Linux Kernel Security Update Advisory

Overview

 

An update has been released to address vulnerability in the Linux Kernel. Users of affected versions are advised to update to the latest version.

 

Affected Products

 

CVE-2021-47541

  • Linux Kernel Versions : 4.7 (inclusive) to 4.14.257 (excluded)
  • Linux Kernel Versions : 4.15 (inclusive) to 4.19.220 (excluded)
  • Linux Kernel Versions : 4.20 (inclusive) to 5.4.164 (excluded)
  • Linux Kernel Versions : 5.5 (inclusive) to 5.10.84 (excluded)
  • Linux Kernel Versions : 5.11 (inclusive) to 5.15.7 (excluded)

 

CVE-2021-47571

  • Linux Kernel Versions : 3.2 (inclusive) to 4.4.294 (excluded)
  • Linux Kernel Versions: 4.5 (inclusive) to 4.9.292 (excluded)
  • Linux Kernel Versions : 4.10 (inclusive) to 4.14.257 (excluded)
  • Linux Kernel Versions : 4.15 (inclusive) to 4.19.219 (excluded)
  • Linux Kernel Versions : 4.20 (inclusive) to 5.4.163 (excluded)
  • Linux Kernel Versions : 5.5 (inclusive) to 5.10.83 (excluded)
  • Linux Kernel Versions : 5.11 (inclusive) to 5.15.6 (excluded)

 

CVE-2021-47521

  • Linux Kernel Versions : 3.2 (inclusive) to 4.4.295 (excluded)
  • Linux Kernel Versions : 4.5 (inclusive) to 4.9.293 (excluded)
  • Linux Kernel Versions : 4.10 (inclusive) to 4.14.258 (excluded)
  • Linux Kernel Versions : 4.15 (inclusive) to 4.19.221 (excluded)
  • Linux Kernel Versions : 4.20 (inclusive) to 5.4.165 (excluded)
  • Linux Kernel Versions : 5.5 (inclusive) to 5.10.85 (excluded)
  • Linux Kernel Versions : 5.11 (inclusive) to 5.15.8 (excluded)

 

CVE-2021-47525

  • Linux Kernel Versions : 5.11 (inclusive) to 5.15.7 (excluded)

 

CVE-2021-47520

  • Linux Kernel Versions : 2.6.37 (inclusive) to 4.4.295 (excluded)
  • Linux Kernel Versions : 4.5 (inclusive) to 4.9.293 (excluded)
  • Linux Kernel Version : 4.10 (inclusive) to 4.14.258 (excluded)
  • Linux Kernel Versions : 4.15 (inclusive) to 4.19.221 (excluded)
  • Linux Kernel Versions : 4.20 (inclusive) to 5.4.165 (excluded)
  • Linux Kernel Versions : 5.5 (inclusive) to 5.10.85 (excluded)
  • Linux Kernel Versions : 5.11 (inclusive) to 5.15.8 (excluded)

 

CVE-2024-36971

  • Linux Kernel Versions : 4.6 (inclusive) to 6.9.4 (excluded)
  • Linux Kernel Version : 6.10.0 rc1

 

CVE-2024-26594

  • Linux Kernel Versions : ~ 5.15.149 (excluded)
  • Linux Kernel Versions : 5.16.0 (inclusive) to 6.1.75 (excluded)
  • Linux Kernel Versions : 6.2.0 (inclusive) to 6.6.14 (excluded)
  • Linux Kernel Versions : 6.7.0 (inclusive) to 6.7.2 (excluded)

 

CVE-2024-36477

  • Linux Kernel Versions : ~ 6.6.0 (excluded)
  • Linux Kernel Versions : 6.6.1 (inclusive) to 6.6.33 (excluded)
  • Linux Kernel Versions : 6.9 (inclusive) to 6.9.4 (excluded)
  • Linux Kernel Version : 6.10.0-rc1
     

CVE-2024-39277

  • Linux Kernel Version : ~5.11 (excluded)
  • Linux Kernel Versions : 5.15 (inclusive) to 5.15.161 (excluded)
  • Linux Kernel Versions : 6.1 (inclusive) to 6.1.93 (excluded)
  • Linux Kernel Versions : 6.6 (inclusive) to 6.6.33 (excluded)
  • Linux Kernel Versions : 6.9 (inclusive) to 6.9.4 (excluded)
  • Linux Kernel Version : 6.10.0-rc1

 

Resolved Vulnerabilities

 

CVE-2021-47541 : Use after free vulnerability in mlx4_en_try_alloc_resources() function in mlx4_en_copy_priv() failure(7.8 High, CVSS V3.1 Date Added : 2024.06.10)
CVE-2021-47571: use after free vulnerability in the free_rtllib() function when it frees the dev pointer and then uses that pointer in the next line(7.8 High, CVSS V3.1 Date Added: 2024.06.10)
CVE-2021-47521: use after free vulnerability in the ems_pcmcia_add_card() function due to the last channel being unavailable and being used again after dev is freed(7.8 High, CVSS V3.1 Date Added: 2024.06.10)
CVE-2021-47525: use after free vulnerability due to failure to unregister ports when unbinding a driver, resulting in the use of freed driver data(7.8 High, CVSS V3.1 Date Added: 2024.06.10)
CVE-2021-47520 : Use-after-free vulnerability due to a reference to skb after calling netif_receive_skb(skb)(7.8 High, CVSS V3.1, Date Added: 2024.06.10)
CVE-2024-36971: Use-after-free vulnerability due to the __dst_negative_advice() function not enforcing the correct RCU rules, which could allow a call to dst_release(old_dst) without properly initializing sk->dst_cache, resulting in a memory access after use (7.8 High, CVSS V3.1 Date Added: 2024.06.12)
CVE-2024-26594: A vulnerability in ksmbd when it receives an invalid mechanism token in a client’s session establishment request, it does not validate it and throws an error if it is invalid (7.1 High, CVSS V3.1 Date Added: 2024.04.19)
CVE-2024-36477: Buffer overflow vulnerability in tpm_tis_spi in the Linux Kernel due to allocation of the TPM SPI transfer buffer without considering the size of the SPI header, resulting in failure to include the header when calculating the maximum transfer length and buffer size (7.8 High, CVSS V3.1 Date Added: 2024.06.24)
CVE-2024-39277: Array index above the limit due to an out-of-bounds index when calling cpumask_of_node() due to incorrect handling of NUMA_NO_NODE values in the Linux Kernel (7.8 High, CVSS V3.1, Date Added: 2024.06.24)

 

Vulnerability Patches

 

Vulnerability patches have been made available in the latest update. Please follow the instructions on the Referenced Sites to update to the latest vulnerability patches version.

CVE-2021-47541

  • Linux Kernel Version: 4.14.257
  • Linux Kernel Version : 4.19.220
  • Linux Kernel Version : 5.4.164
  • Linux Kernel Version : 5.10.84
  • Linux Kernel Version : 5.15.7
  • Linux Kernel Version : 5.16

 

CVE-2021-47571

  • Linux Kernel Version : 4.4.294
  • Linux Kernel Version : 4.9.292
  • Linux Kernel Version : 4.14.257
  • Linux Kernel Version : 4.19.219
  • Linux Kernel Version : 5.4.163
  • Linux Kernel Version : 5.10.83
  • Linux Kernel Version : 5.15.6
  • Linux Kernel Version : 5.16

 

CVE-2021-47521

  • Linux Kernel Version : 4.4.295
  • Linux Kernel Version : 4.9.293
  • Linux Kernel Version : 4.14.258
  • Linux Kernel Version : 4.19.221
  • Linux Kernel Version : 5.4.165
  • Linux Kernel Version : 5.10.85
  • Linux Kernel Version : 5.15.8
  • Linux Kernel Version : 5.16

 

CVE-2021-47525

  • Linux Kernel Version : 5.15.7
  • Linux Kernel Version : 5.16

 

CVE-2021-47520

  • Linux Kernel Version : 4.4.295
  • Linux Kernel Version : 4.9.293
  • Linux Kernel Version : 4.14.258
  • Linux Kernel Version : 4.19.221
  • Linux Kernel Version : 5.4.165
  • Linux Kernel Version : 5.10.85
  • Linux Kernel Version : 5.15.8
  • Linux Kernel Version : 5.16

 

CVE-2024-36971

  • Linux Kernel Version : 6.10.0 rc2

 

CVE-2024-26594

  • Linux Kernel Version : 5.15.149
  • Linux Kernel Version : 6.1.75
  • Linux Kernel Version : 6.6.14
  • Linux Kernel Version : 6.7.2
  • Linux Kernel Version : 6.8-rc1

 

CVE-2024-36477

  • Linux Kernel Version : 6.6.33
  • Linux Kernel Version : 6.9.4
  • Linux Kernel Version : 6.10.0-rc2

CVE-2024-39277

  • Linux Kernel Version : 5.15.161
  • Linux Kernel Version : 6.1.93
  • Linux Kernel Version : 6.6.33
  • Linux Kernel Version : 6.9.4
  • Linux Kernel Version : 6.10.0-rc2

 

Referenced Sites

 

[1] CVE-2021-47541 Detail

https://nvd.nist.gov/vuln/detail/CVE-2021-47541

[2] CVE-2021-47541: net/mlx4_en: Fix an use-after-free bug in mlx4_en_try_alloc_resources()

https://lore.kernel.org/linux-cve-announce/2024052439-CVE-2021-47541-c3da@gregkh/

[3] CVE-2021-47571 Detail

https://nvd.nist.gov/vuln/detail/CVE-2021-47571

[4] CVE-2021-47571: staging: rtl8192e: Fix use after free in _rtl92e_pci_disconnect()

https://lore.kernel.org/linux-cve-announce/2024052454-CVE-2021-47571-05b5@gregkh/

[5] CVE-2021-47571 Detail

https://nvd.nist.gov/vuln/detail/CVE-2021-47571#VulnChangeHistorySection

[6] CVE-2021-47521: can: sja1000: fix use after free in ems_pcmcia_add_card()

https://lore.kernel.org/linux-cve-announce/2024052433-CVE-2021-47521-8637@gregkh/

[7] CVE-2021-47525 Detail

https://nvd.nist.gov/vuln/detail/CVE-2021-47525

[8] CVE-2021-47525: serial: liteuart: fix use-after-free and memleak on unbind

https://lore.kernel.org/linux-cve-announce/2024052434-CVE-2021-47525-2b58@gregkh/

[9] CVE-2021-47520 Detail

https://nvd.nist.gov/vuln/detail/CVE-2021-47520

[10] CVE-2021-47520: can: pch_can: pch_can_rx_normal: fix use after free

https://lore.kernel.org/linux-cve-announce/2024052433-CVE-2021-47520-af45@gregkh/

[11] CVE-2024-36971 Detail

https://nvd.nist.gov/vuln/detail/CVE-2024-36971#match-13067107

[12] CVE-2024-36971: net: fix __dst_negative_advice() race

https://lore.kernel.org/linux-cve-announce/20240610090330.1347021-2-lee@kernel.org/

[13] CVE-2024-26594 Detail

https://nvd.nist.gov/vuln/detail/CVE-2024-26594

[14] CVE-2024-26594: ksmbd: validate mech token in session setup

https://lore.kernel.org/linux-cve-announce/2024022325-CVE-2024-26594-1cbc@gregkh/

[15] CVE-2024-36477 Detail

https://nvd.nist.gov/vuln/detail/CVE-2024-36477

[16] CVE-2024-36477: tpm_tis_spi: Account for SPI header when allocating TPM SPI xfer buffer

https://lore.kernel.org/linux-cve-announce/2024062150-CVE-2024-36477-7063@gregkh/

[17] CVE-2024-39277 Detail

https://nvd.nist.gov/vuln/detail/CVE-2024-39277#VulnChangeHistorySection

[18] CVE-2024-39277: dma-mapping: benchmark: handle NUMA_NO_NODE correctly

https://lore.kernel.org/linux-cve-announce/2024062119-CVE-2024-39277-11f7@gregkh/