{
  "threat_severity" : "Moderate",
  "public_date" : "2019-09-10T00:00:00Z",
  "bugzilla" : {
    "description" : "squashfs-tools: unvalidated filepaths allow writing outside of destination",
    "id" : "1998621",
    "url" : "https://bugzilla.redhat.com/show_bug.cgi?id=1998621"
  },
  "cvss3" : {
    "cvss3_base_score" : "8.1",
    "cvss3_scoring_vector" : "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:H",
    "status" : "verified"
  },
  "cwe" : "CWE-22",
  "details" : [ "squashfs_opendir in unsquash-1.c in Squashfs-Tools 4.5 stores the filename in the directory entry; this is then used by unsquashfs to create the new file during the unsquash. The filename is not validated for traversal outside of the destination directory, and thus allows writing to locations outside of the destination.", "A flaw was found in Squashfs-tools, where it is vulnerable to attacks similar to zip-slip. During extraction, a file can escape the destination directory either via the '../' string to access the parent directory or via symlinks. This flaw allows a specially crafted squashfs archive to install or overwrite files outside of the destination directory." ],
  "affected_release" : [ {
    "product_name" : "Red Hat Enterprise Linux 8",
    "release_date" : "2024-05-22T00:00:00Z",
    "advisory" : "RHSA-2024:3139",
    "cpe" : "cpe:/o:redhat:enterprise_linux:8",
    "package" : "squashfs-tools-0:4.3-21.el8"
  }, {
    "product_name" : "Red Hat Enterprise Linux 9",
    "release_date" : "2024-04-30T00:00:00Z",
    "advisory" : "RHSA-2024:2396",
    "cpe" : "cpe:/o:redhat:enterprise_linux:9",
    "package" : "squashfs-tools-0:4.4-10.git1.el9"
  } ],
  "package_state" : [ {
    "product_name" : "Red Hat Enterprise Linux 6",
    "fix_state" : "Out of support scope",
    "package_name" : "squashfs-tools",
    "cpe" : "cpe:/o:redhat:enterprise_linux:6"
  }, {
    "product_name" : "Red Hat Enterprise Linux 7",
    "fix_state" : "Will not fix",
    "package_name" : "squashfs-tools",
    "cpe" : "cpe:/o:redhat:enterprise_linux:7"
  } ],
  "references" : [ "https://www.cve.org/CVERecord?id=CVE-2021-40153\nhttps://nvd.nist.gov/vuln/detail/CVE-2021-40153" ],
  "name" : "CVE-2021-40153",
  "csaw" : false
}