• kernel-uek-5.4.17-2136.306.1.3.el8uek (oel8-uek6)
  • 5.4.17-2136.343.5.1.el8uek
  • 2025-05-22 09:32:07
  • 2025-05-23 12:05:57
  • K20250522_10
  • CVE-2022-21499
  • Description:

    Not affected without certain conditions - Secure Boot, configured kgdb/kdb. Complex adaptation

  • From:
  • CVE-2022-23816
  • Description:

    Livepatching Retbleed may decrease kernel stability and performance. This vulnerability has medium security impact and applies to certain hardware environments only.

  • From:
  • CVE-2022-23825
  • Description:

    Livepatching Retbleed may decrease kernel stability and performance. This vulnerability has medium security impact and applies to certain hardware environments only.

  • From:
  • CVE-2022-29900
  • Description:

    Livepatching Retbleed may decrease kernel stability and performance. This vulnerability has medium security impact and applies to certain hardware environments only.

  • From:
  • CVE-2023-20569
  • Description:

    A low priority AMD Inception vulnerability that affects Zen3/Zen4 & relates to RetBleed fixes requiring microcode updates, we can't do much about it in KCare Infra.

  • From:
  • CVE-2023-4244
  • Description:

    An introduction of required changes through KernelCare could cause unavoidable problems to applications which use netfilter functionality.

  • From:
  • CVE-2024-38661
  • Description:

    Out of scope as the patch is for s390 arch only, x86_64, arm64 is not affected

  • From:
  • CVE-2024-38635
  • Description:

    soundwire: Skipped as code which CVE fixes doesn't exists in older releaes

  • From:
  • CVE-2024-38613
  • Description:

    Out of scope as the patch is for m68k arch only, x86_64, arm64 is not affected

  • From:
  • CVE-2024-39292
  • Description:

    Out of scope: User-mode Linux isn't supported for current kernel

  • From:
  • CVE-2024-40963
  • Description:

    Out of scope as the patch is for MIPS arch only, x86_64 is not affected

  • From:
  • CVE-2024-40974
  • Description:

    Out of scope as the patch is for powerpc arch only, x86_64 is not affected

  • From:
  • CVE-2024-39502
  • Description:

    Patches a sleepable function, there is a small but non-zero risk of livepatching failure

  • From:
  • CVE-2024-36484
  • Description:

    Patches a sleepable function, there is a small but non-zero risk of livepatching failure

  • From:
  • CVE-2024-41068
  • Description:

    Out of scope as the patch is for s390 arch only, x86_64 is not affected

  • From:
  • CVE-2024-46761
  • Description:

    Out of scope: CVE patch is for PCI Hotplug Driver for PowerPC PowerNV platform

  • From:
  • CVE-2024-26921
  • Description:

    Live-patching will introduce network performance degradation in the best case scenario, or even some more serious issues. N/A or Low cvss3 score from NVD or vendors.

  • From:
  • CVE-2024-50194
  • Description:

    Out of scope as the patch is for arm64 arch only, x86_64 not affected

  • From:
  • CVE-2024-26734
  • Description:

    Affects only boot __init stage, already booted kernels are not affected

  • From:
  • CVE-2024-49963
  • Description:

    Out of scope as the patch is for arm64 arch only, x86_64 not affected

  • From:
  • CVE-2024-53165
  • Description:

    Out of scope: SuperH architecture isn't supported for current kernel

  • From:
  • CVE-2024-53181
  • Description:

    Out of scope: User-mode Linux isn't supported for current kernel

  • From:
  • CVE-2024-53183
  • Description:

    Out of scope: User-mode Linux isn't supported for current kernel

  • From: