CVE-2024-1086 - Actively Exploited Linux Kernel Flaw

CVE-2024-1086 – Actively Exploited Linux Kernel Flaw

CVE-2024-1086 is a critical vulnerability affecting Linux operating systems. It allows local users to execute code with elevated privileges, potentially granting them control over the entire system. The vulnerability lies within the netfilter component: nf_tables of the Linux kernel and can be exploited to achieve local privilege escalation. It is recommended to update to the kernel version that includes the fix (commit f342de4e2f33e0e39165d8639387aa6c19dff660).

Protecting your system against CVE-2024-1086

To protect your system against CVE-2024-1086, follow these steps:

Update your kernel: Ensure you are using a version of the Linux kernel that includes the fix for this vulnerability. You can check the current version of your kernel with the following command in the terminal:

If you are not using the corrected version, update your system. In most distributions, you can do this with:

Restart your system: After updating the kernel, restart your system to apply the changes.

Monitor security updates: Stay informed about security updates for your distribution. Subscribe to mailing lists or follow official accounts on social media to receive notifications about patches and updates.

Configure a firewall: Set up a firewall to limit access to non-essential ports and services. This will help protect your system against external attacks.

Limit user privileges: Avoid running applications with administrator or root privileges unless absolutely necessary. Use standard user accounts for daily tasks.

Remember, security is an ongoing process. Keep your system up to date.

Kernels afected

The vulnerability CVE-2024-1086 affects the netfilter component: nf_tables of the Linux kernel and allows local privilege escalation. Here are the affected kernel versions:

Ubuntu:

  • Bionic (18.04): Available in version 4.15.0-223.235.
  • Focal (20.04): Available in version 5.4.0-174.193.
  • Jammy (22.04): Available in version 5.15.0-101.111.
  • Mantic (22.10): Available in version 6.5.0-26.26.
  • Noble (23.04): Pending release in version 6.8.0-7.7.
  • Trusty (14.04): Not vulnerable (version 3.11.0-12.19).
CVE-2024-1086 - Mnitigation from ubuntu website.
CVE-2024-1086 – Mitigation from ubuntu website.

Upstream:

  • Available in version 6.8~rc2.

Linux AWS:

  • Bionic (18.04): Available in version 4.15.0-1166.179.
  • Focal (20.04): Available in version 5.4.0-1121.131.
  • Jammy (22.04): Available in version 5.15.0-1056.61.
  • Mantic (22.10): Available in version 6.5.0-1016.16.
  • Noble (23.04): Pending release in version 4.4.0-1129.135.

Upstream:

  • Available in version 6.8~rc2.

Linux AWS 5.0:

  • Bionic (18.04): Ignored (replaced by linux-aws-5.3).

Linux AWS 5.11:

  • Bionic (18.04): Does not exist (replaced by linux-aws-5.13).

In summary, if you are using an affected kernel version, I recommend updating to the corrected version (commit f342de4e2f33e0e39165d8639387aa6c19dff660).

Vulnerabilities section

Related Posts