RedHat Linux Kernel Multiple Vulnerabilities
Multiple vulnerabilities were identified in RedHat Linux Kernel. A remote attacker could exploit some of these vulnerabilities to trigger denial of service condition, elevation of privilege, remote code execution, sensitive information disclosure and security restriction bypasson the targeted system.
Note:
Exploit in the wild has been detected for CVE-2024-36971. The vulnerability potentially allows an attacker with System execution privileges to perform remote code execution in kernel. The risk level is rated to High Risk.
[Updated on 2024-08-15]
Updated System / Technologies affected, Solutions, Vulnerability Identifier and Related Links.
[Updated on 2024-08-20]
Updated Risk Level, Solutions, Vulnerability Identifier and Related Links.
RISK: High Risk
TYPE: Operating Systems – Linux
Impact
- Remote Code Execution
- Denial of Service
- Elevation of Privilege
- Information Disclosure
- Security Restriction Bypass
System / Technologies affected
- Red Hat CodeReady Linux Builder for ARM 64 – Extended Update Support 8.8 aarch64
- Red Hat CodeReady Linux Builder for ARM 64 – Extended Update Support 9.2 aarch64
- Red Hat CodeReady Linux Builder for ARM 64 – Extended Update Support 9.4 aarch64
- Red Hat CodeReady Linux Builder for ARM 64 8 aarch64
- Red Hat CodeReady Linux Builder for ARM 64 9 aarch64
- Red Hat CodeReady Linux Builder for IBM z Systems – Extended Update Support 9.2 s390x
- Red Hat CodeReady Linux Builder for IBM z Systems – Extended Update Support 9.4 s390x
- Red Hat CodeReady Linux Builder for IBM z Systems 9 s390x
- Red Hat CodeReady Linux Builder for Power, little endian – Extended Update Support 8.8 ppc64le
- Red Hat CodeReady Linux Builder for Power, little endian – Extended Update Support 9.2 ppc64le
- Red Hat CodeReady Linux Builder for Power, little endian – Extended Update Support 9.4 ppc64le
- Red Hat CodeReady Linux Builder for Power, little endian 8 ppc64le
- Red Hat CodeReady Linux Builder for Power, little endian 9 ppc64le
- Red Hat CodeReady Linux Builder for x86_64 – Extended Update Support 8.8 x86_64
- Red Hat CodeReady Linux Builder for x86_64 – Extended Update Support 9.2 x86_64
- Red Hat CodeReady Linux Builder for x86_64 – Extended Update Support 9.4 x86_64
- Red Hat CodeReady Linux Builder for x86_64 8 x86_64
- Red Hat CodeReady Linux Builder for x86_64 9 x86_64
- Red Hat Enterprise Linux Server – AUS 7.7 x86_64
- Red Hat Enterprise Linux Server – AUS 8.4 x86_64
- Red Hat Enterprise Linux Server – AUS 8.6 x86_64
- Red Hat Enterprise Linux Server – AUS 9.2 x86_64
- Red Hat Enterprise Linux Server – AUS 9.4 x86_64
- Red Hat Enterprise Linux Server – Extended Life Cycle Support (for IBM z Systems) 7 s390x
- Red Hat Enterprise Linux Server – Extended Life Cycle Support 7 x86_64
- Red Hat Enterprise Linux Server – Extended Life Cycle Support for IBM Power, big endian 7 ppc64
- Red Hat Enterprise Linux Server – Extended Life Cycle Support for IBM Power, little endian 7 ppc64le
- Red Hat Enterprise Linux Server – TUS 8.4 x86_64
- Red Hat Enterprise Linux Server – TUS 8.6 x86_64
- Red Hat Enterprise Linux Server – TUS 8.8 x86_64
- Red Hat Enterprise Linux Server for ARM 64 – 4 years of updates 9.0 aarch64
- Red Hat Enterprise Linux Server for ARM 64 – 4 years of updates 9.2 aarch64
- Red Hat Enterprise Linux Server for ARM 64 – 4 years of updates 9.4 aarch64
- Red Hat Enterprise Linux Server for IBM z Systems – 4 years of updates 9.0 s390x
- Red Hat Enterprise Linux Server for IBM z Systems – 4 years of updates 9.2 s390x
- Red Hat Enterprise Linux Server for IBM z Systems – 4 years of updates 9.4 s390x
- Red Hat Enterprise Linux Server for Power LE – Update Services for SAP Solutions 8.4 ppc64le
- Red Hat Enterprise Linux Server for Power LE – Update Services for SAP Solutions 8.6 ppc64le
- Red Hat Enterprise Linux Server for Power LE – Update Services for SAP Solutions 8.8 ppc64le
- Red Hat Enterprise Linux Server for Power LE – Update Services for SAP Solutions 9.0 ppc64le
- Red Hat Enterprise Linux Server for Power LE – Update Services for SAP Solutions 9.2 ppc64le
- Red Hat Enterprise Linux Server for Power LE – Update Services for SAP Solutions 9.4 ppc64le
- Red Hat Enterprise Linux for ARM 64 – Extended Update Support 8.8 aarch64
- Red Hat Enterprise Linux for ARM 64 – Extended Update Support 9.2 aarch64
- Red Hat Enterprise Linux for ARM 64 – Extended Update Support 9.4 aarch64
- Red Hat Enterprise Linux for ARM 64 8 aarch64
- Red Hat Enterprise Linux for ARM 64 9 aarch64
- Red Hat Enterprise Linux for IBM z Systems – Extended Update Support 8.8 s390x
- Red Hat Enterprise Linux for IBM z Systems – Extended Update Support 9.2 s390x
- Red Hat Enterprise Linux for IBM z Systems – Extended Update Support 9.4 s390x
- Red Hat Enterprise Linux for IBM z Systems 8 s390x
- Red Hat Enterprise Linux for IBM z Systems 9 s390x
- Red Hat Enterprise Linux for Power, little endian – Extended Update Support 8.8 ppc64le
- Red Hat Enterprise Linux for Power, little endian – Extended Update Support 9.2 ppc64le
- Red Hat Enterprise Linux for Power, little endian – Extended Update Support 9.4 ppc64le
- Red Hat Enterprise Linux for Power, little endian 8 ppc64le
- Red Hat Enterprise Linux for Power, little endian 9 ppc64le
- Red Hat Enterprise Linux for Real Time – Telecommunications Update Service 8.4 x86_64
- Red Hat Enterprise Linux for Real Time 8 x86_64
- Red Hat Enterprise Linux for Real Time 9 x86_64
- Red Hat Enterprise Linux for Real Time for NFV – Telecommunications Update Service 8.4 x86_64
- Red Hat Enterprise Linux for Real Time for NFV 8 x86_64
- Red Hat Enterprise Linux for Real Time for NFV 9 x86_64
- Red Hat Enterprise Linux for Real Time for NFV for x86_64 – 4 years of updates 9.0 x86_64
- Red Hat Enterprise Linux for Real Time for NFV for x86_64 – 4 years of updates 9.2 x86_64
- Red Hat Enterprise Linux for Real Time for NFV for x86_64 – 4 years of updates 9.4 x86_64
- Red Hat Enterprise Linux for Real Time for x86_64 – 4 years of updates 9.0 x86_64
- Red Hat Enterprise Linux for Real Time for x86_64 – 4 years of updates 9.2 x86_64
- Red Hat Enterprise Linux for Real Time for x86_64 – 4 years of updates 9.4 x86_64
- Red Hat Enterprise Linux for x86_64 – Extended Update Support 8.8 x86_64
- Red Hat Enterprise Linux for x86_64 – Extended Update Support 9.2 x86_64
- Red Hat Enterprise Linux for x86_64 – Extended Update Support 9.4 x86_64
- Red Hat Enterprise Linux for x86_64 – Update Services for SAP Solutions 8.4 x86_64
- Red Hat Enterprise Linux for x86_64 – Update Services for SAP Solutions 8.6 x86_64
- Red Hat Enterprise Linux for x86_64 – Update Services for SAP Solutions 8.8 x86_64
- Red Hat Enterprise Linux for x86_64 – Update Services for SAP Solutions 9.0 x86_64
- Red Hat Enterprise Linux for x86_64 – Update Services for SAP Solutions 9.2 x86_64
- Red Hat Enterprise Linux for x86_64 – Update Services for SAP Solutions 9.4 x86_64
- Red Hat Enterprise Linux for x86_64 8 x86_64
- Red Hat Enterprise Linux for x86_64 9 x86_64
Solutions
Before installation of the software, please visit the vendor web-site for more details.
Apply fixes issued by the vendor:
- https://access.redhat.com/errata/RHSA-2024:4902
- https://access.redhat.com/errata/RHSA-2024:4928
- https://access.redhat.com/errata/RHSA-2024:4970
- https://access.redhat.com/errata/RHSA-2024:5065
- https://access.redhat.com/errata/RHSA-2024:5066
- https://access.redhat.com/errata/RHSA-2024:5067
- https://access.redhat.com/errata/RHSA-2024:5101
- https://access.redhat.com/errata/RHSA-2024:5102
- https://access.redhat.com/errata/RHSA-2024:5255
- https://access.redhat.com/errata/RHSA-2024:5256
- https://access.redhat.com/errata/RHSA-2024:5257
- https://access.redhat.com/errata/RHSA-2024:5259
- https://access.redhat.com/errata/RHSA-2024:5261
- https://access.redhat.com/errata/RHSA-2024:5266
- https://access.redhat.com/errata/RHSA-2024:5281
- https://access.redhat.com/errata/RHSA-2024:5282
- https://access.redhat.com/errata/RHSA-2024:5363
- https://access.redhat.com/errata/RHSA-2024:5364
- https://access.redhat.com/errata/RHSA-2024:5365
- https://access.redhat.com/errata/RHSA-2024:5523
- https://access.redhat.com/errata/RHSA-2024:5522
- https://access.redhat.com/errata/RHSA-2024:5521
- https://access.redhat.com/errata/RHSA-2024:5520
- https://access.redhat.com/errata/RHSA-2024:5519
Vulnerability Identifier
- CVE-2021-46939
- CVE-2021-47018
- CVE-2021-47257
- CVE-2021-47284
- CVE-2021-47304
- CVE-2021-47311
- CVE-2021-47373
- CVE-2021-47383
- CVE-2021-47385
- CVE-2021-47393
- CVE-2021-47408
- CVE-2021-47459
- CVE-2021-47461
- CVE-2021-47468
- CVE-2021-47491
- CVE-2021-47548
- CVE-2021-47566
- CVE-2021-47579
- CVE-2021-47606
- CVE-2021-47624
- CVE-2022-1011
- CVE-2022-48627
- CVE-2022-48632
- CVE-2022-48637
- CVE-2022-48743
- CVE-2022-48747
- CVE-2022-48757
- CVE-2022-48827
- CVE-2022-48828
- CVE-2022-48829
- CVE-2023-4622
- CVE-2023-6546
- CVE-2023-20569
- CVE-2023-28746
- CVE-2023-52439
- CVE-2023-52448
- CVE-2023-52451
- CVE-2023-52458
- CVE-2023-52463
- CVE-2023-52469
- CVE-2023-52471
- CVE-2023-52486
- CVE-2023-52530
- CVE-2023-52610
- CVE-2023-52619
- CVE-2023-52622
- CVE-2023-52623
- CVE-2023-52635
- CVE-2023-52639
- CVE-2023-52648
- CVE-2023-52651
- CVE-2023-52653
- CVE-2023-52658
- CVE-2023-52662
- CVE-2023-52667
- CVE-2023-52679
- CVE-2023-52707
- CVE-2023-52730
- CVE-2023-52756
- CVE-2023-52762
- CVE-2023-52764
- CVE-2023-52771
- CVE-2023-52775
- CVE-2023-52777
- CVE-2023-52784
- CVE-2023-52791
- CVE-2023-52796
- CVE-2023-52803
- CVE-2023-52809
- CVE-2023-52811
- CVE-2023-52832
- CVE-2023-52834
- CVE-2023-52845
- CVE-2023-52847
- CVE-2023-52864
- CVE-2023-52881
- CVE-2023-52885
- CVE-2024-2201
- CVE-2024-21823
- CVE-2024-25739
- CVE-2024-26583
- CVE-2024-26584
- CVE-2024-26585
- CVE-2024-26586
- CVE-2024-26600
- CVE-2024-26601
- CVE-2024-26614
- CVE-2024-26640
- CVE-2024-26642
- CVE-2024-26660
- CVE-2024-26669
- CVE-2024-26686
- CVE-2024-26698
- CVE-2024-26704
- CVE-2024-26733
- CVE-2024-26737
- CVE-2024-26740
- CVE-2024-26772
- CVE-2024-26773
- CVE-2024-26802
- CVE-2024-26808
- CVE-2024-26810
- CVE-2024-26826
- CVE-2024-26828
- CVE-2024-26837
- CVE-2024-26840
- CVE-2024-26843
- CVE-2024-26852
- CVE-2024-26853
- CVE-2024-26855
- CVE-2024-26868
- CVE-2024-26870
- CVE-2024-26878
- CVE-2024-26880
- CVE-2024-26897
- CVE-2024-26908
- CVE-2024-26921
- CVE-2024-26925
- CVE-2024-26930
- CVE-2024-26940
- CVE-2024-26947
- CVE-2024-26958
- CVE-2024-26960
- CVE-2024-26961
- CVE-2024-26982
- CVE-2024-26993
- CVE-2024-27010
- CVE-2024-27011
- CVE-2024-27019
- CVE-2024-27020
- CVE-2024-27025
- CVE-2024-27030
- CVE-2024-27046
- CVE-2024-27049
- CVE-2024-27052
- CVE-2024-27062
- CVE-2024-27065
- CVE-2024-27388
- CVE-2024-27393
- CVE-2024-27395
- CVE-2024-27397
- CVE-2024-27403
- CVE-2024-27417
- CVE-2024-27434
- CVE-2024-31076
- CVE-2024-33621
- CVE-2024-35789
- CVE-2024-35790
- CVE-2024-35800
- CVE-2024-35801
- CVE-2024-35807
- CVE-2024-35810
- CVE-2024-35814
- CVE-2024-35823
- CVE-2024-35824
- CVE-2024-35845
- CVE-2024-35847
- CVE-2024-35848
- CVE-2024-35852
- CVE-2024-35857
- CVE-2024-35876
- CVE-2024-35885
- CVE-2024-35893
- CVE-2024-35896
- CVE-2024-35897
- CVE-2024-35898
- CVE-2024-35899
- CVE-2024-35900
- CVE-2024-35907
- CVE-2024-35910
- CVE-2024-35911
- CVE-2024-35912
- CVE-2024-35924
- CVE-2024-35925
- CVE-2024-35930
- CVE-2024-35937
- CVE-2024-35938
- CVE-2024-35946
- CVE-2024-35947
- CVE-2024-35952
- CVE-2024-35960
- CVE-2024-35962
- CVE-2024-35969
- CVE-2024-36000
- CVE-2024-36005
- CVE-2024-36006
- CVE-2024-36010
- CVE-2024-36016
- CVE-2024-36017
- CVE-2024-36020
- CVE-2024-36025
- CVE-2024-36270
- CVE-2024-36286
- CVE-2024-36489
- CVE-2024-36886
- CVE-2024-36889
- CVE-2024-36896
- CVE-2024-36903
- CVE-2024-36904
- CVE-2024-36905
- CVE-2024-36917
- CVE-2024-36921
- CVE-2024-36922
- CVE-2024-36924
- CVE-2024-36927
- CVE-2024-36929
- CVE-2024-36933
- CVE-2024-36940
- CVE-2024-36941
- CVE-2024-36945
- CVE-2024-36950
- CVE-2024-36952
- CVE-2024-36954
- CVE-2024-36960
- CVE-2024-36971
- CVE-2024-36978
- CVE-2024-36979
- CVE-2024-37353
- CVE-2024-37356
- CVE-2024-38384
- CVE-2024-38391
- CVE-2024-38538
- CVE-2024-38555
- CVE-2024-38556
- CVE-2024-38558
- CVE-2024-38573
- CVE-2024-38575
- CVE-2024-38580
- CVE-2024-38586
- CVE-2024-38596
- CVE-2024-38598
- CVE-2024-38615
- CVE-2024-38627
- CVE-2024-38663
- CVE-2024-39276
- CVE-2024-39472
- CVE-2024-39476
- CVE-2024-39487
- CVE-2024-39502
- CVE-2024-40927
- CVE-2024-40928
- CVE-2024-40954
- CVE-2024-40958
- CVE-2024-40961
- CVE-2024-40974
- CVE-2024-40978
- CVE-2024-41090
- CVE-2024-41091
Source
Related Link
- https://access.redhat.com/errata/RHSA-2024:4902
- https://access.redhat.com/errata/RHSA-2024:4928
- https://access.redhat.com/errata/RHSA-2024:4970
- https://access.redhat.com/errata/RHSA-2024:5065
- https://access.redhat.com/errata/RHSA-2024:5066
- https://access.redhat.com/errata/RHSA-2024:5067
- https://access.redhat.com/errata/RHSA-2024:5101
- https://access.redhat.com/errata/RHSA-2024:5102
- https://access.redhat.com/errata/RHSA-2024:5255
- https://access.redhat.com/errata/RHSA-2024:5256
- https://access.redhat.com/errata/RHSA-2024:5257
- https://access.redhat.com/errata/RHSA-2024:5259
- https://access.redhat.com/errata/RHSA-2024:5261
- https://access.redhat.com/errata/RHSA-2024:5266
- https://access.redhat.com/errata/RHSA-2024:5281
- https://access.redhat.com/errata/RHSA-2024:5282
- https://access.redhat.com/errata/RHSA-2024:5363
- https://access.redhat.com/errata/RHSA-2024:5364
- https://access.redhat.com/errata/RHSA-2024:5365
- https://access.redhat.com/errata/RHSA-2024:5523
- https://access.redhat.com/errata/RHSA-2024:5522
- https://access.redhat.com/errata/RHSA-2024:5521
- https://access.redhat.com/errata/RHSA-2024:5520
- https://access.redhat.com/errata/RHSA-2024:5519
A considerable amount of time and effort goes into maintaining this website, creating backend automation and creating new features and content for you to make actionable intelligence decisions. Everyone that supports the site helps enable new functionality.
If you like the site, please support us on “Patreon” or “Buy Me A Coffee” using the buttons below
To keep up to date follow us on the below channels.