{"id":"JLSEC-2026-61","details":"An arbitrary file write vulnerability was found in GNU gzip's zgrep utility. When zgrep is applied on the attacker's chosen file name (for example, a crafted file name), this can overwrite an attacker's content to an arbitrary attacker-selected file. This flaw occurs due to insufficient validation when processing filenames with two or more newlines where selected content and the target file names are embedded in crafted multi-line file names. This flaw allows a remote, low privileged attacker to force zgrep to write arbitrary files on the system.","modified":"2026-04-08T16:15:06.748431Z","published":"2026-04-08T16:01:54.180Z","upstream":["CVE-2022-1271"],"database_specific":{"license":"CC-BY-4.0","sources":[{"published":"2022-08-31T16:15:09.347Z","html_url":"https://nvd.nist.gov/vuln/detail/CVE-2022-1271","id":"CVE-2022-1271","modified":"2025-06-09T15:15:26.690Z","imported":"2026-04-08T15:40:59.254Z","url":"https://services.nvd.nist.gov/rest/json/cves/2.0?cveId=CVE-2022-1271"}]},"references":[{"type":"WEB","url":"https://access.redhat.com/security/cve/CVE-2022-1271"},{"type":"WEB","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2073310"},{"type":"WEB","url":"https://git.tukaani.org/?p=xz.git%3Ba=commit%3Bh=69d1b3fc29677af8ade8dc15dba83f0589cb63d6"},{"type":"WEB","url":"https://lists.gnu.org/r/bug-gzip/2022-04/msg00011.html"},{"type":"WEB","url":"https://security-tracker.debian.org/tracker/CVE-2022-1271"},{"type":"WEB","url":"https://security.gentoo.org/glsa/202209-01"},{"type":"WEB","url":"https://security.netapp.com/advisory/ntap-20220930-0006/"},{"type":"WEB","url":"https://tukaani.org/xz/xzgrep-ZDI-CAN-16587.patch"},{"type":"WEB","url":"https://www.openwall.com/lists/oss-security/2022/04/07/8"},{"type":"WEB","url":"https://access.redhat.com/security/cve/CVE-2022-1271"},{"type":"WEB","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2073310"},{"type":"WEB","url":"https://git.tukaani.org/?p=xz.git%3Ba=commit%3Bh=69d1b3fc29677af8ade8dc15dba83f0589cb63d6"},{"type":"WEB","url":"https://lists.gnu.org/r/bug-gzip/2022-04/msg00011.html"},{"type":"WEB","url":"https://security-tracker.debian.org/tracker/CVE-2022-1271"},{"type":"WEB","url":"https://security.gentoo.org/glsa/202209-01"},{"type":"WEB","url":"https://security.netapp.com/advisory/ntap-20220930-0006/"},{"type":"WEB","url":"https://tukaani.org/xz/xzgrep-ZDI-CAN-16587.patch"},{"type":"WEB","url":"https://www.openwall.com/lists/oss-security/2022/04/07/8"}],"affected":[{"package":{"name":"Gzip_jll","ecosystem":"Julia","purl":"pkg:julia/Gzip_jll?uuid=be1be57a-8558-53c3-a7e5-50095f79957e"},"ranges":[{"type":"SEMVER","events":[{"introduced":"0"},{"fixed":"1.12.0+0"}]}],"database_specific":{"source":"https://github.com/JuliaLang/SecurityAdvisories.jl/tree/generated/osv/2026/JLSEC-2026-61.json"}},{"package":{"name":"XZ_jll","ecosystem":"Julia","purl":"pkg:julia/XZ_jll?uuid=ffd25f8a-64ca-5728-b0f7-c24cf3aae800"},"ranges":[{"type":"SEMVER","events":[{"introduced":"0"},{"fixed":"5.2.5+0"}]}],"database_specific":{"source":"https://github.com/JuliaLang/SecurityAdvisories.jl/tree/generated/osv/2026/JLSEC-2026-61.json"}}],"schema_version":"1.7.5"}