Skip to navigation Skip to main content

Utilities

  • Subscriptions
  • Downloads
  • Red Hat Console
  • Get Support
Red Hat Customer Portal
  • Subscriptions
  • Downloads
  • Red Hat Console
  • Get Support
  • Products

    Top Products

    • Red Hat Enterprise Linux
    • Red Hat OpenShift
    • Red Hat Ansible Automation Platform
    All Products

    Downloads and Containers

    • Downloads
    • Packages
    • Containers

    Top Resources

    • Documentation
    • Product Life Cycles
    • Product Compliance
    • Errata
  • Knowledge

    Red Hat Knowledge Center

    • Knowledgebase Solutions
    • Knowledgebase Articles
    • Customer Portal Labs
    • Errata

    Top Product Docs

    • Red Hat Enterprise Linux
    • Red Hat OpenShift
    • Red Hat Ansible Automation Platform
    All Product Docs

    Training and Certification

    • About
    • Course Index
    • Certification Index
    • Skill Assessment
  • Security

    Red Hat Product Security Center

    • Security Updates
    • Security Advisories
    • Red Hat CVE Database
    • Errata

    References

    • Security Bulletins
    • Severity Ratings
    • Security Data

    Top Resources

    • Security Labs
    • Backporting Policies
    • Security Blog
  • Support

    Red Hat Support

    • Support Cases
    • Troubleshoot
    • Get Support
    • Contact Red Hat Support

    Red Hat Community Support

    • Customer Portal Community
    • Community Discussions
    • Red Hat Accelerator Program

    Top Resources

    • Product Life Cycles
    • Customer Portal Labs
    • Red Hat JBoss Supported Configurations
    • Red Hat Lightspeed
Or troubleshoot an issue.

Select Your Language

  • English
  • Français
  • 한국어
  • 日本語
  • 中文 (中国)

Infrastructure and Management

  • Red Hat Enterprise Linux
  • Red Hat Satellite
  • Red Hat Subscription Management
  • Red Hat Lightspeed
  • Red Hat Ansible Automation Platform

Cloud Computing

  • Red Hat OpenShift
  • Red Hat OpenStack Platform
  • Red Hat OpenShift
  • Red Hat OpenShift AI
  • Red Hat OpenShift Dedicated
  • Red Hat Advanced Cluster Security for Kubernetes
  • Red Hat Advanced Cluster Management for Kubernetes
  • Red Hat Quay
  • Red Hat OpenShift Dev Spaces
  • Red Hat OpenShift Service on AWS

Storage

  • Red Hat Gluster Storage
  • Red Hat Hyperconverged Infrastructure
  • Red Hat Ceph Storage
  • Red Hat OpenShift Data Foundation

Runtimes

  • Red Hat Runtimes
  • Red Hat JBoss Enterprise Application Platform
  • Red Hat Data Grid
  • Red Hat JBoss Web Server
  • Red Hat build of Keycloak
  • Red Hat support for Spring Boot
  • Red Hat build of Node.js
  • Red Hat build of Quarkus

Integration and Automation

  • Red Hat Application Foundations
  • Red Hat Fuse
  • Red Hat AMQ
  • Red Hat 3scale API Management
All Products
Red Hat Product Errata RHSA-2026:3277 - Security Advisory
Issued:
2026-02-25
Updated:
2026-02-25

RHSA-2026:3277 - Security Advisory

  • Overview
  • Updated Packages

Synopsis

Important: kernel security update

Type/Severity

Security Advisory: Important

Red Hat Lightspeed patch analysis

Identify and remediate systems affected by this advisory.

View affected systems

Topic

An update for kernel is now available for Red Hat Enterprise Linux 8.8 Update Services for SAP Solutions and Red Hat Enterprise Linux 8.8 Telecommunications Update Service.

Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.

Description

The kernel packages contain the Linux kernel, the core of any Linux operating system.

Security Fix(es):

  • kernel: Linux kernel: Memory corruption in Squashfs due to incorrect block size calculation (CVE-2025-38415)
  • kernel: Linux kernel: Denial of Service in ATM CLIP module via infinite recursion (CVE-2025-38459)
  • kernel: Linux kernel: Denial of Service via out-of-bounds read in USB configuration parsing (CVE-2025-39760)
  • kernel: smb: client: let recv_done verify data_offset, data_length and remaining_data_length (CVE-2025-39933)
  • kernel: Linux kernel: Use-after-free in proc_readdir_de() can lead to privilege escalation or denial of service. (CVE-2025-40271)
  • kernel: ip6_vti: fix slab-use-after-free in decode_session6 (CVE-2023-53821)
  • kernel: ext4: fix use-after-free in ext4_orphan_cleanup (CVE-2022-50673)
  • kernel: NFSv4/pNFS: Clear NFS_INO_LAYOUTCOMMIT in pnfs_mark_layout_stateid_invalid (CVE-2025-68349)
  • kernel: tcp: fix a signed-integer-overflow bug in tcp_add_backlog() (CVE-2022-50865)
  • kernel: Linux kernel: Use-after-free in teql queueing discipline can lead to privilege escalation (CVE-2026-23074)

For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.

Solution

For details on how to apply this update, which includes the changes described in this advisory, refer to:

https://access.redhat.com/articles/11258

The system must be rebooted for this update to take effect.

Affected Products

  • Red Hat Enterprise Linux for x86_64 - Extended Update Support Extension 8.8 x86_64
  • Red Hat Enterprise Linux Server - TUS 8.8 x86_64
  • Red Hat Enterprise Linux Server for Power LE - Update Services for SAP Solutions 8.8 ppc64le
  • Red Hat Enterprise Linux for x86_64 - Update Services for SAP Solutions 8.8 x86_64

Fixes

  • BZ - 2383404 - CVE-2025-38415 kernel: Linux kernel: Memory corruption in Squashfs due to incorrect block size calculation
  • BZ - 2383487 - CVE-2025-38459 kernel: Linux kernel: Denial of Service in ATM CLIP module via infinite recursion
  • BZ - 2394601 - CVE-2025-39760 kernel: Linux kernel: Denial of Service via out-of-bounds read in USB configuration parsing
  • BZ - 2401432 - CVE-2025-39933 kernel: smb: client: let recv_done verify data_offset, data_length and remaining_data_length
  • BZ - 2419837 - CVE-2025-40271 kernel: Linux kernel: Use-after-free in proc_readdir_de() can lead to privilege escalation or denial of service.
  • BZ - 2420329 - CVE-2023-53821 kernel: ip6_vti: fix slab-use-after-free in decode_session6
  • BZ - 2420347 - CVE-2022-50673 kernel: ext4: fix use-after-free in ext4_orphan_cleanup
  • BZ - 2424880 - CVE-2025-68349 kernel: NFSv4/pNFS: Clear NFS_INO_LAYOUTCOMMIT in pnfs_mark_layout_stateid_invalid
  • BZ - 2426226 - CVE-2022-50865 kernel: tcp: fix a signed-integer-overflow bug in tcp_add_backlog()
  • BZ - 2436791 - CVE-2026-23074 kernel: Linux kernel: Use-after-free in teql queueing discipline can lead to privilege escalation

CVEs

  • CVE-2022-50673
  • CVE-2022-50865
  • CVE-2023-53821
  • CVE-2025-38415
  • CVE-2025-38459
  • CVE-2025-39760
  • CVE-2025-39933
  • CVE-2025-40271
  • CVE-2025-68349
  • CVE-2026-23074

References

  • https://access.redhat.com/security/updates/classification/#important
Note: More recent versions of these packages may be available. Click a package name for more details.

Red Hat Enterprise Linux for x86_64 - Extended Update Support Extension 8.8

SRPM
kernel-4.18.0-477.130.1.el8_8.src.rpm SHA-256: a522d6dfa41df7177a313e515780e647ef258ce1fdc59c74e220100d3feebeec
x86_64
bpftool-4.18.0-477.130.1.el8_8.x86_64.rpm SHA-256: 8011e3ad0497e072f299f51f0b327a1acb580e8dadeb1c5ea7ac3e1e74193faf
bpftool-debuginfo-4.18.0-477.130.1.el8_8.x86_64.rpm SHA-256: 784f956ca7039a5d95855cc5e6d6b55f9af06d5c8257c4009188d06d5723ccf1
kernel-4.18.0-477.130.1.el8_8.x86_64.rpm SHA-256: 6ff26b578b4556086a569524e9c0442d101d428cd8ac77d72b7e7ec595ed24e2
kernel-abi-stablelists-4.18.0-477.130.1.el8_8.noarch.rpm SHA-256: e5e5a28535684e127b170dd67c28803e9af170052d1062d3afd57fbaa6c51712
kernel-core-4.18.0-477.130.1.el8_8.x86_64.rpm SHA-256: 9da63946ba7480f41e19edaf0a51f7266a7d9b39dad0b1d12ec993c61c9a3167
kernel-cross-headers-4.18.0-477.130.1.el8_8.x86_64.rpm SHA-256: 7adcbaa6eaa36fbaa902680fb4588fe8c0a97934496e2be00582ce27dabc1952
kernel-debug-4.18.0-477.130.1.el8_8.x86_64.rpm SHA-256: 2d3c83905ec7a7600fbfa59b4602c9a70b735a3a0577676c6bda28a80923b283
kernel-debug-core-4.18.0-477.130.1.el8_8.x86_64.rpm SHA-256: 3a123a984f756da6b599d1f11376c12d0d46055be1e43307dceb117584b75f5e
kernel-debug-debuginfo-4.18.0-477.130.1.el8_8.x86_64.rpm SHA-256: 4b2b0145645385b31b01ee948047b218968a195c9d00a1ef0d2b4b067ffb10ca
kernel-debug-devel-4.18.0-477.130.1.el8_8.x86_64.rpm SHA-256: a314a614d4af4f38a2a5a67d15d25b032bf073239f1af3d12ce4f30d96be017a
kernel-debug-modules-4.18.0-477.130.1.el8_8.x86_64.rpm SHA-256: e2472d367669f71a6857eac92d186c259b5ccb030c00bf596525268132cc9baf
kernel-debug-modules-extra-4.18.0-477.130.1.el8_8.x86_64.rpm SHA-256: c63292b230bde731a78ab5de02361d08cb48eb25589e32c3a93d3717c944dd4c
kernel-debuginfo-4.18.0-477.130.1.el8_8.x86_64.rpm SHA-256: 717f7c9018770725f31d4ae2cb7ac103361576261466d840d109fc8bf6cfbed0
kernel-debuginfo-common-x86_64-4.18.0-477.130.1.el8_8.x86_64.rpm SHA-256: 72f2d18cbc2142cbd8477d96681e29b6b03bb532735512a3928e5816dfca46fe
kernel-devel-4.18.0-477.130.1.el8_8.x86_64.rpm SHA-256: 815b65b93ca46903bbe5ae58c9707269a4496417bb03f41952f19c3057338c1f
kernel-doc-4.18.0-477.130.1.el8_8.noarch.rpm SHA-256: bd6c7d76d579849ee2d61ee928fee251828560ccf0773cbdfc8ed1b060ef1741
kernel-headers-4.18.0-477.130.1.el8_8.x86_64.rpm SHA-256: 98555dec8d88b1e7919542b3af8234127397ef1168f1c5cca5ac6d5c6ff71008
kernel-modules-4.18.0-477.130.1.el8_8.x86_64.rpm SHA-256: 8b20b206837958270da15a268ad491a34cd0b06c0d4863e741b1f198916d6d56
kernel-modules-extra-4.18.0-477.130.1.el8_8.x86_64.rpm SHA-256: 52878db91991ae6bdbb453d680d2307fae80699743e8e69a17a112db08e3fdac
kernel-tools-4.18.0-477.130.1.el8_8.x86_64.rpm SHA-256: 224cf305526a909e34be57b9e9a4b56363a2c0aabd66610c80bd40253da017ba
kernel-tools-debuginfo-4.18.0-477.130.1.el8_8.x86_64.rpm SHA-256: 55316139d8825a16c74d4b25d02adf4f55f43965fc63e02a50fa13f064e24442
kernel-tools-libs-4.18.0-477.130.1.el8_8.x86_64.rpm SHA-256: c8a5471c42b4e4bc4338dfb9e78776491bda25a03509b80fef101d0842e50059
perf-4.18.0-477.130.1.el8_8.x86_64.rpm SHA-256: dd35676ad3f73fde2e56c761b1387b99d6d8204419caec430496399887ed4d2f
perf-debuginfo-4.18.0-477.130.1.el8_8.x86_64.rpm SHA-256: d0e3d02cb562d298bc4f40e68f47c2cb05cc1375b425e74c2335923bb5a08add
python3-perf-4.18.0-477.130.1.el8_8.x86_64.rpm SHA-256: 6565699b910a88a4f26095d7b13cd245f492aa2e18ba2af63cb0266fa0b2d586
python3-perf-debuginfo-4.18.0-477.130.1.el8_8.x86_64.rpm SHA-256: d76a728f4248431dd37e09315ea4be3024749e6a2632455c3f606bfe4ab7fa85

Red Hat Enterprise Linux Server - TUS 8.8

SRPM
kernel-4.18.0-477.130.1.el8_8.src.rpm SHA-256: a522d6dfa41df7177a313e515780e647ef258ce1fdc59c74e220100d3feebeec
x86_64
bpftool-4.18.0-477.130.1.el8_8.x86_64.rpm SHA-256: 8011e3ad0497e072f299f51f0b327a1acb580e8dadeb1c5ea7ac3e1e74193faf
bpftool-debuginfo-4.18.0-477.130.1.el8_8.x86_64.rpm SHA-256: 784f956ca7039a5d95855cc5e6d6b55f9af06d5c8257c4009188d06d5723ccf1
kernel-4.18.0-477.130.1.el8_8.x86_64.rpm SHA-256: 6ff26b578b4556086a569524e9c0442d101d428cd8ac77d72b7e7ec595ed24e2
kernel-abi-stablelists-4.18.0-477.130.1.el8_8.noarch.rpm SHA-256: e5e5a28535684e127b170dd67c28803e9af170052d1062d3afd57fbaa6c51712
kernel-core-4.18.0-477.130.1.el8_8.x86_64.rpm SHA-256: 9da63946ba7480f41e19edaf0a51f7266a7d9b39dad0b1d12ec993c61c9a3167
kernel-cross-headers-4.18.0-477.130.1.el8_8.x86_64.rpm SHA-256: 7adcbaa6eaa36fbaa902680fb4588fe8c0a97934496e2be00582ce27dabc1952
kernel-debug-4.18.0-477.130.1.el8_8.x86_64.rpm SHA-256: 2d3c83905ec7a7600fbfa59b4602c9a70b735a3a0577676c6bda28a80923b283
kernel-debug-core-4.18.0-477.130.1.el8_8.x86_64.rpm SHA-256: 3a123a984f756da6b599d1f11376c12d0d46055be1e43307dceb117584b75f5e
kernel-debug-debuginfo-4.18.0-477.130.1.el8_8.x86_64.rpm SHA-256: 4b2b0145645385b31b01ee948047b218968a195c9d00a1ef0d2b4b067ffb10ca
kernel-debug-devel-4.18.0-477.130.1.el8_8.x86_64.rpm SHA-256: a314a614d4af4f38a2a5a67d15d25b032bf073239f1af3d12ce4f30d96be017a
kernel-debug-modules-4.18.0-477.130.1.el8_8.x86_64.rpm SHA-256: e2472d367669f71a6857eac92d186c259b5ccb030c00bf596525268132cc9baf
kernel-debug-modules-extra-4.18.0-477.130.1.el8_8.x86_64.rpm SHA-256: c63292b230bde731a78ab5de02361d08cb48eb25589e32c3a93d3717c944dd4c
kernel-debuginfo-4.18.0-477.130.1.el8_8.x86_64.rpm SHA-256: 717f7c9018770725f31d4ae2cb7ac103361576261466d840d109fc8bf6cfbed0
kernel-debuginfo-common-x86_64-4.18.0-477.130.1.el8_8.x86_64.rpm SHA-256: 72f2d18cbc2142cbd8477d96681e29b6b03bb532735512a3928e5816dfca46fe
kernel-devel-4.18.0-477.130.1.el8_8.x86_64.rpm SHA-256: 815b65b93ca46903bbe5ae58c9707269a4496417bb03f41952f19c3057338c1f
kernel-doc-4.18.0-477.130.1.el8_8.noarch.rpm SHA-256: bd6c7d76d579849ee2d61ee928fee251828560ccf0773cbdfc8ed1b060ef1741
kernel-headers-4.18.0-477.130.1.el8_8.x86_64.rpm SHA-256: 98555dec8d88b1e7919542b3af8234127397ef1168f1c5cca5ac6d5c6ff71008
kernel-modules-4.18.0-477.130.1.el8_8.x86_64.rpm SHA-256: 8b20b206837958270da15a268ad491a34cd0b06c0d4863e741b1f198916d6d56
kernel-modules-extra-4.18.0-477.130.1.el8_8.x86_64.rpm SHA-256: 52878db91991ae6bdbb453d680d2307fae80699743e8e69a17a112db08e3fdac
kernel-tools-4.18.0-477.130.1.el8_8.x86_64.rpm SHA-256: 224cf305526a909e34be57b9e9a4b56363a2c0aabd66610c80bd40253da017ba
kernel-tools-debuginfo-4.18.0-477.130.1.el8_8.x86_64.rpm SHA-256: 55316139d8825a16c74d4b25d02adf4f55f43965fc63e02a50fa13f064e24442
kernel-tools-libs-4.18.0-477.130.1.el8_8.x86_64.rpm SHA-256: c8a5471c42b4e4bc4338dfb9e78776491bda25a03509b80fef101d0842e50059
perf-4.18.0-477.130.1.el8_8.x86_64.rpm SHA-256: dd35676ad3f73fde2e56c761b1387b99d6d8204419caec430496399887ed4d2f
perf-debuginfo-4.18.0-477.130.1.el8_8.x86_64.rpm SHA-256: d0e3d02cb562d298bc4f40e68f47c2cb05cc1375b425e74c2335923bb5a08add
python3-perf-4.18.0-477.130.1.el8_8.x86_64.rpm SHA-256: 6565699b910a88a4f26095d7b13cd245f492aa2e18ba2af63cb0266fa0b2d586
python3-perf-debuginfo-4.18.0-477.130.1.el8_8.x86_64.rpm SHA-256: d76a728f4248431dd37e09315ea4be3024749e6a2632455c3f606bfe4ab7fa85

Red Hat Enterprise Linux Server for Power LE - Update Services for SAP Solutions 8.8

SRPM
kernel-4.18.0-477.130.1.el8_8.src.rpm SHA-256: a522d6dfa41df7177a313e515780e647ef258ce1fdc59c74e220100d3feebeec
ppc64le
bpftool-4.18.0-477.130.1.el8_8.ppc64le.rpm SHA-256: 03fd7d359339a76f2a98e2fbd5386807b9358111336463289302b1143cc6b92b
bpftool-debuginfo-4.18.0-477.130.1.el8_8.ppc64le.rpm SHA-256: b9b5078f8f865eb1572cc35c7eb68540196d834b3530493790c524705c32f313
kernel-4.18.0-477.130.1.el8_8.ppc64le.rpm SHA-256: 75bc368b536da5a6649f40800af20bb6d6adae18109dc61043ae474aa55f811e
kernel-abi-stablelists-4.18.0-477.130.1.el8_8.noarch.rpm SHA-256: e5e5a28535684e127b170dd67c28803e9af170052d1062d3afd57fbaa6c51712
kernel-core-4.18.0-477.130.1.el8_8.ppc64le.rpm SHA-256: dba9190c02b8b87c92f4357d160c5f80f801ad4572205f376ee6721c62b91028
kernel-cross-headers-4.18.0-477.130.1.el8_8.ppc64le.rpm SHA-256: b6207142a53c3c1167b33ae308038d4646d89b6b0141a0c57125eb73ca0a13f2
kernel-debug-4.18.0-477.130.1.el8_8.ppc64le.rpm SHA-256: c4b4517ea9433f8cb976ef60c9e41107081f98fb150c69fd64db1712c942cef3
kernel-debug-core-4.18.0-477.130.1.el8_8.ppc64le.rpm SHA-256: 341093a5469d8bf6bdc9be31322edfe6784f1b89cb7951ba44b9c407d79dcaec
kernel-debug-debuginfo-4.18.0-477.130.1.el8_8.ppc64le.rpm SHA-256: f14da50a39600456e96a97289a320d3544377e14de69f45be0ff5488c313b639
kernel-debug-devel-4.18.0-477.130.1.el8_8.ppc64le.rpm SHA-256: 2ff53360812b5a3f65ead9b4d66f658fe37ec0cc3a3aa19eb19ee4f96a7e97fe
kernel-debug-modules-4.18.0-477.130.1.el8_8.ppc64le.rpm SHA-256: 0b1fd92238a82e561b90aeb0844dc8c07c4ae3a15d46933bfcd55b41f28e60b5
kernel-debug-modules-extra-4.18.0-477.130.1.el8_8.ppc64le.rpm SHA-256: 0657f789f0c6f839172b6edb62aec2c74cd04a99ffb33a717b606ab9a271aca7
kernel-debuginfo-4.18.0-477.130.1.el8_8.ppc64le.rpm SHA-256: c2a8b388cb42d76b54e448b465918bc9224da78678b1fd2ab644f0155ed05a8a
kernel-debuginfo-common-ppc64le-4.18.0-477.130.1.el8_8.ppc64le.rpm SHA-256: 3373ec8825969c187ddb042f26dcc200120484f486e100e758193b0d40608c04
kernel-devel-4.18.0-477.130.1.el8_8.ppc64le.rpm SHA-256: 41b0b42c1a4b8caa434517a95a8ec0a84672322b98487ef5c34c904d4e2edfe6
kernel-doc-4.18.0-477.130.1.el8_8.noarch.rpm SHA-256: bd6c7d76d579849ee2d61ee928fee251828560ccf0773cbdfc8ed1b060ef1741
kernel-headers-4.18.0-477.130.1.el8_8.ppc64le.rpm SHA-256: 222ff41b03c2e704f5070bd714386cf480a2b1923d20545bdb5a89d7b463a33f
kernel-modules-4.18.0-477.130.1.el8_8.ppc64le.rpm SHA-256: cb73e5e58b87696ff88f76b14747f592388492d2ae9a6c06ce9fdf32867147ab
kernel-modules-extra-4.18.0-477.130.1.el8_8.ppc64le.rpm SHA-256: 8799315640ab84675d9529d1a8803bf726dec4ae439ac19b689cf3317f057d5a
kernel-tools-4.18.0-477.130.1.el8_8.ppc64le.rpm SHA-256: 0c330e9c41d947edb0ad5baae6227a96a25a46a2c6069aebba27f234f336096c
kernel-tools-debuginfo-4.18.0-477.130.1.el8_8.ppc64le.rpm SHA-256: 4e1fb4cfa94643b748b125481e325646875681b7c13a3f8f8c987c3ad2b1da9c
kernel-tools-libs-4.18.0-477.130.1.el8_8.ppc64le.rpm SHA-256: 598e202c62869a0854c2480b3d0a1ba81819abf93dc926397005c907cd763a25
perf-4.18.0-477.130.1.el8_8.ppc64le.rpm SHA-256: 52666d961ad047fc7d499b5c2c9746834489725aed51a5ec8f67231cb59865b2
perf-debuginfo-4.18.0-477.130.1.el8_8.ppc64le.rpm SHA-256: 1fbb15f9a3590f3a173516a7eaccf56d53f90d0b3957292cd896c867e56fe00e
python3-perf-4.18.0-477.130.1.el8_8.ppc64le.rpm SHA-256: 02ec4a29eef1657d8dab475bca1995925bd9ad86a6bbe420a9b9c1b86af28028
python3-perf-debuginfo-4.18.0-477.130.1.el8_8.ppc64le.rpm SHA-256: 2d7bf853574e3e240349b76dc66567886fa44b7d294debc769f5575d1800129b

Red Hat Enterprise Linux for x86_64 - Update Services for SAP Solutions 8.8

SRPM
kernel-4.18.0-477.130.1.el8_8.src.rpm SHA-256: a522d6dfa41df7177a313e515780e647ef258ce1fdc59c74e220100d3feebeec
x86_64
bpftool-4.18.0-477.130.1.el8_8.x86_64.rpm SHA-256: 8011e3ad0497e072f299f51f0b327a1acb580e8dadeb1c5ea7ac3e1e74193faf
bpftool-debuginfo-4.18.0-477.130.1.el8_8.x86_64.rpm SHA-256: 784f956ca7039a5d95855cc5e6d6b55f9af06d5c8257c4009188d06d5723ccf1
kernel-4.18.0-477.130.1.el8_8.x86_64.rpm SHA-256: 6ff26b578b4556086a569524e9c0442d101d428cd8ac77d72b7e7ec595ed24e2
kernel-abi-stablelists-4.18.0-477.130.1.el8_8.noarch.rpm SHA-256: e5e5a28535684e127b170dd67c28803e9af170052d1062d3afd57fbaa6c51712
kernel-core-4.18.0-477.130.1.el8_8.x86_64.rpm SHA-256: 9da63946ba7480f41e19edaf0a51f7266a7d9b39dad0b1d12ec993c61c9a3167
kernel-cross-headers-4.18.0-477.130.1.el8_8.x86_64.rpm SHA-256: 7adcbaa6eaa36fbaa902680fb4588fe8c0a97934496e2be00582ce27dabc1952
kernel-debug-4.18.0-477.130.1.el8_8.x86_64.rpm SHA-256: 2d3c83905ec7a7600fbfa59b4602c9a70b735a3a0577676c6bda28a80923b283
kernel-debug-core-4.18.0-477.130.1.el8_8.x86_64.rpm SHA-256: 3a123a984f756da6b599d1f11376c12d0d46055be1e43307dceb117584b75f5e
kernel-debug-debuginfo-4.18.0-477.130.1.el8_8.x86_64.rpm SHA-256: 4b2b0145645385b31b01ee948047b218968a195c9d00a1ef0d2b4b067ffb10ca
kernel-debug-devel-4.18.0-477.130.1.el8_8.x86_64.rpm SHA-256: a314a614d4af4f38a2a5a67d15d25b032bf073239f1af3d12ce4f30d96be017a
kernel-debug-modules-4.18.0-477.130.1.el8_8.x86_64.rpm SHA-256: e2472d367669f71a6857eac92d186c259b5ccb030c00bf596525268132cc9baf
kernel-debug-modules-extra-4.18.0-477.130.1.el8_8.x86_64.rpm SHA-256: c63292b230bde731a78ab5de02361d08cb48eb25589e32c3a93d3717c944dd4c
kernel-debuginfo-4.18.0-477.130.1.el8_8.x86_64.rpm SHA-256: 717f7c9018770725f31d4ae2cb7ac103361576261466d840d109fc8bf6cfbed0
kernel-debuginfo-common-x86_64-4.18.0-477.130.1.el8_8.x86_64.rpm SHA-256: 72f2d18cbc2142cbd8477d96681e29b6b03bb532735512a3928e5816dfca46fe
kernel-devel-4.18.0-477.130.1.el8_8.x86_64.rpm SHA-256: 815b65b93ca46903bbe5ae58c9707269a4496417bb03f41952f19c3057338c1f
kernel-doc-4.18.0-477.130.1.el8_8.noarch.rpm SHA-256: bd6c7d76d579849ee2d61ee928fee251828560ccf0773cbdfc8ed1b060ef1741
kernel-headers-4.18.0-477.130.1.el8_8.x86_64.rpm SHA-256: 98555dec8d88b1e7919542b3af8234127397ef1168f1c5cca5ac6d5c6ff71008
kernel-modules-4.18.0-477.130.1.el8_8.x86_64.rpm SHA-256: 8b20b206837958270da15a268ad491a34cd0b06c0d4863e741b1f198916d6d56
kernel-modules-extra-4.18.0-477.130.1.el8_8.x86_64.rpm SHA-256: 52878db91991ae6bdbb453d680d2307fae80699743e8e69a17a112db08e3fdac
kernel-tools-4.18.0-477.130.1.el8_8.x86_64.rpm SHA-256: 224cf305526a909e34be57b9e9a4b56363a2c0aabd66610c80bd40253da017ba
kernel-tools-debuginfo-4.18.0-477.130.1.el8_8.x86_64.rpm SHA-256: 55316139d8825a16c74d4b25d02adf4f55f43965fc63e02a50fa13f064e24442
kernel-tools-libs-4.18.0-477.130.1.el8_8.x86_64.rpm SHA-256: c8a5471c42b4e4bc4338dfb9e78776491bda25a03509b80fef101d0842e50059
perf-4.18.0-477.130.1.el8_8.x86_64.rpm SHA-256: dd35676ad3f73fde2e56c761b1387b99d6d8204419caec430496399887ed4d2f
perf-debuginfo-4.18.0-477.130.1.el8_8.x86_64.rpm SHA-256: d0e3d02cb562d298bc4f40e68f47c2cb05cc1375b425e74c2335923bb5a08add
python3-perf-4.18.0-477.130.1.el8_8.x86_64.rpm SHA-256: 6565699b910a88a4f26095d7b13cd245f492aa2e18ba2af63cb0266fa0b2d586
python3-perf-debuginfo-4.18.0-477.130.1.el8_8.x86_64.rpm SHA-256: d76a728f4248431dd37e09315ea4be3024749e6a2632455c3f606bfe4ab7fa85

The Red Hat security contact is secalert@redhat.com. More contact details at https://access.redhat.com/security/team/contact/.

Red Hat LinkedIn YouTube Facebook X, formerly Twitter

Quick Links

  • Downloads
  • Subscriptions
  • Support Cases
  • Customer Service
  • Product Documentation

Help

  • Contact Us
  • Customer Portal FAQ
  • Log-in Assistance

Site Info

  • Trust Red Hat
  • Browser Support Policy
  • Accessibility
  • Awards and Recognition
  • Colophon

Related Sites

  • redhat.com
  • developers.redhat.com
  • connect.redhat.com
  • cloud.redhat.com

Red Hat legal and privacy links

  • About Red Hat
  • Jobs
  • Events
  • Locations
  • Contact Red Hat
  • Red Hat Blog
  • Inclusion at Red Hat
  • Cool Stuff Store
  • Red Hat Summit
© 2026 Red Hat

Red Hat legal and privacy links

  • Privacy statement
  • Terms of use
  • All policies and guidelines
  • Digital accessibility