• kernel-5.15.0-1017.20 (ubuntu-jammy-azure)
  • 5.15.0-1071.80
  • 2024-08-21 12:36:32
  • 2024-08-26 06:40:24
  • K20240821_07
  • CVE-2022-26373
  • Description:

    Livepatching Retbleed may decrease the stability and performance of the kernel, while vulnerability has a medium security impact and only for a certain hardware environment.

  • From:
  • CVE-2023-0597
  • Description:

    Medium severity vulnerability CVE requiring extremely complex adaptation (if at all possible)

  • From:
  • CVE-2023-1206
  • Description:

    This is a low priority CVE & the patch impacts many critical components of the networking subsystem & it requires multiple complex adaptations in those components to avoid losing existing connections on patch/unpatch.

  • From:
  • CVE-2023-20569
  • Description:

    A low priority AMD Inception vulnerability that affects Zen3/Zen4 & relates to RetBleed fixes requiring microcode updates, we can't do much about it in KCare Infra.

  • From:
  • CVE-2023-4244
  • Description:

    An introduction of required changes through KernelCare could cause unavoidable problems to applications which use netfilter functionality.

  • From:
  • CVE-2023-52463
  • Description:

    Complex adaptation required. Issue can be reproduced with special UEFI implementation only.

  • From:
  • CVE-2023-52489
  • Description:

    The modified structure mem_section_usage is used only during bootup time. As we patch the changes after booting they will have no effect. Therefore we cannot patch this CVE.

  • From:
  • CVE-2023-52498
  • Description:

    Power management subsystem - sleep mode. Irrelevant for servers.

  • From:
  • CVE-2024-26712
  • Description:

    Do not support powerpc build with kasan sanitizer 4a7aee96200ad281a5cc4cf5c7a2e2a49d2b97b0

  • From:
  • CVE-2024-26843
  • Description:

    EFI Firmware: CVE patch is for EFI firmware which runs at boot time.

  • From:
  • CVE-2024-26584
  • Description:

    Low-severity patch proven to suffer from stack-unsafety problem when patching during network load.

  • From:
  • CVE-2024-35910
  • Description:

    tcp_close is sleepable and called from kthread, which may prevent patching and unpatchng.

  • From: