{
  "threat_severity" : "Important",
  "public_date" : "2022-04-07T00:00:00Z",
  "bugzilla" : {
    "description" : "gzip: arbitrary-file-write vulnerability",
    "id" : "2073310",
    "url" : "https://bugzilla.redhat.com/show_bug.cgi?id=2073310"
  },
  "cvss3" : {
    "cvss3_base_score" : "8.8",
    "cvss3_scoring_vector" : "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
    "status" : "verified"
  },
  "cwe" : "CWE-73",
  "details" : [ "An arbitrary file write vulnerability was found in GNU gzip's zgrep utility. When zgrep is applied on the attacker's chosen file name (for example, a crafted file name), this can overwrite an attacker's content to an arbitrary attacker-selected file. This flaw occurs due to insufficient validation when processing filenames with two or more newlines where selected content and the target file names are embedded in crafted multi-line file names. This flaw allows a remote, low privileged attacker to force zgrep to write arbitrary files on the system.", "An arbitrary file write vulnerability was found in GNU gzip's zgrep utility. When zgrep is applied on the attacker's chosen file name (for example, a crafted file name), this can overwrite an attacker's content to an arbitrary attacker-selected file. This flaw occurs due to insufficient validation when processing filenames with two or more newlines where selected content and the target file names are embedded in crafted multi-line file names. This flaw allows a remote, low privileged attacker to force zgrep to write arbitrary files on the system." ],
  "statement" : "This bug was introduced in gzip-1.3.10 and is relatively hard to exploit.\nRed Hat Enterprise Linux 6 was affected but Out of Support Cycle because gzip was not listed in Red Hat Enterprise Linux 6 ELS Inclusion List.\nhttps://access.redhat.com/articles/4997301",
  "affected_release" : [ {
    "product_name" : "Red Hat Enterprise Linux 7",
    "release_date" : "2022-05-11T00:00:00Z",
    "advisory" : "RHSA-2022:2191",
    "cpe" : "cpe:/o:redhat:enterprise_linux:7",
    "package" : "gzip-0:1.5-11.el7_9"
  }, {
    "product_name" : "Red Hat Enterprise Linux 7",
    "release_date" : "2022-06-15T00:00:00Z",
    "advisory" : "RHSA-2022:5052",
    "cpe" : "cpe:/o:redhat:enterprise_linux:7",
    "package" : "xz-0:5.2.2-2.el7_9"
  }, {
    "product_name" : "Red Hat Enterprise Linux 8",
    "release_date" : "2022-04-26T00:00:00Z",
    "advisory" : "RHSA-2022:1537",
    "cpe" : "cpe:/o:redhat:enterprise_linux:8",
    "package" : "gzip-0:1.9-13.el8_5"
  }, {
    "product_name" : "Red Hat Enterprise Linux 8",
    "release_date" : "2022-06-13T00:00:00Z",
    "advisory" : "RHSA-2022:4991",
    "cpe" : "cpe:/o:redhat:enterprise_linux:8",
    "package" : "xz-0:5.2.4-4.el8_6"
  }, {
    "product_name" : "Red Hat Enterprise Linux 8.1 Update Services for SAP Solutions",
    "release_date" : "2022-04-26T00:00:00Z",
    "advisory" : "RHSA-2022:1592",
    "cpe" : "cpe:/o:redhat:rhel_e4s:8.1",
    "package" : "gzip-0:1.9-10.el8_1"
  }, {
    "product_name" : "Red Hat Enterprise Linux 8.1 Update Services for SAP Solutions",
    "release_date" : "2022-06-13T00:00:00Z",
    "advisory" : "RHSA-2022:4994",
    "cpe" : "cpe:/o:redhat:rhel_e4s:8.1",
    "package" : "xz-0:5.2.4-4.el8_1"
  }, {
    "product_name" : "Red Hat Enterprise Linux 8.2 Extended Update Support",
    "release_date" : "2022-05-02T00:00:00Z",
    "advisory" : "RHSA-2022:1665",
    "cpe" : "cpe:/o:redhat:rhel_eus:8.2",
    "package" : "gzip-0:1.9-10.el8_2"
  }, {
    "product_name" : "Red Hat Enterprise Linux 8.2 Extended Update Support",
    "release_date" : "2022-06-13T00:00:00Z",
    "advisory" : "RHSA-2022:4992",
    "cpe" : "cpe:/o:redhat:rhel_eus:8.2",
    "package" : "xz-0:5.2.4-4.el8_2"
  }, {
    "product_name" : "Red Hat Enterprise Linux 8.4 Extended Update Support",
    "release_date" : "2022-05-03T00:00:00Z",
    "advisory" : "RHSA-2022:1676",
    "cpe" : "cpe:/o:redhat:rhel_eus:8.4",
    "package" : "gzip-0:1.9-13.el8_4"
  }, {
    "product_name" : "Red Hat Enterprise Linux 8.4 Extended Update Support",
    "release_date" : "2022-06-13T00:00:00Z",
    "advisory" : "RHSA-2022:4993",
    "cpe" : "cpe:/o:redhat:rhel_eus:8.4",
    "package" : "xz-0:5.2.4-4.el8_4"
  }, {
    "product_name" : "Red Hat Enterprise Linux 9",
    "release_date" : "2022-06-08T00:00:00Z",
    "advisory" : "RHSA-2022:4940",
    "cpe" : "cpe:/a:redhat:enterprise_linux:9",
    "package" : "xz-0:5.2.5-8.el9_0"
  }, {
    "product_name" : "Red Hat Enterprise Linux 9",
    "release_date" : "2022-05-17T00:00:00Z",
    "advisory" : "RHSA-2022:4582",
    "cpe" : "cpe:/o:redhat:enterprise_linux:9",
    "package" : "gzip-0:1.10-9.el9_0"
  }, {
    "product_name" : "Red Hat Enterprise Linux 9",
    "release_date" : "2022-06-08T00:00:00Z",
    "advisory" : "RHSA-2022:4940",
    "cpe" : "cpe:/o:redhat:enterprise_linux:9",
    "package" : "xz-0:5.2.5-8.el9_0"
  }, {
    "product_name" : "Red Hat Virtualization 4 for Red Hat Enterprise Linux 7",
    "release_date" : "2022-07-01T00:00:00Z",
    "advisory" : "RHSA-2022:5439",
    "cpe" : "cpe:/o:redhat:enterprise_linux:7::hypervisor",
    "package" : "redhat-virtualization-host-0:4.3.23-20220622.0.el7_9"
  }, {
    "product_name" : "Red Hat Virtualization 4 for Red Hat Enterprise Linux 8",
    "release_date" : "2022-06-03T00:00:00Z",
    "advisory" : "RHSA-2022:4896",
    "cpe" : "cpe:/o:redhat:rhev_hypervisor:4.4::el8",
    "package" : "redhat-virtualization-host-0:4.5.0-202205291010_8.6"
  } ],
  "package_state" : [ {
    "product_name" : "Red Hat Enterprise Linux 6",
    "fix_state" : "Out of support scope",
    "package_name" : "gzip",
    "cpe" : "cpe:/o:redhat:enterprise_linux:6"
  }, {
    "product_name" : "Red Hat Enterprise Linux 6",
    "fix_state" : "Out of support scope",
    "package_name" : "xz",
    "cpe" : "cpe:/o:redhat:enterprise_linux:6"
  }, {
    "product_name" : "Red Hat JBoss Data Grid 7",
    "fix_state" : "Affected",
    "package_name" : "gzip",
    "cpe" : "cpe:/a:redhat:jboss_data_grid:7"
  } ],
  "references" : [ "https://www.cve.org/CVERecord?id=CVE-2022-1271\nhttps://nvd.nist.gov/vuln/detail/CVE-2022-1271" ],
  "name" : "CVE-2022-1271",
  "mitigation" : {
    "value" : "Red Hat has investigated whether possible mitigation exists for this issue, and has not been able to identify a practical example. Please update the affected package as soon as possible.",
    "lang" : "en:us"
  },
  "csaw" : false
}