Risques
- Atteinte à la confidentialité des données
- Contournement de la politique de sécurité
- Déni de service
Systèmes affectés
- Red Hat CodeReady Linux Builder for ARM 64 - Extended Update Support 9.4 aarch64
- Red Hat CodeReady Linux Builder for ARM 64 - Extended Update Support 9.6 aarch64
- Red Hat CodeReady Linux Builder for ARM 64 10 aarch64
- Red Hat CodeReady Linux Builder for ARM 64 8 aarch64
- Red Hat CodeReady Linux Builder for ARM 64 9 aarch64
- Red Hat CodeReady Linux Builder for IBM z Systems - Extended Update Support 9.4 s390x
- Red Hat CodeReady Linux Builder for IBM z Systems - Extended Update Support 9.6 s390x
- Red Hat CodeReady Linux Builder for IBM z Systems 10 s390x
- Red Hat CodeReady Linux Builder for IBM z Systems 9 s390x
- Red Hat CodeReady Linux Builder for Power, little endian - Extended Update Support 9.4 ppc64le
- Red Hat CodeReady Linux Builder for Power, little endian - Extended Update Support 9.6 ppc64le
- Red Hat CodeReady Linux Builder for Power, little endian 10 ppc64le
- Red Hat CodeReady Linux Builder for Power, little endian 8 ppc64le
- Red Hat CodeReady Linux Builder for Power, little endian 9 ppc64le
- Red Hat CodeReady Linux Builder for x86_64 - Extended Update Support 9.4 x86_64
- Red Hat CodeReady Linux Builder for x86_64 - Extended Update Support 9.6 x86_64
- Red Hat CodeReady Linux Builder for x86_64 10 x86_64
- Red Hat CodeReady Linux Builder for x86_64 8 x86_64
- Red Hat CodeReady Linux Builder for x86_64 9 x86_64
- Red Hat Enterprise Linux for ARM 64 - 4 years of updates 9.0 aarch64
- Red Hat Enterprise Linux for ARM 64 - 4 years of updates 9.0 aarch64
- Red Hat Enterprise Linux for ARM 64 - 4 years of updates 9.4 aarch64
- Red Hat Enterprise Linux for ARM 64 - 4 years of updates 9.4 aarch64
- Red Hat Enterprise Linux for ARM 64 - 4 years of updates 9.6 aarch64
- Red Hat Enterprise Linux for ARM 64 - 4 years of updates 9.6 aarch64
- Red Hat Enterprise Linux for ARM 64 - Extended Update Support 9.4 aarch64
- Red Hat Enterprise Linux for ARM 64 - Extended Update Support 9.4 aarch64
- Red Hat Enterprise Linux for ARM 64 - Extended Update Support 9.6 aarch64
- Red Hat Enterprise Linux for ARM 64 - Extended Update Support 9.6 aarch64
- Red Hat Enterprise Linux for ARM 64 10 aarch64
- Red Hat Enterprise Linux for ARM 64 10 aarch64
- Red Hat Enterprise Linux for ARM 64 8 aarch64
- Red Hat Enterprise Linux for ARM 64 8 aarch64
- Red Hat Enterprise Linux for ARM 64 9 aarch64
- Red Hat Enterprise Linux for ARM 64 9 aarch64
- Red Hat Enterprise Linux for IBM z Systems - 4 years of updates 9.0 s390x
- Red Hat Enterprise Linux for IBM z Systems - 4 years of updates 9.0 s390x
- Red Hat Enterprise Linux for IBM z Systems - 4 years of updates 9.4 s390x
- Red Hat Enterprise Linux for IBM z Systems - 4 years of updates 9.4 s390x
- Red Hat Enterprise Linux for IBM z Systems - 4 years of updates 9.6 s390x
- Red Hat Enterprise Linux for IBM z Systems - 4 years of updates 9.6 s390x
- Red Hat Enterprise Linux for IBM z Systems - Extended Update Support 9.4 s390x
- Red Hat Enterprise Linux for IBM z Systems - Extended Update Support 9.4 s390x
- Red Hat Enterprise Linux for IBM z Systems - Extended Update Support 9.6 s390x
- Red Hat Enterprise Linux for IBM z Systems - Extended Update Support 9.6 s390x
- Red Hat Enterprise Linux for IBM z Systems 10 s390x
- Red Hat Enterprise Linux for IBM z Systems 10 s390x
- Red Hat Enterprise Linux for IBM z Systems 8 s390x
- Red Hat Enterprise Linux for IBM z Systems 8 s390x
- Red Hat Enterprise Linux for IBM z Systems 9 s390x
- Red Hat Enterprise Linux for IBM z Systems 9 s390x
- Red Hat Enterprise Linux for Power, little endian - Extended Update Support 9.4 ppc64le
- Red Hat Enterprise Linux for Power, little endian - Extended Update Support 9.4 ppc64le
- Red Hat Enterprise Linux for Power, little endian - Extended Update Support 9.6 ppc64le
- Red Hat Enterprise Linux for Power, little endian - Extended Update Support 9.6 ppc64le
- Red Hat Enterprise Linux for Power, little endian 10 ppc64le
- Red Hat Enterprise Linux for Power, little endian 10 ppc64le
- Red Hat Enterprise Linux for Power, little endian 8 ppc64le
- Red Hat Enterprise Linux for Power, little endian 8 ppc64le
- Red Hat Enterprise Linux for Power, little endian 9 ppc64le
- Red Hat Enterprise Linux for Power, little endian 9 ppc64le
- Red Hat Enterprise Linux for Real Time 8 x86_64
- Red Hat Enterprise Linux for Real Time 8 x86_64
- Red Hat Enterprise Linux for Real Time for NFV 8 x86_64
- Red Hat Enterprise Linux for Real Time for NFV 8 x86_64
- Red Hat Enterprise Linux for x86_64 - Extended Update Support 9.4 x86_64
- Red Hat Enterprise Linux for x86_64 - Extended Update Support 9.4 x86_64
- Red Hat Enterprise Linux for x86_64 - Extended Update Support 9.6 x86_64
- Red Hat Enterprise Linux for x86_64 - Extended Update Support 9.6 x86_64
- Red Hat Enterprise Linux for x86_64 - Extended Update Support Extension 8.4 x86_64
- Red Hat Enterprise Linux for x86_64 - Extended Update Support Extension 8.4 x86_64
- Red Hat Enterprise Linux for x86_64 - Extended Update Support Extension 8.6 x86_64
- Red Hat Enterprise Linux for x86_64 - Extended Update Support Extension 8.6 x86_64
- Red Hat Enterprise Linux for x86_64 - Extended Update Support Extension 8.8 x86_64
- Red Hat Enterprise Linux for x86_64 - Extended Update Support Extension 8.8 x86_64
- Red Hat Enterprise Linux for x86_64 - Update Services for SAP Solutions 8.6 x86_64
- Red Hat Enterprise Linux for x86_64 - Update Services for SAP Solutions 8.6 x86_64
- Red Hat Enterprise Linux for x86_64 - Update Services for SAP Solutions 8.8 x86_64
- Red Hat Enterprise Linux for x86_64 - Update Services for SAP Solutions 8.8 x86_64
- Red Hat Enterprise Linux for x86_64 - Update Services for SAP Solutions 9.0 x86_64
- Red Hat Enterprise Linux for x86_64 - Update Services for SAP Solutions 9.0 x86_64
- Red Hat Enterprise Linux for x86_64 - Update Services for SAP Solutions 9.2 x86_64
- Red Hat Enterprise Linux for x86_64 - Update Services for SAP Solutions 9.2 x86_64
- Red Hat Enterprise Linux for x86_64 - Update Services for SAP Solutions 9.4 x86_64
- Red Hat Enterprise Linux for x86_64 - Update Services for SAP Solutions 9.4 x86_64
- Red Hat Enterprise Linux for x86_64 - Update Services for SAP Solutions 9.6 x86_64
- Red Hat Enterprise Linux for x86_64 - Update Services for SAP Solutions 9.6 x86_64
- Red Hat Enterprise Linux for x86_64 10 x86_64
- Red Hat Enterprise Linux for x86_64 10 x86_64
- Red Hat Enterprise Linux for x86_64 8 x86_64
- Red Hat Enterprise Linux for x86_64 8 x86_64
- Red Hat Enterprise Linux for x86_64 9 x86_64
- Red Hat Enterprise Linux for x86_64 9 x86_64
- Red Hat Enterprise Linux Server - AUS 8.2 x86_64
- Red Hat Enterprise Linux Server - AUS 8.2 x86_64
- Red Hat Enterprise Linux Server - AUS 8.4 x86_64
- Red Hat Enterprise Linux Server - AUS 8.4 x86_64
- Red Hat Enterprise Linux Server - AUS 8.6 x86_64
- Red Hat Enterprise Linux Server - AUS 8.6 x86_64
- Red Hat Enterprise Linux Server - AUS 9.4 x86_64
- Red Hat Enterprise Linux Server - AUS 9.4 x86_64
- Red Hat Enterprise Linux Server - AUS 9.6 x86_64
- Red Hat Enterprise Linux Server - AUS 9.6 x86_64
- Red Hat Enterprise Linux Server - TUS 8.6 x86_64
- Red Hat Enterprise Linux Server - TUS 8.6 x86_64
- Red Hat Enterprise Linux Server - TUS 8.8 x86_64
- Red Hat Enterprise Linux Server - TUS 8.8 x86_64
- Red Hat Enterprise Linux Server for Power LE - Update Services for SAP Solutions 8.6 ppc64le
- Red Hat Enterprise Linux Server for Power LE - Update Services for SAP Solutions 8.6 ppc64le
- Red Hat Enterprise Linux Server for Power LE - Update Services for SAP Solutions 8.8 ppc64le
- Red Hat Enterprise Linux Server for Power LE - Update Services for SAP Solutions 8.8 ppc64le
- Red Hat Enterprise Linux Server for Power LE - Update Services for SAP Solutions 9.0 ppc64le
- Red Hat Enterprise Linux Server for Power LE - Update Services for SAP Solutions 9.0 ppc64le
- Red Hat Enterprise Linux Server for Power LE - Update Services for SAP Solutions 9.4 ppc64le
- Red Hat Enterprise Linux Server for Power LE - Update Services for SAP Solutions 9.4 ppc64le
- Red Hat Enterprise Linux Server for Power LE - Update Services for SAP Solutions 9.6 ppc64le
- Red Hat Enterprise Linux Server for Power LE - Update Services for SAP Solutions 9.6 ppc64le
Résumé
De multiples vulnérabilités ont été découvertes dans le noyau Linux de Red Hat. Certaines d'entre elles permettent à un attaquant de provoquer une atteinte à la confidentialité des données, un contournement de la politique de sécurité et un déni de service.
Solutions
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
Documentation
- Bulletin de sécurité Red Hat RHSA-2026:0443 du 12 janvier 2026 https://access.redhat.com/errata/RHSA-2026:0443
- Bulletin de sécurité Red Hat RHSA-2026:0444 du 12 janvier 2026 https://access.redhat.com/errata/RHSA-2026:0444
- Bulletin de sécurité Red Hat RHSA-2026:0445 du 12 janvier 2026 https://access.redhat.com/errata/RHSA-2026:0445
- Bulletin de sécurité Red Hat RHSA-2026:0453 du 12 janvier 2026 https://access.redhat.com/errata/RHSA-2026:0453
- Bulletin de sécurité Red Hat RHSA-2026:0457 du 12 janvier 2026 https://access.redhat.com/errata/RHSA-2026:0457
- Bulletin de sécurité Red Hat RHSA-2026:0489 du 13 janvier 2026 https://access.redhat.com/errata/RHSA-2026:0489
- Bulletin de sécurité Red Hat RHSA-2026:0532 du 14 janvier 2026 https://access.redhat.com/errata/RHSA-2026:0532
- Bulletin de sécurité Red Hat RHSA-2026:0533 du 14 janvier 2026 https://access.redhat.com/errata/RHSA-2026:0533
- Bulletin de sécurité Red Hat RHSA-2026:0534 du 14 janvier 2026 https://access.redhat.com/errata/RHSA-2026:0534
- Bulletin de sécurité Red Hat RHSA-2026:0536 du 14 janvier 2026 https://access.redhat.com/errata/RHSA-2026:0536
- Bulletin de sécurité Red Hat RHSA-2026:0537 du 14 janvier 2026 https://access.redhat.com/errata/RHSA-2026:0537
- Bulletin de sécurité Red Hat RHSA-2026:0576 du 14 janvier 2026 https://access.redhat.com/errata/RHSA-2026:0576
- Bulletin de sécurité Red Hat RHSA-2026:0643 du 15 janvier 2026 https://access.redhat.com/errata/RHSA-2026:0643
- Référence CVE CVE-2022-50447 https://www.cve.org/CVERecord?id=CVE-2022-50447
- Référence CVE CVE-2022-50543 https://www.cve.org/CVERecord?id=CVE-2022-50543
- Référence CVE CVE-2023-52638 https://www.cve.org/CVERecord?id=CVE-2023-52638
- Référence CVE CVE-2023-53322 https://www.cve.org/CVERecord?id=CVE-2023-53322
- Référence CVE CVE-2023-53401 https://www.cve.org/CVERecord?id=CVE-2023-53401
- Référence CVE CVE-2023-53513 https://www.cve.org/CVERecord?id=CVE-2023-53513
- Référence CVE CVE-2023-53539 https://www.cve.org/CVERecord?id=CVE-2023-53539
- Référence CVE CVE-2023-53581 https://www.cve.org/CVERecord?id=CVE-2023-53581
- Référence CVE CVE-2023-53675 https://www.cve.org/CVERecord?id=CVE-2023-53675
- Référence CVE CVE-2023-53680 https://www.cve.org/CVERecord?id=CVE-2023-53680
- Référence CVE CVE-2023-53705 https://www.cve.org/CVERecord?id=CVE-2023-53705
- Référence CVE CVE-2024-35868 https://www.cve.org/CVERecord?id=CVE-2024-35868
- Référence CVE CVE-2025-23142 https://www.cve.org/CVERecord?id=CVE-2025-23142
- Référence CVE CVE-2025-38051 https://www.cve.org/CVERecord?id=CVE-2025-38051
- Référence CVE CVE-2025-38724 https://www.cve.org/CVERecord?id=CVE-2025-38724
- Référence CVE CVE-2025-39806 https://www.cve.org/CVERecord?id=CVE-2025-39806
- Référence CVE CVE-2025-39817 https://www.cve.org/CVERecord?id=CVE-2025-39817
- Référence CVE CVE-2025-39825 https://www.cve.org/CVERecord?id=CVE-2025-39825
- Référence CVE CVE-2025-39840 https://www.cve.org/CVERecord?id=CVE-2025-39840
- Référence CVE CVE-2025-39843 https://www.cve.org/CVERecord?id=CVE-2025-39843
- Référence CVE CVE-2025-39883 https://www.cve.org/CVERecord?id=CVE-2025-39883
- Référence CVE CVE-2025-39898 https://www.cve.org/CVERecord?id=CVE-2025-39898
- Référence CVE CVE-2025-39905 https://www.cve.org/CVERecord?id=CVE-2025-39905
- Référence CVE CVE-2025-39925 https://www.cve.org/CVERecord?id=CVE-2025-39925
- Référence CVE CVE-2025-39966 https://www.cve.org/CVERecord?id=CVE-2025-39966
- Référence CVE CVE-2025-39971 https://www.cve.org/CVERecord?id=CVE-2025-39971
- Référence CVE CVE-2025-39981 https://www.cve.org/CVERecord?id=CVE-2025-39981
- Référence CVE CVE-2025-39982 https://www.cve.org/CVERecord?id=CVE-2025-39982
- Référence CVE CVE-2025-39983 https://www.cve.org/CVERecord?id=CVE-2025-39983
- Référence CVE CVE-2025-39993 https://www.cve.org/CVERecord?id=CVE-2025-39993
- Référence CVE CVE-2025-40141 https://www.cve.org/CVERecord?id=CVE-2025-40141
- Référence CVE CVE-2025-40176 https://www.cve.org/CVERecord?id=CVE-2025-40176
- Référence CVE CVE-2025-40240 https://www.cve.org/CVERecord?id=CVE-2025-40240
- Référence CVE CVE-2025-40277 https://www.cve.org/CVERecord?id=CVE-2025-40277
- Référence CVE CVE-2025-68285 https://www.cve.org/CVERecord?id=CVE-2025-68285
- Référence CVE CVE-2025-68287 https://www.cve.org/CVERecord?id=CVE-2025-68287