• kernel-4.14.133-88.105.amzn1 (amazon1)
  • 4.14.336-180.566.amzn1
  • 2024-04-15 14:30:45
  • 2024-04-19 08:16:01
  • K20240415_05
  • CVE-2021-37576, CVSSv2 Score:
  • Description:

    Out of scope as the patch is for powerpc arch only, x86_64 is not affected

  • From:
  • CVE-2022-0001, CVSSv2 Score:
  • Description:

    An introduction of required changes through KernelCare could cause unavoidable problems to applications which use unprivileged eBPF.

  • From:
  • CVE-2022-0002, CVSSv2 Score:
  • Description:

    An introduction of required changes through KernelCare could cause unavoidable problems to applications which use unprivileged eBPF.

  • From:
  • CVE-2021-26401, CVSSv2 Score:
  • Description:

    An introduction of required changes through KernelCare could cause unavoidable problems to applications which use unprivileged eBPF.

  • From:
  • CVE-2022-32296, CVSSv2 Score:
  • Description:

    perturb functionality missing in kernels earlier than 4.14.285-215.501.amzn2

  • From:
  • CVE-2023-1206, CVSSv2 Score:
  • Description:

    This is a low priority CVE & the patch impacts many critical components of the networking subsystem & it requires multiple complex adaptations in those components to avoid losing existing connections on patch/unpatch.

  • From:
  • CVE-2023-4128, CVSSv2 Score:
  • Description:

    Rejected by NIST. Consult CVE-2023-4206, CVE-2023-4207, CVE-2023-4208.

  • From:
  • CVE-2023-4244, CVSSv2 Score:
  • Description:

    An introduction of required changes through KernelCare could cause unavoidable problems to applications which use netfilter functionality.

  • From:
  • CVE-2023-6270, CVSSv2 Score:
  • Description:

    Complex adaptation is required, vendor retired ATA over Ethernet driver.

  • From:
  • CVE-2022-42328, CVSSv2 Score:
  • Description:

    Code from this cve inlined in sleepy thread 'xenvif_kthread_guest_rx' that we can't patch

  • From:
  • CVE-2022-42329, CVSSv2 Score:
  • Description:

    Code from this cve inlined in sleepy thread 'xenvif_kthread_guest_rx' that we can't patch

  • From:
  • CVE-2022-26373, CVSSv2 Score:
  • Description:

    Livepatching Retbleed may decrease the stability and performance of the kernel, while vulnerability has a medium security impact and only for a certain hardware environment.

  • From: