• kernel-5.14.0-284.18.1.el9_2 (almalinux9)
  • 5.14.0-503.35.1.el9_5
  • 2025-04-16 23:07:50
  • 2025-04-18 09:09:16
  • K20250417_03
  • CVE-2023-1206, CVSSv2 Score:
  • Description:

    This is a low priority CVE & the patch impacts many critical components of the networking subsystem & it requires multiple complex adaptations in those components to avoid losing existing connections on patch/unpatch.

  • From:
  • CVE-2023-0597, CVSSv2 Score:
  • Description:

    Medium severity vulnerability CVE requiring extremely complex adaptation (if at all possible)

  • From:
  • CVE-2022-3565, CVSSv2 Score:
  • Description:

    In RHEL9 (and derivatives) isdn/mISDN driver is absent, not compiled.

  • From:
  • CVE-2023-39191, CVSSv2 Score:
  • Description:

    The fix consists of several patch-series and mix refactoring/bug-fixes/security-fixes/features for bpf subsystem. Dedicated security-fixes introduce crashes within newer bpf kselftests and the whole patch-series is not suitable for live-patching. At the same time the scope is limited to el9_2 only and is mitigated by the default kernel configuration (CONFIG_BPF_UNPRIV_DEFAULT_OFF=y).

  • From:
  • CVE-2023-4015, CVSSv2 Score:
  • Description:

    kernel-5.14.0-284.11.1.el9_2 and earlier are not vulnerable because they don't have the commit 4bedf9eee016 (netfilter: nf_tables: fix chain binding transaction logic) that introduced the vulnerability

  • From:
  • CVE-2023-6679, CVSSv2 Score:
  • Description:

    Affected device driver does not exist in supported kernels.

  • From:
  • CVE-2023-4244, CVSSv2 Score:
  • Description:

    An introduction of required changes through KernelCare could cause unavoidable problems to applications which use netfilter functionality.

  • From:
  • CVE-2024-0193, CVSSv2 Score:
  • Description:

    Vulnerable commit 5f68718b34a5 (netfilter: nf_tables: GC transaction API to avoid race with control plane) was introduced later than kernel-5.14.0-362.18.1.el9_3. None of our kernels are vulnerable.

  • From:
  • CVE-2023-52581, CVSSv2 Score:
  • Description:

    The patch for this CVE already present in kernel-5.14.0-362.24.1.el9_3 version. The kernel-5.14.0-362.18.1.el9_3 version and below are not vulnerable because they don't have commit 5f68718b34a5 (netfilter: nf_tables: GC transaction API to avoid race with control plane) which introduced the vulnerability.

  • From:
  • CVE-2023-4133, CVSSv2 Score:
  • Description:

    Complex adaptation required to add timer_shutdown_sync() in timers subsystem.

  • From:
  • CVE-2024-26583, CVSSv2 Score:
  • Description:

    Low-severity patch proven to suffer from stack-unsafety problem when patching during network load.

  • From:
  • CVE-2024-26584, CVSSv2 Score:
  • Description:

    Low-severity patch proven to suffer from stack-unsafety problem when patching during network load.

  • From:
  • CVE-2024-26585, CVSSv2 Score:
  • Description:

    Low-severity patch proven to suffer from stack-unsafety problem when patching during network load.

  • From:
  • CVE-2023-52489, CVSSv2 Score:
  • Description:

    The modified structure mem_section_usage is used only during bootup time. As we patch the changes after booting they will have no effect. Therefore we cannot patch this CVE.

  • From:
  • CVE-2023-42756, CVSSv2 Score:
  • Description:

    The given kernel version isn't vulnerable (Netfilter).

  • From:
  • CVE-2024-26609, CVSSv2 Score:
  • Description:

    CVE has been marked as REJECTED on the NVD website.

  • From:
  • CVE-2024-26737, CVSSv2 Score:
  • Description:

    eBPF: low score UAF with CONFIG_BPF_UNPRIV_DEFAULT_OFF=y by default but needs complex adaptation.

  • From:
  • CVE-2024-35839, CVSSv2 Score:
  • Description:

    Live-patching will introduce network performance degradation in the best case scenario, or even some more serious issues. N/A or Low cvss3 score from NVD or vendors.

  • From:
  • CVE-2024-26720, CVSSv2 Score:
  • Description:

    This CVE introduces a regression and is reverted by CVE-2024-42102 in the same errata

  • From:
  • CVE-2024-41055, CVSSv2 Score:
  • Description:

    The patch affects too much kernel code. Low impact CVE.

  • From:
  • CVE-2023-28746, CVSSv2 Score:
  • Description:

    RFDS: Medium score vulnerability affecting only Intel Atom CPUs, mitigated via microcode update.

  • From:
  • CVE-2024-39502, CVSSv2 Score:
  • Description:

    Patches a sleepable function, there is a small but non-zero risk of livepatching failure

  • From:
  • CVE-2024-42272, CVSSv2 Score:
  • Description:

    el9 kernels are not vulnerable: no versions with commit 88c67aeb1407 only.

  • From:
  • CVE-2023-52451, CVSSv2 Score:
  • Description:

    Out of scope as the patch is for powerpc arch only, x86_64 is not affected

  • From:
  • CVE-2024-36932, CVSSv2 Score:
  • Description:

    Kernel versions older than 5.14.0-503.11.1.el9_5 are not affected

  • From:
  • CVE-2022-48669, CVSSv2 Score:
  • Description:

    Out of scope as the patch is for powerpc arch only, x86_64 is not affected

  • From:
  • CVE-2023-52482, CVSSv2 Score:
  • Description:

    CVE patch is for AMD Inception vulnerability related to Speculative Return Stack Overflow (SRSO)

  • From:
  • CVE-2024-26712, CVSSv2 Score:
  • Description:

    Do not support powerpc build with kasan sanitizer 4a7aee96200ad281a5cc4cf5c7a2e2a49d2b97b0

  • From:
  • CVE-2023-52756, CVSSv2 Score:
  • Description:

    Bug doesn't hit as enum values are just shifted numbers

  • From:
  • CVE-2023-52902, CVSSv2 Score:
  • Description:

    nommu: kernel is not vulnerable. Commit 8220543("nommu: remove uses of VMA linked list") is absent

  • From:
  • CVE-2024-26921, CVSSv2 Score:
  • Description:

    Live-patching will introduce network performance degradation in the best case scenario, or even some more serious issues. N/A or Low cvss3 score from NVD or vendors.

  • From:
  • CVE-2024-35983, CVSSv2 Score:
  • Description:

    Kernel is not vulnerable: commit f2d5dcb4 is absent.

  • From:
  • CVE-2024-26843, CVSSv2 Score:
  • Description:

    EFI Firmware: CVE patch is for EFI firmware which runs at boot time.

  • From:
  • CVE-2024-36936, CVSSv2 Score:
  • Description:

    Boot time fix cannot be fixed with live-patching

  • From:
  • CVE-2023-52634, CVSSv2 Score:
  • Description:

    The patch for this CVE fixing vulnerability which was introduced in kernel v6.7

  • From:
  • CVE-2023-52619, CVSSv2 Score:
  • Description:

    Complex adaptation required. x86 and amd64 architectures are not affected. Issues triggers while dumping after another crash.

  • From:
  • CVE-2023-52690, CVSSv2 Score:
  • Description:

    Out of scope as the patch is for powerpc arch only

  • From:
  • CVE-2024-26988, CVSSv2 Score:
  • Description:

    Out of scope as the patch is for vmlinux init sections which are discarded after the boot

  • From:
  • CVE-2024-27404, CVSSv2 Score:
  • Description:

    Complex adaptation required. Network services prevents update because they can sleep in subflow_finish_connect() function.

  • From:
  • CVE-2024-27079, CVSSv2 Score:
  • Description:

    Bug triggers in kdump kernel which we don't patch

  • From:
  • CVE-2024-35918, CVSSv2 Score:
  • Description:

    It is not possible to fix this vulnerability using kernel livepatching because it lies below the system call level.

  • From:
  • CVE-2024-35904, CVSSv2 Score:
  • Description:

    Affects only __init function for a built-in component, so patching will have no effect

  • From:
  • CVE-2024-36956, CVSSv2 Score:
  • Description:

    Thermal debugfs isn't present on redhat kernels.

  • From:
  • CVE-2024-36961, CVSSv2 Score:
  • Description:

    Thermal debugfs isn't present on redhat kernels.

  • From:
  • CVE-2024-40907, CVSSv2 Score:
  • Description:

    Intoduced in the same kernel version with the fix

  • From:
  • CVE-2024-40925, CVSSv2 Score:
  • Description:

    Intoduced in the same kernel version with the fix

  • From:
  • CVE-2024-41008, CVSSv2 Score:
  • Description:

    Complex adaptation required, low score patch for non critical subsystem amdgpu

  • From:
  • CVE-2024-40965, CVSSv2 Score:
  • Description:

    complex adaptation required for el9-arm64, el9-x86 not affected

  • From:
  • CVE-2024-26650, CVSSv2 Score:
  • Description:

    Affected p2sb driver is not present in kernel v5.14.0

  • From:
  • CVE-2024-35812, CVSSv2 Score:
  • Description:

    Patch for this CVE has been reverted. Hence skipped

  • From:
  • CVE-2024-26638, CVSSv2 Score:
  • Description:

    nbd: Low-score CVE. Patched function is called from a kthread and sleeps, which may prevent patching/unpatching.

  • From:
  • CVE-2024-26646, CVSSv2 Score:
  • Description:

    Affects only boot __init stage, already booted kernels are not affected

  • From:
  • CVE-2023-52624, CVSSv2 Score:
  • Description:

    older kernels do not have support for DisplayCoreNext 3.5

  • From:
  • CVE-2023-52625, CVSSv2 Score:
  • Description:

    older kernels do not have support for DisplayCoreNext 3.5

  • From:
  • CVE-2024-35938, CVSSv2 Score:
  • Description:

    wifi:ath11k, low score CVE that needs complex adaptation but decreasing MHI Bus' buf-len isn't a typical security fix.

  • From:
  • CVE-2024-41007, CVSSv2 Score:
  • Description:

    Low-score CVE which might introduce problems in net subsystem

  • From:
  • CVE-2024-26812, CVSSv2 Score:
  • Description:

    Complex adaptation required, not worth the effort for 4.4 score CVE

  • From:
  • CVE-2024-41084, CVSSv2 Score:
  • Description:

    None of our RHEL9 kernels are affected by the bug

  • From:
  • CVE-2024-42226, CVSSv2 Score:
  • Description:

    Patch introduced regression and was reverted later.

  • From:
  • CVE-2021-47505, CVSSv2 Score:
  • Description:

    A complex adaptation is needed which is not possible to implement safely. Only Android OS is affected. Low score CVE.

  • From:
  • CVE-2024-50255, CVSSv2 Score:
  • Description:

    Bluetooth subsystem. Patched function may wait for a while, which may prevent patching/unpatching.

  • From:
  • CVE-2024-50192, CVSSv2 Score:
  • Description:

    arm64: Low-score CVE requiring adaptation that is hard to implement; targets very rare hardware

  • From:
  • CVE-2025-21785, CVSSv2 Score:
  • Description:

    Out of scope: ARM64 architecture isn't supported for current kernel

  • From:
  • CVE-2024-26858, CVSSv2 Score:
  • Description:

    Not vulnerable: mapping mechanism that the bug applies to was introduced in v6.6 upstream (3178308ad4c) and appeared in RHEL9's since -427

  • From:
  • CVE-2024-38543, CVSSv2 Score:
  • Description:

    Not vulnerable: function with the buggy code `dmirror_device_evict_chunk()` exists since 362.8.1

  • From:
  • CVE-2024-38593, CVSSv2 Score:
  • Description:

    Not vulnerable: buggy function was introduced in v6.5 upsteam (or RHEL9's 427.13.1), and no similar code patterns existed before for this module

  • From: