Skip to navigation Skip to main content

Utilities

  • Subscriptions
  • Downloads
  • Red Hat Console
  • Get Support
Red Hat Customer Portal
  • Subscriptions
  • Downloads
  • Red Hat Console
  • Get Support
  • Products

    Top Products

    • Red Hat Enterprise Linux
    • Red Hat OpenShift
    • Red Hat Ansible Automation Platform
    All Products

    Downloads and Containers

    • Downloads
    • Packages
    • Containers

    Top Resources

    • Documentation
    • Product Life Cycles
    • Product Compliance
    • Errata
  • Knowledge

    Red Hat Knowledge Center

    • Knowledgebase Solutions
    • Knowledgebase Articles
    • Customer Portal Labs
    • Errata

    Top Product Docs

    • Red Hat Enterprise Linux
    • Red Hat OpenShift
    • Red Hat Ansible Automation Platform
    All Product Docs

    Training and Certification

    • About
    • Course Index
    • Certification Index
    • Skill Assessment
  • Security

    Red Hat Product Security Center

    • Security Updates
    • Security Advisories
    • Red Hat CVE Database
    • Errata

    References

    • Security Bulletins
    • Severity Ratings
    • Security Data

    Top Resources

    • Security Labs
    • Backporting Policies
    • Security Blog
  • Support

    Red Hat Support

    • Support Cases
    • Troubleshoot
    • Get Support
    • Contact Red Hat Support

    Red Hat Community Support

    • Customer Portal Community
    • Community Discussions
    • Red Hat Accelerator Program

    Top Resources

    • Product Life Cycles
    • Customer Portal Labs
    • Red Hat JBoss Supported Configurations
    • Red Hat Lightspeed
Or troubleshoot an issue.

Select Your Language

  • English
  • Français
  • 한국어
  • 日本語
  • 中文 (中国)

Infrastructure and Management

  • Red Hat Enterprise Linux
  • Red Hat Satellite
  • Red Hat Subscription Management
  • Red Hat Lightspeed
  • Red Hat Ansible Automation Platform

Cloud Computing

  • Red Hat OpenShift
  • Red Hat OpenStack Platform
  • Red Hat OpenShift
  • Red Hat OpenShift AI
  • Red Hat OpenShift Dedicated
  • Red Hat Advanced Cluster Security for Kubernetes
  • Red Hat Advanced Cluster Management for Kubernetes
  • Red Hat Quay
  • Red Hat OpenShift Dev Spaces
  • Red Hat OpenShift Service on AWS

Storage

  • Red Hat Gluster Storage
  • Red Hat Hyperconverged Infrastructure
  • Red Hat Ceph Storage
  • Red Hat OpenShift Data Foundation

Runtimes

  • Red Hat Runtimes
  • Red Hat JBoss Enterprise Application Platform
  • Red Hat Data Grid
  • Red Hat JBoss Web Server
  • Red Hat build of Keycloak
  • Red Hat support for Spring Boot
  • Red Hat build of Node.js
  • Red Hat build of Quarkus

Integration and Automation

  • Red Hat Application Foundations
  • Red Hat Fuse
  • Red Hat AMQ
  • Red Hat 3scale API Management
All Products
Red Hat Product Errata RHSA-2026:16063 - Security Advisory
Issued:
2026-05-11
Updated:
2026-05-11

RHSA-2026:16063 - Security Advisory

  • Overview
  • Updated Packages

Synopsis

Important: kpatch-patch-5_14_0-427_100_1, kpatch-patch-5_14_0-427_106_1, kpatch-patch-5_14_0-427_113_1, kpatch-patch-5_14_0-427_55_1, kpatch-patch-5_14_0-427_68_2, and kpatch-patch-5_14_0-427_84_1 security update

Type/Severity

Security Advisory: Important

Red Hat Lightspeed patch analysis

Identify and remediate systems affected by this advisory.

View affected systems

Topic

An update for multiple packages is now available for Red Hat Enterprise Linux 9.4 Extended Update Support.

Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.

Description

This is a kernel live patch module which can be loaded by the kpatch command line utility to modify the code of a running kernel. This patch module is targeted for kernel-5.14.0-427.55.1.el9_4.

Security Fix(es):

  • kernel: crypto: algif_aead - Revert to operating out-of-place (CVE-2026-31431)

For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.

Solution

For details on how to apply this update, which includes the changes described in this advisory, refer to:

https://access.redhat.com/articles/11258

The system must be rebooted for this update to take effect.

Affected Products

  • Red Hat Enterprise Linux for x86_64 - Extended Update Support 9.4 x86_64
  • Red Hat Enterprise Linux Server - AUS 9.4 x86_64
  • Red Hat Enterprise Linux for Power, little endian - Extended Update Support 9.4 ppc64le
  • Red Hat Enterprise Linux Server for Power LE - Update Services for SAP Solutions 9.4 ppc64le
  • Red Hat Enterprise Linux for x86_64 - Update Services for SAP Solutions 9.4 x86_64
  • Red Hat Enterprise Linux for x86_64 - Extended Life Cycle 9.4 x86_64
  • Red Hat Enterprise Linux for Power, little endian - Extended Life Cycle 9.4 ppc64le

Fixes

  • BZ - 2460538 - CVE-2026-31431 kernel: crypto: algif_aead - Revert to operating out-of-place

CVEs

  • CVE-2026-31431

References

  • https://access.redhat.com/security/updates/classification/#important
Note: More recent versions of these packages may be available. Click a package name for more details.

Red Hat Enterprise Linux for x86_64 - Extended Update Support 9.4

SRPM
kpatch-patch-5_14_0-427_100_1-1-3.el9_4.src.rpm SHA-256: 04d291fa579a6f30f9ecc71d74393ecea71da1d88e84475acfaa4b45888acad3
kpatch-patch-5_14_0-427_113_1-1-1.el9_4.src.rpm SHA-256: f02c6adddb94b8a2a297e3d20857132184cb7204473473d6a0cdb76db87ceab5
kpatch-patch-5_14_0-427_55_1-1-13.el9_4.src.rpm SHA-256: a85243584eb336afd488488a6803db78939594dbc0c65de290e9a87d09758f05
kpatch-patch-5_14_0-427_68_2-1-10.el9_4.src.rpm SHA-256: feedcd7713c23ab84c7fb434ef7a2824082b54a5463939350c31ff13d07ce044
kpatch-patch-5_14_0-427_84_1-1-5.el9_4.src.rpm SHA-256: e7b9dbe7f9d21d935ce4e56bad7149b6840c85b02ac9b4ebc3b9e5390e02eb2c
x86_64
kpatch-patch-5_14_0-427_100_1-1-3.el9_4.x86_64.rpm SHA-256: b4756c7c3a83514411de1d9f226545973378dffdafa274f1255b353133e0c86c
kpatch-patch-5_14_0-427_100_1-debuginfo-1-3.el9_4.x86_64.rpm SHA-256: 5cba1f94bd6e7e9714d3a35d0351fd7d2865b39db4427c7e679cf2be89bb8131
kpatch-patch-5_14_0-427_100_1-debugsource-1-3.el9_4.x86_64.rpm SHA-256: eb4cfcaf2a1705e3b4eaef280d8884c514cf38f6c637ca6f5659878839e3aa1b
kpatch-patch-5_14_0-427_113_1-1-1.el9_4.x86_64.rpm SHA-256: c76e0fe9217cae9732f6af2deb3e8a150ff6a870645617485dec732131371f57
kpatch-patch-5_14_0-427_113_1-debuginfo-1-1.el9_4.x86_64.rpm SHA-256: 85e655b264d3a3717fbd1e64b114e5e06858d2b48568c4d06561f68c965b8114
kpatch-patch-5_14_0-427_113_1-debugsource-1-1.el9_4.x86_64.rpm SHA-256: 5f151530c8e51a188b5625ae26638651586cdc9d330ea1308e29d71e321c843d
kpatch-patch-5_14_0-427_55_1-1-13.el9_4.x86_64.rpm SHA-256: ea6941f7facfc4e109c70ed6a1404656e474f0532b5db40653d86d96d478d901
kpatch-patch-5_14_0-427_55_1-debuginfo-1-13.el9_4.x86_64.rpm SHA-256: 3869812cdaadb15e4ac51750e7c3b756574aca1e752351335a9ee6cccaefb572
kpatch-patch-5_14_0-427_55_1-debugsource-1-13.el9_4.x86_64.rpm SHA-256: 4a355f88ff979c08c99e46846e2ee389c8091f0fe740f1a76f00b2b4c94d59d5
kpatch-patch-5_14_0-427_68_2-1-10.el9_4.x86_64.rpm SHA-256: 55a15cd3299eff3ea0e52ab56095332764e39006c0cde2865ce1653dd3713f19
kpatch-patch-5_14_0-427_68_2-debuginfo-1-10.el9_4.x86_64.rpm SHA-256: ecb1a7fb608d64b1863d39a5bbbe16468a31d5c0e0ae248b8e91c752e847d499
kpatch-patch-5_14_0-427_68_2-debugsource-1-10.el9_4.x86_64.rpm SHA-256: 032db50ef8d66ec96b72e2adb4924901925fec3e99815666d8b3699b3d6112c3
kpatch-patch-5_14_0-427_84_1-1-5.el9_4.x86_64.rpm SHA-256: 6112a672dd5a222a08da27c9e56ca47c788dfa160b9f27127dcce7acaf9108b5
kpatch-patch-5_14_0-427_84_1-debuginfo-1-5.el9_4.x86_64.rpm SHA-256: a2813c58f47a6987fdeb8a66da9d646cd6652a38a61136975b8033bcdba4e341
kpatch-patch-5_14_0-427_84_1-debugsource-1-5.el9_4.x86_64.rpm SHA-256: 1180a7e942a1abed2e4a5234a3c1eedf0760d686497c76c03b514315ab9cedae

Red Hat Enterprise Linux Server - AUS 9.4

SRPM
kpatch-patch-5_14_0-427_100_1-1-3.el9_4.src.rpm SHA-256: 04d291fa579a6f30f9ecc71d74393ecea71da1d88e84475acfaa4b45888acad3
kpatch-patch-5_14_0-427_113_1-1-1.el9_4.src.rpm SHA-256: f02c6adddb94b8a2a297e3d20857132184cb7204473473d6a0cdb76db87ceab5
kpatch-patch-5_14_0-427_55_1-1-13.el9_4.src.rpm SHA-256: a85243584eb336afd488488a6803db78939594dbc0c65de290e9a87d09758f05
kpatch-patch-5_14_0-427_68_2-1-10.el9_4.src.rpm SHA-256: feedcd7713c23ab84c7fb434ef7a2824082b54a5463939350c31ff13d07ce044
kpatch-patch-5_14_0-427_84_1-1-5.el9_4.src.rpm SHA-256: e7b9dbe7f9d21d935ce4e56bad7149b6840c85b02ac9b4ebc3b9e5390e02eb2c
x86_64
kpatch-patch-5_14_0-427_100_1-1-3.el9_4.x86_64.rpm SHA-256: b4756c7c3a83514411de1d9f226545973378dffdafa274f1255b353133e0c86c
kpatch-patch-5_14_0-427_100_1-debuginfo-1-3.el9_4.x86_64.rpm SHA-256: 5cba1f94bd6e7e9714d3a35d0351fd7d2865b39db4427c7e679cf2be89bb8131
kpatch-patch-5_14_0-427_100_1-debugsource-1-3.el9_4.x86_64.rpm SHA-256: eb4cfcaf2a1705e3b4eaef280d8884c514cf38f6c637ca6f5659878839e3aa1b
kpatch-patch-5_14_0-427_113_1-1-1.el9_4.x86_64.rpm SHA-256: c76e0fe9217cae9732f6af2deb3e8a150ff6a870645617485dec732131371f57
kpatch-patch-5_14_0-427_113_1-debuginfo-1-1.el9_4.x86_64.rpm SHA-256: 85e655b264d3a3717fbd1e64b114e5e06858d2b48568c4d06561f68c965b8114
kpatch-patch-5_14_0-427_113_1-debugsource-1-1.el9_4.x86_64.rpm SHA-256: 5f151530c8e51a188b5625ae26638651586cdc9d330ea1308e29d71e321c843d
kpatch-patch-5_14_0-427_55_1-1-13.el9_4.x86_64.rpm SHA-256: ea6941f7facfc4e109c70ed6a1404656e474f0532b5db40653d86d96d478d901
kpatch-patch-5_14_0-427_55_1-debuginfo-1-13.el9_4.x86_64.rpm SHA-256: 3869812cdaadb15e4ac51750e7c3b756574aca1e752351335a9ee6cccaefb572
kpatch-patch-5_14_0-427_55_1-debugsource-1-13.el9_4.x86_64.rpm SHA-256: 4a355f88ff979c08c99e46846e2ee389c8091f0fe740f1a76f00b2b4c94d59d5
kpatch-patch-5_14_0-427_68_2-1-10.el9_4.x86_64.rpm SHA-256: 55a15cd3299eff3ea0e52ab56095332764e39006c0cde2865ce1653dd3713f19
kpatch-patch-5_14_0-427_68_2-debuginfo-1-10.el9_4.x86_64.rpm SHA-256: ecb1a7fb608d64b1863d39a5bbbe16468a31d5c0e0ae248b8e91c752e847d499
kpatch-patch-5_14_0-427_68_2-debugsource-1-10.el9_4.x86_64.rpm SHA-256: 032db50ef8d66ec96b72e2adb4924901925fec3e99815666d8b3699b3d6112c3
kpatch-patch-5_14_0-427_84_1-1-5.el9_4.x86_64.rpm SHA-256: 6112a672dd5a222a08da27c9e56ca47c788dfa160b9f27127dcce7acaf9108b5
kpatch-patch-5_14_0-427_84_1-debuginfo-1-5.el9_4.x86_64.rpm SHA-256: a2813c58f47a6987fdeb8a66da9d646cd6652a38a61136975b8033bcdba4e341
kpatch-patch-5_14_0-427_84_1-debugsource-1-5.el9_4.x86_64.rpm SHA-256: 1180a7e942a1abed2e4a5234a3c1eedf0760d686497c76c03b514315ab9cedae

Red Hat Enterprise Linux for Power, little endian - Extended Update Support 9.4

SRPM
kpatch-patch-5_14_0-427_100_1-1-3.el9_4.src.rpm SHA-256: 04d291fa579a6f30f9ecc71d74393ecea71da1d88e84475acfaa4b45888acad3
kpatch-patch-5_14_0-427_113_1-1-1.el9_4.src.rpm SHA-256: f02c6adddb94b8a2a297e3d20857132184cb7204473473d6a0cdb76db87ceab5
kpatch-patch-5_14_0-427_55_1-1-13.el9_4.src.rpm SHA-256: a85243584eb336afd488488a6803db78939594dbc0c65de290e9a87d09758f05
kpatch-patch-5_14_0-427_68_2-1-10.el9_4.src.rpm SHA-256: feedcd7713c23ab84c7fb434ef7a2824082b54a5463939350c31ff13d07ce044
kpatch-patch-5_14_0-427_84_1-1-5.el9_4.src.rpm SHA-256: e7b9dbe7f9d21d935ce4e56bad7149b6840c85b02ac9b4ebc3b9e5390e02eb2c
ppc64le
kpatch-patch-5_14_0-427_100_1-1-3.el9_4.ppc64le.rpm SHA-256: 9785f842cf16f7459a76cfc88580ef089511658512fb9191f7787743eb641fab
kpatch-patch-5_14_0-427_100_1-debuginfo-1-3.el9_4.ppc64le.rpm SHA-256: 0e5e7c613049049de2067350eb6e55813c86a5b8a0bb9a3f15b7ad15b7db82c0
kpatch-patch-5_14_0-427_100_1-debugsource-1-3.el9_4.ppc64le.rpm SHA-256: a2eeb7ddbad36b256ed03dc31a63f682166fdf213240b38886c8342c54fb7805
kpatch-patch-5_14_0-427_113_1-1-1.el9_4.ppc64le.rpm SHA-256: f155bdd86963b405dd27f9015af74cd25f66362c024c3f29badd9f631d0ca475
kpatch-patch-5_14_0-427_113_1-debuginfo-1-1.el9_4.ppc64le.rpm SHA-256: c259ee2fc3139d9adae38334cd09005d437fa28dde661d9c2323efab7475faf2
kpatch-patch-5_14_0-427_113_1-debugsource-1-1.el9_4.ppc64le.rpm SHA-256: 96982eea5c2206c6785c56a7f0fc22e0bec1d6cd92d157f30873dda14a22d2d5
kpatch-patch-5_14_0-427_55_1-1-13.el9_4.ppc64le.rpm SHA-256: 0842683927b78f6e1ad9984643a4bde3f5323bcadf738d31589dcbc2508e56ad
kpatch-patch-5_14_0-427_55_1-debuginfo-1-13.el9_4.ppc64le.rpm SHA-256: ba02f305f12327dee616730447bb0b1872104378778ef333d5ecbe7a35caf768
kpatch-patch-5_14_0-427_55_1-debugsource-1-13.el9_4.ppc64le.rpm SHA-256: 4b9970365292f14a7a440f8b0f96fa2b065bed01ef7af166f78841333f8ea894
kpatch-patch-5_14_0-427_68_2-1-10.el9_4.ppc64le.rpm SHA-256: f73dd9df2048fccdc410c6daa28876d599b386a5487dfd5ee3f6004f31d53392
kpatch-patch-5_14_0-427_68_2-debuginfo-1-10.el9_4.ppc64le.rpm SHA-256: 7c33e6ccbe5e9b5f999e185127ff7a57d616badd70d203f79dba69348d0656a1
kpatch-patch-5_14_0-427_68_2-debugsource-1-10.el9_4.ppc64le.rpm SHA-256: a71939f498985b83d042a37b88392ad10bc01ccdacf4523684516a265d60744c
kpatch-patch-5_14_0-427_84_1-1-5.el9_4.ppc64le.rpm SHA-256: 7bce8ce660964838ff7f9bd6a1b56d901c3fc47421d3e26b6b97b8c8d8b0cc29
kpatch-patch-5_14_0-427_84_1-debuginfo-1-5.el9_4.ppc64le.rpm SHA-256: d0fd6f632e56e0f7d848b4abe3d46a11fc9a18ed22f65f1ea74a96c00c9d9cc8
kpatch-patch-5_14_0-427_84_1-debugsource-1-5.el9_4.ppc64le.rpm SHA-256: 7ba476558cd8e5aa8d2e2b273fcd2a39111e386470dc907e81b058465c62d1f4

Red Hat Enterprise Linux Server for Power LE - Update Services for SAP Solutions 9.4

SRPM
kpatch-patch-5_14_0-427_100_1-1-3.el9_4.src.rpm SHA-256: 04d291fa579a6f30f9ecc71d74393ecea71da1d88e84475acfaa4b45888acad3
kpatch-patch-5_14_0-427_113_1-1-1.el9_4.src.rpm SHA-256: f02c6adddb94b8a2a297e3d20857132184cb7204473473d6a0cdb76db87ceab5
kpatch-patch-5_14_0-427_55_1-1-13.el9_4.src.rpm SHA-256: a85243584eb336afd488488a6803db78939594dbc0c65de290e9a87d09758f05
kpatch-patch-5_14_0-427_68_2-1-10.el9_4.src.rpm SHA-256: feedcd7713c23ab84c7fb434ef7a2824082b54a5463939350c31ff13d07ce044
kpatch-patch-5_14_0-427_84_1-1-5.el9_4.src.rpm SHA-256: e7b9dbe7f9d21d935ce4e56bad7149b6840c85b02ac9b4ebc3b9e5390e02eb2c
ppc64le
kpatch-patch-5_14_0-427_100_1-1-3.el9_4.ppc64le.rpm SHA-256: 9785f842cf16f7459a76cfc88580ef089511658512fb9191f7787743eb641fab
kpatch-patch-5_14_0-427_100_1-debuginfo-1-3.el9_4.ppc64le.rpm SHA-256: 0e5e7c613049049de2067350eb6e55813c86a5b8a0bb9a3f15b7ad15b7db82c0
kpatch-patch-5_14_0-427_100_1-debugsource-1-3.el9_4.ppc64le.rpm SHA-256: a2eeb7ddbad36b256ed03dc31a63f682166fdf213240b38886c8342c54fb7805
kpatch-patch-5_14_0-427_113_1-1-1.el9_4.ppc64le.rpm SHA-256: f155bdd86963b405dd27f9015af74cd25f66362c024c3f29badd9f631d0ca475
kpatch-patch-5_14_0-427_113_1-debuginfo-1-1.el9_4.ppc64le.rpm SHA-256: c259ee2fc3139d9adae38334cd09005d437fa28dde661d9c2323efab7475faf2
kpatch-patch-5_14_0-427_113_1-debugsource-1-1.el9_4.ppc64le.rpm SHA-256: 96982eea5c2206c6785c56a7f0fc22e0bec1d6cd92d157f30873dda14a22d2d5
kpatch-patch-5_14_0-427_55_1-1-13.el9_4.ppc64le.rpm SHA-256: 0842683927b78f6e1ad9984643a4bde3f5323bcadf738d31589dcbc2508e56ad
kpatch-patch-5_14_0-427_55_1-debuginfo-1-13.el9_4.ppc64le.rpm SHA-256: ba02f305f12327dee616730447bb0b1872104378778ef333d5ecbe7a35caf768
kpatch-patch-5_14_0-427_55_1-debugsource-1-13.el9_4.ppc64le.rpm SHA-256: 4b9970365292f14a7a440f8b0f96fa2b065bed01ef7af166f78841333f8ea894
kpatch-patch-5_14_0-427_68_2-1-10.el9_4.ppc64le.rpm SHA-256: f73dd9df2048fccdc410c6daa28876d599b386a5487dfd5ee3f6004f31d53392
kpatch-patch-5_14_0-427_68_2-debuginfo-1-10.el9_4.ppc64le.rpm SHA-256: 7c33e6ccbe5e9b5f999e185127ff7a57d616badd70d203f79dba69348d0656a1
kpatch-patch-5_14_0-427_68_2-debugsource-1-10.el9_4.ppc64le.rpm SHA-256: a71939f498985b83d042a37b88392ad10bc01ccdacf4523684516a265d60744c
kpatch-patch-5_14_0-427_84_1-1-5.el9_4.ppc64le.rpm SHA-256: 7bce8ce660964838ff7f9bd6a1b56d901c3fc47421d3e26b6b97b8c8d8b0cc29
kpatch-patch-5_14_0-427_84_1-debuginfo-1-5.el9_4.ppc64le.rpm SHA-256: d0fd6f632e56e0f7d848b4abe3d46a11fc9a18ed22f65f1ea74a96c00c9d9cc8
kpatch-patch-5_14_0-427_84_1-debugsource-1-5.el9_4.ppc64le.rpm SHA-256: 7ba476558cd8e5aa8d2e2b273fcd2a39111e386470dc907e81b058465c62d1f4

Red Hat Enterprise Linux for x86_64 - Update Services for SAP Solutions 9.4

SRPM
kpatch-patch-5_14_0-427_100_1-1-3.el9_4.src.rpm SHA-256: 04d291fa579a6f30f9ecc71d74393ecea71da1d88e84475acfaa4b45888acad3
kpatch-patch-5_14_0-427_113_1-1-1.el9_4.src.rpm SHA-256: f02c6adddb94b8a2a297e3d20857132184cb7204473473d6a0cdb76db87ceab5
kpatch-patch-5_14_0-427_55_1-1-13.el9_4.src.rpm SHA-256: a85243584eb336afd488488a6803db78939594dbc0c65de290e9a87d09758f05
kpatch-patch-5_14_0-427_68_2-1-10.el9_4.src.rpm SHA-256: feedcd7713c23ab84c7fb434ef7a2824082b54a5463939350c31ff13d07ce044
kpatch-patch-5_14_0-427_84_1-1-5.el9_4.src.rpm SHA-256: e7b9dbe7f9d21d935ce4e56bad7149b6840c85b02ac9b4ebc3b9e5390e02eb2c
x86_64
kpatch-patch-5_14_0-427_100_1-1-3.el9_4.x86_64.rpm SHA-256: b4756c7c3a83514411de1d9f226545973378dffdafa274f1255b353133e0c86c
kpatch-patch-5_14_0-427_100_1-debuginfo-1-3.el9_4.x86_64.rpm SHA-256: 5cba1f94bd6e7e9714d3a35d0351fd7d2865b39db4427c7e679cf2be89bb8131
kpatch-patch-5_14_0-427_100_1-debugsource-1-3.el9_4.x86_64.rpm SHA-256: eb4cfcaf2a1705e3b4eaef280d8884c514cf38f6c637ca6f5659878839e3aa1b
kpatch-patch-5_14_0-427_113_1-1-1.el9_4.x86_64.rpm SHA-256: c76e0fe9217cae9732f6af2deb3e8a150ff6a870645617485dec732131371f57
kpatch-patch-5_14_0-427_113_1-debuginfo-1-1.el9_4.x86_64.rpm SHA-256: 85e655b264d3a3717fbd1e64b114e5e06858d2b48568c4d06561f68c965b8114
kpatch-patch-5_14_0-427_113_1-debugsource-1-1.el9_4.x86_64.rpm SHA-256: 5f151530c8e51a188b5625ae26638651586cdc9d330ea1308e29d71e321c843d
kpatch-patch-5_14_0-427_55_1-1-13.el9_4.x86_64.rpm SHA-256: ea6941f7facfc4e109c70ed6a1404656e474f0532b5db40653d86d96d478d901
kpatch-patch-5_14_0-427_55_1-debuginfo-1-13.el9_4.x86_64.rpm SHA-256: 3869812cdaadb15e4ac51750e7c3b756574aca1e752351335a9ee6cccaefb572
kpatch-patch-5_14_0-427_55_1-debugsource-1-13.el9_4.x86_64.rpm SHA-256: 4a355f88ff979c08c99e46846e2ee389c8091f0fe740f1a76f00b2b4c94d59d5
kpatch-patch-5_14_0-427_68_2-1-10.el9_4.x86_64.rpm SHA-256: 55a15cd3299eff3ea0e52ab56095332764e39006c0cde2865ce1653dd3713f19
kpatch-patch-5_14_0-427_68_2-debuginfo-1-10.el9_4.x86_64.rpm SHA-256: ecb1a7fb608d64b1863d39a5bbbe16468a31d5c0e0ae248b8e91c752e847d499
kpatch-patch-5_14_0-427_68_2-debugsource-1-10.el9_4.x86_64.rpm SHA-256: 032db50ef8d66ec96b72e2adb4924901925fec3e99815666d8b3699b3d6112c3
kpatch-patch-5_14_0-427_84_1-1-5.el9_4.x86_64.rpm SHA-256: 6112a672dd5a222a08da27c9e56ca47c788dfa160b9f27127dcce7acaf9108b5
kpatch-patch-5_14_0-427_84_1-debuginfo-1-5.el9_4.x86_64.rpm SHA-256: a2813c58f47a6987fdeb8a66da9d646cd6652a38a61136975b8033bcdba4e341
kpatch-patch-5_14_0-427_84_1-debugsource-1-5.el9_4.x86_64.rpm SHA-256: 1180a7e942a1abed2e4a5234a3c1eedf0760d686497c76c03b514315ab9cedae

Red Hat Enterprise Linux for x86_64 - Extended Life Cycle 9.4

SRPM
kpatch-patch-5_14_0-427_100_1-1-3.el9_4.src.rpm SHA-256: 04d291fa579a6f30f9ecc71d74393ecea71da1d88e84475acfaa4b45888acad3
kpatch-patch-5_14_0-427_113_1-1-1.el9_4.src.rpm SHA-256: f02c6adddb94b8a2a297e3d20857132184cb7204473473d6a0cdb76db87ceab5
kpatch-patch-5_14_0-427_55_1-1-13.el9_4.src.rpm SHA-256: a85243584eb336afd488488a6803db78939594dbc0c65de290e9a87d09758f05
kpatch-patch-5_14_0-427_68_2-1-10.el9_4.src.rpm SHA-256: feedcd7713c23ab84c7fb434ef7a2824082b54a5463939350c31ff13d07ce044
kpatch-patch-5_14_0-427_84_1-1-5.el9_4.src.rpm SHA-256: e7b9dbe7f9d21d935ce4e56bad7149b6840c85b02ac9b4ebc3b9e5390e02eb2c
x86_64
kpatch-patch-5_14_0-427_100_1-1-3.el9_4.x86_64.rpm SHA-256: b4756c7c3a83514411de1d9f226545973378dffdafa274f1255b353133e0c86c
kpatch-patch-5_14_0-427_100_1-debuginfo-1-3.el9_4.x86_64.rpm SHA-256: 5cba1f94bd6e7e9714d3a35d0351fd7d2865b39db4427c7e679cf2be89bb8131
kpatch-patch-5_14_0-427_100_1-debugsource-1-3.el9_4.x86_64.rpm SHA-256: eb4cfcaf2a1705e3b4eaef280d8884c514cf38f6c637ca6f5659878839e3aa1b
kpatch-patch-5_14_0-427_113_1-1-1.el9_4.x86_64.rpm SHA-256: c76e0fe9217cae9732f6af2deb3e8a150ff6a870645617485dec732131371f57
kpatch-patch-5_14_0-427_113_1-debuginfo-1-1.el9_4.x86_64.rpm SHA-256: 85e655b264d3a3717fbd1e64b114e5e06858d2b48568c4d06561f68c965b8114
kpatch-patch-5_14_0-427_113_1-debugsource-1-1.el9_4.x86_64.rpm SHA-256: 5f151530c8e51a188b5625ae26638651586cdc9d330ea1308e29d71e321c843d
kpatch-patch-5_14_0-427_55_1-1-13.el9_4.x86_64.rpm SHA-256: ea6941f7facfc4e109c70ed6a1404656e474f0532b5db40653d86d96d478d901
kpatch-patch-5_14_0-427_55_1-debuginfo-1-13.el9_4.x86_64.rpm SHA-256: 3869812cdaadb15e4ac51750e7c3b756574aca1e752351335a9ee6cccaefb572
kpatch-patch-5_14_0-427_55_1-debugsource-1-13.el9_4.x86_64.rpm SHA-256: 4a355f88ff979c08c99e46846e2ee389c8091f0fe740f1a76f00b2b4c94d59d5
kpatch-patch-5_14_0-427_68_2-1-10.el9_4.x86_64.rpm SHA-256: 55a15cd3299eff3ea0e52ab56095332764e39006c0cde2865ce1653dd3713f19
kpatch-patch-5_14_0-427_68_2-debuginfo-1-10.el9_4.x86_64.rpm SHA-256: ecb1a7fb608d64b1863d39a5bbbe16468a31d5c0e0ae248b8e91c752e847d499
kpatch-patch-5_14_0-427_68_2-debugsource-1-10.el9_4.x86_64.rpm SHA-256: 032db50ef8d66ec96b72e2adb4924901925fec3e99815666d8b3699b3d6112c3
kpatch-patch-5_14_0-427_84_1-1-5.el9_4.x86_64.rpm SHA-256: 6112a672dd5a222a08da27c9e56ca47c788dfa160b9f27127dcce7acaf9108b5
kpatch-patch-5_14_0-427_84_1-debuginfo-1-5.el9_4.x86_64.rpm SHA-256: a2813c58f47a6987fdeb8a66da9d646cd6652a38a61136975b8033bcdba4e341
kpatch-patch-5_14_0-427_84_1-debugsource-1-5.el9_4.x86_64.rpm SHA-256: 1180a7e942a1abed2e4a5234a3c1eedf0760d686497c76c03b514315ab9cedae

Red Hat Enterprise Linux for Power, little endian - Extended Life Cycle 9.4

SRPM
kpatch-patch-5_14_0-427_100_1-1-3.el9_4.src.rpm SHA-256: 04d291fa579a6f30f9ecc71d74393ecea71da1d88e84475acfaa4b45888acad3
kpatch-patch-5_14_0-427_113_1-1-1.el9_4.src.rpm SHA-256: f02c6adddb94b8a2a297e3d20857132184cb7204473473d6a0cdb76db87ceab5
kpatch-patch-5_14_0-427_55_1-1-13.el9_4.src.rpm SHA-256: a85243584eb336afd488488a6803db78939594dbc0c65de290e9a87d09758f05
kpatch-patch-5_14_0-427_68_2-1-10.el9_4.src.rpm SHA-256: feedcd7713c23ab84c7fb434ef7a2824082b54a5463939350c31ff13d07ce044
kpatch-patch-5_14_0-427_84_1-1-5.el9_4.src.rpm SHA-256: e7b9dbe7f9d21d935ce4e56bad7149b6840c85b02ac9b4ebc3b9e5390e02eb2c
ppc64le
kpatch-patch-5_14_0-427_100_1-1-3.el9_4.ppc64le.rpm SHA-256: 9785f842cf16f7459a76cfc88580ef089511658512fb9191f7787743eb641fab
kpatch-patch-5_14_0-427_100_1-debuginfo-1-3.el9_4.ppc64le.rpm SHA-256: 0e5e7c613049049de2067350eb6e55813c86a5b8a0bb9a3f15b7ad15b7db82c0
kpatch-patch-5_14_0-427_100_1-debugsource-1-3.el9_4.ppc64le.rpm SHA-256: a2eeb7ddbad36b256ed03dc31a63f682166fdf213240b38886c8342c54fb7805
kpatch-patch-5_14_0-427_113_1-1-1.el9_4.ppc64le.rpm SHA-256: f155bdd86963b405dd27f9015af74cd25f66362c024c3f29badd9f631d0ca475
kpatch-patch-5_14_0-427_113_1-debuginfo-1-1.el9_4.ppc64le.rpm SHA-256: c259ee2fc3139d9adae38334cd09005d437fa28dde661d9c2323efab7475faf2
kpatch-patch-5_14_0-427_113_1-debugsource-1-1.el9_4.ppc64le.rpm SHA-256: 96982eea5c2206c6785c56a7f0fc22e0bec1d6cd92d157f30873dda14a22d2d5
kpatch-patch-5_14_0-427_55_1-1-13.el9_4.ppc64le.rpm SHA-256: 0842683927b78f6e1ad9984643a4bde3f5323bcadf738d31589dcbc2508e56ad
kpatch-patch-5_14_0-427_55_1-debuginfo-1-13.el9_4.ppc64le.rpm SHA-256: ba02f305f12327dee616730447bb0b1872104378778ef333d5ecbe7a35caf768
kpatch-patch-5_14_0-427_55_1-debugsource-1-13.el9_4.ppc64le.rpm SHA-256: 4b9970365292f14a7a440f8b0f96fa2b065bed01ef7af166f78841333f8ea894
kpatch-patch-5_14_0-427_68_2-1-10.el9_4.ppc64le.rpm SHA-256: f73dd9df2048fccdc410c6daa28876d599b386a5487dfd5ee3f6004f31d53392
kpatch-patch-5_14_0-427_68_2-debuginfo-1-10.el9_4.ppc64le.rpm SHA-256: 7c33e6ccbe5e9b5f999e185127ff7a57d616badd70d203f79dba69348d0656a1
kpatch-patch-5_14_0-427_68_2-debugsource-1-10.el9_4.ppc64le.rpm SHA-256: a71939f498985b83d042a37b88392ad10bc01ccdacf4523684516a265d60744c
kpatch-patch-5_14_0-427_84_1-1-5.el9_4.ppc64le.rpm SHA-256: 7bce8ce660964838ff7f9bd6a1b56d901c3fc47421d3e26b6b97b8c8d8b0cc29
kpatch-patch-5_14_0-427_84_1-debuginfo-1-5.el9_4.ppc64le.rpm SHA-256: d0fd6f632e56e0f7d848b4abe3d46a11fc9a18ed22f65f1ea74a96c00c9d9cc8
kpatch-patch-5_14_0-427_84_1-debugsource-1-5.el9_4.ppc64le.rpm SHA-256: 7ba476558cd8e5aa8d2e2b273fcd2a39111e386470dc907e81b058465c62d1f4

The Red Hat security contact is secalert@redhat.com. More contact details at https://access.redhat.com/security/team/contact/.

Red Hat LinkedIn YouTube Facebook X, formerly Twitter

Quick Links

  • Downloads
  • Subscriptions
  • Support Cases
  • Customer Service
  • Product Documentation

Help

  • Contact Us
  • Customer Portal FAQ
  • Log-in Assistance

Site Info

  • Trust Red Hat
  • Browser Support Policy
  • Accessibility
  • Awards and Recognition
  • Colophon

Related Sites

  • redhat.com
  • developers.redhat.com
  • connect.redhat.com
  • cloud.redhat.com

Red Hat legal and privacy links

  • About Red Hat
  • Jobs
  • Events
  • Locations
  • Contact Red Hat
  • Red Hat Blog
  • Inclusion at Red Hat
  • Cool Stuff Store
  • Red Hat Summit
© 2026 Red Hat

Red Hat legal and privacy links

  • Privacy statement
  • Terms of use
  • All policies and guidelines
  • Digital accessibility