• kernel-4.18.0-372.26.1.0.1.el8_6 (oel8)
  • 4.18.0-553.36.1.el8_10
  • 2025-01-27 17:17:41
  • 2025-01-29 06:30:34
  • K20250127_05
  • CVE-2023-1206
  • Description:

    This is a low priority CVE & the patch impacts many critical components of the networking subsystem & it requires multiple complex adaptations in those components to avoid losing existing connections on patch/unpatch.

  • From:
  • CVE-2023-0597
  • Description:

    Medium severity vulnerability CVE requiring extremely complex adaptation (if at all possible)

  • From:
  • CVE-2023-20569
  • Description:

    A low priority AMD Inception vulnerability that affects Zen3/Zen4 & relates to RetBleed fixes requiring microcode updates, we can't do much about it in KCare Infra.

  • From:
  • CVE-2023-4244
  • Description:

    An introduction of required changes through KernelCare could cause unavoidable problems to applications which use netfilter functionality.

  • From:
  • CVE-2023-52581
  • Description:

    The patch for this CVE already present in kernel-5.14.0-362.24.1.el9_3 version. The kernel-5.14.0-362.18.1.el9_3 version and below are not vulnerable because they don't have commit 5f68718b34a5 (netfilter: nf_tables: GC transaction API to avoid race with control plane) which introduced the vulnerability.

  • From:
  • CVE-2023-4133
  • Description:

    Complex adaptation required to add timer_shutdown_sync() in timers subsystem.

  • From:
  • CVE-2022-0500
  • Description:

    Complex adaptation required. Requires changes a lot of constants

  • From:
  • CVE-2023-52489
  • Description:

    The modified structure mem_section_usage is used only during bootup time. As we patch the changes after booting they will have no effect. Therefore we cannot patch this CVE.

  • From:
  • CVE-2023-52598
  • Description:

    Out of scope as the patch is for s390 arch only, x86_64 is not affected

  • From:
  • CVE-2022-48669
  • Description:

    Out of scope as the patch is for powerpc arch only, x86_64 is not affected

  • From:
  • CVE-2023-52607
  • Description:

    Out of scope as the patch is for powerpc arch only, x86_64 is not affected

  • From:
  • CVE-2024-25744
  • Description:

    This CVE modifies the functions which won't be available or doesn't make sense to patch as they are used during bootup time or init. Therefore we cannot patch this CVE.

  • From:
  • CVE-2021-47118
  • Description:

    No sense in patching an early boot function; inventing a runtime-wise patch is not impossible but isn't worth the effort for 4.4 score CVE

  • From:
  • CVE-2024-26921
  • Description:

    Live-patching will introduce network performance degradation in the best case scenario, or even some more serious issues. N/A or Low cvss3 score from NVD or vendors.

  • From:
  • CVE-2023-52451
  • Description:

    Out of scope as the patch is for powerpc arch only, x86_64 is not affected

  • From:
  • CVE-2023-28746
  • Description:

    RFDS: Medium score vulnerability affecting only Intel Atom CPUs, mitigated via microcode update.

  • From:
  • CVE-2024-26843
  • Description:

    EFI Firmware: CVE patch is for EFI firmware which runs at boot time.

  • From:
  • CVE-2024-35910
  • Description:

    tcp_close is sleepable and called from kthread, which may prevent patching and unpatchng.

  • From:
  • CVE-2024-27395
  • Description:

    Fixed function is sleepy and called from a kthread, which may prevent patching/unpatching.

  • From:
  • CVE-2024-35938
  • Description:

    wifi:ath11k, low score CVE that needs complex adaptation but decreasing MHI Bus' buf-len isn't a typical security fix.

  • From:
  • CVE-2023-52463
  • Description:

    Complex adaptation required. Issue can be reproduced with special UEFI implementation only.

  • From:
  • CVE-2021-47018
  • Description:

    Out of scope as the patch is for powerpc arch only, x86_64 is not affected

  • From:
  • CVE-2024-40974
  • Description:

    Out of scope as the patch is for powerpc arch only, x86_64 is not affected

  • From:
  • CVE-2024-26614
  • Description:

    Complex adaptation required. Network services prevents update because sleeps in inet_csk_accept() function.

  • From:
  • CVE-2024-26638
  • Description:

    nbd: Low-score CVE. Patched function is called from a kthread and sleeps, which may prevent patching/unpatching.

  • From:
  • CVE-2024-26720
  • Description:

    This CVE introduces a regression and is reverted by CVE-2024-42102 in the same errata

  • From:
  • CVE-2024-41008
  • Description:

    Complex adaptation required, low score patch for non critical subsystem amdgpu

  • From:
  • CVE-2024-43889
  • Description:

    Out of scope: This CVE modified the __init function which won't be available to patch as it is used during bootup time.

  • From:
  • CVE-2024-35839
  • Description:

    Live-patching will introduce network performance degradation in the best case scenario, or even some more serious issues. N/A or Low cvss3 score from NVD or vendors.

  • From:
  • CVE-2022-23816
  • Description:

    Livepatching Retbleed may decrease kernel stability and performance. This vulnerability has medium security impact and applies to certain hardware environments only.

  • From:
  • CVE-2022-23825
  • Description:

    Livepatching Retbleed may decrease kernel stability and performance. This vulnerability has medium security impact and applies to certain hardware environments only.

  • From:
  • CVE-2022-26373
  • Description:

    Livepatching Retbleed may decrease the stability and performance of the kernel, while vulnerability has a medium security impact and only for a certain hardware environment.

  • From:
  • CVE-2022-29900
  • Description:

    Livepatching Retbleed may decrease kernel stability and performance. This vulnerability has medium security impact and applies to certain hardware environments only.

  • From:
  • CVE-2022-29901
  • Description:

    Livepatching Retbleed may decrease the stability and performance of the kernel, while vulnerability has a medium security impact and only for a certain hardware environment.

  • From: