Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

debian логотип

CVE-2025-58058

Опубликовано: 28 авг. 2025
Источник: debian
EPSS Низкий

Описание

xz is a pure golang package for reading and writing xz-compressed files. Prior to version 0.5.14, it is possible to put data in front of an LZMA-encoded byte stream without detecting the situation while reading the header. This can lead to increased memory consumption because the current implementation allocates the full decoding buffer directly after reading the header. The LZMA header doesn't include a magic number or has a checksum to detect such an issue according to the specification. Note that the code recognizes the issue later while reading the stream, but at this time the memory allocation has already been done. This issue has been patched in version 0.5.14.

Пакеты

ПакетСтатусВерсия исправленияРелизТип
golang-github-ulikunitz-xzfixed0.5.15-1package
golang-github-ulikunitz-xzno-dsatrixiepackage
golang-github-ulikunitz-xzno-dsabookwormpackage
golang-github-ulikunitz-xzpostponedbullseyepackage

Примечания

  • https://github.com/ulikunitz/xz/security/advisories/GHSA-jc7w-c686-c4v9

  • https://github.com/ulikunitz/xz/commit/88ddf1d0d98d688db65de034f48960b2760d2ae2 (v0.5.14-rc.1)

EPSS

Процентиль: 17%
0.00056
Низкий

Связанные уязвимости

CVSS3: 5.3
ubuntu
2 месяца назад

xz is a pure golang package for reading and writing xz-compressed files. Prior to version 0.5.14, it is possible to put data in front of an LZMA-encoded byte stream without detecting the situation while reading the header. This can lead to increased memory consumption because the current implementation allocates the full decoding buffer directly after reading the header. The LZMA header doesn't include a magic number or has a checksum to detect such an issue according to the specification. Note that the code recognizes the issue later while reading the stream, but at this time the memory allocation has already been done. This issue has been patched in version 0.5.14.

CVSS3: 5.3
redhat
2 месяца назад

xz is a pure golang package for reading and writing xz-compressed files. Prior to version 0.5.14, it is possible to put data in front of an LZMA-encoded byte stream without detecting the situation while reading the header. This can lead to increased memory consumption because the current implementation allocates the full decoding buffer directly after reading the header. The LZMA header doesn't include a magic number or has a checksum to detect such an issue according to the specification. Note that the code recognizes the issue later while reading the stream, but at this time the memory allocation has already been done. This issue has been patched in version 0.5.14.

CVSS3: 5.3
nvd
2 месяца назад

xz is a pure golang package for reading and writing xz-compressed files. Prior to version 0.5.14, it is possible to put data in front of an LZMA-encoded byte stream without detecting the situation while reading the header. This can lead to increased memory consumption because the current implementation allocates the full decoding buffer directly after reading the header. The LZMA header doesn't include a magic number or has a checksum to detect such an issue according to the specification. Note that the code recognizes the issue later while reading the stream, but at this time the memory allocation has already been done. This issue has been patched in version 0.5.14.

CVSS3: 5.3
msrc
2 месяца назад

github.com/ulikunitz/xz leaks memory when decoding a corrupted multiple LZMA archives

suse-cvrf
около 1 месяца назад

Security update for warewulf4

EPSS

Процентиль: 17%
0.00056
Низкий