EGI SVG Advisories

Advisory-EGI-SVG-2024-07

CRITICAL risk Vulnerability in xz data compression tools

Date: 2024-04-03 Updated 2024-04-10

A CRITICAL risk vulnerability has been found in recent versions of xz data compression tools. [R 1]

Only a few Linux distributions use the versions affected, which does not include RHEL and its derivatives like RockyLinux and AlmaLinux. Hence most EGI sites will not be affected. We are sending this alert as a precautionary measure because of the severity of this vulnerability.

IDs AND CVSS SCORE

EGI SVG ID : EGI-SVG-2024-07

CVE ID : CVE-2024-3094

CVSS Score : 10.0 [R 1]

ACTIONS REQUIRED/RECOMMENDED

Sites should check that they DO NOT have a vulnerable version of xz tools installed. The vulnerable versions are 5.6.0 and 5.6.1.

If anyone becomes aware of any situation where this vulnerability has an impact on the EGI infrastructure then please inform EGI SVG.

MORE INFORMATION

While the vulnerable versions are NOT included in most RedHat versions or their derivatives [R 2], they were included in Fedora 40 and 41 which are upstream versions of RHEL releases.

Other affected distributions include OpenSUSE Tumbleweed [R 6], Gentoo [R 7] and Debian sid (unstable) [R 8].

Also see references below.

UPDATE 2024-04-10

It has come to our attention that some versions of ARCH linux may contain a vulnerable version of this software, but this is not really in SVG’s normal scope but could be used by some containers such as Docker.

STATUS OF THIS ADVISORY

TLP:CLEAR information - Unlimited distribution

https://advisories.egi.eu/Advisory-EGI-SVG-2024-07

https://advisories.egi.eu/Advisory-SVG-CVE-2024-3094

Minor updates may be made without re-distribution to the sites.

CONTACT AND OTHER INFORMATION ON SVG


This advisory is subject to the Creative Commons licence 
https://creativecommons.org/licenses/by/4.0/ and
the EGI (https://www.egi.eu/) Software Vulnerability Group 
must be credited. -----------------------------

Comments or questions should be sent to svg-rat at mailman.egi.eu

Vulnerabilities relevant for EGI can be reported at report-vulnerability at egi.eu

(see [R 99] for further details, and other information on SVG)

REFERENCES

CREDITS

SVG was alerted to this vulnerability by David Crooks.