{"schema_version":"1.7.2","id":"OESA-2026-2419","modified":"2026-05-22T13:21:32Z","published":"2026-05-22T13:21:32Z","upstream":["CVE-2026-31393","CVE-2026-31447","CVE-2026-43047","CVE-2026-43048","CVE-2026-43407"],"summary":"kernel security update","details":"The Linux Kernel, the operating system core itself.\r\n\r\nSecurity Fix(es):\n\nIn the Linux kernel, the following vulnerability has been resolved:\n\nBluetooth: L2CAP: Validate L2CAP_INFO_RSP payload length before access\n\nl2cap_information_rsp() checks that cmd_len covers the fixed\nl2cap_info_rsp header (type + result, 4 bytes) but then reads\nrsp-&gt;data without verifying that the payload is present:\n\n - L2CAP_IT_FEAT_MASK calls get_unaligned_le32(rsp-&gt;data), which reads\n   4 bytes past the header (needs cmd_len &gt;= 8).\n\n - L2CAP_IT_FIXED_CHAN reads rsp-&gt;data[0], 1 byte past the header\n   (needs cmd_len &gt;= 5).\n\nA truncated L2CAP_INFO_RSP with result == L2CAP_IR_SUCCESS triggers an\nout-of-bounds read of adjacent skb data.\n\nGuard each data access with the required payload length check.  If the\npayload is too short, skip the read and let the state machine complete\nwith safe defaults (feat_mask and remote_fixed_chan remain zero from\nkzalloc), so the info timer cleanup and l2cap_conn_start() still run\nand the connection is not stalled.(CVE-2026-31393)\n\nIn the Linux kernel, the following vulnerability has been resolved:\n\next4: reject mount if bigalloc with s_first_data_block != 0\n\nbigalloc with s_first_data_block != 0 is not supported, reject mounting\nit.(CVE-2026-31447)\n\nIn the Linux kernel, the following vulnerability has been resolved:\n\nHID: multitouch: Check to ensure report responses match the request\n\nIt is possible for a malicious (or clumsy) device to respond to a\nspecific report&apos;s feature request using a completely different report\nID.  This can cause confusion in the HID core resulting in nasty\nside-effects such as OOB writes.\n\nAdd a check to ensure that the report ID in the response, matches the\none that was requested.  If it doesn&apos;t, omit reporting the raw event and\nreturn early.(CVE-2026-43047)\n\nIn the Linux kernel, the following vulnerability has been resolved:\n\nHID: core: Mitigate potential OOB by removing bogus memset()\n\nThe memset() in hid_report_raw_event() has the good intention of\nclearing out bogus data by zeroing the area from the end of the incoming\ndata string to the assumed end of the buffer.  However, as we have\npreviously seen, doing so can easily result in OOB reads and writes in\nthe subsequent thread of execution.\n\nThe current suggestion from one of the HID maintainers is to remove the\nmemset() and simply return if the incoming event buffer size is not\nlarge enough to fill the associated report.\n\nSuggested-by Benjamin Tissoires &lt;(CVE-2026-43048)\n\nIn the Linux kernel, there is a potential out-of-bounds access vulnerability in the ceph_handle_auth_reply() function of the libceph component. When processing messages of type CEPH_MSG_AUTH_REPLY, the value of the payload_len field is stored in a variable of type int. A value greater than INT_MAX leads to integer overflow and is interpreted as a negative value, which causes the pointer address to be decremented and subsequently accessed because ceph_decode_need() only checks that the memory access does not exceed the end address of the allocation. The vulnerability is fixed by changing the data type of payload_len to u32 and introducing additional sanity checks.(CVE-2026-43407)","affected":[{"package":{"ecosystem":"openEuler:24.03-LTS-SP3","name":"kernel","purl":"pkg:rpm/openEuler/kernel&distro=openEuler-24.03-LTS-SP3"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"6.6.0-145.3.12.142.oe2403sp3"}]}],"ecosystem_specific":{"aarch64":["bpftool-6.6.0-145.3.12.142.oe2403sp3.aarch64.rpm","bpftool-debuginfo-6.6.0-145.3.12.142.oe2403sp3.aarch64.rpm","kernel-6.6.0-145.3.12.142.oe2403sp3.aarch64.rpm","kernel-debuginfo-6.6.0-145.3.12.142.oe2403sp3.aarch64.rpm","kernel-debugsource-6.6.0-145.3.12.142.oe2403sp3.aarch64.rpm","kernel-devel-6.6.0-145.3.12.142.oe2403sp3.aarch64.rpm","kernel-extra-modules-6.6.0-145.3.12.142.oe2403sp3.aarch64.rpm","kernel-headers-6.6.0-145.3.12.142.oe2403sp3.aarch64.rpm","kernel-source-6.6.0-145.3.12.142.oe2403sp3.aarch64.rpm","kernel-tools-6.6.0-145.3.12.142.oe2403sp3.aarch64.rpm","kernel-tools-debuginfo-6.6.0-145.3.12.142.oe2403sp3.aarch64.rpm","kernel-tools-devel-6.6.0-145.3.12.142.oe2403sp3.aarch64.rpm","perf-6.6.0-145.3.12.142.oe2403sp3.aarch64.rpm","perf-debuginfo-6.6.0-145.3.12.142.oe2403sp3.aarch64.rpm","python3-perf-6.6.0-145.3.12.142.oe2403sp3.aarch64.rpm","python3-perf-debuginfo-6.6.0-145.3.12.142.oe2403sp3.aarch64.rpm"],"src":["kernel-6.6.0-145.3.12.142.oe2403sp3.src.rpm"],"x86_64":["bpftool-6.6.0-145.3.12.142.oe2403sp3.x86_64.rpm","bpftool-debuginfo-6.6.0-145.3.12.142.oe2403sp3.x86_64.rpm","kernel-6.6.0-145.3.12.142.oe2403sp3.x86_64.rpm","kernel-debuginfo-6.6.0-145.3.12.142.oe2403sp3.x86_64.rpm","kernel-debugsource-6.6.0-145.3.12.142.oe2403sp3.x86_64.rpm","kernel-devel-6.6.0-145.3.12.142.oe2403sp3.x86_64.rpm","kernel-extra-modules-6.6.0-145.3.12.142.oe2403sp3.x86_64.rpm","kernel-headers-6.6.0-145.3.12.142.oe2403sp3.x86_64.rpm","kernel-source-6.6.0-145.3.12.142.oe2403sp3.x86_64.rpm","kernel-tools-6.6.0-145.3.12.142.oe2403sp3.x86_64.rpm","kernel-tools-debuginfo-6.6.0-145.3.12.142.oe2403sp3.x86_64.rpm","kernel-tools-devel-6.6.0-145.3.12.142.oe2403sp3.x86_64.rpm","perf-6.6.0-145.3.12.142.oe2403sp3.x86_64.rpm","perf-debuginfo-6.6.0-145.3.12.142.oe2403sp3.x86_64.rpm","python3-perf-6.6.0-145.3.12.142.oe2403sp3.x86_64.rpm","python3-perf-debuginfo-6.6.0-145.3.12.142.oe2403sp3.x86_64.rpm"]}}],"references":[{"type":"ADVISORY","url":"https://www.openeuler.org/zh/security/security-bulletins/detail/?id=openEuler-SA-2026-2419"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2026-31393"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2026-31447"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2026-43047"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2026-43048"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2026-43407"}],"database_specific":{"severity":"Critical"}}
