File: //var/cache/kcare/patches/none-a717db4221e42c1f66278c2761b79141bf0b5fff-5-extra/kpatch.extra.info
OS: centos7
kernel: kernel-3.10.0-1160.59.1.el7
time: 2022-04-22 10:31:31
kpatch-name: 3.10.0/CVE-2021-4028-RDMA-cma-Do-not-change-route.addr.src_addr.ss_family.patch
kpatch-description: RDMA/cma: Do not change route.addr.src_addr.ss_family
kpatch-kernel: 3.10.0-1160.62.1
kpatch-cve: CVE-2021-4028
kpatch-cvss: 7.0
kpatch-cve-url: https://security-tracker.debian.org/tracker/CVE-2021-4028
kpatch-patch-url: https://git.kernel.org/stable/c/bc0bdc5afaa740d782fbf936aaeebd65e5c2921d
kpatch-name: 3.10.0/CVE-2021-4083-2-introduce-__fcheck_files-to-fix-rcu_dereference_chec.patch
kpatch-description: fget: check that the fd still exists after getting a ref to it
kpatch-kernel: 3.10.0-1160.62.1.el7
kpatch-cve: CVE-2021-4083
kpatch-cvss: 7.0
kpatch-cve-url: https://access.redhat.com/security/cve/CVE-2021-4083
kpatch-patch-url: https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=054aa8d439b9
kpatch-name: 3.10.0/CVE-2021-4083-3-fget-check-that-the-fd-still-exists-after-getting-a-.patch
kpatch-description: fget: check that the fd still exists after getting a ref to it
kpatch-kernel: 3.10.0-1160.62.1.el7
kpatch-cve: CVE-2021-4083
kpatch-cvss: 7.0
kpatch-cve-url: https://access.redhat.com/security/cve/CVE-2021-4083
kpatch-patch-url: https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=054aa8d439b9
kpatch-name: 3.10.0/CVE-2022-1016-ge-1062.patch
kpatch-description: Initialize registers to avoid stack leak into userspace.
kpatch-kernel: >kernel-3.10.0-1160.62.1.el7
kpatch-cve: CVE-2022-1016
kpatch-cvss: 5.5
kpatch-cve-url: https://access.redhat.com/security/cve/cve-2022-1016
kpatch-patch-url: https://git.kernel.org/linus/4c905f6740a3
kpatch-name: 3.10.0/CVE-2022-1015.patch
kpatch-description: Bail out in case userspace uses unsupported registers.
kpatch-kernel: >kernel-3.10.0-1160.62.1.el7
kpatch-cve: CVE-2022-1015
kpatch-cvss: 6.6
kpatch-cve-url: https://access.redhat.com/security/cve/cve-2022-1015
kpatch-patch-url: https://git.kernel.org/linus/6e1acfa387b9
kpatch-name: 3.10.0/proc-restrict-pagemap-access-1062.patch
kpatch-description: Restrict access to pagemap/kpageflags/kpagecount
kpatch-kernel:
kpatch-cve:
kpatch-cvss:
kpatch-cve-url: http://googleprojectzero.blogspot.ru/2015/03/exploiting-dram-rowhammer-bug-to-gain.html
kpatch-patch-url:
kpatch-name: 3.10.0/symlink-protection-ge-1127.patch
kpatch-description: symlink protection
kpatch-kernel: kernel-3.10.0-1127.el7
kpatch-cve: N/A
kpatch-cvss: N/A
kpatch-cve-url: N/A
kpatch-patch-url: https://gerrit.cloudlinux.com/#/admin/projects/lve-kernel-el7
kpatch-name: 3.10.0/symlink-protection-ge-1127.kpatch-1.patch
kpatch-description: symlink protection
kpatch-kernel: kernel-3.10.0-1127.el7
kpatch-cve: N/A
kpatch-cvss: N/A
kpatch-cve-url: N/A
kpatch-patch-url: https://gerrit.cloudlinux.com/#/admin/projects/lve-kernel-el7
uname: 3.10.0-1160.62.1.el7