
Cloud Vulnerability DB
A community-led vulnerabilities database
An issue discovered in XZ 5.2.5 allows attackers to cause a denial of service via decompression of a crafted file. The vulnerability was initially reported but later disputed by the vendor, who clarified that the reported 'endless output' and 'denial of service' claims were incorrect because decompression of the 17,486 bytes always results in 114,881,179 bytes, which is considered a reasonable size increase (NVD, Tukaani).
The vulnerability was assigned a CVSS v3.1 Base Score of 5.5 (Medium) with the vector string CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H. The issue involves decompression of a specially crafted file that uses a 256-byte dictionary, requiring minimal memory for decompression (NVD, Tukaani).
According to the initial report, the vulnerability could lead to denial of service through resource consumption when decompressing a crafted file. However, the vendor disputed this claim, stating that the output size is finite and reasonable for the compression format (NVD).
No specific mitigation or patches were required as the vendor demonstrated that this was not a genuine security vulnerability. The reported behavior was determined to be within normal operational parameters of the compression algorithm (Tukaani).
The security community has generally accepted the vendor's assessment that this is a bogus CVE. Multiple organizations, including SUSE and Red Hat, have marked this CVE as invalid or disputed in their security trackers (SUSE Bugzilla, Red Hat Bugzilla).
Source: This report was generated using AI
Free Vulnerability Assessment
Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.
Get a personalized demo
"Best User Experience I have ever seen, provides full visibility to cloud workloads."
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
"We know that if Wiz identifies something as critical, it actually is."