eza: Arbitrary Code Execution — GLSA 202412-19

A vulnerability has been discovered in eza, which can lead to arbitrary code execution.

Affected packages

sys-apps/eza on all architectures
Affected versions < 0.18.6
Unaffected versions >= 0.18.6

Background

eza is a modern, maintained replacement for ls, written in rust.

Description

A vulnerability has been discovered in eza. Please review the CVE identifier referenced below for details.

Impact

A buffer overflow vulnerability in eza allows local attackers to execute arbitrary code via the .git/HEAD, .git/refs, and .git/objects components.

Workaround

There is no known workaround at this time.

Resolution

All eza users should upgrade to the latest version:

 # emerge --sync
 # emerge --ask --oneshot --verbose ">=sys-apps/eza-0.18.6"
 

References

Release date
December 11, 2024

Latest revision
December 11, 2024: 1

Severity
normal

Exploitable
local

Bugzilla entries