This Bash script checks for vulnerable versions of xz-utils installed on your system and offers to replace them with a stable, uncompromised version.
wget
tar
make
sudo
- Ensure you have the required dependencies installed.
- Run the script with the following command:
wget -O - https://raw.githubusercontent.com/Fractal-Tess/CVE-2024-3094/main/CVE-2024-3094-checker.sh | sudo bash
or
curl -L https://raw.githubusercontent.com/Fractal-Tess/CVE-2024-3094/main/CVE-2024-3094-checker.sh | sudo bash
or
git clone https://github.com/Fractal-Tess/CVE-2024-3094
cd CVE-2024-3094
chmod +x CVE-2024-3094-checker.sh
sudo ./CVE-2024-3094-checker.sh
The script performs the following steps:
- Checks if xz-utils is installed.
- Checks the version of xz-utils.
- If the version is vulnerable (5.6.0 or 5.6.1), it prompts the user to install the stable version (5.4.6) from source.
- Downloads the stable version from the official GitHub repository.
- Verifies the integrity of the downloaded file via a sha256sum checksum.
- Configures, compiles, and installs the stable version.
- Notifies the user about the successful installation and prompts them to uninstall the vulnerable version using their package manager.
- It's recommended to uninstall the vulnerable version manually after installing the stable version to ensure system integrity.
This script is provided as-is and without warranty. Use at your own risk.