To see which patches have been applied to your kernel, you can use the following command:
kcarectl --patch-info
You will see something like this:
# kcarectl --patch-info OS: cl7 kernel: kernel-3.10.0-714.10.2.lve1.5.9.el7 time: 2018-05-05 10:51:41 kpatch-name: 3.10.0/x86-kvm-nVMX-update-last_nonleaf_level-when-initializing-nested-EPT.patch kpatch-description: kvm: nVMX: update last_nonleaf_level when initializing nested EPT kpatch-kernel: 3.10.0-693.21.1.el7 kpatch-cve: CVE-2017-12188 kpatch-cvss: 7.6 kpatch-cve-url: https://access.redhat.com/security/cve/cve-2017-12188 kpatch-patch-url: https://access.redhat.com/labs/psb/versions/kernel-3.10.0-693.21.1.el7/patches/x86-kvm-nVMX-update-last_nonleaf_level-when-initializing-nested-EPT kpatch-name: 3.10.0/x86-kvm-mmu-always-terminate-page-walks-at-level-1.patch kpatch-description: kvm: mmu: always terminate page walks at level 1 kpatch-kernel: 3.10.0-693.21.1.el7 kpatch-cve: CVE-2017-12188 kpatch-cvss: 7.6 kpatch-cve-url: https://access.redhat.com/security/cve/cve-2017-12188 kpatch-patch-url: https://access.redhat.com/labs/psb/versions/kernel-3.10.0-693.21.1.el7/patches/x86-kvm-mmu-always-terminate-page-walks-at-level-1 ...
If you still have questions about your patches, feel free to contact us by opening a support ticket or by using our live chat feature.