The Linux Kernel, the operating system core itself.
Security Fix(es):
In the Linux kernel, the following vulnerability has been resolved:
mm/slub: avoid accessing metadata when pointer is invalid in object_err()
object_err() reports details of an object for further debugging, such as the freelist pointer, redzone, etc. However, if the pointer is invalid, attempting to access object metadata can lead to a crash since it does not point to a valid object.
One known path to the crash is when allocconsistencychecks() determines the pointer to the allocated object is invalid because of a freelist corruption, and calls object_err() to report it. The debug code should report and handle the corruption gracefully and not crash in the process.
In case the pointer is NULL or checkvalidpointer() returns false for the pointer, only print the pointer value and skip accessing metadata.(CVE-2025-39902)
In the Linux kernel, the following vulnerability has been resolved:
macvlan: fix error recovery in macvlancommonnewlink()
valis provided a nice repro to crash the kernel:
ip link add p1 type veth peer p2 ip link set address 00:00:00:00:00:20 dev p1 ip link set up dev p1 ip link set up dev p2
ip link add mv0 link p2 type macvlan mode source ip link add invalid% link p2 type macvlan mode source macaddr add 00:00:00:00:00:20
ping -c1 -I p1 1.2.3.4
He also gave a very detailed analysis:
<quote valis>
The issue is triggered when a new macvlan link is created with MACVLANMODESOURCE mode and MACVLANMACADDRADD (or MACVLANMACADDRSET) parameter, lower device already has a macvlan port and registernetdevice() called from macvlancommon_newlink() fails (e.g. because of the invalid link name).
In this case macvlanhashaddsource is called from macvlanchangesources() / macvlancommon_newlink():
This adds a reference to vlan to the port's vlansourcehash using macvlansourceentry.
vlan is a pointer to the priv data of the link that is being created.
When registernetdevice() fails, the error is returned from macvlannewlink() to rtnlnewlinkcreate():
if (ops->newlink)
err = ops->newlink(dev, &params, extack);
else
err = register_netdevice(dev);
if (err < 0) {
free_netdev(dev);
goto out;
}
and freenetdev() is called, causing a kvfree() on the struct netdevice that is still referenced in the source entry attached to the lower device's macvlan port.
Now all packets sent on the macvlan port with a matching source mac address will trigger a use-after-free in macvlanforwardsource().
</quote valis>
With all that, my fix is to make sure we call macvlanflushsources() regardless of @create value whenever "goto destroymacvlanport;" path is taken.
Many thanks to valis for following up on this issue.(CVE-2026-23209)
{
"severity": "High"
}{
"x86_64": [
"bpftool-4.19.90-2603.2.0.0365.oe2003sp4.x86_64.rpm",
"bpftool-debuginfo-4.19.90-2603.2.0.0365.oe2003sp4.x86_64.rpm",
"kernel-4.19.90-2603.2.0.0365.oe2003sp4.x86_64.rpm",
"kernel-debuginfo-4.19.90-2603.2.0.0365.oe2003sp4.x86_64.rpm",
"kernel-debugsource-4.19.90-2603.2.0.0365.oe2003sp4.x86_64.rpm",
"kernel-devel-4.19.90-2603.2.0.0365.oe2003sp4.x86_64.rpm",
"kernel-source-4.19.90-2603.2.0.0365.oe2003sp4.x86_64.rpm",
"kernel-tools-4.19.90-2603.2.0.0365.oe2003sp4.x86_64.rpm",
"kernel-tools-debuginfo-4.19.90-2603.2.0.0365.oe2003sp4.x86_64.rpm",
"kernel-tools-devel-4.19.90-2603.2.0.0365.oe2003sp4.x86_64.rpm",
"perf-4.19.90-2603.2.0.0365.oe2003sp4.x86_64.rpm",
"perf-debuginfo-4.19.90-2603.2.0.0365.oe2003sp4.x86_64.rpm",
"python2-perf-4.19.90-2603.2.0.0365.oe2003sp4.x86_64.rpm",
"python2-perf-debuginfo-4.19.90-2603.2.0.0365.oe2003sp4.x86_64.rpm",
"python3-perf-4.19.90-2603.2.0.0365.oe2003sp4.x86_64.rpm",
"python3-perf-debuginfo-4.19.90-2603.2.0.0365.oe2003sp4.x86_64.rpm"
],
"aarch64": [
"bpftool-4.19.90-2603.2.0.0365.oe2003sp4.aarch64.rpm",
"bpftool-debuginfo-4.19.90-2603.2.0.0365.oe2003sp4.aarch64.rpm",
"kernel-4.19.90-2603.2.0.0365.oe2003sp4.aarch64.rpm",
"kernel-debuginfo-4.19.90-2603.2.0.0365.oe2003sp4.aarch64.rpm",
"kernel-debugsource-4.19.90-2603.2.0.0365.oe2003sp4.aarch64.rpm",
"kernel-devel-4.19.90-2603.2.0.0365.oe2003sp4.aarch64.rpm",
"kernel-source-4.19.90-2603.2.0.0365.oe2003sp4.aarch64.rpm",
"kernel-tools-4.19.90-2603.2.0.0365.oe2003sp4.aarch64.rpm",
"kernel-tools-debuginfo-4.19.90-2603.2.0.0365.oe2003sp4.aarch64.rpm",
"kernel-tools-devel-4.19.90-2603.2.0.0365.oe2003sp4.aarch64.rpm",
"perf-4.19.90-2603.2.0.0365.oe2003sp4.aarch64.rpm",
"perf-debuginfo-4.19.90-2603.2.0.0365.oe2003sp4.aarch64.rpm",
"python2-perf-4.19.90-2603.2.0.0365.oe2003sp4.aarch64.rpm",
"python2-perf-debuginfo-4.19.90-2603.2.0.0365.oe2003sp4.aarch64.rpm",
"python3-perf-4.19.90-2603.2.0.0365.oe2003sp4.aarch64.rpm",
"python3-perf-debuginfo-4.19.90-2603.2.0.0365.oe2003sp4.aarch64.rpm"
],
"src": [
"kernel-4.19.90-2603.2.0.0365.oe2003sp4.src.rpm"
]
}