RedHat Linux Kernel Multiple Vulnerabilities
RISK: Medium Risk
TYPE: Operating Systems - Linux
Multiple vulnerabilities were identified in RedHat Linux Kernel. A remote attacker could exploit some of these vulnerabilities to trigger remote code execution, sensitive information disclosure, denial of service condition and elevation of privilege on the targeted system.
[Updated on 2024-12-12]
Updated System / Technologies affected, Solutions, Vulnerability Identifier and Related Links.
[Updated on 2024-12-19]
Updated Solutions, Vulnerability Identifier and Related Links.
Impact
- Denial of Service
- Remote Code Execution
- Information Disclosure
- Elevation of Privilege
System / Technologies affected
- Red Hat CodeReady Linux Builder for ARM 64 - Extended Update Support 8.8 aarch64
- Red Hat CodeReady Linux Builder for ARM 64 - Extended Update Support 9.2 aarch64
- Red Hat CodeReady Linux Builder for ARM 64 - Extended Update Support 9.4 aarch64
- Red Hat CodeReady Linux Builder for ARM 64 8 aarch64
- Red Hat CodeReady Linux Builder for ARM 64 9 aarch64
- Red Hat CodeReady Linux Builder for IBM z Systems - Extended Update Support 9.2 s390x
- Red Hat CodeReady Linux Builder for IBM z Systems - Extended Update Support 9.4 s390x
- Red Hat CodeReady Linux Builder for IBM z Systems 9 s390x
- Red Hat CodeReady Linux Builder for Power, little endian - Extended Update Support 8.8 ppc64le
- Red Hat CodeReady Linux Builder for Power, little endian - Extended Update Support 9.2 ppc64le
- Red Hat CodeReady Linux Builder for Power, little endian - Extended Update Support 9.4 ppc64le
- Red Hat CodeReady Linux Builder for Power, little endian 8 ppc64le
- Red Hat CodeReady Linux Builder for Power, little endian 9 ppc64le
- Red Hat CodeReady Linux Builder for x86_64 - Extended Update Support 8.8 x86_64
- Red Hat CodeReady Linux Builder for x86_64 - Extended Update Support 9.2 x86_64
- Red Hat CodeReady Linux Builder for x86_64 - Extended Update Support 9.4 x86_64
- Red Hat CodeReady Linux Builder for x86_64 8 x86_64
- Red Hat CodeReady Linux Builder for x86_64 9 x86_64
- Red Hat Enterprise Linux for ARM 64 - 4 years of updates 9.2 aarch64
- Red Hat Enterprise Linux for ARM 64 - 4 years of updates 9.4 aarch64
- Red Hat Enterprise Linux for ARM 64 - Extended Update Support 8.8 aarch64
- Red Hat Enterprise Linux for ARM 64 - Extended Update Support 9.2 aarch64
- Red Hat Enterprise Linux for ARM 64 - Extended Update Support 9.4 aarch64
- Red Hat Enterprise Linux for ARM 64 8 aarch64
- Red Hat Enterprise Linux for ARM 64 9 aarch64
- Red Hat Enterprise Linux for IBM z Systems - 4 years of updates 9.2 s390x
- Red Hat Enterprise Linux for IBM z Systems - 4 years of updates 9.4 s390x
- Red Hat Enterprise Linux for IBM z Systems - Extended Update Support 8.8 s390x
- Red Hat Enterprise Linux for IBM z Systems - Extended Update Support 9.2 s390x
- Red Hat Enterprise Linux for IBM z Systems - Extended Update Support 9.4 s390x
- Red Hat Enterprise Linux for IBM z Systems 8 s390x
- Red Hat Enterprise Linux for IBM z Systems 9 s390x
- Red Hat Enterprise Linux for Power, little endian - Extended Update Support 8.8 ppc64le
- Red Hat Enterprise Linux for Power, little endian - Extended Update Support 9.2 ppc64le
- Red Hat Enterprise Linux for Power, little endian - Extended Update Support 9.4 ppc64le
- Red Hat Enterprise Linux for Power, little endian 8 ppc64le
- Red Hat Enterprise Linux for Power, little endian 9 ppc64le
- Red Hat Enterprise Linux for Real Time 8 x86_64
- Red Hat Enterprise Linux for Real Time 9 x86_64
- Red Hat Enterprise Linux for Real Time for NFV 8 x86_64
- Red Hat Enterprise Linux for Real Time for NFV 9 x86_64
- Red Hat Enterprise Linux for Real Time for NFV for x86_64 - 4 years of updates 9.2 x86_64
- Red Hat Enterprise Linux for Real Time for NFV for x86_64 - 4 years of updates 9.4 x86_64
- Red Hat Enterprise Linux for Real Time for x86_64 - 4 years of updates 9.2 x86_64
- Red Hat Enterprise Linux for Real Time for x86_64 - 4 years of updates 9.4 x86_64
- Red Hat Enterprise Linux for x86_64 - Extended Update Support 8.8 x86_64
- Red Hat Enterprise Linux for x86_64 - Extended Update Support 9.2 x86_64
- Red Hat Enterprise Linux for x86_64 - Extended Update Support 9.4 x86_64
- Red Hat Enterprise Linux for x86_64 - Update Services for SAP Solutions 8.8 x86_64
- Red Hat Enterprise Linux for x86_64 - Update Services for SAP Solutions 9.2 x86_64
- Red Hat Enterprise Linux for x86_64 - Update Services for SAP Solutions 9.4 x86_64
- Red Hat Enterprise Linux for x86_64 8 x86_64
- Red Hat Enterprise Linux for x86_64 9 x86_64
- Red Hat Enterprise Linux Server - AUS 9.2 x86_64
- Red Hat Enterprise Linux Server - AUS 9.4 x86_64
- Red Hat Enterprise Linux Server - TUS 8.8 x86_64
- Red Hat Enterprise Linux Server for Power LE - Update Services for SAP Solutions 8.8 ppc64le
- Red Hat Enterprise Linux Server for Power LE - Update Services for SAP Solutions 9.2 ppc64le
- Red Hat Enterprise Linux Server for Power LE - Update Services for SAP Solutions 9.4 ppc64le
Solutions
Before installation of the software, please visit the vendor web-site for more details.
Apply fixes issued by the vendor:
- https://access.redhat.com/errata/RHSA-2024:10771
- https://access.redhat.com/errata/RHSA-2024:10772
- https://access.redhat.com/errata/RHSA-2024:10773
- https://access.redhat.com/errata/RHSA-2024:10939
- https://access.redhat.com/errata/RHSA-2024:10941
- https://access.redhat.com/errata/RHSA-2024:10942
- https://access.redhat.com/errata/RHSA-2024:10943
- https://access.redhat.com/errata/RHSA-2024:10944
- https://access.redhat.com/errata/RHSA-2024:10945
- https://access.redhat.com/errata/RHSA-2024:10946
- https://access.redhat.com/errata/RHSA-2024:11313
Vulnerability Identifier
- CVE-2021-47384
- CVE-2022-48804
- CVE-2023-0597
- CVE-2023-51779
- CVE-2023-52619
- CVE-2023-52635
- CVE-2023-52749
- CVE-2023-52775
- CVE-2023-52811
- CVE-2023-52881
- CVE-2024-26601
- CVE-2024-26615
- CVE-2024-26686
- CVE-2024-26704
- CVE-2024-26830
- CVE-2024-26984
- CVE-2024-27062
- CVE-2024-27399
- CVE-2024-36920
- CVE-2024-36960
- CVE-2024-37356
- CVE-2024-38384
- CVE-2024-38541
- CVE-2024-38555
- CVE-2024-38564
- CVE-2024-38627
- CVE-2024-39499
- CVE-2024-39507
- CVE-2024-40988
- CVE-2024-40989
- CVE-2024-40997
- CVE-2024-41007
- CVE-2024-41008
- CVE-2024-41009
- CVE-2024-41014
- CVE-2024-41031
- CVE-2024-41038
- CVE-2024-41041
- CVE-2024-41049
- CVE-2024-41056
- CVE-2024-41064
- CVE-2024-41093
- CVE-2024-42124
- CVE-2024-42154
- CVE-2024-42228
- CVE-2024-42237
- CVE-2024-42238
- CVE-2024-42240
- CVE-2024-42241
- CVE-2024-42243
- CVE-2024-42244
- CVE-2024-42271
- CVE-2024-43854
- CVE-2024-44989
- CVE-2024-44994
- CVE-2024-45018
- CVE-2024-46695
- CVE-2024-47675
- CVE-2024-49888
- CVE-2024-49949
- CVE-2024-50082
- CVE-2024-50099
- CVE-2024-50110
- CVE-2024-50142
- CVE-2024-50192
- CVE-2024-50251
- CVE-2024-50256
- CVE-2024-50262
- CVE-2024-50264
Source
Related Link
- https://access.redhat.com/errata/RHSA-2024:10771
- https://access.redhat.com/errata/RHSA-2024:10772
- https://access.redhat.com/errata/RHSA-2024:10773
- https://access.redhat.com/errata/RHSA-2024:10939
- https://access.redhat.com/errata/RHSA-2024:10941
- https://access.redhat.com/errata/RHSA-2024:10942
- https://access.redhat.com/errata/RHSA-2024:10943
- https://access.redhat.com/errata/RHSA-2024:10944
- https://access.redhat.com/errata/RHSA-2024:10945
- https://access.redhat.com/errata/RHSA-2024:10946
- https://access.redhat.com/errata/RHSA-2024:11313
Related Tags
Share with