Amazon Linux 2 Security Advisory: ALAS-2022-1782
Advisory Release Date: 2022-04-25 22:56 Pacific
Advisory Updated Date: 2022-04-27 16:34 Pacific
An arbitrary file write vulnerability was found in GNU gzip's zgrep utility. When zgrep is applied on the attacker's chosen file name (for example, a crafted file name), this can overwrite an attacker's content to an arbitrary attacker-selected file. This flaw occurs due to insufficient validation when processing filenames with two or more newlines where selected content and the target file names are embedded in crafted multi-line file names. This flaw allows a remote, low privileged attacker to force zgrep to write arbitrary files on the system. (CVE-2022-1271)
Affected Packages:
gzip, xz
Note:
This advisory is applicable to Amazon Linux 2 (AL2) Core repository. Visit this FAQ section for the difference between AL2 Core and AL2 Extras advisories.
Issue Correction:
Run yum update gzip to update your system.
Run yum update xz to update your system.
aarch64:
gzip-1.5-10.amzn2.0.1.aarch64
gzip-debuginfo-1.5-10.amzn2.0.1.aarch64
xz-5.2.2-1.amzn2.0.3.aarch64
xz-libs-5.2.2-1.amzn2.0.3.aarch64
xz-compat-libs-5.2.2-1.amzn2.0.3.aarch64
xz-devel-5.2.2-1.amzn2.0.3.aarch64
xz-lzma-compat-5.2.2-1.amzn2.0.3.aarch64
xz-debuginfo-5.2.2-1.amzn2.0.3.aarch64
i686:
gzip-1.5-10.amzn2.0.1.i686
gzip-debuginfo-1.5-10.amzn2.0.1.i686
xz-5.2.2-1.amzn2.0.3.i686
xz-libs-5.2.2-1.amzn2.0.3.i686
xz-compat-libs-5.2.2-1.amzn2.0.3.i686
xz-devel-5.2.2-1.amzn2.0.3.i686
xz-lzma-compat-5.2.2-1.amzn2.0.3.i686
xz-debuginfo-5.2.2-1.amzn2.0.3.i686
src:
gzip-1.5-10.amzn2.0.1.src
xz-5.2.2-1.amzn2.0.3.src
x86_64:
gzip-1.5-10.amzn2.0.1.x86_64
gzip-debuginfo-1.5-10.amzn2.0.1.x86_64
xz-5.2.2-1.amzn2.0.3.x86_64
xz-libs-5.2.2-1.amzn2.0.3.x86_64
xz-compat-libs-5.2.2-1.amzn2.0.3.x86_64
xz-devel-5.2.2-1.amzn2.0.3.x86_64
xz-lzma-compat-5.2.2-1.amzn2.0.3.x86_64
xz-debuginfo-5.2.2-1.amzn2.0.3.x86_64