<?xml version="1.0" encoding="UTF-8"?>
<cvrfdoc xmlns="http://www.icasi.org/CVRF/schema/cvrf/1.1" xmlns:cvrf="http://www.icasi.org/CVRF/schema/cvrf/1.1">
	<DocumentTitle xml:lang="en">An update for busybox is now available for openEuler-20.03-LTS-SP4,openEuler-22.03-LTS-SP4,openEuler-24.03-LTS,openEuler-24.03-LTS-SP1,openEuler-24.03-LTS-SP2,openEuler-24.03-LTS-SP3</DocumentTitle>
	<DocumentType>Security Advisory</DocumentType>
	<DocumentPublisher Type="Vendor">
		<ContactDetails>openeuler-security@openeuler.org</ContactDetails>
		<IssuingAuthority>openEuler security committee</IssuingAuthority>
	</DocumentPublisher>
	<DocumentTracking>
		<Identification>
			<ID>openEuler-SA-2026-1544</ID>
		</Identification>
		<Status>Final</Status>
		<Version>1.0</Version>
		<RevisionHistory>
			<Revision>
				<Number>1.0</Number>
				<Date>2026-03-15</Date>
				<Description>Initial</Description>
			</Revision>
		</RevisionHistory>
		<InitialReleaseDate>2026-03-15</InitialReleaseDate>
		<CurrentReleaseDate>2026-03-15</CurrentReleaseDate>
		<Generator>
			<Engine>openEuler SA Tool V1.0</Engine>
			<Date>2026-03-15</Date>
		</Generator>
	</DocumentTracking>
	<DocumentNotes>
		<Note Title="Synopsis" Type="General" Ordinal="1" xml:lang="en">busybox security update</Note>
		<Note Title="Summary" Type="General" Ordinal="2" xml:lang="en">An update for busybox is now available for openEuler-20.03-LTS-SP4,openEuler-22.03-LTS-SP4,openEuler-24.03-LTS,openEuler-24.03-LTS-SP1,openEuler-24.03-LTS-SP2,openEuler-24.03-LTS-SP3</Note>
		<Note Title="Description" Type="General" Ordinal="3" xml:lang="en">The Swiss Army Knife of Embedded Linux

Security Fix(es):

A flaw was found in BusyBox. Incomplete path sanitization in its archive extraction utilities allows an attacker to craft malicious archives that when extracted, and under specific conditions, may write to files outside the intended directory. This can lead to arbitrary file overwrite, potentially enabling code execution through the modification of sensitive system files.(CVE-2026-26157)

A flaw was found in BusyBox. This vulnerability allows an attacker to modify files outside of the intended extraction directory by crafting a malicious tar archive containing unvalidated hardlink or symlink entries. If the tar archive is extracted with elevated privileges, this flaw can lead to privilege escalation, enabling an attacker to gain unauthorized access to critical system files.(CVE-2026-26158)</Note>
		<Note Title="Topic" Type="General" Ordinal="4" xml:lang="en">An update for busybox is now available for openEuler-20.03-LTS-SP4,openEuler-22.03-LTS-SP4,openEuler-24.03-LTS,openEuler-24.03-LTS-SP1,openEuler-24.03-LTS-SP2,openEuler-24.03-LTS-SP3.

openEuler Security has rated this update as having a security impact of high. A Common Vunlnerability Scoring System(CVSS)base score,which gives a detailed severity rating, is available for each vulnerability from the CVElink(s) in the References section.</Note>
		<Note Title="Severity" Type="General" Ordinal="5" xml:lang="en">High</Note>
		<Note Title="Affected Component" Type="General" Ordinal="6" xml:lang="en">busybox</Note>
	</DocumentNotes>
	<DocumentReferences>
		<Reference Type="Self">
			<URL>https://www.openeuler.org/zh/security/security-bulletins/detail/?id=openEuler-SA-2026-1544</URL>
		</Reference>
		<Reference Type="openEuler CVE">
			<URL>https://www.openeuler.org/en/security/cve/detail/?cveId=CVE-2026-26157</URL>
			<URL>https://www.openeuler.org/en/security/cve/detail/?cveId=CVE-2026-26158</URL>
		</Reference>
		<Reference Type="Other">
			<URL>https://nvd.nist.gov/vuln/detail/CVE-2026-26157</URL>
			<URL>https://nvd.nist.gov/vuln/detail/CVE-2026-26158</URL>
		</Reference>
	</DocumentReferences>
	<ProductTree xmlns="http://www.icasi.org/CVRF/schema/prod/1.1">
		<Branch Type="Product Name" Name="openEuler">
			<FullProductName ProductID="openEuler-20.03-LTS-SP4" CPE="cpe:/a:openEuler:openEuler:20.03-LTS-SP4">openEuler-20.03-LTS-SP4</FullProductName>
			<FullProductName ProductID="openEuler-22.03-LTS-SP4" CPE="cpe:/a:openEuler:openEuler:22.03-LTS-SP4">openEuler-22.03-LTS-SP4</FullProductName>
			<FullProductName ProductID="openEuler-24.03-LTS" CPE="cpe:/a:openEuler:openEuler:24.03-LTS">openEuler-24.03-LTS</FullProductName>
			<FullProductName ProductID="openEuler-24.03-LTS-SP1" CPE="cpe:/a:openEuler:openEuler:24.03-LTS-SP1">openEuler-24.03-LTS-SP1</FullProductName>
			<FullProductName ProductID="openEuler-24.03-LTS-SP2" CPE="cpe:/a:openEuler:openEuler:24.03-LTS-SP2">openEuler-24.03-LTS-SP2</FullProductName>
			<FullProductName ProductID="openEuler-24.03-LTS-SP3" CPE="cpe:/a:openEuler:openEuler:24.03-LTS-SP3">openEuler-24.03-LTS-SP3</FullProductName>
		</Branch>
		<Branch Type="Package Arch" Name="aarch64">
			<FullProductName ProductID="busybox-1.31.1-28" CPE="cpe:/a:openEuler:openEuler:20.03-LTS-SP4">busybox-1.31.1-28.oe2003sp4.aarch64.rpm</FullProductName>
			<FullProductName ProductID="busybox-debuginfo-1.31.1-28" CPE="cpe:/a:openEuler:openEuler:20.03-LTS-SP4">busybox-debuginfo-1.31.1-28.oe2003sp4.aarch64.rpm</FullProductName>
			<FullProductName ProductID="busybox-debugsource-1.31.1-28" CPE="cpe:/a:openEuler:openEuler:20.03-LTS-SP4">busybox-debugsource-1.31.1-28.oe2003sp4.aarch64.rpm</FullProductName>
			<FullProductName ProductID="busybox-help-1.31.1-28" CPE="cpe:/a:openEuler:openEuler:20.03-LTS-SP4">busybox-help-1.31.1-28.oe2003sp4.aarch64.rpm</FullProductName>
			<FullProductName ProductID="busybox-petitboot-1.31.1-28" CPE="cpe:/a:openEuler:openEuler:20.03-LTS-SP4">busybox-petitboot-1.31.1-28.oe2003sp4.aarch64.rpm</FullProductName>
			<FullProductName ProductID="busybox-1.34.1-28" CPE="cpe:/a:openEuler:openEuler:22.03-LTS-SP4">busybox-1.34.1-28.oe2203sp4.aarch64.rpm</FullProductName>
			<FullProductName ProductID="busybox-debuginfo-1.34.1-28" CPE="cpe:/a:openEuler:openEuler:22.03-LTS-SP4">busybox-debuginfo-1.34.1-28.oe2203sp4.aarch64.rpm</FullProductName>
			<FullProductName ProductID="busybox-debugsource-1.34.1-28" CPE="cpe:/a:openEuler:openEuler:22.03-LTS-SP4">busybox-debugsource-1.34.1-28.oe2203sp4.aarch64.rpm</FullProductName>
			<FullProductName ProductID="busybox-help-1.34.1-28" CPE="cpe:/a:openEuler:openEuler:22.03-LTS-SP4">busybox-help-1.34.1-28.oe2203sp4.aarch64.rpm</FullProductName>
			<FullProductName ProductID="busybox-petitboot-1.34.1-28" CPE="cpe:/a:openEuler:openEuler:22.03-LTS-SP4">busybox-petitboot-1.34.1-28.oe2203sp4.aarch64.rpm</FullProductName>
			<FullProductName ProductID="busybox-1.36.1-14" CPE="cpe:/a:openEuler:openEuler:24.03-LTS">busybox-1.36.1-14.oe2403.aarch64.rpm</FullProductName>
			<FullProductName ProductID="busybox-debuginfo-1.36.1-14" CPE="cpe:/a:openEuler:openEuler:24.03-LTS">busybox-debuginfo-1.36.1-14.oe2403.aarch64.rpm</FullProductName>
			<FullProductName ProductID="busybox-debugsource-1.36.1-14" CPE="cpe:/a:openEuler:openEuler:24.03-LTS">busybox-debugsource-1.36.1-14.oe2403.aarch64.rpm</FullProductName>
			<FullProductName ProductID="busybox-petitboot-1.36.1-14" CPE="cpe:/a:openEuler:openEuler:24.03-LTS">busybox-petitboot-1.36.1-14.oe2403.aarch64.rpm</FullProductName>
			<FullProductName ProductID="busybox-1.36.1-14" CPE="cpe:/a:openEuler:openEuler:24.03-LTS-SP1">busybox-1.36.1-14.oe2403sp1.aarch64.rpm</FullProductName>
			<FullProductName ProductID="busybox-debuginfo-1.36.1-14" CPE="cpe:/a:openEuler:openEuler:24.03-LTS-SP1">busybox-debuginfo-1.36.1-14.oe2403sp1.aarch64.rpm</FullProductName>
			<FullProductName ProductID="busybox-debugsource-1.36.1-14" CPE="cpe:/a:openEuler:openEuler:24.03-LTS-SP1">busybox-debugsource-1.36.1-14.oe2403sp1.aarch64.rpm</FullProductName>
			<FullProductName ProductID="busybox-petitboot-1.36.1-14" CPE="cpe:/a:openEuler:openEuler:24.03-LTS-SP1">busybox-petitboot-1.36.1-14.oe2403sp1.aarch64.rpm</FullProductName>
			<FullProductName ProductID="busybox-1.36.1-14" CPE="cpe:/a:openEuler:openEuler:24.03-LTS-SP2">busybox-1.36.1-14.oe2403sp2.aarch64.rpm</FullProductName>
			<FullProductName ProductID="busybox-debuginfo-1.36.1-14" CPE="cpe:/a:openEuler:openEuler:24.03-LTS-SP2">busybox-debuginfo-1.36.1-14.oe2403sp2.aarch64.rpm</FullProductName>
			<FullProductName ProductID="busybox-debugsource-1.36.1-14" CPE="cpe:/a:openEuler:openEuler:24.03-LTS-SP2">busybox-debugsource-1.36.1-14.oe2403sp2.aarch64.rpm</FullProductName>
			<FullProductName ProductID="busybox-petitboot-1.36.1-14" CPE="cpe:/a:openEuler:openEuler:24.03-LTS-SP2">busybox-petitboot-1.36.1-14.oe2403sp2.aarch64.rpm</FullProductName>
			<FullProductName ProductID="busybox-1.36.1-14" CPE="cpe:/a:openEuler:openEuler:24.03-LTS-SP3">busybox-1.36.1-14.oe2403sp3.aarch64.rpm</FullProductName>
			<FullProductName ProductID="busybox-debuginfo-1.36.1-14" CPE="cpe:/a:openEuler:openEuler:24.03-LTS-SP3">busybox-debuginfo-1.36.1-14.oe2403sp3.aarch64.rpm</FullProductName>
			<FullProductName ProductID="busybox-debugsource-1.36.1-14" CPE="cpe:/a:openEuler:openEuler:24.03-LTS-SP3">busybox-debugsource-1.36.1-14.oe2403sp3.aarch64.rpm</FullProductName>
			<FullProductName ProductID="busybox-petitboot-1.36.1-14" CPE="cpe:/a:openEuler:openEuler:24.03-LTS-SP3">busybox-petitboot-1.36.1-14.oe2403sp3.aarch64.rpm</FullProductName>
		</Branch>
		<Branch Type="Package Arch" Name="src">
			<FullProductName ProductID="busybox-1.31.1-28" CPE="cpe:/a:openEuler:openEuler:20.03-LTS-SP4">busybox-1.31.1-28.oe2003sp4.src.rpm</FullProductName>
			<FullProductName ProductID="busybox-1.34.1-28" CPE="cpe:/a:openEuler:openEuler:22.03-LTS-SP4">busybox-1.34.1-28.oe2203sp4.src.rpm</FullProductName>
			<FullProductName ProductID="busybox-1.36.1-14" CPE="cpe:/a:openEuler:openEuler:24.03-LTS">busybox-1.36.1-14.oe2403.src.rpm</FullProductName>
			<FullProductName ProductID="busybox-1.36.1-14" CPE="cpe:/a:openEuler:openEuler:24.03-LTS-SP1">busybox-1.36.1-14.oe2403sp1.src.rpm</FullProductName>
			<FullProductName ProductID="busybox-1.36.1-14" CPE="cpe:/a:openEuler:openEuler:24.03-LTS-SP2">busybox-1.36.1-14.oe2403sp2.src.rpm</FullProductName>
			<FullProductName ProductID="busybox-1.36.1-14" CPE="cpe:/a:openEuler:openEuler:24.03-LTS-SP3">busybox-1.36.1-14.oe2403sp3.src.rpm</FullProductName>
		</Branch>
		<Branch Type="Package Arch" Name="x86_64">
			<FullProductName ProductID="busybox-1.31.1-28" CPE="cpe:/a:openEuler:openEuler:20.03-LTS-SP4">busybox-1.31.1-28.oe2003sp4.x86_64.rpm</FullProductName>
			<FullProductName ProductID="busybox-debuginfo-1.31.1-28" CPE="cpe:/a:openEuler:openEuler:20.03-LTS-SP4">busybox-debuginfo-1.31.1-28.oe2003sp4.x86_64.rpm</FullProductName>
			<FullProductName ProductID="busybox-debugsource-1.31.1-28" CPE="cpe:/a:openEuler:openEuler:20.03-LTS-SP4">busybox-debugsource-1.31.1-28.oe2003sp4.x86_64.rpm</FullProductName>
			<FullProductName ProductID="busybox-help-1.31.1-28" CPE="cpe:/a:openEuler:openEuler:20.03-LTS-SP4">busybox-help-1.31.1-28.oe2003sp4.x86_64.rpm</FullProductName>
			<FullProductName ProductID="busybox-petitboot-1.31.1-28" CPE="cpe:/a:openEuler:openEuler:20.03-LTS-SP4">busybox-petitboot-1.31.1-28.oe2003sp4.x86_64.rpm</FullProductName>
			<FullProductName ProductID="busybox-1.34.1-28" CPE="cpe:/a:openEuler:openEuler:22.03-LTS-SP4">busybox-1.34.1-28.oe2203sp4.x86_64.rpm</FullProductName>
			<FullProductName ProductID="busybox-debuginfo-1.34.1-28" CPE="cpe:/a:openEuler:openEuler:22.03-LTS-SP4">busybox-debuginfo-1.34.1-28.oe2203sp4.x86_64.rpm</FullProductName>
			<FullProductName ProductID="busybox-debugsource-1.34.1-28" CPE="cpe:/a:openEuler:openEuler:22.03-LTS-SP4">busybox-debugsource-1.34.1-28.oe2203sp4.x86_64.rpm</FullProductName>
			<FullProductName ProductID="busybox-help-1.34.1-28" CPE="cpe:/a:openEuler:openEuler:22.03-LTS-SP4">busybox-help-1.34.1-28.oe2203sp4.x86_64.rpm</FullProductName>
			<FullProductName ProductID="busybox-petitboot-1.34.1-28" CPE="cpe:/a:openEuler:openEuler:22.03-LTS-SP4">busybox-petitboot-1.34.1-28.oe2203sp4.x86_64.rpm</FullProductName>
			<FullProductName ProductID="busybox-1.36.1-14" CPE="cpe:/a:openEuler:openEuler:24.03-LTS">busybox-1.36.1-14.oe2403.x86_64.rpm</FullProductName>
			<FullProductName ProductID="busybox-debuginfo-1.36.1-14" CPE="cpe:/a:openEuler:openEuler:24.03-LTS">busybox-debuginfo-1.36.1-14.oe2403.x86_64.rpm</FullProductName>
			<FullProductName ProductID="busybox-debugsource-1.36.1-14" CPE="cpe:/a:openEuler:openEuler:24.03-LTS">busybox-debugsource-1.36.1-14.oe2403.x86_64.rpm</FullProductName>
			<FullProductName ProductID="busybox-petitboot-1.36.1-14" CPE="cpe:/a:openEuler:openEuler:24.03-LTS">busybox-petitboot-1.36.1-14.oe2403.x86_64.rpm</FullProductName>
			<FullProductName ProductID="busybox-1.36.1-14" CPE="cpe:/a:openEuler:openEuler:24.03-LTS-SP1">busybox-1.36.1-14.oe2403sp1.x86_64.rpm</FullProductName>
			<FullProductName ProductID="busybox-debuginfo-1.36.1-14" CPE="cpe:/a:openEuler:openEuler:24.03-LTS-SP1">busybox-debuginfo-1.36.1-14.oe2403sp1.x86_64.rpm</FullProductName>
			<FullProductName ProductID="busybox-debugsource-1.36.1-14" CPE="cpe:/a:openEuler:openEuler:24.03-LTS-SP1">busybox-debugsource-1.36.1-14.oe2403sp1.x86_64.rpm</FullProductName>
			<FullProductName ProductID="busybox-petitboot-1.36.1-14" CPE="cpe:/a:openEuler:openEuler:24.03-LTS-SP1">busybox-petitboot-1.36.1-14.oe2403sp1.x86_64.rpm</FullProductName>
			<FullProductName ProductID="busybox-1.36.1-14" CPE="cpe:/a:openEuler:openEuler:24.03-LTS-SP2">busybox-1.36.1-14.oe2403sp2.x86_64.rpm</FullProductName>
			<FullProductName ProductID="busybox-debuginfo-1.36.1-14" CPE="cpe:/a:openEuler:openEuler:24.03-LTS-SP2">busybox-debuginfo-1.36.1-14.oe2403sp2.x86_64.rpm</FullProductName>
			<FullProductName ProductID="busybox-debugsource-1.36.1-14" CPE="cpe:/a:openEuler:openEuler:24.03-LTS-SP2">busybox-debugsource-1.36.1-14.oe2403sp2.x86_64.rpm</FullProductName>
			<FullProductName ProductID="busybox-petitboot-1.36.1-14" CPE="cpe:/a:openEuler:openEuler:24.03-LTS-SP2">busybox-petitboot-1.36.1-14.oe2403sp2.x86_64.rpm</FullProductName>
			<FullProductName ProductID="busybox-1.36.1-14" CPE="cpe:/a:openEuler:openEuler:24.03-LTS-SP3">busybox-1.36.1-14.oe2403sp3.x86_64.rpm</FullProductName>
			<FullProductName ProductID="busybox-debuginfo-1.36.1-14" CPE="cpe:/a:openEuler:openEuler:24.03-LTS-SP3">busybox-debuginfo-1.36.1-14.oe2403sp3.x86_64.rpm</FullProductName>
			<FullProductName ProductID="busybox-debugsource-1.36.1-14" CPE="cpe:/a:openEuler:openEuler:24.03-LTS-SP3">busybox-debugsource-1.36.1-14.oe2403sp3.x86_64.rpm</FullProductName>
			<FullProductName ProductID="busybox-petitboot-1.36.1-14" CPE="cpe:/a:openEuler:openEuler:24.03-LTS-SP3">busybox-petitboot-1.36.1-14.oe2403sp3.x86_64.rpm</FullProductName>
		</Branch>
		<Branch Type="Package Arch" Name="noarch">
			<FullProductName ProductID="busybox-help-1.36.1-14" CPE="cpe:/a:openEuler:openEuler:24.03-LTS">busybox-help-1.36.1-14.oe2403.noarch.rpm</FullProductName>
			<FullProductName ProductID="busybox-help-1.36.1-14" CPE="cpe:/a:openEuler:openEuler:24.03-LTS-SP1">busybox-help-1.36.1-14.oe2403sp1.noarch.rpm</FullProductName>
			<FullProductName ProductID="busybox-help-1.36.1-14" CPE="cpe:/a:openEuler:openEuler:24.03-LTS-SP2">busybox-help-1.36.1-14.oe2403sp2.noarch.rpm</FullProductName>
			<FullProductName ProductID="busybox-help-1.36.1-14" CPE="cpe:/a:openEuler:openEuler:24.03-LTS-SP3">busybox-help-1.36.1-14.oe2403sp3.noarch.rpm</FullProductName>
		</Branch>
	</ProductTree>
	<Vulnerability Ordinal="1" xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1">
		<Notes>
			<Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">A flaw was found in BusyBox. Incomplete path sanitization in its archive extraction utilities allows an attacker to craft malicious archives that when extracted, and under specific conditions, may write to files outside the intended directory. This can lead to arbitrary file overwrite, potentially enabling code execution through the modification of sensitive system files.</Note>
		</Notes>
		<ReleaseDate>2026-03-15</ReleaseDate>
		<CVE>CVE-2026-26157</CVE>
		<ProductStatuses>
			<Status Type="Fixed">
				<ProductID>openEuler-20.03-LTS-SP4</ProductID>
				<ProductID>openEuler-22.03-LTS-SP4</ProductID>
				<ProductID>openEuler-24.03-LTS</ProductID>
				<ProductID>openEuler-24.03-LTS-SP1</ProductID>
				<ProductID>openEuler-24.03-LTS-SP2</ProductID>
				<ProductID>openEuler-24.03-LTS-SP3</ProductID>
			</Status>
		</ProductStatuses>
		<Threats>
			<Threat Type="Impact">
				<Description>High</Description>
			</Threat>
		</Threats>
		<CVSSScoreSets>
			<ScoreSet>
				<BaseScore>7.0</BaseScore>
				<Vector>AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H</Vector>
			</ScoreSet>
		</CVSSScoreSets>
		<Remediations>
			<Remediation Type="Vendor Fix">
				<Description>busybox security update</Description>
				<DATE>2026-03-15</DATE>
				<URL>https://www.openeuler.org/zh/security/security-bulletins/detail/?id=openEuler-SA-2026-1544</URL>
			</Remediation>
		</Remediations>
	</Vulnerability>
	<Vulnerability Ordinal="2" xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1">
		<Notes>
			<Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">A flaw was found in BusyBox. This vulnerability allows an attacker to modify files outside of the intended extraction directory by crafting a malicious tar archive containing unvalidated hardlink or symlink entries. If the tar archive is extracted with elevated privileges, this flaw can lead to privilege escalation, enabling an attacker to gain unauthorized access to critical system files.</Note>
		</Notes>
		<ReleaseDate>2026-03-15</ReleaseDate>
		<CVE>CVE-2026-26158</CVE>
		<ProductStatuses>
			<Status Type="Fixed">
				<ProductID>openEuler-20.03-LTS-SP4</ProductID>
				<ProductID>openEuler-22.03-LTS-SP4</ProductID>
				<ProductID>openEuler-24.03-LTS</ProductID>
				<ProductID>openEuler-24.03-LTS-SP1</ProductID>
				<ProductID>openEuler-24.03-LTS-SP2</ProductID>
				<ProductID>openEuler-24.03-LTS-SP3</ProductID>
			</Status>
		</ProductStatuses>
		<Threats>
			<Threat Type="Impact">
				<Description>High</Description>
			</Threat>
		</Threats>
		<CVSSScoreSets>
			<ScoreSet>
				<BaseScore>7.0</BaseScore>
				<Vector>AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H</Vector>
			</ScoreSet>
		</CVSSScoreSets>
		<Remediations>
			<Remediation Type="Vendor Fix">
				<Description>busybox security update</Description>
				<DATE>2026-03-15</DATE>
				<URL>https://www.openeuler.org/zh/security/security-bulletins/detail/?id=openEuler-SA-2026-1544</URL>
			</Remediation>
		</Remediations>
	</Vulnerability>
</cvrfdoc>