RedHat Linux Kernel Multiple Vulnerabilities
RISK: Medium Risk
TYPE: Operating Systems - Linux
Multiple vulnerabilities were identified in RedHat Linux Kernel. A remote attacker could exploit some of these vulnerabilities to trigger denial of service condition, remote code execution, sensitive information disclosure, security restriction bypass, elevation of privilege and spoofing on the targeted system.
[Updated on 2024-09-12]
Updated System / Technologies affected, Solutions, Vulnerability Identifier and Related Links.
[Updated on 2024-09-19]
Updated System / Technologies affected, Solutions, Vulnerability Identifier and Related Links.
[Updated on 2024-09-25]
Updated Description, Impact, System / Technologies affected, Solutions, Vulnerability Identifier and Related Links.
[Updated on 2024-09-26]
Updated Solutions, Vulnerability Identifier and Related Links.
[Updated on 2024-09-30]
Updated System / Technologies affected, Solutions and Related Links.
Impact
- Denial of Service
- Remote Code Execution
- Spoofing
- Information Disclosure
- Security Restriction Bypass
- Elevation of Privilege
System / Technologies affected
- Red Hat CodeReady Linux Builder for ARM 64 - Extended Update Support 8.8 aarch64
- Red Hat CodeReady Linux Builder for ARM 64 - Extended Update Support 9.2 aarch64
- Red Hat CodeReady Linux Builder for IBM z Systems - Extended Update Support 9.2 s390x
- Red Hat CodeReady Linux Builder for Power, little endian - Extended Update Support 8.8 ppc64le
- Red Hat CodeReady Linux Builder for Power, little endian - Extended Update Support 9.2 ppc64le
- Red Hat CodeReady Linux Builder for x86_64 - Extended Update Support 8.8 x86_64
- Red Hat CodeReady Linux Builder for x86_64 - Extended Update Support 9.2 x86_64
- Red Hat Enterprise Linux Server - AUS 8.4 x86_64
- Red Hat Enterprise Linux Server - AUS 8.6 x86_64
- Red Hat Enterprise Linux Server - AUS 9.2 x86_64
- Red Hat Enterprise Linux Server - Extended Life Cycle Support (for IBM z Systems) 7 s390x
- Red Hat Enterprise Linux Server - Extended Life Cycle Support 7 x86_64
- Red Hat Enterprise Linux Server - Extended Life Cycle Support Extension (for IBM z Systems) 6 s390x
- Red Hat Enterprise Linux Server - Extended Life Cycle Support Extension 6 i386
- Red Hat Enterprise Linux Server - Extended Life Cycle Support Extension 6 x86_64
- Red Hat Enterprise Linux Server - Extended Life Cycle Support for IBM Power, big endian 7 ppc64
- Red Hat Enterprise Linux Server - Extended Life Cycle Support for IBM Power, little endian 7 ppc64le
- Red Hat Enterprise Linux Server - TUS 8.4 x86_64
- Red Hat Enterprise Linux Server - TUS 8.6 x86_64
- Red Hat Enterprise Linux Server - TUS 8.8 x86_64
- Red Hat Enterprise Linux Server for Power LE - Update Services for SAP Solutions 8.4 ppc64le
- Red Hat Enterprise Linux Server for Power LE - Update Services for SAP Solutions 8.6 ppc64le
- Red Hat Enterprise Linux Server for Power LE - Update Services for SAP Solutions 8.8 ppc64le
- Red Hat Enterprise Linux Server for Power LE - Update Services for SAP Solutions 9.2 ppc64le
- Red Hat Enterprise Linux for ARM 64 - 4 years of updates 9.2 aarch64
- Red Hat Enterprise Linux for ARM 64 - Extended Update Support 8.8 aarch64
- Red Hat Enterprise Linux for ARM 64 - Extended Update Support 9.2 aarch64
- Red Hat Enterprise Linux for IBM z Systems - 4 years of updates 9.2 s390x
- Red Hat Enterprise Linux for IBM z Systems - Extended Update Support 8.8 s390x
- Red Hat Enterprise Linux for IBM z Systems - Extended Update Support 9.2 s390x
- Red Hat Enterprise Linux for Power, little endian - Extended Update Support 8.8 ppc64le
- Red Hat Enterprise Linux for Power, little endian - Extended Update Support 9.2 ppc64le
- Red Hat Enterprise Linux for Real Time - Telecommunications Update Service 8.4 x86_64
- Red Hat Enterprise Linux for Real Time 8 x86_64
- Red Hat Enterprise Linux for Real Time for NFV - Telecommunications Update Service 8.4 x86_64
- Red Hat Enterprise Linux for Real Time for NFV 8 x86_64
- Red Hat Enterprise Linux for Real Time for NFV for x86_64 - 4 years of updates 9.2 x86_64
- Red Hat Enterprise Linux for Real Time for x86_64 - 4 years of updates 9.2 x86_64
- Red Hat Enterprise Linux for Real Time for x86_64 - Extended Life Cycle Support 7 x86_64
- Red Hat Enterprise Linux for x86_64 - Extended Update Support 8.8 x86_64
- Red Hat Enterprise Linux for x86_64 - Extended Update Support 9.2 x86_64
- Red Hat Enterprise Linux for x86_64 - Update Services for SAP Solutions 8.4 x86_64
- Red Hat Enterprise Linux for x86_64 - Update Services for SAP Solutions 8.6 x86_64
- Red Hat Enterprise Linux for x86_64 - Update Services for SAP Solutions 8.8 x86_64
- Red Hat Enterprise Linux for x86_64 - Update Services for SAP Solutions 9.2 x86_64
Solutions
Before installation of the software, please visit the vendor web-site for more details.
Apply fixes issued by the vendor:
- https://access.redhat.com/errata/RHSA-2024:6156
- https://access.redhat.com/errata/RHSA-2024:6267
- https://access.redhat.com/errata/RHSA-2024:6268
- https://access.redhat.com/errata/RHSA-2024:6567
- https://access.redhat.com/errata/RHSA-2024:6745
- https://access.redhat.com/errata/RHSA-2024:6744
- https://access.redhat.com/errata/RHSA-2024:6753
- https://access.redhat.com/errata/RHSA-2024:7003
- https://access.redhat.com/errata/RHSA-2024:7002
- https://access.redhat.com/errata/RHSA-2024:7001
- https://access.redhat.com/errata/RHSA-2024:6995
- https://access.redhat.com/errata/RHSA-2024:6994
- https://access.redhat.com/errata/RHSA-2024:6993
- https://access.redhat.com/errata/RHSA-2024:7004
- https://access.redhat.com/errata/RHSA-2024:7005
- https://access.redhat.com/errata/RHSA-2024:7227
Vulnerability Identifier
- CVE-2021-46984
- CVE-2021-47097
- CVE-2021-47101
- CVE-2021-47287
- CVE-2021-47289
- CVE-2021-47321
- CVE-2021-47338
- CVE-2021-47352
- CVE-2021-47356
- CVE-2021-47383
- CVE-2021-47384
- CVE-2021-47385
- CVE-2021-47386
- CVE-2021-47393
- CVE-2021-47412
- CVE-2021-47432
- CVE-2021-47441
- CVE-2021-47455
- CVE-2021-47466
- CVE-2021-47468
- CVE-2021-47492
- CVE-2021-47497
- CVE-2021-47527
- CVE-2021-47560
- CVE-2021-47566
- CVE-2021-47582
- CVE-2021-47609
- CVE-2022-48638
- CVE-2022-48687
- CVE-2022-48754
- CVE-2022-48760
- CVE-2022-48799
- CVE-2022-48804
- CVE-2022-48836
- CVE-2022-48866
- CVE-2023-6040
- CVE-2023-52434
- CVE-2023-52439
- CVE-2023-52463
- CVE-2023-52476
- CVE-2023-52478
- CVE-2023-52522
- CVE-2023-52605
- CVE-2023-52683
- CVE-2023-52784
- CVE-2023-52801
- CVE-2023-52811
- CVE-2023-52817
- CVE-2023-52840
- CVE-2023-52864
- CVE-2023-52880
- CVE-2024-2201
- CVE-2024-26595
- CVE-2024-26629
- CVE-2024-26630
- CVE-2024-26645
- CVE-2024-26665
- CVE-2024-26698
- CVE-2024-26704
- CVE-2024-26717
- CVE-2024-26720
- CVE-2024-26769
- CVE-2024-26772
- CVE-2024-26773
- CVE-2024-26826
- CVE-2024-26851
- CVE-2024-26855
- CVE-2024-26880
- CVE-2024-26886
- CVE-2024-26894
- CVE-2024-26908
- CVE-2024-26923
- CVE-2024-26939
- CVE-2024-26946
- CVE-2024-26974
- CVE-2024-26993
- CVE-2024-27013
- CVE-2024-27019
- CVE-2024-27020
- CVE-2024-27042
- CVE-2024-27399
- CVE-2024-35791
- CVE-2024-35797
- CVE-2024-35809
- CVE-2024-35839
- CVE-2024-35875
- CVE-2024-35877
- CVE-2024-35884
- CVE-2024-35895
- CVE-2024-35898
- CVE-2024-35944
- CVE-2024-35969
- CVE-2024-35989
- CVE-2024-36000
- CVE-2024-36005
- CVE-2024-36016
- CVE-2024-36019
- CVE-2024-36270
- CVE-2024-36883
- CVE-2024-36886
- CVE-2024-36899
- CVE-2024-36901
- CVE-2024-36902
- CVE-2024-36920
- CVE-2024-36929
- CVE-2024-36939
- CVE-2024-36953
- CVE-2024-36978
- CVE-2024-36979
- CVE-2024-37356
- CVE-2024-38540
- CVE-2024-38558
- CVE-2024-38559
- CVE-2024-38570
- CVE-2024-38573
- CVE-2024-38581
- CVE-2024-38598
- CVE-2024-38615
- CVE-2024-38619
- CVE-2024-39471
- CVE-2024-39499
- CVE-2024-39501
- CVE-2024-39502
- CVE-2024-39506
- CVE-2024-40901
- CVE-2024-40904
- CVE-2024-40911
- CVE-2024-40912
- CVE-2024-40914
- CVE-2024-40927
- CVE-2024-40929
- CVE-2024-40931
- CVE-2024-40936
- CVE-2024-40941
- CVE-2024-40954
- CVE-2024-40956
- CVE-2024-40958
- CVE-2024-40959
- CVE-2024-40960
- CVE-2024-40972
- CVE-2024-40977
- CVE-2024-40978
- CVE-2024-40983
- CVE-2024-40984
- CVE-2024-40988
- CVE-2024-40989
- CVE-2024-40995
- CVE-2024-40997
- CVE-2024-40998
- CVE-2024-41005
- CVE-2024-41007
- CVE-2024-41008
- CVE-2024-41009
- CVE-2024-41012
- CVE-2024-41013
- CVE-2024-41014
- CVE-2024-41023
- CVE-2024-41031
- CVE-2024-41035
- CVE-2024-41038
- CVE-2024-41039
- CVE-2024-41040
- CVE-2024-41041
- CVE-2024-41044
- CVE-2024-41055
- CVE-2024-41056
- CVE-2024-41060
- CVE-2024-41071
- CVE-2024-41073
- CVE-2024-41076
- CVE-2024-41090
- CVE-2024-41091
- CVE-2024-41093
- CVE-2024-41096
- CVE-2024-41097
- CVE-2024-42082
- CVE-2024-42084
- CVE-2024-42090
- CVE-2024-42096
- CVE-2024-42102
- CVE-2024-42114
- CVE-2024-42124
- CVE-2024-42131
- CVE-2024-42139
- CVE-2024-42152
- CVE-2024-42154
- CVE-2024-42226
- CVE-2024-42228
- CVE-2024-42237
- CVE-2024-42238
- CVE-2024-42240
- CVE-2024-42241
- CVE-2024-42243
- CVE-2024-42246
- CVE-2024-42322
- CVE-2024-43871
Source
Related Link
- https://access.redhat.com/errata/RHSA-2024:6156
- https://access.redhat.com/errata/RHSA-2024:6267
- https://access.redhat.com/errata/RHSA-2024:6268
- https://access.redhat.com/errata/RHSA-2024:6567
- https://access.redhat.com/errata/RHSA-2024:6745
- https://access.redhat.com/errata/RHSA-2024:6744
- https://access.redhat.com/errata/RHSA-2024:6753
- https://access.redhat.com/errata/RHSA-2024:7003
- https://access.redhat.com/errata/RHSA-2024:7002
- https://access.redhat.com/errata/RHSA-2024:7001
- https://access.redhat.com/errata/RHSA-2024:6995
- https://access.redhat.com/errata/RHSA-2024:6994
- https://access.redhat.com/errata/RHSA-2024:6993
- https://access.redhat.com/errata/RHSA-2024:7004
- https://access.redhat.com/errata/RHSA-2024:7005
- https://access.redhat.com/errata/RHSA-2024:7227
Related Tags
Share with