vulnerability
Arch Linux: Authentication bypass (CVE-2024-3094)
| Severity | CVSS | Published | Added | Modified |
|---|---|---|---|---|
| 10 | (AV:N/AC:L/Au:N/C:C/I:C/A:C) | Mar 29, 2024 | Jul 11, 2025 | Nov 27, 2025 |
Severity
10
CVSS
(AV:N/AC:L/Au:N/C:C/I:C/A:C)
Published
Mar 29, 2024
Added
Jul 11, 2025
Modified
Nov 27, 2025
Description
Malicious code was discovered in the upstream tarballs of xz, starting with version 5.6.0. The tarballs included extra .m4 files, which contained instructions for building with automake that did not exist in the repository. These instructions, through a series of complex obfuscations, extract a prebuilt object file from one of the test archives, which is then used to modify specific functions in the code while building the liblzma package. This issue results in liblzma being used by additional software, like sshd, to provide functionality that will be interpreted by the modified functions.
Solution
arch-linux-upgrade-latest
References
- CVE-2024-3094
- https://attackerkb.com/topics/CVE-2024-3094
- URL-https://access.redhat.com/security/cve/CVE-2024-3094
- URL-https://bugzilla.redhat.com/show_bug.cgi?id=2272210
- URL-https://security.archlinux.org/ASA-202403-1
- URL-https://www.openwall.com/lists/oss-security/2024/03/29/4
- URL-https://www.redhat.com/en/blog/urgent-security-alert-fedora-41-and-rawhide-users
- CWE-506
NEW
Explore Exposure Command
Confidently identify and prioritize exposures from endpoint to cloud with full attack surface visibility and threat-aware risk context.