Linux Kernel Security Update Advisory

Overview

 

We have released security updates to fix vulnerabilities in our Linux Kernel products. users of affected products are advised to update to the latest version.

 

Affected Products

 

CVE-2024-26581

  • Linux Kernel Version: 5.4.269 (excluded)
  • Linux Kernel Versions: 5.5.0 (inclusive) to 5.10.210 (excluded)
  • Linux Kernel Versions: 5.11.0 (inclusive) to 5.15.149 (excluded)
  • Linux Kernel Versions: 5.16.0 (inclusive) to 6.1.78 (exclusive)
  • Linux Kernel Versions: 6.2.0 (inclusive) to 6.6.17 (exclusive)
  • Linux Kernel Versions: 6.7.0 (inclusive) to 6.7.5 (excluded)

 

CVE-2022-48626

  • Linux Kernel Version: 4.9.301 (Excluded)
  • Linux Kernel Versions: 4.10.0 (inclusive) to 4.14.266 (excluded)
  • Linux Kernel Versions: 4.15.0 (inclusive) to 4.19.229 (excluded)
  • Linux Kernel Versions: 4.20.0 (inclusive) to 5.4.179 (excluded)
  • Linux Kernel Versions: 5.5.0 (inclusive) to 5.10.100 (excluded)
  • Linux Kernel Versions: 5.11.0 (inclusive) to 5.15.23 (excluded)
  • Linux Kernel Versions: 5.16.0 (inclusive) to 5.16.9 (excluded)

 

CVE-2024-26593

  • Linux Kernel Versions: 5.3.0 (inclusive) to 5.4.269 (excluded)
  • Linux Kernel Versions: 5.5.0 (inclusive) to 5.10.210 (excluded)
  • Linux Kernel Versions: 5.11.0 (inclusive) to 5.15.149 (excluded)
  • Linux Kernel Versions: 5.16.0 (inclusive) to 6.1.79 (excluded)
  • Linux Kernel Versions: 6.2.0 (inclusive) to 6.6.18 (excluded)
  • Linux Kernel Versions: 6.7.0 (inclusive) to 6.7.6 (excluded)

 

CVE-2023-52436

  • Linux Kernel Versions: 4.19.306 (excluded)
  • Linux Kernel Versions: 4.20.0 (inclusive) through 5.4.268 (excluded)
  • Linux Kernel Versions: 5.5.0 (inclusive) to 5.10.209 (excluded)
  • Linux Kernel versions: 5.11.0 (inclusive) to 5.15.148 (exclusive)
  • Linux Kernel Versions: 5.16.0 (inclusive) to 6.1.74 (exclusive)
  • Linux Kernel Versions: 6.2.0 (inclusive) to 6.6.13 (exclusive)
  • Linux Kernel Versions: 6.7.0 (inclusive) to 6.7.1 (exclusive)

 

CVE-2021-47194

  • Linux Kernel Versions: 3.6.0 (inclusive) to 4.4.293 (excluded)
  • Linux Kernel Versions: 4.5.0 (inclusive) to 4.9.291 (excluded)
  • Linux Kernel versions: 4.10.0 (inclusive) to 4.14.256 (excluded)
  • Linux Kernel Versions: 4.15.0 (inclusive) to 4.19.218 (exclusive)
  • Linux Kernel Versions: 4.20.0 (inclusive) to 5.4.162 (exclusive)
  • Linux Kernel Versions: 5.5.0 (inclusive) to 5.10.82 (excluded)
  • Linux Kernel Versions: 5.11.0 (inclusive) to 5.15.5 (excluded)

 

CVE-2021-47198

  • Linux Kernel Versions: 5.15.5 (excluded)

 

Resolved Vulnerabilities

 

CVE-2024-26581: DoS vulnerability in the nft_set_rbtree module in netfilter due to failure to skip end-spacing elements during lazy garbage collection (lazy GC) ( 7.8 High, CVSS V3.1 Date Added: 2024.04.19)

CVE-2022-48626: Use-after-free vulnerability in the moxart driver in the Linux Kernel (7.8 High, CVSS V3.1 Date Added: 2024.04.17)

CVE-2024-26593: Vulnerability in block process call transactions in the i801 module of the i2c driver due to failure to reset the block buffer index, resulting in malformed data being read (7.1 High, CVSS V3.1 Date Added: 2024.04.19)

CVE-2021-47194: Vulnerability in NL80211_IFTYPE_P2P_GO to NL80211_IFTYPE_ADHOC transition in cfg80211 due to failure to call the cleanup function, cfg80211_stop_ap(), resulting in the use of uninitialized data (7.8 High, CVSS V3.1 Date Added: 2024.04.19)

CVE-2023-52436: Vulnerability in setting xattrs that occurs in the f2fs file system due to explicitly nulling the xattr list when setting xattrs, resulting in unused xattr space always being assumed to be zero (7.8 High, CVSS V3.1 Date Added: 2024.04.19)

CVE-2021-47198: Use-after-free vulnerability in the lpfc module of the scsi driver (7.8 High, CVSS V3.1 Date Added: 2024.04.19)

 

Vulnerability Patches

 

Vulnerability patches have been made available in the latest update. Please follow the instructions on the Referenced Sites[1] to update to the latest Vulnerability Patches version.

 

CVE-2024-26581

  • Linux Kernel Version: 6.1.78
  • Linux Kernel Version: 6.6.17
  • Linux Kernel Version: 6.7.5
  • Linux Kernel Version: 6.8-rc4

 

CVE-2022-48626

  • Linux Kernel Version: 4.9.301
  • Linux Kernel Version: 4.14.266
  • Linux Kernel Version: 4.19.229
  • Linux Kernel Version: 5.4.179
  • Linux Kernel version: 5.10.100
  • Linux Kernel version: 5.15.23
  • Linux Kernel version: 5.16.9
  • Linux Kernel Version: 5.17

 

CVE-2024-26593

  • Linux Kernel Version: 5.4.269
  • Linux Kernel Version: 5.10.210
  • Linux Kernel Version: 5.15.149
  • Linux Kernel Version: 6.1.79
  • Linux Kernel Version: 6.6.18
  • Linux Kernel Version: 6.7.6
  • Linux Kernel Version: 6.8-rc5

 

CVE-2023-52436

  • Linux Kernel Version: 4.19.306
  • Linux Kernel Version: 5.4.268
  • Linux Kernel Version: 5.10.209
  • Linux Kernel version: 5.15.148
  • Linux Kernel version: 6.1.74
  • Linux Kernel version: 6.6.13
  • Linux Kernel Version: 6.7.1

 

CVE-2021-47194

  • Linux Kernel Version: 4.4.293
  • Linux Kernel Version: 4.9.291
  • Linux Kernel Version: 4.14.256
  • Linux Kernel Version: 4.19.218
  • Linux Kernel version: 5.4.162
  • Linux Kernel version: 5.10.82
  • Linux Kernel Version: 5.15.5

 

CVE-2021-47198

  • Linux Kernel Version: 5.15.5
  • Linux Kernel Version: 5.16

 

Referenced Sites

 

[1] CVE-2024-26581 Detail

https://nvd.nist.gov/vuln/detail/CVE-2024-26581

[2] CVE-2024-26581: netfilter: nft_set_rbtree: skip end interval element from gc

https://lore.kernel.org/linux-cve-announce/2024022024-uniquely-recluse-d893@gregkh/

[3] CVE-2022-48626 Detail

https://nvd.nist.gov/vuln/detail/CVE-2022-48626

[4] CVE-2022-48626: moxart: fix potential use-after-free on remove path

https://lore.kernel.org/linux-cve-announce/2024022558-CVE-2022-48626-8a90@gregkh/

[5] CVE-2024-26593 Detail

https://nvd.nist.gov/vuln/detail/CVE-2024-26593

[6] CVE-2024-26593: i2c: i801: Fix block process call transactions

https://lore.kernel.org/linux-cve-announce/2024022315-CVE-2024-26593-9d89@gregkh/

[7] CVE-2023-52436 Detail

https://nvd.nist.gov/vuln/detail/CVE-2023-52436#VulnChangeHistorySection

[8] CVE-2023-52436: f2fs: explicitly null-terminate the xattr list

https://lore.kernel.org/linux-cve-announce/2024022056-operative-cork-082c@gregkh/

[9] CVE-2021-47194 Detail

https://nvd.nist.gov/vuln/detail/CVE-2021-47194

[10] CVE-2021-47194: cfg80211: call cfg80211_stop_ap when switch from P2P_GO type

https://lore.kernel.org/linux-cve-announce/2024041035-CVE-2021-47194-51cd@gregkh/

[11] CVE-2021-47198 Detail

https://nvd.nist.gov/vuln/detail/CVE-2021-47198

[12] CVE-2021-47198: scsi: lpfc: Fix use-after-free in lpfc_unreg_rpi() routine

https://lore.kernel.org/linux-cve-announce/2024041036-CVE-2021-47198-2426@gregkh/