CVE-2021-23177
NixOS vulnerability analysis and mitigation

Overview

CVE-2021-23177 is a security vulnerability in libarchive that was discovered and fixed in version 3.5.2. The vulnerability involves an improper link resolution flaw while extracting an archive that can lead to changing the access control list (ACL) of the target of the link. When an archive entry contains a symbolic link that has defined ACLs on Linux, on extraction the ACLs of the link target are modified because the function aclsetfile() is used without a prior check if the file is not a symbolic link (Debian Security, GitHub Issue).

Technical details

The vulnerability occurs because libarchive attempts to set ACLs on symbolic links, which is not supported on Linux systems. The issue specifically arises from the use of aclsetfile() function without first verifying if the file is a symbolic link. On Linux, ACLs on symbolic links are not supported, and attempting to set them results in modifying the ACLs of the link target instead. The fix involves adding proper checks to avoid calling aclsetfile() on symbolic links, as their targets would be modified unintentionally (GitHub Commit).

Impact

An attacker could exploit this vulnerability by providing a malicious archive to a victim user, who would trigger this flaw when attempting to extract the archive. The successful exploitation could allow a local attacker to change the ACL of files on the system and potentially gain elevated privileges (Ubuntu Security).

Mitigation and workarounds

The vulnerability has been fixed in libarchive version 3.5.2 and later. Various Linux distributions have backported the fix to their maintained versions. For example, Debian has addressed this in version 3.4.3-2+deb11u1 for bullseye, and Red Hat has included fixes in their security updates. Users are advised to update their libarchive packages to the latest available version (Debian Security, Red Hat Bugzilla).

Additional resources


SourceThis report was generated using AI

Related NixOS vulnerabilities:

CVE ID

Severity

Score

Technologies

Component name

CISA KEV exploit

Has fix

Published date

CVE-2025-61619HIGH7.5
  • NixOSNixOS
  • android
NoNoDec 01, 2025
CVE-2025-61618HIGH7.5
  • NixOSNixOS
  • android
NoNoDec 01, 2025
CVE-2025-61617HIGH7.5
  • NixOSNixOS
  • android
NoNoDec 01, 2025
CVE-2025-61610HIGH7.5
  • NixOSNixOS
  • android
NoNoDec 01, 2025
CVE-2025-65622MEDIUM5.4
  • PHPPHP
  • snipe/snipe-it
NoYesDec 01, 2025

Free Vulnerability Assessment

Benchmark your Cloud Security Posture

Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.

Request assessment

Get a personalized demo

Ready to see Wiz in action?

"Best User Experience I have ever seen, provides full visibility to cloud workloads."
David EstlickCISO
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
Adam FletcherChief Security Officer
"We know that if Wiz identifies something as critical, it actually is."
Greg PoniatowskiHead of Threat and Vulnerability Management