Current Path : /var/cache/kcare/patches/none-71cbdfb55b526d8daf71cca0df63437dc39d7dfe-2-extra/ |
Current File : //var/cache/kcare/patches/none-71cbdfb55b526d8daf71cca0df63437dc39d7dfe-2-extra/kpatch.extra.info |
OS: centos7 kernel: kernel-3.10.0-1160.119.1.el7.tuxcare.els10 time: 2024-11-27 12:00:12 kpatch-name: skipped/CVE-2022-2196.patch kpatch-description: kpatch-kernel: kpatch-cve: CVE-2022-2196 kpatch-skip-reason: Produce issues with nested virtualisation scenarios kpatch-cvss: kpatch-name: rhel7/3.10.0-1160.119.1.el7.tuxcare.els11/CVE-2022-20368-Revert-net-packet-fix-slab-out-of-bound.patch kpatch-description: Revert "net/packet: fix slab-out-of-bounds access in packet_recvmsg()" kpatch-kernel: 3.10.0-1160.119.1.el7.tuxcare.els11 kpatch-cve: CVE-2022-20368 kpatch-cvss: N/A kpatch-cve-url: https://access.redhat.com/security/cve/CVE-2022-20368 kpatch-patch-url: https://git.kernel.org/linus/c700525fcc06b05adfea78039de02628af79e07a kpatch-name: rhel7/3.10.0-1160.119.1.el7.tuxcare.els11/CVE-2022-20368-packet-in-recvmsg-msg_name-return-at-le.patch kpatch-description: packet: in recvmsg msg_name return at least sizeof sockaddr_ll kpatch-kernel: 3.10.0-1160.119.1.el7.tuxcare.els11 kpatch-cve: CVE-2022-20368 kpatch-cvss: N/A kpatch-cve-url: https://access.redhat.com/security/cve/CVE-2022-20368 kpatch-patch-url: https://git.kernel.org/linus/b2cf86e1563e33a14a1c69b3e508d15dc12f804c kpatch-name: rhel7/3.10.0-1160.119.1.el7.tuxcare.els11/CVE-2022-20368-net-packet-fix-slab-out-of-bounds-acces.patch kpatch-description: net/packet: fix slab-out-of-bounds access in packet_recvmsg() kpatch-kernel: 3.10.0-1160.119.1.el7.tuxcare.els11 kpatch-cve: CVE-2022-20368 kpatch-cvss: N/A kpatch-cve-url: https://access.redhat.com/security/cve/CVE-2022-20368 kpatch-patch-url: https://git.kernel.org/linus/c700525fcc06b05adfea78039de02628af79e07a kpatch-name: rhel7/3.10.0-1160.119.1.el7.tuxcare.els11/CVE-2022-1048-ALSA-pcm-Fix-races-among-concurrent-hw_.patch kpatch-description: ALSA: pcm: Fix races among concurrent hw_params and hw_free calls kpatch-kernel: 3.10.0-1160.119.1.el7.tuxcare.els11 kpatch-cve: CVE-2022-1048 kpatch-cvss: 7.0 kpatch-cve-url: https://access.redhat.com/security/cve/CVE-2022-1048 kpatch-patch-url: https://git.kernel.org/linus/92ee3c60ec9fe64404dc035e7c41277d74aa26cb kpatch-name: rhel7/3.10.0-1160.119.1.el7.tuxcare.els11/CVE-2022-1048-ALSA-pcm-Fix-races-among-concurrent-rea.patch kpatch-description: ALSA: pcm: Fix races among concurrent read/write and buffer changes kpatch-kernel: 3.10.0-1160.119.1.el7.tuxcare.els11 kpatch-cve: CVE-2022-1048 kpatch-cvss: 7.0 kpatch-cve-url: https://access.redhat.com/security/cve/CVE-2022-1048 kpatch-patch-url: https://git.kernel.org/linus/dca947d4d26dbf925a64a6cfb2ddbc035e831a3d kpatch-name: rhel7/3.10.0-1160.119.1.el7.tuxcare.els11/CVE-2022-1048-ALSA-pcm-Fix-races-among-concurrent-pr1.patch kpatch-description: ALSA: pcm: Fix races among concurrent prepare and hw_params/hw_free calls kpatch-kernel: 3.10.0-1160.119.1.el7.tuxcare.els11 kpatch-cve: CVE-2022-1048 kpatch-cvss: 7.0 kpatch-cve-url: https://access.redhat.com/security/cve/CVE-2022-1048 kpatch-patch-url: https://git.kernel.org/linus/3c3201f8c7bb77eb53b08a3ca8d9a4ddc500b4c0 kpatch-name: rhel7/3.10.0-1160.119.1.el7.tuxcare.els11/CVE-2022-1048-ALSA-pcm-Fix-races-among-concurrent-pr2.patch kpatch-description: ALSA: pcm: Fix races among concurrent prepare and hw_params/hw_free calls kpatch-kernel: 3.10.0-1160.119.1.el7.tuxcare.els11 kpatch-cve: CVE-2022-1048 kpatch-cvss: 7.0 kpatch-cve-url: https://access.redhat.com/security/cve/CVE-2022-1048 kpatch-patch-url: https://git.kernel.org/linus/69534c48ba8ce552ce383b3dfdb271ffe51820c3 kpatch-name: rhel7/3.10.0-1160.119.1.el7.tuxcare.els11/CVE-2022-1048-kpatch.patch kpatch-description: N/A kpatch-kernel: 3.10.0-1160.119.1.el7.tuxcare.els11 kpatch-cve: CVE-2022-1048 kpatch-cvss: 7.0 kpatch-cve-url: https://access.redhat.com/security/cve/CVE-2022-1048 kpatch-patch-url: https://git.kernel.org/linus/92ee3c60ec9fe64404dc035e7c41277d74aa26cb kpatch-name: rhel7/3.10.0-1160.119.1.el7.tuxcare.els11/CVE-2024-38555-net-mlx5-Discard-command-completions-in.patch kpatch-description: net/mlx5: Discard command completions in internal error kpatch-kernel: 3.10.0-1160.119.1.el7.tuxcare.els11 kpatch-cve: CVE-2024-38555 kpatch-cvss: 7.8 kpatch-cve-url: https://access.redhat.com/security/cve/CVE-2024-38555 kpatch-patch-url: https://git.kernel.org/linus/db9b31aa9bc56ff0d15b78f7e827d61c4a096e40 kpatch-name: skipped/CVE-2024-46750.patch kpatch-description: kpatch-kernel: kpatch-cve: CVE-2024-46750 kpatch-skip-reason: Complex adaptation required. Low impact CVE. kpatch-cvss: kpatch-name: rhel7/3.10.0-1160.119.1.el7.tuxcare.els11/CVE-2024-44970-net-mlx5e-SHAMPO-Fix-invalid-WQ-linked-.patch kpatch-description: net/mlx5e: SHAMPO, Fix invalid WQ linked list unlink kpatch-kernel: 3.10.0-1160.119.1.el7.tuxcare.els11 kpatch-cve: CVE-2024-44970 kpatch-cvss: 5.5 kpatch-cve-url: https://access.redhat.com/security/cve/CVE-2024-44970 kpatch-patch-url: https://git.kernel.org/linus/fba8334721e266f92079632598e46e5f89082f30 kpatch-name: 3.10.0/symlink-protection-ge-1127.patch kpatch-description: symlink protection kpatch-kernel: kernel-3.10.0-1127.el7 kpatch-cve: N/A kpatch-cvss: N/A kpatch-cve-url: N/A kpatch-patch-url: https://gerrit.cloudlinux.com/#/admin/projects/lve-kernel-el7 kpatch-name: 3.10.0/symlink-protection-ge-1127.kpatch-1.patch kpatch-description: symlink protection kpatch-kernel: kernel-3.10.0-1127.el7 kpatch-cve: N/A kpatch-cvss: N/A kpatch-cve-url: N/A kpatch-patch-url: https://gerrit.cloudlinux.com/#/admin/projects/lve-kernel-el7 uname: 3.10.0-1160.119.1.el7.tuxcare.els11