Source: golang-github-ulikunitz-xz
Version: 0.5.6-2
Severity: important
Tags: security upstream
X-Debbugs-Cc: [email protected], Debian Security Team <[email protected]>

Hi,

The following vulnerability was published for golang-github-ulikunitz-xz.

CVE-2025-58058[0]:
| xz is a pure golang package for reading and writing xz-compressed
| files. Prior to version 0.5.14, it is possible to put data in front
| of an LZMA-encoded byte stream without detecting the situation while
| reading the header. This can lead to increased memory consumption
| because the current implementation allocates the full decoding
| buffer directly after reading the header. The LZMA header doesn't
| include a magic number or has a checksum to detect such an issue
| according to the specification. Note that the code recognizes the
| issue later while reading the stream, but at this time the memory
| allocation has already been done. This issue has been patched in
| version 0.5.14.


If you fix the vulnerability please also make sure to include the
CVE (Common Vulnerabilities & Exposures) id in your changelog entry.

For further information see:

[0] https://security-tracker.debian.org/tracker/CVE-2025-58058
    https://www.cve.org/CVERecord?id=CVE-2025-58058
[1] https://github.com/ulikunitz/xz/security/advisories/GHSA-jc7w-c686-c4v9
[2] 
https://github.com/ulikunitz/xz/commit/88ddf1d0d98d688db65de034f48960b2760d2ae2

Regards,
Salvatore

Reply via email to