Skip to navigation Skip to main content

Utilities

  • Subscriptions
  • Downloads
  • Red Hat Console
  • Get Support
Red Hat Customer Portal
  • Subscriptions
  • Downloads
  • Red Hat Console
  • Get Support
  • Products

    Top Products

    • Red Hat Enterprise Linux
    • Red Hat OpenShift
    • Red Hat Ansible Automation Platform
    All Products

    Downloads and Containers

    • Downloads
    • Packages
    • Containers

    Top Resources

    • Documentation
    • Product Life Cycles
    • Product Compliance
    • Errata
  • Knowledge

    Red Hat Knowledge Center

    • Knowledgebase Solutions
    • Knowledgebase Articles
    • Customer Portal Labs
    • Errata

    Top Product Docs

    • Red Hat Enterprise Linux
    • Red Hat OpenShift
    • Red Hat Ansible Automation Platform
    All Product Docs

    Training and Certification

    • About
    • Course Index
    • Certification Index
    • Skill Assessment
  • Security

    Red Hat Product Security Center

    • Security Updates
    • Security Advisories
    • Red Hat CVE Database
    • Errata

    References

    • Security Bulletins
    • Security Measurement
    • Severity Ratings
    • Security Data

    Top Resources

    • Security Labs
    • Backporting Policies
    • Security Blog
  • Support

    Red Hat Support

    • Support Cases
    • Troubleshoot
    • Get Support
    • Contact Red Hat Support

    Red Hat Community Support

    • Customer Portal Community
    • Community Discussions
    • Red Hat Accelerator Program

    Top Resources

    • Product Life Cycles
    • Customer Portal Labs
    • Red Hat JBoss Supported Configurations
    • Red Hat Insights
Or troubleshoot an issue.

Select Your Language

  • English
  • Français
  • 한국어
  • 日本語
  • 中文 (中国)

Infrastructure and Management

  • Red Hat Enterprise Linux
  • Red Hat Satellite
  • Red Hat Subscription Management
  • Red Hat Insights
  • Red Hat Ansible Automation Platform

Cloud Computing

  • Red Hat OpenShift
  • Red Hat OpenStack Platform
  • Red Hat OpenShift
  • Red Hat OpenShift AI
  • Red Hat OpenShift Dedicated
  • Red Hat Advanced Cluster Security for Kubernetes
  • Red Hat Advanced Cluster Management for Kubernetes
  • Red Hat Quay
  • Red Hat OpenShift Dev Spaces
  • Red Hat OpenShift Service on AWS

Storage

  • Red Hat Gluster Storage
  • Red Hat Hyperconverged Infrastructure
  • Red Hat Ceph Storage
  • Red Hat OpenShift Data Foundation

Runtimes

  • Red Hat Runtimes
  • Red Hat JBoss Enterprise Application Platform
  • Red Hat Data Grid
  • Red Hat JBoss Web Server
  • Red Hat build of Keycloak
  • Red Hat support for Spring Boot
  • Red Hat build of Node.js
  • Red Hat build of Quarkus

Integration and Automation

  • Red Hat Application Foundations
  • Red Hat Fuse
  • Red Hat AMQ
  • Red Hat 3scale API Management
All Products
Red Hat Product Errata RHSA-2024:3319 - Security Advisory
Issued:
2024-05-23
Updated:
2024-05-23

RHSA-2024:3319 - Security Advisory

  • Overview
  • Updated Packages

Synopsis

Important: kernel security update

Type/Severity

Security Advisory: Important

Red Hat Insights patch analysis

Identify and remediate systems affected by this advisory.

View affected systems

Topic

An update for kernel is now available for Red Hat Enterprise Linux 7.7 Advanced Update Support.

Red Hat Product Security has rated this update as having a security impact of
Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.

Description

The kernel packages contain the Linux kernel, the core of any Linux operating
system.

Security Fix(es):

  • kernel: netfilter: nf_tables: reject QUEUE/DROP verdict parameters (CVE-2024-1086)
  • kernel: hw: Intel: Gather Data Sampling (GDS) side channel vulnerability (CVE-2022-40982)

For more details about the security issue(s), including the impact, a CVSS
score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.

Solution

Before applying this update, make sure all previously released errata
relevant to your system have been applied.

For details on how to apply this update, refer to:

https://access.redhat.com/articles/11258

The system must be rebooted for this update to take effect.

Affected Products

  • Red Hat Enterprise Linux Server - AUS 7.7 x86_64

Fixes

  • BZ - 2223949 - CVE-2022-40982 hw: Intel: Gather Data Sampling (GDS) side channel vulnerability
  • BZ - 2262126 - CVE-2024-1086 kernel: nf_tables: use-after-free vulnerability in the nft_verdict_init() function

CVEs

  • CVE-2022-40982
  • CVE-2024-1086

References

  • https://access.redhat.com/security/updates/classification/#important
Note: More recent versions of these packages may be available. Click a package name for more details.

Red Hat Enterprise Linux Server - AUS 7.7

SRPM
kernel-3.10.0-1062.88.1.el7.src.rpm SHA-256: bab0354be62b5051b43ccd52f3fdeba7533b71a1a92dd9e7f561c463b57abe2a
x86_64
bpftool-3.10.0-1062.88.1.el7.x86_64.rpm SHA-256: e59b3085dd0dd061973eddf874b1f9859130fe60accadc4979ad482efc02a21a
bpftool-debuginfo-3.10.0-1062.88.1.el7.x86_64.rpm SHA-256: cd9751baecc658e0f871b2eeffd4f4adb1c4077951d52f42ccc408854d262c19
bpftool-debuginfo-3.10.0-1062.88.1.el7.x86_64.rpm SHA-256: cd9751baecc658e0f871b2eeffd4f4adb1c4077951d52f42ccc408854d262c19
kernel-3.10.0-1062.88.1.el7.x86_64.rpm SHA-256: dc949e831b5f00cedd65a21b6d61de22b5b9fe752f5480313d8d640a49d7d360
kernel-abi-whitelists-3.10.0-1062.88.1.el7.noarch.rpm SHA-256: 9fd895a6dd1a4280e5e77698a5da027a6d86fdacc441ed610955c78ddd26c506
kernel-debug-3.10.0-1062.88.1.el7.x86_64.rpm SHA-256: 97a658be29f1da455c7ef4531d61c857c4ad30d1246a0dcb24f32f5f03f8d3f0
kernel-debug-debuginfo-3.10.0-1062.88.1.el7.x86_64.rpm SHA-256: f2f69b207d1bfcea462906ffb5f6b301685adc63e41fc0097571fc00f926c00b
kernel-debug-debuginfo-3.10.0-1062.88.1.el7.x86_64.rpm SHA-256: f2f69b207d1bfcea462906ffb5f6b301685adc63e41fc0097571fc00f926c00b
kernel-debug-devel-3.10.0-1062.88.1.el7.x86_64.rpm SHA-256: baaea259406fae8b45f4f9618d20f1bf4f346eb43eac66c64ba088f3dc3a12a2
kernel-debuginfo-3.10.0-1062.88.1.el7.x86_64.rpm SHA-256: c71e08ebe871ef801771a9db26fc5a16a9a6934e56f0ffcf889ec41808ea5c4a
kernel-debuginfo-3.10.0-1062.88.1.el7.x86_64.rpm SHA-256: c71e08ebe871ef801771a9db26fc5a16a9a6934e56f0ffcf889ec41808ea5c4a
kernel-debuginfo-common-x86_64-3.10.0-1062.88.1.el7.x86_64.rpm SHA-256: 699651b1428d570de78e6bc947a4297ec43d201db2b686bb1c4a35b6e8f520b2
kernel-debuginfo-common-x86_64-3.10.0-1062.88.1.el7.x86_64.rpm SHA-256: 699651b1428d570de78e6bc947a4297ec43d201db2b686bb1c4a35b6e8f520b2
kernel-devel-3.10.0-1062.88.1.el7.x86_64.rpm SHA-256: 433be14405bec093b4040236d36a57015d9f722c91822ee8750d95e221db35b1
kernel-doc-3.10.0-1062.88.1.el7.noarch.rpm SHA-256: 69817b218272880892afb02f6e0ae64bbc2c2d1d3d3bbe1c0497570729b4c765
kernel-headers-3.10.0-1062.88.1.el7.x86_64.rpm SHA-256: 0eb8e13aa51575241309d511f62b4fb38f06f7925a71623ca11084a424ed4484
kernel-tools-3.10.0-1062.88.1.el7.x86_64.rpm SHA-256: 64d5ffbb3f1b6ad8a99f7fec2561168aad58c0aaafa1b24d052dc8fc30f6abe1
kernel-tools-debuginfo-3.10.0-1062.88.1.el7.x86_64.rpm SHA-256: fc8719390bb76ffbb7e4458586e8b9aa2c278b62eb7d81df4198ab0ec75e48bd
kernel-tools-debuginfo-3.10.0-1062.88.1.el7.x86_64.rpm SHA-256: fc8719390bb76ffbb7e4458586e8b9aa2c278b62eb7d81df4198ab0ec75e48bd
kernel-tools-libs-3.10.0-1062.88.1.el7.x86_64.rpm SHA-256: 7feeb26290772035fd187a13d87c879e71ab29289c24b48140d1c62f9d78e62c
kernel-tools-libs-devel-3.10.0-1062.88.1.el7.x86_64.rpm SHA-256: da64508cf31bf725745757a72b4b3188b615ebeefda6ee96d23dc694dc399dc9
perf-3.10.0-1062.88.1.el7.x86_64.rpm SHA-256: 0b636c80afa107e783b528205bf491a2af14e1db1e778eb1884b2a1b89be1505
perf-debuginfo-3.10.0-1062.88.1.el7.x86_64.rpm SHA-256: 5b505738d8e7774a283303f3f7dcc8dee39b3e13893d5765033324e872899092
perf-debuginfo-3.10.0-1062.88.1.el7.x86_64.rpm SHA-256: 5b505738d8e7774a283303f3f7dcc8dee39b3e13893d5765033324e872899092
python-perf-3.10.0-1062.88.1.el7.x86_64.rpm SHA-256: bbf7c65d39e5e3d48b4329229e23972980d1f688f098b79b2664b399aedf8a52
python-perf-debuginfo-3.10.0-1062.88.1.el7.x86_64.rpm SHA-256: 0c2ca2d916d231da42b653c32dccc86d6de576ea2aca7a2b1093c95cda78c768
python-perf-debuginfo-3.10.0-1062.88.1.el7.x86_64.rpm SHA-256: 0c2ca2d916d231da42b653c32dccc86d6de576ea2aca7a2b1093c95cda78c768

The Red Hat security contact is secalert@redhat.com. More contact details at https://access.redhat.com/security/team/contact/.

Red Hat LinkedIn YouTube Facebook X, formerly Twitter

Quick Links

  • Downloads
  • Subscriptions
  • Support Cases
  • Customer Service
  • Product Documentation

Help

  • Contact Us
  • Customer Portal FAQ
  • Log-in Assistance

Site Info

  • Trust Red Hat
  • Browser Support Policy
  • Accessibility
  • Awards and Recognition
  • Colophon

Related Sites

  • redhat.com
  • developers.redhat.com
  • connect.redhat.com
  • cloud.redhat.com

Red Hat legal and privacy links

  • About Red Hat
  • Jobs
  • Events
  • Locations
  • Contact Red Hat
  • Red Hat Blog
  • Inclusion at Red Hat
  • Cool Stuff Store
  • Red Hat Summit
© 2025 Red Hat

Red Hat legal and privacy links

  • Privacy statement
  • Terms of use
  • All policies and guidelines
  • Digital accessibility