{
	"document":{
		"aggregate_severity":{
			"namespace":"https://nvd.nist.gov/vuln-metrics/cvss",
			"text":"High"
		},
		"category":"csaf_vex",
		"csaf_version":"2.0",
		"distribution":{
			"tlp":{
				"label":"WHITE",
				"url":"https:/www.first.org/tlp/"
			}
		},
		"lang":"en",
		"notes":[
			{
				"text":"kernel security update",
				"category":"general",
				"title":"Synopsis"
			},
			{
				"text":"An update for kernel is now available for openEuler-24.03-LTS",
				"category":"general",
				"title":"Summary"
			},
			{
				"text":"The Linux Kernel, the operating system core itself.\n\nSecurity Fix(es):\n\nIn the Linux kernel, the following vulnerability has been resolved:\n\npfifo_tail_enqueue: Drop new packet when sch->limit == 0\n\nExpected behaviour:\nIn case we reach scheduler's limit, pfifo_tail_enqueue() will drop a\npacket in scheduler's queue and decrease scheduler's qlen by one.\nThen, pfifo_tail_enqueue() enqueue new packet and increase\nscheduler's qlen by one. Finally, pfifo_tail_enqueue() return\n`NET_XMIT_CN` status code.\n\nWeird behaviour:\nIn case we set `sch->limit == 0` and trigger pfifo_tail_enqueue() on a\nscheduler that has no packet, the 'drop a packet' step will do nothing.\nThis means the scheduler's qlen still has value equal 0.\nThen, we continue to enqueue new packet and increase scheduler's qlen by\none. In summary, we can leverage pfifo_tail_enqueue() to increase qlen by\none and return `NET_XMIT_CN` status code.\n\nThe problem is:\nLet's say we have two qdiscs: Qdisc_A and Qdisc_B.\n - Qdisc_A's type must have '->graft()' function to create parent/child relationship.\n   Let's say Qdisc_A's type is `hfsc`. Enqueue packet to this qdisc will trigger `hfsc_enqueue`.\n - Qdisc_B's type is pfifo_head_drop. Enqueue packet to this qdisc will trigger `pfifo_tail_enqueue`.\n - Qdisc_B is configured to have `sch->limit == 0`.\n - Qdisc_A is configured to route the enqueued's packet to Qdisc_B.\n\nEnqueue packet through Qdisc_A will lead to:\n - hfsc_enqueue(Qdisc_A) -> pfifo_tail_enqueue(Qdisc_B)\n - Qdisc_B->q.qlen += 1\n - pfifo_tail_enqueue() return `NET_XMIT_CN`\n - hfsc_enqueue() check for `NET_XMIT_SUCCESS` and see `NET_XMIT_CN` => hfsc_enqueue() don't increase qlen of Qdisc_A.\n\nThe whole process lead to a situation where Qdisc_A->q.qlen == 0 and Qdisc_B->q.qlen == 1.\nReplace 'hfsc' with other type (for example: 'drr') still lead to the same problem.\nThis violate the design where parent's qlen should equal to the sum of its childrens'qlen.\n\nBug impact: This issue can be used for user->kernel privilege escalation when it is reachable.(CVE-2025-21702)\n\nIn the Linux kernel, the following vulnerability has been resolved:\n\nnetem: Update sch->q.qlen before qdisc_tree_reduce_backlog()\n\nqdisc_tree_reduce_backlog() notifies parent qdisc only if child\nqdisc becomes empty, therefore we need to reduce the backlog of the\nchild qdisc before calling it. Otherwise it would miss the opportunity\nto call cops->qlen_notify(), in the case of DRR, it resulted in UAF\nsince DRR uses ->qlen_notify() to maintain its active list.(CVE-2025-21703)\n\nIn the Linux kernel, the following vulnerability has been resolved:\n\nmptcp: always handle address removal under msk socket lock\n\nSyzkaller reported a lockdep splat in the PM control path:\n\n  WARNING: CPU: 0 PID: 6693 at ./include/net/sock.h:1711 sock_owned_by_me include/net/sock.h:1711 [inline]\n  WARNING: CPU: 0 PID: 6693 at ./include/net/sock.h:1711 msk_owned_by_me net/mptcp/protocol.h:363 [inline]\n  WARNING: CPU: 0 PID: 6693 at ./include/net/sock.h:1711 mptcp_pm_nl_addr_send_ack+0x57c/0x610 net/mptcp/pm_netlink.c:788\n  Modules linked in:\n  CPU: 0 UID: 0 PID: 6693 Comm: syz.0.205 Not tainted 6.14.0-rc2-syzkaller-00303-gad1b832bf1cf #0\n  Hardware name: Google Compute Engine/Google Compute Engine, BIOS Google 12/27/2024\n  RIP: 0010:sock_owned_by_me include/net/sock.h:1711 [inline]\n  RIP: 0010:msk_owned_by_me net/mptcp/protocol.h:363 [inline]\n  RIP: 0010:mptcp_pm_nl_addr_send_ack+0x57c/0x610 net/mptcp/pm_netlink.c:788\n  Code: 5b 41 5c 41 5d 41 5e 41 5f 5d c3 cc cc cc cc e8 ca 7b d3 f5 eb b9 e8 c3 7b d3 f5 90 0f 0b 90 e9 dd fb ff ff e8 b5 7b d3 f5 90 <0f> 0b 90 e9 3e fb ff ff 44 89 f1 80 e1 07 38 c1 0f 8c eb fb ff ff\n  RSP: 0000:ffffc900034f6f60 EFLAGS: 00010283\n  RAX: ffffffff8bee3c2b RBX: 0000000000000001 RCX: 0000000000080000\n  RDX: ffffc90004d42000 RSI: 000000000000a407 RDI: 000000000000a408\n  RBP: ffffc900034f7030 R08: ffffffff8bee37f6 R09: 0100000000000000\n  R10: dffffc0000000000 R11: ffffed100bcc62e4 R12: ffff88805e6316e0\n  R13: ffff88805e630c00 R14: dffffc0000000000 R15: ffff88805e630c00\n  FS:  00007f7e9a7e96c0(0000) GS:ffff8880b8600000(0000) knlGS:0000000000000000\n  CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033\n  CR2: 0000001b2fd18ff8 CR3: 0000000032c24000 CR4: 00000000003526f0\n  DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000\n  DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400\n  Call Trace:\n   <TASK>\n   mptcp_pm_remove_addr+0x103/0x1d0 net/mptcp/pm.c:59\n   mptcp_pm_remove_anno_addr+0x1f4/0x2f0 net/mptcp/pm_netlink.c:1486\n   mptcp_nl_remove_subflow_and_signal_addr net/mptcp/pm_netlink.c:1518 [inline]\n   mptcp_pm_nl_del_addr_doit+0x118d/0x1af0 net/mptcp/pm_netlink.c:1629\n   genl_family_rcv_msg_doit net/netlink/genetlink.c:1115 [inline]\n   genl_family_rcv_msg net/netlink/genetlink.c:1195 [inline]\n   genl_rcv_msg+0xb1f/0xec0 net/netlink/genetlink.c:1210\n   netlink_rcv_skb+0x206/0x480 net/netlink/af_netlink.c:2543\n   genl_rcv+0x28/0x40 net/netlink/genetlink.c:1219\n   netlink_unicast_kernel net/netlink/af_netlink.c:1322 [inline]\n   netlink_unicast+0x7f6/0x990 net/netlink/af_netlink.c:1348\n   netlink_sendmsg+0x8de/0xcb0 net/netlink/af_netlink.c:1892\n   sock_sendmsg_nosec net/socket.c:718 [inline]\n   __sock_sendmsg+0x221/0x270 net/socket.c:733\n   ____sys_sendmsg+0x53a/0x860 net/socket.c:2573\n   ___sys_sendmsg net/socket.c:2627 [inline]\n   __sys_sendmsg+0x269/0x350 net/socket.c:2659\n   do_syscall_x64 arch/x86/entry/common.c:52 [inline]\n   do_syscall_64+0xf3/0x230 arch/x86/entry/common.c:83\n   entry_SYSCALL_64_after_hwframe+0x77/0x7f\n  RIP: 0033:0x7f7e9998cde9\n  Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48\n  RSP: 002b:00007f7e9a7e9038 EFLAGS: 00000246 ORIG_RAX: 000000000000002e\n  RAX: ffffffffffffffda RBX: 00007f7e99ba5fa0 RCX: 00007f7e9998cde9\n  RDX: 000000002000c094 RSI: 0000400000000000 RDI: 0000000000000007\n  RBP: 00007f7e99a0e2a0 R08: 0000000000000000 R09: 0000000000000000\n  R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000\n  R13: 0000000000000000 R14: 00007f7e99ba5fa0 R15: 00007fff49231088\n\nIndeed the PM can try to send a RM_ADDR over a msk without acquiring\nfirst the msk socket lock.\n\nThe bugged code-path comes from an early optimization: when there\nare no subflows, the PM should (usually) not send RM_ADDR\nnotifications.\n\nThe above statement is incorrect, as without locks another process\ncould concur\n---truncated---(CVE-2025-21875)\n\nIn the Linux kernel, the following vulnerability has been resolved:\n\nvlan: enforce underlying device type\n\nCurrently, VLAN devices can be created on top of non-ethernet devices.\n\nBesides the fact that it doesn't make much sense, this also causes a\nbug which leaks the address of a kernel function to usermode.\n\nWhen creating a VLAN device, we initialize GARP (garp_init_applicant)\nand MRP (mrp_init_applicant) for the underlying device.\n\nAs part of the initialization process, we add the multicast address of\neach applicant to the underlying device, by calling dev_mc_add.\n\n__dev_mc_add uses dev->addr_len to determine the length of the new\nmulticast address.\n\nThis causes an out-of-bounds read if dev->addr_len is greater than 6,\nsince the multicast addresses provided by GARP and MRP are only 6\nbytes long.\n\nThis behaviour can be reproduced using the following commands:\n\nip tunnel add gretest mode ip6gre local ::1 remote ::2 dev lo\nip l set up dev gretest\nip link add link gretest name vlantest type vlan id 100\n\nThen, the following command will display the address of garp_pdu_rcv:\n\nip maddr show | grep 01:80:c2:00:00:21\n\nFix the bug by enforcing the type of the underlying device during VLAN\ndevice initialization.(CVE-2025-21920)\n\nIn the Linux kernel, the following vulnerability has been resolved:\n\nnet: gso: fix ownership in __udp_gso_segment\n\nIn __udp_gso_segment the skb destructor is removed before segmenting the\nskb but the socket reference is kept as-is. This is an issue if the\noriginal skb is later orphaned as we can hit the following bug:\n\n  kernel BUG at ./include/linux/skbuff.h:3312!  (skb_orphan)\n  RIP: 0010:ip_rcv_core+0x8b2/0xca0\n  Call Trace:\n   ip_rcv+0xab/0x6e0\n   __netif_receive_skb_one_core+0x168/0x1b0\n   process_backlog+0x384/0x1100\n   __napi_poll.constprop.0+0xa1/0x370\n   net_rx_action+0x925/0xe50\n\nThe above can happen following a sequence of events when using\nOpenVSwitch, when an OVS_ACTION_ATTR_USERSPACE action precedes an\nOVS_ACTION_ATTR_OUTPUT action:\n\n1. OVS_ACTION_ATTR_USERSPACE is handled (in do_execute_actions): the skb\n   goes through queue_gso_packets and then __udp_gso_segment, where its\n   destructor is removed.\n2. The segments' data are copied and sent to userspace.\n3. OVS_ACTION_ATTR_OUTPUT is handled (in do_execute_actions) and the\n   same original skb is sent to its path.\n4. If it later hits skb_orphan, we hit the bug.\n\nFix this by also removing the reference to the socket in\n__udp_gso_segment.(CVE-2025-21926)\n\nIn the Linux kernel, the following vulnerability has been resolved:\n\nBluetooth: Add check for mgmt_alloc_skb() in mgmt_device_connected()\n\nAdd check for the return value of mgmt_alloc_skb() in\nmgmt_device_connected() to prevent null pointer dereference.(CVE-2025-21936)\n\nIn the Linux kernel, the following vulnerability has been resolved:\n\nBluetooth: Add check for mgmt_alloc_skb() in mgmt_remote_name()\n\nAdd check for the return value of mgmt_alloc_skb() in\nmgmt_remote_name() to prevent null pointer dereference.(CVE-2025-21937)\n\nIn the Linux kernel, the following vulnerability has been resolved:\n\nmptcp: fix 'scheduling while atomic' in mptcp_pm_nl_append_new_local_addr\n\nIf multiple connection requests attempt to create an implicit mptcp\nendpoint in parallel, more than one caller may end up in\nmptcp_pm_nl_append_new_local_addr because none found the address in\nlocal_addr_list during their call to mptcp_pm_nl_get_local_id.  In this\ncase, the concurrent new_local_addr calls may delete the address entry\ncreated by the previous caller.  These deletes use synchronize_rcu, but\nthis is not permitted in some of the contexts where this function may be\ncalled.  During packet recv, the caller may be in a rcu read critical\nsection and have preemption disabled.\n\nAn example stack:\n\n   BUG: scheduling while atomic: swapper/2/0/0x00000302\n\n   Call Trace:\n   <IRQ>\n   dump_stack_lvl (lib/dump_stack.c:117 (discriminator 1))\n   dump_stack (lib/dump_stack.c:124)\n   __schedule_bug (kernel/sched/core.c:5943)\n   schedule_debug.constprop.0 (arch/x86/include/asm/preempt.h:33 kernel/sched/core.c:5970)\n   __schedule (arch/x86/include/asm/jump_label.h:27 include/linux/jump_label.h:207 kernel/sched/features.h:29 kernel/sched/core.c:6621)\n   schedule (arch/x86/include/asm/preempt.h:84 kernel/sched/core.c:6804 kernel/sched/core.c:6818)\n   schedule_timeout (kernel/time/timer.c:2160)\n   wait_for_completion (kernel/sched/completion.c:96 kernel/sched/completion.c:116 kernel/sched/completion.c:127 kernel/sched/completion.c:148)\n   __wait_rcu_gp (include/linux/rcupdate.h:311 kernel/rcu/update.c:444)\n   synchronize_rcu (kernel/rcu/tree.c:3609)\n   mptcp_pm_nl_append_new_local_addr (net/mptcp/pm_netlink.c:966 net/mptcp/pm_netlink.c:1061)\n   mptcp_pm_nl_get_local_id (net/mptcp/pm_netlink.c:1164)\n   mptcp_pm_get_local_id (net/mptcp/pm.c:420)\n   subflow_check_req (net/mptcp/subflow.c:98 net/mptcp/subflow.c:213)\n   subflow_v4_route_req (net/mptcp/subflow.c:305)\n   tcp_conn_request (net/ipv4/tcp_input.c:7216)\n   subflow_v4_conn_request (net/mptcp/subflow.c:651)\n   tcp_rcv_state_process (net/ipv4/tcp_input.c:6709)\n   tcp_v4_do_rcv (net/ipv4/tcp_ipv4.c:1934)\n   tcp_v4_rcv (net/ipv4/tcp_ipv4.c:2334)\n   ip_protocol_deliver_rcu (net/ipv4/ip_input.c:205 (discriminator 1))\n   ip_local_deliver_finish (include/linux/rcupdate.h:813 net/ipv4/ip_input.c:234)\n   ip_local_deliver (include/linux/netfilter.h:314 include/linux/netfilter.h:308 net/ipv4/ip_input.c:254)\n   ip_sublist_rcv_finish (include/net/dst.h:461 net/ipv4/ip_input.c:580)\n   ip_sublist_rcv (net/ipv4/ip_input.c:640)\n   ip_list_rcv (net/ipv4/ip_input.c:675)\n   __netif_receive_skb_list_core (net/core/dev.c:5583 net/core/dev.c:5631)\n   netif_receive_skb_list_internal (net/core/dev.c:5685 net/core/dev.c:5774)\n   napi_complete_done (include/linux/list.h:37 include/net/gro.h:449 include/net/gro.h:444 net/core/dev.c:6114)\n   igb_poll (drivers/net/ethernet/intel/igb/igb_main.c:8244) igb\n   __napi_poll (net/core/dev.c:6582)\n   net_rx_action (net/core/dev.c:6653 net/core/dev.c:6787)\n   handle_softirqs (kernel/softirq.c:553)\n   __irq_exit_rcu (kernel/softirq.c:588 kernel/softirq.c:427 kernel/softirq.c:636)\n   irq_exit_rcu (kernel/softirq.c:651)\n   common_interrupt (arch/x86/kernel/irq.c:247 (discriminator 14))\n   </IRQ>\n\nThis problem seems particularly prevalent if the user advertises an\nendpoint that has a different external vs internal address.  In the case\nwhere the external address is advertised and multiple connections\nalready exist, multiple subflow SYNs arrive in parallel which tends to\ntrigger the race during creation of the first local_addr_list entries\nwhich have the internal address instead.\n\nFix by skipping the replacement of an existing implicit local address if\ncalled via mptcp_pm_nl_get_local_id.(CVE-2025-21938)\n\nIn the Linux kernel, the following vulnerability has been resolved:\n\nnet: libwx: fix Tx L4 checksum\n\nThe hardware only supports L4 checksum offload for TCP/UDP/SCTP protocol.\nThere was a bug to set Tx checksum flag for the other protocol that results\nin Tx ring hang. Fix to compute software checksum for these packets.(CVE-2025-22101)\n\nIn the Linux kernel, the following vulnerability has been resolved:\n\nbnxt_en: Mask the bd_cnt field in the TX BD properly\n\nThe bd_cnt field in the TX BD specifies the total number of BDs for\nthe TX packet.  The bd_cnt field has 5 bits and the maximum number\nsupported is 32 with the value 0.\n\nCONFIG_MAX_SKB_FRAGS can be modified and the total number of SKB\nfragments can approach or exceed the maximum supported by the chip.\nAdd a macro to properly mask the bd_cnt field so that the value 32\nwill be properly masked and set to 0 in the bd_cnd field.\n\nWithout this patch, the out-of-range bd_cnt value will corrupt the\nTX BD and may cause TX timeout.\n\nThe next patch will check for values exceeding 32.(CVE-2025-22108)\n\nIn the Linux kernel, the following vulnerability has been resolved:\n\nusb: dwc3: gadget: check that event count does not exceed event buffer length\n\nThe event count is read from register DWC3_GEVNTCOUNT.\nThere is a check for the count being zero, but not for exceeding the\nevent buffer length.\nCheck that event count does not exceed event buffer length,\navoiding an out-of-bounds access when memcpy'ing the event.\nCrash log:\nUnable to handle kernel paging request at virtual address ffffffc0129be000\npc : __memcpy+0x114/0x180\nlr : dwc3_check_event_buf+0xec/0x348\nx3 : 0000000000000030 x2 : 000000000000dfc4\nx1 : ffffffc0129be000 x0 : ffffff87aad60080\nCall trace:\n__memcpy+0x114/0x180\ndwc3_interrupt+0x24/0x34(CVE-2025-37810)\n\nA vulnerability was found in Linux Kernel up to 6.16-rc2 (Operating System). It has been rated as critical.Using CWE to declare the problem leads to CWE-476. A NULL pointer dereference occurs when the application dereferences a pointer that it expects to be valid, but is NULL, typically causing a crash or exit.Impacted is availability.Upgrading to version 5.10.239, 5.15.186, 6.1.142, 6.6.95, 6.12.35, 6.15.4 or 6.16-rc3 eliminates this vulnerability. Applying the patch 5e8c658acd1b7c186aeffa46bf08795e121f401a/07d7b8e7ef7d1f812a6211ed531947c56d09e95e/a7b477b64ef5e37cb08dd536ae07c46f9f28262e/f3b840fb1508a80cd8a0efb5c886ae1995a88b24/4d71f2c1e5263a9f042faa71d59515709869dc79/32d05e6cc3a7bf6c8f16f7b7ef8fe80eca0c233e/61ce04601e0d8265ec6d2ffa6df5a7e1bce64854 is able to eliminate this problem. The bugfix is ready for download at git.kernel.org. The best possible mitigation is suggested to be upgrading to the latest version.(CVE-2025-38197)\n\nA vulnerability was found in Linux Kernel up to 6.15.3 (Operating System). It has been rated as critical.Using CWE to declare the problem leads to CWE-416. Referencing memory after it has been freed can cause a program to crash, use unexpected values, or execute code.Impacted is confidentiality, integrity, and availability.Upgrading to version 5.4.295, 5.10.239, 5.15.186, 6.1.142, 6.6.95, 6.12.35, 6.15.4 or 6.16-rc1 eliminates this vulnerability. Applying the patch 5f1e1573bf103303944fd7225559de5d8297539c/b968ba8bfd9f90914957bbbd815413bf6a98eca7/74bc813d11c30e28fc5261dc877cca662ccfac68/78297d53d3878d43c1d627d20cd09f611fa4b91d/5180561afff8e0f029073c8c8117c95c6512d1f9/68c173ea138b66d7dd1fd980c9bc578a18e11884/b0b6bf90ce2699a574b3683e22c44d0dcdd7a057/d66adabe91803ef34a8b90613c81267b5ded1472 is able to eliminate this problem. The bugfix is ready for download at git.kernel.org. The best possible mitigation is suggested to be upgrading to the latest version.The vulnerability is also documented in the vulnerability database at EUVD (EUVD-2025-20044).(CVE-2025-38212)\n\nIn the Linux kernel, the following vulnerability has been resolved:\n\nmedia: cxusb: no longer judge rbuf when the write fails\n\nsyzbot reported a uninit-value in cxusb_i2c_xfer. [1]\n\nOnly when the write operation of usb_bulk_msg() in dvb_usb_generic_rw()\nsucceeds and rlen is greater than 0, the read operation of usb_bulk_msg()\nwill be executed to read rlen bytes of data from the dvb device into the\nrbuf.\n\nIn this case, although rlen is 1, the write operation failed which resulted\nin the dvb read operation not being executed, and ultimately variable i was\nnot initialized.\n\n[1]\nBUG: KMSAN: uninit-value in cxusb_gpio_tuner drivers/media/usb/dvb-usb/cxusb.c:124 [inline]\nBUG: KMSAN: uninit-value in cxusb_i2c_xfer+0x153a/0x1a60 drivers/media/usb/dvb-usb/cxusb.c:196\n cxusb_gpio_tuner drivers/media/usb/dvb-usb/cxusb.c:124 [inline]\n cxusb_i2c_xfer+0x153a/0x1a60 drivers/media/usb/dvb-usb/cxusb.c:196\n __i2c_transfer+0xe25/0x3150 drivers/i2c/i2c-core-base.c:-1\n i2c_transfer+0x317/0x4a0 drivers/i2c/i2c-core-base.c:2315\n i2c_transfer_buffer_flags+0x125/0x1e0 drivers/i2c/i2c-core-base.c:2343\n i2c_master_send include/linux/i2c.h:109 [inline]\n i2cdev_write+0x210/0x280 drivers/i2c/i2c-dev.c:183\n do_loop_readv_writev fs/read_write.c:848 [inline]\n vfs_writev+0x963/0x14e0 fs/read_write.c:1057\n do_writev+0x247/0x5c0 fs/read_write.c:1101\n __do_sys_writev fs/read_write.c:1169 [inline]\n __se_sys_writev fs/read_write.c:1166 [inline]\n __x64_sys_writev+0x98/0xe0 fs/read_write.c:1166\n x64_sys_call+0x2229/0x3c80 arch/x86/include/generated/asm/syscalls_64.h:21\n do_syscall_x64 arch/x86/entry/syscall_64.c:63 [inline]\n do_syscall_64+0xcd/0x1e0 arch/x86/entry/syscall_64.c:94\n entry_SYSCALL_64_after_hwframe+0x77/0x7f(CVE-2025-38229)\n\nA vulnerability was found in Linux Kernel up to 6.15.2/fc2778c42f99c7de52fc004157b3c3ee4dcc208a (Operating System). It has been rated as problematic.Impacted is confidentiality, integrity, and availability.Upgrading to version 6.15.3 or 6.16-rc1 eliminates this vulnerability. Applying the patch ac49b7560b4b08b1e4043a29214cc7ad77644c00/e2d2115e56c4a02377189bfc3a9a7933552a7b0f is able to eliminate this problem. The bugfix is ready for download at git.kernel.org. The best possible mitigation is suggested to be upgrading to the latest version.(CVE-2025-38279)\n\nA vulnerability, which was classified as problematic, was found in Linux Kernel (Operating System).CWE is classifying the issue as CWE-74. The product constructs all or part of a command, data structure, or record using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify how it is parsed or interpreted when it is sent to a downstream component.This is going to have an impact on confidentiality, integrity, and availability.Upgrading to version 5.15.186, 6.1.142, 6.6.94, 6.12.34, 6.15.3 or 6.16-rc1 eliminates this vulnerability. Applying the patch e7fb4ebee6e900899d2b2e5852c3e2eafcbcad66/ef92b96530d1731d9ac167bc7c193c683cd78fff/6f639c25bfad17d9fd7379ab91ff9678ea9aac85/2bc6dffb4b72d53d6a6ada510269bf548c3f7ae0/0b9bb52796b239de6792d0d68cdc6eb505ebff96/86bc9c742426a16b52a10ef61f5b721aecca2344 is able to eliminate this problem. The bugfix is ready for download at git.kernel.org. The best possible mitigation is suggested to be upgrading to the latest version.(CVE-2025-38280)\n\nA vulnerability has been found in Linux Kernel up to 6.15.2 (Operating System) and classified as critical.The CWE definition for the vulnerability is CWE-121. A stack-based buffer overflow condition is a condition where the buffer being overwritten is allocated on the stack (i.e., is a local variable or, rarely, a parameter to a function).As an impact it is known to affect confidentiality, integrity, and availability.Upgrading to version 5.4.295, 5.10.239, 5.15.186, 6.1.142, 6.6.94, 6.12.34, 6.15.3 or 6.16-rc1 eliminates this vulnerability. Applying the patch 44ebe361abb322d2afd77930fa767a99f271c4d1/147ea936fc6fa8fe0c93f0df918803a5375ca535/ee90be48edb3dac612e0b7f5332482a9e8be2696/e167414beabb1e941fe563a96becc98627d5bdf6/6d8f39875a10a194051c3eaefebc7ac06a34aaf3/c98cdf6795a36bca163ebb40411fef1687b9eb13/18e8cbbae79cb35bdce8a01c889827b9799c762e/3880cdbed1c4607e378f58fa924c5d6df900d1d3 is able to eliminate this problem. The bugfix is ready for download at git.kernel.org. The best possible mitigation is suggested to be upgrading to the latest version.(CVE-2025-38285)\n\nA vulnerability was found in Linux Kernel up to 6.16-rc2 (Operating System). It has been declared as problematic.The CWE definition for the vulnerability is CWE-125. The product reads data past the end, or before the beginning, of the intended buffer.As an impact it is known to affect confidentiality.Upgrading to version 5.4.295, 5.10.239, 5.15.186, 6.1.142, 6.6.95, 6.12.35, 6.15.4 or 6.16-rc3 eliminates this vulnerability. Applying the patch 64773b3ea09235168a549a195cba43bb867c4a17/67abac27d806e8f9d4226ec1528540cf73af673a/92750bfe7b0d8dbcaf578c091a65eda1c5f9ad38/01f91d415a8375d85e0c7d3615cd4a168308bb7c/21da6d3561f373898349ca7167c9811c020da695/22f935bc86bdfbde04009f05eee191d220cd8c89/422e565b7889ebfd9c8705a3fc786642afe61fca/39dfc971e42d886e7df01371cd1bef505076d84c is able to eliminate this problem. The bugfix is ready for download at git.kernel.org. The best possible mitigation is suggested to be upgrading to the latest version.The vulnerability is also documented in the vulnerability database at EUVD (EUVD-2025-20926).(CVE-2025-38320)\n\nA vulnerability was found in Linux Kernel up to 6.15.3/6.16-rc2 (Operating System). It has been rated as critical.Using CWE to declare the problem leads to CWE-404. The product does not release or incorrectly releases a resource before it is made available for re-use.Impacted is availability.Upgrading to version 6.15.4 or 6.16-rc3 eliminates this vulnerability. Applying the patch a85cc69acdcb05f8cd226b8ea0778b8e2e887e6f/b0823d5fbacb1c551d793cbfe7af24e0d1fa45ed is able to eliminate this problem. The bugfix is ready for download at git.kernel.org. The best possible mitigation is suggested to be upgrading to the latest version.(CVE-2025-38322)\n\nA vulnerability was found in Linux Kernel up to 6.15.3 (Operating System). It has been declared as critical.The CWE definition for the vulnerability is CWE-119. The product performs operations on a memory buffer, but it can read from or write to a memory location that is outside of the intended boundary of the buffer.As an impact it is known to affect confidentiality, integrity, and availability.Upgrading to version 5.4.295, 5.10.239, 5.15.186, 6.1.142, 6.6.95, 6.12.35, 6.15.4 or 6.16-rc1 eliminates this vulnerability. Applying the patch d064c68781c19f378af1ae741d9132d35d24b2bb/8690cd3258455bbae64f809e1d3ee0f043661c71/6805582abb720681dd1c87ff677f155dcf4e86c9/03a162933c4a03b9f1a84f7d8482903c7e1e11bb/83a692a9792aa86249d68a8ac0b9d55ecdd255fa/8e89c17dc8970c5f71a3a991f5724d4c8de42d8c/f78a786ad9a5443a29eef4dae60cde85b7375129/f914b52c379c12288b7623bb814d0508dbe7481d is able to eliminate this problem. The bugfix is ready for download at git.kernel.org. The best possible mitigation is suggested to be upgrading to the latest version.(CVE-2025-38346)",
				"category":"general",
				"title":"Description"
			},
			{
				"text":"An update for kernel is now available for openEuler-24.03-LTS.\n\nopenEuler Security has rated this update as having a security impact of high. A Common Vunlnerability Scoring System(CVSS)base score,which gives a detailed severity rating, is available for each vulnerability from the CVElink(s) in the References section.",
				"category":"general",
				"title":"Topic"
			},
			{
				"text":"High",
				"category":"general",
				"title":"Severity"
			},
			{
				"text":"kernel",
				"category":"general",
				"title":"Affected Component"
			}
		],
		"publisher":{
			"issuing_authority":"openEuler security committee",
			"name":"openEuler",
			"namespace":"https://www.openeuler.org",
			"contact_details":"openeuler-security@openeuler.org",
			"category":"vendor"
		},
		"references":[
			{
				"summary":"openEuler-SA-2025-1874",
				"category":"self",
				"url":"https://www.openeuler.org/zh/security/security-bulletins/detail/?id=openEuler-SA-2025-1874"
			},
			{
				"summary":"CVE-2025-21702",
				"category":"self",
				"url":"https://www.openeuler.org/en/security/cve/detail/?cveId=CVE-2025-21702&packageName=kernel"
			},
			{
				"summary":"CVE-2025-21703",
				"category":"self",
				"url":"https://www.openeuler.org/en/security/cve/detail/?cveId=CVE-2025-21703&packageName=kernel"
			},
			{
				"summary":"CVE-2025-21875",
				"category":"self",
				"url":"https://www.openeuler.org/en/security/cve/detail/?cveId=CVE-2025-21875&packageName=kernel"
			},
			{
				"summary":"CVE-2025-21920",
				"category":"self",
				"url":"https://www.openeuler.org/en/security/cve/detail/?cveId=CVE-2025-21920&packageName=kernel"
			},
			{
				"summary":"CVE-2025-21926",
				"category":"self",
				"url":"https://www.openeuler.org/en/security/cve/detail/?cveId=CVE-2025-21926&packageName=kernel"
			},
			{
				"summary":"CVE-2025-21936",
				"category":"self",
				"url":"https://www.openeuler.org/en/security/cve/detail/?cveId=CVE-2025-21936&packageName=kernel"
			},
			{
				"summary":"CVE-2025-21937",
				"category":"self",
				"url":"https://www.openeuler.org/en/security/cve/detail/?cveId=CVE-2025-21937&packageName=kernel"
			},
			{
				"summary":"CVE-2025-21938",
				"category":"self",
				"url":"https://www.openeuler.org/en/security/cve/detail/?cveId=CVE-2025-21938&packageName=kernel"
			},
			{
				"summary":"CVE-2025-22101",
				"category":"self",
				"url":"https://www.openeuler.org/en/security/cve/detail/?cveId=CVE-2025-22101&packageName=kernel"
			},
			{
				"summary":"CVE-2025-22108",
				"category":"self",
				"url":"https://www.openeuler.org/en/security/cve/detail/?cveId=CVE-2025-22108&packageName=kernel"
			},
			{
				"summary":"CVE-2025-37810",
				"category":"self",
				"url":"https://www.openeuler.org/en/security/cve/detail/?cveId=CVE-2025-37810&packageName=kernel"
			},
			{
				"summary":"CVE-2025-38197",
				"category":"self",
				"url":"https://www.openeuler.org/en/security/cve/detail/?cveId=CVE-2025-38197&packageName=kernel"
			},
			{
				"summary":"CVE-2025-38212",
				"category":"self",
				"url":"https://www.openeuler.org/en/security/cve/detail/?cveId=CVE-2025-38212&packageName=kernel"
			},
			{
				"summary":"CVE-2025-38229",
				"category":"self",
				"url":"https://www.openeuler.org/en/security/cve/detail/?cveId=CVE-2025-38229&packageName=kernel"
			},
			{
				"summary":"CVE-2025-38279",
				"category":"self",
				"url":"https://www.openeuler.org/en/security/cve/detail/?cveId=CVE-2025-38279&packageName=kernel"
			},
			{
				"summary":"CVE-2025-38280",
				"category":"self",
				"url":"https://www.openeuler.org/en/security/cve/detail/?cveId=CVE-2025-38280&packageName=kernel"
			},
			{
				"summary":"CVE-2025-38285",
				"category":"self",
				"url":"https://www.openeuler.org/en/security/cve/detail/?cveId=CVE-2025-38285&packageName=kernel"
			},
			{
				"summary":"CVE-2025-38320",
				"category":"self",
				"url":"https://www.openeuler.org/en/security/cve/detail/?cveId=CVE-2025-38320&packageName=kernel"
			},
			{
				"summary":"CVE-2025-38322",
				"category":"self",
				"url":"https://www.openeuler.org/en/security/cve/detail/?cveId=CVE-2025-38322&packageName=kernel"
			},
			{
				"summary":"CVE-2025-38346",
				"category":"self",
				"url":"https://www.openeuler.org/en/security/cve/detail/?cveId=CVE-2025-38346&packageName=kernel"
			},
			{
				"summary":"nvd cve",
				"category":"external",
				"url":"https://nvd.nist.gov/vuln/detail/CVE-2025-21702"
			},
			{
				"summary":"nvd cve",
				"category":"external",
				"url":"https://nvd.nist.gov/vuln/detail/CVE-2025-21703"
			},
			{
				"summary":"nvd cve",
				"category":"external",
				"url":"https://nvd.nist.gov/vuln/detail/CVE-2025-21875"
			},
			{
				"summary":"nvd cve",
				"category":"external",
				"url":"https://nvd.nist.gov/vuln/detail/CVE-2025-21920"
			},
			{
				"summary":"nvd cve",
				"category":"external",
				"url":"https://nvd.nist.gov/vuln/detail/CVE-2025-21926"
			},
			{
				"summary":"nvd cve",
				"category":"external",
				"url":"https://nvd.nist.gov/vuln/detail/CVE-2025-21936"
			},
			{
				"summary":"nvd cve",
				"category":"external",
				"url":"https://nvd.nist.gov/vuln/detail/CVE-2025-21937"
			},
			{
				"summary":"nvd cve",
				"category":"external",
				"url":"https://nvd.nist.gov/vuln/detail/CVE-2025-21938"
			},
			{
				"summary":"nvd cve",
				"category":"external",
				"url":"https://nvd.nist.gov/vuln/detail/CVE-2025-22101"
			},
			{
				"summary":"nvd cve",
				"category":"external",
				"url":"https://nvd.nist.gov/vuln/detail/CVE-2025-22108"
			},
			{
				"summary":"nvd cve",
				"category":"external",
				"url":"https://nvd.nist.gov/vuln/detail/CVE-2025-37810"
			},
			{
				"summary":"nvd cve",
				"category":"external",
				"url":"https://nvd.nist.gov/vuln/detail/CVE-2025-38197"
			},
			{
				"summary":"nvd cve",
				"category":"external",
				"url":"https://nvd.nist.gov/vuln/detail/CVE-2025-38212"
			},
			{
				"summary":"nvd cve",
				"category":"external",
				"url":"https://nvd.nist.gov/vuln/detail/CVE-2025-38229"
			},
			{
				"summary":"nvd cve",
				"category":"external",
				"url":"https://nvd.nist.gov/vuln/detail/CVE-2025-38279"
			},
			{
				"summary":"nvd cve",
				"category":"external",
				"url":"https://nvd.nist.gov/vuln/detail/CVE-2025-38280"
			},
			{
				"summary":"nvd cve",
				"category":"external",
				"url":"https://nvd.nist.gov/vuln/detail/CVE-2025-38285"
			},
			{
				"summary":"nvd cve",
				"category":"external",
				"url":"https://nvd.nist.gov/vuln/detail/CVE-2025-38320"
			},
			{
				"summary":"nvd cve",
				"category":"external",
				"url":"https://nvd.nist.gov/vuln/detail/CVE-2025-38322"
			},
			{
				"summary":"nvd cve",
				"category":"external",
				"url":"https://nvd.nist.gov/vuln/detail/CVE-2025-38346"
			},
			{
				"summary":"openEuler-SA-2025-1874 vex file",
				"category":"self",
				"url":"https://repo.openeuler.org/security/data/csaf/advisories/2025/csaf-openeuler-sa-2025-1874.json"
			}
		],
		"title":"An update for kernel is now available for openEuler-24.03-LTS",
		"tracking":{
			"initial_release_date":"2025-07-18T22:50:45+08:00",
			"revision_history":[
				{
					"date":"2025-07-18T22:50:45+08:00",
					"summary":"Initial",
					"number":"1.0.0"
				}
			],
			"generator":{
				"date":"2025-07-18T22:50:45+08:00",
				"engine":{
					"name":"openEuler CSAF Tool V1.0"
				}
			},
			"current_release_date":"2025-07-18T22:50:45+08:00",
			"id":"openEuler-SA-2025-1874",
			"version":"1.0.0",
			"status":"final"
		}
	},
	"product_tree":{
		"branches":[
			{
				"name":"openEuler",
				"category":"vendor",
				"branches":[
					{
						"name":"openEuler",
						"branches":[
							{
								"product":{
									"product_identification_helper":{
										"cpe":"cpe:/a:openEuler:openEuler:24.03-LTS"
									},
									"product_id":"openEuler-24.03-LTS",
									"name":"openEuler-24.03-LTS"
								},
								"name":"openEuler-24.03-LTS",
								"category":"product_version"
							}
						],
						"category":"product_name"
					},
					{
						"name":"src",
						"branches":[
							{
								"product":{
									"product_identification_helper":{
										"cpe":"cpe:/a:openEuler:openEuler:24.03-LTS"
									},
									"product_id":"kernel-6.6.0-101.0.0.93.oe2403.src.rpm",
									"name":"kernel-6.6.0-101.0.0.93.oe2403.src.rpm"
								},
								"name":"kernel-6.6.0-101.0.0.93.oe2403.src.rpm",
								"category":"product_version"
							}
						],
						"category":"architecture"
					},
					{
						"name":"aarch64",
						"branches":[
							{
								"product":{
									"product_identification_helper":{
										"cpe":"cpe:/a:openEuler:openEuler:24.03-LTS"
									},
									"product_id":"bpftool-6.6.0-101.0.0.93.oe2403.aarch64.rpm",
									"name":"bpftool-6.6.0-101.0.0.93.oe2403.aarch64.rpm"
								},
								"name":"bpftool-6.6.0-101.0.0.93.oe2403.aarch64.rpm",
								"category":"product_version"
							},
							{
								"product":{
									"product_identification_helper":{
										"cpe":"cpe:/a:openEuler:openEuler:24.03-LTS"
									},
									"product_id":"bpftool-debuginfo-6.6.0-101.0.0.93.oe2403.aarch64.rpm",
									"name":"bpftool-debuginfo-6.6.0-101.0.0.93.oe2403.aarch64.rpm"
								},
								"name":"bpftool-debuginfo-6.6.0-101.0.0.93.oe2403.aarch64.rpm",
								"category":"product_version"
							},
							{
								"product":{
									"product_identification_helper":{
										"cpe":"cpe:/a:openEuler:openEuler:24.03-LTS"
									},
									"product_id":"kernel-6.6.0-101.0.0.93.oe2403.aarch64.rpm",
									"name":"kernel-6.6.0-101.0.0.93.oe2403.aarch64.rpm"
								},
								"name":"kernel-6.6.0-101.0.0.93.oe2403.aarch64.rpm",
								"category":"product_version"
							},
							{
								"product":{
									"product_identification_helper":{
										"cpe":"cpe:/a:openEuler:openEuler:24.03-LTS"
									},
									"product_id":"kernel-debuginfo-6.6.0-101.0.0.93.oe2403.aarch64.rpm",
									"name":"kernel-debuginfo-6.6.0-101.0.0.93.oe2403.aarch64.rpm"
								},
								"name":"kernel-debuginfo-6.6.0-101.0.0.93.oe2403.aarch64.rpm",
								"category":"product_version"
							},
							{
								"product":{
									"product_identification_helper":{
										"cpe":"cpe:/a:openEuler:openEuler:24.03-LTS"
									},
									"product_id":"kernel-debugsource-6.6.0-101.0.0.93.oe2403.aarch64.rpm",
									"name":"kernel-debugsource-6.6.0-101.0.0.93.oe2403.aarch64.rpm"
								},
								"name":"kernel-debugsource-6.6.0-101.0.0.93.oe2403.aarch64.rpm",
								"category":"product_version"
							},
							{
								"product":{
									"product_identification_helper":{
										"cpe":"cpe:/a:openEuler:openEuler:24.03-LTS"
									},
									"product_id":"kernel-devel-6.6.0-101.0.0.93.oe2403.aarch64.rpm",
									"name":"kernel-devel-6.6.0-101.0.0.93.oe2403.aarch64.rpm"
								},
								"name":"kernel-devel-6.6.0-101.0.0.93.oe2403.aarch64.rpm",
								"category":"product_version"
							},
							{
								"product":{
									"product_identification_helper":{
										"cpe":"cpe:/a:openEuler:openEuler:24.03-LTS"
									},
									"product_id":"kernel-headers-6.6.0-101.0.0.93.oe2403.aarch64.rpm",
									"name":"kernel-headers-6.6.0-101.0.0.93.oe2403.aarch64.rpm"
								},
								"name":"kernel-headers-6.6.0-101.0.0.93.oe2403.aarch64.rpm",
								"category":"product_version"
							},
							{
								"product":{
									"product_identification_helper":{
										"cpe":"cpe:/a:openEuler:openEuler:24.03-LTS"
									},
									"product_id":"kernel-source-6.6.0-101.0.0.93.oe2403.aarch64.rpm",
									"name":"kernel-source-6.6.0-101.0.0.93.oe2403.aarch64.rpm"
								},
								"name":"kernel-source-6.6.0-101.0.0.93.oe2403.aarch64.rpm",
								"category":"product_version"
							},
							{
								"product":{
									"product_identification_helper":{
										"cpe":"cpe:/a:openEuler:openEuler:24.03-LTS"
									},
									"product_id":"kernel-tools-6.6.0-101.0.0.93.oe2403.aarch64.rpm",
									"name":"kernel-tools-6.6.0-101.0.0.93.oe2403.aarch64.rpm"
								},
								"name":"kernel-tools-6.6.0-101.0.0.93.oe2403.aarch64.rpm",
								"category":"product_version"
							},
							{
								"product":{
									"product_identification_helper":{
										"cpe":"cpe:/a:openEuler:openEuler:24.03-LTS"
									},
									"product_id":"kernel-tools-debuginfo-6.6.0-101.0.0.93.oe2403.aarch64.rpm",
									"name":"kernel-tools-debuginfo-6.6.0-101.0.0.93.oe2403.aarch64.rpm"
								},
								"name":"kernel-tools-debuginfo-6.6.0-101.0.0.93.oe2403.aarch64.rpm",
								"category":"product_version"
							},
							{
								"product":{
									"product_identification_helper":{
										"cpe":"cpe:/a:openEuler:openEuler:24.03-LTS"
									},
									"product_id":"kernel-tools-devel-6.6.0-101.0.0.93.oe2403.aarch64.rpm",
									"name":"kernel-tools-devel-6.6.0-101.0.0.93.oe2403.aarch64.rpm"
								},
								"name":"kernel-tools-devel-6.6.0-101.0.0.93.oe2403.aarch64.rpm",
								"category":"product_version"
							},
							{
								"product":{
									"product_identification_helper":{
										"cpe":"cpe:/a:openEuler:openEuler:24.03-LTS"
									},
									"product_id":"perf-6.6.0-101.0.0.93.oe2403.aarch64.rpm",
									"name":"perf-6.6.0-101.0.0.93.oe2403.aarch64.rpm"
								},
								"name":"perf-6.6.0-101.0.0.93.oe2403.aarch64.rpm",
								"category":"product_version"
							},
							{
								"product":{
									"product_identification_helper":{
										"cpe":"cpe:/a:openEuler:openEuler:24.03-LTS"
									},
									"product_id":"perf-debuginfo-6.6.0-101.0.0.93.oe2403.aarch64.rpm",
									"name":"perf-debuginfo-6.6.0-101.0.0.93.oe2403.aarch64.rpm"
								},
								"name":"perf-debuginfo-6.6.0-101.0.0.93.oe2403.aarch64.rpm",
								"category":"product_version"
							},
							{
								"product":{
									"product_identification_helper":{
										"cpe":"cpe:/a:openEuler:openEuler:24.03-LTS"
									},
									"product_id":"python3-perf-6.6.0-101.0.0.93.oe2403.aarch64.rpm",
									"name":"python3-perf-6.6.0-101.0.0.93.oe2403.aarch64.rpm"
								},
								"name":"python3-perf-6.6.0-101.0.0.93.oe2403.aarch64.rpm",
								"category":"product_version"
							},
							{
								"product":{
									"product_identification_helper":{
										"cpe":"cpe:/a:openEuler:openEuler:24.03-LTS"
									},
									"product_id":"python3-perf-debuginfo-6.6.0-101.0.0.93.oe2403.aarch64.rpm",
									"name":"python3-perf-debuginfo-6.6.0-101.0.0.93.oe2403.aarch64.rpm"
								},
								"name":"python3-perf-debuginfo-6.6.0-101.0.0.93.oe2403.aarch64.rpm",
								"category":"product_version"
							}
						],
						"category":"architecture"
					},
					{
						"name":"x86_64",
						"branches":[
							{
								"product":{
									"product_identification_helper":{
										"cpe":"cpe:/a:openEuler:openEuler:24.03-LTS"
									},
									"product_id":"bpftool-6.6.0-101.0.0.93.oe2403.x86_64.rpm",
									"name":"bpftool-6.6.0-101.0.0.93.oe2403.x86_64.rpm"
								},
								"name":"bpftool-6.6.0-101.0.0.93.oe2403.x86_64.rpm",
								"category":"product_version"
							},
							{
								"product":{
									"product_identification_helper":{
										"cpe":"cpe:/a:openEuler:openEuler:24.03-LTS"
									},
									"product_id":"bpftool-debuginfo-6.6.0-101.0.0.93.oe2403.x86_64.rpm",
									"name":"bpftool-debuginfo-6.6.0-101.0.0.93.oe2403.x86_64.rpm"
								},
								"name":"bpftool-debuginfo-6.6.0-101.0.0.93.oe2403.x86_64.rpm",
								"category":"product_version"
							},
							{
								"product":{
									"product_identification_helper":{
										"cpe":"cpe:/a:openEuler:openEuler:24.03-LTS"
									},
									"product_id":"kernel-6.6.0-101.0.0.93.oe2403.x86_64.rpm",
									"name":"kernel-6.6.0-101.0.0.93.oe2403.x86_64.rpm"
								},
								"name":"kernel-6.6.0-101.0.0.93.oe2403.x86_64.rpm",
								"category":"product_version"
							},
							{
								"product":{
									"product_identification_helper":{
										"cpe":"cpe:/a:openEuler:openEuler:24.03-LTS"
									},
									"product_id":"kernel-debuginfo-6.6.0-101.0.0.93.oe2403.x86_64.rpm",
									"name":"kernel-debuginfo-6.6.0-101.0.0.93.oe2403.x86_64.rpm"
								},
								"name":"kernel-debuginfo-6.6.0-101.0.0.93.oe2403.x86_64.rpm",
								"category":"product_version"
							},
							{
								"product":{
									"product_identification_helper":{
										"cpe":"cpe:/a:openEuler:openEuler:24.03-LTS"
									},
									"product_id":"kernel-debugsource-6.6.0-101.0.0.93.oe2403.x86_64.rpm",
									"name":"kernel-debugsource-6.6.0-101.0.0.93.oe2403.x86_64.rpm"
								},
								"name":"kernel-debugsource-6.6.0-101.0.0.93.oe2403.x86_64.rpm",
								"category":"product_version"
							},
							{
								"product":{
									"product_identification_helper":{
										"cpe":"cpe:/a:openEuler:openEuler:24.03-LTS"
									},
									"product_id":"kernel-devel-6.6.0-101.0.0.93.oe2403.x86_64.rpm",
									"name":"kernel-devel-6.6.0-101.0.0.93.oe2403.x86_64.rpm"
								},
								"name":"kernel-devel-6.6.0-101.0.0.93.oe2403.x86_64.rpm",
								"category":"product_version"
							},
							{
								"product":{
									"product_identification_helper":{
										"cpe":"cpe:/a:openEuler:openEuler:24.03-LTS"
									},
									"product_id":"kernel-headers-6.6.0-101.0.0.93.oe2403.x86_64.rpm",
									"name":"kernel-headers-6.6.0-101.0.0.93.oe2403.x86_64.rpm"
								},
								"name":"kernel-headers-6.6.0-101.0.0.93.oe2403.x86_64.rpm",
								"category":"product_version"
							},
							{
								"product":{
									"product_identification_helper":{
										"cpe":"cpe:/a:openEuler:openEuler:24.03-LTS"
									},
									"product_id":"kernel-source-6.6.0-101.0.0.93.oe2403.x86_64.rpm",
									"name":"kernel-source-6.6.0-101.0.0.93.oe2403.x86_64.rpm"
								},
								"name":"kernel-source-6.6.0-101.0.0.93.oe2403.x86_64.rpm",
								"category":"product_version"
							},
							{
								"product":{
									"product_identification_helper":{
										"cpe":"cpe:/a:openEuler:openEuler:24.03-LTS"
									},
									"product_id":"kernel-tools-6.6.0-101.0.0.93.oe2403.x86_64.rpm",
									"name":"kernel-tools-6.6.0-101.0.0.93.oe2403.x86_64.rpm"
								},
								"name":"kernel-tools-6.6.0-101.0.0.93.oe2403.x86_64.rpm",
								"category":"product_version"
							},
							{
								"product":{
									"product_identification_helper":{
										"cpe":"cpe:/a:openEuler:openEuler:24.03-LTS"
									},
									"product_id":"kernel-tools-debuginfo-6.6.0-101.0.0.93.oe2403.x86_64.rpm",
									"name":"kernel-tools-debuginfo-6.6.0-101.0.0.93.oe2403.x86_64.rpm"
								},
								"name":"kernel-tools-debuginfo-6.6.0-101.0.0.93.oe2403.x86_64.rpm",
								"category":"product_version"
							},
							{
								"product":{
									"product_identification_helper":{
										"cpe":"cpe:/a:openEuler:openEuler:24.03-LTS"
									},
									"product_id":"kernel-tools-devel-6.6.0-101.0.0.93.oe2403.x86_64.rpm",
									"name":"kernel-tools-devel-6.6.0-101.0.0.93.oe2403.x86_64.rpm"
								},
								"name":"kernel-tools-devel-6.6.0-101.0.0.93.oe2403.x86_64.rpm",
								"category":"product_version"
							},
							{
								"product":{
									"product_identification_helper":{
										"cpe":"cpe:/a:openEuler:openEuler:24.03-LTS"
									},
									"product_id":"perf-6.6.0-101.0.0.93.oe2403.x86_64.rpm",
									"name":"perf-6.6.0-101.0.0.93.oe2403.x86_64.rpm"
								},
								"name":"perf-6.6.0-101.0.0.93.oe2403.x86_64.rpm",
								"category":"product_version"
							},
							{
								"product":{
									"product_identification_helper":{
										"cpe":"cpe:/a:openEuler:openEuler:24.03-LTS"
									},
									"product_id":"perf-debuginfo-6.6.0-101.0.0.93.oe2403.x86_64.rpm",
									"name":"perf-debuginfo-6.6.0-101.0.0.93.oe2403.x86_64.rpm"
								},
								"name":"perf-debuginfo-6.6.0-101.0.0.93.oe2403.x86_64.rpm",
								"category":"product_version"
							},
							{
								"product":{
									"product_identification_helper":{
										"cpe":"cpe:/a:openEuler:openEuler:24.03-LTS"
									},
									"product_id":"python3-perf-6.6.0-101.0.0.93.oe2403.x86_64.rpm",
									"name":"python3-perf-6.6.0-101.0.0.93.oe2403.x86_64.rpm"
								},
								"name":"python3-perf-6.6.0-101.0.0.93.oe2403.x86_64.rpm",
								"category":"product_version"
							},
							{
								"product":{
									"product_identification_helper":{
										"cpe":"cpe:/a:openEuler:openEuler:24.03-LTS"
									},
									"product_id":"python3-perf-debuginfo-6.6.0-101.0.0.93.oe2403.x86_64.rpm",
									"name":"python3-perf-debuginfo-6.6.0-101.0.0.93.oe2403.x86_64.rpm"
								},
								"name":"python3-perf-debuginfo-6.6.0-101.0.0.93.oe2403.x86_64.rpm",
								"category":"product_version"
							}
						],
						"category":"architecture"
					}
				]
			}
		],
		"relationships":[
			{
				"relates_to_product_reference":"openEuler-24.03-LTS",
				"product_reference":"kernel-6.6.0-101.0.0.93.oe2403.src.rpm",
				"full_product_name":{
					"product_id":"openEuler-24.03-LTS:kernel-6.6.0-101.0.0.93.oe2403.src",
					"name":"kernel-6.6.0-101.0.0.93.oe2403.src as a component of openEuler-24.03-LTS"
				},
				"category":"default_component_of"
			},
			{
				"relates_to_product_reference":"openEuler-24.03-LTS",
				"product_reference":"bpftool-6.6.0-101.0.0.93.oe2403.aarch64.rpm",
				"full_product_name":{
					"product_id":"openEuler-24.03-LTS:bpftool-6.6.0-101.0.0.93.oe2403.aarch64",
					"name":"bpftool-6.6.0-101.0.0.93.oe2403.aarch64 as a component of openEuler-24.03-LTS"
				},
				"category":"default_component_of"
			},
			{
				"relates_to_product_reference":"openEuler-24.03-LTS",
				"product_reference":"bpftool-debuginfo-6.6.0-101.0.0.93.oe2403.aarch64.rpm",
				"full_product_name":{
					"product_id":"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-101.0.0.93.oe2403.aarch64",
					"name":"bpftool-debuginfo-6.6.0-101.0.0.93.oe2403.aarch64 as a component of openEuler-24.03-LTS"
				},
				"category":"default_component_of"
			},
			{
				"relates_to_product_reference":"openEuler-24.03-LTS",
				"product_reference":"kernel-6.6.0-101.0.0.93.oe2403.aarch64.rpm",
				"full_product_name":{
					"product_id":"openEuler-24.03-LTS:kernel-6.6.0-101.0.0.93.oe2403.aarch64",
					"name":"kernel-6.6.0-101.0.0.93.oe2403.aarch64 as a component of openEuler-24.03-LTS"
				},
				"category":"default_component_of"
			},
			{
				"relates_to_product_reference":"openEuler-24.03-LTS",
				"product_reference":"kernel-debuginfo-6.6.0-101.0.0.93.oe2403.aarch64.rpm",
				"full_product_name":{
					"product_id":"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-101.0.0.93.oe2403.aarch64",
					"name":"kernel-debuginfo-6.6.0-101.0.0.93.oe2403.aarch64 as a component of openEuler-24.03-LTS"
				},
				"category":"default_component_of"
			},
			{
				"relates_to_product_reference":"openEuler-24.03-LTS",
				"product_reference":"kernel-debugsource-6.6.0-101.0.0.93.oe2403.aarch64.rpm",
				"full_product_name":{
					"product_id":"openEuler-24.03-LTS:kernel-debugsource-6.6.0-101.0.0.93.oe2403.aarch64",
					"name":"kernel-debugsource-6.6.0-101.0.0.93.oe2403.aarch64 as a component of openEuler-24.03-LTS"
				},
				"category":"default_component_of"
			},
			{
				"relates_to_product_reference":"openEuler-24.03-LTS",
				"product_reference":"kernel-devel-6.6.0-101.0.0.93.oe2403.aarch64.rpm",
				"full_product_name":{
					"product_id":"openEuler-24.03-LTS:kernel-devel-6.6.0-101.0.0.93.oe2403.aarch64",
					"name":"kernel-devel-6.6.0-101.0.0.93.oe2403.aarch64 as a component of openEuler-24.03-LTS"
				},
				"category":"default_component_of"
			},
			{
				"relates_to_product_reference":"openEuler-24.03-LTS",
				"product_reference":"kernel-headers-6.6.0-101.0.0.93.oe2403.aarch64.rpm",
				"full_product_name":{
					"product_id":"openEuler-24.03-LTS:kernel-headers-6.6.0-101.0.0.93.oe2403.aarch64",
					"name":"kernel-headers-6.6.0-101.0.0.93.oe2403.aarch64 as a component of openEuler-24.03-LTS"
				},
				"category":"default_component_of"
			},
			{
				"relates_to_product_reference":"openEuler-24.03-LTS",
				"product_reference":"kernel-source-6.6.0-101.0.0.93.oe2403.aarch64.rpm",
				"full_product_name":{
					"product_id":"openEuler-24.03-LTS:kernel-source-6.6.0-101.0.0.93.oe2403.aarch64",
					"name":"kernel-source-6.6.0-101.0.0.93.oe2403.aarch64 as a component of openEuler-24.03-LTS"
				},
				"category":"default_component_of"
			},
			{
				"relates_to_product_reference":"openEuler-24.03-LTS",
				"product_reference":"kernel-tools-6.6.0-101.0.0.93.oe2403.aarch64.rpm",
				"full_product_name":{
					"product_id":"openEuler-24.03-LTS:kernel-tools-6.6.0-101.0.0.93.oe2403.aarch64",
					"name":"kernel-tools-6.6.0-101.0.0.93.oe2403.aarch64 as a component of openEuler-24.03-LTS"
				},
				"category":"default_component_of"
			},
			{
				"relates_to_product_reference":"openEuler-24.03-LTS",
				"product_reference":"kernel-tools-debuginfo-6.6.0-101.0.0.93.oe2403.aarch64.rpm",
				"full_product_name":{
					"product_id":"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-101.0.0.93.oe2403.aarch64",
					"name":"kernel-tools-debuginfo-6.6.0-101.0.0.93.oe2403.aarch64 as a component of openEuler-24.03-LTS"
				},
				"category":"default_component_of"
			},
			{
				"relates_to_product_reference":"openEuler-24.03-LTS",
				"product_reference":"kernel-tools-devel-6.6.0-101.0.0.93.oe2403.aarch64.rpm",
				"full_product_name":{
					"product_id":"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-101.0.0.93.oe2403.aarch64",
					"name":"kernel-tools-devel-6.6.0-101.0.0.93.oe2403.aarch64 as a component of openEuler-24.03-LTS"
				},
				"category":"default_component_of"
			},
			{
				"relates_to_product_reference":"openEuler-24.03-LTS",
				"product_reference":"perf-6.6.0-101.0.0.93.oe2403.aarch64.rpm",
				"full_product_name":{
					"product_id":"openEuler-24.03-LTS:perf-6.6.0-101.0.0.93.oe2403.aarch64",
					"name":"perf-6.6.0-101.0.0.93.oe2403.aarch64 as a component of openEuler-24.03-LTS"
				},
				"category":"default_component_of"
			},
			{
				"relates_to_product_reference":"openEuler-24.03-LTS",
				"product_reference":"perf-debuginfo-6.6.0-101.0.0.93.oe2403.aarch64.rpm",
				"full_product_name":{
					"product_id":"openEuler-24.03-LTS:perf-debuginfo-6.6.0-101.0.0.93.oe2403.aarch64",
					"name":"perf-debuginfo-6.6.0-101.0.0.93.oe2403.aarch64 as a component of openEuler-24.03-LTS"
				},
				"category":"default_component_of"
			},
			{
				"relates_to_product_reference":"openEuler-24.03-LTS",
				"product_reference":"python3-perf-6.6.0-101.0.0.93.oe2403.aarch64.rpm",
				"full_product_name":{
					"product_id":"openEuler-24.03-LTS:python3-perf-6.6.0-101.0.0.93.oe2403.aarch64",
					"name":"python3-perf-6.6.0-101.0.0.93.oe2403.aarch64 as a component of openEuler-24.03-LTS"
				},
				"category":"default_component_of"
			},
			{
				"relates_to_product_reference":"openEuler-24.03-LTS",
				"product_reference":"python3-perf-debuginfo-6.6.0-101.0.0.93.oe2403.aarch64.rpm",
				"full_product_name":{
					"product_id":"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-101.0.0.93.oe2403.aarch64",
					"name":"python3-perf-debuginfo-6.6.0-101.0.0.93.oe2403.aarch64 as a component of openEuler-24.03-LTS"
				},
				"category":"default_component_of"
			},
			{
				"relates_to_product_reference":"openEuler-24.03-LTS",
				"product_reference":"bpftool-6.6.0-101.0.0.93.oe2403.x86_64.rpm",
				"full_product_name":{
					"product_id":"openEuler-24.03-LTS:bpftool-6.6.0-101.0.0.93.oe2403.x86_64",
					"name":"bpftool-6.6.0-101.0.0.93.oe2403.x86_64 as a component of openEuler-24.03-LTS"
				},
				"category":"default_component_of"
			},
			{
				"relates_to_product_reference":"openEuler-24.03-LTS",
				"product_reference":"bpftool-debuginfo-6.6.0-101.0.0.93.oe2403.x86_64.rpm",
				"full_product_name":{
					"product_id":"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-101.0.0.93.oe2403.x86_64",
					"name":"bpftool-debuginfo-6.6.0-101.0.0.93.oe2403.x86_64 as a component of openEuler-24.03-LTS"
				},
				"category":"default_component_of"
			},
			{
				"relates_to_product_reference":"openEuler-24.03-LTS",
				"product_reference":"kernel-6.6.0-101.0.0.93.oe2403.x86_64.rpm",
				"full_product_name":{
					"product_id":"openEuler-24.03-LTS:kernel-6.6.0-101.0.0.93.oe2403.x86_64",
					"name":"kernel-6.6.0-101.0.0.93.oe2403.x86_64 as a component of openEuler-24.03-LTS"
				},
				"category":"default_component_of"
			},
			{
				"relates_to_product_reference":"openEuler-24.03-LTS",
				"product_reference":"kernel-debuginfo-6.6.0-101.0.0.93.oe2403.x86_64.rpm",
				"full_product_name":{
					"product_id":"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-101.0.0.93.oe2403.x86_64",
					"name":"kernel-debuginfo-6.6.0-101.0.0.93.oe2403.x86_64 as a component of openEuler-24.03-LTS"
				},
				"category":"default_component_of"
			},
			{
				"relates_to_product_reference":"openEuler-24.03-LTS",
				"product_reference":"kernel-debugsource-6.6.0-101.0.0.93.oe2403.x86_64.rpm",
				"full_product_name":{
					"product_id":"openEuler-24.03-LTS:kernel-debugsource-6.6.0-101.0.0.93.oe2403.x86_64",
					"name":"kernel-debugsource-6.6.0-101.0.0.93.oe2403.x86_64 as a component of openEuler-24.03-LTS"
				},
				"category":"default_component_of"
			},
			{
				"relates_to_product_reference":"openEuler-24.03-LTS",
				"product_reference":"kernel-devel-6.6.0-101.0.0.93.oe2403.x86_64.rpm",
				"full_product_name":{
					"product_id":"openEuler-24.03-LTS:kernel-devel-6.6.0-101.0.0.93.oe2403.x86_64",
					"name":"kernel-devel-6.6.0-101.0.0.93.oe2403.x86_64 as a component of openEuler-24.03-LTS"
				},
				"category":"default_component_of"
			},
			{
				"relates_to_product_reference":"openEuler-24.03-LTS",
				"product_reference":"kernel-headers-6.6.0-101.0.0.93.oe2403.x86_64.rpm",
				"full_product_name":{
					"product_id":"openEuler-24.03-LTS:kernel-headers-6.6.0-101.0.0.93.oe2403.x86_64",
					"name":"kernel-headers-6.6.0-101.0.0.93.oe2403.x86_64 as a component of openEuler-24.03-LTS"
				},
				"category":"default_component_of"
			},
			{
				"relates_to_product_reference":"openEuler-24.03-LTS",
				"product_reference":"kernel-source-6.6.0-101.0.0.93.oe2403.x86_64.rpm",
				"full_product_name":{
					"product_id":"openEuler-24.03-LTS:kernel-source-6.6.0-101.0.0.93.oe2403.x86_64",
					"name":"kernel-source-6.6.0-101.0.0.93.oe2403.x86_64 as a component of openEuler-24.03-LTS"
				},
				"category":"default_component_of"
			},
			{
				"relates_to_product_reference":"openEuler-24.03-LTS",
				"product_reference":"kernel-tools-6.6.0-101.0.0.93.oe2403.x86_64.rpm",
				"full_product_name":{
					"product_id":"openEuler-24.03-LTS:kernel-tools-6.6.0-101.0.0.93.oe2403.x86_64",
					"name":"kernel-tools-6.6.0-101.0.0.93.oe2403.x86_64 as a component of openEuler-24.03-LTS"
				},
				"category":"default_component_of"
			},
			{
				"relates_to_product_reference":"openEuler-24.03-LTS",
				"product_reference":"kernel-tools-debuginfo-6.6.0-101.0.0.93.oe2403.x86_64.rpm",
				"full_product_name":{
					"product_id":"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-101.0.0.93.oe2403.x86_64",
					"name":"kernel-tools-debuginfo-6.6.0-101.0.0.93.oe2403.x86_64 as a component of openEuler-24.03-LTS"
				},
				"category":"default_component_of"
			},
			{
				"relates_to_product_reference":"openEuler-24.03-LTS",
				"product_reference":"kernel-tools-devel-6.6.0-101.0.0.93.oe2403.x86_64.rpm",
				"full_product_name":{
					"product_id":"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-101.0.0.93.oe2403.x86_64",
					"name":"kernel-tools-devel-6.6.0-101.0.0.93.oe2403.x86_64 as a component of openEuler-24.03-LTS"
				},
				"category":"default_component_of"
			},
			{
				"relates_to_product_reference":"openEuler-24.03-LTS",
				"product_reference":"perf-6.6.0-101.0.0.93.oe2403.x86_64.rpm",
				"full_product_name":{
					"product_id":"openEuler-24.03-LTS:perf-6.6.0-101.0.0.93.oe2403.x86_64",
					"name":"perf-6.6.0-101.0.0.93.oe2403.x86_64 as a component of openEuler-24.03-LTS"
				},
				"category":"default_component_of"
			},
			{
				"relates_to_product_reference":"openEuler-24.03-LTS",
				"product_reference":"perf-debuginfo-6.6.0-101.0.0.93.oe2403.x86_64.rpm",
				"full_product_name":{
					"product_id":"openEuler-24.03-LTS:perf-debuginfo-6.6.0-101.0.0.93.oe2403.x86_64",
					"name":"perf-debuginfo-6.6.0-101.0.0.93.oe2403.x86_64 as a component of openEuler-24.03-LTS"
				},
				"category":"default_component_of"
			},
			{
				"relates_to_product_reference":"openEuler-24.03-LTS",
				"product_reference":"python3-perf-6.6.0-101.0.0.93.oe2403.x86_64.rpm",
				"full_product_name":{
					"product_id":"openEuler-24.03-LTS:python3-perf-6.6.0-101.0.0.93.oe2403.x86_64",
					"name":"python3-perf-6.6.0-101.0.0.93.oe2403.x86_64 as a component of openEuler-24.03-LTS"
				},
				"category":"default_component_of"
			},
			{
				"relates_to_product_reference":"openEuler-24.03-LTS",
				"product_reference":"python3-perf-debuginfo-6.6.0-101.0.0.93.oe2403.x86_64.rpm",
				"full_product_name":{
					"product_id":"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-101.0.0.93.oe2403.x86_64",
					"name":"python3-perf-debuginfo-6.6.0-101.0.0.93.oe2403.x86_64 as a component of openEuler-24.03-LTS"
				},
				"category":"default_component_of"
			}
		]
	},
	"vulnerabilities":[
		{
			"cve":"CVE-2025-21702",
			"notes":[
				{
					"text":"In the Linux kernel, the following vulnerability has been resolved:\n\npfifo_tail_enqueue: Drop new packet when sch->limit == 0\n\nExpected behaviour:\nIn case we reach scheduler's limit, pfifo_tail_enqueue() will drop a\npacket in scheduler's queue and decrease scheduler's qlen by one.\nThen, pfifo_tail_enqueue() enqueue new packet and increase\nscheduler's qlen by one. Finally, pfifo_tail_enqueue() return\n`NET_XMIT_CN` status code.\n\nWeird behaviour:\nIn case we set `sch->limit == 0` and trigger pfifo_tail_enqueue() on a\nscheduler that has no packet, the 'drop a packet' step will do nothing.\nThis means the scheduler's qlen still has value equal 0.\nThen, we continue to enqueue new packet and increase scheduler's qlen by\none. In summary, we can leverage pfifo_tail_enqueue() to increase qlen by\none and return `NET_XMIT_CN` status code.\n\nThe problem is:\nLet's say we have two qdiscs: Qdisc_A and Qdisc_B.\n - Qdisc_A's type must have '->graft()' function to create parent/child relationship.\n   Let's say Qdisc_A's type is `hfsc`. Enqueue packet to this qdisc will trigger `hfsc_enqueue`.\n - Qdisc_B's type is pfifo_head_drop. Enqueue packet to this qdisc will trigger `pfifo_tail_enqueue`.\n - Qdisc_B is configured to have `sch->limit == 0`.\n - Qdisc_A is configured to route the enqueued's packet to Qdisc_B.\n\nEnqueue packet through Qdisc_A will lead to:\n - hfsc_enqueue(Qdisc_A) -> pfifo_tail_enqueue(Qdisc_B)\n - Qdisc_B->q.qlen += 1\n - pfifo_tail_enqueue() return `NET_XMIT_CN`\n - hfsc_enqueue() check for `NET_XMIT_SUCCESS` and see `NET_XMIT_CN` => hfsc_enqueue() don't increase qlen of Qdisc_A.\n\nThe whole process lead to a situation where Qdisc_A->q.qlen == 0 and Qdisc_B->q.qlen == 1.\nReplace 'hfsc' with other type (for example: 'drr') still lead to the same problem.\nThis violate the design where parent's qlen should equal to the sum of its childrens'qlen.\n\nBug impact: This issue can be used for user->kernel privilege escalation when it is reachable.",
					"category":"description",
					"title":"Vulnerability Description"
				}
			],
			"product_status":{
				"fixed":[
					"openEuler-24.03-LTS:kernel-6.6.0-101.0.0.93.oe2403.src",
					"openEuler-24.03-LTS:bpftool-6.6.0-101.0.0.93.oe2403.aarch64",
					"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-101.0.0.93.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-6.6.0-101.0.0.93.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-101.0.0.93.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-debugsource-6.6.0-101.0.0.93.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-devel-6.6.0-101.0.0.93.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-headers-6.6.0-101.0.0.93.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-source-6.6.0-101.0.0.93.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-tools-6.6.0-101.0.0.93.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-101.0.0.93.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-101.0.0.93.oe2403.aarch64",
					"openEuler-24.03-LTS:perf-6.6.0-101.0.0.93.oe2403.aarch64",
					"openEuler-24.03-LTS:perf-debuginfo-6.6.0-101.0.0.93.oe2403.aarch64",
					"openEuler-24.03-LTS:python3-perf-6.6.0-101.0.0.93.oe2403.aarch64",
					"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-101.0.0.93.oe2403.aarch64",
					"openEuler-24.03-LTS:bpftool-6.6.0-101.0.0.93.oe2403.x86_64",
					"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-101.0.0.93.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-6.6.0-101.0.0.93.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-101.0.0.93.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-debugsource-6.6.0-101.0.0.93.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-devel-6.6.0-101.0.0.93.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-headers-6.6.0-101.0.0.93.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-source-6.6.0-101.0.0.93.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-tools-6.6.0-101.0.0.93.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-101.0.0.93.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-101.0.0.93.oe2403.x86_64",
					"openEuler-24.03-LTS:perf-6.6.0-101.0.0.93.oe2403.x86_64",
					"openEuler-24.03-LTS:perf-debuginfo-6.6.0-101.0.0.93.oe2403.x86_64",
					"openEuler-24.03-LTS:python3-perf-6.6.0-101.0.0.93.oe2403.x86_64",
					"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-101.0.0.93.oe2403.x86_64"
				]
			},
			"remediations":[
				{
					"product_ids":[
						"openEuler-24.03-LTS:kernel-6.6.0-101.0.0.93.oe2403.src",
						"openEuler-24.03-LTS:bpftool-6.6.0-101.0.0.93.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-101.0.0.93.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-6.6.0-101.0.0.93.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-101.0.0.93.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-101.0.0.93.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-101.0.0.93.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-101.0.0.93.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-101.0.0.93.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-101.0.0.93.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-101.0.0.93.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-101.0.0.93.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-6.6.0-101.0.0.93.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-101.0.0.93.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-101.0.0.93.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-101.0.0.93.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-6.6.0-101.0.0.93.oe2403.x86_64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-101.0.0.93.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-6.6.0-101.0.0.93.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-101.0.0.93.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-101.0.0.93.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-101.0.0.93.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-101.0.0.93.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-101.0.0.93.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-101.0.0.93.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-101.0.0.93.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-101.0.0.93.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-6.6.0-101.0.0.93.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-101.0.0.93.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-101.0.0.93.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-101.0.0.93.oe2403.x86_64"
					],
					"details":"kernel security update",
					"category":"vendor_fix",
					"url":"https://www.openeuler.org/zh/security/security-bulletins/detail/?id=openEuler-SA-2025-1874"
				}
			],
			"scores":[
				{
					"cvss_v3":{
						"baseSeverity":"HIGH",
						"baseScore":7.8,
						"vectorString":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
						"version":"3.1"
					},
					"products":[
						"openEuler-24.03-LTS:kernel-6.6.0-101.0.0.93.oe2403.src",
						"openEuler-24.03-LTS:bpftool-6.6.0-101.0.0.93.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-101.0.0.93.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-6.6.0-101.0.0.93.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-101.0.0.93.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-101.0.0.93.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-101.0.0.93.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-101.0.0.93.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-101.0.0.93.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-101.0.0.93.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-101.0.0.93.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-101.0.0.93.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-6.6.0-101.0.0.93.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-101.0.0.93.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-101.0.0.93.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-101.0.0.93.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-6.6.0-101.0.0.93.oe2403.x86_64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-101.0.0.93.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-6.6.0-101.0.0.93.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-101.0.0.93.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-101.0.0.93.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-101.0.0.93.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-101.0.0.93.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-101.0.0.93.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-101.0.0.93.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-101.0.0.93.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-101.0.0.93.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-6.6.0-101.0.0.93.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-101.0.0.93.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-101.0.0.93.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-101.0.0.93.oe2403.x86_64"
					]
				}
			],
			"threats":[
				{
					"details":"High",
					"category":"impact"
				}
			],
			"title":"CVE-2025-21702"
		},
		{
			"cve":"CVE-2025-21703",
			"notes":[
				{
					"text":"In the Linux kernel, the following vulnerability has been resolved:\n\nnetem: Update sch->q.qlen before qdisc_tree_reduce_backlog()\n\nqdisc_tree_reduce_backlog() notifies parent qdisc only if child\nqdisc becomes empty, therefore we need to reduce the backlog of the\nchild qdisc before calling it. Otherwise it would miss the opportunity\nto call cops->qlen_notify(), in the case of DRR, it resulted in UAF\nsince DRR uses ->qlen_notify() to maintain its active list.",
					"category":"description",
					"title":"Vulnerability Description"
				}
			],
			"product_status":{
				"fixed":[
					"openEuler-24.03-LTS:kernel-6.6.0-101.0.0.93.oe2403.src",
					"openEuler-24.03-LTS:bpftool-6.6.0-101.0.0.93.oe2403.aarch64",
					"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-101.0.0.93.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-6.6.0-101.0.0.93.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-101.0.0.93.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-debugsource-6.6.0-101.0.0.93.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-devel-6.6.0-101.0.0.93.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-headers-6.6.0-101.0.0.93.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-source-6.6.0-101.0.0.93.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-tools-6.6.0-101.0.0.93.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-101.0.0.93.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-101.0.0.93.oe2403.aarch64",
					"openEuler-24.03-LTS:perf-6.6.0-101.0.0.93.oe2403.aarch64",
					"openEuler-24.03-LTS:perf-debuginfo-6.6.0-101.0.0.93.oe2403.aarch64",
					"openEuler-24.03-LTS:python3-perf-6.6.0-101.0.0.93.oe2403.aarch64",
					"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-101.0.0.93.oe2403.aarch64",
					"openEuler-24.03-LTS:bpftool-6.6.0-101.0.0.93.oe2403.x86_64",
					"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-101.0.0.93.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-6.6.0-101.0.0.93.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-101.0.0.93.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-debugsource-6.6.0-101.0.0.93.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-devel-6.6.0-101.0.0.93.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-headers-6.6.0-101.0.0.93.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-source-6.6.0-101.0.0.93.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-tools-6.6.0-101.0.0.93.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-101.0.0.93.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-101.0.0.93.oe2403.x86_64",
					"openEuler-24.03-LTS:perf-6.6.0-101.0.0.93.oe2403.x86_64",
					"openEuler-24.03-LTS:perf-debuginfo-6.6.0-101.0.0.93.oe2403.x86_64",
					"openEuler-24.03-LTS:python3-perf-6.6.0-101.0.0.93.oe2403.x86_64",
					"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-101.0.0.93.oe2403.x86_64"
				]
			},
			"remediations":[
				{
					"product_ids":[
						"openEuler-24.03-LTS:kernel-6.6.0-101.0.0.93.oe2403.src",
						"openEuler-24.03-LTS:bpftool-6.6.0-101.0.0.93.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-101.0.0.93.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-6.6.0-101.0.0.93.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-101.0.0.93.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-101.0.0.93.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-101.0.0.93.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-101.0.0.93.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-101.0.0.93.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-101.0.0.93.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-101.0.0.93.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-101.0.0.93.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-6.6.0-101.0.0.93.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-101.0.0.93.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-101.0.0.93.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-101.0.0.93.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-6.6.0-101.0.0.93.oe2403.x86_64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-101.0.0.93.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-6.6.0-101.0.0.93.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-101.0.0.93.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-101.0.0.93.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-101.0.0.93.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-101.0.0.93.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-101.0.0.93.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-101.0.0.93.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-101.0.0.93.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-101.0.0.93.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-6.6.0-101.0.0.93.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-101.0.0.93.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-101.0.0.93.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-101.0.0.93.oe2403.x86_64"
					],
					"details":"kernel security update",
					"category":"vendor_fix",
					"url":"https://www.openeuler.org/zh/security/security-bulletins/detail/?id=openEuler-SA-2025-1874"
				}
			],
			"scores":[
				{
					"cvss_v3":{
						"baseSeverity":"HIGH",
						"baseScore":7.8,
						"vectorString":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
						"version":"3.1"
					},
					"products":[
						"openEuler-24.03-LTS:kernel-6.6.0-101.0.0.93.oe2403.src",
						"openEuler-24.03-LTS:bpftool-6.6.0-101.0.0.93.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-101.0.0.93.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-6.6.0-101.0.0.93.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-101.0.0.93.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-101.0.0.93.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-101.0.0.93.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-101.0.0.93.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-101.0.0.93.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-101.0.0.93.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-101.0.0.93.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-101.0.0.93.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-6.6.0-101.0.0.93.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-101.0.0.93.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-101.0.0.93.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-101.0.0.93.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-6.6.0-101.0.0.93.oe2403.x86_64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-101.0.0.93.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-6.6.0-101.0.0.93.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-101.0.0.93.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-101.0.0.93.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-101.0.0.93.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-101.0.0.93.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-101.0.0.93.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-101.0.0.93.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-101.0.0.93.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-101.0.0.93.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-6.6.0-101.0.0.93.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-101.0.0.93.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-101.0.0.93.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-101.0.0.93.oe2403.x86_64"
					]
				}
			],
			"threats":[
				{
					"details":"High",
					"category":"impact"
				}
			],
			"title":"CVE-2025-21703"
		},
		{
			"cve":"CVE-2025-21875",
			"notes":[
				{
					"text":"In the Linux kernel, the following vulnerability has been resolved:\n\nmptcp: always handle address removal under msk socket lock\n\nSyzkaller reported a lockdep splat in the PM control path:\n\n  WARNING: CPU: 0 PID: 6693 at ./include/net/sock.h:1711 sock_owned_by_me include/net/sock.h:1711 [inline]\n  WARNING: CPU: 0 PID: 6693 at ./include/net/sock.h:1711 msk_owned_by_me net/mptcp/protocol.h:363 [inline]\n  WARNING: CPU: 0 PID: 6693 at ./include/net/sock.h:1711 mptcp_pm_nl_addr_send_ack+0x57c/0x610 net/mptcp/pm_netlink.c:788\n  Modules linked in:\n  CPU: 0 UID: 0 PID: 6693 Comm: syz.0.205 Not tainted 6.14.0-rc2-syzkaller-00303-gad1b832bf1cf #0\n  Hardware name: Google Compute Engine/Google Compute Engine, BIOS Google 12/27/2024\n  RIP: 0010:sock_owned_by_me include/net/sock.h:1711 [inline]\n  RIP: 0010:msk_owned_by_me net/mptcp/protocol.h:363 [inline]\n  RIP: 0010:mptcp_pm_nl_addr_send_ack+0x57c/0x610 net/mptcp/pm_netlink.c:788\n  Code: 5b 41 5c 41 5d 41 5e 41 5f 5d c3 cc cc cc cc e8 ca 7b d3 f5 eb b9 e8 c3 7b d3 f5 90 0f 0b 90 e9 dd fb ff ff e8 b5 7b d3 f5 90 <0f> 0b 90 e9 3e fb ff ff 44 89 f1 80 e1 07 38 c1 0f 8c eb fb ff ff\n  RSP: 0000:ffffc900034f6f60 EFLAGS: 00010283\n  RAX: ffffffff8bee3c2b RBX: 0000000000000001 RCX: 0000000000080000\n  RDX: ffffc90004d42000 RSI: 000000000000a407 RDI: 000000000000a408\n  RBP: ffffc900034f7030 R08: ffffffff8bee37f6 R09: 0100000000000000\n  R10: dffffc0000000000 R11: ffffed100bcc62e4 R12: ffff88805e6316e0\n  R13: ffff88805e630c00 R14: dffffc0000000000 R15: ffff88805e630c00\n  FS:  00007f7e9a7e96c0(0000) GS:ffff8880b8600000(0000) knlGS:0000000000000000\n  CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033\n  CR2: 0000001b2fd18ff8 CR3: 0000000032c24000 CR4: 00000000003526f0\n  DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000\n  DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400\n  Call Trace:\n   <TASK>\n   mptcp_pm_remove_addr+0x103/0x1d0 net/mptcp/pm.c:59\n   mptcp_pm_remove_anno_addr+0x1f4/0x2f0 net/mptcp/pm_netlink.c:1486\n   mptcp_nl_remove_subflow_and_signal_addr net/mptcp/pm_netlink.c:1518 [inline]\n   mptcp_pm_nl_del_addr_doit+0x118d/0x1af0 net/mptcp/pm_netlink.c:1629\n   genl_family_rcv_msg_doit net/netlink/genetlink.c:1115 [inline]\n   genl_family_rcv_msg net/netlink/genetlink.c:1195 [inline]\n   genl_rcv_msg+0xb1f/0xec0 net/netlink/genetlink.c:1210\n   netlink_rcv_skb+0x206/0x480 net/netlink/af_netlink.c:2543\n   genl_rcv+0x28/0x40 net/netlink/genetlink.c:1219\n   netlink_unicast_kernel net/netlink/af_netlink.c:1322 [inline]\n   netlink_unicast+0x7f6/0x990 net/netlink/af_netlink.c:1348\n   netlink_sendmsg+0x8de/0xcb0 net/netlink/af_netlink.c:1892\n   sock_sendmsg_nosec net/socket.c:718 [inline]\n   __sock_sendmsg+0x221/0x270 net/socket.c:733\n   ____sys_sendmsg+0x53a/0x860 net/socket.c:2573\n   ___sys_sendmsg net/socket.c:2627 [inline]\n   __sys_sendmsg+0x269/0x350 net/socket.c:2659\n   do_syscall_x64 arch/x86/entry/common.c:52 [inline]\n   do_syscall_64+0xf3/0x230 arch/x86/entry/common.c:83\n   entry_SYSCALL_64_after_hwframe+0x77/0x7f\n  RIP: 0033:0x7f7e9998cde9\n  Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48\n  RSP: 002b:00007f7e9a7e9038 EFLAGS: 00000246 ORIG_RAX: 000000000000002e\n  RAX: ffffffffffffffda RBX: 00007f7e99ba5fa0 RCX: 00007f7e9998cde9\n  RDX: 000000002000c094 RSI: 0000400000000000 RDI: 0000000000000007\n  RBP: 00007f7e99a0e2a0 R08: 0000000000000000 R09: 0000000000000000\n  R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000\n  R13: 0000000000000000 R14: 00007f7e99ba5fa0 R15: 00007fff49231088\n\nIndeed the PM can try to send a RM_ADDR over a msk without acquiring\nfirst the msk socket lock.\n\nThe bugged code-path comes from an early optimization: when there\nare no subflows, the PM should (usually) not send RM_ADDR\nnotifications.\n\nThe above statement is incorrect, as without locks another process\ncould concur\n---truncated---",
					"category":"description",
					"title":"Vulnerability Description"
				}
			],
			"product_status":{
				"fixed":[
					"openEuler-24.03-LTS:kernel-6.6.0-101.0.0.93.oe2403.src",
					"openEuler-24.03-LTS:bpftool-6.6.0-101.0.0.93.oe2403.aarch64",
					"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-101.0.0.93.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-6.6.0-101.0.0.93.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-101.0.0.93.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-debugsource-6.6.0-101.0.0.93.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-devel-6.6.0-101.0.0.93.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-headers-6.6.0-101.0.0.93.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-source-6.6.0-101.0.0.93.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-tools-6.6.0-101.0.0.93.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-101.0.0.93.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-101.0.0.93.oe2403.aarch64",
					"openEuler-24.03-LTS:perf-6.6.0-101.0.0.93.oe2403.aarch64",
					"openEuler-24.03-LTS:perf-debuginfo-6.6.0-101.0.0.93.oe2403.aarch64",
					"openEuler-24.03-LTS:python3-perf-6.6.0-101.0.0.93.oe2403.aarch64",
					"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-101.0.0.93.oe2403.aarch64",
					"openEuler-24.03-LTS:bpftool-6.6.0-101.0.0.93.oe2403.x86_64",
					"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-101.0.0.93.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-6.6.0-101.0.0.93.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-101.0.0.93.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-debugsource-6.6.0-101.0.0.93.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-devel-6.6.0-101.0.0.93.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-headers-6.6.0-101.0.0.93.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-source-6.6.0-101.0.0.93.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-tools-6.6.0-101.0.0.93.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-101.0.0.93.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-101.0.0.93.oe2403.x86_64",
					"openEuler-24.03-LTS:perf-6.6.0-101.0.0.93.oe2403.x86_64",
					"openEuler-24.03-LTS:perf-debuginfo-6.6.0-101.0.0.93.oe2403.x86_64",
					"openEuler-24.03-LTS:python3-perf-6.6.0-101.0.0.93.oe2403.x86_64",
					"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-101.0.0.93.oe2403.x86_64"
				]
			},
			"remediations":[
				{
					"product_ids":[
						"openEuler-24.03-LTS:kernel-6.6.0-101.0.0.93.oe2403.src",
						"openEuler-24.03-LTS:bpftool-6.6.0-101.0.0.93.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-101.0.0.93.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-6.6.0-101.0.0.93.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-101.0.0.93.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-101.0.0.93.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-101.0.0.93.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-101.0.0.93.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-101.0.0.93.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-101.0.0.93.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-101.0.0.93.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-101.0.0.93.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-6.6.0-101.0.0.93.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-101.0.0.93.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-101.0.0.93.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-101.0.0.93.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-6.6.0-101.0.0.93.oe2403.x86_64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-101.0.0.93.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-6.6.0-101.0.0.93.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-101.0.0.93.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-101.0.0.93.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-101.0.0.93.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-101.0.0.93.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-101.0.0.93.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-101.0.0.93.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-101.0.0.93.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-101.0.0.93.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-6.6.0-101.0.0.93.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-101.0.0.93.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-101.0.0.93.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-101.0.0.93.oe2403.x86_64"
					],
					"details":"kernel security update",
					"category":"vendor_fix",
					"url":"https://www.openeuler.org/zh/security/security-bulletins/detail/?id=openEuler-SA-2025-1874"
				}
			],
			"scores":[
				{
					"cvss_v3":{
						"baseSeverity":"MEDIUM",
						"baseScore":5.5,
						"vectorString":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
						"version":"3.1"
					},
					"products":[
						"openEuler-24.03-LTS:kernel-6.6.0-101.0.0.93.oe2403.src",
						"openEuler-24.03-LTS:bpftool-6.6.0-101.0.0.93.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-101.0.0.93.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-6.6.0-101.0.0.93.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-101.0.0.93.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-101.0.0.93.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-101.0.0.93.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-101.0.0.93.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-101.0.0.93.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-101.0.0.93.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-101.0.0.93.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-101.0.0.93.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-6.6.0-101.0.0.93.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-101.0.0.93.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-101.0.0.93.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-101.0.0.93.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-6.6.0-101.0.0.93.oe2403.x86_64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-101.0.0.93.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-6.6.0-101.0.0.93.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-101.0.0.93.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-101.0.0.93.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-101.0.0.93.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-101.0.0.93.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-101.0.0.93.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-101.0.0.93.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-101.0.0.93.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-101.0.0.93.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-6.6.0-101.0.0.93.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-101.0.0.93.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-101.0.0.93.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-101.0.0.93.oe2403.x86_64"
					]
				}
			],
			"threats":[
				{
					"details":"Medium",
					"category":"impact"
				}
			],
			"title":"CVE-2025-21875"
		},
		{
			"cve":"CVE-2025-21920",
			"notes":[
				{
					"text":"In the Linux kernel, the following vulnerability has been resolved:\n\nvlan: enforce underlying device type\n\nCurrently, VLAN devices can be created on top of non-ethernet devices.\n\nBesides the fact that it doesn't make much sense, this also causes a\nbug which leaks the address of a kernel function to usermode.\n\nWhen creating a VLAN device, we initialize GARP (garp_init_applicant)\nand MRP (mrp_init_applicant) for the underlying device.\n\nAs part of the initialization process, we add the multicast address of\neach applicant to the underlying device, by calling dev_mc_add.\n\n__dev_mc_add uses dev->addr_len to determine the length of the new\nmulticast address.\n\nThis causes an out-of-bounds read if dev->addr_len is greater than 6,\nsince the multicast addresses provided by GARP and MRP are only 6\nbytes long.\n\nThis behaviour can be reproduced using the following commands:\n\nip tunnel add gretest mode ip6gre local ::1 remote ::2 dev lo\nip l set up dev gretest\nip link add link gretest name vlantest type vlan id 100\n\nThen, the following command will display the address of garp_pdu_rcv:\n\nip maddr show | grep 01:80:c2:00:00:21\n\nFix the bug by enforcing the type of the underlying device during VLAN\ndevice initialization.",
					"category":"description",
					"title":"Vulnerability Description"
				}
			],
			"product_status":{
				"fixed":[
					"openEuler-24.03-LTS:kernel-6.6.0-101.0.0.93.oe2403.src",
					"openEuler-24.03-LTS:bpftool-6.6.0-101.0.0.93.oe2403.aarch64",
					"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-101.0.0.93.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-6.6.0-101.0.0.93.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-101.0.0.93.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-debugsource-6.6.0-101.0.0.93.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-devel-6.6.0-101.0.0.93.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-headers-6.6.0-101.0.0.93.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-source-6.6.0-101.0.0.93.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-tools-6.6.0-101.0.0.93.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-101.0.0.93.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-101.0.0.93.oe2403.aarch64",
					"openEuler-24.03-LTS:perf-6.6.0-101.0.0.93.oe2403.aarch64",
					"openEuler-24.03-LTS:perf-debuginfo-6.6.0-101.0.0.93.oe2403.aarch64",
					"openEuler-24.03-LTS:python3-perf-6.6.0-101.0.0.93.oe2403.aarch64",
					"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-101.0.0.93.oe2403.aarch64",
					"openEuler-24.03-LTS:bpftool-6.6.0-101.0.0.93.oe2403.x86_64",
					"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-101.0.0.93.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-6.6.0-101.0.0.93.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-101.0.0.93.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-debugsource-6.6.0-101.0.0.93.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-devel-6.6.0-101.0.0.93.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-headers-6.6.0-101.0.0.93.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-source-6.6.0-101.0.0.93.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-tools-6.6.0-101.0.0.93.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-101.0.0.93.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-101.0.0.93.oe2403.x86_64",
					"openEuler-24.03-LTS:perf-6.6.0-101.0.0.93.oe2403.x86_64",
					"openEuler-24.03-LTS:perf-debuginfo-6.6.0-101.0.0.93.oe2403.x86_64",
					"openEuler-24.03-LTS:python3-perf-6.6.0-101.0.0.93.oe2403.x86_64",
					"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-101.0.0.93.oe2403.x86_64"
				]
			},
			"remediations":[
				{
					"product_ids":[
						"openEuler-24.03-LTS:kernel-6.6.0-101.0.0.93.oe2403.src",
						"openEuler-24.03-LTS:bpftool-6.6.0-101.0.0.93.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-101.0.0.93.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-6.6.0-101.0.0.93.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-101.0.0.93.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-101.0.0.93.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-101.0.0.93.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-101.0.0.93.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-101.0.0.93.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-101.0.0.93.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-101.0.0.93.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-101.0.0.93.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-6.6.0-101.0.0.93.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-101.0.0.93.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-101.0.0.93.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-101.0.0.93.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-6.6.0-101.0.0.93.oe2403.x86_64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-101.0.0.93.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-6.6.0-101.0.0.93.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-101.0.0.93.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-101.0.0.93.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-101.0.0.93.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-101.0.0.93.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-101.0.0.93.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-101.0.0.93.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-101.0.0.93.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-101.0.0.93.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-6.6.0-101.0.0.93.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-101.0.0.93.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-101.0.0.93.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-101.0.0.93.oe2403.x86_64"
					],
					"details":"kernel security update",
					"category":"vendor_fix",
					"url":"https://www.openeuler.org/zh/security/security-bulletins/detail/?id=openEuler-SA-2025-1874"
				}
			],
			"scores":[
				{
					"cvss_v3":{
						"baseSeverity":"LOW",
						"baseScore":3.9,
						"vectorString":"CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:L/I:L/A:L",
						"version":"3.1"
					},
					"products":[
						"openEuler-24.03-LTS:kernel-6.6.0-101.0.0.93.oe2403.src",
						"openEuler-24.03-LTS:bpftool-6.6.0-101.0.0.93.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-101.0.0.93.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-6.6.0-101.0.0.93.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-101.0.0.93.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-101.0.0.93.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-101.0.0.93.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-101.0.0.93.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-101.0.0.93.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-101.0.0.93.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-101.0.0.93.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-101.0.0.93.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-6.6.0-101.0.0.93.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-101.0.0.93.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-101.0.0.93.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-101.0.0.93.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-6.6.0-101.0.0.93.oe2403.x86_64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-101.0.0.93.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-6.6.0-101.0.0.93.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-101.0.0.93.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-101.0.0.93.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-101.0.0.93.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-101.0.0.93.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-101.0.0.93.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-101.0.0.93.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-101.0.0.93.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-101.0.0.93.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-6.6.0-101.0.0.93.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-101.0.0.93.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-101.0.0.93.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-101.0.0.93.oe2403.x86_64"
					]
				}
			],
			"threats":[
				{
					"details":"Low",
					"category":"impact"
				}
			],
			"title":"CVE-2025-21920"
		},
		{
			"cve":"CVE-2025-21926",
			"notes":[
				{
					"text":"In the Linux kernel, the following vulnerability has been resolved:\n\nnet: gso: fix ownership in __udp_gso_segment\n\nIn __udp_gso_segment the skb destructor is removed before segmenting the\nskb but the socket reference is kept as-is. This is an issue if the\noriginal skb is later orphaned as we can hit the following bug:\n\n  kernel BUG at ./include/linux/skbuff.h:3312!  (skb_orphan)\n  RIP: 0010:ip_rcv_core+0x8b2/0xca0\n  Call Trace:\n   ip_rcv+0xab/0x6e0\n   __netif_receive_skb_one_core+0x168/0x1b0\n   process_backlog+0x384/0x1100\n   __napi_poll.constprop.0+0xa1/0x370\n   net_rx_action+0x925/0xe50\n\nThe above can happen following a sequence of events when using\nOpenVSwitch, when an OVS_ACTION_ATTR_USERSPACE action precedes an\nOVS_ACTION_ATTR_OUTPUT action:\n\n1. OVS_ACTION_ATTR_USERSPACE is handled (in do_execute_actions): the skb\n   goes through queue_gso_packets and then __udp_gso_segment, where its\n   destructor is removed.\n2. The segments' data are copied and sent to userspace.\n3. OVS_ACTION_ATTR_OUTPUT is handled (in do_execute_actions) and the\n   same original skb is sent to its path.\n4. If it later hits skb_orphan, we hit the bug.\n\nFix this by also removing the reference to the socket in\n__udp_gso_segment.",
					"category":"description",
					"title":"Vulnerability Description"
				}
			],
			"product_status":{
				"fixed":[
					"openEuler-24.03-LTS:kernel-6.6.0-101.0.0.93.oe2403.src",
					"openEuler-24.03-LTS:bpftool-6.6.0-101.0.0.93.oe2403.aarch64",
					"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-101.0.0.93.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-6.6.0-101.0.0.93.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-101.0.0.93.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-debugsource-6.6.0-101.0.0.93.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-devel-6.6.0-101.0.0.93.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-headers-6.6.0-101.0.0.93.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-source-6.6.0-101.0.0.93.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-tools-6.6.0-101.0.0.93.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-101.0.0.93.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-101.0.0.93.oe2403.aarch64",
					"openEuler-24.03-LTS:perf-6.6.0-101.0.0.93.oe2403.aarch64",
					"openEuler-24.03-LTS:perf-debuginfo-6.6.0-101.0.0.93.oe2403.aarch64",
					"openEuler-24.03-LTS:python3-perf-6.6.0-101.0.0.93.oe2403.aarch64",
					"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-101.0.0.93.oe2403.aarch64",
					"openEuler-24.03-LTS:bpftool-6.6.0-101.0.0.93.oe2403.x86_64",
					"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-101.0.0.93.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-6.6.0-101.0.0.93.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-101.0.0.93.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-debugsource-6.6.0-101.0.0.93.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-devel-6.6.0-101.0.0.93.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-headers-6.6.0-101.0.0.93.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-source-6.6.0-101.0.0.93.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-tools-6.6.0-101.0.0.93.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-101.0.0.93.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-101.0.0.93.oe2403.x86_64",
					"openEuler-24.03-LTS:perf-6.6.0-101.0.0.93.oe2403.x86_64",
					"openEuler-24.03-LTS:perf-debuginfo-6.6.0-101.0.0.93.oe2403.x86_64",
					"openEuler-24.03-LTS:python3-perf-6.6.0-101.0.0.93.oe2403.x86_64",
					"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-101.0.0.93.oe2403.x86_64"
				]
			},
			"remediations":[
				{
					"product_ids":[
						"openEuler-24.03-LTS:kernel-6.6.0-101.0.0.93.oe2403.src",
						"openEuler-24.03-LTS:bpftool-6.6.0-101.0.0.93.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-101.0.0.93.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-6.6.0-101.0.0.93.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-101.0.0.93.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-101.0.0.93.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-101.0.0.93.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-101.0.0.93.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-101.0.0.93.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-101.0.0.93.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-101.0.0.93.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-101.0.0.93.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-6.6.0-101.0.0.93.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-101.0.0.93.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-101.0.0.93.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-101.0.0.93.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-6.6.0-101.0.0.93.oe2403.x86_64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-101.0.0.93.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-6.6.0-101.0.0.93.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-101.0.0.93.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-101.0.0.93.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-101.0.0.93.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-101.0.0.93.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-101.0.0.93.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-101.0.0.93.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-101.0.0.93.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-101.0.0.93.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-6.6.0-101.0.0.93.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-101.0.0.93.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-101.0.0.93.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-101.0.0.93.oe2403.x86_64"
					],
					"details":"kernel security update",
					"category":"vendor_fix",
					"url":"https://www.openeuler.org/zh/security/security-bulletins/detail/?id=openEuler-SA-2025-1874"
				}
			],
			"scores":[
				{
					"cvss_v3":{
						"baseSeverity":"MEDIUM",
						"baseScore":5.5,
						"vectorString":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
						"version":"3.1"
					},
					"products":[
						"openEuler-24.03-LTS:kernel-6.6.0-101.0.0.93.oe2403.src",
						"openEuler-24.03-LTS:bpftool-6.6.0-101.0.0.93.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-101.0.0.93.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-6.6.0-101.0.0.93.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-101.0.0.93.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-101.0.0.93.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-101.0.0.93.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-101.0.0.93.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-101.0.0.93.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-101.0.0.93.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-101.0.0.93.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-101.0.0.93.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-6.6.0-101.0.0.93.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-101.0.0.93.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-101.0.0.93.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-101.0.0.93.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-6.6.0-101.0.0.93.oe2403.x86_64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-101.0.0.93.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-6.6.0-101.0.0.93.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-101.0.0.93.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-101.0.0.93.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-101.0.0.93.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-101.0.0.93.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-101.0.0.93.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-101.0.0.93.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-101.0.0.93.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-101.0.0.93.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-6.6.0-101.0.0.93.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-101.0.0.93.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-101.0.0.93.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-101.0.0.93.oe2403.x86_64"
					]
				}
			],
			"threats":[
				{
					"details":"Medium",
					"category":"impact"
				}
			],
			"title":"CVE-2025-21926"
		},
		{
			"cve":"CVE-2025-21936",
			"notes":[
				{
					"text":"In the Linux kernel, the following vulnerability has been resolved:\n\nBluetooth: Add check for mgmt_alloc_skb() in mgmt_device_connected()\n\nAdd check for the return value of mgmt_alloc_skb() in\nmgmt_device_connected() to prevent null pointer dereference.",
					"category":"description",
					"title":"Vulnerability Description"
				}
			],
			"product_status":{
				"fixed":[
					"openEuler-24.03-LTS:kernel-6.6.0-101.0.0.93.oe2403.src",
					"openEuler-24.03-LTS:bpftool-6.6.0-101.0.0.93.oe2403.aarch64",
					"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-101.0.0.93.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-6.6.0-101.0.0.93.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-101.0.0.93.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-debugsource-6.6.0-101.0.0.93.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-devel-6.6.0-101.0.0.93.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-headers-6.6.0-101.0.0.93.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-source-6.6.0-101.0.0.93.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-tools-6.6.0-101.0.0.93.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-101.0.0.93.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-101.0.0.93.oe2403.aarch64",
					"openEuler-24.03-LTS:perf-6.6.0-101.0.0.93.oe2403.aarch64",
					"openEuler-24.03-LTS:perf-debuginfo-6.6.0-101.0.0.93.oe2403.aarch64",
					"openEuler-24.03-LTS:python3-perf-6.6.0-101.0.0.93.oe2403.aarch64",
					"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-101.0.0.93.oe2403.aarch64",
					"openEuler-24.03-LTS:bpftool-6.6.0-101.0.0.93.oe2403.x86_64",
					"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-101.0.0.93.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-6.6.0-101.0.0.93.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-101.0.0.93.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-debugsource-6.6.0-101.0.0.93.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-devel-6.6.0-101.0.0.93.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-headers-6.6.0-101.0.0.93.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-source-6.6.0-101.0.0.93.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-tools-6.6.0-101.0.0.93.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-101.0.0.93.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-101.0.0.93.oe2403.x86_64",
					"openEuler-24.03-LTS:perf-6.6.0-101.0.0.93.oe2403.x86_64",
					"openEuler-24.03-LTS:perf-debuginfo-6.6.0-101.0.0.93.oe2403.x86_64",
					"openEuler-24.03-LTS:python3-perf-6.6.0-101.0.0.93.oe2403.x86_64",
					"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-101.0.0.93.oe2403.x86_64"
				]
			},
			"remediations":[
				{
					"product_ids":[
						"openEuler-24.03-LTS:kernel-6.6.0-101.0.0.93.oe2403.src",
						"openEuler-24.03-LTS:bpftool-6.6.0-101.0.0.93.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-101.0.0.93.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-6.6.0-101.0.0.93.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-101.0.0.93.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-101.0.0.93.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-101.0.0.93.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-101.0.0.93.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-101.0.0.93.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-101.0.0.93.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-101.0.0.93.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-101.0.0.93.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-6.6.0-101.0.0.93.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-101.0.0.93.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-101.0.0.93.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-101.0.0.93.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-6.6.0-101.0.0.93.oe2403.x86_64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-101.0.0.93.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-6.6.0-101.0.0.93.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-101.0.0.93.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-101.0.0.93.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-101.0.0.93.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-101.0.0.93.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-101.0.0.93.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-101.0.0.93.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-101.0.0.93.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-101.0.0.93.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-6.6.0-101.0.0.93.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-101.0.0.93.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-101.0.0.93.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-101.0.0.93.oe2403.x86_64"
					],
					"details":"kernel security update",
					"category":"vendor_fix",
					"url":"https://www.openeuler.org/zh/security/security-bulletins/detail/?id=openEuler-SA-2025-1874"
				}
			],
			"scores":[
				{
					"cvss_v3":{
						"baseSeverity":"MEDIUM",
						"baseScore":5.5,
						"vectorString":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
						"version":"3.1"
					},
					"products":[
						"openEuler-24.03-LTS:kernel-6.6.0-101.0.0.93.oe2403.src",
						"openEuler-24.03-LTS:bpftool-6.6.0-101.0.0.93.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-101.0.0.93.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-6.6.0-101.0.0.93.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-101.0.0.93.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-101.0.0.93.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-101.0.0.93.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-101.0.0.93.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-101.0.0.93.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-101.0.0.93.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-101.0.0.93.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-101.0.0.93.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-6.6.0-101.0.0.93.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-101.0.0.93.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-101.0.0.93.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-101.0.0.93.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-6.6.0-101.0.0.93.oe2403.x86_64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-101.0.0.93.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-6.6.0-101.0.0.93.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-101.0.0.93.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-101.0.0.93.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-101.0.0.93.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-101.0.0.93.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-101.0.0.93.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-101.0.0.93.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-101.0.0.93.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-101.0.0.93.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-6.6.0-101.0.0.93.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-101.0.0.93.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-101.0.0.93.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-101.0.0.93.oe2403.x86_64"
					]
				}
			],
			"threats":[
				{
					"details":"Medium",
					"category":"impact"
				}
			],
			"title":"CVE-2025-21936"
		},
		{
			"cve":"CVE-2025-21937",
			"notes":[
				{
					"text":"In the Linux kernel, the following vulnerability has been resolved:\n\nBluetooth: Add check for mgmt_alloc_skb() in mgmt_remote_name()\n\nAdd check for the return value of mgmt_alloc_skb() in\nmgmt_remote_name() to prevent null pointer dereference.",
					"category":"description",
					"title":"Vulnerability Description"
				}
			],
			"product_status":{
				"fixed":[
					"openEuler-24.03-LTS:kernel-6.6.0-101.0.0.93.oe2403.src",
					"openEuler-24.03-LTS:bpftool-6.6.0-101.0.0.93.oe2403.aarch64",
					"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-101.0.0.93.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-6.6.0-101.0.0.93.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-101.0.0.93.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-debugsource-6.6.0-101.0.0.93.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-devel-6.6.0-101.0.0.93.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-headers-6.6.0-101.0.0.93.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-source-6.6.0-101.0.0.93.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-tools-6.6.0-101.0.0.93.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-101.0.0.93.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-101.0.0.93.oe2403.aarch64",
					"openEuler-24.03-LTS:perf-6.6.0-101.0.0.93.oe2403.aarch64",
					"openEuler-24.03-LTS:perf-debuginfo-6.6.0-101.0.0.93.oe2403.aarch64",
					"openEuler-24.03-LTS:python3-perf-6.6.0-101.0.0.93.oe2403.aarch64",
					"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-101.0.0.93.oe2403.aarch64",
					"openEuler-24.03-LTS:bpftool-6.6.0-101.0.0.93.oe2403.x86_64",
					"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-101.0.0.93.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-6.6.0-101.0.0.93.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-101.0.0.93.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-debugsource-6.6.0-101.0.0.93.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-devel-6.6.0-101.0.0.93.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-headers-6.6.0-101.0.0.93.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-source-6.6.0-101.0.0.93.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-tools-6.6.0-101.0.0.93.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-101.0.0.93.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-101.0.0.93.oe2403.x86_64",
					"openEuler-24.03-LTS:perf-6.6.0-101.0.0.93.oe2403.x86_64",
					"openEuler-24.03-LTS:perf-debuginfo-6.6.0-101.0.0.93.oe2403.x86_64",
					"openEuler-24.03-LTS:python3-perf-6.6.0-101.0.0.93.oe2403.x86_64",
					"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-101.0.0.93.oe2403.x86_64"
				]
			},
			"remediations":[
				{
					"product_ids":[
						"openEuler-24.03-LTS:kernel-6.6.0-101.0.0.93.oe2403.src",
						"openEuler-24.03-LTS:bpftool-6.6.0-101.0.0.93.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-101.0.0.93.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-6.6.0-101.0.0.93.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-101.0.0.93.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-101.0.0.93.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-101.0.0.93.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-101.0.0.93.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-101.0.0.93.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-101.0.0.93.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-101.0.0.93.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-101.0.0.93.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-6.6.0-101.0.0.93.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-101.0.0.93.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-101.0.0.93.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-101.0.0.93.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-6.6.0-101.0.0.93.oe2403.x86_64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-101.0.0.93.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-6.6.0-101.0.0.93.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-101.0.0.93.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-101.0.0.93.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-101.0.0.93.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-101.0.0.93.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-101.0.0.93.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-101.0.0.93.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-101.0.0.93.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-101.0.0.93.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-6.6.0-101.0.0.93.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-101.0.0.93.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-101.0.0.93.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-101.0.0.93.oe2403.x86_64"
					],
					"details":"kernel security update",
					"category":"vendor_fix",
					"url":"https://www.openeuler.org/zh/security/security-bulletins/detail/?id=openEuler-SA-2025-1874"
				}
			],
			"scores":[
				{
					"cvss_v3":{
						"baseSeverity":"MEDIUM",
						"baseScore":5.5,
						"vectorString":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
						"version":"3.1"
					},
					"products":[
						"openEuler-24.03-LTS:kernel-6.6.0-101.0.0.93.oe2403.src",
						"openEuler-24.03-LTS:bpftool-6.6.0-101.0.0.93.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-101.0.0.93.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-6.6.0-101.0.0.93.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-101.0.0.93.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-101.0.0.93.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-101.0.0.93.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-101.0.0.93.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-101.0.0.93.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-101.0.0.93.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-101.0.0.93.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-101.0.0.93.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-6.6.0-101.0.0.93.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-101.0.0.93.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-101.0.0.93.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-101.0.0.93.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-6.6.0-101.0.0.93.oe2403.x86_64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-101.0.0.93.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-6.6.0-101.0.0.93.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-101.0.0.93.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-101.0.0.93.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-101.0.0.93.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-101.0.0.93.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-101.0.0.93.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-101.0.0.93.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-101.0.0.93.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-101.0.0.93.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-6.6.0-101.0.0.93.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-101.0.0.93.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-101.0.0.93.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-101.0.0.93.oe2403.x86_64"
					]
				}
			],
			"threats":[
				{
					"details":"Medium",
					"category":"impact"
				}
			],
			"title":"CVE-2025-21937"
		},
		{
			"cve":"CVE-2025-21938",
			"notes":[
				{
					"text":"In the Linux kernel, the following vulnerability has been resolved:\n\nmptcp: fix 'scheduling while atomic' in mptcp_pm_nl_append_new_local_addr\n\nIf multiple connection requests attempt to create an implicit mptcp\nendpoint in parallel, more than one caller may end up in\nmptcp_pm_nl_append_new_local_addr because none found the address in\nlocal_addr_list during their call to mptcp_pm_nl_get_local_id.  In this\ncase, the concurrent new_local_addr calls may delete the address entry\ncreated by the previous caller.  These deletes use synchronize_rcu, but\nthis is not permitted in some of the contexts where this function may be\ncalled.  During packet recv, the caller may be in a rcu read critical\nsection and have preemption disabled.\n\nAn example stack:\n\n   BUG: scheduling while atomic: swapper/2/0/0x00000302\n\n   Call Trace:\n   <IRQ>\n   dump_stack_lvl (lib/dump_stack.c:117 (discriminator 1))\n   dump_stack (lib/dump_stack.c:124)\n   __schedule_bug (kernel/sched/core.c:5943)\n   schedule_debug.constprop.0 (arch/x86/include/asm/preempt.h:33 kernel/sched/core.c:5970)\n   __schedule (arch/x86/include/asm/jump_label.h:27 include/linux/jump_label.h:207 kernel/sched/features.h:29 kernel/sched/core.c:6621)\n   schedule (arch/x86/include/asm/preempt.h:84 kernel/sched/core.c:6804 kernel/sched/core.c:6818)\n   schedule_timeout (kernel/time/timer.c:2160)\n   wait_for_completion (kernel/sched/completion.c:96 kernel/sched/completion.c:116 kernel/sched/completion.c:127 kernel/sched/completion.c:148)\n   __wait_rcu_gp (include/linux/rcupdate.h:311 kernel/rcu/update.c:444)\n   synchronize_rcu (kernel/rcu/tree.c:3609)\n   mptcp_pm_nl_append_new_local_addr (net/mptcp/pm_netlink.c:966 net/mptcp/pm_netlink.c:1061)\n   mptcp_pm_nl_get_local_id (net/mptcp/pm_netlink.c:1164)\n   mptcp_pm_get_local_id (net/mptcp/pm.c:420)\n   subflow_check_req (net/mptcp/subflow.c:98 net/mptcp/subflow.c:213)\n   subflow_v4_route_req (net/mptcp/subflow.c:305)\n   tcp_conn_request (net/ipv4/tcp_input.c:7216)\n   subflow_v4_conn_request (net/mptcp/subflow.c:651)\n   tcp_rcv_state_process (net/ipv4/tcp_input.c:6709)\n   tcp_v4_do_rcv (net/ipv4/tcp_ipv4.c:1934)\n   tcp_v4_rcv (net/ipv4/tcp_ipv4.c:2334)\n   ip_protocol_deliver_rcu (net/ipv4/ip_input.c:205 (discriminator 1))\n   ip_local_deliver_finish (include/linux/rcupdate.h:813 net/ipv4/ip_input.c:234)\n   ip_local_deliver (include/linux/netfilter.h:314 include/linux/netfilter.h:308 net/ipv4/ip_input.c:254)\n   ip_sublist_rcv_finish (include/net/dst.h:461 net/ipv4/ip_input.c:580)\n   ip_sublist_rcv (net/ipv4/ip_input.c:640)\n   ip_list_rcv (net/ipv4/ip_input.c:675)\n   __netif_receive_skb_list_core (net/core/dev.c:5583 net/core/dev.c:5631)\n   netif_receive_skb_list_internal (net/core/dev.c:5685 net/core/dev.c:5774)\n   napi_complete_done (include/linux/list.h:37 include/net/gro.h:449 include/net/gro.h:444 net/core/dev.c:6114)\n   igb_poll (drivers/net/ethernet/intel/igb/igb_main.c:8244) igb\n   __napi_poll (net/core/dev.c:6582)\n   net_rx_action (net/core/dev.c:6653 net/core/dev.c:6787)\n   handle_softirqs (kernel/softirq.c:553)\n   __irq_exit_rcu (kernel/softirq.c:588 kernel/softirq.c:427 kernel/softirq.c:636)\n   irq_exit_rcu (kernel/softirq.c:651)\n   common_interrupt (arch/x86/kernel/irq.c:247 (discriminator 14))\n   </IRQ>\n\nThis problem seems particularly prevalent if the user advertises an\nendpoint that has a different external vs internal address.  In the case\nwhere the external address is advertised and multiple connections\nalready exist, multiple subflow SYNs arrive in parallel which tends to\ntrigger the race during creation of the first local_addr_list entries\nwhich have the internal address instead.\n\nFix by skipping the replacement of an existing implicit local address if\ncalled via mptcp_pm_nl_get_local_id.",
					"category":"description",
					"title":"Vulnerability Description"
				}
			],
			"product_status":{
				"fixed":[
					"openEuler-24.03-LTS:kernel-6.6.0-101.0.0.93.oe2403.src",
					"openEuler-24.03-LTS:bpftool-6.6.0-101.0.0.93.oe2403.aarch64",
					"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-101.0.0.93.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-6.6.0-101.0.0.93.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-101.0.0.93.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-debugsource-6.6.0-101.0.0.93.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-devel-6.6.0-101.0.0.93.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-headers-6.6.0-101.0.0.93.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-source-6.6.0-101.0.0.93.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-tools-6.6.0-101.0.0.93.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-101.0.0.93.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-101.0.0.93.oe2403.aarch64",
					"openEuler-24.03-LTS:perf-6.6.0-101.0.0.93.oe2403.aarch64",
					"openEuler-24.03-LTS:perf-debuginfo-6.6.0-101.0.0.93.oe2403.aarch64",
					"openEuler-24.03-LTS:python3-perf-6.6.0-101.0.0.93.oe2403.aarch64",
					"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-101.0.0.93.oe2403.aarch64",
					"openEuler-24.03-LTS:bpftool-6.6.0-101.0.0.93.oe2403.x86_64",
					"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-101.0.0.93.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-6.6.0-101.0.0.93.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-101.0.0.93.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-debugsource-6.6.0-101.0.0.93.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-devel-6.6.0-101.0.0.93.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-headers-6.6.0-101.0.0.93.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-source-6.6.0-101.0.0.93.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-tools-6.6.0-101.0.0.93.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-101.0.0.93.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-101.0.0.93.oe2403.x86_64",
					"openEuler-24.03-LTS:perf-6.6.0-101.0.0.93.oe2403.x86_64",
					"openEuler-24.03-LTS:perf-debuginfo-6.6.0-101.0.0.93.oe2403.x86_64",
					"openEuler-24.03-LTS:python3-perf-6.6.0-101.0.0.93.oe2403.x86_64",
					"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-101.0.0.93.oe2403.x86_64"
				]
			},
			"remediations":[
				{
					"product_ids":[
						"openEuler-24.03-LTS:kernel-6.6.0-101.0.0.93.oe2403.src",
						"openEuler-24.03-LTS:bpftool-6.6.0-101.0.0.93.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-101.0.0.93.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-6.6.0-101.0.0.93.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-101.0.0.93.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-101.0.0.93.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-101.0.0.93.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-101.0.0.93.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-101.0.0.93.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-101.0.0.93.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-101.0.0.93.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-101.0.0.93.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-6.6.0-101.0.0.93.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-101.0.0.93.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-101.0.0.93.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-101.0.0.93.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-6.6.0-101.0.0.93.oe2403.x86_64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-101.0.0.93.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-6.6.0-101.0.0.93.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-101.0.0.93.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-101.0.0.93.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-101.0.0.93.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-101.0.0.93.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-101.0.0.93.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-101.0.0.93.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-101.0.0.93.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-101.0.0.93.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-6.6.0-101.0.0.93.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-101.0.0.93.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-101.0.0.93.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-101.0.0.93.oe2403.x86_64"
					],
					"details":"kernel security update",
					"category":"vendor_fix",
					"url":"https://www.openeuler.org/zh/security/security-bulletins/detail/?id=openEuler-SA-2025-1874"
				}
			],
			"scores":[
				{
					"cvss_v3":{
						"baseSeverity":"MEDIUM",
						"baseScore":5.5,
						"vectorString":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
						"version":"3.1"
					},
					"products":[
						"openEuler-24.03-LTS:kernel-6.6.0-101.0.0.93.oe2403.src",
						"openEuler-24.03-LTS:bpftool-6.6.0-101.0.0.93.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-101.0.0.93.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-6.6.0-101.0.0.93.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-101.0.0.93.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-101.0.0.93.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-101.0.0.93.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-101.0.0.93.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-101.0.0.93.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-101.0.0.93.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-101.0.0.93.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-101.0.0.93.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-6.6.0-101.0.0.93.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-101.0.0.93.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-101.0.0.93.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-101.0.0.93.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-6.6.0-101.0.0.93.oe2403.x86_64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-101.0.0.93.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-6.6.0-101.0.0.93.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-101.0.0.93.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-101.0.0.93.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-101.0.0.93.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-101.0.0.93.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-101.0.0.93.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-101.0.0.93.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-101.0.0.93.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-101.0.0.93.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-6.6.0-101.0.0.93.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-101.0.0.93.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-101.0.0.93.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-101.0.0.93.oe2403.x86_64"
					]
				}
			],
			"threats":[
				{
					"details":"Medium",
					"category":"impact"
				}
			],
			"title":"CVE-2025-21938"
		},
		{
			"cve":"CVE-2025-22101",
			"notes":[
				{
					"text":"In the Linux kernel, the following vulnerability has been resolved:\n\nnet: libwx: fix Tx L4 checksum\n\nThe hardware only supports L4 checksum offload for TCP/UDP/SCTP protocol.\nThere was a bug to set Tx checksum flag for the other protocol that results\nin Tx ring hang. Fix to compute software checksum for these packets.",
					"category":"description",
					"title":"Vulnerability Description"
				}
			],
			"product_status":{
				"fixed":[
					"openEuler-24.03-LTS:kernel-6.6.0-101.0.0.93.oe2403.src",
					"openEuler-24.03-LTS:bpftool-6.6.0-101.0.0.93.oe2403.aarch64",
					"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-101.0.0.93.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-6.6.0-101.0.0.93.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-101.0.0.93.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-debugsource-6.6.0-101.0.0.93.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-devel-6.6.0-101.0.0.93.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-headers-6.6.0-101.0.0.93.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-source-6.6.0-101.0.0.93.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-tools-6.6.0-101.0.0.93.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-101.0.0.93.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-101.0.0.93.oe2403.aarch64",
					"openEuler-24.03-LTS:perf-6.6.0-101.0.0.93.oe2403.aarch64",
					"openEuler-24.03-LTS:perf-debuginfo-6.6.0-101.0.0.93.oe2403.aarch64",
					"openEuler-24.03-LTS:python3-perf-6.6.0-101.0.0.93.oe2403.aarch64",
					"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-101.0.0.93.oe2403.aarch64",
					"openEuler-24.03-LTS:bpftool-6.6.0-101.0.0.93.oe2403.x86_64",
					"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-101.0.0.93.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-6.6.0-101.0.0.93.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-101.0.0.93.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-debugsource-6.6.0-101.0.0.93.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-devel-6.6.0-101.0.0.93.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-headers-6.6.0-101.0.0.93.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-source-6.6.0-101.0.0.93.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-tools-6.6.0-101.0.0.93.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-101.0.0.93.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-101.0.0.93.oe2403.x86_64",
					"openEuler-24.03-LTS:perf-6.6.0-101.0.0.93.oe2403.x86_64",
					"openEuler-24.03-LTS:perf-debuginfo-6.6.0-101.0.0.93.oe2403.x86_64",
					"openEuler-24.03-LTS:python3-perf-6.6.0-101.0.0.93.oe2403.x86_64",
					"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-101.0.0.93.oe2403.x86_64"
				]
			},
			"remediations":[
				{
					"product_ids":[
						"openEuler-24.03-LTS:kernel-6.6.0-101.0.0.93.oe2403.src",
						"openEuler-24.03-LTS:bpftool-6.6.0-101.0.0.93.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-101.0.0.93.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-6.6.0-101.0.0.93.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-101.0.0.93.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-101.0.0.93.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-101.0.0.93.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-101.0.0.93.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-101.0.0.93.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-101.0.0.93.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-101.0.0.93.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-101.0.0.93.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-6.6.0-101.0.0.93.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-101.0.0.93.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-101.0.0.93.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-101.0.0.93.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-6.6.0-101.0.0.93.oe2403.x86_64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-101.0.0.93.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-6.6.0-101.0.0.93.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-101.0.0.93.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-101.0.0.93.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-101.0.0.93.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-101.0.0.93.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-101.0.0.93.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-101.0.0.93.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-101.0.0.93.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-101.0.0.93.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-6.6.0-101.0.0.93.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-101.0.0.93.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-101.0.0.93.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-101.0.0.93.oe2403.x86_64"
					],
					"details":"kernel security update",
					"category":"vendor_fix",
					"url":"https://www.openeuler.org/zh/security/security-bulletins/detail/?id=openEuler-SA-2025-1874"
				}
			],
			"scores":[
				{
					"cvss_v3":{
						"baseSeverity":"HIGH",
						"baseScore":7.5,
						"vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
						"version":"3.1"
					},
					"products":[
						"openEuler-24.03-LTS:kernel-6.6.0-101.0.0.93.oe2403.src",
						"openEuler-24.03-LTS:bpftool-6.6.0-101.0.0.93.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-101.0.0.93.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-6.6.0-101.0.0.93.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-101.0.0.93.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-101.0.0.93.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-101.0.0.93.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-101.0.0.93.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-101.0.0.93.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-101.0.0.93.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-101.0.0.93.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-101.0.0.93.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-6.6.0-101.0.0.93.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-101.0.0.93.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-101.0.0.93.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-101.0.0.93.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-6.6.0-101.0.0.93.oe2403.x86_64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-101.0.0.93.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-6.6.0-101.0.0.93.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-101.0.0.93.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-101.0.0.93.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-101.0.0.93.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-101.0.0.93.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-101.0.0.93.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-101.0.0.93.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-101.0.0.93.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-101.0.0.93.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-6.6.0-101.0.0.93.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-101.0.0.93.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-101.0.0.93.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-101.0.0.93.oe2403.x86_64"
					]
				}
			],
			"threats":[
				{
					"details":"High",
					"category":"impact"
				}
			],
			"title":"CVE-2025-22101"
		},
		{
			"cve":"CVE-2025-22108",
			"notes":[
				{
					"text":"In the Linux kernel, the following vulnerability has been resolved:\n\nbnxt_en: Mask the bd_cnt field in the TX BD properly\n\nThe bd_cnt field in the TX BD specifies the total number of BDs for\nthe TX packet.  The bd_cnt field has 5 bits and the maximum number\nsupported is 32 with the value 0.\n\nCONFIG_MAX_SKB_FRAGS can be modified and the total number of SKB\nfragments can approach or exceed the maximum supported by the chip.\nAdd a macro to properly mask the bd_cnt field so that the value 32\nwill be properly masked and set to 0 in the bd_cnd field.\n\nWithout this patch, the out-of-range bd_cnt value will corrupt the\nTX BD and may cause TX timeout.\n\nThe next patch will check for values exceeding 32.",
					"category":"description",
					"title":"Vulnerability Description"
				}
			],
			"product_status":{
				"fixed":[
					"openEuler-24.03-LTS:kernel-6.6.0-101.0.0.93.oe2403.src",
					"openEuler-24.03-LTS:bpftool-6.6.0-101.0.0.93.oe2403.aarch64",
					"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-101.0.0.93.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-6.6.0-101.0.0.93.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-101.0.0.93.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-debugsource-6.6.0-101.0.0.93.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-devel-6.6.0-101.0.0.93.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-headers-6.6.0-101.0.0.93.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-source-6.6.0-101.0.0.93.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-tools-6.6.0-101.0.0.93.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-101.0.0.93.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-101.0.0.93.oe2403.aarch64",
					"openEuler-24.03-LTS:perf-6.6.0-101.0.0.93.oe2403.aarch64",
					"openEuler-24.03-LTS:perf-debuginfo-6.6.0-101.0.0.93.oe2403.aarch64",
					"openEuler-24.03-LTS:python3-perf-6.6.0-101.0.0.93.oe2403.aarch64",
					"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-101.0.0.93.oe2403.aarch64",
					"openEuler-24.03-LTS:bpftool-6.6.0-101.0.0.93.oe2403.x86_64",
					"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-101.0.0.93.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-6.6.0-101.0.0.93.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-101.0.0.93.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-debugsource-6.6.0-101.0.0.93.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-devel-6.6.0-101.0.0.93.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-headers-6.6.0-101.0.0.93.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-source-6.6.0-101.0.0.93.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-tools-6.6.0-101.0.0.93.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-101.0.0.93.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-101.0.0.93.oe2403.x86_64",
					"openEuler-24.03-LTS:perf-6.6.0-101.0.0.93.oe2403.x86_64",
					"openEuler-24.03-LTS:perf-debuginfo-6.6.0-101.0.0.93.oe2403.x86_64",
					"openEuler-24.03-LTS:python3-perf-6.6.0-101.0.0.93.oe2403.x86_64",
					"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-101.0.0.93.oe2403.x86_64"
				]
			},
			"remediations":[
				{
					"product_ids":[
						"openEuler-24.03-LTS:kernel-6.6.0-101.0.0.93.oe2403.src",
						"openEuler-24.03-LTS:bpftool-6.6.0-101.0.0.93.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-101.0.0.93.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-6.6.0-101.0.0.93.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-101.0.0.93.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-101.0.0.93.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-101.0.0.93.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-101.0.0.93.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-101.0.0.93.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-101.0.0.93.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-101.0.0.93.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-101.0.0.93.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-6.6.0-101.0.0.93.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-101.0.0.93.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-101.0.0.93.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-101.0.0.93.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-6.6.0-101.0.0.93.oe2403.x86_64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-101.0.0.93.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-6.6.0-101.0.0.93.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-101.0.0.93.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-101.0.0.93.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-101.0.0.93.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-101.0.0.93.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-101.0.0.93.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-101.0.0.93.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-101.0.0.93.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-101.0.0.93.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-6.6.0-101.0.0.93.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-101.0.0.93.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-101.0.0.93.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-101.0.0.93.oe2403.x86_64"
					],
					"details":"kernel security update",
					"category":"vendor_fix",
					"url":"https://www.openeuler.org/zh/security/security-bulletins/detail/?id=openEuler-SA-2025-1874"
				}
			],
			"scores":[
				{
					"cvss_v3":{
						"baseSeverity":"MEDIUM",
						"baseScore":4.4,
						"vectorString":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:L",
						"version":"3.1"
					},
					"products":[
						"openEuler-24.03-LTS:kernel-6.6.0-101.0.0.93.oe2403.src",
						"openEuler-24.03-LTS:bpftool-6.6.0-101.0.0.93.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-101.0.0.93.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-6.6.0-101.0.0.93.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-101.0.0.93.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-101.0.0.93.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-101.0.0.93.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-101.0.0.93.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-101.0.0.93.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-101.0.0.93.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-101.0.0.93.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-101.0.0.93.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-6.6.0-101.0.0.93.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-101.0.0.93.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-101.0.0.93.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-101.0.0.93.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-6.6.0-101.0.0.93.oe2403.x86_64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-101.0.0.93.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-6.6.0-101.0.0.93.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-101.0.0.93.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-101.0.0.93.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-101.0.0.93.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-101.0.0.93.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-101.0.0.93.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-101.0.0.93.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-101.0.0.93.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-101.0.0.93.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-6.6.0-101.0.0.93.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-101.0.0.93.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-101.0.0.93.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-101.0.0.93.oe2403.x86_64"
					]
				}
			],
			"threats":[
				{
					"details":"Medium",
					"category":"impact"
				}
			],
			"title":"CVE-2025-22108"
		},
		{
			"cve":"CVE-2025-37810",
			"notes":[
				{
					"text":"In the Linux kernel, the following vulnerability has been resolved:\n\nusb: dwc3: gadget: check that event count does not exceed event buffer length\n\nThe event count is read from register DWC3_GEVNTCOUNT.\nThere is a check for the count being zero, but not for exceeding the\nevent buffer length.\nCheck that event count does not exceed event buffer length,\navoiding an out-of-bounds access when memcpy'ing the event.\nCrash log:\nUnable to handle kernel paging request at virtual address ffffffc0129be000\npc : __memcpy+0x114/0x180\nlr : dwc3_check_event_buf+0xec/0x348\nx3 : 0000000000000030 x2 : 000000000000dfc4\nx1 : ffffffc0129be000 x0 : ffffff87aad60080\nCall trace:\n__memcpy+0x114/0x180\ndwc3_interrupt+0x24/0x34",
					"category":"description",
					"title":"Vulnerability Description"
				}
			],
			"product_status":{
				"fixed":[
					"openEuler-24.03-LTS:kernel-6.6.0-101.0.0.93.oe2403.src",
					"openEuler-24.03-LTS:bpftool-6.6.0-101.0.0.93.oe2403.aarch64",
					"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-101.0.0.93.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-6.6.0-101.0.0.93.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-101.0.0.93.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-debugsource-6.6.0-101.0.0.93.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-devel-6.6.0-101.0.0.93.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-headers-6.6.0-101.0.0.93.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-source-6.6.0-101.0.0.93.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-tools-6.6.0-101.0.0.93.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-101.0.0.93.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-101.0.0.93.oe2403.aarch64",
					"openEuler-24.03-LTS:perf-6.6.0-101.0.0.93.oe2403.aarch64",
					"openEuler-24.03-LTS:perf-debuginfo-6.6.0-101.0.0.93.oe2403.aarch64",
					"openEuler-24.03-LTS:python3-perf-6.6.0-101.0.0.93.oe2403.aarch64",
					"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-101.0.0.93.oe2403.aarch64",
					"openEuler-24.03-LTS:bpftool-6.6.0-101.0.0.93.oe2403.x86_64",
					"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-101.0.0.93.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-6.6.0-101.0.0.93.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-101.0.0.93.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-debugsource-6.6.0-101.0.0.93.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-devel-6.6.0-101.0.0.93.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-headers-6.6.0-101.0.0.93.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-source-6.6.0-101.0.0.93.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-tools-6.6.0-101.0.0.93.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-101.0.0.93.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-101.0.0.93.oe2403.x86_64",
					"openEuler-24.03-LTS:perf-6.6.0-101.0.0.93.oe2403.x86_64",
					"openEuler-24.03-LTS:perf-debuginfo-6.6.0-101.0.0.93.oe2403.x86_64",
					"openEuler-24.03-LTS:python3-perf-6.6.0-101.0.0.93.oe2403.x86_64",
					"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-101.0.0.93.oe2403.x86_64"
				]
			},
			"remediations":[
				{
					"product_ids":[
						"openEuler-24.03-LTS:kernel-6.6.0-101.0.0.93.oe2403.src",
						"openEuler-24.03-LTS:bpftool-6.6.0-101.0.0.93.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-101.0.0.93.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-6.6.0-101.0.0.93.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-101.0.0.93.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-101.0.0.93.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-101.0.0.93.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-101.0.0.93.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-101.0.0.93.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-101.0.0.93.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-101.0.0.93.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-101.0.0.93.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-6.6.0-101.0.0.93.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-101.0.0.93.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-101.0.0.93.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-101.0.0.93.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-6.6.0-101.0.0.93.oe2403.x86_64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-101.0.0.93.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-6.6.0-101.0.0.93.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-101.0.0.93.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-101.0.0.93.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-101.0.0.93.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-101.0.0.93.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-101.0.0.93.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-101.0.0.93.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-101.0.0.93.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-101.0.0.93.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-6.6.0-101.0.0.93.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-101.0.0.93.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-101.0.0.93.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-101.0.0.93.oe2403.x86_64"
					],
					"details":"kernel security update",
					"category":"vendor_fix",
					"url":"https://www.openeuler.org/zh/security/security-bulletins/detail/?id=openEuler-SA-2025-1874"
				}
			],
			"scores":[
				{
					"cvss_v3":{
						"baseSeverity":"LOW",
						"baseScore":3.9,
						"vectorString":"CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:L/I:L/A:L",
						"version":"3.1"
					},
					"products":[
						"openEuler-24.03-LTS:kernel-6.6.0-101.0.0.93.oe2403.src",
						"openEuler-24.03-LTS:bpftool-6.6.0-101.0.0.93.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-101.0.0.93.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-6.6.0-101.0.0.93.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-101.0.0.93.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-101.0.0.93.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-101.0.0.93.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-101.0.0.93.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-101.0.0.93.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-101.0.0.93.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-101.0.0.93.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-101.0.0.93.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-6.6.0-101.0.0.93.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-101.0.0.93.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-101.0.0.93.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-101.0.0.93.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-6.6.0-101.0.0.93.oe2403.x86_64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-101.0.0.93.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-6.6.0-101.0.0.93.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-101.0.0.93.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-101.0.0.93.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-101.0.0.93.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-101.0.0.93.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-101.0.0.93.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-101.0.0.93.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-101.0.0.93.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-101.0.0.93.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-6.6.0-101.0.0.93.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-101.0.0.93.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-101.0.0.93.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-101.0.0.93.oe2403.x86_64"
					]
				}
			],
			"threats":[
				{
					"details":"Low",
					"category":"impact"
				}
			],
			"title":"CVE-2025-37810"
		},
		{
			"cve":"CVE-2025-38197",
			"notes":[
				{
					"text":"A vulnerability was found in Linux Kernel up to 6.16-rc2 (Operating System). It has been rated as critical.Using CWE to declare the problem leads to CWE-476. A NULL pointer dereference occurs when the application dereferences a pointer that it expects to be valid, but is NULL, typically causing a crash or exit.Impacted is availability.Upgrading to version 5.10.239, 5.15.186, 6.1.142, 6.6.95, 6.12.35, 6.15.4 or 6.16-rc3 eliminates this vulnerability. Applying the patch 5e8c658acd1b7c186aeffa46bf08795e121f401a/07d7b8e7ef7d1f812a6211ed531947c56d09e95e/a7b477b64ef5e37cb08dd536ae07c46f9f28262e/f3b840fb1508a80cd8a0efb5c886ae1995a88b24/4d71f2c1e5263a9f042faa71d59515709869dc79/32d05e6cc3a7bf6c8f16f7b7ef8fe80eca0c233e/61ce04601e0d8265ec6d2ffa6df5a7e1bce64854 is able to eliminate this problem. The bugfix is ready for download at git.kernel.org. The best possible mitigation is suggested to be upgrading to the latest version.",
					"category":"description",
					"title":"Vulnerability Description"
				}
			],
			"product_status":{
				"fixed":[
					"openEuler-24.03-LTS:kernel-6.6.0-101.0.0.93.oe2403.src",
					"openEuler-24.03-LTS:bpftool-6.6.0-101.0.0.93.oe2403.aarch64",
					"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-101.0.0.93.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-6.6.0-101.0.0.93.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-101.0.0.93.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-debugsource-6.6.0-101.0.0.93.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-devel-6.6.0-101.0.0.93.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-headers-6.6.0-101.0.0.93.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-source-6.6.0-101.0.0.93.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-tools-6.6.0-101.0.0.93.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-101.0.0.93.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-101.0.0.93.oe2403.aarch64",
					"openEuler-24.03-LTS:perf-6.6.0-101.0.0.93.oe2403.aarch64",
					"openEuler-24.03-LTS:perf-debuginfo-6.6.0-101.0.0.93.oe2403.aarch64",
					"openEuler-24.03-LTS:python3-perf-6.6.0-101.0.0.93.oe2403.aarch64",
					"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-101.0.0.93.oe2403.aarch64",
					"openEuler-24.03-LTS:bpftool-6.6.0-101.0.0.93.oe2403.x86_64",
					"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-101.0.0.93.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-6.6.0-101.0.0.93.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-101.0.0.93.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-debugsource-6.6.0-101.0.0.93.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-devel-6.6.0-101.0.0.93.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-headers-6.6.0-101.0.0.93.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-source-6.6.0-101.0.0.93.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-tools-6.6.0-101.0.0.93.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-101.0.0.93.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-101.0.0.93.oe2403.x86_64",
					"openEuler-24.03-LTS:perf-6.6.0-101.0.0.93.oe2403.x86_64",
					"openEuler-24.03-LTS:perf-debuginfo-6.6.0-101.0.0.93.oe2403.x86_64",
					"openEuler-24.03-LTS:python3-perf-6.6.0-101.0.0.93.oe2403.x86_64",
					"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-101.0.0.93.oe2403.x86_64"
				]
			},
			"remediations":[
				{
					"product_ids":[
						"openEuler-24.03-LTS:kernel-6.6.0-101.0.0.93.oe2403.src",
						"openEuler-24.03-LTS:bpftool-6.6.0-101.0.0.93.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-101.0.0.93.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-6.6.0-101.0.0.93.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-101.0.0.93.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-101.0.0.93.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-101.0.0.93.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-101.0.0.93.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-101.0.0.93.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-101.0.0.93.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-101.0.0.93.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-101.0.0.93.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-6.6.0-101.0.0.93.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-101.0.0.93.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-101.0.0.93.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-101.0.0.93.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-6.6.0-101.0.0.93.oe2403.x86_64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-101.0.0.93.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-6.6.0-101.0.0.93.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-101.0.0.93.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-101.0.0.93.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-101.0.0.93.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-101.0.0.93.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-101.0.0.93.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-101.0.0.93.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-101.0.0.93.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-101.0.0.93.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-6.6.0-101.0.0.93.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-101.0.0.93.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-101.0.0.93.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-101.0.0.93.oe2403.x86_64"
					],
					"details":"kernel security update",
					"category":"vendor_fix",
					"url":"https://www.openeuler.org/zh/security/security-bulletins/detail/?id=openEuler-SA-2025-1874"
				}
			],
			"scores":[
				{
					"cvss_v3":{
						"baseSeverity":"LOW",
						"baseScore":3.9,
						"vectorString":"CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:L/I:L/A:L",
						"version":"3.1"
					},
					"products":[
						"openEuler-24.03-LTS:kernel-6.6.0-101.0.0.93.oe2403.src",
						"openEuler-24.03-LTS:bpftool-6.6.0-101.0.0.93.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-101.0.0.93.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-6.6.0-101.0.0.93.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-101.0.0.93.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-101.0.0.93.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-101.0.0.93.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-101.0.0.93.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-101.0.0.93.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-101.0.0.93.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-101.0.0.93.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-101.0.0.93.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-6.6.0-101.0.0.93.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-101.0.0.93.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-101.0.0.93.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-101.0.0.93.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-6.6.0-101.0.0.93.oe2403.x86_64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-101.0.0.93.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-6.6.0-101.0.0.93.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-101.0.0.93.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-101.0.0.93.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-101.0.0.93.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-101.0.0.93.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-101.0.0.93.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-101.0.0.93.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-101.0.0.93.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-101.0.0.93.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-6.6.0-101.0.0.93.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-101.0.0.93.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-101.0.0.93.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-101.0.0.93.oe2403.x86_64"
					]
				}
			],
			"threats":[
				{
					"details":"Low",
					"category":"impact"
				}
			],
			"title":"CVE-2025-38197"
		},
		{
			"cve":"CVE-2025-38212",
			"notes":[
				{
					"text":"A vulnerability was found in Linux Kernel up to 6.15.3 (Operating System). It has been rated as critical.Using CWE to declare the problem leads to CWE-416. Referencing memory after it has been freed can cause a program to crash, use unexpected values, or execute code.Impacted is confidentiality, integrity, and availability.Upgrading to version 5.4.295, 5.10.239, 5.15.186, 6.1.142, 6.6.95, 6.12.35, 6.15.4 or 6.16-rc1 eliminates this vulnerability. Applying the patch 5f1e1573bf103303944fd7225559de5d8297539c/b968ba8bfd9f90914957bbbd815413bf6a98eca7/74bc813d11c30e28fc5261dc877cca662ccfac68/78297d53d3878d43c1d627d20cd09f611fa4b91d/5180561afff8e0f029073c8c8117c95c6512d1f9/68c173ea138b66d7dd1fd980c9bc578a18e11884/b0b6bf90ce2699a574b3683e22c44d0dcdd7a057/d66adabe91803ef34a8b90613c81267b5ded1472 is able to eliminate this problem. The bugfix is ready for download at git.kernel.org. The best possible mitigation is suggested to be upgrading to the latest version.The vulnerability is also documented in the vulnerability database at EUVD (EUVD-2025-20044).",
					"category":"description",
					"title":"Vulnerability Description"
				}
			],
			"product_status":{
				"fixed":[
					"openEuler-24.03-LTS:kernel-6.6.0-101.0.0.93.oe2403.src",
					"openEuler-24.03-LTS:bpftool-6.6.0-101.0.0.93.oe2403.aarch64",
					"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-101.0.0.93.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-6.6.0-101.0.0.93.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-101.0.0.93.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-debugsource-6.6.0-101.0.0.93.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-devel-6.6.0-101.0.0.93.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-headers-6.6.0-101.0.0.93.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-source-6.6.0-101.0.0.93.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-tools-6.6.0-101.0.0.93.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-101.0.0.93.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-101.0.0.93.oe2403.aarch64",
					"openEuler-24.03-LTS:perf-6.6.0-101.0.0.93.oe2403.aarch64",
					"openEuler-24.03-LTS:perf-debuginfo-6.6.0-101.0.0.93.oe2403.aarch64",
					"openEuler-24.03-LTS:python3-perf-6.6.0-101.0.0.93.oe2403.aarch64",
					"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-101.0.0.93.oe2403.aarch64",
					"openEuler-24.03-LTS:bpftool-6.6.0-101.0.0.93.oe2403.x86_64",
					"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-101.0.0.93.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-6.6.0-101.0.0.93.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-101.0.0.93.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-debugsource-6.6.0-101.0.0.93.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-devel-6.6.0-101.0.0.93.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-headers-6.6.0-101.0.0.93.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-source-6.6.0-101.0.0.93.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-tools-6.6.0-101.0.0.93.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-101.0.0.93.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-101.0.0.93.oe2403.x86_64",
					"openEuler-24.03-LTS:perf-6.6.0-101.0.0.93.oe2403.x86_64",
					"openEuler-24.03-LTS:perf-debuginfo-6.6.0-101.0.0.93.oe2403.x86_64",
					"openEuler-24.03-LTS:python3-perf-6.6.0-101.0.0.93.oe2403.x86_64",
					"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-101.0.0.93.oe2403.x86_64"
				]
			},
			"remediations":[
				{
					"product_ids":[
						"openEuler-24.03-LTS:kernel-6.6.0-101.0.0.93.oe2403.src",
						"openEuler-24.03-LTS:bpftool-6.6.0-101.0.0.93.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-101.0.0.93.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-6.6.0-101.0.0.93.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-101.0.0.93.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-101.0.0.93.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-101.0.0.93.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-101.0.0.93.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-101.0.0.93.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-101.0.0.93.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-101.0.0.93.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-101.0.0.93.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-6.6.0-101.0.0.93.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-101.0.0.93.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-101.0.0.93.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-101.0.0.93.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-6.6.0-101.0.0.93.oe2403.x86_64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-101.0.0.93.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-6.6.0-101.0.0.93.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-101.0.0.93.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-101.0.0.93.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-101.0.0.93.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-101.0.0.93.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-101.0.0.93.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-101.0.0.93.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-101.0.0.93.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-101.0.0.93.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-6.6.0-101.0.0.93.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-101.0.0.93.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-101.0.0.93.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-101.0.0.93.oe2403.x86_64"
					],
					"details":"kernel security update",
					"category":"vendor_fix",
					"url":"https://www.openeuler.org/zh/security/security-bulletins/detail/?id=openEuler-SA-2025-1874"
				}
			],
			"scores":[
				{
					"cvss_v3":{
						"baseSeverity":"HIGH",
						"baseScore":7.0,
						"vectorString":"CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
						"version":"3.1"
					},
					"products":[
						"openEuler-24.03-LTS:kernel-6.6.0-101.0.0.93.oe2403.src",
						"openEuler-24.03-LTS:bpftool-6.6.0-101.0.0.93.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-101.0.0.93.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-6.6.0-101.0.0.93.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-101.0.0.93.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-101.0.0.93.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-101.0.0.93.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-101.0.0.93.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-101.0.0.93.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-101.0.0.93.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-101.0.0.93.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-101.0.0.93.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-6.6.0-101.0.0.93.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-101.0.0.93.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-101.0.0.93.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-101.0.0.93.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-6.6.0-101.0.0.93.oe2403.x86_64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-101.0.0.93.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-6.6.0-101.0.0.93.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-101.0.0.93.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-101.0.0.93.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-101.0.0.93.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-101.0.0.93.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-101.0.0.93.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-101.0.0.93.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-101.0.0.93.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-101.0.0.93.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-6.6.0-101.0.0.93.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-101.0.0.93.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-101.0.0.93.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-101.0.0.93.oe2403.x86_64"
					]
				}
			],
			"threats":[
				{
					"details":"High",
					"category":"impact"
				}
			],
			"title":"CVE-2025-38212"
		},
		{
			"cve":"CVE-2025-38229",
			"notes":[
				{
					"text":"In the Linux kernel, the following vulnerability has been resolved:\n\nmedia: cxusb: no longer judge rbuf when the write fails\n\nsyzbot reported a uninit-value in cxusb_i2c_xfer. [1]\n\nOnly when the write operation of usb_bulk_msg() in dvb_usb_generic_rw()\nsucceeds and rlen is greater than 0, the read operation of usb_bulk_msg()\nwill be executed to read rlen bytes of data from the dvb device into the\nrbuf.\n\nIn this case, although rlen is 1, the write operation failed which resulted\nin the dvb read operation not being executed, and ultimately variable i was\nnot initialized.\n\n[1]\nBUG: KMSAN: uninit-value in cxusb_gpio_tuner drivers/media/usb/dvb-usb/cxusb.c:124 [inline]\nBUG: KMSAN: uninit-value in cxusb_i2c_xfer+0x153a/0x1a60 drivers/media/usb/dvb-usb/cxusb.c:196\n cxusb_gpio_tuner drivers/media/usb/dvb-usb/cxusb.c:124 [inline]\n cxusb_i2c_xfer+0x153a/0x1a60 drivers/media/usb/dvb-usb/cxusb.c:196\n __i2c_transfer+0xe25/0x3150 drivers/i2c/i2c-core-base.c:-1\n i2c_transfer+0x317/0x4a0 drivers/i2c/i2c-core-base.c:2315\n i2c_transfer_buffer_flags+0x125/0x1e0 drivers/i2c/i2c-core-base.c:2343\n i2c_master_send include/linux/i2c.h:109 [inline]\n i2cdev_write+0x210/0x280 drivers/i2c/i2c-dev.c:183\n do_loop_readv_writev fs/read_write.c:848 [inline]\n vfs_writev+0x963/0x14e0 fs/read_write.c:1057\n do_writev+0x247/0x5c0 fs/read_write.c:1101\n __do_sys_writev fs/read_write.c:1169 [inline]\n __se_sys_writev fs/read_write.c:1166 [inline]\n __x64_sys_writev+0x98/0xe0 fs/read_write.c:1166\n x64_sys_call+0x2229/0x3c80 arch/x86/include/generated/asm/syscalls_64.h:21\n do_syscall_x64 arch/x86/entry/syscall_64.c:63 [inline]\n do_syscall_64+0xcd/0x1e0 arch/x86/entry/syscall_64.c:94\n entry_SYSCALL_64_after_hwframe+0x77/0x7f",
					"category":"description",
					"title":"Vulnerability Description"
				}
			],
			"product_status":{
				"fixed":[
					"openEuler-24.03-LTS:kernel-6.6.0-101.0.0.93.oe2403.src",
					"openEuler-24.03-LTS:bpftool-6.6.0-101.0.0.93.oe2403.aarch64",
					"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-101.0.0.93.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-6.6.0-101.0.0.93.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-101.0.0.93.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-debugsource-6.6.0-101.0.0.93.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-devel-6.6.0-101.0.0.93.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-headers-6.6.0-101.0.0.93.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-source-6.6.0-101.0.0.93.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-tools-6.6.0-101.0.0.93.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-101.0.0.93.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-101.0.0.93.oe2403.aarch64",
					"openEuler-24.03-LTS:perf-6.6.0-101.0.0.93.oe2403.aarch64",
					"openEuler-24.03-LTS:perf-debuginfo-6.6.0-101.0.0.93.oe2403.aarch64",
					"openEuler-24.03-LTS:python3-perf-6.6.0-101.0.0.93.oe2403.aarch64",
					"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-101.0.0.93.oe2403.aarch64",
					"openEuler-24.03-LTS:bpftool-6.6.0-101.0.0.93.oe2403.x86_64",
					"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-101.0.0.93.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-6.6.0-101.0.0.93.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-101.0.0.93.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-debugsource-6.6.0-101.0.0.93.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-devel-6.6.0-101.0.0.93.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-headers-6.6.0-101.0.0.93.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-source-6.6.0-101.0.0.93.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-tools-6.6.0-101.0.0.93.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-101.0.0.93.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-101.0.0.93.oe2403.x86_64",
					"openEuler-24.03-LTS:perf-6.6.0-101.0.0.93.oe2403.x86_64",
					"openEuler-24.03-LTS:perf-debuginfo-6.6.0-101.0.0.93.oe2403.x86_64",
					"openEuler-24.03-LTS:python3-perf-6.6.0-101.0.0.93.oe2403.x86_64",
					"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-101.0.0.93.oe2403.x86_64"
				]
			},
			"remediations":[
				{
					"product_ids":[
						"openEuler-24.03-LTS:kernel-6.6.0-101.0.0.93.oe2403.src",
						"openEuler-24.03-LTS:bpftool-6.6.0-101.0.0.93.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-101.0.0.93.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-6.6.0-101.0.0.93.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-101.0.0.93.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-101.0.0.93.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-101.0.0.93.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-101.0.0.93.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-101.0.0.93.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-101.0.0.93.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-101.0.0.93.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-101.0.0.93.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-6.6.0-101.0.0.93.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-101.0.0.93.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-101.0.0.93.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-101.0.0.93.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-6.6.0-101.0.0.93.oe2403.x86_64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-101.0.0.93.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-6.6.0-101.0.0.93.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-101.0.0.93.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-101.0.0.93.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-101.0.0.93.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-101.0.0.93.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-101.0.0.93.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-101.0.0.93.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-101.0.0.93.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-101.0.0.93.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-6.6.0-101.0.0.93.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-101.0.0.93.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-101.0.0.93.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-101.0.0.93.oe2403.x86_64"
					],
					"details":"kernel security update",
					"category":"vendor_fix",
					"url":"https://www.openeuler.org/zh/security/security-bulletins/detail/?id=openEuler-SA-2025-1874"
				}
			],
			"scores":[
				{
					"cvss_v3":{
						"baseSeverity":"HIGH",
						"baseScore":7.0,
						"vectorString":"CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
						"version":"3.1"
					},
					"products":[
						"openEuler-24.03-LTS:kernel-6.6.0-101.0.0.93.oe2403.src",
						"openEuler-24.03-LTS:bpftool-6.6.0-101.0.0.93.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-101.0.0.93.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-6.6.0-101.0.0.93.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-101.0.0.93.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-101.0.0.93.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-101.0.0.93.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-101.0.0.93.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-101.0.0.93.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-101.0.0.93.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-101.0.0.93.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-101.0.0.93.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-6.6.0-101.0.0.93.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-101.0.0.93.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-101.0.0.93.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-101.0.0.93.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-6.6.0-101.0.0.93.oe2403.x86_64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-101.0.0.93.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-6.6.0-101.0.0.93.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-101.0.0.93.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-101.0.0.93.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-101.0.0.93.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-101.0.0.93.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-101.0.0.93.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-101.0.0.93.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-101.0.0.93.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-101.0.0.93.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-6.6.0-101.0.0.93.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-101.0.0.93.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-101.0.0.93.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-101.0.0.93.oe2403.x86_64"
					]
				}
			],
			"threats":[
				{
					"details":"High",
					"category":"impact"
				}
			],
			"title":"CVE-2025-38229"
		},
		{
			"cve":"CVE-2025-38279",
			"notes":[
				{
					"text":"A vulnerability was found in Linux Kernel up to 6.15.2/fc2778c42f99c7de52fc004157b3c3ee4dcc208a (Operating System). It has been rated as problematic.Impacted is confidentiality, integrity, and availability.Upgrading to version 6.15.3 or 6.16-rc1 eliminates this vulnerability. Applying the patch ac49b7560b4b08b1e4043a29214cc7ad77644c00/e2d2115e56c4a02377189bfc3a9a7933552a7b0f is able to eliminate this problem. The bugfix is ready for download at git.kernel.org. The best possible mitigation is suggested to be upgrading to the latest version.",
					"category":"description",
					"title":"Vulnerability Description"
				}
			],
			"product_status":{
				"fixed":[
					"openEuler-24.03-LTS:kernel-6.6.0-101.0.0.93.oe2403.src",
					"openEuler-24.03-LTS:bpftool-6.6.0-101.0.0.93.oe2403.aarch64",
					"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-101.0.0.93.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-6.6.0-101.0.0.93.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-101.0.0.93.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-debugsource-6.6.0-101.0.0.93.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-devel-6.6.0-101.0.0.93.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-headers-6.6.0-101.0.0.93.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-source-6.6.0-101.0.0.93.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-tools-6.6.0-101.0.0.93.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-101.0.0.93.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-101.0.0.93.oe2403.aarch64",
					"openEuler-24.03-LTS:perf-6.6.0-101.0.0.93.oe2403.aarch64",
					"openEuler-24.03-LTS:perf-debuginfo-6.6.0-101.0.0.93.oe2403.aarch64",
					"openEuler-24.03-LTS:python3-perf-6.6.0-101.0.0.93.oe2403.aarch64",
					"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-101.0.0.93.oe2403.aarch64",
					"openEuler-24.03-LTS:bpftool-6.6.0-101.0.0.93.oe2403.x86_64",
					"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-101.0.0.93.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-6.6.0-101.0.0.93.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-101.0.0.93.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-debugsource-6.6.0-101.0.0.93.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-devel-6.6.0-101.0.0.93.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-headers-6.6.0-101.0.0.93.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-source-6.6.0-101.0.0.93.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-tools-6.6.0-101.0.0.93.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-101.0.0.93.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-101.0.0.93.oe2403.x86_64",
					"openEuler-24.03-LTS:perf-6.6.0-101.0.0.93.oe2403.x86_64",
					"openEuler-24.03-LTS:perf-debuginfo-6.6.0-101.0.0.93.oe2403.x86_64",
					"openEuler-24.03-LTS:python3-perf-6.6.0-101.0.0.93.oe2403.x86_64",
					"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-101.0.0.93.oe2403.x86_64"
				]
			},
			"remediations":[
				{
					"product_ids":[
						"openEuler-24.03-LTS:kernel-6.6.0-101.0.0.93.oe2403.src",
						"openEuler-24.03-LTS:bpftool-6.6.0-101.0.0.93.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-101.0.0.93.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-6.6.0-101.0.0.93.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-101.0.0.93.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-101.0.0.93.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-101.0.0.93.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-101.0.0.93.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-101.0.0.93.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-101.0.0.93.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-101.0.0.93.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-101.0.0.93.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-6.6.0-101.0.0.93.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-101.0.0.93.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-101.0.0.93.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-101.0.0.93.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-6.6.0-101.0.0.93.oe2403.x86_64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-101.0.0.93.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-6.6.0-101.0.0.93.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-101.0.0.93.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-101.0.0.93.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-101.0.0.93.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-101.0.0.93.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-101.0.0.93.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-101.0.0.93.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-101.0.0.93.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-101.0.0.93.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-6.6.0-101.0.0.93.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-101.0.0.93.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-101.0.0.93.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-101.0.0.93.oe2403.x86_64"
					],
					"details":"kernel security update",
					"category":"vendor_fix",
					"url":"https://www.openeuler.org/zh/security/security-bulletins/detail/?id=openEuler-SA-2025-1874"
				}
			],
			"scores":[
				{
					"cvss_v3":{
						"baseSeverity":"LOW",
						"baseScore":3.9,
						"vectorString":"CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:L/I:L/A:L",
						"version":"3.1"
					},
					"products":[
						"openEuler-24.03-LTS:kernel-6.6.0-101.0.0.93.oe2403.src",
						"openEuler-24.03-LTS:bpftool-6.6.0-101.0.0.93.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-101.0.0.93.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-6.6.0-101.0.0.93.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-101.0.0.93.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-101.0.0.93.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-101.0.0.93.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-101.0.0.93.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-101.0.0.93.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-101.0.0.93.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-101.0.0.93.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-101.0.0.93.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-6.6.0-101.0.0.93.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-101.0.0.93.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-101.0.0.93.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-101.0.0.93.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-6.6.0-101.0.0.93.oe2403.x86_64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-101.0.0.93.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-6.6.0-101.0.0.93.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-101.0.0.93.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-101.0.0.93.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-101.0.0.93.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-101.0.0.93.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-101.0.0.93.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-101.0.0.93.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-101.0.0.93.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-101.0.0.93.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-6.6.0-101.0.0.93.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-101.0.0.93.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-101.0.0.93.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-101.0.0.93.oe2403.x86_64"
					]
				}
			],
			"threats":[
				{
					"details":"Low",
					"category":"impact"
				}
			],
			"title":"CVE-2025-38279"
		},
		{
			"cve":"CVE-2025-38280",
			"notes":[
				{
					"text":"A vulnerability, which was classified as problematic, was found in Linux Kernel (Operating System).CWE is classifying the issue as CWE-74. The product constructs all or part of a command, data structure, or record using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify how it is parsed or interpreted when it is sent to a downstream component.This is going to have an impact on confidentiality, integrity, and availability.Upgrading to version 5.15.186, 6.1.142, 6.6.94, 6.12.34, 6.15.3 or 6.16-rc1 eliminates this vulnerability. Applying the patch e7fb4ebee6e900899d2b2e5852c3e2eafcbcad66/ef92b96530d1731d9ac167bc7c193c683cd78fff/6f639c25bfad17d9fd7379ab91ff9678ea9aac85/2bc6dffb4b72d53d6a6ada510269bf548c3f7ae0/0b9bb52796b239de6792d0d68cdc6eb505ebff96/86bc9c742426a16b52a10ef61f5b721aecca2344 is able to eliminate this problem. The bugfix is ready for download at git.kernel.org. The best possible mitigation is suggested to be upgrading to the latest version.",
					"category":"description",
					"title":"Vulnerability Description"
				}
			],
			"product_status":{
				"fixed":[
					"openEuler-24.03-LTS:kernel-6.6.0-101.0.0.93.oe2403.src",
					"openEuler-24.03-LTS:bpftool-6.6.0-101.0.0.93.oe2403.aarch64",
					"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-101.0.0.93.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-6.6.0-101.0.0.93.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-101.0.0.93.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-debugsource-6.6.0-101.0.0.93.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-devel-6.6.0-101.0.0.93.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-headers-6.6.0-101.0.0.93.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-source-6.6.0-101.0.0.93.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-tools-6.6.0-101.0.0.93.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-101.0.0.93.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-101.0.0.93.oe2403.aarch64",
					"openEuler-24.03-LTS:perf-6.6.0-101.0.0.93.oe2403.aarch64",
					"openEuler-24.03-LTS:perf-debuginfo-6.6.0-101.0.0.93.oe2403.aarch64",
					"openEuler-24.03-LTS:python3-perf-6.6.0-101.0.0.93.oe2403.aarch64",
					"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-101.0.0.93.oe2403.aarch64",
					"openEuler-24.03-LTS:bpftool-6.6.0-101.0.0.93.oe2403.x86_64",
					"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-101.0.0.93.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-6.6.0-101.0.0.93.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-101.0.0.93.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-debugsource-6.6.0-101.0.0.93.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-devel-6.6.0-101.0.0.93.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-headers-6.6.0-101.0.0.93.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-source-6.6.0-101.0.0.93.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-tools-6.6.0-101.0.0.93.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-101.0.0.93.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-101.0.0.93.oe2403.x86_64",
					"openEuler-24.03-LTS:perf-6.6.0-101.0.0.93.oe2403.x86_64",
					"openEuler-24.03-LTS:perf-debuginfo-6.6.0-101.0.0.93.oe2403.x86_64",
					"openEuler-24.03-LTS:python3-perf-6.6.0-101.0.0.93.oe2403.x86_64",
					"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-101.0.0.93.oe2403.x86_64"
				]
			},
			"remediations":[
				{
					"product_ids":[
						"openEuler-24.03-LTS:kernel-6.6.0-101.0.0.93.oe2403.src",
						"openEuler-24.03-LTS:bpftool-6.6.0-101.0.0.93.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-101.0.0.93.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-6.6.0-101.0.0.93.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-101.0.0.93.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-101.0.0.93.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-101.0.0.93.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-101.0.0.93.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-101.0.0.93.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-101.0.0.93.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-101.0.0.93.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-101.0.0.93.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-6.6.0-101.0.0.93.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-101.0.0.93.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-101.0.0.93.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-101.0.0.93.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-6.6.0-101.0.0.93.oe2403.x86_64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-101.0.0.93.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-6.6.0-101.0.0.93.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-101.0.0.93.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-101.0.0.93.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-101.0.0.93.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-101.0.0.93.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-101.0.0.93.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-101.0.0.93.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-101.0.0.93.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-101.0.0.93.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-6.6.0-101.0.0.93.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-101.0.0.93.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-101.0.0.93.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-101.0.0.93.oe2403.x86_64"
					],
					"details":"kernel security update",
					"category":"vendor_fix",
					"url":"https://www.openeuler.org/zh/security/security-bulletins/detail/?id=openEuler-SA-2025-1874"
				}
			],
			"scores":[
				{
					"cvss_v3":{
						"baseSeverity":"LOW",
						"baseScore":3.9,
						"vectorString":"CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:L/I:L/A:L",
						"version":"3.1"
					},
					"products":[
						"openEuler-24.03-LTS:kernel-6.6.0-101.0.0.93.oe2403.src",
						"openEuler-24.03-LTS:bpftool-6.6.0-101.0.0.93.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-101.0.0.93.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-6.6.0-101.0.0.93.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-101.0.0.93.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-101.0.0.93.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-101.0.0.93.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-101.0.0.93.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-101.0.0.93.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-101.0.0.93.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-101.0.0.93.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-101.0.0.93.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-6.6.0-101.0.0.93.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-101.0.0.93.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-101.0.0.93.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-101.0.0.93.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-6.6.0-101.0.0.93.oe2403.x86_64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-101.0.0.93.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-6.6.0-101.0.0.93.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-101.0.0.93.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-101.0.0.93.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-101.0.0.93.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-101.0.0.93.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-101.0.0.93.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-101.0.0.93.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-101.0.0.93.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-101.0.0.93.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-6.6.0-101.0.0.93.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-101.0.0.93.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-101.0.0.93.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-101.0.0.93.oe2403.x86_64"
					]
				}
			],
			"threats":[
				{
					"details":"Low",
					"category":"impact"
				}
			],
			"title":"CVE-2025-38280"
		},
		{
			"cve":"CVE-2025-38285",
			"notes":[
				{
					"text":"A vulnerability has been found in Linux Kernel up to 6.15.2 (Operating System) and classified as critical.The CWE definition for the vulnerability is CWE-121. A stack-based buffer overflow condition is a condition where the buffer being overwritten is allocated on the stack (i.e., is a local variable or, rarely, a parameter to a function).As an impact it is known to affect confidentiality, integrity, and availability.Upgrading to version 5.4.295, 5.10.239, 5.15.186, 6.1.142, 6.6.94, 6.12.34, 6.15.3 or 6.16-rc1 eliminates this vulnerability. Applying the patch 44ebe361abb322d2afd77930fa767a99f271c4d1/147ea936fc6fa8fe0c93f0df918803a5375ca535/ee90be48edb3dac612e0b7f5332482a9e8be2696/e167414beabb1e941fe563a96becc98627d5bdf6/6d8f39875a10a194051c3eaefebc7ac06a34aaf3/c98cdf6795a36bca163ebb40411fef1687b9eb13/18e8cbbae79cb35bdce8a01c889827b9799c762e/3880cdbed1c4607e378f58fa924c5d6df900d1d3 is able to eliminate this problem. The bugfix is ready for download at git.kernel.org. The best possible mitigation is suggested to be upgrading to the latest version.",
					"category":"description",
					"title":"Vulnerability Description"
				}
			],
			"product_status":{
				"fixed":[
					"openEuler-24.03-LTS:kernel-6.6.0-101.0.0.93.oe2403.src",
					"openEuler-24.03-LTS:bpftool-6.6.0-101.0.0.93.oe2403.aarch64",
					"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-101.0.0.93.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-6.6.0-101.0.0.93.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-101.0.0.93.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-debugsource-6.6.0-101.0.0.93.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-devel-6.6.0-101.0.0.93.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-headers-6.6.0-101.0.0.93.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-source-6.6.0-101.0.0.93.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-tools-6.6.0-101.0.0.93.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-101.0.0.93.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-101.0.0.93.oe2403.aarch64",
					"openEuler-24.03-LTS:perf-6.6.0-101.0.0.93.oe2403.aarch64",
					"openEuler-24.03-LTS:perf-debuginfo-6.6.0-101.0.0.93.oe2403.aarch64",
					"openEuler-24.03-LTS:python3-perf-6.6.0-101.0.0.93.oe2403.aarch64",
					"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-101.0.0.93.oe2403.aarch64",
					"openEuler-24.03-LTS:bpftool-6.6.0-101.0.0.93.oe2403.x86_64",
					"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-101.0.0.93.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-6.6.0-101.0.0.93.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-101.0.0.93.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-debugsource-6.6.0-101.0.0.93.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-devel-6.6.0-101.0.0.93.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-headers-6.6.0-101.0.0.93.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-source-6.6.0-101.0.0.93.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-tools-6.6.0-101.0.0.93.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-101.0.0.93.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-101.0.0.93.oe2403.x86_64",
					"openEuler-24.03-LTS:perf-6.6.0-101.0.0.93.oe2403.x86_64",
					"openEuler-24.03-LTS:perf-debuginfo-6.6.0-101.0.0.93.oe2403.x86_64",
					"openEuler-24.03-LTS:python3-perf-6.6.0-101.0.0.93.oe2403.x86_64",
					"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-101.0.0.93.oe2403.x86_64"
				]
			},
			"remediations":[
				{
					"product_ids":[
						"openEuler-24.03-LTS:kernel-6.6.0-101.0.0.93.oe2403.src",
						"openEuler-24.03-LTS:bpftool-6.6.0-101.0.0.93.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-101.0.0.93.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-6.6.0-101.0.0.93.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-101.0.0.93.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-101.0.0.93.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-101.0.0.93.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-101.0.0.93.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-101.0.0.93.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-101.0.0.93.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-101.0.0.93.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-101.0.0.93.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-6.6.0-101.0.0.93.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-101.0.0.93.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-101.0.0.93.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-101.0.0.93.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-6.6.0-101.0.0.93.oe2403.x86_64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-101.0.0.93.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-6.6.0-101.0.0.93.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-101.0.0.93.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-101.0.0.93.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-101.0.0.93.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-101.0.0.93.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-101.0.0.93.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-101.0.0.93.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-101.0.0.93.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-101.0.0.93.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-6.6.0-101.0.0.93.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-101.0.0.93.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-101.0.0.93.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-101.0.0.93.oe2403.x86_64"
					],
					"details":"kernel security update",
					"category":"vendor_fix",
					"url":"https://www.openeuler.org/zh/security/security-bulletins/detail/?id=openEuler-SA-2025-1874"
				}
			],
			"scores":[
				{
					"cvss_v3":{
						"baseSeverity":"HIGH",
						"baseScore":7.0,
						"vectorString":"CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
						"version":"3.1"
					},
					"products":[
						"openEuler-24.03-LTS:kernel-6.6.0-101.0.0.93.oe2403.src",
						"openEuler-24.03-LTS:bpftool-6.6.0-101.0.0.93.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-101.0.0.93.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-6.6.0-101.0.0.93.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-101.0.0.93.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-101.0.0.93.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-101.0.0.93.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-101.0.0.93.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-101.0.0.93.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-101.0.0.93.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-101.0.0.93.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-101.0.0.93.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-6.6.0-101.0.0.93.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-101.0.0.93.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-101.0.0.93.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-101.0.0.93.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-6.6.0-101.0.0.93.oe2403.x86_64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-101.0.0.93.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-6.6.0-101.0.0.93.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-101.0.0.93.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-101.0.0.93.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-101.0.0.93.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-101.0.0.93.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-101.0.0.93.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-101.0.0.93.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-101.0.0.93.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-101.0.0.93.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-6.6.0-101.0.0.93.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-101.0.0.93.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-101.0.0.93.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-101.0.0.93.oe2403.x86_64"
					]
				}
			],
			"threats":[
				{
					"details":"High",
					"category":"impact"
				}
			],
			"title":"CVE-2025-38285"
		},
		{
			"cve":"CVE-2025-38320",
			"notes":[
				{
					"text":"A vulnerability was found in Linux Kernel up to 6.16-rc2 (Operating System). It has been declared as problematic.The CWE definition for the vulnerability is CWE-125. The product reads data past the end, or before the beginning, of the intended buffer.As an impact it is known to affect confidentiality.Upgrading to version 5.4.295, 5.10.239, 5.15.186, 6.1.142, 6.6.95, 6.12.35, 6.15.4 or 6.16-rc3 eliminates this vulnerability. Applying the patch 64773b3ea09235168a549a195cba43bb867c4a17/67abac27d806e8f9d4226ec1528540cf73af673a/92750bfe7b0d8dbcaf578c091a65eda1c5f9ad38/01f91d415a8375d85e0c7d3615cd4a168308bb7c/21da6d3561f373898349ca7167c9811c020da695/22f935bc86bdfbde04009f05eee191d220cd8c89/422e565b7889ebfd9c8705a3fc786642afe61fca/39dfc971e42d886e7df01371cd1bef505076d84c is able to eliminate this problem. The bugfix is ready for download at git.kernel.org. The best possible mitigation is suggested to be upgrading to the latest version.The vulnerability is also documented in the vulnerability database at EUVD (EUVD-2025-20926).",
					"category":"description",
					"title":"Vulnerability Description"
				}
			],
			"product_status":{
				"fixed":[
					"openEuler-24.03-LTS:kernel-6.6.0-101.0.0.93.oe2403.src",
					"openEuler-24.03-LTS:bpftool-6.6.0-101.0.0.93.oe2403.aarch64",
					"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-101.0.0.93.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-6.6.0-101.0.0.93.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-101.0.0.93.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-debugsource-6.6.0-101.0.0.93.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-devel-6.6.0-101.0.0.93.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-headers-6.6.0-101.0.0.93.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-source-6.6.0-101.0.0.93.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-tools-6.6.0-101.0.0.93.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-101.0.0.93.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-101.0.0.93.oe2403.aarch64",
					"openEuler-24.03-LTS:perf-6.6.0-101.0.0.93.oe2403.aarch64",
					"openEuler-24.03-LTS:perf-debuginfo-6.6.0-101.0.0.93.oe2403.aarch64",
					"openEuler-24.03-LTS:python3-perf-6.6.0-101.0.0.93.oe2403.aarch64",
					"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-101.0.0.93.oe2403.aarch64",
					"openEuler-24.03-LTS:bpftool-6.6.0-101.0.0.93.oe2403.x86_64",
					"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-101.0.0.93.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-6.6.0-101.0.0.93.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-101.0.0.93.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-debugsource-6.6.0-101.0.0.93.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-devel-6.6.0-101.0.0.93.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-headers-6.6.0-101.0.0.93.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-source-6.6.0-101.0.0.93.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-tools-6.6.0-101.0.0.93.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-101.0.0.93.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-101.0.0.93.oe2403.x86_64",
					"openEuler-24.03-LTS:perf-6.6.0-101.0.0.93.oe2403.x86_64",
					"openEuler-24.03-LTS:perf-debuginfo-6.6.0-101.0.0.93.oe2403.x86_64",
					"openEuler-24.03-LTS:python3-perf-6.6.0-101.0.0.93.oe2403.x86_64",
					"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-101.0.0.93.oe2403.x86_64"
				]
			},
			"remediations":[
				{
					"product_ids":[
						"openEuler-24.03-LTS:kernel-6.6.0-101.0.0.93.oe2403.src",
						"openEuler-24.03-LTS:bpftool-6.6.0-101.0.0.93.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-101.0.0.93.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-6.6.0-101.0.0.93.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-101.0.0.93.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-101.0.0.93.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-101.0.0.93.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-101.0.0.93.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-101.0.0.93.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-101.0.0.93.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-101.0.0.93.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-101.0.0.93.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-6.6.0-101.0.0.93.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-101.0.0.93.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-101.0.0.93.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-101.0.0.93.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-6.6.0-101.0.0.93.oe2403.x86_64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-101.0.0.93.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-6.6.0-101.0.0.93.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-101.0.0.93.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-101.0.0.93.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-101.0.0.93.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-101.0.0.93.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-101.0.0.93.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-101.0.0.93.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-101.0.0.93.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-101.0.0.93.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-6.6.0-101.0.0.93.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-101.0.0.93.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-101.0.0.93.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-101.0.0.93.oe2403.x86_64"
					],
					"details":"kernel security update",
					"category":"vendor_fix",
					"url":"https://www.openeuler.org/zh/security/security-bulletins/detail/?id=openEuler-SA-2025-1874"
				}
			],
			"scores":[
				{
					"cvss_v3":{
						"baseSeverity":"HIGH",
						"baseScore":7.0,
						"vectorString":"CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
						"version":"3.1"
					},
					"products":[
						"openEuler-24.03-LTS:kernel-6.6.0-101.0.0.93.oe2403.src",
						"openEuler-24.03-LTS:bpftool-6.6.0-101.0.0.93.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-101.0.0.93.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-6.6.0-101.0.0.93.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-101.0.0.93.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-101.0.0.93.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-101.0.0.93.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-101.0.0.93.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-101.0.0.93.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-101.0.0.93.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-101.0.0.93.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-101.0.0.93.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-6.6.0-101.0.0.93.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-101.0.0.93.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-101.0.0.93.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-101.0.0.93.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-6.6.0-101.0.0.93.oe2403.x86_64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-101.0.0.93.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-6.6.0-101.0.0.93.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-101.0.0.93.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-101.0.0.93.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-101.0.0.93.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-101.0.0.93.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-101.0.0.93.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-101.0.0.93.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-101.0.0.93.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-101.0.0.93.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-6.6.0-101.0.0.93.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-101.0.0.93.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-101.0.0.93.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-101.0.0.93.oe2403.x86_64"
					]
				}
			],
			"threats":[
				{
					"details":"High",
					"category":"impact"
				}
			],
			"title":"CVE-2025-38320"
		},
		{
			"cve":"CVE-2025-38322",
			"notes":[
				{
					"text":"A vulnerability was found in Linux Kernel up to 6.15.3/6.16-rc2 (Operating System). It has been rated as critical.Using CWE to declare the problem leads to CWE-404. The product does not release or incorrectly releases a resource before it is made available for re-use.Impacted is availability.Upgrading to version 6.15.4 or 6.16-rc3 eliminates this vulnerability. Applying the patch a85cc69acdcb05f8cd226b8ea0778b8e2e887e6f/b0823d5fbacb1c551d793cbfe7af24e0d1fa45ed is able to eliminate this problem. The bugfix is ready for download at git.kernel.org. The best possible mitigation is suggested to be upgrading to the latest version.",
					"category":"description",
					"title":"Vulnerability Description"
				}
			],
			"product_status":{
				"fixed":[
					"openEuler-24.03-LTS:kernel-6.6.0-101.0.0.93.oe2403.src",
					"openEuler-24.03-LTS:bpftool-6.6.0-101.0.0.93.oe2403.aarch64",
					"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-101.0.0.93.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-6.6.0-101.0.0.93.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-101.0.0.93.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-debugsource-6.6.0-101.0.0.93.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-devel-6.6.0-101.0.0.93.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-headers-6.6.0-101.0.0.93.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-source-6.6.0-101.0.0.93.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-tools-6.6.0-101.0.0.93.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-101.0.0.93.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-101.0.0.93.oe2403.aarch64",
					"openEuler-24.03-LTS:perf-6.6.0-101.0.0.93.oe2403.aarch64",
					"openEuler-24.03-LTS:perf-debuginfo-6.6.0-101.0.0.93.oe2403.aarch64",
					"openEuler-24.03-LTS:python3-perf-6.6.0-101.0.0.93.oe2403.aarch64",
					"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-101.0.0.93.oe2403.aarch64",
					"openEuler-24.03-LTS:bpftool-6.6.0-101.0.0.93.oe2403.x86_64",
					"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-101.0.0.93.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-6.6.0-101.0.0.93.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-101.0.0.93.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-debugsource-6.6.0-101.0.0.93.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-devel-6.6.0-101.0.0.93.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-headers-6.6.0-101.0.0.93.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-source-6.6.0-101.0.0.93.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-tools-6.6.0-101.0.0.93.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-101.0.0.93.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-101.0.0.93.oe2403.x86_64",
					"openEuler-24.03-LTS:perf-6.6.0-101.0.0.93.oe2403.x86_64",
					"openEuler-24.03-LTS:perf-debuginfo-6.6.0-101.0.0.93.oe2403.x86_64",
					"openEuler-24.03-LTS:python3-perf-6.6.0-101.0.0.93.oe2403.x86_64",
					"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-101.0.0.93.oe2403.x86_64"
				]
			},
			"remediations":[
				{
					"product_ids":[
						"openEuler-24.03-LTS:kernel-6.6.0-101.0.0.93.oe2403.src",
						"openEuler-24.03-LTS:bpftool-6.6.0-101.0.0.93.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-101.0.0.93.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-6.6.0-101.0.0.93.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-101.0.0.93.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-101.0.0.93.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-101.0.0.93.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-101.0.0.93.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-101.0.0.93.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-101.0.0.93.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-101.0.0.93.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-101.0.0.93.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-6.6.0-101.0.0.93.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-101.0.0.93.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-101.0.0.93.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-101.0.0.93.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-6.6.0-101.0.0.93.oe2403.x86_64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-101.0.0.93.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-6.6.0-101.0.0.93.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-101.0.0.93.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-101.0.0.93.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-101.0.0.93.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-101.0.0.93.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-101.0.0.93.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-101.0.0.93.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-101.0.0.93.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-101.0.0.93.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-6.6.0-101.0.0.93.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-101.0.0.93.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-101.0.0.93.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-101.0.0.93.oe2403.x86_64"
					],
					"details":"kernel security update",
					"category":"vendor_fix",
					"url":"https://www.openeuler.org/zh/security/security-bulletins/detail/?id=openEuler-SA-2025-1874"
				}
			],
			"scores":[
				{
					"cvss_v3":{
						"baseSeverity":"LOW",
						"baseScore":3.9,
						"vectorString":"CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:L/I:L/A:L",
						"version":"3.1"
					},
					"products":[
						"openEuler-24.03-LTS:kernel-6.6.0-101.0.0.93.oe2403.src",
						"openEuler-24.03-LTS:bpftool-6.6.0-101.0.0.93.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-101.0.0.93.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-6.6.0-101.0.0.93.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-101.0.0.93.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-101.0.0.93.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-101.0.0.93.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-101.0.0.93.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-101.0.0.93.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-101.0.0.93.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-101.0.0.93.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-101.0.0.93.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-6.6.0-101.0.0.93.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-101.0.0.93.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-101.0.0.93.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-101.0.0.93.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-6.6.0-101.0.0.93.oe2403.x86_64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-101.0.0.93.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-6.6.0-101.0.0.93.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-101.0.0.93.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-101.0.0.93.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-101.0.0.93.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-101.0.0.93.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-101.0.0.93.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-101.0.0.93.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-101.0.0.93.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-101.0.0.93.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-6.6.0-101.0.0.93.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-101.0.0.93.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-101.0.0.93.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-101.0.0.93.oe2403.x86_64"
					]
				}
			],
			"threats":[
				{
					"details":"Low",
					"category":"impact"
				}
			],
			"title":"CVE-2025-38322"
		},
		{
			"cve":"CVE-2025-38346",
			"notes":[
				{
					"text":"A vulnerability was found in Linux Kernel up to 6.15.3 (Operating System). It has been declared as critical.The CWE definition for the vulnerability is CWE-119. The product performs operations on a memory buffer, but it can read from or write to a memory location that is outside of the intended boundary of the buffer.As an impact it is known to affect confidentiality, integrity, and availability.Upgrading to version 5.4.295, 5.10.239, 5.15.186, 6.1.142, 6.6.95, 6.12.35, 6.15.4 or 6.16-rc1 eliminates this vulnerability. Applying the patch d064c68781c19f378af1ae741d9132d35d24b2bb/8690cd3258455bbae64f809e1d3ee0f043661c71/6805582abb720681dd1c87ff677f155dcf4e86c9/03a162933c4a03b9f1a84f7d8482903c7e1e11bb/83a692a9792aa86249d68a8ac0b9d55ecdd255fa/8e89c17dc8970c5f71a3a991f5724d4c8de42d8c/f78a786ad9a5443a29eef4dae60cde85b7375129/f914b52c379c12288b7623bb814d0508dbe7481d is able to eliminate this problem. The bugfix is ready for download at git.kernel.org. The best possible mitigation is suggested to be upgrading to the latest version.",
					"category":"description",
					"title":"Vulnerability Description"
				}
			],
			"product_status":{
				"fixed":[
					"openEuler-24.03-LTS:kernel-6.6.0-101.0.0.93.oe2403.src",
					"openEuler-24.03-LTS:bpftool-6.6.0-101.0.0.93.oe2403.aarch64",
					"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-101.0.0.93.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-6.6.0-101.0.0.93.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-101.0.0.93.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-debugsource-6.6.0-101.0.0.93.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-devel-6.6.0-101.0.0.93.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-headers-6.6.0-101.0.0.93.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-source-6.6.0-101.0.0.93.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-tools-6.6.0-101.0.0.93.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-101.0.0.93.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-101.0.0.93.oe2403.aarch64",
					"openEuler-24.03-LTS:perf-6.6.0-101.0.0.93.oe2403.aarch64",
					"openEuler-24.03-LTS:perf-debuginfo-6.6.0-101.0.0.93.oe2403.aarch64",
					"openEuler-24.03-LTS:python3-perf-6.6.0-101.0.0.93.oe2403.aarch64",
					"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-101.0.0.93.oe2403.aarch64",
					"openEuler-24.03-LTS:bpftool-6.6.0-101.0.0.93.oe2403.x86_64",
					"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-101.0.0.93.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-6.6.0-101.0.0.93.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-101.0.0.93.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-debugsource-6.6.0-101.0.0.93.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-devel-6.6.0-101.0.0.93.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-headers-6.6.0-101.0.0.93.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-source-6.6.0-101.0.0.93.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-tools-6.6.0-101.0.0.93.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-101.0.0.93.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-101.0.0.93.oe2403.x86_64",
					"openEuler-24.03-LTS:perf-6.6.0-101.0.0.93.oe2403.x86_64",
					"openEuler-24.03-LTS:perf-debuginfo-6.6.0-101.0.0.93.oe2403.x86_64",
					"openEuler-24.03-LTS:python3-perf-6.6.0-101.0.0.93.oe2403.x86_64",
					"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-101.0.0.93.oe2403.x86_64"
				]
			},
			"remediations":[
				{
					"product_ids":[
						"openEuler-24.03-LTS:kernel-6.6.0-101.0.0.93.oe2403.src",
						"openEuler-24.03-LTS:bpftool-6.6.0-101.0.0.93.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-101.0.0.93.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-6.6.0-101.0.0.93.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-101.0.0.93.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-101.0.0.93.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-101.0.0.93.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-101.0.0.93.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-101.0.0.93.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-101.0.0.93.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-101.0.0.93.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-101.0.0.93.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-6.6.0-101.0.0.93.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-101.0.0.93.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-101.0.0.93.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-101.0.0.93.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-6.6.0-101.0.0.93.oe2403.x86_64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-101.0.0.93.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-6.6.0-101.0.0.93.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-101.0.0.93.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-101.0.0.93.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-101.0.0.93.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-101.0.0.93.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-101.0.0.93.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-101.0.0.93.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-101.0.0.93.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-101.0.0.93.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-6.6.0-101.0.0.93.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-101.0.0.93.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-101.0.0.93.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-101.0.0.93.oe2403.x86_64"
					],
					"details":"kernel security update",
					"category":"vendor_fix",
					"url":"https://www.openeuler.org/zh/security/security-bulletins/detail/?id=openEuler-SA-2025-1874"
				}
			],
			"scores":[
				{
					"cvss_v3":{
						"baseSeverity":"LOW",
						"baseScore":3.9,
						"vectorString":"CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:L/I:L/A:L",
						"version":"3.1"
					},
					"products":[
						"openEuler-24.03-LTS:kernel-6.6.0-101.0.0.93.oe2403.src",
						"openEuler-24.03-LTS:bpftool-6.6.0-101.0.0.93.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-101.0.0.93.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-6.6.0-101.0.0.93.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-101.0.0.93.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-101.0.0.93.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-101.0.0.93.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-101.0.0.93.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-101.0.0.93.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-101.0.0.93.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-101.0.0.93.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-101.0.0.93.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-6.6.0-101.0.0.93.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-101.0.0.93.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-101.0.0.93.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-101.0.0.93.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-6.6.0-101.0.0.93.oe2403.x86_64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-101.0.0.93.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-6.6.0-101.0.0.93.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-101.0.0.93.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-101.0.0.93.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-101.0.0.93.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-101.0.0.93.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-101.0.0.93.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-101.0.0.93.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-101.0.0.93.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-101.0.0.93.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-6.6.0-101.0.0.93.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-101.0.0.93.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-101.0.0.93.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-101.0.0.93.oe2403.x86_64"
					]
				}
			],
			"threats":[
				{
					"details":"Low",
					"category":"impact"
				}
			],
			"title":"CVE-2025-38346"
		}
	]
}