CVE-2021-41072: squashfs_opendir in unsquash-2.c in Squashfs-Tools 4.5 allows Directory Traversal, a different vulnerability than CVE-2021-40153. A squashfs filesystem that has been crafted to include a symbolic link and then contents under the same filename in a filesystem can cause unsquashfs to first create the symbolic link pointing outside the expected directory, and then the subsequent write operation will cause the unsquashfs process to write through the symbolic link elsewhere in the filesystem. Patch: https://github.com/plougher/squashfs-tools/commit/e0485802ec72996c20026da320650d8362f555bd
See https://bugs.gentoo.org/811474#c2 (meant to tag this bug and somehow didn't).
cleanup done
Arbitrary file writes are arbitrary code execution. Upgrading severity for both.
GLSA request filed
The bug has been referenced in the following commit(s): https://gitweb.gentoo.org/data/glsa.git/commit/?id=7c5aee9146a9230980d95e7d2037c660f20dd275 commit 7c5aee9146a9230980d95e7d2037c660f20dd275 Author: GLSAMaker <glsamaker@gentoo.org> AuthorDate: 2023-05-30 02:54:28 +0000 Commit: John Helmert III <ajak@gentoo.org> CommitDate: 2023-05-30 02:56:35 +0000 [ GLSA 202305-29 ] squashfs-tools: Multiple Vulnerabilities Bug: https://bugs.gentoo.org/810706 Bug: https://bugs.gentoo.org/813654 Signed-off-by: GLSAMaker <glsamaker@gentoo.org> Signed-off-by: John Helmert III <ajak@gentoo.org> glsa-202305-29.xml | 44 ++++++++++++++++++++++++++++++++++++++++++++ 1 file changed, 44 insertions(+)
GLSA released, all done!