Skip to navigation Skip to main content

Utilities

  • Subscriptions
  • Downloads
  • Red Hat Console
  • Get Support
Red Hat Customer Portal
  • Subscriptions
  • Downloads
  • Red Hat Console
  • Get Support
  • Products

    Top Products

    • Red Hat Enterprise Linux
    • Red Hat OpenShift
    • Red Hat Ansible Automation Platform
    All Products

    Downloads and Containers

    • Downloads
    • Packages
    • Containers

    Top Resources

    • Documentation
    • Product Life Cycles
    • Product Compliance
    • Errata
  • Knowledge

    Red Hat Knowledge Center

    • Knowledgebase Solutions
    • Knowledgebase Articles
    • Customer Portal Labs
    • Errata

    Top Product Docs

    • Red Hat Enterprise Linux
    • Red Hat OpenShift
    • Red Hat Ansible Automation Platform
    All Product Docs

    Training and Certification

    • About
    • Course Index
    • Certification Index
    • Skill Assessment
  • Security

    Red Hat Product Security Center

    • Security Updates
    • Security Advisories
    • Red Hat CVE Database
    • Errata

    References

    • Security Bulletins
    • Severity Ratings
    • Security Data

    Top Resources

    • Security Labs
    • Backporting Policies
    • Security Blog
  • Support

    Red Hat Support

    • Support Cases
    • Troubleshoot
    • Get Support
    • Contact Red Hat Support

    Red Hat Community Support

    • Customer Portal Community
    • Community Discussions
    • Red Hat Accelerator Program

    Top Resources

    • Product Life Cycles
    • Customer Portal Labs
    • Red Hat JBoss Supported Configurations
    • Red Hat Lightspeed
Or troubleshoot an issue.

Select Your Language

  • English
  • Français
  • 한국어
  • 日本語
  • 中文 (中国)

Infrastructure and Management

  • Red Hat Enterprise Linux
  • Red Hat Satellite
  • Red Hat Subscription Management
  • Red Hat Lightspeed
  • Red Hat Ansible Automation Platform

Cloud Computing

  • Red Hat OpenShift
  • Red Hat OpenStack Platform
  • Red Hat OpenShift
  • Red Hat OpenShift AI
  • Red Hat OpenShift Dedicated
  • Red Hat Advanced Cluster Security for Kubernetes
  • Red Hat Advanced Cluster Management for Kubernetes
  • Red Hat Quay
  • Red Hat OpenShift Dev Spaces
  • Red Hat OpenShift Service on AWS

Storage

  • Red Hat Gluster Storage
  • Red Hat Hyperconverged Infrastructure
  • Red Hat Ceph Storage
  • Red Hat OpenShift Data Foundation

Runtimes

  • Red Hat Runtimes
  • Red Hat JBoss Enterprise Application Platform
  • Red Hat Data Grid
  • Red Hat JBoss Web Server
  • Red Hat build of Keycloak
  • Red Hat support for Spring Boot
  • Red Hat build of Node.js
  • Red Hat build of Quarkus

Integration and Automation

  • Red Hat Application Foundations
  • Red Hat Fuse
  • Red Hat AMQ
  • Red Hat 3scale API Management
All Products
Red Hat Product Errata RHSA-2026:2535 - Security Advisory
Issued:
2026-02-11
Updated:
2026-02-11

RHSA-2026:2535 - Security Advisory

  • Overview
  • Updated Packages

Synopsis

Moderate: kernel security update

Type/Severity

Security Advisory: Moderate

Red Hat Lightspeed patch analysis

Identify and remediate systems affected by this advisory.

View affected systems

Topic

An update for kernel is now available for Red Hat Enterprise Linux 8.8 Update Services for SAP Solutions and Red Hat Enterprise Linux 8.8 Telecommunications Update Service.

Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.

Description

The kernel packages contain the Linux kernel, the core of any Linux operating system.

Security Fix(es):

  • kernel: RDMA/core: Fix "KASAN: slab-use-after-free Read in ib_register_device" problem (CVE-2025-38022)
  • kernel: Bluetooth: hci_event: call disconnect callback before deleting conn (CVE-2023-53673)
  • kernel: drm/sched: Fix potential double free in drm_sched_job_add_resv_dependencies (CVE-2025-40096)
  • kernel: ASoC: Intel: bytcr_rt5640: Fix invalid quirk input mapping (CVE-2025-40154)
  • kernel: sctp: avoid NULL dereference when chunk data buffer is missing (CVE-2025-40240)
  • kernel: mptcp: fix race condition in mptcp_schedule_work() (CVE-2025-40258)
  • kernel: Linux kernel Bluetooth L2CAP: Kernel crash due to use-after-free via race condition (CVE-2023-53751)
  • kernel: Linux kernel: Out-of-bounds write in fbdev can lead to privilege escalation, information disclosure, or denial of service. (CVE-2025-40304)
  • kernel: Linux kernel: Information disclosure and denial of service via out-of-bounds read in font glyph handling (CVE-2025-40322)
  • kernel: drm/i915: Fix NULL ptr deref by checking new_crtc_state (CVE-2023-53833)
  • kernel: net: atlantic: fix fragment overflow handling in RX path (CVE-2025-68301)

For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.

Solution

For details on how to apply this update, which includes the changes described in this advisory, refer to:

https://access.redhat.com/articles/11258

The system must be rebooted for this update to take effect.

Affected Products

  • Red Hat Enterprise Linux for x86_64 - Extended Update Support Extension 8.8 x86_64
  • Red Hat Enterprise Linux Server - TUS 8.8 x86_64
  • Red Hat Enterprise Linux Server for Power LE - Update Services for SAP Solutions 8.8 ppc64le
  • Red Hat Enterprise Linux for x86_64 - Update Services for SAP Solutions 8.8 x86_64

Fixes

  • BZ - 2373326 - CVE-2025-38022 kernel: RDMA/core: Fix "KASAN: slab-use-after-free Read in ib_register_device" problem
  • BZ - 2402193 - CVE-2023-53673 kernel: Bluetooth: hci_event: call disconnect callback before deleting conn
  • BZ - 2407333 - CVE-2025-40096 kernel: drm/sched: Fix potential double free in drm_sched_job_add_resv_dependencies
  • BZ - 2414494 - CVE-2025-40154 kernel: ASoC: Intel: bytcr_rt5640: Fix invalid quirk input mapping
  • BZ - 2418832 - CVE-2025-40240 kernel: sctp: avoid NULL dereference when chunk data buffer is missing
  • BZ - 2418876 - CVE-2025-40258 kernel: mptcp: fix race condition in mptcp_schedule_work()
  • BZ - 2419858 - CVE-2023-53751 kernel: Linux kernel Bluetooth L2CAP: Kernel crash due to use-after-free via race condition
  • BZ - 2419870 - CVE-2025-40304 kernel: Linux kernel: Out-of-bounds write in fbdev can lead to privilege escalation, information disclosure, or denial of service.
  • BZ - 2419902 - CVE-2025-40322 kernel: Linux kernel: Information disclosure and denial of service via out-of-bounds read in font glyph handling
  • BZ - 2420366 - CVE-2023-53833 kernel: drm/i915: Fix NULL ptr deref by checking new_crtc_state
  • BZ - 2422836 - CVE-2025-68301 kernel: net: atlantic: fix fragment overflow handling in RX path

CVEs

  • CVE-2023-53673
  • CVE-2023-53751
  • CVE-2023-53833
  • CVE-2025-38022
  • CVE-2025-40096
  • CVE-2025-40154
  • CVE-2025-40240
  • CVE-2025-40258
  • CVE-2025-40304
  • CVE-2025-40322
  • CVE-2025-68301

References

  • https://access.redhat.com/security/updates/classification/#moderate
Note: More recent versions of these packages may be available. Click a package name for more details.

Red Hat Enterprise Linux for x86_64 - Extended Update Support Extension 8.8

SRPM
kernel-4.18.0-477.128.1.el8_8.src.rpm SHA-256: 62ad7c86c1fb7686e58dae06a82942a6884d6d03f964b2297e4edcf0a960aaf0
x86_64
bpftool-4.18.0-477.128.1.el8_8.x86_64.rpm SHA-256: cb84dbd3359c3fa3131d27a72d8be50b505987194b8083f63fcf53b2898da1ba
bpftool-debuginfo-4.18.0-477.128.1.el8_8.x86_64.rpm SHA-256: 9fb1d7c4604326a4c72b061760d871379b84b153a4473bb8331a1314d8c8cb08
kernel-4.18.0-477.128.1.el8_8.x86_64.rpm SHA-256: 5bc6373a69f878541f63e645ac60fef6854b9bf47a506002fcb1bc11b22a5af5
kernel-abi-stablelists-4.18.0-477.128.1.el8_8.noarch.rpm SHA-256: 32377e8518cfc76e1d629bd4e5cb11b7c614c499168930bc4bc116dee219d8d8
kernel-core-4.18.0-477.128.1.el8_8.x86_64.rpm SHA-256: 9c1af3ffb39c2d9af199e99efbdf0caf0d1765bbf1f1031094a7ea11c14783aa
kernel-cross-headers-4.18.0-477.128.1.el8_8.x86_64.rpm SHA-256: 91da598c5fbfdee691d372a4f496a21bac93413519dfd22f25fa92a1613d6443
kernel-debug-4.18.0-477.128.1.el8_8.x86_64.rpm SHA-256: ca2c5aaeb1289e8cb1ede78890d09f9466d4644762832458eefb007fd620bc66
kernel-debug-core-4.18.0-477.128.1.el8_8.x86_64.rpm SHA-256: 98d1c8d92a226d51be28b9528a490c111226f0812fea6904c7b9b4efbf62f201
kernel-debug-debuginfo-4.18.0-477.128.1.el8_8.x86_64.rpm SHA-256: ea099e1e2d627899378b4a9a9c70dda65756d1200d4c21d4b18e0b79b63ef219
kernel-debug-devel-4.18.0-477.128.1.el8_8.x86_64.rpm SHA-256: c66858b11677c9f8dbd86bfd0ab03c093a63cb91cd3e686c0e2783cda0979a39
kernel-debug-modules-4.18.0-477.128.1.el8_8.x86_64.rpm SHA-256: 1062dec49e8b2ba910f8d77ccd9c1fd2206e2755dff23b3e6df841e56ace99fd
kernel-debug-modules-extra-4.18.0-477.128.1.el8_8.x86_64.rpm SHA-256: 184456c2bf51b771f4af2a79f94dd8329d39f6c23407fbb7c9aafa9773e3b245
kernel-debuginfo-4.18.0-477.128.1.el8_8.x86_64.rpm SHA-256: c43000432ac3c441a21ec232aa72be73664f08ce77bf5f50cfd9445c3254c73a
kernel-debuginfo-common-x86_64-4.18.0-477.128.1.el8_8.x86_64.rpm SHA-256: fdf3cd783217c38c1f3620d7941d80f6d2cd58f812dfd185959daf7b7fbfd617
kernel-devel-4.18.0-477.128.1.el8_8.x86_64.rpm SHA-256: 152581fce5a8ef1632dc13505fcf0768d4b25c04d029dd61be61c09f48cad15f
kernel-doc-4.18.0-477.128.1.el8_8.noarch.rpm SHA-256: c3df59e1d1fb84e86b1d0a2264a5deda95c3b07d72f3e300d514937f03e9b245
kernel-headers-4.18.0-477.128.1.el8_8.x86_64.rpm SHA-256: 1f81411f99c90019b36d1d81f230b104d737e8d5156c7ffe2fd64b545801225e
kernel-modules-4.18.0-477.128.1.el8_8.x86_64.rpm SHA-256: f13017b55303bb22e5292752a0314e0cb8cdf9638d056d540c5bcd5866a81a4d
kernel-modules-extra-4.18.0-477.128.1.el8_8.x86_64.rpm SHA-256: 6bd7cd6914bbf4aca1a19aa1e9758e01ae7f9a4f7a9caf720dc6965ef7a15960
kernel-tools-4.18.0-477.128.1.el8_8.x86_64.rpm SHA-256: 2c2377472dce2b9c11e3c7021538f8e6f27177d50ea8a781365cd15e31febb0e
kernel-tools-debuginfo-4.18.0-477.128.1.el8_8.x86_64.rpm SHA-256: e8d2d9b7dc2a5f62d0200668e82f999d3217b3a19e1b2646189e703f916f1121
kernel-tools-libs-4.18.0-477.128.1.el8_8.x86_64.rpm SHA-256: 0661edba14656f087499771d8a57659ad357de65c82173cb3e60ff8995855963
perf-4.18.0-477.128.1.el8_8.x86_64.rpm SHA-256: f9a60e7c6885f0b829a830761ce126c85f1b4a9c5a1b8b4fa5a43d06c8bb7114
perf-debuginfo-4.18.0-477.128.1.el8_8.x86_64.rpm SHA-256: 4c80a105332db9031b6571844312aaa4a254550e71cfbe176d25f6e75409aab9
python3-perf-4.18.0-477.128.1.el8_8.x86_64.rpm SHA-256: 3a6bee4ee4775c904ab55f265eea83777c1a36bad256e7aa3e306fa26e92b369
python3-perf-debuginfo-4.18.0-477.128.1.el8_8.x86_64.rpm SHA-256: 4dafcd4fa6da7d9d1ea49b13e9a01fa663922ffd3fc3213cf271c2516171616b

Red Hat Enterprise Linux Server - TUS 8.8

SRPM
kernel-4.18.0-477.128.1.el8_8.src.rpm SHA-256: 62ad7c86c1fb7686e58dae06a82942a6884d6d03f964b2297e4edcf0a960aaf0
x86_64
bpftool-4.18.0-477.128.1.el8_8.x86_64.rpm SHA-256: cb84dbd3359c3fa3131d27a72d8be50b505987194b8083f63fcf53b2898da1ba
bpftool-debuginfo-4.18.0-477.128.1.el8_8.x86_64.rpm SHA-256: 9fb1d7c4604326a4c72b061760d871379b84b153a4473bb8331a1314d8c8cb08
kernel-4.18.0-477.128.1.el8_8.x86_64.rpm SHA-256: 5bc6373a69f878541f63e645ac60fef6854b9bf47a506002fcb1bc11b22a5af5
kernel-abi-stablelists-4.18.0-477.128.1.el8_8.noarch.rpm SHA-256: 32377e8518cfc76e1d629bd4e5cb11b7c614c499168930bc4bc116dee219d8d8
kernel-core-4.18.0-477.128.1.el8_8.x86_64.rpm SHA-256: 9c1af3ffb39c2d9af199e99efbdf0caf0d1765bbf1f1031094a7ea11c14783aa
kernel-cross-headers-4.18.0-477.128.1.el8_8.x86_64.rpm SHA-256: 91da598c5fbfdee691d372a4f496a21bac93413519dfd22f25fa92a1613d6443
kernel-debug-4.18.0-477.128.1.el8_8.x86_64.rpm SHA-256: ca2c5aaeb1289e8cb1ede78890d09f9466d4644762832458eefb007fd620bc66
kernel-debug-core-4.18.0-477.128.1.el8_8.x86_64.rpm SHA-256: 98d1c8d92a226d51be28b9528a490c111226f0812fea6904c7b9b4efbf62f201
kernel-debug-debuginfo-4.18.0-477.128.1.el8_8.x86_64.rpm SHA-256: ea099e1e2d627899378b4a9a9c70dda65756d1200d4c21d4b18e0b79b63ef219
kernel-debug-devel-4.18.0-477.128.1.el8_8.x86_64.rpm SHA-256: c66858b11677c9f8dbd86bfd0ab03c093a63cb91cd3e686c0e2783cda0979a39
kernel-debug-modules-4.18.0-477.128.1.el8_8.x86_64.rpm SHA-256: 1062dec49e8b2ba910f8d77ccd9c1fd2206e2755dff23b3e6df841e56ace99fd
kernel-debug-modules-extra-4.18.0-477.128.1.el8_8.x86_64.rpm SHA-256: 184456c2bf51b771f4af2a79f94dd8329d39f6c23407fbb7c9aafa9773e3b245
kernel-debuginfo-4.18.0-477.128.1.el8_8.x86_64.rpm SHA-256: c43000432ac3c441a21ec232aa72be73664f08ce77bf5f50cfd9445c3254c73a
kernel-debuginfo-common-x86_64-4.18.0-477.128.1.el8_8.x86_64.rpm SHA-256: fdf3cd783217c38c1f3620d7941d80f6d2cd58f812dfd185959daf7b7fbfd617
kernel-devel-4.18.0-477.128.1.el8_8.x86_64.rpm SHA-256: 152581fce5a8ef1632dc13505fcf0768d4b25c04d029dd61be61c09f48cad15f
kernel-doc-4.18.0-477.128.1.el8_8.noarch.rpm SHA-256: c3df59e1d1fb84e86b1d0a2264a5deda95c3b07d72f3e300d514937f03e9b245
kernel-headers-4.18.0-477.128.1.el8_8.x86_64.rpm SHA-256: 1f81411f99c90019b36d1d81f230b104d737e8d5156c7ffe2fd64b545801225e
kernel-modules-4.18.0-477.128.1.el8_8.x86_64.rpm SHA-256: f13017b55303bb22e5292752a0314e0cb8cdf9638d056d540c5bcd5866a81a4d
kernel-modules-extra-4.18.0-477.128.1.el8_8.x86_64.rpm SHA-256: 6bd7cd6914bbf4aca1a19aa1e9758e01ae7f9a4f7a9caf720dc6965ef7a15960
kernel-tools-4.18.0-477.128.1.el8_8.x86_64.rpm SHA-256: 2c2377472dce2b9c11e3c7021538f8e6f27177d50ea8a781365cd15e31febb0e
kernel-tools-debuginfo-4.18.0-477.128.1.el8_8.x86_64.rpm SHA-256: e8d2d9b7dc2a5f62d0200668e82f999d3217b3a19e1b2646189e703f916f1121
kernel-tools-libs-4.18.0-477.128.1.el8_8.x86_64.rpm SHA-256: 0661edba14656f087499771d8a57659ad357de65c82173cb3e60ff8995855963
perf-4.18.0-477.128.1.el8_8.x86_64.rpm SHA-256: f9a60e7c6885f0b829a830761ce126c85f1b4a9c5a1b8b4fa5a43d06c8bb7114
perf-debuginfo-4.18.0-477.128.1.el8_8.x86_64.rpm SHA-256: 4c80a105332db9031b6571844312aaa4a254550e71cfbe176d25f6e75409aab9
python3-perf-4.18.0-477.128.1.el8_8.x86_64.rpm SHA-256: 3a6bee4ee4775c904ab55f265eea83777c1a36bad256e7aa3e306fa26e92b369
python3-perf-debuginfo-4.18.0-477.128.1.el8_8.x86_64.rpm SHA-256: 4dafcd4fa6da7d9d1ea49b13e9a01fa663922ffd3fc3213cf271c2516171616b

Red Hat Enterprise Linux Server for Power LE - Update Services for SAP Solutions 8.8

SRPM
kernel-4.18.0-477.128.1.el8_8.src.rpm SHA-256: 62ad7c86c1fb7686e58dae06a82942a6884d6d03f964b2297e4edcf0a960aaf0
ppc64le
bpftool-4.18.0-477.128.1.el8_8.ppc64le.rpm SHA-256: 4de9f80d15a0b94e26af9daf1a137ae19d490c427b8e94df61c3d15f82991f32
bpftool-debuginfo-4.18.0-477.128.1.el8_8.ppc64le.rpm SHA-256: 8db9163392347afe284d7571788840bbfcf336dbed6f8982b5f3dcd73cf4b3d1
kernel-4.18.0-477.128.1.el8_8.ppc64le.rpm SHA-256: e3b17a7587c7aee3f05cac78c317df1638abc9058ca527f346815f4c36bfef2f
kernel-abi-stablelists-4.18.0-477.128.1.el8_8.noarch.rpm SHA-256: 32377e8518cfc76e1d629bd4e5cb11b7c614c499168930bc4bc116dee219d8d8
kernel-core-4.18.0-477.128.1.el8_8.ppc64le.rpm SHA-256: 817f3d6455220e40cdfd9e267c3a1071124c3bcb7be032db0340e3c3dc9e0900
kernel-cross-headers-4.18.0-477.128.1.el8_8.ppc64le.rpm SHA-256: 820cb41c5bc885d2445c079a2a85d08755c92537aa5ce65048cbfefb1fee0a2e
kernel-debug-4.18.0-477.128.1.el8_8.ppc64le.rpm SHA-256: 1367019604882466e36980b41fb7edbd04685d3470b7412cce2fd4f325119e3e
kernel-debug-core-4.18.0-477.128.1.el8_8.ppc64le.rpm SHA-256: 6bdb4c34e509e3fbb15e4fe218757bfd2a276e35c13ff1311b2701435dfb6651
kernel-debug-debuginfo-4.18.0-477.128.1.el8_8.ppc64le.rpm SHA-256: 98a249f216f8624522dcce9c420ec26017fba5eda7ee140b3d67332bf4da0ac8
kernel-debug-devel-4.18.0-477.128.1.el8_8.ppc64le.rpm SHA-256: fb8ca7d9ea36267c650ad4890a84620a55de6edb75498d977bc7347ff4fae246
kernel-debug-modules-4.18.0-477.128.1.el8_8.ppc64le.rpm SHA-256: 9a6f6618d1d28bbc4d653ad2b341e252dc52e013b85c38e2d596f85a731096f1
kernel-debug-modules-extra-4.18.0-477.128.1.el8_8.ppc64le.rpm SHA-256: a564faaae31d6f480ec1a31c9d65a3157e0d8b61c256468c6a2f89cff9e6fa79
kernel-debuginfo-4.18.0-477.128.1.el8_8.ppc64le.rpm SHA-256: 8727639afef823e9b09321aaddd2ca4869e47a48427745b3b130114c15f48915
kernel-debuginfo-common-ppc64le-4.18.0-477.128.1.el8_8.ppc64le.rpm SHA-256: b6e7694d4a1bfbd87ec0d2f728fa3fb8c4ba53b34f7251848012127360d056c7
kernel-devel-4.18.0-477.128.1.el8_8.ppc64le.rpm SHA-256: 8478f5c8a27f33b3161f1f60ee28a32d4314ba0b515860fb06c22c94ca473283
kernel-doc-4.18.0-477.128.1.el8_8.noarch.rpm SHA-256: c3df59e1d1fb84e86b1d0a2264a5deda95c3b07d72f3e300d514937f03e9b245
kernel-headers-4.18.0-477.128.1.el8_8.ppc64le.rpm SHA-256: 10841c96d2d698cdeff954ee69c64b1f8ea95f0825ae4ec1c35cdf28108028f6
kernel-modules-4.18.0-477.128.1.el8_8.ppc64le.rpm SHA-256: fbe3fd61729dac3303171f7cb9f1e696400ee403d52a460d1ae12766bc51c997
kernel-modules-extra-4.18.0-477.128.1.el8_8.ppc64le.rpm SHA-256: ba4d6a4ece49388bde729a9199138b145e0c29401a8f298d34a5c35d0abe017d
kernel-tools-4.18.0-477.128.1.el8_8.ppc64le.rpm SHA-256: 1f80ec930bfc11f28b03aff84006d67f138962f27abde97c600bd612cb4f476f
kernel-tools-debuginfo-4.18.0-477.128.1.el8_8.ppc64le.rpm SHA-256: 14a22add2d0d5e2d81426876f965072c250d189af6a9eeb1a2eb0719c504d871
kernel-tools-libs-4.18.0-477.128.1.el8_8.ppc64le.rpm SHA-256: 50123b7f97d29e1c7125fecd4bf7b44aef2e3bb1aa65e1e74e4d6d6436036ae1
perf-4.18.0-477.128.1.el8_8.ppc64le.rpm SHA-256: 974899765eaf7cf15fc82c9468e9d0b973cfed53dcf07c6da0f5e5e50455a905
perf-debuginfo-4.18.0-477.128.1.el8_8.ppc64le.rpm SHA-256: b3756dfbb2f4bb57edf6409582770af0a7caeb31cd7fc60d7ebfb30230fe66df
python3-perf-4.18.0-477.128.1.el8_8.ppc64le.rpm SHA-256: 8ae39691b10a8e603e3743d74db2b56b70d3c6b8b88e50735b5e8a80650fde72
python3-perf-debuginfo-4.18.0-477.128.1.el8_8.ppc64le.rpm SHA-256: ebfef90615c35366d7644a072abcb35ac7eaf1b16ef4a8a6973a150c359760d5

Red Hat Enterprise Linux for x86_64 - Update Services for SAP Solutions 8.8

SRPM
kernel-4.18.0-477.128.1.el8_8.src.rpm SHA-256: 62ad7c86c1fb7686e58dae06a82942a6884d6d03f964b2297e4edcf0a960aaf0
x86_64
bpftool-4.18.0-477.128.1.el8_8.x86_64.rpm SHA-256: cb84dbd3359c3fa3131d27a72d8be50b505987194b8083f63fcf53b2898da1ba
bpftool-debuginfo-4.18.0-477.128.1.el8_8.x86_64.rpm SHA-256: 9fb1d7c4604326a4c72b061760d871379b84b153a4473bb8331a1314d8c8cb08
kernel-4.18.0-477.128.1.el8_8.x86_64.rpm SHA-256: 5bc6373a69f878541f63e645ac60fef6854b9bf47a506002fcb1bc11b22a5af5
kernel-abi-stablelists-4.18.0-477.128.1.el8_8.noarch.rpm SHA-256: 32377e8518cfc76e1d629bd4e5cb11b7c614c499168930bc4bc116dee219d8d8
kernel-core-4.18.0-477.128.1.el8_8.x86_64.rpm SHA-256: 9c1af3ffb39c2d9af199e99efbdf0caf0d1765bbf1f1031094a7ea11c14783aa
kernel-cross-headers-4.18.0-477.128.1.el8_8.x86_64.rpm SHA-256: 91da598c5fbfdee691d372a4f496a21bac93413519dfd22f25fa92a1613d6443
kernel-debug-4.18.0-477.128.1.el8_8.x86_64.rpm SHA-256: ca2c5aaeb1289e8cb1ede78890d09f9466d4644762832458eefb007fd620bc66
kernel-debug-core-4.18.0-477.128.1.el8_8.x86_64.rpm SHA-256: 98d1c8d92a226d51be28b9528a490c111226f0812fea6904c7b9b4efbf62f201
kernel-debug-debuginfo-4.18.0-477.128.1.el8_8.x86_64.rpm SHA-256: ea099e1e2d627899378b4a9a9c70dda65756d1200d4c21d4b18e0b79b63ef219
kernel-debug-devel-4.18.0-477.128.1.el8_8.x86_64.rpm SHA-256: c66858b11677c9f8dbd86bfd0ab03c093a63cb91cd3e686c0e2783cda0979a39
kernel-debug-modules-4.18.0-477.128.1.el8_8.x86_64.rpm SHA-256: 1062dec49e8b2ba910f8d77ccd9c1fd2206e2755dff23b3e6df841e56ace99fd
kernel-debug-modules-extra-4.18.0-477.128.1.el8_8.x86_64.rpm SHA-256: 184456c2bf51b771f4af2a79f94dd8329d39f6c23407fbb7c9aafa9773e3b245
kernel-debuginfo-4.18.0-477.128.1.el8_8.x86_64.rpm SHA-256: c43000432ac3c441a21ec232aa72be73664f08ce77bf5f50cfd9445c3254c73a
kernel-debuginfo-common-x86_64-4.18.0-477.128.1.el8_8.x86_64.rpm SHA-256: fdf3cd783217c38c1f3620d7941d80f6d2cd58f812dfd185959daf7b7fbfd617
kernel-devel-4.18.0-477.128.1.el8_8.x86_64.rpm SHA-256: 152581fce5a8ef1632dc13505fcf0768d4b25c04d029dd61be61c09f48cad15f
kernel-doc-4.18.0-477.128.1.el8_8.noarch.rpm SHA-256: c3df59e1d1fb84e86b1d0a2264a5deda95c3b07d72f3e300d514937f03e9b245
kernel-headers-4.18.0-477.128.1.el8_8.x86_64.rpm SHA-256: 1f81411f99c90019b36d1d81f230b104d737e8d5156c7ffe2fd64b545801225e
kernel-modules-4.18.0-477.128.1.el8_8.x86_64.rpm SHA-256: f13017b55303bb22e5292752a0314e0cb8cdf9638d056d540c5bcd5866a81a4d
kernel-modules-extra-4.18.0-477.128.1.el8_8.x86_64.rpm SHA-256: 6bd7cd6914bbf4aca1a19aa1e9758e01ae7f9a4f7a9caf720dc6965ef7a15960
kernel-tools-4.18.0-477.128.1.el8_8.x86_64.rpm SHA-256: 2c2377472dce2b9c11e3c7021538f8e6f27177d50ea8a781365cd15e31febb0e
kernel-tools-debuginfo-4.18.0-477.128.1.el8_8.x86_64.rpm SHA-256: e8d2d9b7dc2a5f62d0200668e82f999d3217b3a19e1b2646189e703f916f1121
kernel-tools-libs-4.18.0-477.128.1.el8_8.x86_64.rpm SHA-256: 0661edba14656f087499771d8a57659ad357de65c82173cb3e60ff8995855963
perf-4.18.0-477.128.1.el8_8.x86_64.rpm SHA-256: f9a60e7c6885f0b829a830761ce126c85f1b4a9c5a1b8b4fa5a43d06c8bb7114
perf-debuginfo-4.18.0-477.128.1.el8_8.x86_64.rpm SHA-256: 4c80a105332db9031b6571844312aaa4a254550e71cfbe176d25f6e75409aab9
python3-perf-4.18.0-477.128.1.el8_8.x86_64.rpm SHA-256: 3a6bee4ee4775c904ab55f265eea83777c1a36bad256e7aa3e306fa26e92b369
python3-perf-debuginfo-4.18.0-477.128.1.el8_8.x86_64.rpm SHA-256: 4dafcd4fa6da7d9d1ea49b13e9a01fa663922ffd3fc3213cf271c2516171616b

The Red Hat security contact is secalert@redhat.com. More contact details at https://access.redhat.com/security/team/contact/.

Red Hat LinkedIn YouTube Facebook X, formerly Twitter

Quick Links

  • Downloads
  • Subscriptions
  • Support Cases
  • Customer Service
  • Product Documentation

Help

  • Contact Us
  • Customer Portal FAQ
  • Log-in Assistance

Site Info

  • Trust Red Hat
  • Browser Support Policy
  • Accessibility
  • Awards and Recognition
  • Colophon

Related Sites

  • redhat.com
  • developers.redhat.com
  • connect.redhat.com
  • cloud.redhat.com

Red Hat legal and privacy links

  • About Red Hat
  • Jobs
  • Events
  • Locations
  • Contact Red Hat
  • Red Hat Blog
  • Inclusion at Red Hat
  • Cool Stuff Store
  • Red Hat Summit
© 2026 Red Hat

Red Hat legal and privacy links

  • Privacy statement
  • Terms of use
  • All policies and guidelines
  • Digital accessibility