{
	"document":{
		"aggregate_severity":{
			"namespace":"https://nvd.nist.gov/vuln-metrics/cvss",
			"text":"High"
		},
		"category":"csaf_vex",
		"csaf_version":"2.0",
		"distribution":{
			"tlp":{
				"label":"WHITE",
				"url":"https:/www.first.org/tlp/"
			}
		},
		"lang":"en",
		"notes":[
			{
				"text":"kernel security update",
				"category":"general",
				"title":"Synopsis"
			},
			{
				"text":"An update for kernel is now available for openEuler-24.03-LTS",
				"category":"general",
				"title":"Summary"
			},
			{
				"text":"The Linux Kernel, the operating system core itself.\n\nSecurity Fix(es):\n\nIn the Linux kernel, the following vulnerability has been resolved:\n\nwifi: ath11k: add srng->lock for ath11k_hal_srng_* in monitor mode\n\nath11k_hal_srng_* should be used with srng->lock to protect srng data.\n\nFor ath11k_dp_rx_mon_dest_process() and ath11k_dp_full_mon_process_rx(),\nthey use ath11k_hal_srng_* for many times but never call srng->lock.\n\nSo when running (full) monitor mode, warning will occur:\nRIP: 0010:ath11k_hal_srng_dst_peek+0x18/0x30 [ath11k]\nCall Trace:\n ? ath11k_hal_srng_dst_peek+0x18/0x30 [ath11k]\n ath11k_dp_rx_process_mon_status+0xc45/0x1190 [ath11k]\n ? idr_alloc_u32+0x97/0xd0\n ath11k_dp_rx_process_mon_rings+0x32a/0x550 [ath11k]\n ath11k_dp_service_srng+0x289/0x5a0 [ath11k]\n ath11k_pcic_ext_grp_napi_poll+0x30/0xd0 [ath11k]\n __napi_poll+0x30/0x1f0\n net_rx_action+0x198/0x320\n __do_softirq+0xdd/0x319\n\nSo add srng->lock for them to avoid such warnings.\n\nInorder to fetch the srng->lock, should change srng's definition from\n'void' to 'struct hal_srng'. And initialize them elsewhere to prevent\none line of code from being too long. This is consistent with other ring\nprocess functions, such as ath11k_dp_process_rx().\n\nTested-on: WCN6855 hw2.0 PCI WLAN.HSP.1.1-03125-QCAHSPSWPL_V1_V2_SILICONZ_LITE-3.6510.30\nTested-on: QCN9074 hw1.0 PCI WLAN.HK.2.7.0.1-01744-QCAHKSWPL_SILICONZ-1(CVE-2024-58096)\n\nIn the Linux kernel, the following vulnerability has been resolved:\n\nwifi: ath11k: fix RCU stall while reaping monitor destination ring\n\nWhile processing the monitor destination ring, MSDUs are reaped from the\nlink descriptor based on the corresponding buf_id.\n\nHowever, sometimes the driver cannot obtain a valid buffer corresponding\nto the buf_id received from the hardware. This causes an infinite loop\nin the destination processing, resulting in a kernel crash.\n\nkernel log:\nath11k_pci 0000:58:00.0: data msdu_pop: invalid buf_id 309\nath11k_pci 0000:58:00.0: data dp_rx_monitor_link_desc_return failed\nath11k_pci 0000:58:00.0: data msdu_pop: invalid buf_id 309\nath11k_pci 0000:58:00.0: data dp_rx_monitor_link_desc_return failed\n\nFix this by skipping the problematic buf_id and reaping the next entry,\nreplacing the break with the next MSDU processing.\n\nTested-on: WCN6855 hw2.0 PCI WLAN.HSP.1.1-03125-QCAHSPSWPL_V1_V2_SILICONZ_LITE-3.6510.30\nTested-on: QCN9074 hw1.0 PCI WLAN.HK.2.7.0.1-01744-QCAHKSWPL_SILICONZ-1(CVE-2024-58097)\n\nIn the Linux kernel, the following vulnerability has been resolved:\n\nwifi: nl80211: reject cooked mode if it is set along with other flags\n\nIt is possible to set both MONITOR_FLAG_COOK_FRAMES and MONITOR_FLAG_ACTIVE\nflags simultaneously on the same monitor interface from the userspace. This\ncauses a sub-interface to be created with no IEEE80211_SDATA_IN_DRIVER bit\nset because the monitor interface is in the cooked state and it takes\nprecedence over all other states. When the interface is then being deleted\nthe kernel calls WARN_ONCE() from check_sdata_in_driver() because of missing\nthat bit.\n\nFix this by rejecting MONITOR_FLAG_COOK_FRAMES if it is set along with\nother flags.\n\nFound by Linux Verification Center (linuxtesting.org) with Syzkaller.(CVE-2025-21909)\n\nIn the Linux kernel, the following vulnerability has been resolved:\n\ngpio: rcar: Use raw_spinlock to protect register access\n\nUse raw_spinlock in order to fix spurious messages about invalid context\nwhen spinlock debugging is enabled. The lock is only used to serialize\nregister access.\n\n    [    4.239592] =============================\n    [    4.239595] [ BUG: Invalid wait context ]\n    [    4.239599] 6.13.0-rc7-arm64-renesas-05496-gd088502a519f #35 Not tainted\n    [    4.239603] -----------------------------\n    [    4.239606] kworker/u8:5/76 is trying to lock:\n    [    4.239609] ffff0000091898a0 (&p->lock){....}-{3:3}, at: gpio_rcar_config_interrupt_input_mode+0x34/0x164\n    [    4.239641] other info that might help us debug this:\n    [    4.239643] context-{5:5}\n    [    4.239646] 5 locks held by kworker/u8:5/76:\n    [    4.239651]  #0: ffff0000080fb148 ((wq_completion)async){+.+.}-{0:0}, at: process_one_work+0x190/0x62c\n    [    4.250180] OF: /soc/sound@ec500000/ports/port@0/endpoint: Read of boolean property 'frame-master' with a value.\n    [    4.254094]  #1: ffff80008299bd80 ((work_completion)(&entry->work)){+.+.}-{0:0}, at: process_one_work+0x1b8/0x62c\n    [    4.254109]  #2: ffff00000920c8f8\n    [    4.258345] OF: /soc/sound@ec500000/ports/port@1/endpoint: Read of boolean property 'bitclock-master' with a value.\n    [    4.264803]  (&dev->mutex){....}-{4:4}, at: __device_attach_async_helper+0x3c/0xdc\n    [    4.264820]  #3: ffff00000a50ca40 (request_class#2){+.+.}-{4:4}, at: __setup_irq+0xa0/0x690\n    [    4.264840]  #4:\n    [    4.268872] OF: /soc/sound@ec500000/ports/port@1/endpoint: Read of boolean property 'frame-master' with a value.\n    [    4.273275] ffff00000a50c8c8 (lock_class){....}-{2:2}, at: __setup_irq+0xc4/0x690\n    [    4.296130] renesas_sdhi_internal_dmac ee100000.mmc: mmc1 base at 0x00000000ee100000, max clock rate 200 MHz\n    [    4.304082] stack backtrace:\n    [    4.304086] CPU: 1 UID: 0 PID: 76 Comm: kworker/u8:5 Not tainted 6.13.0-rc7-arm64-renesas-05496-gd088502a519f #35\n    [    4.304092] Hardware name: Renesas Salvator-X 2nd version board based on r8a77965 (DT)\n    [    4.304097] Workqueue: async async_run_entry_fn\n    [    4.304106] Call trace:\n    [    4.304110]  show_stack+0x14/0x20 (C)\n    [    4.304122]  dump_stack_lvl+0x6c/0x90\n    [    4.304131]  dump_stack+0x14/0x1c\n    [    4.304138]  __lock_acquire+0xdfc/0x1584\n    [    4.426274]  lock_acquire+0x1c4/0x33c\n    [    4.429942]  _raw_spin_lock_irqsave+0x5c/0x80\n    [    4.434307]  gpio_rcar_config_interrupt_input_mode+0x34/0x164\n    [    4.440061]  gpio_rcar_irq_set_type+0xd4/0xd8\n    [    4.444422]  __irq_set_trigger+0x5c/0x178\n    [    4.448435]  __setup_irq+0x2e4/0x690\n    [    4.452012]  request_threaded_irq+0xc4/0x190\n    [    4.456285]  devm_request_threaded_irq+0x7c/0xf4\n    [    4.459398] ata1: link resume succeeded after 1 retries\n    [    4.460902]  mmc_gpiod_request_cd_irq+0x68/0xe0\n    [    4.470660]  mmc_start_host+0x50/0xac\n    [    4.474327]  mmc_add_host+0x80/0xe4\n    [    4.477817]  tmio_mmc_host_probe+0x2b0/0x440\n    [    4.482094]  renesas_sdhi_probe+0x488/0x6f4\n    [    4.486281]  renesas_sdhi_internal_dmac_probe+0x60/0x78\n    [    4.491509]  platform_probe+0x64/0xd8\n    [    4.495178]  really_probe+0xb8/0x2a8\n    [    4.498756]  __driver_probe_device+0x74/0x118\n    [    4.503116]  driver_probe_device+0x3c/0x154\n    [    4.507303]  __device_attach_driver+0xd4/0x160\n    [    4.511750]  bus_for_each_drv+0x84/0xe0\n    [    4.515588]  __device_attach_async_helper+0xb0/0xdc\n    [    4.520470]  async_run_entry_fn+0x30/0xd8\n    [    4.524481]  process_one_work+0x210/0x62c\n    [    4.528494]  worker_thread+0x1ac/0x340\n    [    4.532245]  kthread+0x10c/0x110\n    [    4.535476]  ret_from_fork+0x10/0x20(CVE-2025-21912)\n\nIn the Linux kernel, the following vulnerability has been resolved:\n\nusb: typec: ucsi: Fix NULL pointer access\n\nResources should be released only after all threads that utilize them\nhave been destroyed.\nThis commit ensures that resources are not released prematurely by waiting\nfor the associated workqueue to complete before deallocating them.(CVE-2025-21918)\n\nIn the Linux kernel, the following vulnerability has been resolved:\n\nnet: mctp: unshare packets when reassembling\n\nEnsure that the frag_list used for reassembly isn't shared with other\npackets. This avoids incorrect reassembly when packets are cloned, and\nprevents a memory leak due to circular references between fragments and\ntheir skb_shared_info.\n\nThe upcoming MCTP-over-USB driver uses skb_clone which can trigger the\nproblem - other MCTP drivers don't share SKBs.\n\nA kunit test is added to reproduce the issue.(CVE-2025-21972)\n\nIn the Linux kernel, the following vulnerability has been resolved:\n\nbus: mhi: host: Fix race between unprepare and queue_buf\n\nA client driver may use mhi_unprepare_from_transfer() to quiesce\nincoming data during the client driver's tear down. The client driver\nmight also be processing data at the same time, resulting in a call to\nmhi_queue_buf() which will invoke mhi_gen_tre(). If mhi_gen_tre() runs\nafter mhi_unprepare_from_transfer() has torn down the channel, a panic\nwill occur due to an invalid dereference leading to a page fault.\n\nThis occurs because mhi_gen_tre() does not verify the channel state\nafter locking it. Fix this by having mhi_gen_tre() confirm the channel\nstate is valid, or return error to avoid accessing deinitialized data.\n\n[mani: added stable tag](CVE-2025-23151)\n\nIn the Linux kernel, the following vulnerability has been resolved:\n\ndrm/i915/huc: Fix fence not released on early probe errors\n\nHuC delayed loading fence, introduced with commit 27536e03271da\n(\"drm/i915/huc: track delayed HuC load with a fence\"), is registered with\nobject tracker early on driver probe but unregistered only from driver\nremove, which is not called on early probe errors.  Since its memory is\nallocated under devres, then released anyway, it may happen to be\nallocated again to the fence and reused on future driver probes, resulting\nin kernel warnings that taint the kernel:\n\n<4> [309.731371] ------------[ cut here ]------------\n<3> [309.731373] ODEBUG: init destroyed (active state 0) object: ffff88813d7dd2e0 object type: i915_sw_fence hint: sw_fence_dummy_notify+0x0/0x20 [i915]\n<4> [309.731575] WARNING: CPU: 2 PID: 3161 at lib/debugobjects.c:612 debug_print_object+0x93/0xf0\n...\n<4> [309.731693] CPU: 2 UID: 0 PID: 3161 Comm: i915_module_loa Tainted: G     U             6.14.0-CI_DRM_16362-gf0fd77956987+ #1\n...\n<4> [309.731700] RIP: 0010:debug_print_object+0x93/0xf0\n...\n<4> [309.731728] Call Trace:\n<4> [309.731730]  <TASK>\n...\n<4> [309.731949]  __debug_object_init+0x17b/0x1c0\n<4> [309.731957]  debug_object_init+0x34/0x50\n<4> [309.732126]  __i915_sw_fence_init+0x34/0x60 [i915]\n<4> [309.732256]  intel_huc_init_early+0x4b/0x1d0 [i915]\n<4> [309.732468]  intel_uc_init_early+0x61/0x680 [i915]\n<4> [309.732667]  intel_gt_common_init_early+0x105/0x130 [i915]\n<4> [309.732804]  intel_root_gt_init_early+0x63/0x80 [i915]\n<4> [309.732938]  i915_driver_probe+0x1fa/0xeb0 [i915]\n<4> [309.733075]  i915_pci_probe+0xe6/0x220 [i915]\n<4> [309.733198]  local_pci_probe+0x44/0xb0\n<4> [309.733203]  pci_device_probe+0xf4/0x270\n<4> [309.733209]  really_probe+0xee/0x3c0\n<4> [309.733215]  __driver_probe_device+0x8c/0x180\n<4> [309.733219]  driver_probe_device+0x24/0xd0\n<4> [309.733223]  __driver_attach+0x10f/0x220\n<4> [309.733230]  bus_for_each_dev+0x7d/0xe0\n<4> [309.733236]  driver_attach+0x1e/0x30\n<4> [309.733239]  bus_add_driver+0x151/0x290\n<4> [309.733244]  driver_register+0x5e/0x130\n<4> [309.733247]  __pci_register_driver+0x7d/0x90\n<4> [309.733251]  i915_pci_register_driver+0x23/0x30 [i915]\n<4> [309.733413]  i915_init+0x34/0x120 [i915]\n<4> [309.733655]  do_one_initcall+0x62/0x3f0\n<4> [309.733667]  do_init_module+0x97/0x2a0\n<4> [309.733671]  load_module+0x25ff/0x2890\n<4> [309.733688]  init_module_from_file+0x97/0xe0\n<4> [309.733701]  idempotent_init_module+0x118/0x330\n<4> [309.733711]  __x64_sys_finit_module+0x77/0x100\n<4> [309.733715]  x64_sys_call+0x1f37/0x2650\n<4> [309.733719]  do_syscall_64+0x91/0x180\n<4> [309.733763]  entry_SYSCALL_64_after_hwframe+0x76/0x7e\n<4> [309.733792]  </TASK>\n...\n<4> [309.733806] ---[ end trace 0000000000000000 ]---\n\nThat scenario is most easily reproducible with\nigt@i915_module_load@reload-with-fault-injection.\n\nFix the issue by moving the cleanup step to driver release path.\n\n(cherry picked from commit 795dbde92fe5c6996a02a5b579481de73035e7bf)(CVE-2025-37754)\n\nIn the Linux kernel, the following vulnerability has been resolved:\n\ndrm/nouveau: prime: fix ttm_bo_delayed_delete oops\n\nFix an oops in ttm_bo_delayed_delete which results from dererencing a\ndangling pointer:\n\nOops: general protection fault, probably for non-canonical address 0x6b6b6b6b6b6b6b7b: 0000 [#1] PREEMPT SMP\nCPU: 4 UID: 0 PID: 1082 Comm: kworker/u65:2 Not tainted 6.14.0-rc4-00267-g505460b44513-dirty #216\nHardware name: LENOVO 82N6/LNVNB161216, BIOS GKCN65WW 01/16/2024\nWorkqueue: ttm ttm_bo_delayed_delete [ttm]\nRIP: 0010:dma_resv_iter_first_unlocked+0x55/0x290\nCode: 31 f6 48 c7 c7 00 2b fa aa e8 97 bd 52 ff e8 a2 c1 53 00 5a 85 c0 74 48 e9 88 01 00 00 4c 89 63 20 4d 85 e4 0f 84 30 01 00 00 <41> 8b 44 24 10 c6 43 2c 01 48 89 df 89 43 28 e8 97 fd ff ff 4c 8b\nRSP: 0018:ffffbf9383473d60 EFLAGS: 00010202\nRAX: 0000000000000001 RBX: ffffbf9383473d88 RCX: 0000000000000000\nRDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000\nRBP: ffffbf9383473d78 R08: 0000000000000000 R09: 0000000000000000\nR10: 0000000000000000 R11: 0000000000000000 R12: 6b6b6b6b6b6b6b6b\nR13: ffffa003bbf78580 R14: ffffa003a6728040 R15: 00000000000383cc\nFS:  0000000000000000(0000) GS:ffffa00991c00000(0000) knlGS:0000000000000000\nCS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033\nCR2: 0000758348024dd0 CR3: 000000012c259000 CR4: 0000000000f50ef0\nPKRU: 55555554\nCall Trace:\n <TASK>\n ? __die_body.cold+0x19/0x26\n ? die_addr+0x3d/0x70\n ? exc_general_protection+0x159/0x460\n ? asm_exc_general_protection+0x27/0x30\n ? dma_resv_iter_first_unlocked+0x55/0x290\n dma_resv_wait_timeout+0x56/0x100\n ttm_bo_delayed_delete+0x69/0xb0 [ttm]\n process_one_work+0x217/0x5c0\n worker_thread+0x1c8/0x3d0\n ? apply_wqattrs_cleanup.part.0+0xc0/0xc0\n kthread+0x10b/0x240\n ? kthreads_online_cpu+0x140/0x140\n ret_from_fork+0x40/0x70\n ? kthreads_online_cpu+0x140/0x140\n ret_from_fork_asm+0x11/0x20\n </TASK>\n\nThe cause of this is:\n\n- drm_prime_gem_destroy calls dma_buf_put(dma_buf) which releases the\n  reference to the shared dma_buf. The reference count is 0, so the\n  dma_buf is destroyed, which in turn decrements the corresponding\n  amdgpu_bo reference count to 0, and the amdgpu_bo is destroyed -\n  calling drm_gem_object_release then dma_resv_fini (which destroys the\n  reservation object), then finally freeing the amdgpu_bo.\n\n- nouveau_bo obj->bo.base.resv is now a dangling pointer to the memory\n  formerly allocated to the amdgpu_bo.\n\n- nouveau_gem_object_del calls ttm_bo_put(&nvbo->bo) which calls\n  ttm_bo_release, which schedules ttm_bo_delayed_delete.\n\n- ttm_bo_delayed_delete runs and dereferences the dangling resv pointer,\n  resulting in a general protection fault.\n\nFix this by moving the drm_prime_gem_destroy call from\nnouveau_gem_object_del to nouveau_bo_del_ttm. This ensures that it will\nbe run after ttm_bo_delayed_delete.(CVE-2025-37765)\n\nIn the Linux kernel, the following vulnerability has been resolved:\n\nvirtiofs: add filesystem context source name check\n\nIn certain scenarios, for example, during fuzz testing, the source\nname may be NULL, which could lead to a kernel panic. Therefore, an\nextra check for the source name should be added.(CVE-2025-37773)\n\nIn the Linux kernel, the following vulnerability has been resolved:\n\nhfs/hfsplus: fix slab-out-of-bounds in hfs_bnode_read_key\n\nSyzbot reported an issue in hfs subsystem:\n\nBUG: KASAN: slab-out-of-bounds in memcpy_from_page include/linux/highmem.h:423 [inline]\nBUG: KASAN: slab-out-of-bounds in hfs_bnode_read fs/hfs/bnode.c:35 [inline]\nBUG: KASAN: slab-out-of-bounds in hfs_bnode_read_key+0x314/0x450 fs/hfs/bnode.c:70\nWrite of size 94 at addr ffff8880123cd100 by task syz-executor237/5102\n\nCall Trace:\n <TASK>\n __dump_stack lib/dump_stack.c:94 [inline]\n dump_stack_lvl+0x241/0x360 lib/dump_stack.c:120\n print_address_description mm/kasan/report.c:377 [inline]\n print_report+0x169/0x550 mm/kasan/report.c:488\n kasan_report+0x143/0x180 mm/kasan/report.c:601\n kasan_check_range+0x282/0x290 mm/kasan/generic.c:189\n __asan_memcpy+0x40/0x70 mm/kasan/shadow.c:106\n memcpy_from_page include/linux/highmem.h:423 [inline]\n hfs_bnode_read fs/hfs/bnode.c:35 [inline]\n hfs_bnode_read_key+0x314/0x450 fs/hfs/bnode.c:70\n hfs_brec_insert+0x7f3/0xbd0 fs/hfs/brec.c:159\n hfs_cat_create+0x41d/0xa50 fs/hfs/catalog.c:118\n hfs_mkdir+0x6c/0xe0 fs/hfs/dir.c:232\n vfs_mkdir+0x2f9/0x4f0 fs/namei.c:4257\n do_mkdirat+0x264/0x3a0 fs/namei.c:4280\n __do_sys_mkdir fs/namei.c:4300 [inline]\n __se_sys_mkdir fs/namei.c:4298 [inline]\n __x64_sys_mkdir+0x6c/0x80 fs/namei.c:4298\n do_syscall_x64 arch/x86/entry/common.c:52 [inline]\n do_syscall_64+0xf3/0x230 arch/x86/entry/common.c:83\n entry_SYSCALL_64_after_hwframe+0x77/0x7f\nRIP: 0033:0x7fbdd6057a99\n\nAdd a check for key length in hfs_bnode_read_key to prevent\nout-of-bounds memory access. If the key length is invalid, the\nkey buffer is cleared, improving stability and reliability.(CVE-2025-37782)\n\nIn the Linux kernel, the following vulnerability has been resolved:\n\nfbdev: omapfb: Add 'plane' value check\n\nFunction dispc_ovl_setup is not intended to work with the value OMAP_DSS_WB\nof the enum parameter plane.\n\nThe value of this parameter is initialized in dss_init_overlays and in the\ncurrent state of the code it cannot take this value so it's not a real\nproblem.\n\nFor the purposes of defensive coding it wouldn't be superfluous to check\nthe parameter value, because some functions down the call stack process\nthis value correctly and some not.\n\nFor example, in dispc_ovl_setup_global_alpha it may lead to buffer\noverflow.\n\nAdd check for this value.\n\nFound by Linux Verification Center (linuxtesting.org) with SVACE static\nanalysis tool.(CVE-2025-37851)\n\nIn the Linux kernel, the following vulnerability has been resolved:\n\ndrm/amdgpu: handle amdgpu_cgs_create_device() errors in amd_powerplay_create()\n\nAdd error handling to propagate amdgpu_cgs_create_device() failures\nto the caller. When amdgpu_cgs_create_device() fails, release hwmgr\nand return -ENOMEM to prevent null pointer dereference.\n\n[v1]->[v2]: Change error code from -EINVAL to -ENOMEM. Free hwmgr.(CVE-2025-37852)\n\nIn the Linux kernel, the following vulnerability has been resolved:\n\nfs/jfs: Prevent integer overflow in AG size calculation\n\nThe JFS filesystem calculates allocation group (AG) size using 1 <<\nl2agsize in dbExtendFS(). When l2agsize exceeds 31 (possible with >2TB\naggregates on 32-bit systems), this 32-bit shift operation causes undefined\nbehavior and improper AG sizing.\n\nOn 32-bit architectures:\n- Left-shifting 1 by 32+ bits results in 0 due to integer overflow\n- This creates invalid AG sizes (0 or garbage values) in\nsbi->bmap->db_agsize\n- Subsequent block allocations would reference invalid AG structures\n- Could lead to:\n  - Filesystem corruption during extend operations\n  - Kernel crashes due to invalid memory accesses\n  - Security vulnerabilities via malformed on-disk structures\n\nFix by casting to s64 before shifting:\nbmp->db_agsize = (s64)1 << l2agsize;\n\nThis ensures 64-bit arithmetic even on 32-bit architectures. The cast\nmatches the data type of db_agsize (s64) and follows similar patterns in\nJFS block calculation code.\n\nFound by Linux Verification Center (linuxtesting.org) with SVACE.(CVE-2025-37858)\n\nIn the Linux kernel, the following vulnerability has been resolved:\n\nRDMA/core: Silence oversized kvmalloc() warning\n\nsyzkaller triggered an oversized kvmalloc() warning.\nSilence it by adding __GFP_NOWARN.\n\nsyzkaller log:\n WARNING: CPU: 7 PID: 518 at mm/util.c:665 __kvmalloc_node_noprof+0x175/0x180\n CPU: 7 UID: 0 PID: 518 Comm: c_repro Not tainted 6.11.0-rc6+ #6\n Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS rel-1.13.0-0-gf21b5a4aeb02-prebuilt.qemu.org 04/01/2014\n RIP: 0010:__kvmalloc_node_noprof+0x175/0x180\n RSP: 0018:ffffc90001e67c10 EFLAGS: 00010246\n RAX: 0000000000000100 RBX: 0000000000000400 RCX: ffffffff8149d46b\n RDX: 0000000000000000 RSI: ffff8881030fae80 RDI: 0000000000000002\n RBP: 000000712c800000 R08: 0000000000000100 R09: 0000000000000000\n R10: ffffc90001e67c10 R11: 0030ae0601000000 R12: 0000000000000000\n R13: 0000000000000000 R14: 00000000ffffffff R15: 0000000000000000\n FS:  00007fde79159740(0000) GS:ffff88813bdc0000(0000) knlGS:0000000000000000\n CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033\n CR2: 0000000020000180 CR3: 0000000105eb4005 CR4: 00000000003706b0\n DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000\n DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400\n Call Trace:\n  <TASK>\n  ib_umem_odp_get+0x1f6/0x390\n  mlx5_ib_reg_user_mr+0x1e8/0x450\n  ib_uverbs_reg_mr+0x28b/0x440\n  ib_uverbs_write+0x7d3/0xa30\n  vfs_write+0x1ac/0x6c0\n  ksys_write+0x134/0x170\n  ? __sanitizer_cov_trace_pc+0x1c/0x50\n  do_syscall_64+0x50/0x110\n  entry_SYSCALL_64_after_hwframe+0x76/0x7e(CVE-2025-37867)\n\nIn the Linux kernel, the following vulnerability has been resolved:\n\npds_core: make wait_context part of q_info\n\nMake the wait_context a full part of the q_info struct rather\nthan a stack variable that goes away after pdsc_adminq_post()\nis done so that the context is still available after the wait\nloop has given up.\n\nThere was a case where a slow development firmware caused\nthe adminq request to time out, but then later the FW finally\nfinished the request and sent the interrupt.  The handler tried\nto complete_all() the completion context that had been created\non the stack in pdsc_adminq_post() but no longer existed.\nThis caused bad pointer usage, kernel crashes, and much wailing\nand gnashing of teeth.(CVE-2025-37886)\n\nIn the Linux kernel, the following vulnerability has been resolved:\n\njfs: reject on-disk inodes of an unsupported type\n\nSyzbot has reported the following BUG:\n\nkernel BUG at fs/inode.c:668!\nOops: invalid opcode: 0000 [#1] PREEMPT SMP KASAN PTI\nCPU: 3 UID: 0 PID: 139 Comm: jfsCommit Not tainted 6.12.0-rc4-syzkaller-00085-g4e46774408d9 #0\nHardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.16.3-3.fc41 04/01/2014\nRIP: 0010:clear_inode+0x168/0x190\nCode: 4c 89 f7 e8 ba fe e5 ff e9 61 ff ff ff 44 89 f1 80 e1 07 80 c1 03 38 c1 7c c1 4c 89 f7 e8 90 ff e5 ff eb b7\n 0b e8 01 5d 7f ff 90 0f 0b e8 f9 5c 7f ff 90 0f 0b e8 f1 5c 7f\nRSP: 0018:ffffc900027dfae8 EFLAGS: 00010093\nRAX: ffffffff82157a87 RBX: 0000000000000001 RCX: ffff888104d4b980\nRDX: 0000000000000000 RSI: 0000000000000001 RDI: 0000000000000000\nRBP: ffffc900027dfc90 R08: ffffffff82157977 R09: fffff520004fbf38\nR10: dffffc0000000000 R11: fffff520004fbf38 R12: dffffc0000000000\nR13: ffff88811315bc00 R14: ffff88811315bda8 R15: ffff88811315bb80\nFS:  0000000000000000(0000) GS:ffff888135f00000(0000) knlGS:0000000000000000\nCS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033\nCR2: 00005565222e0578 CR3: 0000000026ef0000 CR4: 00000000000006f0\nCall Trace:\n <TASK>\n ? __die_body+0x5f/0xb0\n ? die+0x9e/0xc0\n ? do_trap+0x15a/0x3a0\n ? clear_inode+0x168/0x190\n ? do_error_trap+0x1dc/0x2c0\n ? clear_inode+0x168/0x190\n ? __pfx_do_error_trap+0x10/0x10\n ? report_bug+0x3cd/0x500\n ? handle_invalid_op+0x34/0x40\n ? clear_inode+0x168/0x190\n ? exc_invalid_op+0x38/0x50\n ? asm_exc_invalid_op+0x1a/0x20\n ? clear_inode+0x57/0x190\n ? clear_inode+0x167/0x190\n ? clear_inode+0x168/0x190\n ? clear_inode+0x167/0x190\n jfs_evict_inode+0xb5/0x440\n ? __pfx_jfs_evict_inode+0x10/0x10\n evict+0x4ea/0x9b0\n ? __pfx_evict+0x10/0x10\n ? iput+0x713/0xa50\n txUpdateMap+0x931/0xb10\n ? __pfx_txUpdateMap+0x10/0x10\n jfs_lazycommit+0x49a/0xb80\n ? _raw_spin_unlock_irqrestore+0x8f/0x140\n ? lockdep_hardirqs_on+0x99/0x150\n ? __pfx_jfs_lazycommit+0x10/0x10\n ? __pfx_default_wake_function+0x10/0x10\n ? __kthread_parkme+0x169/0x1d0\n ? __pfx_jfs_lazycommit+0x10/0x10\n kthread+0x2f2/0x390\n ? __pfx_jfs_lazycommit+0x10/0x10\n ? __pfx_kthread+0x10/0x10\n ret_from_fork+0x4d/0x80\n ? __pfx_kthread+0x10/0x10\n ret_from_fork_asm+0x1a/0x30\n </TASK>\n\nThis happens when 'clear_inode()' makes an attempt to finalize an underlying\nJFS inode of unknown type. According to JFS layout description from\nhttps://jfs.sourceforge.net/project/pub/jfslayout.pdf, inode types from 5 to\n15 are reserved for future extensions and should not be encountered on a valid\nfilesystem. So add an extra check for valid inode type in 'copy_from_dinode()'.(CVE-2025-37925)\n\nIn the Linux kernel, the following vulnerability has been resolved:\n\nperf/x86/intel: KVM: Mask PEBS_ENABLE loaded for guest with vCPU's value.\n\nWhen generating the MSR_IA32_PEBS_ENABLE value that will be loaded on\nVM-Entry to a KVM guest, mask the value with the vCPU's desired PEBS_ENABLE\nvalue.  Consulting only the host kernel's host vs. guest masks results in\nrunning the guest with PEBS enabled even when the guest doesn't want to use\nPEBS.  Because KVM uses perf events to proxy the guest virtual PMU, simply\nlooking at exclude_host can't differentiate between events created by host\nuserspace, and events created by KVM on behalf of the guest.\n\nRunning the guest with PEBS unexpectedly enabled typically manifests as\ncrashes due to a near-infinite stream of #PFs.  E.g. if the guest hasn't\nwritten MSR_IA32_DS_AREA, the CPU will hit page faults on address '0' when\ntrying to record PEBS events.\n\nThe issue is most easily reproduced by running `perf kvm top` from before\ncommit 7b100989b4f6 (\"perf evlist: Remove __evlist__add_default\") (after\nwhich, `perf kvm top` effectively stopped using PEBS).\tThe userspace side\nof perf creates a guest-only PEBS event, which intel_guest_get_msrs()\nmisconstrues a guest-*owned* PEBS event.\n\nArguably, this is a userspace bug, as enabling PEBS on guest-only events\nsimply cannot work, and userspace can kill VMs in many other ways (there\nis no danger to the host).  However, even if this is considered to be bad\nuserspace behavior, there's zero downside to perf/KVM restricting PEBS to\nguest-owned events.\n\nNote, commit 854250329c02 (\"KVM: x86/pmu: Disable guest PEBS temporarily\nin two rare situations\") fixed the case where host userspace is profiling\nKVM *and* userspace, but missed the case where userspace is profiling only\nKVM.(CVE-2025-37936)\n\nIn the Linux kernel, the following vulnerability has been resolved:\n\nftrace: Add cond_resched() to ftrace_graph_set_hash()\n\nWhen the kernel contains a large number of functions that can be traced,\nthe loop in ftrace_graph_set_hash() may take a lot of time to execute.\nThis may trigger the softlockup watchdog.\n\nAdd cond_resched() within the loop to allow the kernel to remain\nresponsive even when processing a large number of functions.\n\nThis matches the cond_resched() that is used in other locations of the\ncode that iterates over all functions that can be traced.(CVE-2025-37940)\n\nIn the Linux kernel, the following vulnerability has been resolved:\n\nwifi: ath12k: Fix invalid data access in ath12k_dp_rx_h_undecap_nwifi\n\nIn certain cases, hardware might provide packets with a\nlength greater than the maximum native Wi-Fi header length.\nThis can lead to accessing and modifying fields in the header\nwithin the ath12k_dp_rx_h_undecap_nwifi function for\nDP_RX_DECAP_TYPE_NATIVE_WIFI decap type and\npotentially resulting in invalid data access and memory corruption.\n\nAdd a sanity check before processing the SKB to prevent invalid\ndata access in the undecap native Wi-Fi function for the\nDP_RX_DECAP_TYPE_NATIVE_WIFI decap type.\n\nTested-on: QCN9274 hw2.0 PCI WLAN.WBE.1.3.1-00173-QCAHKSWPL_SILICONZ-1(CVE-2025-37943)\n\nIn the Linux kernel, the following vulnerability has been resolved:\n\niio: imu: st_lsm6dsx: fix possible lockup in st_lsm6dsx_read_fifo\n\nPrevent st_lsm6dsx_read_fifo from falling in an infinite loop in case\npattern_len is equal to zero and the device FIFO is not empty.(CVE-2025-37970)\n\nIn the Linux kernel, the following vulnerability has been resolved:\n\nblock: fix resource leak in blk_register_queue() error path\n\nWhen registering a queue fails after blk_mq_sysfs_register() is\nsuccessful but the function later encounters an error, we need\nto clean up the blk_mq_sysfs resources.\n\nAdd the missing blk_mq_sysfs_unregister() call in the error path\nto properly clean up these resources and prevent a memory leak.(CVE-2025-37980)",
				"category":"general",
				"title":"Description"
			},
			{
				"text":"An update for kernel is now available for openEuler-24.03-LTS.\n\nopenEuler Security has rated this update as having a security impact of high. A Common Vunlnerability Scoring System(CVSS)base score,which gives a detailed severity rating, is available for each vulnerability from the CVElink(s) in the References section.",
				"category":"general",
				"title":"Topic"
			},
			{
				"text":"High",
				"category":"general",
				"title":"Severity"
			},
			{
				"text":"kernel",
				"category":"general",
				"title":"Affected Component"
			}
		],
		"publisher":{
			"issuing_authority":"openEuler security committee",
			"name":"openEuler",
			"namespace":"https://www.openeuler.org",
			"contact_details":"openeuler-security@openeuler.org",
			"category":"vendor"
		},
		"references":[
			{
				"summary":"openEuler-SA-2025-1572",
				"category":"self",
				"url":"https://www.openeuler.org/zh/security/security-bulletins/detail/?id=openEuler-SA-2025-1572"
			},
			{
				"summary":"CVE-2024-58096",
				"category":"self",
				"url":"https://www.openeuler.org/en/security/cve/detail/?cveId=CVE-2024-58096&packageName=kernel"
			},
			{
				"summary":"CVE-2024-58097",
				"category":"self",
				"url":"https://www.openeuler.org/en/security/cve/detail/?cveId=CVE-2024-58097&packageName=kernel"
			},
			{
				"summary":"CVE-2025-21909",
				"category":"self",
				"url":"https://www.openeuler.org/en/security/cve/detail/?cveId=CVE-2025-21909&packageName=kernel"
			},
			{
				"summary":"CVE-2025-21912",
				"category":"self",
				"url":"https://www.openeuler.org/en/security/cve/detail/?cveId=CVE-2025-21912&packageName=kernel"
			},
			{
				"summary":"CVE-2025-21918",
				"category":"self",
				"url":"https://www.openeuler.org/en/security/cve/detail/?cveId=CVE-2025-21918&packageName=kernel"
			},
			{
				"summary":"CVE-2025-21972",
				"category":"self",
				"url":"https://www.openeuler.org/en/security/cve/detail/?cveId=CVE-2025-21972&packageName=kernel"
			},
			{
				"summary":"CVE-2025-23151",
				"category":"self",
				"url":"https://www.openeuler.org/en/security/cve/detail/?cveId=CVE-2025-23151&packageName=kernel"
			},
			{
				"summary":"CVE-2025-37754",
				"category":"self",
				"url":"https://www.openeuler.org/en/security/cve/detail/?cveId=CVE-2025-37754&packageName=kernel"
			},
			{
				"summary":"CVE-2025-37765",
				"category":"self",
				"url":"https://www.openeuler.org/en/security/cve/detail/?cveId=CVE-2025-37765&packageName=kernel"
			},
			{
				"summary":"CVE-2025-37773",
				"category":"self",
				"url":"https://www.openeuler.org/en/security/cve/detail/?cveId=CVE-2025-37773&packageName=kernel"
			},
			{
				"summary":"CVE-2025-37782",
				"category":"self",
				"url":"https://www.openeuler.org/en/security/cve/detail/?cveId=CVE-2025-37782&packageName=kernel"
			},
			{
				"summary":"CVE-2025-37851",
				"category":"self",
				"url":"https://www.openeuler.org/en/security/cve/detail/?cveId=CVE-2025-37851&packageName=kernel"
			},
			{
				"summary":"CVE-2025-37852",
				"category":"self",
				"url":"https://www.openeuler.org/en/security/cve/detail/?cveId=CVE-2025-37852&packageName=kernel"
			},
			{
				"summary":"CVE-2025-37858",
				"category":"self",
				"url":"https://www.openeuler.org/en/security/cve/detail/?cveId=CVE-2025-37858&packageName=kernel"
			},
			{
				"summary":"CVE-2025-37867",
				"category":"self",
				"url":"https://www.openeuler.org/en/security/cve/detail/?cveId=CVE-2025-37867&packageName=kernel"
			},
			{
				"summary":"CVE-2025-37886",
				"category":"self",
				"url":"https://www.openeuler.org/en/security/cve/detail/?cveId=CVE-2025-37886&packageName=kernel"
			},
			{
				"summary":"CVE-2025-37925",
				"category":"self",
				"url":"https://www.openeuler.org/en/security/cve/detail/?cveId=CVE-2025-37925&packageName=kernel"
			},
			{
				"summary":"CVE-2025-37936",
				"category":"self",
				"url":"https://www.openeuler.org/en/security/cve/detail/?cveId=CVE-2025-37936&packageName=kernel"
			},
			{
				"summary":"CVE-2025-37940",
				"category":"self",
				"url":"https://www.openeuler.org/en/security/cve/detail/?cveId=CVE-2025-37940&packageName=kernel"
			},
			{
				"summary":"CVE-2025-37943",
				"category":"self",
				"url":"https://www.openeuler.org/en/security/cve/detail/?cveId=CVE-2025-37943&packageName=kernel"
			},
			{
				"summary":"CVE-2025-37970",
				"category":"self",
				"url":"https://www.openeuler.org/en/security/cve/detail/?cveId=CVE-2025-37970&packageName=kernel"
			},
			{
				"summary":"CVE-2025-37980",
				"category":"self",
				"url":"https://www.openeuler.org/en/security/cve/detail/?cveId=CVE-2025-37980&packageName=kernel"
			},
			{
				"summary":"nvd cve",
				"category":"external",
				"url":"https://nvd.nist.gov/vuln/detail/CVE-2024-58096"
			},
			{
				"summary":"nvd cve",
				"category":"external",
				"url":"https://nvd.nist.gov/vuln/detail/CVE-2024-58097"
			},
			{
				"summary":"nvd cve",
				"category":"external",
				"url":"https://nvd.nist.gov/vuln/detail/CVE-2025-21909"
			},
			{
				"summary":"nvd cve",
				"category":"external",
				"url":"https://nvd.nist.gov/vuln/detail/CVE-2025-21912"
			},
			{
				"summary":"nvd cve",
				"category":"external",
				"url":"https://nvd.nist.gov/vuln/detail/CVE-2025-21918"
			},
			{
				"summary":"nvd cve",
				"category":"external",
				"url":"https://nvd.nist.gov/vuln/detail/CVE-2025-21972"
			},
			{
				"summary":"nvd cve",
				"category":"external",
				"url":"https://nvd.nist.gov/vuln/detail/CVE-2025-23151"
			},
			{
				"summary":"nvd cve",
				"category":"external",
				"url":"https://nvd.nist.gov/vuln/detail/CVE-2025-37754"
			},
			{
				"summary":"nvd cve",
				"category":"external",
				"url":"https://nvd.nist.gov/vuln/detail/CVE-2025-37765"
			},
			{
				"summary":"nvd cve",
				"category":"external",
				"url":"https://nvd.nist.gov/vuln/detail/CVE-2025-37773"
			},
			{
				"summary":"nvd cve",
				"category":"external",
				"url":"https://nvd.nist.gov/vuln/detail/CVE-2025-37782"
			},
			{
				"summary":"nvd cve",
				"category":"external",
				"url":"https://nvd.nist.gov/vuln/detail/CVE-2025-37851"
			},
			{
				"summary":"nvd cve",
				"category":"external",
				"url":"https://nvd.nist.gov/vuln/detail/CVE-2025-37852"
			},
			{
				"summary":"nvd cve",
				"category":"external",
				"url":"https://nvd.nist.gov/vuln/detail/CVE-2025-37858"
			},
			{
				"summary":"nvd cve",
				"category":"external",
				"url":"https://nvd.nist.gov/vuln/detail/CVE-2025-37867"
			},
			{
				"summary":"nvd cve",
				"category":"external",
				"url":"https://nvd.nist.gov/vuln/detail/CVE-2025-37886"
			},
			{
				"summary":"nvd cve",
				"category":"external",
				"url":"https://nvd.nist.gov/vuln/detail/CVE-2025-37925"
			},
			{
				"summary":"nvd cve",
				"category":"external",
				"url":"https://nvd.nist.gov/vuln/detail/CVE-2025-37936"
			},
			{
				"summary":"nvd cve",
				"category":"external",
				"url":"https://nvd.nist.gov/vuln/detail/CVE-2025-37940"
			},
			{
				"summary":"nvd cve",
				"category":"external",
				"url":"https://nvd.nist.gov/vuln/detail/CVE-2025-37943"
			},
			{
				"summary":"nvd cve",
				"category":"external",
				"url":"https://nvd.nist.gov/vuln/detail/CVE-2025-37970"
			},
			{
				"summary":"nvd cve",
				"category":"external",
				"url":"https://nvd.nist.gov/vuln/detail/CVE-2025-37980"
			},
			{
				"summary":"openEuler-SA-2025-1572 vex file",
				"category":"self",
				"url":"https://repo.openeuler.org/security/data/csaf/advisories/2025/csaf-openeuler-sa-2025-1572.json"
			}
		],
		"title":"An update for kernel is now available for openEuler-24.03-LTS",
		"tracking":{
			"initial_release_date":"2025-05-30T21:48:54+08:00",
			"revision_history":[
				{
					"date":"2025-05-30T21:48:54+08:00",
					"summary":"Initial",
					"number":"1.0.0"
				}
			],
			"generator":{
				"date":"2025-05-30T21:48:54+08:00",
				"engine":{
					"name":"openEuler CSAF Tool V1.0"
				}
			},
			"current_release_date":"2025-05-30T21:48:54+08:00",
			"id":"openEuler-SA-2025-1572",
			"version":"1.0.0",
			"status":"final"
		}
	},
	"product_tree":{
		"branches":[
			{
				"name":"openEuler",
				"category":"vendor",
				"branches":[
					{
						"name":"openEuler",
						"branches":[
							{
								"product":{
									"product_identification_helper":{
										"cpe":"cpe:/a:openEuler:openEuler:24.03-LTS"
									},
									"product_id":"openEuler-24.03-LTS",
									"name":"openEuler-24.03-LTS"
								},
								"name":"openEuler-24.03-LTS",
								"category":"product_version"
							}
						],
						"category":"product_name"
					},
					{
						"name":"x86_64",
						"branches":[
							{
								"product":{
									"product_identification_helper":{
										"cpe":"cpe:/a:openEuler:openEuler:24.03-LTS"
									},
									"product_id":"bpftool-6.6.0-93.0.0.87.oe2403.x86_64.rpm",
									"name":"bpftool-6.6.0-93.0.0.87.oe2403.x86_64.rpm"
								},
								"name":"bpftool-6.6.0-93.0.0.87.oe2403.x86_64.rpm",
								"category":"product_version"
							},
							{
								"product":{
									"product_identification_helper":{
										"cpe":"cpe:/a:openEuler:openEuler:24.03-LTS"
									},
									"product_id":"bpftool-debuginfo-6.6.0-93.0.0.87.oe2403.x86_64.rpm",
									"name":"bpftool-debuginfo-6.6.0-93.0.0.87.oe2403.x86_64.rpm"
								},
								"name":"bpftool-debuginfo-6.6.0-93.0.0.87.oe2403.x86_64.rpm",
								"category":"product_version"
							},
							{
								"product":{
									"product_identification_helper":{
										"cpe":"cpe:/a:openEuler:openEuler:24.03-LTS"
									},
									"product_id":"kernel-6.6.0-93.0.0.87.oe2403.x86_64.rpm",
									"name":"kernel-6.6.0-93.0.0.87.oe2403.x86_64.rpm"
								},
								"name":"kernel-6.6.0-93.0.0.87.oe2403.x86_64.rpm",
								"category":"product_version"
							},
							{
								"product":{
									"product_identification_helper":{
										"cpe":"cpe:/a:openEuler:openEuler:24.03-LTS"
									},
									"product_id":"kernel-debuginfo-6.6.0-93.0.0.87.oe2403.x86_64.rpm",
									"name":"kernel-debuginfo-6.6.0-93.0.0.87.oe2403.x86_64.rpm"
								},
								"name":"kernel-debuginfo-6.6.0-93.0.0.87.oe2403.x86_64.rpm",
								"category":"product_version"
							},
							{
								"product":{
									"product_identification_helper":{
										"cpe":"cpe:/a:openEuler:openEuler:24.03-LTS"
									},
									"product_id":"kernel-debugsource-6.6.0-93.0.0.87.oe2403.x86_64.rpm",
									"name":"kernel-debugsource-6.6.0-93.0.0.87.oe2403.x86_64.rpm"
								},
								"name":"kernel-debugsource-6.6.0-93.0.0.87.oe2403.x86_64.rpm",
								"category":"product_version"
							},
							{
								"product":{
									"product_identification_helper":{
										"cpe":"cpe:/a:openEuler:openEuler:24.03-LTS"
									},
									"product_id":"kernel-devel-6.6.0-93.0.0.87.oe2403.x86_64.rpm",
									"name":"kernel-devel-6.6.0-93.0.0.87.oe2403.x86_64.rpm"
								},
								"name":"kernel-devel-6.6.0-93.0.0.87.oe2403.x86_64.rpm",
								"category":"product_version"
							},
							{
								"product":{
									"product_identification_helper":{
										"cpe":"cpe:/a:openEuler:openEuler:24.03-LTS"
									},
									"product_id":"kernel-headers-6.6.0-93.0.0.87.oe2403.x86_64.rpm",
									"name":"kernel-headers-6.6.0-93.0.0.87.oe2403.x86_64.rpm"
								},
								"name":"kernel-headers-6.6.0-93.0.0.87.oe2403.x86_64.rpm",
								"category":"product_version"
							},
							{
								"product":{
									"product_identification_helper":{
										"cpe":"cpe:/a:openEuler:openEuler:24.03-LTS"
									},
									"product_id":"kernel-source-6.6.0-93.0.0.87.oe2403.x86_64.rpm",
									"name":"kernel-source-6.6.0-93.0.0.87.oe2403.x86_64.rpm"
								},
								"name":"kernel-source-6.6.0-93.0.0.87.oe2403.x86_64.rpm",
								"category":"product_version"
							},
							{
								"product":{
									"product_identification_helper":{
										"cpe":"cpe:/a:openEuler:openEuler:24.03-LTS"
									},
									"product_id":"kernel-tools-6.6.0-93.0.0.87.oe2403.x86_64.rpm",
									"name":"kernel-tools-6.6.0-93.0.0.87.oe2403.x86_64.rpm"
								},
								"name":"kernel-tools-6.6.0-93.0.0.87.oe2403.x86_64.rpm",
								"category":"product_version"
							},
							{
								"product":{
									"product_identification_helper":{
										"cpe":"cpe:/a:openEuler:openEuler:24.03-LTS"
									},
									"product_id":"kernel-tools-debuginfo-6.6.0-93.0.0.87.oe2403.x86_64.rpm",
									"name":"kernel-tools-debuginfo-6.6.0-93.0.0.87.oe2403.x86_64.rpm"
								},
								"name":"kernel-tools-debuginfo-6.6.0-93.0.0.87.oe2403.x86_64.rpm",
								"category":"product_version"
							},
							{
								"product":{
									"product_identification_helper":{
										"cpe":"cpe:/a:openEuler:openEuler:24.03-LTS"
									},
									"product_id":"kernel-tools-devel-6.6.0-93.0.0.87.oe2403.x86_64.rpm",
									"name":"kernel-tools-devel-6.6.0-93.0.0.87.oe2403.x86_64.rpm"
								},
								"name":"kernel-tools-devel-6.6.0-93.0.0.87.oe2403.x86_64.rpm",
								"category":"product_version"
							},
							{
								"product":{
									"product_identification_helper":{
										"cpe":"cpe:/a:openEuler:openEuler:24.03-LTS"
									},
									"product_id":"perf-6.6.0-93.0.0.87.oe2403.x86_64.rpm",
									"name":"perf-6.6.0-93.0.0.87.oe2403.x86_64.rpm"
								},
								"name":"perf-6.6.0-93.0.0.87.oe2403.x86_64.rpm",
								"category":"product_version"
							},
							{
								"product":{
									"product_identification_helper":{
										"cpe":"cpe:/a:openEuler:openEuler:24.03-LTS"
									},
									"product_id":"perf-debuginfo-6.6.0-93.0.0.87.oe2403.x86_64.rpm",
									"name":"perf-debuginfo-6.6.0-93.0.0.87.oe2403.x86_64.rpm"
								},
								"name":"perf-debuginfo-6.6.0-93.0.0.87.oe2403.x86_64.rpm",
								"category":"product_version"
							},
							{
								"product":{
									"product_identification_helper":{
										"cpe":"cpe:/a:openEuler:openEuler:24.03-LTS"
									},
									"product_id":"python3-perf-6.6.0-93.0.0.87.oe2403.x86_64.rpm",
									"name":"python3-perf-6.6.0-93.0.0.87.oe2403.x86_64.rpm"
								},
								"name":"python3-perf-6.6.0-93.0.0.87.oe2403.x86_64.rpm",
								"category":"product_version"
							},
							{
								"product":{
									"product_identification_helper":{
										"cpe":"cpe:/a:openEuler:openEuler:24.03-LTS"
									},
									"product_id":"python3-perf-debuginfo-6.6.0-93.0.0.87.oe2403.x86_64.rpm",
									"name":"python3-perf-debuginfo-6.6.0-93.0.0.87.oe2403.x86_64.rpm"
								},
								"name":"python3-perf-debuginfo-6.6.0-93.0.0.87.oe2403.x86_64.rpm",
								"category":"product_version"
							}
						],
						"category":"architecture"
					},
					{
						"name":"src",
						"branches":[
							{
								"product":{
									"product_identification_helper":{
										"cpe":"cpe:/a:openEuler:openEuler:24.03-LTS"
									},
									"product_id":"kernel-6.6.0-93.0.0.87.oe2403.src.rpm",
									"name":"kernel-6.6.0-93.0.0.87.oe2403.src.rpm"
								},
								"name":"kernel-6.6.0-93.0.0.87.oe2403.src.rpm",
								"category":"product_version"
							}
						],
						"category":"architecture"
					},
					{
						"name":"aarch64",
						"branches":[
							{
								"product":{
									"product_identification_helper":{
										"cpe":"cpe:/a:openEuler:openEuler:24.03-LTS"
									},
									"product_id":"bpftool-6.6.0-93.0.0.87.oe2403.aarch64.rpm",
									"name":"bpftool-6.6.0-93.0.0.87.oe2403.aarch64.rpm"
								},
								"name":"bpftool-6.6.0-93.0.0.87.oe2403.aarch64.rpm",
								"category":"product_version"
							},
							{
								"product":{
									"product_identification_helper":{
										"cpe":"cpe:/a:openEuler:openEuler:24.03-LTS"
									},
									"product_id":"bpftool-debuginfo-6.6.0-93.0.0.87.oe2403.aarch64.rpm",
									"name":"bpftool-debuginfo-6.6.0-93.0.0.87.oe2403.aarch64.rpm"
								},
								"name":"bpftool-debuginfo-6.6.0-93.0.0.87.oe2403.aarch64.rpm",
								"category":"product_version"
							},
							{
								"product":{
									"product_identification_helper":{
										"cpe":"cpe:/a:openEuler:openEuler:24.03-LTS"
									},
									"product_id":"kernel-6.6.0-93.0.0.87.oe2403.aarch64.rpm",
									"name":"kernel-6.6.0-93.0.0.87.oe2403.aarch64.rpm"
								},
								"name":"kernel-6.6.0-93.0.0.87.oe2403.aarch64.rpm",
								"category":"product_version"
							},
							{
								"product":{
									"product_identification_helper":{
										"cpe":"cpe:/a:openEuler:openEuler:24.03-LTS"
									},
									"product_id":"kernel-debuginfo-6.6.0-93.0.0.87.oe2403.aarch64.rpm",
									"name":"kernel-debuginfo-6.6.0-93.0.0.87.oe2403.aarch64.rpm"
								},
								"name":"kernel-debuginfo-6.6.0-93.0.0.87.oe2403.aarch64.rpm",
								"category":"product_version"
							},
							{
								"product":{
									"product_identification_helper":{
										"cpe":"cpe:/a:openEuler:openEuler:24.03-LTS"
									},
									"product_id":"kernel-debugsource-6.6.0-93.0.0.87.oe2403.aarch64.rpm",
									"name":"kernel-debugsource-6.6.0-93.0.0.87.oe2403.aarch64.rpm"
								},
								"name":"kernel-debugsource-6.6.0-93.0.0.87.oe2403.aarch64.rpm",
								"category":"product_version"
							},
							{
								"product":{
									"product_identification_helper":{
										"cpe":"cpe:/a:openEuler:openEuler:24.03-LTS"
									},
									"product_id":"kernel-devel-6.6.0-93.0.0.87.oe2403.aarch64.rpm",
									"name":"kernel-devel-6.6.0-93.0.0.87.oe2403.aarch64.rpm"
								},
								"name":"kernel-devel-6.6.0-93.0.0.87.oe2403.aarch64.rpm",
								"category":"product_version"
							},
							{
								"product":{
									"product_identification_helper":{
										"cpe":"cpe:/a:openEuler:openEuler:24.03-LTS"
									},
									"product_id":"kernel-headers-6.6.0-93.0.0.87.oe2403.aarch64.rpm",
									"name":"kernel-headers-6.6.0-93.0.0.87.oe2403.aarch64.rpm"
								},
								"name":"kernel-headers-6.6.0-93.0.0.87.oe2403.aarch64.rpm",
								"category":"product_version"
							},
							{
								"product":{
									"product_identification_helper":{
										"cpe":"cpe:/a:openEuler:openEuler:24.03-LTS"
									},
									"product_id":"kernel-source-6.6.0-93.0.0.87.oe2403.aarch64.rpm",
									"name":"kernel-source-6.6.0-93.0.0.87.oe2403.aarch64.rpm"
								},
								"name":"kernel-source-6.6.0-93.0.0.87.oe2403.aarch64.rpm",
								"category":"product_version"
							},
							{
								"product":{
									"product_identification_helper":{
										"cpe":"cpe:/a:openEuler:openEuler:24.03-LTS"
									},
									"product_id":"kernel-tools-6.6.0-93.0.0.87.oe2403.aarch64.rpm",
									"name":"kernel-tools-6.6.0-93.0.0.87.oe2403.aarch64.rpm"
								},
								"name":"kernel-tools-6.6.0-93.0.0.87.oe2403.aarch64.rpm",
								"category":"product_version"
							},
							{
								"product":{
									"product_identification_helper":{
										"cpe":"cpe:/a:openEuler:openEuler:24.03-LTS"
									},
									"product_id":"kernel-tools-debuginfo-6.6.0-93.0.0.87.oe2403.aarch64.rpm",
									"name":"kernel-tools-debuginfo-6.6.0-93.0.0.87.oe2403.aarch64.rpm"
								},
								"name":"kernel-tools-debuginfo-6.6.0-93.0.0.87.oe2403.aarch64.rpm",
								"category":"product_version"
							},
							{
								"product":{
									"product_identification_helper":{
										"cpe":"cpe:/a:openEuler:openEuler:24.03-LTS"
									},
									"product_id":"kernel-tools-devel-6.6.0-93.0.0.87.oe2403.aarch64.rpm",
									"name":"kernel-tools-devel-6.6.0-93.0.0.87.oe2403.aarch64.rpm"
								},
								"name":"kernel-tools-devel-6.6.0-93.0.0.87.oe2403.aarch64.rpm",
								"category":"product_version"
							},
							{
								"product":{
									"product_identification_helper":{
										"cpe":"cpe:/a:openEuler:openEuler:24.03-LTS"
									},
									"product_id":"perf-6.6.0-93.0.0.87.oe2403.aarch64.rpm",
									"name":"perf-6.6.0-93.0.0.87.oe2403.aarch64.rpm"
								},
								"name":"perf-6.6.0-93.0.0.87.oe2403.aarch64.rpm",
								"category":"product_version"
							},
							{
								"product":{
									"product_identification_helper":{
										"cpe":"cpe:/a:openEuler:openEuler:24.03-LTS"
									},
									"product_id":"perf-debuginfo-6.6.0-93.0.0.87.oe2403.aarch64.rpm",
									"name":"perf-debuginfo-6.6.0-93.0.0.87.oe2403.aarch64.rpm"
								},
								"name":"perf-debuginfo-6.6.0-93.0.0.87.oe2403.aarch64.rpm",
								"category":"product_version"
							},
							{
								"product":{
									"product_identification_helper":{
										"cpe":"cpe:/a:openEuler:openEuler:24.03-LTS"
									},
									"product_id":"python3-perf-6.6.0-93.0.0.87.oe2403.aarch64.rpm",
									"name":"python3-perf-6.6.0-93.0.0.87.oe2403.aarch64.rpm"
								},
								"name":"python3-perf-6.6.0-93.0.0.87.oe2403.aarch64.rpm",
								"category":"product_version"
							},
							{
								"product":{
									"product_identification_helper":{
										"cpe":"cpe:/a:openEuler:openEuler:24.03-LTS"
									},
									"product_id":"python3-perf-debuginfo-6.6.0-93.0.0.87.oe2403.aarch64.rpm",
									"name":"python3-perf-debuginfo-6.6.0-93.0.0.87.oe2403.aarch64.rpm"
								},
								"name":"python3-perf-debuginfo-6.6.0-93.0.0.87.oe2403.aarch64.rpm",
								"category":"product_version"
							}
						],
						"category":"architecture"
					}
				]
			}
		],
		"relationships":[
			{
				"relates_to_product_reference":"openEuler-24.03-LTS",
				"product_reference":"bpftool-6.6.0-93.0.0.87.oe2403.x86_64.rpm",
				"full_product_name":{
					"product_id":"openEuler-24.03-LTS:bpftool-6.6.0-93.0.0.87.oe2403.x86_64",
					"name":"bpftool-6.6.0-93.0.0.87.oe2403.x86_64 as a component of openEuler-24.03-LTS"
				},
				"category":"default_component_of"
			},
			{
				"relates_to_product_reference":"openEuler-24.03-LTS",
				"product_reference":"bpftool-debuginfo-6.6.0-93.0.0.87.oe2403.x86_64.rpm",
				"full_product_name":{
					"product_id":"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-93.0.0.87.oe2403.x86_64",
					"name":"bpftool-debuginfo-6.6.0-93.0.0.87.oe2403.x86_64 as a component of openEuler-24.03-LTS"
				},
				"category":"default_component_of"
			},
			{
				"relates_to_product_reference":"openEuler-24.03-LTS",
				"product_reference":"kernel-6.6.0-93.0.0.87.oe2403.x86_64.rpm",
				"full_product_name":{
					"product_id":"openEuler-24.03-LTS:kernel-6.6.0-93.0.0.87.oe2403.x86_64",
					"name":"kernel-6.6.0-93.0.0.87.oe2403.x86_64 as a component of openEuler-24.03-LTS"
				},
				"category":"default_component_of"
			},
			{
				"relates_to_product_reference":"openEuler-24.03-LTS",
				"product_reference":"kernel-debuginfo-6.6.0-93.0.0.87.oe2403.x86_64.rpm",
				"full_product_name":{
					"product_id":"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-93.0.0.87.oe2403.x86_64",
					"name":"kernel-debuginfo-6.6.0-93.0.0.87.oe2403.x86_64 as a component of openEuler-24.03-LTS"
				},
				"category":"default_component_of"
			},
			{
				"relates_to_product_reference":"openEuler-24.03-LTS",
				"product_reference":"kernel-debugsource-6.6.0-93.0.0.87.oe2403.x86_64.rpm",
				"full_product_name":{
					"product_id":"openEuler-24.03-LTS:kernel-debugsource-6.6.0-93.0.0.87.oe2403.x86_64",
					"name":"kernel-debugsource-6.6.0-93.0.0.87.oe2403.x86_64 as a component of openEuler-24.03-LTS"
				},
				"category":"default_component_of"
			},
			{
				"relates_to_product_reference":"openEuler-24.03-LTS",
				"product_reference":"kernel-devel-6.6.0-93.0.0.87.oe2403.x86_64.rpm",
				"full_product_name":{
					"product_id":"openEuler-24.03-LTS:kernel-devel-6.6.0-93.0.0.87.oe2403.x86_64",
					"name":"kernel-devel-6.6.0-93.0.0.87.oe2403.x86_64 as a component of openEuler-24.03-LTS"
				},
				"category":"default_component_of"
			},
			{
				"relates_to_product_reference":"openEuler-24.03-LTS",
				"product_reference":"kernel-headers-6.6.0-93.0.0.87.oe2403.x86_64.rpm",
				"full_product_name":{
					"product_id":"openEuler-24.03-LTS:kernel-headers-6.6.0-93.0.0.87.oe2403.x86_64",
					"name":"kernel-headers-6.6.0-93.0.0.87.oe2403.x86_64 as a component of openEuler-24.03-LTS"
				},
				"category":"default_component_of"
			},
			{
				"relates_to_product_reference":"openEuler-24.03-LTS",
				"product_reference":"kernel-source-6.6.0-93.0.0.87.oe2403.x86_64.rpm",
				"full_product_name":{
					"product_id":"openEuler-24.03-LTS:kernel-source-6.6.0-93.0.0.87.oe2403.x86_64",
					"name":"kernel-source-6.6.0-93.0.0.87.oe2403.x86_64 as a component of openEuler-24.03-LTS"
				},
				"category":"default_component_of"
			},
			{
				"relates_to_product_reference":"openEuler-24.03-LTS",
				"product_reference":"kernel-tools-6.6.0-93.0.0.87.oe2403.x86_64.rpm",
				"full_product_name":{
					"product_id":"openEuler-24.03-LTS:kernel-tools-6.6.0-93.0.0.87.oe2403.x86_64",
					"name":"kernel-tools-6.6.0-93.0.0.87.oe2403.x86_64 as a component of openEuler-24.03-LTS"
				},
				"category":"default_component_of"
			},
			{
				"relates_to_product_reference":"openEuler-24.03-LTS",
				"product_reference":"kernel-tools-debuginfo-6.6.0-93.0.0.87.oe2403.x86_64.rpm",
				"full_product_name":{
					"product_id":"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-93.0.0.87.oe2403.x86_64",
					"name":"kernel-tools-debuginfo-6.6.0-93.0.0.87.oe2403.x86_64 as a component of openEuler-24.03-LTS"
				},
				"category":"default_component_of"
			},
			{
				"relates_to_product_reference":"openEuler-24.03-LTS",
				"product_reference":"kernel-tools-devel-6.6.0-93.0.0.87.oe2403.x86_64.rpm",
				"full_product_name":{
					"product_id":"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-93.0.0.87.oe2403.x86_64",
					"name":"kernel-tools-devel-6.6.0-93.0.0.87.oe2403.x86_64 as a component of openEuler-24.03-LTS"
				},
				"category":"default_component_of"
			},
			{
				"relates_to_product_reference":"openEuler-24.03-LTS",
				"product_reference":"perf-6.6.0-93.0.0.87.oe2403.x86_64.rpm",
				"full_product_name":{
					"product_id":"openEuler-24.03-LTS:perf-6.6.0-93.0.0.87.oe2403.x86_64",
					"name":"perf-6.6.0-93.0.0.87.oe2403.x86_64 as a component of openEuler-24.03-LTS"
				},
				"category":"default_component_of"
			},
			{
				"relates_to_product_reference":"openEuler-24.03-LTS",
				"product_reference":"perf-debuginfo-6.6.0-93.0.0.87.oe2403.x86_64.rpm",
				"full_product_name":{
					"product_id":"openEuler-24.03-LTS:perf-debuginfo-6.6.0-93.0.0.87.oe2403.x86_64",
					"name":"perf-debuginfo-6.6.0-93.0.0.87.oe2403.x86_64 as a component of openEuler-24.03-LTS"
				},
				"category":"default_component_of"
			},
			{
				"relates_to_product_reference":"openEuler-24.03-LTS",
				"product_reference":"python3-perf-6.6.0-93.0.0.87.oe2403.x86_64.rpm",
				"full_product_name":{
					"product_id":"openEuler-24.03-LTS:python3-perf-6.6.0-93.0.0.87.oe2403.x86_64",
					"name":"python3-perf-6.6.0-93.0.0.87.oe2403.x86_64 as a component of openEuler-24.03-LTS"
				},
				"category":"default_component_of"
			},
			{
				"relates_to_product_reference":"openEuler-24.03-LTS",
				"product_reference":"python3-perf-debuginfo-6.6.0-93.0.0.87.oe2403.x86_64.rpm",
				"full_product_name":{
					"product_id":"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-93.0.0.87.oe2403.x86_64",
					"name":"python3-perf-debuginfo-6.6.0-93.0.0.87.oe2403.x86_64 as a component of openEuler-24.03-LTS"
				},
				"category":"default_component_of"
			},
			{
				"relates_to_product_reference":"openEuler-24.03-LTS",
				"product_reference":"kernel-6.6.0-93.0.0.87.oe2403.src.rpm",
				"full_product_name":{
					"product_id":"openEuler-24.03-LTS:kernel-6.6.0-93.0.0.87.oe2403.src",
					"name":"kernel-6.6.0-93.0.0.87.oe2403.src as a component of openEuler-24.03-LTS"
				},
				"category":"default_component_of"
			},
			{
				"relates_to_product_reference":"openEuler-24.03-LTS",
				"product_reference":"bpftool-6.6.0-93.0.0.87.oe2403.aarch64.rpm",
				"full_product_name":{
					"product_id":"openEuler-24.03-LTS:bpftool-6.6.0-93.0.0.87.oe2403.aarch64",
					"name":"bpftool-6.6.0-93.0.0.87.oe2403.aarch64 as a component of openEuler-24.03-LTS"
				},
				"category":"default_component_of"
			},
			{
				"relates_to_product_reference":"openEuler-24.03-LTS",
				"product_reference":"bpftool-debuginfo-6.6.0-93.0.0.87.oe2403.aarch64.rpm",
				"full_product_name":{
					"product_id":"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-93.0.0.87.oe2403.aarch64",
					"name":"bpftool-debuginfo-6.6.0-93.0.0.87.oe2403.aarch64 as a component of openEuler-24.03-LTS"
				},
				"category":"default_component_of"
			},
			{
				"relates_to_product_reference":"openEuler-24.03-LTS",
				"product_reference":"kernel-6.6.0-93.0.0.87.oe2403.aarch64.rpm",
				"full_product_name":{
					"product_id":"openEuler-24.03-LTS:kernel-6.6.0-93.0.0.87.oe2403.aarch64",
					"name":"kernel-6.6.0-93.0.0.87.oe2403.aarch64 as a component of openEuler-24.03-LTS"
				},
				"category":"default_component_of"
			},
			{
				"relates_to_product_reference":"openEuler-24.03-LTS",
				"product_reference":"kernel-debuginfo-6.6.0-93.0.0.87.oe2403.aarch64.rpm",
				"full_product_name":{
					"product_id":"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-93.0.0.87.oe2403.aarch64",
					"name":"kernel-debuginfo-6.6.0-93.0.0.87.oe2403.aarch64 as a component of openEuler-24.03-LTS"
				},
				"category":"default_component_of"
			},
			{
				"relates_to_product_reference":"openEuler-24.03-LTS",
				"product_reference":"kernel-debugsource-6.6.0-93.0.0.87.oe2403.aarch64.rpm",
				"full_product_name":{
					"product_id":"openEuler-24.03-LTS:kernel-debugsource-6.6.0-93.0.0.87.oe2403.aarch64",
					"name":"kernel-debugsource-6.6.0-93.0.0.87.oe2403.aarch64 as a component of openEuler-24.03-LTS"
				},
				"category":"default_component_of"
			},
			{
				"relates_to_product_reference":"openEuler-24.03-LTS",
				"product_reference":"kernel-devel-6.6.0-93.0.0.87.oe2403.aarch64.rpm",
				"full_product_name":{
					"product_id":"openEuler-24.03-LTS:kernel-devel-6.6.0-93.0.0.87.oe2403.aarch64",
					"name":"kernel-devel-6.6.0-93.0.0.87.oe2403.aarch64 as a component of openEuler-24.03-LTS"
				},
				"category":"default_component_of"
			},
			{
				"relates_to_product_reference":"openEuler-24.03-LTS",
				"product_reference":"kernel-headers-6.6.0-93.0.0.87.oe2403.aarch64.rpm",
				"full_product_name":{
					"product_id":"openEuler-24.03-LTS:kernel-headers-6.6.0-93.0.0.87.oe2403.aarch64",
					"name":"kernel-headers-6.6.0-93.0.0.87.oe2403.aarch64 as a component of openEuler-24.03-LTS"
				},
				"category":"default_component_of"
			},
			{
				"relates_to_product_reference":"openEuler-24.03-LTS",
				"product_reference":"kernel-source-6.6.0-93.0.0.87.oe2403.aarch64.rpm",
				"full_product_name":{
					"product_id":"openEuler-24.03-LTS:kernel-source-6.6.0-93.0.0.87.oe2403.aarch64",
					"name":"kernel-source-6.6.0-93.0.0.87.oe2403.aarch64 as a component of openEuler-24.03-LTS"
				},
				"category":"default_component_of"
			},
			{
				"relates_to_product_reference":"openEuler-24.03-LTS",
				"product_reference":"kernel-tools-6.6.0-93.0.0.87.oe2403.aarch64.rpm",
				"full_product_name":{
					"product_id":"openEuler-24.03-LTS:kernel-tools-6.6.0-93.0.0.87.oe2403.aarch64",
					"name":"kernel-tools-6.6.0-93.0.0.87.oe2403.aarch64 as a component of openEuler-24.03-LTS"
				},
				"category":"default_component_of"
			},
			{
				"relates_to_product_reference":"openEuler-24.03-LTS",
				"product_reference":"kernel-tools-debuginfo-6.6.0-93.0.0.87.oe2403.aarch64.rpm",
				"full_product_name":{
					"product_id":"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-93.0.0.87.oe2403.aarch64",
					"name":"kernel-tools-debuginfo-6.6.0-93.0.0.87.oe2403.aarch64 as a component of openEuler-24.03-LTS"
				},
				"category":"default_component_of"
			},
			{
				"relates_to_product_reference":"openEuler-24.03-LTS",
				"product_reference":"kernel-tools-devel-6.6.0-93.0.0.87.oe2403.aarch64.rpm",
				"full_product_name":{
					"product_id":"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-93.0.0.87.oe2403.aarch64",
					"name":"kernel-tools-devel-6.6.0-93.0.0.87.oe2403.aarch64 as a component of openEuler-24.03-LTS"
				},
				"category":"default_component_of"
			},
			{
				"relates_to_product_reference":"openEuler-24.03-LTS",
				"product_reference":"perf-6.6.0-93.0.0.87.oe2403.aarch64.rpm",
				"full_product_name":{
					"product_id":"openEuler-24.03-LTS:perf-6.6.0-93.0.0.87.oe2403.aarch64",
					"name":"perf-6.6.0-93.0.0.87.oe2403.aarch64 as a component of openEuler-24.03-LTS"
				},
				"category":"default_component_of"
			},
			{
				"relates_to_product_reference":"openEuler-24.03-LTS",
				"product_reference":"perf-debuginfo-6.6.0-93.0.0.87.oe2403.aarch64.rpm",
				"full_product_name":{
					"product_id":"openEuler-24.03-LTS:perf-debuginfo-6.6.0-93.0.0.87.oe2403.aarch64",
					"name":"perf-debuginfo-6.6.0-93.0.0.87.oe2403.aarch64 as a component of openEuler-24.03-LTS"
				},
				"category":"default_component_of"
			},
			{
				"relates_to_product_reference":"openEuler-24.03-LTS",
				"product_reference":"python3-perf-6.6.0-93.0.0.87.oe2403.aarch64.rpm",
				"full_product_name":{
					"product_id":"openEuler-24.03-LTS:python3-perf-6.6.0-93.0.0.87.oe2403.aarch64",
					"name":"python3-perf-6.6.0-93.0.0.87.oe2403.aarch64 as a component of openEuler-24.03-LTS"
				},
				"category":"default_component_of"
			},
			{
				"relates_to_product_reference":"openEuler-24.03-LTS",
				"product_reference":"python3-perf-debuginfo-6.6.0-93.0.0.87.oe2403.aarch64.rpm",
				"full_product_name":{
					"product_id":"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-93.0.0.87.oe2403.aarch64",
					"name":"python3-perf-debuginfo-6.6.0-93.0.0.87.oe2403.aarch64 as a component of openEuler-24.03-LTS"
				},
				"category":"default_component_of"
			}
		]
	},
	"vulnerabilities":[
		{
			"cve":"CVE-2024-58096",
			"notes":[
				{
					"text":"In the Linux kernel, the following vulnerability has been resolved:\n\nwifi: ath11k: add srng->lock for ath11k_hal_srng_* in monitor mode\n\nath11k_hal_srng_* should be used with srng->lock to protect srng data.\n\nFor ath11k_dp_rx_mon_dest_process() and ath11k_dp_full_mon_process_rx(),\nthey use ath11k_hal_srng_* for many times but never call srng->lock.\n\nSo when running (full) monitor mode, warning will occur:\nRIP: 0010:ath11k_hal_srng_dst_peek+0x18/0x30 [ath11k]\nCall Trace:\n ? ath11k_hal_srng_dst_peek+0x18/0x30 [ath11k]\n ath11k_dp_rx_process_mon_status+0xc45/0x1190 [ath11k]\n ? idr_alloc_u32+0x97/0xd0\n ath11k_dp_rx_process_mon_rings+0x32a/0x550 [ath11k]\n ath11k_dp_service_srng+0x289/0x5a0 [ath11k]\n ath11k_pcic_ext_grp_napi_poll+0x30/0xd0 [ath11k]\n __napi_poll+0x30/0x1f0\n net_rx_action+0x198/0x320\n __do_softirq+0xdd/0x319\n\nSo add srng->lock for them to avoid such warnings.\n\nInorder to fetch the srng->lock, should change srng's definition from\n'void' to 'struct hal_srng'. And initialize them elsewhere to prevent\none line of code from being too long. This is consistent with other ring\nprocess functions, such as ath11k_dp_process_rx().\n\nTested-on: WCN6855 hw2.0 PCI WLAN.HSP.1.1-03125-QCAHSPSWPL_V1_V2_SILICONZ_LITE-3.6510.30\nTested-on: QCN9074 hw1.0 PCI WLAN.HK.2.7.0.1-01744-QCAHKSWPL_SILICONZ-1",
					"category":"description",
					"title":"Vulnerability Description"
				}
			],
			"product_status":{
				"fixed":[
					"openEuler-24.03-LTS:bpftool-6.6.0-93.0.0.87.oe2403.x86_64",
					"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-93.0.0.87.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-6.6.0-93.0.0.87.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-93.0.0.87.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-debugsource-6.6.0-93.0.0.87.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-devel-6.6.0-93.0.0.87.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-headers-6.6.0-93.0.0.87.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-source-6.6.0-93.0.0.87.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-tools-6.6.0-93.0.0.87.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-93.0.0.87.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-93.0.0.87.oe2403.x86_64",
					"openEuler-24.03-LTS:perf-6.6.0-93.0.0.87.oe2403.x86_64",
					"openEuler-24.03-LTS:perf-debuginfo-6.6.0-93.0.0.87.oe2403.x86_64",
					"openEuler-24.03-LTS:python3-perf-6.6.0-93.0.0.87.oe2403.x86_64",
					"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-93.0.0.87.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-6.6.0-93.0.0.87.oe2403.src",
					"openEuler-24.03-LTS:bpftool-6.6.0-93.0.0.87.oe2403.aarch64",
					"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-93.0.0.87.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-6.6.0-93.0.0.87.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-93.0.0.87.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-debugsource-6.6.0-93.0.0.87.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-devel-6.6.0-93.0.0.87.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-headers-6.6.0-93.0.0.87.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-source-6.6.0-93.0.0.87.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-tools-6.6.0-93.0.0.87.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-93.0.0.87.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-93.0.0.87.oe2403.aarch64",
					"openEuler-24.03-LTS:perf-6.6.0-93.0.0.87.oe2403.aarch64",
					"openEuler-24.03-LTS:perf-debuginfo-6.6.0-93.0.0.87.oe2403.aarch64",
					"openEuler-24.03-LTS:python3-perf-6.6.0-93.0.0.87.oe2403.aarch64",
					"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-93.0.0.87.oe2403.aarch64"
				]
			},
			"remediations":[
				{
					"product_ids":[
						"openEuler-24.03-LTS:bpftool-6.6.0-93.0.0.87.oe2403.x86_64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-93.0.0.87.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-6.6.0-93.0.0.87.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-93.0.0.87.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-93.0.0.87.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-93.0.0.87.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-93.0.0.87.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-93.0.0.87.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-93.0.0.87.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-93.0.0.87.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-93.0.0.87.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-6.6.0-93.0.0.87.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-93.0.0.87.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-93.0.0.87.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-93.0.0.87.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-6.6.0-93.0.0.87.oe2403.src",
						"openEuler-24.03-LTS:bpftool-6.6.0-93.0.0.87.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-93.0.0.87.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-6.6.0-93.0.0.87.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-93.0.0.87.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-93.0.0.87.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-93.0.0.87.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-93.0.0.87.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-93.0.0.87.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-93.0.0.87.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-93.0.0.87.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-93.0.0.87.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-6.6.0-93.0.0.87.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-93.0.0.87.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-93.0.0.87.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-93.0.0.87.oe2403.aarch64"
					],
					"details":"kernel security update",
					"category":"vendor_fix",
					"url":"https://www.openeuler.org/zh/security/security-bulletins/detail/?id=openEuler-SA-2025-1572"
				}
			],
			"scores":[
				{
					"cvss_v3":{
						"baseSeverity":"MEDIUM",
						"baseScore":5.9,
						"vectorString":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H",
						"version":"3.1"
					},
					"products":[
						"openEuler-24.03-LTS:bpftool-6.6.0-93.0.0.87.oe2403.x86_64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-93.0.0.87.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-6.6.0-93.0.0.87.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-93.0.0.87.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-93.0.0.87.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-93.0.0.87.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-93.0.0.87.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-93.0.0.87.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-93.0.0.87.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-93.0.0.87.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-93.0.0.87.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-6.6.0-93.0.0.87.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-93.0.0.87.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-93.0.0.87.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-93.0.0.87.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-6.6.0-93.0.0.87.oe2403.src",
						"openEuler-24.03-LTS:bpftool-6.6.0-93.0.0.87.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-93.0.0.87.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-6.6.0-93.0.0.87.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-93.0.0.87.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-93.0.0.87.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-93.0.0.87.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-93.0.0.87.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-93.0.0.87.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-93.0.0.87.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-93.0.0.87.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-93.0.0.87.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-6.6.0-93.0.0.87.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-93.0.0.87.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-93.0.0.87.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-93.0.0.87.oe2403.aarch64"
					]
				}
			],
			"threats":[
				{
					"details":"Medium",
					"category":"impact"
				}
			],
			"title":"CVE-2024-58096"
		},
		{
			"cve":"CVE-2024-58097",
			"notes":[
				{
					"text":"In the Linux kernel, the following vulnerability has been resolved:\n\nwifi: ath11k: fix RCU stall while reaping monitor destination ring\n\nWhile processing the monitor destination ring, MSDUs are reaped from the\nlink descriptor based on the corresponding buf_id.\n\nHowever, sometimes the driver cannot obtain a valid buffer corresponding\nto the buf_id received from the hardware. This causes an infinite loop\nin the destination processing, resulting in a kernel crash.\n\nkernel log:\nath11k_pci 0000:58:00.0: data msdu_pop: invalid buf_id 309\nath11k_pci 0000:58:00.0: data dp_rx_monitor_link_desc_return failed\nath11k_pci 0000:58:00.0: data msdu_pop: invalid buf_id 309\nath11k_pci 0000:58:00.0: data dp_rx_monitor_link_desc_return failed\n\nFix this by skipping the problematic buf_id and reaping the next entry,\nreplacing the break with the next MSDU processing.\n\nTested-on: WCN6855 hw2.0 PCI WLAN.HSP.1.1-03125-QCAHSPSWPL_V1_V2_SILICONZ_LITE-3.6510.30\nTested-on: QCN9074 hw1.0 PCI WLAN.HK.2.7.0.1-01744-QCAHKSWPL_SILICONZ-1",
					"category":"description",
					"title":"Vulnerability Description"
				}
			],
			"product_status":{
				"fixed":[
					"openEuler-24.03-LTS:bpftool-6.6.0-93.0.0.87.oe2403.x86_64",
					"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-93.0.0.87.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-6.6.0-93.0.0.87.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-93.0.0.87.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-debugsource-6.6.0-93.0.0.87.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-devel-6.6.0-93.0.0.87.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-headers-6.6.0-93.0.0.87.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-source-6.6.0-93.0.0.87.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-tools-6.6.0-93.0.0.87.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-93.0.0.87.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-93.0.0.87.oe2403.x86_64",
					"openEuler-24.03-LTS:perf-6.6.0-93.0.0.87.oe2403.x86_64",
					"openEuler-24.03-LTS:perf-debuginfo-6.6.0-93.0.0.87.oe2403.x86_64",
					"openEuler-24.03-LTS:python3-perf-6.6.0-93.0.0.87.oe2403.x86_64",
					"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-93.0.0.87.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-6.6.0-93.0.0.87.oe2403.src",
					"openEuler-24.03-LTS:bpftool-6.6.0-93.0.0.87.oe2403.aarch64",
					"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-93.0.0.87.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-6.6.0-93.0.0.87.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-93.0.0.87.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-debugsource-6.6.0-93.0.0.87.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-devel-6.6.0-93.0.0.87.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-headers-6.6.0-93.0.0.87.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-source-6.6.0-93.0.0.87.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-tools-6.6.0-93.0.0.87.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-93.0.0.87.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-93.0.0.87.oe2403.aarch64",
					"openEuler-24.03-LTS:perf-6.6.0-93.0.0.87.oe2403.aarch64",
					"openEuler-24.03-LTS:perf-debuginfo-6.6.0-93.0.0.87.oe2403.aarch64",
					"openEuler-24.03-LTS:python3-perf-6.6.0-93.0.0.87.oe2403.aarch64",
					"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-93.0.0.87.oe2403.aarch64"
				]
			},
			"remediations":[
				{
					"product_ids":[
						"openEuler-24.03-LTS:bpftool-6.6.0-93.0.0.87.oe2403.x86_64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-93.0.0.87.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-6.6.0-93.0.0.87.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-93.0.0.87.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-93.0.0.87.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-93.0.0.87.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-93.0.0.87.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-93.0.0.87.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-93.0.0.87.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-93.0.0.87.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-93.0.0.87.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-6.6.0-93.0.0.87.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-93.0.0.87.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-93.0.0.87.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-93.0.0.87.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-6.6.0-93.0.0.87.oe2403.src",
						"openEuler-24.03-LTS:bpftool-6.6.0-93.0.0.87.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-93.0.0.87.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-6.6.0-93.0.0.87.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-93.0.0.87.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-93.0.0.87.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-93.0.0.87.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-93.0.0.87.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-93.0.0.87.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-93.0.0.87.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-93.0.0.87.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-93.0.0.87.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-6.6.0-93.0.0.87.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-93.0.0.87.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-93.0.0.87.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-93.0.0.87.oe2403.aarch64"
					],
					"details":"kernel security update",
					"category":"vendor_fix",
					"url":"https://www.openeuler.org/zh/security/security-bulletins/detail/?id=openEuler-SA-2025-1572"
				}
			],
			"scores":[
				{
					"cvss_v3":{
						"baseSeverity":"MEDIUM",
						"baseScore":5.5,
						"vectorString":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
						"version":"3.1"
					},
					"products":[
						"openEuler-24.03-LTS:bpftool-6.6.0-93.0.0.87.oe2403.x86_64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-93.0.0.87.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-6.6.0-93.0.0.87.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-93.0.0.87.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-93.0.0.87.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-93.0.0.87.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-93.0.0.87.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-93.0.0.87.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-93.0.0.87.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-93.0.0.87.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-93.0.0.87.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-6.6.0-93.0.0.87.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-93.0.0.87.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-93.0.0.87.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-93.0.0.87.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-6.6.0-93.0.0.87.oe2403.src",
						"openEuler-24.03-LTS:bpftool-6.6.0-93.0.0.87.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-93.0.0.87.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-6.6.0-93.0.0.87.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-93.0.0.87.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-93.0.0.87.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-93.0.0.87.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-93.0.0.87.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-93.0.0.87.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-93.0.0.87.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-93.0.0.87.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-93.0.0.87.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-6.6.0-93.0.0.87.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-93.0.0.87.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-93.0.0.87.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-93.0.0.87.oe2403.aarch64"
					]
				}
			],
			"threats":[
				{
					"details":"Medium",
					"category":"impact"
				}
			],
			"title":"CVE-2024-58097"
		},
		{
			"cve":"CVE-2025-21909",
			"notes":[
				{
					"text":"In the Linux kernel, the following vulnerability has been resolved:\n\nwifi: nl80211: reject cooked mode if it is set along with other flags\n\nIt is possible to set both MONITOR_FLAG_COOK_FRAMES and MONITOR_FLAG_ACTIVE\nflags simultaneously on the same monitor interface from the userspace. This\ncauses a sub-interface to be created with no IEEE80211_SDATA_IN_DRIVER bit\nset because the monitor interface is in the cooked state and it takes\nprecedence over all other states. When the interface is then being deleted\nthe kernel calls WARN_ONCE() from check_sdata_in_driver() because of missing\nthat bit.\n\nFix this by rejecting MONITOR_FLAG_COOK_FRAMES if it is set along with\nother flags.\n\nFound by Linux Verification Center (linuxtesting.org) with Syzkaller.",
					"category":"description",
					"title":"Vulnerability Description"
				}
			],
			"product_status":{
				"fixed":[
					"openEuler-24.03-LTS:bpftool-6.6.0-93.0.0.87.oe2403.x86_64",
					"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-93.0.0.87.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-6.6.0-93.0.0.87.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-93.0.0.87.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-debugsource-6.6.0-93.0.0.87.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-devel-6.6.0-93.0.0.87.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-headers-6.6.0-93.0.0.87.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-source-6.6.0-93.0.0.87.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-tools-6.6.0-93.0.0.87.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-93.0.0.87.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-93.0.0.87.oe2403.x86_64",
					"openEuler-24.03-LTS:perf-6.6.0-93.0.0.87.oe2403.x86_64",
					"openEuler-24.03-LTS:perf-debuginfo-6.6.0-93.0.0.87.oe2403.x86_64",
					"openEuler-24.03-LTS:python3-perf-6.6.0-93.0.0.87.oe2403.x86_64",
					"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-93.0.0.87.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-6.6.0-93.0.0.87.oe2403.src",
					"openEuler-24.03-LTS:bpftool-6.6.0-93.0.0.87.oe2403.aarch64",
					"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-93.0.0.87.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-6.6.0-93.0.0.87.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-93.0.0.87.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-debugsource-6.6.0-93.0.0.87.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-devel-6.6.0-93.0.0.87.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-headers-6.6.0-93.0.0.87.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-source-6.6.0-93.0.0.87.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-tools-6.6.0-93.0.0.87.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-93.0.0.87.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-93.0.0.87.oe2403.aarch64",
					"openEuler-24.03-LTS:perf-6.6.0-93.0.0.87.oe2403.aarch64",
					"openEuler-24.03-LTS:perf-debuginfo-6.6.0-93.0.0.87.oe2403.aarch64",
					"openEuler-24.03-LTS:python3-perf-6.6.0-93.0.0.87.oe2403.aarch64",
					"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-93.0.0.87.oe2403.aarch64"
				]
			},
			"remediations":[
				{
					"product_ids":[
						"openEuler-24.03-LTS:bpftool-6.6.0-93.0.0.87.oe2403.x86_64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-93.0.0.87.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-6.6.0-93.0.0.87.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-93.0.0.87.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-93.0.0.87.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-93.0.0.87.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-93.0.0.87.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-93.0.0.87.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-93.0.0.87.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-93.0.0.87.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-93.0.0.87.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-6.6.0-93.0.0.87.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-93.0.0.87.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-93.0.0.87.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-93.0.0.87.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-6.6.0-93.0.0.87.oe2403.src",
						"openEuler-24.03-LTS:bpftool-6.6.0-93.0.0.87.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-93.0.0.87.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-6.6.0-93.0.0.87.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-93.0.0.87.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-93.0.0.87.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-93.0.0.87.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-93.0.0.87.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-93.0.0.87.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-93.0.0.87.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-93.0.0.87.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-93.0.0.87.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-6.6.0-93.0.0.87.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-93.0.0.87.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-93.0.0.87.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-93.0.0.87.oe2403.aarch64"
					],
					"details":"kernel security update",
					"category":"vendor_fix",
					"url":"https://www.openeuler.org/zh/security/security-bulletins/detail/?id=openEuler-SA-2025-1572"
				}
			],
			"scores":[
				{
					"cvss_v3":{
						"baseSeverity":"MEDIUM",
						"baseScore":5.5,
						"vectorString":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
						"version":"3.1"
					},
					"products":[
						"openEuler-24.03-LTS:bpftool-6.6.0-93.0.0.87.oe2403.x86_64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-93.0.0.87.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-6.6.0-93.0.0.87.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-93.0.0.87.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-93.0.0.87.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-93.0.0.87.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-93.0.0.87.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-93.0.0.87.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-93.0.0.87.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-93.0.0.87.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-93.0.0.87.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-6.6.0-93.0.0.87.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-93.0.0.87.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-93.0.0.87.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-93.0.0.87.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-6.6.0-93.0.0.87.oe2403.src",
						"openEuler-24.03-LTS:bpftool-6.6.0-93.0.0.87.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-93.0.0.87.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-6.6.0-93.0.0.87.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-93.0.0.87.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-93.0.0.87.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-93.0.0.87.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-93.0.0.87.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-93.0.0.87.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-93.0.0.87.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-93.0.0.87.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-93.0.0.87.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-6.6.0-93.0.0.87.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-93.0.0.87.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-93.0.0.87.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-93.0.0.87.oe2403.aarch64"
					]
				}
			],
			"threats":[
				{
					"details":"Medium",
					"category":"impact"
				}
			],
			"title":"CVE-2025-21909"
		},
		{
			"cve":"CVE-2025-21912",
			"notes":[
				{
					"text":"In the Linux kernel, the following vulnerability has been resolved:\n\ngpio: rcar: Use raw_spinlock to protect register access\n\nUse raw_spinlock in order to fix spurious messages about invalid context\nwhen spinlock debugging is enabled. The lock is only used to serialize\nregister access.\n\n    [    4.239592] =============================\n    [    4.239595] [ BUG: Invalid wait context ]\n    [    4.239599] 6.13.0-rc7-arm64-renesas-05496-gd088502a519f #35 Not tainted\n    [    4.239603] -----------------------------\n    [    4.239606] kworker/u8:5/76 is trying to lock:\n    [    4.239609] ffff0000091898a0 (&p->lock){....}-{3:3}, at: gpio_rcar_config_interrupt_input_mode+0x34/0x164\n    [    4.239641] other info that might help us debug this:\n    [    4.239643] context-{5:5}\n    [    4.239646] 5 locks held by kworker/u8:5/76:\n    [    4.239651]  #0: ffff0000080fb148 ((wq_completion)async){+.+.}-{0:0}, at: process_one_work+0x190/0x62c\n    [    4.250180] OF: /soc/sound@ec500000/ports/port@0/endpoint: Read of boolean property 'frame-master' with a value.\n    [    4.254094]  #1: ffff80008299bd80 ((work_completion)(&entry->work)){+.+.}-{0:0}, at: process_one_work+0x1b8/0x62c\n    [    4.254109]  #2: ffff00000920c8f8\n    [    4.258345] OF: /soc/sound@ec500000/ports/port@1/endpoint: Read of boolean property 'bitclock-master' with a value.\n    [    4.264803]  (&dev->mutex){....}-{4:4}, at: __device_attach_async_helper+0x3c/0xdc\n    [    4.264820]  #3: ffff00000a50ca40 (request_class#2){+.+.}-{4:4}, at: __setup_irq+0xa0/0x690\n    [    4.264840]  #4:\n    [    4.268872] OF: /soc/sound@ec500000/ports/port@1/endpoint: Read of boolean property 'frame-master' with a value.\n    [    4.273275] ffff00000a50c8c8 (lock_class){....}-{2:2}, at: __setup_irq+0xc4/0x690\n    [    4.296130] renesas_sdhi_internal_dmac ee100000.mmc: mmc1 base at 0x00000000ee100000, max clock rate 200 MHz\n    [    4.304082] stack backtrace:\n    [    4.304086] CPU: 1 UID: 0 PID: 76 Comm: kworker/u8:5 Not tainted 6.13.0-rc7-arm64-renesas-05496-gd088502a519f #35\n    [    4.304092] Hardware name: Renesas Salvator-X 2nd version board based on r8a77965 (DT)\n    [    4.304097] Workqueue: async async_run_entry_fn\n    [    4.304106] Call trace:\n    [    4.304110]  show_stack+0x14/0x20 (C)\n    [    4.304122]  dump_stack_lvl+0x6c/0x90\n    [    4.304131]  dump_stack+0x14/0x1c\n    [    4.304138]  __lock_acquire+0xdfc/0x1584\n    [    4.426274]  lock_acquire+0x1c4/0x33c\n    [    4.429942]  _raw_spin_lock_irqsave+0x5c/0x80\n    [    4.434307]  gpio_rcar_config_interrupt_input_mode+0x34/0x164\n    [    4.440061]  gpio_rcar_irq_set_type+0xd4/0xd8\n    [    4.444422]  __irq_set_trigger+0x5c/0x178\n    [    4.448435]  __setup_irq+0x2e4/0x690\n    [    4.452012]  request_threaded_irq+0xc4/0x190\n    [    4.456285]  devm_request_threaded_irq+0x7c/0xf4\n    [    4.459398] ata1: link resume succeeded after 1 retries\n    [    4.460902]  mmc_gpiod_request_cd_irq+0x68/0xe0\n    [    4.470660]  mmc_start_host+0x50/0xac\n    [    4.474327]  mmc_add_host+0x80/0xe4\n    [    4.477817]  tmio_mmc_host_probe+0x2b0/0x440\n    [    4.482094]  renesas_sdhi_probe+0x488/0x6f4\n    [    4.486281]  renesas_sdhi_internal_dmac_probe+0x60/0x78\n    [    4.491509]  platform_probe+0x64/0xd8\n    [    4.495178]  really_probe+0xb8/0x2a8\n    [    4.498756]  __driver_probe_device+0x74/0x118\n    [    4.503116]  driver_probe_device+0x3c/0x154\n    [    4.507303]  __device_attach_driver+0xd4/0x160\n    [    4.511750]  bus_for_each_drv+0x84/0xe0\n    [    4.515588]  __device_attach_async_helper+0xb0/0xdc\n    [    4.520470]  async_run_entry_fn+0x30/0xd8\n    [    4.524481]  process_one_work+0x210/0x62c\n    [    4.528494]  worker_thread+0x1ac/0x340\n    [    4.532245]  kthread+0x10c/0x110\n    [    4.535476]  ret_from_fork+0x10/0x20",
					"category":"description",
					"title":"Vulnerability Description"
				}
			],
			"product_status":{
				"fixed":[
					"openEuler-24.03-LTS:bpftool-6.6.0-93.0.0.87.oe2403.x86_64",
					"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-93.0.0.87.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-6.6.0-93.0.0.87.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-93.0.0.87.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-debugsource-6.6.0-93.0.0.87.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-devel-6.6.0-93.0.0.87.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-headers-6.6.0-93.0.0.87.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-source-6.6.0-93.0.0.87.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-tools-6.6.0-93.0.0.87.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-93.0.0.87.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-93.0.0.87.oe2403.x86_64",
					"openEuler-24.03-LTS:perf-6.6.0-93.0.0.87.oe2403.x86_64",
					"openEuler-24.03-LTS:perf-debuginfo-6.6.0-93.0.0.87.oe2403.x86_64",
					"openEuler-24.03-LTS:python3-perf-6.6.0-93.0.0.87.oe2403.x86_64",
					"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-93.0.0.87.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-6.6.0-93.0.0.87.oe2403.src",
					"openEuler-24.03-LTS:bpftool-6.6.0-93.0.0.87.oe2403.aarch64",
					"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-93.0.0.87.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-6.6.0-93.0.0.87.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-93.0.0.87.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-debugsource-6.6.0-93.0.0.87.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-devel-6.6.0-93.0.0.87.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-headers-6.6.0-93.0.0.87.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-source-6.6.0-93.0.0.87.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-tools-6.6.0-93.0.0.87.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-93.0.0.87.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-93.0.0.87.oe2403.aarch64",
					"openEuler-24.03-LTS:perf-6.6.0-93.0.0.87.oe2403.aarch64",
					"openEuler-24.03-LTS:perf-debuginfo-6.6.0-93.0.0.87.oe2403.aarch64",
					"openEuler-24.03-LTS:python3-perf-6.6.0-93.0.0.87.oe2403.aarch64",
					"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-93.0.0.87.oe2403.aarch64"
				]
			},
			"remediations":[
				{
					"product_ids":[
						"openEuler-24.03-LTS:bpftool-6.6.0-93.0.0.87.oe2403.x86_64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-93.0.0.87.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-6.6.0-93.0.0.87.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-93.0.0.87.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-93.0.0.87.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-93.0.0.87.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-93.0.0.87.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-93.0.0.87.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-93.0.0.87.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-93.0.0.87.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-93.0.0.87.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-6.6.0-93.0.0.87.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-93.0.0.87.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-93.0.0.87.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-93.0.0.87.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-6.6.0-93.0.0.87.oe2403.src",
						"openEuler-24.03-LTS:bpftool-6.6.0-93.0.0.87.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-93.0.0.87.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-6.6.0-93.0.0.87.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-93.0.0.87.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-93.0.0.87.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-93.0.0.87.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-93.0.0.87.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-93.0.0.87.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-93.0.0.87.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-93.0.0.87.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-93.0.0.87.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-6.6.0-93.0.0.87.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-93.0.0.87.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-93.0.0.87.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-93.0.0.87.oe2403.aarch64"
					],
					"details":"kernel security update",
					"category":"vendor_fix",
					"url":"https://www.openeuler.org/zh/security/security-bulletins/detail/?id=openEuler-SA-2025-1572"
				}
			],
			"scores":[
				{
					"cvss_v3":{
						"baseSeverity":"MEDIUM",
						"baseScore":5.5,
						"vectorString":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
						"version":"3.1"
					},
					"products":[
						"openEuler-24.03-LTS:bpftool-6.6.0-93.0.0.87.oe2403.x86_64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-93.0.0.87.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-6.6.0-93.0.0.87.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-93.0.0.87.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-93.0.0.87.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-93.0.0.87.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-93.0.0.87.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-93.0.0.87.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-93.0.0.87.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-93.0.0.87.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-93.0.0.87.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-6.6.0-93.0.0.87.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-93.0.0.87.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-93.0.0.87.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-93.0.0.87.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-6.6.0-93.0.0.87.oe2403.src",
						"openEuler-24.03-LTS:bpftool-6.6.0-93.0.0.87.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-93.0.0.87.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-6.6.0-93.0.0.87.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-93.0.0.87.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-93.0.0.87.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-93.0.0.87.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-93.0.0.87.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-93.0.0.87.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-93.0.0.87.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-93.0.0.87.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-93.0.0.87.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-6.6.0-93.0.0.87.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-93.0.0.87.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-93.0.0.87.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-93.0.0.87.oe2403.aarch64"
					]
				}
			],
			"threats":[
				{
					"details":"Medium",
					"category":"impact"
				}
			],
			"title":"CVE-2025-21912"
		},
		{
			"cve":"CVE-2025-21918",
			"notes":[
				{
					"text":"In the Linux kernel, the following vulnerability has been resolved:\n\nusb: typec: ucsi: Fix NULL pointer access\n\nResources should be released only after all threads that utilize them\nhave been destroyed.\nThis commit ensures that resources are not released prematurely by waiting\nfor the associated workqueue to complete before deallocating them.",
					"category":"description",
					"title":"Vulnerability Description"
				}
			],
			"product_status":{
				"fixed":[
					"openEuler-24.03-LTS:bpftool-6.6.0-93.0.0.87.oe2403.x86_64",
					"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-93.0.0.87.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-6.6.0-93.0.0.87.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-93.0.0.87.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-debugsource-6.6.0-93.0.0.87.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-devel-6.6.0-93.0.0.87.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-headers-6.6.0-93.0.0.87.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-source-6.6.0-93.0.0.87.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-tools-6.6.0-93.0.0.87.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-93.0.0.87.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-93.0.0.87.oe2403.x86_64",
					"openEuler-24.03-LTS:perf-6.6.0-93.0.0.87.oe2403.x86_64",
					"openEuler-24.03-LTS:perf-debuginfo-6.6.0-93.0.0.87.oe2403.x86_64",
					"openEuler-24.03-LTS:python3-perf-6.6.0-93.0.0.87.oe2403.x86_64",
					"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-93.0.0.87.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-6.6.0-93.0.0.87.oe2403.src",
					"openEuler-24.03-LTS:bpftool-6.6.0-93.0.0.87.oe2403.aarch64",
					"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-93.0.0.87.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-6.6.0-93.0.0.87.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-93.0.0.87.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-debugsource-6.6.0-93.0.0.87.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-devel-6.6.0-93.0.0.87.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-headers-6.6.0-93.0.0.87.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-source-6.6.0-93.0.0.87.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-tools-6.6.0-93.0.0.87.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-93.0.0.87.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-93.0.0.87.oe2403.aarch64",
					"openEuler-24.03-LTS:perf-6.6.0-93.0.0.87.oe2403.aarch64",
					"openEuler-24.03-LTS:perf-debuginfo-6.6.0-93.0.0.87.oe2403.aarch64",
					"openEuler-24.03-LTS:python3-perf-6.6.0-93.0.0.87.oe2403.aarch64",
					"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-93.0.0.87.oe2403.aarch64"
				]
			},
			"remediations":[
				{
					"product_ids":[
						"openEuler-24.03-LTS:bpftool-6.6.0-93.0.0.87.oe2403.x86_64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-93.0.0.87.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-6.6.0-93.0.0.87.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-93.0.0.87.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-93.0.0.87.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-93.0.0.87.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-93.0.0.87.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-93.0.0.87.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-93.0.0.87.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-93.0.0.87.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-93.0.0.87.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-6.6.0-93.0.0.87.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-93.0.0.87.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-93.0.0.87.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-93.0.0.87.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-6.6.0-93.0.0.87.oe2403.src",
						"openEuler-24.03-LTS:bpftool-6.6.0-93.0.0.87.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-93.0.0.87.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-6.6.0-93.0.0.87.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-93.0.0.87.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-93.0.0.87.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-93.0.0.87.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-93.0.0.87.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-93.0.0.87.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-93.0.0.87.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-93.0.0.87.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-93.0.0.87.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-6.6.0-93.0.0.87.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-93.0.0.87.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-93.0.0.87.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-93.0.0.87.oe2403.aarch64"
					],
					"details":"kernel security update",
					"category":"vendor_fix",
					"url":"https://www.openeuler.org/zh/security/security-bulletins/detail/?id=openEuler-SA-2025-1572"
				}
			],
			"scores":[
				{
					"cvss_v3":{
						"baseSeverity":"MEDIUM",
						"baseScore":5.5,
						"vectorString":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
						"version":"3.1"
					},
					"products":[
						"openEuler-24.03-LTS:bpftool-6.6.0-93.0.0.87.oe2403.x86_64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-93.0.0.87.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-6.6.0-93.0.0.87.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-93.0.0.87.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-93.0.0.87.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-93.0.0.87.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-93.0.0.87.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-93.0.0.87.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-93.0.0.87.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-93.0.0.87.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-93.0.0.87.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-6.6.0-93.0.0.87.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-93.0.0.87.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-93.0.0.87.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-93.0.0.87.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-6.6.0-93.0.0.87.oe2403.src",
						"openEuler-24.03-LTS:bpftool-6.6.0-93.0.0.87.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-93.0.0.87.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-6.6.0-93.0.0.87.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-93.0.0.87.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-93.0.0.87.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-93.0.0.87.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-93.0.0.87.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-93.0.0.87.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-93.0.0.87.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-93.0.0.87.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-93.0.0.87.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-6.6.0-93.0.0.87.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-93.0.0.87.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-93.0.0.87.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-93.0.0.87.oe2403.aarch64"
					]
				}
			],
			"threats":[
				{
					"details":"Medium",
					"category":"impact"
				}
			],
			"title":"CVE-2025-21918"
		},
		{
			"cve":"CVE-2025-21972",
			"notes":[
				{
					"text":"In the Linux kernel, the following vulnerability has been resolved:\n\nnet: mctp: unshare packets when reassembling\n\nEnsure that the frag_list used for reassembly isn't shared with other\npackets. This avoids incorrect reassembly when packets are cloned, and\nprevents a memory leak due to circular references between fragments and\ntheir skb_shared_info.\n\nThe upcoming MCTP-over-USB driver uses skb_clone which can trigger the\nproblem - other MCTP drivers don't share SKBs.\n\nA kunit test is added to reproduce the issue.",
					"category":"description",
					"title":"Vulnerability Description"
				}
			],
			"product_status":{
				"fixed":[
					"openEuler-24.03-LTS:bpftool-6.6.0-93.0.0.87.oe2403.x86_64",
					"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-93.0.0.87.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-6.6.0-93.0.0.87.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-93.0.0.87.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-debugsource-6.6.0-93.0.0.87.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-devel-6.6.0-93.0.0.87.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-headers-6.6.0-93.0.0.87.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-source-6.6.0-93.0.0.87.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-tools-6.6.0-93.0.0.87.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-93.0.0.87.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-93.0.0.87.oe2403.x86_64",
					"openEuler-24.03-LTS:perf-6.6.0-93.0.0.87.oe2403.x86_64",
					"openEuler-24.03-LTS:perf-debuginfo-6.6.0-93.0.0.87.oe2403.x86_64",
					"openEuler-24.03-LTS:python3-perf-6.6.0-93.0.0.87.oe2403.x86_64",
					"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-93.0.0.87.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-6.6.0-93.0.0.87.oe2403.src",
					"openEuler-24.03-LTS:bpftool-6.6.0-93.0.0.87.oe2403.aarch64",
					"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-93.0.0.87.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-6.6.0-93.0.0.87.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-93.0.0.87.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-debugsource-6.6.0-93.0.0.87.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-devel-6.6.0-93.0.0.87.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-headers-6.6.0-93.0.0.87.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-source-6.6.0-93.0.0.87.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-tools-6.6.0-93.0.0.87.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-93.0.0.87.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-93.0.0.87.oe2403.aarch64",
					"openEuler-24.03-LTS:perf-6.6.0-93.0.0.87.oe2403.aarch64",
					"openEuler-24.03-LTS:perf-debuginfo-6.6.0-93.0.0.87.oe2403.aarch64",
					"openEuler-24.03-LTS:python3-perf-6.6.0-93.0.0.87.oe2403.aarch64",
					"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-93.0.0.87.oe2403.aarch64"
				]
			},
			"remediations":[
				{
					"product_ids":[
						"openEuler-24.03-LTS:bpftool-6.6.0-93.0.0.87.oe2403.x86_64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-93.0.0.87.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-6.6.0-93.0.0.87.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-93.0.0.87.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-93.0.0.87.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-93.0.0.87.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-93.0.0.87.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-93.0.0.87.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-93.0.0.87.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-93.0.0.87.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-93.0.0.87.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-6.6.0-93.0.0.87.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-93.0.0.87.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-93.0.0.87.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-93.0.0.87.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-6.6.0-93.0.0.87.oe2403.src",
						"openEuler-24.03-LTS:bpftool-6.6.0-93.0.0.87.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-93.0.0.87.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-6.6.0-93.0.0.87.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-93.0.0.87.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-93.0.0.87.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-93.0.0.87.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-93.0.0.87.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-93.0.0.87.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-93.0.0.87.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-93.0.0.87.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-93.0.0.87.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-6.6.0-93.0.0.87.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-93.0.0.87.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-93.0.0.87.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-93.0.0.87.oe2403.aarch64"
					],
					"details":"kernel security update",
					"category":"vendor_fix",
					"url":"https://www.openeuler.org/zh/security/security-bulletins/detail/?id=openEuler-SA-2025-1572"
				}
			],
			"scores":[
				{
					"cvss_v3":{
						"baseSeverity":"MEDIUM",
						"baseScore":5.5,
						"vectorString":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
						"version":"3.1"
					},
					"products":[
						"openEuler-24.03-LTS:bpftool-6.6.0-93.0.0.87.oe2403.x86_64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-93.0.0.87.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-6.6.0-93.0.0.87.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-93.0.0.87.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-93.0.0.87.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-93.0.0.87.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-93.0.0.87.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-93.0.0.87.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-93.0.0.87.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-93.0.0.87.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-93.0.0.87.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-6.6.0-93.0.0.87.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-93.0.0.87.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-93.0.0.87.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-93.0.0.87.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-6.6.0-93.0.0.87.oe2403.src",
						"openEuler-24.03-LTS:bpftool-6.6.0-93.0.0.87.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-93.0.0.87.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-6.6.0-93.0.0.87.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-93.0.0.87.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-93.0.0.87.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-93.0.0.87.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-93.0.0.87.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-93.0.0.87.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-93.0.0.87.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-93.0.0.87.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-93.0.0.87.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-6.6.0-93.0.0.87.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-93.0.0.87.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-93.0.0.87.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-93.0.0.87.oe2403.aarch64"
					]
				}
			],
			"threats":[
				{
					"details":"Medium",
					"category":"impact"
				}
			],
			"title":"CVE-2025-21972"
		},
		{
			"cve":"CVE-2025-23151",
			"notes":[
				{
					"text":"In the Linux kernel, the following vulnerability has been resolved:\n\nbus: mhi: host: Fix race between unprepare and queue_buf\n\nA client driver may use mhi_unprepare_from_transfer() to quiesce\nincoming data during the client driver's tear down. The client driver\nmight also be processing data at the same time, resulting in a call to\nmhi_queue_buf() which will invoke mhi_gen_tre(). If mhi_gen_tre() runs\nafter mhi_unprepare_from_transfer() has torn down the channel, a panic\nwill occur due to an invalid dereference leading to a page fault.\n\nThis occurs because mhi_gen_tre() does not verify the channel state\nafter locking it. Fix this by having mhi_gen_tre() confirm the channel\nstate is valid, or return error to avoid accessing deinitialized data.\n\n[mani: added stable tag]",
					"category":"description",
					"title":"Vulnerability Description"
				}
			],
			"product_status":{
				"fixed":[
					"openEuler-24.03-LTS:bpftool-6.6.0-93.0.0.87.oe2403.x86_64",
					"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-93.0.0.87.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-6.6.0-93.0.0.87.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-93.0.0.87.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-debugsource-6.6.0-93.0.0.87.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-devel-6.6.0-93.0.0.87.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-headers-6.6.0-93.0.0.87.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-source-6.6.0-93.0.0.87.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-tools-6.6.0-93.0.0.87.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-93.0.0.87.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-93.0.0.87.oe2403.x86_64",
					"openEuler-24.03-LTS:perf-6.6.0-93.0.0.87.oe2403.x86_64",
					"openEuler-24.03-LTS:perf-debuginfo-6.6.0-93.0.0.87.oe2403.x86_64",
					"openEuler-24.03-LTS:python3-perf-6.6.0-93.0.0.87.oe2403.x86_64",
					"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-93.0.0.87.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-6.6.0-93.0.0.87.oe2403.src",
					"openEuler-24.03-LTS:bpftool-6.6.0-93.0.0.87.oe2403.aarch64",
					"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-93.0.0.87.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-6.6.0-93.0.0.87.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-93.0.0.87.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-debugsource-6.6.0-93.0.0.87.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-devel-6.6.0-93.0.0.87.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-headers-6.6.0-93.0.0.87.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-source-6.6.0-93.0.0.87.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-tools-6.6.0-93.0.0.87.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-93.0.0.87.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-93.0.0.87.oe2403.aarch64",
					"openEuler-24.03-LTS:perf-6.6.0-93.0.0.87.oe2403.aarch64",
					"openEuler-24.03-LTS:perf-debuginfo-6.6.0-93.0.0.87.oe2403.aarch64",
					"openEuler-24.03-LTS:python3-perf-6.6.0-93.0.0.87.oe2403.aarch64",
					"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-93.0.0.87.oe2403.aarch64"
				]
			},
			"remediations":[
				{
					"product_ids":[
						"openEuler-24.03-LTS:bpftool-6.6.0-93.0.0.87.oe2403.x86_64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-93.0.0.87.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-6.6.0-93.0.0.87.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-93.0.0.87.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-93.0.0.87.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-93.0.0.87.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-93.0.0.87.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-93.0.0.87.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-93.0.0.87.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-93.0.0.87.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-93.0.0.87.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-6.6.0-93.0.0.87.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-93.0.0.87.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-93.0.0.87.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-93.0.0.87.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-6.6.0-93.0.0.87.oe2403.src",
						"openEuler-24.03-LTS:bpftool-6.6.0-93.0.0.87.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-93.0.0.87.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-6.6.0-93.0.0.87.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-93.0.0.87.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-93.0.0.87.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-93.0.0.87.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-93.0.0.87.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-93.0.0.87.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-93.0.0.87.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-93.0.0.87.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-93.0.0.87.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-6.6.0-93.0.0.87.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-93.0.0.87.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-93.0.0.87.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-93.0.0.87.oe2403.aarch64"
					],
					"details":"kernel security update",
					"category":"vendor_fix",
					"url":"https://www.openeuler.org/zh/security/security-bulletins/detail/?id=openEuler-SA-2025-1572"
				}
			],
			"scores":[
				{
					"cvss_v3":{
						"baseSeverity":"LOW",
						"baseScore":3.9,
						"vectorString":"CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:L/I:L/A:L",
						"version":"3.1"
					},
					"products":[
						"openEuler-24.03-LTS:bpftool-6.6.0-93.0.0.87.oe2403.x86_64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-93.0.0.87.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-6.6.0-93.0.0.87.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-93.0.0.87.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-93.0.0.87.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-93.0.0.87.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-93.0.0.87.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-93.0.0.87.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-93.0.0.87.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-93.0.0.87.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-93.0.0.87.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-6.6.0-93.0.0.87.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-93.0.0.87.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-93.0.0.87.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-93.0.0.87.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-6.6.0-93.0.0.87.oe2403.src",
						"openEuler-24.03-LTS:bpftool-6.6.0-93.0.0.87.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-93.0.0.87.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-6.6.0-93.0.0.87.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-93.0.0.87.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-93.0.0.87.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-93.0.0.87.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-93.0.0.87.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-93.0.0.87.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-93.0.0.87.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-93.0.0.87.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-93.0.0.87.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-6.6.0-93.0.0.87.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-93.0.0.87.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-93.0.0.87.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-93.0.0.87.oe2403.aarch64"
					]
				}
			],
			"threats":[
				{
					"details":"Low",
					"category":"impact"
				}
			],
			"title":"CVE-2025-23151"
		},
		{
			"cve":"CVE-2025-37754",
			"notes":[
				{
					"text":"In the Linux kernel, the following vulnerability has been resolved:\n\ndrm/i915/huc: Fix fence not released on early probe errors\n\nHuC delayed loading fence, introduced with commit 27536e03271da\n(\"drm/i915/huc: track delayed HuC load with a fence\"), is registered with\nobject tracker early on driver probe but unregistered only from driver\nremove, which is not called on early probe errors.  Since its memory is\nallocated under devres, then released anyway, it may happen to be\nallocated again to the fence and reused on future driver probes, resulting\nin kernel warnings that taint the kernel:\n\n<4> [309.731371] ------------[ cut here ]------------\n<3> [309.731373] ODEBUG: init destroyed (active state 0) object: ffff88813d7dd2e0 object type: i915_sw_fence hint: sw_fence_dummy_notify+0x0/0x20 [i915]\n<4> [309.731575] WARNING: CPU: 2 PID: 3161 at lib/debugobjects.c:612 debug_print_object+0x93/0xf0\n...\n<4> [309.731693] CPU: 2 UID: 0 PID: 3161 Comm: i915_module_loa Tainted: G     U             6.14.0-CI_DRM_16362-gf0fd77956987+ #1\n...\n<4> [309.731700] RIP: 0010:debug_print_object+0x93/0xf0\n...\n<4> [309.731728] Call Trace:\n<4> [309.731730]  <TASK>\n...\n<4> [309.731949]  __debug_object_init+0x17b/0x1c0\n<4> [309.731957]  debug_object_init+0x34/0x50\n<4> [309.732126]  __i915_sw_fence_init+0x34/0x60 [i915]\n<4> [309.732256]  intel_huc_init_early+0x4b/0x1d0 [i915]\n<4> [309.732468]  intel_uc_init_early+0x61/0x680 [i915]\n<4> [309.732667]  intel_gt_common_init_early+0x105/0x130 [i915]\n<4> [309.732804]  intel_root_gt_init_early+0x63/0x80 [i915]\n<4> [309.732938]  i915_driver_probe+0x1fa/0xeb0 [i915]\n<4> [309.733075]  i915_pci_probe+0xe6/0x220 [i915]\n<4> [309.733198]  local_pci_probe+0x44/0xb0\n<4> [309.733203]  pci_device_probe+0xf4/0x270\n<4> [309.733209]  really_probe+0xee/0x3c0\n<4> [309.733215]  __driver_probe_device+0x8c/0x180\n<4> [309.733219]  driver_probe_device+0x24/0xd0\n<4> [309.733223]  __driver_attach+0x10f/0x220\n<4> [309.733230]  bus_for_each_dev+0x7d/0xe0\n<4> [309.733236]  driver_attach+0x1e/0x30\n<4> [309.733239]  bus_add_driver+0x151/0x290\n<4> [309.733244]  driver_register+0x5e/0x130\n<4> [309.733247]  __pci_register_driver+0x7d/0x90\n<4> [309.733251]  i915_pci_register_driver+0x23/0x30 [i915]\n<4> [309.733413]  i915_init+0x34/0x120 [i915]\n<4> [309.733655]  do_one_initcall+0x62/0x3f0\n<4> [309.733667]  do_init_module+0x97/0x2a0\n<4> [309.733671]  load_module+0x25ff/0x2890\n<4> [309.733688]  init_module_from_file+0x97/0xe0\n<4> [309.733701]  idempotent_init_module+0x118/0x330\n<4> [309.733711]  __x64_sys_finit_module+0x77/0x100\n<4> [309.733715]  x64_sys_call+0x1f37/0x2650\n<4> [309.733719]  do_syscall_64+0x91/0x180\n<4> [309.733763]  entry_SYSCALL_64_after_hwframe+0x76/0x7e\n<4> [309.733792]  </TASK>\n...\n<4> [309.733806] ---[ end trace 0000000000000000 ]---\n\nThat scenario is most easily reproducible with\nigt@i915_module_load@reload-with-fault-injection.\n\nFix the issue by moving the cleanup step to driver release path.\n\n(cherry picked from commit 795dbde92fe5c6996a02a5b579481de73035e7bf)",
					"category":"description",
					"title":"Vulnerability Description"
				}
			],
			"product_status":{
				"fixed":[
					"openEuler-24.03-LTS:bpftool-6.6.0-93.0.0.87.oe2403.x86_64",
					"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-93.0.0.87.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-6.6.0-93.0.0.87.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-93.0.0.87.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-debugsource-6.6.0-93.0.0.87.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-devel-6.6.0-93.0.0.87.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-headers-6.6.0-93.0.0.87.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-source-6.6.0-93.0.0.87.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-tools-6.6.0-93.0.0.87.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-93.0.0.87.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-93.0.0.87.oe2403.x86_64",
					"openEuler-24.03-LTS:perf-6.6.0-93.0.0.87.oe2403.x86_64",
					"openEuler-24.03-LTS:perf-debuginfo-6.6.0-93.0.0.87.oe2403.x86_64",
					"openEuler-24.03-LTS:python3-perf-6.6.0-93.0.0.87.oe2403.x86_64",
					"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-93.0.0.87.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-6.6.0-93.0.0.87.oe2403.src",
					"openEuler-24.03-LTS:bpftool-6.6.0-93.0.0.87.oe2403.aarch64",
					"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-93.0.0.87.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-6.6.0-93.0.0.87.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-93.0.0.87.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-debugsource-6.6.0-93.0.0.87.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-devel-6.6.0-93.0.0.87.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-headers-6.6.0-93.0.0.87.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-source-6.6.0-93.0.0.87.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-tools-6.6.0-93.0.0.87.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-93.0.0.87.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-93.0.0.87.oe2403.aarch64",
					"openEuler-24.03-LTS:perf-6.6.0-93.0.0.87.oe2403.aarch64",
					"openEuler-24.03-LTS:perf-debuginfo-6.6.0-93.0.0.87.oe2403.aarch64",
					"openEuler-24.03-LTS:python3-perf-6.6.0-93.0.0.87.oe2403.aarch64",
					"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-93.0.0.87.oe2403.aarch64"
				]
			},
			"remediations":[
				{
					"product_ids":[
						"openEuler-24.03-LTS:bpftool-6.6.0-93.0.0.87.oe2403.x86_64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-93.0.0.87.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-6.6.0-93.0.0.87.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-93.0.0.87.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-93.0.0.87.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-93.0.0.87.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-93.0.0.87.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-93.0.0.87.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-93.0.0.87.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-93.0.0.87.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-93.0.0.87.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-6.6.0-93.0.0.87.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-93.0.0.87.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-93.0.0.87.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-93.0.0.87.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-6.6.0-93.0.0.87.oe2403.src",
						"openEuler-24.03-LTS:bpftool-6.6.0-93.0.0.87.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-93.0.0.87.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-6.6.0-93.0.0.87.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-93.0.0.87.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-93.0.0.87.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-93.0.0.87.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-93.0.0.87.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-93.0.0.87.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-93.0.0.87.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-93.0.0.87.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-93.0.0.87.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-6.6.0-93.0.0.87.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-93.0.0.87.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-93.0.0.87.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-93.0.0.87.oe2403.aarch64"
					],
					"details":"kernel security update",
					"category":"vendor_fix",
					"url":"https://www.openeuler.org/zh/security/security-bulletins/detail/?id=openEuler-SA-2025-1572"
				}
			],
			"scores":[
				{
					"cvss_v3":{
						"baseSeverity":"MEDIUM",
						"baseScore":5.5,
						"vectorString":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
						"version":"3.1"
					},
					"products":[
						"openEuler-24.03-LTS:bpftool-6.6.0-93.0.0.87.oe2403.x86_64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-93.0.0.87.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-6.6.0-93.0.0.87.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-93.0.0.87.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-93.0.0.87.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-93.0.0.87.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-93.0.0.87.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-93.0.0.87.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-93.0.0.87.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-93.0.0.87.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-93.0.0.87.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-6.6.0-93.0.0.87.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-93.0.0.87.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-93.0.0.87.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-93.0.0.87.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-6.6.0-93.0.0.87.oe2403.src",
						"openEuler-24.03-LTS:bpftool-6.6.0-93.0.0.87.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-93.0.0.87.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-6.6.0-93.0.0.87.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-93.0.0.87.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-93.0.0.87.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-93.0.0.87.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-93.0.0.87.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-93.0.0.87.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-93.0.0.87.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-93.0.0.87.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-93.0.0.87.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-6.6.0-93.0.0.87.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-93.0.0.87.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-93.0.0.87.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-93.0.0.87.oe2403.aarch64"
					]
				}
			],
			"threats":[
				{
					"details":"Medium",
					"category":"impact"
				}
			],
			"title":"CVE-2025-37754"
		},
		{
			"cve":"CVE-2025-37765",
			"notes":[
				{
					"text":"In the Linux kernel, the following vulnerability has been resolved:\n\ndrm/nouveau: prime: fix ttm_bo_delayed_delete oops\n\nFix an oops in ttm_bo_delayed_delete which results from dererencing a\ndangling pointer:\n\nOops: general protection fault, probably for non-canonical address 0x6b6b6b6b6b6b6b7b: 0000 [#1] PREEMPT SMP\nCPU: 4 UID: 0 PID: 1082 Comm: kworker/u65:2 Not tainted 6.14.0-rc4-00267-g505460b44513-dirty #216\nHardware name: LENOVO 82N6/LNVNB161216, BIOS GKCN65WW 01/16/2024\nWorkqueue: ttm ttm_bo_delayed_delete [ttm]\nRIP: 0010:dma_resv_iter_first_unlocked+0x55/0x290\nCode: 31 f6 48 c7 c7 00 2b fa aa e8 97 bd 52 ff e8 a2 c1 53 00 5a 85 c0 74 48 e9 88 01 00 00 4c 89 63 20 4d 85 e4 0f 84 30 01 00 00 <41> 8b 44 24 10 c6 43 2c 01 48 89 df 89 43 28 e8 97 fd ff ff 4c 8b\nRSP: 0018:ffffbf9383473d60 EFLAGS: 00010202\nRAX: 0000000000000001 RBX: ffffbf9383473d88 RCX: 0000000000000000\nRDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000\nRBP: ffffbf9383473d78 R08: 0000000000000000 R09: 0000000000000000\nR10: 0000000000000000 R11: 0000000000000000 R12: 6b6b6b6b6b6b6b6b\nR13: ffffa003bbf78580 R14: ffffa003a6728040 R15: 00000000000383cc\nFS:  0000000000000000(0000) GS:ffffa00991c00000(0000) knlGS:0000000000000000\nCS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033\nCR2: 0000758348024dd0 CR3: 000000012c259000 CR4: 0000000000f50ef0\nPKRU: 55555554\nCall Trace:\n <TASK>\n ? __die_body.cold+0x19/0x26\n ? die_addr+0x3d/0x70\n ? exc_general_protection+0x159/0x460\n ? asm_exc_general_protection+0x27/0x30\n ? dma_resv_iter_first_unlocked+0x55/0x290\n dma_resv_wait_timeout+0x56/0x100\n ttm_bo_delayed_delete+0x69/0xb0 [ttm]\n process_one_work+0x217/0x5c0\n worker_thread+0x1c8/0x3d0\n ? apply_wqattrs_cleanup.part.0+0xc0/0xc0\n kthread+0x10b/0x240\n ? kthreads_online_cpu+0x140/0x140\n ret_from_fork+0x40/0x70\n ? kthreads_online_cpu+0x140/0x140\n ret_from_fork_asm+0x11/0x20\n </TASK>\n\nThe cause of this is:\n\n- drm_prime_gem_destroy calls dma_buf_put(dma_buf) which releases the\n  reference to the shared dma_buf. The reference count is 0, so the\n  dma_buf is destroyed, which in turn decrements the corresponding\n  amdgpu_bo reference count to 0, and the amdgpu_bo is destroyed -\n  calling drm_gem_object_release then dma_resv_fini (which destroys the\n  reservation object), then finally freeing the amdgpu_bo.\n\n- nouveau_bo obj->bo.base.resv is now a dangling pointer to the memory\n  formerly allocated to the amdgpu_bo.\n\n- nouveau_gem_object_del calls ttm_bo_put(&nvbo->bo) which calls\n  ttm_bo_release, which schedules ttm_bo_delayed_delete.\n\n- ttm_bo_delayed_delete runs and dereferences the dangling resv pointer,\n  resulting in a general protection fault.\n\nFix this by moving the drm_prime_gem_destroy call from\nnouveau_gem_object_del to nouveau_bo_del_ttm. This ensures that it will\nbe run after ttm_bo_delayed_delete.",
					"category":"description",
					"title":"Vulnerability Description"
				}
			],
			"product_status":{
				"fixed":[
					"openEuler-24.03-LTS:bpftool-6.6.0-93.0.0.87.oe2403.x86_64",
					"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-93.0.0.87.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-6.6.0-93.0.0.87.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-93.0.0.87.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-debugsource-6.6.0-93.0.0.87.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-devel-6.6.0-93.0.0.87.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-headers-6.6.0-93.0.0.87.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-source-6.6.0-93.0.0.87.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-tools-6.6.0-93.0.0.87.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-93.0.0.87.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-93.0.0.87.oe2403.x86_64",
					"openEuler-24.03-LTS:perf-6.6.0-93.0.0.87.oe2403.x86_64",
					"openEuler-24.03-LTS:perf-debuginfo-6.6.0-93.0.0.87.oe2403.x86_64",
					"openEuler-24.03-LTS:python3-perf-6.6.0-93.0.0.87.oe2403.x86_64",
					"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-93.0.0.87.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-6.6.0-93.0.0.87.oe2403.src",
					"openEuler-24.03-LTS:bpftool-6.6.0-93.0.0.87.oe2403.aarch64",
					"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-93.0.0.87.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-6.6.0-93.0.0.87.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-93.0.0.87.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-debugsource-6.6.0-93.0.0.87.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-devel-6.6.0-93.0.0.87.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-headers-6.6.0-93.0.0.87.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-source-6.6.0-93.0.0.87.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-tools-6.6.0-93.0.0.87.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-93.0.0.87.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-93.0.0.87.oe2403.aarch64",
					"openEuler-24.03-LTS:perf-6.6.0-93.0.0.87.oe2403.aarch64",
					"openEuler-24.03-LTS:perf-debuginfo-6.6.0-93.0.0.87.oe2403.aarch64",
					"openEuler-24.03-LTS:python3-perf-6.6.0-93.0.0.87.oe2403.aarch64",
					"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-93.0.0.87.oe2403.aarch64"
				]
			},
			"remediations":[
				{
					"product_ids":[
						"openEuler-24.03-LTS:bpftool-6.6.0-93.0.0.87.oe2403.x86_64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-93.0.0.87.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-6.6.0-93.0.0.87.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-93.0.0.87.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-93.0.0.87.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-93.0.0.87.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-93.0.0.87.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-93.0.0.87.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-93.0.0.87.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-93.0.0.87.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-93.0.0.87.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-6.6.0-93.0.0.87.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-93.0.0.87.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-93.0.0.87.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-93.0.0.87.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-6.6.0-93.0.0.87.oe2403.src",
						"openEuler-24.03-LTS:bpftool-6.6.0-93.0.0.87.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-93.0.0.87.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-6.6.0-93.0.0.87.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-93.0.0.87.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-93.0.0.87.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-93.0.0.87.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-93.0.0.87.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-93.0.0.87.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-93.0.0.87.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-93.0.0.87.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-93.0.0.87.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-6.6.0-93.0.0.87.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-93.0.0.87.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-93.0.0.87.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-93.0.0.87.oe2403.aarch64"
					],
					"details":"kernel security update",
					"category":"vendor_fix",
					"url":"https://www.openeuler.org/zh/security/security-bulletins/detail/?id=openEuler-SA-2025-1572"
				}
			],
			"scores":[
				{
					"cvss_v3":{
						"baseSeverity":"LOW",
						"baseScore":3.9,
						"vectorString":"CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:L/I:L/A:L",
						"version":"3.1"
					},
					"products":[
						"openEuler-24.03-LTS:bpftool-6.6.0-93.0.0.87.oe2403.x86_64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-93.0.0.87.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-6.6.0-93.0.0.87.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-93.0.0.87.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-93.0.0.87.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-93.0.0.87.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-93.0.0.87.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-93.0.0.87.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-93.0.0.87.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-93.0.0.87.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-93.0.0.87.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-6.6.0-93.0.0.87.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-93.0.0.87.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-93.0.0.87.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-93.0.0.87.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-6.6.0-93.0.0.87.oe2403.src",
						"openEuler-24.03-LTS:bpftool-6.6.0-93.0.0.87.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-93.0.0.87.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-6.6.0-93.0.0.87.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-93.0.0.87.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-93.0.0.87.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-93.0.0.87.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-93.0.0.87.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-93.0.0.87.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-93.0.0.87.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-93.0.0.87.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-93.0.0.87.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-6.6.0-93.0.0.87.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-93.0.0.87.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-93.0.0.87.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-93.0.0.87.oe2403.aarch64"
					]
				}
			],
			"threats":[
				{
					"details":"Low",
					"category":"impact"
				}
			],
			"title":"CVE-2025-37765"
		},
		{
			"cve":"CVE-2025-37773",
			"notes":[
				{
					"text":"In the Linux kernel, the following vulnerability has been resolved:\n\nvirtiofs: add filesystem context source name check\n\nIn certain scenarios, for example, during fuzz testing, the source\nname may be NULL, which could lead to a kernel panic. Therefore, an\nextra check for the source name should be added.",
					"category":"description",
					"title":"Vulnerability Description"
				}
			],
			"product_status":{
				"fixed":[
					"openEuler-24.03-LTS:bpftool-6.6.0-93.0.0.87.oe2403.x86_64",
					"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-93.0.0.87.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-6.6.0-93.0.0.87.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-93.0.0.87.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-debugsource-6.6.0-93.0.0.87.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-devel-6.6.0-93.0.0.87.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-headers-6.6.0-93.0.0.87.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-source-6.6.0-93.0.0.87.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-tools-6.6.0-93.0.0.87.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-93.0.0.87.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-93.0.0.87.oe2403.x86_64",
					"openEuler-24.03-LTS:perf-6.6.0-93.0.0.87.oe2403.x86_64",
					"openEuler-24.03-LTS:perf-debuginfo-6.6.0-93.0.0.87.oe2403.x86_64",
					"openEuler-24.03-LTS:python3-perf-6.6.0-93.0.0.87.oe2403.x86_64",
					"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-93.0.0.87.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-6.6.0-93.0.0.87.oe2403.src",
					"openEuler-24.03-LTS:bpftool-6.6.0-93.0.0.87.oe2403.aarch64",
					"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-93.0.0.87.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-6.6.0-93.0.0.87.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-93.0.0.87.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-debugsource-6.6.0-93.0.0.87.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-devel-6.6.0-93.0.0.87.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-headers-6.6.0-93.0.0.87.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-source-6.6.0-93.0.0.87.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-tools-6.6.0-93.0.0.87.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-93.0.0.87.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-93.0.0.87.oe2403.aarch64",
					"openEuler-24.03-LTS:perf-6.6.0-93.0.0.87.oe2403.aarch64",
					"openEuler-24.03-LTS:perf-debuginfo-6.6.0-93.0.0.87.oe2403.aarch64",
					"openEuler-24.03-LTS:python3-perf-6.6.0-93.0.0.87.oe2403.aarch64",
					"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-93.0.0.87.oe2403.aarch64"
				]
			},
			"remediations":[
				{
					"product_ids":[
						"openEuler-24.03-LTS:bpftool-6.6.0-93.0.0.87.oe2403.x86_64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-93.0.0.87.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-6.6.0-93.0.0.87.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-93.0.0.87.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-93.0.0.87.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-93.0.0.87.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-93.0.0.87.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-93.0.0.87.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-93.0.0.87.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-93.0.0.87.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-93.0.0.87.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-6.6.0-93.0.0.87.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-93.0.0.87.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-93.0.0.87.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-93.0.0.87.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-6.6.0-93.0.0.87.oe2403.src",
						"openEuler-24.03-LTS:bpftool-6.6.0-93.0.0.87.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-93.0.0.87.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-6.6.0-93.0.0.87.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-93.0.0.87.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-93.0.0.87.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-93.0.0.87.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-93.0.0.87.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-93.0.0.87.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-93.0.0.87.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-93.0.0.87.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-93.0.0.87.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-6.6.0-93.0.0.87.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-93.0.0.87.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-93.0.0.87.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-93.0.0.87.oe2403.aarch64"
					],
					"details":"kernel security update",
					"category":"vendor_fix",
					"url":"https://www.openeuler.org/zh/security/security-bulletins/detail/?id=openEuler-SA-2025-1572"
				}
			],
			"scores":[
				{
					"cvss_v3":{
						"baseSeverity":"MEDIUM",
						"baseScore":5.5,
						"vectorString":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
						"version":"3.1"
					},
					"products":[
						"openEuler-24.03-LTS:bpftool-6.6.0-93.0.0.87.oe2403.x86_64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-93.0.0.87.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-6.6.0-93.0.0.87.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-93.0.0.87.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-93.0.0.87.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-93.0.0.87.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-93.0.0.87.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-93.0.0.87.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-93.0.0.87.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-93.0.0.87.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-93.0.0.87.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-6.6.0-93.0.0.87.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-93.0.0.87.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-93.0.0.87.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-93.0.0.87.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-6.6.0-93.0.0.87.oe2403.src",
						"openEuler-24.03-LTS:bpftool-6.6.0-93.0.0.87.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-93.0.0.87.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-6.6.0-93.0.0.87.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-93.0.0.87.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-93.0.0.87.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-93.0.0.87.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-93.0.0.87.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-93.0.0.87.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-93.0.0.87.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-93.0.0.87.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-93.0.0.87.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-6.6.0-93.0.0.87.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-93.0.0.87.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-93.0.0.87.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-93.0.0.87.oe2403.aarch64"
					]
				}
			],
			"threats":[
				{
					"details":"Medium",
					"category":"impact"
				}
			],
			"title":"CVE-2025-37773"
		},
		{
			"cve":"CVE-2025-37782",
			"notes":[
				{
					"text":"In the Linux kernel, the following vulnerability has been resolved:\n\nhfs/hfsplus: fix slab-out-of-bounds in hfs_bnode_read_key\n\nSyzbot reported an issue in hfs subsystem:\n\nBUG: KASAN: slab-out-of-bounds in memcpy_from_page include/linux/highmem.h:423 [inline]\nBUG: KASAN: slab-out-of-bounds in hfs_bnode_read fs/hfs/bnode.c:35 [inline]\nBUG: KASAN: slab-out-of-bounds in hfs_bnode_read_key+0x314/0x450 fs/hfs/bnode.c:70\nWrite of size 94 at addr ffff8880123cd100 by task syz-executor237/5102\n\nCall Trace:\n <TASK>\n __dump_stack lib/dump_stack.c:94 [inline]\n dump_stack_lvl+0x241/0x360 lib/dump_stack.c:120\n print_address_description mm/kasan/report.c:377 [inline]\n print_report+0x169/0x550 mm/kasan/report.c:488\n kasan_report+0x143/0x180 mm/kasan/report.c:601\n kasan_check_range+0x282/0x290 mm/kasan/generic.c:189\n __asan_memcpy+0x40/0x70 mm/kasan/shadow.c:106\n memcpy_from_page include/linux/highmem.h:423 [inline]\n hfs_bnode_read fs/hfs/bnode.c:35 [inline]\n hfs_bnode_read_key+0x314/0x450 fs/hfs/bnode.c:70\n hfs_brec_insert+0x7f3/0xbd0 fs/hfs/brec.c:159\n hfs_cat_create+0x41d/0xa50 fs/hfs/catalog.c:118\n hfs_mkdir+0x6c/0xe0 fs/hfs/dir.c:232\n vfs_mkdir+0x2f9/0x4f0 fs/namei.c:4257\n do_mkdirat+0x264/0x3a0 fs/namei.c:4280\n __do_sys_mkdir fs/namei.c:4300 [inline]\n __se_sys_mkdir fs/namei.c:4298 [inline]\n __x64_sys_mkdir+0x6c/0x80 fs/namei.c:4298\n do_syscall_x64 arch/x86/entry/common.c:52 [inline]\n do_syscall_64+0xf3/0x230 arch/x86/entry/common.c:83\n entry_SYSCALL_64_after_hwframe+0x77/0x7f\nRIP: 0033:0x7fbdd6057a99\n\nAdd a check for key length in hfs_bnode_read_key to prevent\nout-of-bounds memory access. If the key length is invalid, the\nkey buffer is cleared, improving stability and reliability.",
					"category":"description",
					"title":"Vulnerability Description"
				}
			],
			"product_status":{
				"fixed":[
					"openEuler-24.03-LTS:bpftool-6.6.0-93.0.0.87.oe2403.x86_64",
					"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-93.0.0.87.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-6.6.0-93.0.0.87.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-93.0.0.87.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-debugsource-6.6.0-93.0.0.87.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-devel-6.6.0-93.0.0.87.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-headers-6.6.0-93.0.0.87.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-source-6.6.0-93.0.0.87.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-tools-6.6.0-93.0.0.87.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-93.0.0.87.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-93.0.0.87.oe2403.x86_64",
					"openEuler-24.03-LTS:perf-6.6.0-93.0.0.87.oe2403.x86_64",
					"openEuler-24.03-LTS:perf-debuginfo-6.6.0-93.0.0.87.oe2403.x86_64",
					"openEuler-24.03-LTS:python3-perf-6.6.0-93.0.0.87.oe2403.x86_64",
					"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-93.0.0.87.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-6.6.0-93.0.0.87.oe2403.src",
					"openEuler-24.03-LTS:bpftool-6.6.0-93.0.0.87.oe2403.aarch64",
					"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-93.0.0.87.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-6.6.0-93.0.0.87.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-93.0.0.87.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-debugsource-6.6.0-93.0.0.87.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-devel-6.6.0-93.0.0.87.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-headers-6.6.0-93.0.0.87.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-source-6.6.0-93.0.0.87.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-tools-6.6.0-93.0.0.87.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-93.0.0.87.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-93.0.0.87.oe2403.aarch64",
					"openEuler-24.03-LTS:perf-6.6.0-93.0.0.87.oe2403.aarch64",
					"openEuler-24.03-LTS:perf-debuginfo-6.6.0-93.0.0.87.oe2403.aarch64",
					"openEuler-24.03-LTS:python3-perf-6.6.0-93.0.0.87.oe2403.aarch64",
					"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-93.0.0.87.oe2403.aarch64"
				]
			},
			"remediations":[
				{
					"product_ids":[
						"openEuler-24.03-LTS:bpftool-6.6.0-93.0.0.87.oe2403.x86_64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-93.0.0.87.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-6.6.0-93.0.0.87.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-93.0.0.87.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-93.0.0.87.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-93.0.0.87.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-93.0.0.87.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-93.0.0.87.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-93.0.0.87.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-93.0.0.87.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-93.0.0.87.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-6.6.0-93.0.0.87.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-93.0.0.87.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-93.0.0.87.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-93.0.0.87.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-6.6.0-93.0.0.87.oe2403.src",
						"openEuler-24.03-LTS:bpftool-6.6.0-93.0.0.87.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-93.0.0.87.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-6.6.0-93.0.0.87.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-93.0.0.87.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-93.0.0.87.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-93.0.0.87.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-93.0.0.87.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-93.0.0.87.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-93.0.0.87.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-93.0.0.87.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-93.0.0.87.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-6.6.0-93.0.0.87.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-93.0.0.87.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-93.0.0.87.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-93.0.0.87.oe2403.aarch64"
					],
					"details":"kernel security update",
					"category":"vendor_fix",
					"url":"https://www.openeuler.org/zh/security/security-bulletins/detail/?id=openEuler-SA-2025-1572"
				}
			],
			"scores":[
				{
					"cvss_v3":{
						"baseSeverity":"HIGH",
						"baseScore":8.4,
						"vectorString":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:H/A:H",
						"version":"3.1"
					},
					"products":[
						"openEuler-24.03-LTS:bpftool-6.6.0-93.0.0.87.oe2403.x86_64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-93.0.0.87.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-6.6.0-93.0.0.87.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-93.0.0.87.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-93.0.0.87.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-93.0.0.87.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-93.0.0.87.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-93.0.0.87.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-93.0.0.87.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-93.0.0.87.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-93.0.0.87.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-6.6.0-93.0.0.87.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-93.0.0.87.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-93.0.0.87.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-93.0.0.87.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-6.6.0-93.0.0.87.oe2403.src",
						"openEuler-24.03-LTS:bpftool-6.6.0-93.0.0.87.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-93.0.0.87.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-6.6.0-93.0.0.87.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-93.0.0.87.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-93.0.0.87.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-93.0.0.87.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-93.0.0.87.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-93.0.0.87.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-93.0.0.87.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-93.0.0.87.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-93.0.0.87.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-6.6.0-93.0.0.87.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-93.0.0.87.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-93.0.0.87.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-93.0.0.87.oe2403.aarch64"
					]
				}
			],
			"threats":[
				{
					"details":"High",
					"category":"impact"
				}
			],
			"title":"CVE-2025-37782"
		},
		{
			"cve":"CVE-2025-37851",
			"notes":[
				{
					"text":"In the Linux kernel, the following vulnerability has been resolved:\n\nfbdev: omapfb: Add 'plane' value check\n\nFunction dispc_ovl_setup is not intended to work with the value OMAP_DSS_WB\nof the enum parameter plane.\n\nThe value of this parameter is initialized in dss_init_overlays and in the\ncurrent state of the code it cannot take this value so it's not a real\nproblem.\n\nFor the purposes of defensive coding it wouldn't be superfluous to check\nthe parameter value, because some functions down the call stack process\nthis value correctly and some not.\n\nFor example, in dispc_ovl_setup_global_alpha it may lead to buffer\noverflow.\n\nAdd check for this value.\n\nFound by Linux Verification Center (linuxtesting.org) with SVACE static\nanalysis tool.",
					"category":"description",
					"title":"Vulnerability Description"
				}
			],
			"product_status":{
				"fixed":[
					"openEuler-24.03-LTS:bpftool-6.6.0-93.0.0.87.oe2403.x86_64",
					"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-93.0.0.87.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-6.6.0-93.0.0.87.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-93.0.0.87.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-debugsource-6.6.0-93.0.0.87.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-devel-6.6.0-93.0.0.87.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-headers-6.6.0-93.0.0.87.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-source-6.6.0-93.0.0.87.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-tools-6.6.0-93.0.0.87.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-93.0.0.87.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-93.0.0.87.oe2403.x86_64",
					"openEuler-24.03-LTS:perf-6.6.0-93.0.0.87.oe2403.x86_64",
					"openEuler-24.03-LTS:perf-debuginfo-6.6.0-93.0.0.87.oe2403.x86_64",
					"openEuler-24.03-LTS:python3-perf-6.6.0-93.0.0.87.oe2403.x86_64",
					"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-93.0.0.87.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-6.6.0-93.0.0.87.oe2403.src",
					"openEuler-24.03-LTS:bpftool-6.6.0-93.0.0.87.oe2403.aarch64",
					"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-93.0.0.87.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-6.6.0-93.0.0.87.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-93.0.0.87.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-debugsource-6.6.0-93.0.0.87.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-devel-6.6.0-93.0.0.87.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-headers-6.6.0-93.0.0.87.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-source-6.6.0-93.0.0.87.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-tools-6.6.0-93.0.0.87.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-93.0.0.87.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-93.0.0.87.oe2403.aarch64",
					"openEuler-24.03-LTS:perf-6.6.0-93.0.0.87.oe2403.aarch64",
					"openEuler-24.03-LTS:perf-debuginfo-6.6.0-93.0.0.87.oe2403.aarch64",
					"openEuler-24.03-LTS:python3-perf-6.6.0-93.0.0.87.oe2403.aarch64",
					"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-93.0.0.87.oe2403.aarch64"
				]
			},
			"remediations":[
				{
					"product_ids":[
						"openEuler-24.03-LTS:bpftool-6.6.0-93.0.0.87.oe2403.x86_64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-93.0.0.87.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-6.6.0-93.0.0.87.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-93.0.0.87.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-93.0.0.87.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-93.0.0.87.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-93.0.0.87.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-93.0.0.87.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-93.0.0.87.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-93.0.0.87.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-93.0.0.87.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-6.6.0-93.0.0.87.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-93.0.0.87.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-93.0.0.87.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-93.0.0.87.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-6.6.0-93.0.0.87.oe2403.src",
						"openEuler-24.03-LTS:bpftool-6.6.0-93.0.0.87.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-93.0.0.87.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-6.6.0-93.0.0.87.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-93.0.0.87.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-93.0.0.87.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-93.0.0.87.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-93.0.0.87.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-93.0.0.87.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-93.0.0.87.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-93.0.0.87.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-93.0.0.87.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-6.6.0-93.0.0.87.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-93.0.0.87.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-93.0.0.87.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-93.0.0.87.oe2403.aarch64"
					],
					"details":"kernel security update",
					"category":"vendor_fix",
					"url":"https://www.openeuler.org/zh/security/security-bulletins/detail/?id=openEuler-SA-2025-1572"
				}
			],
			"scores":[
				{
					"cvss_v3":{
						"baseSeverity":"MEDIUM",
						"baseScore":5.5,
						"vectorString":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
						"version":"3.1"
					},
					"products":[
						"openEuler-24.03-LTS:bpftool-6.6.0-93.0.0.87.oe2403.x86_64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-93.0.0.87.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-6.6.0-93.0.0.87.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-93.0.0.87.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-93.0.0.87.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-93.0.0.87.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-93.0.0.87.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-93.0.0.87.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-93.0.0.87.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-93.0.0.87.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-93.0.0.87.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-6.6.0-93.0.0.87.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-93.0.0.87.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-93.0.0.87.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-93.0.0.87.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-6.6.0-93.0.0.87.oe2403.src",
						"openEuler-24.03-LTS:bpftool-6.6.0-93.0.0.87.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-93.0.0.87.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-6.6.0-93.0.0.87.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-93.0.0.87.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-93.0.0.87.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-93.0.0.87.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-93.0.0.87.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-93.0.0.87.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-93.0.0.87.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-93.0.0.87.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-93.0.0.87.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-6.6.0-93.0.0.87.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-93.0.0.87.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-93.0.0.87.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-93.0.0.87.oe2403.aarch64"
					]
				}
			],
			"threats":[
				{
					"details":"Medium",
					"category":"impact"
				}
			],
			"title":"CVE-2025-37851"
		},
		{
			"cve":"CVE-2025-37852",
			"notes":[
				{
					"text":"In the Linux kernel, the following vulnerability has been resolved:\n\ndrm/amdgpu: handle amdgpu_cgs_create_device() errors in amd_powerplay_create()\n\nAdd error handling to propagate amdgpu_cgs_create_device() failures\nto the caller. When amdgpu_cgs_create_device() fails, release hwmgr\nand return -ENOMEM to prevent null pointer dereference.\n\n[v1]->[v2]: Change error code from -EINVAL to -ENOMEM. Free hwmgr.",
					"category":"description",
					"title":"Vulnerability Description"
				}
			],
			"product_status":{
				"fixed":[
					"openEuler-24.03-LTS:bpftool-6.6.0-93.0.0.87.oe2403.x86_64",
					"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-93.0.0.87.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-6.6.0-93.0.0.87.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-93.0.0.87.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-debugsource-6.6.0-93.0.0.87.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-devel-6.6.0-93.0.0.87.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-headers-6.6.0-93.0.0.87.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-source-6.6.0-93.0.0.87.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-tools-6.6.0-93.0.0.87.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-93.0.0.87.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-93.0.0.87.oe2403.x86_64",
					"openEuler-24.03-LTS:perf-6.6.0-93.0.0.87.oe2403.x86_64",
					"openEuler-24.03-LTS:perf-debuginfo-6.6.0-93.0.0.87.oe2403.x86_64",
					"openEuler-24.03-LTS:python3-perf-6.6.0-93.0.0.87.oe2403.x86_64",
					"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-93.0.0.87.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-6.6.0-93.0.0.87.oe2403.src",
					"openEuler-24.03-LTS:bpftool-6.6.0-93.0.0.87.oe2403.aarch64",
					"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-93.0.0.87.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-6.6.0-93.0.0.87.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-93.0.0.87.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-debugsource-6.6.0-93.0.0.87.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-devel-6.6.0-93.0.0.87.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-headers-6.6.0-93.0.0.87.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-source-6.6.0-93.0.0.87.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-tools-6.6.0-93.0.0.87.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-93.0.0.87.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-93.0.0.87.oe2403.aarch64",
					"openEuler-24.03-LTS:perf-6.6.0-93.0.0.87.oe2403.aarch64",
					"openEuler-24.03-LTS:perf-debuginfo-6.6.0-93.0.0.87.oe2403.aarch64",
					"openEuler-24.03-LTS:python3-perf-6.6.0-93.0.0.87.oe2403.aarch64",
					"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-93.0.0.87.oe2403.aarch64"
				]
			},
			"remediations":[
				{
					"product_ids":[
						"openEuler-24.03-LTS:bpftool-6.6.0-93.0.0.87.oe2403.x86_64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-93.0.0.87.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-6.6.0-93.0.0.87.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-93.0.0.87.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-93.0.0.87.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-93.0.0.87.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-93.0.0.87.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-93.0.0.87.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-93.0.0.87.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-93.0.0.87.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-93.0.0.87.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-6.6.0-93.0.0.87.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-93.0.0.87.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-93.0.0.87.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-93.0.0.87.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-6.6.0-93.0.0.87.oe2403.src",
						"openEuler-24.03-LTS:bpftool-6.6.0-93.0.0.87.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-93.0.0.87.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-6.6.0-93.0.0.87.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-93.0.0.87.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-93.0.0.87.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-93.0.0.87.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-93.0.0.87.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-93.0.0.87.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-93.0.0.87.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-93.0.0.87.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-93.0.0.87.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-6.6.0-93.0.0.87.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-93.0.0.87.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-93.0.0.87.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-93.0.0.87.oe2403.aarch64"
					],
					"details":"kernel security update",
					"category":"vendor_fix",
					"url":"https://www.openeuler.org/zh/security/security-bulletins/detail/?id=openEuler-SA-2025-1572"
				}
			],
			"scores":[
				{
					"cvss_v3":{
						"baseSeverity":"LOW",
						"baseScore":3.9,
						"vectorString":"CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:L/I:L/A:L",
						"version":"3.1"
					},
					"products":[
						"openEuler-24.03-LTS:bpftool-6.6.0-93.0.0.87.oe2403.x86_64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-93.0.0.87.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-6.6.0-93.0.0.87.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-93.0.0.87.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-93.0.0.87.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-93.0.0.87.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-93.0.0.87.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-93.0.0.87.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-93.0.0.87.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-93.0.0.87.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-93.0.0.87.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-6.6.0-93.0.0.87.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-93.0.0.87.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-93.0.0.87.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-93.0.0.87.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-6.6.0-93.0.0.87.oe2403.src",
						"openEuler-24.03-LTS:bpftool-6.6.0-93.0.0.87.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-93.0.0.87.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-6.6.0-93.0.0.87.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-93.0.0.87.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-93.0.0.87.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-93.0.0.87.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-93.0.0.87.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-93.0.0.87.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-93.0.0.87.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-93.0.0.87.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-93.0.0.87.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-6.6.0-93.0.0.87.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-93.0.0.87.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-93.0.0.87.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-93.0.0.87.oe2403.aarch64"
					]
				}
			],
			"threats":[
				{
					"details":"Low",
					"category":"impact"
				}
			],
			"title":"CVE-2025-37852"
		},
		{
			"cve":"CVE-2025-37858",
			"notes":[
				{
					"text":"In the Linux kernel, the following vulnerability has been resolved:\n\nfs/jfs: Prevent integer overflow in AG size calculation\n\nThe JFS filesystem calculates allocation group (AG) size using 1 <<\nl2agsize in dbExtendFS(). When l2agsize exceeds 31 (possible with >2TB\naggregates on 32-bit systems), this 32-bit shift operation causes undefined\nbehavior and improper AG sizing.\n\nOn 32-bit architectures:\n- Left-shifting 1 by 32+ bits results in 0 due to integer overflow\n- This creates invalid AG sizes (0 or garbage values) in\nsbi->bmap->db_agsize\n- Subsequent block allocations would reference invalid AG structures\n- Could lead to:\n  - Filesystem corruption during extend operations\n  - Kernel crashes due to invalid memory accesses\n  - Security vulnerabilities via malformed on-disk structures\n\nFix by casting to s64 before shifting:\nbmp->db_agsize = (s64)1 << l2agsize;\n\nThis ensures 64-bit arithmetic even on 32-bit architectures. The cast\nmatches the data type of db_agsize (s64) and follows similar patterns in\nJFS block calculation code.\n\nFound by Linux Verification Center (linuxtesting.org) with SVACE.",
					"category":"description",
					"title":"Vulnerability Description"
				}
			],
			"product_status":{
				"fixed":[
					"openEuler-24.03-LTS:bpftool-6.6.0-93.0.0.87.oe2403.x86_64",
					"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-93.0.0.87.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-6.6.0-93.0.0.87.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-93.0.0.87.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-debugsource-6.6.0-93.0.0.87.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-devel-6.6.0-93.0.0.87.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-headers-6.6.0-93.0.0.87.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-source-6.6.0-93.0.0.87.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-tools-6.6.0-93.0.0.87.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-93.0.0.87.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-93.0.0.87.oe2403.x86_64",
					"openEuler-24.03-LTS:perf-6.6.0-93.0.0.87.oe2403.x86_64",
					"openEuler-24.03-LTS:perf-debuginfo-6.6.0-93.0.0.87.oe2403.x86_64",
					"openEuler-24.03-LTS:python3-perf-6.6.0-93.0.0.87.oe2403.x86_64",
					"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-93.0.0.87.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-6.6.0-93.0.0.87.oe2403.src",
					"openEuler-24.03-LTS:bpftool-6.6.0-93.0.0.87.oe2403.aarch64",
					"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-93.0.0.87.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-6.6.0-93.0.0.87.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-93.0.0.87.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-debugsource-6.6.0-93.0.0.87.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-devel-6.6.0-93.0.0.87.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-headers-6.6.0-93.0.0.87.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-source-6.6.0-93.0.0.87.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-tools-6.6.0-93.0.0.87.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-93.0.0.87.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-93.0.0.87.oe2403.aarch64",
					"openEuler-24.03-LTS:perf-6.6.0-93.0.0.87.oe2403.aarch64",
					"openEuler-24.03-LTS:perf-debuginfo-6.6.0-93.0.0.87.oe2403.aarch64",
					"openEuler-24.03-LTS:python3-perf-6.6.0-93.0.0.87.oe2403.aarch64",
					"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-93.0.0.87.oe2403.aarch64"
				]
			},
			"remediations":[
				{
					"product_ids":[
						"openEuler-24.03-LTS:bpftool-6.6.0-93.0.0.87.oe2403.x86_64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-93.0.0.87.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-6.6.0-93.0.0.87.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-93.0.0.87.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-93.0.0.87.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-93.0.0.87.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-93.0.0.87.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-93.0.0.87.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-93.0.0.87.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-93.0.0.87.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-93.0.0.87.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-6.6.0-93.0.0.87.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-93.0.0.87.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-93.0.0.87.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-93.0.0.87.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-6.6.0-93.0.0.87.oe2403.src",
						"openEuler-24.03-LTS:bpftool-6.6.0-93.0.0.87.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-93.0.0.87.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-6.6.0-93.0.0.87.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-93.0.0.87.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-93.0.0.87.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-93.0.0.87.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-93.0.0.87.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-93.0.0.87.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-93.0.0.87.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-93.0.0.87.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-93.0.0.87.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-6.6.0-93.0.0.87.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-93.0.0.87.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-93.0.0.87.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-93.0.0.87.oe2403.aarch64"
					],
					"details":"kernel security update",
					"category":"vendor_fix",
					"url":"https://www.openeuler.org/zh/security/security-bulletins/detail/?id=openEuler-SA-2025-1572"
				}
			],
			"scores":[
				{
					"cvss_v3":{
						"baseSeverity":"LOW",
						"baseScore":3.9,
						"vectorString":"CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:L/I:L/A:L",
						"version":"3.1"
					},
					"products":[
						"openEuler-24.03-LTS:bpftool-6.6.0-93.0.0.87.oe2403.x86_64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-93.0.0.87.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-6.6.0-93.0.0.87.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-93.0.0.87.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-93.0.0.87.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-93.0.0.87.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-93.0.0.87.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-93.0.0.87.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-93.0.0.87.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-93.0.0.87.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-93.0.0.87.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-6.6.0-93.0.0.87.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-93.0.0.87.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-93.0.0.87.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-93.0.0.87.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-6.6.0-93.0.0.87.oe2403.src",
						"openEuler-24.03-LTS:bpftool-6.6.0-93.0.0.87.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-93.0.0.87.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-6.6.0-93.0.0.87.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-93.0.0.87.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-93.0.0.87.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-93.0.0.87.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-93.0.0.87.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-93.0.0.87.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-93.0.0.87.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-93.0.0.87.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-93.0.0.87.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-6.6.0-93.0.0.87.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-93.0.0.87.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-93.0.0.87.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-93.0.0.87.oe2403.aarch64"
					]
				}
			],
			"threats":[
				{
					"details":"Low",
					"category":"impact"
				}
			],
			"title":"CVE-2025-37858"
		},
		{
			"cve":"CVE-2025-37867",
			"notes":[
				{
					"text":"In the Linux kernel, the following vulnerability has been resolved:\n\nRDMA/core: Silence oversized kvmalloc() warning\n\nsyzkaller triggered an oversized kvmalloc() warning.\nSilence it by adding __GFP_NOWARN.\n\nsyzkaller log:\n WARNING: CPU: 7 PID: 518 at mm/util.c:665 __kvmalloc_node_noprof+0x175/0x180\n CPU: 7 UID: 0 PID: 518 Comm: c_repro Not tainted 6.11.0-rc6+ #6\n Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS rel-1.13.0-0-gf21b5a4aeb02-prebuilt.qemu.org 04/01/2014\n RIP: 0010:__kvmalloc_node_noprof+0x175/0x180\n RSP: 0018:ffffc90001e67c10 EFLAGS: 00010246\n RAX: 0000000000000100 RBX: 0000000000000400 RCX: ffffffff8149d46b\n RDX: 0000000000000000 RSI: ffff8881030fae80 RDI: 0000000000000002\n RBP: 000000712c800000 R08: 0000000000000100 R09: 0000000000000000\n R10: ffffc90001e67c10 R11: 0030ae0601000000 R12: 0000000000000000\n R13: 0000000000000000 R14: 00000000ffffffff R15: 0000000000000000\n FS:  00007fde79159740(0000) GS:ffff88813bdc0000(0000) knlGS:0000000000000000\n CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033\n CR2: 0000000020000180 CR3: 0000000105eb4005 CR4: 00000000003706b0\n DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000\n DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400\n Call Trace:\n  <TASK>\n  ib_umem_odp_get+0x1f6/0x390\n  mlx5_ib_reg_user_mr+0x1e8/0x450\n  ib_uverbs_reg_mr+0x28b/0x440\n  ib_uverbs_write+0x7d3/0xa30\n  vfs_write+0x1ac/0x6c0\n  ksys_write+0x134/0x170\n  ? __sanitizer_cov_trace_pc+0x1c/0x50\n  do_syscall_64+0x50/0x110\n  entry_SYSCALL_64_after_hwframe+0x76/0x7e",
					"category":"description",
					"title":"Vulnerability Description"
				}
			],
			"product_status":{
				"fixed":[
					"openEuler-24.03-LTS:bpftool-6.6.0-93.0.0.87.oe2403.x86_64",
					"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-93.0.0.87.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-6.6.0-93.0.0.87.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-93.0.0.87.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-debugsource-6.6.0-93.0.0.87.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-devel-6.6.0-93.0.0.87.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-headers-6.6.0-93.0.0.87.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-source-6.6.0-93.0.0.87.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-tools-6.6.0-93.0.0.87.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-93.0.0.87.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-93.0.0.87.oe2403.x86_64",
					"openEuler-24.03-LTS:perf-6.6.0-93.0.0.87.oe2403.x86_64",
					"openEuler-24.03-LTS:perf-debuginfo-6.6.0-93.0.0.87.oe2403.x86_64",
					"openEuler-24.03-LTS:python3-perf-6.6.0-93.0.0.87.oe2403.x86_64",
					"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-93.0.0.87.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-6.6.0-93.0.0.87.oe2403.src",
					"openEuler-24.03-LTS:bpftool-6.6.0-93.0.0.87.oe2403.aarch64",
					"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-93.0.0.87.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-6.6.0-93.0.0.87.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-93.0.0.87.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-debugsource-6.6.0-93.0.0.87.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-devel-6.6.0-93.0.0.87.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-headers-6.6.0-93.0.0.87.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-source-6.6.0-93.0.0.87.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-tools-6.6.0-93.0.0.87.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-93.0.0.87.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-93.0.0.87.oe2403.aarch64",
					"openEuler-24.03-LTS:perf-6.6.0-93.0.0.87.oe2403.aarch64",
					"openEuler-24.03-LTS:perf-debuginfo-6.6.0-93.0.0.87.oe2403.aarch64",
					"openEuler-24.03-LTS:python3-perf-6.6.0-93.0.0.87.oe2403.aarch64",
					"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-93.0.0.87.oe2403.aarch64"
				]
			},
			"remediations":[
				{
					"product_ids":[
						"openEuler-24.03-LTS:bpftool-6.6.0-93.0.0.87.oe2403.x86_64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-93.0.0.87.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-6.6.0-93.0.0.87.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-93.0.0.87.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-93.0.0.87.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-93.0.0.87.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-93.0.0.87.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-93.0.0.87.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-93.0.0.87.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-93.0.0.87.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-93.0.0.87.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-6.6.0-93.0.0.87.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-93.0.0.87.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-93.0.0.87.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-93.0.0.87.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-6.6.0-93.0.0.87.oe2403.src",
						"openEuler-24.03-LTS:bpftool-6.6.0-93.0.0.87.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-93.0.0.87.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-6.6.0-93.0.0.87.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-93.0.0.87.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-93.0.0.87.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-93.0.0.87.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-93.0.0.87.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-93.0.0.87.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-93.0.0.87.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-93.0.0.87.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-93.0.0.87.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-6.6.0-93.0.0.87.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-93.0.0.87.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-93.0.0.87.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-93.0.0.87.oe2403.aarch64"
					],
					"details":"kernel security update",
					"category":"vendor_fix",
					"url":"https://www.openeuler.org/zh/security/security-bulletins/detail/?id=openEuler-SA-2025-1572"
				}
			],
			"scores":[
				{
					"cvss_v3":{
						"baseSeverity":"MEDIUM",
						"baseScore":5.5,
						"vectorString":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
						"version":"3.1"
					},
					"products":[
						"openEuler-24.03-LTS:bpftool-6.6.0-93.0.0.87.oe2403.x86_64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-93.0.0.87.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-6.6.0-93.0.0.87.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-93.0.0.87.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-93.0.0.87.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-93.0.0.87.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-93.0.0.87.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-93.0.0.87.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-93.0.0.87.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-93.0.0.87.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-93.0.0.87.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-6.6.0-93.0.0.87.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-93.0.0.87.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-93.0.0.87.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-93.0.0.87.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-6.6.0-93.0.0.87.oe2403.src",
						"openEuler-24.03-LTS:bpftool-6.6.0-93.0.0.87.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-93.0.0.87.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-6.6.0-93.0.0.87.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-93.0.0.87.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-93.0.0.87.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-93.0.0.87.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-93.0.0.87.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-93.0.0.87.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-93.0.0.87.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-93.0.0.87.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-93.0.0.87.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-6.6.0-93.0.0.87.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-93.0.0.87.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-93.0.0.87.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-93.0.0.87.oe2403.aarch64"
					]
				}
			],
			"threats":[
				{
					"details":"Medium",
					"category":"impact"
				}
			],
			"title":"CVE-2025-37867"
		},
		{
			"cve":"CVE-2025-37886",
			"notes":[
				{
					"text":"In the Linux kernel, the following vulnerability has been resolved:\n\npds_core: make wait_context part of q_info\n\nMake the wait_context a full part of the q_info struct rather\nthan a stack variable that goes away after pdsc_adminq_post()\nis done so that the context is still available after the wait\nloop has given up.\n\nThere was a case where a slow development firmware caused\nthe adminq request to time out, but then later the FW finally\nfinished the request and sent the interrupt.  The handler tried\nto complete_all() the completion context that had been created\non the stack in pdsc_adminq_post() but no longer existed.\nThis caused bad pointer usage, kernel crashes, and much wailing\nand gnashing of teeth.",
					"category":"description",
					"title":"Vulnerability Description"
				}
			],
			"product_status":{
				"fixed":[
					"openEuler-24.03-LTS:bpftool-6.6.0-93.0.0.87.oe2403.x86_64",
					"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-93.0.0.87.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-6.6.0-93.0.0.87.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-93.0.0.87.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-debugsource-6.6.0-93.0.0.87.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-devel-6.6.0-93.0.0.87.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-headers-6.6.0-93.0.0.87.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-source-6.6.0-93.0.0.87.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-tools-6.6.0-93.0.0.87.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-93.0.0.87.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-93.0.0.87.oe2403.x86_64",
					"openEuler-24.03-LTS:perf-6.6.0-93.0.0.87.oe2403.x86_64",
					"openEuler-24.03-LTS:perf-debuginfo-6.6.0-93.0.0.87.oe2403.x86_64",
					"openEuler-24.03-LTS:python3-perf-6.6.0-93.0.0.87.oe2403.x86_64",
					"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-93.0.0.87.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-6.6.0-93.0.0.87.oe2403.src",
					"openEuler-24.03-LTS:bpftool-6.6.0-93.0.0.87.oe2403.aarch64",
					"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-93.0.0.87.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-6.6.0-93.0.0.87.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-93.0.0.87.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-debugsource-6.6.0-93.0.0.87.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-devel-6.6.0-93.0.0.87.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-headers-6.6.0-93.0.0.87.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-source-6.6.0-93.0.0.87.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-tools-6.6.0-93.0.0.87.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-93.0.0.87.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-93.0.0.87.oe2403.aarch64",
					"openEuler-24.03-LTS:perf-6.6.0-93.0.0.87.oe2403.aarch64",
					"openEuler-24.03-LTS:perf-debuginfo-6.6.0-93.0.0.87.oe2403.aarch64",
					"openEuler-24.03-LTS:python3-perf-6.6.0-93.0.0.87.oe2403.aarch64",
					"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-93.0.0.87.oe2403.aarch64"
				]
			},
			"remediations":[
				{
					"product_ids":[
						"openEuler-24.03-LTS:bpftool-6.6.0-93.0.0.87.oe2403.x86_64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-93.0.0.87.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-6.6.0-93.0.0.87.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-93.0.0.87.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-93.0.0.87.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-93.0.0.87.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-93.0.0.87.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-93.0.0.87.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-93.0.0.87.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-93.0.0.87.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-93.0.0.87.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-6.6.0-93.0.0.87.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-93.0.0.87.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-93.0.0.87.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-93.0.0.87.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-6.6.0-93.0.0.87.oe2403.src",
						"openEuler-24.03-LTS:bpftool-6.6.0-93.0.0.87.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-93.0.0.87.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-6.6.0-93.0.0.87.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-93.0.0.87.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-93.0.0.87.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-93.0.0.87.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-93.0.0.87.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-93.0.0.87.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-93.0.0.87.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-93.0.0.87.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-93.0.0.87.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-6.6.0-93.0.0.87.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-93.0.0.87.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-93.0.0.87.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-93.0.0.87.oe2403.aarch64"
					],
					"details":"kernel security update",
					"category":"vendor_fix",
					"url":"https://www.openeuler.org/zh/security/security-bulletins/detail/?id=openEuler-SA-2025-1572"
				}
			],
			"scores":[
				{
					"cvss_v3":{
						"baseSeverity":"LOW",
						"baseScore":3.9,
						"vectorString":"CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:L/I:L/A:L",
						"version":"3.1"
					},
					"products":[
						"openEuler-24.03-LTS:bpftool-6.6.0-93.0.0.87.oe2403.x86_64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-93.0.0.87.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-6.6.0-93.0.0.87.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-93.0.0.87.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-93.0.0.87.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-93.0.0.87.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-93.0.0.87.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-93.0.0.87.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-93.0.0.87.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-93.0.0.87.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-93.0.0.87.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-6.6.0-93.0.0.87.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-93.0.0.87.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-93.0.0.87.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-93.0.0.87.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-6.6.0-93.0.0.87.oe2403.src",
						"openEuler-24.03-LTS:bpftool-6.6.0-93.0.0.87.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-93.0.0.87.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-6.6.0-93.0.0.87.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-93.0.0.87.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-93.0.0.87.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-93.0.0.87.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-93.0.0.87.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-93.0.0.87.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-93.0.0.87.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-93.0.0.87.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-93.0.0.87.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-6.6.0-93.0.0.87.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-93.0.0.87.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-93.0.0.87.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-93.0.0.87.oe2403.aarch64"
					]
				}
			],
			"threats":[
				{
					"details":"Low",
					"category":"impact"
				}
			],
			"title":"CVE-2025-37886"
		},
		{
			"cve":"CVE-2025-37925",
			"notes":[
				{
					"text":"In the Linux kernel, the following vulnerability has been resolved:\n\njfs: reject on-disk inodes of an unsupported type\n\nSyzbot has reported the following BUG:\n\nkernel BUG at fs/inode.c:668!\nOops: invalid opcode: 0000 [#1] PREEMPT SMP KASAN PTI\nCPU: 3 UID: 0 PID: 139 Comm: jfsCommit Not tainted 6.12.0-rc4-syzkaller-00085-g4e46774408d9 #0\nHardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.16.3-3.fc41 04/01/2014\nRIP: 0010:clear_inode+0x168/0x190\nCode: 4c 89 f7 e8 ba fe e5 ff e9 61 ff ff ff 44 89 f1 80 e1 07 80 c1 03 38 c1 7c c1 4c 89 f7 e8 90 ff e5 ff eb b7\n 0b e8 01 5d 7f ff 90 0f 0b e8 f9 5c 7f ff 90 0f 0b e8 f1 5c 7f\nRSP: 0018:ffffc900027dfae8 EFLAGS: 00010093\nRAX: ffffffff82157a87 RBX: 0000000000000001 RCX: ffff888104d4b980\nRDX: 0000000000000000 RSI: 0000000000000001 RDI: 0000000000000000\nRBP: ffffc900027dfc90 R08: ffffffff82157977 R09: fffff520004fbf38\nR10: dffffc0000000000 R11: fffff520004fbf38 R12: dffffc0000000000\nR13: ffff88811315bc00 R14: ffff88811315bda8 R15: ffff88811315bb80\nFS:  0000000000000000(0000) GS:ffff888135f00000(0000) knlGS:0000000000000000\nCS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033\nCR2: 00005565222e0578 CR3: 0000000026ef0000 CR4: 00000000000006f0\nCall Trace:\n <TASK>\n ? __die_body+0x5f/0xb0\n ? die+0x9e/0xc0\n ? do_trap+0x15a/0x3a0\n ? clear_inode+0x168/0x190\n ? do_error_trap+0x1dc/0x2c0\n ? clear_inode+0x168/0x190\n ? __pfx_do_error_trap+0x10/0x10\n ? report_bug+0x3cd/0x500\n ? handle_invalid_op+0x34/0x40\n ? clear_inode+0x168/0x190\n ? exc_invalid_op+0x38/0x50\n ? asm_exc_invalid_op+0x1a/0x20\n ? clear_inode+0x57/0x190\n ? clear_inode+0x167/0x190\n ? clear_inode+0x168/0x190\n ? clear_inode+0x167/0x190\n jfs_evict_inode+0xb5/0x440\n ? __pfx_jfs_evict_inode+0x10/0x10\n evict+0x4ea/0x9b0\n ? __pfx_evict+0x10/0x10\n ? iput+0x713/0xa50\n txUpdateMap+0x931/0xb10\n ? __pfx_txUpdateMap+0x10/0x10\n jfs_lazycommit+0x49a/0xb80\n ? _raw_spin_unlock_irqrestore+0x8f/0x140\n ? lockdep_hardirqs_on+0x99/0x150\n ? __pfx_jfs_lazycommit+0x10/0x10\n ? __pfx_default_wake_function+0x10/0x10\n ? __kthread_parkme+0x169/0x1d0\n ? __pfx_jfs_lazycommit+0x10/0x10\n kthread+0x2f2/0x390\n ? __pfx_jfs_lazycommit+0x10/0x10\n ? __pfx_kthread+0x10/0x10\n ret_from_fork+0x4d/0x80\n ? __pfx_kthread+0x10/0x10\n ret_from_fork_asm+0x1a/0x30\n </TASK>\n\nThis happens when 'clear_inode()' makes an attempt to finalize an underlying\nJFS inode of unknown type. According to JFS layout description from\nhttps://jfs.sourceforge.net/project/pub/jfslayout.pdf, inode types from 5 to\n15 are reserved for future extensions and should not be encountered on a valid\nfilesystem. So add an extra check for valid inode type in 'copy_from_dinode()'.",
					"category":"description",
					"title":"Vulnerability Description"
				}
			],
			"product_status":{
				"fixed":[
					"openEuler-24.03-LTS:bpftool-6.6.0-93.0.0.87.oe2403.x86_64",
					"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-93.0.0.87.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-6.6.0-93.0.0.87.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-93.0.0.87.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-debugsource-6.6.0-93.0.0.87.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-devel-6.6.0-93.0.0.87.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-headers-6.6.0-93.0.0.87.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-source-6.6.0-93.0.0.87.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-tools-6.6.0-93.0.0.87.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-93.0.0.87.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-93.0.0.87.oe2403.x86_64",
					"openEuler-24.03-LTS:perf-6.6.0-93.0.0.87.oe2403.x86_64",
					"openEuler-24.03-LTS:perf-debuginfo-6.6.0-93.0.0.87.oe2403.x86_64",
					"openEuler-24.03-LTS:python3-perf-6.6.0-93.0.0.87.oe2403.x86_64",
					"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-93.0.0.87.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-6.6.0-93.0.0.87.oe2403.src",
					"openEuler-24.03-LTS:bpftool-6.6.0-93.0.0.87.oe2403.aarch64",
					"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-93.0.0.87.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-6.6.0-93.0.0.87.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-93.0.0.87.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-debugsource-6.6.0-93.0.0.87.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-devel-6.6.0-93.0.0.87.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-headers-6.6.0-93.0.0.87.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-source-6.6.0-93.0.0.87.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-tools-6.6.0-93.0.0.87.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-93.0.0.87.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-93.0.0.87.oe2403.aarch64",
					"openEuler-24.03-LTS:perf-6.6.0-93.0.0.87.oe2403.aarch64",
					"openEuler-24.03-LTS:perf-debuginfo-6.6.0-93.0.0.87.oe2403.aarch64",
					"openEuler-24.03-LTS:python3-perf-6.6.0-93.0.0.87.oe2403.aarch64",
					"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-93.0.0.87.oe2403.aarch64"
				]
			},
			"remediations":[
				{
					"product_ids":[
						"openEuler-24.03-LTS:bpftool-6.6.0-93.0.0.87.oe2403.x86_64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-93.0.0.87.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-6.6.0-93.0.0.87.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-93.0.0.87.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-93.0.0.87.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-93.0.0.87.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-93.0.0.87.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-93.0.0.87.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-93.0.0.87.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-93.0.0.87.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-93.0.0.87.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-6.6.0-93.0.0.87.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-93.0.0.87.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-93.0.0.87.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-93.0.0.87.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-6.6.0-93.0.0.87.oe2403.src",
						"openEuler-24.03-LTS:bpftool-6.6.0-93.0.0.87.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-93.0.0.87.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-6.6.0-93.0.0.87.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-93.0.0.87.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-93.0.0.87.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-93.0.0.87.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-93.0.0.87.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-93.0.0.87.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-93.0.0.87.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-93.0.0.87.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-93.0.0.87.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-6.6.0-93.0.0.87.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-93.0.0.87.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-93.0.0.87.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-93.0.0.87.oe2403.aarch64"
					],
					"details":"kernel security update",
					"category":"vendor_fix",
					"url":"https://www.openeuler.org/zh/security/security-bulletins/detail/?id=openEuler-SA-2025-1572"
				}
			],
			"scores":[
				{
					"cvss_v3":{
						"baseSeverity":"MEDIUM",
						"baseScore":5.5,
						"vectorString":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
						"version":"3.1"
					},
					"products":[
						"openEuler-24.03-LTS:bpftool-6.6.0-93.0.0.87.oe2403.x86_64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-93.0.0.87.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-6.6.0-93.0.0.87.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-93.0.0.87.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-93.0.0.87.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-93.0.0.87.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-93.0.0.87.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-93.0.0.87.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-93.0.0.87.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-93.0.0.87.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-93.0.0.87.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-6.6.0-93.0.0.87.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-93.0.0.87.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-93.0.0.87.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-93.0.0.87.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-6.6.0-93.0.0.87.oe2403.src",
						"openEuler-24.03-LTS:bpftool-6.6.0-93.0.0.87.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-93.0.0.87.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-6.6.0-93.0.0.87.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-93.0.0.87.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-93.0.0.87.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-93.0.0.87.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-93.0.0.87.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-93.0.0.87.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-93.0.0.87.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-93.0.0.87.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-93.0.0.87.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-6.6.0-93.0.0.87.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-93.0.0.87.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-93.0.0.87.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-93.0.0.87.oe2403.aarch64"
					]
				}
			],
			"threats":[
				{
					"details":"Medium",
					"category":"impact"
				}
			],
			"title":"CVE-2025-37925"
		},
		{
			"cve":"CVE-2025-37936",
			"notes":[
				{
					"text":"In the Linux kernel, the following vulnerability has been resolved:\n\nperf/x86/intel: KVM: Mask PEBS_ENABLE loaded for guest with vCPU's value.\n\nWhen generating the MSR_IA32_PEBS_ENABLE value that will be loaded on\nVM-Entry to a KVM guest, mask the value with the vCPU's desired PEBS_ENABLE\nvalue.  Consulting only the host kernel's host vs. guest masks results in\nrunning the guest with PEBS enabled even when the guest doesn't want to use\nPEBS.  Because KVM uses perf events to proxy the guest virtual PMU, simply\nlooking at exclude_host can't differentiate between events created by host\nuserspace, and events created by KVM on behalf of the guest.\n\nRunning the guest with PEBS unexpectedly enabled typically manifests as\ncrashes due to a near-infinite stream of #PFs.  E.g. if the guest hasn't\nwritten MSR_IA32_DS_AREA, the CPU will hit page faults on address '0' when\ntrying to record PEBS events.\n\nThe issue is most easily reproduced by running `perf kvm top` from before\ncommit 7b100989b4f6 (\"perf evlist: Remove __evlist__add_default\") (after\nwhich, `perf kvm top` effectively stopped using PEBS).\tThe userspace side\nof perf creates a guest-only PEBS event, which intel_guest_get_msrs()\nmisconstrues a guest-*owned* PEBS event.\n\nArguably, this is a userspace bug, as enabling PEBS on guest-only events\nsimply cannot work, and userspace can kill VMs in many other ways (there\nis no danger to the host).  However, even if this is considered to be bad\nuserspace behavior, there's zero downside to perf/KVM restricting PEBS to\nguest-owned events.\n\nNote, commit 854250329c02 (\"KVM: x86/pmu: Disable guest PEBS temporarily\nin two rare situations\") fixed the case where host userspace is profiling\nKVM *and* userspace, but missed the case where userspace is profiling only\nKVM.",
					"category":"description",
					"title":"Vulnerability Description"
				}
			],
			"product_status":{
				"fixed":[
					"openEuler-24.03-LTS:bpftool-6.6.0-93.0.0.87.oe2403.x86_64",
					"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-93.0.0.87.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-6.6.0-93.0.0.87.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-93.0.0.87.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-debugsource-6.6.0-93.0.0.87.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-devel-6.6.0-93.0.0.87.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-headers-6.6.0-93.0.0.87.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-source-6.6.0-93.0.0.87.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-tools-6.6.0-93.0.0.87.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-93.0.0.87.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-93.0.0.87.oe2403.x86_64",
					"openEuler-24.03-LTS:perf-6.6.0-93.0.0.87.oe2403.x86_64",
					"openEuler-24.03-LTS:perf-debuginfo-6.6.0-93.0.0.87.oe2403.x86_64",
					"openEuler-24.03-LTS:python3-perf-6.6.0-93.0.0.87.oe2403.x86_64",
					"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-93.0.0.87.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-6.6.0-93.0.0.87.oe2403.src",
					"openEuler-24.03-LTS:bpftool-6.6.0-93.0.0.87.oe2403.aarch64",
					"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-93.0.0.87.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-6.6.0-93.0.0.87.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-93.0.0.87.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-debugsource-6.6.0-93.0.0.87.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-devel-6.6.0-93.0.0.87.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-headers-6.6.0-93.0.0.87.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-source-6.6.0-93.0.0.87.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-tools-6.6.0-93.0.0.87.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-93.0.0.87.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-93.0.0.87.oe2403.aarch64",
					"openEuler-24.03-LTS:perf-6.6.0-93.0.0.87.oe2403.aarch64",
					"openEuler-24.03-LTS:perf-debuginfo-6.6.0-93.0.0.87.oe2403.aarch64",
					"openEuler-24.03-LTS:python3-perf-6.6.0-93.0.0.87.oe2403.aarch64",
					"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-93.0.0.87.oe2403.aarch64"
				]
			},
			"remediations":[
				{
					"product_ids":[
						"openEuler-24.03-LTS:bpftool-6.6.0-93.0.0.87.oe2403.x86_64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-93.0.0.87.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-6.6.0-93.0.0.87.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-93.0.0.87.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-93.0.0.87.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-93.0.0.87.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-93.0.0.87.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-93.0.0.87.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-93.0.0.87.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-93.0.0.87.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-93.0.0.87.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-6.6.0-93.0.0.87.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-93.0.0.87.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-93.0.0.87.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-93.0.0.87.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-6.6.0-93.0.0.87.oe2403.src",
						"openEuler-24.03-LTS:bpftool-6.6.0-93.0.0.87.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-93.0.0.87.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-6.6.0-93.0.0.87.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-93.0.0.87.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-93.0.0.87.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-93.0.0.87.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-93.0.0.87.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-93.0.0.87.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-93.0.0.87.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-93.0.0.87.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-93.0.0.87.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-6.6.0-93.0.0.87.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-93.0.0.87.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-93.0.0.87.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-93.0.0.87.oe2403.aarch64"
					],
					"details":"kernel security update",
					"category":"vendor_fix",
					"url":"https://www.openeuler.org/zh/security/security-bulletins/detail/?id=openEuler-SA-2025-1572"
				}
			],
			"scores":[
				{
					"cvss_v3":{
						"baseSeverity":"MEDIUM",
						"baseScore":5.5,
						"vectorString":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
						"version":"3.1"
					},
					"products":[
						"openEuler-24.03-LTS:bpftool-6.6.0-93.0.0.87.oe2403.x86_64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-93.0.0.87.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-6.6.0-93.0.0.87.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-93.0.0.87.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-93.0.0.87.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-93.0.0.87.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-93.0.0.87.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-93.0.0.87.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-93.0.0.87.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-93.0.0.87.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-93.0.0.87.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-6.6.0-93.0.0.87.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-93.0.0.87.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-93.0.0.87.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-93.0.0.87.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-6.6.0-93.0.0.87.oe2403.src",
						"openEuler-24.03-LTS:bpftool-6.6.0-93.0.0.87.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-93.0.0.87.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-6.6.0-93.0.0.87.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-93.0.0.87.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-93.0.0.87.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-93.0.0.87.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-93.0.0.87.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-93.0.0.87.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-93.0.0.87.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-93.0.0.87.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-93.0.0.87.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-6.6.0-93.0.0.87.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-93.0.0.87.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-93.0.0.87.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-93.0.0.87.oe2403.aarch64"
					]
				}
			],
			"threats":[
				{
					"details":"Medium",
					"category":"impact"
				}
			],
			"title":"CVE-2025-37936"
		},
		{
			"cve":"CVE-2025-37940",
			"notes":[
				{
					"text":"In the Linux kernel, the following vulnerability has been resolved:\n\nftrace: Add cond_resched() to ftrace_graph_set_hash()\n\nWhen the kernel contains a large number of functions that can be traced,\nthe loop in ftrace_graph_set_hash() may take a lot of time to execute.\nThis may trigger the softlockup watchdog.\n\nAdd cond_resched() within the loop to allow the kernel to remain\nresponsive even when processing a large number of functions.\n\nThis matches the cond_resched() that is used in other locations of the\ncode that iterates over all functions that can be traced.",
					"category":"description",
					"title":"Vulnerability Description"
				}
			],
			"product_status":{
				"fixed":[
					"openEuler-24.03-LTS:bpftool-6.6.0-93.0.0.87.oe2403.x86_64",
					"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-93.0.0.87.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-6.6.0-93.0.0.87.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-93.0.0.87.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-debugsource-6.6.0-93.0.0.87.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-devel-6.6.0-93.0.0.87.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-headers-6.6.0-93.0.0.87.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-source-6.6.0-93.0.0.87.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-tools-6.6.0-93.0.0.87.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-93.0.0.87.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-93.0.0.87.oe2403.x86_64",
					"openEuler-24.03-LTS:perf-6.6.0-93.0.0.87.oe2403.x86_64",
					"openEuler-24.03-LTS:perf-debuginfo-6.6.0-93.0.0.87.oe2403.x86_64",
					"openEuler-24.03-LTS:python3-perf-6.6.0-93.0.0.87.oe2403.x86_64",
					"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-93.0.0.87.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-6.6.0-93.0.0.87.oe2403.src",
					"openEuler-24.03-LTS:bpftool-6.6.0-93.0.0.87.oe2403.aarch64",
					"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-93.0.0.87.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-6.6.0-93.0.0.87.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-93.0.0.87.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-debugsource-6.6.0-93.0.0.87.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-devel-6.6.0-93.0.0.87.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-headers-6.6.0-93.0.0.87.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-source-6.6.0-93.0.0.87.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-tools-6.6.0-93.0.0.87.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-93.0.0.87.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-93.0.0.87.oe2403.aarch64",
					"openEuler-24.03-LTS:perf-6.6.0-93.0.0.87.oe2403.aarch64",
					"openEuler-24.03-LTS:perf-debuginfo-6.6.0-93.0.0.87.oe2403.aarch64",
					"openEuler-24.03-LTS:python3-perf-6.6.0-93.0.0.87.oe2403.aarch64",
					"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-93.0.0.87.oe2403.aarch64"
				]
			},
			"remediations":[
				{
					"product_ids":[
						"openEuler-24.03-LTS:bpftool-6.6.0-93.0.0.87.oe2403.x86_64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-93.0.0.87.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-6.6.0-93.0.0.87.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-93.0.0.87.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-93.0.0.87.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-93.0.0.87.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-93.0.0.87.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-93.0.0.87.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-93.0.0.87.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-93.0.0.87.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-93.0.0.87.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-6.6.0-93.0.0.87.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-93.0.0.87.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-93.0.0.87.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-93.0.0.87.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-6.6.0-93.0.0.87.oe2403.src",
						"openEuler-24.03-LTS:bpftool-6.6.0-93.0.0.87.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-93.0.0.87.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-6.6.0-93.0.0.87.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-93.0.0.87.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-93.0.0.87.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-93.0.0.87.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-93.0.0.87.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-93.0.0.87.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-93.0.0.87.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-93.0.0.87.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-93.0.0.87.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-6.6.0-93.0.0.87.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-93.0.0.87.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-93.0.0.87.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-93.0.0.87.oe2403.aarch64"
					],
					"details":"kernel security update",
					"category":"vendor_fix",
					"url":"https://www.openeuler.org/zh/security/security-bulletins/detail/?id=openEuler-SA-2025-1572"
				}
			],
			"scores":[
				{
					"cvss_v3":{
						"baseSeverity":"LOW",
						"baseScore":3.9,
						"vectorString":"CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:L/I:L/A:L",
						"version":"3.1"
					},
					"products":[
						"openEuler-24.03-LTS:bpftool-6.6.0-93.0.0.87.oe2403.x86_64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-93.0.0.87.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-6.6.0-93.0.0.87.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-93.0.0.87.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-93.0.0.87.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-93.0.0.87.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-93.0.0.87.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-93.0.0.87.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-93.0.0.87.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-93.0.0.87.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-93.0.0.87.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-6.6.0-93.0.0.87.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-93.0.0.87.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-93.0.0.87.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-93.0.0.87.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-6.6.0-93.0.0.87.oe2403.src",
						"openEuler-24.03-LTS:bpftool-6.6.0-93.0.0.87.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-93.0.0.87.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-6.6.0-93.0.0.87.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-93.0.0.87.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-93.0.0.87.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-93.0.0.87.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-93.0.0.87.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-93.0.0.87.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-93.0.0.87.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-93.0.0.87.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-93.0.0.87.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-6.6.0-93.0.0.87.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-93.0.0.87.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-93.0.0.87.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-93.0.0.87.oe2403.aarch64"
					]
				}
			],
			"threats":[
				{
					"details":"Low",
					"category":"impact"
				}
			],
			"title":"CVE-2025-37940"
		},
		{
			"cve":"CVE-2025-37943",
			"notes":[
				{
					"text":"In the Linux kernel, the following vulnerability has been resolved:\n\nwifi: ath12k: Fix invalid data access in ath12k_dp_rx_h_undecap_nwifi\n\nIn certain cases, hardware might provide packets with a\nlength greater than the maximum native Wi-Fi header length.\nThis can lead to accessing and modifying fields in the header\nwithin the ath12k_dp_rx_h_undecap_nwifi function for\nDP_RX_DECAP_TYPE_NATIVE_WIFI decap type and\npotentially resulting in invalid data access and memory corruption.\n\nAdd a sanity check before processing the SKB to prevent invalid\ndata access in the undecap native Wi-Fi function for the\nDP_RX_DECAP_TYPE_NATIVE_WIFI decap type.\n\nTested-on: QCN9274 hw2.0 PCI WLAN.WBE.1.3.1-00173-QCAHKSWPL_SILICONZ-1",
					"category":"description",
					"title":"Vulnerability Description"
				}
			],
			"product_status":{
				"fixed":[
					"openEuler-24.03-LTS:bpftool-6.6.0-93.0.0.87.oe2403.x86_64",
					"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-93.0.0.87.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-6.6.0-93.0.0.87.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-93.0.0.87.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-debugsource-6.6.0-93.0.0.87.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-devel-6.6.0-93.0.0.87.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-headers-6.6.0-93.0.0.87.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-source-6.6.0-93.0.0.87.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-tools-6.6.0-93.0.0.87.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-93.0.0.87.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-93.0.0.87.oe2403.x86_64",
					"openEuler-24.03-LTS:perf-6.6.0-93.0.0.87.oe2403.x86_64",
					"openEuler-24.03-LTS:perf-debuginfo-6.6.0-93.0.0.87.oe2403.x86_64",
					"openEuler-24.03-LTS:python3-perf-6.6.0-93.0.0.87.oe2403.x86_64",
					"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-93.0.0.87.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-6.6.0-93.0.0.87.oe2403.src",
					"openEuler-24.03-LTS:bpftool-6.6.0-93.0.0.87.oe2403.aarch64",
					"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-93.0.0.87.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-6.6.0-93.0.0.87.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-93.0.0.87.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-debugsource-6.6.0-93.0.0.87.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-devel-6.6.0-93.0.0.87.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-headers-6.6.0-93.0.0.87.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-source-6.6.0-93.0.0.87.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-tools-6.6.0-93.0.0.87.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-93.0.0.87.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-93.0.0.87.oe2403.aarch64",
					"openEuler-24.03-LTS:perf-6.6.0-93.0.0.87.oe2403.aarch64",
					"openEuler-24.03-LTS:perf-debuginfo-6.6.0-93.0.0.87.oe2403.aarch64",
					"openEuler-24.03-LTS:python3-perf-6.6.0-93.0.0.87.oe2403.aarch64",
					"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-93.0.0.87.oe2403.aarch64"
				]
			},
			"remediations":[
				{
					"product_ids":[
						"openEuler-24.03-LTS:bpftool-6.6.0-93.0.0.87.oe2403.x86_64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-93.0.0.87.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-6.6.0-93.0.0.87.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-93.0.0.87.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-93.0.0.87.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-93.0.0.87.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-93.0.0.87.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-93.0.0.87.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-93.0.0.87.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-93.0.0.87.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-93.0.0.87.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-6.6.0-93.0.0.87.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-93.0.0.87.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-93.0.0.87.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-93.0.0.87.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-6.6.0-93.0.0.87.oe2403.src",
						"openEuler-24.03-LTS:bpftool-6.6.0-93.0.0.87.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-93.0.0.87.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-6.6.0-93.0.0.87.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-93.0.0.87.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-93.0.0.87.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-93.0.0.87.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-93.0.0.87.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-93.0.0.87.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-93.0.0.87.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-93.0.0.87.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-93.0.0.87.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-6.6.0-93.0.0.87.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-93.0.0.87.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-93.0.0.87.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-93.0.0.87.oe2403.aarch64"
					],
					"details":"kernel security update",
					"category":"vendor_fix",
					"url":"https://www.openeuler.org/zh/security/security-bulletins/detail/?id=openEuler-SA-2025-1572"
				}
			],
			"scores":[
				{
					"cvss_v3":{
						"baseSeverity":"LOW",
						"baseScore":3.9,
						"vectorString":"CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:L/I:L/A:L",
						"version":"3.1"
					},
					"products":[
						"openEuler-24.03-LTS:bpftool-6.6.0-93.0.0.87.oe2403.x86_64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-93.0.0.87.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-6.6.0-93.0.0.87.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-93.0.0.87.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-93.0.0.87.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-93.0.0.87.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-93.0.0.87.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-93.0.0.87.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-93.0.0.87.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-93.0.0.87.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-93.0.0.87.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-6.6.0-93.0.0.87.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-93.0.0.87.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-93.0.0.87.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-93.0.0.87.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-6.6.0-93.0.0.87.oe2403.src",
						"openEuler-24.03-LTS:bpftool-6.6.0-93.0.0.87.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-93.0.0.87.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-6.6.0-93.0.0.87.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-93.0.0.87.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-93.0.0.87.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-93.0.0.87.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-93.0.0.87.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-93.0.0.87.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-93.0.0.87.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-93.0.0.87.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-93.0.0.87.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-6.6.0-93.0.0.87.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-93.0.0.87.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-93.0.0.87.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-93.0.0.87.oe2403.aarch64"
					]
				}
			],
			"threats":[
				{
					"details":"Low",
					"category":"impact"
				}
			],
			"title":"CVE-2025-37943"
		},
		{
			"cve":"CVE-2025-37970",
			"notes":[
				{
					"text":"In the Linux kernel, the following vulnerability has been resolved:\n\niio: imu: st_lsm6dsx: fix possible lockup in st_lsm6dsx_read_fifo\n\nPrevent st_lsm6dsx_read_fifo from falling in an infinite loop in case\npattern_len is equal to zero and the device FIFO is not empty.",
					"category":"description",
					"title":"Vulnerability Description"
				}
			],
			"product_status":{
				"fixed":[
					"openEuler-24.03-LTS:bpftool-6.6.0-93.0.0.87.oe2403.x86_64",
					"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-93.0.0.87.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-6.6.0-93.0.0.87.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-93.0.0.87.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-debugsource-6.6.0-93.0.0.87.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-devel-6.6.0-93.0.0.87.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-headers-6.6.0-93.0.0.87.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-source-6.6.0-93.0.0.87.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-tools-6.6.0-93.0.0.87.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-93.0.0.87.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-93.0.0.87.oe2403.x86_64",
					"openEuler-24.03-LTS:perf-6.6.0-93.0.0.87.oe2403.x86_64",
					"openEuler-24.03-LTS:perf-debuginfo-6.6.0-93.0.0.87.oe2403.x86_64",
					"openEuler-24.03-LTS:python3-perf-6.6.0-93.0.0.87.oe2403.x86_64",
					"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-93.0.0.87.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-6.6.0-93.0.0.87.oe2403.src",
					"openEuler-24.03-LTS:bpftool-6.6.0-93.0.0.87.oe2403.aarch64",
					"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-93.0.0.87.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-6.6.0-93.0.0.87.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-93.0.0.87.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-debugsource-6.6.0-93.0.0.87.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-devel-6.6.0-93.0.0.87.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-headers-6.6.0-93.0.0.87.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-source-6.6.0-93.0.0.87.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-tools-6.6.0-93.0.0.87.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-93.0.0.87.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-93.0.0.87.oe2403.aarch64",
					"openEuler-24.03-LTS:perf-6.6.0-93.0.0.87.oe2403.aarch64",
					"openEuler-24.03-LTS:perf-debuginfo-6.6.0-93.0.0.87.oe2403.aarch64",
					"openEuler-24.03-LTS:python3-perf-6.6.0-93.0.0.87.oe2403.aarch64",
					"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-93.0.0.87.oe2403.aarch64"
				]
			},
			"remediations":[
				{
					"product_ids":[
						"openEuler-24.03-LTS:bpftool-6.6.0-93.0.0.87.oe2403.x86_64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-93.0.0.87.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-6.6.0-93.0.0.87.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-93.0.0.87.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-93.0.0.87.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-93.0.0.87.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-93.0.0.87.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-93.0.0.87.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-93.0.0.87.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-93.0.0.87.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-93.0.0.87.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-6.6.0-93.0.0.87.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-93.0.0.87.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-93.0.0.87.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-93.0.0.87.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-6.6.0-93.0.0.87.oe2403.src",
						"openEuler-24.03-LTS:bpftool-6.6.0-93.0.0.87.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-93.0.0.87.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-6.6.0-93.0.0.87.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-93.0.0.87.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-93.0.0.87.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-93.0.0.87.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-93.0.0.87.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-93.0.0.87.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-93.0.0.87.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-93.0.0.87.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-93.0.0.87.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-6.6.0-93.0.0.87.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-93.0.0.87.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-93.0.0.87.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-93.0.0.87.oe2403.aarch64"
					],
					"details":"kernel security update",
					"category":"vendor_fix",
					"url":"https://www.openeuler.org/zh/security/security-bulletins/detail/?id=openEuler-SA-2025-1572"
				}
			],
			"scores":[
				{
					"cvss_v3":{
						"baseSeverity":"MEDIUM",
						"baseScore":5.5,
						"vectorString":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
						"version":"3.1"
					},
					"products":[
						"openEuler-24.03-LTS:bpftool-6.6.0-93.0.0.87.oe2403.x86_64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-93.0.0.87.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-6.6.0-93.0.0.87.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-93.0.0.87.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-93.0.0.87.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-93.0.0.87.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-93.0.0.87.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-93.0.0.87.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-93.0.0.87.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-93.0.0.87.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-93.0.0.87.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-6.6.0-93.0.0.87.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-93.0.0.87.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-93.0.0.87.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-93.0.0.87.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-6.6.0-93.0.0.87.oe2403.src",
						"openEuler-24.03-LTS:bpftool-6.6.0-93.0.0.87.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-93.0.0.87.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-6.6.0-93.0.0.87.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-93.0.0.87.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-93.0.0.87.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-93.0.0.87.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-93.0.0.87.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-93.0.0.87.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-93.0.0.87.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-93.0.0.87.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-93.0.0.87.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-6.6.0-93.0.0.87.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-93.0.0.87.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-93.0.0.87.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-93.0.0.87.oe2403.aarch64"
					]
				}
			],
			"threats":[
				{
					"details":"Medium",
					"category":"impact"
				}
			],
			"title":"CVE-2025-37970"
		},
		{
			"cve":"CVE-2025-37980",
			"notes":[
				{
					"text":"In the Linux kernel, the following vulnerability has been resolved:\n\nblock: fix resource leak in blk_register_queue() error path\n\nWhen registering a queue fails after blk_mq_sysfs_register() is\nsuccessful but the function later encounters an error, we need\nto clean up the blk_mq_sysfs resources.\n\nAdd the missing blk_mq_sysfs_unregister() call in the error path\nto properly clean up these resources and prevent a memory leak.",
					"category":"description",
					"title":"Vulnerability Description"
				}
			],
			"product_status":{
				"fixed":[
					"openEuler-24.03-LTS:bpftool-6.6.0-93.0.0.87.oe2403.x86_64",
					"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-93.0.0.87.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-6.6.0-93.0.0.87.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-93.0.0.87.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-debugsource-6.6.0-93.0.0.87.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-devel-6.6.0-93.0.0.87.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-headers-6.6.0-93.0.0.87.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-source-6.6.0-93.0.0.87.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-tools-6.6.0-93.0.0.87.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-93.0.0.87.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-93.0.0.87.oe2403.x86_64",
					"openEuler-24.03-LTS:perf-6.6.0-93.0.0.87.oe2403.x86_64",
					"openEuler-24.03-LTS:perf-debuginfo-6.6.0-93.0.0.87.oe2403.x86_64",
					"openEuler-24.03-LTS:python3-perf-6.6.0-93.0.0.87.oe2403.x86_64",
					"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-93.0.0.87.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-6.6.0-93.0.0.87.oe2403.src",
					"openEuler-24.03-LTS:bpftool-6.6.0-93.0.0.87.oe2403.aarch64",
					"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-93.0.0.87.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-6.6.0-93.0.0.87.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-93.0.0.87.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-debugsource-6.6.0-93.0.0.87.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-devel-6.6.0-93.0.0.87.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-headers-6.6.0-93.0.0.87.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-source-6.6.0-93.0.0.87.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-tools-6.6.0-93.0.0.87.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-93.0.0.87.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-93.0.0.87.oe2403.aarch64",
					"openEuler-24.03-LTS:perf-6.6.0-93.0.0.87.oe2403.aarch64",
					"openEuler-24.03-LTS:perf-debuginfo-6.6.0-93.0.0.87.oe2403.aarch64",
					"openEuler-24.03-LTS:python3-perf-6.6.0-93.0.0.87.oe2403.aarch64",
					"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-93.0.0.87.oe2403.aarch64"
				]
			},
			"remediations":[
				{
					"product_ids":[
						"openEuler-24.03-LTS:bpftool-6.6.0-93.0.0.87.oe2403.x86_64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-93.0.0.87.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-6.6.0-93.0.0.87.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-93.0.0.87.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-93.0.0.87.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-93.0.0.87.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-93.0.0.87.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-93.0.0.87.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-93.0.0.87.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-93.0.0.87.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-93.0.0.87.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-6.6.0-93.0.0.87.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-93.0.0.87.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-93.0.0.87.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-93.0.0.87.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-6.6.0-93.0.0.87.oe2403.src",
						"openEuler-24.03-LTS:bpftool-6.6.0-93.0.0.87.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-93.0.0.87.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-6.6.0-93.0.0.87.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-93.0.0.87.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-93.0.0.87.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-93.0.0.87.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-93.0.0.87.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-93.0.0.87.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-93.0.0.87.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-93.0.0.87.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-93.0.0.87.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-6.6.0-93.0.0.87.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-93.0.0.87.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-93.0.0.87.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-93.0.0.87.oe2403.aarch64"
					],
					"details":"kernel security update",
					"category":"vendor_fix",
					"url":"https://www.openeuler.org/zh/security/security-bulletins/detail/?id=openEuler-SA-2025-1572"
				}
			],
			"scores":[
				{
					"cvss_v3":{
						"baseSeverity":"LOW",
						"baseScore":3.9,
						"vectorString":"CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:L/I:L/A:L",
						"version":"3.1"
					},
					"products":[
						"openEuler-24.03-LTS:bpftool-6.6.0-93.0.0.87.oe2403.x86_64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-93.0.0.87.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-6.6.0-93.0.0.87.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-93.0.0.87.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-93.0.0.87.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-93.0.0.87.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-93.0.0.87.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-93.0.0.87.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-93.0.0.87.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-93.0.0.87.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-93.0.0.87.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-6.6.0-93.0.0.87.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-93.0.0.87.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-93.0.0.87.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-93.0.0.87.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-6.6.0-93.0.0.87.oe2403.src",
						"openEuler-24.03-LTS:bpftool-6.6.0-93.0.0.87.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-93.0.0.87.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-6.6.0-93.0.0.87.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-93.0.0.87.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-93.0.0.87.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-93.0.0.87.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-93.0.0.87.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-93.0.0.87.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-93.0.0.87.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-93.0.0.87.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-93.0.0.87.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-6.6.0-93.0.0.87.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-93.0.0.87.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-93.0.0.87.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-93.0.0.87.oe2403.aarch64"
					]
				}
			],
			"threats":[
				{
					"details":"Low",
					"category":"impact"
				}
			],
			"title":"CVE-2025-37980"
		}
	]
}