Advisory

XZ Utils 5.8.3 Released to Patch Buffer Overflow and Memory Access Flaws

Take action: Even if developers claim a bug is hard to hit, a CVSS 9.8 in a core library like XZ requires attention. Plan an update of your Linux distributions and container images now to ensure this foundational component isn't a weak link in your supply chain.


Learn More

The developers of XZ Utils have released version 5.8.3 to address two security vulnerabilities, including a critically scord buffer overflow that affects the core library. 

While the maintainers suggest the flaws are difficult to trigger in production environments, security agencies such as the German BSI (CERT-Bund) have assigned a critical severity rating to the primary issue. The update affects all versions of the compression library since 5.0.0, making it a significant concern for Linux distributions and software that relies on liblzma for data compression.

Vulnerabilities summary:

  • CVE-2026-34743 (CVSS score 9.8) - A buffer overflow in the lzma_index_append() function that occurs when an application attempts to append records to a decoded index that contains no records. The flaw is caused by the lzma_index_decoder() leaving the index in a state where subsequent appends allocate insufficient memory. If triggered, an attacker could cause a buffer overflow, potentially leading to arbitrary code execution or system crashes.
  • Unnamed Memory Access Flaw (CVSS score TBD) - An invalid memory access vulnerability in the xz command-line tool when using the --files or --files0 flags. This issue impacts 32-bit systems where a filename string exceeds 2 GiB, causing an integer overflow during a realloc() call. This leads to a realloc(ptr, 0) operation which, if it returns a non-null pointer, results in out-of-bounds memory access.

The primary risk involves applications that directly use liblzma index functions, though such usage is considered rare in standard software implementations. A successful exploit of the buffer overflow could allow for remote code execution if an attacker can control the index data being processed by the library. On 32-bit systems, the memory access flaw could lead to application instability or crashes when processing exceptionally long filenames, though this requires specific memory allocation conditions to be met.

The vulnerabilities impact XZ Utils versions 5.0.0 through 5.8.2 across various Linux distributions and operating systems. Version 5.8.3 is the official fix, the developers have confirmed that no new releases will be made for the legacy 5.2.x, 5.4.x, or 5.6.x branches. Instead, security patches have been pushed to the respective v5.2, v5.4, and v5.6 branches in the official XZ Git repository for manual compilation or distribution backporting.

Administrators should check their package managers for XZ Utils 5.8.3 or equivalent backported security updates from their vendors. Distributions like Slackware have already released updates, others like Debian are currently assessing the risk and preparing packages.

XZ Utils 5.8.3 Released to Patch Buffer Overflow and Memory Access Flaws