ASA-201803-2 generated external raw

[ASA-201803-2] mkinitcpio-busybox: arbitrary code execution
Arch Linux Security Advisory ASA-201803-2 ========================================= Severity: High Date : 2018-03-01 CVE-ID : CVE-2017-16544 Package : mkinitcpio-busybox Type : arbitrary code execution Remote : No Link : Summary ======= The package mkinitcpio-busybox before version 1.28.1-1 is vulnerable to arbitrary code execution. Resolution ========== Upgrade to 1.28.1-1. # pacman -Syu "mkinitcpio-busybox>=1.28.1-1" The problem has been fixed upstream in version 1.28.1. Workaround ========== None. Description =========== In the add_match function in libbb/lineedit.c in BusyBox through 1.27.2, the tab autocomplete feature of the shell, used to get a list of filenames in a directory, does not sanitize filenames and results in executing any escape sequence in the terminal. This could potentially result in code execution, arbitrary file writes, or other attacks. Impact ====== An attacker is able to execute arbitrary code by tricking the user into auto-completing a crafted filename. References ==========