Openwall GNU/*/Linux - a small security-enhanced Linux distro for servers
[<prev] [next>] [<thread-prev] [day] [month] [year] [list]
Date: Thu, 31 Dec 2015 13:54:55 +0000
From: Jeremy Stanley <jeremy@...nstack.org>
To: oss-security@...ts.openwall.com
Subject: Re: Re: CVE Request: Squashfs 4.2 Race Condition

On 2015-12-31 06:29:55 +0900 (+0900), Jihyeok Seo wrote:
[...]
> However, firmware upgrade procedures (remote or local) which uses
> unsquashfs, on devices such as network routers, could be crashed
> with an untrusted Squashfs filesystem image and lead to denial of
> service.

To reasonably consider that an exploit, you first have to ask
whether there are easier ways for an untrusted firmware upgrade
image to crash devices such as network routers. It seems like if you
are willing to load an untrusted firmware onto your router, having a
patched Squashfs is the least of your worries?
-- 
Jeremy Stanley

Powered by blists - more mailing lists

Your e-mail address:

Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.

Powered by Openwall GNU/*/Linux - Powered by OpenVZ