Multiple vulnerabilities have been discovered in SQUASHFS, the worst of which may allow execution of arbitrary code
Package | sys-fs/squashfs-tools on all architectures |
---|---|
Affected versions | < 4.3-r1 |
Unaffected versions | >= 4.3-r1 |
Squashfs is a compressed read-only filesystem for Linux. Squashfs is intended for general read-only filesystem use, for archival use (i.e. in cases where a .tar.gz file may be used), and in constrained block device/memory systems (e.g. embedded systems) where low overhead is needed.
Multiple vulnerabilities have been discovered in SQUASHFS. Please review the CVE identifiers referenced below for details.
Remote attackers, by enticing a user to process a specially crafted SQUASHFS image, could execute arbitrary code with the privileges of the process.
There is no known workaround at this time.
All SQUASHFS users should upgrade to the latest version:
# emerge --sync # emerge --ask --oneshot --verbose ">=sys-fs/squashfs-tools-4.3-r1"
Release date
January 29, 2017
Latest revision
January 29, 2017: 1
Severity
normal
Exploitable
remote
Bugzilla entries