Project kernel-4.18.0-553.62.1.el8_10
Name | kernel |
---|---|
Epoch | 0 |
Version | 4.18.0 |
Release | 553.62.1.el8_10 |
Website/URL | http://www.kernel.org/ |
License | GPLv2 and Redistributable, no modification permitted |
Build Time | 2025-07-17 10:50:10 |
Build Host | builder-iso-x86-01.inferitos.ru |
Summary | The Linux kernel, based on version 4.18.0, heavily modified with backports |
Repositories | BaseOS |
Description | This is the package which provides the Linux kernel for MSVSphere. It is based on upstream Linux at version 4.18.0 and maintains kABI compatibility of a set of approved symbols, however it is heavily modified with backports and fixes pulled from newer upstream Linux kernel releases. This means this is not a 4.18.0 kernel anymore: it includes several components which come from newer upstream linux versions, while maintaining a well tested and stable core. Some of the components/backports that may be pulled in are: changes like updates to the core kernel (eg.: scheduler, cgroups, memory management, security fixes and features), updates to block layer, supported filesystems, major driver updates for supported hardware in MSVSphere, enhancements for enterprise customers, etc. |
Errata | INFSA-2025:11298 |
×
Package | Summary | SHA-256 checksum |
---|---|---|
x86_64 | ||
bpftool-4.18.0-553.62.1.el8_10.x86_64 | Inspection and simple manipulation of eBPF programs and maps | a01b0b3fbdfdb346abc2c39b4094e57cc633856c9dba0cc5cadeba3b48d1a031 |
kernel-4.18.0-553.62.1.el8_10.x86_64 | The Linux kernel, based on version 4.18.0, heavily modified with backports | c72d3948ffdb360732ce04c5dc55e1e7f6fc03444c38d1c4ec8276d794917051 |
kernel-core-4.18.0-553.62.1.el8_10.x86_64 | The Linux kernel | 2ff569fb89add4ca35a052499db82c2a9e5058e6981e1ef367c1c6f220625c79 |
kernel-cross-headers-4.18.0-553.62.1.el8_10.x86_64 | Header files for the Linux kernel for use by cross-glibc | 0263f416165faf835e7b31cc2fcf3c25a9903212768de15603faaeb6424fc574 |
kernel-debug-4.18.0-553.62.1.el8_10.x86_64 | kernel meta-package for the debug kernel | 302b8a446f84da3f19125b5e9f1182c3d3315c7ff97c1d7ecf5286773bf7d425 |
kernel-debug-core-4.18.0-553.62.1.el8_10.x86_64 | The Linux kernel compiled with extra debugging enabled | b8695b777fcfc87ad467b5e3407eff02f789cd1b16ade5052d19e1388ee46094 |
kernel-debug-devel-4.18.0-553.62.1.el8_10.x86_64 | Development package for building kernel modules to match the debug kernel | 87e5d058f229e0815dad355bc90e994bb4d14af24ad4d06e8e11088233e0f89f |
kernel-debug-modules-4.18.0-553.62.1.el8_10.x86_64 | kernel modules to match the debug-core kernel | 429898ee118b427f9f15edce36b69af9ac580867b74f9a0eaed0ba5b7891145a |
kernel-debug-modules-extra-4.18.0-553.62.1.el8_10.x86_64 | Extra kernel modules to match the debug kernel | f81be1d9ef7f34670816999416388d207c26eccff4863bc757b43d283ac42406 |
kernel-devel-4.18.0-553.62.1.el8_10.x86_64 | Development package for building kernel modules to match the kernel | 76123017f1dd5d7e3d80b9460665e92650039c9631f8fd06ec834e43ebb3682e |
kernel-headers-4.18.0-553.62.1.el8_10.x86_64 | Header files for the Linux kernel for use by glibc | a898c1810fc25bd8d9b92a032bb43ea43e56c16eddd7b32e183d1b953dffa734 |
kernel-modules-4.18.0-553.62.1.el8_10.x86_64 | kernel modules to match the core kernel | 982dfbb5a4d3a13e4162365af4650f39b793d2d5bf51f272dddce2e21eb31ead |
kernel-modules-extra-4.18.0-553.62.1.el8_10.x86_64 | Extra kernel modules to match the kernel | 566c5def4584ab386337376dff6a04c88db8b342dc5cb511896bda0aab4b2eb5 |
kernel-tools-4.18.0-553.62.1.el8_10.x86_64 | Assortment of tools for the Linux kernel | ad15c150d27996d3cd2f9a23fe0c1a1ad90e8734ccbd13594aa2778533824fff |
kernel-tools-libs-4.18.0-553.62.1.el8_10.x86_64 | Libraries for the kernel-tools | f681285bfd0380398e671433ddf7d2e2d6ae87a2cdd52d2605c357ccd85ca3f9 |
perf-4.18.0-553.62.1.el8_10.x86_64 | Performance monitoring for the Linux kernel | a1e7b3d37ff7b6df68ca4ff58bdfd95f8c60f4bbf58eb5d8c4072bc7481dd06a |
python3-perf-4.18.0-553.62.1.el8_10.x86_64 | Python bindings for apps which will manipulate perf events | d4927ef368ab0cc855cc523b9faa9f8b8bc1faa3bf093c838d8038197fbd06ed |
kernel-tools-libs-devel-4.18.0-553.62.1.el8_10.x86_64 | Assortment of tools for the Linux kernel | a469f021ef58939dcef86b00b13dfac66903ef8b7da83ed1928d7f83623a696d |
noarch | ||
kernel-abi-stablelists-4.18.0-553.62.1.el8_10.noarch | The MSVSphere Linux kernel ABI symbol stablelists | 66c5466abd0e060a3bf2bc1180538163729b4904e0f09e57bee758a486554c0c |
kernel-doc-4.18.0-553.62.1.el8_10.noarch | Various documentation bits found in the kernel source | 31a08e984a9559c70b27a11d59c0c60d4c4ab716a2d21db995f586cbd25d3c06 |
src | ||
kernel-4.18.0-553.62.1.el8_10.src | The Linux kernel, based on version 4.18.0, heavily modified with backports | f6eedaea3cbffd45e8cb09ef590dae358bd2fa5245c3774e468126abf3a2eec4 |
* Thu Jul 10 2025 Denys Vlasenko <dvlasenk@redhat.com> [4.18.0-553.62.1.el8_10] - s390/virtio_ccw: Don't allocate/assign airqs for non-existing queues (David Hildenbrand) [RHEL-87557] - mm/slab: make __free(kfree) accept error pointers (Mark Langsdorf) [RHEL-84410] - driver core: fix potential NULL pointer dereference in dev_uevent() (Mark Langsdorf) [RHEL-84410] - driver core: introduce device_set_driver() helper (Mark Langsdorf) [RHEL-84410] - Revert "drivers: core: synchronize really_probe() and dev_uevent()" (Mark Langsdorf) [RHEL-84410] - cleanup: Add conditional guard helper (Mark Langsdorf) [RHEL-84410] - cleanup: Adjust scoped_guard() macros to avoid potential warning (Mark Langsdorf) [RHEL-84410] - cleanup: Remove address space of returned pointer (Mark Langsdorf) [RHEL-84410] - cleanup: Add usage and style documentation (Mark Langsdorf) [RHEL-84410] - file: add take_fd() cleanup helper (Mark Langsdorf) [RHEL-84410] - cleanup: Standardize the header guard define's name (Mark Langsdorf) [RHEL-84410] - cleanup: Add conditional guard support (Mark Langsdorf) [RHEL-84410] - cleanup: Make no_free_ptr() __must_check (Mark Langsdorf) [RHEL-84410] - locking: Introduce __cleanup() based infrastructure (Mark Langsdorf) [RHEL-84410] - misc/vmw_vmci: fix an infoleak in vmci_host_do_receive_datagram() (CKI Backport Bot) [RHEL-100343] {CVE-2022-49788} - media: uvcvideo: Announce the user our deprecation intentions (Desnes Nunes) [RHEL-98760] - media: uvcvideo: Allow changing noparam on the fly (Desnes Nunes) [RHEL-98760] - media: uvcvideo: Invert default value for nodrop module param (Desnes Nunes) [RHEL-98760] - media: uvcvideo: Propagate buf->error to userspace (Desnes Nunes) [RHEL-98760] - media: uvcvideo: Flush the control cache when we get an event (Desnes Nunes) [RHEL-98760] - media: uvcvideo: Annotate lock requirements for uvc_ctrl_set (Desnes Nunes) [RHEL-98760] - media: uvcvideo: Remove dangling pointers (Desnes Nunes) [RHEL-98760] {CVE-2024-58002} - media: uvcvideo: Remove redundant NULL assignment (Desnes Nunes) [RHEL-98760] - media: uvcvideo: Only save async fh if success (Desnes Nunes) [RHEL-98760] - media: uvcvideo: Refactor iterators (Desnes Nunes) [RHEL-98760] - media: uvcvideo: Fix double free in error path (CKI Backport Bot) [RHEL-98788] {CVE-2024-57980} - cifs: potential buffer overflow in handling symlinks (Paulo Alcantara) [RHEL-97074] {CVE-2022-49058} - Race between reading mdstat and stopping an md device (Nigel Croxon) [RHEL-95723] - fs/dcache: Control # of dentries in list_lru_node (Waiman Long) [RHEL-8578] - fs/dcache: Add sysctl parameter dentry-fs-klimit to control # of dentries in filesystem (Waiman Long) [RHEL-8578] - mm/list_lru: Make list_lru_add() return # if items in affected list_lru_node (Waiman Long) [RHEL-8578] * Thu Jul 03 2025 Denys Vlasenko <dvlasenk@redhat.com> [4.18.0-553.61.1.el8_10] - s390: Add z17 elf platform (Christoph Schlameuss) [RHEL-100409] - ext4: ignore xattrs past end (CKI Backport Bot) [RHEL-100375] {CVE-2025-37738} - ext4: fix off-by-one error in do_split (CKI Backport Bot) [RHEL-100361] {CVE-2025-23150} - net: atm: fix use after free in lec_send() (CKI Backport Bot) [RHEL-93119] {CVE-2025-22004} - x86/microcode/AMD: Fix out-of-bounds on systems with CPU-less NUMA nodes (CKI Backport Bot) [RHEL-98980] {CVE-2025-21991} * Thu Jun 26 2025 Denys Vlasenko <dvlasenk@redhat.com> [4.18.0-553.60.1.el8_10] - xfs: don't allocate COW extents when unsharing a hole (Brian Foster) [RHEL-83037] - xfs: don't allocate into the data fork for an unshare request (Brian Foster) [RHEL-83037] - s390/ism: add release function for struct device (Mete Durlu) [RHEL-97192] - udf: Fix a slab-out-of-bounds write bug in udf_find_entry() (CKI Backport Bot) [RHEL-99113] {CVE-2022-49846} * Thu Jun 19 2025 Denys Vlasenko <dvlasenk@redhat.com> [4.18.0-553.59.1.el8_10] - SUNRPC: Fix Oops in xs_tcp_send_request() when transport is disconnected (Olga Kornievskaia) [RHEL-83291] - SUNRPC: Set TCP_CORK until the transmit queue is empty (Olga Kornievskaia) [RHEL-83291] - tcp: add tcp_sock_set_cork (Olga Kornievskaia) [RHEL-83291] - xfs: xfs_ail_push_all_sync() stalls when racing with updates (Brian Foster) [RHEL-88132] - Bluetooth: Fix use after free in hci_send_acl (CKI Backport Bot) [RHEL-90428] {CVE-2022-49111} - Bluetooth: MGMT: Fix failing to MGMT_OP_ADD_UUID/MGMT_OP_REMOVE_UUID (David Marlin) [RHEL-90468] {CVE-2022-49136} - Bluetooth: hci_sync: add lock to protect HCI_UNREGISTER (David Marlin) [RHEL-90468] {CVE-2022-49136} - Bluetooth: hci_sync: Only allow hci_cmd_sync_queue if running (David Marlin) [RHEL-90468] {CVE-2022-49136} - Bluetooth: Cancel sync command before suspend and power off (David Marlin) [RHEL-90468] {CVE-2022-49136} - Bluetooth: hci_sync: Fix queuing commands when HCI_UNREGISTER is set (CKI Backport Bot) [RHEL-90468] {CVE-2022-49136} - fix backport of "filelock: Remove locks reliably when fcntl/close race is detected" (Scott Mayhew) [RHEL-89709] - NFSv4: Allow FREE_STATEID to clean up delegations (Benjamin Coddington) [RHEL-86932] - NFSv4.1: constify the stateid argument in nfs41_test_stateid() (Trond Myklebust) [RHEL-86932] * Thu Jun 12 2025 Denys Vlasenko <dvlasenk@redhat.com> [4.18.0-553.58.1.el8_10] - ndisc: use RCU protection in ndisc_alloc_skb() (Xin Long) [RHEL-89535] {CVE-2025-21764} - ipv6: use RCU protection in ip6_default_advmss() (Xin Long) [RHEL-89535] {CVE-2025-21765} - net: add dev_net_rcu() helper (Xin Long) [RHEL-89535] {CVE-2025-21765} - net: treat possible_net_t net pointer as an RCU one and add read_pnet_rcu() (Xin Long) [RHEL-89535] - idpf: check error for register_netdev() on init (Michal Schmidt) [RHEL-71182] {CVE-2025-22116} - idpf: avoid mailbox timeout delays during reset (Michal Schmidt) [RHEL-71182] - idpf: fix a race in txq wakeup (Michal Schmidt) [RHEL-71182] - idpf: fix idpf_vport_splitq_napi_poll() (Michal Schmidt) [RHEL-71182] - idpf: fix null-ptr-deref in idpf_features_check (Michal Schmidt) [RHEL-71182] - idpf: protect shutdown from reset (Michal Schmidt) [RHEL-71182] - idpf: fix potential memory leak on kcalloc() failure (Michal Schmidt) [RHEL-71182] - idpf: fix offloads support for encapsulated packets (Michal Schmidt) [RHEL-71182] - idpf: fix adapter NULL pointer dereference on reboot (Michal Schmidt) [RHEL-71182] {CVE-2025-22065} - idpf: fix checksums set in idpf_rx_rsc() (Michal Schmidt) [RHEL-71182] {CVE-2025-21890} - idpf: fix handling rsc packet with a single segment (Michal Schmidt) [RHEL-71182] - idpf: add more info during virtchnl transaction timeout/salt mismatch (Michal Schmidt) [RHEL-71182] - idpf: convert workqueues to unbound (Michal Schmidt) [RHEL-71182] {CVE-2024-58057} - idpf: Acquire the lock before accessing the xn->salt (Michal Schmidt) [RHEL-71182] - idpf: fix transaction timeouts on reset (Michal Schmidt) [RHEL-71182] - idpf: add read memory barrier when checking descriptor done bit (Michal Schmidt) [RHEL-71182] - idpf: deinit virtchnl transaction manager after vport and vectors (Michal Schmidt) [RHEL-71182] - idpf: use actual mbx receive payload length (Michal Schmidt) [RHEL-71182] - idpf: call set_real_num_queues in idpf_open (Michal Schmidt) [RHEL-71182 RHEL-90849] - idpf: fix idpf_vc_core_init error path (Michal Schmidt) [RHEL-68233 RHEL-71182 RHEL-90846] {CVE-2024-53064} - idpf: avoid vport access in idpf_get_link_ksettings (Michal Schmidt) [RHEL-71182 RHEL-90846] {CVE-2024-50274} - idpf: fix netdev Tx queue stop/wake (Michal Schmidt) [RHEL-71182] - idpf: fix UAFs when destroying the queues (Michal Schmidt) [RHEL-71182] {CVE-2024-44932} - idpf: fix memleak in vport interrupt configuration (Michal Schmidt) [RHEL-71182] - idpf: fix memory leaks and crashes while performing a soft reset (Michal Schmidt) [RHEL-71182] {CVE-2024-44964} - idpf: compile singleq code only under default-n CONFIG_IDPF_SINGLEQ (Michal Schmidt) [RHEL-71182] - redhat/configs: set CONFIG_IDPF_SINGLEQ as disabled (Michal Schmidt) [RHEL-71182] - idpf: merge singleq and splitq &net_device_ops (Michal Schmidt) [RHEL-71182] - idpf: avoid bloating &idpf_q_vector with big %NR_CPUS (Michal Schmidt) [RHEL-71182] - idpf: split &idpf_queue into 4 strictly-typed queue structures (Michal Schmidt) [RHEL-71182] - idpf: remove legacy Page Pool Ethtool stats (Michal Schmidt) [RHEL-71182] - net: remove gfp_mask from napi_alloc_skb() [idpf] (Michal Schmidt) [RHEL-71182] - idpf: stop using macros for accessing queue descriptors (Michal Schmidt) [RHEL-71182] - idpf: don't enable NAPI and interrupts prior to allocating Rx buffers (Michal Schmidt) [RHEL-71182] - idpf: Interpret .set_channels() input differently (Michal Schmidt) [RHEL-71182] - idpf: make virtchnl2.h self-contained (Michal Schmidt) [RHEL-71182] - s390/pci: Serialize device addition and removal (Mete Durlu) [RHEL-95783] - s390/pci: Allow re-add of a reserved but not yet removed device (Mete Durlu) [RHEL-95783] - s390/pci: Prevent self deletion in disable_slot() (Mete Durlu) [RHEL-95783] - s390/pci: Remove redundant bus removal and disable from zpci_release_device() (Mete Durlu) [RHEL-95783] - s390/pci: Fix duplicate pci_dev_put() in disable_slot() when PF has child VFs (Mete Durlu) [RHEL-95783] - s390/pci: Fix missing check for zpci_create_device() error return (Mete Durlu) [RHEL-95783] - s390/pci: Fix potential double remove of hotplug slot (Mete Durlu) [RHEL-95783] - s390/pci: remove hotplug slot when releasing the device (Mete Durlu) [RHEL-95783] - s390/pci: introduce lock to synchronize state of zpci_dev's (Mete Durlu) [RHEL-95783] - s390/pci: rename lock member in struct zpci_dev (Mete Durlu) [RHEL-95783] * Thu Jun 05 2025 Denys Vlasenko <dvlasenk@redhat.com> [4.18.0-553.57.1.el8_10] - smb: client: fix warning in cifs_smb3_do_mount() (Paulo Alcantara) [RHEL-55825] - cifs: fix double free race when mount fails in cifs_get_root() (Paulo Alcantara) [RHEL-55825] {CVE-2022-48919} - security/keys: fix slab-out-of-bounds in key_task_permission (CKI Backport Bot) [RHEL-68090] {CVE-2024-50301} * Sun Jun 01 2025 Denys Vlasenko <dvlasenk@redhat.com> [4.18.0-553.56.1.el8_10] - tools/power/x86_energy_perf_policy: Read energy_perf_bias from sysfs (David Arcari) [RHEL-86963] - um: Fix out-of-bounds read in LDT setup (CKI Backport Bot) [RHEL-90261] {CVE-2022-49395} * Fri May 23 2025 Denys Vlasenko <dvlasenk@redhat.com> [4.18.0-553.55.1.el8_10] - sched/fair: Fix CPU bandwidth limit bypass during CPU hotplug (Phil Auld) [RHEL-85171] * Thu May 15 2025 Denys Vlasenko <dvlasenk@redhat.com> [4.18.0-553.54.1.el8_10] - ice: fix stats being updated by way too large values (CKI Backport Bot) [RHEL-70834] - wifi: rtw89: Fix array index mistake in rtw89_sta_info_get_iter() (CKI Backport Bot) [RHEL-54802] {CVE-2024-43842} - sched/rt: Fix race in push_rt_task (Phil Auld) [RHEL-84963] * Fri May 09 2025 Denys Vlasenko <dvlasenk@redhat.com> [4.18.0-553.53.1.el8_10] - net/mlx5: Always stop health timer during driver removal (Michal Schmidt) [RHEL-47712] {CVE-2024-40906} - net/mlx5: Split function_setup() to enable and open functions (Michal Schmidt) [RHEL-47712] - net/mlx5e: SHAMPO, Fix invalid WQ linked list unlink (Michal Schmidt) [RHEL-57117] {CVE-2024-44970} - net/mlx5e: SHAMPO, Fix incorrect page release (Michal Schmidt) [RHEL-57117] {CVE-2024-46717} - s390/pci: Fix zpci_bus_is_isolated_vf() for non-VFs (Mete Durlu) [RHEL-88819] - platform/x86: dell-wmi-sysman: Make init_bios_attributes() ACPI object parsing more robust (Jay Shin) [RHEL-88714] - platform/x86: dell-wmi-sysman: Cleanup create_attributes_level_sysfs_files() (Jay Shin) [RHEL-88714] - platform/x86: dell-wmi-sysman: Make sysman_init() return -ENODEV of the interfaces are not found (Jay Shin) [RHEL-88714] - platform/x86: dell-wmi-sysman: Cleanup sysman_init() error-exit handling (Jay Shin) [RHEL-88714] - platform/x86: dell-wmi-sysman: Fix release_attributes_data() getting called twice on init_bios_attributes() failure (Jay Shin) [RHEL-88714] - platform/x86: dell-wmi-sysman: Make it safe to call exit_foo_attributes() multiple times (Jay Shin) [RHEL-88714] - platform/x86: dell-wmi-sysman: Fix possible NULL pointer deref on exit (Jay Shin) [RHEL-88714] - platform/x86: dell-wmi-sysman: Fix crash caused by calling kset_unregister twice (Jay Shin) [RHEL-88714] - x86/kexec: Add EFI config table identity mapping for kexec kernel (Herton R. Krzesinski) [RHEL-71793] - vsock: Orphan socket after transport release (Jay Shin) [RHEL-89099] {CVE-2025-21756} - vsock: Keep the binding until socket destruction (Jay Shin) [RHEL-89099] {CVE-2025-21756} - bpf, vsock: Invoke proto::close on close() (Jay Shin) [RHEL-89099] {CVE-2025-21756}