File Manager
Create Folder
Create File
Upload File
Home
/ Directory >
/
var
/
cache
/
kcare
/
patches
/
none-8d2310a93bc33dcee4e39f064602ae805157b0b0-8-default
Item Name
Actions
.done
Delete
Rename
Edit
kcare.ko
Delete
Rename
Edit
kpatch.bin
Delete
Rename
Edit
kpatch.info
Delete
Rename
Edit
tmp.kcare.ko.sig
Delete
Rename
Edit
tmp.kpatch.bin.sig
Delete
Rename
Edit
tmp.kpatch.info.sig
Delete
Rename
Edit
Edit File: kpatch.info
OS: centos7 kernel: kernel-3.10.0-1160.119.1.el7 time: 2025-04-10 09:42:18 kpatch-name: rhel7/3.10.0-1160.123.1.el7/CVE-2024-36971-ELSCVE-27162-net-fix-__dst_negative_advice-race.patch kpatch-description: net: fix __dst_negative_advice() race kpatch-kernel: 3.10.0-1160.123.1.el7 kpatch-cve: CVE-2024-36971 kpatch-cvss: 7.8 kpatch-cve-url: https://access.redhat.com/security/cve/CVE-2024-36971 kpatch-patch-url: https://git.kernel.org/linus/92f1655aa2b2294d0b49925f3b875a634bd3b59e kpatch-name: rhel7/3.10.0-1160.123.1.el7/CVE-2022-1011-ELSCVE-14458-fuse-fix-pipe-buffer-lifetime-for-direc.patch kpatch-description: fuse: fix pipe buffer lifetime for direct_io kpatch-kernel: 3.10.0-1160.123.1.el7 kpatch-cve: CVE-2022-1011 kpatch-cvss: 7.0 kpatch-cve-url: https://access.redhat.com/security/cve/CVE-2022-1011 kpatch-patch-url: https://git.kernel.org/linus/0c4bcfdecb1ac0967619ee7ff44871d93c08c909 kpatch-name: rhel7/3.10.0-1160.123.1.el7/CVE-2022-1011-ELSCVE-14458-fuse-fix-pipe-buffer-lifetime-for-direc-kpatch.patch kpatch-description: fuse: fix pipe buffer lifetime for direct_io kpatch-kernel: 3.10.0-1160.123.1.el7 kpatch-cve: CVE-2022-1011 kpatch-cvss: 7.0 kpatch-cve-url: https://access.redhat.com/security/cve/CVE-2022-1011 kpatch-patch-url: https://git.kernel.org/linus/0c4bcfdecb1ac0967619ee7ff44871d93c08c909 kpatch-name: rhel7/3.10.0-1160.125.1.el7/CVE-2024-41071-wifi-mac80211-Avoid-address-calculation.patch kpatch-description: wifi: mac80211: Avoid address calculations via out of bounds array indexing kpatch-kernel: 3.10.0-1160.125.1.el7 kpatch-cve: CVE-2024-41071 kpatch-cvss: 7.8 kpatch-cve-url: https://access.redhat.com/security/cve/CVE-2024-41071 kpatch-patch-url: https://git.kernel.org/linus/2663d0462eb32ae7c9b035300ab6b1523886c718 kpatch-name: 3.10.0/CVE-2024-2201-native-bhi-el7.patch kpatch-description: x86/bhi: Add support for clearing branch history at syscall entry kpatch-kernel: kernel-4.18.0-553.16.1.el8_10 kpatch-cve: CVE-2024-2201 kpatch-cvss: 4.7 kpatch-cve-url: https://access.redhat.com/security/cve/CVE-2024-2201 kpatch-patch-url: https://git.kernel.org/linus/7390db8aea0d64e9deb28b8e1ce716f5020c7ee5 kpatch-name: rhel7/3.10.0-1160.132.1.el7/CVE-2024-53104-media-uvcvideo-Skip-parsing-frames-of-type-UVC_VS_UNDEFINED.patch kpatch-description: media: uvcvideo: Skip parsing frames of type UVC_VS_UNDEFINED in uvc_parse_format kpatch-kernel: 3.10.0-1160.132.1.el7 kpatch-cve: CVE-2024-53104 kpatch-cvss: 7.3 kpatch-cve-url: https://access.redhat.com/security/cve/CVE-2024-53104 kpatch-patch-url: https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git/commit/?id=beced2cb09b58c1243733f374c560a55382003d6 kpatch-name: rhel7/3.10.0-1160.133.1.el7/CVE-2023-52922-can-bcm-Fix-UAF-in-bcm_proc_show.patch kpatch-description: can: bcm: Fix UAF in bcm_proc_show() kpatch-kernel: 3.10.0-1160.133.1.el7 kpatch-cve: CVE-2023-52922 kpatch-cvss: 7.8 kpatch-cve-url: https://access.redhat.com/security/cve/CVE-2023-52922 kpatch-patch-url: https://git.kernel.org/linus/55c3b96074f3f9b0aee19bf93cd71af7516582bb kpatch-name: rhel7/3.10.0-1160.133.1.el7/CVE-2024-50302-HID-core-zero-initialize-the-report-buffer.patch kpatch-description: HID: core: zero-initialize the report buffer kpatch-kernel: 3.10.0-1160.133.1.el7 kpatch-cve: CVE-2024-50302 kpatch-cvss: 6.1 kpatch-cve-url: https://access.redhat.com/security/cve/CVE-2024-50302 kpatch-patch-url: https://git.kernel.org/linus/177f25d1292c7e16e1199b39c85480f7f8815552 kpatch-name: rhel7/3.10.0-1160.133.1.el7/CVE-2024-53197-0001-ALSA-usb-audio-Fix-potential-out-of-bound-accesses-f.patch kpatch-description: ALSA: usb-audio: Fix potential out-of-bound accesses for Extigy and Mbox devices kpatch-kernel: 3.10.0-1160.133.1.el7 kpatch-cve: CVE-2024-53197 kpatch-cvss: 5.8 kpatch-cve-url: https://access.redhat.com/security/cve/CVE-2024-53197 kpatch-patch-url: https://git.kernel.org/linus/b909df18ce2a998afef81d58bbd1a05dc0788c40 kpatch-name: rhel7/3.10.0-1160.133.1.el7/CVE-2024-53197-0002-ALSA-usb-audio-Fix-a-DMA-to-stack-memory-bug.patch kpatch-description: ALSA: usb-audio: Fix a DMA to stack memory bug kpatch-kernel: 3.10.0-1160.133.1.el7 kpatch-cve: CVE-2024-53197 kpatch-cvss: 5.8 kpatch-cve-url: https://access.redhat.com/security/cve/CVE-2024-53197 kpatch-patch-url: https://git.kernel.org/linus/f7d306b47a24367302bd4fe846854e07752ffcd9 kpatch-name: 3.10.0/proc-restrict-pagemap-access-1062.patch kpatch-description: Restrict access to pagemap/kpageflags/kpagecount kpatch-kernel: N/A kpatch-cve: N/A kpatch-cvss: N/A kpatch-cve-url: http://googleprojectzero.blogspot.ru/2015/03/exploiting-dram-rowhammer-bug-to-gain.html kpatch-patch-url: N/A uname: 3.10.0-1160.119.1.el7