Rewterz
Rewterz Threat Update – AI Models Exposed to Supply Chain Attacks Due to New Hugging Face Flaw
February 28, 2024
Rewterz
Rewterz Threat Alert – Remcos RAT – Active IOCs
February 28, 2024

Rewterz Threat Advisory – Multiple Linux Kernel Vulnerabilities

Severity

High

Analysis Summary

CVE-2024-26585 CVSS:5.1

Linux Kernel is vulnerable to a denial of service, caused by a race condition when submitting thread in the tls subsystem. By sending a specially crafted request, a local attacker could exploit this vulnerability to cause a denial of service condition.

CVE-2024-26584 CVSS:5.5

Linux Kernel is vulnerable to a denial of service, caused by a flaw when setting the CRYPTO_TFM_REQ_MAY_BACKLOG flag on requests to the crypto API in the tls subsystem. By sending a specially crafted request, a local authenticated attacker could exploit this vulnerability to cause a denial of service condition.

CVE-2024-26583 CVSS:5.1

Linux Kernel is vulnerable to a denial of service, caused by a race condition in the tls subsystem. By sending a specially crafted request, a local attacker could exploit this vulnerability to cause a denial of service condition.

CVE-2024-26582 CVSS:8.4

Linux Kernel could allow a local attacker to execute arbitrary code on the system, caused by a use-after-free flaw in the tls_decrypt_sg() function. By sending a specially crafted request, an attacker could exploit this vulnerability to execute arbitrary code or cause a denial of service condition on the system.

CVE-2023-52439 CVSS:7

Linux Kernel could allow a local authenticated attacker to gain elevated privileges on the system, caused by a use-after-free memory flaw in the uio_open function. By sending a specially crafted request, an authenticated attacker could exploit this vulnerability to gain elevated privileges or cause the system to crash.

CVE-2023-52438 CVSS:7

Linux Kernel could allow a local authenticated attacker to gain elevated privileges on the system, caused by a use-after-free memory flaw in the shinker’s callback function. By sending a specially crafted request, an authenticated attacker could exploit this vulnerability to gain elevated privileges or cause the system to crash.

CVE-2023-52437 CVSS:5.5

Linux Kernel is vulnerable to a denial of service, caused by a race condition in the md/raid5 driver. By sending a specially crafted request, a local authenticated attacker could exploit this vulnerability to cause a denial of service condition.

CVE-2023-52436 CVSS:7.3

An unspecified error wen setting an xattr in the f2fs subsystem in Linux Kernel has an unknown impact and attack vector.

CVE-2023-52435 CVSS:5.5

Linux Kernel is vulnerable to a denial of service, caused by a mss overflow in the skb_segment() function. By sending a specially crafted request, a remote attacker could exploit this vulnerability to cause the system to crash.

CVE-2023-52434 CVSS:5.5

Linux Kernel could allow a local authenticated attacker to obtain sensitive information, caused by an out-of-bounds error in the smb2_parse_contexts() function. By sending a specially crafted request, an attacker could exploit this vulnerability to obtain sensitive information, and use this information to launch further attacks against the affected system.

CVE-2021-46905 CVSS:9.8

Linux Kernel could provide weaker than expected security, caused by a NULL-deref on disconnect regression. An attacker could exploit this vulnerability to launch further attacks on the system.

CVE-2021-46904 CVSS:9.8

Linux Kernel could provide weaker than expected security, caused by an null-ptr-deref during tty device unregistration. An attacker could exploit this vulnerability to launch further attacks on the system.

CVE-2022-48626 CVSS:9.8

Linux Kernel could provide weaker than expected security, caused by an use-after-free on remove path. An attacker could exploit this vulnerability to launch further attacks on the system.

Impact

  • Denial of Service
  • Gain Access
  • Privilege Escalation
  • Information Disclosure

Indicators Of Compromise

CVE

  • CVE-2024-26585
  • CVE-2024-26584
  • CVE-2024-26583
  • CVE-2024-26582
  • CVE-2023-52439
  • CVE-2023-52438
  • CVE-2023-52437
  • CVE-2023-52436
  • CVE-2023-52435
  • CVE-2023-52434
  • CVE-2021-46905
  • CVE-2021-46904
  • CVE-2022-48626

Affected Vendors

Linux

Affected Products

  • Linux Kernel 5.7.0
  • Linux Kernel 5.4
  • Linux Kernel 4.18
  • Linux Kernel 4.20
  • Linux Kernel 5.10
  • Linux Kernel 4.19
  • Linux Kernel 5.0
  • Linux Kernel 5.15
  • Linux Kernel 4.8.0
  • Linux Kernel 6.1
  • Linux Kernel 6.6
  • Linux Kernel 6.7.0
  • Linux Kernel 6.8-rc4

Remediation

Refer to Linux Kernel GIT Repository for patch, upgrade or suggested workaround information.

CVE-2024-26585

CVE-2024-26584

CVE-2024-26583

CVE-2024-26582

CVE-2023-52439

CVE-2023-52438

CVE-2023-52437

CVE-2023-52436

CVE-2023-52435

CVE-2023-52434

CVE-2021-46905

CVE-2021-46904

CVE-2022-48626