• linux-5.10.179-3 (debian11-cloud)
  • 5.10.237-1
  • 2025-08-19 08:31:00
  • 2025-08-19 12:36:30
  • K20250819_02
  • CVE-2023-1206, CVSSv2 Score:
  • Description:

    This is a low priority CVE & the patch impacts many critical components of the networking subsystem & it requires multiple complex adaptations in those components to avoid losing existing connections on patch/unpatch.

  • From:
  • CVE-2023-20569, CVSSv2 Score:
  • Description:

    A low priority AMD Inception vulnerability that affects Zen3/Zen4 & relates to RetBleed fixes requiring microcode updates, we can't do much about it in KCare Infra.

  • From:
  • CVE-2023-4244, CVSSv2 Score:
  • Description:

    An introduction of required changes through KernelCare could cause unavoidable problems to applications which use netfilter functionality.

  • From:
  • CVE-2023-28746, CVSSv2 Score:
  • Description:

    RFDS: Medium score vulnerability affecting only Intel Atom CPUs, mitigated via microcode update.

  • From:
  • CVE-2023-52482, CVSSv2 Score:
  • Description:

    CVE patch is for AMD Inception vulnerability related to Speculative Return Stack Overflow (SRSO)

  • From:
  • CVE-2023-52598, CVSSv2 Score:
  • Description:

    Out of scope as the patch is for s390 arch only, x86_64 is not affected

  • From:
  • CVE-2024-36939, CVSSv2 Score:
  • Description:

    Commit d47151b is absent. Original error is in module __init function, it cannot be fixed.

  • From:
  • CVE-2024-39292, CVSSv2 Score:
  • Description:

    Out of scope: User-mode Linux isn't supported for current kernel

  • From:
  • CVE-2025-21785, CVSSv2 Score:
  • Description:

    Out of scope: ARM64 architecture isn't supported for current kernel

  • From:
  • CVE-2025-22056, CVSSv2 Score:
  • Description:

    Postponed: complex analysis and adaptation required

  • From:
  • CVE-2023-46862, CVSSv2 Score:
  • Description:

    till debian11 kernel 'linux-5.10.197-1', afftected code isn't present.

  • From: