This repository has been archived by the owner on Jan 3, 2023. It is now read-only.
CVE-2021-29482 (High) detected in github.com/ulikunitz/xz-v0.5.6 #3
Labels
security vulnerability
Security vulnerability detected by WhiteSource
CVE-2021-29482 - High Severity Vulnerability
Vulnerable Library - github.com/ulikunitz/xz-v0.5.6
Pure golang package for reading and writing xz-compressed files
Library home page: https://proxy.golang.org/github.com/ulikunitz/xz/@v/v0.5.6.zip
Dependency Hierarchy:
Vulnerability Details
xz is a compression and decompression library focusing on the xz format completely written in Go. The function readUvarint used to read the xz container format may not terminate a loop provide malicous input. The problem has been fixed in release v0.5.8. As a workaround users can limit the size of the compressed file input to a reasonable size for their use case. The standard library had recently the same issue and got the CVE-2020-16845 allocated.
Publish Date: 2021-04-28
URL: CVE-2021-29482
CVSS 3 Score Details (7.5)
Base Score Metrics:
Suggested Fix
Type: Upgrade version
Origin: GHSA-25xm-hr59-7c27
Release Date: 2021-04-28
Fix Resolution: v0.5.8
Step up your Open Source Security Game with Mend here
The text was updated successfully, but these errors were encountered: