First published: Wed May 20 2015(Updated: )
It was found that xzgrep did not correctly process file names containing a semicolon. A local attacker able to trick a user to run xzgrep on a specially crafted file could use this flaw to execute arbitrary code as the user running xzgrep. $ touch /tmp/semi\;colon $ xzgrep anystring /tmp/semi\;colon xz: /tmp/semi: No such file or directory /usr/bin/xzgrep: line 199: colon: command not found Additional details: <a href="http://seclists.org/oss-sec/2015/q2/484">http://seclists.org/oss-sec/2015/q2/484</a>
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
redhat/xz | <5.0.0 | 5.0.0 |
redhat/xz | <5.2.0 | 5.2.0 |
Tukaani XZ | <=4.999.9 | |
Redhat Enterprise Linux | =5.0 | |
Redhat Enterprise Linux | =6.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.