{"id":"OESA-2026-1881","summary":"busybox security update","details":"BusyBox combines tiny versions of many common UNIX utilities into a single small executable. It provides replacements for most of the utilities you usually find in GNU fileutils, shellutils, etc. It provides a fairly complete environment for any small or embedded system.\r\n\r\nSecurity Fix(es):\n\nBusyBox wget thru 1.3.7 accepted raw CR (0x0D)/LF (0x0A) and other C0 control bytes in the HTTP request-target (path/query), allowing the request line to be split and attacker-controlled headers to be injected. To preserve the HTTP/1.1 request-line shape METHOD SP request-target SP HTTP/1.1, a raw space (0x20) in the request-target must also be rejected (clients should use %20).(CVE-2025-60876)","modified":"2026-04-11T14:19:38.129219Z","published":"2026-04-11T14:05:08Z","upstream":["CVE-2025-60876"],"database_specific":{"severity":"Medium"},"references":[{"type":"ADVISORY","url":"https://www.openeuler.org/zh/security/security-bulletins/detail/?id=openEuler-SA-2026-1881"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2025-60876"}],"affected":[{"package":{"name":"busybox","ecosystem":"openEuler:24.03-LTS","purl":"pkg:rpm/openEuler/busybox&distro=openEuler-24.03-LTS"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"1.36.1-15.oe2403"}]}],"ecosystem_specific":{"aarch64":["busybox-1.36.1-15.oe2403.aarch64.rpm","busybox-debuginfo-1.36.1-15.oe2403.aarch64.rpm","busybox-debugsource-1.36.1-15.oe2403.aarch64.rpm","busybox-petitboot-1.36.1-15.oe2403.aarch64.rpm"],"x86_64":["busybox-1.36.1-15.oe2403.x86_64.rpm","busybox-debuginfo-1.36.1-15.oe2403.x86_64.rpm","busybox-debugsource-1.36.1-15.oe2403.x86_64.rpm","busybox-petitboot-1.36.1-15.oe2403.x86_64.rpm"],"src":["busybox-1.36.1-15.oe2403.src.rpm"],"noarch":["busybox-help-1.36.1-15.oe2403.noarch.rpm"]},"database_specific":{"source":"https://repo.openeuler.org/security/data/osv/OESA-2026-1881.json"}}],"schema_version":"1.7.5"}