CVE-2021-29482
denial of service in github.com/ulikunitz/xz
Severity Score
Exploit Likelihood
Affected Versions
Public Exploits
0Exploited in Wild
-Decision
Descriptions
xz is a compression and decompression library focusing on the xz format completely written in Go. The function readUvarint used to read the xz container format may not terminate a loop provide malicous input. The problem has been fixed in release v0.5.8. As a workaround users can limit the size of the compressed file input to a reasonable size for their use case. The standard library had recently the same issue and got the CVE-2020-16845 allocated.
xz es una biblioteca de compresión y descompresión que se centra en el formato xz escrito completamente en Go. La función readUvarint utilizada para leer el formato contenedor xz no puede terminar un bucle y proporcionar una entrada maliciosa. El problema ha sido corregido en la versión v0.5.8. Como solución alternativa, los usuarios pueden limitar el tamaño de la entrada del archivo comprimido a un tamaño razonable para su caso de uso. La biblioteca estándar tuvo recientemente el mismo problema y se le asignó el CVE-2020-16845
A flaw was found in github.com/ulikunitz/xz. The function readUvarint may not terminate a loop what could lead to denial of service (DoS).
Red Hat Advanced Cluster Management for Kubernetes 2.3.0 images Red Hat Advanced Cluster Management for Kubernetes provides the capabilities to address common challenges that administrators and site reliability engineers face as they work across a range of public and private cloud environments. Clusters and applications are all visible and managed from a single console—with security policy built in. This advisory contains the container images for Red Hat Advanced Cluster Management for Kubernetes, which fix several bugs and security issues. Issues addressed include code execution, cross site scripting, denial of service, integer overflow, and null pointer vulnerabilities.
CVSS Scores
SSVC
- Decision:-
Timeline
- 2021-03-30 CVE Reserved
- 2021-04-28 CVE Published
- 2024-08-03 CVE Updated
- 2025-04-09 EPSS Updated
- ---------- Exploited in Wild
- ---------- KEV Due Date
- ---------- First Exploit
CWE
- CWE-400: Uncontrolled Resource Consumption
- CWE-835: Loop with Unreachable Exit Condition ('Infinite Loop')
CAPEC
References (4)
URL | Tag | Source |
---|---|---|
https://github.com/ulikunitz/xz/security/advisories/GHSA-25xm-hr59-7c27 | Third Party Advisory |
URL | Date | SRC |
---|
URL | Date | SRC |
---|---|---|
https://github.com/ulikunitz/xz/commit/69c6093c7b2397b923acf82cb378f55ab2652b9b | 2021-05-14 |
URL | Date | SRC |
---|---|---|
https://access.redhat.com/security/cve/CVE-2021-29482 | 2022-05-11 | |
https://bugzilla.redhat.com/show_bug.cgi?id=1954368 | 2022-05-11 |
Affected Vendors, Products, and Versions
Vendor | Product | Version | Other | Status | ||||||
---|---|---|---|---|---|---|---|---|---|---|
Vendor | Product | Version | Other | Status | <-- --> | Vendor | Product | Version | Other | Status |
Xz Project Search vendor "Xz Project" | XZ Search vendor "Xz Project" for product "XZ" | < 0.5.8 Search vendor "Xz Project" for product "XZ" and version " < 0.5.8" | go |
Affected
|