SB2017031721 - Multiple vulnerabilities in squashfs-tools
Published: March 17, 2017 Updated: November 14, 2023
Breakdown by Severity
- Low
- Medium
- High
- Critical
Description
This security bulletin contains information about 2 secuirty vulnerabilities.
1) Integer overflow (CVE-ID: CVE-2015-4645)
The vulnerability allows a remote attacker to perform a denial of service (DoS) attack.
The vulnerability exists due to a boundary error within the read_fragment_table_4() function in unsquash-4.c . A remote attacker can pass specially crafted data to the application, trigger an integer overflow and perform a denial of service (DoS) attack.
2) Input validation error (CVE-ID: CVE-2015-4646)
The vulnerability allows a remote attacker to perform a denial of service (DoS) attack.
The vulnerability exists due to insufficient validation of user-supplied input in unsquash-1.c, unsquash-2.c, unsquash-3.c, and unsquash-4.c. A remote attacker can pass specially crafted input to the application and perform a denial of service (DoS) attack.
Remediation
Install update from vendor's website.
References
- http://lists.fedoraproject.org/pipermail/package-announce/2015-July/162171.html
- http://lists.fedoraproject.org/pipermail/package-announce/2015-July/162226.html
- http://www.securityfocus.com/bid/75272
- https://bugzilla.redhat.com/show_bug.cgi?id=1234886
- https://github.com/devttys0/sasquatch/pull/5
- https://github.com/plougher/squashfs-tools/commit/f95864afe8833fe3ad782d714b41378e860977b1
- https://security.gentoo.org/glsa/201701-73
- http://seclists.org/oss-sec/2015/q2/756