xz is a compression and decompression library focusing on the xz format completely written in Go. The function readUvarint used to read the xz container format may not terminate a loop provide malicous input. The problem has been fixed in release v0.5.8. As a workaround users can limit the size of the compressed file input to a reasonable size for their use case. The standard library had recently the same issue and got the CVE-2020-16845 allocated.
Advisories
Source ID Title
EUVD EUVD EUVD-2021-0896 xz is a compression and decompression library focusing on the xz format completely written in Go. The function readUvarint used to read the xz container format may not terminate a loop provide malicous input. The problem has been fixed in release v0.5.8. As a workaround users can limit the size of the compressed file input to a reasonable size for their use case. The standard library had recently the same issue and got the CVE-2020-16845 allocated.
Github GHSA Github GHSA GHSA-25xm-hr59-7c27 github.com/ulikunitz/xz fixes readUvarint Denial of Service (DoS)
Fixes

Solution

No solution given by the vendor.


Workaround

No workaround given by the vendor.

History

No history.

Projects

Sign in to view the affected projects.

cve-icon MITRE

Status: PUBLISHED

Assigner: GitHub_M

Published:

Updated: 2024-08-03T22:11:05.477Z

Reserved: 2021-03-30T00:00:00

Link: CVE-2021-29482

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Modified

Published: 2021-04-28T19:15:08.587

Modified: 2024-11-21T06:01:13.820

Link: CVE-2021-29482

cve-icon Redhat

Severity : Moderate

Publid Date: 2020-08-19T00:00:00Z

Links: CVE-2021-29482 - Bugzilla

cve-icon OpenCVE Enrichment

No data.

Weaknesses