In the Linux kernel, the following vulnerability has been resolved: selinux: Add boundary check in put_entry() Just like next_entry(), boundary check is necessary to prevent memory out-of-bound access.
Upstream advisory: https://lore.kernel.org/linux-cve-announce/2025061839-CVE-2022-50200-51f0@gregkh/T