• kernel-5.15.0-1035.39~20.04.1 (ubuntu-focal-lts-jammy-aws)
  • 5.15.0-1073.79~20.04.1
  • 2024-12-24 18:54:17
  • CVE-2023-0459, CVSSv2 Score:
  • Description:

    Safety check failed for copy_from_user; zendesk:191568

  • From:
  • CVE-2023-0597, CVSSv2 Score:
  • Description:

    Medium severity vulnerability CVE requiring extremely complex adaptation (if at all possible)

  • From:
  • CVE-2023-1206, CVSSv2 Score:
  • Description:

    This is a low priority CVE & the patch impacts many critical components of the networking subsystem & it requires multiple complex adaptations in those components to avoid losing existing connections on patch/unpatch.

  • From:
  • CVE-2023-20569, CVSSv2 Score:
  • Description:

    A low priority AMD Inception vulnerability that affects Zen3/Zen4 & relates to RetBleed fixes requiring microcode updates, we can't do much about it in KCare Infra.

  • From:
  • CVE-2023-4244, CVSSv2 Score:
  • Description:

    An introduction of required changes through KernelCare could cause unavoidable problems to applications which use netfilter functionality.

  • From:
  • CVE-2023-52463, CVSSv2 Score:
  • Description:

    Complex adaptation required. Issue can be reproduced with special UEFI implementation only.

  • From:
  • CVE-2023-52489, CVSSv2 Score:
  • Description:

    The modified structure mem_section_usage is used only during bootup time. As we patch the changes after booting they will have no effect. Therefore we cannot patch this CVE.

  • From:
  • CVE-2023-52498, CVSSv2 Score:
  • Description:

    Power management subsystem - sleep mode. Irrelevant for servers.

  • From:
  • CVE-2024-26712, CVSSv2 Score:
  • Description:

    Do not support powerpc build with kasan sanitizer 4a7aee96200ad281a5cc4cf5c7a2e2a49d2b97b0

  • From:
  • CVE-2024-26614, CVSSv2 Score:
  • Description:

    Complex adaptation required. Network services prevents update because sleeps in inet_csk_accept() function.

  • From:
  • CVE-2024-26843, CVSSv2 Score:
  • Description:

    EFI Firmware: CVE patch is for EFI firmware which runs at boot time.

  • From:
  • CVE-2024-26584, CVSSv2 Score:
  • Description:

    Low-severity patch proven to suffer from stack-unsafety problem when patching during network load.

  • From:
  • CVE-2024-26788, CVSSv2 Score:
  • Description:

    NXP Layerscape SoCs affected only. Unable to fix early initialization.

  • From:
  • CVE-2024-26583, CVSSv2 Score:
  • Description:

    Low-severity patch proven to suffer from stack-unsafety problem when patching during network load.

  • From:
  • CVE-2024-26585, CVSSv2 Score:
  • Description:

    Low-severity patch proven to suffer from stack-unsafety problem when patching during network load.

  • From:
  • CVE-2024-26737, CVSSv2 Score:
  • Description:

    eBPF: low score UAF with CONFIG_BPF_UNPRIV_DEFAULT_OFF=y by default but needs complex adaptation.

  • From:
  • CVE-2024-35910, CVSSv2 Score:
  • Description:

    tcp_close is sleepable and called from kthread, which may prevent patching and unpatchng.

  • From:
  • CVE-2024-26957, CVSSv2 Score:
  • Description:

    Out of scope: IBM System/390 architecture isn't supported for current kernel

  • From:
  • CVE-2024-26988, CVSSv2 Score:
  • Description:

    Out of scope as the patch is for vmlinux init sections which are discarded after the boot

  • From:
  • CVE-2024-27009, CVSSv2 Score:
  • Description:

    Out of scope as the patch is for s390 arch only, x86_64 is not affected

  • From:
  • CVE-2024-35871, CVSSv2 Score:
  • Description:

    Out of scope as the patch is for riscv arch only, x86_64 is not affected

  • From:
  • CVE-2024-35918, CVSSv2 Score:
  • Description:

    It is not possible to fix this vulnerability using kernel livepatching because it lies below the system call level.

  • From:
  • CVE-2024-35901, CVSSv2 Score:
  • Description:

    Out of scope as the patch that introduces the vulnerability 2fbbd712baf1 (net: mana: Enable RX path to handle various MTU sizes) is missing from these kernels

  • From:
  • CVE-2024-35938, CVSSv2 Score:
  • Description:

    wifi:ath11k, low score CVE that needs complex adaptation but decreasing MHI Bus' buf-len isn't a typical security fix.

  • From:
  • CVE-2024-35970, CVSSv2 Score:
  • Description:

    Complex adaptation required. Livepatching of this vulnerability can harm the network subsystem..

  • From:
  • CVE-2024-35988, CVSSv2 Score:
  • Description:

    Out of scope as the patch is for riscv arch only, x86_64 is not affected

  • From:
  • CVE-2024-26921, CVSSv2 Score:
  • Description:

    Live-patching will introduce network performance degradation in the best case scenario, or even some more serious issues. N/A or Low cvss3 score from NVD or vendors.

  • From:
  • CVE-2024-26830, CVSSv2 Score:
  • Description:

    Fixed function sleeps and executed in kthread, which may prevent patching/unpatching. Low score CVE.

  • From:
  • CVE-2024-39292, CVSSv2 Score:
  • Description:

    Out of scope: User-mode Linux isn't supported for current kernel

  • From:
  • CVE-2024-38583, CVSSv2 Score:
  • Description:

    nilfs2: We cannot patch functions that sleep in kthread().

  • From:
  • CVE-2023-52884, CVSSv2 Score:
  • Description:

    Patched functions sleep and are called from a kthread. Trackpad suspend/resume fix.

  • From:
  • CVE-2024-35972, CVSSv2 Score:
  • Description:

    Complex adaptation required. Livepatching of this vulnerability can harm the network subsystem.

  • From:
  • CVE-2024-38613, CVSSv2 Score:
  • Description:

    Out of scope as the patch is for m68k arch only, x86_64, arm64 is not affected

  • From:
  • CVE-2024-38612, CVSSv2 Score:
  • Description:

    Vulnerability affects OS during boot time and can't be closed via livepatching.

  • From:
  • CVE-2024-38623, CVSSv2 Score:
  • Description:

    Patch changes global data size, which may lead to FS errors. Low-score CVE requires complex adaptation.

  • From:
  • CVE-2024-38661, CVSSv2 Score:
  • Description:

    Out of scope as the patch is for s390 arch only, x86_64, arm64 is not affected

  • From:
  • CVE-2024-40974, CVSSv2 Score:
  • Description:

    Out of scope as the patch is for powerpc arch only, x86_64 is not affected

  • From:
  • CVE-2024-40963, CVSSv2 Score:
  • Description:

    Out of scope as the patch is for MIPS arch only, x86_64 is not affected

  • From:
  • CVE-2024-41055, CVSSv2 Score:
  • Description:

    The patch affects too much kernel code. Low impact CVE.

  • From:
  • CVE-2024-42302, CVSSv2 Score:
  • Description:

    Patched function waits for external events, which may prevent patching/unpatching.

  • From:
  • CVE-2024-41068, CVSSv2 Score:
  • Description:

    Out of scope as the patch is for s390 arch only, x86_64 is not affected

  • From:
  • CVE-2024-38667, CVSSv2 Score:
  • Description:

    Out of scope: RISC V architecture isn't supported for current kernel

  • From: