• kernel-4.18.0-147.8.1.el8.lve (cl8)
  • 4.18.0-513.9.1.lve.el8
  • 2024-01-27 00:10:48
  • 2024-02-05 07:39:26
  • K20240127_05
  • CVE-2020-10690
  • Description:

    Incorrect version of patch were initially used. Work on correct fix is in progress.

  • From:
  • CVE-2020-12362
  • Description:

    Mitigation is made with intel firmware update, el8 kernels also need 'i915.enable_guc' specified in cmdline to be affected

  • From:
  • CVE-2021-3501
  • Description:

    The problematic patch was introduced only in the 8.4 release, >=kernel-4.18.0-305.el8

  • From:
  • CVE-2021-3543
  • Description:

    The problematic patch was introduced only in the 8.4 release, >=kernel-4.18.0-305.el8

  • From:
  • CVE-2020-26541
  • Description:

    Affects only secure boot __init stage, already booted kernels are not affected

  • From:
  • CVE-2021-37576
  • Description:

    Out of scope as the patch is for powerpc arch only, x86_64 is not affected

  • From:
  • CVE-2020-27777
  • Description:

    Out of scope as the patch is for powerpc arch only, x86_64 is not affected

  • From:
  • CVE-2021-26401
  • Description:

    An introduction of required changes through KernelCare could cause unavoidable problems to applications which use unprivileged eBPF.

  • From:
  • CVE-2021-43056
  • Description:

    Out of scope as the patch is for powerpc arch only, x86_64 is not affected

  • From:
  • CVE-2022-0001
  • Description:

    An introduction of required changes through KernelCare could cause unavoidable problems to applications which use unprivileged eBPF.

  • From:
  • CVE-2022-0002
  • Description:

    An introduction of required changes through KernelCare could cause unavoidable problems to applications which use unprivileged eBPF.

  • From:
  • CVE-2023-1206
  • Description:

    This is a low priority CVE & the patch impacts many critical components of the networking subsystem & it requires multiple complex adaptations in those components to avoid losing existing connections on patch/unpatch.

  • From:
  • CVE-2023-0597
  • Description:

    Medium severity vulnerability CVE requiring extremely complex adaptation (if at all possible)

  • From:
  • CVE-2023-20569
  • Description:

    A low priority AMD Inception vulnerability that affects Zen3/Zen4 & relates to RetBleed fixes requiring microcode updates, we can't do much about it in KCare Infra.

  • From:
  • CVE-2022-23816
  • Description:

    Livepatching Retbleed may decrease kernel stability and performance. This vulnerability has medium security impact and applies to certain hardware environments only.

  • From:
  • CVE-2022-23825
  • Description:

    Livepatching Retbleed may decrease kernel stability and performance. This vulnerability has medium security impact and applies to certain hardware environments only.

  • From:
  • CVE-2022-26373
  • Description:

    Livepatching Retbleed may decrease the stability and performance of the kernel, while vulnerability has a medium security impact and only for a certain hardware environment.

  • From:
  • CVE-2022-29900
  • Description:

    Livepatching Retbleed may decrease kernel stability and performance. This vulnerability has medium security impact and applies to certain hardware environments only.

  • From:
  • CVE-2022-29901
  • Description:

    Livepatching Retbleed may decrease the stability and performance of the kernel, while vulnerability has a medium security impact and only for a certain hardware environment.

  • From: