![]() ![]() ![]() See How to fix? for RHEL:8 relevant fixed versions and status. Note: Versions mentioned in the description apply only to the upstream krb5-libs package and not the krb5-libs package as distributed by RHEL. This issue was patched in RHSA-2022:1537. Upgrade RHEL:8 gzip to version 0:1.9-13.el8_5 or higher. This flaw allows a remote, low privileged attacker to force zgrep to write arbitrary files on the system. ![]() This flaw occurs due to insufficient validation when processing filenames with two or more newlines where selected content and the target file names are embedded in crafted multi-line file names. When zgrep is applied on the attacker's chosen file name (for example, a crafted file name), this can overwrite an attacker's content to an arbitrary attacker-selected file. See How to fix? for RHEL:8 relevant fixed versions and status.Īn arbitrary file write vulnerability was found in GNU gzip's zgrep utility. Note: Versions mentioned in the description apply only to the upstream gzip package and not the gzip package as distributed by RHEL. ![]()
0 Comments
Leave a Reply. |
Details
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |