• kernel-5.4.0-55.61~18.04.1 (ubuntu-bionic-lts-focal)
  • 5.4.0-216.236~18.04.1
  • 2025-06-30 08:58:32
  • 2025-07-02 12:07:59
  • K20250630_05
  • CVE-2021-20177
  • Description:

    KCARE-12751: Removed this patch as it causes issue with new tcp connections

  • From:
  • CVE-2021-37576
  • Description:

    Out of scope as the patch is for powerpc arch only, x86_64 is not affected

  • From:
  • CVE-2021-43056
  • Description:

    Out of scope as the patch is for powerpc arch only, x86_64 is not affected

  • From:
  • CVE-2022-0001
  • Description:

    An introduction of required changes through KernelCare could cause unavoidable problems to applications which use unprivileged eBPF.

  • From:
  • CVE-2022-0002
  • Description:

    An introduction of required changes through KernelCare could cause unavoidable problems to applications which use unprivileged eBPF.

  • From:
  • CVE-2021-26401
  • Description:

    An introduction of required changes through KernelCare could cause unavoidable problems to applications which use unprivileged eBPF.

  • From:
  • CVE-2022-21499
  • Description:

    Not affected without certain conditions - Secure Boot, configured kgdb/kdb. Complex adaptation

  • From:
  • CVE-2022-29900
  • Description:

    Livepatching Retbleed may decrease kernel stability and performance. This vulnerability has medium security impact and applies to certain hardware environments only.

  • From:
  • CVE-2022-29901
  • Description:

    Livepatching Retbleed may decrease the stability and performance of the kernel, while vulnerability has a medium security impact and only for a certain hardware environment.

  • From:
  • CVE-2022-26373
  • Description:

    Livepatching Retbleed may decrease the stability and performance of the kernel, while vulnerability has a medium security impact and only for a certain hardware environment.

  • From:
  • CVE-2023-1206
  • Description:

    This is a low priority CVE & the patch impacts many critical components of the networking subsystem & it requires multiple complex adaptations in those components to avoid losing existing connections on patch/unpatch.

  • From:
  • CVE-2023-4881
  • Description:

    CVE was wrongly assigned to a bug that was deemed to be a non-security issue by the Linux kernel security team.

  • From:
  • CVE-2023-0597
  • Description:

    Medium severity vulnerability CVE requiring extremely complex adaptation (if at all possible)

  • From:
  • CVE-2023-4244
  • Description:

    An introduction of required changes through KernelCare could cause unavoidable problems to applications which use netfilter functionality.

  • From:
  • CVE-2023-52451
  • Description:

    Out of scope as the patch is for powerpc arch only, x86_64 is not affected

  • From:
  • CVE-2024-26614
  • Description:

    Complex adaptation required. Network services prevents update because sleeps in inet_csk_accept() function.

  • From:
  • CVE-2023-52504
  • Description:

    Unable to fix early initialization before enabling SMP d35652a5fc9944784f6f50a5c979518ff8dacf61

  • From:
  • CVE-2024-26712
  • Description:

    Do not support powerpc build with kasan sanitizer 4a7aee96200ad281a5cc4cf5c7a2e2a49d2b97b0

  • From:
  • CVE-2024-26921
  • Description:

    Live-patching will introduce network performance degradation in the best case scenario, or even some more serious issues. N/A or Low cvss3 score from NVD or vendors.

  • From:
  • CVE-2024-35904
  • Description:

    Affects only __init function for a built-in component, so patching will have no effect

  • From:
  • CVE-2024-40910
  • Description:

    Not patching the function that can remain on the stack for a while (i.e. if the socket is not non-blocking AND no signal is delivered)

  • From:
  • CVE-2024-38553
  • Description:

    Patches a network driver available only for Motorola ColdFire and Freescale i.MX platforms that are not among the platforms our clients are using

  • From:
  • CVE-2021-47101
  • Description:

    The patched function (asix_check_host_enable) does not exist for Ubuntu Focal's kernel (only for HWE)

  • From:
  • CVE-2024-53165
  • Description:

    Out of scope: SuperH architecture isn't supported for current kernel

  • From:
  • CVE-2024-53183
  • Description:

    Out of scope: User-mode Linux isn't supported for current kernel

  • From:
  • CVE-2024-53181
  • Description:

    Out of scope: User-mode Linux isn't supported for current kernel

  • From:
  • CVE-2025-21715
  • Description:

    The DM9000 chip is available on ARM32 and MIPS architectures, which KernelCare does not support.

  • From: