RedHat Linux 核心多個漏洞
最後更新
2024年08月30日
發佈日期:
2024年08月02日
459
觀看次數
風險: 高度風險
類型: 操作系統 - LINUX
於 RedHat Linux核心發現多個漏洞。遠端攻擊者可利用這些漏洞,於目標系統觸發阻斷服務狀況、權限提升、遠端執行任意程式碼、洩露敏感資料及繞過保安限制。
注意:
CVE-2024-36971 漏洞正被廣泛利用。該漏洞允許具有系統執行權限的黑客在內核進行遠端執行任意程式碼。風險等級被評為「高度風險」。
[更新於 2024-08-15]
更新受影響之系統或技術、解決方案、漏洞識別碼及相關連結。
[更新於 2024-08-20]
更新風險、解決方案、漏洞識別碼及相關連結。
[更新於 2024-08-23]
更新受影響之系統或技術、解決方案、漏洞識別碼及相關連結。
[更新於 2024-08-30]
更新受影響之系統或技術、解決方案、漏洞識別碼及相關連結。
影響
- 遠端執行程式碼
- 阻斷服務
- 權限提升
- 資料洩露
- 繞過保安限制
受影響之系統或技術
- Red Hat CodeReady Linux Builder for ARM 64 - Extended Update Support 8.8 aarch64
- Red Hat CodeReady Linux Builder for ARM 64 - Extended Update Support 9.2 aarch64
- Red Hat CodeReady Linux Builder for ARM 64 - Extended Update Support 9.4 aarch64
- Red Hat CodeReady Linux Builder for ARM 64 8 aarch64
- Red Hat CodeReady Linux Builder for ARM 64 9 aarch64
- Red Hat CodeReady Linux Builder for IBM z Systems - Extended Update Support 9.2 s390x
- Red Hat CodeReady Linux Builder for IBM z Systems - Extended Update Support 9.4 s390x
- Red Hat CodeReady Linux Builder for IBM z Systems 9 s390x
- Red Hat CodeReady Linux Builder for Power, little endian - Extended Update Support 8.8 ppc64le
- Red Hat CodeReady Linux Builder for Power, little endian - Extended Update Support 9.2 ppc64le
- Red Hat CodeReady Linux Builder for Power, little endian - Extended Update Support 9.4 ppc64le
- Red Hat CodeReady Linux Builder for Power, little endian 8 ppc64le
- Red Hat CodeReady Linux Builder for Power, little endian 9 ppc64le
- Red Hat CodeReady Linux Builder for x86_64 - Extended Update Support 8.8 x86_64
- Red Hat CodeReady Linux Builder for x86_64 - Extended Update Support 9.2 x86_64
- Red Hat CodeReady Linux Builder for x86_64 - Extended Update Support 9.4 x86_64
- Red Hat CodeReady Linux Builder for x86_64 8 x86_64
- Red Hat CodeReady Linux Builder for x86_64 9 x86_64
- Red Hat Enterprise Linux Server - AUS 7.7 x86_64
- Red Hat Enterprise Linux Server - AUS 8.4 x86_64
- Red Hat Enterprise Linux Server - AUS 8.6 x86_64
- Red Hat Enterprise Linux Server - AUS 9.2 x86_64
- Red Hat Enterprise Linux Server - AUS 9.4 x86_64
- Red Hat Enterprise Linux Server - Extended Life Cycle Support (for IBM z Systems) 7 s390x
- Red Hat Enterprise Linux Server - Extended Life Cycle Support 7 x86_64
- Red Hat Enterprise Linux Server - Extended Life Cycle Support for IBM Power, big endian 7 ppc64
- Red Hat Enterprise Linux Server - Extended Life Cycle Support for IBM Power, little endian 7 ppc64le
- Red Hat Enterprise Linux Server - TUS 8.4 x86_64
- Red Hat Enterprise Linux Server - TUS 8.6 x86_64
- Red Hat Enterprise Linux Server - TUS 8.8 x86_64
- Red Hat Enterprise Linux Server for ARM 64 - 4 years of updates 9.0 aarch64
- Red Hat Enterprise Linux Server for ARM 64 - 4 years of updates 9.2 aarch64
- Red Hat Enterprise Linux Server for ARM 64 - 4 years of updates 9.4 aarch64
- Red Hat Enterprise Linux Server for IBM z Systems - 4 years of updates 9.0 s390x
- Red Hat Enterprise Linux Server for IBM z Systems - 4 years of updates 9.2 s390x
- Red Hat Enterprise Linux Server for IBM z Systems - 4 years of updates 9.4 s390x
- Red Hat Enterprise Linux Server for Power LE - Update Services for SAP Solutions 8.4 ppc64le
- Red Hat Enterprise Linux Server for Power LE - Update Services for SAP Solutions 8.6 ppc64le
- Red Hat Enterprise Linux Server for Power LE - Update Services for SAP Solutions 8.8 ppc64le
- Red Hat Enterprise Linux Server for Power LE - Update Services for SAP Solutions 9.0 ppc64le
- Red Hat Enterprise Linux Server for Power LE - Update Services for SAP Solutions 9.2 ppc64le
- Red Hat Enterprise Linux Server for Power LE - Update Services for SAP Solutions 9.4 ppc64le
- Red Hat Enterprise Linux for ARM 64 - Extended Update Support 8.8 aarch64
- Red Hat Enterprise Linux for ARM 64 - Extended Update Support 9.2 aarch64
- Red Hat Enterprise Linux for ARM 64 - Extended Update Support 9.4 aarch64
- Red Hat Enterprise Linux for ARM 64 - 4 years of updates 9.2 aarch64
- Red Hat Enterprise Linux for ARM 64 8 aarch64
- Red Hat Enterprise Linux for ARM 64 9 aarch64
- Red Hat Enterprise Linux for IBM z Systems - Extended Update Support 8.8 s390x
- Red Hat Enterprise Linux for IBM z Systems - Extended Update Support 9.2 s390x
- Red Hat Enterprise Linux for IBM z Systems - Extended Update Support 9.4 s390x
- Red Hat Enterprise Linux for IBM z Systems - 4 years of updates 9.2 s390x
- Red Hat Enterprise Linux for IBM z Systems 8 s390x
- Red Hat Enterprise Linux for IBM z Systems 9 s390x
- Red Hat Enterprise Linux for Power, little endian - Extended Update Support 8.8 ppc64le
- Red Hat Enterprise Linux for Power, little endian - Extended Update Support 9.2 ppc64le
- Red Hat Enterprise Linux for Power, little endian - Extended Update Support 9.4 ppc64le
- Red Hat Enterprise Linux for Power, little endian 8 ppc64le
- Red Hat Enterprise Linux for Power, little endian 9 ppc64le
- Red Hat Enterprise Linux for Real Time - Telecommunications Update Service 8.4 x86_64
- Red Hat Enterprise Linux for Real Time 8 x86_64
- Red Hat Enterprise Linux for Real Time 9 x86_64
- Red Hat Enterprise Linux for Real Time for NFV - Telecommunications Update Service 8.4 x86_64
- Red Hat Enterprise Linux for Real Time for NFV 8 x86_64
- Red Hat Enterprise Linux for Real Time for NFV 9 x86_64
- Red Hat Enterprise Linux for Real Time for NFV for x86_64 - 4 years of updates 9.0 x86_64
- Red Hat Enterprise Linux for Real Time for NFV for x86_64 - 4 years of updates 9.2 x86_64
- Red Hat Enterprise Linux for Real Time for NFV for x86_64 - 4 years of updates 9.4 x86_64
- Red Hat Enterprise Linux for Real Time for x86_64 - 4 years of updates 9.0 x86_64
- Red Hat Enterprise Linux for Real Time for x86_64 - 4 years of updates 9.2 x86_64
- Red Hat Enterprise Linux for Real Time for x86_64 - 4 years of updates 9.4 x86_64
- Red Hat Enterprise Linux for x86_64 - Extended Update Support 8.8 x86_64
- Red Hat Enterprise Linux for x86_64 - Extended Update Support 9.2 x86_64
- Red Hat Enterprise Linux for x86_64 - Extended Update Support 9.4 x86_64
- Red Hat Enterprise Linux for x86_64 - Update Services for SAP Solutions 8.4 x86_64
- Red Hat Enterprise Linux for x86_64 - Update Services for SAP Solutions 8.6 x86_64
- Red Hat Enterprise Linux for x86_64 - Update Services for SAP Solutions 8.8 x86_64
- Red Hat Enterprise Linux for x86_64 - Update Services for SAP Solutions 9.0 x86_64
- Red Hat Enterprise Linux for x86_64 - Update Services for SAP Solutions 9.2 x86_64
- Red Hat Enterprise Linux for x86_64 - Update Services for SAP Solutions 9.4 x86_64
- Red Hat Enterprise Linux for x86_64 8 x86_64
- Red Hat Enterprise Linux for x86_64 9 x86_64
- Red Hat Enterprise Linux for ARM 64 - 4 years of updates 9.4 aarch64
- Red Hat Enterprise Linux for IBM z Systems - 4 years of updates 9.4 s390x
解決方案
在安裝軟體之前,請先瀏覽供應商之網站,以獲得更多詳細資料。
安裝供應商提供的修補程式:
- https://access.redhat.com/errata/RHSA-2024:4902
- https://access.redhat.com/errata/RHSA-2024:4928
- https://access.redhat.com/errata/RHSA-2024:4970
- https://access.redhat.com/errata/RHSA-2024:5065
- https://access.redhat.com/errata/RHSA-2024:5066
- https://access.redhat.com/errata/RHSA-2024:5067
- https://access.redhat.com/errata/RHSA-2024:5101
- https://access.redhat.com/errata/RHSA-2024:5102
- https://access.redhat.com/errata/RHSA-2024:5255
- https://access.redhat.com/errata/RHSA-2024:5256
- https://access.redhat.com/errata/RHSA-2024:5257
- https://access.redhat.com/errata/RHSA-2024:5259
- https://access.redhat.com/errata/RHSA-2024:5261
- https://access.redhat.com/errata/RHSA-2024:5266
- https://access.redhat.com/errata/RHSA-2024:5281
- https://access.redhat.com/errata/RHSA-2024:5282
- https://access.redhat.com/errata/RHSA-2024:5363
- https://access.redhat.com/errata/RHSA-2024:5364
- https://access.redhat.com/errata/RHSA-2024:5365
- https://access.redhat.com/errata/RHSA-2024:5523
- https://access.redhat.com/errata/RHSA-2024:5522
- https://access.redhat.com/errata/RHSA-2024:5521
- https://access.redhat.com/errata/RHSA-2024:5520
- https://access.redhat.com/errata/RHSA-2024:5519
- https://access.redhat.com/errata/RHSA-2024:5672
- https://access.redhat.com/errata/RHSA-2024:5673
- https://access.redhat.com/errata/RHSA-2024:5692
- https://access.redhat.com/errata/RHSA-2024:5928
漏洞識別碼
- CVE-2021-46939
- CVE-2021-47018
- CVE-2021-47069
- CVE-2021-47257
- CVE-2021-47284
- CVE-2021-47304
- CVE-2021-47311
- CVE-2021-47356
- CVE-2021-47373
- CVE-2021-47383
- CVE-2021-47385
- CVE-2021-47393
- CVE-2021-47408
- CVE-2021-47459
- CVE-2021-47461
- CVE-2021-47468
- CVE-2021-47491
- CVE-2021-47548
- CVE-2021-47566
- CVE-2021-47579
- CVE-2021-47606
- CVE-2021-47624
- CVE-2022-1011
- CVE-2022-48627
- CVE-2022-48632
- CVE-2022-48637
- CVE-2022-48743
- CVE-2022-48747
- CVE-2022-48757
- CVE-2022-48793
- CVE-2022-48799
- CVE-2022-48827
- CVE-2022-48828
- CVE-2022-48829
- CVE-2023-4622
- CVE-2023-6546
- CVE-2023-20569
- CVE-2023-28746
- CVE-2023-52434
- CVE-2023-52439
- CVE-2023-52448
- CVE-2023-52451
- CVE-2023-52458
- CVE-2023-52463
- CVE-2023-52469
- CVE-2023-52471
- CVE-2023-52486
- CVE-2023-52530
- CVE-2023-52610
- CVE-2023-52619
- CVE-2023-52622
- CVE-2023-52623
- CVE-2023-52635
- CVE-2023-52639
- CVE-2023-52648
- CVE-2023-52651
- CVE-2023-52653
- CVE-2023-52658
- CVE-2023-52662
- CVE-2023-52667
- CVE-2023-52679
- CVE-2023-52707
- CVE-2023-52730
- CVE-2023-52735
- CVE-2023-52756
- CVE-2023-52762
- CVE-2023-52764
- CVE-2023-52771
- CVE-2023-52775
- CVE-2023-52777
- CVE-2023-52784
- CVE-2023-52791
- CVE-2023-52796
- CVE-2023-52803
- CVE-2023-52809
- CVE-2023-52811
- CVE-2023-52832
- CVE-2023-52834
- CVE-2023-52845
- CVE-2023-52847
- CVE-2023-52864
- CVE-2023-52880
- CVE-2023-52881
- CVE-2023-52885
- CVE-2024-2201
- CVE-2024-21823
- CVE-2024-25739
- CVE-2024-26581
- CVE-2024-26583
- CVE-2024-26584
- CVE-2024-26585
- CVE-2024-26586
- CVE-2024-26600
- CVE-2024-26601
- CVE-2024-26614
- CVE-2024-26640
- CVE-2024-26642
- CVE-2024-26660
- CVE-2024-26668
- CVE-2024-26669
- CVE-2024-26686
- CVE-2024-26698
- CVE-2024-26704
- CVE-2024-26733
- CVE-2024-26737
- CVE-2024-26740
- CVE-2024-26772
- CVE-2024-26773
- CVE-2024-26802
- CVE-2024-26808
- CVE-2024-26810
- CVE-2024-26826
- CVE-2024-26828
- CVE-2024-26837
- CVE-2024-26840
- CVE-2024-26843
- CVE-2024-26852
- CVE-2024-26853
- CVE-2024-26855
- CVE-2024-26868
- CVE-2024-26870
- CVE-2024-26878
- CVE-2024-26880
- CVE-2024-26897
- CVE-2024-26908
- CVE-2024-26921
- CVE-2024-26925
- CVE-2024-26930
- CVE-2024-26940
- CVE-2024-26947
- CVE-2024-26958
- CVE-2024-26960
- CVE-2024-26961
- CVE-2024-26982
- CVE-2024-26993
- CVE-2024-27010
- CVE-2024-27011
- CVE-2024-27016
- CVE-2024-27019
- CVE-2024-27020
- CVE-2024-27025
- CVE-2024-27030
- CVE-2024-27046
- CVE-2024-27049
- CVE-2024-27052
- CVE-2024-27062
- CVE-2024-27065
- CVE-2024-27388
- CVE-2024-27393
- CVE-2024-27395
- CVE-2024-27397
- CVE-2024-27403
- CVE-2024-27415
- CVE-2024-27417
- CVE-2024-27434
- CVE-2024-31076
- CVE-2024-33621
- CVE-2024-35789
- CVE-2024-35790
- CVE-2024-35800
- CVE-2024-35801
- CVE-2024-35807
- CVE-2024-35810
- CVE-2024-35814
- CVE-2024-35823
- CVE-2024-35824
- CVE-2024-35839
- CVE-2024-35845
- CVE-2024-35847
- CVE-2024-35848
- CVE-2024-35852
- CVE-2024-35857
- CVE-2024-35876
- CVE-2024-35885
- CVE-2024-35893
- CVE-2024-35896
- CVE-2024-35897
- CVE-2024-35898
- CVE-2024-35899
- CVE-2024-35900
- CVE-2024-35907
- CVE-2024-35910
- CVE-2024-35911
- CVE-2024-35912
- CVE-2024-35924
- CVE-2024-35925
- CVE-2024-35930
- CVE-2024-35937
- CVE-2024-35938
- CVE-2024-35946
- CVE-2024-35947
- CVE-2024-35952
- CVE-2024-35960
- CVE-2024-35962
- CVE-2024-35969
- CVE-2024-36000
- CVE-2024-36003
- CVE-2024-36005
- CVE-2024-36006
- CVE-2024-36010
- CVE-2024-36016
- CVE-2024-36017
- CVE-2024-36020
- CVE-2024-36025
- CVE-2024-36270
- CVE-2024-36286
- CVE-2024-36489
- CVE-2024-36883
- CVE-2024-36886
- CVE-2024-36889
- CVE-2024-36896
- CVE-2024-36903
- CVE-2024-36904
- CVE-2024-36905
- CVE-2024-36917
- CVE-2024-36921
- CVE-2024-36922
- CVE-2024-36924
- CVE-2024-36927
- CVE-2024-36929
- CVE-2024-36933
- CVE-2024-36940
- CVE-2024-36941
- CVE-2024-36945
- CVE-2024-36950
- CVE-2024-36952
- CVE-2024-36954
- CVE-2024-36960
- CVE-2024-36971
- CVE-2024-36978
- CVE-2024-36979
- CVE-2024-37353
- CVE-2024-37356
- CVE-2024-38384
- CVE-2024-38391
- CVE-2024-38538
- CVE-2024-38540
- CVE-2024-38544
- CVE-2024-38555
- CVE-2024-38556
- CVE-2024-38558
- CVE-2024-38570
- CVE-2024-38573
- CVE-2024-38575
- CVE-2024-38579
- CVE-2024-38580
- CVE-2024-38586
- CVE-2024-38596
- CVE-2024-38598
- CVE-2024-38608
- CVE-2024-38615
- CVE-2024-38627
- CVE-2024-38663
- CVE-2024-39276
- CVE-2024-39472
- CVE-2024-39476
- CVE-2024-39487
- CVE-2024-39502
- CVE-2024-40905
- CVE-2024-40911
- CVE-2024-40912
- CVE-2024-40914
- CVE-2024-40927
- CVE-2024-40928
- CVE-2024-40929
- CVE-2024-40939
- CVE-2024-40941
- CVE-2024-40954
- CVE-2024-40957
- CVE-2024-40958
- CVE-2024-40961
- CVE-2024-40974
- CVE-2024-40978
- CVE-2024-40983
- CVE-2024-40995
- CVE-2024-41041
- CVE-2024-41076
- CVE-2024-41090
- CVE-2024-41091
- CVE-2024-42107
- CVE-2024-42110
- CVE-2024-42152
資料來源
相關連結
- https://access.redhat.com/errata/RHSA-2024:4902
- https://access.redhat.com/errata/RHSA-2024:4928
- https://access.redhat.com/errata/RHSA-2024:4970
- https://access.redhat.com/errata/RHSA-2024:5065
- https://access.redhat.com/errata/RHSA-2024:5066
- https://access.redhat.com/errata/RHSA-2024:5067
- https://access.redhat.com/errata/RHSA-2024:5101
- https://access.redhat.com/errata/RHSA-2024:5102
- https://access.redhat.com/errata/RHSA-2024:5255
- https://access.redhat.com/errata/RHSA-2024:5256
- https://access.redhat.com/errata/RHSA-2024:5257
- https://access.redhat.com/errata/RHSA-2024:5259
- https://access.redhat.com/errata/RHSA-2024:5261
- https://access.redhat.com/errata/RHSA-2024:5266
- https://access.redhat.com/errata/RHSA-2024:5281
- https://access.redhat.com/errata/RHSA-2024:5282
- https://access.redhat.com/errata/RHSA-2024:5363
- https://access.redhat.com/errata/RHSA-2024:5364
- https://access.redhat.com/errata/RHSA-2024:5365
- https://access.redhat.com/errata/RHSA-2024:5523
- https://access.redhat.com/errata/RHSA-2024:5522
- https://access.redhat.com/errata/RHSA-2024:5521
- https://access.redhat.com/errata/RHSA-2024:5520
- https://access.redhat.com/errata/RHSA-2024:5519
- https://access.redhat.com/errata/RHSA-2024:5672
- https://access.redhat.com/errata/RHSA-2024:5673
- https://access.redhat.com/errata/RHSA-2024:5692
- https://access.redhat.com/errata/RHSA-2024:5928
分享至