DEBIAN-CVE-2026-34743

Source
https://security-tracker.debian.org/tracker/CVE-2026-34743
Import Source
https://storage.googleapis.com/debian-osv/debian-cve-osv/DEBIAN-CVE-2026-34743.json
JSON Data
https://api.osv.dev/v1/vulns/DEBIAN-CVE-2026-34743
Upstream
  • CVE-2026-34743
Published
2026-04-02T19:21:33.187Z
Modified
2026-04-09T05:00:21.571838Z
Severity
  • 1.7 (Low) CVSS_V4 - CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:U/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X CVSS Calculator
Summary
[none]
Details

XZ Utils provide a general-purpose data-compression library plus command-line tools. Prior to version 5.8.3, if lzmaindexdecoder() was used to decode an Index that contained no Records, the resulting lzmaindex was left in a state where where a subsequent lzmaindex_append() would allocate too little memory, and a buffer overflow would occur. This issue has been patched in version 5.8.3.

References

Affected packages

Debian:11 / xz-utils

Package

Name
xz-utils
Purl
pkg:deb/debian/xz-utils?arch=source

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected

Affected versions

5.*
5.2.5-2
5.2.5-2.1~deb11u1
5.2.5-2.1
5.2.7-0.0
5.2.7-0.1
5.2.8-0.0
5.2.9-0.0
5.2.10-0.0
5.3.3alpha-0.0
5.3.4alpha-0.0
5.3.5beta-0.0
5.4.0-0.0
5.4.0-0.1
5.4.1-0.0
5.4.1-0.1
5.4.1-0.2
5.4.1-1
5.4.4-0.1
5.4.5-0.1
5.4.5-0.2
5.4.5-0.3
5.5.1alpha-0.1
5.5.2beta-1
5.6.0-0.1
5.6.0-0.2
5.6.1-1
5.6.1+really5.4.5-1
5.6.2-1
5.6.2-2
5.6.3-1
5.6.4-1
5.8.0-1
5.8.1-1
5.8.1-1.1
5.8.1-2
5.8.2-1
5.8.2-2
5.8.3-1

Ecosystem specific

{
    "urgency": "not yet assigned"
}

Database specific

source
"https://storage.googleapis.com/debian-osv/debian-cve-osv/DEBIAN-CVE-2026-34743.json"

Debian:12 / xz-utils

Package

Name
xz-utils
Purl
pkg:deb/debian/xz-utils?arch=source

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected

Affected versions

5.*
5.4.1-0.2
5.4.1-1
5.4.4-0.1
5.4.5-0.1
5.4.5-0.2
5.4.5-0.3
5.5.1alpha-0.1
5.5.2beta-1
5.6.0-0.1
5.6.0-0.2
5.6.1-1
5.6.1+really5.4.5-1
5.6.2-1
5.6.2-2
5.6.3-1
5.6.4-1
5.8.0-1
5.8.1-1
5.8.1-1.1
5.8.1-2
5.8.2-1
5.8.2-2
5.8.3-1

Ecosystem specific

{
    "urgency": "not yet assigned"
}

Database specific

source
"https://storage.googleapis.com/debian-osv/debian-cve-osv/DEBIAN-CVE-2026-34743.json"

Debian:13 / xz-utils

Package

Name
xz-utils
Purl
pkg:deb/debian/xz-utils?arch=source

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected

Affected versions

5.*
5.8.1-1
5.8.1-1.1
5.8.1-2
5.8.2-1
5.8.2-2
5.8.3-1

Ecosystem specific

{
    "urgency": "not yet assigned"
}

Database specific

source
"https://storage.googleapis.com/debian-osv/debian-cve-osv/DEBIAN-CVE-2026-34743.json"

Debian:14 / xz-utils

Package

Name
xz-utils
Purl
pkg:deb/debian/xz-utils?arch=source

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
5.8.3-1

Affected versions

5.*
5.8.1-1
5.8.1-1.1
5.8.1-2
5.8.2-1
5.8.2-2

Ecosystem specific

{
    "urgency": "not yet assigned"
}

Database specific

source
"https://storage.googleapis.com/debian-osv/debian-cve-osv/DEBIAN-CVE-2026-34743.json"