<?xml version="1.0" encoding="UTF-8" ?>
<?xml-stylesheet type="text/xsl" href="https://community.appian.com/cfs-file/__key/system/syndication/rss.xsl" media="screen"?><rss version="2.0" xmlns:dc="http://purl.org/dc/elements/1.1/"><channel><title>KB-2300 Information about the XZ Utils Data Compression Library Vulnerability (CVE-2024-3094)</title><link>https://community.appian.com/support/w/kb/3524/kb-2300-information-about-the-xz-utils-data-compression-library-vulnerability-cve-2024-3094</link><description /><dc:language>en-US</dc:language><generator>Telligent Community 12</generator><item><title>KB-2300 Information about the XZ Utils Data Compression Library Vulnerability (CVE-2024-3094)</title><link>https://community.appian.com/support/w/kb/3524/kb-2300-information-about-the-xz-utils-data-compression-library-vulnerability-cve-2024-3094</link><pubDate>Fri, 05 Apr 2024 19:51:32 GMT</pubDate><guid isPermaLink="false">d3a83456-d57b-489c-a84c-4e8267bb592a:a11c35b8-6ed5-4540-9869-3146e45b5200</guid><dc:creator>pauline.delacruz</dc:creator><comments>https://community.appian.com/support/w/kb/3524/kb-2300-information-about-the-xz-utils-data-compression-library-vulnerability-cve-2024-3094#comments</comments><description>Current Revision posted to Appian Knowledge Base by pauline.delacruz on 4/5/2024 7:51:32 PM&lt;br /&gt;
&lt;p&gt;&lt;span style="font-weight:400;"&gt;On 29-Mar-2024, a Microsoft security researcher &lt;/span&gt;&lt;a href="https://www.openwall.com/lists/oss-security/2024/03/29/4"&gt;&lt;span style="font-weight:400;"&gt;announced&lt;/span&gt;&lt;/a&gt;&lt;span style="font-weight:400;"&gt; that he had discovered malicious code in the upstream tarballs of xz, a lossless data compression library, starting with version 5.6.0. Shortly thereafter, NVD assigned the backdoor vulnerability a &lt;/span&gt;&lt;a href="https://nvd.nist.gov/vuln/detail/CVE-2024-3094"&gt;&lt;span style="font-weight:400;"&gt;CVE&lt;/span&gt;&lt;/a&gt;&lt;span style="font-weight:400;"&gt;, and &lt;/span&gt;&lt;a href="https://www.cisa.gov/news-events/alerts/2024/03/29/reported-supply-chain-compromise-affecting-xz-utils-data-compression-library-cve-2024-3094"&gt;&lt;span style="font-weight:400;"&gt;CISA recommended&lt;/span&gt;&lt;/a&gt;&lt;span style="font-weight:400;"&gt; all affected users downgrade to an uncompromised version.&lt;/span&gt;&lt;/p&gt;
&lt;p&gt;&lt;span style="font-weight:400;"&gt;Upon assessing the Appian platform against all details of the CVE, we can confirm that the Appian platform is not impacted by this vulnerability as Appian does not utilize the impacted versions described in the above advisories. We will continue to monitor the situation and provide any updates as appropriate.&lt;/span&gt;&lt;/p&gt;
&lt;h2&gt;&lt;span style="font-weight:400;"&gt;Additional Notes:&lt;/span&gt;&lt;/h2&gt;
&lt;p&gt;&lt;span style="font-weight:400;"&gt;The following CVE was released with additional information on the scope of the vulnerability:&lt;/span&gt;&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a href="https://nvd.nist.gov/vuln/detail/CVE-2024-3094"&gt;&lt;span style="font-weight:400;"&gt;CVE-2024-3094&lt;/span&gt;&lt;/a&gt; &lt;span style="font-weight:400;"&gt;(&amp;ldquo;XZ: Malicious Code in Distributed Source&amp;rdquo;)&lt;/span&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;h2&gt;&lt;span style="font-weight:400;"&gt;Supporting Documentation:&lt;/span&gt;&lt;/h2&gt;
&lt;ul&gt;
&lt;li style="font-weight:400;"&gt;&lt;a href="https://www.openwall.com/lists/oss-security/2024/03/29/4"&gt;&lt;span style="font-weight:400;"&gt;https://www.openwall.com/lists/oss-security/2024/03/29/4&lt;/span&gt;&lt;span style="font-weight:400;"&gt;&lt;br /&gt;&lt;/span&gt;&lt;/a&gt;&lt;/li&gt;
&lt;li style="font-weight:400;"&gt;&lt;a href="https://www.cisa.gov/news-events/alerts/2024/03/29/reported-supply-chain-compromise-affecting-xz-utils-data-compression-library-cve-2024-3094"&gt;&lt;span style="font-weight:400;"&gt;https://www.cisa.gov/news-events/alerts/2024/03/29/reported-supply-chain-compromise-affecting-xz-utils-data-compression-library-cve-2024-3094&lt;/span&gt;&lt;span style="font-weight:400;"&gt;&lt;br /&gt;&lt;/span&gt;&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;h2&gt;&lt;span style="font-weight:400;"&gt;Affected Versions&lt;/span&gt;&lt;/h2&gt;
&lt;p&gt;&lt;span style="font-weight:400;"&gt;This article applies to all supported versions of Appian.&lt;/span&gt;&lt;/p&gt;
&lt;p&gt;&lt;span style="font-weight:400;"&gt;Last reviewed: &lt;/span&gt;&lt;span style="font-weight:400;"&gt;April 5, 2024&lt;/span&gt;&lt;/p&gt;&lt;div style="clear:both;"&gt;&lt;/div&gt;

&lt;div style="font-size: 90%;"&gt;Tags: Security&lt;/div&gt;
</description></item><item><title>KB-2300 Information about the XZ Utils Data Compression Library Vulnerability (CVE-2024-3094)</title><link>https://community.appian.com/support/w/kb/3524/kb-2300-information-about-the-xz-utils-data-compression-library-vulnerability-cve-2024-3094/revision/2</link><pubDate>Fri, 05 Apr 2024 19:50:17 GMT</pubDate><guid isPermaLink="false">d3a83456-d57b-489c-a84c-4e8267bb592a:a11c35b8-6ed5-4540-9869-3146e45b5200</guid><dc:creator>pauline.delacruz</dc:creator><comments>https://community.appian.com/support/w/kb/3524/kb-2300-information-about-the-xz-utils-data-compression-library-vulnerability-cve-2024-3094#comments</comments><description>Revision 2 posted to Appian Knowledge Base by pauline.delacruz on 4/5/2024 7:50:17 PM&lt;br /&gt;
&lt;p&gt;&lt;span style="font-weight:400;"&gt;On 29-Mar-2024, a Microsoft security researcher &lt;/span&gt;&lt;a href="https://www.openwall.com/lists/oss-security/2024/03/29/4"&gt;&lt;span style="font-weight:400;"&gt;announced&lt;/span&gt;&lt;/a&gt;&lt;span style="font-weight:400;"&gt; that he had discovered malicious code in the upstream tarballs of xz, a lossless data compression library, starting with version 5.6.0. Shortly thereafter, NVD assigned the backdoor vulnerability a &lt;/span&gt;&lt;a href="https://nvd.nist.gov/vuln/detail/CVE-2024-3094"&gt;&lt;span style="font-weight:400;"&gt;CVE&lt;/span&gt;&lt;/a&gt;&lt;span style="font-weight:400;"&gt;, and &lt;/span&gt;&lt;a href="https://www.cisa.gov/news-events/alerts/2024/03/29/reported-supply-chain-compromise-affecting-xz-utils-data-compression-library-cve-2024-3094"&gt;&lt;span style="font-weight:400;"&gt;CISA recommended&lt;/span&gt;&lt;/a&gt;&lt;span style="font-weight:400;"&gt; all affected users downgrade to an uncompromised version.&lt;/span&gt;&lt;/p&gt;
&lt;p&gt;&lt;span style="font-weight:400;"&gt;Upon assessing the Appian platform against all details of the CVE, we can confirm that the Appian platform is not impacted by this vulnerability as Appian does not utilize the impacted versions described in the above advisories. We will continue to monitor the situation and provide any updates as appropriate.&lt;/span&gt;&lt;/p&gt;
&lt;h2&gt;&lt;span style="font-weight:400;"&gt;Additional Notes:&lt;/span&gt;&lt;/h2&gt;
&lt;p&gt;&lt;span style="font-weight:400;"&gt;The following CVE was released with additional information on the scope of the vulnerability:&lt;/span&gt;&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a href="https://nvd.nist.gov/vuln/detail/CVE-2024-3094"&gt;&lt;span style="font-weight:400;"&gt;CVE-2024-3094&lt;/span&gt;&lt;/a&gt; &lt;span style="font-weight:400;"&gt;(&amp;ldquo;XZ: Malicious Code in Distributed Source&amp;rdquo;)&lt;/span&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;h2&gt;&lt;span style="font-weight:400;"&gt;Supporting Documentation:&lt;/span&gt;&lt;/h2&gt;
&lt;ul&gt;
&lt;li style="font-weight:400;"&gt;&lt;a href="https://www.openwall.com/lists/oss-security/2024/03/29/4"&gt;&lt;span style="font-weight:400;"&gt;https://www.openwall.com/lists/oss-security/2024/03/29/4&lt;/span&gt;&lt;span style="font-weight:400;"&gt;&lt;br /&gt;&lt;/span&gt;&lt;/a&gt;&lt;/li&gt;
&lt;li style="font-weight:400;"&gt;&lt;a href="https://www.cisa.gov/news-events/alerts/2024/03/29/reported-supply-chain-compromise-affecting-xz-utils-data-compression-library-cve-2024-3094"&gt;&lt;span style="font-weight:400;"&gt;https://www.cisa.gov/news-events/alerts/2024/03/29/reported-supply-chain-compromise-affecting-xz-utils-data-compression-library-cve-2024-3094&lt;/span&gt;&lt;span style="font-weight:400;"&gt;&lt;br /&gt;&lt;/span&gt;&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;h2&gt;&lt;span style="font-weight:400;"&gt;Affected Versions&lt;/span&gt;&lt;/h2&gt;
&lt;p&gt;&lt;span style="font-weight:400;"&gt;This article applies to all supported versions of Appian.&lt;/span&gt;&lt;/p&gt;
&lt;p&gt;&lt;span style="font-weight:400;"&gt;Last reviewed: &lt;/span&gt;&lt;span style="font-weight:400;"&gt;April 2024&lt;/span&gt;&lt;/p&gt;&lt;div style="clear:both;"&gt;&lt;/div&gt;
</description></item><item><title>KB-2300 Information about the XZ Utils Data Compression Library Vulnerability (CVE-2024-3094)</title><link>https://community.appian.com/support/w/kb/3524/kb-2300-information-about-the-xz-utils-data-compression-library-vulnerability-cve-2024-3094/revision/1</link><pubDate>Fri, 05 Apr 2024 19:48:23 GMT</pubDate><guid isPermaLink="false">d3a83456-d57b-489c-a84c-4e8267bb592a:a11c35b8-6ed5-4540-9869-3146e45b5200</guid><dc:creator>pauline.delacruz</dc:creator><comments>https://community.appian.com/support/w/kb/3524/kb-2300-information-about-the-xz-utils-data-compression-library-vulnerability-cve-2024-3094#comments</comments><description>Revision 1 posted to Appian Knowledge Base by pauline.delacruz on 4/5/2024 7:48:23 PM&lt;br /&gt;
&lt;p&gt;&lt;span style="font-weight:400;"&gt;On 29-Mar-2024, a Microsoft security researcher &lt;/span&gt;&lt;a href="https://www.openwall.com/lists/oss-security/2024/03/29/4"&gt;&lt;span style="font-weight:400;"&gt;announced&lt;/span&gt;&lt;/a&gt;&lt;span style="font-weight:400;"&gt; that he had discovered malicious code in the upstream tarballs of xz, a lossless data compression library, starting with version 5.6.0. Shortly thereafter, NVD assigned the backdoor vulnerability a &lt;/span&gt;&lt;a href="https://nvd.nist.gov/vuln/detail/CVE-2024-3094"&gt;&lt;span style="font-weight:400;"&gt;CVE&lt;/span&gt;&lt;/a&gt;&lt;span style="font-weight:400;"&gt;, and &lt;/span&gt;&lt;a href="https://www.cisa.gov/news-events/alerts/2024/03/29/reported-supply-chain-compromise-affecting-xz-utils-data-compression-library-cve-2024-3094"&gt;&lt;span style="font-weight:400;"&gt;CISA recommended&lt;/span&gt;&lt;/a&gt;&lt;span style="font-weight:400;"&gt; all affected users downgrade to an uncompromised version.&lt;/span&gt;&lt;/p&gt;
&lt;p&gt;&lt;/p&gt;
&lt;p&gt;&lt;span style="font-weight:400;"&gt;Upon assessing the Appian platform against all details of the CVE, we can confirm that the Appian platform is not impacted by this vulnerability as Appian does not utilize the impacted versions described in the above advisories. We will continue to monitor the situation and provide any updates as appropriate.&lt;/span&gt;&lt;/p&gt;
&lt;p&gt;&lt;/p&gt;
&lt;h2&gt;&lt;span style="font-weight:400;"&gt;Additional Notes:&lt;/span&gt;&lt;/h2&gt;
&lt;p&gt;&lt;span style="font-weight:400;"&gt;The following CVE was released with additional information on the scope of the vulnerability:&lt;/span&gt;&lt;/p&gt;
&lt;p&gt;&lt;/p&gt;
&lt;ul&gt;
&lt;li style="font-weight:400;"&gt;&lt;a href="https://nvd.nist.gov/vuln/detail/CVE-2024-3094"&gt;&lt;span style="font-weight:400;"&gt;CVE-2024-3094&lt;/span&gt;&lt;/a&gt; &lt;span style="font-weight:400;"&gt;(&amp;ldquo;XZ: Malicious Code in Distributed Source&amp;rdquo;)&lt;/span&gt;&lt;span style="font-weight:400;"&gt;&lt;br /&gt;&lt;/span&gt;&lt;span style="font-weight:400;"&gt;&lt;br /&gt;&lt;/span&gt;&lt;span style="font-weight:400;"&gt;Supporting Documentation:&lt;/span&gt;&lt;/li&gt;
&lt;li style="font-weight:400;"&gt;&lt;a href="https://www.openwall.com/lists/oss-security/2024/03/29/4"&gt;&lt;span style="font-weight:400;"&gt;https://www.openwall.com/lists/oss-security/2024/03/29/4&lt;/span&gt;&lt;span style="font-weight:400;"&gt;&lt;br /&gt;&lt;br /&gt;&lt;/span&gt;&lt;/a&gt;&lt;/li&gt;
&lt;li style="font-weight:400;"&gt;&lt;a href="https://www.cisa.gov/news-events/alerts/2024/03/29/reported-supply-chain-compromise-affecting-xz-utils-data-compression-library-cve-2024-3094"&gt;&lt;span style="font-weight:400;"&gt;https://www.cisa.gov/news-events/alerts/2024/03/29/reported-supply-chain-compromise-affecting-xz-utils-data-compression-library-cve-2024-3094&lt;/span&gt;&lt;span style="font-weight:400;"&gt;&lt;br /&gt;&lt;br /&gt;&lt;/span&gt;&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;&lt;br /&gt;&lt;br /&gt;&lt;/p&gt;
&lt;h2&gt;&lt;span style="font-weight:400;"&gt;Affected Versions&lt;/span&gt;&lt;/h2&gt;
&lt;p&gt;&lt;span style="font-weight:400;"&gt;This article applies to all supported versions of Appian.&lt;/span&gt;&lt;/p&gt;
&lt;p&gt;&lt;span style="font-weight:400;"&gt;Last reviewed: &lt;/span&gt;&lt;span style="font-weight:400;"&gt;April 2024&lt;/span&gt;&lt;/p&gt;&lt;div style="clear:both;"&gt;&lt;/div&gt;
</description></item></channel></rss>