<?xml version="1.0" encoding="utf-8" standalone="yes"?>
<rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom">
  <channel>
    <title>Cve on XtraLinux</title>
    <link>https://xtralinux.pages.dev/en/tags/cve/</link>
    <description>Recent content in Cve on XtraLinux</description>
    <generator>Hugo</generator>
    <language>en-us</language>
    <lastBuildDate>Thu, 11 Apr 2024 22:36:07 +0200</lastBuildDate>
    <atom:link href="https://xtralinux.pages.dev/en/tags/cve/index.xml" rel="self" type="application/rss+xml" />
    <item>
      <title>CVE-2024-3094: Critical RCE Vulnerability in XZ Utils</title>
      <link>https://xtralinux.pages.dev/en/news/cve-2024-3094-critical-rce-vulnerability-xz-utils/</link>
      <pubDate>Thu, 11 Apr 2024 22:36:07 +0200</pubDate>
      <guid>https://xtralinux.pages.dev/en/news/cve-2024-3094-critical-rce-vulnerability-xz-utils/</guid>
      <description>&lt;p&gt;&lt;strong&gt;Title:&lt;/strong&gt; CVE-2024-3094: Critical RCE Vulnerability Found in XZ Utils&lt;/p&gt;&#xA;&lt;p&gt;&lt;strong&gt;Summary:&lt;/strong&gt;&#xA;A critical supply chain compromise, CVE-2024-3094, has been detected in XZ Utils Data compression library versions 5.6.0 and 5.6.1. This vulnerability may lead to Remote Code Execution (RCE) via SSH authentication in specific versions of certain Linux distributions.&lt;/p&gt;&#xA;&lt;p&gt;&lt;a href=&#34;https://www.wiz.io/blog/cve-2024-3094-critical-rce-vulnerability-found-in-xz-utils&#34;&gt;Source&lt;/a&gt;&lt;/p&gt;</description>
    </item>
  </channel>
</rss>
