UBUNTU-CVE-2026-34743

Source
https://ubuntu.com/security/CVE-2026-34743
Import Source
https://github.com/canonical/ubuntu-security-notices/blob/main/osv/cve/2026/UBUNTU-CVE-2026-34743.json
JSON Data
https://api.osv.dev/v1/vulns/UBUNTU-CVE-2026-34743
Upstream
  • CVE-2026-34743
Published
2026-04-02T19:21:00Z
Modified
2026-04-13T12:53:24.399580Z
Severity
  • 1.7 (Low) CVSS_V4 - CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:U CVSS Calculator
  • Ubuntu - low
Summary
[none]
Details

XZ Utils provide a general-purpose data-compression library plus command-line tools. Prior to version 5.8.3, if lzmaindexdecoder() was used to decode an Index that contained no Records, the resulting lzmaindex was left in a state where where a subsequent lzmaindex_append() would allocate too little memory, and a buffer overflow would occur. This issue has been patched in version 5.8.3.

References

Affected packages

Ubuntu:18.04:LTS
xz-utils

Package

Name
xz-utils
Purl
pkg:deb/ubuntu/xz-utils@5.2.2-1.3ubuntu0.1?arch=source&distro=bionic

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected

Affected versions

5.*
5.2.2-1.3
5.2.2-1.3ubuntu0.1

Ecosystem specific

{
    "binaries": [
        {
            "binary_version": "5.2.2-1.3ubuntu0.1",
            "binary_name": "liblzma-dev"
        },
        {
            "binary_version": "5.2.2-1.3ubuntu0.1",
            "binary_name": "liblzma5"
        },
        {
            "binary_version": "5.2.2-1.3ubuntu0.1",
            "binary_name": "xz-utils"
        },
        {
            "binary_version": "5.2.2-1.3ubuntu0.1",
            "binary_name": "xzdec"
        }
    ],
    "priority_reason": "Issue not likely to affect any real-world applications"
}

Database specific

source
"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/cve/2026/UBUNTU-CVE-2026-34743.json"
Ubuntu:20.04:LTS
xz-utils

Package

Name
xz-utils
Purl
pkg:deb/ubuntu/xz-utils@5.2.4-1ubuntu1.1?arch=source&distro=focal

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected

Affected versions

5.*
5.2.4-1
5.2.4-1ubuntu1
5.2.4-1ubuntu1.1

Ecosystem specific

{
    "binaries": [
        {
            "binary_version": "5.2.4-1ubuntu1.1",
            "binary_name": "liblzma-dev"
        },
        {
            "binary_version": "5.2.4-1ubuntu1.1",
            "binary_name": "liblzma5"
        },
        {
            "binary_version": "5.2.4-1ubuntu1.1",
            "binary_name": "xz-utils"
        },
        {
            "binary_version": "5.2.4-1ubuntu1.1",
            "binary_name": "xzdec"
        }
    ],
    "priority_reason": "Issue not likely to affect any real-world applications"
}

Database specific

source
"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/cve/2026/UBUNTU-CVE-2026-34743.json"
Ubuntu:22.04:LTS
xz-utils

Package

Name
xz-utils
Purl
pkg:deb/ubuntu/xz-utils@5.2.5-2ubuntu1?arch=source&distro=jammy

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected

Affected versions

5.*
5.2.5-2
5.2.5-2build1
5.2.5-2build2
5.2.5-2ubuntu1

Ecosystem specific

{
    "binaries": [
        {
            "binary_version": "5.2.5-2ubuntu1",
            "binary_name": "liblzma-dev"
        },
        {
            "binary_version": "5.2.5-2ubuntu1",
            "binary_name": "liblzma5"
        },
        {
            "binary_version": "5.2.5-2ubuntu1",
            "binary_name": "xz-utils"
        },
        {
            "binary_version": "5.2.5-2ubuntu1",
            "binary_name": "xzdec"
        }
    ],
    "priority_reason": "Issue not likely to affect any real-world applications"
}

Database specific

source
"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/cve/2026/UBUNTU-CVE-2026-34743.json"
Ubuntu:24.04:LTS
xz-utils

Package

Name
xz-utils
Purl
pkg:deb/ubuntu/xz-utils@5.6.1+really5.4.5-1ubuntu0.2?arch=source&distro=noble

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected

Affected versions

5.*
5.4.1-0.2
5.4.4-0.1
5.4.5-0.1
5.4.5-0.3
5.6.0-0.2
5.6.1+really5.4.5-1
5.6.1+really5.4.5-1build0.1
5.6.1+really5.4.5-1ubuntu0.2

Ecosystem specific

{
    "binaries": [
        {
            "binary_version": "5.6.1+really5.4.5-1ubuntu0.2",
            "binary_name": "liblzma-dev"
        },
        {
            "binary_version": "5.6.1+really5.4.5-1ubuntu0.2",
            "binary_name": "liblzma5"
        },
        {
            "binary_version": "5.6.1+really5.4.5-1ubuntu0.2",
            "binary_name": "xz-utils"
        },
        {
            "binary_version": "5.6.1+really5.4.5-1ubuntu0.2",
            "binary_name": "xzdec"
        }
    ],
    "priority_reason": "Issue not likely to affect any real-world applications"
}

Database specific

source
"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/cve/2026/UBUNTU-CVE-2026-34743.json"
Ubuntu:25.10
xz-utils

Package

Name
xz-utils
Purl
pkg:deb/ubuntu/xz-utils@5.8.1-1build2?arch=source&distro=questing

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected

Affected versions

5.*
5.6.4-1ubuntu1
5.8.1-1
5.8.1-1build1
5.8.1-1build2

Ecosystem specific

{
    "binaries": [
        {
            "binary_version": "5.8.1-1build2",
            "binary_name": "liblzma-dev"
        },
        {
            "binary_version": "5.8.1-1build2",
            "binary_name": "liblzma5"
        },
        {
            "binary_version": "5.8.1-1build2",
            "binary_name": "xz-utils"
        },
        {
            "binary_version": "5.8.1-1build2",
            "binary_name": "xzdec"
        }
    ],
    "priority_reason": "Issue not likely to affect any real-world applications"
}

Database specific

source
"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/cve/2026/UBUNTU-CVE-2026-34743.json"
Ubuntu:Pro:14.04:LTS
xz-utils

Package

Name
xz-utils
Purl
pkg:deb/ubuntu/xz-utils@5.1.1alpha+20120614-2ubuntu2.14.04.1+esm1?arch=source&distro=esm-infra-legacy/trusty

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected

Affected versions

5.*
5.1.1alpha+20120614-2ubuntu1
5.1.1alpha+20120614-2ubuntu2
5.1.1alpha+20120614-2ubuntu2.14.04.1+esm1

Ecosystem specific

{
    "binaries": [
        {
            "binary_version": "5.1.1alpha+20120614-2ubuntu2.14.04.1+esm1",
            "binary_name": "liblzma-dev"
        },
        {
            "binary_version": "5.1.1alpha+20120614-2ubuntu2.14.04.1+esm1",
            "binary_name": "liblzma5"
        },
        {
            "binary_version": "5.1.1alpha+20120614-2ubuntu2.14.04.1+esm1",
            "binary_name": "xz-utils"
        },
        {
            "binary_version": "5.1.1alpha+20120614-2ubuntu2.14.04.1+esm1",
            "binary_name": "xzdec"
        }
    ],
    "priority_reason": "Issue not likely to affect any real-world applications"
}

Database specific

source
"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/cve/2026/UBUNTU-CVE-2026-34743.json"
Ubuntu:Pro:16.04:LTS
xz-utils

Package

Name
xz-utils
Purl
pkg:deb/ubuntu/xz-utils@5.1.1alpha+20120614-2ubuntu2.16.04.1+esm1?arch=source&distro=esm-infra/xenial

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected

Affected versions

5.*
5.1.1alpha+20120614-2ubuntu2
5.1.1alpha+20120614-2ubuntu2.16.04.1+esm1

Ecosystem specific

{
    "binaries": [
        {
            "binary_version": "5.1.1alpha+20120614-2ubuntu2.16.04.1+esm1",
            "binary_name": "liblzma-dev"
        },
        {
            "binary_version": "5.1.1alpha+20120614-2ubuntu2.16.04.1+esm1",
            "binary_name": "liblzma5"
        },
        {
            "binary_version": "5.1.1alpha+20120614-2ubuntu2.16.04.1+esm1",
            "binary_name": "xz-utils"
        },
        {
            "binary_version": "5.1.1alpha+20120614-2ubuntu2.16.04.1+esm1",
            "binary_name": "xzdec"
        }
    ],
    "priority_reason": "Issue not likely to affect any real-world applications"
}

Database specific

source
"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/cve/2026/UBUNTU-CVE-2026-34743.json"