cvrf2cusa/cvrf/2021/cvrf-openEuler-SA-2021-1425.xml

146 lines
9.2 KiB
XML
Raw Normal View History

<?xml version="1.0" encoding="UTF-8"?>
<cvrfdoc xmlns="http://www.icasi.org/CVRF/schema/cvrf/1.1" xmlns:cvrf="http://www.icasi.org/CVRF/schema/cvrf/1.1">
<DocumentTitle xml:lang="en">An update for squashfs-tools is now available for openEuler-20.03-LTS-SP1 and openEuler-20.03-LTS-SP2</DocumentTitle>
<DocumentType>Security Advisory</DocumentType>
<DocumentPublisher Type="Vendor">
<ContactDetails>openeuler-security@openeuler.org</ContactDetails>
<IssuingAuthority>openEuler security committee</IssuingAuthority>
</DocumentPublisher>
<DocumentTracking>
<Identification>
<ID>openEuler-SA-2021-1425</ID>
</Identification>
<Status>Final</Status>
<Version>1.0</Version>
<RevisionHistory>
<Revision>
<Number>1.0</Number>
<Date>2021-11-12</Date>
<Description>Initial</Description>
</Revision>
</RevisionHistory>
<InitialReleaseDate>2021-11-12</InitialReleaseDate>
<CurrentReleaseDate>2021-11-12</CurrentReleaseDate>
<Generator>
<Engine>openEuler SA Tool V1.0</Engine>
<Date>2021-11-12</Date>
</Generator>
</DocumentTracking>
<DocumentNotes>
<Note Title="Synopsis" Type="General" Ordinal="1" xml:lang="en">squashfs-tools security update</Note>
<Note Title="Summary" Type="General" Ordinal="2" xml:lang="en">An update for squashfs-tools is now available for openEuler-20.03-LTS-SP1 and openEuler-20.03-LTS-SP2.</Note>
<Note Title="Description" Type="General" Ordinal="3" xml:lang="en">Squashfs is a highly compressed read-only filesystem for Linux. It uses either gzip/xz/lzo/lz4/zstd compression to compress both files, inodes and directories.
Security Fix(es):
squashfs_opendir in unsquash-2.c in Squashfs-Tools 4.5 allows Directory Traversal, a different vulnerability than CVE-2021-40153. A squashfs filesystem that has been crafted to include a symbolic link and then contents under the same filename in a filesystem can cause unsquashfs to first create the symbolic link pointing outside the expected directory, and then the subsequent write operation will cause the unsquashfs process to write through the symbolic link elsewhere in the filesystem.(CVE-2021-41072)
squashfs_opendir in unsquash-1.c in Squashfs-Tools 4.5 stores the filename in the directory entry; this is then used by unsquashfs to create the new file during the unsquash. The filename is not validated for traversal outside of the destination directory, and thus allows writing to locations outside of the destination.(CVE-2021-40153)</Note>
<Note Title="Topic" Type="General" Ordinal="4" xml:lang="en">An update for squashfs-tools is now available for openEuler-20.03-LTS-SP1 and openEuler-20.03-LTS-SP2.
openEuler Security has rated this update as having a security impact of high. A Common Vunlnerability Scoring System(CVSS)base score,which gives a detailed severity rating, is available for each vulnerability from the CVElink(s) in the References section.</Note>
<Note Title="Severity" Type="General" Ordinal="5" xml:lang="en">High</Note>
<Note Title="Affected Component" Type="General" Ordinal="6" xml:lang="en">squashfs-tools</Note>
</DocumentNotes>
<DocumentReferences>
<Reference Type="Self">
<URL>https://www.openeuler.org/en/security/safety-bulletin/detail.html?id=openEuler-SA-2021-1425</URL>
</Reference>
<Reference Type="openEuler CVE">
<URL>https://www.openeuler.org/en/security/cve/detail.html?id=CVE-2021-41072</URL>
<URL>https://www.openeuler.org/en/security/cve/detail.html?id=CVE-2021-40153</URL>
</Reference>
<Reference Type="Other">
<URL>https://nvd.nist.gov/vuln/detail/CVE-2021-41072</URL>
<URL>https://nvd.nist.gov/vuln/detail/CVE-2021-40153</URL>
</Reference>
</DocumentReferences>
<ProductTree xmlns="http://www.icasi.org/CVRF/schema/prod/1.1">
<Branch Type="Product Name" Name="openEuler">
<FullProductName ProductID="openEuler-20.03-LTS-SP1" CPE="cpe:/a:openEuler:openEuler:20.03-LTS-SP1">openEuler-20.03-LTS-SP1</FullProductName>
<FullProductName ProductID="openEuler-20.03-LTS-SP2" CPE="cpe:/a:openEuler:openEuler:20.03-LTS-SP2">openEuler-20.03-LTS-SP2</FullProductName>
</Branch>
<Branch Type="Package Arch" Name="aarch64">
<FullProductName ProductID="squashfs-tools-4.4-5" CPE="cpe:/a:openEuler:openEuler:20.03-LTS-SP1">squashfs-tools-4.4-5.oe1.aarch64.rpm</FullProductName>
<FullProductName ProductID="squashfs-tools-debuginfo-4.4-5" CPE="cpe:/a:openEuler:openEuler:20.03-LTS-SP1">squashfs-tools-debuginfo-4.4-5.oe1.aarch64.rpm</FullProductName>
<FullProductName ProductID="squashfs-tools-debugsource-4.4-5" CPE="cpe:/a:openEuler:openEuler:20.03-LTS-SP1">squashfs-tools-debugsource-4.4-5.oe1.aarch64.rpm</FullProductName>
<FullProductName ProductID="squashfs-tools-debugsource-4.4-5" CPE="cpe:/a:openEuler:openEuler:20.03-LTS-SP2">squashfs-tools-debugsource-4.4-5.oe1.aarch64.rpm</FullProductName>
<FullProductName ProductID="squashfs-tools-4.4-5" CPE="cpe:/a:openEuler:openEuler:20.03-LTS-SP2">squashfs-tools-4.4-5.oe1.aarch64.rpm</FullProductName>
<FullProductName ProductID="squashfs-tools-debuginfo-4.4-5" CPE="cpe:/a:openEuler:openEuler:20.03-LTS-SP2">squashfs-tools-debuginfo-4.4-5.oe1.aarch64.rpm</FullProductName>
</Branch>
<Branch Type="Package Arch" Name="src">
<FullProductName ProductID="squashfs-tools-4.4-5" CPE="cpe:/a:openEuler:openEuler:20.03-LTS-SP1">squashfs-tools-4.4-5.oe1.src.rpm</FullProductName>
<FullProductName ProductID="squashfs-tools-4.4-5" CPE="cpe:/a:openEuler:openEuler:20.03-LTS-SP2">squashfs-tools-4.4-5.oe1.src.rpm</FullProductName>
</Branch>
<Branch Type="Package Arch" Name="x86_64">
<FullProductName ProductID="squashfs-tools-debuginfo-4.4-5" CPE="cpe:/a:openEuler:openEuler:20.03-LTS-SP1">squashfs-tools-debuginfo-4.4-5.oe1.x86_64.rpm</FullProductName>
<FullProductName ProductID="squashfs-tools-debugsource-4.4-5" CPE="cpe:/a:openEuler:openEuler:20.03-LTS-SP1">squashfs-tools-debugsource-4.4-5.oe1.x86_64.rpm</FullProductName>
<FullProductName ProductID="squashfs-tools-4.4-5" CPE="cpe:/a:openEuler:openEuler:20.03-LTS-SP1">squashfs-tools-4.4-5.oe1.x86_64.rpm</FullProductName>
<FullProductName ProductID="squashfs-tools-4.4-5" CPE="cpe:/a:openEuler:openEuler:20.03-LTS-SP2">squashfs-tools-4.4-5.oe1.x86_64.rpm</FullProductName>
<FullProductName ProductID="squashfs-tools-debugsource-4.4-5" CPE="cpe:/a:openEuler:openEuler:20.03-LTS-SP2">squashfs-tools-debugsource-4.4-5.oe1.x86_64.rpm</FullProductName>
<FullProductName ProductID="squashfs-tools-debuginfo-4.4-5" CPE="cpe:/a:openEuler:openEuler:20.03-LTS-SP2">squashfs-tools-debuginfo-4.4-5.oe1.x86_64.rpm</FullProductName>
</Branch>
</ProductTree>
<Vulnerability Ordinal="1" xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1">
<Notes>
<Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">squashfs_opendir in unsquash-2.c in Squashfs-Tools 4.5 allows Directory Traversal, a different vulnerability than CVE-2021-40153. A squashfs filesystem that has been crafted to include a symbolic link and then contents under the same filename in a filesystem can cause unsquashfs to first create the symbolic link pointing outside the expected directory, and then the subsequent write operation will cause the unsquashfs process to write through the symbolic link elsewhere in the filesystem.</Note>
</Notes>
<ReleaseDate>2021-11-12</ReleaseDate>
<CVE>CVE-2021-41072</CVE>
<ProductStatuses>
<Status Type="Fixed">
<ProductID>openEuler-20.03-LTS-SP1</ProductID>
<ProductID>openEuler-20.03-LTS-SP2</ProductID>
</Status>
</ProductStatuses>
<Threats>
<Threat Type="Impact">
<Description>High</Description>
</Threat>
</Threats>
<CVSSScoreSets>
<ScoreSet>
<BaseScore>8.1</BaseScore>
<Vector>AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:H</Vector>
</ScoreSet>
</CVSSScoreSets>
<Remediations>
<Remediation Type="Vendor Fix">
<Description>squashfs-tools security update</Description>
<DATE>2021-11-12</DATE>
<URL>https://www.openeuler.org/en/security/safety-bulletin/detail.html?id=openEuler-SA-2021-1425</URL>
</Remediation>
</Remediations>
</Vulnerability>
<Vulnerability Ordinal="2" xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1">
<Notes>
<Note Title="Vulnerability Description" Type="General" Ordinal="2" xml:lang="en">squashfs_opendir in unsquash-1.c in Squashfs-Tools 4.5 stores the filename in the directory entry; this is then used by unsquashfs to create the new file during the unsquash. The filename is not validated for traversal outside of the destination directory, and thus allows writing to locations outside of the destination.</Note>
</Notes>
<ReleaseDate>2021-11-12</ReleaseDate>
<CVE>CVE-2021-40153</CVE>
<ProductStatuses>
<Status Type="Fixed">
<ProductID>openEuler-20.03-LTS-SP1</ProductID>
<ProductID>openEuler-20.03-LTS-SP2</ProductID>
</Status>
</ProductStatuses>
<Threats>
<Threat Type="Impact">
<Description>High</Description>
</Threat>
</Threats>
<CVSSScoreSets>
<ScoreSet>
<BaseScore>8.1</BaseScore>
<Vector>AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:H</Vector>
</ScoreSet>
</CVSSScoreSets>
<Remediations>
<Remediation Type="Vendor Fix">
<Description>squashfs-tools security update</Description>
<DATE>2021-11-12</DATE>
<URL>https://www.openeuler.org/en/security/safety-bulletin/detail.html?id=openEuler-SA-2021-1425</URL>
</Remediation>
</Remediations>
</Vulnerability>
</cvrfdoc>