{
	"document":{
		"aggregate_severity":{
			"namespace":"https://nvd.nist.gov/vuln-metrics/cvss",
			"text":"High"
		},
		"category":"csaf_vex",
		"csaf_version":"2.0",
		"distribution":{
			"tlp":{
				"label":"WHITE",
				"url":"https:/www.first.org/tlp/"
			}
		},
		"lang":"en",
		"notes":[
			{
				"text":"kernel security update",
				"category":"general",
				"title":"Synopsis"
			},
			{
				"text":"An update for kernel is now available for openEuler-24.03-LTS",
				"category":"general",
				"title":"Summary"
			},
			{
				"text":"The Linux Kernel, the operating system core itself.\n\nSecurity Fix(es):\n\nIn the Linux kernel, the following vulnerability has been resolved:\n\nmac802154: check local interfaces before deleting sdata list\n\nsyzkaller reported a corrupted list in ieee802154_if_remove. [1]\n\nRemove an IEEE 802.15.4 network interface after unregister an IEEE 802.15.4\nhardware device from the system.\n\nCPU0\t\t\t\t\tCPU1\n====\t\t\t\t\t====\ngenl_family_rcv_msg_doit\t\tieee802154_unregister_hw\nieee802154_del_iface\t\t\tieee802154_remove_interfaces\nrdev_del_virtual_intf_deprecated\tlist_del(&sdata->list)\nieee802154_if_remove\nlist_del_rcu\n\nThe net device has been unregistered, since the rcu grace period,\nunregistration must be run before ieee802154_if_remove.\n\nTo avoid this issue, add a check for local->interfaces before deleting\nsdata list.\n\n[1]\nkernel BUG at lib/list_debug.c:58!\nOops: invalid opcode: 0000 [#1] PREEMPT SMP KASAN PTI\nCPU: 0 UID: 0 PID: 6277 Comm: syz-executor157 Not tainted 6.12.0-rc6-syzkaller-00005-g557329bcecc2 #0\nHardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/13/2024\nRIP: 0010:__list_del_entry_valid_or_report+0xf4/0x140 lib/list_debug.c:56\nCode: e8 a1 7e 00 07 90 0f 0b 48 c7 c7 e0 37 60 8c 4c 89 fe e8 8f 7e 00 07 90 0f 0b 48 c7 c7 40 38 60 8c 4c 89 fe e8 7d 7e 00 07 90 <0f> 0b 48 c7 c7 a0 38 60 8c 4c 89 fe e8 6b 7e 00 07 90 0f 0b 48 c7\nRSP: 0018:ffffc9000490f3d0 EFLAGS: 00010246\nRAX: 000000000000004e RBX: dead000000000122 RCX: d211eee56bb28d00\nRDX: 0000000000000000 RSI: 0000000080000000 RDI: 0000000000000000\nRBP: ffff88805b278dd8 R08: ffffffff8174a12c R09: 1ffffffff2852f0d\nR10: dffffc0000000000 R11: fffffbfff2852f0e R12: dffffc0000000000\nR13: dffffc0000000000 R14: dead000000000100 R15: ffff88805b278cc0\nFS:  0000555572f94380(0000) GS:ffff8880b8600000(0000) knlGS:0000000000000000\nCS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033\nCR2: 000056262e4a3000 CR3: 0000000078496000 CR4: 00000000003526f0\nDR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000\nDR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400\nCall Trace:\n <TASK>\n __list_del_entry_valid include/linux/list.h:124 [inline]\n __list_del_entry include/linux/list.h:215 [inline]\n list_del_rcu include/linux/rculist.h:157 [inline]\n ieee802154_if_remove+0x86/0x1e0 net/mac802154/iface.c:687\n rdev_del_virtual_intf_deprecated net/ieee802154/rdev-ops.h:24 [inline]\n ieee802154_del_iface+0x2c0/0x5c0 net/ieee802154/nl-phy.c:323\n genl_family_rcv_msg_doit net/netlink/genetlink.c:1115 [inline]\n genl_family_rcv_msg net/netlink/genetlink.c:1195 [inline]\n genl_rcv_msg+0xb14/0xec0 net/netlink/genetlink.c:1210\n netlink_rcv_skb+0x1e3/0x430 net/netlink/af_netlink.c:2551\n genl_rcv+0x28/0x40 net/netlink/genetlink.c:1219\n netlink_unicast_kernel net/netlink/af_netlink.c:1331 [inline]\n netlink_unicast+0x7f6/0x990 net/netlink/af_netlink.c:1357\n netlink_sendmsg+0x8e4/0xcb0 net/netlink/af_netlink.c:1901\n sock_sendmsg_nosec net/socket.c:729 [inline]\n __sock_sendmsg+0x221/0x270 net/socket.c:744\n ____sys_sendmsg+0x52a/0x7e0 net/socket.c:2607\n ___sys_sendmsg net/socket.c:2661 [inline]\n __sys_sendmsg+0x292/0x380 net/socket.c:2690\n do_syscall_x64 arch/x86/entry/common.c:52 [inline]\n do_syscall_64+0xf3/0x230 arch/x86/entry/common.c:83\n entry_SYSCALL_64_after_hwframe+0x77/0x7f(CVE-2024-57948)\n\nIn the Linux kernel, the following vulnerability has been resolved:\n\nKVM: x86: Load DR6 with guest value only before entering .vcpu_run() loop\n\nMove the conditional loading of hardware DR6 with the guest's DR6 value\nout of the core .vcpu_run() loop to fix a bug where KVM can load hardware\nwith a stale vcpu->arch.dr6.\n\nWhen the guest accesses a DR and host userspace isn't debugging the guest,\nKVM disables DR interception and loads the guest's values into hardware on\nVM-Enter and saves them on VM-Exit.  This allows the guest to access DRs\nat will, e.g. so that a sequence of DR accesses to configure a breakpoint\nonly generates one VM-Exit.\n\nFor DR0-DR3, the logic/behavior is identical between VMX and SVM, and also\nidentical between KVM_DEBUGREG_BP_ENABLED (userspace debugging the guest)\nand KVM_DEBUGREG_WONT_EXIT (guest using DRs), and so KVM handles loading\nDR0-DR3 in common code, _outside_ of the core kvm_x86_ops.vcpu_run() loop.\n\nBut for DR6, the guest's value doesn't need to be loaded into hardware for\nKVM_DEBUGREG_BP_ENABLED, and SVM provides a dedicated VMCB field whereas\nVMX requires software to manually load the guest value, and so loading the\nguest's value into DR6 is handled by {svm,vmx}_vcpu_run(), i.e. is done\n_inside_ the core run loop.\n\nUnfortunately, saving the guest values on VM-Exit is initiated by common\nx86, again outside of the core run loop.  If the guest modifies DR6 (in\nhardware, when DR interception is disabled), and then the next VM-Exit is\na fastpath VM-Exit, KVM will reload hardware DR6 with vcpu->arch.dr6 and\nclobber the guest's actual value.\n\nThe bug shows up primarily with nested VMX because KVM handles the VMX\npreemption timer in the fastpath, and the window between hardware DR6\nbeing modified (in guest context) and DR6 being read by guest software is\norders of magnitude larger in a nested setup.  E.g. in non-nested, the\nVMX preemption timer would need to fire precisely between #DB injection\nand the #DB handler's read of DR6, whereas with a KVM-on-KVM setup, the\nwindow where hardware DR6 is \"dirty\" extends all the way from L1 writing\nDR6 to VMRESUME (in L1).\n\n    L1's view:\n    ==========\n    <L1 disables DR interception>\n           CPU 0/KVM-7289    [023] d....  2925.640961: kvm_entry: vcpu 0\n A:  L1 Writes DR6\n           CPU 0/KVM-7289    [023] d....  2925.640963: <hack>: Set DRs, DR6 = 0xffff0ff1\n\n B:        CPU 0/KVM-7289    [023] d....  2925.640967: kvm_exit: vcpu 0 reason EXTERNAL_INTERRUPT intr_info 0x800000ec\n\n D: L1 reads DR6, arch.dr6 = 0\n           CPU 0/KVM-7289    [023] d....  2925.640969: <hack>: Sync DRs, DR6 = 0xffff0ff0\n\n           CPU 0/KVM-7289    [023] d....  2925.640976: kvm_entry: vcpu 0\n    L2 reads DR6, L1 disables DR interception\n           CPU 0/KVM-7289    [023] d....  2925.640980: kvm_exit: vcpu 0 reason DR_ACCESS info1 0x0000000000000216\n           CPU 0/KVM-7289    [023] d....  2925.640983: kvm_entry: vcpu 0\n\n           CPU 0/KVM-7289    [023] d....  2925.640983: <hack>: Set DRs, DR6 = 0xffff0ff0\n\n    L2 detects failure\n           CPU 0/KVM-7289    [023] d....  2925.640987: kvm_exit: vcpu 0 reason HLT\n    L1 reads DR6 (confirms failure)\n           CPU 0/KVM-7289    [023] d....  2925.640990: <hack>: Sync DRs, DR6 = 0xffff0ff0\n\n    L0's view:\n    ==========\n    L2 reads DR6, arch.dr6 = 0\n          CPU 23/KVM-5046    [001] d....  3410.005610: kvm_exit: vcpu 23 reason DR_ACCESS info1 0x0000000000000216\n          CPU 23/KVM-5046    [001] .....  3410.005610: kvm_nested_vmexit: vcpu 23 reason DR_ACCESS info1 0x0000000000000216\n\n    L2 => L1 nested VM-Exit\n          CPU 23/KVM-5046    [001] .....  3410.005610: kvm_nested_vmexit_inject: reason: DR_ACCESS ext_inf1: 0x0000000000000216\n\n          CPU 23/KVM-5046    [001] d....  3410.005610: kvm_entry: vcpu 23\n          CPU 23/KVM-5046    [001] d....  3410.005611: kvm_exit: vcpu 23 reason VMREAD\n          CPU 23/KVM-5046    [001] d....  3410.005611: kvm_entry: vcpu 23\n          CPU 23/KVM-5046    [001] d....  3410.\n---truncated---(CVE-2025-21839)\n\nIn the Linux kernel, the following vulnerability has been resolved:\n\nmm: memory-failure: update ttu flag inside unmap_poisoned_folio\n\nPatch series \"mm: memory_failure: unmap poisoned folio during migrate\nproperly\", v3.\n\nFix two bugs during folio migration if the folio is poisoned.\n\n\nThis patch (of 3):\n\nCommit 6da6b1d4a7df (\"mm/hwpoison: convert TTU_IGNORE_HWPOISON to\nTTU_HWPOISON\") introduce TTU_HWPOISON to replace TTU_IGNORE_HWPOISON in\norder to stop send SIGBUS signal when accessing an error page after a\nmemory error on a clean folio.  However during page migration, anon folio\nmust be set with TTU_HWPOISON during unmap_*().  For pagecache we need\nsome policy just like the one in hwpoison_user_mappings to set this flag. \nSo move this policy from hwpoison_user_mappings to unmap_poisoned_folio to\nhandle this warning properly.\n\nWarning will be produced during unamp poison folio with the following log:\n\n  ------------[ cut here ]------------\n  WARNING: CPU: 1 PID: 365 at mm/rmap.c:1847 try_to_unmap_one+0x8fc/0xd3c\n  Modules linked in:\n  CPU: 1 UID: 0 PID: 365 Comm: bash Tainted: G        W          6.13.0-rc1-00018-gacdb4bbda7ab #42\n  Tainted: [W]=WARN\n  Hardware name: QEMU QEMU Virtual Machine, BIOS 0.0.0 02/06/2015\n  pstate: 20400005 (nzCv daif +PAN -UAO -TCO -DIT -SSBS BTYPE=--)\n  pc : try_to_unmap_one+0x8fc/0xd3c\n  lr : try_to_unmap_one+0x3dc/0xd3c\n  Call trace:\n   try_to_unmap_one+0x8fc/0xd3c (P)\n   try_to_unmap_one+0x3dc/0xd3c (L)\n   rmap_walk_anon+0xdc/0x1f8\n   rmap_walk+0x3c/0x58\n   try_to_unmap+0x88/0x90\n   unmap_poisoned_folio+0x30/0xa8\n   do_migrate_range+0x4a0/0x568\n   offline_pages+0x5a4/0x670\n   memory_block_action+0x17c/0x374\n   memory_subsys_offline+0x3c/0x78\n   device_offline+0xa4/0xd0\n   state_store+0x8c/0xf0\n   dev_attr_store+0x18/0x2c\n   sysfs_kf_write+0x44/0x54\n   kernfs_fop_write_iter+0x118/0x1a8\n   vfs_write+0x3a8/0x4bc\n   ksys_write+0x6c/0xf8\n   __arm64_sys_write+0x1c/0x28\n   invoke_syscall+0x44/0x100\n   el0_svc_common.constprop.0+0x40/0xe0\n   do_el0_svc+0x1c/0x28\n   el0_svc+0x30/0xd0\n   el0t_64_sync_handler+0xc8/0xcc\n   el0t_64_sync+0x198/0x19c\n  ---[ end trace 0000000000000000 ]---\n\n[(CVE-2025-21907)\n\nIn the Linux kernel, the following vulnerability has been resolved:\n\ndrm/amd/display: Assign normalized_pix_clk when color depth = 14\n\n[WHY & HOW]\nA warning message \"WARNING: CPU: 4 PID: 459 at ... /dc_resource.c:3397\ncalculate_phy_pix_clks+0xef/0x100 [amdgpu]\" occurs because the\ndisplay_color_depth == COLOR_DEPTH_141414 is not handled. This is\nobserved in Radeon RX 6600 XT.\n\nIt is fixed by assigning pix_clk * (14 * 3) / 24 - same as the rests.\n\nAlso fixes the indentation in get_norm_pix_clk.\n\n(cherry picked from commit 274a87eb389f58eddcbc5659ab0b180b37e92775)(CVE-2025-21956)\n\nIn the Linux kernel, the following vulnerability has been resolved:\n\nnetfilter: nf_conncount: Fully initialize struct nf_conncount_tuple in insert_tree()\n\nSince commit b36e4523d4d5 (\"netfilter: nf_conncount: fix garbage\ncollection confirm race\"), `cpu` and `jiffies32` were introduced to\nthe struct nf_conncount_tuple.\n\nThe commit made nf_conncount_add() initialize `conn->cpu` and\n`conn->jiffies32` when allocating the struct.\nIn contrast, count_tree() was not changed to initialize them.\n\nBy commit 34848d5c896e (\"netfilter: nf_conncount: Split insert and\ntraversal\"), count_tree() was split and the relevant allocation\ncode now resides in insert_tree().\nInitialize `conn->cpu` and `conn->jiffies32` in insert_tree().\n\nBUG: KMSAN: uninit-value in find_or_evict net/netfilter/nf_conncount.c:117 [inline]\nBUG: KMSAN: uninit-value in __nf_conncount_add+0xd9c/0x2850 net/netfilter/nf_conncount.c:143\n find_or_evict net/netfilter/nf_conncount.c:117 [inline]\n __nf_conncount_add+0xd9c/0x2850 net/netfilter/nf_conncount.c:143\n count_tree net/netfilter/nf_conncount.c:438 [inline]\n nf_conncount_count+0x82f/0x1e80 net/netfilter/nf_conncount.c:521\n connlimit_mt+0x7f6/0xbd0 net/netfilter/xt_connlimit.c:72\n __nft_match_eval net/netfilter/nft_compat.c:403 [inline]\n nft_match_eval+0x1a5/0x300 net/netfilter/nft_compat.c:433\n expr_call_ops_eval net/netfilter/nf_tables_core.c:240 [inline]\n nft_do_chain+0x426/0x2290 net/netfilter/nf_tables_core.c:288\n nft_do_chain_ipv4+0x1a5/0x230 net/netfilter/nft_chain_filter.c:23\n nf_hook_entry_hookfn include/linux/netfilter.h:154 [inline]\n nf_hook_slow+0xf4/0x400 net/netfilter/core.c:626\n nf_hook_slow_list+0x24d/0x860 net/netfilter/core.c:663\n NF_HOOK_LIST include/linux/netfilter.h:350 [inline]\n ip_sublist_rcv+0x17b7/0x17f0 net/ipv4/ip_input.c:633\n ip_list_rcv+0x9ef/0xa40 net/ipv4/ip_input.c:669\n __netif_receive_skb_list_ptype net/core/dev.c:5936 [inline]\n __netif_receive_skb_list_core+0x15c5/0x1670 net/core/dev.c:5983\n __netif_receive_skb_list net/core/dev.c:6035 [inline]\n netif_receive_skb_list_internal+0x1085/0x1700 net/core/dev.c:6126\n netif_receive_skb_list+0x5a/0x460 net/core/dev.c:6178\n xdp_recv_frames net/bpf/test_run.c:280 [inline]\n xdp_test_run_batch net/bpf/test_run.c:361 [inline]\n bpf_test_run_xdp_live+0x2e86/0x3480 net/bpf/test_run.c:390\n bpf_prog_test_run_xdp+0xf1d/0x1ae0 net/bpf/test_run.c:1316\n bpf_prog_test_run+0x5e5/0xa30 kernel/bpf/syscall.c:4407\n __sys_bpf+0x6aa/0xd90 kernel/bpf/syscall.c:5813\n __do_sys_bpf kernel/bpf/syscall.c:5902 [inline]\n __se_sys_bpf kernel/bpf/syscall.c:5900 [inline]\n __ia32_sys_bpf+0xa0/0xe0 kernel/bpf/syscall.c:5900\n ia32_sys_call+0x394d/0x4180 arch/x86/include/generated/asm/syscalls_32.h:358\n do_syscall_32_irqs_on arch/x86/entry/common.c:165 [inline]\n __do_fast_syscall_32+0xb0/0x110 arch/x86/entry/common.c:387\n do_fast_syscall_32+0x38/0x80 arch/x86/entry/common.c:412\n do_SYSENTER_32+0x1f/0x30 arch/x86/entry/common.c:450\n entry_SYSENTER_compat_after_hwframe+0x84/0x8e\n\nUninit was created at:\n slab_post_alloc_hook mm/slub.c:4121 [inline]\n slab_alloc_node mm/slub.c:4164 [inline]\n kmem_cache_alloc_noprof+0x915/0xe10 mm/slub.c:4171\n insert_tree net/netfilter/nf_conncount.c:372 [inline]\n count_tree net/netfilter/nf_conncount.c:450 [inline]\n nf_conncount_count+0x1415/0x1e80 net/netfilter/nf_conncount.c:521\n connlimit_mt+0x7f6/0xbd0 net/netfilter/xt_connlimit.c:72\n __nft_match_eval net/netfilter/nft_compat.c:403 [inline]\n nft_match_eval+0x1a5/0x300 net/netfilter/nft_compat.c:433\n expr_call_ops_eval net/netfilter/nf_tables_core.c:240 [inline]\n nft_do_chain+0x426/0x2290 net/netfilter/nf_tables_core.c:288\n nft_do_chain_ipv4+0x1a5/0x230 net/netfilter/nft_chain_filter.c:23\n nf_hook_entry_hookfn include/linux/netfilter.h:154 [inline]\n nf_hook_slow+0xf4/0x400 net/netfilter/core.c:626\n nf_hook_slow_list+0x24d/0x860 net/netfilter/core.c:663\n NF_HOOK_LIST include/linux/netfilter.h:350 [inline]\n ip_sublist_rcv+0x17b7/0x17f0 net/ipv4/ip_input.c:633\n ip_list_rcv+0x9ef/0xa40 net/ip\n---truncated---(CVE-2025-21959)\n\nIn the Linux kernel, the following vulnerability has been resolved:\n\nBluetooth: L2CAP: Fix slab-use-after-free Read in l2cap_send_cmd\n\nAfter the hci sync command releases l2cap_conn, the hci receive data work\nqueue references the released l2cap_conn when sending to the upper layer.\nAdd hci dev lock to the hci receive data work queue to synchronize the two.\n\n[1]\nBUG: KASAN: slab-use-after-free in l2cap_send_cmd+0x187/0x8d0 net/bluetooth/l2cap_core.c:954\nRead of size 8 at addr ffff8880271a4000 by task kworker/u9:2/5837\n\nCPU: 0 UID: 0 PID: 5837 Comm: kworker/u9:2 Not tainted 6.13.0-rc5-syzkaller-00163-gab75170520d4 #0\nHardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/13/2024\nWorkqueue: hci1 hci_rx_work\nCall Trace:\n <TASK>\n __dump_stack lib/dump_stack.c:94 [inline]\n dump_stack_lvl+0x241/0x360 lib/dump_stack.c:120\n print_address_description mm/kasan/report.c:378 [inline]\n print_report+0x169/0x550 mm/kasan/report.c:489\n kasan_report+0x143/0x180 mm/kasan/report.c:602\n l2cap_build_cmd net/bluetooth/l2cap_core.c:2964 [inline]\n l2cap_send_cmd+0x187/0x8d0 net/bluetooth/l2cap_core.c:954\n l2cap_sig_send_rej net/bluetooth/l2cap_core.c:5502 [inline]\n l2cap_sig_channel net/bluetooth/l2cap_core.c:5538 [inline]\n l2cap_recv_frame+0x221f/0x10db0 net/bluetooth/l2cap_core.c:6817\n hci_acldata_packet net/bluetooth/hci_core.c:3797 [inline]\n hci_rx_work+0x508/0xdb0 net/bluetooth/hci_core.c:4040\n process_one_work kernel/workqueue.c:3229 [inline]\n process_scheduled_works+0xa66/0x1840 kernel/workqueue.c:3310\n worker_thread+0x870/0xd30 kernel/workqueue.c:3391\n kthread+0x2f0/0x390 kernel/kthread.c:389\n ret_from_fork+0x4b/0x80 arch/x86/kernel/process.c:147\n ret_from_fork_asm+0x1a/0x30 arch/x86/entry/entry_64.S:244\n </TASK>\n\nAllocated by task 5837:\n kasan_save_stack mm/kasan/common.c:47 [inline]\n kasan_save_track+0x3f/0x80 mm/kasan/common.c:68\n poison_kmalloc_redzone mm/kasan/common.c:377 [inline]\n __kasan_kmalloc+0x98/0xb0 mm/kasan/common.c:394\n kasan_kmalloc include/linux/kasan.h:260 [inline]\n __kmalloc_cache_noprof+0x243/0x390 mm/slub.c:4329\n kmalloc_noprof include/linux/slab.h:901 [inline]\n kzalloc_noprof include/linux/slab.h:1037 [inline]\n l2cap_conn_add+0xa9/0x8e0 net/bluetooth/l2cap_core.c:6860\n l2cap_connect_cfm+0x115/0x1090 net/bluetooth/l2cap_core.c:7239\n hci_connect_cfm include/net/bluetooth/hci_core.h:2057 [inline]\n hci_remote_features_evt+0x68e/0xac0 net/bluetooth/hci_event.c:3726\n hci_event_func net/bluetooth/hci_event.c:7473 [inline]\n hci_event_packet+0xac2/0x1540 net/bluetooth/hci_event.c:7525\n hci_rx_work+0x3f3/0xdb0 net/bluetooth/hci_core.c:4035\n process_one_work kernel/workqueue.c:3229 [inline]\n process_scheduled_works+0xa66/0x1840 kernel/workqueue.c:3310\n worker_thread+0x870/0xd30 kernel/workqueue.c:3391\n kthread+0x2f0/0x390 kernel/kthread.c:389\n ret_from_fork+0x4b/0x80 arch/x86/kernel/process.c:147\n ret_from_fork_asm+0x1a/0x30 arch/x86/entry/entry_64.S:244\n\nFreed by task 54:\n kasan_save_stack mm/kasan/common.c:47 [inline]\n kasan_save_track+0x3f/0x80 mm/kasan/common.c:68\n kasan_save_free_info+0x40/0x50 mm/kasan/generic.c:582\n poison_slab_object mm/kasan/common.c:247 [inline]\n __kasan_slab_free+0x59/0x70 mm/kasan/common.c:264\n kasan_slab_free include/linux/kasan.h:233 [inline]\n slab_free_hook mm/slub.c:2353 [inline]\n slab_free mm/slub.c:4613 [inline]\n kfree+0x196/0x430 mm/slub.c:4761\n l2cap_connect_cfm+0xcc/0x1090 net/bluetooth/l2cap_core.c:7235\n hci_connect_cfm include/net/bluetooth/hci_core.h:2057 [inline]\n hci_conn_failed+0x287/0x400 net/bluetooth/hci_conn.c:1266\n hci_abort_conn_sync+0x56c/0x11f0 net/bluetooth/hci_sync.c:5603\n hci_cmd_sync_work+0x22b/0x400 net/bluetooth/hci_sync.c:332\n process_one_work kernel/workqueue.c:3229 [inline]\n process_scheduled_works+0xa66/0x1840 kernel/workqueue.c:3310\n worker_thread+0x870/0xd30 kernel/workqueue.c:3391\n kthread+0x2f0/0x390 kernel/kthread.c:389\n ret_from_fork+0x4b/0x80 arch/x86/kernel/process.c:147\n ret_from_fork_asm+0x1a/0x30 arch/x86/entry/entr\n---truncated---(CVE-2025-21969)\n\nIn the Linux kernel, the following vulnerability has been resolved:\n\nBluetooth: btnxpuart: Fix kernel panic during FW release\n\nThis fixes a kernel panic seen during release FW in a stress test\nscenario where WLAN and BT FW download occurs simultaneously, and due to\na HW bug, chip sends out only 1 bootloader signatures.\n\nWhen driver receives the bootloader signature, it enters FW download\nmode, but since no consequtive bootloader signatures seen, FW file is\nnot requested.\n\nAfter 60 seconds, when FW download times out, release_firmware causes a\nkernel panic.\n\n[ 2601.949184] Unable to handle kernel paging request at virtual address 0000312e6f006573\n[ 2601.992076] user pgtable: 4k pages, 48-bit VAs, pgdp=0000000111802000\n[ 2601.992080] [0000312e6f006573] pgd=0000000000000000, p4d=0000000000000000\n[ 2601.992087] Internal error: Oops: 0000000096000021 [#1] PREEMPT SMP\n[ 2601.992091] Modules linked in: algif_hash algif_skcipher af_alg btnxpuart(O) pciexxx(O) mlan(O) overlay fsl_jr_uio caam_jr caamkeyblob_desc caamhash_desc caamalg_desc crypto_engine authenc libdes crct10dif_ce polyval_ce snd_soc_fsl_easrc snd_soc_fsl_asoc_card imx8_media_dev(C) snd_soc_fsl_micfil polyval_generic snd_soc_fsl_xcvr snd_soc_fsl_sai snd_soc_imx_audmux snd_soc_fsl_asrc snd_soc_imx_card snd_soc_imx_hdmi snd_soc_fsl_aud2htx snd_soc_fsl_utils imx_pcm_dma dw_hdmi_cec flexcan can_dev\n[ 2602.001825] CPU: 2 PID: 20060 Comm: hciconfig Tainted: G         C O       6.6.23-lts-next-06236-gb586a521770e #1\n[ 2602.010182] Hardware name: NXP i.MX8MPlus EVK board (DT)\n[ 2602.010185] pstate: 60000005 (nZCv daif -PAN -UAO -TCO -DIT -SSBS BTYPE=--)\n[ 2602.010191] pc : _raw_spin_lock+0x34/0x68\n[ 2602.010201] lr : free_fw_priv+0x20/0xfc\n[ 2602.020561] sp : ffff800089363b30\n[ 2602.020563] x29: ffff800089363b30 x28: ffff0000d0eb5880 x27: 0000000000000000\n[ 2602.020570] x26: 0000000000000000 x25: ffff0000d728b330 x24: 0000000000000000\n[ 2602.020577] x23: ffff0000dc856f38\n[ 2602.033797] x22: ffff800089363b70 x21: ffff0000dc856000\n[ 2602.033802] x20: ff00312e6f006573 x19: ffff0000d0d9ea80 x18: 0000000000000000\n[ 2602.033809] x17: 0000000000000000 x16: 0000000000000000 x15: 0000aaaad80dd480\n[ 2602.083320] x14: 0000000000000000 x13: 00000000000001b9 x12: 0000000000000002\n[ 2602.083326] x11: 0000000000000000 x10: 0000000000000a60 x9 : ffff800089363a30\n[ 2602.083333] x8 : ffff0001793d75c0 x7 : ffff0000d6dbc400 x6 : 0000000000000000\n[ 2602.083339] x5 : 00000000410fd030 x4 : 0000000000000000 x3 : 0000000000000001\n[ 2602.083346] x2 : 0000000000000000 x1 : 0000000000000001 x0 : ff00312e6f006573\n[ 2602.083354] Call trace:\n[ 2602.083356]  _raw_spin_lock+0x34/0x68\n[ 2602.083364]  release_firmware+0x48/0x6c\n[ 2602.083370]  nxp_setup+0x3c4/0x540 [btnxpuart]\n[ 2602.083383]  hci_dev_open_sync+0xf0/0xa34\n[ 2602.083391]  hci_dev_open+0xd8/0x178\n[ 2602.083399]  hci_sock_ioctl+0x3b0/0x590\n[ 2602.083405]  sock_do_ioctl+0x60/0x118\n[ 2602.083413]  sock_ioctl+0x2f4/0x374\n[ 2602.091430]  __arm64_sys_ioctl+0xac/0xf0\n[ 2602.091437]  invoke_syscall+0x48/0x110\n[ 2602.091445]  el0_svc_common.constprop.0+0xc0/0xe0\n[ 2602.091452]  do_el0_svc+0x1c/0x28\n[ 2602.091457]  el0_svc+0x40/0xe4\n[ 2602.091465]  el0t_64_sync_handler+0x120/0x12c\n[ 2602.091470]  el0t_64_sync+0x190/0x194(CVE-2025-22102)\n\nIn the Linux kernel, the following vulnerability has been resolved:\n\nbonding: check xdp prog when set bond mode\n\nFollowing operations can trigger a warning[1]:\n\n    ip netns add ns1\n    ip netns exec ns1 ip link add bond0 type bond mode balance-rr\n    ip netns exec ns1 ip link set dev bond0 xdp obj af_xdp_kern.o sec xdp\n    ip netns exec ns1 ip link set bond0 type bond mode broadcast\n    ip netns del ns1\n\nWhen delete the namespace, dev_xdp_uninstall() is called to remove xdp\nprogram on bond dev, and bond_xdp_set() will check the bond mode. If bond\nmode is changed after attaching xdp program, the warning may occur.\n\nSome bond modes (broadcast, etc.) do not support native xdp. Set bond mode\nwith xdp program attached is not good. Add check for xdp program when set\nbond mode.\n\n    [1]\n    ------------[ cut here ]------------\n    WARNING: CPU: 0 PID: 11 at net/core/dev.c:9912 unregister_netdevice_many_notify+0x8d9/0x930\n    Modules linked in:\n    CPU: 0 UID: 0 PID: 11 Comm: kworker/u4:0 Not tainted 6.14.0-rc4 #107\n    Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS rel-1.15.0-0-g2dd4b9b3f840-prebuilt.qemu.org 04/01/2014\n    Workqueue: netns cleanup_net\n    RIP: 0010:unregister_netdevice_many_notify+0x8d9/0x930\n    Code: 00 00 48 c7 c6 6f e3 a2 82 48 c7 c7 d0 b3 96 82 e8 9c 10 3e ...\n    RSP: 0018:ffffc90000063d80 EFLAGS: 00000282\n    RAX: 00000000ffffffa1 RBX: ffff888004959000 RCX: 00000000ffffdfff\n    RDX: 0000000000000000 RSI: 00000000ffffffea RDI: ffffc90000063b48\n    RBP: ffffc90000063e28 R08: ffffffff82d39b28 R09: 0000000000009ffb\n    R10: 0000000000000175 R11: ffffffff82d09b40 R12: ffff8880049598e8\n    R13: 0000000000000001 R14: dead000000000100 R15: ffffc90000045000\n    FS:  0000000000000000(0000) GS:ffff888007a00000(0000) knlGS:0000000000000000\n    CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033\n    CR2: 000000000d406b60 CR3: 000000000483e000 CR4: 00000000000006f0\n    Call Trace:\n     <TASK>\n     ? __warn+0x83/0x130\n     ? unregister_netdevice_many_notify+0x8d9/0x930\n     ? report_bug+0x18e/0x1a0\n     ? handle_bug+0x54/0x90\n     ? exc_invalid_op+0x18/0x70\n     ? asm_exc_invalid_op+0x1a/0x20\n     ? unregister_netdevice_many_notify+0x8d9/0x930\n     ? bond_net_exit_batch_rtnl+0x5c/0x90\n     cleanup_net+0x237/0x3d0\n     process_one_work+0x163/0x390\n     worker_thread+0x293/0x3b0\n     ? __pfx_worker_thread+0x10/0x10\n     kthread+0xec/0x1e0\n     ? __pfx_kthread+0x10/0x10\n     ? __pfx_kthread+0x10/0x10\n     ret_from_fork+0x2f/0x50\n     ? __pfx_kthread+0x10/0x10\n     ret_from_fork_asm+0x1a/0x30\n     </TASK>\n    ---[ end trace 0000000000000000 ]---(CVE-2025-22105)\n\nIn the Linux kernel, the following vulnerability has been resolved:\n\ndrm/amd/pm: Prevent division by zero\n\nThe user can set any speed value.\nIf speed is greater than UINT_MAX/8, division by zero is possible.\n\nFound by Linux Verification Center (linuxtesting.org) with SVACE.(CVE-2025-37767)\n\nIn the Linux kernel, the following vulnerability has been resolved:\n\nisofs: Prevent the use of too small fid\n\nsyzbot reported a slab-out-of-bounds Read in isofs_fh_to_parent. [1]\n\nThe handle_bytes value passed in by the reproducing program is equal to 12.\nIn handle_to_path(), only 12 bytes of memory are allocated for the structure\nfile_handle->f_handle member, which causes an out-of-bounds access when\naccessing the member parent_block of the structure isofs_fid in isofs,\nbecause accessing parent_block requires at least 16 bytes of f_handle.\nHere, fh_len is used to indirectly confirm that the value of handle_bytes\nis greater than 3 before accessing parent_block.\n\n[1]\nBUG: KASAN: slab-out-of-bounds in isofs_fh_to_parent+0x1b8/0x210 fs/isofs/export.c:183\nRead of size 4 at addr ffff0000cc030d94 by task syz-executor215/6466\nCPU: 1 UID: 0 PID: 6466 Comm: syz-executor215 Not tainted 6.14.0-rc7-syzkaller-ga2392f333575 #0\nHardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2025\nCall trace:\n show_stack+0x2c/0x3c arch/arm64/kernel/stacktrace.c:466 (C)\n __dump_stack lib/dump_stack.c:94 [inline]\n dump_stack_lvl+0xe4/0x150 lib/dump_stack.c:120\n print_address_description mm/kasan/report.c:408 [inline]\n print_report+0x198/0x550 mm/kasan/report.c:521\n kasan_report+0xd8/0x138 mm/kasan/report.c:634\n __asan_report_load4_noabort+0x20/0x2c mm/kasan/report_generic.c:380\n isofs_fh_to_parent+0x1b8/0x210 fs/isofs/export.c:183\n exportfs_decode_fh_raw+0x2dc/0x608 fs/exportfs/expfs.c:523\n do_handle_to_path+0xa0/0x198 fs/fhandle.c:257\n handle_to_path fs/fhandle.c:385 [inline]\n do_handle_open+0x8cc/0xb8c fs/fhandle.c:403\n __do_sys_open_by_handle_at fs/fhandle.c:443 [inline]\n __se_sys_open_by_handle_at fs/fhandle.c:434 [inline]\n __arm64_sys_open_by_handle_at+0x80/0x94 fs/fhandle.c:434\n __invoke_syscall arch/arm64/kernel/syscall.c:35 [inline]\n invoke_syscall+0x98/0x2b8 arch/arm64/kernel/syscall.c:49\n el0_svc_common+0x130/0x23c arch/arm64/kernel/syscall.c:132\n do_el0_svc+0x48/0x58 arch/arm64/kernel/syscall.c:151\n el0_svc+0x54/0x168 arch/arm64/kernel/entry-common.c:744\n el0t_64_sync_handler+0x84/0x108 arch/arm64/kernel/entry-common.c:762\n el0t_64_sync+0x198/0x19c arch/arm64/kernel/entry.S:600\n\nAllocated by task 6466:\n kasan_save_stack mm/kasan/common.c:47 [inline]\n kasan_save_track+0x40/0x78 mm/kasan/common.c:68\n kasan_save_alloc_info+0x40/0x50 mm/kasan/generic.c:562\n poison_kmalloc_redzone mm/kasan/common.c:377 [inline]\n __kasan_kmalloc+0xac/0xc4 mm/kasan/common.c:394\n kasan_kmalloc include/linux/kasan.h:260 [inline]\n __do_kmalloc_node mm/slub.c:4294 [inline]\n __kmalloc_noprof+0x32c/0x54c mm/slub.c:4306\n kmalloc_noprof include/linux/slab.h:905 [inline]\n handle_to_path fs/fhandle.c:357 [inline]\n do_handle_open+0x5a4/0xb8c fs/fhandle.c:403\n __do_sys_open_by_handle_at fs/fhandle.c:443 [inline]\n __se_sys_open_by_handle_at fs/fhandle.c:434 [inline]\n __arm64_sys_open_by_handle_at+0x80/0x94 fs/fhandle.c:434\n __invoke_syscall arch/arm64/kernel/syscall.c:35 [inline]\n invoke_syscall+0x98/0x2b8 arch/arm64/kernel/syscall.c:49\n el0_svc_common+0x130/0x23c arch/arm64/kernel/syscall.c:132\n do_el0_svc+0x48/0x58 arch/arm64/kernel/syscall.c:151\n el0_svc+0x54/0x168 arch/arm64/kernel/entry-common.c:744\n el0t_64_sync_handler+0x84/0x108 arch/arm64/kernel/entry-common.c:762\n el0t_64_sync+0x198/0x19c arch/arm64/kernel/entry.S:600(CVE-2025-37780)\n\nIn the Linux kernel, the following vulnerability has been resolved:\n\nspi: spi-imx: Add check for spi_imx_setupxfer()\n\nAdd check for the return value of spi_imx_setupxfer().\nspi_imx->rx and spi_imx->tx function pointer can be NULL when\nspi_imx_setupxfer() return error, and make NULL pointer dereference.\n\n Unable to handle kernel NULL pointer dereference at virtual address 0000000000000000\n Call trace:\n  0x0\n  spi_imx_pio_transfer+0x50/0xd8\n  spi_imx_transfer_one+0x18c/0x858\n  spi_transfer_one_message+0x43c/0x790\n  __spi_pump_transfer_message+0x238/0x5d4\n  __spi_sync+0x2b0/0x454\n  spi_write_then_read+0x11c/0x200(CVE-2025-37801)\n\nIn the Linux kernel, the following vulnerability has been resolved:\n\nusb: xhci: Fix invalid pointer dereference in Etron workaround\n\nThis check is performed before prepare_transfer() and prepare_ring(), so\nenqueue can already point at the final link TRB of a segment. And indeed\nit will, some 0.4% of times this code is called.\n\nThen enqueue + 1 is an invalid pointer. It will crash the kernel right\naway or load some junk which may look like a link TRB and cause the real\nlink TRB to be replaced with a NOOP. This wouldn't end well.\n\nUse a functionally equivalent test which doesn't dereference the pointer\nand always gives correct result.\n\nSomething has crashed my machine twice in recent days while playing with\nan Etron HC, and a control transfer stress test ran for confirmation has\njust crashed it again. The same test passes with this patch applied.(CVE-2025-37813)\n\nIn the Linux kernel, the following vulnerability has been resolved:\n\nirqchip/gic-v2m: Prevent use after free of gicv2m_get_fwnode()\n\nWith ACPI in place, gicv2m_get_fwnode() is registered with the pci\nsubsystem as pci_msi_get_fwnode_cb(), which may get invoked at runtime\nduring a PCI host bridge probe. But, the call back is wrongly marked as\n__init, causing it to be freed, while being registered with the PCI\nsubsystem and could trigger:\n\n Unable to handle kernel paging request at virtual address ffff8000816c0400\n  gicv2m_get_fwnode+0x0/0x58 (P)\n  pci_set_bus_msi_domain+0x74/0x88\n  pci_register_host_bridge+0x194/0x548\n\nThis is easily reproducible on a Juno board with ACPI boot.\n\nRetain the function for later use.(CVE-2025-37819)\n\nIn the Linux kernel, the following vulnerability has been resolved:\n\nHID: pidff: Fix null pointer dereference in pidff_find_fields\n\nThis function triggered a null pointer dereference if used to search for\na report that isn't implemented on the device. This happened both for\noptional and required reports alike.\n\nThe same logic was applied to pidff_find_special_field and although\npidff_init_fields should return an error earlier if one of the required\nreports is missing, future modifications could change this logic and\nresurface this possible null pointer dereference again.\n\nLKML bug report:\nhttps://lore.kernel.org/all/CAL-gK7f5=R0nrrQdPtaZZr1fd-cdAMbDMuZ_NLA8vM0SX+nGSw@mail.gmail.com(CVE-2025-37862)\n\nIn the Linux kernel, the following vulnerability has been resolved:\n\nnet_sched: hfsc: Fix a UAF vulnerability in class with netem as child qdisc\n\nAs described in Gerrard's report [1], we have a UAF case when an hfsc class\nhas a netem child qdisc. The crux of the issue is that hfsc is assuming\nthat checking for cl->qdisc->q.qlen == 0 guarantees that it hasn't inserted\nthe class in the vttree or eltree (which is not true for the netem\nduplicate case).\n\nThis patch checks the n_active class variable to make sure that the code\nwon't insert the class in the vttree or eltree twice, catering for the\nreentrant case.\n\n[1] https://lore.kernel.org/netdev/CAHcdcOm+03OD2j6R0=YHKqmy=VgJ8xEOKuP6c7mSgnp-TEJJbw@mail.gmail.com/(CVE-2025-37890)\n\nIn the Linux kernel, the following vulnerability has been resolved:\n\nxsk: Fix race condition in AF_XDP generic RX path\n\nMove rx_lock from xsk_socket to xsk_buff_pool.\nFix synchronization for shared umem mode in\ngeneric RX path where multiple sockets share\nsingle xsk_buff_pool.\n\nRX queue is exclusive to xsk_socket, while FILL\nqueue can be shared between multiple sockets.\nThis could result in race condition where two\nCPU cores access RX path of two different sockets\nsharing the same umem.\n\nProtect both queues by acquiring spinlock in shared\nxsk_buff_pool.\n\nLock contention may be minimized in the future by some\nper-thread FQ buffering.\n\nIt's safe and necessary to move spin_lock_bh(rx_lock)\nafter xsk_rcv_check():\n* xs->pool and spinlock_init is synchronized by\n  xsk_bind() -> xsk_is_bound() memory barriers.\n* xsk_rcv_check() may return true at the moment\n  of xsk_release() or xsk_unbind_dev(),\n  however this will not cause any data races or\n  race conditions. xsk_unbind_dev() removes xdp\n  socket from all maps and waits for completion\n  of all outstanding rx operations. Packets in\n  RX path will either complete safely or drop.(CVE-2025-37920)\n\nIn the Linux kernel, the following vulnerability has been resolved:\n\nsch_hfsc: Fix qlen accounting bug when using peek in hfsc_enqueue()\n\nWhen enqueuing the first packet to an HFSC class, hfsc_enqueue() calls the\nchild qdisc's peek() operation before incrementing sch->q.qlen and\nsch->qstats.backlog. If the child qdisc uses qdisc_peek_dequeued(), this may\ntrigger an immediate dequeue and potential packet drop. In such cases,\nqdisc_tree_reduce_backlog() is called, but the HFSC qdisc's qlen and backlog\nhave not yet been updated, leading to inconsistent queue accounting. This\ncan leave an empty HFSC class in the active list, causing further\nconsequences like use-after-free.\n\nThis patch fixes the bug by moving the increment of sch->q.qlen and\nsch->qstats.backlog before the call to the child qdisc's peek() operation.\nThis ensures that queue length and backlog are always accurate when packet\ndrops or dequeues are triggered during the peek.(CVE-2025-38000)\n\nIn the Linux kernel, the following vulnerability has been resolved:\n\nnet_sched: hfsc: Address reentrant enqueue adding class to eltree twice\n\nSavino says:\n    \"We are writing to report that this recent patch\n    (141d34391abbb315d68556b7c67ad97885407547) [1]\n    can be bypassed, and a UAF can still occur when HFSC is utilized with\n    NETEM.\n\n    The patch only checks the cl->cl_nactive field to determine whether\n    it is the first insertion or not [2], but this field is only\n    incremented by init_vf [3].\n\n    By using HFSC_RSC (which uses init_ed) [4], it is possible to bypass the\n    check and insert the class twice in the eltree.\n    Under normal conditions, this would lead to an infinite loop in\n    hfsc_dequeue for the reasons we already explained in this report [5].\n\n    However, if TBF is added as root qdisc and it is configured with a\n    very low rate,\n    it can be utilized to prevent packets from being dequeued.\n    This behavior can be exploited to perform subsequent insertions in the\n    HFSC eltree and cause a UAF.\"\n\nTo fix both the UAF and the infinite loop, with netem as an hfsc child,\ncheck explicitly in hfsc_enqueue whether the class is already in the eltree\nwhenever the HFSC_RSC flag is set.\n\n[1] https://web.git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=141d34391abbb315d68556b7c67ad97885407547\n[2] https://elixir.bootlin.com/linux/v6.15-rc5/source/net/sched/sch_hfsc.c#L1572\n[3] https://elixir.bootlin.com/linux/v6.15-rc5/source/net/sched/sch_hfsc.c#L677\n[4] https://elixir.bootlin.com/linux/v6.15-rc5/source/net/sched/sch_hfsc.c#L1574\n[5] https://lore.kernel.org/netdev/8DuRWwfqjoRDLDmBMlIfbrsZg9Gx50DHJc1ilxsEBNe2D6NMoigR_eIRIG0LOjMc3r10nUUZtArXx4oZBIdUfZQrwjcQhdinnMis_0G7VEk=@willsroot.io/T/#u(CVE-2025-38001)\n\nIn the Linux kernel, the following vulnerability has been resolved:\n\nnet: mctp: Don't access ifa_index when missing\n\nIn mctp_dump_addrinfo, ifa_index can be used to filter interfaces, but\nonly when the struct ifaddrmsg is provided. Otherwise it will be\ncomparing to uninitialised memory - reproducible in the syzkaller case from\ndhcpd, or busybox \"ip addr show\".\n\nThe kernel MCTP implementation has always filtered by ifa_index, so\nexisting userspace programs expecting to dump MCTP addresses must\nalready be passing a valid ifa_index value (either 0 or a real index).\n\nBUG: KMSAN: uninit-value in mctp_dump_addrinfo+0x208/0xac0 net/mctp/device.c:128\n mctp_dump_addrinfo+0x208/0xac0 net/mctp/device.c:128\n rtnl_dump_all+0x3ec/0x5b0 net/core/rtnetlink.c:4380\n rtnl_dumpit+0xd5/0x2f0 net/core/rtnetlink.c:6824\n netlink_dump+0x97b/0x1690 net/netlink/af_netlink.c:2309(CVE-2025-38006)\n\nIn the Linux kernel, the following vulnerability has been resolved:\n\nwifi: mt76: disable napi on driver removal\n\nA warning on driver removal started occurring after commit 9dd05df8403b\n(\"net: warn if NAPI instance wasn't shut down\"). Disable tx napi before\ndeleting it in mt76_dma_cleanup().\n\n WARNING: CPU: 4 PID: 18828 at net/core/dev.c:7288 __netif_napi_del_locked+0xf0/0x100\n CPU: 4 UID: 0 PID: 18828 Comm: modprobe Not tainted 6.15.0-rc4 #4 PREEMPT(lazy)\n Hardware name: ASUS System Product Name/PRIME X670E-PRO WIFI, BIOS 3035 09/05/2024\n RIP: 0010:__netif_napi_del_locked+0xf0/0x100\n Call Trace:\n <TASK>\n mt76_dma_cleanup+0x54/0x2f0 [mt76]\n mt7921_pci_remove+0xd5/0x190 [mt7921e]\n pci_device_remove+0x47/0xc0\n device_release_driver_internal+0x19e/0x200\n driver_detach+0x48/0x90\n bus_remove_driver+0x6d/0xf0\n pci_unregister_driver+0x2e/0xb0\n __do_sys_delete_module.isra.0+0x197/0x2e0\n do_syscall_64+0x7b/0x160\n entry_SYSCALL_64_after_hwframe+0x76/0x7e\n\nTested with mt7921e but the same pattern can be actually applied to other\nmt76 drivers calling mt76_dma_cleanup() during removal. Tx napi is enabled\nin their *_dma_init() functions and only toggled off and on again inside\ntheir suspend/resume/reset paths. So it should be okay to disable tx\nnapi in such a generic way.\n\nFound by Linux Verification Center (linuxtesting.org).(CVE-2025-38009)\n\nIn the Linux kernel, the following vulnerability has been resolved:\n\nwifi: mac80211: Set n_channels after allocating struct cfg80211_scan_request\n\nMake sure that n_channels is set after allocating the\nstruct cfg80211_registered_device::int_scan_req member. Seen with\nsyzkaller:\n\nUBSAN: array-index-out-of-bounds in net/mac80211/scan.c:1208:5\nindex 0 is out of range for type 'struct ieee80211_channel *[] __counted_by(n_channels)' (aka 'struct ieee80211_channel *[]')\n\nThis was missed in the initial conversions because I failed to locate\nthe allocation likely due to the \"sizeof(void *)\" not matching the\n\"channels\" array type.(CVE-2025-38013)\n\nIn the Linux kernel, the following vulnerability has been resolved:\n\nwifi: iwlwifi: fix debug actions order\n\nThe order of actions taken for debug was implemented incorrectly.\nNow we implemented the dump split and do the FW reset only in the\nmiddle of the dump (rather than the FW killing itself on error.)\nAs a result, some of the actions taken when applying the config\nwill now crash the device, so we need to fix the order.(CVE-2025-38045)\n\nIn the Linux kernel, the following vulnerability has been resolved:\n\nnet/tipc: fix slab-use-after-free Read in tipc_aead_encrypt_done\n\nSyzbot reported a slab-use-after-free with the following call trace:\n\n  ==================================================================\n  BUG: KASAN: slab-use-after-free in tipc_aead_encrypt_done+0x4bd/0x510 net/tipc/crypto.c:840\n  Read of size 8 at addr ffff88807a733000 by task kworker/1:0/25\n\n  Call Trace:\n   kasan_report+0xd9/0x110 mm/kasan/report.c:601\n   tipc_aead_encrypt_done+0x4bd/0x510 net/tipc/crypto.c:840\n   crypto_request_complete include/crypto/algapi.h:266\n   aead_request_complete include/crypto/internal/aead.h:85\n   cryptd_aead_crypt+0x3b8/0x750 crypto/cryptd.c:772\n   crypto_request_complete include/crypto/algapi.h:266\n   cryptd_queue_worker+0x131/0x200 crypto/cryptd.c:181\n   process_one_work+0x9fb/0x1b60 kernel/workqueue.c:3231\n\n  Allocated by task 8355:\n   kzalloc_noprof include/linux/slab.h:778\n   tipc_crypto_start+0xcc/0x9e0 net/tipc/crypto.c:1466\n   tipc_init_net+0x2dd/0x430 net/tipc/core.c:72\n   ops_init+0xb9/0x650 net/core/net_namespace.c:139\n   setup_net+0x435/0xb40 net/core/net_namespace.c:343\n   copy_net_ns+0x2f0/0x670 net/core/net_namespace.c:508\n   create_new_namespaces+0x3ea/0xb10 kernel/nsproxy.c:110\n   unshare_nsproxy_namespaces+0xc0/0x1f0 kernel/nsproxy.c:228\n   ksys_unshare+0x419/0x970 kernel/fork.c:3323\n   __do_sys_unshare kernel/fork.c:3394\n\n  Freed by task 63:\n   kfree+0x12a/0x3b0 mm/slub.c:4557\n   tipc_crypto_stop+0x23c/0x500 net/tipc/crypto.c:1539\n   tipc_exit_net+0x8c/0x110 net/tipc/core.c:119\n   ops_exit_list+0xb0/0x180 net/core/net_namespace.c:173\n   cleanup_net+0x5b7/0xbf0 net/core/net_namespace.c:640\n   process_one_work+0x9fb/0x1b60 kernel/workqueue.c:3231\n\nAfter freed the tipc_crypto tx by delete namespace, tipc_aead_encrypt_done\nmay still visit it in cryptd_queue_worker workqueue.\n\nI reproduce this issue by:\n  ip netns add ns1\n  ip link add veth1 type veth peer name veth2\n  ip link set veth1 netns ns1\n  ip netns exec ns1 tipc bearer enable media eth dev veth1\n  ip netns exec ns1 tipc node set key this_is_a_master_key master\n  ip netns exec ns1 tipc bearer disable media eth dev veth1\n  ip netns del ns1\n\nThe key of reproduction is that, simd_aead_encrypt is interrupted, leading\nto crypto_simd_usable() return false. Thus, the cryptd_queue_worker is\ntriggered, and the tipc_crypto tx will be visited.\n\n  tipc_disc_timeout\n    tipc_bearer_xmit_skb\n      tipc_crypto_xmit\n        tipc_aead_encrypt\n          crypto_aead_encrypt\n            // encrypt()\n            simd_aead_encrypt\n              // crypto_simd_usable() is false\n              child = &ctx->cryptd_tfm->base;\n\n  simd_aead_encrypt\n    crypto_aead_encrypt\n      // encrypt()\n      cryptd_aead_encrypt_enqueue\n        cryptd_aead_enqueue\n          cryptd_enqueue_request\n            // trigger cryptd_queue_worker\n            queue_work_on(smp_processor_id(), cryptd_wq, &cpu_queue->work)\n\nFix this by holding net reference count before encrypt.(CVE-2025-38052)\n\nIn the Linux kernel, the following vulnerability has been resolved:\n\ncrypto: lzo - Fix compression buffer overrun\n\nUnlike the decompression code, the compression code in LZO never\nchecked for output overruns.  It instead assumes that the caller\nalways provides enough buffer space, disregarding the buffer length\nprovided by the caller.\n\nAdd a safe compression interface that checks for the end of buffer\nbefore each write.  Use the safe interface in crypto/lzo.(CVE-2025-38068)\n\nIn the Linux kernel, the following vulnerability has been resolved:\n\npowerpc/powernv/memtrace: Fix out of bounds issue in memtrace mmap\n\nmemtrace mmap issue has an out of bounds issue. This patch fixes the by\nchecking that the requested mapping region size should stay within the\nallocated region size.(CVE-2025-38088)\n\nIn the Linux kernel, the following vulnerability has been resolved:\n\nsunrpc: handle SVC_GARBAGE during svc auth processing as auth error\n\ntianshuo han reported a remotely-triggerable crash if the client sends a\nkernel RPC server a specially crafted packet. If decoding the RPC reply\nfails in such a way that SVC_GARBAGE is returned without setting the\nrq_accept_statp pointer, then that pointer can be dereferenced and a\nvalue stored there.\n\nIf it's the first time the thread has processed an RPC, then that\npointer will be set to NULL and the kernel will crash. In other cases,\nit could create a memory scribble.\n\nThe server sunrpc code treats a SVC_GARBAGE return from svc_authenticate\nor pg_authenticate as if it should send a GARBAGE_ARGS reply. RFC 5531\nsays that if authentication fails that the RPC should be rejected\ninstead with a status of AUTH_ERR.\n\nHandle a SVC_GARBAGE return as an AUTH_ERROR, with a reason of\nAUTH_BADCRED instead of returning GARBAGE_ARGS in that case. This\nsidesteps the whole problem of touching the rpc_accept_statp pointer in\nthis situation and avoids the crash.(CVE-2025-38089)\n\nLinux kernel is the kernel used by Linux, the open source operating system of the Linux Foundation in the United States.\n There is a security vulnerability in Linux kernel, which originates from the TOCTOU problem with the sk_is_readable function, which may cause the null pointer to be dereferenced.(CVE-2025-38112)\n\nA vulnerability, which was classified as critical, was found in Linux Kernel up to 6.15.1 (Operating System).CWE is classifying the issue as CWE-404. The product does not release or incorrectly releases a resource before it is made available for re-use.This is going to have an impact on availability.Upgrading to version 5.4.295, 5.10.239, 5.15.186, 6.1.142, 6.6.94, 6.12.33, 6.14.11, 6.15.2 or 6.16-rc1 eliminates this vulnerability. Applying the patch e49e994cd83705f7ca30eda1e304abddfd96a37a/0a3011d47dbc92a33621861c423cb64833d7fe57/2f62eda4d974c26bc595425eafd429067541f2c9/85286e634ebbaf9c0fb1cdf580add2f33fc7628c/5a057f261539720165d03d85024da2b52e67f63d/eb2d5e794fb966b3ef8bde99eb8561446a53509f/0771bcbe2f6e5d5f263cf466efe571d2754a46da/cdb4feab2f39e75a66239e3a112beced279612a8/0f73628e9da1ee39daf5f188190cdbaee5e0c98c is able to eliminate this problem. The bugfix is ready for download at git.kernel.org. The best possible mitigation is suggested to be upgrading to the latest version.(CVE-2025-38174)\n\nIn the Linux kernel, the following vulnerability has been resolved:\n\ntipc: fix null-ptr-deref when acquiring remote ip of ethernet bearer\n\nThe reproduction steps:\n1. create a tun interface\n2. enable l2 bearer\n3. TIPC_NL_UDP_GET_REMOTEIP with media name set to tun\n\ntipc: Started in network mode\ntipc: Node identity 8af312d38a21, cluster identity 4711\ntipc: Enabled bearer <eth:syz_tun>, priority 1\nOops: general protection fault\nKASAN: null-ptr-deref in range\nCPU: 1 UID: 1000 PID: 559 Comm: poc Not tainted 6.16.0-rc1+ #117 PREEMPT\nHardware name: QEMU Ubuntu 24.04 PC\nRIP: 0010:tipc_udp_nl_dump_remoteip+0x4a4/0x8f0\n\nthe ub was in fact a struct dev.\n\nwhen bid != 0 && skip_cnt != 0, bearer_list[bid] may be NULL or\nother media when other thread changes it.\n\nfix this by checking media_id.(CVE-2025-38184)\n\nA vulnerability classified as critical has been found in Linux Kernel up to 6.6.94/6.12.34/6.15.3/6.16-rc1 (Operating System).CWE is classifying the issue as CWE-476. A NULL pointer dereference occurs when the application dereferences a pointer that it expects to be valid, but is NULL, typically causing a crash or exit.This is going to have an impact on availability.Upgrading to version 6.6.95, 6.12.35, 6.15.4 or 6.16-rc2 eliminates this vulnerability. Applying the patch bfa4d86e130a09f67607482e988313430e38f6c4/2a3ad42a57b43145839f2f233fb562247658a6d9/e9994e7b9f7bbb882d13c8191731649249150d21/ba9db6f907ac02215e30128770f85fbd7db2fcf9 is able to eliminate this problem. The bugfix is ready for download at git.kernel.org. The best possible mitigation is suggested to be upgrading to the latest version.The vulnerability is also documented in the vulnerability database at EUVD (EUVD-2025-20064).(CVE-2025-38192)\n\nIn the Linux kernel, the following vulnerability has been resolved:\n\nscsi: megaraid_sas: Fix invalid node index\n\nOn a system with DRAM interleave enabled, out-of-bound access is\ndetected:\n\nmegaraid_sas 0000:3f:00.0: requested/available msix 128/128 poll_queue 0\n------------[ cut here ]------------\nUBSAN: array-index-out-of-bounds in ./arch/x86/include/asm/topology.h:72:28\nindex -1 is out of range for type 'cpumask *[1024]'\ndump_stack_lvl+0x5d/0x80\nubsan_epilogue+0x5/0x2b\n__ubsan_handle_out_of_bounds.cold+0x46/0x4b\nmegasas_alloc_irq_vectors+0x149/0x190 [megaraid_sas]\nmegasas_probe_one.cold+0xa4d/0x189c [megaraid_sas]\nlocal_pci_probe+0x42/0x90\npci_device_probe+0xdc/0x290\nreally_probe+0xdb/0x340\n__driver_probe_device+0x78/0x110\ndriver_probe_device+0x1f/0xa0\n__driver_attach+0xba/0x1c0\nbus_for_each_dev+0x8b/0xe0\nbus_add_driver+0x142/0x220\ndriver_register+0x72/0xd0\nmegasas_init+0xdf/0xff0 [megaraid_sas]\ndo_one_initcall+0x57/0x310\ndo_init_module+0x90/0x250\ninit_module_from_file+0x85/0xc0\nidempotent_init_module+0x114/0x310\n__x64_sys_finit_module+0x65/0xc0\ndo_syscall_64+0x82/0x170\nentry_SYSCALL_64_after_hwframe+0x76/0x7e\n\nFix it accordingly.(CVE-2025-38239)\n\nA vulnerability was found in Linux Kernel up to 6.15.4/6.16-rc3 (Operating System). It has been classified as critical.CWE is classifying the issue as CWE-416. Referencing memory after it has been freed can cause a program to crash, use unexpected values, or execute code.This is going to have an impact on confidentiality, integrity, and availability.Upgrading to version 6.15.5 or 6.16-rc4 eliminates this vulnerability. Applying the patch f05a4f9e959e0fc098046044c650acf897ea52d2/7544f3f5b0b58c396f374d060898b5939da31709 is able to eliminate this problem. The bugfix is ready for download at git.kernel.org. The best possible mitigation is suggested to be upgrading to the latest version.The vulnerability is also documented in the vulnerability database at EUVD (EUVD-2025-20813).(CVE-2025-38248)\n\nA vulnerability, which was classified as problematic, has been found in Linux Kernel up to 5.15.185/6.1.141/6.6.93/6.12.33/6.15.2 (Operating System).Using CWE to declare the problem leads to CWE-824. The product accesses or uses a pointer that has not been initialized.Impacted is confidentiality, integrity, and availability.Upgrading to version 5.15.186, 6.1.142, 6.6.94, 6.12.34, 6.15.3 or 6.16-rc1 eliminates this vulnerability. Applying the patch 668923c474608dd9ebce0fbcc41bd8a27aa73dd6/cef33a86bcb04ecf4dc10c56f6c42ee9d1c54bac/d2507aeea45b3c5aa24d5daae0cf3db76895c0b7/d5d9fd13bc19a3f9f2a951c5b6e934d84205789e/cd4cd09810211fa23609c5c1018352e9e1cd8e5a/7632fedb266d93ed0ed9f487133e6c6314a9b2d1 is able to eliminate this problem. The bugfix is ready for download at git.kernel.org. The best possible mitigation is suggested to be upgrading to the latest version.(CVE-2025-38310)\n\nA vulnerability, which was classified as critical, was found in Linux Kernel up to 6.6.95/6.12.35/6.15.4 (Operating System).CWE is classifying the issue as CWE-404. The product does not release or incorrectly releases a resource before it is made available for re-use.This is going to have an impact on availability.Upgrading to version 6.6.96, 6.12.36, 6.15.5 or 6.16-rc1 eliminates this vulnerability. Applying the patch e0051a3daa8b2cb318b03b2f9317c3e40855847a/98fd66c8ba77e3a7137575f610271014bc0e701f/aee7a7439f8c0884da87694a401930204a57128f/17502e7d7b7113346296f6758324798d536c31fd is able to eliminate this problem. The bugfix is ready for download at git.kernel.org. The best possible mitigation is suggested to be upgrading to the latest version.(CVE-2025-38369)\n\nIn the Linux kernel, the following vulnerability has been resolved:\n\nnetfilter: flowtable: account for Ethernet header in nf_flow_pppoe_proto()\n\nsyzbot found a potential access to uninit-value in nf_flow_pppoe_proto()\n\nBlamed commit forgot the Ethernet header.\n\nBUG: KMSAN: uninit-value in nf_flow_offload_inet_hook+0x7e4/0x940 net/netfilter/nf_flow_table_inet.c:27\n  nf_flow_offload_inet_hook+0x7e4/0x940 net/netfilter/nf_flow_table_inet.c:27\n  nf_hook_entry_hookfn include/linux/netfilter.h:157 [inline]\n  nf_hook_slow+0xe1/0x3d0 net/netfilter/core.c:623\n  nf_hook_ingress include/linux/netfilter_netdev.h:34 [inline]\n  nf_ingress net/core/dev.c:5742 [inline]\n  __netif_receive_skb_core+0x4aff/0x70c0 net/core/dev.c:5837\n  __netif_receive_skb_one_core net/core/dev.c:5975 [inline]\n  __netif_receive_skb+0xcc/0xac0 net/core/dev.c:6090\n  netif_receive_skb_internal net/core/dev.c:6176 [inline]\n  netif_receive_skb+0x57/0x630 net/core/dev.c:6235\n  tun_rx_batched+0x1df/0x980 drivers/net/tun.c:1485\n  tun_get_user+0x4ee0/0x6b40 drivers/net/tun.c:1938\n  tun_chr_write_iter+0x3e9/0x5c0 drivers/net/tun.c:1984\n  new_sync_write fs/read_write.c:593 [inline]\n  vfs_write+0xb4b/0x1580 fs/read_write.c:686\n  ksys_write fs/read_write.c:738 [inline]\n  __do_sys_write fs/read_write.c:749 [inline](CVE-2025-38441)\n\nIn the Linux kernel, the following vulnerability has been resolved:\n\nraid10: cleanup memleak at raid10_make_request\n\nIf raid10_read_request or raid10_write_request registers a new\nrequest and the REQ_NOWAIT flag is set, the code does not\nfree the malloc from the mempool.\n\nunreferenced object 0xffff8884802c3200 (size 192):\n   comm \"fio\", pid 9197, jiffies 4298078271\n   hex dump (first 32 bytes):\n     00 00 00 00 00 00 00 00 88 41 02 00 00 00 00 00  .........A......\n     08 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00  ................\n   backtrace (crc c1a049a2):\n     __kmalloc+0x2bb/0x450\n     mempool_alloc+0x11b/0x320\n     raid10_make_request+0x19e/0x650 [raid10]\n     md_handle_request+0x3b3/0x9e0\n     __submit_bio+0x394/0x560\n     __submit_bio_noacct+0x145/0x530\n     submit_bio_noacct_nocheck+0x682/0x830\n     __blkdev_direct_IO_async+0x4dc/0x6b0\n     blkdev_read_iter+0x1e5/0x3b0\n     __io_read+0x230/0x1110\n     io_read+0x13/0x30\n     io_issue_sqe+0x134/0x1180\n     io_submit_sqes+0x48c/0xe90\n     __do_sys_io_uring_enter+0x574/0x8b0\n     do_syscall_64+0x5c/0xe0\n     entry_SYSCALL_64_after_hwframe+0x76/0x7e\n\nV4: changing backing tree to see if CKI tests will pass.\nThe patch code has not changed between any versions.(CVE-2025-38444)\n\nIn the Linux kernel, the following vulnerability has been resolved:\n\nmd/raid1: Fix stack memory use after return in raid1_reshape\n\nIn the raid1_reshape function, newpool is\nallocated on the stack and assigned to conf->r1bio_pool.\nThis results in conf->r1bio_pool.wait.head pointing\nto a stack address.\nAccessing this address later can lead to a kernel panic.\n\nExample access path:\n\nraid1_reshape()\n{\n\t// newpool is on the stack\n\tmempool_t newpool, oldpool;\n\t// initialize newpool.wait.head to stack address\n\tmempool_init(&newpool, ...);\n\tconf->r1bio_pool = newpool;\n}\n\nraid1_read_request() or raid1_write_request()\n{\n\talloc_r1bio()\n\t{\n\t\tmempool_alloc()\n\t\t{\n\t\t\t// if pool->alloc fails\n\t\t\tremove_element()\n\t\t\t{\n\t\t\t\t--pool->curr_nr;\n\t\t\t}\n\t\t}\n\t}\n}\n\nmempool_free()\n{\n\tif (pool->curr_nr < pool->min_nr) {\n\t\t// pool->wait.head is a stack address\n\t\t// wake_up() will try to access this invalid address\n\t\t// which leads to a kernel panic\n\t\treturn;\n\t\twake_up(&pool->wait);\n\t}\n}\n\nFix:\nreinit conf->r1bio_pool.wait after assigning newpool.(CVE-2025-38445)\n\nIn the Linux kernel, the following vulnerability has been resolved:\n\nipmi:msghandler: Fix potential memory corruption in ipmi_create_user()\n\nThe \"intf\" list iterator is an invalid pointer if the correct\n\"intf->intf_num\" is not found.  Calling atomic_dec(&intf->nr_users) on\nand invalid pointer will lead to memory corruption.\n\nWe don't really need to call atomic_dec() if we haven't called\natomic_add_return() so update the if (intf->in_shutdown) path as well.(CVE-2025-38456)\n\nA vulnerability, which was classified as problematic, has been found in Linux Kernel up to 6.6.98/6.12.38/6.15.6/6.16-rc5 (Operating System).The manipulation of the argument involved with an unknown input leads to a unknown weakness. Using CWE to declare the problem leads to CWE-770. The product allocates a reusable resource or group of resources on behalf of an actor without imposing any restrictions on the size or number of resources that can be allocated, in violation of the intended security policy for that actor.Impacted is confidentiality, integrity, and availability.Upgrading to version 6.6.99, 6.12.39, 6.15.7 or 6.16-rc6 eliminates this vulnerability. Applying the patch 81373cd1d72d87c7d844d4454a526b8f53e72d00/62e6160cfb5514787bda833d466509edc38fde23/9f164fa6bb09fbcc60fa5c3ff551ce9eec1befd7/d3a5f2871adc0c61c61869f37f3e697d97f03d8c is able to eliminate this problem. The bugfix is ready for download at git.kernel.org. The best possible mitigation is suggested to be upgrading to the latest version.(CVE-2025-38463)\n\nIn the Linux kernel, the following vulnerability has been resolved:\n\ntipc: Fix use-after-free in tipc_conn_close().\n\nsyzbot reported a null-ptr-deref in tipc_conn_close() during netns\ndismantle. [0]\n\ntipc_topsrv_stop() iterates tipc_net(net)->topsrv->conn_idr and calls\ntipc_conn_close() for each tipc_conn.\n\nThe problem is that tipc_conn_close() is called after releasing the\nIDR lock.\n\nAt the same time, there might be tipc_conn_recv_work() running and it\ncould call tipc_conn_close() for the same tipc_conn and release its\nlast ->kref.\n\nOnce we release the IDR lock in tipc_topsrv_stop(), there is no\nguarantee that the tipc_conn is alive.\n\nLet's hold the ref before releasing the lock and put the ref after\ntipc_conn_close() in tipc_topsrv_stop().\n\n[0]:\nBUG: KASAN: use-after-free in tipc_conn_close+0x122/0x140 net/tipc/topsrv.c:165\nRead of size 8 at addr ffff888099305a08 by task kworker/u4:3/435\n\nCPU: 0 PID: 435 Comm: kworker/u4:3 Not tainted 4.19.204-syzkaller #0\nHardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011\nWorkqueue: netns cleanup_net\nCall Trace:\n __dump_stack lib/dump_stack.c:77 [inline]\n dump_stack+0x1fc/0x2ef lib/dump_stack.c:118\n print_address_description.cold+0x54/0x219 mm/kasan/report.c:256\n kasan_report_error.cold+0x8a/0x1b9 mm/kasan/report.c:354\n kasan_report mm/kasan/report.c:412 [inline]\n __asan_report_load8_noabort+0x88/0x90 mm/kasan/report.c:433\n tipc_conn_close+0x122/0x140 net/tipc/topsrv.c:165\n tipc_topsrv_stop net/tipc/topsrv.c:701 [inline]\n tipc_topsrv_exit_net+0x27b/0x5c0 net/tipc/topsrv.c:722\n ops_exit_list+0xa5/0x150 net/core/net_namespace.c:153\n cleanup_net+0x3b4/0x8b0 net/core/net_namespace.c:553\n process_one_work+0x864/0x1570 kernel/workqueue.c:2153\n worker_thread+0x64c/0x1130 kernel/workqueue.c:2296\n kthread+0x33f/0x460 kernel/kthread.c:259\n ret_from_fork+0x24/0x30 arch/x86/entry/entry_64.S:415\n\nAllocated by task 23:\n kmem_cache_alloc_trace+0x12f/0x380 mm/slab.c:3625\n kmalloc include/linux/slab.h:515 [inline]\n kzalloc include/linux/slab.h:709 [inline]\n tipc_conn_alloc+0x43/0x4f0 net/tipc/topsrv.c:192\n tipc_topsrv_accept+0x1b5/0x280 net/tipc/topsrv.c:470\n process_one_work+0x864/0x1570 kernel/workqueue.c:2153\n worker_thread+0x64c/0x1130 kernel/workqueue.c:2296\n kthread+0x33f/0x460 kernel/kthread.c:259\n ret_from_fork+0x24/0x30 arch/x86/entry/entry_64.S:415\n\nFreed by task 23:\n __cache_free mm/slab.c:3503 [inline]\n kfree+0xcc/0x210 mm/slab.c:3822\n tipc_conn_kref_release net/tipc/topsrv.c:150 [inline]\n kref_put include/linux/kref.h:70 [inline]\n conn_put+0x2cd/0x3a0 net/tipc/topsrv.c:155\n process_one_work+0x864/0x1570 kernel/workqueue.c:2153\n worker_thread+0x64c/0x1130 kernel/workqueue.c:2296\n kthread+0x33f/0x460 kernel/kthread.c:259\n ret_from_fork+0x24/0x30 arch/x86/entry/entry_64.S:415\n\nThe buggy address belongs to the object at ffff888099305a00\n which belongs to the cache kmalloc-512 of size 512\nThe buggy address is located 8 bytes inside of\n 512-byte region [ffff888099305a00, ffff888099305c00)\nThe buggy address belongs to the page:\npage:ffffea000264c140 count:1 mapcount:0 mapping:ffff88813bff0940 index:0x0\nflags: 0xfff00000000100(slab)\nraw: 00fff00000000100 ffffea00028b6b88 ffffea0002cd2b08 ffff88813bff0940\nraw: 0000000000000000 ffff888099305000 0000000100000006 0000000000000000\npage dumped because: kasan: bad access detected\n\nMemory state around the buggy address:\n ffff888099305900: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb\n ffff888099305980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc\n>ffff888099305a00: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb\n                      ^\n ffff888099305a80: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb\n ffff888099305b00: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb(CVE-2025-38464)\n\nA vulnerability was found in Linux Kernel up to 6.16-rc5 (Operating System). It has been classified as problematic.CWE is classifying the issue as CWE-345. The product does not sufficiently verify the origin or authenticity of data, in a way that causes it to accept invalid data.This is going to have an impact on confidentiality, integrity, and availability.Upgrading to version 5.4.296, 5.10.240, 5.15.189, 6.1.146, 6.6.99, 6.12.39, 6.15.7 or 6.16-rc6 eliminates this vulnerability. Applying the patch 9da025150b7c14a8390fc06aea314c0a4011e82c/c4ceaac5c5ba0b992ee1dc88e2a02421549e5c98/fd69af06101090eaa60b3d216ae715f9c0a58e5b/76602d8e13864524382b0687dc32cd8f19164d5a/55baecb9eb90238f60a8350660d6762046ebd3bd/4b8e18af7bea92f8b7fb92d40aeae729209db250/cd7ff61bfffd7000143c42bbffb85eeb792466d6/ae8f160e7eb24240a2a79fc4c815c6a0d4ee16cc is able to eliminate this problem. The bugfix is ready for download at git.kernel.org. The best possible mitigation is suggested to be upgrading to the latest version.(CVE-2025-38465)\n\nA vulnerability was found in Linux Kernel up to 6.15.6 (Operating System). It has been rated as critical.Using CWE to declare the problem leads to CWE-404. The product does not release or incorrectly releases a resource before it is made available for re-use.Impacted is availability.Upgrading to version 5.4.296, 5.10.240, 5.15.189, 6.1.146, 6.6.99, 6.12.39 or 6.15.7 eliminates this vulnerability. Applying the patch 549a9c78c3ea6807d0dc4162a4f5ba59f217d5a0/e62f51d0ec8a9baf324caf9a564f8e318d36a551/ef841f8e4e1ff67817ca899bedc5ebb00847c0a7/f9a4f28a4fc4ee453a92a9abbe36e26224d17749/c64f5310530baf75328292f9b9f3f2961d185183/e2d6547dc8b9b332f9bc00875197287a6a4db65a/ef58a95457466849fa7b31fd3953801a5af0f58b/8af39ec5cf2be522c8eb43a3d8005ed59e4daaee is able to eliminate this problem. The bugfix is ready for download at git.kernel.org. The best possible mitigation is suggested to be upgrading to the latest version.(CVE-2025-38515)\n\nA vulnerability was found in Linux Kernel up to 6.6.99/6.12.39/6.15.7 (Operating System). It has been classified as critical.CWE is classifying the issue as CWE-476. A NULL pointer dereference occurs when the application dereferences a pointer that it expects to be valid, but is NULL, typically causing a crash or exit.This is going to have an impact on availability.Upgrading to version 6.6.100, 6.12.40 or 6.15.8 eliminates this vulnerability. Applying the patch 27591d926191e42b2332e4bad3bcd3a49def393b/5a5d64f0eec82076b2c09fee2195d640cfbe3379/245917d3c5ed7c6ae720302b64eac5c6f0c85177/3ce58b01ada408b372f15b7c992ed0519840e3cf is able to eliminate this problem. The bugfix is ready for download at git.kernel.org. The best possible mitigation is suggested to be upgrading to the latest version.(CVE-2025-38526)\n\nIn the Linux kernel, the following vulnerability has been resolved:\n\ntracing: Add down_write(trace_event_sem) when adding trace event\n\nWhen a module is loaded, it adds trace events defined by the module. It\nmay also need to modify the modules trace printk formats to replace enum\nnames with their values.\n\nIf two modules are loaded at the same time, the adding of the event to the\nftrace_events list can corrupt the walking of the list in the code that is\nmodifying the printk format strings and crash the kernel.\n\nThe addition of the event should take the trace_event_sem for write while\nit adds the new event.\n\nAlso add a lockdep_assert_held() on that semaphore in\n__trace_add_event_dirs() as it iterates the list.(CVE-2025-38539)\n\nIn the Linux kernel, the following vulnerability has been resolved:\n\nperf/core: Exit early on perf_mmap() fail\n\nWhen perf_mmap() fails to allocate a buffer, it still invokes the\nevent_mapped() callback of the related event. On X86 this might increase\nthe perf_rdpmc_allowed reference counter. But nothing undoes this as\nperf_mmap_close() is never called in this case, which causes another\nreference count leak.\n\nReturn early on failure to prevent that.(CVE-2025-38565)\n\nA vulnerability, which was classified as critical, has been found in Linux Kernel up to 6.6.100/6.12.40/6.15.8 (Operating System).Using CWE to declare the problem leads to CWE-404. The product does not release or incorrectly releases a resource before it is made available for re-use.Impacted is availability.Upgrading to version 6.6.101, 6.12.41 or 6.15.9 eliminates this vulnerability. Applying the patch 9433a5f437b0948d6a2d8a02ad7a42ab7ca27a61/708fd522b86d2a9544c34ec6a86fa3fc23336525/0f67015d72627bad72da3c2084352e0aa134416b/d42e6c20de6192f8e4ab4cf10be8c694ef27e8cb is able to eliminate this problem. The bugfix is ready for download at git.kernel.org. The best possible mitigation is suggested to be upgrading to the latest version.(CVE-2025-38670)",
				"category":"general",
				"title":"Description"
			},
			{
				"text":"An update for kernel is now available for openEuler-24.03-LTS.\n\nopenEuler Security has rated this update as having a security impact of high. A Common Vunlnerability Scoring System(CVSS)base score,which gives a detailed severity rating, is available for each vulnerability from the CVElink(s) in the References section.",
				"category":"general",
				"title":"Topic"
			},
			{
				"text":"High",
				"category":"general",
				"title":"Severity"
			},
			{
				"text":"kernel",
				"category":"general",
				"title":"Affected Component"
			}
		],
		"publisher":{
			"issuing_authority":"openEuler security committee",
			"name":"openEuler",
			"namespace":"https://www.openeuler.org",
			"contact_details":"openeuler-security@openeuler.org",
			"category":"vendor"
		},
		"references":[
			{
				"summary":"openEuler-SA-2025-2077",
				"category":"self",
				"url":"https://www.openeuler.org/zh/security/security-bulletins/detail/?id=openEuler-SA-2025-2077"
			},
			{
				"summary":"CVE-2024-57948",
				"category":"self",
				"url":"https://www.openeuler.org/en/security/cve/detail/?cveId=CVE-2024-57948&packageName=kernel"
			},
			{
				"summary":"CVE-2025-21839",
				"category":"self",
				"url":"https://www.openeuler.org/en/security/cve/detail/?cveId=CVE-2025-21839&packageName=kernel"
			},
			{
				"summary":"CVE-2025-21907",
				"category":"self",
				"url":"https://www.openeuler.org/en/security/cve/detail/?cveId=CVE-2025-21907&packageName=kernel"
			},
			{
				"summary":"CVE-2025-21956",
				"category":"self",
				"url":"https://www.openeuler.org/en/security/cve/detail/?cveId=CVE-2025-21956&packageName=kernel"
			},
			{
				"summary":"CVE-2025-21959",
				"category":"self",
				"url":"https://www.openeuler.org/en/security/cve/detail/?cveId=CVE-2025-21959&packageName=kernel"
			},
			{
				"summary":"CVE-2025-21969",
				"category":"self",
				"url":"https://www.openeuler.org/en/security/cve/detail/?cveId=CVE-2025-21969&packageName=kernel"
			},
			{
				"summary":"CVE-2025-22102",
				"category":"self",
				"url":"https://www.openeuler.org/en/security/cve/detail/?cveId=CVE-2025-22102&packageName=kernel"
			},
			{
				"summary":"CVE-2025-22105",
				"category":"self",
				"url":"https://www.openeuler.org/en/security/cve/detail/?cveId=CVE-2025-22105&packageName=kernel"
			},
			{
				"summary":"CVE-2025-37767",
				"category":"self",
				"url":"https://www.openeuler.org/en/security/cve/detail/?cveId=CVE-2025-37767&packageName=kernel"
			},
			{
				"summary":"CVE-2025-37780",
				"category":"self",
				"url":"https://www.openeuler.org/en/security/cve/detail/?cveId=CVE-2025-37780&packageName=kernel"
			},
			{
				"summary":"CVE-2025-37801",
				"category":"self",
				"url":"https://www.openeuler.org/en/security/cve/detail/?cveId=CVE-2025-37801&packageName=kernel"
			},
			{
				"summary":"CVE-2025-37813",
				"category":"self",
				"url":"https://www.openeuler.org/en/security/cve/detail/?cveId=CVE-2025-37813&packageName=kernel"
			},
			{
				"summary":"CVE-2025-37819",
				"category":"self",
				"url":"https://www.openeuler.org/en/security/cve/detail/?cveId=CVE-2025-37819&packageName=kernel"
			},
			{
				"summary":"CVE-2025-37862",
				"category":"self",
				"url":"https://www.openeuler.org/en/security/cve/detail/?cveId=CVE-2025-37862&packageName=kernel"
			},
			{
				"summary":"CVE-2025-37890",
				"category":"self",
				"url":"https://www.openeuler.org/en/security/cve/detail/?cveId=CVE-2025-37890&packageName=kernel"
			},
			{
				"summary":"CVE-2025-37920",
				"category":"self",
				"url":"https://www.openeuler.org/en/security/cve/detail/?cveId=CVE-2025-37920&packageName=kernel"
			},
			{
				"summary":"CVE-2025-38000",
				"category":"self",
				"url":"https://www.openeuler.org/en/security/cve/detail/?cveId=CVE-2025-38000&packageName=kernel"
			},
			{
				"summary":"CVE-2025-38001",
				"category":"self",
				"url":"https://www.openeuler.org/en/security/cve/detail/?cveId=CVE-2025-38001&packageName=kernel"
			},
			{
				"summary":"CVE-2025-38006",
				"category":"self",
				"url":"https://www.openeuler.org/en/security/cve/detail/?cveId=CVE-2025-38006&packageName=kernel"
			},
			{
				"summary":"CVE-2025-38009",
				"category":"self",
				"url":"https://www.openeuler.org/en/security/cve/detail/?cveId=CVE-2025-38009&packageName=kernel"
			},
			{
				"summary":"CVE-2025-38013",
				"category":"self",
				"url":"https://www.openeuler.org/en/security/cve/detail/?cveId=CVE-2025-38013&packageName=kernel"
			},
			{
				"summary":"CVE-2025-38045",
				"category":"self",
				"url":"https://www.openeuler.org/en/security/cve/detail/?cveId=CVE-2025-38045&packageName=kernel"
			},
			{
				"summary":"CVE-2025-38052",
				"category":"self",
				"url":"https://www.openeuler.org/en/security/cve/detail/?cveId=CVE-2025-38052&packageName=kernel"
			},
			{
				"summary":"CVE-2025-38068",
				"category":"self",
				"url":"https://www.openeuler.org/en/security/cve/detail/?cveId=CVE-2025-38068&packageName=kernel"
			},
			{
				"summary":"CVE-2025-38088",
				"category":"self",
				"url":"https://www.openeuler.org/en/security/cve/detail/?cveId=CVE-2025-38088&packageName=kernel"
			},
			{
				"summary":"CVE-2025-38089",
				"category":"self",
				"url":"https://www.openeuler.org/en/security/cve/detail/?cveId=CVE-2025-38089&packageName=kernel"
			},
			{
				"summary":"CVE-2025-38112",
				"category":"self",
				"url":"https://www.openeuler.org/en/security/cve/detail/?cveId=CVE-2025-38112&packageName=kernel"
			},
			{
				"summary":"CVE-2025-38174",
				"category":"self",
				"url":"https://www.openeuler.org/en/security/cve/detail/?cveId=CVE-2025-38174&packageName=kernel"
			},
			{
				"summary":"CVE-2025-38184",
				"category":"self",
				"url":"https://www.openeuler.org/en/security/cve/detail/?cveId=CVE-2025-38184&packageName=kernel"
			},
			{
				"summary":"CVE-2025-38192",
				"category":"self",
				"url":"https://www.openeuler.org/en/security/cve/detail/?cveId=CVE-2025-38192&packageName=kernel"
			},
			{
				"summary":"CVE-2025-38239",
				"category":"self",
				"url":"https://www.openeuler.org/en/security/cve/detail/?cveId=CVE-2025-38239&packageName=kernel"
			},
			{
				"summary":"CVE-2025-38248",
				"category":"self",
				"url":"https://www.openeuler.org/en/security/cve/detail/?cveId=CVE-2025-38248&packageName=kernel"
			},
			{
				"summary":"CVE-2025-38310",
				"category":"self",
				"url":"https://www.openeuler.org/en/security/cve/detail/?cveId=CVE-2025-38310&packageName=kernel"
			},
			{
				"summary":"CVE-2025-38369",
				"category":"self",
				"url":"https://www.openeuler.org/en/security/cve/detail/?cveId=CVE-2025-38369&packageName=kernel"
			},
			{
				"summary":"CVE-2025-38441",
				"category":"self",
				"url":"https://www.openeuler.org/en/security/cve/detail/?cveId=CVE-2025-38441&packageName=kernel"
			},
			{
				"summary":"CVE-2025-38444",
				"category":"self",
				"url":"https://www.openeuler.org/en/security/cve/detail/?cveId=CVE-2025-38444&packageName=kernel"
			},
			{
				"summary":"CVE-2025-38445",
				"category":"self",
				"url":"https://www.openeuler.org/en/security/cve/detail/?cveId=CVE-2025-38445&packageName=kernel"
			},
			{
				"summary":"CVE-2025-38456",
				"category":"self",
				"url":"https://www.openeuler.org/en/security/cve/detail/?cveId=CVE-2025-38456&packageName=kernel"
			},
			{
				"summary":"CVE-2025-38463",
				"category":"self",
				"url":"https://www.openeuler.org/en/security/cve/detail/?cveId=CVE-2025-38463&packageName=kernel"
			},
			{
				"summary":"CVE-2025-38464",
				"category":"self",
				"url":"https://www.openeuler.org/en/security/cve/detail/?cveId=CVE-2025-38464&packageName=kernel"
			},
			{
				"summary":"CVE-2025-38465",
				"category":"self",
				"url":"https://www.openeuler.org/en/security/cve/detail/?cveId=CVE-2025-38465&packageName=kernel"
			},
			{
				"summary":"CVE-2025-38515",
				"category":"self",
				"url":"https://www.openeuler.org/en/security/cve/detail/?cveId=CVE-2025-38515&packageName=kernel"
			},
			{
				"summary":"CVE-2025-38526",
				"category":"self",
				"url":"https://www.openeuler.org/en/security/cve/detail/?cveId=CVE-2025-38526&packageName=kernel"
			},
			{
				"summary":"CVE-2025-38539",
				"category":"self",
				"url":"https://www.openeuler.org/en/security/cve/detail/?cveId=CVE-2025-38539&packageName=kernel"
			},
			{
				"summary":"CVE-2025-38565",
				"category":"self",
				"url":"https://www.openeuler.org/en/security/cve/detail/?cveId=CVE-2025-38565&packageName=kernel"
			},
			{
				"summary":"CVE-2025-38670",
				"category":"self",
				"url":"https://www.openeuler.org/en/security/cve/detail/?cveId=CVE-2025-38670&packageName=kernel"
			},
			{
				"summary":"nvd cve",
				"category":"external",
				"url":"https://nvd.nist.gov/vuln/detail/CVE-2024-57948"
			},
			{
				"summary":"nvd cve",
				"category":"external",
				"url":"https://nvd.nist.gov/vuln/detail/CVE-2025-21839"
			},
			{
				"summary":"nvd cve",
				"category":"external",
				"url":"https://nvd.nist.gov/vuln/detail/CVE-2025-21907"
			},
			{
				"summary":"nvd cve",
				"category":"external",
				"url":"https://nvd.nist.gov/vuln/detail/CVE-2025-21956"
			},
			{
				"summary":"nvd cve",
				"category":"external",
				"url":"https://nvd.nist.gov/vuln/detail/CVE-2025-21959"
			},
			{
				"summary":"nvd cve",
				"category":"external",
				"url":"https://nvd.nist.gov/vuln/detail/CVE-2025-21969"
			},
			{
				"summary":"nvd cve",
				"category":"external",
				"url":"https://nvd.nist.gov/vuln/detail/CVE-2025-22102"
			},
			{
				"summary":"nvd cve",
				"category":"external",
				"url":"https://nvd.nist.gov/vuln/detail/CVE-2025-22105"
			},
			{
				"summary":"nvd cve",
				"category":"external",
				"url":"https://nvd.nist.gov/vuln/detail/CVE-2025-37767"
			},
			{
				"summary":"nvd cve",
				"category":"external",
				"url":"https://nvd.nist.gov/vuln/detail/CVE-2025-37780"
			},
			{
				"summary":"nvd cve",
				"category":"external",
				"url":"https://nvd.nist.gov/vuln/detail/CVE-2025-37801"
			},
			{
				"summary":"nvd cve",
				"category":"external",
				"url":"https://nvd.nist.gov/vuln/detail/CVE-2025-37813"
			},
			{
				"summary":"nvd cve",
				"category":"external",
				"url":"https://nvd.nist.gov/vuln/detail/CVE-2025-37819"
			},
			{
				"summary":"nvd cve",
				"category":"external",
				"url":"https://nvd.nist.gov/vuln/detail/CVE-2025-37862"
			},
			{
				"summary":"nvd cve",
				"category":"external",
				"url":"https://nvd.nist.gov/vuln/detail/CVE-2025-37890"
			},
			{
				"summary":"nvd cve",
				"category":"external",
				"url":"https://nvd.nist.gov/vuln/detail/CVE-2025-37920"
			},
			{
				"summary":"nvd cve",
				"category":"external",
				"url":"https://nvd.nist.gov/vuln/detail/CVE-2025-38000"
			},
			{
				"summary":"nvd cve",
				"category":"external",
				"url":"https://nvd.nist.gov/vuln/detail/CVE-2025-38001"
			},
			{
				"summary":"nvd cve",
				"category":"external",
				"url":"https://nvd.nist.gov/vuln/detail/CVE-2025-38006"
			},
			{
				"summary":"nvd cve",
				"category":"external",
				"url":"https://nvd.nist.gov/vuln/detail/CVE-2025-38009"
			},
			{
				"summary":"nvd cve",
				"category":"external",
				"url":"https://nvd.nist.gov/vuln/detail/CVE-2025-38013"
			},
			{
				"summary":"nvd cve",
				"category":"external",
				"url":"https://nvd.nist.gov/vuln/detail/CVE-2025-38045"
			},
			{
				"summary":"nvd cve",
				"category":"external",
				"url":"https://nvd.nist.gov/vuln/detail/CVE-2025-38052"
			},
			{
				"summary":"nvd cve",
				"category":"external",
				"url":"https://nvd.nist.gov/vuln/detail/CVE-2025-38068"
			},
			{
				"summary":"nvd cve",
				"category":"external",
				"url":"https://nvd.nist.gov/vuln/detail/CVE-2025-38088"
			},
			{
				"summary":"nvd cve",
				"category":"external",
				"url":"https://nvd.nist.gov/vuln/detail/CVE-2025-38089"
			},
			{
				"summary":"nvd cve",
				"category":"external",
				"url":"https://nvd.nist.gov/vuln/detail/CVE-2025-38112"
			},
			{
				"summary":"nvd cve",
				"category":"external",
				"url":"https://nvd.nist.gov/vuln/detail/CVE-2025-38174"
			},
			{
				"summary":"nvd cve",
				"category":"external",
				"url":"https://nvd.nist.gov/vuln/detail/CVE-2025-38184"
			},
			{
				"summary":"nvd cve",
				"category":"external",
				"url":"https://nvd.nist.gov/vuln/detail/CVE-2025-38192"
			},
			{
				"summary":"nvd cve",
				"category":"external",
				"url":"https://nvd.nist.gov/vuln/detail/CVE-2025-38239"
			},
			{
				"summary":"nvd cve",
				"category":"external",
				"url":"https://nvd.nist.gov/vuln/detail/CVE-2025-38248"
			},
			{
				"summary":"nvd cve",
				"category":"external",
				"url":"https://nvd.nist.gov/vuln/detail/CVE-2025-38310"
			},
			{
				"summary":"nvd cve",
				"category":"external",
				"url":"https://nvd.nist.gov/vuln/detail/CVE-2025-38369"
			},
			{
				"summary":"nvd cve",
				"category":"external",
				"url":"https://nvd.nist.gov/vuln/detail/CVE-2025-38441"
			},
			{
				"summary":"nvd cve",
				"category":"external",
				"url":"https://nvd.nist.gov/vuln/detail/CVE-2025-38444"
			},
			{
				"summary":"nvd cve",
				"category":"external",
				"url":"https://nvd.nist.gov/vuln/detail/CVE-2025-38445"
			},
			{
				"summary":"nvd cve",
				"category":"external",
				"url":"https://nvd.nist.gov/vuln/detail/CVE-2025-38456"
			},
			{
				"summary":"nvd cve",
				"category":"external",
				"url":"https://nvd.nist.gov/vuln/detail/CVE-2025-38463"
			},
			{
				"summary":"nvd cve",
				"category":"external",
				"url":"https://nvd.nist.gov/vuln/detail/CVE-2025-38464"
			},
			{
				"summary":"nvd cve",
				"category":"external",
				"url":"https://nvd.nist.gov/vuln/detail/CVE-2025-38465"
			},
			{
				"summary":"nvd cve",
				"category":"external",
				"url":"https://nvd.nist.gov/vuln/detail/CVE-2025-38515"
			},
			{
				"summary":"nvd cve",
				"category":"external",
				"url":"https://nvd.nist.gov/vuln/detail/CVE-2025-38526"
			},
			{
				"summary":"nvd cve",
				"category":"external",
				"url":"https://nvd.nist.gov/vuln/detail/CVE-2025-38539"
			},
			{
				"summary":"nvd cve",
				"category":"external",
				"url":"https://nvd.nist.gov/vuln/detail/CVE-2025-38565"
			},
			{
				"summary":"nvd cve",
				"category":"external",
				"url":"https://nvd.nist.gov/vuln/detail/CVE-2025-38670"
			},
			{
				"summary":"openEuler-SA-2025-2077 vex file",
				"category":"self",
				"url":"https://repo.openeuler.org/security/data/csaf/advisories/2025/csaf-openeuler-sa-2025-2077.json"
			}
		],
		"title":"An update for kernel is now available for openEuler-24.03-LTS",
		"tracking":{
			"initial_release_date":"2025-08-29T19:22:52+08:00",
			"revision_history":[
				{
					"date":"2025-08-29T19:22:52+08:00",
					"summary":"Initial",
					"number":"1.0.0"
				}
			],
			"generator":{
				"date":"2025-08-29T19:22:52+08:00",
				"engine":{
					"name":"openEuler CSAF Tool V1.0"
				}
			},
			"current_release_date":"2025-08-29T19:22:52+08:00",
			"id":"openEuler-SA-2025-2077",
			"version":"1.0.0",
			"status":"final"
		}
	},
	"product_tree":{
		"branches":[
			{
				"name":"openEuler",
				"category":"vendor",
				"branches":[
					{
						"name":"openEuler",
						"branches":[
							{
								"product":{
									"product_identification_helper":{
										"cpe":"cpe:/a:openEuler:openEuler:24.03-LTS"
									},
									"product_id":"openEuler-24.03-LTS",
									"name":"openEuler-24.03-LTS"
								},
								"name":"openEuler-24.03-LTS",
								"category":"product_version"
							}
						],
						"category":"product_name"
					},
					{
						"name":"src",
						"branches":[
							{
								"product":{
									"product_identification_helper":{
										"cpe":"cpe:/a:openEuler:openEuler:24.03-LTS"
									},
									"product_id":"kernel-6.6.0-107.0.0.99.oe2403.src.rpm",
									"name":"kernel-6.6.0-107.0.0.99.oe2403.src.rpm"
								},
								"name":"kernel-6.6.0-107.0.0.99.oe2403.src.rpm",
								"category":"product_version"
							}
						],
						"category":"architecture"
					},
					{
						"name":"aarch64",
						"branches":[
							{
								"product":{
									"product_identification_helper":{
										"cpe":"cpe:/a:openEuler:openEuler:24.03-LTS"
									},
									"product_id":"bpftool-6.6.0-107.0.0.99.oe2403.aarch64.rpm",
									"name":"bpftool-6.6.0-107.0.0.99.oe2403.aarch64.rpm"
								},
								"name":"bpftool-6.6.0-107.0.0.99.oe2403.aarch64.rpm",
								"category":"product_version"
							},
							{
								"product":{
									"product_identification_helper":{
										"cpe":"cpe:/a:openEuler:openEuler:24.03-LTS"
									},
									"product_id":"bpftool-debuginfo-6.6.0-107.0.0.99.oe2403.aarch64.rpm",
									"name":"bpftool-debuginfo-6.6.0-107.0.0.99.oe2403.aarch64.rpm"
								},
								"name":"bpftool-debuginfo-6.6.0-107.0.0.99.oe2403.aarch64.rpm",
								"category":"product_version"
							},
							{
								"product":{
									"product_identification_helper":{
										"cpe":"cpe:/a:openEuler:openEuler:24.03-LTS"
									},
									"product_id":"kernel-6.6.0-107.0.0.99.oe2403.aarch64.rpm",
									"name":"kernel-6.6.0-107.0.0.99.oe2403.aarch64.rpm"
								},
								"name":"kernel-6.6.0-107.0.0.99.oe2403.aarch64.rpm",
								"category":"product_version"
							},
							{
								"product":{
									"product_identification_helper":{
										"cpe":"cpe:/a:openEuler:openEuler:24.03-LTS"
									},
									"product_id":"kernel-debuginfo-6.6.0-107.0.0.99.oe2403.aarch64.rpm",
									"name":"kernel-debuginfo-6.6.0-107.0.0.99.oe2403.aarch64.rpm"
								},
								"name":"kernel-debuginfo-6.6.0-107.0.0.99.oe2403.aarch64.rpm",
								"category":"product_version"
							},
							{
								"product":{
									"product_identification_helper":{
										"cpe":"cpe:/a:openEuler:openEuler:24.03-LTS"
									},
									"product_id":"kernel-debugsource-6.6.0-107.0.0.99.oe2403.aarch64.rpm",
									"name":"kernel-debugsource-6.6.0-107.0.0.99.oe2403.aarch64.rpm"
								},
								"name":"kernel-debugsource-6.6.0-107.0.0.99.oe2403.aarch64.rpm",
								"category":"product_version"
							},
							{
								"product":{
									"product_identification_helper":{
										"cpe":"cpe:/a:openEuler:openEuler:24.03-LTS"
									},
									"product_id":"kernel-devel-6.6.0-107.0.0.99.oe2403.aarch64.rpm",
									"name":"kernel-devel-6.6.0-107.0.0.99.oe2403.aarch64.rpm"
								},
								"name":"kernel-devel-6.6.0-107.0.0.99.oe2403.aarch64.rpm",
								"category":"product_version"
							},
							{
								"product":{
									"product_identification_helper":{
										"cpe":"cpe:/a:openEuler:openEuler:24.03-LTS"
									},
									"product_id":"kernel-headers-6.6.0-107.0.0.99.oe2403.aarch64.rpm",
									"name":"kernel-headers-6.6.0-107.0.0.99.oe2403.aarch64.rpm"
								},
								"name":"kernel-headers-6.6.0-107.0.0.99.oe2403.aarch64.rpm",
								"category":"product_version"
							},
							{
								"product":{
									"product_identification_helper":{
										"cpe":"cpe:/a:openEuler:openEuler:24.03-LTS"
									},
									"product_id":"kernel-source-6.6.0-107.0.0.99.oe2403.aarch64.rpm",
									"name":"kernel-source-6.6.0-107.0.0.99.oe2403.aarch64.rpm"
								},
								"name":"kernel-source-6.6.0-107.0.0.99.oe2403.aarch64.rpm",
								"category":"product_version"
							},
							{
								"product":{
									"product_identification_helper":{
										"cpe":"cpe:/a:openEuler:openEuler:24.03-LTS"
									},
									"product_id":"kernel-tools-6.6.0-107.0.0.99.oe2403.aarch64.rpm",
									"name":"kernel-tools-6.6.0-107.0.0.99.oe2403.aarch64.rpm"
								},
								"name":"kernel-tools-6.6.0-107.0.0.99.oe2403.aarch64.rpm",
								"category":"product_version"
							},
							{
								"product":{
									"product_identification_helper":{
										"cpe":"cpe:/a:openEuler:openEuler:24.03-LTS"
									},
									"product_id":"kernel-tools-debuginfo-6.6.0-107.0.0.99.oe2403.aarch64.rpm",
									"name":"kernel-tools-debuginfo-6.6.0-107.0.0.99.oe2403.aarch64.rpm"
								},
								"name":"kernel-tools-debuginfo-6.6.0-107.0.0.99.oe2403.aarch64.rpm",
								"category":"product_version"
							},
							{
								"product":{
									"product_identification_helper":{
										"cpe":"cpe:/a:openEuler:openEuler:24.03-LTS"
									},
									"product_id":"kernel-tools-devel-6.6.0-107.0.0.99.oe2403.aarch64.rpm",
									"name":"kernel-tools-devel-6.6.0-107.0.0.99.oe2403.aarch64.rpm"
								},
								"name":"kernel-tools-devel-6.6.0-107.0.0.99.oe2403.aarch64.rpm",
								"category":"product_version"
							},
							{
								"product":{
									"product_identification_helper":{
										"cpe":"cpe:/a:openEuler:openEuler:24.03-LTS"
									},
									"product_id":"perf-6.6.0-107.0.0.99.oe2403.aarch64.rpm",
									"name":"perf-6.6.0-107.0.0.99.oe2403.aarch64.rpm"
								},
								"name":"perf-6.6.0-107.0.0.99.oe2403.aarch64.rpm",
								"category":"product_version"
							},
							{
								"product":{
									"product_identification_helper":{
										"cpe":"cpe:/a:openEuler:openEuler:24.03-LTS"
									},
									"product_id":"perf-debuginfo-6.6.0-107.0.0.99.oe2403.aarch64.rpm",
									"name":"perf-debuginfo-6.6.0-107.0.0.99.oe2403.aarch64.rpm"
								},
								"name":"perf-debuginfo-6.6.0-107.0.0.99.oe2403.aarch64.rpm",
								"category":"product_version"
							},
							{
								"product":{
									"product_identification_helper":{
										"cpe":"cpe:/a:openEuler:openEuler:24.03-LTS"
									},
									"product_id":"python3-perf-6.6.0-107.0.0.99.oe2403.aarch64.rpm",
									"name":"python3-perf-6.6.0-107.0.0.99.oe2403.aarch64.rpm"
								},
								"name":"python3-perf-6.6.0-107.0.0.99.oe2403.aarch64.rpm",
								"category":"product_version"
							},
							{
								"product":{
									"product_identification_helper":{
										"cpe":"cpe:/a:openEuler:openEuler:24.03-LTS"
									},
									"product_id":"python3-perf-debuginfo-6.6.0-107.0.0.99.oe2403.aarch64.rpm",
									"name":"python3-perf-debuginfo-6.6.0-107.0.0.99.oe2403.aarch64.rpm"
								},
								"name":"python3-perf-debuginfo-6.6.0-107.0.0.99.oe2403.aarch64.rpm",
								"category":"product_version"
							}
						],
						"category":"architecture"
					},
					{
						"name":"x86_64",
						"branches":[
							{
								"product":{
									"product_identification_helper":{
										"cpe":"cpe:/a:openEuler:openEuler:24.03-LTS"
									},
									"product_id":"bpftool-6.6.0-107.0.0.99.oe2403.x86_64.rpm",
									"name":"bpftool-6.6.0-107.0.0.99.oe2403.x86_64.rpm"
								},
								"name":"bpftool-6.6.0-107.0.0.99.oe2403.x86_64.rpm",
								"category":"product_version"
							},
							{
								"product":{
									"product_identification_helper":{
										"cpe":"cpe:/a:openEuler:openEuler:24.03-LTS"
									},
									"product_id":"bpftool-debuginfo-6.6.0-107.0.0.99.oe2403.x86_64.rpm",
									"name":"bpftool-debuginfo-6.6.0-107.0.0.99.oe2403.x86_64.rpm"
								},
								"name":"bpftool-debuginfo-6.6.0-107.0.0.99.oe2403.x86_64.rpm",
								"category":"product_version"
							},
							{
								"product":{
									"product_identification_helper":{
										"cpe":"cpe:/a:openEuler:openEuler:24.03-LTS"
									},
									"product_id":"kernel-6.6.0-107.0.0.99.oe2403.x86_64.rpm",
									"name":"kernel-6.6.0-107.0.0.99.oe2403.x86_64.rpm"
								},
								"name":"kernel-6.6.0-107.0.0.99.oe2403.x86_64.rpm",
								"category":"product_version"
							},
							{
								"product":{
									"product_identification_helper":{
										"cpe":"cpe:/a:openEuler:openEuler:24.03-LTS"
									},
									"product_id":"kernel-debuginfo-6.6.0-107.0.0.99.oe2403.x86_64.rpm",
									"name":"kernel-debuginfo-6.6.0-107.0.0.99.oe2403.x86_64.rpm"
								},
								"name":"kernel-debuginfo-6.6.0-107.0.0.99.oe2403.x86_64.rpm",
								"category":"product_version"
							},
							{
								"product":{
									"product_identification_helper":{
										"cpe":"cpe:/a:openEuler:openEuler:24.03-LTS"
									},
									"product_id":"kernel-debugsource-6.6.0-107.0.0.99.oe2403.x86_64.rpm",
									"name":"kernel-debugsource-6.6.0-107.0.0.99.oe2403.x86_64.rpm"
								},
								"name":"kernel-debugsource-6.6.0-107.0.0.99.oe2403.x86_64.rpm",
								"category":"product_version"
							},
							{
								"product":{
									"product_identification_helper":{
										"cpe":"cpe:/a:openEuler:openEuler:24.03-LTS"
									},
									"product_id":"kernel-devel-6.6.0-107.0.0.99.oe2403.x86_64.rpm",
									"name":"kernel-devel-6.6.0-107.0.0.99.oe2403.x86_64.rpm"
								},
								"name":"kernel-devel-6.6.0-107.0.0.99.oe2403.x86_64.rpm",
								"category":"product_version"
							},
							{
								"product":{
									"product_identification_helper":{
										"cpe":"cpe:/a:openEuler:openEuler:24.03-LTS"
									},
									"product_id":"kernel-headers-6.6.0-107.0.0.99.oe2403.x86_64.rpm",
									"name":"kernel-headers-6.6.0-107.0.0.99.oe2403.x86_64.rpm"
								},
								"name":"kernel-headers-6.6.0-107.0.0.99.oe2403.x86_64.rpm",
								"category":"product_version"
							},
							{
								"product":{
									"product_identification_helper":{
										"cpe":"cpe:/a:openEuler:openEuler:24.03-LTS"
									},
									"product_id":"kernel-source-6.6.0-107.0.0.99.oe2403.x86_64.rpm",
									"name":"kernel-source-6.6.0-107.0.0.99.oe2403.x86_64.rpm"
								},
								"name":"kernel-source-6.6.0-107.0.0.99.oe2403.x86_64.rpm",
								"category":"product_version"
							},
							{
								"product":{
									"product_identification_helper":{
										"cpe":"cpe:/a:openEuler:openEuler:24.03-LTS"
									},
									"product_id":"kernel-tools-6.6.0-107.0.0.99.oe2403.x86_64.rpm",
									"name":"kernel-tools-6.6.0-107.0.0.99.oe2403.x86_64.rpm"
								},
								"name":"kernel-tools-6.6.0-107.0.0.99.oe2403.x86_64.rpm",
								"category":"product_version"
							},
							{
								"product":{
									"product_identification_helper":{
										"cpe":"cpe:/a:openEuler:openEuler:24.03-LTS"
									},
									"product_id":"kernel-tools-debuginfo-6.6.0-107.0.0.99.oe2403.x86_64.rpm",
									"name":"kernel-tools-debuginfo-6.6.0-107.0.0.99.oe2403.x86_64.rpm"
								},
								"name":"kernel-tools-debuginfo-6.6.0-107.0.0.99.oe2403.x86_64.rpm",
								"category":"product_version"
							},
							{
								"product":{
									"product_identification_helper":{
										"cpe":"cpe:/a:openEuler:openEuler:24.03-LTS"
									},
									"product_id":"kernel-tools-devel-6.6.0-107.0.0.99.oe2403.x86_64.rpm",
									"name":"kernel-tools-devel-6.6.0-107.0.0.99.oe2403.x86_64.rpm"
								},
								"name":"kernel-tools-devel-6.6.0-107.0.0.99.oe2403.x86_64.rpm",
								"category":"product_version"
							},
							{
								"product":{
									"product_identification_helper":{
										"cpe":"cpe:/a:openEuler:openEuler:24.03-LTS"
									},
									"product_id":"perf-6.6.0-107.0.0.99.oe2403.x86_64.rpm",
									"name":"perf-6.6.0-107.0.0.99.oe2403.x86_64.rpm"
								},
								"name":"perf-6.6.0-107.0.0.99.oe2403.x86_64.rpm",
								"category":"product_version"
							},
							{
								"product":{
									"product_identification_helper":{
										"cpe":"cpe:/a:openEuler:openEuler:24.03-LTS"
									},
									"product_id":"perf-debuginfo-6.6.0-107.0.0.99.oe2403.x86_64.rpm",
									"name":"perf-debuginfo-6.6.0-107.0.0.99.oe2403.x86_64.rpm"
								},
								"name":"perf-debuginfo-6.6.0-107.0.0.99.oe2403.x86_64.rpm",
								"category":"product_version"
							},
							{
								"product":{
									"product_identification_helper":{
										"cpe":"cpe:/a:openEuler:openEuler:24.03-LTS"
									},
									"product_id":"python3-perf-6.6.0-107.0.0.99.oe2403.x86_64.rpm",
									"name":"python3-perf-6.6.0-107.0.0.99.oe2403.x86_64.rpm"
								},
								"name":"python3-perf-6.6.0-107.0.0.99.oe2403.x86_64.rpm",
								"category":"product_version"
							},
							{
								"product":{
									"product_identification_helper":{
										"cpe":"cpe:/a:openEuler:openEuler:24.03-LTS"
									},
									"product_id":"python3-perf-debuginfo-6.6.0-107.0.0.99.oe2403.x86_64.rpm",
									"name":"python3-perf-debuginfo-6.6.0-107.0.0.99.oe2403.x86_64.rpm"
								},
								"name":"python3-perf-debuginfo-6.6.0-107.0.0.99.oe2403.x86_64.rpm",
								"category":"product_version"
							}
						],
						"category":"architecture"
					}
				]
			}
		],
		"relationships":[
			{
				"relates_to_product_reference":"openEuler-24.03-LTS",
				"product_reference":"kernel-6.6.0-107.0.0.99.oe2403.src.rpm",
				"full_product_name":{
					"product_id":"openEuler-24.03-LTS:kernel-6.6.0-107.0.0.99.oe2403.src",
					"name":"kernel-6.6.0-107.0.0.99.oe2403.src as a component of openEuler-24.03-LTS"
				},
				"category":"default_component_of"
			},
			{
				"relates_to_product_reference":"openEuler-24.03-LTS",
				"product_reference":"bpftool-6.6.0-107.0.0.99.oe2403.aarch64.rpm",
				"full_product_name":{
					"product_id":"openEuler-24.03-LTS:bpftool-6.6.0-107.0.0.99.oe2403.aarch64",
					"name":"bpftool-6.6.0-107.0.0.99.oe2403.aarch64 as a component of openEuler-24.03-LTS"
				},
				"category":"default_component_of"
			},
			{
				"relates_to_product_reference":"openEuler-24.03-LTS",
				"product_reference":"bpftool-debuginfo-6.6.0-107.0.0.99.oe2403.aarch64.rpm",
				"full_product_name":{
					"product_id":"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-107.0.0.99.oe2403.aarch64",
					"name":"bpftool-debuginfo-6.6.0-107.0.0.99.oe2403.aarch64 as a component of openEuler-24.03-LTS"
				},
				"category":"default_component_of"
			},
			{
				"relates_to_product_reference":"openEuler-24.03-LTS",
				"product_reference":"kernel-6.6.0-107.0.0.99.oe2403.aarch64.rpm",
				"full_product_name":{
					"product_id":"openEuler-24.03-LTS:kernel-6.6.0-107.0.0.99.oe2403.aarch64",
					"name":"kernel-6.6.0-107.0.0.99.oe2403.aarch64 as a component of openEuler-24.03-LTS"
				},
				"category":"default_component_of"
			},
			{
				"relates_to_product_reference":"openEuler-24.03-LTS",
				"product_reference":"kernel-debuginfo-6.6.0-107.0.0.99.oe2403.aarch64.rpm",
				"full_product_name":{
					"product_id":"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-107.0.0.99.oe2403.aarch64",
					"name":"kernel-debuginfo-6.6.0-107.0.0.99.oe2403.aarch64 as a component of openEuler-24.03-LTS"
				},
				"category":"default_component_of"
			},
			{
				"relates_to_product_reference":"openEuler-24.03-LTS",
				"product_reference":"kernel-debugsource-6.6.0-107.0.0.99.oe2403.aarch64.rpm",
				"full_product_name":{
					"product_id":"openEuler-24.03-LTS:kernel-debugsource-6.6.0-107.0.0.99.oe2403.aarch64",
					"name":"kernel-debugsource-6.6.0-107.0.0.99.oe2403.aarch64 as a component of openEuler-24.03-LTS"
				},
				"category":"default_component_of"
			},
			{
				"relates_to_product_reference":"openEuler-24.03-LTS",
				"product_reference":"kernel-devel-6.6.0-107.0.0.99.oe2403.aarch64.rpm",
				"full_product_name":{
					"product_id":"openEuler-24.03-LTS:kernel-devel-6.6.0-107.0.0.99.oe2403.aarch64",
					"name":"kernel-devel-6.6.0-107.0.0.99.oe2403.aarch64 as a component of openEuler-24.03-LTS"
				},
				"category":"default_component_of"
			},
			{
				"relates_to_product_reference":"openEuler-24.03-LTS",
				"product_reference":"kernel-headers-6.6.0-107.0.0.99.oe2403.aarch64.rpm",
				"full_product_name":{
					"product_id":"openEuler-24.03-LTS:kernel-headers-6.6.0-107.0.0.99.oe2403.aarch64",
					"name":"kernel-headers-6.6.0-107.0.0.99.oe2403.aarch64 as a component of openEuler-24.03-LTS"
				},
				"category":"default_component_of"
			},
			{
				"relates_to_product_reference":"openEuler-24.03-LTS",
				"product_reference":"kernel-source-6.6.0-107.0.0.99.oe2403.aarch64.rpm",
				"full_product_name":{
					"product_id":"openEuler-24.03-LTS:kernel-source-6.6.0-107.0.0.99.oe2403.aarch64",
					"name":"kernel-source-6.6.0-107.0.0.99.oe2403.aarch64 as a component of openEuler-24.03-LTS"
				},
				"category":"default_component_of"
			},
			{
				"relates_to_product_reference":"openEuler-24.03-LTS",
				"product_reference":"kernel-tools-6.6.0-107.0.0.99.oe2403.aarch64.rpm",
				"full_product_name":{
					"product_id":"openEuler-24.03-LTS:kernel-tools-6.6.0-107.0.0.99.oe2403.aarch64",
					"name":"kernel-tools-6.6.0-107.0.0.99.oe2403.aarch64 as a component of openEuler-24.03-LTS"
				},
				"category":"default_component_of"
			},
			{
				"relates_to_product_reference":"openEuler-24.03-LTS",
				"product_reference":"kernel-tools-debuginfo-6.6.0-107.0.0.99.oe2403.aarch64.rpm",
				"full_product_name":{
					"product_id":"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-107.0.0.99.oe2403.aarch64",
					"name":"kernel-tools-debuginfo-6.6.0-107.0.0.99.oe2403.aarch64 as a component of openEuler-24.03-LTS"
				},
				"category":"default_component_of"
			},
			{
				"relates_to_product_reference":"openEuler-24.03-LTS",
				"product_reference":"kernel-tools-devel-6.6.0-107.0.0.99.oe2403.aarch64.rpm",
				"full_product_name":{
					"product_id":"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-107.0.0.99.oe2403.aarch64",
					"name":"kernel-tools-devel-6.6.0-107.0.0.99.oe2403.aarch64 as a component of openEuler-24.03-LTS"
				},
				"category":"default_component_of"
			},
			{
				"relates_to_product_reference":"openEuler-24.03-LTS",
				"product_reference":"perf-6.6.0-107.0.0.99.oe2403.aarch64.rpm",
				"full_product_name":{
					"product_id":"openEuler-24.03-LTS:perf-6.6.0-107.0.0.99.oe2403.aarch64",
					"name":"perf-6.6.0-107.0.0.99.oe2403.aarch64 as a component of openEuler-24.03-LTS"
				},
				"category":"default_component_of"
			},
			{
				"relates_to_product_reference":"openEuler-24.03-LTS",
				"product_reference":"perf-debuginfo-6.6.0-107.0.0.99.oe2403.aarch64.rpm",
				"full_product_name":{
					"product_id":"openEuler-24.03-LTS:perf-debuginfo-6.6.0-107.0.0.99.oe2403.aarch64",
					"name":"perf-debuginfo-6.6.0-107.0.0.99.oe2403.aarch64 as a component of openEuler-24.03-LTS"
				},
				"category":"default_component_of"
			},
			{
				"relates_to_product_reference":"openEuler-24.03-LTS",
				"product_reference":"python3-perf-6.6.0-107.0.0.99.oe2403.aarch64.rpm",
				"full_product_name":{
					"product_id":"openEuler-24.03-LTS:python3-perf-6.6.0-107.0.0.99.oe2403.aarch64",
					"name":"python3-perf-6.6.0-107.0.0.99.oe2403.aarch64 as a component of openEuler-24.03-LTS"
				},
				"category":"default_component_of"
			},
			{
				"relates_to_product_reference":"openEuler-24.03-LTS",
				"product_reference":"python3-perf-debuginfo-6.6.0-107.0.0.99.oe2403.aarch64.rpm",
				"full_product_name":{
					"product_id":"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-107.0.0.99.oe2403.aarch64",
					"name":"python3-perf-debuginfo-6.6.0-107.0.0.99.oe2403.aarch64 as a component of openEuler-24.03-LTS"
				},
				"category":"default_component_of"
			},
			{
				"relates_to_product_reference":"openEuler-24.03-LTS",
				"product_reference":"bpftool-6.6.0-107.0.0.99.oe2403.x86_64.rpm",
				"full_product_name":{
					"product_id":"openEuler-24.03-LTS:bpftool-6.6.0-107.0.0.99.oe2403.x86_64",
					"name":"bpftool-6.6.0-107.0.0.99.oe2403.x86_64 as a component of openEuler-24.03-LTS"
				},
				"category":"default_component_of"
			},
			{
				"relates_to_product_reference":"openEuler-24.03-LTS",
				"product_reference":"bpftool-debuginfo-6.6.0-107.0.0.99.oe2403.x86_64.rpm",
				"full_product_name":{
					"product_id":"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-107.0.0.99.oe2403.x86_64",
					"name":"bpftool-debuginfo-6.6.0-107.0.0.99.oe2403.x86_64 as a component of openEuler-24.03-LTS"
				},
				"category":"default_component_of"
			},
			{
				"relates_to_product_reference":"openEuler-24.03-LTS",
				"product_reference":"kernel-6.6.0-107.0.0.99.oe2403.x86_64.rpm",
				"full_product_name":{
					"product_id":"openEuler-24.03-LTS:kernel-6.6.0-107.0.0.99.oe2403.x86_64",
					"name":"kernel-6.6.0-107.0.0.99.oe2403.x86_64 as a component of openEuler-24.03-LTS"
				},
				"category":"default_component_of"
			},
			{
				"relates_to_product_reference":"openEuler-24.03-LTS",
				"product_reference":"kernel-debuginfo-6.6.0-107.0.0.99.oe2403.x86_64.rpm",
				"full_product_name":{
					"product_id":"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-107.0.0.99.oe2403.x86_64",
					"name":"kernel-debuginfo-6.6.0-107.0.0.99.oe2403.x86_64 as a component of openEuler-24.03-LTS"
				},
				"category":"default_component_of"
			},
			{
				"relates_to_product_reference":"openEuler-24.03-LTS",
				"product_reference":"kernel-debugsource-6.6.0-107.0.0.99.oe2403.x86_64.rpm",
				"full_product_name":{
					"product_id":"openEuler-24.03-LTS:kernel-debugsource-6.6.0-107.0.0.99.oe2403.x86_64",
					"name":"kernel-debugsource-6.6.0-107.0.0.99.oe2403.x86_64 as a component of openEuler-24.03-LTS"
				},
				"category":"default_component_of"
			},
			{
				"relates_to_product_reference":"openEuler-24.03-LTS",
				"product_reference":"kernel-devel-6.6.0-107.0.0.99.oe2403.x86_64.rpm",
				"full_product_name":{
					"product_id":"openEuler-24.03-LTS:kernel-devel-6.6.0-107.0.0.99.oe2403.x86_64",
					"name":"kernel-devel-6.6.0-107.0.0.99.oe2403.x86_64 as a component of openEuler-24.03-LTS"
				},
				"category":"default_component_of"
			},
			{
				"relates_to_product_reference":"openEuler-24.03-LTS",
				"product_reference":"kernel-headers-6.6.0-107.0.0.99.oe2403.x86_64.rpm",
				"full_product_name":{
					"product_id":"openEuler-24.03-LTS:kernel-headers-6.6.0-107.0.0.99.oe2403.x86_64",
					"name":"kernel-headers-6.6.0-107.0.0.99.oe2403.x86_64 as a component of openEuler-24.03-LTS"
				},
				"category":"default_component_of"
			},
			{
				"relates_to_product_reference":"openEuler-24.03-LTS",
				"product_reference":"kernel-source-6.6.0-107.0.0.99.oe2403.x86_64.rpm",
				"full_product_name":{
					"product_id":"openEuler-24.03-LTS:kernel-source-6.6.0-107.0.0.99.oe2403.x86_64",
					"name":"kernel-source-6.6.0-107.0.0.99.oe2403.x86_64 as a component of openEuler-24.03-LTS"
				},
				"category":"default_component_of"
			},
			{
				"relates_to_product_reference":"openEuler-24.03-LTS",
				"product_reference":"kernel-tools-6.6.0-107.0.0.99.oe2403.x86_64.rpm",
				"full_product_name":{
					"product_id":"openEuler-24.03-LTS:kernel-tools-6.6.0-107.0.0.99.oe2403.x86_64",
					"name":"kernel-tools-6.6.0-107.0.0.99.oe2403.x86_64 as a component of openEuler-24.03-LTS"
				},
				"category":"default_component_of"
			},
			{
				"relates_to_product_reference":"openEuler-24.03-LTS",
				"product_reference":"kernel-tools-debuginfo-6.6.0-107.0.0.99.oe2403.x86_64.rpm",
				"full_product_name":{
					"product_id":"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-107.0.0.99.oe2403.x86_64",
					"name":"kernel-tools-debuginfo-6.6.0-107.0.0.99.oe2403.x86_64 as a component of openEuler-24.03-LTS"
				},
				"category":"default_component_of"
			},
			{
				"relates_to_product_reference":"openEuler-24.03-LTS",
				"product_reference":"kernel-tools-devel-6.6.0-107.0.0.99.oe2403.x86_64.rpm",
				"full_product_name":{
					"product_id":"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-107.0.0.99.oe2403.x86_64",
					"name":"kernel-tools-devel-6.6.0-107.0.0.99.oe2403.x86_64 as a component of openEuler-24.03-LTS"
				},
				"category":"default_component_of"
			},
			{
				"relates_to_product_reference":"openEuler-24.03-LTS",
				"product_reference":"perf-6.6.0-107.0.0.99.oe2403.x86_64.rpm",
				"full_product_name":{
					"product_id":"openEuler-24.03-LTS:perf-6.6.0-107.0.0.99.oe2403.x86_64",
					"name":"perf-6.6.0-107.0.0.99.oe2403.x86_64 as a component of openEuler-24.03-LTS"
				},
				"category":"default_component_of"
			},
			{
				"relates_to_product_reference":"openEuler-24.03-LTS",
				"product_reference":"perf-debuginfo-6.6.0-107.0.0.99.oe2403.x86_64.rpm",
				"full_product_name":{
					"product_id":"openEuler-24.03-LTS:perf-debuginfo-6.6.0-107.0.0.99.oe2403.x86_64",
					"name":"perf-debuginfo-6.6.0-107.0.0.99.oe2403.x86_64 as a component of openEuler-24.03-LTS"
				},
				"category":"default_component_of"
			},
			{
				"relates_to_product_reference":"openEuler-24.03-LTS",
				"product_reference":"python3-perf-6.6.0-107.0.0.99.oe2403.x86_64.rpm",
				"full_product_name":{
					"product_id":"openEuler-24.03-LTS:python3-perf-6.6.0-107.0.0.99.oe2403.x86_64",
					"name":"python3-perf-6.6.0-107.0.0.99.oe2403.x86_64 as a component of openEuler-24.03-LTS"
				},
				"category":"default_component_of"
			},
			{
				"relates_to_product_reference":"openEuler-24.03-LTS",
				"product_reference":"python3-perf-debuginfo-6.6.0-107.0.0.99.oe2403.x86_64.rpm",
				"full_product_name":{
					"product_id":"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-107.0.0.99.oe2403.x86_64",
					"name":"python3-perf-debuginfo-6.6.0-107.0.0.99.oe2403.x86_64 as a component of openEuler-24.03-LTS"
				},
				"category":"default_component_of"
			}
		]
	},
	"vulnerabilities":[
		{
			"cve":"CVE-2024-57948",
			"notes":[
				{
					"text":"In the Linux kernel, the following vulnerability has been resolved:\n\nmac802154: check local interfaces before deleting sdata list\n\nsyzkaller reported a corrupted list in ieee802154_if_remove. [1]\n\nRemove an IEEE 802.15.4 network interface after unregister an IEEE 802.15.4\nhardware device from the system.\n\nCPU0\t\t\t\t\tCPU1\n====\t\t\t\t\t====\ngenl_family_rcv_msg_doit\t\tieee802154_unregister_hw\nieee802154_del_iface\t\t\tieee802154_remove_interfaces\nrdev_del_virtual_intf_deprecated\tlist_del(&sdata->list)\nieee802154_if_remove\nlist_del_rcu\n\nThe net device has been unregistered, since the rcu grace period,\nunregistration must be run before ieee802154_if_remove.\n\nTo avoid this issue, add a check for local->interfaces before deleting\nsdata list.\n\n[1]\nkernel BUG at lib/list_debug.c:58!\nOops: invalid opcode: 0000 [#1] PREEMPT SMP KASAN PTI\nCPU: 0 UID: 0 PID: 6277 Comm: syz-executor157 Not tainted 6.12.0-rc6-syzkaller-00005-g557329bcecc2 #0\nHardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/13/2024\nRIP: 0010:__list_del_entry_valid_or_report+0xf4/0x140 lib/list_debug.c:56\nCode: e8 a1 7e 00 07 90 0f 0b 48 c7 c7 e0 37 60 8c 4c 89 fe e8 8f 7e 00 07 90 0f 0b 48 c7 c7 40 38 60 8c 4c 89 fe e8 7d 7e 00 07 90 <0f> 0b 48 c7 c7 a0 38 60 8c 4c 89 fe e8 6b 7e 00 07 90 0f 0b 48 c7\nRSP: 0018:ffffc9000490f3d0 EFLAGS: 00010246\nRAX: 000000000000004e RBX: dead000000000122 RCX: d211eee56bb28d00\nRDX: 0000000000000000 RSI: 0000000080000000 RDI: 0000000000000000\nRBP: ffff88805b278dd8 R08: ffffffff8174a12c R09: 1ffffffff2852f0d\nR10: dffffc0000000000 R11: fffffbfff2852f0e R12: dffffc0000000000\nR13: dffffc0000000000 R14: dead000000000100 R15: ffff88805b278cc0\nFS:  0000555572f94380(0000) GS:ffff8880b8600000(0000) knlGS:0000000000000000\nCS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033\nCR2: 000056262e4a3000 CR3: 0000000078496000 CR4: 00000000003526f0\nDR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000\nDR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400\nCall Trace:\n <TASK>\n __list_del_entry_valid include/linux/list.h:124 [inline]\n __list_del_entry include/linux/list.h:215 [inline]\n list_del_rcu include/linux/rculist.h:157 [inline]\n ieee802154_if_remove+0x86/0x1e0 net/mac802154/iface.c:687\n rdev_del_virtual_intf_deprecated net/ieee802154/rdev-ops.h:24 [inline]\n ieee802154_del_iface+0x2c0/0x5c0 net/ieee802154/nl-phy.c:323\n genl_family_rcv_msg_doit net/netlink/genetlink.c:1115 [inline]\n genl_family_rcv_msg net/netlink/genetlink.c:1195 [inline]\n genl_rcv_msg+0xb14/0xec0 net/netlink/genetlink.c:1210\n netlink_rcv_skb+0x1e3/0x430 net/netlink/af_netlink.c:2551\n genl_rcv+0x28/0x40 net/netlink/genetlink.c:1219\n netlink_unicast_kernel net/netlink/af_netlink.c:1331 [inline]\n netlink_unicast+0x7f6/0x990 net/netlink/af_netlink.c:1357\n netlink_sendmsg+0x8e4/0xcb0 net/netlink/af_netlink.c:1901\n sock_sendmsg_nosec net/socket.c:729 [inline]\n __sock_sendmsg+0x221/0x270 net/socket.c:744\n ____sys_sendmsg+0x52a/0x7e0 net/socket.c:2607\n ___sys_sendmsg net/socket.c:2661 [inline]\n __sys_sendmsg+0x292/0x380 net/socket.c:2690\n do_syscall_x64 arch/x86/entry/common.c:52 [inline]\n do_syscall_64+0xf3/0x230 arch/x86/entry/common.c:83\n entry_SYSCALL_64_after_hwframe+0x77/0x7f",
					"category":"description",
					"title":"Vulnerability Description"
				}
			],
			"product_status":{
				"fixed":[
					"openEuler-24.03-LTS:kernel-6.6.0-107.0.0.99.oe2403.src",
					"openEuler-24.03-LTS:bpftool-6.6.0-107.0.0.99.oe2403.aarch64",
					"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-107.0.0.99.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-6.6.0-107.0.0.99.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-107.0.0.99.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-debugsource-6.6.0-107.0.0.99.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-devel-6.6.0-107.0.0.99.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-headers-6.6.0-107.0.0.99.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-source-6.6.0-107.0.0.99.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-tools-6.6.0-107.0.0.99.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-107.0.0.99.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-107.0.0.99.oe2403.aarch64",
					"openEuler-24.03-LTS:perf-6.6.0-107.0.0.99.oe2403.aarch64",
					"openEuler-24.03-LTS:perf-debuginfo-6.6.0-107.0.0.99.oe2403.aarch64",
					"openEuler-24.03-LTS:python3-perf-6.6.0-107.0.0.99.oe2403.aarch64",
					"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-107.0.0.99.oe2403.aarch64",
					"openEuler-24.03-LTS:bpftool-6.6.0-107.0.0.99.oe2403.x86_64",
					"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-107.0.0.99.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-6.6.0-107.0.0.99.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-107.0.0.99.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-debugsource-6.6.0-107.0.0.99.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-devel-6.6.0-107.0.0.99.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-headers-6.6.0-107.0.0.99.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-source-6.6.0-107.0.0.99.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-tools-6.6.0-107.0.0.99.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-107.0.0.99.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-107.0.0.99.oe2403.x86_64",
					"openEuler-24.03-LTS:perf-6.6.0-107.0.0.99.oe2403.x86_64",
					"openEuler-24.03-LTS:perf-debuginfo-6.6.0-107.0.0.99.oe2403.x86_64",
					"openEuler-24.03-LTS:python3-perf-6.6.0-107.0.0.99.oe2403.x86_64",
					"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-107.0.0.99.oe2403.x86_64"
				]
			},
			"remediations":[
				{
					"product_ids":[
						"openEuler-24.03-LTS:kernel-6.6.0-107.0.0.99.oe2403.src",
						"openEuler-24.03-LTS:bpftool-6.6.0-107.0.0.99.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-107.0.0.99.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-6.6.0-107.0.0.99.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-107.0.0.99.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-107.0.0.99.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-107.0.0.99.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-107.0.0.99.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-107.0.0.99.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-107.0.0.99.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-107.0.0.99.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-107.0.0.99.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-6.6.0-107.0.0.99.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-107.0.0.99.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-107.0.0.99.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-107.0.0.99.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-6.6.0-107.0.0.99.oe2403.x86_64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-107.0.0.99.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-6.6.0-107.0.0.99.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-107.0.0.99.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-107.0.0.99.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-107.0.0.99.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-107.0.0.99.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-107.0.0.99.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-107.0.0.99.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-107.0.0.99.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-107.0.0.99.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-6.6.0-107.0.0.99.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-107.0.0.99.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-107.0.0.99.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-107.0.0.99.oe2403.x86_64"
					],
					"details":"kernel security update",
					"category":"vendor_fix",
					"url":"https://www.openeuler.org/zh/security/security-bulletins/detail/?id=openEuler-SA-2025-2077"
				}
			],
			"scores":[
				{
					"cvss_v3":{
						"baseSeverity":"MEDIUM",
						"baseScore":6.7,
						"vectorString":"CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
						"version":"3.1"
					},
					"products":[
						"openEuler-24.03-LTS:kernel-6.6.0-107.0.0.99.oe2403.src",
						"openEuler-24.03-LTS:bpftool-6.6.0-107.0.0.99.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-107.0.0.99.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-6.6.0-107.0.0.99.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-107.0.0.99.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-107.0.0.99.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-107.0.0.99.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-107.0.0.99.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-107.0.0.99.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-107.0.0.99.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-107.0.0.99.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-107.0.0.99.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-6.6.0-107.0.0.99.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-107.0.0.99.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-107.0.0.99.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-107.0.0.99.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-6.6.0-107.0.0.99.oe2403.x86_64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-107.0.0.99.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-6.6.0-107.0.0.99.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-107.0.0.99.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-107.0.0.99.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-107.0.0.99.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-107.0.0.99.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-107.0.0.99.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-107.0.0.99.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-107.0.0.99.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-107.0.0.99.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-6.6.0-107.0.0.99.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-107.0.0.99.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-107.0.0.99.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-107.0.0.99.oe2403.x86_64"
					]
				}
			],
			"threats":[
				{
					"details":"Medium",
					"category":"impact"
				}
			],
			"title":"CVE-2024-57948"
		},
		{
			"cve":"CVE-2025-21839",
			"notes":[
				{
					"text":"In the Linux kernel, the following vulnerability has been resolved:\n\nKVM: x86: Load DR6 with guest value only before entering .vcpu_run() loop\n\nMove the conditional loading of hardware DR6 with the guest's DR6 value\nout of the core .vcpu_run() loop to fix a bug where KVM can load hardware\nwith a stale vcpu->arch.dr6.\n\nWhen the guest accesses a DR and host userspace isn't debugging the guest,\nKVM disables DR interception and loads the guest's values into hardware on\nVM-Enter and saves them on VM-Exit.  This allows the guest to access DRs\nat will, e.g. so that a sequence of DR accesses to configure a breakpoint\nonly generates one VM-Exit.\n\nFor DR0-DR3, the logic/behavior is identical between VMX and SVM, and also\nidentical between KVM_DEBUGREG_BP_ENABLED (userspace debugging the guest)\nand KVM_DEBUGREG_WONT_EXIT (guest using DRs), and so KVM handles loading\nDR0-DR3 in common code, _outside_ of the core kvm_x86_ops.vcpu_run() loop.\n\nBut for DR6, the guest's value doesn't need to be loaded into hardware for\nKVM_DEBUGREG_BP_ENABLED, and SVM provides a dedicated VMCB field whereas\nVMX requires software to manually load the guest value, and so loading the\nguest's value into DR6 is handled by {svm,vmx}_vcpu_run(), i.e. is done\n_inside_ the core run loop.\n\nUnfortunately, saving the guest values on VM-Exit is initiated by common\nx86, again outside of the core run loop.  If the guest modifies DR6 (in\nhardware, when DR interception is disabled), and then the next VM-Exit is\na fastpath VM-Exit, KVM will reload hardware DR6 with vcpu->arch.dr6 and\nclobber the guest's actual value.\n\nThe bug shows up primarily with nested VMX because KVM handles the VMX\npreemption timer in the fastpath, and the window between hardware DR6\nbeing modified (in guest context) and DR6 being read by guest software is\norders of magnitude larger in a nested setup.  E.g. in non-nested, the\nVMX preemption timer would need to fire precisely between #DB injection\nand the #DB handler's read of DR6, whereas with a KVM-on-KVM setup, the\nwindow where hardware DR6 is \"dirty\" extends all the way from L1 writing\nDR6 to VMRESUME (in L1).\n\n    L1's view:\n    ==========\n    <L1 disables DR interception>\n           CPU 0/KVM-7289    [023] d....  2925.640961: kvm_entry: vcpu 0\n A:  L1 Writes DR6\n           CPU 0/KVM-7289    [023] d....  2925.640963: <hack>: Set DRs, DR6 = 0xffff0ff1\n\n B:        CPU 0/KVM-7289    [023] d....  2925.640967: kvm_exit: vcpu 0 reason EXTERNAL_INTERRUPT intr_info 0x800000ec\n\n D: L1 reads DR6, arch.dr6 = 0\n           CPU 0/KVM-7289    [023] d....  2925.640969: <hack>: Sync DRs, DR6 = 0xffff0ff0\n\n           CPU 0/KVM-7289    [023] d....  2925.640976: kvm_entry: vcpu 0\n    L2 reads DR6, L1 disables DR interception\n           CPU 0/KVM-7289    [023] d....  2925.640980: kvm_exit: vcpu 0 reason DR_ACCESS info1 0x0000000000000216\n           CPU 0/KVM-7289    [023] d....  2925.640983: kvm_entry: vcpu 0\n\n           CPU 0/KVM-7289    [023] d....  2925.640983: <hack>: Set DRs, DR6 = 0xffff0ff0\n\n    L2 detects failure\n           CPU 0/KVM-7289    [023] d....  2925.640987: kvm_exit: vcpu 0 reason HLT\n    L1 reads DR6 (confirms failure)\n           CPU 0/KVM-7289    [023] d....  2925.640990: <hack>: Sync DRs, DR6 = 0xffff0ff0\n\n    L0's view:\n    ==========\n    L2 reads DR6, arch.dr6 = 0\n          CPU 23/KVM-5046    [001] d....  3410.005610: kvm_exit: vcpu 23 reason DR_ACCESS info1 0x0000000000000216\n          CPU 23/KVM-5046    [001] .....  3410.005610: kvm_nested_vmexit: vcpu 23 reason DR_ACCESS info1 0x0000000000000216\n\n    L2 => L1 nested VM-Exit\n          CPU 23/KVM-5046    [001] .....  3410.005610: kvm_nested_vmexit_inject: reason: DR_ACCESS ext_inf1: 0x0000000000000216\n\n          CPU 23/KVM-5046    [001] d....  3410.005610: kvm_entry: vcpu 23\n          CPU 23/KVM-5046    [001] d....  3410.005611: kvm_exit: vcpu 23 reason VMREAD\n          CPU 23/KVM-5046    [001] d....  3410.005611: kvm_entry: vcpu 23\n          CPU 23/KVM-5046    [001] d....  3410.\n---truncated---",
					"category":"description",
					"title":"Vulnerability Description"
				}
			],
			"product_status":{
				"fixed":[
					"openEuler-24.03-LTS:kernel-6.6.0-107.0.0.99.oe2403.src",
					"openEuler-24.03-LTS:bpftool-6.6.0-107.0.0.99.oe2403.aarch64",
					"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-107.0.0.99.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-6.6.0-107.0.0.99.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-107.0.0.99.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-debugsource-6.6.0-107.0.0.99.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-devel-6.6.0-107.0.0.99.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-headers-6.6.0-107.0.0.99.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-source-6.6.0-107.0.0.99.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-tools-6.6.0-107.0.0.99.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-107.0.0.99.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-107.0.0.99.oe2403.aarch64",
					"openEuler-24.03-LTS:perf-6.6.0-107.0.0.99.oe2403.aarch64",
					"openEuler-24.03-LTS:perf-debuginfo-6.6.0-107.0.0.99.oe2403.aarch64",
					"openEuler-24.03-LTS:python3-perf-6.6.0-107.0.0.99.oe2403.aarch64",
					"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-107.0.0.99.oe2403.aarch64",
					"openEuler-24.03-LTS:bpftool-6.6.0-107.0.0.99.oe2403.x86_64",
					"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-107.0.0.99.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-6.6.0-107.0.0.99.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-107.0.0.99.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-debugsource-6.6.0-107.0.0.99.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-devel-6.6.0-107.0.0.99.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-headers-6.6.0-107.0.0.99.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-source-6.6.0-107.0.0.99.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-tools-6.6.0-107.0.0.99.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-107.0.0.99.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-107.0.0.99.oe2403.x86_64",
					"openEuler-24.03-LTS:perf-6.6.0-107.0.0.99.oe2403.x86_64",
					"openEuler-24.03-LTS:perf-debuginfo-6.6.0-107.0.0.99.oe2403.x86_64",
					"openEuler-24.03-LTS:python3-perf-6.6.0-107.0.0.99.oe2403.x86_64",
					"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-107.0.0.99.oe2403.x86_64"
				]
			},
			"remediations":[
				{
					"product_ids":[
						"openEuler-24.03-LTS:kernel-6.6.0-107.0.0.99.oe2403.src",
						"openEuler-24.03-LTS:bpftool-6.6.0-107.0.0.99.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-107.0.0.99.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-6.6.0-107.0.0.99.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-107.0.0.99.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-107.0.0.99.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-107.0.0.99.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-107.0.0.99.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-107.0.0.99.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-107.0.0.99.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-107.0.0.99.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-107.0.0.99.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-6.6.0-107.0.0.99.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-107.0.0.99.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-107.0.0.99.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-107.0.0.99.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-6.6.0-107.0.0.99.oe2403.x86_64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-107.0.0.99.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-6.6.0-107.0.0.99.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-107.0.0.99.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-107.0.0.99.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-107.0.0.99.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-107.0.0.99.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-107.0.0.99.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-107.0.0.99.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-107.0.0.99.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-107.0.0.99.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-6.6.0-107.0.0.99.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-107.0.0.99.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-107.0.0.99.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-107.0.0.99.oe2403.x86_64"
					],
					"details":"kernel security update",
					"category":"vendor_fix",
					"url":"https://www.openeuler.org/zh/security/security-bulletins/detail/?id=openEuler-SA-2025-2077"
				}
			],
			"scores":[
				{
					"cvss_v3":{
						"baseSeverity":"MEDIUM",
						"baseScore":5.5,
						"vectorString":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
						"version":"3.1"
					},
					"products":[
						"openEuler-24.03-LTS:kernel-6.6.0-107.0.0.99.oe2403.src",
						"openEuler-24.03-LTS:bpftool-6.6.0-107.0.0.99.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-107.0.0.99.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-6.6.0-107.0.0.99.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-107.0.0.99.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-107.0.0.99.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-107.0.0.99.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-107.0.0.99.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-107.0.0.99.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-107.0.0.99.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-107.0.0.99.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-107.0.0.99.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-6.6.0-107.0.0.99.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-107.0.0.99.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-107.0.0.99.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-107.0.0.99.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-6.6.0-107.0.0.99.oe2403.x86_64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-107.0.0.99.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-6.6.0-107.0.0.99.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-107.0.0.99.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-107.0.0.99.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-107.0.0.99.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-107.0.0.99.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-107.0.0.99.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-107.0.0.99.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-107.0.0.99.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-107.0.0.99.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-6.6.0-107.0.0.99.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-107.0.0.99.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-107.0.0.99.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-107.0.0.99.oe2403.x86_64"
					]
				}
			],
			"threats":[
				{
					"details":"Medium",
					"category":"impact"
				}
			],
			"title":"CVE-2025-21839"
		},
		{
			"cve":"CVE-2025-21907",
			"notes":[
				{
					"text":"In the Linux kernel, the following vulnerability has been resolved:\n\nmm: memory-failure: update ttu flag inside unmap_poisoned_folio\n\nPatch series \"mm: memory_failure: unmap poisoned folio during migrate\nproperly\", v3.\n\nFix two bugs during folio migration if the folio is poisoned.\n\n\nThis patch (of 3):\n\nCommit 6da6b1d4a7df (\"mm/hwpoison: convert TTU_IGNORE_HWPOISON to\nTTU_HWPOISON\") introduce TTU_HWPOISON to replace TTU_IGNORE_HWPOISON in\norder to stop send SIGBUS signal when accessing an error page after a\nmemory error on a clean folio.  However during page migration, anon folio\nmust be set with TTU_HWPOISON during unmap_*().  For pagecache we need\nsome policy just like the one in hwpoison_user_mappings to set this flag. \nSo move this policy from hwpoison_user_mappings to unmap_poisoned_folio to\nhandle this warning properly.\n\nWarning will be produced during unamp poison folio with the following log:\n\n  ------------[ cut here ]------------\n  WARNING: CPU: 1 PID: 365 at mm/rmap.c:1847 try_to_unmap_one+0x8fc/0xd3c\n  Modules linked in:\n  CPU: 1 UID: 0 PID: 365 Comm: bash Tainted: G        W          6.13.0-rc1-00018-gacdb4bbda7ab #42\n  Tainted: [W]=WARN\n  Hardware name: QEMU QEMU Virtual Machine, BIOS 0.0.0 02/06/2015\n  pstate: 20400005 (nzCv daif +PAN -UAO -TCO -DIT -SSBS BTYPE=--)\n  pc : try_to_unmap_one+0x8fc/0xd3c\n  lr : try_to_unmap_one+0x3dc/0xd3c\n  Call trace:\n   try_to_unmap_one+0x8fc/0xd3c (P)\n   try_to_unmap_one+0x3dc/0xd3c (L)\n   rmap_walk_anon+0xdc/0x1f8\n   rmap_walk+0x3c/0x58\n   try_to_unmap+0x88/0x90\n   unmap_poisoned_folio+0x30/0xa8\n   do_migrate_range+0x4a0/0x568\n   offline_pages+0x5a4/0x670\n   memory_block_action+0x17c/0x374\n   memory_subsys_offline+0x3c/0x78\n   device_offline+0xa4/0xd0\n   state_store+0x8c/0xf0\n   dev_attr_store+0x18/0x2c\n   sysfs_kf_write+0x44/0x54\n   kernfs_fop_write_iter+0x118/0x1a8\n   vfs_write+0x3a8/0x4bc\n   ksys_write+0x6c/0xf8\n   __arm64_sys_write+0x1c/0x28\n   invoke_syscall+0x44/0x100\n   el0_svc_common.constprop.0+0x40/0xe0\n   do_el0_svc+0x1c/0x28\n   el0_svc+0x30/0xd0\n   el0t_64_sync_handler+0xc8/0xcc\n   el0t_64_sync+0x198/0x19c\n  ---[ end trace 0000000000000000 ]---\n\n[",
					"category":"description",
					"title":"Vulnerability Description"
				}
			],
			"product_status":{
				"fixed":[
					"openEuler-24.03-LTS:kernel-6.6.0-107.0.0.99.oe2403.src",
					"openEuler-24.03-LTS:bpftool-6.6.0-107.0.0.99.oe2403.aarch64",
					"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-107.0.0.99.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-6.6.0-107.0.0.99.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-107.0.0.99.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-debugsource-6.6.0-107.0.0.99.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-devel-6.6.0-107.0.0.99.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-headers-6.6.0-107.0.0.99.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-source-6.6.0-107.0.0.99.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-tools-6.6.0-107.0.0.99.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-107.0.0.99.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-107.0.0.99.oe2403.aarch64",
					"openEuler-24.03-LTS:perf-6.6.0-107.0.0.99.oe2403.aarch64",
					"openEuler-24.03-LTS:perf-debuginfo-6.6.0-107.0.0.99.oe2403.aarch64",
					"openEuler-24.03-LTS:python3-perf-6.6.0-107.0.0.99.oe2403.aarch64",
					"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-107.0.0.99.oe2403.aarch64",
					"openEuler-24.03-LTS:bpftool-6.6.0-107.0.0.99.oe2403.x86_64",
					"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-107.0.0.99.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-6.6.0-107.0.0.99.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-107.0.0.99.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-debugsource-6.6.0-107.0.0.99.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-devel-6.6.0-107.0.0.99.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-headers-6.6.0-107.0.0.99.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-source-6.6.0-107.0.0.99.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-tools-6.6.0-107.0.0.99.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-107.0.0.99.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-107.0.0.99.oe2403.x86_64",
					"openEuler-24.03-LTS:perf-6.6.0-107.0.0.99.oe2403.x86_64",
					"openEuler-24.03-LTS:perf-debuginfo-6.6.0-107.0.0.99.oe2403.x86_64",
					"openEuler-24.03-LTS:python3-perf-6.6.0-107.0.0.99.oe2403.x86_64",
					"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-107.0.0.99.oe2403.x86_64"
				]
			},
			"remediations":[
				{
					"product_ids":[
						"openEuler-24.03-LTS:kernel-6.6.0-107.0.0.99.oe2403.src",
						"openEuler-24.03-LTS:bpftool-6.6.0-107.0.0.99.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-107.0.0.99.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-6.6.0-107.0.0.99.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-107.0.0.99.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-107.0.0.99.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-107.0.0.99.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-107.0.0.99.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-107.0.0.99.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-107.0.0.99.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-107.0.0.99.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-107.0.0.99.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-6.6.0-107.0.0.99.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-107.0.0.99.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-107.0.0.99.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-107.0.0.99.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-6.6.0-107.0.0.99.oe2403.x86_64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-107.0.0.99.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-6.6.0-107.0.0.99.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-107.0.0.99.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-107.0.0.99.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-107.0.0.99.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-107.0.0.99.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-107.0.0.99.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-107.0.0.99.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-107.0.0.99.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-107.0.0.99.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-6.6.0-107.0.0.99.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-107.0.0.99.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-107.0.0.99.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-107.0.0.99.oe2403.x86_64"
					],
					"details":"kernel security update",
					"category":"vendor_fix",
					"url":"https://www.openeuler.org/zh/security/security-bulletins/detail/?id=openEuler-SA-2025-2077"
				}
			],
			"scores":[
				{
					"cvss_v3":{
						"baseSeverity":"MEDIUM",
						"baseScore":5.5,
						"vectorString":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
						"version":"3.1"
					},
					"products":[
						"openEuler-24.03-LTS:kernel-6.6.0-107.0.0.99.oe2403.src",
						"openEuler-24.03-LTS:bpftool-6.6.0-107.0.0.99.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-107.0.0.99.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-6.6.0-107.0.0.99.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-107.0.0.99.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-107.0.0.99.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-107.0.0.99.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-107.0.0.99.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-107.0.0.99.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-107.0.0.99.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-107.0.0.99.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-107.0.0.99.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-6.6.0-107.0.0.99.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-107.0.0.99.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-107.0.0.99.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-107.0.0.99.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-6.6.0-107.0.0.99.oe2403.x86_64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-107.0.0.99.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-6.6.0-107.0.0.99.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-107.0.0.99.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-107.0.0.99.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-107.0.0.99.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-107.0.0.99.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-107.0.0.99.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-107.0.0.99.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-107.0.0.99.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-107.0.0.99.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-6.6.0-107.0.0.99.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-107.0.0.99.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-107.0.0.99.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-107.0.0.99.oe2403.x86_64"
					]
				}
			],
			"threats":[
				{
					"details":"Medium",
					"category":"impact"
				}
			],
			"title":"CVE-2025-21907"
		},
		{
			"cve":"CVE-2025-21956",
			"notes":[
				{
					"text":"In the Linux kernel, the following vulnerability has been resolved:\n\ndrm/amd/display: Assign normalized_pix_clk when color depth = 14\n\n[WHY & HOW]\nA warning message \"WARNING: CPU: 4 PID: 459 at ... /dc_resource.c:3397\ncalculate_phy_pix_clks+0xef/0x100 [amdgpu]\" occurs because the\ndisplay_color_depth == COLOR_DEPTH_141414 is not handled. This is\nobserved in Radeon RX 6600 XT.\n\nIt is fixed by assigning pix_clk * (14 * 3) / 24 - same as the rests.\n\nAlso fixes the indentation in get_norm_pix_clk.\n\n(cherry picked from commit 274a87eb389f58eddcbc5659ab0b180b37e92775)",
					"category":"description",
					"title":"Vulnerability Description"
				}
			],
			"product_status":{
				"fixed":[
					"openEuler-24.03-LTS:kernel-6.6.0-107.0.0.99.oe2403.src",
					"openEuler-24.03-LTS:bpftool-6.6.0-107.0.0.99.oe2403.aarch64",
					"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-107.0.0.99.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-6.6.0-107.0.0.99.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-107.0.0.99.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-debugsource-6.6.0-107.0.0.99.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-devel-6.6.0-107.0.0.99.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-headers-6.6.0-107.0.0.99.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-source-6.6.0-107.0.0.99.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-tools-6.6.0-107.0.0.99.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-107.0.0.99.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-107.0.0.99.oe2403.aarch64",
					"openEuler-24.03-LTS:perf-6.6.0-107.0.0.99.oe2403.aarch64",
					"openEuler-24.03-LTS:perf-debuginfo-6.6.0-107.0.0.99.oe2403.aarch64",
					"openEuler-24.03-LTS:python3-perf-6.6.0-107.0.0.99.oe2403.aarch64",
					"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-107.0.0.99.oe2403.aarch64",
					"openEuler-24.03-LTS:bpftool-6.6.0-107.0.0.99.oe2403.x86_64",
					"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-107.0.0.99.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-6.6.0-107.0.0.99.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-107.0.0.99.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-debugsource-6.6.0-107.0.0.99.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-devel-6.6.0-107.0.0.99.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-headers-6.6.0-107.0.0.99.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-source-6.6.0-107.0.0.99.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-tools-6.6.0-107.0.0.99.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-107.0.0.99.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-107.0.0.99.oe2403.x86_64",
					"openEuler-24.03-LTS:perf-6.6.0-107.0.0.99.oe2403.x86_64",
					"openEuler-24.03-LTS:perf-debuginfo-6.6.0-107.0.0.99.oe2403.x86_64",
					"openEuler-24.03-LTS:python3-perf-6.6.0-107.0.0.99.oe2403.x86_64",
					"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-107.0.0.99.oe2403.x86_64"
				]
			},
			"remediations":[
				{
					"product_ids":[
						"openEuler-24.03-LTS:kernel-6.6.0-107.0.0.99.oe2403.src",
						"openEuler-24.03-LTS:bpftool-6.6.0-107.0.0.99.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-107.0.0.99.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-6.6.0-107.0.0.99.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-107.0.0.99.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-107.0.0.99.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-107.0.0.99.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-107.0.0.99.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-107.0.0.99.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-107.0.0.99.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-107.0.0.99.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-107.0.0.99.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-6.6.0-107.0.0.99.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-107.0.0.99.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-107.0.0.99.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-107.0.0.99.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-6.6.0-107.0.0.99.oe2403.x86_64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-107.0.0.99.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-6.6.0-107.0.0.99.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-107.0.0.99.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-107.0.0.99.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-107.0.0.99.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-107.0.0.99.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-107.0.0.99.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-107.0.0.99.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-107.0.0.99.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-107.0.0.99.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-6.6.0-107.0.0.99.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-107.0.0.99.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-107.0.0.99.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-107.0.0.99.oe2403.x86_64"
					],
					"details":"kernel security update",
					"category":"vendor_fix",
					"url":"https://www.openeuler.org/zh/security/security-bulletins/detail/?id=openEuler-SA-2025-2077"
				}
			],
			"scores":[
				{
					"cvss_v3":{
						"baseSeverity":"LOW",
						"baseScore":3.9,
						"vectorString":"CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:L/I:L/A:L",
						"version":"3.1"
					},
					"products":[
						"openEuler-24.03-LTS:kernel-6.6.0-107.0.0.99.oe2403.src",
						"openEuler-24.03-LTS:bpftool-6.6.0-107.0.0.99.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-107.0.0.99.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-6.6.0-107.0.0.99.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-107.0.0.99.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-107.0.0.99.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-107.0.0.99.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-107.0.0.99.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-107.0.0.99.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-107.0.0.99.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-107.0.0.99.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-107.0.0.99.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-6.6.0-107.0.0.99.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-107.0.0.99.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-107.0.0.99.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-107.0.0.99.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-6.6.0-107.0.0.99.oe2403.x86_64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-107.0.0.99.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-6.6.0-107.0.0.99.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-107.0.0.99.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-107.0.0.99.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-107.0.0.99.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-107.0.0.99.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-107.0.0.99.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-107.0.0.99.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-107.0.0.99.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-107.0.0.99.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-6.6.0-107.0.0.99.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-107.0.0.99.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-107.0.0.99.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-107.0.0.99.oe2403.x86_64"
					]
				}
			],
			"threats":[
				{
					"details":"Low",
					"category":"impact"
				}
			],
			"title":"CVE-2025-21956"
		},
		{
			"cve":"CVE-2025-21959",
			"notes":[
				{
					"text":"In the Linux kernel, the following vulnerability has been resolved:\n\nnetfilter: nf_conncount: Fully initialize struct nf_conncount_tuple in insert_tree()\n\nSince commit b36e4523d4d5 (\"netfilter: nf_conncount: fix garbage\ncollection confirm race\"), `cpu` and `jiffies32` were introduced to\nthe struct nf_conncount_tuple.\n\nThe commit made nf_conncount_add() initialize `conn->cpu` and\n`conn->jiffies32` when allocating the struct.\nIn contrast, count_tree() was not changed to initialize them.\n\nBy commit 34848d5c896e (\"netfilter: nf_conncount: Split insert and\ntraversal\"), count_tree() was split and the relevant allocation\ncode now resides in insert_tree().\nInitialize `conn->cpu` and `conn->jiffies32` in insert_tree().\n\nBUG: KMSAN: uninit-value in find_or_evict net/netfilter/nf_conncount.c:117 [inline]\nBUG: KMSAN: uninit-value in __nf_conncount_add+0xd9c/0x2850 net/netfilter/nf_conncount.c:143\n find_or_evict net/netfilter/nf_conncount.c:117 [inline]\n __nf_conncount_add+0xd9c/0x2850 net/netfilter/nf_conncount.c:143\n count_tree net/netfilter/nf_conncount.c:438 [inline]\n nf_conncount_count+0x82f/0x1e80 net/netfilter/nf_conncount.c:521\n connlimit_mt+0x7f6/0xbd0 net/netfilter/xt_connlimit.c:72\n __nft_match_eval net/netfilter/nft_compat.c:403 [inline]\n nft_match_eval+0x1a5/0x300 net/netfilter/nft_compat.c:433\n expr_call_ops_eval net/netfilter/nf_tables_core.c:240 [inline]\n nft_do_chain+0x426/0x2290 net/netfilter/nf_tables_core.c:288\n nft_do_chain_ipv4+0x1a5/0x230 net/netfilter/nft_chain_filter.c:23\n nf_hook_entry_hookfn include/linux/netfilter.h:154 [inline]\n nf_hook_slow+0xf4/0x400 net/netfilter/core.c:626\n nf_hook_slow_list+0x24d/0x860 net/netfilter/core.c:663\n NF_HOOK_LIST include/linux/netfilter.h:350 [inline]\n ip_sublist_rcv+0x17b7/0x17f0 net/ipv4/ip_input.c:633\n ip_list_rcv+0x9ef/0xa40 net/ipv4/ip_input.c:669\n __netif_receive_skb_list_ptype net/core/dev.c:5936 [inline]\n __netif_receive_skb_list_core+0x15c5/0x1670 net/core/dev.c:5983\n __netif_receive_skb_list net/core/dev.c:6035 [inline]\n netif_receive_skb_list_internal+0x1085/0x1700 net/core/dev.c:6126\n netif_receive_skb_list+0x5a/0x460 net/core/dev.c:6178\n xdp_recv_frames net/bpf/test_run.c:280 [inline]\n xdp_test_run_batch net/bpf/test_run.c:361 [inline]\n bpf_test_run_xdp_live+0x2e86/0x3480 net/bpf/test_run.c:390\n bpf_prog_test_run_xdp+0xf1d/0x1ae0 net/bpf/test_run.c:1316\n bpf_prog_test_run+0x5e5/0xa30 kernel/bpf/syscall.c:4407\n __sys_bpf+0x6aa/0xd90 kernel/bpf/syscall.c:5813\n __do_sys_bpf kernel/bpf/syscall.c:5902 [inline]\n __se_sys_bpf kernel/bpf/syscall.c:5900 [inline]\n __ia32_sys_bpf+0xa0/0xe0 kernel/bpf/syscall.c:5900\n ia32_sys_call+0x394d/0x4180 arch/x86/include/generated/asm/syscalls_32.h:358\n do_syscall_32_irqs_on arch/x86/entry/common.c:165 [inline]\n __do_fast_syscall_32+0xb0/0x110 arch/x86/entry/common.c:387\n do_fast_syscall_32+0x38/0x80 arch/x86/entry/common.c:412\n do_SYSENTER_32+0x1f/0x30 arch/x86/entry/common.c:450\n entry_SYSENTER_compat_after_hwframe+0x84/0x8e\n\nUninit was created at:\n slab_post_alloc_hook mm/slub.c:4121 [inline]\n slab_alloc_node mm/slub.c:4164 [inline]\n kmem_cache_alloc_noprof+0x915/0xe10 mm/slub.c:4171\n insert_tree net/netfilter/nf_conncount.c:372 [inline]\n count_tree net/netfilter/nf_conncount.c:450 [inline]\n nf_conncount_count+0x1415/0x1e80 net/netfilter/nf_conncount.c:521\n connlimit_mt+0x7f6/0xbd0 net/netfilter/xt_connlimit.c:72\n __nft_match_eval net/netfilter/nft_compat.c:403 [inline]\n nft_match_eval+0x1a5/0x300 net/netfilter/nft_compat.c:433\n expr_call_ops_eval net/netfilter/nf_tables_core.c:240 [inline]\n nft_do_chain+0x426/0x2290 net/netfilter/nf_tables_core.c:288\n nft_do_chain_ipv4+0x1a5/0x230 net/netfilter/nft_chain_filter.c:23\n nf_hook_entry_hookfn include/linux/netfilter.h:154 [inline]\n nf_hook_slow+0xf4/0x400 net/netfilter/core.c:626\n nf_hook_slow_list+0x24d/0x860 net/netfilter/core.c:663\n NF_HOOK_LIST include/linux/netfilter.h:350 [inline]\n ip_sublist_rcv+0x17b7/0x17f0 net/ipv4/ip_input.c:633\n ip_list_rcv+0x9ef/0xa40 net/ip\n---truncated---",
					"category":"description",
					"title":"Vulnerability Description"
				}
			],
			"product_status":{
				"fixed":[
					"openEuler-24.03-LTS:kernel-6.6.0-107.0.0.99.oe2403.src",
					"openEuler-24.03-LTS:bpftool-6.6.0-107.0.0.99.oe2403.aarch64",
					"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-107.0.0.99.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-6.6.0-107.0.0.99.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-107.0.0.99.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-debugsource-6.6.0-107.0.0.99.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-devel-6.6.0-107.0.0.99.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-headers-6.6.0-107.0.0.99.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-source-6.6.0-107.0.0.99.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-tools-6.6.0-107.0.0.99.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-107.0.0.99.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-107.0.0.99.oe2403.aarch64",
					"openEuler-24.03-LTS:perf-6.6.0-107.0.0.99.oe2403.aarch64",
					"openEuler-24.03-LTS:perf-debuginfo-6.6.0-107.0.0.99.oe2403.aarch64",
					"openEuler-24.03-LTS:python3-perf-6.6.0-107.0.0.99.oe2403.aarch64",
					"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-107.0.0.99.oe2403.aarch64",
					"openEuler-24.03-LTS:bpftool-6.6.0-107.0.0.99.oe2403.x86_64",
					"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-107.0.0.99.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-6.6.0-107.0.0.99.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-107.0.0.99.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-debugsource-6.6.0-107.0.0.99.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-devel-6.6.0-107.0.0.99.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-headers-6.6.0-107.0.0.99.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-source-6.6.0-107.0.0.99.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-tools-6.6.0-107.0.0.99.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-107.0.0.99.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-107.0.0.99.oe2403.x86_64",
					"openEuler-24.03-LTS:perf-6.6.0-107.0.0.99.oe2403.x86_64",
					"openEuler-24.03-LTS:perf-debuginfo-6.6.0-107.0.0.99.oe2403.x86_64",
					"openEuler-24.03-LTS:python3-perf-6.6.0-107.0.0.99.oe2403.x86_64",
					"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-107.0.0.99.oe2403.x86_64"
				]
			},
			"remediations":[
				{
					"product_ids":[
						"openEuler-24.03-LTS:kernel-6.6.0-107.0.0.99.oe2403.src",
						"openEuler-24.03-LTS:bpftool-6.6.0-107.0.0.99.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-107.0.0.99.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-6.6.0-107.0.0.99.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-107.0.0.99.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-107.0.0.99.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-107.0.0.99.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-107.0.0.99.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-107.0.0.99.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-107.0.0.99.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-107.0.0.99.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-107.0.0.99.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-6.6.0-107.0.0.99.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-107.0.0.99.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-107.0.0.99.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-107.0.0.99.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-6.6.0-107.0.0.99.oe2403.x86_64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-107.0.0.99.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-6.6.0-107.0.0.99.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-107.0.0.99.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-107.0.0.99.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-107.0.0.99.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-107.0.0.99.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-107.0.0.99.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-107.0.0.99.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-107.0.0.99.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-107.0.0.99.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-6.6.0-107.0.0.99.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-107.0.0.99.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-107.0.0.99.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-107.0.0.99.oe2403.x86_64"
					],
					"details":"kernel security update",
					"category":"vendor_fix",
					"url":"https://www.openeuler.org/zh/security/security-bulletins/detail/?id=openEuler-SA-2025-2077"
				}
			],
			"scores":[
				{
					"cvss_v3":{
						"baseSeverity":"MEDIUM",
						"baseScore":5.5,
						"vectorString":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
						"version":"3.1"
					},
					"products":[
						"openEuler-24.03-LTS:kernel-6.6.0-107.0.0.99.oe2403.src",
						"openEuler-24.03-LTS:bpftool-6.6.0-107.0.0.99.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-107.0.0.99.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-6.6.0-107.0.0.99.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-107.0.0.99.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-107.0.0.99.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-107.0.0.99.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-107.0.0.99.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-107.0.0.99.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-107.0.0.99.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-107.0.0.99.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-107.0.0.99.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-6.6.0-107.0.0.99.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-107.0.0.99.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-107.0.0.99.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-107.0.0.99.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-6.6.0-107.0.0.99.oe2403.x86_64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-107.0.0.99.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-6.6.0-107.0.0.99.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-107.0.0.99.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-107.0.0.99.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-107.0.0.99.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-107.0.0.99.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-107.0.0.99.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-107.0.0.99.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-107.0.0.99.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-107.0.0.99.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-6.6.0-107.0.0.99.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-107.0.0.99.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-107.0.0.99.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-107.0.0.99.oe2403.x86_64"
					]
				}
			],
			"threats":[
				{
					"details":"Medium",
					"category":"impact"
				}
			],
			"title":"CVE-2025-21959"
		},
		{
			"cve":"CVE-2025-21969",
			"notes":[
				{
					"text":"In the Linux kernel, the following vulnerability has been resolved:\n\nBluetooth: L2CAP: Fix slab-use-after-free Read in l2cap_send_cmd\n\nAfter the hci sync command releases l2cap_conn, the hci receive data work\nqueue references the released l2cap_conn when sending to the upper layer.\nAdd hci dev lock to the hci receive data work queue to synchronize the two.\n\n[1]\nBUG: KASAN: slab-use-after-free in l2cap_send_cmd+0x187/0x8d0 net/bluetooth/l2cap_core.c:954\nRead of size 8 at addr ffff8880271a4000 by task kworker/u9:2/5837\n\nCPU: 0 UID: 0 PID: 5837 Comm: kworker/u9:2 Not tainted 6.13.0-rc5-syzkaller-00163-gab75170520d4 #0\nHardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/13/2024\nWorkqueue: hci1 hci_rx_work\nCall Trace:\n <TASK>\n __dump_stack lib/dump_stack.c:94 [inline]\n dump_stack_lvl+0x241/0x360 lib/dump_stack.c:120\n print_address_description mm/kasan/report.c:378 [inline]\n print_report+0x169/0x550 mm/kasan/report.c:489\n kasan_report+0x143/0x180 mm/kasan/report.c:602\n l2cap_build_cmd net/bluetooth/l2cap_core.c:2964 [inline]\n l2cap_send_cmd+0x187/0x8d0 net/bluetooth/l2cap_core.c:954\n l2cap_sig_send_rej net/bluetooth/l2cap_core.c:5502 [inline]\n l2cap_sig_channel net/bluetooth/l2cap_core.c:5538 [inline]\n l2cap_recv_frame+0x221f/0x10db0 net/bluetooth/l2cap_core.c:6817\n hci_acldata_packet net/bluetooth/hci_core.c:3797 [inline]\n hci_rx_work+0x508/0xdb0 net/bluetooth/hci_core.c:4040\n process_one_work kernel/workqueue.c:3229 [inline]\n process_scheduled_works+0xa66/0x1840 kernel/workqueue.c:3310\n worker_thread+0x870/0xd30 kernel/workqueue.c:3391\n kthread+0x2f0/0x390 kernel/kthread.c:389\n ret_from_fork+0x4b/0x80 arch/x86/kernel/process.c:147\n ret_from_fork_asm+0x1a/0x30 arch/x86/entry/entry_64.S:244\n </TASK>\n\nAllocated by task 5837:\n kasan_save_stack mm/kasan/common.c:47 [inline]\n kasan_save_track+0x3f/0x80 mm/kasan/common.c:68\n poison_kmalloc_redzone mm/kasan/common.c:377 [inline]\n __kasan_kmalloc+0x98/0xb0 mm/kasan/common.c:394\n kasan_kmalloc include/linux/kasan.h:260 [inline]\n __kmalloc_cache_noprof+0x243/0x390 mm/slub.c:4329\n kmalloc_noprof include/linux/slab.h:901 [inline]\n kzalloc_noprof include/linux/slab.h:1037 [inline]\n l2cap_conn_add+0xa9/0x8e0 net/bluetooth/l2cap_core.c:6860\n l2cap_connect_cfm+0x115/0x1090 net/bluetooth/l2cap_core.c:7239\n hci_connect_cfm include/net/bluetooth/hci_core.h:2057 [inline]\n hci_remote_features_evt+0x68e/0xac0 net/bluetooth/hci_event.c:3726\n hci_event_func net/bluetooth/hci_event.c:7473 [inline]\n hci_event_packet+0xac2/0x1540 net/bluetooth/hci_event.c:7525\n hci_rx_work+0x3f3/0xdb0 net/bluetooth/hci_core.c:4035\n process_one_work kernel/workqueue.c:3229 [inline]\n process_scheduled_works+0xa66/0x1840 kernel/workqueue.c:3310\n worker_thread+0x870/0xd30 kernel/workqueue.c:3391\n kthread+0x2f0/0x390 kernel/kthread.c:389\n ret_from_fork+0x4b/0x80 arch/x86/kernel/process.c:147\n ret_from_fork_asm+0x1a/0x30 arch/x86/entry/entry_64.S:244\n\nFreed by task 54:\n kasan_save_stack mm/kasan/common.c:47 [inline]\n kasan_save_track+0x3f/0x80 mm/kasan/common.c:68\n kasan_save_free_info+0x40/0x50 mm/kasan/generic.c:582\n poison_slab_object mm/kasan/common.c:247 [inline]\n __kasan_slab_free+0x59/0x70 mm/kasan/common.c:264\n kasan_slab_free include/linux/kasan.h:233 [inline]\n slab_free_hook mm/slub.c:2353 [inline]\n slab_free mm/slub.c:4613 [inline]\n kfree+0x196/0x430 mm/slub.c:4761\n l2cap_connect_cfm+0xcc/0x1090 net/bluetooth/l2cap_core.c:7235\n hci_connect_cfm include/net/bluetooth/hci_core.h:2057 [inline]\n hci_conn_failed+0x287/0x400 net/bluetooth/hci_conn.c:1266\n hci_abort_conn_sync+0x56c/0x11f0 net/bluetooth/hci_sync.c:5603\n hci_cmd_sync_work+0x22b/0x400 net/bluetooth/hci_sync.c:332\n process_one_work kernel/workqueue.c:3229 [inline]\n process_scheduled_works+0xa66/0x1840 kernel/workqueue.c:3310\n worker_thread+0x870/0xd30 kernel/workqueue.c:3391\n kthread+0x2f0/0x390 kernel/kthread.c:389\n ret_from_fork+0x4b/0x80 arch/x86/kernel/process.c:147\n ret_from_fork_asm+0x1a/0x30 arch/x86/entry/entr\n---truncated---",
					"category":"description",
					"title":"Vulnerability Description"
				}
			],
			"product_status":{
				"fixed":[
					"openEuler-24.03-LTS:kernel-6.6.0-107.0.0.99.oe2403.src",
					"openEuler-24.03-LTS:bpftool-6.6.0-107.0.0.99.oe2403.aarch64",
					"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-107.0.0.99.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-6.6.0-107.0.0.99.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-107.0.0.99.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-debugsource-6.6.0-107.0.0.99.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-devel-6.6.0-107.0.0.99.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-headers-6.6.0-107.0.0.99.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-source-6.6.0-107.0.0.99.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-tools-6.6.0-107.0.0.99.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-107.0.0.99.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-107.0.0.99.oe2403.aarch64",
					"openEuler-24.03-LTS:perf-6.6.0-107.0.0.99.oe2403.aarch64",
					"openEuler-24.03-LTS:perf-debuginfo-6.6.0-107.0.0.99.oe2403.aarch64",
					"openEuler-24.03-LTS:python3-perf-6.6.0-107.0.0.99.oe2403.aarch64",
					"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-107.0.0.99.oe2403.aarch64",
					"openEuler-24.03-LTS:bpftool-6.6.0-107.0.0.99.oe2403.x86_64",
					"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-107.0.0.99.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-6.6.0-107.0.0.99.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-107.0.0.99.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-debugsource-6.6.0-107.0.0.99.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-devel-6.6.0-107.0.0.99.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-headers-6.6.0-107.0.0.99.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-source-6.6.0-107.0.0.99.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-tools-6.6.0-107.0.0.99.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-107.0.0.99.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-107.0.0.99.oe2403.x86_64",
					"openEuler-24.03-LTS:perf-6.6.0-107.0.0.99.oe2403.x86_64",
					"openEuler-24.03-LTS:perf-debuginfo-6.6.0-107.0.0.99.oe2403.x86_64",
					"openEuler-24.03-LTS:python3-perf-6.6.0-107.0.0.99.oe2403.x86_64",
					"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-107.0.0.99.oe2403.x86_64"
				]
			},
			"remediations":[
				{
					"product_ids":[
						"openEuler-24.03-LTS:kernel-6.6.0-107.0.0.99.oe2403.src",
						"openEuler-24.03-LTS:bpftool-6.6.0-107.0.0.99.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-107.0.0.99.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-6.6.0-107.0.0.99.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-107.0.0.99.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-107.0.0.99.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-107.0.0.99.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-107.0.0.99.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-107.0.0.99.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-107.0.0.99.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-107.0.0.99.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-107.0.0.99.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-6.6.0-107.0.0.99.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-107.0.0.99.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-107.0.0.99.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-107.0.0.99.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-6.6.0-107.0.0.99.oe2403.x86_64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-107.0.0.99.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-6.6.0-107.0.0.99.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-107.0.0.99.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-107.0.0.99.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-107.0.0.99.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-107.0.0.99.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-107.0.0.99.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-107.0.0.99.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-107.0.0.99.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-107.0.0.99.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-6.6.0-107.0.0.99.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-107.0.0.99.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-107.0.0.99.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-107.0.0.99.oe2403.x86_64"
					],
					"details":"kernel security update",
					"category":"vendor_fix",
					"url":"https://www.openeuler.org/zh/security/security-bulletins/detail/?id=openEuler-SA-2025-2077"
				}
			],
			"scores":[
				{
					"cvss_v3":{
						"baseSeverity":"HIGH",
						"baseScore":7.8,
						"vectorString":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
						"version":"3.1"
					},
					"products":[
						"openEuler-24.03-LTS:kernel-6.6.0-107.0.0.99.oe2403.src",
						"openEuler-24.03-LTS:bpftool-6.6.0-107.0.0.99.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-107.0.0.99.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-6.6.0-107.0.0.99.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-107.0.0.99.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-107.0.0.99.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-107.0.0.99.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-107.0.0.99.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-107.0.0.99.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-107.0.0.99.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-107.0.0.99.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-107.0.0.99.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-6.6.0-107.0.0.99.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-107.0.0.99.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-107.0.0.99.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-107.0.0.99.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-6.6.0-107.0.0.99.oe2403.x86_64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-107.0.0.99.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-6.6.0-107.0.0.99.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-107.0.0.99.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-107.0.0.99.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-107.0.0.99.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-107.0.0.99.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-107.0.0.99.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-107.0.0.99.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-107.0.0.99.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-107.0.0.99.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-6.6.0-107.0.0.99.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-107.0.0.99.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-107.0.0.99.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-107.0.0.99.oe2403.x86_64"
					]
				}
			],
			"threats":[
				{
					"details":"High",
					"category":"impact"
				}
			],
			"title":"CVE-2025-21969"
		},
		{
			"cve":"CVE-2025-22102",
			"notes":[
				{
					"text":"In the Linux kernel, the following vulnerability has been resolved:\n\nBluetooth: btnxpuart: Fix kernel panic during FW release\n\nThis fixes a kernel panic seen during release FW in a stress test\nscenario where WLAN and BT FW download occurs simultaneously, and due to\na HW bug, chip sends out only 1 bootloader signatures.\n\nWhen driver receives the bootloader signature, it enters FW download\nmode, but since no consequtive bootloader signatures seen, FW file is\nnot requested.\n\nAfter 60 seconds, when FW download times out, release_firmware causes a\nkernel panic.\n\n[ 2601.949184] Unable to handle kernel paging request at virtual address 0000312e6f006573\n[ 2601.992076] user pgtable: 4k pages, 48-bit VAs, pgdp=0000000111802000\n[ 2601.992080] [0000312e6f006573] pgd=0000000000000000, p4d=0000000000000000\n[ 2601.992087] Internal error: Oops: 0000000096000021 [#1] PREEMPT SMP\n[ 2601.992091] Modules linked in: algif_hash algif_skcipher af_alg btnxpuart(O) pciexxx(O) mlan(O) overlay fsl_jr_uio caam_jr caamkeyblob_desc caamhash_desc caamalg_desc crypto_engine authenc libdes crct10dif_ce polyval_ce snd_soc_fsl_easrc snd_soc_fsl_asoc_card imx8_media_dev(C) snd_soc_fsl_micfil polyval_generic snd_soc_fsl_xcvr snd_soc_fsl_sai snd_soc_imx_audmux snd_soc_fsl_asrc snd_soc_imx_card snd_soc_imx_hdmi snd_soc_fsl_aud2htx snd_soc_fsl_utils imx_pcm_dma dw_hdmi_cec flexcan can_dev\n[ 2602.001825] CPU: 2 PID: 20060 Comm: hciconfig Tainted: G         C O       6.6.23-lts-next-06236-gb586a521770e #1\n[ 2602.010182] Hardware name: NXP i.MX8MPlus EVK board (DT)\n[ 2602.010185] pstate: 60000005 (nZCv daif -PAN -UAO -TCO -DIT -SSBS BTYPE=--)\n[ 2602.010191] pc : _raw_spin_lock+0x34/0x68\n[ 2602.010201] lr : free_fw_priv+0x20/0xfc\n[ 2602.020561] sp : ffff800089363b30\n[ 2602.020563] x29: ffff800089363b30 x28: ffff0000d0eb5880 x27: 0000000000000000\n[ 2602.020570] x26: 0000000000000000 x25: ffff0000d728b330 x24: 0000000000000000\n[ 2602.020577] x23: ffff0000dc856f38\n[ 2602.033797] x22: ffff800089363b70 x21: ffff0000dc856000\n[ 2602.033802] x20: ff00312e6f006573 x19: ffff0000d0d9ea80 x18: 0000000000000000\n[ 2602.033809] x17: 0000000000000000 x16: 0000000000000000 x15: 0000aaaad80dd480\n[ 2602.083320] x14: 0000000000000000 x13: 00000000000001b9 x12: 0000000000000002\n[ 2602.083326] x11: 0000000000000000 x10: 0000000000000a60 x9 : ffff800089363a30\n[ 2602.083333] x8 : ffff0001793d75c0 x7 : ffff0000d6dbc400 x6 : 0000000000000000\n[ 2602.083339] x5 : 00000000410fd030 x4 : 0000000000000000 x3 : 0000000000000001\n[ 2602.083346] x2 : 0000000000000000 x1 : 0000000000000001 x0 : ff00312e6f006573\n[ 2602.083354] Call trace:\n[ 2602.083356]  _raw_spin_lock+0x34/0x68\n[ 2602.083364]  release_firmware+0x48/0x6c\n[ 2602.083370]  nxp_setup+0x3c4/0x540 [btnxpuart]\n[ 2602.083383]  hci_dev_open_sync+0xf0/0xa34\n[ 2602.083391]  hci_dev_open+0xd8/0x178\n[ 2602.083399]  hci_sock_ioctl+0x3b0/0x590\n[ 2602.083405]  sock_do_ioctl+0x60/0x118\n[ 2602.083413]  sock_ioctl+0x2f4/0x374\n[ 2602.091430]  __arm64_sys_ioctl+0xac/0xf0\n[ 2602.091437]  invoke_syscall+0x48/0x110\n[ 2602.091445]  el0_svc_common.constprop.0+0xc0/0xe0\n[ 2602.091452]  do_el0_svc+0x1c/0x28\n[ 2602.091457]  el0_svc+0x40/0xe4\n[ 2602.091465]  el0t_64_sync_handler+0x120/0x12c\n[ 2602.091470]  el0t_64_sync+0x190/0x194",
					"category":"description",
					"title":"Vulnerability Description"
				}
			],
			"product_status":{
				"fixed":[
					"openEuler-24.03-LTS:kernel-6.6.0-107.0.0.99.oe2403.src",
					"openEuler-24.03-LTS:bpftool-6.6.0-107.0.0.99.oe2403.aarch64",
					"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-107.0.0.99.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-6.6.0-107.0.0.99.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-107.0.0.99.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-debugsource-6.6.0-107.0.0.99.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-devel-6.6.0-107.0.0.99.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-headers-6.6.0-107.0.0.99.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-source-6.6.0-107.0.0.99.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-tools-6.6.0-107.0.0.99.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-107.0.0.99.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-107.0.0.99.oe2403.aarch64",
					"openEuler-24.03-LTS:perf-6.6.0-107.0.0.99.oe2403.aarch64",
					"openEuler-24.03-LTS:perf-debuginfo-6.6.0-107.0.0.99.oe2403.aarch64",
					"openEuler-24.03-LTS:python3-perf-6.6.0-107.0.0.99.oe2403.aarch64",
					"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-107.0.0.99.oe2403.aarch64",
					"openEuler-24.03-LTS:bpftool-6.6.0-107.0.0.99.oe2403.x86_64",
					"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-107.0.0.99.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-6.6.0-107.0.0.99.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-107.0.0.99.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-debugsource-6.6.0-107.0.0.99.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-devel-6.6.0-107.0.0.99.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-headers-6.6.0-107.0.0.99.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-source-6.6.0-107.0.0.99.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-tools-6.6.0-107.0.0.99.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-107.0.0.99.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-107.0.0.99.oe2403.x86_64",
					"openEuler-24.03-LTS:perf-6.6.0-107.0.0.99.oe2403.x86_64",
					"openEuler-24.03-LTS:perf-debuginfo-6.6.0-107.0.0.99.oe2403.x86_64",
					"openEuler-24.03-LTS:python3-perf-6.6.0-107.0.0.99.oe2403.x86_64",
					"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-107.0.0.99.oe2403.x86_64"
				]
			},
			"remediations":[
				{
					"product_ids":[
						"openEuler-24.03-LTS:kernel-6.6.0-107.0.0.99.oe2403.src",
						"openEuler-24.03-LTS:bpftool-6.6.0-107.0.0.99.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-107.0.0.99.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-6.6.0-107.0.0.99.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-107.0.0.99.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-107.0.0.99.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-107.0.0.99.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-107.0.0.99.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-107.0.0.99.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-107.0.0.99.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-107.0.0.99.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-107.0.0.99.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-6.6.0-107.0.0.99.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-107.0.0.99.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-107.0.0.99.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-107.0.0.99.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-6.6.0-107.0.0.99.oe2403.x86_64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-107.0.0.99.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-6.6.0-107.0.0.99.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-107.0.0.99.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-107.0.0.99.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-107.0.0.99.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-107.0.0.99.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-107.0.0.99.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-107.0.0.99.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-107.0.0.99.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-107.0.0.99.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-6.6.0-107.0.0.99.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-107.0.0.99.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-107.0.0.99.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-107.0.0.99.oe2403.x86_64"
					],
					"details":"kernel security update",
					"category":"vendor_fix",
					"url":"https://www.openeuler.org/zh/security/security-bulletins/detail/?id=openEuler-SA-2025-2077"
				}
			],
			"scores":[
				{
					"cvss_v3":{
						"baseSeverity":"MEDIUM",
						"baseScore":4.8,
						"vectorString":"CVSS:3.1/AV:A/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H",
						"version":"3.1"
					},
					"products":[
						"openEuler-24.03-LTS:kernel-6.6.0-107.0.0.99.oe2403.src",
						"openEuler-24.03-LTS:bpftool-6.6.0-107.0.0.99.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-107.0.0.99.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-6.6.0-107.0.0.99.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-107.0.0.99.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-107.0.0.99.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-107.0.0.99.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-107.0.0.99.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-107.0.0.99.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-107.0.0.99.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-107.0.0.99.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-107.0.0.99.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-6.6.0-107.0.0.99.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-107.0.0.99.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-107.0.0.99.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-107.0.0.99.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-6.6.0-107.0.0.99.oe2403.x86_64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-107.0.0.99.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-6.6.0-107.0.0.99.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-107.0.0.99.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-107.0.0.99.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-107.0.0.99.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-107.0.0.99.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-107.0.0.99.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-107.0.0.99.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-107.0.0.99.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-107.0.0.99.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-6.6.0-107.0.0.99.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-107.0.0.99.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-107.0.0.99.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-107.0.0.99.oe2403.x86_64"
					]
				}
			],
			"threats":[
				{
					"details":"Medium",
					"category":"impact"
				}
			],
			"title":"CVE-2025-22102"
		},
		{
			"cve":"CVE-2025-22105",
			"notes":[
				{
					"text":"In the Linux kernel, the following vulnerability has been resolved:\n\nbonding: check xdp prog when set bond mode\n\nFollowing operations can trigger a warning[1]:\n\n    ip netns add ns1\n    ip netns exec ns1 ip link add bond0 type bond mode balance-rr\n    ip netns exec ns1 ip link set dev bond0 xdp obj af_xdp_kern.o sec xdp\n    ip netns exec ns1 ip link set bond0 type bond mode broadcast\n    ip netns del ns1\n\nWhen delete the namespace, dev_xdp_uninstall() is called to remove xdp\nprogram on bond dev, and bond_xdp_set() will check the bond mode. If bond\nmode is changed after attaching xdp program, the warning may occur.\n\nSome bond modes (broadcast, etc.) do not support native xdp. Set bond mode\nwith xdp program attached is not good. Add check for xdp program when set\nbond mode.\n\n    [1]\n    ------------[ cut here ]------------\n    WARNING: CPU: 0 PID: 11 at net/core/dev.c:9912 unregister_netdevice_many_notify+0x8d9/0x930\n    Modules linked in:\n    CPU: 0 UID: 0 PID: 11 Comm: kworker/u4:0 Not tainted 6.14.0-rc4 #107\n    Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS rel-1.15.0-0-g2dd4b9b3f840-prebuilt.qemu.org 04/01/2014\n    Workqueue: netns cleanup_net\n    RIP: 0010:unregister_netdevice_many_notify+0x8d9/0x930\n    Code: 00 00 48 c7 c6 6f e3 a2 82 48 c7 c7 d0 b3 96 82 e8 9c 10 3e ...\n    RSP: 0018:ffffc90000063d80 EFLAGS: 00000282\n    RAX: 00000000ffffffa1 RBX: ffff888004959000 RCX: 00000000ffffdfff\n    RDX: 0000000000000000 RSI: 00000000ffffffea RDI: ffffc90000063b48\n    RBP: ffffc90000063e28 R08: ffffffff82d39b28 R09: 0000000000009ffb\n    R10: 0000000000000175 R11: ffffffff82d09b40 R12: ffff8880049598e8\n    R13: 0000000000000001 R14: dead000000000100 R15: ffffc90000045000\n    FS:  0000000000000000(0000) GS:ffff888007a00000(0000) knlGS:0000000000000000\n    CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033\n    CR2: 000000000d406b60 CR3: 000000000483e000 CR4: 00000000000006f0\n    Call Trace:\n     <TASK>\n     ? __warn+0x83/0x130\n     ? unregister_netdevice_many_notify+0x8d9/0x930\n     ? report_bug+0x18e/0x1a0\n     ? handle_bug+0x54/0x90\n     ? exc_invalid_op+0x18/0x70\n     ? asm_exc_invalid_op+0x1a/0x20\n     ? unregister_netdevice_many_notify+0x8d9/0x930\n     ? bond_net_exit_batch_rtnl+0x5c/0x90\n     cleanup_net+0x237/0x3d0\n     process_one_work+0x163/0x390\n     worker_thread+0x293/0x3b0\n     ? __pfx_worker_thread+0x10/0x10\n     kthread+0xec/0x1e0\n     ? __pfx_kthread+0x10/0x10\n     ? __pfx_kthread+0x10/0x10\n     ret_from_fork+0x2f/0x50\n     ? __pfx_kthread+0x10/0x10\n     ret_from_fork_asm+0x1a/0x30\n     </TASK>\n    ---[ end trace 0000000000000000 ]---",
					"category":"description",
					"title":"Vulnerability Description"
				}
			],
			"product_status":{
				"fixed":[
					"openEuler-24.03-LTS:kernel-6.6.0-107.0.0.99.oe2403.src",
					"openEuler-24.03-LTS:bpftool-6.6.0-107.0.0.99.oe2403.aarch64",
					"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-107.0.0.99.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-6.6.0-107.0.0.99.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-107.0.0.99.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-debugsource-6.6.0-107.0.0.99.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-devel-6.6.0-107.0.0.99.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-headers-6.6.0-107.0.0.99.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-source-6.6.0-107.0.0.99.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-tools-6.6.0-107.0.0.99.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-107.0.0.99.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-107.0.0.99.oe2403.aarch64",
					"openEuler-24.03-LTS:perf-6.6.0-107.0.0.99.oe2403.aarch64",
					"openEuler-24.03-LTS:perf-debuginfo-6.6.0-107.0.0.99.oe2403.aarch64",
					"openEuler-24.03-LTS:python3-perf-6.6.0-107.0.0.99.oe2403.aarch64",
					"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-107.0.0.99.oe2403.aarch64",
					"openEuler-24.03-LTS:bpftool-6.6.0-107.0.0.99.oe2403.x86_64",
					"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-107.0.0.99.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-6.6.0-107.0.0.99.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-107.0.0.99.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-debugsource-6.6.0-107.0.0.99.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-devel-6.6.0-107.0.0.99.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-headers-6.6.0-107.0.0.99.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-source-6.6.0-107.0.0.99.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-tools-6.6.0-107.0.0.99.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-107.0.0.99.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-107.0.0.99.oe2403.x86_64",
					"openEuler-24.03-LTS:perf-6.6.0-107.0.0.99.oe2403.x86_64",
					"openEuler-24.03-LTS:perf-debuginfo-6.6.0-107.0.0.99.oe2403.x86_64",
					"openEuler-24.03-LTS:python3-perf-6.6.0-107.0.0.99.oe2403.x86_64",
					"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-107.0.0.99.oe2403.x86_64"
				]
			},
			"remediations":[
				{
					"product_ids":[
						"openEuler-24.03-LTS:kernel-6.6.0-107.0.0.99.oe2403.src",
						"openEuler-24.03-LTS:bpftool-6.6.0-107.0.0.99.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-107.0.0.99.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-6.6.0-107.0.0.99.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-107.0.0.99.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-107.0.0.99.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-107.0.0.99.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-107.0.0.99.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-107.0.0.99.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-107.0.0.99.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-107.0.0.99.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-107.0.0.99.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-6.6.0-107.0.0.99.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-107.0.0.99.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-107.0.0.99.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-107.0.0.99.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-6.6.0-107.0.0.99.oe2403.x86_64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-107.0.0.99.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-6.6.0-107.0.0.99.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-107.0.0.99.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-107.0.0.99.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-107.0.0.99.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-107.0.0.99.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-107.0.0.99.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-107.0.0.99.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-107.0.0.99.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-107.0.0.99.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-6.6.0-107.0.0.99.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-107.0.0.99.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-107.0.0.99.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-107.0.0.99.oe2403.x86_64"
					],
					"details":"kernel security update",
					"category":"vendor_fix",
					"url":"https://www.openeuler.org/zh/security/security-bulletins/detail/?id=openEuler-SA-2025-2077"
				}
			],
			"scores":[
				{
					"cvss_v3":{
						"baseSeverity":"LOW",
						"baseScore":2.6,
						"vectorString":"CVSS:3.1/AV:A/AC:H/PR:L/UI:N/S:U/C:L/I:N/A:N",
						"version":"3.1"
					},
					"products":[
						"openEuler-24.03-LTS:kernel-6.6.0-107.0.0.99.oe2403.src",
						"openEuler-24.03-LTS:bpftool-6.6.0-107.0.0.99.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-107.0.0.99.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-6.6.0-107.0.0.99.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-107.0.0.99.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-107.0.0.99.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-107.0.0.99.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-107.0.0.99.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-107.0.0.99.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-107.0.0.99.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-107.0.0.99.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-107.0.0.99.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-6.6.0-107.0.0.99.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-107.0.0.99.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-107.0.0.99.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-107.0.0.99.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-6.6.0-107.0.0.99.oe2403.x86_64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-107.0.0.99.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-6.6.0-107.0.0.99.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-107.0.0.99.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-107.0.0.99.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-107.0.0.99.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-107.0.0.99.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-107.0.0.99.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-107.0.0.99.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-107.0.0.99.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-107.0.0.99.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-6.6.0-107.0.0.99.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-107.0.0.99.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-107.0.0.99.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-107.0.0.99.oe2403.x86_64"
					]
				}
			],
			"threats":[
				{
					"details":"Low",
					"category":"impact"
				}
			],
			"title":"CVE-2025-22105"
		},
		{
			"cve":"CVE-2025-37767",
			"notes":[
				{
					"text":"In the Linux kernel, the following vulnerability has been resolved:\n\ndrm/amd/pm: Prevent division by zero\n\nThe user can set any speed value.\nIf speed is greater than UINT_MAX/8, division by zero is possible.\n\nFound by Linux Verification Center (linuxtesting.org) with SVACE.",
					"category":"description",
					"title":"Vulnerability Description"
				}
			],
			"product_status":{
				"fixed":[
					"openEuler-24.03-LTS:kernel-6.6.0-107.0.0.99.oe2403.src",
					"openEuler-24.03-LTS:bpftool-6.6.0-107.0.0.99.oe2403.aarch64",
					"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-107.0.0.99.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-6.6.0-107.0.0.99.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-107.0.0.99.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-debugsource-6.6.0-107.0.0.99.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-devel-6.6.0-107.0.0.99.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-headers-6.6.0-107.0.0.99.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-source-6.6.0-107.0.0.99.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-tools-6.6.0-107.0.0.99.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-107.0.0.99.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-107.0.0.99.oe2403.aarch64",
					"openEuler-24.03-LTS:perf-6.6.0-107.0.0.99.oe2403.aarch64",
					"openEuler-24.03-LTS:perf-debuginfo-6.6.0-107.0.0.99.oe2403.aarch64",
					"openEuler-24.03-LTS:python3-perf-6.6.0-107.0.0.99.oe2403.aarch64",
					"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-107.0.0.99.oe2403.aarch64",
					"openEuler-24.03-LTS:bpftool-6.6.0-107.0.0.99.oe2403.x86_64",
					"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-107.0.0.99.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-6.6.0-107.0.0.99.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-107.0.0.99.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-debugsource-6.6.0-107.0.0.99.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-devel-6.6.0-107.0.0.99.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-headers-6.6.0-107.0.0.99.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-source-6.6.0-107.0.0.99.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-tools-6.6.0-107.0.0.99.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-107.0.0.99.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-107.0.0.99.oe2403.x86_64",
					"openEuler-24.03-LTS:perf-6.6.0-107.0.0.99.oe2403.x86_64",
					"openEuler-24.03-LTS:perf-debuginfo-6.6.0-107.0.0.99.oe2403.x86_64",
					"openEuler-24.03-LTS:python3-perf-6.6.0-107.0.0.99.oe2403.x86_64",
					"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-107.0.0.99.oe2403.x86_64"
				]
			},
			"remediations":[
				{
					"product_ids":[
						"openEuler-24.03-LTS:kernel-6.6.0-107.0.0.99.oe2403.src",
						"openEuler-24.03-LTS:bpftool-6.6.0-107.0.0.99.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-107.0.0.99.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-6.6.0-107.0.0.99.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-107.0.0.99.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-107.0.0.99.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-107.0.0.99.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-107.0.0.99.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-107.0.0.99.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-107.0.0.99.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-107.0.0.99.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-107.0.0.99.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-6.6.0-107.0.0.99.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-107.0.0.99.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-107.0.0.99.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-107.0.0.99.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-6.6.0-107.0.0.99.oe2403.x86_64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-107.0.0.99.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-6.6.0-107.0.0.99.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-107.0.0.99.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-107.0.0.99.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-107.0.0.99.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-107.0.0.99.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-107.0.0.99.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-107.0.0.99.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-107.0.0.99.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-107.0.0.99.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-6.6.0-107.0.0.99.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-107.0.0.99.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-107.0.0.99.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-107.0.0.99.oe2403.x86_64"
					],
					"details":"kernel security update",
					"category":"vendor_fix",
					"url":"https://www.openeuler.org/zh/security/security-bulletins/detail/?id=openEuler-SA-2025-2077"
				}
			],
			"scores":[
				{
					"cvss_v3":{
						"baseSeverity":"LOW",
						"baseScore":3.9,
						"vectorString":"CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:L/I:L/A:L",
						"version":"3.1"
					},
					"products":[
						"openEuler-24.03-LTS:kernel-6.6.0-107.0.0.99.oe2403.src",
						"openEuler-24.03-LTS:bpftool-6.6.0-107.0.0.99.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-107.0.0.99.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-6.6.0-107.0.0.99.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-107.0.0.99.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-107.0.0.99.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-107.0.0.99.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-107.0.0.99.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-107.0.0.99.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-107.0.0.99.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-107.0.0.99.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-107.0.0.99.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-6.6.0-107.0.0.99.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-107.0.0.99.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-107.0.0.99.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-107.0.0.99.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-6.6.0-107.0.0.99.oe2403.x86_64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-107.0.0.99.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-6.6.0-107.0.0.99.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-107.0.0.99.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-107.0.0.99.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-107.0.0.99.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-107.0.0.99.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-107.0.0.99.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-107.0.0.99.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-107.0.0.99.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-107.0.0.99.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-6.6.0-107.0.0.99.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-107.0.0.99.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-107.0.0.99.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-107.0.0.99.oe2403.x86_64"
					]
				}
			],
			"threats":[
				{
					"details":"Low",
					"category":"impact"
				}
			],
			"title":"CVE-2025-37767"
		},
		{
			"cve":"CVE-2025-37780",
			"notes":[
				{
					"text":"In the Linux kernel, the following vulnerability has been resolved:\n\nisofs: Prevent the use of too small fid\n\nsyzbot reported a slab-out-of-bounds Read in isofs_fh_to_parent. [1]\n\nThe handle_bytes value passed in by the reproducing program is equal to 12.\nIn handle_to_path(), only 12 bytes of memory are allocated for the structure\nfile_handle->f_handle member, which causes an out-of-bounds access when\naccessing the member parent_block of the structure isofs_fid in isofs,\nbecause accessing parent_block requires at least 16 bytes of f_handle.\nHere, fh_len is used to indirectly confirm that the value of handle_bytes\nis greater than 3 before accessing parent_block.\n\n[1]\nBUG: KASAN: slab-out-of-bounds in isofs_fh_to_parent+0x1b8/0x210 fs/isofs/export.c:183\nRead of size 4 at addr ffff0000cc030d94 by task syz-executor215/6466\nCPU: 1 UID: 0 PID: 6466 Comm: syz-executor215 Not tainted 6.14.0-rc7-syzkaller-ga2392f333575 #0\nHardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2025\nCall trace:\n show_stack+0x2c/0x3c arch/arm64/kernel/stacktrace.c:466 (C)\n __dump_stack lib/dump_stack.c:94 [inline]\n dump_stack_lvl+0xe4/0x150 lib/dump_stack.c:120\n print_address_description mm/kasan/report.c:408 [inline]\n print_report+0x198/0x550 mm/kasan/report.c:521\n kasan_report+0xd8/0x138 mm/kasan/report.c:634\n __asan_report_load4_noabort+0x20/0x2c mm/kasan/report_generic.c:380\n isofs_fh_to_parent+0x1b8/0x210 fs/isofs/export.c:183\n exportfs_decode_fh_raw+0x2dc/0x608 fs/exportfs/expfs.c:523\n do_handle_to_path+0xa0/0x198 fs/fhandle.c:257\n handle_to_path fs/fhandle.c:385 [inline]\n do_handle_open+0x8cc/0xb8c fs/fhandle.c:403\n __do_sys_open_by_handle_at fs/fhandle.c:443 [inline]\n __se_sys_open_by_handle_at fs/fhandle.c:434 [inline]\n __arm64_sys_open_by_handle_at+0x80/0x94 fs/fhandle.c:434\n __invoke_syscall arch/arm64/kernel/syscall.c:35 [inline]\n invoke_syscall+0x98/0x2b8 arch/arm64/kernel/syscall.c:49\n el0_svc_common+0x130/0x23c arch/arm64/kernel/syscall.c:132\n do_el0_svc+0x48/0x58 arch/arm64/kernel/syscall.c:151\n el0_svc+0x54/0x168 arch/arm64/kernel/entry-common.c:744\n el0t_64_sync_handler+0x84/0x108 arch/arm64/kernel/entry-common.c:762\n el0t_64_sync+0x198/0x19c arch/arm64/kernel/entry.S:600\n\nAllocated by task 6466:\n kasan_save_stack mm/kasan/common.c:47 [inline]\n kasan_save_track+0x40/0x78 mm/kasan/common.c:68\n kasan_save_alloc_info+0x40/0x50 mm/kasan/generic.c:562\n poison_kmalloc_redzone mm/kasan/common.c:377 [inline]\n __kasan_kmalloc+0xac/0xc4 mm/kasan/common.c:394\n kasan_kmalloc include/linux/kasan.h:260 [inline]\n __do_kmalloc_node mm/slub.c:4294 [inline]\n __kmalloc_noprof+0x32c/0x54c mm/slub.c:4306\n kmalloc_noprof include/linux/slab.h:905 [inline]\n handle_to_path fs/fhandle.c:357 [inline]\n do_handle_open+0x5a4/0xb8c fs/fhandle.c:403\n __do_sys_open_by_handle_at fs/fhandle.c:443 [inline]\n __se_sys_open_by_handle_at fs/fhandle.c:434 [inline]\n __arm64_sys_open_by_handle_at+0x80/0x94 fs/fhandle.c:434\n __invoke_syscall arch/arm64/kernel/syscall.c:35 [inline]\n invoke_syscall+0x98/0x2b8 arch/arm64/kernel/syscall.c:49\n el0_svc_common+0x130/0x23c arch/arm64/kernel/syscall.c:132\n do_el0_svc+0x48/0x58 arch/arm64/kernel/syscall.c:151\n el0_svc+0x54/0x168 arch/arm64/kernel/entry-common.c:744\n el0t_64_sync_handler+0x84/0x108 arch/arm64/kernel/entry-common.c:762\n el0t_64_sync+0x198/0x19c arch/arm64/kernel/entry.S:600",
					"category":"description",
					"title":"Vulnerability Description"
				}
			],
			"product_status":{
				"fixed":[
					"openEuler-24.03-LTS:kernel-6.6.0-107.0.0.99.oe2403.src",
					"openEuler-24.03-LTS:bpftool-6.6.0-107.0.0.99.oe2403.aarch64",
					"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-107.0.0.99.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-6.6.0-107.0.0.99.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-107.0.0.99.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-debugsource-6.6.0-107.0.0.99.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-devel-6.6.0-107.0.0.99.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-headers-6.6.0-107.0.0.99.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-source-6.6.0-107.0.0.99.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-tools-6.6.0-107.0.0.99.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-107.0.0.99.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-107.0.0.99.oe2403.aarch64",
					"openEuler-24.03-LTS:perf-6.6.0-107.0.0.99.oe2403.aarch64",
					"openEuler-24.03-LTS:perf-debuginfo-6.6.0-107.0.0.99.oe2403.aarch64",
					"openEuler-24.03-LTS:python3-perf-6.6.0-107.0.0.99.oe2403.aarch64",
					"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-107.0.0.99.oe2403.aarch64",
					"openEuler-24.03-LTS:bpftool-6.6.0-107.0.0.99.oe2403.x86_64",
					"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-107.0.0.99.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-6.6.0-107.0.0.99.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-107.0.0.99.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-debugsource-6.6.0-107.0.0.99.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-devel-6.6.0-107.0.0.99.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-headers-6.6.0-107.0.0.99.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-source-6.6.0-107.0.0.99.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-tools-6.6.0-107.0.0.99.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-107.0.0.99.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-107.0.0.99.oe2403.x86_64",
					"openEuler-24.03-LTS:perf-6.6.0-107.0.0.99.oe2403.x86_64",
					"openEuler-24.03-LTS:perf-debuginfo-6.6.0-107.0.0.99.oe2403.x86_64",
					"openEuler-24.03-LTS:python3-perf-6.6.0-107.0.0.99.oe2403.x86_64",
					"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-107.0.0.99.oe2403.x86_64"
				]
			},
			"remediations":[
				{
					"product_ids":[
						"openEuler-24.03-LTS:kernel-6.6.0-107.0.0.99.oe2403.src",
						"openEuler-24.03-LTS:bpftool-6.6.0-107.0.0.99.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-107.0.0.99.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-6.6.0-107.0.0.99.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-107.0.0.99.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-107.0.0.99.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-107.0.0.99.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-107.0.0.99.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-107.0.0.99.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-107.0.0.99.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-107.0.0.99.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-107.0.0.99.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-6.6.0-107.0.0.99.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-107.0.0.99.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-107.0.0.99.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-107.0.0.99.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-6.6.0-107.0.0.99.oe2403.x86_64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-107.0.0.99.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-6.6.0-107.0.0.99.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-107.0.0.99.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-107.0.0.99.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-107.0.0.99.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-107.0.0.99.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-107.0.0.99.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-107.0.0.99.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-107.0.0.99.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-107.0.0.99.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-6.6.0-107.0.0.99.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-107.0.0.99.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-107.0.0.99.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-107.0.0.99.oe2403.x86_64"
					],
					"details":"kernel security update",
					"category":"vendor_fix",
					"url":"https://www.openeuler.org/zh/security/security-bulletins/detail/?id=openEuler-SA-2025-2077"
				}
			],
			"scores":[
				{
					"cvss_v3":{
						"baseSeverity":"LOW",
						"baseScore":3.9,
						"vectorString":"CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:L/I:L/A:L",
						"version":"3.1"
					},
					"products":[
						"openEuler-24.03-LTS:kernel-6.6.0-107.0.0.99.oe2403.src",
						"openEuler-24.03-LTS:bpftool-6.6.0-107.0.0.99.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-107.0.0.99.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-6.6.0-107.0.0.99.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-107.0.0.99.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-107.0.0.99.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-107.0.0.99.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-107.0.0.99.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-107.0.0.99.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-107.0.0.99.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-107.0.0.99.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-107.0.0.99.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-6.6.0-107.0.0.99.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-107.0.0.99.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-107.0.0.99.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-107.0.0.99.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-6.6.0-107.0.0.99.oe2403.x86_64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-107.0.0.99.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-6.6.0-107.0.0.99.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-107.0.0.99.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-107.0.0.99.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-107.0.0.99.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-107.0.0.99.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-107.0.0.99.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-107.0.0.99.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-107.0.0.99.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-107.0.0.99.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-6.6.0-107.0.0.99.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-107.0.0.99.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-107.0.0.99.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-107.0.0.99.oe2403.x86_64"
					]
				}
			],
			"threats":[
				{
					"details":"Low",
					"category":"impact"
				}
			],
			"title":"CVE-2025-37780"
		},
		{
			"cve":"CVE-2025-37801",
			"notes":[
				{
					"text":"In the Linux kernel, the following vulnerability has been resolved:\n\nspi: spi-imx: Add check for spi_imx_setupxfer()\n\nAdd check for the return value of spi_imx_setupxfer().\nspi_imx->rx and spi_imx->tx function pointer can be NULL when\nspi_imx_setupxfer() return error, and make NULL pointer dereference.\n\n Unable to handle kernel NULL pointer dereference at virtual address 0000000000000000\n Call trace:\n  0x0\n  spi_imx_pio_transfer+0x50/0xd8\n  spi_imx_transfer_one+0x18c/0x858\n  spi_transfer_one_message+0x43c/0x790\n  __spi_pump_transfer_message+0x238/0x5d4\n  __spi_sync+0x2b0/0x454\n  spi_write_then_read+0x11c/0x200",
					"category":"description",
					"title":"Vulnerability Description"
				}
			],
			"product_status":{
				"fixed":[
					"openEuler-24.03-LTS:kernel-6.6.0-107.0.0.99.oe2403.src",
					"openEuler-24.03-LTS:bpftool-6.6.0-107.0.0.99.oe2403.aarch64",
					"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-107.0.0.99.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-6.6.0-107.0.0.99.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-107.0.0.99.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-debugsource-6.6.0-107.0.0.99.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-devel-6.6.0-107.0.0.99.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-headers-6.6.0-107.0.0.99.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-source-6.6.0-107.0.0.99.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-tools-6.6.0-107.0.0.99.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-107.0.0.99.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-107.0.0.99.oe2403.aarch64",
					"openEuler-24.03-LTS:perf-6.6.0-107.0.0.99.oe2403.aarch64",
					"openEuler-24.03-LTS:perf-debuginfo-6.6.0-107.0.0.99.oe2403.aarch64",
					"openEuler-24.03-LTS:python3-perf-6.6.0-107.0.0.99.oe2403.aarch64",
					"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-107.0.0.99.oe2403.aarch64",
					"openEuler-24.03-LTS:bpftool-6.6.0-107.0.0.99.oe2403.x86_64",
					"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-107.0.0.99.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-6.6.0-107.0.0.99.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-107.0.0.99.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-debugsource-6.6.0-107.0.0.99.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-devel-6.6.0-107.0.0.99.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-headers-6.6.0-107.0.0.99.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-source-6.6.0-107.0.0.99.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-tools-6.6.0-107.0.0.99.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-107.0.0.99.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-107.0.0.99.oe2403.x86_64",
					"openEuler-24.03-LTS:perf-6.6.0-107.0.0.99.oe2403.x86_64",
					"openEuler-24.03-LTS:perf-debuginfo-6.6.0-107.0.0.99.oe2403.x86_64",
					"openEuler-24.03-LTS:python3-perf-6.6.0-107.0.0.99.oe2403.x86_64",
					"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-107.0.0.99.oe2403.x86_64"
				]
			},
			"remediations":[
				{
					"product_ids":[
						"openEuler-24.03-LTS:kernel-6.6.0-107.0.0.99.oe2403.src",
						"openEuler-24.03-LTS:bpftool-6.6.0-107.0.0.99.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-107.0.0.99.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-6.6.0-107.0.0.99.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-107.0.0.99.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-107.0.0.99.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-107.0.0.99.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-107.0.0.99.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-107.0.0.99.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-107.0.0.99.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-107.0.0.99.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-107.0.0.99.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-6.6.0-107.0.0.99.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-107.0.0.99.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-107.0.0.99.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-107.0.0.99.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-6.6.0-107.0.0.99.oe2403.x86_64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-107.0.0.99.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-6.6.0-107.0.0.99.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-107.0.0.99.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-107.0.0.99.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-107.0.0.99.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-107.0.0.99.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-107.0.0.99.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-107.0.0.99.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-107.0.0.99.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-107.0.0.99.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-6.6.0-107.0.0.99.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-107.0.0.99.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-107.0.0.99.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-107.0.0.99.oe2403.x86_64"
					],
					"details":"kernel security update",
					"category":"vendor_fix",
					"url":"https://www.openeuler.org/zh/security/security-bulletins/detail/?id=openEuler-SA-2025-2077"
				}
			],
			"scores":[
				{
					"cvss_v3":{
						"baseSeverity":"MEDIUM",
						"baseScore":5.5,
						"vectorString":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
						"version":"3.1"
					},
					"products":[
						"openEuler-24.03-LTS:kernel-6.6.0-107.0.0.99.oe2403.src",
						"openEuler-24.03-LTS:bpftool-6.6.0-107.0.0.99.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-107.0.0.99.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-6.6.0-107.0.0.99.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-107.0.0.99.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-107.0.0.99.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-107.0.0.99.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-107.0.0.99.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-107.0.0.99.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-107.0.0.99.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-107.0.0.99.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-107.0.0.99.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-6.6.0-107.0.0.99.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-107.0.0.99.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-107.0.0.99.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-107.0.0.99.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-6.6.0-107.0.0.99.oe2403.x86_64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-107.0.0.99.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-6.6.0-107.0.0.99.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-107.0.0.99.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-107.0.0.99.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-107.0.0.99.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-107.0.0.99.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-107.0.0.99.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-107.0.0.99.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-107.0.0.99.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-107.0.0.99.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-6.6.0-107.0.0.99.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-107.0.0.99.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-107.0.0.99.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-107.0.0.99.oe2403.x86_64"
					]
				}
			],
			"threats":[
				{
					"details":"Medium",
					"category":"impact"
				}
			],
			"title":"CVE-2025-37801"
		},
		{
			"cve":"CVE-2025-37813",
			"notes":[
				{
					"text":"In the Linux kernel, the following vulnerability has been resolved:\n\nusb: xhci: Fix invalid pointer dereference in Etron workaround\n\nThis check is performed before prepare_transfer() and prepare_ring(), so\nenqueue can already point at the final link TRB of a segment. And indeed\nit will, some 0.4% of times this code is called.\n\nThen enqueue + 1 is an invalid pointer. It will crash the kernel right\naway or load some junk which may look like a link TRB and cause the real\nlink TRB to be replaced with a NOOP. This wouldn't end well.\n\nUse a functionally equivalent test which doesn't dereference the pointer\nand always gives correct result.\n\nSomething has crashed my machine twice in recent days while playing with\nan Etron HC, and a control transfer stress test ran for confirmation has\njust crashed it again. The same test passes with this patch applied.",
					"category":"description",
					"title":"Vulnerability Description"
				}
			],
			"product_status":{
				"fixed":[
					"openEuler-24.03-LTS:kernel-6.6.0-107.0.0.99.oe2403.src",
					"openEuler-24.03-LTS:bpftool-6.6.0-107.0.0.99.oe2403.aarch64",
					"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-107.0.0.99.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-6.6.0-107.0.0.99.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-107.0.0.99.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-debugsource-6.6.0-107.0.0.99.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-devel-6.6.0-107.0.0.99.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-headers-6.6.0-107.0.0.99.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-source-6.6.0-107.0.0.99.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-tools-6.6.0-107.0.0.99.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-107.0.0.99.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-107.0.0.99.oe2403.aarch64",
					"openEuler-24.03-LTS:perf-6.6.0-107.0.0.99.oe2403.aarch64",
					"openEuler-24.03-LTS:perf-debuginfo-6.6.0-107.0.0.99.oe2403.aarch64",
					"openEuler-24.03-LTS:python3-perf-6.6.0-107.0.0.99.oe2403.aarch64",
					"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-107.0.0.99.oe2403.aarch64",
					"openEuler-24.03-LTS:bpftool-6.6.0-107.0.0.99.oe2403.x86_64",
					"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-107.0.0.99.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-6.6.0-107.0.0.99.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-107.0.0.99.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-debugsource-6.6.0-107.0.0.99.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-devel-6.6.0-107.0.0.99.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-headers-6.6.0-107.0.0.99.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-source-6.6.0-107.0.0.99.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-tools-6.6.0-107.0.0.99.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-107.0.0.99.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-107.0.0.99.oe2403.x86_64",
					"openEuler-24.03-LTS:perf-6.6.0-107.0.0.99.oe2403.x86_64",
					"openEuler-24.03-LTS:perf-debuginfo-6.6.0-107.0.0.99.oe2403.x86_64",
					"openEuler-24.03-LTS:python3-perf-6.6.0-107.0.0.99.oe2403.x86_64",
					"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-107.0.0.99.oe2403.x86_64"
				]
			},
			"remediations":[
				{
					"product_ids":[
						"openEuler-24.03-LTS:kernel-6.6.0-107.0.0.99.oe2403.src",
						"openEuler-24.03-LTS:bpftool-6.6.0-107.0.0.99.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-107.0.0.99.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-6.6.0-107.0.0.99.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-107.0.0.99.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-107.0.0.99.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-107.0.0.99.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-107.0.0.99.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-107.0.0.99.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-107.0.0.99.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-107.0.0.99.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-107.0.0.99.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-6.6.0-107.0.0.99.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-107.0.0.99.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-107.0.0.99.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-107.0.0.99.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-6.6.0-107.0.0.99.oe2403.x86_64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-107.0.0.99.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-6.6.0-107.0.0.99.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-107.0.0.99.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-107.0.0.99.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-107.0.0.99.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-107.0.0.99.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-107.0.0.99.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-107.0.0.99.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-107.0.0.99.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-107.0.0.99.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-6.6.0-107.0.0.99.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-107.0.0.99.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-107.0.0.99.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-107.0.0.99.oe2403.x86_64"
					],
					"details":"kernel security update",
					"category":"vendor_fix",
					"url":"https://www.openeuler.org/zh/security/security-bulletins/detail/?id=openEuler-SA-2025-2077"
				}
			],
			"scores":[
				{
					"cvss_v3":{
						"baseSeverity":"LOW",
						"baseScore":3.9,
						"vectorString":"CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:L/I:L/A:L",
						"version":"3.1"
					},
					"products":[
						"openEuler-24.03-LTS:kernel-6.6.0-107.0.0.99.oe2403.src",
						"openEuler-24.03-LTS:bpftool-6.6.0-107.0.0.99.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-107.0.0.99.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-6.6.0-107.0.0.99.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-107.0.0.99.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-107.0.0.99.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-107.0.0.99.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-107.0.0.99.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-107.0.0.99.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-107.0.0.99.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-107.0.0.99.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-107.0.0.99.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-6.6.0-107.0.0.99.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-107.0.0.99.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-107.0.0.99.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-107.0.0.99.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-6.6.0-107.0.0.99.oe2403.x86_64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-107.0.0.99.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-6.6.0-107.0.0.99.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-107.0.0.99.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-107.0.0.99.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-107.0.0.99.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-107.0.0.99.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-107.0.0.99.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-107.0.0.99.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-107.0.0.99.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-107.0.0.99.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-6.6.0-107.0.0.99.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-107.0.0.99.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-107.0.0.99.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-107.0.0.99.oe2403.x86_64"
					]
				}
			],
			"threats":[
				{
					"details":"Low",
					"category":"impact"
				}
			],
			"title":"CVE-2025-37813"
		},
		{
			"cve":"CVE-2025-37819",
			"notes":[
				{
					"text":"In the Linux kernel, the following vulnerability has been resolved:\n\nirqchip/gic-v2m: Prevent use after free of gicv2m_get_fwnode()\n\nWith ACPI in place, gicv2m_get_fwnode() is registered with the pci\nsubsystem as pci_msi_get_fwnode_cb(), which may get invoked at runtime\nduring a PCI host bridge probe. But, the call back is wrongly marked as\n__init, causing it to be freed, while being registered with the PCI\nsubsystem and could trigger:\n\n Unable to handle kernel paging request at virtual address ffff8000816c0400\n  gicv2m_get_fwnode+0x0/0x58 (P)\n  pci_set_bus_msi_domain+0x74/0x88\n  pci_register_host_bridge+0x194/0x548\n\nThis is easily reproducible on a Juno board with ACPI boot.\n\nRetain the function for later use.",
					"category":"description",
					"title":"Vulnerability Description"
				}
			],
			"product_status":{
				"fixed":[
					"openEuler-24.03-LTS:kernel-6.6.0-107.0.0.99.oe2403.src",
					"openEuler-24.03-LTS:bpftool-6.6.0-107.0.0.99.oe2403.aarch64",
					"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-107.0.0.99.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-6.6.0-107.0.0.99.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-107.0.0.99.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-debugsource-6.6.0-107.0.0.99.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-devel-6.6.0-107.0.0.99.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-headers-6.6.0-107.0.0.99.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-source-6.6.0-107.0.0.99.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-tools-6.6.0-107.0.0.99.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-107.0.0.99.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-107.0.0.99.oe2403.aarch64",
					"openEuler-24.03-LTS:perf-6.6.0-107.0.0.99.oe2403.aarch64",
					"openEuler-24.03-LTS:perf-debuginfo-6.6.0-107.0.0.99.oe2403.aarch64",
					"openEuler-24.03-LTS:python3-perf-6.6.0-107.0.0.99.oe2403.aarch64",
					"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-107.0.0.99.oe2403.aarch64",
					"openEuler-24.03-LTS:bpftool-6.6.0-107.0.0.99.oe2403.x86_64",
					"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-107.0.0.99.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-6.6.0-107.0.0.99.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-107.0.0.99.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-debugsource-6.6.0-107.0.0.99.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-devel-6.6.0-107.0.0.99.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-headers-6.6.0-107.0.0.99.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-source-6.6.0-107.0.0.99.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-tools-6.6.0-107.0.0.99.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-107.0.0.99.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-107.0.0.99.oe2403.x86_64",
					"openEuler-24.03-LTS:perf-6.6.0-107.0.0.99.oe2403.x86_64",
					"openEuler-24.03-LTS:perf-debuginfo-6.6.0-107.0.0.99.oe2403.x86_64",
					"openEuler-24.03-LTS:python3-perf-6.6.0-107.0.0.99.oe2403.x86_64",
					"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-107.0.0.99.oe2403.x86_64"
				]
			},
			"remediations":[
				{
					"product_ids":[
						"openEuler-24.03-LTS:kernel-6.6.0-107.0.0.99.oe2403.src",
						"openEuler-24.03-LTS:bpftool-6.6.0-107.0.0.99.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-107.0.0.99.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-6.6.0-107.0.0.99.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-107.0.0.99.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-107.0.0.99.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-107.0.0.99.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-107.0.0.99.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-107.0.0.99.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-107.0.0.99.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-107.0.0.99.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-107.0.0.99.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-6.6.0-107.0.0.99.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-107.0.0.99.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-107.0.0.99.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-107.0.0.99.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-6.6.0-107.0.0.99.oe2403.x86_64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-107.0.0.99.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-6.6.0-107.0.0.99.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-107.0.0.99.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-107.0.0.99.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-107.0.0.99.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-107.0.0.99.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-107.0.0.99.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-107.0.0.99.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-107.0.0.99.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-107.0.0.99.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-6.6.0-107.0.0.99.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-107.0.0.99.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-107.0.0.99.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-107.0.0.99.oe2403.x86_64"
					],
					"details":"kernel security update",
					"category":"vendor_fix",
					"url":"https://www.openeuler.org/zh/security/security-bulletins/detail/?id=openEuler-SA-2025-2077"
				}
			],
			"scores":[
				{
					"cvss_v3":{
						"baseSeverity":"MEDIUM",
						"baseScore":6.7,
						"vectorString":"CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
						"version":"3.1"
					},
					"products":[
						"openEuler-24.03-LTS:kernel-6.6.0-107.0.0.99.oe2403.src",
						"openEuler-24.03-LTS:bpftool-6.6.0-107.0.0.99.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-107.0.0.99.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-6.6.0-107.0.0.99.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-107.0.0.99.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-107.0.0.99.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-107.0.0.99.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-107.0.0.99.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-107.0.0.99.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-107.0.0.99.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-107.0.0.99.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-107.0.0.99.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-6.6.0-107.0.0.99.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-107.0.0.99.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-107.0.0.99.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-107.0.0.99.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-6.6.0-107.0.0.99.oe2403.x86_64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-107.0.0.99.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-6.6.0-107.0.0.99.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-107.0.0.99.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-107.0.0.99.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-107.0.0.99.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-107.0.0.99.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-107.0.0.99.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-107.0.0.99.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-107.0.0.99.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-107.0.0.99.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-6.6.0-107.0.0.99.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-107.0.0.99.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-107.0.0.99.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-107.0.0.99.oe2403.x86_64"
					]
				}
			],
			"threats":[
				{
					"details":"Medium",
					"category":"impact"
				}
			],
			"title":"CVE-2025-37819"
		},
		{
			"cve":"CVE-2025-37862",
			"notes":[
				{
					"text":"In the Linux kernel, the following vulnerability has been resolved:\n\nHID: pidff: Fix null pointer dereference in pidff_find_fields\n\nThis function triggered a null pointer dereference if used to search for\na report that isn't implemented on the device. This happened both for\noptional and required reports alike.\n\nThe same logic was applied to pidff_find_special_field and although\npidff_init_fields should return an error earlier if one of the required\nreports is missing, future modifications could change this logic and\nresurface this possible null pointer dereference again.\n\nLKML bug report:\nhttps://lore.kernel.org/all/CAL-gK7f5=R0nrrQdPtaZZr1fd-cdAMbDMuZ_NLA8vM0SX+nGSw@mail.gmail.com",
					"category":"description",
					"title":"Vulnerability Description"
				}
			],
			"product_status":{
				"fixed":[
					"openEuler-24.03-LTS:kernel-6.6.0-107.0.0.99.oe2403.src",
					"openEuler-24.03-LTS:bpftool-6.6.0-107.0.0.99.oe2403.aarch64",
					"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-107.0.0.99.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-6.6.0-107.0.0.99.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-107.0.0.99.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-debugsource-6.6.0-107.0.0.99.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-devel-6.6.0-107.0.0.99.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-headers-6.6.0-107.0.0.99.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-source-6.6.0-107.0.0.99.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-tools-6.6.0-107.0.0.99.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-107.0.0.99.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-107.0.0.99.oe2403.aarch64",
					"openEuler-24.03-LTS:perf-6.6.0-107.0.0.99.oe2403.aarch64",
					"openEuler-24.03-LTS:perf-debuginfo-6.6.0-107.0.0.99.oe2403.aarch64",
					"openEuler-24.03-LTS:python3-perf-6.6.0-107.0.0.99.oe2403.aarch64",
					"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-107.0.0.99.oe2403.aarch64",
					"openEuler-24.03-LTS:bpftool-6.6.0-107.0.0.99.oe2403.x86_64",
					"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-107.0.0.99.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-6.6.0-107.0.0.99.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-107.0.0.99.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-debugsource-6.6.0-107.0.0.99.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-devel-6.6.0-107.0.0.99.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-headers-6.6.0-107.0.0.99.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-source-6.6.0-107.0.0.99.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-tools-6.6.0-107.0.0.99.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-107.0.0.99.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-107.0.0.99.oe2403.x86_64",
					"openEuler-24.03-LTS:perf-6.6.0-107.0.0.99.oe2403.x86_64",
					"openEuler-24.03-LTS:perf-debuginfo-6.6.0-107.0.0.99.oe2403.x86_64",
					"openEuler-24.03-LTS:python3-perf-6.6.0-107.0.0.99.oe2403.x86_64",
					"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-107.0.0.99.oe2403.x86_64"
				]
			},
			"remediations":[
				{
					"product_ids":[
						"openEuler-24.03-LTS:kernel-6.6.0-107.0.0.99.oe2403.src",
						"openEuler-24.03-LTS:bpftool-6.6.0-107.0.0.99.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-107.0.0.99.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-6.6.0-107.0.0.99.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-107.0.0.99.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-107.0.0.99.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-107.0.0.99.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-107.0.0.99.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-107.0.0.99.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-107.0.0.99.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-107.0.0.99.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-107.0.0.99.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-6.6.0-107.0.0.99.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-107.0.0.99.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-107.0.0.99.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-107.0.0.99.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-6.6.0-107.0.0.99.oe2403.x86_64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-107.0.0.99.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-6.6.0-107.0.0.99.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-107.0.0.99.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-107.0.0.99.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-107.0.0.99.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-107.0.0.99.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-107.0.0.99.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-107.0.0.99.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-107.0.0.99.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-107.0.0.99.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-6.6.0-107.0.0.99.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-107.0.0.99.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-107.0.0.99.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-107.0.0.99.oe2403.x86_64"
					],
					"details":"kernel security update",
					"category":"vendor_fix",
					"url":"https://www.openeuler.org/zh/security/security-bulletins/detail/?id=openEuler-SA-2025-2077"
				}
			],
			"scores":[
				{
					"cvss_v3":{
						"baseSeverity":"MEDIUM",
						"baseScore":5.5,
						"vectorString":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
						"version":"3.1"
					},
					"products":[
						"openEuler-24.03-LTS:kernel-6.6.0-107.0.0.99.oe2403.src",
						"openEuler-24.03-LTS:bpftool-6.6.0-107.0.0.99.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-107.0.0.99.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-6.6.0-107.0.0.99.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-107.0.0.99.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-107.0.0.99.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-107.0.0.99.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-107.0.0.99.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-107.0.0.99.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-107.0.0.99.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-107.0.0.99.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-107.0.0.99.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-6.6.0-107.0.0.99.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-107.0.0.99.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-107.0.0.99.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-107.0.0.99.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-6.6.0-107.0.0.99.oe2403.x86_64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-107.0.0.99.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-6.6.0-107.0.0.99.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-107.0.0.99.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-107.0.0.99.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-107.0.0.99.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-107.0.0.99.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-107.0.0.99.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-107.0.0.99.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-107.0.0.99.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-107.0.0.99.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-6.6.0-107.0.0.99.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-107.0.0.99.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-107.0.0.99.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-107.0.0.99.oe2403.x86_64"
					]
				}
			],
			"threats":[
				{
					"details":"Medium",
					"category":"impact"
				}
			],
			"title":"CVE-2025-37862"
		},
		{
			"cve":"CVE-2025-37890",
			"notes":[
				{
					"text":"In the Linux kernel, the following vulnerability has been resolved:\n\nnet_sched: hfsc: Fix a UAF vulnerability in class with netem as child qdisc\n\nAs described in Gerrard's report [1], we have a UAF case when an hfsc class\nhas a netem child qdisc. The crux of the issue is that hfsc is assuming\nthat checking for cl->qdisc->q.qlen == 0 guarantees that it hasn't inserted\nthe class in the vttree or eltree (which is not true for the netem\nduplicate case).\n\nThis patch checks the n_active class variable to make sure that the code\nwon't insert the class in the vttree or eltree twice, catering for the\nreentrant case.\n\n[1] https://lore.kernel.org/netdev/CAHcdcOm+03OD2j6R0=YHKqmy=VgJ8xEOKuP6c7mSgnp-TEJJbw@mail.gmail.com/",
					"category":"description",
					"title":"Vulnerability Description"
				}
			],
			"product_status":{
				"fixed":[
					"openEuler-24.03-LTS:kernel-6.6.0-107.0.0.99.oe2403.src",
					"openEuler-24.03-LTS:bpftool-6.6.0-107.0.0.99.oe2403.aarch64",
					"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-107.0.0.99.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-6.6.0-107.0.0.99.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-107.0.0.99.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-debugsource-6.6.0-107.0.0.99.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-devel-6.6.0-107.0.0.99.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-headers-6.6.0-107.0.0.99.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-source-6.6.0-107.0.0.99.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-tools-6.6.0-107.0.0.99.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-107.0.0.99.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-107.0.0.99.oe2403.aarch64",
					"openEuler-24.03-LTS:perf-6.6.0-107.0.0.99.oe2403.aarch64",
					"openEuler-24.03-LTS:perf-debuginfo-6.6.0-107.0.0.99.oe2403.aarch64",
					"openEuler-24.03-LTS:python3-perf-6.6.0-107.0.0.99.oe2403.aarch64",
					"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-107.0.0.99.oe2403.aarch64",
					"openEuler-24.03-LTS:bpftool-6.6.0-107.0.0.99.oe2403.x86_64",
					"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-107.0.0.99.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-6.6.0-107.0.0.99.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-107.0.0.99.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-debugsource-6.6.0-107.0.0.99.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-devel-6.6.0-107.0.0.99.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-headers-6.6.0-107.0.0.99.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-source-6.6.0-107.0.0.99.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-tools-6.6.0-107.0.0.99.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-107.0.0.99.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-107.0.0.99.oe2403.x86_64",
					"openEuler-24.03-LTS:perf-6.6.0-107.0.0.99.oe2403.x86_64",
					"openEuler-24.03-LTS:perf-debuginfo-6.6.0-107.0.0.99.oe2403.x86_64",
					"openEuler-24.03-LTS:python3-perf-6.6.0-107.0.0.99.oe2403.x86_64",
					"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-107.0.0.99.oe2403.x86_64"
				]
			},
			"remediations":[
				{
					"product_ids":[
						"openEuler-24.03-LTS:kernel-6.6.0-107.0.0.99.oe2403.src",
						"openEuler-24.03-LTS:bpftool-6.6.0-107.0.0.99.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-107.0.0.99.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-6.6.0-107.0.0.99.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-107.0.0.99.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-107.0.0.99.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-107.0.0.99.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-107.0.0.99.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-107.0.0.99.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-107.0.0.99.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-107.0.0.99.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-107.0.0.99.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-6.6.0-107.0.0.99.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-107.0.0.99.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-107.0.0.99.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-107.0.0.99.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-6.6.0-107.0.0.99.oe2403.x86_64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-107.0.0.99.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-6.6.0-107.0.0.99.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-107.0.0.99.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-107.0.0.99.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-107.0.0.99.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-107.0.0.99.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-107.0.0.99.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-107.0.0.99.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-107.0.0.99.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-107.0.0.99.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-6.6.0-107.0.0.99.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-107.0.0.99.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-107.0.0.99.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-107.0.0.99.oe2403.x86_64"
					],
					"details":"kernel security update",
					"category":"vendor_fix",
					"url":"https://www.openeuler.org/zh/security/security-bulletins/detail/?id=openEuler-SA-2025-2077"
				}
			],
			"scores":[
				{
					"cvss_v3":{
						"baseSeverity":"HIGH",
						"baseScore":7.0,
						"vectorString":"CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
						"version":"3.1"
					},
					"products":[
						"openEuler-24.03-LTS:kernel-6.6.0-107.0.0.99.oe2403.src",
						"openEuler-24.03-LTS:bpftool-6.6.0-107.0.0.99.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-107.0.0.99.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-6.6.0-107.0.0.99.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-107.0.0.99.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-107.0.0.99.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-107.0.0.99.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-107.0.0.99.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-107.0.0.99.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-107.0.0.99.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-107.0.0.99.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-107.0.0.99.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-6.6.0-107.0.0.99.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-107.0.0.99.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-107.0.0.99.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-107.0.0.99.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-6.6.0-107.0.0.99.oe2403.x86_64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-107.0.0.99.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-6.6.0-107.0.0.99.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-107.0.0.99.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-107.0.0.99.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-107.0.0.99.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-107.0.0.99.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-107.0.0.99.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-107.0.0.99.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-107.0.0.99.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-107.0.0.99.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-6.6.0-107.0.0.99.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-107.0.0.99.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-107.0.0.99.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-107.0.0.99.oe2403.x86_64"
					]
				}
			],
			"threats":[
				{
					"details":"High",
					"category":"impact"
				}
			],
			"title":"CVE-2025-37890"
		},
		{
			"cve":"CVE-2025-37920",
			"notes":[
				{
					"text":"In the Linux kernel, the following vulnerability has been resolved:\n\nxsk: Fix race condition in AF_XDP generic RX path\n\nMove rx_lock from xsk_socket to xsk_buff_pool.\nFix synchronization for shared umem mode in\ngeneric RX path where multiple sockets share\nsingle xsk_buff_pool.\n\nRX queue is exclusive to xsk_socket, while FILL\nqueue can be shared between multiple sockets.\nThis could result in race condition where two\nCPU cores access RX path of two different sockets\nsharing the same umem.\n\nProtect both queues by acquiring spinlock in shared\nxsk_buff_pool.\n\nLock contention may be minimized in the future by some\nper-thread FQ buffering.\n\nIt's safe and necessary to move spin_lock_bh(rx_lock)\nafter xsk_rcv_check():\n* xs->pool and spinlock_init is synchronized by\n  xsk_bind() -> xsk_is_bound() memory barriers.\n* xsk_rcv_check() may return true at the moment\n  of xsk_release() or xsk_unbind_dev(),\n  however this will not cause any data races or\n  race conditions. xsk_unbind_dev() removes xdp\n  socket from all maps and waits for completion\n  of all outstanding rx operations. Packets in\n  RX path will either complete safely or drop.",
					"category":"description",
					"title":"Vulnerability Description"
				}
			],
			"product_status":{
				"fixed":[
					"openEuler-24.03-LTS:kernel-6.6.0-107.0.0.99.oe2403.src",
					"openEuler-24.03-LTS:bpftool-6.6.0-107.0.0.99.oe2403.aarch64",
					"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-107.0.0.99.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-6.6.0-107.0.0.99.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-107.0.0.99.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-debugsource-6.6.0-107.0.0.99.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-devel-6.6.0-107.0.0.99.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-headers-6.6.0-107.0.0.99.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-source-6.6.0-107.0.0.99.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-tools-6.6.0-107.0.0.99.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-107.0.0.99.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-107.0.0.99.oe2403.aarch64",
					"openEuler-24.03-LTS:perf-6.6.0-107.0.0.99.oe2403.aarch64",
					"openEuler-24.03-LTS:perf-debuginfo-6.6.0-107.0.0.99.oe2403.aarch64",
					"openEuler-24.03-LTS:python3-perf-6.6.0-107.0.0.99.oe2403.aarch64",
					"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-107.0.0.99.oe2403.aarch64",
					"openEuler-24.03-LTS:bpftool-6.6.0-107.0.0.99.oe2403.x86_64",
					"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-107.0.0.99.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-6.6.0-107.0.0.99.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-107.0.0.99.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-debugsource-6.6.0-107.0.0.99.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-devel-6.6.0-107.0.0.99.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-headers-6.6.0-107.0.0.99.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-source-6.6.0-107.0.0.99.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-tools-6.6.0-107.0.0.99.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-107.0.0.99.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-107.0.0.99.oe2403.x86_64",
					"openEuler-24.03-LTS:perf-6.6.0-107.0.0.99.oe2403.x86_64",
					"openEuler-24.03-LTS:perf-debuginfo-6.6.0-107.0.0.99.oe2403.x86_64",
					"openEuler-24.03-LTS:python3-perf-6.6.0-107.0.0.99.oe2403.x86_64",
					"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-107.0.0.99.oe2403.x86_64"
				]
			},
			"remediations":[
				{
					"product_ids":[
						"openEuler-24.03-LTS:kernel-6.6.0-107.0.0.99.oe2403.src",
						"openEuler-24.03-LTS:bpftool-6.6.0-107.0.0.99.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-107.0.0.99.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-6.6.0-107.0.0.99.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-107.0.0.99.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-107.0.0.99.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-107.0.0.99.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-107.0.0.99.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-107.0.0.99.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-107.0.0.99.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-107.0.0.99.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-107.0.0.99.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-6.6.0-107.0.0.99.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-107.0.0.99.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-107.0.0.99.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-107.0.0.99.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-6.6.0-107.0.0.99.oe2403.x86_64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-107.0.0.99.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-6.6.0-107.0.0.99.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-107.0.0.99.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-107.0.0.99.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-107.0.0.99.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-107.0.0.99.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-107.0.0.99.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-107.0.0.99.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-107.0.0.99.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-107.0.0.99.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-6.6.0-107.0.0.99.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-107.0.0.99.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-107.0.0.99.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-107.0.0.99.oe2403.x86_64"
					],
					"details":"kernel security update",
					"category":"vendor_fix",
					"url":"https://www.openeuler.org/zh/security/security-bulletins/detail/?id=openEuler-SA-2025-2077"
				}
			],
			"scores":[
				{
					"cvss_v3":{
						"baseSeverity":"MEDIUM",
						"baseScore":4.5,
						"vectorString":"CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:L",
						"version":"3.1"
					},
					"products":[
						"openEuler-24.03-LTS:kernel-6.6.0-107.0.0.99.oe2403.src",
						"openEuler-24.03-LTS:bpftool-6.6.0-107.0.0.99.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-107.0.0.99.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-6.6.0-107.0.0.99.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-107.0.0.99.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-107.0.0.99.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-107.0.0.99.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-107.0.0.99.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-107.0.0.99.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-107.0.0.99.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-107.0.0.99.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-107.0.0.99.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-6.6.0-107.0.0.99.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-107.0.0.99.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-107.0.0.99.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-107.0.0.99.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-6.6.0-107.0.0.99.oe2403.x86_64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-107.0.0.99.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-6.6.0-107.0.0.99.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-107.0.0.99.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-107.0.0.99.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-107.0.0.99.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-107.0.0.99.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-107.0.0.99.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-107.0.0.99.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-107.0.0.99.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-107.0.0.99.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-6.6.0-107.0.0.99.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-107.0.0.99.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-107.0.0.99.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-107.0.0.99.oe2403.x86_64"
					]
				}
			],
			"threats":[
				{
					"details":"Medium",
					"category":"impact"
				}
			],
			"title":"CVE-2025-37920"
		},
		{
			"cve":"CVE-2025-38000",
			"notes":[
				{
					"text":"In the Linux kernel, the following vulnerability has been resolved:\n\nsch_hfsc: Fix qlen accounting bug when using peek in hfsc_enqueue()\n\nWhen enqueuing the first packet to an HFSC class, hfsc_enqueue() calls the\nchild qdisc's peek() operation before incrementing sch->q.qlen and\nsch->qstats.backlog. If the child qdisc uses qdisc_peek_dequeued(), this may\ntrigger an immediate dequeue and potential packet drop. In such cases,\nqdisc_tree_reduce_backlog() is called, but the HFSC qdisc's qlen and backlog\nhave not yet been updated, leading to inconsistent queue accounting. This\ncan leave an empty HFSC class in the active list, causing further\nconsequences like use-after-free.\n\nThis patch fixes the bug by moving the increment of sch->q.qlen and\nsch->qstats.backlog before the call to the child qdisc's peek() operation.\nThis ensures that queue length and backlog are always accurate when packet\ndrops or dequeues are triggered during the peek.",
					"category":"description",
					"title":"Vulnerability Description"
				}
			],
			"product_status":{
				"fixed":[
					"openEuler-24.03-LTS:kernel-6.6.0-107.0.0.99.oe2403.src",
					"openEuler-24.03-LTS:bpftool-6.6.0-107.0.0.99.oe2403.aarch64",
					"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-107.0.0.99.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-6.6.0-107.0.0.99.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-107.0.0.99.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-debugsource-6.6.0-107.0.0.99.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-devel-6.6.0-107.0.0.99.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-headers-6.6.0-107.0.0.99.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-source-6.6.0-107.0.0.99.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-tools-6.6.0-107.0.0.99.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-107.0.0.99.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-107.0.0.99.oe2403.aarch64",
					"openEuler-24.03-LTS:perf-6.6.0-107.0.0.99.oe2403.aarch64",
					"openEuler-24.03-LTS:perf-debuginfo-6.6.0-107.0.0.99.oe2403.aarch64",
					"openEuler-24.03-LTS:python3-perf-6.6.0-107.0.0.99.oe2403.aarch64",
					"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-107.0.0.99.oe2403.aarch64",
					"openEuler-24.03-LTS:bpftool-6.6.0-107.0.0.99.oe2403.x86_64",
					"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-107.0.0.99.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-6.6.0-107.0.0.99.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-107.0.0.99.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-debugsource-6.6.0-107.0.0.99.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-devel-6.6.0-107.0.0.99.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-headers-6.6.0-107.0.0.99.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-source-6.6.0-107.0.0.99.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-tools-6.6.0-107.0.0.99.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-107.0.0.99.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-107.0.0.99.oe2403.x86_64",
					"openEuler-24.03-LTS:perf-6.6.0-107.0.0.99.oe2403.x86_64",
					"openEuler-24.03-LTS:perf-debuginfo-6.6.0-107.0.0.99.oe2403.x86_64",
					"openEuler-24.03-LTS:python3-perf-6.6.0-107.0.0.99.oe2403.x86_64",
					"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-107.0.0.99.oe2403.x86_64"
				]
			},
			"remediations":[
				{
					"product_ids":[
						"openEuler-24.03-LTS:kernel-6.6.0-107.0.0.99.oe2403.src",
						"openEuler-24.03-LTS:bpftool-6.6.0-107.0.0.99.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-107.0.0.99.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-6.6.0-107.0.0.99.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-107.0.0.99.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-107.0.0.99.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-107.0.0.99.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-107.0.0.99.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-107.0.0.99.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-107.0.0.99.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-107.0.0.99.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-107.0.0.99.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-6.6.0-107.0.0.99.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-107.0.0.99.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-107.0.0.99.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-107.0.0.99.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-6.6.0-107.0.0.99.oe2403.x86_64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-107.0.0.99.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-6.6.0-107.0.0.99.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-107.0.0.99.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-107.0.0.99.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-107.0.0.99.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-107.0.0.99.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-107.0.0.99.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-107.0.0.99.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-107.0.0.99.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-107.0.0.99.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-6.6.0-107.0.0.99.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-107.0.0.99.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-107.0.0.99.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-107.0.0.99.oe2403.x86_64"
					],
					"details":"kernel security update",
					"category":"vendor_fix",
					"url":"https://www.openeuler.org/zh/security/security-bulletins/detail/?id=openEuler-SA-2025-2077"
				}
			],
			"scores":[
				{
					"cvss_v3":{
						"baseSeverity":"HIGH",
						"baseScore":7.0,
						"vectorString":"CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
						"version":"3.1"
					},
					"products":[
						"openEuler-24.03-LTS:kernel-6.6.0-107.0.0.99.oe2403.src",
						"openEuler-24.03-LTS:bpftool-6.6.0-107.0.0.99.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-107.0.0.99.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-6.6.0-107.0.0.99.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-107.0.0.99.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-107.0.0.99.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-107.0.0.99.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-107.0.0.99.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-107.0.0.99.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-107.0.0.99.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-107.0.0.99.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-107.0.0.99.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-6.6.0-107.0.0.99.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-107.0.0.99.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-107.0.0.99.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-107.0.0.99.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-6.6.0-107.0.0.99.oe2403.x86_64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-107.0.0.99.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-6.6.0-107.0.0.99.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-107.0.0.99.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-107.0.0.99.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-107.0.0.99.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-107.0.0.99.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-107.0.0.99.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-107.0.0.99.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-107.0.0.99.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-107.0.0.99.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-6.6.0-107.0.0.99.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-107.0.0.99.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-107.0.0.99.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-107.0.0.99.oe2403.x86_64"
					]
				}
			],
			"threats":[
				{
					"details":"High",
					"category":"impact"
				}
			],
			"title":"CVE-2025-38000"
		},
		{
			"cve":"CVE-2025-38001",
			"notes":[
				{
					"text":"In the Linux kernel, the following vulnerability has been resolved:\n\nnet_sched: hfsc: Address reentrant enqueue adding class to eltree twice\n\nSavino says:\n    \"We are writing to report that this recent patch\n    (141d34391abbb315d68556b7c67ad97885407547) [1]\n    can be bypassed, and a UAF can still occur when HFSC is utilized with\n    NETEM.\n\n    The patch only checks the cl->cl_nactive field to determine whether\n    it is the first insertion or not [2], but this field is only\n    incremented by init_vf [3].\n\n    By using HFSC_RSC (which uses init_ed) [4], it is possible to bypass the\n    check and insert the class twice in the eltree.\n    Under normal conditions, this would lead to an infinite loop in\n    hfsc_dequeue for the reasons we already explained in this report [5].\n\n    However, if TBF is added as root qdisc and it is configured with a\n    very low rate,\n    it can be utilized to prevent packets from being dequeued.\n    This behavior can be exploited to perform subsequent insertions in the\n    HFSC eltree and cause a UAF.\"\n\nTo fix both the UAF and the infinite loop, with netem as an hfsc child,\ncheck explicitly in hfsc_enqueue whether the class is already in the eltree\nwhenever the HFSC_RSC flag is set.\n\n[1] https://web.git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=141d34391abbb315d68556b7c67ad97885407547\n[2] https://elixir.bootlin.com/linux/v6.15-rc5/source/net/sched/sch_hfsc.c#L1572\n[3] https://elixir.bootlin.com/linux/v6.15-rc5/source/net/sched/sch_hfsc.c#L677\n[4] https://elixir.bootlin.com/linux/v6.15-rc5/source/net/sched/sch_hfsc.c#L1574\n[5] https://lore.kernel.org/netdev/8DuRWwfqjoRDLDmBMlIfbrsZg9Gx50DHJc1ilxsEBNe2D6NMoigR_eIRIG0LOjMc3r10nUUZtArXx4oZBIdUfZQrwjcQhdinnMis_0G7VEk=@willsroot.io/T/#u",
					"category":"description",
					"title":"Vulnerability Description"
				}
			],
			"product_status":{
				"fixed":[
					"openEuler-24.03-LTS:kernel-6.6.0-107.0.0.99.oe2403.src",
					"openEuler-24.03-LTS:bpftool-6.6.0-107.0.0.99.oe2403.aarch64",
					"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-107.0.0.99.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-6.6.0-107.0.0.99.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-107.0.0.99.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-debugsource-6.6.0-107.0.0.99.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-devel-6.6.0-107.0.0.99.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-headers-6.6.0-107.0.0.99.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-source-6.6.0-107.0.0.99.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-tools-6.6.0-107.0.0.99.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-107.0.0.99.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-107.0.0.99.oe2403.aarch64",
					"openEuler-24.03-LTS:perf-6.6.0-107.0.0.99.oe2403.aarch64",
					"openEuler-24.03-LTS:perf-debuginfo-6.6.0-107.0.0.99.oe2403.aarch64",
					"openEuler-24.03-LTS:python3-perf-6.6.0-107.0.0.99.oe2403.aarch64",
					"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-107.0.0.99.oe2403.aarch64",
					"openEuler-24.03-LTS:bpftool-6.6.0-107.0.0.99.oe2403.x86_64",
					"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-107.0.0.99.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-6.6.0-107.0.0.99.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-107.0.0.99.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-debugsource-6.6.0-107.0.0.99.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-devel-6.6.0-107.0.0.99.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-headers-6.6.0-107.0.0.99.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-source-6.6.0-107.0.0.99.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-tools-6.6.0-107.0.0.99.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-107.0.0.99.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-107.0.0.99.oe2403.x86_64",
					"openEuler-24.03-LTS:perf-6.6.0-107.0.0.99.oe2403.x86_64",
					"openEuler-24.03-LTS:perf-debuginfo-6.6.0-107.0.0.99.oe2403.x86_64",
					"openEuler-24.03-LTS:python3-perf-6.6.0-107.0.0.99.oe2403.x86_64",
					"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-107.0.0.99.oe2403.x86_64"
				]
			},
			"remediations":[
				{
					"product_ids":[
						"openEuler-24.03-LTS:kernel-6.6.0-107.0.0.99.oe2403.src",
						"openEuler-24.03-LTS:bpftool-6.6.0-107.0.0.99.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-107.0.0.99.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-6.6.0-107.0.0.99.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-107.0.0.99.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-107.0.0.99.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-107.0.0.99.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-107.0.0.99.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-107.0.0.99.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-107.0.0.99.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-107.0.0.99.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-107.0.0.99.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-6.6.0-107.0.0.99.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-107.0.0.99.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-107.0.0.99.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-107.0.0.99.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-6.6.0-107.0.0.99.oe2403.x86_64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-107.0.0.99.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-6.6.0-107.0.0.99.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-107.0.0.99.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-107.0.0.99.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-107.0.0.99.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-107.0.0.99.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-107.0.0.99.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-107.0.0.99.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-107.0.0.99.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-107.0.0.99.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-6.6.0-107.0.0.99.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-107.0.0.99.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-107.0.0.99.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-107.0.0.99.oe2403.x86_64"
					],
					"details":"kernel security update",
					"category":"vendor_fix",
					"url":"https://www.openeuler.org/zh/security/security-bulletins/detail/?id=openEuler-SA-2025-2077"
				}
			],
			"scores":[
				{
					"cvss_v3":{
						"baseSeverity":"HIGH",
						"baseScore":7.0,
						"vectorString":"CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
						"version":"3.1"
					},
					"products":[
						"openEuler-24.03-LTS:kernel-6.6.0-107.0.0.99.oe2403.src",
						"openEuler-24.03-LTS:bpftool-6.6.0-107.0.0.99.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-107.0.0.99.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-6.6.0-107.0.0.99.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-107.0.0.99.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-107.0.0.99.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-107.0.0.99.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-107.0.0.99.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-107.0.0.99.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-107.0.0.99.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-107.0.0.99.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-107.0.0.99.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-6.6.0-107.0.0.99.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-107.0.0.99.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-107.0.0.99.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-107.0.0.99.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-6.6.0-107.0.0.99.oe2403.x86_64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-107.0.0.99.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-6.6.0-107.0.0.99.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-107.0.0.99.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-107.0.0.99.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-107.0.0.99.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-107.0.0.99.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-107.0.0.99.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-107.0.0.99.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-107.0.0.99.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-107.0.0.99.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-6.6.0-107.0.0.99.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-107.0.0.99.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-107.0.0.99.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-107.0.0.99.oe2403.x86_64"
					]
				}
			],
			"threats":[
				{
					"details":"High",
					"category":"impact"
				}
			],
			"title":"CVE-2025-38001"
		},
		{
			"cve":"CVE-2025-38006",
			"notes":[
				{
					"text":"In the Linux kernel, the following vulnerability has been resolved:\n\nnet: mctp: Don't access ifa_index when missing\n\nIn mctp_dump_addrinfo, ifa_index can be used to filter interfaces, but\nonly when the struct ifaddrmsg is provided. Otherwise it will be\ncomparing to uninitialised memory - reproducible in the syzkaller case from\ndhcpd, or busybox \"ip addr show\".\n\nThe kernel MCTP implementation has always filtered by ifa_index, so\nexisting userspace programs expecting to dump MCTP addresses must\nalready be passing a valid ifa_index value (either 0 or a real index).\n\nBUG: KMSAN: uninit-value in mctp_dump_addrinfo+0x208/0xac0 net/mctp/device.c:128\n mctp_dump_addrinfo+0x208/0xac0 net/mctp/device.c:128\n rtnl_dump_all+0x3ec/0x5b0 net/core/rtnetlink.c:4380\n rtnl_dumpit+0xd5/0x2f0 net/core/rtnetlink.c:6824\n netlink_dump+0x97b/0x1690 net/netlink/af_netlink.c:2309",
					"category":"description",
					"title":"Vulnerability Description"
				}
			],
			"product_status":{
				"fixed":[
					"openEuler-24.03-LTS:kernel-6.6.0-107.0.0.99.oe2403.src",
					"openEuler-24.03-LTS:bpftool-6.6.0-107.0.0.99.oe2403.aarch64",
					"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-107.0.0.99.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-6.6.0-107.0.0.99.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-107.0.0.99.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-debugsource-6.6.0-107.0.0.99.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-devel-6.6.0-107.0.0.99.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-headers-6.6.0-107.0.0.99.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-source-6.6.0-107.0.0.99.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-tools-6.6.0-107.0.0.99.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-107.0.0.99.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-107.0.0.99.oe2403.aarch64",
					"openEuler-24.03-LTS:perf-6.6.0-107.0.0.99.oe2403.aarch64",
					"openEuler-24.03-LTS:perf-debuginfo-6.6.0-107.0.0.99.oe2403.aarch64",
					"openEuler-24.03-LTS:python3-perf-6.6.0-107.0.0.99.oe2403.aarch64",
					"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-107.0.0.99.oe2403.aarch64",
					"openEuler-24.03-LTS:bpftool-6.6.0-107.0.0.99.oe2403.x86_64",
					"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-107.0.0.99.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-6.6.0-107.0.0.99.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-107.0.0.99.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-debugsource-6.6.0-107.0.0.99.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-devel-6.6.0-107.0.0.99.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-headers-6.6.0-107.0.0.99.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-source-6.6.0-107.0.0.99.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-tools-6.6.0-107.0.0.99.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-107.0.0.99.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-107.0.0.99.oe2403.x86_64",
					"openEuler-24.03-LTS:perf-6.6.0-107.0.0.99.oe2403.x86_64",
					"openEuler-24.03-LTS:perf-debuginfo-6.6.0-107.0.0.99.oe2403.x86_64",
					"openEuler-24.03-LTS:python3-perf-6.6.0-107.0.0.99.oe2403.x86_64",
					"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-107.0.0.99.oe2403.x86_64"
				]
			},
			"remediations":[
				{
					"product_ids":[
						"openEuler-24.03-LTS:kernel-6.6.0-107.0.0.99.oe2403.src",
						"openEuler-24.03-LTS:bpftool-6.6.0-107.0.0.99.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-107.0.0.99.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-6.6.0-107.0.0.99.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-107.0.0.99.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-107.0.0.99.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-107.0.0.99.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-107.0.0.99.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-107.0.0.99.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-107.0.0.99.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-107.0.0.99.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-107.0.0.99.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-6.6.0-107.0.0.99.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-107.0.0.99.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-107.0.0.99.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-107.0.0.99.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-6.6.0-107.0.0.99.oe2403.x86_64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-107.0.0.99.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-6.6.0-107.0.0.99.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-107.0.0.99.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-107.0.0.99.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-107.0.0.99.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-107.0.0.99.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-107.0.0.99.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-107.0.0.99.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-107.0.0.99.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-107.0.0.99.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-6.6.0-107.0.0.99.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-107.0.0.99.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-107.0.0.99.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-107.0.0.99.oe2403.x86_64"
					],
					"details":"kernel security update",
					"category":"vendor_fix",
					"url":"https://www.openeuler.org/zh/security/security-bulletins/detail/?id=openEuler-SA-2025-2077"
				}
			],
			"scores":[
				{
					"cvss_v3":{
						"baseSeverity":"MEDIUM",
						"baseScore":6.1,
						"vectorString":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H",
						"version":"3.1"
					},
					"products":[
						"openEuler-24.03-LTS:kernel-6.6.0-107.0.0.99.oe2403.src",
						"openEuler-24.03-LTS:bpftool-6.6.0-107.0.0.99.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-107.0.0.99.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-6.6.0-107.0.0.99.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-107.0.0.99.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-107.0.0.99.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-107.0.0.99.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-107.0.0.99.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-107.0.0.99.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-107.0.0.99.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-107.0.0.99.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-107.0.0.99.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-6.6.0-107.0.0.99.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-107.0.0.99.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-107.0.0.99.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-107.0.0.99.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-6.6.0-107.0.0.99.oe2403.x86_64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-107.0.0.99.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-6.6.0-107.0.0.99.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-107.0.0.99.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-107.0.0.99.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-107.0.0.99.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-107.0.0.99.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-107.0.0.99.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-107.0.0.99.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-107.0.0.99.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-107.0.0.99.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-6.6.0-107.0.0.99.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-107.0.0.99.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-107.0.0.99.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-107.0.0.99.oe2403.x86_64"
					]
				}
			],
			"threats":[
				{
					"details":"Medium",
					"category":"impact"
				}
			],
			"title":"CVE-2025-38006"
		},
		{
			"cve":"CVE-2025-38009",
			"notes":[
				{
					"text":"In the Linux kernel, the following vulnerability has been resolved:\n\nwifi: mt76: disable napi on driver removal\n\nA warning on driver removal started occurring after commit 9dd05df8403b\n(\"net: warn if NAPI instance wasn't shut down\"). Disable tx napi before\ndeleting it in mt76_dma_cleanup().\n\n WARNING: CPU: 4 PID: 18828 at net/core/dev.c:7288 __netif_napi_del_locked+0xf0/0x100\n CPU: 4 UID: 0 PID: 18828 Comm: modprobe Not tainted 6.15.0-rc4 #4 PREEMPT(lazy)\n Hardware name: ASUS System Product Name/PRIME X670E-PRO WIFI, BIOS 3035 09/05/2024\n RIP: 0010:__netif_napi_del_locked+0xf0/0x100\n Call Trace:\n <TASK>\n mt76_dma_cleanup+0x54/0x2f0 [mt76]\n mt7921_pci_remove+0xd5/0x190 [mt7921e]\n pci_device_remove+0x47/0xc0\n device_release_driver_internal+0x19e/0x200\n driver_detach+0x48/0x90\n bus_remove_driver+0x6d/0xf0\n pci_unregister_driver+0x2e/0xb0\n __do_sys_delete_module.isra.0+0x197/0x2e0\n do_syscall_64+0x7b/0x160\n entry_SYSCALL_64_after_hwframe+0x76/0x7e\n\nTested with mt7921e but the same pattern can be actually applied to other\nmt76 drivers calling mt76_dma_cleanup() during removal. Tx napi is enabled\nin their *_dma_init() functions and only toggled off and on again inside\ntheir suspend/resume/reset paths. So it should be okay to disable tx\nnapi in such a generic way.\n\nFound by Linux Verification Center (linuxtesting.org).",
					"category":"description",
					"title":"Vulnerability Description"
				}
			],
			"product_status":{
				"fixed":[
					"openEuler-24.03-LTS:kernel-6.6.0-107.0.0.99.oe2403.src",
					"openEuler-24.03-LTS:bpftool-6.6.0-107.0.0.99.oe2403.aarch64",
					"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-107.0.0.99.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-6.6.0-107.0.0.99.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-107.0.0.99.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-debugsource-6.6.0-107.0.0.99.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-devel-6.6.0-107.0.0.99.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-headers-6.6.0-107.0.0.99.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-source-6.6.0-107.0.0.99.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-tools-6.6.0-107.0.0.99.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-107.0.0.99.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-107.0.0.99.oe2403.aarch64",
					"openEuler-24.03-LTS:perf-6.6.0-107.0.0.99.oe2403.aarch64",
					"openEuler-24.03-LTS:perf-debuginfo-6.6.0-107.0.0.99.oe2403.aarch64",
					"openEuler-24.03-LTS:python3-perf-6.6.0-107.0.0.99.oe2403.aarch64",
					"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-107.0.0.99.oe2403.aarch64",
					"openEuler-24.03-LTS:bpftool-6.6.0-107.0.0.99.oe2403.x86_64",
					"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-107.0.0.99.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-6.6.0-107.0.0.99.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-107.0.0.99.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-debugsource-6.6.0-107.0.0.99.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-devel-6.6.0-107.0.0.99.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-headers-6.6.0-107.0.0.99.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-source-6.6.0-107.0.0.99.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-tools-6.6.0-107.0.0.99.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-107.0.0.99.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-107.0.0.99.oe2403.x86_64",
					"openEuler-24.03-LTS:perf-6.6.0-107.0.0.99.oe2403.x86_64",
					"openEuler-24.03-LTS:perf-debuginfo-6.6.0-107.0.0.99.oe2403.x86_64",
					"openEuler-24.03-LTS:python3-perf-6.6.0-107.0.0.99.oe2403.x86_64",
					"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-107.0.0.99.oe2403.x86_64"
				]
			},
			"remediations":[
				{
					"product_ids":[
						"openEuler-24.03-LTS:kernel-6.6.0-107.0.0.99.oe2403.src",
						"openEuler-24.03-LTS:bpftool-6.6.0-107.0.0.99.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-107.0.0.99.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-6.6.0-107.0.0.99.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-107.0.0.99.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-107.0.0.99.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-107.0.0.99.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-107.0.0.99.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-107.0.0.99.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-107.0.0.99.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-107.0.0.99.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-107.0.0.99.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-6.6.0-107.0.0.99.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-107.0.0.99.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-107.0.0.99.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-107.0.0.99.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-6.6.0-107.0.0.99.oe2403.x86_64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-107.0.0.99.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-6.6.0-107.0.0.99.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-107.0.0.99.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-107.0.0.99.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-107.0.0.99.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-107.0.0.99.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-107.0.0.99.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-107.0.0.99.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-107.0.0.99.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-107.0.0.99.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-6.6.0-107.0.0.99.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-107.0.0.99.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-107.0.0.99.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-107.0.0.99.oe2403.x86_64"
					],
					"details":"kernel security update",
					"category":"vendor_fix",
					"url":"https://www.openeuler.org/zh/security/security-bulletins/detail/?id=openEuler-SA-2025-2077"
				}
			],
			"scores":[
				{
					"cvss_v3":{
						"baseSeverity":"MEDIUM",
						"baseScore":4.6,
						"vectorString":"CVSS:3.1/AV:A/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:L",
						"version":"3.1"
					},
					"products":[
						"openEuler-24.03-LTS:kernel-6.6.0-107.0.0.99.oe2403.src",
						"openEuler-24.03-LTS:bpftool-6.6.0-107.0.0.99.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-107.0.0.99.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-6.6.0-107.0.0.99.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-107.0.0.99.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-107.0.0.99.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-107.0.0.99.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-107.0.0.99.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-107.0.0.99.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-107.0.0.99.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-107.0.0.99.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-107.0.0.99.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-6.6.0-107.0.0.99.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-107.0.0.99.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-107.0.0.99.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-107.0.0.99.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-6.6.0-107.0.0.99.oe2403.x86_64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-107.0.0.99.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-6.6.0-107.0.0.99.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-107.0.0.99.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-107.0.0.99.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-107.0.0.99.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-107.0.0.99.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-107.0.0.99.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-107.0.0.99.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-107.0.0.99.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-107.0.0.99.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-6.6.0-107.0.0.99.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-107.0.0.99.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-107.0.0.99.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-107.0.0.99.oe2403.x86_64"
					]
				}
			],
			"threats":[
				{
					"details":"Medium",
					"category":"impact"
				}
			],
			"title":"CVE-2025-38009"
		},
		{
			"cve":"CVE-2025-38013",
			"notes":[
				{
					"text":"In the Linux kernel, the following vulnerability has been resolved:\n\nwifi: mac80211: Set n_channels after allocating struct cfg80211_scan_request\n\nMake sure that n_channels is set after allocating the\nstruct cfg80211_registered_device::int_scan_req member. Seen with\nsyzkaller:\n\nUBSAN: array-index-out-of-bounds in net/mac80211/scan.c:1208:5\nindex 0 is out of range for type 'struct ieee80211_channel *[] __counted_by(n_channels)' (aka 'struct ieee80211_channel *[]')\n\nThis was missed in the initial conversions because I failed to locate\nthe allocation likely due to the \"sizeof(void *)\" not matching the\n\"channels\" array type.",
					"category":"description",
					"title":"Vulnerability Description"
				}
			],
			"product_status":{
				"fixed":[
					"openEuler-24.03-LTS:kernel-6.6.0-107.0.0.99.oe2403.src",
					"openEuler-24.03-LTS:bpftool-6.6.0-107.0.0.99.oe2403.aarch64",
					"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-107.0.0.99.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-6.6.0-107.0.0.99.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-107.0.0.99.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-debugsource-6.6.0-107.0.0.99.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-devel-6.6.0-107.0.0.99.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-headers-6.6.0-107.0.0.99.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-source-6.6.0-107.0.0.99.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-tools-6.6.0-107.0.0.99.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-107.0.0.99.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-107.0.0.99.oe2403.aarch64",
					"openEuler-24.03-LTS:perf-6.6.0-107.0.0.99.oe2403.aarch64",
					"openEuler-24.03-LTS:perf-debuginfo-6.6.0-107.0.0.99.oe2403.aarch64",
					"openEuler-24.03-LTS:python3-perf-6.6.0-107.0.0.99.oe2403.aarch64",
					"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-107.0.0.99.oe2403.aarch64",
					"openEuler-24.03-LTS:bpftool-6.6.0-107.0.0.99.oe2403.x86_64",
					"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-107.0.0.99.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-6.6.0-107.0.0.99.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-107.0.0.99.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-debugsource-6.6.0-107.0.0.99.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-devel-6.6.0-107.0.0.99.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-headers-6.6.0-107.0.0.99.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-source-6.6.0-107.0.0.99.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-tools-6.6.0-107.0.0.99.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-107.0.0.99.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-107.0.0.99.oe2403.x86_64",
					"openEuler-24.03-LTS:perf-6.6.0-107.0.0.99.oe2403.x86_64",
					"openEuler-24.03-LTS:perf-debuginfo-6.6.0-107.0.0.99.oe2403.x86_64",
					"openEuler-24.03-LTS:python3-perf-6.6.0-107.0.0.99.oe2403.x86_64",
					"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-107.0.0.99.oe2403.x86_64"
				]
			},
			"remediations":[
				{
					"product_ids":[
						"openEuler-24.03-LTS:kernel-6.6.0-107.0.0.99.oe2403.src",
						"openEuler-24.03-LTS:bpftool-6.6.0-107.0.0.99.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-107.0.0.99.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-6.6.0-107.0.0.99.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-107.0.0.99.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-107.0.0.99.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-107.0.0.99.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-107.0.0.99.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-107.0.0.99.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-107.0.0.99.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-107.0.0.99.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-107.0.0.99.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-6.6.0-107.0.0.99.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-107.0.0.99.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-107.0.0.99.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-107.0.0.99.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-6.6.0-107.0.0.99.oe2403.x86_64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-107.0.0.99.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-6.6.0-107.0.0.99.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-107.0.0.99.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-107.0.0.99.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-107.0.0.99.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-107.0.0.99.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-107.0.0.99.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-107.0.0.99.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-107.0.0.99.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-107.0.0.99.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-6.6.0-107.0.0.99.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-107.0.0.99.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-107.0.0.99.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-107.0.0.99.oe2403.x86_64"
					],
					"details":"kernel security update",
					"category":"vendor_fix",
					"url":"https://www.openeuler.org/zh/security/security-bulletins/detail/?id=openEuler-SA-2025-2077"
				}
			],
			"scores":[
				{
					"cvss_v3":{
						"baseSeverity":"MEDIUM",
						"baseScore":6.6,
						"vectorString":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H",
						"version":"3.1"
					},
					"products":[
						"openEuler-24.03-LTS:kernel-6.6.0-107.0.0.99.oe2403.src",
						"openEuler-24.03-LTS:bpftool-6.6.0-107.0.0.99.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-107.0.0.99.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-6.6.0-107.0.0.99.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-107.0.0.99.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-107.0.0.99.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-107.0.0.99.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-107.0.0.99.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-107.0.0.99.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-107.0.0.99.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-107.0.0.99.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-107.0.0.99.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-6.6.0-107.0.0.99.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-107.0.0.99.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-107.0.0.99.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-107.0.0.99.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-6.6.0-107.0.0.99.oe2403.x86_64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-107.0.0.99.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-6.6.0-107.0.0.99.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-107.0.0.99.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-107.0.0.99.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-107.0.0.99.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-107.0.0.99.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-107.0.0.99.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-107.0.0.99.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-107.0.0.99.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-107.0.0.99.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-6.6.0-107.0.0.99.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-107.0.0.99.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-107.0.0.99.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-107.0.0.99.oe2403.x86_64"
					]
				}
			],
			"threats":[
				{
					"details":"Medium",
					"category":"impact"
				}
			],
			"title":"CVE-2025-38013"
		},
		{
			"cve":"CVE-2025-38045",
			"notes":[
				{
					"text":"In the Linux kernel, the following vulnerability has been resolved:\n\nwifi: iwlwifi: fix debug actions order\n\nThe order of actions taken for debug was implemented incorrectly.\nNow we implemented the dump split and do the FW reset only in the\nmiddle of the dump (rather than the FW killing itself on error.)\nAs a result, some of the actions taken when applying the config\nwill now crash the device, so we need to fix the order.",
					"category":"description",
					"title":"Vulnerability Description"
				}
			],
			"product_status":{
				"fixed":[
					"openEuler-24.03-LTS:kernel-6.6.0-107.0.0.99.oe2403.src",
					"openEuler-24.03-LTS:bpftool-6.6.0-107.0.0.99.oe2403.aarch64",
					"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-107.0.0.99.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-6.6.0-107.0.0.99.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-107.0.0.99.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-debugsource-6.6.0-107.0.0.99.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-devel-6.6.0-107.0.0.99.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-headers-6.6.0-107.0.0.99.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-source-6.6.0-107.0.0.99.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-tools-6.6.0-107.0.0.99.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-107.0.0.99.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-107.0.0.99.oe2403.aarch64",
					"openEuler-24.03-LTS:perf-6.6.0-107.0.0.99.oe2403.aarch64",
					"openEuler-24.03-LTS:perf-debuginfo-6.6.0-107.0.0.99.oe2403.aarch64",
					"openEuler-24.03-LTS:python3-perf-6.6.0-107.0.0.99.oe2403.aarch64",
					"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-107.0.0.99.oe2403.aarch64",
					"openEuler-24.03-LTS:bpftool-6.6.0-107.0.0.99.oe2403.x86_64",
					"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-107.0.0.99.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-6.6.0-107.0.0.99.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-107.0.0.99.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-debugsource-6.6.0-107.0.0.99.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-devel-6.6.0-107.0.0.99.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-headers-6.6.0-107.0.0.99.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-source-6.6.0-107.0.0.99.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-tools-6.6.0-107.0.0.99.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-107.0.0.99.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-107.0.0.99.oe2403.x86_64",
					"openEuler-24.03-LTS:perf-6.6.0-107.0.0.99.oe2403.x86_64",
					"openEuler-24.03-LTS:perf-debuginfo-6.6.0-107.0.0.99.oe2403.x86_64",
					"openEuler-24.03-LTS:python3-perf-6.6.0-107.0.0.99.oe2403.x86_64",
					"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-107.0.0.99.oe2403.x86_64"
				]
			},
			"remediations":[
				{
					"product_ids":[
						"openEuler-24.03-LTS:kernel-6.6.0-107.0.0.99.oe2403.src",
						"openEuler-24.03-LTS:bpftool-6.6.0-107.0.0.99.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-107.0.0.99.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-6.6.0-107.0.0.99.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-107.0.0.99.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-107.0.0.99.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-107.0.0.99.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-107.0.0.99.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-107.0.0.99.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-107.0.0.99.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-107.0.0.99.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-107.0.0.99.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-6.6.0-107.0.0.99.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-107.0.0.99.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-107.0.0.99.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-107.0.0.99.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-6.6.0-107.0.0.99.oe2403.x86_64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-107.0.0.99.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-6.6.0-107.0.0.99.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-107.0.0.99.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-107.0.0.99.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-107.0.0.99.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-107.0.0.99.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-107.0.0.99.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-107.0.0.99.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-107.0.0.99.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-107.0.0.99.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-6.6.0-107.0.0.99.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-107.0.0.99.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-107.0.0.99.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-107.0.0.99.oe2403.x86_64"
					],
					"details":"kernel security update",
					"category":"vendor_fix",
					"url":"https://www.openeuler.org/zh/security/security-bulletins/detail/?id=openEuler-SA-2025-2077"
				}
			],
			"scores":[
				{
					"cvss_v3":{
						"baseSeverity":"LOW",
						"baseScore":2.3,
						"vectorString":"CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:L",
						"version":"3.1"
					},
					"products":[
						"openEuler-24.03-LTS:kernel-6.6.0-107.0.0.99.oe2403.src",
						"openEuler-24.03-LTS:bpftool-6.6.0-107.0.0.99.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-107.0.0.99.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-6.6.0-107.0.0.99.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-107.0.0.99.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-107.0.0.99.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-107.0.0.99.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-107.0.0.99.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-107.0.0.99.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-107.0.0.99.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-107.0.0.99.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-107.0.0.99.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-6.6.0-107.0.0.99.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-107.0.0.99.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-107.0.0.99.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-107.0.0.99.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-6.6.0-107.0.0.99.oe2403.x86_64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-107.0.0.99.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-6.6.0-107.0.0.99.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-107.0.0.99.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-107.0.0.99.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-107.0.0.99.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-107.0.0.99.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-107.0.0.99.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-107.0.0.99.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-107.0.0.99.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-107.0.0.99.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-6.6.0-107.0.0.99.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-107.0.0.99.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-107.0.0.99.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-107.0.0.99.oe2403.x86_64"
					]
				}
			],
			"threats":[
				{
					"details":"Low",
					"category":"impact"
				}
			],
			"title":"CVE-2025-38045"
		},
		{
			"cve":"CVE-2025-38052",
			"notes":[
				{
					"text":"In the Linux kernel, the following vulnerability has been resolved:\n\nnet/tipc: fix slab-use-after-free Read in tipc_aead_encrypt_done\n\nSyzbot reported a slab-use-after-free with the following call trace:\n\n  ==================================================================\n  BUG: KASAN: slab-use-after-free in tipc_aead_encrypt_done+0x4bd/0x510 net/tipc/crypto.c:840\n  Read of size 8 at addr ffff88807a733000 by task kworker/1:0/25\n\n  Call Trace:\n   kasan_report+0xd9/0x110 mm/kasan/report.c:601\n   tipc_aead_encrypt_done+0x4bd/0x510 net/tipc/crypto.c:840\n   crypto_request_complete include/crypto/algapi.h:266\n   aead_request_complete include/crypto/internal/aead.h:85\n   cryptd_aead_crypt+0x3b8/0x750 crypto/cryptd.c:772\n   crypto_request_complete include/crypto/algapi.h:266\n   cryptd_queue_worker+0x131/0x200 crypto/cryptd.c:181\n   process_one_work+0x9fb/0x1b60 kernel/workqueue.c:3231\n\n  Allocated by task 8355:\n   kzalloc_noprof include/linux/slab.h:778\n   tipc_crypto_start+0xcc/0x9e0 net/tipc/crypto.c:1466\n   tipc_init_net+0x2dd/0x430 net/tipc/core.c:72\n   ops_init+0xb9/0x650 net/core/net_namespace.c:139\n   setup_net+0x435/0xb40 net/core/net_namespace.c:343\n   copy_net_ns+0x2f0/0x670 net/core/net_namespace.c:508\n   create_new_namespaces+0x3ea/0xb10 kernel/nsproxy.c:110\n   unshare_nsproxy_namespaces+0xc0/0x1f0 kernel/nsproxy.c:228\n   ksys_unshare+0x419/0x970 kernel/fork.c:3323\n   __do_sys_unshare kernel/fork.c:3394\n\n  Freed by task 63:\n   kfree+0x12a/0x3b0 mm/slub.c:4557\n   tipc_crypto_stop+0x23c/0x500 net/tipc/crypto.c:1539\n   tipc_exit_net+0x8c/0x110 net/tipc/core.c:119\n   ops_exit_list+0xb0/0x180 net/core/net_namespace.c:173\n   cleanup_net+0x5b7/0xbf0 net/core/net_namespace.c:640\n   process_one_work+0x9fb/0x1b60 kernel/workqueue.c:3231\n\nAfter freed the tipc_crypto tx by delete namespace, tipc_aead_encrypt_done\nmay still visit it in cryptd_queue_worker workqueue.\n\nI reproduce this issue by:\n  ip netns add ns1\n  ip link add veth1 type veth peer name veth2\n  ip link set veth1 netns ns1\n  ip netns exec ns1 tipc bearer enable media eth dev veth1\n  ip netns exec ns1 tipc node set key this_is_a_master_key master\n  ip netns exec ns1 tipc bearer disable media eth dev veth1\n  ip netns del ns1\n\nThe key of reproduction is that, simd_aead_encrypt is interrupted, leading\nto crypto_simd_usable() return false. Thus, the cryptd_queue_worker is\ntriggered, and the tipc_crypto tx will be visited.\n\n  tipc_disc_timeout\n    tipc_bearer_xmit_skb\n      tipc_crypto_xmit\n        tipc_aead_encrypt\n          crypto_aead_encrypt\n            // encrypt()\n            simd_aead_encrypt\n              // crypto_simd_usable() is false\n              child = &ctx->cryptd_tfm->base;\n\n  simd_aead_encrypt\n    crypto_aead_encrypt\n      // encrypt()\n      cryptd_aead_encrypt_enqueue\n        cryptd_aead_enqueue\n          cryptd_enqueue_request\n            // trigger cryptd_queue_worker\n            queue_work_on(smp_processor_id(), cryptd_wq, &cpu_queue->work)\n\nFix this by holding net reference count before encrypt.",
					"category":"description",
					"title":"Vulnerability Description"
				}
			],
			"product_status":{
				"fixed":[
					"openEuler-24.03-LTS:kernel-6.6.0-107.0.0.99.oe2403.src",
					"openEuler-24.03-LTS:bpftool-6.6.0-107.0.0.99.oe2403.aarch64",
					"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-107.0.0.99.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-6.6.0-107.0.0.99.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-107.0.0.99.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-debugsource-6.6.0-107.0.0.99.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-devel-6.6.0-107.0.0.99.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-headers-6.6.0-107.0.0.99.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-source-6.6.0-107.0.0.99.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-tools-6.6.0-107.0.0.99.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-107.0.0.99.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-107.0.0.99.oe2403.aarch64",
					"openEuler-24.03-LTS:perf-6.6.0-107.0.0.99.oe2403.aarch64",
					"openEuler-24.03-LTS:perf-debuginfo-6.6.0-107.0.0.99.oe2403.aarch64",
					"openEuler-24.03-LTS:python3-perf-6.6.0-107.0.0.99.oe2403.aarch64",
					"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-107.0.0.99.oe2403.aarch64",
					"openEuler-24.03-LTS:bpftool-6.6.0-107.0.0.99.oe2403.x86_64",
					"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-107.0.0.99.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-6.6.0-107.0.0.99.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-107.0.0.99.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-debugsource-6.6.0-107.0.0.99.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-devel-6.6.0-107.0.0.99.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-headers-6.6.0-107.0.0.99.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-source-6.6.0-107.0.0.99.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-tools-6.6.0-107.0.0.99.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-107.0.0.99.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-107.0.0.99.oe2403.x86_64",
					"openEuler-24.03-LTS:perf-6.6.0-107.0.0.99.oe2403.x86_64",
					"openEuler-24.03-LTS:perf-debuginfo-6.6.0-107.0.0.99.oe2403.x86_64",
					"openEuler-24.03-LTS:python3-perf-6.6.0-107.0.0.99.oe2403.x86_64",
					"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-107.0.0.99.oe2403.x86_64"
				]
			},
			"remediations":[
				{
					"product_ids":[
						"openEuler-24.03-LTS:kernel-6.6.0-107.0.0.99.oe2403.src",
						"openEuler-24.03-LTS:bpftool-6.6.0-107.0.0.99.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-107.0.0.99.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-6.6.0-107.0.0.99.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-107.0.0.99.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-107.0.0.99.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-107.0.0.99.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-107.0.0.99.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-107.0.0.99.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-107.0.0.99.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-107.0.0.99.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-107.0.0.99.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-6.6.0-107.0.0.99.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-107.0.0.99.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-107.0.0.99.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-107.0.0.99.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-6.6.0-107.0.0.99.oe2403.x86_64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-107.0.0.99.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-6.6.0-107.0.0.99.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-107.0.0.99.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-107.0.0.99.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-107.0.0.99.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-107.0.0.99.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-107.0.0.99.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-107.0.0.99.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-107.0.0.99.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-107.0.0.99.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-6.6.0-107.0.0.99.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-107.0.0.99.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-107.0.0.99.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-107.0.0.99.oe2403.x86_64"
					],
					"details":"kernel security update",
					"category":"vendor_fix",
					"url":"https://www.openeuler.org/zh/security/security-bulletins/detail/?id=openEuler-SA-2025-2077"
				}
			],
			"scores":[
				{
					"cvss_v3":{
						"baseSeverity":"HIGH",
						"baseScore":7.8,
						"vectorString":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
						"version":"3.1"
					},
					"products":[
						"openEuler-24.03-LTS:kernel-6.6.0-107.0.0.99.oe2403.src",
						"openEuler-24.03-LTS:bpftool-6.6.0-107.0.0.99.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-107.0.0.99.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-6.6.0-107.0.0.99.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-107.0.0.99.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-107.0.0.99.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-107.0.0.99.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-107.0.0.99.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-107.0.0.99.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-107.0.0.99.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-107.0.0.99.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-107.0.0.99.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-6.6.0-107.0.0.99.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-107.0.0.99.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-107.0.0.99.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-107.0.0.99.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-6.6.0-107.0.0.99.oe2403.x86_64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-107.0.0.99.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-6.6.0-107.0.0.99.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-107.0.0.99.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-107.0.0.99.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-107.0.0.99.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-107.0.0.99.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-107.0.0.99.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-107.0.0.99.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-107.0.0.99.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-107.0.0.99.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-6.6.0-107.0.0.99.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-107.0.0.99.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-107.0.0.99.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-107.0.0.99.oe2403.x86_64"
					]
				}
			],
			"threats":[
				{
					"details":"High",
					"category":"impact"
				}
			],
			"title":"CVE-2025-38052"
		},
		{
			"cve":"CVE-2025-38068",
			"notes":[
				{
					"text":"In the Linux kernel, the following vulnerability has been resolved:\n\ncrypto: lzo - Fix compression buffer overrun\n\nUnlike the decompression code, the compression code in LZO never\nchecked for output overruns.  It instead assumes that the caller\nalways provides enough buffer space, disregarding the buffer length\nprovided by the caller.\n\nAdd a safe compression interface that checks for the end of buffer\nbefore each write.  Use the safe interface in crypto/lzo.",
					"category":"description",
					"title":"Vulnerability Description"
				}
			],
			"product_status":{
				"fixed":[
					"openEuler-24.03-LTS:kernel-6.6.0-107.0.0.99.oe2403.src",
					"openEuler-24.03-LTS:bpftool-6.6.0-107.0.0.99.oe2403.aarch64",
					"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-107.0.0.99.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-6.6.0-107.0.0.99.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-107.0.0.99.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-debugsource-6.6.0-107.0.0.99.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-devel-6.6.0-107.0.0.99.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-headers-6.6.0-107.0.0.99.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-source-6.6.0-107.0.0.99.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-tools-6.6.0-107.0.0.99.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-107.0.0.99.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-107.0.0.99.oe2403.aarch64",
					"openEuler-24.03-LTS:perf-6.6.0-107.0.0.99.oe2403.aarch64",
					"openEuler-24.03-LTS:perf-debuginfo-6.6.0-107.0.0.99.oe2403.aarch64",
					"openEuler-24.03-LTS:python3-perf-6.6.0-107.0.0.99.oe2403.aarch64",
					"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-107.0.0.99.oe2403.aarch64",
					"openEuler-24.03-LTS:bpftool-6.6.0-107.0.0.99.oe2403.x86_64",
					"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-107.0.0.99.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-6.6.0-107.0.0.99.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-107.0.0.99.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-debugsource-6.6.0-107.0.0.99.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-devel-6.6.0-107.0.0.99.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-headers-6.6.0-107.0.0.99.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-source-6.6.0-107.0.0.99.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-tools-6.6.0-107.0.0.99.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-107.0.0.99.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-107.0.0.99.oe2403.x86_64",
					"openEuler-24.03-LTS:perf-6.6.0-107.0.0.99.oe2403.x86_64",
					"openEuler-24.03-LTS:perf-debuginfo-6.6.0-107.0.0.99.oe2403.x86_64",
					"openEuler-24.03-LTS:python3-perf-6.6.0-107.0.0.99.oe2403.x86_64",
					"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-107.0.0.99.oe2403.x86_64"
				]
			},
			"remediations":[
				{
					"product_ids":[
						"openEuler-24.03-LTS:kernel-6.6.0-107.0.0.99.oe2403.src",
						"openEuler-24.03-LTS:bpftool-6.6.0-107.0.0.99.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-107.0.0.99.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-6.6.0-107.0.0.99.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-107.0.0.99.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-107.0.0.99.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-107.0.0.99.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-107.0.0.99.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-107.0.0.99.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-107.0.0.99.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-107.0.0.99.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-107.0.0.99.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-6.6.0-107.0.0.99.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-107.0.0.99.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-107.0.0.99.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-107.0.0.99.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-6.6.0-107.0.0.99.oe2403.x86_64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-107.0.0.99.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-6.6.0-107.0.0.99.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-107.0.0.99.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-107.0.0.99.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-107.0.0.99.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-107.0.0.99.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-107.0.0.99.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-107.0.0.99.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-107.0.0.99.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-107.0.0.99.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-6.6.0-107.0.0.99.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-107.0.0.99.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-107.0.0.99.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-107.0.0.99.oe2403.x86_64"
					],
					"details":"kernel security update",
					"category":"vendor_fix",
					"url":"https://www.openeuler.org/zh/security/security-bulletins/detail/?id=openEuler-SA-2025-2077"
				}
			],
			"scores":[
				{
					"cvss_v3":{
						"baseSeverity":"MEDIUM",
						"baseScore":6.1,
						"vectorString":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H",
						"version":"3.1"
					},
					"products":[
						"openEuler-24.03-LTS:kernel-6.6.0-107.0.0.99.oe2403.src",
						"openEuler-24.03-LTS:bpftool-6.6.0-107.0.0.99.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-107.0.0.99.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-6.6.0-107.0.0.99.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-107.0.0.99.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-107.0.0.99.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-107.0.0.99.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-107.0.0.99.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-107.0.0.99.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-107.0.0.99.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-107.0.0.99.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-107.0.0.99.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-6.6.0-107.0.0.99.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-107.0.0.99.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-107.0.0.99.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-107.0.0.99.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-6.6.0-107.0.0.99.oe2403.x86_64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-107.0.0.99.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-6.6.0-107.0.0.99.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-107.0.0.99.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-107.0.0.99.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-107.0.0.99.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-107.0.0.99.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-107.0.0.99.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-107.0.0.99.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-107.0.0.99.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-107.0.0.99.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-6.6.0-107.0.0.99.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-107.0.0.99.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-107.0.0.99.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-107.0.0.99.oe2403.x86_64"
					]
				}
			],
			"threats":[
				{
					"details":"Medium",
					"category":"impact"
				}
			],
			"title":"CVE-2025-38068"
		},
		{
			"cve":"CVE-2025-38088",
			"notes":[
				{
					"text":"In the Linux kernel, the following vulnerability has been resolved:\n\npowerpc/powernv/memtrace: Fix out of bounds issue in memtrace mmap\n\nmemtrace mmap issue has an out of bounds issue. This patch fixes the by\nchecking that the requested mapping region size should stay within the\nallocated region size.",
					"category":"description",
					"title":"Vulnerability Description"
				}
			],
			"product_status":{
				"fixed":[
					"openEuler-24.03-LTS:kernel-6.6.0-107.0.0.99.oe2403.src",
					"openEuler-24.03-LTS:bpftool-6.6.0-107.0.0.99.oe2403.aarch64",
					"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-107.0.0.99.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-6.6.0-107.0.0.99.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-107.0.0.99.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-debugsource-6.6.0-107.0.0.99.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-devel-6.6.0-107.0.0.99.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-headers-6.6.0-107.0.0.99.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-source-6.6.0-107.0.0.99.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-tools-6.6.0-107.0.0.99.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-107.0.0.99.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-107.0.0.99.oe2403.aarch64",
					"openEuler-24.03-LTS:perf-6.6.0-107.0.0.99.oe2403.aarch64",
					"openEuler-24.03-LTS:perf-debuginfo-6.6.0-107.0.0.99.oe2403.aarch64",
					"openEuler-24.03-LTS:python3-perf-6.6.0-107.0.0.99.oe2403.aarch64",
					"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-107.0.0.99.oe2403.aarch64",
					"openEuler-24.03-LTS:bpftool-6.6.0-107.0.0.99.oe2403.x86_64",
					"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-107.0.0.99.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-6.6.0-107.0.0.99.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-107.0.0.99.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-debugsource-6.6.0-107.0.0.99.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-devel-6.6.0-107.0.0.99.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-headers-6.6.0-107.0.0.99.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-source-6.6.0-107.0.0.99.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-tools-6.6.0-107.0.0.99.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-107.0.0.99.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-107.0.0.99.oe2403.x86_64",
					"openEuler-24.03-LTS:perf-6.6.0-107.0.0.99.oe2403.x86_64",
					"openEuler-24.03-LTS:perf-debuginfo-6.6.0-107.0.0.99.oe2403.x86_64",
					"openEuler-24.03-LTS:python3-perf-6.6.0-107.0.0.99.oe2403.x86_64",
					"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-107.0.0.99.oe2403.x86_64"
				]
			},
			"remediations":[
				{
					"product_ids":[
						"openEuler-24.03-LTS:kernel-6.6.0-107.0.0.99.oe2403.src",
						"openEuler-24.03-LTS:bpftool-6.6.0-107.0.0.99.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-107.0.0.99.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-6.6.0-107.0.0.99.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-107.0.0.99.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-107.0.0.99.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-107.0.0.99.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-107.0.0.99.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-107.0.0.99.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-107.0.0.99.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-107.0.0.99.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-107.0.0.99.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-6.6.0-107.0.0.99.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-107.0.0.99.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-107.0.0.99.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-107.0.0.99.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-6.6.0-107.0.0.99.oe2403.x86_64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-107.0.0.99.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-6.6.0-107.0.0.99.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-107.0.0.99.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-107.0.0.99.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-107.0.0.99.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-107.0.0.99.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-107.0.0.99.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-107.0.0.99.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-107.0.0.99.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-107.0.0.99.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-6.6.0-107.0.0.99.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-107.0.0.99.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-107.0.0.99.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-107.0.0.99.oe2403.x86_64"
					],
					"details":"kernel security update",
					"category":"vendor_fix",
					"url":"https://www.openeuler.org/zh/security/security-bulletins/detail/?id=openEuler-SA-2025-2077"
				}
			],
			"scores":[
				{
					"cvss_v3":{
						"baseSeverity":"LOW",
						"baseScore":3.9,
						"vectorString":"CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:L/I:L/A:L",
						"version":"3.1"
					},
					"products":[
						"openEuler-24.03-LTS:kernel-6.6.0-107.0.0.99.oe2403.src",
						"openEuler-24.03-LTS:bpftool-6.6.0-107.0.0.99.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-107.0.0.99.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-6.6.0-107.0.0.99.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-107.0.0.99.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-107.0.0.99.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-107.0.0.99.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-107.0.0.99.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-107.0.0.99.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-107.0.0.99.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-107.0.0.99.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-107.0.0.99.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-6.6.0-107.0.0.99.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-107.0.0.99.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-107.0.0.99.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-107.0.0.99.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-6.6.0-107.0.0.99.oe2403.x86_64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-107.0.0.99.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-6.6.0-107.0.0.99.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-107.0.0.99.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-107.0.0.99.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-107.0.0.99.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-107.0.0.99.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-107.0.0.99.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-107.0.0.99.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-107.0.0.99.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-107.0.0.99.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-6.6.0-107.0.0.99.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-107.0.0.99.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-107.0.0.99.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-107.0.0.99.oe2403.x86_64"
					]
				}
			],
			"threats":[
				{
					"details":"Low",
					"category":"impact"
				}
			],
			"title":"CVE-2025-38088"
		},
		{
			"cve":"CVE-2025-38089",
			"notes":[
				{
					"text":"In the Linux kernel, the following vulnerability has been resolved:\n\nsunrpc: handle SVC_GARBAGE during svc auth processing as auth error\n\ntianshuo han reported a remotely-triggerable crash if the client sends a\nkernel RPC server a specially crafted packet. If decoding the RPC reply\nfails in such a way that SVC_GARBAGE is returned without setting the\nrq_accept_statp pointer, then that pointer can be dereferenced and a\nvalue stored there.\n\nIf it's the first time the thread has processed an RPC, then that\npointer will be set to NULL and the kernel will crash. In other cases,\nit could create a memory scribble.\n\nThe server sunrpc code treats a SVC_GARBAGE return from svc_authenticate\nor pg_authenticate as if it should send a GARBAGE_ARGS reply. RFC 5531\nsays that if authentication fails that the RPC should be rejected\ninstead with a status of AUTH_ERR.\n\nHandle a SVC_GARBAGE return as an AUTH_ERROR, with a reason of\nAUTH_BADCRED instead of returning GARBAGE_ARGS in that case. This\nsidesteps the whole problem of touching the rpc_accept_statp pointer in\nthis situation and avoids the crash.",
					"category":"description",
					"title":"Vulnerability Description"
				}
			],
			"product_status":{
				"fixed":[
					"openEuler-24.03-LTS:kernel-6.6.0-107.0.0.99.oe2403.src",
					"openEuler-24.03-LTS:bpftool-6.6.0-107.0.0.99.oe2403.aarch64",
					"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-107.0.0.99.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-6.6.0-107.0.0.99.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-107.0.0.99.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-debugsource-6.6.0-107.0.0.99.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-devel-6.6.0-107.0.0.99.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-headers-6.6.0-107.0.0.99.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-source-6.6.0-107.0.0.99.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-tools-6.6.0-107.0.0.99.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-107.0.0.99.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-107.0.0.99.oe2403.aarch64",
					"openEuler-24.03-LTS:perf-6.6.0-107.0.0.99.oe2403.aarch64",
					"openEuler-24.03-LTS:perf-debuginfo-6.6.0-107.0.0.99.oe2403.aarch64",
					"openEuler-24.03-LTS:python3-perf-6.6.0-107.0.0.99.oe2403.aarch64",
					"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-107.0.0.99.oe2403.aarch64",
					"openEuler-24.03-LTS:bpftool-6.6.0-107.0.0.99.oe2403.x86_64",
					"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-107.0.0.99.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-6.6.0-107.0.0.99.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-107.0.0.99.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-debugsource-6.6.0-107.0.0.99.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-devel-6.6.0-107.0.0.99.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-headers-6.6.0-107.0.0.99.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-source-6.6.0-107.0.0.99.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-tools-6.6.0-107.0.0.99.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-107.0.0.99.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-107.0.0.99.oe2403.x86_64",
					"openEuler-24.03-LTS:perf-6.6.0-107.0.0.99.oe2403.x86_64",
					"openEuler-24.03-LTS:perf-debuginfo-6.6.0-107.0.0.99.oe2403.x86_64",
					"openEuler-24.03-LTS:python3-perf-6.6.0-107.0.0.99.oe2403.x86_64",
					"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-107.0.0.99.oe2403.x86_64"
				]
			},
			"remediations":[
				{
					"product_ids":[
						"openEuler-24.03-LTS:kernel-6.6.0-107.0.0.99.oe2403.src",
						"openEuler-24.03-LTS:bpftool-6.6.0-107.0.0.99.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-107.0.0.99.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-6.6.0-107.0.0.99.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-107.0.0.99.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-107.0.0.99.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-107.0.0.99.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-107.0.0.99.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-107.0.0.99.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-107.0.0.99.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-107.0.0.99.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-107.0.0.99.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-6.6.0-107.0.0.99.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-107.0.0.99.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-107.0.0.99.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-107.0.0.99.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-6.6.0-107.0.0.99.oe2403.x86_64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-107.0.0.99.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-6.6.0-107.0.0.99.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-107.0.0.99.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-107.0.0.99.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-107.0.0.99.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-107.0.0.99.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-107.0.0.99.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-107.0.0.99.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-107.0.0.99.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-107.0.0.99.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-6.6.0-107.0.0.99.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-107.0.0.99.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-107.0.0.99.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-107.0.0.99.oe2403.x86_64"
					],
					"details":"kernel security update",
					"category":"vendor_fix",
					"url":"https://www.openeuler.org/zh/security/security-bulletins/detail/?id=openEuler-SA-2025-2077"
				}
			],
			"scores":[
				{
					"cvss_v3":{
						"baseSeverity":"HIGH",
						"baseScore":7.5,
						"vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
						"version":"3.1"
					},
					"products":[
						"openEuler-24.03-LTS:kernel-6.6.0-107.0.0.99.oe2403.src",
						"openEuler-24.03-LTS:bpftool-6.6.0-107.0.0.99.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-107.0.0.99.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-6.6.0-107.0.0.99.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-107.0.0.99.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-107.0.0.99.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-107.0.0.99.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-107.0.0.99.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-107.0.0.99.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-107.0.0.99.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-107.0.0.99.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-107.0.0.99.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-6.6.0-107.0.0.99.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-107.0.0.99.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-107.0.0.99.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-107.0.0.99.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-6.6.0-107.0.0.99.oe2403.x86_64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-107.0.0.99.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-6.6.0-107.0.0.99.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-107.0.0.99.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-107.0.0.99.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-107.0.0.99.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-107.0.0.99.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-107.0.0.99.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-107.0.0.99.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-107.0.0.99.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-107.0.0.99.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-6.6.0-107.0.0.99.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-107.0.0.99.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-107.0.0.99.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-107.0.0.99.oe2403.x86_64"
					]
				}
			],
			"threats":[
				{
					"details":"High",
					"category":"impact"
				}
			],
			"title":"CVE-2025-38089"
		},
		{
			"cve":"CVE-2025-38112",
			"notes":[
				{
					"text":"Linux kernel is the kernel used by Linux, the open source operating system of the Linux Foundation in the United States.\n There is a security vulnerability in Linux kernel, which originates from the TOCTOU problem with the sk_is_readable function, which may cause the null pointer to be dereferenced.",
					"category":"description",
					"title":"Vulnerability Description"
				}
			],
			"product_status":{
				"fixed":[
					"openEuler-24.03-LTS:kernel-6.6.0-107.0.0.99.oe2403.src",
					"openEuler-24.03-LTS:bpftool-6.6.0-107.0.0.99.oe2403.aarch64",
					"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-107.0.0.99.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-6.6.0-107.0.0.99.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-107.0.0.99.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-debugsource-6.6.0-107.0.0.99.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-devel-6.6.0-107.0.0.99.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-headers-6.6.0-107.0.0.99.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-source-6.6.0-107.0.0.99.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-tools-6.6.0-107.0.0.99.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-107.0.0.99.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-107.0.0.99.oe2403.aarch64",
					"openEuler-24.03-LTS:perf-6.6.0-107.0.0.99.oe2403.aarch64",
					"openEuler-24.03-LTS:perf-debuginfo-6.6.0-107.0.0.99.oe2403.aarch64",
					"openEuler-24.03-LTS:python3-perf-6.6.0-107.0.0.99.oe2403.aarch64",
					"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-107.0.0.99.oe2403.aarch64",
					"openEuler-24.03-LTS:bpftool-6.6.0-107.0.0.99.oe2403.x86_64",
					"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-107.0.0.99.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-6.6.0-107.0.0.99.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-107.0.0.99.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-debugsource-6.6.0-107.0.0.99.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-devel-6.6.0-107.0.0.99.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-headers-6.6.0-107.0.0.99.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-source-6.6.0-107.0.0.99.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-tools-6.6.0-107.0.0.99.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-107.0.0.99.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-107.0.0.99.oe2403.x86_64",
					"openEuler-24.03-LTS:perf-6.6.0-107.0.0.99.oe2403.x86_64",
					"openEuler-24.03-LTS:perf-debuginfo-6.6.0-107.0.0.99.oe2403.x86_64",
					"openEuler-24.03-LTS:python3-perf-6.6.0-107.0.0.99.oe2403.x86_64",
					"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-107.0.0.99.oe2403.x86_64"
				]
			},
			"remediations":[
				{
					"product_ids":[
						"openEuler-24.03-LTS:kernel-6.6.0-107.0.0.99.oe2403.src",
						"openEuler-24.03-LTS:bpftool-6.6.0-107.0.0.99.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-107.0.0.99.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-6.6.0-107.0.0.99.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-107.0.0.99.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-107.0.0.99.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-107.0.0.99.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-107.0.0.99.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-107.0.0.99.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-107.0.0.99.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-107.0.0.99.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-107.0.0.99.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-6.6.0-107.0.0.99.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-107.0.0.99.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-107.0.0.99.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-107.0.0.99.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-6.6.0-107.0.0.99.oe2403.x86_64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-107.0.0.99.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-6.6.0-107.0.0.99.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-107.0.0.99.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-107.0.0.99.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-107.0.0.99.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-107.0.0.99.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-107.0.0.99.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-107.0.0.99.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-107.0.0.99.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-107.0.0.99.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-6.6.0-107.0.0.99.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-107.0.0.99.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-107.0.0.99.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-107.0.0.99.oe2403.x86_64"
					],
					"details":"kernel security update",
					"category":"vendor_fix",
					"url":"https://www.openeuler.org/zh/security/security-bulletins/detail/?id=openEuler-SA-2025-2077"
				}
			],
			"scores":[
				{
					"cvss_v3":{
						"baseSeverity":"MEDIUM",
						"baseScore":4.7,
						"vectorString":"CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H",
						"version":"3.1"
					},
					"products":[
						"openEuler-24.03-LTS:kernel-6.6.0-107.0.0.99.oe2403.src",
						"openEuler-24.03-LTS:bpftool-6.6.0-107.0.0.99.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-107.0.0.99.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-6.6.0-107.0.0.99.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-107.0.0.99.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-107.0.0.99.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-107.0.0.99.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-107.0.0.99.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-107.0.0.99.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-107.0.0.99.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-107.0.0.99.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-107.0.0.99.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-6.6.0-107.0.0.99.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-107.0.0.99.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-107.0.0.99.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-107.0.0.99.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-6.6.0-107.0.0.99.oe2403.x86_64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-107.0.0.99.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-6.6.0-107.0.0.99.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-107.0.0.99.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-107.0.0.99.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-107.0.0.99.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-107.0.0.99.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-107.0.0.99.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-107.0.0.99.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-107.0.0.99.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-107.0.0.99.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-6.6.0-107.0.0.99.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-107.0.0.99.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-107.0.0.99.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-107.0.0.99.oe2403.x86_64"
					]
				}
			],
			"threats":[
				{
					"details":"Medium",
					"category":"impact"
				}
			],
			"title":"CVE-2025-38112"
		},
		{
			"cve":"CVE-2025-38174",
			"notes":[
				{
					"text":"A vulnerability, which was classified as critical, was found in Linux Kernel up to 6.15.1 (Operating System).CWE is classifying the issue as CWE-404. The product does not release or incorrectly releases a resource before it is made available for re-use.This is going to have an impact on availability.Upgrading to version 5.4.295, 5.10.239, 5.15.186, 6.1.142, 6.6.94, 6.12.33, 6.14.11, 6.15.2 or 6.16-rc1 eliminates this vulnerability. Applying the patch e49e994cd83705f7ca30eda1e304abddfd96a37a/0a3011d47dbc92a33621861c423cb64833d7fe57/2f62eda4d974c26bc595425eafd429067541f2c9/85286e634ebbaf9c0fb1cdf580add2f33fc7628c/5a057f261539720165d03d85024da2b52e67f63d/eb2d5e794fb966b3ef8bde99eb8561446a53509f/0771bcbe2f6e5d5f263cf466efe571d2754a46da/cdb4feab2f39e75a66239e3a112beced279612a8/0f73628e9da1ee39daf5f188190cdbaee5e0c98c is able to eliminate this problem. The bugfix is ready for download at git.kernel.org. The best possible mitigation is suggested to be upgrading to the latest version.",
					"category":"description",
					"title":"Vulnerability Description"
				}
			],
			"product_status":{
				"fixed":[
					"openEuler-24.03-LTS:kernel-6.6.0-107.0.0.99.oe2403.src",
					"openEuler-24.03-LTS:bpftool-6.6.0-107.0.0.99.oe2403.aarch64",
					"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-107.0.0.99.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-6.6.0-107.0.0.99.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-107.0.0.99.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-debugsource-6.6.0-107.0.0.99.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-devel-6.6.0-107.0.0.99.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-headers-6.6.0-107.0.0.99.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-source-6.6.0-107.0.0.99.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-tools-6.6.0-107.0.0.99.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-107.0.0.99.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-107.0.0.99.oe2403.aarch64",
					"openEuler-24.03-LTS:perf-6.6.0-107.0.0.99.oe2403.aarch64",
					"openEuler-24.03-LTS:perf-debuginfo-6.6.0-107.0.0.99.oe2403.aarch64",
					"openEuler-24.03-LTS:python3-perf-6.6.0-107.0.0.99.oe2403.aarch64",
					"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-107.0.0.99.oe2403.aarch64",
					"openEuler-24.03-LTS:bpftool-6.6.0-107.0.0.99.oe2403.x86_64",
					"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-107.0.0.99.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-6.6.0-107.0.0.99.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-107.0.0.99.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-debugsource-6.6.0-107.0.0.99.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-devel-6.6.0-107.0.0.99.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-headers-6.6.0-107.0.0.99.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-source-6.6.0-107.0.0.99.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-tools-6.6.0-107.0.0.99.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-107.0.0.99.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-107.0.0.99.oe2403.x86_64",
					"openEuler-24.03-LTS:perf-6.6.0-107.0.0.99.oe2403.x86_64",
					"openEuler-24.03-LTS:perf-debuginfo-6.6.0-107.0.0.99.oe2403.x86_64",
					"openEuler-24.03-LTS:python3-perf-6.6.0-107.0.0.99.oe2403.x86_64",
					"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-107.0.0.99.oe2403.x86_64"
				]
			},
			"remediations":[
				{
					"product_ids":[
						"openEuler-24.03-LTS:kernel-6.6.0-107.0.0.99.oe2403.src",
						"openEuler-24.03-LTS:bpftool-6.6.0-107.0.0.99.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-107.0.0.99.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-6.6.0-107.0.0.99.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-107.0.0.99.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-107.0.0.99.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-107.0.0.99.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-107.0.0.99.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-107.0.0.99.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-107.0.0.99.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-107.0.0.99.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-107.0.0.99.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-6.6.0-107.0.0.99.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-107.0.0.99.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-107.0.0.99.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-107.0.0.99.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-6.6.0-107.0.0.99.oe2403.x86_64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-107.0.0.99.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-6.6.0-107.0.0.99.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-107.0.0.99.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-107.0.0.99.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-107.0.0.99.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-107.0.0.99.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-107.0.0.99.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-107.0.0.99.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-107.0.0.99.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-107.0.0.99.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-6.6.0-107.0.0.99.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-107.0.0.99.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-107.0.0.99.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-107.0.0.99.oe2403.x86_64"
					],
					"details":"kernel security update",
					"category":"vendor_fix",
					"url":"https://www.openeuler.org/zh/security/security-bulletins/detail/?id=openEuler-SA-2025-2077"
				}
			],
			"scores":[
				{
					"cvss_v3":{
						"baseSeverity":"LOW",
						"baseScore":3.9,
						"vectorString":"CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:L/I:L/A:L",
						"version":"3.1"
					},
					"products":[
						"openEuler-24.03-LTS:kernel-6.6.0-107.0.0.99.oe2403.src",
						"openEuler-24.03-LTS:bpftool-6.6.0-107.0.0.99.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-107.0.0.99.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-6.6.0-107.0.0.99.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-107.0.0.99.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-107.0.0.99.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-107.0.0.99.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-107.0.0.99.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-107.0.0.99.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-107.0.0.99.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-107.0.0.99.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-107.0.0.99.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-6.6.0-107.0.0.99.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-107.0.0.99.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-107.0.0.99.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-107.0.0.99.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-6.6.0-107.0.0.99.oe2403.x86_64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-107.0.0.99.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-6.6.0-107.0.0.99.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-107.0.0.99.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-107.0.0.99.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-107.0.0.99.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-107.0.0.99.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-107.0.0.99.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-107.0.0.99.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-107.0.0.99.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-107.0.0.99.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-6.6.0-107.0.0.99.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-107.0.0.99.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-107.0.0.99.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-107.0.0.99.oe2403.x86_64"
					]
				}
			],
			"threats":[
				{
					"details":"Low",
					"category":"impact"
				}
			],
			"title":"CVE-2025-38174"
		},
		{
			"cve":"CVE-2025-38184",
			"notes":[
				{
					"text":"In the Linux kernel, the following vulnerability has been resolved:\n\ntipc: fix null-ptr-deref when acquiring remote ip of ethernet bearer\n\nThe reproduction steps:\n1. create a tun interface\n2. enable l2 bearer\n3. TIPC_NL_UDP_GET_REMOTEIP with media name set to tun\n\ntipc: Started in network mode\ntipc: Node identity 8af312d38a21, cluster identity 4711\ntipc: Enabled bearer <eth:syz_tun>, priority 1\nOops: general protection fault\nKASAN: null-ptr-deref in range\nCPU: 1 UID: 1000 PID: 559 Comm: poc Not tainted 6.16.0-rc1+ #117 PREEMPT\nHardware name: QEMU Ubuntu 24.04 PC\nRIP: 0010:tipc_udp_nl_dump_remoteip+0x4a4/0x8f0\n\nthe ub was in fact a struct dev.\n\nwhen bid != 0 && skip_cnt != 0, bearer_list[bid] may be NULL or\nother media when other thread changes it.\n\nfix this by checking media_id.",
					"category":"description",
					"title":"Vulnerability Description"
				}
			],
			"product_status":{
				"fixed":[
					"openEuler-24.03-LTS:kernel-6.6.0-107.0.0.99.oe2403.src",
					"openEuler-24.03-LTS:bpftool-6.6.0-107.0.0.99.oe2403.aarch64",
					"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-107.0.0.99.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-6.6.0-107.0.0.99.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-107.0.0.99.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-debugsource-6.6.0-107.0.0.99.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-devel-6.6.0-107.0.0.99.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-headers-6.6.0-107.0.0.99.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-source-6.6.0-107.0.0.99.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-tools-6.6.0-107.0.0.99.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-107.0.0.99.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-107.0.0.99.oe2403.aarch64",
					"openEuler-24.03-LTS:perf-6.6.0-107.0.0.99.oe2403.aarch64",
					"openEuler-24.03-LTS:perf-debuginfo-6.6.0-107.0.0.99.oe2403.aarch64",
					"openEuler-24.03-LTS:python3-perf-6.6.0-107.0.0.99.oe2403.aarch64",
					"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-107.0.0.99.oe2403.aarch64",
					"openEuler-24.03-LTS:bpftool-6.6.0-107.0.0.99.oe2403.x86_64",
					"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-107.0.0.99.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-6.6.0-107.0.0.99.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-107.0.0.99.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-debugsource-6.6.0-107.0.0.99.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-devel-6.6.0-107.0.0.99.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-headers-6.6.0-107.0.0.99.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-source-6.6.0-107.0.0.99.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-tools-6.6.0-107.0.0.99.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-107.0.0.99.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-107.0.0.99.oe2403.x86_64",
					"openEuler-24.03-LTS:perf-6.6.0-107.0.0.99.oe2403.x86_64",
					"openEuler-24.03-LTS:perf-debuginfo-6.6.0-107.0.0.99.oe2403.x86_64",
					"openEuler-24.03-LTS:python3-perf-6.6.0-107.0.0.99.oe2403.x86_64",
					"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-107.0.0.99.oe2403.x86_64"
				]
			},
			"remediations":[
				{
					"product_ids":[
						"openEuler-24.03-LTS:kernel-6.6.0-107.0.0.99.oe2403.src",
						"openEuler-24.03-LTS:bpftool-6.6.0-107.0.0.99.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-107.0.0.99.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-6.6.0-107.0.0.99.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-107.0.0.99.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-107.0.0.99.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-107.0.0.99.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-107.0.0.99.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-107.0.0.99.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-107.0.0.99.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-107.0.0.99.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-107.0.0.99.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-6.6.0-107.0.0.99.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-107.0.0.99.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-107.0.0.99.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-107.0.0.99.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-6.6.0-107.0.0.99.oe2403.x86_64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-107.0.0.99.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-6.6.0-107.0.0.99.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-107.0.0.99.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-107.0.0.99.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-107.0.0.99.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-107.0.0.99.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-107.0.0.99.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-107.0.0.99.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-107.0.0.99.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-107.0.0.99.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-6.6.0-107.0.0.99.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-107.0.0.99.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-107.0.0.99.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-107.0.0.99.oe2403.x86_64"
					],
					"details":"kernel security update",
					"category":"vendor_fix",
					"url":"https://www.openeuler.org/zh/security/security-bulletins/detail/?id=openEuler-SA-2025-2077"
				}
			],
			"scores":[
				{
					"cvss_v3":{
						"baseSeverity":"MEDIUM",
						"baseScore":5.3,
						"vectorString":"CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H",
						"version":"3.1"
					},
					"products":[
						"openEuler-24.03-LTS:kernel-6.6.0-107.0.0.99.oe2403.src",
						"openEuler-24.03-LTS:bpftool-6.6.0-107.0.0.99.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-107.0.0.99.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-6.6.0-107.0.0.99.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-107.0.0.99.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-107.0.0.99.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-107.0.0.99.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-107.0.0.99.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-107.0.0.99.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-107.0.0.99.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-107.0.0.99.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-107.0.0.99.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-6.6.0-107.0.0.99.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-107.0.0.99.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-107.0.0.99.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-107.0.0.99.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-6.6.0-107.0.0.99.oe2403.x86_64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-107.0.0.99.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-6.6.0-107.0.0.99.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-107.0.0.99.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-107.0.0.99.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-107.0.0.99.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-107.0.0.99.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-107.0.0.99.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-107.0.0.99.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-107.0.0.99.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-107.0.0.99.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-6.6.0-107.0.0.99.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-107.0.0.99.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-107.0.0.99.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-107.0.0.99.oe2403.x86_64"
					]
				}
			],
			"threats":[
				{
					"details":"Medium",
					"category":"impact"
				}
			],
			"title":"CVE-2025-38184"
		},
		{
			"cve":"CVE-2025-38192",
			"notes":[
				{
					"text":"A vulnerability classified as critical has been found in Linux Kernel up to 6.6.94/6.12.34/6.15.3/6.16-rc1 (Operating System).CWE is classifying the issue as CWE-476. A NULL pointer dereference occurs when the application dereferences a pointer that it expects to be valid, but is NULL, typically causing a crash or exit.This is going to have an impact on availability.Upgrading to version 6.6.95, 6.12.35, 6.15.4 or 6.16-rc2 eliminates this vulnerability. Applying the patch bfa4d86e130a09f67607482e988313430e38f6c4/2a3ad42a57b43145839f2f233fb562247658a6d9/e9994e7b9f7bbb882d13c8191731649249150d21/ba9db6f907ac02215e30128770f85fbd7db2fcf9 is able to eliminate this problem. The bugfix is ready for download at git.kernel.org. The best possible mitigation is suggested to be upgrading to the latest version.The vulnerability is also documented in the vulnerability database at EUVD (EUVD-2025-20064).",
					"category":"description",
					"title":"Vulnerability Description"
				}
			],
			"product_status":{
				"fixed":[
					"openEuler-24.03-LTS:kernel-6.6.0-107.0.0.99.oe2403.src",
					"openEuler-24.03-LTS:bpftool-6.6.0-107.0.0.99.oe2403.aarch64",
					"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-107.0.0.99.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-6.6.0-107.0.0.99.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-107.0.0.99.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-debugsource-6.6.0-107.0.0.99.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-devel-6.6.0-107.0.0.99.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-headers-6.6.0-107.0.0.99.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-source-6.6.0-107.0.0.99.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-tools-6.6.0-107.0.0.99.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-107.0.0.99.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-107.0.0.99.oe2403.aarch64",
					"openEuler-24.03-LTS:perf-6.6.0-107.0.0.99.oe2403.aarch64",
					"openEuler-24.03-LTS:perf-debuginfo-6.6.0-107.0.0.99.oe2403.aarch64",
					"openEuler-24.03-LTS:python3-perf-6.6.0-107.0.0.99.oe2403.aarch64",
					"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-107.0.0.99.oe2403.aarch64",
					"openEuler-24.03-LTS:bpftool-6.6.0-107.0.0.99.oe2403.x86_64",
					"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-107.0.0.99.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-6.6.0-107.0.0.99.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-107.0.0.99.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-debugsource-6.6.0-107.0.0.99.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-devel-6.6.0-107.0.0.99.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-headers-6.6.0-107.0.0.99.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-source-6.6.0-107.0.0.99.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-tools-6.6.0-107.0.0.99.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-107.0.0.99.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-107.0.0.99.oe2403.x86_64",
					"openEuler-24.03-LTS:perf-6.6.0-107.0.0.99.oe2403.x86_64",
					"openEuler-24.03-LTS:perf-debuginfo-6.6.0-107.0.0.99.oe2403.x86_64",
					"openEuler-24.03-LTS:python3-perf-6.6.0-107.0.0.99.oe2403.x86_64",
					"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-107.0.0.99.oe2403.x86_64"
				]
			},
			"remediations":[
				{
					"product_ids":[
						"openEuler-24.03-LTS:kernel-6.6.0-107.0.0.99.oe2403.src",
						"openEuler-24.03-LTS:bpftool-6.6.0-107.0.0.99.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-107.0.0.99.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-6.6.0-107.0.0.99.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-107.0.0.99.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-107.0.0.99.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-107.0.0.99.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-107.0.0.99.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-107.0.0.99.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-107.0.0.99.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-107.0.0.99.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-107.0.0.99.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-6.6.0-107.0.0.99.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-107.0.0.99.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-107.0.0.99.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-107.0.0.99.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-6.6.0-107.0.0.99.oe2403.x86_64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-107.0.0.99.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-6.6.0-107.0.0.99.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-107.0.0.99.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-107.0.0.99.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-107.0.0.99.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-107.0.0.99.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-107.0.0.99.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-107.0.0.99.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-107.0.0.99.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-107.0.0.99.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-6.6.0-107.0.0.99.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-107.0.0.99.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-107.0.0.99.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-107.0.0.99.oe2403.x86_64"
					],
					"details":"kernel security update",
					"category":"vendor_fix",
					"url":"https://www.openeuler.org/zh/security/security-bulletins/detail/?id=openEuler-SA-2025-2077"
				}
			],
			"scores":[
				{
					"cvss_v3":{
						"baseSeverity":"MEDIUM",
						"baseScore":6.1,
						"vectorString":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H",
						"version":"3.1"
					},
					"products":[
						"openEuler-24.03-LTS:kernel-6.6.0-107.0.0.99.oe2403.src",
						"openEuler-24.03-LTS:bpftool-6.6.0-107.0.0.99.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-107.0.0.99.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-6.6.0-107.0.0.99.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-107.0.0.99.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-107.0.0.99.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-107.0.0.99.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-107.0.0.99.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-107.0.0.99.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-107.0.0.99.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-107.0.0.99.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-107.0.0.99.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-6.6.0-107.0.0.99.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-107.0.0.99.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-107.0.0.99.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-107.0.0.99.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-6.6.0-107.0.0.99.oe2403.x86_64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-107.0.0.99.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-6.6.0-107.0.0.99.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-107.0.0.99.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-107.0.0.99.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-107.0.0.99.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-107.0.0.99.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-107.0.0.99.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-107.0.0.99.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-107.0.0.99.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-107.0.0.99.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-6.6.0-107.0.0.99.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-107.0.0.99.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-107.0.0.99.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-107.0.0.99.oe2403.x86_64"
					]
				}
			],
			"threats":[
				{
					"details":"Medium",
					"category":"impact"
				}
			],
			"title":"CVE-2025-38192"
		},
		{
			"cve":"CVE-2025-38239",
			"notes":[
				{
					"text":"In the Linux kernel, the following vulnerability has been resolved:\n\nscsi: megaraid_sas: Fix invalid node index\n\nOn a system with DRAM interleave enabled, out-of-bound access is\ndetected:\n\nmegaraid_sas 0000:3f:00.0: requested/available msix 128/128 poll_queue 0\n------------[ cut here ]------------\nUBSAN: array-index-out-of-bounds in ./arch/x86/include/asm/topology.h:72:28\nindex -1 is out of range for type 'cpumask *[1024]'\ndump_stack_lvl+0x5d/0x80\nubsan_epilogue+0x5/0x2b\n__ubsan_handle_out_of_bounds.cold+0x46/0x4b\nmegasas_alloc_irq_vectors+0x149/0x190 [megaraid_sas]\nmegasas_probe_one.cold+0xa4d/0x189c [megaraid_sas]\nlocal_pci_probe+0x42/0x90\npci_device_probe+0xdc/0x290\nreally_probe+0xdb/0x340\n__driver_probe_device+0x78/0x110\ndriver_probe_device+0x1f/0xa0\n__driver_attach+0xba/0x1c0\nbus_for_each_dev+0x8b/0xe0\nbus_add_driver+0x142/0x220\ndriver_register+0x72/0xd0\nmegasas_init+0xdf/0xff0 [megaraid_sas]\ndo_one_initcall+0x57/0x310\ndo_init_module+0x90/0x250\ninit_module_from_file+0x85/0xc0\nidempotent_init_module+0x114/0x310\n__x64_sys_finit_module+0x65/0xc0\ndo_syscall_64+0x82/0x170\nentry_SYSCALL_64_after_hwframe+0x76/0x7e\n\nFix it accordingly.",
					"category":"description",
					"title":"Vulnerability Description"
				}
			],
			"product_status":{
				"fixed":[
					"openEuler-24.03-LTS:kernel-6.6.0-107.0.0.99.oe2403.src",
					"openEuler-24.03-LTS:bpftool-6.6.0-107.0.0.99.oe2403.aarch64",
					"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-107.0.0.99.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-6.6.0-107.0.0.99.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-107.0.0.99.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-debugsource-6.6.0-107.0.0.99.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-devel-6.6.0-107.0.0.99.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-headers-6.6.0-107.0.0.99.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-source-6.6.0-107.0.0.99.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-tools-6.6.0-107.0.0.99.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-107.0.0.99.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-107.0.0.99.oe2403.aarch64",
					"openEuler-24.03-LTS:perf-6.6.0-107.0.0.99.oe2403.aarch64",
					"openEuler-24.03-LTS:perf-debuginfo-6.6.0-107.0.0.99.oe2403.aarch64",
					"openEuler-24.03-LTS:python3-perf-6.6.0-107.0.0.99.oe2403.aarch64",
					"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-107.0.0.99.oe2403.aarch64",
					"openEuler-24.03-LTS:bpftool-6.6.0-107.0.0.99.oe2403.x86_64",
					"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-107.0.0.99.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-6.6.0-107.0.0.99.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-107.0.0.99.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-debugsource-6.6.0-107.0.0.99.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-devel-6.6.0-107.0.0.99.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-headers-6.6.0-107.0.0.99.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-source-6.6.0-107.0.0.99.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-tools-6.6.0-107.0.0.99.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-107.0.0.99.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-107.0.0.99.oe2403.x86_64",
					"openEuler-24.03-LTS:perf-6.6.0-107.0.0.99.oe2403.x86_64",
					"openEuler-24.03-LTS:perf-debuginfo-6.6.0-107.0.0.99.oe2403.x86_64",
					"openEuler-24.03-LTS:python3-perf-6.6.0-107.0.0.99.oe2403.x86_64",
					"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-107.0.0.99.oe2403.x86_64"
				]
			},
			"remediations":[
				{
					"product_ids":[
						"openEuler-24.03-LTS:kernel-6.6.0-107.0.0.99.oe2403.src",
						"openEuler-24.03-LTS:bpftool-6.6.0-107.0.0.99.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-107.0.0.99.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-6.6.0-107.0.0.99.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-107.0.0.99.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-107.0.0.99.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-107.0.0.99.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-107.0.0.99.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-107.0.0.99.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-107.0.0.99.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-107.0.0.99.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-107.0.0.99.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-6.6.0-107.0.0.99.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-107.0.0.99.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-107.0.0.99.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-107.0.0.99.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-6.6.0-107.0.0.99.oe2403.x86_64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-107.0.0.99.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-6.6.0-107.0.0.99.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-107.0.0.99.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-107.0.0.99.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-107.0.0.99.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-107.0.0.99.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-107.0.0.99.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-107.0.0.99.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-107.0.0.99.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-107.0.0.99.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-6.6.0-107.0.0.99.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-107.0.0.99.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-107.0.0.99.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-107.0.0.99.oe2403.x86_64"
					],
					"details":"kernel security update",
					"category":"vendor_fix",
					"url":"https://www.openeuler.org/zh/security/security-bulletins/detail/?id=openEuler-SA-2025-2077"
				}
			],
			"scores":[
				{
					"cvss_v3":{
						"baseSeverity":"LOW",
						"baseScore":3.9,
						"vectorString":"CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:L/I:L/A:L",
						"version":"3.1"
					},
					"products":[
						"openEuler-24.03-LTS:kernel-6.6.0-107.0.0.99.oe2403.src",
						"openEuler-24.03-LTS:bpftool-6.6.0-107.0.0.99.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-107.0.0.99.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-6.6.0-107.0.0.99.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-107.0.0.99.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-107.0.0.99.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-107.0.0.99.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-107.0.0.99.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-107.0.0.99.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-107.0.0.99.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-107.0.0.99.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-107.0.0.99.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-6.6.0-107.0.0.99.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-107.0.0.99.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-107.0.0.99.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-107.0.0.99.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-6.6.0-107.0.0.99.oe2403.x86_64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-107.0.0.99.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-6.6.0-107.0.0.99.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-107.0.0.99.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-107.0.0.99.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-107.0.0.99.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-107.0.0.99.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-107.0.0.99.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-107.0.0.99.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-107.0.0.99.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-107.0.0.99.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-6.6.0-107.0.0.99.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-107.0.0.99.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-107.0.0.99.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-107.0.0.99.oe2403.x86_64"
					]
				}
			],
			"threats":[
				{
					"details":"Low",
					"category":"impact"
				}
			],
			"title":"CVE-2025-38239"
		},
		{
			"cve":"CVE-2025-38248",
			"notes":[
				{
					"text":"A vulnerability was found in Linux Kernel up to 6.15.4/6.16-rc3 (Operating System). It has been classified as critical.CWE is classifying the issue as CWE-416. Referencing memory after it has been freed can cause a program to crash, use unexpected values, or execute code.This is going to have an impact on confidentiality, integrity, and availability.Upgrading to version 6.15.5 or 6.16-rc4 eliminates this vulnerability. Applying the patch f05a4f9e959e0fc098046044c650acf897ea52d2/7544f3f5b0b58c396f374d060898b5939da31709 is able to eliminate this problem. The bugfix is ready for download at git.kernel.org. The best possible mitigation is suggested to be upgrading to the latest version.The vulnerability is also documented in the vulnerability database at EUVD (EUVD-2025-20813).",
					"category":"description",
					"title":"Vulnerability Description"
				}
			],
			"product_status":{
				"fixed":[
					"openEuler-24.03-LTS:kernel-6.6.0-107.0.0.99.oe2403.src",
					"openEuler-24.03-LTS:bpftool-6.6.0-107.0.0.99.oe2403.aarch64",
					"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-107.0.0.99.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-6.6.0-107.0.0.99.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-107.0.0.99.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-debugsource-6.6.0-107.0.0.99.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-devel-6.6.0-107.0.0.99.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-headers-6.6.0-107.0.0.99.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-source-6.6.0-107.0.0.99.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-tools-6.6.0-107.0.0.99.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-107.0.0.99.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-107.0.0.99.oe2403.aarch64",
					"openEuler-24.03-LTS:perf-6.6.0-107.0.0.99.oe2403.aarch64",
					"openEuler-24.03-LTS:perf-debuginfo-6.6.0-107.0.0.99.oe2403.aarch64",
					"openEuler-24.03-LTS:python3-perf-6.6.0-107.0.0.99.oe2403.aarch64",
					"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-107.0.0.99.oe2403.aarch64",
					"openEuler-24.03-LTS:bpftool-6.6.0-107.0.0.99.oe2403.x86_64",
					"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-107.0.0.99.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-6.6.0-107.0.0.99.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-107.0.0.99.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-debugsource-6.6.0-107.0.0.99.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-devel-6.6.0-107.0.0.99.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-headers-6.6.0-107.0.0.99.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-source-6.6.0-107.0.0.99.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-tools-6.6.0-107.0.0.99.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-107.0.0.99.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-107.0.0.99.oe2403.x86_64",
					"openEuler-24.03-LTS:perf-6.6.0-107.0.0.99.oe2403.x86_64",
					"openEuler-24.03-LTS:perf-debuginfo-6.6.0-107.0.0.99.oe2403.x86_64",
					"openEuler-24.03-LTS:python3-perf-6.6.0-107.0.0.99.oe2403.x86_64",
					"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-107.0.0.99.oe2403.x86_64"
				]
			},
			"remediations":[
				{
					"product_ids":[
						"openEuler-24.03-LTS:kernel-6.6.0-107.0.0.99.oe2403.src",
						"openEuler-24.03-LTS:bpftool-6.6.0-107.0.0.99.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-107.0.0.99.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-6.6.0-107.0.0.99.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-107.0.0.99.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-107.0.0.99.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-107.0.0.99.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-107.0.0.99.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-107.0.0.99.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-107.0.0.99.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-107.0.0.99.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-107.0.0.99.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-6.6.0-107.0.0.99.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-107.0.0.99.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-107.0.0.99.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-107.0.0.99.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-6.6.0-107.0.0.99.oe2403.x86_64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-107.0.0.99.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-6.6.0-107.0.0.99.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-107.0.0.99.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-107.0.0.99.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-107.0.0.99.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-107.0.0.99.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-107.0.0.99.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-107.0.0.99.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-107.0.0.99.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-107.0.0.99.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-6.6.0-107.0.0.99.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-107.0.0.99.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-107.0.0.99.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-107.0.0.99.oe2403.x86_64"
					],
					"details":"kernel security update",
					"category":"vendor_fix",
					"url":"https://www.openeuler.org/zh/security/security-bulletins/detail/?id=openEuler-SA-2025-2077"
				}
			],
			"scores":[
				{
					"cvss_v3":{
						"baseSeverity":"MEDIUM",
						"baseScore":5.5,
						"vectorString":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
						"version":"3.1"
					},
					"products":[
						"openEuler-24.03-LTS:kernel-6.6.0-107.0.0.99.oe2403.src",
						"openEuler-24.03-LTS:bpftool-6.6.0-107.0.0.99.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-107.0.0.99.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-6.6.0-107.0.0.99.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-107.0.0.99.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-107.0.0.99.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-107.0.0.99.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-107.0.0.99.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-107.0.0.99.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-107.0.0.99.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-107.0.0.99.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-107.0.0.99.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-6.6.0-107.0.0.99.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-107.0.0.99.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-107.0.0.99.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-107.0.0.99.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-6.6.0-107.0.0.99.oe2403.x86_64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-107.0.0.99.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-6.6.0-107.0.0.99.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-107.0.0.99.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-107.0.0.99.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-107.0.0.99.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-107.0.0.99.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-107.0.0.99.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-107.0.0.99.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-107.0.0.99.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-107.0.0.99.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-6.6.0-107.0.0.99.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-107.0.0.99.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-107.0.0.99.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-107.0.0.99.oe2403.x86_64"
					]
				}
			],
			"threats":[
				{
					"details":"Medium",
					"category":"impact"
				}
			],
			"title":"CVE-2025-38248"
		},
		{
			"cve":"CVE-2025-38310",
			"notes":[
				{
					"text":"A vulnerability, which was classified as problematic, has been found in Linux Kernel up to 5.15.185/6.1.141/6.6.93/6.12.33/6.15.2 (Operating System).Using CWE to declare the problem leads to CWE-824. The product accesses or uses a pointer that has not been initialized.Impacted is confidentiality, integrity, and availability.Upgrading to version 5.15.186, 6.1.142, 6.6.94, 6.12.34, 6.15.3 or 6.16-rc1 eliminates this vulnerability. Applying the patch 668923c474608dd9ebce0fbcc41bd8a27aa73dd6/cef33a86bcb04ecf4dc10c56f6c42ee9d1c54bac/d2507aeea45b3c5aa24d5daae0cf3db76895c0b7/d5d9fd13bc19a3f9f2a951c5b6e934d84205789e/cd4cd09810211fa23609c5c1018352e9e1cd8e5a/7632fedb266d93ed0ed9f487133e6c6314a9b2d1 is able to eliminate this problem. The bugfix is ready for download at git.kernel.org. The best possible mitigation is suggested to be upgrading to the latest version.",
					"category":"description",
					"title":"Vulnerability Description"
				}
			],
			"product_status":{
				"fixed":[
					"openEuler-24.03-LTS:kernel-6.6.0-107.0.0.99.oe2403.src",
					"openEuler-24.03-LTS:bpftool-6.6.0-107.0.0.99.oe2403.aarch64",
					"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-107.0.0.99.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-6.6.0-107.0.0.99.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-107.0.0.99.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-debugsource-6.6.0-107.0.0.99.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-devel-6.6.0-107.0.0.99.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-headers-6.6.0-107.0.0.99.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-source-6.6.0-107.0.0.99.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-tools-6.6.0-107.0.0.99.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-107.0.0.99.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-107.0.0.99.oe2403.aarch64",
					"openEuler-24.03-LTS:perf-6.6.0-107.0.0.99.oe2403.aarch64",
					"openEuler-24.03-LTS:perf-debuginfo-6.6.0-107.0.0.99.oe2403.aarch64",
					"openEuler-24.03-LTS:python3-perf-6.6.0-107.0.0.99.oe2403.aarch64",
					"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-107.0.0.99.oe2403.aarch64",
					"openEuler-24.03-LTS:bpftool-6.6.0-107.0.0.99.oe2403.x86_64",
					"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-107.0.0.99.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-6.6.0-107.0.0.99.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-107.0.0.99.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-debugsource-6.6.0-107.0.0.99.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-devel-6.6.0-107.0.0.99.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-headers-6.6.0-107.0.0.99.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-source-6.6.0-107.0.0.99.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-tools-6.6.0-107.0.0.99.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-107.0.0.99.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-107.0.0.99.oe2403.x86_64",
					"openEuler-24.03-LTS:perf-6.6.0-107.0.0.99.oe2403.x86_64",
					"openEuler-24.03-LTS:perf-debuginfo-6.6.0-107.0.0.99.oe2403.x86_64",
					"openEuler-24.03-LTS:python3-perf-6.6.0-107.0.0.99.oe2403.x86_64",
					"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-107.0.0.99.oe2403.x86_64"
				]
			},
			"remediations":[
				{
					"product_ids":[
						"openEuler-24.03-LTS:kernel-6.6.0-107.0.0.99.oe2403.src",
						"openEuler-24.03-LTS:bpftool-6.6.0-107.0.0.99.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-107.0.0.99.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-6.6.0-107.0.0.99.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-107.0.0.99.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-107.0.0.99.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-107.0.0.99.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-107.0.0.99.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-107.0.0.99.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-107.0.0.99.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-107.0.0.99.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-107.0.0.99.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-6.6.0-107.0.0.99.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-107.0.0.99.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-107.0.0.99.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-107.0.0.99.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-6.6.0-107.0.0.99.oe2403.x86_64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-107.0.0.99.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-6.6.0-107.0.0.99.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-107.0.0.99.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-107.0.0.99.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-107.0.0.99.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-107.0.0.99.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-107.0.0.99.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-107.0.0.99.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-107.0.0.99.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-107.0.0.99.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-6.6.0-107.0.0.99.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-107.0.0.99.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-107.0.0.99.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-107.0.0.99.oe2403.x86_64"
					],
					"details":"kernel security update",
					"category":"vendor_fix",
					"url":"https://www.openeuler.org/zh/security/security-bulletins/detail/?id=openEuler-SA-2025-2077"
				}
			],
			"scores":[
				{
					"cvss_v3":{
						"baseSeverity":"MEDIUM",
						"baseScore":6.1,
						"vectorString":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H",
						"version":"3.1"
					},
					"products":[
						"openEuler-24.03-LTS:kernel-6.6.0-107.0.0.99.oe2403.src",
						"openEuler-24.03-LTS:bpftool-6.6.0-107.0.0.99.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-107.0.0.99.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-6.6.0-107.0.0.99.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-107.0.0.99.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-107.0.0.99.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-107.0.0.99.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-107.0.0.99.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-107.0.0.99.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-107.0.0.99.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-107.0.0.99.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-107.0.0.99.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-6.6.0-107.0.0.99.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-107.0.0.99.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-107.0.0.99.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-107.0.0.99.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-6.6.0-107.0.0.99.oe2403.x86_64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-107.0.0.99.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-6.6.0-107.0.0.99.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-107.0.0.99.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-107.0.0.99.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-107.0.0.99.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-107.0.0.99.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-107.0.0.99.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-107.0.0.99.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-107.0.0.99.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-107.0.0.99.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-6.6.0-107.0.0.99.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-107.0.0.99.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-107.0.0.99.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-107.0.0.99.oe2403.x86_64"
					]
				}
			],
			"threats":[
				{
					"details":"Medium",
					"category":"impact"
				}
			],
			"title":"CVE-2025-38310"
		},
		{
			"cve":"CVE-2025-38369",
			"notes":[
				{
					"text":"A vulnerability, which was classified as critical, was found in Linux Kernel up to 6.6.95/6.12.35/6.15.4 (Operating System).CWE is classifying the issue as CWE-404. The product does not release or incorrectly releases a resource before it is made available for re-use.This is going to have an impact on availability.Upgrading to version 6.6.96, 6.12.36, 6.15.5 or 6.16-rc1 eliminates this vulnerability. Applying the patch e0051a3daa8b2cb318b03b2f9317c3e40855847a/98fd66c8ba77e3a7137575f610271014bc0e701f/aee7a7439f8c0884da87694a401930204a57128f/17502e7d7b7113346296f6758324798d536c31fd is able to eliminate this problem. The bugfix is ready for download at git.kernel.org. The best possible mitigation is suggested to be upgrading to the latest version.",
					"category":"description",
					"title":"Vulnerability Description"
				}
			],
			"product_status":{
				"fixed":[
					"openEuler-24.03-LTS:kernel-6.6.0-107.0.0.99.oe2403.src",
					"openEuler-24.03-LTS:bpftool-6.6.0-107.0.0.99.oe2403.aarch64",
					"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-107.0.0.99.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-6.6.0-107.0.0.99.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-107.0.0.99.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-debugsource-6.6.0-107.0.0.99.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-devel-6.6.0-107.0.0.99.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-headers-6.6.0-107.0.0.99.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-source-6.6.0-107.0.0.99.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-tools-6.6.0-107.0.0.99.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-107.0.0.99.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-107.0.0.99.oe2403.aarch64",
					"openEuler-24.03-LTS:perf-6.6.0-107.0.0.99.oe2403.aarch64",
					"openEuler-24.03-LTS:perf-debuginfo-6.6.0-107.0.0.99.oe2403.aarch64",
					"openEuler-24.03-LTS:python3-perf-6.6.0-107.0.0.99.oe2403.aarch64",
					"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-107.0.0.99.oe2403.aarch64",
					"openEuler-24.03-LTS:bpftool-6.6.0-107.0.0.99.oe2403.x86_64",
					"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-107.0.0.99.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-6.6.0-107.0.0.99.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-107.0.0.99.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-debugsource-6.6.0-107.0.0.99.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-devel-6.6.0-107.0.0.99.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-headers-6.6.0-107.0.0.99.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-source-6.6.0-107.0.0.99.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-tools-6.6.0-107.0.0.99.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-107.0.0.99.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-107.0.0.99.oe2403.x86_64",
					"openEuler-24.03-LTS:perf-6.6.0-107.0.0.99.oe2403.x86_64",
					"openEuler-24.03-LTS:perf-debuginfo-6.6.0-107.0.0.99.oe2403.x86_64",
					"openEuler-24.03-LTS:python3-perf-6.6.0-107.0.0.99.oe2403.x86_64",
					"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-107.0.0.99.oe2403.x86_64"
				]
			},
			"remediations":[
				{
					"product_ids":[
						"openEuler-24.03-LTS:kernel-6.6.0-107.0.0.99.oe2403.src",
						"openEuler-24.03-LTS:bpftool-6.6.0-107.0.0.99.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-107.0.0.99.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-6.6.0-107.0.0.99.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-107.0.0.99.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-107.0.0.99.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-107.0.0.99.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-107.0.0.99.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-107.0.0.99.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-107.0.0.99.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-107.0.0.99.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-107.0.0.99.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-6.6.0-107.0.0.99.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-107.0.0.99.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-107.0.0.99.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-107.0.0.99.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-6.6.0-107.0.0.99.oe2403.x86_64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-107.0.0.99.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-6.6.0-107.0.0.99.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-107.0.0.99.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-107.0.0.99.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-107.0.0.99.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-107.0.0.99.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-107.0.0.99.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-107.0.0.99.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-107.0.0.99.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-107.0.0.99.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-6.6.0-107.0.0.99.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-107.0.0.99.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-107.0.0.99.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-107.0.0.99.oe2403.x86_64"
					],
					"details":"kernel security update",
					"category":"vendor_fix",
					"url":"https://www.openeuler.org/zh/security/security-bulletins/detail/?id=openEuler-SA-2025-2077"
				}
			],
			"scores":[
				{
					"cvss_v3":{
						"baseSeverity":"MEDIUM",
						"baseScore":5.5,
						"vectorString":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
						"version":"3.1"
					},
					"products":[
						"openEuler-24.03-LTS:kernel-6.6.0-107.0.0.99.oe2403.src",
						"openEuler-24.03-LTS:bpftool-6.6.0-107.0.0.99.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-107.0.0.99.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-6.6.0-107.0.0.99.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-107.0.0.99.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-107.0.0.99.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-107.0.0.99.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-107.0.0.99.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-107.0.0.99.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-107.0.0.99.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-107.0.0.99.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-107.0.0.99.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-6.6.0-107.0.0.99.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-107.0.0.99.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-107.0.0.99.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-107.0.0.99.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-6.6.0-107.0.0.99.oe2403.x86_64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-107.0.0.99.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-6.6.0-107.0.0.99.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-107.0.0.99.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-107.0.0.99.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-107.0.0.99.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-107.0.0.99.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-107.0.0.99.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-107.0.0.99.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-107.0.0.99.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-107.0.0.99.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-6.6.0-107.0.0.99.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-107.0.0.99.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-107.0.0.99.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-107.0.0.99.oe2403.x86_64"
					]
				}
			],
			"threats":[
				{
					"details":"Medium",
					"category":"impact"
				}
			],
			"title":"CVE-2025-38369"
		},
		{
			"cve":"CVE-2025-38441",
			"notes":[
				{
					"text":"In the Linux kernel, the following vulnerability has been resolved:\n\nnetfilter: flowtable: account for Ethernet header in nf_flow_pppoe_proto()\n\nsyzbot found a potential access to uninit-value in nf_flow_pppoe_proto()\n\nBlamed commit forgot the Ethernet header.\n\nBUG: KMSAN: uninit-value in nf_flow_offload_inet_hook+0x7e4/0x940 net/netfilter/nf_flow_table_inet.c:27\n  nf_flow_offload_inet_hook+0x7e4/0x940 net/netfilter/nf_flow_table_inet.c:27\n  nf_hook_entry_hookfn include/linux/netfilter.h:157 [inline]\n  nf_hook_slow+0xe1/0x3d0 net/netfilter/core.c:623\n  nf_hook_ingress include/linux/netfilter_netdev.h:34 [inline]\n  nf_ingress net/core/dev.c:5742 [inline]\n  __netif_receive_skb_core+0x4aff/0x70c0 net/core/dev.c:5837\n  __netif_receive_skb_one_core net/core/dev.c:5975 [inline]\n  __netif_receive_skb+0xcc/0xac0 net/core/dev.c:6090\n  netif_receive_skb_internal net/core/dev.c:6176 [inline]\n  netif_receive_skb+0x57/0x630 net/core/dev.c:6235\n  tun_rx_batched+0x1df/0x980 drivers/net/tun.c:1485\n  tun_get_user+0x4ee0/0x6b40 drivers/net/tun.c:1938\n  tun_chr_write_iter+0x3e9/0x5c0 drivers/net/tun.c:1984\n  new_sync_write fs/read_write.c:593 [inline]\n  vfs_write+0xb4b/0x1580 fs/read_write.c:686\n  ksys_write fs/read_write.c:738 [inline]\n  __do_sys_write fs/read_write.c:749 [inline]",
					"category":"description",
					"title":"Vulnerability Description"
				}
			],
			"product_status":{
				"fixed":[
					"openEuler-24.03-LTS:kernel-6.6.0-107.0.0.99.oe2403.src",
					"openEuler-24.03-LTS:bpftool-6.6.0-107.0.0.99.oe2403.aarch64",
					"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-107.0.0.99.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-6.6.0-107.0.0.99.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-107.0.0.99.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-debugsource-6.6.0-107.0.0.99.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-devel-6.6.0-107.0.0.99.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-headers-6.6.0-107.0.0.99.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-source-6.6.0-107.0.0.99.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-tools-6.6.0-107.0.0.99.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-107.0.0.99.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-107.0.0.99.oe2403.aarch64",
					"openEuler-24.03-LTS:perf-6.6.0-107.0.0.99.oe2403.aarch64",
					"openEuler-24.03-LTS:perf-debuginfo-6.6.0-107.0.0.99.oe2403.aarch64",
					"openEuler-24.03-LTS:python3-perf-6.6.0-107.0.0.99.oe2403.aarch64",
					"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-107.0.0.99.oe2403.aarch64",
					"openEuler-24.03-LTS:bpftool-6.6.0-107.0.0.99.oe2403.x86_64",
					"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-107.0.0.99.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-6.6.0-107.0.0.99.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-107.0.0.99.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-debugsource-6.6.0-107.0.0.99.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-devel-6.6.0-107.0.0.99.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-headers-6.6.0-107.0.0.99.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-source-6.6.0-107.0.0.99.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-tools-6.6.0-107.0.0.99.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-107.0.0.99.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-107.0.0.99.oe2403.x86_64",
					"openEuler-24.03-LTS:perf-6.6.0-107.0.0.99.oe2403.x86_64",
					"openEuler-24.03-LTS:perf-debuginfo-6.6.0-107.0.0.99.oe2403.x86_64",
					"openEuler-24.03-LTS:python3-perf-6.6.0-107.0.0.99.oe2403.x86_64",
					"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-107.0.0.99.oe2403.x86_64"
				]
			},
			"remediations":[
				{
					"product_ids":[
						"openEuler-24.03-LTS:kernel-6.6.0-107.0.0.99.oe2403.src",
						"openEuler-24.03-LTS:bpftool-6.6.0-107.0.0.99.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-107.0.0.99.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-6.6.0-107.0.0.99.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-107.0.0.99.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-107.0.0.99.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-107.0.0.99.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-107.0.0.99.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-107.0.0.99.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-107.0.0.99.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-107.0.0.99.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-107.0.0.99.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-6.6.0-107.0.0.99.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-107.0.0.99.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-107.0.0.99.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-107.0.0.99.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-6.6.0-107.0.0.99.oe2403.x86_64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-107.0.0.99.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-6.6.0-107.0.0.99.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-107.0.0.99.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-107.0.0.99.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-107.0.0.99.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-107.0.0.99.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-107.0.0.99.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-107.0.0.99.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-107.0.0.99.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-107.0.0.99.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-6.6.0-107.0.0.99.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-107.0.0.99.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-107.0.0.99.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-107.0.0.99.oe2403.x86_64"
					],
					"details":"kernel security update",
					"category":"vendor_fix",
					"url":"https://www.openeuler.org/zh/security/security-bulletins/detail/?id=openEuler-SA-2025-2077"
				}
			],
			"scores":[
				{
					"cvss_v3":{
						"baseSeverity":"LOW",
						"baseScore":3.9,
						"vectorString":"CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:L/I:L/A:L",
						"version":"3.1"
					},
					"products":[
						"openEuler-24.03-LTS:kernel-6.6.0-107.0.0.99.oe2403.src",
						"openEuler-24.03-LTS:bpftool-6.6.0-107.0.0.99.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-107.0.0.99.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-6.6.0-107.0.0.99.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-107.0.0.99.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-107.0.0.99.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-107.0.0.99.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-107.0.0.99.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-107.0.0.99.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-107.0.0.99.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-107.0.0.99.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-107.0.0.99.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-6.6.0-107.0.0.99.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-107.0.0.99.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-107.0.0.99.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-107.0.0.99.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-6.6.0-107.0.0.99.oe2403.x86_64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-107.0.0.99.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-6.6.0-107.0.0.99.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-107.0.0.99.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-107.0.0.99.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-107.0.0.99.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-107.0.0.99.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-107.0.0.99.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-107.0.0.99.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-107.0.0.99.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-107.0.0.99.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-6.6.0-107.0.0.99.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-107.0.0.99.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-107.0.0.99.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-107.0.0.99.oe2403.x86_64"
					]
				}
			],
			"threats":[
				{
					"details":"Low",
					"category":"impact"
				}
			],
			"title":"CVE-2025-38441"
		},
		{
			"cve":"CVE-2025-38444",
			"notes":[
				{
					"text":"In the Linux kernel, the following vulnerability has been resolved:\n\nraid10: cleanup memleak at raid10_make_request\n\nIf raid10_read_request or raid10_write_request registers a new\nrequest and the REQ_NOWAIT flag is set, the code does not\nfree the malloc from the mempool.\n\nunreferenced object 0xffff8884802c3200 (size 192):\n   comm \"fio\", pid 9197, jiffies 4298078271\n   hex dump (first 32 bytes):\n     00 00 00 00 00 00 00 00 88 41 02 00 00 00 00 00  .........A......\n     08 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00  ................\n   backtrace (crc c1a049a2):\n     __kmalloc+0x2bb/0x450\n     mempool_alloc+0x11b/0x320\n     raid10_make_request+0x19e/0x650 [raid10]\n     md_handle_request+0x3b3/0x9e0\n     __submit_bio+0x394/0x560\n     __submit_bio_noacct+0x145/0x530\n     submit_bio_noacct_nocheck+0x682/0x830\n     __blkdev_direct_IO_async+0x4dc/0x6b0\n     blkdev_read_iter+0x1e5/0x3b0\n     __io_read+0x230/0x1110\n     io_read+0x13/0x30\n     io_issue_sqe+0x134/0x1180\n     io_submit_sqes+0x48c/0xe90\n     __do_sys_io_uring_enter+0x574/0x8b0\n     do_syscall_64+0x5c/0xe0\n     entry_SYSCALL_64_after_hwframe+0x76/0x7e\n\nV4: changing backing tree to see if CKI tests will pass.\nThe patch code has not changed between any versions.",
					"category":"description",
					"title":"Vulnerability Description"
				}
			],
			"product_status":{
				"fixed":[
					"openEuler-24.03-LTS:kernel-6.6.0-107.0.0.99.oe2403.src",
					"openEuler-24.03-LTS:bpftool-6.6.0-107.0.0.99.oe2403.aarch64",
					"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-107.0.0.99.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-6.6.0-107.0.0.99.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-107.0.0.99.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-debugsource-6.6.0-107.0.0.99.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-devel-6.6.0-107.0.0.99.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-headers-6.6.0-107.0.0.99.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-source-6.6.0-107.0.0.99.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-tools-6.6.0-107.0.0.99.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-107.0.0.99.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-107.0.0.99.oe2403.aarch64",
					"openEuler-24.03-LTS:perf-6.6.0-107.0.0.99.oe2403.aarch64",
					"openEuler-24.03-LTS:perf-debuginfo-6.6.0-107.0.0.99.oe2403.aarch64",
					"openEuler-24.03-LTS:python3-perf-6.6.0-107.0.0.99.oe2403.aarch64",
					"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-107.0.0.99.oe2403.aarch64",
					"openEuler-24.03-LTS:bpftool-6.6.0-107.0.0.99.oe2403.x86_64",
					"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-107.0.0.99.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-6.6.0-107.0.0.99.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-107.0.0.99.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-debugsource-6.6.0-107.0.0.99.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-devel-6.6.0-107.0.0.99.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-headers-6.6.0-107.0.0.99.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-source-6.6.0-107.0.0.99.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-tools-6.6.0-107.0.0.99.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-107.0.0.99.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-107.0.0.99.oe2403.x86_64",
					"openEuler-24.03-LTS:perf-6.6.0-107.0.0.99.oe2403.x86_64",
					"openEuler-24.03-LTS:perf-debuginfo-6.6.0-107.0.0.99.oe2403.x86_64",
					"openEuler-24.03-LTS:python3-perf-6.6.0-107.0.0.99.oe2403.x86_64",
					"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-107.0.0.99.oe2403.x86_64"
				]
			},
			"remediations":[
				{
					"product_ids":[
						"openEuler-24.03-LTS:kernel-6.6.0-107.0.0.99.oe2403.src",
						"openEuler-24.03-LTS:bpftool-6.6.0-107.0.0.99.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-107.0.0.99.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-6.6.0-107.0.0.99.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-107.0.0.99.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-107.0.0.99.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-107.0.0.99.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-107.0.0.99.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-107.0.0.99.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-107.0.0.99.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-107.0.0.99.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-107.0.0.99.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-6.6.0-107.0.0.99.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-107.0.0.99.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-107.0.0.99.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-107.0.0.99.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-6.6.0-107.0.0.99.oe2403.x86_64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-107.0.0.99.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-6.6.0-107.0.0.99.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-107.0.0.99.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-107.0.0.99.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-107.0.0.99.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-107.0.0.99.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-107.0.0.99.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-107.0.0.99.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-107.0.0.99.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-107.0.0.99.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-6.6.0-107.0.0.99.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-107.0.0.99.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-107.0.0.99.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-107.0.0.99.oe2403.x86_64"
					],
					"details":"kernel security update",
					"category":"vendor_fix",
					"url":"https://www.openeuler.org/zh/security/security-bulletins/detail/?id=openEuler-SA-2025-2077"
				}
			],
			"scores":[
				{
					"cvss_v3":{
						"baseSeverity":"LOW",
						"baseScore":3.9,
						"vectorString":"CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:L/I:L/A:L",
						"version":"3.1"
					},
					"products":[
						"openEuler-24.03-LTS:kernel-6.6.0-107.0.0.99.oe2403.src",
						"openEuler-24.03-LTS:bpftool-6.6.0-107.0.0.99.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-107.0.0.99.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-6.6.0-107.0.0.99.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-107.0.0.99.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-107.0.0.99.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-107.0.0.99.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-107.0.0.99.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-107.0.0.99.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-107.0.0.99.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-107.0.0.99.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-107.0.0.99.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-6.6.0-107.0.0.99.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-107.0.0.99.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-107.0.0.99.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-107.0.0.99.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-6.6.0-107.0.0.99.oe2403.x86_64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-107.0.0.99.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-6.6.0-107.0.0.99.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-107.0.0.99.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-107.0.0.99.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-107.0.0.99.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-107.0.0.99.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-107.0.0.99.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-107.0.0.99.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-107.0.0.99.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-107.0.0.99.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-6.6.0-107.0.0.99.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-107.0.0.99.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-107.0.0.99.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-107.0.0.99.oe2403.x86_64"
					]
				}
			],
			"threats":[
				{
					"details":"Low",
					"category":"impact"
				}
			],
			"title":"CVE-2025-38444"
		},
		{
			"cve":"CVE-2025-38445",
			"notes":[
				{
					"text":"In the Linux kernel, the following vulnerability has been resolved:\n\nmd/raid1: Fix stack memory use after return in raid1_reshape\n\nIn the raid1_reshape function, newpool is\nallocated on the stack and assigned to conf->r1bio_pool.\nThis results in conf->r1bio_pool.wait.head pointing\nto a stack address.\nAccessing this address later can lead to a kernel panic.\n\nExample access path:\n\nraid1_reshape()\n{\n\t// newpool is on the stack\n\tmempool_t newpool, oldpool;\n\t// initialize newpool.wait.head to stack address\n\tmempool_init(&newpool, ...);\n\tconf->r1bio_pool = newpool;\n}\n\nraid1_read_request() or raid1_write_request()\n{\n\talloc_r1bio()\n\t{\n\t\tmempool_alloc()\n\t\t{\n\t\t\t// if pool->alloc fails\n\t\t\tremove_element()\n\t\t\t{\n\t\t\t\t--pool->curr_nr;\n\t\t\t}\n\t\t}\n\t}\n}\n\nmempool_free()\n{\n\tif (pool->curr_nr < pool->min_nr) {\n\t\t// pool->wait.head is a stack address\n\t\t// wake_up() will try to access this invalid address\n\t\t// which leads to a kernel panic\n\t\treturn;\n\t\twake_up(&pool->wait);\n\t}\n}\n\nFix:\nreinit conf->r1bio_pool.wait after assigning newpool.",
					"category":"description",
					"title":"Vulnerability Description"
				}
			],
			"product_status":{
				"fixed":[
					"openEuler-24.03-LTS:kernel-6.6.0-107.0.0.99.oe2403.src",
					"openEuler-24.03-LTS:bpftool-6.6.0-107.0.0.99.oe2403.aarch64",
					"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-107.0.0.99.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-6.6.0-107.0.0.99.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-107.0.0.99.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-debugsource-6.6.0-107.0.0.99.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-devel-6.6.0-107.0.0.99.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-headers-6.6.0-107.0.0.99.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-source-6.6.0-107.0.0.99.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-tools-6.6.0-107.0.0.99.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-107.0.0.99.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-107.0.0.99.oe2403.aarch64",
					"openEuler-24.03-LTS:perf-6.6.0-107.0.0.99.oe2403.aarch64",
					"openEuler-24.03-LTS:perf-debuginfo-6.6.0-107.0.0.99.oe2403.aarch64",
					"openEuler-24.03-LTS:python3-perf-6.6.0-107.0.0.99.oe2403.aarch64",
					"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-107.0.0.99.oe2403.aarch64",
					"openEuler-24.03-LTS:bpftool-6.6.0-107.0.0.99.oe2403.x86_64",
					"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-107.0.0.99.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-6.6.0-107.0.0.99.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-107.0.0.99.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-debugsource-6.6.0-107.0.0.99.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-devel-6.6.0-107.0.0.99.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-headers-6.6.0-107.0.0.99.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-source-6.6.0-107.0.0.99.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-tools-6.6.0-107.0.0.99.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-107.0.0.99.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-107.0.0.99.oe2403.x86_64",
					"openEuler-24.03-LTS:perf-6.6.0-107.0.0.99.oe2403.x86_64",
					"openEuler-24.03-LTS:perf-debuginfo-6.6.0-107.0.0.99.oe2403.x86_64",
					"openEuler-24.03-LTS:python3-perf-6.6.0-107.0.0.99.oe2403.x86_64",
					"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-107.0.0.99.oe2403.x86_64"
				]
			},
			"remediations":[
				{
					"product_ids":[
						"openEuler-24.03-LTS:kernel-6.6.0-107.0.0.99.oe2403.src",
						"openEuler-24.03-LTS:bpftool-6.6.0-107.0.0.99.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-107.0.0.99.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-6.6.0-107.0.0.99.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-107.0.0.99.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-107.0.0.99.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-107.0.0.99.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-107.0.0.99.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-107.0.0.99.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-107.0.0.99.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-107.0.0.99.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-107.0.0.99.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-6.6.0-107.0.0.99.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-107.0.0.99.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-107.0.0.99.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-107.0.0.99.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-6.6.0-107.0.0.99.oe2403.x86_64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-107.0.0.99.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-6.6.0-107.0.0.99.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-107.0.0.99.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-107.0.0.99.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-107.0.0.99.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-107.0.0.99.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-107.0.0.99.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-107.0.0.99.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-107.0.0.99.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-107.0.0.99.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-6.6.0-107.0.0.99.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-107.0.0.99.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-107.0.0.99.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-107.0.0.99.oe2403.x86_64"
					],
					"details":"kernel security update",
					"category":"vendor_fix",
					"url":"https://www.openeuler.org/zh/security/security-bulletins/detail/?id=openEuler-SA-2025-2077"
				}
			],
			"scores":[
				{
					"cvss_v3":{
						"baseSeverity":"MEDIUM",
						"baseScore":5.7,
						"vectorString":"CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
						"version":"3.1"
					},
					"products":[
						"openEuler-24.03-LTS:kernel-6.6.0-107.0.0.99.oe2403.src",
						"openEuler-24.03-LTS:bpftool-6.6.0-107.0.0.99.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-107.0.0.99.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-6.6.0-107.0.0.99.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-107.0.0.99.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-107.0.0.99.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-107.0.0.99.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-107.0.0.99.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-107.0.0.99.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-107.0.0.99.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-107.0.0.99.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-107.0.0.99.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-6.6.0-107.0.0.99.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-107.0.0.99.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-107.0.0.99.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-107.0.0.99.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-6.6.0-107.0.0.99.oe2403.x86_64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-107.0.0.99.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-6.6.0-107.0.0.99.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-107.0.0.99.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-107.0.0.99.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-107.0.0.99.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-107.0.0.99.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-107.0.0.99.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-107.0.0.99.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-107.0.0.99.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-107.0.0.99.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-6.6.0-107.0.0.99.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-107.0.0.99.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-107.0.0.99.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-107.0.0.99.oe2403.x86_64"
					]
				}
			],
			"threats":[
				{
					"details":"Medium",
					"category":"impact"
				}
			],
			"title":"CVE-2025-38445"
		},
		{
			"cve":"CVE-2025-38456",
			"notes":[
				{
					"text":"In the Linux kernel, the following vulnerability has been resolved:\n\nipmi:msghandler: Fix potential memory corruption in ipmi_create_user()\n\nThe \"intf\" list iterator is an invalid pointer if the correct\n\"intf->intf_num\" is not found.  Calling atomic_dec(&intf->nr_users) on\nand invalid pointer will lead to memory corruption.\n\nWe don't really need to call atomic_dec() if we haven't called\natomic_add_return() so update the if (intf->in_shutdown) path as well.",
					"category":"description",
					"title":"Vulnerability Description"
				}
			],
			"product_status":{
				"fixed":[
					"openEuler-24.03-LTS:kernel-6.6.0-107.0.0.99.oe2403.src",
					"openEuler-24.03-LTS:bpftool-6.6.0-107.0.0.99.oe2403.aarch64",
					"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-107.0.0.99.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-6.6.0-107.0.0.99.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-107.0.0.99.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-debugsource-6.6.0-107.0.0.99.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-devel-6.6.0-107.0.0.99.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-headers-6.6.0-107.0.0.99.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-source-6.6.0-107.0.0.99.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-tools-6.6.0-107.0.0.99.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-107.0.0.99.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-107.0.0.99.oe2403.aarch64",
					"openEuler-24.03-LTS:perf-6.6.0-107.0.0.99.oe2403.aarch64",
					"openEuler-24.03-LTS:perf-debuginfo-6.6.0-107.0.0.99.oe2403.aarch64",
					"openEuler-24.03-LTS:python3-perf-6.6.0-107.0.0.99.oe2403.aarch64",
					"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-107.0.0.99.oe2403.aarch64",
					"openEuler-24.03-LTS:bpftool-6.6.0-107.0.0.99.oe2403.x86_64",
					"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-107.0.0.99.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-6.6.0-107.0.0.99.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-107.0.0.99.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-debugsource-6.6.0-107.0.0.99.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-devel-6.6.0-107.0.0.99.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-headers-6.6.0-107.0.0.99.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-source-6.6.0-107.0.0.99.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-tools-6.6.0-107.0.0.99.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-107.0.0.99.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-107.0.0.99.oe2403.x86_64",
					"openEuler-24.03-LTS:perf-6.6.0-107.0.0.99.oe2403.x86_64",
					"openEuler-24.03-LTS:perf-debuginfo-6.6.0-107.0.0.99.oe2403.x86_64",
					"openEuler-24.03-LTS:python3-perf-6.6.0-107.0.0.99.oe2403.x86_64",
					"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-107.0.0.99.oe2403.x86_64"
				]
			},
			"remediations":[
				{
					"product_ids":[
						"openEuler-24.03-LTS:kernel-6.6.0-107.0.0.99.oe2403.src",
						"openEuler-24.03-LTS:bpftool-6.6.0-107.0.0.99.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-107.0.0.99.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-6.6.0-107.0.0.99.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-107.0.0.99.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-107.0.0.99.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-107.0.0.99.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-107.0.0.99.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-107.0.0.99.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-107.0.0.99.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-107.0.0.99.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-107.0.0.99.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-6.6.0-107.0.0.99.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-107.0.0.99.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-107.0.0.99.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-107.0.0.99.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-6.6.0-107.0.0.99.oe2403.x86_64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-107.0.0.99.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-6.6.0-107.0.0.99.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-107.0.0.99.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-107.0.0.99.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-107.0.0.99.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-107.0.0.99.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-107.0.0.99.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-107.0.0.99.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-107.0.0.99.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-107.0.0.99.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-6.6.0-107.0.0.99.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-107.0.0.99.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-107.0.0.99.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-107.0.0.99.oe2403.x86_64"
					],
					"details":"kernel security update",
					"category":"vendor_fix",
					"url":"https://www.openeuler.org/zh/security/security-bulletins/detail/?id=openEuler-SA-2025-2077"
				}
			],
			"scores":[
				{
					"cvss_v3":{
						"baseSeverity":"LOW",
						"baseScore":3.9,
						"vectorString":"CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:L/I:L/A:L",
						"version":"3.1"
					},
					"products":[
						"openEuler-24.03-LTS:kernel-6.6.0-107.0.0.99.oe2403.src",
						"openEuler-24.03-LTS:bpftool-6.6.0-107.0.0.99.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-107.0.0.99.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-6.6.0-107.0.0.99.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-107.0.0.99.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-107.0.0.99.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-107.0.0.99.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-107.0.0.99.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-107.0.0.99.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-107.0.0.99.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-107.0.0.99.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-107.0.0.99.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-6.6.0-107.0.0.99.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-107.0.0.99.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-107.0.0.99.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-107.0.0.99.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-6.6.0-107.0.0.99.oe2403.x86_64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-107.0.0.99.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-6.6.0-107.0.0.99.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-107.0.0.99.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-107.0.0.99.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-107.0.0.99.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-107.0.0.99.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-107.0.0.99.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-107.0.0.99.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-107.0.0.99.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-107.0.0.99.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-6.6.0-107.0.0.99.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-107.0.0.99.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-107.0.0.99.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-107.0.0.99.oe2403.x86_64"
					]
				}
			],
			"threats":[
				{
					"details":"Low",
					"category":"impact"
				}
			],
			"title":"CVE-2025-38456"
		},
		{
			"cve":"CVE-2025-38463",
			"notes":[
				{
					"text":"A vulnerability, which was classified as problematic, has been found in Linux Kernel up to 6.6.98/6.12.38/6.15.6/6.16-rc5 (Operating System).The manipulation of the argument involved with an unknown input leads to a unknown weakness. Using CWE to declare the problem leads to CWE-770. The product allocates a reusable resource or group of resources on behalf of an actor without imposing any restrictions on the size or number of resources that can be allocated, in violation of the intended security policy for that actor.Impacted is confidentiality, integrity, and availability.Upgrading to version 6.6.99, 6.12.39, 6.15.7 or 6.16-rc6 eliminates this vulnerability. Applying the patch 81373cd1d72d87c7d844d4454a526b8f53e72d00/62e6160cfb5514787bda833d466509edc38fde23/9f164fa6bb09fbcc60fa5c3ff551ce9eec1befd7/d3a5f2871adc0c61c61869f37f3e697d97f03d8c is able to eliminate this problem. The bugfix is ready for download at git.kernel.org. The best possible mitigation is suggested to be upgrading to the latest version.",
					"category":"description",
					"title":"Vulnerability Description"
				}
			],
			"product_status":{
				"fixed":[
					"openEuler-24.03-LTS:kernel-6.6.0-107.0.0.99.oe2403.src",
					"openEuler-24.03-LTS:bpftool-6.6.0-107.0.0.99.oe2403.aarch64",
					"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-107.0.0.99.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-6.6.0-107.0.0.99.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-107.0.0.99.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-debugsource-6.6.0-107.0.0.99.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-devel-6.6.0-107.0.0.99.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-headers-6.6.0-107.0.0.99.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-source-6.6.0-107.0.0.99.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-tools-6.6.0-107.0.0.99.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-107.0.0.99.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-107.0.0.99.oe2403.aarch64",
					"openEuler-24.03-LTS:perf-6.6.0-107.0.0.99.oe2403.aarch64",
					"openEuler-24.03-LTS:perf-debuginfo-6.6.0-107.0.0.99.oe2403.aarch64",
					"openEuler-24.03-LTS:python3-perf-6.6.0-107.0.0.99.oe2403.aarch64",
					"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-107.0.0.99.oe2403.aarch64",
					"openEuler-24.03-LTS:bpftool-6.6.0-107.0.0.99.oe2403.x86_64",
					"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-107.0.0.99.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-6.6.0-107.0.0.99.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-107.0.0.99.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-debugsource-6.6.0-107.0.0.99.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-devel-6.6.0-107.0.0.99.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-headers-6.6.0-107.0.0.99.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-source-6.6.0-107.0.0.99.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-tools-6.6.0-107.0.0.99.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-107.0.0.99.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-107.0.0.99.oe2403.x86_64",
					"openEuler-24.03-LTS:perf-6.6.0-107.0.0.99.oe2403.x86_64",
					"openEuler-24.03-LTS:perf-debuginfo-6.6.0-107.0.0.99.oe2403.x86_64",
					"openEuler-24.03-LTS:python3-perf-6.6.0-107.0.0.99.oe2403.x86_64",
					"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-107.0.0.99.oe2403.x86_64"
				]
			},
			"remediations":[
				{
					"product_ids":[
						"openEuler-24.03-LTS:kernel-6.6.0-107.0.0.99.oe2403.src",
						"openEuler-24.03-LTS:bpftool-6.6.0-107.0.0.99.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-107.0.0.99.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-6.6.0-107.0.0.99.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-107.0.0.99.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-107.0.0.99.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-107.0.0.99.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-107.0.0.99.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-107.0.0.99.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-107.0.0.99.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-107.0.0.99.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-107.0.0.99.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-6.6.0-107.0.0.99.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-107.0.0.99.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-107.0.0.99.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-107.0.0.99.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-6.6.0-107.0.0.99.oe2403.x86_64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-107.0.0.99.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-6.6.0-107.0.0.99.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-107.0.0.99.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-107.0.0.99.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-107.0.0.99.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-107.0.0.99.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-107.0.0.99.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-107.0.0.99.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-107.0.0.99.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-107.0.0.99.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-6.6.0-107.0.0.99.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-107.0.0.99.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-107.0.0.99.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-107.0.0.99.oe2403.x86_64"
					],
					"details":"kernel security update",
					"category":"vendor_fix",
					"url":"https://www.openeuler.org/zh/security/security-bulletins/detail/?id=openEuler-SA-2025-2077"
				}
			],
			"scores":[
				{
					"cvss_v3":{
						"baseSeverity":"LOW",
						"baseScore":3.9,
						"vectorString":"CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:L/I:L/A:L",
						"version":"3.1"
					},
					"products":[
						"openEuler-24.03-LTS:kernel-6.6.0-107.0.0.99.oe2403.src",
						"openEuler-24.03-LTS:bpftool-6.6.0-107.0.0.99.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-107.0.0.99.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-6.6.0-107.0.0.99.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-107.0.0.99.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-107.0.0.99.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-107.0.0.99.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-107.0.0.99.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-107.0.0.99.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-107.0.0.99.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-107.0.0.99.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-107.0.0.99.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-6.6.0-107.0.0.99.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-107.0.0.99.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-107.0.0.99.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-107.0.0.99.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-6.6.0-107.0.0.99.oe2403.x86_64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-107.0.0.99.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-6.6.0-107.0.0.99.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-107.0.0.99.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-107.0.0.99.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-107.0.0.99.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-107.0.0.99.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-107.0.0.99.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-107.0.0.99.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-107.0.0.99.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-107.0.0.99.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-6.6.0-107.0.0.99.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-107.0.0.99.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-107.0.0.99.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-107.0.0.99.oe2403.x86_64"
					]
				}
			],
			"threats":[
				{
					"details":"Low",
					"category":"impact"
				}
			],
			"title":"CVE-2025-38463"
		},
		{
			"cve":"CVE-2025-38464",
			"notes":[
				{
					"text":"In the Linux kernel, the following vulnerability has been resolved:\n\ntipc: Fix use-after-free in tipc_conn_close().\n\nsyzbot reported a null-ptr-deref in tipc_conn_close() during netns\ndismantle. [0]\n\ntipc_topsrv_stop() iterates tipc_net(net)->topsrv->conn_idr and calls\ntipc_conn_close() for each tipc_conn.\n\nThe problem is that tipc_conn_close() is called after releasing the\nIDR lock.\n\nAt the same time, there might be tipc_conn_recv_work() running and it\ncould call tipc_conn_close() for the same tipc_conn and release its\nlast ->kref.\n\nOnce we release the IDR lock in tipc_topsrv_stop(), there is no\nguarantee that the tipc_conn is alive.\n\nLet's hold the ref before releasing the lock and put the ref after\ntipc_conn_close() in tipc_topsrv_stop().\n\n[0]:\nBUG: KASAN: use-after-free in tipc_conn_close+0x122/0x140 net/tipc/topsrv.c:165\nRead of size 8 at addr ffff888099305a08 by task kworker/u4:3/435\n\nCPU: 0 PID: 435 Comm: kworker/u4:3 Not tainted 4.19.204-syzkaller #0\nHardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011\nWorkqueue: netns cleanup_net\nCall Trace:\n __dump_stack lib/dump_stack.c:77 [inline]\n dump_stack+0x1fc/0x2ef lib/dump_stack.c:118\n print_address_description.cold+0x54/0x219 mm/kasan/report.c:256\n kasan_report_error.cold+0x8a/0x1b9 mm/kasan/report.c:354\n kasan_report mm/kasan/report.c:412 [inline]\n __asan_report_load8_noabort+0x88/0x90 mm/kasan/report.c:433\n tipc_conn_close+0x122/0x140 net/tipc/topsrv.c:165\n tipc_topsrv_stop net/tipc/topsrv.c:701 [inline]\n tipc_topsrv_exit_net+0x27b/0x5c0 net/tipc/topsrv.c:722\n ops_exit_list+0xa5/0x150 net/core/net_namespace.c:153\n cleanup_net+0x3b4/0x8b0 net/core/net_namespace.c:553\n process_one_work+0x864/0x1570 kernel/workqueue.c:2153\n worker_thread+0x64c/0x1130 kernel/workqueue.c:2296\n kthread+0x33f/0x460 kernel/kthread.c:259\n ret_from_fork+0x24/0x30 arch/x86/entry/entry_64.S:415\n\nAllocated by task 23:\n kmem_cache_alloc_trace+0x12f/0x380 mm/slab.c:3625\n kmalloc include/linux/slab.h:515 [inline]\n kzalloc include/linux/slab.h:709 [inline]\n tipc_conn_alloc+0x43/0x4f0 net/tipc/topsrv.c:192\n tipc_topsrv_accept+0x1b5/0x280 net/tipc/topsrv.c:470\n process_one_work+0x864/0x1570 kernel/workqueue.c:2153\n worker_thread+0x64c/0x1130 kernel/workqueue.c:2296\n kthread+0x33f/0x460 kernel/kthread.c:259\n ret_from_fork+0x24/0x30 arch/x86/entry/entry_64.S:415\n\nFreed by task 23:\n __cache_free mm/slab.c:3503 [inline]\n kfree+0xcc/0x210 mm/slab.c:3822\n tipc_conn_kref_release net/tipc/topsrv.c:150 [inline]\n kref_put include/linux/kref.h:70 [inline]\n conn_put+0x2cd/0x3a0 net/tipc/topsrv.c:155\n process_one_work+0x864/0x1570 kernel/workqueue.c:2153\n worker_thread+0x64c/0x1130 kernel/workqueue.c:2296\n kthread+0x33f/0x460 kernel/kthread.c:259\n ret_from_fork+0x24/0x30 arch/x86/entry/entry_64.S:415\n\nThe buggy address belongs to the object at ffff888099305a00\n which belongs to the cache kmalloc-512 of size 512\nThe buggy address is located 8 bytes inside of\n 512-byte region [ffff888099305a00, ffff888099305c00)\nThe buggy address belongs to the page:\npage:ffffea000264c140 count:1 mapcount:0 mapping:ffff88813bff0940 index:0x0\nflags: 0xfff00000000100(slab)\nraw: 00fff00000000100 ffffea00028b6b88 ffffea0002cd2b08 ffff88813bff0940\nraw: 0000000000000000 ffff888099305000 0000000100000006 0000000000000000\npage dumped because: kasan: bad access detected\n\nMemory state around the buggy address:\n ffff888099305900: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb\n ffff888099305980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc\n>ffff888099305a00: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb\n                      ^\n ffff888099305a80: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb\n ffff888099305b00: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb",
					"category":"description",
					"title":"Vulnerability Description"
				}
			],
			"product_status":{
				"fixed":[
					"openEuler-24.03-LTS:kernel-6.6.0-107.0.0.99.oe2403.src",
					"openEuler-24.03-LTS:bpftool-6.6.0-107.0.0.99.oe2403.aarch64",
					"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-107.0.0.99.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-6.6.0-107.0.0.99.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-107.0.0.99.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-debugsource-6.6.0-107.0.0.99.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-devel-6.6.0-107.0.0.99.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-headers-6.6.0-107.0.0.99.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-source-6.6.0-107.0.0.99.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-tools-6.6.0-107.0.0.99.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-107.0.0.99.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-107.0.0.99.oe2403.aarch64",
					"openEuler-24.03-LTS:perf-6.6.0-107.0.0.99.oe2403.aarch64",
					"openEuler-24.03-LTS:perf-debuginfo-6.6.0-107.0.0.99.oe2403.aarch64",
					"openEuler-24.03-LTS:python3-perf-6.6.0-107.0.0.99.oe2403.aarch64",
					"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-107.0.0.99.oe2403.aarch64",
					"openEuler-24.03-LTS:bpftool-6.6.0-107.0.0.99.oe2403.x86_64",
					"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-107.0.0.99.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-6.6.0-107.0.0.99.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-107.0.0.99.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-debugsource-6.6.0-107.0.0.99.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-devel-6.6.0-107.0.0.99.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-headers-6.6.0-107.0.0.99.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-source-6.6.0-107.0.0.99.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-tools-6.6.0-107.0.0.99.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-107.0.0.99.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-107.0.0.99.oe2403.x86_64",
					"openEuler-24.03-LTS:perf-6.6.0-107.0.0.99.oe2403.x86_64",
					"openEuler-24.03-LTS:perf-debuginfo-6.6.0-107.0.0.99.oe2403.x86_64",
					"openEuler-24.03-LTS:python3-perf-6.6.0-107.0.0.99.oe2403.x86_64",
					"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-107.0.0.99.oe2403.x86_64"
				]
			},
			"remediations":[
				{
					"product_ids":[
						"openEuler-24.03-LTS:kernel-6.6.0-107.0.0.99.oe2403.src",
						"openEuler-24.03-LTS:bpftool-6.6.0-107.0.0.99.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-107.0.0.99.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-6.6.0-107.0.0.99.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-107.0.0.99.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-107.0.0.99.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-107.0.0.99.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-107.0.0.99.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-107.0.0.99.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-107.0.0.99.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-107.0.0.99.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-107.0.0.99.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-6.6.0-107.0.0.99.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-107.0.0.99.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-107.0.0.99.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-107.0.0.99.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-6.6.0-107.0.0.99.oe2403.x86_64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-107.0.0.99.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-6.6.0-107.0.0.99.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-107.0.0.99.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-107.0.0.99.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-107.0.0.99.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-107.0.0.99.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-107.0.0.99.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-107.0.0.99.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-107.0.0.99.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-107.0.0.99.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-6.6.0-107.0.0.99.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-107.0.0.99.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-107.0.0.99.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-107.0.0.99.oe2403.x86_64"
					],
					"details":"kernel security update",
					"category":"vendor_fix",
					"url":"https://www.openeuler.org/zh/security/security-bulletins/detail/?id=openEuler-SA-2025-2077"
				}
			],
			"scores":[
				{
					"cvss_v3":{
						"baseSeverity":"HIGH",
						"baseScore":8.0,
						"vectorString":"CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
						"version":"3.1"
					},
					"products":[
						"openEuler-24.03-LTS:kernel-6.6.0-107.0.0.99.oe2403.src",
						"openEuler-24.03-LTS:bpftool-6.6.0-107.0.0.99.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-107.0.0.99.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-6.6.0-107.0.0.99.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-107.0.0.99.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-107.0.0.99.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-107.0.0.99.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-107.0.0.99.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-107.0.0.99.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-107.0.0.99.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-107.0.0.99.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-107.0.0.99.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-6.6.0-107.0.0.99.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-107.0.0.99.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-107.0.0.99.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-107.0.0.99.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-6.6.0-107.0.0.99.oe2403.x86_64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-107.0.0.99.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-6.6.0-107.0.0.99.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-107.0.0.99.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-107.0.0.99.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-107.0.0.99.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-107.0.0.99.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-107.0.0.99.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-107.0.0.99.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-107.0.0.99.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-107.0.0.99.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-6.6.0-107.0.0.99.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-107.0.0.99.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-107.0.0.99.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-107.0.0.99.oe2403.x86_64"
					]
				}
			],
			"threats":[
				{
					"details":"High",
					"category":"impact"
				}
			],
			"title":"CVE-2025-38464"
		},
		{
			"cve":"CVE-2025-38465",
			"notes":[
				{
					"text":"A vulnerability was found in Linux Kernel up to 6.16-rc5 (Operating System). It has been classified as problematic.CWE is classifying the issue as CWE-345. The product does not sufficiently verify the origin or authenticity of data, in a way that causes it to accept invalid data.This is going to have an impact on confidentiality, integrity, and availability.Upgrading to version 5.4.296, 5.10.240, 5.15.189, 6.1.146, 6.6.99, 6.12.39, 6.15.7 or 6.16-rc6 eliminates this vulnerability. Applying the patch 9da025150b7c14a8390fc06aea314c0a4011e82c/c4ceaac5c5ba0b992ee1dc88e2a02421549e5c98/fd69af06101090eaa60b3d216ae715f9c0a58e5b/76602d8e13864524382b0687dc32cd8f19164d5a/55baecb9eb90238f60a8350660d6762046ebd3bd/4b8e18af7bea92f8b7fb92d40aeae729209db250/cd7ff61bfffd7000143c42bbffb85eeb792466d6/ae8f160e7eb24240a2a79fc4c815c6a0d4ee16cc is able to eliminate this problem. The bugfix is ready for download at git.kernel.org. The best possible mitigation is suggested to be upgrading to the latest version.",
					"category":"description",
					"title":"Vulnerability Description"
				}
			],
			"product_status":{
				"fixed":[
					"openEuler-24.03-LTS:kernel-6.6.0-107.0.0.99.oe2403.src",
					"openEuler-24.03-LTS:bpftool-6.6.0-107.0.0.99.oe2403.aarch64",
					"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-107.0.0.99.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-6.6.0-107.0.0.99.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-107.0.0.99.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-debugsource-6.6.0-107.0.0.99.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-devel-6.6.0-107.0.0.99.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-headers-6.6.0-107.0.0.99.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-source-6.6.0-107.0.0.99.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-tools-6.6.0-107.0.0.99.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-107.0.0.99.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-107.0.0.99.oe2403.aarch64",
					"openEuler-24.03-LTS:perf-6.6.0-107.0.0.99.oe2403.aarch64",
					"openEuler-24.03-LTS:perf-debuginfo-6.6.0-107.0.0.99.oe2403.aarch64",
					"openEuler-24.03-LTS:python3-perf-6.6.0-107.0.0.99.oe2403.aarch64",
					"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-107.0.0.99.oe2403.aarch64",
					"openEuler-24.03-LTS:bpftool-6.6.0-107.0.0.99.oe2403.x86_64",
					"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-107.0.0.99.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-6.6.0-107.0.0.99.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-107.0.0.99.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-debugsource-6.6.0-107.0.0.99.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-devel-6.6.0-107.0.0.99.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-headers-6.6.0-107.0.0.99.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-source-6.6.0-107.0.0.99.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-tools-6.6.0-107.0.0.99.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-107.0.0.99.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-107.0.0.99.oe2403.x86_64",
					"openEuler-24.03-LTS:perf-6.6.0-107.0.0.99.oe2403.x86_64",
					"openEuler-24.03-LTS:perf-debuginfo-6.6.0-107.0.0.99.oe2403.x86_64",
					"openEuler-24.03-LTS:python3-perf-6.6.0-107.0.0.99.oe2403.x86_64",
					"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-107.0.0.99.oe2403.x86_64"
				]
			},
			"remediations":[
				{
					"product_ids":[
						"openEuler-24.03-LTS:kernel-6.6.0-107.0.0.99.oe2403.src",
						"openEuler-24.03-LTS:bpftool-6.6.0-107.0.0.99.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-107.0.0.99.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-6.6.0-107.0.0.99.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-107.0.0.99.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-107.0.0.99.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-107.0.0.99.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-107.0.0.99.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-107.0.0.99.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-107.0.0.99.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-107.0.0.99.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-107.0.0.99.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-6.6.0-107.0.0.99.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-107.0.0.99.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-107.0.0.99.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-107.0.0.99.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-6.6.0-107.0.0.99.oe2403.x86_64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-107.0.0.99.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-6.6.0-107.0.0.99.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-107.0.0.99.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-107.0.0.99.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-107.0.0.99.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-107.0.0.99.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-107.0.0.99.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-107.0.0.99.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-107.0.0.99.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-107.0.0.99.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-6.6.0-107.0.0.99.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-107.0.0.99.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-107.0.0.99.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-107.0.0.99.oe2403.x86_64"
					],
					"details":"kernel security update",
					"category":"vendor_fix",
					"url":"https://www.openeuler.org/zh/security/security-bulletins/detail/?id=openEuler-SA-2025-2077"
				}
			],
			"scores":[
				{
					"cvss_v3":{
						"baseSeverity":"MEDIUM",
						"baseScore":5.5,
						"vectorString":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
						"version":"3.1"
					},
					"products":[
						"openEuler-24.03-LTS:kernel-6.6.0-107.0.0.99.oe2403.src",
						"openEuler-24.03-LTS:bpftool-6.6.0-107.0.0.99.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-107.0.0.99.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-6.6.0-107.0.0.99.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-107.0.0.99.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-107.0.0.99.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-107.0.0.99.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-107.0.0.99.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-107.0.0.99.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-107.0.0.99.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-107.0.0.99.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-107.0.0.99.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-6.6.0-107.0.0.99.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-107.0.0.99.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-107.0.0.99.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-107.0.0.99.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-6.6.0-107.0.0.99.oe2403.x86_64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-107.0.0.99.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-6.6.0-107.0.0.99.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-107.0.0.99.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-107.0.0.99.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-107.0.0.99.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-107.0.0.99.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-107.0.0.99.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-107.0.0.99.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-107.0.0.99.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-107.0.0.99.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-6.6.0-107.0.0.99.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-107.0.0.99.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-107.0.0.99.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-107.0.0.99.oe2403.x86_64"
					]
				}
			],
			"threats":[
				{
					"details":"Medium",
					"category":"impact"
				}
			],
			"title":"CVE-2025-38465"
		},
		{
			"cve":"CVE-2025-38515",
			"notes":[
				{
					"text":"A vulnerability was found in Linux Kernel up to 6.15.6 (Operating System). It has been rated as critical.Using CWE to declare the problem leads to CWE-404. The product does not release or incorrectly releases a resource before it is made available for re-use.Impacted is availability.Upgrading to version 5.4.296, 5.10.240, 5.15.189, 6.1.146, 6.6.99, 6.12.39 or 6.15.7 eliminates this vulnerability. Applying the patch 549a9c78c3ea6807d0dc4162a4f5ba59f217d5a0/e62f51d0ec8a9baf324caf9a564f8e318d36a551/ef841f8e4e1ff67817ca899bedc5ebb00847c0a7/f9a4f28a4fc4ee453a92a9abbe36e26224d17749/c64f5310530baf75328292f9b9f3f2961d185183/e2d6547dc8b9b332f9bc00875197287a6a4db65a/ef58a95457466849fa7b31fd3953801a5af0f58b/8af39ec5cf2be522c8eb43a3d8005ed59e4daaee is able to eliminate this problem. The bugfix is ready for download at git.kernel.org. The best possible mitigation is suggested to be upgrading to the latest version.",
					"category":"description",
					"title":"Vulnerability Description"
				}
			],
			"product_status":{
				"fixed":[
					"openEuler-24.03-LTS:kernel-6.6.0-107.0.0.99.oe2403.src",
					"openEuler-24.03-LTS:bpftool-6.6.0-107.0.0.99.oe2403.aarch64",
					"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-107.0.0.99.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-6.6.0-107.0.0.99.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-107.0.0.99.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-debugsource-6.6.0-107.0.0.99.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-devel-6.6.0-107.0.0.99.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-headers-6.6.0-107.0.0.99.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-source-6.6.0-107.0.0.99.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-tools-6.6.0-107.0.0.99.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-107.0.0.99.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-107.0.0.99.oe2403.aarch64",
					"openEuler-24.03-LTS:perf-6.6.0-107.0.0.99.oe2403.aarch64",
					"openEuler-24.03-LTS:perf-debuginfo-6.6.0-107.0.0.99.oe2403.aarch64",
					"openEuler-24.03-LTS:python3-perf-6.6.0-107.0.0.99.oe2403.aarch64",
					"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-107.0.0.99.oe2403.aarch64",
					"openEuler-24.03-LTS:bpftool-6.6.0-107.0.0.99.oe2403.x86_64",
					"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-107.0.0.99.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-6.6.0-107.0.0.99.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-107.0.0.99.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-debugsource-6.6.0-107.0.0.99.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-devel-6.6.0-107.0.0.99.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-headers-6.6.0-107.0.0.99.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-source-6.6.0-107.0.0.99.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-tools-6.6.0-107.0.0.99.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-107.0.0.99.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-107.0.0.99.oe2403.x86_64",
					"openEuler-24.03-LTS:perf-6.6.0-107.0.0.99.oe2403.x86_64",
					"openEuler-24.03-LTS:perf-debuginfo-6.6.0-107.0.0.99.oe2403.x86_64",
					"openEuler-24.03-LTS:python3-perf-6.6.0-107.0.0.99.oe2403.x86_64",
					"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-107.0.0.99.oe2403.x86_64"
				]
			},
			"remediations":[
				{
					"product_ids":[
						"openEuler-24.03-LTS:kernel-6.6.0-107.0.0.99.oe2403.src",
						"openEuler-24.03-LTS:bpftool-6.6.0-107.0.0.99.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-107.0.0.99.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-6.6.0-107.0.0.99.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-107.0.0.99.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-107.0.0.99.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-107.0.0.99.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-107.0.0.99.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-107.0.0.99.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-107.0.0.99.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-107.0.0.99.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-107.0.0.99.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-6.6.0-107.0.0.99.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-107.0.0.99.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-107.0.0.99.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-107.0.0.99.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-6.6.0-107.0.0.99.oe2403.x86_64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-107.0.0.99.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-6.6.0-107.0.0.99.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-107.0.0.99.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-107.0.0.99.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-107.0.0.99.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-107.0.0.99.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-107.0.0.99.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-107.0.0.99.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-107.0.0.99.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-107.0.0.99.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-6.6.0-107.0.0.99.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-107.0.0.99.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-107.0.0.99.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-107.0.0.99.oe2403.x86_64"
					],
					"details":"kernel security update",
					"category":"vendor_fix",
					"url":"https://www.openeuler.org/zh/security/security-bulletins/detail/?id=openEuler-SA-2025-2077"
				}
			],
			"scores":[
				{
					"cvss_v3":{
						"baseSeverity":"LOW",
						"baseScore":3.9,
						"vectorString":"CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:L/I:L/A:L",
						"version":"3.1"
					},
					"products":[
						"openEuler-24.03-LTS:kernel-6.6.0-107.0.0.99.oe2403.src",
						"openEuler-24.03-LTS:bpftool-6.6.0-107.0.0.99.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-107.0.0.99.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-6.6.0-107.0.0.99.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-107.0.0.99.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-107.0.0.99.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-107.0.0.99.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-107.0.0.99.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-107.0.0.99.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-107.0.0.99.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-107.0.0.99.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-107.0.0.99.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-6.6.0-107.0.0.99.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-107.0.0.99.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-107.0.0.99.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-107.0.0.99.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-6.6.0-107.0.0.99.oe2403.x86_64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-107.0.0.99.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-6.6.0-107.0.0.99.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-107.0.0.99.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-107.0.0.99.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-107.0.0.99.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-107.0.0.99.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-107.0.0.99.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-107.0.0.99.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-107.0.0.99.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-107.0.0.99.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-6.6.0-107.0.0.99.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-107.0.0.99.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-107.0.0.99.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-107.0.0.99.oe2403.x86_64"
					]
				}
			],
			"threats":[
				{
					"details":"Low",
					"category":"impact"
				}
			],
			"title":"CVE-2025-38515"
		},
		{
			"cve":"CVE-2025-38526",
			"notes":[
				{
					"text":"A vulnerability was found in Linux Kernel up to 6.6.99/6.12.39/6.15.7 (Operating System). It has been classified as critical.CWE is classifying the issue as CWE-476. A NULL pointer dereference occurs when the application dereferences a pointer that it expects to be valid, but is NULL, typically causing a crash or exit.This is going to have an impact on availability.Upgrading to version 6.6.100, 6.12.40 or 6.15.8 eliminates this vulnerability. Applying the patch 27591d926191e42b2332e4bad3bcd3a49def393b/5a5d64f0eec82076b2c09fee2195d640cfbe3379/245917d3c5ed7c6ae720302b64eac5c6f0c85177/3ce58b01ada408b372f15b7c992ed0519840e3cf is able to eliminate this problem. The bugfix is ready for download at git.kernel.org. The best possible mitigation is suggested to be upgrading to the latest version.",
					"category":"description",
					"title":"Vulnerability Description"
				}
			],
			"product_status":{
				"fixed":[
					"openEuler-24.03-LTS:kernel-6.6.0-107.0.0.99.oe2403.src",
					"openEuler-24.03-LTS:bpftool-6.6.0-107.0.0.99.oe2403.aarch64",
					"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-107.0.0.99.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-6.6.0-107.0.0.99.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-107.0.0.99.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-debugsource-6.6.0-107.0.0.99.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-devel-6.6.0-107.0.0.99.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-headers-6.6.0-107.0.0.99.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-source-6.6.0-107.0.0.99.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-tools-6.6.0-107.0.0.99.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-107.0.0.99.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-107.0.0.99.oe2403.aarch64",
					"openEuler-24.03-LTS:perf-6.6.0-107.0.0.99.oe2403.aarch64",
					"openEuler-24.03-LTS:perf-debuginfo-6.6.0-107.0.0.99.oe2403.aarch64",
					"openEuler-24.03-LTS:python3-perf-6.6.0-107.0.0.99.oe2403.aarch64",
					"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-107.0.0.99.oe2403.aarch64",
					"openEuler-24.03-LTS:bpftool-6.6.0-107.0.0.99.oe2403.x86_64",
					"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-107.0.0.99.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-6.6.0-107.0.0.99.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-107.0.0.99.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-debugsource-6.6.0-107.0.0.99.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-devel-6.6.0-107.0.0.99.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-headers-6.6.0-107.0.0.99.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-source-6.6.0-107.0.0.99.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-tools-6.6.0-107.0.0.99.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-107.0.0.99.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-107.0.0.99.oe2403.x86_64",
					"openEuler-24.03-LTS:perf-6.6.0-107.0.0.99.oe2403.x86_64",
					"openEuler-24.03-LTS:perf-debuginfo-6.6.0-107.0.0.99.oe2403.x86_64",
					"openEuler-24.03-LTS:python3-perf-6.6.0-107.0.0.99.oe2403.x86_64",
					"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-107.0.0.99.oe2403.x86_64"
				]
			},
			"remediations":[
				{
					"product_ids":[
						"openEuler-24.03-LTS:kernel-6.6.0-107.0.0.99.oe2403.src",
						"openEuler-24.03-LTS:bpftool-6.6.0-107.0.0.99.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-107.0.0.99.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-6.6.0-107.0.0.99.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-107.0.0.99.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-107.0.0.99.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-107.0.0.99.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-107.0.0.99.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-107.0.0.99.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-107.0.0.99.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-107.0.0.99.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-107.0.0.99.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-6.6.0-107.0.0.99.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-107.0.0.99.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-107.0.0.99.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-107.0.0.99.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-6.6.0-107.0.0.99.oe2403.x86_64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-107.0.0.99.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-6.6.0-107.0.0.99.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-107.0.0.99.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-107.0.0.99.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-107.0.0.99.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-107.0.0.99.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-107.0.0.99.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-107.0.0.99.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-107.0.0.99.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-107.0.0.99.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-6.6.0-107.0.0.99.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-107.0.0.99.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-107.0.0.99.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-107.0.0.99.oe2403.x86_64"
					],
					"details":"kernel security update",
					"category":"vendor_fix",
					"url":"https://www.openeuler.org/zh/security/security-bulletins/detail/?id=openEuler-SA-2025-2077"
				}
			],
			"scores":[
				{
					"cvss_v3":{
						"baseSeverity":"LOW",
						"baseScore":3.9,
						"vectorString":"CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:L/I:L/A:L",
						"version":"3.1"
					},
					"products":[
						"openEuler-24.03-LTS:kernel-6.6.0-107.0.0.99.oe2403.src",
						"openEuler-24.03-LTS:bpftool-6.6.0-107.0.0.99.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-107.0.0.99.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-6.6.0-107.0.0.99.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-107.0.0.99.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-107.0.0.99.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-107.0.0.99.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-107.0.0.99.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-107.0.0.99.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-107.0.0.99.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-107.0.0.99.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-107.0.0.99.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-6.6.0-107.0.0.99.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-107.0.0.99.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-107.0.0.99.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-107.0.0.99.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-6.6.0-107.0.0.99.oe2403.x86_64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-107.0.0.99.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-6.6.0-107.0.0.99.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-107.0.0.99.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-107.0.0.99.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-107.0.0.99.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-107.0.0.99.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-107.0.0.99.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-107.0.0.99.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-107.0.0.99.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-107.0.0.99.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-6.6.0-107.0.0.99.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-107.0.0.99.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-107.0.0.99.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-107.0.0.99.oe2403.x86_64"
					]
				}
			],
			"threats":[
				{
					"details":"Low",
					"category":"impact"
				}
			],
			"title":"CVE-2025-38526"
		},
		{
			"cve":"CVE-2025-38539",
			"notes":[
				{
					"text":"In the Linux kernel, the following vulnerability has been resolved:\n\ntracing: Add down_write(trace_event_sem) when adding trace event\n\nWhen a module is loaded, it adds trace events defined by the module. It\nmay also need to modify the modules trace printk formats to replace enum\nnames with their values.\n\nIf two modules are loaded at the same time, the adding of the event to the\nftrace_events list can corrupt the walking of the list in the code that is\nmodifying the printk format strings and crash the kernel.\n\nThe addition of the event should take the trace_event_sem for write while\nit adds the new event.\n\nAlso add a lockdep_assert_held() on that semaphore in\n__trace_add_event_dirs() as it iterates the list.",
					"category":"description",
					"title":"Vulnerability Description"
				}
			],
			"product_status":{
				"fixed":[
					"openEuler-24.03-LTS:kernel-6.6.0-107.0.0.99.oe2403.src",
					"openEuler-24.03-LTS:bpftool-6.6.0-107.0.0.99.oe2403.aarch64",
					"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-107.0.0.99.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-6.6.0-107.0.0.99.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-107.0.0.99.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-debugsource-6.6.0-107.0.0.99.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-devel-6.6.0-107.0.0.99.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-headers-6.6.0-107.0.0.99.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-source-6.6.0-107.0.0.99.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-tools-6.6.0-107.0.0.99.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-107.0.0.99.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-107.0.0.99.oe2403.aarch64",
					"openEuler-24.03-LTS:perf-6.6.0-107.0.0.99.oe2403.aarch64",
					"openEuler-24.03-LTS:perf-debuginfo-6.6.0-107.0.0.99.oe2403.aarch64",
					"openEuler-24.03-LTS:python3-perf-6.6.0-107.0.0.99.oe2403.aarch64",
					"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-107.0.0.99.oe2403.aarch64",
					"openEuler-24.03-LTS:bpftool-6.6.0-107.0.0.99.oe2403.x86_64",
					"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-107.0.0.99.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-6.6.0-107.0.0.99.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-107.0.0.99.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-debugsource-6.6.0-107.0.0.99.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-devel-6.6.0-107.0.0.99.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-headers-6.6.0-107.0.0.99.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-source-6.6.0-107.0.0.99.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-tools-6.6.0-107.0.0.99.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-107.0.0.99.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-107.0.0.99.oe2403.x86_64",
					"openEuler-24.03-LTS:perf-6.6.0-107.0.0.99.oe2403.x86_64",
					"openEuler-24.03-LTS:perf-debuginfo-6.6.0-107.0.0.99.oe2403.x86_64",
					"openEuler-24.03-LTS:python3-perf-6.6.0-107.0.0.99.oe2403.x86_64",
					"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-107.0.0.99.oe2403.x86_64"
				]
			},
			"remediations":[
				{
					"product_ids":[
						"openEuler-24.03-LTS:kernel-6.6.0-107.0.0.99.oe2403.src",
						"openEuler-24.03-LTS:bpftool-6.6.0-107.0.0.99.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-107.0.0.99.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-6.6.0-107.0.0.99.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-107.0.0.99.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-107.0.0.99.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-107.0.0.99.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-107.0.0.99.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-107.0.0.99.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-107.0.0.99.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-107.0.0.99.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-107.0.0.99.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-6.6.0-107.0.0.99.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-107.0.0.99.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-107.0.0.99.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-107.0.0.99.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-6.6.0-107.0.0.99.oe2403.x86_64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-107.0.0.99.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-6.6.0-107.0.0.99.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-107.0.0.99.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-107.0.0.99.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-107.0.0.99.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-107.0.0.99.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-107.0.0.99.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-107.0.0.99.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-107.0.0.99.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-107.0.0.99.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-6.6.0-107.0.0.99.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-107.0.0.99.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-107.0.0.99.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-107.0.0.99.oe2403.x86_64"
					],
					"details":"kernel security update",
					"category":"vendor_fix",
					"url":"https://www.openeuler.org/zh/security/security-bulletins/detail/?id=openEuler-SA-2025-2077"
				}
			],
			"scores":[
				{
					"cvss_v3":{
						"baseSeverity":"LOW",
						"baseScore":3.9,
						"vectorString":"CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:L/I:L/A:L",
						"version":"3.1"
					},
					"products":[
						"openEuler-24.03-LTS:kernel-6.6.0-107.0.0.99.oe2403.src",
						"openEuler-24.03-LTS:bpftool-6.6.0-107.0.0.99.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-107.0.0.99.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-6.6.0-107.0.0.99.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-107.0.0.99.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-107.0.0.99.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-107.0.0.99.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-107.0.0.99.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-107.0.0.99.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-107.0.0.99.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-107.0.0.99.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-107.0.0.99.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-6.6.0-107.0.0.99.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-107.0.0.99.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-107.0.0.99.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-107.0.0.99.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-6.6.0-107.0.0.99.oe2403.x86_64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-107.0.0.99.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-6.6.0-107.0.0.99.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-107.0.0.99.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-107.0.0.99.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-107.0.0.99.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-107.0.0.99.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-107.0.0.99.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-107.0.0.99.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-107.0.0.99.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-107.0.0.99.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-6.6.0-107.0.0.99.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-107.0.0.99.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-107.0.0.99.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-107.0.0.99.oe2403.x86_64"
					]
				}
			],
			"threats":[
				{
					"details":"Low",
					"category":"impact"
				}
			],
			"title":"CVE-2025-38539"
		},
		{
			"cve":"CVE-2025-38565",
			"notes":[
				{
					"text":"In the Linux kernel, the following vulnerability has been resolved:\n\nperf/core: Exit early on perf_mmap() fail\n\nWhen perf_mmap() fails to allocate a buffer, it still invokes the\nevent_mapped() callback of the related event. On X86 this might increase\nthe perf_rdpmc_allowed reference counter. But nothing undoes this as\nperf_mmap_close() is never called in this case, which causes another\nreference count leak.\n\nReturn early on failure to prevent that.",
					"category":"description",
					"title":"Vulnerability Description"
				}
			],
			"product_status":{
				"fixed":[
					"openEuler-24.03-LTS:kernel-6.6.0-107.0.0.99.oe2403.src",
					"openEuler-24.03-LTS:bpftool-6.6.0-107.0.0.99.oe2403.aarch64",
					"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-107.0.0.99.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-6.6.0-107.0.0.99.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-107.0.0.99.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-debugsource-6.6.0-107.0.0.99.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-devel-6.6.0-107.0.0.99.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-headers-6.6.0-107.0.0.99.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-source-6.6.0-107.0.0.99.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-tools-6.6.0-107.0.0.99.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-107.0.0.99.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-107.0.0.99.oe2403.aarch64",
					"openEuler-24.03-LTS:perf-6.6.0-107.0.0.99.oe2403.aarch64",
					"openEuler-24.03-LTS:perf-debuginfo-6.6.0-107.0.0.99.oe2403.aarch64",
					"openEuler-24.03-LTS:python3-perf-6.6.0-107.0.0.99.oe2403.aarch64",
					"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-107.0.0.99.oe2403.aarch64",
					"openEuler-24.03-LTS:bpftool-6.6.0-107.0.0.99.oe2403.x86_64",
					"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-107.0.0.99.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-6.6.0-107.0.0.99.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-107.0.0.99.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-debugsource-6.6.0-107.0.0.99.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-devel-6.6.0-107.0.0.99.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-headers-6.6.0-107.0.0.99.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-source-6.6.0-107.0.0.99.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-tools-6.6.0-107.0.0.99.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-107.0.0.99.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-107.0.0.99.oe2403.x86_64",
					"openEuler-24.03-LTS:perf-6.6.0-107.0.0.99.oe2403.x86_64",
					"openEuler-24.03-LTS:perf-debuginfo-6.6.0-107.0.0.99.oe2403.x86_64",
					"openEuler-24.03-LTS:python3-perf-6.6.0-107.0.0.99.oe2403.x86_64",
					"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-107.0.0.99.oe2403.x86_64"
				]
			},
			"remediations":[
				{
					"product_ids":[
						"openEuler-24.03-LTS:kernel-6.6.0-107.0.0.99.oe2403.src",
						"openEuler-24.03-LTS:bpftool-6.6.0-107.0.0.99.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-107.0.0.99.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-6.6.0-107.0.0.99.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-107.0.0.99.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-107.0.0.99.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-107.0.0.99.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-107.0.0.99.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-107.0.0.99.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-107.0.0.99.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-107.0.0.99.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-107.0.0.99.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-6.6.0-107.0.0.99.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-107.0.0.99.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-107.0.0.99.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-107.0.0.99.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-6.6.0-107.0.0.99.oe2403.x86_64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-107.0.0.99.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-6.6.0-107.0.0.99.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-107.0.0.99.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-107.0.0.99.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-107.0.0.99.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-107.0.0.99.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-107.0.0.99.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-107.0.0.99.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-107.0.0.99.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-107.0.0.99.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-6.6.0-107.0.0.99.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-107.0.0.99.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-107.0.0.99.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-107.0.0.99.oe2403.x86_64"
					],
					"details":"kernel security update",
					"category":"vendor_fix",
					"url":"https://www.openeuler.org/zh/security/security-bulletins/detail/?id=openEuler-SA-2025-2077"
				}
			],
			"scores":[
				{
					"cvss_v3":{
						"baseSeverity":"LOW",
						"baseScore":3.9,
						"vectorString":"CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:L/I:L/A:L",
						"version":"3.1"
					},
					"products":[
						"openEuler-24.03-LTS:kernel-6.6.0-107.0.0.99.oe2403.src",
						"openEuler-24.03-LTS:bpftool-6.6.0-107.0.0.99.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-107.0.0.99.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-6.6.0-107.0.0.99.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-107.0.0.99.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-107.0.0.99.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-107.0.0.99.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-107.0.0.99.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-107.0.0.99.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-107.0.0.99.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-107.0.0.99.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-107.0.0.99.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-6.6.0-107.0.0.99.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-107.0.0.99.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-107.0.0.99.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-107.0.0.99.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-6.6.0-107.0.0.99.oe2403.x86_64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-107.0.0.99.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-6.6.0-107.0.0.99.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-107.0.0.99.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-107.0.0.99.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-107.0.0.99.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-107.0.0.99.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-107.0.0.99.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-107.0.0.99.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-107.0.0.99.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-107.0.0.99.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-6.6.0-107.0.0.99.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-107.0.0.99.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-107.0.0.99.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-107.0.0.99.oe2403.x86_64"
					]
				}
			],
			"threats":[
				{
					"details":"Low",
					"category":"impact"
				}
			],
			"title":"CVE-2025-38565"
		},
		{
			"cve":"CVE-2025-38670",
			"notes":[
				{
					"text":"A vulnerability, which was classified as critical, has been found in Linux Kernel up to 6.6.100/6.12.40/6.15.8 (Operating System).Using CWE to declare the problem leads to CWE-404. The product does not release or incorrectly releases a resource before it is made available for re-use.Impacted is availability.Upgrading to version 6.6.101, 6.12.41 or 6.15.9 eliminates this vulnerability. Applying the patch 9433a5f437b0948d6a2d8a02ad7a42ab7ca27a61/708fd522b86d2a9544c34ec6a86fa3fc23336525/0f67015d72627bad72da3c2084352e0aa134416b/d42e6c20de6192f8e4ab4cf10be8c694ef27e8cb is able to eliminate this problem. The bugfix is ready for download at git.kernel.org. The best possible mitigation is suggested to be upgrading to the latest version.",
					"category":"description",
					"title":"Vulnerability Description"
				}
			],
			"product_status":{
				"fixed":[
					"openEuler-24.03-LTS:kernel-6.6.0-107.0.0.99.oe2403.src",
					"openEuler-24.03-LTS:bpftool-6.6.0-107.0.0.99.oe2403.aarch64",
					"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-107.0.0.99.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-6.6.0-107.0.0.99.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-107.0.0.99.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-debugsource-6.6.0-107.0.0.99.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-devel-6.6.0-107.0.0.99.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-headers-6.6.0-107.0.0.99.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-source-6.6.0-107.0.0.99.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-tools-6.6.0-107.0.0.99.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-107.0.0.99.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-107.0.0.99.oe2403.aarch64",
					"openEuler-24.03-LTS:perf-6.6.0-107.0.0.99.oe2403.aarch64",
					"openEuler-24.03-LTS:perf-debuginfo-6.6.0-107.0.0.99.oe2403.aarch64",
					"openEuler-24.03-LTS:python3-perf-6.6.0-107.0.0.99.oe2403.aarch64",
					"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-107.0.0.99.oe2403.aarch64",
					"openEuler-24.03-LTS:bpftool-6.6.0-107.0.0.99.oe2403.x86_64",
					"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-107.0.0.99.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-6.6.0-107.0.0.99.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-107.0.0.99.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-debugsource-6.6.0-107.0.0.99.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-devel-6.6.0-107.0.0.99.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-headers-6.6.0-107.0.0.99.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-source-6.6.0-107.0.0.99.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-tools-6.6.0-107.0.0.99.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-107.0.0.99.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-107.0.0.99.oe2403.x86_64",
					"openEuler-24.03-LTS:perf-6.6.0-107.0.0.99.oe2403.x86_64",
					"openEuler-24.03-LTS:perf-debuginfo-6.6.0-107.0.0.99.oe2403.x86_64",
					"openEuler-24.03-LTS:python3-perf-6.6.0-107.0.0.99.oe2403.x86_64",
					"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-107.0.0.99.oe2403.x86_64"
				]
			},
			"remediations":[
				{
					"product_ids":[
						"openEuler-24.03-LTS:kernel-6.6.0-107.0.0.99.oe2403.src",
						"openEuler-24.03-LTS:bpftool-6.6.0-107.0.0.99.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-107.0.0.99.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-6.6.0-107.0.0.99.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-107.0.0.99.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-107.0.0.99.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-107.0.0.99.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-107.0.0.99.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-107.0.0.99.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-107.0.0.99.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-107.0.0.99.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-107.0.0.99.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-6.6.0-107.0.0.99.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-107.0.0.99.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-107.0.0.99.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-107.0.0.99.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-6.6.0-107.0.0.99.oe2403.x86_64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-107.0.0.99.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-6.6.0-107.0.0.99.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-107.0.0.99.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-107.0.0.99.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-107.0.0.99.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-107.0.0.99.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-107.0.0.99.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-107.0.0.99.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-107.0.0.99.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-107.0.0.99.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-6.6.0-107.0.0.99.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-107.0.0.99.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-107.0.0.99.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-107.0.0.99.oe2403.x86_64"
					],
					"details":"kernel security update",
					"category":"vendor_fix",
					"url":"https://www.openeuler.org/zh/security/security-bulletins/detail/?id=openEuler-SA-2025-2077"
				}
			],
			"scores":[
				{
					"cvss_v3":{
						"baseSeverity":"MEDIUM",
						"baseScore":5.5,
						"vectorString":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
						"version":"3.1"
					},
					"products":[
						"openEuler-24.03-LTS:kernel-6.6.0-107.0.0.99.oe2403.src",
						"openEuler-24.03-LTS:bpftool-6.6.0-107.0.0.99.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-107.0.0.99.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-6.6.0-107.0.0.99.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-107.0.0.99.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-107.0.0.99.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-107.0.0.99.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-107.0.0.99.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-107.0.0.99.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-107.0.0.99.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-107.0.0.99.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-107.0.0.99.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-6.6.0-107.0.0.99.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-107.0.0.99.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-107.0.0.99.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-107.0.0.99.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-6.6.0-107.0.0.99.oe2403.x86_64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-107.0.0.99.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-6.6.0-107.0.0.99.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-107.0.0.99.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-107.0.0.99.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-107.0.0.99.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-107.0.0.99.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-107.0.0.99.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-107.0.0.99.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-107.0.0.99.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-107.0.0.99.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-6.6.0-107.0.0.99.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-107.0.0.99.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-107.0.0.99.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-107.0.0.99.oe2403.x86_64"
					]
				}
			],
			"threats":[
				{
					"details":"Medium",
					"category":"impact"
				}
			],
			"title":"CVE-2025-38670"
		}
	]
}