Monitor vulnerabilities like this one.
Sign up free to get alerted when software you use is affected.
7.8
Red Hat Linux Kernel Update Fixes Security Flaw
RHSA-2026:4012
Summary
A security vulnerability has been identified in the Red Hat Linux kernel. This issue could allow an attacker to potentially execute malicious code with elevated privileges. To fix this, update your Red Hat Linux system with the latest kernel patch.
What to do
- Update redhat kernel to version 0:6.12.0-124.43.1.el10_1.
- Update redhat kernel-64k to version 0:6.12.0-124.43.1.el10_1.
- Update redhat kernel-64k-core to version 0:6.12.0-124.43.1.el10_1.
- Update redhat kernel-64k-debug to version 0:6.12.0-124.43.1.el10_1.
- Update redhat kernel-64k-debug-core to version 0:6.12.0-124.43.1.el10_1.
- Update redhat kernel-64k-debug-debuginfo to version 0:6.12.0-124.43.1.el10_1.
- Update redhat kernel-64k-debug-devel to version 0:6.12.0-124.43.1.el10_1.
- Update redhat kernel-64k-debug-devel-matched to version 0:6.12.0-124.43.1.el10_1.
- Update redhat kernel-64k-debug-modules to version 0:6.12.0-124.43.1.el10_1.
- Update redhat kernel-64k-debug-modules-core to version 0:6.12.0-124.43.1.el10_1.
- Update redhat kernel-64k-debug-modules-extra to version 0:6.12.0-124.43.1.el10_1.
- Update redhat kernel-64k-debuginfo to version 0:6.12.0-124.43.1.el10_1.
- Update redhat kernel-64k-devel to version 0:6.12.0-124.43.1.el10_1.
- Update redhat kernel-64k-devel-matched to version 0:6.12.0-124.43.1.el10_1.
- Update redhat kernel-64k-modules to version 0:6.12.0-124.43.1.el10_1.
- Update redhat kernel-64k-modules-core to version 0:6.12.0-124.43.1.el10_1.
- Update redhat kernel-64k-modules-extra to version 0:6.12.0-124.43.1.el10_1.
- Update redhat kernel-abi-stablelists to version 0:6.12.0-124.43.1.el10_1.
- Update redhat kernel-core to version 0:6.12.0-124.43.1.el10_1.
- Update redhat kernel-debug to version 0:6.12.0-124.43.1.el10_1.
- Update redhat kernel-debug-core to version 0:6.12.0-124.43.1.el10_1.
- Update redhat kernel-debug-debuginfo to version 0:6.12.0-124.43.1.el10_1.
- Update redhat kernel-debug-devel to version 0:6.12.0-124.43.1.el10_1.
- Update redhat kernel-debug-devel-matched to version 0:6.12.0-124.43.1.el10_1.
- Update redhat kernel-debug-modules to version 0:6.12.0-124.43.1.el10_1.
- Update redhat kernel-debug-modules-core to version 0:6.12.0-124.43.1.el10_1.
- Update redhat kernel-debug-modules-extra to version 0:6.12.0-124.43.1.el10_1.
- Update redhat kernel-debug-uki-virt to version 0:6.12.0-124.43.1.el10_1.
- Update redhat kernel-debuginfo to version 0:6.12.0-124.43.1.el10_1.
- Update redhat kernel-debuginfo-common-aarch64 to version 0:6.12.0-124.43.1.el10_1.
- Update redhat kernel-debuginfo-common-ppc64le to version 0:6.12.0-124.43.1.el10_1.
- Update redhat kernel-debuginfo-common-s390x to version 0:6.12.0-124.43.1.el10_1.
- Update redhat kernel-debuginfo-common-x86_64 to version 0:6.12.0-124.43.1.el10_1.
- Update redhat kernel-devel to version 0:6.12.0-124.43.1.el10_1.
- Update redhat kernel-devel-matched to version 0:6.12.0-124.43.1.el10_1.
- Update redhat kernel-doc to version 0:6.12.0-124.43.1.el10_1.
- Update redhat kernel-modules to version 0:6.12.0-124.43.1.el10_1.
- Update redhat kernel-modules-core to version 0:6.12.0-124.43.1.el10_1.
- Update redhat kernel-modules-extra to version 0:6.12.0-124.43.1.el10_1.
- Update redhat kernel-modules-extra-matched to version 0:6.12.0-124.43.1.el10_1.
- Update redhat kernel-rt to version 0:6.12.0-124.43.1.el10_1.
- Update redhat kernel-rt-64k to version 0:6.12.0-124.43.1.el10_1.
- Update redhat kernel-rt-64k-core to version 0:6.12.0-124.43.1.el10_1.
- Update redhat kernel-rt-64k-debug to version 0:6.12.0-124.43.1.el10_1.
- Update redhat kernel-rt-64k-debug-core to version 0:6.12.0-124.43.1.el10_1.
- Update redhat kernel-rt-64k-debug-debuginfo to version 0:6.12.0-124.43.1.el10_1.
- Update redhat kernel-rt-64k-debug-devel to version 0:6.12.0-124.43.1.el10_1.
- Update redhat kernel-rt-64k-debug-modules to version 0:6.12.0-124.43.1.el10_1.
- Update redhat kernel-rt-64k-debug-modules-core to version 0:6.12.0-124.43.1.el10_1.
- Update redhat kernel-rt-64k-debug-modules-extra to version 0:6.12.0-124.43.1.el10_1.
- Update redhat kernel-rt-64k-debuginfo to version 0:6.12.0-124.43.1.el10_1.
- Update redhat kernel-rt-64k-devel to version 0:6.12.0-124.43.1.el10_1.
- Update redhat kernel-rt-64k-modules to version 0:6.12.0-124.43.1.el10_1.
- Update redhat kernel-rt-64k-modules-core to version 0:6.12.0-124.43.1.el10_1.
- Update redhat kernel-rt-64k-modules-extra to version 0:6.12.0-124.43.1.el10_1.
- Update redhat kernel-rt-core to version 0:6.12.0-124.43.1.el10_1.
- Update redhat kernel-rt-debug to version 0:6.12.0-124.43.1.el10_1.
- Update redhat kernel-rt-debug-core to version 0:6.12.0-124.43.1.el10_1.
- Update redhat kernel-rt-debug-debuginfo to version 0:6.12.0-124.43.1.el10_1.
- Update redhat kernel-rt-debug-devel to version 0:6.12.0-124.43.1.el10_1.
- Update redhat kernel-rt-debug-modules to version 0:6.12.0-124.43.1.el10_1.
- Update redhat kernel-rt-debug-modules-core to version 0:6.12.0-124.43.1.el10_1.
- Update redhat kernel-rt-debug-modules-extra to version 0:6.12.0-124.43.1.el10_1.
- Update redhat kernel-rt-debuginfo to version 0:6.12.0-124.43.1.el10_1.
- Update redhat kernel-rt-devel to version 0:6.12.0-124.43.1.el10_1.
- Update redhat kernel-rt-modules to version 0:6.12.0-124.43.1.el10_1.
- Update redhat kernel-rt-modules-core to version 0:6.12.0-124.43.1.el10_1.
- Update redhat kernel-rt-modules-extra to version 0:6.12.0-124.43.1.el10_1.
- Update redhat kernel-tools to version 0:6.12.0-124.43.1.el10_1.
- Update redhat kernel-tools-debuginfo to version 0:6.12.0-124.43.1.el10_1.
- Update redhat kernel-tools-libs to version 0:6.12.0-124.43.1.el10_1.
- Update redhat kernel-tools-libs-devel to version 0:6.12.0-124.43.1.el10_1.
- Update redhat kernel-uki-virt to version 0:6.12.0-124.43.1.el10_1.
- Update redhat kernel-uki-virt-addons to version 0:6.12.0-124.43.1.el10_1.
- Update redhat kernel-zfcpdump to version 0:6.12.0-124.43.1.el10_1.
- Update redhat kernel-zfcpdump-core to version 0:6.12.0-124.43.1.el10_1.
- Update redhat kernel-zfcpdump-debuginfo to version 0:6.12.0-124.43.1.el10_1.
- Update redhat kernel-zfcpdump-devel to version 0:6.12.0-124.43.1.el10_1.
- Update redhat kernel-zfcpdump-devel-matched to version 0:6.12.0-124.43.1.el10_1.
- Update redhat kernel-zfcpdump-modules to version 0:6.12.0-124.43.1.el10_1.
- Update redhat kernel-zfcpdump-modules-core to version 0:6.12.0-124.43.1.el10_1.
- Update redhat kernel-zfcpdump-modules-extra to version 0:6.12.0-124.43.1.el10_1.
- Update redhat libperf to version 0:6.12.0-124.43.1.el10_1.
- Update redhat libperf-debuginfo to version 0:6.12.0-124.43.1.el10_1.
- Update redhat perf to version 0:6.12.0-124.43.1.el10_1.
- Update redhat perf-debuginfo to version 0:6.12.0-124.43.1.el10_1.
- Update redhat python3-perf to version 0:6.12.0-124.43.1.el10_1.
- Update redhat python3-perf-debuginfo to version 0:6.12.0-124.43.1.el10_1.
- Update redhat rtla to version 0:6.12.0-124.43.1.el10_1.
- Update redhat rv to version 0:6.12.0-124.43.1.el10_1.
Affected software
| Vendor | Product | Affected versions | Fix available |
|---|---|---|---|
| redhat | kernel | <= 0:6.12.0-124.43.1.el10_1 | 0:6.12.0-124.43.1.el10_1 |
| redhat | kernel-64k | <= 0:6.12.0-124.43.1.el10_1 | 0:6.12.0-124.43.1.el10_1 |
| redhat | kernel-64k-core | <= 0:6.12.0-124.43.1.el10_1 | 0:6.12.0-124.43.1.el10_1 |
| redhat | kernel-64k-debug | <= 0:6.12.0-124.43.1.el10_1 | 0:6.12.0-124.43.1.el10_1 |
| redhat | kernel-64k-debug-core | <= 0:6.12.0-124.43.1.el10_1 | 0:6.12.0-124.43.1.el10_1 |
| redhat | kernel-64k-debug-debuginfo | <= 0:6.12.0-124.43.1.el10_1 | 0:6.12.0-124.43.1.el10_1 |
| redhat | kernel-64k-debug-devel | <= 0:6.12.0-124.43.1.el10_1 | 0:6.12.0-124.43.1.el10_1 |
| redhat | kernel-64k-debug-devel-matched | <= 0:6.12.0-124.43.1.el10_1 | 0:6.12.0-124.43.1.el10_1 |
| redhat | kernel-64k-debug-modules | <= 0:6.12.0-124.43.1.el10_1 | 0:6.12.0-124.43.1.el10_1 |
| redhat | kernel-64k-debug-modules-core | <= 0:6.12.0-124.43.1.el10_1 | 0:6.12.0-124.43.1.el10_1 |
| redhat | kernel-64k-debug-modules-extra | <= 0:6.12.0-124.43.1.el10_1 | 0:6.12.0-124.43.1.el10_1 |
| redhat | kernel-64k-debuginfo | <= 0:6.12.0-124.43.1.el10_1 | 0:6.12.0-124.43.1.el10_1 |
| redhat | kernel-64k-devel | <= 0:6.12.0-124.43.1.el10_1 | 0:6.12.0-124.43.1.el10_1 |
| redhat | kernel-64k-devel-matched | <= 0:6.12.0-124.43.1.el10_1 | 0:6.12.0-124.43.1.el10_1 |
| redhat | kernel-64k-modules | <= 0:6.12.0-124.43.1.el10_1 | 0:6.12.0-124.43.1.el10_1 |
| redhat | kernel-64k-modules-core | <= 0:6.12.0-124.43.1.el10_1 | 0:6.12.0-124.43.1.el10_1 |
| redhat | kernel-64k-modules-extra | <= 0:6.12.0-124.43.1.el10_1 | 0:6.12.0-124.43.1.el10_1 |
| redhat | kernel-abi-stablelists | <= 0:6.12.0-124.43.1.el10_1 | 0:6.12.0-124.43.1.el10_1 |
| redhat | kernel-core | <= 0:6.12.0-124.43.1.el10_1 | 0:6.12.0-124.43.1.el10_1 |
| redhat | kernel-debug | <= 0:6.12.0-124.43.1.el10_1 | 0:6.12.0-124.43.1.el10_1 |
| redhat | kernel-debug-core | <= 0:6.12.0-124.43.1.el10_1 | 0:6.12.0-124.43.1.el10_1 |
| redhat | kernel-debug-debuginfo | <= 0:6.12.0-124.43.1.el10_1 | 0:6.12.0-124.43.1.el10_1 |
| redhat | kernel-debug-devel | <= 0:6.12.0-124.43.1.el10_1 | 0:6.12.0-124.43.1.el10_1 |
| redhat | kernel-debug-devel-matched | <= 0:6.12.0-124.43.1.el10_1 | 0:6.12.0-124.43.1.el10_1 |
| redhat | kernel-debug-modules | <= 0:6.12.0-124.43.1.el10_1 | 0:6.12.0-124.43.1.el10_1 |
| redhat | kernel-debug-modules-core | <= 0:6.12.0-124.43.1.el10_1 | 0:6.12.0-124.43.1.el10_1 |
| redhat | kernel-debug-modules-extra | <= 0:6.12.0-124.43.1.el10_1 | 0:6.12.0-124.43.1.el10_1 |
| redhat | kernel-debug-uki-virt | <= 0:6.12.0-124.43.1.el10_1 | 0:6.12.0-124.43.1.el10_1 |
| redhat | kernel-debuginfo | <= 0:6.12.0-124.43.1.el10_1 | 0:6.12.0-124.43.1.el10_1 |
| redhat | kernel-debuginfo-common-aarch64 | <= 0:6.12.0-124.43.1.el10_1 | 0:6.12.0-124.43.1.el10_1 |
| redhat | kernel-debuginfo-common-ppc64le | <= 0:6.12.0-124.43.1.el10_1 | 0:6.12.0-124.43.1.el10_1 |
| redhat | kernel-debuginfo-common-s390x | <= 0:6.12.0-124.43.1.el10_1 | 0:6.12.0-124.43.1.el10_1 |
| redhat | kernel-debuginfo-common-x86_64 | <= 0:6.12.0-124.43.1.el10_1 | 0:6.12.0-124.43.1.el10_1 |
| redhat | kernel-devel | <= 0:6.12.0-124.43.1.el10_1 | 0:6.12.0-124.43.1.el10_1 |
| redhat | kernel-devel-matched | <= 0:6.12.0-124.43.1.el10_1 | 0:6.12.0-124.43.1.el10_1 |
| redhat | kernel-doc | <= 0:6.12.0-124.43.1.el10_1 | 0:6.12.0-124.43.1.el10_1 |
| redhat | kernel-modules | <= 0:6.12.0-124.43.1.el10_1 | 0:6.12.0-124.43.1.el10_1 |
| redhat | kernel-modules-core | <= 0:6.12.0-124.43.1.el10_1 | 0:6.12.0-124.43.1.el10_1 |
| redhat | kernel-modules-extra | <= 0:6.12.0-124.43.1.el10_1 | 0:6.12.0-124.43.1.el10_1 |
| redhat | kernel-modules-extra-matched | <= 0:6.12.0-124.43.1.el10_1 | 0:6.12.0-124.43.1.el10_1 |
| redhat | kernel-rt | <= 0:6.12.0-124.43.1.el10_1 | 0:6.12.0-124.43.1.el10_1 |
| redhat | kernel-rt-64k | <= 0:6.12.0-124.43.1.el10_1 | 0:6.12.0-124.43.1.el10_1 |
| redhat | kernel-rt-64k-core | <= 0:6.12.0-124.43.1.el10_1 | 0:6.12.0-124.43.1.el10_1 |
| redhat | kernel-rt-64k-debug | <= 0:6.12.0-124.43.1.el10_1 | 0:6.12.0-124.43.1.el10_1 |
| redhat | kernel-rt-64k-debug-core | <= 0:6.12.0-124.43.1.el10_1 | 0:6.12.0-124.43.1.el10_1 |
| redhat | kernel-rt-64k-debug-debuginfo | <= 0:6.12.0-124.43.1.el10_1 | 0:6.12.0-124.43.1.el10_1 |
| redhat | kernel-rt-64k-debug-devel | <= 0:6.12.0-124.43.1.el10_1 | 0:6.12.0-124.43.1.el10_1 |
| redhat | kernel-rt-64k-debug-modules | <= 0:6.12.0-124.43.1.el10_1 | 0:6.12.0-124.43.1.el10_1 |
| redhat | kernel-rt-64k-debug-modules-core | <= 0:6.12.0-124.43.1.el10_1 | 0:6.12.0-124.43.1.el10_1 |
| redhat | kernel-rt-64k-debug-modules-extra | <= 0:6.12.0-124.43.1.el10_1 | 0:6.12.0-124.43.1.el10_1 |
| redhat | kernel-rt-64k-debuginfo | <= 0:6.12.0-124.43.1.el10_1 | 0:6.12.0-124.43.1.el10_1 |
| redhat | kernel-rt-64k-devel | <= 0:6.12.0-124.43.1.el10_1 | 0:6.12.0-124.43.1.el10_1 |
| redhat | kernel-rt-64k-modules | <= 0:6.12.0-124.43.1.el10_1 | 0:6.12.0-124.43.1.el10_1 |
| redhat | kernel-rt-64k-modules-core | <= 0:6.12.0-124.43.1.el10_1 | 0:6.12.0-124.43.1.el10_1 |
| redhat | kernel-rt-64k-modules-extra | <= 0:6.12.0-124.43.1.el10_1 | 0:6.12.0-124.43.1.el10_1 |
| redhat | kernel-rt-core | <= 0:6.12.0-124.43.1.el10_1 | 0:6.12.0-124.43.1.el10_1 |
| redhat | kernel-rt-debug | <= 0:6.12.0-124.43.1.el10_1 | 0:6.12.0-124.43.1.el10_1 |
| redhat | kernel-rt-debug-core | <= 0:6.12.0-124.43.1.el10_1 | 0:6.12.0-124.43.1.el10_1 |
| redhat | kernel-rt-debug-debuginfo | <= 0:6.12.0-124.43.1.el10_1 | 0:6.12.0-124.43.1.el10_1 |
| redhat | kernel-rt-debug-devel | <= 0:6.12.0-124.43.1.el10_1 | 0:6.12.0-124.43.1.el10_1 |
| redhat | kernel-rt-debug-modules | <= 0:6.12.0-124.43.1.el10_1 | 0:6.12.0-124.43.1.el10_1 |
| redhat | kernel-rt-debug-modules-core | <= 0:6.12.0-124.43.1.el10_1 | 0:6.12.0-124.43.1.el10_1 |
| redhat | kernel-rt-debug-modules-extra | <= 0:6.12.0-124.43.1.el10_1 | 0:6.12.0-124.43.1.el10_1 |
| redhat | kernel-rt-debuginfo | <= 0:6.12.0-124.43.1.el10_1 | 0:6.12.0-124.43.1.el10_1 |
| redhat | kernel-rt-devel | <= 0:6.12.0-124.43.1.el10_1 | 0:6.12.0-124.43.1.el10_1 |
| redhat | kernel-rt-modules | <= 0:6.12.0-124.43.1.el10_1 | 0:6.12.0-124.43.1.el10_1 |
| redhat | kernel-rt-modules-core | <= 0:6.12.0-124.43.1.el10_1 | 0:6.12.0-124.43.1.el10_1 |
| redhat | kernel-rt-modules-extra | <= 0:6.12.0-124.43.1.el10_1 | 0:6.12.0-124.43.1.el10_1 |
| redhat | kernel-tools | <= 0:6.12.0-124.43.1.el10_1 | 0:6.12.0-124.43.1.el10_1 |
| redhat | kernel-tools-debuginfo | <= 0:6.12.0-124.43.1.el10_1 | 0:6.12.0-124.43.1.el10_1 |
| redhat | kernel-tools-libs | <= 0:6.12.0-124.43.1.el10_1 | 0:6.12.0-124.43.1.el10_1 |
| redhat | kernel-tools-libs-devel | <= 0:6.12.0-124.43.1.el10_1 | 0:6.12.0-124.43.1.el10_1 |
| redhat | kernel-uki-virt | <= 0:6.12.0-124.43.1.el10_1 | 0:6.12.0-124.43.1.el10_1 |
| redhat | kernel-uki-virt-addons | <= 0:6.12.0-124.43.1.el10_1 | 0:6.12.0-124.43.1.el10_1 |
| redhat | kernel-zfcpdump | <= 0:6.12.0-124.43.1.el10_1 | 0:6.12.0-124.43.1.el10_1 |
| redhat | kernel-zfcpdump-core | <= 0:6.12.0-124.43.1.el10_1 | 0:6.12.0-124.43.1.el10_1 |
| redhat | kernel-zfcpdump-debuginfo | <= 0:6.12.0-124.43.1.el10_1 | 0:6.12.0-124.43.1.el10_1 |
| redhat | kernel-zfcpdump-devel | <= 0:6.12.0-124.43.1.el10_1 | 0:6.12.0-124.43.1.el10_1 |
| redhat | kernel-zfcpdump-devel-matched | <= 0:6.12.0-124.43.1.el10_1 | 0:6.12.0-124.43.1.el10_1 |
| redhat | kernel-zfcpdump-modules | <= 0:6.12.0-124.43.1.el10_1 | 0:6.12.0-124.43.1.el10_1 |
| redhat | kernel-zfcpdump-modules-core | <= 0:6.12.0-124.43.1.el10_1 | 0:6.12.0-124.43.1.el10_1 |
| redhat | kernel-zfcpdump-modules-extra | <= 0:6.12.0-124.43.1.el10_1 | 0:6.12.0-124.43.1.el10_1 |
| redhat | libperf | <= 0:6.12.0-124.43.1.el10_1 | 0:6.12.0-124.43.1.el10_1 |
| redhat | libperf-debuginfo | <= 0:6.12.0-124.43.1.el10_1 | 0:6.12.0-124.43.1.el10_1 |
| redhat | perf | <= 0:6.12.0-124.43.1.el10_1 | 0:6.12.0-124.43.1.el10_1 |
| redhat | perf-debuginfo | <= 0:6.12.0-124.43.1.el10_1 | 0:6.12.0-124.43.1.el10_1 |
| redhat | python3-perf | <= 0:6.12.0-124.43.1.el10_1 | 0:6.12.0-124.43.1.el10_1 |
| redhat | python3-perf-debuginfo | <= 0:6.12.0-124.43.1.el10_1 | 0:6.12.0-124.43.1.el10_1 |
| redhat | rtla | <= 0:6.12.0-124.43.1.el10_1 | 0:6.12.0-124.43.1.el10_1 |
| redhat | rv | <= 0:6.12.0-124.43.1.el10_1 | 0:6.12.0-124.43.1.el10_1 |
Original title
Red Hat Security Advisory: kernel security update
osv CVSS3.1
7.8
- https://access.redhat.com/errata/RHSA-2026:4012 Vendor Advisory
- https://access.redhat.com/security/updates/classification/#moderate Third Party Advisory
- https://bugzilla.redhat.com/show_bug.cgi?id=2376052 Third Party Advisory
- https://bugzilla.redhat.com/show_bug.cgi?id=2376077 Third Party Advisory
- https://bugzilla.redhat.com/show_bug.cgi?id=2393157 Third Party Advisory
- https://bugzilla.redhat.com/show_bug.cgi?id=2394601 Third Party Advisory
- https://bugzilla.redhat.com/show_bug.cgi?id=2395797 Third Party Advisory
- https://bugzilla.redhat.com/show_bug.cgi?id=2418886 Third Party Advisory
- https://bugzilla.redhat.com/show_bug.cgi?id=2429026 Third Party Advisory
- https://bugzilla.redhat.com/show_bug.cgi?id=2432664 Third Party Advisory
- https://bugzilla.redhat.com/show_bug.cgi?id=2436802 Third Party Advisory
- https://bugzilla.redhat.com/show_bug.cgi?id=2439951 Third Party Advisory
- https://security.access.redhat.com/data/csaf/v2/advisories/2026/rhsa-2026_4012.j... Vendor Advisory
- https://access.redhat.com/security/cve/CVE-2025-38106 Third Party Advisory
- https://www.cve.org/CVERecord?id=CVE-2025-38106 Vendor Advisory
- https://nvd.nist.gov/vuln/detail/CVE-2025-38106 Vendor Advisory
- https://lore.kernel.org/linux-cve-announce/2025070322-CVE-2025-38106-8de3@gregkh... Third Party Advisory
- https://access.redhat.com/security/cve/CVE-2025-38141 Third Party Advisory
- https://www.cve.org/CVERecord?id=CVE-2025-38141 Vendor Advisory
- https://nvd.nist.gov/vuln/detail/CVE-2025-38141 Vendor Advisory
- https://lore.kernel.org/linux-cve-announce/2025070333-CVE-2025-38141-560e@gregkh... Third Party Advisory
- https://access.redhat.com/security/cve/CVE-2025-38703 Third Party Advisory
- https://www.cve.org/CVERecord?id=CVE-2025-38703 Vendor Advisory
- https://nvd.nist.gov/vuln/detail/CVE-2025-38703 Vendor Advisory
- https://lore.kernel.org/linux-cve-announce/2025090453-CVE-2025-38703-2f5c@gregkh... Third Party Advisory
- https://access.redhat.com/security/cve/CVE-2025-39760 Third Party Advisory
- https://www.cve.org/CVERecord?id=CVE-2025-39760 Vendor Advisory
- https://nvd.nist.gov/vuln/detail/CVE-2025-39760 Vendor Advisory
- https://lore.kernel.org/linux-cve-announce/2025091145-CVE-2025-39760-2d5f@gregkh... Third Party Advisory
- https://access.redhat.com/security/cve/CVE-2025-39818 Third Party Advisory
- https://www.cve.org/CVERecord?id=CVE-2025-39818 Vendor Advisory
- https://nvd.nist.gov/vuln/detail/CVE-2025-39818 Vendor Advisory
- https://lore.kernel.org/linux-cve-announce/2025091615-CVE-2025-39818-f1b9@gregkh... Third Party Advisory
- https://access.redhat.com/security/cve/CVE-2025-40249 Third Party Advisory
- https://www.cve.org/CVERecord?id=CVE-2025-40249 Vendor Advisory
- https://nvd.nist.gov/vuln/detail/CVE-2025-40249 Vendor Advisory
- https://lore.kernel.org/linux-cve-announce/2025120430-CVE-2025-40249-3972@gregkh... Third Party Advisory
- https://access.redhat.com/security/cve/CVE-2025-71085 Third Party Advisory
- https://www.cve.org/CVERecord?id=CVE-2025-71085 Vendor Advisory
- https://nvd.nist.gov/vuln/detail/CVE-2025-71085 Vendor Advisory
- https://lore.kernel.org/linux-cve-announce/2026011340-CVE-2025-71085-e6c1@gregkh... Third Party Advisory
- https://access.redhat.com/security/cve/CVE-2026-23001 Third Party Advisory
- https://www.cve.org/CVERecord?id=CVE-2026-23001 Vendor Advisory
- https://nvd.nist.gov/vuln/detail/CVE-2026-23001 Vendor Advisory
- https://lore.kernel.org/linux-cve-announce/2026012534-CVE-2026-23001-7ab0@gregkh... Third Party Advisory
- https://access.redhat.com/security/cve/CVE-2026-23097 Third Party Advisory
- https://www.cve.org/CVERecord?id=CVE-2026-23097 Vendor Advisory
- https://nvd.nist.gov/vuln/detail/CVE-2026-23097 Vendor Advisory
- https://lore.kernel.org/linux-cve-announce/2026020427-CVE-2026-23097-a591@gregkh... Third Party Advisory
- https://access.redhat.com/security/cve/CVE-2026-23156 Third Party Advisory
- https://www.cve.org/CVERecord?id=CVE-2026-23156 Vendor Advisory
- https://nvd.nist.gov/vuln/detail/CVE-2026-23156 Vendor Advisory
- https://lore.kernel.org/linux-cve-announce/2026021416-CVE-2026-23156-b2f4@gregkh... Third Party Advisory
Published: 10 Mar 2026 · Updated: 13 Mar 2026 · First seen: 10 Mar 2026