Skip to main content
Security 2 min read 208 views

Red Hat and Ubuntu Ship Coordinated Linux Kernel Security Updates

Major Linux distributions released synchronized kernel updates addressing memory safety, networking, and file system vulnerabilities with moderate severity ratings.

TD

TechDrop Editorial

Share:

Red Hat, Ubuntu, and other major Linux distributions have released coordinated kernel security updates addressing vulnerabilities in memory management, networking subsystems, and file systems. The updates carry moderate severity ratings and are recommended for all production systems.

Red Hat Enterprise Linux Updates

Red Hat released kernel updates for RHEL 9 and RHEL 10 Extended Update Support, addressing multiple CVEs:

  • CVE-2025-39806: HID multitouch slab out-of-bounds access fix
  • CVE-2025-39840: Audit subsystem out-of-bounds read correction
  • CVE-2025-39883: Memory failure handling VM_BUG fix
  • CVE-2025-40240: SCTP NULL dereference prevention

Red Hat Product Security rated these updates as having Moderate security impact.

Ubuntu Security Updates

Ubuntu released USN-7922-4, addressing vulnerabilities in multiple kernel subsystems:

  • Cryptographic API: Security improvements to crypto operations
  • Network drivers: Fixes for InfiniBand and general networking
  • File systems: AFS and F2FS security corrections
  • Memory management: Hardening against memory-related attacks
  • Netfilter: Firewall subsystem security fixes

The updates apply to Ubuntu 20.04 LTS and 18.04 LTS, including Raspberry Pi kernel variants.

SUSE Linux Updates

SUSE released kernel live patches for SUSE Linux Enterprise 15 SP5, enabling security fixes without system reboots. Live patching is particularly valuable for production systems requiring high availability.

Coordinated Disclosure

The synchronized release across distributions reflects the collaborative nature of Linux kernel security. The kernel security team works with distribution maintainers to ensure patches are available simultaneously, preventing attackers from exploiting the disclosure window.

Update Recommendations

System administrators should:

  • Review changelogs: Assess which CVEs affect your specific workloads
  • Test in staging: Validate kernel updates before production deployment
  • Schedule maintenance: Plan reboots for systems not using live patching
  • Monitor for issues: Watch for unexpected behavior after updates

Kernel CVE Volume

With 8-9 new kernel CVEs appearing daily, prioritization is essential. These moderate-severity updates address real vulnerabilities but don't require emergency patching. Organizations should incorporate them into regular maintenance cycles within 30 days of release.

Related Articles