Linux Kernel存在高風險安全漏洞(CVE-2024-1086),請儘速確認並進行修補

內容說明:

研究人員發現Linux Kernel存在記憶體釋放後使用(Use After Free)漏洞(CVE-2024-1086),已取得一般權限之本機攻擊者可利用此漏洞提升至管理者權限。該漏洞已遭駭客利用,請儘速確認並進行更新。

影響平台:

多個Linux作業系統皆有受到影響,如Redhat、Ubuntu、Debian及CentOS等
以下Linux Kernel版本存在漏洞:
3.15至5.15.149(不含)版本
6.1至6.1.76(不含)版本
6.2至6.6.15(不含)版本
6.7至6.7.3(不含)版本
6.8-rc1

處置建議:

官方已針對漏洞釋出更新,請參考以下官方說明:
Redhat: https://access.redhat.com/security/cve/CVE-2024-1086
Ubuntu: https://ubuntu.com/security/CVE-2024-1086
Debian: https://security-tracker.debian.org/tracker/CVE-2024-1086
CentOS: https://lists.centos.org/pipermail/centos-announce/2024-March/099235.html
Uniontech: https://src.uniontech.com/#/security_advisory_detail?utsa_id=UTSA-2024-000633
Kylinos: https://kylinos.cn/support/loophole/patch/5561.html
Fedora: https://lists.fedoraproject.org/archives/list/[email protected]/message/7LSPIOMIJYTLZB6QKPQVVAYSUETUWKPF/

參考資料:

  1. https://nvd.nist.gov/vuln/detail/CVE-2024-1086
  2. https://access.redhat.com/security/cve/CVE-2024-1086
  3. https://ubuntu.com/security/CVE-2024-1086
  4. https://security-tracker.debian.org/tracker/CVE-2024-1086
  5. https://lists.centos.org/pipermail/centos-announce/2024-March/099235.html
  6. https://src.uniontech.com/#/security_advisory_detail?utsa_id=UTSA-2024-000633
  7. https://kylinos.cn/support/loophole/patch/5561.html
  8. https://lists.fedoraproject.org/archives/list/[email protected]/message/7LSPIOMIJYTLZB6QKPQVVAYSUETUWKPF/