Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

rocky логотип

RLSA-2026:1662

Опубликовано: 11 фев. 2026
Источник: rocky
Оценка: Moderate

Описание

Moderate: kernel security update

The kernel packages contain the Linux kernel, the core of any Linux operating system.

Security Fix(es):

  • kernel: IB/hfi1: Fix sdma.h tx->num_descs off-by-one error (CVE-2024-26766)

  • kernel: RDMA/core: Fix "KASAN: slab-use-after-free Read in ib_register_device" problem (CVE-2025-38022)

  • kernel: Linux kernel: RDMA/rxe use-after-free vulnerability leading to potential arbitrary code execution (CVE-2025-38024)

  • kernel: Linux kernel: Memory corruption in Squashfs due to incorrect block size calculation (CVE-2025-38415)

  • kernel: Linux kernel: Denial of Service in ATM CLIP module via infinite recursion (CVE-2025-38459)

  • kernel: Linux kernel: Denial of Service via out-of-bounds read in USB configuration parsing (CVE-2025-39760)

  • kernel: mptcp: fix race condition in mptcp_schedule_work() (CVE-2025-40258)

  • kernel: Linux kernel: Use-after-free in proc_readdir_de() can lead to privilege escalation or denial of service. (CVE-2025-40271)

  • kernel: Linux kernel: Information disclosure and denial of service via out-of-bounds read in font glyph handling (CVE-2025-40322)

  • kernel: tcp: fix a signed-integer-overflow bug in tcp_add_backlog() (CVE-2022-50865)

For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.

Затронутые продукты

  • Rocky Linux 8

НаименованиеАрхитектураРелизRPM
bpftoolx86_64553.100.1.el8_10bpftool-4.18.0-553.100.1.el8_10.x86_64.rpm
kernelx86_64553.100.1.el8_10kernel-4.18.0-553.100.1.el8_10.x86_64.rpm
kernel-abi-stablelistsnoarch553.100.1.el8_10kernel-abi-stablelists-4.18.0-553.100.1.el8_10.noarch.rpm
kernel-corex86_64553.100.1.el8_10kernel-core-4.18.0-553.100.1.el8_10.x86_64.rpm
kernel-debugx86_64553.100.1.el8_10kernel-debug-4.18.0-553.100.1.el8_10.x86_64.rpm
kernel-debug-corex86_64553.100.1.el8_10kernel-debug-core-4.18.0-553.100.1.el8_10.x86_64.rpm
kernel-debug-develx86_64553.100.1.el8_10kernel-debug-devel-4.18.0-553.100.1.el8_10.x86_64.rpm
kernel-debuginfo-common-x86_64x86_64553.100.1.el8_10kernel-debuginfo-common-x86_64-4.18.0-553.100.1.el8_10.x86_64.rpm
kernel-debug-modulesx86_64553.100.1.el8_10kernel-debug-modules-4.18.0-553.100.1.el8_10.x86_64.rpm
kernel-debug-modules-extrax86_64553.100.1.el8_10kernel-debug-modules-extra-4.18.0-553.100.1.el8_10.x86_64.rpm

Показывать по

Связанные уязвимости

oracle-oval
около 2 месяцев назад

ELSA-2026-1662: kernel security update (MODERATE)

ubuntu
3 месяца назад

In the Linux kernel, the following vulnerability has been resolved: tcp: fix a signed-integer-overflow bug in tcp_add_backlog() The type of sk_rcvbuf and sk_sndbuf in struct sock is int, and in tcp_add_backlog(), the variable limit is caculated by adding sk_rcvbuf, sk_sndbuf and 64 * 1024, it may exceed the max value of int and overflow. This patch reduces the limit budget by halving the sndbuf to solve this issue since ACK packets are much smaller than the payload.

CVSS3: 7.5
redhat
3 месяца назад

In the Linux kernel, the following vulnerability has been resolved: tcp: fix a signed-integer-overflow bug in tcp_add_backlog() The type of sk_rcvbuf and sk_sndbuf in struct sock is int, and in tcp_add_backlog(), the variable limit is caculated by adding sk_rcvbuf, sk_sndbuf and 64 * 1024, it may exceed the max value of int and overflow. This patch reduces the limit budget by halving the sndbuf to solve this issue since ACK packets are much smaller than the payload.

nvd
3 месяца назад

In the Linux kernel, the following vulnerability has been resolved: tcp: fix a signed-integer-overflow bug in tcp_add_backlog() The type of sk_rcvbuf and sk_sndbuf in struct sock is int, and in tcp_add_backlog(), the variable limit is caculated by adding sk_rcvbuf, sk_sndbuf and 64 * 1024, it may exceed the max value of int and overflow. This patch reduces the limit budget by halving the sndbuf to solve this issue since ACK packets are much smaller than the payload.

debian
3 месяца назад

In the Linux kernel, the following vulnerability has been resolved: t ...