GNU Parallel before 20150522 (Nepal), when using (1) –cat or (2) –fifo with –sshlogin, allows local users to write to arbitrary files via a symlink attack on a temporary file.
The product attempts to access a file based on the filename, but it does not properly prevent that filename from identifying a link or shortcut that resolves to an unintended resource.
| Name | Vendor | Start Version | End Version |
|---|---|---|---|
| Opensuse | Opensuse | 13.1 (including) | 13.1 (including) |
| Opensuse | Opensuse | 13.2 (including) | 13.2 (including) |
| Parallel | Ubuntu | artful | * |
| Parallel | Ubuntu | esm-apps/xenial | * |
| Parallel | Ubuntu | esm-infra-legacy/trusty | * |
| Parallel | Ubuntu | trusty | * |
| Parallel | Ubuntu | trusty/esm | * |
| Parallel | Ubuntu | upstream | * |
| Parallel | Ubuntu | utopic | * |
| Parallel | Ubuntu | vivid | * |
| Parallel | Ubuntu | wily | * |
| Parallel | Ubuntu | xenial | * |
| Parallel | Ubuntu | yakkety | * |
| Parallel | Ubuntu | zesty | * |