XZ Utils Security Update for Gentoo Linux
Gentoo Linux has released a security advisory (GLSA 202504-01) to address a vulnerability in XZ Utils, specifically a "use after free" issue. This security flaw, identified as CVE-2025-31115, could potentially lead to denial of service.
Key Details:
- Severity: Normal
- Affected Version: XZ Utils versions below 5.6.4-r1 are considered vulnerable, while versions 5.6.4-r1 and above are unaffected.
- Impact: The multithreaded .xz decoder in liblzma has a defect that can cause crashes when invalid input is processed. This vulnerability could lead to heap misuse and writing data to an unsafe memory address. Applications or libraries utilizing the lzma_stream_decoder_mt function are at risk. However, the likelihood of more severe exploitation is low, particularly on 64-bit systems where the xz is built with Position Independent Executables (PIE), a common practice in Gentoo.
Resolution Steps:
Users of XZ Utils are urged to upgrade to the latest version to mitigate this vulnerability. The update can be applied with the following commands:
Additional Information:
- No Workarounds: Currently, there are no known workarounds for this vulnerability.
- Support and Concerns: Gentoo prioritizes the security of its users. Any security-related queries should be directed to security@gentoo.org or reported via the Gentoo bug tracker.
For further details and updates, users can visit the Gentoo Security Website at [Gentoo Security Advisory](https://security.gentoo.org/glsa/202504-01).
License Information:
This advisory is published under the Creative Commons - Attribution / Share Alike license, and the content is copyright Gentoo Foundation, Inc
Gentoo Linux has released a security advisory (GLSA 202504-01) to address a vulnerability in XZ Utils, specifically a "use after free" issue. This security flaw, identified as CVE-2025-31115, could potentially lead to denial of service.
Key Details:
- Severity: Normal
- Affected Version: XZ Utils versions below 5.6.4-r1 are considered vulnerable, while versions 5.6.4-r1 and above are unaffected.
- Impact: The multithreaded .xz decoder in liblzma has a defect that can cause crashes when invalid input is processed. This vulnerability could lead to heap misuse and writing data to an unsafe memory address. Applications or libraries utilizing the lzma_stream_decoder_mt function are at risk. However, the likelihood of more severe exploitation is low, particularly on 64-bit systems where the xz is built with Position Independent Executables (PIE), a common practice in Gentoo.
Resolution Steps:
Users of XZ Utils are urged to upgrade to the latest version to mitigate this vulnerability. The update can be applied with the following commands:
bashemerge --sync
emerge --ask --oneshot --verbose ">=app-arch/xz-utils-5.6.4-r1"
Additional Information:
- No Workarounds: Currently, there are no known workarounds for this vulnerability.
- Support and Concerns: Gentoo prioritizes the security of its users. Any security-related queries should be directed to security@gentoo.org or reported via the Gentoo bug tracker.
For further details and updates, users can visit the Gentoo Security Website at [Gentoo Security Advisory](https://security.gentoo.org/glsa/202504-01).
License Information:
This advisory is published under the Creative Commons - Attribution / Share Alike license, and the content is copyright Gentoo Foundation, Inc
XZ Utils Update for Gentoo
The most recent security update for Gentoo Linux fixes an issue in XZ Utils:
[ GLSA 202504-01 ] XZ Utils: Use after free