• kernel-5.14.0-427.42.1.el9_4 (almalinux9-arm64)
  • 5.14.0-503.22.1.el9_5
  • 2025-01-29 01:31:06
  • 2025-01-29 06:40:50
  • K20250129_03
  • CVE-2023-52451, CVSSv2 Score:
  • Description:

    Out of scope as the patch is for powerpc arch only, x86_64 is not affected

  • From:
  • CVE-2022-48669, CVSSv2 Score:
  • Description:

    Out of scope as the patch is for powerpc arch only, x86_64 is not affected

  • From:
  • CVE-2023-52482, CVSSv2 Score:
  • Description:

    CVE patch is for AMD Inception vulnerability related to Speculative Return Stack Overflow (SRSO)

  • From:
  • CVE-2024-26712, CVSSv2 Score:
  • Description:

    Do not support powerpc build with kasan sanitizer 4a7aee96200ad281a5cc4cf5c7a2e2a49d2b97b0

  • From:
  • CVE-2023-52756, CVSSv2 Score:
  • Description:

    Bug doesn't hit as enum values are just shifted numbers

  • From:
  • CVE-2023-52902, CVSSv2 Score:
  • Description:

    nommu: kernel is not vulnerable. Commit 8220543("nommu: remove uses of VMA linked list") is absent

  • From:
  • CVE-2024-26921, CVSSv2 Score:
  • Description:

    Live-patching will introduce network performance degradation in the best case scenario, or even some more serious issues. N/A or Low cvss3 score from NVD or vendors.

  • From:
  • CVE-2024-35983, CVSSv2 Score:
  • Description:

    Kernel is not vulnerable: commit f2d5dcb4 is absent.

  • From:
  • CVE-2024-26843, CVSSv2 Score:
  • Description:

    EFI Firmware: CVE patch is for EFI firmware which runs at boot time.

  • From:
  • CVE-2023-52634, CVSSv2 Score:
  • Description:

    The patch for this CVE fixing vulnerability which was introduced in kernel v6.7

  • From:
  • CVE-2023-52690, CVSSv2 Score:
  • Description:

    Out of scope as the patch is for powerpc arch only

  • From:
  • CVE-2024-26988, CVSSv2 Score:
  • Description:

    Out of scope as the patch is for vmlinux init sections which are discarded after the boot

  • From:
  • CVE-2024-27404, CVSSv2 Score:
  • Description:

    Complex adaptation required. Network services prevents update because they can sleep in subflow_finish_connect() function.

  • From:
  • CVE-2024-27079, CVSSv2 Score:
  • Description:

    Bug triggers in kdump kernel which we don't patch

  • From:
  • CVE-2024-35918, CVSSv2 Score:
  • Description:

    It is not possible to fix this vulnerability using kernel livepatching because it lies below the system call level.

  • From:
  • CVE-2024-35904, CVSSv2 Score:
  • Description:

    Affects only boot __init stage, already booted kernels are not affected

  • From: