Follow @Openwall on Twitter for new release announcements and other news
[<prev] [next>] [<thread-prev] [day] [month] [year] [list]
Message-ID: <20151231135455.GP2344@openstack.org>
Date: Thu, 31 Dec 2015 13:54:55 +0000
From: Jeremy Stanley <jeremy@...nstack.org>
To: oss-security@...ts.openwall.com
Subject: Re: Re: CVE Request: Squashfs 4.2 Race Condition

On 2015-12-31 06:29:55 +0900 (+0900), Jihyeok Seo wrote:
[...]
> However, firmware upgrade procedures (remote or local) which uses
> unsquashfs, on devices such as network routers, could be crashed
> with an untrusted Squashfs filesystem image and lead to denial of
> service.

To reasonably consider that an exploit, you first have to ask
whether there are easier ways for an untrusted firmware upgrade
image to crash devices such as network routers. It seems like if you
are willing to load an untrusted firmware onto your router, having a
patched Squashfs is the least of your worries?
-- 
Jeremy Stanley

Powered by blists - more mailing lists

Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.

Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.