Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

Red Hat Enterprise Linux 9 — Vulnerabilities & Security Advisories 21

All 21 CVE vulnerabilities found in Red Hat Enterprise Linux 9, with AI-generated Chinese analysis, references, and POCs.

This page presents a comprehensive aggregation of security vulnerabilities associated with the Red Hat Enterprise Linux 9 operating system, covering a wide spectrum of weakness types and severity tags. It systematically collects data regarding known exploits, ranging from critical remote code execution flaws to lower-severity information disclosure issues, ensuring a thorough overview of the system's security posture. The content specifically encompasses vulnerability records published between January 2023 and the current date, reflecting the evolving threat landscape during this period. Users can leverage this resource to efficiently track vendor advisories issued by Red Hat, allowing them to stay informed about patch releases and remediation strategies. Furthermore, this page enables a deeper understanding of specific weakness classes by providing context on how certain defects impact enterprise-grade Linux environments. Readers can also look up the product’s vulnerability history to identify trends in security flaws over time, facilitating better risk assessment and proactive mitigation planning. This structured approach helps system administrators and security analysts prioritize remediation efforts based on the specific risks relevant to their deployed infrastructure. By centralizing this information, the page serves as a vital tool for maintaining the integrity and stability of RHEL 9 deployments in complex organizational settings.

Vendor: Red Hat

CVE IDTitleCVSSSeverityPublished
CVE-2023-6917 Pcp: unsafe use of directories allows pcp to root privilege escalation CWE-367 6.0 Medium2024-02-28
CVE-2024-1151 Kernel: stack overflow problem in open vswitch kernel module leading to dos CWE-121 5.5 Medium2024-02-11
CVE-2023-6531 Kernel: gc's deletion of an skb races with unix_stream_read_generic() leading to uaf CWE-362 7.0 High2024-01-21
CVE-2023-4001 Grub2: bypass the grub password protection feature CWE-290 6.8 Medium2024-01-15
CVE-2023-6679 Kernel: null pointer dereference in dpll_pin_parent_pin_set() in drivers/dpll/dpll_netlink.c CWE-476 5.5 Medium2023-12-11
CVE-2023-5871 Libnbd: malicious nbd server may crash libnbd CWE-617 5.3 Medium2023-11-27
CVE-2023-4535 Opensc: out-of-bounds read in myeid driver handling encryption using symmetric keys CWE-125 4.5 Medium2023-11-06
CVE-2023-5574 Xorg-x11-server: use-after-free bug in damagedestroy CWE-416 7.0 High2023-10-25
CVE-2023-39191 Kernel: ebpf: insufficient stack type checks in dynptr CWE-20 8.2 High2023-10-04
CVE-2023-3576 Libtiff: memory leak in tiffcrop.c CWE-119 5.5 Medium2023-10-04
CVE-2023-42756 Kernel: netfilter: race condition between ipset_cmd_add and ipset_cmd_swap CWE-362 4.4 Medium2023-09-28
CVE-2023-5215 Libnbd: crash or misbehaviour when nbd server returns an unexpected block size CWE-241 5.3 Medium2023-09-28
CVE-2023-38201 Keylime: challenge-response protocol bypass during agent registration CWE-639 6.5 Medium2023-08-25
CVE-2023-4273 Kernel: exfat: stack overflow in exfat_get_uniname_from_ext_entry CWE-121 6.0 Medium2023-08-09
CVE-2023-4147 Kernel: netfilter: nf_tables_newrule when adding a rule with nfta_rule_chain_id leads to use-after-free CWE-416 7.8 High2023-08-07
CVE-2023-4194 Kernel: tap: tap_open(): correctly initialize socket uid next fix of i_uid to current_fsuid CWE-843 5.5 Medium2023-08-07
CVE-2023-3773 Kernel: xfrm: out-of-bounds read of xfrma_mtimer_thresh nlattr CWE-125 5.5 Medium2023-07-25
CVE-2023-3640 Kernel: x86/mm: a per-cpu entry area leak was identified through the init_cea_offsets function when prefetchnta and prefetcht2 instructions being used for the per-cpu entry area mapping to the user space CWE-203 7.0 High2023-07-24
CVE-2023-3750 Libvirt: improper locking in virstoragepoolobjlistsearch may lead to denial of service CWE-667 6.5 Medium2023-07-24
CVE-2023-38200 Keylime: registrar is subject to a dos against ssl connections CWE-400 7.5 High2023-07-24
CVE-2023-3674 Keylime: attestation failure when the quote's signature does not validate CWE-1283 2.3 Low2023-07-19

All 21 known CVE vulnerabilities affecting Red Hat Enterprise Linux 9 with full Chinese analysis, references, and POCs where available.