[Forgot Password]
Login  Register Subscribe

30480

 
 

423868

 
 

253164

 
 

909

 
 

197077

 
 

282

Paid content will be excluded from the download.


Download | Alert*
OVAL

ALAS2-2023-2152 --- squashfs-tools

ID: oval:org.secpod.oval:def:1701443Date: (C)2023-08-08   (M)2024-01-03
Class: PATCHFamily: unix




Integer overflow in the read_fragment_table_4 function in unsquash-4.c in Squashfs and sasquatch allows remote attackers to cause a denial of service via a crafted input, which triggers a stack-based buffer overflow. unsquash-1.c, unsquash-2.c, unsquash-3.c, and unsquash-4.c in Squashfs and sasquatch allow remote attackers to cause a denial of service via a crafted input. squashfs_opendir in unsquash-1.c in Squashfs-Tools 4.5 stores the filename in the directory entry; this is then used by unsquashfs to create the new file during the unsquash. The filename is not validated for traversal outside of the destination directory, and thus allows writing to locations outside of the destination. squashfs_opendir in unsquash-2.c in Squashfs-Tools 4.5 allows Directory Traversal, a different vulnerability than CVE-2021-40153. A squashfs filesystem that has been crafted to include a symbolic link and then contents under the same filename in a filesystem can cause unsquashfs to first create the symbolic link pointing outside the expected directory, and then the subsequent write operation will cause the unsquashfs process to write through the symbolic link elsewhere in the filesystem

Platform:
Amazon Linux 2
Product:
squashfs-tools
Reference:
ALAS2-2023-2152
CVE-2015-4645
CVE-2015-4646
CVE-2021-40153
CVE-2021-41072
CVE    4
CVE-2015-4645
CVE-2015-4646
CVE-2021-40153
CVE-2021-41072
...

© SecPod Technologies