Debian Xz-Utils vulnerabilities
6 known vulnerabilities affecting debian/xz-utils.
Total CVEs
6
CISA KEV
0
Public exploits
1
Exploited in wild
0
Severity breakdown
HIGH2LOW4
Vulnerabilities
Page 1 of 1
CVE-2026-34743LOWCVSS 1.7fixed in xz-utils 5.8.3-1 (forky)2026
CVE-2026-34743 [LOW] CVE-2026-34743: xz-utils - XZ Utils provide a general-purpose data-compression library plus command-line to...
XZ Utils provide a general-purpose data-compression library plus command-line tools. Prior to version 5.8.3, if lzma_index_decoder() was used to decode an Index that contained no Records, the resulting lzma_index was left in a state where where a subsequent lzma_index_append() would allocate too little memory, and a buffer overflow would occur. This issue has been p
debian
CVE-2025-31115HIGHCVSS 8.7fixed in xz-utils 5.4.1-1 (bookworm)2025
CVE-2025-31115 [HIGH] CVE-2025-31115: xz-utils - XZ Utils provide a general-purpose data-compression library plus command-line to...
XZ Utils provide a general-purpose data-compression library plus command-line tools. In XZ Utils 5.3.3alpha to 5.8.0, the multithreaded .xz decoder in liblzma has a bug where invalid input can at least result in a crash. The effects include heap use after free and writing to an address based on the null pointer plus an offset. Applications and libraries that use th
debian
CVE-2024-3094LOWCVSS 10.0PoCfixed in xz-utils 5.6.1+really5.4.5-1 (forky)2024
CVE-2024-3094 [CRITICAL] CVE-2024-3094: xz-utils - Malicious code was discovered in the upstream tarballs of xz, starting with vers...
Malicious code was discovered in the upstream tarballs of xz, starting with version 5.6.0. Through a series of complex obfuscations, the liblzma build process extracts a prebuilt object file from a disguised test file existing in the source code, which is then used to modify specific functions in the liblzma code. This results in a modified liblzma library that c
debian
CVE-2024-47611LOWCVSS 6.32024
CVE-2024-47611 [MEDIUM] CVE-2024-47611: xz-utils - XZ Utils provide a general-purpose data-compression library plus command-line to...
XZ Utils provide a general-purpose data-compression library plus command-line tools. When built for native Windows (MinGW-w64 or MSVC), the command line tools from XZ Utils 5.6.2 and older have a command line argument injection vulnerability. If a command line contains Unicode characters (for example, filenames) that don't exist in the current legacy code page, t
debian
CVE-2022-1271HIGHCVSS 8.8fixed in gzip 1.12-1 (bookworm)2022
CVE-2022-1271 [HIGH] CVE-2022-1271: gzip - An arbitrary file write vulnerability was found in GNU gzip's zgrep utility. Whe...
An arbitrary file write vulnerability was found in GNU gzip's zgrep utility. When zgrep is applied on the attacker's chosen file name (for example, a crafted file name), this can overwrite an attacker's content to an arbitrary attacker-selected file. This flaw occurs due to insufficient validation when processing filenames with two or more newlines where selected content
debian
CVE-2015-4035LOWCVSS 7.82015
CVE-2015-4035 [HIGH] CVE-2015-4035: xz-utils - scripts/xzgrep.in in xzgrep 5.2.x before 5.2.0, before 5.0.0 does not properly p...
scripts/xzgrep.in in xzgrep 5.2.x before 5.2.0, before 5.0.0 does not properly process file names containing semicolons, which allows remote attackers to execute arbitrary code by having a user run xzgrep on a crafted file name.
Scope: local
bookworm: resolved
bullseye: resolved
forky: resolved
sid: resolved
trixie: resolved
debian