Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

rocky логотип

RLSA-2026:0759

Опубликовано: 24 янв. 2026
Источник: rocky
Оценка: Important

Описание

Important: kernel security update

The kernel packages contain the Linux kernel, the core of any Linux operating system.

Security Fix(es):

  • kernel: smb: client: Fix use-after-free in cifs_fill_dirent (CVE-2025-38051)

  • kernel: smb: client: let recv_done verify data_offset, data_length and remaining_data_length (CVE-2025-39933)

  • kernel: drm/i915: mark requests for GuC virtual engines to avoid use-after-free (CVE-2023-53552)

  • kernel: drm/sched: Fix potential double free in drm_sched_job_add_resv_dependencies (CVE-2025-40096)

  • kernel: net: atlantic: fix fragment overflow handling in RX path (CVE-2025-68301)

For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.

Затронутые продукты

  • Rocky Linux 8

НаименованиеАрхитектураРелизRPM
bpftoolx86_64553.94.1.el8_10bpftool-4.18.0-553.94.1.el8_10.x86_64.rpm
kernelx86_64553.94.1.el8_10kernel-4.18.0-553.94.1.el8_10.x86_64.rpm
kernel-abi-stablelistsnoarch553.94.1.el8_10kernel-abi-stablelists-4.18.0-553.94.1.el8_10.noarch.rpm
kernel-abi-stablelistsnoarch553.94.1.el8_10kernel-abi-stablelists-4.18.0-553.94.1.el8_10.noarch.rpm
kernel-corex86_64553.94.1.el8_10kernel-core-4.18.0-553.94.1.el8_10.x86_64.rpm
kernel-debugx86_64553.94.1.el8_10kernel-debug-4.18.0-553.94.1.el8_10.x86_64.rpm
kernel-debug-corex86_64553.94.1.el8_10kernel-debug-core-4.18.0-553.94.1.el8_10.x86_64.rpm
kernel-debug-develx86_64553.94.1.el8_10kernel-debug-devel-4.18.0-553.94.1.el8_10.x86_64.rpm
kernel-debuginfo-common-x86_64x86_64553.94.1.el8_10kernel-debuginfo-common-x86_64-4.18.0-553.94.1.el8_10.x86_64.rpm
kernel-debug-modulesx86_64553.94.1.el8_10kernel-debug-modules-4.18.0-553.94.1.el8_10.x86_64.rpm

Показывать по

Связанные уязвимости

oracle-oval
17 дней назад

ELSA-2026-0759: kernel security update (IMPORTANT)

ubuntu
4 месяца назад

In the Linux kernel, the following vulnerability has been resolved: drm/i915: mark requests for GuC virtual engines to avoid use-after-free References to i915_requests may be trapped by userspace inside a sync_file or dmabuf (dma-resv) and held indefinitely across different proceses. To counter-act the memory leaks, we try to not to keep references from the request past their completion. On the other side on fence release we need to know if rq->engine is valid and points to hw engine (true for non-virtual requests). To make it possible extra bit has been added to rq->execution_mask, for marking virtual engines. (cherry picked from commit 280410677af763f3871b93e794a199cfcf6fb580)

nvd
4 месяца назад

In the Linux kernel, the following vulnerability has been resolved: drm/i915: mark requests for GuC virtual engines to avoid use-after-free References to i915_requests may be trapped by userspace inside a sync_file or dmabuf (dma-resv) and held indefinitely across different proceses. To counter-act the memory leaks, we try to not to keep references from the request past their completion. On the other side on fence release we need to know if rq->engine is valid and points to hw engine (true for non-virtual requests). To make it possible extra bit has been added to rq->execution_mask, for marking virtual engines. (cherry picked from commit 280410677af763f3871b93e794a199cfcf6fb580)

debian
4 месяца назад

In the Linux kernel, the following vulnerability has been resolved: d ...

github
4 месяца назад

In the Linux kernel, the following vulnerability has been resolved: drm/i915: mark requests for GuC virtual engines to avoid use-after-free References to i915_requests may be trapped by userspace inside a sync_file or dmabuf (dma-resv) and held indefinitely across different proceses. To counter-act the memory leaks, we try to not to keep references from the request past their completion. On the other side on fence release we need to know if rq->engine is valid and points to hw engine (true for non-virtual requests). To make it possible extra bit has been added to rq->execution_mask, for marking virtual engines. (cherry picked from commit 280410677af763f3871b93e794a199cfcf6fb580)