Your IP : 3.136.236.173


Current Path : /var/cache/kcare/patches/none-71cbdfb55b526d8daf71cca0df63437dc39d7dfe-2-extra/
Upload File :
Current File : //var/cache/kcare/patches/none-71cbdfb55b526d8daf71cca0df63437dc39d7dfe-2-extra/kpatch.extra.info

OS: centos7
kernel: kernel-3.10.0-1160.119.1.el7.tuxcare.els10
time: 2024-11-27 12:00:12

kpatch-name: skipped/CVE-2022-2196.patch
kpatch-description: 
kpatch-kernel: 
kpatch-cve: CVE-2022-2196
kpatch-skip-reason: Produce issues with nested virtualisation scenarios
kpatch-cvss: 

kpatch-name: rhel7/3.10.0-1160.119.1.el7.tuxcare.els11/CVE-2022-20368-Revert-net-packet-fix-slab-out-of-bound.patch
kpatch-description: Revert "net/packet: fix slab-out-of-bounds access in packet_recvmsg()"
kpatch-kernel: 3.10.0-1160.119.1.el7.tuxcare.els11
kpatch-cve: CVE-2022-20368
kpatch-cvss: N/A
kpatch-cve-url: https://access.redhat.com/security/cve/CVE-2022-20368
kpatch-patch-url: https://git.kernel.org/linus/c700525fcc06b05adfea78039de02628af79e07a

kpatch-name: rhel7/3.10.0-1160.119.1.el7.tuxcare.els11/CVE-2022-20368-packet-in-recvmsg-msg_name-return-at-le.patch
kpatch-description: packet: in recvmsg msg_name return at least sizeof sockaddr_ll
kpatch-kernel: 3.10.0-1160.119.1.el7.tuxcare.els11
kpatch-cve: CVE-2022-20368
kpatch-cvss: N/A
kpatch-cve-url: https://access.redhat.com/security/cve/CVE-2022-20368
kpatch-patch-url: https://git.kernel.org/linus/b2cf86e1563e33a14a1c69b3e508d15dc12f804c

kpatch-name: rhel7/3.10.0-1160.119.1.el7.tuxcare.els11/CVE-2022-20368-net-packet-fix-slab-out-of-bounds-acces.patch
kpatch-description: net/packet: fix slab-out-of-bounds access in packet_recvmsg()
kpatch-kernel: 3.10.0-1160.119.1.el7.tuxcare.els11
kpatch-cve: CVE-2022-20368
kpatch-cvss: N/A
kpatch-cve-url: https://access.redhat.com/security/cve/CVE-2022-20368
kpatch-patch-url: https://git.kernel.org/linus/c700525fcc06b05adfea78039de02628af79e07a

kpatch-name: rhel7/3.10.0-1160.119.1.el7.tuxcare.els11/CVE-2022-1048-ALSA-pcm-Fix-races-among-concurrent-hw_.patch
kpatch-description: ALSA: pcm: Fix races among concurrent hw_params and hw_free calls
kpatch-kernel: 3.10.0-1160.119.1.el7.tuxcare.els11
kpatch-cve: CVE-2022-1048
kpatch-cvss: 7.0
kpatch-cve-url: https://access.redhat.com/security/cve/CVE-2022-1048
kpatch-patch-url: https://git.kernel.org/linus/92ee3c60ec9fe64404dc035e7c41277d74aa26cb

kpatch-name: rhel7/3.10.0-1160.119.1.el7.tuxcare.els11/CVE-2022-1048-ALSA-pcm-Fix-races-among-concurrent-rea.patch
kpatch-description: ALSA: pcm: Fix races among concurrent read/write and buffer changes
kpatch-kernel: 3.10.0-1160.119.1.el7.tuxcare.els11
kpatch-cve: CVE-2022-1048
kpatch-cvss: 7.0
kpatch-cve-url: https://access.redhat.com/security/cve/CVE-2022-1048
kpatch-patch-url: https://git.kernel.org/linus/dca947d4d26dbf925a64a6cfb2ddbc035e831a3d

kpatch-name: rhel7/3.10.0-1160.119.1.el7.tuxcare.els11/CVE-2022-1048-ALSA-pcm-Fix-races-among-concurrent-pr1.patch
kpatch-description: ALSA: pcm: Fix races among concurrent prepare and hw_params/hw_free calls
kpatch-kernel: 3.10.0-1160.119.1.el7.tuxcare.els11
kpatch-cve: CVE-2022-1048
kpatch-cvss: 7.0
kpatch-cve-url: https://access.redhat.com/security/cve/CVE-2022-1048
kpatch-patch-url: https://git.kernel.org/linus/3c3201f8c7bb77eb53b08a3ca8d9a4ddc500b4c0

kpatch-name: rhel7/3.10.0-1160.119.1.el7.tuxcare.els11/CVE-2022-1048-ALSA-pcm-Fix-races-among-concurrent-pr2.patch
kpatch-description: ALSA: pcm: Fix races among concurrent prepare and hw_params/hw_free calls
kpatch-kernel: 3.10.0-1160.119.1.el7.tuxcare.els11
kpatch-cve: CVE-2022-1048
kpatch-cvss: 7.0
kpatch-cve-url: https://access.redhat.com/security/cve/CVE-2022-1048
kpatch-patch-url: https://git.kernel.org/linus/69534c48ba8ce552ce383b3dfdb271ffe51820c3

kpatch-name: rhel7/3.10.0-1160.119.1.el7.tuxcare.els11/CVE-2022-1048-kpatch.patch
kpatch-description: N/A
kpatch-kernel: 3.10.0-1160.119.1.el7.tuxcare.els11
kpatch-cve: CVE-2022-1048
kpatch-cvss: 7.0
kpatch-cve-url: https://access.redhat.com/security/cve/CVE-2022-1048
kpatch-patch-url: https://git.kernel.org/linus/92ee3c60ec9fe64404dc035e7c41277d74aa26cb

kpatch-name: rhel7/3.10.0-1160.119.1.el7.tuxcare.els11/CVE-2024-38555-net-mlx5-Discard-command-completions-in.patch
kpatch-description: net/mlx5: Discard command completions in internal error
kpatch-kernel: 3.10.0-1160.119.1.el7.tuxcare.els11
kpatch-cve: CVE-2024-38555
kpatch-cvss: 7.8
kpatch-cve-url: https://access.redhat.com/security/cve/CVE-2024-38555
kpatch-patch-url: https://git.kernel.org/linus/db9b31aa9bc56ff0d15b78f7e827d61c4a096e40

kpatch-name: skipped/CVE-2024-46750.patch
kpatch-description: 
kpatch-kernel: 
kpatch-cve: CVE-2024-46750
kpatch-skip-reason: Complex adaptation required. Low impact CVE.
kpatch-cvss: 

kpatch-name: rhel7/3.10.0-1160.119.1.el7.tuxcare.els11/CVE-2024-44970-net-mlx5e-SHAMPO-Fix-invalid-WQ-linked-.patch
kpatch-description: net/mlx5e: SHAMPO, Fix invalid WQ linked list unlink
kpatch-kernel: 3.10.0-1160.119.1.el7.tuxcare.els11
kpatch-cve: CVE-2024-44970
kpatch-cvss: 5.5
kpatch-cve-url: https://access.redhat.com/security/cve/CVE-2024-44970
kpatch-patch-url: https://git.kernel.org/linus/fba8334721e266f92079632598e46e5f89082f30

kpatch-name: 3.10.0/symlink-protection-ge-1127.patch
kpatch-description: symlink protection
kpatch-kernel: kernel-3.10.0-1127.el7
kpatch-cve: N/A
kpatch-cvss: N/A
kpatch-cve-url: N/A
kpatch-patch-url: https://gerrit.cloudlinux.com/#/admin/projects/lve-kernel-el7

kpatch-name: 3.10.0/symlink-protection-ge-1127.kpatch-1.patch
kpatch-description: symlink protection
kpatch-kernel: kernel-3.10.0-1127.el7
kpatch-cve: N/A
kpatch-cvss: N/A
kpatch-cve-url: N/A
kpatch-patch-url: https://gerrit.cloudlinux.com/#/admin/projects/lve-kernel-el7


uname: 3.10.0-1160.119.1.el7.tuxcare.els11