CVE-2024-3094

Malicious code was discovered in the upstream tarballs of xz, starting with version 5.6.0. Through a series of complex obfuscations, the liblzma build process extracts a prebuilt object file from a disguised test file existing in the source code, which is then used to modify specific functions in the liblzma code. This results in a modified liblzma library that can be used by any software linked against this library, intercepting and modifying the data interaction with this library.

Fixed
HIGH (7.6)
  • T

    Tim Bastin detected CVE-2024-3094 with a risk of 7.61

  • logo

    System updated the risk assessment to 3.8

    System recalculated raw risk assessment

  • logo

    System updated the risk assessment to 7.61

    System recalculated raw risk assessment

  • logo

    System updated the risk assessment to 3.8

    System recalculated raw risk assessment

  • logo

    System updated the risk assessment from 3.8 to 7.61

    System recalculated raw risk assessment

  • logo

    System detected CVE-2024-3094 with scanner: container-scanning github.com/l3montree-dev/devguard/cmd/devguard-scanner/container-scanning github.com/l3montree-dev/devguard/cmd/devguard-scanner/container-scanning github.com/l3montree-dev/devguard/cmd/devguard-scanner/container-scanning

  • logo

    System fixed CVE-2024-3094

Reopen this vulnerability

You can reopen this vuln, if you plan to mitigate the risk now, or accepted this vuln by accident.

Last calculated at:

Affected component

Logo von deb debian/xz-utils

Installed version:
5.4.1
Fixed in:
no patch available

Management decisions across the organization

Copyright © 2025 L3montree GmbH and the DevGuard Contributors. All rights reserved. Version 71cda54d19c6900d5d185b8bc7c11608a8a65bac