Severity High
Remote No
Type Arbitrary code execution
In the add_match function in libbb/lineedit.c in BusyBox through 1.27.2, the tab autocomplete feature of the shell, used to get a list of filenames in a directory, does not sanitize filenames and results in executing any escape sequence in the terminal. This could potentially result in code execution, arbitrary file writes, or other attacks.
Group Package Affected Fixed Severity Status Ticket
AVG-514 mkinitcpio-busybox 1.27.2-1 High Vulnerable FS#56391
AVG-512 busybox 1.27.2-1 High Vulnerable FS#56391