RedHat Linux Kernel Multiple Vulnerabilities
RISK: Medium Risk
TYPE: Operating Systems - Linux
Multiple vulnerabilities were identified in RedHat Linux Kernel. A remote attacker could exploit some of these vulnerabilities to trigger remote code execution, sensitive information disclosure, denial of service condition, data manipulation and security restriction bypass on the targeted system.
[Updated on 2024-10-17]
Updated Description, System / Technologies affected, Solutions, Vulnerability Identifier and Related Links.
Impact
- Denial of Service
- Remote Code Execution
- Security Restriction Bypass
- Data Manipulation
- Information Disclosure
System / Technologies affected
- Red Hat CodeReady Linux Builder for ARM 64 - Extended Update Support 9.2 aarch64
- Red Hat CodeReady Linux Builder for IBM z Systems - Extended Update Support 9.2 s390x
- Red Hat CodeReady Linux Builder for Power, little endian - Extended Update Support 9.2 ppc64le
- Red Hat CodeReady Linux Builder for x86_64 - Extended Update Support 9.2 x86_64
- Red Hat Enterprise Linux for ARM 64 - 4 years of updates 9.2 aarch64
- Red Hat Enterprise Linux for ARM 64 - 4 years of updates 9.4 aarch64
- Red Hat Enterprise Linux for ARM 64 - Extended Update Support 8.8 aarch64
- Red Hat Enterprise Linux for ARM 64 - Extended Update Support 9.2 aarch64
- Red Hat Enterprise Linux for ARM 64 - Extended Update Support 9.4 aarch64
- Red Hat Enterprise Linux for ARM 64 8 aarch64
- Red Hat Enterprise Linux for ARM 64 9 aarch64
- Red Hat Enterprise Linux for IBM z Systems - 4 years of updates 9.2 s390x
- Red Hat Enterprise Linux for IBM z Systems - 4 years of updates 9.4 s390x
- Red Hat Enterprise Linux for IBM z Systems - Extended Update Support 8.8 s390x
- Red Hat Enterprise Linux for IBM z Systems - Extended Update Support 9.2 s390x
- Red Hat Enterprise Linux for IBM z Systems - Extended Update Support 9.4 s390x
- Red Hat Enterprise Linux for IBM z Systems 8 s390x
- Red Hat Enterprise Linux for IBM z Systems 9 s390x
- Red Hat Enterprise Linux for Power, little endian - Extended Update Support 8.8 ppc64le
- Red Hat Enterprise Linux for Power, little endian - Extended Update Support 9.2 ppc64le
- Red Hat Enterprise Linux for Power, little endian - Extended Update Support 9.4 ppc64le
- Red Hat Enterprise Linux for Power, little endian 8 ppc64le
- Red Hat Enterprise Linux for Power, little endian 9 ppc64le
- Red Hat Enterprise Linux for Real Time for NFV for x86_64 - 4 years of updates 9.2 x86_64
- Red Hat Enterprise Linux for Real Time for NFV 9 x86_64
- Red Hat Enterprise Linux for Real Time for x86_64 - 4 years of updates 9.2 x86_64
- Red Hat Enterprise Linux for Real Time for x86_64 - 4 years of updates 9.4 x86_64
- Red Hat Enterprise Linux for Real Time 9 x86_64
- Red Hat Enterprise Linux for x86_64 - Extended Update Support 8.8 x86_64
- Red Hat Enterprise Linux for x86_64 - Extended Update Support 9.2 x86_64
- Red Hat Enterprise Linux for x86_64 - Extended Update Support 9.4 x86_64
- Red Hat Enterprise Linux for x86_64 - Update Services for SAP Solutions 8.4 x86_64
- Red Hat Enterprise Linux for x86_64 - Update Services for SAP Solutions 8.6 x86_64
- Red Hat Enterprise Linux for x86_64 - Update Services for SAP Solutions 8.8 x86_64
- Red Hat Enterprise Linux for x86_64 - Update Services for SAP Solutions 9.0 x86_64
- Red Hat Enterprise Linux for x86_64 - Update Services for SAP Solutions 9.2 x86_64
- Red Hat Enterprise Linux for x86_64 - Update Services for SAP Solutions 9.4 x86_64
- Red Hat Enterprise Linux for x86_64 8 x86_64
- Red Hat Enterprise Linux for x86_64 9 x86_64
- Red Hat Enterprise Linux Server - AUS 8.6 x86_64
- Red Hat Enterprise Linux Server - AUS 9.2 x86_64
- Red Hat Enterprise Linux Server - AUS 9.4 x86_64
- Red Hat Enterprise Linux Server - TUS 8.6 x86_64
- Red Hat Enterprise Linux Server - TUS 8.8 x86_64
- Red Hat Enterprise Linux Server for Power LE - Update Services for SAP Solutions 8.4 ppc64le
- Red Hat Enterprise Linux Server for Power LE - Update Services for SAP Solutions 8.6 ppc64le
- Red Hat Enterprise Linux Server for Power LE - Update Services for SAP Solutions 8.8 ppc64le
- Red Hat Enterprise Linux Server for Power LE - Update Services for SAP Solutions 9.2 ppc64le
- Red Hat Enterprise Linux Server for Power LE - Update Services for SAP Solutions 9.4 ppc64le
- Red Hat CodeReady Linux Builder for x86_64 9 x86_64
- Red Hat CodeReady Linux Builder for Power, little endian 9 ppc64le
- Red Hat CodeReady Linux Builder for ARM 64 9 aarch64
- Red Hat CodeReady Linux Builder for IBM z Systems 9 s390x
- Red Hat CodeReady Linux Builder for x86_64 - Extended Update Support 9.4 x86_64
- Red Hat CodeReady Linux Builder for Power, little endian - Extended Update Support 9.4 ppc64le
- Red Hat CodeReady Linux Builder for IBM z Systems - Extended Update Support 9.4 s390x
- Red Hat CodeReady Linux Builder for ARM 64 - Extended Update Support 9.4 aarch64
Solutions
Before installation of the software, please visit the vendor web-site for more details.
Apply fixes issued by the vendor:
- https://access.redhat.com/errata/RHSA-2024:7490
- https://access.redhat.com/errata/RHSA-2024:7489
- https://access.redhat.com/errata/RHSA-2024:7486
- https://access.redhat.com/errata/RHSA-2024:7484
- https://access.redhat.com/errata/RHSA-2024:7483
- https://access.redhat.com/errata/RHSA-2024:7482
- https://access.redhat.com/errata/RHSA-2024:7481
- https://access.redhat.com/errata/RHSA-2024:7418
- https://access.redhat.com/errata/RHSA-2024:7427
- https://access.redhat.com/errata/RHSA-2024:7428
- https://access.redhat.com/errata/RHSA-2024:7429
- https://access.redhat.com/errata/RHSA-2024:7430
- https://access.redhat.com/errata/RHSA-2024:7431
- https://access.redhat.com/errata/RHSA-2024:7432
- https://access.redhat.com/errata/RHSA-2024:7433
- https://access.redhat.com/errata/RHSA-2024:8107
- https://access.redhat.com/errata/RHSA-2024:8157
- https://access.redhat.com/errata/RHSA-2024:8158
- https://access.redhat.com/errata/RHSA-2024:8161
- https://access.redhat.com/errata/RHSA-2024:8162
Vulnerability Identifier
- CVE-2021-47321
- CVE-2021-47385
- CVE-2021-47560
- CVE-2023-1252
- CVE-2023-20584
- CVE-2023-28746
- CVE-2023-31356
- CVE-2023-52658
- CVE-2024-26598
- CVE-2024-26830
- CVE-2024-26923
- CVE-2024-27403
- CVE-2024-27415
- CVE-2024-35884
- CVE-2024-35989
- CVE-2024-36025
- CVE-2024-36244
- CVE-2024-36270
- CVE-2024-36886
- CVE-2024-36889
- CVE-2024-36952
- CVE-2024-36978
- CVE-2024-36979
- CVE-2024-38556
- CVE-2024-38558
- CVE-2024-39472
- CVE-2024-39476
- CVE-2024-39483
- CVE-2024-39502
- CVE-2024-40959
- CVE-2024-40998
- CVE-2024-41040
- CVE-2024-41056
- CVE-2024-41066
- CVE-2024-41071
- CVE-2024-41090
- CVE-2024-41091
- CVE-2024-42079
- CVE-2024-42090
- CVE-2024-42272
- CVE-2024-42284
Source
Related Link
- https://access.redhat.com/errata/RHSA-2024:7490
- https://access.redhat.com/errata/RHSA-2024:7489
- https://access.redhat.com/errata/RHSA-2024:7486
- https://access.redhat.com/errata/RHSA-2024:7484
- https://access.redhat.com/errata/RHSA-2024:7483
- https://access.redhat.com/errata/RHSA-2024:7482
- https://access.redhat.com/errata/RHSA-2024:7481
- https://access.redhat.com/errata/RHSA-2024:7418
- https://access.redhat.com/errata/RHSA-2024:7427
- https://access.redhat.com/errata/RHSA-2024:7428
- https://access.redhat.com/errata/RHSA-2024:7429
- https://access.redhat.com/errata/RHSA-2024:7430
- https://access.redhat.com/errata/RHSA-2024:7431
- https://access.redhat.com/errata/RHSA-2024:7432
- https://access.redhat.com/errata/RHSA-2024:7433
- https://access.redhat.com/errata/RHSA-2024:8107
- https://access.redhat.com/errata/RHSA-2024:8157
- https://access.redhat.com/errata/RHSA-2024:8158
- https://access.redhat.com/errata/RHSA-2024:8161
- https://access.redhat.com/errata/RHSA-2024:8162
Related Tags
Share with