Race Condition Affecting xz-utils package, versions *


Severity

Recommended
low

Based on default assessment until relevant scores are available.

Do your applications use this vulnerable package?

In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.

Test your applications
  • Snyk IDSNYK-DEBIAN13-XZUTILS-9652970
  • published4 Apr 2025
  • disclosed3 Apr 2025

Introduced: 3 Apr 2025

NewCVE-2025-31115  (opens in a new tab)
CWE-366  (opens in a new tab)
CWE-416  (opens in a new tab)
CWE-476  (opens in a new tab)
CWE-826  (opens in a new tab)

How to fix?

There is no fixed version for Debian:13 xz-utils.

NVD Description

Note: Versions mentioned in the description apply only to the upstream xz-utils package and not the xz-utils package as distributed by Debian. See How to fix? for Debian:13 relevant fixed versions and status.

XZ Utils provide a general-purpose data-compression library plus command-line tools. In XZ Utils 5.3.3alpha to 5.8.0, the multithreaded .xz decoder in liblzma has a bug where invalid input can at least result in a crash. The effects include heap use after free and writing to an address based on the null pointer plus an offset. Applications and libraries that use the lzma_stream_decoder_mt function are affected. The bug has been fixed in XZ Utils 5.8.1, and the fix has been committed to the v5.4, v5.6, v5.8, and master branches in the xz Git repository. No new release packages will be made from the old stable branches, but a standalone patch is available that applies to all affected releases.

CVSS Base Scores

version 3.1