Skip to navigation Skip to main content

Utilities

  • Subscriptions
  • Downloads
  • Red Hat Console
  • Get Support
Red Hat Customer Portal
  • Subscriptions
  • Downloads
  • Red Hat Console
  • Get Support
  • Products

    Top Products

    • Red Hat Enterprise Linux
    • Red Hat OpenShift
    • Red Hat Ansible Automation Platform
    All Products

    Downloads and Containers

    • Downloads
    • Packages
    • Containers

    Top Resources

    • Documentation
    • Product Life Cycles
    • Product Compliance
    • Errata
  • Knowledge

    Red Hat Knowledge Center

    • Knowledgebase Solutions
    • Knowledgebase Articles
    • Customer Portal Labs
    • Errata

    Top Product Docs

    • Red Hat Enterprise Linux
    • Red Hat OpenShift
    • Red Hat Ansible Automation Platform
    All Product Docs

    Training and Certification

    • About
    • Course Index
    • Certification Index
    • Skill Assessment
  • Security

    Red Hat Product Security Center

    • Security Updates
    • Security Advisories
    • Red Hat CVE Database
    • Errata

    References

    • Security Bulletins
    • Security Measurement
    • Severity Ratings
    • Security Data

    Top Resources

    • Security Labs
    • Backporting Policies
    • Security Blog
  • Support

    Red Hat Support

    • Support Cases
    • Troubleshoot
    • Get Support
    • Contact Red Hat Support

    Red Hat Community Support

    • Customer Portal Community
    • Community Discussions
    • Red Hat Accelerator Program

    Top Resources

    • Product Life Cycles
    • Customer Portal Labs
    • Red Hat JBoss Supported Configurations
    • Red Hat Insights
Or troubleshoot an issue.

Select Your Language

  • English
  • Français
  • 한국어
  • 日本語
  • 中文 (中国)

Infrastructure and Management

  • Red Hat Enterprise Linux
  • Red Hat Satellite
  • Red Hat Subscription Management
  • Red Hat Insights
  • Red Hat Ansible Automation Platform

Cloud Computing

  • Red Hat OpenShift
  • Red Hat OpenStack Platform
  • Red Hat OpenShift
  • Red Hat OpenShift AI
  • Red Hat OpenShift Dedicated
  • Red Hat Advanced Cluster Security for Kubernetes
  • Red Hat Advanced Cluster Management for Kubernetes
  • Red Hat Quay
  • Red Hat OpenShift Dev Spaces
  • Red Hat OpenShift Service on AWS

Storage

  • Red Hat Gluster Storage
  • Red Hat Hyperconverged Infrastructure
  • Red Hat Ceph Storage
  • Red Hat OpenShift Data Foundation

Runtimes

  • Red Hat Runtimes
  • Red Hat JBoss Enterprise Application Platform
  • Red Hat Data Grid
  • Red Hat JBoss Web Server
  • Red Hat build of Keycloak
  • Red Hat support for Spring Boot
  • Red Hat build of Node.js
  • Red Hat build of Quarkus

Integration and Automation

  • Red Hat Application Foundations
  • Red Hat Fuse
  • Red Hat AMQ
  • Red Hat 3scale API Management
All Products
Red Hat Product Errata RHSA-2024:5582 - Security Advisory
Issued:
2024-08-19
Updated:
2024-08-19

RHSA-2024:5582 - Security Advisory

  • Overview
  • Updated Packages

Synopsis

Important: kpatch-patch-4_18_0-372_87_1 and kpatch-patch-4_18_0-372_91_1 security update

Type/Severity

Security Advisory: Important

Red Hat Insights patch analysis

Identify and remediate systems affected by this advisory.

View affected systems

Topic

An update for kpatch-patch-4_18_0-372_87_1 and kpatch-patch-4_18_0-372_91_1 is now available for Red Hat Enterprise Linux 8.6 Update Services for SAP Solutions.

Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.

Description

This is a kernel live patch module which can be loaded by the kpatch command line utility to modify the code of a running kernel. This patch module is targeted for kernel-4.18.0-372.87.1.el8_6.

Security Fix(es):

  • kernel: net: CVE-2024-36971 kernel: UAF in network route management (CVE-2024-36971)
  • kernel: virtio-net: tap: mlx5_core short frame denial of service (CVE-2024-41090)
  • kernel: virtio-net: tun: mlx5_core short frame denial of service (CVE-2024-41091)

For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.

Solution

For details on how to apply this update, which includes the changes described in this advisory, refer to:

https://access.redhat.com/articles/11258

Affected Products

  • Red Hat Enterprise Linux for x86_64 - Extended Update Support Extension 8.6 x86_64
  • Red Hat Enterprise Linux Server for Power LE - Update Services for SAP Solutions 8.6 ppc64le
  • Red Hat Enterprise Linux for x86_64 - Update Services for SAP Solutions 8.6 x86_64

Fixes

  • BZ - 2292331 - CVE-2024-36971 kernel: net: CVE-2024-36971 kernel: UAF in network route management
  • BZ - 2299240 - CVE-2024-41090 kernel: virtio-net: tap: mlx5_core short frame denial of service
  • BZ - 2299336 - CVE-2024-41091 kernel: virtio-net: tun: mlx5_core short frame denial of service

CVEs

  • CVE-2024-36971
  • CVE-2024-41090
  • CVE-2024-41091

References

  • https://access.redhat.com/security/updates/classification/#important
Note: More recent versions of these packages may be available. Click a package name for more details.

Red Hat Enterprise Linux for x86_64 - Extended Update Support Extension 8.6

SRPM
kpatch-patch-4_18_0-372_87_1-1-5.el8_6.src.rpm SHA-256: 22369d7ab82ad9dc0c4d6ad7fcfce02432571cd829da0cd5e96644c313f4eba3
kpatch-patch-4_18_0-372_91_1-1-4.el8_6.src.rpm SHA-256: c6301aaa5b448271e4126ea0020ee8ba2c8209580daccdf0b914b72a92f59fa9
x86_64
kpatch-patch-4_18_0-372_87_1-1-5.el8_6.x86_64.rpm SHA-256: ece0fd194b300b46f2dd6faa051e8489ea63cbcc212ae2ad71f455f205e62da8
kpatch-patch-4_18_0-372_87_1-debuginfo-1-5.el8_6.x86_64.rpm SHA-256: 2be3d6b23633833a89a3574f441614832af26e191bf43ae1becc36c001ee370d
kpatch-patch-4_18_0-372_87_1-debugsource-1-5.el8_6.x86_64.rpm SHA-256: b7860c0d81b0e48581ebefdbf531f1c9f97797c83a4dfc055f36d4da1e8bafae
kpatch-patch-4_18_0-372_91_1-1-4.el8_6.x86_64.rpm SHA-256: ab536dddf3c3ac704dbd083382efccfbb1ef330cec0f992fb07ad4c4d3f59e2f
kpatch-patch-4_18_0-372_91_1-debuginfo-1-4.el8_6.x86_64.rpm SHA-256: 2a8001366b052bc49235ff5e052419bc9a085e014a136a75baec1e042810b7ac
kpatch-patch-4_18_0-372_91_1-debugsource-1-4.el8_6.x86_64.rpm SHA-256: 6ad5356a064e44b3f81f9f8f0268f6a3622772c04199d05e04304a1c9461c3c9

Red Hat Enterprise Linux Server for Power LE - Update Services for SAP Solutions 8.6

SRPM
kpatch-patch-4_18_0-372_87_1-1-5.el8_6.src.rpm SHA-256: 22369d7ab82ad9dc0c4d6ad7fcfce02432571cd829da0cd5e96644c313f4eba3
kpatch-patch-4_18_0-372_91_1-1-4.el8_6.src.rpm SHA-256: c6301aaa5b448271e4126ea0020ee8ba2c8209580daccdf0b914b72a92f59fa9
ppc64le
kpatch-patch-4_18_0-372_87_1-1-5.el8_6.ppc64le.rpm SHA-256: a5bd50686e74d08c924aec7ae7bc29e181cf148bb03bcb91f0b8856ef9523716
kpatch-patch-4_18_0-372_87_1-debuginfo-1-5.el8_6.ppc64le.rpm SHA-256: f6610f35e81e525f0faaa819697feb1885501d59f893f6eeddc1a4db06021843
kpatch-patch-4_18_0-372_87_1-debugsource-1-5.el8_6.ppc64le.rpm SHA-256: fac49b21ae5030be8ae0a0c7f0272507f6f136eec411b0a3b14088d40a565cb7
kpatch-patch-4_18_0-372_91_1-1-4.el8_6.ppc64le.rpm SHA-256: 6f57eaef979e7077f5d9512c953c2ce70c03d06c11e58ea05d9bf1fdc24e947a
kpatch-patch-4_18_0-372_91_1-debuginfo-1-4.el8_6.ppc64le.rpm SHA-256: dc425e1fe5a5391972cc8b56907d79675dac4a64ab308a68f8a5f0c76cefc410
kpatch-patch-4_18_0-372_91_1-debugsource-1-4.el8_6.ppc64le.rpm SHA-256: 2715f9d53880cccf9eae2ca5b08a1ee57dacd63402f566de003a0b626bbff3a1

Red Hat Enterprise Linux for x86_64 - Update Services for SAP Solutions 8.6

SRPM
kpatch-patch-4_18_0-372_87_1-1-5.el8_6.src.rpm SHA-256: 22369d7ab82ad9dc0c4d6ad7fcfce02432571cd829da0cd5e96644c313f4eba3
kpatch-patch-4_18_0-372_91_1-1-4.el8_6.src.rpm SHA-256: c6301aaa5b448271e4126ea0020ee8ba2c8209580daccdf0b914b72a92f59fa9
x86_64
kpatch-patch-4_18_0-372_87_1-1-5.el8_6.x86_64.rpm SHA-256: ece0fd194b300b46f2dd6faa051e8489ea63cbcc212ae2ad71f455f205e62da8
kpatch-patch-4_18_0-372_87_1-debuginfo-1-5.el8_6.x86_64.rpm SHA-256: 2be3d6b23633833a89a3574f441614832af26e191bf43ae1becc36c001ee370d
kpatch-patch-4_18_0-372_87_1-debugsource-1-5.el8_6.x86_64.rpm SHA-256: b7860c0d81b0e48581ebefdbf531f1c9f97797c83a4dfc055f36d4da1e8bafae
kpatch-patch-4_18_0-372_91_1-1-4.el8_6.x86_64.rpm SHA-256: ab536dddf3c3ac704dbd083382efccfbb1ef330cec0f992fb07ad4c4d3f59e2f
kpatch-patch-4_18_0-372_91_1-debuginfo-1-4.el8_6.x86_64.rpm SHA-256: 2a8001366b052bc49235ff5e052419bc9a085e014a136a75baec1e042810b7ac
kpatch-patch-4_18_0-372_91_1-debugsource-1-4.el8_6.x86_64.rpm SHA-256: 6ad5356a064e44b3f81f9f8f0268f6a3622772c04199d05e04304a1c9461c3c9

The Red Hat security contact is secalert@redhat.com. More contact details at https://access.redhat.com/security/team/contact/.

Red Hat LinkedIn YouTube Facebook X, formerly Twitter

Quick Links

  • Downloads
  • Subscriptions
  • Support Cases
  • Customer Service
  • Product Documentation

Help

  • Contact Us
  • Customer Portal FAQ
  • Log-in Assistance

Site Info

  • Trust Red Hat
  • Browser Support Policy
  • Accessibility
  • Awards and Recognition
  • Colophon

Related Sites

  • redhat.com
  • developers.redhat.com
  • connect.redhat.com
  • cloud.redhat.com

Red Hat legal and privacy links

  • About Red Hat
  • Jobs
  • Events
  • Locations
  • Contact Red Hat
  • Red Hat Blog
  • Inclusion at Red Hat
  • Cool Stuff Store
  • Red Hat Summit
© 2025 Red Hat

Red Hat legal and privacy links

  • Privacy statement
  • Terms of use
  • All policies and guidelines
  • Digital accessibility