Github.Com Ulikunitz Xz vulnerabilities
3 known vulnerabilities affecting github.com/ulikunitz_xz.
Total CVEs
3
CISA KEV
0
Public exploits
0
Exploited in wild
0
Severity breakdown
HIGH2MEDIUM1
Vulnerabilities
Page 1 of 1
CVE-2025-58058MEDIUM≥ 0, < 0.5.152025-08-28
CVE-2025-58058 [MEDIUM] CWE-770 github.com/ulikunitz/xz leaks memory when decoding a corrupted multiple LZMA archives
github.com/ulikunitz/xz leaks memory when decoding a corrupted multiple LZMA archives
### Summary
It is possible to put data in front of an LZMA-encoded byte stream without detecting the situation while reading the header. This can lead to increased memory consumption because the current implementation allocates the full decoding buffer directly after reading the header. The LZ
ghsaosv
CVE-2020-16845HIGH≥ 0, < 0.5.82021-12-16
CVE-2020-16845 [HIGH] CWE-835 Withdrawn Advisory: Infinite loop in xz
Withdrawn Advisory: Infinite loop in xz
### Withdrawn Advisory
This advisory has been withdrawn because alerts cannot be issued for the Go standard library at this time.
### Original Description
Go before 1.13.15 and 14.x before 1.14.7 can have an infinite read loop in ReadUvarint and ReadVarint in encoding/binary via invalid inputs.
ghsaosv
CVE-2021-29482HIGHCVSS 7.5≥ 0, < 0.5.82021-05-25
CVE-2021-29482 [HIGH] CWE-835 github.com/ulikunitz/xz fixes readUvarint Denial of Service (DoS)
github.com/ulikunitz/xz fixes readUvarint Denial of Service (DoS)
### Impact
xz is a compression and decompression library focusing on the xz format completely written in Go. The function readUvarint used to read the xz container format may not terminate a loop provide malicous input.
### Patches
The problem has been fixed in release v0.5.8.
### Workarounds
Limit the size of the compressed file
ghsaosv