• kernel-5.14.0-284.11.1.el9_2 (rhel9)
  • 5.14.0-427.28.1.el9_4
  • 2024-08-19 13:00:22
  • 2024-08-27 06:42:29
  • K20240819_11
  • CVE-2023-1206, CVSSv2 Score:
  • Description:

    This is a low priority CVE & the patch impacts many critical components of the networking subsystem & it requires multiple complex adaptations in those components to avoid losing existing connections on patch/unpatch.

  • From:
  • CVE-2023-0597, CVSSv2 Score:
  • Description:

    Medium severity vulnerability CVE requiring extremely complex adaptation (if at all possible)

  • From:
  • CVE-2022-3565, CVSSv2 Score:
  • Description:

    In RHEL9 (and derivatives) isdn/mISDN driver is absent, not compiled.

  • From:
  • CVE-2023-39191, CVSSv2 Score:
  • Description:

    The fix consists of several patch-series and mix refactoring/bug-fixes/security-fixes/features for bpf subsystem. Dedicated security-fixes introduce crashes within newer bpf kselftests and the whole patch-series is not suitable for live-patching. At the same time the scope is limited to el9_2 only and is mitigated by the default kernel configuration (CONFIG_BPF_UNPRIV_DEFAULT_OFF=y).

  • From:
  • CVE-2023-4015, CVSSv2 Score:
  • Description:

    kernel-5.14.0-284.11.1.el9_2 and earlier are not vulnerable because they don't have the commit 4bedf9eee016 (netfilter: nf_tables: fix chain binding transaction logic) that introduced the vulnerability

  • From:
  • CVE-2023-6679, CVSSv2 Score:
  • Description:

    Affected device driver does not exist in supported kernels.

  • From:
  • CVE-2023-4244, CVSSv2 Score:
  • Description:

    An introduction of required changes through KernelCare could cause unavoidable problems to applications which use netfilter functionality.

  • From:
  • CVE-2024-0193, CVSSv2 Score:
  • Description:

    Vulnerable commit 5f68718b34a5 (netfilter: nf_tables: GC transaction API to avoid race with control plane) was introduced later than kernel-5.14.0-362.18.1.el9_3. None of our kernels are vulnerable.

  • From:
  • CVE-2023-52581, CVSSv2 Score:
  • Description:

    The patch for this CVE already present in kernel-5.14.0-362.24.1.el9_3 version. The kernel-5.14.0-362.18.1.el9_3 version and below are not vulnerable because they don't have commit 5f68718b34a5 (netfilter: nf_tables: GC transaction API to avoid race with control plane) which introduced the vulnerability.

  • From:
  • CVE-2023-4133, CVSSv2 Score:
  • Description:

    Complex adaptation required to add timer_shutdown_sync() in timers subsystem.

  • From:
  • CVE-2024-26583, CVSSv2 Score:
  • Description:

    Low-severity patch proven to suffer from stack-unsafety problem when patching during network load.

  • From:
  • CVE-2024-26584, CVSSv2 Score:
  • Description:

    Low-severity patch proven to suffer from stack-unsafety problem when patching during network load.

  • From:
  • CVE-2024-26585, CVSSv2 Score:
  • Description:

    Low-severity patch proven to suffer from stack-unsafety problem when patching during network load.

  • From:
  • CVE-2023-52489, CVSSv2 Score:
  • Description:

    The modified structure mem_section_usage is used only during bootup time. As we patch the changes after booting they will have no effect. Therefore we cannot patch this CVE.

  • From:
  • CVE-2023-42756, CVSSv2 Score:
  • Description:

    The given kernel version isn't vulnerable (Netfilter).

  • From:
  • CVE-2024-26609, CVSSv2 Score:
  • Description:

    CVE has been marked as REJECTED on the NVD website.

  • From:
  • CVE-2024-26858, CVSSv2 Score:
  • Description:

    Not vulnerable: mapping mechanism that the bug applies to was introduced in v6.6 upstream (3178308ad4c) and appeared in RHEL9's since -427

  • From:
  • CVE-2024-38543, CVSSv2 Score:
  • Description:

    Not vulnerable: function with the buggy code `dmirror_device_evict_chunk()` exists since 362.8.1

  • From:
  • CVE-2024-38593, CVSSv2 Score:
  • Description:

    Not vulnerable: buggy function was introduced in v6.5 upsteam (or RHEL9's 427.13.1), and no similar code patterns existed before for this module

  • From: