SUSE Linux 內核多個漏洞
發佈日期: 2024年07月10日
風險: 中度風險
類型: 操作系統 - LINUX
於 SUSE Linux 內核發現多個漏洞。遠端攻擊者可利用這些漏洞,於目標系統觸發阻斷服務狀況、權限提升、遠端執行任意程式碼、繞過保安限制及洩露敏感資料。
影響
- 遠端執行程式碼
- 權限提升
- 阻斷服務
- 繞過保安限制
- 資料洩露
受影響之系統或技術
- Public Cloud Module 15-SP5
- SUSE Enterprise Storage 7.1
- SUSE Linux Enterprise High Availability Extension 15 SP2
- SUSE Linux Enterprise High Availability Extension 15 SP3
- SUSE Linux Enterprise High Performance Computing 12 SP5
- SUSE Linux Enterprise High Performance Computing 15 SP2
- SUSE Linux Enterprise High Performance Computing 15 SP2 LTSS 15-SP2
- SUSE Linux Enterprise High Performance Computing 15 SP3
- SUSE Linux Enterprise High Performance Computing 15 SP5
- SUSE Linux Enterprise High Performance Computing LTSS 15 SP3
- SUSE Linux Enterprise Live Patching 15-SP2
- SUSE Linux Enterprise Live Patching 15-SP3
- SUSE Linux Enterprise Live Patching 15-SP5
- SUSE Linux Enterprise Micro 5.1
- SUSE Linux Enterprise Micro 5.2
- SUSE Linux Enterprise Micro 5.5
- SUSE Linux Enterprise Micro for Rancher 5.2
- SUSE Linux Enterprise Real Time 15 SP5
- SUSE Linux Enterprise Server 12 SP5
- SUSE Linux Enterprise Server 15 SP2
- SUSE Linux Enterprise Server 15 SP2 Business Critical Linux 15-SP2
- SUSE Linux Enterprise Server 15 SP2 LTSS 15-SP2
- SUSE Linux Enterprise Server 15 SP3
- SUSE Linux Enterprise Server 15 SP3 Business Critical Linux 15-SP3
- SUSE Linux Enterprise Server 15 SP3 LTSS 15-SP3
- SUSE Linux Enterprise Server 15 SP5
- SUSE Linux Enterprise Server for SAP Applications 12 SP5
- SUSE Linux Enterprise Server for SAP Applications 15 SP2
- SUSE Linux Enterprise Server for SAP Applications 15 SP3
- SUSE Linux Enterprise Server for SAP Applications 15 SP5
- SUSE Manager Proxy 4.1
- SUSE Manager Proxy 4.2
- SUSE Manager Retail Branch Server 4.1
- SUSE Manager Retail Branch Server 4.2
- SUSE Manager Server 4.1
- SUSE Manager Server 4.2
- openSUSE Leap 15.3
- openSUSE Leap 15.5
解決方案
在安裝軟體之前,請先瀏覽供應商之網站,以獲得更多詳細資料。
安裝供應商提供的修補程式:
- https://www.suse.com/support/update/announcement/2024/suse-su-20242326-1
- https://www.suse.com/support/update/announcement/2024/suse-su-20242335-1
- https://www.suse.com/support/update/announcement/2024/suse-su-20242337-1
- https://www.suse.com/support/update/announcement/2024/suse-su-20242338-1
- https://www.suse.com/support/update/announcement/2024/suse-su-20242341-1
- https://www.suse.com/support/update/announcement/2024/suse-su-20242342-1
- https://www.suse.com/support/update/announcement/2024/suse-su-20242343-1
- https://www.suse.com/support/update/announcement/2024/suse-su-20242344-1
- https://www.suse.com/support/update/announcement/2024/suse-su-20242351-1
- https://www.suse.com/support/update/announcement/2024/suse-su-20242357-1
- https://www.suse.com/support/update/announcement/2024/suse-su-20242358-1
- https://www.suse.com/support/update/announcement/2024/suse-su-20242360-1
- https://www.suse.com/support/update/announcement/2024/suse-su-20242362-1
- https://www.suse.com/support/update/announcement/2024/suse-su-20242365-1
- https://www.suse.com/support/update/announcement/2024/suse-su-20242368-1
- https://www.suse.com/support/update/announcement/2024/suse-su-20242369-1
- https://www.suse.com/support/update/announcement/2024/suse-su-20242372-1
- https://www.suse.com/support/update/announcement/2024/suse-su-20242373-1
- https://www.suse.com/support/update/announcement/2024/suse-su-20242376-1
漏洞識別碼
- CVE-2020-10135
- CVE-2021-3896
- CVE-2021-4439
- CVE-2021-26345
- CVE-2021-43389
- CVE-2021-46766
- CVE-2021-46774
- CVE-2021-46955
- CVE-2021-47089
- CVE-2021-47103
- CVE-2021-47191
- CVE-2021-47193
- CVE-2021-47247
- CVE-2021-47267
- CVE-2021-47270
- CVE-2021-47293
- CVE-2021-47294
- CVE-2021-47297
- CVE-2021-47309
- CVE-2021-47311
- CVE-2021-47328
- CVE-2021-47354
- CVE-2021-47368
- CVE-2021-47372
- CVE-2021-47379
- CVE-2021-47383
- CVE-2021-47407
- CVE-2021-47418
- CVE-2021-47432
- CVE-2021-47434
- CVE-2021-47445
- CVE-2021-47515
- CVE-2021-47518
- CVE-2021-47534
- CVE-2021-47538
- CVE-2021-47539
- CVE-2021-47544
- CVE-2021-47555
- CVE-2021-47566
- CVE-2021-47571
- CVE-2021-47572
- CVE-2021-47576
- CVE-2021-47577
- CVE-2021-47578
- CVE-2021-47580
- CVE-2021-47582
- CVE-2021-47583
- CVE-2021-47584
- CVE-2021-47585
- CVE-2021-47586
- CVE-2021-47587
- CVE-2021-47589
- CVE-2021-47592
- CVE-2021-47595
- CVE-2021-47596
- CVE-2021-47597
- CVE-2021-47600
- CVE-2021-47601
- CVE-2021-47602
- CVE-2021-47603
- CVE-2021-47604
- CVE-2021-47605
- CVE-2021-47607
- CVE-2021-47608
- CVE-2021-47609
- CVE-2021-47610
- CVE-2021-47611
- CVE-2021-47612
- CVE-2021-47614
- CVE-2021-47615
- CVE-2021-47616
- CVE-2021-47617
- CVE-2021-47618
- CVE-2021-47619
- CVE-2021-47620
- CVE-2022-0435
- CVE-2022-2938
- CVE-2022-22942
- CVE-2022-23820
- CVE-2022-23830
- CVE-2022-48651
- CVE-2022-48711
- CVE-2022-48712
- CVE-2022-48713
- CVE-2022-48714
- CVE-2022-48715
- CVE-2022-48716
- CVE-2022-48717
- CVE-2022-48718
- CVE-2022-48720
- CVE-2022-48721
- CVE-2022-48722
- CVE-2022-48723
- CVE-2022-48724
- CVE-2022-48725
- CVE-2022-48726
- CVE-2022-48727
- CVE-2022-48728
- CVE-2022-48729
- CVE-2022-48730
- CVE-2022-48732
- CVE-2022-48733
- CVE-2022-48734
- CVE-2022-48735
- CVE-2022-48736
- CVE-2022-48737
- CVE-2022-48738
- CVE-2022-48739
- CVE-2022-48740
- CVE-2022-48743
- CVE-2022-48744
- CVE-2022-48745
- CVE-2022-48746
- CVE-2022-48747
- CVE-2022-48748
- CVE-2022-48749
- CVE-2022-48751
- CVE-2022-48752
- CVE-2022-48753
- CVE-2022-48754
- CVE-2022-48755
- CVE-2022-48756
- CVE-2022-48758
- CVE-2022-48759
- CVE-2022-48760
- CVE-2022-48761
- CVE-2022-48763
- CVE-2022-48765
- CVE-2022-48766
- CVE-2022-48767
- CVE-2022-48768
- CVE-2022-48769
- CVE-2022-48770
- CVE-2022-48771
- CVE-2022-48772
- CVE-2023-1829
- CVE-2023-5281
- CVE-2023-6531
- CVE-2023-6546
- CVE-2023-20519
- CVE-2023-20521
- CVE-2023-20526
- CVE-2023-20533
- CVE-2023-20566
- CVE-2023-20592
- CVE-2023-24023
- CVE-2023-52340
- CVE-2023-52502
- CVE-2023-52622
- CVE-2023-52658
- CVE-2023-52667
- CVE-2023-52670
- CVE-2023-52672
- CVE-2023-52675
- CVE-2023-52707
- CVE-2023-52735
- CVE-2023-52737
- CVE-2023-52752
- CVE-2023-52754
- CVE-2023-52757
- CVE-2023-52762
- CVE-2023-52764
- CVE-2023-52766
- CVE-2023-52784
- CVE-2023-52787
- CVE-2023-52800
- CVE-2023-52808
- CVE-2023-52809
- CVE-2023-52832
- CVE-2023-52834
- CVE-2023-52835
- CVE-2023-52837
- CVE-2023-52843
- CVE-2023-52845
- CVE-2023-52846
- CVE-2023-52855
- CVE-2023-52869
- CVE-2023-52881
- CVE-2023-52882
- CVE-2023-52884
- CVE-2024-23307
- CVE-2024-26585
- CVE-2024-26610
- CVE-2024-26622
- CVE-2024-26625
- CVE-2024-26633
- CVE-2024-26641
- CVE-2024-26644
- CVE-2024-26679
- CVE-2024-26687
- CVE-2024-26720
- CVE-2024-26766
- CVE-2024-26813
- CVE-2024-26822
- CVE-2024-26828
- CVE-2024-26842
- CVE-2024-26845
- CVE-2024-26852
- CVE-2024-26863
- CVE-2024-26894
- CVE-2024-26921
- CVE-2024-26923
- CVE-2024-26928
- CVE-2024-26930
- CVE-2024-26973
- CVE-2024-27399
- CVE-2024-27410
- CVE-2024-27432
- CVE-2024-33619
- CVE-2024-35247
- CVE-2024-35789
- CVE-2024-35790
- CVE-2024-35807
- CVE-2024-35814
- CVE-2024-35822
- CVE-2024-35835
- CVE-2024-35848
- CVE-2024-35857
- CVE-2024-35861
- CVE-2024-35862
- CVE-2024-35863
- CVE-2024-35864
- CVE-2024-35865
- CVE-2024-35867
- CVE-2024-35868
- CVE-2024-35869
- CVE-2024-35870
- CVE-2024-35878
- CVE-2024-35884
- CVE-2024-35886
- CVE-2024-35896
- CVE-2024-35898
- CVE-2024-35900
- CVE-2024-35905
- CVE-2024-35922
- CVE-2024-35925
- CVE-2024-35930
- CVE-2024-35950
- CVE-2024-35956
- CVE-2024-35958
- CVE-2024-35960
- CVE-2024-35962
- CVE-2024-35976
- CVE-2024-35979
- CVE-2024-35997
- CVE-2024-35998
- CVE-2024-36005
- CVE-2024-36008
- CVE-2024-36016
- CVE-2024-36017
- CVE-2024-36020
- CVE-2024-36021
- CVE-2024-36025
- CVE-2024-36477
- CVE-2024-36478
- CVE-2024-36479
- CVE-2024-36592
- CVE-2024-36880
- CVE-2024-36890
- CVE-2024-36894
- CVE-2024-36899
- CVE-2024-36900
- CVE-2024-36904
- CVE-2024-36915
- CVE-2024-36916
- CVE-2024-36917
- CVE-2024-36919
- CVE-2024-36923
- CVE-2024-36934
- CVE-2024-36937
- CVE-2024-36938
- CVE-2024-36940
- CVE-2024-36945
- CVE-2024-36949
- CVE-2024-36950
- CVE-2024-36960
- CVE-2024-36964
- CVE-2024-36965
- CVE-2024-36967
- CVE-2024-36969
- CVE-2024-36971
- CVE-2024-36975
- CVE-2024-36978
- CVE-2024-37021
- CVE-2024-37078
- CVE-2024-37354
- CVE-2024-38381
- CVE-2024-38388
- CVE-2024-38390
- CVE-2024-38540
- CVE-2024-38541
- CVE-2024-38544
- CVE-2024-38545
- CVE-2024-38546
- CVE-2024-38547
- CVE-2024-38548
- CVE-2024-38549
- CVE-2024-38550
- CVE-2024-38552
- CVE-2024-38553
- CVE-2024-38555
- CVE-2024-38556
- CVE-2024-38557
- CVE-2024-38559
- CVE-2024-38560
- CVE-2024-38564
- CVE-2024-38565
- CVE-2024-38567
- CVE-2024-38568
- CVE-2024-38571
- CVE-2024-38573
- CVE-2024-38578
- CVE-2024-38579
- CVE-2024-38580
- CVE-2024-38581
- CVE-2024-38582
- CVE-2024-38583
- CVE-2024-38587
- CVE-2024-38590
- CVE-2024-38591
- CVE-2024-38594
- CVE-2024-38597
- CVE-2024-38599
- CVE-2024-38600
- CVE-2024-38601
- CVE-2024-38603
- CVE-2024-38605
- CVE-2024-38608
- CVE-2024-38616
- CVE-2024-38618
- CVE-2024-38619
- CVE-2024-38621
- CVE-2024-38627
- CVE-2024-38630
- CVE-2024-38633
- CVE-2024-38634
- CVE-2024-38635
- CVE-2024-38659
- CVE-2024-38661
- CVE-2024-38780
- CVE-2024-39301
- CVE-2024-39468
- CVE-2024-39469
- CVE-2024-39471
資料來源
相關連結
- https://www.suse.com/support/update/announcement/2024/suse-su-20242326-1
- https://www.suse.com/support/update/announcement/2024/suse-su-20242335-1
- https://www.suse.com/support/update/announcement/2024/suse-su-20242337-1
- https://www.suse.com/support/update/announcement/2024/suse-su-20242338-1
- https://www.suse.com/support/update/announcement/2024/suse-su-20242341-1
- https://www.suse.com/support/update/announcement/2024/suse-su-20242342-1
- https://www.suse.com/support/update/announcement/2024/suse-su-20242343-1
- https://www.suse.com/support/update/announcement/2024/suse-su-20242344-1
- https://www.suse.com/support/update/announcement/2024/suse-su-20242351-1
- https://www.suse.com/support/update/announcement/2024/suse-su-20242357-1
- https://www.suse.com/support/update/announcement/2024/suse-su-20242358-1
- https://www.suse.com/support/update/announcement/2024/suse-su-20242360-1
- https://www.suse.com/support/update/announcement/2024/suse-su-20242362-1
- https://www.suse.com/support/update/announcement/2024/suse-su-20242365-1
- https://www.suse.com/support/update/announcement/2024/suse-su-20242368-1
- https://www.suse.com/support/update/announcement/2024/suse-su-20242369-1
- https://www.suse.com/support/update/announcement/2024/suse-su-20242372-1
- https://www.suse.com/support/update/announcement/2024/suse-su-20242373-1
- https://www.suse.com/support/update/announcement/2024/suse-su-20242376-1
沒有留言:
發佈留言