• kernel-uek-5.4.17-2136.307.3.5.el7uek (oel7-uek6)
  • 5.4.17-2136.344.4.1.el7uek
  • 2025-07-05 23:02:08
  • 2025-07-08 11:21:55
  • K20250706_07
  • CVE-2022-23816, CVSSv2 Score:
  • Description:

    Livepatching Retbleed may decrease kernel stability and performance. This vulnerability has medium security impact and applies to certain hardware environments only.

  • From:
  • CVE-2022-23825, CVSSv2 Score:
  • Description:

    Livepatching Retbleed may decrease kernel stability and performance. This vulnerability has medium security impact and applies to certain hardware environments only.

  • From:
  • CVE-2022-29900, CVSSv2 Score:
  • Description:

    Livepatching Retbleed may decrease kernel stability and performance. This vulnerability has medium security impact and applies to certain hardware environments only.

  • From:
  • CVE-2023-20569, CVSSv2 Score:
  • Description:

    A low priority AMD Inception vulnerability that affects Zen3/Zen4 & relates to RetBleed fixes requiring microcode updates, we can't do much about it in KCare Infra.

  • From:
  • CVE-2023-4244, CVSSv2 Score:
  • Description:

    An introduction of required changes through KernelCare could cause unavoidable problems to applications which use netfilter functionality.

  • From:
  • CVE-2024-38583, CVSSv2 Score:
  • Description:

    nilfs2: We cannot patch functions that sleep in kthread().

  • From:
  • CVE-2024-38661, CVSSv2 Score:
  • Description:

    Out of scope as the patch is for s390 arch only, x86_64, arm64 is not affected

  • From:
  • CVE-2024-38635, CVSSv2 Score:
  • Description:

    soundwire: Skipped as code which CVE fixes doesn't exists in older releaes

  • From:
  • CVE-2024-38613, CVSSv2 Score:
  • Description:

    Out of scope as the patch is for m68k arch only, x86_64, arm64 is not affected

  • From:
  • CVE-2024-39292, CVSSv2 Score:
  • Description:

    Out of scope: User-mode Linux isn't supported for current kernel

  • From:
  • CVE-2024-36894, CVSSv2 Score:
  • Description:

    USB composite function controllers related patch

  • From:
  • CVE-2024-40963, CVSSv2 Score:
  • Description:

    Out of scope as the patch is for MIPS arch only, x86_64 is not affected

  • From:
  • CVE-2024-40974, CVSSv2 Score:
  • Description:

    Out of scope as the patch is for powerpc arch only, x86_64 is not affected

  • From:
  • CVE-2024-39502, CVSSv2 Score:
  • Description:

    Patches a sleepable function, there is a small but non-zero risk of livepatching failure

  • From:
  • CVE-2024-36484, CVSSv2 Score:
  • Description:

    Patches a sleepable function, there is a small but non-zero risk of livepatching failure

  • From:
  • CVE-2024-41068, CVSSv2 Score:
  • Description:

    Out of scope as the patch is for s390 arch only, x86_64 is not affected

  • From:
  • CVE-2024-44968, CVSSv2 Score:
  • Description:

    This CVE was introduced and fixed in the same kernel verison

  • From:
  • CVE-2024-46761, CVSSv2 Score:
  • Description:

    Out of scope: CVE patch is for PCI Hotplug Driver for PowerPC PowerNV platform

  • From:
  • CVE-2024-45021, CVSSv2 Score:
  • Description:

    Patches a function that is sleepable due to a call to vfs_poll

  • From:
  • CVE-2024-50228, CVSSv2 Score:
  • Description:

    Vendor reverted in d1aa0c04294 as it causes deadlocks

  • From:
  • CVE-2024-26921, CVSSv2 Score:
  • Description:

    Live-patching will introduce network performance degradation in the best case scenario, or even some more serious issues. N/A or Low cvss3 score from NVD or vendors.

  • From:
  • CVE-2024-50194, CVSSv2 Score:
  • Description:

    Out of scope as the patch is for arm64 arch only, x86_64 not affected

  • From:
  • CVE-2024-26734, CVSSv2 Score:
  • Description:

    Affects only boot __init stage, already booted kernels are not affected

  • From:
  • CVE-2024-49963, CVSSv2 Score:
  • Description:

    Out of scope as the patch is for arm64 arch only, x86_64 not affected

  • From:
  • CVE-2024-53165, CVSSv2 Score:
  • Description:

    Out of scope: SuperH architecture isn't supported for current kernel

  • From:
  • CVE-2024-53181, CVSSv2 Score:
  • Description:

    Out of scope: User-mode Linux isn't supported for current kernel

  • From:
  • CVE-2024-53183, CVSSv2 Score:
  • Description:

    Out of scope: User-mode Linux isn't supported for current kernel

  • From:
  • CVE-2024-56539, CVSSv2 Score:
  • Description:

    The patch only fixes warning, no functional changes.

  • From:
  • CVE-2025-22073, CVSSv2 Score:
  • Description:

    Out of scope: PowerPC architecture isn't supported for current kernel

  • From:
  • CVE-2025-22071, CVSSv2 Score:
  • Description:

    Out of scope: PowerPC architecture isn't supported for current kernel

  • From: