RedHat Linux 核心多個漏洞
最後更新
2024年07月25日
發佈日期:
2024年07月10日
539
觀看次數
風險: 中度風險
類型: 操作系統 - LINUX
於 RedHat Linux核心發現多個漏洞。遠端攻擊者可利用這些漏洞,於目標系統觸發阻斷服務狀況、權限提升、遠端執行任意程式碼、洩露敏感資料、繞過保安限制及仿冒。
[更新於 2024-07-12]
更新受影響之系統或技術、解決方案、漏洞識別碼及相關連結。
[更新於 2024-07-16]
更新受影響之系統或技術、解決方案、漏洞識別碼及相關連結。
[更新於 2024-07-17]
更新解決方案、漏洞識別碼及相關連結。
[更新於 2024-07-18]
更新受影響之系統或技術、解決方案及相關連結。
[更新於 2024-07-24]
更新受影響之系統或技術、解決方案、漏洞識別碼及相關連結。
[更新於 2024-07-25]
更新解決方案、漏洞識別碼及相關連結。
影響
- 遠端執行程式碼
- 阻斷服務
- 權限提升
- 資料洩露
- 繞過保安限制
- 仿冒
- 篡改
受影響之系統或技術
- Red Hat Enterprise Linux Server - AUS 8.4 x86_64
- Red Hat Enterprise Linux Server - TUS 8.4 x86_64
- Red Hat Enterprise Linux Server for Power LE - Update Services for SAP Solutions 8.4 ppc64le
- Red Hat Enterprise Linux for x86_64 - Update Services for SAP Solutions 8.4 x86_64
- Red Hat Enterprise Linux for Real Time - Telecommunications Update Service 8.4 x86_64
- Red Hat Enterprise Linux for Real Time for NFV - Telecommunications Update Service 8.4 x86_64
- Red Hat CodeReady Linux Builder for ARM 64 - Extended Update Support 9.2 aarch64
- Red Hat CodeReady Linux Builder for ARM 64 - Extended Update Support 9.4 aarch64
- Red Hat CodeReady Linux Builder for ARM 64 8 aarch64
- Red Hat CodeReady Linux Builder for ARM 64 9 aarch64
- Red Hat CodeReady Linux Builder for IBM z Systems - Extended Update Support 9.2 s390x
- Red Hat CodeReady Linux Builder for IBM z Systems - Extended Update Support 9.4 s390x
- Red Hat CodeReady Linux Builder for IBM z Systems 9 s390x
- Red Hat CodeReady Linux Builder for Power, little endian - Extended Update Support 9.2 ppc64le
- Red Hat CodeReady Linux Builder for Power, little endian - Extended Update Support 9.4 ppc64le
- Red Hat CodeReady Linux Builder for Power, little endian 8 ppc64le
- Red Hat CodeReady Linux Builder for Power, little endian 9 ppc64le
- Red Hat CodeReady Linux Builder for x86_64 - Extended Update Support 9.2 x86_64
- Red Hat CodeReady Linux Builder for x86_64 - Extended Update Support 9.4 x86_64
- Red Hat CodeReady Linux Builder for x86_64 8 x86_64
- Red Hat CodeReady Linux Builder for x86_64 9 x86_64
- Red Hat Enterprise Linux for ARM 64 - Extended Update Support 9.2 aarch64
- Red Hat Enterprise Linux for ARM 64 - Extended Update Support 9.4 aarch64
- Red Hat Enterprise Linux for ARM 64 8 aarch64
- Red Hat Enterprise Linux for ARM 64 9 aarch64
- Red Hat Enterprise Linux for IBM z Systems - Extended Update Support 9.2 s390x
- Red Hat Enterprise Linux for IBM z Systems - Extended Update Support 9.4 s390x
- Red Hat Enterprise Linux for IBM z Systems 8 s390x
- Red Hat Enterprise Linux for IBM z Systems 9 s390x
- Red Hat Enterprise Linux for Power, little endian - Extended Update Support 9.2 ppc64le
- Red Hat Enterprise Linux for Power, little endian - Extended Update Support 9.4 ppc64le
- Red Hat Enterprise Linux for Power, little endian 8 ppc64le
- Red Hat Enterprise Linux for Power, little endian 9 ppc64le
- Red Hat Enterprise Linux for Real Time 8 x86_64
- Red Hat Enterprise Linux for Real Time 9 x86_64
- Red Hat Enterprise Linux for Real Time for NFV 8 x86_64
- Red Hat Enterprise Linux for Real Time for NFV 9 x86_64
- Red Hat Enterprise Linux for Real Time for NFV for x86_64 - 4 years of updates 9.2 x86_64
- Red Hat Enterprise Linux for Real Time for NFV for x86_64 - 4 years of updates 9.4 x86_64
- Red Hat Enterprise Linux for Real Time for x86_64 - 4 years of updates 9.2 x86_64
- Red Hat Enterprise Linux for Real Time for x86_64 - 4 years of updates 9.4 x86_64
- Red Hat Enterprise Linux for x86_64 - Extended Update Support 9.2 x86_64
- Red Hat Enterprise Linux for x86_64 - Extended Update Support 9.4 x86_64
- Red Hat Enterprise Linux for x86_64 - Update Services for SAP Solutions 8.6 x86_64
- Red Hat Enterprise Linux for x86_64 - Update Services for SAP Solutions 9.2 x86_64
- Red Hat Enterprise Linux for x86_64 - Update Services for SAP Solutions 9.4 x86_64
- Red Hat Enterprise Linux for x86_64 8 x86_64
- Red Hat Enterprise Linux for x86_64 9 x86_64
- Red Hat Enterprise Linux Server - AUS 8.6 x86_64
- Red Hat Enterprise Linux Server - AUS 9.2 x86_64
- Red Hat Enterprise Linux Server - AUS 9.4 x86_64
- Red Hat Enterprise Linux Server - TUS 8.6 x86_64
- Red Hat Enterprise Linux Server for ARM 64 - 4 years of updates 9.2 aarch64
- Red Hat Enterprise Linux Server for ARM 64 - 4 years of updates 9.4 aarch64
- Red Hat Enterprise Linux Server for IBM z Systems - 4 years of updates 9.2 s390x
- Red Hat Enterprise Linux Server for IBM z Systems - 4 years of updates 9.4 s390x
- Red Hat Enterprise Linux Server for Power LE - Update Services for SAP Solutions 8.6 ppc64le
- Red Hat Enterprise Linux Server for Power LE - Update Services for SAP Solutions 9.2 ppc64le
- Red Hat Enterprise Linux Server for Power LE - Update Services for SAP Solutions 9.4 ppc64le
解決方案
在安裝軟體之前,請先瀏覽供應商之網站,以獲得更多詳細資料。
安裝供應商提供的修補程式:
- https://access.redhat.com/errata/RHSA-2024:4731
- https://access.redhat.com/errata/RHSA-2024:4729
- https://access.redhat.com/errata/RHSA-2024:4211
- https://access.redhat.com/errata/RHSA-2024:4349
- https://access.redhat.com/errata/RHSA-2024:4352
- https://access.redhat.com/errata/RHSA-2024:4447
- https://access.redhat.com/errata/RHSA-2024:4548
- https://access.redhat.com/errata/RHSA-2024:4547
- https://access.redhat.com/errata/RHSA-2024:4533
- https://access.redhat.com/errata/RHSA-2024:4554
- https://access.redhat.com/errata/RHSA-2024:4729
- https://access.redhat.com/errata/RHSA-2024:4731
- https://access.redhat.com/errata/RHSA-2024:4740
- https://access.redhat.com/errata/RHSA-2024:4823
- https://access.redhat.com/errata/RHSA-2024:4831
漏洞識別碼
- CVE-2020-26555
- CVE-2021-46909
- CVE-2021-46972
- CVE-2021-47069
- CVE-2021-47073
- CVE-2021-47236
- CVE-2021-47293
- CVE-2021-47310
- CVE-2021-47311
- CVE-2021-47353
- CVE-2021-47356
- CVE-2021-47400
- CVE-2021-47456
- CVE-2021-47459
- CVE-2021-47495
- CVE-2021-47548
- CVE-2021-47596
- CVE-2022-1789
- CVE-2022-36402
- CVE-2022-38457
- CVE-2022-40133
- CVE-2022-48627
- CVE-2022-48743
- CVE-2023-1989
- CVE-2023-4155
- CVE-2023-5090
- CVE-2023-5633
- CVE-2023-6546
- CVE-2023-33951
- CVE-2023-33952
- CVE-2023-52434
- CVE-2023-52439
- CVE-2023-52450
- CVE-2023-52464
- CVE-2023-52518
- CVE-2023-52530
- CVE-2023-52560
- CVE-2023-52578
- CVE-2023-52615
- CVE-2023-52626
- CVE-2023-52638
- CVE-2023-52639
- CVE-2023-52667
- CVE-2023-52669
- CVE-2023-52675
- CVE-2023-52686
- CVE-2023-52700
- CVE-2023-52703
- CVE-2023-52707
- CVE-2023-52781
- CVE-2023-52811
- CVE-2023-52813
- CVE-2023-52835
- CVE-2023-52877
- CVE-2023-52878
- CVE-2023-52881
- CVE-2024-1151
- CVE-2024-21823
- CVE-2024-26581
- CVE-2024-26583
- CVE-2024-26584
- CVE-2024-26585
- CVE-2024-26598
- CVE-2024-26656
- CVE-2024-26668
- CVE-2024-26675
- CVE-2024-26698
- CVE-2024-26704
- CVE-2024-26720
- CVE-2024-26735
- CVE-2024-26739
- CVE-2024-26759
- CVE-2024-26773
- CVE-2024-26783
- CVE-2024-26801
- CVE-2024-26804
- CVE-2024-26808
- CVE-2024-26810
- CVE-2024-26826
- CVE-2024-26852
- CVE-2024-26858
- CVE-2024-26859
- CVE-2024-26880
- CVE-2024-26906
- CVE-2024-26907
- CVE-2024-26908
- CVE-2024-26923
- CVE-2024-26925
- CVE-2024-26929
- CVE-2024-26931
- CVE-2024-26974
- CVE-2024-26982
- CVE-2024-27016
- CVE-2024-27019
- CVE-2024-27020
- CVE-2024-27065
- CVE-2024-27393
- CVE-2024-27397
- CVE-2024-27410
- CVE-2024-27417
- CVE-2024-27435
- CVE-2024-35789
- CVE-2024-35791
- CVE-2024-35835
- CVE-2024-35838
- CVE-2024-35845
- CVE-2024-35852
- CVE-2024-35853
- CVE-2024-35854
- CVE-2024-35855
- CVE-2024-35857
- CVE-2024-35870
- CVE-2024-35888
- CVE-2024-35890
- CVE-2024-35897
- CVE-2024-35898
- CVE-2024-35899
- CVE-2024-35937
- CVE-2024-35950
- CVE-2024-35958
- CVE-2024-35959
- CVE-2024-35960
- CVE-2024-35969
- CVE-2024-36004
- CVE-2024-36005
- CVE-2024-36007
- CVE-2024-36016
- CVE-2024-36025
- CVE-2024-36270
- CVE-2024-36489
- CVE-2024-36886
- CVE-2024-36904
- CVE-2024-36924
- CVE-2024-36952
- CVE-2024-36957
- CVE-2024-36978
- CVE-2024-38543
- CVE-2024-38586
- CVE-2024-38593
- CVE-2024-38596
- CVE-2024-38663
資料來源
相關連結
- https://access.redhat.com/errata/RHSA-2024:4731
- https://access.redhat.com/errata/RHSA-2024:4729
- https://access.redhat.com/errata/RHSA-2024:4211
- https://access.redhat.com/errata/RHSA-2024:4349
- https://access.redhat.com/errata/RHSA-2024:4352
- https://access.redhat.com/errata/RHSA-2024:4447
- https://access.redhat.com/errata/RHSA-2024:4548
- https://access.redhat.com/errata/RHSA-2024:4547
- https://access.redhat.com/errata/RHSA-2024:4533
- https://access.redhat.com/errata/RHSA-2024:4583
- https://access.redhat.com/errata/RHSA-2024:4554
- https://access.redhat.com/errata/RHSA-2024:4729
- https://access.redhat.com/errata/RHSA-2024:4731
- https://access.redhat.com/errata/RHSA-2024:4740
- https://access.redhat.com/errata/RHSA-2024:4823
- https://access.redhat.com/errata/RHSA-2024:4831
分享至