Bug 2004957 (CVE-2021-41072)
Summary: | CVE-2021-41072 squashfs-tools: possible Directory Traversal via symbolic link | ||
---|---|---|---|
Product: | [Other] Security Response | Reporter: | Marian Rehak <mrehak> |
Component: | vulnerability | Assignee: | Nobody <nobody> |
Status: | NEW --- | QA Contact: | |
Severity: | medium | Docs Contact: | |
Priority: | medium | ||
Version: | unspecified | CC: | adas, bruno, katzj, kyle, mvanderw, vkumar |
Target Milestone: | --- | Keywords: | Security |
Target Release: | --- | ||
Hardware: | All | ||
OS: | Linux | ||
Whiteboard: | |||
Fixed In Version: | Doc Type: | If docs needed, set a value | |
Doc Text: |
A directory traversal flaw was found in squashfs-tools. During extraction, a file can escape the destination directory by using a symbolic link, and a regular file with an identical name. This flaw allows a specially crafted squashfs archive to install or overwrite files outside of the destination directory.
|
Story Points: | --- |
Clone Of: | Environment: | ||
Last Closed: | Type: | --- | |
Regression: | --- | Mount Type: | --- |
Documentation: | --- | CRM: | |
Verified Versions: | Category: | --- | |
oVirt Team: | --- | RHEL 7.3 requirements from Atomic Host: | |
Cloudforms Team: | --- | Target Upstream Version: | |
Embargoed: | |||
Bug Depends On: | 2004958, 2007302, 2007303, 2007304 | ||
Bug Blocks: | 2004960 |
Description
Marian Rehak
2021-09-16 13:48:12 UTC
Created squashfs-tools tracking bugs for this issue: Affects: fedora-all [bug 2004958] Upstream fix : https://github.com/plougher/squashfs-tools/commit/e0485802ec72996c20026da320650d8362f555bd It is fixed in f35 and rawhide. I need to wait one more day before I can move from testing to stable in f33 and f34. The previous security fix didn't get into f33, because I didn't wait for the previous update to get to stable there before creating the new update and the older update got obsoleted. The fixed version is now in all current versions of Fedora. This issue has been addressed in the following products: Red Hat Enterprise Linux 9 Via RHSA-2024:2396 https://access.redhat.com/errata/RHSA-2024:2396 This issue has been addressed in the following products: Red Hat Enterprise Linux 8 Via RHSA-2024:3139 https://access.redhat.com/errata/RHSA-2024:3139 |