Description

Red Hat has released an urgent warning about a sophisticated supply chain attack involving the widely used xz compression utility. Security researchers identified hidden malicious code in recent xz library versions, potentially allowing attackers to gain unauthorized remote access to Linux systems. The issue, tracked as CVE-2024-3094, impacts versions 5.6.0 and 5.6.1 of xz and xz-libs. Affected environments include Fedora Rawhide, Fedora 40 Beta, Debian unstable (Sid), and openSUSE. Since xz is a core compression tool used across many Linux distributions, this vulnerability poses a serious risk to system security. The attack is highly advanced and carefully concealed. The malicious payload is not directly visible in the primary source repository, making detection difficult during normal code reviews. Instead, it relies on a hidden M4 macro that triggers the exploit during the build process. This macro works with additional concealed components to assemble the full malicious code. Once deployed, the compromised library interferes with SSH authentication processes through systemd, which is critical because SSH is widely used for secure remote access. Under certain conditions, this manipulation can allow attackers to bypass authentication and gain full control of affected systems. Red Hat has confirmed that its enterprise products, including Red Hat Enterprise Linux, are not impacted. However, users of Fedora Rawhide and Fedora 40 Beta should take immediate precautions. Administrators are advised to stop using affected systems temporarily and downgrade xz packages to the secure 5.4.x versions. Red Hat has also released updates to address the issue, and users are encouraged to apply them promptly to ensure their systems remain protected.