RedHat Linux Kernel Multiple Vulnerabilities
RISK: Medium Risk
TYPE: Operating Systems - Linux
Multiple vulnerabilities were identified in RedHat Linux Kernel. A remote attacker could exploit some of these vulnerabilities to trigger remote code execution, sensitive information disclosure, denial of service condition and elevation of privilege on the targeted system.
[Updated on 2024-11-15]
Updated System / Technologies affected, Solutions, Vulnerability Identifier and Related Links.
[Updated on 2024-11-22]
Updated System / Technologies affected, Solutions, Vulnerability Identifier and Related Links.
[Updated on 2024-11-27]
Updated System / Technologies affected, Solutions, Vulnerability Identifier and Related Links.
Impact
- Denial of Service
- Remote Code Execution
- Information Disclosure
- Elevation of Privilege
System / Technologies affected
- Red Hat CodeReady Linux Builder for ARM 64 8 aarch64
- Red Hat CodeReady Linux Builder for ARM 64 9 aarch64
- Red Hat CodeReady Linux Builder for ARM 64 - Extended Update Support 9.2 aarch64
- Red Hat CodeReady Linux Builder for ARM 64 - Extended Update Support 9.4 aarch64
- Red Hat CodeReady Linux Builder for IBM z Systems 8 s390x
- Red Hat CodeReady Linux Builder for IBM z Systems 9 s390x
- Red Hat CodeReady Linux Builder for IBM z Systems - Extended Update Support 9.2 s390x
- Red Hat CodeReady Linux Builder for IBM z Systems - Extended Update Support 9.4 s390x
- Red Hat CodeReady Linux Builder for Power, little endian 8 ppc64le
- Red Hat CodeReady Linux Builder for Power, little endian 9 ppc64le
- Red Hat CodeReady Linux Builder for Power, little endian - Extended Update Support 9.2 ppc64le
- Red Hat CodeReady Linux Builder for Power, little endian - Extended Update Support 9.4 ppc64le
- Red Hat CodeReady Linux Builder for x86_64 8 x86_64
- Red Hat CodeReady Linux Builder for x86_64 9 x86_64
- Red Hat CodeReady Linux Builder for x86_64 - Extended Update Support 9.2 x86_64
- Red Hat CodeReady Linux Builder for x86_64 - Extended Update Support 9.4 x86_64
- Red Hat Enterprise Linux for ARM 64 8 aarch64
- Red Hat Enterprise Linux for ARM 64 9 aarch64
- Red Hat Enterprise Linux for ARM 64 - 4 years of updates 9.0 aarch64
- Red Hat Enterprise Linux for ARM 64 - 4 years of updates 9.2 aarch64
- Red Hat Enterprise Linux for ARM 64 - 4 years of updates 9.4 aarch64
- Red Hat Enterprise Linux for ARM 64 - Extended Update Support 9.2 aarch64
- Red Hat Enterprise Linux for ARM 64 - Extended Update Support 9.4 aarch64
- Red Hat Enterprise Linux for IBM z Systems 8 s390x
- Red Hat Enterprise Linux for IBM z Systems 9 s390x
- Red Hat Enterprise Linux for IBM z Systems - 4 years of updates 9.0 s390x
- Red Hat Enterprise Linux for IBM z Systems - 4 years of updates 9.2 s390x
- Red Hat Enterprise Linux for IBM z Systems - 4 years of updates 9.4 s390x
- Red Hat Enterprise Linux for IBM z Systems - Extended Update Support 9.2 s390x
- Red Hat Enterprise Linux for IBM z Systems - Extended Update Support 9.4 s390x
- Red Hat Enterprise Linux for Power, little endian 8 ppc64le
- Red Hat Enterprise Linux for Power, little endian 9 ppc64le
- Red Hat Enterprise Linux for Power, little endian - Extended Update Support 9.2 ppc64le
- Red Hat Enterprise Linux for Power, little endian - Extended Update Support 9.4 ppc64le
- Red Hat Enterprise Linux for Real Time 8 x86_64
- Red Hat Enterprise Linux for Real Time 9 x86_64
- Red Hat Enterprise Linux for Real Time for NFV 8 x86_64
- Red Hat Enterprise Linux for Real Time for NFV 9 x86_64
- Red Hat Enterprise Linux for Real Time for NFV for x86_64 - 4 years of updates 9.0 x86_64
- Red Hat Enterprise Linux for Real Time for NFV for x86_64 - 4 years of updates 9.2 x86_64
- Red Hat Enterprise Linux for Real Time for NFV for x86_64 - 4 years of updates 9.4 x86_64
- Red Hat Enterprise Linux for Real Time for x86_64 - 4 years of updates 9.0 x86_64
- Red Hat Enterprise Linux for Real Time for x86_64 - 4 years of updates 9.2 x86_64
- Red Hat Enterprise Linux for Real Time for x86_64 - 4 years of updates 9.4 x86_64
- Red Hat Enterprise Linux for x86_64 8 x86_64
- Red Hat Enterprise Linux for x86_64 9 x86_64
- Red Hat Enterprise Linux for x86_64 - Extended Update Support 9.2 x86_64
- Red Hat Enterprise Linux for x86_64 - Extended Update Support 9.4 x86_64
- Red Hat Enterprise Linux for x86_64 - Update Services for SAP Solutions 8.6 x86_64
- Red Hat Enterprise Linux for x86_64 - Update Services for SAP Solutions 9.0 x86_64
- Red Hat Enterprise Linux for x86_64 - Update Services for SAP Solutions 9.2 x86_64
- Red Hat Enterprise Linux for x86_64 - Update Services for SAP Solutions 9.4 x86_64
- Red Hat Enterprise Linux Server - AUS 8.6 x86_64
- Red Hat Enterprise Linux Server - AUS 9.2 x86_64
- Red Hat Enterprise Linux Server - AUS 9.4 x86_64
- Red Hat Enterprise Linux Server - TUS 8.6 x86_64
- Red Hat Enterprise Linux Server for Power LE - Update Services for SAP Solutions 8.6 ppc64le
- Red Hat Enterprise Linux Server for Power LE - Update Services for SAP Solutions 9.0 ppc64le
- Red Hat Enterprise Linux Server for Power LE - Update Services for SAP Solutions 9.2 ppc64le
- Red Hat Enterprise Linux Server for Power LE - Update Services for SAP Solutions 9.4 ppc64le
- Red Hat Enterprise Linux Server for Power LE - Update Services for SAP Solutions
- Red Hat Enterprise Linux for Power, little endian - Extended Update Support
- Red Hat Enterprise Linux for x86_64 - Extended Update Support
- Red Hat Enterprise Linux for ARM 64 - Extended Update Support
- Red Hat Enterprise Linux for IBM z Systems - Extended Update Support
- Red Hat CodeReady Linux Builder for ARM 64 - Extended Update Support
- Red Hat Enterprise Linux Server - TUS
- Red Hat CodeReady Linux Builder for Power, little endian - Extended Update Support
- Red Hat Enterprise Linux for x86_64 - Update Services for SAP Solutions
- Red Hat CodeReady Linux Builder for x86_64 - Extended Update Support
- Red Hat Enterprise Linux Server - AUS
- Red Hat Enterprise Linux for Power, little endian
- Red Hat CodeReady Linux Builder for x86_64
- Red Hat Enterprise Linux for IBM z Systems
- Red Hat Enterprise Linux for x86_64
- Red Hat Enterprise Linux for Real Time
- Red Hat Enterprise Linux for ARM 64
- Red Hat CodeReady Linux Builder for Power, little endian
- Red Hat Enterprise Linux for Real Time for NFV
- Red Hat CodeReady Linux Builder for ARM 64
- Red Hat CodeReady Linux Builder for IBM z Systems
- Red Hat Enterprise Linux for Real Time - Telecommunications Update Service
- Red Hat Enterprise Linux for Real Time for NFV - Telecommunications Update Service
Solutions
Before installation of the software, please visit the vendor web-site for more details.
Apply fixes issued by the vendor:
- https://access.redhat.com/errata/RHSA-2024:8830
- https://access.redhat.com/errata/RHSA-2024:8831
- https://access.redhat.com/errata/RHSA-2024:8856
- https://access.redhat.com/errata/RHSA-2024:8870
- https://access.redhat.com/errata/RHSA-2024:9497
- https://access.redhat.com/errata/RHSA-2024:9498
- https://access.redhat.com/errata/RHSA-2024:9500
- https://access.redhat.com/errata/RHSA-2024:9546
- https://access.redhat.com/errata/RHSA-2024:9605
- https://access.redhat.com/errata/RHSA-2024:9942
- https://access.redhat.com/errata/RHSA-2024:9943
- https://access.redhat.com/errata/RHSA-2024:10282
- https://access.redhat.com/errata/RHSA-2024:10281
- https://access.redhat.com/errata/RHSA-2024:10275
- https://access.redhat.com/errata/RHSA-2024:10274
- https://access.redhat.com/errata/RHSA-2024:10273
- https://access.redhat.com/errata/RHSA-2024:10265
- https://access.redhat.com/errata/RHSA-2024:10262
Vulnerability Identifier
- CVE-2021-4204
- CVE-2021-47393
- CVE-2021-47461
- CVE-2022-0500
- CVE-2022-23222
- CVE-2022-48686
- CVE-2022-48695
- CVE-2022-48773
- CVE-2022-48786
- CVE-2022-48929
- CVE-2022-48936
- CVE-2023-0597
- CVE-2023-52489
- CVE-2023-52492
- CVE-2023-52522
- CVE-2023-52749
- CVE-2024-2313
- CVE-2024-2314
- CVE-2024-24857
- CVE-2024-26640
- CVE-2024-26656
- CVE-2024-26671
- CVE-2024-26772
- CVE-2024-26837
- CVE-2024-26851
- CVE-2024-26870
- CVE-2024-26906
- CVE-2024-26924
- CVE-2024-26961
- CVE-2024-26976
- CVE-2024-26984
- CVE-2024-27017
- CVE-2024-27043
- CVE-2024-27062
- CVE-2024-27399
- CVE-2024-31076
- CVE-2024-35823
- CVE-2024-35839
- CVE-2024-35898
- CVE-2024-35939
- CVE-2024-35950
- CVE-2024-36889
- CVE-2024-36920
- CVE-2024-38540
- CVE-2024-38541
- CVE-2024-38564
- CVE-2024-38586
- CVE-2024-38596
- CVE-2024-38608
- CVE-2024-39503
- CVE-2024-40901
- CVE-2024-40924
- CVE-2024-40931
- CVE-2024-40956
- CVE-2024-40961
- CVE-2024-40983
- CVE-2024-40984
- CVE-2024-40988
- CVE-2024-41009
- CVE-2024-41014
- CVE-2024-41023
- CVE-2024-41039
- CVE-2024-41042
- CVE-2024-41060
- CVE-2024-41066
- CVE-2024-41092
- CVE-2024-41093
- CVE-2024-42070
- CVE-2024-42079
- CVE-2024-42244
- CVE-2024-42284
- CVE-2024-42292
- CVE-2024-42301
- CVE-2024-43854
- CVE-2024-43880
- CVE-2024-43889
- CVE-2024-43892
- CVE-2024-44935
- CVE-2024-44989
- CVE-2024-44990
- CVE-2024-45018
- CVE-2024-46824
- CVE-2024-46826
- CVE-2024-46858
- CVE-2024-47668
- CVE-2024-48796
- CVE-2024-50226
Source
Related Link
- https://access.redhat.com/errata/RHSA-2024:8830
- https://access.redhat.com/errata/RHSA-2024:8831
- https://access.redhat.com/errata/RHSA-2024:8856
- https://access.redhat.com/errata/RHSA-2024:8870
- https://access.redhat.com/errata/RHSA-2024:9497
- https://access.redhat.com/errata/RHSA-2024:9498
- https://access.redhat.com/errata/RHSA-2024:9500
- https://access.redhat.com/errata/RHSA-2024:9546
- https://access.redhat.com/errata/RHSA-2024:9605
- https://access.redhat.com/errata/RHSA-2024:9942
- https://access.redhat.com/errata/RHSA-2024:9943
- https://access.redhat.com/errata/RHSA-2024:10282
- https://access.redhat.com/errata/RHSA-2024:10281
- https://access.redhat.com/errata/RHSA-2024:10275
- https://access.redhat.com/errata/RHSA-2024:10274
- https://access.redhat.com/errata/RHSA-2024:10273
- https://access.redhat.com/errata/RHSA-2024:10265
- https://access.redhat.com/errata/RHSA-2024:10262
Related Tags
Share with