CVE-2015-1191
Publication date 21 January 2015
Last updated 24 July 2024
Ubuntu priority
Multiple directory traversal vulnerabilities in pigz 2.3.1 allow remote attackers to write to arbitrary files via a (1) full pathname or (2) .. (dot dot) in an archive.
From the Ubuntu Security Team
It was discovered that pigz was susceptible to a directory traversal vulnerability. If a user were tricked into opening a malicious archive, arbitrary files could be overwritten.
Status
Package | Ubuntu Release | Status |
---|---|---|
pigz | 22.04 LTS jammy |
Not affected
|
20.04 LTS focal |
Not affected
|
|
18.04 LTS bionic |
Not affected
|
|
16.04 LTS xenial |
Not affected
|
|
14.04 LTS trusty |
Fixed 2.3-2ubuntu0.1~esm1
|
|
Get expanded security coverage with Ubuntu Pro
Reduce your average CVE exposure time from 98 days to 1 day with expanded CVE patching, ten-years security maintenance and optional support for the full stack of open-source applications. Free for personal use.
Get Ubuntu Pro