RedHat Linux 核心多個漏洞
最後更新
2024年06月28日
發佈日期:
2024年06月03日
583
觀看次數
風險: 中度風險
類型: 操作系統 - LINUX
於 RedHat Linux核心發現多個漏洞。遠端攻擊者可利用這些漏洞,於目標系統觸發阻斷服務狀況、權限提升、遠端執行任意程式碼、洩露敏感資料及繞過保安限制。
[更新於 2024-06-06]
更新影響、受影響之系統或技術、解決方案及相關連結。
[更新於 2024-06-14]
更新影響、受影響之系統或技術、解決方案、漏洞識別碼及相關連結。
[更新於 2024-06-26]
更新受影響之系統或技術、解決方案、漏洞識別碼及相關連結。
[更新於 2024-06-28]
更新解決方案、漏洞識別碼及相關連結。
影響
- 遠端執行程式碼
- 阻斷服務
- 權限提升
- 資料洩露
- 繞過保安限制
受影響之系統或技術
- Red Hat CodeReady Linux Builder for ARM 64 - Extended Update Support 8.8 aarch64
- Red Hat CodeReady Linux Builder for ARM 64 - Extended Update Support 9.2 aarch64
- Red Hat CodeReady Linux Builder for ARM 64 8 aarch64
- Red Hat CodeReady Linux Builder for IBM z Systems - Extended Update Support 9.2 s390x
- Red Hat CodeReady Linux Builder for Power, little endian - Extended Update Support 8.8 ppc64le
- Red Hat CodeReady Linux Builder for Power, little endian - Extended Update Support 9.2 ppc64le
- Red Hat CodeReady Linux Builder for Power, little endian 8 ppc64le
- Red Hat CodeReady Linux Builder for x86_64 - Extended Update Support 8.8 x86_64
- Red Hat CodeReady Linux Builder for x86_64 - Extended Update Support 9.2 x86_64
- Red Hat CodeReady Linux Builder for x86_64 8 x86_64
- Red Hat Enterprise Linux Server - AUS 7.6 x86_64
- Red Hat Enterprise Linux Server - AUS 8.2 x86_64
- Red Hat Enterprise Linux Server - AUS 8.6 x86_64
- Red Hat Enterprise Linux Server - AUS 9.2 x86_64
- Red Hat Enterprise Linux Server - TUS 8.4 x86_64
- Red Hat Enterprise Linux Server - TUS 8.6 x86_64
- Red Hat Enterprise Linux Server - TUS 8.8 x86_64
- Red Hat Enterprise Linux Server for ARM 64 - 4 years of updates 9.2 aarch64
- Red Hat Enterprise Linux Server for IBM z Systems - 4 years of updates 9.2 s390x
- Red Hat Enterprise Linux Server for Power LE - Update Services for SAP Solutions 8.4 ppc64le
- Red Hat Enterprise Linux Server for Power LE - Update Services for SAP Solutions 8.6 ppc64le
- Red Hat Enterprise Linux Server for Power LE - Update Services for SAP Solutions 8.8 ppc64le
- Red Hat Enterprise Linux Server for Power LE - Update Services for SAP Solutions 9.2 ppc64le
- Red Hat Enterprise Linux for ARM 64 - Extended Update Support 8.8 aarch64
- Red Hat Enterprise Linux for ARM 64 - Extended Update Support 9.2 aarch64
- Red Hat Enterprise Linux for ARM 64 8 aarch64
- Red Hat Enterprise Linux for IBM z Systems - Extended Update Support 8.8 s390x
- Red Hat Enterprise Linux for IBM z Systems - Extended Update Support 9.2 s390x
- Red Hat Enterprise Linux for IBM z Systems 8 s390x
- Red Hat Enterprise Linux for Power, little endian - Extended Update Support 8.8 ppc64le
- Red Hat Enterprise Linux for Power, little endian - Extended Update Support 9.2 ppc64le
- Red Hat Enterprise Linux for Power, little endian 8 ppc64le
- Red Hat Enterprise Linux for Real Time - Telecommunications Update Service 8.4 x86_64
- Red Hat Enterprise Linux for Real Time 8 x86_64
- Red Hat Enterprise Linux for Real Time for NFV - Telecommunications Update Service 8.4 x86_64
- Red Hat Enterprise Linux for Real Time for NFV 8 x86_64
- Red Hat Enterprise Linux for Real Time for NFV for x86_64 - 4 years of updates 9.2 x86_64
- Red Hat Enterprise Linux for Real Time for x86_64 - 4 years of updates 9.2 x86_64
- Red Hat Enterprise Linux for x86_64 - Extended Update Support 8.8 x86_64
- Red Hat Enterprise Linux for x86_64 - Extended Update Support 9.2 x86_64
- Red Hat Enterprise Linux for x86_64 - Update Services for SAP Solutions 8.4 x86_64
- Red Hat Enterprise Linux for x86_64 - Update Services for SAP Solutions 8.6 x86_64
- Red Hat Enterprise Linux for x86_64 - Update Services for SAP Solutions 8.8 x86_64
- Red Hat Enterprise Linux for x86_64 - Update Services for SAP Solutions 9.2 x86_64
- Red Hat Enterprise Linux for x86_64 8 x86_64
解決方案
在安裝軟體之前,請先瀏覽供應商之網站,以獲得更多詳細資料。
安裝供應商提供的修補程式:
- https://access.redhat.com/errata/RHSA-2024:3528
- https://access.redhat.com/errata/RHSA-2024:3529
- https://access.redhat.com/errata/RHSA-2024:3530
- https://access.redhat.com/errata/RHSA-2024:3627
- https://access.redhat.com/errata/RHSA-2024:3618
- https://access.redhat.com/errata/RHSA-2024:3810
- https://access.redhat.com/errata/RHSA-2024:3854
- https://access.redhat.com/errata/RHSA-2024:3855
- https://access.redhat.com/errata/RHSA-2024:3859
- https://access.redhat.com/errata/RHSA-2024:4098
- https://access.redhat.com/errata/RHSA-2024:4106
- https://access.redhat.com/errata/RHSA-2024:4107
- https://access.redhat.com/errata/RHSA-2024:4108
漏洞識別碼
- CVE-2019-25162
- CVE-2020-36777
- CVE-2021-46934
- CVE-2021-47013
- CVE-2021-47055
- CVE-2021-47118
- CVE-2021-47153
- CVE-2021-47171
- CVE-2021-47185
- CVE-2021-47400
- CVE-2022-1048
- CVE-2022-48627
- CVE-2022-48669
- CVE-2023-1118
- CVE-2023-1998
- CVE-2023-2002
- CVE-2023-2166
- CVE-2023-2176
- CVE-2023-4155
- CVE-2023-5090
- CVE-2023-6240
- CVE-2023-6356
- CVE-2023-6535
- CVE-2023-6536
- CVE-2023-51779
- CVE-2023-52439
- CVE-2023-52445
- CVE-2023-52477
- CVE-2023-52513
- CVE-2023-52520
- CVE-2023-52528
- CVE-2023-52530
- CVE-2023-52565
- CVE-2023-52578
- CVE-2023-52594
- CVE-2023-52595
- CVE-2023-52598
- CVE-2023-52606
- CVE-2023-52607
- CVE-2023-52610
- CVE-2023-52639
- CVE-2023-52667
- CVE-2024-0340
- CVE-2024-1086
- CVE-2024-23307
- CVE-2024-25742
- CVE-2024-25743
- CVE-2024-25744
- CVE-2024-26586
- CVE-2024-26593
- CVE-2024-26598
- CVE-2024-26602
- CVE-2024-26603
- CVE-2024-26610
- CVE-2024-26615
- CVE-2024-26642
- CVE-2024-26643
- CVE-2024-26659
- CVE-2024-26664
- CVE-2024-26693
- CVE-2024-26694
- CVE-2024-26743
- CVE-2024-26744
- CVE-2024-26779
- CVE-2024-26872
- CVE-2024-26892
- CVE-2024-26897
- CVE-2024-26901
- CVE-2024-26919
- CVE-2024-26933
- CVE-2024-26934
- CVE-2024-26964
- CVE-2024-26973
- CVE-2024-26993
- CVE-2024-27014
- CVE-2024-27048
- CVE-2024-27052
- CVE-2024-27056
- CVE-2024-27059
- CVE-2024-27393
- CVE-2024-27397
- CVE-2024-27403
- CVE-2024-35870
- CVE-2024-35958
- CVE-2024-35960
- CVE-2024-36957
資料來源
相關連結
- https://access.redhat.com/errata/RHSA-2024:3528
- https://access.redhat.com/errata/RHSA-2024:3529
- https://access.redhat.com/errata/RHSA-2024:3530
- https://access.redhat.com/errata/RHSA-2024:3627
- https://access.redhat.com/errata/RHSA-2024:3618
- https://access.redhat.com/errata/RHSA-2024:3810
- https://access.redhat.com/errata/RHSA-2024:3854
- https://access.redhat.com/errata/RHSA-2024:3855
- https://access.redhat.com/errata/RHSA-2024:3859
- https://access.redhat.com/errata/RHSA-2024:4098
- https://access.redhat.com/errata/RHSA-2024:4106
- https://access.redhat.com/errata/RHSA-2024:4107
- https://access.redhat.com/errata/RHSA-2024:4108
分享至