Skip to navigation Skip to main content

Utilities

  • Subscriptions
  • Downloads
  • Red Hat Console
  • Get Support
Red Hat Customer Portal
  • Subscriptions
  • Downloads
  • Red Hat Console
  • Get Support
  • Products

    Top Products

    • Red Hat Enterprise Linux
    • Red Hat OpenShift
    • Red Hat Ansible Automation Platform
    All Products

    Downloads and Containers

    • Downloads
    • Packages
    • Containers

    Top Resources

    • Documentation
    • Product Life Cycles
    • Product Compliance
    • Errata
  • Knowledge

    Red Hat Knowledge Center

    • Knowledgebase Solutions
    • Knowledgebase Articles
    • Customer Portal Labs
    • Errata

    Top Product Docs

    • Red Hat Enterprise Linux
    • Red Hat OpenShift
    • Red Hat Ansible Automation Platform
    All Product Docs

    Training and Certification

    • About
    • Course Index
    • Certification Index
    • Skill Assessment
  • Security

    Red Hat Product Security Center

    • Security Updates
    • Security Advisories
    • Red Hat CVE Database
    • Errata

    References

    • Security Bulletins
    • Severity Ratings
    • Security Data

    Top Resources

    • Security Labs
    • Backporting Policies
    • Security Blog
  • Support

    Red Hat Support

    • Support Cases
    • Troubleshoot
    • Get Support
    • Contact Red Hat Support

    Red Hat Community Support

    • Customer Portal Community
    • Community Discussions
    • Red Hat Accelerator Program

    Top Resources

    • Product Life Cycles
    • Customer Portal Labs
    • Red Hat JBoss Supported Configurations
    • Red Hat Lightspeed
Or troubleshoot an issue.

Select Your Language

  • English
  • Français
  • 한국어
  • 日本語
  • 中文 (中国)

Infrastructure and Management

  • Red Hat Enterprise Linux
  • Red Hat Satellite
  • Red Hat Subscription Management
  • Red Hat Lightspeed
  • Red Hat Ansible Automation Platform

Cloud Computing

  • Red Hat OpenShift
  • Red Hat OpenStack Platform
  • Red Hat OpenShift
  • Red Hat OpenShift AI
  • Red Hat OpenShift Dedicated
  • Red Hat Advanced Cluster Security for Kubernetes
  • Red Hat Advanced Cluster Management for Kubernetes
  • Red Hat Quay
  • Red Hat OpenShift Dev Spaces
  • Red Hat OpenShift Service on AWS

Storage

  • Red Hat Gluster Storage
  • Red Hat Hyperconverged Infrastructure
  • Red Hat Ceph Storage
  • Red Hat OpenShift Data Foundation

Runtimes

  • Red Hat Runtimes
  • Red Hat JBoss Enterprise Application Platform
  • Red Hat Data Grid
  • Red Hat JBoss Web Server
  • Red Hat build of Keycloak
  • Red Hat support for Spring Boot
  • Red Hat build of Node.js
  • Red Hat build of Quarkus

Integration and Automation

  • Red Hat Application Foundations
  • Red Hat Fuse
  • Red Hat AMQ
  • Red Hat 3scale API Management
All Products
Red Hat Product Errata RHSA-2026:2109 - Security Advisory
Issued:
2026-02-05
Updated:
2026-02-05

RHSA-2026:2109 - Security Advisory

  • Overview
  • Updated Packages

Synopsis

Important: kpatch-patch-5_14_0-427_100_1, kpatch-patch-5_14_0-427_44_1, kpatch-patch-5_14_0-427_55_1, kpatch-patch-5_14_0-427_68_2, and kpatch-patch-5_14_0-427_84_1 security update

Type/Severity

Security Advisory: Important

Red Hat Lightspeed patch analysis

Identify and remediate systems affected by this advisory.

View affected systems

Topic

An update for multiple packages is now available for Red Hat Enterprise Linux 9.4 Extended Update Support.

Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.

Description

This is a kernel live patch module which can be loaded by the kpatch command line utility to modify the code of a running kernel. This patch module is targeted for kernel-5.14.0-427.44.1.el9_4.

Security Fix(es):

  • kernel: libceph: fix potential use-after-free in have_mon_and_osd_map() (CVE-2025-68285)

For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.

Solution

For details on how to apply this update, which includes the changes described in this advisory, refer to:

https://access.redhat.com/articles/11258

The system must be rebooted for this update to take effect.

Affected Products

  • Red Hat Enterprise Linux for x86_64 - Extended Update Support 9.4 x86_64
  • Red Hat Enterprise Linux Server - AUS 9.4 x86_64
  • Red Hat Enterprise Linux for Power, little endian - Extended Update Support 9.4 ppc64le
  • Red Hat Enterprise Linux Server for Power LE - Update Services for SAP Solutions 9.4 ppc64le
  • Red Hat Enterprise Linux for x86_64 - Update Services for SAP Solutions 9.4 x86_64
  • Red Hat Enterprise Linux for x86_64 - Extended Life Cycle 9.4 x86_64
  • Red Hat Enterprise Linux for Power, little endian - Extended Life Cycle 9.4 ppc64le

Fixes

  • BZ - 2422801 - CVE-2025-68285 kernel: libceph: fix potential use-after-free in have_mon_and_osd_map()

CVEs

  • CVE-2025-68285

References

  • https://access.redhat.com/security/updates/classification/#important
Note: More recent versions of these packages may be available. Click a package name for more details.

Red Hat Enterprise Linux for x86_64 - Extended Update Support 9.4

SRPM
kpatch-patch-5_14_0-427_100_1-1-1.el9_4.src.rpm SHA-256: 96b8e0d00030f84cafeb53db443b518fef8324547375064907d9418e5199754f
kpatch-patch-5_14_0-427_44_1-1-13.el9_4.src.rpm SHA-256: c90f9318b979d76f299c255bc667255869e5fbf5091c2caf2274efef61518d4c
kpatch-patch-5_14_0-427_55_1-1-11.el9_4.src.rpm SHA-256: b6fad9e8c9bf6ce8246d0abe30ed6a6038a69098dcb5a0d41c4fc228e7b6cbc2
kpatch-patch-5_14_0-427_68_2-1-8.el9_4.src.rpm SHA-256: b6d31ce6c4288324d2cb639a7d9a098a221bac62a1918aea2e558a2cfb1d1e91
kpatch-patch-5_14_0-427_84_1-1-3.el9_4.src.rpm SHA-256: 3f5c67ad830adaa48ffbf5dc040673648396cf5701c2c320a98ec9686c7921ba
x86_64
kpatch-patch-5_14_0-427_100_1-1-1.el9_4.x86_64.rpm SHA-256: 9a1667e9985d7a57dd49dd4ff4c1141039e783d099e7931c7450b8b349973dfd
kpatch-patch-5_14_0-427_100_1-debuginfo-1-1.el9_4.x86_64.rpm SHA-256: 74cd9525c35e62627aeed907d86ed964708802f5fdc42eed5be80e72e908de3a
kpatch-patch-5_14_0-427_100_1-debugsource-1-1.el9_4.x86_64.rpm SHA-256: 2d395aca7a6fc75c4152c5364ace9ccee820b152f2bc7736faf98891bdee4071
kpatch-patch-5_14_0-427_44_1-1-13.el9_4.x86_64.rpm SHA-256: d7bfb73ff9bc5238f85e5739d581cdfafb5da9c9666f064f03bafe65096f6ce2
kpatch-patch-5_14_0-427_44_1-debuginfo-1-13.el9_4.x86_64.rpm SHA-256: 01176364b721368e3318533ece2f8f0b84e9d3c2d7b5cc1d2094c7966f3403d9
kpatch-patch-5_14_0-427_44_1-debugsource-1-13.el9_4.x86_64.rpm SHA-256: 42e6b55136146703bae29b9fe6b2d0ac786ab8eddab7f9219e9fd37c95f17f43
kpatch-patch-5_14_0-427_55_1-1-11.el9_4.x86_64.rpm SHA-256: 9e725ac41910819f46330d9e71c9ebd02ad86b5a02e6beff4f64939365371710
kpatch-patch-5_14_0-427_55_1-debuginfo-1-11.el9_4.x86_64.rpm SHA-256: 5e18b1353cadf48d176aa36403a9cc08f9415cc352d0102d70f4f68ff1b5e4e4
kpatch-patch-5_14_0-427_55_1-debugsource-1-11.el9_4.x86_64.rpm SHA-256: 653964db0e2353f6f68134a6759ad65ad96a944314df285974839c0dcd43432f
kpatch-patch-5_14_0-427_68_2-1-8.el9_4.x86_64.rpm SHA-256: 26f5fa9e4398b22101bd1558b354b4b80667cde60b26c7ebbac9b7f1f08bf19b
kpatch-patch-5_14_0-427_68_2-debuginfo-1-8.el9_4.x86_64.rpm SHA-256: 3768f967ff677a88d3cbb56b6fa863d3336737a9a6ba2fff77e9708e05eaa39a
kpatch-patch-5_14_0-427_68_2-debugsource-1-8.el9_4.x86_64.rpm SHA-256: d0a9d50eff9a6d5b7e17821a57e8f10e8a8e5ddcaa69695664d551ea1befc756
kpatch-patch-5_14_0-427_84_1-1-3.el9_4.x86_64.rpm SHA-256: 43bfd8f13ffe6006a08bec72760c2e879b37a372f3e399cc356a04fc6974eb11
kpatch-patch-5_14_0-427_84_1-debuginfo-1-3.el9_4.x86_64.rpm SHA-256: 20bdd7d7bacf882e868d08a9af64bfbd2824359acc2c04c6974e8d480bf141ec
kpatch-patch-5_14_0-427_84_1-debugsource-1-3.el9_4.x86_64.rpm SHA-256: 387ee932ab9febe5e82ff2956ce8672d2ce6162cbdabc7bed9f191b754c50bd3

Red Hat Enterprise Linux Server - AUS 9.4

SRPM
kpatch-patch-5_14_0-427_100_1-1-1.el9_4.src.rpm SHA-256: 96b8e0d00030f84cafeb53db443b518fef8324547375064907d9418e5199754f
kpatch-patch-5_14_0-427_44_1-1-13.el9_4.src.rpm SHA-256: c90f9318b979d76f299c255bc667255869e5fbf5091c2caf2274efef61518d4c
kpatch-patch-5_14_0-427_55_1-1-11.el9_4.src.rpm SHA-256: b6fad9e8c9bf6ce8246d0abe30ed6a6038a69098dcb5a0d41c4fc228e7b6cbc2
kpatch-patch-5_14_0-427_68_2-1-8.el9_4.src.rpm SHA-256: b6d31ce6c4288324d2cb639a7d9a098a221bac62a1918aea2e558a2cfb1d1e91
kpatch-patch-5_14_0-427_84_1-1-3.el9_4.src.rpm SHA-256: 3f5c67ad830adaa48ffbf5dc040673648396cf5701c2c320a98ec9686c7921ba
x86_64
kpatch-patch-5_14_0-427_100_1-1-1.el9_4.x86_64.rpm SHA-256: 9a1667e9985d7a57dd49dd4ff4c1141039e783d099e7931c7450b8b349973dfd
kpatch-patch-5_14_0-427_100_1-debuginfo-1-1.el9_4.x86_64.rpm SHA-256: 74cd9525c35e62627aeed907d86ed964708802f5fdc42eed5be80e72e908de3a
kpatch-patch-5_14_0-427_100_1-debugsource-1-1.el9_4.x86_64.rpm SHA-256: 2d395aca7a6fc75c4152c5364ace9ccee820b152f2bc7736faf98891bdee4071
kpatch-patch-5_14_0-427_44_1-1-13.el9_4.x86_64.rpm SHA-256: d7bfb73ff9bc5238f85e5739d581cdfafb5da9c9666f064f03bafe65096f6ce2
kpatch-patch-5_14_0-427_44_1-debuginfo-1-13.el9_4.x86_64.rpm SHA-256: 01176364b721368e3318533ece2f8f0b84e9d3c2d7b5cc1d2094c7966f3403d9
kpatch-patch-5_14_0-427_44_1-debugsource-1-13.el9_4.x86_64.rpm SHA-256: 42e6b55136146703bae29b9fe6b2d0ac786ab8eddab7f9219e9fd37c95f17f43
kpatch-patch-5_14_0-427_55_1-1-11.el9_4.x86_64.rpm SHA-256: 9e725ac41910819f46330d9e71c9ebd02ad86b5a02e6beff4f64939365371710
kpatch-patch-5_14_0-427_55_1-debuginfo-1-11.el9_4.x86_64.rpm SHA-256: 5e18b1353cadf48d176aa36403a9cc08f9415cc352d0102d70f4f68ff1b5e4e4
kpatch-patch-5_14_0-427_55_1-debugsource-1-11.el9_4.x86_64.rpm SHA-256: 653964db0e2353f6f68134a6759ad65ad96a944314df285974839c0dcd43432f
kpatch-patch-5_14_0-427_68_2-1-8.el9_4.x86_64.rpm SHA-256: 26f5fa9e4398b22101bd1558b354b4b80667cde60b26c7ebbac9b7f1f08bf19b
kpatch-patch-5_14_0-427_68_2-debuginfo-1-8.el9_4.x86_64.rpm SHA-256: 3768f967ff677a88d3cbb56b6fa863d3336737a9a6ba2fff77e9708e05eaa39a
kpatch-patch-5_14_0-427_68_2-debugsource-1-8.el9_4.x86_64.rpm SHA-256: d0a9d50eff9a6d5b7e17821a57e8f10e8a8e5ddcaa69695664d551ea1befc756
kpatch-patch-5_14_0-427_84_1-1-3.el9_4.x86_64.rpm SHA-256: 43bfd8f13ffe6006a08bec72760c2e879b37a372f3e399cc356a04fc6974eb11
kpatch-patch-5_14_0-427_84_1-debuginfo-1-3.el9_4.x86_64.rpm SHA-256: 20bdd7d7bacf882e868d08a9af64bfbd2824359acc2c04c6974e8d480bf141ec
kpatch-patch-5_14_0-427_84_1-debugsource-1-3.el9_4.x86_64.rpm SHA-256: 387ee932ab9febe5e82ff2956ce8672d2ce6162cbdabc7bed9f191b754c50bd3

Red Hat Enterprise Linux for Power, little endian - Extended Update Support 9.4

SRPM
kpatch-patch-5_14_0-427_100_1-1-1.el9_4.src.rpm SHA-256: 96b8e0d00030f84cafeb53db443b518fef8324547375064907d9418e5199754f
kpatch-patch-5_14_0-427_44_1-1-13.el9_4.src.rpm SHA-256: c90f9318b979d76f299c255bc667255869e5fbf5091c2caf2274efef61518d4c
kpatch-patch-5_14_0-427_55_1-1-11.el9_4.src.rpm SHA-256: b6fad9e8c9bf6ce8246d0abe30ed6a6038a69098dcb5a0d41c4fc228e7b6cbc2
kpatch-patch-5_14_0-427_68_2-1-8.el9_4.src.rpm SHA-256: b6d31ce6c4288324d2cb639a7d9a098a221bac62a1918aea2e558a2cfb1d1e91
kpatch-patch-5_14_0-427_84_1-1-3.el9_4.src.rpm SHA-256: 3f5c67ad830adaa48ffbf5dc040673648396cf5701c2c320a98ec9686c7921ba
ppc64le
kpatch-patch-5_14_0-427_100_1-1-1.el9_4.ppc64le.rpm SHA-256: 6773d059964f338934c16dd469b7183acfcb90fd543b2654d7c63de3ee738a0f
kpatch-patch-5_14_0-427_100_1-debuginfo-1-1.el9_4.ppc64le.rpm SHA-256: 474ec12f3711da0c6056fa18754879ac1fe5a405b914318ec1fe47073ee12c05
kpatch-patch-5_14_0-427_100_1-debugsource-1-1.el9_4.ppc64le.rpm SHA-256: a997adb200005a152cde7acacb9eee0738ace46a1a8f26465db3ad0f37b0fbc4
kpatch-patch-5_14_0-427_44_1-1-13.el9_4.ppc64le.rpm SHA-256: 1617db5fa7e59afced5fb8293130cec59f334a8dcd6da0f3e6ee60e11f1c0bfd
kpatch-patch-5_14_0-427_44_1-debuginfo-1-13.el9_4.ppc64le.rpm SHA-256: 97543fe1212d742b6ef2c89d1bd28451dff726ab4ad9786b75ffb1cb05b619f0
kpatch-patch-5_14_0-427_44_1-debugsource-1-13.el9_4.ppc64le.rpm SHA-256: cf308a8f621e183f13e531860a7b8b9006cb499ff0ba9f59bcc63b16336d1255
kpatch-patch-5_14_0-427_55_1-1-11.el9_4.ppc64le.rpm SHA-256: 77c4d8bada2fcf25f46dec3a3c3c5781a477b332b321f69fbae311b6e4e9ddd8
kpatch-patch-5_14_0-427_55_1-debuginfo-1-11.el9_4.ppc64le.rpm SHA-256: 174466bcf6a8265cde058a1232c82ffcd59796e6bff198d816aca63e85327048
kpatch-patch-5_14_0-427_55_1-debugsource-1-11.el9_4.ppc64le.rpm SHA-256: 96d3a2974a50b4ee079635751b5e21d5df2f3962f8c9b14bcd62db4787a82109
kpatch-patch-5_14_0-427_68_2-1-8.el9_4.ppc64le.rpm SHA-256: 76223aad39de458881b51d5c37f11d74c3563a8a6c4d5d48dae27327be2568ad
kpatch-patch-5_14_0-427_68_2-debuginfo-1-8.el9_4.ppc64le.rpm SHA-256: ed4d35949d9553d81e691a3f864eb923c27c756722f8e126c4ade3d47da464db
kpatch-patch-5_14_0-427_68_2-debugsource-1-8.el9_4.ppc64le.rpm SHA-256: 30f71a14c126380b21c30aebbe438b53e99f2bad77b9784d89e6ae55b0b9ae92
kpatch-patch-5_14_0-427_84_1-1-3.el9_4.ppc64le.rpm SHA-256: ca9daf76a465e395c1e7406a400a6587cb5c78fb024b116ec91b48aa04a5ef3a
kpatch-patch-5_14_0-427_84_1-debuginfo-1-3.el9_4.ppc64le.rpm SHA-256: f2c0f59d5a37ba72815d239061709692f5f008cc3a3c6dd2aa66ea91be6905d9
kpatch-patch-5_14_0-427_84_1-debugsource-1-3.el9_4.ppc64le.rpm SHA-256: 9d732464b4dea80fb26e041184dc184aae473c69fb1497823bb4cf0e29aa36d3

Red Hat Enterprise Linux Server for Power LE - Update Services for SAP Solutions 9.4

SRPM
kpatch-patch-5_14_0-427_100_1-1-1.el9_4.src.rpm SHA-256: 96b8e0d00030f84cafeb53db443b518fef8324547375064907d9418e5199754f
kpatch-patch-5_14_0-427_44_1-1-13.el9_4.src.rpm SHA-256: c90f9318b979d76f299c255bc667255869e5fbf5091c2caf2274efef61518d4c
kpatch-patch-5_14_0-427_55_1-1-11.el9_4.src.rpm SHA-256: b6fad9e8c9bf6ce8246d0abe30ed6a6038a69098dcb5a0d41c4fc228e7b6cbc2
kpatch-patch-5_14_0-427_68_2-1-8.el9_4.src.rpm SHA-256: b6d31ce6c4288324d2cb639a7d9a098a221bac62a1918aea2e558a2cfb1d1e91
kpatch-patch-5_14_0-427_84_1-1-3.el9_4.src.rpm SHA-256: 3f5c67ad830adaa48ffbf5dc040673648396cf5701c2c320a98ec9686c7921ba
ppc64le
kpatch-patch-5_14_0-427_100_1-1-1.el9_4.ppc64le.rpm SHA-256: 6773d059964f338934c16dd469b7183acfcb90fd543b2654d7c63de3ee738a0f
kpatch-patch-5_14_0-427_100_1-debuginfo-1-1.el9_4.ppc64le.rpm SHA-256: 474ec12f3711da0c6056fa18754879ac1fe5a405b914318ec1fe47073ee12c05
kpatch-patch-5_14_0-427_100_1-debugsource-1-1.el9_4.ppc64le.rpm SHA-256: a997adb200005a152cde7acacb9eee0738ace46a1a8f26465db3ad0f37b0fbc4
kpatch-patch-5_14_0-427_44_1-1-13.el9_4.ppc64le.rpm SHA-256: 1617db5fa7e59afced5fb8293130cec59f334a8dcd6da0f3e6ee60e11f1c0bfd
kpatch-patch-5_14_0-427_44_1-debuginfo-1-13.el9_4.ppc64le.rpm SHA-256: 97543fe1212d742b6ef2c89d1bd28451dff726ab4ad9786b75ffb1cb05b619f0
kpatch-patch-5_14_0-427_44_1-debugsource-1-13.el9_4.ppc64le.rpm SHA-256: cf308a8f621e183f13e531860a7b8b9006cb499ff0ba9f59bcc63b16336d1255
kpatch-patch-5_14_0-427_55_1-1-11.el9_4.ppc64le.rpm SHA-256: 77c4d8bada2fcf25f46dec3a3c3c5781a477b332b321f69fbae311b6e4e9ddd8
kpatch-patch-5_14_0-427_55_1-debuginfo-1-11.el9_4.ppc64le.rpm SHA-256: 174466bcf6a8265cde058a1232c82ffcd59796e6bff198d816aca63e85327048
kpatch-patch-5_14_0-427_55_1-debugsource-1-11.el9_4.ppc64le.rpm SHA-256: 96d3a2974a50b4ee079635751b5e21d5df2f3962f8c9b14bcd62db4787a82109
kpatch-patch-5_14_0-427_68_2-1-8.el9_4.ppc64le.rpm SHA-256: 76223aad39de458881b51d5c37f11d74c3563a8a6c4d5d48dae27327be2568ad
kpatch-patch-5_14_0-427_68_2-debuginfo-1-8.el9_4.ppc64le.rpm SHA-256: ed4d35949d9553d81e691a3f864eb923c27c756722f8e126c4ade3d47da464db
kpatch-patch-5_14_0-427_68_2-debugsource-1-8.el9_4.ppc64le.rpm SHA-256: 30f71a14c126380b21c30aebbe438b53e99f2bad77b9784d89e6ae55b0b9ae92
kpatch-patch-5_14_0-427_84_1-1-3.el9_4.ppc64le.rpm SHA-256: ca9daf76a465e395c1e7406a400a6587cb5c78fb024b116ec91b48aa04a5ef3a
kpatch-patch-5_14_0-427_84_1-debuginfo-1-3.el9_4.ppc64le.rpm SHA-256: f2c0f59d5a37ba72815d239061709692f5f008cc3a3c6dd2aa66ea91be6905d9
kpatch-patch-5_14_0-427_84_1-debugsource-1-3.el9_4.ppc64le.rpm SHA-256: 9d732464b4dea80fb26e041184dc184aae473c69fb1497823bb4cf0e29aa36d3

Red Hat Enterprise Linux for x86_64 - Update Services for SAP Solutions 9.4

SRPM
kpatch-patch-5_14_0-427_100_1-1-1.el9_4.src.rpm SHA-256: 96b8e0d00030f84cafeb53db443b518fef8324547375064907d9418e5199754f
kpatch-patch-5_14_0-427_44_1-1-13.el9_4.src.rpm SHA-256: c90f9318b979d76f299c255bc667255869e5fbf5091c2caf2274efef61518d4c
kpatch-patch-5_14_0-427_55_1-1-11.el9_4.src.rpm SHA-256: b6fad9e8c9bf6ce8246d0abe30ed6a6038a69098dcb5a0d41c4fc228e7b6cbc2
kpatch-patch-5_14_0-427_68_2-1-8.el9_4.src.rpm SHA-256: b6d31ce6c4288324d2cb639a7d9a098a221bac62a1918aea2e558a2cfb1d1e91
kpatch-patch-5_14_0-427_84_1-1-3.el9_4.src.rpm SHA-256: 3f5c67ad830adaa48ffbf5dc040673648396cf5701c2c320a98ec9686c7921ba
x86_64
kpatch-patch-5_14_0-427_100_1-1-1.el9_4.x86_64.rpm SHA-256: 9a1667e9985d7a57dd49dd4ff4c1141039e783d099e7931c7450b8b349973dfd
kpatch-patch-5_14_0-427_100_1-debuginfo-1-1.el9_4.x86_64.rpm SHA-256: 74cd9525c35e62627aeed907d86ed964708802f5fdc42eed5be80e72e908de3a
kpatch-patch-5_14_0-427_100_1-debugsource-1-1.el9_4.x86_64.rpm SHA-256: 2d395aca7a6fc75c4152c5364ace9ccee820b152f2bc7736faf98891bdee4071
kpatch-patch-5_14_0-427_44_1-1-13.el9_4.x86_64.rpm SHA-256: d7bfb73ff9bc5238f85e5739d581cdfafb5da9c9666f064f03bafe65096f6ce2
kpatch-patch-5_14_0-427_44_1-debuginfo-1-13.el9_4.x86_64.rpm SHA-256: 01176364b721368e3318533ece2f8f0b84e9d3c2d7b5cc1d2094c7966f3403d9
kpatch-patch-5_14_0-427_44_1-debugsource-1-13.el9_4.x86_64.rpm SHA-256: 42e6b55136146703bae29b9fe6b2d0ac786ab8eddab7f9219e9fd37c95f17f43
kpatch-patch-5_14_0-427_55_1-1-11.el9_4.x86_64.rpm SHA-256: 9e725ac41910819f46330d9e71c9ebd02ad86b5a02e6beff4f64939365371710
kpatch-patch-5_14_0-427_55_1-debuginfo-1-11.el9_4.x86_64.rpm SHA-256: 5e18b1353cadf48d176aa36403a9cc08f9415cc352d0102d70f4f68ff1b5e4e4
kpatch-patch-5_14_0-427_55_1-debugsource-1-11.el9_4.x86_64.rpm SHA-256: 653964db0e2353f6f68134a6759ad65ad96a944314df285974839c0dcd43432f
kpatch-patch-5_14_0-427_68_2-1-8.el9_4.x86_64.rpm SHA-256: 26f5fa9e4398b22101bd1558b354b4b80667cde60b26c7ebbac9b7f1f08bf19b
kpatch-patch-5_14_0-427_68_2-debuginfo-1-8.el9_4.x86_64.rpm SHA-256: 3768f967ff677a88d3cbb56b6fa863d3336737a9a6ba2fff77e9708e05eaa39a
kpatch-patch-5_14_0-427_68_2-debugsource-1-8.el9_4.x86_64.rpm SHA-256: d0a9d50eff9a6d5b7e17821a57e8f10e8a8e5ddcaa69695664d551ea1befc756
kpatch-patch-5_14_0-427_84_1-1-3.el9_4.x86_64.rpm SHA-256: 43bfd8f13ffe6006a08bec72760c2e879b37a372f3e399cc356a04fc6974eb11
kpatch-patch-5_14_0-427_84_1-debuginfo-1-3.el9_4.x86_64.rpm SHA-256: 20bdd7d7bacf882e868d08a9af64bfbd2824359acc2c04c6974e8d480bf141ec
kpatch-patch-5_14_0-427_84_1-debugsource-1-3.el9_4.x86_64.rpm SHA-256: 387ee932ab9febe5e82ff2956ce8672d2ce6162cbdabc7bed9f191b754c50bd3

Red Hat Enterprise Linux for x86_64 - Extended Life Cycle 9.4

SRPM
kpatch-patch-5_14_0-427_100_1-1-1.el9_4.src.rpm SHA-256: 96b8e0d00030f84cafeb53db443b518fef8324547375064907d9418e5199754f
kpatch-patch-5_14_0-427_44_1-1-13.el9_4.src.rpm SHA-256: c90f9318b979d76f299c255bc667255869e5fbf5091c2caf2274efef61518d4c
kpatch-patch-5_14_0-427_55_1-1-11.el9_4.src.rpm SHA-256: b6fad9e8c9bf6ce8246d0abe30ed6a6038a69098dcb5a0d41c4fc228e7b6cbc2
kpatch-patch-5_14_0-427_68_2-1-8.el9_4.src.rpm SHA-256: b6d31ce6c4288324d2cb639a7d9a098a221bac62a1918aea2e558a2cfb1d1e91
kpatch-patch-5_14_0-427_84_1-1-3.el9_4.src.rpm SHA-256: 3f5c67ad830adaa48ffbf5dc040673648396cf5701c2c320a98ec9686c7921ba
x86_64
kpatch-patch-5_14_0-427_100_1-1-1.el9_4.x86_64.rpm SHA-256: 9a1667e9985d7a57dd49dd4ff4c1141039e783d099e7931c7450b8b349973dfd
kpatch-patch-5_14_0-427_100_1-debuginfo-1-1.el9_4.x86_64.rpm SHA-256: 74cd9525c35e62627aeed907d86ed964708802f5fdc42eed5be80e72e908de3a
kpatch-patch-5_14_0-427_100_1-debugsource-1-1.el9_4.x86_64.rpm SHA-256: 2d395aca7a6fc75c4152c5364ace9ccee820b152f2bc7736faf98891bdee4071
kpatch-patch-5_14_0-427_44_1-1-13.el9_4.x86_64.rpm SHA-256: d7bfb73ff9bc5238f85e5739d581cdfafb5da9c9666f064f03bafe65096f6ce2
kpatch-patch-5_14_0-427_44_1-debuginfo-1-13.el9_4.x86_64.rpm SHA-256: 01176364b721368e3318533ece2f8f0b84e9d3c2d7b5cc1d2094c7966f3403d9
kpatch-patch-5_14_0-427_44_1-debugsource-1-13.el9_4.x86_64.rpm SHA-256: 42e6b55136146703bae29b9fe6b2d0ac786ab8eddab7f9219e9fd37c95f17f43
kpatch-patch-5_14_0-427_55_1-1-11.el9_4.x86_64.rpm SHA-256: 9e725ac41910819f46330d9e71c9ebd02ad86b5a02e6beff4f64939365371710
kpatch-patch-5_14_0-427_55_1-debuginfo-1-11.el9_4.x86_64.rpm SHA-256: 5e18b1353cadf48d176aa36403a9cc08f9415cc352d0102d70f4f68ff1b5e4e4
kpatch-patch-5_14_0-427_55_1-debugsource-1-11.el9_4.x86_64.rpm SHA-256: 653964db0e2353f6f68134a6759ad65ad96a944314df285974839c0dcd43432f
kpatch-patch-5_14_0-427_68_2-1-8.el9_4.x86_64.rpm SHA-256: 26f5fa9e4398b22101bd1558b354b4b80667cde60b26c7ebbac9b7f1f08bf19b
kpatch-patch-5_14_0-427_68_2-debuginfo-1-8.el9_4.x86_64.rpm SHA-256: 3768f967ff677a88d3cbb56b6fa863d3336737a9a6ba2fff77e9708e05eaa39a
kpatch-patch-5_14_0-427_68_2-debugsource-1-8.el9_4.x86_64.rpm SHA-256: d0a9d50eff9a6d5b7e17821a57e8f10e8a8e5ddcaa69695664d551ea1befc756
kpatch-patch-5_14_0-427_84_1-1-3.el9_4.x86_64.rpm SHA-256: 43bfd8f13ffe6006a08bec72760c2e879b37a372f3e399cc356a04fc6974eb11
kpatch-patch-5_14_0-427_84_1-debuginfo-1-3.el9_4.x86_64.rpm SHA-256: 20bdd7d7bacf882e868d08a9af64bfbd2824359acc2c04c6974e8d480bf141ec
kpatch-patch-5_14_0-427_84_1-debugsource-1-3.el9_4.x86_64.rpm SHA-256: 387ee932ab9febe5e82ff2956ce8672d2ce6162cbdabc7bed9f191b754c50bd3

Red Hat Enterprise Linux for Power, little endian - Extended Life Cycle 9.4

SRPM
kpatch-patch-5_14_0-427_100_1-1-1.el9_4.src.rpm SHA-256: 96b8e0d00030f84cafeb53db443b518fef8324547375064907d9418e5199754f
kpatch-patch-5_14_0-427_44_1-1-13.el9_4.src.rpm SHA-256: c90f9318b979d76f299c255bc667255869e5fbf5091c2caf2274efef61518d4c
kpatch-patch-5_14_0-427_55_1-1-11.el9_4.src.rpm SHA-256: b6fad9e8c9bf6ce8246d0abe30ed6a6038a69098dcb5a0d41c4fc228e7b6cbc2
kpatch-patch-5_14_0-427_68_2-1-8.el9_4.src.rpm SHA-256: b6d31ce6c4288324d2cb639a7d9a098a221bac62a1918aea2e558a2cfb1d1e91
kpatch-patch-5_14_0-427_84_1-1-3.el9_4.src.rpm SHA-256: 3f5c67ad830adaa48ffbf5dc040673648396cf5701c2c320a98ec9686c7921ba
ppc64le
kpatch-patch-5_14_0-427_100_1-1-1.el9_4.ppc64le.rpm SHA-256: 6773d059964f338934c16dd469b7183acfcb90fd543b2654d7c63de3ee738a0f
kpatch-patch-5_14_0-427_100_1-debuginfo-1-1.el9_4.ppc64le.rpm SHA-256: 474ec12f3711da0c6056fa18754879ac1fe5a405b914318ec1fe47073ee12c05
kpatch-patch-5_14_0-427_100_1-debugsource-1-1.el9_4.ppc64le.rpm SHA-256: a997adb200005a152cde7acacb9eee0738ace46a1a8f26465db3ad0f37b0fbc4
kpatch-patch-5_14_0-427_44_1-1-13.el9_4.ppc64le.rpm SHA-256: 1617db5fa7e59afced5fb8293130cec59f334a8dcd6da0f3e6ee60e11f1c0bfd
kpatch-patch-5_14_0-427_44_1-debuginfo-1-13.el9_4.ppc64le.rpm SHA-256: 97543fe1212d742b6ef2c89d1bd28451dff726ab4ad9786b75ffb1cb05b619f0
kpatch-patch-5_14_0-427_44_1-debugsource-1-13.el9_4.ppc64le.rpm SHA-256: cf308a8f621e183f13e531860a7b8b9006cb499ff0ba9f59bcc63b16336d1255
kpatch-patch-5_14_0-427_55_1-1-11.el9_4.ppc64le.rpm SHA-256: 77c4d8bada2fcf25f46dec3a3c3c5781a477b332b321f69fbae311b6e4e9ddd8
kpatch-patch-5_14_0-427_55_1-debuginfo-1-11.el9_4.ppc64le.rpm SHA-256: 174466bcf6a8265cde058a1232c82ffcd59796e6bff198d816aca63e85327048
kpatch-patch-5_14_0-427_55_1-debugsource-1-11.el9_4.ppc64le.rpm SHA-256: 96d3a2974a50b4ee079635751b5e21d5df2f3962f8c9b14bcd62db4787a82109
kpatch-patch-5_14_0-427_68_2-1-8.el9_4.ppc64le.rpm SHA-256: 76223aad39de458881b51d5c37f11d74c3563a8a6c4d5d48dae27327be2568ad
kpatch-patch-5_14_0-427_68_2-debuginfo-1-8.el9_4.ppc64le.rpm SHA-256: ed4d35949d9553d81e691a3f864eb923c27c756722f8e126c4ade3d47da464db
kpatch-patch-5_14_0-427_68_2-debugsource-1-8.el9_4.ppc64le.rpm SHA-256: 30f71a14c126380b21c30aebbe438b53e99f2bad77b9784d89e6ae55b0b9ae92
kpatch-patch-5_14_0-427_84_1-1-3.el9_4.ppc64le.rpm SHA-256: ca9daf76a465e395c1e7406a400a6587cb5c78fb024b116ec91b48aa04a5ef3a
kpatch-patch-5_14_0-427_84_1-debuginfo-1-3.el9_4.ppc64le.rpm SHA-256: f2c0f59d5a37ba72815d239061709692f5f008cc3a3c6dd2aa66ea91be6905d9
kpatch-patch-5_14_0-427_84_1-debugsource-1-3.el9_4.ppc64le.rpm SHA-256: 9d732464b4dea80fb26e041184dc184aae473c69fb1497823bb4cf0e29aa36d3

The Red Hat security contact is secalert@redhat.com. More contact details at https://access.redhat.com/security/team/contact/.

Red Hat LinkedIn YouTube Facebook X, formerly Twitter

Quick Links

  • Downloads
  • Subscriptions
  • Support Cases
  • Customer Service
  • Product Documentation

Help

  • Contact Us
  • Customer Portal FAQ
  • Log-in Assistance

Site Info

  • Trust Red Hat
  • Browser Support Policy
  • Accessibility
  • Awards and Recognition
  • Colophon

Related Sites

  • redhat.com
  • developers.redhat.com
  • connect.redhat.com
  • cloud.redhat.com

Red Hat legal and privacy links

  • About Red Hat
  • Jobs
  • Events
  • Locations
  • Contact Red Hat
  • Red Hat Blog
  • Inclusion at Red Hat
  • Cool Stuff Store
  • Red Hat Summit
© 2026 Red Hat

Red Hat legal and privacy links

  • Privacy statement
  • Terms of use
  • All policies and guidelines
  • Digital accessibility