Malicious code was discovered in the upstream tarballs of xz, starting with version 5.6.0. Through a series of complex obfuscations, the liblzma build process extracts a prebuilt object file from a disguised test file existing in the source code, which is then used to modify specific functions in the liblzma code. This results in a modified liblzma library that can be used by any software linked against this library, intercepting and modifying the data interaction with this library.
| Version | Score | Severity | Vector String |
|---|---|---|---|
| 3.1 | 10 | Critical | CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H |
| Product | Vendor | Version |
|---|---|---|
| n/a | ||
| Red Hat Enterprise Linux 6 | Red Hat | SA8530P |
| Red Hat Enterprise Linux 7 | Red Hat | SA8540P |
| Red Hat Enterprise Linux 8 | Red Hat | < 10.0.14393.6085 |
| Red Hat JBoss Enterprise Application Platform 8 | Red Hat | SA8620P |
| Immersive Home 214 Platform | ||
| Red Hat Enterprise Linux 6 | Red Hat | 5.6.14.1 |
| Red Hat Enterprise Linux 7 | Red Hat | Android11/Android12/Android13 |
| Red Hat Enterprise Linux 8 | Red Hat | < 60.3 |
| Red Hat Enterprise Linux 9 | Red Hat | Immersive Home 216 Platform |
| Red Hat JBoss Enterprise Application Platform 8 | Red Hat | 5.7.1.1 |