CVE-2024-3094

Source
https://cve.org/CVERecord?id=CVE-2024-3094
Import Source
https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2024-3094.json
JSON Data
https://api.test.osv.dev/v1/vulns/CVE-2024-3094
Aliases
  • GHSA-rxwq-x6h5-x525
Downstream
Related
Published
2024-03-29T17:15:21.150Z
Modified
2025-11-15T18:54:36.958643Z
Severity
  • 10.0 (Critical) CVSS_V3 - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H CVSS Calculator
Summary
[none]
Details

Malicious code was discovered in the upstream tarballs of xz, starting with version 5.6.0. Through a series of complex obfuscations, the liblzma build process extracts a prebuilt object file from a disguised test file existing in the source code, which is then used to modify specific functions in the liblzma code. This results in a modified liblzma library that can be used by any software linked against this library, intercepting and modifying the data interaction with this library.

References

Affected packages

Git / git.tukaani.org/xz.git

Affected ranges

Type
GIT
Repo
https://git.tukaani.org/xz.git
Events
Introduced
0 Unknown introduced commit / All previous commits are affected
Last affected
2d7d862e3ffa8cec4fd3fdffcd84e984a17aa429
Last affected
fd1b975b7851e081ed6e5cf63df946cd5cbdbb94

Affected versions

v4.*

v4.42.2alpha
v4.999.3alpha
v4.999.5alpha
v4.999.7beta
v4.999.8beta
v4.999.9beta

v5.*

v5.0.0
v5.1.0alpha
v5.1.1alpha
v5.1.2alpha
v5.1.3alpha
v5.1.4beta
v5.2.0
v5.2.1
v5.3.1alpha
v5.3.2alpha
v5.3.3alpha
v5.3.4alpha
v5.3.5beta
v5.4.0
v5.5.0alpha
v5.5.1alpha
v5.5.2beta
v5.6.0

Database specific

source

"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2024-3094.json"