In the Linux kernel, the following vulnerability has been resolved: ipv6: use RCU in ip6_output() Use RCU in ip6_output() in order to use dst_dev_rcu() to prevent possible UAF. We can remove rcu_read_lock()/rcu_read_unlock() pairs from ip6_finish_output2().
Upstream advisory: https://lore.kernel.org/linux-cve-announce/2025111258-CVE-2025-40158-4c9d@gregkh/T
This issue has been addressed in the following products: Red Hat Enterprise Linux 10 Via RHSA-2026:1690 https://access.redhat.com/errata/RHSA-2026:1690
This issue has been addressed in the following products: Red Hat Enterprise Linux 9 Via RHSA-2026:2212 https://access.redhat.com/errata/RHSA-2026:2212
This issue has been addressed in the following products: Red Hat Enterprise Linux 8 Via RHSA-2026:2264 https://access.redhat.com/errata/RHSA-2026:2264
This issue has been addressed in the following products: Red Hat Enterprise Linux 8 Via RHSA-2026:2378 https://access.redhat.com/errata/RHSA-2026:2378