lesspipe before 2.06 allows attackers to execute code via Perl Storable (pst) files, because of deserialized object destructor execution via a key/value pair in a hash.
The product deserializes untrusted data without sufficiently ensuring that the resulting data will be valid.
Link | Tags |
---|---|
https://bugs.gentoo.org/865631 | issue tracking third party advisory patch |
https://github.com/wofr06/lesspipe/releases/tag/v2.06 | third party advisory release notes |
https://security.gentoo.org/glsa/202211-02 | third party advisory vendor advisory |