{"id":215315,"status":"changed","playbook":{"id":2515,"items":{"plays":1,"tasks":1,"results":15,"hosts":15,"files":1,"records":0},"arguments":{"version":null,"verbosity":2,"become":false,"become_method":"sudo","become_user":null,"become_ask_pass":false,"become_password_file":null,"inventory":["/home/ssh-gateway/ansible/hosts-kvm-nodes"],"listhosts":false,"subset":null,"poll_interval":15,"seconds":0,"one_line":false,"tree":null,"private_key_file":"/home/ssh-gateway/.ssh/id_rsa","remote_user":"root","connection":"ssh","timeout":null,"ssh_common_args":null,"sftp_extra_args":null,"scp_extra_args":null,"ssh_extra_args":null,"ask_pass":false,"connection_password_file":null,"check":false,"diff":false,"extra_vars":"Not saved by ARA as configured by 'ignored_arguments'","vault_ids":[],"ask_vault_pass":false,"vault_password_files":[],"forks":20,"module_path":null,"basedir":null,"task_timeout":0,"module_args":"kcarectl --patch-info","module_name":"shell","args":"all-prod"},"labels":[{"id":1,"name":"remote_user:root"},{"id":2,"name":"check:False"}],"started":"2025-02-17T15:39:33.166600Z","ended":"2025-02-17T15:39:37.852360Z","duration":"00:00:04.685760","name":null,"ansible_version":"2.16.11","client_version":"1.7.2","python_version":"3.10.10","server_version":"1.7.2","status":"expired","path":"Ad-Hoc: shell: kcarectl --patch-info","controller":"ssh-gw-4.layershift.com","user":"root"},"play":{"id":2832,"items":{"tasks":1,"results":15},"started":"2025-02-17T15:39:33.272087Z","ended":null,"duration":null,"name":"Ansible Ad-Hoc","status":"running"},"task":{"id":6075,"items":{"results":15},"path":"Ad-Hoc: shell: kcarectl --patch-info","tags":[],"started":"2025-02-17T15:39:33.358455Z","ended":"2025-02-17T15:39:34.437681Z","duration":"00:00:01.079226","name":"shell","uuid":"001851d0-75dc-ec3c-9180-00000000001a","action":"shell","lineno":1,"handler":false,"status":"completed","warnings":[],"deprecations":[],"exceptions":[],"file":4601},"host":{"id":89653,"name":"kvm012","changed":0,"failed":0,"ok":0,"skipped":0,"unreachable":0},"delegated_to":[],"content":{"ansible_facts":{"discovered_interpreter_python":"/usr/bin/python3"},"changed":true,"cmd":"kcarectl --patch-info","delta":"0:00:00.573692","end":"2025-02-17 15:39:35.369280","invocation":{"module_args":{"_raw_params":"kcarectl --patch-info","_uses_shell":true,"argv":null,"chdir":null,"creates":null,"executable":null,"expand_argument_vars":true,"removes":null,"stdin":null,"stdin_add_newline":true,"strip_empty_ends":true}},"msg":"","rc":0,"start":"2025-02-17 15:39:34.795588","stderr":"","stderr_lines":[],"stdout":"OS: almalinux9\nkernel: kernel-5.14.0-503.15.1.el9_5\ntime: 2025-02-07 14:11:19\n\nkpatch-name: rhel9/5.14.0-503.16.1.el9_5/CVE-2024-50251-netfilter-nft_payload-sanitize-offset-and-length-before-calling-skb_checksum.patch\nkpatch-description: netfilter: nft_payload: sanitize offset and length before calling skb_checksum()\nkpatch-kernel: 5.14.0-503.16.1.el9_5\nkpatch-cve: CVE-2024-50251\nkpatch-cvss: 6.2\nkpatch-cve-url: https://access.redhat.com/security/cve/CVE-2024-50251\nkpatch-patch-url: https://git.kernel.org/linus/d5953d680f7e96208c29ce4139a0e38de87a57fe\n\nkpatch-name: rhel9/5.14.0-503.16.1.el9_5/CVE-2024-26615-net-smc-fix-illegal-rmb-desc-access-in-smc-d-connection-dump.patch\nkpatch-description: net/smc: fix illegal rmb_desc access in SMC-D connection dump\nkpatch-kernel: 5.14.0-503.16.1.el9_5\nkpatch-cve: CVE-2024-26615\nkpatch-cvss: 5.5\nkpatch-cve-url: https://access.redhat.com/security/cve/CVE-2024-26615\nkpatch-patch-url: https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/patch/?id=dbc153fd3c142909e564bb256da087e13fbf239c\n\nkpatch-name: rhel9/5.14.0-503.16.1.el9_5/CVE-2024-43854-block-initialize-integrity-buffer-to-zero-before-writing-it-to-media.patch\nkpatch-description: block: initialize integrity buffer to zero before writing it to media\nkpatch-kernel: 5.14.0-503.16.1.el9_5\nkpatch-cve: CVE-2024-43854\nkpatch-cvss: 5.5\nkpatch-cve-url: https://access.redhat.com/security/cve/CVE-2024-43854\nkpatch-patch-url: https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/patch/?id=899ee2c3829c5ac14bfc7d3c4a5846c0b709b78f\n\nkpatch-name: rhel9/5.14.0-503.16.1.el9_5/CVE-2024-44994-iommu-restore-lost-return-in-iommu-report-device-fault.patch\nkpatch-description: iommu: Restore lost return in iommu_report_device_fault()\nkpatch-kernel: 5.14.0-503.16.1.el9_5\nkpatch-cve: CVE-2024-44994\nkpatch-cvss: 5.5\nkpatch-cve-url: https://access.redhat.com/security/cve/CVE-2024-44994\nkpatch-patch-url: https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/patch/?id=fca5b78511e98bdff2cdd55c172b23200a7b3404\n\nkpatch-name: rhel9/5.14.0-503.16.1.el9_5/CVE-2024-46695-selinux-smack-don-t-bypass-permissions-check-in-inode-setsecctx-hook.patch\nkpatch-description: selinux,smack: don't bypass permissions check in inode_setsecctx hook\nkpatch-kernel: 5.14.0-503.16.1.el9_5\nkpatch-cve: CVE-2024-46695\nkpatch-cvss: 5.5\nkpatch-cve-url: https://access.redhat.com/security/cve/CVE-2024-46695\nkpatch-patch-url: https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git/commit/?id=eebec98791d0137e455cc006411bb92a54250924\n\nkpatch-name: rhel9/5.14.0-503.16.1.el9_5/CVE-2024-49949-net-avoid-potential-underflow-in-qdisc_pkt_len_init-with-UFO.patch\nkpatch-description: net: avoid potential underflow in qdisc_pkt_len_init() with UFO\nkpatch-kernel: 5.14.0-503.16.1.el9_5\nkpatch-cve: CVE-2024-49949\nkpatch-cvss: 5.5\nkpatch-cve-url: https://access.redhat.com/security/cve/CVE-2024-49949\nkpatch-patch-url: https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git/commit/?id=c20029db28399ecc50e556964eaba75c43b1e2f1\n\nkpatch-name: rhel9/5.14.0-503.19.1.el9_5/CVE-2024-27399-bluetooth-l2cap-fix-null-ptr-deref-in-l2cap-chan-timeout.patch\nkpatch-description: Bluetooth: l2cap: fix null-ptr-deref in l2cap_chan_timeout\nkpatch-kernel: 5.14.0-503.19.1.el9_5\nkpatch-cve: CVE-2024-27399\nkpatch-cvss: 5.5\nkpatch-cve-url: https://access.redhat.com/security/cve/CVE-2024-27399\nkpatch-patch-url: https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/patch/?id=adf0398cee86643b8eacde95f17d073d022f782c\n\nkpatch-name: rhel9/5.14.0-503.19.1.el9_5/CVE-2024-38564-bpf-add-bpf-prog-type-cgroup-skb-attach-type-enforcement-in-bpf-link-create.patch\nkpatch-description: bpf: Add BPF_PROG_TYPE_CGROUP_SKB attach type enforcement in BPF_LINK_CREATE\nkpatch-kernel: 5.14.0-503.19.1.el9_5\nkpatch-cve: CVE-2024-38564\nkpatch-cvss: 5.5\nkpatch-cve-url: https://access.redhat.com/security/cve/CVE-2024-38564\nkpatch-patch-url: https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/patch/?id=543576ec15b17c0c93301ac8297333c7b6e84ac7\n\nkpatch-name: rhel9/5.14.0-503.19.1.el9_5/CVE-2024-45020-bpf-fix-a-kernel-verifier-crash-in-stacksafe.patch\nkpatch-description: bpf: Fix a kernel verifier crash in stacksafe()\nkpatch-kernel: 5.14.0-503.19.1.el9_5\nkpatch-cve: CVE-2024-45020\nkpatch-cvss: 5.5\nkpatch-cve-url: https://access.redhat.com/security/cve/CVE-2024-45020\nkpatch-patch-url: https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/patch/?id=bed2eb964c70b780fb55925892a74f26cb590b25\n\nkpatch-name: rhel9/5.14.0-503.19.1.el9_5/CVE-2024-47675-bpf-fix-use-after-free-in-bpf-uprobe-multi-link-attach.patch\nkpatch-description: bpf: Fix use-after-free in bpf_uprobe_multi_link_attach()\nkpatch-kernel: 5.14.0-503.19.1.el9_5\nkpatch-cve: CVE-2024-47675\nkpatch-cvss: 7.8\nkpatch-cve-url: https://access.redhat.com/security/cve/CVE-2024-47675\nkpatch-patch-url: https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/patch/?id=5fe6e308abaea082c20fbf2aa5df8e14495622cf\n\nkpatch-name: rhel9/5.14.0-503.19.1.el9_5/CVE-2024-50099-arm64-probes-remove-broken-ldr-literal-uprobe-support.patch\nkpatch-description: arm64: probes: Remove broken LDR (literal) uprobe support\nkpatch-kernel: 5.14.0-503.19.1.el9_5\nkpatch-cve: CVE-2024-50099\nkpatch-cvss: 5.5\nkpatch-cve-url: https://access.redhat.com/security/cve/CVE-2024-50099\nkpatch-patch-url: https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/patch/?id=acc450aa07099d071b18174c22a1119c57da8227\n\nkpatch-name: rhel9/5.14.0-503.19.1.el9_5/CVE-2024-50262-bpf-fix-out-of-bounds-write-in-trie-get-next-key.patch\nkpatch-description: bpf: Fix out-of-bounds write in trie_get_next_key()\nkpatch-kernel: 5.14.0-503.19.1.el9_5\nkpatch-cve: CVE-2024-50262\nkpatch-cvss: 7.8\nkpatch-cve-url: https://access.redhat.com/security/cve/CVE-2024-50262\nkpatch-patch-url: https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/patch/?id=13400ac8fb80c57c2bfb12ebd35ee121ce9b4d21\n\nkpatch-name: rhel9/5.14.0-503.19.1.el9_5/CVE-2024-50115-KVM-nSVM-Ignore-nCR3-4-0-when-loading-PDPTEs-from-memory.patch\nkpatch-description: KVM: nSVM: Ignore nCR3[4:0] when loading PDPTEs from memory\nkpatch-kernel: 5.14.0-503.19.1.el9_5\nkpatch-cve: CVE-2024-50115\nkpatch-cvss: 7.1\nkpatch-cve-url: https://access.redhat.com/security/cve/CVE-2024-50115\nkpatch-patch-url: https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=f559b2e9c5c5308850544ab59396b7d53cfc67bd\n\nkpatch-name: rhel9/5.14.0-503.19.1.el9_5/CVE-2024-46697-nfsd-ensure-that-nfsd4_fattr_args-context-is-zeroed-out.patch\nkpatch-description: nfsd: ensure that nfsd4_fattr_args.context is zeroed out\nkpatch-kernel: 5.14.0-503.19.1.el9_5\nkpatch-cve: CVE-2024-46697\nkpatch-cvss: 5.5\nkpatch-cve-url: https://access.redhat.com/security/cve/CVE-2024-46697\nkpatch-patch-url: https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=f58bab6fd4063913bd8321e99874b8239e9ba726\n\nkpatch-name: rhel9/5.14.0-503.19.1.el9_5/CVE-2024-50110-xfrm-fix-one-more-kernel-infoleak-in-algo-dumping.patch\nkpatch-description: xfrm: fix one more kernel-infoleak in algo dumping\nkpatch-kernel: 5.14.0-503.19.1.el9_5\nkpatch-cve: CVE-2024-50110\nkpatch-cvss: 5.5\nkpatch-cve-url: https://access.redhat.com/security/cve/CVE-2024-50110\nkpatch-patch-url: https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=6889cd2a93e1e3606b3f6e958aa0924e836de4d2\n\nkpatch-name: rhel9/5.14.0-503.19.1.el9_5/CVE-2024-50142-xfrm-validate-new-sa-s-prefixlen-using-sa-family-when-sel-family-is-unset.patch\nkpatch-description: xfrm: validate new SA's prefixlen using SA family when sel.family is unset\nkpatch-kernel: 5.14.0-503.19.1.el9_5\nkpatch-cve: CVE-2024-50142\nkpatch-cvss: 5.5\nkpatch-cve-url: https://access.redhat.com/security/cve/CVE-2024-50142\nkpatch-patch-url: https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/patch/?id=3f0ab59e6537c6a8f9e1b355b48f9c05a76e8563\n\nkpatch-name: rhel9/5.14.0-503.19.1.el9_5/CVE-2024-50148-Bluetooth-bnep-fix-wild-memory-access-in-proto_unregister.patch\nkpatch-description: Bluetooth: bnep: fix wild-memory-access in proto_unregister\nkpatch-kernel: 5.14.0-503.19.1.el9_5\nkpatch-cve: CVE-2024-50148\nkpatch-cvss: 5.5\nkpatch-cve-url: https://access.redhat.com/security/cve/CVE-2024-50148\nkpatch-patch-url: https://git.kernel.org/linus/64a90991ba8d4e32e3173ddd83d0b24167a5668c\n\nkpatch-name: skipped/CVE-2024-50255.patch\nkpatch-description: \nkpatch-kernel: \nkpatch-cve: CVE-2024-50255\nkpatch-skip-reason: Bluetooth subsystem. Patched function may wait for a while, which may prevent patching/unpatching.\nkpatch-cvss: \n\nkpatch-name: rhel9/5.14.0-503.19.1.el9_5/CVE-2024-50223-sched-numa-Fix-the-potential-null-pointer-dereference-in-task_numa_work.patch\nkpatch-description: sched/numa: Fix the potential null pointer dereference in task_numa_work()\nkpatch-kernel: 5.14.0-503.19.1.el9_5\nkpatch-cve: CVE-2024-50223\nkpatch-cvss: 5.5\nkpatch-cve-url: https://access.redhat.com/security/cve/CVE-2024-50223\nkpatch-patch-url: https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/patch/?id=9c70b2a33cd2aa6a5a59c5523ef053bd42265209\n\nkpatch-name: rhel9/5.14.0-503.19.1.el9_5/CVE-2024-50125-Bluetooth-SCO-Fix-UAF-on-sco_sock_timeout.patch\nkpatch-description: Bluetooth: SCO: Fix UAF on sco_sock_timeout\nkpatch-kernel: 5.14.0-503.19.1.el9_5\nkpatch-cve: CVE-2024-50125\nkpatch-cvss: 7.8\nkpatch-cve-url: https://access.redhat.com/security/cve/CVE-2024-50125\nkpatch-patch-url: https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/patch/?id=d30803f6a972\n\nkpatch-name: rhel9/5.14.0-503.19.1.el9_5/CVE-2024-50124-Bluetooth-ISO-Fix-UAF-on-iso_sock_timeout.patch\nkpatch-description: Bluetooth: ISO: Fix UAF on iso_sock_timeout\nkpatch-kernel: 5.14.0-503.19.1.el9_5\nkpatch-cve: CVE-2024-50124\nkpatch-cvss: 7.8\nkpatch-cve-url: https://access.redhat.com/security/cve/CVE-2024-50124\nkpatch-patch-url: https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/patch/?id=246b435ad668\n\nkpatch-name: rhel9/5.14.0-503.21.1.el9_5/CVE-2024-50208-rdma-bnxt-re-fix-a-bug-while-setting-up-level-2-pbl-pages.patch\nkpatch-description: RDMA/bnxt_re: Fix a bug while setting up Level-2 PBL pages\nkpatch-kernel: 5.14.0-503.21.1.el9_5\nkpatch-cve: CVE-2024-50208\nkpatch-cvss: 5.5\nkpatch-cve-url: https://access.redhat.com/security/cve/CVE-2024-50208\nkpatch-patch-url: https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/patch/?id=7988bdbbb85ac85a847baf09879edcd0f70521dc\n\nkpatch-name: rhel9/5.14.0-503.21.1.el9_5/CVE-2024-53122-mptcp-cope-racing-subflow-creation-in-mptcp-rcv-space-adjust.patch\nkpatch-description: mptcp: cope racing subflow creation in mptcp_rcv_space_adjust\nkpatch-kernel: 5.14.0-503.21.1.el9_5\nkpatch-cve: CVE-2024-53122\nkpatch-cvss: 5.5\nkpatch-cve-url: https://access.redhat.com/security/cve/CVE-2024-53122\nkpatch-patch-url: https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/patch/?id=ce7356ae35943cc6494cc692e62d51a734062b7d\n\nkpatch-name: rhel9/5.14.0-503.21.1.el9_5/CVE-2024-50252-mlxsw-spectrum_ipip-Fix-memory-leak-when-changing-remote-IPv6-address.patch\nkpatch-description: mlxsw: spectrum_ipip: Fix memory leak when changing remote IPv6 address\nkpatch-kernel: 5.14.0-503.21.1.el9_5\nkpatch-cve: CVE-2024-50252\nkpatch-cvss: 5.5\nkpatch-cve-url: https://access.redhat.com/security/cve/CVE-2024-50252\nkpatch-patch-url: https://github.com/torvalds/linux/commit/12ae97c531fcd3bfd774d4dfeaeac23eafe24280\n\nkpatch-name: rhel9/5.14.0-503.21.1.el9_5/CVE-2024-46713-perf-aux-Fix-AUX-buffer-serialization.patch\nkpatch-description: perf/aux: Fix AUX buffer serialization\nkpatch-kernel: 5.14.0-503.21.1.el9_5\nkpatch-cve: CVE-2024-46713\nkpatch-cvss: 5.5\nkpatch-cve-url: https://access.redhat.com/security/cve/CVE-2024-46713\nkpatch-patch-url: https://github.com/torvalds/linux/commit/2ab9d830262c132ab5db2f571003d80850d56b2a\n\nkpatch-name: rhel9/5.14.0-503.21.1.el9_5/CVE-2024-46713-perf-aux-Fix-AUX-buffer-serialization-kpatch.patch\nkpatch-description: perf/aux: Fix AUX buffer serialization (Adaptation)\nkpatch-kernel: 5.14.0-503.21.1.el9_5\nkpatch-cve: CVE-2024-46713\nkpatch-cvss: 5.5\nkpatch-cve-url: https://access.redhat.com/security/cve/CVE-2024-46713\nkpatch-patch-url: https://github.com/torvalds/linux/commit/2ab9d830262c132ab5db2f571003d80850d56b2a\n\nkpatch-name: rhel9/5.14.0-503.22.1.el9_5/CVE-2024-50154-tcp-dccp-Don-t-use-timer_pending-in-reqsk_queue_unlink.patch\nkpatch-description: tcp/dccp: Don't use timer_pending() in reqsk_queue_unlink()\nkpatch-kernel: 5.14.0-503.22.1.el9_5\nkpatch-cve: CVE-2024-50154\nkpatch-cvss: 7.8\nkpatch-cve-url: https://access.redhat.com/security/cve/CVE-2024-50154\nkpatch-patch-url: https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=e8c526f2bdf1\n\nkpatch-name: rhel9/5.14.0-503.22.1.el9_5/CVE-2024-50275-arm64-sve-Discard-stale-CPU-state-when-handling-SVE.patch\nkpatch-description: Discard stale CPU state when handling SVE traps\nkpatch-kernel: 5.14.0-503.22.1.el9_5\nkpatch-cve: CVE-2024-50275\nkpatch-cvss: 7.0\nkpatch-cve-url: https://access.redhat.com/security/cve/CVE-2024-50275\nkpatch-patch-url: https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=751ecf6afd65\n\nkpatch-name: rhel9/5.14.0-503.22.1.el9_5/CVE-2024-53088-0002-i40e-fix-race-condition-by-adding-filter-s-intermediate-sync-state.patch\nkpatch-description: fix race condition by adding filter's intermediate sync state\nkpatch-kernel: 5.14.0-503.22.1.el9_5\nkpatch-cve: CVE-2024-53088\nkpatch-cvss: 5.5\nkpatch-cve-url: https://access.redhat.com/security/cve/CVE-2024-53088\nkpatch-patch-url: https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=f30490e969\n\n\nuname: 5.14.0-503.22.1.el9_5","stdout_lines":["OS: almalinux9","kernel: kernel-5.14.0-503.15.1.el9_5","time: 2025-02-07 14:11:19","","kpatch-name: rhel9/5.14.0-503.16.1.el9_5/CVE-2024-50251-netfilter-nft_payload-sanitize-offset-and-length-before-calling-skb_checksum.patch","kpatch-description: netfilter: nft_payload: sanitize offset and length before calling skb_checksum()","kpatch-kernel: 5.14.0-503.16.1.el9_5","kpatch-cve: CVE-2024-50251","kpatch-cvss: 6.2","kpatch-cve-url: https://access.redhat.com/security/cve/CVE-2024-50251","kpatch-patch-url: https://git.kernel.org/linus/d5953d680f7e96208c29ce4139a0e38de87a57fe","","kpatch-name: rhel9/5.14.0-503.16.1.el9_5/CVE-2024-26615-net-smc-fix-illegal-rmb-desc-access-in-smc-d-connection-dump.patch","kpatch-description: net/smc: fix illegal rmb_desc access in SMC-D connection dump","kpatch-kernel: 5.14.0-503.16.1.el9_5","kpatch-cve: CVE-2024-26615","kpatch-cvss: 5.5","kpatch-cve-url: https://access.redhat.com/security/cve/CVE-2024-26615","kpatch-patch-url: https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/patch/?id=dbc153fd3c142909e564bb256da087e13fbf239c","","kpatch-name: rhel9/5.14.0-503.16.1.el9_5/CVE-2024-43854-block-initialize-integrity-buffer-to-zero-before-writing-it-to-media.patch","kpatch-description: block: initialize integrity buffer to zero before writing it to media","kpatch-kernel: 5.14.0-503.16.1.el9_5","kpatch-cve: CVE-2024-43854","kpatch-cvss: 5.5","kpatch-cve-url: https://access.redhat.com/security/cve/CVE-2024-43854","kpatch-patch-url: https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/patch/?id=899ee2c3829c5ac14bfc7d3c4a5846c0b709b78f","","kpatch-name: rhel9/5.14.0-503.16.1.el9_5/CVE-2024-44994-iommu-restore-lost-return-in-iommu-report-device-fault.patch","kpatch-description: iommu: Restore lost return in iommu_report_device_fault()","kpatch-kernel: 5.14.0-503.16.1.el9_5","kpatch-cve: CVE-2024-44994","kpatch-cvss: 5.5","kpatch-cve-url: https://access.redhat.com/security/cve/CVE-2024-44994","kpatch-patch-url: https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/patch/?id=fca5b78511e98bdff2cdd55c172b23200a7b3404","","kpatch-name: rhel9/5.14.0-503.16.1.el9_5/CVE-2024-46695-selinux-smack-don-t-bypass-permissions-check-in-inode-setsecctx-hook.patch","kpatch-description: selinux,smack: don't bypass permissions check in inode_setsecctx hook","kpatch-kernel: 5.14.0-503.16.1.el9_5","kpatch-cve: CVE-2024-46695","kpatch-cvss: 5.5","kpatch-cve-url: https://access.redhat.com/security/cve/CVE-2024-46695","kpatch-patch-url: https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git/commit/?id=eebec98791d0137e455cc006411bb92a54250924","","kpatch-name: rhel9/5.14.0-503.16.1.el9_5/CVE-2024-49949-net-avoid-potential-underflow-in-qdisc_pkt_len_init-with-UFO.patch","kpatch-description: net: avoid potential underflow in qdisc_pkt_len_init() with UFO","kpatch-kernel: 5.14.0-503.16.1.el9_5","kpatch-cve: CVE-2024-49949","kpatch-cvss: 5.5","kpatch-cve-url: https://access.redhat.com/security/cve/CVE-2024-49949","kpatch-patch-url: https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git/commit/?id=c20029db28399ecc50e556964eaba75c43b1e2f1","","kpatch-name: rhel9/5.14.0-503.19.1.el9_5/CVE-2024-27399-bluetooth-l2cap-fix-null-ptr-deref-in-l2cap-chan-timeout.patch","kpatch-description: Bluetooth: l2cap: fix null-ptr-deref in l2cap_chan_timeout","kpatch-kernel: 5.14.0-503.19.1.el9_5","kpatch-cve: CVE-2024-27399","kpatch-cvss: 5.5","kpatch-cve-url: https://access.redhat.com/security/cve/CVE-2024-27399","kpatch-patch-url: https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/patch/?id=adf0398cee86643b8eacde95f17d073d022f782c","","kpatch-name: rhel9/5.14.0-503.19.1.el9_5/CVE-2024-38564-bpf-add-bpf-prog-type-cgroup-skb-attach-type-enforcement-in-bpf-link-create.patch","kpatch-description: bpf: Add BPF_PROG_TYPE_CGROUP_SKB attach type enforcement in BPF_LINK_CREATE","kpatch-kernel: 5.14.0-503.19.1.el9_5","kpatch-cve: CVE-2024-38564","kpatch-cvss: 5.5","kpatch-cve-url: https://access.redhat.com/security/cve/CVE-2024-38564","kpatch-patch-url: https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/patch/?id=543576ec15b17c0c93301ac8297333c7b6e84ac7","","kpatch-name: rhel9/5.14.0-503.19.1.el9_5/CVE-2024-45020-bpf-fix-a-kernel-verifier-crash-in-stacksafe.patch","kpatch-description: bpf: Fix a kernel verifier crash in stacksafe()","kpatch-kernel: 5.14.0-503.19.1.el9_5","kpatch-cve: CVE-2024-45020","kpatch-cvss: 5.5","kpatch-cve-url: https://access.redhat.com/security/cve/CVE-2024-45020","kpatch-patch-url: https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/patch/?id=bed2eb964c70b780fb55925892a74f26cb590b25","","kpatch-name: rhel9/5.14.0-503.19.1.el9_5/CVE-2024-47675-bpf-fix-use-after-free-in-bpf-uprobe-multi-link-attach.patch","kpatch-description: bpf: Fix use-after-free in bpf_uprobe_multi_link_attach()","kpatch-kernel: 5.14.0-503.19.1.el9_5","kpatch-cve: CVE-2024-47675","kpatch-cvss: 7.8","kpatch-cve-url: https://access.redhat.com/security/cve/CVE-2024-47675","kpatch-patch-url: https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/patch/?id=5fe6e308abaea082c20fbf2aa5df8e14495622cf","","kpatch-name: rhel9/5.14.0-503.19.1.el9_5/CVE-2024-50099-arm64-probes-remove-broken-ldr-literal-uprobe-support.patch","kpatch-description: arm64: probes: Remove broken LDR (literal) uprobe support","kpatch-kernel: 5.14.0-503.19.1.el9_5","kpatch-cve: CVE-2024-50099","kpatch-cvss: 5.5","kpatch-cve-url: https://access.redhat.com/security/cve/CVE-2024-50099","kpatch-patch-url: https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/patch/?id=acc450aa07099d071b18174c22a1119c57da8227","","kpatch-name: rhel9/5.14.0-503.19.1.el9_5/CVE-2024-50262-bpf-fix-out-of-bounds-write-in-trie-get-next-key.patch","kpatch-description: bpf: Fix out-of-bounds write in trie_get_next_key()","kpatch-kernel: 5.14.0-503.19.1.el9_5","kpatch-cve: CVE-2024-50262","kpatch-cvss: 7.8","kpatch-cve-url: https://access.redhat.com/security/cve/CVE-2024-50262","kpatch-patch-url: https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/patch/?id=13400ac8fb80c57c2bfb12ebd35ee121ce9b4d21","","kpatch-name: rhel9/5.14.0-503.19.1.el9_5/CVE-2024-50115-KVM-nSVM-Ignore-nCR3-4-0-when-loading-PDPTEs-from-memory.patch","kpatch-description: KVM: nSVM: Ignore nCR3[4:0] when loading PDPTEs from memory","kpatch-kernel: 5.14.0-503.19.1.el9_5","kpatch-cve: CVE-2024-50115","kpatch-cvss: 7.1","kpatch-cve-url: https://access.redhat.com/security/cve/CVE-2024-50115","kpatch-patch-url: https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=f559b2e9c5c5308850544ab59396b7d53cfc67bd","","kpatch-name: rhel9/5.14.0-503.19.1.el9_5/CVE-2024-46697-nfsd-ensure-that-nfsd4_fattr_args-context-is-zeroed-out.patch","kpatch-description: nfsd: ensure that nfsd4_fattr_args.context is zeroed out","kpatch-kernel: 5.14.0-503.19.1.el9_5","kpatch-cve: CVE-2024-46697","kpatch-cvss: 5.5","kpatch-cve-url: https://access.redhat.com/security/cve/CVE-2024-46697","kpatch-patch-url: https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=f58bab6fd4063913bd8321e99874b8239e9ba726","","kpatch-name: rhel9/5.14.0-503.19.1.el9_5/CVE-2024-50110-xfrm-fix-one-more-kernel-infoleak-in-algo-dumping.patch","kpatch-description: xfrm: fix one more kernel-infoleak in algo dumping","kpatch-kernel: 5.14.0-503.19.1.el9_5","kpatch-cve: CVE-2024-50110","kpatch-cvss: 5.5","kpatch-cve-url: https://access.redhat.com/security/cve/CVE-2024-50110","kpatch-patch-url: https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=6889cd2a93e1e3606b3f6e958aa0924e836de4d2","","kpatch-name: rhel9/5.14.0-503.19.1.el9_5/CVE-2024-50142-xfrm-validate-new-sa-s-prefixlen-using-sa-family-when-sel-family-is-unset.patch","kpatch-description: xfrm: validate new SA's prefixlen using SA family when sel.family is unset","kpatch-kernel: 5.14.0-503.19.1.el9_5","kpatch-cve: CVE-2024-50142","kpatch-cvss: 5.5","kpatch-cve-url: https://access.redhat.com/security/cve/CVE-2024-50142","kpatch-patch-url: https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/patch/?id=3f0ab59e6537c6a8f9e1b355b48f9c05a76e8563","","kpatch-name: rhel9/5.14.0-503.19.1.el9_5/CVE-2024-50148-Bluetooth-bnep-fix-wild-memory-access-in-proto_unregister.patch","kpatch-description: Bluetooth: bnep: fix wild-memory-access in proto_unregister","kpatch-kernel: 5.14.0-503.19.1.el9_5","kpatch-cve: CVE-2024-50148","kpatch-cvss: 5.5","kpatch-cve-url: https://access.redhat.com/security/cve/CVE-2024-50148","kpatch-patch-url: https://git.kernel.org/linus/64a90991ba8d4e32e3173ddd83d0b24167a5668c","","kpatch-name: skipped/CVE-2024-50255.patch","kpatch-description: ","kpatch-kernel: ","kpatch-cve: CVE-2024-50255","kpatch-skip-reason: Bluetooth subsystem. Patched function may wait for a while, which may prevent patching/unpatching.","kpatch-cvss: ","","kpatch-name: rhel9/5.14.0-503.19.1.el9_5/CVE-2024-50223-sched-numa-Fix-the-potential-null-pointer-dereference-in-task_numa_work.patch","kpatch-description: sched/numa: Fix the potential null pointer dereference in task_numa_work()","kpatch-kernel: 5.14.0-503.19.1.el9_5","kpatch-cve: CVE-2024-50223","kpatch-cvss: 5.5","kpatch-cve-url: https://access.redhat.com/security/cve/CVE-2024-50223","kpatch-patch-url: https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/patch/?id=9c70b2a33cd2aa6a5a59c5523ef053bd42265209","","kpatch-name: rhel9/5.14.0-503.19.1.el9_5/CVE-2024-50125-Bluetooth-SCO-Fix-UAF-on-sco_sock_timeout.patch","kpatch-description: Bluetooth: SCO: Fix UAF on sco_sock_timeout","kpatch-kernel: 5.14.0-503.19.1.el9_5","kpatch-cve: CVE-2024-50125","kpatch-cvss: 7.8","kpatch-cve-url: https://access.redhat.com/security/cve/CVE-2024-50125","kpatch-patch-url: https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/patch/?id=d30803f6a972","","kpatch-name: rhel9/5.14.0-503.19.1.el9_5/CVE-2024-50124-Bluetooth-ISO-Fix-UAF-on-iso_sock_timeout.patch","kpatch-description: Bluetooth: ISO: Fix UAF on iso_sock_timeout","kpatch-kernel: 5.14.0-503.19.1.el9_5","kpatch-cve: CVE-2024-50124","kpatch-cvss: 7.8","kpatch-cve-url: https://access.redhat.com/security/cve/CVE-2024-50124","kpatch-patch-url: https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/patch/?id=246b435ad668","","kpatch-name: rhel9/5.14.0-503.21.1.el9_5/CVE-2024-50208-rdma-bnxt-re-fix-a-bug-while-setting-up-level-2-pbl-pages.patch","kpatch-description: RDMA/bnxt_re: Fix a bug while setting up Level-2 PBL pages","kpatch-kernel: 5.14.0-503.21.1.el9_5","kpatch-cve: CVE-2024-50208","kpatch-cvss: 5.5","kpatch-cve-url: https://access.redhat.com/security/cve/CVE-2024-50208","kpatch-patch-url: https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/patch/?id=7988bdbbb85ac85a847baf09879edcd0f70521dc","","kpatch-name: rhel9/5.14.0-503.21.1.el9_5/CVE-2024-53122-mptcp-cope-racing-subflow-creation-in-mptcp-rcv-space-adjust.patch","kpatch-description: mptcp: cope racing subflow creation in mptcp_rcv_space_adjust","kpatch-kernel: 5.14.0-503.21.1.el9_5","kpatch-cve: CVE-2024-53122","kpatch-cvss: 5.5","kpatch-cve-url: https://access.redhat.com/security/cve/CVE-2024-53122","kpatch-patch-url: https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/patch/?id=ce7356ae35943cc6494cc692e62d51a734062b7d","","kpatch-name: rhel9/5.14.0-503.21.1.el9_5/CVE-2024-50252-mlxsw-spectrum_ipip-Fix-memory-leak-when-changing-remote-IPv6-address.patch","kpatch-description: mlxsw: spectrum_ipip: Fix memory leak when changing remote IPv6 address","kpatch-kernel: 5.14.0-503.21.1.el9_5","kpatch-cve: CVE-2024-50252","kpatch-cvss: 5.5","kpatch-cve-url: https://access.redhat.com/security/cve/CVE-2024-50252","kpatch-patch-url: https://github.com/torvalds/linux/commit/12ae97c531fcd3bfd774d4dfeaeac23eafe24280","","kpatch-name: rhel9/5.14.0-503.21.1.el9_5/CVE-2024-46713-perf-aux-Fix-AUX-buffer-serialization.patch","kpatch-description: perf/aux: Fix AUX buffer serialization","kpatch-kernel: 5.14.0-503.21.1.el9_5","kpatch-cve: CVE-2024-46713","kpatch-cvss: 5.5","kpatch-cve-url: https://access.redhat.com/security/cve/CVE-2024-46713","kpatch-patch-url: https://github.com/torvalds/linux/commit/2ab9d830262c132ab5db2f571003d80850d56b2a","","kpatch-name: rhel9/5.14.0-503.21.1.el9_5/CVE-2024-46713-perf-aux-Fix-AUX-buffer-serialization-kpatch.patch","kpatch-description: perf/aux: Fix AUX buffer serialization (Adaptation)","kpatch-kernel: 5.14.0-503.21.1.el9_5","kpatch-cve: CVE-2024-46713","kpatch-cvss: 5.5","kpatch-cve-url: https://access.redhat.com/security/cve/CVE-2024-46713","kpatch-patch-url: https://github.com/torvalds/linux/commit/2ab9d830262c132ab5db2f571003d80850d56b2a","","kpatch-name: rhel9/5.14.0-503.22.1.el9_5/CVE-2024-50154-tcp-dccp-Don-t-use-timer_pending-in-reqsk_queue_unlink.patch","kpatch-description: tcp/dccp: Don't use timer_pending() in reqsk_queue_unlink()","kpatch-kernel: 5.14.0-503.22.1.el9_5","kpatch-cve: CVE-2024-50154","kpatch-cvss: 7.8","kpatch-cve-url: https://access.redhat.com/security/cve/CVE-2024-50154","kpatch-patch-url: https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=e8c526f2bdf1","","kpatch-name: rhel9/5.14.0-503.22.1.el9_5/CVE-2024-50275-arm64-sve-Discard-stale-CPU-state-when-handling-SVE.patch","kpatch-description: Discard stale CPU state when handling SVE traps","kpatch-kernel: 5.14.0-503.22.1.el9_5","kpatch-cve: CVE-2024-50275","kpatch-cvss: 7.0","kpatch-cve-url: https://access.redhat.com/security/cve/CVE-2024-50275","kpatch-patch-url: https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=751ecf6afd65","","kpatch-name: rhel9/5.14.0-503.22.1.el9_5/CVE-2024-53088-0002-i40e-fix-race-condition-by-adding-filter-s-intermediate-sync-state.patch","kpatch-description: fix race condition by adding filter's intermediate sync state","kpatch-kernel: 5.14.0-503.22.1.el9_5","kpatch-cve: CVE-2024-53088","kpatch-cvss: 5.5","kpatch-cve-url: https://access.redhat.com/security/cve/CVE-2024-53088","kpatch-patch-url: https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=f30490e969","","","uname: 5.14.0-503.22.1.el9_5"]},"created":"2025-02-17T15:39:35.838231Z","updated":"2025-02-17T15:39:35.838257Z","started":"2025-02-17T15:39:34.019087Z","ended":"2025-02-17T15:39:35.779013Z","duration":"00:00:01.759926","changed":true,"ignore_errors":false}