Allocation of Resources Without Limits or Throttling Affecting warewulf4-overlay package, versions <4.6.4-150500.6.37.1


Severity

Recommended
0.0
medium
0
10

Based on SUSE Linux Enterprise Server security rating.

Threat Intelligence

EPSS
0.06% (18th percentile)

Do your applications use this vulnerable package?

In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.

Test your applications

Snyk Learn

Learn about Allocation of Resources Without Limits or Throttling vulnerabilities in an interactive lesson.

Start learning
  • Snyk IDSNYK-SLES156-WAREWULF4OVERLAY-13283746
  • published4 Oct 2025
  • disclosed2 Oct 2025

Introduced: 2 Oct 2025

NewCVE-2025-58058  (opens in a new tab)
CWE-770  (opens in a new tab)

How to fix?

Upgrade SLES:15.6 warewulf4-overlay to version 4.6.4-150500.6.37.1 or higher.

NVD Description

Note: Versions mentioned in the description apply only to the upstream warewulf4-overlay package and not the warewulf4-overlay package as distributed by SLES. See How to fix? for SLES:15.6 relevant fixed versions and status.

xz is a pure golang package for reading and writing xz-compressed files. Prior to version 0.5.14, it is possible to put data in front of an LZMA-encoded byte stream without detecting the situation while reading the header. This can lead to increased memory consumption because the current implementation allocates the full decoding buffer directly after reading the header. The LZMA header doesn't include a magic number or has a checksum to detect such an issue according to the specification. Note that the code recognizes the issue later while reading the stream, but at this time the memory allocation has already been done. This issue has been patched in version 0.5.14.

CVSS Base Scores

version 3.1