• kernel-5.14.0-427.40.1.el9_4 (almalinux9)
  • 5.14.0-611.16.1.el9_7
  • 2026-01-16 14:19:02
  • 2026-01-20 11:38:54
  • K20260116_06
  • CVE-2023-52451
  • Description:

    Out of scope as the patch is for powerpc arch only, x86_64 is not affected

  • From:
  • CVE-2024-36932
  • Description:

    Kernel versions older than 5.14.0-503.11.1.el9_5 are not affected

  • From:
  • CVE-2022-48669
  • Description:

    Out of scope as the patch is for powerpc arch only, x86_64 is not affected

  • From:
  • CVE-2023-52482
  • Description:

    CVE patch is for AMD Inception vulnerability related to Speculative Return Stack Overflow (SRSO)

  • From:
  • CVE-2024-26712
  • Description:

    Do not support powerpc build with kasan sanitizer 4a7aee96200ad281a5cc4cf5c7a2e2a49d2b97b0

  • From:
  • CVE-2023-52902
  • Description:

    nommu: kernel is not vulnerable. Commit 8220543("nommu: remove uses of VMA linked list") is absent

  • From:
  • CVE-2024-26921
  • Description:

    Live-patching will introduce network performance degradation in the best case scenario, or even some more serious issues. N/A or Low cvss3 score from NVD or vendors.

  • From:
  • CVE-2024-26843
  • Description:

    EFI Firmware: CVE patch is for EFI firmware which runs at boot time.

  • From:
  • CVE-2023-52634
  • Description:

    The patch for this CVE fixing vulnerability which was introduced in kernel v6.7

  • From:
  • CVE-2023-52619
  • Description:

    Complex adaptation required. x86 and amd64 architectures are not affected. Issues triggers while dumping after another crash.

  • From:
  • CVE-2024-26988
  • Description:

    Out of scope as the patch is for vmlinux init sections which are discarded after the boot

  • From:
  • CVE-2024-27404
  • Description:

    Complex adaptation required. Network services prevents update because they can sleep in subflow_finish_connect() function.

  • From:
  • CVE-2024-35918
  • Description:

    It is not possible to fix this vulnerability using kernel livepatching because it lies below the system call level.

  • From:
  • CVE-2024-35904
  • Description:

    Affects only __init function for a built-in component, so patching will have no effect

  • From:
  • CVE-2024-41008
  • Description:

    Complex adaptation required, low score patch for non critical subsystem amdgpu

  • From:
  • CVE-2024-40965
  • Description:

    complex adaptation required for el9-arm64, el9-x86 not affected

  • From:
  • CVE-2024-26638
  • Description:

    nbd: Low-score CVE. Patched function is called from a kthread and sleeps, which may prevent patching/unpatching.

  • From:
  • CVE-2024-26646
  • Description:

    Affects only boot __init stage, already booted kernels are not affected

  • From:
  • CVE-2024-35938
  • Description:

    wifi:ath11k, low score CVE that needs complex adaptation but decreasing MHI Bus' buf-len isn't a typical security fix.

  • From:
  • CVE-2024-26812
  • Description:

    Complex adaptation required, not worth the effort for 4.4 score CVE

  • From:
  • CVE-2021-47505
  • Description:

    A complex adaptation is needed which is not possible to implement safely. Only Android OS is affected. Low score CVE.

  • From:
  • CVE-2024-26670
  • Description:

    Out of scope - affects 'smartphones' SoCs based on Cortex-A510 and Cortex-A520

  • From:
  • CVE-2024-26734
  • Description:

    Affects only boot __init stage, already booted kernels are not affected

  • From:
  • CVE-2024-50255
  • Description:

    Bluetooth subsystem. Patched function may wait for a while, which may prevent patching/unpatching.

  • From:
  • CVE-2024-50192
  • Description:

    arm64: Low-score CVE requiring adaptation that is hard to implement; targets very rare hardware

  • From:
  • CVE-2025-21785
  • Description:

    Out of scope: ARM64 architecture isn't supported for current kernel

  • From:
  • CVE-2024-42302
  • Description:

    Patched function waits for external events, which may prevent patching/unpatching.

  • From:
  • CVE-2024-44932
  • Description:

    Blamed commit 90912f9 ("idpf: convert header split mode to libeth + napi_build_skb()") is absent.

  • From:
  • CVE-2024-53095
  • Description:

    low-scored CVE which inevitably will cause verification conflicts with freezable kthread and cifs reading routines.

  • From:
  • CVE-2024-57809
  • Description:

    Out of scope: ARM architecture isn't supported for current kernel

  • From:
  • CVE-2024-49999
  • Description:

    bugfix for module from non-standard kernel-modules-partner package

  • From:
  • CVE-2024-43889
  • Description:

    Out of scope: This CVE modified the __init function which won't be available to patch as it is used during bootup time.

  • From:
  • CVE-2025-21663
  • Description:

    Out of scope as the patch is for NVIDIA Tegra SoCs targeting mobile devices

  • From:
  • CVE-2025-21646
  • Description:

    bugfix for module from non-standard kernel-modules-partner package

  • From:
  • CVE-2024-53232
  • Description:

    Out of scope: IBM System/390 architecture isn't supported for current kernel

  • From:
  • CVE-2024-50189
  • Description:

    When introduced by live-patching, patch causes more problems than it fixes. Complex adaptation required.

  • From:
  • CVE-2025-39694
  • Description:

    Out of scope: IBM System/390 architecture isn't supported for current kernel

  • From:
  • CVE-2025-39751
  • Description:

    This CVE has been rejected or withdrawn by its CVE Numbering Authority as per NVD website

  • From:
  • CVE-2022-49432
  • Description:

    Out of scope: PowerPC architecture isn't supported for current kernel

  • From:
  • CVE-2025-21829
  • Description:

    Patches a sleepable function, which may prevent patching/unpatching.

  • From:
  • CVE-2022-49437
  • Description:

    Out of scope: PowerPC architecture isn't supported for current kernel

  • From:
  • CVE-2022-49623
  • Description:

    Out of scope: PowerPC architecture isn't supported for current kernel

  • From:
  • CVE-2022-49353
  • Description:

    Out of scope: PowerPC architecture isn't supported for current kernel

  • From: