BULLETIN D'ALERTES
Object | Multiples vulnérabilités dans le noyau Linux de Red Hat |
---|---|
Réference | 1257 |
Date de Publication | 2024-09-27 |
Sévérité | Critique |
IMPACT :
- Atteinte à l'intégrité des données
- Atteinte à la confidentialité des données
- Contournement de la politique de sécurité
- Déni de service
- Exécution de code arbitraire à distance
- Élévation de privilèges
SYSTÉME AFFECTÉ :
- Red Hat CodeReady Linux Builder for ARM 64 - Extended Update Support 9.2 aarch64
- Red Hat CodeReady Linux Builder for ARM 64 - Extended Update Support 9.4 aarch64
- Red Hat CodeReady Linux Builder for ARM 64 9 aarch64
- Red Hat CodeReady Linux Builder for IBM z Systems - Extended Update Support 9.2 s390x
- Red Hat CodeReady Linux Builder for IBM z Systems - Extended Update Support 9.4 s390x
- Red Hat CodeReady Linux Builder for IBM z Systems 9 s390x
- Red Hat CodeReady Linux Builder for Power, little endian - Extended Update Support 9.2 ppc64le
- Red Hat CodeReady Linux Builder for Power, little endian - Extended Update Support 9.4 ppc64le
- Red Hat CodeReady Linux Builder for Power, little endian 9 ppc64le
- Red Hat CodeReady Linux Builder for x86_64 - Extended Update Support 9.2 x86_64
- Red Hat CodeReady Linux Builder for x86_64 - Extended Update Support 9.4 x86_64
- Red Hat CodeReady Linux Builder for x86_64 9 x86_64
- Red Hat Enterprise Linux for ARM 64 - 4 years of updates 9.2 aarch64
- Red Hat Enterprise Linux for ARM 64 - 4 years of updates 9.4 aarch64
- Red Hat Enterprise Linux for ARM 64 - Extended Update Support 9.2 aarch64
- Red Hat Enterprise Linux for ARM 64 - Extended Update Support 9.4 aarch64
- Red Hat Enterprise Linux for ARM 64 9 aarch64
- Red Hat Enterprise Linux for IBM z Systems - 4 years of updates 9.4 s390x
- Red Hat Enterprise Linux for IBM z Systems - Extended Update Support 9.2 s390x
- Red Hat Enterprise Linux for IBM z Systems - Extended Update Support 9.4 s390x
- Red Hat Enterprise Linux for IBM z Systems 9 s390x
- Red Hat Enterprise Linux for Power, little endian - Extended Update Support 9.2 ppc64le
- Red Hat Enterprise Linux for Power, little endian - Extended Update Support 9.4 ppc64le
- Red Hat Enterprise Linux for Power, little endian 9 ppc64le
- Red Hat Enterprise Linux for Real Time - Telecommunications Update Service 8.4 x86_64
- Red Hat Enterprise Linux for Real Time 8 x86_64
- Red Hat Enterprise Linux for Real Time 9 x86_64
- Red Hat Enterprise Linux for Real Time for NFV - Telecommunications Update Service 8.4 x86_64
- Red Hat Enterprise Linux for Real Time for NFV 8 x86_64
- Red Hat Enterprise Linux for Real Time for NFV 9 x86_64
- Red Hat Enterprise Linux for Real Time for NFV for x86_64 - 4 years of updates 9.2 x86_64
- Red Hat Enterprise Linux for Real Time for NFV for x86_64 - 4 years of updates 9.4 x86_64
- Red Hat Enterprise Linux for Real Time for x86_64 - 4 years of updates 9.2 x86_64
- Red Hat Enterprise Linux for Real Time for x86_64 - 4 years of updates 9.4 x86_64
- Red Hat Enterprise Linux for Real Time for x86_64 - Extended Life Cycle Support 7 x86_64
- Red Hat Enterprise Linux for x86_64 - Extended Update Support 9.2 x86_64
- Red Hat Enterprise Linux for x86_64 - Extended Update Support 9.4 x86_64
- Red Hat Enterprise Linux for x86_64 - Update Services for SAP Solutions 8.4 x86_64
- Red Hat Enterprise Linux for x86_64 - Update Services for SAP Solutions 8.6 x86_64
- Red Hat Enterprise Linux for x86_64 - Update Services for SAP Solutions 9.2 x86_64
- Red Hat Enterprise Linux for x86_64 - Update Services for SAP Solutions 9.4 x86_64
- Red Hat Enterprise Linux for x86_64 9 x86_64
- Red Hat Enterprise Linux Server - AUS 7.7 x86_64
- Red Hat Enterprise Linux Server - AUS 8.4 x86_64
- Red Hat Enterprise Linux Server - AUS 8.6 x86_64
- Red Hat Enterprise Linux Server - AUS 9.2 x86_64
- Red Hat Enterprise Linux Server - AUS 9.4 x86_64
- Red Hat Enterprise Linux Server - Extended Life Cycle Support (for IBM z Systems) 7 s390x
- Red Hat Enterprise Linux Server - Extended Life Cycle Support 7 x86_64
- Red Hat Enterprise Linux Server - Extended Life Cycle Support Extension (for IBM z Systems) 6 s390x
- Red Hat Enterprise Linux Server - Extended Life Cycle Support Extension 6 i386
- Red Hat Enterprise Linux Server - Extended Life Cycle Support Extension 6 x86_64
- Red Hat Enterprise Linux Server - Extended Life Cycle Support for IBM Power, big endian 7 ppc64
- Red Hat Enterprise Linux Server - Extended Life Cycle Support for IBM Power, little endian 7 ppc64le
- Red Hat Enterprise Linux Server - TUS 8.4 x86_64
- Red Hat Enterprise Linux Server - TUS 8.4 x86_64
- Red Hat Enterprise Linux Server - TUS 8.6 x86_64
- Red Hat Enterprise Linux Server for Power LE - Update Services for SAP Solutions 8.4 ppc64le
- Red Hat Enterprise Linux Server for Power LE - Update Services for SAP Solutions 8.6 ppc64le
- Red Hat Enterprise Linux Server for Power LE - Update Services for SAP Solutions 9.2 ppc64le
- Red Hat Enterprise Linux Server for Power LE - Update Services for SAP Solutions 9.4 ppc64le
DÉSCRIPTION :
Plusieurs vulnérabilités ont été découvertes dans le noyau Linux de Red Hat. Certaines de ces failles permettent à un attaquant d'exécuter du code arbitraire à distance, d'obtenir une élévation de privilèges et de compromettre la confidentialité des données.
SOLUTION :
Mettre à jour le noyau Linux de Red Hat.(se référer à la documentation)
DOCUMENTATION :
- Bulletin de sécurité Red Hat RHSA-2024:6744 du 18 septembre 2024
https://access.redhat.com/errata/RHSA-2024:6744
- Bulletin de sécurité Red Hat RHSA-2024:6745 du 18 septembre 2024
https://access.redhat.com/errata/RHSA-2024:6745
- Bulletin de sécurité Red Hat RHSA-2024:6753 du 18 septembre 2024
https://access.redhat.com/errata/RHSA-2024:6753
- Bulletin de sécurité Red Hat RHSA-2024:6994 du 24 septembre 2024
https://access.redhat.com/errata/RHSA-2024:6994
- Bulletin de sécurité Red Hat RHSA-2024:6995 du 24 septembre 2024
https://access.redhat.com/errata/RHSA-2024:6995
- Bulletin de sécurité Red Hat RHSA-2024:6997 du 24 septembre 2024
https://access.redhat.com/errata/RHSA-2024:6997
- Bulletin de sécurité Red Hat RHSA-2024:6998 du 24 septembre 2024
https://access.redhat.com/errata/RHSA-2024:6998
- Bulletin de sécurité Red Hat RHSA-2024:6999 du 24 septembre 2024
https://access.redhat.com/errata/RHSA-2024:6999
- Bulletin de sécurité Red Hat RHSA-2024:7001 du 24 septembre 2024
https://access.redhat.com/errata/RHSA-2024:7001
- Bulletin de sécurité Red Hat RHSA-2024:7002 du 24 septembre 2024
https://access.redhat.com/errata/RHSA-2024:7002
- Bulletin de sécurité Red Hat RHSA-2024:7003 du 24 septembre 2024
https://access.redhat.com/errata/RHSA-2024:7003
- Bulletin de sécurité Red Hat RHSA-2024:7004 du 24 septembre 2024
https://access.redhat.com/errata/RHSA-2024:7004
- Bulletin de sécurité Red Hat RHSA-2024:7005 du 24 septembre 2024
https://access.redhat.com/errata/RHSA-2024:7005
- Bulletin de sécurité Red Hat RHSA-2024:7227 du 26 septembre 2024
https://access.redhat.com/errata/RHSA-2024:7227
- CVE-2021-46984
https://www.cve.org/CVERecord?id=CVE-2021-46984
- CVE-2021-47097
https://www.cve.org/CVERecord?id=CVE-2021-47097
- CVE-2021-47101
https://www.cve.org/CVERecord?id=CVE-2021-47101
- CVE-2021-47287
https://www.cve.org/CVERecord?id=CVE-2021-47287
- CVE-2021-47289
https://www.cve.org/CVERecord?id=CVE-2021-47289
- CVE-2021-47321
https://www.cve.org/CVERecord?id=CVE-2021-47321
- CVE-2021-47338
https://www.cve.org/CVERecord?id=CVE-2021-47338
- CVE-2021-47352
https://www.cve.org/CVERecord?id=CVE-2021-47352
- CVE-2021-47383
https://www.cve.org/CVERecord?id=CVE-2021-47383
- CVE-2021-47384
https://www.cve.org/CVERecord?id=CVE-2021-47384
- CVE-2021-47385
https://www.cve.org/CVERecord?id=CVE-2021-47385
- CVE-2021-47386
https://www.cve.org/CVERecord?id=CVE-2021-47386
- CVE-2021-47393
https://www.cve.org/CVERecord?id=CVE-2021-47393
- CVE-2021-47412
https://www.cve.org/CVERecord?id=CVE-2021-47412
- CVE-2021-47432
https://www.cve.org/CVERecord?id=CVE-2021-47432
- CVE-2021-47441
https://www.cve.org/CVERecord?id=CVE-2021-47441
- CVE-2021-47455
https://www.cve.org/CVERecord?id=CVE-2021-47455
- CVE-2021-47466
https://www.cve.org/CVERecord?id=CVE-2021-47466
- CVE-2021-47492
https://www.cve.org/CVERecord?id=CVE-2021-47492
- CVE-2021-47497
https://www.cve.org/CVERecord?id=CVE-2021-47497
- CVE-2021-47527
https://www.cve.org/CVERecord?id=CVE-2021-47527
- CVE-2021-47560
https://www.cve.org/CVERecord?id=CVE-2021-47560
- CVE-2021-47582
https://www.cve.org/CVERecord?id=CVE-2021-47582
- CVE-2021-47609
https://www.cve.org/CVERecord?id=CVE-2021-47609
- CVE-2022-48619
https://www.cve.org/CVERecord?id=CVE-2022-48619
- CVE-2022-48638
https://www.cve.org/CVERecord?id=CVE-2022-48638
- CVE-2022-48686
https://www.cve.org/CVERecord?id=CVE-2022-48686
- CVE-2022-48687
https://www.cve.org/CVERecord?id=CVE-2022-48687
- CVE-2022-48754
https://www.cve.org/CVERecord?id=CVE-2022-48754
- CVE-2022-48760
https://www.cve.org/CVERecord?id=CVE-2022-48760
- CVE-2022-48804
https://www.cve.org/CVERecord?id=CVE-2022-48804
- CVE-2022-48836
https://www.cve.org/CVERecord?id=CVE-2022-48836
- CVE-2022-48866
https://www.cve.org/CVERecord?id=CVE-2022-48866
- CVE-2023-52439
https://www.cve.org/CVERecord?id=CVE-2023-52439
- CVE-2023-52470
https://www.cve.org/CVERecord?id=CVE-2023-52470
- CVE-2023-52476
https://www.cve.org/CVERecord?id=CVE-2023-52476
- CVE-2023-52478
https://www.cve.org/CVERecord?id=CVE-2023-52478
- CVE-2023-52522
https://www.cve.org/CVERecord?id=CVE-2023-52522
- CVE-2023-52605
https://www.cve.org/CVERecord?id=CVE-2023-52605
- CVE-2023-52683
https://www.cve.org/CVERecord?id=CVE-2023-52683
- CVE-2023-52817
https://www.cve.org/CVERecord?id=CVE-2023-52817
- CVE-2023-52840
https://www.cve.org/CVERecord?id=CVE-2023-52840
- CVE-2023-52880
https://www.cve.org/CVERecord?id=CVE-2023-52880
- CVE-2023-52884
https://www.cve.org/CVERecord?id=CVE-2023-52884
- CVE-2023-6040
https://www.cve.org/CVERecord?id=CVE-2023-6040
- CVE-2024-2201
https://www.cve.org/CVERecord?id=CVE-2024-2201
- CVE-2024-23848
https://www.cve.org/CVERecord?id=CVE-2024-23848
- CVE-2024-26595
https://www.cve.org/CVERecord?id=CVE-2024-26595
- CVE-2024-26645
https://www.cve.org/CVERecord?id=CVE-2024-26645
- CVE-2024-26649
https://www.cve.org/CVERecord?id=CVE-2024-26649
- CVE-2024-26665
https://www.cve.org/CVERecord?id=CVE-2024-26665
- CVE-2024-26686
https://www.cve.org/CVERecord?id=CVE-2024-26686
- CVE-2024-26704
https://www.cve.org/CVERecord?id=CVE-2024-26704
- CVE-2024-26717
https://www.cve.org/CVERecord?id=CVE-2024-26717
- CVE-2024-26720
https://www.cve.org/CVERecord?id=CVE-2024-26720
- CVE-2024-26739
https://www.cve.org/CVERecord?id=CVE-2024-26739
- CVE-2024-26769
https://www.cve.org/CVERecord?id=CVE-2024-26769
- CVE-2024-26772
https://www.cve.org/CVERecord?id=CVE-2024-26772
- CVE-2024-26773
https://www.cve.org/CVERecord?id=CVE-2024-26773
- CVE-2024-26855
https://www.cve.org/CVERecord?id=CVE-2024-26855
- CVE-2024-26880
https://www.cve.org/CVERecord?id=CVE-2024-26880
- CVE-2024-26886
https://www.cve.org/CVERecord?id=CVE-2024-26886
- CVE-2024-26894
https://www.cve.org/CVERecord?id=CVE-2024-26894
- CVE-2024-26908
https://www.cve.org/CVERecord?id=CVE-2024-26908
- CVE-2024-26923
https://www.cve.org/CVERecord?id=CVE-2024-26923
- CVE-2024-26929
https://www.cve.org/CVERecord?id=CVE-2024-26929
- CVE-2024-26930
https://www.cve.org/CVERecord?id=CVE-2024-26930
- CVE-2024-26931
https://www.cve.org/CVERecord?id=CVE-2024-26931
- CVE-2024-26939
https://www.cve.org/CVERecord?id=CVE-2024-26939
- CVE-2024-26947
https://www.cve.org/CVERecord?id=CVE-2024-26947
- CVE-2024-26974
https://www.cve.org/CVERecord?id=CVE-2024-26974
- CVE-2024-26991
https://www.cve.org/CVERecord?id=CVE-2024-26991
- CVE-2024-26993
https://www.cve.org/CVERecord?id=CVE-2024-26993
- CVE-2024-27013
https://www.cve.org/CVERecord?id=CVE-2024-27013
- CVE-2024-27019
https://www.cve.org/CVERecord?id=CVE-2024-27019
- CVE-2024-27020
https://www.cve.org/CVERecord?id=CVE-2024-27020
- CVE-2024-27022
https://www.cve.org/CVERecord?id=CVE-2024-27022
- CVE-2024-27042
https://www.cve.org/CVERecord?id=CVE-2024-27042
- CVE-2024-35809
https://www.cve.org/CVERecord?id=CVE-2024-35809
- CVE-2024-35877
https://www.cve.org/CVERecord?id=CVE-2024-35877
- CVE-2024-35884
https://www.cve.org/CVERecord?id=CVE-2024-35884
- CVE-2024-35895
https://www.cve.org/CVERecord?id=CVE-2024-35895
- CVE-2024-35898
https://www.cve.org/CVERecord?id=CVE-2024-35898
- CVE-2024-35944
https://www.cve.org/CVERecord?id=CVE-2024-35944
- CVE-2024-35989
https://www.cve.org/CVERecord?id=CVE-2024-35989
- CVE-2024-36016
https://www.cve.org/CVERecord?id=CVE-2024-36016
- CVE-2024-36883
https://www.cve.org/CVERecord?id=CVE-2024-36883
- CVE-2024-36886
https://www.cve.org/CVERecord?id=CVE-2024-36886
- CVE-2024-36889
https://www.cve.org/CVERecord?id=CVE-2024-36889
- CVE-2024-36899
https://www.cve.org/CVERecord?id=CVE-2024-36899
- CVE-2024-36901
https://www.cve.org/CVERecord?id=CVE-2024-36901
- CVE-2024-36902
https://www.cve.org/CVERecord?id=CVE-2024-36902
- CVE-2024-36920
https://www.cve.org/CVERecord?id=CVE-2024-36920
- CVE-2024-36939
https://www.cve.org/CVERecord?id=CVE-2024-36939
- CVE-2024-36953
https://www.cve.org/CVERecord?id=CVE-2024-36953
- CVE-2024-37356
https://www.cve.org/CVERecord?id=CVE-2024-37356
- CVE-2024-38558
https://www.cve.org/CVERecord?id=CVE-2024-38558
- CVE-2024-38559
https://www.cve.org/CVERecord?id=CVE-2024-38559
- CVE-2024-38562
https://www.cve.org/CVERecord?id=CVE-2024-38562
- CVE-2024-38570
https://www.cve.org/CVERecord?id=CVE-2024-38570
- CVE-2024-38573
https://www.cve.org/CVERecord?id=CVE-2024-38573
- CVE-2024-38581
https://www.cve.org/CVERecord?id=CVE-2024-38581
- CVE-2024-38601
https://www.cve.org/CVERecord?id=CVE-2024-38601
- CVE-2024-38615
https://www.cve.org/CVERecord?id=CVE-2024-38615
- CVE-2024-38619
https://www.cve.org/CVERecord?id=CVE-2024-38619
- CVE-2024-39471
https://www.cve.org/CVERecord?id=CVE-2024-39471
- CVE-2024-39499
https://www.cve.org/CVERecord?id=CVE-2024-39499
- CVE-2024-39501
https://www.cve.org/CVERecord?id=CVE-2024-39501
- CVE-2024-39506
https://www.cve.org/CVERecord?id=CVE-2024-39506
- CVE-2024-40901
https://www.cve.org/CVERecord?id=CVE-2024-40901
- CVE-2024-40904
https://www.cve.org/CVERecord?id=CVE-2024-40904
- CVE-2024-40911
https://www.cve.org/CVERecord?id=CVE-2024-40911
- CVE-2024-40912
https://www.cve.org/CVERecord?id=CVE-2024-40912
- CVE-2024-40929
https://www.cve.org/CVERecord?id=CVE-2024-40929
- CVE-2024-40931
https://www.cve.org/CVERecord?id=CVE-2024-40931
- CVE-2024-40941
https://www.cve.org/CVERecord?id=CVE-2024-40941
- CVE-2024-40954
https://www.cve.org/CVERecord?id=CVE-2024-40954
- CVE-2024-40958
https://www.cve.org/CVERecord?id=CVE-2024-40958
- CVE-2024-40959
https://www.cve.org/CVERecord?id=CVE-2024-40959
- CVE-2024-40960
https://www.cve.org/CVERecord?id=CVE-2024-40960
- CVE-2024-40972
https://www.cve.org/CVERecord?id=CVE-2024-40972
- CVE-2024-40977
https://www.cve.org/CVERecord?id=CVE-2024-40977
- CVE-2024-40978
https://www.cve.org/CVERecord?id=CVE-2024-40978
- CVE-2024-40984
https://www.cve.org/CVERecord?id=CVE-2024-40984
- CVE-2024-40988
https://www.cve.org/CVERecord?id=CVE-2024-40988
- CVE-2024-40989
https://www.cve.org/CVERecord?id=CVE-2024-40989
- CVE-2024-40995
https://www.cve.org/CVERecord?id=CVE-2024-40995
- CVE-2024-40997
https://www.cve.org/CVERecord?id=CVE-2024-40997
- CVE-2024-40998
https://www.cve.org/CVERecord?id=CVE-2024-40998
- CVE-2024-41005
https://www.cve.org/CVERecord?id=CVE-2024-41005
- CVE-2024-41007
https://www.cve.org/CVERecord?id=CVE-2024-41007
- CVE-2024-41008
https://www.cve.org/CVERecord?id=CVE-2024-41008
- CVE-2024-41009
https://www.cve.org/CVERecord?id=CVE-2024-41009
- CVE-2024-41012
https://www.cve.org/CVERecord?id=CVE-2024-41012
- CVE-2024-41013
https://www.cve.org/CVERecord?id=CVE-2024-41013
- CVE-2024-41014
https://www.cve.org/CVERecord?id=CVE-2024-41014
- CVE-2024-41023
https://www.cve.org/CVERecord?id=CVE-2024-41023
- CVE-2024-41031
https://www.cve.org/CVERecord?id=CVE-2024-41031
- CVE-2024-41035
https://www.cve.org/CVERecord?id=CVE-2024-41035
- CVE-2024-41038
https://www.cve.org/CVERecord?id=CVE-2024-41038
- CVE-2024-41039
https://www.cve.org/CVERecord?id=CVE-2024-41039
- CVE-2024-41040
https://www.cve.org/CVERecord?id=CVE-2024-41040
- CVE-2024-41041
https://www.cve.org/CVERecord?id=CVE-2024-41041
- CVE-2024-41044
https://www.cve.org/CVERecord?id=CVE-2024-41044
- CVE-2024-41055
https://www.cve.org/CVERecord?id=CVE-2024-41055
- CVE-2024-41056
https://www.cve.org/CVERecord?id=CVE-2024-41056
- CVE-2024-41060
https://www.cve.org/CVERecord?id=CVE-2024-41060
- CVE-2024-41071
https://www.cve.org/CVERecord?id=CVE-2024-41071
- CVE-2024-41076
https://www.cve.org/CVERecord?id=CVE-2024-41076
- CVE-2024-41090
https://www.cve.org/CVERecord?id=CVE-2024-41090
- CVE-2024-41091
https://www.cve.org/CVERecord?id=CVE-2024-41091
- CVE-2024-41097
https://www.cve.org/CVERecord?id=CVE-2024-41097
- CVE-2024-42084
https://www.cve.org/CVERecord?id=CVE-2024-42084
- CVE-2024-42090
https://www.cve.org/CVERecord?id=CVE-2024-42090
- CVE-2024-42096
https://www.cve.org/CVERecord?id=CVE-2024-42096
- CVE-2024-42114
https://www.cve.org/CVERecord?id=CVE-2024-42114
- CVE-2024-42124
https://www.cve.org/CVERecord?id=CVE-2024-42124
- CVE-2024-42131
https://www.cve.org/CVERecord?id=CVE-2024-42131
- CVE-2024-42139
https://www.cve.org/CVERecord?id=CVE-2024-42139
- CVE-2024-42152
https://www.cve.org/CVERecord?id=CVE-2024-42152
- CVE-2024-42154
https://www.cve.org/CVERecord?id=CVE-2024-42154
- CVE-2024-42225
https://www.cve.org/CVERecord?id=CVE-2024-42225
- CVE-2024-42226
https://www.cve.org/CVERecord?id=CVE-2024-42226
- CVE-2024-42228
https://www.cve.org/CVERecord?id=CVE-2024-42228
- CVE-2024-42237
https://www.cve.org/CVERecord?id=CVE-2024-42237
- CVE-2024-42238
https://www.cve.org/CVERecord?id=CVE-2024-42238
- CVE-2024-42240
https://www.cve.org/CVERecord?id=CVE-2024-42240
- CVE-2024-42241
https://www.cve.org/CVERecord?id=CVE-2024-42241
- CVE-2024-42243
https://www.cve.org/CVERecord?id=CVE-2024-42243
- CVE-2024-42246
https://www.cve.org/CVERecord?id=CVE-2024-42246
- CVE-2024-42322
https://www.cve.org/CVERecord?id=CVE-2024-42322
- CVE-2024-43871