RedHat Linux 核心多個漏洞
最後更新
2024年09月30日
發佈日期:
2024年09月04日
375
觀看次數
風險: 中度風險
類型: 操作系統 - LINUX
於 RedHat Linux核心發現多個漏洞。遠端攻擊者可利用這些漏洞,於目標系統觸發阻斷服務狀況、遠端執行任意程式碼、洩露敏感資料、繞過保安限制、權限提升及仿冒。
[更新於 2024-09-12]
更新受影響之系統或技術、解決方案、漏洞識別碼及相關連結。
[更新於 2024-09-19]
更新受影響之系統或技術、解決方案、漏洞識別碼及相關連結。
[更新於 2024-09-25]
更新描述、影響、受影響之系統或技術、解決方案、漏洞識別碼及相關連結。
[更新於 2024-09-26]
更新解決方案、漏洞識別碼及相關連結。
[更新於 2024-09-30]
更新受影響之系統或技術、解決方案及相關連結。
影響
- 阻斷服務
- 遠端執行程式碼
- 仿冒
- 資料洩露
- 繞過保安限制
- 權限提升
受影響之系統或技術
- Red Hat CodeReady Linux Builder for ARM 64 - Extended Update Support 8.8 aarch64
- Red Hat CodeReady Linux Builder for ARM 64 - Extended Update Support 9.2 aarch64
- Red Hat CodeReady Linux Builder for IBM z Systems - Extended Update Support 9.2 s390x
- Red Hat CodeReady Linux Builder for Power, little endian - Extended Update Support 8.8 ppc64le
- Red Hat CodeReady Linux Builder for Power, little endian - Extended Update Support 9.2 ppc64le
- Red Hat CodeReady Linux Builder for x86_64 - Extended Update Support 8.8 x86_64
- Red Hat CodeReady Linux Builder for x86_64 - Extended Update Support 9.2 x86_64
- Red Hat Enterprise Linux Server - AUS 8.4 x86_64
- Red Hat Enterprise Linux Server - AUS 8.6 x86_64
- Red Hat Enterprise Linux Server - AUS 9.2 x86_64
- Red Hat Enterprise Linux Server - Extended Life Cycle Support (for IBM z Systems) 7 s390x
- Red Hat Enterprise Linux Server - Extended Life Cycle Support 7 x86_64
- Red Hat Enterprise Linux Server - Extended Life Cycle Support Extension (for IBM z Systems) 6 s390x
- Red Hat Enterprise Linux Server - Extended Life Cycle Support Extension 6 i386
- Red Hat Enterprise Linux Server - Extended Life Cycle Support Extension 6 x86_64
- Red Hat Enterprise Linux Server - Extended Life Cycle Support for IBM Power, big endian 7 ppc64
- Red Hat Enterprise Linux Server - Extended Life Cycle Support for IBM Power, little endian 7 ppc64le
- Red Hat Enterprise Linux Server - TUS 8.4 x86_64
- Red Hat Enterprise Linux Server - TUS 8.6 x86_64
- Red Hat Enterprise Linux Server - TUS 8.8 x86_64
- Red Hat Enterprise Linux Server for Power LE - Update Services for SAP Solutions 8.4 ppc64le
- Red Hat Enterprise Linux Server for Power LE - Update Services for SAP Solutions 8.6 ppc64le
- Red Hat Enterprise Linux Server for Power LE - Update Services for SAP Solutions 8.8 ppc64le
- Red Hat Enterprise Linux Server for Power LE - Update Services for SAP Solutions 9.2 ppc64le
- Red Hat Enterprise Linux for ARM 64 - 4 years of updates 9.2 aarch64
- Red Hat Enterprise Linux for ARM 64 - Extended Update Support 8.8 aarch64
- Red Hat Enterprise Linux for ARM 64 - Extended Update Support 9.2 aarch64
- Red Hat Enterprise Linux for IBM z Systems - 4 years of updates 9.2 s390x
- Red Hat Enterprise Linux for IBM z Systems - Extended Update Support 8.8 s390x
- Red Hat Enterprise Linux for IBM z Systems - Extended Update Support 9.2 s390x
- Red Hat Enterprise Linux for Power, little endian - Extended Update Support 8.8 ppc64le
- Red Hat Enterprise Linux for Power, little endian - Extended Update Support 9.2 ppc64le
- Red Hat Enterprise Linux for Real Time - Telecommunications Update Service 8.4 x86_64
- Red Hat Enterprise Linux for Real Time 8 x86_64
- Red Hat Enterprise Linux for Real Time for NFV - Telecommunications Update Service 8.4 x86_64
- Red Hat Enterprise Linux for Real Time for NFV 8 x86_64
- Red Hat Enterprise Linux for Real Time for NFV for x86_64 - 4 years of updates 9.2 x86_64
- Red Hat Enterprise Linux for Real Time for x86_64 - 4 years of updates 9.2 x86_64
- Red Hat Enterprise Linux for Real Time for x86_64 - Extended Life Cycle Support 7 x86_64
- Red Hat Enterprise Linux for x86_64 - Extended Update Support 8.8 x86_64
- Red Hat Enterprise Linux for x86_64 - Extended Update Support 9.2 x86_64
- Red Hat Enterprise Linux for x86_64 - Update Services for SAP Solutions 8.4 x86_64
- Red Hat Enterprise Linux for x86_64 - Update Services for SAP Solutions 8.6 x86_64
- Red Hat Enterprise Linux for x86_64 - Update Services for SAP Solutions 8.8 x86_64
- Red Hat Enterprise Linux for x86_64 - Update Services for SAP Solutions 9.2 x86_64
解決方案
在安裝軟體之前,請先瀏覽供應商之網站,以獲得更多詳細資料。
安裝供應商提供的修補程式:
- https://access.redhat.com/errata/RHSA-2024:6156
- https://access.redhat.com/errata/RHSA-2024:6267
- https://access.redhat.com/errata/RHSA-2024:6268
- https://access.redhat.com/errata/RHSA-2024:6567
- https://access.redhat.com/errata/RHSA-2024:6745
- https://access.redhat.com/errata/RHSA-2024:6744
- https://access.redhat.com/errata/RHSA-2024:6753
- https://access.redhat.com/errata/RHSA-2024:7003
- https://access.redhat.com/errata/RHSA-2024:7002
- https://access.redhat.com/errata/RHSA-2024:7001
- https://access.redhat.com/errata/RHSA-2024:6995
- https://access.redhat.com/errata/RHSA-2024:6994
- https://access.redhat.com/errata/RHSA-2024:6993
- https://access.redhat.com/errata/RHSA-2024:7004
- https://access.redhat.com/errata/RHSA-2024:7005
- https://access.redhat.com/errata/RHSA-2024:7227
漏洞識別碼
- CVE-2021-46984
- CVE-2021-47097
- CVE-2021-47101
- CVE-2021-47287
- CVE-2021-47289
- CVE-2021-47321
- CVE-2021-47338
- CVE-2021-47352
- CVE-2021-47356
- CVE-2021-47383
- CVE-2021-47384
- CVE-2021-47385
- CVE-2021-47386
- CVE-2021-47393
- CVE-2021-47412
- CVE-2021-47432
- CVE-2021-47441
- CVE-2021-47455
- CVE-2021-47466
- CVE-2021-47468
- CVE-2021-47492
- CVE-2021-47497
- CVE-2021-47527
- CVE-2021-47560
- CVE-2021-47566
- CVE-2021-47582
- CVE-2021-47609
- CVE-2022-48638
- CVE-2022-48687
- CVE-2022-48754
- CVE-2022-48760
- CVE-2022-48799
- CVE-2022-48804
- CVE-2022-48836
- CVE-2022-48866
- CVE-2023-6040
- CVE-2023-52434
- CVE-2023-52439
- CVE-2023-52463
- CVE-2023-52476
- CVE-2023-52478
- CVE-2023-52522
- CVE-2023-52605
- CVE-2023-52683
- CVE-2023-52784
- CVE-2023-52801
- CVE-2023-52811
- CVE-2023-52817
- CVE-2023-52840
- CVE-2023-52864
- CVE-2023-52880
- CVE-2024-2201
- CVE-2024-26595
- CVE-2024-26629
- CVE-2024-26630
- CVE-2024-26645
- CVE-2024-26665
- CVE-2024-26698
- CVE-2024-26704
- CVE-2024-26717
- CVE-2024-26720
- CVE-2024-26769
- CVE-2024-26772
- CVE-2024-26773
- CVE-2024-26826
- CVE-2024-26851
- CVE-2024-26855
- CVE-2024-26880
- CVE-2024-26886
- CVE-2024-26894
- CVE-2024-26908
- CVE-2024-26923
- CVE-2024-26939
- CVE-2024-26946
- CVE-2024-26974
- CVE-2024-26993
- CVE-2024-27013
- CVE-2024-27019
- CVE-2024-27020
- CVE-2024-27042
- CVE-2024-27399
- CVE-2024-35791
- CVE-2024-35797
- CVE-2024-35809
- CVE-2024-35839
- CVE-2024-35875
- CVE-2024-35877
- CVE-2024-35884
- CVE-2024-35895
- CVE-2024-35898
- CVE-2024-35944
- CVE-2024-35969
- CVE-2024-35989
- CVE-2024-36000
- CVE-2024-36005
- CVE-2024-36016
- CVE-2024-36019
- CVE-2024-36270
- CVE-2024-36883
- CVE-2024-36886
- CVE-2024-36899
- CVE-2024-36901
- CVE-2024-36902
- CVE-2024-36920
- CVE-2024-36929
- CVE-2024-36939
- CVE-2024-36953
- CVE-2024-36978
- CVE-2024-36979
- CVE-2024-37356
- CVE-2024-38540
- CVE-2024-38558
- CVE-2024-38559
- CVE-2024-38570
- CVE-2024-38573
- CVE-2024-38581
- CVE-2024-38598
- CVE-2024-38615
- CVE-2024-38619
- CVE-2024-39471
- CVE-2024-39499
- CVE-2024-39501
- CVE-2024-39502
- CVE-2024-39506
- CVE-2024-40901
- CVE-2024-40904
- CVE-2024-40911
- CVE-2024-40912
- CVE-2024-40914
- CVE-2024-40927
- CVE-2024-40929
- CVE-2024-40931
- CVE-2024-40936
- CVE-2024-40941
- CVE-2024-40954
- CVE-2024-40956
- CVE-2024-40958
- CVE-2024-40959
- CVE-2024-40960
- CVE-2024-40972
- CVE-2024-40977
- CVE-2024-40978
- CVE-2024-40983
- CVE-2024-40984
- CVE-2024-40988
- CVE-2024-40989
- CVE-2024-40995
- CVE-2024-40997
- CVE-2024-40998
- CVE-2024-41005
- CVE-2024-41007
- CVE-2024-41008
- CVE-2024-41009
- CVE-2024-41012
- CVE-2024-41013
- CVE-2024-41014
- CVE-2024-41023
- CVE-2024-41031
- CVE-2024-41035
- CVE-2024-41038
- CVE-2024-41039
- CVE-2024-41040
- CVE-2024-41041
- CVE-2024-41044
- CVE-2024-41055
- CVE-2024-41056
- CVE-2024-41060
- CVE-2024-41071
- CVE-2024-41073
- CVE-2024-41076
- CVE-2024-41090
- CVE-2024-41091
- CVE-2024-41093
- CVE-2024-41096
- CVE-2024-41097
- CVE-2024-42082
- CVE-2024-42084
- CVE-2024-42090
- CVE-2024-42096
- CVE-2024-42102
- CVE-2024-42114
- CVE-2024-42124
- CVE-2024-42131
- CVE-2024-42139
- CVE-2024-42152
- CVE-2024-42154
- CVE-2024-42226
- CVE-2024-42228
- CVE-2024-42237
- CVE-2024-42238
- CVE-2024-42240
- CVE-2024-42241
- CVE-2024-42243
- CVE-2024-42246
- CVE-2024-42322
- CVE-2024-43871
資料來源
相關連結
- https://access.redhat.com/errata/RHSA-2024:6156
- https://access.redhat.com/errata/RHSA-2024:6267
- https://access.redhat.com/errata/RHSA-2024:6268
- https://access.redhat.com/errata/RHSA-2024:6567
- https://access.redhat.com/errata/RHSA-2024:6745
- https://access.redhat.com/errata/RHSA-2024:6744
- https://access.redhat.com/errata/RHSA-2024:6753
- https://access.redhat.com/errata/RHSA-2024:7003
- https://access.redhat.com/errata/RHSA-2024:7002
- https://access.redhat.com/errata/RHSA-2024:7001
- https://access.redhat.com/errata/RHSA-2024:6995
- https://access.redhat.com/errata/RHSA-2024:6994
- https://access.redhat.com/errata/RHSA-2024:6993
- https://access.redhat.com/errata/RHSA-2024:7004
- https://access.redhat.com/errata/RHSA-2024:7005
- https://access.redhat.com/errata/RHSA-2024:7227
分享至