Risques
- Atteinte à l'intégrité des données
- Contournement de la politique de sécurité
- Non spécifié par l'éditeur
Systèmes affectés
- Red Hat CodeReady Linux Builder for ARM 64 - Extended Update Support 10.0 aarch64
- Red Hat CodeReady Linux Builder for ARM 64 - Extended Update Support 9.4 aarch64
- Red Hat CodeReady Linux Builder for ARM 64 - Extended Update Support 9.6 aarch64
- Red Hat CodeReady Linux Builder for ARM 64 8 aarch64
- Red Hat CodeReady Linux Builder for ARM 64 9 aarch64
- Red Hat CodeReady Linux Builder for IBM z Systems - Extended Update Support 10.0 s390x
- Red Hat CodeReady Linux Builder for IBM z Systems - Extended Update Support 9.4 s390x
- Red Hat CodeReady Linux Builder for IBM z Systems - Extended Update Support 9.6 s390x
- Red Hat CodeReady Linux Builder for IBM z Systems 9 s390x
- Red Hat CodeReady Linux Builder for Power, little endian - Extended Update Support 10.0 ppc64le
- Red Hat CodeReady Linux Builder for Power, little endian - Extended Update Support 9.4 ppc64le
- Red Hat CodeReady Linux Builder for Power, little endian - Extended Update Support 9.6 ppc64le
- Red Hat CodeReady Linux Builder for Power, little endian 8 ppc64le
- Red Hat CodeReady Linux Builder for Power, little endian 9 ppc64le
- Red Hat CodeReady Linux Builder for x86_64 - Extended Update Support 10.0 x86_64
- Red Hat CodeReady Linux Builder for x86_64 - Extended Update Support 9.4 x86_64
- Red Hat CodeReady Linux Builder for x86_64 - Extended Update Support 9.6 x86_64
- Red Hat CodeReady Linux Builder for x86_64 8 x86_64
- Red Hat CodeReady Linux Builder for x86_64 9 x86_64
- Red Hat Enterprise Linux for ARM 64 - 4 years of updates 10.0 aarch64
- Red Hat Enterprise Linux for ARM 64 - 4 years of updates 9.0 aarch64
- Red Hat Enterprise Linux for ARM 64 - 4 years of updates 9.4 aarch64
- Red Hat Enterprise Linux for ARM 64 - 4 years of updates 9.6 aarch64
- Red Hat Enterprise Linux for ARM 64 - Extended Update Support 10.0 aarch64
- Red Hat Enterprise Linux for ARM 64 - Extended Update Support 9.4 aarch64
- Red Hat Enterprise Linux for ARM 64 - Extended Update Support 9.6 aarch64
- Red Hat Enterprise Linux for ARM 64 8 aarch64
- Red Hat Enterprise Linux for ARM 64 9 aarch64
- Red Hat Enterprise Linux for IBM z Systems - 4 years of updates 10.0 s390x
- Red Hat Enterprise Linux for IBM z Systems - 4 years of updates 9.0 s390x
- Red Hat Enterprise Linux for IBM z Systems - 4 years of updates 9.4 s390x
- Red Hat Enterprise Linux for IBM z Systems - 4 years of updates 9.6 s390x
- Red Hat Enterprise Linux for IBM z Systems - Extended Update Support 10.0 s390x
- Red Hat Enterprise Linux for IBM z Systems - Extended Update Support 9.4 s390x
- Red Hat Enterprise Linux for IBM z Systems - Extended Update Support 9.6 s390x
- Red Hat Enterprise Linux for IBM z Systems 8 s390x
- Red Hat Enterprise Linux for IBM z Systems 9 s390x
- Red Hat Enterprise Linux for Power, little endian - 4 years of support 10.0 ppc64le
- Red Hat Enterprise Linux for Power, little endian - Extended Update Support 10.0 ppc64le
- Red Hat Enterprise Linux for Power, little endian - Extended Update Support 9.4 ppc64le
- Red Hat Enterprise Linux for Power, little endian - Extended Update Support 9.6 ppc64le
- Red Hat Enterprise Linux for Power, little endian 8 ppc64le
- Red Hat Enterprise Linux for Power, little endian 9 ppc64le
- Red Hat Enterprise Linux for Real Time 8 x86_64
- Red Hat Enterprise Linux for Real Time for NFV 8 x86_64
- Red Hat Enterprise Linux for x86_64 - 4 years of updates 10.0 x86_64
- Red Hat Enterprise Linux for x86_64 - Extended Update Support 10.0 x86_64
- Red Hat Enterprise Linux for x86_64 - Extended Update Support 9.4 x86_64
- Red Hat Enterprise Linux for x86_64 - Extended Update Support 9.6 x86_64
- Red Hat Enterprise Linux for x86_64 - Extended Update Support Extension 8.6 x86_64
- Red Hat Enterprise Linux for x86_64 - Extended Update Support Extension 8.8 x86_64
- Red Hat Enterprise Linux for x86_64 - Update Services for SAP Solutions 8.6 x86_64
- Red Hat Enterprise Linux for x86_64 - Update Services for SAP Solutions 8.8 x86_64
- Red Hat Enterprise Linux for x86_64 - Update Services for SAP Solutions 9.0 x86_64
- Red Hat Enterprise Linux for x86_64 - Update Services for SAP Solutions 9.4 x86_64
- Red Hat Enterprise Linux for x86_64 - Update Services for SAP Solutions 9.6 x86_64
- Red Hat Enterprise Linux for x86_64 8 x86_64
- Red Hat Enterprise Linux for x86_64 9 x86_64
- Red Hat Enterprise Linux Server - AUS 8.2 x86_64
- Red Hat Enterprise Linux Server - AUS 8.6 x86_64
- Red Hat Enterprise Linux Server - AUS 9.4 x86_64
- Red Hat Enterprise Linux Server - AUS 9.6 x86_64
- Red Hat Enterprise Linux Server - TUS 8.6 x86_64
- Red Hat Enterprise Linux Server - TUS 8.8 x86_64
- Red Hat Enterprise Linux Server for Power LE - Update Services for SAP Solutions 8.6 ppc64le
- Red Hat Enterprise Linux Server for Power LE - Update Services for SAP Solutions 8.8 ppc64le
- Red Hat Enterprise Linux Server for Power LE - Update Services for SAP Solutions 9.0 ppc64le
- Red Hat Enterprise Linux Server for Power LE - Update Services for SAP Solutions 9.4 ppc64le
- Red Hat Enterprise Linux Server for Power LE - Update Services for SAP Solutions 9.6 ppc64le
Résumé
De multiples vulnérabilités ont été découvertes dans le noyau Linux de Red Hat. Elles permettent à un attaquant de provoquer une atteinte à l'intégrité des données, un contournement de la politique de sécurité et un problème de sécurité non spécifié par l'éditeur.
Solutions
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
Documentation
- Bulletin de sécurité Red Hat RHSA-2026:3963 du 09 mars 2026 https://access.redhat.com/errata/RHSA-2026:3963
- Bulletin de sécurité Red Hat RHSA-2026:3964 du 09 mars 2026 https://access.redhat.com/errata/RHSA-2026:3964
- Bulletin de sécurité Red Hat RHSA-2026:3966 du 09 mars 2026 https://access.redhat.com/errata/RHSA-2026:3966
- Bulletin de sécurité Red Hat RHSA-2026:4011 du 09 mars 2026 https://access.redhat.com/errata/RHSA-2026:4011
- Bulletin de sécurité Red Hat RHSA-2026:4111 du 09 mars 2026 https://access.redhat.com/errata/RHSA-2026:4111
- Bulletin de sécurité Red Hat RHSA-2026:4242 du 11 mars 2026 https://access.redhat.com/errata/RHSA-2026:4242
- Bulletin de sécurité Red Hat RHSA-2026:4243 du 11 mars 2026 https://access.redhat.com/errata/RHSA-2026:4243
- Bulletin de sécurité Red Hat RHSA-2026:4244 du 11 mars 2026 https://access.redhat.com/errata/RHSA-2026:4244
- Bulletin de sécurité Red Hat RHSA-2026:4245 du 11 mars 2026 https://access.redhat.com/errata/RHSA-2026:4245
- Bulletin de sécurité Red Hat RHSA-2026:4246 du 11 mars 2026 https://access.redhat.com/errata/RHSA-2026:4246
- Bulletin de sécurité Red Hat RHSA-2026:4444 du 12 mars 2026 https://access.redhat.com/errata/RHSA-2026:4444
- Référence CVE CVE-2024-47727 https://www.cve.org/CVERecord?id=CVE-2024-47727
- Référence CVE CVE-2024-56603 https://www.cve.org/CVERecord?id=CVE-2024-56603
- Référence CVE CVE-2025-22056 https://www.cve.org/CVERecord?id=CVE-2025-22056
- Référence CVE CVE-2025-37882 https://www.cve.org/CVERecord?id=CVE-2025-37882
- Référence CVE CVE-2025-38024 https://www.cve.org/CVERecord?id=CVE-2025-38024
- Référence CVE CVE-2025-38106 https://www.cve.org/CVERecord?id=CVE-2025-38106
- Référence CVE CVE-2025-38129 https://www.cve.org/CVERecord?id=CVE-2025-38129
- Référence CVE CVE-2025-38141 https://www.cve.org/CVERecord?id=CVE-2025-38141
- Référence CVE CVE-2025-38206 https://www.cve.org/CVERecord?id=CVE-2025-38206
- Référence CVE CVE-2025-38289 https://www.cve.org/CVERecord?id=CVE-2025-38289
- Référence CVE CVE-2025-38349 https://www.cve.org/CVERecord?id=CVE-2025-38349
- Référence CVE CVE-2025-38703 https://www.cve.org/CVERecord?id=CVE-2025-38703
- Référence CVE CVE-2025-40064 https://www.cve.org/CVERecord?id=CVE-2025-40064
- Référence CVE CVE-2025-40168 https://www.cve.org/CVERecord?id=CVE-2025-40168
- Référence CVE CVE-2025-40269 https://www.cve.org/CVERecord?id=CVE-2025-40269
- Référence CVE CVE-2025-71085 https://www.cve.org/CVERecord?id=CVE-2025-71085
- Référence CVE CVE-2026-23001 https://www.cve.org/CVERecord?id=CVE-2026-23001