In the Linux kernel, the following vulnerability has been resolved: selinux: Add boundary check in put_entry() Just like next_entry(), boundary check is necessary to prevent memory out-of-bound access.
Upstream advisory: https://lore.kernel.org/linux-cve-announce/2025061839-CVE-2022-50200-51f0@gregkh/T
This issue has been addressed in the following products: Red Hat Enterprise Linux 9.2 Update Services for SAP Solutions Via RHSA-2025:13633 https://access.redhat.com/errata/RHSA-2025:13633
This issue has been addressed in the following products: Red Hat Enterprise Linux 9.2 Update Services for SAP Solutions Via RHSA-2025:13781 https://access.redhat.com/errata/RHSA-2025:13781
This issue has been addressed in the following products: Red Hat Enterprise Linux 9.0 Update Services for SAP Solutions Via RHSA-2025:14054 https://access.redhat.com/errata/RHSA-2025:14054
This issue has been addressed in the following products: Red Hat Enterprise Linux 9.0 Update Services for SAP Solutions Via RHSA-2025:14094 https://access.redhat.com/errata/RHSA-2025:14094