• kernel-4.18.0-240.el8 (oel8)
  • 4.18.0-553.5.1.el8_10
  • 2024-06-19 16:10:35
  • 2024-06-25 09:21:21
  • K20240619_20
  • CVE-2020-12362, CVSSv2 Score:
  • Description:

    Mitigation is made with intel firmware update, el8 kernels also need 'i915.enable_guc' specified in cmdline to be affected

  • From:
  • CVE-2021-3501, CVSSv2 Score:
  • Description:

    The problematic patch was introduced only in the 8.4 release, >=kernel-4.18.0-305.el8

  • From:
  • CVE-2021-3543, CVSSv2 Score:
  • Description:

    The problematic patch was introduced only in the 8.4 release, >=kernel-4.18.0-305.el8

  • From:
  • CVE-2020-26541, CVSSv2 Score:
  • Description:

    Affects only secure boot __init stage, already booted kernels are not affected

  • From:
  • CVE-2021-37576, CVSSv2 Score:
  • Description:

    Out of scope as the patch is for powerpc arch only, x86_64 is not affected

  • From:
  • CVE-2020-27777, CVSSv2 Score:
  • Description:

    Out of scope as the patch is for powerpc arch only, x86_64 is not affected

  • From:
  • CVE-2021-26401, CVSSv2 Score:
  • Description:

    An introduction of required changes through KernelCare could cause unavoidable problems to applications which use unprivileged eBPF.

  • From:
  • CVE-2021-43056, CVSSv2 Score:
  • Description:

    Out of scope as the patch is for powerpc arch only, x86_64 is not affected

  • From:
  • CVE-2022-0001, CVSSv2 Score:
  • Description:

    An introduction of required changes through KernelCare could cause unavoidable problems to applications which use unprivileged eBPF.

  • From:
  • CVE-2022-0002, CVSSv2 Score:
  • Description:

    An introduction of required changes through KernelCare could cause unavoidable problems to applications which use unprivileged eBPF.

  • From:
  • CVE-2023-1829, CVSSv2 Score:
  • Description:

    Complex adaptation is required, mainline retired tcindex.

  • From:
  • CVE-2023-1206, CVSSv2 Score:
  • Description:

    This is a low priority CVE & the patch impacts many critical components of the networking subsystem & it requires multiple complex adaptations in those components to avoid losing existing connections on patch/unpatch.

  • From:
  • CVE-2023-0597, CVSSv2 Score:
  • Description:

    Medium severity vulnerability CVE requiring extremely complex adaptation (if at all possible)

  • From:
  • CVE-2023-20569, CVSSv2 Score:
  • Description:

    A low priority AMD Inception vulnerability that affects Zen3/Zen4 & relates to RetBleed fixes requiring microcode updates, we can't do much about it in KCare Infra.

  • From:
  • CVE-2023-4244, CVSSv2 Score:
  • Description:

    An introduction of required changes through KernelCare could cause unavoidable problems to applications which use netfilter functionality.

  • From:
  • CVE-2023-52581, CVSSv2 Score:
  • Description:

    The patch for this CVE already present in kernel-5.14.0-362.24.1.el9_3 version. The kernel-5.14.0-362.18.1.el9_3 version and below are not vulnerable because they don't have commit 5f68718b34a5 (netfilter: nf_tables: GC transaction API to avoid race with control plane) which introduced the vulnerability.

  • From:
  • CVE-2023-4133, CVSSv2 Score:
  • Description:

    Complex adaptation required to add timer_shutdown_sync() in timers subsystem.

  • From:
  • CVE-2022-0500, CVSSv2 Score:
  • Description:

    Complex adaptation required. Requires changes a lot of constants

  • From:
  • CVE-2023-52489, CVSSv2 Score:
  • Description:

    The modified structure mem_section_usage is used only during bootup time. As we patch the changes after booting they will have no effect. Therefore we cannot patch this CVE.

  • From:
  • CVE-2023-52598, CVSSv2 Score:
  • Description:

    Out of scope as the patch is for s390 arch only, x86_64 is not affected

  • From:
  • CVE-2022-48669, CVSSv2 Score:
  • Description:

    Out of scope as the patch is for powerpc arch only, x86_64 is not affected

  • From:
  • CVE-2023-52607, CVSSv2 Score:
  • Description:

    Out of scope as the patch is for powerpc arch only, x86_64 is not affected

  • From:
  • CVE-2022-23816, CVSSv2 Score:
  • Description:

    Livepatching Retbleed may decrease kernel stability and performance. This vulnerability has medium security impact and applies to certain hardware environments only.

  • From:
  • CVE-2022-23825, CVSSv2 Score:
  • Description:

    Livepatching Retbleed may decrease kernel stability and performance. This vulnerability has medium security impact and applies to certain hardware environments only.

  • From:
  • CVE-2022-26373, CVSSv2 Score:
  • Description:

    Livepatching Retbleed may decrease the stability and performance of the kernel, while vulnerability has a medium security impact and only for a certain hardware environment.

  • From:
  • CVE-2022-29900, CVSSv2 Score:
  • Description:

    Livepatching Retbleed may decrease kernel stability and performance. This vulnerability has medium security impact and applies to certain hardware environments only.

  • From:
  • CVE-2022-29901, CVSSv2 Score:
  • Description:

    Livepatching Retbleed may decrease the stability and performance of the kernel, while vulnerability has a medium security impact and only for a certain hardware environment.

  • From: