Name: | kernel |
---|---|
Version: | 4.18.0 |
Release: | 553.66.1.0.1.el8_10 |
Architecture: | x86_64 |
Group: | System Environment/Kernel |
Size: | 0 |
License: | GPLv2 and Redistributable, no modification permitted |
RPM: | kernel-4.18.0-553.66.1.0.1.el8_10.x86_64.rpm |
Source RPM: | kernel-4.18.0-553.66.1.0.1.el8_10.src.rpm |
Build Date: | Tue Aug 05 2025 |
Build Host: | build-ol8-x86_64.oracle.com |
Vendor: | Oracle America |
URL: | http://www.kernel.org/ |
Summary: | The Linux kernel, based on version 4.18.0, heavily modified with backports |
Description: | This is the package which provides the Linux kernel for Red Hat Enterprise Linux. It is based on upstream Linux at version 4.18.0 and maintains kABI compatibility of a set of approved symbols, however it is heavily modified with backports and fixes pulled from newer upstream Linux kernel releases. This means this is not a 4.18.0 kernel anymore: it includes several components which come from newer upstream linux versions, while maintaining a well tested and stable core. Some of the components/backports that may be pulled in are: changes like updates to the core kernel (eg.: scheduler, cgroups, memory management, security fixes and features), updates to block layer, supported filesystems, major driver updates for supported hardware in Red Hat Enterprise Linux, enhancements for enterprise customers, etc. |
- scsi: core: Restrict legal sdev_state transitions via sysfs (Uday Shankar) [Orabug: 37778230]
- Update Oracle Linux certificates (Kevin Lyons) - Disable signing for aarch64 (Ilya Okomin) - Oracle Linux RHCK Module Signing Key was added to the kernel trusted keys list (olkmod_signing_key.pem) [Orabug: 29539237] - Update x509.genkey [Orabug: 24817676] - Conflict with shim-ia32 and shim-x64 <= 15.3-1.0.3 - Remove upstream reference during boot (Kevin Lyons) [Orabug: 34750652] - Add new Oracle Linux Driver Signing (key 1) certificate [Orabug: 37985772]
- net_sched: hfsc: Address reentrant enqueue adding class to eltree twice (Xin Long) [RHEL-105415] {CVE-2025-38001} - sch_hfsc: Fix qlen accounting bug when using peek in hfsc_enqueue() (Xin Long) [RHEL-105415] {CVE-2025-38000} - net_sched: hfsc: Fix a UAF vulnerability in class with netem as child qdisc (CKI Backport Bot) [RHEL-105415] {CVE-2025-37890} - sch_hfsc: make hfsc_qlen_notify() idempotent (Xin Long) [RHEL-105415] - crypto: algif_hash - fix double free in hash_accept (CKI Backport Bot) [RHEL-102223] {CVE-2025-38079} - Revert "smb: client: fix TCP timers deadlock after rmmod" (Paulo Alcantara) [RHEL-100698] {CVE-2025-22077} - Revert "smb: client: Fix netns refcount imbalance causing leaks and use-after-free" (Paulo Alcantara) [RHEL-100698] - smb: client: Fix netns refcount imbalance causing leaks and use-after-free (Paulo Alcantara) [RHEL-100698] - smb: client: fix TCP timers deadlock after rmmod (Paulo Alcantara) [RHEL-100698] {CVE-2024-54680} - smb: client: Fix use-after-free of network namespace. (Paulo Alcantara) [RHEL-100698] {CVE-2024-53095} - smb: client: fix warning in generic_ip_connect() (Paulo Alcantara) [RHEL-100698] - net: tipc: fix refcount warning in tipc_aead_encrypt (Xin Long) [RHEL-103079] - net/tipc: fix slab-use-after-free Read in tipc_aead_encrypt_done (CKI Backport Bot) [RHEL-103079] {CVE-2025-38052} - memstick: rtsx_usb_ms: Fix slab-use-after-free in rtsx_usb_ms_drv_remove (CKI Backport Bot) [RHEL-99013] {CVE-2025-22020} - HID: intel-ish-hid: Fix use-after-free issue in ishtp_hid_remove() (CKI Backport Bot) [RHEL-98837] {CVE-2025-21928}
- x86/alternatives: avoid mapping FIX_TEXT_POKE1 page when it is not required (Rafael Aquini) [RHEL-95422] - ext4: avoid resizing to a partial cluster size (CKI Backport Bot) [RHEL-101423] {CVE-2022-50020}
- sched/fair: Fix potential memory corruption in child_cfs_rq_on_list (CKI Backport Bot) [RHEL-100387] {CVE-2025-21919} - NFSv4/pNFS: Fix a race to wake on NFS_LAYOUT_DRAIN (Benjamin Coddington) [RHEL-86256] - ftrace: Fix NULL pointer dereference in is_ftrace_trampoline when ftrace is dead (CKI Backport Bot) [RHEL-102133] {CVE-2022-49977} - wifi: iwlwifi: limit printed string from FW file (CKI Backport Bot) [RHEL-99367] {CVE-2025-21905} - workqueue: Disable printk_deferred_{enter,exit} in RT kernel (Waiman Long) [RHEL-80292] - workqueue: Make show_pwq() use run-length encoding (Waiman Long) [RHEL-80292] - workqueue: Introduce show_one_worker_pool and show_one_workqueue. (Waiman Long) [RHEL-80292] - workqueue: fix state-dump console deadlock (Waiman Long) [RHEL-80292]
- tcp/dccp: Don't use timer_pending() in reqsk_queue_unlink(). (Guillaume Nault) [RHEL-66324] {CVE-2024-50154} - net: ch9200: fix uninitialised access during mii_nway_restart (CKI Backport Bot) [RHEL-101200] {CVE-2025-38086} - mm/swapfile: add cond_resched() in get_swap_pages() (Nico Pache) [RHEL-80401] {CVE-2023-52932} - dlm: fix possible lkb_resource null dereference (Alexander Aring) [RHEL-64452] - fs: dlm: handle -EINVAL as log_error() (Alexander Aring) [RHEL-64452] - redhat/configs: enable CONFIG_RH_KABI_STABLE_ASM_OFFSETS (Čestmír Kalina) [RHEL-90099] - kabi: freeze stablelist and stackprotector-related constants (Čestmír Kalina) [RHEL-90099] - kabi: add redhat/kabi/asm-offsets (Čestmír Kalina) [RHEL-90099] - kabi: add RH_KABI_ASSERT_EQ_CONST{,EXPR} (Čestmír Kalina) [RHEL-90099]
- s390/virtio_ccw: Don't allocate/assign airqs for non-existing queues (David Hildenbrand) [RHEL-87557] - mm/slab: make __free(kfree) accept error pointers (Mark Langsdorf) [RHEL-84410] - driver core: fix potential NULL pointer dereference in dev_uevent() (Mark Langsdorf) [RHEL-84410] - driver core: introduce device_set_driver() helper (Mark Langsdorf) [RHEL-84410] - Revert "drivers: core: synchronize really_probe() and dev_uevent()" (Mark Langsdorf) [RHEL-84410] - cleanup: Add conditional guard helper (Mark Langsdorf) [RHEL-84410] - cleanup: Adjust scoped_guard() macros to avoid potential warning (Mark Langsdorf) [RHEL-84410] - cleanup: Remove address space of returned pointer (Mark Langsdorf) [RHEL-84410] - cleanup: Add usage and style documentation (Mark Langsdorf) [RHEL-84410] - file: add take_fd() cleanup helper (Mark Langsdorf) [RHEL-84410] - cleanup: Standardize the header guard define's name (Mark Langsdorf) [RHEL-84410] - cleanup: Add conditional guard support (Mark Langsdorf) [RHEL-84410] - cleanup: Make no_free_ptr() __must_check (Mark Langsdorf) [RHEL-84410] - locking: Introduce __cleanup() based infrastructure (Mark Langsdorf) [RHEL-84410] - misc/vmw_vmci: fix an infoleak in vmci_host_do_receive_datagram() (CKI Backport Bot) [RHEL-100343] {CVE-2022-49788} - media: uvcvideo: Announce the user our deprecation intentions (Desnes Nunes) [RHEL-98760] - media: uvcvideo: Allow changing noparam on the fly (Desnes Nunes) [RHEL-98760] - media: uvcvideo: Invert default value for nodrop module param (Desnes Nunes) [RHEL-98760] - media: uvcvideo: Propagate buf->error to userspace (Desnes Nunes) [RHEL-98760] - media: uvcvideo: Flush the control cache when we get an event (Desnes Nunes) [RHEL-98760] - media: uvcvideo: Annotate lock requirements for uvc_ctrl_set (Desnes Nunes) [RHEL-98760] - media: uvcvideo: Remove dangling pointers (Desnes Nunes) [RHEL-98760] {CVE-2024-58002} - media: uvcvideo: Remove redundant NULL assignment (Desnes Nunes) [RHEL-98760] - media: uvcvideo: Only save async fh if success (Desnes Nunes) [RHEL-98760] - media: uvcvideo: Refactor iterators (Desnes Nunes) [RHEL-98760] - media: uvcvideo: Fix double free in error path (CKI Backport Bot) [RHEL-98788] {CVE-2024-57980} - cifs: potential buffer overflow in handling symlinks (Paulo Alcantara) [RHEL-97074] {CVE-2022-49058} - Race between reading mdstat and stopping an md device (Nigel Croxon) [RHEL-95723] - fs/dcache: Control # of dentries in list_lru_node (Waiman Long) [RHEL-8578] - fs/dcache: Add sysctl parameter dentry-fs-klimit to control # of dentries in filesystem (Waiman Long) [RHEL-8578] - mm/list_lru: Make list_lru_add() return # if items in affected list_lru_node (Waiman Long) [RHEL-8578]
- s390: Add z17 elf platform (Christoph Schlameuss) [RHEL-100409] - ext4: ignore xattrs past end (CKI Backport Bot) [RHEL-100375] {CVE-2025-37738} - ext4: fix off-by-one error in do_split (CKI Backport Bot) [RHEL-100361] {CVE-2025-23150} - net: atm: fix use after free in lec_send() (CKI Backport Bot) [RHEL-93119] {CVE-2025-22004} - x86/microcode/AMD: Fix out-of-bounds on systems with CPU-less NUMA nodes (CKI Backport Bot) [RHEL-98980] {CVE-2025-21991}
- xfs: don't allocate COW extents when unsharing a hole (Brian Foster) [RHEL-83037] - xfs: don't allocate into the data fork for an unshare request (Brian Foster) [RHEL-83037] - s390/ism: add release function for struct device (Mete Durlu) [RHEL-97192] - udf: Fix a slab-out-of-bounds write bug in udf_find_entry() (CKI Backport Bot) [RHEL-99113] {CVE-2022-49846}
- SUNRPC: Fix Oops in xs_tcp_send_request() when transport is disconnected (Olga Kornievskaia) [RHEL-83291] - SUNRPC: Set TCP_CORK until the transmit queue is empty (Olga Kornievskaia) [RHEL-83291] - tcp: add tcp_sock_set_cork (Olga Kornievskaia) [RHEL-83291] - xfs: xfs_ail_push_all_sync() stalls when racing with updates (Brian Foster) [RHEL-88132] - Bluetooth: Fix use after free in hci_send_acl (CKI Backport Bot) [RHEL-90428] {CVE-2022-49111} - Bluetooth: MGMT: Fix failing to MGMT_OP_ADD_UUID/MGMT_OP_REMOVE_UUID (David Marlin) [RHEL-90468] {CVE-2022-49136} - Bluetooth: hci_sync: add lock to protect HCI_UNREGISTER (David Marlin) [RHEL-90468] {CVE-2022-49136} - Bluetooth: hci_sync: Only allow hci_cmd_sync_queue if running (David Marlin) [RHEL-90468] {CVE-2022-49136} - Bluetooth: Cancel sync command before suspend and power off (David Marlin) [RHEL-90468] {CVE-2022-49136} - Bluetooth: hci_sync: Fix queuing commands when HCI_UNREGISTER is set (CKI Backport Bot) [RHEL-90468] {CVE-2022-49136} - fix backport of "filelock: Remove locks reliably when fcntl/close race is detected" (Scott Mayhew) [RHEL-89709] - NFSv4: Allow FREE_STATEID to clean up delegations (Benjamin Coddington) [RHEL-86932] - NFSv4.1: constify the stateid argument in nfs41_test_stateid() (Trond Myklebust) [RHEL-86932]