{"schema_version": "1.7.0", "id": "RLSA-2026:0453", "modified": "2026-01-17T09:08:43.194673Z", "published": "2026-01-17T09:07:37.776055Z", "upstream": ["CVE-2025-39806", "CVE-2025-39840", "CVE-2025-39843", "CVE-2025-39905", "CVE-2025-39966", "CVE-2025-40176", "CVE-2025-40240", "CVE-2025-40277", "CVE-2025-68287"], "summary": "Important: kernel security update", "details": "The kernel packages contain the Linux kernel, the core of any Linux operating system.\n\nSecurity Fix(es):\n\n* kernel: HID: multitouch: fix slab out-of-bounds access in mt_report_fixup() (CVE-2025-39806)\n\n* kernel: audit: fix out-of-bounds read in audit_compare_dname_path() (CVE-2025-39840)\n\n* kernel: mm: slub: avoid wake up kswapd in set_track_prepare (CVE-2025-39843)\n\n* kernel: net: phylink: add lock for serializing concurrent pl->phydev writes with resolver (CVE-2025-39905)\n\n* kernel: iommufd: Fix race during abort for file descriptors (CVE-2025-39966)\n\n* kernel: tls: wait for pending async decryptions if tls_strp_msg_hold fails (CVE-2025-40176)\n\n* kernel: sctp: avoid NULL dereference when chunk data buffer is missing (CVE-2025-40240)\n\n* kernel: drm/vmwgfx: Validate command header size against SVGA_CMD_MAX_DATASIZE (CVE-2025-40277)\n\n* kernel: usb: dwc3: Fix race condition between concurrent dwc3_remove_requests() call paths (CVE-2025-68287)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.", "severity": [{"type": "CVSS_V3", "score": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"}], "affected": [{"package": {"ecosystem": "Rocky Linux:10", "name": "kernel", "purl": "pkg:rpm/rocky-linux/kernel?distro=rocky-linux-10&epoch=0"}, "ranges": [{"type": "ECOSYSTEM", "events": [{"introduced": "0"}, {"fixed": "0:6.12.0-124.27.1.el10_1"}], "database_specific": {"yum_repository": "BaseOS"}}]}], "references": [{"type": "ADVISORY", "url": "https://errata.rockylinux.org/RLSA-2026:0453"}, {"type": "REPORT", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2396941"}, {"type": "REPORT", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2418832"}, {"type": "REPORT", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2422788"}, {"type": "REPORT", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2419954"}, {"type": "REPORT", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2400611"}, {"type": "REPORT", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2414524"}, {"type": "REPORT", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2396936"}, {"type": "REPORT", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2395807"}, {"type": "REPORT", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2404107"}], "credits": [{"name": "Rocky Enterprise Software Foundation"}, {"name": "Red Hat"}]}