{"schema_version":"1.7.2","id":"OESA-2026-1865","modified":"2026-04-11T14:04:47Z","published":"2026-04-11T14:04:47Z","upstream":["CVE-2025-68315","CVE-2025-68727"],"summary":"kernel security update","details":"The Linux Kernel, the operating system core itself.\r\n\r\nSecurity Fix(es):\n\nIn the Linux kernel, the following vulnerability has been resolved:\n\nf2fs: fix to detect potential corrupted nid in free_nid_list\n\nAs reported, on-disk footer.ino and footer.nid is the same and\nout-of-range, let&apos;s add sanity check on f2fs_alloc_nid() to detect\nany potential corruption in free_nid_list.(CVE-2025-68315)\n\nIn the Linux kernel, the following vulnerability has been resolved:\n\nntfs3: Fix uninit buffer allocated by __getname()\n\nFix uninit errors caused after buffer allocation given to &apos;de&apos;; by\ninitializing the buffer with zeroes. The fix was found by using KMSAN.(CVE-2025-68727)","affected":[{"package":{"ecosystem":"openEuler:24.03-LTS-SP3","name":"kernel","purl":"pkg:rpm/openEuler/kernel&distro=openEuler-24.03-LTS-SP3"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"6.6.0-145.0.2.133.oe2403sp3"}]}],"ecosystem_specific":{"aarch64":["bpftool-6.6.0-145.0.2.133.oe2403sp3.aarch64.rpm","bpftool-debuginfo-6.6.0-145.0.2.133.oe2403sp3.aarch64.rpm","kernel-6.6.0-145.0.2.133.oe2403sp3.aarch64.rpm","kernel-debuginfo-6.6.0-145.0.2.133.oe2403sp3.aarch64.rpm","kernel-debugsource-6.6.0-145.0.2.133.oe2403sp3.aarch64.rpm","kernel-devel-6.6.0-145.0.2.133.oe2403sp3.aarch64.rpm","kernel-extra-modules-6.6.0-145.0.2.133.oe2403sp3.aarch64.rpm","kernel-headers-6.6.0-145.0.2.133.oe2403sp3.aarch64.rpm","kernel-source-6.6.0-145.0.2.133.oe2403sp3.aarch64.rpm","kernel-tools-6.6.0-145.0.2.133.oe2403sp3.aarch64.rpm","kernel-tools-debuginfo-6.6.0-145.0.2.133.oe2403sp3.aarch64.rpm","kernel-tools-devel-6.6.0-145.0.2.133.oe2403sp3.aarch64.rpm","perf-6.6.0-145.0.2.133.oe2403sp3.aarch64.rpm","perf-debuginfo-6.6.0-145.0.2.133.oe2403sp3.aarch64.rpm","python3-perf-6.6.0-145.0.2.133.oe2403sp3.aarch64.rpm","python3-perf-debuginfo-6.6.0-145.0.2.133.oe2403sp3.aarch64.rpm"],"src":["kernel-6.6.0-145.0.2.133.oe2403sp3.src.rpm"],"x86_64":["bpftool-6.6.0-145.0.2.133.oe2403sp3.x86_64.rpm","bpftool-debuginfo-6.6.0-145.0.2.133.oe2403sp3.x86_64.rpm","kernel-6.6.0-145.0.2.133.oe2403sp3.x86_64.rpm","kernel-debuginfo-6.6.0-145.0.2.133.oe2403sp3.x86_64.rpm","kernel-debugsource-6.6.0-145.0.2.133.oe2403sp3.x86_64.rpm","kernel-devel-6.6.0-145.0.2.133.oe2403sp3.x86_64.rpm","kernel-extra-modules-6.6.0-145.0.2.133.oe2403sp3.x86_64.rpm","kernel-headers-6.6.0-145.0.2.133.oe2403sp3.x86_64.rpm","kernel-source-6.6.0-145.0.2.133.oe2403sp3.x86_64.rpm","kernel-tools-6.6.0-145.0.2.133.oe2403sp3.x86_64.rpm","kernel-tools-debuginfo-6.6.0-145.0.2.133.oe2403sp3.x86_64.rpm","kernel-tools-devel-6.6.0-145.0.2.133.oe2403sp3.x86_64.rpm","perf-6.6.0-145.0.2.133.oe2403sp3.x86_64.rpm","perf-debuginfo-6.6.0-145.0.2.133.oe2403sp3.x86_64.rpm","python3-perf-6.6.0-145.0.2.133.oe2403sp3.x86_64.rpm","python3-perf-debuginfo-6.6.0-145.0.2.133.oe2403sp3.x86_64.rpm"]}}],"references":[{"type":"ADVISORY","url":"https://www.openeuler.org/zh/security/security-bulletins/detail/?id=openEuler-SA-2026-1865"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2025-68315"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2025-68727"}],"database_specific":{"severity":"Medium"}}
