Lucene search

K
amazonAmazonALAS2-2022-1782
HistoryApr 25, 2022 - 10:56 p.m.

Important: gzip, xz

2022-04-2522:56:00
alas.aws.amazon.com
25
arbitrary file write
gnu gzip
zgrep
vulnerability
gzip
xz
cve-2022-1271
amazon linux 2
al2
update
system
new packages
red hat
mitre
unix

CVSS3

8.8

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

AI Score

8.8

Confidence

High

EPSS

0.012

Percentile

85.7%

Issue Overview:

An arbitrary file write vulnerability was found in GNU gzip’s zgrep utility. When zgrep is applied on the attacker’s chosen file name (for example, a crafted file name), this can overwrite an attacker’s content to an arbitrary attacker-selected file. This flaw occurs due to insufficient validation when processing filenames with two or more newlines where selected content and the target file names are embedded in crafted multi-line file names. This flaw allows a remote, low privileged attacker to force zgrep to write arbitrary files on the system. (CVE-2022-1271)

Affected Packages:

gzip, xz

Note:

This advisory is applicable to Amazon Linux 2 (AL2) Core repository. Visit this FAQ section for the difference between AL2 Core and AL2 Extras advisories.

Issue Correction:
Run yum update gzip to update your system.
Run yum update xz to update your system.

New Packages:

aarch64:  
    gzip-1.5-10.amzn2.0.1.aarch64  
    gzip-debuginfo-1.5-10.amzn2.0.1.aarch64  
    xz-5.2.2-1.amzn2.0.3.aarch64  
    xz-libs-5.2.2-1.amzn2.0.3.aarch64  
    xz-compat-libs-5.2.2-1.amzn2.0.3.aarch64  
    xz-devel-5.2.2-1.amzn2.0.3.aarch64  
    xz-lzma-compat-5.2.2-1.amzn2.0.3.aarch64  
    xz-debuginfo-5.2.2-1.amzn2.0.3.aarch64  
  
i686:  
    gzip-1.5-10.amzn2.0.1.i686  
    gzip-debuginfo-1.5-10.amzn2.0.1.i686  
    xz-5.2.2-1.amzn2.0.3.i686  
    xz-libs-5.2.2-1.amzn2.0.3.i686  
    xz-compat-libs-5.2.2-1.amzn2.0.3.i686  
    xz-devel-5.2.2-1.amzn2.0.3.i686  
    xz-lzma-compat-5.2.2-1.amzn2.0.3.i686  
    xz-debuginfo-5.2.2-1.amzn2.0.3.i686  
  
src:  
    gzip-1.5-10.amzn2.0.1.src  
    xz-5.2.2-1.amzn2.0.3.src  
  
x86_64:  
    gzip-1.5-10.amzn2.0.1.x86_64  
    gzip-debuginfo-1.5-10.amzn2.0.1.x86_64  
    xz-5.2.2-1.amzn2.0.3.x86_64  
    xz-libs-5.2.2-1.amzn2.0.3.x86_64  
    xz-compat-libs-5.2.2-1.amzn2.0.3.x86_64  
    xz-devel-5.2.2-1.amzn2.0.3.x86_64  
    xz-lzma-compat-5.2.2-1.amzn2.0.3.x86_64  
    xz-debuginfo-5.2.2-1.amzn2.0.3.x86_64  

Additional References

Red Hat: CVE-2022-1271

Mitre: CVE-2022-1271

CVSS3

8.8

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

AI Score

8.8

Confidence

High

EPSS

0.012

Percentile

85.7%