In the Linux kernel, the following vulnerability has been resolved:
ocfs2: validate ltreedepth to avoid out-of-bounds access
The ltreedepth field is 16-bit (_le16), but the actual maximum depth is limited to OCFS2MAXPATHDEPTH.
Add a check to prevent out-of-bounds access if ltreedepth has an invalid value, which may occur when reading from a corrupted mounted disk [1].
{
"cna_assigner": "Linux",
"osv_generated_from": "https://github.com/CVEProject/cvelistV5/tree/main/cves/2025/22xxx/CVE-2025-22079.json"
}[
{
"signature_type": "Function",
"deprecated": false,
"id": "CVE-2025-22079-13610640",
"target": {
"file": "fs/ocfs2/alloc.c",
"function": "__ocfs2_find_path"
},
"digest": {
"length": 1649.0,
"function_hash": "236708372174738400148705342360589646012"
},
"signature_version": "v1",
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@11e24802e73362aa2948ee16b8fb4e32635d5b2a"
},
{
"signature_type": "Line",
"deprecated": false,
"id": "CVE-2025-22079-41f6bb1d",
"target": {
"file": "fs/ocfs2/alloc.c"
},
"digest": {
"threshold": 0.9,
"line_hashes": [
"193484047670209118163677027301455254349",
"128571575757516123493397818114343394600",
"119605533943906763527746606708255512886",
"156062171666452370831431277025324914586"
]
},
"signature_version": "v1",
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@11e24802e73362aa2948ee16b8fb4e32635d5b2a"
}
]
"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2025-22079.json"