• kernel-5.4.0-1041.43~18.04.1 (ubuntu-bionic-lts-focal-azure)
  • 5.4.0-1131.138~18.04.1
  • 2024-07-03 11:04:40
  • 2024-07-11 08:57:08
  • K20240703_08
  • CVE-2021-37576, CVSSv2 Score:
  • Description:

    Out of scope as the patch is for powerpc arch only, x86_64 is not affected

  • From:
  • CVE-2021-43056, CVSSv2 Score:
  • Description:

    Out of scope as the patch is for powerpc arch only, x86_64 is not affected

  • From:
  • CVE-2021-4002, CVSSv2 Score:
  • Description:

    Patch should be changed due to inline code in __sched()

  • From:
  • CVE-2022-0001, CVSSv2 Score:
  • Description:

    An introduction of required changes through KernelCare could cause unavoidable problems to applications which use unprivileged eBPF.

  • From:
  • CVE-2022-0002, CVSSv2 Score:
  • Description:

    An introduction of required changes through KernelCare could cause unavoidable problems to applications which use unprivileged eBPF.

  • From:
  • CVE-2021-26401, CVSSv2 Score:
  • Description:

    An introduction of required changes through KernelCare could cause unavoidable problems to applications which use unprivileged eBPF.

  • From:
  • CVE-2022-21499, CVSSv2 Score:
  • Description:

    Not affected without certain conditions - Secure Boot, configured kgdb/kdb. Complex adaptation

  • From:
  • CVE-2022-29900, CVSSv2 Score:
  • Description:

    Livepatching Retbleed may decrease kernel stability and performance. This vulnerability has medium security impact and applies to certain hardware environments only.

  • From:
  • CVE-2022-29901, CVSSv2 Score:
  • Description:

    Livepatching Retbleed may decrease the stability and performance of the kernel, while vulnerability has a medium security impact and only for a certain hardware environment.

  • From:
  • CVE-2022-26373, CVSSv2 Score:
  • Description:

    Livepatching Retbleed may decrease the stability and performance of the kernel, while vulnerability has a medium security impact and only for a certain hardware environment.

  • From:
  • CVE-2023-1829, CVSSv2 Score:
  • Description:

    Complex adaptation is required, mainline retired tcindex.

  • From:
  • CVE-2023-0459, CVSSv2 Score:
  • Description:

    Safety check failed for copy_from_user; zendesk:191568

  • From:
  • CVE-2023-1206, CVSSv2 Score:
  • Description:

    This is a low priority CVE & the patch impacts many critical components of the networking subsystem & it requires multiple complex adaptations in those components to avoid losing existing connections on patch/unpatch.

  • From:
  • CVE-2023-4881, CVSSv2 Score:
  • Description:

    CVE was wrongly assigned to a bug that was deemed to be a non-security issue by the Linux kernel security team.

  • From:
  • CVE-2023-0597, CVSSv2 Score:
  • Description:

    Medium severity vulnerability CVE requiring extremely complex adaptation (if at all possible)

  • From:
  • CVE-2023-4244, CVSSv2 Score:
  • Description:

    An introduction of required changes through KernelCare could cause unavoidable problems to applications which use netfilter functionality.

  • From:
  • CVE-2023-52451, CVSSv2 Score:
  • Description:

    Out of scope as the patch is for powerpc arch only, x86_64 is not affected

  • From:
  • CVE-2024-26614, CVSSv2 Score:
  • Description:

    Complex adaptation required. Network services prevents update because sleeps in inet_csk_accept() function.

  • From:
  • CVE-2023-52504, CVSSv2 Score:
  • Description:

    Unable to fix early initialization before enabling SMP d35652a5fc9944784f6f50a5c979518ff8dacf61

  • From:
  • CVE-2024-26712, CVSSv2 Score:
  • Description:

    Do not support powerpc build with kasan sanitizer 4a7aee96200ad281a5cc4cf5c7a2e2a49d2b97b0

  • From: