Project kernel-4.18.0-553.63.1.el8_10
Name | kernel |
---|---|
Epoch | 0 |
Version | 4.18.0 |
Release | 553.63.1.el8_10 |
Website/URL | http://www.kernel.org/ |
License | GPLv2 and Redistributable, no modification permitted |
Build Time | 2025-07-22 08:45:40 |
Build Host | builder-iso-x86-01.inferitos.ru |
Summary | The Linux kernel, based on version 4.18.0, heavily modified with backports |
Repositories | BaseOS |
Description | This is the package which provides the Linux kernel for MSVSphere. It is based on upstream Linux at version 4.18.0 and maintains kABI compatibility of a set of approved symbols, however it is heavily modified with backports and fixes pulled from newer upstream Linux kernel releases. This means this is not a 4.18.0 kernel anymore: it includes several components which come from newer upstream linux versions, while maintaining a well tested and stable core. Some of the components/backports that may be pulled in are: changes like updates to the core kernel (eg.: scheduler, cgroups, memory management, security fixes and features), updates to block layer, supported filesystems, major driver updates for supported hardware in MSVSphere, enhancements for enterprise customers, etc. |
Errata | INFSA-2025:11455 |
×
Package | Summary | SHA-256 checksum |
---|---|---|
x86_64 | ||
bpftool-4.18.0-553.63.1.el8_10.x86_64 | Inspection and simple manipulation of eBPF programs and maps | e79b0fa5bf3c6e98ce8fd682370e9b8f526972d2d378b0b49e5e13390e0289f8 |
kernel-4.18.0-553.63.1.el8_10.x86_64 | The Linux kernel, based on version 4.18.0, heavily modified with backports | 895af858773fe3eaf9c9a1420bbb5001903a22f190ef8b82d7e750938d9878ec |
kernel-core-4.18.0-553.63.1.el8_10.x86_64 | The Linux kernel | eaa7d29d16b86accec8141d0a70ea99ef7db907ae297ade22e46bbe2c733a7db |
kernel-cross-headers-4.18.0-553.63.1.el8_10.x86_64 | Header files for the Linux kernel for use by cross-glibc | c0160548b146d8c3593b585946d2760b32d29d9385475bf21f89e9321161e9a2 |
kernel-debug-4.18.0-553.63.1.el8_10.x86_64 | kernel meta-package for the debug kernel | bf9b22d78f8b794df5f89de4d4f9a8669cae6b0b455f82373fe1a0f399c4717b |
kernel-debug-core-4.18.0-553.63.1.el8_10.x86_64 | The Linux kernel compiled with extra debugging enabled | 0ac79047f1c58e3694cbcdbe95fb19ea82fc4b58b7df0b5561085de14526389b |
kernel-debug-devel-4.18.0-553.63.1.el8_10.x86_64 | Development package for building kernel modules to match the debug kernel | 5eda305e71eeadd31cadcab5164ae0a06a7e65be7b5c03723527ab167143692c |
kernel-debug-modules-4.18.0-553.63.1.el8_10.x86_64 | kernel modules to match the debug-core kernel | 65ac0caacc747ef92aefb5ab594ae37c274d4fe053a2b154f69905dd8b0901ef |
kernel-debug-modules-extra-4.18.0-553.63.1.el8_10.x86_64 | Extra kernel modules to match the debug kernel | 6f88f8d7e075c46f524c8de7ab9b652c6a8f02ed9e9ec9aaddf2c207334e4a2a |
kernel-devel-4.18.0-553.63.1.el8_10.x86_64 | Development package for building kernel modules to match the kernel | 45e971a565789ad564aa475880ab7707a0213c5f5e91b59a3a682006b4a911c3 |
kernel-headers-4.18.0-553.63.1.el8_10.x86_64 | Header files for the Linux kernel for use by glibc | 2b452663871fd3425eef282fb68deb8a1d98e005ca39f711c002f5b91bdcadac |
kernel-modules-4.18.0-553.63.1.el8_10.x86_64 | kernel modules to match the core kernel | 5a133e91c9b61e46ed649bc2b4cab3a767cb17eaa4df065f9ac1ca6dd7ebe498 |
kernel-modules-extra-4.18.0-553.63.1.el8_10.x86_64 | Extra kernel modules to match the kernel | 858308be0a277a073245c0606df6ca9405f3530cd19282f48445f839eb2ed86a |
kernel-tools-4.18.0-553.63.1.el8_10.x86_64 | Assortment of tools for the Linux kernel | bc2297cc8bda264a8539b4f40beb404fc330fdeee15e8a7477532c14224ac796 |
kernel-tools-libs-4.18.0-553.63.1.el8_10.x86_64 | Libraries for the kernel-tools | 99b337c411e65e4ca53c7979d2e9995f078b03e2876a2b72c3084090a7e3120c |
perf-4.18.0-553.63.1.el8_10.x86_64 | Performance monitoring for the Linux kernel | 75d12bdd6d5f933f3056e65a668e0bf7c5c8bd936093942f92eed95f501338fd |
python3-perf-4.18.0-553.63.1.el8_10.x86_64 | Python bindings for apps which will manipulate perf events | 205135b169c014125237383a3ffb0977b662bb285a5fa0c88f813187ee6137e9 |
kernel-tools-libs-devel-4.18.0-553.63.1.el8_10.x86_64 | Assortment of tools for the Linux kernel | 8d81f4635f95eefc90b00e66d1f7cd28b90b86e94b079eff6dd634434f7d3d04 |
noarch | ||
kernel-abi-stablelists-4.18.0-553.63.1.el8_10.noarch | The MSVSphere Linux kernel ABI symbol stablelists | fd8015551603df68fe69bd1c83bbffaf94ca4f5b23184026e8fa29ce58aec919 |
kernel-doc-4.18.0-553.63.1.el8_10.noarch | Various documentation bits found in the kernel source | ac5fac363280449cd98216343eb2264e801b717dd83a2d6a648aebdf1d801b2d |
src | ||
kernel-4.18.0-553.63.1.el8_10.src | The Linux kernel, based on version 4.18.0, heavily modified with backports | db4f95d74a09dca3a1685ebeee4d44bbfe9efc6e90f28c0cc576998aa8c58017 |
* Thu Jul 17 2025 Denys Vlasenko <dvlasenk@redhat.com> [4.18.0-553.63.1.el8_10] - tcp/dccp: Don't use timer_pending() in reqsk_queue_unlink(). (Guillaume Nault) [RHEL-66324] {CVE-2024-50154} - net: ch9200: fix uninitialised access during mii_nway_restart (CKI Backport Bot) [RHEL-101200] {CVE-2025-38086} - mm/swapfile: add cond_resched() in get_swap_pages() (Nico Pache) [RHEL-80401] {CVE-2023-52932} - dlm: fix possible lkb_resource null dereference (Alexander Aring) [RHEL-64452] - fs: dlm: handle -EINVAL as log_error() (Alexander Aring) [RHEL-64452] - redhat/configs: enable CONFIG_RH_KABI_STABLE_ASM_OFFSETS (Čestmír Kalina) [RHEL-90099] - kabi: freeze stablelist and stackprotector-related constants (Čestmír Kalina) [RHEL-90099] - kabi: add redhat/kabi/asm-offsets (Čestmír Kalina) [RHEL-90099] - kabi: add RH_KABI_ASSERT_EQ_CONST{,EXPR} (Čestmír Kalina) [RHEL-90099] * Thu Jul 10 2025 Denys Vlasenko <dvlasenk@redhat.com> [4.18.0-553.62.1.el8_10] - s390/virtio_ccw: Don't allocate/assign airqs for non-existing queues (David Hildenbrand) [RHEL-87557] - mm/slab: make __free(kfree) accept error pointers (Mark Langsdorf) [RHEL-84410] - driver core: fix potential NULL pointer dereference in dev_uevent() (Mark Langsdorf) [RHEL-84410] - driver core: introduce device_set_driver() helper (Mark Langsdorf) [RHEL-84410] - Revert "drivers: core: synchronize really_probe() and dev_uevent()" (Mark Langsdorf) [RHEL-84410] - cleanup: Add conditional guard helper (Mark Langsdorf) [RHEL-84410] - cleanup: Adjust scoped_guard() macros to avoid potential warning (Mark Langsdorf) [RHEL-84410] - cleanup: Remove address space of returned pointer (Mark Langsdorf) [RHEL-84410] - cleanup: Add usage and style documentation (Mark Langsdorf) [RHEL-84410] - file: add take_fd() cleanup helper (Mark Langsdorf) [RHEL-84410] - cleanup: Standardize the header guard define's name (Mark Langsdorf) [RHEL-84410] - cleanup: Add conditional guard support (Mark Langsdorf) [RHEL-84410] - cleanup: Make no_free_ptr() __must_check (Mark Langsdorf) [RHEL-84410] - locking: Introduce __cleanup() based infrastructure (Mark Langsdorf) [RHEL-84410] - misc/vmw_vmci: fix an infoleak in vmci_host_do_receive_datagram() (CKI Backport Bot) [RHEL-100343] {CVE-2022-49788} - media: uvcvideo: Announce the user our deprecation intentions (Desnes Nunes) [RHEL-98760] - media: uvcvideo: Allow changing noparam on the fly (Desnes Nunes) [RHEL-98760] - media: uvcvideo: Invert default value for nodrop module param (Desnes Nunes) [RHEL-98760] - media: uvcvideo: Propagate buf->error to userspace (Desnes Nunes) [RHEL-98760] - media: uvcvideo: Flush the control cache when we get an event (Desnes Nunes) [RHEL-98760] - media: uvcvideo: Annotate lock requirements for uvc_ctrl_set (Desnes Nunes) [RHEL-98760] - media: uvcvideo: Remove dangling pointers (Desnes Nunes) [RHEL-98760] {CVE-2024-58002} - media: uvcvideo: Remove redundant NULL assignment (Desnes Nunes) [RHEL-98760] - media: uvcvideo: Only save async fh if success (Desnes Nunes) [RHEL-98760] - media: uvcvideo: Refactor iterators (Desnes Nunes) [RHEL-98760] - media: uvcvideo: Fix double free in error path (CKI Backport Bot) [RHEL-98788] {CVE-2024-57980} - cifs: potential buffer overflow in handling symlinks (Paulo Alcantara) [RHEL-97074] {CVE-2022-49058} - Race between reading mdstat and stopping an md device (Nigel Croxon) [RHEL-95723] - fs/dcache: Control # of dentries in list_lru_node (Waiman Long) [RHEL-8578] - fs/dcache: Add sysctl parameter dentry-fs-klimit to control # of dentries in filesystem (Waiman Long) [RHEL-8578] - mm/list_lru: Make list_lru_add() return # if items in affected list_lru_node (Waiman Long) [RHEL-8578] * Thu Jul 03 2025 Denys Vlasenko <dvlasenk@redhat.com> [4.18.0-553.61.1.el8_10] - s390: Add z17 elf platform (Christoph Schlameuss) [RHEL-100409] - ext4: ignore xattrs past end (CKI Backport Bot) [RHEL-100375] {CVE-2025-37738} - ext4: fix off-by-one error in do_split (CKI Backport Bot) [RHEL-100361] {CVE-2025-23150} - net: atm: fix use after free in lec_send() (CKI Backport Bot) [RHEL-93119] {CVE-2025-22004} - x86/microcode/AMD: Fix out-of-bounds on systems with CPU-less NUMA nodes (CKI Backport Bot) [RHEL-98980] {CVE-2025-21991} * Thu Jun 26 2025 Denys Vlasenko <dvlasenk@redhat.com> [4.18.0-553.60.1.el8_10] - xfs: don't allocate COW extents when unsharing a hole (Brian Foster) [RHEL-83037] - xfs: don't allocate into the data fork for an unshare request (Brian Foster) [RHEL-83037] - s390/ism: add release function for struct device (Mete Durlu) [RHEL-97192] - udf: Fix a slab-out-of-bounds write bug in udf_find_entry() (CKI Backport Bot) [RHEL-99113] {CVE-2022-49846} * Thu Jun 19 2025 Denys Vlasenko <dvlasenk@redhat.com> [4.18.0-553.59.1.el8_10] - SUNRPC: Fix Oops in xs_tcp_send_request() when transport is disconnected (Olga Kornievskaia) [RHEL-83291] - SUNRPC: Set TCP_CORK until the transmit queue is empty (Olga Kornievskaia) [RHEL-83291] - tcp: add tcp_sock_set_cork (Olga Kornievskaia) [RHEL-83291] - xfs: xfs_ail_push_all_sync() stalls when racing with updates (Brian Foster) [RHEL-88132] - Bluetooth: Fix use after free in hci_send_acl (CKI Backport Bot) [RHEL-90428] {CVE-2022-49111} - Bluetooth: MGMT: Fix failing to MGMT_OP_ADD_UUID/MGMT_OP_REMOVE_UUID (David Marlin) [RHEL-90468] {CVE-2022-49136} - Bluetooth: hci_sync: add lock to protect HCI_UNREGISTER (David Marlin) [RHEL-90468] {CVE-2022-49136} - Bluetooth: hci_sync: Only allow hci_cmd_sync_queue if running (David Marlin) [RHEL-90468] {CVE-2022-49136} - Bluetooth: Cancel sync command before suspend and power off (David Marlin) [RHEL-90468] {CVE-2022-49136} - Bluetooth: hci_sync: Fix queuing commands when HCI_UNREGISTER is set (CKI Backport Bot) [RHEL-90468] {CVE-2022-49136} - fix backport of "filelock: Remove locks reliably when fcntl/close race is detected" (Scott Mayhew) [RHEL-89709] - NFSv4: Allow FREE_STATEID to clean up delegations (Benjamin Coddington) [RHEL-86932] - NFSv4.1: constify the stateid argument in nfs41_test_stateid() (Trond Myklebust) [RHEL-86932] * Thu Jun 12 2025 Denys Vlasenko <dvlasenk@redhat.com> [4.18.0-553.58.1.el8_10] - ndisc: use RCU protection in ndisc_alloc_skb() (Xin Long) [RHEL-89535] {CVE-2025-21764} - ipv6: use RCU protection in ip6_default_advmss() (Xin Long) [RHEL-89535] {CVE-2025-21765} - net: add dev_net_rcu() helper (Xin Long) [RHEL-89535] {CVE-2025-21765} - net: treat possible_net_t net pointer as an RCU one and add read_pnet_rcu() (Xin Long) [RHEL-89535] - idpf: check error for register_netdev() on init (Michal Schmidt) [RHEL-71182] {CVE-2025-22116} - idpf: avoid mailbox timeout delays during reset (Michal Schmidt) [RHEL-71182] - idpf: fix a race in txq wakeup (Michal Schmidt) [RHEL-71182] - idpf: fix idpf_vport_splitq_napi_poll() (Michal Schmidt) [RHEL-71182] - idpf: fix null-ptr-deref in idpf_features_check (Michal Schmidt) [RHEL-71182] - idpf: protect shutdown from reset (Michal Schmidt) [RHEL-71182] - idpf: fix potential memory leak on kcalloc() failure (Michal Schmidt) [RHEL-71182] - idpf: fix offloads support for encapsulated packets (Michal Schmidt) [RHEL-71182] - idpf: fix adapter NULL pointer dereference on reboot (Michal Schmidt) [RHEL-71182] {CVE-2025-22065} - idpf: fix checksums set in idpf_rx_rsc() (Michal Schmidt) [RHEL-71182] {CVE-2025-21890} - idpf: fix handling rsc packet with a single segment (Michal Schmidt) [RHEL-71182] - idpf: add more info during virtchnl transaction timeout/salt mismatch (Michal Schmidt) [RHEL-71182] - idpf: convert workqueues to unbound (Michal Schmidt) [RHEL-71182] {CVE-2024-58057} - idpf: Acquire the lock before accessing the xn->salt (Michal Schmidt) [RHEL-71182] - idpf: fix transaction timeouts on reset (Michal Schmidt) [RHEL-71182] - idpf: add read memory barrier when checking descriptor done bit (Michal Schmidt) [RHEL-71182] - idpf: deinit virtchnl transaction manager after vport and vectors (Michal Schmidt) [RHEL-71182] - idpf: use actual mbx receive payload length (Michal Schmidt) [RHEL-71182] - idpf: call set_real_num_queues in idpf_open (Michal Schmidt) [RHEL-71182 RHEL-90849] - idpf: fix idpf_vc_core_init error path (Michal Schmidt) [RHEL-68233 RHEL-71182 RHEL-90846] {CVE-2024-53064} - idpf: avoid vport access in idpf_get_link_ksettings (Michal Schmidt) [RHEL-71182 RHEL-90846] {CVE-2024-50274} - idpf: fix netdev Tx queue stop/wake (Michal Schmidt) [RHEL-71182] - idpf: fix UAFs when destroying the queues (Michal Schmidt) [RHEL-71182] {CVE-2024-44932} - idpf: fix memleak in vport interrupt configuration (Michal Schmidt) [RHEL-71182] - idpf: fix memory leaks and crashes while performing a soft reset (Michal Schmidt) [RHEL-71182] {CVE-2024-44964} - idpf: compile singleq code only under default-n CONFIG_IDPF_SINGLEQ (Michal Schmidt) [RHEL-71182] - redhat/configs: set CONFIG_IDPF_SINGLEQ as disabled (Michal Schmidt) [RHEL-71182] - idpf: merge singleq and splitq &net_device_ops (Michal Schmidt) [RHEL-71182] - idpf: avoid bloating &idpf_q_vector with big %NR_CPUS (Michal Schmidt) [RHEL-71182] - idpf: split &idpf_queue into 4 strictly-typed queue structures (Michal Schmidt) [RHEL-71182] - idpf: remove legacy Page Pool Ethtool stats (Michal Schmidt) [RHEL-71182] - net: remove gfp_mask from napi_alloc_skb() [idpf] (Michal Schmidt) [RHEL-71182] - idpf: stop using macros for accessing queue descriptors (Michal Schmidt) [RHEL-71182] - idpf: don't enable NAPI and interrupts prior to allocating Rx buffers (Michal Schmidt) [RHEL-71182] - idpf: Interpret .set_channels() input differently (Michal Schmidt) [RHEL-71182] - idpf: make virtchnl2.h self-contained (Michal Schmidt) [RHEL-71182] - s390/pci: Serialize device addition and removal (Mete Durlu) [RHEL-95783] - s390/pci: Allow re-add of a reserved but not yet removed device (Mete Durlu) [RHEL-95783] - s390/pci: Prevent self deletion in disable_slot() (Mete Durlu) [RHEL-95783] - s390/pci: Remove redundant bus removal and disable from zpci_release_device() (Mete Durlu) [RHEL-95783] - s390/pci: Fix duplicate pci_dev_put() in disable_slot() when PF has child VFs (Mete Durlu) [RHEL-95783] - s390/pci: Fix missing check for zpci_create_device() error return (Mete Durlu) [RHEL-95783] - s390/pci: Fix potential double remove of hotplug slot (Mete Durlu) [RHEL-95783] - s390/pci: remove hotplug slot when releasing the device (Mete Durlu) [RHEL-95783] - s390/pci: introduce lock to synchronize state of zpci_dev's (Mete Durlu) [RHEL-95783] - s390/pci: rename lock member in struct zpci_dev (Mete Durlu) [RHEL-95783] * Thu Jun 05 2025 Denys Vlasenko <dvlasenk@redhat.com> [4.18.0-553.57.1.el8_10] - smb: client: fix warning in cifs_smb3_do_mount() (Paulo Alcantara) [RHEL-55825] - cifs: fix double free race when mount fails in cifs_get_root() (Paulo Alcantara) [RHEL-55825] {CVE-2022-48919} - security/keys: fix slab-out-of-bounds in key_task_permission (CKI Backport Bot) [RHEL-68090] {CVE-2024-50301} * Sun Jun 01 2025 Denys Vlasenko <dvlasenk@redhat.com> [4.18.0-553.56.1.el8_10] - tools/power/x86_energy_perf_policy: Read energy_perf_bias from sysfs (David Arcari) [RHEL-86963] - um: Fix out-of-bounds read in LDT setup (CKI Backport Bot) [RHEL-90261] {CVE-2022-49395} * Fri May 23 2025 Denys Vlasenko <dvlasenk@redhat.com> [4.18.0-553.55.1.el8_10] - sched/fair: Fix CPU bandwidth limit bypass during CPU hotplug (Phil Auld) [RHEL-85171] * Thu May 15 2025 Denys Vlasenko <dvlasenk@redhat.com> [4.18.0-553.54.1.el8_10] - ice: fix stats being updated by way too large values (CKI Backport Bot) [RHEL-70834] - wifi: rtw89: Fix array index mistake in rtw89_sta_info_get_iter() (CKI Backport Bot) [RHEL-54802] {CVE-2024-43842} - sched/rt: Fix race in push_rt_task (Phil Auld) [RHEL-84963]