Skip to navigation Skip to main content

Utilities

  • Subscriptions
  • Downloads
  • Red Hat Console
  • Get Support
Red Hat Customer Portal
  • Subscriptions
  • Downloads
  • Red Hat Console
  • Get Support
  • Products

    Top Products

    • Red Hat Enterprise Linux
    • Red Hat OpenShift
    • Red Hat Ansible Automation Platform
    All Products

    Downloads and Containers

    • Downloads
    • Packages
    • Containers

    Top Resources

    • Documentation
    • Product Life Cycles
    • Product Compliance
    • Errata
  • Knowledge

    Red Hat Knowledge Center

    • Knowledgebase Solutions
    • Knowledgebase Articles
    • Customer Portal Labs
    • Errata

    Top Product Docs

    • Red Hat Enterprise Linux
    • Red Hat OpenShift
    • Red Hat Ansible Automation Platform
    All Product Docs

    Training and Certification

    • About
    • Course Index
    • Certification Index
    • Skill Assessment
  • Security

    Red Hat Product Security Center

    • Security Updates
    • Security Advisories
    • Red Hat CVE Database
    • Errata

    References

    • Security Bulletins
    • Severity Ratings
    • Security Data

    Top Resources

    • Security Labs
    • Backporting Policies
    • Security Blog
  • Support

    Red Hat Support

    • Support Cases
    • Troubleshoot
    • Get Support
    • Contact Red Hat Support

    Red Hat Community Support

    • Customer Portal Community
    • Community Discussions
    • Red Hat Accelerator Program

    Top Resources

    • Product Life Cycles
    • Customer Portal Labs
    • Red Hat JBoss Supported Configurations
    • Red Hat Lightspeed
Or troubleshoot an issue.

Select Your Language

  • English
  • Français
  • 한국어
  • 日本語
  • 中文 (中国)

Infrastructure and Management

  • Red Hat Enterprise Linux
  • Red Hat Satellite
  • Red Hat Subscription Management
  • Red Hat Lightspeed
  • Red Hat Ansible Automation Platform

Cloud Computing

  • Red Hat OpenShift
  • Red Hat OpenStack Platform
  • Red Hat OpenShift
  • Red Hat OpenShift AI
  • Red Hat OpenShift Dedicated
  • Red Hat Advanced Cluster Security for Kubernetes
  • Red Hat Advanced Cluster Management for Kubernetes
  • Red Hat Quay
  • Red Hat OpenShift Dev Spaces
  • Red Hat OpenShift Service on AWS

Storage

  • Red Hat Gluster Storage
  • Red Hat Hyperconverged Infrastructure
  • Red Hat Ceph Storage
  • Red Hat OpenShift Data Foundation

Runtimes

  • Red Hat Runtimes
  • Red Hat JBoss Enterprise Application Platform
  • Red Hat Data Grid
  • Red Hat JBoss Web Server
  • Red Hat build of Keycloak
  • Red Hat support for Spring Boot
  • Red Hat build of Node.js
  • Red Hat build of Quarkus

Integration and Automation

  • Red Hat Application Foundations
  • Red Hat Fuse
  • Red Hat AMQ
  • Red Hat 3scale API Management
All Products
Red Hat Product Errata RHSA-2026:1445 - Security Advisory
Issued:
2026-01-28
Updated:
2026-01-28

RHSA-2026:1445 - Security Advisory

  • Overview
  • Updated Packages

Synopsis

Important: kernel security update

Type/Severity

Security Advisory: Important

Red Hat Lightspeed patch analysis

Identify and remediate systems affected by this advisory.

View affected systems

Topic

An update for kernel is now available for Red Hat Enterprise Linux 8.8 Update Services for SAP Solutions and Red Hat Enterprise Linux 8.8 Telecommunications Update Service.

Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.

Description

The kernel packages contain the Linux kernel, the core of any Linux operating system.

Security Fix(es):

  • kernel: smb: client: Fix use-after-free in cifs_fill_dirent (CVE-2025-38051)
  • kernel: e1000e: fix heap overflow in e1000_set_eeprom (CVE-2025-39898)
  • kernel: RDMA/rxe: Fix incomplete state save in rxe_requester (CVE-2023-53539)
  • kernel: drm/i915: mark requests for GuC virtual engines to avoid use-after-free (CVE-2023-53552)
  • kernel: net/mlx5e: Check for NOT_READY flag state after locking (CVE-2023-53581)
  • kernel: i40e: fix idx validation in config queues msg (CVE-2025-39971)
  • kernel: media: rc: fix races with imon_disconnect() (CVE-2025-39993)
  • kernel: Linux kernel: vsock vulnerability may lead to memory corruption (CVE-2025-40248)
  • kernel: drm/vmwgfx: Validate command header size against SVGA_CMD_MAX_DATASIZE (CVE-2025-40277)

For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.

Solution

For details on how to apply this update, which includes the changes described in this advisory, refer to:

https://access.redhat.com/articles/11258

The system must be rebooted for this update to take effect.

Affected Products

  • Red Hat Enterprise Linux for x86_64 - Extended Update Support Extension 8.8 x86_64
  • Red Hat Enterprise Linux Server - TUS 8.8 x86_64
  • Red Hat Enterprise Linux Server for Power LE - Update Services for SAP Solutions 8.8 ppc64le
  • Red Hat Enterprise Linux for x86_64 - Update Services for SAP Solutions 8.8 x86_64

Fixes

  • BZ - 2373329 - CVE-2025-38051 kernel: smb: client: Fix use-after-free in cifs_fill_dirent
  • BZ - 2400598 - CVE-2025-39898 kernel: e1000e: fix heap overflow in e1000_set_eeprom
  • BZ - 2401510 - CVE-2023-53539 kernel: RDMA/rxe: Fix incomplete state save in rxe_requester
  • BZ - 2401514 - CVE-2023-53552 kernel: drm/i915: mark requests for GuC virtual engines to avoid use-after-free
  • BZ - 2401545 - CVE-2023-53581 kernel: net/mlx5e: Check for NOT_READY flag state after locking
  • BZ - 2404108 - CVE-2025-39971 kernel: i40e: fix idx validation in config queues msg
  • BZ - 2404121 - CVE-2025-39993 kernel: media: rc: fix races with imon_disconnect()
  • BZ - 2418872 - CVE-2025-40248 kernel: Linux kernel: vsock vulnerability may lead to memory corruption
  • BZ - 2419954 - CVE-2025-40277 kernel: drm/vmwgfx: Validate command header size against SVGA_CMD_MAX_DATASIZE

CVEs

  • CVE-2023-53539
  • CVE-2023-53552
  • CVE-2023-53581
  • CVE-2025-38051
  • CVE-2025-39898
  • CVE-2025-39971
  • CVE-2025-39973
  • CVE-2025-39993
  • CVE-2025-40248
  • CVE-2025-40277

References

  • https://access.redhat.com/security/updates/classification/#important
Note: More recent versions of these packages may be available. Click a package name for more details.

Red Hat Enterprise Linux for x86_64 - Extended Update Support Extension 8.8

SRPM
kernel-4.18.0-477.126.1.el8_8.src.rpm SHA-256: 4327fb03a42d81d0cddc2a933b5e70e8df1e82bf606e9da9b1009cc46ed9ab69
x86_64
bpftool-4.18.0-477.126.1.el8_8.x86_64.rpm SHA-256: a07808fc0b50d351b3b360718465749721f3328bdd08f19f10830d3f63d4a6cb
bpftool-debuginfo-4.18.0-477.126.1.el8_8.x86_64.rpm SHA-256: 6da89908f64148b7d8b9f8f6bed3ad5f15afebc08518d378f86af6ac8db2782d
kernel-4.18.0-477.126.1.el8_8.x86_64.rpm SHA-256: 964b3aaf96d4dd4a1bb0be8227f9d7e972dc34d68a8fda091c4cce83b1fa8db2
kernel-abi-stablelists-4.18.0-477.126.1.el8_8.noarch.rpm SHA-256: ae653512b2aa22fd0de08d9b6aaba41be28c26e838941190e1b3e716a55cf226
kernel-core-4.18.0-477.126.1.el8_8.x86_64.rpm SHA-256: a435ee7365aa91de1d866779f7a86fe1702e02ed6a594f75f61450daeeb84a5e
kernel-cross-headers-4.18.0-477.126.1.el8_8.x86_64.rpm SHA-256: 4880855347a3dac9f17be571c6e2c3f5884c8d74cc5ed5f3b2189613b5eae2f6
kernel-debug-4.18.0-477.126.1.el8_8.x86_64.rpm SHA-256: 0d609916ccb64824e40fbe474a7e26e0ba98e6b434b55f8179c588ffb11e4192
kernel-debug-core-4.18.0-477.126.1.el8_8.x86_64.rpm SHA-256: 443e50f51a55d24df3af9fb824d6cc7c819ef68670ce631ae04c91ec22dbc0f1
kernel-debug-debuginfo-4.18.0-477.126.1.el8_8.x86_64.rpm SHA-256: 9d8ae6a989c41a26aa17e31d65ff6eef6ca328f6b143f32a0e9021d02fa3e40e
kernel-debug-devel-4.18.0-477.126.1.el8_8.x86_64.rpm SHA-256: 7485d1ad0651ecf35e1191d57a2dcc81c66c4075af907de5c1d5a1a627e5067c
kernel-debug-modules-4.18.0-477.126.1.el8_8.x86_64.rpm SHA-256: 16ba87ff1637f27e758b10a31e51ad825ffe027fcd209f77738eef80517379e1
kernel-debug-modules-extra-4.18.0-477.126.1.el8_8.x86_64.rpm SHA-256: d6a9d3b3a2dbd4c99fa8c6ec11c844f46108f1ab2dcefc011a40e782d39e1565
kernel-debuginfo-4.18.0-477.126.1.el8_8.x86_64.rpm SHA-256: 58537a1051782c1b92021ea85573cb56bc3b2314ab7b1938ef7ed8e842e58b9d
kernel-debuginfo-common-x86_64-4.18.0-477.126.1.el8_8.x86_64.rpm SHA-256: 2f9dc238d8e66e76d30468e44d0d0144a3848fb82bc2fea8eeec2f88c1070668
kernel-devel-4.18.0-477.126.1.el8_8.x86_64.rpm SHA-256: f1d1496f0ea00854d7e11d98325a3f3fda096bc14a8a0c8117f9effc12c29369
kernel-doc-4.18.0-477.126.1.el8_8.noarch.rpm SHA-256: 6dc3ae0dcedb9d00b52a8c7f21feec3ac3a0df7daff050f1fc1d880257d353ac
kernel-headers-4.18.0-477.126.1.el8_8.x86_64.rpm SHA-256: 2dbc9c5262010eabbd96bda7e239e5229f7ebdc5a3938b4f149bc7b80c1e6271
kernel-modules-4.18.0-477.126.1.el8_8.x86_64.rpm SHA-256: 773b09cc80e849d150814d58a47d87a35f468eb0ddc543b0d388b8551f870d68
kernel-modules-extra-4.18.0-477.126.1.el8_8.x86_64.rpm SHA-256: 873f3d255b768d91af5fe11b905dd70d5c7e67ca838556f19ac2a2133288a1e8
kernel-tools-4.18.0-477.126.1.el8_8.x86_64.rpm SHA-256: 8779bd799eac0d1db7854ef7115347570dd91bfe2d1f579c9816bd962a4f07ba
kernel-tools-debuginfo-4.18.0-477.126.1.el8_8.x86_64.rpm SHA-256: 55e289b9a5b2197ea844e889051c840a35828c0e64a18909c04f1ca160c941cc
kernel-tools-libs-4.18.0-477.126.1.el8_8.x86_64.rpm SHA-256: 58af81bb9736c2bac99fec20071812d7b4856f12353fbeb340904bfddd5fe78a
perf-4.18.0-477.126.1.el8_8.x86_64.rpm SHA-256: b18b82c7f0de7229e0dde53acee3a847823682ec74fbaf1e0aafe86e758476da
perf-debuginfo-4.18.0-477.126.1.el8_8.x86_64.rpm SHA-256: a78e50b22dd037275a4e5e15f80d81d3dbebd390d51c6830ec1f8b08523175a5
python3-perf-4.18.0-477.126.1.el8_8.x86_64.rpm SHA-256: c523f7a101d279c36febc4d3e11eea1d5f93583b43e0583151a063d791f3803c
python3-perf-debuginfo-4.18.0-477.126.1.el8_8.x86_64.rpm SHA-256: 77875a7b428d1a676f9d40ccb8d2d6a0fc482829d6d38692c4fdc75b65980c10

Red Hat Enterprise Linux Server - TUS 8.8

SRPM
kernel-4.18.0-477.126.1.el8_8.src.rpm SHA-256: 4327fb03a42d81d0cddc2a933b5e70e8df1e82bf606e9da9b1009cc46ed9ab69
x86_64
bpftool-4.18.0-477.126.1.el8_8.x86_64.rpm SHA-256: a07808fc0b50d351b3b360718465749721f3328bdd08f19f10830d3f63d4a6cb
bpftool-debuginfo-4.18.0-477.126.1.el8_8.x86_64.rpm SHA-256: 6da89908f64148b7d8b9f8f6bed3ad5f15afebc08518d378f86af6ac8db2782d
kernel-4.18.0-477.126.1.el8_8.x86_64.rpm SHA-256: 964b3aaf96d4dd4a1bb0be8227f9d7e972dc34d68a8fda091c4cce83b1fa8db2
kernel-abi-stablelists-4.18.0-477.126.1.el8_8.noarch.rpm SHA-256: ae653512b2aa22fd0de08d9b6aaba41be28c26e838941190e1b3e716a55cf226
kernel-core-4.18.0-477.126.1.el8_8.x86_64.rpm SHA-256: a435ee7365aa91de1d866779f7a86fe1702e02ed6a594f75f61450daeeb84a5e
kernel-cross-headers-4.18.0-477.126.1.el8_8.x86_64.rpm SHA-256: 4880855347a3dac9f17be571c6e2c3f5884c8d74cc5ed5f3b2189613b5eae2f6
kernel-debug-4.18.0-477.126.1.el8_8.x86_64.rpm SHA-256: 0d609916ccb64824e40fbe474a7e26e0ba98e6b434b55f8179c588ffb11e4192
kernel-debug-core-4.18.0-477.126.1.el8_8.x86_64.rpm SHA-256: 443e50f51a55d24df3af9fb824d6cc7c819ef68670ce631ae04c91ec22dbc0f1
kernel-debug-debuginfo-4.18.0-477.126.1.el8_8.x86_64.rpm SHA-256: 9d8ae6a989c41a26aa17e31d65ff6eef6ca328f6b143f32a0e9021d02fa3e40e
kernel-debug-devel-4.18.0-477.126.1.el8_8.x86_64.rpm SHA-256: 7485d1ad0651ecf35e1191d57a2dcc81c66c4075af907de5c1d5a1a627e5067c
kernel-debug-modules-4.18.0-477.126.1.el8_8.x86_64.rpm SHA-256: 16ba87ff1637f27e758b10a31e51ad825ffe027fcd209f77738eef80517379e1
kernel-debug-modules-extra-4.18.0-477.126.1.el8_8.x86_64.rpm SHA-256: d6a9d3b3a2dbd4c99fa8c6ec11c844f46108f1ab2dcefc011a40e782d39e1565
kernel-debuginfo-4.18.0-477.126.1.el8_8.x86_64.rpm SHA-256: 58537a1051782c1b92021ea85573cb56bc3b2314ab7b1938ef7ed8e842e58b9d
kernel-debuginfo-common-x86_64-4.18.0-477.126.1.el8_8.x86_64.rpm SHA-256: 2f9dc238d8e66e76d30468e44d0d0144a3848fb82bc2fea8eeec2f88c1070668
kernel-devel-4.18.0-477.126.1.el8_8.x86_64.rpm SHA-256: f1d1496f0ea00854d7e11d98325a3f3fda096bc14a8a0c8117f9effc12c29369
kernel-doc-4.18.0-477.126.1.el8_8.noarch.rpm SHA-256: 6dc3ae0dcedb9d00b52a8c7f21feec3ac3a0df7daff050f1fc1d880257d353ac
kernel-headers-4.18.0-477.126.1.el8_8.x86_64.rpm SHA-256: 2dbc9c5262010eabbd96bda7e239e5229f7ebdc5a3938b4f149bc7b80c1e6271
kernel-modules-4.18.0-477.126.1.el8_8.x86_64.rpm SHA-256: 773b09cc80e849d150814d58a47d87a35f468eb0ddc543b0d388b8551f870d68
kernel-modules-extra-4.18.0-477.126.1.el8_8.x86_64.rpm SHA-256: 873f3d255b768d91af5fe11b905dd70d5c7e67ca838556f19ac2a2133288a1e8
kernel-tools-4.18.0-477.126.1.el8_8.x86_64.rpm SHA-256: 8779bd799eac0d1db7854ef7115347570dd91bfe2d1f579c9816bd962a4f07ba
kernel-tools-debuginfo-4.18.0-477.126.1.el8_8.x86_64.rpm SHA-256: 55e289b9a5b2197ea844e889051c840a35828c0e64a18909c04f1ca160c941cc
kernel-tools-libs-4.18.0-477.126.1.el8_8.x86_64.rpm SHA-256: 58af81bb9736c2bac99fec20071812d7b4856f12353fbeb340904bfddd5fe78a
perf-4.18.0-477.126.1.el8_8.x86_64.rpm SHA-256: b18b82c7f0de7229e0dde53acee3a847823682ec74fbaf1e0aafe86e758476da
perf-debuginfo-4.18.0-477.126.1.el8_8.x86_64.rpm SHA-256: a78e50b22dd037275a4e5e15f80d81d3dbebd390d51c6830ec1f8b08523175a5
python3-perf-4.18.0-477.126.1.el8_8.x86_64.rpm SHA-256: c523f7a101d279c36febc4d3e11eea1d5f93583b43e0583151a063d791f3803c
python3-perf-debuginfo-4.18.0-477.126.1.el8_8.x86_64.rpm SHA-256: 77875a7b428d1a676f9d40ccb8d2d6a0fc482829d6d38692c4fdc75b65980c10

Red Hat Enterprise Linux Server for Power LE - Update Services for SAP Solutions 8.8

SRPM
kernel-4.18.0-477.126.1.el8_8.src.rpm SHA-256: 4327fb03a42d81d0cddc2a933b5e70e8df1e82bf606e9da9b1009cc46ed9ab69
ppc64le
bpftool-4.18.0-477.126.1.el8_8.ppc64le.rpm SHA-256: cccc1b93c8636b97a6d55342274621e344c7efee9812c4b7552bfbd133fa94e8
bpftool-debuginfo-4.18.0-477.126.1.el8_8.ppc64le.rpm SHA-256: 2857e00cf223628e2650f8b955634a46474ccf3f802e5953cb00eb4ba9f9e71b
kernel-4.18.0-477.126.1.el8_8.ppc64le.rpm SHA-256: f5a96c8921e847c9b76a2862846d2f2302cca24bbbccfdfcde1afb768c24d744
kernel-abi-stablelists-4.18.0-477.126.1.el8_8.noarch.rpm SHA-256: ae653512b2aa22fd0de08d9b6aaba41be28c26e838941190e1b3e716a55cf226
kernel-core-4.18.0-477.126.1.el8_8.ppc64le.rpm SHA-256: 75f06c709fcccbab5f193c0c131c3175bdf9740add852ecee83c021345f6c4c2
kernel-cross-headers-4.18.0-477.126.1.el8_8.ppc64le.rpm SHA-256: a2950d1dad4a1e56b51bf302b5cbf65c20145c1ea823561a4f0e999128b14090
kernel-debug-4.18.0-477.126.1.el8_8.ppc64le.rpm SHA-256: 45ecb400eb6f2a0435e1c99026d472e66220c25c1a62c7d6e5a8bee93a78919e
kernel-debug-core-4.18.0-477.126.1.el8_8.ppc64le.rpm SHA-256: 9baccbe439670b905213091ad2aa8504377529a863c0426fc57d30b7615e7c09
kernel-debug-debuginfo-4.18.0-477.126.1.el8_8.ppc64le.rpm SHA-256: 75ab6ce19ae159a7ce976ddbc1b39085628832261ce2b14783158661001a96a2
kernel-debug-devel-4.18.0-477.126.1.el8_8.ppc64le.rpm SHA-256: 1e75b9ebcfcf358638e2d9bf6af203ef52ec63d2c7a80a04ccc2db70eb0c3922
kernel-debug-modules-4.18.0-477.126.1.el8_8.ppc64le.rpm SHA-256: e41695060e9d5095e4b1dbe193ca8269ae48c0afdd18fe66549b26ae94485b79
kernel-debug-modules-extra-4.18.0-477.126.1.el8_8.ppc64le.rpm SHA-256: 682a7e6c702ba5f0790740272e1ac1f5767d610f9fd8bc0386f4c33ed108d2ca
kernel-debuginfo-4.18.0-477.126.1.el8_8.ppc64le.rpm SHA-256: 74088c71fd91b08832aa683b9305c6ca27553aeb66712f38ed16011ce6d048a6
kernel-debuginfo-common-ppc64le-4.18.0-477.126.1.el8_8.ppc64le.rpm SHA-256: 6e6907a6c5ce105b35ec09a1746185a28e3e3b47d20f7029baf9dc0e3db93c84
kernel-devel-4.18.0-477.126.1.el8_8.ppc64le.rpm SHA-256: 6583c2059f686ca623253b6a4dd3c6f7cd004511f0302290cab29bf383cf4df3
kernel-doc-4.18.0-477.126.1.el8_8.noarch.rpm SHA-256: 6dc3ae0dcedb9d00b52a8c7f21feec3ac3a0df7daff050f1fc1d880257d353ac
kernel-headers-4.18.0-477.126.1.el8_8.ppc64le.rpm SHA-256: fc04267edd300ac18f3a06b44cd8b1ad69bd17cb97fe39d384fea6d04e0c176c
kernel-modules-4.18.0-477.126.1.el8_8.ppc64le.rpm SHA-256: ee940d6d7ab3e503f0c9b9d798ac88bfc86fa6665ac6225159329afb84bc7f8d
kernel-modules-extra-4.18.0-477.126.1.el8_8.ppc64le.rpm SHA-256: c7391e6d58f4691142c784b172ca9fc0fe35d10a4fe0c44a5530964e518215d5
kernel-tools-4.18.0-477.126.1.el8_8.ppc64le.rpm SHA-256: 6cfd5b34491a6d027a3564848f5925faa024626af78f9b47618b87c67dce50b1
kernel-tools-debuginfo-4.18.0-477.126.1.el8_8.ppc64le.rpm SHA-256: 902325ec960e8fc47090c6cccd74e66b86116711b8d11f798a5cf71e4417fd51
kernel-tools-libs-4.18.0-477.126.1.el8_8.ppc64le.rpm SHA-256: ef726a2137e6082aa6c6fa0833da30934a8767826904e8564b3e106df8546063
perf-4.18.0-477.126.1.el8_8.ppc64le.rpm SHA-256: 0754f64f8cbc7198d63f74de371d59c12902e50a07af3ed5148643418d044521
perf-debuginfo-4.18.0-477.126.1.el8_8.ppc64le.rpm SHA-256: 5620804eee237e09162d6459739a8652d5a5625a8b6957b604881e4c3a211d5e
python3-perf-4.18.0-477.126.1.el8_8.ppc64le.rpm SHA-256: 354b3bac101e1bd85f35706927b554b1961ced8ca726e87523435954e8421f05
python3-perf-debuginfo-4.18.0-477.126.1.el8_8.ppc64le.rpm SHA-256: 3cc2cacd942edc7c32abf17abffcbcf54d1be64e348001f26b98dcd0904e1e29

Red Hat Enterprise Linux for x86_64 - Update Services for SAP Solutions 8.8

SRPM
kernel-4.18.0-477.126.1.el8_8.src.rpm SHA-256: 4327fb03a42d81d0cddc2a933b5e70e8df1e82bf606e9da9b1009cc46ed9ab69
x86_64
bpftool-4.18.0-477.126.1.el8_8.x86_64.rpm SHA-256: a07808fc0b50d351b3b360718465749721f3328bdd08f19f10830d3f63d4a6cb
bpftool-debuginfo-4.18.0-477.126.1.el8_8.x86_64.rpm SHA-256: 6da89908f64148b7d8b9f8f6bed3ad5f15afebc08518d378f86af6ac8db2782d
kernel-4.18.0-477.126.1.el8_8.x86_64.rpm SHA-256: 964b3aaf96d4dd4a1bb0be8227f9d7e972dc34d68a8fda091c4cce83b1fa8db2
kernel-abi-stablelists-4.18.0-477.126.1.el8_8.noarch.rpm SHA-256: ae653512b2aa22fd0de08d9b6aaba41be28c26e838941190e1b3e716a55cf226
kernel-core-4.18.0-477.126.1.el8_8.x86_64.rpm SHA-256: a435ee7365aa91de1d866779f7a86fe1702e02ed6a594f75f61450daeeb84a5e
kernel-cross-headers-4.18.0-477.126.1.el8_8.x86_64.rpm SHA-256: 4880855347a3dac9f17be571c6e2c3f5884c8d74cc5ed5f3b2189613b5eae2f6
kernel-debug-4.18.0-477.126.1.el8_8.x86_64.rpm SHA-256: 0d609916ccb64824e40fbe474a7e26e0ba98e6b434b55f8179c588ffb11e4192
kernel-debug-core-4.18.0-477.126.1.el8_8.x86_64.rpm SHA-256: 443e50f51a55d24df3af9fb824d6cc7c819ef68670ce631ae04c91ec22dbc0f1
kernel-debug-debuginfo-4.18.0-477.126.1.el8_8.x86_64.rpm SHA-256: 9d8ae6a989c41a26aa17e31d65ff6eef6ca328f6b143f32a0e9021d02fa3e40e
kernel-debug-devel-4.18.0-477.126.1.el8_8.x86_64.rpm SHA-256: 7485d1ad0651ecf35e1191d57a2dcc81c66c4075af907de5c1d5a1a627e5067c
kernel-debug-modules-4.18.0-477.126.1.el8_8.x86_64.rpm SHA-256: 16ba87ff1637f27e758b10a31e51ad825ffe027fcd209f77738eef80517379e1
kernel-debug-modules-extra-4.18.0-477.126.1.el8_8.x86_64.rpm SHA-256: d6a9d3b3a2dbd4c99fa8c6ec11c844f46108f1ab2dcefc011a40e782d39e1565
kernel-debuginfo-4.18.0-477.126.1.el8_8.x86_64.rpm SHA-256: 58537a1051782c1b92021ea85573cb56bc3b2314ab7b1938ef7ed8e842e58b9d
kernel-debuginfo-common-x86_64-4.18.0-477.126.1.el8_8.x86_64.rpm SHA-256: 2f9dc238d8e66e76d30468e44d0d0144a3848fb82bc2fea8eeec2f88c1070668
kernel-devel-4.18.0-477.126.1.el8_8.x86_64.rpm SHA-256: f1d1496f0ea00854d7e11d98325a3f3fda096bc14a8a0c8117f9effc12c29369
kernel-doc-4.18.0-477.126.1.el8_8.noarch.rpm SHA-256: 6dc3ae0dcedb9d00b52a8c7f21feec3ac3a0df7daff050f1fc1d880257d353ac
kernel-headers-4.18.0-477.126.1.el8_8.x86_64.rpm SHA-256: 2dbc9c5262010eabbd96bda7e239e5229f7ebdc5a3938b4f149bc7b80c1e6271
kernel-modules-4.18.0-477.126.1.el8_8.x86_64.rpm SHA-256: 773b09cc80e849d150814d58a47d87a35f468eb0ddc543b0d388b8551f870d68
kernel-modules-extra-4.18.0-477.126.1.el8_8.x86_64.rpm SHA-256: 873f3d255b768d91af5fe11b905dd70d5c7e67ca838556f19ac2a2133288a1e8
kernel-tools-4.18.0-477.126.1.el8_8.x86_64.rpm SHA-256: 8779bd799eac0d1db7854ef7115347570dd91bfe2d1f579c9816bd962a4f07ba
kernel-tools-debuginfo-4.18.0-477.126.1.el8_8.x86_64.rpm SHA-256: 55e289b9a5b2197ea844e889051c840a35828c0e64a18909c04f1ca160c941cc
kernel-tools-libs-4.18.0-477.126.1.el8_8.x86_64.rpm SHA-256: 58af81bb9736c2bac99fec20071812d7b4856f12353fbeb340904bfddd5fe78a
perf-4.18.0-477.126.1.el8_8.x86_64.rpm SHA-256: b18b82c7f0de7229e0dde53acee3a847823682ec74fbaf1e0aafe86e758476da
perf-debuginfo-4.18.0-477.126.1.el8_8.x86_64.rpm SHA-256: a78e50b22dd037275a4e5e15f80d81d3dbebd390d51c6830ec1f8b08523175a5
python3-perf-4.18.0-477.126.1.el8_8.x86_64.rpm SHA-256: c523f7a101d279c36febc4d3e11eea1d5f93583b43e0583151a063d791f3803c
python3-perf-debuginfo-4.18.0-477.126.1.el8_8.x86_64.rpm SHA-256: 77875a7b428d1a676f9d40ccb8d2d6a0fc482829d6d38692c4fdc75b65980c10

The Red Hat security contact is secalert@redhat.com. More contact details at https://access.redhat.com/security/team/contact/.

Red Hat LinkedIn YouTube Facebook X, formerly Twitter

Quick Links

  • Downloads
  • Subscriptions
  • Support Cases
  • Customer Service
  • Product Documentation

Help

  • Contact Us
  • Customer Portal FAQ
  • Log-in Assistance

Site Info

  • Trust Red Hat
  • Browser Support Policy
  • Accessibility
  • Awards and Recognition
  • Colophon

Related Sites

  • redhat.com
  • developers.redhat.com
  • connect.redhat.com
  • cloud.redhat.com

Red Hat legal and privacy links

  • About Red Hat
  • Jobs
  • Events
  • Locations
  • Contact Red Hat
  • Red Hat Blog
  • Inclusion at Red Hat
  • Cool Stuff Store
  • Red Hat Summit
© 2026 Red Hat

Red Hat legal and privacy links

  • Privacy statement
  • Terms of use
  • All policies and guidelines
  • Digital accessibility