{
	"document":{
		"aggregate_severity":{
			"namespace":"https://nvd.nist.gov/vuln-metrics/cvss",
			"text":"High"
		},
		"category":"csaf_vex",
		"csaf_version":"2.0",
		"distribution":{
			"tlp":{
				"label":"WHITE",
				"url":"https:/www.first.org/tlp/"
			}
		},
		"lang":"en",
		"notes":[
			{
				"text":"kernel security update",
				"category":"general",
				"title":"Synopsis"
			},
			{
				"text":"An update for kernel is now available for openEuler-22.03-LTS-SP3",
				"category":"general",
				"title":"Summary"
			},
			{
				"text":"The Linux Kernel, the operating system core itself.\n\nSecurity Fix(es):\n\nIn the Linux kernel, the following vulnerability has been resolved:\n\nusb: gadget: ncm: Avoid dropping datagrams of properly parsed NTBs\n\nIt is observed sometimes when tethering is used over NCM with Windows 11\nas host, at some instances, the gadget_giveback has one byte appended at\nthe end of a proper NTB. When the NTB is parsed, unwrap call looks for\nany leftover bytes in SKB provided by u_ether and if there are any pending\nbytes, it treats them as a separate NTB and parses it. But in case the\nsecond NTB (as per unwrap call) is faulty/corrupt, all the datagrams that\nwere parsed properly in the first NTB and saved in rx_list are dropped.\n\nAdding a few custom traces showed the following:\n[002] d..1  7828.532866: dwc3_gadget_giveback: ep1out:\nreq 000000003868811a length 1025/16384 zsI ==> 0\n[002] d..1  7828.532867: ncm_unwrap_ntb: K: ncm_unwrap_ntb toprocess: 1025\n[002] d..1  7828.532867: ncm_unwrap_ntb: K: ncm_unwrap_ntb nth: 1751999342\n[002] d..1  7828.532868: ncm_unwrap_ntb: K: ncm_unwrap_ntb seq: 0xce67\n[002] d..1  7828.532868: ncm_unwrap_ntb: K: ncm_unwrap_ntb blk_len: 0x400\n[002] d..1  7828.532868: ncm_unwrap_ntb: K: ncm_unwrap_ntb ndp_len: 0x10\n[002] d..1  7828.532869: ncm_unwrap_ntb: K: Parsed NTB with 1 frames\n\nIn this case, the giveback is of 1025 bytes and block length is 1024.\nThe rest 1 byte (which is 0x00) won't be parsed resulting in drop of\nall datagrams in rx_list.\n\nSame is case with packets of size 2048:\n[002] d..1  7828.557948: dwc3_gadget_giveback: ep1out:\nreq 0000000011dfd96e length 2049/16384 zsI ==> 0\n[002] d..1  7828.557949: ncm_unwrap_ntb: K: ncm_unwrap_ntb nth: 1751999342\n[002] d..1  7828.557950: ncm_unwrap_ntb: K: ncm_unwrap_ntb blk_len: 0x800\n\nLecroy shows one byte coming in extra confirming that the byte is coming\nin from PC:\n\n Transfer 2959 - Bytes Transferred(1025)  Timestamp((18.524 843 590)\n - Transaction 8391 - Data(1025 bytes) Timestamp(18.524 843 590)\n --- Packet 4063861\n       Data(1024 bytes)\n       Duration(2.117us) Idle(14.700ns) Timestamp(18.524 843 590)\n --- Packet 4063863\n       Data(1 byte)\n       Duration(66.160ns) Time(282.000ns) Timestamp(18.524 845 722)\n\nAccording to Windows driver, no ZLP is needed if wBlockLength is non-zero,\nbecause the non-zero wBlockLength has already told the function side the\nsize of transfer to be expected. However, there are in-market NCM devices\nthat rely on ZLP as long as the wBlockLength is multiple of wMaxPacketSize.\nTo deal with such devices, it pads an extra 0 at end so the transfer is no\nlonger multiple of wMaxPacketSize.(CVE-2024-27405)\n\nIn the Linux kernel, the following vulnerability has been resolved:\n\nipv6: fix potential \"struct net\" leak in inet6_rtm_getaddr()\n\nIt seems that if userspace provides a correct IFA_TARGET_NETNSID value\nbut no IFA_ADDRESS and IFA_LOCAL attributes, inet6_rtm_getaddr()\nreturns -EINVAL with an elevated \"struct net\" refcount.(CVE-2024-27417)\n\nIn the Linux kernel, the following vulnerability has been resolved:\n\nnetfilter: nf_tables: flush pending destroy work before exit_net release\n\nSimilar to 2c9f0293280e (\"netfilter: nf_tables: flush pending destroy\nwork before netlink notifier\") to address a race between exit_net and\nthe destroy workqueue.\n\nThe trace below shows an element to be released via destroy workqueue\nwhile exit_net path (triggered via module removal) has already released\nthe set that is used in such transaction.\n\n[ 1360.547789] BUG: KASAN: slab-use-after-free in nf_tables_trans_destroy_work+0x3f5/0x590 [nf_tables]\n[ 1360.547861] Read of size 8 at addr ffff888140500cc0 by task kworker/4:1/152465\n[ 1360.547870] CPU: 4 PID: 152465 Comm: kworker/4:1 Not tainted 6.8.0+ #359\n[ 1360.547882] Workqueue: events nf_tables_trans_destroy_work [nf_tables]\n[ 1360.547984] Call Trace:\n[ 1360.547991]  <TASK>\n[ 1360.547998]  dump_stack_lvl+0x53/0x70\n[ 1360.548014]  print_report+0xc4/0x610\n[ 1360.548026]  ? __virt_addr_valid+0xba/0x160\n[ 1360.548040]  ? __pfx__raw_spin_lock_irqsave+0x10/0x10\n[ 1360.548054]  ? nf_tables_trans_destroy_work+0x3f5/0x590 [nf_tables]\n[ 1360.548176]  kasan_report+0xae/0xe0\n[ 1360.548189]  ? nf_tables_trans_destroy_work+0x3f5/0x590 [nf_tables]\n[ 1360.548312]  nf_tables_trans_destroy_work+0x3f5/0x590 [nf_tables]\n[ 1360.548447]  ? __pfx_nf_tables_trans_destroy_work+0x10/0x10 [nf_tables]\n[ 1360.548577]  ? _raw_spin_unlock_irq+0x18/0x30\n[ 1360.548591]  process_one_work+0x2f1/0x670\n[ 1360.548610]  worker_thread+0x4d3/0x760\n[ 1360.548627]  ? __pfx_worker_thread+0x10/0x10\n[ 1360.548640]  kthread+0x16b/0x1b0\n[ 1360.548653]  ? __pfx_kthread+0x10/0x10\n[ 1360.548665]  ret_from_fork+0x2f/0x50\n[ 1360.548679]  ? __pfx_kthread+0x10/0x10\n[ 1360.548690]  ret_from_fork_asm+0x1a/0x30\n[ 1360.548707]  </TASK>\n\n[ 1360.548719] Allocated by task 192061:\n[ 1360.548726]  kasan_save_stack+0x20/0x40\n[ 1360.548739]  kasan_save_track+0x14/0x30\n[ 1360.548750]  __kasan_kmalloc+0x8f/0xa0\n[ 1360.548760]  __kmalloc_node+0x1f1/0x450\n[ 1360.548771]  nf_tables_newset+0x10c7/0x1b50 [nf_tables]\n[ 1360.548883]  nfnetlink_rcv_batch+0xbc4/0xdc0 [nfnetlink]\n[ 1360.548909]  nfnetlink_rcv+0x1a8/0x1e0 [nfnetlink]\n[ 1360.548927]  netlink_unicast+0x367/0x4f0\n[ 1360.548935]  netlink_sendmsg+0x34b/0x610\n[ 1360.548944]  ____sys_sendmsg+0x4d4/0x510\n[ 1360.548953]  ___sys_sendmsg+0xc9/0x120\n[ 1360.548961]  __sys_sendmsg+0xbe/0x140\n[ 1360.548971]  do_syscall_64+0x55/0x120\n[ 1360.548982]  entry_SYSCALL_64_after_hwframe+0x55/0x5d\n\n[ 1360.548994] Freed by task 192222:\n[ 1360.548999]  kasan_save_stack+0x20/0x40\n[ 1360.549009]  kasan_save_track+0x14/0x30\n[ 1360.549019]  kasan_save_free_info+0x3b/0x60\n[ 1360.549028]  poison_slab_object+0x100/0x180\n[ 1360.549036]  __kasan_slab_free+0x14/0x30\n[ 1360.549042]  kfree+0xb6/0x260\n[ 1360.549049]  __nft_release_table+0x473/0x6a0 [nf_tables]\n[ 1360.549131]  nf_tables_exit_net+0x170/0x240 [nf_tables]\n[ 1360.549221]  ops_exit_list+0x50/0xa0\n[ 1360.549229]  free_exit_list+0x101/0x140\n[ 1360.549236]  unregister_pernet_operations+0x107/0x160\n[ 1360.549245]  unregister_pernet_subsys+0x1c/0x30\n[ 1360.549254]  nf_tables_module_exit+0x43/0x80 [nf_tables]\n[ 1360.549345]  __do_sys_delete_module+0x253/0x370\n[ 1360.549352]  do_syscall_64+0x55/0x120\n[ 1360.549360]  entry_SYSCALL_64_after_hwframe+0x55/0x5d\n\n(gdb) list *__nft_release_table+0x473\n0x1e033 is in __nft_release_table (net/netfilter/nf_tables_api.c:11354).\n11349           list_for_each_entry_safe(flowtable, nf, &table->flowtables, list) {\n11350                   list_del(&flowtable->list);\n11351                   nft_use_dec(&table->use);\n11352                   nf_tables_flowtable_destroy(flowtable);\n11353           }\n11354           list_for_each_entry_safe(set, ns, &table->sets, list) {\n11355                   list_del(&set->list);\n11356                   nft_use_dec(&table->use);\n11357                   if (set->flags & (NFT_SET_MAP | NFT_SET_OBJECT))\n11358                           nft_map_deactivat\n---truncated---(CVE-2024-35899)\n\nIn the Linux kernel, the following vulnerability has been resolved:\n\ndyndbg: fix old BUG_ON in >control parser\n\nFix a BUG_ON from 2009.  Even if it looks \"unreachable\" (I didn't\nreally look), lets make sure by removing it, doing pr_err and return\n-EINVAL instead.(CVE-2024-35947)\n\nIn the Linux kernel, the following vulnerability has been resolved:\n\nnet/sched: taprio: always validate TCA_TAPRIO_ATTR_PRIOMAP\n\nIf one TCA_TAPRIO_ATTR_PRIOMAP attribute has been provided,\ntaprio_parse_mqprio_opt() must validate it, or userspace\ncan inject arbitrary data to the kernel, the second time\ntaprio_change() is called.\n\nFirst call (with valid attributes) sets dev->num_tc\nto a non zero value.\n\nSecond call (with arbitrary mqprio attributes)\nreturns early from taprio_parse_mqprio_opt()\nand bad things can happen.(CVE-2024-36974)\n\nIn the Linux kernel, the following vulnerability has been resolved:\n\ntcp: Fix shift-out-of-bounds in dctcp_update_alpha().\n\nIn dctcp_update_alpha(), we use a module parameter dctcp_shift_g\nas follows:\n\n  alpha -= min_not_zero(alpha, alpha >> dctcp_shift_g);\n  ...\n  delivered_ce <<= (10 - dctcp_shift_g);\n\nIt seems syzkaller started fuzzing module parameters and triggered\nshift-out-of-bounds [0] by setting 100 to dctcp_shift_g:\n\n  memcpy((void*)0x20000080,\n         \"/sys/module/tcp_dctcp/parameters/dctcp_shift_g\\000\", 47);\n  res = syscall(__NR_openat, /*fd=*/0xffffffffffffff9cul, /*file=*/0x20000080ul,\n                /*flags=*/2ul, /*mode=*/0ul);\n  memcpy((void*)0x20000000, \"100\\000\", 4);\n  syscall(__NR_write, /*fd=*/r[0], /*val=*/0x20000000ul, /*len=*/4ul);\n\nLet's limit the max value of dctcp_shift_g by param_set_uint_minmax().\n\nWith this patch:\n\n  # echo 10 > /sys/module/tcp_dctcp/parameters/dctcp_shift_g\n  # cat /sys/module/tcp_dctcp/parameters/dctcp_shift_g\n  10\n  # echo 11 > /sys/module/tcp_dctcp/parameters/dctcp_shift_g\n  -bash: echo: write error: Invalid argument\n\n[0]:\nUBSAN: shift-out-of-bounds in net/ipv4/tcp_dctcp.c:143:12\nshift exponent 100 is too large for 32-bit type 'u32' (aka 'unsigned int')\nCPU: 0 PID: 8083 Comm: syz-executor345 Not tainted 6.9.0-05151-g1b294a1f3561 #2\nHardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS\n1.13.0-1ubuntu1.1 04/01/2014\nCall Trace:\n <TASK>\n __dump_stack lib/dump_stack.c:88 [inline]\n dump_stack_lvl+0x201/0x300 lib/dump_stack.c:114\n ubsan_epilogue lib/ubsan.c:231 [inline]\n __ubsan_handle_shift_out_of_bounds+0x346/0x3a0 lib/ubsan.c:468\n dctcp_update_alpha+0x540/0x570 net/ipv4/tcp_dctcp.c:143\n tcp_in_ack_event net/ipv4/tcp_input.c:3802 [inline]\n tcp_ack+0x17b1/0x3bc0 net/ipv4/tcp_input.c:3948\n tcp_rcv_state_process+0x57a/0x2290 net/ipv4/tcp_input.c:6711\n tcp_v4_do_rcv+0x764/0xc40 net/ipv4/tcp_ipv4.c:1937\n sk_backlog_rcv include/net/sock.h:1106 [inline]\n __release_sock+0x20f/0x350 net/core/sock.c:2983\n release_sock+0x61/0x1f0 net/core/sock.c:3549\n mptcp_subflow_shutdown+0x3d0/0x620 net/mptcp/protocol.c:2907\n mptcp_check_send_data_fin+0x225/0x410 net/mptcp/protocol.c:2976\n __mptcp_close+0x238/0xad0 net/mptcp/protocol.c:3072\n mptcp_close+0x2a/0x1a0 net/mptcp/protocol.c:3127\n inet_release+0x190/0x1f0 net/ipv4/af_inet.c:437\n __sock_release net/socket.c:659 [inline]\n sock_close+0xc0/0x240 net/socket.c:1421\n __fput+0x41b/0x890 fs/file_table.c:422\n task_work_run+0x23b/0x300 kernel/task_work.c:180\n exit_task_work include/linux/task_work.h:38 [inline]\n do_exit+0x9c8/0x2540 kernel/exit.c:878\n do_group_exit+0x201/0x2b0 kernel/exit.c:1027\n __do_sys_exit_group kernel/exit.c:1038 [inline]\n __se_sys_exit_group kernel/exit.c:1036 [inline]\n __x64_sys_exit_group+0x3f/0x40 kernel/exit.c:1036\n do_syscall_x64 arch/x86/entry/common.c:52 [inline]\n do_syscall_64+0xe4/0x240 arch/x86/entry/common.c:83\n entry_SYSCALL_64_after_hwframe+0x67/0x6f\nRIP: 0033:0x7f6c2b5005b6\nCode: Unable to access opcode bytes at 0x7f6c2b50058c.\nRSP: 002b:00007ffe883eb948 EFLAGS: 00000246 ORIG_RAX: 00000000000000e7\nRAX: ffffffffffffffda RBX: 00007f6c2b5862f0 RCX: 00007f6c2b5005b6\nRDX: 0000000000000001 RSI: 000000000000003c RDI: 0000000000000001\nRBP: 0000000000000001 R08: 00000000000000e7 R09: ffffffffffffffc0\nR10: 0000000000000006 R11: 0000000000000246 R12: 00007f6c2b5862f0\nR13: 0000000000000001 R14: 0000000000000000 R15: 0000000000000001\n </TASK>(CVE-2024-37356)\n\nIn the Linux kernel, the following vulnerability has been resolved:\n\nnet: bridge: xmit: make sure we have at least eth header len bytes\n\nsyzbot triggered an uninit value[1] error in bridge device's xmit path\nby sending a short (less than ETH_HLEN bytes) skb. To fix it check if\nwe can actually pull that amount instead of assuming.\n\nTested with dropwatch:\n drop at: br_dev_xmit+0xb93/0x12d0 [bridge] (0xffffffffc06739b3)\n origin: software\n timestamp: Mon May 13 11:31:53 2024 778214037 nsec\n protocol: 0x88a8\n length: 2\n original length: 2\n drop reason: PKT_TOO_SMALL\n\n[1]\nBUG: KMSAN: uninit-value in br_dev_xmit+0x61d/0x1cb0 net/bridge/br_device.c:65\n br_dev_xmit+0x61d/0x1cb0 net/bridge/br_device.c:65\n __netdev_start_xmit include/linux/netdevice.h:4903 [inline]\n netdev_start_xmit include/linux/netdevice.h:4917 [inline]\n xmit_one net/core/dev.c:3531 [inline]\n dev_hard_start_xmit+0x247/0xa20 net/core/dev.c:3547\n __dev_queue_xmit+0x34db/0x5350 net/core/dev.c:4341\n dev_queue_xmit include/linux/netdevice.h:3091 [inline]\n __bpf_tx_skb net/core/filter.c:2136 [inline]\n __bpf_redirect_common net/core/filter.c:2180 [inline]\n __bpf_redirect+0x14a6/0x1620 net/core/filter.c:2187\n ____bpf_clone_redirect net/core/filter.c:2460 [inline]\n bpf_clone_redirect+0x328/0x470 net/core/filter.c:2432\n ___bpf_prog_run+0x13fe/0xe0f0 kernel/bpf/core.c:1997\n __bpf_prog_run512+0xb5/0xe0 kernel/bpf/core.c:2238\n bpf_dispatcher_nop_func include/linux/bpf.h:1234 [inline]\n __bpf_prog_run include/linux/filter.h:657 [inline]\n bpf_prog_run include/linux/filter.h:664 [inline]\n bpf_test_run+0x499/0xc30 net/bpf/test_run.c:425\n bpf_prog_test_run_skb+0x14ea/0x1f20 net/bpf/test_run.c:1058\n bpf_prog_test_run+0x6b7/0xad0 kernel/bpf/syscall.c:4269\n __sys_bpf+0x6aa/0xd90 kernel/bpf/syscall.c:5678\n __do_sys_bpf kernel/bpf/syscall.c:5767 [inline]\n __se_sys_bpf kernel/bpf/syscall.c:5765 [inline]\n __x64_sys_bpf+0xa0/0xe0 kernel/bpf/syscall.c:5765\n x64_sys_call+0x96b/0x3b50 arch/x86/include/generated/asm/syscalls_64.h:322\n do_syscall_x64 arch/x86/entry/common.c:52 [inline]\n do_syscall_64+0xcf/0x1e0 arch/x86/entry/common.c:83\n entry_SYSCALL_64_after_hwframe+0x77/0x7f(CVE-2024-38538)\n\nIn the Linux kernel, the following vulnerability has been resolved:\n\nof: module: add buffer overflow check in of_modalias()\n\nIn of_modalias(), if the buffer happens to be too small even for the 1st\nsnprintf() call, the len parameter will become negative and str parameter\n(if not NULL initially) will point beyond the buffer's end. Add the buffer\noverflow check after the 1st snprintf() call and fix such check after the\nstrlen() call (accounting for the terminating NUL char).(CVE-2024-38541)\n\nIn the Linux kernel, the following vulnerability has been resolved:\n\ndrm/mediatek: Add 0 size check to mtk_drm_gem_obj\n\nAdd a check to mtk_drm_gem_init if we attempt to allocate a GEM object\nof 0 bytes. Currently, no such check exists and the kernel will panic if\na userspace application attempts to allocate a 0x0 GBM buffer.\n\nTested by attempting to allocate a 0x0 GBM buffer on an MT8188 and\nverifying that we now return EINVAL.(CVE-2024-38549)\n\nIn the Linux kernel, the following vulnerability has been resolved:\n\nnet: fec: remove .ndo_poll_controller to avoid deadlocks\n\nThere is a deadlock issue found in sungem driver, please refer to the\ncommit ac0a230f719b (\"eth: sungem: remove .ndo_poll_controller to avoid\ndeadlocks\"). The root cause of the issue is that netpoll is in atomic\ncontext and disable_irq() is called by .ndo_poll_controller interface\nof sungem driver, however, disable_irq() might sleep. After analyzing\nthe implementation of fec_poll_controller(), the fec driver should have\nthe same issue. Due to the fec driver uses NAPI for TX completions, the\n.ndo_poll_controller is unnecessary to be implemented in the fec driver,\nso fec_poll_controller() can be safely removed.(CVE-2024-38553)\n\nIn the Linux kernel, the following vulnerability has been resolved:\n\nnet/mlx5: Discard command completions in internal error\n\nFix use after free when FW completion arrives while device is in\ninternal error state. Avoid calling completion handler in this case,\nsince the device will flush the command interface and trigger all\ncompletions manually.\n\nKernel log:\n------------[ cut here ]------------\nrefcount_t: underflow; use-after-free.\n...\nRIP: 0010:refcount_warn_saturate+0xd8/0xe0\n...\nCall Trace:\n<IRQ>\n? __warn+0x79/0x120\n? refcount_warn_saturate+0xd8/0xe0\n? report_bug+0x17c/0x190\n? handle_bug+0x3c/0x60\n? exc_invalid_op+0x14/0x70\n? asm_exc_invalid_op+0x16/0x20\n? refcount_warn_saturate+0xd8/0xe0\ncmd_ent_put+0x13b/0x160 [mlx5_core]\nmlx5_cmd_comp_handler+0x5f9/0x670 [mlx5_core]\ncmd_comp_notifier+0x1f/0x30 [mlx5_core]\nnotifier_call_chain+0x35/0xb0\natomic_notifier_call_chain+0x16/0x20\nmlx5_eq_async_int+0xf6/0x290 [mlx5_core]\nnotifier_call_chain+0x35/0xb0\natomic_notifier_call_chain+0x16/0x20\nirq_int_handler+0x19/0x30 [mlx5_core]\n__handle_irq_event_percpu+0x4b/0x160\nhandle_irq_event+0x2e/0x80\nhandle_edge_irq+0x98/0x230\n__common_interrupt+0x3b/0xa0\ncommon_interrupt+0x7b/0xa0\n</IRQ>\n<TASK>\nasm_common_interrupt+0x22/0x40(CVE-2024-38555)\n\nIn the Linux kernel, the following vulnerability has been resolved:\n\nnet/mlx5: Add a timeout to acquire the command queue semaphore\n\nPrevent forced completion handling on an entry that has not yet been\nassigned an index, causing an out of bounds access on idx = -22.\nInstead of waiting indefinitely for the sem, blocking flow now waits for\nindex to be allocated or a sem acquisition timeout before beginning the\ntimer for FW completion.\n\nKernel log example:\nmlx5_core 0000:06:00.0: wait_func_handle_exec_timeout:1128:(pid 185911): cmd[-22]: CREATE_UCTX(0xa04) No done completion(CVE-2024-38556)\n\nIn the Linux kernel, the following vulnerability has been resolved:\n\nbpf: Add BPF_PROG_TYPE_CGROUP_SKB attach type enforcement in BPF_LINK_CREATE\n\nbpf_prog_attach uses attach_type_to_prog_type to enforce proper\nattach type for BPF_PROG_TYPE_CGROUP_SKB. link_create uses\nbpf_prog_get and relies on bpf_prog_attach_check_attach_type\nto properly verify prog_type <> attach_type association.\n\nAdd missing attach_type enforcement for the link_create case.\nOtherwise, it's currently possible to attach cgroup_skb prog\ntypes to other cgroup hooks.(CVE-2024-38564)\n\nIn the Linux kernel, the following vulnerability has been resolved:\n\nspeakup: Fix sizeof() vs ARRAY_SIZE() bug\n\nThe \"buf\" pointer is an array of u16 values.  This code should be\nusing ARRAY_SIZE() (which is 256) instead of sizeof() (which is 512),\notherwise it can the still got out of bounds.(CVE-2024-38587)\n\nIn the Linux kernel, the following vulnerability has been resolved:\n\njffs2: prevent xattr node from overflowing the eraseblock\n\nAdd a check to make sure that the requested xattr node size is no larger\nthan the eraseblock minus the cleanmarker.\n\nUnlike the usual inode nodes, the xattr nodes aren't split into parts\nand spread across multiple eraseblocks, which means that a xattr node\nmust not occupy more than one eraseblock. If the requested xattr value is\ntoo large, the xattr node can spill onto the next eraseblock, overwriting\nthe nodes and causing errors such as:\n\njffs2: argh. node added in wrong place at 0x0000b050(2)\njffs2: nextblock 0x0000a000, expected at 0000b00c\njffs2: error: (823) do_verify_xattr_datum: node CRC failed at 0x01e050,\nread=0xfc892c93, calc=0x000000\njffs2: notice: (823) jffs2_get_inode_nodes: Node header CRC failed\nat 0x01e00c. {848f,2fc4,0fef511f,59a3d171}\njffs2: Node at 0x0000000c with length 0x00001044 would run over the\nend of the erase block\njffs2: Perhaps the file system was created with the wrong erase size?\njffs2: jffs2_scan_eraseblock(): Magic bitmask 0x1985 not found\nat 0x00000010: 0x1044 instead\n\nThis breaks the filesystem and can lead to KASAN crashes such as:\n\nBUG: KASAN: slab-out-of-bounds in jffs2_sum_add_kvec+0x125e/0x15d0\nRead of size 4 at addr ffff88802c31e914 by task repro/830\nCPU: 0 PID: 830 Comm: repro Not tainted 6.9.0-rc3+ #1\nHardware name: QEMU Standard PC (i440FX + PIIX, 1996),\nBIOS Arch Linux 1.16.3-1-1 04/01/2014\nCall Trace:\n <TASK>\n dump_stack_lvl+0xc6/0x120\n print_report+0xc4/0x620\n ? __virt_addr_valid+0x308/0x5b0\n kasan_report+0xc1/0xf0\n ? jffs2_sum_add_kvec+0x125e/0x15d0\n ? jffs2_sum_add_kvec+0x125e/0x15d0\n jffs2_sum_add_kvec+0x125e/0x15d0\n jffs2_flash_direct_writev+0xa8/0xd0\n jffs2_flash_writev+0x9c9/0xef0\n ? __x64_sys_setxattr+0xc4/0x160\n ? do_syscall_64+0x69/0x140\n ? entry_SYSCALL_64_after_hwframe+0x76/0x7e\n [...]\n\nFound by Linux Verification Center (linuxtesting.org) with Syzkaller.(CVE-2024-38599)\n\nIn the Linux kernel, the following vulnerability has been resolved:\n\nfs/ntfs3: Use 64 bit variable to avoid 32 bit overflow\n\nFor example, in the expression:\n\tvbo = 2 * vbo + skip(CVE-2024-38624)\n\nIn the Linux kernel, the following vulnerability has been resolved:\n\nwatchdog: cpu5wdt.c: Fix use-after-free bug caused by cpu5wdt_trigger\n\nWhen the cpu5wdt module is removing, the origin code uses del_timer() to\nde-activate the timer. If the timer handler is running, del_timer() could\nnot stop it and will return directly. If the port region is released by\nrelease_region() and then the timer handler cpu5wdt_trigger() calls outb()\nto write into the region that is released, the use-after-free bug will\nhappen.\n\nChange del_timer() to timer_shutdown_sync() in order that the timer handler\ncould be finished before the port region is released.(CVE-2024-38630)\n\nIn the Linux kernel, the following vulnerability has been resolved:\n\ns390/ap: Fix crash in AP internal function modify_bitmap()\n\nA system crash like this\n\n  Failing address: 200000cb7df6f000 TEID: 200000cb7df6f403\n  Fault in home space mode while using kernel ASCE.\n  AS:00000002d71bc007 R3:00000003fe5b8007 S:000000011a446000 P:000000015660c13d\n  Oops: 0038 ilc:3 [#1] PREEMPT SMP\n  Modules linked in: mlx5_ib ...\n  CPU: 8 PID: 7556 Comm: bash Not tainted 6.9.0-rc7 #8\n  Hardware name: IBM 3931 A01 704 (LPAR)\n  Krnl PSW : 0704e00180000000 0000014b75e7b606 (ap_parse_bitmap_str+0x10e/0x1f8)\n  R:0 T:1 IO:1 EX:1 Key:0 M:1 W:0 P:0 AS:3 CC:2 PM:0 RI:0 EA:3\n  Krnl GPRS: 0000000000000001 ffffffffffffffc0 0000000000000001 00000048f96b75d3\n  000000cb00000100 ffffffffffffffff ffffffffffffffff 000000cb7df6fce0\n  000000cb7df6fce0 00000000ffffffff 000000000000002b 00000048ffffffff\n  000003ff9b2dbc80 200000cb7df6fcd8 0000014bffffffc0 000000cb7df6fbc8\n  Krnl Code: 0000014b75e7b5fc: a7840047            brc     8,0000014b75e7b68a\n  0000014b75e7b600: 18b2                lr      %r11,%r2\n  #0000014b75e7b602: a7f4000a            brc     15,0000014b75e7b616\n  >0000014b75e7b606: eb22d00000e6        laog    %r2,%r2,0(%r13)\n  0000014b75e7b60c: a7680001            lhi     %r6,1\n  0000014b75e7b610: 187b                lr      %r7,%r11\n  0000014b75e7b612: 84960021            brxh    %r9,%r6,0000014b75e7b654\n  0000014b75e7b616: 18e9                lr      %r14,%r9\n  Call Trace:\n  [<0000014b75e7b606>] ap_parse_bitmap_str+0x10e/0x1f8\n  ([<0000014b75e7b5dc>] ap_parse_bitmap_str+0xe4/0x1f8)\n  [<0000014b75e7b758>] apmask_store+0x68/0x140\n  [<0000014b75679196>] kernfs_fop_write_iter+0x14e/0x1e8\n  [<0000014b75598524>] vfs_write+0x1b4/0x448\n  [<0000014b7559894c>] ksys_write+0x74/0x100\n  [<0000014b7618a440>] __do_syscall+0x268/0x328\n  [<0000014b761a3558>] system_call+0x70/0x98\n  INFO: lockdep is turned off.\n  Last Breaking-Event-Address:\n  [<0000014b75e7b636>] ap_parse_bitmap_str+0x13e/0x1f8\n  Kernel panic - not syncing: Fatal exception: panic_on_oops\n\noccured when /sys/bus/ap/a[pq]mask was updated with a relative mask value\n(like +0x10-0x12,+60,-90) with one of the numeric values exceeding INT_MAX.\n\nThe fix is simple: use unsigned long values for the internal variables. The\ncorrect checks are already in place in the function but a simple int for\nthe internal variables was used with the possibility to overflow.(CVE-2024-38661)\n\nIn the Linux kernel, the following vulnerability has been resolved:\n\num: Add winch to winch_handlers before registering winch IRQ\n\nRegistering a winch IRQ is racy, an interrupt may occur before the winch is\nadded to the winch_handlers list.\n\nIf that happens, register_winch_irq() adds to that list a winch that is\nscheduled to be (or has already been) freed, causing a panic later in\nwinch_cleanup().\n\nAvoid the race by adding the winch to the winch_handlers list before\nregistering the IRQ, and rolling back if um_request_irq() fails.(CVE-2024-39292)",
				"category":"general",
				"title":"Description"
			},
			{
				"text":"An update for kernel is now available for openEuler-22.03-LTS-SP3.\n\nopenEuler Security has rated this update as having a security impact of high. A Common Vunlnerability Scoring System(CVSS)base score,which gives a detailed severity rating, is available for each vulnerability from the CVElink(s) in the References section.",
				"category":"general",
				"title":"Topic"
			},
			{
				"text":"High",
				"category":"general",
				"title":"Severity"
			},
			{
				"text":"kernel",
				"category":"general",
				"title":"Affected Component"
			}
		],
		"publisher":{
			"issuing_authority":"openEuler security committee",
			"name":"openEuler",
			"namespace":"https://www.openeuler.org",
			"contact_details":"openeuler-security@openeuler.org",
			"category":"vendor"
		},
		"references":[
			{
				"summary":"openEuler-SA-2024-1792",
				"category":"self",
				"url":"https://www.openeuler.org/zh/security/security-bulletins/detail/?id=openEuler-SA-2024-1792"
			},
			{
				"summary":"CVE-2024-27405",
				"category":"self",
				"url":"https://www.openeuler.org/en/security/cve/detail/?cveId=CVE-2024-27405&packageName=kernel"
			},
			{
				"summary":"CVE-2024-27417",
				"category":"self",
				"url":"https://www.openeuler.org/en/security/cve/detail/?cveId=CVE-2024-27417&packageName=kernel"
			},
			{
				"summary":"CVE-2024-35899",
				"category":"self",
				"url":"https://www.openeuler.org/en/security/cve/detail/?cveId=CVE-2024-35899&packageName=kernel"
			},
			{
				"summary":"CVE-2024-35947",
				"category":"self",
				"url":"https://www.openeuler.org/en/security/cve/detail/?cveId=CVE-2024-35947&packageName=kernel"
			},
			{
				"summary":"CVE-2024-36974",
				"category":"self",
				"url":"https://www.openeuler.org/en/security/cve/detail/?cveId=CVE-2024-36974&packageName=kernel"
			},
			{
				"summary":"CVE-2024-37356",
				"category":"self",
				"url":"https://www.openeuler.org/en/security/cve/detail/?cveId=CVE-2024-37356&packageName=kernel"
			},
			{
				"summary":"CVE-2024-38538",
				"category":"self",
				"url":"https://www.openeuler.org/en/security/cve/detail/?cveId=CVE-2024-38538&packageName=kernel"
			},
			{
				"summary":"CVE-2024-38541",
				"category":"self",
				"url":"https://www.openeuler.org/en/security/cve/detail/?cveId=CVE-2024-38541&packageName=kernel"
			},
			{
				"summary":"CVE-2024-38549",
				"category":"self",
				"url":"https://www.openeuler.org/en/security/cve/detail/?cveId=CVE-2024-38549&packageName=kernel"
			},
			{
				"summary":"CVE-2024-38553",
				"category":"self",
				"url":"https://www.openeuler.org/en/security/cve/detail/?cveId=CVE-2024-38553&packageName=kernel"
			},
			{
				"summary":"CVE-2024-38555",
				"category":"self",
				"url":"https://www.openeuler.org/en/security/cve/detail/?cveId=CVE-2024-38555&packageName=kernel"
			},
			{
				"summary":"CVE-2024-38556",
				"category":"self",
				"url":"https://www.openeuler.org/en/security/cve/detail/?cveId=CVE-2024-38556&packageName=kernel"
			},
			{
				"summary":"CVE-2024-38564",
				"category":"self",
				"url":"https://www.openeuler.org/en/security/cve/detail/?cveId=CVE-2024-38564&packageName=kernel"
			},
			{
				"summary":"CVE-2024-38587",
				"category":"self",
				"url":"https://www.openeuler.org/en/security/cve/detail/?cveId=CVE-2024-38587&packageName=kernel"
			},
			{
				"summary":"CVE-2024-38599",
				"category":"self",
				"url":"https://www.openeuler.org/en/security/cve/detail/?cveId=CVE-2024-38599&packageName=kernel"
			},
			{
				"summary":"CVE-2024-38624",
				"category":"self",
				"url":"https://www.openeuler.org/en/security/cve/detail/?cveId=CVE-2024-38624&packageName=kernel"
			},
			{
				"summary":"CVE-2024-38630",
				"category":"self",
				"url":"https://www.openeuler.org/en/security/cve/detail/?cveId=CVE-2024-38630&packageName=kernel"
			},
			{
				"summary":"CVE-2024-38661",
				"category":"self",
				"url":"https://www.openeuler.org/en/security/cve/detail/?cveId=CVE-2024-38661&packageName=kernel"
			},
			{
				"summary":"CVE-2024-39292",
				"category":"self",
				"url":"https://www.openeuler.org/en/security/cve/detail/?cveId=CVE-2024-39292&packageName=kernel"
			},
			{
				"summary":"nvd cve",
				"category":"external",
				"url":"https://nvd.nist.gov/vuln/detail/CVE-2024-27405"
			},
			{
				"summary":"nvd cve",
				"category":"external",
				"url":"https://nvd.nist.gov/vuln/detail/CVE-2024-27417"
			},
			{
				"summary":"nvd cve",
				"category":"external",
				"url":"https://nvd.nist.gov/vuln/detail/CVE-2024-35899"
			},
			{
				"summary":"nvd cve",
				"category":"external",
				"url":"https://nvd.nist.gov/vuln/detail/CVE-2024-35947"
			},
			{
				"summary":"nvd cve",
				"category":"external",
				"url":"https://nvd.nist.gov/vuln/detail/CVE-2024-36974"
			},
			{
				"summary":"nvd cve",
				"category":"external",
				"url":"https://nvd.nist.gov/vuln/detail/CVE-2024-37356"
			},
			{
				"summary":"nvd cve",
				"category":"external",
				"url":"https://nvd.nist.gov/vuln/detail/CVE-2024-38538"
			},
			{
				"summary":"nvd cve",
				"category":"external",
				"url":"https://nvd.nist.gov/vuln/detail/CVE-2024-38541"
			},
			{
				"summary":"nvd cve",
				"category":"external",
				"url":"https://nvd.nist.gov/vuln/detail/CVE-2024-38549"
			},
			{
				"summary":"nvd cve",
				"category":"external",
				"url":"https://nvd.nist.gov/vuln/detail/CVE-2024-38553"
			},
			{
				"summary":"nvd cve",
				"category":"external",
				"url":"https://nvd.nist.gov/vuln/detail/CVE-2024-38555"
			},
			{
				"summary":"nvd cve",
				"category":"external",
				"url":"https://nvd.nist.gov/vuln/detail/CVE-2024-38556"
			},
			{
				"summary":"nvd cve",
				"category":"external",
				"url":"https://nvd.nist.gov/vuln/detail/CVE-2024-38564"
			},
			{
				"summary":"nvd cve",
				"category":"external",
				"url":"https://nvd.nist.gov/vuln/detail/CVE-2024-38587"
			},
			{
				"summary":"nvd cve",
				"category":"external",
				"url":"https://nvd.nist.gov/vuln/detail/CVE-2024-38599"
			},
			{
				"summary":"nvd cve",
				"category":"external",
				"url":"https://nvd.nist.gov/vuln/detail/CVE-2024-38624"
			},
			{
				"summary":"nvd cve",
				"category":"external",
				"url":"https://nvd.nist.gov/vuln/detail/CVE-2024-38630"
			},
			{
				"summary":"nvd cve",
				"category":"external",
				"url":"https://nvd.nist.gov/vuln/detail/CVE-2024-38661"
			},
			{
				"summary":"nvd cve",
				"category":"external",
				"url":"https://nvd.nist.gov/vuln/detail/CVE-2024-39292"
			},
			{
				"summary":"openEuler-SA-2024-1792 vex file",
				"category":"self",
				"url":"https://repo.openeuler.org/security/data/csaf/advisories/2024/csaf-openeuler-sa-2024-1792.json"
			}
		],
		"title":"An update for kernel is now available for openEuler-22.03-LTS-SP3",
		"tracking":{
			"initial_release_date":"2024-07-05T09:21:12+08:00",
			"revision_history":[
				{
					"date":"2024-07-05T09:21:12+08:00",
					"summary":"Initial",
					"number":"1.0.0"
				},
				{
					"date":"2024-10-31T09:21:12+08:00",
					"summary":"final",
					"number":"2.0.0"
				}
			],
			"generator":{
				"date":"2024-10-31T09:21:12+08:00",
				"engine":{
					"name":"openEuler CSAF Tool V1.0"
				}
			},
			"current_release_date":"2024-10-31T09:21:12+08:00",
			"id":"openEuler-SA-2024-1792",
			"version":"2.0.0",
			"status":"final"
		}
	},
	"product_tree":{
		"branches":[
			{
				"name":"openEuler",
				"category":"vendor",
				"branches":[
					{
						"name":"openEuler",
						"branches":[
							{
								"product":{
									"product_identification_helper":{
										"cpe":"cpe:/a:openEuler:openEuler:22.03-LTS-SP3"
									},
									"product_id":"openEuler-22.03-LTS-SP3",
									"name":"openEuler-22.03-LTS-SP3"
								},
								"name":"openEuler-22.03-LTS-SP3",
								"category":"product_version"
							}
						],
						"category":"product_name"
					},
					{
						"name":"x86_64",
						"branches":[
							{
								"product":{
									"product_identification_helper":{
										"cpe":"cpe:/a:openEuler:openEuler:22.03-LTS-SP3"
									},
									"product_id":"kernel-5.10.0-217.0.0.120.oe2203sp3.x86_64.rpm",
									"name":"kernel-5.10.0-217.0.0.120.oe2203sp3.x86_64.rpm"
								},
								"name":"kernel-5.10.0-217.0.0.120.oe2203sp3.x86_64.rpm",
								"category":"product_version"
							},
							{
								"product":{
									"product_identification_helper":{
										"cpe":"cpe:/a:openEuler:openEuler:22.03-LTS-SP3"
									},
									"product_id":"kernel-debuginfo-5.10.0-217.0.0.120.oe2203sp3.x86_64.rpm",
									"name":"kernel-debuginfo-5.10.0-217.0.0.120.oe2203sp3.x86_64.rpm"
								},
								"name":"kernel-debuginfo-5.10.0-217.0.0.120.oe2203sp3.x86_64.rpm",
								"category":"product_version"
							},
							{
								"product":{
									"product_identification_helper":{
										"cpe":"cpe:/a:openEuler:openEuler:22.03-LTS-SP3"
									},
									"product_id":"kernel-debugsource-5.10.0-217.0.0.120.oe2203sp3.x86_64.rpm",
									"name":"kernel-debugsource-5.10.0-217.0.0.120.oe2203sp3.x86_64.rpm"
								},
								"name":"kernel-debugsource-5.10.0-217.0.0.120.oe2203sp3.x86_64.rpm",
								"category":"product_version"
							},
							{
								"product":{
									"product_identification_helper":{
										"cpe":"cpe:/a:openEuler:openEuler:22.03-LTS-SP3"
									},
									"product_id":"kernel-devel-5.10.0-217.0.0.120.oe2203sp3.x86_64.rpm",
									"name":"kernel-devel-5.10.0-217.0.0.120.oe2203sp3.x86_64.rpm"
								},
								"name":"kernel-devel-5.10.0-217.0.0.120.oe2203sp3.x86_64.rpm",
								"category":"product_version"
							},
							{
								"product":{
									"product_identification_helper":{
										"cpe":"cpe:/a:openEuler:openEuler:22.03-LTS-SP3"
									},
									"product_id":"kernel-headers-5.10.0-217.0.0.120.oe2203sp3.x86_64.rpm",
									"name":"kernel-headers-5.10.0-217.0.0.120.oe2203sp3.x86_64.rpm"
								},
								"name":"kernel-headers-5.10.0-217.0.0.120.oe2203sp3.x86_64.rpm",
								"category":"product_version"
							},
							{
								"product":{
									"product_identification_helper":{
										"cpe":"cpe:/a:openEuler:openEuler:22.03-LTS-SP3"
									},
									"product_id":"kernel-source-5.10.0-217.0.0.120.oe2203sp3.x86_64.rpm",
									"name":"kernel-source-5.10.0-217.0.0.120.oe2203sp3.x86_64.rpm"
								},
								"name":"kernel-source-5.10.0-217.0.0.120.oe2203sp3.x86_64.rpm",
								"category":"product_version"
							},
							{
								"product":{
									"product_identification_helper":{
										"cpe":"cpe:/a:openEuler:openEuler:22.03-LTS-SP3"
									},
									"product_id":"kernel-tools-5.10.0-217.0.0.120.oe2203sp3.x86_64.rpm",
									"name":"kernel-tools-5.10.0-217.0.0.120.oe2203sp3.x86_64.rpm"
								},
								"name":"kernel-tools-5.10.0-217.0.0.120.oe2203sp3.x86_64.rpm",
								"category":"product_version"
							},
							{
								"product":{
									"product_identification_helper":{
										"cpe":"cpe:/a:openEuler:openEuler:22.03-LTS-SP3"
									},
									"product_id":"kernel-tools-debuginfo-5.10.0-217.0.0.120.oe2203sp3.x86_64.rpm",
									"name":"kernel-tools-debuginfo-5.10.0-217.0.0.120.oe2203sp3.x86_64.rpm"
								},
								"name":"kernel-tools-debuginfo-5.10.0-217.0.0.120.oe2203sp3.x86_64.rpm",
								"category":"product_version"
							},
							{
								"product":{
									"product_identification_helper":{
										"cpe":"cpe:/a:openEuler:openEuler:22.03-LTS-SP3"
									},
									"product_id":"kernel-tools-devel-5.10.0-217.0.0.120.oe2203sp3.x86_64.rpm",
									"name":"kernel-tools-devel-5.10.0-217.0.0.120.oe2203sp3.x86_64.rpm"
								},
								"name":"kernel-tools-devel-5.10.0-217.0.0.120.oe2203sp3.x86_64.rpm",
								"category":"product_version"
							},
							{
								"product":{
									"product_identification_helper":{
										"cpe":"cpe:/a:openEuler:openEuler:22.03-LTS-SP3"
									},
									"product_id":"perf-5.10.0-217.0.0.120.oe2203sp3.x86_64.rpm",
									"name":"perf-5.10.0-217.0.0.120.oe2203sp3.x86_64.rpm"
								},
								"name":"perf-5.10.0-217.0.0.120.oe2203sp3.x86_64.rpm",
								"category":"product_version"
							},
							{
								"product":{
									"product_identification_helper":{
										"cpe":"cpe:/a:openEuler:openEuler:22.03-LTS-SP3"
									},
									"product_id":"perf-debuginfo-5.10.0-217.0.0.120.oe2203sp3.x86_64.rpm",
									"name":"perf-debuginfo-5.10.0-217.0.0.120.oe2203sp3.x86_64.rpm"
								},
								"name":"perf-debuginfo-5.10.0-217.0.0.120.oe2203sp3.x86_64.rpm",
								"category":"product_version"
							},
							{
								"product":{
									"product_identification_helper":{
										"cpe":"cpe:/a:openEuler:openEuler:22.03-LTS-SP3"
									},
									"product_id":"python3-perf-5.10.0-217.0.0.120.oe2203sp3.x86_64.rpm",
									"name":"python3-perf-5.10.0-217.0.0.120.oe2203sp3.x86_64.rpm"
								},
								"name":"python3-perf-5.10.0-217.0.0.120.oe2203sp3.x86_64.rpm",
								"category":"product_version"
							},
							{
								"product":{
									"product_identification_helper":{
										"cpe":"cpe:/a:openEuler:openEuler:22.03-LTS-SP3"
									},
									"product_id":"python3-perf-debuginfo-5.10.0-217.0.0.120.oe2203sp3.x86_64.rpm",
									"name":"python3-perf-debuginfo-5.10.0-217.0.0.120.oe2203sp3.x86_64.rpm"
								},
								"name":"python3-perf-debuginfo-5.10.0-217.0.0.120.oe2203sp3.x86_64.rpm",
								"category":"product_version"
							}
						],
						"category":"architecture"
					},
					{
						"name":"aarch64",
						"branches":[
							{
								"product":{
									"product_identification_helper":{
										"cpe":"cpe:/a:openEuler:openEuler:22.03-LTS-SP3"
									},
									"product_id":"kernel-5.10.0-217.0.0.120.oe2203sp3.aarch64.rpm",
									"name":"kernel-5.10.0-217.0.0.120.oe2203sp3.aarch64.rpm"
								},
								"name":"kernel-5.10.0-217.0.0.120.oe2203sp3.aarch64.rpm",
								"category":"product_version"
							},
							{
								"product":{
									"product_identification_helper":{
										"cpe":"cpe:/a:openEuler:openEuler:22.03-LTS-SP3"
									},
									"product_id":"kernel-debuginfo-5.10.0-217.0.0.120.oe2203sp3.aarch64.rpm",
									"name":"kernel-debuginfo-5.10.0-217.0.0.120.oe2203sp3.aarch64.rpm"
								},
								"name":"kernel-debuginfo-5.10.0-217.0.0.120.oe2203sp3.aarch64.rpm",
								"category":"product_version"
							},
							{
								"product":{
									"product_identification_helper":{
										"cpe":"cpe:/a:openEuler:openEuler:22.03-LTS-SP3"
									},
									"product_id":"kernel-debugsource-5.10.0-217.0.0.120.oe2203sp3.aarch64.rpm",
									"name":"kernel-debugsource-5.10.0-217.0.0.120.oe2203sp3.aarch64.rpm"
								},
								"name":"kernel-debugsource-5.10.0-217.0.0.120.oe2203sp3.aarch64.rpm",
								"category":"product_version"
							},
							{
								"product":{
									"product_identification_helper":{
										"cpe":"cpe:/a:openEuler:openEuler:22.03-LTS-SP3"
									},
									"product_id":"kernel-devel-5.10.0-217.0.0.120.oe2203sp3.aarch64.rpm",
									"name":"kernel-devel-5.10.0-217.0.0.120.oe2203sp3.aarch64.rpm"
								},
								"name":"kernel-devel-5.10.0-217.0.0.120.oe2203sp3.aarch64.rpm",
								"category":"product_version"
							},
							{
								"product":{
									"product_identification_helper":{
										"cpe":"cpe:/a:openEuler:openEuler:22.03-LTS-SP3"
									},
									"product_id":"kernel-headers-5.10.0-217.0.0.120.oe2203sp3.aarch64.rpm",
									"name":"kernel-headers-5.10.0-217.0.0.120.oe2203sp3.aarch64.rpm"
								},
								"name":"kernel-headers-5.10.0-217.0.0.120.oe2203sp3.aarch64.rpm",
								"category":"product_version"
							},
							{
								"product":{
									"product_identification_helper":{
										"cpe":"cpe:/a:openEuler:openEuler:22.03-LTS-SP3"
									},
									"product_id":"kernel-source-5.10.0-217.0.0.120.oe2203sp3.aarch64.rpm",
									"name":"kernel-source-5.10.0-217.0.0.120.oe2203sp3.aarch64.rpm"
								},
								"name":"kernel-source-5.10.0-217.0.0.120.oe2203sp3.aarch64.rpm",
								"category":"product_version"
							},
							{
								"product":{
									"product_identification_helper":{
										"cpe":"cpe:/a:openEuler:openEuler:22.03-LTS-SP3"
									},
									"product_id":"kernel-tools-5.10.0-217.0.0.120.oe2203sp3.aarch64.rpm",
									"name":"kernel-tools-5.10.0-217.0.0.120.oe2203sp3.aarch64.rpm"
								},
								"name":"kernel-tools-5.10.0-217.0.0.120.oe2203sp3.aarch64.rpm",
								"category":"product_version"
							},
							{
								"product":{
									"product_identification_helper":{
										"cpe":"cpe:/a:openEuler:openEuler:22.03-LTS-SP3"
									},
									"product_id":"kernel-tools-debuginfo-5.10.0-217.0.0.120.oe2203sp3.aarch64.rpm",
									"name":"kernel-tools-debuginfo-5.10.0-217.0.0.120.oe2203sp3.aarch64.rpm"
								},
								"name":"kernel-tools-debuginfo-5.10.0-217.0.0.120.oe2203sp3.aarch64.rpm",
								"category":"product_version"
							},
							{
								"product":{
									"product_identification_helper":{
										"cpe":"cpe:/a:openEuler:openEuler:22.03-LTS-SP3"
									},
									"product_id":"kernel-tools-devel-5.10.0-217.0.0.120.oe2203sp3.aarch64.rpm",
									"name":"kernel-tools-devel-5.10.0-217.0.0.120.oe2203sp3.aarch64.rpm"
								},
								"name":"kernel-tools-devel-5.10.0-217.0.0.120.oe2203sp3.aarch64.rpm",
								"category":"product_version"
							},
							{
								"product":{
									"product_identification_helper":{
										"cpe":"cpe:/a:openEuler:openEuler:22.03-LTS-SP3"
									},
									"product_id":"perf-5.10.0-217.0.0.120.oe2203sp3.aarch64.rpm",
									"name":"perf-5.10.0-217.0.0.120.oe2203sp3.aarch64.rpm"
								},
								"name":"perf-5.10.0-217.0.0.120.oe2203sp3.aarch64.rpm",
								"category":"product_version"
							},
							{
								"product":{
									"product_identification_helper":{
										"cpe":"cpe:/a:openEuler:openEuler:22.03-LTS-SP3"
									},
									"product_id":"perf-debuginfo-5.10.0-217.0.0.120.oe2203sp3.aarch64.rpm",
									"name":"perf-debuginfo-5.10.0-217.0.0.120.oe2203sp3.aarch64.rpm"
								},
								"name":"perf-debuginfo-5.10.0-217.0.0.120.oe2203sp3.aarch64.rpm",
								"category":"product_version"
							},
							{
								"product":{
									"product_identification_helper":{
										"cpe":"cpe:/a:openEuler:openEuler:22.03-LTS-SP3"
									},
									"product_id":"python3-perf-5.10.0-217.0.0.120.oe2203sp3.aarch64.rpm",
									"name":"python3-perf-5.10.0-217.0.0.120.oe2203sp3.aarch64.rpm"
								},
								"name":"python3-perf-5.10.0-217.0.0.120.oe2203sp3.aarch64.rpm",
								"category":"product_version"
							},
							{
								"product":{
									"product_identification_helper":{
										"cpe":"cpe:/a:openEuler:openEuler:22.03-LTS-SP3"
									},
									"product_id":"python3-perf-debuginfo-5.10.0-217.0.0.120.oe2203sp3.aarch64.rpm",
									"name":"python3-perf-debuginfo-5.10.0-217.0.0.120.oe2203sp3.aarch64.rpm"
								},
								"name":"python3-perf-debuginfo-5.10.0-217.0.0.120.oe2203sp3.aarch64.rpm",
								"category":"product_version"
							}
						],
						"category":"architecture"
					},
					{
						"name":"src",
						"branches":[
							{
								"product":{
									"product_identification_helper":{
										"cpe":"cpe:/a:openEuler:openEuler:22.03-LTS-SP3"
									},
									"product_id":"kernel-5.10.0-217.0.0.120.oe2203sp3.src.rpm",
									"name":"kernel-5.10.0-217.0.0.120.oe2203sp3.src.rpm"
								},
								"name":"kernel-5.10.0-217.0.0.120.oe2203sp3.src.rpm",
								"category":"product_version"
							}
						],
						"category":"architecture"
					}
				]
			}
		],
		"relationships":[
			{
				"relates_to_product_reference":"openEuler-22.03-LTS-SP3",
				"product_reference":"kernel-5.10.0-217.0.0.120.oe2203sp3.x86_64.rpm",
				"full_product_name":{
					"product_id":"openEuler-22.03-LTS-SP3:kernel-5.10.0-217.0.0.120.oe2203sp3.x86_64",
					"name":"kernel-5.10.0-217.0.0.120.oe2203sp3.x86_64 as a component of openEuler-22.03-LTS-SP3"
				},
				"category":"default_component_of"
			},
			{
				"relates_to_product_reference":"openEuler-22.03-LTS-SP3",
				"product_reference":"kernel-debuginfo-5.10.0-217.0.0.120.oe2203sp3.x86_64.rpm",
				"full_product_name":{
					"product_id":"openEuler-22.03-LTS-SP3:kernel-debuginfo-5.10.0-217.0.0.120.oe2203sp3.x86_64",
					"name":"kernel-debuginfo-5.10.0-217.0.0.120.oe2203sp3.x86_64 as a component of openEuler-22.03-LTS-SP3"
				},
				"category":"default_component_of"
			},
			{
				"relates_to_product_reference":"openEuler-22.03-LTS-SP3",
				"product_reference":"kernel-debugsource-5.10.0-217.0.0.120.oe2203sp3.x86_64.rpm",
				"full_product_name":{
					"product_id":"openEuler-22.03-LTS-SP3:kernel-debugsource-5.10.0-217.0.0.120.oe2203sp3.x86_64",
					"name":"kernel-debugsource-5.10.0-217.0.0.120.oe2203sp3.x86_64 as a component of openEuler-22.03-LTS-SP3"
				},
				"category":"default_component_of"
			},
			{
				"relates_to_product_reference":"openEuler-22.03-LTS-SP3",
				"product_reference":"kernel-devel-5.10.0-217.0.0.120.oe2203sp3.x86_64.rpm",
				"full_product_name":{
					"product_id":"openEuler-22.03-LTS-SP3:kernel-devel-5.10.0-217.0.0.120.oe2203sp3.x86_64",
					"name":"kernel-devel-5.10.0-217.0.0.120.oe2203sp3.x86_64 as a component of openEuler-22.03-LTS-SP3"
				},
				"category":"default_component_of"
			},
			{
				"relates_to_product_reference":"openEuler-22.03-LTS-SP3",
				"product_reference":"kernel-headers-5.10.0-217.0.0.120.oe2203sp3.x86_64.rpm",
				"full_product_name":{
					"product_id":"openEuler-22.03-LTS-SP3:kernel-headers-5.10.0-217.0.0.120.oe2203sp3.x86_64",
					"name":"kernel-headers-5.10.0-217.0.0.120.oe2203sp3.x86_64 as a component of openEuler-22.03-LTS-SP3"
				},
				"category":"default_component_of"
			},
			{
				"relates_to_product_reference":"openEuler-22.03-LTS-SP3",
				"product_reference":"kernel-source-5.10.0-217.0.0.120.oe2203sp3.x86_64.rpm",
				"full_product_name":{
					"product_id":"openEuler-22.03-LTS-SP3:kernel-source-5.10.0-217.0.0.120.oe2203sp3.x86_64",
					"name":"kernel-source-5.10.0-217.0.0.120.oe2203sp3.x86_64 as a component of openEuler-22.03-LTS-SP3"
				},
				"category":"default_component_of"
			},
			{
				"relates_to_product_reference":"openEuler-22.03-LTS-SP3",
				"product_reference":"kernel-tools-5.10.0-217.0.0.120.oe2203sp3.x86_64.rpm",
				"full_product_name":{
					"product_id":"openEuler-22.03-LTS-SP3:kernel-tools-5.10.0-217.0.0.120.oe2203sp3.x86_64",
					"name":"kernel-tools-5.10.0-217.0.0.120.oe2203sp3.x86_64 as a component of openEuler-22.03-LTS-SP3"
				},
				"category":"default_component_of"
			},
			{
				"relates_to_product_reference":"openEuler-22.03-LTS-SP3",
				"product_reference":"kernel-tools-debuginfo-5.10.0-217.0.0.120.oe2203sp3.x86_64.rpm",
				"full_product_name":{
					"product_id":"openEuler-22.03-LTS-SP3:kernel-tools-debuginfo-5.10.0-217.0.0.120.oe2203sp3.x86_64",
					"name":"kernel-tools-debuginfo-5.10.0-217.0.0.120.oe2203sp3.x86_64 as a component of openEuler-22.03-LTS-SP3"
				},
				"category":"default_component_of"
			},
			{
				"relates_to_product_reference":"openEuler-22.03-LTS-SP3",
				"product_reference":"kernel-tools-devel-5.10.0-217.0.0.120.oe2203sp3.x86_64.rpm",
				"full_product_name":{
					"product_id":"openEuler-22.03-LTS-SP3:kernel-tools-devel-5.10.0-217.0.0.120.oe2203sp3.x86_64",
					"name":"kernel-tools-devel-5.10.0-217.0.0.120.oe2203sp3.x86_64 as a component of openEuler-22.03-LTS-SP3"
				},
				"category":"default_component_of"
			},
			{
				"relates_to_product_reference":"openEuler-22.03-LTS-SP3",
				"product_reference":"perf-5.10.0-217.0.0.120.oe2203sp3.x86_64.rpm",
				"full_product_name":{
					"product_id":"openEuler-22.03-LTS-SP3:perf-5.10.0-217.0.0.120.oe2203sp3.x86_64",
					"name":"perf-5.10.0-217.0.0.120.oe2203sp3.x86_64 as a component of openEuler-22.03-LTS-SP3"
				},
				"category":"default_component_of"
			},
			{
				"relates_to_product_reference":"openEuler-22.03-LTS-SP3",
				"product_reference":"perf-debuginfo-5.10.0-217.0.0.120.oe2203sp3.x86_64.rpm",
				"full_product_name":{
					"product_id":"openEuler-22.03-LTS-SP3:perf-debuginfo-5.10.0-217.0.0.120.oe2203sp3.x86_64",
					"name":"perf-debuginfo-5.10.0-217.0.0.120.oe2203sp3.x86_64 as a component of openEuler-22.03-LTS-SP3"
				},
				"category":"default_component_of"
			},
			{
				"relates_to_product_reference":"openEuler-22.03-LTS-SP3",
				"product_reference":"python3-perf-5.10.0-217.0.0.120.oe2203sp3.x86_64.rpm",
				"full_product_name":{
					"product_id":"openEuler-22.03-LTS-SP3:python3-perf-5.10.0-217.0.0.120.oe2203sp3.x86_64",
					"name":"python3-perf-5.10.0-217.0.0.120.oe2203sp3.x86_64 as a component of openEuler-22.03-LTS-SP3"
				},
				"category":"default_component_of"
			},
			{
				"relates_to_product_reference":"openEuler-22.03-LTS-SP3",
				"product_reference":"python3-perf-debuginfo-5.10.0-217.0.0.120.oe2203sp3.x86_64.rpm",
				"full_product_name":{
					"product_id":"openEuler-22.03-LTS-SP3:python3-perf-debuginfo-5.10.0-217.0.0.120.oe2203sp3.x86_64",
					"name":"python3-perf-debuginfo-5.10.0-217.0.0.120.oe2203sp3.x86_64 as a component of openEuler-22.03-LTS-SP3"
				},
				"category":"default_component_of"
			},
			{
				"relates_to_product_reference":"openEuler-22.03-LTS-SP3",
				"product_reference":"kernel-5.10.0-217.0.0.120.oe2203sp3.aarch64.rpm",
				"full_product_name":{
					"product_id":"openEuler-22.03-LTS-SP3:kernel-5.10.0-217.0.0.120.oe2203sp3.aarch64",
					"name":"kernel-5.10.0-217.0.0.120.oe2203sp3.aarch64 as a component of openEuler-22.03-LTS-SP3"
				},
				"category":"default_component_of"
			},
			{
				"relates_to_product_reference":"openEuler-22.03-LTS-SP3",
				"product_reference":"kernel-debuginfo-5.10.0-217.0.0.120.oe2203sp3.aarch64.rpm",
				"full_product_name":{
					"product_id":"openEuler-22.03-LTS-SP3:kernel-debuginfo-5.10.0-217.0.0.120.oe2203sp3.aarch64",
					"name":"kernel-debuginfo-5.10.0-217.0.0.120.oe2203sp3.aarch64 as a component of openEuler-22.03-LTS-SP3"
				},
				"category":"default_component_of"
			},
			{
				"relates_to_product_reference":"openEuler-22.03-LTS-SP3",
				"product_reference":"kernel-debugsource-5.10.0-217.0.0.120.oe2203sp3.aarch64.rpm",
				"full_product_name":{
					"product_id":"openEuler-22.03-LTS-SP3:kernel-debugsource-5.10.0-217.0.0.120.oe2203sp3.aarch64",
					"name":"kernel-debugsource-5.10.0-217.0.0.120.oe2203sp3.aarch64 as a component of openEuler-22.03-LTS-SP3"
				},
				"category":"default_component_of"
			},
			{
				"relates_to_product_reference":"openEuler-22.03-LTS-SP3",
				"product_reference":"kernel-devel-5.10.0-217.0.0.120.oe2203sp3.aarch64.rpm",
				"full_product_name":{
					"product_id":"openEuler-22.03-LTS-SP3:kernel-devel-5.10.0-217.0.0.120.oe2203sp3.aarch64",
					"name":"kernel-devel-5.10.0-217.0.0.120.oe2203sp3.aarch64 as a component of openEuler-22.03-LTS-SP3"
				},
				"category":"default_component_of"
			},
			{
				"relates_to_product_reference":"openEuler-22.03-LTS-SP3",
				"product_reference":"kernel-headers-5.10.0-217.0.0.120.oe2203sp3.aarch64.rpm",
				"full_product_name":{
					"product_id":"openEuler-22.03-LTS-SP3:kernel-headers-5.10.0-217.0.0.120.oe2203sp3.aarch64",
					"name":"kernel-headers-5.10.0-217.0.0.120.oe2203sp3.aarch64 as a component of openEuler-22.03-LTS-SP3"
				},
				"category":"default_component_of"
			},
			{
				"relates_to_product_reference":"openEuler-22.03-LTS-SP3",
				"product_reference":"kernel-source-5.10.0-217.0.0.120.oe2203sp3.aarch64.rpm",
				"full_product_name":{
					"product_id":"openEuler-22.03-LTS-SP3:kernel-source-5.10.0-217.0.0.120.oe2203sp3.aarch64",
					"name":"kernel-source-5.10.0-217.0.0.120.oe2203sp3.aarch64 as a component of openEuler-22.03-LTS-SP3"
				},
				"category":"default_component_of"
			},
			{
				"relates_to_product_reference":"openEuler-22.03-LTS-SP3",
				"product_reference":"kernel-tools-5.10.0-217.0.0.120.oe2203sp3.aarch64.rpm",
				"full_product_name":{
					"product_id":"openEuler-22.03-LTS-SP3:kernel-tools-5.10.0-217.0.0.120.oe2203sp3.aarch64",
					"name":"kernel-tools-5.10.0-217.0.0.120.oe2203sp3.aarch64 as a component of openEuler-22.03-LTS-SP3"
				},
				"category":"default_component_of"
			},
			{
				"relates_to_product_reference":"openEuler-22.03-LTS-SP3",
				"product_reference":"kernel-tools-debuginfo-5.10.0-217.0.0.120.oe2203sp3.aarch64.rpm",
				"full_product_name":{
					"product_id":"openEuler-22.03-LTS-SP3:kernel-tools-debuginfo-5.10.0-217.0.0.120.oe2203sp3.aarch64",
					"name":"kernel-tools-debuginfo-5.10.0-217.0.0.120.oe2203sp3.aarch64 as a component of openEuler-22.03-LTS-SP3"
				},
				"category":"default_component_of"
			},
			{
				"relates_to_product_reference":"openEuler-22.03-LTS-SP3",
				"product_reference":"kernel-tools-devel-5.10.0-217.0.0.120.oe2203sp3.aarch64.rpm",
				"full_product_name":{
					"product_id":"openEuler-22.03-LTS-SP3:kernel-tools-devel-5.10.0-217.0.0.120.oe2203sp3.aarch64",
					"name":"kernel-tools-devel-5.10.0-217.0.0.120.oe2203sp3.aarch64 as a component of openEuler-22.03-LTS-SP3"
				},
				"category":"default_component_of"
			},
			{
				"relates_to_product_reference":"openEuler-22.03-LTS-SP3",
				"product_reference":"perf-5.10.0-217.0.0.120.oe2203sp3.aarch64.rpm",
				"full_product_name":{
					"product_id":"openEuler-22.03-LTS-SP3:perf-5.10.0-217.0.0.120.oe2203sp3.aarch64",
					"name":"perf-5.10.0-217.0.0.120.oe2203sp3.aarch64 as a component of openEuler-22.03-LTS-SP3"
				},
				"category":"default_component_of"
			},
			{
				"relates_to_product_reference":"openEuler-22.03-LTS-SP3",
				"product_reference":"perf-debuginfo-5.10.0-217.0.0.120.oe2203sp3.aarch64.rpm",
				"full_product_name":{
					"product_id":"openEuler-22.03-LTS-SP3:perf-debuginfo-5.10.0-217.0.0.120.oe2203sp3.aarch64",
					"name":"perf-debuginfo-5.10.0-217.0.0.120.oe2203sp3.aarch64 as a component of openEuler-22.03-LTS-SP3"
				},
				"category":"default_component_of"
			},
			{
				"relates_to_product_reference":"openEuler-22.03-LTS-SP3",
				"product_reference":"python3-perf-5.10.0-217.0.0.120.oe2203sp3.aarch64.rpm",
				"full_product_name":{
					"product_id":"openEuler-22.03-LTS-SP3:python3-perf-5.10.0-217.0.0.120.oe2203sp3.aarch64",
					"name":"python3-perf-5.10.0-217.0.0.120.oe2203sp3.aarch64 as a component of openEuler-22.03-LTS-SP3"
				},
				"category":"default_component_of"
			},
			{
				"relates_to_product_reference":"openEuler-22.03-LTS-SP3",
				"product_reference":"python3-perf-debuginfo-5.10.0-217.0.0.120.oe2203sp3.aarch64.rpm",
				"full_product_name":{
					"product_id":"openEuler-22.03-LTS-SP3:python3-perf-debuginfo-5.10.0-217.0.0.120.oe2203sp3.aarch64",
					"name":"python3-perf-debuginfo-5.10.0-217.0.0.120.oe2203sp3.aarch64 as a component of openEuler-22.03-LTS-SP3"
				},
				"category":"default_component_of"
			},
			{
				"relates_to_product_reference":"openEuler-22.03-LTS-SP3",
				"product_reference":"kernel-5.10.0-217.0.0.120.oe2203sp3.src.rpm",
				"full_product_name":{
					"product_id":"openEuler-22.03-LTS-SP3:kernel-5.10.0-217.0.0.120.oe2203sp3.src",
					"name":"kernel-5.10.0-217.0.0.120.oe2203sp3.src as a component of openEuler-22.03-LTS-SP3"
				},
				"category":"default_component_of"
			}
		]
	},
	"vulnerabilities":[
		{
			"cve":"CVE-2024-27405",
			"notes":[
				{
					"text":"In the Linux kernel, the following vulnerability has been resolved:\n\nusb: gadget: ncm: Avoid dropping datagrams of properly parsed NTBs\n\nIt is observed sometimes when tethering is used over NCM with Windows 11\nas host, at some instances, the gadget_giveback has one byte appended at\nthe end of a proper NTB. When the NTB is parsed, unwrap call looks for\nany leftover bytes in SKB provided by u_ether and if there are any pending\nbytes, it treats them as a separate NTB and parses it. But in case the\nsecond NTB (as per unwrap call) is faulty/corrupt, all the datagrams that\nwere parsed properly in the first NTB and saved in rx_list are dropped.\n\nAdding a few custom traces showed the following:\n[002] d..1  7828.532866: dwc3_gadget_giveback: ep1out:\nreq 000000003868811a length 1025/16384 zsI ==> 0\n[002] d..1  7828.532867: ncm_unwrap_ntb: K: ncm_unwrap_ntb toprocess: 1025\n[002] d..1  7828.532867: ncm_unwrap_ntb: K: ncm_unwrap_ntb nth: 1751999342\n[002] d..1  7828.532868: ncm_unwrap_ntb: K: ncm_unwrap_ntb seq: 0xce67\n[002] d..1  7828.532868: ncm_unwrap_ntb: K: ncm_unwrap_ntb blk_len: 0x400\n[002] d..1  7828.532868: ncm_unwrap_ntb: K: ncm_unwrap_ntb ndp_len: 0x10\n[002] d..1  7828.532869: ncm_unwrap_ntb: K: Parsed NTB with 1 frames\n\nIn this case, the giveback is of 1025 bytes and block length is 1024.\nThe rest 1 byte (which is 0x00) won't be parsed resulting in drop of\nall datagrams in rx_list.\n\nSame is case with packets of size 2048:\n[002] d..1  7828.557948: dwc3_gadget_giveback: ep1out:\nreq 0000000011dfd96e length 2049/16384 zsI ==> 0\n[002] d..1  7828.557949: ncm_unwrap_ntb: K: ncm_unwrap_ntb nth: 1751999342\n[002] d..1  7828.557950: ncm_unwrap_ntb: K: ncm_unwrap_ntb blk_len: 0x800\n\nLecroy shows one byte coming in extra confirming that the byte is coming\nin from PC:\n\n Transfer 2959 - Bytes Transferred(1025)  Timestamp((18.524 843 590)\n - Transaction 8391 - Data(1025 bytes) Timestamp(18.524 843 590)\n --- Packet 4063861\n       Data(1024 bytes)\n       Duration(2.117us) Idle(14.700ns) Timestamp(18.524 843 590)\n --- Packet 4063863\n       Data(1 byte)\n       Duration(66.160ns) Time(282.000ns) Timestamp(18.524 845 722)\n\nAccording to Windows driver, no ZLP is needed if wBlockLength is non-zero,\nbecause the non-zero wBlockLength has already told the function side the\nsize of transfer to be expected. However, there are in-market NCM devices\nthat rely on ZLP as long as the wBlockLength is multiple of wMaxPacketSize.\nTo deal with such devices, it pads an extra 0 at end so the transfer is no\nlonger multiple of wMaxPacketSize.",
					"category":"description",
					"title":"Vulnerability Description"
				}
			],
			"product_status":{
				"fixed":[
					"openEuler-22.03-LTS-SP3:kernel-5.10.0-217.0.0.120.oe2203sp3.x86_64",
					"openEuler-22.03-LTS-SP3:kernel-debuginfo-5.10.0-217.0.0.120.oe2203sp3.x86_64",
					"openEuler-22.03-LTS-SP3:kernel-debugsource-5.10.0-217.0.0.120.oe2203sp3.x86_64",
					"openEuler-22.03-LTS-SP3:kernel-devel-5.10.0-217.0.0.120.oe2203sp3.x86_64",
					"openEuler-22.03-LTS-SP3:kernel-headers-5.10.0-217.0.0.120.oe2203sp3.x86_64",
					"openEuler-22.03-LTS-SP3:kernel-source-5.10.0-217.0.0.120.oe2203sp3.x86_64",
					"openEuler-22.03-LTS-SP3:kernel-tools-5.10.0-217.0.0.120.oe2203sp3.x86_64",
					"openEuler-22.03-LTS-SP3:kernel-tools-debuginfo-5.10.0-217.0.0.120.oe2203sp3.x86_64",
					"openEuler-22.03-LTS-SP3:kernel-tools-devel-5.10.0-217.0.0.120.oe2203sp3.x86_64",
					"openEuler-22.03-LTS-SP3:perf-5.10.0-217.0.0.120.oe2203sp3.x86_64",
					"openEuler-22.03-LTS-SP3:perf-debuginfo-5.10.0-217.0.0.120.oe2203sp3.x86_64",
					"openEuler-22.03-LTS-SP3:python3-perf-5.10.0-217.0.0.120.oe2203sp3.x86_64",
					"openEuler-22.03-LTS-SP3:python3-perf-debuginfo-5.10.0-217.0.0.120.oe2203sp3.x86_64",
					"openEuler-22.03-LTS-SP3:kernel-5.10.0-217.0.0.120.oe2203sp3.aarch64",
					"openEuler-22.03-LTS-SP3:kernel-debuginfo-5.10.0-217.0.0.120.oe2203sp3.aarch64",
					"openEuler-22.03-LTS-SP3:kernel-debugsource-5.10.0-217.0.0.120.oe2203sp3.aarch64",
					"openEuler-22.03-LTS-SP3:kernel-devel-5.10.0-217.0.0.120.oe2203sp3.aarch64",
					"openEuler-22.03-LTS-SP3:kernel-headers-5.10.0-217.0.0.120.oe2203sp3.aarch64",
					"openEuler-22.03-LTS-SP3:kernel-source-5.10.0-217.0.0.120.oe2203sp3.aarch64",
					"openEuler-22.03-LTS-SP3:kernel-tools-5.10.0-217.0.0.120.oe2203sp3.aarch64",
					"openEuler-22.03-LTS-SP3:kernel-tools-debuginfo-5.10.0-217.0.0.120.oe2203sp3.aarch64",
					"openEuler-22.03-LTS-SP3:kernel-tools-devel-5.10.0-217.0.0.120.oe2203sp3.aarch64",
					"openEuler-22.03-LTS-SP3:perf-5.10.0-217.0.0.120.oe2203sp3.aarch64",
					"openEuler-22.03-LTS-SP3:perf-debuginfo-5.10.0-217.0.0.120.oe2203sp3.aarch64",
					"openEuler-22.03-LTS-SP3:python3-perf-5.10.0-217.0.0.120.oe2203sp3.aarch64",
					"openEuler-22.03-LTS-SP3:python3-perf-debuginfo-5.10.0-217.0.0.120.oe2203sp3.aarch64",
					"openEuler-22.03-LTS-SP3:kernel-5.10.0-217.0.0.120.oe2203sp3.src"
				]
			},
			"remediations":[
				{
					"product_ids":[
						"openEuler-22.03-LTS-SP3:kernel-5.10.0-217.0.0.120.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:kernel-debuginfo-5.10.0-217.0.0.120.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:kernel-debugsource-5.10.0-217.0.0.120.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:kernel-devel-5.10.0-217.0.0.120.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:kernel-headers-5.10.0-217.0.0.120.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:kernel-source-5.10.0-217.0.0.120.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:kernel-tools-5.10.0-217.0.0.120.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:kernel-tools-debuginfo-5.10.0-217.0.0.120.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:kernel-tools-devel-5.10.0-217.0.0.120.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:perf-5.10.0-217.0.0.120.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:perf-debuginfo-5.10.0-217.0.0.120.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:python3-perf-5.10.0-217.0.0.120.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:python3-perf-debuginfo-5.10.0-217.0.0.120.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:kernel-5.10.0-217.0.0.120.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:kernel-debuginfo-5.10.0-217.0.0.120.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:kernel-debugsource-5.10.0-217.0.0.120.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:kernel-devel-5.10.0-217.0.0.120.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:kernel-headers-5.10.0-217.0.0.120.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:kernel-source-5.10.0-217.0.0.120.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:kernel-tools-5.10.0-217.0.0.120.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:kernel-tools-debuginfo-5.10.0-217.0.0.120.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:kernel-tools-devel-5.10.0-217.0.0.120.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:perf-5.10.0-217.0.0.120.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:perf-debuginfo-5.10.0-217.0.0.120.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:python3-perf-5.10.0-217.0.0.120.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:python3-perf-debuginfo-5.10.0-217.0.0.120.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:kernel-5.10.0-217.0.0.120.oe2203sp3.src"
					],
					"details":"kernel security update",
					"category":"vendor_fix",
					"url":"https://www.openeuler.org/zh/security/security-bulletins/detail/?id=openEuler-SA-2024-1792"
				}
			],
			"scores":[
				{
					"cvss_v3":{
						"baseSeverity":"HIGH",
						"baseScore":7.5,
						"vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
						"version":"3.1"
					},
					"products":[
						"openEuler-22.03-LTS-SP3:kernel-5.10.0-217.0.0.120.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:kernel-debuginfo-5.10.0-217.0.0.120.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:kernel-debugsource-5.10.0-217.0.0.120.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:kernel-devel-5.10.0-217.0.0.120.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:kernel-headers-5.10.0-217.0.0.120.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:kernel-source-5.10.0-217.0.0.120.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:kernel-tools-5.10.0-217.0.0.120.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:kernel-tools-debuginfo-5.10.0-217.0.0.120.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:kernel-tools-devel-5.10.0-217.0.0.120.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:perf-5.10.0-217.0.0.120.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:perf-debuginfo-5.10.0-217.0.0.120.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:python3-perf-5.10.0-217.0.0.120.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:python3-perf-debuginfo-5.10.0-217.0.0.120.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:kernel-5.10.0-217.0.0.120.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:kernel-debuginfo-5.10.0-217.0.0.120.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:kernel-debugsource-5.10.0-217.0.0.120.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:kernel-devel-5.10.0-217.0.0.120.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:kernel-headers-5.10.0-217.0.0.120.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:kernel-source-5.10.0-217.0.0.120.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:kernel-tools-5.10.0-217.0.0.120.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:kernel-tools-debuginfo-5.10.0-217.0.0.120.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:kernel-tools-devel-5.10.0-217.0.0.120.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:perf-5.10.0-217.0.0.120.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:perf-debuginfo-5.10.0-217.0.0.120.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:python3-perf-5.10.0-217.0.0.120.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:python3-perf-debuginfo-5.10.0-217.0.0.120.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:kernel-5.10.0-217.0.0.120.oe2203sp3.src"
					]
				}
			],
			"threats":[
				{
					"details":"High",
					"category":"impact"
				}
			],
			"title":"CVE-2024-27405"
		},
		{
			"cve":"CVE-2024-27417",
			"notes":[
				{
					"text":"In the Linux kernel, the following vulnerability has been resolved:\n\nipv6: fix potential \"struct net\" leak in inet6_rtm_getaddr()\n\nIt seems that if userspace provides a correct IFA_TARGET_NETNSID value\nbut no IFA_ADDRESS and IFA_LOCAL attributes, inet6_rtm_getaddr()\nreturns -EINVAL with an elevated \"struct net\" refcount.",
					"category":"description",
					"title":"Vulnerability Description"
				}
			],
			"product_status":{
				"fixed":[
					"openEuler-22.03-LTS-SP3:kernel-5.10.0-217.0.0.120.oe2203sp3.x86_64",
					"openEuler-22.03-LTS-SP3:kernel-debuginfo-5.10.0-217.0.0.120.oe2203sp3.x86_64",
					"openEuler-22.03-LTS-SP3:kernel-debugsource-5.10.0-217.0.0.120.oe2203sp3.x86_64",
					"openEuler-22.03-LTS-SP3:kernel-devel-5.10.0-217.0.0.120.oe2203sp3.x86_64",
					"openEuler-22.03-LTS-SP3:kernel-headers-5.10.0-217.0.0.120.oe2203sp3.x86_64",
					"openEuler-22.03-LTS-SP3:kernel-source-5.10.0-217.0.0.120.oe2203sp3.x86_64",
					"openEuler-22.03-LTS-SP3:kernel-tools-5.10.0-217.0.0.120.oe2203sp3.x86_64",
					"openEuler-22.03-LTS-SP3:kernel-tools-debuginfo-5.10.0-217.0.0.120.oe2203sp3.x86_64",
					"openEuler-22.03-LTS-SP3:kernel-tools-devel-5.10.0-217.0.0.120.oe2203sp3.x86_64",
					"openEuler-22.03-LTS-SP3:perf-5.10.0-217.0.0.120.oe2203sp3.x86_64",
					"openEuler-22.03-LTS-SP3:perf-debuginfo-5.10.0-217.0.0.120.oe2203sp3.x86_64",
					"openEuler-22.03-LTS-SP3:python3-perf-5.10.0-217.0.0.120.oe2203sp3.x86_64",
					"openEuler-22.03-LTS-SP3:python3-perf-debuginfo-5.10.0-217.0.0.120.oe2203sp3.x86_64",
					"openEuler-22.03-LTS-SP3:kernel-5.10.0-217.0.0.120.oe2203sp3.aarch64",
					"openEuler-22.03-LTS-SP3:kernel-debuginfo-5.10.0-217.0.0.120.oe2203sp3.aarch64",
					"openEuler-22.03-LTS-SP3:kernel-debugsource-5.10.0-217.0.0.120.oe2203sp3.aarch64",
					"openEuler-22.03-LTS-SP3:kernel-devel-5.10.0-217.0.0.120.oe2203sp3.aarch64",
					"openEuler-22.03-LTS-SP3:kernel-headers-5.10.0-217.0.0.120.oe2203sp3.aarch64",
					"openEuler-22.03-LTS-SP3:kernel-source-5.10.0-217.0.0.120.oe2203sp3.aarch64",
					"openEuler-22.03-LTS-SP3:kernel-tools-5.10.0-217.0.0.120.oe2203sp3.aarch64",
					"openEuler-22.03-LTS-SP3:kernel-tools-debuginfo-5.10.0-217.0.0.120.oe2203sp3.aarch64",
					"openEuler-22.03-LTS-SP3:kernel-tools-devel-5.10.0-217.0.0.120.oe2203sp3.aarch64",
					"openEuler-22.03-LTS-SP3:perf-5.10.0-217.0.0.120.oe2203sp3.aarch64",
					"openEuler-22.03-LTS-SP3:perf-debuginfo-5.10.0-217.0.0.120.oe2203sp3.aarch64",
					"openEuler-22.03-LTS-SP3:python3-perf-5.10.0-217.0.0.120.oe2203sp3.aarch64",
					"openEuler-22.03-LTS-SP3:python3-perf-debuginfo-5.10.0-217.0.0.120.oe2203sp3.aarch64",
					"openEuler-22.03-LTS-SP3:kernel-5.10.0-217.0.0.120.oe2203sp3.src"
				]
			},
			"remediations":[
				{
					"product_ids":[
						"openEuler-22.03-LTS-SP3:kernel-5.10.0-217.0.0.120.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:kernel-debuginfo-5.10.0-217.0.0.120.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:kernel-debugsource-5.10.0-217.0.0.120.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:kernel-devel-5.10.0-217.0.0.120.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:kernel-headers-5.10.0-217.0.0.120.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:kernel-source-5.10.0-217.0.0.120.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:kernel-tools-5.10.0-217.0.0.120.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:kernel-tools-debuginfo-5.10.0-217.0.0.120.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:kernel-tools-devel-5.10.0-217.0.0.120.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:perf-5.10.0-217.0.0.120.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:perf-debuginfo-5.10.0-217.0.0.120.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:python3-perf-5.10.0-217.0.0.120.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:python3-perf-debuginfo-5.10.0-217.0.0.120.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:kernel-5.10.0-217.0.0.120.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:kernel-debuginfo-5.10.0-217.0.0.120.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:kernel-debugsource-5.10.0-217.0.0.120.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:kernel-devel-5.10.0-217.0.0.120.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:kernel-headers-5.10.0-217.0.0.120.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:kernel-source-5.10.0-217.0.0.120.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:kernel-tools-5.10.0-217.0.0.120.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:kernel-tools-debuginfo-5.10.0-217.0.0.120.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:kernel-tools-devel-5.10.0-217.0.0.120.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:perf-5.10.0-217.0.0.120.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:perf-debuginfo-5.10.0-217.0.0.120.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:python3-perf-5.10.0-217.0.0.120.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:python3-perf-debuginfo-5.10.0-217.0.0.120.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:kernel-5.10.0-217.0.0.120.oe2203sp3.src"
					],
					"details":"kernel security update",
					"category":"vendor_fix",
					"url":"https://www.openeuler.org/zh/security/security-bulletins/detail/?id=openEuler-SA-2024-1792"
				}
			],
			"scores":[
				{
					"cvss_v3":{
						"baseSeverity":"MEDIUM",
						"baseScore":5.5,
						"vectorString":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
						"version":"3.1"
					},
					"products":[
						"openEuler-22.03-LTS-SP3:kernel-5.10.0-217.0.0.120.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:kernel-debuginfo-5.10.0-217.0.0.120.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:kernel-debugsource-5.10.0-217.0.0.120.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:kernel-devel-5.10.0-217.0.0.120.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:kernel-headers-5.10.0-217.0.0.120.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:kernel-source-5.10.0-217.0.0.120.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:kernel-tools-5.10.0-217.0.0.120.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:kernel-tools-debuginfo-5.10.0-217.0.0.120.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:kernel-tools-devel-5.10.0-217.0.0.120.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:perf-5.10.0-217.0.0.120.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:perf-debuginfo-5.10.0-217.0.0.120.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:python3-perf-5.10.0-217.0.0.120.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:python3-perf-debuginfo-5.10.0-217.0.0.120.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:kernel-5.10.0-217.0.0.120.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:kernel-debuginfo-5.10.0-217.0.0.120.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:kernel-debugsource-5.10.0-217.0.0.120.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:kernel-devel-5.10.0-217.0.0.120.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:kernel-headers-5.10.0-217.0.0.120.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:kernel-source-5.10.0-217.0.0.120.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:kernel-tools-5.10.0-217.0.0.120.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:kernel-tools-debuginfo-5.10.0-217.0.0.120.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:kernel-tools-devel-5.10.0-217.0.0.120.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:perf-5.10.0-217.0.0.120.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:perf-debuginfo-5.10.0-217.0.0.120.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:python3-perf-5.10.0-217.0.0.120.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:python3-perf-debuginfo-5.10.0-217.0.0.120.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:kernel-5.10.0-217.0.0.120.oe2203sp3.src"
					]
				}
			],
			"threats":[
				{
					"details":"Medium",
					"category":"impact"
				}
			],
			"title":"CVE-2024-27417"
		},
		{
			"cve":"CVE-2024-35899",
			"notes":[
				{
					"text":"In the Linux kernel, the following vulnerability has been resolved:\n\nnetfilter: nf_tables: flush pending destroy work before exit_net release\n\nSimilar to 2c9f0293280e (\"netfilter: nf_tables: flush pending destroy\nwork before netlink notifier\") to address a race between exit_net and\nthe destroy workqueue.\n\nThe trace below shows an element to be released via destroy workqueue\nwhile exit_net path (triggered via module removal) has already released\nthe set that is used in such transaction.\n\n[ 1360.547789] BUG: KASAN: slab-use-after-free in nf_tables_trans_destroy_work+0x3f5/0x590 [nf_tables]\n[ 1360.547861] Read of size 8 at addr ffff888140500cc0 by task kworker/4:1/152465\n[ 1360.547870] CPU: 4 PID: 152465 Comm: kworker/4:1 Not tainted 6.8.0+ #359\n[ 1360.547882] Workqueue: events nf_tables_trans_destroy_work [nf_tables]\n[ 1360.547984] Call Trace:\n[ 1360.547991]  <TASK>\n[ 1360.547998]  dump_stack_lvl+0x53/0x70\n[ 1360.548014]  print_report+0xc4/0x610\n[ 1360.548026]  ? __virt_addr_valid+0xba/0x160\n[ 1360.548040]  ? __pfx__raw_spin_lock_irqsave+0x10/0x10\n[ 1360.548054]  ? nf_tables_trans_destroy_work+0x3f5/0x590 [nf_tables]\n[ 1360.548176]  kasan_report+0xae/0xe0\n[ 1360.548189]  ? nf_tables_trans_destroy_work+0x3f5/0x590 [nf_tables]\n[ 1360.548312]  nf_tables_trans_destroy_work+0x3f5/0x590 [nf_tables]\n[ 1360.548447]  ? __pfx_nf_tables_trans_destroy_work+0x10/0x10 [nf_tables]\n[ 1360.548577]  ? _raw_spin_unlock_irq+0x18/0x30\n[ 1360.548591]  process_one_work+0x2f1/0x670\n[ 1360.548610]  worker_thread+0x4d3/0x760\n[ 1360.548627]  ? __pfx_worker_thread+0x10/0x10\n[ 1360.548640]  kthread+0x16b/0x1b0\n[ 1360.548653]  ? __pfx_kthread+0x10/0x10\n[ 1360.548665]  ret_from_fork+0x2f/0x50\n[ 1360.548679]  ? __pfx_kthread+0x10/0x10\n[ 1360.548690]  ret_from_fork_asm+0x1a/0x30\n[ 1360.548707]  </TASK>\n\n[ 1360.548719] Allocated by task 192061:\n[ 1360.548726]  kasan_save_stack+0x20/0x40\n[ 1360.548739]  kasan_save_track+0x14/0x30\n[ 1360.548750]  __kasan_kmalloc+0x8f/0xa0\n[ 1360.548760]  __kmalloc_node+0x1f1/0x450\n[ 1360.548771]  nf_tables_newset+0x10c7/0x1b50 [nf_tables]\n[ 1360.548883]  nfnetlink_rcv_batch+0xbc4/0xdc0 [nfnetlink]\n[ 1360.548909]  nfnetlink_rcv+0x1a8/0x1e0 [nfnetlink]\n[ 1360.548927]  netlink_unicast+0x367/0x4f0\n[ 1360.548935]  netlink_sendmsg+0x34b/0x610\n[ 1360.548944]  ____sys_sendmsg+0x4d4/0x510\n[ 1360.548953]  ___sys_sendmsg+0xc9/0x120\n[ 1360.548961]  __sys_sendmsg+0xbe/0x140\n[ 1360.548971]  do_syscall_64+0x55/0x120\n[ 1360.548982]  entry_SYSCALL_64_after_hwframe+0x55/0x5d\n\n[ 1360.548994] Freed by task 192222:\n[ 1360.548999]  kasan_save_stack+0x20/0x40\n[ 1360.549009]  kasan_save_track+0x14/0x30\n[ 1360.549019]  kasan_save_free_info+0x3b/0x60\n[ 1360.549028]  poison_slab_object+0x100/0x180\n[ 1360.549036]  __kasan_slab_free+0x14/0x30\n[ 1360.549042]  kfree+0xb6/0x260\n[ 1360.549049]  __nft_release_table+0x473/0x6a0 [nf_tables]\n[ 1360.549131]  nf_tables_exit_net+0x170/0x240 [nf_tables]\n[ 1360.549221]  ops_exit_list+0x50/0xa0\n[ 1360.549229]  free_exit_list+0x101/0x140\n[ 1360.549236]  unregister_pernet_operations+0x107/0x160\n[ 1360.549245]  unregister_pernet_subsys+0x1c/0x30\n[ 1360.549254]  nf_tables_module_exit+0x43/0x80 [nf_tables]\n[ 1360.549345]  __do_sys_delete_module+0x253/0x370\n[ 1360.549352]  do_syscall_64+0x55/0x120\n[ 1360.549360]  entry_SYSCALL_64_after_hwframe+0x55/0x5d\n\n(gdb) list *__nft_release_table+0x473\n0x1e033 is in __nft_release_table (net/netfilter/nf_tables_api.c:11354).\n11349           list_for_each_entry_safe(flowtable, nf, &table->flowtables, list) {\n11350                   list_del(&flowtable->list);\n11351                   nft_use_dec(&table->use);\n11352                   nf_tables_flowtable_destroy(flowtable);\n11353           }\n11354           list_for_each_entry_safe(set, ns, &table->sets, list) {\n11355                   list_del(&set->list);\n11356                   nft_use_dec(&table->use);\n11357                   if (set->flags & (NFT_SET_MAP | NFT_SET_OBJECT))\n11358                           nft_map_deactivat\n---truncated---",
					"category":"description",
					"title":"Vulnerability Description"
				}
			],
			"product_status":{
				"fixed":[
					"openEuler-22.03-LTS-SP3:kernel-5.10.0-217.0.0.120.oe2203sp3.x86_64",
					"openEuler-22.03-LTS-SP3:kernel-debuginfo-5.10.0-217.0.0.120.oe2203sp3.x86_64",
					"openEuler-22.03-LTS-SP3:kernel-debugsource-5.10.0-217.0.0.120.oe2203sp3.x86_64",
					"openEuler-22.03-LTS-SP3:kernel-devel-5.10.0-217.0.0.120.oe2203sp3.x86_64",
					"openEuler-22.03-LTS-SP3:kernel-headers-5.10.0-217.0.0.120.oe2203sp3.x86_64",
					"openEuler-22.03-LTS-SP3:kernel-source-5.10.0-217.0.0.120.oe2203sp3.x86_64",
					"openEuler-22.03-LTS-SP3:kernel-tools-5.10.0-217.0.0.120.oe2203sp3.x86_64",
					"openEuler-22.03-LTS-SP3:kernel-tools-debuginfo-5.10.0-217.0.0.120.oe2203sp3.x86_64",
					"openEuler-22.03-LTS-SP3:kernel-tools-devel-5.10.0-217.0.0.120.oe2203sp3.x86_64",
					"openEuler-22.03-LTS-SP3:perf-5.10.0-217.0.0.120.oe2203sp3.x86_64",
					"openEuler-22.03-LTS-SP3:perf-debuginfo-5.10.0-217.0.0.120.oe2203sp3.x86_64",
					"openEuler-22.03-LTS-SP3:python3-perf-5.10.0-217.0.0.120.oe2203sp3.x86_64",
					"openEuler-22.03-LTS-SP3:python3-perf-debuginfo-5.10.0-217.0.0.120.oe2203sp3.x86_64",
					"openEuler-22.03-LTS-SP3:kernel-5.10.0-217.0.0.120.oe2203sp3.aarch64",
					"openEuler-22.03-LTS-SP3:kernel-debuginfo-5.10.0-217.0.0.120.oe2203sp3.aarch64",
					"openEuler-22.03-LTS-SP3:kernel-debugsource-5.10.0-217.0.0.120.oe2203sp3.aarch64",
					"openEuler-22.03-LTS-SP3:kernel-devel-5.10.0-217.0.0.120.oe2203sp3.aarch64",
					"openEuler-22.03-LTS-SP3:kernel-headers-5.10.0-217.0.0.120.oe2203sp3.aarch64",
					"openEuler-22.03-LTS-SP3:kernel-source-5.10.0-217.0.0.120.oe2203sp3.aarch64",
					"openEuler-22.03-LTS-SP3:kernel-tools-5.10.0-217.0.0.120.oe2203sp3.aarch64",
					"openEuler-22.03-LTS-SP3:kernel-tools-debuginfo-5.10.0-217.0.0.120.oe2203sp3.aarch64",
					"openEuler-22.03-LTS-SP3:kernel-tools-devel-5.10.0-217.0.0.120.oe2203sp3.aarch64",
					"openEuler-22.03-LTS-SP3:perf-5.10.0-217.0.0.120.oe2203sp3.aarch64",
					"openEuler-22.03-LTS-SP3:perf-debuginfo-5.10.0-217.0.0.120.oe2203sp3.aarch64",
					"openEuler-22.03-LTS-SP3:python3-perf-5.10.0-217.0.0.120.oe2203sp3.aarch64",
					"openEuler-22.03-LTS-SP3:python3-perf-debuginfo-5.10.0-217.0.0.120.oe2203sp3.aarch64",
					"openEuler-22.03-LTS-SP3:kernel-5.10.0-217.0.0.120.oe2203sp3.src"
				]
			},
			"remediations":[
				{
					"product_ids":[
						"openEuler-22.03-LTS-SP3:kernel-5.10.0-217.0.0.120.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:kernel-debuginfo-5.10.0-217.0.0.120.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:kernel-debugsource-5.10.0-217.0.0.120.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:kernel-devel-5.10.0-217.0.0.120.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:kernel-headers-5.10.0-217.0.0.120.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:kernel-source-5.10.0-217.0.0.120.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:kernel-tools-5.10.0-217.0.0.120.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:kernel-tools-debuginfo-5.10.0-217.0.0.120.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:kernel-tools-devel-5.10.0-217.0.0.120.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:perf-5.10.0-217.0.0.120.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:perf-debuginfo-5.10.0-217.0.0.120.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:python3-perf-5.10.0-217.0.0.120.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:python3-perf-debuginfo-5.10.0-217.0.0.120.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:kernel-5.10.0-217.0.0.120.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:kernel-debuginfo-5.10.0-217.0.0.120.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:kernel-debugsource-5.10.0-217.0.0.120.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:kernel-devel-5.10.0-217.0.0.120.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:kernel-headers-5.10.0-217.0.0.120.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:kernel-source-5.10.0-217.0.0.120.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:kernel-tools-5.10.0-217.0.0.120.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:kernel-tools-debuginfo-5.10.0-217.0.0.120.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:kernel-tools-devel-5.10.0-217.0.0.120.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:perf-5.10.0-217.0.0.120.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:perf-debuginfo-5.10.0-217.0.0.120.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:python3-perf-5.10.0-217.0.0.120.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:python3-perf-debuginfo-5.10.0-217.0.0.120.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:kernel-5.10.0-217.0.0.120.oe2203sp3.src"
					],
					"details":"kernel security update",
					"category":"vendor_fix",
					"url":"https://www.openeuler.org/zh/security/security-bulletins/detail/?id=openEuler-SA-2024-1792"
				}
			],
			"scores":[
				{
					"cvss_v3":{
						"baseSeverity":"MEDIUM",
						"baseScore":6.1,
						"vectorString":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H",
						"version":"3.1"
					},
					"products":[
						"openEuler-22.03-LTS-SP3:kernel-5.10.0-217.0.0.120.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:kernel-debuginfo-5.10.0-217.0.0.120.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:kernel-debugsource-5.10.0-217.0.0.120.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:kernel-devel-5.10.0-217.0.0.120.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:kernel-headers-5.10.0-217.0.0.120.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:kernel-source-5.10.0-217.0.0.120.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:kernel-tools-5.10.0-217.0.0.120.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:kernel-tools-debuginfo-5.10.0-217.0.0.120.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:kernel-tools-devel-5.10.0-217.0.0.120.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:perf-5.10.0-217.0.0.120.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:perf-debuginfo-5.10.0-217.0.0.120.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:python3-perf-5.10.0-217.0.0.120.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:python3-perf-debuginfo-5.10.0-217.0.0.120.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:kernel-5.10.0-217.0.0.120.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:kernel-debuginfo-5.10.0-217.0.0.120.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:kernel-debugsource-5.10.0-217.0.0.120.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:kernel-devel-5.10.0-217.0.0.120.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:kernel-headers-5.10.0-217.0.0.120.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:kernel-source-5.10.0-217.0.0.120.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:kernel-tools-5.10.0-217.0.0.120.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:kernel-tools-debuginfo-5.10.0-217.0.0.120.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:kernel-tools-devel-5.10.0-217.0.0.120.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:perf-5.10.0-217.0.0.120.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:perf-debuginfo-5.10.0-217.0.0.120.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:python3-perf-5.10.0-217.0.0.120.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:python3-perf-debuginfo-5.10.0-217.0.0.120.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:kernel-5.10.0-217.0.0.120.oe2203sp3.src"
					]
				}
			],
			"threats":[
				{
					"details":"Medium",
					"category":"impact"
				}
			],
			"title":"CVE-2024-35899"
		},
		{
			"cve":"CVE-2024-35947",
			"notes":[
				{
					"text":"In the Linux kernel, the following vulnerability has been resolved:\n\ndyndbg: fix old BUG_ON in >control parser\n\nFix a BUG_ON from 2009.  Even if it looks \"unreachable\" (I didn't\nreally look), lets make sure by removing it, doing pr_err and return\n-EINVAL instead.",
					"category":"description",
					"title":"Vulnerability Description"
				}
			],
			"product_status":{
				"fixed":[
					"openEuler-22.03-LTS-SP3:kernel-5.10.0-217.0.0.120.oe2203sp3.x86_64",
					"openEuler-22.03-LTS-SP3:kernel-debuginfo-5.10.0-217.0.0.120.oe2203sp3.x86_64",
					"openEuler-22.03-LTS-SP3:kernel-debugsource-5.10.0-217.0.0.120.oe2203sp3.x86_64",
					"openEuler-22.03-LTS-SP3:kernel-devel-5.10.0-217.0.0.120.oe2203sp3.x86_64",
					"openEuler-22.03-LTS-SP3:kernel-headers-5.10.0-217.0.0.120.oe2203sp3.x86_64",
					"openEuler-22.03-LTS-SP3:kernel-source-5.10.0-217.0.0.120.oe2203sp3.x86_64",
					"openEuler-22.03-LTS-SP3:kernel-tools-5.10.0-217.0.0.120.oe2203sp3.x86_64",
					"openEuler-22.03-LTS-SP3:kernel-tools-debuginfo-5.10.0-217.0.0.120.oe2203sp3.x86_64",
					"openEuler-22.03-LTS-SP3:kernel-tools-devel-5.10.0-217.0.0.120.oe2203sp3.x86_64",
					"openEuler-22.03-LTS-SP3:perf-5.10.0-217.0.0.120.oe2203sp3.x86_64",
					"openEuler-22.03-LTS-SP3:perf-debuginfo-5.10.0-217.0.0.120.oe2203sp3.x86_64",
					"openEuler-22.03-LTS-SP3:python3-perf-5.10.0-217.0.0.120.oe2203sp3.x86_64",
					"openEuler-22.03-LTS-SP3:python3-perf-debuginfo-5.10.0-217.0.0.120.oe2203sp3.x86_64",
					"openEuler-22.03-LTS-SP3:kernel-5.10.0-217.0.0.120.oe2203sp3.aarch64",
					"openEuler-22.03-LTS-SP3:kernel-debuginfo-5.10.0-217.0.0.120.oe2203sp3.aarch64",
					"openEuler-22.03-LTS-SP3:kernel-debugsource-5.10.0-217.0.0.120.oe2203sp3.aarch64",
					"openEuler-22.03-LTS-SP3:kernel-devel-5.10.0-217.0.0.120.oe2203sp3.aarch64",
					"openEuler-22.03-LTS-SP3:kernel-headers-5.10.0-217.0.0.120.oe2203sp3.aarch64",
					"openEuler-22.03-LTS-SP3:kernel-source-5.10.0-217.0.0.120.oe2203sp3.aarch64",
					"openEuler-22.03-LTS-SP3:kernel-tools-5.10.0-217.0.0.120.oe2203sp3.aarch64",
					"openEuler-22.03-LTS-SP3:kernel-tools-debuginfo-5.10.0-217.0.0.120.oe2203sp3.aarch64",
					"openEuler-22.03-LTS-SP3:kernel-tools-devel-5.10.0-217.0.0.120.oe2203sp3.aarch64",
					"openEuler-22.03-LTS-SP3:perf-5.10.0-217.0.0.120.oe2203sp3.aarch64",
					"openEuler-22.03-LTS-SP3:perf-debuginfo-5.10.0-217.0.0.120.oe2203sp3.aarch64",
					"openEuler-22.03-LTS-SP3:python3-perf-5.10.0-217.0.0.120.oe2203sp3.aarch64",
					"openEuler-22.03-LTS-SP3:python3-perf-debuginfo-5.10.0-217.0.0.120.oe2203sp3.aarch64",
					"openEuler-22.03-LTS-SP3:kernel-5.10.0-217.0.0.120.oe2203sp3.src"
				]
			},
			"remediations":[
				{
					"product_ids":[
						"openEuler-22.03-LTS-SP3:kernel-5.10.0-217.0.0.120.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:kernel-debuginfo-5.10.0-217.0.0.120.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:kernel-debugsource-5.10.0-217.0.0.120.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:kernel-devel-5.10.0-217.0.0.120.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:kernel-headers-5.10.0-217.0.0.120.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:kernel-source-5.10.0-217.0.0.120.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:kernel-tools-5.10.0-217.0.0.120.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:kernel-tools-debuginfo-5.10.0-217.0.0.120.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:kernel-tools-devel-5.10.0-217.0.0.120.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:perf-5.10.0-217.0.0.120.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:perf-debuginfo-5.10.0-217.0.0.120.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:python3-perf-5.10.0-217.0.0.120.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:python3-perf-debuginfo-5.10.0-217.0.0.120.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:kernel-5.10.0-217.0.0.120.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:kernel-debuginfo-5.10.0-217.0.0.120.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:kernel-debugsource-5.10.0-217.0.0.120.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:kernel-devel-5.10.0-217.0.0.120.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:kernel-headers-5.10.0-217.0.0.120.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:kernel-source-5.10.0-217.0.0.120.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:kernel-tools-5.10.0-217.0.0.120.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:kernel-tools-debuginfo-5.10.0-217.0.0.120.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:kernel-tools-devel-5.10.0-217.0.0.120.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:perf-5.10.0-217.0.0.120.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:perf-debuginfo-5.10.0-217.0.0.120.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:python3-perf-5.10.0-217.0.0.120.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:python3-perf-debuginfo-5.10.0-217.0.0.120.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:kernel-5.10.0-217.0.0.120.oe2203sp3.src"
					],
					"details":"kernel security update",
					"category":"vendor_fix",
					"url":"https://www.openeuler.org/zh/security/security-bulletins/detail/?id=openEuler-SA-2024-1792"
				}
			],
			"scores":[
				{
					"cvss_v3":{
						"baseSeverity":"MEDIUM",
						"baseScore":5.5,
						"vectorString":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
						"version":"3.1"
					},
					"products":[
						"openEuler-22.03-LTS-SP3:kernel-5.10.0-217.0.0.120.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:kernel-debuginfo-5.10.0-217.0.0.120.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:kernel-debugsource-5.10.0-217.0.0.120.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:kernel-devel-5.10.0-217.0.0.120.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:kernel-headers-5.10.0-217.0.0.120.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:kernel-source-5.10.0-217.0.0.120.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:kernel-tools-5.10.0-217.0.0.120.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:kernel-tools-debuginfo-5.10.0-217.0.0.120.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:kernel-tools-devel-5.10.0-217.0.0.120.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:perf-5.10.0-217.0.0.120.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:perf-debuginfo-5.10.0-217.0.0.120.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:python3-perf-5.10.0-217.0.0.120.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:python3-perf-debuginfo-5.10.0-217.0.0.120.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:kernel-5.10.0-217.0.0.120.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:kernel-debuginfo-5.10.0-217.0.0.120.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:kernel-debugsource-5.10.0-217.0.0.120.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:kernel-devel-5.10.0-217.0.0.120.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:kernel-headers-5.10.0-217.0.0.120.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:kernel-source-5.10.0-217.0.0.120.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:kernel-tools-5.10.0-217.0.0.120.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:kernel-tools-debuginfo-5.10.0-217.0.0.120.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:kernel-tools-devel-5.10.0-217.0.0.120.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:perf-5.10.0-217.0.0.120.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:perf-debuginfo-5.10.0-217.0.0.120.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:python3-perf-5.10.0-217.0.0.120.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:python3-perf-debuginfo-5.10.0-217.0.0.120.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:kernel-5.10.0-217.0.0.120.oe2203sp3.src"
					]
				}
			],
			"threats":[
				{
					"details":"Medium",
					"category":"impact"
				}
			],
			"title":"CVE-2024-35947"
		},
		{
			"cve":"CVE-2024-36974",
			"notes":[
				{
					"text":"In the Linux kernel, the following vulnerability has been resolved:\n\nnet/sched: taprio: always validate TCA_TAPRIO_ATTR_PRIOMAP\n\nIf one TCA_TAPRIO_ATTR_PRIOMAP attribute has been provided,\ntaprio_parse_mqprio_opt() must validate it, or userspace\ncan inject arbitrary data to the kernel, the second time\ntaprio_change() is called.\n\nFirst call (with valid attributes) sets dev->num_tc\nto a non zero value.\n\nSecond call (with arbitrary mqprio attributes)\nreturns early from taprio_parse_mqprio_opt()\nand bad things can happen.",
					"category":"description",
					"title":"Vulnerability Description"
				}
			],
			"product_status":{
				"fixed":[
					"openEuler-22.03-LTS-SP3:kernel-5.10.0-217.0.0.120.oe2203sp3.x86_64",
					"openEuler-22.03-LTS-SP3:kernel-debuginfo-5.10.0-217.0.0.120.oe2203sp3.x86_64",
					"openEuler-22.03-LTS-SP3:kernel-debugsource-5.10.0-217.0.0.120.oe2203sp3.x86_64",
					"openEuler-22.03-LTS-SP3:kernel-devel-5.10.0-217.0.0.120.oe2203sp3.x86_64",
					"openEuler-22.03-LTS-SP3:kernel-headers-5.10.0-217.0.0.120.oe2203sp3.x86_64",
					"openEuler-22.03-LTS-SP3:kernel-source-5.10.0-217.0.0.120.oe2203sp3.x86_64",
					"openEuler-22.03-LTS-SP3:kernel-tools-5.10.0-217.0.0.120.oe2203sp3.x86_64",
					"openEuler-22.03-LTS-SP3:kernel-tools-debuginfo-5.10.0-217.0.0.120.oe2203sp3.x86_64",
					"openEuler-22.03-LTS-SP3:kernel-tools-devel-5.10.0-217.0.0.120.oe2203sp3.x86_64",
					"openEuler-22.03-LTS-SP3:perf-5.10.0-217.0.0.120.oe2203sp3.x86_64",
					"openEuler-22.03-LTS-SP3:perf-debuginfo-5.10.0-217.0.0.120.oe2203sp3.x86_64",
					"openEuler-22.03-LTS-SP3:python3-perf-5.10.0-217.0.0.120.oe2203sp3.x86_64",
					"openEuler-22.03-LTS-SP3:python3-perf-debuginfo-5.10.0-217.0.0.120.oe2203sp3.x86_64",
					"openEuler-22.03-LTS-SP3:kernel-5.10.0-217.0.0.120.oe2203sp3.aarch64",
					"openEuler-22.03-LTS-SP3:kernel-debuginfo-5.10.0-217.0.0.120.oe2203sp3.aarch64",
					"openEuler-22.03-LTS-SP3:kernel-debugsource-5.10.0-217.0.0.120.oe2203sp3.aarch64",
					"openEuler-22.03-LTS-SP3:kernel-devel-5.10.0-217.0.0.120.oe2203sp3.aarch64",
					"openEuler-22.03-LTS-SP3:kernel-headers-5.10.0-217.0.0.120.oe2203sp3.aarch64",
					"openEuler-22.03-LTS-SP3:kernel-source-5.10.0-217.0.0.120.oe2203sp3.aarch64",
					"openEuler-22.03-LTS-SP3:kernel-tools-5.10.0-217.0.0.120.oe2203sp3.aarch64",
					"openEuler-22.03-LTS-SP3:kernel-tools-debuginfo-5.10.0-217.0.0.120.oe2203sp3.aarch64",
					"openEuler-22.03-LTS-SP3:kernel-tools-devel-5.10.0-217.0.0.120.oe2203sp3.aarch64",
					"openEuler-22.03-LTS-SP3:perf-5.10.0-217.0.0.120.oe2203sp3.aarch64",
					"openEuler-22.03-LTS-SP3:perf-debuginfo-5.10.0-217.0.0.120.oe2203sp3.aarch64",
					"openEuler-22.03-LTS-SP3:python3-perf-5.10.0-217.0.0.120.oe2203sp3.aarch64",
					"openEuler-22.03-LTS-SP3:python3-perf-debuginfo-5.10.0-217.0.0.120.oe2203sp3.aarch64",
					"openEuler-22.03-LTS-SP3:kernel-5.10.0-217.0.0.120.oe2203sp3.src"
				]
			},
			"remediations":[
				{
					"product_ids":[
						"openEuler-22.03-LTS-SP3:kernel-5.10.0-217.0.0.120.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:kernel-debuginfo-5.10.0-217.0.0.120.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:kernel-debugsource-5.10.0-217.0.0.120.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:kernel-devel-5.10.0-217.0.0.120.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:kernel-headers-5.10.0-217.0.0.120.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:kernel-source-5.10.0-217.0.0.120.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:kernel-tools-5.10.0-217.0.0.120.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:kernel-tools-debuginfo-5.10.0-217.0.0.120.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:kernel-tools-devel-5.10.0-217.0.0.120.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:perf-5.10.0-217.0.0.120.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:perf-debuginfo-5.10.0-217.0.0.120.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:python3-perf-5.10.0-217.0.0.120.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:python3-perf-debuginfo-5.10.0-217.0.0.120.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:kernel-5.10.0-217.0.0.120.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:kernel-debuginfo-5.10.0-217.0.0.120.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:kernel-debugsource-5.10.0-217.0.0.120.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:kernel-devel-5.10.0-217.0.0.120.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:kernel-headers-5.10.0-217.0.0.120.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:kernel-source-5.10.0-217.0.0.120.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:kernel-tools-5.10.0-217.0.0.120.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:kernel-tools-debuginfo-5.10.0-217.0.0.120.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:kernel-tools-devel-5.10.0-217.0.0.120.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:perf-5.10.0-217.0.0.120.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:perf-debuginfo-5.10.0-217.0.0.120.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:python3-perf-5.10.0-217.0.0.120.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:python3-perf-debuginfo-5.10.0-217.0.0.120.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:kernel-5.10.0-217.0.0.120.oe2203sp3.src"
					],
					"details":"kernel security update",
					"category":"vendor_fix",
					"url":"https://www.openeuler.org/zh/security/security-bulletins/detail/?id=openEuler-SA-2024-1792"
				}
			],
			"scores":[
				{
					"cvss_v3":{
						"baseSeverity":"LOW",
						"baseScore":3.9,
						"vectorString":"CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:L/I:L/A:L",
						"version":"3.1"
					},
					"products":[
						"openEuler-22.03-LTS-SP3:kernel-5.10.0-217.0.0.120.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:kernel-debuginfo-5.10.0-217.0.0.120.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:kernel-debugsource-5.10.0-217.0.0.120.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:kernel-devel-5.10.0-217.0.0.120.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:kernel-headers-5.10.0-217.0.0.120.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:kernel-source-5.10.0-217.0.0.120.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:kernel-tools-5.10.0-217.0.0.120.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:kernel-tools-debuginfo-5.10.0-217.0.0.120.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:kernel-tools-devel-5.10.0-217.0.0.120.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:perf-5.10.0-217.0.0.120.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:perf-debuginfo-5.10.0-217.0.0.120.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:python3-perf-5.10.0-217.0.0.120.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:python3-perf-debuginfo-5.10.0-217.0.0.120.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:kernel-5.10.0-217.0.0.120.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:kernel-debuginfo-5.10.0-217.0.0.120.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:kernel-debugsource-5.10.0-217.0.0.120.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:kernel-devel-5.10.0-217.0.0.120.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:kernel-headers-5.10.0-217.0.0.120.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:kernel-source-5.10.0-217.0.0.120.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:kernel-tools-5.10.0-217.0.0.120.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:kernel-tools-debuginfo-5.10.0-217.0.0.120.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:kernel-tools-devel-5.10.0-217.0.0.120.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:perf-5.10.0-217.0.0.120.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:perf-debuginfo-5.10.0-217.0.0.120.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:python3-perf-5.10.0-217.0.0.120.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:python3-perf-debuginfo-5.10.0-217.0.0.120.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:kernel-5.10.0-217.0.0.120.oe2203sp3.src"
					]
				}
			],
			"threats":[
				{
					"details":"Low",
					"category":"impact"
				}
			],
			"title":"CVE-2024-36974"
		},
		{
			"cve":"CVE-2024-37356",
			"notes":[
				{
					"text":"In the Linux kernel, the following vulnerability has been resolved:\n\ntcp: Fix shift-out-of-bounds in dctcp_update_alpha().\n\nIn dctcp_update_alpha(), we use a module parameter dctcp_shift_g\nas follows:\n\n  alpha -= min_not_zero(alpha, alpha >> dctcp_shift_g);\n  ...\n  delivered_ce <<= (10 - dctcp_shift_g);\n\nIt seems syzkaller started fuzzing module parameters and triggered\nshift-out-of-bounds [0] by setting 100 to dctcp_shift_g:\n\n  memcpy((void*)0x20000080,\n         \"/sys/module/tcp_dctcp/parameters/dctcp_shift_g\\000\", 47);\n  res = syscall(__NR_openat, /*fd=*/0xffffffffffffff9cul, /*file=*/0x20000080ul,\n                /*flags=*/2ul, /*mode=*/0ul);\n  memcpy((void*)0x20000000, \"100\\000\", 4);\n  syscall(__NR_write, /*fd=*/r[0], /*val=*/0x20000000ul, /*len=*/4ul);\n\nLet's limit the max value of dctcp_shift_g by param_set_uint_minmax().\n\nWith this patch:\n\n  # echo 10 > /sys/module/tcp_dctcp/parameters/dctcp_shift_g\n  # cat /sys/module/tcp_dctcp/parameters/dctcp_shift_g\n  10\n  # echo 11 > /sys/module/tcp_dctcp/parameters/dctcp_shift_g\n  -bash: echo: write error: Invalid argument\n\n[0]:\nUBSAN: shift-out-of-bounds in net/ipv4/tcp_dctcp.c:143:12\nshift exponent 100 is too large for 32-bit type 'u32' (aka 'unsigned int')\nCPU: 0 PID: 8083 Comm: syz-executor345 Not tainted 6.9.0-05151-g1b294a1f3561 #2\nHardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS\n1.13.0-1ubuntu1.1 04/01/2014\nCall Trace:\n <TASK>\n __dump_stack lib/dump_stack.c:88 [inline]\n dump_stack_lvl+0x201/0x300 lib/dump_stack.c:114\n ubsan_epilogue lib/ubsan.c:231 [inline]\n __ubsan_handle_shift_out_of_bounds+0x346/0x3a0 lib/ubsan.c:468\n dctcp_update_alpha+0x540/0x570 net/ipv4/tcp_dctcp.c:143\n tcp_in_ack_event net/ipv4/tcp_input.c:3802 [inline]\n tcp_ack+0x17b1/0x3bc0 net/ipv4/tcp_input.c:3948\n tcp_rcv_state_process+0x57a/0x2290 net/ipv4/tcp_input.c:6711\n tcp_v4_do_rcv+0x764/0xc40 net/ipv4/tcp_ipv4.c:1937\n sk_backlog_rcv include/net/sock.h:1106 [inline]\n __release_sock+0x20f/0x350 net/core/sock.c:2983\n release_sock+0x61/0x1f0 net/core/sock.c:3549\n mptcp_subflow_shutdown+0x3d0/0x620 net/mptcp/protocol.c:2907\n mptcp_check_send_data_fin+0x225/0x410 net/mptcp/protocol.c:2976\n __mptcp_close+0x238/0xad0 net/mptcp/protocol.c:3072\n mptcp_close+0x2a/0x1a0 net/mptcp/protocol.c:3127\n inet_release+0x190/0x1f0 net/ipv4/af_inet.c:437\n __sock_release net/socket.c:659 [inline]\n sock_close+0xc0/0x240 net/socket.c:1421\n __fput+0x41b/0x890 fs/file_table.c:422\n task_work_run+0x23b/0x300 kernel/task_work.c:180\n exit_task_work include/linux/task_work.h:38 [inline]\n do_exit+0x9c8/0x2540 kernel/exit.c:878\n do_group_exit+0x201/0x2b0 kernel/exit.c:1027\n __do_sys_exit_group kernel/exit.c:1038 [inline]\n __se_sys_exit_group kernel/exit.c:1036 [inline]\n __x64_sys_exit_group+0x3f/0x40 kernel/exit.c:1036\n do_syscall_x64 arch/x86/entry/common.c:52 [inline]\n do_syscall_64+0xe4/0x240 arch/x86/entry/common.c:83\n entry_SYSCALL_64_after_hwframe+0x67/0x6f\nRIP: 0033:0x7f6c2b5005b6\nCode: Unable to access opcode bytes at 0x7f6c2b50058c.\nRSP: 002b:00007ffe883eb948 EFLAGS: 00000246 ORIG_RAX: 00000000000000e7\nRAX: ffffffffffffffda RBX: 00007f6c2b5862f0 RCX: 00007f6c2b5005b6\nRDX: 0000000000000001 RSI: 000000000000003c RDI: 0000000000000001\nRBP: 0000000000000001 R08: 00000000000000e7 R09: ffffffffffffffc0\nR10: 0000000000000006 R11: 0000000000000246 R12: 00007f6c2b5862f0\nR13: 0000000000000001 R14: 0000000000000000 R15: 0000000000000001\n </TASK>",
					"category":"description",
					"title":"Vulnerability Description"
				}
			],
			"product_status":{
				"fixed":[
					"openEuler-22.03-LTS-SP3:kernel-5.10.0-217.0.0.120.oe2203sp3.x86_64",
					"openEuler-22.03-LTS-SP3:kernel-debuginfo-5.10.0-217.0.0.120.oe2203sp3.x86_64",
					"openEuler-22.03-LTS-SP3:kernel-debugsource-5.10.0-217.0.0.120.oe2203sp3.x86_64",
					"openEuler-22.03-LTS-SP3:kernel-devel-5.10.0-217.0.0.120.oe2203sp3.x86_64",
					"openEuler-22.03-LTS-SP3:kernel-headers-5.10.0-217.0.0.120.oe2203sp3.x86_64",
					"openEuler-22.03-LTS-SP3:kernel-source-5.10.0-217.0.0.120.oe2203sp3.x86_64",
					"openEuler-22.03-LTS-SP3:kernel-tools-5.10.0-217.0.0.120.oe2203sp3.x86_64",
					"openEuler-22.03-LTS-SP3:kernel-tools-debuginfo-5.10.0-217.0.0.120.oe2203sp3.x86_64",
					"openEuler-22.03-LTS-SP3:kernel-tools-devel-5.10.0-217.0.0.120.oe2203sp3.x86_64",
					"openEuler-22.03-LTS-SP3:perf-5.10.0-217.0.0.120.oe2203sp3.x86_64",
					"openEuler-22.03-LTS-SP3:perf-debuginfo-5.10.0-217.0.0.120.oe2203sp3.x86_64",
					"openEuler-22.03-LTS-SP3:python3-perf-5.10.0-217.0.0.120.oe2203sp3.x86_64",
					"openEuler-22.03-LTS-SP3:python3-perf-debuginfo-5.10.0-217.0.0.120.oe2203sp3.x86_64",
					"openEuler-22.03-LTS-SP3:kernel-5.10.0-217.0.0.120.oe2203sp3.aarch64",
					"openEuler-22.03-LTS-SP3:kernel-debuginfo-5.10.0-217.0.0.120.oe2203sp3.aarch64",
					"openEuler-22.03-LTS-SP3:kernel-debugsource-5.10.0-217.0.0.120.oe2203sp3.aarch64",
					"openEuler-22.03-LTS-SP3:kernel-devel-5.10.0-217.0.0.120.oe2203sp3.aarch64",
					"openEuler-22.03-LTS-SP3:kernel-headers-5.10.0-217.0.0.120.oe2203sp3.aarch64",
					"openEuler-22.03-LTS-SP3:kernel-source-5.10.0-217.0.0.120.oe2203sp3.aarch64",
					"openEuler-22.03-LTS-SP3:kernel-tools-5.10.0-217.0.0.120.oe2203sp3.aarch64",
					"openEuler-22.03-LTS-SP3:kernel-tools-debuginfo-5.10.0-217.0.0.120.oe2203sp3.aarch64",
					"openEuler-22.03-LTS-SP3:kernel-tools-devel-5.10.0-217.0.0.120.oe2203sp3.aarch64",
					"openEuler-22.03-LTS-SP3:perf-5.10.0-217.0.0.120.oe2203sp3.aarch64",
					"openEuler-22.03-LTS-SP3:perf-debuginfo-5.10.0-217.0.0.120.oe2203sp3.aarch64",
					"openEuler-22.03-LTS-SP3:python3-perf-5.10.0-217.0.0.120.oe2203sp3.aarch64",
					"openEuler-22.03-LTS-SP3:python3-perf-debuginfo-5.10.0-217.0.0.120.oe2203sp3.aarch64",
					"openEuler-22.03-LTS-SP3:kernel-5.10.0-217.0.0.120.oe2203sp3.src"
				]
			},
			"remediations":[
				{
					"product_ids":[
						"openEuler-22.03-LTS-SP3:kernel-5.10.0-217.0.0.120.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:kernel-debuginfo-5.10.0-217.0.0.120.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:kernel-debugsource-5.10.0-217.0.0.120.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:kernel-devel-5.10.0-217.0.0.120.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:kernel-headers-5.10.0-217.0.0.120.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:kernel-source-5.10.0-217.0.0.120.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:kernel-tools-5.10.0-217.0.0.120.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:kernel-tools-debuginfo-5.10.0-217.0.0.120.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:kernel-tools-devel-5.10.0-217.0.0.120.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:perf-5.10.0-217.0.0.120.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:perf-debuginfo-5.10.0-217.0.0.120.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:python3-perf-5.10.0-217.0.0.120.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:python3-perf-debuginfo-5.10.0-217.0.0.120.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:kernel-5.10.0-217.0.0.120.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:kernel-debuginfo-5.10.0-217.0.0.120.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:kernel-debugsource-5.10.0-217.0.0.120.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:kernel-devel-5.10.0-217.0.0.120.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:kernel-headers-5.10.0-217.0.0.120.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:kernel-source-5.10.0-217.0.0.120.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:kernel-tools-5.10.0-217.0.0.120.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:kernel-tools-debuginfo-5.10.0-217.0.0.120.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:kernel-tools-devel-5.10.0-217.0.0.120.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:perf-5.10.0-217.0.0.120.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:perf-debuginfo-5.10.0-217.0.0.120.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:python3-perf-5.10.0-217.0.0.120.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:python3-perf-debuginfo-5.10.0-217.0.0.120.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:kernel-5.10.0-217.0.0.120.oe2203sp3.src"
					],
					"details":"kernel security update",
					"category":"vendor_fix",
					"url":"https://www.openeuler.org/zh/security/security-bulletins/detail/?id=openEuler-SA-2024-1792"
				}
			],
			"scores":[
				{
					"cvss_v3":{
						"baseSeverity":"MEDIUM",
						"baseScore":5.5,
						"vectorString":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
						"version":"3.1"
					},
					"products":[
						"openEuler-22.03-LTS-SP3:kernel-5.10.0-217.0.0.120.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:kernel-debuginfo-5.10.0-217.0.0.120.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:kernel-debugsource-5.10.0-217.0.0.120.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:kernel-devel-5.10.0-217.0.0.120.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:kernel-headers-5.10.0-217.0.0.120.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:kernel-source-5.10.0-217.0.0.120.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:kernel-tools-5.10.0-217.0.0.120.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:kernel-tools-debuginfo-5.10.0-217.0.0.120.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:kernel-tools-devel-5.10.0-217.0.0.120.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:perf-5.10.0-217.0.0.120.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:perf-debuginfo-5.10.0-217.0.0.120.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:python3-perf-5.10.0-217.0.0.120.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:python3-perf-debuginfo-5.10.0-217.0.0.120.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:kernel-5.10.0-217.0.0.120.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:kernel-debuginfo-5.10.0-217.0.0.120.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:kernel-debugsource-5.10.0-217.0.0.120.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:kernel-devel-5.10.0-217.0.0.120.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:kernel-headers-5.10.0-217.0.0.120.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:kernel-source-5.10.0-217.0.0.120.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:kernel-tools-5.10.0-217.0.0.120.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:kernel-tools-debuginfo-5.10.0-217.0.0.120.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:kernel-tools-devel-5.10.0-217.0.0.120.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:perf-5.10.0-217.0.0.120.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:perf-debuginfo-5.10.0-217.0.0.120.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:python3-perf-5.10.0-217.0.0.120.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:python3-perf-debuginfo-5.10.0-217.0.0.120.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:kernel-5.10.0-217.0.0.120.oe2203sp3.src"
					]
				}
			],
			"threats":[
				{
					"details":"Medium",
					"category":"impact"
				}
			],
			"title":"CVE-2024-37356"
		},
		{
			"cve":"CVE-2024-38538",
			"notes":[
				{
					"text":"In the Linux kernel, the following vulnerability has been resolved:\n\nnet: bridge: xmit: make sure we have at least eth header len bytes\n\nsyzbot triggered an uninit value[1] error in bridge device's xmit path\nby sending a short (less than ETH_HLEN bytes) skb. To fix it check if\nwe can actually pull that amount instead of assuming.\n\nTested with dropwatch:\n drop at: br_dev_xmit+0xb93/0x12d0 [bridge] (0xffffffffc06739b3)\n origin: software\n timestamp: Mon May 13 11:31:53 2024 778214037 nsec\n protocol: 0x88a8\n length: 2\n original length: 2\n drop reason: PKT_TOO_SMALL\n\n[1]\nBUG: KMSAN: uninit-value in br_dev_xmit+0x61d/0x1cb0 net/bridge/br_device.c:65\n br_dev_xmit+0x61d/0x1cb0 net/bridge/br_device.c:65\n __netdev_start_xmit include/linux/netdevice.h:4903 [inline]\n netdev_start_xmit include/linux/netdevice.h:4917 [inline]\n xmit_one net/core/dev.c:3531 [inline]\n dev_hard_start_xmit+0x247/0xa20 net/core/dev.c:3547\n __dev_queue_xmit+0x34db/0x5350 net/core/dev.c:4341\n dev_queue_xmit include/linux/netdevice.h:3091 [inline]\n __bpf_tx_skb net/core/filter.c:2136 [inline]\n __bpf_redirect_common net/core/filter.c:2180 [inline]\n __bpf_redirect+0x14a6/0x1620 net/core/filter.c:2187\n ____bpf_clone_redirect net/core/filter.c:2460 [inline]\n bpf_clone_redirect+0x328/0x470 net/core/filter.c:2432\n ___bpf_prog_run+0x13fe/0xe0f0 kernel/bpf/core.c:1997\n __bpf_prog_run512+0xb5/0xe0 kernel/bpf/core.c:2238\n bpf_dispatcher_nop_func include/linux/bpf.h:1234 [inline]\n __bpf_prog_run include/linux/filter.h:657 [inline]\n bpf_prog_run include/linux/filter.h:664 [inline]\n bpf_test_run+0x499/0xc30 net/bpf/test_run.c:425\n bpf_prog_test_run_skb+0x14ea/0x1f20 net/bpf/test_run.c:1058\n bpf_prog_test_run+0x6b7/0xad0 kernel/bpf/syscall.c:4269\n __sys_bpf+0x6aa/0xd90 kernel/bpf/syscall.c:5678\n __do_sys_bpf kernel/bpf/syscall.c:5767 [inline]\n __se_sys_bpf kernel/bpf/syscall.c:5765 [inline]\n __x64_sys_bpf+0xa0/0xe0 kernel/bpf/syscall.c:5765\n x64_sys_call+0x96b/0x3b50 arch/x86/include/generated/asm/syscalls_64.h:322\n do_syscall_x64 arch/x86/entry/common.c:52 [inline]\n do_syscall_64+0xcf/0x1e0 arch/x86/entry/common.c:83\n entry_SYSCALL_64_after_hwframe+0x77/0x7f",
					"category":"description",
					"title":"Vulnerability Description"
				}
			],
			"product_status":{
				"fixed":[
					"openEuler-22.03-LTS-SP3:kernel-5.10.0-217.0.0.120.oe2203sp3.x86_64",
					"openEuler-22.03-LTS-SP3:kernel-debuginfo-5.10.0-217.0.0.120.oe2203sp3.x86_64",
					"openEuler-22.03-LTS-SP3:kernel-debugsource-5.10.0-217.0.0.120.oe2203sp3.x86_64",
					"openEuler-22.03-LTS-SP3:kernel-devel-5.10.0-217.0.0.120.oe2203sp3.x86_64",
					"openEuler-22.03-LTS-SP3:kernel-headers-5.10.0-217.0.0.120.oe2203sp3.x86_64",
					"openEuler-22.03-LTS-SP3:kernel-source-5.10.0-217.0.0.120.oe2203sp3.x86_64",
					"openEuler-22.03-LTS-SP3:kernel-tools-5.10.0-217.0.0.120.oe2203sp3.x86_64",
					"openEuler-22.03-LTS-SP3:kernel-tools-debuginfo-5.10.0-217.0.0.120.oe2203sp3.x86_64",
					"openEuler-22.03-LTS-SP3:kernel-tools-devel-5.10.0-217.0.0.120.oe2203sp3.x86_64",
					"openEuler-22.03-LTS-SP3:perf-5.10.0-217.0.0.120.oe2203sp3.x86_64",
					"openEuler-22.03-LTS-SP3:perf-debuginfo-5.10.0-217.0.0.120.oe2203sp3.x86_64",
					"openEuler-22.03-LTS-SP3:python3-perf-5.10.0-217.0.0.120.oe2203sp3.x86_64",
					"openEuler-22.03-LTS-SP3:python3-perf-debuginfo-5.10.0-217.0.0.120.oe2203sp3.x86_64",
					"openEuler-22.03-LTS-SP3:kernel-5.10.0-217.0.0.120.oe2203sp3.aarch64",
					"openEuler-22.03-LTS-SP3:kernel-debuginfo-5.10.0-217.0.0.120.oe2203sp3.aarch64",
					"openEuler-22.03-LTS-SP3:kernel-debugsource-5.10.0-217.0.0.120.oe2203sp3.aarch64",
					"openEuler-22.03-LTS-SP3:kernel-devel-5.10.0-217.0.0.120.oe2203sp3.aarch64",
					"openEuler-22.03-LTS-SP3:kernel-headers-5.10.0-217.0.0.120.oe2203sp3.aarch64",
					"openEuler-22.03-LTS-SP3:kernel-source-5.10.0-217.0.0.120.oe2203sp3.aarch64",
					"openEuler-22.03-LTS-SP3:kernel-tools-5.10.0-217.0.0.120.oe2203sp3.aarch64",
					"openEuler-22.03-LTS-SP3:kernel-tools-debuginfo-5.10.0-217.0.0.120.oe2203sp3.aarch64",
					"openEuler-22.03-LTS-SP3:kernel-tools-devel-5.10.0-217.0.0.120.oe2203sp3.aarch64",
					"openEuler-22.03-LTS-SP3:perf-5.10.0-217.0.0.120.oe2203sp3.aarch64",
					"openEuler-22.03-LTS-SP3:perf-debuginfo-5.10.0-217.0.0.120.oe2203sp3.aarch64",
					"openEuler-22.03-LTS-SP3:python3-perf-5.10.0-217.0.0.120.oe2203sp3.aarch64",
					"openEuler-22.03-LTS-SP3:python3-perf-debuginfo-5.10.0-217.0.0.120.oe2203sp3.aarch64",
					"openEuler-22.03-LTS-SP3:kernel-5.10.0-217.0.0.120.oe2203sp3.src"
				]
			},
			"remediations":[
				{
					"product_ids":[
						"openEuler-22.03-LTS-SP3:kernel-5.10.0-217.0.0.120.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:kernel-debuginfo-5.10.0-217.0.0.120.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:kernel-debugsource-5.10.0-217.0.0.120.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:kernel-devel-5.10.0-217.0.0.120.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:kernel-headers-5.10.0-217.0.0.120.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:kernel-source-5.10.0-217.0.0.120.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:kernel-tools-5.10.0-217.0.0.120.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:kernel-tools-debuginfo-5.10.0-217.0.0.120.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:kernel-tools-devel-5.10.0-217.0.0.120.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:perf-5.10.0-217.0.0.120.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:perf-debuginfo-5.10.0-217.0.0.120.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:python3-perf-5.10.0-217.0.0.120.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:python3-perf-debuginfo-5.10.0-217.0.0.120.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:kernel-5.10.0-217.0.0.120.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:kernel-debuginfo-5.10.0-217.0.0.120.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:kernel-debugsource-5.10.0-217.0.0.120.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:kernel-devel-5.10.0-217.0.0.120.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:kernel-headers-5.10.0-217.0.0.120.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:kernel-source-5.10.0-217.0.0.120.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:kernel-tools-5.10.0-217.0.0.120.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:kernel-tools-debuginfo-5.10.0-217.0.0.120.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:kernel-tools-devel-5.10.0-217.0.0.120.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:perf-5.10.0-217.0.0.120.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:perf-debuginfo-5.10.0-217.0.0.120.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:python3-perf-5.10.0-217.0.0.120.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:python3-perf-debuginfo-5.10.0-217.0.0.120.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:kernel-5.10.0-217.0.0.120.oe2203sp3.src"
					],
					"details":"kernel security update",
					"category":"vendor_fix",
					"url":"https://www.openeuler.org/zh/security/security-bulletins/detail/?id=openEuler-SA-2024-1792"
				}
			],
			"scores":[
				{
					"cvss_v3":{
						"baseSeverity":"MEDIUM",
						"baseScore":5.5,
						"vectorString":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
						"version":"3.1"
					},
					"products":[
						"openEuler-22.03-LTS-SP3:kernel-5.10.0-217.0.0.120.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:kernel-debuginfo-5.10.0-217.0.0.120.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:kernel-debugsource-5.10.0-217.0.0.120.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:kernel-devel-5.10.0-217.0.0.120.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:kernel-headers-5.10.0-217.0.0.120.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:kernel-source-5.10.0-217.0.0.120.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:kernel-tools-5.10.0-217.0.0.120.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:kernel-tools-debuginfo-5.10.0-217.0.0.120.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:kernel-tools-devel-5.10.0-217.0.0.120.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:perf-5.10.0-217.0.0.120.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:perf-debuginfo-5.10.0-217.0.0.120.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:python3-perf-5.10.0-217.0.0.120.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:python3-perf-debuginfo-5.10.0-217.0.0.120.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:kernel-5.10.0-217.0.0.120.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:kernel-debuginfo-5.10.0-217.0.0.120.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:kernel-debugsource-5.10.0-217.0.0.120.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:kernel-devel-5.10.0-217.0.0.120.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:kernel-headers-5.10.0-217.0.0.120.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:kernel-source-5.10.0-217.0.0.120.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:kernel-tools-5.10.0-217.0.0.120.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:kernel-tools-debuginfo-5.10.0-217.0.0.120.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:kernel-tools-devel-5.10.0-217.0.0.120.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:perf-5.10.0-217.0.0.120.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:perf-debuginfo-5.10.0-217.0.0.120.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:python3-perf-5.10.0-217.0.0.120.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:python3-perf-debuginfo-5.10.0-217.0.0.120.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:kernel-5.10.0-217.0.0.120.oe2203sp3.src"
					]
				}
			],
			"threats":[
				{
					"details":"Medium",
					"category":"impact"
				}
			],
			"title":"CVE-2024-38538"
		},
		{
			"cve":"CVE-2024-38541",
			"notes":[
				{
					"text":"In the Linux kernel, the following vulnerability has been resolved:\n\nof: module: add buffer overflow check in of_modalias()\n\nIn of_modalias(), if the buffer happens to be too small even for the 1st\nsnprintf() call, the len parameter will become negative and str parameter\n(if not NULL initially) will point beyond the buffer's end. Add the buffer\noverflow check after the 1st snprintf() call and fix such check after the\nstrlen() call (accounting for the terminating NUL char).",
					"category":"description",
					"title":"Vulnerability Description"
				}
			],
			"product_status":{
				"fixed":[
					"openEuler-22.03-LTS-SP3:kernel-5.10.0-217.0.0.120.oe2203sp3.x86_64",
					"openEuler-22.03-LTS-SP3:kernel-debuginfo-5.10.0-217.0.0.120.oe2203sp3.x86_64",
					"openEuler-22.03-LTS-SP3:kernel-debugsource-5.10.0-217.0.0.120.oe2203sp3.x86_64",
					"openEuler-22.03-LTS-SP3:kernel-devel-5.10.0-217.0.0.120.oe2203sp3.x86_64",
					"openEuler-22.03-LTS-SP3:kernel-headers-5.10.0-217.0.0.120.oe2203sp3.x86_64",
					"openEuler-22.03-LTS-SP3:kernel-source-5.10.0-217.0.0.120.oe2203sp3.x86_64",
					"openEuler-22.03-LTS-SP3:kernel-tools-5.10.0-217.0.0.120.oe2203sp3.x86_64",
					"openEuler-22.03-LTS-SP3:kernel-tools-debuginfo-5.10.0-217.0.0.120.oe2203sp3.x86_64",
					"openEuler-22.03-LTS-SP3:kernel-tools-devel-5.10.0-217.0.0.120.oe2203sp3.x86_64",
					"openEuler-22.03-LTS-SP3:perf-5.10.0-217.0.0.120.oe2203sp3.x86_64",
					"openEuler-22.03-LTS-SP3:perf-debuginfo-5.10.0-217.0.0.120.oe2203sp3.x86_64",
					"openEuler-22.03-LTS-SP3:python3-perf-5.10.0-217.0.0.120.oe2203sp3.x86_64",
					"openEuler-22.03-LTS-SP3:python3-perf-debuginfo-5.10.0-217.0.0.120.oe2203sp3.x86_64",
					"openEuler-22.03-LTS-SP3:kernel-5.10.0-217.0.0.120.oe2203sp3.aarch64",
					"openEuler-22.03-LTS-SP3:kernel-debuginfo-5.10.0-217.0.0.120.oe2203sp3.aarch64",
					"openEuler-22.03-LTS-SP3:kernel-debugsource-5.10.0-217.0.0.120.oe2203sp3.aarch64",
					"openEuler-22.03-LTS-SP3:kernel-devel-5.10.0-217.0.0.120.oe2203sp3.aarch64",
					"openEuler-22.03-LTS-SP3:kernel-headers-5.10.0-217.0.0.120.oe2203sp3.aarch64",
					"openEuler-22.03-LTS-SP3:kernel-source-5.10.0-217.0.0.120.oe2203sp3.aarch64",
					"openEuler-22.03-LTS-SP3:kernel-tools-5.10.0-217.0.0.120.oe2203sp3.aarch64",
					"openEuler-22.03-LTS-SP3:kernel-tools-debuginfo-5.10.0-217.0.0.120.oe2203sp3.aarch64",
					"openEuler-22.03-LTS-SP3:kernel-tools-devel-5.10.0-217.0.0.120.oe2203sp3.aarch64",
					"openEuler-22.03-LTS-SP3:perf-5.10.0-217.0.0.120.oe2203sp3.aarch64",
					"openEuler-22.03-LTS-SP3:perf-debuginfo-5.10.0-217.0.0.120.oe2203sp3.aarch64",
					"openEuler-22.03-LTS-SP3:python3-perf-5.10.0-217.0.0.120.oe2203sp3.aarch64",
					"openEuler-22.03-LTS-SP3:python3-perf-debuginfo-5.10.0-217.0.0.120.oe2203sp3.aarch64",
					"openEuler-22.03-LTS-SP3:kernel-5.10.0-217.0.0.120.oe2203sp3.src"
				]
			},
			"remediations":[
				{
					"product_ids":[
						"openEuler-22.03-LTS-SP3:kernel-5.10.0-217.0.0.120.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:kernel-debuginfo-5.10.0-217.0.0.120.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:kernel-debugsource-5.10.0-217.0.0.120.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:kernel-devel-5.10.0-217.0.0.120.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:kernel-headers-5.10.0-217.0.0.120.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:kernel-source-5.10.0-217.0.0.120.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:kernel-tools-5.10.0-217.0.0.120.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:kernel-tools-debuginfo-5.10.0-217.0.0.120.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:kernel-tools-devel-5.10.0-217.0.0.120.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:perf-5.10.0-217.0.0.120.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:perf-debuginfo-5.10.0-217.0.0.120.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:python3-perf-5.10.0-217.0.0.120.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:python3-perf-debuginfo-5.10.0-217.0.0.120.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:kernel-5.10.0-217.0.0.120.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:kernel-debuginfo-5.10.0-217.0.0.120.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:kernel-debugsource-5.10.0-217.0.0.120.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:kernel-devel-5.10.0-217.0.0.120.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:kernel-headers-5.10.0-217.0.0.120.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:kernel-source-5.10.0-217.0.0.120.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:kernel-tools-5.10.0-217.0.0.120.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:kernel-tools-debuginfo-5.10.0-217.0.0.120.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:kernel-tools-devel-5.10.0-217.0.0.120.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:perf-5.10.0-217.0.0.120.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:perf-debuginfo-5.10.0-217.0.0.120.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:python3-perf-5.10.0-217.0.0.120.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:python3-perf-debuginfo-5.10.0-217.0.0.120.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:kernel-5.10.0-217.0.0.120.oe2203sp3.src"
					],
					"details":"kernel security update",
					"category":"vendor_fix",
					"url":"https://www.openeuler.org/zh/security/security-bulletins/detail/?id=openEuler-SA-2024-1792"
				}
			],
			"scores":[
				{
					"cvss_v3":{
						"baseSeverity":"MEDIUM",
						"baseScore":5.5,
						"vectorString":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
						"version":"3.1"
					},
					"products":[
						"openEuler-22.03-LTS-SP3:kernel-5.10.0-217.0.0.120.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:kernel-debuginfo-5.10.0-217.0.0.120.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:kernel-debugsource-5.10.0-217.0.0.120.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:kernel-devel-5.10.0-217.0.0.120.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:kernel-headers-5.10.0-217.0.0.120.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:kernel-source-5.10.0-217.0.0.120.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:kernel-tools-5.10.0-217.0.0.120.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:kernel-tools-debuginfo-5.10.0-217.0.0.120.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:kernel-tools-devel-5.10.0-217.0.0.120.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:perf-5.10.0-217.0.0.120.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:perf-debuginfo-5.10.0-217.0.0.120.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:python3-perf-5.10.0-217.0.0.120.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:python3-perf-debuginfo-5.10.0-217.0.0.120.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:kernel-5.10.0-217.0.0.120.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:kernel-debuginfo-5.10.0-217.0.0.120.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:kernel-debugsource-5.10.0-217.0.0.120.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:kernel-devel-5.10.0-217.0.0.120.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:kernel-headers-5.10.0-217.0.0.120.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:kernel-source-5.10.0-217.0.0.120.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:kernel-tools-5.10.0-217.0.0.120.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:kernel-tools-debuginfo-5.10.0-217.0.0.120.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:kernel-tools-devel-5.10.0-217.0.0.120.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:perf-5.10.0-217.0.0.120.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:perf-debuginfo-5.10.0-217.0.0.120.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:python3-perf-5.10.0-217.0.0.120.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:python3-perf-debuginfo-5.10.0-217.0.0.120.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:kernel-5.10.0-217.0.0.120.oe2203sp3.src"
					]
				}
			],
			"threats":[
				{
					"details":"Medium",
					"category":"impact"
				}
			],
			"title":"CVE-2024-38541"
		},
		{
			"cve":"CVE-2024-38549",
			"notes":[
				{
					"text":"In the Linux kernel, the following vulnerability has been resolved:\n\ndrm/mediatek: Add 0 size check to mtk_drm_gem_obj\n\nAdd a check to mtk_drm_gem_init if we attempt to allocate a GEM object\nof 0 bytes. Currently, no such check exists and the kernel will panic if\na userspace application attempts to allocate a 0x0 GBM buffer.\n\nTested by attempting to allocate a 0x0 GBM buffer on an MT8188 and\nverifying that we now return EINVAL.",
					"category":"description",
					"title":"Vulnerability Description"
				}
			],
			"product_status":{
				"fixed":[
					"openEuler-22.03-LTS-SP3:kernel-5.10.0-217.0.0.120.oe2203sp3.x86_64",
					"openEuler-22.03-LTS-SP3:kernel-debuginfo-5.10.0-217.0.0.120.oe2203sp3.x86_64",
					"openEuler-22.03-LTS-SP3:kernel-debugsource-5.10.0-217.0.0.120.oe2203sp3.x86_64",
					"openEuler-22.03-LTS-SP3:kernel-devel-5.10.0-217.0.0.120.oe2203sp3.x86_64",
					"openEuler-22.03-LTS-SP3:kernel-headers-5.10.0-217.0.0.120.oe2203sp3.x86_64",
					"openEuler-22.03-LTS-SP3:kernel-source-5.10.0-217.0.0.120.oe2203sp3.x86_64",
					"openEuler-22.03-LTS-SP3:kernel-tools-5.10.0-217.0.0.120.oe2203sp3.x86_64",
					"openEuler-22.03-LTS-SP3:kernel-tools-debuginfo-5.10.0-217.0.0.120.oe2203sp3.x86_64",
					"openEuler-22.03-LTS-SP3:kernel-tools-devel-5.10.0-217.0.0.120.oe2203sp3.x86_64",
					"openEuler-22.03-LTS-SP3:perf-5.10.0-217.0.0.120.oe2203sp3.x86_64",
					"openEuler-22.03-LTS-SP3:perf-debuginfo-5.10.0-217.0.0.120.oe2203sp3.x86_64",
					"openEuler-22.03-LTS-SP3:python3-perf-5.10.0-217.0.0.120.oe2203sp3.x86_64",
					"openEuler-22.03-LTS-SP3:python3-perf-debuginfo-5.10.0-217.0.0.120.oe2203sp3.x86_64",
					"openEuler-22.03-LTS-SP3:kernel-5.10.0-217.0.0.120.oe2203sp3.aarch64",
					"openEuler-22.03-LTS-SP3:kernel-debuginfo-5.10.0-217.0.0.120.oe2203sp3.aarch64",
					"openEuler-22.03-LTS-SP3:kernel-debugsource-5.10.0-217.0.0.120.oe2203sp3.aarch64",
					"openEuler-22.03-LTS-SP3:kernel-devel-5.10.0-217.0.0.120.oe2203sp3.aarch64",
					"openEuler-22.03-LTS-SP3:kernel-headers-5.10.0-217.0.0.120.oe2203sp3.aarch64",
					"openEuler-22.03-LTS-SP3:kernel-source-5.10.0-217.0.0.120.oe2203sp3.aarch64",
					"openEuler-22.03-LTS-SP3:kernel-tools-5.10.0-217.0.0.120.oe2203sp3.aarch64",
					"openEuler-22.03-LTS-SP3:kernel-tools-debuginfo-5.10.0-217.0.0.120.oe2203sp3.aarch64",
					"openEuler-22.03-LTS-SP3:kernel-tools-devel-5.10.0-217.0.0.120.oe2203sp3.aarch64",
					"openEuler-22.03-LTS-SP3:perf-5.10.0-217.0.0.120.oe2203sp3.aarch64",
					"openEuler-22.03-LTS-SP3:perf-debuginfo-5.10.0-217.0.0.120.oe2203sp3.aarch64",
					"openEuler-22.03-LTS-SP3:python3-perf-5.10.0-217.0.0.120.oe2203sp3.aarch64",
					"openEuler-22.03-LTS-SP3:python3-perf-debuginfo-5.10.0-217.0.0.120.oe2203sp3.aarch64",
					"openEuler-22.03-LTS-SP3:kernel-5.10.0-217.0.0.120.oe2203sp3.src"
				]
			},
			"remediations":[
				{
					"product_ids":[
						"openEuler-22.03-LTS-SP3:kernel-5.10.0-217.0.0.120.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:kernel-debuginfo-5.10.0-217.0.0.120.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:kernel-debugsource-5.10.0-217.0.0.120.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:kernel-devel-5.10.0-217.0.0.120.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:kernel-headers-5.10.0-217.0.0.120.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:kernel-source-5.10.0-217.0.0.120.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:kernel-tools-5.10.0-217.0.0.120.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:kernel-tools-debuginfo-5.10.0-217.0.0.120.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:kernel-tools-devel-5.10.0-217.0.0.120.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:perf-5.10.0-217.0.0.120.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:perf-debuginfo-5.10.0-217.0.0.120.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:python3-perf-5.10.0-217.0.0.120.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:python3-perf-debuginfo-5.10.0-217.0.0.120.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:kernel-5.10.0-217.0.0.120.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:kernel-debuginfo-5.10.0-217.0.0.120.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:kernel-debugsource-5.10.0-217.0.0.120.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:kernel-devel-5.10.0-217.0.0.120.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:kernel-headers-5.10.0-217.0.0.120.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:kernel-source-5.10.0-217.0.0.120.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:kernel-tools-5.10.0-217.0.0.120.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:kernel-tools-debuginfo-5.10.0-217.0.0.120.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:kernel-tools-devel-5.10.0-217.0.0.120.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:perf-5.10.0-217.0.0.120.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:perf-debuginfo-5.10.0-217.0.0.120.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:python3-perf-5.10.0-217.0.0.120.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:python3-perf-debuginfo-5.10.0-217.0.0.120.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:kernel-5.10.0-217.0.0.120.oe2203sp3.src"
					],
					"details":"kernel security update",
					"category":"vendor_fix",
					"url":"https://www.openeuler.org/zh/security/security-bulletins/detail/?id=openEuler-SA-2024-1792"
				}
			],
			"scores":[
				{
					"cvss_v3":{
						"baseSeverity":"MEDIUM",
						"baseScore":5.5,
						"vectorString":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
						"version":"3.1"
					},
					"products":[
						"openEuler-22.03-LTS-SP3:kernel-5.10.0-217.0.0.120.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:kernel-debuginfo-5.10.0-217.0.0.120.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:kernel-debugsource-5.10.0-217.0.0.120.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:kernel-devel-5.10.0-217.0.0.120.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:kernel-headers-5.10.0-217.0.0.120.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:kernel-source-5.10.0-217.0.0.120.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:kernel-tools-5.10.0-217.0.0.120.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:kernel-tools-debuginfo-5.10.0-217.0.0.120.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:kernel-tools-devel-5.10.0-217.0.0.120.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:perf-5.10.0-217.0.0.120.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:perf-debuginfo-5.10.0-217.0.0.120.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:python3-perf-5.10.0-217.0.0.120.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:python3-perf-debuginfo-5.10.0-217.0.0.120.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:kernel-5.10.0-217.0.0.120.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:kernel-debuginfo-5.10.0-217.0.0.120.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:kernel-debugsource-5.10.0-217.0.0.120.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:kernel-devel-5.10.0-217.0.0.120.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:kernel-headers-5.10.0-217.0.0.120.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:kernel-source-5.10.0-217.0.0.120.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:kernel-tools-5.10.0-217.0.0.120.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:kernel-tools-debuginfo-5.10.0-217.0.0.120.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:kernel-tools-devel-5.10.0-217.0.0.120.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:perf-5.10.0-217.0.0.120.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:perf-debuginfo-5.10.0-217.0.0.120.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:python3-perf-5.10.0-217.0.0.120.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:python3-perf-debuginfo-5.10.0-217.0.0.120.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:kernel-5.10.0-217.0.0.120.oe2203sp3.src"
					]
				}
			],
			"threats":[
				{
					"details":"Medium",
					"category":"impact"
				}
			],
			"title":"CVE-2024-38549"
		},
		{
			"cve":"CVE-2024-38553",
			"notes":[
				{
					"text":"In the Linux kernel, the following vulnerability has been resolved:\n\nnet: fec: remove .ndo_poll_controller to avoid deadlocks\n\nThere is a deadlock issue found in sungem driver, please refer to the\ncommit ac0a230f719b (\"eth: sungem: remove .ndo_poll_controller to avoid\ndeadlocks\"). The root cause of the issue is that netpoll is in atomic\ncontext and disable_irq() is called by .ndo_poll_controller interface\nof sungem driver, however, disable_irq() might sleep. After analyzing\nthe implementation of fec_poll_controller(), the fec driver should have\nthe same issue. Due to the fec driver uses NAPI for TX completions, the\n.ndo_poll_controller is unnecessary to be implemented in the fec driver,\nso fec_poll_controller() can be safely removed.",
					"category":"description",
					"title":"Vulnerability Description"
				}
			],
			"product_status":{
				"fixed":[
					"openEuler-22.03-LTS-SP3:kernel-5.10.0-217.0.0.120.oe2203sp3.x86_64",
					"openEuler-22.03-LTS-SP3:kernel-debuginfo-5.10.0-217.0.0.120.oe2203sp3.x86_64",
					"openEuler-22.03-LTS-SP3:kernel-debugsource-5.10.0-217.0.0.120.oe2203sp3.x86_64",
					"openEuler-22.03-LTS-SP3:kernel-devel-5.10.0-217.0.0.120.oe2203sp3.x86_64",
					"openEuler-22.03-LTS-SP3:kernel-headers-5.10.0-217.0.0.120.oe2203sp3.x86_64",
					"openEuler-22.03-LTS-SP3:kernel-source-5.10.0-217.0.0.120.oe2203sp3.x86_64",
					"openEuler-22.03-LTS-SP3:kernel-tools-5.10.0-217.0.0.120.oe2203sp3.x86_64",
					"openEuler-22.03-LTS-SP3:kernel-tools-debuginfo-5.10.0-217.0.0.120.oe2203sp3.x86_64",
					"openEuler-22.03-LTS-SP3:kernel-tools-devel-5.10.0-217.0.0.120.oe2203sp3.x86_64",
					"openEuler-22.03-LTS-SP3:perf-5.10.0-217.0.0.120.oe2203sp3.x86_64",
					"openEuler-22.03-LTS-SP3:perf-debuginfo-5.10.0-217.0.0.120.oe2203sp3.x86_64",
					"openEuler-22.03-LTS-SP3:python3-perf-5.10.0-217.0.0.120.oe2203sp3.x86_64",
					"openEuler-22.03-LTS-SP3:python3-perf-debuginfo-5.10.0-217.0.0.120.oe2203sp3.x86_64",
					"openEuler-22.03-LTS-SP3:kernel-5.10.0-217.0.0.120.oe2203sp3.aarch64",
					"openEuler-22.03-LTS-SP3:kernel-debuginfo-5.10.0-217.0.0.120.oe2203sp3.aarch64",
					"openEuler-22.03-LTS-SP3:kernel-debugsource-5.10.0-217.0.0.120.oe2203sp3.aarch64",
					"openEuler-22.03-LTS-SP3:kernel-devel-5.10.0-217.0.0.120.oe2203sp3.aarch64",
					"openEuler-22.03-LTS-SP3:kernel-headers-5.10.0-217.0.0.120.oe2203sp3.aarch64",
					"openEuler-22.03-LTS-SP3:kernel-source-5.10.0-217.0.0.120.oe2203sp3.aarch64",
					"openEuler-22.03-LTS-SP3:kernel-tools-5.10.0-217.0.0.120.oe2203sp3.aarch64",
					"openEuler-22.03-LTS-SP3:kernel-tools-debuginfo-5.10.0-217.0.0.120.oe2203sp3.aarch64",
					"openEuler-22.03-LTS-SP3:kernel-tools-devel-5.10.0-217.0.0.120.oe2203sp3.aarch64",
					"openEuler-22.03-LTS-SP3:perf-5.10.0-217.0.0.120.oe2203sp3.aarch64",
					"openEuler-22.03-LTS-SP3:perf-debuginfo-5.10.0-217.0.0.120.oe2203sp3.aarch64",
					"openEuler-22.03-LTS-SP3:python3-perf-5.10.0-217.0.0.120.oe2203sp3.aarch64",
					"openEuler-22.03-LTS-SP3:python3-perf-debuginfo-5.10.0-217.0.0.120.oe2203sp3.aarch64",
					"openEuler-22.03-LTS-SP3:kernel-5.10.0-217.0.0.120.oe2203sp3.src"
				]
			},
			"remediations":[
				{
					"product_ids":[
						"openEuler-22.03-LTS-SP3:kernel-5.10.0-217.0.0.120.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:kernel-debuginfo-5.10.0-217.0.0.120.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:kernel-debugsource-5.10.0-217.0.0.120.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:kernel-devel-5.10.0-217.0.0.120.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:kernel-headers-5.10.0-217.0.0.120.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:kernel-source-5.10.0-217.0.0.120.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:kernel-tools-5.10.0-217.0.0.120.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:kernel-tools-debuginfo-5.10.0-217.0.0.120.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:kernel-tools-devel-5.10.0-217.0.0.120.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:perf-5.10.0-217.0.0.120.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:perf-debuginfo-5.10.0-217.0.0.120.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:python3-perf-5.10.0-217.0.0.120.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:python3-perf-debuginfo-5.10.0-217.0.0.120.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:kernel-5.10.0-217.0.0.120.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:kernel-debuginfo-5.10.0-217.0.0.120.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:kernel-debugsource-5.10.0-217.0.0.120.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:kernel-devel-5.10.0-217.0.0.120.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:kernel-headers-5.10.0-217.0.0.120.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:kernel-source-5.10.0-217.0.0.120.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:kernel-tools-5.10.0-217.0.0.120.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:kernel-tools-debuginfo-5.10.0-217.0.0.120.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:kernel-tools-devel-5.10.0-217.0.0.120.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:perf-5.10.0-217.0.0.120.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:perf-debuginfo-5.10.0-217.0.0.120.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:python3-perf-5.10.0-217.0.0.120.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:python3-perf-debuginfo-5.10.0-217.0.0.120.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:kernel-5.10.0-217.0.0.120.oe2203sp3.src"
					],
					"details":"kernel security update",
					"category":"vendor_fix",
					"url":"https://www.openeuler.org/zh/security/security-bulletins/detail/?id=openEuler-SA-2024-1792"
				}
			],
			"scores":[
				{
					"cvss_v3":{
						"baseSeverity":"MEDIUM",
						"baseScore":4.7,
						"vectorString":"CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H",
						"version":"3.1"
					},
					"products":[
						"openEuler-22.03-LTS-SP3:kernel-5.10.0-217.0.0.120.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:kernel-debuginfo-5.10.0-217.0.0.120.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:kernel-debugsource-5.10.0-217.0.0.120.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:kernel-devel-5.10.0-217.0.0.120.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:kernel-headers-5.10.0-217.0.0.120.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:kernel-source-5.10.0-217.0.0.120.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:kernel-tools-5.10.0-217.0.0.120.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:kernel-tools-debuginfo-5.10.0-217.0.0.120.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:kernel-tools-devel-5.10.0-217.0.0.120.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:perf-5.10.0-217.0.0.120.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:perf-debuginfo-5.10.0-217.0.0.120.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:python3-perf-5.10.0-217.0.0.120.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:python3-perf-debuginfo-5.10.0-217.0.0.120.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:kernel-5.10.0-217.0.0.120.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:kernel-debuginfo-5.10.0-217.0.0.120.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:kernel-debugsource-5.10.0-217.0.0.120.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:kernel-devel-5.10.0-217.0.0.120.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:kernel-headers-5.10.0-217.0.0.120.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:kernel-source-5.10.0-217.0.0.120.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:kernel-tools-5.10.0-217.0.0.120.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:kernel-tools-debuginfo-5.10.0-217.0.0.120.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:kernel-tools-devel-5.10.0-217.0.0.120.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:perf-5.10.0-217.0.0.120.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:perf-debuginfo-5.10.0-217.0.0.120.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:python3-perf-5.10.0-217.0.0.120.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:python3-perf-debuginfo-5.10.0-217.0.0.120.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:kernel-5.10.0-217.0.0.120.oe2203sp3.src"
					]
				}
			],
			"threats":[
				{
					"details":"Medium",
					"category":"impact"
				}
			],
			"title":"CVE-2024-38553"
		},
		{
			"cve":"CVE-2024-38555",
			"notes":[
				{
					"text":"In the Linux kernel, the following vulnerability has been resolved:\n\nnet/mlx5: Discard command completions in internal error\n\nFix use after free when FW completion arrives while device is in\ninternal error state. Avoid calling completion handler in this case,\nsince the device will flush the command interface and trigger all\ncompletions manually.\n\nKernel log:\n------------[ cut here ]------------\nrefcount_t: underflow; use-after-free.\n...\nRIP: 0010:refcount_warn_saturate+0xd8/0xe0\n...\nCall Trace:\n<IRQ>\n? __warn+0x79/0x120\n? refcount_warn_saturate+0xd8/0xe0\n? report_bug+0x17c/0x190\n? handle_bug+0x3c/0x60\n? exc_invalid_op+0x14/0x70\n? asm_exc_invalid_op+0x16/0x20\n? refcount_warn_saturate+0xd8/0xe0\ncmd_ent_put+0x13b/0x160 [mlx5_core]\nmlx5_cmd_comp_handler+0x5f9/0x670 [mlx5_core]\ncmd_comp_notifier+0x1f/0x30 [mlx5_core]\nnotifier_call_chain+0x35/0xb0\natomic_notifier_call_chain+0x16/0x20\nmlx5_eq_async_int+0xf6/0x290 [mlx5_core]\nnotifier_call_chain+0x35/0xb0\natomic_notifier_call_chain+0x16/0x20\nirq_int_handler+0x19/0x30 [mlx5_core]\n__handle_irq_event_percpu+0x4b/0x160\nhandle_irq_event+0x2e/0x80\nhandle_edge_irq+0x98/0x230\n__common_interrupt+0x3b/0xa0\ncommon_interrupt+0x7b/0xa0\n</IRQ>\n<TASK>\nasm_common_interrupt+0x22/0x40",
					"category":"description",
					"title":"Vulnerability Description"
				}
			],
			"product_status":{
				"fixed":[
					"openEuler-22.03-LTS-SP3:kernel-5.10.0-217.0.0.120.oe2203sp3.x86_64",
					"openEuler-22.03-LTS-SP3:kernel-debuginfo-5.10.0-217.0.0.120.oe2203sp3.x86_64",
					"openEuler-22.03-LTS-SP3:kernel-debugsource-5.10.0-217.0.0.120.oe2203sp3.x86_64",
					"openEuler-22.03-LTS-SP3:kernel-devel-5.10.0-217.0.0.120.oe2203sp3.x86_64",
					"openEuler-22.03-LTS-SP3:kernel-headers-5.10.0-217.0.0.120.oe2203sp3.x86_64",
					"openEuler-22.03-LTS-SP3:kernel-source-5.10.0-217.0.0.120.oe2203sp3.x86_64",
					"openEuler-22.03-LTS-SP3:kernel-tools-5.10.0-217.0.0.120.oe2203sp3.x86_64",
					"openEuler-22.03-LTS-SP3:kernel-tools-debuginfo-5.10.0-217.0.0.120.oe2203sp3.x86_64",
					"openEuler-22.03-LTS-SP3:kernel-tools-devel-5.10.0-217.0.0.120.oe2203sp3.x86_64",
					"openEuler-22.03-LTS-SP3:perf-5.10.0-217.0.0.120.oe2203sp3.x86_64",
					"openEuler-22.03-LTS-SP3:perf-debuginfo-5.10.0-217.0.0.120.oe2203sp3.x86_64",
					"openEuler-22.03-LTS-SP3:python3-perf-5.10.0-217.0.0.120.oe2203sp3.x86_64",
					"openEuler-22.03-LTS-SP3:python3-perf-debuginfo-5.10.0-217.0.0.120.oe2203sp3.x86_64",
					"openEuler-22.03-LTS-SP3:kernel-5.10.0-217.0.0.120.oe2203sp3.aarch64",
					"openEuler-22.03-LTS-SP3:kernel-debuginfo-5.10.0-217.0.0.120.oe2203sp3.aarch64",
					"openEuler-22.03-LTS-SP3:kernel-debugsource-5.10.0-217.0.0.120.oe2203sp3.aarch64",
					"openEuler-22.03-LTS-SP3:kernel-devel-5.10.0-217.0.0.120.oe2203sp3.aarch64",
					"openEuler-22.03-LTS-SP3:kernel-headers-5.10.0-217.0.0.120.oe2203sp3.aarch64",
					"openEuler-22.03-LTS-SP3:kernel-source-5.10.0-217.0.0.120.oe2203sp3.aarch64",
					"openEuler-22.03-LTS-SP3:kernel-tools-5.10.0-217.0.0.120.oe2203sp3.aarch64",
					"openEuler-22.03-LTS-SP3:kernel-tools-debuginfo-5.10.0-217.0.0.120.oe2203sp3.aarch64",
					"openEuler-22.03-LTS-SP3:kernel-tools-devel-5.10.0-217.0.0.120.oe2203sp3.aarch64",
					"openEuler-22.03-LTS-SP3:perf-5.10.0-217.0.0.120.oe2203sp3.aarch64",
					"openEuler-22.03-LTS-SP3:perf-debuginfo-5.10.0-217.0.0.120.oe2203sp3.aarch64",
					"openEuler-22.03-LTS-SP3:python3-perf-5.10.0-217.0.0.120.oe2203sp3.aarch64",
					"openEuler-22.03-LTS-SP3:python3-perf-debuginfo-5.10.0-217.0.0.120.oe2203sp3.aarch64",
					"openEuler-22.03-LTS-SP3:kernel-5.10.0-217.0.0.120.oe2203sp3.src"
				]
			},
			"remediations":[
				{
					"product_ids":[
						"openEuler-22.03-LTS-SP3:kernel-5.10.0-217.0.0.120.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:kernel-debuginfo-5.10.0-217.0.0.120.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:kernel-debugsource-5.10.0-217.0.0.120.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:kernel-devel-5.10.0-217.0.0.120.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:kernel-headers-5.10.0-217.0.0.120.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:kernel-source-5.10.0-217.0.0.120.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:kernel-tools-5.10.0-217.0.0.120.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:kernel-tools-debuginfo-5.10.0-217.0.0.120.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:kernel-tools-devel-5.10.0-217.0.0.120.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:perf-5.10.0-217.0.0.120.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:perf-debuginfo-5.10.0-217.0.0.120.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:python3-perf-5.10.0-217.0.0.120.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:python3-perf-debuginfo-5.10.0-217.0.0.120.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:kernel-5.10.0-217.0.0.120.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:kernel-debuginfo-5.10.0-217.0.0.120.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:kernel-debugsource-5.10.0-217.0.0.120.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:kernel-devel-5.10.0-217.0.0.120.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:kernel-headers-5.10.0-217.0.0.120.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:kernel-source-5.10.0-217.0.0.120.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:kernel-tools-5.10.0-217.0.0.120.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:kernel-tools-debuginfo-5.10.0-217.0.0.120.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:kernel-tools-devel-5.10.0-217.0.0.120.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:perf-5.10.0-217.0.0.120.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:perf-debuginfo-5.10.0-217.0.0.120.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:python3-perf-5.10.0-217.0.0.120.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:python3-perf-debuginfo-5.10.0-217.0.0.120.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:kernel-5.10.0-217.0.0.120.oe2203sp3.src"
					],
					"details":"kernel security update",
					"category":"vendor_fix",
					"url":"https://www.openeuler.org/zh/security/security-bulletins/detail/?id=openEuler-SA-2024-1792"
				}
			],
			"scores":[
				{
					"cvss_v3":{
						"baseSeverity":"MEDIUM",
						"baseScore":5.5,
						"vectorString":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
						"version":"3.1"
					},
					"products":[
						"openEuler-22.03-LTS-SP3:kernel-5.10.0-217.0.0.120.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:kernel-debuginfo-5.10.0-217.0.0.120.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:kernel-debugsource-5.10.0-217.0.0.120.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:kernel-devel-5.10.0-217.0.0.120.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:kernel-headers-5.10.0-217.0.0.120.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:kernel-source-5.10.0-217.0.0.120.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:kernel-tools-5.10.0-217.0.0.120.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:kernel-tools-debuginfo-5.10.0-217.0.0.120.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:kernel-tools-devel-5.10.0-217.0.0.120.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:perf-5.10.0-217.0.0.120.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:perf-debuginfo-5.10.0-217.0.0.120.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:python3-perf-5.10.0-217.0.0.120.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:python3-perf-debuginfo-5.10.0-217.0.0.120.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:kernel-5.10.0-217.0.0.120.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:kernel-debuginfo-5.10.0-217.0.0.120.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:kernel-debugsource-5.10.0-217.0.0.120.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:kernel-devel-5.10.0-217.0.0.120.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:kernel-headers-5.10.0-217.0.0.120.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:kernel-source-5.10.0-217.0.0.120.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:kernel-tools-5.10.0-217.0.0.120.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:kernel-tools-debuginfo-5.10.0-217.0.0.120.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:kernel-tools-devel-5.10.0-217.0.0.120.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:perf-5.10.0-217.0.0.120.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:perf-debuginfo-5.10.0-217.0.0.120.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:python3-perf-5.10.0-217.0.0.120.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:python3-perf-debuginfo-5.10.0-217.0.0.120.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:kernel-5.10.0-217.0.0.120.oe2203sp3.src"
					]
				}
			],
			"threats":[
				{
					"details":"Medium",
					"category":"impact"
				}
			],
			"title":"CVE-2024-38555"
		},
		{
			"cve":"CVE-2024-38556",
			"notes":[
				{
					"text":"In the Linux kernel, the following vulnerability has been resolved:\n\nnet/mlx5: Add a timeout to acquire the command queue semaphore\n\nPrevent forced completion handling on an entry that has not yet been\nassigned an index, causing an out of bounds access on idx = -22.\nInstead of waiting indefinitely for the sem, blocking flow now waits for\nindex to be allocated or a sem acquisition timeout before beginning the\ntimer for FW completion.\n\nKernel log example:\nmlx5_core 0000:06:00.0: wait_func_handle_exec_timeout:1128:(pid 185911): cmd[-22]: CREATE_UCTX(0xa04) No done completion",
					"category":"description",
					"title":"Vulnerability Description"
				}
			],
			"product_status":{
				"fixed":[
					"openEuler-22.03-LTS-SP3:kernel-5.10.0-217.0.0.120.oe2203sp3.x86_64",
					"openEuler-22.03-LTS-SP3:kernel-debuginfo-5.10.0-217.0.0.120.oe2203sp3.x86_64",
					"openEuler-22.03-LTS-SP3:kernel-debugsource-5.10.0-217.0.0.120.oe2203sp3.x86_64",
					"openEuler-22.03-LTS-SP3:kernel-devel-5.10.0-217.0.0.120.oe2203sp3.x86_64",
					"openEuler-22.03-LTS-SP3:kernel-headers-5.10.0-217.0.0.120.oe2203sp3.x86_64",
					"openEuler-22.03-LTS-SP3:kernel-source-5.10.0-217.0.0.120.oe2203sp3.x86_64",
					"openEuler-22.03-LTS-SP3:kernel-tools-5.10.0-217.0.0.120.oe2203sp3.x86_64",
					"openEuler-22.03-LTS-SP3:kernel-tools-debuginfo-5.10.0-217.0.0.120.oe2203sp3.x86_64",
					"openEuler-22.03-LTS-SP3:kernel-tools-devel-5.10.0-217.0.0.120.oe2203sp3.x86_64",
					"openEuler-22.03-LTS-SP3:perf-5.10.0-217.0.0.120.oe2203sp3.x86_64",
					"openEuler-22.03-LTS-SP3:perf-debuginfo-5.10.0-217.0.0.120.oe2203sp3.x86_64",
					"openEuler-22.03-LTS-SP3:python3-perf-5.10.0-217.0.0.120.oe2203sp3.x86_64",
					"openEuler-22.03-LTS-SP3:python3-perf-debuginfo-5.10.0-217.0.0.120.oe2203sp3.x86_64",
					"openEuler-22.03-LTS-SP3:kernel-5.10.0-217.0.0.120.oe2203sp3.aarch64",
					"openEuler-22.03-LTS-SP3:kernel-debuginfo-5.10.0-217.0.0.120.oe2203sp3.aarch64",
					"openEuler-22.03-LTS-SP3:kernel-debugsource-5.10.0-217.0.0.120.oe2203sp3.aarch64",
					"openEuler-22.03-LTS-SP3:kernel-devel-5.10.0-217.0.0.120.oe2203sp3.aarch64",
					"openEuler-22.03-LTS-SP3:kernel-headers-5.10.0-217.0.0.120.oe2203sp3.aarch64",
					"openEuler-22.03-LTS-SP3:kernel-source-5.10.0-217.0.0.120.oe2203sp3.aarch64",
					"openEuler-22.03-LTS-SP3:kernel-tools-5.10.0-217.0.0.120.oe2203sp3.aarch64",
					"openEuler-22.03-LTS-SP3:kernel-tools-debuginfo-5.10.0-217.0.0.120.oe2203sp3.aarch64",
					"openEuler-22.03-LTS-SP3:kernel-tools-devel-5.10.0-217.0.0.120.oe2203sp3.aarch64",
					"openEuler-22.03-LTS-SP3:perf-5.10.0-217.0.0.120.oe2203sp3.aarch64",
					"openEuler-22.03-LTS-SP3:perf-debuginfo-5.10.0-217.0.0.120.oe2203sp3.aarch64",
					"openEuler-22.03-LTS-SP3:python3-perf-5.10.0-217.0.0.120.oe2203sp3.aarch64",
					"openEuler-22.03-LTS-SP3:python3-perf-debuginfo-5.10.0-217.0.0.120.oe2203sp3.aarch64",
					"openEuler-22.03-LTS-SP3:kernel-5.10.0-217.0.0.120.oe2203sp3.src"
				]
			},
			"remediations":[
				{
					"product_ids":[
						"openEuler-22.03-LTS-SP3:kernel-5.10.0-217.0.0.120.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:kernel-debuginfo-5.10.0-217.0.0.120.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:kernel-debugsource-5.10.0-217.0.0.120.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:kernel-devel-5.10.0-217.0.0.120.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:kernel-headers-5.10.0-217.0.0.120.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:kernel-source-5.10.0-217.0.0.120.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:kernel-tools-5.10.0-217.0.0.120.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:kernel-tools-debuginfo-5.10.0-217.0.0.120.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:kernel-tools-devel-5.10.0-217.0.0.120.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:perf-5.10.0-217.0.0.120.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:perf-debuginfo-5.10.0-217.0.0.120.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:python3-perf-5.10.0-217.0.0.120.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:python3-perf-debuginfo-5.10.0-217.0.0.120.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:kernel-5.10.0-217.0.0.120.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:kernel-debuginfo-5.10.0-217.0.0.120.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:kernel-debugsource-5.10.0-217.0.0.120.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:kernel-devel-5.10.0-217.0.0.120.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:kernel-headers-5.10.0-217.0.0.120.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:kernel-source-5.10.0-217.0.0.120.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:kernel-tools-5.10.0-217.0.0.120.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:kernel-tools-debuginfo-5.10.0-217.0.0.120.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:kernel-tools-devel-5.10.0-217.0.0.120.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:perf-5.10.0-217.0.0.120.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:perf-debuginfo-5.10.0-217.0.0.120.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:python3-perf-5.10.0-217.0.0.120.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:python3-perf-debuginfo-5.10.0-217.0.0.120.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:kernel-5.10.0-217.0.0.120.oe2203sp3.src"
					],
					"details":"kernel security update",
					"category":"vendor_fix",
					"url":"https://www.openeuler.org/zh/security/security-bulletins/detail/?id=openEuler-SA-2024-1792"
				}
			],
			"scores":[
				{
					"cvss_v3":{
						"baseSeverity":"MEDIUM",
						"baseScore":5.5,
						"vectorString":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
						"version":"3.1"
					},
					"products":[
						"openEuler-22.03-LTS-SP3:kernel-5.10.0-217.0.0.120.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:kernel-debuginfo-5.10.0-217.0.0.120.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:kernel-debugsource-5.10.0-217.0.0.120.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:kernel-devel-5.10.0-217.0.0.120.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:kernel-headers-5.10.0-217.0.0.120.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:kernel-source-5.10.0-217.0.0.120.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:kernel-tools-5.10.0-217.0.0.120.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:kernel-tools-debuginfo-5.10.0-217.0.0.120.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:kernel-tools-devel-5.10.0-217.0.0.120.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:perf-5.10.0-217.0.0.120.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:perf-debuginfo-5.10.0-217.0.0.120.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:python3-perf-5.10.0-217.0.0.120.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:python3-perf-debuginfo-5.10.0-217.0.0.120.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:kernel-5.10.0-217.0.0.120.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:kernel-debuginfo-5.10.0-217.0.0.120.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:kernel-debugsource-5.10.0-217.0.0.120.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:kernel-devel-5.10.0-217.0.0.120.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:kernel-headers-5.10.0-217.0.0.120.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:kernel-source-5.10.0-217.0.0.120.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:kernel-tools-5.10.0-217.0.0.120.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:kernel-tools-debuginfo-5.10.0-217.0.0.120.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:kernel-tools-devel-5.10.0-217.0.0.120.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:perf-5.10.0-217.0.0.120.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:perf-debuginfo-5.10.0-217.0.0.120.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:python3-perf-5.10.0-217.0.0.120.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:python3-perf-debuginfo-5.10.0-217.0.0.120.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:kernel-5.10.0-217.0.0.120.oe2203sp3.src"
					]
				}
			],
			"threats":[
				{
					"details":"Medium",
					"category":"impact"
				}
			],
			"title":"CVE-2024-38556"
		},
		{
			"cve":"CVE-2024-38564",
			"notes":[
				{
					"text":"In the Linux kernel, the following vulnerability has been resolved:\n\nbpf: Add BPF_PROG_TYPE_CGROUP_SKB attach type enforcement in BPF_LINK_CREATE\n\nbpf_prog_attach uses attach_type_to_prog_type to enforce proper\nattach type for BPF_PROG_TYPE_CGROUP_SKB. link_create uses\nbpf_prog_get and relies on bpf_prog_attach_check_attach_type\nto properly verify prog_type <> attach_type association.\n\nAdd missing attach_type enforcement for the link_create case.\nOtherwise, it's currently possible to attach cgroup_skb prog\ntypes to other cgroup hooks.",
					"category":"description",
					"title":"Vulnerability Description"
				}
			],
			"product_status":{
				"fixed":[
					"openEuler-22.03-LTS-SP3:kernel-5.10.0-217.0.0.120.oe2203sp3.x86_64",
					"openEuler-22.03-LTS-SP3:kernel-debuginfo-5.10.0-217.0.0.120.oe2203sp3.x86_64",
					"openEuler-22.03-LTS-SP3:kernel-debugsource-5.10.0-217.0.0.120.oe2203sp3.x86_64",
					"openEuler-22.03-LTS-SP3:kernel-devel-5.10.0-217.0.0.120.oe2203sp3.x86_64",
					"openEuler-22.03-LTS-SP3:kernel-headers-5.10.0-217.0.0.120.oe2203sp3.x86_64",
					"openEuler-22.03-LTS-SP3:kernel-source-5.10.0-217.0.0.120.oe2203sp3.x86_64",
					"openEuler-22.03-LTS-SP3:kernel-tools-5.10.0-217.0.0.120.oe2203sp3.x86_64",
					"openEuler-22.03-LTS-SP3:kernel-tools-debuginfo-5.10.0-217.0.0.120.oe2203sp3.x86_64",
					"openEuler-22.03-LTS-SP3:kernel-tools-devel-5.10.0-217.0.0.120.oe2203sp3.x86_64",
					"openEuler-22.03-LTS-SP3:perf-5.10.0-217.0.0.120.oe2203sp3.x86_64",
					"openEuler-22.03-LTS-SP3:perf-debuginfo-5.10.0-217.0.0.120.oe2203sp3.x86_64",
					"openEuler-22.03-LTS-SP3:python3-perf-5.10.0-217.0.0.120.oe2203sp3.x86_64",
					"openEuler-22.03-LTS-SP3:python3-perf-debuginfo-5.10.0-217.0.0.120.oe2203sp3.x86_64",
					"openEuler-22.03-LTS-SP3:kernel-5.10.0-217.0.0.120.oe2203sp3.aarch64",
					"openEuler-22.03-LTS-SP3:kernel-debuginfo-5.10.0-217.0.0.120.oe2203sp3.aarch64",
					"openEuler-22.03-LTS-SP3:kernel-debugsource-5.10.0-217.0.0.120.oe2203sp3.aarch64",
					"openEuler-22.03-LTS-SP3:kernel-devel-5.10.0-217.0.0.120.oe2203sp3.aarch64",
					"openEuler-22.03-LTS-SP3:kernel-headers-5.10.0-217.0.0.120.oe2203sp3.aarch64",
					"openEuler-22.03-LTS-SP3:kernel-source-5.10.0-217.0.0.120.oe2203sp3.aarch64",
					"openEuler-22.03-LTS-SP3:kernel-tools-5.10.0-217.0.0.120.oe2203sp3.aarch64",
					"openEuler-22.03-LTS-SP3:kernel-tools-debuginfo-5.10.0-217.0.0.120.oe2203sp3.aarch64",
					"openEuler-22.03-LTS-SP3:kernel-tools-devel-5.10.0-217.0.0.120.oe2203sp3.aarch64",
					"openEuler-22.03-LTS-SP3:perf-5.10.0-217.0.0.120.oe2203sp3.aarch64",
					"openEuler-22.03-LTS-SP3:perf-debuginfo-5.10.0-217.0.0.120.oe2203sp3.aarch64",
					"openEuler-22.03-LTS-SP3:python3-perf-5.10.0-217.0.0.120.oe2203sp3.aarch64",
					"openEuler-22.03-LTS-SP3:python3-perf-debuginfo-5.10.0-217.0.0.120.oe2203sp3.aarch64",
					"openEuler-22.03-LTS-SP3:kernel-5.10.0-217.0.0.120.oe2203sp3.src"
				]
			},
			"remediations":[
				{
					"product_ids":[
						"openEuler-22.03-LTS-SP3:kernel-5.10.0-217.0.0.120.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:kernel-debuginfo-5.10.0-217.0.0.120.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:kernel-debugsource-5.10.0-217.0.0.120.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:kernel-devel-5.10.0-217.0.0.120.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:kernel-headers-5.10.0-217.0.0.120.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:kernel-source-5.10.0-217.0.0.120.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:kernel-tools-5.10.0-217.0.0.120.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:kernel-tools-debuginfo-5.10.0-217.0.0.120.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:kernel-tools-devel-5.10.0-217.0.0.120.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:perf-5.10.0-217.0.0.120.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:perf-debuginfo-5.10.0-217.0.0.120.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:python3-perf-5.10.0-217.0.0.120.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:python3-perf-debuginfo-5.10.0-217.0.0.120.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:kernel-5.10.0-217.0.0.120.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:kernel-debuginfo-5.10.0-217.0.0.120.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:kernel-debugsource-5.10.0-217.0.0.120.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:kernel-devel-5.10.0-217.0.0.120.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:kernel-headers-5.10.0-217.0.0.120.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:kernel-source-5.10.0-217.0.0.120.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:kernel-tools-5.10.0-217.0.0.120.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:kernel-tools-debuginfo-5.10.0-217.0.0.120.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:kernel-tools-devel-5.10.0-217.0.0.120.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:perf-5.10.0-217.0.0.120.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:perf-debuginfo-5.10.0-217.0.0.120.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:python3-perf-5.10.0-217.0.0.120.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:python3-perf-debuginfo-5.10.0-217.0.0.120.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:kernel-5.10.0-217.0.0.120.oe2203sp3.src"
					],
					"details":"kernel security update",
					"category":"vendor_fix",
					"url":"https://www.openeuler.org/zh/security/security-bulletins/detail/?id=openEuler-SA-2024-1792"
				}
			],
			"scores":[
				{
					"cvss_v3":{
						"baseSeverity":"HIGH",
						"baseScore":7.1,
						"vectorString":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H",
						"version":"3.1"
					},
					"products":[
						"openEuler-22.03-LTS-SP3:kernel-5.10.0-217.0.0.120.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:kernel-debuginfo-5.10.0-217.0.0.120.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:kernel-debugsource-5.10.0-217.0.0.120.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:kernel-devel-5.10.0-217.0.0.120.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:kernel-headers-5.10.0-217.0.0.120.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:kernel-source-5.10.0-217.0.0.120.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:kernel-tools-5.10.0-217.0.0.120.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:kernel-tools-debuginfo-5.10.0-217.0.0.120.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:kernel-tools-devel-5.10.0-217.0.0.120.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:perf-5.10.0-217.0.0.120.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:perf-debuginfo-5.10.0-217.0.0.120.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:python3-perf-5.10.0-217.0.0.120.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:python3-perf-debuginfo-5.10.0-217.0.0.120.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:kernel-5.10.0-217.0.0.120.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:kernel-debuginfo-5.10.0-217.0.0.120.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:kernel-debugsource-5.10.0-217.0.0.120.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:kernel-devel-5.10.0-217.0.0.120.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:kernel-headers-5.10.0-217.0.0.120.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:kernel-source-5.10.0-217.0.0.120.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:kernel-tools-5.10.0-217.0.0.120.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:kernel-tools-debuginfo-5.10.0-217.0.0.120.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:kernel-tools-devel-5.10.0-217.0.0.120.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:perf-5.10.0-217.0.0.120.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:perf-debuginfo-5.10.0-217.0.0.120.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:python3-perf-5.10.0-217.0.0.120.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:python3-perf-debuginfo-5.10.0-217.0.0.120.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:kernel-5.10.0-217.0.0.120.oe2203sp3.src"
					]
				}
			],
			"threats":[
				{
					"details":"High",
					"category":"impact"
				}
			],
			"title":"CVE-2024-38564"
		},
		{
			"cve":"CVE-2024-38587",
			"notes":[
				{
					"text":"In the Linux kernel, the following vulnerability has been resolved:\n\nspeakup: Fix sizeof() vs ARRAY_SIZE() bug\n\nThe \"buf\" pointer is an array of u16 values.  This code should be\nusing ARRAY_SIZE() (which is 256) instead of sizeof() (which is 512),\notherwise it can the still got out of bounds.",
					"category":"description",
					"title":"Vulnerability Description"
				}
			],
			"product_status":{
				"fixed":[
					"openEuler-22.03-LTS-SP3:kernel-5.10.0-217.0.0.120.oe2203sp3.x86_64",
					"openEuler-22.03-LTS-SP3:kernel-debuginfo-5.10.0-217.0.0.120.oe2203sp3.x86_64",
					"openEuler-22.03-LTS-SP3:kernel-debugsource-5.10.0-217.0.0.120.oe2203sp3.x86_64",
					"openEuler-22.03-LTS-SP3:kernel-devel-5.10.0-217.0.0.120.oe2203sp3.x86_64",
					"openEuler-22.03-LTS-SP3:kernel-headers-5.10.0-217.0.0.120.oe2203sp3.x86_64",
					"openEuler-22.03-LTS-SP3:kernel-source-5.10.0-217.0.0.120.oe2203sp3.x86_64",
					"openEuler-22.03-LTS-SP3:kernel-tools-5.10.0-217.0.0.120.oe2203sp3.x86_64",
					"openEuler-22.03-LTS-SP3:kernel-tools-debuginfo-5.10.0-217.0.0.120.oe2203sp3.x86_64",
					"openEuler-22.03-LTS-SP3:kernel-tools-devel-5.10.0-217.0.0.120.oe2203sp3.x86_64",
					"openEuler-22.03-LTS-SP3:perf-5.10.0-217.0.0.120.oe2203sp3.x86_64",
					"openEuler-22.03-LTS-SP3:perf-debuginfo-5.10.0-217.0.0.120.oe2203sp3.x86_64",
					"openEuler-22.03-LTS-SP3:python3-perf-5.10.0-217.0.0.120.oe2203sp3.x86_64",
					"openEuler-22.03-LTS-SP3:python3-perf-debuginfo-5.10.0-217.0.0.120.oe2203sp3.x86_64",
					"openEuler-22.03-LTS-SP3:kernel-5.10.0-217.0.0.120.oe2203sp3.aarch64",
					"openEuler-22.03-LTS-SP3:kernel-debuginfo-5.10.0-217.0.0.120.oe2203sp3.aarch64",
					"openEuler-22.03-LTS-SP3:kernel-debugsource-5.10.0-217.0.0.120.oe2203sp3.aarch64",
					"openEuler-22.03-LTS-SP3:kernel-devel-5.10.0-217.0.0.120.oe2203sp3.aarch64",
					"openEuler-22.03-LTS-SP3:kernel-headers-5.10.0-217.0.0.120.oe2203sp3.aarch64",
					"openEuler-22.03-LTS-SP3:kernel-source-5.10.0-217.0.0.120.oe2203sp3.aarch64",
					"openEuler-22.03-LTS-SP3:kernel-tools-5.10.0-217.0.0.120.oe2203sp3.aarch64",
					"openEuler-22.03-LTS-SP3:kernel-tools-debuginfo-5.10.0-217.0.0.120.oe2203sp3.aarch64",
					"openEuler-22.03-LTS-SP3:kernel-tools-devel-5.10.0-217.0.0.120.oe2203sp3.aarch64",
					"openEuler-22.03-LTS-SP3:perf-5.10.0-217.0.0.120.oe2203sp3.aarch64",
					"openEuler-22.03-LTS-SP3:perf-debuginfo-5.10.0-217.0.0.120.oe2203sp3.aarch64",
					"openEuler-22.03-LTS-SP3:python3-perf-5.10.0-217.0.0.120.oe2203sp3.aarch64",
					"openEuler-22.03-LTS-SP3:python3-perf-debuginfo-5.10.0-217.0.0.120.oe2203sp3.aarch64",
					"openEuler-22.03-LTS-SP3:kernel-5.10.0-217.0.0.120.oe2203sp3.src"
				]
			},
			"remediations":[
				{
					"product_ids":[
						"openEuler-22.03-LTS-SP3:kernel-5.10.0-217.0.0.120.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:kernel-debuginfo-5.10.0-217.0.0.120.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:kernel-debugsource-5.10.0-217.0.0.120.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:kernel-devel-5.10.0-217.0.0.120.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:kernel-headers-5.10.0-217.0.0.120.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:kernel-source-5.10.0-217.0.0.120.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:kernel-tools-5.10.0-217.0.0.120.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:kernel-tools-debuginfo-5.10.0-217.0.0.120.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:kernel-tools-devel-5.10.0-217.0.0.120.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:perf-5.10.0-217.0.0.120.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:perf-debuginfo-5.10.0-217.0.0.120.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:python3-perf-5.10.0-217.0.0.120.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:python3-perf-debuginfo-5.10.0-217.0.0.120.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:kernel-5.10.0-217.0.0.120.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:kernel-debuginfo-5.10.0-217.0.0.120.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:kernel-debugsource-5.10.0-217.0.0.120.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:kernel-devel-5.10.0-217.0.0.120.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:kernel-headers-5.10.0-217.0.0.120.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:kernel-source-5.10.0-217.0.0.120.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:kernel-tools-5.10.0-217.0.0.120.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:kernel-tools-debuginfo-5.10.0-217.0.0.120.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:kernel-tools-devel-5.10.0-217.0.0.120.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:perf-5.10.0-217.0.0.120.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:perf-debuginfo-5.10.0-217.0.0.120.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:python3-perf-5.10.0-217.0.0.120.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:python3-perf-debuginfo-5.10.0-217.0.0.120.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:kernel-5.10.0-217.0.0.120.oe2203sp3.src"
					],
					"details":"kernel security update",
					"category":"vendor_fix",
					"url":"https://www.openeuler.org/zh/security/security-bulletins/detail/?id=openEuler-SA-2024-1792"
				}
			],
			"scores":[
				{
					"cvss_v3":{
						"baseSeverity":"MEDIUM",
						"baseScore":6.1,
						"vectorString":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:L",
						"version":"3.1"
					},
					"products":[
						"openEuler-22.03-LTS-SP3:kernel-5.10.0-217.0.0.120.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:kernel-debuginfo-5.10.0-217.0.0.120.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:kernel-debugsource-5.10.0-217.0.0.120.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:kernel-devel-5.10.0-217.0.0.120.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:kernel-headers-5.10.0-217.0.0.120.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:kernel-source-5.10.0-217.0.0.120.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:kernel-tools-5.10.0-217.0.0.120.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:kernel-tools-debuginfo-5.10.0-217.0.0.120.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:kernel-tools-devel-5.10.0-217.0.0.120.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:perf-5.10.0-217.0.0.120.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:perf-debuginfo-5.10.0-217.0.0.120.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:python3-perf-5.10.0-217.0.0.120.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:python3-perf-debuginfo-5.10.0-217.0.0.120.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:kernel-5.10.0-217.0.0.120.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:kernel-debuginfo-5.10.0-217.0.0.120.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:kernel-debugsource-5.10.0-217.0.0.120.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:kernel-devel-5.10.0-217.0.0.120.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:kernel-headers-5.10.0-217.0.0.120.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:kernel-source-5.10.0-217.0.0.120.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:kernel-tools-5.10.0-217.0.0.120.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:kernel-tools-debuginfo-5.10.0-217.0.0.120.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:kernel-tools-devel-5.10.0-217.0.0.120.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:perf-5.10.0-217.0.0.120.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:perf-debuginfo-5.10.0-217.0.0.120.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:python3-perf-5.10.0-217.0.0.120.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:python3-perf-debuginfo-5.10.0-217.0.0.120.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:kernel-5.10.0-217.0.0.120.oe2203sp3.src"
					]
				}
			],
			"threats":[
				{
					"details":"Medium",
					"category":"impact"
				}
			],
			"title":"CVE-2024-38587"
		},
		{
			"cve":"CVE-2024-38599",
			"notes":[
				{
					"text":"In the Linux kernel, the following vulnerability has been resolved:\n\njffs2: prevent xattr node from overflowing the eraseblock\n\nAdd a check to make sure that the requested xattr node size is no larger\nthan the eraseblock minus the cleanmarker.\n\nUnlike the usual inode nodes, the xattr nodes aren't split into parts\nand spread across multiple eraseblocks, which means that a xattr node\nmust not occupy more than one eraseblock. If the requested xattr value is\ntoo large, the xattr node can spill onto the next eraseblock, overwriting\nthe nodes and causing errors such as:\n\njffs2: argh. node added in wrong place at 0x0000b050(2)\njffs2: nextblock 0x0000a000, expected at 0000b00c\njffs2: error: (823) do_verify_xattr_datum: node CRC failed at 0x01e050,\nread=0xfc892c93, calc=0x000000\njffs2: notice: (823) jffs2_get_inode_nodes: Node header CRC failed\nat 0x01e00c. {848f,2fc4,0fef511f,59a3d171}\njffs2: Node at 0x0000000c with length 0x00001044 would run over the\nend of the erase block\njffs2: Perhaps the file system was created with the wrong erase size?\njffs2: jffs2_scan_eraseblock(): Magic bitmask 0x1985 not found\nat 0x00000010: 0x1044 instead\n\nThis breaks the filesystem and can lead to KASAN crashes such as:\n\nBUG: KASAN: slab-out-of-bounds in jffs2_sum_add_kvec+0x125e/0x15d0\nRead of size 4 at addr ffff88802c31e914 by task repro/830\nCPU: 0 PID: 830 Comm: repro Not tainted 6.9.0-rc3+ #1\nHardware name: QEMU Standard PC (i440FX + PIIX, 1996),\nBIOS Arch Linux 1.16.3-1-1 04/01/2014\nCall Trace:\n <TASK>\n dump_stack_lvl+0xc6/0x120\n print_report+0xc4/0x620\n ? __virt_addr_valid+0x308/0x5b0\n kasan_report+0xc1/0xf0\n ? jffs2_sum_add_kvec+0x125e/0x15d0\n ? jffs2_sum_add_kvec+0x125e/0x15d0\n jffs2_sum_add_kvec+0x125e/0x15d0\n jffs2_flash_direct_writev+0xa8/0xd0\n jffs2_flash_writev+0x9c9/0xef0\n ? __x64_sys_setxattr+0xc4/0x160\n ? do_syscall_64+0x69/0x140\n ? entry_SYSCALL_64_after_hwframe+0x76/0x7e\n [...]\n\nFound by Linux Verification Center (linuxtesting.org) with Syzkaller.",
					"category":"description",
					"title":"Vulnerability Description"
				}
			],
			"product_status":{
				"fixed":[
					"openEuler-22.03-LTS-SP3:kernel-5.10.0-217.0.0.120.oe2203sp3.x86_64",
					"openEuler-22.03-LTS-SP3:kernel-debuginfo-5.10.0-217.0.0.120.oe2203sp3.x86_64",
					"openEuler-22.03-LTS-SP3:kernel-debugsource-5.10.0-217.0.0.120.oe2203sp3.x86_64",
					"openEuler-22.03-LTS-SP3:kernel-devel-5.10.0-217.0.0.120.oe2203sp3.x86_64",
					"openEuler-22.03-LTS-SP3:kernel-headers-5.10.0-217.0.0.120.oe2203sp3.x86_64",
					"openEuler-22.03-LTS-SP3:kernel-source-5.10.0-217.0.0.120.oe2203sp3.x86_64",
					"openEuler-22.03-LTS-SP3:kernel-tools-5.10.0-217.0.0.120.oe2203sp3.x86_64",
					"openEuler-22.03-LTS-SP3:kernel-tools-debuginfo-5.10.0-217.0.0.120.oe2203sp3.x86_64",
					"openEuler-22.03-LTS-SP3:kernel-tools-devel-5.10.0-217.0.0.120.oe2203sp3.x86_64",
					"openEuler-22.03-LTS-SP3:perf-5.10.0-217.0.0.120.oe2203sp3.x86_64",
					"openEuler-22.03-LTS-SP3:perf-debuginfo-5.10.0-217.0.0.120.oe2203sp3.x86_64",
					"openEuler-22.03-LTS-SP3:python3-perf-5.10.0-217.0.0.120.oe2203sp3.x86_64",
					"openEuler-22.03-LTS-SP3:python3-perf-debuginfo-5.10.0-217.0.0.120.oe2203sp3.x86_64",
					"openEuler-22.03-LTS-SP3:kernel-5.10.0-217.0.0.120.oe2203sp3.aarch64",
					"openEuler-22.03-LTS-SP3:kernel-debuginfo-5.10.0-217.0.0.120.oe2203sp3.aarch64",
					"openEuler-22.03-LTS-SP3:kernel-debugsource-5.10.0-217.0.0.120.oe2203sp3.aarch64",
					"openEuler-22.03-LTS-SP3:kernel-devel-5.10.0-217.0.0.120.oe2203sp3.aarch64",
					"openEuler-22.03-LTS-SP3:kernel-headers-5.10.0-217.0.0.120.oe2203sp3.aarch64",
					"openEuler-22.03-LTS-SP3:kernel-source-5.10.0-217.0.0.120.oe2203sp3.aarch64",
					"openEuler-22.03-LTS-SP3:kernel-tools-5.10.0-217.0.0.120.oe2203sp3.aarch64",
					"openEuler-22.03-LTS-SP3:kernel-tools-debuginfo-5.10.0-217.0.0.120.oe2203sp3.aarch64",
					"openEuler-22.03-LTS-SP3:kernel-tools-devel-5.10.0-217.0.0.120.oe2203sp3.aarch64",
					"openEuler-22.03-LTS-SP3:perf-5.10.0-217.0.0.120.oe2203sp3.aarch64",
					"openEuler-22.03-LTS-SP3:perf-debuginfo-5.10.0-217.0.0.120.oe2203sp3.aarch64",
					"openEuler-22.03-LTS-SP3:python3-perf-5.10.0-217.0.0.120.oe2203sp3.aarch64",
					"openEuler-22.03-LTS-SP3:python3-perf-debuginfo-5.10.0-217.0.0.120.oe2203sp3.aarch64",
					"openEuler-22.03-LTS-SP3:kernel-5.10.0-217.0.0.120.oe2203sp3.src"
				]
			},
			"remediations":[
				{
					"product_ids":[
						"openEuler-22.03-LTS-SP3:kernel-5.10.0-217.0.0.120.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:kernel-debuginfo-5.10.0-217.0.0.120.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:kernel-debugsource-5.10.0-217.0.0.120.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:kernel-devel-5.10.0-217.0.0.120.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:kernel-headers-5.10.0-217.0.0.120.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:kernel-source-5.10.0-217.0.0.120.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:kernel-tools-5.10.0-217.0.0.120.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:kernel-tools-debuginfo-5.10.0-217.0.0.120.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:kernel-tools-devel-5.10.0-217.0.0.120.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:perf-5.10.0-217.0.0.120.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:perf-debuginfo-5.10.0-217.0.0.120.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:python3-perf-5.10.0-217.0.0.120.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:python3-perf-debuginfo-5.10.0-217.0.0.120.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:kernel-5.10.0-217.0.0.120.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:kernel-debuginfo-5.10.0-217.0.0.120.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:kernel-debugsource-5.10.0-217.0.0.120.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:kernel-devel-5.10.0-217.0.0.120.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:kernel-headers-5.10.0-217.0.0.120.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:kernel-source-5.10.0-217.0.0.120.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:kernel-tools-5.10.0-217.0.0.120.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:kernel-tools-debuginfo-5.10.0-217.0.0.120.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:kernel-tools-devel-5.10.0-217.0.0.120.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:perf-5.10.0-217.0.0.120.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:perf-debuginfo-5.10.0-217.0.0.120.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:python3-perf-5.10.0-217.0.0.120.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:python3-perf-debuginfo-5.10.0-217.0.0.120.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:kernel-5.10.0-217.0.0.120.oe2203sp3.src"
					],
					"details":"kernel security update",
					"category":"vendor_fix",
					"url":"https://www.openeuler.org/zh/security/security-bulletins/detail/?id=openEuler-SA-2024-1792"
				}
			],
			"scores":[
				{
					"cvss_v3":{
						"baseSeverity":"HIGH",
						"baseScore":7.1,
						"vectorString":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H",
						"version":"3.1"
					},
					"products":[
						"openEuler-22.03-LTS-SP3:kernel-5.10.0-217.0.0.120.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:kernel-debuginfo-5.10.0-217.0.0.120.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:kernel-debugsource-5.10.0-217.0.0.120.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:kernel-devel-5.10.0-217.0.0.120.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:kernel-headers-5.10.0-217.0.0.120.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:kernel-source-5.10.0-217.0.0.120.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:kernel-tools-5.10.0-217.0.0.120.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:kernel-tools-debuginfo-5.10.0-217.0.0.120.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:kernel-tools-devel-5.10.0-217.0.0.120.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:perf-5.10.0-217.0.0.120.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:perf-debuginfo-5.10.0-217.0.0.120.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:python3-perf-5.10.0-217.0.0.120.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:python3-perf-debuginfo-5.10.0-217.0.0.120.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:kernel-5.10.0-217.0.0.120.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:kernel-debuginfo-5.10.0-217.0.0.120.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:kernel-debugsource-5.10.0-217.0.0.120.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:kernel-devel-5.10.0-217.0.0.120.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:kernel-headers-5.10.0-217.0.0.120.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:kernel-source-5.10.0-217.0.0.120.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:kernel-tools-5.10.0-217.0.0.120.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:kernel-tools-debuginfo-5.10.0-217.0.0.120.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:kernel-tools-devel-5.10.0-217.0.0.120.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:perf-5.10.0-217.0.0.120.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:perf-debuginfo-5.10.0-217.0.0.120.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:python3-perf-5.10.0-217.0.0.120.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:python3-perf-debuginfo-5.10.0-217.0.0.120.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:kernel-5.10.0-217.0.0.120.oe2203sp3.src"
					]
				}
			],
			"threats":[
				{
					"details":"High",
					"category":"impact"
				}
			],
			"title":"CVE-2024-38599"
		},
		{
			"cve":"CVE-2024-38624",
			"notes":[
				{
					"text":"In the Linux kernel, the following vulnerability has been resolved:\n\nfs/ntfs3: Use 64 bit variable to avoid 32 bit overflow\n\nFor example, in the expression:\n\tvbo = 2 * vbo + skip",
					"category":"description",
					"title":"Vulnerability Description"
				}
			],
			"product_status":{
				"fixed":[
					"openEuler-22.03-LTS-SP3:kernel-5.10.0-217.0.0.120.oe2203sp3.x86_64",
					"openEuler-22.03-LTS-SP3:kernel-debuginfo-5.10.0-217.0.0.120.oe2203sp3.x86_64",
					"openEuler-22.03-LTS-SP3:kernel-debugsource-5.10.0-217.0.0.120.oe2203sp3.x86_64",
					"openEuler-22.03-LTS-SP3:kernel-devel-5.10.0-217.0.0.120.oe2203sp3.x86_64",
					"openEuler-22.03-LTS-SP3:kernel-headers-5.10.0-217.0.0.120.oe2203sp3.x86_64",
					"openEuler-22.03-LTS-SP3:kernel-source-5.10.0-217.0.0.120.oe2203sp3.x86_64",
					"openEuler-22.03-LTS-SP3:kernel-tools-5.10.0-217.0.0.120.oe2203sp3.x86_64",
					"openEuler-22.03-LTS-SP3:kernel-tools-debuginfo-5.10.0-217.0.0.120.oe2203sp3.x86_64",
					"openEuler-22.03-LTS-SP3:kernel-tools-devel-5.10.0-217.0.0.120.oe2203sp3.x86_64",
					"openEuler-22.03-LTS-SP3:perf-5.10.0-217.0.0.120.oe2203sp3.x86_64",
					"openEuler-22.03-LTS-SP3:perf-debuginfo-5.10.0-217.0.0.120.oe2203sp3.x86_64",
					"openEuler-22.03-LTS-SP3:python3-perf-5.10.0-217.0.0.120.oe2203sp3.x86_64",
					"openEuler-22.03-LTS-SP3:python3-perf-debuginfo-5.10.0-217.0.0.120.oe2203sp3.x86_64",
					"openEuler-22.03-LTS-SP3:kernel-5.10.0-217.0.0.120.oe2203sp3.aarch64",
					"openEuler-22.03-LTS-SP3:kernel-debuginfo-5.10.0-217.0.0.120.oe2203sp3.aarch64",
					"openEuler-22.03-LTS-SP3:kernel-debugsource-5.10.0-217.0.0.120.oe2203sp3.aarch64",
					"openEuler-22.03-LTS-SP3:kernel-devel-5.10.0-217.0.0.120.oe2203sp3.aarch64",
					"openEuler-22.03-LTS-SP3:kernel-headers-5.10.0-217.0.0.120.oe2203sp3.aarch64",
					"openEuler-22.03-LTS-SP3:kernel-source-5.10.0-217.0.0.120.oe2203sp3.aarch64",
					"openEuler-22.03-LTS-SP3:kernel-tools-5.10.0-217.0.0.120.oe2203sp3.aarch64",
					"openEuler-22.03-LTS-SP3:kernel-tools-debuginfo-5.10.0-217.0.0.120.oe2203sp3.aarch64",
					"openEuler-22.03-LTS-SP3:kernel-tools-devel-5.10.0-217.0.0.120.oe2203sp3.aarch64",
					"openEuler-22.03-LTS-SP3:perf-5.10.0-217.0.0.120.oe2203sp3.aarch64",
					"openEuler-22.03-LTS-SP3:perf-debuginfo-5.10.0-217.0.0.120.oe2203sp3.aarch64",
					"openEuler-22.03-LTS-SP3:python3-perf-5.10.0-217.0.0.120.oe2203sp3.aarch64",
					"openEuler-22.03-LTS-SP3:python3-perf-debuginfo-5.10.0-217.0.0.120.oe2203sp3.aarch64",
					"openEuler-22.03-LTS-SP3:kernel-5.10.0-217.0.0.120.oe2203sp3.src"
				]
			},
			"remediations":[
				{
					"product_ids":[
						"openEuler-22.03-LTS-SP3:kernel-5.10.0-217.0.0.120.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:kernel-debuginfo-5.10.0-217.0.0.120.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:kernel-debugsource-5.10.0-217.0.0.120.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:kernel-devel-5.10.0-217.0.0.120.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:kernel-headers-5.10.0-217.0.0.120.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:kernel-source-5.10.0-217.0.0.120.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:kernel-tools-5.10.0-217.0.0.120.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:kernel-tools-debuginfo-5.10.0-217.0.0.120.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:kernel-tools-devel-5.10.0-217.0.0.120.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:perf-5.10.0-217.0.0.120.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:perf-debuginfo-5.10.0-217.0.0.120.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:python3-perf-5.10.0-217.0.0.120.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:python3-perf-debuginfo-5.10.0-217.0.0.120.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:kernel-5.10.0-217.0.0.120.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:kernel-debuginfo-5.10.0-217.0.0.120.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:kernel-debugsource-5.10.0-217.0.0.120.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:kernel-devel-5.10.0-217.0.0.120.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:kernel-headers-5.10.0-217.0.0.120.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:kernel-source-5.10.0-217.0.0.120.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:kernel-tools-5.10.0-217.0.0.120.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:kernel-tools-debuginfo-5.10.0-217.0.0.120.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:kernel-tools-devel-5.10.0-217.0.0.120.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:perf-5.10.0-217.0.0.120.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:perf-debuginfo-5.10.0-217.0.0.120.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:python3-perf-5.10.0-217.0.0.120.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:python3-perf-debuginfo-5.10.0-217.0.0.120.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:kernel-5.10.0-217.0.0.120.oe2203sp3.src"
					],
					"details":"kernel security update",
					"category":"vendor_fix",
					"url":"https://www.openeuler.org/zh/security/security-bulletins/detail/?id=openEuler-SA-2024-1792"
				}
			],
			"scores":[
				{
					"cvss_v3":{
						"baseSeverity":"MEDIUM",
						"baseScore":5.5,
						"vectorString":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
						"version":"3.1"
					},
					"products":[
						"openEuler-22.03-LTS-SP3:kernel-5.10.0-217.0.0.120.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:kernel-debuginfo-5.10.0-217.0.0.120.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:kernel-debugsource-5.10.0-217.0.0.120.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:kernel-devel-5.10.0-217.0.0.120.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:kernel-headers-5.10.0-217.0.0.120.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:kernel-source-5.10.0-217.0.0.120.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:kernel-tools-5.10.0-217.0.0.120.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:kernel-tools-debuginfo-5.10.0-217.0.0.120.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:kernel-tools-devel-5.10.0-217.0.0.120.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:perf-5.10.0-217.0.0.120.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:perf-debuginfo-5.10.0-217.0.0.120.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:python3-perf-5.10.0-217.0.0.120.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:python3-perf-debuginfo-5.10.0-217.0.0.120.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:kernel-5.10.0-217.0.0.120.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:kernel-debuginfo-5.10.0-217.0.0.120.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:kernel-debugsource-5.10.0-217.0.0.120.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:kernel-devel-5.10.0-217.0.0.120.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:kernel-headers-5.10.0-217.0.0.120.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:kernel-source-5.10.0-217.0.0.120.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:kernel-tools-5.10.0-217.0.0.120.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:kernel-tools-debuginfo-5.10.0-217.0.0.120.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:kernel-tools-devel-5.10.0-217.0.0.120.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:perf-5.10.0-217.0.0.120.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:perf-debuginfo-5.10.0-217.0.0.120.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:python3-perf-5.10.0-217.0.0.120.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:python3-perf-debuginfo-5.10.0-217.0.0.120.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:kernel-5.10.0-217.0.0.120.oe2203sp3.src"
					]
				}
			],
			"threats":[
				{
					"details":"Medium",
					"category":"impact"
				}
			],
			"title":"CVE-2024-38624"
		},
		{
			"cve":"CVE-2024-38630",
			"notes":[
				{
					"text":"In the Linux kernel, the following vulnerability has been resolved:\n\nwatchdog: cpu5wdt.c: Fix use-after-free bug caused by cpu5wdt_trigger\n\nWhen the cpu5wdt module is removing, the origin code uses del_timer() to\nde-activate the timer. If the timer handler is running, del_timer() could\nnot stop it and will return directly. If the port region is released by\nrelease_region() and then the timer handler cpu5wdt_trigger() calls outb()\nto write into the region that is released, the use-after-free bug will\nhappen.\n\nChange del_timer() to timer_shutdown_sync() in order that the timer handler\ncould be finished before the port region is released.",
					"category":"description",
					"title":"Vulnerability Description"
				}
			],
			"product_status":{
				"fixed":[
					"openEuler-22.03-LTS-SP3:kernel-5.10.0-217.0.0.120.oe2203sp3.x86_64",
					"openEuler-22.03-LTS-SP3:kernel-debuginfo-5.10.0-217.0.0.120.oe2203sp3.x86_64",
					"openEuler-22.03-LTS-SP3:kernel-debugsource-5.10.0-217.0.0.120.oe2203sp3.x86_64",
					"openEuler-22.03-LTS-SP3:kernel-devel-5.10.0-217.0.0.120.oe2203sp3.x86_64",
					"openEuler-22.03-LTS-SP3:kernel-headers-5.10.0-217.0.0.120.oe2203sp3.x86_64",
					"openEuler-22.03-LTS-SP3:kernel-source-5.10.0-217.0.0.120.oe2203sp3.x86_64",
					"openEuler-22.03-LTS-SP3:kernel-tools-5.10.0-217.0.0.120.oe2203sp3.x86_64",
					"openEuler-22.03-LTS-SP3:kernel-tools-debuginfo-5.10.0-217.0.0.120.oe2203sp3.x86_64",
					"openEuler-22.03-LTS-SP3:kernel-tools-devel-5.10.0-217.0.0.120.oe2203sp3.x86_64",
					"openEuler-22.03-LTS-SP3:perf-5.10.0-217.0.0.120.oe2203sp3.x86_64",
					"openEuler-22.03-LTS-SP3:perf-debuginfo-5.10.0-217.0.0.120.oe2203sp3.x86_64",
					"openEuler-22.03-LTS-SP3:python3-perf-5.10.0-217.0.0.120.oe2203sp3.x86_64",
					"openEuler-22.03-LTS-SP3:python3-perf-debuginfo-5.10.0-217.0.0.120.oe2203sp3.x86_64",
					"openEuler-22.03-LTS-SP3:kernel-5.10.0-217.0.0.120.oe2203sp3.aarch64",
					"openEuler-22.03-LTS-SP3:kernel-debuginfo-5.10.0-217.0.0.120.oe2203sp3.aarch64",
					"openEuler-22.03-LTS-SP3:kernel-debugsource-5.10.0-217.0.0.120.oe2203sp3.aarch64",
					"openEuler-22.03-LTS-SP3:kernel-devel-5.10.0-217.0.0.120.oe2203sp3.aarch64",
					"openEuler-22.03-LTS-SP3:kernel-headers-5.10.0-217.0.0.120.oe2203sp3.aarch64",
					"openEuler-22.03-LTS-SP3:kernel-source-5.10.0-217.0.0.120.oe2203sp3.aarch64",
					"openEuler-22.03-LTS-SP3:kernel-tools-5.10.0-217.0.0.120.oe2203sp3.aarch64",
					"openEuler-22.03-LTS-SP3:kernel-tools-debuginfo-5.10.0-217.0.0.120.oe2203sp3.aarch64",
					"openEuler-22.03-LTS-SP3:kernel-tools-devel-5.10.0-217.0.0.120.oe2203sp3.aarch64",
					"openEuler-22.03-LTS-SP3:perf-5.10.0-217.0.0.120.oe2203sp3.aarch64",
					"openEuler-22.03-LTS-SP3:perf-debuginfo-5.10.0-217.0.0.120.oe2203sp3.aarch64",
					"openEuler-22.03-LTS-SP3:python3-perf-5.10.0-217.0.0.120.oe2203sp3.aarch64",
					"openEuler-22.03-LTS-SP3:python3-perf-debuginfo-5.10.0-217.0.0.120.oe2203sp3.aarch64",
					"openEuler-22.03-LTS-SP3:kernel-5.10.0-217.0.0.120.oe2203sp3.src"
				]
			},
			"remediations":[
				{
					"product_ids":[
						"openEuler-22.03-LTS-SP3:kernel-5.10.0-217.0.0.120.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:kernel-debuginfo-5.10.0-217.0.0.120.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:kernel-debugsource-5.10.0-217.0.0.120.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:kernel-devel-5.10.0-217.0.0.120.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:kernel-headers-5.10.0-217.0.0.120.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:kernel-source-5.10.0-217.0.0.120.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:kernel-tools-5.10.0-217.0.0.120.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:kernel-tools-debuginfo-5.10.0-217.0.0.120.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:kernel-tools-devel-5.10.0-217.0.0.120.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:perf-5.10.0-217.0.0.120.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:perf-debuginfo-5.10.0-217.0.0.120.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:python3-perf-5.10.0-217.0.0.120.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:python3-perf-debuginfo-5.10.0-217.0.0.120.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:kernel-5.10.0-217.0.0.120.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:kernel-debuginfo-5.10.0-217.0.0.120.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:kernel-debugsource-5.10.0-217.0.0.120.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:kernel-devel-5.10.0-217.0.0.120.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:kernel-headers-5.10.0-217.0.0.120.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:kernel-source-5.10.0-217.0.0.120.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:kernel-tools-5.10.0-217.0.0.120.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:kernel-tools-debuginfo-5.10.0-217.0.0.120.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:kernel-tools-devel-5.10.0-217.0.0.120.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:perf-5.10.0-217.0.0.120.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:perf-debuginfo-5.10.0-217.0.0.120.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:python3-perf-5.10.0-217.0.0.120.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:python3-perf-debuginfo-5.10.0-217.0.0.120.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:kernel-5.10.0-217.0.0.120.oe2203sp3.src"
					],
					"details":"kernel security update",
					"category":"vendor_fix",
					"url":"https://www.openeuler.org/zh/security/security-bulletins/detail/?id=openEuler-SA-2024-1792"
				}
			],
			"scores":[
				{
					"cvss_v3":{
						"baseSeverity":"NONE",
						"baseScore":0.0,
						"vectorString":"CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:N",
						"version":"3.1"
					},
					"products":[
						"openEuler-22.03-LTS-SP3:kernel-5.10.0-217.0.0.120.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:kernel-debuginfo-5.10.0-217.0.0.120.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:kernel-debugsource-5.10.0-217.0.0.120.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:kernel-devel-5.10.0-217.0.0.120.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:kernel-headers-5.10.0-217.0.0.120.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:kernel-source-5.10.0-217.0.0.120.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:kernel-tools-5.10.0-217.0.0.120.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:kernel-tools-debuginfo-5.10.0-217.0.0.120.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:kernel-tools-devel-5.10.0-217.0.0.120.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:perf-5.10.0-217.0.0.120.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:perf-debuginfo-5.10.0-217.0.0.120.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:python3-perf-5.10.0-217.0.0.120.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:python3-perf-debuginfo-5.10.0-217.0.0.120.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:kernel-5.10.0-217.0.0.120.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:kernel-debuginfo-5.10.0-217.0.0.120.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:kernel-debugsource-5.10.0-217.0.0.120.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:kernel-devel-5.10.0-217.0.0.120.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:kernel-headers-5.10.0-217.0.0.120.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:kernel-source-5.10.0-217.0.0.120.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:kernel-tools-5.10.0-217.0.0.120.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:kernel-tools-debuginfo-5.10.0-217.0.0.120.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:kernel-tools-devel-5.10.0-217.0.0.120.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:perf-5.10.0-217.0.0.120.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:perf-debuginfo-5.10.0-217.0.0.120.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:python3-perf-5.10.0-217.0.0.120.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:python3-perf-debuginfo-5.10.0-217.0.0.120.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:kernel-5.10.0-217.0.0.120.oe2203sp3.src"
					]
				}
			],
			"threats":[
				{
					"details":"None",
					"category":"impact"
				}
			],
			"title":"CVE-2024-38630"
		},
		{
			"cve":"CVE-2024-38661",
			"notes":[
				{
					"text":"In the Linux kernel, the following vulnerability has been resolved:\n\ns390/ap: Fix crash in AP internal function modify_bitmap()\n\nA system crash like this\n\n  Failing address: 200000cb7df6f000 TEID: 200000cb7df6f403\n  Fault in home space mode while using kernel ASCE.\n  AS:00000002d71bc007 R3:00000003fe5b8007 S:000000011a446000 P:000000015660c13d\n  Oops: 0038 ilc:3 [#1] PREEMPT SMP\n  Modules linked in: mlx5_ib ...\n  CPU: 8 PID: 7556 Comm: bash Not tainted 6.9.0-rc7 #8\n  Hardware name: IBM 3931 A01 704 (LPAR)\n  Krnl PSW : 0704e00180000000 0000014b75e7b606 (ap_parse_bitmap_str+0x10e/0x1f8)\n  R:0 T:1 IO:1 EX:1 Key:0 M:1 W:0 P:0 AS:3 CC:2 PM:0 RI:0 EA:3\n  Krnl GPRS: 0000000000000001 ffffffffffffffc0 0000000000000001 00000048f96b75d3\n  000000cb00000100 ffffffffffffffff ffffffffffffffff 000000cb7df6fce0\n  000000cb7df6fce0 00000000ffffffff 000000000000002b 00000048ffffffff\n  000003ff9b2dbc80 200000cb7df6fcd8 0000014bffffffc0 000000cb7df6fbc8\n  Krnl Code: 0000014b75e7b5fc: a7840047            brc     8,0000014b75e7b68a\n  0000014b75e7b600: 18b2                lr      %r11,%r2\n  #0000014b75e7b602: a7f4000a            brc     15,0000014b75e7b616\n  >0000014b75e7b606: eb22d00000e6        laog    %r2,%r2,0(%r13)\n  0000014b75e7b60c: a7680001            lhi     %r6,1\n  0000014b75e7b610: 187b                lr      %r7,%r11\n  0000014b75e7b612: 84960021            brxh    %r9,%r6,0000014b75e7b654\n  0000014b75e7b616: 18e9                lr      %r14,%r9\n  Call Trace:\n  [<0000014b75e7b606>] ap_parse_bitmap_str+0x10e/0x1f8\n  ([<0000014b75e7b5dc>] ap_parse_bitmap_str+0xe4/0x1f8)\n  [<0000014b75e7b758>] apmask_store+0x68/0x140\n  [<0000014b75679196>] kernfs_fop_write_iter+0x14e/0x1e8\n  [<0000014b75598524>] vfs_write+0x1b4/0x448\n  [<0000014b7559894c>] ksys_write+0x74/0x100\n  [<0000014b7618a440>] __do_syscall+0x268/0x328\n  [<0000014b761a3558>] system_call+0x70/0x98\n  INFO: lockdep is turned off.\n  Last Breaking-Event-Address:\n  [<0000014b75e7b636>] ap_parse_bitmap_str+0x13e/0x1f8\n  Kernel panic - not syncing: Fatal exception: panic_on_oops\n\noccured when /sys/bus/ap/a[pq]mask was updated with a relative mask value\n(like +0x10-0x12,+60,-90) with one of the numeric values exceeding INT_MAX.\n\nThe fix is simple: use unsigned long values for the internal variables. The\ncorrect checks are already in place in the function but a simple int for\nthe internal variables was used with the possibility to overflow.",
					"category":"description",
					"title":"Vulnerability Description"
				}
			],
			"product_status":{
				"fixed":[
					"openEuler-22.03-LTS-SP3:kernel-5.10.0-217.0.0.120.oe2203sp3.x86_64",
					"openEuler-22.03-LTS-SP3:kernel-debuginfo-5.10.0-217.0.0.120.oe2203sp3.x86_64",
					"openEuler-22.03-LTS-SP3:kernel-debugsource-5.10.0-217.0.0.120.oe2203sp3.x86_64",
					"openEuler-22.03-LTS-SP3:kernel-devel-5.10.0-217.0.0.120.oe2203sp3.x86_64",
					"openEuler-22.03-LTS-SP3:kernel-headers-5.10.0-217.0.0.120.oe2203sp3.x86_64",
					"openEuler-22.03-LTS-SP3:kernel-source-5.10.0-217.0.0.120.oe2203sp3.x86_64",
					"openEuler-22.03-LTS-SP3:kernel-tools-5.10.0-217.0.0.120.oe2203sp3.x86_64",
					"openEuler-22.03-LTS-SP3:kernel-tools-debuginfo-5.10.0-217.0.0.120.oe2203sp3.x86_64",
					"openEuler-22.03-LTS-SP3:kernel-tools-devel-5.10.0-217.0.0.120.oe2203sp3.x86_64",
					"openEuler-22.03-LTS-SP3:perf-5.10.0-217.0.0.120.oe2203sp3.x86_64",
					"openEuler-22.03-LTS-SP3:perf-debuginfo-5.10.0-217.0.0.120.oe2203sp3.x86_64",
					"openEuler-22.03-LTS-SP3:python3-perf-5.10.0-217.0.0.120.oe2203sp3.x86_64",
					"openEuler-22.03-LTS-SP3:python3-perf-debuginfo-5.10.0-217.0.0.120.oe2203sp3.x86_64",
					"openEuler-22.03-LTS-SP3:kernel-5.10.0-217.0.0.120.oe2203sp3.aarch64",
					"openEuler-22.03-LTS-SP3:kernel-debuginfo-5.10.0-217.0.0.120.oe2203sp3.aarch64",
					"openEuler-22.03-LTS-SP3:kernel-debugsource-5.10.0-217.0.0.120.oe2203sp3.aarch64",
					"openEuler-22.03-LTS-SP3:kernel-devel-5.10.0-217.0.0.120.oe2203sp3.aarch64",
					"openEuler-22.03-LTS-SP3:kernel-headers-5.10.0-217.0.0.120.oe2203sp3.aarch64",
					"openEuler-22.03-LTS-SP3:kernel-source-5.10.0-217.0.0.120.oe2203sp3.aarch64",
					"openEuler-22.03-LTS-SP3:kernel-tools-5.10.0-217.0.0.120.oe2203sp3.aarch64",
					"openEuler-22.03-LTS-SP3:kernel-tools-debuginfo-5.10.0-217.0.0.120.oe2203sp3.aarch64",
					"openEuler-22.03-LTS-SP3:kernel-tools-devel-5.10.0-217.0.0.120.oe2203sp3.aarch64",
					"openEuler-22.03-LTS-SP3:perf-5.10.0-217.0.0.120.oe2203sp3.aarch64",
					"openEuler-22.03-LTS-SP3:perf-debuginfo-5.10.0-217.0.0.120.oe2203sp3.aarch64",
					"openEuler-22.03-LTS-SP3:python3-perf-5.10.0-217.0.0.120.oe2203sp3.aarch64",
					"openEuler-22.03-LTS-SP3:python3-perf-debuginfo-5.10.0-217.0.0.120.oe2203sp3.aarch64",
					"openEuler-22.03-LTS-SP3:kernel-5.10.0-217.0.0.120.oe2203sp3.src"
				]
			},
			"remediations":[
				{
					"product_ids":[
						"openEuler-22.03-LTS-SP3:kernel-5.10.0-217.0.0.120.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:kernel-debuginfo-5.10.0-217.0.0.120.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:kernel-debugsource-5.10.0-217.0.0.120.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:kernel-devel-5.10.0-217.0.0.120.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:kernel-headers-5.10.0-217.0.0.120.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:kernel-source-5.10.0-217.0.0.120.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:kernel-tools-5.10.0-217.0.0.120.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:kernel-tools-debuginfo-5.10.0-217.0.0.120.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:kernel-tools-devel-5.10.0-217.0.0.120.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:perf-5.10.0-217.0.0.120.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:perf-debuginfo-5.10.0-217.0.0.120.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:python3-perf-5.10.0-217.0.0.120.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:python3-perf-debuginfo-5.10.0-217.0.0.120.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:kernel-5.10.0-217.0.0.120.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:kernel-debuginfo-5.10.0-217.0.0.120.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:kernel-debugsource-5.10.0-217.0.0.120.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:kernel-devel-5.10.0-217.0.0.120.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:kernel-headers-5.10.0-217.0.0.120.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:kernel-source-5.10.0-217.0.0.120.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:kernel-tools-5.10.0-217.0.0.120.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:kernel-tools-debuginfo-5.10.0-217.0.0.120.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:kernel-tools-devel-5.10.0-217.0.0.120.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:perf-5.10.0-217.0.0.120.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:perf-debuginfo-5.10.0-217.0.0.120.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:python3-perf-5.10.0-217.0.0.120.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:python3-perf-debuginfo-5.10.0-217.0.0.120.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:kernel-5.10.0-217.0.0.120.oe2203sp3.src"
					],
					"details":"kernel security update",
					"category":"vendor_fix",
					"url":"https://www.openeuler.org/zh/security/security-bulletins/detail/?id=openEuler-SA-2024-1792"
				}
			],
			"scores":[
				{
					"cvss_v3":{
						"baseSeverity":"MEDIUM",
						"baseScore":5.5,
						"vectorString":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
						"version":"3.1"
					},
					"products":[
						"openEuler-22.03-LTS-SP3:kernel-5.10.0-217.0.0.120.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:kernel-debuginfo-5.10.0-217.0.0.120.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:kernel-debugsource-5.10.0-217.0.0.120.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:kernel-devel-5.10.0-217.0.0.120.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:kernel-headers-5.10.0-217.0.0.120.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:kernel-source-5.10.0-217.0.0.120.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:kernel-tools-5.10.0-217.0.0.120.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:kernel-tools-debuginfo-5.10.0-217.0.0.120.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:kernel-tools-devel-5.10.0-217.0.0.120.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:perf-5.10.0-217.0.0.120.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:perf-debuginfo-5.10.0-217.0.0.120.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:python3-perf-5.10.0-217.0.0.120.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:python3-perf-debuginfo-5.10.0-217.0.0.120.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:kernel-5.10.0-217.0.0.120.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:kernel-debuginfo-5.10.0-217.0.0.120.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:kernel-debugsource-5.10.0-217.0.0.120.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:kernel-devel-5.10.0-217.0.0.120.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:kernel-headers-5.10.0-217.0.0.120.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:kernel-source-5.10.0-217.0.0.120.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:kernel-tools-5.10.0-217.0.0.120.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:kernel-tools-debuginfo-5.10.0-217.0.0.120.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:kernel-tools-devel-5.10.0-217.0.0.120.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:perf-5.10.0-217.0.0.120.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:perf-debuginfo-5.10.0-217.0.0.120.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:python3-perf-5.10.0-217.0.0.120.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:python3-perf-debuginfo-5.10.0-217.0.0.120.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:kernel-5.10.0-217.0.0.120.oe2203sp3.src"
					]
				}
			],
			"threats":[
				{
					"details":"Mdeium",
					"category":"impact"
				}
			],
			"title":"CVE-2024-38661"
		},
		{
			"cve":"CVE-2024-39292",
			"notes":[
				{
					"text":"In the Linux kernel, the following vulnerability has been resolved:\n\num: Add winch to winch_handlers before registering winch IRQ\n\nRegistering a winch IRQ is racy, an interrupt may occur before the winch is\nadded to the winch_handlers list.\n\nIf that happens, register_winch_irq() adds to that list a winch that is\nscheduled to be (or has already been) freed, causing a panic later in\nwinch_cleanup().\n\nAvoid the race by adding the winch to the winch_handlers list before\nregistering the IRQ, and rolling back if um_request_irq() fails.",
					"category":"description",
					"title":"Vulnerability Description"
				}
			],
			"product_status":{
				"fixed":[
					"openEuler-22.03-LTS-SP3:kernel-5.10.0-217.0.0.120.oe2203sp3.x86_64",
					"openEuler-22.03-LTS-SP3:kernel-debuginfo-5.10.0-217.0.0.120.oe2203sp3.x86_64",
					"openEuler-22.03-LTS-SP3:kernel-debugsource-5.10.0-217.0.0.120.oe2203sp3.x86_64",
					"openEuler-22.03-LTS-SP3:kernel-devel-5.10.0-217.0.0.120.oe2203sp3.x86_64",
					"openEuler-22.03-LTS-SP3:kernel-headers-5.10.0-217.0.0.120.oe2203sp3.x86_64",
					"openEuler-22.03-LTS-SP3:kernel-source-5.10.0-217.0.0.120.oe2203sp3.x86_64",
					"openEuler-22.03-LTS-SP3:kernel-tools-5.10.0-217.0.0.120.oe2203sp3.x86_64",
					"openEuler-22.03-LTS-SP3:kernel-tools-debuginfo-5.10.0-217.0.0.120.oe2203sp3.x86_64",
					"openEuler-22.03-LTS-SP3:kernel-tools-devel-5.10.0-217.0.0.120.oe2203sp3.x86_64",
					"openEuler-22.03-LTS-SP3:perf-5.10.0-217.0.0.120.oe2203sp3.x86_64",
					"openEuler-22.03-LTS-SP3:perf-debuginfo-5.10.0-217.0.0.120.oe2203sp3.x86_64",
					"openEuler-22.03-LTS-SP3:python3-perf-5.10.0-217.0.0.120.oe2203sp3.x86_64",
					"openEuler-22.03-LTS-SP3:python3-perf-debuginfo-5.10.0-217.0.0.120.oe2203sp3.x86_64",
					"openEuler-22.03-LTS-SP3:kernel-5.10.0-217.0.0.120.oe2203sp3.aarch64",
					"openEuler-22.03-LTS-SP3:kernel-debuginfo-5.10.0-217.0.0.120.oe2203sp3.aarch64",
					"openEuler-22.03-LTS-SP3:kernel-debugsource-5.10.0-217.0.0.120.oe2203sp3.aarch64",
					"openEuler-22.03-LTS-SP3:kernel-devel-5.10.0-217.0.0.120.oe2203sp3.aarch64",
					"openEuler-22.03-LTS-SP3:kernel-headers-5.10.0-217.0.0.120.oe2203sp3.aarch64",
					"openEuler-22.03-LTS-SP3:kernel-source-5.10.0-217.0.0.120.oe2203sp3.aarch64",
					"openEuler-22.03-LTS-SP3:kernel-tools-5.10.0-217.0.0.120.oe2203sp3.aarch64",
					"openEuler-22.03-LTS-SP3:kernel-tools-debuginfo-5.10.0-217.0.0.120.oe2203sp3.aarch64",
					"openEuler-22.03-LTS-SP3:kernel-tools-devel-5.10.0-217.0.0.120.oe2203sp3.aarch64",
					"openEuler-22.03-LTS-SP3:perf-5.10.0-217.0.0.120.oe2203sp3.aarch64",
					"openEuler-22.03-LTS-SP3:perf-debuginfo-5.10.0-217.0.0.120.oe2203sp3.aarch64",
					"openEuler-22.03-LTS-SP3:python3-perf-5.10.0-217.0.0.120.oe2203sp3.aarch64",
					"openEuler-22.03-LTS-SP3:python3-perf-debuginfo-5.10.0-217.0.0.120.oe2203sp3.aarch64",
					"openEuler-22.03-LTS-SP3:kernel-5.10.0-217.0.0.120.oe2203sp3.src"
				]
			},
			"remediations":[
				{
					"product_ids":[
						"openEuler-22.03-LTS-SP3:kernel-5.10.0-217.0.0.120.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:kernel-debuginfo-5.10.0-217.0.0.120.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:kernel-debugsource-5.10.0-217.0.0.120.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:kernel-devel-5.10.0-217.0.0.120.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:kernel-headers-5.10.0-217.0.0.120.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:kernel-source-5.10.0-217.0.0.120.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:kernel-tools-5.10.0-217.0.0.120.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:kernel-tools-debuginfo-5.10.0-217.0.0.120.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:kernel-tools-devel-5.10.0-217.0.0.120.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:perf-5.10.0-217.0.0.120.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:perf-debuginfo-5.10.0-217.0.0.120.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:python3-perf-5.10.0-217.0.0.120.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:python3-perf-debuginfo-5.10.0-217.0.0.120.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:kernel-5.10.0-217.0.0.120.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:kernel-debuginfo-5.10.0-217.0.0.120.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:kernel-debugsource-5.10.0-217.0.0.120.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:kernel-devel-5.10.0-217.0.0.120.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:kernel-headers-5.10.0-217.0.0.120.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:kernel-source-5.10.0-217.0.0.120.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:kernel-tools-5.10.0-217.0.0.120.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:kernel-tools-debuginfo-5.10.0-217.0.0.120.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:kernel-tools-devel-5.10.0-217.0.0.120.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:perf-5.10.0-217.0.0.120.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:perf-debuginfo-5.10.0-217.0.0.120.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:python3-perf-5.10.0-217.0.0.120.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:python3-perf-debuginfo-5.10.0-217.0.0.120.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:kernel-5.10.0-217.0.0.120.oe2203sp3.src"
					],
					"details":"kernel security update",
					"category":"vendor_fix",
					"url":"https://www.openeuler.org/zh/security/security-bulletins/detail/?id=openEuler-SA-2024-1792"
				}
			],
			"scores":[
				{
					"cvss_v3":{
						"baseSeverity":"MEDIUM",
						"baseScore":5.5,
						"vectorString":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
						"version":"3.1"
					},
					"products":[
						"openEuler-22.03-LTS-SP3:kernel-5.10.0-217.0.0.120.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:kernel-debuginfo-5.10.0-217.0.0.120.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:kernel-debugsource-5.10.0-217.0.0.120.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:kernel-devel-5.10.0-217.0.0.120.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:kernel-headers-5.10.0-217.0.0.120.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:kernel-source-5.10.0-217.0.0.120.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:kernel-tools-5.10.0-217.0.0.120.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:kernel-tools-debuginfo-5.10.0-217.0.0.120.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:kernel-tools-devel-5.10.0-217.0.0.120.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:perf-5.10.0-217.0.0.120.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:perf-debuginfo-5.10.0-217.0.0.120.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:python3-perf-5.10.0-217.0.0.120.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:python3-perf-debuginfo-5.10.0-217.0.0.120.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:kernel-5.10.0-217.0.0.120.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:kernel-debuginfo-5.10.0-217.0.0.120.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:kernel-debugsource-5.10.0-217.0.0.120.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:kernel-devel-5.10.0-217.0.0.120.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:kernel-headers-5.10.0-217.0.0.120.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:kernel-source-5.10.0-217.0.0.120.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:kernel-tools-5.10.0-217.0.0.120.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:kernel-tools-debuginfo-5.10.0-217.0.0.120.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:kernel-tools-devel-5.10.0-217.0.0.120.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:perf-5.10.0-217.0.0.120.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:perf-debuginfo-5.10.0-217.0.0.120.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:python3-perf-5.10.0-217.0.0.120.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:python3-perf-debuginfo-5.10.0-217.0.0.120.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:kernel-5.10.0-217.0.0.120.oe2203sp3.src"
					]
				}
			],
			"threats":[
				{
					"details":"Medium",
					"category":"impact"
				}
			],
			"title":"CVE-2024-39292"
		}
	]
}