Linux Kernel Security Update Advisory

Overview

 

An update has been made available to address a vulnerability in Linux. users of affected versions are advised to update to the latest version.

 

Affected Products

 

CVE-2023-52451

  • Linux Kernel Versions: 4.1.0 (inclusive) to 4.19.306 (excluded)
  • Linux Kernel Versions: 4.20.0 (inclusive) to 5.4.268 (excluded)
  • Linux Kernel Versions: 5.5.0 (inclusive) to 5.10.209 (excluded)
  • Linux Kernel versions: 5.11.0 (inclusive) to 5.15.148 (exclusive)
  • Linux Kernel Versions: 5.16.0 (inclusive) to 6.1.75 (excluded)
  • Linux Kernel versions: 6.2.0 (inclusive) to 6.6.14 (exclusive)
  • Linux Kernel Versions: 6.7.0 (inclusive) to 6.7.2 (exclusive)

 

CVE-2024-26582

  • Linux Kernel Versions: 6.0 (inclusive) to 6.1.79 (excluded)
  • Linux Kernel Versions: 6.2.0 (inclusive) to 6.6.18 (excluded)
  • Linux Kernel Versions: 6.7.0 (inclusive) to 6.7.6 (excluded)

 

CVE-2024-26588

  • Linux Kernel Version: < 6.1.75 (excluded)
  • Linux Kernel Versions: 6.2.0 (inclusive) to 6.6.14 (excluded)
  • Linux Kernel Versions: 6.7.0 (inclusive) to 6.7.2 (excluded)

 

CVE-2023-52441

  • Linux Kernel Versions: 5.15.0 (inclusive) to 5.15.145 (excluded)
  • Linux Kernel Versions: 5.16.0 (inclusive) to 6.1.53 (excluded)
  • Linux Kernel Versions: 6.2.0 (inclusive) to 6.4.16 (excluded)

 

CVE-2023-52445

  • Linux Kernel Version: < 4.19.306 (Excluded)
  • Linux Kernel Versions: 4.20 (inclusive) to 5.4.268 (excluded)
  • Linux Kernel version: 5.5.0 (inclusive) to 5.10.209 (excluded)
  • Linux Kernel versions: 5.11.0 (inclusive) to 5.15.148 (exclusive)
  • Linux Kernel Versions: 5.16.0 (inclusive) to 6.1.75 (excluded)
  • Linux Kernel versions: 6.2.0 (inclusive) to 6.6.14 (exclusive)
  • Linux Kernel Versions: 6.7.0 (inclusive) to 6.7.2 (exclusive)

 

CVE-2023-52447

  • Linux Kernel Versions: 5.9.0 (inclusive) to 6.1.75 (excluded)
  • Linux Kernel Versions: 6.2.0 (inclusive) to 6.6.14 (excluded)
  • Linux Kernel Versions: 6.7.0 (inclusive) to 6.7.2 (excluded)

 

CVE-2023-52446

  • Linux Kernel Versions: 6.2.0 (inclusive) to 6.6.14 (excluded)
  • Linux Kernel versions: 6.7.0 (inclusive) to 6.7.2 (excluded)

 

CVE-2023-52440

  • Linux Kernel Versions: 5.17.0 (inclusive) to 6.1.52 (excluded)
  • Linux Kernel Versions: 6.2.0 (inclusive) to 6.4.15 (excluded)
  • Linux Kernel Versions: 6.5.0 (inclusive) to 6.5.2 (excluded)

 

CVE-2023-52438

  • Linux Kernel Versions: 4.20.0 (inclusive) to 5.4.268 (excluded)
  • Linux Kernel Versions: 5.5.0 (inclusive) to 5.10.209 (excluded)
  • Linux Kernel versions: 5.11.0 (inclusive) to 5.15.148 (exclusive)
  • Linux Kernel Versions: 5.16.0 (inclusive) to 6.1.74 (exclusive)
  • Linux Kernel Versions: 6.2.0 (inclusive) to 6.6.13 (exclusive)
  • Linux Kernel Versions: 6.7.0 (inclusive) to 6.7.1 (exclusive)

 

CVE-2023-52439

  • Linux Kernel Versions: 4.18, 4.18-rc5, 4.18-rc6, 4.18-rc7, 4.18-rc8
  • Linux Kernel Versions: 4.18.0 (inclusive) to 4.19.306 (exclusive)
  • Linux Kernel Versions: 4.20.0 (inclusive) to 5.4.268 (excluded)
  • Linux Kernel Versions: 5.5.0 (inclusive) to 5.10.209 (excluded)
  • Linux Kernel Versions: 5.11.0 (inclusive) to 5.15.148 (excluded)
  • Linux Kernel versions: 5.16.0 (inclusive) to 6.1.74 (excluded)
  • Linux Kernel Versions: 6.2.0 (inclusive) to 6.6.13 (excluded)
  • Linux Kernel versions: 6.7.0 (inclusive) to 6.7.1 (excluded)

 

CVE-2023-52434

  • Linux Kernel Version: < 5.10.211 (Excluded)
  • Linux Kernel Versions: 5.11.0 (inclusive) to 5.15.150 (excluded)
  • Linux Kernel version: 5.16.0 (inclusive) to 6.1.79 (excluded)
  • Linux Kernel versions: 6.2.0 (inclusive) to 6.6.8 (excluded)

 

CVE-2024-26586

  • Linux Kernel Versions: 4.19.0 (inclusive) to 5.10.209 (excluded)
  • Linux Kernel Versions: 5.11.0 (inclusive) to 5.15.148 (excluded)
  • Linux Kernel Versions: 5.16.0 (inclusive) to 6.1.79 (excluded)
  • Linux Kernel Versions: 6.2.0 (inclusive) to 6.6.14 (exclusive)
  • Linux Kernel Versions: 6.7.0 (inclusive) to 6.7.2 (exclusive)

 

CVE-2023-52452

  • Linux Kernel Versions: 5.12 (inclusive) to 6.6.14 (excluded)
  • Linux Kernel Versions: 6.7.0 (inclusive) to 6.7.2 (excluded)

 

CVE-2024-26589

  • Linux Kernel Versions: 4.20 (inclusive) to 5.15.148 (excluded)
  • Linux Kernel Versions: 5.16.0 (inclusive) to 6.1.75 (excluded)
  • Linux Kernel Versions: 6.2.0 (inclusive) to 6.6.14 (exclusive)
  • Linux Kernel Versions: 6.7.0 (inclusive) to 6.7.2 (exclusive)

 

CVE-2023-52444

  • Linux Kernel Versions: 4.2.0 (inclusive) to 4.19.306 (excluded)
  • Linux Kernel Versions: 4.20 (inclusive) to 5.4.268 (excluded)
  • Linux Kernel versions: 5.5.0 (inclusive) to 5.10.209 (excluded)
  • Linux Kernel versions: 5.11.0 (inclusive) to 5.15.148 (exclusive)
  • Linux Kernel Versions: 5.16.0 (inclusive) to 6.1.75 (excluded)
  • Linux Kernel versions: 6.2.0 (inclusive) to 6.6.14 (exclusive)
  • Linux Kernel Versions: 6.7.0 (inclusive) to 6.7.2 (exclusive)

 

Resolved Vulnerabilities

 

Powerpc/pseries/memhp: Fix access beyond end of drmem array when LMB lookup does not match given entry Vulnerability in dlpar_memory_remove_by_index() could allow access beyond the boundaries of the drmem lmb array (CVE-2023-52451)

Use-after-free vulnerability in process_rx_list when put_page() in tls_decrypt_done dereferences and tries to read from a partially read skb (CVE-2024-26582)

Vulnerability triggering an unhandled page fault in the out-of-bounds memory access prevention test_tag test (CVE-2024-26588)

Out-of-bounds fix in init_smb2_rsp_hdr() Vulnerability where init_smb2_rsp_hdr is called for an smb1 negotiation request because need_neg is set to false if the client sends an smb2 negotiation request followed by an smb1 negotiation request (CVE-2023-52441)

Context disassociation vulnerability within the call stack (CVE-2023-52445)

Use-after-free take;weakness in bpf programs that access internals after an ops->map_free call completes (CVE-2023-52447)

Race condition vulnerability between btf_put() and map_free() (CVE-2023-52446)

Slub overflow vulnerability in key exchange code when authblob->SessionKey.Length is larger than session key size (CVE-2023-52440)

Use-after-free vulnerability in shinker callbacks (CVE-2023-52438)

Use-after-free vulnerability in uio_open (CVE-2023-52439)

Out-of-Band Vulnerability in smb2_parse_contexts() (CVE-2023-52434)

Stack corruption vulnerability where when a stack-correcting tc filter is first added to a net device, its local ports are bound to the device’s ACL group (CVE-2024-26586)

Accessible vulnerability for unit stack slots (CVE-2023-52452)

Vulnerability in alu denial of variable offset in PTR_TO_FLOW_KEYS (CVE-2024-26589)

Vulnerability in PTR_TO_FLOW_KEYS regarding direct damage caused by omission (CVE-2023-52444)

 

Vulnerability Patches

 

vulnerability patches have been made available in the latest updates. Please follow the instructions on the Referenced Sites to update to the latest Vulnerability Patches version.

CVE-2023-52451

  • Linux Kernel version 4.19.30
  • Linux Kernel 5.4.268 version
  • Linux Kernel 5.10.209
  • Linux Kernel 5.15.148
  • Linux Kernel 6.1.75 version
  • Linux Kernel 6.6.14 version
  • Linux Kernel 6.7.2 version
  • Linux Kernel 6.8-rc1 Version

 

CVE-2024-26582

  • Linux Kernel 6.8-rc5 Version

 

CVE-2024-26588

  • Linux Kernel 6.1.75 Version
  • Linux Kernel 6.6.14 Versions
  • Linux Kernel 6.7.2 version
  • Linux Kernel 6.8-rc1 Version

 

CVE-2023-52441

  • Linux Kernel 5.15.145 version
  • Linux Kernel 6.1.53 version
  • Linux Kernel 6.4.16 Version
  • Linux Kernel 6.5 Versions

 

CVE-2023-52445

  • Linux Kernel 4.19.306 version
  • Linux Kernel 5.4.268 version
  • Linux Kernel 5.10.209 version
  • Linux Kernel 5.15.148 version
  • Linux Kernel 6.1.75 version
  • Linux Kernel 6.6.14 version
  • Linux Kernel 6.7.2 version
  • Linux Kernel 6.8-rc1 Version

 

CVE-2023-52447

  • Linux Kernel 6.1.75 version
  • Linux Kernel 6.6.14 version
  • Linux Kernel 6.7.2 Versions
  • Linux Kernel 6.8-rc1 Version

 

CVE-2023-52446

  • Linux Kernel versions: 6.2.0 (inclusive) ~ 6.6.14 (excluded)
  • Linux Kernel Versions: 6.7.0 (inclusive) ~ 6.7.2 (excluded)

 

CVE-2023-52440

  • Linux Kernel version 5.15.145
  • Linux Kernel 6.1.52 (inclusive) to 6.7.2 (excluded)
  • Linux Kernel 6.4.15 (incl.)
  • Linux Kernel 6.5.2 Versions
  • Linux Kernel 6.6 Versions

 

CVE-2023-52438

  • Linux Kernel 5.4.268 version
  • Linux Kernel 5.10.209 version
  • Linux Kernel 5.15.148 version
  • Linux Kernel 6.1.74 version
  • Linux Kernel 6.6.13 version
  • Linux Kernel 6.7.1 version
  • Linux Kernel 6.8-rc1 Version

 

CVE-2023-52439

  • Linux Kernel 4.19.306 version
  • Linux Kernel 5.4.268 version
  • Linux Kernel 5.10.209 version
  • Linux Kernel 5.15.148 version
  • Linux Kernel 6.1.74 version
  • Linux Kernel 6.6.13 version
  • Linux Kernel 6.7.1 version
  • Linux Kernel 6.8-rc1 Version

 

CVE-2023-52434

  • Linux Kernel 6.6.8 Version
  • Linux Kernel 6.7 Versions

 

CVE-2024-26586

  • Linux Kernel 5.10.209 Versions
  • Linux Kernel 5.15.148 版本
  • Linux Kernel 6.6.14 版本
  • Linux Kernel 6.7.2 版本
  • Linux Kernel 6.8-rc1 Version

 

CVE-2023-52452

  • Linux Kernel 6.6.14 Versions
  • Linux Kernel 6.7.2 Versions
  • Linux Kernel 6.8-rc1 version

 

CVE-2024-26589

  • Linux Kernel 5.15.148 version
  • Linux Kernel 6.1.75 version
  • Linux Kernel 6.6.14 version
  • Linux Kernel 6.7.2 version
  • Linux Kernel 6.8-rc1

 

CVE-2023-52444

  • Linux Kernel 4.19.306 version
  • Linux Kernel 5.4.268 version
  • Linux Kernel 5.10.209 version
  • Linux Kernel 5.15.148 version
  • Linux Kernel 6.1.75 version
  • Linux Kernel 6.6.14 version
  • Linux Kernel 6.7.2 version
  • Linux Kernel 6.8-rc1 Version

 

Referenced Sites

 

[1] CVE-2023-52451 Detail

https://nvd.nist.gov/vuln/detail/CVE-2023-52451

[2] linux-cve-announce.vger.kernel.org archive mirror

https://lore.kernel.org/linux-cve-announce/2024022257-CVE-2023-52451-7bdb@gregkh/

[3] CVE-2024-26582 Detail

https://nvd.nist.gov/vuln/detail/CVE-2024-26582

[4] linux-cve-announce.vger.kernel.org archive mirror

https://lore.kernel.org/linux-cve-announce/2024022139-spruce-prelude-c358@gregkh/

[5] CVE-2024-26588 Detail

https://nvd.nist.gov/vuln/detail/CVE-2024-26588#range-10357762

[6] linux-cve-announce.vger.kernel.org archive mirror

https://lore.kernel.org/linux-cve-announce/2024022256-CVE-2024-26588-d6d5@gregkh/

[7] CVE-2023-52441 Detail

https://nvd.nist.gov/vuln/detail/CVE-2023-52441

[8] linux-cve-announce.vger.kernel.org archive mirror

https://lore.kernel.org/linux-cve-announce/2024022129-gently-activity-ca7d@gregkh/

[9] CVE-2023-52445 Detail

https://nvd.nist.gov/vuln/detail/CVE-2023-52445

[10] linux-cve-announce.vger.kernel.org archive mirror

https://lore.kernel.org/linux-cve-announce/2024022253-CVE-2023-52445-07a6@gregkh/

[11] CVE-2023-52447 Detail

https://nvd.nist.gov/vuln/detail/CVE-2023-52447

[12] linux-cve-announce.vger.kernel.org archive mirror

https://lore.kernel.org/linux-cve-announce/2024022255-CVE-2023-52447-e074@gregkh/

[13] CVE-2023-52440 Detail

https://nvd.nist.gov/vuln/detail/CVE-2023-52440

[14] linux-cve-announce.vger.kernel.org archive mirror

https://lore.kernel.org/linux-cve-announce/2024022123-glance-wrinkle-26c1@gregkh/

[15] CVE-2023-52438 Detail

https://nvd.nist.gov/vuln/detail/CVE-2023-52438

[16] linux-cve-announce.vger.kernel.org archive mirror

https://lore.kernel.org/linux-cve-announce/2024022017-slit-wish-e5d7@gregkh/

[17] CVE-2023-52439 Detail

https://nvd.nist.gov/vuln/detail/CVE-2023-52439

[18] linux-cve-announce.vger.kernel.org archive mirror

https://lore.kernel.org/linux-cve-announce/2024022026-wobbling-jumbo-748e@gregkh/

[19] CVE-2023-52434 Detail

https://nvd.nist.gov/vuln/detail/CVE-2023-52434

[20] linux-cve-announce.vger.kernel.org archive mirror

https://lore.kernel.org/linux-cve-announce/2024022033-makeshift-flammable-cb72@gregkh/

[21] CVE-2024-26586 Detail

https://nvd.nist.gov/vuln/detail/CVE-2024-26586

[22] linux-cve-announce.vger.kernel.org archive mirror

https://lore.kernel.org/linux-cve-announce/2024022253-CVE-2024-26586-6632@gregkh/

[23] CVE-2023-52452 Detail

https://nvd.nist.gov/vuln/detail/CVE-2023-52452

[24] linux-cve-announce.vger.kernel.org archive mirror

https://lore.kernel.org/linux-cve-announce/2024022258-CVE-2023-52452-7904@gregkh/#r

[25] CVE-2024-26589 Detail

https://nvd.nist.gov/vuln/detail/CVE-2024-26589

[26] linux-cve-announce.vger.kernel.org archive mirror

https://lore.kernel.org/linux-cve-announce/2024022257-CVE-2024-26589-0ee1@gregkh/

[27] CVE-2023-52444 Detail

https://nvd.nist.gov/vuln/detail/CVE-2023-52444#toggleConfig1

[28] linux-cve-announce.vger.kernel.org archive mirror

https://lore.kernel.org/linux-cve-announce/2024022252-CVE-2023-52444-f7ee@gregkh/