Skip to navigation Skip to main content

Utilities

  • Subscriptions
  • Downloads
  • Red Hat Console
  • Get Support
Red Hat Customer Portal
  • Subscriptions
  • Downloads
  • Red Hat Console
  • Get Support
  • Products

    Top Products

    • Red Hat Enterprise Linux
    • Red Hat OpenShift
    • Red Hat Ansible Automation Platform
    All Products

    Downloads and Containers

    • Downloads
    • Packages
    • Containers

    Top Resources

    • Documentation
    • Product Life Cycles
    • Product Compliance
    • Errata
  • Knowledge

    Red Hat Knowledge Center

    • Knowledgebase Solutions
    • Knowledgebase Articles
    • Customer Portal Labs
    • Errata

    Top Product Docs

    • Red Hat Enterprise Linux
    • Red Hat OpenShift
    • Red Hat Ansible Automation Platform
    All Product Docs

    Training and Certification

    • About
    • Course Index
    • Certification Index
    • Skill Assessment
  • Security

    Red Hat Product Security Center

    • Security Updates
    • Security Advisories
    • Red Hat CVE Database
    • Errata

    References

    • Security Bulletins
    • Severity Ratings
    • Security Data

    Top Resources

    • Security Labs
    • Backporting Policies
    • Security Blog
  • Support

    Red Hat Support

    • Support Cases
    • Troubleshoot
    • Get Support
    • Contact Red Hat Support

    Red Hat Community Support

    • Customer Portal Community
    • Community Discussions
    • Red Hat Accelerator Program

    Top Resources

    • Product Life Cycles
    • Customer Portal Labs
    • Red Hat JBoss Supported Configurations
    • Red Hat Lightspeed
Or troubleshoot an issue.

Select Your Language

  • English
  • Français
  • 한국어
  • 日本語
  • 中文 (中国)

Infrastructure and Management

  • Red Hat Enterprise Linux
  • Red Hat Satellite
  • Red Hat Subscription Management
  • Red Hat Lightspeed
  • Red Hat Ansible Automation Platform

Cloud Computing

  • Red Hat OpenShift
  • Red Hat OpenStack Platform
  • Red Hat OpenShift
  • Red Hat OpenShift AI
  • Red Hat OpenShift Dedicated
  • Red Hat Advanced Cluster Security for Kubernetes
  • Red Hat Advanced Cluster Management for Kubernetes
  • Red Hat Quay
  • Red Hat OpenShift Dev Spaces
  • Red Hat OpenShift Service on AWS

Storage

  • Red Hat Gluster Storage
  • Red Hat Hyperconverged Infrastructure
  • Red Hat Ceph Storage
  • Red Hat OpenShift Data Foundation

Runtimes

  • Red Hat Runtimes
  • Red Hat JBoss Enterprise Application Platform
  • Red Hat Data Grid
  • Red Hat JBoss Web Server
  • Red Hat build of Keycloak
  • Red Hat support for Spring Boot
  • Red Hat build of Node.js
  • Red Hat build of Quarkus

Integration and Automation

  • Red Hat Application Foundations
  • Red Hat Fuse
  • Red Hat AMQ
  • Red Hat 3scale API Management
All Products
Red Hat Product Errata RHSA-2026:16111 - Security Advisory
Issued:
2026-05-11
Updated:
2026-05-11

RHSA-2026:16111 - Security Advisory

  • Overview
  • Updated Packages

Synopsis

Important: kpatch-patch-4_18_0-372_137_1, kpatch-patch-4_18_0-372_145_1, kpatch-patch-4_18_0-372_158_1, kpatch-patch-4_18_0-372_170_1, and kpatch-patch-4_18_0-372_181_1 security update

Type/Severity

Security Advisory: Important

Red Hat Lightspeed patch analysis

Identify and remediate systems affected by this advisory.

View affected systems

Topic

An update for multiple packages is now available for Red Hat Enterprise Linux 8.6 Update Services for SAP Solutions.

Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.

Description

This is a kernel live patch module which can be loaded by the kpatch command line utility to modify the code of a running kernel. This patch module is targeted for kernel-4.18.0-372.137.1.el8_6.

Security Fix(es):

  • kernel: crypto: algif_aead - Revert to operating out-of-place (CVE-2026-31431)

For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.

Solution

For details on how to apply this update, which includes the changes described in this advisory, refer to:

https://access.redhat.com/articles/11258

The system must be rebooted for this update to take effect.

Affected Products

  • Red Hat Enterprise Linux for x86_64 - Extended Update Support Extension 8.6 x86_64
  • Red Hat Enterprise Linux Server for Power LE - Update Services for SAP Solutions 8.6 ppc64le
  • Red Hat Enterprise Linux for x86_64 - Update Services for SAP Solutions 8.6 x86_64

Fixes

  • BZ - 2460538 - CVE-2026-31431 kernel: crypto: algif_aead - Revert to operating out-of-place

CVEs

  • CVE-2026-31431

References

  • https://access.redhat.com/security/updates/classification/#important
Note: More recent versions of these packages may be available. Click a package name for more details.

Red Hat Enterprise Linux for x86_64 - Extended Update Support Extension 8.6

SRPM
kpatch-patch-4_18_0-372_137_1-1-10.el8_6.src.rpm SHA-256: dcc6b6a32912a5c539a856ae0430db9283ce33163547645c6ab2b1a5a6b77b8a
kpatch-patch-4_18_0-372_145_1-1-8.el8_6.src.rpm SHA-256: 356f5767bfc2c1356dee26803302c96f09d6497d4a2c41670eaa6b73a3b78c18
kpatch-patch-4_18_0-372_158_1-1-4.el8_6.src.rpm SHA-256: e4603c4637b2f21b6871c116bc7661103bc34042da54a85de60cc8a8f1ab9bc9
kpatch-patch-4_18_0-372_170_1-1-3.el8_6.src.rpm SHA-256: bc549e6f618704d6bb9fa588fbb0bee2d7e1152452b3abeb3f2d36f2d18367c5
kpatch-patch-4_18_0-372_181_1-1-1.el8_6.src.rpm SHA-256: f36f1b7a4c9c93020b2fec98b0b748f2b14047ada00074567e46d07c7d5591fe
x86_64
kpatch-patch-4_18_0-372_137_1-1-10.el8_6.x86_64.rpm SHA-256: 28ef653c987f20301b2cd16dd857c07902a89a44fdedd3d2b26a44f0c91deb1b
kpatch-patch-4_18_0-372_137_1-debuginfo-1-10.el8_6.x86_64.rpm SHA-256: 5226d74ecd237ab7ed6a0381faef873dc4a587a8e09d9f50e08b85f5b3d23118
kpatch-patch-4_18_0-372_137_1-debugsource-1-10.el8_6.x86_64.rpm SHA-256: 0725b6e749d559917c72823973d96a1e819a516551e62ca6949001efcd7092d0
kpatch-patch-4_18_0-372_145_1-1-8.el8_6.x86_64.rpm SHA-256: 5e45bf4931726f51056c0bf77f704f0860287af217a5d05483875c403ae35364
kpatch-patch-4_18_0-372_145_1-debuginfo-1-8.el8_6.x86_64.rpm SHA-256: 6cb2e6872144ffc3e3f0071cfb146aa1f978b61add00b265e596d0f600f7d177
kpatch-patch-4_18_0-372_145_1-debugsource-1-8.el8_6.x86_64.rpm SHA-256: e9d2933ea477666df622ca6ab1e3f169c7618f5cad03e94be17c2b25a38a00e0
kpatch-patch-4_18_0-372_158_1-1-4.el8_6.x86_64.rpm SHA-256: d10aaa7829593a20bec311ea04cec9c8f01372ee55499762254127e69fd996a4
kpatch-patch-4_18_0-372_158_1-debuginfo-1-4.el8_6.x86_64.rpm SHA-256: 4f64f49f3ed752e44760f2e97ff6e19b358a7b09adeef18bc557e891bc3c5efb
kpatch-patch-4_18_0-372_158_1-debugsource-1-4.el8_6.x86_64.rpm SHA-256: 73111d12e9598aaeca7ec39c9a51bf8c219de7258cc98a6f771062b32abb9ec3
kpatch-patch-4_18_0-372_170_1-1-3.el8_6.x86_64.rpm SHA-256: 4d0cbbe1321d7febe432120fbcb847b04b68ed4309e26c66c840c72e4cb44b09
kpatch-patch-4_18_0-372_170_1-debuginfo-1-3.el8_6.x86_64.rpm SHA-256: 5f4f9cef555283e6aaed14e0a9d2207c0840babac601f55029df5a981969bed2
kpatch-patch-4_18_0-372_170_1-debugsource-1-3.el8_6.x86_64.rpm SHA-256: 7fccfcbf0d0a82ec15b6b8fef87fad0821783506a1c148fccb1ce91644046a4b
kpatch-patch-4_18_0-372_181_1-1-1.el8_6.x86_64.rpm SHA-256: d42b0545ea6f4d3e776ded2adb6339c7d19758a268d9a6535162d496a9485a16
kpatch-patch-4_18_0-372_181_1-debuginfo-1-1.el8_6.x86_64.rpm SHA-256: ac02d54c27155c1ec1c90752078bd88f9c54cd95db001a4c6c119b69f1d26599
kpatch-patch-4_18_0-372_181_1-debugsource-1-1.el8_6.x86_64.rpm SHA-256: 18c89ab968ac47bbd52f16e67c0379bcd0cd23a4ccfb7bad4224be43e27cec10

Red Hat Enterprise Linux Server for Power LE - Update Services for SAP Solutions 8.6

SRPM
kpatch-patch-4_18_0-372_137_1-1-10.el8_6.src.rpm SHA-256: dcc6b6a32912a5c539a856ae0430db9283ce33163547645c6ab2b1a5a6b77b8a
kpatch-patch-4_18_0-372_145_1-1-8.el8_6.src.rpm SHA-256: 356f5767bfc2c1356dee26803302c96f09d6497d4a2c41670eaa6b73a3b78c18
kpatch-patch-4_18_0-372_158_1-1-4.el8_6.src.rpm SHA-256: e4603c4637b2f21b6871c116bc7661103bc34042da54a85de60cc8a8f1ab9bc9
kpatch-patch-4_18_0-372_170_1-1-3.el8_6.src.rpm SHA-256: bc549e6f618704d6bb9fa588fbb0bee2d7e1152452b3abeb3f2d36f2d18367c5
kpatch-patch-4_18_0-372_181_1-1-1.el8_6.src.rpm SHA-256: f36f1b7a4c9c93020b2fec98b0b748f2b14047ada00074567e46d07c7d5591fe
ppc64le
kpatch-patch-4_18_0-372_137_1-1-10.el8_6.ppc64le.rpm SHA-256: 05549facbd784df0257fd9cfbbc42746deb2746d8cbabdff9e5546bd75acd320
kpatch-patch-4_18_0-372_137_1-debuginfo-1-10.el8_6.ppc64le.rpm SHA-256: 55c602205070564cb08478f1331e33362031801a716e3807d4f392c571a7e182
kpatch-patch-4_18_0-372_137_1-debugsource-1-10.el8_6.ppc64le.rpm SHA-256: 6a76e4701c644550377daf85fe39166ec63419e62423e389ba235574e86cdf92
kpatch-patch-4_18_0-372_145_1-1-8.el8_6.ppc64le.rpm SHA-256: 5e2f4c4fca89ea8bc394a60dda9a95a46c2919b77c21c94adf94937224f11328
kpatch-patch-4_18_0-372_145_1-debuginfo-1-8.el8_6.ppc64le.rpm SHA-256: fb9ea1e22702c83c10960755477fa39487cef646c2a5a65e527b89cb37e67dfa
kpatch-patch-4_18_0-372_145_1-debugsource-1-8.el8_6.ppc64le.rpm SHA-256: 9b6947f87a9ae60330242c313187879003880ce8c72bd9b49a71b45e4c918d4c
kpatch-patch-4_18_0-372_158_1-1-4.el8_6.ppc64le.rpm SHA-256: 94d96ec891940c15036273f40b856072aa7b7249f0034150bece3c49cbb086b2
kpatch-patch-4_18_0-372_158_1-debuginfo-1-4.el8_6.ppc64le.rpm SHA-256: ea2453a29afae504039538ed67d82770893a1eb86e79a81610b8b07026b59b94
kpatch-patch-4_18_0-372_158_1-debugsource-1-4.el8_6.ppc64le.rpm SHA-256: 3070c304004d315a8bd259c19faee04a465a5c74e58fe212a892c3aa1ca0961c
kpatch-patch-4_18_0-372_170_1-1-3.el8_6.ppc64le.rpm SHA-256: 57356918a7338d2e1f2330586ddac1352f44b216ca90e4449b454d94c2f0e5e6
kpatch-patch-4_18_0-372_170_1-debuginfo-1-3.el8_6.ppc64le.rpm SHA-256: d5337e07afbbf9636fc3cbcde80e3041077704718b103968258dc59b5236673b
kpatch-patch-4_18_0-372_170_1-debugsource-1-3.el8_6.ppc64le.rpm SHA-256: 5496319288964025c425ba5af6b05d656e0441609038448c526c5124f1c12676
kpatch-patch-4_18_0-372_181_1-1-1.el8_6.ppc64le.rpm SHA-256: 3e6e9b0c264f49d359d273bf9aa92726e70b87e2b0417eb2987b7a123384a30b
kpatch-patch-4_18_0-372_181_1-debuginfo-1-1.el8_6.ppc64le.rpm SHA-256: bb2672b2c9a43fbfe6240c5cddc469929a6ed2b83282b8af3f33b470db0eafc4
kpatch-patch-4_18_0-372_181_1-debugsource-1-1.el8_6.ppc64le.rpm SHA-256: 7f8098a5f042c9ac7f00d1513cf360b9525896476fdcbceca10320bcce729a6f

Red Hat Enterprise Linux for x86_64 - Update Services for SAP Solutions 8.6

SRPM
kpatch-patch-4_18_0-372_137_1-1-10.el8_6.src.rpm SHA-256: dcc6b6a32912a5c539a856ae0430db9283ce33163547645c6ab2b1a5a6b77b8a
kpatch-patch-4_18_0-372_145_1-1-8.el8_6.src.rpm SHA-256: 356f5767bfc2c1356dee26803302c96f09d6497d4a2c41670eaa6b73a3b78c18
kpatch-patch-4_18_0-372_158_1-1-4.el8_6.src.rpm SHA-256: e4603c4637b2f21b6871c116bc7661103bc34042da54a85de60cc8a8f1ab9bc9
kpatch-patch-4_18_0-372_170_1-1-3.el8_6.src.rpm SHA-256: bc549e6f618704d6bb9fa588fbb0bee2d7e1152452b3abeb3f2d36f2d18367c5
kpatch-patch-4_18_0-372_181_1-1-1.el8_6.src.rpm SHA-256: f36f1b7a4c9c93020b2fec98b0b748f2b14047ada00074567e46d07c7d5591fe
x86_64
kpatch-patch-4_18_0-372_137_1-1-10.el8_6.x86_64.rpm SHA-256: 28ef653c987f20301b2cd16dd857c07902a89a44fdedd3d2b26a44f0c91deb1b
kpatch-patch-4_18_0-372_137_1-debuginfo-1-10.el8_6.x86_64.rpm SHA-256: 5226d74ecd237ab7ed6a0381faef873dc4a587a8e09d9f50e08b85f5b3d23118
kpatch-patch-4_18_0-372_137_1-debugsource-1-10.el8_6.x86_64.rpm SHA-256: 0725b6e749d559917c72823973d96a1e819a516551e62ca6949001efcd7092d0
kpatch-patch-4_18_0-372_145_1-1-8.el8_6.x86_64.rpm SHA-256: 5e45bf4931726f51056c0bf77f704f0860287af217a5d05483875c403ae35364
kpatch-patch-4_18_0-372_145_1-debuginfo-1-8.el8_6.x86_64.rpm SHA-256: 6cb2e6872144ffc3e3f0071cfb146aa1f978b61add00b265e596d0f600f7d177
kpatch-patch-4_18_0-372_145_1-debugsource-1-8.el8_6.x86_64.rpm SHA-256: e9d2933ea477666df622ca6ab1e3f169c7618f5cad03e94be17c2b25a38a00e0
kpatch-patch-4_18_0-372_158_1-1-4.el8_6.x86_64.rpm SHA-256: d10aaa7829593a20bec311ea04cec9c8f01372ee55499762254127e69fd996a4
kpatch-patch-4_18_0-372_158_1-debuginfo-1-4.el8_6.x86_64.rpm SHA-256: 4f64f49f3ed752e44760f2e97ff6e19b358a7b09adeef18bc557e891bc3c5efb
kpatch-patch-4_18_0-372_158_1-debugsource-1-4.el8_6.x86_64.rpm SHA-256: 73111d12e9598aaeca7ec39c9a51bf8c219de7258cc98a6f771062b32abb9ec3
kpatch-patch-4_18_0-372_170_1-1-3.el8_6.x86_64.rpm SHA-256: 4d0cbbe1321d7febe432120fbcb847b04b68ed4309e26c66c840c72e4cb44b09
kpatch-patch-4_18_0-372_170_1-debuginfo-1-3.el8_6.x86_64.rpm SHA-256: 5f4f9cef555283e6aaed14e0a9d2207c0840babac601f55029df5a981969bed2
kpatch-patch-4_18_0-372_170_1-debugsource-1-3.el8_6.x86_64.rpm SHA-256: 7fccfcbf0d0a82ec15b6b8fef87fad0821783506a1c148fccb1ce91644046a4b
kpatch-patch-4_18_0-372_181_1-1-1.el8_6.x86_64.rpm SHA-256: d42b0545ea6f4d3e776ded2adb6339c7d19758a268d9a6535162d496a9485a16
kpatch-patch-4_18_0-372_181_1-debuginfo-1-1.el8_6.x86_64.rpm SHA-256: ac02d54c27155c1ec1c90752078bd88f9c54cd95db001a4c6c119b69f1d26599
kpatch-patch-4_18_0-372_181_1-debugsource-1-1.el8_6.x86_64.rpm SHA-256: 18c89ab968ac47bbd52f16e67c0379bcd0cd23a4ccfb7bad4224be43e27cec10

The Red Hat security contact is secalert@redhat.com. More contact details at https://access.redhat.com/security/team/contact/.

Red Hat LinkedIn YouTube Facebook X, formerly Twitter

Quick Links

  • Downloads
  • Subscriptions
  • Support Cases
  • Customer Service
  • Product Documentation

Help

  • Contact Us
  • Customer Portal FAQ
  • Log-in Assistance

Site Info

  • Trust Red Hat
  • Browser Support Policy
  • Accessibility
  • Awards and Recognition
  • Colophon

Related Sites

  • redhat.com
  • developers.redhat.com
  • connect.redhat.com
  • cloud.redhat.com

Red Hat legal and privacy links

  • About Red Hat
  • Jobs
  • Events
  • Locations
  • Contact Red Hat
  • Red Hat Blog
  • Inclusion at Red Hat
  • Cool Stuff Store
  • Red Hat Summit
© 2026 Red Hat

Red Hat legal and privacy links

  • Privacy statement
  • Terms of use
  • All policies and guidelines
  • Digital accessibility