SQUASHFS: Multiple vulnerabilities — GLSA 201701-73

Multiple vulnerabilities have been discovered in SQUASHFS, the worst of which may allow execution of arbitrary code

Affected packages

sys-fs/squashfs-tools on all architectures
Affected versions < 4.3-r1
Unaffected versions >= 4.3-r1

Background

Squashfs is a compressed read-only filesystem for Linux. Squashfs is intended for general read-only filesystem use, for archival use (i.e. in cases where a .tar.gz file may be used), and in constrained block device/memory systems (e.g. embedded systems) where low overhead is needed.

Description

Multiple vulnerabilities have been discovered in SQUASHFS. Please review the CVE identifiers referenced below for details.

Impact

Remote attackers, by enticing a user to process a specially crafted SQUASHFS image, could execute arbitrary code with the privileges of the process.

Workaround

There is no known workaround at this time.

Resolution

All SQUASHFS users should upgrade to the latest version:

 # emerge --sync
 # emerge --ask --oneshot --verbose ">=sys-fs/squashfs-tools-4.3-r1"
 

References

Release date
January 29, 2017

Latest revision
January 29, 2017: 1

Severity
normal

Exploitable
remote

Bugzilla entries