CVE-2021-29482

xz is a compression and decompression library focusing on the xz format completely written in Go. The function readUvarint used to read the xz container format may not terminate a loop provide malicous input. The problem has been fixed in release v0.5.8. As a workaround users can limit the size of the compressed file input to a reasonable size for their use case. The standard library had recently the same issue and got the CVE-2020-16845 allocated.
Configurations

Configuration 1 (hide)

cpe:2.3:a:xz_project:xz:*:*:*:*:*:go:*:*

History

21 Nov 2024, 06:01

Type Values Removed Values Added
References () https://github.com/ulikunitz/xz/commit/69c6093c7b2397b923acf82cb378f55ab2652b9b - Patch, Third Party Advisory () https://github.com/ulikunitz/xz/commit/69c6093c7b2397b923acf82cb378f55ab2652b9b - Patch, Third Party Advisory
References () https://github.com/ulikunitz/xz/security/advisories/GHSA-25xm-hr59-7c27 - Third Party Advisory () https://github.com/ulikunitz/xz/security/advisories/GHSA-25xm-hr59-7c27 - Third Party Advisory

Information

Published : 2021-04-28 19:15

Updated : 2024-11-21 06:01


NVD link : CVE-2021-29482

Mitre link : CVE-2021-29482

CVE.ORG link : CVE-2021-29482


JSON object : View

Products Affected

xz_project

  • xz
CWE
CWE-835

Loop with Unreachable Exit Condition ('Infinite Loop')