<?xml version="1.0" encoding="utf-8"?>
<rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom">
	<channel>
		<atom:link href="https://dev1galaxy.org/extern.php?action=feed&amp;tid=6534&amp;type=rss" rel="self" type="application/rss+xml" />
		<title><![CDATA[Dev1 Galaxy Forum / CVE-2024-3094: LZMA/XZ security report]]></title>
		<link>https://dev1galaxy.org/viewtopic.php?id=6534</link>
		<description><![CDATA[The most recent posts in CVE-2024-3094: LZMA/XZ security report.]]></description>
		<lastBuildDate>Mon, 08 Apr 2024 12:10:28 +0000</lastBuildDate>
		<generator>FluxBB</generator>
		<item>
			<title><![CDATA[Re: CVE-2024-3094: LZMA/XZ security report]]></title>
			<link>https://dev1galaxy.org/viewtopic.php?pid=49445#p49445</link>
			<description><![CDATA[<p>fun enough, systemd does link xz-utils so machines running systemd with xz-utils 5.6.0 are extra compromised with an init level backdoor...</p>]]></description>
			<author><![CDATA[dummy@example.com (EDX-0)]]></author>
			<pubDate>Mon, 08 Apr 2024 12:10:28 +0000</pubDate>
			<guid>https://dev1galaxy.org/viewtopic.php?pid=49445#p49445</guid>
		</item>
		<item>
			<title><![CDATA[Re: CVE-2024-3094: LZMA/XZ security report]]></title>
			<link>https://dev1galaxy.org/viewtopic.php?pid=49331#p49331</link>
			<description><![CDATA[<p>My references weren&#039;t related directly to Devuan but I get your point.</p>]]></description>
			<author><![CDATA[dummy@example.com (siva)]]></author>
			<pubDate>Tue, 02 Apr 2024 14:55:33 +0000</pubDate>
			<guid>https://dev1galaxy.org/viewtopic.php?pid=49331#p49331</guid>
		</item>
		<item>
			<title><![CDATA[Re: CVE-2024-3094: LZMA/XZ security report]]></title>
			<link>https://dev1galaxy.org/viewtopic.php?pid=49316#p49316</link>
			<description><![CDATA[<p>Perhaps admin might sticky this one instead of having more of these threads pop up, at least until this category 5 hurricane of an exploit is fully fleshed out and realized. No disrespect siva but this is about the 5th thread on this subject.</p>]]></description>
			<author><![CDATA[dummy@example.com (soren)]]></author>
			<pubDate>Mon, 01 Apr 2024 01:29:48 +0000</pubDate>
			<guid>https://dev1galaxy.org/viewtopic.php?pid=49316#p49316</guid>
		</item>
		<item>
			<title><![CDATA[CVE-2024-3094: LZMA/XZ security report]]></title>
			<link>https://dev1galaxy.org/viewtopic.php?pid=49314#p49314</link>
			<description><![CDATA[<p>Thought the group might find this interesting. </p><p>From <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-3094" rel="nofollow">Red Hat</a>:</p><div class="quotebox"><blockquote><div><p>Malicious code was discovered in the upstream tarballs of xz, starting with version 5.6.0. Through a series of complex obfuscations, the liblzma build process extracts a prebuilt object file from a disguised test file existing in the source code, which is then used to modify specific functions in the liblzma code. This results in a modified liblzma library that can be used by any software linked against this library, intercepting and modifying the data interaction with this library.</p></div></blockquote></div><p>Related:<br />- <a href="https://gynvael.coldwind.pl/?lang=en&amp;id=782" rel="nofollow">https://gynvael.coldwind.pl/?lang=en&amp;id=782</a><br />- <a href="https://www.openwall.com/lists/oss-security/2024/03/29/4" rel="nofollow">https://www.openwall.com/lists/oss-secu … 24/03/29/4</a><br />- <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-3094" rel="nofollow">https://nvd.nist.gov/vuln/detail/CVE-2024-3094</a></p>]]></description>
			<author><![CDATA[dummy@example.com (siva)]]></author>
			<pubDate>Sun, 31 Mar 2024 23:04:42 +0000</pubDate>
			<guid>https://dev1galaxy.org/viewtopic.php?pid=49314#p49314</guid>
		</item>
	</channel>
</rss>
