RedHat Linux 核心多個漏洞
最後更新
2024年11月27日
發佈日期:
2024年11月06日
458
觀看次數
風險: 中度風險
類型: 操作系統 - LINUX
於 RedHat Linux核心發現多個漏洞。遠端攻擊者可利用這些漏洞,於目標系統觸發遠端執行任意程式碼、洩露敏感資料、阻斷服務狀況及權限提升。
[更新於 2024-11-15]
更新受影響之系統或技術、解決方案、漏洞識別碼及相關連結。
[更新於 2024-11-22]
更新受影響之系統或技術、解決方案、漏洞識別碼及相關連結。
[更新於 2024-11-27]
更新受影響之系統或技術、解決方案、漏洞識別碼及相關連結。
影響
- 阻斷服務
- 遠端執行程式碼
- 資料洩露
- 權限提升
受影響之系統或技術
- Red Hat CodeReady Linux Builder for ARM 64 8 aarch64
- Red Hat CodeReady Linux Builder for ARM 64 9 aarch64
- Red Hat CodeReady Linux Builder for ARM 64 - Extended Update Support 9.2 aarch64
- Red Hat CodeReady Linux Builder for ARM 64 - Extended Update Support 9.4 aarch64
- Red Hat CodeReady Linux Builder for IBM z Systems 8 s390x
- Red Hat CodeReady Linux Builder for IBM z Systems 9 s390x
- Red Hat CodeReady Linux Builder for IBM z Systems - Extended Update Support 9.2 s390x
- Red Hat CodeReady Linux Builder for IBM z Systems - Extended Update Support 9.4 s390x
- Red Hat CodeReady Linux Builder for Power, little endian 8 ppc64le
- Red Hat CodeReady Linux Builder for Power, little endian 9 ppc64le
- Red Hat CodeReady Linux Builder for Power, little endian - Extended Update Support 9.2 ppc64le
- Red Hat CodeReady Linux Builder for Power, little endian - Extended Update Support 9.4 ppc64le
- Red Hat CodeReady Linux Builder for x86_64 8 x86_64
- Red Hat CodeReady Linux Builder for x86_64 9 x86_64
- Red Hat CodeReady Linux Builder for x86_64 - Extended Update Support 9.2 x86_64
- Red Hat CodeReady Linux Builder for x86_64 - Extended Update Support 9.4 x86_64
- Red Hat Enterprise Linux for ARM 64 8 aarch64
- Red Hat Enterprise Linux for ARM 64 9 aarch64
- Red Hat Enterprise Linux for ARM 64 - 4 years of updates 9.0 aarch64
- Red Hat Enterprise Linux for ARM 64 - 4 years of updates 9.2 aarch64
- Red Hat Enterprise Linux for ARM 64 - 4 years of updates 9.4 aarch64
- Red Hat Enterprise Linux for ARM 64 - Extended Update Support 9.2 aarch64
- Red Hat Enterprise Linux for ARM 64 - Extended Update Support 9.4 aarch64
- Red Hat Enterprise Linux for IBM z Systems 8 s390x
- Red Hat Enterprise Linux for IBM z Systems 9 s390x
- Red Hat Enterprise Linux for IBM z Systems - 4 years of updates 9.0 s390x
- Red Hat Enterprise Linux for IBM z Systems - 4 years of updates 9.2 s390x
- Red Hat Enterprise Linux for IBM z Systems - 4 years of updates 9.4 s390x
- Red Hat Enterprise Linux for IBM z Systems - Extended Update Support 9.2 s390x
- Red Hat Enterprise Linux for IBM z Systems - Extended Update Support 9.4 s390x
- Red Hat Enterprise Linux for Power, little endian 8 ppc64le
- Red Hat Enterprise Linux for Power, little endian 9 ppc64le
- Red Hat Enterprise Linux for Power, little endian - Extended Update Support 9.2 ppc64le
- Red Hat Enterprise Linux for Power, little endian - Extended Update Support 9.4 ppc64le
- Red Hat Enterprise Linux for Real Time 8 x86_64
- Red Hat Enterprise Linux for Real Time 9 x86_64
- Red Hat Enterprise Linux for Real Time for NFV 8 x86_64
- Red Hat Enterprise Linux for Real Time for NFV 9 x86_64
- Red Hat Enterprise Linux for Real Time for NFV for x86_64 - 4 years of updates 9.0 x86_64
- Red Hat Enterprise Linux for Real Time for NFV for x86_64 - 4 years of updates 9.2 x86_64
- Red Hat Enterprise Linux for Real Time for NFV for x86_64 - 4 years of updates 9.4 x86_64
- Red Hat Enterprise Linux for Real Time for x86_64 - 4 years of updates 9.0 x86_64
- Red Hat Enterprise Linux for Real Time for x86_64 - 4 years of updates 9.2 x86_64
- Red Hat Enterprise Linux for Real Time for x86_64 - 4 years of updates 9.4 x86_64
- Red Hat Enterprise Linux for x86_64 8 x86_64
- Red Hat Enterprise Linux for x86_64 9 x86_64
- Red Hat Enterprise Linux for x86_64 - Extended Update Support 9.2 x86_64
- Red Hat Enterprise Linux for x86_64 - Extended Update Support 9.4 x86_64
- Red Hat Enterprise Linux for x86_64 - Update Services for SAP Solutions 8.6 x86_64
- Red Hat Enterprise Linux for x86_64 - Update Services for SAP Solutions 9.0 x86_64
- Red Hat Enterprise Linux for x86_64 - Update Services for SAP Solutions 9.2 x86_64
- Red Hat Enterprise Linux for x86_64 - Update Services for SAP Solutions 9.4 x86_64
- Red Hat Enterprise Linux Server - AUS 8.6 x86_64
- Red Hat Enterprise Linux Server - AUS 9.2 x86_64
- Red Hat Enterprise Linux Server - AUS 9.4 x86_64
- Red Hat Enterprise Linux Server - TUS 8.6 x86_64
- Red Hat Enterprise Linux Server for Power LE - Update Services for SAP Solutions 8.6 ppc64le
- Red Hat Enterprise Linux Server for Power LE - Update Services for SAP Solutions 9.0 ppc64le
- Red Hat Enterprise Linux Server for Power LE - Update Services for SAP Solutions 9.2 ppc64le
- Red Hat Enterprise Linux Server for Power LE - Update Services for SAP Solutions 9.4 ppc64le
- Red Hat Enterprise Linux Server for Power LE - Update Services for SAP Solutions
- Red Hat Enterprise Linux for Power, little endian - Extended Update Support
- Red Hat Enterprise Linux for x86_64 - Extended Update Support
- Red Hat Enterprise Linux for ARM 64 - Extended Update Support
- Red Hat Enterprise Linux for IBM z Systems - Extended Update Support
- Red Hat CodeReady Linux Builder for ARM 64 - Extended Update Support
- Red Hat Enterprise Linux Server - TUS
- Red Hat CodeReady Linux Builder for Power, little endian - Extended Update Support
- Red Hat Enterprise Linux for x86_64 - Update Services for SAP Solutions
- Red Hat CodeReady Linux Builder for x86_64 - Extended Update Support
- Red Hat Enterprise Linux Server - AUS
- Red Hat Enterprise Linux for Power, little endian
- Red Hat CodeReady Linux Builder for x86_64
- Red Hat Enterprise Linux for IBM z Systems
- Red Hat Enterprise Linux for x86_64
- Red Hat Enterprise Linux for Real Time
- Red Hat Enterprise Linux for ARM 64
- Red Hat CodeReady Linux Builder for Power, little endian
- Red Hat Enterprise Linux for Real Time for NFV
- Red Hat CodeReady Linux Builder for ARM 64
- Red Hat CodeReady Linux Builder for IBM z Systems
- Red Hat Enterprise Linux for Real Time - Telecommunications Update Service
- Red Hat Enterprise Linux for Real Time for NFV - Telecommunications Update Service
解決方案
在安裝軟體之前,請先瀏覽供應商之網站,以獲得更多詳細資料。
安裝供應商提供的修補程式:
- https://access.redhat.com/errata/RHSA-2024:8830
- https://access.redhat.com/errata/RHSA-2024:8831
- https://access.redhat.com/errata/RHSA-2024:8856
- https://access.redhat.com/errata/RHSA-2024:8870
- https://access.redhat.com/errata/RHSA-2024:9497
- https://access.redhat.com/errata/RHSA-2024:9498
- https://access.redhat.com/errata/RHSA-2024:9500
- https://access.redhat.com/errata/RHSA-2024:9546
- https://access.redhat.com/errata/RHSA-2024:9605
- https://access.redhat.com/errata/RHSA-2024:9942
- https://access.redhat.com/errata/RHSA-2024:9943
- https://access.redhat.com/errata/RHSA-2024:10282
- https://access.redhat.com/errata/RHSA-2024:10281
- https://access.redhat.com/errata/RHSA-2024:10275
- https://access.redhat.com/errata/RHSA-2024:10274
- https://access.redhat.com/errata/RHSA-2024:10273
- https://access.redhat.com/errata/RHSA-2024:10265
- https://access.redhat.com/errata/RHSA-2024:10262
漏洞識別碼
- CVE-2021-4204
- CVE-2021-47393
- CVE-2021-47461
- CVE-2022-0500
- CVE-2022-23222
- CVE-2022-48686
- CVE-2022-48695
- CVE-2022-48773
- CVE-2022-48786
- CVE-2022-48929
- CVE-2022-48936
- CVE-2023-0597
- CVE-2023-52489
- CVE-2023-52492
- CVE-2023-52522
- CVE-2023-52749
- CVE-2024-2313
- CVE-2024-2314
- CVE-2024-24857
- CVE-2024-26640
- CVE-2024-26656
- CVE-2024-26671
- CVE-2024-26772
- CVE-2024-26837
- CVE-2024-26851
- CVE-2024-26870
- CVE-2024-26906
- CVE-2024-26924
- CVE-2024-26961
- CVE-2024-26976
- CVE-2024-26984
- CVE-2024-27017
- CVE-2024-27043
- CVE-2024-27062
- CVE-2024-27399
- CVE-2024-31076
- CVE-2024-35823
- CVE-2024-35839
- CVE-2024-35898
- CVE-2024-35939
- CVE-2024-35950
- CVE-2024-36889
- CVE-2024-36920
- CVE-2024-38540
- CVE-2024-38541
- CVE-2024-38564
- CVE-2024-38586
- CVE-2024-38596
- CVE-2024-38608
- CVE-2024-39503
- CVE-2024-40901
- CVE-2024-40924
- CVE-2024-40931
- CVE-2024-40956
- CVE-2024-40961
- CVE-2024-40983
- CVE-2024-40984
- CVE-2024-40988
- CVE-2024-41009
- CVE-2024-41014
- CVE-2024-41023
- CVE-2024-41039
- CVE-2024-41042
- CVE-2024-41060
- CVE-2024-41066
- CVE-2024-41092
- CVE-2024-41093
- CVE-2024-42070
- CVE-2024-42079
- CVE-2024-42244
- CVE-2024-42284
- CVE-2024-42292
- CVE-2024-42301
- CVE-2024-43854
- CVE-2024-43880
- CVE-2024-43889
- CVE-2024-43892
- CVE-2024-44935
- CVE-2024-44989
- CVE-2024-44990
- CVE-2024-45018
- CVE-2024-46824
- CVE-2024-46826
- CVE-2024-46858
- CVE-2024-47668
- CVE-2024-48796
- CVE-2024-50226
資料來源
相關連結
- https://access.redhat.com/errata/RHSA-2024:8830
- https://access.redhat.com/errata/RHSA-2024:8831
- https://access.redhat.com/errata/RHSA-2024:8856
- https://access.redhat.com/errata/RHSA-2024:8870
- https://access.redhat.com/errata/RHSA-2024:9497
- https://access.redhat.com/errata/RHSA-2024:9498
- https://access.redhat.com/errata/RHSA-2024:9500
- https://access.redhat.com/errata/RHSA-2024:9546
- https://access.redhat.com/errata/RHSA-2024:9605
- https://access.redhat.com/errata/RHSA-2024:9942
- https://access.redhat.com/errata/RHSA-2024:9943
- https://access.redhat.com/errata/RHSA-2024:10282
- https://access.redhat.com/errata/RHSA-2024:10281
- https://access.redhat.com/errata/RHSA-2024:10275
- https://access.redhat.com/errata/RHSA-2024:10274
- https://access.redhat.com/errata/RHSA-2024:10273
- https://access.redhat.com/errata/RHSA-2024:10265
- https://access.redhat.com/errata/RHSA-2024:10262
分享至