CVE-2022-1271

Source
https://nvd.nist.gov/vuln/detail/CVE-2022-1271
Import Source
https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2022-1271.json
JSON Data
https://api.test.osv.dev/v1/vulns/CVE-2022-1271
Downstream
Related
Published
2022-08-31T16:15:09Z
Modified
2025-10-07T23:41:10.949320Z
Severity
  • 8.8 (High) CVSS_V3 - CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H CVSS Calculator
Summary
[none]
Details

An arbitrary file write vulnerability was found in GNU gzip's zgrep utility. When zgrep is applied on the attacker's chosen file name (for example, a crafted file name), this can overwrite an attacker's content to an arbitrary attacker-selected file. This flaw occurs due to insufficient validation when processing filenames with two or more newlines where selected content and the target file names are embedded in crafted multi-line file names. This flaw allows a remote, low privileged attacker to force zgrep to write arbitrary files on the system.

References

Affected packages

Git / git.tukaani.org/xz.git

Affected ranges

Type
GIT
Repo
https://git.tukaani.org/xz.git
Events
Introduced
0 Unknown introduced commit / All previous commits are affected
Fixed
2327a461e1afce862c22269b80d3517801103c1b

Affected versions

v4.*

v4.42.2alpha
v4.999.3alpha
v4.999.5alpha
v4.999.7beta
v4.999.8beta
v4.999.9beta

v5.*

v5.0.0
v5.1.0alpha
v5.1.1alpha
v5.1.2alpha
v5.1.3alpha
v5.1.4beta
v5.2.0
v5.2.1
v5.2.2
v5.2.3
v5.2.4