{"id":"UBUNTU-CVE-2022-1271","details":"An arbitrary file write vulnerability was found in GNU gzip's zgrep utility. When zgrep is applied on the attacker's chosen file name (for example, a crafted file name), this can overwrite an attacker's content to an arbitrary attacker-selected file. This flaw occurs due to insufficient validation when processing filenames with two or more newlines where selected content and the target file names are embedded in crafted multi-line file names. This flaw allows a remote, low privileged attacker to force zgrep to write arbitrary files on the system.","modified":"2026-01-30T01:57:20.620760Z","published":"2022-04-07T00:00:00Z","related":["USN-5378-1","USN-5378-2","USN-5378-3","USN-5378-4"],"upstream":["CVE-2022-1271"],"references":[{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2022-1271"},{"type":"REPORT","url":"https://www.openwall.com/lists/oss-security/2022/04/07/8"},{"type":"REPORT","url":"https://lists.gnu.org/r/bug-gzip/2022-04/msg00011.html"},{"type":"ADVISORY","url":"https://ubuntu.com/security/notices/USN-5378-1"},{"type":"ADVISORY","url":"https://ubuntu.com/security/notices/USN-5378-2"},{"type":"ADVISORY","url":"https://ubuntu.com/security/notices/USN-5378-3"},{"type":"ADVISORY","url":"https://ubuntu.com/security/notices/USN-5378-4"},{"type":"REPORT","url":"https://www.cve.org/CVERecord?id=CVE-2022-1271"}],"affected":[{"package":{"name":"gzip","ecosystem":"Ubuntu:Pro:14.04:LTS","purl":"pkg:deb/ubuntu/gzip@1.6-3ubuntu1+esm1?arch=source&distro=trusty/esm"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"1.6-3ubuntu1+esm1"}]}],"versions":["1.6-2ubuntu1","1.6-3ubuntu1"],"ecosystem_specific":{"availability":"Available with Ubuntu Pro (Infra-only): https://ubuntu.com/pro","binaries":[{"binary_version":"1.6-3ubuntu1+esm1","binary_name":"gzip"}]},"database_specific":{"source":"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/cve/2022/UBUNTU-CVE-2022-1271.json"}},{"package":{"name":"xz-utils","ecosystem":"Ubuntu:Pro:14.04:LTS","purl":"pkg:deb/ubuntu/xz-utils@5.1.1alpha+20120614-2ubuntu2.14.04.1+esm1?arch=source&distro=trusty/esm"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"5.1.1alpha+20120614-2ubuntu2.14.04.1+esm1"}]}],"versions":["5.1.1alpha+20120614-2ubuntu1","5.1.1alpha+20120614-2ubuntu2"],"ecosystem_specific":{"availability":"Available with Ubuntu Pro (Infra-only): https://ubuntu.com/pro","binaries":[{"binary_version":"5.1.1alpha+20120614-2ubuntu2.14.04.1+esm1","binary_name":"liblzma-dev"},{"binary_version":"5.1.1alpha+20120614-2ubuntu2.14.04.1+esm1","binary_name":"liblzma5"},{"binary_version":"5.1.1alpha+20120614-2ubuntu2.14.04.1+esm1","binary_name":"xz-utils"},{"binary_version":"5.1.1alpha+20120614-2ubuntu2.14.04.1+esm1","binary_name":"xzdec"}]},"database_specific":{"source":"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/cve/2022/UBUNTU-CVE-2022-1271.json"}},{"package":{"name":"gzip","ecosystem":"Ubuntu:Pro:16.04:LTS","purl":"pkg:deb/ubuntu/gzip@1.6-4ubuntu1+esm1?arch=source&distro=esm-infra/xenial"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"1.6-4ubuntu1+esm1"}]}],"versions":["1.6-4ubuntu1"],"ecosystem_specific":{"availability":"Available with Ubuntu Pro (Infra-only): https://ubuntu.com/pro","binaries":[{"binary_version":"1.6-4ubuntu1+esm1","binary_name":"gzip"}]},"database_specific":{"source":"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/cve/2022/UBUNTU-CVE-2022-1271.json"}},{"package":{"name":"xz-utils","ecosystem":"Ubuntu:Pro:16.04:LTS","purl":"pkg:deb/ubuntu/xz-utils@5.1.1alpha+20120614-2ubuntu2.16.04.1+esm1?arch=source&distro=esm-infra/xenial"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"5.1.1alpha+20120614-2ubuntu2.16.04.1+esm1"}]}],"versions":["5.1.1alpha+20120614-2ubuntu2"],"ecosystem_specific":{"availability":"Available with Ubuntu Pro (Infra-only): https://ubuntu.com/pro","binaries":[{"binary_version":"5.1.1alpha+20120614-2ubuntu2.16.04.1+esm1","binary_name":"liblzma-dev"},{"binary_version":"5.1.1alpha+20120614-2ubuntu2.16.04.1+esm1","binary_name":"liblzma5"},{"binary_version":"5.1.1alpha+20120614-2ubuntu2.16.04.1+esm1","binary_name":"xz-utils"},{"binary_version":"5.1.1alpha+20120614-2ubuntu2.16.04.1+esm1","binary_name":"xzdec"}]},"database_specific":{"source":"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/cve/2022/UBUNTU-CVE-2022-1271.json"}},{"package":{"name":"gzip","ecosystem":"Ubuntu:18.04:LTS","purl":"pkg:deb/ubuntu/gzip@1.6-5ubuntu1.2?arch=source&distro=bionic"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"1.6-5ubuntu1.2"}]}],"versions":["1.6-5ubuntu1","1.6-5ubuntu1.1"],"ecosystem_specific":{"availability":"No subscription required","binaries":[{"binary_version":"1.6-5ubuntu1.2","binary_name":"gzip"},{"binary_version":"1.6-5ubuntu1.2","binary_name":"gzip-win32"}]},"database_specific":{"source":"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/cve/2022/UBUNTU-CVE-2022-1271.json"}},{"package":{"name":"xz-utils","ecosystem":"Ubuntu:18.04:LTS","purl":"pkg:deb/ubuntu/xz-utils@5.2.2-1.3ubuntu0.1?arch=source&distro=bionic"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"5.2.2-1.3ubuntu0.1"}]}],"versions":["5.2.2-1.3"],"ecosystem_specific":{"availability":"No subscription required","binaries":[{"binary_version":"5.2.2-1.3ubuntu0.1","binary_name":"liblzma-dev"},{"binary_version":"5.2.2-1.3ubuntu0.1","binary_name":"liblzma5"},{"binary_version":"5.2.2-1.3ubuntu0.1","binary_name":"xz-utils"},{"binary_version":"5.2.2-1.3ubuntu0.1","binary_name":"xzdec"}]},"database_specific":{"source":"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/cve/2022/UBUNTU-CVE-2022-1271.json"}},{"package":{"name":"gzip","ecosystem":"Ubuntu:20.04:LTS","purl":"pkg:deb/ubuntu/gzip@1.10-0ubuntu4.1?arch=source&distro=focal"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"1.10-0ubuntu4.1"}]}],"versions":["1.10-0ubuntu3","1.10-0ubuntu4"],"ecosystem_specific":{"availability":"No subscription required","binaries":[{"binary_version":"1.10-0ubuntu4.1","binary_name":"gzip"},{"binary_version":"1.10-0ubuntu4.1","binary_name":"gzip-win32"}]},"database_specific":{"source":"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/cve/2022/UBUNTU-CVE-2022-1271.json"}},{"package":{"name":"xz-utils","ecosystem":"Ubuntu:20.04:LTS","purl":"pkg:deb/ubuntu/xz-utils@5.2.4-1ubuntu1.1?arch=source&distro=focal"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"5.2.4-1ubuntu1.1"}]}],"versions":["5.2.4-1","5.2.4-1ubuntu1"],"ecosystem_specific":{"availability":"No subscription required","binaries":[{"binary_version":"5.2.4-1ubuntu1.1","binary_name":"liblzma-dev"},{"binary_version":"5.2.4-1ubuntu1.1","binary_name":"liblzma5"},{"binary_version":"5.2.4-1ubuntu1.1","binary_name":"xz-utils"},{"binary_version":"5.2.4-1ubuntu1.1","binary_name":"xzdec"}]},"database_specific":{"source":"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/cve/2022/UBUNTU-CVE-2022-1271.json"}},{"package":{"name":"gzip","ecosystem":"Ubuntu:22.04:LTS","purl":"pkg:deb/ubuntu/gzip@1.10-4ubuntu4?arch=source&distro=jammy"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"1.10-4ubuntu4"}]}],"versions":["1.10-4ubuntu1","1.10-4ubuntu2","1.10-4ubuntu3"],"ecosystem_specific":{"availability":"No subscription required","binaries":[{"binary_version":"1.10-4ubuntu4","binary_name":"gzip"},{"binary_version":"1.10-4ubuntu4","binary_name":"gzip-win32"}]},"database_specific":{"source":"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/cve/2022/UBUNTU-CVE-2022-1271.json"}},{"package":{"name":"xz-utils","ecosystem":"Ubuntu:22.04:LTS","purl":"pkg:deb/ubuntu/xz-utils@5.2.5-2ubuntu1?arch=source&distro=jammy"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"5.2.5-2ubuntu1"}]}],"versions":["5.2.5-2","5.2.5-2build1","5.2.5-2build2"],"ecosystem_specific":{"availability":"No subscription required","binaries":[{"binary_version":"5.2.5-2ubuntu1","binary_name":"liblzma-dev"},{"binary_version":"5.2.5-2ubuntu1","binary_name":"liblzma5"},{"binary_version":"5.2.5-2ubuntu1","binary_name":"xz-utils"},{"binary_version":"5.2.5-2ubuntu1","binary_name":"xzdec"}]},"database_specific":{"source":"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/cve/2022/UBUNTU-CVE-2022-1271.json"}}],"schema_version":"1.7.3","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"type":"Ubuntu","score":"medium"}]}