Linux Kernel Security Update Advisory

Overview

 

We have released an update to address a vulnerability in the Linux Kernel. users of affected versions are advised to update to the latest version.

 

Affected Products

 

CVE-2024-26907

  • Linux Kernel Versions: ~ 5.10.214 (excluded)
  • Linux Kernel Versions : 5.11 (inclusive) to 5.15.153 (excluded)
  • Linux Kernel Versions : 5.16 (inclusive) to 6.1.83 (excluded)
  • Linux Kernel Versions : 6.2 (inclusive) to 6.6.23 (exclusive)
  • Linux Kernel Versions : 6.7 (inclusive) to 6.7.11 (excluded)

 

CVE-2024-26913

  • Linux Kernel Versions : ~ 6.7.6 (excluded)

 

CVE-2024-26883

  • Linux Kernel Versions : ~ 4.19.311 (excluded)
  • Linux Kernel Versions : 4.20 (inclusive) to 5.4.273 (excluded)
  • Linux Kernel Versions : 5.5 (inclusive) to 5.10.214 (excluded)
  • Linux Kernel Versions : 5.11 (inclusive) to 5.15.153 (excluded)
  • Linux Kernel Versions : 5.16 (inclusive) to 6.1.83 (excluded)
  • Linux Kernel Versions : 6.2 (inclusive) to 6.6.23 (exclusive)
  • Linux Kernel Versions : 6.7 (inclusive) to 6.7.11 (exclusive)
  • Linux Kernel Versions : 6.8 (inclusive) to 6.8.2 (excluded)

 

CVE-2024-26898

  • Linux Kernel Versions : 2.6.22 (inclusive) to 4.19.311 (excluded)
  • Linux Kernel Versions : 4.20 (inclusive) to 5.4.273 (excluded)
  • Linux Kernel Versions : 5.5 (inclusive) to 5.10.214 (excluded)
  • Linux Kernel Versions : 5.11 (inclusive) to 5.15.153 (excluded)
  • Linux Kernel Versions : 5.16 (inclusive) to 6.1.83 (excluded)
  • Linux Kernel Versions : 6.2 (inclusive) to 6.6.23 (exclusive)
  • Linux Kernel Versions : 6.7 (inclusive) to 6.7.11 (exclusive)
  • Linux Kernel Versions : 6.8 (inclusive) to 6.8.2 (excluded)

 

CVE-2024-26884

  • Linux Kernel Versions: 3.19 (inclusive) through 4.19.311 (excluded)
  • Linux Kernel Versions: 4.20 (inclusive) to 5.4.273 (excluded)
  • Linux Kernel version: 5.5 (inclusive) to 5.10.214 (excluded)
  • Linux Kernel version: 5.11 (inclusive) to 5.15.153 (excluded)
  • Linux Kernel versions: 5.16 (inclusive) to 6.1.83 (excluded)
  • Linux Kernel versions: 6.2 (inclusive) to 6.6.23 (excluded)
  • Linux Kernel versions: 6.7 (inclusive) to 6.7.11 (excluded)
  • Linux Kernel versions: 6.8 (inclusive) to 6.8.2 (excluded)

 

CVE-2024-26885

  • Linux Kernel Versions : 5.4 (inclusive) to 5.10.214 (excluded)
  • Linux Kernel Versions: 5.11 (inclusive) to 5.15.153 (excluded)
  • Linux Kernel Versions: 5.16 (inclusive) to 6.1.83 (excluded)
  • Linux Kernel versions: 6.2 (inclusive) to 6.6.23 (excluded)
  • Linux Kernel versions: 6.7 (inclusive) to 6.7.11 (excluded)
  • Linux Kernel versions: 6.8 (inclusive) to 6.8.2 (excluded)

 

Resolved Vulnerabilities

 

CVE-2024-26907: Memory copy error vulnerability when accessing Eth(segment) in the mlx5_ib_post_send function in the RDMA/mlx5 module in the Linux Kernel(7.8 High, CVSS V3.1 Date Added: 2024.04.29)

CVE-2024-26913 : Underflow/Corruption vulnerability in the dcn35 8k30 screen in the drm/amd/display module of the Linux kernel (7.8 High, CVSS V3.1 Date Added: 2024.04.29)

CVE-2024-26883: Stackmap Overflow Vulnerability in the bpf Module in the Linux Kernel on 32-bit Architectures (7.8 High, CVSS V3.1 Date Added: 2024.04.29)

CVE-2024-26898: Use-after-free vulnerability in the ATA over Ethernet (AoE) driver in the Linux kernel (7.8 High, CVSS V3.1 Date Added: 2024.04.29)

CVE-2024-26884: Hashtab Overflow Vulnerability in the bpf Module in the Linux Kernel on 32-bit Architectures (7.8 High, CVSS V3.1 Date Added: 2024.04.29)

CVE-2024-26885: DEVMAP_HASH Overflow Vulnerability in the bpf Module in the Linux Kernel on 32-bit Architectures (7.8 High, CVSS V3.1 Date Added: 2024.04.29)

 

Vulnerability Patches

 

Vulnerability Patches have been made available in the latest update. Please follow the instructions on the Referenced Sites to update to the latest Vulnerability Patches version.

 

CVE-2024-26907

  • Linux Kernel Version: 5.10.214
  • Linux Kernel Version : 5.15.153
  • Linux Kernel Version : 6.1.83
  • Linux Kernel Version : 6.6.23
  • Linux Kernel Version : 6.7.11

 

CVE-2024-26913

  • Linux Kernel Version : 6.7.6
  • Linux Kernel Version : 6.8

 

Cve-2024-26883, cve-2024-26898, cve-2024-26884

  • Linux Kernel Version : 4.19.311
  • Linux Kernel Version : 5.4.273
  • Linux Kernel Version : 5.10.214
  • Linux Kernel Version : 5.15.153
  • Linux Kernel Version : 6.1.83
  • Linux Kernel Version : 6.6.23
  • Linux Kernel Version : 6.7.11
  • Linux Kernel Version : 6.8.2
  • Linux Kernel Version : 6.9-rc1

 

CVE-2024-26885

  • Linux Kernel Version : 5.10.214
  • Linux Kernel Version : 5.15.153
  • Linux Kernel Version : 6.1.83
  • Linux Kernel Version : 6.6.23
  • Linux Kernel Version : 6.7.11
  • Linux Kernel Version : 6.8.2
  • Linux Kernel Version : 6.9-rc1

 

Referenced Sites

 

[1] CVE-2024-26907 Detail

https://nvd.nist.gov/vuln/detail/CVE-2024-26907

[2] CVE-2024-26907: RDMA/mlx5: Fix fortify source warning while accessing Eth segment

https://lore.kernel.org/linux-cve-announce/2024041746-CVE-2024-26907-a02d@gregkh/

[3] CVE-2024-26913 Detail

https://nvd.nist.gov/vuln/detail/CVE-2024-26913#range-10469947

[4] CVE-2024-26913: drm/amd/display: Fix dcn35 8k30 Underflow/Corruption Issue

https://lore.kernel.org/linux-cve-announce/2024041736-CVE-2024-26913-2cb3@gregkh/

[5] CVE-2024-26883 Detail

https://nvd.nist.gov/vuln/detail/CVE-2024-26883

[6] CVE-2024-26883: bpf: Fix stackmap overflow check on 32-bit arches

https://lore.kernel.org/linux-cve-announce/2024041741-CVE-2024-26883-1fc4@gregkh/

[7] CVE-2024-26898 Detail

https://nvd.nist.gov/vuln/detail/CVE-2024-26898

[8] CVE-2024-26898: aoe: fix the potential use-after-free problem in aoecmd_cfg_pkts

https://lore.kernel.org/linux-cve-announce/2024041744-CVE-2024-26898-d199@gregkh/

[9] CVE-2024-26884 Detail

https://nvd.nist.gov/vuln/detail/CVE-2024-26884

[10] CVE-2024-26884: bpf: Fix hashtab overflow check on 32-bit arches

https://lore.kernel.org/linux-cve-announce/2024041741-CVE-2024-26884-433b@gregkh/

[11] CVE-2024-26885 Detail

https://nvd.nist.gov/vuln/detail/CVE-2024-26885

[12] CVE-2024-26885: bpf: Fix DEVMAP_HASH overflow check on 32-bit arches

https://lore.kernel.org/linux-cve-announce/2024041741-CVE-2024-26885-4224@gregkh/