RedHat Linux 核心多個漏洞
最後更新
2024年10月31日
發佈日期:
2024年10月03日
3408
觀看次數
風險: 中度風險
類型: 操作系統 - LINUX
於 RedHat Linux核心發現多個漏洞。遠端攻擊者可利用這些漏洞,於目標系統觸發遠端執行任意程式碼、洩露敏感資料、阻斷服務狀況、資料篡改、權限提升及繞過保安限制。
[更新於 2024-10-17]
更新描述、受影響之系統或技術、解決方案、漏洞識別碼及相關連結。
[更新於 2024-10-31]
更新描述、影響、受影響之系統或技術、解決方案、漏洞識別碼及相關連結。
影響
- 阻斷服務
- 遠端執行程式碼
- 繞過保安限制
- 篡改
- 資料洩露
- 權限提升
受影響之系統或技術
- Red Hat CodeReady Linux Builder for ARM 64 - Extended Update Support 9.2 aarch64
- Red Hat CodeReady Linux Builder for IBM z Systems - Extended Update Support 9.2 s390x
- Red Hat CodeReady Linux Builder for Power, little endian - Extended Update Support 9.2 ppc64le
- Red Hat CodeReady Linux Builder for x86_64 - Extended Update Support 9.2 x86_64
- Red Hat Enterprise Linux for ARM 64 - 4 years of updates 9.2 aarch64
- Red Hat Enterprise Linux for ARM 64 - 4 years of updates 9.4 aarch64
- Red Hat Enterprise Linux for ARM 64 - Extended Update Support 8.8 aarch64
- Red Hat Enterprise Linux for ARM 64 - Extended Update Support 9.2 aarch64
- Red Hat Enterprise Linux for ARM 64 - Extended Update Support 9.4 aarch64
- Red Hat Enterprise Linux for ARM 64 8 aarch64
- Red Hat Enterprise Linux for ARM 64 9 aarch64
- Red Hat Enterprise Linux for IBM z Systems - 4 years of updates 9.2 s390x
- Red Hat Enterprise Linux for IBM z Systems - 4 years of updates 9.4 s390x
- Red Hat Enterprise Linux for IBM z Systems - Extended Update Support 8.8 s390x
- Red Hat Enterprise Linux for IBM z Systems - Extended Update Support 9.2 s390x
- Red Hat Enterprise Linux for IBM z Systems - Extended Update Support 9.4 s390x
- Red Hat Enterprise Linux for IBM z Systems 8 s390x
- Red Hat Enterprise Linux for IBM z Systems 9 s390x
- Red Hat Enterprise Linux for Power, little endian - Extended Update Support 8.8 ppc64le
- Red Hat Enterprise Linux for Power, little endian - Extended Update Support 9.2 ppc64le
- Red Hat Enterprise Linux for Power, little endian - Extended Update Support 9.4 ppc64le
- Red Hat Enterprise Linux for Power, little endian 8 ppc64le
- Red Hat Enterprise Linux for Power, little endian 9 ppc64le
- Red Hat Enterprise Linux for Real Time for NFV for x86_64 - 4 years of updates 9.2 x86_64
- Red Hat Enterprise Linux for Real Time for NFV for x86_64 - 4 years of updates 9.4 x86_64
- Red Hat Enterprise Linux for Real Time for NFV 9 x86_64
- Red Hat Enterprise Linux for Real Time for x86_64 - 4 years of updates 9.2 x86_64
- Red Hat Enterprise Linux for Real Time for x86_64 - 4 years of updates 9.4 x86_64
- Red Hat Enterprise Linux for Real Time 9 x86_64
- Red Hat Enterprise Linux for x86_64 - Extended Update Support 8.8 x86_64
- Red Hat Enterprise Linux for x86_64 - Extended Update Support 9.2 x86_64
- Red Hat Enterprise Linux for x86_64 - Extended Update Support 9.4 x86_64
- Red Hat Enterprise Linux for x86_64 - Update Services for SAP Solutions 8.4 x86_64
- Red Hat Enterprise Linux for x86_64 - Update Services for SAP Solutions 8.6 x86_64
- Red Hat Enterprise Linux for x86_64 - Update Services for SAP Solutions 8.8 x86_64
- Red Hat Enterprise Linux for x86_64 - Update Services for SAP Solutions 9.0 x86_64
- Red Hat Enterprise Linux for x86_64 - Update Services for SAP Solutions 9.2 x86_64
- Red Hat Enterprise Linux for x86_64 - Update Services for SAP Solutions 9.4 x86_64
- Red Hat Enterprise Linux for x86_64 8 x86_64
- Red Hat Enterprise Linux for x86_64 9 x86_64
- Red Hat Enterprise Linux Server - AUS 8.6 x86_64
- Red Hat Enterprise Linux Server - AUS 9.2 x86_64
- Red Hat Enterprise Linux Server - AUS 9.4 x86_64
- Red Hat Enterprise Linux Server - TUS 8.6 x86_64
- Red Hat Enterprise Linux Server - TUS 8.8 x86_64
- Red Hat Enterprise Linux Server for Power LE - Update Services for SAP Solutions 8.4 ppc64le
- Red Hat Enterprise Linux Server for Power LE - Update Services for SAP Solutions 8.6 ppc64le
- Red Hat Enterprise Linux Server for Power LE - Update Services for SAP Solutions 8.8 ppc64le
- Red Hat Enterprise Linux Server for Power LE - Update Services for SAP Solutions 9.2 ppc64le
- Red Hat Enterprise Linux Server for Power LE - Update Services for SAP Solutions 9.4 ppc64le
- Red Hat CodeReady Linux Builder for x86_64 9 x86_64
- Red Hat CodeReady Linux Builder for Power, little endian 9 ppc64le
- Red Hat CodeReady Linux Builder for ARM 64 9 aarch64
- Red Hat CodeReady Linux Builder for IBM z Systems 9 s390x
- Red Hat CodeReady Linux Builder for x86_64 - Extended Update Support 9.4 x86_64
- Red Hat CodeReady Linux Builder for Power, little endian - Extended Update Support 9.4 ppc64le
- Red Hat CodeReady Linux Builder for IBM z Systems - Extended Update Support 9.4 s390x
- Red Hat CodeReady Linux Builder for ARM 64 - Extended Update Support 9.4 aarch64
解決方案
在安裝軟體之前,請先瀏覽供應商之網站,以獲得更多詳細資料。
安裝供應商提供的修補程式:
- https://access.redhat.com/errata/RHSA-2024:7490
- https://access.redhat.com/errata/RHSA-2024:7489
- https://access.redhat.com/errata/RHSA-2024:7486
- https://access.redhat.com/errata/RHSA-2024:7484
- https://access.redhat.com/errata/RHSA-2024:7483
- https://access.redhat.com/errata/RHSA-2024:7482
- https://access.redhat.com/errata/RHSA-2024:7481
- https://access.redhat.com/errata/RHSA-2024:7418
- https://access.redhat.com/errata/RHSA-2024:7427
- https://access.redhat.com/errata/RHSA-2024:7428
- https://access.redhat.com/errata/RHSA-2024:7429
- https://access.redhat.com/errata/RHSA-2024:7430
- https://access.redhat.com/errata/RHSA-2024:7431
- https://access.redhat.com/errata/RHSA-2024:7432
- https://access.redhat.com/errata/RHSA-2024:7433
- https://access.redhat.com/errata/RHSA-2024:8107
- https://access.redhat.com/errata/RHSA-2024:8157
- https://access.redhat.com/errata/RHSA-2024:8158
- https://access.redhat.com/errata/RHSA-2024:8161
- https://access.redhat.com/errata/RHSA-2024:8162
- https://access.redhat.com/errata/RHSA-2024:8617
- https://access.redhat.com/errata/RHSA-2024:8616
- https://access.redhat.com/errata/RHSA-2024:8614
- https://access.redhat.com/errata/RHSA-2024:8613
漏洞識別碼
- CVE-2021-47321
- CVE-2021-47383
- CVE-2021-47384
- CVE-2021-47385
- CVE-2021-47560
- CVE-2022-48773
- CVE-2023-1252
- CVE-2023-20584
- CVE-2023-28746
- CVE-2023-31356
- CVE-2023-52489
- CVE-2023-52658
- CVE-2024-2201
- CVE-2024-26598
- CVE-2024-26640
- CVE-2024-26671
- CVE-2024-26686
- CVE-2024-26826
- CVE-2024-26830
- CVE-2024-26923
- CVE-2024-26935
- CVE-2024-26961
- CVE-2024-27403
- CVE-2024-27415
- CVE-2024-35884
- CVE-2024-35989
- CVE-2024-36025
- CVE-2024-36244
- CVE-2024-36270
- CVE-2024-36886
- CVE-2024-36889
- CVE-2024-36952
- CVE-2024-36978
- CVE-2024-36979
- CVE-2024-38556
- CVE-2024-38558
- CVE-2024-39472
- CVE-2024-39476
- CVE-2024-39483
- CVE-2024-39502
- CVE-2024-39504
- CVE-2024-40904
- CVE-2024-40931
- CVE-2024-40959
- CVE-2024-40960
- CVE-2024-40972
- CVE-2024-40977
- CVE-2024-40995
- CVE-2024-40998
- CVE-2024-41005
- CVE-2024-41013
- CVE-2024-41014
- CVE-2024-41040
- CVE-2024-41049
- CVE-2024-41055
- CVE-2024-41056
- CVE-2024-41064
- CVE-2024-41066
- CVE-2024-41071
- CVE-2024-41090
- CVE-2024-41091
- CVE-2024-42079
- CVE-2024-42090
- CVE-2024-42152
- CVE-2024-42272
- CVE-2024-42284
- CVE-2024-43854
- CVE-2024-45018
資料來源
相關連結
- https://access.redhat.com/errata/RHSA-2024:7490
- https://access.redhat.com/errata/RHSA-2024:7489
- https://access.redhat.com/errata/RHSA-2024:7486
- https://access.redhat.com/errata/RHSA-2024:7484
- https://access.redhat.com/errata/RHSA-2024:7483
- https://access.redhat.com/errata/RHSA-2024:7482
- https://access.redhat.com/errata/RHSA-2024:7481
- https://access.redhat.com/errata/RHSA-2024:7418
- https://access.redhat.com/errata/RHSA-2024:7427
- https://access.redhat.com/errata/RHSA-2024:7428
- https://access.redhat.com/errata/RHSA-2024:7429
- https://access.redhat.com/errata/RHSA-2024:7430
- https://access.redhat.com/errata/RHSA-2024:7431
- https://access.redhat.com/errata/RHSA-2024:7432
- https://access.redhat.com/errata/RHSA-2024:7433
- https://access.redhat.com/errata/RHSA-2024:8107
- https://access.redhat.com/errata/RHSA-2024:8157
- https://access.redhat.com/errata/RHSA-2024:8158
- https://access.redhat.com/errata/RHSA-2024:8161
- https://access.redhat.com/errata/RHSA-2024:8162
- https://access.redhat.com/errata/RHSA-2024:8617
- https://access.redhat.com/errata/RHSA-2024:8616
- https://access.redhat.com/errata/RHSA-2024:8614
- https://access.redhat.com/errata/RHSA-2024:8613
分享至