Malicious code was discovered in the upstream tarballs of xz, starting with version 5.6.0.
Through a series of complex obfuscations, the liblzma build process extracts a prebuilt object file from a disguised test file existing in the source code, which is then used to modify specific functions in the liblzma code. This results in a modified liblzma library that can be used by any software linked against this library, intercepting and modifying the data interaction with this library.
References
Configurations
Configuration 1 (hide)
|
History
21 Nov 2024, 09:28
Type | Values Removed | Values Added |
---|---|---|
References | () http://www.openwall.com/lists/oss-security/2024/03/29/10 - | |
References | () http://www.openwall.com/lists/oss-security/2024/03/29/12 - | |
References | () http://www.openwall.com/lists/oss-security/2024/03/29/4 - | |
References | () http://www.openwall.com/lists/oss-security/2024/03/29/5 - | |
References | () http://www.openwall.com/lists/oss-security/2024/03/29/8 - | |
References | () http://www.openwall.com/lists/oss-security/2024/03/30/12 - | |
References | () http://www.openwall.com/lists/oss-security/2024/03/30/27 - | |
References | () http://www.openwall.com/lists/oss-security/2024/03/30/36 - | |
References | () http://www.openwall.com/lists/oss-security/2024/03/30/5 - | |
References | () http://www.openwall.com/lists/oss-security/2024/04/16/5 - | |
References | () https://access.redhat.com/security/cve/CVE-2024-3094 - Vendor Advisory | |
References | () https://ariadne.space/2024/04/02/the-xz-utils-backdoor-is-a-symptom-of-a-larger-problem/ - | |
References | () https://arstechnica.com/security/2024/03/backdoor-found-in-widely-used-linux-utility-breaks-encrypted-ssh-connections/ - Third Party Advisory | |
References | () https://aws.amazon.com/security/security-bulletins/AWS-2024-002/ - Third Party Advisory | |
References | () https://blog.netbsd.org/tnf/entry/statement_on_backdoor_in_xz - | |
References | () https://boehs.org/node/everything-i-know-about-the-xz-backdoor - Third Party Advisory | |
References | () https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1068024 - Mailing List, Vendor Advisory | |
References | () https://bugs.gentoo.org/928134 - Issue Tracking, Third Party Advisory | |
References | () https://bugzilla.redhat.com/show_bug.cgi?id=2272210 - Issue Tracking, Vendor Advisory | |
References | () https://bugzilla.suse.com/show_bug.cgi?id=1222124 - Issue Tracking, Third Party Advisory | |
References | () https://discourse.nixos.org/t/cve-2024-3094-malicious-code-in-xz-5-6-0-and-5-6-1-tarballs/42405 - Third Party Advisory | |
References | () https://gist.github.com/thesamesam/223949d5a074ebc3dce9ee78baad9e27 - Third Party Advisory | |
References | () https://github.com/advisories/GHSA-rxwq-x6h5-x525 - Third Party Advisory | |
References | () https://github.com/amlweems/xzbot - | |
References | () https://github.com/karcherm/xz-malware - Third Party Advisory | |
References | () https://gynvael.coldwind.pl/?lang=en&id=782 - Technical Description, Third Party Advisory | |
References | () https://lists.debian.org/debian-security-announce/2024/msg00057.html - Mailing List, Third Party Advisory | |
References | () https://lists.freebsd.org/archives/freebsd-security/2024-March/000248.html - Third Party Advisory | |
References | () https://lwn.net/Articles/967180/ - Issue Tracking, Third Party Advisory | |
References | () https://news.ycombinator.com/item?id=39865810 - Issue Tracking, Third Party Advisory | |
References | () https://news.ycombinator.com/item?id=39877267 - Issue Tracking | |
References | () https://news.ycombinator.com/item?id=39895344 - | |
References | () https://openssf.org/blog/2024/03/30/xz-backdoor-cve-2024-3094/ - Third Party Advisory | |
References | () https://research.swtch.com/xz-script - | |
References | () https://research.swtch.com/xz-timeline - | |
References | () https://security-tracker.debian.org/tracker/CVE-2024-3094 - Third Party Advisory | |
References | () https://security.alpinelinux.org/vuln/CVE-2024-3094 - Third Party Advisory | |
References | () https://security.archlinux.org/CVE-2024-3094 - Third Party Advisory | |
References | () https://security.netapp.com/advisory/ntap-20240402-0001/ - | |
References | () https://tukaani.org/xz-backdoor/ - Issue Tracking, Vendor Advisory | |
References | () https://twitter.com/LetsDefendIO/status/1774804387417751958 - Third Party Advisory | |
References | () https://twitter.com/debian/status/1774219194638409898 - Press/Media Coverage | |
References | () https://twitter.com/infosecb/status/1774595540233167206 - Press/Media Coverage | |
References | () https://twitter.com/infosecb/status/1774597228864139400 - Press/Media Coverage | |
References | () https://ubuntu.com/security/CVE-2024-3094 - Third Party Advisory | |
References | () https://www.cisa.gov/news-events/alerts/2024/03/29/reported-supply-chain-compromise-affecting-xz-utils-data-compression-library-cve-2024-3094 - Third Party Advisory, US Government Resource | |
References | () https://www.darkreading.com/vulnerabilities-threats/are-you-affected-by-the-backdoor-in-xz-utils - Third Party Advisory | |
References | () https://www.kali.org/blog/about-the-xz-backdoor/ - | |
References | () https://www.openwall.com/lists/oss-security/2024/03/29/4 - Mailing List | |
References | () https://www.redhat.com/en/blog/urgent-security-alert-fedora-41-and-rawhide-users - Vendor Advisory | |
References | () https://www.tenable.com/blog/frequently-asked-questions-cve-2024-3094-supply-chain-backdoor-in-xz-utils - Third Party Advisory | |
References | () https://www.theregister.com/2024/03/29/malicious_backdoor_xz/ - Press/Media Coverage | |
References | () https://www.vicarius.io/vsociety/vulnerabilities/cve-2024-3094 - | |
References | () https://xeiaso.net/notes/2024/xz-vuln/ - Third Party Advisory |
01 May 2024, 19:15
Type | Values Removed | Values Added |
---|---|---|
References |
|
01 May 2024, 18:15
Type | Values Removed | Values Added |
---|---|---|
References |
|
01 May 2024, 17:15
Type | Values Removed | Values Added |
---|---|---|
References |
|
12 Apr 2024, 07:15
Type | Values Removed | Values Added |
---|---|---|
References |
|
03 Apr 2024, 06:15
Type | Values Removed | Values Added |
---|---|---|
References |
|
03 Apr 2024, 04:15
Type | Values Removed | Values Added |
---|---|---|
References |
|
02 Apr 2024, 23:15
Type | Values Removed | Values Added |
---|---|---|
Summary |
|
|
References |
|
01 Apr 2024, 18:15
Type | Values Removed | Values Added |
---|---|---|
References |
|
01 Apr 2024, 17:23
Type | Values Removed | Values Added |
---|---|---|
References |
|
|
References | () https://access.redhat.com/security/cve/CVE-2024-3094 - Vendor Advisory | |
References | () https://arstechnica.com/security/2024/03/backdoor-found-in-widely-used-linux-utility-breaks-encrypted-ssh-connections/ - Third Party Advisory | |
References | () https://aws.amazon.com/security/security-bulletins/AWS-2024-002/ - Third Party Advisory | |
References | () https://boehs.org/node/everything-i-know-about-the-xz-backdoor - Third Party Advisory | |
References | () https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1068024 - Mailing List, Vendor Advisory | |
References | () https://bugs.gentoo.org/928134 - Issue Tracking, Third Party Advisory | |
References | () https://bugzilla.redhat.com/show_bug.cgi?id=2272210 - Issue Tracking, Vendor Advisory | |
References | () https://bugzilla.suse.com/show_bug.cgi?id=1222124 - Issue Tracking, Third Party Advisory | |
References | () https://discourse.nixos.org/t/cve-2024-3094-malicious-code-in-xz-5-6-0-and-5-6-1-tarballs/42405 - Third Party Advisory | |
References | () https://gist.github.com/thesamesam/223949d5a074ebc3dce9ee78baad9e27 - Third Party Advisory | |
References | () https://github.com/advisories/GHSA-rxwq-x6h5-x525 - Third Party Advisory | |
References | () https://github.com/karcherm/xz-malware - Third Party Advisory | |
References | () https://gynvael.coldwind.pl/?lang=en&id=782 - Technical Description, Third Party Advisory | |
References | () https://lists.debian.org/debian-security-announce/2024/msg00057.html - Mailing List, Third Party Advisory | |
References | () https://lists.freebsd.org/archives/freebsd-security/2024-March/000248.html - Third Party Advisory | |
References | () https://lwn.net/Articles/967180/ - Issue Tracking, Third Party Advisory | |
References | () https://news.ycombinator.com/item?id=39865810 - Issue Tracking, Third Party Advisory | |
References | () https://news.ycombinator.com/item?id=39877267 - Issue Tracking | |
References | () https://openssf.org/blog/2024/03/30/xz-backdoor-cve-2024-3094/ - Third Party Advisory | |
References | () https://security-tracker.debian.org/tracker/CVE-2024-3094 - Third Party Advisory | |
References | () https://security.alpinelinux.org/vuln/CVE-2024-3094 - Third Party Advisory | |
References | () https://security.archlinux.org/CVE-2024-3094 - Third Party Advisory | |
References | () https://tukaani.org/xz-backdoor/ - Issue Tracking, Vendor Advisory | |
References | () https://twitter.com/debian/status/1774219194638409898 - Press/Media Coverage | |
References | () https://twitter.com/infosecb/status/1774595540233167206 - Press/Media Coverage | |
References | () https://twitter.com/infosecb/status/1774597228864139400 - Press/Media Coverage | |
References | () https://ubuntu.com/security/CVE-2024-3094 - Third Party Advisory | |
References | () https://www.cisa.gov/news-events/alerts/2024/03/29/reported-supply-chain-compromise-affecting-xz-utils-data-compression-library-cve-2024-3094 - Third Party Advisory, US Government Resource | |
References | () https://www.darkreading.com/vulnerabilities-threats/are-you-affected-by-the-backdoor-in-xz-utils - Third Party Advisory | |
References | () https://www.openwall.com/lists/oss-security/2024/03/29/4 - Mailing List | |
References | () https://www.redhat.com/en/blog/urgent-security-alert-fedora-41-and-rawhide-users - Vendor Advisory | |
References | () https://www.tenable.com/blog/frequently-asked-questions-cve-2024-3094-supply-chain-backdoor-in-xz-utils - Third Party Advisory | |
References | () https://www.theregister.com/2024/03/29/malicious_backdoor_xz/ - Press/Media Coverage | |
References | () https://xeiaso.net/notes/2024/xz-vuln/ - Third Party Advisory | |
CPE | cpe:2.3:a:tukaani:xz:5.6.0:*:*:*:*:*:*:* cpe:2.3:a:tukaani:xz:5.6.1:*:*:*:*:*:*:* |
|
First Time |
Tukaani xz
Tukaani |
01 Apr 2024, 05:15
Type | Values Removed | Values Added |
---|---|---|
References |
|
31 Mar 2024, 01:15
Type | Values Removed | Values Added |
---|---|---|
References |
|
30 Mar 2024, 20:15
Type | Values Removed | Values Added |
---|---|---|
References |
|
30 Mar 2024, 11:15
Type | Values Removed | Values Added |
---|---|---|
References |
|
29 Mar 2024, 19:15
Type | Values Removed | Values Added |
---|---|---|
Summary | (en) Malicious code was discovered in the upstream tarballs of xz, starting with version 5.6.0. Through a series of complex obfuscations, the liblzma build process extracts a prebuilt object file from a disguised test file existing in the source code, which is then used to modify specific functions in the liblzma code. This results in a modified liblzma library that can be used by any software linked against this library, intercepting and modifying the data interaction with this library. |
29 Mar 2024, 17:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2024-03-29 17:15
Updated : 2024-11-21 09:28
NVD link : CVE-2024-3094
Mitre link : CVE-2024-3094
CVE.ORG link : CVE-2024-3094
JSON object : View
Products Affected
tukaani
- xz
CWE
CWE-506
Embedded Malicious Code