8.8 High
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
LOW
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
HIGH
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
6.5 Medium
CVSS2
Access Vector
NETWORK
Access Complexity
LOW
Authentication
SINGLE
Confidentiality Impact
PARTIAL
Integrity Impact
PARTIAL
Availability Impact
PARTIAL
AV:N/AC:L/Au:S/C:P/I:P/A:P
0.007 Low
EPSS
Percentile
80.3%
Issue Overview:
An arbitrary file write vulnerability was found in GNU gzip’s zgrep utility. When zgrep is applied on the attacker’s chosen file name (for example, a crafted file name), this can overwrite an attacker’s content to an arbitrary attacker-selected file. This flaw occurs due to insufficient validation when processing filenames with two or more newlines where selected content and the target file names are embedded in crafted multi-line file names. This flaw allows a remote, low privileged attacker to force zgrep to write arbitrary files on the system. (CVE-2022-1271)
Affected Packages:
xz
Issue Correction:
Run yum update xz to update your system.
New Packages:
i686:
xz-debuginfo-5.2.2-1.14.amzn1.i686
xz-devel-5.2.2-1.14.amzn1.i686
xz-5.2.2-1.14.amzn1.i686
xz-lzma-compat-5.2.2-1.14.amzn1.i686
xz-compat-libs-5.2.2-1.14.amzn1.i686
xz-libs-5.2.2-1.14.amzn1.i686
src:
xz-5.2.2-1.14.amzn1.src
x86_64:
xz-lzma-compat-5.2.2-1.14.amzn1.x86_64
xz-libs-5.2.2-1.14.amzn1.x86_64
xz-compat-libs-5.2.2-1.14.amzn1.x86_64
xz-5.2.2-1.14.amzn1.x86_64
xz-debuginfo-5.2.2-1.14.amzn1.x86_64
xz-devel-5.2.2-1.14.amzn1.x86_64
Red Hat: CVE-2022-1271
Mitre: CVE-2022-1271
OS | Version | Architecture | Package | Version | Filename |
---|---|---|---|---|---|
Amazon Linux | 1 | i686 | xz-debuginfo | < 5.2.2-1.14.amzn1 | xz-debuginfo-5.2.2-1.14.amzn1.i686.rpm |
Amazon Linux | 1 | i686 | xz-devel | < 5.2.2-1.14.amzn1 | xz-devel-5.2.2-1.14.amzn1.i686.rpm |
Amazon Linux | 1 | i686 | xz | < 5.2.2-1.14.amzn1 | xz-5.2.2-1.14.amzn1.i686.rpm |
Amazon Linux | 1 | i686 | xz-lzma-compat | < 5.2.2-1.14.amzn1 | xz-lzma-compat-5.2.2-1.14.amzn1.i686.rpm |
Amazon Linux | 1 | i686 | xz-compat-libs | < 5.2.2-1.14.amzn1 | xz-compat-libs-5.2.2-1.14.amzn1.i686.rpm |
Amazon Linux | 1 | i686 | xz-libs | < 5.2.2-1.14.amzn1 | xz-libs-5.2.2-1.14.amzn1.i686.rpm |
Amazon Linux | 1 | x86_64 | xz-lzma-compat | < 5.2.2-1.14.amzn1 | xz-lzma-compat-5.2.2-1.14.amzn1.x86_64.rpm |
Amazon Linux | 1 | x86_64 | xz-libs | < 5.2.2-1.14.amzn1 | xz-libs-5.2.2-1.14.amzn1.x86_64.rpm |
Amazon Linux | 1 | x86_64 | xz-compat-libs | < 5.2.2-1.14.amzn1 | xz-compat-libs-5.2.2-1.14.amzn1.x86_64.rpm |
Amazon Linux | 1 | x86_64 | xz | < 5.2.2-1.14.amzn1 | xz-5.2.2-1.14.amzn1.x86_64.rpm |
8.8 High
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
LOW
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
HIGH
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
6.5 Medium
CVSS2
Access Vector
NETWORK
Access Complexity
LOW
Authentication
SINGLE
Confidentiality Impact
PARTIAL
Integrity Impact
PARTIAL
Availability Impact
PARTIAL
AV:N/AC:L/Au:S/C:P/I:P/A:P
0.007 Low
EPSS
Percentile
80.3%