CVE-2025-58058

NameCVE-2025-58058
Descriptionxz is a pure golang package for reading and writing xz-compressed files. Prior to version 0.5.14, it is possible to put data in front of an LZMA-encoded byte stream without detecting the situation while reading the header. This can lead to increased memory consumption because the current implementation allocates the full decoding buffer directly after reading the header. The LZMA header doesn't include a magic number or has a checksum to detect such an issue according to the specification. Note that the code recognizes the issue later while reading the stream, but at this time the memory allocation has already been done. This issue has been patched in version 0.5.14.
SourceCVE (at NVD; CERT, LWN, oss-sec, fulldisc, Debian ELTS, Red Hat, Ubuntu, Gentoo, SUSE bugzilla/CVE, GitHub advisories/code/issues, web search, more)
Debian Bugs1112508

Vulnerable and fixed packages

The table below lists information on source packages.

Source PackageReleaseVersionStatus
golang-github-ulikunitz-xz (PTS)bookworm, bullseye, trixie0.5.6-2vulnerable
forky, sid0.5.15-1fixed

The information below is based on the following data on fixed versions.

PackageTypeReleaseFixed VersionUrgencyOriginDebian Bugs
golang-github-ulikunitz-xzsource(unstable)0.5.15-11112508

Notes

[trixie] - golang-github-ulikunitz-xz <no-dsa> (Minor issue)
[bookworm] - golang-github-ulikunitz-xz <no-dsa> (Minor issue)
[bullseye] - golang-github-ulikunitz-xz <postponed> (Minor issue)
https://github.com/ulikunitz/xz/security/advisories/GHSA-jc7w-c686-c4v9
https://github.com/ulikunitz/xz/commit/88ddf1d0d98d688db65de034f48960b2760d2ae2 (v0.5.14-rc.1)

Search for package or bug name: Reporting problems