Vulnerability Database
Blog
FAQ
Docs
arrow_forward
search
RHSA-2025:20095
See a problem?
Please try reporting it
to the source
first.
Source
https://access.redhat.com/errata/RHSA-2025:20095
Import Source
https://security.access.redhat.com/data/osv/RHSA-2025:20095.json
JSON Data
https://api.test.osv.dev/v1/vulns/RHSA-2025:20095
Upstream
CVE-2024-28956
CVE-2024-36350
CVE-2024-36357
CVE-2024-49570
CVE-2024-52332
CVE-2024-53147
CVE-2024-53216
CVE-2024-53222
CVE-2024-53241
CVE-2024-54456
CVE-2024-56662
CVE-2024-56675
CVE-2024-56690
CVE-2024-57901
CVE-2024-57902
CVE-2024-57941
CVE-2024-57942
CVE-2024-57977
CVE-2024-57981
CVE-2024-57984
CVE-2024-57986
CVE-2024-57987
CVE-2024-57988
CVE-2024-57989
CVE-2024-57995
CVE-2024-58004
CVE-2024-58005
CVE-2024-58006
CVE-2024-58012
CVE-2024-58013
CVE-2024-58014
CVE-2024-58015
CVE-2024-58020
CVE-2024-58057
CVE-2024-58061
CVE-2024-58069
CVE-2024-58072
CVE-2024-58075
CVE-2024-58077
CVE-2024-58088
CVE-2025-21633
CVE-2025-21647
CVE-2025-21652
CVE-2025-21655
CVE-2025-21671
CVE-2025-21680
CVE-2025-21691
CVE-2025-21693
CVE-2025-21696
CVE-2025-21702
CVE-2025-21726
CVE-2025-21732
CVE-2025-21738
CVE-2025-21741
CVE-2025-21742
CVE-2025-21743
CVE-2025-21750
CVE-2025-21761
CVE-2025-21765
CVE-2025-21771
CVE-2025-21777
CVE-2025-21785
CVE-2025-21786
CVE-2025-21790
CVE-2025-21791
CVE-2025-21795
CVE-2025-21796
CVE-2025-21826
CVE-2025-21828
CVE-2025-21837
CVE-2025-21844
CVE-2025-21846
CVE-2025-21847
CVE-2025-21851
CVE-2025-21853
CVE-2025-21855
CVE-2025-21857
CVE-2025-21861
CVE-2025-21863
CVE-2025-21864
CVE-2025-21976
CVE-2025-22056
CVE-2025-37749
CVE-2025-37994
CVE-2025-38116
CVE-2025-38369
CVE-2025-38412
CVE-2025-38468
Published
2025-11-12T10:27:28Z
Modified
2025-11-13T10:06:55Z
Severity
7.8 (High)
CVSS_V3 - CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
CVSS Calculator
Summary
Red Hat Security Advisory: kernel security update
Details
References
https://access.redhat.com/errata/RHSA-2025:20095
https://docs.redhat.com/en/documentation/red_hat_enterprise_linux/10/html/10.1_release_notes/index
https://access.redhat.com/security/updates/classification/#moderate
https://bugzilla.redhat.com/show_bug.cgi?id=2331326
https://bugzilla.redhat.com/show_bug.cgi?id=2333985
https://bugzilla.redhat.com/show_bug.cgi?id=2334373
https://bugzilla.redhat.com/show_bug.cgi?id=2334415
https://bugzilla.redhat.com/show_bug.cgi?id=2334547
https://bugzilla.redhat.com/show_bug.cgi?id=2334548
https://bugzilla.redhat.com/show_bug.cgi?id=2334676
https://bugzilla.redhat.com/show_bug.cgi?id=2337121
https://bugzilla.redhat.com/show_bug.cgi?id=2338185
https://bugzilla.redhat.com/show_bug.cgi?id=2338211
https://bugzilla.redhat.com/show_bug.cgi?id=2338813
https://bugzilla.redhat.com/show_bug.cgi?id=2338821
https://bugzilla.redhat.com/show_bug.cgi?id=2338828
https://bugzilla.redhat.com/show_bug.cgi?id=2338998
https://bugzilla.redhat.com/show_bug.cgi?id=2339130
https://bugzilla.redhat.com/show_bug.cgi?id=2339141
https://bugzilla.redhat.com/show_bug.cgi?id=2343172
https://bugzilla.redhat.com/show_bug.cgi?id=2343186
https://bugzilla.redhat.com/show_bug.cgi?id=2344684
https://bugzilla.redhat.com/show_bug.cgi?id=2344687
https://bugzilla.redhat.com/show_bug.cgi?id=2345240
https://bugzilla.redhat.com/show_bug.cgi?id=2346272
https://bugzilla.redhat.com/show_bug.cgi?id=2348522
https://bugzilla.redhat.com/show_bug.cgi?id=2348523
https://bugzilla.redhat.com/show_bug.cgi?id=2348541
https://bugzilla.redhat.com/show_bug.cgi?id=2348543
https://bugzilla.redhat.com/show_bug.cgi?id=2348547
https://bugzilla.redhat.com/show_bug.cgi?id=2348550
https://bugzilla.redhat.com/show_bug.cgi?id=2348556
https://bugzilla.redhat.com/show_bug.cgi?id=2348561
https://bugzilla.redhat.com/show_bug.cgi?id=2348567
https://bugzilla.redhat.com/show_bug.cgi?id=2348572
https://bugzilla.redhat.com/show_bug.cgi?id=2348574
https://bugzilla.redhat.com/show_bug.cgi?id=2348577
https://bugzilla.redhat.com/show_bug.cgi?id=2348581
https://bugzilla.redhat.com/show_bug.cgi?id=2348584
https://bugzilla.redhat.com/show_bug.cgi?id=2348587
https://bugzilla.redhat.com/show_bug.cgi?id=2348590
https://bugzilla.redhat.com/show_bug.cgi?id=2348592
https://bugzilla.redhat.com/show_bug.cgi?id=2348593
https://bugzilla.redhat.com/show_bug.cgi?id=2348595
https://bugzilla.redhat.com/show_bug.cgi?id=2348597
https://bugzilla.redhat.com/show_bug.cgi?id=2348600
https://bugzilla.redhat.com/show_bug.cgi?id=2348601
https://bugzilla.redhat.com/show_bug.cgi?id=2348602
https://bugzilla.redhat.com/show_bug.cgi?id=2348603
https://bugzilla.redhat.com/show_bug.cgi?id=2348612
https://bugzilla.redhat.com/show_bug.cgi?id=2348617
https://bugzilla.redhat.com/show_bug.cgi?id=2348620
https://bugzilla.redhat.com/show_bug.cgi?id=2348621
https://bugzilla.redhat.com/show_bug.cgi?id=2348625
https://bugzilla.redhat.com/show_bug.cgi?id=2348629
https://bugzilla.redhat.com/show_bug.cgi?id=2348630
https://bugzilla.redhat.com/show_bug.cgi?id=2348645
https://bugzilla.redhat.com/show_bug.cgi?id=2348647
https://bugzilla.redhat.com/show_bug.cgi?id=2348650
https://bugzilla.redhat.com/show_bug.cgi?id=2348656
https://bugzilla.redhat.com/show_bug.cgi?id=2350363
https://bugzilla.redhat.com/show_bug.cgi?id=2350364
https://bugzilla.redhat.com/show_bug.cgi?id=2350373
https://bugzilla.redhat.com/show_bug.cgi?id=2350375
https://bugzilla.redhat.com/show_bug.cgi?id=2350386
https://bugzilla.redhat.com/show_bug.cgi?id=2350392
https://bugzilla.redhat.com/show_bug.cgi?id=2350396
https://bugzilla.redhat.com/show_bug.cgi?id=2350397
https://bugzilla.redhat.com/show_bug.cgi?id=2350589
https://bugzilla.redhat.com/show_bug.cgi?id=2350725
https://bugzilla.redhat.com/show_bug.cgi?id=2350726
https://bugzilla.redhat.com/show_bug.cgi?id=2351605
https://bugzilla.redhat.com/show_bug.cgi?id=2351606
https://bugzilla.redhat.com/show_bug.cgi?id=2351608
https://bugzilla.redhat.com/show_bug.cgi?id=2351612
https://bugzilla.redhat.com/show_bug.cgi?id=2351613
https://bugzilla.redhat.com/show_bug.cgi?id=2351616
https://bugzilla.redhat.com/show_bug.cgi?id=2351618
https://bugzilla.redhat.com/show_bug.cgi?id=2351620
https://bugzilla.redhat.com/show_bug.cgi?id=2351624
https://bugzilla.redhat.com/show_bug.cgi?id=2351625
https://bugzilla.redhat.com/show_bug.cgi?id=2351629
https://bugzilla.redhat.com/show_bug.cgi?id=2356664
https://bugzilla.redhat.com/show_bug.cgi?id=2360215
https://bugzilla.redhat.com/show_bug.cgi?id=2363332
https://bugzilla.redhat.com/show_bug.cgi?id=2366125
https://bugzilla.redhat.com/show_bug.cgi?id=2369184
https://bugzilla.redhat.com/show_bug.cgi?id=2376076
https://bugzilla.redhat.com/show_bug.cgi?id=2383398
https://bugzilla.redhat.com/show_bug.cgi?id=2383432
https://bugzilla.redhat.com/show_bug.cgi?id=2383913
https://issues.redhat.com/browse/RHEL-101826
https://issues.redhat.com/browse/RHEL-104231
https://issues.redhat.com/browse/RHEL-58218
https://issues.redhat.com/browse/RHEL-79278
https://issues.redhat.com/browse/RHEL-79711
https://issues.redhat.com/browse/RHEL-83595
https://issues.redhat.com/browse/RHEL-92226
https://issues.redhat.com/browse/RHEL-95446
https://security.access.redhat.com/data/csaf/v2/advisories/2025/rhsa-2025_20095.json
https://access.redhat.com/security/cve/CVE-2024-28956
https://www.cve.org/CVERecord?id=CVE-2024-28956
https://nvd.nist.gov/vuln/detail/CVE-2024-28956
https://intel.com/content/www/us/en/security-center/advisory/intel-sa-01153.html
https://www.vusec.net/projects/training-solo/
https://access.redhat.com/security/cve/CVE-2024-36350
https://www.cve.org/CVERecord?id=CVE-2024-36350
https://nvd.nist.gov/vuln/detail/CVE-2024-36350
https://access.redhat.com/security/cve/CVE-2024-36357
https://www.cve.org/CVERecord?id=CVE-2024-36357
https://nvd.nist.gov/vuln/detail/CVE-2024-36357
https://access.redhat.com/security/cve/CVE-2024-49570
https://www.cve.org/CVERecord?id=CVE-2024-49570
https://nvd.nist.gov/vuln/detail/CVE-2024-49570
https://lore.kernel.org/linux-cve-announce/2025022601-CVE-2024-49570-d2e7@gregkh/T
https://access.redhat.com/security/cve/CVE-2024-52332
https://www.cve.org/CVERecord?id=CVE-2024-52332
https://nvd.nist.gov/vuln/detail/CVE-2024-52332
https://lore.kernel.org/linux-cve-announce/2025011122-CVE-2024-52332-9d2f@gregkh/T
https://access.redhat.com/security/cve/CVE-2024-53147
https://www.cve.org/CVERecord?id=CVE-2024-53147
https://nvd.nist.gov/vuln/detail/CVE-2024-53147
https://lore.kernel.org/linux-cve-announce/2024122426-CVE-2024-53147-bea5@gregkh/T
https://access.redhat.com/security/cve/CVE-2024-53216
https://www.cve.org/CVERecord?id=CVE-2024-53216
https://nvd.nist.gov/vuln/detail/CVE-2024-53216
https://lore.kernel.org/linux-cve-announce/2024122732-CVE-2024-53216-ba8b@gregkh/T
https://access.redhat.com/security/cve/CVE-2024-53222
https://www.cve.org/CVERecord?id=CVE-2024-53222
https://nvd.nist.gov/vuln/detail/CVE-2024-53222
https://lore.kernel.org/linux-cve-announce/2024122734-CVE-2024-53222-6c79@gregkh/T
https://access.redhat.com/security/cve/CVE-2024-53241
https://www.cve.org/CVERecord?id=CVE-2024-53241
https://nvd.nist.gov/vuln/detail/CVE-2024-53241
https://access.redhat.com/security/cve/CVE-2024-54456
https://www.cve.org/CVERecord?id=CVE-2024-54456
https://nvd.nist.gov/vuln/detail/CVE-2024-54456
https://lore.kernel.org/linux-cve-announce/2025022602-CVE-2024-54456-e8a9@gregkh/T
https://access.redhat.com/security/cve/CVE-2024-56662
https://www.cve.org/CVERecord?id=CVE-2024-56662
https://nvd.nist.gov/vuln/detail/CVE-2024-56662
https://lore.kernel.org/linux-cve-announce/2024122752-CVE-2024-56662-b7e7@gregkh/T
https://access.redhat.com/security/cve/CVE-2024-56675
https://www.cve.org/CVERecord?id=CVE-2024-56675
https://nvd.nist.gov/vuln/detail/CVE-2024-56675
https://lore.kernel.org/linux-cve-announce/2024122756-CVE-2024-56675-e996@gregkh/T
https://access.redhat.com/security/cve/CVE-2024-56690
https://www.cve.org/CVERecord?id=CVE-2024-56690
https://nvd.nist.gov/vuln/detail/CVE-2024-56690
https://lore.kernel.org/linux-cve-announce/2024122834-CVE-2024-56690-b77f@gregkh/T
https://access.redhat.com/security/cve/CVE-2024-57901
https://www.cve.org/CVERecord?id=CVE-2024-57901
https://nvd.nist.gov/vuln/detail/CVE-2024-57901
https://lore.kernel.org/linux-cve-announce/2025011516-CVE-2024-57901-1f9e@gregkh/T
https://access.redhat.com/security/cve/CVE-2024-57902
https://www.cve.org/CVERecord?id=CVE-2024-57902
https://nvd.nist.gov/vuln/detail/CVE-2024-57902
https://lore.kernel.org/linux-cve-announce/2025011516-CVE-2024-57902-7ddb@gregkh/T
https://access.redhat.com/security/cve/CVE-2024-57941
https://www.cve.org/CVERecord?id=CVE-2024-57941
https://nvd.nist.gov/vuln/detail/CVE-2024-57941
https://lore.kernel.org/linux-cve-announce/2025012128-CVE-2024-57941-8779@gregkh/T
https://access.redhat.com/security/cve/CVE-2024-57942
https://www.cve.org/CVERecord?id=CVE-2024-57942
https://nvd.nist.gov/vuln/detail/CVE-2024-57942
https://lore.kernel.org/linux-cve-announce/2025012129-CVE-2024-57942-bedc@gregkh/T
https://access.redhat.com/security/cve/CVE-2024-57977
https://www.cve.org/CVERecord?id=CVE-2024-57977
https://nvd.nist.gov/vuln/detail/CVE-2024-57977
https://lore.kernel.org/linux-cve-announce/2025022633-CVE-2024-57977-88ac@gregkh/T
https://access.redhat.com/security/cve/CVE-2024-57981
https://www.cve.org/CVERecord?id=CVE-2024-57981
https://nvd.nist.gov/vuln/detail/CVE-2024-57981
https://lore.kernel.org/linux-cve-announce/2025022635-CVE-2024-57981-bba6@gregkh/T
https://access.redhat.com/security/cve/CVE-2024-57984
https://www.cve.org/CVERecord?id=CVE-2024-57984
https://nvd.nist.gov/vuln/detail/CVE-2024-57984
https://lore.kernel.org/linux-cve-announce/2025022636-CVE-2024-57984-191f@gregkh/T
https://access.redhat.com/security/cve/CVE-2024-57986
https://www.cve.org/CVERecord?id=CVE-2024-57986
https://nvd.nist.gov/vuln/detail/CVE-2024-57986
https://lore.kernel.org/linux-cve-announce/2025022636-CVE-2024-57986-6166@gregkh/T
https://access.redhat.com/security/cve/CVE-2024-57987
https://www.cve.org/CVERecord?id=CVE-2024-57987
https://nvd.nist.gov/vuln/detail/CVE-2024-57987
https://lore.kernel.org/linux-cve-announce/2025022637-CVE-2024-57987-09a3@gregkh/T
https://access.redhat.com/security/cve/CVE-2024-57988
https://www.cve.org/CVERecord?id=CVE-2024-57988
https://nvd.nist.gov/vuln/detail/CVE-2024-57988
https://lore.kernel.org/linux-cve-announce/2025022637-CVE-2024-57988-db3b@gregkh/T
https://access.redhat.com/security/cve/CVE-2024-57989
https://www.cve.org/CVERecord?id=CVE-2024-57989
https://nvd.nist.gov/vuln/detail/CVE-2024-57989
https://lore.kernel.org/linux-cve-announce/2025022638-CVE-2024-57989-0a14@gregkh/T
https://access.redhat.com/security/cve/CVE-2024-57995
https://www.cve.org/CVERecord?id=CVE-2024-57995
https://nvd.nist.gov/vuln/detail/CVE-2024-57995
https://lore.kernel.org/linux-cve-announce/2025022640-CVE-2024-57995-892d@gregkh/T
https://access.redhat.com/security/cve/CVE-2024-58004
https://www.cve.org/CVERecord?id=CVE-2024-58004
https://nvd.nist.gov/vuln/detail/CVE-2024-58004
https://lore.kernel.org/linux-cve-announce/2025022655-CVE-2024-58004-cf99@gregkh/T
https://access.redhat.com/security/cve/CVE-2024-58005
https://www.cve.org/CVERecord?id=CVE-2024-58005
https://nvd.nist.gov/vuln/detail/CVE-2024-58005
https://lore.kernel.org/linux-cve-announce/2025022655-CVE-2024-58005-f2fa@gregkh/T
https://access.redhat.com/security/cve/CVE-2024-58006
https://www.cve.org/CVERecord?id=CVE-2024-58006
https://nvd.nist.gov/vuln/detail/CVE-2024-58006
https://lore.kernel.org/linux-cve-announce/2025022655-CVE-2024-58006-9855@gregkh/T
https://access.redhat.com/security/cve/CVE-2024-58012
https://www.cve.org/CVERecord?id=CVE-2024-58012
https://nvd.nist.gov/vuln/detail/CVE-2024-58012
https://lore.kernel.org/linux-cve-announce/2025022656-CVE-2024-58012-90ce@gregkh/T
https://access.redhat.com/security/cve/CVE-2024-58013
https://www.cve.org/CVERecord?id=CVE-2024-58013
https://nvd.nist.gov/vuln/detail/CVE-2024-58013
https://lore.kernel.org/linux-cve-announce/2025022656-CVE-2024-58013-55de@gregkh/T
https://access.redhat.com/security/cve/CVE-2024-58014
https://www.cve.org/CVERecord?id=CVE-2024-58014
https://nvd.nist.gov/vuln/detail/CVE-2024-58014
https://lore.kernel.org/linux-cve-announce/2025022657-CVE-2024-58014-6269@gregkh/T
https://access.redhat.com/security/cve/CVE-2024-58015
https://www.cve.org/CVERecord?id=CVE-2024-58015
https://nvd.nist.gov/vuln/detail/CVE-2024-58015
https://lore.kernel.org/linux-cve-announce/2025022657-CVE-2024-58015-f72e@gregkh/T
https://access.redhat.com/security/cve/CVE-2024-58020
https://www.cve.org/CVERecord?id=CVE-2024-58020
https://nvd.nist.gov/vuln/detail/CVE-2024-58020
https://lore.kernel.org/linux-cve-announce/2025022603-CVE-2024-58020-a097@gregkh/T
https://access.redhat.com/security/cve/CVE-2024-58057
https://www.cve.org/CVERecord?id=CVE-2024-58057
https://nvd.nist.gov/vuln/detail/CVE-2024-58057
https://lore.kernel.org/linux-cve-announce/2025030607-CVE-2024-58057-5c91@gregkh/T
https://access.redhat.com/security/cve/CVE-2024-58061
https://www.cve.org/CVERecord?id=CVE-2024-58061
https://nvd.nist.gov/vuln/detail/CVE-2024-58061
https://lore.kernel.org/linux-cve-announce/2025030608-CVE-2024-58061-80cf@gregkh/T
https://access.redhat.com/security/cve/CVE-2024-58069
https://www.cve.org/CVERecord?id=CVE-2024-58069
https://nvd.nist.gov/vuln/detail/CVE-2024-58069
https://lore.kernel.org/linux-cve-announce/2025030611-CVE-2024-58069-d1d4@gregkh/T
https://access.redhat.com/security/cve/CVE-2024-58072
https://www.cve.org/CVERecord?id=CVE-2024-58072
https://nvd.nist.gov/vuln/detail/CVE-2024-58072
https://lore.kernel.org/linux-cve-announce/2025030612-CVE-2024-58072-2dc3@gregkh/T
https://access.redhat.com/security/cve/CVE-2024-58075
https://www.cve.org/CVERecord?id=CVE-2024-58075
https://nvd.nist.gov/vuln/detail/CVE-2024-58075
https://lore.kernel.org/linux-cve-announce/2025030629-CVE-2024-58075-2f60@gregkh/T
https://access.redhat.com/security/cve/CVE-2024-58077
https://www.cve.org/CVERecord?id=CVE-2024-58077
https://nvd.nist.gov/vuln/detail/CVE-2024-58077
https://lore.kernel.org/linux-cve-announce/2025030608-CVE-2024-58077-d4e3@gregkh/T
https://access.redhat.com/security/cve/CVE-2024-58088
https://www.cve.org/CVERecord?id=CVE-2024-58088
https://nvd.nist.gov/vuln/detail/CVE-2024-58088
https://lore.kernel.org/linux-cve-announce/2025031208-CVE-2024-58088-2b01@gregkh/T
https://access.redhat.com/security/cve/CVE-2025-21633
https://www.cve.org/CVERecord?id=CVE-2025-21633
https://nvd.nist.gov/vuln/detail/CVE-2025-21633
https://lore.kernel.org/linux-cve-announce/2025011942-CVE-2025-21633-a313@gregkh/T
https://access.redhat.com/security/cve/CVE-2025-21647
https://www.cve.org/CVERecord?id=CVE-2025-21647
https://nvd.nist.gov/vuln/detail/CVE-2025-21647
https://lore.kernel.org/linux-cve-announce/2025011946-CVE-2025-21647-51d8@gregkh/T
https://access.redhat.com/security/cve/CVE-2025-21652
https://www.cve.org/CVERecord?id=CVE-2025-21652
https://nvd.nist.gov/vuln/detail/CVE-2025-21652
https://lore.kernel.org/linux-cve-announce/2025011947-CVE-2025-21652-95d7@gregkh/T
https://access.redhat.com/security/cve/CVE-2025-21655
https://www.cve.org/CVERecord?id=CVE-2025-21655
https://nvd.nist.gov/vuln/detail/CVE-2025-21655
https://git.kernel.org/stable/c/6b63308c28987c6010b1180c72a6db4df6c68033
https://git.kernel.org/stable/c/8efff2aa2d95dc437ab67c5b4a9f1d3f367baa10
https://git.kernel.org/stable/c/a7085c3ae43b86d4b3d1b8275e6a67f14257e3b7
https://git.kernel.org/stable/c/c9a40292a44e78f71258b8522655bffaf5753bdb
https://access.redhat.com/security/cve/CVE-2025-21671
https://www.cve.org/CVERecord?id=CVE-2025-21671
https://nvd.nist.gov/vuln/detail/CVE-2025-21671
https://lore.kernel.org/linux-cve-announce/2025013159-CVE-2025-21671-c4b0@gregkh/T
https://access.redhat.com/security/cve/CVE-2025-21680
https://www.cve.org/CVERecord?id=CVE-2025-21680
https://nvd.nist.gov/vuln/detail/CVE-2025-21680
https://lore.kernel.org/linux-cve-announce/2025013102-CVE-2025-21680-c2d6@gregkh/T
https://access.redhat.com/security/cve/CVE-2025-21691
https://www.cve.org/CVERecord?id=CVE-2025-21691
https://nvd.nist.gov/vuln/detail/CVE-2025-21691
https://lore.kernel.org/linux-cve-announce/2025021055-CVE-2025-21691-2bd2@gregkh/T
https://access.redhat.com/security/cve/CVE-2025-21693
https://www.cve.org/CVERecord?id=CVE-2025-21693
https://nvd.nist.gov/vuln/detail/CVE-2025-21693
https://lore.kernel.org/linux-cve-announce/2025021056-CVE-2025-21693-b6d1@gregkh/T
https://access.redhat.com/security/cve/CVE-2025-21696
https://www.cve.org/CVERecord?id=CVE-2025-21696
https://nvd.nist.gov/vuln/detail/CVE-2025-21696
https://lore.kernel.org/linux-cve-announce/2025021259-CVE-2025-21696-2482@gregkh/T
https://access.redhat.com/security/cve/CVE-2025-21702
https://www.cve.org/CVERecord?id=CVE-2025-21702
https://nvd.nist.gov/vuln/detail/CVE-2025-21702
https://lore.kernel.org/linux-cve-announce/2025021847-CVE-2025-21702-3aa3@gregkh/T
https://access.redhat.com/security/cve/CVE-2025-21726
https://www.cve.org/CVERecord?id=CVE-2025-21726
https://nvd.nist.gov/vuln/detail/CVE-2025-21726
https://lore.kernel.org/linux-cve-announce/2025022648-CVE-2025-21726-73b1@gregkh/T
https://access.redhat.com/security/cve/CVE-2025-21732
https://www.cve.org/CVERecord?id=CVE-2025-21732
https://nvd.nist.gov/vuln/detail/CVE-2025-21732
https://lore.kernel.org/linux-cve-announce/2025022658-CVE-2025-21732-e800@gregkh/T
https://access.redhat.com/security/cve/CVE-2025-21738
https://www.cve.org/CVERecord?id=CVE-2025-21738
https://nvd.nist.gov/vuln/detail/CVE-2025-21738
https://lore.kernel.org/linux-cve-announce/2025022659-CVE-2025-21738-f502@gregkh/T
https://access.redhat.com/security/cve/CVE-2025-21741
https://www.cve.org/CVERecord?id=CVE-2025-21741
https://nvd.nist.gov/vuln/detail/CVE-2025-21741
https://lore.kernel.org/linux-cve-announce/2025022600-CVE-2025-21741-cbfd@gregkh/T
https://access.redhat.com/security/cve/CVE-2025-21742
https://www.cve.org/CVERecord?id=CVE-2025-21742
https://nvd.nist.gov/vuln/detail/CVE-2025-21742
https://lore.kernel.org/linux-cve-announce/2025022600-CVE-2025-21742-7d50@gregkh/T
https://access.redhat.com/security/cve/CVE-2025-21743
https://www.cve.org/CVERecord?id=CVE-2025-21743
https://nvd.nist.gov/vuln/detail/CVE-2025-21743
https://lore.kernel.org/linux-cve-announce/2025022600-CVE-2025-21743-c67f@gregkh/T
https://access.redhat.com/security/cve/CVE-2025-21750
https://www.cve.org/CVERecord?id=CVE-2025-21750
https://nvd.nist.gov/vuln/detail/CVE-2025-21750
https://lore.kernel.org/linux-cve-announce/2025022601-CVE-2025-21750-d10d@gregkh/T
https://access.redhat.com/security/cve/CVE-2025-21761
https://www.cve.org/CVERecord?id=CVE-2025-21761
https://nvd.nist.gov/vuln/detail/CVE-2025-21761
https://lore.kernel.org/linux-cve-announce/2025022604-CVE-2025-21761-218b@gregkh/T
https://access.redhat.com/security/cve/CVE-2025-21765
https://www.cve.org/CVERecord?id=CVE-2025-21765
https://nvd.nist.gov/vuln/detail/CVE-2025-21765
https://lore.kernel.org/linux-cve-announce/2025022605-CVE-2025-21765-4d5e@gregkh/T
https://access.redhat.com/security/cve/CVE-2025-21771
https://www.cve.org/CVERecord?id=CVE-2025-21771
https://nvd.nist.gov/vuln/detail/CVE-2025-21771
https://lore.kernel.org/linux-cve-announce/2025022606-CVE-2025-21771-6032@gregkh/T
https://access.redhat.com/security/cve/CVE-2025-21777
https://www.cve.org/CVERecord?id=CVE-2025-21777
https://nvd.nist.gov/vuln/detail/CVE-2025-21777
https://lore.kernel.org/linux-cve-announce/2025022607-CVE-2025-21777-0c96@gregkh/T
https://access.redhat.com/security/cve/CVE-2025-21785
https://www.cve.org/CVERecord?id=CVE-2025-21785
https://nvd.nist.gov/vuln/detail/CVE-2025-21785
https://lore.kernel.org/linux-cve-announce/2025022608-CVE-2025-21785-184c@gregkh/T
https://access.redhat.com/security/cve/CVE-2025-21786
https://www.cve.org/CVERecord?id=CVE-2025-21786
https://nvd.nist.gov/vuln/detail/CVE-2025-21786
https://lore.kernel.org/linux-cve-announce/2025022608-CVE-2025-21786-f31d@gregkh/T
https://access.redhat.com/security/cve/CVE-2025-21790
https://www.cve.org/CVERecord?id=CVE-2025-21790
https://nvd.nist.gov/vuln/detail/CVE-2025-21790
https://lore.kernel.org/linux-cve-announce/2025022609-CVE-2025-21790-af3e@gregkh/T
https://access.redhat.com/security/cve/CVE-2025-21791
https://www.cve.org/CVERecord?id=CVE-2025-21791
https://nvd.nist.gov/vuln/detail/CVE-2025-21791
https://lore.kernel.org/linux-cve-announce/2025022609-CVE-2025-21791-6074@gregkh/T
https://access.redhat.com/security/cve/CVE-2025-21795
https://www.cve.org/CVERecord?id=CVE-2025-21795
https://nvd.nist.gov/vuln/detail/CVE-2025-21795
https://lore.kernel.org/linux-cve-announce/2025022610-CVE-2025-21795-785d@gregkh/T
https://access.redhat.com/security/cve/CVE-2025-21796
https://www.cve.org/CVERecord?id=CVE-2025-21796
https://nvd.nist.gov/vuln/detail/CVE-2025-21796
https://lore.kernel.org/linux-cve-announce/2025022610-CVE-2025-21796-0133@gregkh/T
https://access.redhat.com/security/cve/CVE-2025-21826
https://www.cve.org/CVERecord?id=CVE-2025-21826
https://nvd.nist.gov/vuln/detail/CVE-2025-21826
https://lore.kernel.org/linux-cve-announce/2025030630-CVE-2025-21826-c263@gregkh/T
https://access.redhat.com/security/cve/CVE-2025-21828
https://www.cve.org/CVERecord?id=CVE-2025-21828
https://nvd.nist.gov/vuln/detail/CVE-2025-21828
https://lore.kernel.org/linux-cve-announce/2025030630-CVE-2025-21828-cb05@gregkh/T
https://access.redhat.com/security/cve/CVE-2025-21837
https://www.cve.org/CVERecord?id=CVE-2025-21837
https://nvd.nist.gov/vuln/detail/CVE-2025-21837
https://lore.kernel.org/linux-cve-announce/2025030706-CVE-2025-21837-85ef@gregkh/T
https://access.redhat.com/security/cve/CVE-2025-21844
https://www.cve.org/CVERecord?id=CVE-2025-21844
https://nvd.nist.gov/vuln/detail/CVE-2025-21844
https://lore.kernel.org/linux-cve-announce/2025031210-CVE-2025-21844-a1cc@gregkh/T
https://access.redhat.com/security/cve/CVE-2025-21846
https://www.cve.org/CVERecord?id=CVE-2025-21846
https://nvd.nist.gov/vuln/detail/CVE-2025-21846
https://lore.kernel.org/linux-cve-announce/2025031211-CVE-2025-21846-25c1@gregkh/T
https://access.redhat.com/security/cve/CVE-2025-21847
https://www.cve.org/CVERecord?id=CVE-2025-21847
https://nvd.nist.gov/vuln/detail/CVE-2025-21847
https://lore.kernel.org/linux-cve-announce/2025031211-CVE-2025-21847-a72f@gregkh/T
https://access.redhat.com/security/cve/CVE-2025-21851
https://www.cve.org/CVERecord?id=CVE-2025-21851
https://nvd.nist.gov/vuln/detail/CVE-2025-21851
https://lore.kernel.org/linux-cve-announce/2025031213-CVE-2025-21851-87bd@gregkh/T
https://access.redhat.com/security/cve/CVE-2025-21853
https://www.cve.org/CVERecord?id=CVE-2025-21853
https://nvd.nist.gov/vuln/detail/CVE-2025-21853
https://lore.kernel.org/linux-cve-announce/2025031214-CVE-2025-21853-cf76@gregkh/T
https://access.redhat.com/security/cve/CVE-2025-21855
https://www.cve.org/CVERecord?id=CVE-2025-21855
https://nvd.nist.gov/vuln/detail/CVE-2025-21855
https://lore.kernel.org/linux-cve-announce/2025031214-CVE-2025-21855-2d67@gregkh/T
https://access.redhat.com/security/cve/CVE-2025-21857
https://www.cve.org/CVERecord?id=CVE-2025-21857
https://nvd.nist.gov/vuln/detail/CVE-2025-21857
https://lore.kernel.org/linux-cve-announce/2025031215-CVE-2025-21857-ab00@gregkh/T
https://access.redhat.com/security/cve/CVE-2025-21861
https://www.cve.org/CVERecord?id=CVE-2025-21861
https://nvd.nist.gov/vuln/detail/CVE-2025-21861
https://lore.kernel.org/linux-cve-announce/2025031216-CVE-2025-21861-c775@gregkh/T
https://access.redhat.com/security/cve/CVE-2025-21863
https://www.cve.org/CVERecord?id=CVE-2025-21863
https://nvd.nist.gov/vuln/detail/CVE-2025-21863
https://lore.kernel.org/linux-cve-announce/2025031217-CVE-2025-21863-a73a@gregkh/T
https://access.redhat.com/security/cve/CVE-2025-21864
https://www.cve.org/CVERecord?id=CVE-2025-21864
https://nvd.nist.gov/vuln/detail/CVE-2025-21864
https://lore.kernel.org/linux-cve-announce/2025031218-CVE-2025-21864-9a8a@gregkh/T
https://access.redhat.com/security/cve/CVE-2025-21976
https://www.cve.org/CVERecord?id=CVE-2025-21976
https://nvd.nist.gov/vuln/detail/CVE-2025-21976
https://lore.kernel.org/linux-cve-announce/2025040147-CVE-2025-21976-340d@gregkh/T
https://access.redhat.com/security/cve/CVE-2025-22056
https://www.cve.org/CVERecord?id=CVE-2025-22056
https://nvd.nist.gov/vuln/detail/CVE-2025-22056
https://lore.kernel.org/linux-cve-announce/2025041605-CVE-2025-22056-5890@gregkh/T
https://access.redhat.com/security/cve/CVE-2025-37749
https://www.cve.org/CVERecord?id=CVE-2025-37749
https://nvd.nist.gov/vuln/detail/CVE-2025-37749
https://lore.kernel.org/linux-cve-announce/2025050136-CVE-2025-37749-0f49@gregkh/T
https://access.redhat.com/security/cve/CVE-2025-37994
https://www.cve.org/CVERecord?id=CVE-2025-37994
https://nvd.nist.gov/vuln/detail/CVE-2025-37994
https://lore.kernel.org/linux-cve-announce/2025052901-CVE-2025-37994-6e9c@gregkh/T
https://access.redhat.com/security/cve/CVE-2025-38116
https://www.cve.org/CVERecord?id=CVE-2025-38116
https://nvd.nist.gov/vuln/detail/CVE-2025-38116
https://lore.kernel.org/linux-cve-announce/2025070325-CVE-2025-38116-1d80@gregkh/T
https://access.redhat.com/security/cve/CVE-2025-38369
https://www.cve.org/CVERecord?id=CVE-2025-38369
https://nvd.nist.gov/vuln/detail/CVE-2025-38369
https://lore.kernel.org/linux-cve-announce/2025072559-CVE-2025-38369-6ddf@gregkh/T
https://access.redhat.com/security/cve/CVE-2025-38412
https://www.cve.org/CVERecord?id=CVE-2025-38412
https://nvd.nist.gov/vuln/detail/CVE-2025-38412
https://lore.kernel.org/linux-cve-announce/2025072521-CVE-2025-38412-2ccc@gregkh/T
https://access.redhat.com/security/cve/CVE-2025-38468
https://www.cve.org/CVERecord?id=CVE-2025-38468
https://nvd.nist.gov/vuln/detail/CVE-2025-38468
https://lore.kernel.org/linux-cve-announce/2025072834-CVE-2025-38468-4110@gregkh/T
Affected packages
Red Hat:enterprise_linux:10.1
kernel
Package
Name
kernel
Purl
pkg:rpm/redhat/kernel
Affected ranges
Type
ECOSYSTEM
Events
Introduced
0
Unknown introduced version / All previous versions are affected
Fixed
0:6.12.0-124.8.1.el10_1
kernel-64k
Package
Name
kernel-64k
Purl
pkg:rpm/redhat/kernel-64k
Affected ranges
Type
ECOSYSTEM
Events
Introduced
0
Unknown introduced version / All previous versions are affected
Fixed
0:6.12.0-124.8.1.el10_1
kernel-64k-core
Package
Name
kernel-64k-core
Purl
pkg:rpm/redhat/kernel-64k-core
Affected ranges
Type
ECOSYSTEM
Events
Introduced
0
Unknown introduced version / All previous versions are affected
Fixed
0:6.12.0-124.8.1.el10_1
kernel-64k-debug
Package
Name
kernel-64k-debug
Purl
pkg:rpm/redhat/kernel-64k-debug
Affected ranges
Type
ECOSYSTEM
Events
Introduced
0
Unknown introduced version / All previous versions are affected
Fixed
0:6.12.0-124.8.1.el10_1
kernel-64k-debug-core
Package
Name
kernel-64k-debug-core
Purl
pkg:rpm/redhat/kernel-64k-debug-core
Affected ranges
Type
ECOSYSTEM
Events
Introduced
0
Unknown introduced version / All previous versions are affected
Fixed
0:6.12.0-124.8.1.el10_1
kernel-64k-debug-debuginfo
Package
Name
kernel-64k-debug-debuginfo
Purl
pkg:rpm/redhat/kernel-64k-debug-debuginfo
Affected ranges
Type
ECOSYSTEM
Events
Introduced
0
Unknown introduced version / All previous versions are affected
Fixed
0:6.12.0-124.8.1.el10_1
kernel-64k-debug-devel
Package
Name
kernel-64k-debug-devel
Purl
pkg:rpm/redhat/kernel-64k-debug-devel
Affected ranges
Type
ECOSYSTEM
Events
Introduced
0
Unknown introduced version / All previous versions are affected
Fixed
0:6.12.0-124.8.1.el10_1
kernel-64k-debug-devel-matched
Package
Name
kernel-64k-debug-devel-matched
Purl
pkg:rpm/redhat/kernel-64k-debug-devel-matched
Affected ranges
Type
ECOSYSTEM
Events
Introduced
0
Unknown introduced version / All previous versions are affected
Fixed
0:6.12.0-124.8.1.el10_1
kernel-64k-debug-modules
Package
Name
kernel-64k-debug-modules
Purl
pkg:rpm/redhat/kernel-64k-debug-modules
Affected ranges
Type
ECOSYSTEM
Events
Introduced
0
Unknown introduced version / All previous versions are affected
Fixed
0:6.12.0-124.8.1.el10_1
kernel-64k-debug-modules-core
Package
Name
kernel-64k-debug-modules-core
Purl
pkg:rpm/redhat/kernel-64k-debug-modules-core
Affected ranges
Type
ECOSYSTEM
Events
Introduced
0
Unknown introduced version / All previous versions are affected
Fixed
0:6.12.0-124.8.1.el10_1
kernel-64k-debug-modules-extra
Package
Name
kernel-64k-debug-modules-extra
Purl
pkg:rpm/redhat/kernel-64k-debug-modules-extra
Affected ranges
Type
ECOSYSTEM
Events
Introduced
0
Unknown introduced version / All previous versions are affected
Fixed
0:6.12.0-124.8.1.el10_1
kernel-64k-debuginfo
Package
Name
kernel-64k-debuginfo
Purl
pkg:rpm/redhat/kernel-64k-debuginfo
Affected ranges
Type
ECOSYSTEM
Events
Introduced
0
Unknown introduced version / All previous versions are affected
Fixed
0:6.12.0-124.8.1.el10_1
kernel-64k-devel
Package
Name
kernel-64k-devel
Purl
pkg:rpm/redhat/kernel-64k-devel
Affected ranges
Type
ECOSYSTEM
Events
Introduced
0
Unknown introduced version / All previous versions are affected
Fixed
0:6.12.0-124.8.1.el10_1
kernel-64k-devel-matched
Package
Name
kernel-64k-devel-matched
Purl
pkg:rpm/redhat/kernel-64k-devel-matched
Affected ranges
Type
ECOSYSTEM
Events
Introduced
0
Unknown introduced version / All previous versions are affected
Fixed
0:6.12.0-124.8.1.el10_1
kernel-64k-modules
Package
Name
kernel-64k-modules
Purl
pkg:rpm/redhat/kernel-64k-modules
Affected ranges
Type
ECOSYSTEM
Events
Introduced
0
Unknown introduced version / All previous versions are affected
Fixed
0:6.12.0-124.8.1.el10_1
kernel-64k-modules-core
Package
Name
kernel-64k-modules-core
Purl
pkg:rpm/redhat/kernel-64k-modules-core
Affected ranges
Type
ECOSYSTEM
Events
Introduced
0
Unknown introduced version / All previous versions are affected
Fixed
0:6.12.0-124.8.1.el10_1
kernel-64k-modules-extra
Package
Name
kernel-64k-modules-extra
Purl
pkg:rpm/redhat/kernel-64k-modules-extra
Affected ranges
Type
ECOSYSTEM
Events
Introduced
0
Unknown introduced version / All previous versions are affected
Fixed
0:6.12.0-124.8.1.el10_1
kernel-abi-stablelists
Package
Name
kernel-abi-stablelists
Purl
pkg:rpm/redhat/kernel-abi-stablelists
Affected ranges
Type
ECOSYSTEM
Events
Introduced
0
Unknown introduced version / All previous versions are affected
Fixed
0:6.12.0-124.8.1.el10_1
kernel-core
Package
Name
kernel-core
Purl
pkg:rpm/redhat/kernel-core
Affected ranges
Type
ECOSYSTEM
Events
Introduced
0
Unknown introduced version / All previous versions are affected
Fixed
0:6.12.0-124.8.1.el10_1
kernel-debug
Package
Name
kernel-debug
Purl
pkg:rpm/redhat/kernel-debug
Affected ranges
Type
ECOSYSTEM
Events
Introduced
0
Unknown introduced version / All previous versions are affected
Fixed
0:6.12.0-124.8.1.el10_1
kernel-debug-core
Package
Name
kernel-debug-core
Purl
pkg:rpm/redhat/kernel-debug-core
Affected ranges
Type
ECOSYSTEM
Events
Introduced
0
Unknown introduced version / All previous versions are affected
Fixed
0:6.12.0-124.8.1.el10_1
kernel-debug-debuginfo
Package
Name
kernel-debug-debuginfo
Purl
pkg:rpm/redhat/kernel-debug-debuginfo
Affected ranges
Type
ECOSYSTEM
Events
Introduced
0
Unknown introduced version / All previous versions are affected
Fixed
0:6.12.0-124.8.1.el10_1
kernel-debug-devel
Package
Name
kernel-debug-devel
Purl
pkg:rpm/redhat/kernel-debug-devel
Affected ranges
Type
ECOSYSTEM
Events
Introduced
0
Unknown introduced version / All previous versions are affected
Fixed
0:6.12.0-124.8.1.el10_1
kernel-debug-devel-matched
Package
Name
kernel-debug-devel-matched
Purl
pkg:rpm/redhat/kernel-debug-devel-matched
Affected ranges
Type
ECOSYSTEM
Events
Introduced
0
Unknown introduced version / All previous versions are affected
Fixed
0:6.12.0-124.8.1.el10_1
kernel-debug-modules
Package
Name
kernel-debug-modules
Purl
pkg:rpm/redhat/kernel-debug-modules
Affected ranges
Type
ECOSYSTEM
Events
Introduced
0
Unknown introduced version / All previous versions are affected
Fixed
0:6.12.0-124.8.1.el10_1
kernel-debug-modules-core
Package
Name
kernel-debug-modules-core
Purl
pkg:rpm/redhat/kernel-debug-modules-core
Affected ranges
Type
ECOSYSTEM
Events
Introduced
0
Unknown introduced version / All previous versions are affected
Fixed
0:6.12.0-124.8.1.el10_1
kernel-debug-modules-extra
Package
Name
kernel-debug-modules-extra
Purl
pkg:rpm/redhat/kernel-debug-modules-extra
Affected ranges
Type
ECOSYSTEM
Events
Introduced
0
Unknown introduced version / All previous versions are affected
Fixed
0:6.12.0-124.8.1.el10_1
kernel-debug-uki-virt
Package
Name
kernel-debug-uki-virt
Purl
pkg:rpm/redhat/kernel-debug-uki-virt
Affected ranges
Type
ECOSYSTEM
Events
Introduced
0
Unknown introduced version / All previous versions are affected
Fixed
0:6.12.0-124.8.1.el10_1
kernel-debuginfo
Package
Name
kernel-debuginfo
Purl
pkg:rpm/redhat/kernel-debuginfo
Affected ranges
Type
ECOSYSTEM
Events
Introduced
0
Unknown introduced version / All previous versions are affected
Fixed
0:6.12.0-124.8.1.el10_1
kernel-debuginfo-common-aarch64
Package
Name
kernel-debuginfo-common-aarch64
Purl
pkg:rpm/redhat/kernel-debuginfo-common-aarch64
Affected ranges
Type
ECOSYSTEM
Events
Introduced
0
Unknown introduced version / All previous versions are affected
Fixed
0:6.12.0-124.8.1.el10_1
kernel-debuginfo-common-ppc64le
Package
Name
kernel-debuginfo-common-ppc64le
Purl
pkg:rpm/redhat/kernel-debuginfo-common-ppc64le
Affected ranges
Type
ECOSYSTEM
Events
Introduced
0
Unknown introduced version / All previous versions are affected
Fixed
0:6.12.0-124.8.1.el10_1
kernel-debuginfo-common-s390x
Package
Name
kernel-debuginfo-common-s390x
Purl
pkg:rpm/redhat/kernel-debuginfo-common-s390x
Affected ranges
Type
ECOSYSTEM
Events
Introduced
0
Unknown introduced version / All previous versions are affected
Fixed
0:6.12.0-124.8.1.el10_1
kernel-debuginfo-common-x86_64
Package
Name
kernel-debuginfo-common-x86_64
Purl
pkg:rpm/redhat/kernel-debuginfo-common-x86_64
Affected ranges
Type
ECOSYSTEM
Events
Introduced
0
Unknown introduced version / All previous versions are affected
Fixed
0:6.12.0-124.8.1.el10_1
kernel-devel
Package
Name
kernel-devel
Purl
pkg:rpm/redhat/kernel-devel
Affected ranges
Type
ECOSYSTEM
Events
Introduced
0
Unknown introduced version / All previous versions are affected
Fixed
0:6.12.0-124.8.1.el10_1
kernel-devel-matched
Package
Name
kernel-devel-matched
Purl
pkg:rpm/redhat/kernel-devel-matched
Affected ranges
Type
ECOSYSTEM
Events
Introduced
0
Unknown introduced version / All previous versions are affected
Fixed
0:6.12.0-124.8.1.el10_1
kernel-doc
Package
Name
kernel-doc
Purl
pkg:rpm/redhat/kernel-doc
Affected ranges
Type
ECOSYSTEM
Events
Introduced
0
Unknown introduced version / All previous versions are affected
Fixed
0:6.12.0-124.8.1.el10_1
kernel-modules
Package
Name
kernel-modules
Purl
pkg:rpm/redhat/kernel-modules
Affected ranges
Type
ECOSYSTEM
Events
Introduced
0
Unknown introduced version / All previous versions are affected
Fixed
0:6.12.0-124.8.1.el10_1
kernel-modules-core
Package
Name
kernel-modules-core
Purl
pkg:rpm/redhat/kernel-modules-core
Affected ranges
Type
ECOSYSTEM
Events
Introduced
0
Unknown introduced version / All previous versions are affected
Fixed
0:6.12.0-124.8.1.el10_1
kernel-modules-extra
Package
Name
kernel-modules-extra
Purl
pkg:rpm/redhat/kernel-modules-extra
Affected ranges
Type
ECOSYSTEM
Events
Introduced
0
Unknown introduced version / All previous versions are affected
Fixed
0:6.12.0-124.8.1.el10_1
kernel-modules-extra-matched
Package
Name
kernel-modules-extra-matched
Purl
pkg:rpm/redhat/kernel-modules-extra-matched
Affected ranges
Type
ECOSYSTEM
Events
Introduced
0
Unknown introduced version / All previous versions are affected
Fixed
0:6.12.0-124.8.1.el10_1
kernel-rt
Package
Name
kernel-rt
Purl
pkg:rpm/redhat/kernel-rt
Affected ranges
Type
ECOSYSTEM
Events
Introduced
0
Unknown introduced version / All previous versions are affected
Fixed
0:6.12.0-124.8.1.el10_1
kernel-rt-64k
Package
Name
kernel-rt-64k
Purl
pkg:rpm/redhat/kernel-rt-64k
Affected ranges
Type
ECOSYSTEM
Events
Introduced
0
Unknown introduced version / All previous versions are affected
Fixed
0:6.12.0-124.8.1.el10_1
kernel-rt-64k-core
Package
Name
kernel-rt-64k-core
Purl
pkg:rpm/redhat/kernel-rt-64k-core
Affected ranges
Type
ECOSYSTEM
Events
Introduced
0
Unknown introduced version / All previous versions are affected
Fixed
0:6.12.0-124.8.1.el10_1
kernel-rt-64k-debug
Package
Name
kernel-rt-64k-debug
Purl
pkg:rpm/redhat/kernel-rt-64k-debug
Affected ranges
Type
ECOSYSTEM
Events
Introduced
0
Unknown introduced version / All previous versions are affected
Fixed
0:6.12.0-124.8.1.el10_1
kernel-rt-64k-debug-core
Package
Name
kernel-rt-64k-debug-core
Purl
pkg:rpm/redhat/kernel-rt-64k-debug-core
Affected ranges
Type
ECOSYSTEM
Events
Introduced
0
Unknown introduced version / All previous versions are affected
Fixed
0:6.12.0-124.8.1.el10_1
kernel-rt-64k-debug-debuginfo
Package
Name
kernel-rt-64k-debug-debuginfo
Purl
pkg:rpm/redhat/kernel-rt-64k-debug-debuginfo
Affected ranges
Type
ECOSYSTEM
Events
Introduced
0
Unknown introduced version / All previous versions are affected
Fixed
0:6.12.0-124.8.1.el10_1
kernel-rt-64k-debug-devel
Package
Name
kernel-rt-64k-debug-devel
Purl
pkg:rpm/redhat/kernel-rt-64k-debug-devel
Affected ranges
Type
ECOSYSTEM
Events
Introduced
0
Unknown introduced version / All previous versions are affected
Fixed
0:6.12.0-124.8.1.el10_1
kernel-rt-64k-debug-modules
Package
Name
kernel-rt-64k-debug-modules
Purl
pkg:rpm/redhat/kernel-rt-64k-debug-modules
Affected ranges
Type
ECOSYSTEM
Events
Introduced
0
Unknown introduced version / All previous versions are affected
Fixed
0:6.12.0-124.8.1.el10_1
kernel-rt-64k-debug-modules-core
Package
Name
kernel-rt-64k-debug-modules-core
Purl
pkg:rpm/redhat/kernel-rt-64k-debug-modules-core
Affected ranges
Type
ECOSYSTEM
Events
Introduced
0
Unknown introduced version / All previous versions are affected
Fixed
0:6.12.0-124.8.1.el10_1
kernel-rt-64k-debug-modules-extra
Package
Name
kernel-rt-64k-debug-modules-extra
Purl
pkg:rpm/redhat/kernel-rt-64k-debug-modules-extra
Affected ranges
Type
ECOSYSTEM
Events
Introduced
0
Unknown introduced version / All previous versions are affected
Fixed
0:6.12.0-124.8.1.el10_1
kernel-rt-64k-debuginfo
Package
Name
kernel-rt-64k-debuginfo
Purl
pkg:rpm/redhat/kernel-rt-64k-debuginfo
Affected ranges
Type
ECOSYSTEM
Events
Introduced
0
Unknown introduced version / All previous versions are affected
Fixed
0:6.12.0-124.8.1.el10_1
kernel-rt-64k-devel
Package
Name
kernel-rt-64k-devel
Purl
pkg:rpm/redhat/kernel-rt-64k-devel
Affected ranges
Type
ECOSYSTEM
Events
Introduced
0
Unknown introduced version / All previous versions are affected
Fixed
0:6.12.0-124.8.1.el10_1
kernel-rt-64k-modules
Package
Name
kernel-rt-64k-modules
Purl
pkg:rpm/redhat/kernel-rt-64k-modules
Affected ranges
Type
ECOSYSTEM
Events
Introduced
0
Unknown introduced version / All previous versions are affected
Fixed
0:6.12.0-124.8.1.el10_1
kernel-rt-64k-modules-core
Package
Name
kernel-rt-64k-modules-core
Purl
pkg:rpm/redhat/kernel-rt-64k-modules-core
Affected ranges
Type
ECOSYSTEM
Events
Introduced
0
Unknown introduced version / All previous versions are affected
Fixed
0:6.12.0-124.8.1.el10_1
kernel-rt-64k-modules-extra
Package
Name
kernel-rt-64k-modules-extra
Purl
pkg:rpm/redhat/kernel-rt-64k-modules-extra
Affected ranges
Type
ECOSYSTEM
Events
Introduced
0
Unknown introduced version / All previous versions are affected
Fixed
0:6.12.0-124.8.1.el10_1
kernel-rt-core
Package
Name
kernel-rt-core
Purl
pkg:rpm/redhat/kernel-rt-core
Affected ranges
Type
ECOSYSTEM
Events
Introduced
0
Unknown introduced version / All previous versions are affected
Fixed
0:6.12.0-124.8.1.el10_1
kernel-rt-debug
Package
Name
kernel-rt-debug
Purl
pkg:rpm/redhat/kernel-rt-debug
Affected ranges
Type
ECOSYSTEM
Events
Introduced
0
Unknown introduced version / All previous versions are affected
Fixed
0:6.12.0-124.8.1.el10_1
kernel-rt-debug-core
Package
Name
kernel-rt-debug-core
Purl
pkg:rpm/redhat/kernel-rt-debug-core
Affected ranges
Type
ECOSYSTEM
Events
Introduced
0
Unknown introduced version / All previous versions are affected
Fixed
0:6.12.0-124.8.1.el10_1
kernel-rt-debug-debuginfo
Package
Name
kernel-rt-debug-debuginfo
Purl
pkg:rpm/redhat/kernel-rt-debug-debuginfo
Affected ranges
Type
ECOSYSTEM
Events
Introduced
0
Unknown introduced version / All previous versions are affected
Fixed
0:6.12.0-124.8.1.el10_1
kernel-rt-debug-devel
Package
Name
kernel-rt-debug-devel
Purl
pkg:rpm/redhat/kernel-rt-debug-devel
Affected ranges
Type
ECOSYSTEM
Events
Introduced
0
Unknown introduced version / All previous versions are affected
Fixed
0:6.12.0-124.8.1.el10_1
kernel-rt-debug-modules
Package
Name
kernel-rt-debug-modules
Purl
pkg:rpm/redhat/kernel-rt-debug-modules
Affected ranges
Type
ECOSYSTEM
Events
Introduced
0
Unknown introduced version / All previous versions are affected
Fixed
0:6.12.0-124.8.1.el10_1
kernel-rt-debug-modules-core
Package
Name
kernel-rt-debug-modules-core
Purl
pkg:rpm/redhat/kernel-rt-debug-modules-core
Affected ranges
Type
ECOSYSTEM
Events
Introduced
0
Unknown introduced version / All previous versions are affected
Fixed
0:6.12.0-124.8.1.el10_1
kernel-rt-debug-modules-extra
Package
Name
kernel-rt-debug-modules-extra
Purl
pkg:rpm/redhat/kernel-rt-debug-modules-extra
Affected ranges
Type
ECOSYSTEM
Events
Introduced
0
Unknown introduced version / All previous versions are affected
Fixed
0:6.12.0-124.8.1.el10_1
kernel-rt-debuginfo
Package
Name
kernel-rt-debuginfo
Purl
pkg:rpm/redhat/kernel-rt-debuginfo
Affected ranges
Type
ECOSYSTEM
Events
Introduced
0
Unknown introduced version / All previous versions are affected
Fixed
0:6.12.0-124.8.1.el10_1
kernel-rt-devel
Package
Name
kernel-rt-devel
Purl
pkg:rpm/redhat/kernel-rt-devel
Affected ranges
Type
ECOSYSTEM
Events
Introduced
0
Unknown introduced version / All previous versions are affected
Fixed
0:6.12.0-124.8.1.el10_1
kernel-rt-modules
Package
Name
kernel-rt-modules
Purl
pkg:rpm/redhat/kernel-rt-modules
Affected ranges
Type
ECOSYSTEM
Events
Introduced
0
Unknown introduced version / All previous versions are affected
Fixed
0:6.12.0-124.8.1.el10_1
kernel-rt-modules-core
Package
Name
kernel-rt-modules-core
Purl
pkg:rpm/redhat/kernel-rt-modules-core
Affected ranges
Type
ECOSYSTEM
Events
Introduced
0
Unknown introduced version / All previous versions are affected
Fixed
0:6.12.0-124.8.1.el10_1
kernel-rt-modules-extra
Package
Name
kernel-rt-modules-extra
Purl
pkg:rpm/redhat/kernel-rt-modules-extra
Affected ranges
Type
ECOSYSTEM
Events
Introduced
0
Unknown introduced version / All previous versions are affected
Fixed
0:6.12.0-124.8.1.el10_1
kernel-tools
Package
Name
kernel-tools
Purl
pkg:rpm/redhat/kernel-tools
Affected ranges
Type
ECOSYSTEM
Events
Introduced
0
Unknown introduced version / All previous versions are affected
Fixed
0:6.12.0-124.8.1.el10_1
kernel-tools-debuginfo
Package
Name
kernel-tools-debuginfo
Purl
pkg:rpm/redhat/kernel-tools-debuginfo
Affected ranges
Type
ECOSYSTEM
Events
Introduced
0
Unknown introduced version / All previous versions are affected
Fixed
0:6.12.0-124.8.1.el10_1
kernel-tools-libs
Package
Name
kernel-tools-libs
Purl
pkg:rpm/redhat/kernel-tools-libs
Affected ranges
Type
ECOSYSTEM
Events
Introduced
0
Unknown introduced version / All previous versions are affected
Fixed
0:6.12.0-124.8.1.el10_1
kernel-tools-libs-devel
Package
Name
kernel-tools-libs-devel
Purl
pkg:rpm/redhat/kernel-tools-libs-devel
Affected ranges
Type
ECOSYSTEM
Events
Introduced
0
Unknown introduced version / All previous versions are affected
Fixed
0:6.12.0-124.8.1.el10_1
kernel-uki-virt
Package
Name
kernel-uki-virt
Purl
pkg:rpm/redhat/kernel-uki-virt
Affected ranges
Type
ECOSYSTEM
Events
Introduced
0
Unknown introduced version / All previous versions are affected
Fixed
0:6.12.0-124.8.1.el10_1
kernel-uki-virt-addons
Package
Name
kernel-uki-virt-addons
Purl
pkg:rpm/redhat/kernel-uki-virt-addons
Affected ranges
Type
ECOSYSTEM
Events
Introduced
0
Unknown introduced version / All previous versions are affected
Fixed
0:6.12.0-124.8.1.el10_1
kernel-zfcpdump
Package
Name
kernel-zfcpdump
Purl
pkg:rpm/redhat/kernel-zfcpdump
Affected ranges
Type
ECOSYSTEM
Events
Introduced
0
Unknown introduced version / All previous versions are affected
Fixed
0:6.12.0-124.8.1.el10_1
kernel-zfcpdump-core
Package
Name
kernel-zfcpdump-core
Purl
pkg:rpm/redhat/kernel-zfcpdump-core
Affected ranges
Type
ECOSYSTEM
Events
Introduced
0
Unknown introduced version / All previous versions are affected
Fixed
0:6.12.0-124.8.1.el10_1
kernel-zfcpdump-debuginfo
Package
Name
kernel-zfcpdump-debuginfo
Purl
pkg:rpm/redhat/kernel-zfcpdump-debuginfo
Affected ranges
Type
ECOSYSTEM
Events
Introduced
0
Unknown introduced version / All previous versions are affected
Fixed
0:6.12.0-124.8.1.el10_1
kernel-zfcpdump-devel
Package
Name
kernel-zfcpdump-devel
Purl
pkg:rpm/redhat/kernel-zfcpdump-devel
Affected ranges
Type
ECOSYSTEM
Events
Introduced
0
Unknown introduced version / All previous versions are affected
Fixed
0:6.12.0-124.8.1.el10_1
kernel-zfcpdump-devel-matched
Package
Name
kernel-zfcpdump-devel-matched
Purl
pkg:rpm/redhat/kernel-zfcpdump-devel-matched
Affected ranges
Type
ECOSYSTEM
Events
Introduced
0
Unknown introduced version / All previous versions are affected
Fixed
0:6.12.0-124.8.1.el10_1
kernel-zfcpdump-modules
Package
Name
kernel-zfcpdump-modules
Purl
pkg:rpm/redhat/kernel-zfcpdump-modules
Affected ranges
Type
ECOSYSTEM
Events
Introduced
0
Unknown introduced version / All previous versions are affected
Fixed
0:6.12.0-124.8.1.el10_1
kernel-zfcpdump-modules-core
Package
Name
kernel-zfcpdump-modules-core
Purl
pkg:rpm/redhat/kernel-zfcpdump-modules-core
Affected ranges
Type
ECOSYSTEM
Events
Introduced
0
Unknown introduced version / All previous versions are affected
Fixed
0:6.12.0-124.8.1.el10_1
kernel-zfcpdump-modules-extra
Package
Name
kernel-zfcpdump-modules-extra
Purl
pkg:rpm/redhat/kernel-zfcpdump-modules-extra
Affected ranges
Type
ECOSYSTEM
Events
Introduced
0
Unknown introduced version / All previous versions are affected
Fixed
0:6.12.0-124.8.1.el10_1
libperf
Package
Name
libperf
Purl
pkg:rpm/redhat/libperf
Affected ranges
Type
ECOSYSTEM
Events
Introduced
0
Unknown introduced version / All previous versions are affected
Fixed
0:6.12.0-124.8.1.el10_1
libperf-debuginfo
Package
Name
libperf-debuginfo
Purl
pkg:rpm/redhat/libperf-debuginfo
Affected ranges
Type
ECOSYSTEM
Events
Introduced
0
Unknown introduced version / All previous versions are affected
Fixed
0:6.12.0-124.8.1.el10_1
perf
Package
Name
perf
Purl
pkg:rpm/redhat/perf
Affected ranges
Type
ECOSYSTEM
Events
Introduced
0
Unknown introduced version / All previous versions are affected
Fixed
0:6.12.0-124.8.1.el10_1
perf-debuginfo
Package
Name
perf-debuginfo
Purl
pkg:rpm/redhat/perf-debuginfo
Affected ranges
Type
ECOSYSTEM
Events
Introduced
0
Unknown introduced version / All previous versions are affected
Fixed
0:6.12.0-124.8.1.el10_1
python3-perf
Package
Name
python3-perf
Purl
pkg:rpm/redhat/python3-perf
Affected ranges
Type
ECOSYSTEM
Events
Introduced
0
Unknown introduced version / All previous versions are affected
Fixed
0:6.12.0-124.8.1.el10_1
python3-perf-debuginfo
Package
Name
python3-perf-debuginfo
Purl
pkg:rpm/redhat/python3-perf-debuginfo
Affected ranges
Type
ECOSYSTEM
Events
Introduced
0
Unknown introduced version / All previous versions are affected
Fixed
0:6.12.0-124.8.1.el10_1
rtla
Package
Name
rtla
Purl
pkg:rpm/redhat/rtla
Affected ranges
Type
ECOSYSTEM
Events
Introduced
0
Unknown introduced version / All previous versions are affected
Fixed
0:6.12.0-124.8.1.el10_1
rv
Package
Name
rv
Purl
pkg:rpm/redhat/rv
Affected ranges
Type
ECOSYSTEM
Events
Introduced
0
Unknown introduced version / All previous versions are affected
Fixed
0:6.12.0-124.8.1.el10_1
RHSA-2025:20095 - OSV