CVE-2021-31566
on github
Published
Severity
CVSS v3:
7.8 HIGH
CVSS v2:
N/A
Description
An improper link resolution flaw can occur while extracting an archive leading to changing modes, times, access control lists, and flags of a file outside of the archive. An attacker may provide a malicious archive to a victim user, who would trigger this flaw when trying to extract the archive. A local attacker may use this flaw to gain more privileges in a system.
References
- https://github.com/libarchive/libarchive/commit/b41daecb5ccb4c8e3b2c53fd6147109fc12c3043
- https://access.redhat.com/security/cve/CVE-2021-31566
- https://bugzilla.redhat.com/show_bug.cgi?id=2024237
- https://github.com/libarchive/libarchive/issues/1566
- https://lists.debian.org/debian-lts-announce/2022/11/msg00030.html
Configurations
CPE23 | Version Start | Version End | Exact Version |
---|---|---|---|
cpe:2.3:a:libarchive:libarchive:*:*:*:*:*:*:*:* | n/a | 3.5.2 | * |
cpe:2.3:o:fedoraproject:fedora:35:*:*:*:*:*:*:* | n/a | n/a | 35 |
cpe:2.3:o:redhat:enterprise_linux:8.0:*:*:*:*:*:*:* | n/a | n/a | 8.0 |
cpe:2.3:o:redhat:enterprise_linux_for_power_little_endian:8.0:*:*:*:*:*:*:* | n/a | n/a | 8.0 |
cpe:2.3:o:redhat:enterprise_linux_for_ibm_z_systems:8.0:*:*:*:*:*:*:* | n/a | n/a | 8.0 |
cpe:2.3:o:redhat:enterprise_linux_server_for_power_little_endian_update_services_for_sap_solutions:8.6:*:*:*:*:*:*:* | n/a | n/a | 8.6 |
cpe:2.3:o:redhat:enterprise_linux_for_ibm_z_systems_eus:8.6:*:*:*:*:*:*:* | n/a | n/a | 8.6 |
cpe:2.3:o:redhat:enterprise_linux_server_aus:8.6:*:*:*:*:*:*:* | n/a | n/a | 8.6 |
cpe:2.3:o:redhat:enterprise_linux_server_tus:8.6:*:*:*:*:*:*:* | n/a | n/a | 8.6 |
cpe:2.3:o:redhat:enterprise_linux_eus:8.6:*:*:*:*:*:*:* | n/a | n/a | 8.6 |
cpe:2.3:o:redhat:enterprise_linux_for_power_little_endian_eus:8.6:*:*:*:*:*:*:* | n/a | n/a | 8.6 |
cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:* | n/a | n/a | 10.0 |
cpe:2.3:a:splunk:universal_forwarder:9.1.0:*:*:*:*:*:*:* | n/a | n/a | 9.1.0 |
cpe:2.3:a:splunk:universal_forwarder:*:*:*:*:*:*:*:* | 9.0.0 (including) | 9.0.6 | * |
cpe:2.3:a:splunk:universal_forwarder:*:*:*:*:*:*:*:* | 8.2.0 (including) | 8.2.12 | * |