Ansible playbooks designed to check and remediate CVE-2024-3094 (XZ Backdoor). These were developed with guidance from https://jfrog.com/blog/xz-backdoor-attack-cve-2024-3094-all-you-need-to-know/.
Running the checks to see if your Linux system is vulnerable is simple if it's only one or two systems, but what if you have a fleet of systems to manage? This is my humble attempt to make the automation of this process a little easier.
This has been tested on Ubuntu 22.04.
- Clone the repo to your Ansible control node.
- Prepare your hosts file in either INI or YML format.
- Run the
preflight.sh
file to ensure you have the latest version from JFrog
- Run the playbook with the following command:
ansible-playbook -i <insert_hosts_file_here> CVE-2024-3094-check.yml
- If needed, run the playbook with the following command:
ansible-playbook -i <insert_hosts_file_here> CVE-2024-3094-fix.yml
- For further peace of mind, rerun the Check playbook.
Each playbook will produce text files in a results
directory for each host.