Source: golang-github-nwaples-rardecode
Version: 2.1.1-2
Severity: grave
Tags: security upstream
X-Debbugs-Cc: [email protected], Debian Security Team <[email protected]>

Hi,

The following vulnerability was published for golang-github-nwaples-rardecode.

Technically speaking this is not really RC, but choosing as such to
make sure (even in distant future) not included in this version in
forky.

CVE-2025-11579[0]:
| github.com/nwaples/rardecode versions <=2.1.1 fail to restrict the
| dictionary size when reading large RAR dictionary sizes, which
| allows an attacker to provide a specially crafted RAR file and cause
| Denial of Service via an Out Of Memory Crash.


If you fix the vulnerability please also make sure to include the
CVE (Common Vulnerabilities & Exposures) id in your changelog entry.

For further information see:

[0] https://security-tracker.debian.org/tracker/CVE-2025-11579
    https://www.cve.org/CVERecord?id=CVE-2025-11579
[1] 
https://github.com/nwaples/rardecode/commit/52fb4e825c936636f251f7e7deded39ab11df9a9

Regards,
Salvatore

Reply via email to