In the Linux kernel, the following vulnerability has been resolved: r8169: Fix possible ring buffer corruption on fragmented Tx packets. The Linux kernel CVE team has assigned CVE-2024-38586 to this issue. Upstream advisory: https://lore.kernel.org/linux-cve-announce/2024061949-CVE-2024-38586-70d6@gregkh/T
This issue has been addressed in the following products: Red Hat Enterprise Linux 9 Via RHSA-2024:4583 https://access.redhat.com/errata/RHSA-2024:4583
This issue has been addressed in the following products: Red Hat Enterprise Linux 9.2 Extended Update Support Via RHSA-2024:5365 https://access.redhat.com/errata/RHSA-2024:5365
This issue has been addressed in the following products: Red Hat Enterprise Linux 9.2 Extended Update Support Via RHSA-2024:5364 https://access.redhat.com/errata/RHSA-2024:5364
This issue has been addressed in the following products: Red Hat Enterprise Linux 8.8 Extended Update Support Via RHSA-2024:6206 https://access.redhat.com/errata/RHSA-2024:6206
This issue has been addressed in the following products: Red Hat Enterprise Linux 8.6 Advanced Mission Critical Update Support Red Hat Enterprise Linux 8.6 Update Services for SAP Solutions Red Hat Enterprise Linux 8.6 Telecommunications Update Service Via RHSA-2024:6297 https://access.redhat.com/errata/RHSA-2024:6297
This issue has been addressed in the following products: Red Hat Enterprise Linux 8 Via RHSA-2024:8870 https://access.redhat.com/errata/RHSA-2024:8870
This issue has been addressed in the following products: Red Hat Enterprise Linux 8 Via RHSA-2024:8856 https://access.redhat.com/errata/RHSA-2024:8856