mirror of
https://github.com/0xMarcio/cve.git
synced 2026-05-09 06:55:56 +02:00
20 lines
1.1 KiB
Markdown
20 lines
1.1 KiB
Markdown
### [CVE-2021-29482](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-29482)
|
|

|
|

|
|
%22%7D&color=brighgreen)
|
|
|
|
### Description
|
|
|
|
xz is a compression and decompression library focusing on the xz format completely written in Go. The function readUvarint used to read the xz container format may not terminate a loop provide malicous input. The problem has been fixed in release v0.5.8. As a workaround users can limit the size of the compressed file input to a reasonable size for their use case. The standard library had recently the same issue and got the CVE-2020-16845 allocated.
|
|
|
|
### POC
|
|
|
|
#### Reference
|
|
No PoCs from references.
|
|
|
|
#### Github
|
|
- https://github.com/ARPSyndicate/cvemon
|
|
- https://github.com/k1LoW/oshka
|
|
- https://github.com/naveensrinivasan/stunning-tribble
|
|
|