Execution
Date 17 Feb 2025 15:39:33 +0000
Duration 00:00:04.68
Controller ssh-gw-4.layershift.com
User root
Versions
Ansible 2.16.11
ara 1.7.2 / 1.7.2
Python 3.10.10
Summary
15 Hosts
1 Tasks
15 Results
1 Plays
1 Files
0 Records

Task result details

  • Status
    CHANGED
  • Duration
    00:00:01.75
  • Play
    Ansible Ad-Hoc
  • Task
    shell
  • Host
    kvm012

Field Value
ansible_facts
{
    "discovered_interpreter_python": "/usr/bin/python3"
}
changed
True
cmd
kcarectl --patch-info
delta
0:00:00.573692
end
2025-02-17 15:39:35.369280
invocation
{
    "module_args": {
        "_raw_params": "kcarectl --patch-info",
        "_uses_shell": true,
        "argv": null,
        "chdir": null,
        "creates": null,
        "executable": null,
        "expand_argument_vars": true,
        "removes": null,
        "stdin": null,
        "stdin_add_newline": true,
        "strip_empty_ends": true
    }
}
msg

rc
0
start
2025-02-17 15:39:34.795588
stderr

stderr_lines
[]
stdout
OS: almalinux9
kernel: kernel-5.14.0-503.15.1.el9_5
time: 2025-02-07 14:11:19

kpatch-name: rhel9/5.14.0-503.16.1.el9_5/CVE-2024-50251-netfilter-nft_payload-sanitize-offset-and-length-before-calling-skb_checksum.patch
kpatch-description: netfilter: nft_payload: sanitize offset and length before calling skb_checksum()
kpatch-kernel: 5.14.0-503.16.1.el9_5
kpatch-cve: CVE-2024-50251
kpatch-cvss: 6.2
kpatch-cve-url: https://access.redhat.com/security/cve/CVE-2024-50251
kpatch-patch-url: https://git.kernel.org/linus/d5953d680f7e96208c29ce4139a0e38de87a57fe

kpatch-name: rhel9/5.14.0-503.16.1.el9_5/CVE-2024-26615-net-smc-fix-illegal-rmb-desc-access-in-smc-d-connection-dump.patch
kpatch-description: net/smc: fix illegal rmb_desc access in SMC-D connection dump
kpatch-kernel: 5.14.0-503.16.1.el9_5
kpatch-cve: CVE-2024-26615
kpatch-cvss: 5.5
kpatch-cve-url: https://access.redhat.com/security/cve/CVE-2024-26615
kpatch-patch-url: https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/patch/?id=dbc153fd3c142909e564bb256da087e13fbf239c

kpatch-name: rhel9/5.14.0-503.16.1.el9_5/CVE-2024-43854-block-initialize-integrity-buffer-to-zero-before-writing-it-to-media.patch
kpatch-description: block: initialize integrity buffer to zero before writing it to media
kpatch-kernel: 5.14.0-503.16.1.el9_5
kpatch-cve: CVE-2024-43854
kpatch-cvss: 5.5
kpatch-cve-url: https://access.redhat.com/security/cve/CVE-2024-43854
kpatch-patch-url: https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/patch/?id=899ee2c3829c5ac14bfc7d3c4a5846c0b709b78f

kpatch-name: rhel9/5.14.0-503.16.1.el9_5/CVE-2024-44994-iommu-restore-lost-return-in-iommu-report-device-fault.patch
kpatch-description: iommu: Restore lost return in iommu_report_device_fault()
kpatch-kernel: 5.14.0-503.16.1.el9_5
kpatch-cve: CVE-2024-44994
kpatch-cvss: 5.5
kpatch-cve-url: https://access.redhat.com/security/cve/CVE-2024-44994
kpatch-patch-url: https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/patch/?id=fca5b78511e98bdff2cdd55c172b23200a7b3404

kpatch-name: rhel9/5.14.0-503.16.1.el9_5/CVE-2024-46695-selinux-smack-don-t-bypass-permissions-check-in-inode-setsecctx-hook.patch
kpatch-description: selinux,smack: don't bypass permissions check in inode_setsecctx hook
kpatch-kernel: 5.14.0-503.16.1.el9_5
kpatch-cve: CVE-2024-46695
kpatch-cvss: 5.5
kpatch-cve-url: https://access.redhat.com/security/cve/CVE-2024-46695
kpatch-patch-url: https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git/commit/?id=eebec98791d0137e455cc006411bb92a54250924

kpatch-name: rhel9/5.14.0-503.16.1.el9_5/CVE-2024-49949-net-avoid-potential-underflow-in-qdisc_pkt_len_init-with-UFO.patch
kpatch-description: net: avoid potential underflow in qdisc_pkt_len_init() with UFO
kpatch-kernel: 5.14.0-503.16.1.el9_5
kpatch-cve: CVE-2024-49949
kpatch-cvss: 5.5
kpatch-cve-url: https://access.redhat.com/security/cve/CVE-2024-49949
kpatch-patch-url: https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git/commit/?id=c20029db28399ecc50e556964eaba75c43b1e2f1

kpatch-name: rhel9/5.14.0-503.19.1.el9_5/CVE-2024-27399-bluetooth-l2cap-fix-null-ptr-deref-in-l2cap-chan-timeout.patch
kpatch-description: Bluetooth: l2cap: fix null-ptr-deref in l2cap_chan_timeout
kpatch-kernel: 5.14.0-503.19.1.el9_5
kpatch-cve: CVE-2024-27399
kpatch-cvss: 5.5
kpatch-cve-url: https://access.redhat.com/security/cve/CVE-2024-27399
kpatch-patch-url: https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/patch/?id=adf0398cee86643b8eacde95f17d073d022f782c

kpatch-name: rhel9/5.14.0-503.19.1.el9_5/CVE-2024-38564-bpf-add-bpf-prog-type-cgroup-skb-attach-type-enforcement-in-bpf-link-create.patch
kpatch-description: bpf: Add BPF_PROG_TYPE_CGROUP_SKB attach type enforcement in BPF_LINK_CREATE
kpatch-kernel: 5.14.0-503.19.1.el9_5
kpatch-cve: CVE-2024-38564
kpatch-cvss: 5.5
kpatch-cve-url: https://access.redhat.com/security/cve/CVE-2024-38564
kpatch-patch-url: https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/patch/?id=543576ec15b17c0c93301ac8297333c7b6e84ac7

kpatch-name: rhel9/5.14.0-503.19.1.el9_5/CVE-2024-45020-bpf-fix-a-kernel-verifier-crash-in-stacksafe.patch
kpatch-description: bpf: Fix a kernel verifier crash in stacksafe()
kpatch-kernel: 5.14.0-503.19.1.el9_5
kpatch-cve: CVE-2024-45020
kpatch-cvss: 5.5
kpatch-cve-url: https://access.redhat.com/security/cve/CVE-2024-45020
kpatch-patch-url: https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/patch/?id=bed2eb964c70b780fb55925892a74f26cb590b25

kpatch-name: rhel9/5.14.0-503.19.1.el9_5/CVE-2024-47675-bpf-fix-use-after-free-in-bpf-uprobe-multi-link-attach.patch
kpatch-description: bpf: Fix use-after-free in bpf_uprobe_multi_link_attach()
kpatch-kernel: 5.14.0-503.19.1.el9_5
kpatch-cve: CVE-2024-47675
kpatch-cvss: 7.8
kpatch-cve-url: https://access.redhat.com/security/cve/CVE-2024-47675
kpatch-patch-url: https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/patch/?id=5fe6e308abaea082c20fbf2aa5df8e14495622cf

kpatch-name: rhel9/5.14.0-503.19.1.el9_5/CVE-2024-50099-arm64-probes-remove-broken-ldr-literal-uprobe-support.patch
kpatch-description: arm64: probes: Remove broken LDR (literal) uprobe support
kpatch-kernel: 5.14.0-503.19.1.el9_5
kpatch-cve: CVE-2024-50099
kpatch-cvss: 5.5
kpatch-cve-url: https://access.redhat.com/security/cve/CVE-2024-50099
kpatch-patch-url: https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/patch/?id=acc450aa07099d071b18174c22a1119c57da8227

kpatch-name: rhel9/5.14.0-503.19.1.el9_5/CVE-2024-50262-bpf-fix-out-of-bounds-write-in-trie-get-next-key.patch
kpatch-description: bpf: Fix out-of-bounds write in trie_get_next_key()
kpatch-kernel: 5.14.0-503.19.1.el9_5
kpatch-cve: CVE-2024-50262
kpatch-cvss: 7.8
kpatch-cve-url: https://access.redhat.com/security/cve/CVE-2024-50262
kpatch-patch-url: https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/patch/?id=13400ac8fb80c57c2bfb12ebd35ee121ce9b4d21

kpatch-name: rhel9/5.14.0-503.19.1.el9_5/CVE-2024-50115-KVM-nSVM-Ignore-nCR3-4-0-when-loading-PDPTEs-from-memory.patch
kpatch-description: KVM: nSVM: Ignore nCR3[4:0] when loading PDPTEs from memory
kpatch-kernel: 5.14.0-503.19.1.el9_5
kpatch-cve: CVE-2024-50115
kpatch-cvss: 7.1
kpatch-cve-url: https://access.redhat.com/security/cve/CVE-2024-50115
kpatch-patch-url: https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=f559b2e9c5c5308850544ab59396b7d53cfc67bd

kpatch-name: rhel9/5.14.0-503.19.1.el9_5/CVE-2024-46697-nfsd-ensure-that-nfsd4_fattr_args-context-is-zeroed-out.patch
kpatch-description: nfsd: ensure that nfsd4_fattr_args.context is zeroed out
kpatch-kernel: 5.14.0-503.19.1.el9_5
kpatch-cve: CVE-2024-46697
kpatch-cvss: 5.5
kpatch-cve-url: https://access.redhat.com/security/cve/CVE-2024-46697
kpatch-patch-url: https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=f58bab6fd4063913bd8321e99874b8239e9ba726

kpatch-name: rhel9/5.14.0-503.19.1.el9_5/CVE-2024-50110-xfrm-fix-one-more-kernel-infoleak-in-algo-dumping.patch
kpatch-description: xfrm: fix one more kernel-infoleak in algo dumping
kpatch-kernel: 5.14.0-503.19.1.el9_5
kpatch-cve: CVE-2024-50110
kpatch-cvss: 5.5
kpatch-cve-url: https://access.redhat.com/security/cve/CVE-2024-50110
kpatch-patch-url: https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=6889cd2a93e1e3606b3f6e958aa0924e836de4d2

kpatch-name: rhel9/5.14.0-503.19.1.el9_5/CVE-2024-50142-xfrm-validate-new-sa-s-prefixlen-using-sa-family-when-sel-family-is-unset.patch
kpatch-description: xfrm: validate new SA's prefixlen using SA family when sel.family is unset
kpatch-kernel: 5.14.0-503.19.1.el9_5
kpatch-cve: CVE-2024-50142
kpatch-cvss: 5.5
kpatch-cve-url: https://access.redhat.com/security/cve/CVE-2024-50142
kpatch-patch-url: https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/patch/?id=3f0ab59e6537c6a8f9e1b355b48f9c05a76e8563

kpatch-name: rhel9/5.14.0-503.19.1.el9_5/CVE-2024-50148-Bluetooth-bnep-fix-wild-memory-access-in-proto_unregister.patch
kpatch-description: Bluetooth: bnep: fix wild-memory-access in proto_unregister
kpatch-kernel: 5.14.0-503.19.1.el9_5
kpatch-cve: CVE-2024-50148
kpatch-cvss: 5.5
kpatch-cve-url: https://access.redhat.com/security/cve/CVE-2024-50148
kpatch-patch-url: https://git.kernel.org/linus/64a90991ba8d4e32e3173ddd83d0b24167a5668c

kpatch-name: skipped/CVE-2024-50255.patch
kpatch-description: 
kpatch-kernel: 
kpatch-cve: CVE-2024-50255
kpatch-skip-reason: Bluetooth subsystem. Patched function may wait for a while, which may prevent patching/unpatching.
kpatch-cvss: 

kpatch-name: rhel9/5.14.0-503.19.1.el9_5/CVE-2024-50223-sched-numa-Fix-the-potential-null-pointer-dereference-in-task_numa_work.patch
kpatch-description: sched/numa: Fix the potential null pointer dereference in task_numa_work()
kpatch-kernel: 5.14.0-503.19.1.el9_5
kpatch-cve: CVE-2024-50223
kpatch-cvss: 5.5
kpatch-cve-url: https://access.redhat.com/security/cve/CVE-2024-50223
kpatch-patch-url: https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/patch/?id=9c70b2a33cd2aa6a5a59c5523ef053bd42265209

kpatch-name: rhel9/5.14.0-503.19.1.el9_5/CVE-2024-50125-Bluetooth-SCO-Fix-UAF-on-sco_sock_timeout.patch
kpatch-description: Bluetooth: SCO: Fix UAF on sco_sock_timeout
kpatch-kernel: 5.14.0-503.19.1.el9_5
kpatch-cve: CVE-2024-50125
kpatch-cvss: 7.8
kpatch-cve-url: https://access.redhat.com/security/cve/CVE-2024-50125
kpatch-patch-url: https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/patch/?id=d30803f6a972

kpatch-name: rhel9/5.14.0-503.19.1.el9_5/CVE-2024-50124-Bluetooth-ISO-Fix-UAF-on-iso_sock_timeout.patch
kpatch-description: Bluetooth: ISO: Fix UAF on iso_sock_timeout
kpatch-kernel: 5.14.0-503.19.1.el9_5
kpatch-cve: CVE-2024-50124
kpatch-cvss: 7.8
kpatch-cve-url: https://access.redhat.com/security/cve/CVE-2024-50124
kpatch-patch-url: https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/patch/?id=246b435ad668

kpatch-name: rhel9/5.14.0-503.21.1.el9_5/CVE-2024-50208-rdma-bnxt-re-fix-a-bug-while-setting-up-level-2-pbl-pages.patch
kpatch-description: RDMA/bnxt_re: Fix a bug while setting up Level-2 PBL pages
kpatch-kernel: 5.14.0-503.21.1.el9_5
kpatch-cve: CVE-2024-50208
kpatch-cvss: 5.5
kpatch-cve-url: https://access.redhat.com/security/cve/CVE-2024-50208
kpatch-patch-url: https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/patch/?id=7988bdbbb85ac85a847baf09879edcd0f70521dc

kpatch-name: rhel9/5.14.0-503.21.1.el9_5/CVE-2024-53122-mptcp-cope-racing-subflow-creation-in-mptcp-rcv-space-adjust.patch
kpatch-description: mptcp: cope racing subflow creation in mptcp_rcv_space_adjust
kpatch-kernel: 5.14.0-503.21.1.el9_5
kpatch-cve: CVE-2024-53122
kpatch-cvss: 5.5
kpatch-cve-url: https://access.redhat.com/security/cve/CVE-2024-53122
kpatch-patch-url: https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/patch/?id=ce7356ae35943cc6494cc692e62d51a734062b7d

kpatch-name: rhel9/5.14.0-503.21.1.el9_5/CVE-2024-50252-mlxsw-spectrum_ipip-Fix-memory-leak-when-changing-remote-IPv6-address.patch
kpatch-description: mlxsw: spectrum_ipip: Fix memory leak when changing remote IPv6 address
kpatch-kernel: 5.14.0-503.21.1.el9_5
kpatch-cve: CVE-2024-50252
kpatch-cvss: 5.5
kpatch-cve-url: https://access.redhat.com/security/cve/CVE-2024-50252
kpatch-patch-url: https://github.com/torvalds/linux/commit/12ae97c531fcd3bfd774d4dfeaeac23eafe24280

kpatch-name: rhel9/5.14.0-503.21.1.el9_5/CVE-2024-46713-perf-aux-Fix-AUX-buffer-serialization.patch
kpatch-description: perf/aux: Fix AUX buffer serialization
kpatch-kernel: 5.14.0-503.21.1.el9_5
kpatch-cve: CVE-2024-46713
kpatch-cvss: 5.5
kpatch-cve-url: https://access.redhat.com/security/cve/CVE-2024-46713
kpatch-patch-url: https://github.com/torvalds/linux/commit/2ab9d830262c132ab5db2f571003d80850d56b2a

kpatch-name: rhel9/5.14.0-503.21.1.el9_5/CVE-2024-46713-perf-aux-Fix-AUX-buffer-serialization-kpatch.patch
kpatch-description: perf/aux: Fix AUX buffer serialization (Adaptation)
kpatch-kernel: 5.14.0-503.21.1.el9_5
kpatch-cve: CVE-2024-46713
kpatch-cvss: 5.5
kpatch-cve-url: https://access.redhat.com/security/cve/CVE-2024-46713
kpatch-patch-url: https://github.com/torvalds/linux/commit/2ab9d830262c132ab5db2f571003d80850d56b2a

kpatch-name: rhel9/5.14.0-503.22.1.el9_5/CVE-2024-50154-tcp-dccp-Don-t-use-timer_pending-in-reqsk_queue_unlink.patch
kpatch-description: tcp/dccp: Don't use timer_pending() in reqsk_queue_unlink()
kpatch-kernel: 5.14.0-503.22.1.el9_5
kpatch-cve: CVE-2024-50154
kpatch-cvss: 7.8
kpatch-cve-url: https://access.redhat.com/security/cve/CVE-2024-50154
kpatch-patch-url: https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=e8c526f2bdf1

kpatch-name: rhel9/5.14.0-503.22.1.el9_5/CVE-2024-50275-arm64-sve-Discard-stale-CPU-state-when-handling-SVE.patch
kpatch-description: Discard stale CPU state when handling SVE traps
kpatch-kernel: 5.14.0-503.22.1.el9_5
kpatch-cve: CVE-2024-50275
kpatch-cvss: 7.0
kpatch-cve-url: https://access.redhat.com/security/cve/CVE-2024-50275
kpatch-patch-url: https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=751ecf6afd65

kpatch-name: rhel9/5.14.0-503.22.1.el9_5/CVE-2024-53088-0002-i40e-fix-race-condition-by-adding-filter-s-intermediate-sync-state.patch
kpatch-description: fix race condition by adding filter's intermediate sync state
kpatch-kernel: 5.14.0-503.22.1.el9_5
kpatch-cve: CVE-2024-53088
kpatch-cvss: 5.5
kpatch-cve-url: https://access.redhat.com/security/cve/CVE-2024-53088
kpatch-patch-url: https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=f30490e969


uname: 5.14.0-503.22.1.el9_5
stdout_lines
[
    "OS: almalinux9",
    "kernel: kernel-5.14.0-503.15.1.el9_5",
    "time: 2025-02-07 14:11:19",
    "",
    "kpatch-name: rhel9/5.14.0-503.16.1.el9_5/CVE-2024-50251-netfilter-nft_payload-sanitize-offset-and-length-before-calling-skb_checksum.patch",
    "kpatch-description: netfilter: nft_payload: sanitize offset and length before calling skb_checksum()",
    "kpatch-kernel: 5.14.0-503.16.1.el9_5",
    "kpatch-cve: CVE-2024-50251",
    "kpatch-cvss: 6.2",
    "kpatch-cve-url: https://access.redhat.com/security/cve/CVE-2024-50251",
    "kpatch-patch-url: https://git.kernel.org/linus/d5953d680f7e96208c29ce4139a0e38de87a57fe",
    "",
    "kpatch-name: rhel9/5.14.0-503.16.1.el9_5/CVE-2024-26615-net-smc-fix-illegal-rmb-desc-access-in-smc-d-connection-dump.patch",
    "kpatch-description: net/smc: fix illegal rmb_desc access in SMC-D connection dump",
    "kpatch-kernel: 5.14.0-503.16.1.el9_5",
    "kpatch-cve: CVE-2024-26615",
    "kpatch-cvss: 5.5",
    "kpatch-cve-url: https://access.redhat.com/security/cve/CVE-2024-26615",
    "kpatch-patch-url: https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/patch/?id=dbc153fd3c142909e564bb256da087e13fbf239c",
    "",
    "kpatch-name: rhel9/5.14.0-503.16.1.el9_5/CVE-2024-43854-block-initialize-integrity-buffer-to-zero-before-writing-it-to-media.patch",
    "kpatch-description: block: initialize integrity buffer to zero before writing it to media",
    "kpatch-kernel: 5.14.0-503.16.1.el9_5",
    "kpatch-cve: CVE-2024-43854",
    "kpatch-cvss: 5.5",
    "kpatch-cve-url: https://access.redhat.com/security/cve/CVE-2024-43854",
    "kpatch-patch-url: https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/patch/?id=899ee2c3829c5ac14bfc7d3c4a5846c0b709b78f",
    "",
    "kpatch-name: rhel9/5.14.0-503.16.1.el9_5/CVE-2024-44994-iommu-restore-lost-return-in-iommu-report-device-fault.patch",
    "kpatch-description: iommu: Restore lost return in iommu_report_device_fault()",
    "kpatch-kernel: 5.14.0-503.16.1.el9_5",
    "kpatch-cve: CVE-2024-44994",
    "kpatch-cvss: 5.5",
    "kpatch-cve-url: https://access.redhat.com/security/cve/CVE-2024-44994",
    "kpatch-patch-url: https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/patch/?id=fca5b78511e98bdff2cdd55c172b23200a7b3404",
    "",
    "kpatch-name: rhel9/5.14.0-503.16.1.el9_5/CVE-2024-46695-selinux-smack-don-t-bypass-permissions-check-in-inode-setsecctx-hook.patch",
    "kpatch-description: selinux,smack: don't bypass permissions check in inode_setsecctx hook",
    "kpatch-kernel: 5.14.0-503.16.1.el9_5",
    "kpatch-cve: CVE-2024-46695",
    "kpatch-cvss: 5.5",
    "kpatch-cve-url: https://access.redhat.com/security/cve/CVE-2024-46695",
    "kpatch-patch-url: https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git/commit/?id=eebec98791d0137e455cc006411bb92a54250924",
    "",
    "kpatch-name: rhel9/5.14.0-503.16.1.el9_5/CVE-2024-49949-net-avoid-potential-underflow-in-qdisc_pkt_len_init-with-UFO.patch",
    "kpatch-description: net: avoid potential underflow in qdisc_pkt_len_init() with UFO",
    "kpatch-kernel: 5.14.0-503.16.1.el9_5",
    "kpatch-cve: CVE-2024-49949",
    "kpatch-cvss: 5.5",
    "kpatch-cve-url: https://access.redhat.com/security/cve/CVE-2024-49949",
    "kpatch-patch-url: https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git/commit/?id=c20029db28399ecc50e556964eaba75c43b1e2f1",
    "",
    "kpatch-name: rhel9/5.14.0-503.19.1.el9_5/CVE-2024-27399-bluetooth-l2cap-fix-null-ptr-deref-in-l2cap-chan-timeout.patch",
    "kpatch-description: Bluetooth: l2cap: fix null-ptr-deref in l2cap_chan_timeout",
    "kpatch-kernel: 5.14.0-503.19.1.el9_5",
    "kpatch-cve: CVE-2024-27399",
    "kpatch-cvss: 5.5",
    "kpatch-cve-url: https://access.redhat.com/security/cve/CVE-2024-27399",
    "kpatch-patch-url: https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/patch/?id=adf0398cee86643b8eacde95f17d073d022f782c",
    "",
    "kpatch-name: rhel9/5.14.0-503.19.1.el9_5/CVE-2024-38564-bpf-add-bpf-prog-type-cgroup-skb-attach-type-enforcement-in-bpf-link-create.patch",
    "kpatch-description: bpf: Add BPF_PROG_TYPE_CGROUP_SKB attach type enforcement in BPF_LINK_CREATE",
    "kpatch-kernel: 5.14.0-503.19.1.el9_5",
    "kpatch-cve: CVE-2024-38564",
    "kpatch-cvss: 5.5",
    "kpatch-cve-url: https://access.redhat.com/security/cve/CVE-2024-38564",
    "kpatch-patch-url: https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/patch/?id=543576ec15b17c0c93301ac8297333c7b6e84ac7",
    "",
    "kpatch-name: rhel9/5.14.0-503.19.1.el9_5/CVE-2024-45020-bpf-fix-a-kernel-verifier-crash-in-stacksafe.patch",
    "kpatch-description: bpf: Fix a kernel verifier crash in stacksafe()",
    "kpatch-kernel: 5.14.0-503.19.1.el9_5",
    "kpatch-cve: CVE-2024-45020",
    "kpatch-cvss: 5.5",
    "kpatch-cve-url: https://access.redhat.com/security/cve/CVE-2024-45020",
    "kpatch-patch-url: https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/patch/?id=bed2eb964c70b780fb55925892a74f26cb590b25",
    "",
    "kpatch-name: rhel9/5.14.0-503.19.1.el9_5/CVE-2024-47675-bpf-fix-use-after-free-in-bpf-uprobe-multi-link-attach.patch",
    "kpatch-description: bpf: Fix use-after-free in bpf_uprobe_multi_link_attach()",
    "kpatch-kernel: 5.14.0-503.19.1.el9_5",
    "kpatch-cve: CVE-2024-47675",
    "kpatch-cvss: 7.8",
    "kpatch-cve-url: https://access.redhat.com/security/cve/CVE-2024-47675",
    "kpatch-patch-url: https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/patch/?id=5fe6e308abaea082c20fbf2aa5df8e14495622cf",
    "",
    "kpatch-name: rhel9/5.14.0-503.19.1.el9_5/CVE-2024-50099-arm64-probes-remove-broken-ldr-literal-uprobe-support.patch",
    "kpatch-description: arm64: probes: Remove broken LDR (literal) uprobe support",
    "kpatch-kernel: 5.14.0-503.19.1.el9_5",
    "kpatch-cve: CVE-2024-50099",
    "kpatch-cvss: 5.5",
    "kpatch-cve-url: https://access.redhat.com/security/cve/CVE-2024-50099",
    "kpatch-patch-url: https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/patch/?id=acc450aa07099d071b18174c22a1119c57da8227",
    "",
    "kpatch-name: rhel9/5.14.0-503.19.1.el9_5/CVE-2024-50262-bpf-fix-out-of-bounds-write-in-trie-get-next-key.patch",
    "kpatch-description: bpf: Fix out-of-bounds write in trie_get_next_key()",
    "kpatch-kernel: 5.14.0-503.19.1.el9_5",
    "kpatch-cve: CVE-2024-50262",
    "kpatch-cvss: 7.8",
    "kpatch-cve-url: https://access.redhat.com/security/cve/CVE-2024-50262",
    "kpatch-patch-url: https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/patch/?id=13400ac8fb80c57c2bfb12ebd35ee121ce9b4d21",
    "",
    "kpatch-name: rhel9/5.14.0-503.19.1.el9_5/CVE-2024-50115-KVM-nSVM-Ignore-nCR3-4-0-when-loading-PDPTEs-from-memory.patch",
    "kpatch-description: KVM: nSVM: Ignore nCR3[4:0] when loading PDPTEs from memory",
    "kpatch-kernel: 5.14.0-503.19.1.el9_5",
    "kpatch-cve: CVE-2024-50115",
    "kpatch-cvss: 7.1",
    "kpatch-cve-url: https://access.redhat.com/security/cve/CVE-2024-50115",
    "kpatch-patch-url: https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=f559b2e9c5c5308850544ab59396b7d53cfc67bd",
    "",
    "kpatch-name: rhel9/5.14.0-503.19.1.el9_5/CVE-2024-46697-nfsd-ensure-that-nfsd4_fattr_args-context-is-zeroed-out.patch",
    "kpatch-description: nfsd: ensure that nfsd4_fattr_args.context is zeroed out",
    "kpatch-kernel: 5.14.0-503.19.1.el9_5",
    "kpatch-cve: CVE-2024-46697",
    "kpatch-cvss: 5.5",
    "kpatch-cve-url: https://access.redhat.com/security/cve/CVE-2024-46697",
    "kpatch-patch-url: https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=f58bab6fd4063913bd8321e99874b8239e9ba726",
    "",
    "kpatch-name: rhel9/5.14.0-503.19.1.el9_5/CVE-2024-50110-xfrm-fix-one-more-kernel-infoleak-in-algo-dumping.patch",
    "kpatch-description: xfrm: fix one more kernel-infoleak in algo dumping",
    "kpatch-kernel: 5.14.0-503.19.1.el9_5",
    "kpatch-cve: CVE-2024-50110",
    "kpatch-cvss: 5.5",
    "kpatch-cve-url: https://access.redhat.com/security/cve/CVE-2024-50110",
    "kpatch-patch-url: https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=6889cd2a93e1e3606b3f6e958aa0924e836de4d2",
    "",
    "kpatch-name: rhel9/5.14.0-503.19.1.el9_5/CVE-2024-50142-xfrm-validate-new-sa-s-prefixlen-using-sa-family-when-sel-family-is-unset.patch",
    "kpatch-description: xfrm: validate new SA's prefixlen using SA family when sel.family is unset",
    "kpatch-kernel: 5.14.0-503.19.1.el9_5",
    "kpatch-cve: CVE-2024-50142",
    "kpatch-cvss: 5.5",
    "kpatch-cve-url: https://access.redhat.com/security/cve/CVE-2024-50142",
    "kpatch-patch-url: https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/patch/?id=3f0ab59e6537c6a8f9e1b355b48f9c05a76e8563",
    "",
    "kpatch-name: rhel9/5.14.0-503.19.1.el9_5/CVE-2024-50148-Bluetooth-bnep-fix-wild-memory-access-in-proto_unregister.patch",
    "kpatch-description: Bluetooth: bnep: fix wild-memory-access in proto_unregister",
    "kpatch-kernel: 5.14.0-503.19.1.el9_5",
    "kpatch-cve: CVE-2024-50148",
    "kpatch-cvss: 5.5",
    "kpatch-cve-url: https://access.redhat.com/security/cve/CVE-2024-50148",
    "kpatch-patch-url: https://git.kernel.org/linus/64a90991ba8d4e32e3173ddd83d0b24167a5668c",
    "",
    "kpatch-name: skipped/CVE-2024-50255.patch",
    "kpatch-description: ",
    "kpatch-kernel: ",
    "kpatch-cve: CVE-2024-50255",
    "kpatch-skip-reason: Bluetooth subsystem. Patched function may wait for a while, which may prevent patching/unpatching.",
    "kpatch-cvss: ",
    "",
    "kpatch-name: rhel9/5.14.0-503.19.1.el9_5/CVE-2024-50223-sched-numa-Fix-the-potential-null-pointer-dereference-in-task_numa_work.patch",
    "kpatch-description: sched/numa: Fix the potential null pointer dereference in task_numa_work()",
    "kpatch-kernel: 5.14.0-503.19.1.el9_5",
    "kpatch-cve: CVE-2024-50223",
    "kpatch-cvss: 5.5",
    "kpatch-cve-url: https://access.redhat.com/security/cve/CVE-2024-50223",
    "kpatch-patch-url: https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/patch/?id=9c70b2a33cd2aa6a5a59c5523ef053bd42265209",
    "",
    "kpatch-name: rhel9/5.14.0-503.19.1.el9_5/CVE-2024-50125-Bluetooth-SCO-Fix-UAF-on-sco_sock_timeout.patch",
    "kpatch-description: Bluetooth: SCO: Fix UAF on sco_sock_timeout",
    "kpatch-kernel: 5.14.0-503.19.1.el9_5",
    "kpatch-cve: CVE-2024-50125",
    "kpatch-cvss: 7.8",
    "kpatch-cve-url: https://access.redhat.com/security/cve/CVE-2024-50125",
    "kpatch-patch-url: https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/patch/?id=d30803f6a972",
    "",
    "kpatch-name: rhel9/5.14.0-503.19.1.el9_5/CVE-2024-50124-Bluetooth-ISO-Fix-UAF-on-iso_sock_timeout.patch",
    "kpatch-description: Bluetooth: ISO: Fix UAF on iso_sock_timeout",
    "kpatch-kernel: 5.14.0-503.19.1.el9_5",
    "kpatch-cve: CVE-2024-50124",
    "kpatch-cvss: 7.8",
    "kpatch-cve-url: https://access.redhat.com/security/cve/CVE-2024-50124",
    "kpatch-patch-url: https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/patch/?id=246b435ad668",
    "",
    "kpatch-name: rhel9/5.14.0-503.21.1.el9_5/CVE-2024-50208-rdma-bnxt-re-fix-a-bug-while-setting-up-level-2-pbl-pages.patch",
    "kpatch-description: RDMA/bnxt_re: Fix a bug while setting up Level-2 PBL pages",
    "kpatch-kernel: 5.14.0-503.21.1.el9_5",
    "kpatch-cve: CVE-2024-50208",
    "kpatch-cvss: 5.5",
    "kpatch-cve-url: https://access.redhat.com/security/cve/CVE-2024-50208",
    "kpatch-patch-url: https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/patch/?id=7988bdbbb85ac85a847baf09879edcd0f70521dc",
    "",
    "kpatch-name: rhel9/5.14.0-503.21.1.el9_5/CVE-2024-53122-mptcp-cope-racing-subflow-creation-in-mptcp-rcv-space-adjust.patch",
    "kpatch-description: mptcp: cope racing subflow creation in mptcp_rcv_space_adjust",
    "kpatch-kernel: 5.14.0-503.21.1.el9_5",
    "kpatch-cve: CVE-2024-53122",
    "kpatch-cvss: 5.5",
    "kpatch-cve-url: https://access.redhat.com/security/cve/CVE-2024-53122",
    "kpatch-patch-url: https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/patch/?id=ce7356ae35943cc6494cc692e62d51a734062b7d",
    "",
    "kpatch-name: rhel9/5.14.0-503.21.1.el9_5/CVE-2024-50252-mlxsw-spectrum_ipip-Fix-memory-leak-when-changing-remote-IPv6-address.patch",
    "kpatch-description: mlxsw: spectrum_ipip: Fix memory leak when changing remote IPv6 address",
    "kpatch-kernel: 5.14.0-503.21.1.el9_5",
    "kpatch-cve: CVE-2024-50252",
    "kpatch-cvss: 5.5",
    "kpatch-cve-url: https://access.redhat.com/security/cve/CVE-2024-50252",
    "kpatch-patch-url: https://github.com/torvalds/linux/commit/12ae97c531fcd3bfd774d4dfeaeac23eafe24280",
    "",
    "kpatch-name: rhel9/5.14.0-503.21.1.el9_5/CVE-2024-46713-perf-aux-Fix-AUX-buffer-serialization.patch",
    "kpatch-description: perf/aux: Fix AUX buffer serialization",
    "kpatch-kernel: 5.14.0-503.21.1.el9_5",
    "kpatch-cve: CVE-2024-46713",
    "kpatch-cvss: 5.5",
    "kpatch-cve-url: https://access.redhat.com/security/cve/CVE-2024-46713",
    "kpatch-patch-url: https://github.com/torvalds/linux/commit/2ab9d830262c132ab5db2f571003d80850d56b2a",
    "",
    "kpatch-name: rhel9/5.14.0-503.21.1.el9_5/CVE-2024-46713-perf-aux-Fix-AUX-buffer-serialization-kpatch.patch",
    "kpatch-description: perf/aux: Fix AUX buffer serialization (Adaptation)",
    "kpatch-kernel: 5.14.0-503.21.1.el9_5",
    "kpatch-cve: CVE-2024-46713",
    "kpatch-cvss: 5.5",
    "kpatch-cve-url: https://access.redhat.com/security/cve/CVE-2024-46713",
    "kpatch-patch-url: https://github.com/torvalds/linux/commit/2ab9d830262c132ab5db2f571003d80850d56b2a",
    "",
    "kpatch-name: rhel9/5.14.0-503.22.1.el9_5/CVE-2024-50154-tcp-dccp-Don-t-use-timer_pending-in-reqsk_queue_unlink.patch",
    "kpatch-description: tcp/dccp: Don't use timer_pending() in reqsk_queue_unlink()",
    "kpatch-kernel: 5.14.0-503.22.1.el9_5",
    "kpatch-cve: CVE-2024-50154",
    "kpatch-cvss: 7.8",
    "kpatch-cve-url: https://access.redhat.com/security/cve/CVE-2024-50154",
    "kpatch-patch-url: https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=e8c526f2bdf1",
    "",
    "kpatch-name: rhel9/5.14.0-503.22.1.el9_5/CVE-2024-50275-arm64-sve-Discard-stale-CPU-state-when-handling-SVE.patch",
    "kpatch-description: Discard stale CPU state when handling SVE traps",
    "kpatch-kernel: 5.14.0-503.22.1.el9_5",
    "kpatch-cve: CVE-2024-50275",
    "kpatch-cvss: 7.0",
    "kpatch-cve-url: https://access.redhat.com/security/cve/CVE-2024-50275",
    "kpatch-patch-url: https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=751ecf6afd65",
    "",
    "kpatch-name: rhel9/5.14.0-503.22.1.el9_5/CVE-2024-53088-0002-i40e-fix-race-condition-by-adding-filter-s-intermediate-sync-state.patch",
    "kpatch-description: fix race condition by adding filter's intermediate sync state",
    "kpatch-kernel: 5.14.0-503.22.1.el9_5",
    "kpatch-cve: CVE-2024-53088",
    "kpatch-cvss: 5.5",
    "kpatch-cve-url: https://access.redhat.com/security/cve/CVE-2024-53088",
    "kpatch-patch-url: https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=f30490e969",
    "",
    "",
    "uname: 5.14.0-503.22.1.el9_5"
]