{"id":"OESA-2026-1865","summary":"kernel security update","details":"The Linux Kernel, the operating system core itself.\r\n\r\nSecurity Fix(es):\n\nIn the Linux kernel, the following vulnerability has been resolved:\n\nf2fs: fix to detect potential corrupted nid in free_nid_list\n\nAs reported, on-disk footer.ino and footer.nid is the same and\nout-of-range, let&apos;s add sanity check on f2fs_alloc_nid() to detect\nany potential corruption in free_nid_list.(CVE-2025-68315)\n\nIn the Linux kernel, the following vulnerability has been resolved:\n\nntfs3: Fix uninit buffer allocated by __getname()\n\nFix uninit errors caused after buffer allocation given to &apos;de&apos;; by\ninitializing the buffer with zeroes. The fix was found by using KMSAN.(CVE-2025-68727)","modified":"2026-04-11T14:17:44.384978Z","published":"2026-04-11T14:04:47Z","upstream":["CVE-2025-68315","CVE-2025-68727"],"database_specific":{"severity":"Medium"},"references":[{"type":"ADVISORY","url":"https://www.openeuler.org/zh/security/security-bulletins/detail/?id=openEuler-SA-2026-1865"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2025-68315"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2025-68727"}],"affected":[{"package":{"name":"kernel","ecosystem":"openEuler:24.03-LTS-SP3","purl":"pkg:rpm/openEuler/kernel&distro=openEuler-24.03-LTS-SP3"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"6.6.0-145.0.2.133.oe2403sp3"}]}],"ecosystem_specific":{"aarch64":["bpftool-6.6.0-145.0.2.133.oe2403sp3.aarch64.rpm","bpftool-debuginfo-6.6.0-145.0.2.133.oe2403sp3.aarch64.rpm","kernel-6.6.0-145.0.2.133.oe2403sp3.aarch64.rpm","kernel-debuginfo-6.6.0-145.0.2.133.oe2403sp3.aarch64.rpm","kernel-debugsource-6.6.0-145.0.2.133.oe2403sp3.aarch64.rpm","kernel-devel-6.6.0-145.0.2.133.oe2403sp3.aarch64.rpm","kernel-extra-modules-6.6.0-145.0.2.133.oe2403sp3.aarch64.rpm","kernel-headers-6.6.0-145.0.2.133.oe2403sp3.aarch64.rpm","kernel-source-6.6.0-145.0.2.133.oe2403sp3.aarch64.rpm","kernel-tools-6.6.0-145.0.2.133.oe2403sp3.aarch64.rpm","kernel-tools-debuginfo-6.6.0-145.0.2.133.oe2403sp3.aarch64.rpm","kernel-tools-devel-6.6.0-145.0.2.133.oe2403sp3.aarch64.rpm","perf-6.6.0-145.0.2.133.oe2403sp3.aarch64.rpm","perf-debuginfo-6.6.0-145.0.2.133.oe2403sp3.aarch64.rpm","python3-perf-6.6.0-145.0.2.133.oe2403sp3.aarch64.rpm","python3-perf-debuginfo-6.6.0-145.0.2.133.oe2403sp3.aarch64.rpm"],"src":["kernel-6.6.0-145.0.2.133.oe2403sp3.src.rpm"],"x86_64":["bpftool-6.6.0-145.0.2.133.oe2403sp3.x86_64.rpm","bpftool-debuginfo-6.6.0-145.0.2.133.oe2403sp3.x86_64.rpm","kernel-6.6.0-145.0.2.133.oe2403sp3.x86_64.rpm","kernel-debuginfo-6.6.0-145.0.2.133.oe2403sp3.x86_64.rpm","kernel-debugsource-6.6.0-145.0.2.133.oe2403sp3.x86_64.rpm","kernel-devel-6.6.0-145.0.2.133.oe2403sp3.x86_64.rpm","kernel-extra-modules-6.6.0-145.0.2.133.oe2403sp3.x86_64.rpm","kernel-headers-6.6.0-145.0.2.133.oe2403sp3.x86_64.rpm","kernel-source-6.6.0-145.0.2.133.oe2403sp3.x86_64.rpm","kernel-tools-6.6.0-145.0.2.133.oe2403sp3.x86_64.rpm","kernel-tools-debuginfo-6.6.0-145.0.2.133.oe2403sp3.x86_64.rpm","kernel-tools-devel-6.6.0-145.0.2.133.oe2403sp3.x86_64.rpm","perf-6.6.0-145.0.2.133.oe2403sp3.x86_64.rpm","perf-debuginfo-6.6.0-145.0.2.133.oe2403sp3.x86_64.rpm","python3-perf-6.6.0-145.0.2.133.oe2403sp3.x86_64.rpm","python3-perf-debuginfo-6.6.0-145.0.2.133.oe2403sp3.x86_64.rpm"]},"database_specific":{"source":"https://repo.openeuler.org/security/data/osv/OESA-2026-1865.json"}}],"schema_version":"1.7.5"}