SQUASHFS: Multiple vulnerabilities Multiple vulnerabilities have been discovered in SQUASHFS, the worst of which may allow execution of arbitrary code squashfs 2017-01-29 2017-01-29 552484 remote 4.3-r1 4.3-r1

Squashfs is a compressed read-only filesystem for Linux. Squashfs is intended for general read-only filesystem use, for archival use (i.e. in cases where a .tar.gz file may be used), and in constrained block device/memory systems (e.g. embedded systems) where low overhead is needed.

Multiple vulnerabilities have been discovered in SQUASHFS. Please review the CVE identifiers referenced below for details.

Remote attackers, by enticing a user to process a specially crafted SQUASHFS image, could execute arbitrary code with the privileges of the process.

There is no known workaround at this time.

All SQUASHFS users should upgrade to the latest version:

# emerge --sync # emerge --ask --oneshot --verbose ">=sys-fs/squashfs-tools-4.3-r1"
CVE-2015-4645 CVE-2015-4646 b-man b-man