{"id":"RLSA-2025:20518","summary":"Moderate: kernel security update","details":"The kernel packages contain the Linux kernel, the core of any Linux operating system.\n\nSecurity Fix(es):\n\n* kernel: can: isotp: fix potential CAN frame reception race in isotp_rcv() (CVE-2022-48830)\n\n* kernel: soc: qcom: cmd-db: Map shared memory as WC, not WB (CVE-2024-46689)\n\n* kernel: Squashfs: sanity check symbolic link size (CVE-2024-46744)\n\n* kernel: vfs: fix race between evice_inodes() and find_inode()&#38;iput() (CVE-2024-47679)\n\n* kernel: x86/tdx: Fix \"in-kernel MMIO\" check (CVE-2024-47727)\n\n* kernel: rxrpc: Fix a race between socket set up and I/O thread creation (CVE-2024-49864)\n\n* kernel: io_uring: check if we need to reschedule during overflow flush (CVE-2024-50060)\n\n* kernel: can: m_can: pci: add missing m_can_class_free_dev() in probe/remove methods (CVE-2022-49024)\n\n* kernel: posix-clock: Fix missing timespec64 check in pc_clock_settime() (CVE-2024-50195)\n\n* kernel: rxrpc: Fix missing locking causing hanging calls (CVE-2024-50294)\n\n* kernel: io_uring/rw: fix missing NOWAIT check for O_DIRECT start write (CVE-2024-53052)\n\n* kernel: afs: Fix lock recursion (CVE-2024-53090)\n\n* kernel: virtio/vsock: Fix accept_queue memory leak (CVE-2024-53119)\n\n* kernel: KVM: VMX: Bury Intel PT virtualization (guest/host mode) behind CONFIG_BROKEN (CVE-2024-53135)\n\n* kernel: xen: Xen hypercall page unsafe against speculative attacks (Xen Security Advisory 466) (CVE-2024-53241)\n\n* kernel: RDMA/rxe: Fix the qp flush warnings in req (CVE-2024-53229)\n\n* kernel: block: fix uaf for flush rq while iterating tags (CVE-2024-53170)\n\n* kernel: nfsd: release svc_expkey/svc_export with rcu_work (CVE-2024-53216)\n\n* kernel: net: af_can: do not leave a dangling sk pointer in can_create() (CVE-2024-56603)\n\n* kernel: blk-cgroup: Fix UAF in blkcg_unpin_online() (CVE-2024-56672)\n\n* kernel: acpi: nfit: vmalloc-out-of-bounds Read in acpi_nfit_ctl (CVE-2024-56662)\n\n* kernel: bpf: Fix UAF via mismatching bpf_prog/attachment RCU flavors (CVE-2024-56675)\n\n* kernel: can: j1939: j1939_session_new(): fix skb reference counting (CVE-2024-56645)\n\n* kernel: crypto: pcrypt - Call crypto layer directly when padata_do_parallel() return -EBUSY (CVE-2024-56690)\n\n* kernel: io_uring: check if iowq is killed before queuing (CVE-2024-56709)\n\n* kernel: rtc: check if __rtc_read_time was successful in rtc_timer_do_work() (CVE-2024-56739)\n\n* kernel: bpf: put bpf_link's program when link is safe to be deallocated (CVE-2024-56786)\n\n* kernel: igb: Fix potential invalid memory access in igb_init_module() (CVE-2024-52332)\n\n* kernel: ipvs: fix UB due to uninitialized stack access in ip_vs_protocol_init() (CVE-2024-53680)\n\n* kernel: netfilter: conntrack: clamp maximum hashtable size to INT_MAX (CVE-2025-21648)\n\n* kernel: sched: sch_cake: add bounds checks to host bulk flow fairness counts (CVE-2025-21647)\n\n* kernel: block, bfq: fix waker_bfqq UAF after bfq_split_bfqq() (CVE-2025-21631)\n\n* kernel: zram: fix potential UAF of zram table (CVE-2025-21671)\n\n* kernel: afs: Fix merge preference rule failure condition (CVE-2025-21672)\n\n* kernel: mm: zswap: properly synchronize freeing resources during CPU hotunplug (CVE-2025-21693)\n\n* kernel: cachestat: fix page cache statistics permission checking (CVE-2025-21691)\n\n* kernel: mm: clear uffd-wp PTE/PMD state on mremap() (CVE-2025-21696)\n\n* kernel: pfifo_tail_enqueue: Drop new packet when sch-\u003elimit == 0 (CVE-2025-21702)\n\n* kernel: usbnet: fix memory leak in error case (CVE-2022-49657)\n\n* kernel: powerpc/xics: fix refcount leak in icp_opal_init() (CVE-2022-49432)\n\n* kernel: net: tun: unlink NAPI from device on destruction (CVE-2022-49672)\n\n* kernel: powerpc/papr_scm: don't requests stats with '0' sized stats buffer (CVE-2022-49353)\n\n* kernel: powerpc/xive: Fix refcount leak in xive_spapr_init (CVE-2022-49437)\n\n* kernel: ima: Fix potential memory leak in ima_init_crypto() (CVE-2022-49627)\n\n* kernel: linux/dim: Fix divide by 0 in RDMA DIM (CVE-2022-49670)\n\n* kernel: can: isotp: sanitize CAN ID checks in isotp_bind() (CVE-2022-49269)\n\n* kernel: ima: Fix a potential integer overflow in ima_appraise_measurement (CVE-2022-49643)\n\n* kernel: powerpc/xive/spapr: correct bitmap allocation size (CVE-2022-49623)\n\n* kernel: efi: Do not import certificates from UEFI Secure Boot for T2 Macs (CVE-2022-49357)\n\n* kernel: list: fix a data-race around ep-\u003erdllist (CVE-2022-49443)\n\n* kernel: tracing/histograms: Fix memory leak problem (CVE-2022-49648)\n\n* kernel: Input: synaptics - fix crash when enabling pass-through port (CVE-2025-21746)\n\n* kernel: NFSD: fix hang in nfsd4_shutdown_callback (CVE-2025-21795)\n\n* kernel: bpf: Send signals asynchronously if !preemptible (CVE-2025-21728)\n\n* kernel: NFS: Fix potential buffer overflowin nfs_sysfs_link_rpc_client() (CVE-2024-54456)\n\n* kernel: Bluetooth: btrtl: check for NULL in btrtl_setup_realtek() (CVE-2024-57987)\n\n* kernel: wifi: brcmsmac: add gain range check to wlc_phy_iqcal_gainparams_nphy() (CVE-2024-58014)\n\n* kernel: Bluetooth: btbcm: Fix NULL deref in btbcm_get_board_name() (CVE-2024-57988)\n\n* kernel: RDMA/mlx5: Fix implicit ODP use after free (CVE-2025-21714)\n\n* kernel: drm/xe/tracing: Fix a potential TP_printk UAF (CVE-2024-49570)\n\n* kernel: HID: hid-thrustmaster: Fix warning in thrustmaster_probe by adding endpoint check (CVE-2024-57993)\n\n* kernel: wifi: rtw89: fix race between cancel_hw_scan and hw_scan completion (CVE-2025-21729)\n\n* kernel: wifi: mt76: mt7925: fix NULL deref check in mt7925_change_vif_links (CVE-2024-57989)\n\n* kernel: wifi: ath12k: Fix for out-of bound access error (CVE-2024-58015)\n\n* kernel: OPP: add index check to assert to avoid buffer overflow in _read_freq() (CVE-2024-57998)\n\n* kernel: wifi: ath12k: fix read pointer after free in ath12k_mac_assign_vif_to_vdev() (CVE-2024-57995)\n\n* kernel: nfsd: clear acl_access/acl_default after releasing them (CVE-2025-21796)\n\n* kernel: scsi: ufs: core: Fix use-after free in init error and remove paths (CVE-2025-21739)\n\n* kernel: workqueue: Put the pwq after detaching the rescuer from the pool (CVE-2025-21786)\n\n* kernel: ata: libata-sff: Ensure that we cannot write outside the allocated buffer (CVE-2025-21738)\n\n* kernel: HID: core: Fix assumption that Resolution Multipliers must be in Logical Collections (CVE-2024-57986)\n\n* kernel: padata: avoid UAF for reorder_work (CVE-2025-21726)\n\n* kernel: vrf: use RCU protection in l3mdev_l3_out() (CVE-2025-21791)\n\n* kernel: team: better TEAM_OPTION_TYPE_STRING validation (CVE-2025-21787)\n\n* kernel: usb: xhci: Fix NULL pointer dereference on certain command aborts (CVE-2024-57981)\n\n* kernel: vxlan: check vxlan_vnigroup_init() return value (CVE-2025-21790)\n\n* kernel: wifi: mt76: mt7925: fix off by one in mt7925_load_clc() (CVE-2024-57990)\n\n* kernel: ipv6: use RCU protection in ip6_default_advmss() (CVE-2025-21765)\n\n* kernel: ASoC: SOF: Intel: hda-dai: Ensure DAI widget is valid during params (CVE-2024-58012)\n\n* kernel: blk-cgroup: Fix class @block_class's subsystem refcount leakage (CVE-2025-21745)\n\n* kernel: net: let net.core.dev_weight always be non-zero (CVE-2025-21806)\n\n* kernel: wifi: rtlwifi: remove unused check_buddy_priv (CVE-2024-58072)\n\n* kernel: OPP: fix dev_pm_opp_find_bw_*() when bandwidth table not initialized (CVE-2024-58068)\n\n* kernel: wifi: iwlwifi: mvm: avoid NULL pointer dereference (CVE-2024-58062)\n\n* kernel: idpf: convert workqueues to unbound (CVE-2024-58057)\n\n* kernel: wifi: mac80211: don't flush non-uploaded STAs (CVE-2025-21828)\n\n* kernel: KVM: Explicitly verify target vCPU is online in kvm_get_vcpu() (CVE-2024-58083)\n\n* kernel: netfilter: nf_tables: reject mismatching sum of field_len with set key length (CVE-2025-21826)\n\n* kernel: ASoC: soc-pcm: don't use soc_pcm_ret() on .prepare callback (CVE-2024-58077)\n\n* kernel: crypto: tegra - do not transfer req when tegra init fails (CVE-2024-58075)\n\n* kernel: RDMA/rxe: Fix the warning \"__rxe_cleanup+0x12c/0x170 [rdma_rxe]\" (CVE-2025-21829)\n\n* kernel: KVM: x86: Load DR6 with guest value only before entering .vcpu_run() loop (CVE-2025-21839)\n\n* kernel: io_uring/uring_cmd: unconditionally copy SQEs at prep time (CVE-2025-21837)\n\n* kernel: information leak via transient execution vulnerability in some AMD processors (CVE-2024-36350)\n\n* kernel: transient execution vulnerability in some AMD processors (CVE-2024-36357)\n\n* kernel: bpf: Fix softlockup in arena_map_free on 64k page kernel (CVE-2025-21851)\n\n* kernel: ibmvnic: Don't reference skb after sending to VIOS (CVE-2025-21855)\n\n* kernel: smb: client: Add check for next_buffer in receive_encrypted_standard() (CVE-2025-21844)\n\n* kernel: bpf: avoid holding freeze_mutex during mmap operation (CVE-2025-21853)\n\n* kernel: ASoC: SOF: stream-ipc: Check for cstream nullity in sof_ipc_msg_data() (CVE-2025-21847)\n\n* kernel: tcp: drop secpath at the same time as we currently drop dst (CVE-2025-21864)\n\n* kernel: bpf: Fix deadlock when freeing cgroup storage (CVE-2024-58088)\n\n* kernel: acct: perform last write from workqueue (CVE-2025-21846)\n\n* kernel: mm/migrate_device: don't add folio to be freed to LRU in migrate_device_finalize() (CVE-2025-21861)\n\n* kernel: io_uring: prevent opcode speculation (CVE-2025-21863)\n\n* kernel: nfp: bpf: Add check for nfp_app_ctrl_msg_alloc() (CVE-2025-21848)\n\n* kernel: netfilter: nft_tunnel: fix geneve_opt type confusion addition (CVE-2025-22056)\n\n* kernel: can: j1939: j1939_send_one(): fix missing CAN header initialization (CVE-2022-49845)\n\n* kernel: usb: typec: ucsi: displayport: Fix NULL pointer access (CVE-2025-37994)\n\n* kernel: wifi: ath12k: fix uaf in ath12k_core_init() (CVE-2025-38116)\n\n* kernel: fs: export anon_inode_make_secure_inode() and fix secretmem LSM bypass (CVE-2025-38396)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n\nAdditional Changes:\n\nFor detailed information on changes in this release, see the Rocky Linux 9 Release Notes linked from the References section.","modified":"2025-11-21T18:48:54.698594Z","published":"2025-11-21T18:13:51.682496Z","upstream":["CVE-2022-48830","CVE-2022-49024","CVE-2022-49269","CVE-2022-49353","CVE-2022-49357","CVE-2022-49432","CVE-2022-49437","CVE-2022-49443","CVE-2022-49623","CVE-2022-49627","CVE-2022-49643","CVE-2022-49648","CVE-2022-49657","CVE-2022-49670","CVE-2022-49672","CVE-2022-49845","CVE-2024-36350","CVE-2024-36357","CVE-2024-46689","CVE-2024-46744","CVE-2024-47679","CVE-2024-47727","CVE-2024-49570","CVE-2024-49864","CVE-2024-50060","CVE-2024-50195","CVE-2024-50294","CVE-2024-52332","CVE-2024-53052","CVE-2024-53090","CVE-2024-53119","CVE-2024-53135","CVE-2024-53170","CVE-2024-53216","CVE-2024-53229","CVE-2024-53241","CVE-2024-53680","CVE-2024-54456","CVE-2024-56603","CVE-2024-56645","CVE-2024-56662","CVE-2024-56672","CVE-2024-56675","CVE-2024-56690","CVE-2024-56709","CVE-2024-56739","CVE-2024-56786","CVE-2024-57981","CVE-2024-57986","CVE-2024-57987","CVE-2024-57988","CVE-2024-57989","CVE-2024-57990","CVE-2024-57993","CVE-2024-57995","CVE-2024-57998","CVE-2024-58012","CVE-2024-58014","CVE-2024-58015","CVE-2024-58057","CVE-2024-58062","CVE-2024-58068","CVE-2024-58072","CVE-2024-58075","CVE-2024-58077","CVE-2024-58083","CVE-2024-58088","CVE-2025-21631","CVE-2025-21647","CVE-2025-21648","CVE-2025-21671","CVE-2025-21672","CVE-2025-21691","CVE-2025-21693","CVE-2025-21696","CVE-2025-21702","CVE-2025-21714","CVE-2025-21726","CVE-2025-21728","CVE-2025-21729","CVE-2025-21738","CVE-2025-21739","CVE-2025-21745","CVE-2025-21746","CVE-2025-21765","CVE-2025-21786","CVE-2025-21787","CVE-2025-21790","CVE-2025-21791","CVE-2025-21795","CVE-2025-21796","CVE-2025-21806","CVE-2025-21826","CVE-2025-21828","CVE-2025-21829","CVE-2025-21837","CVE-2025-21839","CVE-2025-21844","CVE-2025-21846","CVE-2025-21847","CVE-2025-21848","CVE-2025-21851","CVE-2025-21853","CVE-2025-21855","CVE-2025-21861","CVE-2025-21863","CVE-2025-21864","CVE-2025-22056","CVE-2025-37994","CVE-2025-38116","CVE-2025-38396"],"references":[{"type":"ADVISORY","url":"https://errata.rockylinux.org/RLSA-2025:20518"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2298169"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2312077"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2313092"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2320172"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2320259"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2320455"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2320616"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2320722"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2324549"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2327203"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2327374"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2327887"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2329918"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2330341"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2331326"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2334357"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2334396"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2334415"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2334439"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2334537"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2334547"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2334548"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2334560"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2334676"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2334795"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2334829"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2336541"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2337121"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2337124"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2338814"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2338828"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2338832"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2343172"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2343175"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2344684"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2344687"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2345240"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2346272"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2347707"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2347753"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2347759"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2347781"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2347807"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2347859"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2347919"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2347968"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2348022"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2348071"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2348238"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2348240"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2348279"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2348515"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2348523"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2348528"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2348541"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2348543"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2348547"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2348550"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2348554"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2348556"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2348566"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2348573"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2348574"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2348577"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2348578"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2348581"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2348584"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2348585"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2348587"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2348595"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2348597"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2348600"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2348601"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2348615"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2348620"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2348625"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2348634"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2348645"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2348650"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2348654"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2348901"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2350363"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2350367"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2350374"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2350375"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2350386"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2350388"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2350392"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2350396"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2350397"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2350400"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2350585"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2350589"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2350725"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2350726"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2351606"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2351608"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2351612"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2351613"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2351616"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2351618"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2351620"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2351624"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2351625"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2351629"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2351633"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2360215"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2363380"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2369184"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2376076"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2383441"}],"affected":[{"package":{"name":"kernel","ecosystem":"Rocky Linux:9","purl":"pkg:rpm/rocky-linux/kernel?distro=rocky-linux-9&epoch=0"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-611.5.1.el9_7"}],"database_specific":{"yum_repository":"BaseOS"}}],"database_specific":{"source":"https://storage.googleapis.com/resf-osv-data/RLSA-2025:20518.json"}}],"schema_version":"1.7.3","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"}],"credits":[{"name":"Rocky Enterprise Software Foundation"},{"name":"Red Hat"}]}