Critical Security Alert Issued for Fedora Linux 40 and Rawhide Users
In a major supply‑chain scare that has shaken the Linux ecosystem, Red Hat’s security teams have issued an urgent advisory for Fedora Linux 40 and Fedora Rawhide users over a malicious code injection in the xz compression library.
The vulnerability, tracked as CVE‑2024‑3094, affects versions 5.6.0 and 5.6.1 of the xz tools and libraries and has been rated with a maximum‑severity CVSS score of 10.0, underscoring the severity of the risk.
xz is a widely used data‑compression format that sits under the hood of many Linux distributions, including Fedora, Debian, and others. It provides the liblzma library, which is leveraged by core system components such as the SSH daemon (sshd) to compress and decompress data streams.
Because xz It is embedded so deeply into the toolchain and package infrastructure that any compromise of its build process can ripple across the entire distribution stack.
In the affected upstream releases, the authors introduced an obfuscated build-time injection that only materializes when the official tarballs are compiled, not when the visible Git sources are used.
The malicious logic is hidden inside an M4 macro that, when present, triggers the compilation of a second‑stage payload that then modifies how liblzma interacts with sshd during authentication.
Security analysts who dissected the affected xz source tarballs found that the injected code is designed to alter the behavior of subtly sshd when it uses liblzma for key‑exchange or data‑compression operations.
The backdoor is not a simple password‑bypass; instead, it appears to manipulate or intercept parts of the SSH session setup, potentially allowing an attacker to bypass normal authentication checks or exfiltrate cryptographic material.
Because the payload is triggered only under specific build conditions, the Git repository alone does not reveal the full exploit. This makes the supply‑chain compromise particularly insidious: reviewers could examine the visible code and see nothing amiss, while the compiled code. The file quietly contains the malicious hooks.
Which Fedora releases are affected?
Within the Red Hat community ecosystem, the tainted xz packages are known to have landed in Fedora Rawhide and Fedora Linux 40 beta, which draws heavily from Rawhide for testing.
Specifically, Fedora 40 beta users may have received either xz‑libs‑5.6.0‑1.fc40.x86_64.rpm of xz‑libs‑5.6.0‑2.fc40.x86_64.rpm through the updates‑testing repository, depending on update timing.
Fedora Rawhide users are considered at higher risk because Rawhide is the rolling‑development branch that underpins future Fedora releases (including Fedora 41).
Red Hat has explicitly urged all Fedora Rawhide instances, whether used for work or personal experimentation, to be taken offline immediately until the xz packages can be rolled back to a safe 5.4.x line.
At the time of the original advisory, Fedora 40 stable builds were not shown to be compromised at runtime. Still, the presence of the tainted library versions means that all Fedora 40 beta systems should be treated as potentially at risk and downgraded. Fedora 38 and 39 are not affected by this particular malicious build.
Although the Red Hat‑sponsored advisory focuses on Fedora 40 and Rawhide, the upstream compromise in xz utils means that any distribution that pulled 5.6.0 or 5.6.1 builds from the official tarballs could be exposed. There is confirmed evidence that 5.6.x builds for Debian unstable (Sid) were successfully compiled and could contain the backdoor.
Other community distributions, such as openSUSE, have also issued their own mitigation guidance, including downgrade procedures for affected xz packages.
Users of distributions outside the Red Hat ecosystem are advised to consult their vendor‑specific security advisories and, in business environments, to involve their information‑security teams before continuing to use any system with suspect xz versions.
Immediate actions for Fedora 40 and Rawhide users
For both personal and production Fedora 40 and Fedora Rawhide installations, Red Hat and the Fedora Project recommend:
- Stop using Fedora Rawhide instances for any work or personal activity until the
xzstack is reverted to a known‑safe 5.4. x lineage. - On Fedora 40 beta systems, downgrade to 5.4.x
xzandxz‑libspackages as soon as possible. - Use the official Fedora update FEDORA‑2024‑d02c7bb266 to force the rollback if the update has not applied automatically.
- In enterprise or organizational settings, isolate or power off affected systems, review logs related to
sshd, and engage incident‑response teams to assess for potential compromise.
Distribution maintainers are racing to rebuild their toolchains with clean, pre‑5.6.0 xz versions and to audit all artifacts that may have been produced during the window of compromise.
For administrators, the key takeaway is clear: treat any system that might be running 5.6.0 or 5.6.1 of xz as a potential breach surface and act decisively to restore trust in the underlying compression stack