Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

rocky логотип

RLSA-2026:3963

Опубликовано: 26 мар. 2026
Источник: rocky
Оценка: Moderate

Описание

Moderate: kernel security update

The kernel packages contain the Linux kernel, the core of any Linux operating system.

Security Fix(es):

  • kernel: ipv6: BUG() in pskb_expand_head() as part of calipso_skbuff_setattr() (CVE-2025-71085)

  • kernel: macvlan: fix possible UAF in macvlan_forward_source() (CVE-2026-23001)

For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.

Затронутые продукты

  • Rocky Linux 8

НаименованиеАрхитектураРелизRPM
bpftoolx86_64553.111.1.el8_10bpftool-4.18.0-553.111.1.el8_10.x86_64.rpm
kernelx86_64553.111.1.el8_10kernel-4.18.0-553.111.1.el8_10.x86_64.rpm
kernel-abi-stablelistsnoarch553.111.1.el8_10kernel-abi-stablelists-4.18.0-553.111.1.el8_10.noarch.rpm
kernel-corex86_64553.111.1.el8_10kernel-core-4.18.0-553.111.1.el8_10.x86_64.rpm
kernel-debugx86_64553.111.1.el8_10kernel-debug-4.18.0-553.111.1.el8_10.x86_64.rpm
kernel-debug-corex86_64553.111.1.el8_10kernel-debug-core-4.18.0-553.111.1.el8_10.x86_64.rpm
kernel-debug-develx86_64553.111.1.el8_10kernel-debug-devel-4.18.0-553.111.1.el8_10.x86_64.rpm
kernel-debuginfo-common-x86_64x86_64553.111.1.el8_10kernel-debuginfo-common-x86_64-4.18.0-553.111.1.el8_10.x86_64.rpm
kernel-debug-modulesx86_64553.111.1.el8_10kernel-debug-modules-4.18.0-553.111.1.el8_10.x86_64.rpm
kernel-debug-modules-extrax86_64553.111.1.el8_10kernel-debug-modules-extra-4.18.0-553.111.1.el8_10.x86_64.rpm

Показывать по

Связанные CVE

Связанные уязвимости

oracle-oval
30 дней назад

ELSA-2026-3963: kernel security update (IMPORTANT)

oracle-oval
29 дней назад

ELSA-2026-4012: kernel security update (IMPORTANT)

CVSS3: 7.8
ubuntu
2 месяца назад

In the Linux kernel, the following vulnerability has been resolved: macvlan: fix possible UAF in macvlan_forward_source() Add RCU protection on (struct macvlan_source_entry)->vlan. Whenever macvlan_hash_del_source() is called, we must clear entry->vlan pointer before RCU grace period starts. This allows macvlan_forward_source() to skip over entries queued for freeing. Note that macvlan_dev are already RCU protected, as they are embedded in a standard netdev (netdev_priv(ndev)). https: //lore.kernel.org/netdev/695fb1e8.050a0220.1c677c.039f.GAE@google.com/T/#u

CVSS3: 7.8
redhat
2 месяца назад

In the Linux kernel, the following vulnerability has been resolved: macvlan: fix possible UAF in macvlan_forward_source() Add RCU protection on (struct macvlan_source_entry)->vlan. Whenever macvlan_hash_del_source() is called, we must clear entry->vlan pointer before RCU grace period starts. This allows macvlan_forward_source() to skip over entries queued for freeing. Note that macvlan_dev are already RCU protected, as they are embedded in a standard netdev (netdev_priv(ndev)). https: //lore.kernel.org/netdev/695fb1e8.050a0220.1c677c.039f.GAE@google.com/T/#u

CVSS3: 7.8
nvd
2 месяца назад

In the Linux kernel, the following vulnerability has been resolved: macvlan: fix possible UAF in macvlan_forward_source() Add RCU protection on (struct macvlan_source_entry)->vlan. Whenever macvlan_hash_del_source() is called, we must clear entry->vlan pointer before RCU grace period starts. This allows macvlan_forward_source() to skip over entries queued for freeing. Note that macvlan_dev are already RCU protected, as they are embedded in a standard netdev (netdev_priv(ndev)). https: //lore.kernel.org/netdev/695fb1e8.050a0220.1c677c.039f.GAE@google.com/T/#u