Malicious code was discovered in the upstream tarballs of xz, starting with version 5.6.0. Through a series of complex obfuscations, the liblzma build process extracts a prebuilt object file from a disguised test file existing in the source code, which is then used to modify specific functions in the liblzma code. This results in a modified liblzma library that can be used by any software linked against this library, intercepting and modifying the data interaction with this library.
{
"license": "CC-BY-4.0",
"sources": [
{
"published": "2024-03-29T17:15:21.150Z",
"url": "https://services.nvd.nist.gov/rest/json/cves/2.0?cveId=CVE-2024-3094",
"imported": "2026-04-08T15:41:00.411Z",
"modified": "2025-08-19T01:15:57.407Z",
"html_url": "https://nvd.nist.gov/vuln/detail/CVE-2024-3094",
"id": "CVE-2024-3094"
}
]
}