• pve-kernel-5.15.158-1-pve_5.15.158-1 (pve-7-5.15)
  • 5.15.158-2-pve-5.15.158-2
  • 2025-06-19 11:46:57
  • 2025-06-25 07:29:43
  • K20250619_08
  • CVE-2024-26921
  • Description:

    Live-patching will introduce network performance degradation in the best case scenario, or even some more serious issues. N/A or Low cvss3 score from NVD or vendors.

  • From:
  • CVE-2024-26830
  • Description:

    Fixed function sleeps and executed in kthread, which may prevent patching/unpatching. Low score CVE.

  • From:
  • CVE-2024-39292
  • Description:

    Out of scope: User-mode Linux isn't supported for current kernel

  • From:
  • CVE-2023-52884
  • Description:

    Patched functions sleep and are called from a kthread. Trackpad suspend/resume fix.

  • From:
  • CVE-2024-35972
  • Description:

    Complex adaptation required. Livepatching of this vulnerability can harm the network subsystem.

  • From:
  • CVE-2024-38613
  • Description:

    Out of scope as the patch is for m68k arch only, x86_64, arm64 is not affected

  • From:
  • CVE-2024-38612
  • Description:

    Vulnerability affects OS during boot time and can't be closed via livepatching.

  • From:
  • CVE-2024-38623
  • Description:

    Patch changes global data size, which may lead to FS errors. Low-score CVE requires complex adaptation.

  • From:
  • CVE-2024-38661
  • Description:

    Out of scope as the patch is for s390 arch only, x86_64, arm64 is not affected

  • From:
  • CVE-2024-40974
  • Description:

    Out of scope as the patch is for powerpc arch only, x86_64 is not affected

  • From:
  • CVE-2024-40963
  • Description:

    Out of scope as the patch is for MIPS arch only, x86_64 is not affected

  • From:
  • CVE-2024-42302
  • Description:

    Patched function waits for external events, which may prevent patching/unpatching.

  • From:
  • CVE-2024-41068
  • Description:

    Out of scope as the patch is for s390 arch only, x86_64 is not affected

  • From:
  • CVE-2024-38667
  • Description:

    Out of scope: RISC V architecture isn't supported for current kernel

  • From:
  • CVE-2024-35904
  • Description:

    Affects only __init function for a built-in component, so patching will have no effect

  • From:
  • CVE-2024-49963
  • Description:

    Out of scope as the patch is for arm64 arch only, x86_64 not affected

  • From:
  • CVE-2024-49935
  • Description:

    Low-score CVE changes a kthread, which may prevent patching/unpatching

  • From:
  • CVE-2024-50189
  • Description:

    When introduced by live-patching, patch causes more problems than it fixes. Complex adaptation required.

  • From:
  • CVE-2024-50072
  • Description:

    Out of scope: x86 architecture isn't supported for current kernel

  • From:
  • CVE-2024-50192
  • Description:

    arm64: Low-score CVE requiring adaptation that is hard to implement; targets very rare hardware

  • From:
  • CVE-2024-50295
  • Description:

    The ndev->dev.parent mappings cannot be changed to ndev->dev.parent and driver is broken already

  • From:
  • CVE-2024-53183
  • Description:

    Out of scope: User-mode Linux isn't supported for current kernel

  • From:
  • CVE-2024-53181
  • Description:

    Out of scope: User-mode Linux isn't supported for current kernel

  • From:
  • CVE-2024-57904
  • Description:

    Out of scope: ARM architecture isn't supported for current kernel

  • From:
  • CVE-2024-58034
  • Description:

    Out of scope; patch fixes the memory controller module for Nvidia Tegra SoCs.

  • From:
  • CVE-2025-21715
  • Description:

    The DM9000 chip is available on ARM32 and MIPS architectures, which KernelCare does not support.

  • From: