Execution
Date
17 Feb 2025 15:39:33 +0000
Duration
00:00:04.68
Controller
ssh-gw-4.layershift.com
User
root
Versions
Ansible
2.16.11
ara
1.7.2 / 1.7.2
Python
3.10.10
Summary
15
Hosts
1
Tasks
15
Results
1
Plays
1
Files
0
Records
Task result details
-
Date17 Feb 2025 15:39:35 +0000
-
Module / Actionshell (Ad-Hoc: shell: kcarectl --patch-info:1)
| Field | Value |
|---|---|
| ansible_facts |
{ "discovered_interpreter_python": "/usr/bin/python3" } |
| changed |
True |
| cmd |
kcarectl --patch-info |
| delta |
0:00:00.573692 |
| end |
2025-02-17 15:39:35.369280 |
| invocation |
{ "module_args": { "_raw_params": "kcarectl --patch-info", "_uses_shell": true, "argv": null, "chdir": null, "creates": null, "executable": null, "expand_argument_vars": true, "removes": null, "stdin": null, "stdin_add_newline": true, "strip_empty_ends": true } } |
| msg |
|
| rc |
0 |
| start |
2025-02-17 15:39:34.795588 |
| stderr |
|
| stderr_lines |
[]
|
| stdout |
OS: almalinux9 kernel: kernel-5.14.0-503.15.1.el9_5 time: 2025-02-07 14:11:19 kpatch-name: rhel9/5.14.0-503.16.1.el9_5/CVE-2024-50251-netfilter-nft_payload-sanitize-offset-and-length-before-calling-skb_checksum.patch kpatch-description: netfilter: nft_payload: sanitize offset and length before calling skb_checksum() kpatch-kernel: 5.14.0-503.16.1.el9_5 kpatch-cve: CVE-2024-50251 kpatch-cvss: 6.2 kpatch-cve-url: https://access.redhat.com/security/cve/CVE-2024-50251 kpatch-patch-url: https://git.kernel.org/linus/d5953d680f7e96208c29ce4139a0e38de87a57fe kpatch-name: rhel9/5.14.0-503.16.1.el9_5/CVE-2024-26615-net-smc-fix-illegal-rmb-desc-access-in-smc-d-connection-dump.patch kpatch-description: net/smc: fix illegal rmb_desc access in SMC-D connection dump kpatch-kernel: 5.14.0-503.16.1.el9_5 kpatch-cve: CVE-2024-26615 kpatch-cvss: 5.5 kpatch-cve-url: https://access.redhat.com/security/cve/CVE-2024-26615 kpatch-patch-url: https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/patch/?id=dbc153fd3c142909e564bb256da087e13fbf239c kpatch-name: rhel9/5.14.0-503.16.1.el9_5/CVE-2024-43854-block-initialize-integrity-buffer-to-zero-before-writing-it-to-media.patch kpatch-description: block: initialize integrity buffer to zero before writing it to media kpatch-kernel: 5.14.0-503.16.1.el9_5 kpatch-cve: CVE-2024-43854 kpatch-cvss: 5.5 kpatch-cve-url: https://access.redhat.com/security/cve/CVE-2024-43854 kpatch-patch-url: https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/patch/?id=899ee2c3829c5ac14bfc7d3c4a5846c0b709b78f kpatch-name: rhel9/5.14.0-503.16.1.el9_5/CVE-2024-44994-iommu-restore-lost-return-in-iommu-report-device-fault.patch kpatch-description: iommu: Restore lost return in iommu_report_device_fault() kpatch-kernel: 5.14.0-503.16.1.el9_5 kpatch-cve: CVE-2024-44994 kpatch-cvss: 5.5 kpatch-cve-url: https://access.redhat.com/security/cve/CVE-2024-44994 kpatch-patch-url: https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/patch/?id=fca5b78511e98bdff2cdd55c172b23200a7b3404 kpatch-name: rhel9/5.14.0-503.16.1.el9_5/CVE-2024-46695-selinux-smack-don-t-bypass-permissions-check-in-inode-setsecctx-hook.patch kpatch-description: selinux,smack: don't bypass permissions check in inode_setsecctx hook kpatch-kernel: 5.14.0-503.16.1.el9_5 kpatch-cve: CVE-2024-46695 kpatch-cvss: 5.5 kpatch-cve-url: https://access.redhat.com/security/cve/CVE-2024-46695 kpatch-patch-url: https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git/commit/?id=eebec98791d0137e455cc006411bb92a54250924 kpatch-name: rhel9/5.14.0-503.16.1.el9_5/CVE-2024-49949-net-avoid-potential-underflow-in-qdisc_pkt_len_init-with-UFO.patch kpatch-description: net: avoid potential underflow in qdisc_pkt_len_init() with UFO kpatch-kernel: 5.14.0-503.16.1.el9_5 kpatch-cve: CVE-2024-49949 kpatch-cvss: 5.5 kpatch-cve-url: https://access.redhat.com/security/cve/CVE-2024-49949 kpatch-patch-url: https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git/commit/?id=c20029db28399ecc50e556964eaba75c43b1e2f1 kpatch-name: rhel9/5.14.0-503.19.1.el9_5/CVE-2024-27399-bluetooth-l2cap-fix-null-ptr-deref-in-l2cap-chan-timeout.patch kpatch-description: Bluetooth: l2cap: fix null-ptr-deref in l2cap_chan_timeout kpatch-kernel: 5.14.0-503.19.1.el9_5 kpatch-cve: CVE-2024-27399 kpatch-cvss: 5.5 kpatch-cve-url: https://access.redhat.com/security/cve/CVE-2024-27399 kpatch-patch-url: https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/patch/?id=adf0398cee86643b8eacde95f17d073d022f782c kpatch-name: rhel9/5.14.0-503.19.1.el9_5/CVE-2024-38564-bpf-add-bpf-prog-type-cgroup-skb-attach-type-enforcement-in-bpf-link-create.patch kpatch-description: bpf: Add BPF_PROG_TYPE_CGROUP_SKB attach type enforcement in BPF_LINK_CREATE kpatch-kernel: 5.14.0-503.19.1.el9_5 kpatch-cve: CVE-2024-38564 kpatch-cvss: 5.5 kpatch-cve-url: https://access.redhat.com/security/cve/CVE-2024-38564 kpatch-patch-url: https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/patch/?id=543576ec15b17c0c93301ac8297333c7b6e84ac7 kpatch-name: rhel9/5.14.0-503.19.1.el9_5/CVE-2024-45020-bpf-fix-a-kernel-verifier-crash-in-stacksafe.patch kpatch-description: bpf: Fix a kernel verifier crash in stacksafe() kpatch-kernel: 5.14.0-503.19.1.el9_5 kpatch-cve: CVE-2024-45020 kpatch-cvss: 5.5 kpatch-cve-url: https://access.redhat.com/security/cve/CVE-2024-45020 kpatch-patch-url: https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/patch/?id=bed2eb964c70b780fb55925892a74f26cb590b25 kpatch-name: rhel9/5.14.0-503.19.1.el9_5/CVE-2024-47675-bpf-fix-use-after-free-in-bpf-uprobe-multi-link-attach.patch kpatch-description: bpf: Fix use-after-free in bpf_uprobe_multi_link_attach() kpatch-kernel: 5.14.0-503.19.1.el9_5 kpatch-cve: CVE-2024-47675 kpatch-cvss: 7.8 kpatch-cve-url: https://access.redhat.com/security/cve/CVE-2024-47675 kpatch-patch-url: https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/patch/?id=5fe6e308abaea082c20fbf2aa5df8e14495622cf kpatch-name: rhel9/5.14.0-503.19.1.el9_5/CVE-2024-50099-arm64-probes-remove-broken-ldr-literal-uprobe-support.patch kpatch-description: arm64: probes: Remove broken LDR (literal) uprobe support kpatch-kernel: 5.14.0-503.19.1.el9_5 kpatch-cve: CVE-2024-50099 kpatch-cvss: 5.5 kpatch-cve-url: https://access.redhat.com/security/cve/CVE-2024-50099 kpatch-patch-url: https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/patch/?id=acc450aa07099d071b18174c22a1119c57da8227 kpatch-name: rhel9/5.14.0-503.19.1.el9_5/CVE-2024-50262-bpf-fix-out-of-bounds-write-in-trie-get-next-key.patch kpatch-description: bpf: Fix out-of-bounds write in trie_get_next_key() kpatch-kernel: 5.14.0-503.19.1.el9_5 kpatch-cve: CVE-2024-50262 kpatch-cvss: 7.8 kpatch-cve-url: https://access.redhat.com/security/cve/CVE-2024-50262 kpatch-patch-url: https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/patch/?id=13400ac8fb80c57c2bfb12ebd35ee121ce9b4d21 kpatch-name: rhel9/5.14.0-503.19.1.el9_5/CVE-2024-50115-KVM-nSVM-Ignore-nCR3-4-0-when-loading-PDPTEs-from-memory.patch kpatch-description: KVM: nSVM: Ignore nCR3[4:0] when loading PDPTEs from memory kpatch-kernel: 5.14.0-503.19.1.el9_5 kpatch-cve: CVE-2024-50115 kpatch-cvss: 7.1 kpatch-cve-url: https://access.redhat.com/security/cve/CVE-2024-50115 kpatch-patch-url: https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=f559b2e9c5c5308850544ab59396b7d53cfc67bd kpatch-name: rhel9/5.14.0-503.19.1.el9_5/CVE-2024-46697-nfsd-ensure-that-nfsd4_fattr_args-context-is-zeroed-out.patch kpatch-description: nfsd: ensure that nfsd4_fattr_args.context is zeroed out kpatch-kernel: 5.14.0-503.19.1.el9_5 kpatch-cve: CVE-2024-46697 kpatch-cvss: 5.5 kpatch-cve-url: https://access.redhat.com/security/cve/CVE-2024-46697 kpatch-patch-url: https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=f58bab6fd4063913bd8321e99874b8239e9ba726 kpatch-name: rhel9/5.14.0-503.19.1.el9_5/CVE-2024-50110-xfrm-fix-one-more-kernel-infoleak-in-algo-dumping.patch kpatch-description: xfrm: fix one more kernel-infoleak in algo dumping kpatch-kernel: 5.14.0-503.19.1.el9_5 kpatch-cve: CVE-2024-50110 kpatch-cvss: 5.5 kpatch-cve-url: https://access.redhat.com/security/cve/CVE-2024-50110 kpatch-patch-url: https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=6889cd2a93e1e3606b3f6e958aa0924e836de4d2 kpatch-name: rhel9/5.14.0-503.19.1.el9_5/CVE-2024-50142-xfrm-validate-new-sa-s-prefixlen-using-sa-family-when-sel-family-is-unset.patch kpatch-description: xfrm: validate new SA's prefixlen using SA family when sel.family is unset kpatch-kernel: 5.14.0-503.19.1.el9_5 kpatch-cve: CVE-2024-50142 kpatch-cvss: 5.5 kpatch-cve-url: https://access.redhat.com/security/cve/CVE-2024-50142 kpatch-patch-url: https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/patch/?id=3f0ab59e6537c6a8f9e1b355b48f9c05a76e8563 kpatch-name: rhel9/5.14.0-503.19.1.el9_5/CVE-2024-50148-Bluetooth-bnep-fix-wild-memory-access-in-proto_unregister.patch kpatch-description: Bluetooth: bnep: fix wild-memory-access in proto_unregister kpatch-kernel: 5.14.0-503.19.1.el9_5 kpatch-cve: CVE-2024-50148 kpatch-cvss: 5.5 kpatch-cve-url: https://access.redhat.com/security/cve/CVE-2024-50148 kpatch-patch-url: https://git.kernel.org/linus/64a90991ba8d4e32e3173ddd83d0b24167a5668c kpatch-name: skipped/CVE-2024-50255.patch kpatch-description: kpatch-kernel: kpatch-cve: CVE-2024-50255 kpatch-skip-reason: Bluetooth subsystem. Patched function may wait for a while, which may prevent patching/unpatching. kpatch-cvss: kpatch-name: rhel9/5.14.0-503.19.1.el9_5/CVE-2024-50223-sched-numa-Fix-the-potential-null-pointer-dereference-in-task_numa_work.patch kpatch-description: sched/numa: Fix the potential null pointer dereference in task_numa_work() kpatch-kernel: 5.14.0-503.19.1.el9_5 kpatch-cve: CVE-2024-50223 kpatch-cvss: 5.5 kpatch-cve-url: https://access.redhat.com/security/cve/CVE-2024-50223 kpatch-patch-url: https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/patch/?id=9c70b2a33cd2aa6a5a59c5523ef053bd42265209 kpatch-name: rhel9/5.14.0-503.19.1.el9_5/CVE-2024-50125-Bluetooth-SCO-Fix-UAF-on-sco_sock_timeout.patch kpatch-description: Bluetooth: SCO: Fix UAF on sco_sock_timeout kpatch-kernel: 5.14.0-503.19.1.el9_5 kpatch-cve: CVE-2024-50125 kpatch-cvss: 7.8 kpatch-cve-url: https://access.redhat.com/security/cve/CVE-2024-50125 kpatch-patch-url: https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/patch/?id=d30803f6a972 kpatch-name: rhel9/5.14.0-503.19.1.el9_5/CVE-2024-50124-Bluetooth-ISO-Fix-UAF-on-iso_sock_timeout.patch kpatch-description: Bluetooth: ISO: Fix UAF on iso_sock_timeout kpatch-kernel: 5.14.0-503.19.1.el9_5 kpatch-cve: CVE-2024-50124 kpatch-cvss: 7.8 kpatch-cve-url: https://access.redhat.com/security/cve/CVE-2024-50124 kpatch-patch-url: https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/patch/?id=246b435ad668 kpatch-name: rhel9/5.14.0-503.21.1.el9_5/CVE-2024-50208-rdma-bnxt-re-fix-a-bug-while-setting-up-level-2-pbl-pages.patch kpatch-description: RDMA/bnxt_re: Fix a bug while setting up Level-2 PBL pages kpatch-kernel: 5.14.0-503.21.1.el9_5 kpatch-cve: CVE-2024-50208 kpatch-cvss: 5.5 kpatch-cve-url: https://access.redhat.com/security/cve/CVE-2024-50208 kpatch-patch-url: https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/patch/?id=7988bdbbb85ac85a847baf09879edcd0f70521dc kpatch-name: rhel9/5.14.0-503.21.1.el9_5/CVE-2024-53122-mptcp-cope-racing-subflow-creation-in-mptcp-rcv-space-adjust.patch kpatch-description: mptcp: cope racing subflow creation in mptcp_rcv_space_adjust kpatch-kernel: 5.14.0-503.21.1.el9_5 kpatch-cve: CVE-2024-53122 kpatch-cvss: 5.5 kpatch-cve-url: https://access.redhat.com/security/cve/CVE-2024-53122 kpatch-patch-url: https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/patch/?id=ce7356ae35943cc6494cc692e62d51a734062b7d kpatch-name: rhel9/5.14.0-503.21.1.el9_5/CVE-2024-50252-mlxsw-spectrum_ipip-Fix-memory-leak-when-changing-remote-IPv6-address.patch kpatch-description: mlxsw: spectrum_ipip: Fix memory leak when changing remote IPv6 address kpatch-kernel: 5.14.0-503.21.1.el9_5 kpatch-cve: CVE-2024-50252 kpatch-cvss: 5.5 kpatch-cve-url: https://access.redhat.com/security/cve/CVE-2024-50252 kpatch-patch-url: https://github.com/torvalds/linux/commit/12ae97c531fcd3bfd774d4dfeaeac23eafe24280 kpatch-name: rhel9/5.14.0-503.21.1.el9_5/CVE-2024-46713-perf-aux-Fix-AUX-buffer-serialization.patch kpatch-description: perf/aux: Fix AUX buffer serialization kpatch-kernel: 5.14.0-503.21.1.el9_5 kpatch-cve: CVE-2024-46713 kpatch-cvss: 5.5 kpatch-cve-url: https://access.redhat.com/security/cve/CVE-2024-46713 kpatch-patch-url: https://github.com/torvalds/linux/commit/2ab9d830262c132ab5db2f571003d80850d56b2a kpatch-name: rhel9/5.14.0-503.21.1.el9_5/CVE-2024-46713-perf-aux-Fix-AUX-buffer-serialization-kpatch.patch kpatch-description: perf/aux: Fix AUX buffer serialization (Adaptation) kpatch-kernel: 5.14.0-503.21.1.el9_5 kpatch-cve: CVE-2024-46713 kpatch-cvss: 5.5 kpatch-cve-url: https://access.redhat.com/security/cve/CVE-2024-46713 kpatch-patch-url: https://github.com/torvalds/linux/commit/2ab9d830262c132ab5db2f571003d80850d56b2a kpatch-name: rhel9/5.14.0-503.22.1.el9_5/CVE-2024-50154-tcp-dccp-Don-t-use-timer_pending-in-reqsk_queue_unlink.patch kpatch-description: tcp/dccp: Don't use timer_pending() in reqsk_queue_unlink() kpatch-kernel: 5.14.0-503.22.1.el9_5 kpatch-cve: CVE-2024-50154 kpatch-cvss: 7.8 kpatch-cve-url: https://access.redhat.com/security/cve/CVE-2024-50154 kpatch-patch-url: https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=e8c526f2bdf1 kpatch-name: rhel9/5.14.0-503.22.1.el9_5/CVE-2024-50275-arm64-sve-Discard-stale-CPU-state-when-handling-SVE.patch kpatch-description: Discard stale CPU state when handling SVE traps kpatch-kernel: 5.14.0-503.22.1.el9_5 kpatch-cve: CVE-2024-50275 kpatch-cvss: 7.0 kpatch-cve-url: https://access.redhat.com/security/cve/CVE-2024-50275 kpatch-patch-url: https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=751ecf6afd65 kpatch-name: rhel9/5.14.0-503.22.1.el9_5/CVE-2024-53088-0002-i40e-fix-race-condition-by-adding-filter-s-intermediate-sync-state.patch kpatch-description: fix race condition by adding filter's intermediate sync state kpatch-kernel: 5.14.0-503.22.1.el9_5 kpatch-cve: CVE-2024-53088 kpatch-cvss: 5.5 kpatch-cve-url: https://access.redhat.com/security/cve/CVE-2024-53088 kpatch-patch-url: https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=f30490e969 uname: 5.14.0-503.22.1.el9_5 |
| stdout_lines |
[ "OS: almalinux9", "kernel: kernel-5.14.0-503.15.1.el9_5", "time: 2025-02-07 14:11:19", "", "kpatch-name: rhel9/5.14.0-503.16.1.el9_5/CVE-2024-50251-netfilter-nft_payload-sanitize-offset-and-length-before-calling-skb_checksum.patch", "kpatch-description: netfilter: nft_payload: sanitize offset and length before calling skb_checksum()", "kpatch-kernel: 5.14.0-503.16.1.el9_5", "kpatch-cve: CVE-2024-50251", "kpatch-cvss: 6.2", "kpatch-cve-url: https://access.redhat.com/security/cve/CVE-2024-50251", "kpatch-patch-url: https://git.kernel.org/linus/d5953d680f7e96208c29ce4139a0e38de87a57fe", "", "kpatch-name: rhel9/5.14.0-503.16.1.el9_5/CVE-2024-26615-net-smc-fix-illegal-rmb-desc-access-in-smc-d-connection-dump.patch", "kpatch-description: net/smc: fix illegal rmb_desc access in SMC-D connection dump", "kpatch-kernel: 5.14.0-503.16.1.el9_5", "kpatch-cve: CVE-2024-26615", "kpatch-cvss: 5.5", "kpatch-cve-url: https://access.redhat.com/security/cve/CVE-2024-26615", "kpatch-patch-url: https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/patch/?id=dbc153fd3c142909e564bb256da087e13fbf239c", "", "kpatch-name: rhel9/5.14.0-503.16.1.el9_5/CVE-2024-43854-block-initialize-integrity-buffer-to-zero-before-writing-it-to-media.patch", "kpatch-description: block: initialize integrity buffer to zero before writing it to media", "kpatch-kernel: 5.14.0-503.16.1.el9_5", "kpatch-cve: CVE-2024-43854", "kpatch-cvss: 5.5", "kpatch-cve-url: https://access.redhat.com/security/cve/CVE-2024-43854", "kpatch-patch-url: https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/patch/?id=899ee2c3829c5ac14bfc7d3c4a5846c0b709b78f", "", "kpatch-name: rhel9/5.14.0-503.16.1.el9_5/CVE-2024-44994-iommu-restore-lost-return-in-iommu-report-device-fault.patch", "kpatch-description: iommu: Restore lost return in iommu_report_device_fault()", "kpatch-kernel: 5.14.0-503.16.1.el9_5", "kpatch-cve: CVE-2024-44994", "kpatch-cvss: 5.5", "kpatch-cve-url: https://access.redhat.com/security/cve/CVE-2024-44994", "kpatch-patch-url: https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/patch/?id=fca5b78511e98bdff2cdd55c172b23200a7b3404", "", "kpatch-name: rhel9/5.14.0-503.16.1.el9_5/CVE-2024-46695-selinux-smack-don-t-bypass-permissions-check-in-inode-setsecctx-hook.patch", "kpatch-description: selinux,smack: don't bypass permissions check in inode_setsecctx hook", "kpatch-kernel: 5.14.0-503.16.1.el9_5", "kpatch-cve: CVE-2024-46695", "kpatch-cvss: 5.5", "kpatch-cve-url: https://access.redhat.com/security/cve/CVE-2024-46695", "kpatch-patch-url: https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git/commit/?id=eebec98791d0137e455cc006411bb92a54250924", "", "kpatch-name: rhel9/5.14.0-503.16.1.el9_5/CVE-2024-49949-net-avoid-potential-underflow-in-qdisc_pkt_len_init-with-UFO.patch", "kpatch-description: net: avoid potential underflow in qdisc_pkt_len_init() with UFO", "kpatch-kernel: 5.14.0-503.16.1.el9_5", "kpatch-cve: CVE-2024-49949", "kpatch-cvss: 5.5", "kpatch-cve-url: https://access.redhat.com/security/cve/CVE-2024-49949", "kpatch-patch-url: https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git/commit/?id=c20029db28399ecc50e556964eaba75c43b1e2f1", "", "kpatch-name: rhel9/5.14.0-503.19.1.el9_5/CVE-2024-27399-bluetooth-l2cap-fix-null-ptr-deref-in-l2cap-chan-timeout.patch", "kpatch-description: Bluetooth: l2cap: fix null-ptr-deref in l2cap_chan_timeout", "kpatch-kernel: 5.14.0-503.19.1.el9_5", "kpatch-cve: CVE-2024-27399", "kpatch-cvss: 5.5", "kpatch-cve-url: https://access.redhat.com/security/cve/CVE-2024-27399", "kpatch-patch-url: https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/patch/?id=adf0398cee86643b8eacde95f17d073d022f782c", "", "kpatch-name: rhel9/5.14.0-503.19.1.el9_5/CVE-2024-38564-bpf-add-bpf-prog-type-cgroup-skb-attach-type-enforcement-in-bpf-link-create.patch", "kpatch-description: bpf: Add BPF_PROG_TYPE_CGROUP_SKB attach type enforcement in BPF_LINK_CREATE", "kpatch-kernel: 5.14.0-503.19.1.el9_5", "kpatch-cve: CVE-2024-38564", "kpatch-cvss: 5.5", "kpatch-cve-url: https://access.redhat.com/security/cve/CVE-2024-38564", "kpatch-patch-url: https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/patch/?id=543576ec15b17c0c93301ac8297333c7b6e84ac7", "", "kpatch-name: rhel9/5.14.0-503.19.1.el9_5/CVE-2024-45020-bpf-fix-a-kernel-verifier-crash-in-stacksafe.patch", "kpatch-description: bpf: Fix a kernel verifier crash in stacksafe()", "kpatch-kernel: 5.14.0-503.19.1.el9_5", "kpatch-cve: CVE-2024-45020", "kpatch-cvss: 5.5", "kpatch-cve-url: https://access.redhat.com/security/cve/CVE-2024-45020", "kpatch-patch-url: https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/patch/?id=bed2eb964c70b780fb55925892a74f26cb590b25", "", "kpatch-name: rhel9/5.14.0-503.19.1.el9_5/CVE-2024-47675-bpf-fix-use-after-free-in-bpf-uprobe-multi-link-attach.patch", "kpatch-description: bpf: Fix use-after-free in bpf_uprobe_multi_link_attach()", "kpatch-kernel: 5.14.0-503.19.1.el9_5", "kpatch-cve: CVE-2024-47675", "kpatch-cvss: 7.8", "kpatch-cve-url: https://access.redhat.com/security/cve/CVE-2024-47675", "kpatch-patch-url: https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/patch/?id=5fe6e308abaea082c20fbf2aa5df8e14495622cf", "", "kpatch-name: rhel9/5.14.0-503.19.1.el9_5/CVE-2024-50099-arm64-probes-remove-broken-ldr-literal-uprobe-support.patch", "kpatch-description: arm64: probes: Remove broken LDR (literal) uprobe support", "kpatch-kernel: 5.14.0-503.19.1.el9_5", "kpatch-cve: CVE-2024-50099", "kpatch-cvss: 5.5", "kpatch-cve-url: https://access.redhat.com/security/cve/CVE-2024-50099", "kpatch-patch-url: https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/patch/?id=acc450aa07099d071b18174c22a1119c57da8227", "", "kpatch-name: rhel9/5.14.0-503.19.1.el9_5/CVE-2024-50262-bpf-fix-out-of-bounds-write-in-trie-get-next-key.patch", "kpatch-description: bpf: Fix out-of-bounds write in trie_get_next_key()", "kpatch-kernel: 5.14.0-503.19.1.el9_5", "kpatch-cve: CVE-2024-50262", "kpatch-cvss: 7.8", "kpatch-cve-url: https://access.redhat.com/security/cve/CVE-2024-50262", "kpatch-patch-url: https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/patch/?id=13400ac8fb80c57c2bfb12ebd35ee121ce9b4d21", "", "kpatch-name: rhel9/5.14.0-503.19.1.el9_5/CVE-2024-50115-KVM-nSVM-Ignore-nCR3-4-0-when-loading-PDPTEs-from-memory.patch", "kpatch-description: KVM: nSVM: Ignore nCR3[4:0] when loading PDPTEs from memory", "kpatch-kernel: 5.14.0-503.19.1.el9_5", "kpatch-cve: CVE-2024-50115", "kpatch-cvss: 7.1", "kpatch-cve-url: https://access.redhat.com/security/cve/CVE-2024-50115", "kpatch-patch-url: https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=f559b2e9c5c5308850544ab59396b7d53cfc67bd", "", "kpatch-name: rhel9/5.14.0-503.19.1.el9_5/CVE-2024-46697-nfsd-ensure-that-nfsd4_fattr_args-context-is-zeroed-out.patch", "kpatch-description: nfsd: ensure that nfsd4_fattr_args.context is zeroed out", "kpatch-kernel: 5.14.0-503.19.1.el9_5", "kpatch-cve: CVE-2024-46697", "kpatch-cvss: 5.5", "kpatch-cve-url: https://access.redhat.com/security/cve/CVE-2024-46697", "kpatch-patch-url: https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=f58bab6fd4063913bd8321e99874b8239e9ba726", "", "kpatch-name: rhel9/5.14.0-503.19.1.el9_5/CVE-2024-50110-xfrm-fix-one-more-kernel-infoleak-in-algo-dumping.patch", "kpatch-description: xfrm: fix one more kernel-infoleak in algo dumping", "kpatch-kernel: 5.14.0-503.19.1.el9_5", "kpatch-cve: CVE-2024-50110", "kpatch-cvss: 5.5", "kpatch-cve-url: https://access.redhat.com/security/cve/CVE-2024-50110", "kpatch-patch-url: https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=6889cd2a93e1e3606b3f6e958aa0924e836de4d2", "", "kpatch-name: rhel9/5.14.0-503.19.1.el9_5/CVE-2024-50142-xfrm-validate-new-sa-s-prefixlen-using-sa-family-when-sel-family-is-unset.patch", "kpatch-description: xfrm: validate new SA's prefixlen using SA family when sel.family is unset", "kpatch-kernel: 5.14.0-503.19.1.el9_5", "kpatch-cve: CVE-2024-50142", "kpatch-cvss: 5.5", "kpatch-cve-url: https://access.redhat.com/security/cve/CVE-2024-50142", "kpatch-patch-url: https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/patch/?id=3f0ab59e6537c6a8f9e1b355b48f9c05a76e8563", "", "kpatch-name: rhel9/5.14.0-503.19.1.el9_5/CVE-2024-50148-Bluetooth-bnep-fix-wild-memory-access-in-proto_unregister.patch", "kpatch-description: Bluetooth: bnep: fix wild-memory-access in proto_unregister", "kpatch-kernel: 5.14.0-503.19.1.el9_5", "kpatch-cve: CVE-2024-50148", "kpatch-cvss: 5.5", "kpatch-cve-url: https://access.redhat.com/security/cve/CVE-2024-50148", "kpatch-patch-url: https://git.kernel.org/linus/64a90991ba8d4e32e3173ddd83d0b24167a5668c", "", "kpatch-name: skipped/CVE-2024-50255.patch", "kpatch-description: ", "kpatch-kernel: ", "kpatch-cve: CVE-2024-50255", "kpatch-skip-reason: Bluetooth subsystem. Patched function may wait for a while, which may prevent patching/unpatching.", "kpatch-cvss: ", "", "kpatch-name: rhel9/5.14.0-503.19.1.el9_5/CVE-2024-50223-sched-numa-Fix-the-potential-null-pointer-dereference-in-task_numa_work.patch", "kpatch-description: sched/numa: Fix the potential null pointer dereference in task_numa_work()", "kpatch-kernel: 5.14.0-503.19.1.el9_5", "kpatch-cve: CVE-2024-50223", "kpatch-cvss: 5.5", "kpatch-cve-url: https://access.redhat.com/security/cve/CVE-2024-50223", "kpatch-patch-url: https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/patch/?id=9c70b2a33cd2aa6a5a59c5523ef053bd42265209", "", "kpatch-name: rhel9/5.14.0-503.19.1.el9_5/CVE-2024-50125-Bluetooth-SCO-Fix-UAF-on-sco_sock_timeout.patch", "kpatch-description: Bluetooth: SCO: Fix UAF on sco_sock_timeout", "kpatch-kernel: 5.14.0-503.19.1.el9_5", "kpatch-cve: CVE-2024-50125", "kpatch-cvss: 7.8", "kpatch-cve-url: https://access.redhat.com/security/cve/CVE-2024-50125", "kpatch-patch-url: https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/patch/?id=d30803f6a972", "", "kpatch-name: rhel9/5.14.0-503.19.1.el9_5/CVE-2024-50124-Bluetooth-ISO-Fix-UAF-on-iso_sock_timeout.patch", "kpatch-description: Bluetooth: ISO: Fix UAF on iso_sock_timeout", "kpatch-kernel: 5.14.0-503.19.1.el9_5", "kpatch-cve: CVE-2024-50124", "kpatch-cvss: 7.8", "kpatch-cve-url: https://access.redhat.com/security/cve/CVE-2024-50124", "kpatch-patch-url: https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/patch/?id=246b435ad668", "", "kpatch-name: rhel9/5.14.0-503.21.1.el9_5/CVE-2024-50208-rdma-bnxt-re-fix-a-bug-while-setting-up-level-2-pbl-pages.patch", "kpatch-description: RDMA/bnxt_re: Fix a bug while setting up Level-2 PBL pages", "kpatch-kernel: 5.14.0-503.21.1.el9_5", "kpatch-cve: CVE-2024-50208", "kpatch-cvss: 5.5", "kpatch-cve-url: https://access.redhat.com/security/cve/CVE-2024-50208", "kpatch-patch-url: https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/patch/?id=7988bdbbb85ac85a847baf09879edcd0f70521dc", "", "kpatch-name: rhel9/5.14.0-503.21.1.el9_5/CVE-2024-53122-mptcp-cope-racing-subflow-creation-in-mptcp-rcv-space-adjust.patch", "kpatch-description: mptcp: cope racing subflow creation in mptcp_rcv_space_adjust", "kpatch-kernel: 5.14.0-503.21.1.el9_5", "kpatch-cve: CVE-2024-53122", "kpatch-cvss: 5.5", "kpatch-cve-url: https://access.redhat.com/security/cve/CVE-2024-53122", "kpatch-patch-url: https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/patch/?id=ce7356ae35943cc6494cc692e62d51a734062b7d", "", "kpatch-name: rhel9/5.14.0-503.21.1.el9_5/CVE-2024-50252-mlxsw-spectrum_ipip-Fix-memory-leak-when-changing-remote-IPv6-address.patch", "kpatch-description: mlxsw: spectrum_ipip: Fix memory leak when changing remote IPv6 address", "kpatch-kernel: 5.14.0-503.21.1.el9_5", "kpatch-cve: CVE-2024-50252", "kpatch-cvss: 5.5", "kpatch-cve-url: https://access.redhat.com/security/cve/CVE-2024-50252", "kpatch-patch-url: https://github.com/torvalds/linux/commit/12ae97c531fcd3bfd774d4dfeaeac23eafe24280", "", "kpatch-name: rhel9/5.14.0-503.21.1.el9_5/CVE-2024-46713-perf-aux-Fix-AUX-buffer-serialization.patch", "kpatch-description: perf/aux: Fix AUX buffer serialization", "kpatch-kernel: 5.14.0-503.21.1.el9_5", "kpatch-cve: CVE-2024-46713", "kpatch-cvss: 5.5", "kpatch-cve-url: https://access.redhat.com/security/cve/CVE-2024-46713", "kpatch-patch-url: https://github.com/torvalds/linux/commit/2ab9d830262c132ab5db2f571003d80850d56b2a", "", "kpatch-name: rhel9/5.14.0-503.21.1.el9_5/CVE-2024-46713-perf-aux-Fix-AUX-buffer-serialization-kpatch.patch", "kpatch-description: perf/aux: Fix AUX buffer serialization (Adaptation)", "kpatch-kernel: 5.14.0-503.21.1.el9_5", "kpatch-cve: CVE-2024-46713", "kpatch-cvss: 5.5", "kpatch-cve-url: https://access.redhat.com/security/cve/CVE-2024-46713", "kpatch-patch-url: https://github.com/torvalds/linux/commit/2ab9d830262c132ab5db2f571003d80850d56b2a", "", "kpatch-name: rhel9/5.14.0-503.22.1.el9_5/CVE-2024-50154-tcp-dccp-Don-t-use-timer_pending-in-reqsk_queue_unlink.patch", "kpatch-description: tcp/dccp: Don't use timer_pending() in reqsk_queue_unlink()", "kpatch-kernel: 5.14.0-503.22.1.el9_5", "kpatch-cve: CVE-2024-50154", "kpatch-cvss: 7.8", "kpatch-cve-url: https://access.redhat.com/security/cve/CVE-2024-50154", "kpatch-patch-url: https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=e8c526f2bdf1", "", "kpatch-name: rhel9/5.14.0-503.22.1.el9_5/CVE-2024-50275-arm64-sve-Discard-stale-CPU-state-when-handling-SVE.patch", "kpatch-description: Discard stale CPU state when handling SVE traps", "kpatch-kernel: 5.14.0-503.22.1.el9_5", "kpatch-cve: CVE-2024-50275", "kpatch-cvss: 7.0", "kpatch-cve-url: https://access.redhat.com/security/cve/CVE-2024-50275", "kpatch-patch-url: https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=751ecf6afd65", "", "kpatch-name: rhel9/5.14.0-503.22.1.el9_5/CVE-2024-53088-0002-i40e-fix-race-condition-by-adding-filter-s-intermediate-sync-state.patch", "kpatch-description: fix race condition by adding filter's intermediate sync state", "kpatch-kernel: 5.14.0-503.22.1.el9_5", "kpatch-cve: CVE-2024-53088", "kpatch-cvss: 5.5", "kpatch-cve-url: https://access.redhat.com/security/cve/CVE-2024-53088", "kpatch-patch-url: https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=f30490e969", "", "", "uname: 5.14.0-503.22.1.el9_5" ] |