MGASA-2022-0010

Source
https://advisories.mageia.org/MGASA-2022-0010.html
Import Source
https://advisories.mageia.org/MGASA-2022-0010.json
JSON Data
https://api.osv.dev/v1/vulns/MGASA-2022-0010
Related
Published
2022-01-11T07:12:42Z
Modified
2022-01-11T06:36:01Z
Summary
Updated squashfs-tools packages fix security vulnerability
Details

squashfsopendir in unsquash-1.c in Squashfs-Tools 4.5 stores the filename in the directory entry; this is then used by unsquashfs to create the new file during the unsquash. The filename is not validated for traversal outside of the destination directory, and thus allows writing to locations outside of the destination. (CVE-2021-40153) squashfsopendir in unsquash-2.c in Squashfs-Tools 4.5 allows Directory Traversal, a different vulnerability than CVE-2021-40153. A squashfs filesystem that has been crafted to include a symbolic link and then contents under the same filename in a filesystem can cause unsquashfs to first create the symbolic link pointing outside the expected directory, and then the subsequent write operation will cause the unsquashfs process to write through the symbolic link elsewhere in the filesystem. (CVE-2021-41072)

References
Credits

Affected packages

Mageia:8 / squashfs-tools

Package

Name
squashfs-tools
Purl
pkg:rpm/mageia/squashfs-tools?distro=mageia-8

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
4.5-1.git5ae723.1.mga8

Ecosystem specific

{
    "section": "core"
}