Multiple vulnerabilities were identified in RedHat Linux Kernel. A remote attacker could exploit some of these vulnerabilities to trigger security restriction bypass, remote code execution, data manipulation, denial of service condition, elevation of privilege and sensitive information disclosure on the targeted system.
[Updated on 2026-04-08]
Updated Impact, System / Technologies affected, Solutions, Vulnerability Identifier and Related Links.
[Updated on 2026-04-10]
Updated Impact, System / Technologies affected, Solutions, Vulnerability Identifier and Related Links.