{
	"document":{
		"aggregate_severity":{
			"namespace":"https://nvd.nist.gov/vuln-metrics/cvss",
			"text":"High"
		},
		"category":"csaf_vex",
		"csaf_version":"2.0",
		"distribution":{
			"tlp":{
				"label":"WHITE",
				"url":"https:/www.first.org/tlp/"
			}
		},
		"lang":"en",
		"notes":[
			{
				"text":"kernel security update",
				"category":"general",
				"title":"Synopsis"
			},
			{
				"text":"An update for kernel is now available for openEuler-24.03-LTS",
				"category":"general",
				"title":"Summary"
			},
			{
				"text":"The Linux Kernel, the operating system core itself.\n\nSecurity Fix(es):\n\nIn the Linux kernel, the following vulnerability has been resolved:\n\nnet: ravb: Fix missing rtnl lock in suspend/resume path\n\nFix the suspend/resume path by ensuring the rtnl lock is held where\nrequired. Calls to ravb_open, ravb_close and wol operations must be\nperformed under the rtnl lock to prevent conflicts with ongoing ndo\noperations.\n\nWithout this fix, the following warning is triggered:\n[   39.032969] =============================\n[   39.032983] WARNING: suspicious RCU usage\n[   39.033019] -----------------------------\n[   39.033033] drivers/net/phy/phy_device.c:2004 suspicious\nrcu_dereference_protected() usage!\n...\n[   39.033597] stack backtrace:\n[   39.033613] CPU: 0 UID: 0 PID: 174 Comm: python3 Not tainted\n6.13.0-rc7-next-20250116-arm64-renesas-00002-g35245dfdc62c #7\n[   39.033623] Hardware name: Renesas SMARC EVK version 2 based on\nr9a08g045s33 (DT)\n[   39.033628] Call trace:\n[   39.033633]  show_stack+0x14/0x1c (C)\n[   39.033652]  dump_stack_lvl+0xb4/0xc4\n[   39.033664]  dump_stack+0x14/0x1c\n[   39.033671]  lockdep_rcu_suspicious+0x16c/0x22c\n[   39.033682]  phy_detach+0x160/0x190\n[   39.033694]  phy_disconnect+0x40/0x54\n[   39.033703]  ravb_close+0x6c/0x1cc\n[   39.033714]  ravb_suspend+0x48/0x120\n[   39.033721]  dpm_run_callback+0x4c/0x14c\n[   39.033731]  device_suspend+0x11c/0x4dc\n[   39.033740]  dpm_suspend+0xdc/0x214\n[   39.033748]  dpm_suspend_start+0x48/0x60\n[   39.033758]  suspend_devices_and_enter+0x124/0x574\n[   39.033769]  pm_suspend+0x1ac/0x274\n[   39.033778]  state_store+0x88/0x124\n[   39.033788]  kobj_attr_store+0x14/0x24\n[   39.033798]  sysfs_kf_write+0x48/0x6c\n[   39.033808]  kernfs_fop_write_iter+0x118/0x1a8\n[   39.033817]  vfs_write+0x27c/0x378\n[   39.033825]  ksys_write+0x64/0xf4\n[   39.033833]  __arm64_sys_write+0x18/0x20\n[   39.033841]  invoke_syscall+0x44/0x104\n[   39.033852]  el0_svc_common.constprop.0+0xb4/0xd4\n[   39.033862]  do_el0_svc+0x18/0x20\n[   39.033870]  el0_svc+0x3c/0xf0\n[   39.033880]  el0t_64_sync_handler+0xc0/0xc4\n[   39.033888]  el0t_64_sync+0x154/0x158\n[   39.041274] ravb 11c30000.ethernet eth0: Link is Down(CVE-2025-21801)\n\nIn the Linux kernel, the following vulnerability has been resolved:\n\nusb: renesas_usbhs: Flush the notify_hotplug_work\n\nWhen performing continuous unbind/bind operations on the USB drivers\navailable on the Renesas RZ/G2L SoC, a kernel crash with the message\n\"Unable to handle kernel NULL pointer dereference at virtual address\"\nmay occur. This issue points to the usbhsc_notify_hotplug() function.\n\nFlush the delayed work to avoid its execution when driver resources are\nunavailable.(CVE-2025-21917)\n\nIn the Linux kernel, the following vulnerability has been resolved:\n\nBluetooth: btrtl: Prevent potential NULL dereference\n\nThe btrtl_initialize() function checks that rtl_load_file() either\nhad an error or it loaded a zero length file.  However, if it loaded\na zero length file then the error code is not set correctly.  It\nresults in an error pointer vs NULL bug, followed by a NULL pointer\ndereference.  This was detected by Smatch:\n\ndrivers/bluetooth/btrtl.c:592 btrtl_initialize() warn: passing zero to 'ERR_PTR'(CVE-2025-37792)\n\nIn the Linux kernel, the following vulnerability has been resolved:\n\nnet_sched: ets: Fix double list add in class with netem as child qdisc\n\nAs described in Gerrard's report [1], there are use cases where a netem\nchild qdisc will make the parent qdisc's enqueue callback reentrant.\nIn the case of ets, there won't be a UAF, but the code will add the same\nclassifier to the list twice, which will cause memory corruption.\n\nIn addition to checking for qlen being zero, this patch checks whether\nthe class was already added to the active_list (cl_is_active) before\ndoing the addition to cater for the reentrant case.\n\n[1] https://lore.kernel.org/netdev/CAHcdcOm+03OD2j6R0=YHKqmy=VgJ8xEOKuP6c7mSgnp-TEJJbw@mail.gmail.com/(CVE-2025-37914)\n\nIn the Linux kernel, the following vulnerability has been resolved:\n\nbtrfs: adjust subpage bit start based on sectorsize\n\nWhen running machines with 64k page size and a 16k nodesize we started\nseeing tree log corruption in production.  This turned out to be because\nwe were not writing out dirty blocks sometimes, so this in fact affects\nall metadata writes.\n\nWhen writing out a subpage EB we scan the subpage bitmap for a dirty\nrange.  If the range isn't dirty we do\n\n\tbit_start++;\n\nto move onto the next bit.  The problem is the bitmap is based on the\nnumber of sectors that an EB has.  So in this case, we have a 64k\npagesize, 16k nodesize, but a 4k sectorsize.  This means our bitmap is 4\nbits for every node.  With a 64k page size we end up with 4 nodes per\npage.\n\nTo make this easier this is how everything looks\n\n[0         16k       32k       48k     ] logical address\n[0         4         8         12      ] radix tree offset\n[               64k page               ] folio\n[ 16k eb ][ 16k eb ][ 16k eb ][ 16k eb ] extent buffers\n[ | | | |  | | | |   | | | |   | | | | ] bitmap\n\nNow we use all of our addressing based on fs_info->sectorsize_bits, so\nas you can see the above our 16k eb->start turns into radix entry 4.\n\nWhen we find a dirty range for our eb, we correctly do bit_start +=\nsectors_per_node, because if we start at bit 0, the next bit for the\nnext eb is 4, to correspond to eb->start 16k.\n\nHowever if our range is clean, we will do bit_start++, which will now\nput us offset from our radix tree entries.\n\nIn our case, assume that the first time we check the bitmap the block is\nnot dirty, we increment bit_start so now it == 1, and then we loop\naround and check again.  This time it is dirty, and we go to find that\nstart using the following equation\n\n\tstart = folio_start + bit_start * fs_info->sectorsize;\n\nso in the case above, eb->start 0 is now dirty, and we calculate start\nas\n\n\t0 + 1 * fs_info->sectorsize = 4096\n\t4096 >> 12 = 1\n\nNow we're looking up the radix tree for 1, and we won't find an eb.\nWhat's worse is now we're using bit_start == 1, so we do bit_start +=\nsectors_per_node, which is now 5.  If that eb is dirty we will run into\nthe same thing, we will look at an offset that is not populated in the\nradix tree, and now we're skipping the writeout of dirty extent buffers.\n\nThe best fix for this is to not use sectorsize_bits to address nodes,\nbut that's a larger change.  Since this is a fs corruption problem fix\nit simply by always using sectors_per_node to increment the start bit.(CVE-2025-37931)\n\nIn the Linux kernel, the following vulnerability has been resolved:\n\nbus: fsl-mc: fix double-free on mc_dev\n\nThe blamed commit tried to simplify how the deallocations are done but,\nin the process, introduced a double-free on the mc_dev variable.\n\nIn case the MC device is a DPRC, a new mc_bus is allocated and the\nmc_dev variable is just a reference to one of its fields. In this\ncircumstance, on the error path only the mc_bus should be freed.\n\nThis commit introduces back the following checkpatch warning which is a\nfalse-positive.\n\nWARNING: kfree(NULL) is safe and this check is probably not required\n+       if (mc_bus)\n+               kfree(mc_bus);(CVE-2025-38313)\n\nIn the Linux kernel, the following vulnerability has been resolved:\n\nf2fs: fix to bail out in get_new_segment()\n\n------------[ cut here ]------------\nWARNING: CPU: 3 PID: 579 at fs/f2fs/segment.c:2832 new_curseg+0x5e8/0x6dc\npc : new_curseg+0x5e8/0x6dc\nCall trace:\n new_curseg+0x5e8/0x6dc\n f2fs_allocate_data_block+0xa54/0xe28\n do_write_page+0x6c/0x194\n f2fs_do_write_node_page+0x38/0x78\n __write_node_page+0x248/0x6d4\n f2fs_sync_node_pages+0x524/0x72c\n f2fs_write_checkpoint+0x4bc/0x9b0\n __checkpoint_and_complete_reqs+0x80/0x244\n issue_checkpoint_thread+0x8c/0xec\n kthread+0x114/0x1bc\n ret_from_fork+0x10/0x20\n\nget_new_segment() detects inconsistent status in between free_segmap\nand free_secmap, let's record such error into super block, and bail\nout get_new_segment() instead of continue using the segment.(CVE-2025-38333)\n\nIn the Linux kernel, the following vulnerability has been resolved:\n\nwifi: ath12k: fix GCC_GCC_PCIE_HOT_RST definition for WCN7850\n\nGCC_GCC_PCIE_HOT_RST is wrongly defined for WCN7850, causing kernel crash\non some specific platforms.\n\nSince this register is divergent for WCN7850 and QCN9274, move it to\nregister table to allow different definitions. Then correct the register\naddress for WCN7850 to fix this issue.\n\nNote IPQ5332 is not affected as it is not PCIe based device.\n\nTested-on: WCN7850 hw2.0 PCI WLAN.HMT.1.0.c5-00481-QCAHMTSWPL_V1.0_V2.0_SILICONZ-3(CVE-2025-38414)\n\nIn the Linux kernel, the following vulnerability has been resolved:\n\nfs/ntfs3: cancle set bad inode after removing name fails\n\nThe reproducer uses a file0 on a ntfs3 file system with a corrupted i_link.\nWhen renaming, the file0's inode is marked as a bad inode because the file\nname cannot be deleted.\n\nThe underlying bug is that make_bad_inode() is called on a live inode.\nIn some cases it's \"icache lookup finds a normal inode, d_splice_alias()\nis called to attach it to dentry, while another thread decides to call\nmake_bad_inode() on it - that would evict it from icache, but we'd already\nfound it there earlier\".\nIn some it's outright \"we have an inode attached to dentry - that's how we\ngot it in the first place; let's call make_bad_inode() on it just for shits\nand giggles\".(CVE-2025-38615)\n\nIn the Linux kernel, the following vulnerability has been resolved:\n\nscsi: libiscsi: Initialize iscsi_conn->dd_data only if memory is allocated\n\nIn case of an ib_fast_reg_mr allocation failure during iSER setup, the\nmachine hits a panic because iscsi_conn->dd_data is initialized\nunconditionally, even when no memory is allocated (dd_size == 0).  This\nleads invalid pointer dereference during connection teardown.\n\nFix by setting iscsi_conn->dd_data only if memory is actually allocated.\n\nPanic trace:\n------------\n iser: iser_create_fastreg_desc: Failed to allocate ib_fast_reg_mr err=-12\n iser: iser_alloc_rx_descriptors: failed allocating rx descriptors / data buffers\n BUG: unable to handle page fault for address: fffffffffffffff8\n RIP: 0010:swake_up_locked.part.5+0xa/0x40\n Call Trace:\n  complete+0x31/0x40\n  iscsi_iser_conn_stop+0x88/0xb0 [ib_iser]\n  iscsi_stop_conn+0x66/0xc0 [scsi_transport_iscsi]\n  iscsi_if_stop_conn+0x14a/0x150 [scsi_transport_iscsi]\n  iscsi_if_rx+0x1135/0x1834 [scsi_transport_iscsi]\n  ? netlink_lookup+0x12f/0x1b0\n  ? netlink_deliver_tap+0x2c/0x200\n  netlink_unicast+0x1ab/0x280\n  netlink_sendmsg+0x257/0x4f0\n  ? _copy_from_user+0x29/0x60\n  sock_sendmsg+0x5f/0x70(CVE-2025-38700)\n\nIn the Linux kernel, the following vulnerability has been resolved:\n\next4: do not BUG when INLINE_DATA_FL lacks system.data xattr\n\nA syzbot fuzzed image triggered a BUG_ON in ext4_update_inline_data()\nwhen an inode had the INLINE_DATA_FL flag set but was missing the\nsystem.data extended attribute.\n\nSince this can happen due to a maiciouly fuzzed file system, we\nshouldn't BUG, but rather, report it as a corrupted file system.\n\nAdd similar replacements of BUG_ON with EXT4_ERROR_INODE() ii\next4_create_inline_data() and ext4_inline_data_truncate().(CVE-2025-38701)\n\nIn the Linux kernel, the following vulnerability has been resolved:\n\nloop: Avoid updating block size under exclusive owner\n\nSyzbot came up with a reproducer where a loop device block size is\nchanged underneath a mounted filesystem. This causes a mismatch between\nthe block device block size and the block size stored in the superblock\ncausing confusion in various places such as fs/buffer.c. The particular\nissue triggered by syzbot was a warning in __getblk_slow() due to\nrequested buffer size not matching block device block size.\n\nFix the problem by getting exclusive hold of the loop device to change\nits block size. This fails if somebody (such as filesystem) has already\nan exclusive ownership of the block device and thus prevents modifying\nthe loop device under some exclusive owner which doesn't expect it.(CVE-2025-38709)\n\nIn the Linux kernel, the following vulnerability has been resolved:\n\nfs/buffer: fix use-after-free when call bh_read() helper\n\nThere's issue as follows:\nBUG: KASAN: stack-out-of-bounds in end_buffer_read_sync+0xe3/0x110\nRead of size 8 at addr ffffc9000168f7f8 by task swapper/3/0\nCPU: 3 UID: 0 PID: 0 Comm: swapper/3 Not tainted 6.16.0-862.14.0.6.x86_64\nHardware name: QEMU Standard PC (i440FX + PIIX, 1996)\nCall Trace:\n <IRQ>\n dump_stack_lvl+0x55/0x70\n print_address_description.constprop.0+0x2c/0x390\n print_report+0xb4/0x270\n kasan_report+0xb8/0xf0\n end_buffer_read_sync+0xe3/0x110\n end_bio_bh_io_sync+0x56/0x80\n blk_update_request+0x30a/0x720\n scsi_end_request+0x51/0x2b0\n scsi_io_completion+0xe3/0x480\n ? scsi_device_unbusy+0x11e/0x160\n blk_complete_reqs+0x7b/0x90\n handle_softirqs+0xef/0x370\n irq_exit_rcu+0xa5/0xd0\n sysvec_apic_timer_interrupt+0x6e/0x90\n </IRQ>\n\n Above issue happens when do ntfs3 filesystem mount, issue may happens\n as follows:\n           mount                            IRQ\nntfs_fill_super\n  read_cache_page\n    do_read_cache_folio\n      filemap_read_folio\n        mpage_read_folio\n\t do_mpage_readpage\n\t  ntfs_get_block_vbo\n\t   bh_read\n\t     submit_bh\n\t     wait_on_buffer(bh);\n\t                            blk_complete_reqs\n\t\t\t\t     scsi_io_completion\n\t\t\t\t      scsi_end_request\n\t\t\t\t       blk_update_request\n\t\t\t\t        end_bio_bh_io_sync\n\t\t\t\t\t end_buffer_read_sync\n\t\t\t\t\t  __end_buffer_read_notouch\n\t\t\t\t\t   unlock_buffer\n\n            wait_on_buffer(bh);--> return will return to caller\n\n\t\t\t\t\t  put_bh\n\t\t\t\t\t    --> trigger stack-out-of-bounds\nIn the mpage_read_folio() function, the stack variable 'map_bh' is\npassed to ntfs_get_block_vbo(). Once unlock_buffer() unlocks and\nwait_on_buffer() returns to continue processing, the stack variable\nis likely to be reclaimed. Consequently, during the end_buffer_read_sync()\nprocess, calling put_bh() may result in stack overrun.\n\nIf the bh is not allocated on the stack, it belongs to a folio.  Freeing\na buffer head which belongs to a folio is done by drop_buffers() which\nwill fail to free buffers which are still locked.  So it is safe to call\nput_bh() before __end_buffer_read_notouch().(CVE-2025-39691)\n\nIn the Linux kernel, the following vulnerability has been resolved:\n\nsoc: qcom: mdt_loader: Ensure we don't read past the ELF header\n\nWhen the MDT loader is used in remoteproc, the ELF header is sanitized\nbeforehand, but that's not necessary the case for other clients.\n\nValidate the size of the firmware buffer to ensure that we don't read\npast the end as we iterate over the header. e_phentsize and e_shentsize\nare validated as well, to ensure that the assumptions about step size in\nthe traversal are valid.(CVE-2025-39787)\n\nIn the Linux kernel, the following vulnerability has been resolved:\n\nblock: avoid possible overflow for chunk_sectors check in blk_stack_limits()\n\nIn blk_stack_limits(), we check that the t->chunk_sectors value is a\nmultiple of the t->physical_block_size value.\n\nHowever, by finding the chunk_sectors value in bytes, we may overflow\nthe unsigned int which holds chunk_sectors, so change the check to be\nbased on sectors.(CVE-2025-39795)\n\nIn the Linux kernel, the following vulnerability has been resolved:\n\npcmcia: Add error handling for add_interval() in do_validate_mem()\n\nIn the do_validate_mem(), the call to add_interval() does not\nhandle errors. If kmalloc() fails in add_interval(), it could\nresult in a null pointer being inserted into the linked list,\nleading to illegal memory access when sub_interval() is called\nnext.\n\nThis patch adds an error handling for the add_interval(). If\nadd_interval() returns an error, the function will return early\nwith the error code.(CVE-2025-39920)\n\nIn the Linux kernel, the following vulnerability has been resolved:\n\ndmaengine: qcom: bam_dma: Fix DT error handling for num-channels/ees\n\nWhen we don't have a clock specified in the device tree, we have no way to\nensure the BAM is on. This is often the case for remotely-controlled or\nremotely-powered BAM instances. In this case, we need to read num-channels\nfrom the DT to have all the necessary information to complete probing.\n\nHowever, at the moment invalid device trees without clock and without\nnum-channels still continue probing, because the error handling is missing\nreturn statements. The driver will then later try to read the number of\nchannels from the registers. This is unsafe, because it relies on boot\nfirmware and lucky timing to succeed. Unfortunately, the lack of proper\nerror handling here has been abused for several Qualcomm SoCs upstream,\ncausing early boot crashes in several situations [1, 2].\n\nAvoid these early crashes by erroring out when any of the required DT\nproperties are missing. Note that this will break some of the existing DTs\nupstream (mainly BAM instances related to the crypto engine). However,\nclearly these DTs have never been tested properly, since the error in the\nkernel log was just ignored. It's safer to disable the crypto engine for\nthese broken DTBs.\n\n[1]: https://lore.kernel.org/r/(CVE-2025-39923)\n\nIn the Linux kernel i40e driver, there is a security vulnerability: the driver lacks boundary checks for the maximum number of virtual function (VF) filters. An attacker could potentially exploit this vulnerability to request filter counts beyond the boundaries, leading to potential security issues.(CVE-2025-39968)\n\nIn the Linux kernel, the following vulnerability has been resolved: i40e: fix idx validation in config queues msg. Ensure idx is within range of active/initialized TCs when iterating over vf->ch[idx] in i40e_vc_config_queues_msg().(CVE-2025-39971)\n\nIn the Linux kernel, the following vulnerability has been resolved:\n\nx86/mce: use is_copy_from_user() to determine copy-from-user context\n\nPatch series \"mm/hwpoison: Fix regressions in memory failure handling\",\nv4.\n\n## 1. What am I trying to do:\n\nThis patchset resolves two critical regressions related to memory failure\nhandling that have appeared in the upstream kernel since version 5.17, as\ncompared to 5.10 LTS.\n\n    - copyin case: poison found in user page while kernel copying from user space\n    - instr case: poison found while instruction fetching in user space\n\n## 2. What is the expected outcome and why\n\n- For copyin case:\n\nKernel can recover from poison found where kernel is doing get_user() or\ncopy_from_user() if those places get an error return and the kernel return\n-EFAULT to the process instead of crashing.  More specifily, MCE handler\nchecks the fixup handler type to decide whether an in kernel #MC can be\nrecovered.  When EX_TYPE_UACCESS is found, the PC jumps to recovery code\nspecified in _ASM_EXTABLE_FAULT() and return a -EFAULT to user space.\n\n- For instr case:\n\nIf a poison found while instruction fetching in user space, full recovery\nis possible.  User process takes #PF, Linux allocates a new page and fills\nby reading from storage.\n\n\n## 3. What actually happens and why\n\n- For copyin case: kernel panic since v5.17\n\nCommit 4c132d1d844a (\"x86/futex: Remove .fixup usage\") introduced a new\nextable fixup type, EX_TYPE_EFAULT_REG, and later patches updated the\nextable fixup type for copy-from-user operations, changing it from\nEX_TYPE_UACCESS to EX_TYPE_EFAULT_REG.  It breaks previous EX_TYPE_UACCESS\nhandling when posion found in get_user() or copy_from_user().\n\n- For instr case: user process is killed by a SIGBUS signal due to #CMCI\n  and #MCE race\n\nWhen an uncorrected memory error is consumed there is a race between the\nCMCI from the memory controller reporting an uncorrected error with a UCNA\nsignature, and the core reporting and SRAR signature machine check when\nthe data is about to be consumed.\n\n### Background: why *UN*corrected errors tied to *C*MCI in Intel platform [1]\n\nPrior to Icelake memory controllers reported patrol scrub events that\ndetected a previously unseen uncorrected error in memory by signaling a\nbroadcast machine check with an SRAO (Software Recoverable Action\nOptional) signature in the machine check bank.  This was overkill because\nit's not an urgent problem that no core is on the verge of consuming that\nbad data.  It's also found that multi SRAO UCE may cause nested MCE\ninterrupts and finally become an IERR.\n\nHence, Intel downgrades the machine check bank signature of patrol scrub\nfrom SRAO to UCNA (Uncorrected, No Action required), and signal changed to\n#CMCI.  Just to add to the confusion, Linux does take an action (in\nuc_decode_notifier()) to try to offline the page despite the UC*NA*\nsignature name.\n\n### Background: why #CMCI and #MCE race when poison is consuming in\n    Intel platform [1]\n\nHaving decided that CMCI/UCNA is the best action for patrol scrub errors,\nthe memory controller uses it for reads too.  But the memory controller is\nexecuting asynchronously from the core, and can't tell the difference\nbetween a \"real\" read and a speculative read.  So it will do CMCI/UCNA if\nan error is found in any read.\n\nThus:\n\n1) Core is clever and thinks address A is needed soon, issues a\n   speculative read.\n\n2) Core finds it is going to use address A soon after sending the read\n   request\n\n3) The CMCI from the memory controller is in a race with MCE from the\n   core that will soon try to retire the load from address A.\n\nQuite often (because speculation has got better) the CMCI from the memory\ncontroller is delivered before the core is committed to the instruction\nreading address A, so the interrupt is taken, and Linux offlines the page\n(marking it as poison).\n\n\n## Why user process is killed for instr case\n\nCommit 046545a661af (\"mm/hwpoison: fix error page recovered but reported\n\"not\n---truncated---(CVE-2025-39989)",
				"category":"general",
				"title":"Description"
			},
			{
				"text":"An update for kernel is now available for openEuler-20.03-LTS-SP4/openEuler-22.03-LTS-SP3/openEuler-22.03-LTS-SP4/openEuler-24.03-LTS.\n\nopenEuler Security has rated this update as having a security impact of high. A Common Vunlnerability Scoring System(CVSS)base score,which gives a detailed severity rating, is available for each vulnerability from the CVElink(s) in the References section.",
				"category":"general",
				"title":"Topic"
			},
			{
				"text":"High",
				"category":"general",
				"title":"Severity"
			},
			{
				"text":"kernel",
				"category":"general",
				"title":"Affected Component"
			}
		],
		"publisher":{
			"issuing_authority":"openEuler security committee",
			"name":"openEuler",
			"namespace":"https://www.openeuler.org",
			"contact_details":"openeuler-security@openeuler.org",
			"category":"vendor"
		},
		"references":[
			{
				"summary":"openEuler-SA-2025-2536",
				"category":"self",
				"url":"https://www.openeuler.org/zh/security/security-bulletins/detail/?id=openEuler-SA-2025-2536"
			},
			{
				"summary":"CVE-2025-21801",
				"category":"self",
				"url":"https://www.openeuler.org/en/security/cve/detail/?cveId=CVE-2025-21801&packageName=kernel"
			},
			{
				"summary":"CVE-2025-21917",
				"category":"self",
				"url":"https://www.openeuler.org/en/security/cve/detail/?cveId=CVE-2025-21917&packageName=kernel"
			},
			{
				"summary":"CVE-2025-37792",
				"category":"self",
				"url":"https://www.openeuler.org/en/security/cve/detail/?cveId=CVE-2025-37792&packageName=kernel"
			},
			{
				"summary":"CVE-2025-37914",
				"category":"self",
				"url":"https://www.openeuler.org/en/security/cve/detail/?cveId=CVE-2025-37914&packageName=kernel"
			},
			{
				"summary":"CVE-2025-37931",
				"category":"self",
				"url":"https://www.openeuler.org/en/security/cve/detail/?cveId=CVE-2025-37931&packageName=kernel"
			},
			{
				"summary":"CVE-2025-38313",
				"category":"self",
				"url":"https://www.openeuler.org/en/security/cve/detail/?cveId=CVE-2025-38313&packageName=kernel"
			},
			{
				"summary":"CVE-2025-38333",
				"category":"self",
				"url":"https://www.openeuler.org/en/security/cve/detail/?cveId=CVE-2025-38333&packageName=kernel"
			},
			{
				"summary":"CVE-2025-38414",
				"category":"self",
				"url":"https://www.openeuler.org/en/security/cve/detail/?cveId=CVE-2025-38414&packageName=kernel"
			},
			{
				"summary":"CVE-2025-38615",
				"category":"self",
				"url":"https://www.openeuler.org/en/security/cve/detail/?cveId=CVE-2025-38615&packageName=kernel"
			},
			{
				"summary":"CVE-2025-38700",
				"category":"self",
				"url":"https://www.openeuler.org/en/security/cve/detail/?cveId=CVE-2025-38700&packageName=kernel"
			},
			{
				"summary":"CVE-2025-38701",
				"category":"self",
				"url":"https://www.openeuler.org/en/security/cve/detail/?cveId=CVE-2025-38701&packageName=kernel"
			},
			{
				"summary":"CVE-2025-38709",
				"category":"self",
				"url":"https://www.openeuler.org/en/security/cve/detail/?cveId=CVE-2025-38709&packageName=kernel"
			},
			{
				"summary":"CVE-2025-39691",
				"category":"self",
				"url":"https://www.openeuler.org/en/security/cve/detail/?cveId=CVE-2025-39691&packageName=kernel"
			},
			{
				"summary":"CVE-2025-39787",
				"category":"self",
				"url":"https://www.openeuler.org/en/security/cve/detail/?cveId=CVE-2025-39787&packageName=kernel"
			},
			{
				"summary":"CVE-2025-39795",
				"category":"self",
				"url":"https://www.openeuler.org/en/security/cve/detail/?cveId=CVE-2025-39795&packageName=kernel"
			},
			{
				"summary":"CVE-2025-39920",
				"category":"self",
				"url":"https://www.openeuler.org/en/security/cve/detail/?cveId=CVE-2025-39920&packageName=kernel"
			},
			{
				"summary":"CVE-2025-39923",
				"category":"self",
				"url":"https://www.openeuler.org/en/security/cve/detail/?cveId=CVE-2025-39923&packageName=kernel"
			},
			{
				"summary":"CVE-2025-39968",
				"category":"self",
				"url":"https://www.openeuler.org/en/security/cve/detail/?cveId=CVE-2025-39968&packageName=kernel"
			},
			{
				"summary":"CVE-2025-39971",
				"category":"self",
				"url":"https://www.openeuler.org/en/security/cve/detail/?cveId=CVE-2025-39971&packageName=kernel"
			},
			{
				"summary":"CVE-2025-39989",
				"category":"self",
				"url":"https://www.openeuler.org/en/security/cve/detail/?cveId=CVE-2025-39989&packageName=kernel"
			},
			{
				"summary":"nvd cve",
				"category":"external",
				"url":"https://nvd.nist.gov/vuln/detail/CVE-2025-21801"
			},
			{
				"summary":"nvd cve",
				"category":"external",
				"url":"https://nvd.nist.gov/vuln/detail/CVE-2025-21917"
			},
			{
				"summary":"nvd cve",
				"category":"external",
				"url":"https://nvd.nist.gov/vuln/detail/CVE-2025-37792"
			},
			{
				"summary":"nvd cve",
				"category":"external",
				"url":"https://nvd.nist.gov/vuln/detail/CVE-2025-37914"
			},
			{
				"summary":"nvd cve",
				"category":"external",
				"url":"https://nvd.nist.gov/vuln/detail/CVE-2025-37931"
			},
			{
				"summary":"nvd cve",
				"category":"external",
				"url":"https://nvd.nist.gov/vuln/detail/CVE-2025-38313"
			},
			{
				"summary":"nvd cve",
				"category":"external",
				"url":"https://nvd.nist.gov/vuln/detail/CVE-2025-38333"
			},
			{
				"summary":"nvd cve",
				"category":"external",
				"url":"https://nvd.nist.gov/vuln/detail/CVE-2025-38414"
			},
			{
				"summary":"nvd cve",
				"category":"external",
				"url":"https://nvd.nist.gov/vuln/detail/CVE-2025-38615"
			},
			{
				"summary":"nvd cve",
				"category":"external",
				"url":"https://nvd.nist.gov/vuln/detail/CVE-2025-38700"
			},
			{
				"summary":"nvd cve",
				"category":"external",
				"url":"https://nvd.nist.gov/vuln/detail/CVE-2025-38701"
			},
			{
				"summary":"nvd cve",
				"category":"external",
				"url":"https://nvd.nist.gov/vuln/detail/CVE-2025-38709"
			},
			{
				"summary":"nvd cve",
				"category":"external",
				"url":"https://nvd.nist.gov/vuln/detail/CVE-2025-39691"
			},
			{
				"summary":"nvd cve",
				"category":"external",
				"url":"https://nvd.nist.gov/vuln/detail/CVE-2025-39787"
			},
			{
				"summary":"nvd cve",
				"category":"external",
				"url":"https://nvd.nist.gov/vuln/detail/CVE-2025-39795"
			},
			{
				"summary":"nvd cve",
				"category":"external",
				"url":"https://nvd.nist.gov/vuln/detail/CVE-2025-39920"
			},
			{
				"summary":"nvd cve",
				"category":"external",
				"url":"https://nvd.nist.gov/vuln/detail/CVE-2025-39923"
			},
			{
				"summary":"nvd cve",
				"category":"external",
				"url":"https://nvd.nist.gov/vuln/detail/CVE-2025-39968"
			},
			{
				"summary":"nvd cve",
				"category":"external",
				"url":"https://nvd.nist.gov/vuln/detail/CVE-2025-39971"
			},
			{
				"summary":"nvd cve",
				"category":"external",
				"url":"https://nvd.nist.gov/vuln/detail/CVE-2025-39989"
			},
			{
				"summary":"openEuler-SA-2025-2536 vex file",
				"category":"self",
				"url":"https://repo.openeuler.org/security/data/csaf/advisories/2025/csaf-openEuler-SA-2025-2536.json"
			}
		],
		"title":"An update for kernel is now available for openEuler-24.03-LTS",
		"tracking":{
			"initial_release_date":"2025-10-29T16:44:41+08:00",
			"revision_history":[
				{
					"date":"2025-10-29T16:44:41+08:00",
					"summary":"Initial",
					"number":"1.0.0"
				}
			],
			"generator":{
				"date":"2025-10-29T16:44:41+08:00",
				"engine":{
					"name":"openEuler CSAF Tool V1.0"
				}
			},
			"current_release_date":"2025-10-29T16:44:41+08:00",
			"id":"openEuler-SA-2025-2536",
			"version":"1.0.0",
			"status":"final"
		}
	},
	"product_tree":{
		"branches":[
			{
				"name":"openEuler",
				"category":"vendor",
				"branches":[
					{
						"name":"openEuler",
						"branches":[
							{
								"product":{
									"product_identification_helper":{
										"cpe":"cpe:/a:openEuler:openEuler:24.03-LTS"
									},
									"product_id":"openEuler-24.03-LTS",
									"name":"openEuler-24.03-LTS"
								},
								"name":"openEuler-24.03-LTS",
								"category":"product_version"
							}
						],
						"category":"product_name"
					},
					{
						"name":"aarch64",
						"branches":[
							{
								"product":{
									"product_identification_helper":{
										"cpe":"cpe:/a:openEuler:openEuler:24.03-LTS"
									},
									"product_id":"bpftool-6.6.0-113.0.0.105.oe2403.aarch64.rpm",
									"name":"bpftool-6.6.0-113.0.0.105.oe2403.aarch64.rpm"
								},
								"name":"bpftool-6.6.0-113.0.0.105.oe2403.aarch64.rpm",
								"category":"product_version"
							},
							{
								"product":{
									"product_identification_helper":{
										"cpe":"cpe:/a:openEuler:openEuler:24.03-LTS"
									},
									"product_id":"bpftool-debuginfo-6.6.0-113.0.0.105.oe2403.aarch64.rpm",
									"name":"bpftool-debuginfo-6.6.0-113.0.0.105.oe2403.aarch64.rpm"
								},
								"name":"bpftool-debuginfo-6.6.0-113.0.0.105.oe2403.aarch64.rpm",
								"category":"product_version"
							},
							{
								"product":{
									"product_identification_helper":{
										"cpe":"cpe:/a:openEuler:openEuler:24.03-LTS"
									},
									"product_id":"kernel-6.6.0-113.0.0.105.oe2403.aarch64.rpm",
									"name":"kernel-6.6.0-113.0.0.105.oe2403.aarch64.rpm"
								},
								"name":"kernel-6.6.0-113.0.0.105.oe2403.aarch64.rpm",
								"category":"product_version"
							},
							{
								"product":{
									"product_identification_helper":{
										"cpe":"cpe:/a:openEuler:openEuler:24.03-LTS"
									},
									"product_id":"kernel-debuginfo-6.6.0-113.0.0.105.oe2403.aarch64.rpm",
									"name":"kernel-debuginfo-6.6.0-113.0.0.105.oe2403.aarch64.rpm"
								},
								"name":"kernel-debuginfo-6.6.0-113.0.0.105.oe2403.aarch64.rpm",
								"category":"product_version"
							},
							{
								"product":{
									"product_identification_helper":{
										"cpe":"cpe:/a:openEuler:openEuler:24.03-LTS"
									},
									"product_id":"kernel-debugsource-6.6.0-113.0.0.105.oe2403.aarch64.rpm",
									"name":"kernel-debugsource-6.6.0-113.0.0.105.oe2403.aarch64.rpm"
								},
								"name":"kernel-debugsource-6.6.0-113.0.0.105.oe2403.aarch64.rpm",
								"category":"product_version"
							},
							{
								"product":{
									"product_identification_helper":{
										"cpe":"cpe:/a:openEuler:openEuler:24.03-LTS"
									},
									"product_id":"kernel-devel-6.6.0-113.0.0.105.oe2403.aarch64.rpm",
									"name":"kernel-devel-6.6.0-113.0.0.105.oe2403.aarch64.rpm"
								},
								"name":"kernel-devel-6.6.0-113.0.0.105.oe2403.aarch64.rpm",
								"category":"product_version"
							},
							{
								"product":{
									"product_identification_helper":{
										"cpe":"cpe:/a:openEuler:openEuler:24.03-LTS"
									},
									"product_id":"kernel-headers-6.6.0-113.0.0.105.oe2403.aarch64.rpm",
									"name":"kernel-headers-6.6.0-113.0.0.105.oe2403.aarch64.rpm"
								},
								"name":"kernel-headers-6.6.0-113.0.0.105.oe2403.aarch64.rpm",
								"category":"product_version"
							},
							{
								"product":{
									"product_identification_helper":{
										"cpe":"cpe:/a:openEuler:openEuler:24.03-LTS"
									},
									"product_id":"kernel-source-6.6.0-113.0.0.105.oe2403.aarch64.rpm",
									"name":"kernel-source-6.6.0-113.0.0.105.oe2403.aarch64.rpm"
								},
								"name":"kernel-source-6.6.0-113.0.0.105.oe2403.aarch64.rpm",
								"category":"product_version"
							},
							{
								"product":{
									"product_identification_helper":{
										"cpe":"cpe:/a:openEuler:openEuler:24.03-LTS"
									},
									"product_id":"kernel-tools-6.6.0-113.0.0.105.oe2403.aarch64.rpm",
									"name":"kernel-tools-6.6.0-113.0.0.105.oe2403.aarch64.rpm"
								},
								"name":"kernel-tools-6.6.0-113.0.0.105.oe2403.aarch64.rpm",
								"category":"product_version"
							},
							{
								"product":{
									"product_identification_helper":{
										"cpe":"cpe:/a:openEuler:openEuler:24.03-LTS"
									},
									"product_id":"kernel-tools-debuginfo-6.6.0-113.0.0.105.oe2403.aarch64.rpm",
									"name":"kernel-tools-debuginfo-6.6.0-113.0.0.105.oe2403.aarch64.rpm"
								},
								"name":"kernel-tools-debuginfo-6.6.0-113.0.0.105.oe2403.aarch64.rpm",
								"category":"product_version"
							},
							{
								"product":{
									"product_identification_helper":{
										"cpe":"cpe:/a:openEuler:openEuler:24.03-LTS"
									},
									"product_id":"kernel-tools-devel-6.6.0-113.0.0.105.oe2403.aarch64.rpm",
									"name":"kernel-tools-devel-6.6.0-113.0.0.105.oe2403.aarch64.rpm"
								},
								"name":"kernel-tools-devel-6.6.0-113.0.0.105.oe2403.aarch64.rpm",
								"category":"product_version"
							},
							{
								"product":{
									"product_identification_helper":{
										"cpe":"cpe:/a:openEuler:openEuler:24.03-LTS"
									},
									"product_id":"perf-6.6.0-113.0.0.105.oe2403.aarch64.rpm",
									"name":"perf-6.6.0-113.0.0.105.oe2403.aarch64.rpm"
								},
								"name":"perf-6.6.0-113.0.0.105.oe2403.aarch64.rpm",
								"category":"product_version"
							},
							{
								"product":{
									"product_identification_helper":{
										"cpe":"cpe:/a:openEuler:openEuler:24.03-LTS"
									},
									"product_id":"perf-debuginfo-6.6.0-113.0.0.105.oe2403.aarch64.rpm",
									"name":"perf-debuginfo-6.6.0-113.0.0.105.oe2403.aarch64.rpm"
								},
								"name":"perf-debuginfo-6.6.0-113.0.0.105.oe2403.aarch64.rpm",
								"category":"product_version"
							},
							{
								"product":{
									"product_identification_helper":{
										"cpe":"cpe:/a:openEuler:openEuler:24.03-LTS"
									},
									"product_id":"python3-perf-6.6.0-113.0.0.105.oe2403.aarch64.rpm",
									"name":"python3-perf-6.6.0-113.0.0.105.oe2403.aarch64.rpm"
								},
								"name":"python3-perf-6.6.0-113.0.0.105.oe2403.aarch64.rpm",
								"category":"product_version"
							},
							{
								"product":{
									"product_identification_helper":{
										"cpe":"cpe:/a:openEuler:openEuler:24.03-LTS"
									},
									"product_id":"python3-perf-debuginfo-6.6.0-113.0.0.105.oe2403.aarch64.rpm",
									"name":"python3-perf-debuginfo-6.6.0-113.0.0.105.oe2403.aarch64.rpm"
								},
								"name":"python3-perf-debuginfo-6.6.0-113.0.0.105.oe2403.aarch64.rpm",
								"category":"product_version"
							}
						],
						"category":"architecture"
					},
					{
						"name":"x86_64",
						"branches":[
							{
								"product":{
									"product_identification_helper":{
										"cpe":"cpe:/a:openEuler:openEuler:24.03-LTS"
									},
									"product_id":"bpftool-6.6.0-113.0.0.105.oe2403.x86_64.rpm",
									"name":"bpftool-6.6.0-113.0.0.105.oe2403.x86_64.rpm"
								},
								"name":"bpftool-6.6.0-113.0.0.105.oe2403.x86_64.rpm",
								"category":"product_version"
							},
							{
								"product":{
									"product_identification_helper":{
										"cpe":"cpe:/a:openEuler:openEuler:24.03-LTS"
									},
									"product_id":"bpftool-debuginfo-6.6.0-113.0.0.105.oe2403.x86_64.rpm",
									"name":"bpftool-debuginfo-6.6.0-113.0.0.105.oe2403.x86_64.rpm"
								},
								"name":"bpftool-debuginfo-6.6.0-113.0.0.105.oe2403.x86_64.rpm",
								"category":"product_version"
							},
							{
								"product":{
									"product_identification_helper":{
										"cpe":"cpe:/a:openEuler:openEuler:24.03-LTS"
									},
									"product_id":"kernel-6.6.0-113.0.0.105.oe2403.x86_64.rpm",
									"name":"kernel-6.6.0-113.0.0.105.oe2403.x86_64.rpm"
								},
								"name":"kernel-6.6.0-113.0.0.105.oe2403.x86_64.rpm",
								"category":"product_version"
							},
							{
								"product":{
									"product_identification_helper":{
										"cpe":"cpe:/a:openEuler:openEuler:24.03-LTS"
									},
									"product_id":"kernel-debuginfo-6.6.0-113.0.0.105.oe2403.x86_64.rpm",
									"name":"kernel-debuginfo-6.6.0-113.0.0.105.oe2403.x86_64.rpm"
								},
								"name":"kernel-debuginfo-6.6.0-113.0.0.105.oe2403.x86_64.rpm",
								"category":"product_version"
							},
							{
								"product":{
									"product_identification_helper":{
										"cpe":"cpe:/a:openEuler:openEuler:24.03-LTS"
									},
									"product_id":"kernel-debugsource-6.6.0-113.0.0.105.oe2403.x86_64.rpm",
									"name":"kernel-debugsource-6.6.0-113.0.0.105.oe2403.x86_64.rpm"
								},
								"name":"kernel-debugsource-6.6.0-113.0.0.105.oe2403.x86_64.rpm",
								"category":"product_version"
							},
							{
								"product":{
									"product_identification_helper":{
										"cpe":"cpe:/a:openEuler:openEuler:24.03-LTS"
									},
									"product_id":"kernel-devel-6.6.0-113.0.0.105.oe2403.x86_64.rpm",
									"name":"kernel-devel-6.6.0-113.0.0.105.oe2403.x86_64.rpm"
								},
								"name":"kernel-devel-6.6.0-113.0.0.105.oe2403.x86_64.rpm",
								"category":"product_version"
							},
							{
								"product":{
									"product_identification_helper":{
										"cpe":"cpe:/a:openEuler:openEuler:24.03-LTS"
									},
									"product_id":"kernel-headers-6.6.0-113.0.0.105.oe2403.x86_64.rpm",
									"name":"kernel-headers-6.6.0-113.0.0.105.oe2403.x86_64.rpm"
								},
								"name":"kernel-headers-6.6.0-113.0.0.105.oe2403.x86_64.rpm",
								"category":"product_version"
							},
							{
								"product":{
									"product_identification_helper":{
										"cpe":"cpe:/a:openEuler:openEuler:24.03-LTS"
									},
									"product_id":"kernel-source-6.6.0-113.0.0.105.oe2403.x86_64.rpm",
									"name":"kernel-source-6.6.0-113.0.0.105.oe2403.x86_64.rpm"
								},
								"name":"kernel-source-6.6.0-113.0.0.105.oe2403.x86_64.rpm",
								"category":"product_version"
							},
							{
								"product":{
									"product_identification_helper":{
										"cpe":"cpe:/a:openEuler:openEuler:24.03-LTS"
									},
									"product_id":"kernel-tools-6.6.0-113.0.0.105.oe2403.x86_64.rpm",
									"name":"kernel-tools-6.6.0-113.0.0.105.oe2403.x86_64.rpm"
								},
								"name":"kernel-tools-6.6.0-113.0.0.105.oe2403.x86_64.rpm",
								"category":"product_version"
							},
							{
								"product":{
									"product_identification_helper":{
										"cpe":"cpe:/a:openEuler:openEuler:24.03-LTS"
									},
									"product_id":"kernel-tools-debuginfo-6.6.0-113.0.0.105.oe2403.x86_64.rpm",
									"name":"kernel-tools-debuginfo-6.6.0-113.0.0.105.oe2403.x86_64.rpm"
								},
								"name":"kernel-tools-debuginfo-6.6.0-113.0.0.105.oe2403.x86_64.rpm",
								"category":"product_version"
							},
							{
								"product":{
									"product_identification_helper":{
										"cpe":"cpe:/a:openEuler:openEuler:24.03-LTS"
									},
									"product_id":"kernel-tools-devel-6.6.0-113.0.0.105.oe2403.x86_64.rpm",
									"name":"kernel-tools-devel-6.6.0-113.0.0.105.oe2403.x86_64.rpm"
								},
								"name":"kernel-tools-devel-6.6.0-113.0.0.105.oe2403.x86_64.rpm",
								"category":"product_version"
							},
							{
								"product":{
									"product_identification_helper":{
										"cpe":"cpe:/a:openEuler:openEuler:24.03-LTS"
									},
									"product_id":"perf-6.6.0-113.0.0.105.oe2403.x86_64.rpm",
									"name":"perf-6.6.0-113.0.0.105.oe2403.x86_64.rpm"
								},
								"name":"perf-6.6.0-113.0.0.105.oe2403.x86_64.rpm",
								"category":"product_version"
							},
							{
								"product":{
									"product_identification_helper":{
										"cpe":"cpe:/a:openEuler:openEuler:24.03-LTS"
									},
									"product_id":"perf-debuginfo-6.6.0-113.0.0.105.oe2403.x86_64.rpm",
									"name":"perf-debuginfo-6.6.0-113.0.0.105.oe2403.x86_64.rpm"
								},
								"name":"perf-debuginfo-6.6.0-113.0.0.105.oe2403.x86_64.rpm",
								"category":"product_version"
							},
							{
								"product":{
									"product_identification_helper":{
										"cpe":"cpe:/a:openEuler:openEuler:24.03-LTS"
									},
									"product_id":"python3-perf-6.6.0-113.0.0.105.oe2403.x86_64.rpm",
									"name":"python3-perf-6.6.0-113.0.0.105.oe2403.x86_64.rpm"
								},
								"name":"python3-perf-6.6.0-113.0.0.105.oe2403.x86_64.rpm",
								"category":"product_version"
							},
							{
								"product":{
									"product_identification_helper":{
										"cpe":"cpe:/a:openEuler:openEuler:24.03-LTS"
									},
									"product_id":"python3-perf-debuginfo-6.6.0-113.0.0.105.oe2403.x86_64.rpm",
									"name":"python3-perf-debuginfo-6.6.0-113.0.0.105.oe2403.x86_64.rpm"
								},
								"name":"python3-perf-debuginfo-6.6.0-113.0.0.105.oe2403.x86_64.rpm",
								"category":"product_version"
							}
						],
						"category":"architecture"
					},
					{
						"name":"src",
						"branches":[
							{
								"product":{
									"product_identification_helper":{
										"cpe":"cpe:/a:openEuler:openEuler:24.03-LTS"
									},
									"product_id":"kernel-6.6.0-113.0.0.105.oe2403.src.rpm",
									"name":"kernel-6.6.0-113.0.0.105.oe2403.src.rpm"
								},
								"name":"kernel-6.6.0-113.0.0.105.oe2403.src.rpm",
								"category":"product_version"
							}
						],
						"category":"architecture"
					}
				]
			}
		],
		"relationships":[
			{
				"relates_to_product_reference":"openEuler-24.03-LTS",
				"product_reference":"bpftool-6.6.0-113.0.0.105.oe2403.aarch64.rpm",
				"full_product_name":{
					"product_id":"openEuler-24.03-LTS:bpftool-6.6.0-113.0.0.105.oe2403.aarch64",
					"name":"bpftool-6.6.0-113.0.0.105.oe2403.aarch64 as a component of openEuler-24.03-LTS"
				},
				"category":"default_component_of"
			},
			{
				"relates_to_product_reference":"openEuler-24.03-LTS",
				"product_reference":"bpftool-debuginfo-6.6.0-113.0.0.105.oe2403.aarch64.rpm",
				"full_product_name":{
					"product_id":"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-113.0.0.105.oe2403.aarch64",
					"name":"bpftool-debuginfo-6.6.0-113.0.0.105.oe2403.aarch64 as a component of openEuler-24.03-LTS"
				},
				"category":"default_component_of"
			},
			{
				"relates_to_product_reference":"openEuler-24.03-LTS",
				"product_reference":"kernel-6.6.0-113.0.0.105.oe2403.aarch64.rpm",
				"full_product_name":{
					"product_id":"openEuler-24.03-LTS:kernel-6.6.0-113.0.0.105.oe2403.aarch64",
					"name":"kernel-6.6.0-113.0.0.105.oe2403.aarch64 as a component of openEuler-24.03-LTS"
				},
				"category":"default_component_of"
			},
			{
				"relates_to_product_reference":"openEuler-24.03-LTS",
				"product_reference":"kernel-debuginfo-6.6.0-113.0.0.105.oe2403.aarch64.rpm",
				"full_product_name":{
					"product_id":"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-113.0.0.105.oe2403.aarch64",
					"name":"kernel-debuginfo-6.6.0-113.0.0.105.oe2403.aarch64 as a component of openEuler-24.03-LTS"
				},
				"category":"default_component_of"
			},
			{
				"relates_to_product_reference":"openEuler-24.03-LTS",
				"product_reference":"kernel-debugsource-6.6.0-113.0.0.105.oe2403.aarch64.rpm",
				"full_product_name":{
					"product_id":"openEuler-24.03-LTS:kernel-debugsource-6.6.0-113.0.0.105.oe2403.aarch64",
					"name":"kernel-debugsource-6.6.0-113.0.0.105.oe2403.aarch64 as a component of openEuler-24.03-LTS"
				},
				"category":"default_component_of"
			},
			{
				"relates_to_product_reference":"openEuler-24.03-LTS",
				"product_reference":"kernel-devel-6.6.0-113.0.0.105.oe2403.aarch64.rpm",
				"full_product_name":{
					"product_id":"openEuler-24.03-LTS:kernel-devel-6.6.0-113.0.0.105.oe2403.aarch64",
					"name":"kernel-devel-6.6.0-113.0.0.105.oe2403.aarch64 as a component of openEuler-24.03-LTS"
				},
				"category":"default_component_of"
			},
			{
				"relates_to_product_reference":"openEuler-24.03-LTS",
				"product_reference":"kernel-headers-6.6.0-113.0.0.105.oe2403.aarch64.rpm",
				"full_product_name":{
					"product_id":"openEuler-24.03-LTS:kernel-headers-6.6.0-113.0.0.105.oe2403.aarch64",
					"name":"kernel-headers-6.6.0-113.0.0.105.oe2403.aarch64 as a component of openEuler-24.03-LTS"
				},
				"category":"default_component_of"
			},
			{
				"relates_to_product_reference":"openEuler-24.03-LTS",
				"product_reference":"kernel-source-6.6.0-113.0.0.105.oe2403.aarch64.rpm",
				"full_product_name":{
					"product_id":"openEuler-24.03-LTS:kernel-source-6.6.0-113.0.0.105.oe2403.aarch64",
					"name":"kernel-source-6.6.0-113.0.0.105.oe2403.aarch64 as a component of openEuler-24.03-LTS"
				},
				"category":"default_component_of"
			},
			{
				"relates_to_product_reference":"openEuler-24.03-LTS",
				"product_reference":"kernel-tools-6.6.0-113.0.0.105.oe2403.aarch64.rpm",
				"full_product_name":{
					"product_id":"openEuler-24.03-LTS:kernel-tools-6.6.0-113.0.0.105.oe2403.aarch64",
					"name":"kernel-tools-6.6.0-113.0.0.105.oe2403.aarch64 as a component of openEuler-24.03-LTS"
				},
				"category":"default_component_of"
			},
			{
				"relates_to_product_reference":"openEuler-24.03-LTS",
				"product_reference":"kernel-tools-debuginfo-6.6.0-113.0.0.105.oe2403.aarch64.rpm",
				"full_product_name":{
					"product_id":"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-113.0.0.105.oe2403.aarch64",
					"name":"kernel-tools-debuginfo-6.6.0-113.0.0.105.oe2403.aarch64 as a component of openEuler-24.03-LTS"
				},
				"category":"default_component_of"
			},
			{
				"relates_to_product_reference":"openEuler-24.03-LTS",
				"product_reference":"kernel-tools-devel-6.6.0-113.0.0.105.oe2403.aarch64.rpm",
				"full_product_name":{
					"product_id":"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-113.0.0.105.oe2403.aarch64",
					"name":"kernel-tools-devel-6.6.0-113.0.0.105.oe2403.aarch64 as a component of openEuler-24.03-LTS"
				},
				"category":"default_component_of"
			},
			{
				"relates_to_product_reference":"openEuler-24.03-LTS",
				"product_reference":"perf-6.6.0-113.0.0.105.oe2403.aarch64.rpm",
				"full_product_name":{
					"product_id":"openEuler-24.03-LTS:perf-6.6.0-113.0.0.105.oe2403.aarch64",
					"name":"perf-6.6.0-113.0.0.105.oe2403.aarch64 as a component of openEuler-24.03-LTS"
				},
				"category":"default_component_of"
			},
			{
				"relates_to_product_reference":"openEuler-24.03-LTS",
				"product_reference":"perf-debuginfo-6.6.0-113.0.0.105.oe2403.aarch64.rpm",
				"full_product_name":{
					"product_id":"openEuler-24.03-LTS:perf-debuginfo-6.6.0-113.0.0.105.oe2403.aarch64",
					"name":"perf-debuginfo-6.6.0-113.0.0.105.oe2403.aarch64 as a component of openEuler-24.03-LTS"
				},
				"category":"default_component_of"
			},
			{
				"relates_to_product_reference":"openEuler-24.03-LTS",
				"product_reference":"python3-perf-6.6.0-113.0.0.105.oe2403.aarch64.rpm",
				"full_product_name":{
					"product_id":"openEuler-24.03-LTS:python3-perf-6.6.0-113.0.0.105.oe2403.aarch64",
					"name":"python3-perf-6.6.0-113.0.0.105.oe2403.aarch64 as a component of openEuler-24.03-LTS"
				},
				"category":"default_component_of"
			},
			{
				"relates_to_product_reference":"openEuler-24.03-LTS",
				"product_reference":"python3-perf-debuginfo-6.6.0-113.0.0.105.oe2403.aarch64.rpm",
				"full_product_name":{
					"product_id":"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-113.0.0.105.oe2403.aarch64",
					"name":"python3-perf-debuginfo-6.6.0-113.0.0.105.oe2403.aarch64 as a component of openEuler-24.03-LTS"
				},
				"category":"default_component_of"
			},
			{
				"relates_to_product_reference":"openEuler-24.03-LTS",
				"product_reference":"bpftool-6.6.0-113.0.0.105.oe2403.x86_64.rpm",
				"full_product_name":{
					"product_id":"openEuler-24.03-LTS:bpftool-6.6.0-113.0.0.105.oe2403.x86_64",
					"name":"bpftool-6.6.0-113.0.0.105.oe2403.x86_64 as a component of openEuler-24.03-LTS"
				},
				"category":"default_component_of"
			},
			{
				"relates_to_product_reference":"openEuler-24.03-LTS",
				"product_reference":"bpftool-debuginfo-6.6.0-113.0.0.105.oe2403.x86_64.rpm",
				"full_product_name":{
					"product_id":"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-113.0.0.105.oe2403.x86_64",
					"name":"bpftool-debuginfo-6.6.0-113.0.0.105.oe2403.x86_64 as a component of openEuler-24.03-LTS"
				},
				"category":"default_component_of"
			},
			{
				"relates_to_product_reference":"openEuler-24.03-LTS",
				"product_reference":"kernel-6.6.0-113.0.0.105.oe2403.x86_64.rpm",
				"full_product_name":{
					"product_id":"openEuler-24.03-LTS:kernel-6.6.0-113.0.0.105.oe2403.x86_64",
					"name":"kernel-6.6.0-113.0.0.105.oe2403.x86_64 as a component of openEuler-24.03-LTS"
				},
				"category":"default_component_of"
			},
			{
				"relates_to_product_reference":"openEuler-24.03-LTS",
				"product_reference":"kernel-debuginfo-6.6.0-113.0.0.105.oe2403.x86_64.rpm",
				"full_product_name":{
					"product_id":"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-113.0.0.105.oe2403.x86_64",
					"name":"kernel-debuginfo-6.6.0-113.0.0.105.oe2403.x86_64 as a component of openEuler-24.03-LTS"
				},
				"category":"default_component_of"
			},
			{
				"relates_to_product_reference":"openEuler-24.03-LTS",
				"product_reference":"kernel-debugsource-6.6.0-113.0.0.105.oe2403.x86_64.rpm",
				"full_product_name":{
					"product_id":"openEuler-24.03-LTS:kernel-debugsource-6.6.0-113.0.0.105.oe2403.x86_64",
					"name":"kernel-debugsource-6.6.0-113.0.0.105.oe2403.x86_64 as a component of openEuler-24.03-LTS"
				},
				"category":"default_component_of"
			},
			{
				"relates_to_product_reference":"openEuler-24.03-LTS",
				"product_reference":"kernel-devel-6.6.0-113.0.0.105.oe2403.x86_64.rpm",
				"full_product_name":{
					"product_id":"openEuler-24.03-LTS:kernel-devel-6.6.0-113.0.0.105.oe2403.x86_64",
					"name":"kernel-devel-6.6.0-113.0.0.105.oe2403.x86_64 as a component of openEuler-24.03-LTS"
				},
				"category":"default_component_of"
			},
			{
				"relates_to_product_reference":"openEuler-24.03-LTS",
				"product_reference":"kernel-headers-6.6.0-113.0.0.105.oe2403.x86_64.rpm",
				"full_product_name":{
					"product_id":"openEuler-24.03-LTS:kernel-headers-6.6.0-113.0.0.105.oe2403.x86_64",
					"name":"kernel-headers-6.6.0-113.0.0.105.oe2403.x86_64 as a component of openEuler-24.03-LTS"
				},
				"category":"default_component_of"
			},
			{
				"relates_to_product_reference":"openEuler-24.03-LTS",
				"product_reference":"kernel-source-6.6.0-113.0.0.105.oe2403.x86_64.rpm",
				"full_product_name":{
					"product_id":"openEuler-24.03-LTS:kernel-source-6.6.0-113.0.0.105.oe2403.x86_64",
					"name":"kernel-source-6.6.0-113.0.0.105.oe2403.x86_64 as a component of openEuler-24.03-LTS"
				},
				"category":"default_component_of"
			},
			{
				"relates_to_product_reference":"openEuler-24.03-LTS",
				"product_reference":"kernel-tools-6.6.0-113.0.0.105.oe2403.x86_64.rpm",
				"full_product_name":{
					"product_id":"openEuler-24.03-LTS:kernel-tools-6.6.0-113.0.0.105.oe2403.x86_64",
					"name":"kernel-tools-6.6.0-113.0.0.105.oe2403.x86_64 as a component of openEuler-24.03-LTS"
				},
				"category":"default_component_of"
			},
			{
				"relates_to_product_reference":"openEuler-24.03-LTS",
				"product_reference":"kernel-tools-debuginfo-6.6.0-113.0.0.105.oe2403.x86_64.rpm",
				"full_product_name":{
					"product_id":"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-113.0.0.105.oe2403.x86_64",
					"name":"kernel-tools-debuginfo-6.6.0-113.0.0.105.oe2403.x86_64 as a component of openEuler-24.03-LTS"
				},
				"category":"default_component_of"
			},
			{
				"relates_to_product_reference":"openEuler-24.03-LTS",
				"product_reference":"kernel-tools-devel-6.6.0-113.0.0.105.oe2403.x86_64.rpm",
				"full_product_name":{
					"product_id":"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-113.0.0.105.oe2403.x86_64",
					"name":"kernel-tools-devel-6.6.0-113.0.0.105.oe2403.x86_64 as a component of openEuler-24.03-LTS"
				},
				"category":"default_component_of"
			},
			{
				"relates_to_product_reference":"openEuler-24.03-LTS",
				"product_reference":"perf-6.6.0-113.0.0.105.oe2403.x86_64.rpm",
				"full_product_name":{
					"product_id":"openEuler-24.03-LTS:perf-6.6.0-113.0.0.105.oe2403.x86_64",
					"name":"perf-6.6.0-113.0.0.105.oe2403.x86_64 as a component of openEuler-24.03-LTS"
				},
				"category":"default_component_of"
			},
			{
				"relates_to_product_reference":"openEuler-24.03-LTS",
				"product_reference":"perf-debuginfo-6.6.0-113.0.0.105.oe2403.x86_64.rpm",
				"full_product_name":{
					"product_id":"openEuler-24.03-LTS:perf-debuginfo-6.6.0-113.0.0.105.oe2403.x86_64",
					"name":"perf-debuginfo-6.6.0-113.0.0.105.oe2403.x86_64 as a component of openEuler-24.03-LTS"
				},
				"category":"default_component_of"
			},
			{
				"relates_to_product_reference":"openEuler-24.03-LTS",
				"product_reference":"python3-perf-6.6.0-113.0.0.105.oe2403.x86_64.rpm",
				"full_product_name":{
					"product_id":"openEuler-24.03-LTS:python3-perf-6.6.0-113.0.0.105.oe2403.x86_64",
					"name":"python3-perf-6.6.0-113.0.0.105.oe2403.x86_64 as a component of openEuler-24.03-LTS"
				},
				"category":"default_component_of"
			},
			{
				"relates_to_product_reference":"openEuler-24.03-LTS",
				"product_reference":"python3-perf-debuginfo-6.6.0-113.0.0.105.oe2403.x86_64.rpm",
				"full_product_name":{
					"product_id":"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-113.0.0.105.oe2403.x86_64",
					"name":"python3-perf-debuginfo-6.6.0-113.0.0.105.oe2403.x86_64 as a component of openEuler-24.03-LTS"
				},
				"category":"default_component_of"
			},
			{
				"relates_to_product_reference":"openEuler-24.03-LTS",
				"product_reference":"kernel-6.6.0-113.0.0.105.oe2403.src.rpm",
				"full_product_name":{
					"product_id":"openEuler-24.03-LTS:kernel-6.6.0-113.0.0.105.oe2403.src",
					"name":"kernel-6.6.0-113.0.0.105.oe2403.src as a component of openEuler-24.03-LTS"
				},
				"category":"default_component_of"
			}
		]
	},
	"vulnerabilities":[
		{
			"cve":"CVE-2025-21801",
			"notes":[
				{
					"text":"In the Linux kernel, the following vulnerability has been resolved:\n\nnet: ravb: Fix missing rtnl lock in suspend/resume path\n\nFix the suspend/resume path by ensuring the rtnl lock is held where\nrequired. Calls to ravb_open, ravb_close and wol operations must be\nperformed under the rtnl lock to prevent conflicts with ongoing ndo\noperations.\n\nWithout this fix, the following warning is triggered:\n[   39.032969] =============================\n[   39.032983] WARNING: suspicious RCU usage\n[   39.033019] -----------------------------\n[   39.033033] drivers/net/phy/phy_device.c:2004 suspicious\nrcu_dereference_protected() usage!\n...\n[   39.033597] stack backtrace:\n[   39.033613] CPU: 0 UID: 0 PID: 174 Comm: python3 Not tainted\n6.13.0-rc7-next-20250116-arm64-renesas-00002-g35245dfdc62c #7\n[   39.033623] Hardware name: Renesas SMARC EVK version 2 based on\nr9a08g045s33 (DT)\n[   39.033628] Call trace:\n[   39.033633]  show_stack+0x14/0x1c (C)\n[   39.033652]  dump_stack_lvl+0xb4/0xc4\n[   39.033664]  dump_stack+0x14/0x1c\n[   39.033671]  lockdep_rcu_suspicious+0x16c/0x22c\n[   39.033682]  phy_detach+0x160/0x190\n[   39.033694]  phy_disconnect+0x40/0x54\n[   39.033703]  ravb_close+0x6c/0x1cc\n[   39.033714]  ravb_suspend+0x48/0x120\n[   39.033721]  dpm_run_callback+0x4c/0x14c\n[   39.033731]  device_suspend+0x11c/0x4dc\n[   39.033740]  dpm_suspend+0xdc/0x214\n[   39.033748]  dpm_suspend_start+0x48/0x60\n[   39.033758]  suspend_devices_and_enter+0x124/0x574\n[   39.033769]  pm_suspend+0x1ac/0x274\n[   39.033778]  state_store+0x88/0x124\n[   39.033788]  kobj_attr_store+0x14/0x24\n[   39.033798]  sysfs_kf_write+0x48/0x6c\n[   39.033808]  kernfs_fop_write_iter+0x118/0x1a8\n[   39.033817]  vfs_write+0x27c/0x378\n[   39.033825]  ksys_write+0x64/0xf4\n[   39.033833]  __arm64_sys_write+0x18/0x20\n[   39.033841]  invoke_syscall+0x44/0x104\n[   39.033852]  el0_svc_common.constprop.0+0xb4/0xd4\n[   39.033862]  do_el0_svc+0x18/0x20\n[   39.033870]  el0_svc+0x3c/0xf0\n[   39.033880]  el0t_64_sync_handler+0xc0/0xc4\n[   39.033888]  el0t_64_sync+0x154/0x158\n[   39.041274] ravb 11c30000.ethernet eth0: Link is Down",
					"category":"description",
					"title":"Vulnerability Description"
				}
			],
			"product_status":{
				"fixed":[
					"openEuler-24.03-LTS:bpftool-6.6.0-113.0.0.105.oe2403.aarch64",
					"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-113.0.0.105.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-6.6.0-113.0.0.105.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-113.0.0.105.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-debugsource-6.6.0-113.0.0.105.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-devel-6.6.0-113.0.0.105.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-headers-6.6.0-113.0.0.105.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-source-6.6.0-113.0.0.105.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-tools-6.6.0-113.0.0.105.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-113.0.0.105.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-113.0.0.105.oe2403.aarch64",
					"openEuler-24.03-LTS:perf-6.6.0-113.0.0.105.oe2403.aarch64",
					"openEuler-24.03-LTS:perf-debuginfo-6.6.0-113.0.0.105.oe2403.aarch64",
					"openEuler-24.03-LTS:python3-perf-6.6.0-113.0.0.105.oe2403.aarch64",
					"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-113.0.0.105.oe2403.aarch64",
					"openEuler-24.03-LTS:bpftool-6.6.0-113.0.0.105.oe2403.x86_64",
					"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-113.0.0.105.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-6.6.0-113.0.0.105.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-113.0.0.105.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-debugsource-6.6.0-113.0.0.105.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-devel-6.6.0-113.0.0.105.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-headers-6.6.0-113.0.0.105.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-source-6.6.0-113.0.0.105.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-tools-6.6.0-113.0.0.105.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-113.0.0.105.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-113.0.0.105.oe2403.x86_64",
					"openEuler-24.03-LTS:perf-6.6.0-113.0.0.105.oe2403.x86_64",
					"openEuler-24.03-LTS:perf-debuginfo-6.6.0-113.0.0.105.oe2403.x86_64",
					"openEuler-24.03-LTS:python3-perf-6.6.0-113.0.0.105.oe2403.x86_64",
					"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-113.0.0.105.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-6.6.0-113.0.0.105.oe2403.src"
				]
			},
			"remediations":[
				{
					"product_ids":[
						"openEuler-24.03-LTS:bpftool-6.6.0-113.0.0.105.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-113.0.0.105.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-6.6.0-113.0.0.105.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-113.0.0.105.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-113.0.0.105.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-113.0.0.105.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-113.0.0.105.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-113.0.0.105.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-113.0.0.105.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-113.0.0.105.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-113.0.0.105.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-6.6.0-113.0.0.105.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-113.0.0.105.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-113.0.0.105.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-113.0.0.105.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-6.6.0-113.0.0.105.oe2403.x86_64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-113.0.0.105.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-6.6.0-113.0.0.105.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-113.0.0.105.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-113.0.0.105.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-113.0.0.105.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-113.0.0.105.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-113.0.0.105.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-113.0.0.105.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-113.0.0.105.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-113.0.0.105.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-6.6.0-113.0.0.105.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-113.0.0.105.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-113.0.0.105.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-113.0.0.105.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-6.6.0-113.0.0.105.oe2403.src"
					],
					"details":"kernel security update",
					"category":"vendor_fix",
					"url":"https://www.openeuler.org/zh/security/security-bulletins/detail/?id=openEuler-SA-2025-2536"
				}
			],
			"scores":[
				{
					"cvss_v3":{
						"baseSeverity":"MEDIUM",
						"baseScore":5.5,
						"vectorString":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
						"version":"3.1"
					},
					"products":[
						"openEuler-24.03-LTS:bpftool-6.6.0-113.0.0.105.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-113.0.0.105.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-6.6.0-113.0.0.105.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-113.0.0.105.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-113.0.0.105.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-113.0.0.105.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-113.0.0.105.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-113.0.0.105.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-113.0.0.105.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-113.0.0.105.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-113.0.0.105.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-6.6.0-113.0.0.105.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-113.0.0.105.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-113.0.0.105.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-113.0.0.105.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-6.6.0-113.0.0.105.oe2403.x86_64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-113.0.0.105.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-6.6.0-113.0.0.105.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-113.0.0.105.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-113.0.0.105.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-113.0.0.105.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-113.0.0.105.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-113.0.0.105.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-113.0.0.105.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-113.0.0.105.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-113.0.0.105.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-6.6.0-113.0.0.105.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-113.0.0.105.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-113.0.0.105.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-113.0.0.105.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-6.6.0-113.0.0.105.oe2403.src"
					]
				}
			],
			"threats":[
				{
					"details":"Medium",
					"category":"impact"
				}
			],
			"title":"CVE-2025-21801"
		},
		{
			"cve":"CVE-2025-21917",
			"notes":[
				{
					"text":"In the Linux kernel, the following vulnerability has been resolved:\n\nusb: renesas_usbhs: Flush the notify_hotplug_work\n\nWhen performing continuous unbind/bind operations on the USB drivers\navailable on the Renesas RZ/G2L SoC, a kernel crash with the message\n\"Unable to handle kernel NULL pointer dereference at virtual address\"\nmay occur. This issue points to the usbhsc_notify_hotplug() function.\n\nFlush the delayed work to avoid its execution when driver resources are\nunavailable.",
					"category":"description",
					"title":"Vulnerability Description"
				}
			],
			"product_status":{
				"fixed":[
					"openEuler-24.03-LTS:bpftool-6.6.0-113.0.0.105.oe2403.aarch64",
					"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-113.0.0.105.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-6.6.0-113.0.0.105.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-113.0.0.105.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-debugsource-6.6.0-113.0.0.105.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-devel-6.6.0-113.0.0.105.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-headers-6.6.0-113.0.0.105.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-source-6.6.0-113.0.0.105.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-tools-6.6.0-113.0.0.105.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-113.0.0.105.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-113.0.0.105.oe2403.aarch64",
					"openEuler-24.03-LTS:perf-6.6.0-113.0.0.105.oe2403.aarch64",
					"openEuler-24.03-LTS:perf-debuginfo-6.6.0-113.0.0.105.oe2403.aarch64",
					"openEuler-24.03-LTS:python3-perf-6.6.0-113.0.0.105.oe2403.aarch64",
					"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-113.0.0.105.oe2403.aarch64",
					"openEuler-24.03-LTS:bpftool-6.6.0-113.0.0.105.oe2403.x86_64",
					"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-113.0.0.105.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-6.6.0-113.0.0.105.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-113.0.0.105.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-debugsource-6.6.0-113.0.0.105.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-devel-6.6.0-113.0.0.105.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-headers-6.6.0-113.0.0.105.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-source-6.6.0-113.0.0.105.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-tools-6.6.0-113.0.0.105.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-113.0.0.105.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-113.0.0.105.oe2403.x86_64",
					"openEuler-24.03-LTS:perf-6.6.0-113.0.0.105.oe2403.x86_64",
					"openEuler-24.03-LTS:perf-debuginfo-6.6.0-113.0.0.105.oe2403.x86_64",
					"openEuler-24.03-LTS:python3-perf-6.6.0-113.0.0.105.oe2403.x86_64",
					"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-113.0.0.105.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-6.6.0-113.0.0.105.oe2403.src"
				]
			},
			"remediations":[
				{
					"product_ids":[
						"openEuler-24.03-LTS:bpftool-6.6.0-113.0.0.105.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-113.0.0.105.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-6.6.0-113.0.0.105.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-113.0.0.105.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-113.0.0.105.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-113.0.0.105.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-113.0.0.105.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-113.0.0.105.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-113.0.0.105.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-113.0.0.105.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-113.0.0.105.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-6.6.0-113.0.0.105.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-113.0.0.105.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-113.0.0.105.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-113.0.0.105.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-6.6.0-113.0.0.105.oe2403.x86_64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-113.0.0.105.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-6.6.0-113.0.0.105.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-113.0.0.105.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-113.0.0.105.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-113.0.0.105.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-113.0.0.105.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-113.0.0.105.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-113.0.0.105.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-113.0.0.105.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-113.0.0.105.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-6.6.0-113.0.0.105.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-113.0.0.105.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-113.0.0.105.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-113.0.0.105.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-6.6.0-113.0.0.105.oe2403.src"
					],
					"details":"kernel security update",
					"category":"vendor_fix",
					"url":"https://www.openeuler.org/zh/security/security-bulletins/detail/?id=openEuler-SA-2025-2536"
				}
			],
			"scores":[
				{
					"cvss_v3":{
						"baseSeverity":"MEDIUM",
						"baseScore":5.5,
						"vectorString":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
						"version":"3.1"
					},
					"products":[
						"openEuler-24.03-LTS:bpftool-6.6.0-113.0.0.105.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-113.0.0.105.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-6.6.0-113.0.0.105.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-113.0.0.105.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-113.0.0.105.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-113.0.0.105.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-113.0.0.105.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-113.0.0.105.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-113.0.0.105.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-113.0.0.105.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-113.0.0.105.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-6.6.0-113.0.0.105.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-113.0.0.105.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-113.0.0.105.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-113.0.0.105.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-6.6.0-113.0.0.105.oe2403.x86_64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-113.0.0.105.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-6.6.0-113.0.0.105.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-113.0.0.105.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-113.0.0.105.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-113.0.0.105.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-113.0.0.105.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-113.0.0.105.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-113.0.0.105.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-113.0.0.105.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-113.0.0.105.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-6.6.0-113.0.0.105.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-113.0.0.105.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-113.0.0.105.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-113.0.0.105.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-6.6.0-113.0.0.105.oe2403.src"
					]
				}
			],
			"threats":[
				{
					"details":"Medium",
					"category":"impact"
				}
			],
			"title":"CVE-2025-21917"
		},
		{
			"cve":"CVE-2025-37792",
			"notes":[
				{
					"text":"In the Linux kernel, the following vulnerability has been resolved:\n\nBluetooth: btrtl: Prevent potential NULL dereference\n\nThe btrtl_initialize() function checks that rtl_load_file() either\nhad an error or it loaded a zero length file.  However, if it loaded\na zero length file then the error code is not set correctly.  It\nresults in an error pointer vs NULL bug, followed by a NULL pointer\ndereference.  This was detected by Smatch:\n\ndrivers/bluetooth/btrtl.c:592 btrtl_initialize() warn: passing zero to 'ERR_PTR'",
					"category":"description",
					"title":"Vulnerability Description"
				}
			],
			"product_status":{
				"fixed":[
					"openEuler-24.03-LTS:bpftool-6.6.0-113.0.0.105.oe2403.aarch64",
					"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-113.0.0.105.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-6.6.0-113.0.0.105.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-113.0.0.105.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-debugsource-6.6.0-113.0.0.105.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-devel-6.6.0-113.0.0.105.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-headers-6.6.0-113.0.0.105.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-source-6.6.0-113.0.0.105.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-tools-6.6.0-113.0.0.105.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-113.0.0.105.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-113.0.0.105.oe2403.aarch64",
					"openEuler-24.03-LTS:perf-6.6.0-113.0.0.105.oe2403.aarch64",
					"openEuler-24.03-LTS:perf-debuginfo-6.6.0-113.0.0.105.oe2403.aarch64",
					"openEuler-24.03-LTS:python3-perf-6.6.0-113.0.0.105.oe2403.aarch64",
					"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-113.0.0.105.oe2403.aarch64",
					"openEuler-24.03-LTS:bpftool-6.6.0-113.0.0.105.oe2403.x86_64",
					"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-113.0.0.105.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-6.6.0-113.0.0.105.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-113.0.0.105.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-debugsource-6.6.0-113.0.0.105.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-devel-6.6.0-113.0.0.105.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-headers-6.6.0-113.0.0.105.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-source-6.6.0-113.0.0.105.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-tools-6.6.0-113.0.0.105.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-113.0.0.105.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-113.0.0.105.oe2403.x86_64",
					"openEuler-24.03-LTS:perf-6.6.0-113.0.0.105.oe2403.x86_64",
					"openEuler-24.03-LTS:perf-debuginfo-6.6.0-113.0.0.105.oe2403.x86_64",
					"openEuler-24.03-LTS:python3-perf-6.6.0-113.0.0.105.oe2403.x86_64",
					"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-113.0.0.105.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-6.6.0-113.0.0.105.oe2403.src"
				]
			},
			"remediations":[
				{
					"product_ids":[
						"openEuler-24.03-LTS:bpftool-6.6.0-113.0.0.105.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-113.0.0.105.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-6.6.0-113.0.0.105.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-113.0.0.105.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-113.0.0.105.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-113.0.0.105.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-113.0.0.105.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-113.0.0.105.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-113.0.0.105.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-113.0.0.105.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-113.0.0.105.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-6.6.0-113.0.0.105.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-113.0.0.105.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-113.0.0.105.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-113.0.0.105.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-6.6.0-113.0.0.105.oe2403.x86_64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-113.0.0.105.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-6.6.0-113.0.0.105.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-113.0.0.105.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-113.0.0.105.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-113.0.0.105.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-113.0.0.105.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-113.0.0.105.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-113.0.0.105.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-113.0.0.105.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-113.0.0.105.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-6.6.0-113.0.0.105.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-113.0.0.105.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-113.0.0.105.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-113.0.0.105.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-6.6.0-113.0.0.105.oe2403.src"
					],
					"details":"kernel security update",
					"category":"vendor_fix",
					"url":"https://www.openeuler.org/zh/security/security-bulletins/detail/?id=openEuler-SA-2025-2536"
				}
			],
			"scores":[
				{
					"cvss_v3":{
						"baseSeverity":"MEDIUM",
						"baseScore":5.5,
						"vectorString":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
						"version":"3.1"
					},
					"products":[
						"openEuler-24.03-LTS:bpftool-6.6.0-113.0.0.105.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-113.0.0.105.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-6.6.0-113.0.0.105.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-113.0.0.105.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-113.0.0.105.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-113.0.0.105.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-113.0.0.105.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-113.0.0.105.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-113.0.0.105.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-113.0.0.105.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-113.0.0.105.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-6.6.0-113.0.0.105.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-113.0.0.105.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-113.0.0.105.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-113.0.0.105.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-6.6.0-113.0.0.105.oe2403.x86_64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-113.0.0.105.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-6.6.0-113.0.0.105.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-113.0.0.105.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-113.0.0.105.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-113.0.0.105.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-113.0.0.105.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-113.0.0.105.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-113.0.0.105.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-113.0.0.105.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-113.0.0.105.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-6.6.0-113.0.0.105.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-113.0.0.105.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-113.0.0.105.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-113.0.0.105.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-6.6.0-113.0.0.105.oe2403.src"
					]
				}
			],
			"threats":[
				{
					"details":"Medium",
					"category":"impact"
				}
			],
			"title":"CVE-2025-37792"
		},
		{
			"cve":"CVE-2025-37914",
			"notes":[
				{
					"text":"In the Linux kernel, the following vulnerability has been resolved:\n\nnet_sched: ets: Fix double list add in class with netem as child qdisc\n\nAs described in Gerrard's report [1], there are use cases where a netem\nchild qdisc will make the parent qdisc's enqueue callback reentrant.\nIn the case of ets, there won't be a UAF, but the code will add the same\nclassifier to the list twice, which will cause memory corruption.\n\nIn addition to checking for qlen being zero, this patch checks whether\nthe class was already added to the active_list (cl_is_active) before\ndoing the addition to cater for the reentrant case.\n\n[1] https://lore.kernel.org/netdev/CAHcdcOm+03OD2j6R0=YHKqmy=VgJ8xEOKuP6c7mSgnp-TEJJbw@mail.gmail.com/",
					"category":"description",
					"title":"Vulnerability Description"
				}
			],
			"product_status":{
				"fixed":[
					"openEuler-24.03-LTS:bpftool-6.6.0-113.0.0.105.oe2403.aarch64",
					"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-113.0.0.105.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-6.6.0-113.0.0.105.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-113.0.0.105.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-debugsource-6.6.0-113.0.0.105.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-devel-6.6.0-113.0.0.105.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-headers-6.6.0-113.0.0.105.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-source-6.6.0-113.0.0.105.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-tools-6.6.0-113.0.0.105.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-113.0.0.105.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-113.0.0.105.oe2403.aarch64",
					"openEuler-24.03-LTS:perf-6.6.0-113.0.0.105.oe2403.aarch64",
					"openEuler-24.03-LTS:perf-debuginfo-6.6.0-113.0.0.105.oe2403.aarch64",
					"openEuler-24.03-LTS:python3-perf-6.6.0-113.0.0.105.oe2403.aarch64",
					"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-113.0.0.105.oe2403.aarch64",
					"openEuler-24.03-LTS:bpftool-6.6.0-113.0.0.105.oe2403.x86_64",
					"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-113.0.0.105.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-6.6.0-113.0.0.105.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-113.0.0.105.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-debugsource-6.6.0-113.0.0.105.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-devel-6.6.0-113.0.0.105.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-headers-6.6.0-113.0.0.105.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-source-6.6.0-113.0.0.105.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-tools-6.6.0-113.0.0.105.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-113.0.0.105.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-113.0.0.105.oe2403.x86_64",
					"openEuler-24.03-LTS:perf-6.6.0-113.0.0.105.oe2403.x86_64",
					"openEuler-24.03-LTS:perf-debuginfo-6.6.0-113.0.0.105.oe2403.x86_64",
					"openEuler-24.03-LTS:python3-perf-6.6.0-113.0.0.105.oe2403.x86_64",
					"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-113.0.0.105.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-6.6.0-113.0.0.105.oe2403.src"
				]
			},
			"remediations":[
				{
					"product_ids":[
						"openEuler-24.03-LTS:bpftool-6.6.0-113.0.0.105.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-113.0.0.105.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-6.6.0-113.0.0.105.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-113.0.0.105.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-113.0.0.105.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-113.0.0.105.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-113.0.0.105.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-113.0.0.105.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-113.0.0.105.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-113.0.0.105.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-113.0.0.105.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-6.6.0-113.0.0.105.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-113.0.0.105.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-113.0.0.105.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-113.0.0.105.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-6.6.0-113.0.0.105.oe2403.x86_64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-113.0.0.105.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-6.6.0-113.0.0.105.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-113.0.0.105.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-113.0.0.105.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-113.0.0.105.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-113.0.0.105.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-113.0.0.105.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-113.0.0.105.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-113.0.0.105.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-113.0.0.105.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-6.6.0-113.0.0.105.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-113.0.0.105.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-113.0.0.105.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-113.0.0.105.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-6.6.0-113.0.0.105.oe2403.src"
					],
					"details":"kernel security update",
					"category":"vendor_fix",
					"url":"https://www.openeuler.org/zh/security/security-bulletins/detail/?id=openEuler-SA-2025-2536"
				}
			],
			"scores":[
				{
					"cvss_v3":{
						"baseSeverity":"MEDIUM",
						"baseScore":5.5,
						"vectorString":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N",
						"version":"3.1"
					},
					"products":[
						"openEuler-24.03-LTS:bpftool-6.6.0-113.0.0.105.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-113.0.0.105.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-6.6.0-113.0.0.105.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-113.0.0.105.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-113.0.0.105.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-113.0.0.105.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-113.0.0.105.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-113.0.0.105.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-113.0.0.105.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-113.0.0.105.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-113.0.0.105.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-6.6.0-113.0.0.105.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-113.0.0.105.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-113.0.0.105.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-113.0.0.105.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-6.6.0-113.0.0.105.oe2403.x86_64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-113.0.0.105.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-6.6.0-113.0.0.105.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-113.0.0.105.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-113.0.0.105.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-113.0.0.105.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-113.0.0.105.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-113.0.0.105.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-113.0.0.105.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-113.0.0.105.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-113.0.0.105.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-6.6.0-113.0.0.105.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-113.0.0.105.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-113.0.0.105.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-113.0.0.105.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-6.6.0-113.0.0.105.oe2403.src"
					]
				}
			],
			"threats":[
				{
					"details":"Medium",
					"category":"impact"
				}
			],
			"title":"CVE-2025-37914"
		},
		{
			"cve":"CVE-2025-37931",
			"notes":[
				{
					"text":"In the Linux kernel, the following vulnerability has been resolved:\n\nbtrfs: adjust subpage bit start based on sectorsize\n\nWhen running machines with 64k page size and a 16k nodesize we started\nseeing tree log corruption in production.  This turned out to be because\nwe were not writing out dirty blocks sometimes, so this in fact affects\nall metadata writes.\n\nWhen writing out a subpage EB we scan the subpage bitmap for a dirty\nrange.  If the range isn't dirty we do\n\n\tbit_start++;\n\nto move onto the next bit.  The problem is the bitmap is based on the\nnumber of sectors that an EB has.  So in this case, we have a 64k\npagesize, 16k nodesize, but a 4k sectorsize.  This means our bitmap is 4\nbits for every node.  With a 64k page size we end up with 4 nodes per\npage.\n\nTo make this easier this is how everything looks\n\n[0         16k       32k       48k     ] logical address\n[0         4         8         12      ] radix tree offset\n[               64k page               ] folio\n[ 16k eb ][ 16k eb ][ 16k eb ][ 16k eb ] extent buffers\n[ | | | |  | | | |   | | | |   | | | | ] bitmap\n\nNow we use all of our addressing based on fs_info->sectorsize_bits, so\nas you can see the above our 16k eb->start turns into radix entry 4.\n\nWhen we find a dirty range for our eb, we correctly do bit_start +=\nsectors_per_node, because if we start at bit 0, the next bit for the\nnext eb is 4, to correspond to eb->start 16k.\n\nHowever if our range is clean, we will do bit_start++, which will now\nput us offset from our radix tree entries.\n\nIn our case, assume that the first time we check the bitmap the block is\nnot dirty, we increment bit_start so now it == 1, and then we loop\naround and check again.  This time it is dirty, and we go to find that\nstart using the following equation\n\n\tstart = folio_start + bit_start * fs_info->sectorsize;\n\nso in the case above, eb->start 0 is now dirty, and we calculate start\nas\n\n\t0 + 1 * fs_info->sectorsize = 4096\n\t4096 >> 12 = 1\n\nNow we're looking up the radix tree for 1, and we won't find an eb.\nWhat's worse is now we're using bit_start == 1, so we do bit_start +=\nsectors_per_node, which is now 5.  If that eb is dirty we will run into\nthe same thing, we will look at an offset that is not populated in the\nradix tree, and now we're skipping the writeout of dirty extent buffers.\n\nThe best fix for this is to not use sectorsize_bits to address nodes,\nbut that's a larger change.  Since this is a fs corruption problem fix\nit simply by always using sectors_per_node to increment the start bit.",
					"category":"description",
					"title":"Vulnerability Description"
				}
			],
			"product_status":{
				"fixed":[
					"openEuler-24.03-LTS:bpftool-6.6.0-113.0.0.105.oe2403.aarch64",
					"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-113.0.0.105.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-6.6.0-113.0.0.105.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-113.0.0.105.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-debugsource-6.6.0-113.0.0.105.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-devel-6.6.0-113.0.0.105.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-headers-6.6.0-113.0.0.105.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-source-6.6.0-113.0.0.105.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-tools-6.6.0-113.0.0.105.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-113.0.0.105.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-113.0.0.105.oe2403.aarch64",
					"openEuler-24.03-LTS:perf-6.6.0-113.0.0.105.oe2403.aarch64",
					"openEuler-24.03-LTS:perf-debuginfo-6.6.0-113.0.0.105.oe2403.aarch64",
					"openEuler-24.03-LTS:python3-perf-6.6.0-113.0.0.105.oe2403.aarch64",
					"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-113.0.0.105.oe2403.aarch64",
					"openEuler-24.03-LTS:bpftool-6.6.0-113.0.0.105.oe2403.x86_64",
					"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-113.0.0.105.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-6.6.0-113.0.0.105.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-113.0.0.105.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-debugsource-6.6.0-113.0.0.105.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-devel-6.6.0-113.0.0.105.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-headers-6.6.0-113.0.0.105.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-source-6.6.0-113.0.0.105.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-tools-6.6.0-113.0.0.105.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-113.0.0.105.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-113.0.0.105.oe2403.x86_64",
					"openEuler-24.03-LTS:perf-6.6.0-113.0.0.105.oe2403.x86_64",
					"openEuler-24.03-LTS:perf-debuginfo-6.6.0-113.0.0.105.oe2403.x86_64",
					"openEuler-24.03-LTS:python3-perf-6.6.0-113.0.0.105.oe2403.x86_64",
					"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-113.0.0.105.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-6.6.0-113.0.0.105.oe2403.src"
				]
			},
			"remediations":[
				{
					"product_ids":[
						"openEuler-24.03-LTS:bpftool-6.6.0-113.0.0.105.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-113.0.0.105.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-6.6.0-113.0.0.105.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-113.0.0.105.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-113.0.0.105.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-113.0.0.105.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-113.0.0.105.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-113.0.0.105.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-113.0.0.105.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-113.0.0.105.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-113.0.0.105.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-6.6.0-113.0.0.105.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-113.0.0.105.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-113.0.0.105.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-113.0.0.105.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-6.6.0-113.0.0.105.oe2403.x86_64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-113.0.0.105.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-6.6.0-113.0.0.105.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-113.0.0.105.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-113.0.0.105.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-113.0.0.105.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-113.0.0.105.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-113.0.0.105.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-113.0.0.105.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-113.0.0.105.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-113.0.0.105.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-6.6.0-113.0.0.105.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-113.0.0.105.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-113.0.0.105.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-113.0.0.105.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-6.6.0-113.0.0.105.oe2403.src"
					],
					"details":"kernel security update",
					"category":"vendor_fix",
					"url":"https://www.openeuler.org/zh/security/security-bulletins/detail/?id=openEuler-SA-2025-2536"
				}
			],
			"scores":[
				{
					"cvss_v3":{
						"baseSeverity":"MEDIUM",
						"baseScore":5.5,
						"vectorString":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N",
						"version":"3.1"
					},
					"products":[
						"openEuler-24.03-LTS:bpftool-6.6.0-113.0.0.105.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-113.0.0.105.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-6.6.0-113.0.0.105.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-113.0.0.105.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-113.0.0.105.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-113.0.0.105.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-113.0.0.105.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-113.0.0.105.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-113.0.0.105.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-113.0.0.105.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-113.0.0.105.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-6.6.0-113.0.0.105.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-113.0.0.105.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-113.0.0.105.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-113.0.0.105.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-6.6.0-113.0.0.105.oe2403.x86_64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-113.0.0.105.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-6.6.0-113.0.0.105.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-113.0.0.105.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-113.0.0.105.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-113.0.0.105.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-113.0.0.105.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-113.0.0.105.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-113.0.0.105.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-113.0.0.105.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-113.0.0.105.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-6.6.0-113.0.0.105.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-113.0.0.105.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-113.0.0.105.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-113.0.0.105.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-6.6.0-113.0.0.105.oe2403.src"
					]
				}
			],
			"threats":[
				{
					"details":"Medium",
					"category":"impact"
				}
			],
			"title":"CVE-2025-37931"
		},
		{
			"cve":"CVE-2025-38313",
			"notes":[
				{
					"text":"In the Linux kernel, the following vulnerability has been resolved:\n\nbus: fsl-mc: fix double-free on mc_dev\n\nThe blamed commit tried to simplify how the deallocations are done but,\nin the process, introduced a double-free on the mc_dev variable.\n\nIn case the MC device is a DPRC, a new mc_bus is allocated and the\nmc_dev variable is just a reference to one of its fields. In this\ncircumstance, on the error path only the mc_bus should be freed.\n\nThis commit introduces back the following checkpatch warning which is a\nfalse-positive.\n\nWARNING: kfree(NULL) is safe and this check is probably not required\n+       if (mc_bus)\n+               kfree(mc_bus);",
					"category":"description",
					"title":"Vulnerability Description"
				}
			],
			"product_status":{
				"fixed":[
					"openEuler-24.03-LTS:bpftool-6.6.0-113.0.0.105.oe2403.aarch64",
					"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-113.0.0.105.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-6.6.0-113.0.0.105.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-113.0.0.105.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-debugsource-6.6.0-113.0.0.105.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-devel-6.6.0-113.0.0.105.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-headers-6.6.0-113.0.0.105.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-source-6.6.0-113.0.0.105.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-tools-6.6.0-113.0.0.105.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-113.0.0.105.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-113.0.0.105.oe2403.aarch64",
					"openEuler-24.03-LTS:perf-6.6.0-113.0.0.105.oe2403.aarch64",
					"openEuler-24.03-LTS:perf-debuginfo-6.6.0-113.0.0.105.oe2403.aarch64",
					"openEuler-24.03-LTS:python3-perf-6.6.0-113.0.0.105.oe2403.aarch64",
					"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-113.0.0.105.oe2403.aarch64",
					"openEuler-24.03-LTS:bpftool-6.6.0-113.0.0.105.oe2403.x86_64",
					"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-113.0.0.105.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-6.6.0-113.0.0.105.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-113.0.0.105.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-debugsource-6.6.0-113.0.0.105.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-devel-6.6.0-113.0.0.105.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-headers-6.6.0-113.0.0.105.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-source-6.6.0-113.0.0.105.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-tools-6.6.0-113.0.0.105.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-113.0.0.105.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-113.0.0.105.oe2403.x86_64",
					"openEuler-24.03-LTS:perf-6.6.0-113.0.0.105.oe2403.x86_64",
					"openEuler-24.03-LTS:perf-debuginfo-6.6.0-113.0.0.105.oe2403.x86_64",
					"openEuler-24.03-LTS:python3-perf-6.6.0-113.0.0.105.oe2403.x86_64",
					"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-113.0.0.105.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-6.6.0-113.0.0.105.oe2403.src"
				]
			},
			"remediations":[
				{
					"product_ids":[
						"openEuler-24.03-LTS:bpftool-6.6.0-113.0.0.105.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-113.0.0.105.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-6.6.0-113.0.0.105.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-113.0.0.105.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-113.0.0.105.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-113.0.0.105.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-113.0.0.105.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-113.0.0.105.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-113.0.0.105.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-113.0.0.105.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-113.0.0.105.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-6.6.0-113.0.0.105.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-113.0.0.105.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-113.0.0.105.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-113.0.0.105.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-6.6.0-113.0.0.105.oe2403.x86_64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-113.0.0.105.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-6.6.0-113.0.0.105.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-113.0.0.105.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-113.0.0.105.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-113.0.0.105.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-113.0.0.105.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-113.0.0.105.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-113.0.0.105.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-113.0.0.105.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-113.0.0.105.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-6.6.0-113.0.0.105.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-113.0.0.105.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-113.0.0.105.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-113.0.0.105.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-6.6.0-113.0.0.105.oe2403.src"
					],
					"details":"kernel security update",
					"category":"vendor_fix",
					"url":"https://www.openeuler.org/zh/security/security-bulletins/detail/?id=openEuler-SA-2025-2536"
				}
			],
			"scores":[
				{
					"cvss_v3":{
						"baseSeverity":"LOW",
						"baseScore":3.9,
						"vectorString":"CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:L/I:L/A:L",
						"version":"3.1"
					},
					"products":[
						"openEuler-24.03-LTS:bpftool-6.6.0-113.0.0.105.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-113.0.0.105.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-6.6.0-113.0.0.105.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-113.0.0.105.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-113.0.0.105.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-113.0.0.105.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-113.0.0.105.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-113.0.0.105.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-113.0.0.105.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-113.0.0.105.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-113.0.0.105.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-6.6.0-113.0.0.105.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-113.0.0.105.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-113.0.0.105.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-113.0.0.105.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-6.6.0-113.0.0.105.oe2403.x86_64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-113.0.0.105.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-6.6.0-113.0.0.105.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-113.0.0.105.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-113.0.0.105.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-113.0.0.105.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-113.0.0.105.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-113.0.0.105.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-113.0.0.105.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-113.0.0.105.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-113.0.0.105.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-6.6.0-113.0.0.105.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-113.0.0.105.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-113.0.0.105.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-113.0.0.105.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-6.6.0-113.0.0.105.oe2403.src"
					]
				}
			],
			"threats":[
				{
					"details":"Low",
					"category":"impact"
				}
			],
			"title":"CVE-2025-38313"
		},
		{
			"cve":"CVE-2025-38333",
			"notes":[
				{
					"text":"In the Linux kernel, the following vulnerability has been resolved:\n\nf2fs: fix to bail out in get_new_segment()\n\n------------[ cut here ]------------\nWARNING: CPU: 3 PID: 579 at fs/f2fs/segment.c:2832 new_curseg+0x5e8/0x6dc\npc : new_curseg+0x5e8/0x6dc\nCall trace:\n new_curseg+0x5e8/0x6dc\n f2fs_allocate_data_block+0xa54/0xe28\n do_write_page+0x6c/0x194\n f2fs_do_write_node_page+0x38/0x78\n __write_node_page+0x248/0x6d4\n f2fs_sync_node_pages+0x524/0x72c\n f2fs_write_checkpoint+0x4bc/0x9b0\n __checkpoint_and_complete_reqs+0x80/0x244\n issue_checkpoint_thread+0x8c/0xec\n kthread+0x114/0x1bc\n ret_from_fork+0x10/0x20\n\nget_new_segment() detects inconsistent status in between free_segmap\nand free_secmap, let's record such error into super block, and bail\nout get_new_segment() instead of continue using the segment.",
					"category":"description",
					"title":"Vulnerability Description"
				}
			],
			"product_status":{
				"fixed":[
					"openEuler-24.03-LTS:bpftool-6.6.0-113.0.0.105.oe2403.aarch64",
					"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-113.0.0.105.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-6.6.0-113.0.0.105.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-113.0.0.105.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-debugsource-6.6.0-113.0.0.105.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-devel-6.6.0-113.0.0.105.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-headers-6.6.0-113.0.0.105.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-source-6.6.0-113.0.0.105.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-tools-6.6.0-113.0.0.105.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-113.0.0.105.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-113.0.0.105.oe2403.aarch64",
					"openEuler-24.03-LTS:perf-6.6.0-113.0.0.105.oe2403.aarch64",
					"openEuler-24.03-LTS:perf-debuginfo-6.6.0-113.0.0.105.oe2403.aarch64",
					"openEuler-24.03-LTS:python3-perf-6.6.0-113.0.0.105.oe2403.aarch64",
					"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-113.0.0.105.oe2403.aarch64",
					"openEuler-24.03-LTS:bpftool-6.6.0-113.0.0.105.oe2403.x86_64",
					"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-113.0.0.105.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-6.6.0-113.0.0.105.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-113.0.0.105.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-debugsource-6.6.0-113.0.0.105.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-devel-6.6.0-113.0.0.105.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-headers-6.6.0-113.0.0.105.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-source-6.6.0-113.0.0.105.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-tools-6.6.0-113.0.0.105.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-113.0.0.105.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-113.0.0.105.oe2403.x86_64",
					"openEuler-24.03-LTS:perf-6.6.0-113.0.0.105.oe2403.x86_64",
					"openEuler-24.03-LTS:perf-debuginfo-6.6.0-113.0.0.105.oe2403.x86_64",
					"openEuler-24.03-LTS:python3-perf-6.6.0-113.0.0.105.oe2403.x86_64",
					"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-113.0.0.105.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-6.6.0-113.0.0.105.oe2403.src"
				]
			},
			"remediations":[
				{
					"product_ids":[
						"openEuler-24.03-LTS:bpftool-6.6.0-113.0.0.105.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-113.0.0.105.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-6.6.0-113.0.0.105.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-113.0.0.105.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-113.0.0.105.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-113.0.0.105.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-113.0.0.105.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-113.0.0.105.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-113.0.0.105.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-113.0.0.105.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-113.0.0.105.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-6.6.0-113.0.0.105.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-113.0.0.105.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-113.0.0.105.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-113.0.0.105.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-6.6.0-113.0.0.105.oe2403.x86_64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-113.0.0.105.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-6.6.0-113.0.0.105.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-113.0.0.105.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-113.0.0.105.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-113.0.0.105.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-113.0.0.105.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-113.0.0.105.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-113.0.0.105.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-113.0.0.105.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-113.0.0.105.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-6.6.0-113.0.0.105.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-113.0.0.105.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-113.0.0.105.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-113.0.0.105.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-6.6.0-113.0.0.105.oe2403.src"
					],
					"details":"kernel security update",
					"category":"vendor_fix",
					"url":"https://www.openeuler.org/zh/security/security-bulletins/detail/?id=openEuler-SA-2025-2536"
				}
			],
			"scores":[
				{
					"cvss_v3":{
						"baseSeverity":"LOW",
						"baseScore":3.0,
						"vectorString":"CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:L/A:L",
						"version":"3.1"
					},
					"products":[
						"openEuler-24.03-LTS:bpftool-6.6.0-113.0.0.105.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-113.0.0.105.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-6.6.0-113.0.0.105.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-113.0.0.105.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-113.0.0.105.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-113.0.0.105.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-113.0.0.105.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-113.0.0.105.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-113.0.0.105.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-113.0.0.105.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-113.0.0.105.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-6.6.0-113.0.0.105.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-113.0.0.105.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-113.0.0.105.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-113.0.0.105.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-6.6.0-113.0.0.105.oe2403.x86_64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-113.0.0.105.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-6.6.0-113.0.0.105.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-113.0.0.105.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-113.0.0.105.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-113.0.0.105.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-113.0.0.105.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-113.0.0.105.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-113.0.0.105.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-113.0.0.105.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-113.0.0.105.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-6.6.0-113.0.0.105.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-113.0.0.105.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-113.0.0.105.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-113.0.0.105.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-6.6.0-113.0.0.105.oe2403.src"
					]
				}
			],
			"threats":[
				{
					"details":"Low",
					"category":"impact"
				}
			],
			"title":"CVE-2025-38333"
		},
		{
			"cve":"CVE-2025-38414",
			"notes":[
				{
					"text":"In the Linux kernel, the following vulnerability has been resolved:\n\nwifi: ath12k: fix GCC_GCC_PCIE_HOT_RST definition for WCN7850\n\nGCC_GCC_PCIE_HOT_RST is wrongly defined for WCN7850, causing kernel crash\non some specific platforms.\n\nSince this register is divergent for WCN7850 and QCN9274, move it to\nregister table to allow different definitions. Then correct the register\naddress for WCN7850 to fix this issue.\n\nNote IPQ5332 is not affected as it is not PCIe based device.\n\nTested-on: WCN7850 hw2.0 PCI WLAN.HMT.1.0.c5-00481-QCAHMTSWPL_V1.0_V2.0_SILICONZ-3",
					"category":"description",
					"title":"Vulnerability Description"
				}
			],
			"product_status":{
				"fixed":[
					"openEuler-24.03-LTS:bpftool-6.6.0-113.0.0.105.oe2403.aarch64",
					"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-113.0.0.105.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-6.6.0-113.0.0.105.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-113.0.0.105.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-debugsource-6.6.0-113.0.0.105.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-devel-6.6.0-113.0.0.105.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-headers-6.6.0-113.0.0.105.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-source-6.6.0-113.0.0.105.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-tools-6.6.0-113.0.0.105.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-113.0.0.105.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-113.0.0.105.oe2403.aarch64",
					"openEuler-24.03-LTS:perf-6.6.0-113.0.0.105.oe2403.aarch64",
					"openEuler-24.03-LTS:perf-debuginfo-6.6.0-113.0.0.105.oe2403.aarch64",
					"openEuler-24.03-LTS:python3-perf-6.6.0-113.0.0.105.oe2403.aarch64",
					"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-113.0.0.105.oe2403.aarch64",
					"openEuler-24.03-LTS:bpftool-6.6.0-113.0.0.105.oe2403.x86_64",
					"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-113.0.0.105.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-6.6.0-113.0.0.105.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-113.0.0.105.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-debugsource-6.6.0-113.0.0.105.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-devel-6.6.0-113.0.0.105.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-headers-6.6.0-113.0.0.105.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-source-6.6.0-113.0.0.105.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-tools-6.6.0-113.0.0.105.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-113.0.0.105.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-113.0.0.105.oe2403.x86_64",
					"openEuler-24.03-LTS:perf-6.6.0-113.0.0.105.oe2403.x86_64",
					"openEuler-24.03-LTS:perf-debuginfo-6.6.0-113.0.0.105.oe2403.x86_64",
					"openEuler-24.03-LTS:python3-perf-6.6.0-113.0.0.105.oe2403.x86_64",
					"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-113.0.0.105.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-6.6.0-113.0.0.105.oe2403.src"
				]
			},
			"remediations":[
				{
					"product_ids":[
						"openEuler-24.03-LTS:bpftool-6.6.0-113.0.0.105.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-113.0.0.105.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-6.6.0-113.0.0.105.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-113.0.0.105.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-113.0.0.105.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-113.0.0.105.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-113.0.0.105.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-113.0.0.105.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-113.0.0.105.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-113.0.0.105.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-113.0.0.105.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-6.6.0-113.0.0.105.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-113.0.0.105.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-113.0.0.105.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-113.0.0.105.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-6.6.0-113.0.0.105.oe2403.x86_64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-113.0.0.105.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-6.6.0-113.0.0.105.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-113.0.0.105.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-113.0.0.105.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-113.0.0.105.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-113.0.0.105.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-113.0.0.105.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-113.0.0.105.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-113.0.0.105.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-113.0.0.105.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-6.6.0-113.0.0.105.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-113.0.0.105.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-113.0.0.105.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-113.0.0.105.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-6.6.0-113.0.0.105.oe2403.src"
					],
					"details":"kernel security update",
					"category":"vendor_fix",
					"url":"https://www.openeuler.org/zh/security/security-bulletins/detail/?id=openEuler-SA-2025-2536"
				}
			],
			"scores":[
				{
					"cvss_v3":{
						"baseSeverity":"MEDIUM",
						"baseScore":4.9,
						"vectorString":"CVSS:3.1/AV:P/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:H",
						"version":"3.1"
					},
					"products":[
						"openEuler-24.03-LTS:bpftool-6.6.0-113.0.0.105.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-113.0.0.105.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-6.6.0-113.0.0.105.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-113.0.0.105.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-113.0.0.105.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-113.0.0.105.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-113.0.0.105.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-113.0.0.105.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-113.0.0.105.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-113.0.0.105.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-113.0.0.105.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-6.6.0-113.0.0.105.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-113.0.0.105.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-113.0.0.105.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-113.0.0.105.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-6.6.0-113.0.0.105.oe2403.x86_64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-113.0.0.105.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-6.6.0-113.0.0.105.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-113.0.0.105.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-113.0.0.105.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-113.0.0.105.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-113.0.0.105.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-113.0.0.105.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-113.0.0.105.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-113.0.0.105.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-113.0.0.105.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-6.6.0-113.0.0.105.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-113.0.0.105.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-113.0.0.105.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-113.0.0.105.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-6.6.0-113.0.0.105.oe2403.src"
					]
				}
			],
			"threats":[
				{
					"details":"Medium",
					"category":"impact"
				}
			],
			"title":"CVE-2025-38414"
		},
		{
			"cve":"CVE-2025-38615",
			"notes":[
				{
					"text":"In the Linux kernel, the following vulnerability has been resolved:\n\nfs/ntfs3: cancle set bad inode after removing name fails\n\nThe reproducer uses a file0 on a ntfs3 file system with a corrupted i_link.\nWhen renaming, the file0's inode is marked as a bad inode because the file\nname cannot be deleted.\n\nThe underlying bug is that make_bad_inode() is called on a live inode.\nIn some cases it's \"icache lookup finds a normal inode, d_splice_alias()\nis called to attach it to dentry, while another thread decides to call\nmake_bad_inode() on it - that would evict it from icache, but we'd already\nfound it there earlier\".\nIn some it's outright \"we have an inode attached to dentry - that's how we\ngot it in the first place; let's call make_bad_inode() on it just for shits\nand giggles\".",
					"category":"description",
					"title":"Vulnerability Description"
				}
			],
			"product_status":{
				"fixed":[
					"openEuler-24.03-LTS:bpftool-6.6.0-113.0.0.105.oe2403.aarch64",
					"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-113.0.0.105.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-6.6.0-113.0.0.105.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-113.0.0.105.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-debugsource-6.6.0-113.0.0.105.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-devel-6.6.0-113.0.0.105.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-headers-6.6.0-113.0.0.105.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-source-6.6.0-113.0.0.105.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-tools-6.6.0-113.0.0.105.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-113.0.0.105.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-113.0.0.105.oe2403.aarch64",
					"openEuler-24.03-LTS:perf-6.6.0-113.0.0.105.oe2403.aarch64",
					"openEuler-24.03-LTS:perf-debuginfo-6.6.0-113.0.0.105.oe2403.aarch64",
					"openEuler-24.03-LTS:python3-perf-6.6.0-113.0.0.105.oe2403.aarch64",
					"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-113.0.0.105.oe2403.aarch64",
					"openEuler-24.03-LTS:bpftool-6.6.0-113.0.0.105.oe2403.x86_64",
					"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-113.0.0.105.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-6.6.0-113.0.0.105.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-113.0.0.105.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-debugsource-6.6.0-113.0.0.105.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-devel-6.6.0-113.0.0.105.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-headers-6.6.0-113.0.0.105.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-source-6.6.0-113.0.0.105.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-tools-6.6.0-113.0.0.105.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-113.0.0.105.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-113.0.0.105.oe2403.x86_64",
					"openEuler-24.03-LTS:perf-6.6.0-113.0.0.105.oe2403.x86_64",
					"openEuler-24.03-LTS:perf-debuginfo-6.6.0-113.0.0.105.oe2403.x86_64",
					"openEuler-24.03-LTS:python3-perf-6.6.0-113.0.0.105.oe2403.x86_64",
					"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-113.0.0.105.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-6.6.0-113.0.0.105.oe2403.src"
				]
			},
			"remediations":[
				{
					"product_ids":[
						"openEuler-24.03-LTS:bpftool-6.6.0-113.0.0.105.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-113.0.0.105.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-6.6.0-113.0.0.105.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-113.0.0.105.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-113.0.0.105.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-113.0.0.105.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-113.0.0.105.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-113.0.0.105.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-113.0.0.105.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-113.0.0.105.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-113.0.0.105.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-6.6.0-113.0.0.105.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-113.0.0.105.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-113.0.0.105.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-113.0.0.105.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-6.6.0-113.0.0.105.oe2403.x86_64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-113.0.0.105.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-6.6.0-113.0.0.105.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-113.0.0.105.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-113.0.0.105.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-113.0.0.105.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-113.0.0.105.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-113.0.0.105.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-113.0.0.105.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-113.0.0.105.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-113.0.0.105.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-6.6.0-113.0.0.105.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-113.0.0.105.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-113.0.0.105.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-113.0.0.105.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-6.6.0-113.0.0.105.oe2403.src"
					],
					"details":"kernel security update",
					"category":"vendor_fix",
					"url":"https://www.openeuler.org/zh/security/security-bulletins/detail/?id=openEuler-SA-2025-2536"
				}
			],
			"scores":[
				{
					"cvss_v3":{
						"baseSeverity":"MEDIUM",
						"baseScore":5.5,
						"vectorString":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
						"version":"3.1"
					},
					"products":[
						"openEuler-24.03-LTS:bpftool-6.6.0-113.0.0.105.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-113.0.0.105.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-6.6.0-113.0.0.105.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-113.0.0.105.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-113.0.0.105.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-113.0.0.105.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-113.0.0.105.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-113.0.0.105.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-113.0.0.105.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-113.0.0.105.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-113.0.0.105.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-6.6.0-113.0.0.105.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-113.0.0.105.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-113.0.0.105.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-113.0.0.105.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-6.6.0-113.0.0.105.oe2403.x86_64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-113.0.0.105.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-6.6.0-113.0.0.105.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-113.0.0.105.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-113.0.0.105.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-113.0.0.105.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-113.0.0.105.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-113.0.0.105.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-113.0.0.105.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-113.0.0.105.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-113.0.0.105.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-6.6.0-113.0.0.105.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-113.0.0.105.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-113.0.0.105.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-113.0.0.105.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-6.6.0-113.0.0.105.oe2403.src"
					]
				}
			],
			"threats":[
				{
					"details":"Medium",
					"category":"impact"
				}
			],
			"title":"CVE-2025-38615"
		},
		{
			"cve":"CVE-2025-38700",
			"notes":[
				{
					"text":"In the Linux kernel, the following vulnerability has been resolved:\n\nscsi: libiscsi: Initialize iscsi_conn->dd_data only if memory is allocated\n\nIn case of an ib_fast_reg_mr allocation failure during iSER setup, the\nmachine hits a panic because iscsi_conn->dd_data is initialized\nunconditionally, even when no memory is allocated (dd_size == 0).  This\nleads invalid pointer dereference during connection teardown.\n\nFix by setting iscsi_conn->dd_data only if memory is actually allocated.\n\nPanic trace:\n------------\n iser: iser_create_fastreg_desc: Failed to allocate ib_fast_reg_mr err=-12\n iser: iser_alloc_rx_descriptors: failed allocating rx descriptors / data buffers\n BUG: unable to handle page fault for address: fffffffffffffff8\n RIP: 0010:swake_up_locked.part.5+0xa/0x40\n Call Trace:\n  complete+0x31/0x40\n  iscsi_iser_conn_stop+0x88/0xb0 [ib_iser]\n  iscsi_stop_conn+0x66/0xc0 [scsi_transport_iscsi]\n  iscsi_if_stop_conn+0x14a/0x150 [scsi_transport_iscsi]\n  iscsi_if_rx+0x1135/0x1834 [scsi_transport_iscsi]\n  ? netlink_lookup+0x12f/0x1b0\n  ? netlink_deliver_tap+0x2c/0x200\n  netlink_unicast+0x1ab/0x280\n  netlink_sendmsg+0x257/0x4f0\n  ? _copy_from_user+0x29/0x60\n  sock_sendmsg+0x5f/0x70",
					"category":"description",
					"title":"Vulnerability Description"
				}
			],
			"product_status":{
				"fixed":[
					"openEuler-24.03-LTS:bpftool-6.6.0-113.0.0.105.oe2403.aarch64",
					"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-113.0.0.105.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-6.6.0-113.0.0.105.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-113.0.0.105.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-debugsource-6.6.0-113.0.0.105.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-devel-6.6.0-113.0.0.105.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-headers-6.6.0-113.0.0.105.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-source-6.6.0-113.0.0.105.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-tools-6.6.0-113.0.0.105.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-113.0.0.105.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-113.0.0.105.oe2403.aarch64",
					"openEuler-24.03-LTS:perf-6.6.0-113.0.0.105.oe2403.aarch64",
					"openEuler-24.03-LTS:perf-debuginfo-6.6.0-113.0.0.105.oe2403.aarch64",
					"openEuler-24.03-LTS:python3-perf-6.6.0-113.0.0.105.oe2403.aarch64",
					"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-113.0.0.105.oe2403.aarch64",
					"openEuler-24.03-LTS:bpftool-6.6.0-113.0.0.105.oe2403.x86_64",
					"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-113.0.0.105.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-6.6.0-113.0.0.105.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-113.0.0.105.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-debugsource-6.6.0-113.0.0.105.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-devel-6.6.0-113.0.0.105.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-headers-6.6.0-113.0.0.105.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-source-6.6.0-113.0.0.105.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-tools-6.6.0-113.0.0.105.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-113.0.0.105.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-113.0.0.105.oe2403.x86_64",
					"openEuler-24.03-LTS:perf-6.6.0-113.0.0.105.oe2403.x86_64",
					"openEuler-24.03-LTS:perf-debuginfo-6.6.0-113.0.0.105.oe2403.x86_64",
					"openEuler-24.03-LTS:python3-perf-6.6.0-113.0.0.105.oe2403.x86_64",
					"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-113.0.0.105.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-6.6.0-113.0.0.105.oe2403.src"
				]
			},
			"remediations":[
				{
					"product_ids":[
						"openEuler-24.03-LTS:bpftool-6.6.0-113.0.0.105.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-113.0.0.105.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-6.6.0-113.0.0.105.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-113.0.0.105.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-113.0.0.105.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-113.0.0.105.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-113.0.0.105.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-113.0.0.105.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-113.0.0.105.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-113.0.0.105.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-113.0.0.105.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-6.6.0-113.0.0.105.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-113.0.0.105.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-113.0.0.105.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-113.0.0.105.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-6.6.0-113.0.0.105.oe2403.x86_64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-113.0.0.105.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-6.6.0-113.0.0.105.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-113.0.0.105.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-113.0.0.105.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-113.0.0.105.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-113.0.0.105.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-113.0.0.105.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-113.0.0.105.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-113.0.0.105.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-113.0.0.105.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-6.6.0-113.0.0.105.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-113.0.0.105.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-113.0.0.105.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-113.0.0.105.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-6.6.0-113.0.0.105.oe2403.src"
					],
					"details":"kernel security update",
					"category":"vendor_fix",
					"url":"https://www.openeuler.org/zh/security/security-bulletins/detail/?id=openEuler-SA-2025-2536"
				}
			],
			"scores":[
				{
					"cvss_v3":{
						"baseSeverity":"MEDIUM",
						"baseScore":5.3,
						"vectorString":"CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:H",
						"version":"3.1"
					},
					"products":[
						"openEuler-24.03-LTS:bpftool-6.6.0-113.0.0.105.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-113.0.0.105.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-6.6.0-113.0.0.105.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-113.0.0.105.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-113.0.0.105.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-113.0.0.105.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-113.0.0.105.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-113.0.0.105.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-113.0.0.105.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-113.0.0.105.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-113.0.0.105.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-6.6.0-113.0.0.105.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-113.0.0.105.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-113.0.0.105.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-113.0.0.105.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-6.6.0-113.0.0.105.oe2403.x86_64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-113.0.0.105.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-6.6.0-113.0.0.105.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-113.0.0.105.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-113.0.0.105.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-113.0.0.105.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-113.0.0.105.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-113.0.0.105.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-113.0.0.105.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-113.0.0.105.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-113.0.0.105.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-6.6.0-113.0.0.105.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-113.0.0.105.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-113.0.0.105.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-113.0.0.105.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-6.6.0-113.0.0.105.oe2403.src"
					]
				}
			],
			"threats":[
				{
					"details":"Medium",
					"category":"impact"
				}
			],
			"title":"CVE-2025-38700"
		},
		{
			"cve":"CVE-2025-38701",
			"notes":[
				{
					"text":"In the Linux kernel, the following vulnerability has been resolved:\n\next4: do not BUG when INLINE_DATA_FL lacks system.data xattr\n\nA syzbot fuzzed image triggered a BUG_ON in ext4_update_inline_data()\nwhen an inode had the INLINE_DATA_FL flag set but was missing the\nsystem.data extended attribute.\n\nSince this can happen due to a maiciouly fuzzed file system, we\nshouldn't BUG, but rather, report it as a corrupted file system.\n\nAdd similar replacements of BUG_ON with EXT4_ERROR_INODE() ii\next4_create_inline_data() and ext4_inline_data_truncate().",
					"category":"description",
					"title":"Vulnerability Description"
				}
			],
			"product_status":{
				"fixed":[
					"openEuler-24.03-LTS:bpftool-6.6.0-113.0.0.105.oe2403.aarch64",
					"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-113.0.0.105.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-6.6.0-113.0.0.105.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-113.0.0.105.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-debugsource-6.6.0-113.0.0.105.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-devel-6.6.0-113.0.0.105.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-headers-6.6.0-113.0.0.105.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-source-6.6.0-113.0.0.105.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-tools-6.6.0-113.0.0.105.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-113.0.0.105.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-113.0.0.105.oe2403.aarch64",
					"openEuler-24.03-LTS:perf-6.6.0-113.0.0.105.oe2403.aarch64",
					"openEuler-24.03-LTS:perf-debuginfo-6.6.0-113.0.0.105.oe2403.aarch64",
					"openEuler-24.03-LTS:python3-perf-6.6.0-113.0.0.105.oe2403.aarch64",
					"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-113.0.0.105.oe2403.aarch64",
					"openEuler-24.03-LTS:bpftool-6.6.0-113.0.0.105.oe2403.x86_64",
					"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-113.0.0.105.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-6.6.0-113.0.0.105.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-113.0.0.105.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-debugsource-6.6.0-113.0.0.105.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-devel-6.6.0-113.0.0.105.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-headers-6.6.0-113.0.0.105.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-source-6.6.0-113.0.0.105.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-tools-6.6.0-113.0.0.105.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-113.0.0.105.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-113.0.0.105.oe2403.x86_64",
					"openEuler-24.03-LTS:perf-6.6.0-113.0.0.105.oe2403.x86_64",
					"openEuler-24.03-LTS:perf-debuginfo-6.6.0-113.0.0.105.oe2403.x86_64",
					"openEuler-24.03-LTS:python3-perf-6.6.0-113.0.0.105.oe2403.x86_64",
					"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-113.0.0.105.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-6.6.0-113.0.0.105.oe2403.src"
				]
			},
			"remediations":[
				{
					"product_ids":[
						"openEuler-24.03-LTS:bpftool-6.6.0-113.0.0.105.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-113.0.0.105.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-6.6.0-113.0.0.105.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-113.0.0.105.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-113.0.0.105.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-113.0.0.105.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-113.0.0.105.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-113.0.0.105.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-113.0.0.105.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-113.0.0.105.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-113.0.0.105.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-6.6.0-113.0.0.105.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-113.0.0.105.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-113.0.0.105.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-113.0.0.105.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-6.6.0-113.0.0.105.oe2403.x86_64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-113.0.0.105.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-6.6.0-113.0.0.105.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-113.0.0.105.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-113.0.0.105.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-113.0.0.105.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-113.0.0.105.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-113.0.0.105.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-113.0.0.105.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-113.0.0.105.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-113.0.0.105.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-6.6.0-113.0.0.105.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-113.0.0.105.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-113.0.0.105.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-113.0.0.105.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-6.6.0-113.0.0.105.oe2403.src"
					],
					"details":"kernel security update",
					"category":"vendor_fix",
					"url":"https://www.openeuler.org/zh/security/security-bulletins/detail/?id=openEuler-SA-2025-2536"
				}
			],
			"scores":[
				{
					"cvss_v3":{
						"baseSeverity":"MEDIUM",
						"baseScore":5.5,
						"vectorString":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
						"version":"3.1"
					},
					"products":[
						"openEuler-24.03-LTS:bpftool-6.6.0-113.0.0.105.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-113.0.0.105.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-6.6.0-113.0.0.105.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-113.0.0.105.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-113.0.0.105.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-113.0.0.105.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-113.0.0.105.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-113.0.0.105.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-113.0.0.105.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-113.0.0.105.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-113.0.0.105.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-6.6.0-113.0.0.105.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-113.0.0.105.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-113.0.0.105.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-113.0.0.105.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-6.6.0-113.0.0.105.oe2403.x86_64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-113.0.0.105.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-6.6.0-113.0.0.105.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-113.0.0.105.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-113.0.0.105.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-113.0.0.105.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-113.0.0.105.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-113.0.0.105.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-113.0.0.105.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-113.0.0.105.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-113.0.0.105.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-6.6.0-113.0.0.105.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-113.0.0.105.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-113.0.0.105.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-113.0.0.105.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-6.6.0-113.0.0.105.oe2403.src"
					]
				}
			],
			"threats":[
				{
					"details":"Medium",
					"category":"impact"
				}
			],
			"title":"CVE-2025-38701"
		},
		{
			"cve":"CVE-2025-38709",
			"notes":[
				{
					"text":"In the Linux kernel, the following vulnerability has been resolved:\n\nloop: Avoid updating block size under exclusive owner\n\nSyzbot came up with a reproducer where a loop device block size is\nchanged underneath a mounted filesystem. This causes a mismatch between\nthe block device block size and the block size stored in the superblock\ncausing confusion in various places such as fs/buffer.c. The particular\nissue triggered by syzbot was a warning in __getblk_slow() due to\nrequested buffer size not matching block device block size.\n\nFix the problem by getting exclusive hold of the loop device to change\nits block size. This fails if somebody (such as filesystem) has already\nan exclusive ownership of the block device and thus prevents modifying\nthe loop device under some exclusive owner which doesn't expect it.",
					"category":"description",
					"title":"Vulnerability Description"
				}
			],
			"product_status":{
				"fixed":[
					"openEuler-24.03-LTS:bpftool-6.6.0-113.0.0.105.oe2403.aarch64",
					"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-113.0.0.105.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-6.6.0-113.0.0.105.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-113.0.0.105.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-debugsource-6.6.0-113.0.0.105.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-devel-6.6.0-113.0.0.105.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-headers-6.6.0-113.0.0.105.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-source-6.6.0-113.0.0.105.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-tools-6.6.0-113.0.0.105.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-113.0.0.105.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-113.0.0.105.oe2403.aarch64",
					"openEuler-24.03-LTS:perf-6.6.0-113.0.0.105.oe2403.aarch64",
					"openEuler-24.03-LTS:perf-debuginfo-6.6.0-113.0.0.105.oe2403.aarch64",
					"openEuler-24.03-LTS:python3-perf-6.6.0-113.0.0.105.oe2403.aarch64",
					"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-113.0.0.105.oe2403.aarch64",
					"openEuler-24.03-LTS:bpftool-6.6.0-113.0.0.105.oe2403.x86_64",
					"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-113.0.0.105.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-6.6.0-113.0.0.105.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-113.0.0.105.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-debugsource-6.6.0-113.0.0.105.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-devel-6.6.0-113.0.0.105.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-headers-6.6.0-113.0.0.105.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-source-6.6.0-113.0.0.105.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-tools-6.6.0-113.0.0.105.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-113.0.0.105.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-113.0.0.105.oe2403.x86_64",
					"openEuler-24.03-LTS:perf-6.6.0-113.0.0.105.oe2403.x86_64",
					"openEuler-24.03-LTS:perf-debuginfo-6.6.0-113.0.0.105.oe2403.x86_64",
					"openEuler-24.03-LTS:python3-perf-6.6.0-113.0.0.105.oe2403.x86_64",
					"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-113.0.0.105.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-6.6.0-113.0.0.105.oe2403.src"
				]
			},
			"remediations":[
				{
					"product_ids":[
						"openEuler-24.03-LTS:bpftool-6.6.0-113.0.0.105.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-113.0.0.105.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-6.6.0-113.0.0.105.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-113.0.0.105.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-113.0.0.105.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-113.0.0.105.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-113.0.0.105.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-113.0.0.105.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-113.0.0.105.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-113.0.0.105.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-113.0.0.105.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-6.6.0-113.0.0.105.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-113.0.0.105.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-113.0.0.105.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-113.0.0.105.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-6.6.0-113.0.0.105.oe2403.x86_64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-113.0.0.105.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-6.6.0-113.0.0.105.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-113.0.0.105.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-113.0.0.105.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-113.0.0.105.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-113.0.0.105.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-113.0.0.105.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-113.0.0.105.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-113.0.0.105.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-113.0.0.105.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-6.6.0-113.0.0.105.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-113.0.0.105.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-113.0.0.105.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-113.0.0.105.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-6.6.0-113.0.0.105.oe2403.src"
					],
					"details":"kernel security update",
					"category":"vendor_fix",
					"url":"https://www.openeuler.org/zh/security/security-bulletins/detail/?id=openEuler-SA-2025-2536"
				}
			],
			"scores":[
				{
					"cvss_v3":{
						"baseSeverity":"MEDIUM",
						"baseScore":6.4,
						"vectorString":"CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H",
						"version":"3.1"
					},
					"products":[
						"openEuler-24.03-LTS:bpftool-6.6.0-113.0.0.105.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-113.0.0.105.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-6.6.0-113.0.0.105.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-113.0.0.105.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-113.0.0.105.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-113.0.0.105.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-113.0.0.105.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-113.0.0.105.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-113.0.0.105.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-113.0.0.105.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-113.0.0.105.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-6.6.0-113.0.0.105.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-113.0.0.105.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-113.0.0.105.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-113.0.0.105.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-6.6.0-113.0.0.105.oe2403.x86_64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-113.0.0.105.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-6.6.0-113.0.0.105.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-113.0.0.105.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-113.0.0.105.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-113.0.0.105.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-113.0.0.105.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-113.0.0.105.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-113.0.0.105.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-113.0.0.105.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-113.0.0.105.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-6.6.0-113.0.0.105.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-113.0.0.105.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-113.0.0.105.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-113.0.0.105.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-6.6.0-113.0.0.105.oe2403.src"
					]
				}
			],
			"threats":[
				{
					"details":"Medium",
					"category":"impact"
				}
			],
			"title":"CVE-2025-38709"
		},
		{
			"cve":"CVE-2025-39691",
			"notes":[
				{
					"text":"In the Linux kernel, the following vulnerability has been resolved:\n\nfs/buffer: fix use-after-free when call bh_read() helper\n\nThere's issue as follows:\nBUG: KASAN: stack-out-of-bounds in end_buffer_read_sync+0xe3/0x110\nRead of size 8 at addr ffffc9000168f7f8 by task swapper/3/0\nCPU: 3 UID: 0 PID: 0 Comm: swapper/3 Not tainted 6.16.0-862.14.0.6.x86_64\nHardware name: QEMU Standard PC (i440FX + PIIX, 1996)\nCall Trace:\n <IRQ>\n dump_stack_lvl+0x55/0x70\n print_address_description.constprop.0+0x2c/0x390\n print_report+0xb4/0x270\n kasan_report+0xb8/0xf0\n end_buffer_read_sync+0xe3/0x110\n end_bio_bh_io_sync+0x56/0x80\n blk_update_request+0x30a/0x720\n scsi_end_request+0x51/0x2b0\n scsi_io_completion+0xe3/0x480\n ? scsi_device_unbusy+0x11e/0x160\n blk_complete_reqs+0x7b/0x90\n handle_softirqs+0xef/0x370\n irq_exit_rcu+0xa5/0xd0\n sysvec_apic_timer_interrupt+0x6e/0x90\n </IRQ>\n\n Above issue happens when do ntfs3 filesystem mount, issue may happens\n as follows:\n           mount                            IRQ\nntfs_fill_super\n  read_cache_page\n    do_read_cache_folio\n      filemap_read_folio\n        mpage_read_folio\n\t do_mpage_readpage\n\t  ntfs_get_block_vbo\n\t   bh_read\n\t     submit_bh\n\t     wait_on_buffer(bh);\n\t                            blk_complete_reqs\n\t\t\t\t     scsi_io_completion\n\t\t\t\t      scsi_end_request\n\t\t\t\t       blk_update_request\n\t\t\t\t        end_bio_bh_io_sync\n\t\t\t\t\t end_buffer_read_sync\n\t\t\t\t\t  __end_buffer_read_notouch\n\t\t\t\t\t   unlock_buffer\n\n            wait_on_buffer(bh);--> return will return to caller\n\n\t\t\t\t\t  put_bh\n\t\t\t\t\t    --> trigger stack-out-of-bounds\nIn the mpage_read_folio() function, the stack variable 'map_bh' is\npassed to ntfs_get_block_vbo(). Once unlock_buffer() unlocks and\nwait_on_buffer() returns to continue processing, the stack variable\nis likely to be reclaimed. Consequently, during the end_buffer_read_sync()\nprocess, calling put_bh() may result in stack overrun.\n\nIf the bh is not allocated on the stack, it belongs to a folio.  Freeing\na buffer head which belongs to a folio is done by drop_buffers() which\nwill fail to free buffers which are still locked.  So it is safe to call\nput_bh() before __end_buffer_read_notouch().",
					"category":"description",
					"title":"Vulnerability Description"
				}
			],
			"product_status":{
				"fixed":[
					"openEuler-24.03-LTS:bpftool-6.6.0-113.0.0.105.oe2403.aarch64",
					"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-113.0.0.105.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-6.6.0-113.0.0.105.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-113.0.0.105.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-debugsource-6.6.0-113.0.0.105.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-devel-6.6.0-113.0.0.105.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-headers-6.6.0-113.0.0.105.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-source-6.6.0-113.0.0.105.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-tools-6.6.0-113.0.0.105.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-113.0.0.105.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-113.0.0.105.oe2403.aarch64",
					"openEuler-24.03-LTS:perf-6.6.0-113.0.0.105.oe2403.aarch64",
					"openEuler-24.03-LTS:perf-debuginfo-6.6.0-113.0.0.105.oe2403.aarch64",
					"openEuler-24.03-LTS:python3-perf-6.6.0-113.0.0.105.oe2403.aarch64",
					"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-113.0.0.105.oe2403.aarch64",
					"openEuler-24.03-LTS:bpftool-6.6.0-113.0.0.105.oe2403.x86_64",
					"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-113.0.0.105.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-6.6.0-113.0.0.105.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-113.0.0.105.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-debugsource-6.6.0-113.0.0.105.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-devel-6.6.0-113.0.0.105.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-headers-6.6.0-113.0.0.105.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-source-6.6.0-113.0.0.105.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-tools-6.6.0-113.0.0.105.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-113.0.0.105.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-113.0.0.105.oe2403.x86_64",
					"openEuler-24.03-LTS:perf-6.6.0-113.0.0.105.oe2403.x86_64",
					"openEuler-24.03-LTS:perf-debuginfo-6.6.0-113.0.0.105.oe2403.x86_64",
					"openEuler-24.03-LTS:python3-perf-6.6.0-113.0.0.105.oe2403.x86_64",
					"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-113.0.0.105.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-6.6.0-113.0.0.105.oe2403.src"
				]
			},
			"remediations":[
				{
					"product_ids":[
						"openEuler-24.03-LTS:bpftool-6.6.0-113.0.0.105.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-113.0.0.105.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-6.6.0-113.0.0.105.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-113.0.0.105.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-113.0.0.105.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-113.0.0.105.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-113.0.0.105.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-113.0.0.105.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-113.0.0.105.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-113.0.0.105.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-113.0.0.105.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-6.6.0-113.0.0.105.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-113.0.0.105.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-113.0.0.105.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-113.0.0.105.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-6.6.0-113.0.0.105.oe2403.x86_64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-113.0.0.105.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-6.6.0-113.0.0.105.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-113.0.0.105.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-113.0.0.105.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-113.0.0.105.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-113.0.0.105.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-113.0.0.105.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-113.0.0.105.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-113.0.0.105.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-113.0.0.105.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-6.6.0-113.0.0.105.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-113.0.0.105.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-113.0.0.105.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-113.0.0.105.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-6.6.0-113.0.0.105.oe2403.src"
					],
					"details":"kernel security update",
					"category":"vendor_fix",
					"url":"https://www.openeuler.org/zh/security/security-bulletins/detail/?id=openEuler-SA-2025-2536"
				}
			],
			"scores":[
				{
					"cvss_v3":{
						"baseSeverity":"MEDIUM",
						"baseScore":4.4,
						"vectorString":"CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
						"version":"3.1"
					},
					"products":[
						"openEuler-24.03-LTS:bpftool-6.6.0-113.0.0.105.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-113.0.0.105.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-6.6.0-113.0.0.105.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-113.0.0.105.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-113.0.0.105.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-113.0.0.105.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-113.0.0.105.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-113.0.0.105.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-113.0.0.105.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-113.0.0.105.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-113.0.0.105.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-6.6.0-113.0.0.105.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-113.0.0.105.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-113.0.0.105.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-113.0.0.105.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-6.6.0-113.0.0.105.oe2403.x86_64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-113.0.0.105.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-6.6.0-113.0.0.105.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-113.0.0.105.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-113.0.0.105.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-113.0.0.105.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-113.0.0.105.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-113.0.0.105.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-113.0.0.105.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-113.0.0.105.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-113.0.0.105.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-6.6.0-113.0.0.105.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-113.0.0.105.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-113.0.0.105.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-113.0.0.105.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-6.6.0-113.0.0.105.oe2403.src"
					]
				}
			],
			"threats":[
				{
					"details":"Medium",
					"category":"impact"
				}
			],
			"title":"CVE-2025-39691"
		},
		{
			"cve":"CVE-2025-39787",
			"notes":[
				{
					"text":"In the Linux kernel, the following vulnerability has been resolved:\n\nsoc: qcom: mdt_loader: Ensure we don't read past the ELF header\n\nWhen the MDT loader is used in remoteproc, the ELF header is sanitized\nbeforehand, but that's not necessary the case for other clients.\n\nValidate the size of the firmware buffer to ensure that we don't read\npast the end as we iterate over the header. e_phentsize and e_shentsize\nare validated as well, to ensure that the assumptions about step size in\nthe traversal are valid.",
					"category":"description",
					"title":"Vulnerability Description"
				}
			],
			"product_status":{
				"fixed":[
					"openEuler-24.03-LTS:bpftool-6.6.0-113.0.0.105.oe2403.aarch64",
					"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-113.0.0.105.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-6.6.0-113.0.0.105.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-113.0.0.105.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-debugsource-6.6.0-113.0.0.105.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-devel-6.6.0-113.0.0.105.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-headers-6.6.0-113.0.0.105.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-source-6.6.0-113.0.0.105.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-tools-6.6.0-113.0.0.105.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-113.0.0.105.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-113.0.0.105.oe2403.aarch64",
					"openEuler-24.03-LTS:perf-6.6.0-113.0.0.105.oe2403.aarch64",
					"openEuler-24.03-LTS:perf-debuginfo-6.6.0-113.0.0.105.oe2403.aarch64",
					"openEuler-24.03-LTS:python3-perf-6.6.0-113.0.0.105.oe2403.aarch64",
					"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-113.0.0.105.oe2403.aarch64",
					"openEuler-24.03-LTS:bpftool-6.6.0-113.0.0.105.oe2403.x86_64",
					"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-113.0.0.105.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-6.6.0-113.0.0.105.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-113.0.0.105.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-debugsource-6.6.0-113.0.0.105.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-devel-6.6.0-113.0.0.105.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-headers-6.6.0-113.0.0.105.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-source-6.6.0-113.0.0.105.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-tools-6.6.0-113.0.0.105.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-113.0.0.105.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-113.0.0.105.oe2403.x86_64",
					"openEuler-24.03-LTS:perf-6.6.0-113.0.0.105.oe2403.x86_64",
					"openEuler-24.03-LTS:perf-debuginfo-6.6.0-113.0.0.105.oe2403.x86_64",
					"openEuler-24.03-LTS:python3-perf-6.6.0-113.0.0.105.oe2403.x86_64",
					"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-113.0.0.105.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-6.6.0-113.0.0.105.oe2403.src"
				]
			},
			"remediations":[
				{
					"product_ids":[
						"openEuler-24.03-LTS:bpftool-6.6.0-113.0.0.105.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-113.0.0.105.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-6.6.0-113.0.0.105.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-113.0.0.105.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-113.0.0.105.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-113.0.0.105.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-113.0.0.105.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-113.0.0.105.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-113.0.0.105.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-113.0.0.105.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-113.0.0.105.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-6.6.0-113.0.0.105.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-113.0.0.105.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-113.0.0.105.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-113.0.0.105.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-6.6.0-113.0.0.105.oe2403.x86_64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-113.0.0.105.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-6.6.0-113.0.0.105.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-113.0.0.105.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-113.0.0.105.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-113.0.0.105.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-113.0.0.105.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-113.0.0.105.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-113.0.0.105.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-113.0.0.105.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-113.0.0.105.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-6.6.0-113.0.0.105.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-113.0.0.105.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-113.0.0.105.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-113.0.0.105.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-6.6.0-113.0.0.105.oe2403.src"
					],
					"details":"kernel security update",
					"category":"vendor_fix",
					"url":"https://www.openeuler.org/zh/security/security-bulletins/detail/?id=openEuler-SA-2025-2536"
				}
			],
			"scores":[
				{
					"cvss_v3":{
						"baseSeverity":"MEDIUM",
						"baseScore":5.5,
						"vectorString":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
						"version":"3.1"
					},
					"products":[
						"openEuler-24.03-LTS:bpftool-6.6.0-113.0.0.105.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-113.0.0.105.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-6.6.0-113.0.0.105.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-113.0.0.105.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-113.0.0.105.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-113.0.0.105.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-113.0.0.105.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-113.0.0.105.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-113.0.0.105.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-113.0.0.105.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-113.0.0.105.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-6.6.0-113.0.0.105.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-113.0.0.105.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-113.0.0.105.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-113.0.0.105.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-6.6.0-113.0.0.105.oe2403.x86_64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-113.0.0.105.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-6.6.0-113.0.0.105.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-113.0.0.105.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-113.0.0.105.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-113.0.0.105.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-113.0.0.105.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-113.0.0.105.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-113.0.0.105.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-113.0.0.105.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-113.0.0.105.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-6.6.0-113.0.0.105.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-113.0.0.105.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-113.0.0.105.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-113.0.0.105.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-6.6.0-113.0.0.105.oe2403.src"
					]
				}
			],
			"threats":[
				{
					"details":"Medium",
					"category":"impact"
				}
			],
			"title":"CVE-2025-39787"
		},
		{
			"cve":"CVE-2025-39795",
			"notes":[
				{
					"text":"In the Linux kernel, the following vulnerability has been resolved:\n\nblock: avoid possible overflow for chunk_sectors check in blk_stack_limits()\n\nIn blk_stack_limits(), we check that the t->chunk_sectors value is a\nmultiple of the t->physical_block_size value.\n\nHowever, by finding the chunk_sectors value in bytes, we may overflow\nthe unsigned int which holds chunk_sectors, so change the check to be\nbased on sectors.",
					"category":"description",
					"title":"Vulnerability Description"
				}
			],
			"product_status":{
				"fixed":[
					"openEuler-24.03-LTS:bpftool-6.6.0-113.0.0.105.oe2403.aarch64",
					"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-113.0.0.105.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-6.6.0-113.0.0.105.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-113.0.0.105.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-debugsource-6.6.0-113.0.0.105.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-devel-6.6.0-113.0.0.105.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-headers-6.6.0-113.0.0.105.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-source-6.6.0-113.0.0.105.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-tools-6.6.0-113.0.0.105.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-113.0.0.105.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-113.0.0.105.oe2403.aarch64",
					"openEuler-24.03-LTS:perf-6.6.0-113.0.0.105.oe2403.aarch64",
					"openEuler-24.03-LTS:perf-debuginfo-6.6.0-113.0.0.105.oe2403.aarch64",
					"openEuler-24.03-LTS:python3-perf-6.6.0-113.0.0.105.oe2403.aarch64",
					"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-113.0.0.105.oe2403.aarch64",
					"openEuler-24.03-LTS:bpftool-6.6.0-113.0.0.105.oe2403.x86_64",
					"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-113.0.0.105.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-6.6.0-113.0.0.105.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-113.0.0.105.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-debugsource-6.6.0-113.0.0.105.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-devel-6.6.0-113.0.0.105.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-headers-6.6.0-113.0.0.105.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-source-6.6.0-113.0.0.105.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-tools-6.6.0-113.0.0.105.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-113.0.0.105.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-113.0.0.105.oe2403.x86_64",
					"openEuler-24.03-LTS:perf-6.6.0-113.0.0.105.oe2403.x86_64",
					"openEuler-24.03-LTS:perf-debuginfo-6.6.0-113.0.0.105.oe2403.x86_64",
					"openEuler-24.03-LTS:python3-perf-6.6.0-113.0.0.105.oe2403.x86_64",
					"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-113.0.0.105.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-6.6.0-113.0.0.105.oe2403.src"
				]
			},
			"remediations":[
				{
					"product_ids":[
						"openEuler-24.03-LTS:bpftool-6.6.0-113.0.0.105.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-113.0.0.105.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-6.6.0-113.0.0.105.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-113.0.0.105.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-113.0.0.105.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-113.0.0.105.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-113.0.0.105.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-113.0.0.105.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-113.0.0.105.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-113.0.0.105.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-113.0.0.105.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-6.6.0-113.0.0.105.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-113.0.0.105.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-113.0.0.105.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-113.0.0.105.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-6.6.0-113.0.0.105.oe2403.x86_64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-113.0.0.105.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-6.6.0-113.0.0.105.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-113.0.0.105.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-113.0.0.105.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-113.0.0.105.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-113.0.0.105.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-113.0.0.105.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-113.0.0.105.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-113.0.0.105.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-113.0.0.105.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-6.6.0-113.0.0.105.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-113.0.0.105.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-113.0.0.105.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-113.0.0.105.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-6.6.0-113.0.0.105.oe2403.src"
					],
					"details":"kernel security update",
					"category":"vendor_fix",
					"url":"https://www.openeuler.org/zh/security/security-bulletins/detail/?id=openEuler-SA-2025-2536"
				}
			],
			"scores":[
				{
					"cvss_v3":{
						"baseSeverity":"MEDIUM",
						"baseScore":5.5,
						"vectorString":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
						"version":"3.1"
					},
					"products":[
						"openEuler-24.03-LTS:bpftool-6.6.0-113.0.0.105.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-113.0.0.105.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-6.6.0-113.0.0.105.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-113.0.0.105.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-113.0.0.105.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-113.0.0.105.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-113.0.0.105.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-113.0.0.105.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-113.0.0.105.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-113.0.0.105.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-113.0.0.105.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-6.6.0-113.0.0.105.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-113.0.0.105.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-113.0.0.105.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-113.0.0.105.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-6.6.0-113.0.0.105.oe2403.x86_64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-113.0.0.105.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-6.6.0-113.0.0.105.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-113.0.0.105.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-113.0.0.105.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-113.0.0.105.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-113.0.0.105.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-113.0.0.105.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-113.0.0.105.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-113.0.0.105.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-113.0.0.105.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-6.6.0-113.0.0.105.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-113.0.0.105.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-113.0.0.105.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-113.0.0.105.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-6.6.0-113.0.0.105.oe2403.src"
					]
				}
			],
			"threats":[
				{
					"details":"Medium",
					"category":"impact"
				}
			],
			"title":"CVE-2025-39795"
		},
		{
			"cve":"CVE-2025-39920",
			"notes":[
				{
					"text":"In the Linux kernel, the following vulnerability has been resolved:\n\npcmcia: Add error handling for add_interval() in do_validate_mem()\n\nIn the do_validate_mem(), the call to add_interval() does not\nhandle errors. If kmalloc() fails in add_interval(), it could\nresult in a null pointer being inserted into the linked list,\nleading to illegal memory access when sub_interval() is called\nnext.\n\nThis patch adds an error handling for the add_interval(). If\nadd_interval() returns an error, the function will return early\nwith the error code.",
					"category":"description",
					"title":"Vulnerability Description"
				}
			],
			"product_status":{
				"fixed":[
					"openEuler-24.03-LTS:bpftool-6.6.0-113.0.0.105.oe2403.aarch64",
					"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-113.0.0.105.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-6.6.0-113.0.0.105.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-113.0.0.105.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-debugsource-6.6.0-113.0.0.105.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-devel-6.6.0-113.0.0.105.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-headers-6.6.0-113.0.0.105.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-source-6.6.0-113.0.0.105.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-tools-6.6.0-113.0.0.105.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-113.0.0.105.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-113.0.0.105.oe2403.aarch64",
					"openEuler-24.03-LTS:perf-6.6.0-113.0.0.105.oe2403.aarch64",
					"openEuler-24.03-LTS:perf-debuginfo-6.6.0-113.0.0.105.oe2403.aarch64",
					"openEuler-24.03-LTS:python3-perf-6.6.0-113.0.0.105.oe2403.aarch64",
					"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-113.0.0.105.oe2403.aarch64",
					"openEuler-24.03-LTS:bpftool-6.6.0-113.0.0.105.oe2403.x86_64",
					"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-113.0.0.105.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-6.6.0-113.0.0.105.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-113.0.0.105.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-debugsource-6.6.0-113.0.0.105.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-devel-6.6.0-113.0.0.105.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-headers-6.6.0-113.0.0.105.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-source-6.6.0-113.0.0.105.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-tools-6.6.0-113.0.0.105.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-113.0.0.105.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-113.0.0.105.oe2403.x86_64",
					"openEuler-24.03-LTS:perf-6.6.0-113.0.0.105.oe2403.x86_64",
					"openEuler-24.03-LTS:perf-debuginfo-6.6.0-113.0.0.105.oe2403.x86_64",
					"openEuler-24.03-LTS:python3-perf-6.6.0-113.0.0.105.oe2403.x86_64",
					"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-113.0.0.105.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-6.6.0-113.0.0.105.oe2403.src"
				]
			},
			"remediations":[
				{
					"product_ids":[
						"openEuler-24.03-LTS:bpftool-6.6.0-113.0.0.105.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-113.0.0.105.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-6.6.0-113.0.0.105.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-113.0.0.105.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-113.0.0.105.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-113.0.0.105.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-113.0.0.105.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-113.0.0.105.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-113.0.0.105.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-113.0.0.105.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-113.0.0.105.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-6.6.0-113.0.0.105.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-113.0.0.105.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-113.0.0.105.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-113.0.0.105.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-6.6.0-113.0.0.105.oe2403.x86_64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-113.0.0.105.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-6.6.0-113.0.0.105.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-113.0.0.105.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-113.0.0.105.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-113.0.0.105.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-113.0.0.105.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-113.0.0.105.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-113.0.0.105.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-113.0.0.105.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-113.0.0.105.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-6.6.0-113.0.0.105.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-113.0.0.105.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-113.0.0.105.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-113.0.0.105.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-6.6.0-113.0.0.105.oe2403.src"
					],
					"details":"kernel security update",
					"category":"vendor_fix",
					"url":"https://www.openeuler.org/zh/security/security-bulletins/detail/?id=openEuler-SA-2025-2536"
				}
			],
			"scores":[
				{
					"cvss_v3":{
						"baseSeverity":"MEDIUM",
						"baseScore":5.5,
						"vectorString":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
						"version":"3.1"
					},
					"products":[
						"openEuler-24.03-LTS:bpftool-6.6.0-113.0.0.105.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-113.0.0.105.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-6.6.0-113.0.0.105.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-113.0.0.105.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-113.0.0.105.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-113.0.0.105.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-113.0.0.105.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-113.0.0.105.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-113.0.0.105.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-113.0.0.105.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-113.0.0.105.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-6.6.0-113.0.0.105.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-113.0.0.105.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-113.0.0.105.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-113.0.0.105.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-6.6.0-113.0.0.105.oe2403.x86_64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-113.0.0.105.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-6.6.0-113.0.0.105.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-113.0.0.105.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-113.0.0.105.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-113.0.0.105.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-113.0.0.105.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-113.0.0.105.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-113.0.0.105.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-113.0.0.105.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-113.0.0.105.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-6.6.0-113.0.0.105.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-113.0.0.105.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-113.0.0.105.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-113.0.0.105.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-6.6.0-113.0.0.105.oe2403.src"
					]
				}
			],
			"threats":[
				{
					"details":"Medium",
					"category":"impact"
				}
			],
			"title":"CVE-2025-39920"
		},
		{
			"cve":"CVE-2025-39923",
			"notes":[
				{
					"text":"In the Linux kernel, the following vulnerability has been resolved:\n\ndmaengine: qcom: bam_dma: Fix DT error handling for num-channels/ees\n\nWhen we don't have a clock specified in the device tree, we have no way to\nensure the BAM is on. This is often the case for remotely-controlled or\nremotely-powered BAM instances. In this case, we need to read num-channels\nfrom the DT to have all the necessary information to complete probing.\n\nHowever, at the moment invalid device trees without clock and without\nnum-channels still continue probing, because the error handling is missing\nreturn statements. The driver will then later try to read the number of\nchannels from the registers. This is unsafe, because it relies on boot\nfirmware and lucky timing to succeed. Unfortunately, the lack of proper\nerror handling here has been abused for several Qualcomm SoCs upstream,\ncausing early boot crashes in several situations [1, 2].\n\nAvoid these early crashes by erroring out when any of the required DT\nproperties are missing. Note that this will break some of the existing DTs\nupstream (mainly BAM instances related to the crypto engine). However,\nclearly these DTs have never been tested properly, since the error in the\nkernel log was just ignored. It's safer to disable the crypto engine for\nthese broken DTBs.\n\n[1]: https://lore.kernel.org/r/",
					"category":"description",
					"title":"Vulnerability Description"
				}
			],
			"product_status":{
				"fixed":[
					"openEuler-24.03-LTS:bpftool-6.6.0-113.0.0.105.oe2403.aarch64",
					"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-113.0.0.105.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-6.6.0-113.0.0.105.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-113.0.0.105.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-debugsource-6.6.0-113.0.0.105.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-devel-6.6.0-113.0.0.105.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-headers-6.6.0-113.0.0.105.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-source-6.6.0-113.0.0.105.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-tools-6.6.0-113.0.0.105.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-113.0.0.105.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-113.0.0.105.oe2403.aarch64",
					"openEuler-24.03-LTS:perf-6.6.0-113.0.0.105.oe2403.aarch64",
					"openEuler-24.03-LTS:perf-debuginfo-6.6.0-113.0.0.105.oe2403.aarch64",
					"openEuler-24.03-LTS:python3-perf-6.6.0-113.0.0.105.oe2403.aarch64",
					"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-113.0.0.105.oe2403.aarch64",
					"openEuler-24.03-LTS:bpftool-6.6.0-113.0.0.105.oe2403.x86_64",
					"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-113.0.0.105.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-6.6.0-113.0.0.105.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-113.0.0.105.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-debugsource-6.6.0-113.0.0.105.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-devel-6.6.0-113.0.0.105.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-headers-6.6.0-113.0.0.105.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-source-6.6.0-113.0.0.105.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-tools-6.6.0-113.0.0.105.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-113.0.0.105.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-113.0.0.105.oe2403.x86_64",
					"openEuler-24.03-LTS:perf-6.6.0-113.0.0.105.oe2403.x86_64",
					"openEuler-24.03-LTS:perf-debuginfo-6.6.0-113.0.0.105.oe2403.x86_64",
					"openEuler-24.03-LTS:python3-perf-6.6.0-113.0.0.105.oe2403.x86_64",
					"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-113.0.0.105.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-6.6.0-113.0.0.105.oe2403.src"
				]
			},
			"remediations":[
				{
					"product_ids":[
						"openEuler-24.03-LTS:bpftool-6.6.0-113.0.0.105.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-113.0.0.105.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-6.6.0-113.0.0.105.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-113.0.0.105.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-113.0.0.105.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-113.0.0.105.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-113.0.0.105.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-113.0.0.105.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-113.0.0.105.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-113.0.0.105.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-113.0.0.105.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-6.6.0-113.0.0.105.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-113.0.0.105.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-113.0.0.105.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-113.0.0.105.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-6.6.0-113.0.0.105.oe2403.x86_64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-113.0.0.105.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-6.6.0-113.0.0.105.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-113.0.0.105.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-113.0.0.105.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-113.0.0.105.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-113.0.0.105.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-113.0.0.105.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-113.0.0.105.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-113.0.0.105.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-113.0.0.105.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-6.6.0-113.0.0.105.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-113.0.0.105.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-113.0.0.105.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-113.0.0.105.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-6.6.0-113.0.0.105.oe2403.src"
					],
					"details":"kernel security update",
					"category":"vendor_fix",
					"url":"https://www.openeuler.org/zh/security/security-bulletins/detail/?id=openEuler-SA-2025-2536"
				}
			],
			"scores":[
				{
					"cvss_v3":{
						"baseSeverity":"HIGH",
						"baseScore":7.0,
						"vectorString":"CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
						"version":"3.1"
					},
					"products":[
						"openEuler-24.03-LTS:bpftool-6.6.0-113.0.0.105.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-113.0.0.105.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-6.6.0-113.0.0.105.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-113.0.0.105.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-113.0.0.105.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-113.0.0.105.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-113.0.0.105.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-113.0.0.105.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-113.0.0.105.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-113.0.0.105.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-113.0.0.105.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-6.6.0-113.0.0.105.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-113.0.0.105.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-113.0.0.105.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-113.0.0.105.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-6.6.0-113.0.0.105.oe2403.x86_64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-113.0.0.105.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-6.6.0-113.0.0.105.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-113.0.0.105.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-113.0.0.105.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-113.0.0.105.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-113.0.0.105.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-113.0.0.105.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-113.0.0.105.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-113.0.0.105.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-113.0.0.105.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-6.6.0-113.0.0.105.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-113.0.0.105.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-113.0.0.105.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-113.0.0.105.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-6.6.0-113.0.0.105.oe2403.src"
					]
				}
			],
			"threats":[
				{
					"details":"High",
					"category":"impact"
				}
			],
			"title":"CVE-2025-39923"
		},
		{
			"cve":"CVE-2025-39968",
			"notes":[
				{
					"text":"In the Linux kernel i40e driver, there is a security vulnerability: the driver lacks boundary checks for the maximum number of virtual function (VF) filters. An attacker could potentially exploit this vulnerability to request filter counts beyond the boundaries, leading to potential security issues.",
					"category":"description",
					"title":"Vulnerability Description"
				}
			],
			"product_status":{
				"fixed":[
					"openEuler-24.03-LTS:bpftool-6.6.0-113.0.0.105.oe2403.aarch64",
					"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-113.0.0.105.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-6.6.0-113.0.0.105.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-113.0.0.105.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-debugsource-6.6.0-113.0.0.105.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-devel-6.6.0-113.0.0.105.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-headers-6.6.0-113.0.0.105.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-source-6.6.0-113.0.0.105.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-tools-6.6.0-113.0.0.105.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-113.0.0.105.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-113.0.0.105.oe2403.aarch64",
					"openEuler-24.03-LTS:perf-6.6.0-113.0.0.105.oe2403.aarch64",
					"openEuler-24.03-LTS:perf-debuginfo-6.6.0-113.0.0.105.oe2403.aarch64",
					"openEuler-24.03-LTS:python3-perf-6.6.0-113.0.0.105.oe2403.aarch64",
					"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-113.0.0.105.oe2403.aarch64",
					"openEuler-24.03-LTS:bpftool-6.6.0-113.0.0.105.oe2403.x86_64",
					"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-113.0.0.105.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-6.6.0-113.0.0.105.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-113.0.0.105.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-debugsource-6.6.0-113.0.0.105.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-devel-6.6.0-113.0.0.105.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-headers-6.6.0-113.0.0.105.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-source-6.6.0-113.0.0.105.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-tools-6.6.0-113.0.0.105.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-113.0.0.105.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-113.0.0.105.oe2403.x86_64",
					"openEuler-24.03-LTS:perf-6.6.0-113.0.0.105.oe2403.x86_64",
					"openEuler-24.03-LTS:perf-debuginfo-6.6.0-113.0.0.105.oe2403.x86_64",
					"openEuler-24.03-LTS:python3-perf-6.6.0-113.0.0.105.oe2403.x86_64",
					"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-113.0.0.105.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-6.6.0-113.0.0.105.oe2403.src"
				]
			},
			"remediations":[
				{
					"product_ids":[
						"openEuler-24.03-LTS:bpftool-6.6.0-113.0.0.105.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-113.0.0.105.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-6.6.0-113.0.0.105.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-113.0.0.105.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-113.0.0.105.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-113.0.0.105.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-113.0.0.105.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-113.0.0.105.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-113.0.0.105.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-113.0.0.105.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-113.0.0.105.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-6.6.0-113.0.0.105.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-113.0.0.105.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-113.0.0.105.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-113.0.0.105.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-6.6.0-113.0.0.105.oe2403.x86_64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-113.0.0.105.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-6.6.0-113.0.0.105.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-113.0.0.105.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-113.0.0.105.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-113.0.0.105.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-113.0.0.105.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-113.0.0.105.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-113.0.0.105.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-113.0.0.105.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-113.0.0.105.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-6.6.0-113.0.0.105.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-113.0.0.105.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-113.0.0.105.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-113.0.0.105.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-6.6.0-113.0.0.105.oe2403.src"
					],
					"details":"kernel security update",
					"category":"vendor_fix",
					"url":"https://www.openeuler.org/zh/security/security-bulletins/detail/?id=openEuler-SA-2025-2536"
				}
			],
			"scores":[
				{
					"cvss_v3":{
						"baseSeverity":"HIGH",
						"baseScore":7.0,
						"vectorString":"CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
						"version":"3.1"
					},
					"products":[
						"openEuler-24.03-LTS:bpftool-6.6.0-113.0.0.105.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-113.0.0.105.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-6.6.0-113.0.0.105.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-113.0.0.105.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-113.0.0.105.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-113.0.0.105.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-113.0.0.105.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-113.0.0.105.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-113.0.0.105.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-113.0.0.105.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-113.0.0.105.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-6.6.0-113.0.0.105.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-113.0.0.105.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-113.0.0.105.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-113.0.0.105.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-6.6.0-113.0.0.105.oe2403.x86_64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-113.0.0.105.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-6.6.0-113.0.0.105.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-113.0.0.105.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-113.0.0.105.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-113.0.0.105.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-113.0.0.105.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-113.0.0.105.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-113.0.0.105.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-113.0.0.105.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-113.0.0.105.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-6.6.0-113.0.0.105.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-113.0.0.105.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-113.0.0.105.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-113.0.0.105.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-6.6.0-113.0.0.105.oe2403.src"
					]
				}
			],
			"threats":[
				{
					"details":"High",
					"category":"impact"
				}
			],
			"title":"CVE-2025-39968"
		},
		{
			"cve":"CVE-2025-39971",
			"notes":[
				{
					"text":"In the Linux kernel, the following vulnerability has been resolved: i40e: fix idx validation in config queues msg. Ensure idx is within range of active/initialized TCs when iterating over vf->ch[idx] in i40e_vc_config_queues_msg().",
					"category":"description",
					"title":"Vulnerability Description"
				}
			],
			"product_status":{
				"fixed":[
					"openEuler-24.03-LTS:bpftool-6.6.0-113.0.0.105.oe2403.aarch64",
					"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-113.0.0.105.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-6.6.0-113.0.0.105.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-113.0.0.105.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-debugsource-6.6.0-113.0.0.105.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-devel-6.6.0-113.0.0.105.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-headers-6.6.0-113.0.0.105.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-source-6.6.0-113.0.0.105.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-tools-6.6.0-113.0.0.105.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-113.0.0.105.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-113.0.0.105.oe2403.aarch64",
					"openEuler-24.03-LTS:perf-6.6.0-113.0.0.105.oe2403.aarch64",
					"openEuler-24.03-LTS:perf-debuginfo-6.6.0-113.0.0.105.oe2403.aarch64",
					"openEuler-24.03-LTS:python3-perf-6.6.0-113.0.0.105.oe2403.aarch64",
					"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-113.0.0.105.oe2403.aarch64",
					"openEuler-24.03-LTS:bpftool-6.6.0-113.0.0.105.oe2403.x86_64",
					"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-113.0.0.105.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-6.6.0-113.0.0.105.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-113.0.0.105.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-debugsource-6.6.0-113.0.0.105.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-devel-6.6.0-113.0.0.105.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-headers-6.6.0-113.0.0.105.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-source-6.6.0-113.0.0.105.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-tools-6.6.0-113.0.0.105.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-113.0.0.105.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-113.0.0.105.oe2403.x86_64",
					"openEuler-24.03-LTS:perf-6.6.0-113.0.0.105.oe2403.x86_64",
					"openEuler-24.03-LTS:perf-debuginfo-6.6.0-113.0.0.105.oe2403.x86_64",
					"openEuler-24.03-LTS:python3-perf-6.6.0-113.0.0.105.oe2403.x86_64",
					"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-113.0.0.105.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-6.6.0-113.0.0.105.oe2403.src"
				]
			},
			"remediations":[
				{
					"product_ids":[
						"openEuler-24.03-LTS:bpftool-6.6.0-113.0.0.105.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-113.0.0.105.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-6.6.0-113.0.0.105.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-113.0.0.105.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-113.0.0.105.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-113.0.0.105.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-113.0.0.105.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-113.0.0.105.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-113.0.0.105.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-113.0.0.105.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-113.0.0.105.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-6.6.0-113.0.0.105.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-113.0.0.105.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-113.0.0.105.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-113.0.0.105.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-6.6.0-113.0.0.105.oe2403.x86_64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-113.0.0.105.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-6.6.0-113.0.0.105.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-113.0.0.105.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-113.0.0.105.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-113.0.0.105.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-113.0.0.105.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-113.0.0.105.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-113.0.0.105.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-113.0.0.105.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-113.0.0.105.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-6.6.0-113.0.0.105.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-113.0.0.105.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-113.0.0.105.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-113.0.0.105.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-6.6.0-113.0.0.105.oe2403.src"
					],
					"details":"kernel security update",
					"category":"vendor_fix",
					"url":"https://www.openeuler.org/zh/security/security-bulletins/detail/?id=openEuler-SA-2025-2536"
				}
			],
			"scores":[
				{
					"cvss_v3":{
						"baseSeverity":"HIGH",
						"baseScore":7.0,
						"vectorString":"CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
						"version":"3.1"
					},
					"products":[
						"openEuler-24.03-LTS:bpftool-6.6.0-113.0.0.105.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-113.0.0.105.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-6.6.0-113.0.0.105.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-113.0.0.105.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-113.0.0.105.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-113.0.0.105.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-113.0.0.105.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-113.0.0.105.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-113.0.0.105.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-113.0.0.105.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-113.0.0.105.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-6.6.0-113.0.0.105.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-113.0.0.105.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-113.0.0.105.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-113.0.0.105.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-6.6.0-113.0.0.105.oe2403.x86_64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-113.0.0.105.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-6.6.0-113.0.0.105.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-113.0.0.105.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-113.0.0.105.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-113.0.0.105.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-113.0.0.105.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-113.0.0.105.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-113.0.0.105.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-113.0.0.105.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-113.0.0.105.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-6.6.0-113.0.0.105.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-113.0.0.105.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-113.0.0.105.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-113.0.0.105.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-6.6.0-113.0.0.105.oe2403.src"
					]
				}
			],
			"threats":[
				{
					"details":"High",
					"category":"impact"
				}
			],
			"title":"CVE-2025-39971"
		},
		{
			"cve":"CVE-2025-39989",
			"notes":[
				{
					"text":"In the Linux kernel, the following vulnerability has been resolved:\n\nx86/mce: use is_copy_from_user() to determine copy-from-user context\n\nPatch series \"mm/hwpoison: Fix regressions in memory failure handling\",\nv4.\n\n## 1. What am I trying to do:\n\nThis patchset resolves two critical regressions related to memory failure\nhandling that have appeared in the upstream kernel since version 5.17, as\ncompared to 5.10 LTS.\n\n    - copyin case: poison found in user page while kernel copying from user space\n    - instr case: poison found while instruction fetching in user space\n\n## 2. What is the expected outcome and why\n\n- For copyin case:\n\nKernel can recover from poison found where kernel is doing get_user() or\ncopy_from_user() if those places get an error return and the kernel return\n-EFAULT to the process instead of crashing.  More specifily, MCE handler\nchecks the fixup handler type to decide whether an in kernel #MC can be\nrecovered.  When EX_TYPE_UACCESS is found, the PC jumps to recovery code\nspecified in _ASM_EXTABLE_FAULT() and return a -EFAULT to user space.\n\n- For instr case:\n\nIf a poison found while instruction fetching in user space, full recovery\nis possible.  User process takes #PF, Linux allocates a new page and fills\nby reading from storage.\n\n\n## 3. What actually happens and why\n\n- For copyin case: kernel panic since v5.17\n\nCommit 4c132d1d844a (\"x86/futex: Remove .fixup usage\") introduced a new\nextable fixup type, EX_TYPE_EFAULT_REG, and later patches updated the\nextable fixup type for copy-from-user operations, changing it from\nEX_TYPE_UACCESS to EX_TYPE_EFAULT_REG.  It breaks previous EX_TYPE_UACCESS\nhandling when posion found in get_user() or copy_from_user().\n\n- For instr case: user process is killed by a SIGBUS signal due to #CMCI\n  and #MCE race\n\nWhen an uncorrected memory error is consumed there is a race between the\nCMCI from the memory controller reporting an uncorrected error with a UCNA\nsignature, and the core reporting and SRAR signature machine check when\nthe data is about to be consumed.\n\n### Background: why *UN*corrected errors tied to *C*MCI in Intel platform [1]\n\nPrior to Icelake memory controllers reported patrol scrub events that\ndetected a previously unseen uncorrected error in memory by signaling a\nbroadcast machine check with an SRAO (Software Recoverable Action\nOptional) signature in the machine check bank.  This was overkill because\nit's not an urgent problem that no core is on the verge of consuming that\nbad data.  It's also found that multi SRAO UCE may cause nested MCE\ninterrupts and finally become an IERR.\n\nHence, Intel downgrades the machine check bank signature of patrol scrub\nfrom SRAO to UCNA (Uncorrected, No Action required), and signal changed to\n#CMCI.  Just to add to the confusion, Linux does take an action (in\nuc_decode_notifier()) to try to offline the page despite the UC*NA*\nsignature name.\n\n### Background: why #CMCI and #MCE race when poison is consuming in\n    Intel platform [1]\n\nHaving decided that CMCI/UCNA is the best action for patrol scrub errors,\nthe memory controller uses it for reads too.  But the memory controller is\nexecuting asynchronously from the core, and can't tell the difference\nbetween a \"real\" read and a speculative read.  So it will do CMCI/UCNA if\nan error is found in any read.\n\nThus:\n\n1) Core is clever and thinks address A is needed soon, issues a\n   speculative read.\n\n2) Core finds it is going to use address A soon after sending the read\n   request\n\n3) The CMCI from the memory controller is in a race with MCE from the\n   core that will soon try to retire the load from address A.\n\nQuite often (because speculation has got better) the CMCI from the memory\ncontroller is delivered before the core is committed to the instruction\nreading address A, so the interrupt is taken, and Linux offlines the page\n(marking it as poison).\n\n\n## Why user process is killed for instr case\n\nCommit 046545a661af (\"mm/hwpoison: fix error page recovered but reported\n\"not\n---truncated---",
					"category":"description",
					"title":"Vulnerability Description"
				}
			],
			"product_status":{
				"fixed":[
					"openEuler-24.03-LTS:bpftool-6.6.0-113.0.0.105.oe2403.aarch64",
					"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-113.0.0.105.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-6.6.0-113.0.0.105.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-113.0.0.105.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-debugsource-6.6.0-113.0.0.105.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-devel-6.6.0-113.0.0.105.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-headers-6.6.0-113.0.0.105.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-source-6.6.0-113.0.0.105.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-tools-6.6.0-113.0.0.105.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-113.0.0.105.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-113.0.0.105.oe2403.aarch64",
					"openEuler-24.03-LTS:perf-6.6.0-113.0.0.105.oe2403.aarch64",
					"openEuler-24.03-LTS:perf-debuginfo-6.6.0-113.0.0.105.oe2403.aarch64",
					"openEuler-24.03-LTS:python3-perf-6.6.0-113.0.0.105.oe2403.aarch64",
					"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-113.0.0.105.oe2403.aarch64",
					"openEuler-24.03-LTS:bpftool-6.6.0-113.0.0.105.oe2403.x86_64",
					"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-113.0.0.105.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-6.6.0-113.0.0.105.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-113.0.0.105.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-debugsource-6.6.0-113.0.0.105.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-devel-6.6.0-113.0.0.105.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-headers-6.6.0-113.0.0.105.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-source-6.6.0-113.0.0.105.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-tools-6.6.0-113.0.0.105.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-113.0.0.105.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-113.0.0.105.oe2403.x86_64",
					"openEuler-24.03-LTS:perf-6.6.0-113.0.0.105.oe2403.x86_64",
					"openEuler-24.03-LTS:perf-debuginfo-6.6.0-113.0.0.105.oe2403.x86_64",
					"openEuler-24.03-LTS:python3-perf-6.6.0-113.0.0.105.oe2403.x86_64",
					"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-113.0.0.105.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-6.6.0-113.0.0.105.oe2403.src"
				]
			},
			"remediations":[
				{
					"product_ids":[
						"openEuler-24.03-LTS:bpftool-6.6.0-113.0.0.105.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-113.0.0.105.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-6.6.0-113.0.0.105.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-113.0.0.105.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-113.0.0.105.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-113.0.0.105.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-113.0.0.105.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-113.0.0.105.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-113.0.0.105.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-113.0.0.105.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-113.0.0.105.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-6.6.0-113.0.0.105.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-113.0.0.105.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-113.0.0.105.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-113.0.0.105.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-6.6.0-113.0.0.105.oe2403.x86_64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-113.0.0.105.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-6.6.0-113.0.0.105.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-113.0.0.105.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-113.0.0.105.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-113.0.0.105.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-113.0.0.105.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-113.0.0.105.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-113.0.0.105.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-113.0.0.105.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-113.0.0.105.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-6.6.0-113.0.0.105.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-113.0.0.105.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-113.0.0.105.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-113.0.0.105.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-6.6.0-113.0.0.105.oe2403.src"
					],
					"details":"kernel security update",
					"category":"vendor_fix",
					"url":"https://www.openeuler.org/zh/security/security-bulletins/detail/?id=openEuler-SA-2025-2536"
				}
			],
			"scores":[
				{
					"cvss_v3":{
						"baseSeverity":"MEDIUM",
						"baseScore":5.5,
						"vectorString":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
						"version":"3.1"
					},
					"products":[
						"openEuler-24.03-LTS:bpftool-6.6.0-113.0.0.105.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-113.0.0.105.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-6.6.0-113.0.0.105.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-113.0.0.105.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-113.0.0.105.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-113.0.0.105.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-113.0.0.105.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-113.0.0.105.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-113.0.0.105.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-113.0.0.105.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-113.0.0.105.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-6.6.0-113.0.0.105.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-113.0.0.105.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-113.0.0.105.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-113.0.0.105.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-6.6.0-113.0.0.105.oe2403.x86_64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-113.0.0.105.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-6.6.0-113.0.0.105.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-113.0.0.105.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-113.0.0.105.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-113.0.0.105.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-113.0.0.105.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-113.0.0.105.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-113.0.0.105.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-113.0.0.105.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-113.0.0.105.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-6.6.0-113.0.0.105.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-113.0.0.105.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-113.0.0.105.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-113.0.0.105.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-6.6.0-113.0.0.105.oe2403.src"
					]
				}
			],
			"threats":[
				{
					"details":"Medium",
					"category":"impact"
				}
			],
			"title":"CVE-2025-39989"
		}
	]
}