Hackers News Hackers News
  • CyberSecurity News
  • Threats
  • Attacks
  • Vulnerabilities
  • Breaches
  • Comparisons

Social Media

Hackers News Hackers News
  • CyberSecurity News
  • Threats
  • Attacks
  • Vulnerabilities
  • Breaches
  • Comparisons
Search the Site
Popular Searches:
technology Amazon AI
Recent Posts
Trellix Source Code Breach: Hackers Access Repository
May 2, 2026
Hackers Exploit cPanel Flaw to Breach Government Military
May 2, 2026
Exim Mail Server Vulnerabilities Lead to Crash via DNS Data
May 2, 2026
Home/Vulnerabilities/Red Hat Warns: Malware in Linux Tool Allows System
Vulnerabilities

Red Hat Warns: Malware in Linux Tool Allows System

Red Hat has issued a critical security warning, identifying malicious code within recent versions of the “xz” compression tools and libraries. Tracked as CVE-2024-3094, this highly...

Marcus Rodriguez
Marcus Rodriguez
March 27, 2026 2 Min Read
0 0

Red Hat has issued a critical security warning, identifying malicious code within recent versions of the “xz” compression tools and libraries.

Tracked as CVE-2024-3094, this highly sophisticated supply chain compromise could allow threat actors to bypass authentication and gain unauthorized remote access to affected Linux systems.

The xz utility is a fundamental data compression format present in almost every commercial and community Linux distribution.

It is primarily used to compress large files into smaller sizes for efficient transfer. Security researchers discovered that malicious code was quietly injected into versions 5.6.0 and 5.6.1 of the xz utility.

The attackers utilized sophisticated obfuscation techniques to hide their tracks. The malicious code is not clearly visible in the primary Git repository.

Instead, it is triggered by an obfuscated M4 macro that is only included in the full distribution download package. During the software build process, this hidden macro compiles second-stage artifacts that alter the library’s functionality.

Once installed on a system, the compromised build directly interferes with authentication processes in sshd via systemd.

Secure Shell (SSH) is the standard protocol for remote system management, and this interference allows malicious actors to break authentication checks, ultimately gaining full, unauthorized remote access to the machine.

Affected Linux Distributions

Red Hat has confirmed that no versions of Red Hat Enterprise Linux (RHEL) are affected by this vulnerability. Within the Red Hat ecosystem, the compromised packages are isolated to Fedora Rawhide and the Fedora Linux 40 beta.

Fedora Rawhide users may have installed either version 5.6.0 or 5.6.1. At the same time, Fedora 40 beta environments were exposed to version 5.6.0 through recent update cycles.

While Red Hat notes that the malicious code injection does not appear to have successfully executed in the Fedora 40 builds, the presence of the compromised libraries still poses a significant risk.

Beyond Red Hat, other community distributions are also dealing with this threat. Evidence shows the injected code successfully built in Debian unstable (Sid) and several openSUSE distributions.

System administrators must take immediate action to secure their environments. Red Hat strongly advises users to completely halt all usage of Fedora Rawhide instances for both work and personal activities until the system is fully reverted to the safe xz-5.4.x version.

For Fedora Linux 40 beta users, an emergency update has been published to force a downgrade to 5.4. x build. Users of openSUSE and Debian should consult their specific distribution maintainers for immediate downgrade procedures.

Security teams must actively audit their infrastructure for xz versions 5.6.0 and 5.6.1 and replace them without delay to prevent potential network breaches.

Disclaimer: HackersRadar reports on cybersecurity threats and incidents for informational and awareness purposes only. We do not engage in hacking activities, data exfiltration, or the hosting or distribution of stolen or leaked information. All content is based on publicly available sources.

Tags:

AttackBreachCVEMalwareSecurityThreatVulnerability

Share Article

Marcus Rodriguez

Marcus Rodriguez

Marcus is a security researcher and investigative journalist with expertise in vulnerability research, bug bounties, and cloud security. Since 2017, Marcus has been breaking stories on critical vulnerabilities affecting major platforms. His investigative work has led to the disclosure of numerous security flaws and improved defenses across the industry. Marcus is an active participant in bug bounty programs and has been recognized for responsible disclosure practices. He holds multiple security certifications and regularly speaks at industry events.

Previous Post

Critical Citrix NetScaler & Gateway Flaws Leak Data

Next Post

Telnyx PyPI Package With 742,000 downloads Compromised in TeamPCP

No Comment! Be the first one.

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Popular Posts
cPanelSniper PoC Exploit for cPanel Vulner Disclosed Vulnerability
May 2, 2026
EtherRAT Targets Enterprise Admins with SEO Poison
May 1, 2026
New Spyware Platform: Rebrand & Resell Android Lets Buyers
May 1, 2026
Top Authors
Marcus Rodriguez
Marcus Rodriguez
Sarah simpson
Sarah simpson
Emy Elsamnoudy
Emy Elsamnoudy
Let's Connect
156k
2.25m
285k

Related Posts

Jennifer sherman
By Jennifer sherman
Threats

GlassWorm Attacks macOS via Malicious VS Code…

January 1, 2026
Emy Elsamnoudy
By Emy Elsamnoudy
Attacks

ClickFix Attack Hides Malicious Code via Stegan Security

January 1, 2026
Sarah simpson
By Sarah simpson
Vulnerabilities

MongoBleed Detector Tool Detects Critical MongoDB CVE-

January 1, 2026
Emy Elsamnoudy
By Emy Elsamnoudy
Breaches

Conti Ransomware Gang Leaders & Infrastructure Exposed

January 1, 2026
Hackers News Hackers News
  • [email protected]

Quick Links

  • Contact Us
  • Privacy Policy
  • Terms of service

Categories

Attacks
Breaches
Comparisons
CyberSecurity News
Threats
Vulnerabilities

Let's keep in touch

receive fresh updates and breaking cyber news every day and week!

All Rights Reserved by HackersRadar ©2026

Follow Us