OESA-2026-1865

Source
https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2026-1865
Import Source
https://repo.openeuler.org/security/data/osv/OESA-2026-1865.json
JSON Data
https://api.osv.dev/v1/vulns/OESA-2026-1865
Upstream
Published
2026-04-11T14:04:47Z
Modified
2026-04-11T14:17:44.384978Z
Summary
kernel security update
Details

The Linux Kernel, the operating system core itself.

Security Fix(es):

In the Linux kernel, the following vulnerability has been resolved:

f2fs: fix to detect potential corrupted nid in freenidlist

As reported, on-disk footer.ino and footer.nid is the same and out-of-range, let's add sanity check on f2fsallocnid() to detect any potential corruption in freenidlist.(CVE-2025-68315)

In the Linux kernel, the following vulnerability has been resolved:

ntfs3: Fix uninit buffer allocated by __getname()

Fix uninit errors caused after buffer allocation given to 'de'; by initializing the buffer with zeroes. The fix was found by using KMSAN.(CVE-2025-68727)

Database specific
{
    "severity": "Medium"
}
References

Affected packages

openEuler:24.03-LTS-SP3 / kernel

Package

Name
kernel
Purl
pkg:rpm/openEuler/kernel&distro=openEuler-24.03-LTS-SP3

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
6.6.0-145.0.2.133.oe2403sp3

Ecosystem specific

{
    "src": [
        "kernel-6.6.0-145.0.2.133.oe2403sp3.src.rpm"
    ],
    "x86_64": [
        "bpftool-6.6.0-145.0.2.133.oe2403sp3.x86_64.rpm",
        "bpftool-debuginfo-6.6.0-145.0.2.133.oe2403sp3.x86_64.rpm",
        "kernel-6.6.0-145.0.2.133.oe2403sp3.x86_64.rpm",
        "kernel-debuginfo-6.6.0-145.0.2.133.oe2403sp3.x86_64.rpm",
        "kernel-debugsource-6.6.0-145.0.2.133.oe2403sp3.x86_64.rpm",
        "kernel-devel-6.6.0-145.0.2.133.oe2403sp3.x86_64.rpm",
        "kernel-extra-modules-6.6.0-145.0.2.133.oe2403sp3.x86_64.rpm",
        "kernel-headers-6.6.0-145.0.2.133.oe2403sp3.x86_64.rpm",
        "kernel-source-6.6.0-145.0.2.133.oe2403sp3.x86_64.rpm",
        "kernel-tools-6.6.0-145.0.2.133.oe2403sp3.x86_64.rpm",
        "kernel-tools-debuginfo-6.6.0-145.0.2.133.oe2403sp3.x86_64.rpm",
        "kernel-tools-devel-6.6.0-145.0.2.133.oe2403sp3.x86_64.rpm",
        "perf-6.6.0-145.0.2.133.oe2403sp3.x86_64.rpm",
        "perf-debuginfo-6.6.0-145.0.2.133.oe2403sp3.x86_64.rpm",
        "python3-perf-6.6.0-145.0.2.133.oe2403sp3.x86_64.rpm",
        "python3-perf-debuginfo-6.6.0-145.0.2.133.oe2403sp3.x86_64.rpm"
    ],
    "aarch64": [
        "bpftool-6.6.0-145.0.2.133.oe2403sp3.aarch64.rpm",
        "bpftool-debuginfo-6.6.0-145.0.2.133.oe2403sp3.aarch64.rpm",
        "kernel-6.6.0-145.0.2.133.oe2403sp3.aarch64.rpm",
        "kernel-debuginfo-6.6.0-145.0.2.133.oe2403sp3.aarch64.rpm",
        "kernel-debugsource-6.6.0-145.0.2.133.oe2403sp3.aarch64.rpm",
        "kernel-devel-6.6.0-145.0.2.133.oe2403sp3.aarch64.rpm",
        "kernel-extra-modules-6.6.0-145.0.2.133.oe2403sp3.aarch64.rpm",
        "kernel-headers-6.6.0-145.0.2.133.oe2403sp3.aarch64.rpm",
        "kernel-source-6.6.0-145.0.2.133.oe2403sp3.aarch64.rpm",
        "kernel-tools-6.6.0-145.0.2.133.oe2403sp3.aarch64.rpm",
        "kernel-tools-debuginfo-6.6.0-145.0.2.133.oe2403sp3.aarch64.rpm",
        "kernel-tools-devel-6.6.0-145.0.2.133.oe2403sp3.aarch64.rpm",
        "perf-6.6.0-145.0.2.133.oe2403sp3.aarch64.rpm",
        "perf-debuginfo-6.6.0-145.0.2.133.oe2403sp3.aarch64.rpm",
        "python3-perf-6.6.0-145.0.2.133.oe2403sp3.aarch64.rpm",
        "python3-perf-debuginfo-6.6.0-145.0.2.133.oe2403sp3.aarch64.rpm"
    ]
}

Database specific

source
"https://repo.openeuler.org/security/data/osv/OESA-2026-1865.json"