- Issued:
- 2026-02-05
- Updated:
- 2026-02-05
RHSA-2026:2109 - Security Advisory
Synopsis
Important: kpatch-patch-5_14_0-427_100_1, kpatch-patch-5_14_0-427_44_1, kpatch-patch-5_14_0-427_55_1, kpatch-patch-5_14_0-427_68_2, and kpatch-patch-5_14_0-427_84_1 security update
Type/Severity
Security Advisory: Important
Red Hat Lightspeed patch analysis
Identify and remediate systems affected by this advisory.
Topic
An update for multiple packages is now available for Red Hat Enterprise Linux 9.4 Extended Update Support.
Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.
Description
This is a kernel live patch module which can be loaded by the kpatch command line utility to modify the code of a running kernel. This patch module is targeted for kernel-5.14.0-427.44.1.el9_4.
Security Fix(es):
- kernel: libceph: fix potential use-after-free in have_mon_and_osd_map() (CVE-2025-68285)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Solution
For details on how to apply this update, which includes the changes described in this advisory, refer to:
https://access.redhat.com/articles/11258
The system must be rebooted for this update to take effect.
Affected Products
- Red Hat Enterprise Linux for x86_64 - Extended Update Support 9.4 x86_64
- Red Hat Enterprise Linux Server - AUS 9.4 x86_64
- Red Hat Enterprise Linux for Power, little endian - Extended Update Support 9.4 ppc64le
- Red Hat Enterprise Linux Server for Power LE - Update Services for SAP Solutions 9.4 ppc64le
- Red Hat Enterprise Linux for x86_64 - Update Services for SAP Solutions 9.4 x86_64
- Red Hat Enterprise Linux for x86_64 - Extended Life Cycle 9.4 x86_64
- Red Hat Enterprise Linux for Power, little endian - Extended Life Cycle 9.4 ppc64le
Fixes
- BZ - 2422801 - CVE-2025-68285 kernel: libceph: fix potential use-after-free in have_mon_and_osd_map()
CVEs
Red Hat Enterprise Linux for x86_64 - Extended Update Support 9.4
| SRPM | |
|---|---|
| kpatch-patch-5_14_0-427_100_1-1-1.el9_4.src.rpm | SHA-256: 96b8e0d00030f84cafeb53db443b518fef8324547375064907d9418e5199754f |
| kpatch-patch-5_14_0-427_44_1-1-13.el9_4.src.rpm | SHA-256: c90f9318b979d76f299c255bc667255869e5fbf5091c2caf2274efef61518d4c |
| kpatch-patch-5_14_0-427_55_1-1-11.el9_4.src.rpm | SHA-256: b6fad9e8c9bf6ce8246d0abe30ed6a6038a69098dcb5a0d41c4fc228e7b6cbc2 |
| kpatch-patch-5_14_0-427_68_2-1-8.el9_4.src.rpm | SHA-256: b6d31ce6c4288324d2cb639a7d9a098a221bac62a1918aea2e558a2cfb1d1e91 |
| kpatch-patch-5_14_0-427_84_1-1-3.el9_4.src.rpm | SHA-256: 3f5c67ad830adaa48ffbf5dc040673648396cf5701c2c320a98ec9686c7921ba |
| x86_64 | |
| kpatch-patch-5_14_0-427_100_1-1-1.el9_4.x86_64.rpm | SHA-256: 9a1667e9985d7a57dd49dd4ff4c1141039e783d099e7931c7450b8b349973dfd |
| kpatch-patch-5_14_0-427_100_1-debuginfo-1-1.el9_4.x86_64.rpm | SHA-256: 74cd9525c35e62627aeed907d86ed964708802f5fdc42eed5be80e72e908de3a |
| kpatch-patch-5_14_0-427_100_1-debugsource-1-1.el9_4.x86_64.rpm | SHA-256: 2d395aca7a6fc75c4152c5364ace9ccee820b152f2bc7736faf98891bdee4071 |
| kpatch-patch-5_14_0-427_44_1-1-13.el9_4.x86_64.rpm | SHA-256: d7bfb73ff9bc5238f85e5739d581cdfafb5da9c9666f064f03bafe65096f6ce2 |
| kpatch-patch-5_14_0-427_44_1-debuginfo-1-13.el9_4.x86_64.rpm | SHA-256: 01176364b721368e3318533ece2f8f0b84e9d3c2d7b5cc1d2094c7966f3403d9 |
| kpatch-patch-5_14_0-427_44_1-debugsource-1-13.el9_4.x86_64.rpm | SHA-256: 42e6b55136146703bae29b9fe6b2d0ac786ab8eddab7f9219e9fd37c95f17f43 |
| kpatch-patch-5_14_0-427_55_1-1-11.el9_4.x86_64.rpm | SHA-256: 9e725ac41910819f46330d9e71c9ebd02ad86b5a02e6beff4f64939365371710 |
| kpatch-patch-5_14_0-427_55_1-debuginfo-1-11.el9_4.x86_64.rpm | SHA-256: 5e18b1353cadf48d176aa36403a9cc08f9415cc352d0102d70f4f68ff1b5e4e4 |
| kpatch-patch-5_14_0-427_55_1-debugsource-1-11.el9_4.x86_64.rpm | SHA-256: 653964db0e2353f6f68134a6759ad65ad96a944314df285974839c0dcd43432f |
| kpatch-patch-5_14_0-427_68_2-1-8.el9_4.x86_64.rpm | SHA-256: 26f5fa9e4398b22101bd1558b354b4b80667cde60b26c7ebbac9b7f1f08bf19b |
| kpatch-patch-5_14_0-427_68_2-debuginfo-1-8.el9_4.x86_64.rpm | SHA-256: 3768f967ff677a88d3cbb56b6fa863d3336737a9a6ba2fff77e9708e05eaa39a |
| kpatch-patch-5_14_0-427_68_2-debugsource-1-8.el9_4.x86_64.rpm | SHA-256: d0a9d50eff9a6d5b7e17821a57e8f10e8a8e5ddcaa69695664d551ea1befc756 |
| kpatch-patch-5_14_0-427_84_1-1-3.el9_4.x86_64.rpm | SHA-256: 43bfd8f13ffe6006a08bec72760c2e879b37a372f3e399cc356a04fc6974eb11 |
| kpatch-patch-5_14_0-427_84_1-debuginfo-1-3.el9_4.x86_64.rpm | SHA-256: 20bdd7d7bacf882e868d08a9af64bfbd2824359acc2c04c6974e8d480bf141ec |
| kpatch-patch-5_14_0-427_84_1-debugsource-1-3.el9_4.x86_64.rpm | SHA-256: 387ee932ab9febe5e82ff2956ce8672d2ce6162cbdabc7bed9f191b754c50bd3 |
Red Hat Enterprise Linux Server - AUS 9.4
| SRPM | |
|---|---|
| kpatch-patch-5_14_0-427_100_1-1-1.el9_4.src.rpm | SHA-256: 96b8e0d00030f84cafeb53db443b518fef8324547375064907d9418e5199754f |
| kpatch-patch-5_14_0-427_44_1-1-13.el9_4.src.rpm | SHA-256: c90f9318b979d76f299c255bc667255869e5fbf5091c2caf2274efef61518d4c |
| kpatch-patch-5_14_0-427_55_1-1-11.el9_4.src.rpm | SHA-256: b6fad9e8c9bf6ce8246d0abe30ed6a6038a69098dcb5a0d41c4fc228e7b6cbc2 |
| kpatch-patch-5_14_0-427_68_2-1-8.el9_4.src.rpm | SHA-256: b6d31ce6c4288324d2cb639a7d9a098a221bac62a1918aea2e558a2cfb1d1e91 |
| kpatch-patch-5_14_0-427_84_1-1-3.el9_4.src.rpm | SHA-256: 3f5c67ad830adaa48ffbf5dc040673648396cf5701c2c320a98ec9686c7921ba |
| x86_64 | |
| kpatch-patch-5_14_0-427_100_1-1-1.el9_4.x86_64.rpm | SHA-256: 9a1667e9985d7a57dd49dd4ff4c1141039e783d099e7931c7450b8b349973dfd |
| kpatch-patch-5_14_0-427_100_1-debuginfo-1-1.el9_4.x86_64.rpm | SHA-256: 74cd9525c35e62627aeed907d86ed964708802f5fdc42eed5be80e72e908de3a |
| kpatch-patch-5_14_0-427_100_1-debugsource-1-1.el9_4.x86_64.rpm | SHA-256: 2d395aca7a6fc75c4152c5364ace9ccee820b152f2bc7736faf98891bdee4071 |
| kpatch-patch-5_14_0-427_44_1-1-13.el9_4.x86_64.rpm | SHA-256: d7bfb73ff9bc5238f85e5739d581cdfafb5da9c9666f064f03bafe65096f6ce2 |
| kpatch-patch-5_14_0-427_44_1-debuginfo-1-13.el9_4.x86_64.rpm | SHA-256: 01176364b721368e3318533ece2f8f0b84e9d3c2d7b5cc1d2094c7966f3403d9 |
| kpatch-patch-5_14_0-427_44_1-debugsource-1-13.el9_4.x86_64.rpm | SHA-256: 42e6b55136146703bae29b9fe6b2d0ac786ab8eddab7f9219e9fd37c95f17f43 |
| kpatch-patch-5_14_0-427_55_1-1-11.el9_4.x86_64.rpm | SHA-256: 9e725ac41910819f46330d9e71c9ebd02ad86b5a02e6beff4f64939365371710 |
| kpatch-patch-5_14_0-427_55_1-debuginfo-1-11.el9_4.x86_64.rpm | SHA-256: 5e18b1353cadf48d176aa36403a9cc08f9415cc352d0102d70f4f68ff1b5e4e4 |
| kpatch-patch-5_14_0-427_55_1-debugsource-1-11.el9_4.x86_64.rpm | SHA-256: 653964db0e2353f6f68134a6759ad65ad96a944314df285974839c0dcd43432f |
| kpatch-patch-5_14_0-427_68_2-1-8.el9_4.x86_64.rpm | SHA-256: 26f5fa9e4398b22101bd1558b354b4b80667cde60b26c7ebbac9b7f1f08bf19b |
| kpatch-patch-5_14_0-427_68_2-debuginfo-1-8.el9_4.x86_64.rpm | SHA-256: 3768f967ff677a88d3cbb56b6fa863d3336737a9a6ba2fff77e9708e05eaa39a |
| kpatch-patch-5_14_0-427_68_2-debugsource-1-8.el9_4.x86_64.rpm | SHA-256: d0a9d50eff9a6d5b7e17821a57e8f10e8a8e5ddcaa69695664d551ea1befc756 |
| kpatch-patch-5_14_0-427_84_1-1-3.el9_4.x86_64.rpm | SHA-256: 43bfd8f13ffe6006a08bec72760c2e879b37a372f3e399cc356a04fc6974eb11 |
| kpatch-patch-5_14_0-427_84_1-debuginfo-1-3.el9_4.x86_64.rpm | SHA-256: 20bdd7d7bacf882e868d08a9af64bfbd2824359acc2c04c6974e8d480bf141ec |
| kpatch-patch-5_14_0-427_84_1-debugsource-1-3.el9_4.x86_64.rpm | SHA-256: 387ee932ab9febe5e82ff2956ce8672d2ce6162cbdabc7bed9f191b754c50bd3 |
Red Hat Enterprise Linux for Power, little endian - Extended Update Support 9.4
| SRPM | |
|---|---|
| kpatch-patch-5_14_0-427_100_1-1-1.el9_4.src.rpm | SHA-256: 96b8e0d00030f84cafeb53db443b518fef8324547375064907d9418e5199754f |
| kpatch-patch-5_14_0-427_44_1-1-13.el9_4.src.rpm | SHA-256: c90f9318b979d76f299c255bc667255869e5fbf5091c2caf2274efef61518d4c |
| kpatch-patch-5_14_0-427_55_1-1-11.el9_4.src.rpm | SHA-256: b6fad9e8c9bf6ce8246d0abe30ed6a6038a69098dcb5a0d41c4fc228e7b6cbc2 |
| kpatch-patch-5_14_0-427_68_2-1-8.el9_4.src.rpm | SHA-256: b6d31ce6c4288324d2cb639a7d9a098a221bac62a1918aea2e558a2cfb1d1e91 |
| kpatch-patch-5_14_0-427_84_1-1-3.el9_4.src.rpm | SHA-256: 3f5c67ad830adaa48ffbf5dc040673648396cf5701c2c320a98ec9686c7921ba |
| ppc64le | |
| kpatch-patch-5_14_0-427_100_1-1-1.el9_4.ppc64le.rpm | SHA-256: 6773d059964f338934c16dd469b7183acfcb90fd543b2654d7c63de3ee738a0f |
| kpatch-patch-5_14_0-427_100_1-debuginfo-1-1.el9_4.ppc64le.rpm | SHA-256: 474ec12f3711da0c6056fa18754879ac1fe5a405b914318ec1fe47073ee12c05 |
| kpatch-patch-5_14_0-427_100_1-debugsource-1-1.el9_4.ppc64le.rpm | SHA-256: a997adb200005a152cde7acacb9eee0738ace46a1a8f26465db3ad0f37b0fbc4 |
| kpatch-patch-5_14_0-427_44_1-1-13.el9_4.ppc64le.rpm | SHA-256: 1617db5fa7e59afced5fb8293130cec59f334a8dcd6da0f3e6ee60e11f1c0bfd |
| kpatch-patch-5_14_0-427_44_1-debuginfo-1-13.el9_4.ppc64le.rpm | SHA-256: 97543fe1212d742b6ef2c89d1bd28451dff726ab4ad9786b75ffb1cb05b619f0 |
| kpatch-patch-5_14_0-427_44_1-debugsource-1-13.el9_4.ppc64le.rpm | SHA-256: cf308a8f621e183f13e531860a7b8b9006cb499ff0ba9f59bcc63b16336d1255 |
| kpatch-patch-5_14_0-427_55_1-1-11.el9_4.ppc64le.rpm | SHA-256: 77c4d8bada2fcf25f46dec3a3c3c5781a477b332b321f69fbae311b6e4e9ddd8 |
| kpatch-patch-5_14_0-427_55_1-debuginfo-1-11.el9_4.ppc64le.rpm | SHA-256: 174466bcf6a8265cde058a1232c82ffcd59796e6bff198d816aca63e85327048 |
| kpatch-patch-5_14_0-427_55_1-debugsource-1-11.el9_4.ppc64le.rpm | SHA-256: 96d3a2974a50b4ee079635751b5e21d5df2f3962f8c9b14bcd62db4787a82109 |
| kpatch-patch-5_14_0-427_68_2-1-8.el9_4.ppc64le.rpm | SHA-256: 76223aad39de458881b51d5c37f11d74c3563a8a6c4d5d48dae27327be2568ad |
| kpatch-patch-5_14_0-427_68_2-debuginfo-1-8.el9_4.ppc64le.rpm | SHA-256: ed4d35949d9553d81e691a3f864eb923c27c756722f8e126c4ade3d47da464db |
| kpatch-patch-5_14_0-427_68_2-debugsource-1-8.el9_4.ppc64le.rpm | SHA-256: 30f71a14c126380b21c30aebbe438b53e99f2bad77b9784d89e6ae55b0b9ae92 |
| kpatch-patch-5_14_0-427_84_1-1-3.el9_4.ppc64le.rpm | SHA-256: ca9daf76a465e395c1e7406a400a6587cb5c78fb024b116ec91b48aa04a5ef3a |
| kpatch-patch-5_14_0-427_84_1-debuginfo-1-3.el9_4.ppc64le.rpm | SHA-256: f2c0f59d5a37ba72815d239061709692f5f008cc3a3c6dd2aa66ea91be6905d9 |
| kpatch-patch-5_14_0-427_84_1-debugsource-1-3.el9_4.ppc64le.rpm | SHA-256: 9d732464b4dea80fb26e041184dc184aae473c69fb1497823bb4cf0e29aa36d3 |
Red Hat Enterprise Linux Server for Power LE - Update Services for SAP Solutions 9.4
| SRPM | |
|---|---|
| kpatch-patch-5_14_0-427_100_1-1-1.el9_4.src.rpm | SHA-256: 96b8e0d00030f84cafeb53db443b518fef8324547375064907d9418e5199754f |
| kpatch-patch-5_14_0-427_44_1-1-13.el9_4.src.rpm | SHA-256: c90f9318b979d76f299c255bc667255869e5fbf5091c2caf2274efef61518d4c |
| kpatch-patch-5_14_0-427_55_1-1-11.el9_4.src.rpm | SHA-256: b6fad9e8c9bf6ce8246d0abe30ed6a6038a69098dcb5a0d41c4fc228e7b6cbc2 |
| kpatch-patch-5_14_0-427_68_2-1-8.el9_4.src.rpm | SHA-256: b6d31ce6c4288324d2cb639a7d9a098a221bac62a1918aea2e558a2cfb1d1e91 |
| kpatch-patch-5_14_0-427_84_1-1-3.el9_4.src.rpm | SHA-256: 3f5c67ad830adaa48ffbf5dc040673648396cf5701c2c320a98ec9686c7921ba |
| ppc64le | |
| kpatch-patch-5_14_0-427_100_1-1-1.el9_4.ppc64le.rpm | SHA-256: 6773d059964f338934c16dd469b7183acfcb90fd543b2654d7c63de3ee738a0f |
| kpatch-patch-5_14_0-427_100_1-debuginfo-1-1.el9_4.ppc64le.rpm | SHA-256: 474ec12f3711da0c6056fa18754879ac1fe5a405b914318ec1fe47073ee12c05 |
| kpatch-patch-5_14_0-427_100_1-debugsource-1-1.el9_4.ppc64le.rpm | SHA-256: a997adb200005a152cde7acacb9eee0738ace46a1a8f26465db3ad0f37b0fbc4 |
| kpatch-patch-5_14_0-427_44_1-1-13.el9_4.ppc64le.rpm | SHA-256: 1617db5fa7e59afced5fb8293130cec59f334a8dcd6da0f3e6ee60e11f1c0bfd |
| kpatch-patch-5_14_0-427_44_1-debuginfo-1-13.el9_4.ppc64le.rpm | SHA-256: 97543fe1212d742b6ef2c89d1bd28451dff726ab4ad9786b75ffb1cb05b619f0 |
| kpatch-patch-5_14_0-427_44_1-debugsource-1-13.el9_4.ppc64le.rpm | SHA-256: cf308a8f621e183f13e531860a7b8b9006cb499ff0ba9f59bcc63b16336d1255 |
| kpatch-patch-5_14_0-427_55_1-1-11.el9_4.ppc64le.rpm | SHA-256: 77c4d8bada2fcf25f46dec3a3c3c5781a477b332b321f69fbae311b6e4e9ddd8 |
| kpatch-patch-5_14_0-427_55_1-debuginfo-1-11.el9_4.ppc64le.rpm | SHA-256: 174466bcf6a8265cde058a1232c82ffcd59796e6bff198d816aca63e85327048 |
| kpatch-patch-5_14_0-427_55_1-debugsource-1-11.el9_4.ppc64le.rpm | SHA-256: 96d3a2974a50b4ee079635751b5e21d5df2f3962f8c9b14bcd62db4787a82109 |
| kpatch-patch-5_14_0-427_68_2-1-8.el9_4.ppc64le.rpm | SHA-256: 76223aad39de458881b51d5c37f11d74c3563a8a6c4d5d48dae27327be2568ad |
| kpatch-patch-5_14_0-427_68_2-debuginfo-1-8.el9_4.ppc64le.rpm | SHA-256: ed4d35949d9553d81e691a3f864eb923c27c756722f8e126c4ade3d47da464db |
| kpatch-patch-5_14_0-427_68_2-debugsource-1-8.el9_4.ppc64le.rpm | SHA-256: 30f71a14c126380b21c30aebbe438b53e99f2bad77b9784d89e6ae55b0b9ae92 |
| kpatch-patch-5_14_0-427_84_1-1-3.el9_4.ppc64le.rpm | SHA-256: ca9daf76a465e395c1e7406a400a6587cb5c78fb024b116ec91b48aa04a5ef3a |
| kpatch-patch-5_14_0-427_84_1-debuginfo-1-3.el9_4.ppc64le.rpm | SHA-256: f2c0f59d5a37ba72815d239061709692f5f008cc3a3c6dd2aa66ea91be6905d9 |
| kpatch-patch-5_14_0-427_84_1-debugsource-1-3.el9_4.ppc64le.rpm | SHA-256: 9d732464b4dea80fb26e041184dc184aae473c69fb1497823bb4cf0e29aa36d3 |
Red Hat Enterprise Linux for x86_64 - Update Services for SAP Solutions 9.4
| SRPM | |
|---|---|
| kpatch-patch-5_14_0-427_100_1-1-1.el9_4.src.rpm | SHA-256: 96b8e0d00030f84cafeb53db443b518fef8324547375064907d9418e5199754f |
| kpatch-patch-5_14_0-427_44_1-1-13.el9_4.src.rpm | SHA-256: c90f9318b979d76f299c255bc667255869e5fbf5091c2caf2274efef61518d4c |
| kpatch-patch-5_14_0-427_55_1-1-11.el9_4.src.rpm | SHA-256: b6fad9e8c9bf6ce8246d0abe30ed6a6038a69098dcb5a0d41c4fc228e7b6cbc2 |
| kpatch-patch-5_14_0-427_68_2-1-8.el9_4.src.rpm | SHA-256: b6d31ce6c4288324d2cb639a7d9a098a221bac62a1918aea2e558a2cfb1d1e91 |
| kpatch-patch-5_14_0-427_84_1-1-3.el9_4.src.rpm | SHA-256: 3f5c67ad830adaa48ffbf5dc040673648396cf5701c2c320a98ec9686c7921ba |
| x86_64 | |
| kpatch-patch-5_14_0-427_100_1-1-1.el9_4.x86_64.rpm | SHA-256: 9a1667e9985d7a57dd49dd4ff4c1141039e783d099e7931c7450b8b349973dfd |
| kpatch-patch-5_14_0-427_100_1-debuginfo-1-1.el9_4.x86_64.rpm | SHA-256: 74cd9525c35e62627aeed907d86ed964708802f5fdc42eed5be80e72e908de3a |
| kpatch-patch-5_14_0-427_100_1-debugsource-1-1.el9_4.x86_64.rpm | SHA-256: 2d395aca7a6fc75c4152c5364ace9ccee820b152f2bc7736faf98891bdee4071 |
| kpatch-patch-5_14_0-427_44_1-1-13.el9_4.x86_64.rpm | SHA-256: d7bfb73ff9bc5238f85e5739d581cdfafb5da9c9666f064f03bafe65096f6ce2 |
| kpatch-patch-5_14_0-427_44_1-debuginfo-1-13.el9_4.x86_64.rpm | SHA-256: 01176364b721368e3318533ece2f8f0b84e9d3c2d7b5cc1d2094c7966f3403d9 |
| kpatch-patch-5_14_0-427_44_1-debugsource-1-13.el9_4.x86_64.rpm | SHA-256: 42e6b55136146703bae29b9fe6b2d0ac786ab8eddab7f9219e9fd37c95f17f43 |
| kpatch-patch-5_14_0-427_55_1-1-11.el9_4.x86_64.rpm | SHA-256: 9e725ac41910819f46330d9e71c9ebd02ad86b5a02e6beff4f64939365371710 |
| kpatch-patch-5_14_0-427_55_1-debuginfo-1-11.el9_4.x86_64.rpm | SHA-256: 5e18b1353cadf48d176aa36403a9cc08f9415cc352d0102d70f4f68ff1b5e4e4 |
| kpatch-patch-5_14_0-427_55_1-debugsource-1-11.el9_4.x86_64.rpm | SHA-256: 653964db0e2353f6f68134a6759ad65ad96a944314df285974839c0dcd43432f |
| kpatch-patch-5_14_0-427_68_2-1-8.el9_4.x86_64.rpm | SHA-256: 26f5fa9e4398b22101bd1558b354b4b80667cde60b26c7ebbac9b7f1f08bf19b |
| kpatch-patch-5_14_0-427_68_2-debuginfo-1-8.el9_4.x86_64.rpm | SHA-256: 3768f967ff677a88d3cbb56b6fa863d3336737a9a6ba2fff77e9708e05eaa39a |
| kpatch-patch-5_14_0-427_68_2-debugsource-1-8.el9_4.x86_64.rpm | SHA-256: d0a9d50eff9a6d5b7e17821a57e8f10e8a8e5ddcaa69695664d551ea1befc756 |
| kpatch-patch-5_14_0-427_84_1-1-3.el9_4.x86_64.rpm | SHA-256: 43bfd8f13ffe6006a08bec72760c2e879b37a372f3e399cc356a04fc6974eb11 |
| kpatch-patch-5_14_0-427_84_1-debuginfo-1-3.el9_4.x86_64.rpm | SHA-256: 20bdd7d7bacf882e868d08a9af64bfbd2824359acc2c04c6974e8d480bf141ec |
| kpatch-patch-5_14_0-427_84_1-debugsource-1-3.el9_4.x86_64.rpm | SHA-256: 387ee932ab9febe5e82ff2956ce8672d2ce6162cbdabc7bed9f191b754c50bd3 |
Red Hat Enterprise Linux for x86_64 - Extended Life Cycle 9.4
| SRPM | |
|---|---|
| kpatch-patch-5_14_0-427_100_1-1-1.el9_4.src.rpm | SHA-256: 96b8e0d00030f84cafeb53db443b518fef8324547375064907d9418e5199754f |
| kpatch-patch-5_14_0-427_44_1-1-13.el9_4.src.rpm | SHA-256: c90f9318b979d76f299c255bc667255869e5fbf5091c2caf2274efef61518d4c |
| kpatch-patch-5_14_0-427_55_1-1-11.el9_4.src.rpm | SHA-256: b6fad9e8c9bf6ce8246d0abe30ed6a6038a69098dcb5a0d41c4fc228e7b6cbc2 |
| kpatch-patch-5_14_0-427_68_2-1-8.el9_4.src.rpm | SHA-256: b6d31ce6c4288324d2cb639a7d9a098a221bac62a1918aea2e558a2cfb1d1e91 |
| kpatch-patch-5_14_0-427_84_1-1-3.el9_4.src.rpm | SHA-256: 3f5c67ad830adaa48ffbf5dc040673648396cf5701c2c320a98ec9686c7921ba |
| x86_64 | |
| kpatch-patch-5_14_0-427_100_1-1-1.el9_4.x86_64.rpm | SHA-256: 9a1667e9985d7a57dd49dd4ff4c1141039e783d099e7931c7450b8b349973dfd |
| kpatch-patch-5_14_0-427_100_1-debuginfo-1-1.el9_4.x86_64.rpm | SHA-256: 74cd9525c35e62627aeed907d86ed964708802f5fdc42eed5be80e72e908de3a |
| kpatch-patch-5_14_0-427_100_1-debugsource-1-1.el9_4.x86_64.rpm | SHA-256: 2d395aca7a6fc75c4152c5364ace9ccee820b152f2bc7736faf98891bdee4071 |
| kpatch-patch-5_14_0-427_44_1-1-13.el9_4.x86_64.rpm | SHA-256: d7bfb73ff9bc5238f85e5739d581cdfafb5da9c9666f064f03bafe65096f6ce2 |
| kpatch-patch-5_14_0-427_44_1-debuginfo-1-13.el9_4.x86_64.rpm | SHA-256: 01176364b721368e3318533ece2f8f0b84e9d3c2d7b5cc1d2094c7966f3403d9 |
| kpatch-patch-5_14_0-427_44_1-debugsource-1-13.el9_4.x86_64.rpm | SHA-256: 42e6b55136146703bae29b9fe6b2d0ac786ab8eddab7f9219e9fd37c95f17f43 |
| kpatch-patch-5_14_0-427_55_1-1-11.el9_4.x86_64.rpm | SHA-256: 9e725ac41910819f46330d9e71c9ebd02ad86b5a02e6beff4f64939365371710 |
| kpatch-patch-5_14_0-427_55_1-debuginfo-1-11.el9_4.x86_64.rpm | SHA-256: 5e18b1353cadf48d176aa36403a9cc08f9415cc352d0102d70f4f68ff1b5e4e4 |
| kpatch-patch-5_14_0-427_55_1-debugsource-1-11.el9_4.x86_64.rpm | SHA-256: 653964db0e2353f6f68134a6759ad65ad96a944314df285974839c0dcd43432f |
| kpatch-patch-5_14_0-427_68_2-1-8.el9_4.x86_64.rpm | SHA-256: 26f5fa9e4398b22101bd1558b354b4b80667cde60b26c7ebbac9b7f1f08bf19b |
| kpatch-patch-5_14_0-427_68_2-debuginfo-1-8.el9_4.x86_64.rpm | SHA-256: 3768f967ff677a88d3cbb56b6fa863d3336737a9a6ba2fff77e9708e05eaa39a |
| kpatch-patch-5_14_0-427_68_2-debugsource-1-8.el9_4.x86_64.rpm | SHA-256: d0a9d50eff9a6d5b7e17821a57e8f10e8a8e5ddcaa69695664d551ea1befc756 |
| kpatch-patch-5_14_0-427_84_1-1-3.el9_4.x86_64.rpm | SHA-256: 43bfd8f13ffe6006a08bec72760c2e879b37a372f3e399cc356a04fc6974eb11 |
| kpatch-patch-5_14_0-427_84_1-debuginfo-1-3.el9_4.x86_64.rpm | SHA-256: 20bdd7d7bacf882e868d08a9af64bfbd2824359acc2c04c6974e8d480bf141ec |
| kpatch-patch-5_14_0-427_84_1-debugsource-1-3.el9_4.x86_64.rpm | SHA-256: 387ee932ab9febe5e82ff2956ce8672d2ce6162cbdabc7bed9f191b754c50bd3 |
Red Hat Enterprise Linux for Power, little endian - Extended Life Cycle 9.4
| SRPM | |
|---|---|
| kpatch-patch-5_14_0-427_100_1-1-1.el9_4.src.rpm | SHA-256: 96b8e0d00030f84cafeb53db443b518fef8324547375064907d9418e5199754f |
| kpatch-patch-5_14_0-427_44_1-1-13.el9_4.src.rpm | SHA-256: c90f9318b979d76f299c255bc667255869e5fbf5091c2caf2274efef61518d4c |
| kpatch-patch-5_14_0-427_55_1-1-11.el9_4.src.rpm | SHA-256: b6fad9e8c9bf6ce8246d0abe30ed6a6038a69098dcb5a0d41c4fc228e7b6cbc2 |
| kpatch-patch-5_14_0-427_68_2-1-8.el9_4.src.rpm | SHA-256: b6d31ce6c4288324d2cb639a7d9a098a221bac62a1918aea2e558a2cfb1d1e91 |
| kpatch-patch-5_14_0-427_84_1-1-3.el9_4.src.rpm | SHA-256: 3f5c67ad830adaa48ffbf5dc040673648396cf5701c2c320a98ec9686c7921ba |
| ppc64le | |
| kpatch-patch-5_14_0-427_100_1-1-1.el9_4.ppc64le.rpm | SHA-256: 6773d059964f338934c16dd469b7183acfcb90fd543b2654d7c63de3ee738a0f |
| kpatch-patch-5_14_0-427_100_1-debuginfo-1-1.el9_4.ppc64le.rpm | SHA-256: 474ec12f3711da0c6056fa18754879ac1fe5a405b914318ec1fe47073ee12c05 |
| kpatch-patch-5_14_0-427_100_1-debugsource-1-1.el9_4.ppc64le.rpm | SHA-256: a997adb200005a152cde7acacb9eee0738ace46a1a8f26465db3ad0f37b0fbc4 |
| kpatch-patch-5_14_0-427_44_1-1-13.el9_4.ppc64le.rpm | SHA-256: 1617db5fa7e59afced5fb8293130cec59f334a8dcd6da0f3e6ee60e11f1c0bfd |
| kpatch-patch-5_14_0-427_44_1-debuginfo-1-13.el9_4.ppc64le.rpm | SHA-256: 97543fe1212d742b6ef2c89d1bd28451dff726ab4ad9786b75ffb1cb05b619f0 |
| kpatch-patch-5_14_0-427_44_1-debugsource-1-13.el9_4.ppc64le.rpm | SHA-256: cf308a8f621e183f13e531860a7b8b9006cb499ff0ba9f59bcc63b16336d1255 |
| kpatch-patch-5_14_0-427_55_1-1-11.el9_4.ppc64le.rpm | SHA-256: 77c4d8bada2fcf25f46dec3a3c3c5781a477b332b321f69fbae311b6e4e9ddd8 |
| kpatch-patch-5_14_0-427_55_1-debuginfo-1-11.el9_4.ppc64le.rpm | SHA-256: 174466bcf6a8265cde058a1232c82ffcd59796e6bff198d816aca63e85327048 |
| kpatch-patch-5_14_0-427_55_1-debugsource-1-11.el9_4.ppc64le.rpm | SHA-256: 96d3a2974a50b4ee079635751b5e21d5df2f3962f8c9b14bcd62db4787a82109 |
| kpatch-patch-5_14_0-427_68_2-1-8.el9_4.ppc64le.rpm | SHA-256: 76223aad39de458881b51d5c37f11d74c3563a8a6c4d5d48dae27327be2568ad |
| kpatch-patch-5_14_0-427_68_2-debuginfo-1-8.el9_4.ppc64le.rpm | SHA-256: ed4d35949d9553d81e691a3f864eb923c27c756722f8e126c4ade3d47da464db |
| kpatch-patch-5_14_0-427_68_2-debugsource-1-8.el9_4.ppc64le.rpm | SHA-256: 30f71a14c126380b21c30aebbe438b53e99f2bad77b9784d89e6ae55b0b9ae92 |
| kpatch-patch-5_14_0-427_84_1-1-3.el9_4.ppc64le.rpm | SHA-256: ca9daf76a465e395c1e7406a400a6587cb5c78fb024b116ec91b48aa04a5ef3a |
| kpatch-patch-5_14_0-427_84_1-debuginfo-1-3.el9_4.ppc64le.rpm | SHA-256: f2c0f59d5a37ba72815d239061709692f5f008cc3a3c6dd2aa66ea91be6905d9 |
| kpatch-patch-5_14_0-427_84_1-debugsource-1-3.el9_4.ppc64le.rpm | SHA-256: 9d732464b4dea80fb26e041184dc184aae473c69fb1497823bb4cf0e29aa36d3 |
The Red Hat security contact is secalert@redhat.com. More contact details at https://access.redhat.com/security/team/contact/.