Tukaani

Xz

6 vulnerabilities found.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
Media report
  • EPSS 0.18%
  • Published 03.04.2025 17:15:30
  • Last modified 07.04.2025 14:18:34

XZ Utils provide a general-purpose data-compression library plus command-line tools. In XZ Utils 5.3.3alpha to 5.8.0, the multithreaded .xz decoder in liblzma has a bug where invalid input can at least result in a crash. The effects include heap use ...

  • EPSS 0.3%
  • Published 02.10.2024 15:15:14
  • Last modified 21.11.2024 17:15:17

XZ Utils provide a general-purpose data-compression library plus command-line tools. When built for native Windows (MinGW-w64 or MSVC), the command line tools from XZ Utils 5.6.2 and older have a command line argument injection vulnerability. If a co...

Warning Media report
  • EPSS 86.32%
  • Published 29.03.2024 17:15:21
  • Last modified 19.08.2025 01:15:57

Malicious code was discovered in the upstream tarballs of xz, starting with version 5.6.0. Through a series of complex obfuscations, the liblzma build process extracts a prebuilt object file from a disguised test file existing in the source code, w...

  • EPSS 0.04%
  • Published 22.08.2023 19:16:19
  • Last modified 21.11.2024 05:13:28

An issue discovered in XZ 5.2.5 allows attackers to cause a denial of service via decompression of a crafted file. NOTE: the vendor disputes the claims of "endless output" and "denial of service" because decompression of the 17,486 bytes always resul...

  • EPSS 0.72%
  • Published 31.08.2022 16:15:09
  • Last modified 09.06.2025 15:15:26

An arbitrary file write vulnerability was found in GNU gzip's zgrep utility. When zgrep is applied on the attacker's chosen file name (for example, a crafted file name), this can overwrite an attacker's content to an arbitrary attacker-selected file....

  • EPSS 0.61%
  • Published 25.07.2017 18:29:00
  • Last modified 20.04.2025 01:37:25

scripts/xzgrep.in in xzgrep 5.2.x before 5.2.0, before 5.0.0 does not properly process file names containing semicolons, which allows remote attackers to execute arbitrary code by having a user run xzgrep on a crafted file name.