Skip to content

Commit 6f9b335

Browse files
Update Advisory-EGI-SVG-2026-01.md
1 parent 1ebb925 commit 6f9b335

File tree

1 file changed

+93
-3
lines changed

1 file changed

+93
-3
lines changed

2026/Advisory-EGI-SVG-2026-01.md

Lines changed: 93 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -1,11 +1,101 @@
11
---
22
title: Advisory-EGI-SVG-2026-01
33
permalink: /Advisory-EGI-SVG-2026-01
4+
redirect_from:
5+
- /Advisory-SVG-CVE-2025-38499
6+
7+
published: false
48

59
---
10+
## Advisory-EGI-SVG-2026-01
11+
12+
# HIGH risk Linux Kernel vulnerability on RHEL-9/10 etc
13+
14+
Date: 2026-01-06
15+
Updated: 2026-02-11
16+
17+
18+
HIGH risk vulnerability affecting RHEL-9, RHEL-10, derivatives
19+
and other distributions, concerning clone_private_mnt(). [R 1]
20+
21+
22+
## IDs AND CVSS SCORE
23+
24+
EGI SVG ID : EGI-SVG-2026-01
25+
26+
CVE ID : CVE-2025-38499
27+
28+
CVSS Score : 7.8 [R 1]
29+
30+
31+
## ACTIONS REQUIRED/RECOMMENDED
32+
33+
Affected sites are recommended to update relevant components
34+
as soon as possible using information in the references below.
35+
36+
## MITIGATION
37+
38+
No mitigation is available [R 1]
39+
40+
## MORE INFORMATION
41+
42+
Other security issues were fixed at the same time as this [R 8] [R 9].
43+
44+
RHEL-8 and derivatives are not affected.
45+
46+
## STATUS OF THIS ADVISORY
47+
48+
49+
_TLP:CLEAR information - Unlimited distribution_
50+
51+
52+
https://advisories.egi.eu/Advisory-EGI-SVG-2026-01
53+
54+
https://advisories.egi.eu/Advisory-SVG-CVE-2025-38499
55+
56+
Minor updates may be made without re-distribution to the sites.
57+
58+
59+
## CONTACT AND OTHER INFORMATION ON SVG
60+
61+
-----------------------------
62+
This advisory is subject to the Creative Commons licence
63+
https://creativecommons.org/licenses/by/4.0/ and
64+
the EGI (https://www.egi.eu/) Software Vulnerability Group
65+
must be credited.
66+
---
67+
68+
Comments or questions should be sent to
69+
svg-rat at mailman.egi.eu
70+
71+
Vulnerabilities relevant for EGI can be reported at
72+
report-vulnerability at egi.eu
73+
74+
(see [R 99] for further details, and other information on SVG)
75+
76+
77+
## REFERENCES
78+
79+
- [R 1] <https://access.redhat.com/security/cve/CVE-2025-38499>
80+
81+
- [R 2] <https://nvd.nist.gov/vuln/detail/CVE-2025-38499>
82+
83+
- [R 3] <https://www.cve.org/CVERecord?id=CVE-2025-38499>
84+
85+
- [R 4] <https://security-tracker.debian.org/tracker/CVE-2025-38499>
86+
87+
- [R 5] <https://ubuntu.com/security/CVE-2025-38499>
88+
89+
- [R 6] <https://errata.build.resf.org/> (RockyLinux)
90+
91+
- [R 7] <https://errata.almalinux.org/> (AlmaLinux)
92+
93+
- [R 8] <https://access.redhat.com/errata/RHSA-2025:23241> (RHEL9)
694

7-
**Advisory EGI-SVG-2026-01 is not public yet**
95+
- [R 9] <https://access.redhat.com/errata/RHSA-2025:23279> (RHEL10)
96+
97+
- [R 99] <https://confluence.egi.eu/display/EGIBG/SVG+Advisories>
898

9-
When it is it will be here.
99+
## CREDITS
10100

11-
You are looking in the right place
101+
SVG was alerted to this vulnerability by Mischa Salle.

0 commit comments

Comments
 (0)