-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256

===========================================================================
             AUSCERT External Security Bulletin Redistribution

                               ESB-2022.1671
                           gzip security update
                               19 April 2022

===========================================================================

        AusCERT Security Bulletin Summary
        ---------------------------------

Product:           gzip
Publisher:         Debian
Operating System:  Debian GNU/Linux
Resolution:        Patch/Upgrade
CVE Names:         CVE-2022-1271  

Original Bulletin: 
   http://www.debian.org/security/2022/dsa-5122

Comment: CVSS (Max):  7.1 CVE-2022-1271 (CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H)
         CVSS Source: Red Hat
         Calculator:  https://www.first.org/cvss/calculator/3.1#CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H

- --------------------------BEGIN INCLUDED TEXT--------------------

- -----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA512

- - -------------------------------------------------------------------------
Debian Security Advisory DSA-5122-1                   security@debian.org
https://www.debian.org/security/                     Salvatore Bonaccorso
April 18, 2022                        https://www.debian.org/security/faq
- - -------------------------------------------------------------------------

Package        : gzip
CVE ID         : CVE-2022-1271
Debian Bug     : 1009168

cleemy desu wayo reported that incorrect handling of filenames by zgrep
in gzip, the GNU compression utilities, can result in overwrite of
arbitrary files or execution of arbitrary code if a file with a
specially crafted filename is processed.

For the oldstable distribution (buster), this problem has been fixed
in version 1.9-3+deb10u1.

For the stable distribution (bullseye), this problem has been fixed in
version 1.10-4+deb11u1.

We recommend that you upgrade your gzip packages.

For the detailed security status of gzip please refer to its security
tracker page at:
https://security-tracker.debian.org/tracker/gzip

Further information about Debian Security Advisories, how to apply
these updates to your system and frequently asked questions can be
found at: https://www.debian.org/security/

Mailing list: debian-security-announce@lists.debian.org
- -----BEGIN PGP SIGNATURE-----
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=cKoF
- -----END PGP SIGNATURE-----

- --------------------------END INCLUDED TEXT--------------------

You have received this e-mail bulletin as a result of your organisation's
registration with AusCERT. The mailing list you are subscribed to is
maintained within your organisation, so if you do not wish to continue
receiving these bulletins you should contact your local IT manager. If
you do not know who that is, please send an email to auscert@auscert.org.au
and we will forward your request to the appropriate person.

NOTE: Third Party Rights
This security bulletin is provided as a service to AusCERT's members.  As
AusCERT did not write the document quoted above, AusCERT has had no control
over its content. The decision to follow or act on information or advice
contained in this security bulletin is the responsibility of each user or
organisation, and should be considered in accordance with your organisation's
site policies and procedures. AusCERT takes no responsibility for consequences
which may arise from following or acting on information or advice contained in
this security bulletin.

NOTE: This is only the original release of the security bulletin.  It may
not be updated when updates to the original are made.  If downloading at
a later date, it is recommended that the bulletin is retrieved directly
from the author's website to ensure that the information is still current.

Contact information for the authors of the original document is included
in the Security Bulletin above.  If you have any questions or need further
information, please contact them directly.

Previous advisories and external security bulletins can be retrieved from:

        https://www.auscert.org.au/bulletins/

===========================================================================
Australian Computer Emergency Response Team
The University of Queensland
Brisbane
Qld 4072

Internet Email: auscert@auscert.org.au
Facsimile:      (07) 3365 7031
Telephone:      (07) 3365 4417 (International: +61 7 3365 4417)
                AusCERT personnel answer during Queensland business hours
                which are GMT+10:00 (AEST).
                On call after hours for member emergencies only.
===========================================================================
-----BEGIN PGP SIGNATURE-----
Comment: http://www.auscert.org.au/render.html?it=1967
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=vtyw
-----END PGP SIGNATURE-----