First published: Wed Aug 19 2020(Updated: )
### Impact xz is a compression and decompression library focusing on the xz format completely written in Go. The function readUvarint used to read the xz container format may not terminate a loop provide malicous input. ### Patches The problem has been fixed in release v0.5.8. ### Workarounds Limit the size of the compressed file input to a reasonable size for your use case. ### References The standard library had recently the same issue and got the [CVE-2020-16845](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16845) allocated. ### For more information If you have any questions or comments about this advisory: * Open an issue in [xz](https://github.com/ulikunitz/xz/issues).
Credit: security-advisories@github.com security-advisories@github.com
Affected Software | Affected Version | How to fix |
---|---|---|
redhat/servicemesh | <0:2.0.9-3.el8 | 0:2.0.9-3.el8 |
redhat/github.com/ulikunitz/xz | <0.5.8 | 0.5.8 |
go/github.com/ulikunitz/xz | <0.5.8 | 0.5.8 |
Tukaani XZ | <0.5.8 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
(Appears in the following advisories)
CVE-2021-29482 has been classified with a Medium severity due to its potential impact when handling malicious input.
To fix CVE-2021-29482, update to version 0.5.8 of the xz library.
CVE-2021-29482 affects the xz library implemented in Go and specifically certain versions of servicemesh and github.com/ulikunitz/xz.
The impact of CVE-2021-29482 is that it may cause an infinite loop when processing malformed xz container format input.
Yes, the patch for CVE-2021-29482 was implemented in version 0.5.8 of the affected library.