerability in wget - debian/patches/CVE-2018-1000500-1.patch: implement TLS verification with CENABLE_FEATURE_WGET_OPENSSL - debian/patches/CVE 2018-1000500-2.patch: fix openssl options for cert verification - CVE-2018-1000500 * SECURITY UPDATE: escape sequence injection attack - debian/patches/CVE-2022-28391-1.patch: sockaddr2str: ensure only printable characters are returned for the hostname part - debian/patches/CVE-2022-28391-2.patch: nslookup: sanitize all printed strings - CVE-2022-28391 * SECURITY UPDATE: directory traversal vulnerability in CPIO command - debian/patches/CVE-2023-39810.patch: archival: disallow path traversals - debian/config/pkg/*: regenerate to add the new FEATURE_PATH_TRAVERSAL_PROTECTION option - CVE-2023-39810
Updated packages:
  • busybox_1.30.1-4+tuxcare.els3_amd64.deb
    sha:21a2ce52c43b99e8c54e0664eb281f404b686d96
  • busybox-static_1.30.1-4+tuxcare.els3_amd64.deb
    sha:78dd776d8c94616d646705a43d2bd66a54fdb77b
  • busybox-syslogd_1.30.1-4+tuxcare.els3_all.deb
    sha:b285d1fcf1db417003615ff4b836ff3175a3202a
  • udhcpc_1.30.1-4+tuxcare.els3_amd64.deb
    sha:5fb6ffe2b094e54743bbcec262c10cbd0b469dc5
  • udhcpd_1.30.1-4+tuxcare.els3_amd64.deb
    sha:ebc00a2736308db32cd17044925db8a5a6a0158d
Notes:
This page is generated automatically and has not been checked for errors. For clarification or corrections please contact the CloudLinux Packaging Team.