Monitor vulnerabilities like this one.
Sign up free to get alerted when software you use is affected.
7.3
Linux Kernel Update Fixes Security Flaws in ATM and Networking
RLSA-2026:6037
Summary
This update fixes security issues in the Linux kernel that could allow attackers to gain control of your system or disrupt network services. The update is recommended to ensure the stability and security of your Linux system. Apply the update as soon as possible to protect your system from potential threats.
What to do
- Update kernel to version 0:4.18.0-553.115.1.el8_10.
Affected software
| Vendor | Product | Affected versions | Fix available |
|---|---|---|---|
| – | kernel | <= 0:4.18.0-553.115.1.el8_10 | 0:4.18.0-553.115.1.el8_10 |
Original title
Moderate: kernel security update
Original description
The kernel packages contain the Linux kernel, the core of any Linux operating system.
Security Fix(es):
* kernel: Linux kernel: Use-After-Free vulnerability in ATM subsystem (CVE-2025-38180)
* kernel: macvlan: fix error recovery in macvlan_common_newlink() (CVE-2026-23209)
* kernel: net/sched: cls_u32: use skb_header_pointer_careful() (CVE-2026-23204)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Security Fix(es):
* kernel: Linux kernel: Use-After-Free vulnerability in ATM subsystem (CVE-2025-38180)
* kernel: macvlan: fix error recovery in macvlan_common_newlink() (CVE-2026-23209)
* kernel: net/sched: cls_u32: use skb_header_pointer_careful() (CVE-2026-23204)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
osv CVSS3.1
7.3
- https://errata.rockylinux.org/RLSA-2026:6037 Vendor Advisory
- https://bugzilla.redhat.com/show_bug.cgi?id=2376376 Third Party Advisory
- https://bugzilla.redhat.com/show_bug.cgi?id=2439900 Third Party Advisory
- https://bugzilla.redhat.com/show_bug.cgi?id=2439931 Third Party Advisory
Published: 7 Apr 2026 · Updated: 7 Apr 2026 · First seen: 7 Apr 2026