{
	"document":{
		"aggregate_severity":{
			"namespace":"https://nvd.nist.gov/vuln-metrics/cvss",
			"text":"High"
		},
		"category":"csaf_vex",
		"csaf_version":"2.0",
		"distribution":{
			"tlp":{
				"label":"WHITE",
				"url":"https:/www.first.org/tlp/"
			}
		},
		"lang":"en",
		"notes":[
			{
				"text":"kernel security update",
				"category":"general",
				"title":"Synopsis"
			},
			{
				"text":"An update for kernel is now available for openEuler-22.03-LTS-SP3.",
				"category":"general",
				"title":"Summary"
			},
			{
				"text":"The Linux Kernel, the operating system core itself.\n\nSecurity Fix(es):\n\nIn the Linux kernel, the following vulnerability has been resolved:\n\nnet/mlx5e: Fix use-after-free of encap entry in neigh update handler\n\nFunction mlx5e_rep_neigh_update() wasn't updated to accommodate rtnl lock\nremoval from TC filter update path and properly handle concurrent encap\nentry insertion/deletion which can lead to following use-after-free:\n\n [23827.464923] ==================================================================\n [23827.469446] BUG: KASAN: use-after-free in mlx5e_encap_take+0x72/0x140 [mlx5_core]\n [23827.470971] Read of size 4 at addr ffff8881d132228c by task kworker/u20:6/21635\n [23827.472251]\n [23827.472615] CPU: 9 PID: 21635 Comm: kworker/u20:6 Not tainted 5.13.0-rc3+ #5\n [23827.473788] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS rel-1.13.0-0-gf21b5a4aeb02-prebuilt.qemu.org 04/01/2014\n [23827.475639] Workqueue: mlx5e mlx5e_rep_neigh_update [mlx5_core]\n [23827.476731] Call Trace:\n [23827.477260]  dump_stack+0xbb/0x107\n [23827.477906]  print_address_description.constprop.0+0x18/0x140\n [23827.478896]  ? mlx5e_encap_take+0x72/0x140 [mlx5_core]\n [23827.479879]  ? mlx5e_encap_take+0x72/0x140 [mlx5_core]\n [23827.480905]  kasan_report.cold+0x7c/0xd8\n [23827.481701]  ? mlx5e_encap_take+0x72/0x140 [mlx5_core]\n [23827.482744]  kasan_check_range+0x145/0x1a0\n [23827.493112]  mlx5e_encap_take+0x72/0x140 [mlx5_core]\n [23827.494054]  ? mlx5e_tc_tun_encap_info_equal_generic+0x140/0x140 [mlx5_core]\n [23827.495296]  mlx5e_rep_neigh_update+0x41e/0x5e0 [mlx5_core]\n [23827.496338]  ? mlx5e_rep_neigh_entry_release+0xb80/0xb80 [mlx5_core]\n [23827.497486]  ? read_word_at_a_time+0xe/0x20\n [23827.498250]  ? strscpy+0xa0/0x2a0\n [23827.498889]  process_one_work+0x8ac/0x14e0\n [23827.499638]  ? lockdep_hardirqs_on_prepare+0x400/0x400\n [23827.500537]  ? pwq_dec_nr_in_flight+0x2c0/0x2c0\n [23827.501359]  ? rwlock_bug.part.0+0x90/0x90\n [23827.502116]  worker_thread+0x53b/0x1220\n [23827.502831]  ? process_one_work+0x14e0/0x14e0\n [23827.503627]  kthread+0x328/0x3f0\n [23827.504254]  ? _raw_spin_unlock_irq+0x24/0x40\n [23827.505065]  ? __kthread_bind_mask+0x90/0x90\n [23827.505912]  ret_from_fork+0x1f/0x30\n [23827.506621]\n [23827.506987] Allocated by task 28248:\n [23827.507694]  kasan_save_stack+0x1b/0x40\n [23827.508476]  __kasan_kmalloc+0x7c/0x90\n [23827.509197]  mlx5e_attach_encap+0xde1/0x1d40 [mlx5_core]\n [23827.510194]  mlx5e_tc_add_fdb_flow+0x397/0xc40 [mlx5_core]\n [23827.511218]  __mlx5e_add_fdb_flow+0x519/0xb30 [mlx5_core]\n [23827.512234]  mlx5e_configure_flower+0x191c/0x4870 [mlx5_core]\n [23827.513298]  tc_setup_cb_add+0x1d5/0x420\n [23827.514023]  fl_hw_replace_filter+0x382/0x6a0 [cls_flower]\n [23827.514975]  fl_change+0x2ceb/0x4a51 [cls_flower]\n [23827.515821]  tc_new_tfilter+0x89a/0x2070\n [23827.516548]  rtnetlink_rcv_msg+0x644/0x8c0\n [23827.517300]  netlink_rcv_skb+0x11d/0x340\n [23827.518021]  netlink_unicast+0x42b/0x700\n [23827.518742]  netlink_sendmsg+0x743/0xc20\n [23827.519467]  sock_sendmsg+0xb2/0xe0\n [23827.520131]  ____sys_sendmsg+0x590/0x770\n [23827.520851]  ___sys_sendmsg+0xd8/0x160\n [23827.521552]  __sys_sendmsg+0xb7/0x140\n [23827.522238]  do_syscall_64+0x3a/0x70\n [23827.522907]  entry_SYSCALL_64_after_hwframe+0x44/0xae\n [23827.523797]\n [23827.524163] Freed by task 25948:\n [23827.524780]  kasan_save_stack+0x1b/0x40\n [23827.525488]  kasan_set_track+0x1c/0x30\n [23827.526187]  kasan_set_free_info+0x20/0x30\n [23827.526968]  __kasan_slab_free+0xed/0x130\n [23827.527709]  slab_free_freelist_hook+0xcf/0x1d0\n [23827.528528]  kmem_cache_free_bulk+0x33a/0x6e0\n [23827.529317]  kfree_rcu_work+0x55f/0xb70\n [23827.530024]  process_one_work+0x8ac/0x14e0\n [23827.530770]  worker_thread+0x53b/0x1220\n [23827.531480]  kthread+0x328/0x3f0\n [23827.532114]  ret_from_fork+0x1f/0x30\n [23827.532785]\n [23827.533147] Last potentially related work creation:\n [23827.534007]  kasan_save_stack+0x1b/0x40\n [23827.534710]  kasan_record_aux_stack+0xab/0xc0\n [23827.535492]  kvfree_call_rcu+0x31/0x7b0\n [23827.536206]  mlx5e_tc_del\n---truncated---(CVE-2021-47247)\n\nIn the Linux kernel, the following vulnerability has been resolved:\n\nocteontx2-af: Fix possible null pointer dereference.\n\nThis patch fixes possible null pointer dereference in files\n\"rvu_debugfs.c\" and \"rvu_nix.c\"(CVE-2021-47484)\n\nIn the Linux kernel, the following vulnerability has been resolved:\n\nnet: stmmac: Disable Tx queues when reconfiguring the interface\n\nThe Tx queues were not disabled in situations where the driver needed to\nstop the interface to apply a new configuration. This could result in a\nkernel panic when doing any of the 3 following actions:\n* reconfiguring the number of queues (ethtool -L)\n* reconfiguring the size of the ring buffers (ethtool -G)\n* installing/removing an XDP program (ip l set dev ethX xdp)\n\nPrevent the panic by making sure netif_tx_disable is called when stopping\nan interface.\n\nWithout this patch, the following kernel panic can be observed when doing\nany of the actions above:\n\nUnable to handle kernel paging request at virtual address ffff80001238d040\n[....]\n Call trace:\n  dwmac4_set_addr+0x8/0x10\n  dev_hard_start_xmit+0xe4/0x1ac\n  sch_direct_xmit+0xe8/0x39c\n  __dev_queue_xmit+0x3ec/0xaf0\n  dev_queue_xmit+0x14/0x20\n[...]\n[ end trace 0000000000000002 ]---(CVE-2021-47558)\n\nIn the Linux kernel, the following vulnerability has been resolved:\n\nice: Fix crash by keep old cfg when update TCs more than queues\n\nThere are problems if allocated queues less than Traffic Classes.\n\nCommit a632b2a4c920 (\"ice: ethtool: Prohibit improper channel config\nfor DCB\") already disallow setting less queues than TCs.\n\nAnother case is if we first set less queues, and later update more TCs\nconfig due to LLDP, ice_vsi_cfg_tc() will failed but left dirty\nnum_txq/rxq and tc_cfg in vsi, that will cause invalid pointer access.\n\n[   95.968089] ice 0000:3b:00.1: More TCs defined than queues/rings allocated.\n[   95.968092] ice 0000:3b:00.1: Trying to use more Rx queues (8), than were allocated (1)!\n[   95.968093] ice 0000:3b:00.1: Failed to config TC for VSI index: 0\n[   95.969621] general protection fault: 0000 [#1] SMP NOPTI\n[   95.969705] CPU: 1 PID: 58405 Comm: lldpad Kdump: loaded Tainted: G     U  W  O     --------- -t - 4.18.0 #1\n[   95.969867] Hardware name: O.E.M/BC11SPSCB10, BIOS 8.23 12/30/2021\n[   95.969992] RIP: 0010:devm_kmalloc+0xa/0x60\n[   95.970052] Code: 5c ff ff ff 31 c0 5b 5d 41 5c c3 b8 f4 ff ff ff eb f4 0f 1f 40 00 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 89 d1 <8b> 97 60 02 00 00 48 8d 7e 18 48 39 f7 72 3f 55 89 ce 53 48 8b 4c\n[   95.970344] RSP: 0018:ffffc9003f553888 EFLAGS: 00010206\n[   95.970425] RAX: dead000000000200 RBX: ffffea003c425b00 RCX: 00000000006080c0\n[   95.970536] RDX: 00000000006080c0 RSI: 0000000000000200 RDI: dead000000000200\n[   95.970648] RBP: dead000000000200 R08: 00000000000463c0 R09: ffff888ffa900000\n[   95.970760] R10: 0000000000000000 R11: 0000000000000002 R12: ffff888ff6b40100\n[   95.970870] R13: ffff888ff6a55018 R14: 0000000000000000 R15: ffff888ff6a55460\n[   95.970981] FS:  00007f51b7d24700(0000) GS:ffff88903ee80000(0000) knlGS:0000000000000000\n[   95.971108] CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033\n[   95.971197] CR2: 00007fac5410d710 CR3: 0000000f2c1de002 CR4: 00000000007606e0\n[   95.971309] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000\n[   95.971419] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400\n[   95.971530] PKRU: 55555554\n[   95.971573] Call Trace:\n[   95.971622]  ice_setup_rx_ring+0x39/0x110 [ice]\n[   95.971695]  ice_vsi_setup_rx_rings+0x54/0x90 [ice]\n[   95.971774]  ice_vsi_open+0x25/0x120 [ice]\n[   95.971843]  ice_open_internal+0xb8/0x1f0 [ice]\n[   95.971919]  ice_ena_vsi+0x4f/0xd0 [ice]\n[   95.971987]  ice_dcb_ena_dis_vsi.constprop.5+0x29/0x90 [ice]\n[   95.972082]  ice_pf_dcb_cfg+0x29a/0x380 [ice]\n[   95.972154]  ice_dcbnl_setets+0x174/0x1b0 [ice]\n[   95.972220]  dcbnl_ieee_set+0x89/0x230\n[   95.972279]  ? dcbnl_ieee_del+0x150/0x150\n[   95.972341]  dcb_doit+0x124/0x1b0\n[   95.972392]  rtnetlink_rcv_msg+0x243/0x2f0\n[   95.972457]  ? dcb_doit+0x14d/0x1b0\n[   95.972510]  ? __kmalloc_node_track_caller+0x1d3/0x280\n[   95.972591]  ? rtnl_calcit.isra.31+0x100/0x100\n[   95.972661]  netlink_rcv_skb+0xcf/0xf0\n[   95.972720]  netlink_unicast+0x16d/0x220\n[   95.972781]  netlink_sendmsg+0x2ba/0x3a0\n[   95.975891]  sock_sendmsg+0x4c/0x50\n[   95.979032]  ___sys_sendmsg+0x2e4/0x300\n[   95.982147]  ? kmem_cache_alloc+0x13e/0x190\n[   95.985242]  ? __wake_up_common_lock+0x79/0x90\n[   95.988338]  ? __check_object_size+0xac/0x1b0\n[   95.991440]  ? _copy_to_user+0x22/0x30\n[   95.994539]  ? move_addr_to_user+0xbb/0xd0\n[   95.997619]  ? __sys_sendmsg+0x53/0x80\n[   96.000664]  __sys_sendmsg+0x53/0x80\n[   96.003747]  do_syscall_64+0x5b/0x1d0\n[   96.006862]  entry_SYSCALL_64_after_hwframe+0x65/0xca\n\nOnly update num_txq/rxq when passed check, and restore tc_cfg if setup\nqueue map failed.(CVE-2022-48652)\n\nIn the Linux kernel, the following vulnerability has been resolved:\n\npipe: wakeup wr_wait after setting max_usage\n\nCommit c73be61cede5 (\"pipe: Add general notification queue support\") a\nregression was introduced that would lock up resized pipes under certain\nconditions. See the reproducer in [1].\n\nThe commit resizing the pipe ring size was moved to a different\nfunction, doing that moved the wakeup for pipe->wr_wait before actually\nraising pipe->max_usage. If a pipe was full before the resize occured it\nwould result in the wakeup never actually triggering pipe_write.\n\nSet @max_usage and @nr_accounted before waking writers if this isn't a\nwatch queue.\n\n[Christian Brauner <brauner@kernel.org>: rewrite to account for watch queues](CVE-2023-52672)\n\nIn the Linux kernel, the following vulnerability has been resolved:\n\nALSA: scarlett2: Add missing error checks to *_ctl_get()\n\nThe *_ctl_get() functions which call scarlett2_update_*() were not\nchecking the return value. Fix to check the return value and pass to\nthe caller.(CVE-2023-52680)\n\nIn the Linux kernel, the following vulnerability has been resolved:\n\npowerpc/powernv: Add a null pointer check in opal_event_init()\n\nkasprintf() returns a pointer to dynamically allocated memory\nwhich can be NULL upon failure.(CVE-2023-52686)\n\nIn the Linux kernel, the following vulnerability has been resolved:\n\nACPI: video: check for error while searching for backlight device parent\n\nIf acpi_get_parent() called in acpi_video_dev_register_backlight()\nfails, for example, because acpi_ut_acquire_mutex() fails inside\nacpi_get_parent), this can lead to incorrect (uninitialized)\nacpi_parent handle being passed to acpi_get_pci_dev() for detecting\nthe parent pci device.\n\nCheck acpi_get_parent() result and set parent device only in case of success.\n\nFound by Linux Verification Center (linuxtesting.org) with SVACE.(CVE-2023-52693)\n\nIn the Linux kernel, the following vulnerability has been resolved:\n\nceph: blocklist the kclient when receiving corrupted snap trace\n\nWhen received corrupted snap trace we don't know what exactly has\nhappened in MDS side. And we shouldn't continue IOs and metadatas\naccess to MDS, which may corrupt or get incorrect contents.\n\nThis patch will just block all the further IO/MDS requests\nimmediately and then evict the kclient itself.\n\nThe reason why we still need to evict the kclient just after\nblocking all the further IOs is that the MDS could revoke the caps\nfaster.(CVE-2023-52732)\n\nIn the Linux kernel, the following vulnerability has been resolved:\n\nvirtio-blk: fix implicit overflow on virtio_max_dma_size\n\nThe following codes have an implicit conversion from size_t to u32:\n(u32)max_size = (size_t)virtio_max_dma_size(vdev);\n\nThis may lead overflow, Ex (size_t)4G -> (u32)0. Once\nvirtio_max_dma_size() has a larger size than U32_MAX, use U32_MAX\ninstead.(CVE-2023-52762)\n\nIn the Linux kernel, the following vulnerability has been resolved:\n\nnet/smc: avoid data corruption caused by decline\n\nWe found a data corruption issue during testing of SMC-R on Redis\napplications.\n\nThe benchmark has a low probability of reporting a strange error as\nshown below.\n\n\"Error: Protocol error, got \"\\xe2\" as reply type byte\"\n\nFinally, we found that the retrieved error data was as follows:\n\n0xE2 0xD4 0xC3 0xD9 0x04 0x00 0x2C 0x20 0xA6 0x56 0x00 0x16 0x3E 0x0C\n0xCB 0x04 0x02 0x01 0x00 0x00 0x20 0x00 0x00 0x00 0x00 0x00 0x00 0x00\n0x00 0x00 0x00 0x00 0x00 0x00 0x00 0x00 0x00 0x00 0xE2\n\nIt is quite obvious that this is a SMC DECLINE message, which means that\nthe applications received SMC protocol message.\nWe found that this was caused by the following situations:\n\nclient                  server\n        ¦  clc proposal\n        ------------->\n        ¦  clc accept\n        <-------------\n        ¦  clc confirm\n        ------------->\nwait llc confirm\n\t\t\tsend llc confirm\n        ¦failed llc confirm\n        ¦   x------\n(after 2s)timeout\n                        wait llc confirm rsp\n\nwait decline\n\n(after 1s) timeout\n                        (after 2s) timeout\n        ¦   decline\n        -------------->\n        ¦   decline\n        <--------------\n\nAs a result, a decline message was sent in the implementation, and this\nmessage was read from TCP by the already-fallback connection.\n\nThis patch double the client timeout as 2x of the server value,\nWith this simple change, the Decline messages should never cross or\ncollide (during Confirm link timeout).\n\nThis issue requires an immediate solution, since the protocol updates\ninvolve a more long-term solution.(CVE-2023-52775)\n\nIn the Linux kernel, the following vulnerability has been resolved:\n\nSUNRPC: Fix RPC client cleaned up the freed pipefs dentries\n\nRPC client pipefs dentries cleanup is in separated rpc_remove_pipedir()\nworkqueue,which takes care about pipefs superblock locking.\nIn some special scenarios, when kernel frees the pipefs sb of the\ncurrent client and immediately alloctes a new pipefs sb,\nrpc_remove_pipedir function would misjudge the existence of pipefs\nsb which is not the one it used to hold. As a result,\nthe rpc_remove_pipedir would clean the released freed pipefs dentries.\n\nTo fix this issue, rpc_remove_pipedir should check whether the\ncurrent pipefs sb is consistent with the original pipefs sb.\n\nThis error can be catched by KASAN:\n=========================================================\n[  250.497700] BUG: KASAN: slab-use-after-free in dget_parent+0x195/0x200\n[  250.498315] Read of size 4 at addr ffff88800a2ab804 by task kworker/0:18/106503\n[  250.500549] Workqueue: events rpc_free_client_work\n[  250.501001] Call Trace:\n[  250.502880]  kasan_report+0xb6/0xf0\n[  250.503209]  ? dget_parent+0x195/0x200\n[  250.503561]  dget_parent+0x195/0x200\n[  250.503897]  ? __pfx_rpc_clntdir_depopulate+0x10/0x10\n[  250.504384]  rpc_rmdir_depopulate+0x1b/0x90\n[  250.504781]  rpc_remove_client_dir+0xf5/0x150\n[  250.505195]  rpc_free_client_work+0xe4/0x230\n[  250.505598]  process_one_work+0x8ee/0x13b0\n...\n[   22.039056] Allocated by task 244:\n[   22.039390]  kasan_save_stack+0x22/0x50\n[   22.039758]  kasan_set_track+0x25/0x30\n[   22.040109]  __kasan_slab_alloc+0x59/0x70\n[   22.040487]  kmem_cache_alloc_lru+0xf0/0x240\n[   22.040889]  __d_alloc+0x31/0x8e0\n[   22.041207]  d_alloc+0x44/0x1f0\n[   22.041514]  __rpc_lookup_create_exclusive+0x11c/0x140\n[   22.041987]  rpc_mkdir_populate.constprop.0+0x5f/0x110\n[   22.042459]  rpc_create_client_dir+0x34/0x150\n[   22.042874]  rpc_setup_pipedir_sb+0x102/0x1c0\n[   22.043284]  rpc_client_register+0x136/0x4e0\n[   22.043689]  rpc_new_client+0x911/0x1020\n[   22.044057]  rpc_create_xprt+0xcb/0x370\n[   22.044417]  rpc_create+0x36b/0x6c0\n...\n[   22.049524] Freed by task 0:\n[   22.049803]  kasan_save_stack+0x22/0x50\n[   22.050165]  kasan_set_track+0x25/0x30\n[   22.050520]  kasan_save_free_info+0x2b/0x50\n[   22.050921]  __kasan_slab_free+0x10e/0x1a0\n[   22.051306]  kmem_cache_free+0xa5/0x390\n[   22.051667]  rcu_core+0x62c/0x1930\n[   22.051995]  __do_softirq+0x165/0x52a\n[   22.052347]\n[   22.052503] Last potentially related work creation:\n[   22.052952]  kasan_save_stack+0x22/0x50\n[   22.053313]  __kasan_record_aux_stack+0x8e/0xa0\n[   22.053739]  __call_rcu_common.constprop.0+0x6b/0x8b0\n[   22.054209]  dentry_free+0xb2/0x140\n[   22.054540]  __dentry_kill+0x3be/0x540\n[   22.054900]  shrink_dentry_list+0x199/0x510\n[   22.055293]  shrink_dcache_parent+0x190/0x240\n[   22.055703]  do_one_tree+0x11/0x40\n[   22.056028]  shrink_dcache_for_umount+0x61/0x140\n[   22.056461]  generic_shutdown_super+0x70/0x590\n[   22.056879]  kill_anon_super+0x3a/0x60\n[   22.057234]  rpc_kill_sb+0x121/0x200(CVE-2023-52803)\n\nIn the Linux kernel, the following vulnerability has been resolved:\n\nfs/jfs: Add check for negative db_l2nbperpage\n\nl2nbperpage is log2(number of blks per page), and the minimum legal\nvalue should be 0, not negative.\n\nIn the case of l2nbperpage being negative, an error will occur\nwhen subsequently used as shift exponent.\n\nSyzbot reported this bug:\n\nUBSAN: shift-out-of-bounds in fs/jfs/jfs_dmap.c:799:12\nshift exponent -16777216 is negative(CVE-2023-52810)\n\nIn the Linux kernel, the following vulnerability has been resolved:\n\ntty: n_gsm: require CAP_NET_ADMIN to attach N_GSM0710 ldisc\n\nAny unprivileged user can attach N_GSM0710 ldisc, but it requires\nCAP_NET_ADMIN to create a GSM network anyway.\n\nRequire initial namespace CAP_NET_ADMIN to do that.(CVE-2023-52880)\n\nIn the Linux kernel, the following vulnerability has been resolved:\n\ntcp: do not accept ACK of bytes we never sent\n\nThis patch is based on a detailed report and ideas from Yepeng Pan\nand Christian Rossow.\n\nACK seq validation is currently following RFC 5961 5.2 guidelines:\n\n   The ACK value is considered acceptable only if\n   it is in the range of ((SND.UNA - MAX.SND.WND) <= SEG.ACK <=\n   SND.NXT).  All incoming segments whose ACK value doesn't satisfy the\n   above condition MUST be discarded and an ACK sent back.  It needs to\n   be noted that RFC 793 on page 72 (fifth check) says: \"If the ACK is a\n   duplicate (SEG.ACK < SND.UNA), it can be ignored.  If the ACK\n   acknowledges something not yet sent (SEG.ACK > SND.NXT) then send an\n   ACK, drop the segment, and return\".  The \"ignored\" above implies that\n   the processing of the incoming data segment continues, which means\n   the ACK value is treated as acceptable.  This mitigation makes the\n   ACK check more stringent since any ACK < SND.UNA wouldn't be\n   accepted, instead only ACKs that are in the range ((SND.UNA -\n   MAX.SND.WND) <= SEG.ACK <= SND.NXT) get through.\n\nThis can be refined for new (and possibly spoofed) flows,\nby not accepting ACK for bytes that were never sent.\n\nThis greatly improves TCP security at a little cost.\n\nI added a Fixes: tag to make sure this patch will reach stable trees,\neven if the 'blamed' patch was adhering to the RFC.\n\ntp->bytes_acked was added in linux-4.2\n\nFollowing packetdrill test (courtesy of Yepeng Pan) shows\nthe issue at hand:\n\n0 socket(..., SOCK_STREAM, IPPROTO_TCP) = 3\n+0 setsockopt(3, SOL_SOCKET, SO_REUSEADDR, [1], 4) = 0\n+0 bind(3, ..., ...) = 0\n+0 listen(3, 1024) = 0\n\n// ---------------- Handshake ------------------- //\n\n// when window scale is set to 14 the window size can be extended to\n// 65535 * (2^14) = 1073725440. Linux would accept an ACK packet\n// with ack number in (Server_ISN+1-1073725440. Server_ISN+1)\n// ,though this ack number acknowledges some data never\n// sent by the server.\n\n+0 < S 0:0(0) win 65535 <mss 1400,nop,wscale 14>\n+0 > S. 0:0(0) ack 1 <...>\n+0 < . 1:1(0) ack 1 win 65535\n+0 accept(3, ..., ...) = 4\n\n// For the established connection, we send an ACK packet,\n// the ack packet uses ack number 1 - 1073725300 + 2^32,\n// where 2^32 is used to wrap around.\n// Note: we used 1073725300 instead of 1073725440 to avoid possible\n// edge cases.\n// 1 - 1073725300 + 2^32 = 3221241997\n\n// Oops, old kernels happily accept this packet.\n+0 < . 1:1001(1000) ack 3221241997 win 65535\n\n// After the kernel fix the following will be replaced by a challenge ACK,\n// and prior malicious frame would be dropped.\n+0 > . 1:1(0) ack 1001(CVE-2023-52881)\n\nIn the Linux kernel, the following vulnerability has been resolved:\n\nnetfilter: nf_tables: set dormant flag on hook register failure\n\nWe need to set the dormant flag again if we fail to register\nthe hooks.\n\nDuring memory pressure hook registration can fail and we end up\nwith a table marked as active but no registered hooks.\n\nOn table/base chain deletion, nf_tables will attempt to unregister\nthe hook again which yields a warn splat from the nftables core.(CVE-2024-26835)\n\nIn the Linux kernel, the following vulnerability has been resolved:\n\nBluetooth: hci_core: Fix possible buffer overflow\n\nstruct hci_dev_info has a fixed size name[8] field so in the event that\nhdev->name is bigger than that strcpy would attempt to write past its\nsize, so this fixes this problem by switching to use strscpy.(CVE-2024-26889)\n\nIn the Linux kernel, the following vulnerability has been resolved:\n\nxen-netfront: Add missing skb_mark_for_recycle\n\nNotice that skb_mark_for_recycle() is introduced later than fixes tag in\ncommit 6a5bcd84e886 (\"page_pool: Allow drivers to hint on SKB recycling\").\n\nIt is believed that fixes tag were missing a call to page_pool_release_page()\nbetween v5.9 to v5.14, after which is should have used skb_mark_for_recycle().\nSince v6.6 the call page_pool_release_page() were removed (in\ncommit 535b9c61bdef (\"net: page_pool: hide page_pool_release_page()\")\nand remaining callers converted (in commit 6bfef2ec0172 (\"Merge branch\n'net-page_pool-remove-page_pool_release_page'\")).\n\nThis leak became visible in v6.8 via commit dba1b8a7ab68 (\"mm/page_pool: catch\npage_pool memory leaks\").(CVE-2024-27393)\n\nIn the Linux kernel, the following vulnerability has been resolved:\n\nphonet/pep: fix racy skb_queue_empty() use\n\nThe receive queues are protected by their respective spin-lock, not\nthe socket lock. This could lead to skb_peek() unexpectedly\nreturning NULL or a pointer to an already dequeued socket buffer.(CVE-2024-27402)\n\nIn the Linux kernel, the following vulnerability has been resolved:\n\ndmaengine: dw-edma: eDMA: Add sync read before starting the DMA transfer in remote setup\n\nThe Linked list element and pointer are not stored in the same memory as\nthe eDMA controller register. If the doorbell register is toggled before\nthe full write of the linked list a race condition error will occur.\nIn remote setup we can only use a readl to the memory to assure the full\nwrite has occurred.(CVE-2024-27408)\n\nIn the Linux kernel, the following vulnerability has been resolved:\n\nusb: typec: altmodes/displayport: create sysfs nodes as driver's default device attribute group\n\nThe DisplayPort driver's sysfs nodes may be present to the userspace before\ntypec_altmode_set_drvdata() completes in dp_altmode_probe. This means that\na sysfs read can trigger a NULL pointer error by deferencing dp->hpd in\nhpd_show or dp->lock in pin_assignment_show, as dev_get_drvdata() returns\nNULL in those cases.\n\nRemove manual sysfs node creation in favor of adding attribute group as\ndefault for devices bound to the driver. The ATTRIBUTE_GROUPS() macro is\nnot used here otherwise the path to the sysfs nodes is no longer compliant\nwith the ABI.(CVE-2024-35790)\n\nIn the Linux kernel, the following vulnerability has been resolved:\n\nPCI/PM: Drain runtime-idle callbacks before driver removal\n\nA race condition between the .runtime_idle() callback and the .remove()\ncallback in the rtsx_pcr PCI driver leads to a kernel crash due to an\nunhandled page fault [1].\n\nThe problem is that rtsx_pci_runtime_idle() is not expected to be running\nafter pm_runtime_get_sync() has been called, but the latter doesn't really\nguarantee that.  It only guarantees that the suspend and resume callbacks\nwill not be running when it returns.\n\nHowever, if a .runtime_idle() callback is already running when\npm_runtime_get_sync() is called, the latter will notice that the runtime PM\nstatus of the device is RPM_ACTIVE and it will return right away without\nwaiting for the former to complete.  In fact, it cannot wait for\n.runtime_idle() to complete because it may be called from that callback (it\narguably does not make much sense to do that, but it is not strictly\nprohibited).\n\nThus in general, whoever is providing a .runtime_idle() callback needs\nto protect it from running in parallel with whatever code runs after\npm_runtime_get_sync().  [Note that .runtime_idle() will not start after\npm_runtime_get_sync() has returned, but it may continue running then if it\nhas started earlier.]\n\nOne way to address that race condition is to call pm_runtime_barrier()\nafter pm_runtime_get_sync() (not before it, because a nonzero value of the\nruntime PM usage counter is necessary to prevent runtime PM callbacks from\nbeing invoked) to wait for the .runtime_idle() callback to complete should\nit be running at that point.  A suitable place for doing that is in\npci_device_remove() which calls pm_runtime_get_sync() before removing the\ndriver, so it may as well call pm_runtime_barrier() subsequently, which\nwill prevent the race in question from occurring, not just in the rtsx_pcr\ndriver, but in any PCI drivers providing .runtime_idle() callbacks.(CVE-2024-35809)\n\nIn the Linux kernel, the following vulnerability has been resolved:\n\nwifi: brcmfmac: Fix use-after-free bug in brcmf_cfg80211_detach\n\nThis is the candidate patch of CVE-2023-47233 :\nhttps://nvd.nist.gov/vuln/detail/CVE-2023-47233\n\nIn brcm80211 driver,it starts with the following invoking chain\nto start init a timeout worker:\n\n->brcmf_usb_probe\n  ->brcmf_usb_probe_cb\n    ->brcmf_attach\n      ->brcmf_bus_started\n        ->brcmf_cfg80211_attach\n          ->wl_init_priv\n            ->brcmf_init_escan\n              ->INIT_WORK(&cfg->escan_timeout_work,\n\t\t  brcmf_cfg80211_escan_timeout_worker);\n\nIf we disconnect the USB by hotplug, it will call\nbrcmf_usb_disconnect to make cleanup. The invoking chain is :\n\nbrcmf_usb_disconnect\n  ->brcmf_usb_disconnect_cb\n    ->brcmf_detach\n      ->brcmf_cfg80211_detach\n        ->kfree(cfg);\n\nWhile the timeout woker may still be running. This will cause\na use-after-free bug on cfg in brcmf_cfg80211_escan_timeout_worker.\n\nFix it by deleting the timer and canceling the worker in\nbrcmf_cfg80211_detach.\n\n[arend.vanspriel@broadcom.com: keep timer delete as is and cancel work just before free](CVE-2024-35811)\n\nIn the Linux kernel, the following vulnerability has been resolved:\n\nmlxsw: spectrum_acl_tcam: Fix memory leak during rehash\n\nThe rehash delayed work migrates filters from one region to another.\nThis is done by iterating over all chunks (all the filters with the same\npriority) in the region and in each chunk iterating over all the\nfilters.\n\nIf the migration fails, the code tries to migrate the filters back to\nthe old region. However, the rollback itself can also fail in which case\nanother migration will be erroneously performed. Besides the fact that\nthis ping pong is not a very good idea, it also creates a problem.\n\nEach virtual chunk references two chunks: The currently used one\n('vchunk->chunk') and a backup ('vchunk->chunk2'). During migration the\nfirst holds the chunk we want to migrate filters to and the second holds\nthe chunk we are migrating filters from.\n\nThe code currently assumes - but does not verify - that the backup chunk\ndoes not exist (NULL) if the currently used chunk does not reference the\ntarget region. This assumption breaks when we are trying to rollback a\nrollback, resulting in the backup chunk being overwritten and leaked\n[1].\n\nFix by not rolling back a failed rollback and add a warning to avoid\nfuture cases.\n\n[1]\nWARNING: CPU: 5 PID: 1063 at lib/parman.c:291 parman_destroy+0x17/0x20\nModules linked in:\nCPU: 5 PID: 1063 Comm: kworker/5:11 Tainted: G        W          6.9.0-rc2-custom-00784-gc6a05c468a0b #14\nHardware name: Mellanox Technologies Ltd. MSN3700/VMOD0005, BIOS 5.11 01/06/2019\nWorkqueue: mlxsw_core mlxsw_sp_acl_tcam_vregion_rehash_work\nRIP: 0010:parman_destroy+0x17/0x20\n[...]\nCall Trace:\n <TASK>\n mlxsw_sp_acl_atcam_region_fini+0x19/0x60\n mlxsw_sp_acl_tcam_region_destroy+0x49/0xf0\n mlxsw_sp_acl_tcam_vregion_rehash_work+0x1f1/0x470\n process_one_work+0x151/0x370\n worker_thread+0x2cb/0x3e0\n kthread+0xd0/0x100\n ret_from_fork+0x34/0x50\n ret_from_fork_asm+0x1a/0x30\n </TASK>(CVE-2024-35853)\n\nIn the Linux kernel, the following vulnerability has been resolved:\n\nmlxsw: spectrum_acl_tcam: Fix possible use-after-free during rehash\n\nThe rehash delayed work migrates filters from one region to another\naccording to the number of available credits.\n\nThe migrated from region is destroyed at the end of the work if the\nnumber of credits is non-negative as the assumption is that this is\nindicative of migration being complete. This assumption is incorrect as\na non-negative number of credits can also be the result of a failed\nmigration.\n\nThe destruction of a region that still has filters referencing it can\nresult in a use-after-free [1].\n\nFix by not destroying the region if migration failed.\n\n[1]\nBUG: KASAN: slab-use-after-free in mlxsw_sp_acl_ctcam_region_entry_remove+0x21d/0x230\nRead of size 8 at addr ffff8881735319e8 by task kworker/0:31/3858\n\nCPU: 0 PID: 3858 Comm: kworker/0:31 Tainted: G        W          6.9.0-rc2-custom-00782-gf2275c2157d8 #5\nHardware name: Mellanox Technologies Ltd. MSN3700/VMOD0005, BIOS 5.11 01/06/2019\nWorkqueue: mlxsw_core mlxsw_sp_acl_tcam_vregion_rehash_work\nCall Trace:\n <TASK>\n dump_stack_lvl+0xc6/0x120\n print_report+0xce/0x670\n kasan_report+0xd7/0x110\n mlxsw_sp_acl_ctcam_region_entry_remove+0x21d/0x230\n mlxsw_sp_acl_ctcam_entry_del+0x2e/0x70\n mlxsw_sp_acl_atcam_entry_del+0x81/0x210\n mlxsw_sp_acl_tcam_vchunk_migrate_all+0x3cd/0xb50\n mlxsw_sp_acl_tcam_vregion_rehash_work+0x157/0x1300\n process_one_work+0x8eb/0x19b0\n worker_thread+0x6c9/0xf70\n kthread+0x2c9/0x3b0\n ret_from_fork+0x4d/0x80\n ret_from_fork_asm+0x1a/0x30\n </TASK>\n\nAllocated by task 174:\n kasan_save_stack+0x33/0x60\n kasan_save_track+0x14/0x30\n __kasan_kmalloc+0x8f/0xa0\n __kmalloc+0x19c/0x360\n mlxsw_sp_acl_tcam_region_create+0xdf/0x9c0\n mlxsw_sp_acl_tcam_vregion_rehash_work+0x954/0x1300\n process_one_work+0x8eb/0x19b0\n worker_thread+0x6c9/0xf70\n kthread+0x2c9/0x3b0\n ret_from_fork+0x4d/0x80\n ret_from_fork_asm+0x1a/0x30\n\nFreed by task 7:\n kasan_save_stack+0x33/0x60\n kasan_save_track+0x14/0x30\n kasan_save_free_info+0x3b/0x60\n poison_slab_object+0x102/0x170\n __kasan_slab_free+0x14/0x30\n kfree+0xc1/0x290\n mlxsw_sp_acl_tcam_region_destroy+0x272/0x310\n mlxsw_sp_acl_tcam_vregion_rehash_work+0x731/0x1300\n process_one_work+0x8eb/0x19b0\n worker_thread+0x6c9/0xf70\n kthread+0x2c9/0x3b0\n ret_from_fork+0x4d/0x80\n ret_from_fork_asm+0x1a/0x30(CVE-2024-35854)\n\nIn the Linux kernel, the following vulnerability has been resolved:\n\nriscv: process: Fix kernel gp leakage\n\nchildregs represents the registers which are active for the new thread\nin user context. For a kernel thread, childregs->gp is never used since\nthe kernel gp is not touched by switch_to. For a user mode helper, the\ngp value can be observed in user space after execve or possibly by other\nmeans.\n\n[From the email thread]\n\nThe /* Kernel thread */ comment is somewhat inaccurate in that it is also used\nfor user_mode_helper threads, which exec a user process, e.g. /sbin/init or\nwhen /proc/sys/kernel/core_pattern is a pipe. Such threads do not have\nPF_KTHREAD set and are valid targets for ptrace etc. even before they exec.\n\nchildregs is the *user* context during syscall execution and it is observable\nfrom userspace in at least five ways:\n\n1. kernel_execve does not currently clear integer registers, so the starting\n   register state for PID 1 and other user processes started by the kernel has\n   sp = user stack, gp = kernel __global_pointer$, all other integer registers\n   zeroed by the memset in the patch comment.\n\n   This is a bug in its own right, but I'm unwilling to bet that it is the only\n   way to exploit the issue addressed by this patch.\n\n2. ptrace(PTRACE_GETREGSET): you can PTRACE_ATTACH to a user_mode_helper thread\n   before it execs, but ptrace requires SIGSTOP to be delivered which can only\n   happen at user/kernel boundaries.\n\n3. /proc/*/task/*/syscall: this is perfectly happy to read pt_regs for\n   user_mode_helpers before the exec completes, but gp is not one of the\n   registers it returns.\n\n4. PERF_SAMPLE_REGS_USER: LOCKDOWN_PERF normally prevents access to kernel\n   addresses via PERF_SAMPLE_REGS_INTR, but due to this bug kernel addresses\n   are also exposed via PERF_SAMPLE_REGS_USER which is permitted under\n   LOCKDOWN_PERF. I have not attempted to write exploit code.\n\n5. Much of the tracing infrastructure allows access to user registers. I have\n   not attempted to determine which forms of tracing allow access to user\n   registers without already allowing access to kernel registers.(CVE-2024-35871)\n\nIn the Linux kernel, the following vulnerability has been resolved:\n\nerspan: make sure erspan_base_hdr is present in skb->head\n\nsyzbot reported a problem in ip6erspan_rcv() [1]\n\nIssue is that ip6erspan_rcv() (and erspan_rcv()) no longer make\nsure erspan_base_hdr is present in skb linear part (skb->head)\nbefore getting @ver field from it.\n\nAdd the missing pskb_may_pull() calls.\n\nv2: Reload iph pointer in erspan_rcv() after pskb_may_pull()\n    because skb->head might have changed.\n\n[1]\n\n BUG: KMSAN: uninit-value in pskb_may_pull_reason include/linux/skbuff.h:2742 [inline]\n BUG: KMSAN: uninit-value in pskb_may_pull include/linux/skbuff.h:2756 [inline]\n BUG: KMSAN: uninit-value in ip6erspan_rcv net/ipv6/ip6_gre.c:541 [inline]\n BUG: KMSAN: uninit-value in gre_rcv+0x11f8/0x1930 net/ipv6/ip6_gre.c:610\n  pskb_may_pull_reason include/linux/skbuff.h:2742 [inline]\n  pskb_may_pull include/linux/skbuff.h:2756 [inline]\n  ip6erspan_rcv net/ipv6/ip6_gre.c:541 [inline]\n  gre_rcv+0x11f8/0x1930 net/ipv6/ip6_gre.c:610\n  ip6_protocol_deliver_rcu+0x1d4c/0x2ca0 net/ipv6/ip6_input.c:438\n  ip6_input_finish net/ipv6/ip6_input.c:483 [inline]\n  NF_HOOK include/linux/netfilter.h:314 [inline]\n  ip6_input+0x15d/0x430 net/ipv6/ip6_input.c:492\n  ip6_mc_input+0xa7e/0xc80 net/ipv6/ip6_input.c:586\n  dst_input include/net/dst.h:460 [inline]\n  ip6_rcv_finish+0x955/0x970 net/ipv6/ip6_input.c:79\n  NF_HOOK include/linux/netfilter.h:314 [inline]\n  ipv6_rcv+0xde/0x390 net/ipv6/ip6_input.c:310\n  __netif_receive_skb_one_core net/core/dev.c:5538 [inline]\n  __netif_receive_skb+0x1da/0xa00 net/core/dev.c:5652\n  netif_receive_skb_internal net/core/dev.c:5738 [inline]\n  netif_receive_skb+0x58/0x660 net/core/dev.c:5798\n  tun_rx_batched+0x3ee/0x980 drivers/net/tun.c:1549\n  tun_get_user+0x5566/0x69e0 drivers/net/tun.c:2002\n  tun_chr_write_iter+0x3af/0x5d0 drivers/net/tun.c:2048\n  call_write_iter include/linux/fs.h:2108 [inline]\n  new_sync_write fs/read_write.c:497 [inline]\n  vfs_write+0xb63/0x1520 fs/read_write.c:590\n  ksys_write+0x20f/0x4c0 fs/read_write.c:643\n  __do_sys_write fs/read_write.c:655 [inline]\n  __se_sys_write fs/read_write.c:652 [inline]\n  __x64_sys_write+0x93/0xe0 fs/read_write.c:652\n do_syscall_64+0xd5/0x1f0\n entry_SYSCALL_64_after_hwframe+0x6d/0x75\n\nUninit was created at:\n  slab_post_alloc_hook mm/slub.c:3804 [inline]\n  slab_alloc_node mm/slub.c:3845 [inline]\n  kmem_cache_alloc_node+0x613/0xc50 mm/slub.c:3888\n  kmalloc_reserve+0x13d/0x4a0 net/core/skbuff.c:577\n  __alloc_skb+0x35b/0x7a0 net/core/skbuff.c:668\n  alloc_skb include/linux/skbuff.h:1318 [inline]\n  alloc_skb_with_frags+0xc8/0xbf0 net/core/skbuff.c:6504\n  sock_alloc_send_pskb+0xa81/0xbf0 net/core/sock.c:2795\n  tun_alloc_skb drivers/net/tun.c:1525 [inline]\n  tun_get_user+0x209a/0x69e0 drivers/net/tun.c:1846\n  tun_chr_write_iter+0x3af/0x5d0 drivers/net/tun.c:2048\n  call_write_iter include/linux/fs.h:2108 [inline]\n  new_sync_write fs/read_write.c:497 [inline]\n  vfs_write+0xb63/0x1520 fs/read_write.c:590\n  ksys_write+0x20f/0x4c0 fs/read_write.c:643\n  __do_sys_write fs/read_write.c:655 [inline]\n  __se_sys_write fs/read_write.c:652 [inline]\n  __x64_sys_write+0x93/0xe0 fs/read_write.c:652\n do_syscall_64+0xd5/0x1f0\n entry_SYSCALL_64_after_hwframe+0x6d/0x75\n\nCPU: 1 PID: 5045 Comm: syz-executor114 Not tainted 6.9.0-rc1-syzkaller-00021-g962490525cff #0(CVE-2024-35888)\n\nIn the Linux kernel, the following vulnerability has been resolved:\n\nbpf, sockmap: Prevent lock inversion deadlock in map delete elem\n\nsyzkaller started using corpuses where a BPF tracing program deletes\nelements from a sockmap/sockhash map. Because BPF tracing programs can be\ninvoked from any interrupt context, locks taken during a map_delete_elem\noperation must be hardirq-safe. Otherwise a deadlock due to lock inversion\nis possible, as reported by lockdep:\n\n       CPU0                    CPU1\n       ----                    ----\n  lock(&htab->buckets[i].lock);\n                               local_irq_disable();\n                               lock(&host->lock);\n                               lock(&htab->buckets[i].lock);\n  <Interrupt>\n    lock(&host->lock);\n\nLocks in sockmap are hardirq-unsafe by design. We expects elements to be\ndeleted from sockmap/sockhash only in task (normal) context with interrupts\nenabled, or in softirq context.\n\nDetect when map_delete_elem operation is invoked from a context which is\n_not_ hardirq-unsafe, that is interrupts are disabled, and bail out with an\nerror.\n\nNote that map updates are not affected by this issue. BPF verifier does not\nallow updating sockmap/sockhash from a BPF tracing program today.(CVE-2024-35895)\n\nIn the Linux kernel, the following vulnerability has been resolved:\n\nnetfilter: validate user input for expected length\n\nI got multiple syzbot reports showing old bugs exposed\nby BPF after commit 20f2505fb436 (\"bpf: Try to avoid kzalloc\nin cgroup/{s,g}etsockopt\")\n\nsetsockopt() @optlen argument should be taken into account\nbefore copying data.\n\n BUG: KASAN: slab-out-of-bounds in copy_from_sockptr_offset include/linux/sockptr.h:49 [inline]\n BUG: KASAN: slab-out-of-bounds in copy_from_sockptr include/linux/sockptr.h:55 [inline]\n BUG: KASAN: slab-out-of-bounds in do_replace net/ipv4/netfilter/ip_tables.c:1111 [inline]\n BUG: KASAN: slab-out-of-bounds in do_ipt_set_ctl+0x902/0x3dd0 net/ipv4/netfilter/ip_tables.c:1627\nRead of size 96 at addr ffff88802cd73da0 by task syz-executor.4/7238\n\nCPU: 1 PID: 7238 Comm: syz-executor.4 Not tainted 6.9.0-rc2-next-20240403-syzkaller #0\nHardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 03/27/2024\nCall Trace:\n <TASK>\n  __dump_stack lib/dump_stack.c:88 [inline]\n  dump_stack_lvl+0x241/0x360 lib/dump_stack.c:114\n  print_address_description mm/kasan/report.c:377 [inline]\n  print_report+0x169/0x550 mm/kasan/report.c:488\n  kasan_report+0x143/0x180 mm/kasan/report.c:601\n  kasan_check_range+0x282/0x290 mm/kasan/generic.c:189\n  __asan_memcpy+0x29/0x70 mm/kasan/shadow.c:105\n  copy_from_sockptr_offset include/linux/sockptr.h:49 [inline]\n  copy_from_sockptr include/linux/sockptr.h:55 [inline]\n  do_replace net/ipv4/netfilter/ip_tables.c:1111 [inline]\n  do_ipt_set_ctl+0x902/0x3dd0 net/ipv4/netfilter/ip_tables.c:1627\n  nf_setsockopt+0x295/0x2c0 net/netfilter/nf_sockopt.c:101\n  do_sock_setsockopt+0x3af/0x720 net/socket.c:2311\n  __sys_setsockopt+0x1ae/0x250 net/socket.c:2334\n  __do_sys_setsockopt net/socket.c:2343 [inline]\n  __se_sys_setsockopt net/socket.c:2340 [inline]\n  __x64_sys_setsockopt+0xb5/0xd0 net/socket.c:2340\n do_syscall_64+0xfb/0x240\n entry_SYSCALL_64_after_hwframe+0x72/0x7a\nRIP: 0033:0x7fd22067dde9\nCode: 28 00 00 00 75 05 48 83 c4 28 c3 e8 e1 20 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b0 ff ff ff f7 d8 64 89 01 48\nRSP: 002b:00007fd21f9ff0c8 EFLAGS: 00000246 ORIG_RAX: 0000000000000036\nRAX: ffffffffffffffda RBX: 00007fd2207abf80 RCX: 00007fd22067dde9\nRDX: 0000000000000040 RSI: 0000000000000000 RDI: 0000000000000003\nRBP: 00007fd2206ca47a R08: 0000000000000001 R09: 0000000000000000\nR10: 0000000020000880 R11: 0000000000000246 R12: 0000000000000000\nR13: 000000000000000b R14: 00007fd2207abf80 R15: 00007ffd2d0170d8\n </TASK>\n\nAllocated by task 7238:\n  kasan_save_stack mm/kasan/common.c:47 [inline]\n  kasan_save_track+0x3f/0x80 mm/kasan/common.c:68\n  poison_kmalloc_redzone mm/kasan/common.c:370 [inline]\n  __kasan_kmalloc+0x98/0xb0 mm/kasan/common.c:387\n  kasan_kmalloc include/linux/kasan.h:211 [inline]\n  __do_kmalloc_node mm/slub.c:4069 [inline]\n  __kmalloc_noprof+0x200/0x410 mm/slub.c:4082\n  kmalloc_noprof include/linux/slab.h:664 [inline]\n  __cgroup_bpf_run_filter_setsockopt+0xd47/0x1050 kernel/bpf/cgroup.c:1869\n  do_sock_setsockopt+0x6b4/0x720 net/socket.c:2293\n  __sys_setsockopt+0x1ae/0x250 net/socket.c:2334\n  __do_sys_setsockopt net/socket.c:2343 [inline]\n  __se_sys_setsockopt net/socket.c:2340 [inline]\n  __x64_sys_setsockopt+0xb5/0xd0 net/socket.c:2340\n do_syscall_64+0xfb/0x240\n entry_SYSCALL_64_after_hwframe+0x72/0x7a\n\nThe buggy address belongs to the object at ffff88802cd73da0\n which belongs to the cache kmalloc-8 of size 8\nThe buggy address is located 0 bytes inside of\n allocated 1-byte region [ffff88802cd73da0, ffff88802cd73da1)\n\nThe buggy address belongs to the physical page:\npage: refcount:1 mapcount:0 mapping:0000000000000000 index:0xffff88802cd73020 pfn:0x2cd73\nflags: 0xfff80000000000(node=0|zone=1|lastcpupid=0xfff)\npage_type: 0xffffefff(slab)\nraw: 00fff80000000000 ffff888015041280 dead000000000100 dead000000000122\nraw: ffff88802cd73020 000000008080007f 00000001ffffefff 00\n---truncated---(CVE-2024-35896)\n\nIn the Linux kernel, the following vulnerability has been resolved:\n\nbpf: Protect against int overflow for stack access size\n\nThis patch re-introduces protection against the size of access to stack\nmemory being negative; the access size can appear negative as a result\nof overflowing its signed int representation. This should not actually\nhappen, as there are other protections along the way, but we should\nprotect against it anyway. One code path was missing such protections\n(fixed in the previous patch in the series), causing out-of-bounds array\naccesses in check_stack_range_initialized(). This patch causes the\nverification of a program with such a non-sensical access size to fail.\n\nThis check used to exist in a more indirect way, but was inadvertendly\nremoved in a833a17aeac7.(CVE-2024-35905)\n\nIn the Linux kernel, the following vulnerability has been resolved:\n\nusb: typec: ucsi: Limit read size on v1.2\n\nBetween UCSI 1.2 and UCSI 2.0, the size of the MESSAGE_IN region was\nincreased from 16 to 256. In order to avoid overflowing reads for older\nsystems, add a mechanism to use the read UCSI version to truncate read\nsizes on UCSI v1.2.(CVE-2024-35924)\n\nIn the Linux kernel, the following vulnerability has been resolved:\n\nBluetooth: SCO: Fix not validating setsockopt user input\n\nsyzbot reported sco_sock_setsockopt() is copying data without\nchecking user input length.\n\nBUG: KASAN: slab-out-of-bounds in copy_from_sockptr_offset\ninclude/linux/sockptr.h:49 [inline]\nBUG: KASAN: slab-out-of-bounds in copy_from_sockptr\ninclude/linux/sockptr.h:55 [inline]\nBUG: KASAN: slab-out-of-bounds in sco_sock_setsockopt+0xc0b/0xf90\nnet/bluetooth/sco.c:893\nRead of size 4 at addr ffff88805f7b15a3 by task syz-executor.5/12578(CVE-2024-35967)\n\nIn the Linux kernel, the following vulnerability has been resolved:\n\ngeneve: fix header validation in geneve[6]_xmit_skb\n\nsyzbot is able to trigger an uninit-value in geneve_xmit() [1]\n\nProblem : While most ip tunnel helpers (like ip_tunnel_get_dsfield())\nuses skb_protocol(skb, true), pskb_inet_may_pull() is only using\nskb->protocol.\n\nIf anything else than ETH_P_IPV6 or ETH_P_IP is found in skb->protocol,\npskb_inet_may_pull() does nothing at all.\n\nIf a vlan tag was provided by the caller (af_packet in the syzbot case),\nthe network header might not point to the correct location, and skb\nlinear part could be smaller than expected.\n\nAdd skb_vlan_inet_prepare() to perform a complete mac validation.\n\nUse this in geneve for the moment, I suspect we need to adopt this\nmore broadly.\n\nv4 - Jakub reported v3 broke l2_tos_ttl_inherit.sh selftest\n   - Only call __vlan_get_protocol() for vlan types.\n\nv2,v3 - Addressed Sabrina comments on v1 and v2\n\n[1]\n\nBUG: KMSAN: uninit-value in geneve_xmit_skb drivers/net/geneve.c:910 [inline]\n BUG: KMSAN: uninit-value in geneve_xmit+0x302d/0x5420 drivers/net/geneve.c:1030\n  geneve_xmit_skb drivers/net/geneve.c:910 [inline]\n  geneve_xmit+0x302d/0x5420 drivers/net/geneve.c:1030\n  __netdev_start_xmit include/linux/netdevice.h:4903 [inline]\n  netdev_start_xmit include/linux/netdevice.h:4917 [inline]\n  xmit_one net/core/dev.c:3531 [inline]\n  dev_hard_start_xmit+0x247/0xa20 net/core/dev.c:3547\n  __dev_queue_xmit+0x348d/0x52c0 net/core/dev.c:4335\n  dev_queue_xmit include/linux/netdevice.h:3091 [inline]\n  packet_xmit+0x9c/0x6c0 net/packet/af_packet.c:276\n  packet_snd net/packet/af_packet.c:3081 [inline]\n  packet_sendmsg+0x8bb0/0x9ef0 net/packet/af_packet.c:3113\n  sock_sendmsg_nosec net/socket.c:730 [inline]\n  __sock_sendmsg+0x30f/0x380 net/socket.c:745\n  __sys_sendto+0x685/0x830 net/socket.c:2191\n  __do_sys_sendto net/socket.c:2203 [inline]\n  __se_sys_sendto net/socket.c:2199 [inline]\n  __x64_sys_sendto+0x125/0x1d0 net/socket.c:2199\n do_syscall_64+0xd5/0x1f0\n entry_SYSCALL_64_after_hwframe+0x6d/0x75\n\nUninit was created at:\n  slab_post_alloc_hook mm/slub.c:3804 [inline]\n  slab_alloc_node mm/slub.c:3845 [inline]\n  kmem_cache_alloc_node+0x613/0xc50 mm/slub.c:3888\n  kmalloc_reserve+0x13d/0x4a0 net/core/skbuff.c:577\n  __alloc_skb+0x35b/0x7a0 net/core/skbuff.c:668\n  alloc_skb include/linux/skbuff.h:1318 [inline]\n  alloc_skb_with_frags+0xc8/0xbf0 net/core/skbuff.c:6504\n  sock_alloc_send_pskb+0xa81/0xbf0 net/core/sock.c:2795\n  packet_alloc_skb net/packet/af_packet.c:2930 [inline]\n  packet_snd net/packet/af_packet.c:3024 [inline]\n  packet_sendmsg+0x722d/0x9ef0 net/packet/af_packet.c:3113\n  sock_sendmsg_nosec net/socket.c:730 [inline]\n  __sock_sendmsg+0x30f/0x380 net/socket.c:745\n  __sys_sendto+0x685/0x830 net/socket.c:2191\n  __do_sys_sendto net/socket.c:2203 [inline]\n  __se_sys_sendto net/socket.c:2199 [inline]\n  __x64_sys_sendto+0x125/0x1d0 net/socket.c:2199\n do_syscall_64+0xd5/0x1f0\n entry_SYSCALL_64_after_hwframe+0x6d/0x75\n\nCPU: 0 PID: 5033 Comm: syz-executor346 Not tainted 6.9.0-rc1-syzkaller-00005-g928a87efa423 #0\nHardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/29/2024(CVE-2024-35973)\n\nIn the Linux kernel, the following vulnerability has been resolved:\n\nbatman-adv: Avoid infinite loop trying to resize local TT\n\nIf the MTU of one of an attached interface becomes too small to transmit\nthe local translation table then it must be resized to fit inside all\nfragments (when enabled) or a single packet.\n\nBut if the MTU becomes too low to transmit even the header + the VLAN\nspecific part then the resizing of the local TT will never succeed. This\ncan for example happen when the usable space is 110 bytes and 11 VLANs are\non top of batman-adv. In this case, at least 116 byte would be needed.\nThere will just be an endless spam of\n\n   batman_adv: batadv0: Forced to purge local tt entries to fit new maximum fragment MTU (110)\n\nin the log but the function will never finish. Problem here is that the\ntimeout will be halved all the time and will then stagnate at 0 and\ntherefore never be able to reduce the table even more.\n\nThere are other scenarios possible with a similar result. The number of\nBATADV_TT_CLIENT_NOPURGE entries in the local TT can for example be too\nhigh to fit inside a packet. Such a scenario can therefore happen also with\nonly a single VLAN + 7 non-purgable addresses - requiring at least 120\nbytes.\n\nWhile this should be handled proactively when:\n\n* interface with too low MTU is added\n* VLAN is added\n* non-purgeable local mac is added\n* MTU of an attached interface is reduced\n* fragmentation setting gets disabled (which most likely requires dropping\n  attached interfaces)\n\nnot all of these scenarios can be prevented because batman-adv is only\nconsuming events without the the possibility to prevent these actions\n(non-purgable MAC address added, MTU of an attached interface is reduced).\nIt is therefore necessary to also make sure that the code is able to handle\nalso the situations when there were already incompatible system\nconfiguration are present.(CVE-2024-35982)\n\nIn the Linux kernel, the following vulnerability has been resolved:\n\ni2c: smbus: fix NULL function pointer dereference\n\nBaruch reported an OOPS when using the designware controller as target\nonly. Target-only modes break the assumption of one transfer function\nalways being available. Fix this by always checking the pointer in\n__i2c_transfer.\n\n[wsa: dropped the simplification in core-smbus to avoid theoretical regressions](CVE-2024-35984)\n\nIn the Linux kernel, the following vulnerability has been resolved:\n\nrtnetlink: Correct nested IFLA_VF_VLAN_LIST attribute validation\n\nEach attribute inside a nested IFLA_VF_VLAN_LIST is assumed to be a\nstruct ifla_vf_vlan_info so the size of such attribute needs to be at least\nof sizeof(struct ifla_vf_vlan_info) which is 14 bytes.\nThe current size validation in do_setvfinfo is against NLA_HDRLEN (4 bytes)\nwhich is less than sizeof(struct ifla_vf_vlan_info) so this validation\nis not enough and a too small attribute might be cast to a\nstruct ifla_vf_vlan_info, this might result in an out of bands\nread access when accessing the saved (casted) entry in ivvl.(CVE-2024-36017)\n\nIn the Linux kernel, the following vulnerability has been resolved:\n\nmmc: sdhci-msm: pervent access to suspended controller\n\nGeneric sdhci code registers LED device and uses host->runtime_suspended\nflag to protect access to it. The sdhci-msm driver doesn't set this flag,\nwhich causes a crash when LED is accessed while controller is runtime\nsuspended. Fix this by setting the flag correctly.(CVE-2024-36029)\n\nIn the Linux kernel, the following vulnerability has been resolved:\n\nnet: fix out-of-bounds access in ops_init\n\nnet_alloc_generic is called by net_alloc, which is called without any\nlocking. It reads max_gen_ptrs, which is changed under pernet_ops_rwsem. It\nis read twice, first to allocate an array, then to set s.len, which is\nlater used to limit the bounds of the array access.\n\nIt is possible that the array is allocated and another thread is\nregistering a new pernet ops, increments max_gen_ptrs, which is then used\nto set s.len with a larger than allocated length for the variable array.\n\nFix it by reading max_gen_ptrs only once in net_alloc_generic. If\nmax_gen_ptrs is later incremented, it will be caught in net_assign_generic.(CVE-2024-36883)\n\nIn the Linux kernel, the following vulnerability has been resolved:\n\ntipc: fix UAF in error path\n\nSam Page (sam4k) working with Trend Micro Zero Day Initiative reported\na UAF in the tipc_buf_append() error path:\n\nBUG: KASAN: slab-use-after-free in kfree_skb_list_reason+0x47e/0x4c0\nlinux/net/core/skbuff.c:1183\nRead of size 8 at addr ffff88804d2a7c80 by task poc/8034\n\nCPU: 1 PID: 8034 Comm: poc Not tainted 6.8.2 #1\nHardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS\n1.16.0-debian-1.16.0-5 04/01/2014\nCall Trace:\n <IRQ>\n __dump_stack linux/lib/dump_stack.c:88\n dump_stack_lvl+0xd9/0x1b0 linux/lib/dump_stack.c:106\n print_address_description linux/mm/kasan/report.c:377\n print_report+0xc4/0x620 linux/mm/kasan/report.c:488\n kasan_report+0xda/0x110 linux/mm/kasan/report.c:601\n kfree_skb_list_reason+0x47e/0x4c0 linux/net/core/skbuff.c:1183\n skb_release_data+0x5af/0x880 linux/net/core/skbuff.c:1026\n skb_release_all linux/net/core/skbuff.c:1094\n __kfree_skb linux/net/core/skbuff.c:1108\n kfree_skb_reason+0x12d/0x210 linux/net/core/skbuff.c:1144\n kfree_skb linux/./include/linux/skbuff.h:1244\n tipc_buf_append+0x425/0xb50 linux/net/tipc/msg.c:186\n tipc_link_input+0x224/0x7c0 linux/net/tipc/link.c:1324\n tipc_link_rcv+0x76e/0x2d70 linux/net/tipc/link.c:1824\n tipc_rcv+0x45f/0x10f0 linux/net/tipc/node.c:2159\n tipc_udp_recv+0x73b/0x8f0 linux/net/tipc/udp_media.c:390\n udp_queue_rcv_one_skb+0xad2/0x1850 linux/net/ipv4/udp.c:2108\n udp_queue_rcv_skb+0x131/0xb00 linux/net/ipv4/udp.c:2186\n udp_unicast_rcv_skb+0x165/0x3b0 linux/net/ipv4/udp.c:2346\n __udp4_lib_rcv+0x2594/0x3400 linux/net/ipv4/udp.c:2422\n ip_protocol_deliver_rcu+0x30c/0x4e0 linux/net/ipv4/ip_input.c:205\n ip_local_deliver_finish+0x2e4/0x520 linux/net/ipv4/ip_input.c:233\n NF_HOOK linux/./include/linux/netfilter.h:314\n NF_HOOK linux/./include/linux/netfilter.h:308\n ip_local_deliver+0x18e/0x1f0 linux/net/ipv4/ip_input.c:254\n dst_input linux/./include/net/dst.h:461\n ip_rcv_finish linux/net/ipv4/ip_input.c:449\n NF_HOOK linux/./include/linux/netfilter.h:314\n NF_HOOK linux/./include/linux/netfilter.h:308\n ip_rcv+0x2c5/0x5d0 linux/net/ipv4/ip_input.c:569\n __netif_receive_skb_one_core+0x199/0x1e0 linux/net/core/dev.c:5534\n __netif_receive_skb+0x1f/0x1c0 linux/net/core/dev.c:5648\n process_backlog+0x101/0x6b0 linux/net/core/dev.c:5976\n __napi_poll.constprop.0+0xba/0x550 linux/net/core/dev.c:6576\n napi_poll linux/net/core/dev.c:6645\n net_rx_action+0x95a/0xe90 linux/net/core/dev.c:6781\n __do_softirq+0x21f/0x8e7 linux/kernel/softirq.c:553\n do_softirq linux/kernel/softirq.c:454\n do_softirq+0xb2/0xf0 linux/kernel/softirq.c:441\n </IRQ>\n <TASK>\n __local_bh_enable_ip+0x100/0x120 linux/kernel/softirq.c:381\n local_bh_enable linux/./include/linux/bottom_half.h:33\n rcu_read_unlock_bh linux/./include/linux/rcupdate.h:851\n __dev_queue_xmit+0x871/0x3ee0 linux/net/core/dev.c:4378\n dev_queue_xmit linux/./include/linux/netdevice.h:3169\n neigh_hh_output linux/./include/net/neighbour.h:526\n neigh_output linux/./include/net/neighbour.h:540\n ip_finish_output2+0x169f/0x2550 linux/net/ipv4/ip_output.c:235\n __ip_finish_output linux/net/ipv4/ip_output.c:313\n __ip_finish_output+0x49e/0x950 linux/net/ipv4/ip_output.c:295\n ip_finish_output+0x31/0x310 linux/net/ipv4/ip_output.c:323\n NF_HOOK_COND linux/./include/linux/netfilter.h:303\n ip_output+0x13b/0x2a0 linux/net/ipv4/ip_output.c:433\n dst_output linux/./include/net/dst.h:451\n ip_local_out linux/net/ipv4/ip_output.c:129\n ip_send_skb+0x3e5/0x560 linux/net/ipv4/ip_output.c:1492\n udp_send_skb+0x73f/0x1530 linux/net/ipv4/udp.c:963\n udp_sendmsg+0x1a36/0x2b40 linux/net/ipv4/udp.c:1250\n inet_sendmsg+0x105/0x140 linux/net/ipv4/af_inet.c:850\n sock_sendmsg_nosec linux/net/socket.c:730\n __sock_sendmsg linux/net/socket.c:745\n __sys_sendto+0x42c/0x4e0 linux/net/socket.c:2191\n __do_sys_sendto linux/net/socket.c:2203\n __se_sys_sendto linux/net/socket.c:2199\n __x64_sys_sendto+0xe0/0x1c0 linux/net/socket.c:2199\n do_syscall_x64 linux/arch/x86/entry/common.c:52\n do_syscall_\n---truncated---(CVE-2024-36886)\n\nIn the Linux kernel, the following vulnerability has been resolved:\n\nmptcp: ensure snd_nxt is properly initialized on connect\n\nChristoph reported a splat hinting at a corrupted snd_una:\n\n  WARNING: CPU: 1 PID: 38 at net/mptcp/protocol.c:1005 __mptcp_clean_una+0x4b3/0x620 net/mptcp/protocol.c:1005\n  Modules linked in:\n  CPU: 1 PID: 38 Comm: kworker/1:1 Not tainted 6.9.0-rc1-gbbeac67456c9 #59\n  Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.11.0-2.el7 04/01/2014\n  Workqueue: events mptcp_worker\n  RIP: 0010:__mptcp_clean_una+0x4b3/0x620 net/mptcp/protocol.c:1005\n  Code: be 06 01 00 00 bf 06 01 00 00 e8 a8 12 e7 fe e9 00 fe ff ff e8\n  \t8e 1a e7 fe 0f b7 ab 3e 02 00 00 e9 d3 fd ff ff e8 7d 1a e7 fe\n  \t<0f> 0b 4c 8b bb e0 05 00 00 e9 74 fc ff ff e8 6a 1a e7 fe 0f 0b e9\n  RSP: 0018:ffffc9000013fd48 EFLAGS: 00010293\n  RAX: 0000000000000000 RBX: ffff8881029bd280 RCX: ffffffff82382fe4\n  RDX: ffff8881003cbd00 RSI: ffffffff823833c3 RDI: 0000000000000001\n  RBP: 0000000000000000 R08: 0000000000000001 R09: 0000000000000000\n  R10: 0000000000000000 R11: fefefefefefefeff R12: ffff888138ba8000\n  R13: 0000000000000106 R14: ffff8881029bd908 R15: ffff888126560000\n  FS:  0000000000000000(0000) GS:ffff88813bd00000(0000) knlGS:0000000000000000\n  CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033\n  CR2: 00007f604a5dae38 CR3: 0000000101dac002 CR4: 0000000000170ef0\n  Call Trace:\n   <TASK>\n   __mptcp_clean_una_wakeup net/mptcp/protocol.c:1055 [inline]\n   mptcp_clean_una_wakeup net/mptcp/protocol.c:1062 [inline]\n   __mptcp_retrans+0x7f/0x7e0 net/mptcp/protocol.c:2615\n   mptcp_worker+0x434/0x740 net/mptcp/protocol.c:2767\n   process_one_work+0x1e0/0x560 kernel/workqueue.c:3254\n   process_scheduled_works kernel/workqueue.c:3335 [inline]\n   worker_thread+0x3c7/0x640 kernel/workqueue.c:3416\n   kthread+0x121/0x170 kernel/kthread.c:388\n   ret_from_fork+0x44/0x50 arch/x86/kernel/process.c:147\n   ret_from_fork_asm+0x1a/0x30 arch/x86/entry/entry_64.S:243\n   </TASK>\n\nWhen fallback to TCP happens early on a client socket, snd_nxt\nis not yet initialized and any incoming ack will copy such value\ninto snd_una. If the mptcp worker (dumbly) tries mptcp-level\nre-injection after such ack, that would unconditionally trigger a send\nbuffer cleanup using 'bad' snd_una values.\n\nWe could easily disable re-injection for fallback sockets, but such\ndumb behavior already helped catching a few subtle issues and a very\nlow to zero impact in practice.\n\nInstead address the issue always initializing snd_nxt (and write_seq,\nfor consistency) at connect time.(CVE-2024-36889)\n\nIn the Linux kernel, the following vulnerability has been resolved:\n\ngpiolib: cdev: fix uninitialised kfifo\n\nIf a line is requested with debounce, and that results in debouncing\nin software, and the line is subsequently reconfigured to enable edge\ndetection then the allocation of the kfifo to contain edge events is\noverlooked.  This results in events being written to and read from an\nuninitialised kfifo.  Read events are returned to userspace.\n\nInitialise the kfifo in the case where the software debounce is\nalready active.(CVE-2024-36898)\n\nIn the Linux kernel, the following vulnerability has been resolved:\n\ngpiolib: cdev: Fix use after free in lineinfo_changed_notify\n\nThe use-after-free issue occurs as follows: when the GPIO chip device file\nis being closed by invoking gpio_chrdev_release(), watched_lines is freed\nby bitmap_free(), but the unregistration of lineinfo_changed_nb notifier\nchain failed due to waiting write rwsem. Additionally, one of the GPIO\nchip's lines is also in the release process and holds the notifier chain's\nread rwsem. Consequently, a race condition leads to the use-after-free of\nwatched_lines.\n\nHere is the typical stack when issue happened:\n\n[free]\ngpio_chrdev_release()\n  --> bitmap_free(cdev->watched_lines)                  <-- freed\n  --> blocking_notifier_chain_unregister()\n    --> down_write(&nh->rwsem)                          <-- waiting rwsem\n          --> __down_write_common()\n            --> rwsem_down_write_slowpath()\n                  --> schedule_preempt_disabled()\n                    --> schedule()\n\n[use]\nst54spi_gpio_dev_release()\n  --> gpio_free()\n    --> gpiod_free()\n      --> gpiod_free_commit()\n        --> gpiod_line_state_notify()\n          --> blocking_notifier_call_chain()\n            --> down_read(&nh->rwsem);                  <-- held rwsem\n            --> notifier_call_chain()\n              --> lineinfo_changed_notify()\n                --> test_bit(xxxx, cdev->watched_lines) <-- use after free\n\nThe side effect of the use-after-free issue is that a GPIO line event is\nbeing generated for userspace where it shouldn't. However, since the chrdev\nis being closed, userspace won't have the chance to read that event anyway.\n\nTo fix the issue, call the bitmap_free() function after the unregistration\nof lineinfo_changed_nb notifier chain.(CVE-2024-36899)\n\nIn the Linux kernel, the following vulnerability has been resolved:\n\nipv6: prevent NULL dereference in ip6_output()\n\nAccording to syzbot, there is a chance that ip6_dst_idev()\nreturns NULL in ip6_output(). Most places in IPv6 stack\ndeal with a NULL idev just fine, but not here.\n\nsyzbot reported:\n\ngeneral protection fault, probably for non-canonical address 0xdffffc00000000bc: 0000 [#1] PREEMPT SMP KASAN PTI\nKASAN: null-ptr-deref in range [0x00000000000005e0-0x00000000000005e7]\nCPU: 0 PID: 9775 Comm: syz-executor.4 Not tainted 6.9.0-rc5-syzkaller-00157-g6a30653b604a #0\nHardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 03/27/2024\n RIP: 0010:ip6_output+0x231/0x3f0 net/ipv6/ip6_output.c:237\nCode: 3c 1e 00 49 89 df 74 08 4c 89 ef e8 19 58 db f7 48 8b 44 24 20 49 89 45 00 49 89 c5 48 8d 9d e0 05 00 00 48 89 d8 48 c1 e8 03 <42> 0f b6 04 38 84 c0 4c 8b 74 24 28 0f 85 61 01 00 00 8b 1b 31 ff\nRSP: 0018:ffffc9000927f0d8 EFLAGS: 00010202\nRAX: 00000000000000bc RBX: 00000000000005e0 RCX: 0000000000040000\nRDX: ffffc900131f9000 RSI: 0000000000004f47 RDI: 0000000000004f48\nRBP: 0000000000000000 R08: ffffffff8a1f0b9a R09: 1ffffffff1f51fad\nR10: dffffc0000000000 R11: fffffbfff1f51fae R12: ffff8880293ec8c0\nR13: ffff88805d7fc000 R14: 1ffff1100527d91a R15: dffffc0000000000\nFS:  00007f135c6856c0(0000) GS:ffff8880b9400000(0000) knlGS:0000000000000000\nCS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033\nCR2: 0000000020000080 CR3: 0000000064096000 CR4: 00000000003506f0\nDR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000\nDR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400\nCall Trace:\n <TASK>\n  NF_HOOK include/linux/netfilter.h:314 [inline]\n  ip6_xmit+0xefe/0x17f0 net/ipv6/ip6_output.c:358\n  sctp_v6_xmit+0x9f2/0x13f0 net/sctp/ipv6.c:248\n  sctp_packet_transmit+0x26ad/0x2ca0 net/sctp/output.c:653\n  sctp_packet_singleton+0x22c/0x320 net/sctp/outqueue.c:783\n  sctp_outq_flush_ctrl net/sctp/outqueue.c:914 [inline]\n  sctp_outq_flush+0x6d5/0x3e20 net/sctp/outqueue.c:1212\n  sctp_side_effects net/sctp/sm_sideeffect.c:1198 [inline]\n  sctp_do_sm+0x59cc/0x60c0 net/sctp/sm_sideeffect.c:1169\n  sctp_primitive_ASSOCIATE+0x95/0xc0 net/sctp/primitive.c:73\n  __sctp_connect+0x9cd/0xe30 net/sctp/socket.c:1234\n  sctp_connect net/sctp/socket.c:4819 [inline]\n  sctp_inet_connect+0x149/0x1f0 net/sctp/socket.c:4834\n  __sys_connect_file net/socket.c:2048 [inline]\n  __sys_connect+0x2df/0x310 net/socket.c:2065\n  __do_sys_connect net/socket.c:2075 [inline]\n  __se_sys_connect net/socket.c:2072 [inline]\n  __x64_sys_connect+0x7a/0x90 net/socket.c:2072\n  do_syscall_x64 arch/x86/entry/common.c:52 [inline]\n  do_syscall_64+0xf5/0x240 arch/x86/entry/common.c:83\n entry_SYSCALL_64_after_hwframe+0x77/0x7f(CVE-2024-36901)\n\nIn the Linux kernel, the following vulnerability has been resolved:\n\nipv6: fib6_rules: avoid possible NULL dereference in fib6_rule_action()\n\nsyzbot is able to trigger the following crash [1],\ncaused by unsafe ip6_dst_idev() use.\n\nIndeed ip6_dst_idev() can return NULL, and must always be checked.\n\n[1]\n\nOops: general protection fault, probably for non-canonical address 0xdffffc0000000000: 0000 [#1] PREEMPT SMP KASAN PTI\nKASAN: null-ptr-deref in range [0x0000000000000000-0x0000000000000007]\nCPU: 0 PID: 31648 Comm: syz-executor.0 Not tainted 6.9.0-rc4-next-20240417-syzkaller #0\nHardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 03/27/2024\n RIP: 0010:__fib6_rule_action net/ipv6/fib6_rules.c:237 [inline]\n RIP: 0010:fib6_rule_action+0x241/0x7b0 net/ipv6/fib6_rules.c:267\nCode: 02 00 00 49 8d 9f d8 00 00 00 48 89 d8 48 c1 e8 03 42 80 3c 20 00 74 08 48 89 df e8 f9 32 bf f7 48 8b 1b 48 89 d8 48 c1 e8 03 <42> 80 3c 20 00 74 08 48 89 df e8 e0 32 bf f7 4c 8b 03 48 89 ef 4c\nRSP: 0018:ffffc9000fc1f2f0 EFLAGS: 00010246\nRAX: 0000000000000000 RBX: 0000000000000000 RCX: 1a772f98c8186700\nRDX: 0000000000000003 RSI: ffffffff8bcac4e0 RDI: ffffffff8c1f9760\nRBP: ffff8880673fb980 R08: ffffffff8fac15ef R09: 1ffffffff1f582bd\nR10: dffffc0000000000 R11: fffffbfff1f582be R12: dffffc0000000000\nR13: 0000000000000080 R14: ffff888076509000 R15: ffff88807a029a00\nFS:  00007f55e82ca6c0(0000) GS:ffff8880b9400000(0000) knlGS:0000000000000000\nCS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033\nCR2: 0000001b31d23000 CR3: 0000000022b66000 CR4: 00000000003506f0\nDR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000\nDR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400\nCall Trace:\n <TASK>\n  fib_rules_lookup+0x62c/0xdb0 net/core/fib_rules.c:317\n  fib6_rule_lookup+0x1fd/0x790 net/ipv6/fib6_rules.c:108\n  ip6_route_output_flags_noref net/ipv6/route.c:2637 [inline]\n  ip6_route_output_flags+0x38e/0x610 net/ipv6/route.c:2649\n  ip6_route_output include/net/ip6_route.h:93 [inline]\n  ip6_dst_lookup_tail+0x189/0x11a0 net/ipv6/ip6_output.c:1120\n  ip6_dst_lookup_flow+0xb9/0x180 net/ipv6/ip6_output.c:1250\n  sctp_v6_get_dst+0x792/0x1e20 net/sctp/ipv6.c:326\n  sctp_transport_route+0x12c/0x2e0 net/sctp/transport.c:455\n  sctp_assoc_add_peer+0x614/0x15c0 net/sctp/associola.c:662\n  sctp_connect_new_asoc+0x31d/0x6c0 net/sctp/socket.c:1099\n  __sctp_connect+0x66d/0xe30 net/sctp/socket.c:1197\n  sctp_connect net/sctp/socket.c:4819 [inline]\n  sctp_inet_connect+0x149/0x1f0 net/sctp/socket.c:4834\n  __sys_connect_file net/socket.c:2048 [inline]\n  __sys_connect+0x2df/0x310 net/socket.c:2065\n  __do_sys_connect net/socket.c:2075 [inline]\n  __se_sys_connect net/socket.c:2072 [inline]\n  __x64_sys_connect+0x7a/0x90 net/socket.c:2072\n  do_syscall_x64 arch/x86/entry/common.c:52 [inline]\n  do_syscall_64+0xf5/0x240 arch/x86/entry/common.c:83\n entry_SYSCALL_64_after_hwframe+0x77/0x7f(CVE-2024-36902)\n\nIn the Linux kernel, the following vulnerability has been resolved:\n\nipv6: Fix potential uninit-value access in __ip6_make_skb()\n\nAs it was done in commit fc1092f51567 (\"ipv4: Fix uninit-value access in\n__ip_make_skb()\") for IPv4, check FLOWI_FLAG_KNOWN_NH on fl6->flowi6_flags\ninstead of testing HDRINCL on the socket to avoid a race condition which\ncauses uninit-value access.(CVE-2024-36903)\n\nIn the Linux kernel, the following vulnerability has been resolved:\n\nARM: 9381/1: kasan: clear stale stack poison\n\nWe found below OOB crash:\n\n[   33.452494] ==================================================================\n[   33.453513] BUG: KASAN: stack-out-of-bounds in refresh_cpu_vm_stats.constprop.0+0xcc/0x2ec\n[   33.454660] Write of size 164 at addr c1d03d30 by task swapper/0/0\n[   33.455515]\n[   33.455767] CPU: 0 PID: 0 Comm: swapper/0 Tainted: G           O       6.1.25-mainline #1\n[   33.456880] Hardware name: Generic DT based system\n[   33.457555]  unwind_backtrace from show_stack+0x18/0x1c\n[   33.458326]  show_stack from dump_stack_lvl+0x40/0x4c\n[   33.459072]  dump_stack_lvl from print_report+0x158/0x4a4\n[   33.459863]  print_report from kasan_report+0x9c/0x148\n[   33.460616]  kasan_report from kasan_check_range+0x94/0x1a0\n[   33.461424]  kasan_check_range from memset+0x20/0x3c\n[   33.462157]  memset from refresh_cpu_vm_stats.constprop.0+0xcc/0x2ec\n[   33.463064]  refresh_cpu_vm_stats.constprop.0 from tick_nohz_idle_stop_tick+0x180/0x53c\n[   33.464181]  tick_nohz_idle_stop_tick from do_idle+0x264/0x354\n[   33.465029]  do_idle from cpu_startup_entry+0x20/0x24\n[   33.465769]  cpu_startup_entry from rest_init+0xf0/0xf4\n[   33.466528]  rest_init from arch_post_acpi_subsys_init+0x0/0x18\n[   33.467397]\n[   33.467644] The buggy address belongs to stack of task swapper/0/0\n[   33.468493]  and is located at offset 112 in frame:\n[   33.469172]  refresh_cpu_vm_stats.constprop.0+0x0/0x2ec\n[   33.469917]\n[   33.470165] This frame has 2 objects:\n[   33.470696]  [32, 76) 'global_zone_diff'\n[   33.470729]  [112, 276) 'global_node_diff'\n[   33.471294]\n[   33.472095] The buggy address belongs to the physical page:\n[   33.472862] page:3cd72da8 refcount:1 mapcount:0 mapping:00000000 index:0x0 pfn:0x41d03\n[   33.473944] flags: 0x1000(reserved|zone=0)\n[   33.474565] raw: 00001000 ed741470 ed741470 00000000 00000000 00000000 ffffffff 00000001\n[   33.475656] raw: 00000000\n[   33.476050] page dumped because: kasan: bad access detected\n[   33.476816]\n[   33.477061] Memory state around the buggy address:\n[   33.477732]  c1d03c00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00\n[   33.478630]  c1d03c80: 00 00 00 00 00 00 00 00 f1 f1 f1 f1 00 00 00 00\n[   33.479526] >c1d03d00: 00 04 f2 f2 f2 f2 00 00 00 00 00 00 f1 f1 f1 f1\n[   33.480415]                                                ^\n[   33.481195]  c1d03d80: 00 00 00 00 00 00 00 00 00 00 04 f3 f3 f3 f3 f3\n[   33.482088]  c1d03e00: f3 f3 f3 f3 00 00 00 00 00 00 00 00 00 00 00 00\n[   33.482978] ==================================================================\n\nWe find the root cause of this OOB is that arm does not clear stale stack\npoison in the case of cpuidle.\n\nThis patch refer to arch/arm64/kernel/sleep.S to resolve this issue.\n\nFrom cited commit [1] that explain the problem\n\nFunctions which the compiler has instrumented for KASAN place poison on\nthe stack shadow upon entry and remove this poison prior to returning.\n\nIn the case of cpuidle, CPUs exit the kernel a number of levels deep in\nC code.  Any instrumented functions on this critical path will leave\nportions of the stack shadow poisoned.\n\nIf CPUs lose context and return to the kernel via a cold path, we\nrestore a prior context saved in __cpu_suspend_enter are forgotten, and\nwe never remove the poison they placed in the stack shadow area by\nfunctions calls between this and the actual exit of the kernel.\n\nThus, (depending on stackframe layout) subsequent calls to instrumented\nfunctions may hit this stale poison, resulting in (spurious) KASAN\nsplats to the console.\n\nTo avoid this, clear any stale poison from the idle thread for a CPU\nprior to bringing a CPU online.\n\nFrom cited commit [2]\n\nExtend to check for CONFIG_KASAN_STACK\n\n[1] commit 0d97e6d8024c (\"arm64: kasan: clear stale stack poison\")\n[2] commit d56a9ef84bd0 (\"kasan, arm64: unpoison stack only with CONFIG_KASAN_STACK\")(CVE-2024-36906)\n\nIn the Linux kernel, the following vulnerability has been resolved:\n\nblk-iocost: do not WARN if iocg was already offlined\n\nIn iocg_pay_debt(), warn is triggered if 'active_list' is empty, which\nis intended to confirm iocg is active when it has debt. However, warn\ncan be triggered during a blkcg or disk removal, if iocg_waitq_timer_fn()\nis run at that time:\n\n  WARNING: CPU: 0 PID: 2344971 at block/blk-iocost.c:1402 iocg_pay_debt+0x14c/0x190\n  Call trace:\n  iocg_pay_debt+0x14c/0x190\n  iocg_kick_waitq+0x438/0x4c0\n  iocg_waitq_timer_fn+0xd8/0x130\n  __run_hrtimer+0x144/0x45c\n  __hrtimer_run_queues+0x16c/0x244\n  hrtimer_interrupt+0x2cc/0x7b0\n\nThe warn in this situation is meaningless. Since this iocg is being\nremoved, the state of the 'active_list' is irrelevant, and 'waitq_timer'\nis canceled after removing 'active_list' in ioc_pd_free(), which ensures\niocg is freed after iocg_waitq_timer_fn() returns.\n\nTherefore, add the check if iocg was already offlined to avoid warn\nwhen removing a blkcg or disk.(CVE-2024-36908)\n\nIn the Linux kernel, the following vulnerability has been resolved:\n\nblock: fix overflow in blk_ioctl_discard()\n\nThere is no check for overflow of 'start + len' in blk_ioctl_discard().\nHung task occurs if submit an discard ioctl with the following param:\n  start = 0x80000000000ff000, len = 0x8000000000fff000;\nAdd the overflow validation now.(CVE-2024-36917)\n\nIn the Linux kernel, the following vulnerability has been resolved:\n\nscsi: lpfc: Release hbalock before calling lpfc_worker_wake_up()\n\nlpfc_worker_wake_up() calls the lpfc_work_done() routine, which takes the\nhbalock.  Thus, lpfc_worker_wake_up() should not be called while holding the\nhbalock to avoid potential deadlock.(CVE-2024-36924)\n\nIn the Linux kernel, the following vulnerability has been resolved:\n\ns390/qeth: Fix kernel panic after setting hsuid\n\nSymptom:\nWhen the hsuid attribute is set for the first time on an IQD Layer3\ndevice while the corresponding network interface is already UP,\nthe kernel will try to execute a napi function pointer that is NULL.\n\nExample:\n---------------------------------------------------------------------------\n[ 2057.572696] illegal operation: 0001 ilc:1 [#1] SMP\n[ 2057.572702] Modules linked in: af_iucv qeth_l3 zfcp scsi_transport_fc sunrpc nft_fib_inet nft_fib_ipv4 nft_fib_ipv6 nft_fib nft_reject_inet nf_reject_ipv4 nf_reject_ipv6\nnft_reject nft_ct nf_tables_set nft_chain_nat nf_nat nf_conntrack nf_defrag_ipv6 nf_defrag_ipv4 ip_set nf_tables libcrc32c nfnetlink ghash_s390 prng xts aes_s390 des_s390 de\ns_generic sha3_512_s390 sha3_256_s390 sha512_s390 vfio_ccw vfio_mdev mdev vfio_iommu_type1 eadm_sch vfio ext4 mbcache jbd2 qeth_l2 bridge stp llc dasd_eckd_mod qeth dasd_mod\n qdio ccwgroup pkey zcrypt\n[ 2057.572739] CPU: 6 PID: 60182 Comm: stress_client Kdump: loaded Not tainted 4.18.0-541.el8.s390x #1\n[ 2057.572742] Hardware name: IBM 3931 A01 704 (LPAR)\n[ 2057.572744] Krnl PSW : 0704f00180000000 0000000000000002 (0x2)\n[ 2057.572748]            R:0 T:1 IO:1 EX:1 Key:0 M:1 W:0 P:0 AS:3 CC:3 PM:0 RI:0 EA:3\n[ 2057.572751] Krnl GPRS: 0000000000000004 0000000000000000 00000000a3b008d8 0000000000000000\n[ 2057.572754]            00000000a3b008d8 cb923a29c779abc5 0000000000000000 00000000814cfd80\n[ 2057.572756]            000000000000012c 0000000000000000 00000000a3b008d8 00000000a3b008d8\n[ 2057.572758]            00000000bab6d500 00000000814cfd80 0000000091317e46 00000000814cfc68\n[ 2057.572762] Krnl Code:#0000000000000000: 0000                illegal\n                         >0000000000000002: 0000                illegal\n                          0000000000000004: 0000                illegal\n                          0000000000000006: 0000                illegal\n                          0000000000000008: 0000                illegal\n                          000000000000000a: 0000                illegal\n                          000000000000000c: 0000                illegal\n                          000000000000000e: 0000                illegal\n[ 2057.572800] Call Trace:\n[ 2057.572801] ([<00000000ec639700>] 0xec639700)\n[ 2057.572803]  [<00000000913183e2>] net_rx_action+0x2ba/0x398\n[ 2057.572809]  [<0000000091515f76>] __do_softirq+0x11e/0x3a0\n[ 2057.572813]  [<0000000090ce160c>] do_softirq_own_stack+0x3c/0x58\n[ 2057.572817] ([<0000000090d2cbd6>] do_softirq.part.1+0x56/0x60)\n[ 2057.572822]  [<0000000090d2cc60>] __local_bh_enable_ip+0x80/0x98\n[ 2057.572825]  [<0000000091314706>] __dev_queue_xmit+0x2be/0xd70\n[ 2057.572827]  [<000003ff803dd6d6>] afiucv_hs_send+0x24e/0x300 [af_iucv]\n[ 2057.572830]  [<000003ff803dd88a>] iucv_send_ctrl+0x102/0x138 [af_iucv]\n[ 2057.572833]  [<000003ff803de72a>] iucv_sock_connect+0x37a/0x468 [af_iucv]\n[ 2057.572835]  [<00000000912e7e90>] __sys_connect+0xa0/0xd8\n[ 2057.572839]  [<00000000912e9580>] sys_socketcall+0x228/0x348\n[ 2057.572841]  [<0000000091514e1a>] system_call+0x2a6/0x2c8\n[ 2057.572843] Last Breaking-Event-Address:\n[ 2057.572844]  [<0000000091317e44>] __napi_poll+0x4c/0x1d8\n[ 2057.572846]\n[ 2057.572847] Kernel panic - not syncing: Fatal exception in interrupt\n-------------------------------------------------------------------------------------------\n\nAnalysis:\nThere is one napi structure per out_q: card->qdio.out_qs[i].napi\nThe napi.poll functions are set during qeth_open().\n\nSince\ncommit 1cfef80d4c2b (\"s390/qeth: Don't call dev_close/dev_open (DOWN/UP)\")\nqeth_set_offline()/qeth_set_online() no longer call dev_close()/\ndev_open(). So if qeth_free_qdio_queues() cleared\ncard->qdio.out_qs[i].napi.poll while the network interface was UP and the\ncard was offline, they are not set again.\n\nReproduction:\nchzdev -e $devno layer2=0\nip link set dev $network_interface up\necho 0 > /sys/bus/ccw\n---truncated---(CVE-2024-36928)\n\nIn the Linux kernel, the following vulnerability has been resolved:\n\nnet: core: reject skb_copy(_expand) for fraglist GSO skbs\n\nSKB_GSO_FRAGLIST skbs must not be linearized, otherwise they become\ninvalid. Return NULL if such an skb is passed to skb_copy or\nskb_copy_expand, in order to prevent a crash on a potential later\ncall to skb_gso_segment.(CVE-2024-36929)\n\nIn the Linux kernel, the following vulnerability has been resolved:\n\namd/amdkfd: sync all devices to wait all processes being evicted\n\nIf there are more than one device doing reset in parallel, the first\ndevice will call kfd_suspend_all_processes() to evict all processes\non all devices, this call takes time to finish. other device will\nstart reset and recover without waiting. if the process has not been\nevicted before doing recover, it will be restored, then caused page\nfault.(CVE-2024-36949)\n\nIn the Linux kernel, the following vulnerability has been resolved:\n\ntipc: fix a possible memleak in tipc_buf_append\n\n__skb_linearize() doesn't free the skb when it fails, so move\n'*buf = NULL' after __skb_linearize(), so that the skb can be\nfreed on the err path.(CVE-2024-36954)\n\nIn the Linux kernel, the following vulnerability has been resolved:\n\nocteontx2-af: avoid off-by-one read from userspace\n\nWe try to access count + 1 byte from userspace with memdup_user(buffer,\ncount + 1). However, the userspace only provides buffer of count bytes and\nonly these count bytes are verified to be okay to access. To ensure the\ncopied buffer is NUL terminated, we use memdup_user_nul instead.(CVE-2024-36957)\n\nIn the Linux kernel, the following vulnerability has been resolved:\n\nfs/9p: only translate RWX permissions for plain 9P2000\n\nGarbage in plain 9P2000's perm bits is allowed through, which causes it\nto be able to set (among others) the suid bit. This was presumably not\nthe intent since the unix extended bits are handled explicitly and\nconditionally on .u.(CVE-2024-36964)",
				"category":"general",
				"title":"Description"
			},
			{
				"text":"An update for kernel is now available for openEuler-22.03-LTS-SP3.\n\nopenEuler Security has rated this update as having a security impact of high. A Common Vunlnerability Scoring System(CVSS)base score,which gives a detailed severity rating, is available for each vulnerability from the CVElink(s) in the References section.",
				"category":"general",
				"title":"Topic"
			},
			{
				"text":"High",
				"category":"general",
				"title":"Severity"
			},
			{
				"text":"kernel",
				"category":"general",
				"title":"Affected Component"
			}
		],
		"publisher":{
			"issuing_authority":"openEuler security committee",
			"name":"openEuler",
			"namespace":"https://www.openeuler.org",
			"contact_details":"openeuler-security@openeuler.org",
			"category":"vendor"
		},
		"references":[
			{
				"summary":"openEuler-SA-2024-1707",
				"category":"self",
				"url":"https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2024-1707"
			},
			{
				"summary":"CVE-2021-47247",
				"category":"self",
				"url":"https://www.openeuler.org/en/security/cve/detail?cveId=CVE-2021-47247&packageName=kernel"
			},
			{
				"summary":"CVE-2021-47484",
				"category":"self",
				"url":"https://www.openeuler.org/en/security/cve/detail?cveId=CVE-2021-47484&packageName=kernel"
			},
			{
				"summary":"CVE-2021-47558",
				"category":"self",
				"url":"https://www.openeuler.org/en/security/cve/detail?cveId=CVE-2021-47558&packageName=kernel"
			},
			{
				"summary":"CVE-2022-48652",
				"category":"self",
				"url":"https://www.openeuler.org/en/security/cve/detail?cveId=CVE-2022-48652&packageName=kernel"
			},
			{
				"summary":"CVE-2023-52672",
				"category":"self",
				"url":"https://www.openeuler.org/en/security/cve/detail?cveId=CVE-2023-52672&packageName=kernel"
			},
			{
				"summary":"CVE-2023-52680",
				"category":"self",
				"url":"https://www.openeuler.org/en/security/cve/detail?cveId=CVE-2023-52680&packageName=kernel"
			},
			{
				"summary":"CVE-2023-52686",
				"category":"self",
				"url":"https://www.openeuler.org/en/security/cve/detail?cveId=CVE-2023-52686&packageName=kernel"
			},
			{
				"summary":"CVE-2023-52693",
				"category":"self",
				"url":"https://www.openeuler.org/en/security/cve/detail?cveId=CVE-2023-52693&packageName=kernel"
			},
			{
				"summary":"CVE-2023-52732",
				"category":"self",
				"url":"https://www.openeuler.org/en/security/cve/detail?cveId=CVE-2023-52732&packageName=kernel"
			},
			{
				"summary":"CVE-2023-52762",
				"category":"self",
				"url":"https://www.openeuler.org/en/security/cve/detail?cveId=CVE-2023-52762&packageName=kernel"
			},
			{
				"summary":"CVE-2023-52775",
				"category":"self",
				"url":"https://www.openeuler.org/en/security/cve/detail?cveId=CVE-2023-52775&packageName=kernel"
			},
			{
				"summary":"CVE-2023-52803",
				"category":"self",
				"url":"https://www.openeuler.org/en/security/cve/detail?cveId=CVE-2023-52803&packageName=kernel"
			},
			{
				"summary":"CVE-2023-52810",
				"category":"self",
				"url":"https://www.openeuler.org/en/security/cve/detail?cveId=CVE-2023-52810&packageName=kernel"
			},
			{
				"summary":"CVE-2023-52880",
				"category":"self",
				"url":"https://www.openeuler.org/en/security/cve/detail?cveId=CVE-2023-52880&packageName=kernel"
			},
			{
				"summary":"CVE-2023-52881",
				"category":"self",
				"url":"https://www.openeuler.org/en/security/cve/detail?cveId=CVE-2023-52881&packageName=kernel"
			},
			{
				"summary":"CVE-2024-26835",
				"category":"self",
				"url":"https://www.openeuler.org/en/security/cve/detail?cveId=CVE-2024-26835&packageName=kernel"
			},
			{
				"summary":"CVE-2024-26889",
				"category":"self",
				"url":"https://www.openeuler.org/en/security/cve/detail?cveId=CVE-2024-26889&packageName=kernel"
			},
			{
				"summary":"CVE-2024-27393",
				"category":"self",
				"url":"https://www.openeuler.org/en/security/cve/detail?cveId=CVE-2024-27393&packageName=kernel"
			},
			{
				"summary":"CVE-2024-27402",
				"category":"self",
				"url":"https://www.openeuler.org/en/security/cve/detail?cveId=CVE-2024-27402&packageName=kernel"
			},
			{
				"summary":"CVE-2024-27408",
				"category":"self",
				"url":"https://www.openeuler.org/en/security/cve/detail?cveId=CVE-2024-27408&packageName=kernel"
			},
			{
				"summary":"CVE-2024-35790",
				"category":"self",
				"url":"https://www.openeuler.org/en/security/cve/detail?cveId=CVE-2024-35790&packageName=kernel"
			},
			{
				"summary":"CVE-2024-35809",
				"category":"self",
				"url":"https://www.openeuler.org/en/security/cve/detail?cveId=CVE-2024-35809&packageName=kernel"
			},
			{
				"summary":"CVE-2024-35811",
				"category":"self",
				"url":"https://www.openeuler.org/en/security/cve/detail?cveId=CVE-2024-35811&packageName=kernel"
			},
			{
				"summary":"CVE-2024-35853",
				"category":"self",
				"url":"https://www.openeuler.org/en/security/cve/detail?cveId=CVE-2024-35853&packageName=kernel"
			},
			{
				"summary":"CVE-2024-35854",
				"category":"self",
				"url":"https://www.openeuler.org/en/security/cve/detail?cveId=CVE-2024-35854&packageName=kernel"
			},
			{
				"summary":"CVE-2024-35871",
				"category":"self",
				"url":"https://www.openeuler.org/en/security/cve/detail?cveId=CVE-2024-35871&packageName=kernel"
			},
			{
				"summary":"CVE-2024-35888",
				"category":"self",
				"url":"https://www.openeuler.org/en/security/cve/detail?cveId=CVE-2024-35888&packageName=kernel"
			},
			{
				"summary":"CVE-2024-35895",
				"category":"self",
				"url":"https://www.openeuler.org/en/security/cve/detail?cveId=CVE-2024-35895&packageName=kernel"
			},
			{
				"summary":"CVE-2024-35896",
				"category":"self",
				"url":"https://www.openeuler.org/en/security/cve/detail?cveId=CVE-2024-35896&packageName=kernel"
			},
			{
				"summary":"CVE-2024-35905",
				"category":"self",
				"url":"https://www.openeuler.org/en/security/cve/detail?cveId=CVE-2024-35905&packageName=kernel"
			},
			{
				"summary":"CVE-2024-35924",
				"category":"self",
				"url":"https://www.openeuler.org/en/security/cve/detail?cveId=CVE-2024-35924&packageName=kernel"
			},
			{
				"summary":"CVE-2024-35967",
				"category":"self",
				"url":"https://www.openeuler.org/en/security/cve/detail?cveId=CVE-2024-35967&packageName=kernel"
			},
			{
				"summary":"CVE-2024-35973",
				"category":"self",
				"url":"https://www.openeuler.org/en/security/cve/detail?cveId=CVE-2024-35973&packageName=kernel"
			},
			{
				"summary":"CVE-2024-35982",
				"category":"self",
				"url":"https://www.openeuler.org/en/security/cve/detail?cveId=CVE-2024-35982&packageName=kernel"
			},
			{
				"summary":"CVE-2024-35984",
				"category":"self",
				"url":"https://www.openeuler.org/en/security/cve/detail?cveId=CVE-2024-35984&packageName=kernel"
			},
			{
				"summary":"CVE-2024-36017",
				"category":"self",
				"url":"https://www.openeuler.org/en/security/cve/detail?cveId=CVE-2024-36017&packageName=kernel"
			},
			{
				"summary":"CVE-2024-36029",
				"category":"self",
				"url":"https://www.openeuler.org/en/security/cve/detail?cveId=CVE-2024-36029&packageName=kernel"
			},
			{
				"summary":"CVE-2024-36883",
				"category":"self",
				"url":"https://www.openeuler.org/en/security/cve/detail?cveId=CVE-2024-36883&packageName=kernel"
			},
			{
				"summary":"CVE-2024-36886",
				"category":"self",
				"url":"https://www.openeuler.org/en/security/cve/detail?cveId=CVE-2024-36886&packageName=kernel"
			},
			{
				"summary":"CVE-2024-36889",
				"category":"self",
				"url":"https://www.openeuler.org/en/security/cve/detail?cveId=CVE-2024-36889&packageName=kernel"
			},
			{
				"summary":"CVE-2024-36898",
				"category":"self",
				"url":"https://www.openeuler.org/en/security/cve/detail?cveId=CVE-2024-36898&packageName=kernel"
			},
			{
				"summary":"CVE-2024-36899",
				"category":"self",
				"url":"https://www.openeuler.org/en/security/cve/detail?cveId=CVE-2024-36899&packageName=kernel"
			},
			{
				"summary":"CVE-2024-36901",
				"category":"self",
				"url":"https://www.openeuler.org/en/security/cve/detail?cveId=CVE-2024-36901&packageName=kernel"
			},
			{
				"summary":"CVE-2024-36902",
				"category":"self",
				"url":"https://www.openeuler.org/en/security/cve/detail?cveId=CVE-2024-36902&packageName=kernel"
			},
			{
				"summary":"CVE-2024-36903",
				"category":"self",
				"url":"https://www.openeuler.org/en/security/cve/detail?cveId=CVE-2024-36903&packageName=kernel"
			},
			{
				"summary":"CVE-2024-36906",
				"category":"self",
				"url":"https://www.openeuler.org/en/security/cve/detail?cveId=CVE-2024-36906&packageName=kernel"
			},
			{
				"summary":"CVE-2024-36908",
				"category":"self",
				"url":"https://www.openeuler.org/en/security/cve/detail?cveId=CVE-2024-36908&packageName=kernel"
			},
			{
				"summary":"CVE-2024-36917",
				"category":"self",
				"url":"https://www.openeuler.org/en/security/cve/detail?cveId=CVE-2024-36917&packageName=kernel"
			},
			{
				"summary":"CVE-2024-36924",
				"category":"self",
				"url":"https://www.openeuler.org/en/security/cve/detail?cveId=CVE-2024-36924&packageName=kernel"
			},
			{
				"summary":"CVE-2024-36928",
				"category":"self",
				"url":"https://www.openeuler.org/en/security/cve/detail?cveId=CVE-2024-36928&packageName=kernel"
			},
			{
				"summary":"CVE-2024-36929",
				"category":"self",
				"url":"https://www.openeuler.org/en/security/cve/detail?cveId=CVE-2024-36929&packageName=kernel"
			},
			{
				"summary":"CVE-2024-36949",
				"category":"self",
				"url":"https://www.openeuler.org/en/security/cve/detail?cveId=CVE-2024-36949&packageName=kernel"
			},
			{
				"summary":"CVE-2024-36954",
				"category":"self",
				"url":"https://www.openeuler.org/en/security/cve/detail?cveId=CVE-2024-36954&packageName=kernel"
			},
			{
				"summary":"CVE-2024-36957",
				"category":"self",
				"url":"https://www.openeuler.org/en/security/cve/detail?cveId=CVE-2024-36957&packageName=kernel"
			},
			{
				"summary":"CVE-2024-36964",
				"category":"self",
				"url":"https://www.openeuler.org/en/security/cve/detail?cveId=CVE-2024-36964&packageName=kernel"
			},
			{
				"summary":"nvd cve",
				"category":"external",
				"url":"https://nvd.nist.gov/vuln/detail/CVE-2021-47247"
			},
			{
				"summary":"nvd cve",
				"category":"external",
				"url":"https://nvd.nist.gov/vuln/detail/CVE-2021-47484"
			},
			{
				"summary":"nvd cve",
				"category":"external",
				"url":"https://nvd.nist.gov/vuln/detail/CVE-2021-47558"
			},
			{
				"summary":"nvd cve",
				"category":"external",
				"url":"https://nvd.nist.gov/vuln/detail/CVE-2022-48652"
			},
			{
				"summary":"nvd cve",
				"category":"external",
				"url":"https://nvd.nist.gov/vuln/detail/CVE-2023-52672"
			},
			{
				"summary":"nvd cve",
				"category":"external",
				"url":"https://nvd.nist.gov/vuln/detail/CVE-2023-52680"
			},
			{
				"summary":"nvd cve",
				"category":"external",
				"url":"https://nvd.nist.gov/vuln/detail/CVE-2023-52686"
			},
			{
				"summary":"nvd cve",
				"category":"external",
				"url":"https://nvd.nist.gov/vuln/detail/CVE-2023-52693"
			},
			{
				"summary":"nvd cve",
				"category":"external",
				"url":"https://nvd.nist.gov/vuln/detail/CVE-2023-52732"
			},
			{
				"summary":"nvd cve",
				"category":"external",
				"url":"https://nvd.nist.gov/vuln/detail/CVE-2023-52762"
			},
			{
				"summary":"nvd cve",
				"category":"external",
				"url":"https://nvd.nist.gov/vuln/detail/CVE-2023-52775"
			},
			{
				"summary":"nvd cve",
				"category":"external",
				"url":"https://nvd.nist.gov/vuln/detail/CVE-2023-52803"
			},
			{
				"summary":"nvd cve",
				"category":"external",
				"url":"https://nvd.nist.gov/vuln/detail/CVE-2023-52810"
			},
			{
				"summary":"nvd cve",
				"category":"external",
				"url":"https://nvd.nist.gov/vuln/detail/CVE-2023-52880"
			},
			{
				"summary":"nvd cve",
				"category":"external",
				"url":"https://nvd.nist.gov/vuln/detail/CVE-2023-52881"
			},
			{
				"summary":"nvd cve",
				"category":"external",
				"url":"https://nvd.nist.gov/vuln/detail/CVE-2024-26835"
			},
			{
				"summary":"nvd cve",
				"category":"external",
				"url":"https://nvd.nist.gov/vuln/detail/CVE-2024-26889"
			},
			{
				"summary":"nvd cve",
				"category":"external",
				"url":"https://nvd.nist.gov/vuln/detail/CVE-2024-27393"
			},
			{
				"summary":"nvd cve",
				"category":"external",
				"url":"https://nvd.nist.gov/vuln/detail/CVE-2024-27402"
			},
			{
				"summary":"nvd cve",
				"category":"external",
				"url":"https://nvd.nist.gov/vuln/detail/CVE-2024-27408"
			},
			{
				"summary":"nvd cve",
				"category":"external",
				"url":"https://nvd.nist.gov/vuln/detail/CVE-2024-35790"
			},
			{
				"summary":"nvd cve",
				"category":"external",
				"url":"https://nvd.nist.gov/vuln/detail/CVE-2024-35809"
			},
			{
				"summary":"nvd cve",
				"category":"external",
				"url":"https://nvd.nist.gov/vuln/detail/CVE-2024-35811"
			},
			{
				"summary":"nvd cve",
				"category":"external",
				"url":"https://nvd.nist.gov/vuln/detail/CVE-2024-35853"
			},
			{
				"summary":"nvd cve",
				"category":"external",
				"url":"https://nvd.nist.gov/vuln/detail/CVE-2024-35854"
			},
			{
				"summary":"nvd cve",
				"category":"external",
				"url":"https://nvd.nist.gov/vuln/detail/CVE-2024-35871"
			},
			{
				"summary":"nvd cve",
				"category":"external",
				"url":"https://nvd.nist.gov/vuln/detail/CVE-2024-35888"
			},
			{
				"summary":"nvd cve",
				"category":"external",
				"url":"https://nvd.nist.gov/vuln/detail/CVE-2024-35895"
			},
			{
				"summary":"nvd cve",
				"category":"external",
				"url":"https://nvd.nist.gov/vuln/detail/CVE-2024-35896"
			},
			{
				"summary":"nvd cve",
				"category":"external",
				"url":"https://nvd.nist.gov/vuln/detail/CVE-2024-35905"
			},
			{
				"summary":"nvd cve",
				"category":"external",
				"url":"https://nvd.nist.gov/vuln/detail/CVE-2024-35924"
			},
			{
				"summary":"nvd cve",
				"category":"external",
				"url":"https://nvd.nist.gov/vuln/detail/CVE-2024-35967"
			},
			{
				"summary":"nvd cve",
				"category":"external",
				"url":"https://nvd.nist.gov/vuln/detail/CVE-2024-35973"
			},
			{
				"summary":"nvd cve",
				"category":"external",
				"url":"https://nvd.nist.gov/vuln/detail/CVE-2024-35982"
			},
			{
				"summary":"nvd cve",
				"category":"external",
				"url":"https://nvd.nist.gov/vuln/detail/CVE-2024-35984"
			},
			{
				"summary":"nvd cve",
				"category":"external",
				"url":"https://nvd.nist.gov/vuln/detail/CVE-2024-36017"
			},
			{
				"summary":"nvd cve",
				"category":"external",
				"url":"https://nvd.nist.gov/vuln/detail/CVE-2024-36029"
			},
			{
				"summary":"nvd cve",
				"category":"external",
				"url":"https://nvd.nist.gov/vuln/detail/CVE-2024-36883"
			},
			{
				"summary":"nvd cve",
				"category":"external",
				"url":"https://nvd.nist.gov/vuln/detail/CVE-2024-36886"
			},
			{
				"summary":"nvd cve",
				"category":"external",
				"url":"https://nvd.nist.gov/vuln/detail/CVE-2024-36889"
			},
			{
				"summary":"nvd cve",
				"category":"external",
				"url":"https://nvd.nist.gov/vuln/detail/CVE-2024-36898"
			},
			{
				"summary":"nvd cve",
				"category":"external",
				"url":"https://nvd.nist.gov/vuln/detail/CVE-2024-36899"
			},
			{
				"summary":"nvd cve",
				"category":"external",
				"url":"https://nvd.nist.gov/vuln/detail/CVE-2024-36901"
			},
			{
				"summary":"nvd cve",
				"category":"external",
				"url":"https://nvd.nist.gov/vuln/detail/CVE-2024-36902"
			},
			{
				"summary":"nvd cve",
				"category":"external",
				"url":"https://nvd.nist.gov/vuln/detail/CVE-2024-36903"
			},
			{
				"summary":"nvd cve",
				"category":"external",
				"url":"https://nvd.nist.gov/vuln/detail/CVE-2024-36906"
			},
			{
				"summary":"nvd cve",
				"category":"external",
				"url":"https://nvd.nist.gov/vuln/detail/CVE-2024-36908"
			},
			{
				"summary":"nvd cve",
				"category":"external",
				"url":"https://nvd.nist.gov/vuln/detail/CVE-2024-36917"
			},
			{
				"summary":"nvd cve",
				"category":"external",
				"url":"https://nvd.nist.gov/vuln/detail/CVE-2024-36924"
			},
			{
				"summary":"nvd cve",
				"category":"external",
				"url":"https://nvd.nist.gov/vuln/detail/CVE-2024-36928"
			},
			{
				"summary":"nvd cve",
				"category":"external",
				"url":"https://nvd.nist.gov/vuln/detail/CVE-2024-36929"
			},
			{
				"summary":"nvd cve",
				"category":"external",
				"url":"https://nvd.nist.gov/vuln/detail/CVE-2024-36949"
			},
			{
				"summary":"nvd cve",
				"category":"external",
				"url":"https://nvd.nist.gov/vuln/detail/CVE-2024-36954"
			},
			{
				"summary":"nvd cve",
				"category":"external",
				"url":"https://nvd.nist.gov/vuln/detail/CVE-2024-36957"
			},
			{
				"summary":"nvd cve",
				"category":"external",
				"url":"https://nvd.nist.gov/vuln/detail/CVE-2024-36964"
			},
			{
				"summary":"openEuler-SA-2024-1707 vex file",
				"category":"self",
				"url":"https://repo.openeuler.org/security/data/csaf/advisories/2024/csaf-openeuler-sa-2024-1707.json"
			}
		],
		"title":"An update for kernel is now available for openEuler-22.03-LTS-SP3",
		"tracking":{
			"initial_release_date":"2024-06-14T09:19:53+08:00",
			"revision_history":[
				{
					"date":"2024-06-14T09:19:53+08:00",
					"summary":"Initial",
					"number":"1.0.0"
				},
				{
					"date":"2024-10-31T09:19:53+08:00",
					"summary":"final",
					"number":"2.0.0"
				}
			],
			"generator":{
				"date":"2024-10-31T09:19:53+08:00",
				"engine":{
					"name":"openEuler CSAF Tool V1.0"
				}
			},
			"current_release_date":"2024-10-31T09:19:53+08:00",
			"id":"openEuler-SA-2024-1707",
			"version":"2.0.0",
			"status":"final"
		}
	},
	"product_tree":{
		"branches":[
			{
				"name":"openEuler",
				"category":"vendor",
				"branches":[
					{
						"name":"openEuler",
						"branches":[
							{
								"product":{
									"product_identification_helper":{
										"cpe":"cpe:/a:openEuler:openEuler:22.03-LTS-SP3"
									},
									"product_id":"openEuler-22.03-LTS-SP3",
									"name":"openEuler-22.03-LTS-SP3"
								},
								"name":"openEuler-22.03-LTS-SP3",
								"category":"product_version"
							}
						],
						"category":"product_name"
					},
					{
						"name":"aarch64",
						"branches":[
							{
								"product":{
									"product_identification_helper":{
										"cpe":"cpe:/a:openEuler:openEuler:22.03-LTS-SP3"
									},
									"product_id":"perf-debuginfo-5.10.0-207.0.0.116.oe2203sp3.aarch64.rpm",
									"name":"perf-debuginfo-5.10.0-207.0.0.116.oe2203sp3.aarch64.rpm"
								},
								"name":"perf-debuginfo-5.10.0-207.0.0.116.oe2203sp3.aarch64.rpm",
								"category":"product_version"
							},
							{
								"product":{
									"product_identification_helper":{
										"cpe":"cpe:/a:openEuler:openEuler:22.03-LTS-SP3"
									},
									"product_id":"kernel-debuginfo-5.10.0-207.0.0.116.oe2203sp3.aarch64.rpm",
									"name":"kernel-debuginfo-5.10.0-207.0.0.116.oe2203sp3.aarch64.rpm"
								},
								"name":"kernel-debuginfo-5.10.0-207.0.0.116.oe2203sp3.aarch64.rpm",
								"category":"product_version"
							},
							{
								"product":{
									"product_identification_helper":{
										"cpe":"cpe:/a:openEuler:openEuler:22.03-LTS-SP3"
									},
									"product_id":"python3-perf-debuginfo-5.10.0-207.0.0.116.oe2203sp3.aarch64.rpm",
									"name":"python3-perf-debuginfo-5.10.0-207.0.0.116.oe2203sp3.aarch64.rpm"
								},
								"name":"python3-perf-debuginfo-5.10.0-207.0.0.116.oe2203sp3.aarch64.rpm",
								"category":"product_version"
							},
							{
								"product":{
									"product_identification_helper":{
										"cpe":"cpe:/a:openEuler:openEuler:22.03-LTS-SP3"
									},
									"product_id":"kernel-tools-debuginfo-5.10.0-207.0.0.116.oe2203sp3.aarch64.rpm",
									"name":"kernel-tools-debuginfo-5.10.0-207.0.0.116.oe2203sp3.aarch64.rpm"
								},
								"name":"kernel-tools-debuginfo-5.10.0-207.0.0.116.oe2203sp3.aarch64.rpm",
								"category":"product_version"
							},
							{
								"product":{
									"product_identification_helper":{
										"cpe":"cpe:/a:openEuler:openEuler:22.03-LTS-SP3"
									},
									"product_id":"kernel-tools-5.10.0-207.0.0.116.oe2203sp3.aarch64.rpm",
									"name":"kernel-tools-5.10.0-207.0.0.116.oe2203sp3.aarch64.rpm"
								},
								"name":"kernel-tools-5.10.0-207.0.0.116.oe2203sp3.aarch64.rpm",
								"category":"product_version"
							},
							{
								"product":{
									"product_identification_helper":{
										"cpe":"cpe:/a:openEuler:openEuler:22.03-LTS-SP3"
									},
									"product_id":"kernel-5.10.0-207.0.0.116.oe2203sp3.aarch64.rpm",
									"name":"kernel-5.10.0-207.0.0.116.oe2203sp3.aarch64.rpm"
								},
								"name":"kernel-5.10.0-207.0.0.116.oe2203sp3.aarch64.rpm",
								"category":"product_version"
							},
							{
								"product":{
									"product_identification_helper":{
										"cpe":"cpe:/a:openEuler:openEuler:22.03-LTS-SP3"
									},
									"product_id":"kernel-headers-5.10.0-207.0.0.116.oe2203sp3.aarch64.rpm",
									"name":"kernel-headers-5.10.0-207.0.0.116.oe2203sp3.aarch64.rpm"
								},
								"name":"kernel-headers-5.10.0-207.0.0.116.oe2203sp3.aarch64.rpm",
								"category":"product_version"
							},
							{
								"product":{
									"product_identification_helper":{
										"cpe":"cpe:/a:openEuler:openEuler:22.03-LTS-SP3"
									},
									"product_id":"kernel-devel-5.10.0-207.0.0.116.oe2203sp3.aarch64.rpm",
									"name":"kernel-devel-5.10.0-207.0.0.116.oe2203sp3.aarch64.rpm"
								},
								"name":"kernel-devel-5.10.0-207.0.0.116.oe2203sp3.aarch64.rpm",
								"category":"product_version"
							},
							{
								"product":{
									"product_identification_helper":{
										"cpe":"cpe:/a:openEuler:openEuler:22.03-LTS-SP3"
									},
									"product_id":"python3-perf-5.10.0-207.0.0.116.oe2203sp3.aarch64.rpm",
									"name":"python3-perf-5.10.0-207.0.0.116.oe2203sp3.aarch64.rpm"
								},
								"name":"python3-perf-5.10.0-207.0.0.116.oe2203sp3.aarch64.rpm",
								"category":"product_version"
							},
							{
								"product":{
									"product_identification_helper":{
										"cpe":"cpe:/a:openEuler:openEuler:22.03-LTS-SP3"
									},
									"product_id":"perf-5.10.0-207.0.0.116.oe2203sp3.aarch64.rpm",
									"name":"perf-5.10.0-207.0.0.116.oe2203sp3.aarch64.rpm"
								},
								"name":"perf-5.10.0-207.0.0.116.oe2203sp3.aarch64.rpm",
								"category":"product_version"
							},
							{
								"product":{
									"product_identification_helper":{
										"cpe":"cpe:/a:openEuler:openEuler:22.03-LTS-SP3"
									},
									"product_id":"kernel-tools-devel-5.10.0-207.0.0.116.oe2203sp3.aarch64.rpm",
									"name":"kernel-tools-devel-5.10.0-207.0.0.116.oe2203sp3.aarch64.rpm"
								},
								"name":"kernel-tools-devel-5.10.0-207.0.0.116.oe2203sp3.aarch64.rpm",
								"category":"product_version"
							},
							{
								"product":{
									"product_identification_helper":{
										"cpe":"cpe:/a:openEuler:openEuler:22.03-LTS-SP3"
									},
									"product_id":"kernel-debugsource-5.10.0-207.0.0.116.oe2203sp3.aarch64.rpm",
									"name":"kernel-debugsource-5.10.0-207.0.0.116.oe2203sp3.aarch64.rpm"
								},
								"name":"kernel-debugsource-5.10.0-207.0.0.116.oe2203sp3.aarch64.rpm",
								"category":"product_version"
							},
							{
								"product":{
									"product_identification_helper":{
										"cpe":"cpe:/a:openEuler:openEuler:22.03-LTS-SP3"
									},
									"product_id":"kernel-source-5.10.0-207.0.0.116.oe2203sp3.aarch64.rpm",
									"name":"kernel-source-5.10.0-207.0.0.116.oe2203sp3.aarch64.rpm"
								},
								"name":"kernel-source-5.10.0-207.0.0.116.oe2203sp3.aarch64.rpm",
								"category":"product_version"
							}
						],
						"category":"architecture"
					},
					{
						"name":"src",
						"branches":[
							{
								"product":{
									"product_identification_helper":{
										"cpe":"cpe:/a:openEuler:openEuler:22.03-LTS-SP3"
									},
									"product_id":"kernel-5.10.0-207.0.0.116.oe2203sp3.src.rpm",
									"name":"kernel-5.10.0-207.0.0.116.oe2203sp3.src.rpm"
								},
								"name":"kernel-5.10.0-207.0.0.116.oe2203sp3.src.rpm",
								"category":"product_version"
							}
						],
						"category":"architecture"
					},
					{
						"name":"x86_64",
						"branches":[
							{
								"product":{
									"product_identification_helper":{
										"cpe":"cpe:/a:openEuler:openEuler:22.03-LTS-SP3"
									},
									"product_id":"kernel-debuginfo-5.10.0-207.0.0.116.oe2203sp3.x86_64.rpm",
									"name":"kernel-debuginfo-5.10.0-207.0.0.116.oe2203sp3.x86_64.rpm"
								},
								"name":"kernel-debuginfo-5.10.0-207.0.0.116.oe2203sp3.x86_64.rpm",
								"category":"product_version"
							},
							{
								"product":{
									"product_identification_helper":{
										"cpe":"cpe:/a:openEuler:openEuler:22.03-LTS-SP3"
									},
									"product_id":"kernel-tools-5.10.0-207.0.0.116.oe2203sp3.x86_64.rpm",
									"name":"kernel-tools-5.10.0-207.0.0.116.oe2203sp3.x86_64.rpm"
								},
								"name":"kernel-tools-5.10.0-207.0.0.116.oe2203sp3.x86_64.rpm",
								"category":"product_version"
							},
							{
								"product":{
									"product_identification_helper":{
										"cpe":"cpe:/a:openEuler:openEuler:22.03-LTS-SP3"
									},
									"product_id":"python3-perf-5.10.0-207.0.0.116.oe2203sp3.x86_64.rpm",
									"name":"python3-perf-5.10.0-207.0.0.116.oe2203sp3.x86_64.rpm"
								},
								"name":"python3-perf-5.10.0-207.0.0.116.oe2203sp3.x86_64.rpm",
								"category":"product_version"
							},
							{
								"product":{
									"product_identification_helper":{
										"cpe":"cpe:/a:openEuler:openEuler:22.03-LTS-SP3"
									},
									"product_id":"kernel-source-5.10.0-207.0.0.116.oe2203sp3.x86_64.rpm",
									"name":"kernel-source-5.10.0-207.0.0.116.oe2203sp3.x86_64.rpm"
								},
								"name":"kernel-source-5.10.0-207.0.0.116.oe2203sp3.x86_64.rpm",
								"category":"product_version"
							},
							{
								"product":{
									"product_identification_helper":{
										"cpe":"cpe:/a:openEuler:openEuler:22.03-LTS-SP3"
									},
									"product_id":"kernel-headers-5.10.0-207.0.0.116.oe2203sp3.x86_64.rpm",
									"name":"kernel-headers-5.10.0-207.0.0.116.oe2203sp3.x86_64.rpm"
								},
								"name":"kernel-headers-5.10.0-207.0.0.116.oe2203sp3.x86_64.rpm",
								"category":"product_version"
							},
							{
								"product":{
									"product_identification_helper":{
										"cpe":"cpe:/a:openEuler:openEuler:22.03-LTS-SP3"
									},
									"product_id":"perf-5.10.0-207.0.0.116.oe2203sp3.x86_64.rpm",
									"name":"perf-5.10.0-207.0.0.116.oe2203sp3.x86_64.rpm"
								},
								"name":"perf-5.10.0-207.0.0.116.oe2203sp3.x86_64.rpm",
								"category":"product_version"
							},
							{
								"product":{
									"product_identification_helper":{
										"cpe":"cpe:/a:openEuler:openEuler:22.03-LTS-SP3"
									},
									"product_id":"kernel-devel-5.10.0-207.0.0.116.oe2203sp3.x86_64.rpm",
									"name":"kernel-devel-5.10.0-207.0.0.116.oe2203sp3.x86_64.rpm"
								},
								"name":"kernel-devel-5.10.0-207.0.0.116.oe2203sp3.x86_64.rpm",
								"category":"product_version"
							},
							{
								"product":{
									"product_identification_helper":{
										"cpe":"cpe:/a:openEuler:openEuler:22.03-LTS-SP3"
									},
									"product_id":"kernel-tools-devel-5.10.0-207.0.0.116.oe2203sp3.x86_64.rpm",
									"name":"kernel-tools-devel-5.10.0-207.0.0.116.oe2203sp3.x86_64.rpm"
								},
								"name":"kernel-tools-devel-5.10.0-207.0.0.116.oe2203sp3.x86_64.rpm",
								"category":"product_version"
							},
							{
								"product":{
									"product_identification_helper":{
										"cpe":"cpe:/a:openEuler:openEuler:22.03-LTS-SP3"
									},
									"product_id":"kernel-debugsource-5.10.0-207.0.0.116.oe2203sp3.x86_64.rpm",
									"name":"kernel-debugsource-5.10.0-207.0.0.116.oe2203sp3.x86_64.rpm"
								},
								"name":"kernel-debugsource-5.10.0-207.0.0.116.oe2203sp3.x86_64.rpm",
								"category":"product_version"
							},
							{
								"product":{
									"product_identification_helper":{
										"cpe":"cpe:/a:openEuler:openEuler:22.03-LTS-SP3"
									},
									"product_id":"kernel-tools-debuginfo-5.10.0-207.0.0.116.oe2203sp3.x86_64.rpm",
									"name":"kernel-tools-debuginfo-5.10.0-207.0.0.116.oe2203sp3.x86_64.rpm"
								},
								"name":"kernel-tools-debuginfo-5.10.0-207.0.0.116.oe2203sp3.x86_64.rpm",
								"category":"product_version"
							},
							{
								"product":{
									"product_identification_helper":{
										"cpe":"cpe:/a:openEuler:openEuler:22.03-LTS-SP3"
									},
									"product_id":"kernel-5.10.0-207.0.0.116.oe2203sp3.x86_64.rpm",
									"name":"kernel-5.10.0-207.0.0.116.oe2203sp3.x86_64.rpm"
								},
								"name":"kernel-5.10.0-207.0.0.116.oe2203sp3.x86_64.rpm",
								"category":"product_version"
							},
							{
								"product":{
									"product_identification_helper":{
										"cpe":"cpe:/a:openEuler:openEuler:22.03-LTS-SP3"
									},
									"product_id":"python3-perf-debuginfo-5.10.0-207.0.0.116.oe2203sp3.x86_64.rpm",
									"name":"python3-perf-debuginfo-5.10.0-207.0.0.116.oe2203sp3.x86_64.rpm"
								},
								"name":"python3-perf-debuginfo-5.10.0-207.0.0.116.oe2203sp3.x86_64.rpm",
								"category":"product_version"
							},
							{
								"product":{
									"product_identification_helper":{
										"cpe":"cpe:/a:openEuler:openEuler:22.03-LTS-SP3"
									},
									"product_id":"perf-debuginfo-5.10.0-207.0.0.116.oe2203sp3.x86_64.rpm",
									"name":"perf-debuginfo-5.10.0-207.0.0.116.oe2203sp3.x86_64.rpm"
								},
								"name":"perf-debuginfo-5.10.0-207.0.0.116.oe2203sp3.x86_64.rpm",
								"category":"product_version"
							}
						],
						"category":"architecture"
					}
				]
			}
		],
		"relationships":[
			{
				"relates_to_product_reference":"openEuler-22.03-LTS-SP3",
				"product_reference":"perf-debuginfo-5.10.0-207.0.0.116.oe2203sp3.aarch64.rpm",
				"full_product_name":{
					"product_id":"openEuler-22.03-LTS-SP3:perf-debuginfo-5.10.0-207.0.0.116.oe2203sp3.aarch64",
					"name":"perf-debuginfo-5.10.0-207.0.0.116.oe2203sp3.aarch64 as a component of openEuler-22.03-LTS-SP3"
				},
				"category":"default_component_of"
			},
			{
				"relates_to_product_reference":"openEuler-22.03-LTS-SP3",
				"product_reference":"kernel-debuginfo-5.10.0-207.0.0.116.oe2203sp3.aarch64.rpm",
				"full_product_name":{
					"product_id":"openEuler-22.03-LTS-SP3:kernel-debuginfo-5.10.0-207.0.0.116.oe2203sp3.aarch64",
					"name":"kernel-debuginfo-5.10.0-207.0.0.116.oe2203sp3.aarch64 as a component of openEuler-22.03-LTS-SP3"
				},
				"category":"default_component_of"
			},
			{
				"relates_to_product_reference":"openEuler-22.03-LTS-SP3",
				"product_reference":"python3-perf-debuginfo-5.10.0-207.0.0.116.oe2203sp3.aarch64.rpm",
				"full_product_name":{
					"product_id":"openEuler-22.03-LTS-SP3:python3-perf-debuginfo-5.10.0-207.0.0.116.oe2203sp3.aarch64",
					"name":"python3-perf-debuginfo-5.10.0-207.0.0.116.oe2203sp3.aarch64 as a component of openEuler-22.03-LTS-SP3"
				},
				"category":"default_component_of"
			},
			{
				"relates_to_product_reference":"openEuler-22.03-LTS-SP3",
				"product_reference":"kernel-tools-debuginfo-5.10.0-207.0.0.116.oe2203sp3.aarch64.rpm",
				"full_product_name":{
					"product_id":"openEuler-22.03-LTS-SP3:kernel-tools-debuginfo-5.10.0-207.0.0.116.oe2203sp3.aarch64",
					"name":"kernel-tools-debuginfo-5.10.0-207.0.0.116.oe2203sp3.aarch64 as a component of openEuler-22.03-LTS-SP3"
				},
				"category":"default_component_of"
			},
			{
				"relates_to_product_reference":"openEuler-22.03-LTS-SP3",
				"product_reference":"kernel-tools-5.10.0-207.0.0.116.oe2203sp3.aarch64.rpm",
				"full_product_name":{
					"product_id":"openEuler-22.03-LTS-SP3:kernel-tools-5.10.0-207.0.0.116.oe2203sp3.aarch64",
					"name":"kernel-tools-5.10.0-207.0.0.116.oe2203sp3.aarch64 as a component of openEuler-22.03-LTS-SP3"
				},
				"category":"default_component_of"
			},
			{
				"relates_to_product_reference":"openEuler-22.03-LTS-SP3",
				"product_reference":"kernel-5.10.0-207.0.0.116.oe2203sp3.aarch64.rpm",
				"full_product_name":{
					"product_id":"openEuler-22.03-LTS-SP3:kernel-5.10.0-207.0.0.116.oe2203sp3.aarch64",
					"name":"kernel-5.10.0-207.0.0.116.oe2203sp3.aarch64 as a component of openEuler-22.03-LTS-SP3"
				},
				"category":"default_component_of"
			},
			{
				"relates_to_product_reference":"openEuler-22.03-LTS-SP3",
				"product_reference":"kernel-headers-5.10.0-207.0.0.116.oe2203sp3.aarch64.rpm",
				"full_product_name":{
					"product_id":"openEuler-22.03-LTS-SP3:kernel-headers-5.10.0-207.0.0.116.oe2203sp3.aarch64",
					"name":"kernel-headers-5.10.0-207.0.0.116.oe2203sp3.aarch64 as a component of openEuler-22.03-LTS-SP3"
				},
				"category":"default_component_of"
			},
			{
				"relates_to_product_reference":"openEuler-22.03-LTS-SP3",
				"product_reference":"kernel-devel-5.10.0-207.0.0.116.oe2203sp3.aarch64.rpm",
				"full_product_name":{
					"product_id":"openEuler-22.03-LTS-SP3:kernel-devel-5.10.0-207.0.0.116.oe2203sp3.aarch64",
					"name":"kernel-devel-5.10.0-207.0.0.116.oe2203sp3.aarch64 as a component of openEuler-22.03-LTS-SP3"
				},
				"category":"default_component_of"
			},
			{
				"relates_to_product_reference":"openEuler-22.03-LTS-SP3",
				"product_reference":"python3-perf-5.10.0-207.0.0.116.oe2203sp3.aarch64.rpm",
				"full_product_name":{
					"product_id":"openEuler-22.03-LTS-SP3:python3-perf-5.10.0-207.0.0.116.oe2203sp3.aarch64",
					"name":"python3-perf-5.10.0-207.0.0.116.oe2203sp3.aarch64 as a component of openEuler-22.03-LTS-SP3"
				},
				"category":"default_component_of"
			},
			{
				"relates_to_product_reference":"openEuler-22.03-LTS-SP3",
				"product_reference":"perf-5.10.0-207.0.0.116.oe2203sp3.aarch64.rpm",
				"full_product_name":{
					"product_id":"openEuler-22.03-LTS-SP3:perf-5.10.0-207.0.0.116.oe2203sp3.aarch64",
					"name":"perf-5.10.0-207.0.0.116.oe2203sp3.aarch64 as a component of openEuler-22.03-LTS-SP3"
				},
				"category":"default_component_of"
			},
			{
				"relates_to_product_reference":"openEuler-22.03-LTS-SP3",
				"product_reference":"kernel-tools-devel-5.10.0-207.0.0.116.oe2203sp3.aarch64.rpm",
				"full_product_name":{
					"product_id":"openEuler-22.03-LTS-SP3:kernel-tools-devel-5.10.0-207.0.0.116.oe2203sp3.aarch64",
					"name":"kernel-tools-devel-5.10.0-207.0.0.116.oe2203sp3.aarch64 as a component of openEuler-22.03-LTS-SP3"
				},
				"category":"default_component_of"
			},
			{
				"relates_to_product_reference":"openEuler-22.03-LTS-SP3",
				"product_reference":"kernel-debugsource-5.10.0-207.0.0.116.oe2203sp3.aarch64.rpm",
				"full_product_name":{
					"product_id":"openEuler-22.03-LTS-SP3:kernel-debugsource-5.10.0-207.0.0.116.oe2203sp3.aarch64",
					"name":"kernel-debugsource-5.10.0-207.0.0.116.oe2203sp3.aarch64 as a component of openEuler-22.03-LTS-SP3"
				},
				"category":"default_component_of"
			},
			{
				"relates_to_product_reference":"openEuler-22.03-LTS-SP3",
				"product_reference":"kernel-source-5.10.0-207.0.0.116.oe2203sp3.aarch64.rpm",
				"full_product_name":{
					"product_id":"openEuler-22.03-LTS-SP3:kernel-source-5.10.0-207.0.0.116.oe2203sp3.aarch64",
					"name":"kernel-source-5.10.0-207.0.0.116.oe2203sp3.aarch64 as a component of openEuler-22.03-LTS-SP3"
				},
				"category":"default_component_of"
			},
			{
				"relates_to_product_reference":"openEuler-22.03-LTS-SP3",
				"product_reference":"kernel-5.10.0-207.0.0.116.oe2203sp3.src.rpm",
				"full_product_name":{
					"product_id":"openEuler-22.03-LTS-SP3:kernel-5.10.0-207.0.0.116.oe2203sp3.src",
					"name":"kernel-5.10.0-207.0.0.116.oe2203sp3.src as a component of openEuler-22.03-LTS-SP3"
				},
				"category":"default_component_of"
			},
			{
				"relates_to_product_reference":"openEuler-22.03-LTS-SP3",
				"product_reference":"kernel-debuginfo-5.10.0-207.0.0.116.oe2203sp3.x86_64.rpm",
				"full_product_name":{
					"product_id":"openEuler-22.03-LTS-SP3:kernel-debuginfo-5.10.0-207.0.0.116.oe2203sp3.x86_64",
					"name":"kernel-debuginfo-5.10.0-207.0.0.116.oe2203sp3.x86_64 as a component of openEuler-22.03-LTS-SP3"
				},
				"category":"default_component_of"
			},
			{
				"relates_to_product_reference":"openEuler-22.03-LTS-SP3",
				"product_reference":"kernel-tools-5.10.0-207.0.0.116.oe2203sp3.x86_64.rpm",
				"full_product_name":{
					"product_id":"openEuler-22.03-LTS-SP3:kernel-tools-5.10.0-207.0.0.116.oe2203sp3.x86_64",
					"name":"kernel-tools-5.10.0-207.0.0.116.oe2203sp3.x86_64 as a component of openEuler-22.03-LTS-SP3"
				},
				"category":"default_component_of"
			},
			{
				"relates_to_product_reference":"openEuler-22.03-LTS-SP3",
				"product_reference":"python3-perf-5.10.0-207.0.0.116.oe2203sp3.x86_64.rpm",
				"full_product_name":{
					"product_id":"openEuler-22.03-LTS-SP3:python3-perf-5.10.0-207.0.0.116.oe2203sp3.x86_64",
					"name":"python3-perf-5.10.0-207.0.0.116.oe2203sp3.x86_64 as a component of openEuler-22.03-LTS-SP3"
				},
				"category":"default_component_of"
			},
			{
				"relates_to_product_reference":"openEuler-22.03-LTS-SP3",
				"product_reference":"kernel-source-5.10.0-207.0.0.116.oe2203sp3.x86_64.rpm",
				"full_product_name":{
					"product_id":"openEuler-22.03-LTS-SP3:kernel-source-5.10.0-207.0.0.116.oe2203sp3.x86_64",
					"name":"kernel-source-5.10.0-207.0.0.116.oe2203sp3.x86_64 as a component of openEuler-22.03-LTS-SP3"
				},
				"category":"default_component_of"
			},
			{
				"relates_to_product_reference":"openEuler-22.03-LTS-SP3",
				"product_reference":"kernel-headers-5.10.0-207.0.0.116.oe2203sp3.x86_64.rpm",
				"full_product_name":{
					"product_id":"openEuler-22.03-LTS-SP3:kernel-headers-5.10.0-207.0.0.116.oe2203sp3.x86_64",
					"name":"kernel-headers-5.10.0-207.0.0.116.oe2203sp3.x86_64 as a component of openEuler-22.03-LTS-SP3"
				},
				"category":"default_component_of"
			},
			{
				"relates_to_product_reference":"openEuler-22.03-LTS-SP3",
				"product_reference":"perf-5.10.0-207.0.0.116.oe2203sp3.x86_64.rpm",
				"full_product_name":{
					"product_id":"openEuler-22.03-LTS-SP3:perf-5.10.0-207.0.0.116.oe2203sp3.x86_64",
					"name":"perf-5.10.0-207.0.0.116.oe2203sp3.x86_64 as a component of openEuler-22.03-LTS-SP3"
				},
				"category":"default_component_of"
			},
			{
				"relates_to_product_reference":"openEuler-22.03-LTS-SP3",
				"product_reference":"kernel-devel-5.10.0-207.0.0.116.oe2203sp3.x86_64.rpm",
				"full_product_name":{
					"product_id":"openEuler-22.03-LTS-SP3:kernel-devel-5.10.0-207.0.0.116.oe2203sp3.x86_64",
					"name":"kernel-devel-5.10.0-207.0.0.116.oe2203sp3.x86_64 as a component of openEuler-22.03-LTS-SP3"
				},
				"category":"default_component_of"
			},
			{
				"relates_to_product_reference":"openEuler-22.03-LTS-SP3",
				"product_reference":"kernel-tools-devel-5.10.0-207.0.0.116.oe2203sp3.x86_64.rpm",
				"full_product_name":{
					"product_id":"openEuler-22.03-LTS-SP3:kernel-tools-devel-5.10.0-207.0.0.116.oe2203sp3.x86_64",
					"name":"kernel-tools-devel-5.10.0-207.0.0.116.oe2203sp3.x86_64 as a component of openEuler-22.03-LTS-SP3"
				},
				"category":"default_component_of"
			},
			{
				"relates_to_product_reference":"openEuler-22.03-LTS-SP3",
				"product_reference":"kernel-debugsource-5.10.0-207.0.0.116.oe2203sp3.x86_64.rpm",
				"full_product_name":{
					"product_id":"openEuler-22.03-LTS-SP3:kernel-debugsource-5.10.0-207.0.0.116.oe2203sp3.x86_64",
					"name":"kernel-debugsource-5.10.0-207.0.0.116.oe2203sp3.x86_64 as a component of openEuler-22.03-LTS-SP3"
				},
				"category":"default_component_of"
			},
			{
				"relates_to_product_reference":"openEuler-22.03-LTS-SP3",
				"product_reference":"kernel-tools-debuginfo-5.10.0-207.0.0.116.oe2203sp3.x86_64.rpm",
				"full_product_name":{
					"product_id":"openEuler-22.03-LTS-SP3:kernel-tools-debuginfo-5.10.0-207.0.0.116.oe2203sp3.x86_64",
					"name":"kernel-tools-debuginfo-5.10.0-207.0.0.116.oe2203sp3.x86_64 as a component of openEuler-22.03-LTS-SP3"
				},
				"category":"default_component_of"
			},
			{
				"relates_to_product_reference":"openEuler-22.03-LTS-SP3",
				"product_reference":"kernel-5.10.0-207.0.0.116.oe2203sp3.x86_64.rpm",
				"full_product_name":{
					"product_id":"openEuler-22.03-LTS-SP3:kernel-5.10.0-207.0.0.116.oe2203sp3.x86_64",
					"name":"kernel-5.10.0-207.0.0.116.oe2203sp3.x86_64 as a component of openEuler-22.03-LTS-SP3"
				},
				"category":"default_component_of"
			},
			{
				"relates_to_product_reference":"openEuler-22.03-LTS-SP3",
				"product_reference":"python3-perf-debuginfo-5.10.0-207.0.0.116.oe2203sp3.x86_64.rpm",
				"full_product_name":{
					"product_id":"openEuler-22.03-LTS-SP3:python3-perf-debuginfo-5.10.0-207.0.0.116.oe2203sp3.x86_64",
					"name":"python3-perf-debuginfo-5.10.0-207.0.0.116.oe2203sp3.x86_64 as a component of openEuler-22.03-LTS-SP3"
				},
				"category":"default_component_of"
			},
			{
				"relates_to_product_reference":"openEuler-22.03-LTS-SP3",
				"product_reference":"perf-debuginfo-5.10.0-207.0.0.116.oe2203sp3.x86_64.rpm",
				"full_product_name":{
					"product_id":"openEuler-22.03-LTS-SP3:perf-debuginfo-5.10.0-207.0.0.116.oe2203sp3.x86_64",
					"name":"perf-debuginfo-5.10.0-207.0.0.116.oe2203sp3.x86_64 as a component of openEuler-22.03-LTS-SP3"
				},
				"category":"default_component_of"
			}
		]
	},
	"vulnerabilities":[
		{
			"cve":"CVE-2021-47247",
			"notes":[
				{
					"text":"In the Linux kernel, the following vulnerability has been resolved:\n\nnet/mlx5e: Fix use-after-free of encap entry in neigh update handler\n\nFunction mlx5e_rep_neigh_update() wasn't updated to accommodate rtnl lock\nremoval from TC filter update path and properly handle concurrent encap\nentry insertion/deletion which can lead to following use-after-free:\n\n [23827.464923] ==================================================================\n [23827.469446] BUG: KASAN: use-after-free in mlx5e_encap_take+0x72/0x140 [mlx5_core]\n [23827.470971] Read of size 4 at addr ffff8881d132228c by task kworker/u20:6/21635\n [23827.472251]\n [23827.472615] CPU: 9 PID: 21635 Comm: kworker/u20:6 Not tainted 5.13.0-rc3+ #5\n [23827.473788] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS rel-1.13.0-0-gf21b5a4aeb02-prebuilt.qemu.org 04/01/2014\n [23827.475639] Workqueue: mlx5e mlx5e_rep_neigh_update [mlx5_core]\n [23827.476731] Call Trace:\n [23827.477260]  dump_stack+0xbb/0x107\n [23827.477906]  print_address_description.constprop.0+0x18/0x140\n [23827.478896]  ? mlx5e_encap_take+0x72/0x140 [mlx5_core]\n [23827.479879]  ? mlx5e_encap_take+0x72/0x140 [mlx5_core]\n [23827.480905]  kasan_report.cold+0x7c/0xd8\n [23827.481701]  ? mlx5e_encap_take+0x72/0x140 [mlx5_core]\n [23827.482744]  kasan_check_range+0x145/0x1a0\n [23827.493112]  mlx5e_encap_take+0x72/0x140 [mlx5_core]\n [23827.494054]  ? mlx5e_tc_tun_encap_info_equal_generic+0x140/0x140 [mlx5_core]\n [23827.495296]  mlx5e_rep_neigh_update+0x41e/0x5e0 [mlx5_core]\n [23827.496338]  ? mlx5e_rep_neigh_entry_release+0xb80/0xb80 [mlx5_core]\n [23827.497486]  ? read_word_at_a_time+0xe/0x20\n [23827.498250]  ? strscpy+0xa0/0x2a0\n [23827.498889]  process_one_work+0x8ac/0x14e0\n [23827.499638]  ? lockdep_hardirqs_on_prepare+0x400/0x400\n [23827.500537]  ? pwq_dec_nr_in_flight+0x2c0/0x2c0\n [23827.501359]  ? rwlock_bug.part.0+0x90/0x90\n [23827.502116]  worker_thread+0x53b/0x1220\n [23827.502831]  ? process_one_work+0x14e0/0x14e0\n [23827.503627]  kthread+0x328/0x3f0\n [23827.504254]  ? _raw_spin_unlock_irq+0x24/0x40\n [23827.505065]  ? __kthread_bind_mask+0x90/0x90\n [23827.505912]  ret_from_fork+0x1f/0x30\n [23827.506621]\n [23827.506987] Allocated by task 28248:\n [23827.507694]  kasan_save_stack+0x1b/0x40\n [23827.508476]  __kasan_kmalloc+0x7c/0x90\n [23827.509197]  mlx5e_attach_encap+0xde1/0x1d40 [mlx5_core]\n [23827.510194]  mlx5e_tc_add_fdb_flow+0x397/0xc40 [mlx5_core]\n [23827.511218]  __mlx5e_add_fdb_flow+0x519/0xb30 [mlx5_core]\n [23827.512234]  mlx5e_configure_flower+0x191c/0x4870 [mlx5_core]\n [23827.513298]  tc_setup_cb_add+0x1d5/0x420\n [23827.514023]  fl_hw_replace_filter+0x382/0x6a0 [cls_flower]\n [23827.514975]  fl_change+0x2ceb/0x4a51 [cls_flower]\n [23827.515821]  tc_new_tfilter+0x89a/0x2070\n [23827.516548]  rtnetlink_rcv_msg+0x644/0x8c0\n [23827.517300]  netlink_rcv_skb+0x11d/0x340\n [23827.518021]  netlink_unicast+0x42b/0x700\n [23827.518742]  netlink_sendmsg+0x743/0xc20\n [23827.519467]  sock_sendmsg+0xb2/0xe0\n [23827.520131]  ____sys_sendmsg+0x590/0x770\n [23827.520851]  ___sys_sendmsg+0xd8/0x160\n [23827.521552]  __sys_sendmsg+0xb7/0x140\n [23827.522238]  do_syscall_64+0x3a/0x70\n [23827.522907]  entry_SYSCALL_64_after_hwframe+0x44/0xae\n [23827.523797]\n [23827.524163] Freed by task 25948:\n [23827.524780]  kasan_save_stack+0x1b/0x40\n [23827.525488]  kasan_set_track+0x1c/0x30\n [23827.526187]  kasan_set_free_info+0x20/0x30\n [23827.526968]  __kasan_slab_free+0xed/0x130\n [23827.527709]  slab_free_freelist_hook+0xcf/0x1d0\n [23827.528528]  kmem_cache_free_bulk+0x33a/0x6e0\n [23827.529317]  kfree_rcu_work+0x55f/0xb70\n [23827.530024]  process_one_work+0x8ac/0x14e0\n [23827.530770]  worker_thread+0x53b/0x1220\n [23827.531480]  kthread+0x328/0x3f0\n [23827.532114]  ret_from_fork+0x1f/0x30\n [23827.532785]\n [23827.533147] Last potentially related work creation:\n [23827.534007]  kasan_save_stack+0x1b/0x40\n [23827.534710]  kasan_record_aux_stack+0xab/0xc0\n [23827.535492]  kvfree_call_rcu+0x31/0x7b0\n [23827.536206]  mlx5e_tc_del\n---truncated---",
					"category":"description",
					"title":"Vulnerability Description"
				}
			],
			"product_status":{
				"fixed":[
					"openEuler-22.03-LTS-SP3:perf-debuginfo-5.10.0-207.0.0.116.oe2203sp3.aarch64",
					"openEuler-22.03-LTS-SP3:kernel-debuginfo-5.10.0-207.0.0.116.oe2203sp3.aarch64",
					"openEuler-22.03-LTS-SP3:python3-perf-debuginfo-5.10.0-207.0.0.116.oe2203sp3.aarch64",
					"openEuler-22.03-LTS-SP3:kernel-tools-debuginfo-5.10.0-207.0.0.116.oe2203sp3.aarch64",
					"openEuler-22.03-LTS-SP3:kernel-tools-5.10.0-207.0.0.116.oe2203sp3.aarch64",
					"openEuler-22.03-LTS-SP3:kernel-5.10.0-207.0.0.116.oe2203sp3.aarch64",
					"openEuler-22.03-LTS-SP3:kernel-headers-5.10.0-207.0.0.116.oe2203sp3.aarch64",
					"openEuler-22.03-LTS-SP3:kernel-devel-5.10.0-207.0.0.116.oe2203sp3.aarch64",
					"openEuler-22.03-LTS-SP3:python3-perf-5.10.0-207.0.0.116.oe2203sp3.aarch64",
					"openEuler-22.03-LTS-SP3:perf-5.10.0-207.0.0.116.oe2203sp3.aarch64",
					"openEuler-22.03-LTS-SP3:kernel-tools-devel-5.10.0-207.0.0.116.oe2203sp3.aarch64",
					"openEuler-22.03-LTS-SP3:kernel-debugsource-5.10.0-207.0.0.116.oe2203sp3.aarch64",
					"openEuler-22.03-LTS-SP3:kernel-source-5.10.0-207.0.0.116.oe2203sp3.aarch64",
					"openEuler-22.03-LTS-SP3:kernel-5.10.0-207.0.0.116.oe2203sp3.src",
					"openEuler-22.03-LTS-SP3:kernel-debuginfo-5.10.0-207.0.0.116.oe2203sp3.x86_64",
					"openEuler-22.03-LTS-SP3:kernel-tools-5.10.0-207.0.0.116.oe2203sp3.x86_64",
					"openEuler-22.03-LTS-SP3:python3-perf-5.10.0-207.0.0.116.oe2203sp3.x86_64",
					"openEuler-22.03-LTS-SP3:kernel-source-5.10.0-207.0.0.116.oe2203sp3.x86_64",
					"openEuler-22.03-LTS-SP3:kernel-headers-5.10.0-207.0.0.116.oe2203sp3.x86_64",
					"openEuler-22.03-LTS-SP3:perf-5.10.0-207.0.0.116.oe2203sp3.x86_64",
					"openEuler-22.03-LTS-SP3:kernel-devel-5.10.0-207.0.0.116.oe2203sp3.x86_64",
					"openEuler-22.03-LTS-SP3:kernel-tools-devel-5.10.0-207.0.0.116.oe2203sp3.x86_64",
					"openEuler-22.03-LTS-SP3:kernel-debugsource-5.10.0-207.0.0.116.oe2203sp3.x86_64",
					"openEuler-22.03-LTS-SP3:kernel-tools-debuginfo-5.10.0-207.0.0.116.oe2203sp3.x86_64",
					"openEuler-22.03-LTS-SP3:kernel-5.10.0-207.0.0.116.oe2203sp3.x86_64",
					"openEuler-22.03-LTS-SP3:python3-perf-debuginfo-5.10.0-207.0.0.116.oe2203sp3.x86_64",
					"openEuler-22.03-LTS-SP3:perf-debuginfo-5.10.0-207.0.0.116.oe2203sp3.x86_64"
				]
			},
			"remediations":[
				{
					"product_ids":[
						"openEuler-22.03-LTS-SP3:perf-debuginfo-5.10.0-207.0.0.116.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:kernel-debuginfo-5.10.0-207.0.0.116.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:python3-perf-debuginfo-5.10.0-207.0.0.116.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:kernel-tools-debuginfo-5.10.0-207.0.0.116.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:kernel-tools-5.10.0-207.0.0.116.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:kernel-5.10.0-207.0.0.116.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:kernel-headers-5.10.0-207.0.0.116.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:kernel-devel-5.10.0-207.0.0.116.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:python3-perf-5.10.0-207.0.0.116.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:perf-5.10.0-207.0.0.116.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:kernel-tools-devel-5.10.0-207.0.0.116.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:kernel-debugsource-5.10.0-207.0.0.116.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:kernel-source-5.10.0-207.0.0.116.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:kernel-5.10.0-207.0.0.116.oe2203sp3.src",
						"openEuler-22.03-LTS-SP3:kernel-debuginfo-5.10.0-207.0.0.116.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:kernel-tools-5.10.0-207.0.0.116.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:python3-perf-5.10.0-207.0.0.116.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:kernel-source-5.10.0-207.0.0.116.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:kernel-headers-5.10.0-207.0.0.116.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:perf-5.10.0-207.0.0.116.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:kernel-devel-5.10.0-207.0.0.116.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:kernel-tools-devel-5.10.0-207.0.0.116.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:kernel-debugsource-5.10.0-207.0.0.116.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:kernel-tools-debuginfo-5.10.0-207.0.0.116.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:kernel-5.10.0-207.0.0.116.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:python3-perf-debuginfo-5.10.0-207.0.0.116.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:perf-debuginfo-5.10.0-207.0.0.116.oe2203sp3.x86_64"
					],
					"details":"kernel security update",
					"category":"vendor_fix",
					"url":"https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2024-1707"
				}
			],
			"scores":[
				{
					"cvss_v3":{
						"baseSeverity":"HIGH",
						"baseScore":7.8,
						"vectorString":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
						"version":"3.1"
					},
					"products":[
						"openEuler-22.03-LTS-SP3:perf-debuginfo-5.10.0-207.0.0.116.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:kernel-debuginfo-5.10.0-207.0.0.116.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:python3-perf-debuginfo-5.10.0-207.0.0.116.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:kernel-tools-debuginfo-5.10.0-207.0.0.116.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:kernel-tools-5.10.0-207.0.0.116.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:kernel-5.10.0-207.0.0.116.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:kernel-headers-5.10.0-207.0.0.116.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:kernel-devel-5.10.0-207.0.0.116.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:python3-perf-5.10.0-207.0.0.116.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:perf-5.10.0-207.0.0.116.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:kernel-tools-devel-5.10.0-207.0.0.116.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:kernel-debugsource-5.10.0-207.0.0.116.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:kernel-source-5.10.0-207.0.0.116.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:kernel-5.10.0-207.0.0.116.oe2203sp3.src",
						"openEuler-22.03-LTS-SP3:kernel-debuginfo-5.10.0-207.0.0.116.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:kernel-tools-5.10.0-207.0.0.116.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:python3-perf-5.10.0-207.0.0.116.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:kernel-source-5.10.0-207.0.0.116.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:kernel-headers-5.10.0-207.0.0.116.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:perf-5.10.0-207.0.0.116.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:kernel-devel-5.10.0-207.0.0.116.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:kernel-tools-devel-5.10.0-207.0.0.116.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:kernel-debugsource-5.10.0-207.0.0.116.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:kernel-tools-debuginfo-5.10.0-207.0.0.116.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:kernel-5.10.0-207.0.0.116.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:python3-perf-debuginfo-5.10.0-207.0.0.116.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:perf-debuginfo-5.10.0-207.0.0.116.oe2203sp3.x86_64"
					]
				}
			],
			"threats":[
				{
					"details":"High",
					"category":"impact"
				}
			],
			"title":"CVE-2021-47247"
		},
		{
			"cve":"CVE-2021-47484",
			"notes":[
				{
					"text":"In the Linux kernel, the following vulnerability has been resolved:\n\nocteontx2-af: Fix possible null pointer dereference.\n\nThis patch fixes possible null pointer dereference in files\n\"rvu_debugfs.c\" and \"rvu_nix.c\"",
					"category":"description",
					"title":"Vulnerability Description"
				}
			],
			"product_status":{
				"fixed":[
					"openEuler-22.03-LTS-SP3:perf-debuginfo-5.10.0-207.0.0.116.oe2203sp3.aarch64",
					"openEuler-22.03-LTS-SP3:kernel-debuginfo-5.10.0-207.0.0.116.oe2203sp3.aarch64",
					"openEuler-22.03-LTS-SP3:python3-perf-debuginfo-5.10.0-207.0.0.116.oe2203sp3.aarch64",
					"openEuler-22.03-LTS-SP3:kernel-tools-debuginfo-5.10.0-207.0.0.116.oe2203sp3.aarch64",
					"openEuler-22.03-LTS-SP3:kernel-tools-5.10.0-207.0.0.116.oe2203sp3.aarch64",
					"openEuler-22.03-LTS-SP3:kernel-5.10.0-207.0.0.116.oe2203sp3.aarch64",
					"openEuler-22.03-LTS-SP3:kernel-headers-5.10.0-207.0.0.116.oe2203sp3.aarch64",
					"openEuler-22.03-LTS-SP3:kernel-devel-5.10.0-207.0.0.116.oe2203sp3.aarch64",
					"openEuler-22.03-LTS-SP3:python3-perf-5.10.0-207.0.0.116.oe2203sp3.aarch64",
					"openEuler-22.03-LTS-SP3:perf-5.10.0-207.0.0.116.oe2203sp3.aarch64",
					"openEuler-22.03-LTS-SP3:kernel-tools-devel-5.10.0-207.0.0.116.oe2203sp3.aarch64",
					"openEuler-22.03-LTS-SP3:kernel-debugsource-5.10.0-207.0.0.116.oe2203sp3.aarch64",
					"openEuler-22.03-LTS-SP3:kernel-source-5.10.0-207.0.0.116.oe2203sp3.aarch64",
					"openEuler-22.03-LTS-SP3:kernel-5.10.0-207.0.0.116.oe2203sp3.src",
					"openEuler-22.03-LTS-SP3:kernel-debuginfo-5.10.0-207.0.0.116.oe2203sp3.x86_64",
					"openEuler-22.03-LTS-SP3:kernel-tools-5.10.0-207.0.0.116.oe2203sp3.x86_64",
					"openEuler-22.03-LTS-SP3:python3-perf-5.10.0-207.0.0.116.oe2203sp3.x86_64",
					"openEuler-22.03-LTS-SP3:kernel-source-5.10.0-207.0.0.116.oe2203sp3.x86_64",
					"openEuler-22.03-LTS-SP3:kernel-headers-5.10.0-207.0.0.116.oe2203sp3.x86_64",
					"openEuler-22.03-LTS-SP3:perf-5.10.0-207.0.0.116.oe2203sp3.x86_64",
					"openEuler-22.03-LTS-SP3:kernel-devel-5.10.0-207.0.0.116.oe2203sp3.x86_64",
					"openEuler-22.03-LTS-SP3:kernel-tools-devel-5.10.0-207.0.0.116.oe2203sp3.x86_64",
					"openEuler-22.03-LTS-SP3:kernel-debugsource-5.10.0-207.0.0.116.oe2203sp3.x86_64",
					"openEuler-22.03-LTS-SP3:kernel-tools-debuginfo-5.10.0-207.0.0.116.oe2203sp3.x86_64",
					"openEuler-22.03-LTS-SP3:kernel-5.10.0-207.0.0.116.oe2203sp3.x86_64",
					"openEuler-22.03-LTS-SP3:python3-perf-debuginfo-5.10.0-207.0.0.116.oe2203sp3.x86_64",
					"openEuler-22.03-LTS-SP3:perf-debuginfo-5.10.0-207.0.0.116.oe2203sp3.x86_64"
				]
			},
			"remediations":[
				{
					"product_ids":[
						"openEuler-22.03-LTS-SP3:perf-debuginfo-5.10.0-207.0.0.116.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:kernel-debuginfo-5.10.0-207.0.0.116.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:python3-perf-debuginfo-5.10.0-207.0.0.116.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:kernel-tools-debuginfo-5.10.0-207.0.0.116.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:kernel-tools-5.10.0-207.0.0.116.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:kernel-5.10.0-207.0.0.116.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:kernel-headers-5.10.0-207.0.0.116.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:kernel-devel-5.10.0-207.0.0.116.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:python3-perf-5.10.0-207.0.0.116.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:perf-5.10.0-207.0.0.116.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:kernel-tools-devel-5.10.0-207.0.0.116.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:kernel-debugsource-5.10.0-207.0.0.116.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:kernel-source-5.10.0-207.0.0.116.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:kernel-5.10.0-207.0.0.116.oe2203sp3.src",
						"openEuler-22.03-LTS-SP3:kernel-debuginfo-5.10.0-207.0.0.116.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:kernel-tools-5.10.0-207.0.0.116.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:python3-perf-5.10.0-207.0.0.116.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:kernel-source-5.10.0-207.0.0.116.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:kernel-headers-5.10.0-207.0.0.116.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:perf-5.10.0-207.0.0.116.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:kernel-devel-5.10.0-207.0.0.116.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:kernel-tools-devel-5.10.0-207.0.0.116.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:kernel-debugsource-5.10.0-207.0.0.116.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:kernel-tools-debuginfo-5.10.0-207.0.0.116.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:kernel-5.10.0-207.0.0.116.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:python3-perf-debuginfo-5.10.0-207.0.0.116.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:perf-debuginfo-5.10.0-207.0.0.116.oe2203sp3.x86_64"
					],
					"details":"kernel security update",
					"category":"vendor_fix",
					"url":"https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2024-1707"
				}
			],
			"scores":[
				{
					"cvss_v3":{
						"baseSeverity":"MEDIUM",
						"baseScore":5.5,
						"vectorString":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
						"version":"3.1"
					},
					"products":[
						"openEuler-22.03-LTS-SP3:perf-debuginfo-5.10.0-207.0.0.116.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:kernel-debuginfo-5.10.0-207.0.0.116.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:python3-perf-debuginfo-5.10.0-207.0.0.116.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:kernel-tools-debuginfo-5.10.0-207.0.0.116.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:kernel-tools-5.10.0-207.0.0.116.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:kernel-5.10.0-207.0.0.116.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:kernel-headers-5.10.0-207.0.0.116.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:kernel-devel-5.10.0-207.0.0.116.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:python3-perf-5.10.0-207.0.0.116.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:perf-5.10.0-207.0.0.116.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:kernel-tools-devel-5.10.0-207.0.0.116.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:kernel-debugsource-5.10.0-207.0.0.116.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:kernel-source-5.10.0-207.0.0.116.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:kernel-5.10.0-207.0.0.116.oe2203sp3.src",
						"openEuler-22.03-LTS-SP3:kernel-debuginfo-5.10.0-207.0.0.116.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:kernel-tools-5.10.0-207.0.0.116.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:python3-perf-5.10.0-207.0.0.116.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:kernel-source-5.10.0-207.0.0.116.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:kernel-headers-5.10.0-207.0.0.116.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:perf-5.10.0-207.0.0.116.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:kernel-devel-5.10.0-207.0.0.116.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:kernel-tools-devel-5.10.0-207.0.0.116.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:kernel-debugsource-5.10.0-207.0.0.116.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:kernel-tools-debuginfo-5.10.0-207.0.0.116.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:kernel-5.10.0-207.0.0.116.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:python3-perf-debuginfo-5.10.0-207.0.0.116.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:perf-debuginfo-5.10.0-207.0.0.116.oe2203sp3.x86_64"
					]
				}
			],
			"threats":[
				{
					"details":"Medium",
					"category":"impact"
				}
			],
			"title":"CVE-2021-47484"
		},
		{
			"cve":"CVE-2021-47558",
			"notes":[
				{
					"text":"In the Linux kernel, the following vulnerability has been resolved:\n\nnet: stmmac: Disable Tx queues when reconfiguring the interface\n\nThe Tx queues were not disabled in situations where the driver needed to\nstop the interface to apply a new configuration. This could result in a\nkernel panic when doing any of the 3 following actions:\n* reconfiguring the number of queues (ethtool -L)\n* reconfiguring the size of the ring buffers (ethtool -G)\n* installing/removing an XDP program (ip l set dev ethX xdp)\n\nPrevent the panic by making sure netif_tx_disable is called when stopping\nan interface.\n\nWithout this patch, the following kernel panic can be observed when doing\nany of the actions above:\n\nUnable to handle kernel paging request at virtual address ffff80001238d040\n[....]\n Call trace:\n  dwmac4_set_addr+0x8/0x10\n  dev_hard_start_xmit+0xe4/0x1ac\n  sch_direct_xmit+0xe8/0x39c\n  __dev_queue_xmit+0x3ec/0xaf0\n  dev_queue_xmit+0x14/0x20\n[...]\n[ end trace 0000000000000002 ]---",
					"category":"description",
					"title":"Vulnerability Description"
				}
			],
			"product_status":{
				"fixed":[
					"openEuler-22.03-LTS-SP3:perf-debuginfo-5.10.0-207.0.0.116.oe2203sp3.aarch64",
					"openEuler-22.03-LTS-SP3:kernel-debuginfo-5.10.0-207.0.0.116.oe2203sp3.aarch64",
					"openEuler-22.03-LTS-SP3:python3-perf-debuginfo-5.10.0-207.0.0.116.oe2203sp3.aarch64",
					"openEuler-22.03-LTS-SP3:kernel-tools-debuginfo-5.10.0-207.0.0.116.oe2203sp3.aarch64",
					"openEuler-22.03-LTS-SP3:kernel-tools-5.10.0-207.0.0.116.oe2203sp3.aarch64",
					"openEuler-22.03-LTS-SP3:kernel-5.10.0-207.0.0.116.oe2203sp3.aarch64",
					"openEuler-22.03-LTS-SP3:kernel-headers-5.10.0-207.0.0.116.oe2203sp3.aarch64",
					"openEuler-22.03-LTS-SP3:kernel-devel-5.10.0-207.0.0.116.oe2203sp3.aarch64",
					"openEuler-22.03-LTS-SP3:python3-perf-5.10.0-207.0.0.116.oe2203sp3.aarch64",
					"openEuler-22.03-LTS-SP3:perf-5.10.0-207.0.0.116.oe2203sp3.aarch64",
					"openEuler-22.03-LTS-SP3:kernel-tools-devel-5.10.0-207.0.0.116.oe2203sp3.aarch64",
					"openEuler-22.03-LTS-SP3:kernel-debugsource-5.10.0-207.0.0.116.oe2203sp3.aarch64",
					"openEuler-22.03-LTS-SP3:kernel-source-5.10.0-207.0.0.116.oe2203sp3.aarch64",
					"openEuler-22.03-LTS-SP3:kernel-5.10.0-207.0.0.116.oe2203sp3.src",
					"openEuler-22.03-LTS-SP3:kernel-debuginfo-5.10.0-207.0.0.116.oe2203sp3.x86_64",
					"openEuler-22.03-LTS-SP3:kernel-tools-5.10.0-207.0.0.116.oe2203sp3.x86_64",
					"openEuler-22.03-LTS-SP3:python3-perf-5.10.0-207.0.0.116.oe2203sp3.x86_64",
					"openEuler-22.03-LTS-SP3:kernel-source-5.10.0-207.0.0.116.oe2203sp3.x86_64",
					"openEuler-22.03-LTS-SP3:kernel-headers-5.10.0-207.0.0.116.oe2203sp3.x86_64",
					"openEuler-22.03-LTS-SP3:perf-5.10.0-207.0.0.116.oe2203sp3.x86_64",
					"openEuler-22.03-LTS-SP3:kernel-devel-5.10.0-207.0.0.116.oe2203sp3.x86_64",
					"openEuler-22.03-LTS-SP3:kernel-tools-devel-5.10.0-207.0.0.116.oe2203sp3.x86_64",
					"openEuler-22.03-LTS-SP3:kernel-debugsource-5.10.0-207.0.0.116.oe2203sp3.x86_64",
					"openEuler-22.03-LTS-SP3:kernel-tools-debuginfo-5.10.0-207.0.0.116.oe2203sp3.x86_64",
					"openEuler-22.03-LTS-SP3:kernel-5.10.0-207.0.0.116.oe2203sp3.x86_64",
					"openEuler-22.03-LTS-SP3:python3-perf-debuginfo-5.10.0-207.0.0.116.oe2203sp3.x86_64",
					"openEuler-22.03-LTS-SP3:perf-debuginfo-5.10.0-207.0.0.116.oe2203sp3.x86_64"
				]
			},
			"remediations":[
				{
					"product_ids":[
						"openEuler-22.03-LTS-SP3:perf-debuginfo-5.10.0-207.0.0.116.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:kernel-debuginfo-5.10.0-207.0.0.116.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:python3-perf-debuginfo-5.10.0-207.0.0.116.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:kernel-tools-debuginfo-5.10.0-207.0.0.116.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:kernel-tools-5.10.0-207.0.0.116.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:kernel-5.10.0-207.0.0.116.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:kernel-headers-5.10.0-207.0.0.116.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:kernel-devel-5.10.0-207.0.0.116.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:python3-perf-5.10.0-207.0.0.116.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:perf-5.10.0-207.0.0.116.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:kernel-tools-devel-5.10.0-207.0.0.116.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:kernel-debugsource-5.10.0-207.0.0.116.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:kernel-source-5.10.0-207.0.0.116.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:kernel-5.10.0-207.0.0.116.oe2203sp3.src",
						"openEuler-22.03-LTS-SP3:kernel-debuginfo-5.10.0-207.0.0.116.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:kernel-tools-5.10.0-207.0.0.116.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:python3-perf-5.10.0-207.0.0.116.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:kernel-source-5.10.0-207.0.0.116.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:kernel-headers-5.10.0-207.0.0.116.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:perf-5.10.0-207.0.0.116.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:kernel-devel-5.10.0-207.0.0.116.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:kernel-tools-devel-5.10.0-207.0.0.116.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:kernel-debugsource-5.10.0-207.0.0.116.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:kernel-tools-debuginfo-5.10.0-207.0.0.116.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:kernel-5.10.0-207.0.0.116.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:python3-perf-debuginfo-5.10.0-207.0.0.116.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:perf-debuginfo-5.10.0-207.0.0.116.oe2203sp3.x86_64"
					],
					"details":"kernel security update",
					"category":"vendor_fix",
					"url":"https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2024-1707"
				}
			],
			"scores":[
				{
					"cvss_v3":{
						"baseSeverity":"MEDIUM",
						"baseScore":5.5,
						"vectorString":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
						"version":"3.1"
					},
					"products":[
						"openEuler-22.03-LTS-SP3:perf-debuginfo-5.10.0-207.0.0.116.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:kernel-debuginfo-5.10.0-207.0.0.116.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:python3-perf-debuginfo-5.10.0-207.0.0.116.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:kernel-tools-debuginfo-5.10.0-207.0.0.116.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:kernel-tools-5.10.0-207.0.0.116.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:kernel-5.10.0-207.0.0.116.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:kernel-headers-5.10.0-207.0.0.116.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:kernel-devel-5.10.0-207.0.0.116.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:python3-perf-5.10.0-207.0.0.116.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:perf-5.10.0-207.0.0.116.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:kernel-tools-devel-5.10.0-207.0.0.116.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:kernel-debugsource-5.10.0-207.0.0.116.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:kernel-source-5.10.0-207.0.0.116.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:kernel-5.10.0-207.0.0.116.oe2203sp3.src",
						"openEuler-22.03-LTS-SP3:kernel-debuginfo-5.10.0-207.0.0.116.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:kernel-tools-5.10.0-207.0.0.116.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:python3-perf-5.10.0-207.0.0.116.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:kernel-source-5.10.0-207.0.0.116.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:kernel-headers-5.10.0-207.0.0.116.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:perf-5.10.0-207.0.0.116.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:kernel-devel-5.10.0-207.0.0.116.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:kernel-tools-devel-5.10.0-207.0.0.116.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:kernel-debugsource-5.10.0-207.0.0.116.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:kernel-tools-debuginfo-5.10.0-207.0.0.116.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:kernel-5.10.0-207.0.0.116.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:python3-perf-debuginfo-5.10.0-207.0.0.116.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:perf-debuginfo-5.10.0-207.0.0.116.oe2203sp3.x86_64"
					]
				}
			],
			"threats":[
				{
					"details":"Medium",
					"category":"impact"
				}
			],
			"title":"CVE-2021-47558"
		},
		{
			"cve":"CVE-2022-48652",
			"notes":[
				{
					"text":"In the Linux kernel, the following vulnerability has been resolved:\n\nice: Fix crash by keep old cfg when update TCs more than queues\n\nThere are problems if allocated queues less than Traffic Classes.\n\nCommit a632b2a4c920 (\"ice: ethtool: Prohibit improper channel config\nfor DCB\") already disallow setting less queues than TCs.\n\nAnother case is if we first set less queues, and later update more TCs\nconfig due to LLDP, ice_vsi_cfg_tc() will failed but left dirty\nnum_txq/rxq and tc_cfg in vsi, that will cause invalid pointer access.\n\n[   95.968089] ice 0000:3b:00.1: More TCs defined than queues/rings allocated.\n[   95.968092] ice 0000:3b:00.1: Trying to use more Rx queues (8), than were allocated (1)!\n[   95.968093] ice 0000:3b:00.1: Failed to config TC for VSI index: 0\n[   95.969621] general protection fault: 0000 [#1] SMP NOPTI\n[   95.969705] CPU: 1 PID: 58405 Comm: lldpad Kdump: loaded Tainted: G     U  W  O     --------- -t - 4.18.0 #1\n[   95.969867] Hardware name: O.E.M/BC11SPSCB10, BIOS 8.23 12/30/2021\n[   95.969992] RIP: 0010:devm_kmalloc+0xa/0x60\n[   95.970052] Code: 5c ff ff ff 31 c0 5b 5d 41 5c c3 b8 f4 ff ff ff eb f4 0f 1f 40 00 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 89 d1 <8b> 97 60 02 00 00 48 8d 7e 18 48 39 f7 72 3f 55 89 ce 53 48 8b 4c\n[   95.970344] RSP: 0018:ffffc9003f553888 EFLAGS: 00010206\n[   95.970425] RAX: dead000000000200 RBX: ffffea003c425b00 RCX: 00000000006080c0\n[   95.970536] RDX: 00000000006080c0 RSI: 0000000000000200 RDI: dead000000000200\n[   95.970648] RBP: dead000000000200 R08: 00000000000463c0 R09: ffff888ffa900000\n[   95.970760] R10: 0000000000000000 R11: 0000000000000002 R12: ffff888ff6b40100\n[   95.970870] R13: ffff888ff6a55018 R14: 0000000000000000 R15: ffff888ff6a55460\n[   95.970981] FS:  00007f51b7d24700(0000) GS:ffff88903ee80000(0000) knlGS:0000000000000000\n[   95.971108] CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033\n[   95.971197] CR2: 00007fac5410d710 CR3: 0000000f2c1de002 CR4: 00000000007606e0\n[   95.971309] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000\n[   95.971419] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400\n[   95.971530] PKRU: 55555554\n[   95.971573] Call Trace:\n[   95.971622]  ice_setup_rx_ring+0x39/0x110 [ice]\n[   95.971695]  ice_vsi_setup_rx_rings+0x54/0x90 [ice]\n[   95.971774]  ice_vsi_open+0x25/0x120 [ice]\n[   95.971843]  ice_open_internal+0xb8/0x1f0 [ice]\n[   95.971919]  ice_ena_vsi+0x4f/0xd0 [ice]\n[   95.971987]  ice_dcb_ena_dis_vsi.constprop.5+0x29/0x90 [ice]\n[   95.972082]  ice_pf_dcb_cfg+0x29a/0x380 [ice]\n[   95.972154]  ice_dcbnl_setets+0x174/0x1b0 [ice]\n[   95.972220]  dcbnl_ieee_set+0x89/0x230\n[   95.972279]  ? dcbnl_ieee_del+0x150/0x150\n[   95.972341]  dcb_doit+0x124/0x1b0\n[   95.972392]  rtnetlink_rcv_msg+0x243/0x2f0\n[   95.972457]  ? dcb_doit+0x14d/0x1b0\n[   95.972510]  ? __kmalloc_node_track_caller+0x1d3/0x280\n[   95.972591]  ? rtnl_calcit.isra.31+0x100/0x100\n[   95.972661]  netlink_rcv_skb+0xcf/0xf0\n[   95.972720]  netlink_unicast+0x16d/0x220\n[   95.972781]  netlink_sendmsg+0x2ba/0x3a0\n[   95.975891]  sock_sendmsg+0x4c/0x50\n[   95.979032]  ___sys_sendmsg+0x2e4/0x300\n[   95.982147]  ? kmem_cache_alloc+0x13e/0x190\n[   95.985242]  ? __wake_up_common_lock+0x79/0x90\n[   95.988338]  ? __check_object_size+0xac/0x1b0\n[   95.991440]  ? _copy_to_user+0x22/0x30\n[   95.994539]  ? move_addr_to_user+0xbb/0xd0\n[   95.997619]  ? __sys_sendmsg+0x53/0x80\n[   96.000664]  __sys_sendmsg+0x53/0x80\n[   96.003747]  do_syscall_64+0x5b/0x1d0\n[   96.006862]  entry_SYSCALL_64_after_hwframe+0x65/0xca\n\nOnly update num_txq/rxq when passed check, and restore tc_cfg if setup\nqueue map failed.",
					"category":"description",
					"title":"Vulnerability Description"
				}
			],
			"product_status":{
				"fixed":[
					"openEuler-22.03-LTS-SP3:perf-debuginfo-5.10.0-207.0.0.116.oe2203sp3.aarch64",
					"openEuler-22.03-LTS-SP3:kernel-debuginfo-5.10.0-207.0.0.116.oe2203sp3.aarch64",
					"openEuler-22.03-LTS-SP3:python3-perf-debuginfo-5.10.0-207.0.0.116.oe2203sp3.aarch64",
					"openEuler-22.03-LTS-SP3:kernel-tools-debuginfo-5.10.0-207.0.0.116.oe2203sp3.aarch64",
					"openEuler-22.03-LTS-SP3:kernel-tools-5.10.0-207.0.0.116.oe2203sp3.aarch64",
					"openEuler-22.03-LTS-SP3:kernel-5.10.0-207.0.0.116.oe2203sp3.aarch64",
					"openEuler-22.03-LTS-SP3:kernel-headers-5.10.0-207.0.0.116.oe2203sp3.aarch64",
					"openEuler-22.03-LTS-SP3:kernel-devel-5.10.0-207.0.0.116.oe2203sp3.aarch64",
					"openEuler-22.03-LTS-SP3:python3-perf-5.10.0-207.0.0.116.oe2203sp3.aarch64",
					"openEuler-22.03-LTS-SP3:perf-5.10.0-207.0.0.116.oe2203sp3.aarch64",
					"openEuler-22.03-LTS-SP3:kernel-tools-devel-5.10.0-207.0.0.116.oe2203sp3.aarch64",
					"openEuler-22.03-LTS-SP3:kernel-debugsource-5.10.0-207.0.0.116.oe2203sp3.aarch64",
					"openEuler-22.03-LTS-SP3:kernel-source-5.10.0-207.0.0.116.oe2203sp3.aarch64",
					"openEuler-22.03-LTS-SP3:kernel-5.10.0-207.0.0.116.oe2203sp3.src",
					"openEuler-22.03-LTS-SP3:kernel-debuginfo-5.10.0-207.0.0.116.oe2203sp3.x86_64",
					"openEuler-22.03-LTS-SP3:kernel-tools-5.10.0-207.0.0.116.oe2203sp3.x86_64",
					"openEuler-22.03-LTS-SP3:python3-perf-5.10.0-207.0.0.116.oe2203sp3.x86_64",
					"openEuler-22.03-LTS-SP3:kernel-source-5.10.0-207.0.0.116.oe2203sp3.x86_64",
					"openEuler-22.03-LTS-SP3:kernel-headers-5.10.0-207.0.0.116.oe2203sp3.x86_64",
					"openEuler-22.03-LTS-SP3:perf-5.10.0-207.0.0.116.oe2203sp3.x86_64",
					"openEuler-22.03-LTS-SP3:kernel-devel-5.10.0-207.0.0.116.oe2203sp3.x86_64",
					"openEuler-22.03-LTS-SP3:kernel-tools-devel-5.10.0-207.0.0.116.oe2203sp3.x86_64",
					"openEuler-22.03-LTS-SP3:kernel-debugsource-5.10.0-207.0.0.116.oe2203sp3.x86_64",
					"openEuler-22.03-LTS-SP3:kernel-tools-debuginfo-5.10.0-207.0.0.116.oe2203sp3.x86_64",
					"openEuler-22.03-LTS-SP3:kernel-5.10.0-207.0.0.116.oe2203sp3.x86_64",
					"openEuler-22.03-LTS-SP3:python3-perf-debuginfo-5.10.0-207.0.0.116.oe2203sp3.x86_64",
					"openEuler-22.03-LTS-SP3:perf-debuginfo-5.10.0-207.0.0.116.oe2203sp3.x86_64"
				]
			},
			"remediations":[
				{
					"product_ids":[
						"openEuler-22.03-LTS-SP3:perf-debuginfo-5.10.0-207.0.0.116.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:kernel-debuginfo-5.10.0-207.0.0.116.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:python3-perf-debuginfo-5.10.0-207.0.0.116.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:kernel-tools-debuginfo-5.10.0-207.0.0.116.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:kernel-tools-5.10.0-207.0.0.116.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:kernel-5.10.0-207.0.0.116.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:kernel-headers-5.10.0-207.0.0.116.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:kernel-devel-5.10.0-207.0.0.116.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:python3-perf-5.10.0-207.0.0.116.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:perf-5.10.0-207.0.0.116.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:kernel-tools-devel-5.10.0-207.0.0.116.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:kernel-debugsource-5.10.0-207.0.0.116.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:kernel-source-5.10.0-207.0.0.116.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:kernel-5.10.0-207.0.0.116.oe2203sp3.src",
						"openEuler-22.03-LTS-SP3:kernel-debuginfo-5.10.0-207.0.0.116.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:kernel-tools-5.10.0-207.0.0.116.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:python3-perf-5.10.0-207.0.0.116.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:kernel-source-5.10.0-207.0.0.116.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:kernel-headers-5.10.0-207.0.0.116.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:perf-5.10.0-207.0.0.116.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:kernel-devel-5.10.0-207.0.0.116.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:kernel-tools-devel-5.10.0-207.0.0.116.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:kernel-debugsource-5.10.0-207.0.0.116.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:kernel-tools-debuginfo-5.10.0-207.0.0.116.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:kernel-5.10.0-207.0.0.116.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:python3-perf-debuginfo-5.10.0-207.0.0.116.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:perf-debuginfo-5.10.0-207.0.0.116.oe2203sp3.x86_64"
					],
					"details":"kernel security update",
					"category":"vendor_fix",
					"url":"https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2024-1707"
				}
			],
			"scores":[
				{
					"cvss_v3":{
						"baseSeverity":"MEDIUM",
						"baseScore":5.5,
						"vectorString":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
						"version":"3.1"
					},
					"products":[
						"openEuler-22.03-LTS-SP3:perf-debuginfo-5.10.0-207.0.0.116.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:kernel-debuginfo-5.10.0-207.0.0.116.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:python3-perf-debuginfo-5.10.0-207.0.0.116.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:kernel-tools-debuginfo-5.10.0-207.0.0.116.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:kernel-tools-5.10.0-207.0.0.116.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:kernel-5.10.0-207.0.0.116.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:kernel-headers-5.10.0-207.0.0.116.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:kernel-devel-5.10.0-207.0.0.116.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:python3-perf-5.10.0-207.0.0.116.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:perf-5.10.0-207.0.0.116.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:kernel-tools-devel-5.10.0-207.0.0.116.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:kernel-debugsource-5.10.0-207.0.0.116.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:kernel-source-5.10.0-207.0.0.116.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:kernel-5.10.0-207.0.0.116.oe2203sp3.src",
						"openEuler-22.03-LTS-SP3:kernel-debuginfo-5.10.0-207.0.0.116.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:kernel-tools-5.10.0-207.0.0.116.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:python3-perf-5.10.0-207.0.0.116.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:kernel-source-5.10.0-207.0.0.116.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:kernel-headers-5.10.0-207.0.0.116.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:perf-5.10.0-207.0.0.116.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:kernel-devel-5.10.0-207.0.0.116.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:kernel-tools-devel-5.10.0-207.0.0.116.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:kernel-debugsource-5.10.0-207.0.0.116.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:kernel-tools-debuginfo-5.10.0-207.0.0.116.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:kernel-5.10.0-207.0.0.116.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:python3-perf-debuginfo-5.10.0-207.0.0.116.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:perf-debuginfo-5.10.0-207.0.0.116.oe2203sp3.x86_64"
					]
				}
			],
			"threats":[
				{
					"details":"Medium",
					"category":"impact"
				}
			],
			"title":"CVE-2022-48652"
		},
		{
			"cve":"CVE-2023-52672",
			"notes":[
				{
					"text":"In the Linux kernel, the following vulnerability has been resolved:\n\npipe: wakeup wr_wait after setting max_usage\n\nCommit c73be61cede5 (\"pipe: Add general notification queue support\") a\nregression was introduced that would lock up resized pipes under certain\nconditions. See the reproducer in [1].\n\nThe commit resizing the pipe ring size was moved to a different\nfunction, doing that moved the wakeup for pipe->wr_wait before actually\nraising pipe->max_usage. If a pipe was full before the resize occured it\nwould result in the wakeup never actually triggering pipe_write.\n\nSet @max_usage and @nr_accounted before waking writers if this isn't a\nwatch queue.\n\n[Christian Brauner <brauner@kernel.org>: rewrite to account for watch queues]",
					"category":"description",
					"title":"Vulnerability Description"
				}
			],
			"product_status":{
				"fixed":[
					"openEuler-22.03-LTS-SP3:perf-debuginfo-5.10.0-207.0.0.116.oe2203sp3.aarch64",
					"openEuler-22.03-LTS-SP3:kernel-debuginfo-5.10.0-207.0.0.116.oe2203sp3.aarch64",
					"openEuler-22.03-LTS-SP3:python3-perf-debuginfo-5.10.0-207.0.0.116.oe2203sp3.aarch64",
					"openEuler-22.03-LTS-SP3:kernel-tools-debuginfo-5.10.0-207.0.0.116.oe2203sp3.aarch64",
					"openEuler-22.03-LTS-SP3:kernel-tools-5.10.0-207.0.0.116.oe2203sp3.aarch64",
					"openEuler-22.03-LTS-SP3:kernel-5.10.0-207.0.0.116.oe2203sp3.aarch64",
					"openEuler-22.03-LTS-SP3:kernel-headers-5.10.0-207.0.0.116.oe2203sp3.aarch64",
					"openEuler-22.03-LTS-SP3:kernel-devel-5.10.0-207.0.0.116.oe2203sp3.aarch64",
					"openEuler-22.03-LTS-SP3:python3-perf-5.10.0-207.0.0.116.oe2203sp3.aarch64",
					"openEuler-22.03-LTS-SP3:perf-5.10.0-207.0.0.116.oe2203sp3.aarch64",
					"openEuler-22.03-LTS-SP3:kernel-tools-devel-5.10.0-207.0.0.116.oe2203sp3.aarch64",
					"openEuler-22.03-LTS-SP3:kernel-debugsource-5.10.0-207.0.0.116.oe2203sp3.aarch64",
					"openEuler-22.03-LTS-SP3:kernel-source-5.10.0-207.0.0.116.oe2203sp3.aarch64",
					"openEuler-22.03-LTS-SP3:kernel-5.10.0-207.0.0.116.oe2203sp3.src",
					"openEuler-22.03-LTS-SP3:kernel-debuginfo-5.10.0-207.0.0.116.oe2203sp3.x86_64",
					"openEuler-22.03-LTS-SP3:kernel-tools-5.10.0-207.0.0.116.oe2203sp3.x86_64",
					"openEuler-22.03-LTS-SP3:python3-perf-5.10.0-207.0.0.116.oe2203sp3.x86_64",
					"openEuler-22.03-LTS-SP3:kernel-source-5.10.0-207.0.0.116.oe2203sp3.x86_64",
					"openEuler-22.03-LTS-SP3:kernel-headers-5.10.0-207.0.0.116.oe2203sp3.x86_64",
					"openEuler-22.03-LTS-SP3:perf-5.10.0-207.0.0.116.oe2203sp3.x86_64",
					"openEuler-22.03-LTS-SP3:kernel-devel-5.10.0-207.0.0.116.oe2203sp3.x86_64",
					"openEuler-22.03-LTS-SP3:kernel-tools-devel-5.10.0-207.0.0.116.oe2203sp3.x86_64",
					"openEuler-22.03-LTS-SP3:kernel-debugsource-5.10.0-207.0.0.116.oe2203sp3.x86_64",
					"openEuler-22.03-LTS-SP3:kernel-tools-debuginfo-5.10.0-207.0.0.116.oe2203sp3.x86_64",
					"openEuler-22.03-LTS-SP3:kernel-5.10.0-207.0.0.116.oe2203sp3.x86_64",
					"openEuler-22.03-LTS-SP3:python3-perf-debuginfo-5.10.0-207.0.0.116.oe2203sp3.x86_64",
					"openEuler-22.03-LTS-SP3:perf-debuginfo-5.10.0-207.0.0.116.oe2203sp3.x86_64"
				]
			},
			"remediations":[
				{
					"product_ids":[
						"openEuler-22.03-LTS-SP3:perf-debuginfo-5.10.0-207.0.0.116.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:kernel-debuginfo-5.10.0-207.0.0.116.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:python3-perf-debuginfo-5.10.0-207.0.0.116.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:kernel-tools-debuginfo-5.10.0-207.0.0.116.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:kernel-tools-5.10.0-207.0.0.116.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:kernel-5.10.0-207.0.0.116.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:kernel-headers-5.10.0-207.0.0.116.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:kernel-devel-5.10.0-207.0.0.116.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:python3-perf-5.10.0-207.0.0.116.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:perf-5.10.0-207.0.0.116.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:kernel-tools-devel-5.10.0-207.0.0.116.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:kernel-debugsource-5.10.0-207.0.0.116.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:kernel-source-5.10.0-207.0.0.116.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:kernel-5.10.0-207.0.0.116.oe2203sp3.src",
						"openEuler-22.03-LTS-SP3:kernel-debuginfo-5.10.0-207.0.0.116.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:kernel-tools-5.10.0-207.0.0.116.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:python3-perf-5.10.0-207.0.0.116.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:kernel-source-5.10.0-207.0.0.116.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:kernel-headers-5.10.0-207.0.0.116.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:perf-5.10.0-207.0.0.116.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:kernel-devel-5.10.0-207.0.0.116.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:kernel-tools-devel-5.10.0-207.0.0.116.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:kernel-debugsource-5.10.0-207.0.0.116.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:kernel-tools-debuginfo-5.10.0-207.0.0.116.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:kernel-5.10.0-207.0.0.116.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:python3-perf-debuginfo-5.10.0-207.0.0.116.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:perf-debuginfo-5.10.0-207.0.0.116.oe2203sp3.x86_64"
					],
					"details":"kernel security update",
					"category":"vendor_fix",
					"url":"https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2024-1707"
				}
			],
			"scores":[
				{
					"cvss_v3":{
						"baseSeverity":"MEDIUM",
						"baseScore":5.5,
						"vectorString":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
						"version":"3.1"
					},
					"products":[
						"openEuler-22.03-LTS-SP3:perf-debuginfo-5.10.0-207.0.0.116.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:kernel-debuginfo-5.10.0-207.0.0.116.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:python3-perf-debuginfo-5.10.0-207.0.0.116.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:kernel-tools-debuginfo-5.10.0-207.0.0.116.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:kernel-tools-5.10.0-207.0.0.116.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:kernel-5.10.0-207.0.0.116.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:kernel-headers-5.10.0-207.0.0.116.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:kernel-devel-5.10.0-207.0.0.116.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:python3-perf-5.10.0-207.0.0.116.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:perf-5.10.0-207.0.0.116.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:kernel-tools-devel-5.10.0-207.0.0.116.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:kernel-debugsource-5.10.0-207.0.0.116.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:kernel-source-5.10.0-207.0.0.116.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:kernel-5.10.0-207.0.0.116.oe2203sp3.src",
						"openEuler-22.03-LTS-SP3:kernel-debuginfo-5.10.0-207.0.0.116.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:kernel-tools-5.10.0-207.0.0.116.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:python3-perf-5.10.0-207.0.0.116.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:kernel-source-5.10.0-207.0.0.116.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:kernel-headers-5.10.0-207.0.0.116.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:perf-5.10.0-207.0.0.116.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:kernel-devel-5.10.0-207.0.0.116.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:kernel-tools-devel-5.10.0-207.0.0.116.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:kernel-debugsource-5.10.0-207.0.0.116.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:kernel-tools-debuginfo-5.10.0-207.0.0.116.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:kernel-5.10.0-207.0.0.116.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:python3-perf-debuginfo-5.10.0-207.0.0.116.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:perf-debuginfo-5.10.0-207.0.0.116.oe2203sp3.x86_64"
					]
				}
			],
			"threats":[
				{
					"details":"Medium",
					"category":"impact"
				}
			],
			"title":"CVE-2023-52672"
		},
		{
			"cve":"CVE-2023-52680",
			"notes":[
				{
					"text":"In the Linux kernel, the following vulnerability has been resolved:\n\nALSA: scarlett2: Add missing error checks to *_ctl_get()\n\nThe *_ctl_get() functions which call scarlett2_update_*() were not\nchecking the return value. Fix to check the return value and pass to\nthe caller.",
					"category":"description",
					"title":"Vulnerability Description"
				}
			],
			"product_status":{
				"fixed":[
					"openEuler-22.03-LTS-SP3:perf-debuginfo-5.10.0-207.0.0.116.oe2203sp3.aarch64",
					"openEuler-22.03-LTS-SP3:kernel-debuginfo-5.10.0-207.0.0.116.oe2203sp3.aarch64",
					"openEuler-22.03-LTS-SP3:python3-perf-debuginfo-5.10.0-207.0.0.116.oe2203sp3.aarch64",
					"openEuler-22.03-LTS-SP3:kernel-tools-debuginfo-5.10.0-207.0.0.116.oe2203sp3.aarch64",
					"openEuler-22.03-LTS-SP3:kernel-tools-5.10.0-207.0.0.116.oe2203sp3.aarch64",
					"openEuler-22.03-LTS-SP3:kernel-5.10.0-207.0.0.116.oe2203sp3.aarch64",
					"openEuler-22.03-LTS-SP3:kernel-headers-5.10.0-207.0.0.116.oe2203sp3.aarch64",
					"openEuler-22.03-LTS-SP3:kernel-devel-5.10.0-207.0.0.116.oe2203sp3.aarch64",
					"openEuler-22.03-LTS-SP3:python3-perf-5.10.0-207.0.0.116.oe2203sp3.aarch64",
					"openEuler-22.03-LTS-SP3:perf-5.10.0-207.0.0.116.oe2203sp3.aarch64",
					"openEuler-22.03-LTS-SP3:kernel-tools-devel-5.10.0-207.0.0.116.oe2203sp3.aarch64",
					"openEuler-22.03-LTS-SP3:kernel-debugsource-5.10.0-207.0.0.116.oe2203sp3.aarch64",
					"openEuler-22.03-LTS-SP3:kernel-source-5.10.0-207.0.0.116.oe2203sp3.aarch64",
					"openEuler-22.03-LTS-SP3:kernel-5.10.0-207.0.0.116.oe2203sp3.src",
					"openEuler-22.03-LTS-SP3:kernel-debuginfo-5.10.0-207.0.0.116.oe2203sp3.x86_64",
					"openEuler-22.03-LTS-SP3:kernel-tools-5.10.0-207.0.0.116.oe2203sp3.x86_64",
					"openEuler-22.03-LTS-SP3:python3-perf-5.10.0-207.0.0.116.oe2203sp3.x86_64",
					"openEuler-22.03-LTS-SP3:kernel-source-5.10.0-207.0.0.116.oe2203sp3.x86_64",
					"openEuler-22.03-LTS-SP3:kernel-headers-5.10.0-207.0.0.116.oe2203sp3.x86_64",
					"openEuler-22.03-LTS-SP3:perf-5.10.0-207.0.0.116.oe2203sp3.x86_64",
					"openEuler-22.03-LTS-SP3:kernel-devel-5.10.0-207.0.0.116.oe2203sp3.x86_64",
					"openEuler-22.03-LTS-SP3:kernel-tools-devel-5.10.0-207.0.0.116.oe2203sp3.x86_64",
					"openEuler-22.03-LTS-SP3:kernel-debugsource-5.10.0-207.0.0.116.oe2203sp3.x86_64",
					"openEuler-22.03-LTS-SP3:kernel-tools-debuginfo-5.10.0-207.0.0.116.oe2203sp3.x86_64",
					"openEuler-22.03-LTS-SP3:kernel-5.10.0-207.0.0.116.oe2203sp3.x86_64",
					"openEuler-22.03-LTS-SP3:python3-perf-debuginfo-5.10.0-207.0.0.116.oe2203sp3.x86_64",
					"openEuler-22.03-LTS-SP3:perf-debuginfo-5.10.0-207.0.0.116.oe2203sp3.x86_64"
				]
			},
			"remediations":[
				{
					"product_ids":[
						"openEuler-22.03-LTS-SP3:perf-debuginfo-5.10.0-207.0.0.116.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:kernel-debuginfo-5.10.0-207.0.0.116.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:python3-perf-debuginfo-5.10.0-207.0.0.116.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:kernel-tools-debuginfo-5.10.0-207.0.0.116.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:kernel-tools-5.10.0-207.0.0.116.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:kernel-5.10.0-207.0.0.116.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:kernel-headers-5.10.0-207.0.0.116.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:kernel-devel-5.10.0-207.0.0.116.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:python3-perf-5.10.0-207.0.0.116.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:perf-5.10.0-207.0.0.116.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:kernel-tools-devel-5.10.0-207.0.0.116.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:kernel-debugsource-5.10.0-207.0.0.116.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:kernel-source-5.10.0-207.0.0.116.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:kernel-5.10.0-207.0.0.116.oe2203sp3.src",
						"openEuler-22.03-LTS-SP3:kernel-debuginfo-5.10.0-207.0.0.116.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:kernel-tools-5.10.0-207.0.0.116.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:python3-perf-5.10.0-207.0.0.116.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:kernel-source-5.10.0-207.0.0.116.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:kernel-headers-5.10.0-207.0.0.116.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:perf-5.10.0-207.0.0.116.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:kernel-devel-5.10.0-207.0.0.116.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:kernel-tools-devel-5.10.0-207.0.0.116.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:kernel-debugsource-5.10.0-207.0.0.116.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:kernel-tools-debuginfo-5.10.0-207.0.0.116.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:kernel-5.10.0-207.0.0.116.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:python3-perf-debuginfo-5.10.0-207.0.0.116.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:perf-debuginfo-5.10.0-207.0.0.116.oe2203sp3.x86_64"
					],
					"details":"kernel security update",
					"category":"vendor_fix",
					"url":"https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2024-1707"
				}
			],
			"scores":[
				{
					"cvss_v3":{
						"baseSeverity":"MEDIUM",
						"baseScore":5.5,
						"vectorString":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
						"version":"3.1"
					},
					"products":[
						"openEuler-22.03-LTS-SP3:perf-debuginfo-5.10.0-207.0.0.116.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:kernel-debuginfo-5.10.0-207.0.0.116.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:python3-perf-debuginfo-5.10.0-207.0.0.116.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:kernel-tools-debuginfo-5.10.0-207.0.0.116.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:kernel-tools-5.10.0-207.0.0.116.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:kernel-5.10.0-207.0.0.116.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:kernel-headers-5.10.0-207.0.0.116.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:kernel-devel-5.10.0-207.0.0.116.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:python3-perf-5.10.0-207.0.0.116.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:perf-5.10.0-207.0.0.116.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:kernel-tools-devel-5.10.0-207.0.0.116.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:kernel-debugsource-5.10.0-207.0.0.116.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:kernel-source-5.10.0-207.0.0.116.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:kernel-5.10.0-207.0.0.116.oe2203sp3.src",
						"openEuler-22.03-LTS-SP3:kernel-debuginfo-5.10.0-207.0.0.116.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:kernel-tools-5.10.0-207.0.0.116.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:python3-perf-5.10.0-207.0.0.116.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:kernel-source-5.10.0-207.0.0.116.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:kernel-headers-5.10.0-207.0.0.116.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:perf-5.10.0-207.0.0.116.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:kernel-devel-5.10.0-207.0.0.116.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:kernel-tools-devel-5.10.0-207.0.0.116.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:kernel-debugsource-5.10.0-207.0.0.116.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:kernel-tools-debuginfo-5.10.0-207.0.0.116.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:kernel-5.10.0-207.0.0.116.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:python3-perf-debuginfo-5.10.0-207.0.0.116.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:perf-debuginfo-5.10.0-207.0.0.116.oe2203sp3.x86_64"
					]
				}
			],
			"threats":[
				{
					"details":"Medium",
					"category":"impact"
				}
			],
			"title":"CVE-2023-52680"
		},
		{
			"cve":"CVE-2023-52686",
			"notes":[
				{
					"text":"In the Linux kernel, the following vulnerability has been resolved:\n\npowerpc/powernv: Add a null pointer check in opal_event_init()\n\nkasprintf() returns a pointer to dynamically allocated memory\nwhich can be NULL upon failure.",
					"category":"description",
					"title":"Vulnerability Description"
				}
			],
			"product_status":{
				"fixed":[
					"openEuler-22.03-LTS-SP3:perf-debuginfo-5.10.0-207.0.0.116.oe2203sp3.aarch64",
					"openEuler-22.03-LTS-SP3:kernel-debuginfo-5.10.0-207.0.0.116.oe2203sp3.aarch64",
					"openEuler-22.03-LTS-SP3:python3-perf-debuginfo-5.10.0-207.0.0.116.oe2203sp3.aarch64",
					"openEuler-22.03-LTS-SP3:kernel-tools-debuginfo-5.10.0-207.0.0.116.oe2203sp3.aarch64",
					"openEuler-22.03-LTS-SP3:kernel-tools-5.10.0-207.0.0.116.oe2203sp3.aarch64",
					"openEuler-22.03-LTS-SP3:kernel-5.10.0-207.0.0.116.oe2203sp3.aarch64",
					"openEuler-22.03-LTS-SP3:kernel-headers-5.10.0-207.0.0.116.oe2203sp3.aarch64",
					"openEuler-22.03-LTS-SP3:kernel-devel-5.10.0-207.0.0.116.oe2203sp3.aarch64",
					"openEuler-22.03-LTS-SP3:python3-perf-5.10.0-207.0.0.116.oe2203sp3.aarch64",
					"openEuler-22.03-LTS-SP3:perf-5.10.0-207.0.0.116.oe2203sp3.aarch64",
					"openEuler-22.03-LTS-SP3:kernel-tools-devel-5.10.0-207.0.0.116.oe2203sp3.aarch64",
					"openEuler-22.03-LTS-SP3:kernel-debugsource-5.10.0-207.0.0.116.oe2203sp3.aarch64",
					"openEuler-22.03-LTS-SP3:kernel-source-5.10.0-207.0.0.116.oe2203sp3.aarch64",
					"openEuler-22.03-LTS-SP3:kernel-5.10.0-207.0.0.116.oe2203sp3.src",
					"openEuler-22.03-LTS-SP3:kernel-debuginfo-5.10.0-207.0.0.116.oe2203sp3.x86_64",
					"openEuler-22.03-LTS-SP3:kernel-tools-5.10.0-207.0.0.116.oe2203sp3.x86_64",
					"openEuler-22.03-LTS-SP3:python3-perf-5.10.0-207.0.0.116.oe2203sp3.x86_64",
					"openEuler-22.03-LTS-SP3:kernel-source-5.10.0-207.0.0.116.oe2203sp3.x86_64",
					"openEuler-22.03-LTS-SP3:kernel-headers-5.10.0-207.0.0.116.oe2203sp3.x86_64",
					"openEuler-22.03-LTS-SP3:perf-5.10.0-207.0.0.116.oe2203sp3.x86_64",
					"openEuler-22.03-LTS-SP3:kernel-devel-5.10.0-207.0.0.116.oe2203sp3.x86_64",
					"openEuler-22.03-LTS-SP3:kernel-tools-devel-5.10.0-207.0.0.116.oe2203sp3.x86_64",
					"openEuler-22.03-LTS-SP3:kernel-debugsource-5.10.0-207.0.0.116.oe2203sp3.x86_64",
					"openEuler-22.03-LTS-SP3:kernel-tools-debuginfo-5.10.0-207.0.0.116.oe2203sp3.x86_64",
					"openEuler-22.03-LTS-SP3:kernel-5.10.0-207.0.0.116.oe2203sp3.x86_64",
					"openEuler-22.03-LTS-SP3:python3-perf-debuginfo-5.10.0-207.0.0.116.oe2203sp3.x86_64",
					"openEuler-22.03-LTS-SP3:perf-debuginfo-5.10.0-207.0.0.116.oe2203sp3.x86_64"
				]
			},
			"remediations":[
				{
					"product_ids":[
						"openEuler-22.03-LTS-SP3:perf-debuginfo-5.10.0-207.0.0.116.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:kernel-debuginfo-5.10.0-207.0.0.116.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:python3-perf-debuginfo-5.10.0-207.0.0.116.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:kernel-tools-debuginfo-5.10.0-207.0.0.116.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:kernel-tools-5.10.0-207.0.0.116.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:kernel-5.10.0-207.0.0.116.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:kernel-headers-5.10.0-207.0.0.116.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:kernel-devel-5.10.0-207.0.0.116.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:python3-perf-5.10.0-207.0.0.116.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:perf-5.10.0-207.0.0.116.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:kernel-tools-devel-5.10.0-207.0.0.116.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:kernel-debugsource-5.10.0-207.0.0.116.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:kernel-source-5.10.0-207.0.0.116.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:kernel-5.10.0-207.0.0.116.oe2203sp3.src",
						"openEuler-22.03-LTS-SP3:kernel-debuginfo-5.10.0-207.0.0.116.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:kernel-tools-5.10.0-207.0.0.116.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:python3-perf-5.10.0-207.0.0.116.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:kernel-source-5.10.0-207.0.0.116.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:kernel-headers-5.10.0-207.0.0.116.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:perf-5.10.0-207.0.0.116.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:kernel-devel-5.10.0-207.0.0.116.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:kernel-tools-devel-5.10.0-207.0.0.116.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:kernel-debugsource-5.10.0-207.0.0.116.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:kernel-tools-debuginfo-5.10.0-207.0.0.116.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:kernel-5.10.0-207.0.0.116.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:python3-perf-debuginfo-5.10.0-207.0.0.116.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:perf-debuginfo-5.10.0-207.0.0.116.oe2203sp3.x86_64"
					],
					"details":"kernel security update",
					"category":"vendor_fix",
					"url":"https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2024-1707"
				}
			],
			"scores":[
				{
					"cvss_v3":{
						"baseSeverity":"MEDIUM",
						"baseScore":5.5,
						"vectorString":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
						"version":"3.1"
					},
					"products":[
						"openEuler-22.03-LTS-SP3:perf-debuginfo-5.10.0-207.0.0.116.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:kernel-debuginfo-5.10.0-207.0.0.116.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:python3-perf-debuginfo-5.10.0-207.0.0.116.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:kernel-tools-debuginfo-5.10.0-207.0.0.116.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:kernel-tools-5.10.0-207.0.0.116.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:kernel-5.10.0-207.0.0.116.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:kernel-headers-5.10.0-207.0.0.116.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:kernel-devel-5.10.0-207.0.0.116.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:python3-perf-5.10.0-207.0.0.116.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:perf-5.10.0-207.0.0.116.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:kernel-tools-devel-5.10.0-207.0.0.116.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:kernel-debugsource-5.10.0-207.0.0.116.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:kernel-source-5.10.0-207.0.0.116.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:kernel-5.10.0-207.0.0.116.oe2203sp3.src",
						"openEuler-22.03-LTS-SP3:kernel-debuginfo-5.10.0-207.0.0.116.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:kernel-tools-5.10.0-207.0.0.116.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:python3-perf-5.10.0-207.0.0.116.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:kernel-source-5.10.0-207.0.0.116.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:kernel-headers-5.10.0-207.0.0.116.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:perf-5.10.0-207.0.0.116.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:kernel-devel-5.10.0-207.0.0.116.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:kernel-tools-devel-5.10.0-207.0.0.116.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:kernel-debugsource-5.10.0-207.0.0.116.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:kernel-tools-debuginfo-5.10.0-207.0.0.116.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:kernel-5.10.0-207.0.0.116.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:python3-perf-debuginfo-5.10.0-207.0.0.116.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:perf-debuginfo-5.10.0-207.0.0.116.oe2203sp3.x86_64"
					]
				}
			],
			"threats":[
				{
					"details":"Medium",
					"category":"impact"
				}
			],
			"title":"CVE-2023-52686"
		},
		{
			"cve":"CVE-2023-52693",
			"notes":[
				{
					"text":"In the Linux kernel, the following vulnerability has been resolved:\n\nACPI: video: check for error while searching for backlight device parent\n\nIf acpi_get_parent() called in acpi_video_dev_register_backlight()\nfails, for example, because acpi_ut_acquire_mutex() fails inside\nacpi_get_parent), this can lead to incorrect (uninitialized)\nacpi_parent handle being passed to acpi_get_pci_dev() for detecting\nthe parent pci device.\n\nCheck acpi_get_parent() result and set parent device only in case of success.\n\nFound by Linux Verification Center (linuxtesting.org) with SVACE.",
					"category":"description",
					"title":"Vulnerability Description"
				}
			],
			"product_status":{
				"fixed":[
					"openEuler-22.03-LTS-SP3:perf-debuginfo-5.10.0-207.0.0.116.oe2203sp3.aarch64",
					"openEuler-22.03-LTS-SP3:kernel-debuginfo-5.10.0-207.0.0.116.oe2203sp3.aarch64",
					"openEuler-22.03-LTS-SP3:python3-perf-debuginfo-5.10.0-207.0.0.116.oe2203sp3.aarch64",
					"openEuler-22.03-LTS-SP3:kernel-tools-debuginfo-5.10.0-207.0.0.116.oe2203sp3.aarch64",
					"openEuler-22.03-LTS-SP3:kernel-tools-5.10.0-207.0.0.116.oe2203sp3.aarch64",
					"openEuler-22.03-LTS-SP3:kernel-5.10.0-207.0.0.116.oe2203sp3.aarch64",
					"openEuler-22.03-LTS-SP3:kernel-headers-5.10.0-207.0.0.116.oe2203sp3.aarch64",
					"openEuler-22.03-LTS-SP3:kernel-devel-5.10.0-207.0.0.116.oe2203sp3.aarch64",
					"openEuler-22.03-LTS-SP3:python3-perf-5.10.0-207.0.0.116.oe2203sp3.aarch64",
					"openEuler-22.03-LTS-SP3:perf-5.10.0-207.0.0.116.oe2203sp3.aarch64",
					"openEuler-22.03-LTS-SP3:kernel-tools-devel-5.10.0-207.0.0.116.oe2203sp3.aarch64",
					"openEuler-22.03-LTS-SP3:kernel-debugsource-5.10.0-207.0.0.116.oe2203sp3.aarch64",
					"openEuler-22.03-LTS-SP3:kernel-source-5.10.0-207.0.0.116.oe2203sp3.aarch64",
					"openEuler-22.03-LTS-SP3:kernel-5.10.0-207.0.0.116.oe2203sp3.src",
					"openEuler-22.03-LTS-SP3:kernel-debuginfo-5.10.0-207.0.0.116.oe2203sp3.x86_64",
					"openEuler-22.03-LTS-SP3:kernel-tools-5.10.0-207.0.0.116.oe2203sp3.x86_64",
					"openEuler-22.03-LTS-SP3:python3-perf-5.10.0-207.0.0.116.oe2203sp3.x86_64",
					"openEuler-22.03-LTS-SP3:kernel-source-5.10.0-207.0.0.116.oe2203sp3.x86_64",
					"openEuler-22.03-LTS-SP3:kernel-headers-5.10.0-207.0.0.116.oe2203sp3.x86_64",
					"openEuler-22.03-LTS-SP3:perf-5.10.0-207.0.0.116.oe2203sp3.x86_64",
					"openEuler-22.03-LTS-SP3:kernel-devel-5.10.0-207.0.0.116.oe2203sp3.x86_64",
					"openEuler-22.03-LTS-SP3:kernel-tools-devel-5.10.0-207.0.0.116.oe2203sp3.x86_64",
					"openEuler-22.03-LTS-SP3:kernel-debugsource-5.10.0-207.0.0.116.oe2203sp3.x86_64",
					"openEuler-22.03-LTS-SP3:kernel-tools-debuginfo-5.10.0-207.0.0.116.oe2203sp3.x86_64",
					"openEuler-22.03-LTS-SP3:kernel-5.10.0-207.0.0.116.oe2203sp3.x86_64",
					"openEuler-22.03-LTS-SP3:python3-perf-debuginfo-5.10.0-207.0.0.116.oe2203sp3.x86_64",
					"openEuler-22.03-LTS-SP3:perf-debuginfo-5.10.0-207.0.0.116.oe2203sp3.x86_64"
				]
			},
			"remediations":[
				{
					"product_ids":[
						"openEuler-22.03-LTS-SP3:perf-debuginfo-5.10.0-207.0.0.116.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:kernel-debuginfo-5.10.0-207.0.0.116.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:python3-perf-debuginfo-5.10.0-207.0.0.116.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:kernel-tools-debuginfo-5.10.0-207.0.0.116.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:kernel-tools-5.10.0-207.0.0.116.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:kernel-5.10.0-207.0.0.116.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:kernel-headers-5.10.0-207.0.0.116.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:kernel-devel-5.10.0-207.0.0.116.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:python3-perf-5.10.0-207.0.0.116.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:perf-5.10.0-207.0.0.116.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:kernel-tools-devel-5.10.0-207.0.0.116.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:kernel-debugsource-5.10.0-207.0.0.116.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:kernel-source-5.10.0-207.0.0.116.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:kernel-5.10.0-207.0.0.116.oe2203sp3.src",
						"openEuler-22.03-LTS-SP3:kernel-debuginfo-5.10.0-207.0.0.116.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:kernel-tools-5.10.0-207.0.0.116.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:python3-perf-5.10.0-207.0.0.116.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:kernel-source-5.10.0-207.0.0.116.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:kernel-headers-5.10.0-207.0.0.116.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:perf-5.10.0-207.0.0.116.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:kernel-devel-5.10.0-207.0.0.116.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:kernel-tools-devel-5.10.0-207.0.0.116.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:kernel-debugsource-5.10.0-207.0.0.116.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:kernel-tools-debuginfo-5.10.0-207.0.0.116.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:kernel-5.10.0-207.0.0.116.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:python3-perf-debuginfo-5.10.0-207.0.0.116.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:perf-debuginfo-5.10.0-207.0.0.116.oe2203sp3.x86_64"
					],
					"details":"kernel security update",
					"category":"vendor_fix",
					"url":"https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2024-1707"
				}
			],
			"scores":[
				{
					"cvss_v3":{
						"baseSeverity":"MEDIUM",
						"baseScore":5.5,
						"vectorString":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
						"version":"3.1"
					},
					"products":[
						"openEuler-22.03-LTS-SP3:perf-debuginfo-5.10.0-207.0.0.116.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:kernel-debuginfo-5.10.0-207.0.0.116.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:python3-perf-debuginfo-5.10.0-207.0.0.116.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:kernel-tools-debuginfo-5.10.0-207.0.0.116.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:kernel-tools-5.10.0-207.0.0.116.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:kernel-5.10.0-207.0.0.116.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:kernel-headers-5.10.0-207.0.0.116.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:kernel-devel-5.10.0-207.0.0.116.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:python3-perf-5.10.0-207.0.0.116.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:perf-5.10.0-207.0.0.116.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:kernel-tools-devel-5.10.0-207.0.0.116.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:kernel-debugsource-5.10.0-207.0.0.116.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:kernel-source-5.10.0-207.0.0.116.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:kernel-5.10.0-207.0.0.116.oe2203sp3.src",
						"openEuler-22.03-LTS-SP3:kernel-debuginfo-5.10.0-207.0.0.116.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:kernel-tools-5.10.0-207.0.0.116.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:python3-perf-5.10.0-207.0.0.116.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:kernel-source-5.10.0-207.0.0.116.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:kernel-headers-5.10.0-207.0.0.116.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:perf-5.10.0-207.0.0.116.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:kernel-devel-5.10.0-207.0.0.116.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:kernel-tools-devel-5.10.0-207.0.0.116.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:kernel-debugsource-5.10.0-207.0.0.116.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:kernel-tools-debuginfo-5.10.0-207.0.0.116.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:kernel-5.10.0-207.0.0.116.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:python3-perf-debuginfo-5.10.0-207.0.0.116.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:perf-debuginfo-5.10.0-207.0.0.116.oe2203sp3.x86_64"
					]
				}
			],
			"threats":[
				{
					"details":"Medium",
					"category":"impact"
				}
			],
			"title":"CVE-2023-52693"
		},
		{
			"cve":"CVE-2023-52732",
			"notes":[
				{
					"text":"In the Linux kernel, the following vulnerability has been resolved:\n\nceph: blocklist the kclient when receiving corrupted snap trace\n\nWhen received corrupted snap trace we don't know what exactly has\nhappened in MDS side. And we shouldn't continue IOs and metadatas\naccess to MDS, which may corrupt or get incorrect contents.\n\nThis patch will just block all the further IO/MDS requests\nimmediately and then evict the kclient itself.\n\nThe reason why we still need to evict the kclient just after\nblocking all the further IOs is that the MDS could revoke the caps\nfaster.",
					"category":"description",
					"title":"Vulnerability Description"
				}
			],
			"product_status":{
				"fixed":[
					"openEuler-22.03-LTS-SP3:perf-debuginfo-5.10.0-207.0.0.116.oe2203sp3.aarch64",
					"openEuler-22.03-LTS-SP3:kernel-debuginfo-5.10.0-207.0.0.116.oe2203sp3.aarch64",
					"openEuler-22.03-LTS-SP3:python3-perf-debuginfo-5.10.0-207.0.0.116.oe2203sp3.aarch64",
					"openEuler-22.03-LTS-SP3:kernel-tools-debuginfo-5.10.0-207.0.0.116.oe2203sp3.aarch64",
					"openEuler-22.03-LTS-SP3:kernel-tools-5.10.0-207.0.0.116.oe2203sp3.aarch64",
					"openEuler-22.03-LTS-SP3:kernel-5.10.0-207.0.0.116.oe2203sp3.aarch64",
					"openEuler-22.03-LTS-SP3:kernel-headers-5.10.0-207.0.0.116.oe2203sp3.aarch64",
					"openEuler-22.03-LTS-SP3:kernel-devel-5.10.0-207.0.0.116.oe2203sp3.aarch64",
					"openEuler-22.03-LTS-SP3:python3-perf-5.10.0-207.0.0.116.oe2203sp3.aarch64",
					"openEuler-22.03-LTS-SP3:perf-5.10.0-207.0.0.116.oe2203sp3.aarch64",
					"openEuler-22.03-LTS-SP3:kernel-tools-devel-5.10.0-207.0.0.116.oe2203sp3.aarch64",
					"openEuler-22.03-LTS-SP3:kernel-debugsource-5.10.0-207.0.0.116.oe2203sp3.aarch64",
					"openEuler-22.03-LTS-SP3:kernel-source-5.10.0-207.0.0.116.oe2203sp3.aarch64",
					"openEuler-22.03-LTS-SP3:kernel-5.10.0-207.0.0.116.oe2203sp3.src",
					"openEuler-22.03-LTS-SP3:kernel-debuginfo-5.10.0-207.0.0.116.oe2203sp3.x86_64",
					"openEuler-22.03-LTS-SP3:kernel-tools-5.10.0-207.0.0.116.oe2203sp3.x86_64",
					"openEuler-22.03-LTS-SP3:python3-perf-5.10.0-207.0.0.116.oe2203sp3.x86_64",
					"openEuler-22.03-LTS-SP3:kernel-source-5.10.0-207.0.0.116.oe2203sp3.x86_64",
					"openEuler-22.03-LTS-SP3:kernel-headers-5.10.0-207.0.0.116.oe2203sp3.x86_64",
					"openEuler-22.03-LTS-SP3:perf-5.10.0-207.0.0.116.oe2203sp3.x86_64",
					"openEuler-22.03-LTS-SP3:kernel-devel-5.10.0-207.0.0.116.oe2203sp3.x86_64",
					"openEuler-22.03-LTS-SP3:kernel-tools-devel-5.10.0-207.0.0.116.oe2203sp3.x86_64",
					"openEuler-22.03-LTS-SP3:kernel-debugsource-5.10.0-207.0.0.116.oe2203sp3.x86_64",
					"openEuler-22.03-LTS-SP3:kernel-tools-debuginfo-5.10.0-207.0.0.116.oe2203sp3.x86_64",
					"openEuler-22.03-LTS-SP3:kernel-5.10.0-207.0.0.116.oe2203sp3.x86_64",
					"openEuler-22.03-LTS-SP3:python3-perf-debuginfo-5.10.0-207.0.0.116.oe2203sp3.x86_64",
					"openEuler-22.03-LTS-SP3:perf-debuginfo-5.10.0-207.0.0.116.oe2203sp3.x86_64"
				]
			},
			"remediations":[
				{
					"product_ids":[
						"openEuler-22.03-LTS-SP3:perf-debuginfo-5.10.0-207.0.0.116.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:kernel-debuginfo-5.10.0-207.0.0.116.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:python3-perf-debuginfo-5.10.0-207.0.0.116.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:kernel-tools-debuginfo-5.10.0-207.0.0.116.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:kernel-tools-5.10.0-207.0.0.116.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:kernel-5.10.0-207.0.0.116.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:kernel-headers-5.10.0-207.0.0.116.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:kernel-devel-5.10.0-207.0.0.116.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:python3-perf-5.10.0-207.0.0.116.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:perf-5.10.0-207.0.0.116.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:kernel-tools-devel-5.10.0-207.0.0.116.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:kernel-debugsource-5.10.0-207.0.0.116.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:kernel-source-5.10.0-207.0.0.116.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:kernel-5.10.0-207.0.0.116.oe2203sp3.src",
						"openEuler-22.03-LTS-SP3:kernel-debuginfo-5.10.0-207.0.0.116.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:kernel-tools-5.10.0-207.0.0.116.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:python3-perf-5.10.0-207.0.0.116.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:kernel-source-5.10.0-207.0.0.116.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:kernel-headers-5.10.0-207.0.0.116.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:perf-5.10.0-207.0.0.116.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:kernel-devel-5.10.0-207.0.0.116.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:kernel-tools-devel-5.10.0-207.0.0.116.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:kernel-debugsource-5.10.0-207.0.0.116.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:kernel-tools-debuginfo-5.10.0-207.0.0.116.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:kernel-5.10.0-207.0.0.116.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:python3-perf-debuginfo-5.10.0-207.0.0.116.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:perf-debuginfo-5.10.0-207.0.0.116.oe2203sp3.x86_64"
					],
					"details":"kernel security update",
					"category":"vendor_fix",
					"url":"https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2024-1707"
				}
			],
			"scores":[
				{
					"cvss_v3":{
						"baseSeverity":"MEDIUM",
						"baseScore":5.5,
						"vectorString":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
						"version":"3.1"
					},
					"products":[
						"openEuler-22.03-LTS-SP3:perf-debuginfo-5.10.0-207.0.0.116.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:kernel-debuginfo-5.10.0-207.0.0.116.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:python3-perf-debuginfo-5.10.0-207.0.0.116.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:kernel-tools-debuginfo-5.10.0-207.0.0.116.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:kernel-tools-5.10.0-207.0.0.116.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:kernel-5.10.0-207.0.0.116.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:kernel-headers-5.10.0-207.0.0.116.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:kernel-devel-5.10.0-207.0.0.116.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:python3-perf-5.10.0-207.0.0.116.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:perf-5.10.0-207.0.0.116.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:kernel-tools-devel-5.10.0-207.0.0.116.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:kernel-debugsource-5.10.0-207.0.0.116.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:kernel-source-5.10.0-207.0.0.116.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:kernel-5.10.0-207.0.0.116.oe2203sp3.src",
						"openEuler-22.03-LTS-SP3:kernel-debuginfo-5.10.0-207.0.0.116.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:kernel-tools-5.10.0-207.0.0.116.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:python3-perf-5.10.0-207.0.0.116.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:kernel-source-5.10.0-207.0.0.116.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:kernel-headers-5.10.0-207.0.0.116.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:perf-5.10.0-207.0.0.116.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:kernel-devel-5.10.0-207.0.0.116.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:kernel-tools-devel-5.10.0-207.0.0.116.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:kernel-debugsource-5.10.0-207.0.0.116.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:kernel-tools-debuginfo-5.10.0-207.0.0.116.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:kernel-5.10.0-207.0.0.116.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:python3-perf-debuginfo-5.10.0-207.0.0.116.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:perf-debuginfo-5.10.0-207.0.0.116.oe2203sp3.x86_64"
					]
				}
			],
			"threats":[
				{
					"details":"Medium",
					"category":"impact"
				}
			],
			"title":"CVE-2023-52732"
		},
		{
			"cve":"CVE-2023-52762",
			"notes":[
				{
					"text":"In the Linux kernel, the following vulnerability has been resolved:\n\nvirtio-blk: fix implicit overflow on virtio_max_dma_size\n\nThe following codes have an implicit conversion from size_t to u32:\n(u32)max_size = (size_t)virtio_max_dma_size(vdev);\n\nThis may lead overflow, Ex (size_t)4G -> (u32)0. Once\nvirtio_max_dma_size() has a larger size than U32_MAX, use U32_MAX\ninstead.",
					"category":"description",
					"title":"Vulnerability Description"
				}
			],
			"product_status":{
				"fixed":[
					"openEuler-22.03-LTS-SP3:perf-debuginfo-5.10.0-207.0.0.116.oe2203sp3.aarch64",
					"openEuler-22.03-LTS-SP3:kernel-debuginfo-5.10.0-207.0.0.116.oe2203sp3.aarch64",
					"openEuler-22.03-LTS-SP3:python3-perf-debuginfo-5.10.0-207.0.0.116.oe2203sp3.aarch64",
					"openEuler-22.03-LTS-SP3:kernel-tools-debuginfo-5.10.0-207.0.0.116.oe2203sp3.aarch64",
					"openEuler-22.03-LTS-SP3:kernel-tools-5.10.0-207.0.0.116.oe2203sp3.aarch64",
					"openEuler-22.03-LTS-SP3:kernel-5.10.0-207.0.0.116.oe2203sp3.aarch64",
					"openEuler-22.03-LTS-SP3:kernel-headers-5.10.0-207.0.0.116.oe2203sp3.aarch64",
					"openEuler-22.03-LTS-SP3:kernel-devel-5.10.0-207.0.0.116.oe2203sp3.aarch64",
					"openEuler-22.03-LTS-SP3:python3-perf-5.10.0-207.0.0.116.oe2203sp3.aarch64",
					"openEuler-22.03-LTS-SP3:perf-5.10.0-207.0.0.116.oe2203sp3.aarch64",
					"openEuler-22.03-LTS-SP3:kernel-tools-devel-5.10.0-207.0.0.116.oe2203sp3.aarch64",
					"openEuler-22.03-LTS-SP3:kernel-debugsource-5.10.0-207.0.0.116.oe2203sp3.aarch64",
					"openEuler-22.03-LTS-SP3:kernel-source-5.10.0-207.0.0.116.oe2203sp3.aarch64",
					"openEuler-22.03-LTS-SP3:kernel-5.10.0-207.0.0.116.oe2203sp3.src",
					"openEuler-22.03-LTS-SP3:kernel-debuginfo-5.10.0-207.0.0.116.oe2203sp3.x86_64",
					"openEuler-22.03-LTS-SP3:kernel-tools-5.10.0-207.0.0.116.oe2203sp3.x86_64",
					"openEuler-22.03-LTS-SP3:python3-perf-5.10.0-207.0.0.116.oe2203sp3.x86_64",
					"openEuler-22.03-LTS-SP3:kernel-source-5.10.0-207.0.0.116.oe2203sp3.x86_64",
					"openEuler-22.03-LTS-SP3:kernel-headers-5.10.0-207.0.0.116.oe2203sp3.x86_64",
					"openEuler-22.03-LTS-SP3:perf-5.10.0-207.0.0.116.oe2203sp3.x86_64",
					"openEuler-22.03-LTS-SP3:kernel-devel-5.10.0-207.0.0.116.oe2203sp3.x86_64",
					"openEuler-22.03-LTS-SP3:kernel-tools-devel-5.10.0-207.0.0.116.oe2203sp3.x86_64",
					"openEuler-22.03-LTS-SP3:kernel-debugsource-5.10.0-207.0.0.116.oe2203sp3.x86_64",
					"openEuler-22.03-LTS-SP3:kernel-tools-debuginfo-5.10.0-207.0.0.116.oe2203sp3.x86_64",
					"openEuler-22.03-LTS-SP3:kernel-5.10.0-207.0.0.116.oe2203sp3.x86_64",
					"openEuler-22.03-LTS-SP3:python3-perf-debuginfo-5.10.0-207.0.0.116.oe2203sp3.x86_64",
					"openEuler-22.03-LTS-SP3:perf-debuginfo-5.10.0-207.0.0.116.oe2203sp3.x86_64"
				]
			},
			"remediations":[
				{
					"product_ids":[
						"openEuler-22.03-LTS-SP3:perf-debuginfo-5.10.0-207.0.0.116.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:kernel-debuginfo-5.10.0-207.0.0.116.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:python3-perf-debuginfo-5.10.0-207.0.0.116.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:kernel-tools-debuginfo-5.10.0-207.0.0.116.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:kernel-tools-5.10.0-207.0.0.116.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:kernel-5.10.0-207.0.0.116.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:kernel-headers-5.10.0-207.0.0.116.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:kernel-devel-5.10.0-207.0.0.116.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:python3-perf-5.10.0-207.0.0.116.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:perf-5.10.0-207.0.0.116.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:kernel-tools-devel-5.10.0-207.0.0.116.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:kernel-debugsource-5.10.0-207.0.0.116.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:kernel-source-5.10.0-207.0.0.116.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:kernel-5.10.0-207.0.0.116.oe2203sp3.src",
						"openEuler-22.03-LTS-SP3:kernel-debuginfo-5.10.0-207.0.0.116.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:kernel-tools-5.10.0-207.0.0.116.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:python3-perf-5.10.0-207.0.0.116.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:kernel-source-5.10.0-207.0.0.116.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:kernel-headers-5.10.0-207.0.0.116.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:perf-5.10.0-207.0.0.116.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:kernel-devel-5.10.0-207.0.0.116.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:kernel-tools-devel-5.10.0-207.0.0.116.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:kernel-debugsource-5.10.0-207.0.0.116.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:kernel-tools-debuginfo-5.10.0-207.0.0.116.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:kernel-5.10.0-207.0.0.116.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:python3-perf-debuginfo-5.10.0-207.0.0.116.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:perf-debuginfo-5.10.0-207.0.0.116.oe2203sp3.x86_64"
					],
					"details":"kernel security update",
					"category":"vendor_fix",
					"url":"https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2024-1707"
				}
			],
			"scores":[
				{
					"cvss_v3":{
						"baseSeverity":"MEDIUM",
						"baseScore":5.5,
						"vectorString":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
						"version":"3.1"
					},
					"products":[
						"openEuler-22.03-LTS-SP3:perf-debuginfo-5.10.0-207.0.0.116.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:kernel-debuginfo-5.10.0-207.0.0.116.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:python3-perf-debuginfo-5.10.0-207.0.0.116.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:kernel-tools-debuginfo-5.10.0-207.0.0.116.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:kernel-tools-5.10.0-207.0.0.116.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:kernel-5.10.0-207.0.0.116.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:kernel-headers-5.10.0-207.0.0.116.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:kernel-devel-5.10.0-207.0.0.116.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:python3-perf-5.10.0-207.0.0.116.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:perf-5.10.0-207.0.0.116.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:kernel-tools-devel-5.10.0-207.0.0.116.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:kernel-debugsource-5.10.0-207.0.0.116.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:kernel-source-5.10.0-207.0.0.116.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:kernel-5.10.0-207.0.0.116.oe2203sp3.src",
						"openEuler-22.03-LTS-SP3:kernel-debuginfo-5.10.0-207.0.0.116.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:kernel-tools-5.10.0-207.0.0.116.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:python3-perf-5.10.0-207.0.0.116.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:kernel-source-5.10.0-207.0.0.116.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:kernel-headers-5.10.0-207.0.0.116.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:perf-5.10.0-207.0.0.116.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:kernel-devel-5.10.0-207.0.0.116.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:kernel-tools-devel-5.10.0-207.0.0.116.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:kernel-debugsource-5.10.0-207.0.0.116.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:kernel-tools-debuginfo-5.10.0-207.0.0.116.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:kernel-5.10.0-207.0.0.116.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:python3-perf-debuginfo-5.10.0-207.0.0.116.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:perf-debuginfo-5.10.0-207.0.0.116.oe2203sp3.x86_64"
					]
				}
			],
			"threats":[
				{
					"details":"Medium",
					"category":"impact"
				}
			],
			"title":"CVE-2023-52762"
		},
		{
			"cve":"CVE-2023-52775",
			"notes":[
				{
					"text":"In the Linux kernel, the following vulnerability has been resolved:\n\nnet/smc: avoid data corruption caused by decline\n\nWe found a data corruption issue during testing of SMC-R on Redis\napplications.\n\nThe benchmark has a low probability of reporting a strange error as\nshown below.\n\n\"Error: Protocol error, got \"\\xe2\" as reply type byte\"\n\nFinally, we found that the retrieved error data was as follows:\n\n0xE2 0xD4 0xC3 0xD9 0x04 0x00 0x2C 0x20 0xA6 0x56 0x00 0x16 0x3E 0x0C\n0xCB 0x04 0x02 0x01 0x00 0x00 0x20 0x00 0x00 0x00 0x00 0x00 0x00 0x00\n0x00 0x00 0x00 0x00 0x00 0x00 0x00 0x00 0x00 0x00 0xE2\n\nIt is quite obvious that this is a SMC DECLINE message, which means that\nthe applications received SMC protocol message.\nWe found that this was caused by the following situations:\n\nclient                  server\n        ¦  clc proposal\n        ------------->\n        ¦  clc accept\n        <-------------\n        ¦  clc confirm\n        ------------->\nwait llc confirm\n\t\t\tsend llc confirm\n        ¦failed llc confirm\n        ¦   x------\n(after 2s)timeout\n                        wait llc confirm rsp\n\nwait decline\n\n(after 1s) timeout\n                        (after 2s) timeout\n        ¦   decline\n        -------------->\n        ¦   decline\n        <--------------\n\nAs a result, a decline message was sent in the implementation, and this\nmessage was read from TCP by the already-fallback connection.\n\nThis patch double the client timeout as 2x of the server value,\nWith this simple change, the Decline messages should never cross or\ncollide (during Confirm link timeout).\n\nThis issue requires an immediate solution, since the protocol updates\ninvolve a more long-term solution.",
					"category":"description",
					"title":"Vulnerability Description"
				}
			],
			"product_status":{
				"fixed":[
					"openEuler-22.03-LTS-SP3:perf-debuginfo-5.10.0-207.0.0.116.oe2203sp3.aarch64",
					"openEuler-22.03-LTS-SP3:kernel-debuginfo-5.10.0-207.0.0.116.oe2203sp3.aarch64",
					"openEuler-22.03-LTS-SP3:python3-perf-debuginfo-5.10.0-207.0.0.116.oe2203sp3.aarch64",
					"openEuler-22.03-LTS-SP3:kernel-tools-debuginfo-5.10.0-207.0.0.116.oe2203sp3.aarch64",
					"openEuler-22.03-LTS-SP3:kernel-tools-5.10.0-207.0.0.116.oe2203sp3.aarch64",
					"openEuler-22.03-LTS-SP3:kernel-5.10.0-207.0.0.116.oe2203sp3.aarch64",
					"openEuler-22.03-LTS-SP3:kernel-headers-5.10.0-207.0.0.116.oe2203sp3.aarch64",
					"openEuler-22.03-LTS-SP3:kernel-devel-5.10.0-207.0.0.116.oe2203sp3.aarch64",
					"openEuler-22.03-LTS-SP3:python3-perf-5.10.0-207.0.0.116.oe2203sp3.aarch64",
					"openEuler-22.03-LTS-SP3:perf-5.10.0-207.0.0.116.oe2203sp3.aarch64",
					"openEuler-22.03-LTS-SP3:kernel-tools-devel-5.10.0-207.0.0.116.oe2203sp3.aarch64",
					"openEuler-22.03-LTS-SP3:kernel-debugsource-5.10.0-207.0.0.116.oe2203sp3.aarch64",
					"openEuler-22.03-LTS-SP3:kernel-source-5.10.0-207.0.0.116.oe2203sp3.aarch64",
					"openEuler-22.03-LTS-SP3:kernel-5.10.0-207.0.0.116.oe2203sp3.src",
					"openEuler-22.03-LTS-SP3:kernel-debuginfo-5.10.0-207.0.0.116.oe2203sp3.x86_64",
					"openEuler-22.03-LTS-SP3:kernel-tools-5.10.0-207.0.0.116.oe2203sp3.x86_64",
					"openEuler-22.03-LTS-SP3:python3-perf-5.10.0-207.0.0.116.oe2203sp3.x86_64",
					"openEuler-22.03-LTS-SP3:kernel-source-5.10.0-207.0.0.116.oe2203sp3.x86_64",
					"openEuler-22.03-LTS-SP3:kernel-headers-5.10.0-207.0.0.116.oe2203sp3.x86_64",
					"openEuler-22.03-LTS-SP3:perf-5.10.0-207.0.0.116.oe2203sp3.x86_64",
					"openEuler-22.03-LTS-SP3:kernel-devel-5.10.0-207.0.0.116.oe2203sp3.x86_64",
					"openEuler-22.03-LTS-SP3:kernel-tools-devel-5.10.0-207.0.0.116.oe2203sp3.x86_64",
					"openEuler-22.03-LTS-SP3:kernel-debugsource-5.10.0-207.0.0.116.oe2203sp3.x86_64",
					"openEuler-22.03-LTS-SP3:kernel-tools-debuginfo-5.10.0-207.0.0.116.oe2203sp3.x86_64",
					"openEuler-22.03-LTS-SP3:kernel-5.10.0-207.0.0.116.oe2203sp3.x86_64",
					"openEuler-22.03-LTS-SP3:python3-perf-debuginfo-5.10.0-207.0.0.116.oe2203sp3.x86_64",
					"openEuler-22.03-LTS-SP3:perf-debuginfo-5.10.0-207.0.0.116.oe2203sp3.x86_64"
				]
			},
			"remediations":[
				{
					"product_ids":[
						"openEuler-22.03-LTS-SP3:perf-debuginfo-5.10.0-207.0.0.116.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:kernel-debuginfo-5.10.0-207.0.0.116.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:python3-perf-debuginfo-5.10.0-207.0.0.116.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:kernel-tools-debuginfo-5.10.0-207.0.0.116.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:kernel-tools-5.10.0-207.0.0.116.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:kernel-5.10.0-207.0.0.116.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:kernel-headers-5.10.0-207.0.0.116.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:kernel-devel-5.10.0-207.0.0.116.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:python3-perf-5.10.0-207.0.0.116.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:perf-5.10.0-207.0.0.116.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:kernel-tools-devel-5.10.0-207.0.0.116.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:kernel-debugsource-5.10.0-207.0.0.116.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:kernel-source-5.10.0-207.0.0.116.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:kernel-5.10.0-207.0.0.116.oe2203sp3.src",
						"openEuler-22.03-LTS-SP3:kernel-debuginfo-5.10.0-207.0.0.116.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:kernel-tools-5.10.0-207.0.0.116.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:python3-perf-5.10.0-207.0.0.116.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:kernel-source-5.10.0-207.0.0.116.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:kernel-headers-5.10.0-207.0.0.116.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:perf-5.10.0-207.0.0.116.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:kernel-devel-5.10.0-207.0.0.116.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:kernel-tools-devel-5.10.0-207.0.0.116.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:kernel-debugsource-5.10.0-207.0.0.116.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:kernel-tools-debuginfo-5.10.0-207.0.0.116.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:kernel-5.10.0-207.0.0.116.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:python3-perf-debuginfo-5.10.0-207.0.0.116.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:perf-debuginfo-5.10.0-207.0.0.116.oe2203sp3.x86_64"
					],
					"details":"kernel security update",
					"category":"vendor_fix",
					"url":"https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2024-1707"
				}
			],
			"scores":[
				{
					"cvss_v3":{
						"baseSeverity":"MEDIUM",
						"baseScore":5.9,
						"vectorString":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N",
						"version":"3.1"
					},
					"products":[
						"openEuler-22.03-LTS-SP3:perf-debuginfo-5.10.0-207.0.0.116.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:kernel-debuginfo-5.10.0-207.0.0.116.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:python3-perf-debuginfo-5.10.0-207.0.0.116.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:kernel-tools-debuginfo-5.10.0-207.0.0.116.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:kernel-tools-5.10.0-207.0.0.116.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:kernel-5.10.0-207.0.0.116.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:kernel-headers-5.10.0-207.0.0.116.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:kernel-devel-5.10.0-207.0.0.116.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:python3-perf-5.10.0-207.0.0.116.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:perf-5.10.0-207.0.0.116.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:kernel-tools-devel-5.10.0-207.0.0.116.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:kernel-debugsource-5.10.0-207.0.0.116.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:kernel-source-5.10.0-207.0.0.116.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:kernel-5.10.0-207.0.0.116.oe2203sp3.src",
						"openEuler-22.03-LTS-SP3:kernel-debuginfo-5.10.0-207.0.0.116.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:kernel-tools-5.10.0-207.0.0.116.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:python3-perf-5.10.0-207.0.0.116.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:kernel-source-5.10.0-207.0.0.116.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:kernel-headers-5.10.0-207.0.0.116.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:perf-5.10.0-207.0.0.116.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:kernel-devel-5.10.0-207.0.0.116.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:kernel-tools-devel-5.10.0-207.0.0.116.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:kernel-debugsource-5.10.0-207.0.0.116.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:kernel-tools-debuginfo-5.10.0-207.0.0.116.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:kernel-5.10.0-207.0.0.116.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:python3-perf-debuginfo-5.10.0-207.0.0.116.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:perf-debuginfo-5.10.0-207.0.0.116.oe2203sp3.x86_64"
					]
				}
			],
			"threats":[
				{
					"details":"Medium",
					"category":"impact"
				}
			],
			"title":"CVE-2023-52775"
		},
		{
			"cve":"CVE-2023-52803",
			"notes":[
				{
					"text":"In the Linux kernel, the following vulnerability has been resolved:\n\nSUNRPC: Fix RPC client cleaned up the freed pipefs dentries\n\nRPC client pipefs dentries cleanup is in separated rpc_remove_pipedir()\nworkqueue,which takes care about pipefs superblock locking.\nIn some special scenarios, when kernel frees the pipefs sb of the\ncurrent client and immediately alloctes a new pipefs sb,\nrpc_remove_pipedir function would misjudge the existence of pipefs\nsb which is not the one it used to hold. As a result,\nthe rpc_remove_pipedir would clean the released freed pipefs dentries.\n\nTo fix this issue, rpc_remove_pipedir should check whether the\ncurrent pipefs sb is consistent with the original pipefs sb.\n\nThis error can be catched by KASAN:\n=========================================================\n[  250.497700] BUG: KASAN: slab-use-after-free in dget_parent+0x195/0x200\n[  250.498315] Read of size 4 at addr ffff88800a2ab804 by task kworker/0:18/106503\n[  250.500549] Workqueue: events rpc_free_client_work\n[  250.501001] Call Trace:\n[  250.502880]  kasan_report+0xb6/0xf0\n[  250.503209]  ? dget_parent+0x195/0x200\n[  250.503561]  dget_parent+0x195/0x200\n[  250.503897]  ? __pfx_rpc_clntdir_depopulate+0x10/0x10\n[  250.504384]  rpc_rmdir_depopulate+0x1b/0x90\n[  250.504781]  rpc_remove_client_dir+0xf5/0x150\n[  250.505195]  rpc_free_client_work+0xe4/0x230\n[  250.505598]  process_one_work+0x8ee/0x13b0\n...\n[   22.039056] Allocated by task 244:\n[   22.039390]  kasan_save_stack+0x22/0x50\n[   22.039758]  kasan_set_track+0x25/0x30\n[   22.040109]  __kasan_slab_alloc+0x59/0x70\n[   22.040487]  kmem_cache_alloc_lru+0xf0/0x240\n[   22.040889]  __d_alloc+0x31/0x8e0\n[   22.041207]  d_alloc+0x44/0x1f0\n[   22.041514]  __rpc_lookup_create_exclusive+0x11c/0x140\n[   22.041987]  rpc_mkdir_populate.constprop.0+0x5f/0x110\n[   22.042459]  rpc_create_client_dir+0x34/0x150\n[   22.042874]  rpc_setup_pipedir_sb+0x102/0x1c0\n[   22.043284]  rpc_client_register+0x136/0x4e0\n[   22.043689]  rpc_new_client+0x911/0x1020\n[   22.044057]  rpc_create_xprt+0xcb/0x370\n[   22.044417]  rpc_create+0x36b/0x6c0\n...\n[   22.049524] Freed by task 0:\n[   22.049803]  kasan_save_stack+0x22/0x50\n[   22.050165]  kasan_set_track+0x25/0x30\n[   22.050520]  kasan_save_free_info+0x2b/0x50\n[   22.050921]  __kasan_slab_free+0x10e/0x1a0\n[   22.051306]  kmem_cache_free+0xa5/0x390\n[   22.051667]  rcu_core+0x62c/0x1930\n[   22.051995]  __do_softirq+0x165/0x52a\n[   22.052347]\n[   22.052503] Last potentially related work creation:\n[   22.052952]  kasan_save_stack+0x22/0x50\n[   22.053313]  __kasan_record_aux_stack+0x8e/0xa0\n[   22.053739]  __call_rcu_common.constprop.0+0x6b/0x8b0\n[   22.054209]  dentry_free+0xb2/0x140\n[   22.054540]  __dentry_kill+0x3be/0x540\n[   22.054900]  shrink_dentry_list+0x199/0x510\n[   22.055293]  shrink_dcache_parent+0x190/0x240\n[   22.055703]  do_one_tree+0x11/0x40\n[   22.056028]  shrink_dcache_for_umount+0x61/0x140\n[   22.056461]  generic_shutdown_super+0x70/0x590\n[   22.056879]  kill_anon_super+0x3a/0x60\n[   22.057234]  rpc_kill_sb+0x121/0x200",
					"category":"description",
					"title":"Vulnerability Description"
				}
			],
			"product_status":{
				"fixed":[
					"openEuler-22.03-LTS-SP3:perf-debuginfo-5.10.0-207.0.0.116.oe2203sp3.aarch64",
					"openEuler-22.03-LTS-SP3:kernel-debuginfo-5.10.0-207.0.0.116.oe2203sp3.aarch64",
					"openEuler-22.03-LTS-SP3:python3-perf-debuginfo-5.10.0-207.0.0.116.oe2203sp3.aarch64",
					"openEuler-22.03-LTS-SP3:kernel-tools-debuginfo-5.10.0-207.0.0.116.oe2203sp3.aarch64",
					"openEuler-22.03-LTS-SP3:kernel-tools-5.10.0-207.0.0.116.oe2203sp3.aarch64",
					"openEuler-22.03-LTS-SP3:kernel-5.10.0-207.0.0.116.oe2203sp3.aarch64",
					"openEuler-22.03-LTS-SP3:kernel-headers-5.10.0-207.0.0.116.oe2203sp3.aarch64",
					"openEuler-22.03-LTS-SP3:kernel-devel-5.10.0-207.0.0.116.oe2203sp3.aarch64",
					"openEuler-22.03-LTS-SP3:python3-perf-5.10.0-207.0.0.116.oe2203sp3.aarch64",
					"openEuler-22.03-LTS-SP3:perf-5.10.0-207.0.0.116.oe2203sp3.aarch64",
					"openEuler-22.03-LTS-SP3:kernel-tools-devel-5.10.0-207.0.0.116.oe2203sp3.aarch64",
					"openEuler-22.03-LTS-SP3:kernel-debugsource-5.10.0-207.0.0.116.oe2203sp3.aarch64",
					"openEuler-22.03-LTS-SP3:kernel-source-5.10.0-207.0.0.116.oe2203sp3.aarch64",
					"openEuler-22.03-LTS-SP3:kernel-5.10.0-207.0.0.116.oe2203sp3.src",
					"openEuler-22.03-LTS-SP3:kernel-debuginfo-5.10.0-207.0.0.116.oe2203sp3.x86_64",
					"openEuler-22.03-LTS-SP3:kernel-tools-5.10.0-207.0.0.116.oe2203sp3.x86_64",
					"openEuler-22.03-LTS-SP3:python3-perf-5.10.0-207.0.0.116.oe2203sp3.x86_64",
					"openEuler-22.03-LTS-SP3:kernel-source-5.10.0-207.0.0.116.oe2203sp3.x86_64",
					"openEuler-22.03-LTS-SP3:kernel-headers-5.10.0-207.0.0.116.oe2203sp3.x86_64",
					"openEuler-22.03-LTS-SP3:perf-5.10.0-207.0.0.116.oe2203sp3.x86_64",
					"openEuler-22.03-LTS-SP3:kernel-devel-5.10.0-207.0.0.116.oe2203sp3.x86_64",
					"openEuler-22.03-LTS-SP3:kernel-tools-devel-5.10.0-207.0.0.116.oe2203sp3.x86_64",
					"openEuler-22.03-LTS-SP3:kernel-debugsource-5.10.0-207.0.0.116.oe2203sp3.x86_64",
					"openEuler-22.03-LTS-SP3:kernel-tools-debuginfo-5.10.0-207.0.0.116.oe2203sp3.x86_64",
					"openEuler-22.03-LTS-SP3:kernel-5.10.0-207.0.0.116.oe2203sp3.x86_64",
					"openEuler-22.03-LTS-SP3:python3-perf-debuginfo-5.10.0-207.0.0.116.oe2203sp3.x86_64",
					"openEuler-22.03-LTS-SP3:perf-debuginfo-5.10.0-207.0.0.116.oe2203sp3.x86_64"
				]
			},
			"remediations":[
				{
					"product_ids":[
						"openEuler-22.03-LTS-SP3:perf-debuginfo-5.10.0-207.0.0.116.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:kernel-debuginfo-5.10.0-207.0.0.116.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:python3-perf-debuginfo-5.10.0-207.0.0.116.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:kernel-tools-debuginfo-5.10.0-207.0.0.116.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:kernel-tools-5.10.0-207.0.0.116.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:kernel-5.10.0-207.0.0.116.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:kernel-headers-5.10.0-207.0.0.116.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:kernel-devel-5.10.0-207.0.0.116.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:python3-perf-5.10.0-207.0.0.116.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:perf-5.10.0-207.0.0.116.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:kernel-tools-devel-5.10.0-207.0.0.116.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:kernel-debugsource-5.10.0-207.0.0.116.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:kernel-source-5.10.0-207.0.0.116.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:kernel-5.10.0-207.0.0.116.oe2203sp3.src",
						"openEuler-22.03-LTS-SP3:kernel-debuginfo-5.10.0-207.0.0.116.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:kernel-tools-5.10.0-207.0.0.116.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:python3-perf-5.10.0-207.0.0.116.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:kernel-source-5.10.0-207.0.0.116.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:kernel-headers-5.10.0-207.0.0.116.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:perf-5.10.0-207.0.0.116.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:kernel-devel-5.10.0-207.0.0.116.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:kernel-tools-devel-5.10.0-207.0.0.116.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:kernel-debugsource-5.10.0-207.0.0.116.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:kernel-tools-debuginfo-5.10.0-207.0.0.116.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:kernel-5.10.0-207.0.0.116.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:python3-perf-debuginfo-5.10.0-207.0.0.116.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:perf-debuginfo-5.10.0-207.0.0.116.oe2203sp3.x86_64"
					],
					"details":"kernel security update",
					"category":"vendor_fix",
					"url":"https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2024-1707"
				}
			],
			"scores":[
				{
					"cvss_v3":{
						"baseSeverity":"MEDIUM",
						"baseScore":6.4,
						"vectorString":"CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H",
						"version":"3.1"
					},
					"products":[
						"openEuler-22.03-LTS-SP3:perf-debuginfo-5.10.0-207.0.0.116.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:kernel-debuginfo-5.10.0-207.0.0.116.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:python3-perf-debuginfo-5.10.0-207.0.0.116.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:kernel-tools-debuginfo-5.10.0-207.0.0.116.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:kernel-tools-5.10.0-207.0.0.116.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:kernel-5.10.0-207.0.0.116.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:kernel-headers-5.10.0-207.0.0.116.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:kernel-devel-5.10.0-207.0.0.116.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:python3-perf-5.10.0-207.0.0.116.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:perf-5.10.0-207.0.0.116.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:kernel-tools-devel-5.10.0-207.0.0.116.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:kernel-debugsource-5.10.0-207.0.0.116.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:kernel-source-5.10.0-207.0.0.116.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:kernel-5.10.0-207.0.0.116.oe2203sp3.src",
						"openEuler-22.03-LTS-SP3:kernel-debuginfo-5.10.0-207.0.0.116.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:kernel-tools-5.10.0-207.0.0.116.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:python3-perf-5.10.0-207.0.0.116.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:kernel-source-5.10.0-207.0.0.116.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:kernel-headers-5.10.0-207.0.0.116.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:perf-5.10.0-207.0.0.116.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:kernel-devel-5.10.0-207.0.0.116.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:kernel-tools-devel-5.10.0-207.0.0.116.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:kernel-debugsource-5.10.0-207.0.0.116.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:kernel-tools-debuginfo-5.10.0-207.0.0.116.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:kernel-5.10.0-207.0.0.116.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:python3-perf-debuginfo-5.10.0-207.0.0.116.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:perf-debuginfo-5.10.0-207.0.0.116.oe2203sp3.x86_64"
					]
				}
			],
			"threats":[
				{
					"details":"Medium",
					"category":"impact"
				}
			],
			"title":"CVE-2023-52803"
		},
		{
			"cve":"CVE-2023-52810",
			"notes":[
				{
					"text":"In the Linux kernel, the following vulnerability has been resolved:\n\nfs/jfs: Add check for negative db_l2nbperpage\n\nl2nbperpage is log2(number of blks per page), and the minimum legal\nvalue should be 0, not negative.\n\nIn the case of l2nbperpage being negative, an error will occur\nwhen subsequently used as shift exponent.\n\nSyzbot reported this bug:\n\nUBSAN: shift-out-of-bounds in fs/jfs/jfs_dmap.c:799:12\nshift exponent -16777216 is negative",
					"category":"description",
					"title":"Vulnerability Description"
				}
			],
			"product_status":{
				"fixed":[
					"openEuler-22.03-LTS-SP3:perf-debuginfo-5.10.0-207.0.0.116.oe2203sp3.aarch64",
					"openEuler-22.03-LTS-SP3:kernel-debuginfo-5.10.0-207.0.0.116.oe2203sp3.aarch64",
					"openEuler-22.03-LTS-SP3:python3-perf-debuginfo-5.10.0-207.0.0.116.oe2203sp3.aarch64",
					"openEuler-22.03-LTS-SP3:kernel-tools-debuginfo-5.10.0-207.0.0.116.oe2203sp3.aarch64",
					"openEuler-22.03-LTS-SP3:kernel-tools-5.10.0-207.0.0.116.oe2203sp3.aarch64",
					"openEuler-22.03-LTS-SP3:kernel-5.10.0-207.0.0.116.oe2203sp3.aarch64",
					"openEuler-22.03-LTS-SP3:kernel-headers-5.10.0-207.0.0.116.oe2203sp3.aarch64",
					"openEuler-22.03-LTS-SP3:kernel-devel-5.10.0-207.0.0.116.oe2203sp3.aarch64",
					"openEuler-22.03-LTS-SP3:python3-perf-5.10.0-207.0.0.116.oe2203sp3.aarch64",
					"openEuler-22.03-LTS-SP3:perf-5.10.0-207.0.0.116.oe2203sp3.aarch64",
					"openEuler-22.03-LTS-SP3:kernel-tools-devel-5.10.0-207.0.0.116.oe2203sp3.aarch64",
					"openEuler-22.03-LTS-SP3:kernel-debugsource-5.10.0-207.0.0.116.oe2203sp3.aarch64",
					"openEuler-22.03-LTS-SP3:kernel-source-5.10.0-207.0.0.116.oe2203sp3.aarch64",
					"openEuler-22.03-LTS-SP3:kernel-5.10.0-207.0.0.116.oe2203sp3.src",
					"openEuler-22.03-LTS-SP3:kernel-debuginfo-5.10.0-207.0.0.116.oe2203sp3.x86_64",
					"openEuler-22.03-LTS-SP3:kernel-tools-5.10.0-207.0.0.116.oe2203sp3.x86_64",
					"openEuler-22.03-LTS-SP3:python3-perf-5.10.0-207.0.0.116.oe2203sp3.x86_64",
					"openEuler-22.03-LTS-SP3:kernel-source-5.10.0-207.0.0.116.oe2203sp3.x86_64",
					"openEuler-22.03-LTS-SP3:kernel-headers-5.10.0-207.0.0.116.oe2203sp3.x86_64",
					"openEuler-22.03-LTS-SP3:perf-5.10.0-207.0.0.116.oe2203sp3.x86_64",
					"openEuler-22.03-LTS-SP3:kernel-devel-5.10.0-207.0.0.116.oe2203sp3.x86_64",
					"openEuler-22.03-LTS-SP3:kernel-tools-devel-5.10.0-207.0.0.116.oe2203sp3.x86_64",
					"openEuler-22.03-LTS-SP3:kernel-debugsource-5.10.0-207.0.0.116.oe2203sp3.x86_64",
					"openEuler-22.03-LTS-SP3:kernel-tools-debuginfo-5.10.0-207.0.0.116.oe2203sp3.x86_64",
					"openEuler-22.03-LTS-SP3:kernel-5.10.0-207.0.0.116.oe2203sp3.x86_64",
					"openEuler-22.03-LTS-SP3:python3-perf-debuginfo-5.10.0-207.0.0.116.oe2203sp3.x86_64",
					"openEuler-22.03-LTS-SP3:perf-debuginfo-5.10.0-207.0.0.116.oe2203sp3.x86_64"
				]
			},
			"remediations":[
				{
					"product_ids":[
						"openEuler-22.03-LTS-SP3:perf-debuginfo-5.10.0-207.0.0.116.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:kernel-debuginfo-5.10.0-207.0.0.116.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:python3-perf-debuginfo-5.10.0-207.0.0.116.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:kernel-tools-debuginfo-5.10.0-207.0.0.116.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:kernel-tools-5.10.0-207.0.0.116.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:kernel-5.10.0-207.0.0.116.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:kernel-headers-5.10.0-207.0.0.116.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:kernel-devel-5.10.0-207.0.0.116.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:python3-perf-5.10.0-207.0.0.116.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:perf-5.10.0-207.0.0.116.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:kernel-tools-devel-5.10.0-207.0.0.116.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:kernel-debugsource-5.10.0-207.0.0.116.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:kernel-source-5.10.0-207.0.0.116.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:kernel-5.10.0-207.0.0.116.oe2203sp3.src",
						"openEuler-22.03-LTS-SP3:kernel-debuginfo-5.10.0-207.0.0.116.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:kernel-tools-5.10.0-207.0.0.116.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:python3-perf-5.10.0-207.0.0.116.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:kernel-source-5.10.0-207.0.0.116.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:kernel-headers-5.10.0-207.0.0.116.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:perf-5.10.0-207.0.0.116.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:kernel-devel-5.10.0-207.0.0.116.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:kernel-tools-devel-5.10.0-207.0.0.116.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:kernel-debugsource-5.10.0-207.0.0.116.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:kernel-tools-debuginfo-5.10.0-207.0.0.116.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:kernel-5.10.0-207.0.0.116.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:python3-perf-debuginfo-5.10.0-207.0.0.116.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:perf-debuginfo-5.10.0-207.0.0.116.oe2203sp3.x86_64"
					],
					"details":"kernel security update",
					"category":"vendor_fix",
					"url":"https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2024-1707"
				}
			],
			"scores":[
				{
					"cvss_v3":{
						"baseSeverity":"MEDIUM",
						"baseScore":6.1,
						"vectorString":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H",
						"version":"3.1"
					},
					"products":[
						"openEuler-22.03-LTS-SP3:perf-debuginfo-5.10.0-207.0.0.116.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:kernel-debuginfo-5.10.0-207.0.0.116.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:python3-perf-debuginfo-5.10.0-207.0.0.116.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:kernel-tools-debuginfo-5.10.0-207.0.0.116.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:kernel-tools-5.10.0-207.0.0.116.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:kernel-5.10.0-207.0.0.116.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:kernel-headers-5.10.0-207.0.0.116.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:kernel-devel-5.10.0-207.0.0.116.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:python3-perf-5.10.0-207.0.0.116.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:perf-5.10.0-207.0.0.116.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:kernel-tools-devel-5.10.0-207.0.0.116.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:kernel-debugsource-5.10.0-207.0.0.116.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:kernel-source-5.10.0-207.0.0.116.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:kernel-5.10.0-207.0.0.116.oe2203sp3.src",
						"openEuler-22.03-LTS-SP3:kernel-debuginfo-5.10.0-207.0.0.116.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:kernel-tools-5.10.0-207.0.0.116.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:python3-perf-5.10.0-207.0.0.116.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:kernel-source-5.10.0-207.0.0.116.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:kernel-headers-5.10.0-207.0.0.116.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:perf-5.10.0-207.0.0.116.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:kernel-devel-5.10.0-207.0.0.116.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:kernel-tools-devel-5.10.0-207.0.0.116.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:kernel-debugsource-5.10.0-207.0.0.116.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:kernel-tools-debuginfo-5.10.0-207.0.0.116.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:kernel-5.10.0-207.0.0.116.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:python3-perf-debuginfo-5.10.0-207.0.0.116.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:perf-debuginfo-5.10.0-207.0.0.116.oe2203sp3.x86_64"
					]
				}
			],
			"threats":[
				{
					"details":"Medium",
					"category":"impact"
				}
			],
			"title":"CVE-2023-52810"
		},
		{
			"cve":"CVE-2023-52880",
			"notes":[
				{
					"text":"In the Linux kernel, the following vulnerability has been resolved:\n\ntty: n_gsm: require CAP_NET_ADMIN to attach N_GSM0710 ldisc\n\nAny unprivileged user can attach N_GSM0710 ldisc, but it requires\nCAP_NET_ADMIN to create a GSM network anyway.\n\nRequire initial namespace CAP_NET_ADMIN to do that.",
					"category":"description",
					"title":"Vulnerability Description"
				}
			],
			"product_status":{
				"fixed":[
					"openEuler-22.03-LTS-SP3:perf-debuginfo-5.10.0-207.0.0.116.oe2203sp3.aarch64",
					"openEuler-22.03-LTS-SP3:kernel-debuginfo-5.10.0-207.0.0.116.oe2203sp3.aarch64",
					"openEuler-22.03-LTS-SP3:python3-perf-debuginfo-5.10.0-207.0.0.116.oe2203sp3.aarch64",
					"openEuler-22.03-LTS-SP3:kernel-tools-debuginfo-5.10.0-207.0.0.116.oe2203sp3.aarch64",
					"openEuler-22.03-LTS-SP3:kernel-tools-5.10.0-207.0.0.116.oe2203sp3.aarch64",
					"openEuler-22.03-LTS-SP3:kernel-5.10.0-207.0.0.116.oe2203sp3.aarch64",
					"openEuler-22.03-LTS-SP3:kernel-headers-5.10.0-207.0.0.116.oe2203sp3.aarch64",
					"openEuler-22.03-LTS-SP3:kernel-devel-5.10.0-207.0.0.116.oe2203sp3.aarch64",
					"openEuler-22.03-LTS-SP3:python3-perf-5.10.0-207.0.0.116.oe2203sp3.aarch64",
					"openEuler-22.03-LTS-SP3:perf-5.10.0-207.0.0.116.oe2203sp3.aarch64",
					"openEuler-22.03-LTS-SP3:kernel-tools-devel-5.10.0-207.0.0.116.oe2203sp3.aarch64",
					"openEuler-22.03-LTS-SP3:kernel-debugsource-5.10.0-207.0.0.116.oe2203sp3.aarch64",
					"openEuler-22.03-LTS-SP3:kernel-source-5.10.0-207.0.0.116.oe2203sp3.aarch64",
					"openEuler-22.03-LTS-SP3:kernel-5.10.0-207.0.0.116.oe2203sp3.src",
					"openEuler-22.03-LTS-SP3:kernel-debuginfo-5.10.0-207.0.0.116.oe2203sp3.x86_64",
					"openEuler-22.03-LTS-SP3:kernel-tools-5.10.0-207.0.0.116.oe2203sp3.x86_64",
					"openEuler-22.03-LTS-SP3:python3-perf-5.10.0-207.0.0.116.oe2203sp3.x86_64",
					"openEuler-22.03-LTS-SP3:kernel-source-5.10.0-207.0.0.116.oe2203sp3.x86_64",
					"openEuler-22.03-LTS-SP3:kernel-headers-5.10.0-207.0.0.116.oe2203sp3.x86_64",
					"openEuler-22.03-LTS-SP3:perf-5.10.0-207.0.0.116.oe2203sp3.x86_64",
					"openEuler-22.03-LTS-SP3:kernel-devel-5.10.0-207.0.0.116.oe2203sp3.x86_64",
					"openEuler-22.03-LTS-SP3:kernel-tools-devel-5.10.0-207.0.0.116.oe2203sp3.x86_64",
					"openEuler-22.03-LTS-SP3:kernel-debugsource-5.10.0-207.0.0.116.oe2203sp3.x86_64",
					"openEuler-22.03-LTS-SP3:kernel-tools-debuginfo-5.10.0-207.0.0.116.oe2203sp3.x86_64",
					"openEuler-22.03-LTS-SP3:kernel-5.10.0-207.0.0.116.oe2203sp3.x86_64",
					"openEuler-22.03-LTS-SP3:python3-perf-debuginfo-5.10.0-207.0.0.116.oe2203sp3.x86_64",
					"openEuler-22.03-LTS-SP3:perf-debuginfo-5.10.0-207.0.0.116.oe2203sp3.x86_64"
				]
			},
			"remediations":[
				{
					"product_ids":[
						"openEuler-22.03-LTS-SP3:perf-debuginfo-5.10.0-207.0.0.116.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:kernel-debuginfo-5.10.0-207.0.0.116.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:python3-perf-debuginfo-5.10.0-207.0.0.116.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:kernel-tools-debuginfo-5.10.0-207.0.0.116.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:kernel-tools-5.10.0-207.0.0.116.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:kernel-5.10.0-207.0.0.116.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:kernel-headers-5.10.0-207.0.0.116.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:kernel-devel-5.10.0-207.0.0.116.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:python3-perf-5.10.0-207.0.0.116.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:perf-5.10.0-207.0.0.116.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:kernel-tools-devel-5.10.0-207.0.0.116.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:kernel-debugsource-5.10.0-207.0.0.116.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:kernel-source-5.10.0-207.0.0.116.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:kernel-5.10.0-207.0.0.116.oe2203sp3.src",
						"openEuler-22.03-LTS-SP3:kernel-debuginfo-5.10.0-207.0.0.116.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:kernel-tools-5.10.0-207.0.0.116.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:python3-perf-5.10.0-207.0.0.116.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:kernel-source-5.10.0-207.0.0.116.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:kernel-headers-5.10.0-207.0.0.116.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:perf-5.10.0-207.0.0.116.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:kernel-devel-5.10.0-207.0.0.116.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:kernel-tools-devel-5.10.0-207.0.0.116.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:kernel-debugsource-5.10.0-207.0.0.116.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:kernel-tools-debuginfo-5.10.0-207.0.0.116.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:kernel-5.10.0-207.0.0.116.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:python3-perf-debuginfo-5.10.0-207.0.0.116.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:perf-debuginfo-5.10.0-207.0.0.116.oe2203sp3.x86_64"
					],
					"details":"kernel security update",
					"category":"vendor_fix",
					"url":"https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2024-1707"
				}
			],
			"scores":[
				{
					"cvss_v3":{
						"baseSeverity":"HIGH",
						"baseScore":8.4,
						"vectorString":"CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
						"version":"3.1"
					},
					"products":[
						"openEuler-22.03-LTS-SP3:perf-debuginfo-5.10.0-207.0.0.116.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:kernel-debuginfo-5.10.0-207.0.0.116.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:python3-perf-debuginfo-5.10.0-207.0.0.116.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:kernel-tools-debuginfo-5.10.0-207.0.0.116.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:kernel-tools-5.10.0-207.0.0.116.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:kernel-5.10.0-207.0.0.116.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:kernel-headers-5.10.0-207.0.0.116.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:kernel-devel-5.10.0-207.0.0.116.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:python3-perf-5.10.0-207.0.0.116.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:perf-5.10.0-207.0.0.116.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:kernel-tools-devel-5.10.0-207.0.0.116.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:kernel-debugsource-5.10.0-207.0.0.116.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:kernel-source-5.10.0-207.0.0.116.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:kernel-5.10.0-207.0.0.116.oe2203sp3.src",
						"openEuler-22.03-LTS-SP3:kernel-debuginfo-5.10.0-207.0.0.116.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:kernel-tools-5.10.0-207.0.0.116.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:python3-perf-5.10.0-207.0.0.116.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:kernel-source-5.10.0-207.0.0.116.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:kernel-headers-5.10.0-207.0.0.116.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:perf-5.10.0-207.0.0.116.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:kernel-devel-5.10.0-207.0.0.116.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:kernel-tools-devel-5.10.0-207.0.0.116.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:kernel-debugsource-5.10.0-207.0.0.116.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:kernel-tools-debuginfo-5.10.0-207.0.0.116.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:kernel-5.10.0-207.0.0.116.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:python3-perf-debuginfo-5.10.0-207.0.0.116.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:perf-debuginfo-5.10.0-207.0.0.116.oe2203sp3.x86_64"
					]
				}
			],
			"threats":[
				{
					"details":"High",
					"category":"impact"
				}
			],
			"title":"CVE-2023-52880"
		},
		{
			"cve":"CVE-2023-52881",
			"notes":[
				{
					"text":"In the Linux kernel, the following vulnerability has been resolved:\n\ntcp: do not accept ACK of bytes we never sent\n\nThis patch is based on a detailed report and ideas from Yepeng Pan\nand Christian Rossow.\n\nACK seq validation is currently following RFC 5961 5.2 guidelines:\n\n   The ACK value is considered acceptable only if\n   it is in the range of ((SND.UNA - MAX.SND.WND) <= SEG.ACK <=\n   SND.NXT).  All incoming segments whose ACK value doesn't satisfy the\n   above condition MUST be discarded and an ACK sent back.  It needs to\n   be noted that RFC 793 on page 72 (fifth check) says: \"If the ACK is a\n   duplicate (SEG.ACK < SND.UNA), it can be ignored.  If the ACK\n   acknowledges something not yet sent (SEG.ACK > SND.NXT) then send an\n   ACK, drop the segment, and return\".  The \"ignored\" above implies that\n   the processing of the incoming data segment continues, which means\n   the ACK value is treated as acceptable.  This mitigation makes the\n   ACK check more stringent since any ACK < SND.UNA wouldn't be\n   accepted, instead only ACKs that are in the range ((SND.UNA -\n   MAX.SND.WND) <= SEG.ACK <= SND.NXT) get through.\n\nThis can be refined for new (and possibly spoofed) flows,\nby not accepting ACK for bytes that were never sent.\n\nThis greatly improves TCP security at a little cost.\n\nI added a Fixes: tag to make sure this patch will reach stable trees,\neven if the 'blamed' patch was adhering to the RFC.\n\ntp->bytes_acked was added in linux-4.2\n\nFollowing packetdrill test (courtesy of Yepeng Pan) shows\nthe issue at hand:\n\n0 socket(..., SOCK_STREAM, IPPROTO_TCP) = 3\n+0 setsockopt(3, SOL_SOCKET, SO_REUSEADDR, [1], 4) = 0\n+0 bind(3, ..., ...) = 0\n+0 listen(3, 1024) = 0\n\n// ---------------- Handshake ------------------- //\n\n// when window scale is set to 14 the window size can be extended to\n// 65535 * (2^14) = 1073725440. Linux would accept an ACK packet\n// with ack number in (Server_ISN+1-1073725440. Server_ISN+1)\n// ,though this ack number acknowledges some data never\n// sent by the server.\n\n+0 < S 0:0(0) win 65535 <mss 1400,nop,wscale 14>\n+0 > S. 0:0(0) ack 1 <...>\n+0 < . 1:1(0) ack 1 win 65535\n+0 accept(3, ..., ...) = 4\n\n// For the established connection, we send an ACK packet,\n// the ack packet uses ack number 1 - 1073725300 + 2^32,\n// where 2^32 is used to wrap around.\n// Note: we used 1073725300 instead of 1073725440 to avoid possible\n// edge cases.\n// 1 - 1073725300 + 2^32 = 3221241997\n\n// Oops, old kernels happily accept this packet.\n+0 < . 1:1001(1000) ack 3221241997 win 65535\n\n// After the kernel fix the following will be replaced by a challenge ACK,\n// and prior malicious frame would be dropped.\n+0 > . 1:1(0) ack 1001",
					"category":"description",
					"title":"Vulnerability Description"
				}
			],
			"product_status":{
				"fixed":[
					"openEuler-22.03-LTS-SP3:perf-debuginfo-5.10.0-207.0.0.116.oe2203sp3.aarch64",
					"openEuler-22.03-LTS-SP3:kernel-debuginfo-5.10.0-207.0.0.116.oe2203sp3.aarch64",
					"openEuler-22.03-LTS-SP3:python3-perf-debuginfo-5.10.0-207.0.0.116.oe2203sp3.aarch64",
					"openEuler-22.03-LTS-SP3:kernel-tools-debuginfo-5.10.0-207.0.0.116.oe2203sp3.aarch64",
					"openEuler-22.03-LTS-SP3:kernel-tools-5.10.0-207.0.0.116.oe2203sp3.aarch64",
					"openEuler-22.03-LTS-SP3:kernel-5.10.0-207.0.0.116.oe2203sp3.aarch64",
					"openEuler-22.03-LTS-SP3:kernel-headers-5.10.0-207.0.0.116.oe2203sp3.aarch64",
					"openEuler-22.03-LTS-SP3:kernel-devel-5.10.0-207.0.0.116.oe2203sp3.aarch64",
					"openEuler-22.03-LTS-SP3:python3-perf-5.10.0-207.0.0.116.oe2203sp3.aarch64",
					"openEuler-22.03-LTS-SP3:perf-5.10.0-207.0.0.116.oe2203sp3.aarch64",
					"openEuler-22.03-LTS-SP3:kernel-tools-devel-5.10.0-207.0.0.116.oe2203sp3.aarch64",
					"openEuler-22.03-LTS-SP3:kernel-debugsource-5.10.0-207.0.0.116.oe2203sp3.aarch64",
					"openEuler-22.03-LTS-SP3:kernel-source-5.10.0-207.0.0.116.oe2203sp3.aarch64",
					"openEuler-22.03-LTS-SP3:kernel-5.10.0-207.0.0.116.oe2203sp3.src",
					"openEuler-22.03-LTS-SP3:kernel-debuginfo-5.10.0-207.0.0.116.oe2203sp3.x86_64",
					"openEuler-22.03-LTS-SP3:kernel-tools-5.10.0-207.0.0.116.oe2203sp3.x86_64",
					"openEuler-22.03-LTS-SP3:python3-perf-5.10.0-207.0.0.116.oe2203sp3.x86_64",
					"openEuler-22.03-LTS-SP3:kernel-source-5.10.0-207.0.0.116.oe2203sp3.x86_64",
					"openEuler-22.03-LTS-SP3:kernel-headers-5.10.0-207.0.0.116.oe2203sp3.x86_64",
					"openEuler-22.03-LTS-SP3:perf-5.10.0-207.0.0.116.oe2203sp3.x86_64",
					"openEuler-22.03-LTS-SP3:kernel-devel-5.10.0-207.0.0.116.oe2203sp3.x86_64",
					"openEuler-22.03-LTS-SP3:kernel-tools-devel-5.10.0-207.0.0.116.oe2203sp3.x86_64",
					"openEuler-22.03-LTS-SP3:kernel-debugsource-5.10.0-207.0.0.116.oe2203sp3.x86_64",
					"openEuler-22.03-LTS-SP3:kernel-tools-debuginfo-5.10.0-207.0.0.116.oe2203sp3.x86_64",
					"openEuler-22.03-LTS-SP3:kernel-5.10.0-207.0.0.116.oe2203sp3.x86_64",
					"openEuler-22.03-LTS-SP3:python3-perf-debuginfo-5.10.0-207.0.0.116.oe2203sp3.x86_64",
					"openEuler-22.03-LTS-SP3:perf-debuginfo-5.10.0-207.0.0.116.oe2203sp3.x86_64"
				]
			},
			"remediations":[
				{
					"product_ids":[
						"openEuler-22.03-LTS-SP3:perf-debuginfo-5.10.0-207.0.0.116.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:kernel-debuginfo-5.10.0-207.0.0.116.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:python3-perf-debuginfo-5.10.0-207.0.0.116.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:kernel-tools-debuginfo-5.10.0-207.0.0.116.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:kernel-tools-5.10.0-207.0.0.116.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:kernel-5.10.0-207.0.0.116.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:kernel-headers-5.10.0-207.0.0.116.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:kernel-devel-5.10.0-207.0.0.116.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:python3-perf-5.10.0-207.0.0.116.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:perf-5.10.0-207.0.0.116.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:kernel-tools-devel-5.10.0-207.0.0.116.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:kernel-debugsource-5.10.0-207.0.0.116.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:kernel-source-5.10.0-207.0.0.116.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:kernel-5.10.0-207.0.0.116.oe2203sp3.src",
						"openEuler-22.03-LTS-SP3:kernel-debuginfo-5.10.0-207.0.0.116.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:kernel-tools-5.10.0-207.0.0.116.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:python3-perf-5.10.0-207.0.0.116.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:kernel-source-5.10.0-207.0.0.116.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:kernel-headers-5.10.0-207.0.0.116.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:perf-5.10.0-207.0.0.116.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:kernel-devel-5.10.0-207.0.0.116.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:kernel-tools-devel-5.10.0-207.0.0.116.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:kernel-debugsource-5.10.0-207.0.0.116.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:kernel-tools-debuginfo-5.10.0-207.0.0.116.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:kernel-5.10.0-207.0.0.116.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:python3-perf-debuginfo-5.10.0-207.0.0.116.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:perf-debuginfo-5.10.0-207.0.0.116.oe2203sp3.x86_64"
					],
					"details":"kernel security update",
					"category":"vendor_fix",
					"url":"https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2024-1707"
				}
			],
			"scores":[
				{
					"cvss_v3":{
						"baseSeverity":"MEDIUM",
						"baseScore":5.9,
						"vectorString":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N",
						"version":"3.1"
					},
					"products":[
						"openEuler-22.03-LTS-SP3:perf-debuginfo-5.10.0-207.0.0.116.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:kernel-debuginfo-5.10.0-207.0.0.116.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:python3-perf-debuginfo-5.10.0-207.0.0.116.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:kernel-tools-debuginfo-5.10.0-207.0.0.116.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:kernel-tools-5.10.0-207.0.0.116.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:kernel-5.10.0-207.0.0.116.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:kernel-headers-5.10.0-207.0.0.116.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:kernel-devel-5.10.0-207.0.0.116.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:python3-perf-5.10.0-207.0.0.116.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:perf-5.10.0-207.0.0.116.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:kernel-tools-devel-5.10.0-207.0.0.116.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:kernel-debugsource-5.10.0-207.0.0.116.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:kernel-source-5.10.0-207.0.0.116.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:kernel-5.10.0-207.0.0.116.oe2203sp3.src",
						"openEuler-22.03-LTS-SP3:kernel-debuginfo-5.10.0-207.0.0.116.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:kernel-tools-5.10.0-207.0.0.116.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:python3-perf-5.10.0-207.0.0.116.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:kernel-source-5.10.0-207.0.0.116.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:kernel-headers-5.10.0-207.0.0.116.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:perf-5.10.0-207.0.0.116.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:kernel-devel-5.10.0-207.0.0.116.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:kernel-tools-devel-5.10.0-207.0.0.116.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:kernel-debugsource-5.10.0-207.0.0.116.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:kernel-tools-debuginfo-5.10.0-207.0.0.116.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:kernel-5.10.0-207.0.0.116.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:python3-perf-debuginfo-5.10.0-207.0.0.116.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:perf-debuginfo-5.10.0-207.0.0.116.oe2203sp3.x86_64"
					]
				}
			],
			"threats":[
				{
					"details":"Medium",
					"category":"impact"
				}
			],
			"title":"CVE-2023-52881"
		},
		{
			"cve":"CVE-2024-26835",
			"notes":[
				{
					"text":"In the Linux kernel, the following vulnerability has been resolved:\n\nnetfilter: nf_tables: set dormant flag on hook register failure\n\nWe need to set the dormant flag again if we fail to register\nthe hooks.\n\nDuring memory pressure hook registration can fail and we end up\nwith a table marked as active but no registered hooks.\n\nOn table/base chain deletion, nf_tables will attempt to unregister\nthe hook again which yields a warn splat from the nftables core.",
					"category":"description",
					"title":"Vulnerability Description"
				}
			],
			"product_status":{
				"fixed":[
					"openEuler-22.03-LTS-SP3:perf-debuginfo-5.10.0-207.0.0.116.oe2203sp3.aarch64",
					"openEuler-22.03-LTS-SP3:kernel-debuginfo-5.10.0-207.0.0.116.oe2203sp3.aarch64",
					"openEuler-22.03-LTS-SP3:python3-perf-debuginfo-5.10.0-207.0.0.116.oe2203sp3.aarch64",
					"openEuler-22.03-LTS-SP3:kernel-tools-debuginfo-5.10.0-207.0.0.116.oe2203sp3.aarch64",
					"openEuler-22.03-LTS-SP3:kernel-tools-5.10.0-207.0.0.116.oe2203sp3.aarch64",
					"openEuler-22.03-LTS-SP3:kernel-5.10.0-207.0.0.116.oe2203sp3.aarch64",
					"openEuler-22.03-LTS-SP3:kernel-headers-5.10.0-207.0.0.116.oe2203sp3.aarch64",
					"openEuler-22.03-LTS-SP3:kernel-devel-5.10.0-207.0.0.116.oe2203sp3.aarch64",
					"openEuler-22.03-LTS-SP3:python3-perf-5.10.0-207.0.0.116.oe2203sp3.aarch64",
					"openEuler-22.03-LTS-SP3:perf-5.10.0-207.0.0.116.oe2203sp3.aarch64",
					"openEuler-22.03-LTS-SP3:kernel-tools-devel-5.10.0-207.0.0.116.oe2203sp3.aarch64",
					"openEuler-22.03-LTS-SP3:kernel-debugsource-5.10.0-207.0.0.116.oe2203sp3.aarch64",
					"openEuler-22.03-LTS-SP3:kernel-source-5.10.0-207.0.0.116.oe2203sp3.aarch64",
					"openEuler-22.03-LTS-SP3:kernel-5.10.0-207.0.0.116.oe2203sp3.src",
					"openEuler-22.03-LTS-SP3:kernel-debuginfo-5.10.0-207.0.0.116.oe2203sp3.x86_64",
					"openEuler-22.03-LTS-SP3:kernel-tools-5.10.0-207.0.0.116.oe2203sp3.x86_64",
					"openEuler-22.03-LTS-SP3:python3-perf-5.10.0-207.0.0.116.oe2203sp3.x86_64",
					"openEuler-22.03-LTS-SP3:kernel-source-5.10.0-207.0.0.116.oe2203sp3.x86_64",
					"openEuler-22.03-LTS-SP3:kernel-headers-5.10.0-207.0.0.116.oe2203sp3.x86_64",
					"openEuler-22.03-LTS-SP3:perf-5.10.0-207.0.0.116.oe2203sp3.x86_64",
					"openEuler-22.03-LTS-SP3:kernel-devel-5.10.0-207.0.0.116.oe2203sp3.x86_64",
					"openEuler-22.03-LTS-SP3:kernel-tools-devel-5.10.0-207.0.0.116.oe2203sp3.x86_64",
					"openEuler-22.03-LTS-SP3:kernel-debugsource-5.10.0-207.0.0.116.oe2203sp3.x86_64",
					"openEuler-22.03-LTS-SP3:kernel-tools-debuginfo-5.10.0-207.0.0.116.oe2203sp3.x86_64",
					"openEuler-22.03-LTS-SP3:kernel-5.10.0-207.0.0.116.oe2203sp3.x86_64",
					"openEuler-22.03-LTS-SP3:python3-perf-debuginfo-5.10.0-207.0.0.116.oe2203sp3.x86_64",
					"openEuler-22.03-LTS-SP3:perf-debuginfo-5.10.0-207.0.0.116.oe2203sp3.x86_64"
				]
			},
			"remediations":[
				{
					"product_ids":[
						"openEuler-22.03-LTS-SP3:perf-debuginfo-5.10.0-207.0.0.116.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:kernel-debuginfo-5.10.0-207.0.0.116.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:python3-perf-debuginfo-5.10.0-207.0.0.116.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:kernel-tools-debuginfo-5.10.0-207.0.0.116.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:kernel-tools-5.10.0-207.0.0.116.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:kernel-5.10.0-207.0.0.116.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:kernel-headers-5.10.0-207.0.0.116.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:kernel-devel-5.10.0-207.0.0.116.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:python3-perf-5.10.0-207.0.0.116.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:perf-5.10.0-207.0.0.116.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:kernel-tools-devel-5.10.0-207.0.0.116.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:kernel-debugsource-5.10.0-207.0.0.116.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:kernel-source-5.10.0-207.0.0.116.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:kernel-5.10.0-207.0.0.116.oe2203sp3.src",
						"openEuler-22.03-LTS-SP3:kernel-debuginfo-5.10.0-207.0.0.116.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:kernel-tools-5.10.0-207.0.0.116.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:python3-perf-5.10.0-207.0.0.116.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:kernel-source-5.10.0-207.0.0.116.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:kernel-headers-5.10.0-207.0.0.116.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:perf-5.10.0-207.0.0.116.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:kernel-devel-5.10.0-207.0.0.116.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:kernel-tools-devel-5.10.0-207.0.0.116.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:kernel-debugsource-5.10.0-207.0.0.116.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:kernel-tools-debuginfo-5.10.0-207.0.0.116.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:kernel-5.10.0-207.0.0.116.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:python3-perf-debuginfo-5.10.0-207.0.0.116.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:perf-debuginfo-5.10.0-207.0.0.116.oe2203sp3.x86_64"
					],
					"details":"kernel security update",
					"category":"vendor_fix",
					"url":"https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2024-1707"
				}
			],
			"scores":[
				{
					"cvss_v3":{
						"baseSeverity":"LOW",
						"baseScore":3.3,
						"vectorString":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N",
						"version":"3.1"
					},
					"products":[
						"openEuler-22.03-LTS-SP3:perf-debuginfo-5.10.0-207.0.0.116.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:kernel-debuginfo-5.10.0-207.0.0.116.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:python3-perf-debuginfo-5.10.0-207.0.0.116.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:kernel-tools-debuginfo-5.10.0-207.0.0.116.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:kernel-tools-5.10.0-207.0.0.116.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:kernel-5.10.0-207.0.0.116.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:kernel-headers-5.10.0-207.0.0.116.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:kernel-devel-5.10.0-207.0.0.116.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:python3-perf-5.10.0-207.0.0.116.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:perf-5.10.0-207.0.0.116.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:kernel-tools-devel-5.10.0-207.0.0.116.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:kernel-debugsource-5.10.0-207.0.0.116.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:kernel-source-5.10.0-207.0.0.116.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:kernel-5.10.0-207.0.0.116.oe2203sp3.src",
						"openEuler-22.03-LTS-SP3:kernel-debuginfo-5.10.0-207.0.0.116.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:kernel-tools-5.10.0-207.0.0.116.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:python3-perf-5.10.0-207.0.0.116.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:kernel-source-5.10.0-207.0.0.116.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:kernel-headers-5.10.0-207.0.0.116.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:perf-5.10.0-207.0.0.116.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:kernel-devel-5.10.0-207.0.0.116.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:kernel-tools-devel-5.10.0-207.0.0.116.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:kernel-debugsource-5.10.0-207.0.0.116.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:kernel-tools-debuginfo-5.10.0-207.0.0.116.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:kernel-5.10.0-207.0.0.116.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:python3-perf-debuginfo-5.10.0-207.0.0.116.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:perf-debuginfo-5.10.0-207.0.0.116.oe2203sp3.x86_64"
					]
				}
			],
			"threats":[
				{
					"details":"Low",
					"category":"impact"
				}
			],
			"title":"CVE-2024-26835"
		},
		{
			"cve":"CVE-2024-26889",
			"notes":[
				{
					"text":"In the Linux kernel, the following vulnerability has been resolved:\n\nBluetooth: hci_core: Fix possible buffer overflow\n\nstruct hci_dev_info has a fixed size name[8] field so in the event that\nhdev->name is bigger than that strcpy would attempt to write past its\nsize, so this fixes this problem by switching to use strscpy.",
					"category":"description",
					"title":"Vulnerability Description"
				}
			],
			"product_status":{
				"fixed":[
					"openEuler-22.03-LTS-SP3:perf-debuginfo-5.10.0-207.0.0.116.oe2203sp3.aarch64",
					"openEuler-22.03-LTS-SP3:kernel-debuginfo-5.10.0-207.0.0.116.oe2203sp3.aarch64",
					"openEuler-22.03-LTS-SP3:python3-perf-debuginfo-5.10.0-207.0.0.116.oe2203sp3.aarch64",
					"openEuler-22.03-LTS-SP3:kernel-tools-debuginfo-5.10.0-207.0.0.116.oe2203sp3.aarch64",
					"openEuler-22.03-LTS-SP3:kernel-tools-5.10.0-207.0.0.116.oe2203sp3.aarch64",
					"openEuler-22.03-LTS-SP3:kernel-5.10.0-207.0.0.116.oe2203sp3.aarch64",
					"openEuler-22.03-LTS-SP3:kernel-headers-5.10.0-207.0.0.116.oe2203sp3.aarch64",
					"openEuler-22.03-LTS-SP3:kernel-devel-5.10.0-207.0.0.116.oe2203sp3.aarch64",
					"openEuler-22.03-LTS-SP3:python3-perf-5.10.0-207.0.0.116.oe2203sp3.aarch64",
					"openEuler-22.03-LTS-SP3:perf-5.10.0-207.0.0.116.oe2203sp3.aarch64",
					"openEuler-22.03-LTS-SP3:kernel-tools-devel-5.10.0-207.0.0.116.oe2203sp3.aarch64",
					"openEuler-22.03-LTS-SP3:kernel-debugsource-5.10.0-207.0.0.116.oe2203sp3.aarch64",
					"openEuler-22.03-LTS-SP3:kernel-source-5.10.0-207.0.0.116.oe2203sp3.aarch64",
					"openEuler-22.03-LTS-SP3:kernel-5.10.0-207.0.0.116.oe2203sp3.src",
					"openEuler-22.03-LTS-SP3:kernel-debuginfo-5.10.0-207.0.0.116.oe2203sp3.x86_64",
					"openEuler-22.03-LTS-SP3:kernel-tools-5.10.0-207.0.0.116.oe2203sp3.x86_64",
					"openEuler-22.03-LTS-SP3:python3-perf-5.10.0-207.0.0.116.oe2203sp3.x86_64",
					"openEuler-22.03-LTS-SP3:kernel-source-5.10.0-207.0.0.116.oe2203sp3.x86_64",
					"openEuler-22.03-LTS-SP3:kernel-headers-5.10.0-207.0.0.116.oe2203sp3.x86_64",
					"openEuler-22.03-LTS-SP3:perf-5.10.0-207.0.0.116.oe2203sp3.x86_64",
					"openEuler-22.03-LTS-SP3:kernel-devel-5.10.0-207.0.0.116.oe2203sp3.x86_64",
					"openEuler-22.03-LTS-SP3:kernel-tools-devel-5.10.0-207.0.0.116.oe2203sp3.x86_64",
					"openEuler-22.03-LTS-SP3:kernel-debugsource-5.10.0-207.0.0.116.oe2203sp3.x86_64",
					"openEuler-22.03-LTS-SP3:kernel-tools-debuginfo-5.10.0-207.0.0.116.oe2203sp3.x86_64",
					"openEuler-22.03-LTS-SP3:kernel-5.10.0-207.0.0.116.oe2203sp3.x86_64",
					"openEuler-22.03-LTS-SP3:python3-perf-debuginfo-5.10.0-207.0.0.116.oe2203sp3.x86_64",
					"openEuler-22.03-LTS-SP3:perf-debuginfo-5.10.0-207.0.0.116.oe2203sp3.x86_64"
				]
			},
			"remediations":[
				{
					"product_ids":[
						"openEuler-22.03-LTS-SP3:perf-debuginfo-5.10.0-207.0.0.116.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:kernel-debuginfo-5.10.0-207.0.0.116.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:python3-perf-debuginfo-5.10.0-207.0.0.116.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:kernel-tools-debuginfo-5.10.0-207.0.0.116.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:kernel-tools-5.10.0-207.0.0.116.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:kernel-5.10.0-207.0.0.116.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:kernel-headers-5.10.0-207.0.0.116.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:kernel-devel-5.10.0-207.0.0.116.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:python3-perf-5.10.0-207.0.0.116.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:perf-5.10.0-207.0.0.116.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:kernel-tools-devel-5.10.0-207.0.0.116.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:kernel-debugsource-5.10.0-207.0.0.116.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:kernel-source-5.10.0-207.0.0.116.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:kernel-5.10.0-207.0.0.116.oe2203sp3.src",
						"openEuler-22.03-LTS-SP3:kernel-debuginfo-5.10.0-207.0.0.116.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:kernel-tools-5.10.0-207.0.0.116.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:python3-perf-5.10.0-207.0.0.116.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:kernel-source-5.10.0-207.0.0.116.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:kernel-headers-5.10.0-207.0.0.116.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:perf-5.10.0-207.0.0.116.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:kernel-devel-5.10.0-207.0.0.116.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:kernel-tools-devel-5.10.0-207.0.0.116.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:kernel-debugsource-5.10.0-207.0.0.116.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:kernel-tools-debuginfo-5.10.0-207.0.0.116.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:kernel-5.10.0-207.0.0.116.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:python3-perf-debuginfo-5.10.0-207.0.0.116.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:perf-debuginfo-5.10.0-207.0.0.116.oe2203sp3.x86_64"
					],
					"details":"kernel security update",
					"category":"vendor_fix",
					"url":"https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2024-1707"
				}
			],
			"scores":[
				{
					"cvss_v3":{
						"baseSeverity":"MEDIUM",
						"baseScore":5.5,
						"vectorString":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
						"version":"3.1"
					},
					"products":[
						"openEuler-22.03-LTS-SP3:perf-debuginfo-5.10.0-207.0.0.116.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:kernel-debuginfo-5.10.0-207.0.0.116.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:python3-perf-debuginfo-5.10.0-207.0.0.116.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:kernel-tools-debuginfo-5.10.0-207.0.0.116.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:kernel-tools-5.10.0-207.0.0.116.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:kernel-5.10.0-207.0.0.116.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:kernel-headers-5.10.0-207.0.0.116.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:kernel-devel-5.10.0-207.0.0.116.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:python3-perf-5.10.0-207.0.0.116.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:perf-5.10.0-207.0.0.116.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:kernel-tools-devel-5.10.0-207.0.0.116.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:kernel-debugsource-5.10.0-207.0.0.116.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:kernel-source-5.10.0-207.0.0.116.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:kernel-5.10.0-207.0.0.116.oe2203sp3.src",
						"openEuler-22.03-LTS-SP3:kernel-debuginfo-5.10.0-207.0.0.116.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:kernel-tools-5.10.0-207.0.0.116.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:python3-perf-5.10.0-207.0.0.116.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:kernel-source-5.10.0-207.0.0.116.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:kernel-headers-5.10.0-207.0.0.116.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:perf-5.10.0-207.0.0.116.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:kernel-devel-5.10.0-207.0.0.116.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:kernel-tools-devel-5.10.0-207.0.0.116.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:kernel-debugsource-5.10.0-207.0.0.116.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:kernel-tools-debuginfo-5.10.0-207.0.0.116.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:kernel-5.10.0-207.0.0.116.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:python3-perf-debuginfo-5.10.0-207.0.0.116.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:perf-debuginfo-5.10.0-207.0.0.116.oe2203sp3.x86_64"
					]
				}
			],
			"threats":[
				{
					"details":"Medium",
					"category":"impact"
				}
			],
			"title":"CVE-2024-26889"
		},
		{
			"cve":"CVE-2024-27393",
			"notes":[
				{
					"text":"In the Linux kernel, the following vulnerability has been resolved:\n\nxen-netfront: Add missing skb_mark_for_recycle\n\nNotice that skb_mark_for_recycle() is introduced later than fixes tag in\ncommit 6a5bcd84e886 (\"page_pool: Allow drivers to hint on SKB recycling\").\n\nIt is believed that fixes tag were missing a call to page_pool_release_page()\nbetween v5.9 to v5.14, after which is should have used skb_mark_for_recycle().\nSince v6.6 the call page_pool_release_page() were removed (in\ncommit 535b9c61bdef (\"net: page_pool: hide page_pool_release_page()\")\nand remaining callers converted (in commit 6bfef2ec0172 (\"Merge branch\n'net-page_pool-remove-page_pool_release_page'\")).\n\nThis leak became visible in v6.8 via commit dba1b8a7ab68 (\"mm/page_pool: catch\npage_pool memory leaks\").",
					"category":"description",
					"title":"Vulnerability Description"
				}
			],
			"product_status":{
				"fixed":[
					"openEuler-22.03-LTS-SP3:perf-debuginfo-5.10.0-207.0.0.116.oe2203sp3.aarch64",
					"openEuler-22.03-LTS-SP3:kernel-debuginfo-5.10.0-207.0.0.116.oe2203sp3.aarch64",
					"openEuler-22.03-LTS-SP3:python3-perf-debuginfo-5.10.0-207.0.0.116.oe2203sp3.aarch64",
					"openEuler-22.03-LTS-SP3:kernel-tools-debuginfo-5.10.0-207.0.0.116.oe2203sp3.aarch64",
					"openEuler-22.03-LTS-SP3:kernel-tools-5.10.0-207.0.0.116.oe2203sp3.aarch64",
					"openEuler-22.03-LTS-SP3:kernel-5.10.0-207.0.0.116.oe2203sp3.aarch64",
					"openEuler-22.03-LTS-SP3:kernel-headers-5.10.0-207.0.0.116.oe2203sp3.aarch64",
					"openEuler-22.03-LTS-SP3:kernel-devel-5.10.0-207.0.0.116.oe2203sp3.aarch64",
					"openEuler-22.03-LTS-SP3:python3-perf-5.10.0-207.0.0.116.oe2203sp3.aarch64",
					"openEuler-22.03-LTS-SP3:perf-5.10.0-207.0.0.116.oe2203sp3.aarch64",
					"openEuler-22.03-LTS-SP3:kernel-tools-devel-5.10.0-207.0.0.116.oe2203sp3.aarch64",
					"openEuler-22.03-LTS-SP3:kernel-debugsource-5.10.0-207.0.0.116.oe2203sp3.aarch64",
					"openEuler-22.03-LTS-SP3:kernel-source-5.10.0-207.0.0.116.oe2203sp3.aarch64",
					"openEuler-22.03-LTS-SP3:kernel-5.10.0-207.0.0.116.oe2203sp3.src",
					"openEuler-22.03-LTS-SP3:kernel-debuginfo-5.10.0-207.0.0.116.oe2203sp3.x86_64",
					"openEuler-22.03-LTS-SP3:kernel-tools-5.10.0-207.0.0.116.oe2203sp3.x86_64",
					"openEuler-22.03-LTS-SP3:python3-perf-5.10.0-207.0.0.116.oe2203sp3.x86_64",
					"openEuler-22.03-LTS-SP3:kernel-source-5.10.0-207.0.0.116.oe2203sp3.x86_64",
					"openEuler-22.03-LTS-SP3:kernel-headers-5.10.0-207.0.0.116.oe2203sp3.x86_64",
					"openEuler-22.03-LTS-SP3:perf-5.10.0-207.0.0.116.oe2203sp3.x86_64",
					"openEuler-22.03-LTS-SP3:kernel-devel-5.10.0-207.0.0.116.oe2203sp3.x86_64",
					"openEuler-22.03-LTS-SP3:kernel-tools-devel-5.10.0-207.0.0.116.oe2203sp3.x86_64",
					"openEuler-22.03-LTS-SP3:kernel-debugsource-5.10.0-207.0.0.116.oe2203sp3.x86_64",
					"openEuler-22.03-LTS-SP3:kernel-tools-debuginfo-5.10.0-207.0.0.116.oe2203sp3.x86_64",
					"openEuler-22.03-LTS-SP3:kernel-5.10.0-207.0.0.116.oe2203sp3.x86_64",
					"openEuler-22.03-LTS-SP3:python3-perf-debuginfo-5.10.0-207.0.0.116.oe2203sp3.x86_64",
					"openEuler-22.03-LTS-SP3:perf-debuginfo-5.10.0-207.0.0.116.oe2203sp3.x86_64"
				]
			},
			"remediations":[
				{
					"product_ids":[
						"openEuler-22.03-LTS-SP3:perf-debuginfo-5.10.0-207.0.0.116.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:kernel-debuginfo-5.10.0-207.0.0.116.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:python3-perf-debuginfo-5.10.0-207.0.0.116.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:kernel-tools-debuginfo-5.10.0-207.0.0.116.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:kernel-tools-5.10.0-207.0.0.116.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:kernel-5.10.0-207.0.0.116.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:kernel-headers-5.10.0-207.0.0.116.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:kernel-devel-5.10.0-207.0.0.116.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:python3-perf-5.10.0-207.0.0.116.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:perf-5.10.0-207.0.0.116.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:kernel-tools-devel-5.10.0-207.0.0.116.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:kernel-debugsource-5.10.0-207.0.0.116.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:kernel-source-5.10.0-207.0.0.116.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:kernel-5.10.0-207.0.0.116.oe2203sp3.src",
						"openEuler-22.03-LTS-SP3:kernel-debuginfo-5.10.0-207.0.0.116.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:kernel-tools-5.10.0-207.0.0.116.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:python3-perf-5.10.0-207.0.0.116.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:kernel-source-5.10.0-207.0.0.116.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:kernel-headers-5.10.0-207.0.0.116.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:perf-5.10.0-207.0.0.116.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:kernel-devel-5.10.0-207.0.0.116.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:kernel-tools-devel-5.10.0-207.0.0.116.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:kernel-debugsource-5.10.0-207.0.0.116.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:kernel-tools-debuginfo-5.10.0-207.0.0.116.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:kernel-5.10.0-207.0.0.116.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:python3-perf-debuginfo-5.10.0-207.0.0.116.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:perf-debuginfo-5.10.0-207.0.0.116.oe2203sp3.x86_64"
					],
					"details":"kernel security update",
					"category":"vendor_fix",
					"url":"https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2024-1707"
				}
			],
			"scores":[
				{
					"cvss_v3":{
						"baseSeverity":"MEDIUM",
						"baseScore":5.5,
						"vectorString":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
						"version":"3.1"
					},
					"products":[
						"openEuler-22.03-LTS-SP3:perf-debuginfo-5.10.0-207.0.0.116.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:kernel-debuginfo-5.10.0-207.0.0.116.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:python3-perf-debuginfo-5.10.0-207.0.0.116.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:kernel-tools-debuginfo-5.10.0-207.0.0.116.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:kernel-tools-5.10.0-207.0.0.116.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:kernel-5.10.0-207.0.0.116.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:kernel-headers-5.10.0-207.0.0.116.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:kernel-devel-5.10.0-207.0.0.116.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:python3-perf-5.10.0-207.0.0.116.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:perf-5.10.0-207.0.0.116.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:kernel-tools-devel-5.10.0-207.0.0.116.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:kernel-debugsource-5.10.0-207.0.0.116.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:kernel-source-5.10.0-207.0.0.116.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:kernel-5.10.0-207.0.0.116.oe2203sp3.src",
						"openEuler-22.03-LTS-SP3:kernel-debuginfo-5.10.0-207.0.0.116.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:kernel-tools-5.10.0-207.0.0.116.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:python3-perf-5.10.0-207.0.0.116.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:kernel-source-5.10.0-207.0.0.116.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:kernel-headers-5.10.0-207.0.0.116.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:perf-5.10.0-207.0.0.116.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:kernel-devel-5.10.0-207.0.0.116.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:kernel-tools-devel-5.10.0-207.0.0.116.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:kernel-debugsource-5.10.0-207.0.0.116.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:kernel-tools-debuginfo-5.10.0-207.0.0.116.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:kernel-5.10.0-207.0.0.116.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:python3-perf-debuginfo-5.10.0-207.0.0.116.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:perf-debuginfo-5.10.0-207.0.0.116.oe2203sp3.x86_64"
					]
				}
			],
			"threats":[
				{
					"details":"Medium",
					"category":"impact"
				}
			],
			"title":"CVE-2024-27393"
		},
		{
			"cve":"CVE-2024-27402",
			"notes":[
				{
					"text":"In the Linux kernel, the following vulnerability has been resolved:\n\nphonet/pep: fix racy skb_queue_empty() use\n\nThe receive queues are protected by their respective spin-lock, not\nthe socket lock. This could lead to skb_peek() unexpectedly\nreturning NULL or a pointer to an already dequeued socket buffer.",
					"category":"description",
					"title":"Vulnerability Description"
				}
			],
			"product_status":{
				"fixed":[
					"openEuler-22.03-LTS-SP3:perf-debuginfo-5.10.0-207.0.0.116.oe2203sp3.aarch64",
					"openEuler-22.03-LTS-SP3:kernel-debuginfo-5.10.0-207.0.0.116.oe2203sp3.aarch64",
					"openEuler-22.03-LTS-SP3:python3-perf-debuginfo-5.10.0-207.0.0.116.oe2203sp3.aarch64",
					"openEuler-22.03-LTS-SP3:kernel-tools-debuginfo-5.10.0-207.0.0.116.oe2203sp3.aarch64",
					"openEuler-22.03-LTS-SP3:kernel-tools-5.10.0-207.0.0.116.oe2203sp3.aarch64",
					"openEuler-22.03-LTS-SP3:kernel-5.10.0-207.0.0.116.oe2203sp3.aarch64",
					"openEuler-22.03-LTS-SP3:kernel-headers-5.10.0-207.0.0.116.oe2203sp3.aarch64",
					"openEuler-22.03-LTS-SP3:kernel-devel-5.10.0-207.0.0.116.oe2203sp3.aarch64",
					"openEuler-22.03-LTS-SP3:python3-perf-5.10.0-207.0.0.116.oe2203sp3.aarch64",
					"openEuler-22.03-LTS-SP3:perf-5.10.0-207.0.0.116.oe2203sp3.aarch64",
					"openEuler-22.03-LTS-SP3:kernel-tools-devel-5.10.0-207.0.0.116.oe2203sp3.aarch64",
					"openEuler-22.03-LTS-SP3:kernel-debugsource-5.10.0-207.0.0.116.oe2203sp3.aarch64",
					"openEuler-22.03-LTS-SP3:kernel-source-5.10.0-207.0.0.116.oe2203sp3.aarch64",
					"openEuler-22.03-LTS-SP3:kernel-5.10.0-207.0.0.116.oe2203sp3.src",
					"openEuler-22.03-LTS-SP3:kernel-debuginfo-5.10.0-207.0.0.116.oe2203sp3.x86_64",
					"openEuler-22.03-LTS-SP3:kernel-tools-5.10.0-207.0.0.116.oe2203sp3.x86_64",
					"openEuler-22.03-LTS-SP3:python3-perf-5.10.0-207.0.0.116.oe2203sp3.x86_64",
					"openEuler-22.03-LTS-SP3:kernel-source-5.10.0-207.0.0.116.oe2203sp3.x86_64",
					"openEuler-22.03-LTS-SP3:kernel-headers-5.10.0-207.0.0.116.oe2203sp3.x86_64",
					"openEuler-22.03-LTS-SP3:perf-5.10.0-207.0.0.116.oe2203sp3.x86_64",
					"openEuler-22.03-LTS-SP3:kernel-devel-5.10.0-207.0.0.116.oe2203sp3.x86_64",
					"openEuler-22.03-LTS-SP3:kernel-tools-devel-5.10.0-207.0.0.116.oe2203sp3.x86_64",
					"openEuler-22.03-LTS-SP3:kernel-debugsource-5.10.0-207.0.0.116.oe2203sp3.x86_64",
					"openEuler-22.03-LTS-SP3:kernel-tools-debuginfo-5.10.0-207.0.0.116.oe2203sp3.x86_64",
					"openEuler-22.03-LTS-SP3:kernel-5.10.0-207.0.0.116.oe2203sp3.x86_64",
					"openEuler-22.03-LTS-SP3:python3-perf-debuginfo-5.10.0-207.0.0.116.oe2203sp3.x86_64",
					"openEuler-22.03-LTS-SP3:perf-debuginfo-5.10.0-207.0.0.116.oe2203sp3.x86_64"
				]
			},
			"remediations":[
				{
					"product_ids":[
						"openEuler-22.03-LTS-SP3:perf-debuginfo-5.10.0-207.0.0.116.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:kernel-debuginfo-5.10.0-207.0.0.116.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:python3-perf-debuginfo-5.10.0-207.0.0.116.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:kernel-tools-debuginfo-5.10.0-207.0.0.116.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:kernel-tools-5.10.0-207.0.0.116.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:kernel-5.10.0-207.0.0.116.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:kernel-headers-5.10.0-207.0.0.116.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:kernel-devel-5.10.0-207.0.0.116.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:python3-perf-5.10.0-207.0.0.116.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:perf-5.10.0-207.0.0.116.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:kernel-tools-devel-5.10.0-207.0.0.116.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:kernel-debugsource-5.10.0-207.0.0.116.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:kernel-source-5.10.0-207.0.0.116.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:kernel-5.10.0-207.0.0.116.oe2203sp3.src",
						"openEuler-22.03-LTS-SP3:kernel-debuginfo-5.10.0-207.0.0.116.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:kernel-tools-5.10.0-207.0.0.116.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:python3-perf-5.10.0-207.0.0.116.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:kernel-source-5.10.0-207.0.0.116.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:kernel-headers-5.10.0-207.0.0.116.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:perf-5.10.0-207.0.0.116.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:kernel-devel-5.10.0-207.0.0.116.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:kernel-tools-devel-5.10.0-207.0.0.116.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:kernel-debugsource-5.10.0-207.0.0.116.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:kernel-tools-debuginfo-5.10.0-207.0.0.116.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:kernel-5.10.0-207.0.0.116.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:python3-perf-debuginfo-5.10.0-207.0.0.116.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:perf-debuginfo-5.10.0-207.0.0.116.oe2203sp3.x86_64"
					],
					"details":"kernel security update",
					"category":"vendor_fix",
					"url":"https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2024-1707"
				}
			],
			"scores":[
				{
					"cvss_v3":{
						"baseSeverity":"MEDIUM",
						"baseScore":5.5,
						"vectorString":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
						"version":"3.1"
					},
					"products":[
						"openEuler-22.03-LTS-SP3:perf-debuginfo-5.10.0-207.0.0.116.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:kernel-debuginfo-5.10.0-207.0.0.116.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:python3-perf-debuginfo-5.10.0-207.0.0.116.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:kernel-tools-debuginfo-5.10.0-207.0.0.116.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:kernel-tools-5.10.0-207.0.0.116.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:kernel-5.10.0-207.0.0.116.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:kernel-headers-5.10.0-207.0.0.116.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:kernel-devel-5.10.0-207.0.0.116.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:python3-perf-5.10.0-207.0.0.116.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:perf-5.10.0-207.0.0.116.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:kernel-tools-devel-5.10.0-207.0.0.116.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:kernel-debugsource-5.10.0-207.0.0.116.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:kernel-source-5.10.0-207.0.0.116.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:kernel-5.10.0-207.0.0.116.oe2203sp3.src",
						"openEuler-22.03-LTS-SP3:kernel-debuginfo-5.10.0-207.0.0.116.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:kernel-tools-5.10.0-207.0.0.116.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:python3-perf-5.10.0-207.0.0.116.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:kernel-source-5.10.0-207.0.0.116.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:kernel-headers-5.10.0-207.0.0.116.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:perf-5.10.0-207.0.0.116.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:kernel-devel-5.10.0-207.0.0.116.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:kernel-tools-devel-5.10.0-207.0.0.116.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:kernel-debugsource-5.10.0-207.0.0.116.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:kernel-tools-debuginfo-5.10.0-207.0.0.116.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:kernel-5.10.0-207.0.0.116.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:python3-perf-debuginfo-5.10.0-207.0.0.116.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:perf-debuginfo-5.10.0-207.0.0.116.oe2203sp3.x86_64"
					]
				}
			],
			"threats":[
				{
					"details":"Medium",
					"category":"impact"
				}
			],
			"title":"CVE-2024-27402"
		},
		{
			"cve":"CVE-2024-27408",
			"notes":[
				{
					"text":"In the Linux kernel, the following vulnerability has been resolved:\n\ndmaengine: dw-edma: eDMA: Add sync read before starting the DMA transfer in remote setup\n\nThe Linked list element and pointer are not stored in the same memory as\nthe eDMA controller register. If the doorbell register is toggled before\nthe full write of the linked list a race condition error will occur.\nIn remote setup we can only use a readl to the memory to assure the full\nwrite has occurred.",
					"category":"description",
					"title":"Vulnerability Description"
				}
			],
			"product_status":{
				"fixed":[
					"openEuler-22.03-LTS-SP3:perf-debuginfo-5.10.0-207.0.0.116.oe2203sp3.aarch64",
					"openEuler-22.03-LTS-SP3:kernel-debuginfo-5.10.0-207.0.0.116.oe2203sp3.aarch64",
					"openEuler-22.03-LTS-SP3:python3-perf-debuginfo-5.10.0-207.0.0.116.oe2203sp3.aarch64",
					"openEuler-22.03-LTS-SP3:kernel-tools-debuginfo-5.10.0-207.0.0.116.oe2203sp3.aarch64",
					"openEuler-22.03-LTS-SP3:kernel-tools-5.10.0-207.0.0.116.oe2203sp3.aarch64",
					"openEuler-22.03-LTS-SP3:kernel-5.10.0-207.0.0.116.oe2203sp3.aarch64",
					"openEuler-22.03-LTS-SP3:kernel-headers-5.10.0-207.0.0.116.oe2203sp3.aarch64",
					"openEuler-22.03-LTS-SP3:kernel-devel-5.10.0-207.0.0.116.oe2203sp3.aarch64",
					"openEuler-22.03-LTS-SP3:python3-perf-5.10.0-207.0.0.116.oe2203sp3.aarch64",
					"openEuler-22.03-LTS-SP3:perf-5.10.0-207.0.0.116.oe2203sp3.aarch64",
					"openEuler-22.03-LTS-SP3:kernel-tools-devel-5.10.0-207.0.0.116.oe2203sp3.aarch64",
					"openEuler-22.03-LTS-SP3:kernel-debugsource-5.10.0-207.0.0.116.oe2203sp3.aarch64",
					"openEuler-22.03-LTS-SP3:kernel-source-5.10.0-207.0.0.116.oe2203sp3.aarch64",
					"openEuler-22.03-LTS-SP3:kernel-5.10.0-207.0.0.116.oe2203sp3.src",
					"openEuler-22.03-LTS-SP3:kernel-debuginfo-5.10.0-207.0.0.116.oe2203sp3.x86_64",
					"openEuler-22.03-LTS-SP3:kernel-tools-5.10.0-207.0.0.116.oe2203sp3.x86_64",
					"openEuler-22.03-LTS-SP3:python3-perf-5.10.0-207.0.0.116.oe2203sp3.x86_64",
					"openEuler-22.03-LTS-SP3:kernel-source-5.10.0-207.0.0.116.oe2203sp3.x86_64",
					"openEuler-22.03-LTS-SP3:kernel-headers-5.10.0-207.0.0.116.oe2203sp3.x86_64",
					"openEuler-22.03-LTS-SP3:perf-5.10.0-207.0.0.116.oe2203sp3.x86_64",
					"openEuler-22.03-LTS-SP3:kernel-devel-5.10.0-207.0.0.116.oe2203sp3.x86_64",
					"openEuler-22.03-LTS-SP3:kernel-tools-devel-5.10.0-207.0.0.116.oe2203sp3.x86_64",
					"openEuler-22.03-LTS-SP3:kernel-debugsource-5.10.0-207.0.0.116.oe2203sp3.x86_64",
					"openEuler-22.03-LTS-SP3:kernel-tools-debuginfo-5.10.0-207.0.0.116.oe2203sp3.x86_64",
					"openEuler-22.03-LTS-SP3:kernel-5.10.0-207.0.0.116.oe2203sp3.x86_64",
					"openEuler-22.03-LTS-SP3:python3-perf-debuginfo-5.10.0-207.0.0.116.oe2203sp3.x86_64",
					"openEuler-22.03-LTS-SP3:perf-debuginfo-5.10.0-207.0.0.116.oe2203sp3.x86_64"
				]
			},
			"remediations":[
				{
					"product_ids":[
						"openEuler-22.03-LTS-SP3:perf-debuginfo-5.10.0-207.0.0.116.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:kernel-debuginfo-5.10.0-207.0.0.116.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:python3-perf-debuginfo-5.10.0-207.0.0.116.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:kernel-tools-debuginfo-5.10.0-207.0.0.116.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:kernel-tools-5.10.0-207.0.0.116.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:kernel-5.10.0-207.0.0.116.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:kernel-headers-5.10.0-207.0.0.116.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:kernel-devel-5.10.0-207.0.0.116.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:python3-perf-5.10.0-207.0.0.116.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:perf-5.10.0-207.0.0.116.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:kernel-tools-devel-5.10.0-207.0.0.116.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:kernel-debugsource-5.10.0-207.0.0.116.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:kernel-source-5.10.0-207.0.0.116.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:kernel-5.10.0-207.0.0.116.oe2203sp3.src",
						"openEuler-22.03-LTS-SP3:kernel-debuginfo-5.10.0-207.0.0.116.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:kernel-tools-5.10.0-207.0.0.116.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:python3-perf-5.10.0-207.0.0.116.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:kernel-source-5.10.0-207.0.0.116.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:kernel-headers-5.10.0-207.0.0.116.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:perf-5.10.0-207.0.0.116.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:kernel-devel-5.10.0-207.0.0.116.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:kernel-tools-devel-5.10.0-207.0.0.116.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:kernel-debugsource-5.10.0-207.0.0.116.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:kernel-tools-debuginfo-5.10.0-207.0.0.116.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:kernel-5.10.0-207.0.0.116.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:python3-perf-debuginfo-5.10.0-207.0.0.116.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:perf-debuginfo-5.10.0-207.0.0.116.oe2203sp3.x86_64"
					],
					"details":"kernel security update",
					"category":"vendor_fix",
					"url":"https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2024-1707"
				}
			],
			"scores":[
				{
					"cvss_v3":{
						"baseSeverity":"LOW",
						"baseScore":2.5,
						"vectorString":"CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:N",
						"version":"3.1"
					},
					"products":[
						"openEuler-22.03-LTS-SP3:perf-debuginfo-5.10.0-207.0.0.116.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:kernel-debuginfo-5.10.0-207.0.0.116.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:python3-perf-debuginfo-5.10.0-207.0.0.116.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:kernel-tools-debuginfo-5.10.0-207.0.0.116.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:kernel-tools-5.10.0-207.0.0.116.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:kernel-5.10.0-207.0.0.116.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:kernel-headers-5.10.0-207.0.0.116.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:kernel-devel-5.10.0-207.0.0.116.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:python3-perf-5.10.0-207.0.0.116.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:perf-5.10.0-207.0.0.116.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:kernel-tools-devel-5.10.0-207.0.0.116.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:kernel-debugsource-5.10.0-207.0.0.116.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:kernel-source-5.10.0-207.0.0.116.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:kernel-5.10.0-207.0.0.116.oe2203sp3.src",
						"openEuler-22.03-LTS-SP3:kernel-debuginfo-5.10.0-207.0.0.116.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:kernel-tools-5.10.0-207.0.0.116.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:python3-perf-5.10.0-207.0.0.116.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:kernel-source-5.10.0-207.0.0.116.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:kernel-headers-5.10.0-207.0.0.116.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:perf-5.10.0-207.0.0.116.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:kernel-devel-5.10.0-207.0.0.116.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:kernel-tools-devel-5.10.0-207.0.0.116.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:kernel-debugsource-5.10.0-207.0.0.116.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:kernel-tools-debuginfo-5.10.0-207.0.0.116.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:kernel-5.10.0-207.0.0.116.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:python3-perf-debuginfo-5.10.0-207.0.0.116.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:perf-debuginfo-5.10.0-207.0.0.116.oe2203sp3.x86_64"
					]
				}
			],
			"threats":[
				{
					"details":"Low",
					"category":"impact"
				}
			],
			"title":"CVE-2024-27408"
		},
		{
			"cve":"CVE-2024-35790",
			"notes":[
				{
					"text":"In the Linux kernel, the following vulnerability has been resolved:\n\nusb: typec: altmodes/displayport: create sysfs nodes as driver's default device attribute group\n\nThe DisplayPort driver's sysfs nodes may be present to the userspace before\ntypec_altmode_set_drvdata() completes in dp_altmode_probe. This means that\na sysfs read can trigger a NULL pointer error by deferencing dp->hpd in\nhpd_show or dp->lock in pin_assignment_show, as dev_get_drvdata() returns\nNULL in those cases.\n\nRemove manual sysfs node creation in favor of adding attribute group as\ndefault for devices bound to the driver. The ATTRIBUTE_GROUPS() macro is\nnot used here otherwise the path to the sysfs nodes is no longer compliant\nwith the ABI.",
					"category":"description",
					"title":"Vulnerability Description"
				}
			],
			"product_status":{
				"fixed":[
					"openEuler-22.03-LTS-SP3:perf-debuginfo-5.10.0-207.0.0.116.oe2203sp3.aarch64",
					"openEuler-22.03-LTS-SP3:kernel-debuginfo-5.10.0-207.0.0.116.oe2203sp3.aarch64",
					"openEuler-22.03-LTS-SP3:python3-perf-debuginfo-5.10.0-207.0.0.116.oe2203sp3.aarch64",
					"openEuler-22.03-LTS-SP3:kernel-tools-debuginfo-5.10.0-207.0.0.116.oe2203sp3.aarch64",
					"openEuler-22.03-LTS-SP3:kernel-tools-5.10.0-207.0.0.116.oe2203sp3.aarch64",
					"openEuler-22.03-LTS-SP3:kernel-5.10.0-207.0.0.116.oe2203sp3.aarch64",
					"openEuler-22.03-LTS-SP3:kernel-headers-5.10.0-207.0.0.116.oe2203sp3.aarch64",
					"openEuler-22.03-LTS-SP3:kernel-devel-5.10.0-207.0.0.116.oe2203sp3.aarch64",
					"openEuler-22.03-LTS-SP3:python3-perf-5.10.0-207.0.0.116.oe2203sp3.aarch64",
					"openEuler-22.03-LTS-SP3:perf-5.10.0-207.0.0.116.oe2203sp3.aarch64",
					"openEuler-22.03-LTS-SP3:kernel-tools-devel-5.10.0-207.0.0.116.oe2203sp3.aarch64",
					"openEuler-22.03-LTS-SP3:kernel-debugsource-5.10.0-207.0.0.116.oe2203sp3.aarch64",
					"openEuler-22.03-LTS-SP3:kernel-source-5.10.0-207.0.0.116.oe2203sp3.aarch64",
					"openEuler-22.03-LTS-SP3:kernel-5.10.0-207.0.0.116.oe2203sp3.src",
					"openEuler-22.03-LTS-SP3:kernel-debuginfo-5.10.0-207.0.0.116.oe2203sp3.x86_64",
					"openEuler-22.03-LTS-SP3:kernel-tools-5.10.0-207.0.0.116.oe2203sp3.x86_64",
					"openEuler-22.03-LTS-SP3:python3-perf-5.10.0-207.0.0.116.oe2203sp3.x86_64",
					"openEuler-22.03-LTS-SP3:kernel-source-5.10.0-207.0.0.116.oe2203sp3.x86_64",
					"openEuler-22.03-LTS-SP3:kernel-headers-5.10.0-207.0.0.116.oe2203sp3.x86_64",
					"openEuler-22.03-LTS-SP3:perf-5.10.0-207.0.0.116.oe2203sp3.x86_64",
					"openEuler-22.03-LTS-SP3:kernel-devel-5.10.0-207.0.0.116.oe2203sp3.x86_64",
					"openEuler-22.03-LTS-SP3:kernel-tools-devel-5.10.0-207.0.0.116.oe2203sp3.x86_64",
					"openEuler-22.03-LTS-SP3:kernel-debugsource-5.10.0-207.0.0.116.oe2203sp3.x86_64",
					"openEuler-22.03-LTS-SP3:kernel-tools-debuginfo-5.10.0-207.0.0.116.oe2203sp3.x86_64",
					"openEuler-22.03-LTS-SP3:kernel-5.10.0-207.0.0.116.oe2203sp3.x86_64",
					"openEuler-22.03-LTS-SP3:python3-perf-debuginfo-5.10.0-207.0.0.116.oe2203sp3.x86_64",
					"openEuler-22.03-LTS-SP3:perf-debuginfo-5.10.0-207.0.0.116.oe2203sp3.x86_64"
				]
			},
			"remediations":[
				{
					"product_ids":[
						"openEuler-22.03-LTS-SP3:perf-debuginfo-5.10.0-207.0.0.116.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:kernel-debuginfo-5.10.0-207.0.0.116.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:python3-perf-debuginfo-5.10.0-207.0.0.116.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:kernel-tools-debuginfo-5.10.0-207.0.0.116.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:kernel-tools-5.10.0-207.0.0.116.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:kernel-5.10.0-207.0.0.116.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:kernel-headers-5.10.0-207.0.0.116.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:kernel-devel-5.10.0-207.0.0.116.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:python3-perf-5.10.0-207.0.0.116.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:perf-5.10.0-207.0.0.116.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:kernel-tools-devel-5.10.0-207.0.0.116.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:kernel-debugsource-5.10.0-207.0.0.116.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:kernel-source-5.10.0-207.0.0.116.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:kernel-5.10.0-207.0.0.116.oe2203sp3.src",
						"openEuler-22.03-LTS-SP3:kernel-debuginfo-5.10.0-207.0.0.116.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:kernel-tools-5.10.0-207.0.0.116.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:python3-perf-5.10.0-207.0.0.116.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:kernel-source-5.10.0-207.0.0.116.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:kernel-headers-5.10.0-207.0.0.116.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:perf-5.10.0-207.0.0.116.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:kernel-devel-5.10.0-207.0.0.116.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:kernel-tools-devel-5.10.0-207.0.0.116.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:kernel-debugsource-5.10.0-207.0.0.116.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:kernel-tools-debuginfo-5.10.0-207.0.0.116.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:kernel-5.10.0-207.0.0.116.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:python3-perf-debuginfo-5.10.0-207.0.0.116.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:perf-debuginfo-5.10.0-207.0.0.116.oe2203sp3.x86_64"
					],
					"details":"kernel security update",
					"category":"vendor_fix",
					"url":"https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2024-1707"
				}
			],
			"scores":[
				{
					"cvss_v3":{
						"baseSeverity":"MEDIUM",
						"baseScore":5.5,
						"vectorString":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
						"version":"3.1"
					},
					"products":[
						"openEuler-22.03-LTS-SP3:perf-debuginfo-5.10.0-207.0.0.116.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:kernel-debuginfo-5.10.0-207.0.0.116.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:python3-perf-debuginfo-5.10.0-207.0.0.116.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:kernel-tools-debuginfo-5.10.0-207.0.0.116.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:kernel-tools-5.10.0-207.0.0.116.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:kernel-5.10.0-207.0.0.116.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:kernel-headers-5.10.0-207.0.0.116.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:kernel-devel-5.10.0-207.0.0.116.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:python3-perf-5.10.0-207.0.0.116.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:perf-5.10.0-207.0.0.116.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:kernel-tools-devel-5.10.0-207.0.0.116.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:kernel-debugsource-5.10.0-207.0.0.116.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:kernel-source-5.10.0-207.0.0.116.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:kernel-5.10.0-207.0.0.116.oe2203sp3.src",
						"openEuler-22.03-LTS-SP3:kernel-debuginfo-5.10.0-207.0.0.116.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:kernel-tools-5.10.0-207.0.0.116.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:python3-perf-5.10.0-207.0.0.116.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:kernel-source-5.10.0-207.0.0.116.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:kernel-headers-5.10.0-207.0.0.116.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:perf-5.10.0-207.0.0.116.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:kernel-devel-5.10.0-207.0.0.116.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:kernel-tools-devel-5.10.0-207.0.0.116.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:kernel-debugsource-5.10.0-207.0.0.116.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:kernel-tools-debuginfo-5.10.0-207.0.0.116.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:kernel-5.10.0-207.0.0.116.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:python3-perf-debuginfo-5.10.0-207.0.0.116.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:perf-debuginfo-5.10.0-207.0.0.116.oe2203sp3.x86_64"
					]
				}
			],
			"threats":[
				{
					"details":"Medium",
					"category":"impact"
				}
			],
			"title":"CVE-2024-35790"
		},
		{
			"cve":"CVE-2024-35809",
			"notes":[
				{
					"text":"In the Linux kernel, the following vulnerability has been resolved:\n\nPCI/PM: Drain runtime-idle callbacks before driver removal\n\nA race condition between the .runtime_idle() callback and the .remove()\ncallback in the rtsx_pcr PCI driver leads to a kernel crash due to an\nunhandled page fault [1].\n\nThe problem is that rtsx_pci_runtime_idle() is not expected to be running\nafter pm_runtime_get_sync() has been called, but the latter doesn't really\nguarantee that.  It only guarantees that the suspend and resume callbacks\nwill not be running when it returns.\n\nHowever, if a .runtime_idle() callback is already running when\npm_runtime_get_sync() is called, the latter will notice that the runtime PM\nstatus of the device is RPM_ACTIVE and it will return right away without\nwaiting for the former to complete.  In fact, it cannot wait for\n.runtime_idle() to complete because it may be called from that callback (it\narguably does not make much sense to do that, but it is not strictly\nprohibited).\n\nThus in general, whoever is providing a .runtime_idle() callback needs\nto protect it from running in parallel with whatever code runs after\npm_runtime_get_sync().  [Note that .runtime_idle() will not start after\npm_runtime_get_sync() has returned, but it may continue running then if it\nhas started earlier.]\n\nOne way to address that race condition is to call pm_runtime_barrier()\nafter pm_runtime_get_sync() (not before it, because a nonzero value of the\nruntime PM usage counter is necessary to prevent runtime PM callbacks from\nbeing invoked) to wait for the .runtime_idle() callback to complete should\nit be running at that point.  A suitable place for doing that is in\npci_device_remove() which calls pm_runtime_get_sync() before removing the\ndriver, so it may as well call pm_runtime_barrier() subsequently, which\nwill prevent the race in question from occurring, not just in the rtsx_pcr\ndriver, but in any PCI drivers providing .runtime_idle() callbacks.",
					"category":"description",
					"title":"Vulnerability Description"
				}
			],
			"product_status":{
				"fixed":[
					"openEuler-22.03-LTS-SP3:perf-debuginfo-5.10.0-207.0.0.116.oe2203sp3.aarch64",
					"openEuler-22.03-LTS-SP3:kernel-debuginfo-5.10.0-207.0.0.116.oe2203sp3.aarch64",
					"openEuler-22.03-LTS-SP3:python3-perf-debuginfo-5.10.0-207.0.0.116.oe2203sp3.aarch64",
					"openEuler-22.03-LTS-SP3:kernel-tools-debuginfo-5.10.0-207.0.0.116.oe2203sp3.aarch64",
					"openEuler-22.03-LTS-SP3:kernel-tools-5.10.0-207.0.0.116.oe2203sp3.aarch64",
					"openEuler-22.03-LTS-SP3:kernel-5.10.0-207.0.0.116.oe2203sp3.aarch64",
					"openEuler-22.03-LTS-SP3:kernel-headers-5.10.0-207.0.0.116.oe2203sp3.aarch64",
					"openEuler-22.03-LTS-SP3:kernel-devel-5.10.0-207.0.0.116.oe2203sp3.aarch64",
					"openEuler-22.03-LTS-SP3:python3-perf-5.10.0-207.0.0.116.oe2203sp3.aarch64",
					"openEuler-22.03-LTS-SP3:perf-5.10.0-207.0.0.116.oe2203sp3.aarch64",
					"openEuler-22.03-LTS-SP3:kernel-tools-devel-5.10.0-207.0.0.116.oe2203sp3.aarch64",
					"openEuler-22.03-LTS-SP3:kernel-debugsource-5.10.0-207.0.0.116.oe2203sp3.aarch64",
					"openEuler-22.03-LTS-SP3:kernel-source-5.10.0-207.0.0.116.oe2203sp3.aarch64",
					"openEuler-22.03-LTS-SP3:kernel-5.10.0-207.0.0.116.oe2203sp3.src",
					"openEuler-22.03-LTS-SP3:kernel-debuginfo-5.10.0-207.0.0.116.oe2203sp3.x86_64",
					"openEuler-22.03-LTS-SP3:kernel-tools-5.10.0-207.0.0.116.oe2203sp3.x86_64",
					"openEuler-22.03-LTS-SP3:python3-perf-5.10.0-207.0.0.116.oe2203sp3.x86_64",
					"openEuler-22.03-LTS-SP3:kernel-source-5.10.0-207.0.0.116.oe2203sp3.x86_64",
					"openEuler-22.03-LTS-SP3:kernel-headers-5.10.0-207.0.0.116.oe2203sp3.x86_64",
					"openEuler-22.03-LTS-SP3:perf-5.10.0-207.0.0.116.oe2203sp3.x86_64",
					"openEuler-22.03-LTS-SP3:kernel-devel-5.10.0-207.0.0.116.oe2203sp3.x86_64",
					"openEuler-22.03-LTS-SP3:kernel-tools-devel-5.10.0-207.0.0.116.oe2203sp3.x86_64",
					"openEuler-22.03-LTS-SP3:kernel-debugsource-5.10.0-207.0.0.116.oe2203sp3.x86_64",
					"openEuler-22.03-LTS-SP3:kernel-tools-debuginfo-5.10.0-207.0.0.116.oe2203sp3.x86_64",
					"openEuler-22.03-LTS-SP3:kernel-5.10.0-207.0.0.116.oe2203sp3.x86_64",
					"openEuler-22.03-LTS-SP3:python3-perf-debuginfo-5.10.0-207.0.0.116.oe2203sp3.x86_64",
					"openEuler-22.03-LTS-SP3:perf-debuginfo-5.10.0-207.0.0.116.oe2203sp3.x86_64"
				]
			},
			"remediations":[
				{
					"product_ids":[
						"openEuler-22.03-LTS-SP3:perf-debuginfo-5.10.0-207.0.0.116.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:kernel-debuginfo-5.10.0-207.0.0.116.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:python3-perf-debuginfo-5.10.0-207.0.0.116.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:kernel-tools-debuginfo-5.10.0-207.0.0.116.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:kernel-tools-5.10.0-207.0.0.116.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:kernel-5.10.0-207.0.0.116.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:kernel-headers-5.10.0-207.0.0.116.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:kernel-devel-5.10.0-207.0.0.116.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:python3-perf-5.10.0-207.0.0.116.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:perf-5.10.0-207.0.0.116.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:kernel-tools-devel-5.10.0-207.0.0.116.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:kernel-debugsource-5.10.0-207.0.0.116.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:kernel-source-5.10.0-207.0.0.116.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:kernel-5.10.0-207.0.0.116.oe2203sp3.src",
						"openEuler-22.03-LTS-SP3:kernel-debuginfo-5.10.0-207.0.0.116.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:kernel-tools-5.10.0-207.0.0.116.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:python3-perf-5.10.0-207.0.0.116.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:kernel-source-5.10.0-207.0.0.116.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:kernel-headers-5.10.0-207.0.0.116.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:perf-5.10.0-207.0.0.116.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:kernel-devel-5.10.0-207.0.0.116.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:kernel-tools-devel-5.10.0-207.0.0.116.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:kernel-debugsource-5.10.0-207.0.0.116.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:kernel-tools-debuginfo-5.10.0-207.0.0.116.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:kernel-5.10.0-207.0.0.116.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:python3-perf-debuginfo-5.10.0-207.0.0.116.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:perf-debuginfo-5.10.0-207.0.0.116.oe2203sp3.x86_64"
					],
					"details":"kernel security update",
					"category":"vendor_fix",
					"url":"https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2024-1707"
				}
			],
			"scores":[
				{
					"cvss_v3":{
						"baseSeverity":"MEDIUM",
						"baseScore":5.5,
						"vectorString":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
						"version":"3.1"
					},
					"products":[
						"openEuler-22.03-LTS-SP3:perf-debuginfo-5.10.0-207.0.0.116.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:kernel-debuginfo-5.10.0-207.0.0.116.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:python3-perf-debuginfo-5.10.0-207.0.0.116.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:kernel-tools-debuginfo-5.10.0-207.0.0.116.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:kernel-tools-5.10.0-207.0.0.116.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:kernel-5.10.0-207.0.0.116.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:kernel-headers-5.10.0-207.0.0.116.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:kernel-devel-5.10.0-207.0.0.116.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:python3-perf-5.10.0-207.0.0.116.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:perf-5.10.0-207.0.0.116.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:kernel-tools-devel-5.10.0-207.0.0.116.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:kernel-debugsource-5.10.0-207.0.0.116.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:kernel-source-5.10.0-207.0.0.116.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:kernel-5.10.0-207.0.0.116.oe2203sp3.src",
						"openEuler-22.03-LTS-SP3:kernel-debuginfo-5.10.0-207.0.0.116.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:kernel-tools-5.10.0-207.0.0.116.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:python3-perf-5.10.0-207.0.0.116.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:kernel-source-5.10.0-207.0.0.116.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:kernel-headers-5.10.0-207.0.0.116.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:perf-5.10.0-207.0.0.116.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:kernel-devel-5.10.0-207.0.0.116.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:kernel-tools-devel-5.10.0-207.0.0.116.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:kernel-debugsource-5.10.0-207.0.0.116.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:kernel-tools-debuginfo-5.10.0-207.0.0.116.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:kernel-5.10.0-207.0.0.116.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:python3-perf-debuginfo-5.10.0-207.0.0.116.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:perf-debuginfo-5.10.0-207.0.0.116.oe2203sp3.x86_64"
					]
				}
			],
			"threats":[
				{
					"details":"Medium",
					"category":"impact"
				}
			],
			"title":"CVE-2024-35809"
		},
		{
			"cve":"CVE-2024-35811",
			"notes":[
				{
					"text":"In the Linux kernel, the following vulnerability has been resolved:\n\nwifi: brcmfmac: Fix use-after-free bug in brcmf_cfg80211_detach\n\nThis is the candidate patch of CVE-2023-47233 :\nhttps://nvd.nist.gov/vuln/detail/CVE-2023-47233\n\nIn brcm80211 driver,it starts with the following invoking chain\nto start init a timeout worker:\n\n->brcmf_usb_probe\n  ->brcmf_usb_probe_cb\n    ->brcmf_attach\n      ->brcmf_bus_started\n        ->brcmf_cfg80211_attach\n          ->wl_init_priv\n            ->brcmf_init_escan\n              ->INIT_WORK(&cfg->escan_timeout_work,\n\t\t  brcmf_cfg80211_escan_timeout_worker);\n\nIf we disconnect the USB by hotplug, it will call\nbrcmf_usb_disconnect to make cleanup. The invoking chain is :\n\nbrcmf_usb_disconnect\n  ->brcmf_usb_disconnect_cb\n    ->brcmf_detach\n      ->brcmf_cfg80211_detach\n        ->kfree(cfg);\n\nWhile the timeout woker may still be running. This will cause\na use-after-free bug on cfg in brcmf_cfg80211_escan_timeout_worker.\n\nFix it by deleting the timer and canceling the worker in\nbrcmf_cfg80211_detach.\n\n[arend.vanspriel@broadcom.com: keep timer delete as is and cancel work just before free]",
					"category":"description",
					"title":"Vulnerability Description"
				}
			],
			"product_status":{
				"fixed":[
					"openEuler-22.03-LTS-SP3:perf-debuginfo-5.10.0-207.0.0.116.oe2203sp3.aarch64",
					"openEuler-22.03-LTS-SP3:kernel-debuginfo-5.10.0-207.0.0.116.oe2203sp3.aarch64",
					"openEuler-22.03-LTS-SP3:python3-perf-debuginfo-5.10.0-207.0.0.116.oe2203sp3.aarch64",
					"openEuler-22.03-LTS-SP3:kernel-tools-debuginfo-5.10.0-207.0.0.116.oe2203sp3.aarch64",
					"openEuler-22.03-LTS-SP3:kernel-tools-5.10.0-207.0.0.116.oe2203sp3.aarch64",
					"openEuler-22.03-LTS-SP3:kernel-5.10.0-207.0.0.116.oe2203sp3.aarch64",
					"openEuler-22.03-LTS-SP3:kernel-headers-5.10.0-207.0.0.116.oe2203sp3.aarch64",
					"openEuler-22.03-LTS-SP3:kernel-devel-5.10.0-207.0.0.116.oe2203sp3.aarch64",
					"openEuler-22.03-LTS-SP3:python3-perf-5.10.0-207.0.0.116.oe2203sp3.aarch64",
					"openEuler-22.03-LTS-SP3:perf-5.10.0-207.0.0.116.oe2203sp3.aarch64",
					"openEuler-22.03-LTS-SP3:kernel-tools-devel-5.10.0-207.0.0.116.oe2203sp3.aarch64",
					"openEuler-22.03-LTS-SP3:kernel-debugsource-5.10.0-207.0.0.116.oe2203sp3.aarch64",
					"openEuler-22.03-LTS-SP3:kernel-source-5.10.0-207.0.0.116.oe2203sp3.aarch64",
					"openEuler-22.03-LTS-SP3:kernel-5.10.0-207.0.0.116.oe2203sp3.src",
					"openEuler-22.03-LTS-SP3:kernel-debuginfo-5.10.0-207.0.0.116.oe2203sp3.x86_64",
					"openEuler-22.03-LTS-SP3:kernel-tools-5.10.0-207.0.0.116.oe2203sp3.x86_64",
					"openEuler-22.03-LTS-SP3:python3-perf-5.10.0-207.0.0.116.oe2203sp3.x86_64",
					"openEuler-22.03-LTS-SP3:kernel-source-5.10.0-207.0.0.116.oe2203sp3.x86_64",
					"openEuler-22.03-LTS-SP3:kernel-headers-5.10.0-207.0.0.116.oe2203sp3.x86_64",
					"openEuler-22.03-LTS-SP3:perf-5.10.0-207.0.0.116.oe2203sp3.x86_64",
					"openEuler-22.03-LTS-SP3:kernel-devel-5.10.0-207.0.0.116.oe2203sp3.x86_64",
					"openEuler-22.03-LTS-SP3:kernel-tools-devel-5.10.0-207.0.0.116.oe2203sp3.x86_64",
					"openEuler-22.03-LTS-SP3:kernel-debugsource-5.10.0-207.0.0.116.oe2203sp3.x86_64",
					"openEuler-22.03-LTS-SP3:kernel-tools-debuginfo-5.10.0-207.0.0.116.oe2203sp3.x86_64",
					"openEuler-22.03-LTS-SP3:kernel-5.10.0-207.0.0.116.oe2203sp3.x86_64",
					"openEuler-22.03-LTS-SP3:python3-perf-debuginfo-5.10.0-207.0.0.116.oe2203sp3.x86_64",
					"openEuler-22.03-LTS-SP3:perf-debuginfo-5.10.0-207.0.0.116.oe2203sp3.x86_64"
				]
			},
			"remediations":[
				{
					"product_ids":[
						"openEuler-22.03-LTS-SP3:perf-debuginfo-5.10.0-207.0.0.116.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:kernel-debuginfo-5.10.0-207.0.0.116.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:python3-perf-debuginfo-5.10.0-207.0.0.116.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:kernel-tools-debuginfo-5.10.0-207.0.0.116.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:kernel-tools-5.10.0-207.0.0.116.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:kernel-5.10.0-207.0.0.116.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:kernel-headers-5.10.0-207.0.0.116.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:kernel-devel-5.10.0-207.0.0.116.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:python3-perf-5.10.0-207.0.0.116.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:perf-5.10.0-207.0.0.116.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:kernel-tools-devel-5.10.0-207.0.0.116.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:kernel-debugsource-5.10.0-207.0.0.116.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:kernel-source-5.10.0-207.0.0.116.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:kernel-5.10.0-207.0.0.116.oe2203sp3.src",
						"openEuler-22.03-LTS-SP3:kernel-debuginfo-5.10.0-207.0.0.116.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:kernel-tools-5.10.0-207.0.0.116.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:python3-perf-5.10.0-207.0.0.116.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:kernel-source-5.10.0-207.0.0.116.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:kernel-headers-5.10.0-207.0.0.116.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:perf-5.10.0-207.0.0.116.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:kernel-devel-5.10.0-207.0.0.116.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:kernel-tools-devel-5.10.0-207.0.0.116.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:kernel-debugsource-5.10.0-207.0.0.116.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:kernel-tools-debuginfo-5.10.0-207.0.0.116.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:kernel-5.10.0-207.0.0.116.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:python3-perf-debuginfo-5.10.0-207.0.0.116.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:perf-debuginfo-5.10.0-207.0.0.116.oe2203sp3.x86_64"
					],
					"details":"kernel security update",
					"category":"vendor_fix",
					"url":"https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2024-1707"
				}
			],
			"scores":[
				{
					"cvss_v3":{
						"baseSeverity":"MEDIUM",
						"baseScore":5.5,
						"vectorString":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
						"version":"3.1"
					},
					"products":[
						"openEuler-22.03-LTS-SP3:perf-debuginfo-5.10.0-207.0.0.116.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:kernel-debuginfo-5.10.0-207.0.0.116.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:python3-perf-debuginfo-5.10.0-207.0.0.116.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:kernel-tools-debuginfo-5.10.0-207.0.0.116.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:kernel-tools-5.10.0-207.0.0.116.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:kernel-5.10.0-207.0.0.116.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:kernel-headers-5.10.0-207.0.0.116.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:kernel-devel-5.10.0-207.0.0.116.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:python3-perf-5.10.0-207.0.0.116.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:perf-5.10.0-207.0.0.116.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:kernel-tools-devel-5.10.0-207.0.0.116.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:kernel-debugsource-5.10.0-207.0.0.116.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:kernel-source-5.10.0-207.0.0.116.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:kernel-5.10.0-207.0.0.116.oe2203sp3.src",
						"openEuler-22.03-LTS-SP3:kernel-debuginfo-5.10.0-207.0.0.116.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:kernel-tools-5.10.0-207.0.0.116.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:python3-perf-5.10.0-207.0.0.116.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:kernel-source-5.10.0-207.0.0.116.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:kernel-headers-5.10.0-207.0.0.116.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:perf-5.10.0-207.0.0.116.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:kernel-devel-5.10.0-207.0.0.116.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:kernel-tools-devel-5.10.0-207.0.0.116.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:kernel-debugsource-5.10.0-207.0.0.116.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:kernel-tools-debuginfo-5.10.0-207.0.0.116.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:kernel-5.10.0-207.0.0.116.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:python3-perf-debuginfo-5.10.0-207.0.0.116.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:perf-debuginfo-5.10.0-207.0.0.116.oe2203sp3.x86_64"
					]
				}
			],
			"threats":[
				{
					"details":"Medium",
					"category":"impact"
				}
			],
			"title":"CVE-2024-35811"
		},
		{
			"cve":"CVE-2024-35853",
			"notes":[
				{
					"text":"In the Linux kernel, the following vulnerability has been resolved:\n\nmlxsw: spectrum_acl_tcam: Fix memory leak during rehash\n\nThe rehash delayed work migrates filters from one region to another.\nThis is done by iterating over all chunks (all the filters with the same\npriority) in the region and in each chunk iterating over all the\nfilters.\n\nIf the migration fails, the code tries to migrate the filters back to\nthe old region. However, the rollback itself can also fail in which case\nanother migration will be erroneously performed. Besides the fact that\nthis ping pong is not a very good idea, it also creates a problem.\n\nEach virtual chunk references two chunks: The currently used one\n('vchunk->chunk') and a backup ('vchunk->chunk2'). During migration the\nfirst holds the chunk we want to migrate filters to and the second holds\nthe chunk we are migrating filters from.\n\nThe code currently assumes - but does not verify - that the backup chunk\ndoes not exist (NULL) if the currently used chunk does not reference the\ntarget region. This assumption breaks when we are trying to rollback a\nrollback, resulting in the backup chunk being overwritten and leaked\n[1].\n\nFix by not rolling back a failed rollback and add a warning to avoid\nfuture cases.\n\n[1]\nWARNING: CPU: 5 PID: 1063 at lib/parman.c:291 parman_destroy+0x17/0x20\nModules linked in:\nCPU: 5 PID: 1063 Comm: kworker/5:11 Tainted: G        W          6.9.0-rc2-custom-00784-gc6a05c468a0b #14\nHardware name: Mellanox Technologies Ltd. MSN3700/VMOD0005, BIOS 5.11 01/06/2019\nWorkqueue: mlxsw_core mlxsw_sp_acl_tcam_vregion_rehash_work\nRIP: 0010:parman_destroy+0x17/0x20\n[...]\nCall Trace:\n <TASK>\n mlxsw_sp_acl_atcam_region_fini+0x19/0x60\n mlxsw_sp_acl_tcam_region_destroy+0x49/0xf0\n mlxsw_sp_acl_tcam_vregion_rehash_work+0x1f1/0x470\n process_one_work+0x151/0x370\n worker_thread+0x2cb/0x3e0\n kthread+0xd0/0x100\n ret_from_fork+0x34/0x50\n ret_from_fork_asm+0x1a/0x30\n </TASK>",
					"category":"description",
					"title":"Vulnerability Description"
				}
			],
			"product_status":{
				"fixed":[
					"openEuler-22.03-LTS-SP3:perf-debuginfo-5.10.0-207.0.0.116.oe2203sp3.aarch64",
					"openEuler-22.03-LTS-SP3:kernel-debuginfo-5.10.0-207.0.0.116.oe2203sp3.aarch64",
					"openEuler-22.03-LTS-SP3:python3-perf-debuginfo-5.10.0-207.0.0.116.oe2203sp3.aarch64",
					"openEuler-22.03-LTS-SP3:kernel-tools-debuginfo-5.10.0-207.0.0.116.oe2203sp3.aarch64",
					"openEuler-22.03-LTS-SP3:kernel-tools-5.10.0-207.0.0.116.oe2203sp3.aarch64",
					"openEuler-22.03-LTS-SP3:kernel-5.10.0-207.0.0.116.oe2203sp3.aarch64",
					"openEuler-22.03-LTS-SP3:kernel-headers-5.10.0-207.0.0.116.oe2203sp3.aarch64",
					"openEuler-22.03-LTS-SP3:kernel-devel-5.10.0-207.0.0.116.oe2203sp3.aarch64",
					"openEuler-22.03-LTS-SP3:python3-perf-5.10.0-207.0.0.116.oe2203sp3.aarch64",
					"openEuler-22.03-LTS-SP3:perf-5.10.0-207.0.0.116.oe2203sp3.aarch64",
					"openEuler-22.03-LTS-SP3:kernel-tools-devel-5.10.0-207.0.0.116.oe2203sp3.aarch64",
					"openEuler-22.03-LTS-SP3:kernel-debugsource-5.10.0-207.0.0.116.oe2203sp3.aarch64",
					"openEuler-22.03-LTS-SP3:kernel-source-5.10.0-207.0.0.116.oe2203sp3.aarch64",
					"openEuler-22.03-LTS-SP3:kernel-5.10.0-207.0.0.116.oe2203sp3.src",
					"openEuler-22.03-LTS-SP3:kernel-debuginfo-5.10.0-207.0.0.116.oe2203sp3.x86_64",
					"openEuler-22.03-LTS-SP3:kernel-tools-5.10.0-207.0.0.116.oe2203sp3.x86_64",
					"openEuler-22.03-LTS-SP3:python3-perf-5.10.0-207.0.0.116.oe2203sp3.x86_64",
					"openEuler-22.03-LTS-SP3:kernel-source-5.10.0-207.0.0.116.oe2203sp3.x86_64",
					"openEuler-22.03-LTS-SP3:kernel-headers-5.10.0-207.0.0.116.oe2203sp3.x86_64",
					"openEuler-22.03-LTS-SP3:perf-5.10.0-207.0.0.116.oe2203sp3.x86_64",
					"openEuler-22.03-LTS-SP3:kernel-devel-5.10.0-207.0.0.116.oe2203sp3.x86_64",
					"openEuler-22.03-LTS-SP3:kernel-tools-devel-5.10.0-207.0.0.116.oe2203sp3.x86_64",
					"openEuler-22.03-LTS-SP3:kernel-debugsource-5.10.0-207.0.0.116.oe2203sp3.x86_64",
					"openEuler-22.03-LTS-SP3:kernel-tools-debuginfo-5.10.0-207.0.0.116.oe2203sp3.x86_64",
					"openEuler-22.03-LTS-SP3:kernel-5.10.0-207.0.0.116.oe2203sp3.x86_64",
					"openEuler-22.03-LTS-SP3:python3-perf-debuginfo-5.10.0-207.0.0.116.oe2203sp3.x86_64",
					"openEuler-22.03-LTS-SP3:perf-debuginfo-5.10.0-207.0.0.116.oe2203sp3.x86_64"
				]
			},
			"remediations":[
				{
					"product_ids":[
						"openEuler-22.03-LTS-SP3:perf-debuginfo-5.10.0-207.0.0.116.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:kernel-debuginfo-5.10.0-207.0.0.116.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:python3-perf-debuginfo-5.10.0-207.0.0.116.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:kernel-tools-debuginfo-5.10.0-207.0.0.116.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:kernel-tools-5.10.0-207.0.0.116.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:kernel-5.10.0-207.0.0.116.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:kernel-headers-5.10.0-207.0.0.116.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:kernel-devel-5.10.0-207.0.0.116.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:python3-perf-5.10.0-207.0.0.116.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:perf-5.10.0-207.0.0.116.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:kernel-tools-devel-5.10.0-207.0.0.116.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:kernel-debugsource-5.10.0-207.0.0.116.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:kernel-source-5.10.0-207.0.0.116.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:kernel-5.10.0-207.0.0.116.oe2203sp3.src",
						"openEuler-22.03-LTS-SP3:kernel-debuginfo-5.10.0-207.0.0.116.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:kernel-tools-5.10.0-207.0.0.116.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:python3-perf-5.10.0-207.0.0.116.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:kernel-source-5.10.0-207.0.0.116.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:kernel-headers-5.10.0-207.0.0.116.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:perf-5.10.0-207.0.0.116.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:kernel-devel-5.10.0-207.0.0.116.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:kernel-tools-devel-5.10.0-207.0.0.116.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:kernel-debugsource-5.10.0-207.0.0.116.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:kernel-tools-debuginfo-5.10.0-207.0.0.116.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:kernel-5.10.0-207.0.0.116.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:python3-perf-debuginfo-5.10.0-207.0.0.116.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:perf-debuginfo-5.10.0-207.0.0.116.oe2203sp3.x86_64"
					],
					"details":"kernel security update",
					"category":"vendor_fix",
					"url":"https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2024-1707"
				}
			],
			"scores":[
				{
					"cvss_v3":{
						"baseSeverity":"MEDIUM",
						"baseScore":6.4,
						"vectorString":"CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:H",
						"version":"3.1"
					},
					"products":[
						"openEuler-22.03-LTS-SP3:perf-debuginfo-5.10.0-207.0.0.116.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:kernel-debuginfo-5.10.0-207.0.0.116.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:python3-perf-debuginfo-5.10.0-207.0.0.116.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:kernel-tools-debuginfo-5.10.0-207.0.0.116.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:kernel-tools-5.10.0-207.0.0.116.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:kernel-5.10.0-207.0.0.116.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:kernel-headers-5.10.0-207.0.0.116.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:kernel-devel-5.10.0-207.0.0.116.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:python3-perf-5.10.0-207.0.0.116.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:perf-5.10.0-207.0.0.116.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:kernel-tools-devel-5.10.0-207.0.0.116.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:kernel-debugsource-5.10.0-207.0.0.116.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:kernel-source-5.10.0-207.0.0.116.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:kernel-5.10.0-207.0.0.116.oe2203sp3.src",
						"openEuler-22.03-LTS-SP3:kernel-debuginfo-5.10.0-207.0.0.116.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:kernel-tools-5.10.0-207.0.0.116.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:python3-perf-5.10.0-207.0.0.116.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:kernel-source-5.10.0-207.0.0.116.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:kernel-headers-5.10.0-207.0.0.116.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:perf-5.10.0-207.0.0.116.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:kernel-devel-5.10.0-207.0.0.116.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:kernel-tools-devel-5.10.0-207.0.0.116.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:kernel-debugsource-5.10.0-207.0.0.116.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:kernel-tools-debuginfo-5.10.0-207.0.0.116.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:kernel-5.10.0-207.0.0.116.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:python3-perf-debuginfo-5.10.0-207.0.0.116.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:perf-debuginfo-5.10.0-207.0.0.116.oe2203sp3.x86_64"
					]
				}
			],
			"threats":[
				{
					"details":"Medium",
					"category":"impact"
				}
			],
			"title":"CVE-2024-35853"
		},
		{
			"cve":"CVE-2024-35854",
			"notes":[
				{
					"text":"In the Linux kernel, the following vulnerability has been resolved:\n\nmlxsw: spectrum_acl_tcam: Fix possible use-after-free during rehash\n\nThe rehash delayed work migrates filters from one region to another\naccording to the number of available credits.\n\nThe migrated from region is destroyed at the end of the work if the\nnumber of credits is non-negative as the assumption is that this is\nindicative of migration being complete. This assumption is incorrect as\na non-negative number of credits can also be the result of a failed\nmigration.\n\nThe destruction of a region that still has filters referencing it can\nresult in a use-after-free [1].\n\nFix by not destroying the region if migration failed.\n\n[1]\nBUG: KASAN: slab-use-after-free in mlxsw_sp_acl_ctcam_region_entry_remove+0x21d/0x230\nRead of size 8 at addr ffff8881735319e8 by task kworker/0:31/3858\n\nCPU: 0 PID: 3858 Comm: kworker/0:31 Tainted: G        W          6.9.0-rc2-custom-00782-gf2275c2157d8 #5\nHardware name: Mellanox Technologies Ltd. MSN3700/VMOD0005, BIOS 5.11 01/06/2019\nWorkqueue: mlxsw_core mlxsw_sp_acl_tcam_vregion_rehash_work\nCall Trace:\n <TASK>\n dump_stack_lvl+0xc6/0x120\n print_report+0xce/0x670\n kasan_report+0xd7/0x110\n mlxsw_sp_acl_ctcam_region_entry_remove+0x21d/0x230\n mlxsw_sp_acl_ctcam_entry_del+0x2e/0x70\n mlxsw_sp_acl_atcam_entry_del+0x81/0x210\n mlxsw_sp_acl_tcam_vchunk_migrate_all+0x3cd/0xb50\n mlxsw_sp_acl_tcam_vregion_rehash_work+0x157/0x1300\n process_one_work+0x8eb/0x19b0\n worker_thread+0x6c9/0xf70\n kthread+0x2c9/0x3b0\n ret_from_fork+0x4d/0x80\n ret_from_fork_asm+0x1a/0x30\n </TASK>\n\nAllocated by task 174:\n kasan_save_stack+0x33/0x60\n kasan_save_track+0x14/0x30\n __kasan_kmalloc+0x8f/0xa0\n __kmalloc+0x19c/0x360\n mlxsw_sp_acl_tcam_region_create+0xdf/0x9c0\n mlxsw_sp_acl_tcam_vregion_rehash_work+0x954/0x1300\n process_one_work+0x8eb/0x19b0\n worker_thread+0x6c9/0xf70\n kthread+0x2c9/0x3b0\n ret_from_fork+0x4d/0x80\n ret_from_fork_asm+0x1a/0x30\n\nFreed by task 7:\n kasan_save_stack+0x33/0x60\n kasan_save_track+0x14/0x30\n kasan_save_free_info+0x3b/0x60\n poison_slab_object+0x102/0x170\n __kasan_slab_free+0x14/0x30\n kfree+0xc1/0x290\n mlxsw_sp_acl_tcam_region_destroy+0x272/0x310\n mlxsw_sp_acl_tcam_vregion_rehash_work+0x731/0x1300\n process_one_work+0x8eb/0x19b0\n worker_thread+0x6c9/0xf70\n kthread+0x2c9/0x3b0\n ret_from_fork+0x4d/0x80\n ret_from_fork_asm+0x1a/0x30",
					"category":"description",
					"title":"Vulnerability Description"
				}
			],
			"product_status":{
				"fixed":[
					"openEuler-22.03-LTS-SP3:perf-debuginfo-5.10.0-207.0.0.116.oe2203sp3.aarch64",
					"openEuler-22.03-LTS-SP3:kernel-debuginfo-5.10.0-207.0.0.116.oe2203sp3.aarch64",
					"openEuler-22.03-LTS-SP3:python3-perf-debuginfo-5.10.0-207.0.0.116.oe2203sp3.aarch64",
					"openEuler-22.03-LTS-SP3:kernel-tools-debuginfo-5.10.0-207.0.0.116.oe2203sp3.aarch64",
					"openEuler-22.03-LTS-SP3:kernel-tools-5.10.0-207.0.0.116.oe2203sp3.aarch64",
					"openEuler-22.03-LTS-SP3:kernel-5.10.0-207.0.0.116.oe2203sp3.aarch64",
					"openEuler-22.03-LTS-SP3:kernel-headers-5.10.0-207.0.0.116.oe2203sp3.aarch64",
					"openEuler-22.03-LTS-SP3:kernel-devel-5.10.0-207.0.0.116.oe2203sp3.aarch64",
					"openEuler-22.03-LTS-SP3:python3-perf-5.10.0-207.0.0.116.oe2203sp3.aarch64",
					"openEuler-22.03-LTS-SP3:perf-5.10.0-207.0.0.116.oe2203sp3.aarch64",
					"openEuler-22.03-LTS-SP3:kernel-tools-devel-5.10.0-207.0.0.116.oe2203sp3.aarch64",
					"openEuler-22.03-LTS-SP3:kernel-debugsource-5.10.0-207.0.0.116.oe2203sp3.aarch64",
					"openEuler-22.03-LTS-SP3:kernel-source-5.10.0-207.0.0.116.oe2203sp3.aarch64",
					"openEuler-22.03-LTS-SP3:kernel-5.10.0-207.0.0.116.oe2203sp3.src",
					"openEuler-22.03-LTS-SP3:kernel-debuginfo-5.10.0-207.0.0.116.oe2203sp3.x86_64",
					"openEuler-22.03-LTS-SP3:kernel-tools-5.10.0-207.0.0.116.oe2203sp3.x86_64",
					"openEuler-22.03-LTS-SP3:python3-perf-5.10.0-207.0.0.116.oe2203sp3.x86_64",
					"openEuler-22.03-LTS-SP3:kernel-source-5.10.0-207.0.0.116.oe2203sp3.x86_64",
					"openEuler-22.03-LTS-SP3:kernel-headers-5.10.0-207.0.0.116.oe2203sp3.x86_64",
					"openEuler-22.03-LTS-SP3:perf-5.10.0-207.0.0.116.oe2203sp3.x86_64",
					"openEuler-22.03-LTS-SP3:kernel-devel-5.10.0-207.0.0.116.oe2203sp3.x86_64",
					"openEuler-22.03-LTS-SP3:kernel-tools-devel-5.10.0-207.0.0.116.oe2203sp3.x86_64",
					"openEuler-22.03-LTS-SP3:kernel-debugsource-5.10.0-207.0.0.116.oe2203sp3.x86_64",
					"openEuler-22.03-LTS-SP3:kernel-tools-debuginfo-5.10.0-207.0.0.116.oe2203sp3.x86_64",
					"openEuler-22.03-LTS-SP3:kernel-5.10.0-207.0.0.116.oe2203sp3.x86_64",
					"openEuler-22.03-LTS-SP3:python3-perf-debuginfo-5.10.0-207.0.0.116.oe2203sp3.x86_64",
					"openEuler-22.03-LTS-SP3:perf-debuginfo-5.10.0-207.0.0.116.oe2203sp3.x86_64"
				]
			},
			"remediations":[
				{
					"product_ids":[
						"openEuler-22.03-LTS-SP3:perf-debuginfo-5.10.0-207.0.0.116.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:kernel-debuginfo-5.10.0-207.0.0.116.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:python3-perf-debuginfo-5.10.0-207.0.0.116.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:kernel-tools-debuginfo-5.10.0-207.0.0.116.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:kernel-tools-5.10.0-207.0.0.116.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:kernel-5.10.0-207.0.0.116.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:kernel-headers-5.10.0-207.0.0.116.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:kernel-devel-5.10.0-207.0.0.116.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:python3-perf-5.10.0-207.0.0.116.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:perf-5.10.0-207.0.0.116.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:kernel-tools-devel-5.10.0-207.0.0.116.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:kernel-debugsource-5.10.0-207.0.0.116.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:kernel-source-5.10.0-207.0.0.116.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:kernel-5.10.0-207.0.0.116.oe2203sp3.src",
						"openEuler-22.03-LTS-SP3:kernel-debuginfo-5.10.0-207.0.0.116.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:kernel-tools-5.10.0-207.0.0.116.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:python3-perf-5.10.0-207.0.0.116.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:kernel-source-5.10.0-207.0.0.116.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:kernel-headers-5.10.0-207.0.0.116.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:perf-5.10.0-207.0.0.116.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:kernel-devel-5.10.0-207.0.0.116.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:kernel-tools-devel-5.10.0-207.0.0.116.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:kernel-debugsource-5.10.0-207.0.0.116.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:kernel-tools-debuginfo-5.10.0-207.0.0.116.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:kernel-5.10.0-207.0.0.116.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:python3-perf-debuginfo-5.10.0-207.0.0.116.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:perf-debuginfo-5.10.0-207.0.0.116.oe2203sp3.x86_64"
					],
					"details":"kernel security update",
					"category":"vendor_fix",
					"url":"https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2024-1707"
				}
			],
			"scores":[
				{
					"cvss_v3":{
						"baseSeverity":"HIGH",
						"baseScore":8.8,
						"vectorString":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
						"version":"3.1"
					},
					"products":[
						"openEuler-22.03-LTS-SP3:perf-debuginfo-5.10.0-207.0.0.116.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:kernel-debuginfo-5.10.0-207.0.0.116.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:python3-perf-debuginfo-5.10.0-207.0.0.116.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:kernel-tools-debuginfo-5.10.0-207.0.0.116.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:kernel-tools-5.10.0-207.0.0.116.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:kernel-5.10.0-207.0.0.116.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:kernel-headers-5.10.0-207.0.0.116.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:kernel-devel-5.10.0-207.0.0.116.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:python3-perf-5.10.0-207.0.0.116.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:perf-5.10.0-207.0.0.116.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:kernel-tools-devel-5.10.0-207.0.0.116.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:kernel-debugsource-5.10.0-207.0.0.116.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:kernel-source-5.10.0-207.0.0.116.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:kernel-5.10.0-207.0.0.116.oe2203sp3.src",
						"openEuler-22.03-LTS-SP3:kernel-debuginfo-5.10.0-207.0.0.116.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:kernel-tools-5.10.0-207.0.0.116.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:python3-perf-5.10.0-207.0.0.116.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:kernel-source-5.10.0-207.0.0.116.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:kernel-headers-5.10.0-207.0.0.116.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:perf-5.10.0-207.0.0.116.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:kernel-devel-5.10.0-207.0.0.116.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:kernel-tools-devel-5.10.0-207.0.0.116.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:kernel-debugsource-5.10.0-207.0.0.116.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:kernel-tools-debuginfo-5.10.0-207.0.0.116.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:kernel-5.10.0-207.0.0.116.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:python3-perf-debuginfo-5.10.0-207.0.0.116.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:perf-debuginfo-5.10.0-207.0.0.116.oe2203sp3.x86_64"
					]
				}
			],
			"threats":[
				{
					"details":"High",
					"category":"impact"
				}
			],
			"title":"CVE-2024-35854"
		},
		{
			"cve":"CVE-2024-35871",
			"notes":[
				{
					"text":"In the Linux kernel, the following vulnerability has been resolved:\n\nriscv: process: Fix kernel gp leakage\n\nchildregs represents the registers which are active for the new thread\nin user context. For a kernel thread, childregs->gp is never used since\nthe kernel gp is not touched by switch_to. For a user mode helper, the\ngp value can be observed in user space after execve or possibly by other\nmeans.\n\n[From the email thread]\n\nThe /* Kernel thread */ comment is somewhat inaccurate in that it is also used\nfor user_mode_helper threads, which exec a user process, e.g. /sbin/init or\nwhen /proc/sys/kernel/core_pattern is a pipe. Such threads do not have\nPF_KTHREAD set and are valid targets for ptrace etc. even before they exec.\n\nchildregs is the *user* context during syscall execution and it is observable\nfrom userspace in at least five ways:\n\n1. kernel_execve does not currently clear integer registers, so the starting\n   register state for PID 1 and other user processes started by the kernel has\n   sp = user stack, gp = kernel __global_pointer$, all other integer registers\n   zeroed by the memset in the patch comment.\n\n   This is a bug in its own right, but I'm unwilling to bet that it is the only\n   way to exploit the issue addressed by this patch.\n\n2. ptrace(PTRACE_GETREGSET): you can PTRACE_ATTACH to a user_mode_helper thread\n   before it execs, but ptrace requires SIGSTOP to be delivered which can only\n   happen at user/kernel boundaries.\n\n3. /proc/*/task/*/syscall: this is perfectly happy to read pt_regs for\n   user_mode_helpers before the exec completes, but gp is not one of the\n   registers it returns.\n\n4. PERF_SAMPLE_REGS_USER: LOCKDOWN_PERF normally prevents access to kernel\n   addresses via PERF_SAMPLE_REGS_INTR, but due to this bug kernel addresses\n   are also exposed via PERF_SAMPLE_REGS_USER which is permitted under\n   LOCKDOWN_PERF. I have not attempted to write exploit code.\n\n5. Much of the tracing infrastructure allows access to user registers. I have\n   not attempted to determine which forms of tracing allow access to user\n   registers without already allowing access to kernel registers.",
					"category":"description",
					"title":"Vulnerability Description"
				}
			],
			"product_status":{
				"fixed":[
					"openEuler-22.03-LTS-SP3:perf-debuginfo-5.10.0-207.0.0.116.oe2203sp3.aarch64",
					"openEuler-22.03-LTS-SP3:kernel-debuginfo-5.10.0-207.0.0.116.oe2203sp3.aarch64",
					"openEuler-22.03-LTS-SP3:python3-perf-debuginfo-5.10.0-207.0.0.116.oe2203sp3.aarch64",
					"openEuler-22.03-LTS-SP3:kernel-tools-debuginfo-5.10.0-207.0.0.116.oe2203sp3.aarch64",
					"openEuler-22.03-LTS-SP3:kernel-tools-5.10.0-207.0.0.116.oe2203sp3.aarch64",
					"openEuler-22.03-LTS-SP3:kernel-5.10.0-207.0.0.116.oe2203sp3.aarch64",
					"openEuler-22.03-LTS-SP3:kernel-headers-5.10.0-207.0.0.116.oe2203sp3.aarch64",
					"openEuler-22.03-LTS-SP3:kernel-devel-5.10.0-207.0.0.116.oe2203sp3.aarch64",
					"openEuler-22.03-LTS-SP3:python3-perf-5.10.0-207.0.0.116.oe2203sp3.aarch64",
					"openEuler-22.03-LTS-SP3:perf-5.10.0-207.0.0.116.oe2203sp3.aarch64",
					"openEuler-22.03-LTS-SP3:kernel-tools-devel-5.10.0-207.0.0.116.oe2203sp3.aarch64",
					"openEuler-22.03-LTS-SP3:kernel-debugsource-5.10.0-207.0.0.116.oe2203sp3.aarch64",
					"openEuler-22.03-LTS-SP3:kernel-source-5.10.0-207.0.0.116.oe2203sp3.aarch64",
					"openEuler-22.03-LTS-SP3:kernel-5.10.0-207.0.0.116.oe2203sp3.src",
					"openEuler-22.03-LTS-SP3:kernel-debuginfo-5.10.0-207.0.0.116.oe2203sp3.x86_64",
					"openEuler-22.03-LTS-SP3:kernel-tools-5.10.0-207.0.0.116.oe2203sp3.x86_64",
					"openEuler-22.03-LTS-SP3:python3-perf-5.10.0-207.0.0.116.oe2203sp3.x86_64",
					"openEuler-22.03-LTS-SP3:kernel-source-5.10.0-207.0.0.116.oe2203sp3.x86_64",
					"openEuler-22.03-LTS-SP3:kernel-headers-5.10.0-207.0.0.116.oe2203sp3.x86_64",
					"openEuler-22.03-LTS-SP3:perf-5.10.0-207.0.0.116.oe2203sp3.x86_64",
					"openEuler-22.03-LTS-SP3:kernel-devel-5.10.0-207.0.0.116.oe2203sp3.x86_64",
					"openEuler-22.03-LTS-SP3:kernel-tools-devel-5.10.0-207.0.0.116.oe2203sp3.x86_64",
					"openEuler-22.03-LTS-SP3:kernel-debugsource-5.10.0-207.0.0.116.oe2203sp3.x86_64",
					"openEuler-22.03-LTS-SP3:kernel-tools-debuginfo-5.10.0-207.0.0.116.oe2203sp3.x86_64",
					"openEuler-22.03-LTS-SP3:kernel-5.10.0-207.0.0.116.oe2203sp3.x86_64",
					"openEuler-22.03-LTS-SP3:python3-perf-debuginfo-5.10.0-207.0.0.116.oe2203sp3.x86_64",
					"openEuler-22.03-LTS-SP3:perf-debuginfo-5.10.0-207.0.0.116.oe2203sp3.x86_64"
				]
			},
			"remediations":[
				{
					"product_ids":[
						"openEuler-22.03-LTS-SP3:perf-debuginfo-5.10.0-207.0.0.116.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:kernel-debuginfo-5.10.0-207.0.0.116.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:python3-perf-debuginfo-5.10.0-207.0.0.116.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:kernel-tools-debuginfo-5.10.0-207.0.0.116.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:kernel-tools-5.10.0-207.0.0.116.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:kernel-5.10.0-207.0.0.116.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:kernel-headers-5.10.0-207.0.0.116.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:kernel-devel-5.10.0-207.0.0.116.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:python3-perf-5.10.0-207.0.0.116.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:perf-5.10.0-207.0.0.116.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:kernel-tools-devel-5.10.0-207.0.0.116.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:kernel-debugsource-5.10.0-207.0.0.116.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:kernel-source-5.10.0-207.0.0.116.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:kernel-5.10.0-207.0.0.116.oe2203sp3.src",
						"openEuler-22.03-LTS-SP3:kernel-debuginfo-5.10.0-207.0.0.116.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:kernel-tools-5.10.0-207.0.0.116.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:python3-perf-5.10.0-207.0.0.116.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:kernel-source-5.10.0-207.0.0.116.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:kernel-headers-5.10.0-207.0.0.116.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:perf-5.10.0-207.0.0.116.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:kernel-devel-5.10.0-207.0.0.116.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:kernel-tools-devel-5.10.0-207.0.0.116.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:kernel-debugsource-5.10.0-207.0.0.116.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:kernel-tools-debuginfo-5.10.0-207.0.0.116.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:kernel-5.10.0-207.0.0.116.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:python3-perf-debuginfo-5.10.0-207.0.0.116.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:perf-debuginfo-5.10.0-207.0.0.116.oe2203sp3.x86_64"
					],
					"details":"kernel security update",
					"category":"vendor_fix",
					"url":"https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2024-1707"
				}
			],
			"scores":[
				{
					"cvss_v3":{
						"baseSeverity":"MEDIUM",
						"baseScore":5.5,
						"vectorString":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
						"version":"3.1"
					},
					"products":[
						"openEuler-22.03-LTS-SP3:perf-debuginfo-5.10.0-207.0.0.116.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:kernel-debuginfo-5.10.0-207.0.0.116.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:python3-perf-debuginfo-5.10.0-207.0.0.116.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:kernel-tools-debuginfo-5.10.0-207.0.0.116.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:kernel-tools-5.10.0-207.0.0.116.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:kernel-5.10.0-207.0.0.116.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:kernel-headers-5.10.0-207.0.0.116.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:kernel-devel-5.10.0-207.0.0.116.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:python3-perf-5.10.0-207.0.0.116.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:perf-5.10.0-207.0.0.116.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:kernel-tools-devel-5.10.0-207.0.0.116.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:kernel-debugsource-5.10.0-207.0.0.116.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:kernel-source-5.10.0-207.0.0.116.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:kernel-5.10.0-207.0.0.116.oe2203sp3.src",
						"openEuler-22.03-LTS-SP3:kernel-debuginfo-5.10.0-207.0.0.116.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:kernel-tools-5.10.0-207.0.0.116.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:python3-perf-5.10.0-207.0.0.116.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:kernel-source-5.10.0-207.0.0.116.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:kernel-headers-5.10.0-207.0.0.116.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:perf-5.10.0-207.0.0.116.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:kernel-devel-5.10.0-207.0.0.116.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:kernel-tools-devel-5.10.0-207.0.0.116.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:kernel-debugsource-5.10.0-207.0.0.116.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:kernel-tools-debuginfo-5.10.0-207.0.0.116.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:kernel-5.10.0-207.0.0.116.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:python3-perf-debuginfo-5.10.0-207.0.0.116.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:perf-debuginfo-5.10.0-207.0.0.116.oe2203sp3.x86_64"
					]
				}
			],
			"threats":[
				{
					"details":"Medium",
					"category":"impact"
				}
			],
			"title":"CVE-2024-35871"
		},
		{
			"cve":"CVE-2024-35888",
			"notes":[
				{
					"text":"In the Linux kernel, the following vulnerability has been resolved:\n\nerspan: make sure erspan_base_hdr is present in skb->head\n\nsyzbot reported a problem in ip6erspan_rcv() [1]\n\nIssue is that ip6erspan_rcv() (and erspan_rcv()) no longer make\nsure erspan_base_hdr is present in skb linear part (skb->head)\nbefore getting @ver field from it.\n\nAdd the missing pskb_may_pull() calls.\n\nv2: Reload iph pointer in erspan_rcv() after pskb_may_pull()\n    because skb->head might have changed.\n\n[1]\n\n BUG: KMSAN: uninit-value in pskb_may_pull_reason include/linux/skbuff.h:2742 [inline]\n BUG: KMSAN: uninit-value in pskb_may_pull include/linux/skbuff.h:2756 [inline]\n BUG: KMSAN: uninit-value in ip6erspan_rcv net/ipv6/ip6_gre.c:541 [inline]\n BUG: KMSAN: uninit-value in gre_rcv+0x11f8/0x1930 net/ipv6/ip6_gre.c:610\n  pskb_may_pull_reason include/linux/skbuff.h:2742 [inline]\n  pskb_may_pull include/linux/skbuff.h:2756 [inline]\n  ip6erspan_rcv net/ipv6/ip6_gre.c:541 [inline]\n  gre_rcv+0x11f8/0x1930 net/ipv6/ip6_gre.c:610\n  ip6_protocol_deliver_rcu+0x1d4c/0x2ca0 net/ipv6/ip6_input.c:438\n  ip6_input_finish net/ipv6/ip6_input.c:483 [inline]\n  NF_HOOK include/linux/netfilter.h:314 [inline]\n  ip6_input+0x15d/0x430 net/ipv6/ip6_input.c:492\n  ip6_mc_input+0xa7e/0xc80 net/ipv6/ip6_input.c:586\n  dst_input include/net/dst.h:460 [inline]\n  ip6_rcv_finish+0x955/0x970 net/ipv6/ip6_input.c:79\n  NF_HOOK include/linux/netfilter.h:314 [inline]\n  ipv6_rcv+0xde/0x390 net/ipv6/ip6_input.c:310\n  __netif_receive_skb_one_core net/core/dev.c:5538 [inline]\n  __netif_receive_skb+0x1da/0xa00 net/core/dev.c:5652\n  netif_receive_skb_internal net/core/dev.c:5738 [inline]\n  netif_receive_skb+0x58/0x660 net/core/dev.c:5798\n  tun_rx_batched+0x3ee/0x980 drivers/net/tun.c:1549\n  tun_get_user+0x5566/0x69e0 drivers/net/tun.c:2002\n  tun_chr_write_iter+0x3af/0x5d0 drivers/net/tun.c:2048\n  call_write_iter include/linux/fs.h:2108 [inline]\n  new_sync_write fs/read_write.c:497 [inline]\n  vfs_write+0xb63/0x1520 fs/read_write.c:590\n  ksys_write+0x20f/0x4c0 fs/read_write.c:643\n  __do_sys_write fs/read_write.c:655 [inline]\n  __se_sys_write fs/read_write.c:652 [inline]\n  __x64_sys_write+0x93/0xe0 fs/read_write.c:652\n do_syscall_64+0xd5/0x1f0\n entry_SYSCALL_64_after_hwframe+0x6d/0x75\n\nUninit was created at:\n  slab_post_alloc_hook mm/slub.c:3804 [inline]\n  slab_alloc_node mm/slub.c:3845 [inline]\n  kmem_cache_alloc_node+0x613/0xc50 mm/slub.c:3888\n  kmalloc_reserve+0x13d/0x4a0 net/core/skbuff.c:577\n  __alloc_skb+0x35b/0x7a0 net/core/skbuff.c:668\n  alloc_skb include/linux/skbuff.h:1318 [inline]\n  alloc_skb_with_frags+0xc8/0xbf0 net/core/skbuff.c:6504\n  sock_alloc_send_pskb+0xa81/0xbf0 net/core/sock.c:2795\n  tun_alloc_skb drivers/net/tun.c:1525 [inline]\n  tun_get_user+0x209a/0x69e0 drivers/net/tun.c:1846\n  tun_chr_write_iter+0x3af/0x5d0 drivers/net/tun.c:2048\n  call_write_iter include/linux/fs.h:2108 [inline]\n  new_sync_write fs/read_write.c:497 [inline]\n  vfs_write+0xb63/0x1520 fs/read_write.c:590\n  ksys_write+0x20f/0x4c0 fs/read_write.c:643\n  __do_sys_write fs/read_write.c:655 [inline]\n  __se_sys_write fs/read_write.c:652 [inline]\n  __x64_sys_write+0x93/0xe0 fs/read_write.c:652\n do_syscall_64+0xd5/0x1f0\n entry_SYSCALL_64_after_hwframe+0x6d/0x75\n\nCPU: 1 PID: 5045 Comm: syz-executor114 Not tainted 6.9.0-rc1-syzkaller-00021-g962490525cff #0",
					"category":"description",
					"title":"Vulnerability Description"
				}
			],
			"product_status":{
				"fixed":[
					"openEuler-22.03-LTS-SP3:perf-debuginfo-5.10.0-207.0.0.116.oe2203sp3.aarch64",
					"openEuler-22.03-LTS-SP3:kernel-debuginfo-5.10.0-207.0.0.116.oe2203sp3.aarch64",
					"openEuler-22.03-LTS-SP3:python3-perf-debuginfo-5.10.0-207.0.0.116.oe2203sp3.aarch64",
					"openEuler-22.03-LTS-SP3:kernel-tools-debuginfo-5.10.0-207.0.0.116.oe2203sp3.aarch64",
					"openEuler-22.03-LTS-SP3:kernel-tools-5.10.0-207.0.0.116.oe2203sp3.aarch64",
					"openEuler-22.03-LTS-SP3:kernel-5.10.0-207.0.0.116.oe2203sp3.aarch64",
					"openEuler-22.03-LTS-SP3:kernel-headers-5.10.0-207.0.0.116.oe2203sp3.aarch64",
					"openEuler-22.03-LTS-SP3:kernel-devel-5.10.0-207.0.0.116.oe2203sp3.aarch64",
					"openEuler-22.03-LTS-SP3:python3-perf-5.10.0-207.0.0.116.oe2203sp3.aarch64",
					"openEuler-22.03-LTS-SP3:perf-5.10.0-207.0.0.116.oe2203sp3.aarch64",
					"openEuler-22.03-LTS-SP3:kernel-tools-devel-5.10.0-207.0.0.116.oe2203sp3.aarch64",
					"openEuler-22.03-LTS-SP3:kernel-debugsource-5.10.0-207.0.0.116.oe2203sp3.aarch64",
					"openEuler-22.03-LTS-SP3:kernel-source-5.10.0-207.0.0.116.oe2203sp3.aarch64",
					"openEuler-22.03-LTS-SP3:kernel-5.10.0-207.0.0.116.oe2203sp3.src",
					"openEuler-22.03-LTS-SP3:kernel-debuginfo-5.10.0-207.0.0.116.oe2203sp3.x86_64",
					"openEuler-22.03-LTS-SP3:kernel-tools-5.10.0-207.0.0.116.oe2203sp3.x86_64",
					"openEuler-22.03-LTS-SP3:python3-perf-5.10.0-207.0.0.116.oe2203sp3.x86_64",
					"openEuler-22.03-LTS-SP3:kernel-source-5.10.0-207.0.0.116.oe2203sp3.x86_64",
					"openEuler-22.03-LTS-SP3:kernel-headers-5.10.0-207.0.0.116.oe2203sp3.x86_64",
					"openEuler-22.03-LTS-SP3:perf-5.10.0-207.0.0.116.oe2203sp3.x86_64",
					"openEuler-22.03-LTS-SP3:kernel-devel-5.10.0-207.0.0.116.oe2203sp3.x86_64",
					"openEuler-22.03-LTS-SP3:kernel-tools-devel-5.10.0-207.0.0.116.oe2203sp3.x86_64",
					"openEuler-22.03-LTS-SP3:kernel-debugsource-5.10.0-207.0.0.116.oe2203sp3.x86_64",
					"openEuler-22.03-LTS-SP3:kernel-tools-debuginfo-5.10.0-207.0.0.116.oe2203sp3.x86_64",
					"openEuler-22.03-LTS-SP3:kernel-5.10.0-207.0.0.116.oe2203sp3.x86_64",
					"openEuler-22.03-LTS-SP3:python3-perf-debuginfo-5.10.0-207.0.0.116.oe2203sp3.x86_64",
					"openEuler-22.03-LTS-SP3:perf-debuginfo-5.10.0-207.0.0.116.oe2203sp3.x86_64"
				]
			},
			"remediations":[
				{
					"product_ids":[
						"openEuler-22.03-LTS-SP3:perf-debuginfo-5.10.0-207.0.0.116.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:kernel-debuginfo-5.10.0-207.0.0.116.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:python3-perf-debuginfo-5.10.0-207.0.0.116.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:kernel-tools-debuginfo-5.10.0-207.0.0.116.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:kernel-tools-5.10.0-207.0.0.116.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:kernel-5.10.0-207.0.0.116.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:kernel-headers-5.10.0-207.0.0.116.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:kernel-devel-5.10.0-207.0.0.116.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:python3-perf-5.10.0-207.0.0.116.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:perf-5.10.0-207.0.0.116.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:kernel-tools-devel-5.10.0-207.0.0.116.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:kernel-debugsource-5.10.0-207.0.0.116.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:kernel-source-5.10.0-207.0.0.116.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:kernel-5.10.0-207.0.0.116.oe2203sp3.src",
						"openEuler-22.03-LTS-SP3:kernel-debuginfo-5.10.0-207.0.0.116.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:kernel-tools-5.10.0-207.0.0.116.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:python3-perf-5.10.0-207.0.0.116.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:kernel-source-5.10.0-207.0.0.116.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:kernel-headers-5.10.0-207.0.0.116.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:perf-5.10.0-207.0.0.116.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:kernel-devel-5.10.0-207.0.0.116.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:kernel-tools-devel-5.10.0-207.0.0.116.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:kernel-debugsource-5.10.0-207.0.0.116.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:kernel-tools-debuginfo-5.10.0-207.0.0.116.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:kernel-5.10.0-207.0.0.116.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:python3-perf-debuginfo-5.10.0-207.0.0.116.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:perf-debuginfo-5.10.0-207.0.0.116.oe2203sp3.x86_64"
					],
					"details":"kernel security update",
					"category":"vendor_fix",
					"url":"https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2024-1707"
				}
			],
			"scores":[
				{
					"cvss_v3":{
						"baseSeverity":"MEDIUM",
						"baseScore":5.5,
						"vectorString":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
						"version":"3.1"
					},
					"products":[
						"openEuler-22.03-LTS-SP3:perf-debuginfo-5.10.0-207.0.0.116.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:kernel-debuginfo-5.10.0-207.0.0.116.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:python3-perf-debuginfo-5.10.0-207.0.0.116.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:kernel-tools-debuginfo-5.10.0-207.0.0.116.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:kernel-tools-5.10.0-207.0.0.116.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:kernel-5.10.0-207.0.0.116.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:kernel-headers-5.10.0-207.0.0.116.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:kernel-devel-5.10.0-207.0.0.116.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:python3-perf-5.10.0-207.0.0.116.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:perf-5.10.0-207.0.0.116.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:kernel-tools-devel-5.10.0-207.0.0.116.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:kernel-debugsource-5.10.0-207.0.0.116.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:kernel-source-5.10.0-207.0.0.116.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:kernel-5.10.0-207.0.0.116.oe2203sp3.src",
						"openEuler-22.03-LTS-SP3:kernel-debuginfo-5.10.0-207.0.0.116.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:kernel-tools-5.10.0-207.0.0.116.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:python3-perf-5.10.0-207.0.0.116.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:kernel-source-5.10.0-207.0.0.116.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:kernel-headers-5.10.0-207.0.0.116.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:perf-5.10.0-207.0.0.116.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:kernel-devel-5.10.0-207.0.0.116.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:kernel-tools-devel-5.10.0-207.0.0.116.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:kernel-debugsource-5.10.0-207.0.0.116.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:kernel-tools-debuginfo-5.10.0-207.0.0.116.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:kernel-5.10.0-207.0.0.116.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:python3-perf-debuginfo-5.10.0-207.0.0.116.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:perf-debuginfo-5.10.0-207.0.0.116.oe2203sp3.x86_64"
					]
				}
			],
			"threats":[
				{
					"details":"Medium",
					"category":"impact"
				}
			],
			"title":"CVE-2024-35888"
		},
		{
			"cve":"CVE-2024-35895",
			"notes":[
				{
					"text":"In the Linux kernel, the following vulnerability has been resolved:\n\nbpf, sockmap: Prevent lock inversion deadlock in map delete elem\n\nsyzkaller started using corpuses where a BPF tracing program deletes\nelements from a sockmap/sockhash map. Because BPF tracing programs can be\ninvoked from any interrupt context, locks taken during a map_delete_elem\noperation must be hardirq-safe. Otherwise a deadlock due to lock inversion\nis possible, as reported by lockdep:\n\n       CPU0                    CPU1\n       ----                    ----\n  lock(&htab->buckets[i].lock);\n                               local_irq_disable();\n                               lock(&host->lock);\n                               lock(&htab->buckets[i].lock);\n  <Interrupt>\n    lock(&host->lock);\n\nLocks in sockmap are hardirq-unsafe by design. We expects elements to be\ndeleted from sockmap/sockhash only in task (normal) context with interrupts\nenabled, or in softirq context.\n\nDetect when map_delete_elem operation is invoked from a context which is\n_not_ hardirq-unsafe, that is interrupts are disabled, and bail out with an\nerror.\n\nNote that map updates are not affected by this issue. BPF verifier does not\nallow updating sockmap/sockhash from a BPF tracing program today.",
					"category":"description",
					"title":"Vulnerability Description"
				}
			],
			"product_status":{
				"fixed":[
					"openEuler-22.03-LTS-SP3:perf-debuginfo-5.10.0-207.0.0.116.oe2203sp3.aarch64",
					"openEuler-22.03-LTS-SP3:kernel-debuginfo-5.10.0-207.0.0.116.oe2203sp3.aarch64",
					"openEuler-22.03-LTS-SP3:python3-perf-debuginfo-5.10.0-207.0.0.116.oe2203sp3.aarch64",
					"openEuler-22.03-LTS-SP3:kernel-tools-debuginfo-5.10.0-207.0.0.116.oe2203sp3.aarch64",
					"openEuler-22.03-LTS-SP3:kernel-tools-5.10.0-207.0.0.116.oe2203sp3.aarch64",
					"openEuler-22.03-LTS-SP3:kernel-5.10.0-207.0.0.116.oe2203sp3.aarch64",
					"openEuler-22.03-LTS-SP3:kernel-headers-5.10.0-207.0.0.116.oe2203sp3.aarch64",
					"openEuler-22.03-LTS-SP3:kernel-devel-5.10.0-207.0.0.116.oe2203sp3.aarch64",
					"openEuler-22.03-LTS-SP3:python3-perf-5.10.0-207.0.0.116.oe2203sp3.aarch64",
					"openEuler-22.03-LTS-SP3:perf-5.10.0-207.0.0.116.oe2203sp3.aarch64",
					"openEuler-22.03-LTS-SP3:kernel-tools-devel-5.10.0-207.0.0.116.oe2203sp3.aarch64",
					"openEuler-22.03-LTS-SP3:kernel-debugsource-5.10.0-207.0.0.116.oe2203sp3.aarch64",
					"openEuler-22.03-LTS-SP3:kernel-source-5.10.0-207.0.0.116.oe2203sp3.aarch64",
					"openEuler-22.03-LTS-SP3:kernel-5.10.0-207.0.0.116.oe2203sp3.src",
					"openEuler-22.03-LTS-SP3:kernel-debuginfo-5.10.0-207.0.0.116.oe2203sp3.x86_64",
					"openEuler-22.03-LTS-SP3:kernel-tools-5.10.0-207.0.0.116.oe2203sp3.x86_64",
					"openEuler-22.03-LTS-SP3:python3-perf-5.10.0-207.0.0.116.oe2203sp3.x86_64",
					"openEuler-22.03-LTS-SP3:kernel-source-5.10.0-207.0.0.116.oe2203sp3.x86_64",
					"openEuler-22.03-LTS-SP3:kernel-headers-5.10.0-207.0.0.116.oe2203sp3.x86_64",
					"openEuler-22.03-LTS-SP3:perf-5.10.0-207.0.0.116.oe2203sp3.x86_64",
					"openEuler-22.03-LTS-SP3:kernel-devel-5.10.0-207.0.0.116.oe2203sp3.x86_64",
					"openEuler-22.03-LTS-SP3:kernel-tools-devel-5.10.0-207.0.0.116.oe2203sp3.x86_64",
					"openEuler-22.03-LTS-SP3:kernel-debugsource-5.10.0-207.0.0.116.oe2203sp3.x86_64",
					"openEuler-22.03-LTS-SP3:kernel-tools-debuginfo-5.10.0-207.0.0.116.oe2203sp3.x86_64",
					"openEuler-22.03-LTS-SP3:kernel-5.10.0-207.0.0.116.oe2203sp3.x86_64",
					"openEuler-22.03-LTS-SP3:python3-perf-debuginfo-5.10.0-207.0.0.116.oe2203sp3.x86_64",
					"openEuler-22.03-LTS-SP3:perf-debuginfo-5.10.0-207.0.0.116.oe2203sp3.x86_64"
				]
			},
			"remediations":[
				{
					"product_ids":[
						"openEuler-22.03-LTS-SP3:perf-debuginfo-5.10.0-207.0.0.116.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:kernel-debuginfo-5.10.0-207.0.0.116.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:python3-perf-debuginfo-5.10.0-207.0.0.116.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:kernel-tools-debuginfo-5.10.0-207.0.0.116.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:kernel-tools-5.10.0-207.0.0.116.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:kernel-5.10.0-207.0.0.116.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:kernel-headers-5.10.0-207.0.0.116.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:kernel-devel-5.10.0-207.0.0.116.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:python3-perf-5.10.0-207.0.0.116.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:perf-5.10.0-207.0.0.116.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:kernel-tools-devel-5.10.0-207.0.0.116.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:kernel-debugsource-5.10.0-207.0.0.116.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:kernel-source-5.10.0-207.0.0.116.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:kernel-5.10.0-207.0.0.116.oe2203sp3.src",
						"openEuler-22.03-LTS-SP3:kernel-debuginfo-5.10.0-207.0.0.116.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:kernel-tools-5.10.0-207.0.0.116.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:python3-perf-5.10.0-207.0.0.116.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:kernel-source-5.10.0-207.0.0.116.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:kernel-headers-5.10.0-207.0.0.116.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:perf-5.10.0-207.0.0.116.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:kernel-devel-5.10.0-207.0.0.116.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:kernel-tools-devel-5.10.0-207.0.0.116.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:kernel-debugsource-5.10.0-207.0.0.116.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:kernel-tools-debuginfo-5.10.0-207.0.0.116.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:kernel-5.10.0-207.0.0.116.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:python3-perf-debuginfo-5.10.0-207.0.0.116.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:perf-debuginfo-5.10.0-207.0.0.116.oe2203sp3.x86_64"
					],
					"details":"kernel security update",
					"category":"vendor_fix",
					"url":"https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2024-1707"
				}
			],
			"scores":[
				{
					"cvss_v3":{
						"baseSeverity":"MEDIUM",
						"baseScore":5.5,
						"vectorString":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
						"version":"3.1"
					},
					"products":[
						"openEuler-22.03-LTS-SP3:perf-debuginfo-5.10.0-207.0.0.116.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:kernel-debuginfo-5.10.0-207.0.0.116.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:python3-perf-debuginfo-5.10.0-207.0.0.116.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:kernel-tools-debuginfo-5.10.0-207.0.0.116.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:kernel-tools-5.10.0-207.0.0.116.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:kernel-5.10.0-207.0.0.116.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:kernel-headers-5.10.0-207.0.0.116.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:kernel-devel-5.10.0-207.0.0.116.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:python3-perf-5.10.0-207.0.0.116.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:perf-5.10.0-207.0.0.116.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:kernel-tools-devel-5.10.0-207.0.0.116.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:kernel-debugsource-5.10.0-207.0.0.116.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:kernel-source-5.10.0-207.0.0.116.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:kernel-5.10.0-207.0.0.116.oe2203sp3.src",
						"openEuler-22.03-LTS-SP3:kernel-debuginfo-5.10.0-207.0.0.116.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:kernel-tools-5.10.0-207.0.0.116.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:python3-perf-5.10.0-207.0.0.116.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:kernel-source-5.10.0-207.0.0.116.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:kernel-headers-5.10.0-207.0.0.116.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:perf-5.10.0-207.0.0.116.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:kernel-devel-5.10.0-207.0.0.116.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:kernel-tools-devel-5.10.0-207.0.0.116.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:kernel-debugsource-5.10.0-207.0.0.116.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:kernel-tools-debuginfo-5.10.0-207.0.0.116.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:kernel-5.10.0-207.0.0.116.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:python3-perf-debuginfo-5.10.0-207.0.0.116.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:perf-debuginfo-5.10.0-207.0.0.116.oe2203sp3.x86_64"
					]
				}
			],
			"threats":[
				{
					"details":"Medium",
					"category":"impact"
				}
			],
			"title":"CVE-2024-35895"
		},
		{
			"cve":"CVE-2024-35896",
			"notes":[
				{
					"text":"In the Linux kernel, the following vulnerability has been resolved:\n\nnetfilter: validate user input for expected length\n\nI got multiple syzbot reports showing old bugs exposed\nby BPF after commit 20f2505fb436 (\"bpf: Try to avoid kzalloc\nin cgroup/{s,g}etsockopt\")\n\nsetsockopt() @optlen argument should be taken into account\nbefore copying data.\n\n BUG: KASAN: slab-out-of-bounds in copy_from_sockptr_offset include/linux/sockptr.h:49 [inline]\n BUG: KASAN: slab-out-of-bounds in copy_from_sockptr include/linux/sockptr.h:55 [inline]\n BUG: KASAN: slab-out-of-bounds in do_replace net/ipv4/netfilter/ip_tables.c:1111 [inline]\n BUG: KASAN: slab-out-of-bounds in do_ipt_set_ctl+0x902/0x3dd0 net/ipv4/netfilter/ip_tables.c:1627\nRead of size 96 at addr ffff88802cd73da0 by task syz-executor.4/7238\n\nCPU: 1 PID: 7238 Comm: syz-executor.4 Not tainted 6.9.0-rc2-next-20240403-syzkaller #0\nHardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 03/27/2024\nCall Trace:\n <TASK>\n  __dump_stack lib/dump_stack.c:88 [inline]\n  dump_stack_lvl+0x241/0x360 lib/dump_stack.c:114\n  print_address_description mm/kasan/report.c:377 [inline]\n  print_report+0x169/0x550 mm/kasan/report.c:488\n  kasan_report+0x143/0x180 mm/kasan/report.c:601\n  kasan_check_range+0x282/0x290 mm/kasan/generic.c:189\n  __asan_memcpy+0x29/0x70 mm/kasan/shadow.c:105\n  copy_from_sockptr_offset include/linux/sockptr.h:49 [inline]\n  copy_from_sockptr include/linux/sockptr.h:55 [inline]\n  do_replace net/ipv4/netfilter/ip_tables.c:1111 [inline]\n  do_ipt_set_ctl+0x902/0x3dd0 net/ipv4/netfilter/ip_tables.c:1627\n  nf_setsockopt+0x295/0x2c0 net/netfilter/nf_sockopt.c:101\n  do_sock_setsockopt+0x3af/0x720 net/socket.c:2311\n  __sys_setsockopt+0x1ae/0x250 net/socket.c:2334\n  __do_sys_setsockopt net/socket.c:2343 [inline]\n  __se_sys_setsockopt net/socket.c:2340 [inline]\n  __x64_sys_setsockopt+0xb5/0xd0 net/socket.c:2340\n do_syscall_64+0xfb/0x240\n entry_SYSCALL_64_after_hwframe+0x72/0x7a\nRIP: 0033:0x7fd22067dde9\nCode: 28 00 00 00 75 05 48 83 c4 28 c3 e8 e1 20 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b0 ff ff ff f7 d8 64 89 01 48\nRSP: 002b:00007fd21f9ff0c8 EFLAGS: 00000246 ORIG_RAX: 0000000000000036\nRAX: ffffffffffffffda RBX: 00007fd2207abf80 RCX: 00007fd22067dde9\nRDX: 0000000000000040 RSI: 0000000000000000 RDI: 0000000000000003\nRBP: 00007fd2206ca47a R08: 0000000000000001 R09: 0000000000000000\nR10: 0000000020000880 R11: 0000000000000246 R12: 0000000000000000\nR13: 000000000000000b R14: 00007fd2207abf80 R15: 00007ffd2d0170d8\n </TASK>\n\nAllocated by task 7238:\n  kasan_save_stack mm/kasan/common.c:47 [inline]\n  kasan_save_track+0x3f/0x80 mm/kasan/common.c:68\n  poison_kmalloc_redzone mm/kasan/common.c:370 [inline]\n  __kasan_kmalloc+0x98/0xb0 mm/kasan/common.c:387\n  kasan_kmalloc include/linux/kasan.h:211 [inline]\n  __do_kmalloc_node mm/slub.c:4069 [inline]\n  __kmalloc_noprof+0x200/0x410 mm/slub.c:4082\n  kmalloc_noprof include/linux/slab.h:664 [inline]\n  __cgroup_bpf_run_filter_setsockopt+0xd47/0x1050 kernel/bpf/cgroup.c:1869\n  do_sock_setsockopt+0x6b4/0x720 net/socket.c:2293\n  __sys_setsockopt+0x1ae/0x250 net/socket.c:2334\n  __do_sys_setsockopt net/socket.c:2343 [inline]\n  __se_sys_setsockopt net/socket.c:2340 [inline]\n  __x64_sys_setsockopt+0xb5/0xd0 net/socket.c:2340\n do_syscall_64+0xfb/0x240\n entry_SYSCALL_64_after_hwframe+0x72/0x7a\n\nThe buggy address belongs to the object at ffff88802cd73da0\n which belongs to the cache kmalloc-8 of size 8\nThe buggy address is located 0 bytes inside of\n allocated 1-byte region [ffff88802cd73da0, ffff88802cd73da1)\n\nThe buggy address belongs to the physical page:\npage: refcount:1 mapcount:0 mapping:0000000000000000 index:0xffff88802cd73020 pfn:0x2cd73\nflags: 0xfff80000000000(node=0|zone=1|lastcpupid=0xfff)\npage_type: 0xffffefff(slab)\nraw: 00fff80000000000 ffff888015041280 dead000000000100 dead000000000122\nraw: ffff88802cd73020 000000008080007f 00000001ffffefff 00\n---truncated---",
					"category":"description",
					"title":"Vulnerability Description"
				}
			],
			"product_status":{
				"fixed":[
					"openEuler-22.03-LTS-SP3:perf-debuginfo-5.10.0-207.0.0.116.oe2203sp3.aarch64",
					"openEuler-22.03-LTS-SP3:kernel-debuginfo-5.10.0-207.0.0.116.oe2203sp3.aarch64",
					"openEuler-22.03-LTS-SP3:python3-perf-debuginfo-5.10.0-207.0.0.116.oe2203sp3.aarch64",
					"openEuler-22.03-LTS-SP3:kernel-tools-debuginfo-5.10.0-207.0.0.116.oe2203sp3.aarch64",
					"openEuler-22.03-LTS-SP3:kernel-tools-5.10.0-207.0.0.116.oe2203sp3.aarch64",
					"openEuler-22.03-LTS-SP3:kernel-5.10.0-207.0.0.116.oe2203sp3.aarch64",
					"openEuler-22.03-LTS-SP3:kernel-headers-5.10.0-207.0.0.116.oe2203sp3.aarch64",
					"openEuler-22.03-LTS-SP3:kernel-devel-5.10.0-207.0.0.116.oe2203sp3.aarch64",
					"openEuler-22.03-LTS-SP3:python3-perf-5.10.0-207.0.0.116.oe2203sp3.aarch64",
					"openEuler-22.03-LTS-SP3:perf-5.10.0-207.0.0.116.oe2203sp3.aarch64",
					"openEuler-22.03-LTS-SP3:kernel-tools-devel-5.10.0-207.0.0.116.oe2203sp3.aarch64",
					"openEuler-22.03-LTS-SP3:kernel-debugsource-5.10.0-207.0.0.116.oe2203sp3.aarch64",
					"openEuler-22.03-LTS-SP3:kernel-source-5.10.0-207.0.0.116.oe2203sp3.aarch64",
					"openEuler-22.03-LTS-SP3:kernel-5.10.0-207.0.0.116.oe2203sp3.src",
					"openEuler-22.03-LTS-SP3:kernel-debuginfo-5.10.0-207.0.0.116.oe2203sp3.x86_64",
					"openEuler-22.03-LTS-SP3:kernel-tools-5.10.0-207.0.0.116.oe2203sp3.x86_64",
					"openEuler-22.03-LTS-SP3:python3-perf-5.10.0-207.0.0.116.oe2203sp3.x86_64",
					"openEuler-22.03-LTS-SP3:kernel-source-5.10.0-207.0.0.116.oe2203sp3.x86_64",
					"openEuler-22.03-LTS-SP3:kernel-headers-5.10.0-207.0.0.116.oe2203sp3.x86_64",
					"openEuler-22.03-LTS-SP3:perf-5.10.0-207.0.0.116.oe2203sp3.x86_64",
					"openEuler-22.03-LTS-SP3:kernel-devel-5.10.0-207.0.0.116.oe2203sp3.x86_64",
					"openEuler-22.03-LTS-SP3:kernel-tools-devel-5.10.0-207.0.0.116.oe2203sp3.x86_64",
					"openEuler-22.03-LTS-SP3:kernel-debugsource-5.10.0-207.0.0.116.oe2203sp3.x86_64",
					"openEuler-22.03-LTS-SP3:kernel-tools-debuginfo-5.10.0-207.0.0.116.oe2203sp3.x86_64",
					"openEuler-22.03-LTS-SP3:kernel-5.10.0-207.0.0.116.oe2203sp3.x86_64",
					"openEuler-22.03-LTS-SP3:python3-perf-debuginfo-5.10.0-207.0.0.116.oe2203sp3.x86_64",
					"openEuler-22.03-LTS-SP3:perf-debuginfo-5.10.0-207.0.0.116.oe2203sp3.x86_64"
				]
			},
			"remediations":[
				{
					"product_ids":[
						"openEuler-22.03-LTS-SP3:perf-debuginfo-5.10.0-207.0.0.116.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:kernel-debuginfo-5.10.0-207.0.0.116.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:python3-perf-debuginfo-5.10.0-207.0.0.116.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:kernel-tools-debuginfo-5.10.0-207.0.0.116.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:kernel-tools-5.10.0-207.0.0.116.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:kernel-5.10.0-207.0.0.116.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:kernel-headers-5.10.0-207.0.0.116.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:kernel-devel-5.10.0-207.0.0.116.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:python3-perf-5.10.0-207.0.0.116.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:perf-5.10.0-207.0.0.116.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:kernel-tools-devel-5.10.0-207.0.0.116.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:kernel-debugsource-5.10.0-207.0.0.116.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:kernel-source-5.10.0-207.0.0.116.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:kernel-5.10.0-207.0.0.116.oe2203sp3.src",
						"openEuler-22.03-LTS-SP3:kernel-debuginfo-5.10.0-207.0.0.116.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:kernel-tools-5.10.0-207.0.0.116.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:python3-perf-5.10.0-207.0.0.116.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:kernel-source-5.10.0-207.0.0.116.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:kernel-headers-5.10.0-207.0.0.116.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:perf-5.10.0-207.0.0.116.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:kernel-devel-5.10.0-207.0.0.116.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:kernel-tools-devel-5.10.0-207.0.0.116.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:kernel-debugsource-5.10.0-207.0.0.116.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:kernel-tools-debuginfo-5.10.0-207.0.0.116.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:kernel-5.10.0-207.0.0.116.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:python3-perf-debuginfo-5.10.0-207.0.0.116.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:perf-debuginfo-5.10.0-207.0.0.116.oe2203sp3.x86_64"
					],
					"details":"kernel security update",
					"category":"vendor_fix",
					"url":"https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2024-1707"
				}
			],
			"scores":[
				{
					"cvss_v3":{
						"baseSeverity":"MEDIUM",
						"baseScore":5.5,
						"vectorString":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
						"version":"3.1"
					},
					"products":[
						"openEuler-22.03-LTS-SP3:perf-debuginfo-5.10.0-207.0.0.116.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:kernel-debuginfo-5.10.0-207.0.0.116.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:python3-perf-debuginfo-5.10.0-207.0.0.116.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:kernel-tools-debuginfo-5.10.0-207.0.0.116.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:kernel-tools-5.10.0-207.0.0.116.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:kernel-5.10.0-207.0.0.116.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:kernel-headers-5.10.0-207.0.0.116.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:kernel-devel-5.10.0-207.0.0.116.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:python3-perf-5.10.0-207.0.0.116.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:perf-5.10.0-207.0.0.116.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:kernel-tools-devel-5.10.0-207.0.0.116.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:kernel-debugsource-5.10.0-207.0.0.116.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:kernel-source-5.10.0-207.0.0.116.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:kernel-5.10.0-207.0.0.116.oe2203sp3.src",
						"openEuler-22.03-LTS-SP3:kernel-debuginfo-5.10.0-207.0.0.116.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:kernel-tools-5.10.0-207.0.0.116.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:python3-perf-5.10.0-207.0.0.116.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:kernel-source-5.10.0-207.0.0.116.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:kernel-headers-5.10.0-207.0.0.116.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:perf-5.10.0-207.0.0.116.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:kernel-devel-5.10.0-207.0.0.116.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:kernel-tools-devel-5.10.0-207.0.0.116.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:kernel-debugsource-5.10.0-207.0.0.116.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:kernel-tools-debuginfo-5.10.0-207.0.0.116.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:kernel-5.10.0-207.0.0.116.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:python3-perf-debuginfo-5.10.0-207.0.0.116.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:perf-debuginfo-5.10.0-207.0.0.116.oe2203sp3.x86_64"
					]
				}
			],
			"threats":[
				{
					"details":"Medium",
					"category":"impact"
				}
			],
			"title":"CVE-2024-35896"
		},
		{
			"cve":"CVE-2024-35905",
			"notes":[
				{
					"text":"In the Linux kernel, the following vulnerability has been resolved:\n\nbpf: Protect against int overflow for stack access size\n\nThis patch re-introduces protection against the size of access to stack\nmemory being negative; the access size can appear negative as a result\nof overflowing its signed int representation. This should not actually\nhappen, as there are other protections along the way, but we should\nprotect against it anyway. One code path was missing such protections\n(fixed in the previous patch in the series), causing out-of-bounds array\naccesses in check_stack_range_initialized(). This patch causes the\nverification of a program with such a non-sensical access size to fail.\n\nThis check used to exist in a more indirect way, but was inadvertendly\nremoved in a833a17aeac7.",
					"category":"description",
					"title":"Vulnerability Description"
				}
			],
			"product_status":{
				"fixed":[
					"openEuler-22.03-LTS-SP3:perf-debuginfo-5.10.0-207.0.0.116.oe2203sp3.aarch64",
					"openEuler-22.03-LTS-SP3:kernel-debuginfo-5.10.0-207.0.0.116.oe2203sp3.aarch64",
					"openEuler-22.03-LTS-SP3:python3-perf-debuginfo-5.10.0-207.0.0.116.oe2203sp3.aarch64",
					"openEuler-22.03-LTS-SP3:kernel-tools-debuginfo-5.10.0-207.0.0.116.oe2203sp3.aarch64",
					"openEuler-22.03-LTS-SP3:kernel-tools-5.10.0-207.0.0.116.oe2203sp3.aarch64",
					"openEuler-22.03-LTS-SP3:kernel-5.10.0-207.0.0.116.oe2203sp3.aarch64",
					"openEuler-22.03-LTS-SP3:kernel-headers-5.10.0-207.0.0.116.oe2203sp3.aarch64",
					"openEuler-22.03-LTS-SP3:kernel-devel-5.10.0-207.0.0.116.oe2203sp3.aarch64",
					"openEuler-22.03-LTS-SP3:python3-perf-5.10.0-207.0.0.116.oe2203sp3.aarch64",
					"openEuler-22.03-LTS-SP3:perf-5.10.0-207.0.0.116.oe2203sp3.aarch64",
					"openEuler-22.03-LTS-SP3:kernel-tools-devel-5.10.0-207.0.0.116.oe2203sp3.aarch64",
					"openEuler-22.03-LTS-SP3:kernel-debugsource-5.10.0-207.0.0.116.oe2203sp3.aarch64",
					"openEuler-22.03-LTS-SP3:kernel-source-5.10.0-207.0.0.116.oe2203sp3.aarch64",
					"openEuler-22.03-LTS-SP3:kernel-5.10.0-207.0.0.116.oe2203sp3.src",
					"openEuler-22.03-LTS-SP3:kernel-debuginfo-5.10.0-207.0.0.116.oe2203sp3.x86_64",
					"openEuler-22.03-LTS-SP3:kernel-tools-5.10.0-207.0.0.116.oe2203sp3.x86_64",
					"openEuler-22.03-LTS-SP3:python3-perf-5.10.0-207.0.0.116.oe2203sp3.x86_64",
					"openEuler-22.03-LTS-SP3:kernel-source-5.10.0-207.0.0.116.oe2203sp3.x86_64",
					"openEuler-22.03-LTS-SP3:kernel-headers-5.10.0-207.0.0.116.oe2203sp3.x86_64",
					"openEuler-22.03-LTS-SP3:perf-5.10.0-207.0.0.116.oe2203sp3.x86_64",
					"openEuler-22.03-LTS-SP3:kernel-devel-5.10.0-207.0.0.116.oe2203sp3.x86_64",
					"openEuler-22.03-LTS-SP3:kernel-tools-devel-5.10.0-207.0.0.116.oe2203sp3.x86_64",
					"openEuler-22.03-LTS-SP3:kernel-debugsource-5.10.0-207.0.0.116.oe2203sp3.x86_64",
					"openEuler-22.03-LTS-SP3:kernel-tools-debuginfo-5.10.0-207.0.0.116.oe2203sp3.x86_64",
					"openEuler-22.03-LTS-SP3:kernel-5.10.0-207.0.0.116.oe2203sp3.x86_64",
					"openEuler-22.03-LTS-SP3:python3-perf-debuginfo-5.10.0-207.0.0.116.oe2203sp3.x86_64",
					"openEuler-22.03-LTS-SP3:perf-debuginfo-5.10.0-207.0.0.116.oe2203sp3.x86_64"
				]
			},
			"remediations":[
				{
					"product_ids":[
						"openEuler-22.03-LTS-SP3:perf-debuginfo-5.10.0-207.0.0.116.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:kernel-debuginfo-5.10.0-207.0.0.116.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:python3-perf-debuginfo-5.10.0-207.0.0.116.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:kernel-tools-debuginfo-5.10.0-207.0.0.116.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:kernel-tools-5.10.0-207.0.0.116.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:kernel-5.10.0-207.0.0.116.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:kernel-headers-5.10.0-207.0.0.116.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:kernel-devel-5.10.0-207.0.0.116.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:python3-perf-5.10.0-207.0.0.116.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:perf-5.10.0-207.0.0.116.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:kernel-tools-devel-5.10.0-207.0.0.116.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:kernel-debugsource-5.10.0-207.0.0.116.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:kernel-source-5.10.0-207.0.0.116.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:kernel-5.10.0-207.0.0.116.oe2203sp3.src",
						"openEuler-22.03-LTS-SP3:kernel-debuginfo-5.10.0-207.0.0.116.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:kernel-tools-5.10.0-207.0.0.116.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:python3-perf-5.10.0-207.0.0.116.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:kernel-source-5.10.0-207.0.0.116.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:kernel-headers-5.10.0-207.0.0.116.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:perf-5.10.0-207.0.0.116.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:kernel-devel-5.10.0-207.0.0.116.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:kernel-tools-devel-5.10.0-207.0.0.116.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:kernel-debugsource-5.10.0-207.0.0.116.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:kernel-tools-debuginfo-5.10.0-207.0.0.116.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:kernel-5.10.0-207.0.0.116.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:python3-perf-debuginfo-5.10.0-207.0.0.116.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:perf-debuginfo-5.10.0-207.0.0.116.oe2203sp3.x86_64"
					],
					"details":"kernel security update",
					"category":"vendor_fix",
					"url":"https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2024-1707"
				}
			],
			"scores":[
				{
					"cvss_v3":{
						"baseSeverity":"HIGH",
						"baseScore":7.8,
						"vectorString":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
						"version":"3.1"
					},
					"products":[
						"openEuler-22.03-LTS-SP3:perf-debuginfo-5.10.0-207.0.0.116.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:kernel-debuginfo-5.10.0-207.0.0.116.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:python3-perf-debuginfo-5.10.0-207.0.0.116.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:kernel-tools-debuginfo-5.10.0-207.0.0.116.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:kernel-tools-5.10.0-207.0.0.116.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:kernel-5.10.0-207.0.0.116.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:kernel-headers-5.10.0-207.0.0.116.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:kernel-devel-5.10.0-207.0.0.116.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:python3-perf-5.10.0-207.0.0.116.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:perf-5.10.0-207.0.0.116.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:kernel-tools-devel-5.10.0-207.0.0.116.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:kernel-debugsource-5.10.0-207.0.0.116.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:kernel-source-5.10.0-207.0.0.116.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:kernel-5.10.0-207.0.0.116.oe2203sp3.src",
						"openEuler-22.03-LTS-SP3:kernel-debuginfo-5.10.0-207.0.0.116.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:kernel-tools-5.10.0-207.0.0.116.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:python3-perf-5.10.0-207.0.0.116.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:kernel-source-5.10.0-207.0.0.116.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:kernel-headers-5.10.0-207.0.0.116.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:perf-5.10.0-207.0.0.116.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:kernel-devel-5.10.0-207.0.0.116.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:kernel-tools-devel-5.10.0-207.0.0.116.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:kernel-debugsource-5.10.0-207.0.0.116.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:kernel-tools-debuginfo-5.10.0-207.0.0.116.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:kernel-5.10.0-207.0.0.116.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:python3-perf-debuginfo-5.10.0-207.0.0.116.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:perf-debuginfo-5.10.0-207.0.0.116.oe2203sp3.x86_64"
					]
				}
			],
			"threats":[
				{
					"details":"High",
					"category":"impact"
				}
			],
			"title":"CVE-2024-35905"
		},
		{
			"cve":"CVE-2024-35924",
			"notes":[
				{
					"text":"In the Linux kernel, the following vulnerability has been resolved:\n\nusb: typec: ucsi: Limit read size on v1.2\n\nBetween UCSI 1.2 and UCSI 2.0, the size of the MESSAGE_IN region was\nincreased from 16 to 256. In order to avoid overflowing reads for older\nsystems, add a mechanism to use the read UCSI version to truncate read\nsizes on UCSI v1.2.",
					"category":"description",
					"title":"Vulnerability Description"
				}
			],
			"product_status":{
				"fixed":[
					"openEuler-22.03-LTS-SP3:perf-debuginfo-5.10.0-207.0.0.116.oe2203sp3.aarch64",
					"openEuler-22.03-LTS-SP3:kernel-debuginfo-5.10.0-207.0.0.116.oe2203sp3.aarch64",
					"openEuler-22.03-LTS-SP3:python3-perf-debuginfo-5.10.0-207.0.0.116.oe2203sp3.aarch64",
					"openEuler-22.03-LTS-SP3:kernel-tools-debuginfo-5.10.0-207.0.0.116.oe2203sp3.aarch64",
					"openEuler-22.03-LTS-SP3:kernel-tools-5.10.0-207.0.0.116.oe2203sp3.aarch64",
					"openEuler-22.03-LTS-SP3:kernel-5.10.0-207.0.0.116.oe2203sp3.aarch64",
					"openEuler-22.03-LTS-SP3:kernel-headers-5.10.0-207.0.0.116.oe2203sp3.aarch64",
					"openEuler-22.03-LTS-SP3:kernel-devel-5.10.0-207.0.0.116.oe2203sp3.aarch64",
					"openEuler-22.03-LTS-SP3:python3-perf-5.10.0-207.0.0.116.oe2203sp3.aarch64",
					"openEuler-22.03-LTS-SP3:perf-5.10.0-207.0.0.116.oe2203sp3.aarch64",
					"openEuler-22.03-LTS-SP3:kernel-tools-devel-5.10.0-207.0.0.116.oe2203sp3.aarch64",
					"openEuler-22.03-LTS-SP3:kernel-debugsource-5.10.0-207.0.0.116.oe2203sp3.aarch64",
					"openEuler-22.03-LTS-SP3:kernel-source-5.10.0-207.0.0.116.oe2203sp3.aarch64",
					"openEuler-22.03-LTS-SP3:kernel-5.10.0-207.0.0.116.oe2203sp3.src",
					"openEuler-22.03-LTS-SP3:kernel-debuginfo-5.10.0-207.0.0.116.oe2203sp3.x86_64",
					"openEuler-22.03-LTS-SP3:kernel-tools-5.10.0-207.0.0.116.oe2203sp3.x86_64",
					"openEuler-22.03-LTS-SP3:python3-perf-5.10.0-207.0.0.116.oe2203sp3.x86_64",
					"openEuler-22.03-LTS-SP3:kernel-source-5.10.0-207.0.0.116.oe2203sp3.x86_64",
					"openEuler-22.03-LTS-SP3:kernel-headers-5.10.0-207.0.0.116.oe2203sp3.x86_64",
					"openEuler-22.03-LTS-SP3:perf-5.10.0-207.0.0.116.oe2203sp3.x86_64",
					"openEuler-22.03-LTS-SP3:kernel-devel-5.10.0-207.0.0.116.oe2203sp3.x86_64",
					"openEuler-22.03-LTS-SP3:kernel-tools-devel-5.10.0-207.0.0.116.oe2203sp3.x86_64",
					"openEuler-22.03-LTS-SP3:kernel-debugsource-5.10.0-207.0.0.116.oe2203sp3.x86_64",
					"openEuler-22.03-LTS-SP3:kernel-tools-debuginfo-5.10.0-207.0.0.116.oe2203sp3.x86_64",
					"openEuler-22.03-LTS-SP3:kernel-5.10.0-207.0.0.116.oe2203sp3.x86_64",
					"openEuler-22.03-LTS-SP3:python3-perf-debuginfo-5.10.0-207.0.0.116.oe2203sp3.x86_64",
					"openEuler-22.03-LTS-SP3:perf-debuginfo-5.10.0-207.0.0.116.oe2203sp3.x86_64"
				]
			},
			"remediations":[
				{
					"product_ids":[
						"openEuler-22.03-LTS-SP3:perf-debuginfo-5.10.0-207.0.0.116.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:kernel-debuginfo-5.10.0-207.0.0.116.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:python3-perf-debuginfo-5.10.0-207.0.0.116.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:kernel-tools-debuginfo-5.10.0-207.0.0.116.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:kernel-tools-5.10.0-207.0.0.116.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:kernel-5.10.0-207.0.0.116.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:kernel-headers-5.10.0-207.0.0.116.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:kernel-devel-5.10.0-207.0.0.116.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:python3-perf-5.10.0-207.0.0.116.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:perf-5.10.0-207.0.0.116.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:kernel-tools-devel-5.10.0-207.0.0.116.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:kernel-debugsource-5.10.0-207.0.0.116.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:kernel-source-5.10.0-207.0.0.116.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:kernel-5.10.0-207.0.0.116.oe2203sp3.src",
						"openEuler-22.03-LTS-SP3:kernel-debuginfo-5.10.0-207.0.0.116.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:kernel-tools-5.10.0-207.0.0.116.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:python3-perf-5.10.0-207.0.0.116.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:kernel-source-5.10.0-207.0.0.116.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:kernel-headers-5.10.0-207.0.0.116.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:perf-5.10.0-207.0.0.116.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:kernel-devel-5.10.0-207.0.0.116.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:kernel-tools-devel-5.10.0-207.0.0.116.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:kernel-debugsource-5.10.0-207.0.0.116.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:kernel-tools-debuginfo-5.10.0-207.0.0.116.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:kernel-5.10.0-207.0.0.116.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:python3-perf-debuginfo-5.10.0-207.0.0.116.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:perf-debuginfo-5.10.0-207.0.0.116.oe2203sp3.x86_64"
					],
					"details":"kernel security update",
					"category":"vendor_fix",
					"url":"https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2024-1707"
				}
			],
			"scores":[
				{
					"cvss_v3":{
						"baseSeverity":"MEDIUM",
						"baseScore":5.5,
						"vectorString":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
						"version":"3.1"
					},
					"products":[
						"openEuler-22.03-LTS-SP3:perf-debuginfo-5.10.0-207.0.0.116.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:kernel-debuginfo-5.10.0-207.0.0.116.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:python3-perf-debuginfo-5.10.0-207.0.0.116.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:kernel-tools-debuginfo-5.10.0-207.0.0.116.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:kernel-tools-5.10.0-207.0.0.116.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:kernel-5.10.0-207.0.0.116.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:kernel-headers-5.10.0-207.0.0.116.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:kernel-devel-5.10.0-207.0.0.116.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:python3-perf-5.10.0-207.0.0.116.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:perf-5.10.0-207.0.0.116.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:kernel-tools-devel-5.10.0-207.0.0.116.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:kernel-debugsource-5.10.0-207.0.0.116.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:kernel-source-5.10.0-207.0.0.116.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:kernel-5.10.0-207.0.0.116.oe2203sp3.src",
						"openEuler-22.03-LTS-SP3:kernel-debuginfo-5.10.0-207.0.0.116.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:kernel-tools-5.10.0-207.0.0.116.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:python3-perf-5.10.0-207.0.0.116.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:kernel-source-5.10.0-207.0.0.116.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:kernel-headers-5.10.0-207.0.0.116.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:perf-5.10.0-207.0.0.116.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:kernel-devel-5.10.0-207.0.0.116.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:kernel-tools-devel-5.10.0-207.0.0.116.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:kernel-debugsource-5.10.0-207.0.0.116.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:kernel-tools-debuginfo-5.10.0-207.0.0.116.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:kernel-5.10.0-207.0.0.116.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:python3-perf-debuginfo-5.10.0-207.0.0.116.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:perf-debuginfo-5.10.0-207.0.0.116.oe2203sp3.x86_64"
					]
				}
			],
			"threats":[
				{
					"details":"Medium",
					"category":"impact"
				}
			],
			"title":"CVE-2024-35924"
		},
		{
			"cve":"CVE-2024-35967",
			"notes":[
				{
					"text":"In the Linux kernel, the following vulnerability has been resolved:\n\nBluetooth: SCO: Fix not validating setsockopt user input\n\nsyzbot reported sco_sock_setsockopt() is copying data without\nchecking user input length.\n\nBUG: KASAN: slab-out-of-bounds in copy_from_sockptr_offset\ninclude/linux/sockptr.h:49 [inline]\nBUG: KASAN: slab-out-of-bounds in copy_from_sockptr\ninclude/linux/sockptr.h:55 [inline]\nBUG: KASAN: slab-out-of-bounds in sco_sock_setsockopt+0xc0b/0xf90\nnet/bluetooth/sco.c:893\nRead of size 4 at addr ffff88805f7b15a3 by task syz-executor.5/12578",
					"category":"description",
					"title":"Vulnerability Description"
				}
			],
			"product_status":{
				"fixed":[
					"openEuler-22.03-LTS-SP3:perf-debuginfo-5.10.0-207.0.0.116.oe2203sp3.aarch64",
					"openEuler-22.03-LTS-SP3:kernel-debuginfo-5.10.0-207.0.0.116.oe2203sp3.aarch64",
					"openEuler-22.03-LTS-SP3:python3-perf-debuginfo-5.10.0-207.0.0.116.oe2203sp3.aarch64",
					"openEuler-22.03-LTS-SP3:kernel-tools-debuginfo-5.10.0-207.0.0.116.oe2203sp3.aarch64",
					"openEuler-22.03-LTS-SP3:kernel-tools-5.10.0-207.0.0.116.oe2203sp3.aarch64",
					"openEuler-22.03-LTS-SP3:kernel-5.10.0-207.0.0.116.oe2203sp3.aarch64",
					"openEuler-22.03-LTS-SP3:kernel-headers-5.10.0-207.0.0.116.oe2203sp3.aarch64",
					"openEuler-22.03-LTS-SP3:kernel-devel-5.10.0-207.0.0.116.oe2203sp3.aarch64",
					"openEuler-22.03-LTS-SP3:python3-perf-5.10.0-207.0.0.116.oe2203sp3.aarch64",
					"openEuler-22.03-LTS-SP3:perf-5.10.0-207.0.0.116.oe2203sp3.aarch64",
					"openEuler-22.03-LTS-SP3:kernel-tools-devel-5.10.0-207.0.0.116.oe2203sp3.aarch64",
					"openEuler-22.03-LTS-SP3:kernel-debugsource-5.10.0-207.0.0.116.oe2203sp3.aarch64",
					"openEuler-22.03-LTS-SP3:kernel-source-5.10.0-207.0.0.116.oe2203sp3.aarch64",
					"openEuler-22.03-LTS-SP3:kernel-5.10.0-207.0.0.116.oe2203sp3.src",
					"openEuler-22.03-LTS-SP3:kernel-debuginfo-5.10.0-207.0.0.116.oe2203sp3.x86_64",
					"openEuler-22.03-LTS-SP3:kernel-tools-5.10.0-207.0.0.116.oe2203sp3.x86_64",
					"openEuler-22.03-LTS-SP3:python3-perf-5.10.0-207.0.0.116.oe2203sp3.x86_64",
					"openEuler-22.03-LTS-SP3:kernel-source-5.10.0-207.0.0.116.oe2203sp3.x86_64",
					"openEuler-22.03-LTS-SP3:kernel-headers-5.10.0-207.0.0.116.oe2203sp3.x86_64",
					"openEuler-22.03-LTS-SP3:perf-5.10.0-207.0.0.116.oe2203sp3.x86_64",
					"openEuler-22.03-LTS-SP3:kernel-devel-5.10.0-207.0.0.116.oe2203sp3.x86_64",
					"openEuler-22.03-LTS-SP3:kernel-tools-devel-5.10.0-207.0.0.116.oe2203sp3.x86_64",
					"openEuler-22.03-LTS-SP3:kernel-debugsource-5.10.0-207.0.0.116.oe2203sp3.x86_64",
					"openEuler-22.03-LTS-SP3:kernel-tools-debuginfo-5.10.0-207.0.0.116.oe2203sp3.x86_64",
					"openEuler-22.03-LTS-SP3:kernel-5.10.0-207.0.0.116.oe2203sp3.x86_64",
					"openEuler-22.03-LTS-SP3:python3-perf-debuginfo-5.10.0-207.0.0.116.oe2203sp3.x86_64",
					"openEuler-22.03-LTS-SP3:perf-debuginfo-5.10.0-207.0.0.116.oe2203sp3.x86_64"
				]
			},
			"remediations":[
				{
					"product_ids":[
						"openEuler-22.03-LTS-SP3:perf-debuginfo-5.10.0-207.0.0.116.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:kernel-debuginfo-5.10.0-207.0.0.116.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:python3-perf-debuginfo-5.10.0-207.0.0.116.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:kernel-tools-debuginfo-5.10.0-207.0.0.116.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:kernel-tools-5.10.0-207.0.0.116.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:kernel-5.10.0-207.0.0.116.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:kernel-headers-5.10.0-207.0.0.116.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:kernel-devel-5.10.0-207.0.0.116.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:python3-perf-5.10.0-207.0.0.116.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:perf-5.10.0-207.0.0.116.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:kernel-tools-devel-5.10.0-207.0.0.116.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:kernel-debugsource-5.10.0-207.0.0.116.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:kernel-source-5.10.0-207.0.0.116.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:kernel-5.10.0-207.0.0.116.oe2203sp3.src",
						"openEuler-22.03-LTS-SP3:kernel-debuginfo-5.10.0-207.0.0.116.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:kernel-tools-5.10.0-207.0.0.116.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:python3-perf-5.10.0-207.0.0.116.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:kernel-source-5.10.0-207.0.0.116.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:kernel-headers-5.10.0-207.0.0.116.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:perf-5.10.0-207.0.0.116.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:kernel-devel-5.10.0-207.0.0.116.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:kernel-tools-devel-5.10.0-207.0.0.116.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:kernel-debugsource-5.10.0-207.0.0.116.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:kernel-tools-debuginfo-5.10.0-207.0.0.116.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:kernel-5.10.0-207.0.0.116.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:python3-perf-debuginfo-5.10.0-207.0.0.116.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:perf-debuginfo-5.10.0-207.0.0.116.oe2203sp3.x86_64"
					],
					"details":"kernel security update",
					"category":"vendor_fix",
					"url":"https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2024-1707"
				}
			],
			"scores":[
				{
					"cvss_v3":{
						"baseSeverity":"MEDIUM",
						"baseScore":5.5,
						"vectorString":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
						"version":"3.1"
					},
					"products":[
						"openEuler-22.03-LTS-SP3:perf-debuginfo-5.10.0-207.0.0.116.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:kernel-debuginfo-5.10.0-207.0.0.116.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:python3-perf-debuginfo-5.10.0-207.0.0.116.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:kernel-tools-debuginfo-5.10.0-207.0.0.116.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:kernel-tools-5.10.0-207.0.0.116.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:kernel-5.10.0-207.0.0.116.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:kernel-headers-5.10.0-207.0.0.116.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:kernel-devel-5.10.0-207.0.0.116.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:python3-perf-5.10.0-207.0.0.116.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:perf-5.10.0-207.0.0.116.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:kernel-tools-devel-5.10.0-207.0.0.116.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:kernel-debugsource-5.10.0-207.0.0.116.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:kernel-source-5.10.0-207.0.0.116.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:kernel-5.10.0-207.0.0.116.oe2203sp3.src",
						"openEuler-22.03-LTS-SP3:kernel-debuginfo-5.10.0-207.0.0.116.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:kernel-tools-5.10.0-207.0.0.116.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:python3-perf-5.10.0-207.0.0.116.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:kernel-source-5.10.0-207.0.0.116.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:kernel-headers-5.10.0-207.0.0.116.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:perf-5.10.0-207.0.0.116.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:kernel-devel-5.10.0-207.0.0.116.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:kernel-tools-devel-5.10.0-207.0.0.116.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:kernel-debugsource-5.10.0-207.0.0.116.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:kernel-tools-debuginfo-5.10.0-207.0.0.116.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:kernel-5.10.0-207.0.0.116.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:python3-perf-debuginfo-5.10.0-207.0.0.116.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:perf-debuginfo-5.10.0-207.0.0.116.oe2203sp3.x86_64"
					]
				}
			],
			"threats":[
				{
					"details":"Medium",
					"category":"impact"
				}
			],
			"title":"CVE-2024-35967"
		},
		{
			"cve":"CVE-2024-35973",
			"notes":[
				{
					"text":"In the Linux kernel, the following vulnerability has been resolved:\n\ngeneve: fix header validation in geneve[6]_xmit_skb\n\nsyzbot is able to trigger an uninit-value in geneve_xmit() [1]\n\nProblem : While most ip tunnel helpers (like ip_tunnel_get_dsfield())\nuses skb_protocol(skb, true), pskb_inet_may_pull() is only using\nskb->protocol.\n\nIf anything else than ETH_P_IPV6 or ETH_P_IP is found in skb->protocol,\npskb_inet_may_pull() does nothing at all.\n\nIf a vlan tag was provided by the caller (af_packet in the syzbot case),\nthe network header might not point to the correct location, and skb\nlinear part could be smaller than expected.\n\nAdd skb_vlan_inet_prepare() to perform a complete mac validation.\n\nUse this in geneve for the moment, I suspect we need to adopt this\nmore broadly.\n\nv4 - Jakub reported v3 broke l2_tos_ttl_inherit.sh selftest\n   - Only call __vlan_get_protocol() for vlan types.\n\nv2,v3 - Addressed Sabrina comments on v1 and v2\n\n[1]\n\nBUG: KMSAN: uninit-value in geneve_xmit_skb drivers/net/geneve.c:910 [inline]\n BUG: KMSAN: uninit-value in geneve_xmit+0x302d/0x5420 drivers/net/geneve.c:1030\n  geneve_xmit_skb drivers/net/geneve.c:910 [inline]\n  geneve_xmit+0x302d/0x5420 drivers/net/geneve.c:1030\n  __netdev_start_xmit include/linux/netdevice.h:4903 [inline]\n  netdev_start_xmit include/linux/netdevice.h:4917 [inline]\n  xmit_one net/core/dev.c:3531 [inline]\n  dev_hard_start_xmit+0x247/0xa20 net/core/dev.c:3547\n  __dev_queue_xmit+0x348d/0x52c0 net/core/dev.c:4335\n  dev_queue_xmit include/linux/netdevice.h:3091 [inline]\n  packet_xmit+0x9c/0x6c0 net/packet/af_packet.c:276\n  packet_snd net/packet/af_packet.c:3081 [inline]\n  packet_sendmsg+0x8bb0/0x9ef0 net/packet/af_packet.c:3113\n  sock_sendmsg_nosec net/socket.c:730 [inline]\n  __sock_sendmsg+0x30f/0x380 net/socket.c:745\n  __sys_sendto+0x685/0x830 net/socket.c:2191\n  __do_sys_sendto net/socket.c:2203 [inline]\n  __se_sys_sendto net/socket.c:2199 [inline]\n  __x64_sys_sendto+0x125/0x1d0 net/socket.c:2199\n do_syscall_64+0xd5/0x1f0\n entry_SYSCALL_64_after_hwframe+0x6d/0x75\n\nUninit was created at:\n  slab_post_alloc_hook mm/slub.c:3804 [inline]\n  slab_alloc_node mm/slub.c:3845 [inline]\n  kmem_cache_alloc_node+0x613/0xc50 mm/slub.c:3888\n  kmalloc_reserve+0x13d/0x4a0 net/core/skbuff.c:577\n  __alloc_skb+0x35b/0x7a0 net/core/skbuff.c:668\n  alloc_skb include/linux/skbuff.h:1318 [inline]\n  alloc_skb_with_frags+0xc8/0xbf0 net/core/skbuff.c:6504\n  sock_alloc_send_pskb+0xa81/0xbf0 net/core/sock.c:2795\n  packet_alloc_skb net/packet/af_packet.c:2930 [inline]\n  packet_snd net/packet/af_packet.c:3024 [inline]\n  packet_sendmsg+0x722d/0x9ef0 net/packet/af_packet.c:3113\n  sock_sendmsg_nosec net/socket.c:730 [inline]\n  __sock_sendmsg+0x30f/0x380 net/socket.c:745\n  __sys_sendto+0x685/0x830 net/socket.c:2191\n  __do_sys_sendto net/socket.c:2203 [inline]\n  __se_sys_sendto net/socket.c:2199 [inline]\n  __x64_sys_sendto+0x125/0x1d0 net/socket.c:2199\n do_syscall_64+0xd5/0x1f0\n entry_SYSCALL_64_after_hwframe+0x6d/0x75\n\nCPU: 0 PID: 5033 Comm: syz-executor346 Not tainted 6.9.0-rc1-syzkaller-00005-g928a87efa423 #0\nHardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/29/2024",
					"category":"description",
					"title":"Vulnerability Description"
				}
			],
			"product_status":{
				"fixed":[
					"openEuler-22.03-LTS-SP3:perf-debuginfo-5.10.0-207.0.0.116.oe2203sp3.aarch64",
					"openEuler-22.03-LTS-SP3:kernel-debuginfo-5.10.0-207.0.0.116.oe2203sp3.aarch64",
					"openEuler-22.03-LTS-SP3:python3-perf-debuginfo-5.10.0-207.0.0.116.oe2203sp3.aarch64",
					"openEuler-22.03-LTS-SP3:kernel-tools-debuginfo-5.10.0-207.0.0.116.oe2203sp3.aarch64",
					"openEuler-22.03-LTS-SP3:kernel-tools-5.10.0-207.0.0.116.oe2203sp3.aarch64",
					"openEuler-22.03-LTS-SP3:kernel-5.10.0-207.0.0.116.oe2203sp3.aarch64",
					"openEuler-22.03-LTS-SP3:kernel-headers-5.10.0-207.0.0.116.oe2203sp3.aarch64",
					"openEuler-22.03-LTS-SP3:kernel-devel-5.10.0-207.0.0.116.oe2203sp3.aarch64",
					"openEuler-22.03-LTS-SP3:python3-perf-5.10.0-207.0.0.116.oe2203sp3.aarch64",
					"openEuler-22.03-LTS-SP3:perf-5.10.0-207.0.0.116.oe2203sp3.aarch64",
					"openEuler-22.03-LTS-SP3:kernel-tools-devel-5.10.0-207.0.0.116.oe2203sp3.aarch64",
					"openEuler-22.03-LTS-SP3:kernel-debugsource-5.10.0-207.0.0.116.oe2203sp3.aarch64",
					"openEuler-22.03-LTS-SP3:kernel-source-5.10.0-207.0.0.116.oe2203sp3.aarch64",
					"openEuler-22.03-LTS-SP3:kernel-5.10.0-207.0.0.116.oe2203sp3.src",
					"openEuler-22.03-LTS-SP3:kernel-debuginfo-5.10.0-207.0.0.116.oe2203sp3.x86_64",
					"openEuler-22.03-LTS-SP3:kernel-tools-5.10.0-207.0.0.116.oe2203sp3.x86_64",
					"openEuler-22.03-LTS-SP3:python3-perf-5.10.0-207.0.0.116.oe2203sp3.x86_64",
					"openEuler-22.03-LTS-SP3:kernel-source-5.10.0-207.0.0.116.oe2203sp3.x86_64",
					"openEuler-22.03-LTS-SP3:kernel-headers-5.10.0-207.0.0.116.oe2203sp3.x86_64",
					"openEuler-22.03-LTS-SP3:perf-5.10.0-207.0.0.116.oe2203sp3.x86_64",
					"openEuler-22.03-LTS-SP3:kernel-devel-5.10.0-207.0.0.116.oe2203sp3.x86_64",
					"openEuler-22.03-LTS-SP3:kernel-tools-devel-5.10.0-207.0.0.116.oe2203sp3.x86_64",
					"openEuler-22.03-LTS-SP3:kernel-debugsource-5.10.0-207.0.0.116.oe2203sp3.x86_64",
					"openEuler-22.03-LTS-SP3:kernel-tools-debuginfo-5.10.0-207.0.0.116.oe2203sp3.x86_64",
					"openEuler-22.03-LTS-SP3:kernel-5.10.0-207.0.0.116.oe2203sp3.x86_64",
					"openEuler-22.03-LTS-SP3:python3-perf-debuginfo-5.10.0-207.0.0.116.oe2203sp3.x86_64",
					"openEuler-22.03-LTS-SP3:perf-debuginfo-5.10.0-207.0.0.116.oe2203sp3.x86_64"
				]
			},
			"remediations":[
				{
					"product_ids":[
						"openEuler-22.03-LTS-SP3:perf-debuginfo-5.10.0-207.0.0.116.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:kernel-debuginfo-5.10.0-207.0.0.116.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:python3-perf-debuginfo-5.10.0-207.0.0.116.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:kernel-tools-debuginfo-5.10.0-207.0.0.116.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:kernel-tools-5.10.0-207.0.0.116.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:kernel-5.10.0-207.0.0.116.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:kernel-headers-5.10.0-207.0.0.116.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:kernel-devel-5.10.0-207.0.0.116.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:python3-perf-5.10.0-207.0.0.116.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:perf-5.10.0-207.0.0.116.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:kernel-tools-devel-5.10.0-207.0.0.116.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:kernel-debugsource-5.10.0-207.0.0.116.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:kernel-source-5.10.0-207.0.0.116.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:kernel-5.10.0-207.0.0.116.oe2203sp3.src",
						"openEuler-22.03-LTS-SP3:kernel-debuginfo-5.10.0-207.0.0.116.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:kernel-tools-5.10.0-207.0.0.116.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:python3-perf-5.10.0-207.0.0.116.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:kernel-source-5.10.0-207.0.0.116.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:kernel-headers-5.10.0-207.0.0.116.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:perf-5.10.0-207.0.0.116.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:kernel-devel-5.10.0-207.0.0.116.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:kernel-tools-devel-5.10.0-207.0.0.116.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:kernel-debugsource-5.10.0-207.0.0.116.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:kernel-tools-debuginfo-5.10.0-207.0.0.116.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:kernel-5.10.0-207.0.0.116.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:python3-perf-debuginfo-5.10.0-207.0.0.116.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:perf-debuginfo-5.10.0-207.0.0.116.oe2203sp3.x86_64"
					],
					"details":"kernel security update",
					"category":"vendor_fix",
					"url":"https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2024-1707"
				}
			],
			"scores":[
				{
					"cvss_v3":{
						"baseSeverity":"MEDIUM",
						"baseScore":5.5,
						"vectorString":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
						"version":"3.1"
					},
					"products":[
						"openEuler-22.03-LTS-SP3:perf-debuginfo-5.10.0-207.0.0.116.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:kernel-debuginfo-5.10.0-207.0.0.116.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:python3-perf-debuginfo-5.10.0-207.0.0.116.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:kernel-tools-debuginfo-5.10.0-207.0.0.116.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:kernel-tools-5.10.0-207.0.0.116.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:kernel-5.10.0-207.0.0.116.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:kernel-headers-5.10.0-207.0.0.116.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:kernel-devel-5.10.0-207.0.0.116.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:python3-perf-5.10.0-207.0.0.116.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:perf-5.10.0-207.0.0.116.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:kernel-tools-devel-5.10.0-207.0.0.116.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:kernel-debugsource-5.10.0-207.0.0.116.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:kernel-source-5.10.0-207.0.0.116.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:kernel-5.10.0-207.0.0.116.oe2203sp3.src",
						"openEuler-22.03-LTS-SP3:kernel-debuginfo-5.10.0-207.0.0.116.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:kernel-tools-5.10.0-207.0.0.116.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:python3-perf-5.10.0-207.0.0.116.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:kernel-source-5.10.0-207.0.0.116.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:kernel-headers-5.10.0-207.0.0.116.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:perf-5.10.0-207.0.0.116.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:kernel-devel-5.10.0-207.0.0.116.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:kernel-tools-devel-5.10.0-207.0.0.116.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:kernel-debugsource-5.10.0-207.0.0.116.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:kernel-tools-debuginfo-5.10.0-207.0.0.116.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:kernel-5.10.0-207.0.0.116.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:python3-perf-debuginfo-5.10.0-207.0.0.116.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:perf-debuginfo-5.10.0-207.0.0.116.oe2203sp3.x86_64"
					]
				}
			],
			"threats":[
				{
					"details":"Medium",
					"category":"impact"
				}
			],
			"title":"CVE-2024-35973"
		},
		{
			"cve":"CVE-2024-35982",
			"notes":[
				{
					"text":"In the Linux kernel, the following vulnerability has been resolved:\n\nbatman-adv: Avoid infinite loop trying to resize local TT\n\nIf the MTU of one of an attached interface becomes too small to transmit\nthe local translation table then it must be resized to fit inside all\nfragments (when enabled) or a single packet.\n\nBut if the MTU becomes too low to transmit even the header + the VLAN\nspecific part then the resizing of the local TT will never succeed. This\ncan for example happen when the usable space is 110 bytes and 11 VLANs are\non top of batman-adv. In this case, at least 116 byte would be needed.\nThere will just be an endless spam of\n\n   batman_adv: batadv0: Forced to purge local tt entries to fit new maximum fragment MTU (110)\n\nin the log but the function will never finish. Problem here is that the\ntimeout will be halved all the time and will then stagnate at 0 and\ntherefore never be able to reduce the table even more.\n\nThere are other scenarios possible with a similar result. The number of\nBATADV_TT_CLIENT_NOPURGE entries in the local TT can for example be too\nhigh to fit inside a packet. Such a scenario can therefore happen also with\nonly a single VLAN + 7 non-purgable addresses - requiring at least 120\nbytes.\n\nWhile this should be handled proactively when:\n\n* interface with too low MTU is added\n* VLAN is added\n* non-purgeable local mac is added\n* MTU of an attached interface is reduced\n* fragmentation setting gets disabled (which most likely requires dropping\n  attached interfaces)\n\nnot all of these scenarios can be prevented because batman-adv is only\nconsuming events without the the possibility to prevent these actions\n(non-purgable MAC address added, MTU of an attached interface is reduced).\nIt is therefore necessary to also make sure that the code is able to handle\nalso the situations when there were already incompatible system\nconfiguration are present.",
					"category":"description",
					"title":"Vulnerability Description"
				}
			],
			"product_status":{
				"fixed":[
					"openEuler-22.03-LTS-SP3:perf-debuginfo-5.10.0-207.0.0.116.oe2203sp3.aarch64",
					"openEuler-22.03-LTS-SP3:kernel-debuginfo-5.10.0-207.0.0.116.oe2203sp3.aarch64",
					"openEuler-22.03-LTS-SP3:python3-perf-debuginfo-5.10.0-207.0.0.116.oe2203sp3.aarch64",
					"openEuler-22.03-LTS-SP3:kernel-tools-debuginfo-5.10.0-207.0.0.116.oe2203sp3.aarch64",
					"openEuler-22.03-LTS-SP3:kernel-tools-5.10.0-207.0.0.116.oe2203sp3.aarch64",
					"openEuler-22.03-LTS-SP3:kernel-5.10.0-207.0.0.116.oe2203sp3.aarch64",
					"openEuler-22.03-LTS-SP3:kernel-headers-5.10.0-207.0.0.116.oe2203sp3.aarch64",
					"openEuler-22.03-LTS-SP3:kernel-devel-5.10.0-207.0.0.116.oe2203sp3.aarch64",
					"openEuler-22.03-LTS-SP3:python3-perf-5.10.0-207.0.0.116.oe2203sp3.aarch64",
					"openEuler-22.03-LTS-SP3:perf-5.10.0-207.0.0.116.oe2203sp3.aarch64",
					"openEuler-22.03-LTS-SP3:kernel-tools-devel-5.10.0-207.0.0.116.oe2203sp3.aarch64",
					"openEuler-22.03-LTS-SP3:kernel-debugsource-5.10.0-207.0.0.116.oe2203sp3.aarch64",
					"openEuler-22.03-LTS-SP3:kernel-source-5.10.0-207.0.0.116.oe2203sp3.aarch64",
					"openEuler-22.03-LTS-SP3:kernel-5.10.0-207.0.0.116.oe2203sp3.src",
					"openEuler-22.03-LTS-SP3:kernel-debuginfo-5.10.0-207.0.0.116.oe2203sp3.x86_64",
					"openEuler-22.03-LTS-SP3:kernel-tools-5.10.0-207.0.0.116.oe2203sp3.x86_64",
					"openEuler-22.03-LTS-SP3:python3-perf-5.10.0-207.0.0.116.oe2203sp3.x86_64",
					"openEuler-22.03-LTS-SP3:kernel-source-5.10.0-207.0.0.116.oe2203sp3.x86_64",
					"openEuler-22.03-LTS-SP3:kernel-headers-5.10.0-207.0.0.116.oe2203sp3.x86_64",
					"openEuler-22.03-LTS-SP3:perf-5.10.0-207.0.0.116.oe2203sp3.x86_64",
					"openEuler-22.03-LTS-SP3:kernel-devel-5.10.0-207.0.0.116.oe2203sp3.x86_64",
					"openEuler-22.03-LTS-SP3:kernel-tools-devel-5.10.0-207.0.0.116.oe2203sp3.x86_64",
					"openEuler-22.03-LTS-SP3:kernel-debugsource-5.10.0-207.0.0.116.oe2203sp3.x86_64",
					"openEuler-22.03-LTS-SP3:kernel-tools-debuginfo-5.10.0-207.0.0.116.oe2203sp3.x86_64",
					"openEuler-22.03-LTS-SP3:kernel-5.10.0-207.0.0.116.oe2203sp3.x86_64",
					"openEuler-22.03-LTS-SP3:python3-perf-debuginfo-5.10.0-207.0.0.116.oe2203sp3.x86_64",
					"openEuler-22.03-LTS-SP3:perf-debuginfo-5.10.0-207.0.0.116.oe2203sp3.x86_64"
				]
			},
			"remediations":[
				{
					"product_ids":[
						"openEuler-22.03-LTS-SP3:perf-debuginfo-5.10.0-207.0.0.116.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:kernel-debuginfo-5.10.0-207.0.0.116.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:python3-perf-debuginfo-5.10.0-207.0.0.116.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:kernel-tools-debuginfo-5.10.0-207.0.0.116.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:kernel-tools-5.10.0-207.0.0.116.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:kernel-5.10.0-207.0.0.116.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:kernel-headers-5.10.0-207.0.0.116.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:kernel-devel-5.10.0-207.0.0.116.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:python3-perf-5.10.0-207.0.0.116.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:perf-5.10.0-207.0.0.116.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:kernel-tools-devel-5.10.0-207.0.0.116.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:kernel-debugsource-5.10.0-207.0.0.116.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:kernel-source-5.10.0-207.0.0.116.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:kernel-5.10.0-207.0.0.116.oe2203sp3.src",
						"openEuler-22.03-LTS-SP3:kernel-debuginfo-5.10.0-207.0.0.116.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:kernel-tools-5.10.0-207.0.0.116.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:python3-perf-5.10.0-207.0.0.116.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:kernel-source-5.10.0-207.0.0.116.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:kernel-headers-5.10.0-207.0.0.116.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:perf-5.10.0-207.0.0.116.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:kernel-devel-5.10.0-207.0.0.116.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:kernel-tools-devel-5.10.0-207.0.0.116.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:kernel-debugsource-5.10.0-207.0.0.116.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:kernel-tools-debuginfo-5.10.0-207.0.0.116.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:kernel-5.10.0-207.0.0.116.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:python3-perf-debuginfo-5.10.0-207.0.0.116.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:perf-debuginfo-5.10.0-207.0.0.116.oe2203sp3.x86_64"
					],
					"details":"kernel security update",
					"category":"vendor_fix",
					"url":"https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2024-1707"
				}
			],
			"scores":[
				{
					"cvss_v3":{
						"baseSeverity":"MEDIUM",
						"baseScore":5.5,
						"vectorString":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
						"version":"3.1"
					},
					"products":[
						"openEuler-22.03-LTS-SP3:perf-debuginfo-5.10.0-207.0.0.116.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:kernel-debuginfo-5.10.0-207.0.0.116.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:python3-perf-debuginfo-5.10.0-207.0.0.116.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:kernel-tools-debuginfo-5.10.0-207.0.0.116.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:kernel-tools-5.10.0-207.0.0.116.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:kernel-5.10.0-207.0.0.116.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:kernel-headers-5.10.0-207.0.0.116.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:kernel-devel-5.10.0-207.0.0.116.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:python3-perf-5.10.0-207.0.0.116.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:perf-5.10.0-207.0.0.116.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:kernel-tools-devel-5.10.0-207.0.0.116.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:kernel-debugsource-5.10.0-207.0.0.116.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:kernel-source-5.10.0-207.0.0.116.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:kernel-5.10.0-207.0.0.116.oe2203sp3.src",
						"openEuler-22.03-LTS-SP3:kernel-debuginfo-5.10.0-207.0.0.116.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:kernel-tools-5.10.0-207.0.0.116.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:python3-perf-5.10.0-207.0.0.116.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:kernel-source-5.10.0-207.0.0.116.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:kernel-headers-5.10.0-207.0.0.116.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:perf-5.10.0-207.0.0.116.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:kernel-devel-5.10.0-207.0.0.116.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:kernel-tools-devel-5.10.0-207.0.0.116.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:kernel-debugsource-5.10.0-207.0.0.116.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:kernel-tools-debuginfo-5.10.0-207.0.0.116.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:kernel-5.10.0-207.0.0.116.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:python3-perf-debuginfo-5.10.0-207.0.0.116.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:perf-debuginfo-5.10.0-207.0.0.116.oe2203sp3.x86_64"
					]
				}
			],
			"threats":[
				{
					"details":"Medium",
					"category":"impact"
				}
			],
			"title":"CVE-2024-35982"
		},
		{
			"cve":"CVE-2024-35984",
			"notes":[
				{
					"text":"In the Linux kernel, the following vulnerability has been resolved:i2c: smbus: fix NULL function pointer dereferenceBaruch reported an OOPS when using the designware controller as targetonly. Target-only modes break the assumption of one transfer functionalways being available. Fix this by always checking the pointer in__i2c_transfer.[wsa: dropped the simplification in core-smbus to avoid theoretical regressions]",
					"category":"description",
					"title":"Vulnerability Description"
				}
			],
			"product_status":{
				"fixed":[
					"openEuler-22.03-LTS-SP3:perf-debuginfo-5.10.0-207.0.0.116.oe2203sp3.aarch64",
					"openEuler-22.03-LTS-SP3:kernel-debuginfo-5.10.0-207.0.0.116.oe2203sp3.aarch64",
					"openEuler-22.03-LTS-SP3:python3-perf-debuginfo-5.10.0-207.0.0.116.oe2203sp3.aarch64",
					"openEuler-22.03-LTS-SP3:kernel-tools-debuginfo-5.10.0-207.0.0.116.oe2203sp3.aarch64",
					"openEuler-22.03-LTS-SP3:kernel-tools-5.10.0-207.0.0.116.oe2203sp3.aarch64",
					"openEuler-22.03-LTS-SP3:kernel-5.10.0-207.0.0.116.oe2203sp3.aarch64",
					"openEuler-22.03-LTS-SP3:kernel-headers-5.10.0-207.0.0.116.oe2203sp3.aarch64",
					"openEuler-22.03-LTS-SP3:kernel-devel-5.10.0-207.0.0.116.oe2203sp3.aarch64",
					"openEuler-22.03-LTS-SP3:python3-perf-5.10.0-207.0.0.116.oe2203sp3.aarch64",
					"openEuler-22.03-LTS-SP3:perf-5.10.0-207.0.0.116.oe2203sp3.aarch64",
					"openEuler-22.03-LTS-SP3:kernel-tools-devel-5.10.0-207.0.0.116.oe2203sp3.aarch64",
					"openEuler-22.03-LTS-SP3:kernel-debugsource-5.10.0-207.0.0.116.oe2203sp3.aarch64",
					"openEuler-22.03-LTS-SP3:kernel-source-5.10.0-207.0.0.116.oe2203sp3.aarch64",
					"openEuler-22.03-LTS-SP3:kernel-5.10.0-207.0.0.116.oe2203sp3.src",
					"openEuler-22.03-LTS-SP3:kernel-debuginfo-5.10.0-207.0.0.116.oe2203sp3.x86_64",
					"openEuler-22.03-LTS-SP3:kernel-tools-5.10.0-207.0.0.116.oe2203sp3.x86_64",
					"openEuler-22.03-LTS-SP3:python3-perf-5.10.0-207.0.0.116.oe2203sp3.x86_64",
					"openEuler-22.03-LTS-SP3:kernel-source-5.10.0-207.0.0.116.oe2203sp3.x86_64",
					"openEuler-22.03-LTS-SP3:kernel-headers-5.10.0-207.0.0.116.oe2203sp3.x86_64",
					"openEuler-22.03-LTS-SP3:perf-5.10.0-207.0.0.116.oe2203sp3.x86_64",
					"openEuler-22.03-LTS-SP3:kernel-devel-5.10.0-207.0.0.116.oe2203sp3.x86_64",
					"openEuler-22.03-LTS-SP3:kernel-tools-devel-5.10.0-207.0.0.116.oe2203sp3.x86_64",
					"openEuler-22.03-LTS-SP3:kernel-debugsource-5.10.0-207.0.0.116.oe2203sp3.x86_64",
					"openEuler-22.03-LTS-SP3:kernel-tools-debuginfo-5.10.0-207.0.0.116.oe2203sp3.x86_64",
					"openEuler-22.03-LTS-SP3:kernel-5.10.0-207.0.0.116.oe2203sp3.x86_64",
					"openEuler-22.03-LTS-SP3:python3-perf-debuginfo-5.10.0-207.0.0.116.oe2203sp3.x86_64",
					"openEuler-22.03-LTS-SP3:perf-debuginfo-5.10.0-207.0.0.116.oe2203sp3.x86_64"
				]
			},
			"remediations":[
				{
					"product_ids":[
						"openEuler-22.03-LTS-SP3:perf-debuginfo-5.10.0-207.0.0.116.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:kernel-debuginfo-5.10.0-207.0.0.116.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:python3-perf-debuginfo-5.10.0-207.0.0.116.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:kernel-tools-debuginfo-5.10.0-207.0.0.116.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:kernel-tools-5.10.0-207.0.0.116.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:kernel-5.10.0-207.0.0.116.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:kernel-headers-5.10.0-207.0.0.116.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:kernel-devel-5.10.0-207.0.0.116.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:python3-perf-5.10.0-207.0.0.116.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:perf-5.10.0-207.0.0.116.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:kernel-tools-devel-5.10.0-207.0.0.116.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:kernel-debugsource-5.10.0-207.0.0.116.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:kernel-source-5.10.0-207.0.0.116.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:kernel-5.10.0-207.0.0.116.oe2203sp3.src",
						"openEuler-22.03-LTS-SP3:kernel-debuginfo-5.10.0-207.0.0.116.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:kernel-tools-5.10.0-207.0.0.116.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:python3-perf-5.10.0-207.0.0.116.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:kernel-source-5.10.0-207.0.0.116.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:kernel-headers-5.10.0-207.0.0.116.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:perf-5.10.0-207.0.0.116.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:kernel-devel-5.10.0-207.0.0.116.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:kernel-tools-devel-5.10.0-207.0.0.116.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:kernel-debugsource-5.10.0-207.0.0.116.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:kernel-tools-debuginfo-5.10.0-207.0.0.116.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:kernel-5.10.0-207.0.0.116.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:python3-perf-debuginfo-5.10.0-207.0.0.116.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:perf-debuginfo-5.10.0-207.0.0.116.oe2203sp3.x86_64"
					],
					"details":"kernel security update",
					"category":"vendor_fix",
					"url":"https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2024-1707"
				}
			],
			"scores":[
				{
					"cvss_v3":{
						"baseSeverity":"MEDIUM",
						"baseScore":5.5,
						"vectorString":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
						"version":"3.1"
					},
					"products":[
						"openEuler-22.03-LTS-SP3:perf-debuginfo-5.10.0-207.0.0.116.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:kernel-debuginfo-5.10.0-207.0.0.116.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:python3-perf-debuginfo-5.10.0-207.0.0.116.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:kernel-tools-debuginfo-5.10.0-207.0.0.116.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:kernel-tools-5.10.0-207.0.0.116.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:kernel-5.10.0-207.0.0.116.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:kernel-headers-5.10.0-207.0.0.116.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:kernel-devel-5.10.0-207.0.0.116.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:python3-perf-5.10.0-207.0.0.116.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:perf-5.10.0-207.0.0.116.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:kernel-tools-devel-5.10.0-207.0.0.116.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:kernel-debugsource-5.10.0-207.0.0.116.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:kernel-source-5.10.0-207.0.0.116.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:kernel-5.10.0-207.0.0.116.oe2203sp3.src",
						"openEuler-22.03-LTS-SP3:kernel-debuginfo-5.10.0-207.0.0.116.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:kernel-tools-5.10.0-207.0.0.116.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:python3-perf-5.10.0-207.0.0.116.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:kernel-source-5.10.0-207.0.0.116.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:kernel-headers-5.10.0-207.0.0.116.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:perf-5.10.0-207.0.0.116.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:kernel-devel-5.10.0-207.0.0.116.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:kernel-tools-devel-5.10.0-207.0.0.116.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:kernel-debugsource-5.10.0-207.0.0.116.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:kernel-tools-debuginfo-5.10.0-207.0.0.116.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:kernel-5.10.0-207.0.0.116.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:python3-perf-debuginfo-5.10.0-207.0.0.116.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:perf-debuginfo-5.10.0-207.0.0.116.oe2203sp3.x86_64"
					]
				}
			],
			"threats":[
				{
					"details":"Medium",
					"category":"impact"
				}
			],
			"title":"CVE-2024-35984"
		},
		{
			"cve":"CVE-2024-36017",
			"notes":[
				{
					"text":"In the Linux kernel, the following vulnerability has been resolved:\n\nrtnetlink: Correct nested IFLA_VF_VLAN_LIST attribute validation\n\nEach attribute inside a nested IFLA_VF_VLAN_LIST is assumed to be a\nstruct ifla_vf_vlan_info so the size of such attribute needs to be at least\nof sizeof(struct ifla_vf_vlan_info) which is 14 bytes.\nThe current size validation in do_setvfinfo is against NLA_HDRLEN (4 bytes)\nwhich is less than sizeof(struct ifla_vf_vlan_info) so this validation\nis not enough and a too small attribute might be cast to a\nstruct ifla_vf_vlan_info, this might result in an out of bands\nread access when accessing the saved (casted) entry in ivvl.",
					"category":"description",
					"title":"Vulnerability Description"
				}
			],
			"product_status":{
				"fixed":[
					"openEuler-22.03-LTS-SP3:perf-debuginfo-5.10.0-207.0.0.116.oe2203sp3.aarch64",
					"openEuler-22.03-LTS-SP3:kernel-debuginfo-5.10.0-207.0.0.116.oe2203sp3.aarch64",
					"openEuler-22.03-LTS-SP3:python3-perf-debuginfo-5.10.0-207.0.0.116.oe2203sp3.aarch64",
					"openEuler-22.03-LTS-SP3:kernel-tools-debuginfo-5.10.0-207.0.0.116.oe2203sp3.aarch64",
					"openEuler-22.03-LTS-SP3:kernel-tools-5.10.0-207.0.0.116.oe2203sp3.aarch64",
					"openEuler-22.03-LTS-SP3:kernel-5.10.0-207.0.0.116.oe2203sp3.aarch64",
					"openEuler-22.03-LTS-SP3:kernel-headers-5.10.0-207.0.0.116.oe2203sp3.aarch64",
					"openEuler-22.03-LTS-SP3:kernel-devel-5.10.0-207.0.0.116.oe2203sp3.aarch64",
					"openEuler-22.03-LTS-SP3:python3-perf-5.10.0-207.0.0.116.oe2203sp3.aarch64",
					"openEuler-22.03-LTS-SP3:perf-5.10.0-207.0.0.116.oe2203sp3.aarch64",
					"openEuler-22.03-LTS-SP3:kernel-tools-devel-5.10.0-207.0.0.116.oe2203sp3.aarch64",
					"openEuler-22.03-LTS-SP3:kernel-debugsource-5.10.0-207.0.0.116.oe2203sp3.aarch64",
					"openEuler-22.03-LTS-SP3:kernel-source-5.10.0-207.0.0.116.oe2203sp3.aarch64",
					"openEuler-22.03-LTS-SP3:kernel-5.10.0-207.0.0.116.oe2203sp3.src",
					"openEuler-22.03-LTS-SP3:kernel-debuginfo-5.10.0-207.0.0.116.oe2203sp3.x86_64",
					"openEuler-22.03-LTS-SP3:kernel-tools-5.10.0-207.0.0.116.oe2203sp3.x86_64",
					"openEuler-22.03-LTS-SP3:python3-perf-5.10.0-207.0.0.116.oe2203sp3.x86_64",
					"openEuler-22.03-LTS-SP3:kernel-source-5.10.0-207.0.0.116.oe2203sp3.x86_64",
					"openEuler-22.03-LTS-SP3:kernel-headers-5.10.0-207.0.0.116.oe2203sp3.x86_64",
					"openEuler-22.03-LTS-SP3:perf-5.10.0-207.0.0.116.oe2203sp3.x86_64",
					"openEuler-22.03-LTS-SP3:kernel-devel-5.10.0-207.0.0.116.oe2203sp3.x86_64",
					"openEuler-22.03-LTS-SP3:kernel-tools-devel-5.10.0-207.0.0.116.oe2203sp3.x86_64",
					"openEuler-22.03-LTS-SP3:kernel-debugsource-5.10.0-207.0.0.116.oe2203sp3.x86_64",
					"openEuler-22.03-LTS-SP3:kernel-tools-debuginfo-5.10.0-207.0.0.116.oe2203sp3.x86_64",
					"openEuler-22.03-LTS-SP3:kernel-5.10.0-207.0.0.116.oe2203sp3.x86_64",
					"openEuler-22.03-LTS-SP3:python3-perf-debuginfo-5.10.0-207.0.0.116.oe2203sp3.x86_64",
					"openEuler-22.03-LTS-SP3:perf-debuginfo-5.10.0-207.0.0.116.oe2203sp3.x86_64"
				]
			},
			"remediations":[
				{
					"product_ids":[
						"openEuler-22.03-LTS-SP3:perf-debuginfo-5.10.0-207.0.0.116.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:kernel-debuginfo-5.10.0-207.0.0.116.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:python3-perf-debuginfo-5.10.0-207.0.0.116.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:kernel-tools-debuginfo-5.10.0-207.0.0.116.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:kernel-tools-5.10.0-207.0.0.116.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:kernel-5.10.0-207.0.0.116.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:kernel-headers-5.10.0-207.0.0.116.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:kernel-devel-5.10.0-207.0.0.116.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:python3-perf-5.10.0-207.0.0.116.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:perf-5.10.0-207.0.0.116.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:kernel-tools-devel-5.10.0-207.0.0.116.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:kernel-debugsource-5.10.0-207.0.0.116.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:kernel-source-5.10.0-207.0.0.116.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:kernel-5.10.0-207.0.0.116.oe2203sp3.src",
						"openEuler-22.03-LTS-SP3:kernel-debuginfo-5.10.0-207.0.0.116.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:kernel-tools-5.10.0-207.0.0.116.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:python3-perf-5.10.0-207.0.0.116.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:kernel-source-5.10.0-207.0.0.116.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:kernel-headers-5.10.0-207.0.0.116.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:perf-5.10.0-207.0.0.116.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:kernel-devel-5.10.0-207.0.0.116.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:kernel-tools-devel-5.10.0-207.0.0.116.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:kernel-debugsource-5.10.0-207.0.0.116.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:kernel-tools-debuginfo-5.10.0-207.0.0.116.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:kernel-5.10.0-207.0.0.116.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:python3-perf-debuginfo-5.10.0-207.0.0.116.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:perf-debuginfo-5.10.0-207.0.0.116.oe2203sp3.x86_64"
					],
					"details":"kernel security update",
					"category":"vendor_fix",
					"url":"https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2024-1707"
				}
			],
			"scores":[
				{
					"cvss_v3":{
						"baseSeverity":"MEDIUM",
						"baseScore":6.1,
						"vectorString":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H",
						"version":"3.1"
					},
					"products":[
						"openEuler-22.03-LTS-SP3:perf-debuginfo-5.10.0-207.0.0.116.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:kernel-debuginfo-5.10.0-207.0.0.116.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:python3-perf-debuginfo-5.10.0-207.0.0.116.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:kernel-tools-debuginfo-5.10.0-207.0.0.116.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:kernel-tools-5.10.0-207.0.0.116.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:kernel-5.10.0-207.0.0.116.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:kernel-headers-5.10.0-207.0.0.116.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:kernel-devel-5.10.0-207.0.0.116.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:python3-perf-5.10.0-207.0.0.116.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:perf-5.10.0-207.0.0.116.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:kernel-tools-devel-5.10.0-207.0.0.116.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:kernel-debugsource-5.10.0-207.0.0.116.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:kernel-source-5.10.0-207.0.0.116.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:kernel-5.10.0-207.0.0.116.oe2203sp3.src",
						"openEuler-22.03-LTS-SP3:kernel-debuginfo-5.10.0-207.0.0.116.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:kernel-tools-5.10.0-207.0.0.116.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:python3-perf-5.10.0-207.0.0.116.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:kernel-source-5.10.0-207.0.0.116.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:kernel-headers-5.10.0-207.0.0.116.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:perf-5.10.0-207.0.0.116.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:kernel-devel-5.10.0-207.0.0.116.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:kernel-tools-devel-5.10.0-207.0.0.116.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:kernel-debugsource-5.10.0-207.0.0.116.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:kernel-tools-debuginfo-5.10.0-207.0.0.116.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:kernel-5.10.0-207.0.0.116.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:python3-perf-debuginfo-5.10.0-207.0.0.116.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:perf-debuginfo-5.10.0-207.0.0.116.oe2203sp3.x86_64"
					]
				}
			],
			"threats":[
				{
					"details":"Medium",
					"category":"impact"
				}
			],
			"title":"CVE-2024-36017"
		},
		{
			"cve":"CVE-2024-36029",
			"notes":[
				{
					"text":"In the Linux kernel, the following vulnerability has been resolved:\n\nmmc: sdhci-msm: pervent access to suspended controller\n\nGeneric sdhci code registers LED device and uses host->runtime_suspended\nflag to protect access to it. The sdhci-msm driver doesn't set this flag,\nwhich causes a crash when LED is accessed while controller is runtime\nsuspended. Fix this by setting the flag correctly.",
					"category":"description",
					"title":"Vulnerability Description"
				}
			],
			"product_status":{
				"fixed":[
					"openEuler-22.03-LTS-SP3:perf-debuginfo-5.10.0-207.0.0.116.oe2203sp3.aarch64",
					"openEuler-22.03-LTS-SP3:kernel-debuginfo-5.10.0-207.0.0.116.oe2203sp3.aarch64",
					"openEuler-22.03-LTS-SP3:python3-perf-debuginfo-5.10.0-207.0.0.116.oe2203sp3.aarch64",
					"openEuler-22.03-LTS-SP3:kernel-tools-debuginfo-5.10.0-207.0.0.116.oe2203sp3.aarch64",
					"openEuler-22.03-LTS-SP3:kernel-tools-5.10.0-207.0.0.116.oe2203sp3.aarch64",
					"openEuler-22.03-LTS-SP3:kernel-5.10.0-207.0.0.116.oe2203sp3.aarch64",
					"openEuler-22.03-LTS-SP3:kernel-headers-5.10.0-207.0.0.116.oe2203sp3.aarch64",
					"openEuler-22.03-LTS-SP3:kernel-devel-5.10.0-207.0.0.116.oe2203sp3.aarch64",
					"openEuler-22.03-LTS-SP3:python3-perf-5.10.0-207.0.0.116.oe2203sp3.aarch64",
					"openEuler-22.03-LTS-SP3:perf-5.10.0-207.0.0.116.oe2203sp3.aarch64",
					"openEuler-22.03-LTS-SP3:kernel-tools-devel-5.10.0-207.0.0.116.oe2203sp3.aarch64",
					"openEuler-22.03-LTS-SP3:kernel-debugsource-5.10.0-207.0.0.116.oe2203sp3.aarch64",
					"openEuler-22.03-LTS-SP3:kernel-source-5.10.0-207.0.0.116.oe2203sp3.aarch64",
					"openEuler-22.03-LTS-SP3:kernel-5.10.0-207.0.0.116.oe2203sp3.src",
					"openEuler-22.03-LTS-SP3:kernel-debuginfo-5.10.0-207.0.0.116.oe2203sp3.x86_64",
					"openEuler-22.03-LTS-SP3:kernel-tools-5.10.0-207.0.0.116.oe2203sp3.x86_64",
					"openEuler-22.03-LTS-SP3:python3-perf-5.10.0-207.0.0.116.oe2203sp3.x86_64",
					"openEuler-22.03-LTS-SP3:kernel-source-5.10.0-207.0.0.116.oe2203sp3.x86_64",
					"openEuler-22.03-LTS-SP3:kernel-headers-5.10.0-207.0.0.116.oe2203sp3.x86_64",
					"openEuler-22.03-LTS-SP3:perf-5.10.0-207.0.0.116.oe2203sp3.x86_64",
					"openEuler-22.03-LTS-SP3:kernel-devel-5.10.0-207.0.0.116.oe2203sp3.x86_64",
					"openEuler-22.03-LTS-SP3:kernel-tools-devel-5.10.0-207.0.0.116.oe2203sp3.x86_64",
					"openEuler-22.03-LTS-SP3:kernel-debugsource-5.10.0-207.0.0.116.oe2203sp3.x86_64",
					"openEuler-22.03-LTS-SP3:kernel-tools-debuginfo-5.10.0-207.0.0.116.oe2203sp3.x86_64",
					"openEuler-22.03-LTS-SP3:kernel-5.10.0-207.0.0.116.oe2203sp3.x86_64",
					"openEuler-22.03-LTS-SP3:python3-perf-debuginfo-5.10.0-207.0.0.116.oe2203sp3.x86_64",
					"openEuler-22.03-LTS-SP3:perf-debuginfo-5.10.0-207.0.0.116.oe2203sp3.x86_64"
				]
			},
			"remediations":[
				{
					"product_ids":[
						"openEuler-22.03-LTS-SP3:perf-debuginfo-5.10.0-207.0.0.116.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:kernel-debuginfo-5.10.0-207.0.0.116.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:python3-perf-debuginfo-5.10.0-207.0.0.116.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:kernel-tools-debuginfo-5.10.0-207.0.0.116.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:kernel-tools-5.10.0-207.0.0.116.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:kernel-5.10.0-207.0.0.116.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:kernel-headers-5.10.0-207.0.0.116.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:kernel-devel-5.10.0-207.0.0.116.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:python3-perf-5.10.0-207.0.0.116.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:perf-5.10.0-207.0.0.116.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:kernel-tools-devel-5.10.0-207.0.0.116.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:kernel-debugsource-5.10.0-207.0.0.116.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:kernel-source-5.10.0-207.0.0.116.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:kernel-5.10.0-207.0.0.116.oe2203sp3.src",
						"openEuler-22.03-LTS-SP3:kernel-debuginfo-5.10.0-207.0.0.116.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:kernel-tools-5.10.0-207.0.0.116.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:python3-perf-5.10.0-207.0.0.116.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:kernel-source-5.10.0-207.0.0.116.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:kernel-headers-5.10.0-207.0.0.116.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:perf-5.10.0-207.0.0.116.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:kernel-devel-5.10.0-207.0.0.116.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:kernel-tools-devel-5.10.0-207.0.0.116.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:kernel-debugsource-5.10.0-207.0.0.116.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:kernel-tools-debuginfo-5.10.0-207.0.0.116.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:kernel-5.10.0-207.0.0.116.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:python3-perf-debuginfo-5.10.0-207.0.0.116.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:perf-debuginfo-5.10.0-207.0.0.116.oe2203sp3.x86_64"
					],
					"details":"kernel security update",
					"category":"vendor_fix",
					"url":"https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2024-1707"
				}
			],
			"scores":[
				{
					"cvss_v3":{
						"baseSeverity":"MEDIUM",
						"baseScore":5.5,
						"vectorString":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
						"version":"3.1"
					},
					"products":[
						"openEuler-22.03-LTS-SP3:perf-debuginfo-5.10.0-207.0.0.116.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:kernel-debuginfo-5.10.0-207.0.0.116.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:python3-perf-debuginfo-5.10.0-207.0.0.116.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:kernel-tools-debuginfo-5.10.0-207.0.0.116.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:kernel-tools-5.10.0-207.0.0.116.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:kernel-5.10.0-207.0.0.116.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:kernel-headers-5.10.0-207.0.0.116.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:kernel-devel-5.10.0-207.0.0.116.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:python3-perf-5.10.0-207.0.0.116.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:perf-5.10.0-207.0.0.116.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:kernel-tools-devel-5.10.0-207.0.0.116.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:kernel-debugsource-5.10.0-207.0.0.116.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:kernel-source-5.10.0-207.0.0.116.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:kernel-5.10.0-207.0.0.116.oe2203sp3.src",
						"openEuler-22.03-LTS-SP3:kernel-debuginfo-5.10.0-207.0.0.116.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:kernel-tools-5.10.0-207.0.0.116.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:python3-perf-5.10.0-207.0.0.116.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:kernel-source-5.10.0-207.0.0.116.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:kernel-headers-5.10.0-207.0.0.116.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:perf-5.10.0-207.0.0.116.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:kernel-devel-5.10.0-207.0.0.116.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:kernel-tools-devel-5.10.0-207.0.0.116.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:kernel-debugsource-5.10.0-207.0.0.116.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:kernel-tools-debuginfo-5.10.0-207.0.0.116.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:kernel-5.10.0-207.0.0.116.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:python3-perf-debuginfo-5.10.0-207.0.0.116.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:perf-debuginfo-5.10.0-207.0.0.116.oe2203sp3.x86_64"
					]
				}
			],
			"threats":[
				{
					"details":"Medium",
					"category":"impact"
				}
			],
			"title":"CVE-2024-36029"
		},
		{
			"cve":"CVE-2024-36883",
			"notes":[
				{
					"text":"In the Linux kernel, the following vulnerability has been resolved:\n\nnet: fix out-of-bounds access in ops_init\n\nnet_alloc_generic is called by net_alloc, which is called without any\nlocking. It reads max_gen_ptrs, which is changed under pernet_ops_rwsem. It\nis read twice, first to allocate an array, then to set s.len, which is\nlater used to limit the bounds of the array access.\n\nIt is possible that the array is allocated and another thread is\nregistering a new pernet ops, increments max_gen_ptrs, which is then used\nto set s.len with a larger than allocated length for the variable array.\n\nFix it by reading max_gen_ptrs only once in net_alloc_generic. If\nmax_gen_ptrs is later incremented, it will be caught in net_assign_generic.",
					"category":"description",
					"title":"Vulnerability Description"
				}
			],
			"product_status":{
				"fixed":[
					"openEuler-22.03-LTS-SP3:perf-debuginfo-5.10.0-207.0.0.116.oe2203sp3.aarch64",
					"openEuler-22.03-LTS-SP3:kernel-debuginfo-5.10.0-207.0.0.116.oe2203sp3.aarch64",
					"openEuler-22.03-LTS-SP3:python3-perf-debuginfo-5.10.0-207.0.0.116.oe2203sp3.aarch64",
					"openEuler-22.03-LTS-SP3:kernel-tools-debuginfo-5.10.0-207.0.0.116.oe2203sp3.aarch64",
					"openEuler-22.03-LTS-SP3:kernel-tools-5.10.0-207.0.0.116.oe2203sp3.aarch64",
					"openEuler-22.03-LTS-SP3:kernel-5.10.0-207.0.0.116.oe2203sp3.aarch64",
					"openEuler-22.03-LTS-SP3:kernel-headers-5.10.0-207.0.0.116.oe2203sp3.aarch64",
					"openEuler-22.03-LTS-SP3:kernel-devel-5.10.0-207.0.0.116.oe2203sp3.aarch64",
					"openEuler-22.03-LTS-SP3:python3-perf-5.10.0-207.0.0.116.oe2203sp3.aarch64",
					"openEuler-22.03-LTS-SP3:perf-5.10.0-207.0.0.116.oe2203sp3.aarch64",
					"openEuler-22.03-LTS-SP3:kernel-tools-devel-5.10.0-207.0.0.116.oe2203sp3.aarch64",
					"openEuler-22.03-LTS-SP3:kernel-debugsource-5.10.0-207.0.0.116.oe2203sp3.aarch64",
					"openEuler-22.03-LTS-SP3:kernel-source-5.10.0-207.0.0.116.oe2203sp3.aarch64",
					"openEuler-22.03-LTS-SP3:kernel-5.10.0-207.0.0.116.oe2203sp3.src",
					"openEuler-22.03-LTS-SP3:kernel-debuginfo-5.10.0-207.0.0.116.oe2203sp3.x86_64",
					"openEuler-22.03-LTS-SP3:kernel-tools-5.10.0-207.0.0.116.oe2203sp3.x86_64",
					"openEuler-22.03-LTS-SP3:python3-perf-5.10.0-207.0.0.116.oe2203sp3.x86_64",
					"openEuler-22.03-LTS-SP3:kernel-source-5.10.0-207.0.0.116.oe2203sp3.x86_64",
					"openEuler-22.03-LTS-SP3:kernel-headers-5.10.0-207.0.0.116.oe2203sp3.x86_64",
					"openEuler-22.03-LTS-SP3:perf-5.10.0-207.0.0.116.oe2203sp3.x86_64",
					"openEuler-22.03-LTS-SP3:kernel-devel-5.10.0-207.0.0.116.oe2203sp3.x86_64",
					"openEuler-22.03-LTS-SP3:kernel-tools-devel-5.10.0-207.0.0.116.oe2203sp3.x86_64",
					"openEuler-22.03-LTS-SP3:kernel-debugsource-5.10.0-207.0.0.116.oe2203sp3.x86_64",
					"openEuler-22.03-LTS-SP3:kernel-tools-debuginfo-5.10.0-207.0.0.116.oe2203sp3.x86_64",
					"openEuler-22.03-LTS-SP3:kernel-5.10.0-207.0.0.116.oe2203sp3.x86_64",
					"openEuler-22.03-LTS-SP3:python3-perf-debuginfo-5.10.0-207.0.0.116.oe2203sp3.x86_64",
					"openEuler-22.03-LTS-SP3:perf-debuginfo-5.10.0-207.0.0.116.oe2203sp3.x86_64"
				]
			},
			"remediations":[
				{
					"product_ids":[
						"openEuler-22.03-LTS-SP3:perf-debuginfo-5.10.0-207.0.0.116.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:kernel-debuginfo-5.10.0-207.0.0.116.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:python3-perf-debuginfo-5.10.0-207.0.0.116.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:kernel-tools-debuginfo-5.10.0-207.0.0.116.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:kernel-tools-5.10.0-207.0.0.116.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:kernel-5.10.0-207.0.0.116.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:kernel-headers-5.10.0-207.0.0.116.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:kernel-devel-5.10.0-207.0.0.116.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:python3-perf-5.10.0-207.0.0.116.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:perf-5.10.0-207.0.0.116.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:kernel-tools-devel-5.10.0-207.0.0.116.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:kernel-debugsource-5.10.0-207.0.0.116.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:kernel-source-5.10.0-207.0.0.116.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:kernel-5.10.0-207.0.0.116.oe2203sp3.src",
						"openEuler-22.03-LTS-SP3:kernel-debuginfo-5.10.0-207.0.0.116.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:kernel-tools-5.10.0-207.0.0.116.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:python3-perf-5.10.0-207.0.0.116.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:kernel-source-5.10.0-207.0.0.116.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:kernel-headers-5.10.0-207.0.0.116.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:perf-5.10.0-207.0.0.116.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:kernel-devel-5.10.0-207.0.0.116.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:kernel-tools-devel-5.10.0-207.0.0.116.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:kernel-debugsource-5.10.0-207.0.0.116.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:kernel-tools-debuginfo-5.10.0-207.0.0.116.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:kernel-5.10.0-207.0.0.116.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:python3-perf-debuginfo-5.10.0-207.0.0.116.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:perf-debuginfo-5.10.0-207.0.0.116.oe2203sp3.x86_64"
					],
					"details":"kernel security update",
					"category":"vendor_fix",
					"url":"https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2024-1707"
				}
			],
			"scores":[
				{
					"cvss_v3":{
						"baseSeverity":"HIGH",
						"baseScore":7.0,
						"vectorString":"CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
						"version":"3.1"
					},
					"products":[
						"openEuler-22.03-LTS-SP3:perf-debuginfo-5.10.0-207.0.0.116.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:kernel-debuginfo-5.10.0-207.0.0.116.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:python3-perf-debuginfo-5.10.0-207.0.0.116.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:kernel-tools-debuginfo-5.10.0-207.0.0.116.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:kernel-tools-5.10.0-207.0.0.116.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:kernel-5.10.0-207.0.0.116.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:kernel-headers-5.10.0-207.0.0.116.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:kernel-devel-5.10.0-207.0.0.116.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:python3-perf-5.10.0-207.0.0.116.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:perf-5.10.0-207.0.0.116.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:kernel-tools-devel-5.10.0-207.0.0.116.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:kernel-debugsource-5.10.0-207.0.0.116.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:kernel-source-5.10.0-207.0.0.116.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:kernel-5.10.0-207.0.0.116.oe2203sp3.src",
						"openEuler-22.03-LTS-SP3:kernel-debuginfo-5.10.0-207.0.0.116.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:kernel-tools-5.10.0-207.0.0.116.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:python3-perf-5.10.0-207.0.0.116.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:kernel-source-5.10.0-207.0.0.116.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:kernel-headers-5.10.0-207.0.0.116.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:perf-5.10.0-207.0.0.116.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:kernel-devel-5.10.0-207.0.0.116.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:kernel-tools-devel-5.10.0-207.0.0.116.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:kernel-debugsource-5.10.0-207.0.0.116.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:kernel-tools-debuginfo-5.10.0-207.0.0.116.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:kernel-5.10.0-207.0.0.116.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:python3-perf-debuginfo-5.10.0-207.0.0.116.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:perf-debuginfo-5.10.0-207.0.0.116.oe2203sp3.x86_64"
					]
				}
			],
			"threats":[
				{
					"details":"High",
					"category":"impact"
				}
			],
			"title":"CVE-2024-36883"
		},
		{
			"cve":"CVE-2024-36886",
			"notes":[
				{
					"text":"In the Linux kernel, the following vulnerability has been resolved:\n\ntipc: fix UAF in error path\n\nSam Page (sam4k) working with Trend Micro Zero Day Initiative reported\na UAF in the tipc_buf_append() error path:\n\nBUG: KASAN: slab-use-after-free in kfree_skb_list_reason+0x47e/0x4c0\nlinux/net/core/skbuff.c:1183\nRead of size 8 at addr ffff88804d2a7c80 by task poc/8034\n\nCPU: 1 PID: 8034 Comm: poc Not tainted 6.8.2 #1\nHardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS\n1.16.0-debian-1.16.0-5 04/01/2014\nCall Trace:\n <IRQ>\n __dump_stack linux/lib/dump_stack.c:88\n dump_stack_lvl+0xd9/0x1b0 linux/lib/dump_stack.c:106\n print_address_description linux/mm/kasan/report.c:377\n print_report+0xc4/0x620 linux/mm/kasan/report.c:488\n kasan_report+0xda/0x110 linux/mm/kasan/report.c:601\n kfree_skb_list_reason+0x47e/0x4c0 linux/net/core/skbuff.c:1183\n skb_release_data+0x5af/0x880 linux/net/core/skbuff.c:1026\n skb_release_all linux/net/core/skbuff.c:1094\n __kfree_skb linux/net/core/skbuff.c:1108\n kfree_skb_reason+0x12d/0x210 linux/net/core/skbuff.c:1144\n kfree_skb linux/./include/linux/skbuff.h:1244\n tipc_buf_append+0x425/0xb50 linux/net/tipc/msg.c:186\n tipc_link_input+0x224/0x7c0 linux/net/tipc/link.c:1324\n tipc_link_rcv+0x76e/0x2d70 linux/net/tipc/link.c:1824\n tipc_rcv+0x45f/0x10f0 linux/net/tipc/node.c:2159\n tipc_udp_recv+0x73b/0x8f0 linux/net/tipc/udp_media.c:390\n udp_queue_rcv_one_skb+0xad2/0x1850 linux/net/ipv4/udp.c:2108\n udp_queue_rcv_skb+0x131/0xb00 linux/net/ipv4/udp.c:2186\n udp_unicast_rcv_skb+0x165/0x3b0 linux/net/ipv4/udp.c:2346\n __udp4_lib_rcv+0x2594/0x3400 linux/net/ipv4/udp.c:2422\n ip_protocol_deliver_rcu+0x30c/0x4e0 linux/net/ipv4/ip_input.c:205\n ip_local_deliver_finish+0x2e4/0x520 linux/net/ipv4/ip_input.c:233\n NF_HOOK linux/./include/linux/netfilter.h:314\n NF_HOOK linux/./include/linux/netfilter.h:308\n ip_local_deliver+0x18e/0x1f0 linux/net/ipv4/ip_input.c:254\n dst_input linux/./include/net/dst.h:461\n ip_rcv_finish linux/net/ipv4/ip_input.c:449\n NF_HOOK linux/./include/linux/netfilter.h:314\n NF_HOOK linux/./include/linux/netfilter.h:308\n ip_rcv+0x2c5/0x5d0 linux/net/ipv4/ip_input.c:569\n __netif_receive_skb_one_core+0x199/0x1e0 linux/net/core/dev.c:5534\n __netif_receive_skb+0x1f/0x1c0 linux/net/core/dev.c:5648\n process_backlog+0x101/0x6b0 linux/net/core/dev.c:5976\n __napi_poll.constprop.0+0xba/0x550 linux/net/core/dev.c:6576\n napi_poll linux/net/core/dev.c:6645\n net_rx_action+0x95a/0xe90 linux/net/core/dev.c:6781\n __do_softirq+0x21f/0x8e7 linux/kernel/softirq.c:553\n do_softirq linux/kernel/softirq.c:454\n do_softirq+0xb2/0xf0 linux/kernel/softirq.c:441\n </IRQ>\n <TASK>\n __local_bh_enable_ip+0x100/0x120 linux/kernel/softirq.c:381\n local_bh_enable linux/./include/linux/bottom_half.h:33\n rcu_read_unlock_bh linux/./include/linux/rcupdate.h:851\n __dev_queue_xmit+0x871/0x3ee0 linux/net/core/dev.c:4378\n dev_queue_xmit linux/./include/linux/netdevice.h:3169\n neigh_hh_output linux/./include/net/neighbour.h:526\n neigh_output linux/./include/net/neighbour.h:540\n ip_finish_output2+0x169f/0x2550 linux/net/ipv4/ip_output.c:235\n __ip_finish_output linux/net/ipv4/ip_output.c:313\n __ip_finish_output+0x49e/0x950 linux/net/ipv4/ip_output.c:295\n ip_finish_output+0x31/0x310 linux/net/ipv4/ip_output.c:323\n NF_HOOK_COND linux/./include/linux/netfilter.h:303\n ip_output+0x13b/0x2a0 linux/net/ipv4/ip_output.c:433\n dst_output linux/./include/net/dst.h:451\n ip_local_out linux/net/ipv4/ip_output.c:129\n ip_send_skb+0x3e5/0x560 linux/net/ipv4/ip_output.c:1492\n udp_send_skb+0x73f/0x1530 linux/net/ipv4/udp.c:963\n udp_sendmsg+0x1a36/0x2b40 linux/net/ipv4/udp.c:1250\n inet_sendmsg+0x105/0x140 linux/net/ipv4/af_inet.c:850\n sock_sendmsg_nosec linux/net/socket.c:730\n __sock_sendmsg linux/net/socket.c:745\n __sys_sendto+0x42c/0x4e0 linux/net/socket.c:2191\n __do_sys_sendto linux/net/socket.c:2203\n __se_sys_sendto linux/net/socket.c:2199\n __x64_sys_sendto+0xe0/0x1c0 linux/net/socket.c:2199\n do_syscall_x64 linux/arch/x86/entry/common.c:52\n do_syscall_\n---truncated---",
					"category":"description",
					"title":"Vulnerability Description"
				}
			],
			"product_status":{
				"fixed":[
					"openEuler-22.03-LTS-SP3:perf-debuginfo-5.10.0-207.0.0.116.oe2203sp3.aarch64",
					"openEuler-22.03-LTS-SP3:kernel-debuginfo-5.10.0-207.0.0.116.oe2203sp3.aarch64",
					"openEuler-22.03-LTS-SP3:python3-perf-debuginfo-5.10.0-207.0.0.116.oe2203sp3.aarch64",
					"openEuler-22.03-LTS-SP3:kernel-tools-debuginfo-5.10.0-207.0.0.116.oe2203sp3.aarch64",
					"openEuler-22.03-LTS-SP3:kernel-tools-5.10.0-207.0.0.116.oe2203sp3.aarch64",
					"openEuler-22.03-LTS-SP3:kernel-5.10.0-207.0.0.116.oe2203sp3.aarch64",
					"openEuler-22.03-LTS-SP3:kernel-headers-5.10.0-207.0.0.116.oe2203sp3.aarch64",
					"openEuler-22.03-LTS-SP3:kernel-devel-5.10.0-207.0.0.116.oe2203sp3.aarch64",
					"openEuler-22.03-LTS-SP3:python3-perf-5.10.0-207.0.0.116.oe2203sp3.aarch64",
					"openEuler-22.03-LTS-SP3:perf-5.10.0-207.0.0.116.oe2203sp3.aarch64",
					"openEuler-22.03-LTS-SP3:kernel-tools-devel-5.10.0-207.0.0.116.oe2203sp3.aarch64",
					"openEuler-22.03-LTS-SP3:kernel-debugsource-5.10.0-207.0.0.116.oe2203sp3.aarch64",
					"openEuler-22.03-LTS-SP3:kernel-source-5.10.0-207.0.0.116.oe2203sp3.aarch64",
					"openEuler-22.03-LTS-SP3:kernel-5.10.0-207.0.0.116.oe2203sp3.src",
					"openEuler-22.03-LTS-SP3:kernel-debuginfo-5.10.0-207.0.0.116.oe2203sp3.x86_64",
					"openEuler-22.03-LTS-SP3:kernel-tools-5.10.0-207.0.0.116.oe2203sp3.x86_64",
					"openEuler-22.03-LTS-SP3:python3-perf-5.10.0-207.0.0.116.oe2203sp3.x86_64",
					"openEuler-22.03-LTS-SP3:kernel-source-5.10.0-207.0.0.116.oe2203sp3.x86_64",
					"openEuler-22.03-LTS-SP3:kernel-headers-5.10.0-207.0.0.116.oe2203sp3.x86_64",
					"openEuler-22.03-LTS-SP3:perf-5.10.0-207.0.0.116.oe2203sp3.x86_64",
					"openEuler-22.03-LTS-SP3:kernel-devel-5.10.0-207.0.0.116.oe2203sp3.x86_64",
					"openEuler-22.03-LTS-SP3:kernel-tools-devel-5.10.0-207.0.0.116.oe2203sp3.x86_64",
					"openEuler-22.03-LTS-SP3:kernel-debugsource-5.10.0-207.0.0.116.oe2203sp3.x86_64",
					"openEuler-22.03-LTS-SP3:kernel-tools-debuginfo-5.10.0-207.0.0.116.oe2203sp3.x86_64",
					"openEuler-22.03-LTS-SP3:kernel-5.10.0-207.0.0.116.oe2203sp3.x86_64",
					"openEuler-22.03-LTS-SP3:python3-perf-debuginfo-5.10.0-207.0.0.116.oe2203sp3.x86_64",
					"openEuler-22.03-LTS-SP3:perf-debuginfo-5.10.0-207.0.0.116.oe2203sp3.x86_64"
				]
			},
			"remediations":[
				{
					"product_ids":[
						"openEuler-22.03-LTS-SP3:perf-debuginfo-5.10.0-207.0.0.116.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:kernel-debuginfo-5.10.0-207.0.0.116.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:python3-perf-debuginfo-5.10.0-207.0.0.116.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:kernel-tools-debuginfo-5.10.0-207.0.0.116.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:kernel-tools-5.10.0-207.0.0.116.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:kernel-5.10.0-207.0.0.116.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:kernel-headers-5.10.0-207.0.0.116.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:kernel-devel-5.10.0-207.0.0.116.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:python3-perf-5.10.0-207.0.0.116.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:perf-5.10.0-207.0.0.116.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:kernel-tools-devel-5.10.0-207.0.0.116.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:kernel-debugsource-5.10.0-207.0.0.116.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:kernel-source-5.10.0-207.0.0.116.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:kernel-5.10.0-207.0.0.116.oe2203sp3.src",
						"openEuler-22.03-LTS-SP3:kernel-debuginfo-5.10.0-207.0.0.116.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:kernel-tools-5.10.0-207.0.0.116.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:python3-perf-5.10.0-207.0.0.116.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:kernel-source-5.10.0-207.0.0.116.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:kernel-headers-5.10.0-207.0.0.116.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:perf-5.10.0-207.0.0.116.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:kernel-devel-5.10.0-207.0.0.116.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:kernel-tools-devel-5.10.0-207.0.0.116.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:kernel-debugsource-5.10.0-207.0.0.116.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:kernel-tools-debuginfo-5.10.0-207.0.0.116.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:kernel-5.10.0-207.0.0.116.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:python3-perf-debuginfo-5.10.0-207.0.0.116.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:perf-debuginfo-5.10.0-207.0.0.116.oe2203sp3.x86_64"
					],
					"details":"kernel security update",
					"category":"vendor_fix",
					"url":"https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2024-1707"
				}
			],
			"scores":[
				{
					"cvss_v3":{
						"baseSeverity":"MEDIUM",
						"baseScore":6.1,
						"vectorString":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H",
						"version":"3.1"
					},
					"products":[
						"openEuler-22.03-LTS-SP3:perf-debuginfo-5.10.0-207.0.0.116.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:kernel-debuginfo-5.10.0-207.0.0.116.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:python3-perf-debuginfo-5.10.0-207.0.0.116.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:kernel-tools-debuginfo-5.10.0-207.0.0.116.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:kernel-tools-5.10.0-207.0.0.116.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:kernel-5.10.0-207.0.0.116.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:kernel-headers-5.10.0-207.0.0.116.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:kernel-devel-5.10.0-207.0.0.116.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:python3-perf-5.10.0-207.0.0.116.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:perf-5.10.0-207.0.0.116.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:kernel-tools-devel-5.10.0-207.0.0.116.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:kernel-debugsource-5.10.0-207.0.0.116.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:kernel-source-5.10.0-207.0.0.116.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:kernel-5.10.0-207.0.0.116.oe2203sp3.src",
						"openEuler-22.03-LTS-SP3:kernel-debuginfo-5.10.0-207.0.0.116.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:kernel-tools-5.10.0-207.0.0.116.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:python3-perf-5.10.0-207.0.0.116.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:kernel-source-5.10.0-207.0.0.116.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:kernel-headers-5.10.0-207.0.0.116.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:perf-5.10.0-207.0.0.116.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:kernel-devel-5.10.0-207.0.0.116.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:kernel-tools-devel-5.10.0-207.0.0.116.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:kernel-debugsource-5.10.0-207.0.0.116.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:kernel-tools-debuginfo-5.10.0-207.0.0.116.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:kernel-5.10.0-207.0.0.116.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:python3-perf-debuginfo-5.10.0-207.0.0.116.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:perf-debuginfo-5.10.0-207.0.0.116.oe2203sp3.x86_64"
					]
				}
			],
			"threats":[
				{
					"details":"Medium",
					"category":"impact"
				}
			],
			"title":"CVE-2024-36886"
		},
		{
			"cve":"CVE-2024-36889",
			"notes":[
				{
					"text":"In the Linux kernel, the following vulnerability has been resolved:\n\nmptcp: ensure snd_nxt is properly initialized on connect\n\nChristoph reported a splat hinting at a corrupted snd_una:\n\n  WARNING: CPU: 1 PID: 38 at net/mptcp/protocol.c:1005 __mptcp_clean_una+0x4b3/0x620 net/mptcp/protocol.c:1005\n  Modules linked in:\n  CPU: 1 PID: 38 Comm: kworker/1:1 Not tainted 6.9.0-rc1-gbbeac67456c9 #59\n  Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.11.0-2.el7 04/01/2014\n  Workqueue: events mptcp_worker\n  RIP: 0010:__mptcp_clean_una+0x4b3/0x620 net/mptcp/protocol.c:1005\n  Code: be 06 01 00 00 bf 06 01 00 00 e8 a8 12 e7 fe e9 00 fe ff ff e8\n  \t8e 1a e7 fe 0f b7 ab 3e 02 00 00 e9 d3 fd ff ff e8 7d 1a e7 fe\n  \t<0f> 0b 4c 8b bb e0 05 00 00 e9 74 fc ff ff e8 6a 1a e7 fe 0f 0b e9\n  RSP: 0018:ffffc9000013fd48 EFLAGS: 00010293\n  RAX: 0000000000000000 RBX: ffff8881029bd280 RCX: ffffffff82382fe4\n  RDX: ffff8881003cbd00 RSI: ffffffff823833c3 RDI: 0000000000000001\n  RBP: 0000000000000000 R08: 0000000000000001 R09: 0000000000000000\n  R10: 0000000000000000 R11: fefefefefefefeff R12: ffff888138ba8000\n  R13: 0000000000000106 R14: ffff8881029bd908 R15: ffff888126560000\n  FS:  0000000000000000(0000) GS:ffff88813bd00000(0000) knlGS:0000000000000000\n  CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033\n  CR2: 00007f604a5dae38 CR3: 0000000101dac002 CR4: 0000000000170ef0\n  Call Trace:\n   <TASK>\n   __mptcp_clean_una_wakeup net/mptcp/protocol.c:1055 [inline]\n   mptcp_clean_una_wakeup net/mptcp/protocol.c:1062 [inline]\n   __mptcp_retrans+0x7f/0x7e0 net/mptcp/protocol.c:2615\n   mptcp_worker+0x434/0x740 net/mptcp/protocol.c:2767\n   process_one_work+0x1e0/0x560 kernel/workqueue.c:3254\n   process_scheduled_works kernel/workqueue.c:3335 [inline]\n   worker_thread+0x3c7/0x640 kernel/workqueue.c:3416\n   kthread+0x121/0x170 kernel/kthread.c:388\n   ret_from_fork+0x44/0x50 arch/x86/kernel/process.c:147\n   ret_from_fork_asm+0x1a/0x30 arch/x86/entry/entry_64.S:243\n   </TASK>\n\nWhen fallback to TCP happens early on a client socket, snd_nxt\nis not yet initialized and any incoming ack will copy such value\ninto snd_una. If the mptcp worker (dumbly) tries mptcp-level\nre-injection after such ack, that would unconditionally trigger a send\nbuffer cleanup using 'bad' snd_una values.\n\nWe could easily disable re-injection for fallback sockets, but such\ndumb behavior already helped catching a few subtle issues and a very\nlow to zero impact in practice.\n\nInstead address the issue always initializing snd_nxt (and write_seq,\nfor consistency) at connect time.",
					"category":"description",
					"title":"Vulnerability Description"
				}
			],
			"product_status":{
				"fixed":[
					"openEuler-22.03-LTS-SP3:perf-debuginfo-5.10.0-207.0.0.116.oe2203sp3.aarch64",
					"openEuler-22.03-LTS-SP3:kernel-debuginfo-5.10.0-207.0.0.116.oe2203sp3.aarch64",
					"openEuler-22.03-LTS-SP3:python3-perf-debuginfo-5.10.0-207.0.0.116.oe2203sp3.aarch64",
					"openEuler-22.03-LTS-SP3:kernel-tools-debuginfo-5.10.0-207.0.0.116.oe2203sp3.aarch64",
					"openEuler-22.03-LTS-SP3:kernel-tools-5.10.0-207.0.0.116.oe2203sp3.aarch64",
					"openEuler-22.03-LTS-SP3:kernel-5.10.0-207.0.0.116.oe2203sp3.aarch64",
					"openEuler-22.03-LTS-SP3:kernel-headers-5.10.0-207.0.0.116.oe2203sp3.aarch64",
					"openEuler-22.03-LTS-SP3:kernel-devel-5.10.0-207.0.0.116.oe2203sp3.aarch64",
					"openEuler-22.03-LTS-SP3:python3-perf-5.10.0-207.0.0.116.oe2203sp3.aarch64",
					"openEuler-22.03-LTS-SP3:perf-5.10.0-207.0.0.116.oe2203sp3.aarch64",
					"openEuler-22.03-LTS-SP3:kernel-tools-devel-5.10.0-207.0.0.116.oe2203sp3.aarch64",
					"openEuler-22.03-LTS-SP3:kernel-debugsource-5.10.0-207.0.0.116.oe2203sp3.aarch64",
					"openEuler-22.03-LTS-SP3:kernel-source-5.10.0-207.0.0.116.oe2203sp3.aarch64",
					"openEuler-22.03-LTS-SP3:kernel-5.10.0-207.0.0.116.oe2203sp3.src",
					"openEuler-22.03-LTS-SP3:kernel-debuginfo-5.10.0-207.0.0.116.oe2203sp3.x86_64",
					"openEuler-22.03-LTS-SP3:kernel-tools-5.10.0-207.0.0.116.oe2203sp3.x86_64",
					"openEuler-22.03-LTS-SP3:python3-perf-5.10.0-207.0.0.116.oe2203sp3.x86_64",
					"openEuler-22.03-LTS-SP3:kernel-source-5.10.0-207.0.0.116.oe2203sp3.x86_64",
					"openEuler-22.03-LTS-SP3:kernel-headers-5.10.0-207.0.0.116.oe2203sp3.x86_64",
					"openEuler-22.03-LTS-SP3:perf-5.10.0-207.0.0.116.oe2203sp3.x86_64",
					"openEuler-22.03-LTS-SP3:kernel-devel-5.10.0-207.0.0.116.oe2203sp3.x86_64",
					"openEuler-22.03-LTS-SP3:kernel-tools-devel-5.10.0-207.0.0.116.oe2203sp3.x86_64",
					"openEuler-22.03-LTS-SP3:kernel-debugsource-5.10.0-207.0.0.116.oe2203sp3.x86_64",
					"openEuler-22.03-LTS-SP3:kernel-tools-debuginfo-5.10.0-207.0.0.116.oe2203sp3.x86_64",
					"openEuler-22.03-LTS-SP3:kernel-5.10.0-207.0.0.116.oe2203sp3.x86_64",
					"openEuler-22.03-LTS-SP3:python3-perf-debuginfo-5.10.0-207.0.0.116.oe2203sp3.x86_64",
					"openEuler-22.03-LTS-SP3:perf-debuginfo-5.10.0-207.0.0.116.oe2203sp3.x86_64"
				]
			},
			"remediations":[
				{
					"product_ids":[
						"openEuler-22.03-LTS-SP3:perf-debuginfo-5.10.0-207.0.0.116.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:kernel-debuginfo-5.10.0-207.0.0.116.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:python3-perf-debuginfo-5.10.0-207.0.0.116.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:kernel-tools-debuginfo-5.10.0-207.0.0.116.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:kernel-tools-5.10.0-207.0.0.116.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:kernel-5.10.0-207.0.0.116.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:kernel-headers-5.10.0-207.0.0.116.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:kernel-devel-5.10.0-207.0.0.116.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:python3-perf-5.10.0-207.0.0.116.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:perf-5.10.0-207.0.0.116.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:kernel-tools-devel-5.10.0-207.0.0.116.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:kernel-debugsource-5.10.0-207.0.0.116.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:kernel-source-5.10.0-207.0.0.116.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:kernel-5.10.0-207.0.0.116.oe2203sp3.src",
						"openEuler-22.03-LTS-SP3:kernel-debuginfo-5.10.0-207.0.0.116.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:kernel-tools-5.10.0-207.0.0.116.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:python3-perf-5.10.0-207.0.0.116.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:kernel-source-5.10.0-207.0.0.116.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:kernel-headers-5.10.0-207.0.0.116.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:perf-5.10.0-207.0.0.116.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:kernel-devel-5.10.0-207.0.0.116.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:kernel-tools-devel-5.10.0-207.0.0.116.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:kernel-debugsource-5.10.0-207.0.0.116.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:kernel-tools-debuginfo-5.10.0-207.0.0.116.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:kernel-5.10.0-207.0.0.116.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:python3-perf-debuginfo-5.10.0-207.0.0.116.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:perf-debuginfo-5.10.0-207.0.0.116.oe2203sp3.x86_64"
					],
					"details":"kernel security update",
					"category":"vendor_fix",
					"url":"https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2024-1707"
				}
			],
			"scores":[
				{
					"cvss_v3":{
						"baseSeverity":"LOW",
						"baseScore":3.3,
						"vectorString":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N",
						"version":"3.1"
					},
					"products":[
						"openEuler-22.03-LTS-SP3:perf-debuginfo-5.10.0-207.0.0.116.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:kernel-debuginfo-5.10.0-207.0.0.116.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:python3-perf-debuginfo-5.10.0-207.0.0.116.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:kernel-tools-debuginfo-5.10.0-207.0.0.116.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:kernel-tools-5.10.0-207.0.0.116.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:kernel-5.10.0-207.0.0.116.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:kernel-headers-5.10.0-207.0.0.116.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:kernel-devel-5.10.0-207.0.0.116.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:python3-perf-5.10.0-207.0.0.116.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:perf-5.10.0-207.0.0.116.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:kernel-tools-devel-5.10.0-207.0.0.116.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:kernel-debugsource-5.10.0-207.0.0.116.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:kernel-source-5.10.0-207.0.0.116.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:kernel-5.10.0-207.0.0.116.oe2203sp3.src",
						"openEuler-22.03-LTS-SP3:kernel-debuginfo-5.10.0-207.0.0.116.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:kernel-tools-5.10.0-207.0.0.116.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:python3-perf-5.10.0-207.0.0.116.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:kernel-source-5.10.0-207.0.0.116.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:kernel-headers-5.10.0-207.0.0.116.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:perf-5.10.0-207.0.0.116.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:kernel-devel-5.10.0-207.0.0.116.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:kernel-tools-devel-5.10.0-207.0.0.116.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:kernel-debugsource-5.10.0-207.0.0.116.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:kernel-tools-debuginfo-5.10.0-207.0.0.116.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:kernel-5.10.0-207.0.0.116.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:python3-perf-debuginfo-5.10.0-207.0.0.116.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:perf-debuginfo-5.10.0-207.0.0.116.oe2203sp3.x86_64"
					]
				}
			],
			"threats":[
				{
					"details":"Low",
					"category":"impact"
				}
			],
			"title":"CVE-2024-36889"
		},
		{
			"cve":"CVE-2024-36898",
			"notes":[
				{
					"text":"In the Linux kernel, the following vulnerability has been resolved:\n\ngpiolib: cdev: fix uninitialised kfifo\n\nIf a line is requested with debounce, and that results in debouncing\nin software, and the line is subsequently reconfigured to enable edge\ndetection then the allocation of the kfifo to contain edge events is\noverlooked.  This results in events being written to and read from an\nuninitialised kfifo.  Read events are returned to userspace.\n\nInitialise the kfifo in the case where the software debounce is\nalready active.",
					"category":"description",
					"title":"Vulnerability Description"
				}
			],
			"product_status":{
				"fixed":[
					"openEuler-22.03-LTS-SP3:perf-debuginfo-5.10.0-207.0.0.116.oe2203sp3.aarch64",
					"openEuler-22.03-LTS-SP3:kernel-debuginfo-5.10.0-207.0.0.116.oe2203sp3.aarch64",
					"openEuler-22.03-LTS-SP3:python3-perf-debuginfo-5.10.0-207.0.0.116.oe2203sp3.aarch64",
					"openEuler-22.03-LTS-SP3:kernel-tools-debuginfo-5.10.0-207.0.0.116.oe2203sp3.aarch64",
					"openEuler-22.03-LTS-SP3:kernel-tools-5.10.0-207.0.0.116.oe2203sp3.aarch64",
					"openEuler-22.03-LTS-SP3:kernel-5.10.0-207.0.0.116.oe2203sp3.aarch64",
					"openEuler-22.03-LTS-SP3:kernel-headers-5.10.0-207.0.0.116.oe2203sp3.aarch64",
					"openEuler-22.03-LTS-SP3:kernel-devel-5.10.0-207.0.0.116.oe2203sp3.aarch64",
					"openEuler-22.03-LTS-SP3:python3-perf-5.10.0-207.0.0.116.oe2203sp3.aarch64",
					"openEuler-22.03-LTS-SP3:perf-5.10.0-207.0.0.116.oe2203sp3.aarch64",
					"openEuler-22.03-LTS-SP3:kernel-tools-devel-5.10.0-207.0.0.116.oe2203sp3.aarch64",
					"openEuler-22.03-LTS-SP3:kernel-debugsource-5.10.0-207.0.0.116.oe2203sp3.aarch64",
					"openEuler-22.03-LTS-SP3:kernel-source-5.10.0-207.0.0.116.oe2203sp3.aarch64",
					"openEuler-22.03-LTS-SP3:kernel-5.10.0-207.0.0.116.oe2203sp3.src",
					"openEuler-22.03-LTS-SP3:kernel-debuginfo-5.10.0-207.0.0.116.oe2203sp3.x86_64",
					"openEuler-22.03-LTS-SP3:kernel-tools-5.10.0-207.0.0.116.oe2203sp3.x86_64",
					"openEuler-22.03-LTS-SP3:python3-perf-5.10.0-207.0.0.116.oe2203sp3.x86_64",
					"openEuler-22.03-LTS-SP3:kernel-source-5.10.0-207.0.0.116.oe2203sp3.x86_64",
					"openEuler-22.03-LTS-SP3:kernel-headers-5.10.0-207.0.0.116.oe2203sp3.x86_64",
					"openEuler-22.03-LTS-SP3:perf-5.10.0-207.0.0.116.oe2203sp3.x86_64",
					"openEuler-22.03-LTS-SP3:kernel-devel-5.10.0-207.0.0.116.oe2203sp3.x86_64",
					"openEuler-22.03-LTS-SP3:kernel-tools-devel-5.10.0-207.0.0.116.oe2203sp3.x86_64",
					"openEuler-22.03-LTS-SP3:kernel-debugsource-5.10.0-207.0.0.116.oe2203sp3.x86_64",
					"openEuler-22.03-LTS-SP3:kernel-tools-debuginfo-5.10.0-207.0.0.116.oe2203sp3.x86_64",
					"openEuler-22.03-LTS-SP3:kernel-5.10.0-207.0.0.116.oe2203sp3.x86_64",
					"openEuler-22.03-LTS-SP3:python3-perf-debuginfo-5.10.0-207.0.0.116.oe2203sp3.x86_64",
					"openEuler-22.03-LTS-SP3:perf-debuginfo-5.10.0-207.0.0.116.oe2203sp3.x86_64"
				]
			},
			"remediations":[
				{
					"product_ids":[
						"openEuler-22.03-LTS-SP3:perf-debuginfo-5.10.0-207.0.0.116.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:kernel-debuginfo-5.10.0-207.0.0.116.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:python3-perf-debuginfo-5.10.0-207.0.0.116.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:kernel-tools-debuginfo-5.10.0-207.0.0.116.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:kernel-tools-5.10.0-207.0.0.116.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:kernel-5.10.0-207.0.0.116.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:kernel-headers-5.10.0-207.0.0.116.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:kernel-devel-5.10.0-207.0.0.116.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:python3-perf-5.10.0-207.0.0.116.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:perf-5.10.0-207.0.0.116.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:kernel-tools-devel-5.10.0-207.0.0.116.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:kernel-debugsource-5.10.0-207.0.0.116.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:kernel-source-5.10.0-207.0.0.116.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:kernel-5.10.0-207.0.0.116.oe2203sp3.src",
						"openEuler-22.03-LTS-SP3:kernel-debuginfo-5.10.0-207.0.0.116.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:kernel-tools-5.10.0-207.0.0.116.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:python3-perf-5.10.0-207.0.0.116.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:kernel-source-5.10.0-207.0.0.116.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:kernel-headers-5.10.0-207.0.0.116.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:perf-5.10.0-207.0.0.116.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:kernel-devel-5.10.0-207.0.0.116.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:kernel-tools-devel-5.10.0-207.0.0.116.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:kernel-debugsource-5.10.0-207.0.0.116.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:kernel-tools-debuginfo-5.10.0-207.0.0.116.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:kernel-5.10.0-207.0.0.116.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:python3-perf-debuginfo-5.10.0-207.0.0.116.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:perf-debuginfo-5.10.0-207.0.0.116.oe2203sp3.x86_64"
					],
					"details":"kernel security update",
					"category":"vendor_fix",
					"url":"https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2024-1707"
				}
			],
			"scores":[
				{
					"cvss_v3":{
						"baseSeverity":"MEDIUM",
						"baseScore":6.1,
						"vectorString":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H",
						"version":"3.1"
					},
					"products":[
						"openEuler-22.03-LTS-SP3:perf-debuginfo-5.10.0-207.0.0.116.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:kernel-debuginfo-5.10.0-207.0.0.116.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:python3-perf-debuginfo-5.10.0-207.0.0.116.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:kernel-tools-debuginfo-5.10.0-207.0.0.116.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:kernel-tools-5.10.0-207.0.0.116.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:kernel-5.10.0-207.0.0.116.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:kernel-headers-5.10.0-207.0.0.116.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:kernel-devel-5.10.0-207.0.0.116.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:python3-perf-5.10.0-207.0.0.116.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:perf-5.10.0-207.0.0.116.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:kernel-tools-devel-5.10.0-207.0.0.116.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:kernel-debugsource-5.10.0-207.0.0.116.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:kernel-source-5.10.0-207.0.0.116.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:kernel-5.10.0-207.0.0.116.oe2203sp3.src",
						"openEuler-22.03-LTS-SP3:kernel-debuginfo-5.10.0-207.0.0.116.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:kernel-tools-5.10.0-207.0.0.116.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:python3-perf-5.10.0-207.0.0.116.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:kernel-source-5.10.0-207.0.0.116.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:kernel-headers-5.10.0-207.0.0.116.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:perf-5.10.0-207.0.0.116.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:kernel-devel-5.10.0-207.0.0.116.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:kernel-tools-devel-5.10.0-207.0.0.116.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:kernel-debugsource-5.10.0-207.0.0.116.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:kernel-tools-debuginfo-5.10.0-207.0.0.116.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:kernel-5.10.0-207.0.0.116.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:python3-perf-debuginfo-5.10.0-207.0.0.116.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:perf-debuginfo-5.10.0-207.0.0.116.oe2203sp3.x86_64"
					]
				}
			],
			"threats":[
				{
					"details":"Medium",
					"category":"impact"
				}
			],
			"title":"CVE-2024-36898"
		},
		{
			"cve":"CVE-2024-36899",
			"notes":[
				{
					"text":"In the Linux kernel, the following vulnerability has been resolved:\n\ngpiolib: cdev: Fix use after free in lineinfo_changed_notify\n\nThe use-after-free issue occurs as follows: when the GPIO chip device file\nis being closed by invoking gpio_chrdev_release(), watched_lines is freed\nby bitmap_free(), but the unregistration of lineinfo_changed_nb notifier\nchain failed due to waiting write rwsem. Additionally, one of the GPIO\nchip's lines is also in the release process and holds the notifier chain's\nread rwsem. Consequently, a race condition leads to the use-after-free of\nwatched_lines.\n\nHere is the typical stack when issue happened:\n\n[free]\ngpio_chrdev_release()\n  --> bitmap_free(cdev->watched_lines)                  <-- freed\n  --> blocking_notifier_chain_unregister()\n    --> down_write(&nh->rwsem)                          <-- waiting rwsem\n          --> __down_write_common()\n            --> rwsem_down_write_slowpath()\n                  --> schedule_preempt_disabled()\n                    --> schedule()\n\n[use]\nst54spi_gpio_dev_release()\n  --> gpio_free()\n    --> gpiod_free()\n      --> gpiod_free_commit()\n        --> gpiod_line_state_notify()\n          --> blocking_notifier_call_chain()\n            --> down_read(&nh->rwsem);                  <-- held rwsem\n            --> notifier_call_chain()\n              --> lineinfo_changed_notify()\n                --> test_bit(xxxx, cdev->watched_lines) <-- use after free\n\nThe side effect of the use-after-free issue is that a GPIO line event is\nbeing generated for userspace where it shouldn't. However, since the chrdev\nis being closed, userspace won't have the chance to read that event anyway.\n\nTo fix the issue, call the bitmap_free() function after the unregistration\nof lineinfo_changed_nb notifier chain.",
					"category":"description",
					"title":"Vulnerability Description"
				}
			],
			"product_status":{
				"fixed":[
					"openEuler-22.03-LTS-SP3:perf-debuginfo-5.10.0-207.0.0.116.oe2203sp3.aarch64",
					"openEuler-22.03-LTS-SP3:kernel-debuginfo-5.10.0-207.0.0.116.oe2203sp3.aarch64",
					"openEuler-22.03-LTS-SP3:python3-perf-debuginfo-5.10.0-207.0.0.116.oe2203sp3.aarch64",
					"openEuler-22.03-LTS-SP3:kernel-tools-debuginfo-5.10.0-207.0.0.116.oe2203sp3.aarch64",
					"openEuler-22.03-LTS-SP3:kernel-tools-5.10.0-207.0.0.116.oe2203sp3.aarch64",
					"openEuler-22.03-LTS-SP3:kernel-5.10.0-207.0.0.116.oe2203sp3.aarch64",
					"openEuler-22.03-LTS-SP3:kernel-headers-5.10.0-207.0.0.116.oe2203sp3.aarch64",
					"openEuler-22.03-LTS-SP3:kernel-devel-5.10.0-207.0.0.116.oe2203sp3.aarch64",
					"openEuler-22.03-LTS-SP3:python3-perf-5.10.0-207.0.0.116.oe2203sp3.aarch64",
					"openEuler-22.03-LTS-SP3:perf-5.10.0-207.0.0.116.oe2203sp3.aarch64",
					"openEuler-22.03-LTS-SP3:kernel-tools-devel-5.10.0-207.0.0.116.oe2203sp3.aarch64",
					"openEuler-22.03-LTS-SP3:kernel-debugsource-5.10.0-207.0.0.116.oe2203sp3.aarch64",
					"openEuler-22.03-LTS-SP3:kernel-source-5.10.0-207.0.0.116.oe2203sp3.aarch64",
					"openEuler-22.03-LTS-SP3:kernel-5.10.0-207.0.0.116.oe2203sp3.src",
					"openEuler-22.03-LTS-SP3:kernel-debuginfo-5.10.0-207.0.0.116.oe2203sp3.x86_64",
					"openEuler-22.03-LTS-SP3:kernel-tools-5.10.0-207.0.0.116.oe2203sp3.x86_64",
					"openEuler-22.03-LTS-SP3:python3-perf-5.10.0-207.0.0.116.oe2203sp3.x86_64",
					"openEuler-22.03-LTS-SP3:kernel-source-5.10.0-207.0.0.116.oe2203sp3.x86_64",
					"openEuler-22.03-LTS-SP3:kernel-headers-5.10.0-207.0.0.116.oe2203sp3.x86_64",
					"openEuler-22.03-LTS-SP3:perf-5.10.0-207.0.0.116.oe2203sp3.x86_64",
					"openEuler-22.03-LTS-SP3:kernel-devel-5.10.0-207.0.0.116.oe2203sp3.x86_64",
					"openEuler-22.03-LTS-SP3:kernel-tools-devel-5.10.0-207.0.0.116.oe2203sp3.x86_64",
					"openEuler-22.03-LTS-SP3:kernel-debugsource-5.10.0-207.0.0.116.oe2203sp3.x86_64",
					"openEuler-22.03-LTS-SP3:kernel-tools-debuginfo-5.10.0-207.0.0.116.oe2203sp3.x86_64",
					"openEuler-22.03-LTS-SP3:kernel-5.10.0-207.0.0.116.oe2203sp3.x86_64",
					"openEuler-22.03-LTS-SP3:python3-perf-debuginfo-5.10.0-207.0.0.116.oe2203sp3.x86_64",
					"openEuler-22.03-LTS-SP3:perf-debuginfo-5.10.0-207.0.0.116.oe2203sp3.x86_64"
				]
			},
			"remediations":[
				{
					"product_ids":[
						"openEuler-22.03-LTS-SP3:perf-debuginfo-5.10.0-207.0.0.116.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:kernel-debuginfo-5.10.0-207.0.0.116.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:python3-perf-debuginfo-5.10.0-207.0.0.116.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:kernel-tools-debuginfo-5.10.0-207.0.0.116.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:kernel-tools-5.10.0-207.0.0.116.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:kernel-5.10.0-207.0.0.116.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:kernel-headers-5.10.0-207.0.0.116.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:kernel-devel-5.10.0-207.0.0.116.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:python3-perf-5.10.0-207.0.0.116.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:perf-5.10.0-207.0.0.116.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:kernel-tools-devel-5.10.0-207.0.0.116.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:kernel-debugsource-5.10.0-207.0.0.116.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:kernel-source-5.10.0-207.0.0.116.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:kernel-5.10.0-207.0.0.116.oe2203sp3.src",
						"openEuler-22.03-LTS-SP3:kernel-debuginfo-5.10.0-207.0.0.116.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:kernel-tools-5.10.0-207.0.0.116.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:python3-perf-5.10.0-207.0.0.116.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:kernel-source-5.10.0-207.0.0.116.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:kernel-headers-5.10.0-207.0.0.116.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:perf-5.10.0-207.0.0.116.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:kernel-devel-5.10.0-207.0.0.116.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:kernel-tools-devel-5.10.0-207.0.0.116.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:kernel-debugsource-5.10.0-207.0.0.116.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:kernel-tools-debuginfo-5.10.0-207.0.0.116.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:kernel-5.10.0-207.0.0.116.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:python3-perf-debuginfo-5.10.0-207.0.0.116.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:perf-debuginfo-5.10.0-207.0.0.116.oe2203sp3.x86_64"
					],
					"details":"kernel security update",
					"category":"vendor_fix",
					"url":"https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2024-1707"
				}
			],
			"scores":[
				{
					"cvss_v3":{
						"baseSeverity":"HIGH",
						"baseScore":7.0,
						"vectorString":"CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
						"version":"3.1"
					},
					"products":[
						"openEuler-22.03-LTS-SP3:perf-debuginfo-5.10.0-207.0.0.116.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:kernel-debuginfo-5.10.0-207.0.0.116.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:python3-perf-debuginfo-5.10.0-207.0.0.116.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:kernel-tools-debuginfo-5.10.0-207.0.0.116.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:kernel-tools-5.10.0-207.0.0.116.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:kernel-5.10.0-207.0.0.116.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:kernel-headers-5.10.0-207.0.0.116.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:kernel-devel-5.10.0-207.0.0.116.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:python3-perf-5.10.0-207.0.0.116.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:perf-5.10.0-207.0.0.116.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:kernel-tools-devel-5.10.0-207.0.0.116.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:kernel-debugsource-5.10.0-207.0.0.116.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:kernel-source-5.10.0-207.0.0.116.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:kernel-5.10.0-207.0.0.116.oe2203sp3.src",
						"openEuler-22.03-LTS-SP3:kernel-debuginfo-5.10.0-207.0.0.116.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:kernel-tools-5.10.0-207.0.0.116.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:python3-perf-5.10.0-207.0.0.116.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:kernel-source-5.10.0-207.0.0.116.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:kernel-headers-5.10.0-207.0.0.116.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:perf-5.10.0-207.0.0.116.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:kernel-devel-5.10.0-207.0.0.116.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:kernel-tools-devel-5.10.0-207.0.0.116.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:kernel-debugsource-5.10.0-207.0.0.116.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:kernel-tools-debuginfo-5.10.0-207.0.0.116.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:kernel-5.10.0-207.0.0.116.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:python3-perf-debuginfo-5.10.0-207.0.0.116.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:perf-debuginfo-5.10.0-207.0.0.116.oe2203sp3.x86_64"
					]
				}
			],
			"threats":[
				{
					"details":"High",
					"category":"impact"
				}
			],
			"title":"CVE-2024-36899"
		},
		{
			"cve":"CVE-2024-36901",
			"notes":[
				{
					"text":"In the Linux kernel, the following vulnerability has been resolved:\n\nipv6: prevent NULL dereference in ip6_output()\n\nAccording to syzbot, there is a chance that ip6_dst_idev()\nreturns NULL in ip6_output(). Most places in IPv6 stack\ndeal with a NULL idev just fine, but not here.\n\nsyzbot reported:\n\ngeneral protection fault, probably for non-canonical address 0xdffffc00000000bc: 0000 [#1] PREEMPT SMP KASAN PTI\nKASAN: null-ptr-deref in range [0x00000000000005e0-0x00000000000005e7]\nCPU: 0 PID: 9775 Comm: syz-executor.4 Not tainted 6.9.0-rc5-syzkaller-00157-g6a30653b604a #0\nHardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 03/27/2024\n RIP: 0010:ip6_output+0x231/0x3f0 net/ipv6/ip6_output.c:237\nCode: 3c 1e 00 49 89 df 74 08 4c 89 ef e8 19 58 db f7 48 8b 44 24 20 49 89 45 00 49 89 c5 48 8d 9d e0 05 00 00 48 89 d8 48 c1 e8 03 <42> 0f b6 04 38 84 c0 4c 8b 74 24 28 0f 85 61 01 00 00 8b 1b 31 ff\nRSP: 0018:ffffc9000927f0d8 EFLAGS: 00010202\nRAX: 00000000000000bc RBX: 00000000000005e0 RCX: 0000000000040000\nRDX: ffffc900131f9000 RSI: 0000000000004f47 RDI: 0000000000004f48\nRBP: 0000000000000000 R08: ffffffff8a1f0b9a R09: 1ffffffff1f51fad\nR10: dffffc0000000000 R11: fffffbfff1f51fae R12: ffff8880293ec8c0\nR13: ffff88805d7fc000 R14: 1ffff1100527d91a R15: dffffc0000000000\nFS:  00007f135c6856c0(0000) GS:ffff8880b9400000(0000) knlGS:0000000000000000\nCS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033\nCR2: 0000000020000080 CR3: 0000000064096000 CR4: 00000000003506f0\nDR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000\nDR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400\nCall Trace:\n <TASK>\n  NF_HOOK include/linux/netfilter.h:314 [inline]\n  ip6_xmit+0xefe/0x17f0 net/ipv6/ip6_output.c:358\n  sctp_v6_xmit+0x9f2/0x13f0 net/sctp/ipv6.c:248\n  sctp_packet_transmit+0x26ad/0x2ca0 net/sctp/output.c:653\n  sctp_packet_singleton+0x22c/0x320 net/sctp/outqueue.c:783\n  sctp_outq_flush_ctrl net/sctp/outqueue.c:914 [inline]\n  sctp_outq_flush+0x6d5/0x3e20 net/sctp/outqueue.c:1212\n  sctp_side_effects net/sctp/sm_sideeffect.c:1198 [inline]\n  sctp_do_sm+0x59cc/0x60c0 net/sctp/sm_sideeffect.c:1169\n  sctp_primitive_ASSOCIATE+0x95/0xc0 net/sctp/primitive.c:73\n  __sctp_connect+0x9cd/0xe30 net/sctp/socket.c:1234\n  sctp_connect net/sctp/socket.c:4819 [inline]\n  sctp_inet_connect+0x149/0x1f0 net/sctp/socket.c:4834\n  __sys_connect_file net/socket.c:2048 [inline]\n  __sys_connect+0x2df/0x310 net/socket.c:2065\n  __do_sys_connect net/socket.c:2075 [inline]\n  __se_sys_connect net/socket.c:2072 [inline]\n  __x64_sys_connect+0x7a/0x90 net/socket.c:2072\n  do_syscall_x64 arch/x86/entry/common.c:52 [inline]\n  do_syscall_64+0xf5/0x240 arch/x86/entry/common.c:83\n entry_SYSCALL_64_after_hwframe+0x77/0x7f",
					"category":"description",
					"title":"Vulnerability Description"
				}
			],
			"product_status":{
				"fixed":[
					"openEuler-22.03-LTS-SP3:perf-debuginfo-5.10.0-207.0.0.116.oe2203sp3.aarch64",
					"openEuler-22.03-LTS-SP3:kernel-debuginfo-5.10.0-207.0.0.116.oe2203sp3.aarch64",
					"openEuler-22.03-LTS-SP3:python3-perf-debuginfo-5.10.0-207.0.0.116.oe2203sp3.aarch64",
					"openEuler-22.03-LTS-SP3:kernel-tools-debuginfo-5.10.0-207.0.0.116.oe2203sp3.aarch64",
					"openEuler-22.03-LTS-SP3:kernel-tools-5.10.0-207.0.0.116.oe2203sp3.aarch64",
					"openEuler-22.03-LTS-SP3:kernel-5.10.0-207.0.0.116.oe2203sp3.aarch64",
					"openEuler-22.03-LTS-SP3:kernel-headers-5.10.0-207.0.0.116.oe2203sp3.aarch64",
					"openEuler-22.03-LTS-SP3:kernel-devel-5.10.0-207.0.0.116.oe2203sp3.aarch64",
					"openEuler-22.03-LTS-SP3:python3-perf-5.10.0-207.0.0.116.oe2203sp3.aarch64",
					"openEuler-22.03-LTS-SP3:perf-5.10.0-207.0.0.116.oe2203sp3.aarch64",
					"openEuler-22.03-LTS-SP3:kernel-tools-devel-5.10.0-207.0.0.116.oe2203sp3.aarch64",
					"openEuler-22.03-LTS-SP3:kernel-debugsource-5.10.0-207.0.0.116.oe2203sp3.aarch64",
					"openEuler-22.03-LTS-SP3:kernel-source-5.10.0-207.0.0.116.oe2203sp3.aarch64",
					"openEuler-22.03-LTS-SP3:kernel-5.10.0-207.0.0.116.oe2203sp3.src",
					"openEuler-22.03-LTS-SP3:kernel-debuginfo-5.10.0-207.0.0.116.oe2203sp3.x86_64",
					"openEuler-22.03-LTS-SP3:kernel-tools-5.10.0-207.0.0.116.oe2203sp3.x86_64",
					"openEuler-22.03-LTS-SP3:python3-perf-5.10.0-207.0.0.116.oe2203sp3.x86_64",
					"openEuler-22.03-LTS-SP3:kernel-source-5.10.0-207.0.0.116.oe2203sp3.x86_64",
					"openEuler-22.03-LTS-SP3:kernel-headers-5.10.0-207.0.0.116.oe2203sp3.x86_64",
					"openEuler-22.03-LTS-SP3:perf-5.10.0-207.0.0.116.oe2203sp3.x86_64",
					"openEuler-22.03-LTS-SP3:kernel-devel-5.10.0-207.0.0.116.oe2203sp3.x86_64",
					"openEuler-22.03-LTS-SP3:kernel-tools-devel-5.10.0-207.0.0.116.oe2203sp3.x86_64",
					"openEuler-22.03-LTS-SP3:kernel-debugsource-5.10.0-207.0.0.116.oe2203sp3.x86_64",
					"openEuler-22.03-LTS-SP3:kernel-tools-debuginfo-5.10.0-207.0.0.116.oe2203sp3.x86_64",
					"openEuler-22.03-LTS-SP3:kernel-5.10.0-207.0.0.116.oe2203sp3.x86_64",
					"openEuler-22.03-LTS-SP3:python3-perf-debuginfo-5.10.0-207.0.0.116.oe2203sp3.x86_64",
					"openEuler-22.03-LTS-SP3:perf-debuginfo-5.10.0-207.0.0.116.oe2203sp3.x86_64"
				]
			},
			"remediations":[
				{
					"product_ids":[
						"openEuler-22.03-LTS-SP3:perf-debuginfo-5.10.0-207.0.0.116.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:kernel-debuginfo-5.10.0-207.0.0.116.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:python3-perf-debuginfo-5.10.0-207.0.0.116.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:kernel-tools-debuginfo-5.10.0-207.0.0.116.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:kernel-tools-5.10.0-207.0.0.116.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:kernel-5.10.0-207.0.0.116.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:kernel-headers-5.10.0-207.0.0.116.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:kernel-devel-5.10.0-207.0.0.116.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:python3-perf-5.10.0-207.0.0.116.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:perf-5.10.0-207.0.0.116.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:kernel-tools-devel-5.10.0-207.0.0.116.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:kernel-debugsource-5.10.0-207.0.0.116.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:kernel-source-5.10.0-207.0.0.116.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:kernel-5.10.0-207.0.0.116.oe2203sp3.src",
						"openEuler-22.03-LTS-SP3:kernel-debuginfo-5.10.0-207.0.0.116.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:kernel-tools-5.10.0-207.0.0.116.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:python3-perf-5.10.0-207.0.0.116.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:kernel-source-5.10.0-207.0.0.116.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:kernel-headers-5.10.0-207.0.0.116.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:perf-5.10.0-207.0.0.116.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:kernel-devel-5.10.0-207.0.0.116.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:kernel-tools-devel-5.10.0-207.0.0.116.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:kernel-debugsource-5.10.0-207.0.0.116.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:kernel-tools-debuginfo-5.10.0-207.0.0.116.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:kernel-5.10.0-207.0.0.116.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:python3-perf-debuginfo-5.10.0-207.0.0.116.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:perf-debuginfo-5.10.0-207.0.0.116.oe2203sp3.x86_64"
					],
					"details":"kernel security update",
					"category":"vendor_fix",
					"url":"https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2024-1707"
				}
			],
			"scores":[
				{
					"cvss_v3":{
						"baseSeverity":"MEDIUM",
						"baseScore":5.5,
						"vectorString":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
						"version":"3.1"
					},
					"products":[
						"openEuler-22.03-LTS-SP3:perf-debuginfo-5.10.0-207.0.0.116.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:kernel-debuginfo-5.10.0-207.0.0.116.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:python3-perf-debuginfo-5.10.0-207.0.0.116.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:kernel-tools-debuginfo-5.10.0-207.0.0.116.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:kernel-tools-5.10.0-207.0.0.116.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:kernel-5.10.0-207.0.0.116.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:kernel-headers-5.10.0-207.0.0.116.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:kernel-devel-5.10.0-207.0.0.116.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:python3-perf-5.10.0-207.0.0.116.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:perf-5.10.0-207.0.0.116.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:kernel-tools-devel-5.10.0-207.0.0.116.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:kernel-debugsource-5.10.0-207.0.0.116.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:kernel-source-5.10.0-207.0.0.116.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:kernel-5.10.0-207.0.0.116.oe2203sp3.src",
						"openEuler-22.03-LTS-SP3:kernel-debuginfo-5.10.0-207.0.0.116.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:kernel-tools-5.10.0-207.0.0.116.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:python3-perf-5.10.0-207.0.0.116.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:kernel-source-5.10.0-207.0.0.116.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:kernel-headers-5.10.0-207.0.0.116.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:perf-5.10.0-207.0.0.116.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:kernel-devel-5.10.0-207.0.0.116.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:kernel-tools-devel-5.10.0-207.0.0.116.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:kernel-debugsource-5.10.0-207.0.0.116.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:kernel-tools-debuginfo-5.10.0-207.0.0.116.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:kernel-5.10.0-207.0.0.116.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:python3-perf-debuginfo-5.10.0-207.0.0.116.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:perf-debuginfo-5.10.0-207.0.0.116.oe2203sp3.x86_64"
					]
				}
			],
			"threats":[
				{
					"details":"Medium",
					"category":"impact"
				}
			],
			"title":"CVE-2024-36901"
		},
		{
			"cve":"CVE-2024-36902",
			"notes":[
				{
					"text":"In the Linux kernel, the following vulnerability has been resolved:\n\nipv6: fib6_rules: avoid possible NULL dereference in fib6_rule_action()\n\nsyzbot is able to trigger the following crash [1],\ncaused by unsafe ip6_dst_idev() use.\n\nIndeed ip6_dst_idev() can return NULL, and must always be checked.\n\n[1]\n\nOops: general protection fault, probably for non-canonical address 0xdffffc0000000000: 0000 [#1] PREEMPT SMP KASAN PTI\nKASAN: null-ptr-deref in range [0x0000000000000000-0x0000000000000007]\nCPU: 0 PID: 31648 Comm: syz-executor.0 Not tainted 6.9.0-rc4-next-20240417-syzkaller #0\nHardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 03/27/2024\n RIP: 0010:__fib6_rule_action net/ipv6/fib6_rules.c:237 [inline]\n RIP: 0010:fib6_rule_action+0x241/0x7b0 net/ipv6/fib6_rules.c:267\nCode: 02 00 00 49 8d 9f d8 00 00 00 48 89 d8 48 c1 e8 03 42 80 3c 20 00 74 08 48 89 df e8 f9 32 bf f7 48 8b 1b 48 89 d8 48 c1 e8 03 <42> 80 3c 20 00 74 08 48 89 df e8 e0 32 bf f7 4c 8b 03 48 89 ef 4c\nRSP: 0018:ffffc9000fc1f2f0 EFLAGS: 00010246\nRAX: 0000000000000000 RBX: 0000000000000000 RCX: 1a772f98c8186700\nRDX: 0000000000000003 RSI: ffffffff8bcac4e0 RDI: ffffffff8c1f9760\nRBP: ffff8880673fb980 R08: ffffffff8fac15ef R09: 1ffffffff1f582bd\nR10: dffffc0000000000 R11: fffffbfff1f582be R12: dffffc0000000000\nR13: 0000000000000080 R14: ffff888076509000 R15: ffff88807a029a00\nFS:  00007f55e82ca6c0(0000) GS:ffff8880b9400000(0000) knlGS:0000000000000000\nCS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033\nCR2: 0000001b31d23000 CR3: 0000000022b66000 CR4: 00000000003506f0\nDR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000\nDR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400\nCall Trace:\n <TASK>\n  fib_rules_lookup+0x62c/0xdb0 net/core/fib_rules.c:317\n  fib6_rule_lookup+0x1fd/0x790 net/ipv6/fib6_rules.c:108\n  ip6_route_output_flags_noref net/ipv6/route.c:2637 [inline]\n  ip6_route_output_flags+0x38e/0x610 net/ipv6/route.c:2649\n  ip6_route_output include/net/ip6_route.h:93 [inline]\n  ip6_dst_lookup_tail+0x189/0x11a0 net/ipv6/ip6_output.c:1120\n  ip6_dst_lookup_flow+0xb9/0x180 net/ipv6/ip6_output.c:1250\n  sctp_v6_get_dst+0x792/0x1e20 net/sctp/ipv6.c:326\n  sctp_transport_route+0x12c/0x2e0 net/sctp/transport.c:455\n  sctp_assoc_add_peer+0x614/0x15c0 net/sctp/associola.c:662\n  sctp_connect_new_asoc+0x31d/0x6c0 net/sctp/socket.c:1099\n  __sctp_connect+0x66d/0xe30 net/sctp/socket.c:1197\n  sctp_connect net/sctp/socket.c:4819 [inline]\n  sctp_inet_connect+0x149/0x1f0 net/sctp/socket.c:4834\n  __sys_connect_file net/socket.c:2048 [inline]\n  __sys_connect+0x2df/0x310 net/socket.c:2065\n  __do_sys_connect net/socket.c:2075 [inline]\n  __se_sys_connect net/socket.c:2072 [inline]\n  __x64_sys_connect+0x7a/0x90 net/socket.c:2072\n  do_syscall_x64 arch/x86/entry/common.c:52 [inline]\n  do_syscall_64+0xf5/0x240 arch/x86/entry/common.c:83\n entry_SYSCALL_64_after_hwframe+0x77/0x7f",
					"category":"description",
					"title":"Vulnerability Description"
				}
			],
			"product_status":{
				"fixed":[
					"openEuler-22.03-LTS-SP3:perf-debuginfo-5.10.0-207.0.0.116.oe2203sp3.aarch64",
					"openEuler-22.03-LTS-SP3:kernel-debuginfo-5.10.0-207.0.0.116.oe2203sp3.aarch64",
					"openEuler-22.03-LTS-SP3:python3-perf-debuginfo-5.10.0-207.0.0.116.oe2203sp3.aarch64",
					"openEuler-22.03-LTS-SP3:kernel-tools-debuginfo-5.10.0-207.0.0.116.oe2203sp3.aarch64",
					"openEuler-22.03-LTS-SP3:kernel-tools-5.10.0-207.0.0.116.oe2203sp3.aarch64",
					"openEuler-22.03-LTS-SP3:kernel-5.10.0-207.0.0.116.oe2203sp3.aarch64",
					"openEuler-22.03-LTS-SP3:kernel-headers-5.10.0-207.0.0.116.oe2203sp3.aarch64",
					"openEuler-22.03-LTS-SP3:kernel-devel-5.10.0-207.0.0.116.oe2203sp3.aarch64",
					"openEuler-22.03-LTS-SP3:python3-perf-5.10.0-207.0.0.116.oe2203sp3.aarch64",
					"openEuler-22.03-LTS-SP3:perf-5.10.0-207.0.0.116.oe2203sp3.aarch64",
					"openEuler-22.03-LTS-SP3:kernel-tools-devel-5.10.0-207.0.0.116.oe2203sp3.aarch64",
					"openEuler-22.03-LTS-SP3:kernel-debugsource-5.10.0-207.0.0.116.oe2203sp3.aarch64",
					"openEuler-22.03-LTS-SP3:kernel-source-5.10.0-207.0.0.116.oe2203sp3.aarch64",
					"openEuler-22.03-LTS-SP3:kernel-5.10.0-207.0.0.116.oe2203sp3.src",
					"openEuler-22.03-LTS-SP3:kernel-debuginfo-5.10.0-207.0.0.116.oe2203sp3.x86_64",
					"openEuler-22.03-LTS-SP3:kernel-tools-5.10.0-207.0.0.116.oe2203sp3.x86_64",
					"openEuler-22.03-LTS-SP3:python3-perf-5.10.0-207.0.0.116.oe2203sp3.x86_64",
					"openEuler-22.03-LTS-SP3:kernel-source-5.10.0-207.0.0.116.oe2203sp3.x86_64",
					"openEuler-22.03-LTS-SP3:kernel-headers-5.10.0-207.0.0.116.oe2203sp3.x86_64",
					"openEuler-22.03-LTS-SP3:perf-5.10.0-207.0.0.116.oe2203sp3.x86_64",
					"openEuler-22.03-LTS-SP3:kernel-devel-5.10.0-207.0.0.116.oe2203sp3.x86_64",
					"openEuler-22.03-LTS-SP3:kernel-tools-devel-5.10.0-207.0.0.116.oe2203sp3.x86_64",
					"openEuler-22.03-LTS-SP3:kernel-debugsource-5.10.0-207.0.0.116.oe2203sp3.x86_64",
					"openEuler-22.03-LTS-SP3:kernel-tools-debuginfo-5.10.0-207.0.0.116.oe2203sp3.x86_64",
					"openEuler-22.03-LTS-SP3:kernel-5.10.0-207.0.0.116.oe2203sp3.x86_64",
					"openEuler-22.03-LTS-SP3:python3-perf-debuginfo-5.10.0-207.0.0.116.oe2203sp3.x86_64",
					"openEuler-22.03-LTS-SP3:perf-debuginfo-5.10.0-207.0.0.116.oe2203sp3.x86_64"
				]
			},
			"remediations":[
				{
					"product_ids":[
						"openEuler-22.03-LTS-SP3:perf-debuginfo-5.10.0-207.0.0.116.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:kernel-debuginfo-5.10.0-207.0.0.116.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:python3-perf-debuginfo-5.10.0-207.0.0.116.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:kernel-tools-debuginfo-5.10.0-207.0.0.116.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:kernel-tools-5.10.0-207.0.0.116.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:kernel-5.10.0-207.0.0.116.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:kernel-headers-5.10.0-207.0.0.116.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:kernel-devel-5.10.0-207.0.0.116.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:python3-perf-5.10.0-207.0.0.116.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:perf-5.10.0-207.0.0.116.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:kernel-tools-devel-5.10.0-207.0.0.116.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:kernel-debugsource-5.10.0-207.0.0.116.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:kernel-source-5.10.0-207.0.0.116.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:kernel-5.10.0-207.0.0.116.oe2203sp3.src",
						"openEuler-22.03-LTS-SP3:kernel-debuginfo-5.10.0-207.0.0.116.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:kernel-tools-5.10.0-207.0.0.116.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:python3-perf-5.10.0-207.0.0.116.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:kernel-source-5.10.0-207.0.0.116.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:kernel-headers-5.10.0-207.0.0.116.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:perf-5.10.0-207.0.0.116.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:kernel-devel-5.10.0-207.0.0.116.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:kernel-tools-devel-5.10.0-207.0.0.116.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:kernel-debugsource-5.10.0-207.0.0.116.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:kernel-tools-debuginfo-5.10.0-207.0.0.116.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:kernel-5.10.0-207.0.0.116.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:python3-perf-debuginfo-5.10.0-207.0.0.116.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:perf-debuginfo-5.10.0-207.0.0.116.oe2203sp3.x86_64"
					],
					"details":"kernel security update",
					"category":"vendor_fix",
					"url":"https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2024-1707"
				}
			],
			"scores":[
				{
					"cvss_v3":{
						"baseSeverity":"MEDIUM",
						"baseScore":5.5,
						"vectorString":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
						"version":"3.1"
					},
					"products":[
						"openEuler-22.03-LTS-SP3:perf-debuginfo-5.10.0-207.0.0.116.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:kernel-debuginfo-5.10.0-207.0.0.116.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:python3-perf-debuginfo-5.10.0-207.0.0.116.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:kernel-tools-debuginfo-5.10.0-207.0.0.116.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:kernel-tools-5.10.0-207.0.0.116.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:kernel-5.10.0-207.0.0.116.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:kernel-headers-5.10.0-207.0.0.116.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:kernel-devel-5.10.0-207.0.0.116.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:python3-perf-5.10.0-207.0.0.116.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:perf-5.10.0-207.0.0.116.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:kernel-tools-devel-5.10.0-207.0.0.116.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:kernel-debugsource-5.10.0-207.0.0.116.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:kernel-source-5.10.0-207.0.0.116.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:kernel-5.10.0-207.0.0.116.oe2203sp3.src",
						"openEuler-22.03-LTS-SP3:kernel-debuginfo-5.10.0-207.0.0.116.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:kernel-tools-5.10.0-207.0.0.116.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:python3-perf-5.10.0-207.0.0.116.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:kernel-source-5.10.0-207.0.0.116.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:kernel-headers-5.10.0-207.0.0.116.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:perf-5.10.0-207.0.0.116.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:kernel-devel-5.10.0-207.0.0.116.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:kernel-tools-devel-5.10.0-207.0.0.116.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:kernel-debugsource-5.10.0-207.0.0.116.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:kernel-tools-debuginfo-5.10.0-207.0.0.116.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:kernel-5.10.0-207.0.0.116.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:python3-perf-debuginfo-5.10.0-207.0.0.116.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:perf-debuginfo-5.10.0-207.0.0.116.oe2203sp3.x86_64"
					]
				}
			],
			"threats":[
				{
					"details":"Medium",
					"category":"impact"
				}
			],
			"title":"CVE-2024-36902"
		},
		{
			"cve":"CVE-2024-36903",
			"notes":[
				{
					"text":"In the Linux kernel, the following vulnerability has been resolved:\n\nipv6: Fix potential uninit-value access in __ip6_make_skb()\n\nAs it was done in commit fc1092f51567 (\"ipv4: Fix uninit-value access in\n__ip_make_skb()\") for IPv4, check FLOWI_FLAG_KNOWN_NH on fl6->flowi6_flags\ninstead of testing HDRINCL on the socket to avoid a race condition which\ncauses uninit-value access.",
					"category":"description",
					"title":"Vulnerability Description"
				}
			],
			"product_status":{
				"fixed":[
					"openEuler-22.03-LTS-SP3:perf-debuginfo-5.10.0-207.0.0.116.oe2203sp3.aarch64",
					"openEuler-22.03-LTS-SP3:kernel-debuginfo-5.10.0-207.0.0.116.oe2203sp3.aarch64",
					"openEuler-22.03-LTS-SP3:python3-perf-debuginfo-5.10.0-207.0.0.116.oe2203sp3.aarch64",
					"openEuler-22.03-LTS-SP3:kernel-tools-debuginfo-5.10.0-207.0.0.116.oe2203sp3.aarch64",
					"openEuler-22.03-LTS-SP3:kernel-tools-5.10.0-207.0.0.116.oe2203sp3.aarch64",
					"openEuler-22.03-LTS-SP3:kernel-5.10.0-207.0.0.116.oe2203sp3.aarch64",
					"openEuler-22.03-LTS-SP3:kernel-headers-5.10.0-207.0.0.116.oe2203sp3.aarch64",
					"openEuler-22.03-LTS-SP3:kernel-devel-5.10.0-207.0.0.116.oe2203sp3.aarch64",
					"openEuler-22.03-LTS-SP3:python3-perf-5.10.0-207.0.0.116.oe2203sp3.aarch64",
					"openEuler-22.03-LTS-SP3:perf-5.10.0-207.0.0.116.oe2203sp3.aarch64",
					"openEuler-22.03-LTS-SP3:kernel-tools-devel-5.10.0-207.0.0.116.oe2203sp3.aarch64",
					"openEuler-22.03-LTS-SP3:kernel-debugsource-5.10.0-207.0.0.116.oe2203sp3.aarch64",
					"openEuler-22.03-LTS-SP3:kernel-source-5.10.0-207.0.0.116.oe2203sp3.aarch64",
					"openEuler-22.03-LTS-SP3:kernel-5.10.0-207.0.0.116.oe2203sp3.src",
					"openEuler-22.03-LTS-SP3:kernel-debuginfo-5.10.0-207.0.0.116.oe2203sp3.x86_64",
					"openEuler-22.03-LTS-SP3:kernel-tools-5.10.0-207.0.0.116.oe2203sp3.x86_64",
					"openEuler-22.03-LTS-SP3:python3-perf-5.10.0-207.0.0.116.oe2203sp3.x86_64",
					"openEuler-22.03-LTS-SP3:kernel-source-5.10.0-207.0.0.116.oe2203sp3.x86_64",
					"openEuler-22.03-LTS-SP3:kernel-headers-5.10.0-207.0.0.116.oe2203sp3.x86_64",
					"openEuler-22.03-LTS-SP3:perf-5.10.0-207.0.0.116.oe2203sp3.x86_64",
					"openEuler-22.03-LTS-SP3:kernel-devel-5.10.0-207.0.0.116.oe2203sp3.x86_64",
					"openEuler-22.03-LTS-SP3:kernel-tools-devel-5.10.0-207.0.0.116.oe2203sp3.x86_64",
					"openEuler-22.03-LTS-SP3:kernel-debugsource-5.10.0-207.0.0.116.oe2203sp3.x86_64",
					"openEuler-22.03-LTS-SP3:kernel-tools-debuginfo-5.10.0-207.0.0.116.oe2203sp3.x86_64",
					"openEuler-22.03-LTS-SP3:kernel-5.10.0-207.0.0.116.oe2203sp3.x86_64",
					"openEuler-22.03-LTS-SP3:python3-perf-debuginfo-5.10.0-207.0.0.116.oe2203sp3.x86_64",
					"openEuler-22.03-LTS-SP3:perf-debuginfo-5.10.0-207.0.0.116.oe2203sp3.x86_64"
				]
			},
			"remediations":[
				{
					"product_ids":[
						"openEuler-22.03-LTS-SP3:perf-debuginfo-5.10.0-207.0.0.116.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:kernel-debuginfo-5.10.0-207.0.0.116.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:python3-perf-debuginfo-5.10.0-207.0.0.116.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:kernel-tools-debuginfo-5.10.0-207.0.0.116.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:kernel-tools-5.10.0-207.0.0.116.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:kernel-5.10.0-207.0.0.116.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:kernel-headers-5.10.0-207.0.0.116.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:kernel-devel-5.10.0-207.0.0.116.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:python3-perf-5.10.0-207.0.0.116.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:perf-5.10.0-207.0.0.116.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:kernel-tools-devel-5.10.0-207.0.0.116.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:kernel-debugsource-5.10.0-207.0.0.116.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:kernel-source-5.10.0-207.0.0.116.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:kernel-5.10.0-207.0.0.116.oe2203sp3.src",
						"openEuler-22.03-LTS-SP3:kernel-debuginfo-5.10.0-207.0.0.116.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:kernel-tools-5.10.0-207.0.0.116.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:python3-perf-5.10.0-207.0.0.116.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:kernel-source-5.10.0-207.0.0.116.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:kernel-headers-5.10.0-207.0.0.116.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:perf-5.10.0-207.0.0.116.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:kernel-devel-5.10.0-207.0.0.116.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:kernel-tools-devel-5.10.0-207.0.0.116.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:kernel-debugsource-5.10.0-207.0.0.116.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:kernel-tools-debuginfo-5.10.0-207.0.0.116.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:kernel-5.10.0-207.0.0.116.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:python3-perf-debuginfo-5.10.0-207.0.0.116.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:perf-debuginfo-5.10.0-207.0.0.116.oe2203sp3.x86_64"
					],
					"details":"kernel security update",
					"category":"vendor_fix",
					"url":"https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2024-1707"
				}
			],
			"scores":[
				{
					"cvss_v3":{
						"baseSeverity":"MEDIUM",
						"baseScore":5.5,
						"vectorString":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
						"version":"3.1"
					},
					"products":[
						"openEuler-22.03-LTS-SP3:perf-debuginfo-5.10.0-207.0.0.116.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:kernel-debuginfo-5.10.0-207.0.0.116.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:python3-perf-debuginfo-5.10.0-207.0.0.116.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:kernel-tools-debuginfo-5.10.0-207.0.0.116.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:kernel-tools-5.10.0-207.0.0.116.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:kernel-5.10.0-207.0.0.116.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:kernel-headers-5.10.0-207.0.0.116.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:kernel-devel-5.10.0-207.0.0.116.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:python3-perf-5.10.0-207.0.0.116.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:perf-5.10.0-207.0.0.116.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:kernel-tools-devel-5.10.0-207.0.0.116.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:kernel-debugsource-5.10.0-207.0.0.116.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:kernel-source-5.10.0-207.0.0.116.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:kernel-5.10.0-207.0.0.116.oe2203sp3.src",
						"openEuler-22.03-LTS-SP3:kernel-debuginfo-5.10.0-207.0.0.116.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:kernel-tools-5.10.0-207.0.0.116.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:python3-perf-5.10.0-207.0.0.116.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:kernel-source-5.10.0-207.0.0.116.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:kernel-headers-5.10.0-207.0.0.116.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:perf-5.10.0-207.0.0.116.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:kernel-devel-5.10.0-207.0.0.116.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:kernel-tools-devel-5.10.0-207.0.0.116.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:kernel-debugsource-5.10.0-207.0.0.116.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:kernel-tools-debuginfo-5.10.0-207.0.0.116.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:kernel-5.10.0-207.0.0.116.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:python3-perf-debuginfo-5.10.0-207.0.0.116.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:perf-debuginfo-5.10.0-207.0.0.116.oe2203sp3.x86_64"
					]
				}
			],
			"threats":[
				{
					"details":"Medium",
					"category":"impact"
				}
			],
			"title":"CVE-2024-36903"
		},
		{
			"cve":"CVE-2024-36906",
			"notes":[
				{
					"text":"In the Linux kernel, the following vulnerability has been resolved:\n\nARM: 9381/1: kasan: clear stale stack poison\n\nWe found below OOB crash:\n\n[   33.452494] ==================================================================\n[   33.453513] BUG: KASAN: stack-out-of-bounds in refresh_cpu_vm_stats.constprop.0+0xcc/0x2ec\n[   33.454660] Write of size 164 at addr c1d03d30 by task swapper/0/0\n[   33.455515]\n[   33.455767] CPU: 0 PID: 0 Comm: swapper/0 Tainted: G           O       6.1.25-mainline #1\n[   33.456880] Hardware name: Generic DT based system\n[   33.457555]  unwind_backtrace from show_stack+0x18/0x1c\n[   33.458326]  show_stack from dump_stack_lvl+0x40/0x4c\n[   33.459072]  dump_stack_lvl from print_report+0x158/0x4a4\n[   33.459863]  print_report from kasan_report+0x9c/0x148\n[   33.460616]  kasan_report from kasan_check_range+0x94/0x1a0\n[   33.461424]  kasan_check_range from memset+0x20/0x3c\n[   33.462157]  memset from refresh_cpu_vm_stats.constprop.0+0xcc/0x2ec\n[   33.463064]  refresh_cpu_vm_stats.constprop.0 from tick_nohz_idle_stop_tick+0x180/0x53c\n[   33.464181]  tick_nohz_idle_stop_tick from do_idle+0x264/0x354\n[   33.465029]  do_idle from cpu_startup_entry+0x20/0x24\n[   33.465769]  cpu_startup_entry from rest_init+0xf0/0xf4\n[   33.466528]  rest_init from arch_post_acpi_subsys_init+0x0/0x18\n[   33.467397]\n[   33.467644] The buggy address belongs to stack of task swapper/0/0\n[   33.468493]  and is located at offset 112 in frame:\n[   33.469172]  refresh_cpu_vm_stats.constprop.0+0x0/0x2ec\n[   33.469917]\n[   33.470165] This frame has 2 objects:\n[   33.470696]  [32, 76) 'global_zone_diff'\n[   33.470729]  [112, 276) 'global_node_diff'\n[   33.471294]\n[   33.472095] The buggy address belongs to the physical page:\n[   33.472862] page:3cd72da8 refcount:1 mapcount:0 mapping:00000000 index:0x0 pfn:0x41d03\n[   33.473944] flags: 0x1000(reserved|zone=0)\n[   33.474565] raw: 00001000 ed741470 ed741470 00000000 00000000 00000000 ffffffff 00000001\n[   33.475656] raw: 00000000\n[   33.476050] page dumped because: kasan: bad access detected\n[   33.476816]\n[   33.477061] Memory state around the buggy address:\n[   33.477732]  c1d03c00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00\n[   33.478630]  c1d03c80: 00 00 00 00 00 00 00 00 f1 f1 f1 f1 00 00 00 00\n[   33.479526] >c1d03d00: 00 04 f2 f2 f2 f2 00 00 00 00 00 00 f1 f1 f1 f1\n[   33.480415]                                                ^\n[   33.481195]  c1d03d80: 00 00 00 00 00 00 00 00 00 00 04 f3 f3 f3 f3 f3\n[   33.482088]  c1d03e00: f3 f3 f3 f3 00 00 00 00 00 00 00 00 00 00 00 00\n[   33.482978] ==================================================================\n\nWe find the root cause of this OOB is that arm does not clear stale stack\npoison in the case of cpuidle.\n\nThis patch refer to arch/arm64/kernel/sleep.S to resolve this issue.\n\nFrom cited commit [1] that explain the problem\n\nFunctions which the compiler has instrumented for KASAN place poison on\nthe stack shadow upon entry and remove this poison prior to returning.\n\nIn the case of cpuidle, CPUs exit the kernel a number of levels deep in\nC code.  Any instrumented functions on this critical path will leave\nportions of the stack shadow poisoned.\n\nIf CPUs lose context and return to the kernel via a cold path, we\nrestore a prior context saved in __cpu_suspend_enter are forgotten, and\nwe never remove the poison they placed in the stack shadow area by\nfunctions calls between this and the actual exit of the kernel.\n\nThus, (depending on stackframe layout) subsequent calls to instrumented\nfunctions may hit this stale poison, resulting in (spurious) KASAN\nsplats to the console.\n\nTo avoid this, clear any stale poison from the idle thread for a CPU\nprior to bringing a CPU online.\n\nFrom cited commit [2]\n\nExtend to check for CONFIG_KASAN_STACK\n\n[1] commit 0d97e6d8024c (\"arm64: kasan: clear stale stack poison\")\n[2] commit d56a9ef84bd0 (\"kasan, arm64: unpoison stack only with CONFIG_KASAN_STACK\")",
					"category":"description",
					"title":"Vulnerability Description"
				}
			],
			"product_status":{
				"fixed":[
					"openEuler-22.03-LTS-SP3:perf-debuginfo-5.10.0-207.0.0.116.oe2203sp3.aarch64",
					"openEuler-22.03-LTS-SP3:kernel-debuginfo-5.10.0-207.0.0.116.oe2203sp3.aarch64",
					"openEuler-22.03-LTS-SP3:python3-perf-debuginfo-5.10.0-207.0.0.116.oe2203sp3.aarch64",
					"openEuler-22.03-LTS-SP3:kernel-tools-debuginfo-5.10.0-207.0.0.116.oe2203sp3.aarch64",
					"openEuler-22.03-LTS-SP3:kernel-tools-5.10.0-207.0.0.116.oe2203sp3.aarch64",
					"openEuler-22.03-LTS-SP3:kernel-5.10.0-207.0.0.116.oe2203sp3.aarch64",
					"openEuler-22.03-LTS-SP3:kernel-headers-5.10.0-207.0.0.116.oe2203sp3.aarch64",
					"openEuler-22.03-LTS-SP3:kernel-devel-5.10.0-207.0.0.116.oe2203sp3.aarch64",
					"openEuler-22.03-LTS-SP3:python3-perf-5.10.0-207.0.0.116.oe2203sp3.aarch64",
					"openEuler-22.03-LTS-SP3:perf-5.10.0-207.0.0.116.oe2203sp3.aarch64",
					"openEuler-22.03-LTS-SP3:kernel-tools-devel-5.10.0-207.0.0.116.oe2203sp3.aarch64",
					"openEuler-22.03-LTS-SP3:kernel-debugsource-5.10.0-207.0.0.116.oe2203sp3.aarch64",
					"openEuler-22.03-LTS-SP3:kernel-source-5.10.0-207.0.0.116.oe2203sp3.aarch64",
					"openEuler-22.03-LTS-SP3:kernel-5.10.0-207.0.0.116.oe2203sp3.src",
					"openEuler-22.03-LTS-SP3:kernel-debuginfo-5.10.0-207.0.0.116.oe2203sp3.x86_64",
					"openEuler-22.03-LTS-SP3:kernel-tools-5.10.0-207.0.0.116.oe2203sp3.x86_64",
					"openEuler-22.03-LTS-SP3:python3-perf-5.10.0-207.0.0.116.oe2203sp3.x86_64",
					"openEuler-22.03-LTS-SP3:kernel-source-5.10.0-207.0.0.116.oe2203sp3.x86_64",
					"openEuler-22.03-LTS-SP3:kernel-headers-5.10.0-207.0.0.116.oe2203sp3.x86_64",
					"openEuler-22.03-LTS-SP3:perf-5.10.0-207.0.0.116.oe2203sp3.x86_64",
					"openEuler-22.03-LTS-SP3:kernel-devel-5.10.0-207.0.0.116.oe2203sp3.x86_64",
					"openEuler-22.03-LTS-SP3:kernel-tools-devel-5.10.0-207.0.0.116.oe2203sp3.x86_64",
					"openEuler-22.03-LTS-SP3:kernel-debugsource-5.10.0-207.0.0.116.oe2203sp3.x86_64",
					"openEuler-22.03-LTS-SP3:kernel-tools-debuginfo-5.10.0-207.0.0.116.oe2203sp3.x86_64",
					"openEuler-22.03-LTS-SP3:kernel-5.10.0-207.0.0.116.oe2203sp3.x86_64",
					"openEuler-22.03-LTS-SP3:python3-perf-debuginfo-5.10.0-207.0.0.116.oe2203sp3.x86_64",
					"openEuler-22.03-LTS-SP3:perf-debuginfo-5.10.0-207.0.0.116.oe2203sp3.x86_64"
				]
			},
			"remediations":[
				{
					"product_ids":[
						"openEuler-22.03-LTS-SP3:perf-debuginfo-5.10.0-207.0.0.116.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:kernel-debuginfo-5.10.0-207.0.0.116.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:python3-perf-debuginfo-5.10.0-207.0.0.116.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:kernel-tools-debuginfo-5.10.0-207.0.0.116.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:kernel-tools-5.10.0-207.0.0.116.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:kernel-5.10.0-207.0.0.116.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:kernel-headers-5.10.0-207.0.0.116.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:kernel-devel-5.10.0-207.0.0.116.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:python3-perf-5.10.0-207.0.0.116.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:perf-5.10.0-207.0.0.116.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:kernel-tools-devel-5.10.0-207.0.0.116.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:kernel-debugsource-5.10.0-207.0.0.116.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:kernel-source-5.10.0-207.0.0.116.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:kernel-5.10.0-207.0.0.116.oe2203sp3.src",
						"openEuler-22.03-LTS-SP3:kernel-debuginfo-5.10.0-207.0.0.116.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:kernel-tools-5.10.0-207.0.0.116.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:python3-perf-5.10.0-207.0.0.116.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:kernel-source-5.10.0-207.0.0.116.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:kernel-headers-5.10.0-207.0.0.116.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:perf-5.10.0-207.0.0.116.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:kernel-devel-5.10.0-207.0.0.116.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:kernel-tools-devel-5.10.0-207.0.0.116.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:kernel-debugsource-5.10.0-207.0.0.116.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:kernel-tools-debuginfo-5.10.0-207.0.0.116.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:kernel-5.10.0-207.0.0.116.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:python3-perf-debuginfo-5.10.0-207.0.0.116.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:perf-debuginfo-5.10.0-207.0.0.116.oe2203sp3.x86_64"
					],
					"details":"kernel security update",
					"category":"vendor_fix",
					"url":"https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2024-1707"
				}
			],
			"scores":[
				{
					"cvss_v3":{
						"baseSeverity":"MEDIUM",
						"baseScore":4.4,
						"vectorString":"CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
						"version":"3.1"
					},
					"products":[
						"openEuler-22.03-LTS-SP3:perf-debuginfo-5.10.0-207.0.0.116.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:kernel-debuginfo-5.10.0-207.0.0.116.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:python3-perf-debuginfo-5.10.0-207.0.0.116.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:kernel-tools-debuginfo-5.10.0-207.0.0.116.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:kernel-tools-5.10.0-207.0.0.116.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:kernel-5.10.0-207.0.0.116.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:kernel-headers-5.10.0-207.0.0.116.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:kernel-devel-5.10.0-207.0.0.116.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:python3-perf-5.10.0-207.0.0.116.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:perf-5.10.0-207.0.0.116.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:kernel-tools-devel-5.10.0-207.0.0.116.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:kernel-debugsource-5.10.0-207.0.0.116.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:kernel-source-5.10.0-207.0.0.116.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:kernel-5.10.0-207.0.0.116.oe2203sp3.src",
						"openEuler-22.03-LTS-SP3:kernel-debuginfo-5.10.0-207.0.0.116.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:kernel-tools-5.10.0-207.0.0.116.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:python3-perf-5.10.0-207.0.0.116.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:kernel-source-5.10.0-207.0.0.116.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:kernel-headers-5.10.0-207.0.0.116.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:perf-5.10.0-207.0.0.116.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:kernel-devel-5.10.0-207.0.0.116.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:kernel-tools-devel-5.10.0-207.0.0.116.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:kernel-debugsource-5.10.0-207.0.0.116.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:kernel-tools-debuginfo-5.10.0-207.0.0.116.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:kernel-5.10.0-207.0.0.116.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:python3-perf-debuginfo-5.10.0-207.0.0.116.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:perf-debuginfo-5.10.0-207.0.0.116.oe2203sp3.x86_64"
					]
				}
			],
			"threats":[
				{
					"details":"Medium",
					"category":"impact"
				}
			],
			"title":"CVE-2024-36906"
		},
		{
			"cve":"CVE-2024-36908",
			"notes":[
				{
					"text":"In the Linux kernel, the following vulnerability has been resolved:\n\nblk-iocost: do not WARN if iocg was already offlined\n\nIn iocg_pay_debt(), warn is triggered if 'active_list' is empty, which\nis intended to confirm iocg is active when it has debt. However, warn\ncan be triggered during a blkcg or disk removal, if iocg_waitq_timer_fn()\nis run at that time:\n\n  WARNING: CPU: 0 PID: 2344971 at block/blk-iocost.c:1402 iocg_pay_debt+0x14c/0x190\n  Call trace:\n  iocg_pay_debt+0x14c/0x190\n  iocg_kick_waitq+0x438/0x4c0\n  iocg_waitq_timer_fn+0xd8/0x130\n  __run_hrtimer+0x144/0x45c\n  __hrtimer_run_queues+0x16c/0x244\n  hrtimer_interrupt+0x2cc/0x7b0\n\nThe warn in this situation is meaningless. Since this iocg is being\nremoved, the state of the 'active_list' is irrelevant, and 'waitq_timer'\nis canceled after removing 'active_list' in ioc_pd_free(), which ensures\niocg is freed after iocg_waitq_timer_fn() returns.\n\nTherefore, add the check if iocg was already offlined to avoid warn\nwhen removing a blkcg or disk.",
					"category":"description",
					"title":"Vulnerability Description"
				}
			],
			"product_status":{
				"fixed":[
					"openEuler-22.03-LTS-SP3:perf-debuginfo-5.10.0-207.0.0.116.oe2203sp3.aarch64",
					"openEuler-22.03-LTS-SP3:kernel-debuginfo-5.10.0-207.0.0.116.oe2203sp3.aarch64",
					"openEuler-22.03-LTS-SP3:python3-perf-debuginfo-5.10.0-207.0.0.116.oe2203sp3.aarch64",
					"openEuler-22.03-LTS-SP3:kernel-tools-debuginfo-5.10.0-207.0.0.116.oe2203sp3.aarch64",
					"openEuler-22.03-LTS-SP3:kernel-tools-5.10.0-207.0.0.116.oe2203sp3.aarch64",
					"openEuler-22.03-LTS-SP3:kernel-5.10.0-207.0.0.116.oe2203sp3.aarch64",
					"openEuler-22.03-LTS-SP3:kernel-headers-5.10.0-207.0.0.116.oe2203sp3.aarch64",
					"openEuler-22.03-LTS-SP3:kernel-devel-5.10.0-207.0.0.116.oe2203sp3.aarch64",
					"openEuler-22.03-LTS-SP3:python3-perf-5.10.0-207.0.0.116.oe2203sp3.aarch64",
					"openEuler-22.03-LTS-SP3:perf-5.10.0-207.0.0.116.oe2203sp3.aarch64",
					"openEuler-22.03-LTS-SP3:kernel-tools-devel-5.10.0-207.0.0.116.oe2203sp3.aarch64",
					"openEuler-22.03-LTS-SP3:kernel-debugsource-5.10.0-207.0.0.116.oe2203sp3.aarch64",
					"openEuler-22.03-LTS-SP3:kernel-source-5.10.0-207.0.0.116.oe2203sp3.aarch64",
					"openEuler-22.03-LTS-SP3:kernel-5.10.0-207.0.0.116.oe2203sp3.src",
					"openEuler-22.03-LTS-SP3:kernel-debuginfo-5.10.0-207.0.0.116.oe2203sp3.x86_64",
					"openEuler-22.03-LTS-SP3:kernel-tools-5.10.0-207.0.0.116.oe2203sp3.x86_64",
					"openEuler-22.03-LTS-SP3:python3-perf-5.10.0-207.0.0.116.oe2203sp3.x86_64",
					"openEuler-22.03-LTS-SP3:kernel-source-5.10.0-207.0.0.116.oe2203sp3.x86_64",
					"openEuler-22.03-LTS-SP3:kernel-headers-5.10.0-207.0.0.116.oe2203sp3.x86_64",
					"openEuler-22.03-LTS-SP3:perf-5.10.0-207.0.0.116.oe2203sp3.x86_64",
					"openEuler-22.03-LTS-SP3:kernel-devel-5.10.0-207.0.0.116.oe2203sp3.x86_64",
					"openEuler-22.03-LTS-SP3:kernel-tools-devel-5.10.0-207.0.0.116.oe2203sp3.x86_64",
					"openEuler-22.03-LTS-SP3:kernel-debugsource-5.10.0-207.0.0.116.oe2203sp3.x86_64",
					"openEuler-22.03-LTS-SP3:kernel-tools-debuginfo-5.10.0-207.0.0.116.oe2203sp3.x86_64",
					"openEuler-22.03-LTS-SP3:kernel-5.10.0-207.0.0.116.oe2203sp3.x86_64",
					"openEuler-22.03-LTS-SP3:python3-perf-debuginfo-5.10.0-207.0.0.116.oe2203sp3.x86_64",
					"openEuler-22.03-LTS-SP3:perf-debuginfo-5.10.0-207.0.0.116.oe2203sp3.x86_64"
				]
			},
			"remediations":[
				{
					"product_ids":[
						"openEuler-22.03-LTS-SP3:perf-debuginfo-5.10.0-207.0.0.116.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:kernel-debuginfo-5.10.0-207.0.0.116.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:python3-perf-debuginfo-5.10.0-207.0.0.116.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:kernel-tools-debuginfo-5.10.0-207.0.0.116.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:kernel-tools-5.10.0-207.0.0.116.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:kernel-5.10.0-207.0.0.116.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:kernel-headers-5.10.0-207.0.0.116.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:kernel-devel-5.10.0-207.0.0.116.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:python3-perf-5.10.0-207.0.0.116.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:perf-5.10.0-207.0.0.116.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:kernel-tools-devel-5.10.0-207.0.0.116.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:kernel-debugsource-5.10.0-207.0.0.116.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:kernel-source-5.10.0-207.0.0.116.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:kernel-5.10.0-207.0.0.116.oe2203sp3.src",
						"openEuler-22.03-LTS-SP3:kernel-debuginfo-5.10.0-207.0.0.116.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:kernel-tools-5.10.0-207.0.0.116.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:python3-perf-5.10.0-207.0.0.116.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:kernel-source-5.10.0-207.0.0.116.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:kernel-headers-5.10.0-207.0.0.116.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:perf-5.10.0-207.0.0.116.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:kernel-devel-5.10.0-207.0.0.116.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:kernel-tools-devel-5.10.0-207.0.0.116.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:kernel-debugsource-5.10.0-207.0.0.116.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:kernel-tools-debuginfo-5.10.0-207.0.0.116.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:kernel-5.10.0-207.0.0.116.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:python3-perf-debuginfo-5.10.0-207.0.0.116.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:perf-debuginfo-5.10.0-207.0.0.116.oe2203sp3.x86_64"
					],
					"details":"kernel security update",
					"category":"vendor_fix",
					"url":"https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2024-1707"
				}
			],
			"scores":[
				{
					"cvss_v3":{
						"baseSeverity":"MEDIUM",
						"baseScore":5.5,
						"vectorString":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
						"version":"3.1"
					},
					"products":[
						"openEuler-22.03-LTS-SP3:perf-debuginfo-5.10.0-207.0.0.116.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:kernel-debuginfo-5.10.0-207.0.0.116.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:python3-perf-debuginfo-5.10.0-207.0.0.116.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:kernel-tools-debuginfo-5.10.0-207.0.0.116.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:kernel-tools-5.10.0-207.0.0.116.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:kernel-5.10.0-207.0.0.116.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:kernel-headers-5.10.0-207.0.0.116.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:kernel-devel-5.10.0-207.0.0.116.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:python3-perf-5.10.0-207.0.0.116.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:perf-5.10.0-207.0.0.116.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:kernel-tools-devel-5.10.0-207.0.0.116.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:kernel-debugsource-5.10.0-207.0.0.116.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:kernel-source-5.10.0-207.0.0.116.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:kernel-5.10.0-207.0.0.116.oe2203sp3.src",
						"openEuler-22.03-LTS-SP3:kernel-debuginfo-5.10.0-207.0.0.116.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:kernel-tools-5.10.0-207.0.0.116.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:python3-perf-5.10.0-207.0.0.116.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:kernel-source-5.10.0-207.0.0.116.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:kernel-headers-5.10.0-207.0.0.116.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:perf-5.10.0-207.0.0.116.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:kernel-devel-5.10.0-207.0.0.116.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:kernel-tools-devel-5.10.0-207.0.0.116.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:kernel-debugsource-5.10.0-207.0.0.116.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:kernel-tools-debuginfo-5.10.0-207.0.0.116.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:kernel-5.10.0-207.0.0.116.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:python3-perf-debuginfo-5.10.0-207.0.0.116.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:perf-debuginfo-5.10.0-207.0.0.116.oe2203sp3.x86_64"
					]
				}
			],
			"threats":[
				{
					"details":"Medium",
					"category":"impact"
				}
			],
			"title":"CVE-2024-36908"
		},
		{
			"cve":"CVE-2024-36917",
			"notes":[
				{
					"text":"In the Linux kernel, the following vulnerability has been resolved:\n\nblock: fix overflow in blk_ioctl_discard()\n\nThere is no check for overflow of 'start + len' in blk_ioctl_discard().\nHung task occurs if submit an discard ioctl with the following param:\n  start = 0x80000000000ff000, len = 0x8000000000fff000;\nAdd the overflow validation now.",
					"category":"description",
					"title":"Vulnerability Description"
				}
			],
			"product_status":{
				"fixed":[
					"openEuler-22.03-LTS-SP3:perf-debuginfo-5.10.0-207.0.0.116.oe2203sp3.aarch64",
					"openEuler-22.03-LTS-SP3:kernel-debuginfo-5.10.0-207.0.0.116.oe2203sp3.aarch64",
					"openEuler-22.03-LTS-SP3:python3-perf-debuginfo-5.10.0-207.0.0.116.oe2203sp3.aarch64",
					"openEuler-22.03-LTS-SP3:kernel-tools-debuginfo-5.10.0-207.0.0.116.oe2203sp3.aarch64",
					"openEuler-22.03-LTS-SP3:kernel-tools-5.10.0-207.0.0.116.oe2203sp3.aarch64",
					"openEuler-22.03-LTS-SP3:kernel-5.10.0-207.0.0.116.oe2203sp3.aarch64",
					"openEuler-22.03-LTS-SP3:kernel-headers-5.10.0-207.0.0.116.oe2203sp3.aarch64",
					"openEuler-22.03-LTS-SP3:kernel-devel-5.10.0-207.0.0.116.oe2203sp3.aarch64",
					"openEuler-22.03-LTS-SP3:python3-perf-5.10.0-207.0.0.116.oe2203sp3.aarch64",
					"openEuler-22.03-LTS-SP3:perf-5.10.0-207.0.0.116.oe2203sp3.aarch64",
					"openEuler-22.03-LTS-SP3:kernel-tools-devel-5.10.0-207.0.0.116.oe2203sp3.aarch64",
					"openEuler-22.03-LTS-SP3:kernel-debugsource-5.10.0-207.0.0.116.oe2203sp3.aarch64",
					"openEuler-22.03-LTS-SP3:kernel-source-5.10.0-207.0.0.116.oe2203sp3.aarch64",
					"openEuler-22.03-LTS-SP3:kernel-5.10.0-207.0.0.116.oe2203sp3.src",
					"openEuler-22.03-LTS-SP3:kernel-debuginfo-5.10.0-207.0.0.116.oe2203sp3.x86_64",
					"openEuler-22.03-LTS-SP3:kernel-tools-5.10.0-207.0.0.116.oe2203sp3.x86_64",
					"openEuler-22.03-LTS-SP3:python3-perf-5.10.0-207.0.0.116.oe2203sp3.x86_64",
					"openEuler-22.03-LTS-SP3:kernel-source-5.10.0-207.0.0.116.oe2203sp3.x86_64",
					"openEuler-22.03-LTS-SP3:kernel-headers-5.10.0-207.0.0.116.oe2203sp3.x86_64",
					"openEuler-22.03-LTS-SP3:perf-5.10.0-207.0.0.116.oe2203sp3.x86_64",
					"openEuler-22.03-LTS-SP3:kernel-devel-5.10.0-207.0.0.116.oe2203sp3.x86_64",
					"openEuler-22.03-LTS-SP3:kernel-tools-devel-5.10.0-207.0.0.116.oe2203sp3.x86_64",
					"openEuler-22.03-LTS-SP3:kernel-debugsource-5.10.0-207.0.0.116.oe2203sp3.x86_64",
					"openEuler-22.03-LTS-SP3:kernel-tools-debuginfo-5.10.0-207.0.0.116.oe2203sp3.x86_64",
					"openEuler-22.03-LTS-SP3:kernel-5.10.0-207.0.0.116.oe2203sp3.x86_64",
					"openEuler-22.03-LTS-SP3:python3-perf-debuginfo-5.10.0-207.0.0.116.oe2203sp3.x86_64",
					"openEuler-22.03-LTS-SP3:perf-debuginfo-5.10.0-207.0.0.116.oe2203sp3.x86_64"
				]
			},
			"remediations":[
				{
					"product_ids":[
						"openEuler-22.03-LTS-SP3:perf-debuginfo-5.10.0-207.0.0.116.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:kernel-debuginfo-5.10.0-207.0.0.116.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:python3-perf-debuginfo-5.10.0-207.0.0.116.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:kernel-tools-debuginfo-5.10.0-207.0.0.116.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:kernel-tools-5.10.0-207.0.0.116.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:kernel-5.10.0-207.0.0.116.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:kernel-headers-5.10.0-207.0.0.116.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:kernel-devel-5.10.0-207.0.0.116.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:python3-perf-5.10.0-207.0.0.116.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:perf-5.10.0-207.0.0.116.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:kernel-tools-devel-5.10.0-207.0.0.116.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:kernel-debugsource-5.10.0-207.0.0.116.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:kernel-source-5.10.0-207.0.0.116.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:kernel-5.10.0-207.0.0.116.oe2203sp3.src",
						"openEuler-22.03-LTS-SP3:kernel-debuginfo-5.10.0-207.0.0.116.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:kernel-tools-5.10.0-207.0.0.116.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:python3-perf-5.10.0-207.0.0.116.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:kernel-source-5.10.0-207.0.0.116.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:kernel-headers-5.10.0-207.0.0.116.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:perf-5.10.0-207.0.0.116.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:kernel-devel-5.10.0-207.0.0.116.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:kernel-tools-devel-5.10.0-207.0.0.116.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:kernel-debugsource-5.10.0-207.0.0.116.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:kernel-tools-debuginfo-5.10.0-207.0.0.116.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:kernel-5.10.0-207.0.0.116.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:python3-perf-debuginfo-5.10.0-207.0.0.116.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:perf-debuginfo-5.10.0-207.0.0.116.oe2203sp3.x86_64"
					],
					"details":"kernel security update",
					"category":"vendor_fix",
					"url":"https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2024-1707"
				}
			],
			"scores":[
				{
					"cvss_v3":{
						"baseSeverity":"MEDIUM",
						"baseScore":4.4,
						"vectorString":"CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
						"version":"3.1"
					},
					"products":[
						"openEuler-22.03-LTS-SP3:perf-debuginfo-5.10.0-207.0.0.116.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:kernel-debuginfo-5.10.0-207.0.0.116.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:python3-perf-debuginfo-5.10.0-207.0.0.116.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:kernel-tools-debuginfo-5.10.0-207.0.0.116.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:kernel-tools-5.10.0-207.0.0.116.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:kernel-5.10.0-207.0.0.116.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:kernel-headers-5.10.0-207.0.0.116.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:kernel-devel-5.10.0-207.0.0.116.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:python3-perf-5.10.0-207.0.0.116.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:perf-5.10.0-207.0.0.116.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:kernel-tools-devel-5.10.0-207.0.0.116.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:kernel-debugsource-5.10.0-207.0.0.116.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:kernel-source-5.10.0-207.0.0.116.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:kernel-5.10.0-207.0.0.116.oe2203sp3.src",
						"openEuler-22.03-LTS-SP3:kernel-debuginfo-5.10.0-207.0.0.116.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:kernel-tools-5.10.0-207.0.0.116.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:python3-perf-5.10.0-207.0.0.116.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:kernel-source-5.10.0-207.0.0.116.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:kernel-headers-5.10.0-207.0.0.116.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:perf-5.10.0-207.0.0.116.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:kernel-devel-5.10.0-207.0.0.116.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:kernel-tools-devel-5.10.0-207.0.0.116.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:kernel-debugsource-5.10.0-207.0.0.116.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:kernel-tools-debuginfo-5.10.0-207.0.0.116.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:kernel-5.10.0-207.0.0.116.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:python3-perf-debuginfo-5.10.0-207.0.0.116.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:perf-debuginfo-5.10.0-207.0.0.116.oe2203sp3.x86_64"
					]
				}
			],
			"threats":[
				{
					"details":"Medium",
					"category":"impact"
				}
			],
			"title":"CVE-2024-36917"
		},
		{
			"cve":"CVE-2024-36924",
			"notes":[
				{
					"text":"In the Linux kernel, the following vulnerability has been resolved:\n\nscsi: lpfc: Release hbalock before calling lpfc_worker_wake_up()\n\nlpfc_worker_wake_up() calls the lpfc_work_done() routine, which takes the\nhbalock.  Thus, lpfc_worker_wake_up() should not be called while holding the\nhbalock to avoid potential deadlock.",
					"category":"description",
					"title":"Vulnerability Description"
				}
			],
			"product_status":{
				"fixed":[
					"openEuler-22.03-LTS-SP3:perf-debuginfo-5.10.0-207.0.0.116.oe2203sp3.aarch64",
					"openEuler-22.03-LTS-SP3:kernel-debuginfo-5.10.0-207.0.0.116.oe2203sp3.aarch64",
					"openEuler-22.03-LTS-SP3:python3-perf-debuginfo-5.10.0-207.0.0.116.oe2203sp3.aarch64",
					"openEuler-22.03-LTS-SP3:kernel-tools-debuginfo-5.10.0-207.0.0.116.oe2203sp3.aarch64",
					"openEuler-22.03-LTS-SP3:kernel-tools-5.10.0-207.0.0.116.oe2203sp3.aarch64",
					"openEuler-22.03-LTS-SP3:kernel-5.10.0-207.0.0.116.oe2203sp3.aarch64",
					"openEuler-22.03-LTS-SP3:kernel-headers-5.10.0-207.0.0.116.oe2203sp3.aarch64",
					"openEuler-22.03-LTS-SP3:kernel-devel-5.10.0-207.0.0.116.oe2203sp3.aarch64",
					"openEuler-22.03-LTS-SP3:python3-perf-5.10.0-207.0.0.116.oe2203sp3.aarch64",
					"openEuler-22.03-LTS-SP3:perf-5.10.0-207.0.0.116.oe2203sp3.aarch64",
					"openEuler-22.03-LTS-SP3:kernel-tools-devel-5.10.0-207.0.0.116.oe2203sp3.aarch64",
					"openEuler-22.03-LTS-SP3:kernel-debugsource-5.10.0-207.0.0.116.oe2203sp3.aarch64",
					"openEuler-22.03-LTS-SP3:kernel-source-5.10.0-207.0.0.116.oe2203sp3.aarch64",
					"openEuler-22.03-LTS-SP3:kernel-5.10.0-207.0.0.116.oe2203sp3.src",
					"openEuler-22.03-LTS-SP3:kernel-debuginfo-5.10.0-207.0.0.116.oe2203sp3.x86_64",
					"openEuler-22.03-LTS-SP3:kernel-tools-5.10.0-207.0.0.116.oe2203sp3.x86_64",
					"openEuler-22.03-LTS-SP3:python3-perf-5.10.0-207.0.0.116.oe2203sp3.x86_64",
					"openEuler-22.03-LTS-SP3:kernel-source-5.10.0-207.0.0.116.oe2203sp3.x86_64",
					"openEuler-22.03-LTS-SP3:kernel-headers-5.10.0-207.0.0.116.oe2203sp3.x86_64",
					"openEuler-22.03-LTS-SP3:perf-5.10.0-207.0.0.116.oe2203sp3.x86_64",
					"openEuler-22.03-LTS-SP3:kernel-devel-5.10.0-207.0.0.116.oe2203sp3.x86_64",
					"openEuler-22.03-LTS-SP3:kernel-tools-devel-5.10.0-207.0.0.116.oe2203sp3.x86_64",
					"openEuler-22.03-LTS-SP3:kernel-debugsource-5.10.0-207.0.0.116.oe2203sp3.x86_64",
					"openEuler-22.03-LTS-SP3:kernel-tools-debuginfo-5.10.0-207.0.0.116.oe2203sp3.x86_64",
					"openEuler-22.03-LTS-SP3:kernel-5.10.0-207.0.0.116.oe2203sp3.x86_64",
					"openEuler-22.03-LTS-SP3:python3-perf-debuginfo-5.10.0-207.0.0.116.oe2203sp3.x86_64",
					"openEuler-22.03-LTS-SP3:perf-debuginfo-5.10.0-207.0.0.116.oe2203sp3.x86_64"
				]
			},
			"remediations":[
				{
					"product_ids":[
						"openEuler-22.03-LTS-SP3:perf-debuginfo-5.10.0-207.0.0.116.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:kernel-debuginfo-5.10.0-207.0.0.116.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:python3-perf-debuginfo-5.10.0-207.0.0.116.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:kernel-tools-debuginfo-5.10.0-207.0.0.116.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:kernel-tools-5.10.0-207.0.0.116.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:kernel-5.10.0-207.0.0.116.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:kernel-headers-5.10.0-207.0.0.116.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:kernel-devel-5.10.0-207.0.0.116.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:python3-perf-5.10.0-207.0.0.116.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:perf-5.10.0-207.0.0.116.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:kernel-tools-devel-5.10.0-207.0.0.116.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:kernel-debugsource-5.10.0-207.0.0.116.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:kernel-source-5.10.0-207.0.0.116.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:kernel-5.10.0-207.0.0.116.oe2203sp3.src",
						"openEuler-22.03-LTS-SP3:kernel-debuginfo-5.10.0-207.0.0.116.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:kernel-tools-5.10.0-207.0.0.116.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:python3-perf-5.10.0-207.0.0.116.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:kernel-source-5.10.0-207.0.0.116.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:kernel-headers-5.10.0-207.0.0.116.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:perf-5.10.0-207.0.0.116.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:kernel-devel-5.10.0-207.0.0.116.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:kernel-tools-devel-5.10.0-207.0.0.116.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:kernel-debugsource-5.10.0-207.0.0.116.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:kernel-tools-debuginfo-5.10.0-207.0.0.116.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:kernel-5.10.0-207.0.0.116.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:python3-perf-debuginfo-5.10.0-207.0.0.116.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:perf-debuginfo-5.10.0-207.0.0.116.oe2203sp3.x86_64"
					],
					"details":"kernel security update",
					"category":"vendor_fix",
					"url":"https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2024-1707"
				}
			],
			"scores":[
				{
					"cvss_v3":{
						"baseSeverity":"MEDIUM",
						"baseScore":4.7,
						"vectorString":"CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:N",
						"version":"3.1"
					},
					"products":[
						"openEuler-22.03-LTS-SP3:perf-debuginfo-5.10.0-207.0.0.116.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:kernel-debuginfo-5.10.0-207.0.0.116.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:python3-perf-debuginfo-5.10.0-207.0.0.116.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:kernel-tools-debuginfo-5.10.0-207.0.0.116.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:kernel-tools-5.10.0-207.0.0.116.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:kernel-5.10.0-207.0.0.116.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:kernel-headers-5.10.0-207.0.0.116.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:kernel-devel-5.10.0-207.0.0.116.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:python3-perf-5.10.0-207.0.0.116.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:perf-5.10.0-207.0.0.116.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:kernel-tools-devel-5.10.0-207.0.0.116.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:kernel-debugsource-5.10.0-207.0.0.116.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:kernel-source-5.10.0-207.0.0.116.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:kernel-5.10.0-207.0.0.116.oe2203sp3.src",
						"openEuler-22.03-LTS-SP3:kernel-debuginfo-5.10.0-207.0.0.116.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:kernel-tools-5.10.0-207.0.0.116.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:python3-perf-5.10.0-207.0.0.116.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:kernel-source-5.10.0-207.0.0.116.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:kernel-headers-5.10.0-207.0.0.116.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:perf-5.10.0-207.0.0.116.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:kernel-devel-5.10.0-207.0.0.116.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:kernel-tools-devel-5.10.0-207.0.0.116.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:kernel-debugsource-5.10.0-207.0.0.116.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:kernel-tools-debuginfo-5.10.0-207.0.0.116.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:kernel-5.10.0-207.0.0.116.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:python3-perf-debuginfo-5.10.0-207.0.0.116.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:perf-debuginfo-5.10.0-207.0.0.116.oe2203sp3.x86_64"
					]
				}
			],
			"threats":[
				{
					"details":"Medium",
					"category":"impact"
				}
			],
			"title":"CVE-2024-36924"
		},
		{
			"cve":"CVE-2024-36928",
			"notes":[
				{
					"text":"In the Linux kernel, the following vulnerability has been resolved:\n\ns390/qeth: Fix kernel panic after setting hsuid\n\nSymptom:\nWhen the hsuid attribute is set for the first time on an IQD Layer3\ndevice while the corresponding network interface is already UP,\nthe kernel will try to execute a napi function pointer that is NULL.\n\nExample:\n---------------------------------------------------------------------------\n[ 2057.572696] illegal operation: 0001 ilc:1 [#1] SMP\n[ 2057.572702] Modules linked in: af_iucv qeth_l3 zfcp scsi_transport_fc sunrpc nft_fib_inet nft_fib_ipv4 nft_fib_ipv6 nft_fib nft_reject_inet nf_reject_ipv4 nf_reject_ipv6\nnft_reject nft_ct nf_tables_set nft_chain_nat nf_nat nf_conntrack nf_defrag_ipv6 nf_defrag_ipv4 ip_set nf_tables libcrc32c nfnetlink ghash_s390 prng xts aes_s390 des_s390 de\ns_generic sha3_512_s390 sha3_256_s390 sha512_s390 vfio_ccw vfio_mdev mdev vfio_iommu_type1 eadm_sch vfio ext4 mbcache jbd2 qeth_l2 bridge stp llc dasd_eckd_mod qeth dasd_mod\n qdio ccwgroup pkey zcrypt\n[ 2057.572739] CPU: 6 PID: 60182 Comm: stress_client Kdump: loaded Not tainted 4.18.0-541.el8.s390x #1\n[ 2057.572742] Hardware name: IBM 3931 A01 704 (LPAR)\n[ 2057.572744] Krnl PSW : 0704f00180000000 0000000000000002 (0x2)\n[ 2057.572748]            R:0 T:1 IO:1 EX:1 Key:0 M:1 W:0 P:0 AS:3 CC:3 PM:0 RI:0 EA:3\n[ 2057.572751] Krnl GPRS: 0000000000000004 0000000000000000 00000000a3b008d8 0000000000000000\n[ 2057.572754]            00000000a3b008d8 cb923a29c779abc5 0000000000000000 00000000814cfd80\n[ 2057.572756]            000000000000012c 0000000000000000 00000000a3b008d8 00000000a3b008d8\n[ 2057.572758]            00000000bab6d500 00000000814cfd80 0000000091317e46 00000000814cfc68\n[ 2057.572762] Krnl Code:#0000000000000000: 0000                illegal\n                         >0000000000000002: 0000                illegal\n                          0000000000000004: 0000                illegal\n                          0000000000000006: 0000                illegal\n                          0000000000000008: 0000                illegal\n                          000000000000000a: 0000                illegal\n                          000000000000000c: 0000                illegal\n                          000000000000000e: 0000                illegal\n[ 2057.572800] Call Trace:\n[ 2057.572801] ([<00000000ec639700>] 0xec639700)\n[ 2057.572803]  [<00000000913183e2>] net_rx_action+0x2ba/0x398\n[ 2057.572809]  [<0000000091515f76>] __do_softirq+0x11e/0x3a0\n[ 2057.572813]  [<0000000090ce160c>] do_softirq_own_stack+0x3c/0x58\n[ 2057.572817] ([<0000000090d2cbd6>] do_softirq.part.1+0x56/0x60)\n[ 2057.572822]  [<0000000090d2cc60>] __local_bh_enable_ip+0x80/0x98\n[ 2057.572825]  [<0000000091314706>] __dev_queue_xmit+0x2be/0xd70\n[ 2057.572827]  [<000003ff803dd6d6>] afiucv_hs_send+0x24e/0x300 [af_iucv]\n[ 2057.572830]  [<000003ff803dd88a>] iucv_send_ctrl+0x102/0x138 [af_iucv]\n[ 2057.572833]  [<000003ff803de72a>] iucv_sock_connect+0x37a/0x468 [af_iucv]\n[ 2057.572835]  [<00000000912e7e90>] __sys_connect+0xa0/0xd8\n[ 2057.572839]  [<00000000912e9580>] sys_socketcall+0x228/0x348\n[ 2057.572841]  [<0000000091514e1a>] system_call+0x2a6/0x2c8\n[ 2057.572843] Last Breaking-Event-Address:\n[ 2057.572844]  [<0000000091317e44>] __napi_poll+0x4c/0x1d8\n[ 2057.572846]\n[ 2057.572847] Kernel panic - not syncing: Fatal exception in interrupt\n-------------------------------------------------------------------------------------------\n\nAnalysis:\nThere is one napi structure per out_q: card->qdio.out_qs[i].napi\nThe napi.poll functions are set during qeth_open().\n\nSince\ncommit 1cfef80d4c2b (\"s390/qeth: Don't call dev_close/dev_open (DOWN/UP)\")\nqeth_set_offline()/qeth_set_online() no longer call dev_close()/\ndev_open(). So if qeth_free_qdio_queues() cleared\ncard->qdio.out_qs[i].napi.poll while the network interface was UP and the\ncard was offline, they are not set again.\n\nReproduction:\nchzdev -e $devno layer2=0\nip link set dev $network_interface up\necho 0 > /sys/bus/ccw\n---truncated---",
					"category":"description",
					"title":"Vulnerability Description"
				}
			],
			"product_status":{
				"fixed":[
					"openEuler-22.03-LTS-SP3:perf-debuginfo-5.10.0-207.0.0.116.oe2203sp3.aarch64",
					"openEuler-22.03-LTS-SP3:kernel-debuginfo-5.10.0-207.0.0.116.oe2203sp3.aarch64",
					"openEuler-22.03-LTS-SP3:python3-perf-debuginfo-5.10.0-207.0.0.116.oe2203sp3.aarch64",
					"openEuler-22.03-LTS-SP3:kernel-tools-debuginfo-5.10.0-207.0.0.116.oe2203sp3.aarch64",
					"openEuler-22.03-LTS-SP3:kernel-tools-5.10.0-207.0.0.116.oe2203sp3.aarch64",
					"openEuler-22.03-LTS-SP3:kernel-5.10.0-207.0.0.116.oe2203sp3.aarch64",
					"openEuler-22.03-LTS-SP3:kernel-headers-5.10.0-207.0.0.116.oe2203sp3.aarch64",
					"openEuler-22.03-LTS-SP3:kernel-devel-5.10.0-207.0.0.116.oe2203sp3.aarch64",
					"openEuler-22.03-LTS-SP3:python3-perf-5.10.0-207.0.0.116.oe2203sp3.aarch64",
					"openEuler-22.03-LTS-SP3:perf-5.10.0-207.0.0.116.oe2203sp3.aarch64",
					"openEuler-22.03-LTS-SP3:kernel-tools-devel-5.10.0-207.0.0.116.oe2203sp3.aarch64",
					"openEuler-22.03-LTS-SP3:kernel-debugsource-5.10.0-207.0.0.116.oe2203sp3.aarch64",
					"openEuler-22.03-LTS-SP3:kernel-source-5.10.0-207.0.0.116.oe2203sp3.aarch64",
					"openEuler-22.03-LTS-SP3:kernel-5.10.0-207.0.0.116.oe2203sp3.src",
					"openEuler-22.03-LTS-SP3:kernel-debuginfo-5.10.0-207.0.0.116.oe2203sp3.x86_64",
					"openEuler-22.03-LTS-SP3:kernel-tools-5.10.0-207.0.0.116.oe2203sp3.x86_64",
					"openEuler-22.03-LTS-SP3:python3-perf-5.10.0-207.0.0.116.oe2203sp3.x86_64",
					"openEuler-22.03-LTS-SP3:kernel-source-5.10.0-207.0.0.116.oe2203sp3.x86_64",
					"openEuler-22.03-LTS-SP3:kernel-headers-5.10.0-207.0.0.116.oe2203sp3.x86_64",
					"openEuler-22.03-LTS-SP3:perf-5.10.0-207.0.0.116.oe2203sp3.x86_64",
					"openEuler-22.03-LTS-SP3:kernel-devel-5.10.0-207.0.0.116.oe2203sp3.x86_64",
					"openEuler-22.03-LTS-SP3:kernel-tools-devel-5.10.0-207.0.0.116.oe2203sp3.x86_64",
					"openEuler-22.03-LTS-SP3:kernel-debugsource-5.10.0-207.0.0.116.oe2203sp3.x86_64",
					"openEuler-22.03-LTS-SP3:kernel-tools-debuginfo-5.10.0-207.0.0.116.oe2203sp3.x86_64",
					"openEuler-22.03-LTS-SP3:kernel-5.10.0-207.0.0.116.oe2203sp3.x86_64",
					"openEuler-22.03-LTS-SP3:python3-perf-debuginfo-5.10.0-207.0.0.116.oe2203sp3.x86_64",
					"openEuler-22.03-LTS-SP3:perf-debuginfo-5.10.0-207.0.0.116.oe2203sp3.x86_64"
				]
			},
			"remediations":[
				{
					"product_ids":[
						"openEuler-22.03-LTS-SP3:perf-debuginfo-5.10.0-207.0.0.116.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:kernel-debuginfo-5.10.0-207.0.0.116.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:python3-perf-debuginfo-5.10.0-207.0.0.116.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:kernel-tools-debuginfo-5.10.0-207.0.0.116.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:kernel-tools-5.10.0-207.0.0.116.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:kernel-5.10.0-207.0.0.116.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:kernel-headers-5.10.0-207.0.0.116.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:kernel-devel-5.10.0-207.0.0.116.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:python3-perf-5.10.0-207.0.0.116.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:perf-5.10.0-207.0.0.116.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:kernel-tools-devel-5.10.0-207.0.0.116.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:kernel-debugsource-5.10.0-207.0.0.116.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:kernel-source-5.10.0-207.0.0.116.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:kernel-5.10.0-207.0.0.116.oe2203sp3.src",
						"openEuler-22.03-LTS-SP3:kernel-debuginfo-5.10.0-207.0.0.116.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:kernel-tools-5.10.0-207.0.0.116.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:python3-perf-5.10.0-207.0.0.116.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:kernel-source-5.10.0-207.0.0.116.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:kernel-headers-5.10.0-207.0.0.116.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:perf-5.10.0-207.0.0.116.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:kernel-devel-5.10.0-207.0.0.116.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:kernel-tools-devel-5.10.0-207.0.0.116.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:kernel-debugsource-5.10.0-207.0.0.116.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:kernel-tools-debuginfo-5.10.0-207.0.0.116.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:kernel-5.10.0-207.0.0.116.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:python3-perf-debuginfo-5.10.0-207.0.0.116.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:perf-debuginfo-5.10.0-207.0.0.116.oe2203sp3.x86_64"
					],
					"details":"kernel security update",
					"category":"vendor_fix",
					"url":"https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2024-1707"
				}
			],
			"scores":[
				{
					"cvss_v3":{
						"baseSeverity":"MEDIUM",
						"baseScore":4.4,
						"vectorString":"CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
						"version":"3.1"
					},
					"products":[
						"openEuler-22.03-LTS-SP3:perf-debuginfo-5.10.0-207.0.0.116.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:kernel-debuginfo-5.10.0-207.0.0.116.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:python3-perf-debuginfo-5.10.0-207.0.0.116.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:kernel-tools-debuginfo-5.10.0-207.0.0.116.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:kernel-tools-5.10.0-207.0.0.116.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:kernel-5.10.0-207.0.0.116.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:kernel-headers-5.10.0-207.0.0.116.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:kernel-devel-5.10.0-207.0.0.116.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:python3-perf-5.10.0-207.0.0.116.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:perf-5.10.0-207.0.0.116.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:kernel-tools-devel-5.10.0-207.0.0.116.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:kernel-debugsource-5.10.0-207.0.0.116.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:kernel-source-5.10.0-207.0.0.116.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:kernel-5.10.0-207.0.0.116.oe2203sp3.src",
						"openEuler-22.03-LTS-SP3:kernel-debuginfo-5.10.0-207.0.0.116.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:kernel-tools-5.10.0-207.0.0.116.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:python3-perf-5.10.0-207.0.0.116.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:kernel-source-5.10.0-207.0.0.116.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:kernel-headers-5.10.0-207.0.0.116.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:perf-5.10.0-207.0.0.116.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:kernel-devel-5.10.0-207.0.0.116.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:kernel-tools-devel-5.10.0-207.0.0.116.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:kernel-debugsource-5.10.0-207.0.0.116.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:kernel-tools-debuginfo-5.10.0-207.0.0.116.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:kernel-5.10.0-207.0.0.116.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:python3-perf-debuginfo-5.10.0-207.0.0.116.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:perf-debuginfo-5.10.0-207.0.0.116.oe2203sp3.x86_64"
					]
				}
			],
			"threats":[
				{
					"details":"Medium",
					"category":"impact"
				}
			],
			"title":"CVE-2024-36928"
		},
		{
			"cve":"CVE-2024-36929",
			"notes":[
				{
					"text":"In the Linux kernel, the following vulnerability has been resolved:\n\nnet: core: reject skb_copy(_expand) for fraglist GSO skbs\n\nSKB_GSO_FRAGLIST skbs must not be linearized, otherwise they become\ninvalid. Return NULL if such an skb is passed to skb_copy or\nskb_copy_expand, in order to prevent a crash on a potential later\ncall to skb_gso_segment.",
					"category":"description",
					"title":"Vulnerability Description"
				}
			],
			"product_status":{
				"fixed":[
					"openEuler-22.03-LTS-SP3:perf-debuginfo-5.10.0-207.0.0.116.oe2203sp3.aarch64",
					"openEuler-22.03-LTS-SP3:kernel-debuginfo-5.10.0-207.0.0.116.oe2203sp3.aarch64",
					"openEuler-22.03-LTS-SP3:python3-perf-debuginfo-5.10.0-207.0.0.116.oe2203sp3.aarch64",
					"openEuler-22.03-LTS-SP3:kernel-tools-debuginfo-5.10.0-207.0.0.116.oe2203sp3.aarch64",
					"openEuler-22.03-LTS-SP3:kernel-tools-5.10.0-207.0.0.116.oe2203sp3.aarch64",
					"openEuler-22.03-LTS-SP3:kernel-5.10.0-207.0.0.116.oe2203sp3.aarch64",
					"openEuler-22.03-LTS-SP3:kernel-headers-5.10.0-207.0.0.116.oe2203sp3.aarch64",
					"openEuler-22.03-LTS-SP3:kernel-devel-5.10.0-207.0.0.116.oe2203sp3.aarch64",
					"openEuler-22.03-LTS-SP3:python3-perf-5.10.0-207.0.0.116.oe2203sp3.aarch64",
					"openEuler-22.03-LTS-SP3:perf-5.10.0-207.0.0.116.oe2203sp3.aarch64",
					"openEuler-22.03-LTS-SP3:kernel-tools-devel-5.10.0-207.0.0.116.oe2203sp3.aarch64",
					"openEuler-22.03-LTS-SP3:kernel-debugsource-5.10.0-207.0.0.116.oe2203sp3.aarch64",
					"openEuler-22.03-LTS-SP3:kernel-source-5.10.0-207.0.0.116.oe2203sp3.aarch64",
					"openEuler-22.03-LTS-SP3:kernel-5.10.0-207.0.0.116.oe2203sp3.src",
					"openEuler-22.03-LTS-SP3:kernel-debuginfo-5.10.0-207.0.0.116.oe2203sp3.x86_64",
					"openEuler-22.03-LTS-SP3:kernel-tools-5.10.0-207.0.0.116.oe2203sp3.x86_64",
					"openEuler-22.03-LTS-SP3:python3-perf-5.10.0-207.0.0.116.oe2203sp3.x86_64",
					"openEuler-22.03-LTS-SP3:kernel-source-5.10.0-207.0.0.116.oe2203sp3.x86_64",
					"openEuler-22.03-LTS-SP3:kernel-headers-5.10.0-207.0.0.116.oe2203sp3.x86_64",
					"openEuler-22.03-LTS-SP3:perf-5.10.0-207.0.0.116.oe2203sp3.x86_64",
					"openEuler-22.03-LTS-SP3:kernel-devel-5.10.0-207.0.0.116.oe2203sp3.x86_64",
					"openEuler-22.03-LTS-SP3:kernel-tools-devel-5.10.0-207.0.0.116.oe2203sp3.x86_64",
					"openEuler-22.03-LTS-SP3:kernel-debugsource-5.10.0-207.0.0.116.oe2203sp3.x86_64",
					"openEuler-22.03-LTS-SP3:kernel-tools-debuginfo-5.10.0-207.0.0.116.oe2203sp3.x86_64",
					"openEuler-22.03-LTS-SP3:kernel-5.10.0-207.0.0.116.oe2203sp3.x86_64",
					"openEuler-22.03-LTS-SP3:python3-perf-debuginfo-5.10.0-207.0.0.116.oe2203sp3.x86_64",
					"openEuler-22.03-LTS-SP3:perf-debuginfo-5.10.0-207.0.0.116.oe2203sp3.x86_64"
				]
			},
			"remediations":[
				{
					"product_ids":[
						"openEuler-22.03-LTS-SP3:perf-debuginfo-5.10.0-207.0.0.116.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:kernel-debuginfo-5.10.0-207.0.0.116.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:python3-perf-debuginfo-5.10.0-207.0.0.116.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:kernel-tools-debuginfo-5.10.0-207.0.0.116.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:kernel-tools-5.10.0-207.0.0.116.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:kernel-5.10.0-207.0.0.116.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:kernel-headers-5.10.0-207.0.0.116.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:kernel-devel-5.10.0-207.0.0.116.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:python3-perf-5.10.0-207.0.0.116.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:perf-5.10.0-207.0.0.116.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:kernel-tools-devel-5.10.0-207.0.0.116.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:kernel-debugsource-5.10.0-207.0.0.116.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:kernel-source-5.10.0-207.0.0.116.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:kernel-5.10.0-207.0.0.116.oe2203sp3.src",
						"openEuler-22.03-LTS-SP3:kernel-debuginfo-5.10.0-207.0.0.116.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:kernel-tools-5.10.0-207.0.0.116.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:python3-perf-5.10.0-207.0.0.116.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:kernel-source-5.10.0-207.0.0.116.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:kernel-headers-5.10.0-207.0.0.116.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:perf-5.10.0-207.0.0.116.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:kernel-devel-5.10.0-207.0.0.116.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:kernel-tools-devel-5.10.0-207.0.0.116.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:kernel-debugsource-5.10.0-207.0.0.116.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:kernel-tools-debuginfo-5.10.0-207.0.0.116.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:kernel-5.10.0-207.0.0.116.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:python3-perf-debuginfo-5.10.0-207.0.0.116.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:perf-debuginfo-5.10.0-207.0.0.116.oe2203sp3.x86_64"
					],
					"details":"kernel security update",
					"category":"vendor_fix",
					"url":"https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2024-1707"
				}
			],
			"scores":[
				{
					"cvss_v3":{
						"baseSeverity":"MEDIUM",
						"baseScore":5.7,
						"vectorString":"CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
						"version":"3.1"
					},
					"products":[
						"openEuler-22.03-LTS-SP3:perf-debuginfo-5.10.0-207.0.0.116.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:kernel-debuginfo-5.10.0-207.0.0.116.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:python3-perf-debuginfo-5.10.0-207.0.0.116.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:kernel-tools-debuginfo-5.10.0-207.0.0.116.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:kernel-tools-5.10.0-207.0.0.116.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:kernel-5.10.0-207.0.0.116.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:kernel-headers-5.10.0-207.0.0.116.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:kernel-devel-5.10.0-207.0.0.116.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:python3-perf-5.10.0-207.0.0.116.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:perf-5.10.0-207.0.0.116.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:kernel-tools-devel-5.10.0-207.0.0.116.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:kernel-debugsource-5.10.0-207.0.0.116.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:kernel-source-5.10.0-207.0.0.116.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:kernel-5.10.0-207.0.0.116.oe2203sp3.src",
						"openEuler-22.03-LTS-SP3:kernel-debuginfo-5.10.0-207.0.0.116.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:kernel-tools-5.10.0-207.0.0.116.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:python3-perf-5.10.0-207.0.0.116.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:kernel-source-5.10.0-207.0.0.116.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:kernel-headers-5.10.0-207.0.0.116.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:perf-5.10.0-207.0.0.116.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:kernel-devel-5.10.0-207.0.0.116.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:kernel-tools-devel-5.10.0-207.0.0.116.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:kernel-debugsource-5.10.0-207.0.0.116.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:kernel-tools-debuginfo-5.10.0-207.0.0.116.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:kernel-5.10.0-207.0.0.116.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:python3-perf-debuginfo-5.10.0-207.0.0.116.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:perf-debuginfo-5.10.0-207.0.0.116.oe2203sp3.x86_64"
					]
				}
			],
			"threats":[
				{
					"details":"Medium",
					"category":"impact"
				}
			],
			"title":"CVE-2024-36929"
		},
		{
			"cve":"CVE-2024-36949",
			"notes":[
				{
					"text":"In the Linux kernel, the following vulnerability has been resolved:\n\namd/amdkfd: sync all devices to wait all processes being evicted\n\nIf there are more than one device doing reset in parallel, the first\ndevice will call kfd_suspend_all_processes() to evict all processes\non all devices, this call takes time to finish. other device will\nstart reset and recover without waiting. if the process has not been\nevicted before doing recover, it will be restored, then caused page\nfault.",
					"category":"description",
					"title":"Vulnerability Description"
				}
			],
			"product_status":{
				"fixed":[
					"openEuler-22.03-LTS-SP3:perf-debuginfo-5.10.0-207.0.0.116.oe2203sp3.aarch64",
					"openEuler-22.03-LTS-SP3:kernel-debuginfo-5.10.0-207.0.0.116.oe2203sp3.aarch64",
					"openEuler-22.03-LTS-SP3:python3-perf-debuginfo-5.10.0-207.0.0.116.oe2203sp3.aarch64",
					"openEuler-22.03-LTS-SP3:kernel-tools-debuginfo-5.10.0-207.0.0.116.oe2203sp3.aarch64",
					"openEuler-22.03-LTS-SP3:kernel-tools-5.10.0-207.0.0.116.oe2203sp3.aarch64",
					"openEuler-22.03-LTS-SP3:kernel-5.10.0-207.0.0.116.oe2203sp3.aarch64",
					"openEuler-22.03-LTS-SP3:kernel-headers-5.10.0-207.0.0.116.oe2203sp3.aarch64",
					"openEuler-22.03-LTS-SP3:kernel-devel-5.10.0-207.0.0.116.oe2203sp3.aarch64",
					"openEuler-22.03-LTS-SP3:python3-perf-5.10.0-207.0.0.116.oe2203sp3.aarch64",
					"openEuler-22.03-LTS-SP3:perf-5.10.0-207.0.0.116.oe2203sp3.aarch64",
					"openEuler-22.03-LTS-SP3:kernel-tools-devel-5.10.0-207.0.0.116.oe2203sp3.aarch64",
					"openEuler-22.03-LTS-SP3:kernel-debugsource-5.10.0-207.0.0.116.oe2203sp3.aarch64",
					"openEuler-22.03-LTS-SP3:kernel-source-5.10.0-207.0.0.116.oe2203sp3.aarch64",
					"openEuler-22.03-LTS-SP3:kernel-5.10.0-207.0.0.116.oe2203sp3.src",
					"openEuler-22.03-LTS-SP3:kernel-debuginfo-5.10.0-207.0.0.116.oe2203sp3.x86_64",
					"openEuler-22.03-LTS-SP3:kernel-tools-5.10.0-207.0.0.116.oe2203sp3.x86_64",
					"openEuler-22.03-LTS-SP3:python3-perf-5.10.0-207.0.0.116.oe2203sp3.x86_64",
					"openEuler-22.03-LTS-SP3:kernel-source-5.10.0-207.0.0.116.oe2203sp3.x86_64",
					"openEuler-22.03-LTS-SP3:kernel-headers-5.10.0-207.0.0.116.oe2203sp3.x86_64",
					"openEuler-22.03-LTS-SP3:perf-5.10.0-207.0.0.116.oe2203sp3.x86_64",
					"openEuler-22.03-LTS-SP3:kernel-devel-5.10.0-207.0.0.116.oe2203sp3.x86_64",
					"openEuler-22.03-LTS-SP3:kernel-tools-devel-5.10.0-207.0.0.116.oe2203sp3.x86_64",
					"openEuler-22.03-LTS-SP3:kernel-debugsource-5.10.0-207.0.0.116.oe2203sp3.x86_64",
					"openEuler-22.03-LTS-SP3:kernel-tools-debuginfo-5.10.0-207.0.0.116.oe2203sp3.x86_64",
					"openEuler-22.03-LTS-SP3:kernel-5.10.0-207.0.0.116.oe2203sp3.x86_64",
					"openEuler-22.03-LTS-SP3:python3-perf-debuginfo-5.10.0-207.0.0.116.oe2203sp3.x86_64",
					"openEuler-22.03-LTS-SP3:perf-debuginfo-5.10.0-207.0.0.116.oe2203sp3.x86_64"
				]
			},
			"remediations":[
				{
					"product_ids":[
						"openEuler-22.03-LTS-SP3:perf-debuginfo-5.10.0-207.0.0.116.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:kernel-debuginfo-5.10.0-207.0.0.116.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:python3-perf-debuginfo-5.10.0-207.0.0.116.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:kernel-tools-debuginfo-5.10.0-207.0.0.116.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:kernel-tools-5.10.0-207.0.0.116.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:kernel-5.10.0-207.0.0.116.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:kernel-headers-5.10.0-207.0.0.116.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:kernel-devel-5.10.0-207.0.0.116.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:python3-perf-5.10.0-207.0.0.116.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:perf-5.10.0-207.0.0.116.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:kernel-tools-devel-5.10.0-207.0.0.116.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:kernel-debugsource-5.10.0-207.0.0.116.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:kernel-source-5.10.0-207.0.0.116.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:kernel-5.10.0-207.0.0.116.oe2203sp3.src",
						"openEuler-22.03-LTS-SP3:kernel-debuginfo-5.10.0-207.0.0.116.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:kernel-tools-5.10.0-207.0.0.116.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:python3-perf-5.10.0-207.0.0.116.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:kernel-source-5.10.0-207.0.0.116.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:kernel-headers-5.10.0-207.0.0.116.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:perf-5.10.0-207.0.0.116.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:kernel-devel-5.10.0-207.0.0.116.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:kernel-tools-devel-5.10.0-207.0.0.116.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:kernel-debugsource-5.10.0-207.0.0.116.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:kernel-tools-debuginfo-5.10.0-207.0.0.116.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:kernel-5.10.0-207.0.0.116.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:python3-perf-debuginfo-5.10.0-207.0.0.116.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:perf-debuginfo-5.10.0-207.0.0.116.oe2203sp3.x86_64"
					],
					"details":"kernel security update",
					"category":"vendor_fix",
					"url":"https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2024-1707"
				}
			],
			"scores":[
				{
					"cvss_v3":{
						"baseSeverity":"MEDIUM",
						"baseScore":4.7,
						"vectorString":"CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:N",
						"version":"3.1"
					},
					"products":[
						"openEuler-22.03-LTS-SP3:perf-debuginfo-5.10.0-207.0.0.116.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:kernel-debuginfo-5.10.0-207.0.0.116.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:python3-perf-debuginfo-5.10.0-207.0.0.116.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:kernel-tools-debuginfo-5.10.0-207.0.0.116.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:kernel-tools-5.10.0-207.0.0.116.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:kernel-5.10.0-207.0.0.116.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:kernel-headers-5.10.0-207.0.0.116.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:kernel-devel-5.10.0-207.0.0.116.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:python3-perf-5.10.0-207.0.0.116.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:perf-5.10.0-207.0.0.116.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:kernel-tools-devel-5.10.0-207.0.0.116.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:kernel-debugsource-5.10.0-207.0.0.116.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:kernel-source-5.10.0-207.0.0.116.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:kernel-5.10.0-207.0.0.116.oe2203sp3.src",
						"openEuler-22.03-LTS-SP3:kernel-debuginfo-5.10.0-207.0.0.116.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:kernel-tools-5.10.0-207.0.0.116.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:python3-perf-5.10.0-207.0.0.116.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:kernel-source-5.10.0-207.0.0.116.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:kernel-headers-5.10.0-207.0.0.116.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:perf-5.10.0-207.0.0.116.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:kernel-devel-5.10.0-207.0.0.116.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:kernel-tools-devel-5.10.0-207.0.0.116.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:kernel-debugsource-5.10.0-207.0.0.116.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:kernel-tools-debuginfo-5.10.0-207.0.0.116.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:kernel-5.10.0-207.0.0.116.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:python3-perf-debuginfo-5.10.0-207.0.0.116.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:perf-debuginfo-5.10.0-207.0.0.116.oe2203sp3.x86_64"
					]
				}
			],
			"threats":[
				{
					"details":"Medium",
					"category":"impact"
				}
			],
			"title":"CVE-2024-36949"
		},
		{
			"cve":"CVE-2024-36954",
			"notes":[
				{
					"text":"In the Linux kernel, the following vulnerability has been resolved:\n\ntipc: fix a possible memleak in tipc_buf_append\n\n__skb_linearize() doesn't free the skb when it fails, so move\n'*buf = NULL' after __skb_linearize(), so that the skb can be\nfreed on the err path.",
					"category":"description",
					"title":"Vulnerability Description"
				}
			],
			"product_status":{
				"fixed":[
					"openEuler-22.03-LTS-SP3:perf-debuginfo-5.10.0-207.0.0.116.oe2203sp3.aarch64",
					"openEuler-22.03-LTS-SP3:kernel-debuginfo-5.10.0-207.0.0.116.oe2203sp3.aarch64",
					"openEuler-22.03-LTS-SP3:python3-perf-debuginfo-5.10.0-207.0.0.116.oe2203sp3.aarch64",
					"openEuler-22.03-LTS-SP3:kernel-tools-debuginfo-5.10.0-207.0.0.116.oe2203sp3.aarch64",
					"openEuler-22.03-LTS-SP3:kernel-tools-5.10.0-207.0.0.116.oe2203sp3.aarch64",
					"openEuler-22.03-LTS-SP3:kernel-5.10.0-207.0.0.116.oe2203sp3.aarch64",
					"openEuler-22.03-LTS-SP3:kernel-headers-5.10.0-207.0.0.116.oe2203sp3.aarch64",
					"openEuler-22.03-LTS-SP3:kernel-devel-5.10.0-207.0.0.116.oe2203sp3.aarch64",
					"openEuler-22.03-LTS-SP3:python3-perf-5.10.0-207.0.0.116.oe2203sp3.aarch64",
					"openEuler-22.03-LTS-SP3:perf-5.10.0-207.0.0.116.oe2203sp3.aarch64",
					"openEuler-22.03-LTS-SP3:kernel-tools-devel-5.10.0-207.0.0.116.oe2203sp3.aarch64",
					"openEuler-22.03-LTS-SP3:kernel-debugsource-5.10.0-207.0.0.116.oe2203sp3.aarch64",
					"openEuler-22.03-LTS-SP3:kernel-source-5.10.0-207.0.0.116.oe2203sp3.aarch64",
					"openEuler-22.03-LTS-SP3:kernel-5.10.0-207.0.0.116.oe2203sp3.src",
					"openEuler-22.03-LTS-SP3:kernel-debuginfo-5.10.0-207.0.0.116.oe2203sp3.x86_64",
					"openEuler-22.03-LTS-SP3:kernel-tools-5.10.0-207.0.0.116.oe2203sp3.x86_64",
					"openEuler-22.03-LTS-SP3:python3-perf-5.10.0-207.0.0.116.oe2203sp3.x86_64",
					"openEuler-22.03-LTS-SP3:kernel-source-5.10.0-207.0.0.116.oe2203sp3.x86_64",
					"openEuler-22.03-LTS-SP3:kernel-headers-5.10.0-207.0.0.116.oe2203sp3.x86_64",
					"openEuler-22.03-LTS-SP3:perf-5.10.0-207.0.0.116.oe2203sp3.x86_64",
					"openEuler-22.03-LTS-SP3:kernel-devel-5.10.0-207.0.0.116.oe2203sp3.x86_64",
					"openEuler-22.03-LTS-SP3:kernel-tools-devel-5.10.0-207.0.0.116.oe2203sp3.x86_64",
					"openEuler-22.03-LTS-SP3:kernel-debugsource-5.10.0-207.0.0.116.oe2203sp3.x86_64",
					"openEuler-22.03-LTS-SP3:kernel-tools-debuginfo-5.10.0-207.0.0.116.oe2203sp3.x86_64",
					"openEuler-22.03-LTS-SP3:kernel-5.10.0-207.0.0.116.oe2203sp3.x86_64",
					"openEuler-22.03-LTS-SP3:python3-perf-debuginfo-5.10.0-207.0.0.116.oe2203sp3.x86_64",
					"openEuler-22.03-LTS-SP3:perf-debuginfo-5.10.0-207.0.0.116.oe2203sp3.x86_64"
				]
			},
			"remediations":[
				{
					"product_ids":[
						"openEuler-22.03-LTS-SP3:perf-debuginfo-5.10.0-207.0.0.116.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:kernel-debuginfo-5.10.0-207.0.0.116.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:python3-perf-debuginfo-5.10.0-207.0.0.116.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:kernel-tools-debuginfo-5.10.0-207.0.0.116.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:kernel-tools-5.10.0-207.0.0.116.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:kernel-5.10.0-207.0.0.116.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:kernel-headers-5.10.0-207.0.0.116.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:kernel-devel-5.10.0-207.0.0.116.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:python3-perf-5.10.0-207.0.0.116.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:perf-5.10.0-207.0.0.116.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:kernel-tools-devel-5.10.0-207.0.0.116.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:kernel-debugsource-5.10.0-207.0.0.116.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:kernel-source-5.10.0-207.0.0.116.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:kernel-5.10.0-207.0.0.116.oe2203sp3.src",
						"openEuler-22.03-LTS-SP3:kernel-debuginfo-5.10.0-207.0.0.116.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:kernel-tools-5.10.0-207.0.0.116.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:python3-perf-5.10.0-207.0.0.116.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:kernel-source-5.10.0-207.0.0.116.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:kernel-headers-5.10.0-207.0.0.116.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:perf-5.10.0-207.0.0.116.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:kernel-devel-5.10.0-207.0.0.116.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:kernel-tools-devel-5.10.0-207.0.0.116.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:kernel-debugsource-5.10.0-207.0.0.116.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:kernel-tools-debuginfo-5.10.0-207.0.0.116.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:kernel-5.10.0-207.0.0.116.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:python3-perf-debuginfo-5.10.0-207.0.0.116.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:perf-debuginfo-5.10.0-207.0.0.116.oe2203sp3.x86_64"
					],
					"details":"kernel security update",
					"category":"vendor_fix",
					"url":"https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2024-1707"
				}
			],
			"scores":[
				{
					"cvss_v3":{
						"baseSeverity":"MEDIUM",
						"baseScore":4.7,
						"vectorString":"CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:N",
						"version":"3.1"
					},
					"products":[
						"openEuler-22.03-LTS-SP3:perf-debuginfo-5.10.0-207.0.0.116.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:kernel-debuginfo-5.10.0-207.0.0.116.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:python3-perf-debuginfo-5.10.0-207.0.0.116.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:kernel-tools-debuginfo-5.10.0-207.0.0.116.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:kernel-tools-5.10.0-207.0.0.116.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:kernel-5.10.0-207.0.0.116.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:kernel-headers-5.10.0-207.0.0.116.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:kernel-devel-5.10.0-207.0.0.116.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:python3-perf-5.10.0-207.0.0.116.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:perf-5.10.0-207.0.0.116.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:kernel-tools-devel-5.10.0-207.0.0.116.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:kernel-debugsource-5.10.0-207.0.0.116.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:kernel-source-5.10.0-207.0.0.116.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:kernel-5.10.0-207.0.0.116.oe2203sp3.src",
						"openEuler-22.03-LTS-SP3:kernel-debuginfo-5.10.0-207.0.0.116.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:kernel-tools-5.10.0-207.0.0.116.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:python3-perf-5.10.0-207.0.0.116.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:kernel-source-5.10.0-207.0.0.116.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:kernel-headers-5.10.0-207.0.0.116.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:perf-5.10.0-207.0.0.116.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:kernel-devel-5.10.0-207.0.0.116.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:kernel-tools-devel-5.10.0-207.0.0.116.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:kernel-debugsource-5.10.0-207.0.0.116.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:kernel-tools-debuginfo-5.10.0-207.0.0.116.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:kernel-5.10.0-207.0.0.116.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:python3-perf-debuginfo-5.10.0-207.0.0.116.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:perf-debuginfo-5.10.0-207.0.0.116.oe2203sp3.x86_64"
					]
				}
			],
			"threats":[
				{
					"details":"Medium",
					"category":"impact"
				}
			],
			"title":"CVE-2024-36954"
		},
		{
			"cve":"CVE-2024-36957",
			"notes":[
				{
					"text":"In the Linux kernel, the following vulnerability has been resolved:\n\nocteontx2-af: avoid off-by-one read from userspace\n\nWe try to access count + 1 byte from userspace with memdup_user(buffer,\ncount + 1). However, the userspace only provides buffer of count bytes and\nonly these count bytes are verified to be okay to access. To ensure the\ncopied buffer is NUL terminated, we use memdup_user_nul instead.",
					"category":"description",
					"title":"Vulnerability Description"
				}
			],
			"product_status":{
				"fixed":[
					"openEuler-22.03-LTS-SP3:perf-debuginfo-5.10.0-207.0.0.116.oe2203sp3.aarch64",
					"openEuler-22.03-LTS-SP3:kernel-debuginfo-5.10.0-207.0.0.116.oe2203sp3.aarch64",
					"openEuler-22.03-LTS-SP3:python3-perf-debuginfo-5.10.0-207.0.0.116.oe2203sp3.aarch64",
					"openEuler-22.03-LTS-SP3:kernel-tools-debuginfo-5.10.0-207.0.0.116.oe2203sp3.aarch64",
					"openEuler-22.03-LTS-SP3:kernel-tools-5.10.0-207.0.0.116.oe2203sp3.aarch64",
					"openEuler-22.03-LTS-SP3:kernel-5.10.0-207.0.0.116.oe2203sp3.aarch64",
					"openEuler-22.03-LTS-SP3:kernel-headers-5.10.0-207.0.0.116.oe2203sp3.aarch64",
					"openEuler-22.03-LTS-SP3:kernel-devel-5.10.0-207.0.0.116.oe2203sp3.aarch64",
					"openEuler-22.03-LTS-SP3:python3-perf-5.10.0-207.0.0.116.oe2203sp3.aarch64",
					"openEuler-22.03-LTS-SP3:perf-5.10.0-207.0.0.116.oe2203sp3.aarch64",
					"openEuler-22.03-LTS-SP3:kernel-tools-devel-5.10.0-207.0.0.116.oe2203sp3.aarch64",
					"openEuler-22.03-LTS-SP3:kernel-debugsource-5.10.0-207.0.0.116.oe2203sp3.aarch64",
					"openEuler-22.03-LTS-SP3:kernel-source-5.10.0-207.0.0.116.oe2203sp3.aarch64",
					"openEuler-22.03-LTS-SP3:kernel-5.10.0-207.0.0.116.oe2203sp3.src",
					"openEuler-22.03-LTS-SP3:kernel-debuginfo-5.10.0-207.0.0.116.oe2203sp3.x86_64",
					"openEuler-22.03-LTS-SP3:kernel-tools-5.10.0-207.0.0.116.oe2203sp3.x86_64",
					"openEuler-22.03-LTS-SP3:python3-perf-5.10.0-207.0.0.116.oe2203sp3.x86_64",
					"openEuler-22.03-LTS-SP3:kernel-source-5.10.0-207.0.0.116.oe2203sp3.x86_64",
					"openEuler-22.03-LTS-SP3:kernel-headers-5.10.0-207.0.0.116.oe2203sp3.x86_64",
					"openEuler-22.03-LTS-SP3:perf-5.10.0-207.0.0.116.oe2203sp3.x86_64",
					"openEuler-22.03-LTS-SP3:kernel-devel-5.10.0-207.0.0.116.oe2203sp3.x86_64",
					"openEuler-22.03-LTS-SP3:kernel-tools-devel-5.10.0-207.0.0.116.oe2203sp3.x86_64",
					"openEuler-22.03-LTS-SP3:kernel-debugsource-5.10.0-207.0.0.116.oe2203sp3.x86_64",
					"openEuler-22.03-LTS-SP3:kernel-tools-debuginfo-5.10.0-207.0.0.116.oe2203sp3.x86_64",
					"openEuler-22.03-LTS-SP3:kernel-5.10.0-207.0.0.116.oe2203sp3.x86_64",
					"openEuler-22.03-LTS-SP3:python3-perf-debuginfo-5.10.0-207.0.0.116.oe2203sp3.x86_64",
					"openEuler-22.03-LTS-SP3:perf-debuginfo-5.10.0-207.0.0.116.oe2203sp3.x86_64"
				]
			},
			"remediations":[
				{
					"product_ids":[
						"openEuler-22.03-LTS-SP3:perf-debuginfo-5.10.0-207.0.0.116.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:kernel-debuginfo-5.10.0-207.0.0.116.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:python3-perf-debuginfo-5.10.0-207.0.0.116.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:kernel-tools-debuginfo-5.10.0-207.0.0.116.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:kernel-tools-5.10.0-207.0.0.116.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:kernel-5.10.0-207.0.0.116.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:kernel-headers-5.10.0-207.0.0.116.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:kernel-devel-5.10.0-207.0.0.116.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:python3-perf-5.10.0-207.0.0.116.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:perf-5.10.0-207.0.0.116.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:kernel-tools-devel-5.10.0-207.0.0.116.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:kernel-debugsource-5.10.0-207.0.0.116.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:kernel-source-5.10.0-207.0.0.116.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:kernel-5.10.0-207.0.0.116.oe2203sp3.src",
						"openEuler-22.03-LTS-SP3:kernel-debuginfo-5.10.0-207.0.0.116.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:kernel-tools-5.10.0-207.0.0.116.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:python3-perf-5.10.0-207.0.0.116.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:kernel-source-5.10.0-207.0.0.116.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:kernel-headers-5.10.0-207.0.0.116.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:perf-5.10.0-207.0.0.116.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:kernel-devel-5.10.0-207.0.0.116.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:kernel-tools-devel-5.10.0-207.0.0.116.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:kernel-debugsource-5.10.0-207.0.0.116.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:kernel-tools-debuginfo-5.10.0-207.0.0.116.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:kernel-5.10.0-207.0.0.116.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:python3-perf-debuginfo-5.10.0-207.0.0.116.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:perf-debuginfo-5.10.0-207.0.0.116.oe2203sp3.x86_64"
					],
					"details":"kernel security update",
					"category":"vendor_fix",
					"url":"https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2024-1707"
				}
			],
			"scores":[
				{
					"cvss_v3":{
						"baseSeverity":"LOW",
						"baseScore":3.3,
						"vectorString":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L",
						"version":"3.1"
					},
					"products":[
						"openEuler-22.03-LTS-SP3:perf-debuginfo-5.10.0-207.0.0.116.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:kernel-debuginfo-5.10.0-207.0.0.116.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:python3-perf-debuginfo-5.10.0-207.0.0.116.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:kernel-tools-debuginfo-5.10.0-207.0.0.116.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:kernel-tools-5.10.0-207.0.0.116.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:kernel-5.10.0-207.0.0.116.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:kernel-headers-5.10.0-207.0.0.116.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:kernel-devel-5.10.0-207.0.0.116.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:python3-perf-5.10.0-207.0.0.116.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:perf-5.10.0-207.0.0.116.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:kernel-tools-devel-5.10.0-207.0.0.116.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:kernel-debugsource-5.10.0-207.0.0.116.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:kernel-source-5.10.0-207.0.0.116.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:kernel-5.10.0-207.0.0.116.oe2203sp3.src",
						"openEuler-22.03-LTS-SP3:kernel-debuginfo-5.10.0-207.0.0.116.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:kernel-tools-5.10.0-207.0.0.116.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:python3-perf-5.10.0-207.0.0.116.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:kernel-source-5.10.0-207.0.0.116.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:kernel-headers-5.10.0-207.0.0.116.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:perf-5.10.0-207.0.0.116.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:kernel-devel-5.10.0-207.0.0.116.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:kernel-tools-devel-5.10.0-207.0.0.116.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:kernel-debugsource-5.10.0-207.0.0.116.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:kernel-tools-debuginfo-5.10.0-207.0.0.116.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:kernel-5.10.0-207.0.0.116.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:python3-perf-debuginfo-5.10.0-207.0.0.116.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:perf-debuginfo-5.10.0-207.0.0.116.oe2203sp3.x86_64"
					]
				}
			],
			"threats":[
				{
					"details":"Low",
					"category":"impact"
				}
			],
			"title":"CVE-2024-36957"
		},
		{
			"cve":"CVE-2024-36964",
			"notes":[
				{
					"text":"In the Linux kernel, the following vulnerability has been resolved:\n\nfs/9p: only translate RWX permissions for plain 9P2000\n\nGarbage in plain 9P2000's perm bits is allowed through, which causes it\nto be able to set (among others) the suid bit. This was presumably not\nthe intent since the unix extended bits are handled explicitly and\nconditionally on .u.",
					"category":"description",
					"title":"Vulnerability Description"
				}
			],
			"product_status":{
				"fixed":[
					"openEuler-22.03-LTS-SP3:perf-debuginfo-5.10.0-207.0.0.116.oe2203sp3.aarch64",
					"openEuler-22.03-LTS-SP3:kernel-debuginfo-5.10.0-207.0.0.116.oe2203sp3.aarch64",
					"openEuler-22.03-LTS-SP3:python3-perf-debuginfo-5.10.0-207.0.0.116.oe2203sp3.aarch64",
					"openEuler-22.03-LTS-SP3:kernel-tools-debuginfo-5.10.0-207.0.0.116.oe2203sp3.aarch64",
					"openEuler-22.03-LTS-SP3:kernel-tools-5.10.0-207.0.0.116.oe2203sp3.aarch64",
					"openEuler-22.03-LTS-SP3:kernel-5.10.0-207.0.0.116.oe2203sp3.aarch64",
					"openEuler-22.03-LTS-SP3:kernel-headers-5.10.0-207.0.0.116.oe2203sp3.aarch64",
					"openEuler-22.03-LTS-SP3:kernel-devel-5.10.0-207.0.0.116.oe2203sp3.aarch64",
					"openEuler-22.03-LTS-SP3:python3-perf-5.10.0-207.0.0.116.oe2203sp3.aarch64",
					"openEuler-22.03-LTS-SP3:perf-5.10.0-207.0.0.116.oe2203sp3.aarch64",
					"openEuler-22.03-LTS-SP3:kernel-tools-devel-5.10.0-207.0.0.116.oe2203sp3.aarch64",
					"openEuler-22.03-LTS-SP3:kernel-debugsource-5.10.0-207.0.0.116.oe2203sp3.aarch64",
					"openEuler-22.03-LTS-SP3:kernel-source-5.10.0-207.0.0.116.oe2203sp3.aarch64",
					"openEuler-22.03-LTS-SP3:kernel-5.10.0-207.0.0.116.oe2203sp3.src",
					"openEuler-22.03-LTS-SP3:kernel-debuginfo-5.10.0-207.0.0.116.oe2203sp3.x86_64",
					"openEuler-22.03-LTS-SP3:kernel-tools-5.10.0-207.0.0.116.oe2203sp3.x86_64",
					"openEuler-22.03-LTS-SP3:python3-perf-5.10.0-207.0.0.116.oe2203sp3.x86_64",
					"openEuler-22.03-LTS-SP3:kernel-source-5.10.0-207.0.0.116.oe2203sp3.x86_64",
					"openEuler-22.03-LTS-SP3:kernel-headers-5.10.0-207.0.0.116.oe2203sp3.x86_64",
					"openEuler-22.03-LTS-SP3:perf-5.10.0-207.0.0.116.oe2203sp3.x86_64",
					"openEuler-22.03-LTS-SP3:kernel-devel-5.10.0-207.0.0.116.oe2203sp3.x86_64",
					"openEuler-22.03-LTS-SP3:kernel-tools-devel-5.10.0-207.0.0.116.oe2203sp3.x86_64",
					"openEuler-22.03-LTS-SP3:kernel-debugsource-5.10.0-207.0.0.116.oe2203sp3.x86_64",
					"openEuler-22.03-LTS-SP3:kernel-tools-debuginfo-5.10.0-207.0.0.116.oe2203sp3.x86_64",
					"openEuler-22.03-LTS-SP3:kernel-5.10.0-207.0.0.116.oe2203sp3.x86_64",
					"openEuler-22.03-LTS-SP3:python3-perf-debuginfo-5.10.0-207.0.0.116.oe2203sp3.x86_64",
					"openEuler-22.03-LTS-SP3:perf-debuginfo-5.10.0-207.0.0.116.oe2203sp3.x86_64"
				]
			},
			"remediations":[
				{
					"product_ids":[
						"openEuler-22.03-LTS-SP3:perf-debuginfo-5.10.0-207.0.0.116.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:kernel-debuginfo-5.10.0-207.0.0.116.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:python3-perf-debuginfo-5.10.0-207.0.0.116.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:kernel-tools-debuginfo-5.10.0-207.0.0.116.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:kernel-tools-5.10.0-207.0.0.116.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:kernel-5.10.0-207.0.0.116.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:kernel-headers-5.10.0-207.0.0.116.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:kernel-devel-5.10.0-207.0.0.116.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:python3-perf-5.10.0-207.0.0.116.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:perf-5.10.0-207.0.0.116.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:kernel-tools-devel-5.10.0-207.0.0.116.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:kernel-debugsource-5.10.0-207.0.0.116.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:kernel-source-5.10.0-207.0.0.116.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:kernel-5.10.0-207.0.0.116.oe2203sp3.src",
						"openEuler-22.03-LTS-SP3:kernel-debuginfo-5.10.0-207.0.0.116.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:kernel-tools-5.10.0-207.0.0.116.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:python3-perf-5.10.0-207.0.0.116.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:kernel-source-5.10.0-207.0.0.116.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:kernel-headers-5.10.0-207.0.0.116.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:perf-5.10.0-207.0.0.116.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:kernel-devel-5.10.0-207.0.0.116.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:kernel-tools-devel-5.10.0-207.0.0.116.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:kernel-debugsource-5.10.0-207.0.0.116.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:kernel-tools-debuginfo-5.10.0-207.0.0.116.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:kernel-5.10.0-207.0.0.116.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:python3-perf-debuginfo-5.10.0-207.0.0.116.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:perf-debuginfo-5.10.0-207.0.0.116.oe2203sp3.x86_64"
					],
					"details":"kernel security update",
					"category":"vendor_fix",
					"url":"https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2024-1707"
				}
			],
			"scores":[
				{
					"cvss_v3":{
						"baseSeverity":"HIGH",
						"baseScore":7.2,
						"vectorString":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
						"version":"3.1"
					},
					"products":[
						"openEuler-22.03-LTS-SP3:perf-debuginfo-5.10.0-207.0.0.116.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:kernel-debuginfo-5.10.0-207.0.0.116.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:python3-perf-debuginfo-5.10.0-207.0.0.116.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:kernel-tools-debuginfo-5.10.0-207.0.0.116.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:kernel-tools-5.10.0-207.0.0.116.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:kernel-5.10.0-207.0.0.116.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:kernel-headers-5.10.0-207.0.0.116.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:kernel-devel-5.10.0-207.0.0.116.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:python3-perf-5.10.0-207.0.0.116.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:perf-5.10.0-207.0.0.116.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:kernel-tools-devel-5.10.0-207.0.0.116.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:kernel-debugsource-5.10.0-207.0.0.116.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:kernel-source-5.10.0-207.0.0.116.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:kernel-5.10.0-207.0.0.116.oe2203sp3.src",
						"openEuler-22.03-LTS-SP3:kernel-debuginfo-5.10.0-207.0.0.116.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:kernel-tools-5.10.0-207.0.0.116.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:python3-perf-5.10.0-207.0.0.116.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:kernel-source-5.10.0-207.0.0.116.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:kernel-headers-5.10.0-207.0.0.116.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:perf-5.10.0-207.0.0.116.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:kernel-devel-5.10.0-207.0.0.116.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:kernel-tools-devel-5.10.0-207.0.0.116.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:kernel-debugsource-5.10.0-207.0.0.116.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:kernel-tools-debuginfo-5.10.0-207.0.0.116.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:kernel-5.10.0-207.0.0.116.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:python3-perf-debuginfo-5.10.0-207.0.0.116.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:perf-debuginfo-5.10.0-207.0.0.116.oe2203sp3.x86_64"
					]
				}
			],
			"threats":[
				{
					"details":"High",
					"category":"impact"
				}
			],
			"title":"CVE-2024-36964"
		}
	]
}