Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

debian логотип

CVE-2024-3094

Опубликовано: 29 мар. 2024
Источник: debian

Описание

Malicious code was discovered in the upstream tarballs of xz, starting with version 5.6.0. Through a series of complex obfuscations, the liblzma build process extracts a prebuilt object file from a disguised test file existing in the source code, which is then used to modify specific functions in the liblzma code. This results in a modified liblzma library that can be used by any software linked against this library, intercepting and modifying the data interaction with this library.

Пакеты

ПакетСтатусВерсия исправленияРелизТип
xz-utilsfixed5.6.1+really5.4.5-1package
xz-utilsnot-affectedbookwormpackage
xz-utilsnot-affectedbullseyepackage
xz-utilsnot-affectedbusterpackage

Примечания

  • https://www.openwall.com/lists/oss-security/2024/03/29/4

  • https://tukaani.org/xz-backdoor/

  • https://boehs.org/node/everything-i-know-about-the-xz-backdoor

  • https://rya.nc/xz-valid-n.html

  • https://lwn.net/Articles/967192/

  • https://securelist.com/xz-backdoor-story-part-1/112354/

  • https://securelist.com/xz-backdoor-story-part-2-social-engineering/112476/

  • https://securelist.com/xz-backdoor-part-3-hooking-ssh/113007/

Связанные уязвимости

CVSS3: 10
ubuntu
почти 2 года назад

Malicious code was discovered in the upstream tarballs of xz, starting with version 5.6.0. Through a series of complex obfuscations, the liblzma build process extracts a prebuilt object file from a disguised test file existing in the source code, which is then used to modify specific functions in the liblzma code. This results in a modified liblzma library that can be used by any software linked against this library, intercepting and modifying the data interaction with this library.

CVSS3: 10
redhat
почти 2 года назад

Malicious code was discovered in the upstream tarballs of xz, starting with version 5.6.0. Through a series of complex obfuscations, the liblzma build process extracts a prebuilt object file from a disguised test file existing in the source code, which is then used to modify specific functions in the liblzma code. This results in a modified liblzma library that can be used by any software linked against this library, intercepting and modifying the data interaction with this library.

CVSS3: 10
nvd
почти 2 года назад

Malicious code was discovered in the upstream tarballs of xz, starting with version 5.6.0. Through a series of complex obfuscations, the liblzma build process extracts a prebuilt object file from a disguised test file existing in the source code, which is then used to modify specific functions in the liblzma code. This results in a modified liblzma library that can be used by any software linked against this library, intercepting and modifying the data interaction with this library.

CVSS3: 10
github
почти 2 года назад

Malicious code was discovered in the upstream tarballs of xz, starting with version 5.6.0. The tarballs included extra .m4 files, which contained instructions for building with automake that did not exist in the repository. These instructions, through a series of complex obfuscations, extract a prebuilt object file from one of the test archives, which is then used to modify specific functions in the code while building the liblzma package. This issue results in liblzma being used by additional software, like sshd, to provide functionality that will be interpreted by the modified functions.

CVSS3: 10
fstec
почти 2 года назад

Уязвимость библиотеки liblzma пакета для сжатия данных XZ Utils, позволяющая нарушителю выполнить произвольный код