ALT-BU-2022-4592-1
Branch p10_e2k update bulletin.
Package squashfs-tools updated to version 4.5.1-alt1 for branch p10_e2k.
Closed vulnerabilities
BDU:2021-05217
Уязвимость функции squashfs_opendir компонента unsquash-1.c набора инструментов для создания и извлечения файловых систем Squashfs Squashfs-Tools, связанная с недостатками ограничения имени пути к каталогу, позволяющая нарушителю нарушить целостность данных, а также вызвать отказ в обслуживании
BDU:2021-06307
Уязвимость функции squashfs_opendir компонента unsquash-2.c набора инструментов для создания и извлечения файловых систем Squashfs Squashfs-Tools, связанная с неверным определением символических ссылок перед доступом к файлу, позволяющая нарушителю нарушить целостность данных, а также вызвать отказ в обслуживании
Modified: 2024-11-21
CVE-2021-40153
squashfs_opendir in unsquash-1.c in Squashfs-Tools 4.5 stores the filename in the directory entry; this is then used by unsquashfs to create the new file during the unsquash. The filename is not validated for traversal outside of the destination directory, and thus allows writing to locations outside of the destination.
- https://bugs.launchpad.net/ubuntu/+source/squashfs-tools/+bug/1941790
- https://bugs.launchpad.net/ubuntu/+source/squashfs-tools/+bug/1941790
- https://github.com/plougher/squashfs-tools/commit/79b5a555058eef4e1e7ff220c344d39f8cd09646
- https://github.com/plougher/squashfs-tools/commit/79b5a555058eef4e1e7ff220c344d39f8cd09646
- https://github.com/plougher/squashfs-tools/issues/72
- https://github.com/plougher/squashfs-tools/issues/72
- [debian-lts-announce] 20210831 [SECURITY] [DLA 2752-1] squashfs-tools security update
- [debian-lts-announce] 20210831 [SECURITY] [DLA 2752-1] squashfs-tools security update
- FEDORA-2021-9fb6da134f
- FEDORA-2021-9fb6da134f
- FEDORA-2021-cdbd827c1e
- FEDORA-2021-cdbd827c1e
- GLSA-202305-29
- GLSA-202305-29
- DSA-4967
- DSA-4967
Modified: 2024-11-21
CVE-2021-41072
squashfs_opendir in unsquash-2.c in Squashfs-Tools 4.5 allows Directory Traversal, a different vulnerability than CVE-2021-40153. A squashfs filesystem that has been crafted to include a symbolic link and then contents under the same filename in a filesystem can cause unsquashfs to first create the symbolic link pointing outside the expected directory, and then the subsequent write operation will cause the unsquashfs process to write through the symbolic link elsewhere in the filesystem.
- https://github.com/plougher/squashfs-tools/commit/e0485802ec72996c20026da320650d8362f555bd
- https://github.com/plougher/squashfs-tools/commit/e0485802ec72996c20026da320650d8362f555bd
- https://github.com/plougher/squashfs-tools/issues/72#issuecomment-913833405
- https://github.com/plougher/squashfs-tools/issues/72#issuecomment-913833405
- [debian-lts-announce] 20211020 [SECURITY] [DLA 2789-1] squashfs-tools security update
- [debian-lts-announce] 20211020 [SECURITY] [DLA 2789-1] squashfs-tools security update
- GLSA-202305-29
- GLSA-202305-29
- DSA-4987
- DSA-4987
Closed bugs
cinnamon не запускается, так как не устанавлен libsoup-gir
Closed vulnerabilities
Modified: 2024-11-21
CVE-2022-1271
An arbitrary file write vulnerability was found in GNU gzip's zgrep utility. When zgrep is applied on the attacker's chosen file name (for example, a crafted file name), this can overwrite an attacker's content to an arbitrary attacker-selected file. This flaw occurs due to insufficient validation when processing filenames with two or more newlines where selected content and the target file names are embedded in crafted multi-line file names. This flaw allows a remote, low privileged attacker to force zgrep to write arbitrary files on the system.
- https://access.redhat.com/security/cve/CVE-2022-1271
- https://access.redhat.com/security/cve/CVE-2022-1271
- https://bugzilla.redhat.com/show_bug.cgi?id=2073310
- https://bugzilla.redhat.com/show_bug.cgi?id=2073310
- https://git.tukaani.org/?p=xz.git%3Ba=commit%3Bh=69d1b3fc29677af8ade8dc15dba83f0589cb63d6
- https://git.tukaani.org/?p=xz.git%3Ba=commit%3Bh=69d1b3fc29677af8ade8dc15dba83f0589cb63d6
- https://lists.gnu.org/r/bug-gzip/2022-04/msg00011.html
- https://lists.gnu.org/r/bug-gzip/2022-04/msg00011.html
- GLSA-202209-01
- GLSA-202209-01
- https://security.netapp.com/advisory/ntap-20220930-0006/
- https://security.netapp.com/advisory/ntap-20220930-0006/
- https://security-tracker.debian.org/tracker/CVE-2022-1271
- https://security-tracker.debian.org/tracker/CVE-2022-1271
- https://tukaani.org/xz/xzgrep-ZDI-CAN-16587.patch
- https://tukaani.org/xz/xzgrep-ZDI-CAN-16587.patch
- https://www.openwall.com/lists/oss-security/2022/04/07/8
- https://www.openwall.com/lists/oss-security/2022/04/07/8