• kernel-4.18.0-553.8.1.el8_10 (rockylinux8)
  • 4.18.0-553.72.1.el8_10
  • 2025-09-11 21:14:56
  • 2025-09-12 14:16:19
  • K20250911_13
  • CVE-2024-26921
  • Description:

    Live-patching will introduce network performance degradation in the best case scenario, or even some more serious issues. N/A or Low cvss3 score from NVD or vendors.

  • From:
  • CVE-2023-52451
  • Description:

    Out of scope as the patch is for powerpc arch only, x86_64 is not affected

  • From:
  • CVE-2023-28746
  • Description:

    RFDS: Medium score vulnerability affecting only Intel Atom CPUs, mitigated via microcode update.

  • From:
  • CVE-2024-26843
  • Description:

    EFI Firmware: CVE patch is for EFI firmware which runs at boot time.

  • From:
  • CVE-2024-35910
  • Description:

    tcp_close is sleepable and called from kthread, which may prevent patching and unpatchng.

  • From:
  • CVE-2024-27395
  • Description:

    Fixed function is sleepy and called from a kthread, which may prevent patching/unpatching.

  • From:
  • CVE-2024-35938
  • Description:

    wifi:ath11k, low score CVE that needs complex adaptation but decreasing MHI Bus' buf-len isn't a typical security fix.

  • From:
  • CVE-2023-52463
  • Description:

    Complex adaptation required. Issue can be reproduced with special UEFI implementation only.

  • From:
  • CVE-2021-47018
  • Description:

    Out of scope as the patch is for powerpc arch only, x86_64 is not affected

  • From:
  • CVE-2024-40974
  • Description:

    Out of scope as the patch is for powerpc arch only, x86_64 is not affected

  • From:
  • CVE-2024-26614
  • Description:

    Complex adaptation required. Network services prevents update because sleeps in inet_csk_accept() function.

  • From:
  • CVE-2024-26638
  • Description:

    nbd: Low-score CVE. Patched function is called from a kthread and sleeps, which may prevent patching/unpatching.

  • From:
  • CVE-2024-26720
  • Description:

    This CVE introduces a regression and is reverted by CVE-2024-42102 in the same errata

  • From:
  • CVE-2024-41008
  • Description:

    Complex adaptation required, low score patch for non critical subsystem amdgpu

  • From:
  • CVE-2024-43889
  • Description:

    Out of scope: This CVE modified the __init function which won't be available to patch as it is used during bootup time.

  • From:
  • CVE-2024-35839
  • Description:

    Live-patching will introduce network performance degradation in the best case scenario, or even some more serious issues. N/A or Low cvss3 score from NVD or vendors.

  • From:
  • CVE-2024-50192
  • Description:

    arm64: Low-score CVE requiring adaptation that is hard to implement; targets very rare hardware

  • From:
  • CVE-2025-21785
  • Description:

    Out of scope: ARM64 architecture isn't supported for current kernel

  • From:
  • CVE-2022-49395
  • Description:

    Out of scope: User-mode Linux isn't supported for current kernel

  • From: