Skip to content

CVE-2024-3094 reported for upstream xz #96

@ChanTsune

Description

@ChanTsune

Announcement

CVE-2024-3094 reported for upstream xz

https://nvd.nist.gov/vuln/detail/CVE-2024-3094
https://www.openwall.com/lists/oss-security/2024/03/29/4

This project has a version (liblzma-sys 0.3.0, 0.3.1) that depends on xz 5.6.0 and 5.6.1, but we have confirmed that it does not use a tarball with a backdoor and is not directly affected.

However, if xz 5.6.0 or 5.6.1 is already installed on the system, it may be linked to the xz already installed on the system.
In this case, you can avoid using the xz installed on your system and build from sources that do not contain malicious code by enabling the static future of liblzma-sys (this build process does not use upstream build scripts, and this project's own method of secure build).

liblzma-sys = { version = "0.3.1", futures = ["static"] }
# If you use liblzma
liblzma = { version = "0.3.0", futures = ["static"] }

If you are concerned, avoid using the versions (0.3.x, 0.3.1) that depend on xz 5.6.0, 5.6.1 and use liblzma-sys 0.2.x instead.
liblzma-sys 0.2.x depends on xz 5.4.x before this affected.

even in 0.2.x, if xz is installed on the system, it may be used. Even in 0.2.x, need to enable the static feature to avoid using the system's xz.

Related issue

#95 thank you for report @amousset

Metadata

Metadata

Assignees

No one assigned

    Type

    No type

    Projects

    No projects

    Milestone

    No milestone

    Relationships

    None yet

    Development

    No branches or pull requests

    Issue actions