Link Following Affecting libarchive package, versions <0:3.3.3-3.el8_5



    Attack Complexity Low
    User Interaction Required
    Confidentiality High
Expand this section
7.8 high
Expand this section
Red Hat
6.6 medium
Expand this section
6.6 medium

Do your applications use this vulnerable package?

In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.

Test your applications
  • published 16 Dec 2021
  • disclosed 21 Aug 2021

How to fix?

Upgrade Centos:8 libarchive to version 0:3.3.3-3.el8_5 or higher.

NVD Description

Note: Versions mentioned in the description apply only to the upstream libarchive package and not the libarchive package as distributed by Centos:8. See How to fix? for Centos:8 relevant fixed versions and status.

An improper link resolution flaw while extracting an archive can lead to changing the access control list (ACL) of the target of the link. An attacker may provide a malicious archive to a victim user, who would trigger this flaw when trying to extract the archive. A local attacker may use this flaw to change the ACL of a file on the system and gain more privileges.