%PDF- %PDF-
Direktori : /var/cache/kcare/f72e5c920f4cb0b7caf1574b0d5e5c03119fbfe2/1/ |
Current File : //var/cache/kcare/f72e5c920f4cb0b7caf1574b0d5e5c03119fbfe2/1/kpatch.info |
OS: centos6 kernel: kernel-2.6.32-754.3.5.el6 time: 2018-08-23 11:26:32 kpatch-name: 2.6.32/rds-verify-the-underlying-transport-exists-before-creating-a.patch kpatch-description: RDS: verify the underlying transport exists before creating a connection kpatch-kernel: vzkernel-2.6.32-042stab112.15 kpatch-cve: CVE-2015-6937 kpatch-cvss: 7.1 kpatch-cve-url: https://access.redhat.com/security/cve/cve-2015-6937 kpatch-patch-url: https://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/patch/?id=74e98eb085889b0d2d4908f59f6e00026063014f kpatch-name: 2.6.32/fix-incomplete-CVE-2015-6937.patch kpatch-description: Complete earlier incomplete fix to CVE-2015-6937 kpatch-kernel: >vzkernel-2.6.32-042stab112.15 kpatch-cve: CVE-2015-7990 kpatch-cvss: 7.1 kpatch-cve-url: https://access.redhat.com/security/cve/CVE-2015-7990 kpatch-patch-url: https://lkml.org/lkml/diff/2015/10/16/530/1 kpatch-name: 2.6.32/KEYS-Fix-handling-of-stored-error-in-a-negatively-in.patch kpatch-description: KEYS: Fix handling of stored error in a negatively instantiated user key kpatch-kernel: >kernel-2.6.32-642.13.1.el6 kpatch-cve: CVE-2015-8539 kpatch-cvss: 7.2 kpatch-cve-url: https://access.redhat.com/security/cve/CVE-2015-8539 kpatch-patch-url: https://git.kernel.org/linus/096fe9eaea40a17e125569f9e657e34cdb6d73bd kpatch-name: 2.6.32/kernel-Null-pointer-dereference-in-search_keyring.patch kpatch-description: kernel: Null pointer dereference in search_keyring kpatch-kernel: vzkernel-2.6.32-042stab120.20 kpatch-cve: CVE-2017-2647 kpatch-cvss: 1.9 kpatch-cve-url: https://access.redhat.com/security/cve/CVE-2017-2647 kpatch-patch-url: https://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=c06cfb08b88d kpatch-name: 2.6.32/CVE-2017-7472.patch kpatch-description: keyctl_set_reqkey_keyring() leaks thread keyrings kpatch-kernel: vzkernel-2.6.32-042stab123.2 kpatch-cve: CVE-2017-7472 kpatch-cvss: 5.5 kpatch-cve-url: https://access.redhat.com/security/cve/CVE-2017-7472 kpatch-patch-url: http://download.openvz.org/kernel/branches/rhel6-2.6.32/042stab123.2/patches/patch-042stab123.2-combined.gz kpatch-name: 2.6.32/keys-fix-dereferencing-null-payload-with-nonzero-length.patch kpatch-description: KEYS: fix dereferencing NULL payload with nonzero length kpatch-kernel: 2.6.32-042stab125.5 kpatch-cve: CVE-2017-15274 kpatch-cvss: 5.5 kpatch-cve-url: https://access.redhat.com/security/cve/cve-2017-15274 kpatch-patch-url: https://git.kernel.org/linus/5649645d725c73df4302428ee4e02c869248b4c5 kpatch-name: 2.6.32/proc-restrict-pagemap-access.patch kpatch-description: Restrict access to pagemap/kpageflags/kpagecount kpatch-kernel: kpatch-cve: kpatch-cvss: kpatch-cve-url: http://googleprojectzero.blogspot.ru/2015/03/exploiting-dram-rowhammer-bug-to-gain.html kpatch-patch-url: kpatch-name: 2.6.32/kpatch-add-paravirt-asm-definitions.patch kpatch-description: kpatch-kernel: kpatch-cve: kpatch-cvss: kpatch-cve-url: kpatch-patch-url: uname: 2.6.32-754.3.5.el6