CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
LOW
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
HIGH
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
EPSS
Percentile
85.7%
Severity: High
Date : 2022-04-07
CVE-ID : CVE-2022-1271
Package : xz
Type : arbitrary command execution
Remote : No
Link : https://security.archlinux.org/AVG-2665
The package xz before version 5.2.5-3 is vulnerable to arbitrary
command execution.
Upgrade to 5.2.5-3.
The problem has been fixed upstream but no release is available yet.
None.
Malicious filenames with two or more newlines can make zgrep and xzgrep
to write to arbitrary files or (with a GNU sed extension) lead to
arbitrary code execution. The issue with the old code is that with
multiple newlines, the N-command will read the second line of input,
then the s-commands will be skipped because it’s not the end of the
file yet, then a new sed cycle starts and the pattern space is printed
and emptied. So only the last line or two get escaped.
An attacker is able to provide malicious filenames to write to
arbitrary files or execute arbitrary commands on the affected host.
https://git.savannah.gnu.org/cgit/gzip.git/commit/?id=dc9740df61e575e8c3148b7bd3c147a81ea00c7c
https://savannah.gnu.org/forum/forum.php?forum_id=10157
https://git.tukaani.org/?p=xz.git;a=commit;h=69d1b3fc29677af8ade8dc15dba83f0589cb63d6
https://tukaani.org/xz/xzgrep-ZDI-CAN-16587.patch
https://tukaani.org/xz/xzgrep-ZDI-CAN-16587.patch.sig
https://security.archlinux.org/CVE-2022-1271
git.savannah.gnu.org/cgit/gzip.git/commit/?id=dc9740df61e575e8c3148b7bd3c147a81ea00c7c
git.tukaani.org/?p=xz.git;a=commit;h=69d1b3fc29677af8ade8dc15dba83f0589cb63d6
savannah.gnu.org/forum/forum.php?forum_id=10157
security.archlinux.org/AVG-2665
security.archlinux.org/CVE-2022-1271
tukaani.org/xz/xzgrep-ZDI-CAN-16587.patch
tukaani.org/xz/xzgrep-ZDI-CAN-16587.patch.sig