[Date Prev][Date Next] [Thread Prev][Thread Next] [Date Index] [Thread Index]

[SECURITY] [DSA 4967-1] squashfs-tools security update



-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA512

- -------------------------------------------------------------------------
Debian Security Advisory DSA-4967-1                   security@debian.org
https://www.debian.org/security/                     Salvatore Bonaccorso
September 04, 2021                    https://www.debian.org/security/faq
- -------------------------------------------------------------------------

Package        : squashfs-tools
CVE ID         : CVE-2021-40153

Etienne Stalmans discovered that unsquashfs in squashfs-tools, the tools
to create and extract Squashfs filesystems, does not validate filenames
for traversal outside of the destination directory. An attacker can take
advantage of this flaw for writing to arbitrary files to the filesystem
if a malformed Squashfs image is processed.

For the oldstable distribution (buster), this problem has been fixed
in version 1:4.3-12+deb10u1.

For the stable distribution (bullseye), this problem has been fixed in
version 1:4.4-2+deb11u1.

We recommend that you upgrade your squashfs-tools packages.

For the detailed security status of squashfs-tools please refer to its
security tracker page at:
https://security-tracker.debian.org/tracker/squashfs-tools

Further information about Debian Security Advisories, how to apply
these updates to your system and frequently asked questions can be
found at: https://www.debian.org/security/

Mailing list: debian-security-announce@lists.debian.org
-----BEGIN PGP SIGNATURE-----
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=DOwr
-----END PGP SIGNATURE-----


Reply to: