Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

ubuntu логотип

CVE-2024-3094

Опубликовано: 29 мар. 2024
Источник: ubuntu
Приоритет: critical
EPSS Высокий
CVSS3: 10

Описание

Malicious code was discovered in the upstream tarballs of xz, starting with version 5.6.0. Through a series of complex obfuscations, the liblzma build process extracts a prebuilt object file from a disguised test file existing in the source code, which is then used to modify specific functions in the liblzma code. This results in a modified liblzma library that can be used by any software linked against this library, intercepting and modifying the data interaction with this library.

РелизСтатусПримечание
devel

not-affected

5.4.5-0.3
esm-infra-legacy/trusty

not-affected

esm-infra/bionic

not-affected

esm-infra/focal

not-affected

5.2.4-1ubuntu1.1
esm-infra/xenial

not-affected

focal

not-affected

5.2.4-1ubuntu1.1
jammy

not-affected

5.2.5-2ubuntu1
mantic

not-affected

5.4.1-0.2
noble

not-affected

5.4.5-0.3
trusty/esm

not-affected

Показывать по

EPSS

Процентиль: 99%
0.85192
Высокий

10 Critical

CVSS3

Связанные уязвимости

CVSS3: 10
redhat
почти 2 года назад

Malicious code was discovered in the upstream tarballs of xz, starting with version 5.6.0. Through a series of complex obfuscations, the liblzma build process extracts a prebuilt object file from a disguised test file existing in the source code, which is then used to modify specific functions in the liblzma code. This results in a modified liblzma library that can be used by any software linked against this library, intercepting and modifying the data interaction with this library.

CVSS3: 10
nvd
почти 2 года назад

Malicious code was discovered in the upstream tarballs of xz, starting with version 5.6.0. Through a series of complex obfuscations, the liblzma build process extracts a prebuilt object file from a disguised test file existing in the source code, which is then used to modify specific functions in the liblzma code. This results in a modified liblzma library that can be used by any software linked against this library, intercepting and modifying the data interaction with this library.

CVSS3: 10
debian
почти 2 года назад

Malicious code was discovered in the upstream tarballs of xz, starting ...

CVSS3: 10
github
почти 2 года назад

Malicious code was discovered in the upstream tarballs of xz, starting with version 5.6.0. The tarballs included extra .m4 files, which contained instructions for building with automake that did not exist in the repository. These instructions, through a series of complex obfuscations, extract a prebuilt object file from one of the test archives, which is then used to modify specific functions in the code while building the liblzma package. This issue results in liblzma being used by additional software, like sshd, to provide functionality that will be interpreted by the modified functions.

CVSS3: 10
fstec
почти 2 года назад

Уязвимость библиотеки liblzma пакета для сжатия данных XZ Utils, позволяющая нарушителю выполнить произвольный код

EPSS

Процентиль: 99%
0.85192
Высокий

10 Critical

CVSS3