Updated: 2026-02-09 05:35:51.315046
Description:
In the Linux kernel, the following vulnerability has been resolved: net: use dst_dev_rcu() in sk_setup_caps() Use RCU to protect accesses to dst->dev from sk_setup_caps() and sk_dst_gso_max_size(). Also use dst_dev_rcu() in ip6_dst_mtu_maybe_forward(), and ip_dst_mtu_maybe_forward(). ip4_dst_hoplimit() can use dst_dev_net_rcu().
| Links | NIST | CIRCL | RHEL | Ubuntu |
| Severity | Score | |
|---|---|---|
| CVSS Version 2.x | NONE | 0.0 |
| CVSS Version 3.x | HIGH | 7.4 |
| OS name | Project name | Version | Score | Severity | Status | Errata | Last updated | Statement |
|---|---|---|---|---|---|---|---|---|
| AlmaLinux 9.2 ESU | kernel | 5.14.0 | 7.4 | HIGH | Needs Triage | 2026-02-09 19:28:29 | ||
| CentOS 8.4 ELS | kernel | 4.18.0 | 7.4 | HIGH | Needs Triage | 2026-02-09 19:28:24 | ||
| CentOS 8.5 ELS | kernel | 4.18.0 | 7.4 | HIGH | Needs Triage | 2026-02-09 19:28:23 | ||
| CentOS Stream 8 ELS | kernel | 4.18.0 | 7.4 | HIGH | Needs Triage | 2026-02-09 19:28:30 | ||
| TuxCare 9.6 ESU | kernel | 5.14.0 | 7.4 | HIGH | Needs Triage | 2026-02-09 19:28:26 |