Skip to navigation Skip to main content

Utilities

  • Subscriptions
  • Downloads
  • Red Hat Console
  • Get Support
Red Hat Customer Portal
  • Subscriptions
  • Downloads
  • Red Hat Console
  • Get Support
  • Products

    Top Products

    • Red Hat Enterprise Linux
    • Red Hat OpenShift
    • Red Hat Ansible Automation Platform
    All Products

    Downloads and Containers

    • Downloads
    • Packages
    • Containers

    Top Resources

    • Documentation
    • Product Life Cycles
    • Product Compliance
    • Errata
  • Knowledge

    Red Hat Knowledge Center

    • Knowledgebase Solutions
    • Knowledgebase Articles
    • Customer Portal Labs
    • Errata

    Top Product Docs

    • Red Hat Enterprise Linux
    • Red Hat OpenShift
    • Red Hat Ansible Automation Platform
    All Product Docs

    Training and Certification

    • About
    • Course Index
    • Certification Index
    • Skill Assessment
  • Security

    Red Hat Product Security Center

    • Security Updates
    • Security Advisories
    • Red Hat CVE Database
    • Errata

    References

    • Security Bulletins
    • Security Measurement
    • Severity Ratings
    • Security Data

    Top Resources

    • Security Labs
    • Backporting Policies
    • Security Blog
  • Support

    Red Hat Support

    • Support Cases
    • Troubleshoot
    • Get Support
    • Contact Red Hat Support

    Red Hat Community Support

    • Customer Portal Community
    • Community Discussions
    • Red Hat Accelerator Program

    Top Resources

    • Product Life Cycles
    • Customer Portal Labs
    • Red Hat JBoss Supported Configurations
    • Red Hat Insights
Or troubleshoot an issue.

Select Your Language

  • English
  • Français
  • 한국어
  • 日本語
  • 中文 (中国)

Infrastructure and Management

  • Red Hat Enterprise Linux
  • Red Hat Satellite
  • Red Hat Subscription Management
  • Red Hat Insights
  • Red Hat Ansible Automation Platform

Cloud Computing

  • Red Hat OpenShift
  • Red Hat OpenStack Platform
  • Red Hat OpenShift
  • Red Hat OpenShift AI
  • Red Hat OpenShift Dedicated
  • Red Hat Advanced Cluster Security for Kubernetes
  • Red Hat Advanced Cluster Management for Kubernetes
  • Red Hat Quay
  • Red Hat OpenShift Dev Spaces
  • Red Hat OpenShift Service on AWS

Storage

  • Red Hat Gluster Storage
  • Red Hat Hyperconverged Infrastructure
  • Red Hat Ceph Storage
  • Red Hat OpenShift Data Foundation

Runtimes

  • Red Hat Runtimes
  • Red Hat JBoss Enterprise Application Platform
  • Red Hat Data Grid
  • Red Hat JBoss Web Server
  • Red Hat build of Keycloak
  • Red Hat support for Spring Boot
  • Red Hat build of Node.js
  • Red Hat build of Quarkus

Integration and Automation

  • Red Hat Application Foundations
  • Red Hat Fuse
  • Red Hat AMQ
  • Red Hat 3scale API Management
All Products
Red Hat Product Errata RHSA-2024:5261 - Security Advisory
Issued:
2024-08-13
Updated:
2024-08-13

RHSA-2024:5261 - Security Advisory

  • Overview
  • Updated Packages

Synopsis

Important: kernel security update

Type/Severity

Security Advisory: Important

Red Hat Insights patch analysis

Identify and remediate systems affected by this advisory.

View affected systems

Topic

An update for kernel is now available for Red Hat Enterprise Linux 7.7 Advanced Update Support.

Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.

Description

The kernel packages contain the Linux kernel, the core of any Linux operating
system.

Security Fix(es):

  • kernel: af_unix: Fix null-ptr-deref in unix_stream_sendpage(). (CVE-2023-4622)
  • kernel: KEV - Beaky Buzzard (CVE-2024-36971)

For more details about the security issue(s), including the impact, a CVSS
score, acknowledgments, and other related information, refer to the CVE page(s)
listed in the References section.

Solution

For details on how to apply this update, which includes the changes described in this advisory, refer to:

https://access.redhat.com/articles/11258

The system must be rebooted for this update to take effect.

Affected Products

  • Red Hat Enterprise Linux Server - AUS 7.7 x86_64

Fixes

  • BZ - 2237760 - CVE-2023-4622 kernel: use after free in unix_stream_sendpage
  • BZ - 2292331 - CVE-2024-36971 kernel: net: CVE-2024-36971 kernel: UAF in network route management

CVEs

  • CVE-2023-4622
  • CVE-2024-36971

References

  • https://access.redhat.com/security/updates/classification/#important
Note: More recent versions of these packages may be available. Click a package name for more details.

Red Hat Enterprise Linux Server - AUS 7.7

SRPM
kernel-3.10.0-1062.90.1.el7.src.rpm SHA-256: c281718aeecb5871b8cb889a6c1d0234e0298edb9f1f70c7562d99b346d3941b
x86_64
bpftool-3.10.0-1062.90.1.el7.x86_64.rpm SHA-256: 006f0490e04ddae7b84c10330ce373622c0fe6c1d8b1d89d13c0c82cca4c0ecd
bpftool-debuginfo-3.10.0-1062.90.1.el7.x86_64.rpm SHA-256: 07c562ff2016e1da926b97a344d11562ae5e5ca20ba8929fab9730c23afb4671
bpftool-debuginfo-3.10.0-1062.90.1.el7.x86_64.rpm SHA-256: 07c562ff2016e1da926b97a344d11562ae5e5ca20ba8929fab9730c23afb4671
kernel-3.10.0-1062.90.1.el7.x86_64.rpm SHA-256: 10519fd4fbbb913cdfef24b30f481a41831a5bda1246292688e095e76cf9ad89
kernel-abi-whitelists-3.10.0-1062.90.1.el7.noarch.rpm SHA-256: 0479de88da97ea6187705e87ef5b1bed2f2e9ccfb91aaad0a0a5034ade42fa7c
kernel-debug-3.10.0-1062.90.1.el7.x86_64.rpm SHA-256: 9bb13784b16409dcd0b7909a8c3f7c9c979b67c82d60094fbf30514ecd49f0b5
kernel-debug-debuginfo-3.10.0-1062.90.1.el7.x86_64.rpm SHA-256: ebbf5b8629cc137880083415f9bdc642c1e26c0eb3484a0025d22b28477cba79
kernel-debug-debuginfo-3.10.0-1062.90.1.el7.x86_64.rpm SHA-256: ebbf5b8629cc137880083415f9bdc642c1e26c0eb3484a0025d22b28477cba79
kernel-debug-devel-3.10.0-1062.90.1.el7.x86_64.rpm SHA-256: 4eda28ab9422ebc5e421695ccd0aede7b9ab61eea8d53b421ae46c4f68697820
kernel-debuginfo-3.10.0-1062.90.1.el7.x86_64.rpm SHA-256: afc207835783b8855d5d35a881f6dd3b533b5f44e85405f7370b51930bc4cce3
kernel-debuginfo-3.10.0-1062.90.1.el7.x86_64.rpm SHA-256: afc207835783b8855d5d35a881f6dd3b533b5f44e85405f7370b51930bc4cce3
kernel-debuginfo-common-x86_64-3.10.0-1062.90.1.el7.x86_64.rpm SHA-256: b13cdc2aba43dbe4e30fdd2e66cf24d8a7d826e886fd17c80da6099ebd42020d
kernel-debuginfo-common-x86_64-3.10.0-1062.90.1.el7.x86_64.rpm SHA-256: b13cdc2aba43dbe4e30fdd2e66cf24d8a7d826e886fd17c80da6099ebd42020d
kernel-devel-3.10.0-1062.90.1.el7.x86_64.rpm SHA-256: bc34bac00e639dd06d8099cbdf2a1ba1756ff3b077d773607023157562d77224
kernel-doc-3.10.0-1062.90.1.el7.noarch.rpm SHA-256: 3b367051f20d2303075779fdee6eb6913738b34f00eb5e05f97b8b5a81ff082f
kernel-headers-3.10.0-1062.90.1.el7.x86_64.rpm SHA-256: cd0ab9922ebd1e535b6d72b7e1890facd064b587a6b955cd2816077343b3b382
kernel-tools-3.10.0-1062.90.1.el7.x86_64.rpm SHA-256: f893ce5d6b40fd7d0c0cca2aae3873d5d944f018abb18e2bf1cb5aef7d29b02e
kernel-tools-debuginfo-3.10.0-1062.90.1.el7.x86_64.rpm SHA-256: 0e383aa25068491ef5873a6572e680e9b6a1de56cd2f4202614dcafc1f340b75
kernel-tools-debuginfo-3.10.0-1062.90.1.el7.x86_64.rpm SHA-256: 0e383aa25068491ef5873a6572e680e9b6a1de56cd2f4202614dcafc1f340b75
kernel-tools-libs-3.10.0-1062.90.1.el7.x86_64.rpm SHA-256: 7c68201ce05435443b20c7888a51b4967cfe36d75259395fb6b82c6b0531af45
kernel-tools-libs-devel-3.10.0-1062.90.1.el7.x86_64.rpm SHA-256: 018de570fffc93eb48c3fac4bc72c83d97008f84a4369783025f7173e50b8654
perf-3.10.0-1062.90.1.el7.x86_64.rpm SHA-256: 0e1ddc0fda594e2d684416052395b32147fc1106548ae1937a386ebde363e973
perf-debuginfo-3.10.0-1062.90.1.el7.x86_64.rpm SHA-256: eecf5804889126e58aa40f00ee35b83ab9e4bc45cbf5a20accb557e6aa48bd90
perf-debuginfo-3.10.0-1062.90.1.el7.x86_64.rpm SHA-256: eecf5804889126e58aa40f00ee35b83ab9e4bc45cbf5a20accb557e6aa48bd90
python-perf-3.10.0-1062.90.1.el7.x86_64.rpm SHA-256: 32980964fe6d4d8ec33bb99770aab5ff7e4d5907c27c55566e8de4655be51e80
python-perf-debuginfo-3.10.0-1062.90.1.el7.x86_64.rpm SHA-256: d1358cd8c55698affe7298741149fe0346ab25b79825ebf514d0393fe5852fbd
python-perf-debuginfo-3.10.0-1062.90.1.el7.x86_64.rpm SHA-256: d1358cd8c55698affe7298741149fe0346ab25b79825ebf514d0393fe5852fbd

The Red Hat security contact is secalert@redhat.com. More contact details at https://access.redhat.com/security/team/contact/.

Red Hat LinkedIn YouTube Facebook X, formerly Twitter

Quick Links

  • Downloads
  • Subscriptions
  • Support Cases
  • Customer Service
  • Product Documentation

Help

  • Contact Us
  • Customer Portal FAQ
  • Log-in Assistance

Site Info

  • Trust Red Hat
  • Browser Support Policy
  • Accessibility
  • Awards and Recognition
  • Colophon

Related Sites

  • redhat.com
  • developers.redhat.com
  • connect.redhat.com
  • cloud.redhat.com

Red Hat legal and privacy links

  • About Red Hat
  • Jobs
  • Events
  • Locations
  • Contact Red Hat
  • Red Hat Blog
  • Inclusion at Red Hat
  • Cool Stuff Store
  • Red Hat Summit
© 2025 Red Hat

Red Hat legal and privacy links

  • Privacy statement
  • Terms of use
  • All policies and guidelines
  • Digital accessibility