RLSA-2026:2264

Source
https://errata.rockylinux.org/RLSA-2026:2264
Import Source
https://storage.googleapis.com/resf-osv-data/RLSA-2026:2264.json
JSON Data
https://api.osv.dev/v1/vulns/RLSA-2026:2264
Upstream
Published
2026-02-15T09:02:43.921640Z
Modified
2026-02-15T09:30:29.551875Z
Severity
  • 7.5 (High) CVSS_V3 - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H CVSS Calculator
Summary
Moderate: kernel security update
Details

The kernel packages contain the Linux kernel, the core of any Linux operating system.

Security Fix(es):

  • kernel: vsock/vmci: Clear the vmci transport packet properly when initializing it (CVE-2025-38403)

  • kernel: net: use dstdevrcu() in sksetupcaps() (CVE-2025-40170)

  • kernel: ipv6: use RCU in ip6_xmit() (CVE-2025-40135)

  • kernel: ipv6: use RCU in ip6_output() (CVE-2025-40158)

  • kernel: Linux kernel ALSA USB audio driver: Buffer overflow leading to information disclosure and denial of service (CVE-2025-40269)

  • kernel: ext4: fix use-after-free in ext4orphancleanup (CVE-2022-50673)

  • kernel: NFSv4/pNFS: Clear NFSINOLAYOUTCOMMIT in pnfsmarklayoutstateidinvalid (CVE-2025-68349)

  • kernel: nvme-tcp: fix NULL pointer dereferences in nvmettcpbuildpduiovec (CVE-2026-22998)

For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.

References
Credits
    • Rocky Enterprise Software Foundation
    • Red Hat

Affected packages

Rocky Linux:8 / kernel

Package

Name
kernel
Purl
pkg:rpm/rocky-linux/kernel?distro=rocky-linux-8&epoch=0

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
0:4.18.0-553.104.1.el8_10
Database specific
{
    "yum_repository": "BaseOS"
}

Database specific

source
"https://storage.googleapis.com/resf-osv-data/RLSA-2026:2264.json"