• kernel-5.14.0-362.24.1.0.2.el9_3 (oel9)
  • 5.14.0-427.42.1.el9_4
  • 2024-11-24 10:37:27
  • 2024-11-26 16:37:40
  • K20241124_03
  • CVE-2023-52581, CVSSv2 Score:
  • Description:

    The patch for this CVE already present in kernel-5.14.0-362.24.1.el9_3 version. The kernel-5.14.0-362.18.1.el9_3 version and below are not vulnerable because they don't have commit 5f68718b34a5 (netfilter: nf_tables: GC transaction API to avoid race with control plane) which introduced the vulnerability.

  • From:
  • CVE-2024-26583, CVSSv2 Score:
  • Description:

    Low-severity patch proven to suffer from stack-unsafety problem when patching during network load.

  • From:
  • CVE-2024-26584, CVSSv2 Score:
  • Description:

    Low-severity patch proven to suffer from stack-unsafety problem when patching during network load.

  • From:
  • CVE-2024-26585, CVSSv2 Score:
  • Description:

    Low-severity patch proven to suffer from stack-unsafety problem when patching during network load.

  • From:
  • CVE-2023-52489, CVSSv2 Score:
  • Description:

    The modified structure mem_section_usage is used only during bootup time. As we patch the changes after booting they will have no effect. Therefore we cannot patch this CVE.

  • From:
  • CVE-2024-26609, CVSSv2 Score:
  • Description:

    CVE has been marked as REJECTED on the NVD website.

  • From:
  • CVE-2024-26737, CVSSv2 Score:
  • Description:

    eBPF: low score UAF with CONFIG_BPF_UNPRIV_DEFAULT_OFF=y by default but needs complex adaptation.

  • From:
  • CVE-2024-35839, CVSSv2 Score:
  • Description:

    Live-patching will introduce network performance degradation in the best case scenario, or even some more serious issues. N/A or Low cvss3 score from NVD or vendors.

  • From:
  • CVE-2024-26720, CVSSv2 Score:
  • Description:

    This CVE introduces a regression and is reverted by CVE-2024-42102 in the same errata

  • From:
  • CVE-2024-41055, CVSSv2 Score:
  • Description:

    Fix for skipped CVE-2023-52489 that modifies structure mem_section_usage only used at boot time

  • From:
  • CVE-2023-28746, CVSSv2 Score:
  • Description:

    RFDS: Medium score vulnerability affecting only Intel Atom CPUs, mitigated via microcode update.

  • From:
  • CVE-2024-39502, CVSSv2 Score:
  • Description:

    Patches a sleepable function, there is a small but non-zero risk of livepatching failure

  • From:
  • CVE-2024-26858, CVSSv2 Score:
  • Description:

    Not vulnerable: mapping mechanism that the bug applies to was introduced in v6.6 upstream (3178308ad4c) and appeared in RHEL9's since -427

  • From:
  • CVE-2024-38593, CVSSv2 Score:
  • Description:

    Not vulnerable: buggy function was introduced in v6.5 upsteam (or RHEL9's 427.13.1), and no similar code patterns existed before for this module

  • From: