Description
An improper link resolution flaw while extracting an archive can lead to changing the access control list (ACL) of the target of the link. An attacker may provide a malicious archive to a victim user, who would trigger this flaw when trying to extract the archive. A local attacker may use this flaw to change the ACL of a file on the system and gain more privileges.
References (5)
Core 5
Core References
Mailing List, Third Party Advisory mailing-list
https://lists.debian.org/debian-lts-announce/2022/11/msg00030.html
Third Party Advisory
https://access.redhat.com/security/cve/CVE-2021-23177
Issue Tracking, Patch, Third Party Advisory
https://bugzilla.redhat.com/show_bug.cgi?id=2024245
Patch, Third Party Advisory
https://github.com/libarchive/libarchive/commit/fba4f123cc456d2b2538f811bb831483bf336bad
Issue Tracking, Patch, Third Party Advisory
https://github.com/libarchive/libarchive/issues/1565
Scores
CVSS v3
7.8
EPSS
0.0004
EPSS Percentile
12.5%
Attack Vector
LOCAL
CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
Details
CWE
CWE-59
Status
published
Products (13)
debian/debian_linux
10.0
fedoraproject/fedora
35
libarchive/libarchive
< 3.5.2
redhat/codeready_linux_builder
redhat/enterprise_linux
8.0
redhat/enterprise_linux_eus
8.6
redhat/enterprise_linux_for_ibm_z_systems
8.0
redhat/enterprise_linux_for_ibm_z_systems_eus
8.6
redhat/enterprise_linux_for_power_little_endian
8.0
redhat/enterprise_linux_for_power_little_endian_eus
8.6
... and 3 more
Published
Aug 23, 2022
Tracked Since
Feb 18, 2026