Linux Kernel Security Update Advisory (CVE-2024-1086)
Overview
The Linux Foundation has released a security update to address a vulnerability in its kernel. users of affected products are advised to update to the latest version.
Affected Products
Linux Kernel
- 3.15 (inclusive) to 6.1.76 (excluded)
- 6.2 (inclusive) to 6.6.15 (excluded)
- 6.7 (inclusive) to 6.7.3 (excluded)
Resolved Vulnerabilities
Use-after-free vulnerability in Linux Kernel with possible local privilege escalation (CVE-2024-1086) [1][2]
vulnerability Action
vulnerability Patches have been made available in the latest updates. Please follow the instructions on the Referenced Sites to update to the latest Vulnerability Patches version.
Linux Kernel versions 6.1.76, 6.6.15, and 6.7.3
Additionally, if you are running an operating system that has released security updates, please refer to the Referenced Sites to perform security actions or updates.
– Debian [3]
– Ubuntu [4]
– Red Hat/CentOS [5]
– SUSE/openSUSE [6]
Referenced Sites
[1]netfilter: nf_tables: reject QUEUE/DROP verdict parameters
[2] netfilter: nf_tables: reject QUEUE/DROP verdict parameters
https://kernel.dance/#f342de4e2f33e0e39165d8639387aa6c19dff660
[3] cve-2024-1086
https://security-tracker.debian.org/tracker/CVE-2024-1086
[4] cve-2024-1086
https://ubuntu.com/security/CVE-2024-1086
[5] cve-2024-1086
https://access.redhat.com/security/cve/CVE-2024-1086
[6] cve-2024-1086