![]() Server : Apache System : Linux copper.netcy.com 2.6.32-754.27.1.el6.centos.plus.x86_64 #1 SMP Thu Jan 30 13:54:25 UTC 2020 x86_64 User : montcaro ( 581) PHP Version : 7.4.28 Disable Function : NONE Directory : /var/cache/kcare/patches/none-1e8a7d48debeb86d80d80dd1ae29767ea913f5ca-2-default/ |
OS: centos6-plus kernel: kernel-2.6.32-754.27.1.el6.centos.plus time: 2020-04-01 13:20:28 kpatch-name: 2.6.32/CVE-2019-17055.patch kpatch-description: mISDN: enforce CAP_NET_RAW for raw sockets kpatch-kernel: 2.6.39-400.317.1.el6uek kpatch-cve: CVE-2019-17055 kpatch-cvss: 3.3 kpatch-cve-url: https://linux.oracle.com/cve/CVE-2019-17055.html kpatch-patch-url: https://github.com/oracle/linux-uek/commit/a63083934236faf5c392eccabf84bac736035f80 kpatch-name: 2.6.32/cve-2019-17133-cfg80211-wext-avoid-copying-malformed-SSID.patch kpatch-description: cfg80211: wext: avoid copying malformed SSIDs kpatch-kernel: kernel-2.6.32-754.28.1.el6 kpatch-cve: CVE-2019-17133 kpatch-cvss: 8.8 kpatch-cve-url: https://nvd.nist.gov/vuln/detail/CVE-2019-17133 kpatch-patch-url: https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=4ac2813cc867ae563a1ba5a9414bfb554e5796fa kpatch-name: 2.6.32/proc-restrict-pagemap-access.patch kpatch-description: Restrict access to pagemap/kpageflags/kpagecount kpatch-kernel: kpatch-cve: kpatch-cvss: kpatch-cve-url: http://googleprojectzero.blogspot.ru/2015/03/exploiting-dram-rowhammer-bug-to-gain.html kpatch-patch-url: kpatch-name: 2.6.32/kpatch-add-paravirt-asm-definitions.patch kpatch-description: kpatch-kernel: kpatch-cve: kpatch-cvss: kpatch-cve-url: kpatch-patch-url: uname: 2.6.32-754.28.1.el6