Action not permitted
Modal body text goes here.
Modal Title
Modal Body
CVE-2015-4646 (GCVE-0-2015-4646)
Vulnerability from cvelistv5
Published
2017-04-13 17:00
Modified
2024-08-06 06:18
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- n/a
Summary
(1) unsquash-1.c, (2) unsquash-2.c, (3) unsquash-3.c, and (4) unsquash-4.c in Squashfs and sasquatch allow remote attackers to cause a denial of service (application crash) via a crafted input.
References
► | URL | Tags | |||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-06T06:18:12.103Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "75272", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/75272" }, { "name": "GLSA-201701-73", "tags": [ "vendor-advisory", "x_refsource_GENTOO", "x_transferred" ], "url": "https://security.gentoo.org/glsa/201701-73" }, { "name": "[oss-security] 20150618 Re: Possible CVE Request: Multiple stack overflows in squashfs-tools and sasquatch", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "http://seclists.org/oss-sec/2015/q2/756" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://github.com/plougher/squashfs-tools/commit/f95864afe8833fe3ad782d714b41378e860977b1" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2015-06-18T00:00:00", "descriptions": [ { "lang": "en", "value": "(1) unsquash-1.c, (2) unsquash-2.c, (3) unsquash-3.c, and (4) unsquash-4.c in Squashfs and sasquatch allow remote attackers to cause a denial of service (application crash) via a crafted input." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2019-07-22T18:09:59", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "name": "75272", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/75272" }, { "name": "GLSA-201701-73", "tags": [ "vendor-advisory", "x_refsource_GENTOO" ], "url": "https://security.gentoo.org/glsa/201701-73" }, { "name": "[oss-security] 20150618 Re: Possible CVE Request: Multiple stack overflows in squashfs-tools and sasquatch", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "http://seclists.org/oss-sec/2015/q2/756" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://github.com/plougher/squashfs-tools/commit/f95864afe8833fe3ad782d714b41378e860977b1" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2015-4646", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "(1) unsquash-1.c, (2) unsquash-2.c, (3) unsquash-3.c, and (4) unsquash-4.c in Squashfs and sasquatch allow remote attackers to cause a denial of service (application crash) via a crafted input." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "75272", "refsource": "BID", "url": "http://www.securityfocus.com/bid/75272" }, { "name": "GLSA-201701-73", "refsource": "GENTOO", "url": "https://security.gentoo.org/glsa/201701-73" }, { "name": "[oss-security] 20150618 Re: Possible CVE Request: Multiple stack overflows in squashfs-tools and sasquatch", "refsource": "MLIST", "url": "http://seclists.org/oss-sec/2015/q2/756" }, { "name": "https://github.com/plougher/squashfs-tools/commit/f95864afe8833fe3ad782d714b41378e860977b1", "refsource": "CONFIRM", "url": "https://github.com/plougher/squashfs-tools/commit/f95864afe8833fe3ad782d714b41378e860977b1" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2015-4646", "datePublished": "2017-04-13T17:00:00", "dateReserved": "2015-06-18T00:00:00", "dateUpdated": "2024-08-06T06:18:12.103Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1", "vulnerability-lookup:meta": { "nvd": "{\"cve\":{\"id\":\"CVE-2015-4646\",\"sourceIdentifier\":\"cve@mitre.org\",\"published\":\"2017-04-13T17:59:00.340\",\"lastModified\":\"2025-04-20T01:37:25.860\",\"vulnStatus\":\"Deferred\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"(1) unsquash-1.c, (2) unsquash-2.c, (3) unsquash-3.c, and (4) unsquash-4.c in Squashfs and sasquatch allow remote attackers to cause a denial of service (application crash) via a crafted input.\"},{\"lang\":\"es\",\"value\":\"(1) unsquash-1.c, (2) unsquash-2.c, (3) unsquash-3.c, y (4) unsquash-4.c en Squashfs y sasquatch permiten a atacantes remotos provocar una denegaci\u00f3n de servicio (ca\u00edda de aplicaci\u00f3n) a trav\u00e9s de una entrada manipulada manualmente.\"}],\"metrics\":{\"cvssMetricV31\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H\",\"baseScore\":7.5,\"baseSeverity\":\"HIGH\",\"attackVector\":\"NETWORK\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"NONE\",\"userInteraction\":\"NONE\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"NONE\",\"integrityImpact\":\"NONE\",\"availabilityImpact\":\"HIGH\"},\"exploitabilityScore\":3.9,\"impactScore\":3.6}],\"cvssMetricV2\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"2.0\",\"vectorString\":\"AV:N/AC:L/Au:N/C:N/I:N/A:P\",\"baseScore\":5.0,\"accessVector\":\"NETWORK\",\"accessComplexity\":\"LOW\",\"authentication\":\"NONE\",\"confidentialityImpact\":\"NONE\",\"integrityImpact\":\"NONE\",\"availabilityImpact\":\"PARTIAL\"},\"baseSeverity\":\"MEDIUM\",\"exploitabilityScore\":10.0,\"impactScore\":2.9,\"acInsufInfo\":false,\"obtainAllPrivilege\":false,\"obtainUserPrivilege\":false,\"obtainOtherPrivilege\":false,\"userInteractionRequired\":false}]},\"weaknesses\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-20\"}]}],\"configurations\":[{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:squashfs_project:squashfs:*:*:*:*:*:*:*:*\",\"versionEndIncluding\":\"4.3\",\"matchCriteriaId\":\"672A3E13-69CC-4429-97DA-F192BE45600C\"}]}]}],\"references\":[{\"url\":\"http://seclists.org/oss-sec/2015/q2/756\",\"source\":\"cve@mitre.org\",\"tags\":[\"Mailing List\",\"Third Party Advisory\",\"VDB Entry\"]},{\"url\":\"http://www.securityfocus.com/bid/75272\",\"source\":\"cve@mitre.org\",\"tags\":[\"Third Party Advisory\",\"VDB Entry\"]},{\"url\":\"https://github.com/plougher/squashfs-tools/commit/f95864afe8833fe3ad782d714b41378e860977b1\",\"source\":\"cve@mitre.org\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://security.gentoo.org/glsa/201701-73\",\"source\":\"cve@mitre.org\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://seclists.org/oss-sec/2015/q2/756\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Mailing List\",\"Third Party Advisory\",\"VDB Entry\"]},{\"url\":\"http://www.securityfocus.com/bid/75272\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\",\"VDB Entry\"]},{\"url\":\"https://github.com/plougher/squashfs-tools/commit/f95864afe8833fe3ad782d714b41378e860977b1\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://security.gentoo.org/glsa/201701-73\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]}]}}" } }
suse-su-2023:4591-1
Vulnerability from csaf_suse
Published
2023-11-27 13:32
Modified
2023-11-27 13:32
Summary
Security update for squashfs
Notes
Title of the patch
Security update for squashfs
Description of the patch
This update for squashfs fixes the following issues:
- CVE-2015-4645,CVE-2015-4646: Multiple buffer overflows fixed in squashfs-tools (bsc#935380)
- CVE-2021-40153: Fixed an issue where an attacker might have been able to write a file outside of destination (bsc#1189936)
- CVE-2021-41072: Fixed an issue where an attacker might have been
able to write a file outside the destination directory via a
symlink (bsc#1190531).
update to 4.6.1:
* Race condition which can cause corruption of the 'fragment
table' fixed. This is a regression introduced in August 2022,
and it has been seen when tailend packing is used (-tailends option).
* Fix build failure when the tools are being built without
extended attribute (XATTRs) support.
* Fix XATTR error message when an unrecognised prefix is
found
* Fix incorrect free of pointer when an unrecognised XATTR
prefix is found.
* Major improvements in extended attribute handling,
pseudo file handling, and miscellaneous new options and
improvements
* Extended attribute handling improved in Mksquashfs and
Sqfstar
* New Pseudo file xattr definition to add extended
attributes to files.
* New xattrs-add Action to add extended attributes to files
* Extended attribute handling improved in Unsquashfs
* Other major improvements
* Unsquashfs can now output Pseudo files to standard out.
* Mksquashfs can now input Pseudo files from standard in.
* Squashfs filesystems can now be converted (different
block size compression etc) without unpacking to an
intermediate filesystem or mounting, by piping the output of
Unsquashfs to Mksquashfs.
* Pseudo files are now supported by Sqfstar.
* 'Non-anchored' excludes are now supported by Unsquashfs.
update to 4.5.1 (bsc#1190531, CVE-2021-41072):
* This release adds Manpages for Mksquashfs(1), Unsquashfs(1),
Sqfstar(1) and Sqfscat(1).
* The -help text output from the utilities has been improved
and extended as well (but the Manpages are now more
comprehensive).
* CVE-2021-41072 which is a writing outside of destination
exploit, has been fixed.
* The number of hard-links in the filesystem is now also
displayed by Mksquashfs in the output summary.
* The number of hard-links written by Unsquashfs is now
also displayed in the output summary.
* Unsquashfs will now write to a pre-existing destination
directory, rather than aborting.
* Unsquashfs now allows '.' to used as the destination, to
extract to the current directory.
* The Unsquashfs progress bar now tracks empty files and
hardlinks, in addition to data blocks.
* -no-hardlinks option has been implemented for Sqfstar.
* More sanity checking for 'corrupted' filesystems, including
checks for multiply linked directories and directory loops.
* Options that may cause filesystems to be unmountable have
been moved into a new 'experts' category in the Mksquashfs
help text (and Manpage).
* Maximum cpiostyle filename limited to PATH_MAX. This
prevents attempts to overflow the stack, or cause system
calls to fail with a too long pathname.
* Don't always use 'max open file limit' when calculating
length of queues, as a very large file limit can cause
Unsquashfs to abort. Instead use the smaller of max open
file limit and cache size.
* Fix Mksquashfs silently ignoring Pseudo file definitions
when appending.
* Don't abort if no XATTR support has been built in, and
there's XATTRs in the filesystem. This is a regression
introduced in 2019 in Version 4.4.
* Fix duplicate check when the last file block is sparse.
update to 4.5:
* Mksquashfs now supports 'Actions'.
* New sqfstar command which will create a Squashfs image from a tar archive.
* Tar style handling of source pathnames in Mksquashfs.
* Cpio style handling of source pathnames in Mksquashfs.
* New option to throttle the amount of CPU and I/O.
* Mksquashfs now allows no source directory to be specified.
* New Pseudo file 'R' definition which allows a Regular file
o be created with data stored within the Pseudo file.
* Symbolic links are now followed in extract files
* Unsquashfs now supports 'exclude' files.
* Max depth traversal option added.
* Unsquashfs can now output a 'Pseudo file' representing the
input Squashfs filesystem.
* New -one-file-system option in Mksquashfs.
* New -no-hardlinks option in Mksquashfs.
* Exit code in Unsquashfs changed to distinguish between
non-fatal errors (exit 2), and fatal errors (exit 1).
* Xattr id count added in Unsquashfs '-stat' output.
* Unsquashfs 'write outside directory' exploit fixed.
* Error handling in Unsquashfs writer thread fixed.
* Fix failure to truncate destination if appending aborted.
* Prevent Mksquashfs reading the destination file.
Patchnames
SUSE-2023-4591,SUSE-SLE-Micro-5.3-2023-4591,SUSE-SLE-Micro-5.4-2023-4591,SUSE-SLE-Micro-5.5-2023-4591,SUSE-SLE-Module-Basesystem-15-SP4-2023-4591,SUSE-SLE-Module-Basesystem-15-SP5-2023-4591,SUSE-SLE-Product-HPC-15-SP3-ESPOS-2023-4591,SUSE-SLE-Product-HPC-15-SP3-LTSS-2023-4591,SUSE-SLE-Product-SLES-15-SP3-LTSS-2023-4591,SUSE-SLE-Product-SLES_SAP-15-SP3-2023-4591,SUSE-SLE-Product-SUSE-Manager-Proxy-4.2-2023-4591,SUSE-SLE-Product-SUSE-Manager-Server-4.2-2023-4591,SUSE-SUSE-MicroOS-5.1-2023-4591,SUSE-SUSE-MicroOS-5.2-2023-4591,SUSE-Storage-7.1-2023-4591,openSUSE-Leap-Micro-5.3-2023-4591,openSUSE-Leap-Micro-5.4-2023-4591,openSUSE-SLE-15.4-2023-4591,openSUSE-SLE-15.5-2023-4591
Terms of use
CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
{ "document": { "aggregate_severity": { "namespace": "https://www.suse.com/support/security/rating/", "text": "important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright 2024 SUSE LLC. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Security update for squashfs", "title": "Title of the patch" }, { "category": "description", "text": "This update for squashfs fixes the following issues:\n\n- CVE-2015-4645,CVE-2015-4646: Multiple buffer overflows fixed in squashfs-tools (bsc#935380)\n- CVE-2021-40153: Fixed an issue where an attacker might have been able to write a file outside of destination (bsc#1189936)\n- CVE-2021-41072: Fixed an issue where an attacker might have been\n able to write a file outside the destination directory via a\n symlink (bsc#1190531).\n\nupdate to 4.6.1:\n\n * Race condition which can cause corruption of the \u0027fragment\n table\u0027 fixed. This is a regression introduced in August 2022,\n and it has been seen when tailend packing is used (-tailends option).\n * Fix build failure when the tools are being built without\n extended attribute (XATTRs) support.\n * Fix XATTR error message when an unrecognised prefix is\n found\n * Fix incorrect free of pointer when an unrecognised XATTR\n prefix is found.\n * Major improvements in extended attribute handling,\n pseudo file handling, and miscellaneous new options and\n improvements\n * Extended attribute handling improved in Mksquashfs and\n Sqfstar\n * New Pseudo file xattr definition to add extended\n attributes to files.\n * New xattrs-add Action to add extended attributes to files\n * Extended attribute handling improved in Unsquashfs\n * Other major improvements\n * Unsquashfs can now output Pseudo files to standard out.\n * Mksquashfs can now input Pseudo files from standard in.\n * Squashfs filesystems can now be converted (different\n block size compression etc) without unpacking to an\n intermediate filesystem or mounting, by piping the output of\n Unsquashfs to Mksquashfs.\n * Pseudo files are now supported by Sqfstar.\n * \u0027Non-anchored\u0027 excludes are now supported by Unsquashfs.\n\nupdate to 4.5.1 (bsc#1190531, CVE-2021-41072):\n\n * This release adds Manpages for Mksquashfs(1), Unsquashfs(1),\n Sqfstar(1) and Sqfscat(1).\n * The -help text output from the utilities has been improved\n and extended as well (but the Manpages are now more\n comprehensive).\n * CVE-2021-41072 which is a writing outside of destination\n exploit, has been fixed.\n * The number of hard-links in the filesystem is now also\n displayed by Mksquashfs in the output summary.\n * The number of hard-links written by Unsquashfs is now\n also displayed in the output summary.\n * Unsquashfs will now write to a pre-existing destination\n directory, rather than aborting.\n * Unsquashfs now allows \u0027.\u0027 to used as the destination, to\n extract to the current directory.\n * The Unsquashfs progress bar now tracks empty files and\n hardlinks, in addition to data blocks.\n * -no-hardlinks option has been implemented for Sqfstar.\n * More sanity checking for \u0027corrupted\u0027 filesystems, including\n checks for multiply linked directories and directory loops.\n * Options that may cause filesystems to be unmountable have\n been moved into a new \u0027experts\u0027 category in the Mksquashfs\n help text (and Manpage).\n * Maximum cpiostyle filename limited to PATH_MAX. This\n prevents attempts to overflow the stack, or cause system\n calls to fail with a too long pathname.\n * Don\u0027t always use \u0027max open file limit\u0027 when calculating\n length of queues, as a very large file limit can cause\n Unsquashfs to abort. Instead use the smaller of max open\n file limit and cache size.\n * Fix Mksquashfs silently ignoring Pseudo file definitions\n when appending.\n * Don\u0027t abort if no XATTR support has been built in, and\n there\u0027s XATTRs in the filesystem. This is a regression\n introduced in 2019 in Version 4.4.\n * Fix duplicate check when the last file block is sparse.\n\nupdate to 4.5:\n\n * Mksquashfs now supports \u0027Actions\u0027.\n * New sqfstar command which will create a Squashfs image from a tar archive.\n * Tar style handling of source pathnames in Mksquashfs.\n * Cpio style handling of source pathnames in Mksquashfs.\n * New option to throttle the amount of CPU and I/O.\n * Mksquashfs now allows no source directory to be specified.\n * New Pseudo file \u0027R\u0027 definition which allows a Regular file\n o be created with data stored within the Pseudo file.\n * Symbolic links are now followed in extract files\n * Unsquashfs now supports \u0027exclude\u0027 files.\n * Max depth traversal option added.\n * Unsquashfs can now output a \u0027Pseudo file\u0027 representing the\n input Squashfs filesystem.\n * New -one-file-system option in Mksquashfs.\n * New -no-hardlinks option in Mksquashfs.\n * Exit code in Unsquashfs changed to distinguish between\n non-fatal errors (exit 2), and fatal errors (exit 1).\n * Xattr id count added in Unsquashfs \u0027-stat\u0027 output.\n * Unsquashfs \u0027write outside directory\u0027 exploit fixed.\n * Error handling in Unsquashfs writer thread fixed.\n * Fix failure to truncate destination if appending aborted.\n * Prevent Mksquashfs reading the destination file. \n", "title": "Description of the patch" }, { "category": "details", "text": "SUSE-2023-4591,SUSE-SLE-Micro-5.3-2023-4591,SUSE-SLE-Micro-5.4-2023-4591,SUSE-SLE-Micro-5.5-2023-4591,SUSE-SLE-Module-Basesystem-15-SP4-2023-4591,SUSE-SLE-Module-Basesystem-15-SP5-2023-4591,SUSE-SLE-Product-HPC-15-SP3-ESPOS-2023-4591,SUSE-SLE-Product-HPC-15-SP3-LTSS-2023-4591,SUSE-SLE-Product-SLES-15-SP3-LTSS-2023-4591,SUSE-SLE-Product-SLES_SAP-15-SP3-2023-4591,SUSE-SLE-Product-SUSE-Manager-Proxy-4.2-2023-4591,SUSE-SLE-Product-SUSE-Manager-Server-4.2-2023-4591,SUSE-SUSE-MicroOS-5.1-2023-4591,SUSE-SUSE-MicroOS-5.2-2023-4591,SUSE-Storage-7.1-2023-4591,openSUSE-Leap-Micro-5.3-2023-4591,openSUSE-Leap-Micro-5.4-2023-4591,openSUSE-SLE-15.4-2023-4591,openSUSE-SLE-15.5-2023-4591", "title": "Patchnames" }, { "category": "legal_disclaimer", "text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", "title": "Terms of use" } ], "publisher": { "category": "vendor", "contact_details": "https://www.suse.com/support/security/contact/", "name": "SUSE Product Security Team", "namespace": "https://www.suse.com/" }, "references": [ { "category": "external", "summary": "SUSE ratings", "url": "https://www.suse.com/support/security/rating/" }, { "category": "self", "summary": "URL of this CSAF notice", "url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2023_4591-1.json" }, { "category": "self", "summary": "URL for SUSE-SU-2023:4591-1", "url": "https://www.suse.com/support/update/announcement/2023/suse-su-20234591-1/" }, { "category": "self", "summary": "E-Mail link for SUSE-SU-2023:4591-1", "url": "https://lists.suse.com/pipermail/sle-security-updates/2023-November/017236.html" }, { "category": "self", "summary": "SUSE Bug 1189936", "url": "https://bugzilla.suse.com/1189936" }, { "category": "self", "summary": "SUSE Bug 1190531", "url": "https://bugzilla.suse.com/1190531" }, { "category": "self", "summary": "SUSE Bug 935380", "url": "https://bugzilla.suse.com/935380" }, { "category": "self", "summary": "SUSE CVE CVE-2015-4645 page", "url": "https://www.suse.com/security/cve/CVE-2015-4645/" }, { "category": "self", "summary": "SUSE CVE CVE-2015-4646 page", "url": "https://www.suse.com/security/cve/CVE-2015-4646/" }, { "category": "self", "summary": "SUSE CVE CVE-2021-40153 page", "url": "https://www.suse.com/security/cve/CVE-2021-40153/" }, { "category": "self", "summary": "SUSE CVE CVE-2021-41072 page", "url": "https://www.suse.com/security/cve/CVE-2021-41072/" } ], "title": "Security update for squashfs", "tracking": { "current_release_date": "2023-11-27T13:32:32Z", "generator": { "date": "2023-11-27T13:32:32Z", "engine": { "name": "cve-database.git:bin/generate-csaf.pl", "version": "1" } }, "id": "SUSE-SU-2023:4591-1", "initial_release_date": "2023-11-27T13:32:32Z", "revision_history": [ { "date": "2023-11-27T13:32:32Z", "number": "1", "summary": "Current version" } ], "status": "final", "version": "1" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version", "name": "squashfs-4.6.1-150300.3.3.1.aarch64", "product": { "name": "squashfs-4.6.1-150300.3.3.1.aarch64", "product_id": "squashfs-4.6.1-150300.3.3.1.aarch64" } } ], "category": "architecture", "name": "aarch64" }, { "branches": [ { "category": "product_version", "name": "squashfs-4.6.1-150300.3.3.1.i586", "product": { "name": "squashfs-4.6.1-150300.3.3.1.i586", "product_id": "squashfs-4.6.1-150300.3.3.1.i586" } } ], "category": "architecture", "name": "i586" }, { "branches": [ { "category": "product_version", "name": "squashfs-4.6.1-150300.3.3.1.ppc64le", "product": { "name": "squashfs-4.6.1-150300.3.3.1.ppc64le", "product_id": "squashfs-4.6.1-150300.3.3.1.ppc64le" } } ], "category": "architecture", "name": "ppc64le" }, { "branches": [ { "category": "product_version", "name": "squashfs-4.6.1-150300.3.3.1.s390x", "product": { "name": "squashfs-4.6.1-150300.3.3.1.s390x", "product_id": "squashfs-4.6.1-150300.3.3.1.s390x" } } ], "category": "architecture", "name": "s390x" }, { "branches": [ { "category": "product_version", "name": "squashfs-4.6.1-150300.3.3.1.x86_64", "product": { "name": "squashfs-4.6.1-150300.3.3.1.x86_64", "product_id": "squashfs-4.6.1-150300.3.3.1.x86_64" } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_name", "name": "SUSE Linux Enterprise Micro 5.3", "product": { "name": "SUSE Linux Enterprise Micro 5.3", "product_id": "SUSE Linux Enterprise Micro 5.3", "product_identification_helper": { "cpe": "cpe:/o:suse:sle-micro:5.3" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Micro 5.4", "product": { "name": "SUSE Linux Enterprise Micro 5.4", "product_id": "SUSE Linux Enterprise Micro 5.4", "product_identification_helper": { "cpe": "cpe:/o:suse:sle-micro:5.4" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Micro 5.5", "product": { "name": "SUSE Linux Enterprise Micro 5.5", "product_id": "SUSE Linux Enterprise Micro 5.5", "product_identification_helper": { "cpe": "cpe:/o:suse:sle-micro:5.5" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Module for Basesystem 15 SP4", "product": { "name": "SUSE Linux Enterprise Module for Basesystem 15 SP4", "product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP4", "product_identification_helper": { "cpe": "cpe:/o:suse:sle-module-basesystem:15:sp4" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Module for Basesystem 15 SP5", "product": { "name": "SUSE Linux Enterprise Module for Basesystem 15 SP5", "product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP5", "product_identification_helper": { "cpe": "cpe:/o:suse:sle-module-basesystem:15:sp5" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS", "product": { "name": "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS", "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS", "product_identification_helper": { "cpe": "cpe:/o:suse:sle_hpc-espos:15:sp3" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS", "product": { "name": "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS", "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS", "product_identification_helper": { "cpe": "cpe:/o:suse:sle_hpc-ltss:15:sp3" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Server 15 SP3-LTSS", "product": { "name": "SUSE Linux Enterprise Server 15 SP3-LTSS", "product_id": "SUSE Linux Enterprise Server 15 SP3-LTSS", "product_identification_helper": { "cpe": "cpe:/o:suse:sles-ltss:15:sp3" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Server for SAP Applications 15 SP3", "product": { "name": "SUSE Linux Enterprise Server for SAP Applications 15 SP3", "product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP3", "product_identification_helper": { "cpe": "cpe:/o:suse:sles_sap:15:sp3" } } }, { "category": "product_name", "name": "SUSE Manager Proxy 4.2", "product": { "name": "SUSE Manager Proxy 4.2", "product_id": "SUSE Manager Proxy 4.2", "product_identification_helper": { "cpe": "cpe:/o:suse:suse-manager-proxy:4.2" } } }, { "category": "product_name", "name": "SUSE Manager Server 4.2", "product": { "name": "SUSE Manager Server 4.2", "product_id": "SUSE Manager Server 4.2", "product_identification_helper": { "cpe": "cpe:/o:suse:suse-manager-server:4.2" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Micro 5.1", "product": { "name": "SUSE Linux Enterprise Micro 5.1", "product_id": "SUSE Linux Enterprise Micro 5.1", "product_identification_helper": { "cpe": "cpe:/o:suse:suse-microos:5.1" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Micro 5.2", "product": { "name": "SUSE Linux Enterprise Micro 5.2", "product_id": "SUSE Linux Enterprise Micro 5.2", "product_identification_helper": { "cpe": "cpe:/o:suse:suse-microos:5.2" } } }, { "category": "product_name", "name": "SUSE Enterprise Storage 7.1", "product": { "name": "SUSE Enterprise Storage 7.1", "product_id": "SUSE Enterprise Storage 7.1", "product_identification_helper": { "cpe": "cpe:/o:suse:ses:7.1" } } }, { "category": "product_name", "name": "openSUSE Leap Micro 5.3", "product": { "name": "openSUSE Leap Micro 5.3", "product_id": "openSUSE Leap Micro 5.3", "product_identification_helper": { "cpe": "cpe:/o:opensuse:leap-micro:5.3" } } }, { "category": "product_name", "name": "openSUSE Leap Micro 5.4", "product": { "name": "openSUSE Leap Micro 5.4", "product_id": "openSUSE Leap Micro 5.4", "product_identification_helper": { "cpe": "cpe:/o:opensuse:leap-micro:5.4" } } }, { "category": "product_name", "name": "openSUSE Leap 15.4", "product": { "name": "openSUSE Leap 15.4", "product_id": "openSUSE Leap 15.4", "product_identification_helper": { "cpe": "cpe:/o:opensuse:leap:15.4" } } }, { "category": "product_name", "name": "openSUSE Leap 15.5", "product": { "name": "openSUSE Leap 15.5", "product_id": "openSUSE Leap 15.5", "product_identification_helper": { "cpe": "cpe:/o:opensuse:leap:15.5" } } } ], "category": "product_family", "name": "SUSE Linux Enterprise" } ], "category": "vendor", "name": "SUSE" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "squashfs-4.6.1-150300.3.3.1.aarch64 as component of SUSE Linux Enterprise Micro 5.3", "product_id": "SUSE Linux Enterprise Micro 5.3:squashfs-4.6.1-150300.3.3.1.aarch64" }, "product_reference": "squashfs-4.6.1-150300.3.3.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Micro 5.3" }, { "category": "default_component_of", "full_product_name": { "name": "squashfs-4.6.1-150300.3.3.1.s390x as component of SUSE Linux Enterprise Micro 5.3", "product_id": "SUSE Linux Enterprise Micro 5.3:squashfs-4.6.1-150300.3.3.1.s390x" }, "product_reference": "squashfs-4.6.1-150300.3.3.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Micro 5.3" }, { "category": "default_component_of", "full_product_name": { "name": "squashfs-4.6.1-150300.3.3.1.x86_64 as component of SUSE Linux Enterprise Micro 5.3", "product_id": "SUSE Linux Enterprise Micro 5.3:squashfs-4.6.1-150300.3.3.1.x86_64" }, "product_reference": "squashfs-4.6.1-150300.3.3.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Micro 5.3" }, { "category": "default_component_of", "full_product_name": { "name": "squashfs-4.6.1-150300.3.3.1.aarch64 as component of SUSE Linux Enterprise Micro 5.4", "product_id": "SUSE Linux Enterprise Micro 5.4:squashfs-4.6.1-150300.3.3.1.aarch64" }, "product_reference": "squashfs-4.6.1-150300.3.3.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Micro 5.4" }, { "category": "default_component_of", "full_product_name": { "name": "squashfs-4.6.1-150300.3.3.1.s390x as component of SUSE Linux Enterprise Micro 5.4", "product_id": "SUSE Linux Enterprise Micro 5.4:squashfs-4.6.1-150300.3.3.1.s390x" }, "product_reference": "squashfs-4.6.1-150300.3.3.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Micro 5.4" }, { "category": "default_component_of", "full_product_name": { "name": "squashfs-4.6.1-150300.3.3.1.x86_64 as component of SUSE Linux Enterprise Micro 5.4", "product_id": "SUSE Linux Enterprise Micro 5.4:squashfs-4.6.1-150300.3.3.1.x86_64" }, "product_reference": "squashfs-4.6.1-150300.3.3.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Micro 5.4" }, { "category": "default_component_of", "full_product_name": { "name": "squashfs-4.6.1-150300.3.3.1.aarch64 as component of SUSE Linux Enterprise Micro 5.5", "product_id": "SUSE Linux Enterprise Micro 5.5:squashfs-4.6.1-150300.3.3.1.aarch64" }, "product_reference": "squashfs-4.6.1-150300.3.3.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Micro 5.5" }, { "category": "default_component_of", "full_product_name": { "name": "squashfs-4.6.1-150300.3.3.1.s390x as component of SUSE Linux Enterprise Micro 5.5", "product_id": "SUSE Linux Enterprise Micro 5.5:squashfs-4.6.1-150300.3.3.1.s390x" }, "product_reference": "squashfs-4.6.1-150300.3.3.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Micro 5.5" }, { "category": "default_component_of", "full_product_name": { "name": "squashfs-4.6.1-150300.3.3.1.x86_64 as component of SUSE Linux Enterprise Micro 5.5", "product_id": "SUSE Linux Enterprise Micro 5.5:squashfs-4.6.1-150300.3.3.1.x86_64" }, "product_reference": "squashfs-4.6.1-150300.3.3.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Micro 5.5" }, { "category": "default_component_of", "full_product_name": { "name": "squashfs-4.6.1-150300.3.3.1.aarch64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP4", "product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP4:squashfs-4.6.1-150300.3.3.1.aarch64" }, "product_reference": "squashfs-4.6.1-150300.3.3.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "squashfs-4.6.1-150300.3.3.1.ppc64le as component of SUSE Linux Enterprise Module for Basesystem 15 SP4", "product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP4:squashfs-4.6.1-150300.3.3.1.ppc64le" }, "product_reference": "squashfs-4.6.1-150300.3.3.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "squashfs-4.6.1-150300.3.3.1.s390x as component of SUSE Linux Enterprise Module for Basesystem 15 SP4", "product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP4:squashfs-4.6.1-150300.3.3.1.s390x" }, "product_reference": "squashfs-4.6.1-150300.3.3.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "squashfs-4.6.1-150300.3.3.1.x86_64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP4", "product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP4:squashfs-4.6.1-150300.3.3.1.x86_64" }, "product_reference": "squashfs-4.6.1-150300.3.3.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "squashfs-4.6.1-150300.3.3.1.aarch64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP5", "product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP5:squashfs-4.6.1-150300.3.3.1.aarch64" }, "product_reference": "squashfs-4.6.1-150300.3.3.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "squashfs-4.6.1-150300.3.3.1.ppc64le as component of SUSE Linux Enterprise Module for Basesystem 15 SP5", "product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP5:squashfs-4.6.1-150300.3.3.1.ppc64le" }, "product_reference": "squashfs-4.6.1-150300.3.3.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "squashfs-4.6.1-150300.3.3.1.s390x as component of SUSE Linux Enterprise Module for Basesystem 15 SP5", "product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP5:squashfs-4.6.1-150300.3.3.1.s390x" }, "product_reference": "squashfs-4.6.1-150300.3.3.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "squashfs-4.6.1-150300.3.3.1.x86_64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP5", "product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP5:squashfs-4.6.1-150300.3.3.1.x86_64" }, "product_reference": "squashfs-4.6.1-150300.3.3.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "squashfs-4.6.1-150300.3.3.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS", "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:squashfs-4.6.1-150300.3.3.1.aarch64" }, "product_reference": "squashfs-4.6.1-150300.3.3.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS" }, { "category": "default_component_of", "full_product_name": { "name": "squashfs-4.6.1-150300.3.3.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS", "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:squashfs-4.6.1-150300.3.3.1.x86_64" }, "product_reference": "squashfs-4.6.1-150300.3.3.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS" }, { "category": "default_component_of", "full_product_name": { "name": "squashfs-4.6.1-150300.3.3.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS", "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:squashfs-4.6.1-150300.3.3.1.aarch64" }, "product_reference": "squashfs-4.6.1-150300.3.3.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "squashfs-4.6.1-150300.3.3.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS", "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:squashfs-4.6.1-150300.3.3.1.x86_64" }, "product_reference": "squashfs-4.6.1-150300.3.3.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "squashfs-4.6.1-150300.3.3.1.aarch64 as component of SUSE Linux Enterprise Server 15 SP3-LTSS", "product_id": "SUSE Linux Enterprise Server 15 SP3-LTSS:squashfs-4.6.1-150300.3.3.1.aarch64" }, "product_reference": "squashfs-4.6.1-150300.3.3.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP3-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "squashfs-4.6.1-150300.3.3.1.ppc64le as component of SUSE Linux Enterprise Server 15 SP3-LTSS", "product_id": "SUSE Linux Enterprise Server 15 SP3-LTSS:squashfs-4.6.1-150300.3.3.1.ppc64le" }, "product_reference": "squashfs-4.6.1-150300.3.3.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP3-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "squashfs-4.6.1-150300.3.3.1.s390x as component of SUSE Linux Enterprise Server 15 SP3-LTSS", "product_id": "SUSE Linux Enterprise Server 15 SP3-LTSS:squashfs-4.6.1-150300.3.3.1.s390x" }, "product_reference": "squashfs-4.6.1-150300.3.3.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP3-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "squashfs-4.6.1-150300.3.3.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP3-LTSS", "product_id": "SUSE Linux Enterprise Server 15 SP3-LTSS:squashfs-4.6.1-150300.3.3.1.x86_64" }, "product_reference": "squashfs-4.6.1-150300.3.3.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP3-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "squashfs-4.6.1-150300.3.3.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 15 SP3", "product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP3:squashfs-4.6.1-150300.3.3.1.ppc64le" }, "product_reference": "squashfs-4.6.1-150300.3.3.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "squashfs-4.6.1-150300.3.3.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15 SP3", "product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP3:squashfs-4.6.1-150300.3.3.1.x86_64" }, "product_reference": "squashfs-4.6.1-150300.3.3.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "squashfs-4.6.1-150300.3.3.1.x86_64 as component of SUSE Manager Proxy 4.2", "product_id": "SUSE Manager Proxy 4.2:squashfs-4.6.1-150300.3.3.1.x86_64" }, "product_reference": "squashfs-4.6.1-150300.3.3.1.x86_64", "relates_to_product_reference": "SUSE Manager Proxy 4.2" }, { "category": "default_component_of", "full_product_name": { "name": "squashfs-4.6.1-150300.3.3.1.ppc64le as component of SUSE Manager Server 4.2", "product_id": "SUSE Manager Server 4.2:squashfs-4.6.1-150300.3.3.1.ppc64le" }, "product_reference": "squashfs-4.6.1-150300.3.3.1.ppc64le", "relates_to_product_reference": "SUSE Manager Server 4.2" }, { "category": "default_component_of", "full_product_name": { "name": "squashfs-4.6.1-150300.3.3.1.s390x as component of SUSE Manager Server 4.2", "product_id": "SUSE Manager Server 4.2:squashfs-4.6.1-150300.3.3.1.s390x" }, "product_reference": "squashfs-4.6.1-150300.3.3.1.s390x", "relates_to_product_reference": "SUSE Manager Server 4.2" }, { "category": "default_component_of", "full_product_name": { "name": "squashfs-4.6.1-150300.3.3.1.x86_64 as component of SUSE Manager Server 4.2", "product_id": "SUSE Manager Server 4.2:squashfs-4.6.1-150300.3.3.1.x86_64" }, "product_reference": "squashfs-4.6.1-150300.3.3.1.x86_64", "relates_to_product_reference": "SUSE Manager Server 4.2" }, { "category": "default_component_of", "full_product_name": { "name": "squashfs-4.6.1-150300.3.3.1.aarch64 as component of SUSE Linux Enterprise Micro 5.1", "product_id": "SUSE Linux Enterprise Micro 5.1:squashfs-4.6.1-150300.3.3.1.aarch64" }, "product_reference": "squashfs-4.6.1-150300.3.3.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Micro 5.1" }, { "category": "default_component_of", "full_product_name": { "name": "squashfs-4.6.1-150300.3.3.1.s390x as component of SUSE Linux Enterprise Micro 5.1", "product_id": "SUSE Linux Enterprise Micro 5.1:squashfs-4.6.1-150300.3.3.1.s390x" }, "product_reference": "squashfs-4.6.1-150300.3.3.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Micro 5.1" }, { "category": "default_component_of", "full_product_name": { "name": "squashfs-4.6.1-150300.3.3.1.x86_64 as component of SUSE Linux Enterprise Micro 5.1", "product_id": "SUSE Linux Enterprise Micro 5.1:squashfs-4.6.1-150300.3.3.1.x86_64" }, "product_reference": "squashfs-4.6.1-150300.3.3.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Micro 5.1" }, { "category": "default_component_of", "full_product_name": { "name": "squashfs-4.6.1-150300.3.3.1.aarch64 as component of SUSE Linux Enterprise Micro 5.2", "product_id": "SUSE Linux Enterprise Micro 5.2:squashfs-4.6.1-150300.3.3.1.aarch64" }, "product_reference": "squashfs-4.6.1-150300.3.3.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Micro 5.2" }, { "category": "default_component_of", "full_product_name": { "name": "squashfs-4.6.1-150300.3.3.1.s390x as component of SUSE Linux Enterprise Micro 5.2", "product_id": "SUSE Linux Enterprise Micro 5.2:squashfs-4.6.1-150300.3.3.1.s390x" }, "product_reference": "squashfs-4.6.1-150300.3.3.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Micro 5.2" }, { "category": "default_component_of", "full_product_name": { "name": "squashfs-4.6.1-150300.3.3.1.x86_64 as component of SUSE Linux Enterprise Micro 5.2", "product_id": "SUSE Linux Enterprise Micro 5.2:squashfs-4.6.1-150300.3.3.1.x86_64" }, "product_reference": "squashfs-4.6.1-150300.3.3.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Micro 5.2" }, { "category": "default_component_of", "full_product_name": { "name": "squashfs-4.6.1-150300.3.3.1.aarch64 as component of SUSE Enterprise Storage 7.1", "product_id": "SUSE Enterprise Storage 7.1:squashfs-4.6.1-150300.3.3.1.aarch64" }, "product_reference": "squashfs-4.6.1-150300.3.3.1.aarch64", "relates_to_product_reference": "SUSE Enterprise Storage 7.1" }, { "category": "default_component_of", "full_product_name": { "name": "squashfs-4.6.1-150300.3.3.1.x86_64 as component of SUSE Enterprise Storage 7.1", "product_id": "SUSE Enterprise Storage 7.1:squashfs-4.6.1-150300.3.3.1.x86_64" }, "product_reference": "squashfs-4.6.1-150300.3.3.1.x86_64", "relates_to_product_reference": "SUSE Enterprise Storage 7.1" }, { "category": "default_component_of", "full_product_name": { "name": "squashfs-4.6.1-150300.3.3.1.aarch64 as component of openSUSE Leap Micro 5.3", "product_id": "openSUSE Leap Micro 5.3:squashfs-4.6.1-150300.3.3.1.aarch64" }, "product_reference": "squashfs-4.6.1-150300.3.3.1.aarch64", "relates_to_product_reference": "openSUSE Leap Micro 5.3" }, { "category": "default_component_of", "full_product_name": { "name": "squashfs-4.6.1-150300.3.3.1.x86_64 as component of openSUSE Leap Micro 5.3", "product_id": "openSUSE Leap Micro 5.3:squashfs-4.6.1-150300.3.3.1.x86_64" }, "product_reference": "squashfs-4.6.1-150300.3.3.1.x86_64", "relates_to_product_reference": "openSUSE Leap Micro 5.3" }, { "category": "default_component_of", "full_product_name": { "name": "squashfs-4.6.1-150300.3.3.1.aarch64 as component of openSUSE Leap Micro 5.4", "product_id": "openSUSE Leap Micro 5.4:squashfs-4.6.1-150300.3.3.1.aarch64" }, "product_reference": "squashfs-4.6.1-150300.3.3.1.aarch64", "relates_to_product_reference": "openSUSE Leap Micro 5.4" }, { "category": "default_component_of", "full_product_name": { "name": "squashfs-4.6.1-150300.3.3.1.s390x as component of openSUSE Leap Micro 5.4", "product_id": "openSUSE Leap Micro 5.4:squashfs-4.6.1-150300.3.3.1.s390x" }, "product_reference": "squashfs-4.6.1-150300.3.3.1.s390x", "relates_to_product_reference": "openSUSE Leap Micro 5.4" }, { "category": "default_component_of", "full_product_name": { "name": "squashfs-4.6.1-150300.3.3.1.x86_64 as component of openSUSE Leap Micro 5.4", "product_id": "openSUSE Leap Micro 5.4:squashfs-4.6.1-150300.3.3.1.x86_64" }, "product_reference": "squashfs-4.6.1-150300.3.3.1.x86_64", "relates_to_product_reference": "openSUSE Leap Micro 5.4" }, { "category": "default_component_of", "full_product_name": { "name": "squashfs-4.6.1-150300.3.3.1.aarch64 as component of openSUSE Leap 15.4", "product_id": "openSUSE Leap 15.4:squashfs-4.6.1-150300.3.3.1.aarch64" }, "product_reference": "squashfs-4.6.1-150300.3.3.1.aarch64", "relates_to_product_reference": "openSUSE Leap 15.4" }, { "category": "default_component_of", "full_product_name": { "name": "squashfs-4.6.1-150300.3.3.1.ppc64le as component of openSUSE Leap 15.4", "product_id": "openSUSE Leap 15.4:squashfs-4.6.1-150300.3.3.1.ppc64le" }, "product_reference": "squashfs-4.6.1-150300.3.3.1.ppc64le", "relates_to_product_reference": "openSUSE Leap 15.4" }, { "category": "default_component_of", "full_product_name": { "name": "squashfs-4.6.1-150300.3.3.1.s390x as component of openSUSE Leap 15.4", "product_id": "openSUSE Leap 15.4:squashfs-4.6.1-150300.3.3.1.s390x" }, "product_reference": "squashfs-4.6.1-150300.3.3.1.s390x", "relates_to_product_reference": "openSUSE Leap 15.4" }, { "category": "default_component_of", "full_product_name": { "name": "squashfs-4.6.1-150300.3.3.1.x86_64 as component of openSUSE Leap 15.4", "product_id": "openSUSE Leap 15.4:squashfs-4.6.1-150300.3.3.1.x86_64" }, "product_reference": "squashfs-4.6.1-150300.3.3.1.x86_64", "relates_to_product_reference": "openSUSE Leap 15.4" }, { "category": "default_component_of", "full_product_name": { "name": "squashfs-4.6.1-150300.3.3.1.aarch64 as component of openSUSE Leap 15.5", "product_id": "openSUSE Leap 15.5:squashfs-4.6.1-150300.3.3.1.aarch64" }, "product_reference": "squashfs-4.6.1-150300.3.3.1.aarch64", "relates_to_product_reference": "openSUSE Leap 15.5" }, { "category": "default_component_of", "full_product_name": { "name": "squashfs-4.6.1-150300.3.3.1.ppc64le as component of openSUSE Leap 15.5", "product_id": "openSUSE Leap 15.5:squashfs-4.6.1-150300.3.3.1.ppc64le" }, "product_reference": "squashfs-4.6.1-150300.3.3.1.ppc64le", "relates_to_product_reference": "openSUSE Leap 15.5" }, { "category": "default_component_of", "full_product_name": { "name": "squashfs-4.6.1-150300.3.3.1.s390x as component of openSUSE Leap 15.5", "product_id": "openSUSE Leap 15.5:squashfs-4.6.1-150300.3.3.1.s390x" }, "product_reference": "squashfs-4.6.1-150300.3.3.1.s390x", "relates_to_product_reference": "openSUSE Leap 15.5" }, { "category": "default_component_of", "full_product_name": { "name": "squashfs-4.6.1-150300.3.3.1.x86_64 as component of openSUSE Leap 15.5", "product_id": "openSUSE Leap 15.5:squashfs-4.6.1-150300.3.3.1.x86_64" }, "product_reference": "squashfs-4.6.1-150300.3.3.1.x86_64", "relates_to_product_reference": "openSUSE Leap 15.5" } ] }, "vulnerabilities": [ { "cve": "CVE-2015-4645", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2015-4645" } ], "notes": [ { "category": "general", "text": "Integer overflow in the read_fragment_table_4 function in unsquash-4.c in Squashfs and sasquatch allows remote attackers to cause a denial of service (application crash) via a crafted input, which triggers a stack-based buffer overflow.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Enterprise Storage 7.1:squashfs-4.6.1-150300.3.3.1.aarch64", "SUSE Enterprise Storage 7.1:squashfs-4.6.1-150300.3.3.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:squashfs-4.6.1-150300.3.3.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:squashfs-4.6.1-150300.3.3.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:squashfs-4.6.1-150300.3.3.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:squashfs-4.6.1-150300.3.3.1.x86_64", "SUSE Linux Enterprise Micro 5.1:squashfs-4.6.1-150300.3.3.1.aarch64", "SUSE Linux Enterprise Micro 5.1:squashfs-4.6.1-150300.3.3.1.s390x", "SUSE Linux Enterprise Micro 5.1:squashfs-4.6.1-150300.3.3.1.x86_64", "SUSE Linux Enterprise Micro 5.2:squashfs-4.6.1-150300.3.3.1.aarch64", "SUSE Linux Enterprise Micro 5.2:squashfs-4.6.1-150300.3.3.1.s390x", "SUSE Linux Enterprise Micro 5.2:squashfs-4.6.1-150300.3.3.1.x86_64", "SUSE Linux Enterprise Micro 5.3:squashfs-4.6.1-150300.3.3.1.aarch64", "SUSE Linux Enterprise Micro 5.3:squashfs-4.6.1-150300.3.3.1.s390x", "SUSE Linux Enterprise Micro 5.3:squashfs-4.6.1-150300.3.3.1.x86_64", "SUSE Linux Enterprise Micro 5.4:squashfs-4.6.1-150300.3.3.1.aarch64", "SUSE Linux Enterprise Micro 5.4:squashfs-4.6.1-150300.3.3.1.s390x", "SUSE Linux Enterprise Micro 5.4:squashfs-4.6.1-150300.3.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:squashfs-4.6.1-150300.3.3.1.aarch64", "SUSE Linux Enterprise Micro 5.5:squashfs-4.6.1-150300.3.3.1.s390x", "SUSE Linux Enterprise Micro 5.5:squashfs-4.6.1-150300.3.3.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:squashfs-4.6.1-150300.3.3.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:squashfs-4.6.1-150300.3.3.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:squashfs-4.6.1-150300.3.3.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:squashfs-4.6.1-150300.3.3.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:squashfs-4.6.1-150300.3.3.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:squashfs-4.6.1-150300.3.3.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP5:squashfs-4.6.1-150300.3.3.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP5:squashfs-4.6.1-150300.3.3.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:squashfs-4.6.1-150300.3.3.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:squashfs-4.6.1-150300.3.3.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:squashfs-4.6.1-150300.3.3.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:squashfs-4.6.1-150300.3.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:squashfs-4.6.1-150300.3.3.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:squashfs-4.6.1-150300.3.3.1.x86_64", "SUSE Manager Proxy 4.2:squashfs-4.6.1-150300.3.3.1.x86_64", "SUSE Manager Server 4.2:squashfs-4.6.1-150300.3.3.1.ppc64le", "SUSE Manager Server 4.2:squashfs-4.6.1-150300.3.3.1.s390x", "SUSE Manager Server 4.2:squashfs-4.6.1-150300.3.3.1.x86_64", "openSUSE Leap 15.4:squashfs-4.6.1-150300.3.3.1.aarch64", "openSUSE Leap 15.4:squashfs-4.6.1-150300.3.3.1.ppc64le", "openSUSE Leap 15.4:squashfs-4.6.1-150300.3.3.1.s390x", "openSUSE Leap 15.4:squashfs-4.6.1-150300.3.3.1.x86_64", "openSUSE Leap 15.5:squashfs-4.6.1-150300.3.3.1.aarch64", "openSUSE Leap 15.5:squashfs-4.6.1-150300.3.3.1.ppc64le", "openSUSE Leap 15.5:squashfs-4.6.1-150300.3.3.1.s390x", "openSUSE Leap 15.5:squashfs-4.6.1-150300.3.3.1.x86_64", "openSUSE Leap Micro 5.3:squashfs-4.6.1-150300.3.3.1.aarch64", "openSUSE Leap Micro 5.3:squashfs-4.6.1-150300.3.3.1.x86_64", "openSUSE Leap Micro 5.4:squashfs-4.6.1-150300.3.3.1.aarch64", "openSUSE Leap Micro 5.4:squashfs-4.6.1-150300.3.3.1.s390x", "openSUSE Leap Micro 5.4:squashfs-4.6.1-150300.3.3.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2015-4645", "url": "https://www.suse.com/security/cve/CVE-2015-4645" }, { "category": "external", "summary": "SUSE Bug 935380 for CVE-2015-4645", "url": "https://bugzilla.suse.com/935380" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Enterprise Storage 7.1:squashfs-4.6.1-150300.3.3.1.aarch64", "SUSE Enterprise Storage 7.1:squashfs-4.6.1-150300.3.3.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:squashfs-4.6.1-150300.3.3.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:squashfs-4.6.1-150300.3.3.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:squashfs-4.6.1-150300.3.3.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:squashfs-4.6.1-150300.3.3.1.x86_64", "SUSE Linux Enterprise Micro 5.1:squashfs-4.6.1-150300.3.3.1.aarch64", "SUSE Linux Enterprise Micro 5.1:squashfs-4.6.1-150300.3.3.1.s390x", "SUSE Linux Enterprise Micro 5.1:squashfs-4.6.1-150300.3.3.1.x86_64", "SUSE Linux Enterprise Micro 5.2:squashfs-4.6.1-150300.3.3.1.aarch64", "SUSE Linux Enterprise Micro 5.2:squashfs-4.6.1-150300.3.3.1.s390x", "SUSE Linux Enterprise Micro 5.2:squashfs-4.6.1-150300.3.3.1.x86_64", "SUSE Linux Enterprise Micro 5.3:squashfs-4.6.1-150300.3.3.1.aarch64", "SUSE Linux Enterprise Micro 5.3:squashfs-4.6.1-150300.3.3.1.s390x", "SUSE Linux Enterprise Micro 5.3:squashfs-4.6.1-150300.3.3.1.x86_64", "SUSE Linux Enterprise Micro 5.4:squashfs-4.6.1-150300.3.3.1.aarch64", "SUSE Linux Enterprise Micro 5.4:squashfs-4.6.1-150300.3.3.1.s390x", "SUSE Linux Enterprise Micro 5.4:squashfs-4.6.1-150300.3.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:squashfs-4.6.1-150300.3.3.1.aarch64", "SUSE Linux Enterprise Micro 5.5:squashfs-4.6.1-150300.3.3.1.s390x", "SUSE Linux Enterprise Micro 5.5:squashfs-4.6.1-150300.3.3.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:squashfs-4.6.1-150300.3.3.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:squashfs-4.6.1-150300.3.3.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:squashfs-4.6.1-150300.3.3.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:squashfs-4.6.1-150300.3.3.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:squashfs-4.6.1-150300.3.3.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:squashfs-4.6.1-150300.3.3.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP5:squashfs-4.6.1-150300.3.3.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP5:squashfs-4.6.1-150300.3.3.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:squashfs-4.6.1-150300.3.3.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:squashfs-4.6.1-150300.3.3.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:squashfs-4.6.1-150300.3.3.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:squashfs-4.6.1-150300.3.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:squashfs-4.6.1-150300.3.3.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:squashfs-4.6.1-150300.3.3.1.x86_64", "SUSE Manager Proxy 4.2:squashfs-4.6.1-150300.3.3.1.x86_64", "SUSE Manager Server 4.2:squashfs-4.6.1-150300.3.3.1.ppc64le", "SUSE Manager Server 4.2:squashfs-4.6.1-150300.3.3.1.s390x", "SUSE Manager Server 4.2:squashfs-4.6.1-150300.3.3.1.x86_64", "openSUSE Leap 15.4:squashfs-4.6.1-150300.3.3.1.aarch64", "openSUSE Leap 15.4:squashfs-4.6.1-150300.3.3.1.ppc64le", "openSUSE Leap 15.4:squashfs-4.6.1-150300.3.3.1.s390x", "openSUSE Leap 15.4:squashfs-4.6.1-150300.3.3.1.x86_64", "openSUSE Leap 15.5:squashfs-4.6.1-150300.3.3.1.aarch64", "openSUSE Leap 15.5:squashfs-4.6.1-150300.3.3.1.ppc64le", "openSUSE Leap 15.5:squashfs-4.6.1-150300.3.3.1.s390x", "openSUSE Leap 15.5:squashfs-4.6.1-150300.3.3.1.x86_64", "openSUSE Leap Micro 5.3:squashfs-4.6.1-150300.3.3.1.aarch64", "openSUSE Leap Micro 5.3:squashfs-4.6.1-150300.3.3.1.x86_64", "openSUSE Leap Micro 5.4:squashfs-4.6.1-150300.3.3.1.aarch64", "openSUSE Leap Micro 5.4:squashfs-4.6.1-150300.3.3.1.s390x", "openSUSE Leap Micro 5.4:squashfs-4.6.1-150300.3.3.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "SUSE Enterprise Storage 7.1:squashfs-4.6.1-150300.3.3.1.aarch64", "SUSE Enterprise Storage 7.1:squashfs-4.6.1-150300.3.3.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:squashfs-4.6.1-150300.3.3.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:squashfs-4.6.1-150300.3.3.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:squashfs-4.6.1-150300.3.3.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:squashfs-4.6.1-150300.3.3.1.x86_64", "SUSE Linux Enterprise Micro 5.1:squashfs-4.6.1-150300.3.3.1.aarch64", "SUSE Linux Enterprise Micro 5.1:squashfs-4.6.1-150300.3.3.1.s390x", "SUSE Linux Enterprise Micro 5.1:squashfs-4.6.1-150300.3.3.1.x86_64", "SUSE Linux Enterprise Micro 5.2:squashfs-4.6.1-150300.3.3.1.aarch64", "SUSE Linux Enterprise Micro 5.2:squashfs-4.6.1-150300.3.3.1.s390x", "SUSE Linux Enterprise Micro 5.2:squashfs-4.6.1-150300.3.3.1.x86_64", "SUSE Linux Enterprise Micro 5.3:squashfs-4.6.1-150300.3.3.1.aarch64", "SUSE Linux Enterprise Micro 5.3:squashfs-4.6.1-150300.3.3.1.s390x", "SUSE Linux Enterprise Micro 5.3:squashfs-4.6.1-150300.3.3.1.x86_64", "SUSE Linux Enterprise Micro 5.4:squashfs-4.6.1-150300.3.3.1.aarch64", "SUSE Linux Enterprise Micro 5.4:squashfs-4.6.1-150300.3.3.1.s390x", "SUSE Linux Enterprise Micro 5.4:squashfs-4.6.1-150300.3.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:squashfs-4.6.1-150300.3.3.1.aarch64", "SUSE Linux Enterprise Micro 5.5:squashfs-4.6.1-150300.3.3.1.s390x", "SUSE Linux Enterprise Micro 5.5:squashfs-4.6.1-150300.3.3.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:squashfs-4.6.1-150300.3.3.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:squashfs-4.6.1-150300.3.3.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:squashfs-4.6.1-150300.3.3.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:squashfs-4.6.1-150300.3.3.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:squashfs-4.6.1-150300.3.3.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:squashfs-4.6.1-150300.3.3.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP5:squashfs-4.6.1-150300.3.3.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP5:squashfs-4.6.1-150300.3.3.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:squashfs-4.6.1-150300.3.3.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:squashfs-4.6.1-150300.3.3.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:squashfs-4.6.1-150300.3.3.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:squashfs-4.6.1-150300.3.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:squashfs-4.6.1-150300.3.3.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:squashfs-4.6.1-150300.3.3.1.x86_64", "SUSE Manager Proxy 4.2:squashfs-4.6.1-150300.3.3.1.x86_64", "SUSE Manager Server 4.2:squashfs-4.6.1-150300.3.3.1.ppc64le", "SUSE Manager Server 4.2:squashfs-4.6.1-150300.3.3.1.s390x", "SUSE Manager Server 4.2:squashfs-4.6.1-150300.3.3.1.x86_64", "openSUSE Leap 15.4:squashfs-4.6.1-150300.3.3.1.aarch64", "openSUSE Leap 15.4:squashfs-4.6.1-150300.3.3.1.ppc64le", "openSUSE Leap 15.4:squashfs-4.6.1-150300.3.3.1.s390x", "openSUSE Leap 15.4:squashfs-4.6.1-150300.3.3.1.x86_64", "openSUSE Leap 15.5:squashfs-4.6.1-150300.3.3.1.aarch64", "openSUSE Leap 15.5:squashfs-4.6.1-150300.3.3.1.ppc64le", "openSUSE Leap 15.5:squashfs-4.6.1-150300.3.3.1.s390x", "openSUSE Leap 15.5:squashfs-4.6.1-150300.3.3.1.x86_64", "openSUSE Leap Micro 5.3:squashfs-4.6.1-150300.3.3.1.aarch64", "openSUSE Leap Micro 5.3:squashfs-4.6.1-150300.3.3.1.x86_64", "openSUSE Leap Micro 5.4:squashfs-4.6.1-150300.3.3.1.aarch64", "openSUSE Leap Micro 5.4:squashfs-4.6.1-150300.3.3.1.s390x", "openSUSE Leap Micro 5.4:squashfs-4.6.1-150300.3.3.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2023-11-27T13:32:32Z", "details": "moderate" } ], "title": "CVE-2015-4645" }, { "cve": "CVE-2015-4646", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2015-4646" } ], "notes": [ { "category": "general", "text": "(1) unsquash-1.c, (2) unsquash-2.c, (3) unsquash-3.c, and (4) unsquash-4.c in Squashfs and sasquatch allow remote attackers to cause a denial of service (application crash) via a crafted input.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Enterprise Storage 7.1:squashfs-4.6.1-150300.3.3.1.aarch64", "SUSE Enterprise Storage 7.1:squashfs-4.6.1-150300.3.3.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:squashfs-4.6.1-150300.3.3.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:squashfs-4.6.1-150300.3.3.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:squashfs-4.6.1-150300.3.3.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:squashfs-4.6.1-150300.3.3.1.x86_64", "SUSE Linux Enterprise Micro 5.1:squashfs-4.6.1-150300.3.3.1.aarch64", "SUSE Linux Enterprise Micro 5.1:squashfs-4.6.1-150300.3.3.1.s390x", "SUSE Linux Enterprise Micro 5.1:squashfs-4.6.1-150300.3.3.1.x86_64", "SUSE Linux Enterprise Micro 5.2:squashfs-4.6.1-150300.3.3.1.aarch64", "SUSE Linux Enterprise Micro 5.2:squashfs-4.6.1-150300.3.3.1.s390x", "SUSE Linux Enterprise Micro 5.2:squashfs-4.6.1-150300.3.3.1.x86_64", "SUSE Linux Enterprise Micro 5.3:squashfs-4.6.1-150300.3.3.1.aarch64", "SUSE Linux Enterprise Micro 5.3:squashfs-4.6.1-150300.3.3.1.s390x", "SUSE Linux Enterprise Micro 5.3:squashfs-4.6.1-150300.3.3.1.x86_64", "SUSE Linux Enterprise Micro 5.4:squashfs-4.6.1-150300.3.3.1.aarch64", "SUSE Linux Enterprise Micro 5.4:squashfs-4.6.1-150300.3.3.1.s390x", "SUSE Linux Enterprise Micro 5.4:squashfs-4.6.1-150300.3.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:squashfs-4.6.1-150300.3.3.1.aarch64", "SUSE Linux Enterprise Micro 5.5:squashfs-4.6.1-150300.3.3.1.s390x", "SUSE Linux Enterprise Micro 5.5:squashfs-4.6.1-150300.3.3.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:squashfs-4.6.1-150300.3.3.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:squashfs-4.6.1-150300.3.3.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:squashfs-4.6.1-150300.3.3.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:squashfs-4.6.1-150300.3.3.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:squashfs-4.6.1-150300.3.3.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:squashfs-4.6.1-150300.3.3.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP5:squashfs-4.6.1-150300.3.3.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP5:squashfs-4.6.1-150300.3.3.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:squashfs-4.6.1-150300.3.3.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:squashfs-4.6.1-150300.3.3.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:squashfs-4.6.1-150300.3.3.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:squashfs-4.6.1-150300.3.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:squashfs-4.6.1-150300.3.3.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:squashfs-4.6.1-150300.3.3.1.x86_64", "SUSE Manager Proxy 4.2:squashfs-4.6.1-150300.3.3.1.x86_64", "SUSE Manager Server 4.2:squashfs-4.6.1-150300.3.3.1.ppc64le", "SUSE Manager Server 4.2:squashfs-4.6.1-150300.3.3.1.s390x", "SUSE Manager Server 4.2:squashfs-4.6.1-150300.3.3.1.x86_64", "openSUSE Leap 15.4:squashfs-4.6.1-150300.3.3.1.aarch64", "openSUSE Leap 15.4:squashfs-4.6.1-150300.3.3.1.ppc64le", "openSUSE Leap 15.4:squashfs-4.6.1-150300.3.3.1.s390x", "openSUSE Leap 15.4:squashfs-4.6.1-150300.3.3.1.x86_64", "openSUSE Leap 15.5:squashfs-4.6.1-150300.3.3.1.aarch64", "openSUSE Leap 15.5:squashfs-4.6.1-150300.3.3.1.ppc64le", "openSUSE Leap 15.5:squashfs-4.6.1-150300.3.3.1.s390x", "openSUSE Leap 15.5:squashfs-4.6.1-150300.3.3.1.x86_64", "openSUSE Leap Micro 5.3:squashfs-4.6.1-150300.3.3.1.aarch64", "openSUSE Leap Micro 5.3:squashfs-4.6.1-150300.3.3.1.x86_64", "openSUSE Leap Micro 5.4:squashfs-4.6.1-150300.3.3.1.aarch64", "openSUSE Leap Micro 5.4:squashfs-4.6.1-150300.3.3.1.s390x", "openSUSE Leap Micro 5.4:squashfs-4.6.1-150300.3.3.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2015-4646", "url": "https://www.suse.com/security/cve/CVE-2015-4646" }, { "category": "external", "summary": "SUSE Bug 935380 for CVE-2015-4646", "url": "https://bugzilla.suse.com/935380" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Enterprise Storage 7.1:squashfs-4.6.1-150300.3.3.1.aarch64", "SUSE Enterprise Storage 7.1:squashfs-4.6.1-150300.3.3.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:squashfs-4.6.1-150300.3.3.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:squashfs-4.6.1-150300.3.3.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:squashfs-4.6.1-150300.3.3.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:squashfs-4.6.1-150300.3.3.1.x86_64", "SUSE Linux Enterprise Micro 5.1:squashfs-4.6.1-150300.3.3.1.aarch64", "SUSE Linux Enterprise Micro 5.1:squashfs-4.6.1-150300.3.3.1.s390x", "SUSE Linux Enterprise Micro 5.1:squashfs-4.6.1-150300.3.3.1.x86_64", "SUSE Linux Enterprise Micro 5.2:squashfs-4.6.1-150300.3.3.1.aarch64", "SUSE Linux Enterprise Micro 5.2:squashfs-4.6.1-150300.3.3.1.s390x", "SUSE Linux Enterprise Micro 5.2:squashfs-4.6.1-150300.3.3.1.x86_64", "SUSE Linux Enterprise Micro 5.3:squashfs-4.6.1-150300.3.3.1.aarch64", "SUSE Linux Enterprise Micro 5.3:squashfs-4.6.1-150300.3.3.1.s390x", "SUSE Linux Enterprise Micro 5.3:squashfs-4.6.1-150300.3.3.1.x86_64", "SUSE Linux Enterprise Micro 5.4:squashfs-4.6.1-150300.3.3.1.aarch64", "SUSE Linux Enterprise Micro 5.4:squashfs-4.6.1-150300.3.3.1.s390x", "SUSE Linux Enterprise Micro 5.4:squashfs-4.6.1-150300.3.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:squashfs-4.6.1-150300.3.3.1.aarch64", "SUSE Linux Enterprise Micro 5.5:squashfs-4.6.1-150300.3.3.1.s390x", "SUSE Linux Enterprise Micro 5.5:squashfs-4.6.1-150300.3.3.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:squashfs-4.6.1-150300.3.3.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:squashfs-4.6.1-150300.3.3.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:squashfs-4.6.1-150300.3.3.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:squashfs-4.6.1-150300.3.3.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:squashfs-4.6.1-150300.3.3.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:squashfs-4.6.1-150300.3.3.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP5:squashfs-4.6.1-150300.3.3.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP5:squashfs-4.6.1-150300.3.3.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:squashfs-4.6.1-150300.3.3.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:squashfs-4.6.1-150300.3.3.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:squashfs-4.6.1-150300.3.3.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:squashfs-4.6.1-150300.3.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:squashfs-4.6.1-150300.3.3.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:squashfs-4.6.1-150300.3.3.1.x86_64", "SUSE Manager Proxy 4.2:squashfs-4.6.1-150300.3.3.1.x86_64", "SUSE Manager Server 4.2:squashfs-4.6.1-150300.3.3.1.ppc64le", "SUSE Manager Server 4.2:squashfs-4.6.1-150300.3.3.1.s390x", "SUSE Manager Server 4.2:squashfs-4.6.1-150300.3.3.1.x86_64", "openSUSE Leap 15.4:squashfs-4.6.1-150300.3.3.1.aarch64", "openSUSE Leap 15.4:squashfs-4.6.1-150300.3.3.1.ppc64le", "openSUSE Leap 15.4:squashfs-4.6.1-150300.3.3.1.s390x", "openSUSE Leap 15.4:squashfs-4.6.1-150300.3.3.1.x86_64", "openSUSE Leap 15.5:squashfs-4.6.1-150300.3.3.1.aarch64", "openSUSE Leap 15.5:squashfs-4.6.1-150300.3.3.1.ppc64le", "openSUSE Leap 15.5:squashfs-4.6.1-150300.3.3.1.s390x", "openSUSE Leap 15.5:squashfs-4.6.1-150300.3.3.1.x86_64", "openSUSE Leap Micro 5.3:squashfs-4.6.1-150300.3.3.1.aarch64", "openSUSE Leap Micro 5.3:squashfs-4.6.1-150300.3.3.1.x86_64", "openSUSE Leap Micro 5.4:squashfs-4.6.1-150300.3.3.1.aarch64", "openSUSE Leap Micro 5.4:squashfs-4.6.1-150300.3.3.1.s390x", "openSUSE Leap Micro 5.4:squashfs-4.6.1-150300.3.3.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "SUSE Enterprise Storage 7.1:squashfs-4.6.1-150300.3.3.1.aarch64", "SUSE Enterprise Storage 7.1:squashfs-4.6.1-150300.3.3.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:squashfs-4.6.1-150300.3.3.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:squashfs-4.6.1-150300.3.3.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:squashfs-4.6.1-150300.3.3.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:squashfs-4.6.1-150300.3.3.1.x86_64", "SUSE Linux Enterprise Micro 5.1:squashfs-4.6.1-150300.3.3.1.aarch64", "SUSE Linux Enterprise Micro 5.1:squashfs-4.6.1-150300.3.3.1.s390x", "SUSE Linux Enterprise Micro 5.1:squashfs-4.6.1-150300.3.3.1.x86_64", "SUSE Linux Enterprise Micro 5.2:squashfs-4.6.1-150300.3.3.1.aarch64", "SUSE Linux Enterprise Micro 5.2:squashfs-4.6.1-150300.3.3.1.s390x", "SUSE Linux Enterprise Micro 5.2:squashfs-4.6.1-150300.3.3.1.x86_64", "SUSE Linux Enterprise Micro 5.3:squashfs-4.6.1-150300.3.3.1.aarch64", "SUSE Linux Enterprise Micro 5.3:squashfs-4.6.1-150300.3.3.1.s390x", "SUSE Linux Enterprise Micro 5.3:squashfs-4.6.1-150300.3.3.1.x86_64", "SUSE Linux Enterprise Micro 5.4:squashfs-4.6.1-150300.3.3.1.aarch64", "SUSE Linux Enterprise Micro 5.4:squashfs-4.6.1-150300.3.3.1.s390x", "SUSE Linux Enterprise Micro 5.4:squashfs-4.6.1-150300.3.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:squashfs-4.6.1-150300.3.3.1.aarch64", "SUSE Linux Enterprise Micro 5.5:squashfs-4.6.1-150300.3.3.1.s390x", "SUSE Linux Enterprise Micro 5.5:squashfs-4.6.1-150300.3.3.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:squashfs-4.6.1-150300.3.3.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:squashfs-4.6.1-150300.3.3.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:squashfs-4.6.1-150300.3.3.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:squashfs-4.6.1-150300.3.3.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:squashfs-4.6.1-150300.3.3.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:squashfs-4.6.1-150300.3.3.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP5:squashfs-4.6.1-150300.3.3.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP5:squashfs-4.6.1-150300.3.3.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:squashfs-4.6.1-150300.3.3.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:squashfs-4.6.1-150300.3.3.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:squashfs-4.6.1-150300.3.3.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:squashfs-4.6.1-150300.3.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:squashfs-4.6.1-150300.3.3.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:squashfs-4.6.1-150300.3.3.1.x86_64", "SUSE Manager Proxy 4.2:squashfs-4.6.1-150300.3.3.1.x86_64", "SUSE Manager Server 4.2:squashfs-4.6.1-150300.3.3.1.ppc64le", "SUSE Manager Server 4.2:squashfs-4.6.1-150300.3.3.1.s390x", "SUSE Manager Server 4.2:squashfs-4.6.1-150300.3.3.1.x86_64", "openSUSE Leap 15.4:squashfs-4.6.1-150300.3.3.1.aarch64", "openSUSE Leap 15.4:squashfs-4.6.1-150300.3.3.1.ppc64le", "openSUSE Leap 15.4:squashfs-4.6.1-150300.3.3.1.s390x", "openSUSE Leap 15.4:squashfs-4.6.1-150300.3.3.1.x86_64", "openSUSE Leap 15.5:squashfs-4.6.1-150300.3.3.1.aarch64", "openSUSE Leap 15.5:squashfs-4.6.1-150300.3.3.1.ppc64le", "openSUSE Leap 15.5:squashfs-4.6.1-150300.3.3.1.s390x", "openSUSE Leap 15.5:squashfs-4.6.1-150300.3.3.1.x86_64", "openSUSE Leap Micro 5.3:squashfs-4.6.1-150300.3.3.1.aarch64", "openSUSE Leap Micro 5.3:squashfs-4.6.1-150300.3.3.1.x86_64", "openSUSE Leap Micro 5.4:squashfs-4.6.1-150300.3.3.1.aarch64", "openSUSE Leap Micro 5.4:squashfs-4.6.1-150300.3.3.1.s390x", "openSUSE Leap Micro 5.4:squashfs-4.6.1-150300.3.3.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2023-11-27T13:32:32Z", "details": "moderate" } ], "title": "CVE-2015-4646" }, { "cve": "CVE-2021-40153", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2021-40153" } ], "notes": [ { "category": "general", "text": "squashfs_opendir in unsquash-1.c in Squashfs-Tools 4.5 stores the filename in the directory entry; this is then used by unsquashfs to create the new file during the unsquash. The filename is not validated for traversal outside of the destination directory, and thus allows writing to locations outside of the destination.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Enterprise Storage 7.1:squashfs-4.6.1-150300.3.3.1.aarch64", "SUSE Enterprise Storage 7.1:squashfs-4.6.1-150300.3.3.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:squashfs-4.6.1-150300.3.3.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:squashfs-4.6.1-150300.3.3.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:squashfs-4.6.1-150300.3.3.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:squashfs-4.6.1-150300.3.3.1.x86_64", "SUSE Linux Enterprise Micro 5.1:squashfs-4.6.1-150300.3.3.1.aarch64", "SUSE Linux Enterprise Micro 5.1:squashfs-4.6.1-150300.3.3.1.s390x", "SUSE Linux Enterprise Micro 5.1:squashfs-4.6.1-150300.3.3.1.x86_64", "SUSE Linux Enterprise Micro 5.2:squashfs-4.6.1-150300.3.3.1.aarch64", "SUSE Linux Enterprise Micro 5.2:squashfs-4.6.1-150300.3.3.1.s390x", "SUSE Linux Enterprise Micro 5.2:squashfs-4.6.1-150300.3.3.1.x86_64", "SUSE Linux Enterprise Micro 5.3:squashfs-4.6.1-150300.3.3.1.aarch64", "SUSE Linux Enterprise Micro 5.3:squashfs-4.6.1-150300.3.3.1.s390x", "SUSE Linux Enterprise Micro 5.3:squashfs-4.6.1-150300.3.3.1.x86_64", "SUSE Linux Enterprise Micro 5.4:squashfs-4.6.1-150300.3.3.1.aarch64", "SUSE Linux Enterprise Micro 5.4:squashfs-4.6.1-150300.3.3.1.s390x", "SUSE Linux Enterprise Micro 5.4:squashfs-4.6.1-150300.3.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:squashfs-4.6.1-150300.3.3.1.aarch64", "SUSE Linux Enterprise Micro 5.5:squashfs-4.6.1-150300.3.3.1.s390x", "SUSE Linux Enterprise Micro 5.5:squashfs-4.6.1-150300.3.3.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:squashfs-4.6.1-150300.3.3.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:squashfs-4.6.1-150300.3.3.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:squashfs-4.6.1-150300.3.3.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:squashfs-4.6.1-150300.3.3.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:squashfs-4.6.1-150300.3.3.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:squashfs-4.6.1-150300.3.3.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP5:squashfs-4.6.1-150300.3.3.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP5:squashfs-4.6.1-150300.3.3.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:squashfs-4.6.1-150300.3.3.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:squashfs-4.6.1-150300.3.3.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:squashfs-4.6.1-150300.3.3.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:squashfs-4.6.1-150300.3.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:squashfs-4.6.1-150300.3.3.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:squashfs-4.6.1-150300.3.3.1.x86_64", "SUSE Manager Proxy 4.2:squashfs-4.6.1-150300.3.3.1.x86_64", "SUSE Manager Server 4.2:squashfs-4.6.1-150300.3.3.1.ppc64le", "SUSE Manager Server 4.2:squashfs-4.6.1-150300.3.3.1.s390x", "SUSE Manager Server 4.2:squashfs-4.6.1-150300.3.3.1.x86_64", "openSUSE Leap 15.4:squashfs-4.6.1-150300.3.3.1.aarch64", "openSUSE Leap 15.4:squashfs-4.6.1-150300.3.3.1.ppc64le", "openSUSE Leap 15.4:squashfs-4.6.1-150300.3.3.1.s390x", "openSUSE Leap 15.4:squashfs-4.6.1-150300.3.3.1.x86_64", "openSUSE Leap 15.5:squashfs-4.6.1-150300.3.3.1.aarch64", "openSUSE Leap 15.5:squashfs-4.6.1-150300.3.3.1.ppc64le", "openSUSE Leap 15.5:squashfs-4.6.1-150300.3.3.1.s390x", "openSUSE Leap 15.5:squashfs-4.6.1-150300.3.3.1.x86_64", "openSUSE Leap Micro 5.3:squashfs-4.6.1-150300.3.3.1.aarch64", "openSUSE Leap Micro 5.3:squashfs-4.6.1-150300.3.3.1.x86_64", "openSUSE Leap Micro 5.4:squashfs-4.6.1-150300.3.3.1.aarch64", "openSUSE Leap Micro 5.4:squashfs-4.6.1-150300.3.3.1.s390x", "openSUSE Leap Micro 5.4:squashfs-4.6.1-150300.3.3.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2021-40153", "url": "https://www.suse.com/security/cve/CVE-2021-40153" }, { "category": "external", "summary": "SUSE Bug 1189936 for CVE-2021-40153", "url": "https://bugzilla.suse.com/1189936" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Enterprise Storage 7.1:squashfs-4.6.1-150300.3.3.1.aarch64", "SUSE Enterprise Storage 7.1:squashfs-4.6.1-150300.3.3.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:squashfs-4.6.1-150300.3.3.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:squashfs-4.6.1-150300.3.3.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:squashfs-4.6.1-150300.3.3.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:squashfs-4.6.1-150300.3.3.1.x86_64", "SUSE Linux Enterprise Micro 5.1:squashfs-4.6.1-150300.3.3.1.aarch64", "SUSE Linux Enterprise Micro 5.1:squashfs-4.6.1-150300.3.3.1.s390x", "SUSE Linux Enterprise Micro 5.1:squashfs-4.6.1-150300.3.3.1.x86_64", "SUSE Linux Enterprise Micro 5.2:squashfs-4.6.1-150300.3.3.1.aarch64", "SUSE Linux Enterprise Micro 5.2:squashfs-4.6.1-150300.3.3.1.s390x", "SUSE Linux Enterprise Micro 5.2:squashfs-4.6.1-150300.3.3.1.x86_64", "SUSE Linux Enterprise Micro 5.3:squashfs-4.6.1-150300.3.3.1.aarch64", "SUSE Linux Enterprise Micro 5.3:squashfs-4.6.1-150300.3.3.1.s390x", "SUSE Linux Enterprise Micro 5.3:squashfs-4.6.1-150300.3.3.1.x86_64", "SUSE Linux Enterprise Micro 5.4:squashfs-4.6.1-150300.3.3.1.aarch64", "SUSE Linux Enterprise Micro 5.4:squashfs-4.6.1-150300.3.3.1.s390x", "SUSE Linux Enterprise Micro 5.4:squashfs-4.6.1-150300.3.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:squashfs-4.6.1-150300.3.3.1.aarch64", "SUSE Linux Enterprise Micro 5.5:squashfs-4.6.1-150300.3.3.1.s390x", "SUSE Linux Enterprise Micro 5.5:squashfs-4.6.1-150300.3.3.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:squashfs-4.6.1-150300.3.3.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:squashfs-4.6.1-150300.3.3.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:squashfs-4.6.1-150300.3.3.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:squashfs-4.6.1-150300.3.3.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:squashfs-4.6.1-150300.3.3.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:squashfs-4.6.1-150300.3.3.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP5:squashfs-4.6.1-150300.3.3.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP5:squashfs-4.6.1-150300.3.3.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:squashfs-4.6.1-150300.3.3.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:squashfs-4.6.1-150300.3.3.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:squashfs-4.6.1-150300.3.3.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:squashfs-4.6.1-150300.3.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:squashfs-4.6.1-150300.3.3.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:squashfs-4.6.1-150300.3.3.1.x86_64", "SUSE Manager Proxy 4.2:squashfs-4.6.1-150300.3.3.1.x86_64", "SUSE Manager Server 4.2:squashfs-4.6.1-150300.3.3.1.ppc64le", "SUSE Manager Server 4.2:squashfs-4.6.1-150300.3.3.1.s390x", "SUSE Manager Server 4.2:squashfs-4.6.1-150300.3.3.1.x86_64", "openSUSE Leap 15.4:squashfs-4.6.1-150300.3.3.1.aarch64", "openSUSE Leap 15.4:squashfs-4.6.1-150300.3.3.1.ppc64le", "openSUSE Leap 15.4:squashfs-4.6.1-150300.3.3.1.s390x", "openSUSE Leap 15.4:squashfs-4.6.1-150300.3.3.1.x86_64", "openSUSE Leap 15.5:squashfs-4.6.1-150300.3.3.1.aarch64", "openSUSE Leap 15.5:squashfs-4.6.1-150300.3.3.1.ppc64le", "openSUSE Leap 15.5:squashfs-4.6.1-150300.3.3.1.s390x", "openSUSE Leap 15.5:squashfs-4.6.1-150300.3.3.1.x86_64", "openSUSE Leap Micro 5.3:squashfs-4.6.1-150300.3.3.1.aarch64", "openSUSE Leap Micro 5.3:squashfs-4.6.1-150300.3.3.1.x86_64", "openSUSE Leap Micro 5.4:squashfs-4.6.1-150300.3.3.1.aarch64", "openSUSE Leap Micro 5.4:squashfs-4.6.1-150300.3.3.1.s390x", "openSUSE Leap Micro 5.4:squashfs-4.6.1-150300.3.3.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.6, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:N", "version": "3.1" }, "products": [ "SUSE Enterprise Storage 7.1:squashfs-4.6.1-150300.3.3.1.aarch64", "SUSE Enterprise Storage 7.1:squashfs-4.6.1-150300.3.3.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:squashfs-4.6.1-150300.3.3.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:squashfs-4.6.1-150300.3.3.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:squashfs-4.6.1-150300.3.3.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:squashfs-4.6.1-150300.3.3.1.x86_64", "SUSE Linux Enterprise Micro 5.1:squashfs-4.6.1-150300.3.3.1.aarch64", "SUSE Linux Enterprise Micro 5.1:squashfs-4.6.1-150300.3.3.1.s390x", "SUSE Linux Enterprise Micro 5.1:squashfs-4.6.1-150300.3.3.1.x86_64", "SUSE Linux Enterprise Micro 5.2:squashfs-4.6.1-150300.3.3.1.aarch64", "SUSE Linux Enterprise Micro 5.2:squashfs-4.6.1-150300.3.3.1.s390x", "SUSE Linux Enterprise Micro 5.2:squashfs-4.6.1-150300.3.3.1.x86_64", "SUSE Linux Enterprise Micro 5.3:squashfs-4.6.1-150300.3.3.1.aarch64", "SUSE Linux Enterprise Micro 5.3:squashfs-4.6.1-150300.3.3.1.s390x", "SUSE Linux Enterprise Micro 5.3:squashfs-4.6.1-150300.3.3.1.x86_64", "SUSE Linux Enterprise Micro 5.4:squashfs-4.6.1-150300.3.3.1.aarch64", "SUSE Linux Enterprise Micro 5.4:squashfs-4.6.1-150300.3.3.1.s390x", "SUSE Linux Enterprise Micro 5.4:squashfs-4.6.1-150300.3.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:squashfs-4.6.1-150300.3.3.1.aarch64", "SUSE Linux Enterprise Micro 5.5:squashfs-4.6.1-150300.3.3.1.s390x", "SUSE Linux Enterprise Micro 5.5:squashfs-4.6.1-150300.3.3.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:squashfs-4.6.1-150300.3.3.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:squashfs-4.6.1-150300.3.3.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:squashfs-4.6.1-150300.3.3.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:squashfs-4.6.1-150300.3.3.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:squashfs-4.6.1-150300.3.3.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:squashfs-4.6.1-150300.3.3.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP5:squashfs-4.6.1-150300.3.3.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP5:squashfs-4.6.1-150300.3.3.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:squashfs-4.6.1-150300.3.3.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:squashfs-4.6.1-150300.3.3.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:squashfs-4.6.1-150300.3.3.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:squashfs-4.6.1-150300.3.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:squashfs-4.6.1-150300.3.3.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:squashfs-4.6.1-150300.3.3.1.x86_64", "SUSE Manager Proxy 4.2:squashfs-4.6.1-150300.3.3.1.x86_64", "SUSE Manager Server 4.2:squashfs-4.6.1-150300.3.3.1.ppc64le", "SUSE Manager Server 4.2:squashfs-4.6.1-150300.3.3.1.s390x", "SUSE Manager Server 4.2:squashfs-4.6.1-150300.3.3.1.x86_64", "openSUSE Leap 15.4:squashfs-4.6.1-150300.3.3.1.aarch64", "openSUSE Leap 15.4:squashfs-4.6.1-150300.3.3.1.ppc64le", "openSUSE Leap 15.4:squashfs-4.6.1-150300.3.3.1.s390x", "openSUSE Leap 15.4:squashfs-4.6.1-150300.3.3.1.x86_64", "openSUSE Leap 15.5:squashfs-4.6.1-150300.3.3.1.aarch64", "openSUSE Leap 15.5:squashfs-4.6.1-150300.3.3.1.ppc64le", "openSUSE Leap 15.5:squashfs-4.6.1-150300.3.3.1.s390x", "openSUSE Leap 15.5:squashfs-4.6.1-150300.3.3.1.x86_64", "openSUSE Leap Micro 5.3:squashfs-4.6.1-150300.3.3.1.aarch64", "openSUSE Leap Micro 5.3:squashfs-4.6.1-150300.3.3.1.x86_64", "openSUSE Leap Micro 5.4:squashfs-4.6.1-150300.3.3.1.aarch64", "openSUSE Leap Micro 5.4:squashfs-4.6.1-150300.3.3.1.s390x", "openSUSE Leap Micro 5.4:squashfs-4.6.1-150300.3.3.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2023-11-27T13:32:32Z", "details": "moderate" } ], "title": "CVE-2021-40153" }, { "cve": "CVE-2021-41072", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2021-41072" } ], "notes": [ { "category": "general", "text": "squashfs_opendir in unsquash-2.c in Squashfs-Tools 4.5 allows Directory Traversal, a different vulnerability than CVE-2021-40153. A squashfs filesystem that has been crafted to include a symbolic link and then contents under the same filename in a filesystem can cause unsquashfs to first create the symbolic link pointing outside the expected directory, and then the subsequent write operation will cause the unsquashfs process to write through the symbolic link elsewhere in the filesystem.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Enterprise Storage 7.1:squashfs-4.6.1-150300.3.3.1.aarch64", "SUSE Enterprise Storage 7.1:squashfs-4.6.1-150300.3.3.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:squashfs-4.6.1-150300.3.3.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:squashfs-4.6.1-150300.3.3.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:squashfs-4.6.1-150300.3.3.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:squashfs-4.6.1-150300.3.3.1.x86_64", "SUSE Linux Enterprise Micro 5.1:squashfs-4.6.1-150300.3.3.1.aarch64", "SUSE Linux Enterprise Micro 5.1:squashfs-4.6.1-150300.3.3.1.s390x", "SUSE Linux Enterprise Micro 5.1:squashfs-4.6.1-150300.3.3.1.x86_64", "SUSE Linux Enterprise Micro 5.2:squashfs-4.6.1-150300.3.3.1.aarch64", "SUSE Linux Enterprise Micro 5.2:squashfs-4.6.1-150300.3.3.1.s390x", "SUSE Linux Enterprise Micro 5.2:squashfs-4.6.1-150300.3.3.1.x86_64", "SUSE Linux Enterprise Micro 5.3:squashfs-4.6.1-150300.3.3.1.aarch64", "SUSE Linux Enterprise Micro 5.3:squashfs-4.6.1-150300.3.3.1.s390x", "SUSE Linux Enterprise Micro 5.3:squashfs-4.6.1-150300.3.3.1.x86_64", "SUSE Linux Enterprise Micro 5.4:squashfs-4.6.1-150300.3.3.1.aarch64", "SUSE Linux Enterprise Micro 5.4:squashfs-4.6.1-150300.3.3.1.s390x", "SUSE Linux Enterprise Micro 5.4:squashfs-4.6.1-150300.3.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:squashfs-4.6.1-150300.3.3.1.aarch64", "SUSE Linux Enterprise Micro 5.5:squashfs-4.6.1-150300.3.3.1.s390x", "SUSE Linux Enterprise Micro 5.5:squashfs-4.6.1-150300.3.3.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:squashfs-4.6.1-150300.3.3.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:squashfs-4.6.1-150300.3.3.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:squashfs-4.6.1-150300.3.3.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:squashfs-4.6.1-150300.3.3.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:squashfs-4.6.1-150300.3.3.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:squashfs-4.6.1-150300.3.3.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP5:squashfs-4.6.1-150300.3.3.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP5:squashfs-4.6.1-150300.3.3.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:squashfs-4.6.1-150300.3.3.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:squashfs-4.6.1-150300.3.3.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:squashfs-4.6.1-150300.3.3.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:squashfs-4.6.1-150300.3.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:squashfs-4.6.1-150300.3.3.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:squashfs-4.6.1-150300.3.3.1.x86_64", "SUSE Manager Proxy 4.2:squashfs-4.6.1-150300.3.3.1.x86_64", "SUSE Manager Server 4.2:squashfs-4.6.1-150300.3.3.1.ppc64le", "SUSE Manager Server 4.2:squashfs-4.6.1-150300.3.3.1.s390x", "SUSE Manager Server 4.2:squashfs-4.6.1-150300.3.3.1.x86_64", "openSUSE Leap 15.4:squashfs-4.6.1-150300.3.3.1.aarch64", "openSUSE Leap 15.4:squashfs-4.6.1-150300.3.3.1.ppc64le", "openSUSE Leap 15.4:squashfs-4.6.1-150300.3.3.1.s390x", "openSUSE Leap 15.4:squashfs-4.6.1-150300.3.3.1.x86_64", "openSUSE Leap 15.5:squashfs-4.6.1-150300.3.3.1.aarch64", "openSUSE Leap 15.5:squashfs-4.6.1-150300.3.3.1.ppc64le", "openSUSE Leap 15.5:squashfs-4.6.1-150300.3.3.1.s390x", "openSUSE Leap 15.5:squashfs-4.6.1-150300.3.3.1.x86_64", "openSUSE Leap Micro 5.3:squashfs-4.6.1-150300.3.3.1.aarch64", "openSUSE Leap Micro 5.3:squashfs-4.6.1-150300.3.3.1.x86_64", "openSUSE Leap Micro 5.4:squashfs-4.6.1-150300.3.3.1.aarch64", "openSUSE Leap Micro 5.4:squashfs-4.6.1-150300.3.3.1.s390x", "openSUSE Leap Micro 5.4:squashfs-4.6.1-150300.3.3.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2021-41072", "url": "https://www.suse.com/security/cve/CVE-2021-41072" }, { "category": "external", "summary": "SUSE Bug 1189936 for CVE-2021-41072", "url": "https://bugzilla.suse.com/1189936" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Enterprise Storage 7.1:squashfs-4.6.1-150300.3.3.1.aarch64", "SUSE Enterprise Storage 7.1:squashfs-4.6.1-150300.3.3.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:squashfs-4.6.1-150300.3.3.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:squashfs-4.6.1-150300.3.3.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:squashfs-4.6.1-150300.3.3.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:squashfs-4.6.1-150300.3.3.1.x86_64", "SUSE Linux Enterprise Micro 5.1:squashfs-4.6.1-150300.3.3.1.aarch64", "SUSE Linux Enterprise Micro 5.1:squashfs-4.6.1-150300.3.3.1.s390x", "SUSE Linux Enterprise Micro 5.1:squashfs-4.6.1-150300.3.3.1.x86_64", "SUSE Linux Enterprise Micro 5.2:squashfs-4.6.1-150300.3.3.1.aarch64", "SUSE Linux Enterprise Micro 5.2:squashfs-4.6.1-150300.3.3.1.s390x", "SUSE Linux Enterprise Micro 5.2:squashfs-4.6.1-150300.3.3.1.x86_64", "SUSE Linux Enterprise Micro 5.3:squashfs-4.6.1-150300.3.3.1.aarch64", "SUSE Linux Enterprise Micro 5.3:squashfs-4.6.1-150300.3.3.1.s390x", "SUSE Linux Enterprise Micro 5.3:squashfs-4.6.1-150300.3.3.1.x86_64", "SUSE Linux Enterprise Micro 5.4:squashfs-4.6.1-150300.3.3.1.aarch64", "SUSE Linux Enterprise Micro 5.4:squashfs-4.6.1-150300.3.3.1.s390x", "SUSE Linux Enterprise Micro 5.4:squashfs-4.6.1-150300.3.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:squashfs-4.6.1-150300.3.3.1.aarch64", "SUSE Linux Enterprise Micro 5.5:squashfs-4.6.1-150300.3.3.1.s390x", "SUSE Linux Enterprise Micro 5.5:squashfs-4.6.1-150300.3.3.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:squashfs-4.6.1-150300.3.3.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:squashfs-4.6.1-150300.3.3.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:squashfs-4.6.1-150300.3.3.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:squashfs-4.6.1-150300.3.3.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:squashfs-4.6.1-150300.3.3.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:squashfs-4.6.1-150300.3.3.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP5:squashfs-4.6.1-150300.3.3.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP5:squashfs-4.6.1-150300.3.3.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:squashfs-4.6.1-150300.3.3.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:squashfs-4.6.1-150300.3.3.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:squashfs-4.6.1-150300.3.3.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:squashfs-4.6.1-150300.3.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:squashfs-4.6.1-150300.3.3.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:squashfs-4.6.1-150300.3.3.1.x86_64", "SUSE Manager Proxy 4.2:squashfs-4.6.1-150300.3.3.1.x86_64", "SUSE Manager Server 4.2:squashfs-4.6.1-150300.3.3.1.ppc64le", "SUSE Manager Server 4.2:squashfs-4.6.1-150300.3.3.1.s390x", "SUSE Manager Server 4.2:squashfs-4.6.1-150300.3.3.1.x86_64", "openSUSE Leap 15.4:squashfs-4.6.1-150300.3.3.1.aarch64", "openSUSE Leap 15.4:squashfs-4.6.1-150300.3.3.1.ppc64le", "openSUSE Leap 15.4:squashfs-4.6.1-150300.3.3.1.s390x", "openSUSE Leap 15.4:squashfs-4.6.1-150300.3.3.1.x86_64", "openSUSE Leap 15.5:squashfs-4.6.1-150300.3.3.1.aarch64", "openSUSE Leap 15.5:squashfs-4.6.1-150300.3.3.1.ppc64le", "openSUSE Leap 15.5:squashfs-4.6.1-150300.3.3.1.s390x", "openSUSE Leap 15.5:squashfs-4.6.1-150300.3.3.1.x86_64", "openSUSE Leap Micro 5.3:squashfs-4.6.1-150300.3.3.1.aarch64", "openSUSE Leap Micro 5.3:squashfs-4.6.1-150300.3.3.1.x86_64", "openSUSE Leap Micro 5.4:squashfs-4.6.1-150300.3.3.1.aarch64", "openSUSE Leap Micro 5.4:squashfs-4.6.1-150300.3.3.1.s390x", "openSUSE Leap Micro 5.4:squashfs-4.6.1-150300.3.3.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.6, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:N", "version": "3.1" }, "products": [ "SUSE Enterprise Storage 7.1:squashfs-4.6.1-150300.3.3.1.aarch64", "SUSE Enterprise Storage 7.1:squashfs-4.6.1-150300.3.3.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:squashfs-4.6.1-150300.3.3.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:squashfs-4.6.1-150300.3.3.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:squashfs-4.6.1-150300.3.3.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:squashfs-4.6.1-150300.3.3.1.x86_64", "SUSE Linux Enterprise Micro 5.1:squashfs-4.6.1-150300.3.3.1.aarch64", "SUSE Linux Enterprise Micro 5.1:squashfs-4.6.1-150300.3.3.1.s390x", "SUSE Linux Enterprise Micro 5.1:squashfs-4.6.1-150300.3.3.1.x86_64", "SUSE Linux Enterprise Micro 5.2:squashfs-4.6.1-150300.3.3.1.aarch64", "SUSE Linux Enterprise Micro 5.2:squashfs-4.6.1-150300.3.3.1.s390x", "SUSE Linux Enterprise Micro 5.2:squashfs-4.6.1-150300.3.3.1.x86_64", "SUSE Linux Enterprise Micro 5.3:squashfs-4.6.1-150300.3.3.1.aarch64", "SUSE Linux Enterprise Micro 5.3:squashfs-4.6.1-150300.3.3.1.s390x", "SUSE Linux Enterprise Micro 5.3:squashfs-4.6.1-150300.3.3.1.x86_64", "SUSE Linux Enterprise Micro 5.4:squashfs-4.6.1-150300.3.3.1.aarch64", "SUSE Linux Enterprise Micro 5.4:squashfs-4.6.1-150300.3.3.1.s390x", "SUSE Linux Enterprise Micro 5.4:squashfs-4.6.1-150300.3.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:squashfs-4.6.1-150300.3.3.1.aarch64", "SUSE Linux Enterprise Micro 5.5:squashfs-4.6.1-150300.3.3.1.s390x", "SUSE Linux Enterprise Micro 5.5:squashfs-4.6.1-150300.3.3.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:squashfs-4.6.1-150300.3.3.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:squashfs-4.6.1-150300.3.3.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:squashfs-4.6.1-150300.3.3.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:squashfs-4.6.1-150300.3.3.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:squashfs-4.6.1-150300.3.3.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:squashfs-4.6.1-150300.3.3.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP5:squashfs-4.6.1-150300.3.3.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP5:squashfs-4.6.1-150300.3.3.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:squashfs-4.6.1-150300.3.3.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:squashfs-4.6.1-150300.3.3.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:squashfs-4.6.1-150300.3.3.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:squashfs-4.6.1-150300.3.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:squashfs-4.6.1-150300.3.3.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:squashfs-4.6.1-150300.3.3.1.x86_64", "SUSE Manager Proxy 4.2:squashfs-4.6.1-150300.3.3.1.x86_64", "SUSE Manager Server 4.2:squashfs-4.6.1-150300.3.3.1.ppc64le", "SUSE Manager Server 4.2:squashfs-4.6.1-150300.3.3.1.s390x", "SUSE Manager Server 4.2:squashfs-4.6.1-150300.3.3.1.x86_64", "openSUSE Leap 15.4:squashfs-4.6.1-150300.3.3.1.aarch64", "openSUSE Leap 15.4:squashfs-4.6.1-150300.3.3.1.ppc64le", "openSUSE Leap 15.4:squashfs-4.6.1-150300.3.3.1.s390x", "openSUSE Leap 15.4:squashfs-4.6.1-150300.3.3.1.x86_64", "openSUSE Leap 15.5:squashfs-4.6.1-150300.3.3.1.aarch64", "openSUSE Leap 15.5:squashfs-4.6.1-150300.3.3.1.ppc64le", "openSUSE Leap 15.5:squashfs-4.6.1-150300.3.3.1.s390x", "openSUSE Leap 15.5:squashfs-4.6.1-150300.3.3.1.x86_64", "openSUSE Leap Micro 5.3:squashfs-4.6.1-150300.3.3.1.aarch64", "openSUSE Leap Micro 5.3:squashfs-4.6.1-150300.3.3.1.x86_64", "openSUSE Leap Micro 5.4:squashfs-4.6.1-150300.3.3.1.aarch64", "openSUSE Leap Micro 5.4:squashfs-4.6.1-150300.3.3.1.s390x", "openSUSE Leap Micro 5.4:squashfs-4.6.1-150300.3.3.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2023-11-27T13:32:32Z", "details": "moderate" } ], "title": "CVE-2021-41072" } ] }
suse-su-2023:4424-1
Vulnerability from csaf_suse
Published
2023-11-13 12:12
Modified
2023-11-13 12:12
Summary
Security update for squashfs
Notes
Title of the patch
Security update for squashfs
Description of the patch
This update for squashfs fixes the following issues:
- CVE-2015-4645,CVE-2015-4646: Multiple buffer overflows fixed in squashfs-tools (bsc#935380)
- CVE-2021-40153: Fixed an issue where an attacker might have been
able to write a file outside of destination (bsc#1189936)
- CVE-2021-41072: Fixed an issue where an attacker might have been
able to write a file outside the destination directory via a
symlink (bsc#1190531).
Patchnames
SUSE-2023-4424,SUSE-SLE-SERVER-12-SP5-2023-4424
Terms of use
CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
{ "document": { "aggregate_severity": { "namespace": "https://www.suse.com/support/security/rating/", "text": "important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright 2024 SUSE LLC. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Security update for squashfs", "title": "Title of the patch" }, { "category": "description", "text": "This update for squashfs fixes the following issues:\n\n- CVE-2015-4645,CVE-2015-4646: Multiple buffer overflows fixed in squashfs-tools (bsc#935380)\n- CVE-2021-40153: Fixed an issue where an attacker might have been\n able to write a file outside of destination (bsc#1189936)\n- CVE-2021-41072: Fixed an issue where an attacker might have been\n able to write a file outside the destination directory via a\n symlink (bsc#1190531).\n", "title": "Description of the patch" }, { "category": "details", "text": "SUSE-2023-4424,SUSE-SLE-SERVER-12-SP5-2023-4424", "title": "Patchnames" }, { "category": "legal_disclaimer", "text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", "title": "Terms of use" } ], "publisher": { "category": "vendor", "contact_details": "https://www.suse.com/support/security/contact/", "name": "SUSE Product Security Team", "namespace": "https://www.suse.com/" }, "references": [ { "category": "external", "summary": "SUSE ratings", "url": "https://www.suse.com/support/security/rating/" }, { "category": "self", "summary": "URL of this CSAF notice", "url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2023_4424-1.json" }, { "category": "self", "summary": "URL for SUSE-SU-2023:4424-1", "url": "https://www.suse.com/support/update/announcement/2023/suse-su-20234424-1/" }, { "category": "self", "summary": "E-Mail link for SUSE-SU-2023:4424-1", "url": "https://lists.suse.com/pipermail/sle-security-updates/2023-November/017023.html" }, { "category": "self", "summary": "SUSE Bug 1133284", "url": "https://bugzilla.suse.com/1133284" }, { "category": "self", "summary": "SUSE Bug 1160294", "url": "https://bugzilla.suse.com/1160294" }, { "category": "self", "summary": "SUSE Bug 1189936", "url": "https://bugzilla.suse.com/1189936" }, { "category": "self", "summary": "SUSE Bug 1190531", "url": "https://bugzilla.suse.com/1190531" }, { "category": "self", "summary": "SUSE Bug 935380", "url": "https://bugzilla.suse.com/935380" }, { "category": "self", "summary": "SUSE CVE CVE-2015-4645 page", "url": "https://www.suse.com/security/cve/CVE-2015-4645/" }, { "category": "self", "summary": "SUSE CVE CVE-2015-4646 page", "url": "https://www.suse.com/security/cve/CVE-2015-4646/" }, { "category": "self", "summary": "SUSE CVE CVE-2021-40153 page", "url": "https://www.suse.com/security/cve/CVE-2021-40153/" }, { "category": "self", "summary": "SUSE CVE CVE-2021-41072 page", "url": "https://www.suse.com/security/cve/CVE-2021-41072/" } ], "title": "Security update for squashfs", "tracking": { "current_release_date": "2023-11-13T12:12:08Z", "generator": { "date": "2023-11-13T12:12:08Z", "engine": { "name": "cve-database.git:bin/generate-csaf.pl", "version": "1" } }, "id": "SUSE-SU-2023:4424-1", "initial_release_date": "2023-11-13T12:12:08Z", "revision_history": [ { "date": "2023-11-13T12:12:08Z", "number": "1", "summary": "Current version" } ], "status": "final", "version": "1" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version", "name": "squashfs-4.6.1-8.3.2.aarch64", "product": { "name": "squashfs-4.6.1-8.3.2.aarch64", "product_id": "squashfs-4.6.1-8.3.2.aarch64" } } ], "category": "architecture", "name": "aarch64" }, { "branches": [ { "category": "product_version", "name": "squashfs-4.6.1-8.3.2.i586", "product": { "name": "squashfs-4.6.1-8.3.2.i586", "product_id": "squashfs-4.6.1-8.3.2.i586" } } ], "category": "architecture", "name": "i586" }, { "branches": [ { "category": "product_version", "name": "squashfs-4.6.1-8.3.2.ppc64le", "product": { "name": "squashfs-4.6.1-8.3.2.ppc64le", "product_id": "squashfs-4.6.1-8.3.2.ppc64le" } } ], "category": "architecture", "name": "ppc64le" }, { "branches": [ { "category": "product_version", "name": "squashfs-4.6.1-8.3.2.s390x", "product": { "name": "squashfs-4.6.1-8.3.2.s390x", "product_id": "squashfs-4.6.1-8.3.2.s390x" } } ], "category": "architecture", "name": "s390x" }, { "branches": [ { "category": "product_version", "name": "squashfs-4.6.1-8.3.2.x86_64", "product": { "name": "squashfs-4.6.1-8.3.2.x86_64", "product_id": "squashfs-4.6.1-8.3.2.x86_64" } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_name", "name": "SUSE Linux Enterprise Server 12 SP5", "product": { "name": "SUSE Linux Enterprise Server 12 SP5", "product_id": "SUSE Linux Enterprise Server 12 SP5", "product_identification_helper": { "cpe": "cpe:/o:suse:sles:12:sp5" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Server for SAP Applications 12 SP5", "product": { "name": "SUSE Linux Enterprise Server for SAP Applications 12 SP5", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP5", "product_identification_helper": { "cpe": "cpe:/o:suse:sles_sap:12:sp5" } } } ], "category": "product_family", "name": "SUSE Linux Enterprise" } ], "category": "vendor", "name": "SUSE" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "squashfs-4.6.1-8.3.2.aarch64 as component of SUSE Linux Enterprise Server 12 SP5", "product_id": "SUSE Linux Enterprise Server 12 SP5:squashfs-4.6.1-8.3.2.aarch64" }, "product_reference": "squashfs-4.6.1-8.3.2.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "squashfs-4.6.1-8.3.2.ppc64le as component of SUSE Linux Enterprise Server 12 SP5", "product_id": "SUSE Linux Enterprise Server 12 SP5:squashfs-4.6.1-8.3.2.ppc64le" }, "product_reference": "squashfs-4.6.1-8.3.2.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "squashfs-4.6.1-8.3.2.s390x as component of SUSE Linux Enterprise Server 12 SP5", "product_id": "SUSE Linux Enterprise Server 12 SP5:squashfs-4.6.1-8.3.2.s390x" }, "product_reference": "squashfs-4.6.1-8.3.2.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "squashfs-4.6.1-8.3.2.x86_64 as component of SUSE Linux Enterprise Server 12 SP5", "product_id": "SUSE Linux Enterprise Server 12 SP5:squashfs-4.6.1-8.3.2.x86_64" }, "product_reference": "squashfs-4.6.1-8.3.2.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "squashfs-4.6.1-8.3.2.aarch64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP5:squashfs-4.6.1-8.3.2.aarch64" }, "product_reference": "squashfs-4.6.1-8.3.2.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "squashfs-4.6.1-8.3.2.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP5:squashfs-4.6.1-8.3.2.ppc64le" }, "product_reference": "squashfs-4.6.1-8.3.2.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "squashfs-4.6.1-8.3.2.s390x as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP5:squashfs-4.6.1-8.3.2.s390x" }, "product_reference": "squashfs-4.6.1-8.3.2.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "squashfs-4.6.1-8.3.2.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP5:squashfs-4.6.1-8.3.2.x86_64" }, "product_reference": "squashfs-4.6.1-8.3.2.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP5" } ] }, "vulnerabilities": [ { "cve": "CVE-2015-4645", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2015-4645" } ], "notes": [ { "category": "general", "text": "Integer overflow in the read_fragment_table_4 function in unsquash-4.c in Squashfs and sasquatch allows remote attackers to cause a denial of service (application crash) via a crafted input, which triggers a stack-based buffer overflow.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 12 SP5:squashfs-4.6.1-8.3.2.aarch64", "SUSE Linux Enterprise Server 12 SP5:squashfs-4.6.1-8.3.2.ppc64le", "SUSE Linux Enterprise Server 12 SP5:squashfs-4.6.1-8.3.2.s390x", "SUSE Linux Enterprise Server 12 SP5:squashfs-4.6.1-8.3.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:squashfs-4.6.1-8.3.2.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:squashfs-4.6.1-8.3.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:squashfs-4.6.1-8.3.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:squashfs-4.6.1-8.3.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2015-4645", "url": "https://www.suse.com/security/cve/CVE-2015-4645" }, { "category": "external", "summary": "SUSE Bug 935380 for CVE-2015-4645", "url": "https://bugzilla.suse.com/935380" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 12 SP5:squashfs-4.6.1-8.3.2.aarch64", "SUSE Linux Enterprise Server 12 SP5:squashfs-4.6.1-8.3.2.ppc64le", "SUSE Linux Enterprise Server 12 SP5:squashfs-4.6.1-8.3.2.s390x", "SUSE Linux Enterprise Server 12 SP5:squashfs-4.6.1-8.3.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:squashfs-4.6.1-8.3.2.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:squashfs-4.6.1-8.3.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:squashfs-4.6.1-8.3.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:squashfs-4.6.1-8.3.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Server 12 SP5:squashfs-4.6.1-8.3.2.aarch64", "SUSE Linux Enterprise Server 12 SP5:squashfs-4.6.1-8.3.2.ppc64le", "SUSE Linux Enterprise Server 12 SP5:squashfs-4.6.1-8.3.2.s390x", "SUSE Linux Enterprise Server 12 SP5:squashfs-4.6.1-8.3.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:squashfs-4.6.1-8.3.2.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:squashfs-4.6.1-8.3.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:squashfs-4.6.1-8.3.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:squashfs-4.6.1-8.3.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2023-11-13T12:12:08Z", "details": "moderate" } ], "title": "CVE-2015-4645" }, { "cve": "CVE-2015-4646", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2015-4646" } ], "notes": [ { "category": "general", "text": "(1) unsquash-1.c, (2) unsquash-2.c, (3) unsquash-3.c, and (4) unsquash-4.c in Squashfs and sasquatch allow remote attackers to cause a denial of service (application crash) via a crafted input.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 12 SP5:squashfs-4.6.1-8.3.2.aarch64", "SUSE Linux Enterprise Server 12 SP5:squashfs-4.6.1-8.3.2.ppc64le", "SUSE Linux Enterprise Server 12 SP5:squashfs-4.6.1-8.3.2.s390x", "SUSE Linux Enterprise Server 12 SP5:squashfs-4.6.1-8.3.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:squashfs-4.6.1-8.3.2.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:squashfs-4.6.1-8.3.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:squashfs-4.6.1-8.3.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:squashfs-4.6.1-8.3.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2015-4646", "url": "https://www.suse.com/security/cve/CVE-2015-4646" }, { "category": "external", "summary": "SUSE Bug 935380 for CVE-2015-4646", "url": "https://bugzilla.suse.com/935380" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 12 SP5:squashfs-4.6.1-8.3.2.aarch64", "SUSE Linux Enterprise Server 12 SP5:squashfs-4.6.1-8.3.2.ppc64le", "SUSE Linux Enterprise Server 12 SP5:squashfs-4.6.1-8.3.2.s390x", "SUSE Linux Enterprise Server 12 SP5:squashfs-4.6.1-8.3.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:squashfs-4.6.1-8.3.2.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:squashfs-4.6.1-8.3.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:squashfs-4.6.1-8.3.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:squashfs-4.6.1-8.3.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Server 12 SP5:squashfs-4.6.1-8.3.2.aarch64", "SUSE Linux Enterprise Server 12 SP5:squashfs-4.6.1-8.3.2.ppc64le", "SUSE Linux Enterprise Server 12 SP5:squashfs-4.6.1-8.3.2.s390x", "SUSE Linux Enterprise Server 12 SP5:squashfs-4.6.1-8.3.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:squashfs-4.6.1-8.3.2.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:squashfs-4.6.1-8.3.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:squashfs-4.6.1-8.3.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:squashfs-4.6.1-8.3.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2023-11-13T12:12:08Z", "details": "moderate" } ], "title": "CVE-2015-4646" }, { "cve": "CVE-2021-40153", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2021-40153" } ], "notes": [ { "category": "general", "text": "squashfs_opendir in unsquash-1.c in Squashfs-Tools 4.5 stores the filename in the directory entry; this is then used by unsquashfs to create the new file during the unsquash. The filename is not validated for traversal outside of the destination directory, and thus allows writing to locations outside of the destination.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 12 SP5:squashfs-4.6.1-8.3.2.aarch64", "SUSE Linux Enterprise Server 12 SP5:squashfs-4.6.1-8.3.2.ppc64le", "SUSE Linux Enterprise Server 12 SP5:squashfs-4.6.1-8.3.2.s390x", "SUSE Linux Enterprise Server 12 SP5:squashfs-4.6.1-8.3.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:squashfs-4.6.1-8.3.2.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:squashfs-4.6.1-8.3.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:squashfs-4.6.1-8.3.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:squashfs-4.6.1-8.3.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2021-40153", "url": "https://www.suse.com/security/cve/CVE-2021-40153" }, { "category": "external", "summary": "SUSE Bug 1189936 for CVE-2021-40153", "url": "https://bugzilla.suse.com/1189936" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 12 SP5:squashfs-4.6.1-8.3.2.aarch64", "SUSE Linux Enterprise Server 12 SP5:squashfs-4.6.1-8.3.2.ppc64le", "SUSE Linux Enterprise Server 12 SP5:squashfs-4.6.1-8.3.2.s390x", "SUSE Linux Enterprise Server 12 SP5:squashfs-4.6.1-8.3.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:squashfs-4.6.1-8.3.2.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:squashfs-4.6.1-8.3.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:squashfs-4.6.1-8.3.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:squashfs-4.6.1-8.3.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.6, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:N", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Server 12 SP5:squashfs-4.6.1-8.3.2.aarch64", "SUSE Linux Enterprise Server 12 SP5:squashfs-4.6.1-8.3.2.ppc64le", "SUSE Linux Enterprise Server 12 SP5:squashfs-4.6.1-8.3.2.s390x", "SUSE Linux Enterprise Server 12 SP5:squashfs-4.6.1-8.3.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:squashfs-4.6.1-8.3.2.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:squashfs-4.6.1-8.3.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:squashfs-4.6.1-8.3.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:squashfs-4.6.1-8.3.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2023-11-13T12:12:08Z", "details": "moderate" } ], "title": "CVE-2021-40153" }, { "cve": "CVE-2021-41072", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2021-41072" } ], "notes": [ { "category": "general", "text": "squashfs_opendir in unsquash-2.c in Squashfs-Tools 4.5 allows Directory Traversal, a different vulnerability than CVE-2021-40153. A squashfs filesystem that has been crafted to include a symbolic link and then contents under the same filename in a filesystem can cause unsquashfs to first create the symbolic link pointing outside the expected directory, and then the subsequent write operation will cause the unsquashfs process to write through the symbolic link elsewhere in the filesystem.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 12 SP5:squashfs-4.6.1-8.3.2.aarch64", "SUSE Linux Enterprise Server 12 SP5:squashfs-4.6.1-8.3.2.ppc64le", "SUSE Linux Enterprise Server 12 SP5:squashfs-4.6.1-8.3.2.s390x", "SUSE Linux Enterprise Server 12 SP5:squashfs-4.6.1-8.3.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:squashfs-4.6.1-8.3.2.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:squashfs-4.6.1-8.3.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:squashfs-4.6.1-8.3.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:squashfs-4.6.1-8.3.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2021-41072", "url": "https://www.suse.com/security/cve/CVE-2021-41072" }, { "category": "external", "summary": "SUSE Bug 1189936 for CVE-2021-41072", "url": "https://bugzilla.suse.com/1189936" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 12 SP5:squashfs-4.6.1-8.3.2.aarch64", "SUSE Linux Enterprise Server 12 SP5:squashfs-4.6.1-8.3.2.ppc64le", "SUSE Linux Enterprise Server 12 SP5:squashfs-4.6.1-8.3.2.s390x", "SUSE Linux Enterprise Server 12 SP5:squashfs-4.6.1-8.3.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:squashfs-4.6.1-8.3.2.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:squashfs-4.6.1-8.3.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:squashfs-4.6.1-8.3.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:squashfs-4.6.1-8.3.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.6, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:N", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Server 12 SP5:squashfs-4.6.1-8.3.2.aarch64", "SUSE Linux Enterprise Server 12 SP5:squashfs-4.6.1-8.3.2.ppc64le", "SUSE Linux Enterprise Server 12 SP5:squashfs-4.6.1-8.3.2.s390x", "SUSE Linux Enterprise Server 12 SP5:squashfs-4.6.1-8.3.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:squashfs-4.6.1-8.3.2.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:squashfs-4.6.1-8.3.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:squashfs-4.6.1-8.3.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:squashfs-4.6.1-8.3.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2023-11-13T12:12:08Z", "details": "moderate" } ], "title": "CVE-2021-41072" } ] }
suse-su-2024:2463-1
Vulnerability from csaf_suse
Published
2024-07-12 13:55
Modified
2024-07-12 13:55
Summary
Security update for squashfs
Notes
Title of the patch
Security update for squashfs
Description of the patch
This update for squashfs fixes the following issues:
- CVE-2015-4645,CVE-2015-4646: Multiple buffer overflows fixed in squashfs-tools (bsc#935380)
- CVE-2021-40153: Fixed an issue where an attacker might have been able to write a file outside of destination (bsc#1189936)
- CVE-2021-41072: Fixed an issue where an attacker might have been
able to write a file outside the destination directory via a
symlink (bsc#1190531).
update to 4.6.1:
* Race condition which can cause corruption of the 'fragment
table' fixed. This is a regression introduced in August 2022,
and it has been seen when tailend packing is used (-tailends option).
* Fix build failure when the tools are being built without
extended attribute (XATTRs) support.
* Fix XATTR error message when an unrecognised prefix is
found
* Fix incorrect free of pointer when an unrecognised XATTR
prefix is found.
* Major improvements in extended attribute handling,
pseudo file handling, and miscellaneous new options and
improvements
* Extended attribute handling improved in Mksquashfs and
Sqfstar
* New Pseudo file xattr definition to add extended
attributes to files.
* New xattrs-add Action to add extended attributes to files
* Extended attribute handling improved in Unsquashfs
* Other major improvements
* Unsquashfs can now output Pseudo files to standard out.
* Mksquashfs can now input Pseudo files from standard in.
* Squashfs filesystems can now be converted (different
block size compression etc) without unpacking to an
intermediate filesystem or mounting, by piping the output of
Unsquashfs to Mksquashfs.
* Pseudo files are now supported by Sqfstar.
* 'Non-anchored' excludes are now supported by Unsquashfs.
update to 4.5.1 (bsc#1190531, CVE-2021-41072):
* This release adds Manpages for Mksquashfs(1), Unsquashfs(1),
Sqfstar(1) and Sqfscat(1).
* The -help text output from the utilities has been improved
and extended as well (but the Manpages are now more
comprehensive).
* CVE-2021-41072 which is a writing outside of destination
exploit, has been fixed.
* The number of hard-links in the filesystem is now also
displayed by Mksquashfs in the output summary.
* The number of hard-links written by Unsquashfs is now
also displayed in the output summary.
* Unsquashfs will now write to a pre-existing destination
directory, rather than aborting.
* Unsquashfs now allows '.' to used as the destination, to
extract to the current directory.
* The Unsquashfs progress bar now tracks empty files and
hardlinks, in addition to data blocks.
* -no-hardlinks option has been implemented for Sqfstar.
* More sanity checking for 'corrupted' filesystems, including
checks for multiply linked directories and directory loops.
* Options that may cause filesystems to be unmountable have
been moved into a new 'experts' category in the Mksquashfs
help text (and Manpage).
* Maximum cpiostyle filename limited to PATH_MAX. This
prevents attempts to overflow the stack, or cause system
calls to fail with a too long pathname.
* Don't always use 'max open file limit' when calculating
length of queues, as a very large file limit can cause
Unsquashfs to abort. Instead use the smaller of max open
file limit and cache size.
* Fix Mksquashfs silently ignoring Pseudo file definitions
when appending.
* Don't abort if no XATTR support has been built in, and
there's XATTRs in the filesystem. This is a regression
introduced in 2019 in Version 4.4.
* Fix duplicate check when the last file block is sparse.
update to 4.5:
* Mksquashfs now supports 'Actions'.
* New sqfstar command which will create a Squashfs image from a tar archive.
* Tar style handling of source pathnames in Mksquashfs.
* Cpio style handling of source pathnames in Mksquashfs.
* New option to throttle the amount of CPU and I/O.
* Mksquashfs now allows no source directory to be specified.
* New Pseudo file 'R' definition which allows a Regular file
o be created with data stored within the Pseudo file.
* Symbolic links are now followed in extract files
* Unsquashfs now supports 'exclude' files.
* Max depth traversal option added.
* Unsquashfs can now output a 'Pseudo file' representing the
input Squashfs filesystem.
* New -one-file-system option in Mksquashfs.
* New -no-hardlinks option in Mksquashfs.
* Exit code in Unsquashfs changed to distinguish between
non-fatal errors (exit 2), and fatal errors (exit 1).
* Xattr id count added in Unsquashfs '-stat' output.
* Unsquashfs 'write outside directory' exploit fixed.
* Error handling in Unsquashfs writer thread fixed.
* Fix failure to truncate destination if appending aborted.
* Prevent Mksquashfs reading the destination file.
Patchnames
SUSE-2024-2463,SUSE-SLE-Micro-5.5-2024-2463
Terms of use
CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
{ "document": { "aggregate_severity": { "namespace": "https://www.suse.com/support/security/rating/", "text": "important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright 2024 SUSE LLC. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Security update for squashfs", "title": "Title of the patch" }, { "category": "description", "text": "This update for squashfs fixes the following issues:\n\n- CVE-2015-4645,CVE-2015-4646: Multiple buffer overflows fixed in squashfs-tools (bsc#935380)\n- CVE-2021-40153: Fixed an issue where an attacker might have been able to write a file outside of destination (bsc#1189936)\n- CVE-2021-41072: Fixed an issue where an attacker might have been\n able to write a file outside the destination directory via a\n symlink (bsc#1190531).\n\nupdate to 4.6.1:\n\n * Race condition which can cause corruption of the \u0027fragment\n table\u0027 fixed. This is a regression introduced in August 2022,\n and it has been seen when tailend packing is used (-tailends option).\n * Fix build failure when the tools are being built without\n extended attribute (XATTRs) support.\n * Fix XATTR error message when an unrecognised prefix is\n found\n * Fix incorrect free of pointer when an unrecognised XATTR\n prefix is found.\n * Major improvements in extended attribute handling,\n pseudo file handling, and miscellaneous new options and\n improvements\n * Extended attribute handling improved in Mksquashfs and\n Sqfstar\n * New Pseudo file xattr definition to add extended\n attributes to files.\n * New xattrs-add Action to add extended attributes to files\n * Extended attribute handling improved in Unsquashfs\n * Other major improvements\n * Unsquashfs can now output Pseudo files to standard out.\n * Mksquashfs can now input Pseudo files from standard in.\n * Squashfs filesystems can now be converted (different\n block size compression etc) without unpacking to an\n intermediate filesystem or mounting, by piping the output of\n Unsquashfs to Mksquashfs.\n * Pseudo files are now supported by Sqfstar.\n * \u0027Non-anchored\u0027 excludes are now supported by Unsquashfs.\n\nupdate to 4.5.1 (bsc#1190531, CVE-2021-41072):\n\n * This release adds Manpages for Mksquashfs(1), Unsquashfs(1),\n Sqfstar(1) and Sqfscat(1).\n * The -help text output from the utilities has been improved\n and extended as well (but the Manpages are now more\n comprehensive).\n * CVE-2021-41072 which is a writing outside of destination\n exploit, has been fixed.\n * The number of hard-links in the filesystem is now also\n displayed by Mksquashfs in the output summary.\n * The number of hard-links written by Unsquashfs is now\n also displayed in the output summary.\n * Unsquashfs will now write to a pre-existing destination\n directory, rather than aborting.\n * Unsquashfs now allows \u0027.\u0027 to used as the destination, to\n extract to the current directory.\n * The Unsquashfs progress bar now tracks empty files and\n hardlinks, in addition to data blocks.\n * -no-hardlinks option has been implemented for Sqfstar.\n * More sanity checking for \u0027corrupted\u0027 filesystems, including\n checks for multiply linked directories and directory loops.\n * Options that may cause filesystems to be unmountable have\n been moved into a new \u0027experts\u0027 category in the Mksquashfs\n help text (and Manpage).\n * Maximum cpiostyle filename limited to PATH_MAX. This\n prevents attempts to overflow the stack, or cause system\n calls to fail with a too long pathname.\n * Don\u0027t always use \u0027max open file limit\u0027 when calculating\n length of queues, as a very large file limit can cause\n Unsquashfs to abort. Instead use the smaller of max open\n file limit and cache size.\n * Fix Mksquashfs silently ignoring Pseudo file definitions\n when appending.\n * Don\u0027t abort if no XATTR support has been built in, and\n there\u0027s XATTRs in the filesystem. This is a regression\n introduced in 2019 in Version 4.4.\n * Fix duplicate check when the last file block is sparse.\n\nupdate to 4.5:\n\n * Mksquashfs now supports \u0027Actions\u0027.\n * New sqfstar command which will create a Squashfs image from a tar archive.\n * Tar style handling of source pathnames in Mksquashfs.\n * Cpio style handling of source pathnames in Mksquashfs.\n * New option to throttle the amount of CPU and I/O.\n * Mksquashfs now allows no source directory to be specified.\n * New Pseudo file \u0027R\u0027 definition which allows a Regular file\n o be created with data stored within the Pseudo file.\n * Symbolic links are now followed in extract files\n * Unsquashfs now supports \u0027exclude\u0027 files.\n * Max depth traversal option added.\n * Unsquashfs can now output a \u0027Pseudo file\u0027 representing the\n input Squashfs filesystem.\n * New -one-file-system option in Mksquashfs.\n * New -no-hardlinks option in Mksquashfs.\n * Exit code in Unsquashfs changed to distinguish between\n non-fatal errors (exit 2), and fatal errors (exit 1).\n * Xattr id count added in Unsquashfs \u0027-stat\u0027 output.\n * Unsquashfs \u0027write outside directory\u0027 exploit fixed.\n * Error handling in Unsquashfs writer thread fixed.\n * Fix failure to truncate destination if appending aborted.\n * Prevent Mksquashfs reading the destination file. \n", "title": "Description of the patch" }, { "category": "details", "text": "SUSE-2024-2463,SUSE-SLE-Micro-5.5-2024-2463", "title": "Patchnames" }, { "category": "legal_disclaimer", "text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", "title": "Terms of use" } ], "publisher": { "category": "vendor", "contact_details": "https://www.suse.com/support/security/contact/", "name": "SUSE Product Security Team", "namespace": "https://www.suse.com/" }, "references": [ { "category": "external", "summary": "SUSE ratings", "url": "https://www.suse.com/support/security/rating/" }, { "category": "self", "summary": "URL of this CSAF notice", "url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2024_2463-1.json" }, { "category": "self", "summary": "URL for SUSE-SU-2024:2463-1", "url": "https://www.suse.com/support/update/announcement/2024/suse-su-20242463-1/" }, { "category": "self", "summary": "E-Mail link for SUSE-SU-2024:2463-1", "url": "https://lists.suse.com/pipermail/sle-updates/2024-July/035988.html" }, { "category": "self", "summary": "SUSE Bug 1189936", "url": "https://bugzilla.suse.com/1189936" }, { "category": "self", "summary": "SUSE Bug 1190531", "url": "https://bugzilla.suse.com/1190531" }, { "category": "self", "summary": "SUSE Bug 935380", "url": "https://bugzilla.suse.com/935380" }, { "category": "self", "summary": "SUSE CVE CVE-2015-4645 page", "url": "https://www.suse.com/security/cve/CVE-2015-4645/" }, { "category": "self", "summary": "SUSE CVE CVE-2015-4646 page", "url": "https://www.suse.com/security/cve/CVE-2015-4646/" }, { "category": "self", "summary": "SUSE CVE CVE-2021-40153 page", "url": "https://www.suse.com/security/cve/CVE-2021-40153/" }, { "category": "self", "summary": "SUSE CVE CVE-2021-41072 page", "url": "https://www.suse.com/security/cve/CVE-2021-41072/" } ], "title": "Security update for squashfs", "tracking": { "current_release_date": "2024-07-12T13:55:05Z", "generator": { "date": "2024-07-12T13:55:05Z", "engine": { "name": "cve-database.git:bin/generate-csaf.pl", "version": "1" } }, "id": "SUSE-SU-2024:2463-1", "initial_release_date": "2024-07-12T13:55:05Z", "revision_history": [ { "date": "2024-07-12T13:55:05Z", "number": "1", "summary": "Current version" } ], "status": "final", "version": "1" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version", "name": "squashfs-4.6.1-150300.3.3.1.ppc64le", "product": { "name": "squashfs-4.6.1-150300.3.3.1.ppc64le", "product_id": "squashfs-4.6.1-150300.3.3.1.ppc64le" } } ], "category": "architecture", "name": "ppc64le" }, { "branches": [ { "category": "product_name", "name": "SUSE Linux Enterprise Micro 5.5", "product": { "name": "SUSE Linux Enterprise Micro 5.5", "product_id": "SUSE Linux Enterprise Micro 5.5", "product_identification_helper": { "cpe": "cpe:/o:suse:sle-micro:5.5" } } } ], "category": "product_family", "name": "SUSE Linux Enterprise" } ], "category": "vendor", "name": "SUSE" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "squashfs-4.6.1-150300.3.3.1.ppc64le as component of SUSE Linux Enterprise Micro 5.5", "product_id": "SUSE Linux Enterprise Micro 5.5:squashfs-4.6.1-150300.3.3.1.ppc64le" }, "product_reference": "squashfs-4.6.1-150300.3.3.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Micro 5.5" } ] }, "vulnerabilities": [ { "cve": "CVE-2015-4645", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2015-4645" } ], "notes": [ { "category": "general", "text": "Integer overflow in the read_fragment_table_4 function in unsquash-4.c in Squashfs and sasquatch allows remote attackers to cause a denial of service (application crash) via a crafted input, which triggers a stack-based buffer overflow.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Micro 5.5:squashfs-4.6.1-150300.3.3.1.ppc64le" ] }, "references": [ { "category": "external", "summary": "CVE-2015-4645", "url": "https://www.suse.com/security/cve/CVE-2015-4645" }, { "category": "external", "summary": "SUSE Bug 935380 for CVE-2015-4645", "url": "https://bugzilla.suse.com/935380" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Micro 5.5:squashfs-4.6.1-150300.3.3.1.ppc64le" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Micro 5.5:squashfs-4.6.1-150300.3.3.1.ppc64le" ] } ], "threats": [ { "category": "impact", "date": "2024-07-12T13:55:05Z", "details": "moderate" } ], "title": "CVE-2015-4645" }, { "cve": "CVE-2015-4646", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2015-4646" } ], "notes": [ { "category": "general", "text": "(1) unsquash-1.c, (2) unsquash-2.c, (3) unsquash-3.c, and (4) unsquash-4.c in Squashfs and sasquatch allow remote attackers to cause a denial of service (application crash) via a crafted input.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Micro 5.5:squashfs-4.6.1-150300.3.3.1.ppc64le" ] }, "references": [ { "category": "external", "summary": "CVE-2015-4646", "url": "https://www.suse.com/security/cve/CVE-2015-4646" }, { "category": "external", "summary": "SUSE Bug 935380 for CVE-2015-4646", "url": "https://bugzilla.suse.com/935380" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Micro 5.5:squashfs-4.6.1-150300.3.3.1.ppc64le" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Micro 5.5:squashfs-4.6.1-150300.3.3.1.ppc64le" ] } ], "threats": [ { "category": "impact", "date": "2024-07-12T13:55:05Z", "details": "moderate" } ], "title": "CVE-2015-4646" }, { "cve": "CVE-2021-40153", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2021-40153" } ], "notes": [ { "category": "general", "text": "squashfs_opendir in unsquash-1.c in Squashfs-Tools 4.5 stores the filename in the directory entry; this is then used by unsquashfs to create the new file during the unsquash. The filename is not validated for traversal outside of the destination directory, and thus allows writing to locations outside of the destination.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Micro 5.5:squashfs-4.6.1-150300.3.3.1.ppc64le" ] }, "references": [ { "category": "external", "summary": "CVE-2021-40153", "url": "https://www.suse.com/security/cve/CVE-2021-40153" }, { "category": "external", "summary": "SUSE Bug 1189936 for CVE-2021-40153", "url": "https://bugzilla.suse.com/1189936" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Micro 5.5:squashfs-4.6.1-150300.3.3.1.ppc64le" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.6, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:N", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Micro 5.5:squashfs-4.6.1-150300.3.3.1.ppc64le" ] } ], "threats": [ { "category": "impact", "date": "2024-07-12T13:55:05Z", "details": "moderate" } ], "title": "CVE-2021-40153" }, { "cve": "CVE-2021-41072", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2021-41072" } ], "notes": [ { "category": "general", "text": "squashfs_opendir in unsquash-2.c in Squashfs-Tools 4.5 allows Directory Traversal, a different vulnerability than CVE-2021-40153. A squashfs filesystem that has been crafted to include a symbolic link and then contents under the same filename in a filesystem can cause unsquashfs to first create the symbolic link pointing outside the expected directory, and then the subsequent write operation will cause the unsquashfs process to write through the symbolic link elsewhere in the filesystem.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Micro 5.5:squashfs-4.6.1-150300.3.3.1.ppc64le" ] }, "references": [ { "category": "external", "summary": "CVE-2021-41072", "url": "https://www.suse.com/security/cve/CVE-2021-41072" }, { "category": "external", "summary": "SUSE Bug 1189936 for CVE-2021-41072", "url": "https://bugzilla.suse.com/1189936" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Micro 5.5:squashfs-4.6.1-150300.3.3.1.ppc64le" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.6, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:N", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Micro 5.5:squashfs-4.6.1-150300.3.3.1.ppc64le" ] } ], "threats": [ { "category": "impact", "date": "2024-07-12T13:55:05Z", "details": "moderate" } ], "title": "CVE-2021-41072" } ] }
gsd-2015-4646
Vulnerability from gsd
Modified
2023-12-13 01:19
Details
(1) unsquash-1.c, (2) unsquash-2.c, (3) unsquash-3.c, and (4) unsquash-4.c in Squashfs and sasquatch allow remote attackers to cause a denial of service (application crash) via a crafted input.
Aliases
Aliases
{ "GSD": { "alias": "CVE-2015-4646", "description": "(1) unsquash-1.c, (2) unsquash-2.c, (3) unsquash-3.c, and (4) unsquash-4.c in Squashfs and sasquatch allow remote attackers to cause a denial of service (application crash) via a crafted input.", "id": "GSD-2015-4646", "references": [ "https://www.suse.com/security/cve/CVE-2015-4646.html", "https://advisories.mageia.org/CVE-2015-4646.html" ] }, "gsd": { "metadata": { "exploitCode": "unknown", "remediation": "unknown", "reportConfidence": "confirmed", "type": "vulnerability" }, "osvSchema": { "aliases": [ "CVE-2015-4646" ], "details": "(1) unsquash-1.c, (2) unsquash-2.c, (3) unsquash-3.c, and (4) unsquash-4.c in Squashfs and sasquatch allow remote attackers to cause a denial of service (application crash) via a crafted input.", "id": "GSD-2015-4646", "modified": "2023-12-13T01:19:59.736430Z", "schema_version": "1.4.0" } }, "namespaces": { "cve.org": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2015-4646", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "(1) unsquash-1.c, (2) unsquash-2.c, (3) unsquash-3.c, and (4) unsquash-4.c in Squashfs and sasquatch allow remote attackers to cause a denial of service (application crash) via a crafted input." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "75272", "refsource": "BID", "url": "http://www.securityfocus.com/bid/75272" }, { "name": "GLSA-201701-73", "refsource": "GENTOO", "url": "https://security.gentoo.org/glsa/201701-73" }, { "name": "[oss-security] 20150618 Re: Possible CVE Request: Multiple stack overflows in squashfs-tools and sasquatch", "refsource": "MLIST", "url": "http://seclists.org/oss-sec/2015/q2/756" }, { "name": "https://github.com/plougher/squashfs-tools/commit/f95864afe8833fe3ad782d714b41378e860977b1", "refsource": "CONFIRM", "url": "https://github.com/plougher/squashfs-tools/commit/f95864afe8833fe3ad782d714b41378e860977b1" } ] } }, "nvd.nist.gov": { "configurations": { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:a:squashfs_project:squashfs:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndIncluding": "4.3", "vulnerable": true } ], "operator": "OR" } ] }, "cve": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2015-4646" }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "en", "value": "(1) unsquash-1.c, (2) unsquash-2.c, (3) unsquash-3.c, and (4) unsquash-4.c in Squashfs and sasquatch allow remote attackers to cause a denial of service (application crash) via a crafted input." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "en", "value": "CWE-20" } ] } ] }, "references": { "reference_data": [ { "name": "75272", "refsource": "BID", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securityfocus.com/bid/75272" }, { "name": "[oss-security] 20150618 Re: Possible CVE Request: Multiple stack overflows in squashfs-tools and sasquatch", "refsource": "MLIST", "tags": [ "Mailing List", "Third Party Advisory", "VDB Entry" ], "url": "http://seclists.org/oss-sec/2015/q2/756" }, { "name": "GLSA-201701-73", "refsource": "GENTOO", "tags": [ "Third Party Advisory" ], "url": "https://security.gentoo.org/glsa/201701-73" }, { "name": "https://github.com/plougher/squashfs-tools/commit/f95864afe8833fe3ad782d714b41378e860977b1", "refsource": "CONFIRM", "tags": [ "Third Party Advisory" ], "url": "https://github.com/plougher/squashfs-tools/commit/f95864afe8833fe3ad782d714b41378e860977b1" } ] } }, "impact": { "baseMetricV2": { "cvssV2": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 5.0, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "MEDIUM", "userInteractionRequired": false }, "baseMetricV3": { "cvssV3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 3.6 } }, "lastModifiedDate": "2019-10-24T14:00Z", "publishedDate": "2017-04-13T17:59Z" } } }
ghsa-m77j-hm9g-ppq8
Vulnerability from github
Published
2022-05-13 01:31
Modified
2022-05-13 01:31
Severity ?
VLAI Severity ?
Details
(1) unsquash-1.c, (2) unsquash-2.c, (3) unsquash-3.c, and (4) unsquash-4.c in Squashfs and sasquatch allow remote attackers to cause a denial of service (application crash) via a crafted input.
{ "affected": [], "aliases": [ "CVE-2015-4646" ], "database_specific": { "cwe_ids": [ "CWE-20" ], "github_reviewed": false, "github_reviewed_at": null, "nvd_published_at": "2017-04-13T17:59:00Z", "severity": "HIGH" }, "details": "(1) unsquash-1.c, (2) unsquash-2.c, (3) unsquash-3.c, and (4) unsquash-4.c in Squashfs and sasquatch allow remote attackers to cause a denial of service (application crash) via a crafted input.", "id": "GHSA-m77j-hm9g-ppq8", "modified": "2022-05-13T01:31:02Z", "published": "2022-05-13T01:31:02Z", "references": [ { "type": "ADVISORY", "url": "https://nvd.nist.gov/vuln/detail/CVE-2015-4646" }, { "type": "WEB", "url": "https://github.com/plougher/squashfs-tools/commit/f95864afe8833fe3ad782d714b41378e860977b1" }, { "type": "WEB", "url": "https://security.gentoo.org/glsa/201701-73" }, { "type": "WEB", "url": "http://seclists.org/oss-sec/2015/q2/756" }, { "type": "WEB", "url": "http://www.securityfocus.com/bid/75272" } ], "schema_version": "1.4.0", "severity": [ { "score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "type": "CVSS_V3" } ] }
fkie_cve-2015-4646
Vulnerability from fkie_nvd
Published
2017-04-13 17:59
Modified
2025-04-20 01:37
Severity ?
Summary
(1) unsquash-1.c, (2) unsquash-2.c, (3) unsquash-3.c, and (4) unsquash-4.c in Squashfs and sasquatch allow remote attackers to cause a denial of service (application crash) via a crafted input.
References
▶ | URL | Tags | |
---|---|---|---|
cve@mitre.org | http://seclists.org/oss-sec/2015/q2/756 | Mailing List, Third Party Advisory, VDB Entry | |
cve@mitre.org | http://www.securityfocus.com/bid/75272 | Third Party Advisory, VDB Entry | |
cve@mitre.org | https://github.com/plougher/squashfs-tools/commit/f95864afe8833fe3ad782d714b41378e860977b1 | Third Party Advisory | |
cve@mitre.org | https://security.gentoo.org/glsa/201701-73 | Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://seclists.org/oss-sec/2015/q2/756 | Mailing List, Third Party Advisory, VDB Entry | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.securityfocus.com/bid/75272 | Third Party Advisory, VDB Entry | |
af854a3a-2127-422b-91ae-364da2661108 | https://github.com/plougher/squashfs-tools/commit/f95864afe8833fe3ad782d714b41378e860977b1 | Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://security.gentoo.org/glsa/201701-73 | Third Party Advisory |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
squashfs_project | squashfs | * |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:squashfs_project:squashfs:*:*:*:*:*:*:*:*", "matchCriteriaId": "672A3E13-69CC-4429-97DA-F192BE45600C", "versionEndIncluding": "4.3", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "(1) unsquash-1.c, (2) unsquash-2.c, (3) unsquash-3.c, and (4) unsquash-4.c in Squashfs and sasquatch allow remote attackers to cause a denial of service (application crash) via a crafted input." }, { "lang": "es", "value": "(1) unsquash-1.c, (2) unsquash-2.c, (3) unsquash-3.c, y (4) unsquash-4.c en Squashfs y sasquatch permiten a atacantes remotos provocar una denegaci\u00f3n de servicio (ca\u00edda de aplicaci\u00f3n) a trav\u00e9s de una entrada manipulada manualmente." } ], "id": "CVE-2015-4646", "lastModified": "2025-04-20T01:37:25.860", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 5.0, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2017-04-13T17:59:00.340", "references": [ { "source": "cve@mitre.org", "tags": [ "Mailing List", "Third Party Advisory", "VDB Entry" ], "url": "http://seclists.org/oss-sec/2015/q2/756" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securityfocus.com/bid/75272" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://github.com/plougher/squashfs-tools/commit/f95864afe8833fe3ad782d714b41378e860977b1" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://security.gentoo.org/glsa/201701-73" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Mailing List", "Third Party Advisory", "VDB Entry" ], "url": "http://seclists.org/oss-sec/2015/q2/756" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securityfocus.com/bid/75272" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://github.com/plougher/squashfs-tools/commit/f95864afe8833fe3ad782d714b41378e860977b1" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://security.gentoo.org/glsa/201701-73" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Deferred", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-20" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Loading…
Loading…
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.
Loading…
Loading…