{"schema_version":"1.7.2","id":"OESA-2025-2852","modified":"2025-12-19T12:09:45Z","published":"2025-12-19T12:09:45Z","upstream":["CVE-2025-22079","CVE-2025-23146","CVE-2025-37839","CVE-2025-40322"],"summary":"kernel security update","details":"The Linux Kernel, the operating system core itself.\r\n\r\nSecurity Fix(es):\n\nIn the Linux kernel, the following vulnerability has been resolved:\n\nocfs2: validate l_tree_depth to avoid out-of-bounds access\n\nThe l_tree_depth field is 16-bit (__le16), but the actual maximum depth is\nlimited to OCFS2_MAX_PATH_DEPTH.\n\nAdd a check to prevent out-of-bounds access if l_tree_depth has an invalid\nvalue, which may occur when reading from a corrupted mounted disk [1].(CVE-2025-22079)\n\nIn the Linux kernel, the following vulnerability has been resolved:\n\nmfd: ene-kb3930: Fix a potential NULL pointer dereference\n\nThe off_gpios could be NULL. Add missing check in the kb3930_probe().\nThis is similar to the issue fixed in commit b1ba8bcb2d1f\n(&quot;backlight: hx8357: Fix potential NULL pointer dereference&quot;).\n\nThis was detected by our static analysis tool.(CVE-2025-23146)\n\nIn the Linux kernel, the following vulnerability has been resolved:\n\njbd2: remove wrong sb-&gt;s_sequence check\n\nJournal emptiness is not determined by sb-&gt;s_sequence == 0 but rather by\nsb-&gt;s_start == 0 (which is set a few lines above). Furthermore 0 is a\nvalid transaction ID so the check can spuriously trigger. Remove the\ninvalid WARN_ON.(CVE-2025-37839)\n\nIn the Linux kernel, bit_putcs_aligned()/unaligned() derived the glyph pointer from the character value masked by 0xff/0x1ff, which may exceed the actual font&apos;s glyph count and read past the end of the built-in font array. Clamp the index to the actual glyph count before computing the address. This fixes a global out-of-bounds read reported by syzbot.(CVE-2025-40322)","affected":[{"package":{"ecosystem":"openEuler:22.03-LTS-SP3","name":"kernel","purl":"pkg:rpm/openEuler/kernel&distro=openEuler-22.03-LTS-SP3"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"5.10.0-295.0.0.197.oe2203sp3"}]}],"ecosystem_specific":{"aarch64":["kernel-5.10.0-295.0.0.197.oe2203sp3.aarch64.rpm","kernel-debuginfo-5.10.0-295.0.0.197.oe2203sp3.aarch64.rpm","kernel-debugsource-5.10.0-295.0.0.197.oe2203sp3.aarch64.rpm","kernel-devel-5.10.0-295.0.0.197.oe2203sp3.aarch64.rpm","kernel-headers-5.10.0-295.0.0.197.oe2203sp3.aarch64.rpm","kernel-source-5.10.0-295.0.0.197.oe2203sp3.aarch64.rpm","kernel-tools-5.10.0-295.0.0.197.oe2203sp3.aarch64.rpm","kernel-tools-debuginfo-5.10.0-295.0.0.197.oe2203sp3.aarch64.rpm","kernel-tools-devel-5.10.0-295.0.0.197.oe2203sp3.aarch64.rpm","perf-5.10.0-295.0.0.197.oe2203sp3.aarch64.rpm","perf-debuginfo-5.10.0-295.0.0.197.oe2203sp3.aarch64.rpm","python3-perf-5.10.0-295.0.0.197.oe2203sp3.aarch64.rpm","python3-perf-debuginfo-5.10.0-295.0.0.197.oe2203sp3.aarch64.rpm"],"src":["kernel-5.10.0-295.0.0.197.oe2203sp3.src.rpm"],"x86_64":["kernel-5.10.0-295.0.0.197.oe2203sp3.x86_64.rpm","kernel-debuginfo-5.10.0-295.0.0.197.oe2203sp3.x86_64.rpm","kernel-debugsource-5.10.0-295.0.0.197.oe2203sp3.x86_64.rpm","kernel-devel-5.10.0-295.0.0.197.oe2203sp3.x86_64.rpm","kernel-headers-5.10.0-295.0.0.197.oe2203sp3.x86_64.rpm","kernel-source-5.10.0-295.0.0.197.oe2203sp3.x86_64.rpm","kernel-tools-5.10.0-295.0.0.197.oe2203sp3.x86_64.rpm","kernel-tools-debuginfo-5.10.0-295.0.0.197.oe2203sp3.x86_64.rpm","kernel-tools-devel-5.10.0-295.0.0.197.oe2203sp3.x86_64.rpm","perf-5.10.0-295.0.0.197.oe2203sp3.x86_64.rpm","perf-debuginfo-5.10.0-295.0.0.197.oe2203sp3.x86_64.rpm","python3-perf-5.10.0-295.0.0.197.oe2203sp3.x86_64.rpm","python3-perf-debuginfo-5.10.0-295.0.0.197.oe2203sp3.x86_64.rpm"]}}],"references":[{"type":"ADVISORY","url":"https://www.openeuler.org/zh/security/security-bulletins/detail/?id=openEuler-SA-2025-2852"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2025-22079"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2025-23146"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2025-37839"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2025-40322"}],"database_specific":{"severity":"High"}}
