CVE-2026-23001 Affecting perf package, versions <0:4.18.0-553.111.1.el8_10


Severity

Recommended
high

Based on Oracle Linux security rating.

Threat Intelligence

EPSS
0.02% (5th percentile)

Do your applications use this vulnerable package?

In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.

Test your applications
  • Snyk IDSNYK-ORACLE8-PERF-15444898
  • published10 Mar 2026
  • disclosed25 Jan 2026

Introduced: 25 Jan 2026

CVE-2026-23001  (opens in a new tab)

How to fix?

Upgrade Oracle:8 perf to version 0:4.18.0-553.111.1.el8_10 or higher.
This issue was patched in ELSA-2026-3963.

NVD Description

Note: Versions mentioned in the description apply only to the upstream perf package and not the perf package as distributed by Oracle. See How to fix? for Oracle:8 relevant fixed versions and status.

In the Linux kernel, the following vulnerability has been resolved:

macvlan: fix possible UAF in macvlan_forward_source()

Add RCU protection on (struct macvlan_source_entry)->vlan.

Whenever macvlan_hash_del_source() is called, we must clear entry->vlan pointer before RCU grace period starts.

This allows macvlan_forward_source() to skip over entries queued for freeing.

Note that macvlan_dev are already RCU protected, as they are embedded in a standard netdev (netdev_priv(ndev)).

https: //lore.kernel.org/netdev/695fb1e8.050a0220.1c677c.039f.GAE@google.com/T/#u

CVSS Base Scores

version 3.1