CVE-2015-1191
Published: 21 January 2015
Multiple directory traversal vulnerabilities in pigz 2.3.1 allow remote attackers to write to arbitrary files via a (1) full pathname or (2) .. (dot dot) in an archive.
From the Ubuntu Security Team
It was discovered that pigz was susceptible to a directory traversal vulnerability. If a user were tricked into opening a malicious archive, arbitrary files could be overwritten.
Priority
Status
Package | Release | Status |
---|---|---|
pigz Launchpad, Ubuntu, Debian |
artful |
Not vulnerable
|
bionic |
Not vulnerable
|
|
cosmic |
Not vulnerable
|
|
disco |
Not vulnerable
|
|
eoan |
Not vulnerable
|
|
focal |
Not vulnerable
|
|
lucid |
Ignored
(end of life)
|
|
precise |
Ignored
(end of life)
|
|
upstream |
Not vulnerable
(2.3.1-2)
|
|
utopic |
Ignored
(end of life)
|
|
wily |
Ignored
(end of life)
|
|
impish |
Not vulnerable
|
|
trusty |
Released
(2.3-2ubuntu0.1~esm1)
Available with Ubuntu Pro or Ubuntu Pro (Infra-only) |
|
vivid |
Ignored
(end of life)
|
|
xenial |
Not vulnerable
(2.3.1-2)
|
|
yakkety |
Not vulnerable
(2.3.1-2)
|
|
zesty |
Not vulnerable
|
|
groovy |
Not vulnerable
|
|
hirsute |
Not vulnerable
|
|
jammy |
Not vulnerable
|