First published: Thu Apr 07 2022(Updated: )
An arbitrary file write vulnerability was found in GNU gzip's zgrep utility. When zgrep is applied on the attacker's chosen file name (for example, a crafted file name), this can overwrite an attacker's content to an arbitrary attacker-selected file. This flaw occurs due to insufficient validation when processing filenames with two or more newlines where selected content and the target file names are embedded in crafted multi-line file names. This flaw allows a remote, low privileged attacker to force zgrep to write arbitrary files on the system.
Credit: secalert@redhat.com secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
redhat/gzip | <0:1.5-11.el7_9 | 0:1.5-11.el7_9 |
redhat/xz | <0:5.2.2-2.el7_9 | 0:5.2.2-2.el7_9 |
redhat/gzip | <0:1.9-13.el8_5 | 0:1.9-13.el8_5 |
redhat/xz | <0:5.2.4-4.el8_6 | 0:5.2.4-4.el8_6 |
redhat/gzip | <0:1.9-10.el8_1 | 0:1.9-10.el8_1 |
redhat/xz | <0:5.2.4-4.el8_1 | 0:5.2.4-4.el8_1 |
redhat/gzip | <0:1.9-10.el8_2 | 0:1.9-10.el8_2 |
redhat/xz | <0:5.2.4-4.el8_2 | 0:5.2.4-4.el8_2 |
redhat/gzip | <0:1.9-13.el8_4 | 0:1.9-13.el8_4 |
redhat/xz | <0:5.2.4-4.el8_4 | 0:5.2.4-4.el8_4 |
redhat/xz | <0:5.2.5-8.el9_0 | 0:5.2.5-8.el9_0 |
redhat/gzip | <0:1.10-9.el9_0 | 0:1.10-9.el9_0 |
redhat/redhat-virtualization-host | <0:4.3.23-20220622.0.el7_9 | 0:4.3.23-20220622.0.el7_9 |
GNU gzip | <1.12 | |
Redhat Jboss Data Grid | =7.0.0 | |
Debian Debian Linux | =10.0 | |
Tukaani XZ Utils | ||
redhat/gzip | <1.12 | 1.12 |
IBM Security Guardium | <=11.3 | |
IBM Security Guardium | <=11.4 | |
IBM Security Guardium | <=11.5 | |
Tukaani XZ | <5.2.5 | |
debian/gzip | 1.10-4+deb11u1 1.12-1 1.12-1.1 | |
debian/xz-utils | 5.2.5-2.1~deb11u1 5.4.1-0.2 5.6.3-1 |
Red Hat has investigated whether possible mitigation exists for this issue, and has not been able to identify a practical example. Please update the affected package as soon as possible.
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
(Appears in the following advisories)
CVE-2022-1271 is a vulnerability in Tukaani XZ Utils that allows for remote code execution through argument injection in the xzgrep utility.
If you are using Tukaani XZ Utils and running the xzgrep utility on an attacker-controlled file, this vulnerability could allow the attacker to overwrite content to an arbitrary file.
CVE-2022-1271 has a severity rating of 8.8, which is classified as high.
To fix CVE-2022-1271, you should update Tukaani XZ Utils to the latest version available and apply any patches provided by the vendor.
You can find more information about CVE-2022-1271 on the official CVE website or the vendor's security advisory page.