Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

rocky логотип

RLSA-2026:6053

Опубликовано: 09 апр. 2026
Источник: rocky
Оценка: Moderate

Описание

Moderate: kernel security update

The kernel packages contain the Linux kernel, the core of any Linux operating system.

Security Fix(es):

  • kernel: kernel: Privilege escalation or denial of service via use-after-free in nf_tables_addchain() (CVE-2026-23231)

  • kernel: Linux kernel (qla2xxx): Double free vulnerability leads to denial of service and potential privilege escalation. (CVE-2025-71238)

For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.

Затронутые продукты

  • Rocky Linux 10

НаименованиеАрхитектураРелизRPM
kernel-modules-corex86_64124.47.1.el10_1kernel-modules-core-6.12.0-124.47.1.el10_1.x86_64.rpm
kernelx86_64124.47.1.el10_1kernel-6.12.0-124.47.1.el10_1.x86_64.rpm
kernel-debug-modules-extrax86_64124.47.1.el10_1kernel-debug-modules-extra-6.12.0-124.47.1.el10_1.x86_64.rpm
kernel-debug-modules-corex86_64124.47.1.el10_1kernel-debug-modules-core-6.12.0-124.47.1.el10_1.x86_64.rpm
kernel-debug-modulesx86_64124.47.1.el10_1kernel-debug-modules-6.12.0-124.47.1.el10_1.x86_64.rpm
kernel-modules-extrax86_64124.47.1.el10_1kernel-modules-extra-6.12.0-124.47.1.el10_1.x86_64.rpm
kernel-modules-extra-matchedx86_64124.47.1.el10_1kernel-modules-extra-matched-6.12.0-124.47.1.el10_1.x86_64.rpm
kernel-debug-uki-virtx86_64124.47.1.el10_1kernel-debug-uki-virt-6.12.0-124.47.1.el10_1.x86_64.rpm
kernel-uki-virtx86_64124.47.1.el10_1kernel-uki-virt-6.12.0-124.47.1.el10_1.x86_64.rpm
kernel-debugx86_64124.47.1.el10_1kernel-debug-6.12.0-124.47.1.el10_1.x86_64.rpm

Показывать по

Связанные CVE

Связанные уязвимости

oracle-oval
около 1 месяца назад

ELSA-2026-6053: kernel security update (MODERATE)

rocky
25 дней назад

Moderate: kernel security update

oracle-oval
30 дней назад

ELSA-2026-6571: kernel security update (MODERATE)

CVSS3: 7.8
ubuntu
2 месяца назад

In the Linux kernel, the following vulnerability has been resolved: scsi: qla2xxx: Fix bsg_done() causing double free Kernel panic observed on system, [5353358.825191] BUG: unable to handle page fault for address: ff5f5e897b024000 [5353358.825194] #PF: supervisor write access in kernel mode [5353358.825195] #PF: error_code(0x0002) - not-present page [5353358.825196] PGD 100006067 P4D 0 [5353358.825198] Oops: 0002 [#1] PREEMPT SMP NOPTI [5353358.825200] CPU: 5 PID: 2132085 Comm: qlafwupdate.sub Kdump: loaded Tainted: G W L ------- --- 5.14.0-503.34.1.el9_5.x86_64 #1 [5353358.825203] Hardware name: HPE ProLiant DL360 Gen11/ProLiant DL360 Gen11, BIOS 2.44 01/17/2025 [5353358.825204] RIP: 0010:memcpy_erms+0x6/0x10 [5353358.825211] RSP: 0018:ff591da8f4f6b710 EFLAGS: 00010246 [5353358.825212] RAX: ff5f5e897b024000 RBX: 0000000000007090 RCX: 0000000000001000 [5353358.825213] RDX: 0000000000001000 RSI: ff591da8f4fed090 RDI: ff5f5e897b024000 [5353358.825214] RBP: 0000000000010...

CVSS3: 7.3
redhat
2 месяца назад

In the Linux kernel, the following vulnerability has been resolved: scsi: qla2xxx: Fix bsg_done() causing double free Kernel panic observed on system, [5353358.825191] BUG: unable to handle page fault for address: ff5f5e897b024000 [5353358.825194] #PF: supervisor write access in kernel mode [5353358.825195] #PF: error_code(0x0002) - not-present page [5353358.825196] PGD 100006067 P4D 0 [5353358.825198] Oops: 0002 [#1] PREEMPT SMP NOPTI [5353358.825200] CPU: 5 PID: 2132085 Comm: qlafwupdate.sub Kdump: loaded Tainted: G W L ------- --- 5.14.0-503.34.1.el9_5.x86_64 #1 [5353358.825203] Hardware name: HPE ProLiant DL360 Gen11/ProLiant DL360 Gen11, BIOS 2.44 01/17/2025 [5353358.825204] RIP: 0010:memcpy_erms+0x6/0x10 [5353358.825211] RSP: 0018:ff591da8f4f6b710 EFLAGS: 00010246 [5353358.825212] RAX: ff5f5e897b024000 RBX: 0000000000007090 RCX: 0000000000001000 [5353358.825213] RDX: 0000000000001000 RSI: ff591da8f4fed090 RDI: ff5f5e897b024000 [5353358.825214] RBP: 0000000000010...