xz is a pure golang package for reading and writing xz-compressed files. Prior to version 0.5.14, it is possible to put data in front of an LZMA-encoded byte stream without detecting the situation while reading the header. This can lead to increased memory consumption because the current implementation allocates the full decoding buffer directly after reading the header. The LZMA header doesn't include a magic number or has a checksum to detect such an issue according to the specification. Note that the code recognizes the issue later while reading the stream, but at this time the memory allocation has already been done. This issue has been patched in version 0.5.14.
Metrics
Affected Vendors & Products
References
History
Fri, 29 Aug 2025 12:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
References |
| |
Metrics |
threat_severity
|
threat_severity
|
Thu, 28 Aug 2025 22:00:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Description | xz is a pure golang package for reading and writing xz-compressed files. Prior to version 0.5.14, it is possible to put data in front of an LZMA-encoded byte stream without detecting the situation while reading the header. This can lead to increased memory consumption because the current implementation allocates the full decoding buffer directly after reading the header. The LZMA header doesn't include a magic number or has a checksum to detect such an issue according to the specification. Note that the code recognizes the issue later while reading the stream, but at this time the memory allocation has already been done. This issue has been patched in version 0.5.14. | |
Title | github.com/ulikunitz/xz leaks memory when decoding a corrupted multiple LZMA archives | |
Weaknesses | CWE-770 | |
References |
| |
Metrics |
cvssV3_1
|

Status: PUBLISHED
Assigner: GitHub_M
Published: 2025-08-28T21:54:05.561Z
Updated: 2025-08-29T13:23:07.497Z
Reserved: 2025-08-22T14:30:32.221Z
Link: CVE-2025-58058

No data.

Status : Awaiting Analysis
Published: 2025-08-28T22:15:32.577
Modified: 2025-08-29T16:24:29.730
Link: CVE-2025-58058
