{"schema_version":"1.7.2","id":"OESA-2026-1880","modified":"2026-04-11T14:05:07Z","published":"2026-04-11T14:05:07Z","upstream":["CVE-2025-60876"],"summary":"busybox security update","details":"BusyBox combines tiny versions of many common UNIX utilities into a single small executable. It provides replacements for most of the utilities you usually find in GNU fileutils, shellutils, etc. It provides a fairly complete environment for any small or embedded system.\r\n\r\nSecurity Fix(es):\n\nBusyBox wget thru 1.3.7 accepted raw CR (0x0D)/LF (0x0A) and other C0 control bytes in the HTTP request-target (path/query), allowing the request line to be split and attacker-controlled headers to be injected. To preserve the HTTP/1.1 request-line shape METHOD SP request-target SP HTTP/1.1, a raw space (0x20) in the request-target must also be rejected (clients should use %20).(CVE-2025-60876)","affected":[{"package":{"ecosystem":"openEuler:24.03-LTS-SP2","name":"busybox","purl":"pkg:rpm/openEuler/busybox&distro=openEuler-24.03-LTS-SP2"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"1.36.1-15.oe2403sp2"}]}],"ecosystem_specific":{"aarch64":["busybox-1.36.1-15.oe2403sp2.aarch64.rpm","busybox-debuginfo-1.36.1-15.oe2403sp2.aarch64.rpm","busybox-debugsource-1.36.1-15.oe2403sp2.aarch64.rpm","busybox-petitboot-1.36.1-15.oe2403sp2.aarch64.rpm"],"noarch":["busybox-help-1.36.1-15.oe2403sp2.noarch.rpm"],"src":["busybox-1.36.1-15.oe2403sp2.src.rpm"],"x86_64":["busybox-1.36.1-15.oe2403sp2.x86_64.rpm","busybox-debuginfo-1.36.1-15.oe2403sp2.x86_64.rpm","busybox-debugsource-1.36.1-15.oe2403sp2.x86_64.rpm","busybox-petitboot-1.36.1-15.oe2403sp2.x86_64.rpm"]}}],"references":[{"type":"ADVISORY","url":"https://www.openeuler.org/zh/security/security-bulletins/detail/?id=openEuler-SA-2026-1880"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2025-60876"}],"database_specific":{"severity":"Medium"}}
