Gentoo Archives: gentoo-announce

From: glsamaker@g.o
To: gentoo-announce@l.g.o
Subject: [gentoo-announce] [ GLSA 202209-01 ] GNU Gzip, XZ Utils: Arbitrary file write
Date: Wed, 07 Sep 2022 03:06:55
Message-Id: 166251912080.14.12544941515560549381@713d1c2c1be1
1 - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
2 Gentoo Linux Security Advisory GLSA 202209-01
3 - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
4 https://security.gentoo.org/
5 - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
6
7 Severity: High
8 Title: GNU Gzip, XZ Utils: Arbitrary file write
9 Date: September 07, 2022
10 Bugs: #837152, #837155
11 ID: 202209-01
12
13 - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
14
15 Synopsis
16 ========
17
18 A vulnerability has been discovered in GNU Gzip and XZ Utils' grep
19 helpers which could result in writes to arbitrary files.
20
21 Background
22 ==========
23
24 GNU Gzip is a popular data compression program.
25
26 XZ Utils is free general-purpose data compression software with a high
27 compression ratio.
28
29 Affected packages
30 =================
31
32 -------------------------------------------------------------------
33 Package / Vulnerable / Unaffected
34 -------------------------------------------------------------------
35 1 app-arch/gzip < 1.12 >= 1.12
36 2 app-arch/xz-utils < 5.2.5 >= 5.2.5
37
38 Description
39 ===========
40
41 GNU Gzip and XZ Utils' grep helpers do not sufficiently validate certain
42 multi-line file names.
43
44 Impact
45 ======
46
47 In some cases, writing to arbitrary files such as shell initialization files can be escalation to remote code execution.
48
49 Workaround
50 ==========
51
52 Ensuring only trusted input is passed to GNU Gzip and XZ Utils' grep helpers minimizes the potential impact.
53
54 Resolution
55 ==========
56
57 All GNU Gzip users should upgrade to the latest version:
58
59 # emerge --sync
60 # emerge --ask --oneshot --verbose ">=app-arch/gzip-1.12"
61
62 All XZ Utils users should upgrade to the latest version:
63
64 # emerge --sync
65 # emerge --ask --oneshot --verbose ">=app-arch/xz-utils-5.2.5"
66
67 References
68 ==========
69
70 [ 1 ] CVE-2022-1271
71 https://nvd.nist.gov/vuln/detail/CVE-2022-1271
72
73 Availability
74 ============
75
76 This GLSA and any updates to it are available for viewing at
77 the Gentoo Security Website:
78
79 https://security.gentoo.org/glsa/202209-01
80
81 Concerns?
82 =========
83
84 Security is a primary focus of Gentoo Linux and ensuring the
85 confidentiality and security of our users' machines is of utmost
86 importance to us. Any security concerns should be addressed to
87 security@g.o or alternatively, you may file a bug at
88 https://bugs.gentoo.org.
89
90 License
91 =======
92
93 Copyright 2022 Gentoo Foundation, Inc; referenced text
94 belongs to its owner(s).
95
96 The contents of this document are licensed under the
97 Creative Commons - Attribution / Share Alike license.
98
99 https://creativecommons.org/licenses/by-sa/2.5

Attachments

File name MIME type
signature.asc application/pgp-signature