{
	"document":{
		"aggregate_severity":{
			"namespace":"https://nvd.nist.gov/vuln-metrics/cvss",
			"text":"High"
		},
		"category":"csaf_vex",
		"csaf_version":"2.0",
		"distribution":{
			"tlp":{
				"label":"WHITE",
				"url":"https:/www.first.org/tlp/"
			}
		},
		"lang":"en",
		"notes":[
			{
				"text":"kernel security update",
				"category":"general",
				"title":"Synopsis"
			},
			{
				"text":"An update for kernel is now available for openEuler-24.03-LTS",
				"category":"general",
				"title":"Summary"
			},
			{
				"text":"The Linux Kernel, the operating system core itself.\n\nSecurity Fix(es):\n\nIn the Linux kernel, the following vulnerability has been resolved:\n\nIORING_OP_READ did not correctly consume the provided buffer list when\nread i/o returned < 0 (except for -EAGAIN and -EIOCBQUEUED return).\nThis can lead to a potential use-after-free when the completion via\nio_rw_done runs at separate context.(CVE-2023-52926)\n\nIn the Linux kernel, the following vulnerability has been resolved:\n\nNFS: Fix potential buffer overflowin nfs_sysfs_link_rpc_client()\n\nname is char[64] where the size of clnt->cl_program->name remains\nunknown. Invoking strcat() directly will also lead to potential buffer\noverflow. Change them to strscpy() and strncat() to fix potential\nissues.(CVE-2024-54456)\n\nIn the Linux kernel, the following vulnerability has been resolved:\n\nwifi: mac80211: fix mbss changed flags corruption on 32 bit systems\n\nOn 32-bit systems, the size of an unsigned long is 4 bytes,\nwhile a u64 is 8 bytes. Therefore, when using\nor_each_set_bit(bit, &bits, sizeof(changed) * BITS_PER_BYTE),\nthe code is incorrectly searching for a bit in a 32-bit\nvariable that is expected to be 64 bits in size,\nleading to incorrect bit finding.\n\nSolution: Ensure that the size of the bits variable is correctly\nadjusted for each architecture.\n\n Call Trace:\n  ? show_regs+0x54/0x58\n  ? __warn+0x6b/0xd4\n  ? ieee80211_link_info_change_notify+0xcc/0xd4 [mac80211]\n  ? report_bug+0x113/0x150\n  ? exc_overflow+0x30/0x30\n  ? handle_bug+0x27/0x44\n  ? exc_invalid_op+0x18/0x50\n  ? handle_exception+0xf6/0xf6\n  ? exc_overflow+0x30/0x30\n  ? ieee80211_link_info_change_notify+0xcc/0xd4 [mac80211]\n  ? exc_overflow+0x30/0x30\n  ? ieee80211_link_info_change_notify+0xcc/0xd4 [mac80211]\n  ? ieee80211_mesh_work+0xff/0x260 [mac80211]\n  ? cfg80211_wiphy_work+0x72/0x98 [cfg80211]\n  ? process_one_work+0xf1/0x1fc\n  ? worker_thread+0x2c0/0x3b4\n  ? kthread+0xc7/0xf0\n  ? mod_delayed_work_on+0x4c/0x4c\n  ? kthread_complete_and_exit+0x14/0x14\n  ? ret_from_fork+0x24/0x38\n  ? kthread_complete_and_exit+0x14/0x14\n  ? ret_from_fork_asm+0xf/0x14\n  ? entry_INT80_32+0xf0/0xf0\n\n[restore no-op path for no changes](CVE-2024-57899)\n\nIn the Linux kernel, the following vulnerability has been resolved:\n\nusb: xhci: Fix NULL pointer dereference on certain command aborts\n\nIf a command is queued to the final usable TRB of a ring segment, the\nenqueue pointer is advanced to the subsequent link TRB and no further.\nIf the command is later aborted, when the abort completion is handled\nthe dequeue pointer is advanced to the first TRB of the next segment.\n\nIf no further commands are queued, xhci_handle_stopped_cmd_ring() sees\nthe ring pointers unequal and assumes that there is a pending command,\nso it calls xhci_mod_cmd_timer() which crashes if cur_cmd was NULL.\n\nDon't attempt timer setup if cur_cmd is NULL. The subsequent doorbell\nring likely is unnecessary too, but it's harmless. Leave it alone.\n\nThis is probably Bug 219532, but no confirmation has been received.\n\nThe issue has been independently reproduced and confirmed fixed using\na USB MCU programmed to NAK the Status stage of SET_ADDRESS forever.\nEverything continued working normally after several prevented crashes.(CVE-2024-57981)\n\nIn the Linux kernel, the following vulnerability has been resolved:\n\nocfs2: handle a symlink read error correctly\n\nPatch series \"Convert ocfs2 to use folios\".\n\nMark did a conversion of ocfs2 to use folios and sent it to me as a\ngiant patch for review ;-)\n\nSo I've redone it as individual patches, and credited Mark for the patches\nwhere his code is substantially the same.  It's not a bad way to do it;\nhis patch had some bugs and my patches had some bugs.  Hopefully all our\nbugs were different from each other.  And hopefully Mark likes all the\nchanges I made to his code!\n\n\nThis patch (of 23):\n\nIf we can't read the buffer, be sure to unlock the page before returning.(CVE-2024-58001)\n\nIn the Linux kernel, the following vulnerability has been resolved:\n\nbpf: bpf_local_storage: Always use bpf_mem_alloc in PREEMPT_RT\n\nIn PREEMPT_RT, kmalloc(GFP_ATOMIC) is still not safe in non preemptible\ncontext. bpf_mem_alloc must be used in PREEMPT_RT. This patch is\nto enforce bpf_mem_alloc in the bpf_local_storage when CONFIG_PREEMPT_RT\nis enabled.\n\n[   35.118559] BUG: sleeping function called from invalid context at kernel/locking/spinlock_rt.c:48\n[   35.118566] in_atomic(): 1, irqs_disabled(): 0, non_block: 0, pid: 1832, name: test_progs\n[   35.118569] preempt_count: 1, expected: 0\n[   35.118571] RCU nest depth: 1, expected: 1\n[   35.118577] INFO: lockdep is turned off.\n    ...\n[   35.118647]  __might_resched+0x433/0x5b0\n[   35.118677]  rt_spin_lock+0xc3/0x290\n[   35.118700]  ___slab_alloc+0x72/0xc40\n[   35.118723]  __kmalloc_noprof+0x13f/0x4e0\n[   35.118732]  bpf_map_kzalloc+0xe5/0x220\n[   35.118740]  bpf_selem_alloc+0x1d2/0x7b0\n[   35.118755]  bpf_local_storage_update+0x2fa/0x8b0\n[   35.118784]  bpf_sk_storage_get_tracing+0x15a/0x1d0\n[   35.118791]  bpf_prog_9a118d86fca78ebb_trace_inet_sock_set_state+0x44/0x66\n[   35.118795]  bpf_trace_run3+0x222/0x400\n[   35.118820]  __bpf_trace_inet_sock_set_state+0x11/0x20\n[   35.118824]  trace_inet_sock_set_state+0x112/0x130\n[   35.118830]  inet_sk_state_store+0x41/0x90\n[   35.118836]  tcp_set_state+0x3b3/0x640\n\nThere is no need to adjust the gfp_flags passing to the\nbpf_mem_cache_alloc_flags() which only honors the GFP_KERNEL.\nThe verifier has ensured GFP_KERNEL is passed only in sleepable context.\n\nIt has been an old issue since the first introduction of the\nbpf_local_storage ~5 years ago, so this patch targets the bpf-next.\n\nbpf_mem_alloc is needed to solve it, so the Fixes tag is set\nto the commit when bpf_mem_alloc was first used in the bpf_local_storage.(CVE-2024-58070)\n\nIn the Linux kernel, the following vulnerability has been resolved:\n\nwifi: rtw89: fix race between cancel_hw_scan and hw_scan completion\n\nThe rtwdev->scanning flag isn't protected by mutex originally, so\ncancel_hw_scan can pass the condition, but suddenly hw_scan completion\nunset the flag and calls ieee80211_scan_completed() that will free\nlocal->hw_scan_req. Then, cancel_hw_scan raises null-ptr-deref and\nuse-after-free. Fix it by moving the check condition to where\nprotected by mutex.\n\n KASAN: null-ptr-deref in range [0x0000000000000088-0x000000000000008f]\n CPU: 2 PID: 6922 Comm: kworker/2:2 Tainted: G           OE\n Hardware name: LENOVO 2356AD1/2356AD1, BIOS G7ETB6WW (2.76 ) 09/10/2019\n Workqueue: events cfg80211_conn_work [cfg80211]\n RIP: 0010:rtw89_fw_h2c_scan_offload_be+0xc33/0x13c3 [rtw89_core]\n Code: 00 45 89 6c 24 1c 0f 85 23 01 00 00 48 8b 85 20 ff ff ff 48 8d\n RSP: 0018:ffff88811fd9f068 EFLAGS: 00010206\n RAX: dffffc0000000000 RBX: ffff88811fd9f258 RCX: 0000000000000001\n RDX: 0000000000000011 RSI: 0000000000000001 RDI: 0000000000000089\n RBP: ffff88811fd9f170 R08: 0000000000000000 R09: 0000000000000000\n R10: ffff88811fd9f108 R11: 0000000000000000 R12: ffff88810e47f960\n R13: 0000000000000000 R14: 000000000000ffff R15: 0000000000000000\n FS:  0000000000000000(0000) GS:ffff8881d6f00000(0000) knlGS:0000000000000000\n CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033\n CR2: 00007531dfca55b0 CR3: 00000001be296004 CR4: 00000000001706e0\n Call Trace:\n  <TASK>\n  ? show_regs+0x61/0x73\n  ? __die_body+0x20/0x73\n  ? die_addr+0x4f/0x7b\n  ? exc_general_protection+0x191/0x1db\n  ? asm_exc_general_protection+0x27/0x30\n  ? rtw89_fw_h2c_scan_offload_be+0xc33/0x13c3 [rtw89_core]\n  ? rtw89_fw_h2c_scan_offload_be+0x458/0x13c3 [rtw89_core]\n  ? __pfx_rtw89_fw_h2c_scan_offload_be+0x10/0x10 [rtw89_core]\n  ? do_raw_spin_lock+0x75/0xdb\n  ? __pfx_do_raw_spin_lock+0x10/0x10\n  rtw89_hw_scan_offload+0xb5e/0xbf7 [rtw89_core]\n  ? _raw_spin_unlock+0xe/0x24\n  ? __mutex_lock.constprop.0+0x40c/0x471\n  ? __pfx_rtw89_hw_scan_offload+0x10/0x10 [rtw89_core]\n  ? __mutex_lock_slowpath+0x13/0x1f\n  ? mutex_lock+0xa2/0xdc\n  ? __pfx_mutex_lock+0x10/0x10\n  rtw89_hw_scan_abort+0x58/0xb7 [rtw89_core]\n  rtw89_ops_cancel_hw_scan+0x120/0x13b [rtw89_core]\n  ieee80211_scan_cancel+0x468/0x4d0 [mac80211]\n  ieee80211_prep_connection+0x858/0x899 [mac80211]\n  ieee80211_mgd_auth+0xbea/0xdde [mac80211]\n  ? __pfx_ieee80211_mgd_auth+0x10/0x10 [mac80211]\n  ? cfg80211_find_elem+0x15/0x29 [cfg80211]\n  ? is_bss+0x1b7/0x1d7 [cfg80211]\n  ieee80211_auth+0x18/0x27 [mac80211]\n  cfg80211_mlme_auth+0x3bb/0x3e7 [cfg80211]\n  cfg80211_conn_do_work+0x410/0xb81 [cfg80211]\n  ? __pfx_cfg80211_conn_do_work+0x10/0x10 [cfg80211]\n  ? __kasan_check_read+0x11/0x1f\n  ? psi_group_change+0x8bc/0x944\n  ? __kasan_check_write+0x14/0x22\n  ? mutex_lock+0x8e/0xdc\n  ? __pfx_mutex_lock+0x10/0x10\n  ? __pfx___radix_tree_lookup+0x10/0x10\n  cfg80211_conn_work+0x245/0x34d [cfg80211]\n  ? __pfx_cfg80211_conn_work+0x10/0x10 [cfg80211]\n  ? update_cfs_rq_load_avg+0x3bc/0x3d7\n  ? sched_clock_noinstr+0x9/0x1a\n  ? sched_clock+0x10/0x24\n  ? sched_clock_cpu+0x7e/0x42e\n  ? newidle_balance+0x796/0x937\n  ? __pfx_sched_clock_cpu+0x10/0x10\n  ? __pfx_newidle_balance+0x10/0x10\n  ? __kasan_check_read+0x11/0x1f\n  ? psi_group_change+0x8bc/0x944\n  ? _raw_spin_unlock+0xe/0x24\n  ? raw_spin_rq_unlock+0x47/0x54\n  ? raw_spin_rq_unlock_irq+0x9/0x1f\n  ? finish_task_switch.isra.0+0x347/0x586\n  ? __schedule+0x27bf/0x2892\n  ? mutex_unlock+0x80/0xd0\n  ? do_raw_spin_lock+0x75/0xdb\n  ? __pfx___schedule+0x10/0x10\n  process_scheduled_works+0x58c/0x821\n  worker_thread+0x4c7/0x586\n  ? __kasan_check_read+0x11/0x1f\n  kthread+0x285/0x294\n  ? __pfx_worker_thread+0x10/0x10\n  ? __pfx_kthread+0x10/0x10\n  ret_from_fork+0x29/0x6f\n  ? __pfx_kthread+0x10/0x10\n  ret_from_fork_asm+0x1b/0x30\n  </TASK>(CVE-2025-21729)\n\nIn the Linux kernel, the following vulnerability has been resolved:\n\nRDMA/mlx5: Fix a race for an ODP MR which leads to CQE with error\n\nThis patch addresses a race condition for an ODP MR that can result in a\nCQE with an error on the UMR QP.\n\nDuring the __mlx5_ib_dereg_mr() flow, the following sequence of calls\noccurs:\n\nmlx5_revoke_mr()\n mlx5r_umr_revoke_mr()\n mlx5r_umr_post_send_wait()\n\nAt this point, the lkey is freed from the hardware's perspective.\n\nHowever, concurrently, mlx5_ib_invalidate_range() might be triggered by\nanother task attempting to invalidate a range for the same freed lkey.\n\nThis task will:\n - Acquire the umem_odp->umem_mutex lock.\n - Call mlx5r_umr_update_xlt() on the UMR QP.\n - Since the lkey has already been freed, this can lead to a CQE error,\n   causing the UMR QP to enter an error state [1].\n\nTo resolve this race condition, the umem_odp->umem_mutex lock is now also\nacquired as part of the mlx5_revoke_mr() scope.  Upon successful revoke,\nwe set umem_odp->private which points to that MR to NULL, preventing any\nfurther invalidation attempts on its lkey.\n\n[1] From dmesg:\n\n   infiniband rocep8s0f0: dump_cqe:277:(pid 0): WC error: 6, Message: memory bind operation error\n   cqe_dump: 00000000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00\n   cqe_dump: 00000010: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00\n   cqe_dump: 00000020: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00\n   cqe_dump: 00000030: 00 00 00 00 08 00 78 06 25 00 11 b9 00 0e dd d2\n\n   WARNING: CPU: 15 PID: 1506 at drivers/infiniband/hw/mlx5/umr.c:394 mlx5r_umr_post_send_wait+0x15a/0x2b0 [mlx5_ib]\n   Modules linked in: ip6table_mangle ip6table_natip6table_filter ip6_tables iptable_mangle xt_conntrack xt_MASQUERADE nf_conntrack_netlink nfnetlink xt_addrtype iptable_nat nf_nat br_netfilter rpcsec_gss_krb5 auth_rpcgss oid_registry overlay rpcrdma rdma_ucm ib_iser libiscsi scsi_transport_iscsi rdma_cm iw_cm ib_umad ib_ipoib ib_cm mlx5_ib ib_uverbs ib_core fuse mlx5_core\n   CPU: 15 UID: 0 PID: 1506 Comm: ibv_rc_pingpong Not tainted 6.12.0-rc7+ #1626\n   Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS rel-1.13.0-0-gf21b5a4aeb02-prebuilt.qemu.org 04/01/2014\n   RIP: 0010:mlx5r_umr_post_send_wait+0x15a/0x2b0 [mlx5_ib]\n   [..]\n   Call Trace:\n   <TASK>\n   mlx5r_umr_update_xlt+0x23c/0x3e0 [mlx5_ib]\n   mlx5_ib_invalidate_range+0x2e1/0x330 [mlx5_ib]\n   __mmu_notifier_invalidate_range_start+0x1e1/0x240\n   zap_page_range_single+0xf1/0x1a0\n   madvise_vma_behavior+0x677/0x6e0\n   do_madvise+0x1a2/0x4b0\n   __x64_sys_madvise+0x25/0x30\n   do_syscall_64+0x6b/0x140\n   entry_SYSCALL_64_after_hwframe+0x76/0x7e(CVE-2025-21732)\n\nIn the Linux kernel, the following vulnerability has been resolved:\n\nnilfs2: fix possible int overflows in nilfs_fiemap()\n\nSince nilfs_bmap_lookup_contig() in nilfs_fiemap() calculates its result\nby being prepared to go through potentially maxblocks == INT_MAX blocks,\nthe value in n may experience an overflow caused by left shift of blkbits.\n\nWhile it is extremely unlikely to occur, play it safe and cast right hand\nexpression to wider type to mitigate the issue.\n\nFound by Linux Verification Center (linuxtesting.org) with static analysis\ntool SVACE.(CVE-2025-21736)\n\nIn the Linux kernel, the following vulnerability has been resolved:\n\nusbnet: ipheth: fix possible overflow in DPE length check\n\nOriginally, it was possible for the DPE length check to overflow if\nwDatagramIndex + wDatagramLength > U16_MAX. This could lead to an OoB\nread.\n\nMove the wDatagramIndex term to the other side of the inequality.\n\nAn existing condition ensures that wDatagramIndex < urb->actual_length.(CVE-2025-21743)\n\nIn the Linux kernel, the following vulnerability has been resolved:\n\nclocksource: Use migrate_disable() to avoid calling get_random_u32() in atomic context\n\nThe following bug report happened with a PREEMPT_RT kernel:\n\n  BUG: sleeping function called from invalid context at kernel/locking/spinlock_rt.c:48\n  in_atomic(): 1, irqs_disabled(): 0, non_block: 0, pid: 2012, name: kwatchdog\n  preempt_count: 1, expected: 0\n  RCU nest depth: 0, expected: 0\n  get_random_u32+0x4f/0x110\n  clocksource_verify_choose_cpus+0xab/0x1a0\n  clocksource_verify_percpu.part.0+0x6b/0x330\n  clocksource_watchdog_kthread+0x193/0x1a0\n\nIt is due to the fact that clocksource_verify_choose_cpus() is invoked with\npreemption disabled.  This function invokes get_random_u32() to obtain\nrandom numbers for choosing CPUs.  The batched_entropy_32 local lock and/or\nthe base_crng.lock spinlock in driver/char/random.c will be acquired during\nthe call. In PREEMPT_RT kernel, they are both sleeping locks and so cannot\nbe acquired in atomic context.\n\nFix this problem by using migrate_disable() to allow smp_processor_id() to\nbe reliably used without introducing atomic context. preempt_disable() is\nthen called after clocksource_verify_choose_cpus() but before the\nclocksource measurement is being run to avoid introducing unexpected\nlatency.(CVE-2025-21767)\n\nIn the Linux kernel, the following vulnerability has been resolved:\n\nUSB: hub: Ignore non-compliant devices with too many configs or interfaces\n\nRobert Morris created a test program which can cause\nusb_hub_to_struct_hub() to dereference a NULL or inappropriate\npointer:\n\nOops: general protection fault, probably for non-canonical address\n0xcccccccccccccccc: 0000 [#1] SMP DEBUG_PAGEALLOC PTI\nCPU: 7 UID: 0 PID: 117 Comm: kworker/7:1 Not tainted 6.13.0-rc3-00017-gf44d154d6e3d #14\nHardware name: FreeBSD BHYVE/BHYVE, BIOS 14.0 10/17/2021\nWorkqueue: usb_hub_wq hub_event\nRIP: 0010:usb_hub_adjust_deviceremovable+0x78/0x110\n...\nCall Trace:\n <TASK>\n ? die_addr+0x31/0x80\n ? exc_general_protection+0x1b4/0x3c0\n ? asm_exc_general_protection+0x26/0x30\n ? usb_hub_adjust_deviceremovable+0x78/0x110\n hub_probe+0x7c7/0xab0\n usb_probe_interface+0x14b/0x350\n really_probe+0xd0/0x2d0\n ? __pfx___device_attach_driver+0x10/0x10\n __driver_probe_device+0x6e/0x110\n driver_probe_device+0x1a/0x90\n __device_attach_driver+0x7e/0xc0\n bus_for_each_drv+0x7f/0xd0\n __device_attach+0xaa/0x1a0\n bus_probe_device+0x8b/0xa0\n device_add+0x62e/0x810\n usb_set_configuration+0x65d/0x990\n usb_generic_driver_probe+0x4b/0x70\n usb_probe_device+0x36/0xd0\n\nThe cause of this error is that the device has two interfaces, and the\nhub driver binds to interface 1 instead of interface 0, which is where\nusb_hub_to_struct_hub() looks.\n\nWe can prevent the problem from occurring by refusing to accept hub\ndevices that violate the USB spec by having more than one\nconfiguration or interface.(CVE-2025-21776)\n\nIn the Linux kernel, the following vulnerability has been resolved:\n\norangefs: fix a oob in orangefs_debug_write\n\nI got a syzbot report: slab-out-of-bounds Read in\norangefs_debug_write... several people suggested fixes,\nI tested Al Viro's suggestion and made this patch.(CVE-2025-21782)\n\nIn the Linux kernel, the following vulnerability has been resolved:\n\ngpiolib: Fix crash on error in gpiochip_get_ngpios()\n\nThe gpiochip_get_ngpios() uses chip_*() macros to print messages.\nHowever these macros rely on gpiodev to be initialised and set,\nwhich is not the case when called via bgpio_init(). In such a case\nthe printing messages will crash on NULL pointer dereference.\nReplace chip_*() macros by the respective dev_*() ones to avoid\nsuch crash.(CVE-2025-21783)\n\nIn the Linux kernel, the following vulnerability has been resolved:\n\nLoongArch: csum: Fix OoB access in IP checksum code for negative lengths\n\nCommit 69e3a6aa6be2 (\"LoongArch: Add checksum optimization for 64-bit\nsystem\") would cause an undefined shift and an out-of-bounds read.\n\nCommit 8bd795fedb84 (\"arm64: csum: Fix OoB access in IP checksum code\nfor negative lengths\") fixes the same issue on ARM64.(CVE-2025-21789)\n\nIn the Linux kernel, the following vulnerability has been resolved:\n\nNFSD: fix hang in nfsd4_shutdown_callback\n\nIf nfs4_client is in courtesy state then there is no point to send\nthe callback. This causes nfsd4_shutdown_callback to hang since\ncl_cb_inflight is not 0. This hang lasts about 15 minutes until TCP\nnotifies NFSD that the connection was dropped.\n\nThis patch modifies nfsd4_run_cb_work to skip the RPC call if\nnfs4_client is in courtesy state.(CVE-2025-21795)\n\nIn the Linux kernel, the following vulnerability has been resolved:\n\nnfsd: clear acl_access/acl_default after releasing them\n\nIf getting acl_default fails, acl_access and acl_default will be released\nsimultaneously. However, acl_access will still retain a pointer pointing\nto the released posix_acl, which will trigger a WARNING in\nnfs3svc_release_getacl like this:\n\n------------[ cut here ]------------\nrefcount_t: underflow; use-after-free.\nWARNING: CPU: 26 PID: 3199 at lib/refcount.c:28\nrefcount_warn_saturate+0xb5/0x170\nModules linked in:\nCPU: 26 UID: 0 PID: 3199 Comm: nfsd Not tainted\n6.12.0-rc6-00079-g04ae226af01f-dirty #8\nHardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS\n1.16.1-2.fc37 04/01/2014\nRIP: 0010:refcount_warn_saturate+0xb5/0x170\nCode: cc cc 0f b6 1d b3 20 a5 03 80 fb 01 0f 87 65 48 d8 00 83 e3 01 75\ne4 48 c7 c7 c0 3b 9b 85 c6 05 97 20 a5 03 01 e8 fb 3e 30 ff <0f> 0b eb\ncd 0f b6 1d 8a3\nRSP: 0018:ffffc90008637cd8 EFLAGS: 00010282\nRAX: 0000000000000000 RBX: 0000000000000000 RCX: ffffffff83904fde\nRDX: dffffc0000000000 RSI: 0000000000000008 RDI: ffff88871ed36380\nRBP: ffff888158beeb40 R08: 0000000000000001 R09: fffff520010c6f56\nR10: ffffc90008637ab7 R11: 0000000000000001 R12: 0000000000000001\nR13: ffff888140e77400 R14: ffff888140e77408 R15: ffffffff858b42c0\nFS:  0000000000000000(0000) GS:ffff88871ed00000(0000)\nknlGS:0000000000000000\nCS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033\nCR2: 0000562384d32158 CR3: 000000055cc6a000 CR4: 00000000000006f0\nDR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000\nDR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400\nCall Trace:\n <TASK>\n ? refcount_warn_saturate+0xb5/0x170\n ? __warn+0xa5/0x140\n ? refcount_warn_saturate+0xb5/0x170\n ? report_bug+0x1b1/0x1e0\n ? handle_bug+0x53/0xa0\n ? exc_invalid_op+0x17/0x40\n ? asm_exc_invalid_op+0x1a/0x20\n ? tick_nohz_tick_stopped+0x1e/0x40\n ? refcount_warn_saturate+0xb5/0x170\n ? refcount_warn_saturate+0xb5/0x170\n nfs3svc_release_getacl+0xc9/0xe0\n svc_process_common+0x5db/0xb60\n ? __pfx_svc_process_common+0x10/0x10\n ? __rcu_read_unlock+0x69/0xa0\n ? __pfx_nfsd_dispatch+0x10/0x10\n ? svc_xprt_received+0xa1/0x120\n ? xdr_init_decode+0x11d/0x190\n svc_process+0x2a7/0x330\n svc_handle_xprt+0x69d/0x940\n svc_recv+0x180/0x2d0\n nfsd+0x168/0x200\n ? __pfx_nfsd+0x10/0x10\n kthread+0x1a2/0x1e0\n ? kthread+0xf4/0x1e0\n ? __pfx_kthread+0x10/0x10\n ret_from_fork+0x34/0x60\n ? __pfx_kthread+0x10/0x10\n ret_from_fork_asm+0x1a/0x30\n </TASK>\nKernel panic - not syncing: kernel: panic_on_warn set ...\n\nClear acl_access/acl_default after posix_acl_release is called to prevent\nUAF from being triggered.(CVE-2025-21796)\n\nIn the Linux kernel, the following vulnerability has been resolved:\n\nptp: Ensure info->enable callback is always set\n\nThe ioctl and sysfs handlers unconditionally call the ->enable callback.\nNot all drivers implement that callback, leading to NULL dereferences.\nExample of affected drivers: ptp_s390.c, ptp_vclock.c and ptp_mock.c.\n\nInstead use a dummy callback if no better was specified by the driver.(CVE-2025-21814)\n\nIn the Linux kernel, the following vulnerability has been resolved:\n\nblock: mark GFP_NOIO around sysfs ->store()\n\nsysfs ->store is called with queue freezed, meantime we have several\n->store() callbacks(update_nr_requests, wbt, scheduler) to allocate\nmemory with GFP_KERNEL which may run into direct reclaim code path,\nthen potential deadlock can be caused.\n\nFix the issue by marking NOIO around sysfs ->store()(CVE-2025-21817)",
				"category":"general",
				"title":"Description"
			},
			{
				"text":"An update for kernel is now available for openEuler-20.03-LTS-SP4/openEuler-22.03-LTS-SP3/openEuler-22.03-LTS-SP4/openEuler-24.03-LTS.\n\nopenEuler Security has rated this update as having a security impact of high. A Common Vunlnerability Scoring System(CVSS)base score,which gives a detailed severity rating, is available for each vulnerability from the CVElink(s) in the References section.",
				"category":"general",
				"title":"Topic"
			},
			{
				"text":"High",
				"category":"general",
				"title":"Severity"
			},
			{
				"text":"kernel",
				"category":"general",
				"title":"Affected Component"
			}
		],
		"publisher":{
			"issuing_authority":"openEuler security committee",
			"name":"openEuler",
			"namespace":"https://www.openeuler.org",
			"contact_details":"openeuler-security@openeuler.org",
			"category":"vendor"
		},
		"references":[
			{
				"summary":"openEuler-SA-2025-1285",
				"category":"self",
				"url":"https://www.openeuler.org/zh/security/security-bulletins/detail/?id=openEuler-SA-2025-1285"
			},
			{
				"summary":"CVE-2023-52926",
				"category":"self",
				"url":"https://www.openeuler.org/en/security/cve/detail/?cveId=CVE-2023-52926&packageName=kernel"
			},
			{
				"summary":"CVE-2024-54456",
				"category":"self",
				"url":"https://www.openeuler.org/en/security/cve/detail/?cveId=CVE-2024-54456&packageName=kernel"
			},
			{
				"summary":"CVE-2024-57899",
				"category":"self",
				"url":"https://www.openeuler.org/en/security/cve/detail/?cveId=CVE-2024-57899&packageName=kernel"
			},
			{
				"summary":"CVE-2024-57981",
				"category":"self",
				"url":"https://www.openeuler.org/en/security/cve/detail/?cveId=CVE-2024-57981&packageName=kernel"
			},
			{
				"summary":"CVE-2024-58001",
				"category":"self",
				"url":"https://www.openeuler.org/en/security/cve/detail/?cveId=CVE-2024-58001&packageName=kernel"
			},
			{
				"summary":"CVE-2024-58070",
				"category":"self",
				"url":"https://www.openeuler.org/en/security/cve/detail/?cveId=CVE-2024-58070&packageName=kernel"
			},
			{
				"summary":"CVE-2025-21729",
				"category":"self",
				"url":"https://www.openeuler.org/en/security/cve/detail/?cveId=CVE-2025-21729&packageName=kernel"
			},
			{
				"summary":"CVE-2025-21732",
				"category":"self",
				"url":"https://www.openeuler.org/en/security/cve/detail/?cveId=CVE-2025-21732&packageName=kernel"
			},
			{
				"summary":"CVE-2025-21736",
				"category":"self",
				"url":"https://www.openeuler.org/en/security/cve/detail/?cveId=CVE-2025-21736&packageName=kernel"
			},
			{
				"summary":"CVE-2025-21743",
				"category":"self",
				"url":"https://www.openeuler.org/en/security/cve/detail/?cveId=CVE-2025-21743&packageName=kernel"
			},
			{
				"summary":"CVE-2025-21767",
				"category":"self",
				"url":"https://www.openeuler.org/en/security/cve/detail/?cveId=CVE-2025-21767&packageName=kernel"
			},
			{
				"summary":"CVE-2025-21776",
				"category":"self",
				"url":"https://www.openeuler.org/en/security/cve/detail/?cveId=CVE-2025-21776&packageName=kernel"
			},
			{
				"summary":"CVE-2025-21782",
				"category":"self",
				"url":"https://www.openeuler.org/en/security/cve/detail/?cveId=CVE-2025-21782&packageName=kernel"
			},
			{
				"summary":"CVE-2025-21783",
				"category":"self",
				"url":"https://www.openeuler.org/en/security/cve/detail/?cveId=CVE-2025-21783&packageName=kernel"
			},
			{
				"summary":"CVE-2025-21789",
				"category":"self",
				"url":"https://www.openeuler.org/en/security/cve/detail/?cveId=CVE-2025-21789&packageName=kernel"
			},
			{
				"summary":"CVE-2025-21795",
				"category":"self",
				"url":"https://www.openeuler.org/en/security/cve/detail/?cveId=CVE-2025-21795&packageName=kernel"
			},
			{
				"summary":"CVE-2025-21796",
				"category":"self",
				"url":"https://www.openeuler.org/en/security/cve/detail/?cveId=CVE-2025-21796&packageName=kernel"
			},
			{
				"summary":"CVE-2025-21814",
				"category":"self",
				"url":"https://www.openeuler.org/en/security/cve/detail/?cveId=CVE-2025-21814&packageName=kernel"
			},
			{
				"summary":"CVE-2025-21817",
				"category":"self",
				"url":"https://www.openeuler.org/en/security/cve/detail/?cveId=CVE-2025-21817&packageName=kernel"
			},
			{
				"summary":"nvd cve",
				"category":"external",
				"url":"https://nvd.nist.gov/vuln/detail/CVE-2023-52926"
			},
			{
				"summary":"nvd cve",
				"category":"external",
				"url":"https://nvd.nist.gov/vuln/detail/CVE-2024-54456"
			},
			{
				"summary":"nvd cve",
				"category":"external",
				"url":"https://nvd.nist.gov/vuln/detail/CVE-2024-57899"
			},
			{
				"summary":"nvd cve",
				"category":"external",
				"url":"https://nvd.nist.gov/vuln/detail/CVE-2024-57981"
			},
			{
				"summary":"nvd cve",
				"category":"external",
				"url":"https://nvd.nist.gov/vuln/detail/CVE-2024-58001"
			},
			{
				"summary":"nvd cve",
				"category":"external",
				"url":"https://nvd.nist.gov/vuln/detail/CVE-2024-58070"
			},
			{
				"summary":"nvd cve",
				"category":"external",
				"url":"https://nvd.nist.gov/vuln/detail/CVE-2025-21729"
			},
			{
				"summary":"nvd cve",
				"category":"external",
				"url":"https://nvd.nist.gov/vuln/detail/CVE-2025-21732"
			},
			{
				"summary":"nvd cve",
				"category":"external",
				"url":"https://nvd.nist.gov/vuln/detail/CVE-2025-21736"
			},
			{
				"summary":"nvd cve",
				"category":"external",
				"url":"https://nvd.nist.gov/vuln/detail/CVE-2025-21743"
			},
			{
				"summary":"nvd cve",
				"category":"external",
				"url":"https://nvd.nist.gov/vuln/detail/CVE-2025-21767"
			},
			{
				"summary":"nvd cve",
				"category":"external",
				"url":"https://nvd.nist.gov/vuln/detail/CVE-2025-21776"
			},
			{
				"summary":"nvd cve",
				"category":"external",
				"url":"https://nvd.nist.gov/vuln/detail/CVE-2025-21782"
			},
			{
				"summary":"nvd cve",
				"category":"external",
				"url":"https://nvd.nist.gov/vuln/detail/CVE-2025-21783"
			},
			{
				"summary":"nvd cve",
				"category":"external",
				"url":"https://nvd.nist.gov/vuln/detail/CVE-2025-21789"
			},
			{
				"summary":"nvd cve",
				"category":"external",
				"url":"https://nvd.nist.gov/vuln/detail/CVE-2025-21795"
			},
			{
				"summary":"nvd cve",
				"category":"external",
				"url":"https://nvd.nist.gov/vuln/detail/CVE-2025-21796"
			},
			{
				"summary":"nvd cve",
				"category":"external",
				"url":"https://nvd.nist.gov/vuln/detail/CVE-2025-21814"
			},
			{
				"summary":"nvd cve",
				"category":"external",
				"url":"https://nvd.nist.gov/vuln/detail/CVE-2025-21817"
			},
			{
				"summary":"openEuler-SA-2025-1285 vex file",
				"category":"self",
				"url":"https://repo.openeuler.org/security/data/csaf/advisories/2025/csaf-openeuler-sa-2025-1285.json"
			}
		],
		"title":"An update for kernel is now available for openEuler-24.03-LTS",
		"tracking":{
			"initial_release_date":"2025-03-14T23:37:30+08:00",
			"revision_history":[
				{
					"date":"2025-03-14T23:37:30+08:00",
					"summary":"Initial",
					"number":"1.0.0"
				}
			],
			"generator":{
				"date":"2025-03-14T23:37:30+08:00",
				"engine":{
					"name":"openEuler CSAF Tool V1.0"
				}
			},
			"current_release_date":"2025-03-14T23:37:30+08:00",
			"id":"openEuler-SA-2025-1285",
			"version":"1.0.0",
			"status":"final"
		}
	},
	"product_tree":{
		"branches":[
			{
				"name":"openEuler",
				"category":"vendor",
				"branches":[
					{
						"name":"openEuler",
						"branches":[
							{
								"product":{
									"product_identification_helper":{
										"cpe":"cpe:/a:openEuler:openEuler:24.03-LTS"
									},
									"product_id":"openEuler-24.03-LTS",
									"name":"openEuler-24.03-LTS"
								},
								"name":"openEuler-24.03-LTS",
								"category":"product_version"
							}
						],
						"category":"product_name"
					},
					{
						"name":"aarch64",
						"branches":[
							{
								"product":{
									"product_identification_helper":{
										"cpe":"cpe:/a:openEuler:openEuler:24.03-LTS"
									},
									"product_id":"bpftool-6.6.0-82.0.0.75.oe2403.aarch64.rpm",
									"name":"bpftool-6.6.0-82.0.0.75.oe2403.aarch64.rpm"
								},
								"name":"bpftool-6.6.0-82.0.0.75.oe2403.aarch64.rpm",
								"category":"product_version"
							},
							{
								"product":{
									"product_identification_helper":{
										"cpe":"cpe:/a:openEuler:openEuler:24.03-LTS"
									},
									"product_id":"bpftool-debuginfo-6.6.0-82.0.0.75.oe2403.aarch64.rpm",
									"name":"bpftool-debuginfo-6.6.0-82.0.0.75.oe2403.aarch64.rpm"
								},
								"name":"bpftool-debuginfo-6.6.0-82.0.0.75.oe2403.aarch64.rpm",
								"category":"product_version"
							},
							{
								"product":{
									"product_identification_helper":{
										"cpe":"cpe:/a:openEuler:openEuler:24.03-LTS"
									},
									"product_id":"kernel-6.6.0-82.0.0.75.oe2403.aarch64.rpm",
									"name":"kernel-6.6.0-82.0.0.75.oe2403.aarch64.rpm"
								},
								"name":"kernel-6.6.0-82.0.0.75.oe2403.aarch64.rpm",
								"category":"product_version"
							},
							{
								"product":{
									"product_identification_helper":{
										"cpe":"cpe:/a:openEuler:openEuler:24.03-LTS"
									},
									"product_id":"kernel-debuginfo-6.6.0-82.0.0.75.oe2403.aarch64.rpm",
									"name":"kernel-debuginfo-6.6.0-82.0.0.75.oe2403.aarch64.rpm"
								},
								"name":"kernel-debuginfo-6.6.0-82.0.0.75.oe2403.aarch64.rpm",
								"category":"product_version"
							},
							{
								"product":{
									"product_identification_helper":{
										"cpe":"cpe:/a:openEuler:openEuler:24.03-LTS"
									},
									"product_id":"kernel-debugsource-6.6.0-82.0.0.75.oe2403.aarch64.rpm",
									"name":"kernel-debugsource-6.6.0-82.0.0.75.oe2403.aarch64.rpm"
								},
								"name":"kernel-debugsource-6.6.0-82.0.0.75.oe2403.aarch64.rpm",
								"category":"product_version"
							},
							{
								"product":{
									"product_identification_helper":{
										"cpe":"cpe:/a:openEuler:openEuler:24.03-LTS"
									},
									"product_id":"kernel-devel-6.6.0-82.0.0.75.oe2403.aarch64.rpm",
									"name":"kernel-devel-6.6.0-82.0.0.75.oe2403.aarch64.rpm"
								},
								"name":"kernel-devel-6.6.0-82.0.0.75.oe2403.aarch64.rpm",
								"category":"product_version"
							},
							{
								"product":{
									"product_identification_helper":{
										"cpe":"cpe:/a:openEuler:openEuler:24.03-LTS"
									},
									"product_id":"kernel-headers-6.6.0-82.0.0.75.oe2403.aarch64.rpm",
									"name":"kernel-headers-6.6.0-82.0.0.75.oe2403.aarch64.rpm"
								},
								"name":"kernel-headers-6.6.0-82.0.0.75.oe2403.aarch64.rpm",
								"category":"product_version"
							},
							{
								"product":{
									"product_identification_helper":{
										"cpe":"cpe:/a:openEuler:openEuler:24.03-LTS"
									},
									"product_id":"kernel-source-6.6.0-82.0.0.75.oe2403.aarch64.rpm",
									"name":"kernel-source-6.6.0-82.0.0.75.oe2403.aarch64.rpm"
								},
								"name":"kernel-source-6.6.0-82.0.0.75.oe2403.aarch64.rpm",
								"category":"product_version"
							},
							{
								"product":{
									"product_identification_helper":{
										"cpe":"cpe:/a:openEuler:openEuler:24.03-LTS"
									},
									"product_id":"kernel-tools-6.6.0-82.0.0.75.oe2403.aarch64.rpm",
									"name":"kernel-tools-6.6.0-82.0.0.75.oe2403.aarch64.rpm"
								},
								"name":"kernel-tools-6.6.0-82.0.0.75.oe2403.aarch64.rpm",
								"category":"product_version"
							},
							{
								"product":{
									"product_identification_helper":{
										"cpe":"cpe:/a:openEuler:openEuler:24.03-LTS"
									},
									"product_id":"kernel-tools-debuginfo-6.6.0-82.0.0.75.oe2403.aarch64.rpm",
									"name":"kernel-tools-debuginfo-6.6.0-82.0.0.75.oe2403.aarch64.rpm"
								},
								"name":"kernel-tools-debuginfo-6.6.0-82.0.0.75.oe2403.aarch64.rpm",
								"category":"product_version"
							},
							{
								"product":{
									"product_identification_helper":{
										"cpe":"cpe:/a:openEuler:openEuler:24.03-LTS"
									},
									"product_id":"kernel-tools-devel-6.6.0-82.0.0.75.oe2403.aarch64.rpm",
									"name":"kernel-tools-devel-6.6.0-82.0.0.75.oe2403.aarch64.rpm"
								},
								"name":"kernel-tools-devel-6.6.0-82.0.0.75.oe2403.aarch64.rpm",
								"category":"product_version"
							},
							{
								"product":{
									"product_identification_helper":{
										"cpe":"cpe:/a:openEuler:openEuler:24.03-LTS"
									},
									"product_id":"perf-6.6.0-82.0.0.75.oe2403.aarch64.rpm",
									"name":"perf-6.6.0-82.0.0.75.oe2403.aarch64.rpm"
								},
								"name":"perf-6.6.0-82.0.0.75.oe2403.aarch64.rpm",
								"category":"product_version"
							},
							{
								"product":{
									"product_identification_helper":{
										"cpe":"cpe:/a:openEuler:openEuler:24.03-LTS"
									},
									"product_id":"perf-debuginfo-6.6.0-82.0.0.75.oe2403.aarch64.rpm",
									"name":"perf-debuginfo-6.6.0-82.0.0.75.oe2403.aarch64.rpm"
								},
								"name":"perf-debuginfo-6.6.0-82.0.0.75.oe2403.aarch64.rpm",
								"category":"product_version"
							},
							{
								"product":{
									"product_identification_helper":{
										"cpe":"cpe:/a:openEuler:openEuler:24.03-LTS"
									},
									"product_id":"python3-perf-6.6.0-82.0.0.75.oe2403.aarch64.rpm",
									"name":"python3-perf-6.6.0-82.0.0.75.oe2403.aarch64.rpm"
								},
								"name":"python3-perf-6.6.0-82.0.0.75.oe2403.aarch64.rpm",
								"category":"product_version"
							},
							{
								"product":{
									"product_identification_helper":{
										"cpe":"cpe:/a:openEuler:openEuler:24.03-LTS"
									},
									"product_id":"python3-perf-debuginfo-6.6.0-82.0.0.75.oe2403.aarch64.rpm",
									"name":"python3-perf-debuginfo-6.6.0-82.0.0.75.oe2403.aarch64.rpm"
								},
								"name":"python3-perf-debuginfo-6.6.0-82.0.0.75.oe2403.aarch64.rpm",
								"category":"product_version"
							}
						],
						"category":"architecture"
					},
					{
						"name":"x86_64",
						"branches":[
							{
								"product":{
									"product_identification_helper":{
										"cpe":"cpe:/a:openEuler:openEuler:24.03-LTS"
									},
									"product_id":"bpftool-6.6.0-82.0.0.75.oe2403.x86_64.rpm",
									"name":"bpftool-6.6.0-82.0.0.75.oe2403.x86_64.rpm"
								},
								"name":"bpftool-6.6.0-82.0.0.75.oe2403.x86_64.rpm",
								"category":"product_version"
							},
							{
								"product":{
									"product_identification_helper":{
										"cpe":"cpe:/a:openEuler:openEuler:24.03-LTS"
									},
									"product_id":"bpftool-debuginfo-6.6.0-82.0.0.75.oe2403.x86_64.rpm",
									"name":"bpftool-debuginfo-6.6.0-82.0.0.75.oe2403.x86_64.rpm"
								},
								"name":"bpftool-debuginfo-6.6.0-82.0.0.75.oe2403.x86_64.rpm",
								"category":"product_version"
							},
							{
								"product":{
									"product_identification_helper":{
										"cpe":"cpe:/a:openEuler:openEuler:24.03-LTS"
									},
									"product_id":"kernel-6.6.0-82.0.0.75.oe2403.x86_64.rpm",
									"name":"kernel-6.6.0-82.0.0.75.oe2403.x86_64.rpm"
								},
								"name":"kernel-6.6.0-82.0.0.75.oe2403.x86_64.rpm",
								"category":"product_version"
							},
							{
								"product":{
									"product_identification_helper":{
										"cpe":"cpe:/a:openEuler:openEuler:24.03-LTS"
									},
									"product_id":"kernel-debuginfo-6.6.0-82.0.0.75.oe2403.x86_64.rpm",
									"name":"kernel-debuginfo-6.6.0-82.0.0.75.oe2403.x86_64.rpm"
								},
								"name":"kernel-debuginfo-6.6.0-82.0.0.75.oe2403.x86_64.rpm",
								"category":"product_version"
							},
							{
								"product":{
									"product_identification_helper":{
										"cpe":"cpe:/a:openEuler:openEuler:24.03-LTS"
									},
									"product_id":"kernel-debugsource-6.6.0-82.0.0.75.oe2403.x86_64.rpm",
									"name":"kernel-debugsource-6.6.0-82.0.0.75.oe2403.x86_64.rpm"
								},
								"name":"kernel-debugsource-6.6.0-82.0.0.75.oe2403.x86_64.rpm",
								"category":"product_version"
							},
							{
								"product":{
									"product_identification_helper":{
										"cpe":"cpe:/a:openEuler:openEuler:24.03-LTS"
									},
									"product_id":"kernel-devel-6.6.0-82.0.0.75.oe2403.x86_64.rpm",
									"name":"kernel-devel-6.6.0-82.0.0.75.oe2403.x86_64.rpm"
								},
								"name":"kernel-devel-6.6.0-82.0.0.75.oe2403.x86_64.rpm",
								"category":"product_version"
							},
							{
								"product":{
									"product_identification_helper":{
										"cpe":"cpe:/a:openEuler:openEuler:24.03-LTS"
									},
									"product_id":"kernel-headers-6.6.0-82.0.0.75.oe2403.x86_64.rpm",
									"name":"kernel-headers-6.6.0-82.0.0.75.oe2403.x86_64.rpm"
								},
								"name":"kernel-headers-6.6.0-82.0.0.75.oe2403.x86_64.rpm",
								"category":"product_version"
							},
							{
								"product":{
									"product_identification_helper":{
										"cpe":"cpe:/a:openEuler:openEuler:24.03-LTS"
									},
									"product_id":"kernel-source-6.6.0-82.0.0.75.oe2403.x86_64.rpm",
									"name":"kernel-source-6.6.0-82.0.0.75.oe2403.x86_64.rpm"
								},
								"name":"kernel-source-6.6.0-82.0.0.75.oe2403.x86_64.rpm",
								"category":"product_version"
							},
							{
								"product":{
									"product_identification_helper":{
										"cpe":"cpe:/a:openEuler:openEuler:24.03-LTS"
									},
									"product_id":"kernel-tools-6.6.0-82.0.0.75.oe2403.x86_64.rpm",
									"name":"kernel-tools-6.6.0-82.0.0.75.oe2403.x86_64.rpm"
								},
								"name":"kernel-tools-6.6.0-82.0.0.75.oe2403.x86_64.rpm",
								"category":"product_version"
							},
							{
								"product":{
									"product_identification_helper":{
										"cpe":"cpe:/a:openEuler:openEuler:24.03-LTS"
									},
									"product_id":"kernel-tools-debuginfo-6.6.0-82.0.0.75.oe2403.x86_64.rpm",
									"name":"kernel-tools-debuginfo-6.6.0-82.0.0.75.oe2403.x86_64.rpm"
								},
								"name":"kernel-tools-debuginfo-6.6.0-82.0.0.75.oe2403.x86_64.rpm",
								"category":"product_version"
							},
							{
								"product":{
									"product_identification_helper":{
										"cpe":"cpe:/a:openEuler:openEuler:24.03-LTS"
									},
									"product_id":"kernel-tools-devel-6.6.0-82.0.0.75.oe2403.x86_64.rpm",
									"name":"kernel-tools-devel-6.6.0-82.0.0.75.oe2403.x86_64.rpm"
								},
								"name":"kernel-tools-devel-6.6.0-82.0.0.75.oe2403.x86_64.rpm",
								"category":"product_version"
							},
							{
								"product":{
									"product_identification_helper":{
										"cpe":"cpe:/a:openEuler:openEuler:24.03-LTS"
									},
									"product_id":"perf-6.6.0-82.0.0.75.oe2403.x86_64.rpm",
									"name":"perf-6.6.0-82.0.0.75.oe2403.x86_64.rpm"
								},
								"name":"perf-6.6.0-82.0.0.75.oe2403.x86_64.rpm",
								"category":"product_version"
							},
							{
								"product":{
									"product_identification_helper":{
										"cpe":"cpe:/a:openEuler:openEuler:24.03-LTS"
									},
									"product_id":"perf-debuginfo-6.6.0-82.0.0.75.oe2403.x86_64.rpm",
									"name":"perf-debuginfo-6.6.0-82.0.0.75.oe2403.x86_64.rpm"
								},
								"name":"perf-debuginfo-6.6.0-82.0.0.75.oe2403.x86_64.rpm",
								"category":"product_version"
							},
							{
								"product":{
									"product_identification_helper":{
										"cpe":"cpe:/a:openEuler:openEuler:24.03-LTS"
									},
									"product_id":"python3-perf-6.6.0-82.0.0.75.oe2403.x86_64.rpm",
									"name":"python3-perf-6.6.0-82.0.0.75.oe2403.x86_64.rpm"
								},
								"name":"python3-perf-6.6.0-82.0.0.75.oe2403.x86_64.rpm",
								"category":"product_version"
							},
							{
								"product":{
									"product_identification_helper":{
										"cpe":"cpe:/a:openEuler:openEuler:24.03-LTS"
									},
									"product_id":"python3-perf-debuginfo-6.6.0-82.0.0.75.oe2403.x86_64.rpm",
									"name":"python3-perf-debuginfo-6.6.0-82.0.0.75.oe2403.x86_64.rpm"
								},
								"name":"python3-perf-debuginfo-6.6.0-82.0.0.75.oe2403.x86_64.rpm",
								"category":"product_version"
							}
						],
						"category":"architecture"
					},
					{
						"name":"src",
						"branches":[
							{
								"product":{
									"product_identification_helper":{
										"cpe":"cpe:/a:openEuler:openEuler:24.03-LTS"
									},
									"product_id":"kernel-6.6.0-82.0.0.75.oe2403.src.rpm",
									"name":"kernel-6.6.0-82.0.0.75.oe2403.src.rpm"
								},
								"name":"kernel-6.6.0-82.0.0.75.oe2403.src.rpm",
								"category":"product_version"
							}
						],
						"category":"architecture"
					}
				]
			}
		],
		"relationships":[
			{
				"relates_to_product_reference":"openEuler-24.03-LTS",
				"product_reference":"bpftool-6.6.0-82.0.0.75.oe2403.aarch64.rpm",
				"full_product_name":{
					"product_id":"openEuler-24.03-LTS:bpftool-6.6.0-82.0.0.75.oe2403.aarch64",
					"name":"bpftool-6.6.0-82.0.0.75.oe2403.aarch64 as a component of openEuler-24.03-LTS"
				},
				"category":"default_component_of"
			},
			{
				"relates_to_product_reference":"openEuler-24.03-LTS",
				"product_reference":"bpftool-debuginfo-6.6.0-82.0.0.75.oe2403.aarch64.rpm",
				"full_product_name":{
					"product_id":"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-82.0.0.75.oe2403.aarch64",
					"name":"bpftool-debuginfo-6.6.0-82.0.0.75.oe2403.aarch64 as a component of openEuler-24.03-LTS"
				},
				"category":"default_component_of"
			},
			{
				"relates_to_product_reference":"openEuler-24.03-LTS",
				"product_reference":"kernel-6.6.0-82.0.0.75.oe2403.aarch64.rpm",
				"full_product_name":{
					"product_id":"openEuler-24.03-LTS:kernel-6.6.0-82.0.0.75.oe2403.aarch64",
					"name":"kernel-6.6.0-82.0.0.75.oe2403.aarch64 as a component of openEuler-24.03-LTS"
				},
				"category":"default_component_of"
			},
			{
				"relates_to_product_reference":"openEuler-24.03-LTS",
				"product_reference":"kernel-debuginfo-6.6.0-82.0.0.75.oe2403.aarch64.rpm",
				"full_product_name":{
					"product_id":"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-82.0.0.75.oe2403.aarch64",
					"name":"kernel-debuginfo-6.6.0-82.0.0.75.oe2403.aarch64 as a component of openEuler-24.03-LTS"
				},
				"category":"default_component_of"
			},
			{
				"relates_to_product_reference":"openEuler-24.03-LTS",
				"product_reference":"kernel-debugsource-6.6.0-82.0.0.75.oe2403.aarch64.rpm",
				"full_product_name":{
					"product_id":"openEuler-24.03-LTS:kernel-debugsource-6.6.0-82.0.0.75.oe2403.aarch64",
					"name":"kernel-debugsource-6.6.0-82.0.0.75.oe2403.aarch64 as a component of openEuler-24.03-LTS"
				},
				"category":"default_component_of"
			},
			{
				"relates_to_product_reference":"openEuler-24.03-LTS",
				"product_reference":"kernel-devel-6.6.0-82.0.0.75.oe2403.aarch64.rpm",
				"full_product_name":{
					"product_id":"openEuler-24.03-LTS:kernel-devel-6.6.0-82.0.0.75.oe2403.aarch64",
					"name":"kernel-devel-6.6.0-82.0.0.75.oe2403.aarch64 as a component of openEuler-24.03-LTS"
				},
				"category":"default_component_of"
			},
			{
				"relates_to_product_reference":"openEuler-24.03-LTS",
				"product_reference":"kernel-headers-6.6.0-82.0.0.75.oe2403.aarch64.rpm",
				"full_product_name":{
					"product_id":"openEuler-24.03-LTS:kernel-headers-6.6.0-82.0.0.75.oe2403.aarch64",
					"name":"kernel-headers-6.6.0-82.0.0.75.oe2403.aarch64 as a component of openEuler-24.03-LTS"
				},
				"category":"default_component_of"
			},
			{
				"relates_to_product_reference":"openEuler-24.03-LTS",
				"product_reference":"kernel-source-6.6.0-82.0.0.75.oe2403.aarch64.rpm",
				"full_product_name":{
					"product_id":"openEuler-24.03-LTS:kernel-source-6.6.0-82.0.0.75.oe2403.aarch64",
					"name":"kernel-source-6.6.0-82.0.0.75.oe2403.aarch64 as a component of openEuler-24.03-LTS"
				},
				"category":"default_component_of"
			},
			{
				"relates_to_product_reference":"openEuler-24.03-LTS",
				"product_reference":"kernel-tools-6.6.0-82.0.0.75.oe2403.aarch64.rpm",
				"full_product_name":{
					"product_id":"openEuler-24.03-LTS:kernel-tools-6.6.0-82.0.0.75.oe2403.aarch64",
					"name":"kernel-tools-6.6.0-82.0.0.75.oe2403.aarch64 as a component of openEuler-24.03-LTS"
				},
				"category":"default_component_of"
			},
			{
				"relates_to_product_reference":"openEuler-24.03-LTS",
				"product_reference":"kernel-tools-debuginfo-6.6.0-82.0.0.75.oe2403.aarch64.rpm",
				"full_product_name":{
					"product_id":"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-82.0.0.75.oe2403.aarch64",
					"name":"kernel-tools-debuginfo-6.6.0-82.0.0.75.oe2403.aarch64 as a component of openEuler-24.03-LTS"
				},
				"category":"default_component_of"
			},
			{
				"relates_to_product_reference":"openEuler-24.03-LTS",
				"product_reference":"kernel-tools-devel-6.6.0-82.0.0.75.oe2403.aarch64.rpm",
				"full_product_name":{
					"product_id":"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-82.0.0.75.oe2403.aarch64",
					"name":"kernel-tools-devel-6.6.0-82.0.0.75.oe2403.aarch64 as a component of openEuler-24.03-LTS"
				},
				"category":"default_component_of"
			},
			{
				"relates_to_product_reference":"openEuler-24.03-LTS",
				"product_reference":"perf-6.6.0-82.0.0.75.oe2403.aarch64.rpm",
				"full_product_name":{
					"product_id":"openEuler-24.03-LTS:perf-6.6.0-82.0.0.75.oe2403.aarch64",
					"name":"perf-6.6.0-82.0.0.75.oe2403.aarch64 as a component of openEuler-24.03-LTS"
				},
				"category":"default_component_of"
			},
			{
				"relates_to_product_reference":"openEuler-24.03-LTS",
				"product_reference":"perf-debuginfo-6.6.0-82.0.0.75.oe2403.aarch64.rpm",
				"full_product_name":{
					"product_id":"openEuler-24.03-LTS:perf-debuginfo-6.6.0-82.0.0.75.oe2403.aarch64",
					"name":"perf-debuginfo-6.6.0-82.0.0.75.oe2403.aarch64 as a component of openEuler-24.03-LTS"
				},
				"category":"default_component_of"
			},
			{
				"relates_to_product_reference":"openEuler-24.03-LTS",
				"product_reference":"python3-perf-6.6.0-82.0.0.75.oe2403.aarch64.rpm",
				"full_product_name":{
					"product_id":"openEuler-24.03-LTS:python3-perf-6.6.0-82.0.0.75.oe2403.aarch64",
					"name":"python3-perf-6.6.0-82.0.0.75.oe2403.aarch64 as a component of openEuler-24.03-LTS"
				},
				"category":"default_component_of"
			},
			{
				"relates_to_product_reference":"openEuler-24.03-LTS",
				"product_reference":"python3-perf-debuginfo-6.6.0-82.0.0.75.oe2403.aarch64.rpm",
				"full_product_name":{
					"product_id":"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-82.0.0.75.oe2403.aarch64",
					"name":"python3-perf-debuginfo-6.6.0-82.0.0.75.oe2403.aarch64 as a component of openEuler-24.03-LTS"
				},
				"category":"default_component_of"
			},
			{
				"relates_to_product_reference":"openEuler-24.03-LTS",
				"product_reference":"bpftool-6.6.0-82.0.0.75.oe2403.x86_64.rpm",
				"full_product_name":{
					"product_id":"openEuler-24.03-LTS:bpftool-6.6.0-82.0.0.75.oe2403.x86_64",
					"name":"bpftool-6.6.0-82.0.0.75.oe2403.x86_64 as a component of openEuler-24.03-LTS"
				},
				"category":"default_component_of"
			},
			{
				"relates_to_product_reference":"openEuler-24.03-LTS",
				"product_reference":"bpftool-debuginfo-6.6.0-82.0.0.75.oe2403.x86_64.rpm",
				"full_product_name":{
					"product_id":"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-82.0.0.75.oe2403.x86_64",
					"name":"bpftool-debuginfo-6.6.0-82.0.0.75.oe2403.x86_64 as a component of openEuler-24.03-LTS"
				},
				"category":"default_component_of"
			},
			{
				"relates_to_product_reference":"openEuler-24.03-LTS",
				"product_reference":"kernel-6.6.0-82.0.0.75.oe2403.x86_64.rpm",
				"full_product_name":{
					"product_id":"openEuler-24.03-LTS:kernel-6.6.0-82.0.0.75.oe2403.x86_64",
					"name":"kernel-6.6.0-82.0.0.75.oe2403.x86_64 as a component of openEuler-24.03-LTS"
				},
				"category":"default_component_of"
			},
			{
				"relates_to_product_reference":"openEuler-24.03-LTS",
				"product_reference":"kernel-debuginfo-6.6.0-82.0.0.75.oe2403.x86_64.rpm",
				"full_product_name":{
					"product_id":"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-82.0.0.75.oe2403.x86_64",
					"name":"kernel-debuginfo-6.6.0-82.0.0.75.oe2403.x86_64 as a component of openEuler-24.03-LTS"
				},
				"category":"default_component_of"
			},
			{
				"relates_to_product_reference":"openEuler-24.03-LTS",
				"product_reference":"kernel-debugsource-6.6.0-82.0.0.75.oe2403.x86_64.rpm",
				"full_product_name":{
					"product_id":"openEuler-24.03-LTS:kernel-debugsource-6.6.0-82.0.0.75.oe2403.x86_64",
					"name":"kernel-debugsource-6.6.0-82.0.0.75.oe2403.x86_64 as a component of openEuler-24.03-LTS"
				},
				"category":"default_component_of"
			},
			{
				"relates_to_product_reference":"openEuler-24.03-LTS",
				"product_reference":"kernel-devel-6.6.0-82.0.0.75.oe2403.x86_64.rpm",
				"full_product_name":{
					"product_id":"openEuler-24.03-LTS:kernel-devel-6.6.0-82.0.0.75.oe2403.x86_64",
					"name":"kernel-devel-6.6.0-82.0.0.75.oe2403.x86_64 as a component of openEuler-24.03-LTS"
				},
				"category":"default_component_of"
			},
			{
				"relates_to_product_reference":"openEuler-24.03-LTS",
				"product_reference":"kernel-headers-6.6.0-82.0.0.75.oe2403.x86_64.rpm",
				"full_product_name":{
					"product_id":"openEuler-24.03-LTS:kernel-headers-6.6.0-82.0.0.75.oe2403.x86_64",
					"name":"kernel-headers-6.6.0-82.0.0.75.oe2403.x86_64 as a component of openEuler-24.03-LTS"
				},
				"category":"default_component_of"
			},
			{
				"relates_to_product_reference":"openEuler-24.03-LTS",
				"product_reference":"kernel-source-6.6.0-82.0.0.75.oe2403.x86_64.rpm",
				"full_product_name":{
					"product_id":"openEuler-24.03-LTS:kernel-source-6.6.0-82.0.0.75.oe2403.x86_64",
					"name":"kernel-source-6.6.0-82.0.0.75.oe2403.x86_64 as a component of openEuler-24.03-LTS"
				},
				"category":"default_component_of"
			},
			{
				"relates_to_product_reference":"openEuler-24.03-LTS",
				"product_reference":"kernel-tools-6.6.0-82.0.0.75.oe2403.x86_64.rpm",
				"full_product_name":{
					"product_id":"openEuler-24.03-LTS:kernel-tools-6.6.0-82.0.0.75.oe2403.x86_64",
					"name":"kernel-tools-6.6.0-82.0.0.75.oe2403.x86_64 as a component of openEuler-24.03-LTS"
				},
				"category":"default_component_of"
			},
			{
				"relates_to_product_reference":"openEuler-24.03-LTS",
				"product_reference":"kernel-tools-debuginfo-6.6.0-82.0.0.75.oe2403.x86_64.rpm",
				"full_product_name":{
					"product_id":"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-82.0.0.75.oe2403.x86_64",
					"name":"kernel-tools-debuginfo-6.6.0-82.0.0.75.oe2403.x86_64 as a component of openEuler-24.03-LTS"
				},
				"category":"default_component_of"
			},
			{
				"relates_to_product_reference":"openEuler-24.03-LTS",
				"product_reference":"kernel-tools-devel-6.6.0-82.0.0.75.oe2403.x86_64.rpm",
				"full_product_name":{
					"product_id":"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-82.0.0.75.oe2403.x86_64",
					"name":"kernel-tools-devel-6.6.0-82.0.0.75.oe2403.x86_64 as a component of openEuler-24.03-LTS"
				},
				"category":"default_component_of"
			},
			{
				"relates_to_product_reference":"openEuler-24.03-LTS",
				"product_reference":"perf-6.6.0-82.0.0.75.oe2403.x86_64.rpm",
				"full_product_name":{
					"product_id":"openEuler-24.03-LTS:perf-6.6.0-82.0.0.75.oe2403.x86_64",
					"name":"perf-6.6.0-82.0.0.75.oe2403.x86_64 as a component of openEuler-24.03-LTS"
				},
				"category":"default_component_of"
			},
			{
				"relates_to_product_reference":"openEuler-24.03-LTS",
				"product_reference":"perf-debuginfo-6.6.0-82.0.0.75.oe2403.x86_64.rpm",
				"full_product_name":{
					"product_id":"openEuler-24.03-LTS:perf-debuginfo-6.6.0-82.0.0.75.oe2403.x86_64",
					"name":"perf-debuginfo-6.6.0-82.0.0.75.oe2403.x86_64 as a component of openEuler-24.03-LTS"
				},
				"category":"default_component_of"
			},
			{
				"relates_to_product_reference":"openEuler-24.03-LTS",
				"product_reference":"python3-perf-6.6.0-82.0.0.75.oe2403.x86_64.rpm",
				"full_product_name":{
					"product_id":"openEuler-24.03-LTS:python3-perf-6.6.0-82.0.0.75.oe2403.x86_64",
					"name":"python3-perf-6.6.0-82.0.0.75.oe2403.x86_64 as a component of openEuler-24.03-LTS"
				},
				"category":"default_component_of"
			},
			{
				"relates_to_product_reference":"openEuler-24.03-LTS",
				"product_reference":"python3-perf-debuginfo-6.6.0-82.0.0.75.oe2403.x86_64.rpm",
				"full_product_name":{
					"product_id":"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-82.0.0.75.oe2403.x86_64",
					"name":"python3-perf-debuginfo-6.6.0-82.0.0.75.oe2403.x86_64 as a component of openEuler-24.03-LTS"
				},
				"category":"default_component_of"
			},
			{
				"relates_to_product_reference":"openEuler-24.03-LTS",
				"product_reference":"kernel-6.6.0-82.0.0.75.oe2403.src.rpm",
				"full_product_name":{
					"product_id":"openEuler-24.03-LTS:kernel-6.6.0-82.0.0.75.oe2403.src",
					"name":"kernel-6.6.0-82.0.0.75.oe2403.src as a component of openEuler-24.03-LTS"
				},
				"category":"default_component_of"
			}
		]
	},
	"vulnerabilities":[
		{
			"cve":"CVE-2023-52926",
			"notes":[
				{
					"text":"In the Linux kernel, the following vulnerability has been resolved:\n\nIORING_OP_READ did not correctly consume the provided buffer list when\nread i/o returned < 0 (except for -EAGAIN and -EIOCBQUEUED return).\nThis can lead to a potential use-after-free when the completion via\nio_rw_done runs at separate context.",
					"category":"description",
					"title":"Vulnerability Description"
				}
			],
			"product_status":{
				"fixed":[
					"openEuler-24.03-LTS:bpftool-6.6.0-82.0.0.75.oe2403.aarch64",
					"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-82.0.0.75.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-6.6.0-82.0.0.75.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-82.0.0.75.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-debugsource-6.6.0-82.0.0.75.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-devel-6.6.0-82.0.0.75.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-headers-6.6.0-82.0.0.75.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-source-6.6.0-82.0.0.75.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-tools-6.6.0-82.0.0.75.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-82.0.0.75.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-82.0.0.75.oe2403.aarch64",
					"openEuler-24.03-LTS:perf-6.6.0-82.0.0.75.oe2403.aarch64",
					"openEuler-24.03-LTS:perf-debuginfo-6.6.0-82.0.0.75.oe2403.aarch64",
					"openEuler-24.03-LTS:python3-perf-6.6.0-82.0.0.75.oe2403.aarch64",
					"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-82.0.0.75.oe2403.aarch64",
					"openEuler-24.03-LTS:bpftool-6.6.0-82.0.0.75.oe2403.x86_64",
					"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-82.0.0.75.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-6.6.0-82.0.0.75.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-82.0.0.75.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-debugsource-6.6.0-82.0.0.75.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-devel-6.6.0-82.0.0.75.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-headers-6.6.0-82.0.0.75.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-source-6.6.0-82.0.0.75.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-tools-6.6.0-82.0.0.75.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-82.0.0.75.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-82.0.0.75.oe2403.x86_64",
					"openEuler-24.03-LTS:perf-6.6.0-82.0.0.75.oe2403.x86_64",
					"openEuler-24.03-LTS:perf-debuginfo-6.6.0-82.0.0.75.oe2403.x86_64",
					"openEuler-24.03-LTS:python3-perf-6.6.0-82.0.0.75.oe2403.x86_64",
					"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-82.0.0.75.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-6.6.0-82.0.0.75.oe2403.src"
				]
			},
			"remediations":[
				{
					"product_ids":[
						"openEuler-24.03-LTS:bpftool-6.6.0-82.0.0.75.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-82.0.0.75.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-6.6.0-82.0.0.75.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-82.0.0.75.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-82.0.0.75.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-82.0.0.75.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-82.0.0.75.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-82.0.0.75.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-82.0.0.75.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-82.0.0.75.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-82.0.0.75.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-6.6.0-82.0.0.75.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-82.0.0.75.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-82.0.0.75.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-82.0.0.75.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-6.6.0-82.0.0.75.oe2403.x86_64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-82.0.0.75.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-6.6.0-82.0.0.75.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-82.0.0.75.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-82.0.0.75.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-82.0.0.75.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-82.0.0.75.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-82.0.0.75.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-82.0.0.75.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-82.0.0.75.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-82.0.0.75.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-6.6.0-82.0.0.75.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-82.0.0.75.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-82.0.0.75.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-82.0.0.75.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-6.6.0-82.0.0.75.oe2403.src"
					],
					"details":"kernel security update",
					"category":"vendor_fix",
					"url":"https://www.openeuler.org/zh/security/security-bulletins/detail/?id=openEuler-SA-2025-1285"
				}
			],
			"scores":[
				{
					"cvss_v3":{
						"baseSeverity":"HIGH",
						"baseScore":7.8,
						"vectorString":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
						"version":"3.1"
					},
					"products":[
						"openEuler-24.03-LTS:bpftool-6.6.0-82.0.0.75.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-82.0.0.75.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-6.6.0-82.0.0.75.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-82.0.0.75.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-82.0.0.75.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-82.0.0.75.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-82.0.0.75.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-82.0.0.75.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-82.0.0.75.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-82.0.0.75.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-82.0.0.75.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-6.6.0-82.0.0.75.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-82.0.0.75.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-82.0.0.75.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-82.0.0.75.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-6.6.0-82.0.0.75.oe2403.x86_64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-82.0.0.75.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-6.6.0-82.0.0.75.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-82.0.0.75.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-82.0.0.75.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-82.0.0.75.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-82.0.0.75.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-82.0.0.75.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-82.0.0.75.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-82.0.0.75.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-82.0.0.75.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-6.6.0-82.0.0.75.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-82.0.0.75.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-82.0.0.75.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-82.0.0.75.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-6.6.0-82.0.0.75.oe2403.src"
					]
				}
			],
			"threats":[
				{
					"details":"High",
					"category":"impact"
				}
			],
			"title":"CVE-2023-52926"
		},
		{
			"cve":"CVE-2024-54456",
			"notes":[
				{
					"text":"In the Linux kernel, the following vulnerability has been resolved:\n\nNFS: Fix potential buffer overflowin nfs_sysfs_link_rpc_client()\n\nname is char[64] where the size of clnt->cl_program->name remains\nunknown. Invoking strcat() directly will also lead to potential buffer\noverflow. Change them to strscpy() and strncat() to fix potential\nissues.",
					"category":"description",
					"title":"Vulnerability Description"
				}
			],
			"product_status":{
				"fixed":[
					"openEuler-24.03-LTS:bpftool-6.6.0-82.0.0.75.oe2403.aarch64",
					"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-82.0.0.75.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-6.6.0-82.0.0.75.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-82.0.0.75.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-debugsource-6.6.0-82.0.0.75.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-devel-6.6.0-82.0.0.75.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-headers-6.6.0-82.0.0.75.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-source-6.6.0-82.0.0.75.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-tools-6.6.0-82.0.0.75.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-82.0.0.75.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-82.0.0.75.oe2403.aarch64",
					"openEuler-24.03-LTS:perf-6.6.0-82.0.0.75.oe2403.aarch64",
					"openEuler-24.03-LTS:perf-debuginfo-6.6.0-82.0.0.75.oe2403.aarch64",
					"openEuler-24.03-LTS:python3-perf-6.6.0-82.0.0.75.oe2403.aarch64",
					"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-82.0.0.75.oe2403.aarch64",
					"openEuler-24.03-LTS:bpftool-6.6.0-82.0.0.75.oe2403.x86_64",
					"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-82.0.0.75.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-6.6.0-82.0.0.75.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-82.0.0.75.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-debugsource-6.6.0-82.0.0.75.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-devel-6.6.0-82.0.0.75.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-headers-6.6.0-82.0.0.75.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-source-6.6.0-82.0.0.75.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-tools-6.6.0-82.0.0.75.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-82.0.0.75.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-82.0.0.75.oe2403.x86_64",
					"openEuler-24.03-LTS:perf-6.6.0-82.0.0.75.oe2403.x86_64",
					"openEuler-24.03-LTS:perf-debuginfo-6.6.0-82.0.0.75.oe2403.x86_64",
					"openEuler-24.03-LTS:python3-perf-6.6.0-82.0.0.75.oe2403.x86_64",
					"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-82.0.0.75.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-6.6.0-82.0.0.75.oe2403.src"
				]
			},
			"remediations":[
				{
					"product_ids":[
						"openEuler-24.03-LTS:bpftool-6.6.0-82.0.0.75.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-82.0.0.75.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-6.6.0-82.0.0.75.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-82.0.0.75.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-82.0.0.75.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-82.0.0.75.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-82.0.0.75.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-82.0.0.75.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-82.0.0.75.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-82.0.0.75.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-82.0.0.75.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-6.6.0-82.0.0.75.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-82.0.0.75.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-82.0.0.75.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-82.0.0.75.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-6.6.0-82.0.0.75.oe2403.x86_64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-82.0.0.75.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-6.6.0-82.0.0.75.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-82.0.0.75.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-82.0.0.75.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-82.0.0.75.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-82.0.0.75.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-82.0.0.75.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-82.0.0.75.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-82.0.0.75.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-82.0.0.75.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-6.6.0-82.0.0.75.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-82.0.0.75.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-82.0.0.75.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-82.0.0.75.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-6.6.0-82.0.0.75.oe2403.src"
					],
					"details":"kernel security update",
					"category":"vendor_fix",
					"url":"https://www.openeuler.org/zh/security/security-bulletins/detail/?id=openEuler-SA-2025-1285"
				}
			],
			"scores":[
				{
					"cvss_v3":{
						"baseSeverity":"LOW",
						"baseScore":3.9,
						"vectorString":"CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:L/I:L/A:L",
						"version":"3.1"
					},
					"products":[
						"openEuler-24.03-LTS:bpftool-6.6.0-82.0.0.75.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-82.0.0.75.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-6.6.0-82.0.0.75.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-82.0.0.75.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-82.0.0.75.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-82.0.0.75.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-82.0.0.75.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-82.0.0.75.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-82.0.0.75.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-82.0.0.75.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-82.0.0.75.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-6.6.0-82.0.0.75.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-82.0.0.75.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-82.0.0.75.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-82.0.0.75.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-6.6.0-82.0.0.75.oe2403.x86_64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-82.0.0.75.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-6.6.0-82.0.0.75.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-82.0.0.75.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-82.0.0.75.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-82.0.0.75.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-82.0.0.75.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-82.0.0.75.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-82.0.0.75.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-82.0.0.75.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-82.0.0.75.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-6.6.0-82.0.0.75.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-82.0.0.75.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-82.0.0.75.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-82.0.0.75.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-6.6.0-82.0.0.75.oe2403.src"
					]
				}
			],
			"threats":[
				{
					"details":"Low",
					"category":"impact"
				}
			],
			"title":"CVE-2024-54456"
		},
		{
			"cve":"CVE-2024-57899",
			"notes":[
				{
					"text":"In the Linux kernel, the following vulnerability has been resolved:\n\nwifi: mac80211: fix mbss changed flags corruption on 32 bit systems\n\nOn 32-bit systems, the size of an unsigned long is 4 bytes,\nwhile a u64 is 8 bytes. Therefore, when using\nor_each_set_bit(bit, &bits, sizeof(changed) * BITS_PER_BYTE),\nthe code is incorrectly searching for a bit in a 32-bit\nvariable that is expected to be 64 bits in size,\nleading to incorrect bit finding.\n\nSolution: Ensure that the size of the bits variable is correctly\nadjusted for each architecture.\n\n Call Trace:\n  ? show_regs+0x54/0x58\n  ? __warn+0x6b/0xd4\n  ? ieee80211_link_info_change_notify+0xcc/0xd4 [mac80211]\n  ? report_bug+0x113/0x150\n  ? exc_overflow+0x30/0x30\n  ? handle_bug+0x27/0x44\n  ? exc_invalid_op+0x18/0x50\n  ? handle_exception+0xf6/0xf6\n  ? exc_overflow+0x30/0x30\n  ? ieee80211_link_info_change_notify+0xcc/0xd4 [mac80211]\n  ? exc_overflow+0x30/0x30\n  ? ieee80211_link_info_change_notify+0xcc/0xd4 [mac80211]\n  ? ieee80211_mesh_work+0xff/0x260 [mac80211]\n  ? cfg80211_wiphy_work+0x72/0x98 [cfg80211]\n  ? process_one_work+0xf1/0x1fc\n  ? worker_thread+0x2c0/0x3b4\n  ? kthread+0xc7/0xf0\n  ? mod_delayed_work_on+0x4c/0x4c\n  ? kthread_complete_and_exit+0x14/0x14\n  ? ret_from_fork+0x24/0x38\n  ? kthread_complete_and_exit+0x14/0x14\n  ? ret_from_fork_asm+0xf/0x14\n  ? entry_INT80_32+0xf0/0xf0\n\n[restore no-op path for no changes]",
					"category":"description",
					"title":"Vulnerability Description"
				}
			],
			"product_status":{
				"fixed":[
					"openEuler-24.03-LTS:bpftool-6.6.0-82.0.0.75.oe2403.aarch64",
					"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-82.0.0.75.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-6.6.0-82.0.0.75.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-82.0.0.75.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-debugsource-6.6.0-82.0.0.75.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-devel-6.6.0-82.0.0.75.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-headers-6.6.0-82.0.0.75.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-source-6.6.0-82.0.0.75.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-tools-6.6.0-82.0.0.75.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-82.0.0.75.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-82.0.0.75.oe2403.aarch64",
					"openEuler-24.03-LTS:perf-6.6.0-82.0.0.75.oe2403.aarch64",
					"openEuler-24.03-LTS:perf-debuginfo-6.6.0-82.0.0.75.oe2403.aarch64",
					"openEuler-24.03-LTS:python3-perf-6.6.0-82.0.0.75.oe2403.aarch64",
					"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-82.0.0.75.oe2403.aarch64",
					"openEuler-24.03-LTS:bpftool-6.6.0-82.0.0.75.oe2403.x86_64",
					"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-82.0.0.75.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-6.6.0-82.0.0.75.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-82.0.0.75.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-debugsource-6.6.0-82.0.0.75.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-devel-6.6.0-82.0.0.75.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-headers-6.6.0-82.0.0.75.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-source-6.6.0-82.0.0.75.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-tools-6.6.0-82.0.0.75.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-82.0.0.75.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-82.0.0.75.oe2403.x86_64",
					"openEuler-24.03-LTS:perf-6.6.0-82.0.0.75.oe2403.x86_64",
					"openEuler-24.03-LTS:perf-debuginfo-6.6.0-82.0.0.75.oe2403.x86_64",
					"openEuler-24.03-LTS:python3-perf-6.6.0-82.0.0.75.oe2403.x86_64",
					"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-82.0.0.75.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-6.6.0-82.0.0.75.oe2403.src"
				]
			},
			"remediations":[
				{
					"product_ids":[
						"openEuler-24.03-LTS:bpftool-6.6.0-82.0.0.75.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-82.0.0.75.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-6.6.0-82.0.0.75.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-82.0.0.75.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-82.0.0.75.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-82.0.0.75.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-82.0.0.75.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-82.0.0.75.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-82.0.0.75.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-82.0.0.75.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-82.0.0.75.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-6.6.0-82.0.0.75.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-82.0.0.75.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-82.0.0.75.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-82.0.0.75.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-6.6.0-82.0.0.75.oe2403.x86_64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-82.0.0.75.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-6.6.0-82.0.0.75.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-82.0.0.75.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-82.0.0.75.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-82.0.0.75.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-82.0.0.75.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-82.0.0.75.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-82.0.0.75.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-82.0.0.75.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-82.0.0.75.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-6.6.0-82.0.0.75.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-82.0.0.75.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-82.0.0.75.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-82.0.0.75.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-6.6.0-82.0.0.75.oe2403.src"
					],
					"details":"kernel security update",
					"category":"vendor_fix",
					"url":"https://www.openeuler.org/zh/security/security-bulletins/detail/?id=openEuler-SA-2025-1285"
				}
			],
			"scores":[
				{
					"cvss_v3":{
						"baseSeverity":"MEDIUM",
						"baseScore":5.5,
						"vectorString":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
						"version":"3.1"
					},
					"products":[
						"openEuler-24.03-LTS:bpftool-6.6.0-82.0.0.75.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-82.0.0.75.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-6.6.0-82.0.0.75.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-82.0.0.75.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-82.0.0.75.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-82.0.0.75.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-82.0.0.75.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-82.0.0.75.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-82.0.0.75.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-82.0.0.75.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-82.0.0.75.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-6.6.0-82.0.0.75.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-82.0.0.75.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-82.0.0.75.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-82.0.0.75.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-6.6.0-82.0.0.75.oe2403.x86_64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-82.0.0.75.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-6.6.0-82.0.0.75.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-82.0.0.75.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-82.0.0.75.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-82.0.0.75.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-82.0.0.75.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-82.0.0.75.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-82.0.0.75.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-82.0.0.75.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-82.0.0.75.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-6.6.0-82.0.0.75.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-82.0.0.75.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-82.0.0.75.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-82.0.0.75.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-6.6.0-82.0.0.75.oe2403.src"
					]
				}
			],
			"threats":[
				{
					"details":"Medium",
					"category":"impact"
				}
			],
			"title":"CVE-2024-57899"
		},
		{
			"cve":"CVE-2024-57981",
			"notes":[
				{
					"text":"In the Linux kernel, the following vulnerability has been resolved:\n\nusb: xhci: Fix NULL pointer dereference on certain command aborts\n\nIf a command is queued to the final usable TRB of a ring segment, the\nenqueue pointer is advanced to the subsequent link TRB and no further.\nIf the command is later aborted, when the abort completion is handled\nthe dequeue pointer is advanced to the first TRB of the next segment.\n\nIf no further commands are queued, xhci_handle_stopped_cmd_ring() sees\nthe ring pointers unequal and assumes that there is a pending command,\nso it calls xhci_mod_cmd_timer() which crashes if cur_cmd was NULL.\n\nDon't attempt timer setup if cur_cmd is NULL. The subsequent doorbell\nring likely is unnecessary too, but it's harmless. Leave it alone.\n\nThis is probably Bug 219532, but no confirmation has been received.\n\nThe issue has been independently reproduced and confirmed fixed using\na USB MCU programmed to NAK the Status stage of SET_ADDRESS forever.\nEverything continued working normally after several prevented crashes.",
					"category":"description",
					"title":"Vulnerability Description"
				}
			],
			"product_status":{
				"fixed":[
					"openEuler-24.03-LTS:bpftool-6.6.0-82.0.0.75.oe2403.aarch64",
					"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-82.0.0.75.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-6.6.0-82.0.0.75.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-82.0.0.75.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-debugsource-6.6.0-82.0.0.75.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-devel-6.6.0-82.0.0.75.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-headers-6.6.0-82.0.0.75.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-source-6.6.0-82.0.0.75.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-tools-6.6.0-82.0.0.75.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-82.0.0.75.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-82.0.0.75.oe2403.aarch64",
					"openEuler-24.03-LTS:perf-6.6.0-82.0.0.75.oe2403.aarch64",
					"openEuler-24.03-LTS:perf-debuginfo-6.6.0-82.0.0.75.oe2403.aarch64",
					"openEuler-24.03-LTS:python3-perf-6.6.0-82.0.0.75.oe2403.aarch64",
					"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-82.0.0.75.oe2403.aarch64",
					"openEuler-24.03-LTS:bpftool-6.6.0-82.0.0.75.oe2403.x86_64",
					"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-82.0.0.75.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-6.6.0-82.0.0.75.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-82.0.0.75.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-debugsource-6.6.0-82.0.0.75.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-devel-6.6.0-82.0.0.75.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-headers-6.6.0-82.0.0.75.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-source-6.6.0-82.0.0.75.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-tools-6.6.0-82.0.0.75.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-82.0.0.75.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-82.0.0.75.oe2403.x86_64",
					"openEuler-24.03-LTS:perf-6.6.0-82.0.0.75.oe2403.x86_64",
					"openEuler-24.03-LTS:perf-debuginfo-6.6.0-82.0.0.75.oe2403.x86_64",
					"openEuler-24.03-LTS:python3-perf-6.6.0-82.0.0.75.oe2403.x86_64",
					"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-82.0.0.75.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-6.6.0-82.0.0.75.oe2403.src"
				]
			},
			"remediations":[
				{
					"product_ids":[
						"openEuler-24.03-LTS:bpftool-6.6.0-82.0.0.75.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-82.0.0.75.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-6.6.0-82.0.0.75.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-82.0.0.75.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-82.0.0.75.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-82.0.0.75.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-82.0.0.75.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-82.0.0.75.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-82.0.0.75.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-82.0.0.75.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-82.0.0.75.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-6.6.0-82.0.0.75.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-82.0.0.75.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-82.0.0.75.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-82.0.0.75.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-6.6.0-82.0.0.75.oe2403.x86_64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-82.0.0.75.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-6.6.0-82.0.0.75.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-82.0.0.75.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-82.0.0.75.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-82.0.0.75.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-82.0.0.75.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-82.0.0.75.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-82.0.0.75.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-82.0.0.75.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-82.0.0.75.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-6.6.0-82.0.0.75.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-82.0.0.75.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-82.0.0.75.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-82.0.0.75.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-6.6.0-82.0.0.75.oe2403.src"
					],
					"details":"kernel security update",
					"category":"vendor_fix",
					"url":"https://www.openeuler.org/zh/security/security-bulletins/detail/?id=openEuler-SA-2025-1285"
				}
			],
			"scores":[
				{
					"cvss_v3":{
						"baseSeverity":"MEDIUM",
						"baseScore":5.5,
						"vectorString":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
						"version":"3.1"
					},
					"products":[
						"openEuler-24.03-LTS:bpftool-6.6.0-82.0.0.75.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-82.0.0.75.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-6.6.0-82.0.0.75.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-82.0.0.75.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-82.0.0.75.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-82.0.0.75.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-82.0.0.75.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-82.0.0.75.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-82.0.0.75.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-82.0.0.75.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-82.0.0.75.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-6.6.0-82.0.0.75.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-82.0.0.75.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-82.0.0.75.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-82.0.0.75.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-6.6.0-82.0.0.75.oe2403.x86_64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-82.0.0.75.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-6.6.0-82.0.0.75.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-82.0.0.75.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-82.0.0.75.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-82.0.0.75.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-82.0.0.75.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-82.0.0.75.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-82.0.0.75.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-82.0.0.75.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-82.0.0.75.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-6.6.0-82.0.0.75.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-82.0.0.75.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-82.0.0.75.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-82.0.0.75.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-6.6.0-82.0.0.75.oe2403.src"
					]
				}
			],
			"threats":[
				{
					"details":"Medium",
					"category":"impact"
				}
			],
			"title":"CVE-2024-57981"
		},
		{
			"cve":"CVE-2024-58001",
			"notes":[
				{
					"text":"In the Linux kernel, the following vulnerability has been resolved:\n\nocfs2: handle a symlink read error correctly\n\nPatch series \"Convert ocfs2 to use folios\".\n\nMark did a conversion of ocfs2 to use folios and sent it to me as a\ngiant patch for review ;-)\n\nSo I've redone it as individual patches, and credited Mark for the patches\nwhere his code is substantially the same.  It's not a bad way to do it;\nhis patch had some bugs and my patches had some bugs.  Hopefully all our\nbugs were different from each other.  And hopefully Mark likes all the\nchanges I made to his code!\n\n\nThis patch (of 23):\n\nIf we can't read the buffer, be sure to unlock the page before returning.",
					"category":"description",
					"title":"Vulnerability Description"
				}
			],
			"product_status":{
				"fixed":[
					"openEuler-24.03-LTS:bpftool-6.6.0-82.0.0.75.oe2403.aarch64",
					"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-82.0.0.75.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-6.6.0-82.0.0.75.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-82.0.0.75.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-debugsource-6.6.0-82.0.0.75.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-devel-6.6.0-82.0.0.75.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-headers-6.6.0-82.0.0.75.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-source-6.6.0-82.0.0.75.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-tools-6.6.0-82.0.0.75.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-82.0.0.75.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-82.0.0.75.oe2403.aarch64",
					"openEuler-24.03-LTS:perf-6.6.0-82.0.0.75.oe2403.aarch64",
					"openEuler-24.03-LTS:perf-debuginfo-6.6.0-82.0.0.75.oe2403.aarch64",
					"openEuler-24.03-LTS:python3-perf-6.6.0-82.0.0.75.oe2403.aarch64",
					"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-82.0.0.75.oe2403.aarch64",
					"openEuler-24.03-LTS:bpftool-6.6.0-82.0.0.75.oe2403.x86_64",
					"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-82.0.0.75.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-6.6.0-82.0.0.75.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-82.0.0.75.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-debugsource-6.6.0-82.0.0.75.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-devel-6.6.0-82.0.0.75.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-headers-6.6.0-82.0.0.75.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-source-6.6.0-82.0.0.75.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-tools-6.6.0-82.0.0.75.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-82.0.0.75.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-82.0.0.75.oe2403.x86_64",
					"openEuler-24.03-LTS:perf-6.6.0-82.0.0.75.oe2403.x86_64",
					"openEuler-24.03-LTS:perf-debuginfo-6.6.0-82.0.0.75.oe2403.x86_64",
					"openEuler-24.03-LTS:python3-perf-6.6.0-82.0.0.75.oe2403.x86_64",
					"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-82.0.0.75.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-6.6.0-82.0.0.75.oe2403.src"
				]
			},
			"remediations":[
				{
					"product_ids":[
						"openEuler-24.03-LTS:bpftool-6.6.0-82.0.0.75.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-82.0.0.75.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-6.6.0-82.0.0.75.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-82.0.0.75.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-82.0.0.75.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-82.0.0.75.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-82.0.0.75.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-82.0.0.75.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-82.0.0.75.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-82.0.0.75.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-82.0.0.75.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-6.6.0-82.0.0.75.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-82.0.0.75.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-82.0.0.75.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-82.0.0.75.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-6.6.0-82.0.0.75.oe2403.x86_64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-82.0.0.75.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-6.6.0-82.0.0.75.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-82.0.0.75.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-82.0.0.75.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-82.0.0.75.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-82.0.0.75.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-82.0.0.75.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-82.0.0.75.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-82.0.0.75.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-82.0.0.75.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-6.6.0-82.0.0.75.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-82.0.0.75.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-82.0.0.75.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-82.0.0.75.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-6.6.0-82.0.0.75.oe2403.src"
					],
					"details":"kernel security update",
					"category":"vendor_fix",
					"url":"https://www.openeuler.org/zh/security/security-bulletins/detail/?id=openEuler-SA-2025-1285"
				}
			],
			"scores":[
				{
					"cvss_v3":{
						"baseSeverity":"LOW",
						"baseScore":3.9,
						"vectorString":"CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:L/I:L/A:L",
						"version":"3.1"
					},
					"products":[
						"openEuler-24.03-LTS:bpftool-6.6.0-82.0.0.75.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-82.0.0.75.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-6.6.0-82.0.0.75.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-82.0.0.75.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-82.0.0.75.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-82.0.0.75.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-82.0.0.75.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-82.0.0.75.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-82.0.0.75.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-82.0.0.75.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-82.0.0.75.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-6.6.0-82.0.0.75.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-82.0.0.75.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-82.0.0.75.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-82.0.0.75.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-6.6.0-82.0.0.75.oe2403.x86_64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-82.0.0.75.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-6.6.0-82.0.0.75.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-82.0.0.75.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-82.0.0.75.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-82.0.0.75.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-82.0.0.75.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-82.0.0.75.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-82.0.0.75.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-82.0.0.75.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-82.0.0.75.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-6.6.0-82.0.0.75.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-82.0.0.75.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-82.0.0.75.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-82.0.0.75.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-6.6.0-82.0.0.75.oe2403.src"
					]
				}
			],
			"threats":[
				{
					"details":"Low",
					"category":"impact"
				}
			],
			"title":"CVE-2024-58001"
		},
		{
			"cve":"CVE-2024-58070",
			"notes":[
				{
					"text":"In the Linux kernel, the following vulnerability has been resolved:\n\nbpf: bpf_local_storage: Always use bpf_mem_alloc in PREEMPT_RT\n\nIn PREEMPT_RT, kmalloc(GFP_ATOMIC) is still not safe in non preemptible\ncontext. bpf_mem_alloc must be used in PREEMPT_RT. This patch is\nto enforce bpf_mem_alloc in the bpf_local_storage when CONFIG_PREEMPT_RT\nis enabled.\n\n[   35.118559] BUG: sleeping function called from invalid context at kernel/locking/spinlock_rt.c:48\n[   35.118566] in_atomic(): 1, irqs_disabled(): 0, non_block: 0, pid: 1832, name: test_progs\n[   35.118569] preempt_count: 1, expected: 0\n[   35.118571] RCU nest depth: 1, expected: 1\n[   35.118577] INFO: lockdep is turned off.\n    ...\n[   35.118647]  __might_resched+0x433/0x5b0\n[   35.118677]  rt_spin_lock+0xc3/0x290\n[   35.118700]  ___slab_alloc+0x72/0xc40\n[   35.118723]  __kmalloc_noprof+0x13f/0x4e0\n[   35.118732]  bpf_map_kzalloc+0xe5/0x220\n[   35.118740]  bpf_selem_alloc+0x1d2/0x7b0\n[   35.118755]  bpf_local_storage_update+0x2fa/0x8b0\n[   35.118784]  bpf_sk_storage_get_tracing+0x15a/0x1d0\n[   35.118791]  bpf_prog_9a118d86fca78ebb_trace_inet_sock_set_state+0x44/0x66\n[   35.118795]  bpf_trace_run3+0x222/0x400\n[   35.118820]  __bpf_trace_inet_sock_set_state+0x11/0x20\n[   35.118824]  trace_inet_sock_set_state+0x112/0x130\n[   35.118830]  inet_sk_state_store+0x41/0x90\n[   35.118836]  tcp_set_state+0x3b3/0x640\n\nThere is no need to adjust the gfp_flags passing to the\nbpf_mem_cache_alloc_flags() which only honors the GFP_KERNEL.\nThe verifier has ensured GFP_KERNEL is passed only in sleepable context.\n\nIt has been an old issue since the first introduction of the\nbpf_local_storage ~5 years ago, so this patch targets the bpf-next.\n\nbpf_mem_alloc is needed to solve it, so the Fixes tag is set\nto the commit when bpf_mem_alloc was first used in the bpf_local_storage.",
					"category":"description",
					"title":"Vulnerability Description"
				}
			],
			"product_status":{
				"fixed":[
					"openEuler-24.03-LTS:bpftool-6.6.0-82.0.0.75.oe2403.aarch64",
					"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-82.0.0.75.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-6.6.0-82.0.0.75.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-82.0.0.75.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-debugsource-6.6.0-82.0.0.75.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-devel-6.6.0-82.0.0.75.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-headers-6.6.0-82.0.0.75.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-source-6.6.0-82.0.0.75.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-tools-6.6.0-82.0.0.75.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-82.0.0.75.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-82.0.0.75.oe2403.aarch64",
					"openEuler-24.03-LTS:perf-6.6.0-82.0.0.75.oe2403.aarch64",
					"openEuler-24.03-LTS:perf-debuginfo-6.6.0-82.0.0.75.oe2403.aarch64",
					"openEuler-24.03-LTS:python3-perf-6.6.0-82.0.0.75.oe2403.aarch64",
					"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-82.0.0.75.oe2403.aarch64",
					"openEuler-24.03-LTS:bpftool-6.6.0-82.0.0.75.oe2403.x86_64",
					"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-82.0.0.75.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-6.6.0-82.0.0.75.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-82.0.0.75.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-debugsource-6.6.0-82.0.0.75.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-devel-6.6.0-82.0.0.75.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-headers-6.6.0-82.0.0.75.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-source-6.6.0-82.0.0.75.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-tools-6.6.0-82.0.0.75.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-82.0.0.75.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-82.0.0.75.oe2403.x86_64",
					"openEuler-24.03-LTS:perf-6.6.0-82.0.0.75.oe2403.x86_64",
					"openEuler-24.03-LTS:perf-debuginfo-6.6.0-82.0.0.75.oe2403.x86_64",
					"openEuler-24.03-LTS:python3-perf-6.6.0-82.0.0.75.oe2403.x86_64",
					"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-82.0.0.75.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-6.6.0-82.0.0.75.oe2403.src"
				]
			},
			"remediations":[
				{
					"product_ids":[
						"openEuler-24.03-LTS:bpftool-6.6.0-82.0.0.75.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-82.0.0.75.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-6.6.0-82.0.0.75.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-82.0.0.75.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-82.0.0.75.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-82.0.0.75.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-82.0.0.75.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-82.0.0.75.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-82.0.0.75.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-82.0.0.75.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-82.0.0.75.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-6.6.0-82.0.0.75.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-82.0.0.75.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-82.0.0.75.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-82.0.0.75.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-6.6.0-82.0.0.75.oe2403.x86_64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-82.0.0.75.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-6.6.0-82.0.0.75.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-82.0.0.75.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-82.0.0.75.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-82.0.0.75.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-82.0.0.75.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-82.0.0.75.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-82.0.0.75.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-82.0.0.75.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-82.0.0.75.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-6.6.0-82.0.0.75.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-82.0.0.75.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-82.0.0.75.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-82.0.0.75.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-6.6.0-82.0.0.75.oe2403.src"
					],
					"details":"kernel security update",
					"category":"vendor_fix",
					"url":"https://www.openeuler.org/zh/security/security-bulletins/detail/?id=openEuler-SA-2025-1285"
				}
			],
			"scores":[
				{
					"cvss_v3":{
						"baseSeverity":"MEDIUM",
						"baseScore":5.5,
						"vectorString":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
						"version":"3.1"
					},
					"products":[
						"openEuler-24.03-LTS:bpftool-6.6.0-82.0.0.75.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-82.0.0.75.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-6.6.0-82.0.0.75.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-82.0.0.75.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-82.0.0.75.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-82.0.0.75.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-82.0.0.75.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-82.0.0.75.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-82.0.0.75.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-82.0.0.75.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-82.0.0.75.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-6.6.0-82.0.0.75.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-82.0.0.75.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-82.0.0.75.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-82.0.0.75.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-6.6.0-82.0.0.75.oe2403.x86_64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-82.0.0.75.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-6.6.0-82.0.0.75.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-82.0.0.75.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-82.0.0.75.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-82.0.0.75.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-82.0.0.75.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-82.0.0.75.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-82.0.0.75.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-82.0.0.75.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-82.0.0.75.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-6.6.0-82.0.0.75.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-82.0.0.75.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-82.0.0.75.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-82.0.0.75.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-6.6.0-82.0.0.75.oe2403.src"
					]
				}
			],
			"threats":[
				{
					"details":"Medium",
					"category":"impact"
				}
			],
			"title":"CVE-2024-58070"
		},
		{
			"cve":"CVE-2025-21729",
			"notes":[
				{
					"text":"In the Linux kernel, the following vulnerability has been resolved:\n\nwifi: rtw89: fix race between cancel_hw_scan and hw_scan completion\n\nThe rtwdev->scanning flag isn't protected by mutex originally, so\ncancel_hw_scan can pass the condition, but suddenly hw_scan completion\nunset the flag and calls ieee80211_scan_completed() that will free\nlocal->hw_scan_req. Then, cancel_hw_scan raises null-ptr-deref and\nuse-after-free. Fix it by moving the check condition to where\nprotected by mutex.\n\n KASAN: null-ptr-deref in range [0x0000000000000088-0x000000000000008f]\n CPU: 2 PID: 6922 Comm: kworker/2:2 Tainted: G           OE\n Hardware name: LENOVO 2356AD1/2356AD1, BIOS G7ETB6WW (2.76 ) 09/10/2019\n Workqueue: events cfg80211_conn_work [cfg80211]\n RIP: 0010:rtw89_fw_h2c_scan_offload_be+0xc33/0x13c3 [rtw89_core]\n Code: 00 45 89 6c 24 1c 0f 85 23 01 00 00 48 8b 85 20 ff ff ff 48 8d\n RSP: 0018:ffff88811fd9f068 EFLAGS: 00010206\n RAX: dffffc0000000000 RBX: ffff88811fd9f258 RCX: 0000000000000001\n RDX: 0000000000000011 RSI: 0000000000000001 RDI: 0000000000000089\n RBP: ffff88811fd9f170 R08: 0000000000000000 R09: 0000000000000000\n R10: ffff88811fd9f108 R11: 0000000000000000 R12: ffff88810e47f960\n R13: 0000000000000000 R14: 000000000000ffff R15: 0000000000000000\n FS:  0000000000000000(0000) GS:ffff8881d6f00000(0000) knlGS:0000000000000000\n CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033\n CR2: 00007531dfca55b0 CR3: 00000001be296004 CR4: 00000000001706e0\n Call Trace:\n  <TASK>\n  ? show_regs+0x61/0x73\n  ? __die_body+0x20/0x73\n  ? die_addr+0x4f/0x7b\n  ? exc_general_protection+0x191/0x1db\n  ? asm_exc_general_protection+0x27/0x30\n  ? rtw89_fw_h2c_scan_offload_be+0xc33/0x13c3 [rtw89_core]\n  ? rtw89_fw_h2c_scan_offload_be+0x458/0x13c3 [rtw89_core]\n  ? __pfx_rtw89_fw_h2c_scan_offload_be+0x10/0x10 [rtw89_core]\n  ? do_raw_spin_lock+0x75/0xdb\n  ? __pfx_do_raw_spin_lock+0x10/0x10\n  rtw89_hw_scan_offload+0xb5e/0xbf7 [rtw89_core]\n  ? _raw_spin_unlock+0xe/0x24\n  ? __mutex_lock.constprop.0+0x40c/0x471\n  ? __pfx_rtw89_hw_scan_offload+0x10/0x10 [rtw89_core]\n  ? __mutex_lock_slowpath+0x13/0x1f\n  ? mutex_lock+0xa2/0xdc\n  ? __pfx_mutex_lock+0x10/0x10\n  rtw89_hw_scan_abort+0x58/0xb7 [rtw89_core]\n  rtw89_ops_cancel_hw_scan+0x120/0x13b [rtw89_core]\n  ieee80211_scan_cancel+0x468/0x4d0 [mac80211]\n  ieee80211_prep_connection+0x858/0x899 [mac80211]\n  ieee80211_mgd_auth+0xbea/0xdde [mac80211]\n  ? __pfx_ieee80211_mgd_auth+0x10/0x10 [mac80211]\n  ? cfg80211_find_elem+0x15/0x29 [cfg80211]\n  ? is_bss+0x1b7/0x1d7 [cfg80211]\n  ieee80211_auth+0x18/0x27 [mac80211]\n  cfg80211_mlme_auth+0x3bb/0x3e7 [cfg80211]\n  cfg80211_conn_do_work+0x410/0xb81 [cfg80211]\n  ? __pfx_cfg80211_conn_do_work+0x10/0x10 [cfg80211]\n  ? __kasan_check_read+0x11/0x1f\n  ? psi_group_change+0x8bc/0x944\n  ? __kasan_check_write+0x14/0x22\n  ? mutex_lock+0x8e/0xdc\n  ? __pfx_mutex_lock+0x10/0x10\n  ? __pfx___radix_tree_lookup+0x10/0x10\n  cfg80211_conn_work+0x245/0x34d [cfg80211]\n  ? __pfx_cfg80211_conn_work+0x10/0x10 [cfg80211]\n  ? update_cfs_rq_load_avg+0x3bc/0x3d7\n  ? sched_clock_noinstr+0x9/0x1a\n  ? sched_clock+0x10/0x24\n  ? sched_clock_cpu+0x7e/0x42e\n  ? newidle_balance+0x796/0x937\n  ? __pfx_sched_clock_cpu+0x10/0x10\n  ? __pfx_newidle_balance+0x10/0x10\n  ? __kasan_check_read+0x11/0x1f\n  ? psi_group_change+0x8bc/0x944\n  ? _raw_spin_unlock+0xe/0x24\n  ? raw_spin_rq_unlock+0x47/0x54\n  ? raw_spin_rq_unlock_irq+0x9/0x1f\n  ? finish_task_switch.isra.0+0x347/0x586\n  ? __schedule+0x27bf/0x2892\n  ? mutex_unlock+0x80/0xd0\n  ? do_raw_spin_lock+0x75/0xdb\n  ? __pfx___schedule+0x10/0x10\n  process_scheduled_works+0x58c/0x821\n  worker_thread+0x4c7/0x586\n  ? __kasan_check_read+0x11/0x1f\n  kthread+0x285/0x294\n  ? __pfx_worker_thread+0x10/0x10\n  ? __pfx_kthread+0x10/0x10\n  ret_from_fork+0x29/0x6f\n  ? __pfx_kthread+0x10/0x10\n  ret_from_fork_asm+0x1b/0x30\n  </TASK>",
					"category":"description",
					"title":"Vulnerability Description"
				}
			],
			"product_status":{
				"fixed":[
					"openEuler-24.03-LTS:bpftool-6.6.0-82.0.0.75.oe2403.aarch64",
					"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-82.0.0.75.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-6.6.0-82.0.0.75.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-82.0.0.75.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-debugsource-6.6.0-82.0.0.75.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-devel-6.6.0-82.0.0.75.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-headers-6.6.0-82.0.0.75.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-source-6.6.0-82.0.0.75.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-tools-6.6.0-82.0.0.75.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-82.0.0.75.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-82.0.0.75.oe2403.aarch64",
					"openEuler-24.03-LTS:perf-6.6.0-82.0.0.75.oe2403.aarch64",
					"openEuler-24.03-LTS:perf-debuginfo-6.6.0-82.0.0.75.oe2403.aarch64",
					"openEuler-24.03-LTS:python3-perf-6.6.0-82.0.0.75.oe2403.aarch64",
					"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-82.0.0.75.oe2403.aarch64",
					"openEuler-24.03-LTS:bpftool-6.6.0-82.0.0.75.oe2403.x86_64",
					"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-82.0.0.75.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-6.6.0-82.0.0.75.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-82.0.0.75.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-debugsource-6.6.0-82.0.0.75.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-devel-6.6.0-82.0.0.75.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-headers-6.6.0-82.0.0.75.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-source-6.6.0-82.0.0.75.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-tools-6.6.0-82.0.0.75.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-82.0.0.75.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-82.0.0.75.oe2403.x86_64",
					"openEuler-24.03-LTS:perf-6.6.0-82.0.0.75.oe2403.x86_64",
					"openEuler-24.03-LTS:perf-debuginfo-6.6.0-82.0.0.75.oe2403.x86_64",
					"openEuler-24.03-LTS:python3-perf-6.6.0-82.0.0.75.oe2403.x86_64",
					"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-82.0.0.75.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-6.6.0-82.0.0.75.oe2403.src"
				]
			},
			"remediations":[
				{
					"product_ids":[
						"openEuler-24.03-LTS:bpftool-6.6.0-82.0.0.75.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-82.0.0.75.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-6.6.0-82.0.0.75.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-82.0.0.75.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-82.0.0.75.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-82.0.0.75.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-82.0.0.75.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-82.0.0.75.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-82.0.0.75.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-82.0.0.75.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-82.0.0.75.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-6.6.0-82.0.0.75.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-82.0.0.75.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-82.0.0.75.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-82.0.0.75.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-6.6.0-82.0.0.75.oe2403.x86_64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-82.0.0.75.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-6.6.0-82.0.0.75.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-82.0.0.75.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-82.0.0.75.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-82.0.0.75.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-82.0.0.75.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-82.0.0.75.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-82.0.0.75.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-82.0.0.75.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-82.0.0.75.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-6.6.0-82.0.0.75.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-82.0.0.75.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-82.0.0.75.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-82.0.0.75.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-6.6.0-82.0.0.75.oe2403.src"
					],
					"details":"kernel security update",
					"category":"vendor_fix",
					"url":"https://www.openeuler.org/zh/security/security-bulletins/detail/?id=openEuler-SA-2025-1285"
				}
			],
			"scores":[
				{
					"cvss_v3":{
						"baseSeverity":"LOW",
						"baseScore":3.9,
						"vectorString":"CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:L/I:L/A:L",
						"version":"3.1"
					},
					"products":[
						"openEuler-24.03-LTS:bpftool-6.6.0-82.0.0.75.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-82.0.0.75.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-6.6.0-82.0.0.75.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-82.0.0.75.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-82.0.0.75.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-82.0.0.75.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-82.0.0.75.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-82.0.0.75.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-82.0.0.75.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-82.0.0.75.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-82.0.0.75.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-6.6.0-82.0.0.75.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-82.0.0.75.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-82.0.0.75.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-82.0.0.75.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-6.6.0-82.0.0.75.oe2403.x86_64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-82.0.0.75.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-6.6.0-82.0.0.75.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-82.0.0.75.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-82.0.0.75.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-82.0.0.75.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-82.0.0.75.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-82.0.0.75.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-82.0.0.75.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-82.0.0.75.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-82.0.0.75.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-6.6.0-82.0.0.75.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-82.0.0.75.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-82.0.0.75.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-82.0.0.75.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-6.6.0-82.0.0.75.oe2403.src"
					]
				}
			],
			"threats":[
				{
					"details":"Low",
					"category":"impact"
				}
			],
			"title":"CVE-2025-21729"
		},
		{
			"cve":"CVE-2025-21732",
			"notes":[
				{
					"text":"In the Linux kernel, the following vulnerability has been resolved:\n\nRDMA/mlx5: Fix a race for an ODP MR which leads to CQE with error\n\nThis patch addresses a race condition for an ODP MR that can result in a\nCQE with an error on the UMR QP.\n\nDuring the __mlx5_ib_dereg_mr() flow, the following sequence of calls\noccurs:\n\nmlx5_revoke_mr()\n mlx5r_umr_revoke_mr()\n mlx5r_umr_post_send_wait()\n\nAt this point, the lkey is freed from the hardware's perspective.\n\nHowever, concurrently, mlx5_ib_invalidate_range() might be triggered by\nanother task attempting to invalidate a range for the same freed lkey.\n\nThis task will:\n - Acquire the umem_odp->umem_mutex lock.\n - Call mlx5r_umr_update_xlt() on the UMR QP.\n - Since the lkey has already been freed, this can lead to a CQE error,\n   causing the UMR QP to enter an error state [1].\n\nTo resolve this race condition, the umem_odp->umem_mutex lock is now also\nacquired as part of the mlx5_revoke_mr() scope.  Upon successful revoke,\nwe set umem_odp->private which points to that MR to NULL, preventing any\nfurther invalidation attempts on its lkey.\n\n[1] From dmesg:\n\n   infiniband rocep8s0f0: dump_cqe:277:(pid 0): WC error: 6, Message: memory bind operation error\n   cqe_dump: 00000000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00\n   cqe_dump: 00000010: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00\n   cqe_dump: 00000020: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00\n   cqe_dump: 00000030: 00 00 00 00 08 00 78 06 25 00 11 b9 00 0e dd d2\n\n   WARNING: CPU: 15 PID: 1506 at drivers/infiniband/hw/mlx5/umr.c:394 mlx5r_umr_post_send_wait+0x15a/0x2b0 [mlx5_ib]\n   Modules linked in: ip6table_mangle ip6table_natip6table_filter ip6_tables iptable_mangle xt_conntrack xt_MASQUERADE nf_conntrack_netlink nfnetlink xt_addrtype iptable_nat nf_nat br_netfilter rpcsec_gss_krb5 auth_rpcgss oid_registry overlay rpcrdma rdma_ucm ib_iser libiscsi scsi_transport_iscsi rdma_cm iw_cm ib_umad ib_ipoib ib_cm mlx5_ib ib_uverbs ib_core fuse mlx5_core\n   CPU: 15 UID: 0 PID: 1506 Comm: ibv_rc_pingpong Not tainted 6.12.0-rc7+ #1626\n   Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS rel-1.13.0-0-gf21b5a4aeb02-prebuilt.qemu.org 04/01/2014\n   RIP: 0010:mlx5r_umr_post_send_wait+0x15a/0x2b0 [mlx5_ib]\n   [..]\n   Call Trace:\n   <TASK>\n   mlx5r_umr_update_xlt+0x23c/0x3e0 [mlx5_ib]\n   mlx5_ib_invalidate_range+0x2e1/0x330 [mlx5_ib]\n   __mmu_notifier_invalidate_range_start+0x1e1/0x240\n   zap_page_range_single+0xf1/0x1a0\n   madvise_vma_behavior+0x677/0x6e0\n   do_madvise+0x1a2/0x4b0\n   __x64_sys_madvise+0x25/0x30\n   do_syscall_64+0x6b/0x140\n   entry_SYSCALL_64_after_hwframe+0x76/0x7e",
					"category":"description",
					"title":"Vulnerability Description"
				}
			],
			"product_status":{
				"fixed":[
					"openEuler-24.03-LTS:bpftool-6.6.0-82.0.0.75.oe2403.aarch64",
					"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-82.0.0.75.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-6.6.0-82.0.0.75.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-82.0.0.75.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-debugsource-6.6.0-82.0.0.75.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-devel-6.6.0-82.0.0.75.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-headers-6.6.0-82.0.0.75.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-source-6.6.0-82.0.0.75.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-tools-6.6.0-82.0.0.75.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-82.0.0.75.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-82.0.0.75.oe2403.aarch64",
					"openEuler-24.03-LTS:perf-6.6.0-82.0.0.75.oe2403.aarch64",
					"openEuler-24.03-LTS:perf-debuginfo-6.6.0-82.0.0.75.oe2403.aarch64",
					"openEuler-24.03-LTS:python3-perf-6.6.0-82.0.0.75.oe2403.aarch64",
					"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-82.0.0.75.oe2403.aarch64",
					"openEuler-24.03-LTS:bpftool-6.6.0-82.0.0.75.oe2403.x86_64",
					"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-82.0.0.75.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-6.6.0-82.0.0.75.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-82.0.0.75.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-debugsource-6.6.0-82.0.0.75.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-devel-6.6.0-82.0.0.75.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-headers-6.6.0-82.0.0.75.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-source-6.6.0-82.0.0.75.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-tools-6.6.0-82.0.0.75.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-82.0.0.75.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-82.0.0.75.oe2403.x86_64",
					"openEuler-24.03-LTS:perf-6.6.0-82.0.0.75.oe2403.x86_64",
					"openEuler-24.03-LTS:perf-debuginfo-6.6.0-82.0.0.75.oe2403.x86_64",
					"openEuler-24.03-LTS:python3-perf-6.6.0-82.0.0.75.oe2403.x86_64",
					"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-82.0.0.75.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-6.6.0-82.0.0.75.oe2403.src"
				]
			},
			"remediations":[
				{
					"product_ids":[
						"openEuler-24.03-LTS:bpftool-6.6.0-82.0.0.75.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-82.0.0.75.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-6.6.0-82.0.0.75.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-82.0.0.75.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-82.0.0.75.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-82.0.0.75.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-82.0.0.75.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-82.0.0.75.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-82.0.0.75.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-82.0.0.75.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-82.0.0.75.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-6.6.0-82.0.0.75.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-82.0.0.75.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-82.0.0.75.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-82.0.0.75.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-6.6.0-82.0.0.75.oe2403.x86_64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-82.0.0.75.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-6.6.0-82.0.0.75.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-82.0.0.75.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-82.0.0.75.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-82.0.0.75.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-82.0.0.75.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-82.0.0.75.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-82.0.0.75.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-82.0.0.75.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-82.0.0.75.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-6.6.0-82.0.0.75.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-82.0.0.75.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-82.0.0.75.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-82.0.0.75.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-6.6.0-82.0.0.75.oe2403.src"
					],
					"details":"kernel security update",
					"category":"vendor_fix",
					"url":"https://www.openeuler.org/zh/security/security-bulletins/detail/?id=openEuler-SA-2025-1285"
				}
			],
			"scores":[
				{
					"cvss_v3":{
						"baseSeverity":"MEDIUM",
						"baseScore":5.5,
						"vectorString":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
						"version":"3.1"
					},
					"products":[
						"openEuler-24.03-LTS:bpftool-6.6.0-82.0.0.75.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-82.0.0.75.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-6.6.0-82.0.0.75.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-82.0.0.75.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-82.0.0.75.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-82.0.0.75.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-82.0.0.75.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-82.0.0.75.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-82.0.0.75.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-82.0.0.75.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-82.0.0.75.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-6.6.0-82.0.0.75.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-82.0.0.75.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-82.0.0.75.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-82.0.0.75.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-6.6.0-82.0.0.75.oe2403.x86_64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-82.0.0.75.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-6.6.0-82.0.0.75.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-82.0.0.75.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-82.0.0.75.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-82.0.0.75.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-82.0.0.75.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-82.0.0.75.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-82.0.0.75.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-82.0.0.75.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-82.0.0.75.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-6.6.0-82.0.0.75.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-82.0.0.75.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-82.0.0.75.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-82.0.0.75.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-6.6.0-82.0.0.75.oe2403.src"
					]
				}
			],
			"threats":[
				{
					"details":"Medium",
					"category":"impact"
				}
			],
			"title":"CVE-2025-21732"
		},
		{
			"cve":"CVE-2025-21736",
			"notes":[
				{
					"text":"In the Linux kernel, the following vulnerability has been resolved:\n\nnilfs2: fix possible int overflows in nilfs_fiemap()\n\nSince nilfs_bmap_lookup_contig() in nilfs_fiemap() calculates its result\nby being prepared to go through potentially maxblocks == INT_MAX blocks,\nthe value in n may experience an overflow caused by left shift of blkbits.\n\nWhile it is extremely unlikely to occur, play it safe and cast right hand\nexpression to wider type to mitigate the issue.\n\nFound by Linux Verification Center (linuxtesting.org) with static analysis\ntool SVACE.",
					"category":"description",
					"title":"Vulnerability Description"
				}
			],
			"product_status":{
				"fixed":[
					"openEuler-24.03-LTS:bpftool-6.6.0-82.0.0.75.oe2403.aarch64",
					"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-82.0.0.75.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-6.6.0-82.0.0.75.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-82.0.0.75.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-debugsource-6.6.0-82.0.0.75.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-devel-6.6.0-82.0.0.75.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-headers-6.6.0-82.0.0.75.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-source-6.6.0-82.0.0.75.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-tools-6.6.0-82.0.0.75.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-82.0.0.75.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-82.0.0.75.oe2403.aarch64",
					"openEuler-24.03-LTS:perf-6.6.0-82.0.0.75.oe2403.aarch64",
					"openEuler-24.03-LTS:perf-debuginfo-6.6.0-82.0.0.75.oe2403.aarch64",
					"openEuler-24.03-LTS:python3-perf-6.6.0-82.0.0.75.oe2403.aarch64",
					"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-82.0.0.75.oe2403.aarch64",
					"openEuler-24.03-LTS:bpftool-6.6.0-82.0.0.75.oe2403.x86_64",
					"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-82.0.0.75.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-6.6.0-82.0.0.75.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-82.0.0.75.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-debugsource-6.6.0-82.0.0.75.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-devel-6.6.0-82.0.0.75.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-headers-6.6.0-82.0.0.75.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-source-6.6.0-82.0.0.75.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-tools-6.6.0-82.0.0.75.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-82.0.0.75.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-82.0.0.75.oe2403.x86_64",
					"openEuler-24.03-LTS:perf-6.6.0-82.0.0.75.oe2403.x86_64",
					"openEuler-24.03-LTS:perf-debuginfo-6.6.0-82.0.0.75.oe2403.x86_64",
					"openEuler-24.03-LTS:python3-perf-6.6.0-82.0.0.75.oe2403.x86_64",
					"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-82.0.0.75.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-6.6.0-82.0.0.75.oe2403.src"
				]
			},
			"remediations":[
				{
					"product_ids":[
						"openEuler-24.03-LTS:bpftool-6.6.0-82.0.0.75.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-82.0.0.75.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-6.6.0-82.0.0.75.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-82.0.0.75.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-82.0.0.75.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-82.0.0.75.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-82.0.0.75.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-82.0.0.75.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-82.0.0.75.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-82.0.0.75.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-82.0.0.75.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-6.6.0-82.0.0.75.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-82.0.0.75.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-82.0.0.75.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-82.0.0.75.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-6.6.0-82.0.0.75.oe2403.x86_64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-82.0.0.75.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-6.6.0-82.0.0.75.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-82.0.0.75.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-82.0.0.75.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-82.0.0.75.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-82.0.0.75.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-82.0.0.75.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-82.0.0.75.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-82.0.0.75.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-82.0.0.75.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-6.6.0-82.0.0.75.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-82.0.0.75.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-82.0.0.75.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-82.0.0.75.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-6.6.0-82.0.0.75.oe2403.src"
					],
					"details":"kernel security update",
					"category":"vendor_fix",
					"url":"https://www.openeuler.org/zh/security/security-bulletins/detail/?id=openEuler-SA-2025-1285"
				}
			],
			"scores":[
				{
					"cvss_v3":{
						"baseSeverity":"MEDIUM",
						"baseScore":5.5,
						"vectorString":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
						"version":"3.1"
					},
					"products":[
						"openEuler-24.03-LTS:bpftool-6.6.0-82.0.0.75.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-82.0.0.75.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-6.6.0-82.0.0.75.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-82.0.0.75.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-82.0.0.75.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-82.0.0.75.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-82.0.0.75.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-82.0.0.75.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-82.0.0.75.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-82.0.0.75.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-82.0.0.75.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-6.6.0-82.0.0.75.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-82.0.0.75.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-82.0.0.75.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-82.0.0.75.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-6.6.0-82.0.0.75.oe2403.x86_64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-82.0.0.75.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-6.6.0-82.0.0.75.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-82.0.0.75.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-82.0.0.75.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-82.0.0.75.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-82.0.0.75.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-82.0.0.75.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-82.0.0.75.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-82.0.0.75.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-82.0.0.75.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-6.6.0-82.0.0.75.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-82.0.0.75.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-82.0.0.75.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-82.0.0.75.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-6.6.0-82.0.0.75.oe2403.src"
					]
				}
			],
			"threats":[
				{
					"details":"Medium",
					"category":"impact"
				}
			],
			"title":"CVE-2025-21736"
		},
		{
			"cve":"CVE-2025-21743",
			"notes":[
				{
					"text":"In the Linux kernel, the following vulnerability has been resolved:\n\nusbnet: ipheth: fix possible overflow in DPE length check\n\nOriginally, it was possible for the DPE length check to overflow if\nwDatagramIndex + wDatagramLength > U16_MAX. This could lead to an OoB\nread.\n\nMove the wDatagramIndex term to the other side of the inequality.\n\nAn existing condition ensures that wDatagramIndex < urb->actual_length.",
					"category":"description",
					"title":"Vulnerability Description"
				}
			],
			"product_status":{
				"fixed":[
					"openEuler-24.03-LTS:bpftool-6.6.0-82.0.0.75.oe2403.aarch64",
					"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-82.0.0.75.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-6.6.0-82.0.0.75.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-82.0.0.75.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-debugsource-6.6.0-82.0.0.75.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-devel-6.6.0-82.0.0.75.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-headers-6.6.0-82.0.0.75.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-source-6.6.0-82.0.0.75.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-tools-6.6.0-82.0.0.75.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-82.0.0.75.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-82.0.0.75.oe2403.aarch64",
					"openEuler-24.03-LTS:perf-6.6.0-82.0.0.75.oe2403.aarch64",
					"openEuler-24.03-LTS:perf-debuginfo-6.6.0-82.0.0.75.oe2403.aarch64",
					"openEuler-24.03-LTS:python3-perf-6.6.0-82.0.0.75.oe2403.aarch64",
					"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-82.0.0.75.oe2403.aarch64",
					"openEuler-24.03-LTS:bpftool-6.6.0-82.0.0.75.oe2403.x86_64",
					"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-82.0.0.75.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-6.6.0-82.0.0.75.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-82.0.0.75.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-debugsource-6.6.0-82.0.0.75.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-devel-6.6.0-82.0.0.75.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-headers-6.6.0-82.0.0.75.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-source-6.6.0-82.0.0.75.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-tools-6.6.0-82.0.0.75.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-82.0.0.75.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-82.0.0.75.oe2403.x86_64",
					"openEuler-24.03-LTS:perf-6.6.0-82.0.0.75.oe2403.x86_64",
					"openEuler-24.03-LTS:perf-debuginfo-6.6.0-82.0.0.75.oe2403.x86_64",
					"openEuler-24.03-LTS:python3-perf-6.6.0-82.0.0.75.oe2403.x86_64",
					"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-82.0.0.75.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-6.6.0-82.0.0.75.oe2403.src"
				]
			},
			"remediations":[
				{
					"product_ids":[
						"openEuler-24.03-LTS:bpftool-6.6.0-82.0.0.75.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-82.0.0.75.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-6.6.0-82.0.0.75.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-82.0.0.75.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-82.0.0.75.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-82.0.0.75.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-82.0.0.75.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-82.0.0.75.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-82.0.0.75.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-82.0.0.75.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-82.0.0.75.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-6.6.0-82.0.0.75.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-82.0.0.75.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-82.0.0.75.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-82.0.0.75.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-6.6.0-82.0.0.75.oe2403.x86_64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-82.0.0.75.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-6.6.0-82.0.0.75.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-82.0.0.75.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-82.0.0.75.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-82.0.0.75.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-82.0.0.75.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-82.0.0.75.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-82.0.0.75.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-82.0.0.75.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-82.0.0.75.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-6.6.0-82.0.0.75.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-82.0.0.75.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-82.0.0.75.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-82.0.0.75.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-6.6.0-82.0.0.75.oe2403.src"
					],
					"details":"kernel security update",
					"category":"vendor_fix",
					"url":"https://www.openeuler.org/zh/security/security-bulletins/detail/?id=openEuler-SA-2025-1285"
				}
			],
			"scores":[
				{
					"cvss_v3":{
						"baseSeverity":"HIGH",
						"baseScore":7.1,
						"vectorString":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H",
						"version":"3.1"
					},
					"products":[
						"openEuler-24.03-LTS:bpftool-6.6.0-82.0.0.75.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-82.0.0.75.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-6.6.0-82.0.0.75.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-82.0.0.75.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-82.0.0.75.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-82.0.0.75.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-82.0.0.75.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-82.0.0.75.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-82.0.0.75.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-82.0.0.75.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-82.0.0.75.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-6.6.0-82.0.0.75.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-82.0.0.75.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-82.0.0.75.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-82.0.0.75.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-6.6.0-82.0.0.75.oe2403.x86_64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-82.0.0.75.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-6.6.0-82.0.0.75.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-82.0.0.75.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-82.0.0.75.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-82.0.0.75.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-82.0.0.75.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-82.0.0.75.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-82.0.0.75.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-82.0.0.75.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-82.0.0.75.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-6.6.0-82.0.0.75.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-82.0.0.75.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-82.0.0.75.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-82.0.0.75.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-6.6.0-82.0.0.75.oe2403.src"
					]
				}
			],
			"threats":[
				{
					"details":"High",
					"category":"impact"
				}
			],
			"title":"CVE-2025-21743"
		},
		{
			"cve":"CVE-2025-21767",
			"notes":[
				{
					"text":"In the Linux kernel, the following vulnerability has been resolved:\n\nclocksource: Use migrate_disable() to avoid calling get_random_u32() in atomic context\n\nThe following bug report happened with a PREEMPT_RT kernel:\n\n  BUG: sleeping function called from invalid context at kernel/locking/spinlock_rt.c:48\n  in_atomic(): 1, irqs_disabled(): 0, non_block: 0, pid: 2012, name: kwatchdog\n  preempt_count: 1, expected: 0\n  RCU nest depth: 0, expected: 0\n  get_random_u32+0x4f/0x110\n  clocksource_verify_choose_cpus+0xab/0x1a0\n  clocksource_verify_percpu.part.0+0x6b/0x330\n  clocksource_watchdog_kthread+0x193/0x1a0\n\nIt is due to the fact that clocksource_verify_choose_cpus() is invoked with\npreemption disabled.  This function invokes get_random_u32() to obtain\nrandom numbers for choosing CPUs.  The batched_entropy_32 local lock and/or\nthe base_crng.lock spinlock in driver/char/random.c will be acquired during\nthe call. In PREEMPT_RT kernel, they are both sleeping locks and so cannot\nbe acquired in atomic context.\n\nFix this problem by using migrate_disable() to allow smp_processor_id() to\nbe reliably used without introducing atomic context. preempt_disable() is\nthen called after clocksource_verify_choose_cpus() but before the\nclocksource measurement is being run to avoid introducing unexpected\nlatency.",
					"category":"description",
					"title":"Vulnerability Description"
				}
			],
			"product_status":{
				"fixed":[
					"openEuler-24.03-LTS:bpftool-6.6.0-82.0.0.75.oe2403.aarch64",
					"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-82.0.0.75.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-6.6.0-82.0.0.75.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-82.0.0.75.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-debugsource-6.6.0-82.0.0.75.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-devel-6.6.0-82.0.0.75.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-headers-6.6.0-82.0.0.75.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-source-6.6.0-82.0.0.75.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-tools-6.6.0-82.0.0.75.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-82.0.0.75.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-82.0.0.75.oe2403.aarch64",
					"openEuler-24.03-LTS:perf-6.6.0-82.0.0.75.oe2403.aarch64",
					"openEuler-24.03-LTS:perf-debuginfo-6.6.0-82.0.0.75.oe2403.aarch64",
					"openEuler-24.03-LTS:python3-perf-6.6.0-82.0.0.75.oe2403.aarch64",
					"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-82.0.0.75.oe2403.aarch64",
					"openEuler-24.03-LTS:bpftool-6.6.0-82.0.0.75.oe2403.x86_64",
					"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-82.0.0.75.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-6.6.0-82.0.0.75.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-82.0.0.75.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-debugsource-6.6.0-82.0.0.75.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-devel-6.6.0-82.0.0.75.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-headers-6.6.0-82.0.0.75.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-source-6.6.0-82.0.0.75.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-tools-6.6.0-82.0.0.75.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-82.0.0.75.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-82.0.0.75.oe2403.x86_64",
					"openEuler-24.03-LTS:perf-6.6.0-82.0.0.75.oe2403.x86_64",
					"openEuler-24.03-LTS:perf-debuginfo-6.6.0-82.0.0.75.oe2403.x86_64",
					"openEuler-24.03-LTS:python3-perf-6.6.0-82.0.0.75.oe2403.x86_64",
					"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-82.0.0.75.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-6.6.0-82.0.0.75.oe2403.src"
				]
			},
			"remediations":[
				{
					"product_ids":[
						"openEuler-24.03-LTS:bpftool-6.6.0-82.0.0.75.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-82.0.0.75.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-6.6.0-82.0.0.75.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-82.0.0.75.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-82.0.0.75.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-82.0.0.75.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-82.0.0.75.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-82.0.0.75.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-82.0.0.75.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-82.0.0.75.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-82.0.0.75.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-6.6.0-82.0.0.75.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-82.0.0.75.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-82.0.0.75.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-82.0.0.75.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-6.6.0-82.0.0.75.oe2403.x86_64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-82.0.0.75.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-6.6.0-82.0.0.75.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-82.0.0.75.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-82.0.0.75.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-82.0.0.75.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-82.0.0.75.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-82.0.0.75.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-82.0.0.75.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-82.0.0.75.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-82.0.0.75.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-6.6.0-82.0.0.75.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-82.0.0.75.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-82.0.0.75.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-82.0.0.75.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-6.6.0-82.0.0.75.oe2403.src"
					],
					"details":"kernel security update",
					"category":"vendor_fix",
					"url":"https://www.openeuler.org/zh/security/security-bulletins/detail/?id=openEuler-SA-2025-1285"
				}
			],
			"scores":[
				{
					"cvss_v3":{
						"baseSeverity":"LOW",
						"baseScore":3.9,
						"vectorString":"CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:L/I:L/A:L",
						"version":"3.1"
					},
					"products":[
						"openEuler-24.03-LTS:bpftool-6.6.0-82.0.0.75.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-82.0.0.75.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-6.6.0-82.0.0.75.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-82.0.0.75.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-82.0.0.75.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-82.0.0.75.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-82.0.0.75.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-82.0.0.75.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-82.0.0.75.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-82.0.0.75.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-82.0.0.75.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-6.6.0-82.0.0.75.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-82.0.0.75.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-82.0.0.75.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-82.0.0.75.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-6.6.0-82.0.0.75.oe2403.x86_64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-82.0.0.75.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-6.6.0-82.0.0.75.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-82.0.0.75.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-82.0.0.75.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-82.0.0.75.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-82.0.0.75.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-82.0.0.75.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-82.0.0.75.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-82.0.0.75.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-82.0.0.75.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-6.6.0-82.0.0.75.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-82.0.0.75.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-82.0.0.75.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-82.0.0.75.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-6.6.0-82.0.0.75.oe2403.src"
					]
				}
			],
			"threats":[
				{
					"details":"Low",
					"category":"impact"
				}
			],
			"title":"CVE-2025-21767"
		},
		{
			"cve":"CVE-2025-21776",
			"notes":[
				{
					"text":"In the Linux kernel, the following vulnerability has been resolved:\n\nUSB: hub: Ignore non-compliant devices with too many configs or interfaces\n\nRobert Morris created a test program which can cause\nusb_hub_to_struct_hub() to dereference a NULL or inappropriate\npointer:\n\nOops: general protection fault, probably for non-canonical address\n0xcccccccccccccccc: 0000 [#1] SMP DEBUG_PAGEALLOC PTI\nCPU: 7 UID: 0 PID: 117 Comm: kworker/7:1 Not tainted 6.13.0-rc3-00017-gf44d154d6e3d #14\nHardware name: FreeBSD BHYVE/BHYVE, BIOS 14.0 10/17/2021\nWorkqueue: usb_hub_wq hub_event\nRIP: 0010:usb_hub_adjust_deviceremovable+0x78/0x110\n...\nCall Trace:\n <TASK>\n ? die_addr+0x31/0x80\n ? exc_general_protection+0x1b4/0x3c0\n ? asm_exc_general_protection+0x26/0x30\n ? usb_hub_adjust_deviceremovable+0x78/0x110\n hub_probe+0x7c7/0xab0\n usb_probe_interface+0x14b/0x350\n really_probe+0xd0/0x2d0\n ? __pfx___device_attach_driver+0x10/0x10\n __driver_probe_device+0x6e/0x110\n driver_probe_device+0x1a/0x90\n __device_attach_driver+0x7e/0xc0\n bus_for_each_drv+0x7f/0xd0\n __device_attach+0xaa/0x1a0\n bus_probe_device+0x8b/0xa0\n device_add+0x62e/0x810\n usb_set_configuration+0x65d/0x990\n usb_generic_driver_probe+0x4b/0x70\n usb_probe_device+0x36/0xd0\n\nThe cause of this error is that the device has two interfaces, and the\nhub driver binds to interface 1 instead of interface 0, which is where\nusb_hub_to_struct_hub() looks.\n\nWe can prevent the problem from occurring by refusing to accept hub\ndevices that violate the USB spec by having more than one\nconfiguration or interface.",
					"category":"description",
					"title":"Vulnerability Description"
				}
			],
			"product_status":{
				"fixed":[
					"openEuler-24.03-LTS:bpftool-6.6.0-82.0.0.75.oe2403.aarch64",
					"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-82.0.0.75.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-6.6.0-82.0.0.75.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-82.0.0.75.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-debugsource-6.6.0-82.0.0.75.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-devel-6.6.0-82.0.0.75.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-headers-6.6.0-82.0.0.75.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-source-6.6.0-82.0.0.75.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-tools-6.6.0-82.0.0.75.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-82.0.0.75.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-82.0.0.75.oe2403.aarch64",
					"openEuler-24.03-LTS:perf-6.6.0-82.0.0.75.oe2403.aarch64",
					"openEuler-24.03-LTS:perf-debuginfo-6.6.0-82.0.0.75.oe2403.aarch64",
					"openEuler-24.03-LTS:python3-perf-6.6.0-82.0.0.75.oe2403.aarch64",
					"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-82.0.0.75.oe2403.aarch64",
					"openEuler-24.03-LTS:bpftool-6.6.0-82.0.0.75.oe2403.x86_64",
					"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-82.0.0.75.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-6.6.0-82.0.0.75.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-82.0.0.75.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-debugsource-6.6.0-82.0.0.75.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-devel-6.6.0-82.0.0.75.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-headers-6.6.0-82.0.0.75.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-source-6.6.0-82.0.0.75.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-tools-6.6.0-82.0.0.75.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-82.0.0.75.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-82.0.0.75.oe2403.x86_64",
					"openEuler-24.03-LTS:perf-6.6.0-82.0.0.75.oe2403.x86_64",
					"openEuler-24.03-LTS:perf-debuginfo-6.6.0-82.0.0.75.oe2403.x86_64",
					"openEuler-24.03-LTS:python3-perf-6.6.0-82.0.0.75.oe2403.x86_64",
					"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-82.0.0.75.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-6.6.0-82.0.0.75.oe2403.src"
				]
			},
			"remediations":[
				{
					"product_ids":[
						"openEuler-24.03-LTS:bpftool-6.6.0-82.0.0.75.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-82.0.0.75.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-6.6.0-82.0.0.75.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-82.0.0.75.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-82.0.0.75.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-82.0.0.75.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-82.0.0.75.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-82.0.0.75.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-82.0.0.75.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-82.0.0.75.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-82.0.0.75.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-6.6.0-82.0.0.75.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-82.0.0.75.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-82.0.0.75.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-82.0.0.75.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-6.6.0-82.0.0.75.oe2403.x86_64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-82.0.0.75.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-6.6.0-82.0.0.75.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-82.0.0.75.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-82.0.0.75.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-82.0.0.75.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-82.0.0.75.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-82.0.0.75.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-82.0.0.75.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-82.0.0.75.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-82.0.0.75.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-6.6.0-82.0.0.75.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-82.0.0.75.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-82.0.0.75.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-82.0.0.75.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-6.6.0-82.0.0.75.oe2403.src"
					],
					"details":"kernel security update",
					"category":"vendor_fix",
					"url":"https://www.openeuler.org/zh/security/security-bulletins/detail/?id=openEuler-SA-2025-1285"
				}
			],
			"scores":[
				{
					"cvss_v3":{
						"baseSeverity":"MEDIUM",
						"baseScore":5.5,
						"vectorString":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
						"version":"3.1"
					},
					"products":[
						"openEuler-24.03-LTS:bpftool-6.6.0-82.0.0.75.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-82.0.0.75.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-6.6.0-82.0.0.75.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-82.0.0.75.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-82.0.0.75.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-82.0.0.75.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-82.0.0.75.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-82.0.0.75.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-82.0.0.75.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-82.0.0.75.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-82.0.0.75.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-6.6.0-82.0.0.75.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-82.0.0.75.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-82.0.0.75.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-82.0.0.75.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-6.6.0-82.0.0.75.oe2403.x86_64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-82.0.0.75.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-6.6.0-82.0.0.75.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-82.0.0.75.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-82.0.0.75.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-82.0.0.75.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-82.0.0.75.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-82.0.0.75.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-82.0.0.75.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-82.0.0.75.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-82.0.0.75.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-6.6.0-82.0.0.75.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-82.0.0.75.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-82.0.0.75.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-82.0.0.75.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-6.6.0-82.0.0.75.oe2403.src"
					]
				}
			],
			"threats":[
				{
					"details":"Medium",
					"category":"impact"
				}
			],
			"title":"CVE-2025-21776"
		},
		{
			"cve":"CVE-2025-21782",
			"notes":[
				{
					"text":"In the Linux kernel, the following vulnerability has been resolved:\n\norangefs: fix a oob in orangefs_debug_write\n\nI got a syzbot report: slab-out-of-bounds Read in\norangefs_debug_write... several people suggested fixes,\nI tested Al Viro's suggestion and made this patch.",
					"category":"description",
					"title":"Vulnerability Description"
				}
			],
			"product_status":{
				"fixed":[
					"openEuler-24.03-LTS:bpftool-6.6.0-82.0.0.75.oe2403.aarch64",
					"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-82.0.0.75.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-6.6.0-82.0.0.75.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-82.0.0.75.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-debugsource-6.6.0-82.0.0.75.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-devel-6.6.0-82.0.0.75.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-headers-6.6.0-82.0.0.75.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-source-6.6.0-82.0.0.75.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-tools-6.6.0-82.0.0.75.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-82.0.0.75.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-82.0.0.75.oe2403.aarch64",
					"openEuler-24.03-LTS:perf-6.6.0-82.0.0.75.oe2403.aarch64",
					"openEuler-24.03-LTS:perf-debuginfo-6.6.0-82.0.0.75.oe2403.aarch64",
					"openEuler-24.03-LTS:python3-perf-6.6.0-82.0.0.75.oe2403.aarch64",
					"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-82.0.0.75.oe2403.aarch64",
					"openEuler-24.03-LTS:bpftool-6.6.0-82.0.0.75.oe2403.x86_64",
					"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-82.0.0.75.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-6.6.0-82.0.0.75.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-82.0.0.75.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-debugsource-6.6.0-82.0.0.75.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-devel-6.6.0-82.0.0.75.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-headers-6.6.0-82.0.0.75.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-source-6.6.0-82.0.0.75.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-tools-6.6.0-82.0.0.75.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-82.0.0.75.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-82.0.0.75.oe2403.x86_64",
					"openEuler-24.03-LTS:perf-6.6.0-82.0.0.75.oe2403.x86_64",
					"openEuler-24.03-LTS:perf-debuginfo-6.6.0-82.0.0.75.oe2403.x86_64",
					"openEuler-24.03-LTS:python3-perf-6.6.0-82.0.0.75.oe2403.x86_64",
					"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-82.0.0.75.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-6.6.0-82.0.0.75.oe2403.src"
				]
			},
			"remediations":[
				{
					"product_ids":[
						"openEuler-24.03-LTS:bpftool-6.6.0-82.0.0.75.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-82.0.0.75.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-6.6.0-82.0.0.75.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-82.0.0.75.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-82.0.0.75.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-82.0.0.75.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-82.0.0.75.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-82.0.0.75.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-82.0.0.75.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-82.0.0.75.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-82.0.0.75.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-6.6.0-82.0.0.75.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-82.0.0.75.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-82.0.0.75.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-82.0.0.75.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-6.6.0-82.0.0.75.oe2403.x86_64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-82.0.0.75.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-6.6.0-82.0.0.75.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-82.0.0.75.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-82.0.0.75.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-82.0.0.75.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-82.0.0.75.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-82.0.0.75.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-82.0.0.75.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-82.0.0.75.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-82.0.0.75.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-6.6.0-82.0.0.75.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-82.0.0.75.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-82.0.0.75.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-82.0.0.75.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-6.6.0-82.0.0.75.oe2403.src"
					],
					"details":"kernel security update",
					"category":"vendor_fix",
					"url":"https://www.openeuler.org/zh/security/security-bulletins/detail/?id=openEuler-SA-2025-1285"
				}
			],
			"scores":[
				{
					"cvss_v3":{
						"baseSeverity":"HIGH",
						"baseScore":7.1,
						"vectorString":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H",
						"version":"3.1"
					},
					"products":[
						"openEuler-24.03-LTS:bpftool-6.6.0-82.0.0.75.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-82.0.0.75.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-6.6.0-82.0.0.75.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-82.0.0.75.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-82.0.0.75.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-82.0.0.75.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-82.0.0.75.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-82.0.0.75.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-82.0.0.75.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-82.0.0.75.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-82.0.0.75.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-6.6.0-82.0.0.75.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-82.0.0.75.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-82.0.0.75.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-82.0.0.75.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-6.6.0-82.0.0.75.oe2403.x86_64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-82.0.0.75.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-6.6.0-82.0.0.75.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-82.0.0.75.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-82.0.0.75.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-82.0.0.75.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-82.0.0.75.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-82.0.0.75.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-82.0.0.75.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-82.0.0.75.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-82.0.0.75.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-6.6.0-82.0.0.75.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-82.0.0.75.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-82.0.0.75.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-82.0.0.75.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-6.6.0-82.0.0.75.oe2403.src"
					]
				}
			],
			"threats":[
				{
					"details":"High",
					"category":"impact"
				}
			],
			"title":"CVE-2025-21782"
		},
		{
			"cve":"CVE-2025-21783",
			"notes":[
				{
					"text":"In the Linux kernel, the following vulnerability has been resolved:\n\ngpiolib: Fix crash on error in gpiochip_get_ngpios()\n\nThe gpiochip_get_ngpios() uses chip_*() macros to print messages.\nHowever these macros rely on gpiodev to be initialised and set,\nwhich is not the case when called via bgpio_init(). In such a case\nthe printing messages will crash on NULL pointer dereference.\nReplace chip_*() macros by the respective dev_*() ones to avoid\nsuch crash.",
					"category":"description",
					"title":"Vulnerability Description"
				}
			],
			"product_status":{
				"fixed":[
					"openEuler-24.03-LTS:bpftool-6.6.0-82.0.0.75.oe2403.aarch64",
					"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-82.0.0.75.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-6.6.0-82.0.0.75.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-82.0.0.75.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-debugsource-6.6.0-82.0.0.75.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-devel-6.6.0-82.0.0.75.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-headers-6.6.0-82.0.0.75.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-source-6.6.0-82.0.0.75.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-tools-6.6.0-82.0.0.75.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-82.0.0.75.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-82.0.0.75.oe2403.aarch64",
					"openEuler-24.03-LTS:perf-6.6.0-82.0.0.75.oe2403.aarch64",
					"openEuler-24.03-LTS:perf-debuginfo-6.6.0-82.0.0.75.oe2403.aarch64",
					"openEuler-24.03-LTS:python3-perf-6.6.0-82.0.0.75.oe2403.aarch64",
					"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-82.0.0.75.oe2403.aarch64",
					"openEuler-24.03-LTS:bpftool-6.6.0-82.0.0.75.oe2403.x86_64",
					"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-82.0.0.75.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-6.6.0-82.0.0.75.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-82.0.0.75.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-debugsource-6.6.0-82.0.0.75.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-devel-6.6.0-82.0.0.75.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-headers-6.6.0-82.0.0.75.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-source-6.6.0-82.0.0.75.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-tools-6.6.0-82.0.0.75.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-82.0.0.75.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-82.0.0.75.oe2403.x86_64",
					"openEuler-24.03-LTS:perf-6.6.0-82.0.0.75.oe2403.x86_64",
					"openEuler-24.03-LTS:perf-debuginfo-6.6.0-82.0.0.75.oe2403.x86_64",
					"openEuler-24.03-LTS:python3-perf-6.6.0-82.0.0.75.oe2403.x86_64",
					"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-82.0.0.75.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-6.6.0-82.0.0.75.oe2403.src"
				]
			},
			"remediations":[
				{
					"product_ids":[
						"openEuler-24.03-LTS:bpftool-6.6.0-82.0.0.75.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-82.0.0.75.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-6.6.0-82.0.0.75.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-82.0.0.75.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-82.0.0.75.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-82.0.0.75.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-82.0.0.75.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-82.0.0.75.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-82.0.0.75.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-82.0.0.75.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-82.0.0.75.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-6.6.0-82.0.0.75.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-82.0.0.75.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-82.0.0.75.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-82.0.0.75.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-6.6.0-82.0.0.75.oe2403.x86_64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-82.0.0.75.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-6.6.0-82.0.0.75.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-82.0.0.75.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-82.0.0.75.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-82.0.0.75.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-82.0.0.75.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-82.0.0.75.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-82.0.0.75.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-82.0.0.75.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-82.0.0.75.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-6.6.0-82.0.0.75.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-82.0.0.75.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-82.0.0.75.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-82.0.0.75.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-6.6.0-82.0.0.75.oe2403.src"
					],
					"details":"kernel security update",
					"category":"vendor_fix",
					"url":"https://www.openeuler.org/zh/security/security-bulletins/detail/?id=openEuler-SA-2025-1285"
				}
			],
			"scores":[
				{
					"cvss_v3":{
						"baseSeverity":"MEDIUM",
						"baseScore":5.5,
						"vectorString":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
						"version":"3.1"
					},
					"products":[
						"openEuler-24.03-LTS:bpftool-6.6.0-82.0.0.75.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-82.0.0.75.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-6.6.0-82.0.0.75.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-82.0.0.75.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-82.0.0.75.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-82.0.0.75.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-82.0.0.75.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-82.0.0.75.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-82.0.0.75.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-82.0.0.75.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-82.0.0.75.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-6.6.0-82.0.0.75.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-82.0.0.75.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-82.0.0.75.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-82.0.0.75.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-6.6.0-82.0.0.75.oe2403.x86_64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-82.0.0.75.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-6.6.0-82.0.0.75.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-82.0.0.75.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-82.0.0.75.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-82.0.0.75.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-82.0.0.75.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-82.0.0.75.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-82.0.0.75.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-82.0.0.75.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-82.0.0.75.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-6.6.0-82.0.0.75.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-82.0.0.75.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-82.0.0.75.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-82.0.0.75.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-6.6.0-82.0.0.75.oe2403.src"
					]
				}
			],
			"threats":[
				{
					"details":"Medium",
					"category":"impact"
				}
			],
			"title":"CVE-2025-21783"
		},
		{
			"cve":"CVE-2025-21789",
			"notes":[
				{
					"text":"In the Linux kernel, the following vulnerability has been resolved:\n\nLoongArch: csum: Fix OoB access in IP checksum code for negative lengths\n\nCommit 69e3a6aa6be2 (\"LoongArch: Add checksum optimization for 64-bit\nsystem\") would cause an undefined shift and an out-of-bounds read.\n\nCommit 8bd795fedb84 (\"arm64: csum: Fix OoB access in IP checksum code\nfor negative lengths\") fixes the same issue on ARM64.",
					"category":"description",
					"title":"Vulnerability Description"
				}
			],
			"product_status":{
				"fixed":[
					"openEuler-24.03-LTS:bpftool-6.6.0-82.0.0.75.oe2403.aarch64",
					"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-82.0.0.75.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-6.6.0-82.0.0.75.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-82.0.0.75.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-debugsource-6.6.0-82.0.0.75.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-devel-6.6.0-82.0.0.75.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-headers-6.6.0-82.0.0.75.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-source-6.6.0-82.0.0.75.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-tools-6.6.0-82.0.0.75.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-82.0.0.75.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-82.0.0.75.oe2403.aarch64",
					"openEuler-24.03-LTS:perf-6.6.0-82.0.0.75.oe2403.aarch64",
					"openEuler-24.03-LTS:perf-debuginfo-6.6.0-82.0.0.75.oe2403.aarch64",
					"openEuler-24.03-LTS:python3-perf-6.6.0-82.0.0.75.oe2403.aarch64",
					"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-82.0.0.75.oe2403.aarch64",
					"openEuler-24.03-LTS:bpftool-6.6.0-82.0.0.75.oe2403.x86_64",
					"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-82.0.0.75.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-6.6.0-82.0.0.75.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-82.0.0.75.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-debugsource-6.6.0-82.0.0.75.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-devel-6.6.0-82.0.0.75.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-headers-6.6.0-82.0.0.75.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-source-6.6.0-82.0.0.75.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-tools-6.6.0-82.0.0.75.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-82.0.0.75.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-82.0.0.75.oe2403.x86_64",
					"openEuler-24.03-LTS:perf-6.6.0-82.0.0.75.oe2403.x86_64",
					"openEuler-24.03-LTS:perf-debuginfo-6.6.0-82.0.0.75.oe2403.x86_64",
					"openEuler-24.03-LTS:python3-perf-6.6.0-82.0.0.75.oe2403.x86_64",
					"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-82.0.0.75.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-6.6.0-82.0.0.75.oe2403.src"
				]
			},
			"remediations":[
				{
					"product_ids":[
						"openEuler-24.03-LTS:bpftool-6.6.0-82.0.0.75.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-82.0.0.75.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-6.6.0-82.0.0.75.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-82.0.0.75.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-82.0.0.75.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-82.0.0.75.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-82.0.0.75.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-82.0.0.75.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-82.0.0.75.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-82.0.0.75.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-82.0.0.75.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-6.6.0-82.0.0.75.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-82.0.0.75.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-82.0.0.75.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-82.0.0.75.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-6.6.0-82.0.0.75.oe2403.x86_64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-82.0.0.75.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-6.6.0-82.0.0.75.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-82.0.0.75.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-82.0.0.75.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-82.0.0.75.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-82.0.0.75.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-82.0.0.75.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-82.0.0.75.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-82.0.0.75.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-82.0.0.75.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-6.6.0-82.0.0.75.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-82.0.0.75.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-82.0.0.75.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-82.0.0.75.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-6.6.0-82.0.0.75.oe2403.src"
					],
					"details":"kernel security update",
					"category":"vendor_fix",
					"url":"https://www.openeuler.org/zh/security/security-bulletins/detail/?id=openEuler-SA-2025-1285"
				}
			],
			"scores":[
				{
					"cvss_v3":{
						"baseSeverity":"HIGH",
						"baseScore":7.1,
						"vectorString":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H",
						"version":"3.1"
					},
					"products":[
						"openEuler-24.03-LTS:bpftool-6.6.0-82.0.0.75.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-82.0.0.75.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-6.6.0-82.0.0.75.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-82.0.0.75.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-82.0.0.75.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-82.0.0.75.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-82.0.0.75.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-82.0.0.75.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-82.0.0.75.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-82.0.0.75.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-82.0.0.75.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-6.6.0-82.0.0.75.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-82.0.0.75.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-82.0.0.75.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-82.0.0.75.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-6.6.0-82.0.0.75.oe2403.x86_64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-82.0.0.75.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-6.6.0-82.0.0.75.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-82.0.0.75.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-82.0.0.75.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-82.0.0.75.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-82.0.0.75.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-82.0.0.75.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-82.0.0.75.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-82.0.0.75.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-82.0.0.75.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-6.6.0-82.0.0.75.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-82.0.0.75.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-82.0.0.75.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-82.0.0.75.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-6.6.0-82.0.0.75.oe2403.src"
					]
				}
			],
			"threats":[
				{
					"details":"High",
					"category":"impact"
				}
			],
			"title":"CVE-2025-21789"
		},
		{
			"cve":"CVE-2025-21795",
			"notes":[
				{
					"text":"In the Linux kernel, the following vulnerability has been resolved:\n\nNFSD: fix hang in nfsd4_shutdown_callback\n\nIf nfs4_client is in courtesy state then there is no point to send\nthe callback. This causes nfsd4_shutdown_callback to hang since\ncl_cb_inflight is not 0. This hang lasts about 15 minutes until TCP\nnotifies NFSD that the connection was dropped.\n\nThis patch modifies nfsd4_run_cb_work to skip the RPC call if\nnfs4_client is in courtesy state.",
					"category":"description",
					"title":"Vulnerability Description"
				}
			],
			"product_status":{
				"fixed":[
					"openEuler-24.03-LTS:bpftool-6.6.0-82.0.0.75.oe2403.aarch64",
					"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-82.0.0.75.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-6.6.0-82.0.0.75.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-82.0.0.75.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-debugsource-6.6.0-82.0.0.75.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-devel-6.6.0-82.0.0.75.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-headers-6.6.0-82.0.0.75.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-source-6.6.0-82.0.0.75.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-tools-6.6.0-82.0.0.75.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-82.0.0.75.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-82.0.0.75.oe2403.aarch64",
					"openEuler-24.03-LTS:perf-6.6.0-82.0.0.75.oe2403.aarch64",
					"openEuler-24.03-LTS:perf-debuginfo-6.6.0-82.0.0.75.oe2403.aarch64",
					"openEuler-24.03-LTS:python3-perf-6.6.0-82.0.0.75.oe2403.aarch64",
					"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-82.0.0.75.oe2403.aarch64",
					"openEuler-24.03-LTS:bpftool-6.6.0-82.0.0.75.oe2403.x86_64",
					"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-82.0.0.75.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-6.6.0-82.0.0.75.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-82.0.0.75.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-debugsource-6.6.0-82.0.0.75.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-devel-6.6.0-82.0.0.75.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-headers-6.6.0-82.0.0.75.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-source-6.6.0-82.0.0.75.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-tools-6.6.0-82.0.0.75.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-82.0.0.75.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-82.0.0.75.oe2403.x86_64",
					"openEuler-24.03-LTS:perf-6.6.0-82.0.0.75.oe2403.x86_64",
					"openEuler-24.03-LTS:perf-debuginfo-6.6.0-82.0.0.75.oe2403.x86_64",
					"openEuler-24.03-LTS:python3-perf-6.6.0-82.0.0.75.oe2403.x86_64",
					"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-82.0.0.75.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-6.6.0-82.0.0.75.oe2403.src"
				]
			},
			"remediations":[
				{
					"product_ids":[
						"openEuler-24.03-LTS:bpftool-6.6.0-82.0.0.75.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-82.0.0.75.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-6.6.0-82.0.0.75.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-82.0.0.75.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-82.0.0.75.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-82.0.0.75.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-82.0.0.75.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-82.0.0.75.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-82.0.0.75.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-82.0.0.75.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-82.0.0.75.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-6.6.0-82.0.0.75.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-82.0.0.75.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-82.0.0.75.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-82.0.0.75.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-6.6.0-82.0.0.75.oe2403.x86_64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-82.0.0.75.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-6.6.0-82.0.0.75.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-82.0.0.75.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-82.0.0.75.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-82.0.0.75.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-82.0.0.75.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-82.0.0.75.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-82.0.0.75.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-82.0.0.75.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-82.0.0.75.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-6.6.0-82.0.0.75.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-82.0.0.75.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-82.0.0.75.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-82.0.0.75.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-6.6.0-82.0.0.75.oe2403.src"
					],
					"details":"kernel security update",
					"category":"vendor_fix",
					"url":"https://www.openeuler.org/zh/security/security-bulletins/detail/?id=openEuler-SA-2025-1285"
				}
			],
			"scores":[
				{
					"cvss_v3":{
						"baseSeverity":"LOW",
						"baseScore":3.9,
						"vectorString":"CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:L/I:L/A:L",
						"version":"3.1"
					},
					"products":[
						"openEuler-24.03-LTS:bpftool-6.6.0-82.0.0.75.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-82.0.0.75.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-6.6.0-82.0.0.75.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-82.0.0.75.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-82.0.0.75.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-82.0.0.75.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-82.0.0.75.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-82.0.0.75.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-82.0.0.75.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-82.0.0.75.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-82.0.0.75.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-6.6.0-82.0.0.75.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-82.0.0.75.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-82.0.0.75.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-82.0.0.75.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-6.6.0-82.0.0.75.oe2403.x86_64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-82.0.0.75.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-6.6.0-82.0.0.75.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-82.0.0.75.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-82.0.0.75.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-82.0.0.75.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-82.0.0.75.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-82.0.0.75.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-82.0.0.75.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-82.0.0.75.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-82.0.0.75.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-6.6.0-82.0.0.75.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-82.0.0.75.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-82.0.0.75.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-82.0.0.75.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-6.6.0-82.0.0.75.oe2403.src"
					]
				}
			],
			"threats":[
				{
					"details":"Low",
					"category":"impact"
				}
			],
			"title":"CVE-2025-21795"
		},
		{
			"cve":"CVE-2025-21796",
			"notes":[
				{
					"text":"In the Linux kernel, the following vulnerability has been resolved:\n\nnfsd: clear acl_access/acl_default after releasing them\n\nIf getting acl_default fails, acl_access and acl_default will be released\nsimultaneously. However, acl_access will still retain a pointer pointing\nto the released posix_acl, which will trigger a WARNING in\nnfs3svc_release_getacl like this:\n\n------------[ cut here ]------------\nrefcount_t: underflow; use-after-free.\nWARNING: CPU: 26 PID: 3199 at lib/refcount.c:28\nrefcount_warn_saturate+0xb5/0x170\nModules linked in:\nCPU: 26 UID: 0 PID: 3199 Comm: nfsd Not tainted\n6.12.0-rc6-00079-g04ae226af01f-dirty #8\nHardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS\n1.16.1-2.fc37 04/01/2014\nRIP: 0010:refcount_warn_saturate+0xb5/0x170\nCode: cc cc 0f b6 1d b3 20 a5 03 80 fb 01 0f 87 65 48 d8 00 83 e3 01 75\ne4 48 c7 c7 c0 3b 9b 85 c6 05 97 20 a5 03 01 e8 fb 3e 30 ff <0f> 0b eb\ncd 0f b6 1d 8a3\nRSP: 0018:ffffc90008637cd8 EFLAGS: 00010282\nRAX: 0000000000000000 RBX: 0000000000000000 RCX: ffffffff83904fde\nRDX: dffffc0000000000 RSI: 0000000000000008 RDI: ffff88871ed36380\nRBP: ffff888158beeb40 R08: 0000000000000001 R09: fffff520010c6f56\nR10: ffffc90008637ab7 R11: 0000000000000001 R12: 0000000000000001\nR13: ffff888140e77400 R14: ffff888140e77408 R15: ffffffff858b42c0\nFS:  0000000000000000(0000) GS:ffff88871ed00000(0000)\nknlGS:0000000000000000\nCS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033\nCR2: 0000562384d32158 CR3: 000000055cc6a000 CR4: 00000000000006f0\nDR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000\nDR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400\nCall Trace:\n <TASK>\n ? refcount_warn_saturate+0xb5/0x170\n ? __warn+0xa5/0x140\n ? refcount_warn_saturate+0xb5/0x170\n ? report_bug+0x1b1/0x1e0\n ? handle_bug+0x53/0xa0\n ? exc_invalid_op+0x17/0x40\n ? asm_exc_invalid_op+0x1a/0x20\n ? tick_nohz_tick_stopped+0x1e/0x40\n ? refcount_warn_saturate+0xb5/0x170\n ? refcount_warn_saturate+0xb5/0x170\n nfs3svc_release_getacl+0xc9/0xe0\n svc_process_common+0x5db/0xb60\n ? __pfx_svc_process_common+0x10/0x10\n ? __rcu_read_unlock+0x69/0xa0\n ? __pfx_nfsd_dispatch+0x10/0x10\n ? svc_xprt_received+0xa1/0x120\n ? xdr_init_decode+0x11d/0x190\n svc_process+0x2a7/0x330\n svc_handle_xprt+0x69d/0x940\n svc_recv+0x180/0x2d0\n nfsd+0x168/0x200\n ? __pfx_nfsd+0x10/0x10\n kthread+0x1a2/0x1e0\n ? kthread+0xf4/0x1e0\n ? __pfx_kthread+0x10/0x10\n ret_from_fork+0x34/0x60\n ? __pfx_kthread+0x10/0x10\n ret_from_fork_asm+0x1a/0x30\n </TASK>\nKernel panic - not syncing: kernel: panic_on_warn set ...\n\nClear acl_access/acl_default after posix_acl_release is called to prevent\nUAF from being triggered.",
					"category":"description",
					"title":"Vulnerability Description"
				}
			],
			"product_status":{
				"fixed":[
					"openEuler-24.03-LTS:bpftool-6.6.0-82.0.0.75.oe2403.aarch64",
					"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-82.0.0.75.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-6.6.0-82.0.0.75.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-82.0.0.75.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-debugsource-6.6.0-82.0.0.75.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-devel-6.6.0-82.0.0.75.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-headers-6.6.0-82.0.0.75.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-source-6.6.0-82.0.0.75.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-tools-6.6.0-82.0.0.75.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-82.0.0.75.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-82.0.0.75.oe2403.aarch64",
					"openEuler-24.03-LTS:perf-6.6.0-82.0.0.75.oe2403.aarch64",
					"openEuler-24.03-LTS:perf-debuginfo-6.6.0-82.0.0.75.oe2403.aarch64",
					"openEuler-24.03-LTS:python3-perf-6.6.0-82.0.0.75.oe2403.aarch64",
					"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-82.0.0.75.oe2403.aarch64",
					"openEuler-24.03-LTS:bpftool-6.6.0-82.0.0.75.oe2403.x86_64",
					"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-82.0.0.75.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-6.6.0-82.0.0.75.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-82.0.0.75.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-debugsource-6.6.0-82.0.0.75.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-devel-6.6.0-82.0.0.75.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-headers-6.6.0-82.0.0.75.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-source-6.6.0-82.0.0.75.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-tools-6.6.0-82.0.0.75.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-82.0.0.75.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-82.0.0.75.oe2403.x86_64",
					"openEuler-24.03-LTS:perf-6.6.0-82.0.0.75.oe2403.x86_64",
					"openEuler-24.03-LTS:perf-debuginfo-6.6.0-82.0.0.75.oe2403.x86_64",
					"openEuler-24.03-LTS:python3-perf-6.6.0-82.0.0.75.oe2403.x86_64",
					"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-82.0.0.75.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-6.6.0-82.0.0.75.oe2403.src"
				]
			},
			"remediations":[
				{
					"product_ids":[
						"openEuler-24.03-LTS:bpftool-6.6.0-82.0.0.75.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-82.0.0.75.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-6.6.0-82.0.0.75.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-82.0.0.75.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-82.0.0.75.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-82.0.0.75.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-82.0.0.75.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-82.0.0.75.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-82.0.0.75.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-82.0.0.75.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-82.0.0.75.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-6.6.0-82.0.0.75.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-82.0.0.75.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-82.0.0.75.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-82.0.0.75.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-6.6.0-82.0.0.75.oe2403.x86_64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-82.0.0.75.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-6.6.0-82.0.0.75.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-82.0.0.75.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-82.0.0.75.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-82.0.0.75.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-82.0.0.75.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-82.0.0.75.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-82.0.0.75.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-82.0.0.75.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-82.0.0.75.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-6.6.0-82.0.0.75.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-82.0.0.75.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-82.0.0.75.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-82.0.0.75.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-6.6.0-82.0.0.75.oe2403.src"
					],
					"details":"kernel security update",
					"category":"vendor_fix",
					"url":"https://www.openeuler.org/zh/security/security-bulletins/detail/?id=openEuler-SA-2025-1285"
				}
			],
			"scores":[
				{
					"cvss_v3":{
						"baseSeverity":"HIGH",
						"baseScore":7.8,
						"vectorString":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
						"version":"3.1"
					},
					"products":[
						"openEuler-24.03-LTS:bpftool-6.6.0-82.0.0.75.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-82.0.0.75.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-6.6.0-82.0.0.75.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-82.0.0.75.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-82.0.0.75.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-82.0.0.75.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-82.0.0.75.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-82.0.0.75.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-82.0.0.75.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-82.0.0.75.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-82.0.0.75.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-6.6.0-82.0.0.75.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-82.0.0.75.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-82.0.0.75.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-82.0.0.75.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-6.6.0-82.0.0.75.oe2403.x86_64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-82.0.0.75.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-6.6.0-82.0.0.75.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-82.0.0.75.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-82.0.0.75.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-82.0.0.75.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-82.0.0.75.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-82.0.0.75.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-82.0.0.75.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-82.0.0.75.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-82.0.0.75.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-6.6.0-82.0.0.75.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-82.0.0.75.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-82.0.0.75.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-82.0.0.75.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-6.6.0-82.0.0.75.oe2403.src"
					]
				}
			],
			"threats":[
				{
					"details":"High",
					"category":"impact"
				}
			],
			"title":"CVE-2025-21796"
		},
		{
			"cve":"CVE-2025-21814",
			"notes":[
				{
					"text":"In the Linux kernel, the following vulnerability has been resolved:\n\nptp: Ensure info->enable callback is always set\n\nThe ioctl and sysfs handlers unconditionally call the ->enable callback.\nNot all drivers implement that callback, leading to NULL dereferences.\nExample of affected drivers: ptp_s390.c, ptp_vclock.c and ptp_mock.c.\n\nInstead use a dummy callback if no better was specified by the driver.",
					"category":"description",
					"title":"Vulnerability Description"
				}
			],
			"product_status":{
				"fixed":[
					"openEuler-24.03-LTS:bpftool-6.6.0-82.0.0.75.oe2403.aarch64",
					"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-82.0.0.75.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-6.6.0-82.0.0.75.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-82.0.0.75.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-debugsource-6.6.0-82.0.0.75.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-devel-6.6.0-82.0.0.75.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-headers-6.6.0-82.0.0.75.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-source-6.6.0-82.0.0.75.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-tools-6.6.0-82.0.0.75.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-82.0.0.75.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-82.0.0.75.oe2403.aarch64",
					"openEuler-24.03-LTS:perf-6.6.0-82.0.0.75.oe2403.aarch64",
					"openEuler-24.03-LTS:perf-debuginfo-6.6.0-82.0.0.75.oe2403.aarch64",
					"openEuler-24.03-LTS:python3-perf-6.6.0-82.0.0.75.oe2403.aarch64",
					"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-82.0.0.75.oe2403.aarch64",
					"openEuler-24.03-LTS:bpftool-6.6.0-82.0.0.75.oe2403.x86_64",
					"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-82.0.0.75.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-6.6.0-82.0.0.75.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-82.0.0.75.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-debugsource-6.6.0-82.0.0.75.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-devel-6.6.0-82.0.0.75.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-headers-6.6.0-82.0.0.75.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-source-6.6.0-82.0.0.75.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-tools-6.6.0-82.0.0.75.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-82.0.0.75.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-82.0.0.75.oe2403.x86_64",
					"openEuler-24.03-LTS:perf-6.6.0-82.0.0.75.oe2403.x86_64",
					"openEuler-24.03-LTS:perf-debuginfo-6.6.0-82.0.0.75.oe2403.x86_64",
					"openEuler-24.03-LTS:python3-perf-6.6.0-82.0.0.75.oe2403.x86_64",
					"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-82.0.0.75.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-6.6.0-82.0.0.75.oe2403.src"
				]
			},
			"remediations":[
				{
					"product_ids":[
						"openEuler-24.03-LTS:bpftool-6.6.0-82.0.0.75.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-82.0.0.75.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-6.6.0-82.0.0.75.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-82.0.0.75.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-82.0.0.75.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-82.0.0.75.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-82.0.0.75.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-82.0.0.75.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-82.0.0.75.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-82.0.0.75.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-82.0.0.75.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-6.6.0-82.0.0.75.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-82.0.0.75.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-82.0.0.75.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-82.0.0.75.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-6.6.0-82.0.0.75.oe2403.x86_64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-82.0.0.75.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-6.6.0-82.0.0.75.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-82.0.0.75.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-82.0.0.75.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-82.0.0.75.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-82.0.0.75.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-82.0.0.75.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-82.0.0.75.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-82.0.0.75.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-82.0.0.75.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-6.6.0-82.0.0.75.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-82.0.0.75.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-82.0.0.75.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-82.0.0.75.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-6.6.0-82.0.0.75.oe2403.src"
					],
					"details":"kernel security update",
					"category":"vendor_fix",
					"url":"https://www.openeuler.org/zh/security/security-bulletins/detail/?id=openEuler-SA-2025-1285"
				}
			],
			"scores":[
				{
					"cvss_v3":{
						"baseSeverity":"MEDIUM",
						"baseScore":5.5,
						"vectorString":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
						"version":"3.1"
					},
					"products":[
						"openEuler-24.03-LTS:bpftool-6.6.0-82.0.0.75.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-82.0.0.75.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-6.6.0-82.0.0.75.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-82.0.0.75.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-82.0.0.75.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-82.0.0.75.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-82.0.0.75.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-82.0.0.75.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-82.0.0.75.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-82.0.0.75.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-82.0.0.75.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-6.6.0-82.0.0.75.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-82.0.0.75.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-82.0.0.75.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-82.0.0.75.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-6.6.0-82.0.0.75.oe2403.x86_64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-82.0.0.75.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-6.6.0-82.0.0.75.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-82.0.0.75.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-82.0.0.75.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-82.0.0.75.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-82.0.0.75.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-82.0.0.75.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-82.0.0.75.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-82.0.0.75.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-82.0.0.75.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-6.6.0-82.0.0.75.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-82.0.0.75.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-82.0.0.75.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-82.0.0.75.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-6.6.0-82.0.0.75.oe2403.src"
					]
				}
			],
			"threats":[
				{
					"details":"Medium",
					"category":"impact"
				}
			],
			"title":"CVE-2025-21814"
		},
		{
			"cve":"CVE-2025-21817",
			"notes":[
				{
					"text":"In the Linux kernel, the following vulnerability has been resolved:\n\nblock: mark GFP_NOIO around sysfs ->store()\n\nsysfs ->store is called with queue freezed, meantime we have several\n->store() callbacks(update_nr_requests, wbt, scheduler) to allocate\nmemory with GFP_KERNEL which may run into direct reclaim code path,\nthen potential deadlock can be caused.\n\nFix the issue by marking NOIO around sysfs ->store()",
					"category":"description",
					"title":"Vulnerability Description"
				}
			],
			"product_status":{
				"fixed":[
					"openEuler-24.03-LTS:bpftool-6.6.0-82.0.0.75.oe2403.aarch64",
					"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-82.0.0.75.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-6.6.0-82.0.0.75.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-82.0.0.75.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-debugsource-6.6.0-82.0.0.75.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-devel-6.6.0-82.0.0.75.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-headers-6.6.0-82.0.0.75.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-source-6.6.0-82.0.0.75.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-tools-6.6.0-82.0.0.75.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-82.0.0.75.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-82.0.0.75.oe2403.aarch64",
					"openEuler-24.03-LTS:perf-6.6.0-82.0.0.75.oe2403.aarch64",
					"openEuler-24.03-LTS:perf-debuginfo-6.6.0-82.0.0.75.oe2403.aarch64",
					"openEuler-24.03-LTS:python3-perf-6.6.0-82.0.0.75.oe2403.aarch64",
					"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-82.0.0.75.oe2403.aarch64",
					"openEuler-24.03-LTS:bpftool-6.6.0-82.0.0.75.oe2403.x86_64",
					"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-82.0.0.75.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-6.6.0-82.0.0.75.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-82.0.0.75.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-debugsource-6.6.0-82.0.0.75.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-devel-6.6.0-82.0.0.75.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-headers-6.6.0-82.0.0.75.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-source-6.6.0-82.0.0.75.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-tools-6.6.0-82.0.0.75.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-82.0.0.75.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-82.0.0.75.oe2403.x86_64",
					"openEuler-24.03-LTS:perf-6.6.0-82.0.0.75.oe2403.x86_64",
					"openEuler-24.03-LTS:perf-debuginfo-6.6.0-82.0.0.75.oe2403.x86_64",
					"openEuler-24.03-LTS:python3-perf-6.6.0-82.0.0.75.oe2403.x86_64",
					"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-82.0.0.75.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-6.6.0-82.0.0.75.oe2403.src"
				]
			},
			"remediations":[
				{
					"product_ids":[
						"openEuler-24.03-LTS:bpftool-6.6.0-82.0.0.75.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-82.0.0.75.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-6.6.0-82.0.0.75.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-82.0.0.75.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-82.0.0.75.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-82.0.0.75.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-82.0.0.75.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-82.0.0.75.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-82.0.0.75.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-82.0.0.75.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-82.0.0.75.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-6.6.0-82.0.0.75.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-82.0.0.75.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-82.0.0.75.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-82.0.0.75.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-6.6.0-82.0.0.75.oe2403.x86_64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-82.0.0.75.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-6.6.0-82.0.0.75.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-82.0.0.75.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-82.0.0.75.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-82.0.0.75.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-82.0.0.75.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-82.0.0.75.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-82.0.0.75.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-82.0.0.75.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-82.0.0.75.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-6.6.0-82.0.0.75.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-82.0.0.75.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-82.0.0.75.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-82.0.0.75.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-6.6.0-82.0.0.75.oe2403.src"
					],
					"details":"kernel security update",
					"category":"vendor_fix",
					"url":"https://www.openeuler.org/zh/security/security-bulletins/detail/?id=openEuler-SA-2025-1285"
				}
			],
			"scores":[
				{
					"cvss_v3":{
						"baseSeverity":"LOW",
						"baseScore":3.9,
						"vectorString":"CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:L/I:L/A:L",
						"version":"3.1"
					},
					"products":[
						"openEuler-24.03-LTS:bpftool-6.6.0-82.0.0.75.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-82.0.0.75.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-6.6.0-82.0.0.75.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-82.0.0.75.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-82.0.0.75.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-82.0.0.75.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-82.0.0.75.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-82.0.0.75.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-82.0.0.75.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-82.0.0.75.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-82.0.0.75.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-6.6.0-82.0.0.75.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-82.0.0.75.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-82.0.0.75.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-82.0.0.75.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-6.6.0-82.0.0.75.oe2403.x86_64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-82.0.0.75.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-6.6.0-82.0.0.75.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-82.0.0.75.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-82.0.0.75.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-82.0.0.75.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-82.0.0.75.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-82.0.0.75.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-82.0.0.75.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-82.0.0.75.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-82.0.0.75.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-6.6.0-82.0.0.75.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-82.0.0.75.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-82.0.0.75.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-82.0.0.75.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-6.6.0-82.0.0.75.oe2403.src"
					]
				}
			],
			"threats":[
				{
					"details":"Low",
					"category":"impact"
				}
			],
			"title":"CVE-2025-21817"
		}
	]
}