Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

suse-cvrf логотип

SUSE-SU-2022:1160-1

Опубликовано: 12 апр. 2022
Источник: suse-cvrf

Описание

Security update for xz

This update for xz fixes the following issues:

  • CVE-2022-1271: Fixed an incorrect escaping of malicious filenames (ZDI-CAN-16587). (bsc#1198062)

Список пакетов

Container suse/ltss/sle12.5/sles12sp5:latest
liblzma5-5.0.5-6.7.1
Container suse/sles12sp3:latest
liblzma5-5.0.5-6.7.1
xz-5.0.5-6.7.1
Container suse/sles12sp4:latest
liblzma5-5.0.5-6.7.1
Container suse/sles12sp5:latest
liblzma5-5.0.5-6.7.1
HPE Helion OpenStack 8
liblzma5-5.0.5-6.7.1
liblzma5-32bit-5.0.5-6.7.1
xz-5.0.5-6.7.1
xz-lang-5.0.5-6.7.1
Image SLES12-SP4-Azure-BYOS
liblzma5-5.0.5-6.7.1
xz-5.0.5-6.7.1
Image SLES12-SP4-SAP-Azure-BYOS
liblzma5-5.0.5-6.7.1
xz-5.0.5-6.7.1
Image SLES12-SP4-SAP-Azure-LI-BYOS-Production
liblzma5-5.0.5-6.7.1
xz-5.0.5-6.7.1
Image SLES12-SP4-SAP-Azure-VLI-BYOS-Production
liblzma5-5.0.5-6.7.1
liblzma5-32bit-5.0.5-6.7.1
xz-5.0.5-6.7.1
Image SLES12-SP5-Azure-BYOS
liblzma5-5.0.5-6.7.1
xz-5.0.5-6.7.1
Image SLES12-SP5-Azure-Basic-On-Demand
liblzma5-5.0.5-6.7.1
xz-5.0.5-6.7.1
Image SLES12-SP5-Azure-HPC-BYOS
liblzma5-5.0.5-6.7.1
xz-5.0.5-6.7.1
Image SLES12-SP5-Azure-HPC-On-Demand
liblzma5-5.0.5-6.7.1
xz-5.0.5-6.7.1
Image SLES12-SP5-Azure-SAP-BYOS
liblzma5-5.0.5-6.7.1
xz-5.0.5-6.7.1
Image SLES12-SP5-Azure-SAP-On-Demand
liblzma5-5.0.5-6.7.1
xz-5.0.5-6.7.1
Image SLES12-SP5-Azure-Standard-On-Demand
liblzma5-5.0.5-6.7.1
xz-5.0.5-6.7.1
Image SLES12-SP5-EC2-BYOS
liblzma5-5.0.5-6.7.1
xz-5.0.5-6.7.1
Image SLES12-SP5-EC2-ECS-On-Demand
liblzma5-5.0.5-6.7.1
xz-5.0.5-6.7.1
Image SLES12-SP5-EC2-On-Demand
liblzma5-5.0.5-6.7.1
xz-5.0.5-6.7.1
Image SLES12-SP5-EC2-SAP-BYOS
liblzma5-5.0.5-6.7.1
xz-5.0.5-6.7.1
Image SLES12-SP5-EC2-SAP-On-Demand
liblzma5-5.0.5-6.7.1
xz-5.0.5-6.7.1
Image SLES12-SP5-GCE-BYOS
liblzma5-5.0.5-6.7.1
xz-5.0.5-6.7.1
Image SLES12-SP5-GCE-On-Demand
liblzma5-5.0.5-6.7.1
xz-5.0.5-6.7.1
Image SLES12-SP5-GCE-SAP-BYOS
liblzma5-5.0.5-6.7.1
xz-5.0.5-6.7.1
Image SLES12-SP5-GCE-SAP-On-Demand
liblzma5-5.0.5-6.7.1
xz-5.0.5-6.7.1
Image SLES12-SP5-SAP-Azure-LI-BYOS-Production
liblzma5-5.0.5-6.7.1
xz-5.0.5-6.7.1
Image SLES12-SP5-SAP-Azure-VLI-BYOS-Production
liblzma5-5.0.5-6.7.1
liblzma5-32bit-5.0.5-6.7.1
xz-5.0.5-6.7.1
SUSE Linux Enterprise Server 12 SP2-BCL
liblzma5-5.0.5-6.7.1
liblzma5-32bit-5.0.5-6.7.1
xz-5.0.5-6.7.1
xz-lang-5.0.5-6.7.1
SUSE Linux Enterprise Server 12 SP3-BCL
liblzma5-5.0.5-6.7.1
liblzma5-32bit-5.0.5-6.7.1
xz-5.0.5-6.7.1
xz-lang-5.0.5-6.7.1
SUSE Linux Enterprise Server 12 SP3-LTSS
liblzma5-5.0.5-6.7.1
liblzma5-32bit-5.0.5-6.7.1
xz-5.0.5-6.7.1
xz-lang-5.0.5-6.7.1
SUSE Linux Enterprise Server 12 SP4-LTSS
liblzma5-5.0.5-6.7.1
liblzma5-32bit-5.0.5-6.7.1
xz-5.0.5-6.7.1
xz-lang-5.0.5-6.7.1
SUSE Linux Enterprise Server 12 SP5
liblzma5-5.0.5-6.7.1
liblzma5-32bit-5.0.5-6.7.1
xz-5.0.5-6.7.1
xz-lang-5.0.5-6.7.1
SUSE Linux Enterprise Server for SAP Applications 12 SP3
liblzma5-5.0.5-6.7.1
liblzma5-32bit-5.0.5-6.7.1
xz-5.0.5-6.7.1
xz-lang-5.0.5-6.7.1
SUSE Linux Enterprise Server for SAP Applications 12 SP4
liblzma5-5.0.5-6.7.1
liblzma5-32bit-5.0.5-6.7.1
xz-5.0.5-6.7.1
xz-lang-5.0.5-6.7.1
SUSE Linux Enterprise Server for SAP Applications 12 SP5
liblzma5-5.0.5-6.7.1
liblzma5-32bit-5.0.5-6.7.1
xz-5.0.5-6.7.1
xz-lang-5.0.5-6.7.1
SUSE Linux Enterprise Software Development Kit 12 SP5
xz-devel-5.0.5-6.7.1
SUSE OpenStack Cloud 8
liblzma5-5.0.5-6.7.1
liblzma5-32bit-5.0.5-6.7.1
xz-5.0.5-6.7.1
xz-lang-5.0.5-6.7.1
SUSE OpenStack Cloud 9
liblzma5-5.0.5-6.7.1
liblzma5-32bit-5.0.5-6.7.1
xz-5.0.5-6.7.1
xz-lang-5.0.5-6.7.1
SUSE OpenStack Cloud Crowbar 8
liblzma5-5.0.5-6.7.1
liblzma5-32bit-5.0.5-6.7.1
xz-5.0.5-6.7.1
xz-lang-5.0.5-6.7.1
SUSE OpenStack Cloud Crowbar 9
liblzma5-5.0.5-6.7.1
liblzma5-32bit-5.0.5-6.7.1
xz-5.0.5-6.7.1
xz-lang-5.0.5-6.7.1

Описание

An arbitrary file write vulnerability was found in GNU gzip's zgrep utility. When zgrep is applied on the attacker's chosen file name (for example, a crafted file name), this can overwrite an attacker's content to an arbitrary attacker-selected file. This flaw occurs due to insufficient validation when processing filenames with two or more newlines where selected content and the target file names are embedded in crafted multi-line file names. This flaw allows a remote, low privileged attacker to force zgrep to write arbitrary files on the system.


Затронутые продукты
Container suse/ltss/sle12.5/sles12sp5:latest:liblzma5-5.0.5-6.7.1
Container suse/sles12sp3:latest:liblzma5-5.0.5-6.7.1
Container suse/sles12sp3:latest:xz-5.0.5-6.7.1
Container suse/sles12sp4:latest:liblzma5-5.0.5-6.7.1

Ссылки
Уязвимость SUSE-SU-2022:1160-1