First published: Thu Apr 03 2025(Updated: )
Harri K. Koskinen discovered that XZ Utils incorrectly handled the threaded xz decoder. If a user or automated system were tricked into processing an xz file, a remote attacker could use this issue to cause XZ Utils to crash, resulting in a denial of service, or possibly execute arbitrary code.
Affected Software | Affected Version | How to fix |
---|---|---|
All of | ||
ubuntu/xz-utils | <5.6.2-2ubuntu0.2 | 5.6.2-2ubuntu0.2 |
Ubuntu | =24.10 | |
All of | ||
ubuntu/xz-utils | <5.6.1+really5.4.5-1ubuntu0.2 | 5.6.1+really5.4.5-1ubuntu0.2 |
Ubuntu | =24.04 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The security issue identified in USN-7414-1 is considered to be a denial of service vulnerability due to inadequate handling of the threaded xz decoder.
To resolve the vulnerability in USN-7414-1, update the xz-utils package to version 5.6.2-2ubuntu0.2 for Ubuntu 24.10 or 5.6.1+really5.4.5-1ubuntu0.2 for Ubuntu 24.04.
USN-7414-1 could allow attackers to crash XZ Utils or potentially execute arbitrary code if a user is tricked into processing a malicious xz file.
The USN-7414-1 vulnerability affects Ubuntu systems running the xz-utils package versions mentioned in the advisory.
The vulnerability detailed in USN-7414-1 was discovered by Harri K. Koskinen.