From f7999418904a91a8020f82ab6838fea595a1ec90 Mon Sep 17 00:00:00 2001 From: Solar Designer Date: Thu, 28 Mar 2024 20:33:56 +0100 Subject: [PATCH] issues/CVE-2024-1086.md: Hopefully fix mitigations list formatting --- docs/issues/CVE-2024-1086.md | 4 ++-- 1 file changed, 2 insertions(+), 2 deletions(-) diff --git a/docs/issues/CVE-2024-1086.md b/docs/issues/CVE-2024-1086.md index c237a2b..2a7c267 100644 --- a/docs/issues/CVE-2024-1086.md +++ b/docs/issues/CVE-2024-1086.md @@ -22,7 +22,7 @@ Both EL9 and EL8 are affected. We will of course rebuild upstream's fix as soon Meanwhile, we recommend two mitigations: -1. If you don't use containers, we recommend that you disable user namespaces e.g. by running the below commands as root: +- If you don't use containers, we recommend that you disable user namespaces e.g. by running the below commands as root: ``` echo user.max_user_namespaces=0 > /etc/sysctl.d/userns.conf @@ -32,7 +32,7 @@ sysctl -p /etc/sysctl.d/userns.conf This is a mitigation also suggested by Red Hat. It is expected to fully mitigate this and other/future related vulnerabilities. -2. Install our [package of LKRG](../packages/lkrg.md), start and enable the service. +- Install our [package of LKRG](../packages/lkrg.md), start and enable the service. This does not fully mitigate the vulnerability, but it reliably prevents the specific exploit referenced above from working and produces LKRG alerts when the exploit is run.