{
	"document":{
		"aggregate_severity":{
			"namespace":"https://nvd.nist.gov/vuln-metrics/cvss",
			"text":"High"
		},
		"category":"csaf_vex",
		"csaf_version":"2.0",
		"distribution":{
			"tlp":{
				"label":"WHITE",
				"url":"https:/www.first.org/tlp/"
			}
		},
		"lang":"en",
		"notes":[
			{
				"text":"kernel security update",
				"category":"general",
				"title":"Synopsis"
			},
			{
				"text":"An update for kernel is now available for openEuler-22.03-LTS-SP1.",
				"category":"general",
				"title":"Summary"
			},
			{
				"text":"The Linux Kernel, the operating system core itself.\n\nSecurity Fix(es):\n\nIn the Linux kernel, the following vulnerability has been resolved:\n\nclk: sunxi-ng: Unregister clocks/resets when unbinding\n\nCurrently, unbinding a CCU driver unmaps the device's MMIO region, while\nleaving its clocks/resets and their providers registered. This can cause\na page fault later when some clock operation tries to perform MMIO. Fix\nthis by separating the CCU initialization from the memory allocation,\nand then using a devres callback to unregister the clocks and resets.\n\nThis also fixes a memory leak of the `struct ccu_reset`, and uses the\ncorrect owner (the specific platform driver) for the clocks and resets.\n\nEarly OF clock providers are never unregistered, and limited error\nhandling is possible, so they are mostly unchanged. The error reporting\nis made more consistent by moving the message inside of_sunxi_ccu_probe.(CVE-2021-47205)\n\nIn the Linux kernel, the following vulnerability has been resolved:\n\nthermal/int340x_thermal: handle data_vault when the value is ZERO_SIZE_PTR\n\nIn some case, the GDDV returns a package with a buffer which has\nzero length. It causes that kmemdup() returns ZERO_SIZE_PTR (0x10).\n\nThen the data_vault_read() got NULL point dereference problem when\naccessing the 0x10 value in data_vault.\n\n[   71.024560] BUG: kernel NULL pointer dereference, address:\n0000000000000010\n\nThis patch uses ZERO_OR_NULL_PTR() for checking ZERO_SIZE_PTR or\nNULL value in data_vault.(CVE-2022-48703)\n\nIn the Linux kernel, the following vulnerability has been resolved:\n\nnet/smc: Avoid overwriting the copies of clcsock callback functions\n\nThe callback functions of clcsock will be saved and replaced during\nthe fallback. But if the fallback happens more than once, then the\ncopies of these callback functions will be overwritten incorrectly,\nresulting in a loop call issue:\n\nclcsk->sk_error_report\n |- smc_fback_error_report() <------------------------------|\n     |- smc_fback_forward_wakeup()                          | (loop)\n         |- clcsock_callback()  (incorrectly overwritten)   |\n             |- smc->clcsk_error_report() ------------------|\n\nSo this patch fixes the issue by saving these function pointers only\nonce in the fallback and avoiding overwriting.(CVE-2022-48780)\n\nIn the Linux kernel, the following vulnerability has been resolved:\n\nnet: marvell: prestera: Add missing of_node_put() in prestera_switch_set_base_mac_addr\n\nThis node pointer is returned by of_find_compatible_node() with\nrefcount incremented. Calling of_node_put() to aovid the refcount leak.(CVE-2022-48859)\n\nIn the Linux kernel, the following vulnerability has been resolved:\n\nof: Fix double free in of_parse_phandle_with_args_map\n\nIn of_parse_phandle_with_args_map() the inner loop that\niterates through the map entries calls of_node_put(new)\nto free the reference acquired by the previous iteration\nof the inner loop. This assumes that the value of \"new\" is\nNULL on the first iteration of the inner loop.\n\nMake sure that this is true in all iterations of the outer\nloop by setting \"new\" to NULL after its value is assigned to \"cur\".\n\nExtend the unittest to detect the double free and add an additional\ntest case that actually triggers this path.(CVE-2023-52679)\n\nIn the Linux kernel, the following vulnerability has been resolved:\n\nnetfilter: nft_set_pipapo: do not free live element\n\nPablo reports a crash with large batches of elements with a\nback-to-back add/remove pattern.  Quoting Pablo:\n\n  add_elem(\"00000000\") timeout 100 ms\n  ...\n  add_elem(\"0000000X\") timeout 100 ms\n  del_elem(\"0000000X\") <---------------- delete one that was just added\n  ...\n  add_elem(\"00005000\") timeout 100 ms\n\n  1) nft_pipapo_remove() removes element 0000000X\n  Then, KASAN shows a splat.\n\nLooking at the remove function there is a chance that we will drop a\nrule that maps to a non-deactivated element.\n\nRemoval happens in two steps, first we do a lookup for key k and return the\nto-be-removed element and mark it as inactive in the next generation.\nThen, in a second step, the element gets removed from the set/map.\n\nThe _remove function does not work correctly if we have more than one\nelement that share the same key.\n\nThis can happen if we insert an element into a set when the set already\nholds an element with same key, but the element mapping to the existing\nkey has timed out or is not active in the next generation.\n\nIn such case its possible that removal will unmap the wrong element.\nIf this happens, we will leak the non-deactivated element, it becomes\nunreachable.\n\nThe element that got deactivated (and will be freed later) will\nremain reachable in the set data structure, this can result in\na crash when such an element is retrieved during lookup (stale\npointer).\n\nAdd a check that the fully matching key does in fact map to the element\nthat we have marked as inactive in the deactivation step.\nIf not, we need to continue searching.\n\nAdd a bug/warn trap at the end of the function as well, the remove\nfunction must not ever be called with an invisible/unreachable/non-existent\nelement.\n\nv2: avoid uneeded temporary variable (Stefano)(CVE-2024-26924)\n\nIn the Linux kernel, the following vulnerability has been resolved:\n\nnetfilter: nf_tables: release mutex after nft_gc_seq_end from abort path\n\nThe commit mutex should not be released during the critical section\nbetween nft_gc_seq_begin() and nft_gc_seq_end(), otherwise, async GC\nworker could collect expired objects and get the released commit lock\nwithin the same GC sequence.\n\nnf_tables_module_autoload() temporarily releases the mutex to load\nmodule dependencies, then it goes back to replay the transaction again.\nMove it at the end of the abort phase after nft_gc_seq_end() is called.(CVE-2024-26925)\n\nIn the Linux kernel, the following vulnerability has been resolved:\n\nnet/sched: Fix mirred deadlock on device recursion\n\nWhen the mirred action is used on a classful egress qdisc and a packet is\nmirrored or redirected to self we hit a qdisc lock deadlock.\nSee trace below.\n\n[..... other info removed for brevity....]\n[   82.890906]\n[   82.890906] ============================================\n[   82.890906] WARNING: possible recursive locking detected\n[   82.890906] 6.8.0-05205-g77fadd89fe2d-dirty #213 Tainted: G        W\n[   82.890906] --------------------------------------------\n[   82.890906] ping/418 is trying to acquire lock:\n[   82.890906] ffff888006994110 (&sch->q.lock){+.-.}-{3:3}, at:\n__dev_queue_xmit+0x1778/0x3550\n[   82.890906]\n[   82.890906] but task is already holding lock:\n[   82.890906] ffff888006994110 (&sch->q.lock){+.-.}-{3:3}, at:\n__dev_queue_xmit+0x1778/0x3550\n[   82.890906]\n[   82.890906] other info that might help us debug this:\n[   82.890906]  Possible unsafe locking scenario:\n[   82.890906]\n[   82.890906]        CPU0\n[   82.890906]        ----\n[   82.890906]   lock(&sch->q.lock);\n[   82.890906]   lock(&sch->q.lock);\n[   82.890906]\n[   82.890906]  *** DEADLOCK ***\n[   82.890906]\n[..... other info removed for brevity....]\n\nExample setup (eth0->eth0) to recreate\ntc qdisc add dev eth0 root handle 1: htb default 30\ntc filter add dev eth0 handle 1: protocol ip prio 2 matchall \\\n     action mirred egress redirect dev eth0\n\nAnother example(eth0->eth1->eth0) to recreate\ntc qdisc add dev eth0 root handle 1: htb default 30\ntc filter add dev eth0 handle 1: protocol ip prio 2 matchall \\\n     action mirred egress redirect dev eth1\n\ntc qdisc add dev eth1 root handle 1: htb default 30\ntc filter add dev eth1 handle 1: protocol ip prio 2 matchall \\\n     action mirred egress redirect dev eth0\n\nWe fix this by adding an owner field (CPU id) to struct Qdisc set after\nroot qdisc is entered. When the softirq enters it a second time, if the\nqdisc owner is the same CPU, the packet is dropped to break the loop.(CVE-2024-27010)\n\nIn the Linux kernel, the following vulnerability has been resolved:\n\ndma-mapping: benchmark: fix node id validation\n\nWhile validating node ids in map_benchmark_ioctl(), node_possible() may\nbe provided with invalid argument outside of [0,MAX_NUMNODES-1] range\nleading to:\n\nBUG: KASAN: wild-memory-access in map_benchmark_ioctl (kernel/dma/map_benchmark.c:214)\nRead of size 8 at addr 1fffffff8ccb6398 by task dma_map_benchma/971\nCPU: 7 PID: 971 Comm: dma_map_benchma Not tainted 6.9.0-rc6 #37\nHardware name: QEMU Standard PC (i440FX + PIIX, 1996)\nCall Trace:\n <TASK>\ndump_stack_lvl (lib/dump_stack.c:117)\nkasan_report (mm/kasan/report.c:603)\nkasan_check_range (mm/kasan/generic.c:189)\nvariable_test_bit (arch/x86/include/asm/bitops.h:227) [inline]\narch_test_bit (arch/x86/include/asm/bitops.h:239) [inline]\n_test_bit at (include/asm-generic/bitops/instrumented-non-atomic.h:142) [inline]\nnode_state (include/linux/nodemask.h:423) [inline]\nmap_benchmark_ioctl (kernel/dma/map_benchmark.c:214)\nfull_proxy_unlocked_ioctl (fs/debugfs/file.c:333)\n__x64_sys_ioctl (fs/ioctl.c:890)\ndo_syscall_64 (arch/x86/entry/common.c:83)\nentry_SYSCALL_64_after_hwframe (arch/x86/entry/entry_64.S:130)\n\nCompare node ids with sane bounds first. NUMA_NO_NODE is considered a\nspecial valid case meaning that benchmarking kthreads won't be bound to a\ncpuset of a given node.\n\nFound by Linux Verification Center (linuxtesting.org).(CVE-2024-34777)\n\nIn the Linux kernel, the following vulnerability has been resolved:\n\nmd/dm-raid: don't call md_reap_sync_thread() directly\n\nCurrently md_reap_sync_thread() is called from raid_message() directly\nwithout holding 'reconfig_mutex', this is definitely unsafe because\nmd_reap_sync_thread() can change many fields that is protected by\n'reconfig_mutex'.\n\nHowever, hold 'reconfig_mutex' here is still problematic because this\nwill cause deadlock, for example, commit 130443d60b1b (\"md: refactor\nidle/frozen_sync_thread() to fix deadlock\").\n\nFix this problem by using stop_sync_thread() to unregister sync_thread,\nlike md/raid did.(CVE-2024-35808)\n\nIn the Linux kernel, the following vulnerability has been resolved:\n\nnet: mvpp2: clear BM pool before initialization\n\nRegister value persist after booting the kernel using\nkexec which results in kernel panic. Thus clear the\nBM pool registers before initialisation to fix the issue.(CVE-2024-35837)\n\nIn the Linux kernel, the following vulnerability has been resolved:\n\nnetfilter: nf_tables: flush pending destroy work before exit_net release\n\nSimilar to 2c9f0293280e (\"netfilter: nf_tables: flush pending destroy\nwork before netlink notifier\") to address a race between exit_net and\nthe destroy workqueue.\n\nThe trace below shows an element to be released via destroy workqueue\nwhile exit_net path (triggered via module removal) has already released\nthe set that is used in such transaction.\n\n[ 1360.547789] BUG: KASAN: slab-use-after-free in nf_tables_trans_destroy_work+0x3f5/0x590 [nf_tables]\n[ 1360.547861] Read of size 8 at addr ffff888140500cc0 by task kworker/4:1/152465\n[ 1360.547870] CPU: 4 PID: 152465 Comm: kworker/4:1 Not tainted 6.8.0+ #359\n[ 1360.547882] Workqueue: events nf_tables_trans_destroy_work [nf_tables]\n[ 1360.547984] Call Trace:\n[ 1360.547991]  <TASK>\n[ 1360.547998]  dump_stack_lvl+0x53/0x70\n[ 1360.548014]  print_report+0xc4/0x610\n[ 1360.548026]  ? __virt_addr_valid+0xba/0x160\n[ 1360.548040]  ? __pfx__raw_spin_lock_irqsave+0x10/0x10\n[ 1360.548054]  ? nf_tables_trans_destroy_work+0x3f5/0x590 [nf_tables]\n[ 1360.548176]  kasan_report+0xae/0xe0\n[ 1360.548189]  ? nf_tables_trans_destroy_work+0x3f5/0x590 [nf_tables]\n[ 1360.548312]  nf_tables_trans_destroy_work+0x3f5/0x590 [nf_tables]\n[ 1360.548447]  ? __pfx_nf_tables_trans_destroy_work+0x10/0x10 [nf_tables]\n[ 1360.548577]  ? _raw_spin_unlock_irq+0x18/0x30\n[ 1360.548591]  process_one_work+0x2f1/0x670\n[ 1360.548610]  worker_thread+0x4d3/0x760\n[ 1360.548627]  ? __pfx_worker_thread+0x10/0x10\n[ 1360.548640]  kthread+0x16b/0x1b0\n[ 1360.548653]  ? __pfx_kthread+0x10/0x10\n[ 1360.548665]  ret_from_fork+0x2f/0x50\n[ 1360.548679]  ? __pfx_kthread+0x10/0x10\n[ 1360.548690]  ret_from_fork_asm+0x1a/0x30\n[ 1360.548707]  </TASK>\n\n[ 1360.548719] Allocated by task 192061:\n[ 1360.548726]  kasan_save_stack+0x20/0x40\n[ 1360.548739]  kasan_save_track+0x14/0x30\n[ 1360.548750]  __kasan_kmalloc+0x8f/0xa0\n[ 1360.548760]  __kmalloc_node+0x1f1/0x450\n[ 1360.548771]  nf_tables_newset+0x10c7/0x1b50 [nf_tables]\n[ 1360.548883]  nfnetlink_rcv_batch+0xbc4/0xdc0 [nfnetlink]\n[ 1360.548909]  nfnetlink_rcv+0x1a8/0x1e0 [nfnetlink]\n[ 1360.548927]  netlink_unicast+0x367/0x4f0\n[ 1360.548935]  netlink_sendmsg+0x34b/0x610\n[ 1360.548944]  ____sys_sendmsg+0x4d4/0x510\n[ 1360.548953]  ___sys_sendmsg+0xc9/0x120\n[ 1360.548961]  __sys_sendmsg+0xbe/0x140\n[ 1360.548971]  do_syscall_64+0x55/0x120\n[ 1360.548982]  entry_SYSCALL_64_after_hwframe+0x55/0x5d\n\n[ 1360.548994] Freed by task 192222:\n[ 1360.548999]  kasan_save_stack+0x20/0x40\n[ 1360.549009]  kasan_save_track+0x14/0x30\n[ 1360.549019]  kasan_save_free_info+0x3b/0x60\n[ 1360.549028]  poison_slab_object+0x100/0x180\n[ 1360.549036]  __kasan_slab_free+0x14/0x30\n[ 1360.549042]  kfree+0xb6/0x260\n[ 1360.549049]  __nft_release_table+0x473/0x6a0 [nf_tables]\n[ 1360.549131]  nf_tables_exit_net+0x170/0x240 [nf_tables]\n[ 1360.549221]  ops_exit_list+0x50/0xa0\n[ 1360.549229]  free_exit_list+0x101/0x140\n[ 1360.549236]  unregister_pernet_operations+0x107/0x160\n[ 1360.549245]  unregister_pernet_subsys+0x1c/0x30\n[ 1360.549254]  nf_tables_module_exit+0x43/0x80 [nf_tables]\n[ 1360.549345]  __do_sys_delete_module+0x253/0x370\n[ 1360.549352]  do_syscall_64+0x55/0x120\n[ 1360.549360]  entry_SYSCALL_64_after_hwframe+0x55/0x5d\n\n(gdb) list *__nft_release_table+0x473\n0x1e033 is in __nft_release_table (net/netfilter/nf_tables_api.c:11354).\n11349           list_for_each_entry_safe(flowtable, nf, &table->flowtables, list) {\n11350                   list_del(&flowtable->list);\n11351                   nft_use_dec(&table->use);\n11352                   nf_tables_flowtable_destroy(flowtable);\n11353           }\n11354           list_for_each_entry_safe(set, ns, &table->sets, list) {\n11355                   list_del(&set->list);\n11356                   nft_use_dec(&table->use);\n11357                   if (set->flags & (NFT_SET_MAP | NFT_SET_OBJECT))\n11358                           nft_map_deactivat\n---truncated---(CVE-2024-35899)\n\nIn the Linux kernel, the following vulnerability has been resolved:\n\ndrm/amdgpu: Skip do PCI error slot reset during RAS recovery\n\nWhy:\n    The PCI error slot reset maybe triggered after inject ue to UMC multi times, this\n    caused system hang.\n    [  557.371857] amdgpu 0000:af:00.0: amdgpu: GPU reset succeeded, trying to resume\n    [  557.373718] [drm] PCIE GART of 512M enabled.\n    [  557.373722] [drm] PTB located at 0x0000031FED700000\n    [  557.373788] [drm] VRAM is lost due to GPU reset!\n    [  557.373789] [drm] PSP is resuming...\n    [  557.547012] mlx5_core 0000:55:00.0: mlx5_pci_err_detected Device state = 1 pci_status: 0. Exit, result = 3, need reset\n    [  557.547067] [drm] PCI error: detected callback, state(1)!!\n    [  557.547069] [drm] No support for XGMI hive yet...\n    [  557.548125] mlx5_core 0000:55:00.0: mlx5_pci_slot_reset Device state = 1 pci_status: 0. Enter\n    [  557.607763] mlx5_core 0000:55:00.0: wait vital counter value 0x16b5b after 1 iterations\n    [  557.607777] mlx5_core 0000:55:00.0: mlx5_pci_slot_reset Device state = 1 pci_status: 1. Exit, err = 0, result = 5, recovered\n    [  557.610492] [drm] PCI error: slot reset callback!!\n    ...\n    [  560.689382] amdgpu 0000:3f:00.0: amdgpu: GPU reset(2) succeeded!\n    [  560.689546] amdgpu 0000:5a:00.0: amdgpu: GPU reset(2) succeeded!\n    [  560.689562] general protection fault, probably for non-canonical address 0x5f080b54534f611f: 0000 [#1] SMP NOPTI\n    [  560.701008] CPU: 16 PID: 2361 Comm: kworker/u448:9 Tainted: G           OE     5.15.0-91-generic #101-Ubuntu\n    [  560.712057] Hardware name: Microsoft C278A/C278A, BIOS C2789.5.BS.1C11.AG.1 11/08/2023\n    [  560.720959] Workqueue: amdgpu-reset-hive amdgpu_ras_do_recovery [amdgpu]\n    [  560.728887] RIP: 0010:amdgpu_device_gpu_recover.cold+0xbf1/0xcf5 [amdgpu]\n    [  560.736891] Code: ff 41 89 c6 e9 1b ff ff ff 44 0f b6 45 b0 e9 4f ff ff ff be 01 00 00 00 4c 89 e7 e8 76 c9 8b ff 44 0f b6 45 b0 e9 3c fd ff ff <48> 83 ba 18 02 00 00 00 0f 84 6a f8 ff ff 48 8d 7a 78 be 01 00 00\n    [  560.757967] RSP: 0018:ffa0000032e53d80 EFLAGS: 00010202\n    [  560.763848] RAX: ffa00000001dfd10 RBX: ffa0000000197090 RCX: ffa0000032e53db0\n    [  560.771856] RDX: 5f080b54534f5f07 RSI: 0000000000000000 RDI: ff11000128100010\n    [  560.779867] RBP: ffa0000032e53df0 R08: 0000000000000000 R09: ffffffffffe77f08\n    [  560.787879] R10: 0000000000ffff0a R11: 0000000000000001 R12: 0000000000000000\n    [  560.795889] R13: ffa0000032e53e00 R14: 0000000000000000 R15: 0000000000000000\n    [  560.803889] FS:  0000000000000000(0000) GS:ff11007e7e800000(0000) knlGS:0000000000000000\n    [  560.812973] CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033\n    [  560.819422] CR2: 000055a04c118e68 CR3: 0000000007410005 CR4: 0000000000771ee0\n    [  560.827433] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000\n    [  560.835433] DR3: 0000000000000000 DR6: 00000000fffe07f0 DR7: 0000000000000400\n    [  560.843444] PKRU: 55555554\n    [  560.846480] Call Trace:\n    [  560.849225]  <TASK>\n    [  560.851580]  ? show_trace_log_lvl+0x1d6/0x2ea\n    [  560.856488]  ? show_trace_log_lvl+0x1d6/0x2ea\n    [  560.861379]  ? amdgpu_ras_do_recovery+0x1b2/0x210 [amdgpu]\n    [  560.867778]  ? show_regs.part.0+0x23/0x29\n    [  560.872293]  ? __die_body.cold+0x8/0xd\n    [  560.876502]  ? die_addr+0x3e/0x60\n    [  560.880238]  ? exc_general_protection+0x1c5/0x410\n    [  560.885532]  ? asm_exc_general_protection+0x27/0x30\n    [  560.891025]  ? amdgpu_device_gpu_recover.cold+0xbf1/0xcf5 [amdgpu]\n    [  560.898323]  amdgpu_ras_do_recovery+0x1b2/0x210 [amdgpu]\n    [  560.904520]  process_one_work+0x228/0x3d0\nHow:\n    In RAS recovery, mode-1 reset is issued from RAS fatal error handling and expected\n    all the nodes in a hive to be reset. no need to issue another mode-1 during this procedure.(CVE-2024-35931)\n\nIn the Linux kernel, the following vulnerability has been resolved:\n\nfs/9p: fix uninitialized values during inode evict\n\nIf an iget fails due to not being able to retrieve information\nfrom the server then the inode structure is only partially\ninitialized.  When the inode gets evicted, references to\nuninitialized structures (like fscache cookies) were being\nmade.\n\nThis patch checks for a bad_inode before doing anything other\nthan clearing the inode from the cache.  Since the inode is\nbad, it shouldn't have any state associated with it that needs\nto be written back (and there really isn't a way to complete\nthose anyways).(CVE-2024-36923)\n\nIn the Linux kernel, the following vulnerability has been resolved:\n\nnilfs2: fix potential kernel bug due to lack of writeback flag waiting\n\nDestructive writes to a block device on which nilfs2 is mounted can cause\na kernel bug in the folio/page writeback start routine or writeback end\nroutine (__folio_start_writeback in the log below):\n\n kernel BUG at mm/page-writeback.c:3070!\n Oops: invalid opcode: 0000 [#1] PREEMPT SMP KASAN PTI\n ...\n RIP: 0010:__folio_start_writeback+0xbaa/0x10e0\n Code: 25 ff 0f 00 00 0f 84 18 01 00 00 e8 40 ca c6 ff e9 17 f6 ff ff\n  e8 36 ca c6 ff 4c 89 f7 48 c7 c6 80 c0 12 84 e8 e7 b3 0f 00 90 <0f>\n  0b e8 1f ca c6 ff 4c 89 f7 48 c7 c6 a0 c6 12 84 e8 d0 b3 0f 00\n ...\n Call Trace:\n  <TASK>\n  nilfs_segctor_do_construct+0x4654/0x69d0 [nilfs2]\n  nilfs_segctor_construct+0x181/0x6b0 [nilfs2]\n  nilfs_segctor_thread+0x548/0x11c0 [nilfs2]\n  kthread+0x2f0/0x390\n  ret_from_fork+0x4b/0x80\n  ret_from_fork_asm+0x1a/0x30\n  </TASK>\n\nThis is because when the log writer starts a writeback for segment summary\nblocks or a super root block that use the backing device's page cache, it\ndoes not wait for the ongoing folio/page writeback, resulting in an\ninconsistent writeback state.\n\nFix this issue by waiting for ongoing writebacks when putting\nfolios/pages on the backing device into writeback state.(CVE-2024-37078)\n\nIn the Linux kernel, the following vulnerability has been resolved:\n\ndrm: bridge: cdns-mhdp8546: Fix possible null pointer dereference\n\nIn cdns_mhdp_atomic_enable(), the return value of drm_mode_duplicate() is\nassigned to mhdp_state->current_mode, and there is a dereference of it in\ndrm_mode_set_name(), which will lead to a NULL pointer dereference on\nfailure of drm_mode_duplicate().\n\nFix this bug add a check of mhdp_state->current_mode.(CVE-2024-38548)\n\nIn the Linux kernel, the following vulnerability has been resolved:\n\nwifi: carl9170: add a proper sanity check for endpoints\n\nSyzkaller reports [1] hitting a warning which is caused by presence\nof a wrong endpoint type at the URB sumbitting stage. While there\nwas a check for a specific 4th endpoint, since it can switch types\nbetween bulk and interrupt, other endpoints are trusted implicitly.\nSimilar warning is triggered in a couple of other syzbot issues [2].\n\nFix the issue by doing a comprehensive check of all endpoints\ntaking into account difference between high- and full-speed\nconfiguration.\n\n[1] Syzkaller report:\n...\nWARNING: CPU: 0 PID: 4721 at drivers/usb/core/urb.c:504 usb_submit_urb+0xed6/0x1880 drivers/usb/core/urb.c:504\n...\nCall Trace:\n <TASK>\n carl9170_usb_send_rx_irq_urb+0x273/0x340 drivers/net/wireless/ath/carl9170/usb.c:504\n carl9170_usb_init_device drivers/net/wireless/ath/carl9170/usb.c:939 [inline]\n carl9170_usb_firmware_finish drivers/net/wireless/ath/carl9170/usb.c:999 [inline]\n carl9170_usb_firmware_step2+0x175/0x240 drivers/net/wireless/ath/carl9170/usb.c:1028\n request_firmware_work_func+0x130/0x240 drivers/base/firmware_loader/main.c:1107\n process_one_work+0x9bf/0x1710 kernel/workqueue.c:2289\n worker_thread+0x669/0x1090 kernel/workqueue.c:2436\n kthread+0x2e8/0x3a0 kernel/kthread.c:376\n ret_from_fork+0x1f/0x30 arch/x86/entry/entry_64.S:308\n </TASK>\n\n[2] Related syzkaller crashes:(CVE-2024-38567)\n\nIn the Linux kernel, the following vulnerability has been resolved:\n\nmacintosh/via-macii: Fix \"BUG: sleeping function called from invalid context\"\n\nThe via-macii ADB driver calls request_irq() after disabling hard\ninterrupts. But disabling interrupts isn't necessary here because the\nVIA shift register interrupt was masked during VIA1 initialization.(CVE-2024-38607)\n\nIn the Linux kernel, the following vulnerability has been resolved:\n\nmedia: i2c: et8ek8: Don't strip remove function when driver is builtin\n\nUsing __exit for the remove function results in the remove callback\nbeing discarded with CONFIG_VIDEO_ET8EK8=y. When such a device gets\nunbound (e.g. using sysfs or hotplug), the driver is just removed\nwithout the cleanup being performed. This results in resource leaks. Fix\nit by compiling in the remove callback unconditionally.\n\nThis also fixes a W=1 modpost warning:\n\n\tWARNING: modpost: drivers/media/i2c/et8ek8/et8ek8: section mismatch in reference: et8ek8_i2c_driver+0x10 (section: .data) -> et8ek8_remove (section: .exit.text)(CVE-2024-38611)\n\nIn the Linux kernel, the following vulnerability has been resolved:\n\nmedia: stk1160: fix bounds checking in stk1160_copy_video()\n\nThe subtract in this condition is reversed.  The ->length is the length\nof the buffer.  The ->bytesused is how many bytes we have copied thus\nfar.  When the condition is reversed that means the result of the\nsubtraction is always negative but since it's unsigned then the result\nis a very high positive value.  That means the overflow check is never\ntrue.\n\nAdditionally, the ->bytesused doesn't actually work for this purpose\nbecause we're not writing to \"buf->mem + buf->bytesused\".  Instead, the\nmath to calculate the destination where we are writing is a bit\ninvolved.  You calculate the number of full lines already written,\nmultiply by two, skip a line if necessary so that we start on an odd\nnumbered line, and add the offset into the line.\n\nTo fix this buffer overflow, just take the actual destination where we\nare writing, if the offset is already out of bounds print an error and\nreturn.  Otherwise, write up to buf->length bytes.(CVE-2024-38621)\n\nIn the Linux kernel, the following vulnerability has been resolved:\n\nfbdev: savage: Handle err return when savagefb_check_var failed\n\nThe commit 04e5eac8f3ab(\"fbdev: savage: Error out if pixclock equals zero\")\nchecks the value of pixclock to avoid divide-by-zero error. However\nthe function savagefb_probe doesn't handle the error return of\nsavagefb_check_var. When pixclock is 0, it will cause divide-by-zero error.(CVE-2024-39475)\n\nIn the Linux kernel, the following vulnerability has been resolved:\n\nmd/raid5: fix deadlock that raid5d() wait for itself to clear MD_SB_CHANGE_PENDING\n\nXiao reported that lvm2 test lvconvert-raid-takeover.sh can hang with\nsmall possibility, the root cause is exactly the same as commit\nbed9e27baf52 (\"Revert \"md/raid5: Wait for MD_SB_CHANGE_PENDING in raid5d\"\")\n\nHowever, Dan reported another hang after that, and junxiao investigated\nthe problem and found out that this is caused by plugged bio can't issue\nfrom raid5d().\n\nCurrent implementation in raid5d() has a weird dependence:\n\n1) md_check_recovery() from raid5d() must hold 'reconfig_mutex' to clear\n   MD_SB_CHANGE_PENDING;\n2) raid5d() handles IO in a deadloop, until all IO are issued;\n3) IO from raid5d() must wait for MD_SB_CHANGE_PENDING to be cleared;\n\nThis behaviour is introduce before v2.6, and for consequence, if other\ncontext hold 'reconfig_mutex', and md_check_recovery() can't update\nsuper_block, then raid5d() will waste one cpu 100% by the deadloop, until\n'reconfig_mutex' is released.\n\nRefer to the implementation from raid1 and raid10, fix this problem by\nskipping issue IO if MD_SB_CHANGE_PENDING is still set after\nmd_check_recovery(), daemon thread will be woken up when 'reconfig_mutex'\nis released. Meanwhile, the hang problem will be fixed as well.(CVE-2024-39476)\n\nIn the Linux kernel, the following vulnerability has been resolved:\n\nmmc: davinci: Don't strip remove function when driver is builtin\n\nUsing __exit for the remove function results in the remove callback being\ndiscarded with CONFIG_MMC_DAVINCI=y. When such a device gets unbound (e.g.\nusing sysfs or hotplug), the driver is just removed without the cleanup\nbeing performed. This results in resource leaks. Fix it by compiling in the\nremove callback unconditionally.\n\nThis also fixes a W=1 modpost warning:\n\nWARNING: modpost: drivers/mmc/host/davinci_mmc: section mismatch in\nreference: davinci_mmcsd_driver+0x10 (section: .data) ->\ndavinci_mmcsd_remove (section: .exit.text)(CVE-2024-39484)\n\nIn the Linux kernel, the following vulnerability has been resolved:\n\nliquidio: Adjust a NULL pointer handling path in lio_vf_rep_copy_packet\n\nIn lio_vf_rep_copy_packet() pg_info->page is compared to a NULL value,\nbut then it is unconditionally passed to skb_add_rx_frag() which looks\nstrange and could lead to null pointer dereference.\n\nlio_vf_rep_copy_packet() call trace looks like:\n\tocteon_droq_process_packets\n\t octeon_droq_fast_process_packets\n\t  octeon_droq_dispatch_pkt\n\t   octeon_create_recv_info\n\t    ...search in the dispatch_list...\n\t     ->disp_fn(rdisp->rinfo, ...)\n\t      lio_vf_rep_pkt_recv(struct octeon_recv_info *recv_info, ...)\nIn this path there is no code which sets pg_info->page to NULL.\nSo this check looks unneeded and doesn't solve potential problem.\nBut I guess the author had reason to add a check and I have no such card\nand can't do real test.\nIn addition, the code in the function liquidio_push_packet() in\nliquidio/lio_core.c does exactly the same.\n\nBased on this, I consider the most acceptable compromise solution to\nadjust this issue by moving skb_add_rx_frag() into conditional scope.\n\nFound by Linux Verification Center (linuxtesting.org) with SVACE.(CVE-2024-39506)\n\nIn the Linux kernel, the following vulnerability has been resolved:\n\nio_uring/io-wq: Use set_bit() and test_bit() at worker->flags\n\nUtilize set_bit() and test_bit() on worker->flags within io_uring/io-wq\nto address potential data races.\n\nThe structure io_worker->flags may be accessed through various data\npaths, leading to concurrency issues. When KCSAN is enabled, it reveals\ndata races occurring in io_worker_handle_work and\nio_wq_activate_free_worker functions.\n\n\t BUG: KCSAN: data-race in io_worker_handle_work / io_wq_activate_free_worker\n\t write to 0xffff8885c4246404 of 4 bytes by task 49071 on cpu 28:\n\t io_worker_handle_work (io_uring/io-wq.c:434 io_uring/io-wq.c:569)\n\t io_wq_worker (io_uring/io-wq.c:?)\n<snip>\n\n\t read to 0xffff8885c4246404 of 4 bytes by task 49024 on cpu 5:\n\t io_wq_activate_free_worker (io_uring/io-wq.c:? io_uring/io-wq.c:285)\n\t io_wq_enqueue (io_uring/io-wq.c:947)\n\t io_queue_iowq (io_uring/io_uring.c:524)\n\t io_req_task_submit (io_uring/io_uring.c:1511)\n\t io_handle_tw_list (io_uring/io_uring.c:1198)\n<snip>\n\nLine numbers against commit 18daea77cca6 (\"Merge tag 'for-linus' of\ngit://git.kernel.org/pub/scm/virt/kvm/kvm\").\n\nThese races involve writes and reads to the same memory location by\ndifferent tasks running on different CPUs. To mitigate this, refactor\nthe code to use atomic operations such as set_bit(), test_bit(), and\nclear_bit() instead of basic \"and\" and \"or\" operations. This ensures\nthread-safe manipulation of worker flags.\n\nAlso, move `create_index` to avoid holes in the structure.(CVE-2024-39508)\n\nIn the Linux kernel, the following vulnerability has been resolved:\n\nriscv: rewrite __kernel_map_pages() to fix sleeping in invalid context\n\n__kernel_map_pages() is a debug function which clears the valid bit in page\ntable entry for deallocated pages to detect illegal memory accesses to\nfreed pages.\n\nThis function set/clear the valid bit using __set_memory(). __set_memory()\nacquires init_mm's semaphore, and this operation may sleep. This is\nproblematic, because  __kernel_map_pages() can be called in atomic context,\nand thus is illegal to sleep. An example warning that this causes:\n\nBUG: sleeping function called from invalid context at kernel/locking/rwsem.c:1578\nin_atomic(): 1, irqs_disabled(): 0, non_block: 0, pid: 2, name: kthreadd\npreempt_count: 2, expected: 0\nCPU: 0 PID: 2 Comm: kthreadd Not tainted 6.9.0-g1d4c6d784ef6 #37\nHardware name: riscv-virtio,qemu (DT)\nCall Trace:\n[<ffffffff800060dc>] dump_backtrace+0x1c/0x24\n[<ffffffff8091ef6e>] show_stack+0x2c/0x38\n[<ffffffff8092baf8>] dump_stack_lvl+0x5a/0x72\n[<ffffffff8092bb24>] dump_stack+0x14/0x1c\n[<ffffffff8003b7ac>] __might_resched+0x104/0x10e\n[<ffffffff8003b7f4>] __might_sleep+0x3e/0x62\n[<ffffffff8093276a>] down_write+0x20/0x72\n[<ffffffff8000cf00>] __set_memory+0x82/0x2fa\n[<ffffffff8000d324>] __kernel_map_pages+0x5a/0xd4\n[<ffffffff80196cca>] __alloc_pages_bulk+0x3b2/0x43a\n[<ffffffff8018ee82>] __vmalloc_node_range+0x196/0x6ba\n[<ffffffff80011904>] copy_process+0x72c/0x17ec\n[<ffffffff80012ab4>] kernel_clone+0x60/0x2fe\n[<ffffffff80012f62>] kernel_thread+0x82/0xa0\n[<ffffffff8003552c>] kthreadd+0x14a/0x1be\n[<ffffffff809357de>] ret_from_fork+0xe/0x1c\n\nRewrite this function with apply_to_existing_page_range(). It is fine to\nnot have any locking, because __kernel_map_pages() works with pages being\nallocated/deallocated and those pages are not changed by anyone else in the\nmeantime.(CVE-2024-40915)\n\nIn the Linux kernel, the following vulnerability has been resolved:\n\niommu: Return right value in iommu_sva_bind_device()\n\niommu_sva_bind_device() should return either a sva bond handle or an\nERR_PTR value in error cases. Existing drivers (idxd and uacce) only\ncheck the return value with IS_ERR(). This could potentially lead to\na kernel NULL pointer dereference issue if the function returns NULL\ninstead of an error pointer.\n\nIn reality, this doesn't cause any problems because iommu_sva_bind_device()\nonly returns NULL when the kernel is not configured with CONFIG_IOMMU_SVA.\nIn this case, iommu_dev_enable_feature(dev, IOMMU_DEV_FEAT_SVA) will\nreturn an error, and the device drivers won't call iommu_sva_bind_device()\nat all.(CVE-2024-40945)\n\nIn the Linux kernel, the following vulnerability has been resolved:\n\nima: Avoid blocking in RCU read-side critical section\n\nA panic happens in ima_match_policy:\n\nBUG: unable to handle kernel NULL pointer dereference at 0000000000000010\nPGD 42f873067 P4D 0\nOops: 0000 [#1] SMP NOPTI\nCPU: 5 PID: 1286325 Comm: kubeletmonit.sh\nKdump: loaded Tainted: P\nHardware name: QEMU Standard PC (i440FX + PIIX, 1996),\n               BIOS 0.0.0 02/06/2015\nRIP: 0010:ima_match_policy+0x84/0x450\nCode: 49 89 fc 41 89 cf 31 ed 89 44 24 14 eb 1c 44 39\n      7b 18 74 26 41 83 ff 05 74 20 48 8b 1b 48 3b 1d\n      f2 b9 f4 00 0f 84 9c 01 00 00 <44> 85 73 10 74 ea\n      44 8b 6b 14 41 f6 c5 01 75 d4 41 f6 c5 02 74 0f\nRSP: 0018:ff71570009e07a80 EFLAGS: 00010207\nRAX: 0000000000000000 RBX: 0000000000000000 RCX: 0000000000000200\nRDX: ffffffffad8dc7c0 RSI: 0000000024924925 RDI: ff3e27850dea2000\nRBP: 0000000000000000 R08: 0000000000000000 R09: ffffffffabfce739\nR10: ff3e27810cc42400 R11: 0000000000000000 R12: ff3e2781825ef970\nR13: 00000000ff3e2785 R14: 000000000000000c R15: 0000000000000001\nFS:  00007f5195b51740(0000)\nGS:ff3e278b12d40000(0000) knlGS:0000000000000000\nCS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033\nCR2: 0000000000000010 CR3: 0000000626d24002 CR4: 0000000000361ee0\nDR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000\nDR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400\nCall Trace:\n ima_get_action+0x22/0x30\n process_measurement+0xb0/0x830\n ? page_add_file_rmap+0x15/0x170\n ? alloc_set_pte+0x269/0x4c0\n ? prep_new_page+0x81/0x140\n ? simple_xattr_get+0x75/0xa0\n ? selinux_file_open+0x9d/0xf0\n ima_file_check+0x64/0x90\n path_openat+0x571/0x1720\n do_filp_open+0x9b/0x110\n ? page_counter_try_charge+0x57/0xc0\n ? files_cgroup_alloc_fd+0x38/0x60\n ? __alloc_fd+0xd4/0x250\n ? do_sys_open+0x1bd/0x250\n do_sys_open+0x1bd/0x250\n do_syscall_64+0x5d/0x1d0\n entry_SYSCALL_64_after_hwframe+0x65/0xca\n\nCommit c7423dbdbc9e (\"ima: Handle -ESTALE returned by\nima_filter_rule_match()\") introduced call to ima_lsm_copy_rule within a\nRCU read-side critical section which contains kmalloc with GFP_KERNEL.\nThis implies a possible sleep and violates limitations of RCU read-side\ncritical sections on non-PREEMPT systems.\n\nSleeping within RCU read-side critical section might cause\nsynchronize_rcu() returning early and break RCU protection, allowing a\nUAF to happen.\n\nThe root cause of this issue could be described as follows:\n|\tThread A\t|\tThread B\t|\n|\t\t\t|ima_match_policy\t|\n|\t\t\t|  rcu_read_lock\t|\n|ima_lsm_update_rule\t|\t\t\t|\n|  synchronize_rcu\t|\t\t\t|\n|\t\t\t|    kmalloc(GFP_KERNEL)|\n|\t\t\t|      sleep\t\t|\n==> synchronize_rcu returns early\n|  kfree(entry)\t\t|\t\t\t|\n|\t\t\t|    entry = entry->next|\n==> UAF happens and entry now becomes NULL (or could be anything).\n|\t\t\t|    entry->action\t|\n==> Accessing entry might cause panic.\n\nTo fix this issue, we are converting all kmalloc that is called within\nRCU read-side critical section to use GFP_ATOMIC.\n\n[PM: fixed missing comment, long lines, !CONFIG_IMA_LSM_RULES case](CVE-2024-40947)\n\nIn the Linux kernel, the following vulnerability has been resolved:\n\ndmaengine: idxd: Fix possible Use-After-Free in irq_process_work_list\n\nUse list_for_each_entry_safe() to allow iterating through the list and\ndeleting the entry in the iteration process. The descriptor is freed via\nidxd_desc_complete() and there's a slight chance may cause issue for\nthe list iterator when the descriptor is reused by another thread\nwithout it being deleted from the list.(CVE-2024-40956)\n\nIn the Linux kernel, the following vulnerability has been resolved:\n\nipv6: prevent possible NULL dereference in rt6_probe()\n\nsyzbot caught a NULL dereference in rt6_probe() [1]\n\nBail out if  __in6_dev_get() returns NULL.\n\n[1]\nOops: general protection fault, probably for non-canonical address 0xdffffc00000000cb: 0000 [#1] PREEMPT SMP KASAN PTI\nKASAN: null-ptr-deref in range [0x0000000000000658-0x000000000000065f]\nCPU: 1 PID: 22444 Comm: syz-executor.0 Not tainted 6.10.0-rc2-syzkaller-00383-gb8481381d4e2 #0\nHardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 04/02/2024\n RIP: 0010:rt6_probe net/ipv6/route.c:656 [inline]\n RIP: 0010:find_match+0x8c4/0xf50 net/ipv6/route.c:758\nCode: 14 fd f7 48 8b 85 38 ff ff ff 48 c7 45 b0 00 00 00 00 48 8d b8 5c 06 00 00 48 b8 00 00 00 00 00 fc ff df 48 89 fa 48 c1 ea 03 <0f> b6 14 02 48 89 f8 83 e0 07 83 c0 03 38 d0 7c 08 84 d2 0f 85 19\nRSP: 0018:ffffc900034af070 EFLAGS: 00010203\nRAX: dffffc0000000000 RBX: 0000000000000000 RCX: ffffc90004521000\nRDX: 00000000000000cb RSI: ffffffff8990d0cd RDI: 000000000000065c\nRBP: ffffc900034af150 R08: 0000000000000005 R09: 0000000000000000\nR10: 0000000000000001 R11: 0000000000000002 R12: 000000000000000a\nR13: 1ffff92000695e18 R14: ffff8880244a1d20 R15: 0000000000000000\nFS:  00007f4844a5a6c0(0000) GS:ffff8880b9300000(0000) knlGS:0000000000000000\nCS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033\nCR2: 0000001b31b27000 CR3: 000000002d42c000 CR4: 00000000003506f0\nDR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000\nDR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400\nCall Trace:\n <TASK>\n  rt6_nh_find_match+0xfa/0x1a0 net/ipv6/route.c:784\n  nexthop_for_each_fib6_nh+0x26d/0x4a0 net/ipv4/nexthop.c:1496\n  __find_rr_leaf+0x6e7/0xe00 net/ipv6/route.c:825\n  find_rr_leaf net/ipv6/route.c:853 [inline]\n  rt6_select net/ipv6/route.c:897 [inline]\n  fib6_table_lookup+0x57e/0xa30 net/ipv6/route.c:2195\n  ip6_pol_route+0x1cd/0x1150 net/ipv6/route.c:2231\n  pol_lookup_func include/net/ip6_fib.h:616 [inline]\n  fib6_rule_lookup+0x386/0x720 net/ipv6/fib6_rules.c:121\n  ip6_route_output_flags_noref net/ipv6/route.c:2639 [inline]\n  ip6_route_output_flags+0x1d0/0x640 net/ipv6/route.c:2651\n  ip6_dst_lookup_tail.constprop.0+0x961/0x1760 net/ipv6/ip6_output.c:1147\n  ip6_dst_lookup_flow+0x99/0x1d0 net/ipv6/ip6_output.c:1250\n  rawv6_sendmsg+0xdab/0x4340 net/ipv6/raw.c:898\n  inet_sendmsg+0x119/0x140 net/ipv4/af_inet.c:853\n  sock_sendmsg_nosec net/socket.c:730 [inline]\n  __sock_sendmsg net/socket.c:745 [inline]\n  sock_write_iter+0x4b8/0x5c0 net/socket.c:1160\n  new_sync_write fs/read_write.c:497 [inline]\n  vfs_write+0x6b6/0x1140 fs/read_write.c:590\n  ksys_write+0x1f8/0x260 fs/read_write.c:643\n  do_syscall_x64 arch/x86/entry/common.c:52 [inline]\n  do_syscall_64+0xcd/0x250 arch/x86/entry/common.c:83\n entry_SYSCALL_64_after_hwframe+0x77/0x7f(CVE-2024-40960)\n\nIn the Linux kernel, the following vulnerability has been resolved:\n\nserial: imx: Introduce timeout when waiting on transmitter empty\n\nBy waiting at most 1 second for USR2_TXDC to be set, we avoid a potential\ndeadlock.\n\nIn case of the timeout, there is not much we can do, so we simply ignore\nthe transmitter state and optimistically try to continue.(CVE-2024-40967)\n\nIn the Linux kernel, the following vulnerability has been resolved:\n\next4: do not create EA inode under buffer lock\n\next4_xattr_set_entry() creates new EA inodes while holding buffer lock\non the external xattr block. This is problematic as it nests all the\nallocation locking (which acquires locks on other buffers) under the\nbuffer lock. This can even deadlock when the filesystem is corrupted and\ne.g. quota file is setup to contain xattr block as data block. Move the\nallocation of EA inode out of ext4_xattr_set_entry() into the callers.(CVE-2024-40972)\n\nIn the Linux kernel, the following vulnerability has been resolved:\n\ndrop_monitor: replace spin_lock by raw_spin_lock\n\ntrace_drop_common() is called with preemption disabled, and it acquires\na spin_lock. This is problematic for RT kernels because spin_locks are\nsleeping locks in this configuration, which causes the following splat:\n\nBUG: sleeping function called from invalid context at kernel/locking/spinlock_rt.c:48\nin_atomic(): 1, irqs_disabled(): 1, non_block: 0, pid: 449, name: rcuc/47\npreempt_count: 1, expected: 0\nRCU nest depth: 2, expected: 2\n5 locks held by rcuc/47/449:\n #0: ff1100086ec30a60 ((softirq_ctrl.lock)){+.+.}-{2:2}, at: __local_bh_disable_ip+0x105/0x210\n #1: ffffffffb394a280 (rcu_read_lock){....}-{1:2}, at: rt_spin_lock+0xbf/0x130\n #2: ffffffffb394a280 (rcu_read_lock){....}-{1:2}, at: __local_bh_disable_ip+0x11c/0x210\n #3: ffffffffb394a160 (rcu_callback){....}-{0:0}, at: rcu_do_batch+0x360/0xc70\n #4: ff1100086ee07520 (&data->lock){+.+.}-{2:2}, at: trace_drop_common.constprop.0+0xb5/0x290\nirq event stamp: 139909\nhardirqs last  enabled at (139908): [<ffffffffb1df2b33>] _raw_spin_unlock_irqrestore+0x63/0x80\nhardirqs last disabled at (139909): [<ffffffffb19bd03d>] trace_drop_common.constprop.0+0x26d/0x290\nsoftirqs last  enabled at (139892): [<ffffffffb07a1083>] __local_bh_enable_ip+0x103/0x170\nsoftirqs last disabled at (139898): [<ffffffffb0909b33>] rcu_cpu_kthread+0x93/0x1f0\nPreemption disabled at:\n[<ffffffffb1de786b>] rt_mutex_slowunlock+0xab/0x2e0\nCPU: 47 PID: 449 Comm: rcuc/47 Not tainted 6.9.0-rc2-rt1+ #7\nHardware name: Dell Inc. PowerEdge R650/0Y2G81, BIOS 1.6.5 04/15/2022\nCall Trace:\n <TASK>\n dump_stack_lvl+0x8c/0xd0\n dump_stack+0x14/0x20\n __might_resched+0x21e/0x2f0\n rt_spin_lock+0x5e/0x130\n ? trace_drop_common.constprop.0+0xb5/0x290\n ? skb_queue_purge_reason.part.0+0x1bf/0x230\n trace_drop_common.constprop.0+0xb5/0x290\n ? preempt_count_sub+0x1c/0xd0\n ? _raw_spin_unlock_irqrestore+0x4a/0x80\n ? __pfx_trace_drop_common.constprop.0+0x10/0x10\n ? rt_mutex_slowunlock+0x26a/0x2e0\n ? skb_queue_purge_reason.part.0+0x1bf/0x230\n ? __pfx_rt_mutex_slowunlock+0x10/0x10\n ? skb_queue_purge_reason.part.0+0x1bf/0x230\n trace_kfree_skb_hit+0x15/0x20\n trace_kfree_skb+0xe9/0x150\n kfree_skb_reason+0x7b/0x110\n skb_queue_purge_reason.part.0+0x1bf/0x230\n ? __pfx_skb_queue_purge_reason.part.0+0x10/0x10\n ? mark_lock.part.0+0x8a/0x520\n...\n\ntrace_drop_common() also disables interrupts, but this is a minor issue\nbecause we could easily replace it with a local_lock.\n\nReplace the spin_lock with raw_spin_lock to avoid sleeping in atomic\ncontext.(CVE-2024-40980)\n\nIn the Linux kernel, the following vulnerability has been resolved:\n\nbatman-adv: bypass empty buckets in batadv_purge_orig_ref()\n\nMany syzbot reports are pointing to soft lockups in\nbatadv_purge_orig_ref() [1]\n\nRoot cause is unknown, but we can avoid spending too much\ntime there and perhaps get more interesting reports.\n\n[1]\n\nwatchdog: BUG: soft lockup - CPU#0 stuck for 27s! [kworker/u4:6:621]\nModules linked in:\nirq event stamp: 6182794\n hardirqs last  enabled at (6182793): [<ffff8000801dae10>] __local_bh_enable_ip+0x224/0x44c kernel/softirq.c:386\n hardirqs last disabled at (6182794): [<ffff80008ad66a78>] __el1_irq arch/arm64/kernel/entry-common.c:533 [inline]\n hardirqs last disabled at (6182794): [<ffff80008ad66a78>] el1_interrupt+0x24/0x68 arch/arm64/kernel/entry-common.c:551\n softirqs last  enabled at (6182792): [<ffff80008aab71c4>] spin_unlock_bh include/linux/spinlock.h:396 [inline]\n softirqs last  enabled at (6182792): [<ffff80008aab71c4>] batadv_purge_orig_ref+0x114c/0x1228 net/batman-adv/originator.c:1287\n softirqs last disabled at (6182790): [<ffff80008aab61dc>] spin_lock_bh include/linux/spinlock.h:356 [inline]\n softirqs last disabled at (6182790): [<ffff80008aab61dc>] batadv_purge_orig_ref+0x164/0x1228 net/batman-adv/originator.c:1271\nCPU: 0 PID: 621 Comm: kworker/u4:6 Not tainted 6.8.0-rc7-syzkaller-g707081b61156 #0\nHardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/29/2024\nWorkqueue: bat_events batadv_purge_orig\npstate: 80400005 (Nzcv daif +PAN -UAO -TCO -DIT -SSBS BTYPE=--)\n pc : should_resched arch/arm64/include/asm/preempt.h:79 [inline]\n pc : __local_bh_enable_ip+0x228/0x44c kernel/softirq.c:388\n lr : __local_bh_enable_ip+0x224/0x44c kernel/softirq.c:386\nsp : ffff800099007970\nx29: ffff800099007980 x28: 1fffe00018fce1bd x27: dfff800000000000\nx26: ffff0000d2620008 x25: ffff0000c7e70de8 x24: 0000000000000001\nx23: 1fffe00018e57781 x22: dfff800000000000 x21: ffff80008aab71c4\nx20: ffff0001b40136c0 x19: ffff0000c72bbc08 x18: 1fffe0001a817bb0\nx17: ffff800125414000 x16: ffff80008032116c x15: 0000000000000001\nx14: 1fffe0001ee9d610 x13: 0000000000000000 x12: 0000000000000003\nx11: 0000000000000000 x10: 0000000000ff0100 x9 : 0000000000000000\nx8 : 00000000005e5789 x7 : ffff80008aab61dc x6 : 0000000000000000\nx5 : 0000000000000000 x4 : 0000000000000001 x3 : 0000000000000000\nx2 : 0000000000000006 x1 : 0000000000000080 x0 : ffff800125414000\nCall trace:\n  __daif_local_irq_enable arch/arm64/include/asm/irqflags.h:27 [inline]\n  arch_local_irq_enable arch/arm64/include/asm/irqflags.h:49 [inline]\n  __local_bh_enable_ip+0x228/0x44c kernel/softirq.c:386\n  __raw_spin_unlock_bh include/linux/spinlock_api_smp.h:167 [inline]\n  _raw_spin_unlock_bh+0x3c/0x4c kernel/locking/spinlock.c:210\n  spin_unlock_bh include/linux/spinlock.h:396 [inline]\n  batadv_purge_orig_ref+0x114c/0x1228 net/batman-adv/originator.c:1287\n  batadv_purge_orig+0x20/0x70 net/batman-adv/originator.c:1300\n  process_one_work+0x694/0x1204 kernel/workqueue.c:2633\n  process_scheduled_works kernel/workqueue.c:2706 [inline]\n  worker_thread+0x938/0xef4 kernel/workqueue.c:2787\n  kthread+0x288/0x310 kernel/kthread.c:388\n  ret_from_fork+0x10/0x20 arch/arm64/kernel/entry.S:860\nSending NMI from CPU 0 to CPUs 1:\nNMI backtrace for cpu 1\nCPU: 1 PID: 0 Comm: swapper/1 Not tainted 6.8.0-rc7-syzkaller-g707081b61156 #0\nHardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/29/2024\npstate: 80400005 (Nzcv daif +PAN -UAO -TCO -DIT -SSBS BTYPE=--)\n pc : arch_local_irq_enable+0x8/0xc arch/arm64/include/asm/irqflags.h:51\n lr : default_idle_call+0xf8/0x128 kernel/sched/idle.c:103\nsp : ffff800093a17d30\nx29: ffff800093a17d30 x28: dfff800000000000 x27: 1ffff00012742fb4\nx26: ffff80008ec9d000 x25: 0000000000000000 x24: 0000000000000002\nx23: 1ffff00011d93a74 x22: ffff80008ec9d3a0 x21: 0000000000000000\nx20: ffff0000c19dbc00 x19: ffff8000802d0fd8 x18: 1fffe00036804396\nx17: ffff80008ec9d000 x16: ffff8000802d089c x15: 0000000000000001\n---truncated---(CVE-2024-40981)\n\nIn the Linux kernel, the following vulnerability has been resolved:\n\nnet/sched: act_api: fix possible infinite loop in tcf_idr_check_alloc()\n\nsyzbot found hanging tasks waiting on rtnl_lock [1]\n\nA reproducer is available in the syzbot bug.\n\nWhen a request to add multiple actions with the same index is sent, the\nsecond request will block forever on the first request. This holds\nrtnl_lock, and causes tasks to hang.\n\nReturn -EAGAIN to prevent infinite looping, while keeping documented\nbehavior.\n\n[1]\n\nINFO: task kworker/1:0:5088 blocked for more than 143 seconds.\nNot tainted 6.9.0-rc4-syzkaller-00173-g3cdb45594619 #0\n\"echo 0 > /proc/sys/kernel/hung_task_timeout_secs\" disables this message.\ntask:kworker/1:0 state:D stack:23744 pid:5088 tgid:5088 ppid:2 flags:0x00004000\nWorkqueue: events_power_efficient reg_check_chans_work\nCall Trace:\n<TASK>\ncontext_switch kernel/sched/core.c:5409 [inline]\n__schedule+0xf15/0x5d00 kernel/sched/core.c:6746\n__schedule_loop kernel/sched/core.c:6823 [inline]\nschedule+0xe7/0x350 kernel/sched/core.c:6838\nschedule_preempt_disabled+0x13/0x30 kernel/sched/core.c:6895\n__mutex_lock_common kernel/locking/mutex.c:684 [inline]\n__mutex_lock+0x5b8/0x9c0 kernel/locking/mutex.c:752\nwiphy_lock include/net/cfg80211.h:5953 [inline]\nreg_leave_invalid_chans net/wireless/reg.c:2466 [inline]\nreg_check_chans_work+0x10a/0x10e0 net/wireless/reg.c:2481(CVE-2024-40995)\n\nIn the Linux kernel, the following vulnerability has been resolved:\n\ndrm/amdkfd: don't allow mapping the MMIO HDP page with large pages\n\nWe don't get the right offset in that case.  The GPU has\nan unused 4K area of the register BAR space into which you can\nremap registers.  We remap the HDP flush registers into this\nspace to allow userspace (CPU or GPU) to flush the HDP when it\nupdates VRAM.  However, on systems with >4K pages, we end up\nexposing PAGE_SIZE of MMIO space.(CVE-2024-41011)",
				"category":"general",
				"title":"Description"
			},
			{
				"text":"An update for kernel is now available for openEuler-22.03-LTS-SP1.\n\nopenEuler Security has rated this update as having a security impact of high. A Common Vunlnerability Scoring System(CVSS)base score,which gives a detailed severity rating, is available for each vulnerability from the CVElink(s) in the References section.",
				"category":"general",
				"title":"Topic"
			},
			{
				"text":"High",
				"category":"general",
				"title":"Severity"
			},
			{
				"text":"kernel",
				"category":"general",
				"title":"Affected Component"
			}
		],
		"publisher":{
			"issuing_authority":"openEuler security committee",
			"name":"openEuler",
			"namespace":"https://www.openeuler.org",
			"contact_details":"openeuler-security@openeuler.org",
			"category":"vendor"
		},
		"references":[
			{
				"summary":"openEuler-SA-2024-1941",
				"category":"self",
				"url":"https://www.openeuler.org/en/security/security-bulletins/detail?id=openEuler-SA-2024-1941"
			},
			{
				"summary":"CVE-2021-47205",
				"category":"self",
				"url":"https://www.openeuler.org/en/security/cve/detail/?cveId=CVE-2021-47205&packageName=kernel"
			},
			{
				"summary":"CVE-2022-48703",
				"category":"self",
				"url":"https://www.openeuler.org/en/security/cve/detail/?cveId=CVE-2022-48703&packageName=kernel"
			},
			{
				"summary":"CVE-2022-48780",
				"category":"self",
				"url":"https://www.openeuler.org/en/security/cve/detail/?cveId=CVE-2022-48780&packageName=kernel"
			},
			{
				"summary":"CVE-2022-48859",
				"category":"self",
				"url":"https://www.openeuler.org/en/security/cve/detail/?cveId=CVE-2022-48859&packageName=kernel"
			},
			{
				"summary":"CVE-2023-52679",
				"category":"self",
				"url":"https://www.openeuler.org/en/security/cve/detail/?cveId=CVE-2023-52679&packageName=kernel"
			},
			{
				"summary":"CVE-2024-26924",
				"category":"self",
				"url":"https://www.openeuler.org/en/security/cve/detail/?cveId=CVE-2024-26924&packageName=kernel"
			},
			{
				"summary":"CVE-2024-26925",
				"category":"self",
				"url":"https://www.openeuler.org/en/security/cve/detail/?cveId=CVE-2024-26925&packageName=kernel"
			},
			{
				"summary":"CVE-2024-27010",
				"category":"self",
				"url":"https://www.openeuler.org/en/security/cve/detail/?cveId=CVE-2024-27010&packageName=kernel"
			},
			{
				"summary":"CVE-2024-34777",
				"category":"self",
				"url":"https://www.openeuler.org/en/security/cve/detail/?cveId=CVE-2024-34777&packageName=kernel"
			},
			{
				"summary":"CVE-2024-35808",
				"category":"self",
				"url":"https://www.openeuler.org/en/security/cve/detail/?cveId=CVE-2024-35808&packageName=kernel"
			},
			{
				"summary":"CVE-2024-35837",
				"category":"self",
				"url":"https://www.openeuler.org/en/security/cve/detail/?cveId=CVE-2024-35837&packageName=kernel"
			},
			{
				"summary":"CVE-2024-35899",
				"category":"self",
				"url":"https://www.openeuler.org/en/security/cve/detail/?cveId=CVE-2024-35899&packageName=kernel"
			},
			{
				"summary":"CVE-2024-35931",
				"category":"self",
				"url":"https://www.openeuler.org/en/security/cve/detail/?cveId=CVE-2024-35931&packageName=kernel"
			},
			{
				"summary":"CVE-2024-36923",
				"category":"self",
				"url":"https://www.openeuler.org/en/security/cve/detail/?cveId=CVE-2024-36923&packageName=kernel"
			},
			{
				"summary":"CVE-2024-37078",
				"category":"self",
				"url":"https://www.openeuler.org/en/security/cve/detail/?cveId=CVE-2024-37078&packageName=kernel"
			},
			{
				"summary":"CVE-2024-38548",
				"category":"self",
				"url":"https://www.openeuler.org/en/security/cve/detail/?cveId=CVE-2024-38548&packageName=kernel"
			},
			{
				"summary":"CVE-2024-38567",
				"category":"self",
				"url":"https://www.openeuler.org/en/security/cve/detail/?cveId=CVE-2024-38567&packageName=kernel"
			},
			{
				"summary":"CVE-2024-38607",
				"category":"self",
				"url":"https://www.openeuler.org/en/security/cve/detail/?cveId=CVE-2024-38607&packageName=kernel"
			},
			{
				"summary":"CVE-2024-38611",
				"category":"self",
				"url":"https://www.openeuler.org/en/security/cve/detail/?cveId=CVE-2024-38611&packageName=kernel"
			},
			{
				"summary":"CVE-2024-38621",
				"category":"self",
				"url":"https://www.openeuler.org/en/security/cve/detail/?cveId=CVE-2024-38621&packageName=kernel"
			},
			{
				"summary":"CVE-2024-39475",
				"category":"self",
				"url":"https://www.openeuler.org/en/security/cve/detail/?cveId=CVE-2024-39475&packageName=kernel"
			},
			{
				"summary":"CVE-2024-39476",
				"category":"self",
				"url":"https://www.openeuler.org/en/security/cve/detail/?cveId=CVE-2024-39476&packageName=kernel"
			},
			{
				"summary":"CVE-2024-39484",
				"category":"self",
				"url":"https://www.openeuler.org/en/security/cve/detail/?cveId=CVE-2024-39484&packageName=kernel"
			},
			{
				"summary":"CVE-2024-39506",
				"category":"self",
				"url":"https://www.openeuler.org/en/security/cve/detail/?cveId=CVE-2024-39506&packageName=kernel"
			},
			{
				"summary":"CVE-2024-39508",
				"category":"self",
				"url":"https://www.openeuler.org/en/security/cve/detail/?cveId=CVE-2024-39508&packageName=kernel"
			},
			{
				"summary":"CVE-2024-40915",
				"category":"self",
				"url":"https://www.openeuler.org/en/security/cve/detail/?cveId=CVE-2024-40915&packageName=kernel"
			},
			{
				"summary":"CVE-2024-40945",
				"category":"self",
				"url":"https://www.openeuler.org/en/security/cve/detail/?cveId=CVE-2024-40945&packageName=kernel"
			},
			{
				"summary":"CVE-2024-40947",
				"category":"self",
				"url":"https://www.openeuler.org/en/security/cve/detail/?cveId=CVE-2024-40947&packageName=kernel"
			},
			{
				"summary":"CVE-2024-40956",
				"category":"self",
				"url":"https://www.openeuler.org/en/security/cve/detail/?cveId=CVE-2024-40956&packageName=kernel"
			},
			{
				"summary":"CVE-2024-40960",
				"category":"self",
				"url":"https://www.openeuler.org/en/security/cve/detail/?cveId=CVE-2024-40960&packageName=kernel"
			},
			{
				"summary":"CVE-2024-40967",
				"category":"self",
				"url":"https://www.openeuler.org/en/security/cve/detail/?cveId=CVE-2024-40967&packageName=kernel"
			},
			{
				"summary":"CVE-2024-40972",
				"category":"self",
				"url":"https://www.openeuler.org/en/security/cve/detail/?cveId=CVE-2024-40972&packageName=kernel"
			},
			{
				"summary":"CVE-2024-40980",
				"category":"self",
				"url":"https://www.openeuler.org/en/security/cve/detail/?cveId=CVE-2024-40980&packageName=kernel"
			},
			{
				"summary":"CVE-2024-40981",
				"category":"self",
				"url":"https://www.openeuler.org/en/security/cve/detail/?cveId=CVE-2024-40981&packageName=kernel"
			},
			{
				"summary":"CVE-2024-40995",
				"category":"self",
				"url":"https://www.openeuler.org/en/security/cve/detail/?cveId=CVE-2024-40995&packageName=kernel"
			},
			{
				"summary":"CVE-2024-41011",
				"category":"self",
				"url":"https://www.openeuler.org/en/security/cve/detail/?cveId=CVE-2024-41011&packageName=kernel"
			},
			{
				"summary":"nvd cve",
				"category":"external",
				"url":"https://nvd.nist.gov/vuln/detail/CVE-2021-47205"
			},
			{
				"summary":"nvd cve",
				"category":"external",
				"url":"https://nvd.nist.gov/vuln/detail/CVE-2022-48703"
			},
			{
				"summary":"nvd cve",
				"category":"external",
				"url":"https://nvd.nist.gov/vuln/detail/CVE-2022-48780"
			},
			{
				"summary":"nvd cve",
				"category":"external",
				"url":"https://nvd.nist.gov/vuln/detail/CVE-2022-48859"
			},
			{
				"summary":"nvd cve",
				"category":"external",
				"url":"https://nvd.nist.gov/vuln/detail/CVE-2023-52679"
			},
			{
				"summary":"nvd cve",
				"category":"external",
				"url":"https://nvd.nist.gov/vuln/detail/CVE-2024-26924"
			},
			{
				"summary":"nvd cve",
				"category":"external",
				"url":"https://nvd.nist.gov/vuln/detail/CVE-2024-26925"
			},
			{
				"summary":"nvd cve",
				"category":"external",
				"url":"https://nvd.nist.gov/vuln/detail/CVE-2024-27010"
			},
			{
				"summary":"nvd cve",
				"category":"external",
				"url":"https://nvd.nist.gov/vuln/detail/CVE-2024-34777"
			},
			{
				"summary":"nvd cve",
				"category":"external",
				"url":"https://nvd.nist.gov/vuln/detail/CVE-2024-35808"
			},
			{
				"summary":"nvd cve",
				"category":"external",
				"url":"https://nvd.nist.gov/vuln/detail/CVE-2024-35837"
			},
			{
				"summary":"nvd cve",
				"category":"external",
				"url":"https://nvd.nist.gov/vuln/detail/CVE-2024-35899"
			},
			{
				"summary":"nvd cve",
				"category":"external",
				"url":"https://nvd.nist.gov/vuln/detail/CVE-2024-35931"
			},
			{
				"summary":"nvd cve",
				"category":"external",
				"url":"https://nvd.nist.gov/vuln/detail/CVE-2024-36923"
			},
			{
				"summary":"nvd cve",
				"category":"external",
				"url":"https://nvd.nist.gov/vuln/detail/CVE-2024-37078"
			},
			{
				"summary":"nvd cve",
				"category":"external",
				"url":"https://nvd.nist.gov/vuln/detail/CVE-2024-38548"
			},
			{
				"summary":"nvd cve",
				"category":"external",
				"url":"https://nvd.nist.gov/vuln/detail/CVE-2024-38567"
			},
			{
				"summary":"nvd cve",
				"category":"external",
				"url":"https://nvd.nist.gov/vuln/detail/CVE-2024-38607"
			},
			{
				"summary":"nvd cve",
				"category":"external",
				"url":"https://nvd.nist.gov/vuln/detail/CVE-2024-38611"
			},
			{
				"summary":"nvd cve",
				"category":"external",
				"url":"https://nvd.nist.gov/vuln/detail/CVE-2024-38621"
			},
			{
				"summary":"nvd cve",
				"category":"external",
				"url":"https://nvd.nist.gov/vuln/detail/CVE-2024-39475"
			},
			{
				"summary":"nvd cve",
				"category":"external",
				"url":"https://nvd.nist.gov/vuln/detail/CVE-2024-39476"
			},
			{
				"summary":"nvd cve",
				"category":"external",
				"url":"https://nvd.nist.gov/vuln/detail/CVE-2024-39484"
			},
			{
				"summary":"nvd cve",
				"category":"external",
				"url":"https://nvd.nist.gov/vuln/detail/CVE-2024-39506"
			},
			{
				"summary":"nvd cve",
				"category":"external",
				"url":"https://nvd.nist.gov/vuln/detail/CVE-2024-39508"
			},
			{
				"summary":"nvd cve",
				"category":"external",
				"url":"https://nvd.nist.gov/vuln/detail/CVE-2024-40915"
			},
			{
				"summary":"nvd cve",
				"category":"external",
				"url":"https://nvd.nist.gov/vuln/detail/CVE-2024-40945"
			},
			{
				"summary":"nvd cve",
				"category":"external",
				"url":"https://nvd.nist.gov/vuln/detail/CVE-2024-40947"
			},
			{
				"summary":"nvd cve",
				"category":"external",
				"url":"https://nvd.nist.gov/vuln/detail/CVE-2024-40956"
			},
			{
				"summary":"nvd cve",
				"category":"external",
				"url":"https://nvd.nist.gov/vuln/detail/CVE-2024-40960"
			},
			{
				"summary":"nvd cve",
				"category":"external",
				"url":"https://nvd.nist.gov/vuln/detail/CVE-2024-40967"
			},
			{
				"summary":"nvd cve",
				"category":"external",
				"url":"https://nvd.nist.gov/vuln/detail/CVE-2024-40972"
			},
			{
				"summary":"nvd cve",
				"category":"external",
				"url":"https://nvd.nist.gov/vuln/detail/CVE-2024-40980"
			},
			{
				"summary":"nvd cve",
				"category":"external",
				"url":"https://nvd.nist.gov/vuln/detail/CVE-2024-40981"
			},
			{
				"summary":"nvd cve",
				"category":"external",
				"url":"https://nvd.nist.gov/vuln/detail/CVE-2024-40995"
			},
			{
				"summary":"nvd cve",
				"category":"external",
				"url":"https://nvd.nist.gov/vuln/detail/CVE-2024-41011"
			},
			{
				"summary":"openEuler-SA-2024-1941 vex file",
				"category":"self",
				"url":"https://repo.openeuler.org/security/data/csaf/advisories/2024/csaf-openeuler-sa-2024-1941.json"
			}
		],
		"title":"An update for kernel is now available for openEuler-22.03-LTS-SP1",
		"tracking":{
			"initial_release_date":"2024-08-02T19:42:20+08:00",
			"revision_history":[
				{
					"date":"2024-08-02T19:42:20+08:00",
					"summary":"Initial",
					"number":"1.0.0"
				},
				{
					"date":"2024-08-05T10:55:00+08:00",
					"summary":"Current version",
					"number":"2.0.0"
				},
				{
					"date":"2024-08-19T17:35:57+08:00",
					"summary":"final",
					"number":"3.0.0"
				}
			],
			"generator":{
				"date":"2024-08-19T17:35:57+08:00",
				"engine":{
					"name":"openEuler CSAF Tool V1.0"
				}
			},
			"current_release_date":"2024-08-19T17:35:57+08:00",
			"id":"openEuler-SA-2024-1941",
			"version":"3.0.0",
			"status":"final"
		}
	},
	"product_tree":{
		"branches":[
			{
				"name":"openEuler",
				"category":"vendor",
				"branches":[
					{
						"name":"openEuler",
						"branches":[
							{
								"product":{
									"product_identification_helper":{
										"cpe":"cpe:/a:openEuler:openEuler:22.03-LTS-SP1"
									},
									"product_id":"openEuler-22.03-LTS-SP1",
									"name":"openEuler-22.03-LTS-SP1"
								},
								"name":"openEuler-22.03-LTS-SP1",
								"category":"product_version"
							}
						],
						"category":"product_name"
					},
					{
						"name":"aarch64",
						"branches":[
							{
								"product":{
									"product_identification_helper":{
										"cpe":"cpe:/a:openEuler:openEuler:22.03-LTS-SP1"
									},
									"product_id":"python3-perf-5.10.0-136.87.0.168.oe2203sp1.aarch64.rpm",
									"name":"python3-perf-5.10.0-136.87.0.168.oe2203sp1.aarch64.rpm"
								},
								"name":"python3-perf-5.10.0-136.87.0.168.oe2203sp1.aarch64.rpm",
								"category":"product_version"
							},
							{
								"product":{
									"product_identification_helper":{
										"cpe":"cpe:/a:openEuler:openEuler:22.03-LTS-SP1"
									},
									"product_id":"kernel-debugsource-5.10.0-136.87.0.168.oe2203sp1.aarch64.rpm",
									"name":"kernel-debugsource-5.10.0-136.87.0.168.oe2203sp1.aarch64.rpm"
								},
								"name":"kernel-debugsource-5.10.0-136.87.0.168.oe2203sp1.aarch64.rpm",
								"category":"product_version"
							},
							{
								"product":{
									"product_identification_helper":{
										"cpe":"cpe:/a:openEuler:openEuler:22.03-LTS-SP1"
									},
									"product_id":"kernel-source-5.10.0-136.87.0.168.oe2203sp1.aarch64.rpm",
									"name":"kernel-source-5.10.0-136.87.0.168.oe2203sp1.aarch64.rpm"
								},
								"name":"kernel-source-5.10.0-136.87.0.168.oe2203sp1.aarch64.rpm",
								"category":"product_version"
							},
							{
								"product":{
									"product_identification_helper":{
										"cpe":"cpe:/a:openEuler:openEuler:22.03-LTS-SP1"
									},
									"product_id":"kernel-tools-5.10.0-136.87.0.168.oe2203sp1.aarch64.rpm",
									"name":"kernel-tools-5.10.0-136.87.0.168.oe2203sp1.aarch64.rpm"
								},
								"name":"kernel-tools-5.10.0-136.87.0.168.oe2203sp1.aarch64.rpm",
								"category":"product_version"
							},
							{
								"product":{
									"product_identification_helper":{
										"cpe":"cpe:/a:openEuler:openEuler:22.03-LTS-SP1"
									},
									"product_id":"kernel-headers-5.10.0-136.87.0.168.oe2203sp1.aarch64.rpm",
									"name":"kernel-headers-5.10.0-136.87.0.168.oe2203sp1.aarch64.rpm"
								},
								"name":"kernel-headers-5.10.0-136.87.0.168.oe2203sp1.aarch64.rpm",
								"category":"product_version"
							},
							{
								"product":{
									"product_identification_helper":{
										"cpe":"cpe:/a:openEuler:openEuler:22.03-LTS-SP1"
									},
									"product_id":"kernel-tools-devel-5.10.0-136.87.0.168.oe2203sp1.aarch64.rpm",
									"name":"kernel-tools-devel-5.10.0-136.87.0.168.oe2203sp1.aarch64.rpm"
								},
								"name":"kernel-tools-devel-5.10.0-136.87.0.168.oe2203sp1.aarch64.rpm",
								"category":"product_version"
							},
							{
								"product":{
									"product_identification_helper":{
										"cpe":"cpe:/a:openEuler:openEuler:22.03-LTS-SP1"
									},
									"product_id":"perf-5.10.0-136.87.0.168.oe2203sp1.aarch64.rpm",
									"name":"perf-5.10.0-136.87.0.168.oe2203sp1.aarch64.rpm"
								},
								"name":"perf-5.10.0-136.87.0.168.oe2203sp1.aarch64.rpm",
								"category":"product_version"
							},
							{
								"product":{
									"product_identification_helper":{
										"cpe":"cpe:/a:openEuler:openEuler:22.03-LTS-SP1"
									},
									"product_id":"kernel-devel-5.10.0-136.87.0.168.oe2203sp1.aarch64.rpm",
									"name":"kernel-devel-5.10.0-136.87.0.168.oe2203sp1.aarch64.rpm"
								},
								"name":"kernel-devel-5.10.0-136.87.0.168.oe2203sp1.aarch64.rpm",
								"category":"product_version"
							},
							{
								"product":{
									"product_identification_helper":{
										"cpe":"cpe:/a:openEuler:openEuler:22.03-LTS-SP1"
									},
									"product_id":"kernel-debuginfo-5.10.0-136.87.0.168.oe2203sp1.aarch64.rpm",
									"name":"kernel-debuginfo-5.10.0-136.87.0.168.oe2203sp1.aarch64.rpm"
								},
								"name":"kernel-debuginfo-5.10.0-136.87.0.168.oe2203sp1.aarch64.rpm",
								"category":"product_version"
							},
							{
								"product":{
									"product_identification_helper":{
										"cpe":"cpe:/a:openEuler:openEuler:22.03-LTS-SP1"
									},
									"product_id":"kernel-5.10.0-136.87.0.168.oe2203sp1.aarch64.rpm",
									"name":"kernel-5.10.0-136.87.0.168.oe2203sp1.aarch64.rpm"
								},
								"name":"kernel-5.10.0-136.87.0.168.oe2203sp1.aarch64.rpm",
								"category":"product_version"
							},
							{
								"product":{
									"product_identification_helper":{
										"cpe":"cpe:/a:openEuler:openEuler:22.03-LTS-SP1"
									},
									"product_id":"perf-debuginfo-5.10.0-136.87.0.168.oe2203sp1.aarch64.rpm",
									"name":"perf-debuginfo-5.10.0-136.87.0.168.oe2203sp1.aarch64.rpm"
								},
								"name":"perf-debuginfo-5.10.0-136.87.0.168.oe2203sp1.aarch64.rpm",
								"category":"product_version"
							},
							{
								"product":{
									"product_identification_helper":{
										"cpe":"cpe:/a:openEuler:openEuler:22.03-LTS-SP1"
									},
									"product_id":"python3-perf-debuginfo-5.10.0-136.87.0.168.oe2203sp1.aarch64.rpm",
									"name":"python3-perf-debuginfo-5.10.0-136.87.0.168.oe2203sp1.aarch64.rpm"
								},
								"name":"python3-perf-debuginfo-5.10.0-136.87.0.168.oe2203sp1.aarch64.rpm",
								"category":"product_version"
							},
							{
								"product":{
									"product_identification_helper":{
										"cpe":"cpe:/a:openEuler:openEuler:22.03-LTS-SP1"
									},
									"product_id":"kernel-tools-debuginfo-5.10.0-136.87.0.168.oe2203sp1.aarch64.rpm",
									"name":"kernel-tools-debuginfo-5.10.0-136.87.0.168.oe2203sp1.aarch64.rpm"
								},
								"name":"kernel-tools-debuginfo-5.10.0-136.87.0.168.oe2203sp1.aarch64.rpm",
								"category":"product_version"
							}
						],
						"category":"architecture"
					},
					{
						"name":"src",
						"branches":[
							{
								"product":{
									"product_identification_helper":{
										"cpe":"cpe:/a:openEuler:openEuler:22.03-LTS-SP1"
									},
									"product_id":"kernel-5.10.0-136.87.0.168.oe2203sp1.src.rpm",
									"name":"kernel-5.10.0-136.87.0.168.oe2203sp1.src.rpm"
								},
								"name":"kernel-5.10.0-136.87.0.168.oe2203sp1.src.rpm",
								"category":"product_version"
							}
						],
						"category":"architecture"
					},
					{
						"name":"x86_64",
						"branches":[
							{
								"product":{
									"product_identification_helper":{
										"cpe":"cpe:/a:openEuler:openEuler:22.03-LTS-SP1"
									},
									"product_id":"python3-perf-debuginfo-5.10.0-136.87.0.168.oe2203sp1.x86_64.rpm",
									"name":"python3-perf-debuginfo-5.10.0-136.87.0.168.oe2203sp1.x86_64.rpm"
								},
								"name":"python3-perf-debuginfo-5.10.0-136.87.0.168.oe2203sp1.x86_64.rpm",
								"category":"product_version"
							},
							{
								"product":{
									"product_identification_helper":{
										"cpe":"cpe:/a:openEuler:openEuler:22.03-LTS-SP1"
									},
									"product_id":"kernel-devel-5.10.0-136.87.0.168.oe2203sp1.x86_64.rpm",
									"name":"kernel-devel-5.10.0-136.87.0.168.oe2203sp1.x86_64.rpm"
								},
								"name":"kernel-devel-5.10.0-136.87.0.168.oe2203sp1.x86_64.rpm",
								"category":"product_version"
							},
							{
								"product":{
									"product_identification_helper":{
										"cpe":"cpe:/a:openEuler:openEuler:22.03-LTS-SP1"
									},
									"product_id":"kernel-tools-debuginfo-5.10.0-136.87.0.168.oe2203sp1.x86_64.rpm",
									"name":"kernel-tools-debuginfo-5.10.0-136.87.0.168.oe2203sp1.x86_64.rpm"
								},
								"name":"kernel-tools-debuginfo-5.10.0-136.87.0.168.oe2203sp1.x86_64.rpm",
								"category":"product_version"
							},
							{
								"product":{
									"product_identification_helper":{
										"cpe":"cpe:/a:openEuler:openEuler:22.03-LTS-SP1"
									},
									"product_id":"perf-debuginfo-5.10.0-136.87.0.168.oe2203sp1.x86_64.rpm",
									"name":"perf-debuginfo-5.10.0-136.87.0.168.oe2203sp1.x86_64.rpm"
								},
								"name":"perf-debuginfo-5.10.0-136.87.0.168.oe2203sp1.x86_64.rpm",
								"category":"product_version"
							},
							{
								"product":{
									"product_identification_helper":{
										"cpe":"cpe:/a:openEuler:openEuler:22.03-LTS-SP1"
									},
									"product_id":"perf-5.10.0-136.87.0.168.oe2203sp1.x86_64.rpm",
									"name":"perf-5.10.0-136.87.0.168.oe2203sp1.x86_64.rpm"
								},
								"name":"perf-5.10.0-136.87.0.168.oe2203sp1.x86_64.rpm",
								"category":"product_version"
							},
							{
								"product":{
									"product_identification_helper":{
										"cpe":"cpe:/a:openEuler:openEuler:22.03-LTS-SP1"
									},
									"product_id":"kernel-5.10.0-136.87.0.168.oe2203sp1.x86_64.rpm",
									"name":"kernel-5.10.0-136.87.0.168.oe2203sp1.x86_64.rpm"
								},
								"name":"kernel-5.10.0-136.87.0.168.oe2203sp1.x86_64.rpm",
								"category":"product_version"
							},
							{
								"product":{
									"product_identification_helper":{
										"cpe":"cpe:/a:openEuler:openEuler:22.03-LTS-SP1"
									},
									"product_id":"kernel-debuginfo-5.10.0-136.87.0.168.oe2203sp1.x86_64.rpm",
									"name":"kernel-debuginfo-5.10.0-136.87.0.168.oe2203sp1.x86_64.rpm"
								},
								"name":"kernel-debuginfo-5.10.0-136.87.0.168.oe2203sp1.x86_64.rpm",
								"category":"product_version"
							},
							{
								"product":{
									"product_identification_helper":{
										"cpe":"cpe:/a:openEuler:openEuler:22.03-LTS-SP1"
									},
									"product_id":"kernel-source-5.10.0-136.87.0.168.oe2203sp1.x86_64.rpm",
									"name":"kernel-source-5.10.0-136.87.0.168.oe2203sp1.x86_64.rpm"
								},
								"name":"kernel-source-5.10.0-136.87.0.168.oe2203sp1.x86_64.rpm",
								"category":"product_version"
							},
							{
								"product":{
									"product_identification_helper":{
										"cpe":"cpe:/a:openEuler:openEuler:22.03-LTS-SP1"
									},
									"product_id":"kernel-headers-5.10.0-136.87.0.168.oe2203sp1.x86_64.rpm",
									"name":"kernel-headers-5.10.0-136.87.0.168.oe2203sp1.x86_64.rpm"
								},
								"name":"kernel-headers-5.10.0-136.87.0.168.oe2203sp1.x86_64.rpm",
								"category":"product_version"
							},
							{
								"product":{
									"product_identification_helper":{
										"cpe":"cpe:/a:openEuler:openEuler:22.03-LTS-SP1"
									},
									"product_id":"kernel-tools-5.10.0-136.87.0.168.oe2203sp1.x86_64.rpm",
									"name":"kernel-tools-5.10.0-136.87.0.168.oe2203sp1.x86_64.rpm"
								},
								"name":"kernel-tools-5.10.0-136.87.0.168.oe2203sp1.x86_64.rpm",
								"category":"product_version"
							},
							{
								"product":{
									"product_identification_helper":{
										"cpe":"cpe:/a:openEuler:openEuler:22.03-LTS-SP1"
									},
									"product_id":"kernel-tools-devel-5.10.0-136.87.0.168.oe2203sp1.x86_64.rpm",
									"name":"kernel-tools-devel-5.10.0-136.87.0.168.oe2203sp1.x86_64.rpm"
								},
								"name":"kernel-tools-devel-5.10.0-136.87.0.168.oe2203sp1.x86_64.rpm",
								"category":"product_version"
							},
							{
								"product":{
									"product_identification_helper":{
										"cpe":"cpe:/a:openEuler:openEuler:22.03-LTS-SP1"
									},
									"product_id":"python3-perf-5.10.0-136.87.0.168.oe2203sp1.x86_64.rpm",
									"name":"python3-perf-5.10.0-136.87.0.168.oe2203sp1.x86_64.rpm"
								},
								"name":"python3-perf-5.10.0-136.87.0.168.oe2203sp1.x86_64.rpm",
								"category":"product_version"
							},
							{
								"product":{
									"product_identification_helper":{
										"cpe":"cpe:/a:openEuler:openEuler:22.03-LTS-SP1"
									},
									"product_id":"kernel-debugsource-5.10.0-136.87.0.168.oe2203sp1.x86_64.rpm",
									"name":"kernel-debugsource-5.10.0-136.87.0.168.oe2203sp1.x86_64.rpm"
								},
								"name":"kernel-debugsource-5.10.0-136.87.0.168.oe2203sp1.x86_64.rpm",
								"category":"product_version"
							}
						],
						"category":"architecture"
					}
				]
			}
		],
		"relationships":[
			{
				"relates_to_product_reference":"openEuler-22.03-LTS-SP1",
				"product_reference":"python3-perf-5.10.0-136.87.0.168.oe2203sp1.aarch64.rpm",
				"full_product_name":{
					"product_id":"openEuler-22.03-LTS-SP1:python3-perf-5.10.0-136.87.0.168.oe2203sp1.aarch64",
					"name":"python3-perf-5.10.0-136.87.0.168.oe2203sp1.aarch64 as a component of openEuler-22.03-LTS-SP1"
				},
				"category":"default_component_of"
			},
			{
				"relates_to_product_reference":"openEuler-22.03-LTS-SP1",
				"product_reference":"kernel-debugsource-5.10.0-136.87.0.168.oe2203sp1.aarch64.rpm",
				"full_product_name":{
					"product_id":"openEuler-22.03-LTS-SP1:kernel-debugsource-5.10.0-136.87.0.168.oe2203sp1.aarch64",
					"name":"kernel-debugsource-5.10.0-136.87.0.168.oe2203sp1.aarch64 as a component of openEuler-22.03-LTS-SP1"
				},
				"category":"default_component_of"
			},
			{
				"relates_to_product_reference":"openEuler-22.03-LTS-SP1",
				"product_reference":"kernel-source-5.10.0-136.87.0.168.oe2203sp1.aarch64.rpm",
				"full_product_name":{
					"product_id":"openEuler-22.03-LTS-SP1:kernel-source-5.10.0-136.87.0.168.oe2203sp1.aarch64",
					"name":"kernel-source-5.10.0-136.87.0.168.oe2203sp1.aarch64 as a component of openEuler-22.03-LTS-SP1"
				},
				"category":"default_component_of"
			},
			{
				"relates_to_product_reference":"openEuler-22.03-LTS-SP1",
				"product_reference":"kernel-tools-5.10.0-136.87.0.168.oe2203sp1.aarch64.rpm",
				"full_product_name":{
					"product_id":"openEuler-22.03-LTS-SP1:kernel-tools-5.10.0-136.87.0.168.oe2203sp1.aarch64",
					"name":"kernel-tools-5.10.0-136.87.0.168.oe2203sp1.aarch64 as a component of openEuler-22.03-LTS-SP1"
				},
				"category":"default_component_of"
			},
			{
				"relates_to_product_reference":"openEuler-22.03-LTS-SP1",
				"product_reference":"kernel-headers-5.10.0-136.87.0.168.oe2203sp1.aarch64.rpm",
				"full_product_name":{
					"product_id":"openEuler-22.03-LTS-SP1:kernel-headers-5.10.0-136.87.0.168.oe2203sp1.aarch64",
					"name":"kernel-headers-5.10.0-136.87.0.168.oe2203sp1.aarch64 as a component of openEuler-22.03-LTS-SP1"
				},
				"category":"default_component_of"
			},
			{
				"relates_to_product_reference":"openEuler-22.03-LTS-SP1",
				"product_reference":"kernel-tools-devel-5.10.0-136.87.0.168.oe2203sp1.aarch64.rpm",
				"full_product_name":{
					"product_id":"openEuler-22.03-LTS-SP1:kernel-tools-devel-5.10.0-136.87.0.168.oe2203sp1.aarch64",
					"name":"kernel-tools-devel-5.10.0-136.87.0.168.oe2203sp1.aarch64 as a component of openEuler-22.03-LTS-SP1"
				},
				"category":"default_component_of"
			},
			{
				"relates_to_product_reference":"openEuler-22.03-LTS-SP1",
				"product_reference":"perf-5.10.0-136.87.0.168.oe2203sp1.aarch64.rpm",
				"full_product_name":{
					"product_id":"openEuler-22.03-LTS-SP1:perf-5.10.0-136.87.0.168.oe2203sp1.aarch64",
					"name":"perf-5.10.0-136.87.0.168.oe2203sp1.aarch64 as a component of openEuler-22.03-LTS-SP1"
				},
				"category":"default_component_of"
			},
			{
				"relates_to_product_reference":"openEuler-22.03-LTS-SP1",
				"product_reference":"kernel-devel-5.10.0-136.87.0.168.oe2203sp1.aarch64.rpm",
				"full_product_name":{
					"product_id":"openEuler-22.03-LTS-SP1:kernel-devel-5.10.0-136.87.0.168.oe2203sp1.aarch64",
					"name":"kernel-devel-5.10.0-136.87.0.168.oe2203sp1.aarch64 as a component of openEuler-22.03-LTS-SP1"
				},
				"category":"default_component_of"
			},
			{
				"relates_to_product_reference":"openEuler-22.03-LTS-SP1",
				"product_reference":"kernel-debuginfo-5.10.0-136.87.0.168.oe2203sp1.aarch64.rpm",
				"full_product_name":{
					"product_id":"openEuler-22.03-LTS-SP1:kernel-debuginfo-5.10.0-136.87.0.168.oe2203sp1.aarch64",
					"name":"kernel-debuginfo-5.10.0-136.87.0.168.oe2203sp1.aarch64 as a component of openEuler-22.03-LTS-SP1"
				},
				"category":"default_component_of"
			},
			{
				"relates_to_product_reference":"openEuler-22.03-LTS-SP1",
				"product_reference":"kernel-5.10.0-136.87.0.168.oe2203sp1.aarch64.rpm",
				"full_product_name":{
					"product_id":"openEuler-22.03-LTS-SP1:kernel-5.10.0-136.87.0.168.oe2203sp1.aarch64",
					"name":"kernel-5.10.0-136.87.0.168.oe2203sp1.aarch64 as a component of openEuler-22.03-LTS-SP1"
				},
				"category":"default_component_of"
			},
			{
				"relates_to_product_reference":"openEuler-22.03-LTS-SP1",
				"product_reference":"perf-debuginfo-5.10.0-136.87.0.168.oe2203sp1.aarch64.rpm",
				"full_product_name":{
					"product_id":"openEuler-22.03-LTS-SP1:perf-debuginfo-5.10.0-136.87.0.168.oe2203sp1.aarch64",
					"name":"perf-debuginfo-5.10.0-136.87.0.168.oe2203sp1.aarch64 as a component of openEuler-22.03-LTS-SP1"
				},
				"category":"default_component_of"
			},
			{
				"relates_to_product_reference":"openEuler-22.03-LTS-SP1",
				"product_reference":"python3-perf-debuginfo-5.10.0-136.87.0.168.oe2203sp1.aarch64.rpm",
				"full_product_name":{
					"product_id":"openEuler-22.03-LTS-SP1:python3-perf-debuginfo-5.10.0-136.87.0.168.oe2203sp1.aarch64",
					"name":"python3-perf-debuginfo-5.10.0-136.87.0.168.oe2203sp1.aarch64 as a component of openEuler-22.03-LTS-SP1"
				},
				"category":"default_component_of"
			},
			{
				"relates_to_product_reference":"openEuler-22.03-LTS-SP1",
				"product_reference":"kernel-tools-debuginfo-5.10.0-136.87.0.168.oe2203sp1.aarch64.rpm",
				"full_product_name":{
					"product_id":"openEuler-22.03-LTS-SP1:kernel-tools-debuginfo-5.10.0-136.87.0.168.oe2203sp1.aarch64",
					"name":"kernel-tools-debuginfo-5.10.0-136.87.0.168.oe2203sp1.aarch64 as a component of openEuler-22.03-LTS-SP1"
				},
				"category":"default_component_of"
			},
			{
				"relates_to_product_reference":"openEuler-22.03-LTS-SP1",
				"product_reference":"kernel-5.10.0-136.87.0.168.oe2203sp1.src.rpm",
				"full_product_name":{
					"product_id":"openEuler-22.03-LTS-SP1:kernel-5.10.0-136.87.0.168.oe2203sp1.src",
					"name":"kernel-5.10.0-136.87.0.168.oe2203sp1.src as a component of openEuler-22.03-LTS-SP1"
				},
				"category":"default_component_of"
			},
			{
				"relates_to_product_reference":"openEuler-22.03-LTS-SP1",
				"product_reference":"python3-perf-debuginfo-5.10.0-136.87.0.168.oe2203sp1.x86_64.rpm",
				"full_product_name":{
					"product_id":"openEuler-22.03-LTS-SP1:python3-perf-debuginfo-5.10.0-136.87.0.168.oe2203sp1.x86_64",
					"name":"python3-perf-debuginfo-5.10.0-136.87.0.168.oe2203sp1.x86_64 as a component of openEuler-22.03-LTS-SP1"
				},
				"category":"default_component_of"
			},
			{
				"relates_to_product_reference":"openEuler-22.03-LTS-SP1",
				"product_reference":"kernel-devel-5.10.0-136.87.0.168.oe2203sp1.x86_64.rpm",
				"full_product_name":{
					"product_id":"openEuler-22.03-LTS-SP1:kernel-devel-5.10.0-136.87.0.168.oe2203sp1.x86_64",
					"name":"kernel-devel-5.10.0-136.87.0.168.oe2203sp1.x86_64 as a component of openEuler-22.03-LTS-SP1"
				},
				"category":"default_component_of"
			},
			{
				"relates_to_product_reference":"openEuler-22.03-LTS-SP1",
				"product_reference":"kernel-tools-debuginfo-5.10.0-136.87.0.168.oe2203sp1.x86_64.rpm",
				"full_product_name":{
					"product_id":"openEuler-22.03-LTS-SP1:kernel-tools-debuginfo-5.10.0-136.87.0.168.oe2203sp1.x86_64",
					"name":"kernel-tools-debuginfo-5.10.0-136.87.0.168.oe2203sp1.x86_64 as a component of openEuler-22.03-LTS-SP1"
				},
				"category":"default_component_of"
			},
			{
				"relates_to_product_reference":"openEuler-22.03-LTS-SP1",
				"product_reference":"perf-debuginfo-5.10.0-136.87.0.168.oe2203sp1.x86_64.rpm",
				"full_product_name":{
					"product_id":"openEuler-22.03-LTS-SP1:perf-debuginfo-5.10.0-136.87.0.168.oe2203sp1.x86_64",
					"name":"perf-debuginfo-5.10.0-136.87.0.168.oe2203sp1.x86_64 as a component of openEuler-22.03-LTS-SP1"
				},
				"category":"default_component_of"
			},
			{
				"relates_to_product_reference":"openEuler-22.03-LTS-SP1",
				"product_reference":"perf-5.10.0-136.87.0.168.oe2203sp1.x86_64.rpm",
				"full_product_name":{
					"product_id":"openEuler-22.03-LTS-SP1:perf-5.10.0-136.87.0.168.oe2203sp1.x86_64",
					"name":"perf-5.10.0-136.87.0.168.oe2203sp1.x86_64 as a component of openEuler-22.03-LTS-SP1"
				},
				"category":"default_component_of"
			},
			{
				"relates_to_product_reference":"openEuler-22.03-LTS-SP1",
				"product_reference":"kernel-5.10.0-136.87.0.168.oe2203sp1.x86_64.rpm",
				"full_product_name":{
					"product_id":"openEuler-22.03-LTS-SP1:kernel-5.10.0-136.87.0.168.oe2203sp1.x86_64",
					"name":"kernel-5.10.0-136.87.0.168.oe2203sp1.x86_64 as a component of openEuler-22.03-LTS-SP1"
				},
				"category":"default_component_of"
			},
			{
				"relates_to_product_reference":"openEuler-22.03-LTS-SP1",
				"product_reference":"kernel-debuginfo-5.10.0-136.87.0.168.oe2203sp1.x86_64.rpm",
				"full_product_name":{
					"product_id":"openEuler-22.03-LTS-SP1:kernel-debuginfo-5.10.0-136.87.0.168.oe2203sp1.x86_64",
					"name":"kernel-debuginfo-5.10.0-136.87.0.168.oe2203sp1.x86_64 as a component of openEuler-22.03-LTS-SP1"
				},
				"category":"default_component_of"
			},
			{
				"relates_to_product_reference":"openEuler-22.03-LTS-SP1",
				"product_reference":"kernel-source-5.10.0-136.87.0.168.oe2203sp1.x86_64.rpm",
				"full_product_name":{
					"product_id":"openEuler-22.03-LTS-SP1:kernel-source-5.10.0-136.87.0.168.oe2203sp1.x86_64",
					"name":"kernel-source-5.10.0-136.87.0.168.oe2203sp1.x86_64 as a component of openEuler-22.03-LTS-SP1"
				},
				"category":"default_component_of"
			},
			{
				"relates_to_product_reference":"openEuler-22.03-LTS-SP1",
				"product_reference":"kernel-headers-5.10.0-136.87.0.168.oe2203sp1.x86_64.rpm",
				"full_product_name":{
					"product_id":"openEuler-22.03-LTS-SP1:kernel-headers-5.10.0-136.87.0.168.oe2203sp1.x86_64",
					"name":"kernel-headers-5.10.0-136.87.0.168.oe2203sp1.x86_64 as a component of openEuler-22.03-LTS-SP1"
				},
				"category":"default_component_of"
			},
			{
				"relates_to_product_reference":"openEuler-22.03-LTS-SP1",
				"product_reference":"kernel-tools-5.10.0-136.87.0.168.oe2203sp1.x86_64.rpm",
				"full_product_name":{
					"product_id":"openEuler-22.03-LTS-SP1:kernel-tools-5.10.0-136.87.0.168.oe2203sp1.x86_64",
					"name":"kernel-tools-5.10.0-136.87.0.168.oe2203sp1.x86_64 as a component of openEuler-22.03-LTS-SP1"
				},
				"category":"default_component_of"
			},
			{
				"relates_to_product_reference":"openEuler-22.03-LTS-SP1",
				"product_reference":"kernel-tools-devel-5.10.0-136.87.0.168.oe2203sp1.x86_64.rpm",
				"full_product_name":{
					"product_id":"openEuler-22.03-LTS-SP1:kernel-tools-devel-5.10.0-136.87.0.168.oe2203sp1.x86_64",
					"name":"kernel-tools-devel-5.10.0-136.87.0.168.oe2203sp1.x86_64 as a component of openEuler-22.03-LTS-SP1"
				},
				"category":"default_component_of"
			},
			{
				"relates_to_product_reference":"openEuler-22.03-LTS-SP1",
				"product_reference":"python3-perf-5.10.0-136.87.0.168.oe2203sp1.x86_64.rpm",
				"full_product_name":{
					"product_id":"openEuler-22.03-LTS-SP1:python3-perf-5.10.0-136.87.0.168.oe2203sp1.x86_64",
					"name":"python3-perf-5.10.0-136.87.0.168.oe2203sp1.x86_64 as a component of openEuler-22.03-LTS-SP1"
				},
				"category":"default_component_of"
			},
			{
				"relates_to_product_reference":"openEuler-22.03-LTS-SP1",
				"product_reference":"kernel-debugsource-5.10.0-136.87.0.168.oe2203sp1.x86_64.rpm",
				"full_product_name":{
					"product_id":"openEuler-22.03-LTS-SP1:kernel-debugsource-5.10.0-136.87.0.168.oe2203sp1.x86_64",
					"name":"kernel-debugsource-5.10.0-136.87.0.168.oe2203sp1.x86_64 as a component of openEuler-22.03-LTS-SP1"
				},
				"category":"default_component_of"
			}
		]
	},
	"vulnerabilities":[
		{
			"cve":"CVE-2021-47205",
			"notes":[
				{
					"text":"In the Linux kernel, the following vulnerability has been resolved:\n\nclk: sunxi-ng: Unregister clocks/resets when unbinding\n\nCurrently, unbinding a CCU driver unmaps the device's MMIO region, while\nleaving its clocks/resets and their providers registered. This can cause\na page fault later when some clock operation tries to perform MMIO. Fix\nthis by separating the CCU initialization from the memory allocation,\nand then using a devres callback to unregister the clocks and resets.\n\nThis also fixes a memory leak of the `struct ccu_reset`, and uses the\ncorrect owner (the specific platform driver) for the clocks and resets.\n\nEarly OF clock providers are never unregistered, and limited error\nhandling is possible, so they are mostly unchanged. The error reporting\nis made more consistent by moving the message inside of_sunxi_ccu_probe.",
					"category":"description",
					"title":"Vulnerability Description"
				}
			],
			"product_status":{
				"fixed":[
					"openEuler-22.03-LTS-SP1:python3-perf-5.10.0-136.87.0.168.oe2203sp1.aarch64",
					"openEuler-22.03-LTS-SP1:kernel-debugsource-5.10.0-136.87.0.168.oe2203sp1.aarch64",
					"openEuler-22.03-LTS-SP1:kernel-source-5.10.0-136.87.0.168.oe2203sp1.aarch64",
					"openEuler-22.03-LTS-SP1:kernel-tools-5.10.0-136.87.0.168.oe2203sp1.aarch64",
					"openEuler-22.03-LTS-SP1:kernel-headers-5.10.0-136.87.0.168.oe2203sp1.aarch64",
					"openEuler-22.03-LTS-SP1:kernel-tools-devel-5.10.0-136.87.0.168.oe2203sp1.aarch64",
					"openEuler-22.03-LTS-SP1:perf-5.10.0-136.87.0.168.oe2203sp1.aarch64",
					"openEuler-22.03-LTS-SP1:kernel-devel-5.10.0-136.87.0.168.oe2203sp1.aarch64",
					"openEuler-22.03-LTS-SP1:kernel-debuginfo-5.10.0-136.87.0.168.oe2203sp1.aarch64",
					"openEuler-22.03-LTS-SP1:kernel-5.10.0-136.87.0.168.oe2203sp1.aarch64",
					"openEuler-22.03-LTS-SP1:perf-debuginfo-5.10.0-136.87.0.168.oe2203sp1.aarch64",
					"openEuler-22.03-LTS-SP1:python3-perf-debuginfo-5.10.0-136.87.0.168.oe2203sp1.aarch64",
					"openEuler-22.03-LTS-SP1:kernel-tools-debuginfo-5.10.0-136.87.0.168.oe2203sp1.aarch64",
					"openEuler-22.03-LTS-SP1:kernel-5.10.0-136.87.0.168.oe2203sp1.src",
					"openEuler-22.03-LTS-SP1:python3-perf-debuginfo-5.10.0-136.87.0.168.oe2203sp1.x86_64",
					"openEuler-22.03-LTS-SP1:kernel-devel-5.10.0-136.87.0.168.oe2203sp1.x86_64",
					"openEuler-22.03-LTS-SP1:kernel-tools-debuginfo-5.10.0-136.87.0.168.oe2203sp1.x86_64",
					"openEuler-22.03-LTS-SP1:perf-debuginfo-5.10.0-136.87.0.168.oe2203sp1.x86_64",
					"openEuler-22.03-LTS-SP1:perf-5.10.0-136.87.0.168.oe2203sp1.x86_64",
					"openEuler-22.03-LTS-SP1:kernel-5.10.0-136.87.0.168.oe2203sp1.x86_64",
					"openEuler-22.03-LTS-SP1:kernel-debuginfo-5.10.0-136.87.0.168.oe2203sp1.x86_64",
					"openEuler-22.03-LTS-SP1:kernel-source-5.10.0-136.87.0.168.oe2203sp1.x86_64",
					"openEuler-22.03-LTS-SP1:kernel-headers-5.10.0-136.87.0.168.oe2203sp1.x86_64",
					"openEuler-22.03-LTS-SP1:kernel-tools-5.10.0-136.87.0.168.oe2203sp1.x86_64",
					"openEuler-22.03-LTS-SP1:kernel-tools-devel-5.10.0-136.87.0.168.oe2203sp1.x86_64",
					"openEuler-22.03-LTS-SP1:python3-perf-5.10.0-136.87.0.168.oe2203sp1.x86_64",
					"openEuler-22.03-LTS-SP1:kernel-debugsource-5.10.0-136.87.0.168.oe2203sp1.x86_64"
				]
			},
			"remediations":[
				{
					"product_ids":[
						"openEuler-22.03-LTS-SP1:python3-perf-5.10.0-136.87.0.168.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:kernel-debugsource-5.10.0-136.87.0.168.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:kernel-source-5.10.0-136.87.0.168.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:kernel-tools-5.10.0-136.87.0.168.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:kernel-headers-5.10.0-136.87.0.168.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:kernel-tools-devel-5.10.0-136.87.0.168.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:perf-5.10.0-136.87.0.168.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:kernel-devel-5.10.0-136.87.0.168.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:kernel-debuginfo-5.10.0-136.87.0.168.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:kernel-5.10.0-136.87.0.168.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:perf-debuginfo-5.10.0-136.87.0.168.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:python3-perf-debuginfo-5.10.0-136.87.0.168.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:kernel-tools-debuginfo-5.10.0-136.87.0.168.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:kernel-5.10.0-136.87.0.168.oe2203sp1.src",
						"openEuler-22.03-LTS-SP1:python3-perf-debuginfo-5.10.0-136.87.0.168.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:kernel-devel-5.10.0-136.87.0.168.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:kernel-tools-debuginfo-5.10.0-136.87.0.168.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:perf-debuginfo-5.10.0-136.87.0.168.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:perf-5.10.0-136.87.0.168.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:kernel-5.10.0-136.87.0.168.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:kernel-debuginfo-5.10.0-136.87.0.168.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:kernel-source-5.10.0-136.87.0.168.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:kernel-headers-5.10.0-136.87.0.168.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:kernel-tools-5.10.0-136.87.0.168.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:kernel-tools-devel-5.10.0-136.87.0.168.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:python3-perf-5.10.0-136.87.0.168.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:kernel-debugsource-5.10.0-136.87.0.168.oe2203sp1.x86_64"
					],
					"details":"kernel security update",
					"category":"vendor_fix",
					"url":"https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2024-1941"
				}
			],
			"scores":[
				{
					"cvss_v3":{
						"baseSeverity":"MEDIUM",
						"baseScore":5.5,
						"vectorString":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
						"version":"3.1"
					},
					"products":[
						"openEuler-22.03-LTS-SP1:python3-perf-5.10.0-136.87.0.168.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:kernel-debugsource-5.10.0-136.87.0.168.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:kernel-source-5.10.0-136.87.0.168.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:kernel-tools-5.10.0-136.87.0.168.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:kernel-headers-5.10.0-136.87.0.168.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:kernel-tools-devel-5.10.0-136.87.0.168.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:perf-5.10.0-136.87.0.168.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:kernel-devel-5.10.0-136.87.0.168.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:kernel-debuginfo-5.10.0-136.87.0.168.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:kernel-5.10.0-136.87.0.168.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:perf-debuginfo-5.10.0-136.87.0.168.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:python3-perf-debuginfo-5.10.0-136.87.0.168.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:kernel-tools-debuginfo-5.10.0-136.87.0.168.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:kernel-5.10.0-136.87.0.168.oe2203sp1.src",
						"openEuler-22.03-LTS-SP1:python3-perf-debuginfo-5.10.0-136.87.0.168.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:kernel-devel-5.10.0-136.87.0.168.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:kernel-tools-debuginfo-5.10.0-136.87.0.168.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:perf-debuginfo-5.10.0-136.87.0.168.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:perf-5.10.0-136.87.0.168.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:kernel-5.10.0-136.87.0.168.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:kernel-debuginfo-5.10.0-136.87.0.168.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:kernel-source-5.10.0-136.87.0.168.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:kernel-headers-5.10.0-136.87.0.168.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:kernel-tools-5.10.0-136.87.0.168.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:kernel-tools-devel-5.10.0-136.87.0.168.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:python3-perf-5.10.0-136.87.0.168.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:kernel-debugsource-5.10.0-136.87.0.168.oe2203sp1.x86_64"
					]
				}
			],
			"threats":[
				{
					"details":"Medium",
					"category":"impact"
				}
			],
			"title":"CVE-2021-47205"
		},
		{
			"cve":"CVE-2022-48703",
			"notes":[
				{
					"text":"In the Linux kernel, the following vulnerability has been resolved:\n\nthermal/int340x_thermal: handle data_vault when the value is ZERO_SIZE_PTR\n\nIn some case, the GDDV returns a package with a buffer which has\nzero length. It causes that kmemdup() returns ZERO_SIZE_PTR (0x10).\n\nThen the data_vault_read() got NULL point dereference problem when\naccessing the 0x10 value in data_vault.\n\n[   71.024560] BUG: kernel NULL pointer dereference, address:\n0000000000000010\n\nThis patch uses ZERO_OR_NULL_PTR() for checking ZERO_SIZE_PTR or\nNULL value in data_vault.",
					"category":"description",
					"title":"Vulnerability Description"
				}
			],
			"product_status":{
				"fixed":[
					"openEuler-22.03-LTS-SP1:python3-perf-5.10.0-136.87.0.168.oe2203sp1.aarch64",
					"openEuler-22.03-LTS-SP1:kernel-debugsource-5.10.0-136.87.0.168.oe2203sp1.aarch64",
					"openEuler-22.03-LTS-SP1:kernel-source-5.10.0-136.87.0.168.oe2203sp1.aarch64",
					"openEuler-22.03-LTS-SP1:kernel-tools-5.10.0-136.87.0.168.oe2203sp1.aarch64",
					"openEuler-22.03-LTS-SP1:kernel-headers-5.10.0-136.87.0.168.oe2203sp1.aarch64",
					"openEuler-22.03-LTS-SP1:kernel-tools-devel-5.10.0-136.87.0.168.oe2203sp1.aarch64",
					"openEuler-22.03-LTS-SP1:perf-5.10.0-136.87.0.168.oe2203sp1.aarch64",
					"openEuler-22.03-LTS-SP1:kernel-devel-5.10.0-136.87.0.168.oe2203sp1.aarch64",
					"openEuler-22.03-LTS-SP1:kernel-debuginfo-5.10.0-136.87.0.168.oe2203sp1.aarch64",
					"openEuler-22.03-LTS-SP1:kernel-5.10.0-136.87.0.168.oe2203sp1.aarch64",
					"openEuler-22.03-LTS-SP1:perf-debuginfo-5.10.0-136.87.0.168.oe2203sp1.aarch64",
					"openEuler-22.03-LTS-SP1:python3-perf-debuginfo-5.10.0-136.87.0.168.oe2203sp1.aarch64",
					"openEuler-22.03-LTS-SP1:kernel-tools-debuginfo-5.10.0-136.87.0.168.oe2203sp1.aarch64",
					"openEuler-22.03-LTS-SP1:kernel-5.10.0-136.87.0.168.oe2203sp1.src",
					"openEuler-22.03-LTS-SP1:python3-perf-debuginfo-5.10.0-136.87.0.168.oe2203sp1.x86_64",
					"openEuler-22.03-LTS-SP1:kernel-devel-5.10.0-136.87.0.168.oe2203sp1.x86_64",
					"openEuler-22.03-LTS-SP1:kernel-tools-debuginfo-5.10.0-136.87.0.168.oe2203sp1.x86_64",
					"openEuler-22.03-LTS-SP1:perf-debuginfo-5.10.0-136.87.0.168.oe2203sp1.x86_64",
					"openEuler-22.03-LTS-SP1:perf-5.10.0-136.87.0.168.oe2203sp1.x86_64",
					"openEuler-22.03-LTS-SP1:kernel-5.10.0-136.87.0.168.oe2203sp1.x86_64",
					"openEuler-22.03-LTS-SP1:kernel-debuginfo-5.10.0-136.87.0.168.oe2203sp1.x86_64",
					"openEuler-22.03-LTS-SP1:kernel-source-5.10.0-136.87.0.168.oe2203sp1.x86_64",
					"openEuler-22.03-LTS-SP1:kernel-headers-5.10.0-136.87.0.168.oe2203sp1.x86_64",
					"openEuler-22.03-LTS-SP1:kernel-tools-5.10.0-136.87.0.168.oe2203sp1.x86_64",
					"openEuler-22.03-LTS-SP1:kernel-tools-devel-5.10.0-136.87.0.168.oe2203sp1.x86_64",
					"openEuler-22.03-LTS-SP1:python3-perf-5.10.0-136.87.0.168.oe2203sp1.x86_64",
					"openEuler-22.03-LTS-SP1:kernel-debugsource-5.10.0-136.87.0.168.oe2203sp1.x86_64"
				]
			},
			"remediations":[
				{
					"product_ids":[
						"openEuler-22.03-LTS-SP1:python3-perf-5.10.0-136.87.0.168.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:kernel-debugsource-5.10.0-136.87.0.168.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:kernel-source-5.10.0-136.87.0.168.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:kernel-tools-5.10.0-136.87.0.168.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:kernel-headers-5.10.0-136.87.0.168.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:kernel-tools-devel-5.10.0-136.87.0.168.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:perf-5.10.0-136.87.0.168.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:kernel-devel-5.10.0-136.87.0.168.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:kernel-debuginfo-5.10.0-136.87.0.168.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:kernel-5.10.0-136.87.0.168.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:perf-debuginfo-5.10.0-136.87.0.168.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:python3-perf-debuginfo-5.10.0-136.87.0.168.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:kernel-tools-debuginfo-5.10.0-136.87.0.168.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:kernel-5.10.0-136.87.0.168.oe2203sp1.src",
						"openEuler-22.03-LTS-SP1:python3-perf-debuginfo-5.10.0-136.87.0.168.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:kernel-devel-5.10.0-136.87.0.168.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:kernel-tools-debuginfo-5.10.0-136.87.0.168.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:perf-debuginfo-5.10.0-136.87.0.168.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:perf-5.10.0-136.87.0.168.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:kernel-5.10.0-136.87.0.168.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:kernel-debuginfo-5.10.0-136.87.0.168.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:kernel-source-5.10.0-136.87.0.168.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:kernel-headers-5.10.0-136.87.0.168.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:kernel-tools-5.10.0-136.87.0.168.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:kernel-tools-devel-5.10.0-136.87.0.168.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:python3-perf-5.10.0-136.87.0.168.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:kernel-debugsource-5.10.0-136.87.0.168.oe2203sp1.x86_64"
					],
					"details":"kernel security update",
					"category":"vendor_fix",
					"url":"https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2024-1941"
				}
			],
			"scores":[
				{
					"cvss_v3":{
						"baseSeverity":"MEDIUM",
						"baseScore":5.5,
						"vectorString":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
						"version":"3.1"
					},
					"products":[
						"openEuler-22.03-LTS-SP1:python3-perf-5.10.0-136.87.0.168.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:kernel-debugsource-5.10.0-136.87.0.168.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:kernel-source-5.10.0-136.87.0.168.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:kernel-tools-5.10.0-136.87.0.168.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:kernel-headers-5.10.0-136.87.0.168.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:kernel-tools-devel-5.10.0-136.87.0.168.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:perf-5.10.0-136.87.0.168.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:kernel-devel-5.10.0-136.87.0.168.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:kernel-debuginfo-5.10.0-136.87.0.168.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:kernel-5.10.0-136.87.0.168.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:perf-debuginfo-5.10.0-136.87.0.168.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:python3-perf-debuginfo-5.10.0-136.87.0.168.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:kernel-tools-debuginfo-5.10.0-136.87.0.168.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:kernel-5.10.0-136.87.0.168.oe2203sp1.src",
						"openEuler-22.03-LTS-SP1:python3-perf-debuginfo-5.10.0-136.87.0.168.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:kernel-devel-5.10.0-136.87.0.168.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:kernel-tools-debuginfo-5.10.0-136.87.0.168.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:perf-debuginfo-5.10.0-136.87.0.168.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:perf-5.10.0-136.87.0.168.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:kernel-5.10.0-136.87.0.168.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:kernel-debuginfo-5.10.0-136.87.0.168.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:kernel-source-5.10.0-136.87.0.168.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:kernel-headers-5.10.0-136.87.0.168.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:kernel-tools-5.10.0-136.87.0.168.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:kernel-tools-devel-5.10.0-136.87.0.168.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:python3-perf-5.10.0-136.87.0.168.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:kernel-debugsource-5.10.0-136.87.0.168.oe2203sp1.x86_64"
					]
				}
			],
			"threats":[
				{
					"details":"Medium",
					"category":"impact"
				}
			],
			"title":"CVE-2022-48703"
		},
		{
			"cve":"CVE-2022-48780",
			"notes":[
				{
					"text":"In the Linux kernel, the following vulnerability has been resolved:\n\nnet/smc: Avoid overwriting the copies of clcsock callback functions\n\nThe callback functions of clcsock will be saved and replaced during\nthe fallback. But if the fallback happens more than once, then the\ncopies of these callback functions will be overwritten incorrectly,\nresulting in a loop call issue:\n\nclcsk->sk_error_report\n |- smc_fback_error_report() <------------------------------|\n     |- smc_fback_forward_wakeup()                          | (loop)\n         |- clcsock_callback()  (incorrectly overwritten)   |\n             |- smc->clcsk_error_report() ------------------|\n\nSo this patch fixes the issue by saving these function pointers only\nonce in the fallback and avoiding overwriting.",
					"category":"description",
					"title":"Vulnerability Description"
				}
			],
			"product_status":{
				"fixed":[
					"openEuler-22.03-LTS-SP1:python3-perf-5.10.0-136.87.0.168.oe2203sp1.aarch64",
					"openEuler-22.03-LTS-SP1:kernel-debugsource-5.10.0-136.87.0.168.oe2203sp1.aarch64",
					"openEuler-22.03-LTS-SP1:kernel-source-5.10.0-136.87.0.168.oe2203sp1.aarch64",
					"openEuler-22.03-LTS-SP1:kernel-tools-5.10.0-136.87.0.168.oe2203sp1.aarch64",
					"openEuler-22.03-LTS-SP1:kernel-headers-5.10.0-136.87.0.168.oe2203sp1.aarch64",
					"openEuler-22.03-LTS-SP1:kernel-tools-devel-5.10.0-136.87.0.168.oe2203sp1.aarch64",
					"openEuler-22.03-LTS-SP1:perf-5.10.0-136.87.0.168.oe2203sp1.aarch64",
					"openEuler-22.03-LTS-SP1:kernel-devel-5.10.0-136.87.0.168.oe2203sp1.aarch64",
					"openEuler-22.03-LTS-SP1:kernel-debuginfo-5.10.0-136.87.0.168.oe2203sp1.aarch64",
					"openEuler-22.03-LTS-SP1:kernel-5.10.0-136.87.0.168.oe2203sp1.aarch64",
					"openEuler-22.03-LTS-SP1:perf-debuginfo-5.10.0-136.87.0.168.oe2203sp1.aarch64",
					"openEuler-22.03-LTS-SP1:python3-perf-debuginfo-5.10.0-136.87.0.168.oe2203sp1.aarch64",
					"openEuler-22.03-LTS-SP1:kernel-tools-debuginfo-5.10.0-136.87.0.168.oe2203sp1.aarch64",
					"openEuler-22.03-LTS-SP1:kernel-5.10.0-136.87.0.168.oe2203sp1.src",
					"openEuler-22.03-LTS-SP1:python3-perf-debuginfo-5.10.0-136.87.0.168.oe2203sp1.x86_64",
					"openEuler-22.03-LTS-SP1:kernel-devel-5.10.0-136.87.0.168.oe2203sp1.x86_64",
					"openEuler-22.03-LTS-SP1:kernel-tools-debuginfo-5.10.0-136.87.0.168.oe2203sp1.x86_64",
					"openEuler-22.03-LTS-SP1:perf-debuginfo-5.10.0-136.87.0.168.oe2203sp1.x86_64",
					"openEuler-22.03-LTS-SP1:perf-5.10.0-136.87.0.168.oe2203sp1.x86_64",
					"openEuler-22.03-LTS-SP1:kernel-5.10.0-136.87.0.168.oe2203sp1.x86_64",
					"openEuler-22.03-LTS-SP1:kernel-debuginfo-5.10.0-136.87.0.168.oe2203sp1.x86_64",
					"openEuler-22.03-LTS-SP1:kernel-source-5.10.0-136.87.0.168.oe2203sp1.x86_64",
					"openEuler-22.03-LTS-SP1:kernel-headers-5.10.0-136.87.0.168.oe2203sp1.x86_64",
					"openEuler-22.03-LTS-SP1:kernel-tools-5.10.0-136.87.0.168.oe2203sp1.x86_64",
					"openEuler-22.03-LTS-SP1:kernel-tools-devel-5.10.0-136.87.0.168.oe2203sp1.x86_64",
					"openEuler-22.03-LTS-SP1:python3-perf-5.10.0-136.87.0.168.oe2203sp1.x86_64",
					"openEuler-22.03-LTS-SP1:kernel-debugsource-5.10.0-136.87.0.168.oe2203sp1.x86_64"
				]
			},
			"remediations":[
				{
					"product_ids":[
						"openEuler-22.03-LTS-SP1:python3-perf-5.10.0-136.87.0.168.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:kernel-debugsource-5.10.0-136.87.0.168.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:kernel-source-5.10.0-136.87.0.168.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:kernel-tools-5.10.0-136.87.0.168.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:kernel-headers-5.10.0-136.87.0.168.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:kernel-tools-devel-5.10.0-136.87.0.168.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:perf-5.10.0-136.87.0.168.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:kernel-devel-5.10.0-136.87.0.168.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:kernel-debuginfo-5.10.0-136.87.0.168.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:kernel-5.10.0-136.87.0.168.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:perf-debuginfo-5.10.0-136.87.0.168.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:python3-perf-debuginfo-5.10.0-136.87.0.168.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:kernel-tools-debuginfo-5.10.0-136.87.0.168.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:kernel-5.10.0-136.87.0.168.oe2203sp1.src",
						"openEuler-22.03-LTS-SP1:python3-perf-debuginfo-5.10.0-136.87.0.168.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:kernel-devel-5.10.0-136.87.0.168.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:kernel-tools-debuginfo-5.10.0-136.87.0.168.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:perf-debuginfo-5.10.0-136.87.0.168.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:perf-5.10.0-136.87.0.168.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:kernel-5.10.0-136.87.0.168.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:kernel-debuginfo-5.10.0-136.87.0.168.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:kernel-source-5.10.0-136.87.0.168.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:kernel-headers-5.10.0-136.87.0.168.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:kernel-tools-5.10.0-136.87.0.168.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:kernel-tools-devel-5.10.0-136.87.0.168.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:python3-perf-5.10.0-136.87.0.168.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:kernel-debugsource-5.10.0-136.87.0.168.oe2203sp1.x86_64"
					],
					"details":"kernel security update",
					"category":"vendor_fix",
					"url":"https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2024-1941"
				}
			],
			"scores":[
				{
					"cvss_v3":{
						"baseSeverity":"MEDIUM",
						"baseScore":5.5,
						"vectorString":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
						"version":"3.1"
					},
					"products":[
						"openEuler-22.03-LTS-SP1:python3-perf-5.10.0-136.87.0.168.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:kernel-debugsource-5.10.0-136.87.0.168.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:kernel-source-5.10.0-136.87.0.168.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:kernel-tools-5.10.0-136.87.0.168.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:kernel-headers-5.10.0-136.87.0.168.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:kernel-tools-devel-5.10.0-136.87.0.168.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:perf-5.10.0-136.87.0.168.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:kernel-devel-5.10.0-136.87.0.168.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:kernel-debuginfo-5.10.0-136.87.0.168.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:kernel-5.10.0-136.87.0.168.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:perf-debuginfo-5.10.0-136.87.0.168.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:python3-perf-debuginfo-5.10.0-136.87.0.168.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:kernel-tools-debuginfo-5.10.0-136.87.0.168.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:kernel-5.10.0-136.87.0.168.oe2203sp1.src",
						"openEuler-22.03-LTS-SP1:python3-perf-debuginfo-5.10.0-136.87.0.168.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:kernel-devel-5.10.0-136.87.0.168.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:kernel-tools-debuginfo-5.10.0-136.87.0.168.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:perf-debuginfo-5.10.0-136.87.0.168.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:perf-5.10.0-136.87.0.168.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:kernel-5.10.0-136.87.0.168.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:kernel-debuginfo-5.10.0-136.87.0.168.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:kernel-source-5.10.0-136.87.0.168.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:kernel-headers-5.10.0-136.87.0.168.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:kernel-tools-5.10.0-136.87.0.168.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:kernel-tools-devel-5.10.0-136.87.0.168.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:python3-perf-5.10.0-136.87.0.168.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:kernel-debugsource-5.10.0-136.87.0.168.oe2203sp1.x86_64"
					]
				}
			],
			"threats":[
				{
					"details":"Medium",
					"category":"impact"
				}
			],
			"title":"CVE-2022-48780"
		},
		{
			"cve":"CVE-2022-48859",
			"notes":[
				{
					"text":"In the Linux kernel, the following vulnerability has been resolved:\n\nnet: marvell: prestera: Add missing of_node_put() in prestera_switch_set_base_mac_addr\n\nThis node pointer is returned by of_find_compatible_node() with\nrefcount incremented. Calling of_node_put() to aovid the refcount leak.",
					"category":"description",
					"title":"Vulnerability Description"
				}
			],
			"product_status":{
				"fixed":[
					"openEuler-22.03-LTS-SP1:python3-perf-5.10.0-136.87.0.168.oe2203sp1.aarch64",
					"openEuler-22.03-LTS-SP1:kernel-debugsource-5.10.0-136.87.0.168.oe2203sp1.aarch64",
					"openEuler-22.03-LTS-SP1:kernel-source-5.10.0-136.87.0.168.oe2203sp1.aarch64",
					"openEuler-22.03-LTS-SP1:kernel-tools-5.10.0-136.87.0.168.oe2203sp1.aarch64",
					"openEuler-22.03-LTS-SP1:kernel-headers-5.10.0-136.87.0.168.oe2203sp1.aarch64",
					"openEuler-22.03-LTS-SP1:kernel-tools-devel-5.10.0-136.87.0.168.oe2203sp1.aarch64",
					"openEuler-22.03-LTS-SP1:perf-5.10.0-136.87.0.168.oe2203sp1.aarch64",
					"openEuler-22.03-LTS-SP1:kernel-devel-5.10.0-136.87.0.168.oe2203sp1.aarch64",
					"openEuler-22.03-LTS-SP1:kernel-debuginfo-5.10.0-136.87.0.168.oe2203sp1.aarch64",
					"openEuler-22.03-LTS-SP1:kernel-5.10.0-136.87.0.168.oe2203sp1.aarch64",
					"openEuler-22.03-LTS-SP1:perf-debuginfo-5.10.0-136.87.0.168.oe2203sp1.aarch64",
					"openEuler-22.03-LTS-SP1:python3-perf-debuginfo-5.10.0-136.87.0.168.oe2203sp1.aarch64",
					"openEuler-22.03-LTS-SP1:kernel-tools-debuginfo-5.10.0-136.87.0.168.oe2203sp1.aarch64",
					"openEuler-22.03-LTS-SP1:kernel-5.10.0-136.87.0.168.oe2203sp1.src",
					"openEuler-22.03-LTS-SP1:python3-perf-debuginfo-5.10.0-136.87.0.168.oe2203sp1.x86_64",
					"openEuler-22.03-LTS-SP1:kernel-devel-5.10.0-136.87.0.168.oe2203sp1.x86_64",
					"openEuler-22.03-LTS-SP1:kernel-tools-debuginfo-5.10.0-136.87.0.168.oe2203sp1.x86_64",
					"openEuler-22.03-LTS-SP1:perf-debuginfo-5.10.0-136.87.0.168.oe2203sp1.x86_64",
					"openEuler-22.03-LTS-SP1:perf-5.10.0-136.87.0.168.oe2203sp1.x86_64",
					"openEuler-22.03-LTS-SP1:kernel-5.10.0-136.87.0.168.oe2203sp1.x86_64",
					"openEuler-22.03-LTS-SP1:kernel-debuginfo-5.10.0-136.87.0.168.oe2203sp1.x86_64",
					"openEuler-22.03-LTS-SP1:kernel-source-5.10.0-136.87.0.168.oe2203sp1.x86_64",
					"openEuler-22.03-LTS-SP1:kernel-headers-5.10.0-136.87.0.168.oe2203sp1.x86_64",
					"openEuler-22.03-LTS-SP1:kernel-tools-5.10.0-136.87.0.168.oe2203sp1.x86_64",
					"openEuler-22.03-LTS-SP1:kernel-tools-devel-5.10.0-136.87.0.168.oe2203sp1.x86_64",
					"openEuler-22.03-LTS-SP1:python3-perf-5.10.0-136.87.0.168.oe2203sp1.x86_64",
					"openEuler-22.03-LTS-SP1:kernel-debugsource-5.10.0-136.87.0.168.oe2203sp1.x86_64"
				]
			},
			"remediations":[
				{
					"product_ids":[
						"openEuler-22.03-LTS-SP1:python3-perf-5.10.0-136.87.0.168.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:kernel-debugsource-5.10.0-136.87.0.168.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:kernel-source-5.10.0-136.87.0.168.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:kernel-tools-5.10.0-136.87.0.168.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:kernel-headers-5.10.0-136.87.0.168.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:kernel-tools-devel-5.10.0-136.87.0.168.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:perf-5.10.0-136.87.0.168.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:kernel-devel-5.10.0-136.87.0.168.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:kernel-debuginfo-5.10.0-136.87.0.168.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:kernel-5.10.0-136.87.0.168.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:perf-debuginfo-5.10.0-136.87.0.168.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:python3-perf-debuginfo-5.10.0-136.87.0.168.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:kernel-tools-debuginfo-5.10.0-136.87.0.168.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:kernel-5.10.0-136.87.0.168.oe2203sp1.src",
						"openEuler-22.03-LTS-SP1:python3-perf-debuginfo-5.10.0-136.87.0.168.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:kernel-devel-5.10.0-136.87.0.168.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:kernel-tools-debuginfo-5.10.0-136.87.0.168.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:perf-debuginfo-5.10.0-136.87.0.168.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:perf-5.10.0-136.87.0.168.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:kernel-5.10.0-136.87.0.168.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:kernel-debuginfo-5.10.0-136.87.0.168.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:kernel-source-5.10.0-136.87.0.168.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:kernel-headers-5.10.0-136.87.0.168.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:kernel-tools-5.10.0-136.87.0.168.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:kernel-tools-devel-5.10.0-136.87.0.168.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:python3-perf-5.10.0-136.87.0.168.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:kernel-debugsource-5.10.0-136.87.0.168.oe2203sp1.x86_64"
					],
					"details":"kernel security update",
					"category":"vendor_fix",
					"url":"https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2024-1941"
				}
			],
			"scores":[
				{
					"cvss_v3":{
						"baseSeverity":"MEDIUM",
						"baseScore":5.5,
						"vectorString":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
						"version":"3.1"
					},
					"products":[
						"openEuler-22.03-LTS-SP1:python3-perf-5.10.0-136.87.0.168.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:kernel-debugsource-5.10.0-136.87.0.168.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:kernel-source-5.10.0-136.87.0.168.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:kernel-tools-5.10.0-136.87.0.168.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:kernel-headers-5.10.0-136.87.0.168.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:kernel-tools-devel-5.10.0-136.87.0.168.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:perf-5.10.0-136.87.0.168.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:kernel-devel-5.10.0-136.87.0.168.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:kernel-debuginfo-5.10.0-136.87.0.168.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:kernel-5.10.0-136.87.0.168.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:perf-debuginfo-5.10.0-136.87.0.168.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:python3-perf-debuginfo-5.10.0-136.87.0.168.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:kernel-tools-debuginfo-5.10.0-136.87.0.168.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:kernel-5.10.0-136.87.0.168.oe2203sp1.src",
						"openEuler-22.03-LTS-SP1:python3-perf-debuginfo-5.10.0-136.87.0.168.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:kernel-devel-5.10.0-136.87.0.168.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:kernel-tools-debuginfo-5.10.0-136.87.0.168.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:perf-debuginfo-5.10.0-136.87.0.168.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:perf-5.10.0-136.87.0.168.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:kernel-5.10.0-136.87.0.168.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:kernel-debuginfo-5.10.0-136.87.0.168.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:kernel-source-5.10.0-136.87.0.168.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:kernel-headers-5.10.0-136.87.0.168.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:kernel-tools-5.10.0-136.87.0.168.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:kernel-tools-devel-5.10.0-136.87.0.168.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:python3-perf-5.10.0-136.87.0.168.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:kernel-debugsource-5.10.0-136.87.0.168.oe2203sp1.x86_64"
					]
				}
			],
			"threats":[
				{
					"details":"Medium",
					"category":"impact"
				}
			],
			"title":"CVE-2022-48859"
		},
		{
			"cve":"CVE-2023-52679",
			"notes":[
				{
					"text":"In the Linux kernel, the following vulnerability has been resolved:\n\nof: Fix double free in of_parse_phandle_with_args_map\n\nIn of_parse_phandle_with_args_map() the inner loop that\niterates through the map entries calls of_node_put(new)\nto free the reference acquired by the previous iteration\nof the inner loop. This assumes that the value of \"new\" is\nNULL on the first iteration of the inner loop.\n\nMake sure that this is true in all iterations of the outer\nloop by setting \"new\" to NULL after its value is assigned to \"cur\".\n\nExtend the unittest to detect the double free and add an additional\ntest case that actually triggers this path.",
					"category":"description",
					"title":"Vulnerability Description"
				}
			],
			"product_status":{
				"fixed":[
					"openEuler-22.03-LTS-SP1:python3-perf-5.10.0-136.87.0.168.oe2203sp1.aarch64",
					"openEuler-22.03-LTS-SP1:kernel-debugsource-5.10.0-136.87.0.168.oe2203sp1.aarch64",
					"openEuler-22.03-LTS-SP1:kernel-source-5.10.0-136.87.0.168.oe2203sp1.aarch64",
					"openEuler-22.03-LTS-SP1:kernel-tools-5.10.0-136.87.0.168.oe2203sp1.aarch64",
					"openEuler-22.03-LTS-SP1:kernel-headers-5.10.0-136.87.0.168.oe2203sp1.aarch64",
					"openEuler-22.03-LTS-SP1:kernel-tools-devel-5.10.0-136.87.0.168.oe2203sp1.aarch64",
					"openEuler-22.03-LTS-SP1:perf-5.10.0-136.87.0.168.oe2203sp1.aarch64",
					"openEuler-22.03-LTS-SP1:kernel-devel-5.10.0-136.87.0.168.oe2203sp1.aarch64",
					"openEuler-22.03-LTS-SP1:kernel-debuginfo-5.10.0-136.87.0.168.oe2203sp1.aarch64",
					"openEuler-22.03-LTS-SP1:kernel-5.10.0-136.87.0.168.oe2203sp1.aarch64",
					"openEuler-22.03-LTS-SP1:perf-debuginfo-5.10.0-136.87.0.168.oe2203sp1.aarch64",
					"openEuler-22.03-LTS-SP1:python3-perf-debuginfo-5.10.0-136.87.0.168.oe2203sp1.aarch64",
					"openEuler-22.03-LTS-SP1:kernel-tools-debuginfo-5.10.0-136.87.0.168.oe2203sp1.aarch64",
					"openEuler-22.03-LTS-SP1:kernel-5.10.0-136.87.0.168.oe2203sp1.src",
					"openEuler-22.03-LTS-SP1:python3-perf-debuginfo-5.10.0-136.87.0.168.oe2203sp1.x86_64",
					"openEuler-22.03-LTS-SP1:kernel-devel-5.10.0-136.87.0.168.oe2203sp1.x86_64",
					"openEuler-22.03-LTS-SP1:kernel-tools-debuginfo-5.10.0-136.87.0.168.oe2203sp1.x86_64",
					"openEuler-22.03-LTS-SP1:perf-debuginfo-5.10.0-136.87.0.168.oe2203sp1.x86_64",
					"openEuler-22.03-LTS-SP1:perf-5.10.0-136.87.0.168.oe2203sp1.x86_64",
					"openEuler-22.03-LTS-SP1:kernel-5.10.0-136.87.0.168.oe2203sp1.x86_64",
					"openEuler-22.03-LTS-SP1:kernel-debuginfo-5.10.0-136.87.0.168.oe2203sp1.x86_64",
					"openEuler-22.03-LTS-SP1:kernel-source-5.10.0-136.87.0.168.oe2203sp1.x86_64",
					"openEuler-22.03-LTS-SP1:kernel-headers-5.10.0-136.87.0.168.oe2203sp1.x86_64",
					"openEuler-22.03-LTS-SP1:kernel-tools-5.10.0-136.87.0.168.oe2203sp1.x86_64",
					"openEuler-22.03-LTS-SP1:kernel-tools-devel-5.10.0-136.87.0.168.oe2203sp1.x86_64",
					"openEuler-22.03-LTS-SP1:python3-perf-5.10.0-136.87.0.168.oe2203sp1.x86_64",
					"openEuler-22.03-LTS-SP1:kernel-debugsource-5.10.0-136.87.0.168.oe2203sp1.x86_64"
				]
			},
			"remediations":[
				{
					"product_ids":[
						"openEuler-22.03-LTS-SP1:python3-perf-5.10.0-136.87.0.168.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:kernel-debugsource-5.10.0-136.87.0.168.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:kernel-source-5.10.0-136.87.0.168.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:kernel-tools-5.10.0-136.87.0.168.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:kernel-headers-5.10.0-136.87.0.168.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:kernel-tools-devel-5.10.0-136.87.0.168.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:perf-5.10.0-136.87.0.168.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:kernel-devel-5.10.0-136.87.0.168.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:kernel-debuginfo-5.10.0-136.87.0.168.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:kernel-5.10.0-136.87.0.168.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:perf-debuginfo-5.10.0-136.87.0.168.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:python3-perf-debuginfo-5.10.0-136.87.0.168.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:kernel-tools-debuginfo-5.10.0-136.87.0.168.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:kernel-5.10.0-136.87.0.168.oe2203sp1.src",
						"openEuler-22.03-LTS-SP1:python3-perf-debuginfo-5.10.0-136.87.0.168.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:kernel-devel-5.10.0-136.87.0.168.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:kernel-tools-debuginfo-5.10.0-136.87.0.168.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:perf-debuginfo-5.10.0-136.87.0.168.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:perf-5.10.0-136.87.0.168.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:kernel-5.10.0-136.87.0.168.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:kernel-debuginfo-5.10.0-136.87.0.168.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:kernel-source-5.10.0-136.87.0.168.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:kernel-headers-5.10.0-136.87.0.168.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:kernel-tools-5.10.0-136.87.0.168.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:kernel-tools-devel-5.10.0-136.87.0.168.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:python3-perf-5.10.0-136.87.0.168.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:kernel-debugsource-5.10.0-136.87.0.168.oe2203sp1.x86_64"
					],
					"details":"kernel security update",
					"category":"vendor_fix",
					"url":"https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2024-1941"
				}
			],
			"scores":[
				{
					"cvss_v3":{
						"baseSeverity":"MEDIUM",
						"baseScore":5.5,
						"vectorString":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
						"version":"3.1"
					},
					"products":[
						"openEuler-22.03-LTS-SP1:python3-perf-5.10.0-136.87.0.168.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:kernel-debugsource-5.10.0-136.87.0.168.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:kernel-source-5.10.0-136.87.0.168.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:kernel-tools-5.10.0-136.87.0.168.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:kernel-headers-5.10.0-136.87.0.168.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:kernel-tools-devel-5.10.0-136.87.0.168.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:perf-5.10.0-136.87.0.168.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:kernel-devel-5.10.0-136.87.0.168.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:kernel-debuginfo-5.10.0-136.87.0.168.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:kernel-5.10.0-136.87.0.168.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:perf-debuginfo-5.10.0-136.87.0.168.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:python3-perf-debuginfo-5.10.0-136.87.0.168.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:kernel-tools-debuginfo-5.10.0-136.87.0.168.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:kernel-5.10.0-136.87.0.168.oe2203sp1.src",
						"openEuler-22.03-LTS-SP1:python3-perf-debuginfo-5.10.0-136.87.0.168.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:kernel-devel-5.10.0-136.87.0.168.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:kernel-tools-debuginfo-5.10.0-136.87.0.168.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:perf-debuginfo-5.10.0-136.87.0.168.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:perf-5.10.0-136.87.0.168.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:kernel-5.10.0-136.87.0.168.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:kernel-debuginfo-5.10.0-136.87.0.168.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:kernel-source-5.10.0-136.87.0.168.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:kernel-headers-5.10.0-136.87.0.168.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:kernel-tools-5.10.0-136.87.0.168.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:kernel-tools-devel-5.10.0-136.87.0.168.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:python3-perf-5.10.0-136.87.0.168.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:kernel-debugsource-5.10.0-136.87.0.168.oe2203sp1.x86_64"
					]
				}
			],
			"threats":[
				{
					"details":"Medium",
					"category":"impact"
				}
			],
			"title":"CVE-2023-52679"
		},
		{
			"cve":"CVE-2024-26924",
			"notes":[
				{
					"text":"In the Linux kernel, the following vulnerability has been resolved:\n\nnetfilter: nft_set_pipapo: do not free live element\n\nPablo reports a crash with large batches of elements with a\nback-to-back add/remove pattern.  Quoting Pablo:\n\n  add_elem(\"00000000\") timeout 100 ms\n  ...\n  add_elem(\"0000000X\") timeout 100 ms\n  del_elem(\"0000000X\") <---------------- delete one that was just added\n  ...\n  add_elem(\"00005000\") timeout 100 ms\n\n  1) nft_pipapo_remove() removes element 0000000X\n  Then, KASAN shows a splat.\n\nLooking at the remove function there is a chance that we will drop a\nrule that maps to a non-deactivated element.\n\nRemoval happens in two steps, first we do a lookup for key k and return the\nto-be-removed element and mark it as inactive in the next generation.\nThen, in a second step, the element gets removed from the set/map.\n\nThe _remove function does not work correctly if we have more than one\nelement that share the same key.\n\nThis can happen if we insert an element into a set when the set already\nholds an element with same key, but the element mapping to the existing\nkey has timed out or is not active in the next generation.\n\nIn such case its possible that removal will unmap the wrong element.\nIf this happens, we will leak the non-deactivated element, it becomes\nunreachable.\n\nThe element that got deactivated (and will be freed later) will\nremain reachable in the set data structure, this can result in\na crash when such an element is retrieved during lookup (stale\npointer).\n\nAdd a check that the fully matching key does in fact map to the element\nthat we have marked as inactive in the deactivation step.\nIf not, we need to continue searching.\n\nAdd a bug/warn trap at the end of the function as well, the remove\nfunction must not ever be called with an invisible/unreachable/non-existent\nelement.\n\nv2: avoid uneeded temporary variable (Stefano)",
					"category":"description",
					"title":"Vulnerability Description"
				}
			],
			"product_status":{
				"fixed":[
					"openEuler-22.03-LTS-SP1:python3-perf-5.10.0-136.87.0.168.oe2203sp1.aarch64",
					"openEuler-22.03-LTS-SP1:kernel-debugsource-5.10.0-136.87.0.168.oe2203sp1.aarch64",
					"openEuler-22.03-LTS-SP1:kernel-source-5.10.0-136.87.0.168.oe2203sp1.aarch64",
					"openEuler-22.03-LTS-SP1:kernel-tools-5.10.0-136.87.0.168.oe2203sp1.aarch64",
					"openEuler-22.03-LTS-SP1:kernel-headers-5.10.0-136.87.0.168.oe2203sp1.aarch64",
					"openEuler-22.03-LTS-SP1:kernel-tools-devel-5.10.0-136.87.0.168.oe2203sp1.aarch64",
					"openEuler-22.03-LTS-SP1:perf-5.10.0-136.87.0.168.oe2203sp1.aarch64",
					"openEuler-22.03-LTS-SP1:kernel-devel-5.10.0-136.87.0.168.oe2203sp1.aarch64",
					"openEuler-22.03-LTS-SP1:kernel-debuginfo-5.10.0-136.87.0.168.oe2203sp1.aarch64",
					"openEuler-22.03-LTS-SP1:kernel-5.10.0-136.87.0.168.oe2203sp1.aarch64",
					"openEuler-22.03-LTS-SP1:perf-debuginfo-5.10.0-136.87.0.168.oe2203sp1.aarch64",
					"openEuler-22.03-LTS-SP1:python3-perf-debuginfo-5.10.0-136.87.0.168.oe2203sp1.aarch64",
					"openEuler-22.03-LTS-SP1:kernel-tools-debuginfo-5.10.0-136.87.0.168.oe2203sp1.aarch64",
					"openEuler-22.03-LTS-SP1:kernel-5.10.0-136.87.0.168.oe2203sp1.src",
					"openEuler-22.03-LTS-SP1:python3-perf-debuginfo-5.10.0-136.87.0.168.oe2203sp1.x86_64",
					"openEuler-22.03-LTS-SP1:kernel-devel-5.10.0-136.87.0.168.oe2203sp1.x86_64",
					"openEuler-22.03-LTS-SP1:kernel-tools-debuginfo-5.10.0-136.87.0.168.oe2203sp1.x86_64",
					"openEuler-22.03-LTS-SP1:perf-debuginfo-5.10.0-136.87.0.168.oe2203sp1.x86_64",
					"openEuler-22.03-LTS-SP1:perf-5.10.0-136.87.0.168.oe2203sp1.x86_64",
					"openEuler-22.03-LTS-SP1:kernel-5.10.0-136.87.0.168.oe2203sp1.x86_64",
					"openEuler-22.03-LTS-SP1:kernel-debuginfo-5.10.0-136.87.0.168.oe2203sp1.x86_64",
					"openEuler-22.03-LTS-SP1:kernel-source-5.10.0-136.87.0.168.oe2203sp1.x86_64",
					"openEuler-22.03-LTS-SP1:kernel-headers-5.10.0-136.87.0.168.oe2203sp1.x86_64",
					"openEuler-22.03-LTS-SP1:kernel-tools-5.10.0-136.87.0.168.oe2203sp1.x86_64",
					"openEuler-22.03-LTS-SP1:kernel-tools-devel-5.10.0-136.87.0.168.oe2203sp1.x86_64",
					"openEuler-22.03-LTS-SP1:python3-perf-5.10.0-136.87.0.168.oe2203sp1.x86_64",
					"openEuler-22.03-LTS-SP1:kernel-debugsource-5.10.0-136.87.0.168.oe2203sp1.x86_64"
				]
			},
			"remediations":[
				{
					"product_ids":[
						"openEuler-22.03-LTS-SP1:python3-perf-5.10.0-136.87.0.168.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:kernel-debugsource-5.10.0-136.87.0.168.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:kernel-source-5.10.0-136.87.0.168.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:kernel-tools-5.10.0-136.87.0.168.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:kernel-headers-5.10.0-136.87.0.168.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:kernel-tools-devel-5.10.0-136.87.0.168.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:perf-5.10.0-136.87.0.168.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:kernel-devel-5.10.0-136.87.0.168.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:kernel-debuginfo-5.10.0-136.87.0.168.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:kernel-5.10.0-136.87.0.168.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:perf-debuginfo-5.10.0-136.87.0.168.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:python3-perf-debuginfo-5.10.0-136.87.0.168.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:kernel-tools-debuginfo-5.10.0-136.87.0.168.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:kernel-5.10.0-136.87.0.168.oe2203sp1.src",
						"openEuler-22.03-LTS-SP1:python3-perf-debuginfo-5.10.0-136.87.0.168.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:kernel-devel-5.10.0-136.87.0.168.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:kernel-tools-debuginfo-5.10.0-136.87.0.168.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:perf-debuginfo-5.10.0-136.87.0.168.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:perf-5.10.0-136.87.0.168.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:kernel-5.10.0-136.87.0.168.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:kernel-debuginfo-5.10.0-136.87.0.168.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:kernel-source-5.10.0-136.87.0.168.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:kernel-headers-5.10.0-136.87.0.168.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:kernel-tools-5.10.0-136.87.0.168.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:kernel-tools-devel-5.10.0-136.87.0.168.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:python3-perf-5.10.0-136.87.0.168.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:kernel-debugsource-5.10.0-136.87.0.168.oe2203sp1.x86_64"
					],
					"details":"kernel security update",
					"category":"vendor_fix",
					"url":"https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2024-1941"
				}
			],
			"scores":[
				{
					"cvss_v3":{
						"baseSeverity":"MEDIUM",
						"baseScore":5.9,
						"vectorString":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H",
						"version":"3.1"
					},
					"products":[
						"openEuler-22.03-LTS-SP1:python3-perf-5.10.0-136.87.0.168.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:kernel-debugsource-5.10.0-136.87.0.168.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:kernel-source-5.10.0-136.87.0.168.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:kernel-tools-5.10.0-136.87.0.168.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:kernel-headers-5.10.0-136.87.0.168.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:kernel-tools-devel-5.10.0-136.87.0.168.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:perf-5.10.0-136.87.0.168.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:kernel-devel-5.10.0-136.87.0.168.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:kernel-debuginfo-5.10.0-136.87.0.168.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:kernel-5.10.0-136.87.0.168.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:perf-debuginfo-5.10.0-136.87.0.168.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:python3-perf-debuginfo-5.10.0-136.87.0.168.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:kernel-tools-debuginfo-5.10.0-136.87.0.168.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:kernel-5.10.0-136.87.0.168.oe2203sp1.src",
						"openEuler-22.03-LTS-SP1:python3-perf-debuginfo-5.10.0-136.87.0.168.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:kernel-devel-5.10.0-136.87.0.168.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:kernel-tools-debuginfo-5.10.0-136.87.0.168.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:perf-debuginfo-5.10.0-136.87.0.168.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:perf-5.10.0-136.87.0.168.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:kernel-5.10.0-136.87.0.168.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:kernel-debuginfo-5.10.0-136.87.0.168.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:kernel-source-5.10.0-136.87.0.168.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:kernel-headers-5.10.0-136.87.0.168.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:kernel-tools-5.10.0-136.87.0.168.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:kernel-tools-devel-5.10.0-136.87.0.168.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:python3-perf-5.10.0-136.87.0.168.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:kernel-debugsource-5.10.0-136.87.0.168.oe2203sp1.x86_64"
					]
				}
			],
			"threats":[
				{
					"details":"Medium",
					"category":"impact"
				}
			],
			"title":"CVE-2024-26924"
		},
		{
			"cve":"CVE-2024-26925",
			"notes":[
				{
					"text":"In the Linux kernel, the following vulnerability has been resolved:\n\nnetfilter: nf_tables: release mutex after nft_gc_seq_end from abort path\n\nThe commit mutex should not be released during the critical section\nbetween nft_gc_seq_begin() and nft_gc_seq_end(), otherwise, async GC\nworker could collect expired objects and get the released commit lock\nwithin the same GC sequence.\n\nnf_tables_module_autoload() temporarily releases the mutex to load\nmodule dependencies, then it goes back to replay the transaction again.\nMove it at the end of the abort phase after nft_gc_seq_end() is called.",
					"category":"description",
					"title":"Vulnerability Description"
				}
			],
			"product_status":{
				"fixed":[
					"openEuler-22.03-LTS-SP1:python3-perf-5.10.0-136.87.0.168.oe2203sp1.aarch64",
					"openEuler-22.03-LTS-SP1:kernel-debugsource-5.10.0-136.87.0.168.oe2203sp1.aarch64",
					"openEuler-22.03-LTS-SP1:kernel-source-5.10.0-136.87.0.168.oe2203sp1.aarch64",
					"openEuler-22.03-LTS-SP1:kernel-tools-5.10.0-136.87.0.168.oe2203sp1.aarch64",
					"openEuler-22.03-LTS-SP1:kernel-headers-5.10.0-136.87.0.168.oe2203sp1.aarch64",
					"openEuler-22.03-LTS-SP1:kernel-tools-devel-5.10.0-136.87.0.168.oe2203sp1.aarch64",
					"openEuler-22.03-LTS-SP1:perf-5.10.0-136.87.0.168.oe2203sp1.aarch64",
					"openEuler-22.03-LTS-SP1:kernel-devel-5.10.0-136.87.0.168.oe2203sp1.aarch64",
					"openEuler-22.03-LTS-SP1:kernel-debuginfo-5.10.0-136.87.0.168.oe2203sp1.aarch64",
					"openEuler-22.03-LTS-SP1:kernel-5.10.0-136.87.0.168.oe2203sp1.aarch64",
					"openEuler-22.03-LTS-SP1:perf-debuginfo-5.10.0-136.87.0.168.oe2203sp1.aarch64",
					"openEuler-22.03-LTS-SP1:python3-perf-debuginfo-5.10.0-136.87.0.168.oe2203sp1.aarch64",
					"openEuler-22.03-LTS-SP1:kernel-tools-debuginfo-5.10.0-136.87.0.168.oe2203sp1.aarch64",
					"openEuler-22.03-LTS-SP1:kernel-5.10.0-136.87.0.168.oe2203sp1.src",
					"openEuler-22.03-LTS-SP1:python3-perf-debuginfo-5.10.0-136.87.0.168.oe2203sp1.x86_64",
					"openEuler-22.03-LTS-SP1:kernel-devel-5.10.0-136.87.0.168.oe2203sp1.x86_64",
					"openEuler-22.03-LTS-SP1:kernel-tools-debuginfo-5.10.0-136.87.0.168.oe2203sp1.x86_64",
					"openEuler-22.03-LTS-SP1:perf-debuginfo-5.10.0-136.87.0.168.oe2203sp1.x86_64",
					"openEuler-22.03-LTS-SP1:perf-5.10.0-136.87.0.168.oe2203sp1.x86_64",
					"openEuler-22.03-LTS-SP1:kernel-5.10.0-136.87.0.168.oe2203sp1.x86_64",
					"openEuler-22.03-LTS-SP1:kernel-debuginfo-5.10.0-136.87.0.168.oe2203sp1.x86_64",
					"openEuler-22.03-LTS-SP1:kernel-source-5.10.0-136.87.0.168.oe2203sp1.x86_64",
					"openEuler-22.03-LTS-SP1:kernel-headers-5.10.0-136.87.0.168.oe2203sp1.x86_64",
					"openEuler-22.03-LTS-SP1:kernel-tools-5.10.0-136.87.0.168.oe2203sp1.x86_64",
					"openEuler-22.03-LTS-SP1:kernel-tools-devel-5.10.0-136.87.0.168.oe2203sp1.x86_64",
					"openEuler-22.03-LTS-SP1:python3-perf-5.10.0-136.87.0.168.oe2203sp1.x86_64",
					"openEuler-22.03-LTS-SP1:kernel-debugsource-5.10.0-136.87.0.168.oe2203sp1.x86_64"
				]
			},
			"remediations":[
				{
					"product_ids":[
						"openEuler-22.03-LTS-SP1:python3-perf-5.10.0-136.87.0.168.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:kernel-debugsource-5.10.0-136.87.0.168.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:kernel-source-5.10.0-136.87.0.168.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:kernel-tools-5.10.0-136.87.0.168.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:kernel-headers-5.10.0-136.87.0.168.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:kernel-tools-devel-5.10.0-136.87.0.168.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:perf-5.10.0-136.87.0.168.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:kernel-devel-5.10.0-136.87.0.168.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:kernel-debuginfo-5.10.0-136.87.0.168.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:kernel-5.10.0-136.87.0.168.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:perf-debuginfo-5.10.0-136.87.0.168.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:python3-perf-debuginfo-5.10.0-136.87.0.168.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:kernel-tools-debuginfo-5.10.0-136.87.0.168.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:kernel-5.10.0-136.87.0.168.oe2203sp1.src",
						"openEuler-22.03-LTS-SP1:python3-perf-debuginfo-5.10.0-136.87.0.168.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:kernel-devel-5.10.0-136.87.0.168.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:kernel-tools-debuginfo-5.10.0-136.87.0.168.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:perf-debuginfo-5.10.0-136.87.0.168.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:perf-5.10.0-136.87.0.168.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:kernel-5.10.0-136.87.0.168.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:kernel-debuginfo-5.10.0-136.87.0.168.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:kernel-source-5.10.0-136.87.0.168.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:kernel-headers-5.10.0-136.87.0.168.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:kernel-tools-5.10.0-136.87.0.168.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:kernel-tools-devel-5.10.0-136.87.0.168.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:python3-perf-5.10.0-136.87.0.168.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:kernel-debugsource-5.10.0-136.87.0.168.oe2203sp1.x86_64"
					],
					"details":"kernel security update",
					"category":"vendor_fix",
					"url":"https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2024-1941"
				}
			],
			"scores":[
				{
					"cvss_v3":{
						"baseSeverity":"HIGH",
						"baseScore":7.0,
						"vectorString":"CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
						"version":"3.1"
					},
					"products":[
						"openEuler-22.03-LTS-SP1:python3-perf-5.10.0-136.87.0.168.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:kernel-debugsource-5.10.0-136.87.0.168.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:kernel-source-5.10.0-136.87.0.168.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:kernel-tools-5.10.0-136.87.0.168.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:kernel-headers-5.10.0-136.87.0.168.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:kernel-tools-devel-5.10.0-136.87.0.168.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:perf-5.10.0-136.87.0.168.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:kernel-devel-5.10.0-136.87.0.168.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:kernel-debuginfo-5.10.0-136.87.0.168.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:kernel-5.10.0-136.87.0.168.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:perf-debuginfo-5.10.0-136.87.0.168.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:python3-perf-debuginfo-5.10.0-136.87.0.168.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:kernel-tools-debuginfo-5.10.0-136.87.0.168.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:kernel-5.10.0-136.87.0.168.oe2203sp1.src",
						"openEuler-22.03-LTS-SP1:python3-perf-debuginfo-5.10.0-136.87.0.168.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:kernel-devel-5.10.0-136.87.0.168.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:kernel-tools-debuginfo-5.10.0-136.87.0.168.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:perf-debuginfo-5.10.0-136.87.0.168.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:perf-5.10.0-136.87.0.168.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:kernel-5.10.0-136.87.0.168.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:kernel-debuginfo-5.10.0-136.87.0.168.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:kernel-source-5.10.0-136.87.0.168.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:kernel-headers-5.10.0-136.87.0.168.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:kernel-tools-5.10.0-136.87.0.168.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:kernel-tools-devel-5.10.0-136.87.0.168.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:python3-perf-5.10.0-136.87.0.168.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:kernel-debugsource-5.10.0-136.87.0.168.oe2203sp1.x86_64"
					]
				}
			],
			"threats":[
				{
					"details":"High",
					"category":"impact"
				}
			],
			"title":"CVE-2024-26925"
		},
		{
			"cve":"CVE-2024-27010",
			"notes":[
				{
					"text":"In the Linux kernel, the following vulnerability has been resolved:\n\nnet/sched: Fix mirred deadlock on device recursion\n\nWhen the mirred action is used on a classful egress qdisc and a packet is\nmirrored or redirected to self we hit a qdisc lock deadlock.\nSee trace below.\n\n[..... other info removed for brevity....]\n[   82.890906]\n[   82.890906] ============================================\n[   82.890906] WARNING: possible recursive locking detected\n[   82.890906] 6.8.0-05205-g77fadd89fe2d-dirty #213 Tainted: G        W\n[   82.890906] --------------------------------------------\n[   82.890906] ping/418 is trying to acquire lock:\n[   82.890906] ffff888006994110 (&sch->q.lock){+.-.}-{3:3}, at:\n__dev_queue_xmit+0x1778/0x3550\n[   82.890906]\n[   82.890906] but task is already holding lock:\n[   82.890906] ffff888006994110 (&sch->q.lock){+.-.}-{3:3}, at:\n__dev_queue_xmit+0x1778/0x3550\n[   82.890906]\n[   82.890906] other info that might help us debug this:\n[   82.890906]  Possible unsafe locking scenario:\n[   82.890906]\n[   82.890906]        CPU0\n[   82.890906]        ----\n[   82.890906]   lock(&sch->q.lock);\n[   82.890906]   lock(&sch->q.lock);\n[   82.890906]\n[   82.890906]  *** DEADLOCK ***\n[   82.890906]\n[..... other info removed for brevity....]\n\nExample setup (eth0->eth0) to recreate\ntc qdisc add dev eth0 root handle 1: htb default 30\ntc filter add dev eth0 handle 1: protocol ip prio 2 matchall \\\n     action mirred egress redirect dev eth0\n\nAnother example(eth0->eth1->eth0) to recreate\ntc qdisc add dev eth0 root handle 1: htb default 30\ntc filter add dev eth0 handle 1: protocol ip prio 2 matchall \\\n     action mirred egress redirect dev eth1\n\ntc qdisc add dev eth1 root handle 1: htb default 30\ntc filter add dev eth1 handle 1: protocol ip prio 2 matchall \\\n     action mirred egress redirect dev eth0\n\nWe fix this by adding an owner field (CPU id) to struct Qdisc set after\nroot qdisc is entered. When the softirq enters it a second time, if the\nqdisc owner is the same CPU, the packet is dropped to break the loop.",
					"category":"description",
					"title":"Vulnerability Description"
				}
			],
			"product_status":{
				"fixed":[
					"openEuler-22.03-LTS-SP1:python3-perf-5.10.0-136.87.0.168.oe2203sp1.aarch64",
					"openEuler-22.03-LTS-SP1:kernel-debugsource-5.10.0-136.87.0.168.oe2203sp1.aarch64",
					"openEuler-22.03-LTS-SP1:kernel-source-5.10.0-136.87.0.168.oe2203sp1.aarch64",
					"openEuler-22.03-LTS-SP1:kernel-tools-5.10.0-136.87.0.168.oe2203sp1.aarch64",
					"openEuler-22.03-LTS-SP1:kernel-headers-5.10.0-136.87.0.168.oe2203sp1.aarch64",
					"openEuler-22.03-LTS-SP1:kernel-tools-devel-5.10.0-136.87.0.168.oe2203sp1.aarch64",
					"openEuler-22.03-LTS-SP1:perf-5.10.0-136.87.0.168.oe2203sp1.aarch64",
					"openEuler-22.03-LTS-SP1:kernel-devel-5.10.0-136.87.0.168.oe2203sp1.aarch64",
					"openEuler-22.03-LTS-SP1:kernel-debuginfo-5.10.0-136.87.0.168.oe2203sp1.aarch64",
					"openEuler-22.03-LTS-SP1:kernel-5.10.0-136.87.0.168.oe2203sp1.aarch64",
					"openEuler-22.03-LTS-SP1:perf-debuginfo-5.10.0-136.87.0.168.oe2203sp1.aarch64",
					"openEuler-22.03-LTS-SP1:python3-perf-debuginfo-5.10.0-136.87.0.168.oe2203sp1.aarch64",
					"openEuler-22.03-LTS-SP1:kernel-tools-debuginfo-5.10.0-136.87.0.168.oe2203sp1.aarch64",
					"openEuler-22.03-LTS-SP1:kernel-5.10.0-136.87.0.168.oe2203sp1.src",
					"openEuler-22.03-LTS-SP1:python3-perf-debuginfo-5.10.0-136.87.0.168.oe2203sp1.x86_64",
					"openEuler-22.03-LTS-SP1:kernel-devel-5.10.0-136.87.0.168.oe2203sp1.x86_64",
					"openEuler-22.03-LTS-SP1:kernel-tools-debuginfo-5.10.0-136.87.0.168.oe2203sp1.x86_64",
					"openEuler-22.03-LTS-SP1:perf-debuginfo-5.10.0-136.87.0.168.oe2203sp1.x86_64",
					"openEuler-22.03-LTS-SP1:perf-5.10.0-136.87.0.168.oe2203sp1.x86_64",
					"openEuler-22.03-LTS-SP1:kernel-5.10.0-136.87.0.168.oe2203sp1.x86_64",
					"openEuler-22.03-LTS-SP1:kernel-debuginfo-5.10.0-136.87.0.168.oe2203sp1.x86_64",
					"openEuler-22.03-LTS-SP1:kernel-source-5.10.0-136.87.0.168.oe2203sp1.x86_64",
					"openEuler-22.03-LTS-SP1:kernel-headers-5.10.0-136.87.0.168.oe2203sp1.x86_64",
					"openEuler-22.03-LTS-SP1:kernel-tools-5.10.0-136.87.0.168.oe2203sp1.x86_64",
					"openEuler-22.03-LTS-SP1:kernel-tools-devel-5.10.0-136.87.0.168.oe2203sp1.x86_64",
					"openEuler-22.03-LTS-SP1:python3-perf-5.10.0-136.87.0.168.oe2203sp1.x86_64",
					"openEuler-22.03-LTS-SP1:kernel-debugsource-5.10.0-136.87.0.168.oe2203sp1.x86_64"
				]
			},
			"remediations":[
				{
					"product_ids":[
						"openEuler-22.03-LTS-SP1:python3-perf-5.10.0-136.87.0.168.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:kernel-debugsource-5.10.0-136.87.0.168.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:kernel-source-5.10.0-136.87.0.168.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:kernel-tools-5.10.0-136.87.0.168.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:kernel-headers-5.10.0-136.87.0.168.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:kernel-tools-devel-5.10.0-136.87.0.168.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:perf-5.10.0-136.87.0.168.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:kernel-devel-5.10.0-136.87.0.168.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:kernel-debuginfo-5.10.0-136.87.0.168.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:kernel-5.10.0-136.87.0.168.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:perf-debuginfo-5.10.0-136.87.0.168.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:python3-perf-debuginfo-5.10.0-136.87.0.168.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:kernel-tools-debuginfo-5.10.0-136.87.0.168.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:kernel-5.10.0-136.87.0.168.oe2203sp1.src",
						"openEuler-22.03-LTS-SP1:python3-perf-debuginfo-5.10.0-136.87.0.168.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:kernel-devel-5.10.0-136.87.0.168.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:kernel-tools-debuginfo-5.10.0-136.87.0.168.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:perf-debuginfo-5.10.0-136.87.0.168.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:perf-5.10.0-136.87.0.168.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:kernel-5.10.0-136.87.0.168.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:kernel-debuginfo-5.10.0-136.87.0.168.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:kernel-source-5.10.0-136.87.0.168.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:kernel-headers-5.10.0-136.87.0.168.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:kernel-tools-5.10.0-136.87.0.168.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:kernel-tools-devel-5.10.0-136.87.0.168.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:python3-perf-5.10.0-136.87.0.168.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:kernel-debugsource-5.10.0-136.87.0.168.oe2203sp1.x86_64"
					],
					"details":"kernel security update",
					"category":"vendor_fix",
					"url":"https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2024-1941"
				}
			],
			"scores":[
				{
					"cvss_v3":{
						"baseSeverity":"MEDIUM",
						"baseScore":5.5,
						"vectorString":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
						"version":"3.1"
					},
					"products":[
						"openEuler-22.03-LTS-SP1:python3-perf-5.10.0-136.87.0.168.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:kernel-debugsource-5.10.0-136.87.0.168.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:kernel-source-5.10.0-136.87.0.168.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:kernel-tools-5.10.0-136.87.0.168.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:kernel-headers-5.10.0-136.87.0.168.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:kernel-tools-devel-5.10.0-136.87.0.168.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:perf-5.10.0-136.87.0.168.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:kernel-devel-5.10.0-136.87.0.168.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:kernel-debuginfo-5.10.0-136.87.0.168.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:kernel-5.10.0-136.87.0.168.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:perf-debuginfo-5.10.0-136.87.0.168.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:python3-perf-debuginfo-5.10.0-136.87.0.168.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:kernel-tools-debuginfo-5.10.0-136.87.0.168.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:kernel-5.10.0-136.87.0.168.oe2203sp1.src",
						"openEuler-22.03-LTS-SP1:python3-perf-debuginfo-5.10.0-136.87.0.168.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:kernel-devel-5.10.0-136.87.0.168.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:kernel-tools-debuginfo-5.10.0-136.87.0.168.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:perf-debuginfo-5.10.0-136.87.0.168.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:perf-5.10.0-136.87.0.168.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:kernel-5.10.0-136.87.0.168.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:kernel-debuginfo-5.10.0-136.87.0.168.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:kernel-source-5.10.0-136.87.0.168.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:kernel-headers-5.10.0-136.87.0.168.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:kernel-tools-5.10.0-136.87.0.168.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:kernel-tools-devel-5.10.0-136.87.0.168.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:python3-perf-5.10.0-136.87.0.168.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:kernel-debugsource-5.10.0-136.87.0.168.oe2203sp1.x86_64"
					]
				}
			],
			"threats":[
				{
					"details":"Medium",
					"category":"impact"
				}
			],
			"title":"CVE-2024-27010"
		},
		{
			"cve":"CVE-2024-34777",
			"notes":[
				{
					"text":"In the Linux kernel, the following vulnerability has been resolved:\n\ndma-mapping: benchmark: fix node id validation\n\nWhile validating node ids in map_benchmark_ioctl(), node_possible() may\nbe provided with invalid argument outside of [0,MAX_NUMNODES-1] range\nleading to:\n\nBUG: KASAN: wild-memory-access in map_benchmark_ioctl (kernel/dma/map_benchmark.c:214)\nRead of size 8 at addr 1fffffff8ccb6398 by task dma_map_benchma/971\nCPU: 7 PID: 971 Comm: dma_map_benchma Not tainted 6.9.0-rc6 #37\nHardware name: QEMU Standard PC (i440FX + PIIX, 1996)\nCall Trace:\n <TASK>\ndump_stack_lvl (lib/dump_stack.c:117)\nkasan_report (mm/kasan/report.c:603)\nkasan_check_range (mm/kasan/generic.c:189)\nvariable_test_bit (arch/x86/include/asm/bitops.h:227) [inline]\narch_test_bit (arch/x86/include/asm/bitops.h:239) [inline]\n_test_bit at (include/asm-generic/bitops/instrumented-non-atomic.h:142) [inline]\nnode_state (include/linux/nodemask.h:423) [inline]\nmap_benchmark_ioctl (kernel/dma/map_benchmark.c:214)\nfull_proxy_unlocked_ioctl (fs/debugfs/file.c:333)\n__x64_sys_ioctl (fs/ioctl.c:890)\ndo_syscall_64 (arch/x86/entry/common.c:83)\nentry_SYSCALL_64_after_hwframe (arch/x86/entry/entry_64.S:130)\n\nCompare node ids with sane bounds first. NUMA_NO_NODE is considered a\nspecial valid case meaning that benchmarking kthreads won't be bound to a\ncpuset of a given node.\n\nFound by Linux Verification Center (linuxtesting.org).",
					"category":"description",
					"title":"Vulnerability Description"
				}
			],
			"product_status":{
				"fixed":[
					"openEuler-22.03-LTS-SP1:python3-perf-5.10.0-136.87.0.168.oe2203sp1.aarch64",
					"openEuler-22.03-LTS-SP1:kernel-debugsource-5.10.0-136.87.0.168.oe2203sp1.aarch64",
					"openEuler-22.03-LTS-SP1:kernel-source-5.10.0-136.87.0.168.oe2203sp1.aarch64",
					"openEuler-22.03-LTS-SP1:kernel-tools-5.10.0-136.87.0.168.oe2203sp1.aarch64",
					"openEuler-22.03-LTS-SP1:kernel-headers-5.10.0-136.87.0.168.oe2203sp1.aarch64",
					"openEuler-22.03-LTS-SP1:kernel-tools-devel-5.10.0-136.87.0.168.oe2203sp1.aarch64",
					"openEuler-22.03-LTS-SP1:perf-5.10.0-136.87.0.168.oe2203sp1.aarch64",
					"openEuler-22.03-LTS-SP1:kernel-devel-5.10.0-136.87.0.168.oe2203sp1.aarch64",
					"openEuler-22.03-LTS-SP1:kernel-debuginfo-5.10.0-136.87.0.168.oe2203sp1.aarch64",
					"openEuler-22.03-LTS-SP1:kernel-5.10.0-136.87.0.168.oe2203sp1.aarch64",
					"openEuler-22.03-LTS-SP1:perf-debuginfo-5.10.0-136.87.0.168.oe2203sp1.aarch64",
					"openEuler-22.03-LTS-SP1:python3-perf-debuginfo-5.10.0-136.87.0.168.oe2203sp1.aarch64",
					"openEuler-22.03-LTS-SP1:kernel-tools-debuginfo-5.10.0-136.87.0.168.oe2203sp1.aarch64",
					"openEuler-22.03-LTS-SP1:kernel-5.10.0-136.87.0.168.oe2203sp1.src",
					"openEuler-22.03-LTS-SP1:python3-perf-debuginfo-5.10.0-136.87.0.168.oe2203sp1.x86_64",
					"openEuler-22.03-LTS-SP1:kernel-devel-5.10.0-136.87.0.168.oe2203sp1.x86_64",
					"openEuler-22.03-LTS-SP1:kernel-tools-debuginfo-5.10.0-136.87.0.168.oe2203sp1.x86_64",
					"openEuler-22.03-LTS-SP1:perf-debuginfo-5.10.0-136.87.0.168.oe2203sp1.x86_64",
					"openEuler-22.03-LTS-SP1:perf-5.10.0-136.87.0.168.oe2203sp1.x86_64",
					"openEuler-22.03-LTS-SP1:kernel-5.10.0-136.87.0.168.oe2203sp1.x86_64",
					"openEuler-22.03-LTS-SP1:kernel-debuginfo-5.10.0-136.87.0.168.oe2203sp1.x86_64",
					"openEuler-22.03-LTS-SP1:kernel-source-5.10.0-136.87.0.168.oe2203sp1.x86_64",
					"openEuler-22.03-LTS-SP1:kernel-headers-5.10.0-136.87.0.168.oe2203sp1.x86_64",
					"openEuler-22.03-LTS-SP1:kernel-tools-5.10.0-136.87.0.168.oe2203sp1.x86_64",
					"openEuler-22.03-LTS-SP1:kernel-tools-devel-5.10.0-136.87.0.168.oe2203sp1.x86_64",
					"openEuler-22.03-LTS-SP1:python3-perf-5.10.0-136.87.0.168.oe2203sp1.x86_64",
					"openEuler-22.03-LTS-SP1:kernel-debugsource-5.10.0-136.87.0.168.oe2203sp1.x86_64"
				]
			},
			"remediations":[
				{
					"product_ids":[
						"openEuler-22.03-LTS-SP1:python3-perf-5.10.0-136.87.0.168.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:kernel-debugsource-5.10.0-136.87.0.168.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:kernel-source-5.10.0-136.87.0.168.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:kernel-tools-5.10.0-136.87.0.168.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:kernel-headers-5.10.0-136.87.0.168.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:kernel-tools-devel-5.10.0-136.87.0.168.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:perf-5.10.0-136.87.0.168.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:kernel-devel-5.10.0-136.87.0.168.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:kernel-debuginfo-5.10.0-136.87.0.168.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:kernel-5.10.0-136.87.0.168.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:perf-debuginfo-5.10.0-136.87.0.168.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:python3-perf-debuginfo-5.10.0-136.87.0.168.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:kernel-tools-debuginfo-5.10.0-136.87.0.168.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:kernel-5.10.0-136.87.0.168.oe2203sp1.src",
						"openEuler-22.03-LTS-SP1:python3-perf-debuginfo-5.10.0-136.87.0.168.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:kernel-devel-5.10.0-136.87.0.168.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:kernel-tools-debuginfo-5.10.0-136.87.0.168.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:perf-debuginfo-5.10.0-136.87.0.168.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:perf-5.10.0-136.87.0.168.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:kernel-5.10.0-136.87.0.168.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:kernel-debuginfo-5.10.0-136.87.0.168.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:kernel-source-5.10.0-136.87.0.168.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:kernel-headers-5.10.0-136.87.0.168.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:kernel-tools-5.10.0-136.87.0.168.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:kernel-tools-devel-5.10.0-136.87.0.168.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:python3-perf-5.10.0-136.87.0.168.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:kernel-debugsource-5.10.0-136.87.0.168.oe2203sp1.x86_64"
					],
					"details":"kernel security update",
					"category":"vendor_fix",
					"url":"https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2024-1941"
				}
			],
			"scores":[
				{
					"cvss_v3":{
						"baseSeverity":"MEDIUM",
						"baseScore":6.1,
						"vectorString":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H",
						"version":"3.1"
					},
					"products":[
						"openEuler-22.03-LTS-SP1:python3-perf-5.10.0-136.87.0.168.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:kernel-debugsource-5.10.0-136.87.0.168.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:kernel-source-5.10.0-136.87.0.168.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:kernel-tools-5.10.0-136.87.0.168.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:kernel-headers-5.10.0-136.87.0.168.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:kernel-tools-devel-5.10.0-136.87.0.168.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:perf-5.10.0-136.87.0.168.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:kernel-devel-5.10.0-136.87.0.168.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:kernel-debuginfo-5.10.0-136.87.0.168.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:kernel-5.10.0-136.87.0.168.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:perf-debuginfo-5.10.0-136.87.0.168.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:python3-perf-debuginfo-5.10.0-136.87.0.168.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:kernel-tools-debuginfo-5.10.0-136.87.0.168.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:kernel-5.10.0-136.87.0.168.oe2203sp1.src",
						"openEuler-22.03-LTS-SP1:python3-perf-debuginfo-5.10.0-136.87.0.168.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:kernel-devel-5.10.0-136.87.0.168.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:kernel-tools-debuginfo-5.10.0-136.87.0.168.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:perf-debuginfo-5.10.0-136.87.0.168.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:perf-5.10.0-136.87.0.168.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:kernel-5.10.0-136.87.0.168.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:kernel-debuginfo-5.10.0-136.87.0.168.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:kernel-source-5.10.0-136.87.0.168.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:kernel-headers-5.10.0-136.87.0.168.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:kernel-tools-5.10.0-136.87.0.168.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:kernel-tools-devel-5.10.0-136.87.0.168.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:python3-perf-5.10.0-136.87.0.168.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:kernel-debugsource-5.10.0-136.87.0.168.oe2203sp1.x86_64"
					]
				}
			],
			"threats":[
				{
					"details":"Medium",
					"category":"impact"
				}
			],
			"title":"CVE-2024-34777"
		},
		{
			"cve":"CVE-2024-35808",
			"notes":[
				{
					"text":"In the Linux kernel, the following vulnerability has been resolved:\n\nmd/dm-raid: don't call md_reap_sync_thread() directly\n\nCurrently md_reap_sync_thread() is called from raid_message() directly\nwithout holding 'reconfig_mutex', this is definitely unsafe because\nmd_reap_sync_thread() can change many fields that is protected by\n'reconfig_mutex'.\n\nHowever, hold 'reconfig_mutex' here is still problematic because this\nwill cause deadlock, for example, commit 130443d60b1b (\"md: refactor\nidle/frozen_sync_thread() to fix deadlock\").\n\nFix this problem by using stop_sync_thread() to unregister sync_thread,\nlike md/raid did.",
					"category":"description",
					"title":"Vulnerability Description"
				}
			],
			"product_status":{
				"fixed":[
					"openEuler-22.03-LTS-SP1:python3-perf-5.10.0-136.87.0.168.oe2203sp1.aarch64",
					"openEuler-22.03-LTS-SP1:kernel-debugsource-5.10.0-136.87.0.168.oe2203sp1.aarch64",
					"openEuler-22.03-LTS-SP1:kernel-source-5.10.0-136.87.0.168.oe2203sp1.aarch64",
					"openEuler-22.03-LTS-SP1:kernel-tools-5.10.0-136.87.0.168.oe2203sp1.aarch64",
					"openEuler-22.03-LTS-SP1:kernel-headers-5.10.0-136.87.0.168.oe2203sp1.aarch64",
					"openEuler-22.03-LTS-SP1:kernel-tools-devel-5.10.0-136.87.0.168.oe2203sp1.aarch64",
					"openEuler-22.03-LTS-SP1:perf-5.10.0-136.87.0.168.oe2203sp1.aarch64",
					"openEuler-22.03-LTS-SP1:kernel-devel-5.10.0-136.87.0.168.oe2203sp1.aarch64",
					"openEuler-22.03-LTS-SP1:kernel-debuginfo-5.10.0-136.87.0.168.oe2203sp1.aarch64",
					"openEuler-22.03-LTS-SP1:kernel-5.10.0-136.87.0.168.oe2203sp1.aarch64",
					"openEuler-22.03-LTS-SP1:perf-debuginfo-5.10.0-136.87.0.168.oe2203sp1.aarch64",
					"openEuler-22.03-LTS-SP1:python3-perf-debuginfo-5.10.0-136.87.0.168.oe2203sp1.aarch64",
					"openEuler-22.03-LTS-SP1:kernel-tools-debuginfo-5.10.0-136.87.0.168.oe2203sp1.aarch64",
					"openEuler-22.03-LTS-SP1:kernel-5.10.0-136.87.0.168.oe2203sp1.src",
					"openEuler-22.03-LTS-SP1:python3-perf-debuginfo-5.10.0-136.87.0.168.oe2203sp1.x86_64",
					"openEuler-22.03-LTS-SP1:kernel-devel-5.10.0-136.87.0.168.oe2203sp1.x86_64",
					"openEuler-22.03-LTS-SP1:kernel-tools-debuginfo-5.10.0-136.87.0.168.oe2203sp1.x86_64",
					"openEuler-22.03-LTS-SP1:perf-debuginfo-5.10.0-136.87.0.168.oe2203sp1.x86_64",
					"openEuler-22.03-LTS-SP1:perf-5.10.0-136.87.0.168.oe2203sp1.x86_64",
					"openEuler-22.03-LTS-SP1:kernel-5.10.0-136.87.0.168.oe2203sp1.x86_64",
					"openEuler-22.03-LTS-SP1:kernel-debuginfo-5.10.0-136.87.0.168.oe2203sp1.x86_64",
					"openEuler-22.03-LTS-SP1:kernel-source-5.10.0-136.87.0.168.oe2203sp1.x86_64",
					"openEuler-22.03-LTS-SP1:kernel-headers-5.10.0-136.87.0.168.oe2203sp1.x86_64",
					"openEuler-22.03-LTS-SP1:kernel-tools-5.10.0-136.87.0.168.oe2203sp1.x86_64",
					"openEuler-22.03-LTS-SP1:kernel-tools-devel-5.10.0-136.87.0.168.oe2203sp1.x86_64",
					"openEuler-22.03-LTS-SP1:python3-perf-5.10.0-136.87.0.168.oe2203sp1.x86_64",
					"openEuler-22.03-LTS-SP1:kernel-debugsource-5.10.0-136.87.0.168.oe2203sp1.x86_64"
				]
			},
			"remediations":[
				{
					"product_ids":[
						"openEuler-22.03-LTS-SP1:python3-perf-5.10.0-136.87.0.168.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:kernel-debugsource-5.10.0-136.87.0.168.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:kernel-source-5.10.0-136.87.0.168.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:kernel-tools-5.10.0-136.87.0.168.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:kernel-headers-5.10.0-136.87.0.168.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:kernel-tools-devel-5.10.0-136.87.0.168.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:perf-5.10.0-136.87.0.168.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:kernel-devel-5.10.0-136.87.0.168.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:kernel-debuginfo-5.10.0-136.87.0.168.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:kernel-5.10.0-136.87.0.168.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:perf-debuginfo-5.10.0-136.87.0.168.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:python3-perf-debuginfo-5.10.0-136.87.0.168.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:kernel-tools-debuginfo-5.10.0-136.87.0.168.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:kernel-5.10.0-136.87.0.168.oe2203sp1.src",
						"openEuler-22.03-LTS-SP1:python3-perf-debuginfo-5.10.0-136.87.0.168.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:kernel-devel-5.10.0-136.87.0.168.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:kernel-tools-debuginfo-5.10.0-136.87.0.168.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:perf-debuginfo-5.10.0-136.87.0.168.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:perf-5.10.0-136.87.0.168.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:kernel-5.10.0-136.87.0.168.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:kernel-debuginfo-5.10.0-136.87.0.168.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:kernel-source-5.10.0-136.87.0.168.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:kernel-headers-5.10.0-136.87.0.168.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:kernel-tools-5.10.0-136.87.0.168.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:kernel-tools-devel-5.10.0-136.87.0.168.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:python3-perf-5.10.0-136.87.0.168.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:kernel-debugsource-5.10.0-136.87.0.168.oe2203sp1.x86_64"
					],
					"details":"kernel security update",
					"category":"vendor_fix",
					"url":"https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2024-1941"
				}
			],
			"scores":[
				{
					"cvss_v3":{
						"baseSeverity":"MEDIUM",
						"baseScore":5.5,
						"vectorString":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
						"version":"3.1"
					},
					"products":[
						"openEuler-22.03-LTS-SP1:python3-perf-5.10.0-136.87.0.168.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:kernel-debugsource-5.10.0-136.87.0.168.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:kernel-source-5.10.0-136.87.0.168.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:kernel-tools-5.10.0-136.87.0.168.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:kernel-headers-5.10.0-136.87.0.168.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:kernel-tools-devel-5.10.0-136.87.0.168.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:perf-5.10.0-136.87.0.168.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:kernel-devel-5.10.0-136.87.0.168.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:kernel-debuginfo-5.10.0-136.87.0.168.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:kernel-5.10.0-136.87.0.168.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:perf-debuginfo-5.10.0-136.87.0.168.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:python3-perf-debuginfo-5.10.0-136.87.0.168.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:kernel-tools-debuginfo-5.10.0-136.87.0.168.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:kernel-5.10.0-136.87.0.168.oe2203sp1.src",
						"openEuler-22.03-LTS-SP1:python3-perf-debuginfo-5.10.0-136.87.0.168.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:kernel-devel-5.10.0-136.87.0.168.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:kernel-tools-debuginfo-5.10.0-136.87.0.168.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:perf-debuginfo-5.10.0-136.87.0.168.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:perf-5.10.0-136.87.0.168.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:kernel-5.10.0-136.87.0.168.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:kernel-debuginfo-5.10.0-136.87.0.168.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:kernel-source-5.10.0-136.87.0.168.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:kernel-headers-5.10.0-136.87.0.168.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:kernel-tools-5.10.0-136.87.0.168.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:kernel-tools-devel-5.10.0-136.87.0.168.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:python3-perf-5.10.0-136.87.0.168.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:kernel-debugsource-5.10.0-136.87.0.168.oe2203sp1.x86_64"
					]
				}
			],
			"threats":[
				{
					"details":"Medium",
					"category":"impact"
				}
			],
			"title":"CVE-2024-35808"
		},
		{
			"cve":"CVE-2024-35837",
			"notes":[
				{
					"text":"In the Linux kernel, the following vulnerability has been resolved:\n\nnet: mvpp2: clear BM pool before initialization\n\nRegister value persist after booting the kernel using\nkexec which results in kernel panic. Thus clear the\nBM pool registers before initialisation to fix the issue.",
					"category":"description",
					"title":"Vulnerability Description"
				}
			],
			"product_status":{
				"fixed":[
					"openEuler-22.03-LTS-SP1:python3-perf-5.10.0-136.87.0.168.oe2203sp1.aarch64",
					"openEuler-22.03-LTS-SP1:kernel-debugsource-5.10.0-136.87.0.168.oe2203sp1.aarch64",
					"openEuler-22.03-LTS-SP1:kernel-source-5.10.0-136.87.0.168.oe2203sp1.aarch64",
					"openEuler-22.03-LTS-SP1:kernel-tools-5.10.0-136.87.0.168.oe2203sp1.aarch64",
					"openEuler-22.03-LTS-SP1:kernel-headers-5.10.0-136.87.0.168.oe2203sp1.aarch64",
					"openEuler-22.03-LTS-SP1:kernel-tools-devel-5.10.0-136.87.0.168.oe2203sp1.aarch64",
					"openEuler-22.03-LTS-SP1:perf-5.10.0-136.87.0.168.oe2203sp1.aarch64",
					"openEuler-22.03-LTS-SP1:kernel-devel-5.10.0-136.87.0.168.oe2203sp1.aarch64",
					"openEuler-22.03-LTS-SP1:kernel-debuginfo-5.10.0-136.87.0.168.oe2203sp1.aarch64",
					"openEuler-22.03-LTS-SP1:kernel-5.10.0-136.87.0.168.oe2203sp1.aarch64",
					"openEuler-22.03-LTS-SP1:perf-debuginfo-5.10.0-136.87.0.168.oe2203sp1.aarch64",
					"openEuler-22.03-LTS-SP1:python3-perf-debuginfo-5.10.0-136.87.0.168.oe2203sp1.aarch64",
					"openEuler-22.03-LTS-SP1:kernel-tools-debuginfo-5.10.0-136.87.0.168.oe2203sp1.aarch64",
					"openEuler-22.03-LTS-SP1:kernel-5.10.0-136.87.0.168.oe2203sp1.src",
					"openEuler-22.03-LTS-SP1:python3-perf-debuginfo-5.10.0-136.87.0.168.oe2203sp1.x86_64",
					"openEuler-22.03-LTS-SP1:kernel-devel-5.10.0-136.87.0.168.oe2203sp1.x86_64",
					"openEuler-22.03-LTS-SP1:kernel-tools-debuginfo-5.10.0-136.87.0.168.oe2203sp1.x86_64",
					"openEuler-22.03-LTS-SP1:perf-debuginfo-5.10.0-136.87.0.168.oe2203sp1.x86_64",
					"openEuler-22.03-LTS-SP1:perf-5.10.0-136.87.0.168.oe2203sp1.x86_64",
					"openEuler-22.03-LTS-SP1:kernel-5.10.0-136.87.0.168.oe2203sp1.x86_64",
					"openEuler-22.03-LTS-SP1:kernel-debuginfo-5.10.0-136.87.0.168.oe2203sp1.x86_64",
					"openEuler-22.03-LTS-SP1:kernel-source-5.10.0-136.87.0.168.oe2203sp1.x86_64",
					"openEuler-22.03-LTS-SP1:kernel-headers-5.10.0-136.87.0.168.oe2203sp1.x86_64",
					"openEuler-22.03-LTS-SP1:kernel-tools-5.10.0-136.87.0.168.oe2203sp1.x86_64",
					"openEuler-22.03-LTS-SP1:kernel-tools-devel-5.10.0-136.87.0.168.oe2203sp1.x86_64",
					"openEuler-22.03-LTS-SP1:python3-perf-5.10.0-136.87.0.168.oe2203sp1.x86_64",
					"openEuler-22.03-LTS-SP1:kernel-debugsource-5.10.0-136.87.0.168.oe2203sp1.x86_64"
				]
			},
			"remediations":[
				{
					"product_ids":[
						"openEuler-22.03-LTS-SP1:python3-perf-5.10.0-136.87.0.168.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:kernel-debugsource-5.10.0-136.87.0.168.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:kernel-source-5.10.0-136.87.0.168.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:kernel-tools-5.10.0-136.87.0.168.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:kernel-headers-5.10.0-136.87.0.168.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:kernel-tools-devel-5.10.0-136.87.0.168.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:perf-5.10.0-136.87.0.168.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:kernel-devel-5.10.0-136.87.0.168.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:kernel-debuginfo-5.10.0-136.87.0.168.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:kernel-5.10.0-136.87.0.168.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:perf-debuginfo-5.10.0-136.87.0.168.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:python3-perf-debuginfo-5.10.0-136.87.0.168.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:kernel-tools-debuginfo-5.10.0-136.87.0.168.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:kernel-5.10.0-136.87.0.168.oe2203sp1.src",
						"openEuler-22.03-LTS-SP1:python3-perf-debuginfo-5.10.0-136.87.0.168.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:kernel-devel-5.10.0-136.87.0.168.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:kernel-tools-debuginfo-5.10.0-136.87.0.168.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:perf-debuginfo-5.10.0-136.87.0.168.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:perf-5.10.0-136.87.0.168.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:kernel-5.10.0-136.87.0.168.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:kernel-debuginfo-5.10.0-136.87.0.168.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:kernel-source-5.10.0-136.87.0.168.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:kernel-headers-5.10.0-136.87.0.168.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:kernel-tools-5.10.0-136.87.0.168.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:kernel-tools-devel-5.10.0-136.87.0.168.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:python3-perf-5.10.0-136.87.0.168.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:kernel-debugsource-5.10.0-136.87.0.168.oe2203sp1.x86_64"
					],
					"details":"kernel security update",
					"category":"vendor_fix",
					"url":"https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2024-1941"
				}
			],
			"scores":[
				{
					"cvss_v3":{
						"baseSeverity":"MEDIUM",
						"baseScore":5.5,
						"vectorString":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
						"version":"3.1"
					},
					"products":[
						"openEuler-22.03-LTS-SP1:python3-perf-5.10.0-136.87.0.168.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:kernel-debugsource-5.10.0-136.87.0.168.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:kernel-source-5.10.0-136.87.0.168.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:kernel-tools-5.10.0-136.87.0.168.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:kernel-headers-5.10.0-136.87.0.168.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:kernel-tools-devel-5.10.0-136.87.0.168.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:perf-5.10.0-136.87.0.168.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:kernel-devel-5.10.0-136.87.0.168.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:kernel-debuginfo-5.10.0-136.87.0.168.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:kernel-5.10.0-136.87.0.168.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:perf-debuginfo-5.10.0-136.87.0.168.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:python3-perf-debuginfo-5.10.0-136.87.0.168.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:kernel-tools-debuginfo-5.10.0-136.87.0.168.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:kernel-5.10.0-136.87.0.168.oe2203sp1.src",
						"openEuler-22.03-LTS-SP1:python3-perf-debuginfo-5.10.0-136.87.0.168.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:kernel-devel-5.10.0-136.87.0.168.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:kernel-tools-debuginfo-5.10.0-136.87.0.168.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:perf-debuginfo-5.10.0-136.87.0.168.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:perf-5.10.0-136.87.0.168.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:kernel-5.10.0-136.87.0.168.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:kernel-debuginfo-5.10.0-136.87.0.168.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:kernel-source-5.10.0-136.87.0.168.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:kernel-headers-5.10.0-136.87.0.168.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:kernel-tools-5.10.0-136.87.0.168.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:kernel-tools-devel-5.10.0-136.87.0.168.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:python3-perf-5.10.0-136.87.0.168.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:kernel-debugsource-5.10.0-136.87.0.168.oe2203sp1.x86_64"
					]
				}
			],
			"threats":[
				{
					"details":"Medium",
					"category":"impact"
				}
			],
			"title":"CVE-2024-35837"
		},
		{
			"cve":"CVE-2024-35899",
			"notes":[
				{
					"text":"In the Linux kernel, the following vulnerability has been resolved:\n\nnetfilter: nf_tables: flush pending destroy work before exit_net release\n\nSimilar to 2c9f0293280e (\"netfilter: nf_tables: flush pending destroy\nwork before netlink notifier\") to address a race between exit_net and\nthe destroy workqueue.\n\nThe trace below shows an element to be released via destroy workqueue\nwhile exit_net path (triggered via module removal) has already released\nthe set that is used in such transaction.\n\n[ 1360.547789] BUG: KASAN: slab-use-after-free in nf_tables_trans_destroy_work+0x3f5/0x590 [nf_tables]\n[ 1360.547861] Read of size 8 at addr ffff888140500cc0 by task kworker/4:1/152465\n[ 1360.547870] CPU: 4 PID: 152465 Comm: kworker/4:1 Not tainted 6.8.0+ #359\n[ 1360.547882] Workqueue: events nf_tables_trans_destroy_work [nf_tables]\n[ 1360.547984] Call Trace:\n[ 1360.547991]  <TASK>\n[ 1360.547998]  dump_stack_lvl+0x53/0x70\n[ 1360.548014]  print_report+0xc4/0x610\n[ 1360.548026]  ? __virt_addr_valid+0xba/0x160\n[ 1360.548040]  ? __pfx__raw_spin_lock_irqsave+0x10/0x10\n[ 1360.548054]  ? nf_tables_trans_destroy_work+0x3f5/0x590 [nf_tables]\n[ 1360.548176]  kasan_report+0xae/0xe0\n[ 1360.548189]  ? nf_tables_trans_destroy_work+0x3f5/0x590 [nf_tables]\n[ 1360.548312]  nf_tables_trans_destroy_work+0x3f5/0x590 [nf_tables]\n[ 1360.548447]  ? __pfx_nf_tables_trans_destroy_work+0x10/0x10 [nf_tables]\n[ 1360.548577]  ? _raw_spin_unlock_irq+0x18/0x30\n[ 1360.548591]  process_one_work+0x2f1/0x670\n[ 1360.548610]  worker_thread+0x4d3/0x760\n[ 1360.548627]  ? __pfx_worker_thread+0x10/0x10\n[ 1360.548640]  kthread+0x16b/0x1b0\n[ 1360.548653]  ? __pfx_kthread+0x10/0x10\n[ 1360.548665]  ret_from_fork+0x2f/0x50\n[ 1360.548679]  ? __pfx_kthread+0x10/0x10\n[ 1360.548690]  ret_from_fork_asm+0x1a/0x30\n[ 1360.548707]  </TASK>\n\n[ 1360.548719] Allocated by task 192061:\n[ 1360.548726]  kasan_save_stack+0x20/0x40\n[ 1360.548739]  kasan_save_track+0x14/0x30\n[ 1360.548750]  __kasan_kmalloc+0x8f/0xa0\n[ 1360.548760]  __kmalloc_node+0x1f1/0x450\n[ 1360.548771]  nf_tables_newset+0x10c7/0x1b50 [nf_tables]\n[ 1360.548883]  nfnetlink_rcv_batch+0xbc4/0xdc0 [nfnetlink]\n[ 1360.548909]  nfnetlink_rcv+0x1a8/0x1e0 [nfnetlink]\n[ 1360.548927]  netlink_unicast+0x367/0x4f0\n[ 1360.548935]  netlink_sendmsg+0x34b/0x610\n[ 1360.548944]  ____sys_sendmsg+0x4d4/0x510\n[ 1360.548953]  ___sys_sendmsg+0xc9/0x120\n[ 1360.548961]  __sys_sendmsg+0xbe/0x140\n[ 1360.548971]  do_syscall_64+0x55/0x120\n[ 1360.548982]  entry_SYSCALL_64_after_hwframe+0x55/0x5d\n\n[ 1360.548994] Freed by task 192222:\n[ 1360.548999]  kasan_save_stack+0x20/0x40\n[ 1360.549009]  kasan_save_track+0x14/0x30\n[ 1360.549019]  kasan_save_free_info+0x3b/0x60\n[ 1360.549028]  poison_slab_object+0x100/0x180\n[ 1360.549036]  __kasan_slab_free+0x14/0x30\n[ 1360.549042]  kfree+0xb6/0x260\n[ 1360.549049]  __nft_release_table+0x473/0x6a0 [nf_tables]\n[ 1360.549131]  nf_tables_exit_net+0x170/0x240 [nf_tables]\n[ 1360.549221]  ops_exit_list+0x50/0xa0\n[ 1360.549229]  free_exit_list+0x101/0x140\n[ 1360.549236]  unregister_pernet_operations+0x107/0x160\n[ 1360.549245]  unregister_pernet_subsys+0x1c/0x30\n[ 1360.549254]  nf_tables_module_exit+0x43/0x80 [nf_tables]\n[ 1360.549345]  __do_sys_delete_module+0x253/0x370\n[ 1360.549352]  do_syscall_64+0x55/0x120\n[ 1360.549360]  entry_SYSCALL_64_after_hwframe+0x55/0x5d\n\n(gdb) list *__nft_release_table+0x473\n0x1e033 is in __nft_release_table (net/netfilter/nf_tables_api.c:11354).\n11349           list_for_each_entry_safe(flowtable, nf, &table->flowtables, list) {\n11350                   list_del(&flowtable->list);\n11351                   nft_use_dec(&table->use);\n11352                   nf_tables_flowtable_destroy(flowtable);\n11353           }\n11354           list_for_each_entry_safe(set, ns, &table->sets, list) {\n11355                   list_del(&set->list);\n11356                   nft_use_dec(&table->use);\n11357                   if (set->flags & (NFT_SET_MAP | NFT_SET_OBJECT))\n11358                           nft_map_deactivat\n---truncated---",
					"category":"description",
					"title":"Vulnerability Description"
				}
			],
			"product_status":{
				"fixed":[
					"openEuler-22.03-LTS-SP1:python3-perf-5.10.0-136.87.0.168.oe2203sp1.aarch64",
					"openEuler-22.03-LTS-SP1:kernel-debugsource-5.10.0-136.87.0.168.oe2203sp1.aarch64",
					"openEuler-22.03-LTS-SP1:kernel-source-5.10.0-136.87.0.168.oe2203sp1.aarch64",
					"openEuler-22.03-LTS-SP1:kernel-tools-5.10.0-136.87.0.168.oe2203sp1.aarch64",
					"openEuler-22.03-LTS-SP1:kernel-headers-5.10.0-136.87.0.168.oe2203sp1.aarch64",
					"openEuler-22.03-LTS-SP1:kernel-tools-devel-5.10.0-136.87.0.168.oe2203sp1.aarch64",
					"openEuler-22.03-LTS-SP1:perf-5.10.0-136.87.0.168.oe2203sp1.aarch64",
					"openEuler-22.03-LTS-SP1:kernel-devel-5.10.0-136.87.0.168.oe2203sp1.aarch64",
					"openEuler-22.03-LTS-SP1:kernel-debuginfo-5.10.0-136.87.0.168.oe2203sp1.aarch64",
					"openEuler-22.03-LTS-SP1:kernel-5.10.0-136.87.0.168.oe2203sp1.aarch64",
					"openEuler-22.03-LTS-SP1:perf-debuginfo-5.10.0-136.87.0.168.oe2203sp1.aarch64",
					"openEuler-22.03-LTS-SP1:python3-perf-debuginfo-5.10.0-136.87.0.168.oe2203sp1.aarch64",
					"openEuler-22.03-LTS-SP1:kernel-tools-debuginfo-5.10.0-136.87.0.168.oe2203sp1.aarch64",
					"openEuler-22.03-LTS-SP1:kernel-5.10.0-136.87.0.168.oe2203sp1.src",
					"openEuler-22.03-LTS-SP1:python3-perf-debuginfo-5.10.0-136.87.0.168.oe2203sp1.x86_64",
					"openEuler-22.03-LTS-SP1:kernel-devel-5.10.0-136.87.0.168.oe2203sp1.x86_64",
					"openEuler-22.03-LTS-SP1:kernel-tools-debuginfo-5.10.0-136.87.0.168.oe2203sp1.x86_64",
					"openEuler-22.03-LTS-SP1:perf-debuginfo-5.10.0-136.87.0.168.oe2203sp1.x86_64",
					"openEuler-22.03-LTS-SP1:perf-5.10.0-136.87.0.168.oe2203sp1.x86_64",
					"openEuler-22.03-LTS-SP1:kernel-5.10.0-136.87.0.168.oe2203sp1.x86_64",
					"openEuler-22.03-LTS-SP1:kernel-debuginfo-5.10.0-136.87.0.168.oe2203sp1.x86_64",
					"openEuler-22.03-LTS-SP1:kernel-source-5.10.0-136.87.0.168.oe2203sp1.x86_64",
					"openEuler-22.03-LTS-SP1:kernel-headers-5.10.0-136.87.0.168.oe2203sp1.x86_64",
					"openEuler-22.03-LTS-SP1:kernel-tools-5.10.0-136.87.0.168.oe2203sp1.x86_64",
					"openEuler-22.03-LTS-SP1:kernel-tools-devel-5.10.0-136.87.0.168.oe2203sp1.x86_64",
					"openEuler-22.03-LTS-SP1:python3-perf-5.10.0-136.87.0.168.oe2203sp1.x86_64",
					"openEuler-22.03-LTS-SP1:kernel-debugsource-5.10.0-136.87.0.168.oe2203sp1.x86_64"
				]
			},
			"remediations":[
				{
					"product_ids":[
						"openEuler-22.03-LTS-SP1:python3-perf-5.10.0-136.87.0.168.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:kernel-debugsource-5.10.0-136.87.0.168.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:kernel-source-5.10.0-136.87.0.168.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:kernel-tools-5.10.0-136.87.0.168.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:kernel-headers-5.10.0-136.87.0.168.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:kernel-tools-devel-5.10.0-136.87.0.168.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:perf-5.10.0-136.87.0.168.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:kernel-devel-5.10.0-136.87.0.168.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:kernel-debuginfo-5.10.0-136.87.0.168.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:kernel-5.10.0-136.87.0.168.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:perf-debuginfo-5.10.0-136.87.0.168.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:python3-perf-debuginfo-5.10.0-136.87.0.168.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:kernel-tools-debuginfo-5.10.0-136.87.0.168.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:kernel-5.10.0-136.87.0.168.oe2203sp1.src",
						"openEuler-22.03-LTS-SP1:python3-perf-debuginfo-5.10.0-136.87.0.168.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:kernel-devel-5.10.0-136.87.0.168.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:kernel-tools-debuginfo-5.10.0-136.87.0.168.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:perf-debuginfo-5.10.0-136.87.0.168.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:perf-5.10.0-136.87.0.168.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:kernel-5.10.0-136.87.0.168.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:kernel-debuginfo-5.10.0-136.87.0.168.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:kernel-source-5.10.0-136.87.0.168.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:kernel-headers-5.10.0-136.87.0.168.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:kernel-tools-5.10.0-136.87.0.168.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:kernel-tools-devel-5.10.0-136.87.0.168.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:python3-perf-5.10.0-136.87.0.168.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:kernel-debugsource-5.10.0-136.87.0.168.oe2203sp1.x86_64"
					],
					"details":"kernel security update",
					"category":"vendor_fix",
					"url":"https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2024-1941"
				}
			],
			"scores":[
				{
					"cvss_v3":{
						"baseSeverity":"MEDIUM",
						"baseScore":6.1,
						"vectorString":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H",
						"version":"3.1"
					},
					"products":[
						"openEuler-22.03-LTS-SP1:python3-perf-5.10.0-136.87.0.168.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:kernel-debugsource-5.10.0-136.87.0.168.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:kernel-source-5.10.0-136.87.0.168.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:kernel-tools-5.10.0-136.87.0.168.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:kernel-headers-5.10.0-136.87.0.168.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:kernel-tools-devel-5.10.0-136.87.0.168.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:perf-5.10.0-136.87.0.168.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:kernel-devel-5.10.0-136.87.0.168.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:kernel-debuginfo-5.10.0-136.87.0.168.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:kernel-5.10.0-136.87.0.168.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:perf-debuginfo-5.10.0-136.87.0.168.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:python3-perf-debuginfo-5.10.0-136.87.0.168.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:kernel-tools-debuginfo-5.10.0-136.87.0.168.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:kernel-5.10.0-136.87.0.168.oe2203sp1.src",
						"openEuler-22.03-LTS-SP1:python3-perf-debuginfo-5.10.0-136.87.0.168.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:kernel-devel-5.10.0-136.87.0.168.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:kernel-tools-debuginfo-5.10.0-136.87.0.168.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:perf-debuginfo-5.10.0-136.87.0.168.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:perf-5.10.0-136.87.0.168.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:kernel-5.10.0-136.87.0.168.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:kernel-debuginfo-5.10.0-136.87.0.168.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:kernel-source-5.10.0-136.87.0.168.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:kernel-headers-5.10.0-136.87.0.168.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:kernel-tools-5.10.0-136.87.0.168.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:kernel-tools-devel-5.10.0-136.87.0.168.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:python3-perf-5.10.0-136.87.0.168.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:kernel-debugsource-5.10.0-136.87.0.168.oe2203sp1.x86_64"
					]
				}
			],
			"threats":[
				{
					"details":"Medium",
					"category":"impact"
				}
			],
			"title":"CVE-2024-35899"
		},
		{
			"cve":"CVE-2024-35931",
			"notes":[
				{
					"text":"In the Linux kernel, the following vulnerability has been resolved:\n\ndrm/amdgpu: Skip do PCI error slot reset during RAS recovery\n\nWhy:\n    The PCI error slot reset maybe triggered after inject ue to UMC multi times, this\n    caused system hang.\n    [  557.371857] amdgpu 0000:af:00.0: amdgpu: GPU reset succeeded, trying to resume\n    [  557.373718] [drm] PCIE GART of 512M enabled.\n    [  557.373722] [drm] PTB located at 0x0000031FED700000\n    [  557.373788] [drm] VRAM is lost due to GPU reset!\n    [  557.373789] [drm] PSP is resuming...\n    [  557.547012] mlx5_core 0000:55:00.0: mlx5_pci_err_detected Device state = 1 pci_status: 0. Exit, result = 3, need reset\n    [  557.547067] [drm] PCI error: detected callback, state(1)!!\n    [  557.547069] [drm] No support for XGMI hive yet...\n    [  557.548125] mlx5_core 0000:55:00.0: mlx5_pci_slot_reset Device state = 1 pci_status: 0. Enter\n    [  557.607763] mlx5_core 0000:55:00.0: wait vital counter value 0x16b5b after 1 iterations\n    [  557.607777] mlx5_core 0000:55:00.0: mlx5_pci_slot_reset Device state = 1 pci_status: 1. Exit, err = 0, result = 5, recovered\n    [  557.610492] [drm] PCI error: slot reset callback!!\n    ...\n    [  560.689382] amdgpu 0000:3f:00.0: amdgpu: GPU reset(2) succeeded!\n    [  560.689546] amdgpu 0000:5a:00.0: amdgpu: GPU reset(2) succeeded!\n    [  560.689562] general protection fault, probably for non-canonical address 0x5f080b54534f611f: 0000 [#1] SMP NOPTI\n    [  560.701008] CPU: 16 PID: 2361 Comm: kworker/u448:9 Tainted: G           OE     5.15.0-91-generic #101-Ubuntu\n    [  560.712057] Hardware name: Microsoft C278A/C278A, BIOS C2789.5.BS.1C11.AG.1 11/08/2023\n    [  560.720959] Workqueue: amdgpu-reset-hive amdgpu_ras_do_recovery [amdgpu]\n    [  560.728887] RIP: 0010:amdgpu_device_gpu_recover.cold+0xbf1/0xcf5 [amdgpu]\n    [  560.736891] Code: ff 41 89 c6 e9 1b ff ff ff 44 0f b6 45 b0 e9 4f ff ff ff be 01 00 00 00 4c 89 e7 e8 76 c9 8b ff 44 0f b6 45 b0 e9 3c fd ff ff <48> 83 ba 18 02 00 00 00 0f 84 6a f8 ff ff 48 8d 7a 78 be 01 00 00\n    [  560.757967] RSP: 0018:ffa0000032e53d80 EFLAGS: 00010202\n    [  560.763848] RAX: ffa00000001dfd10 RBX: ffa0000000197090 RCX: ffa0000032e53db0\n    [  560.771856] RDX: 5f080b54534f5f07 RSI: 0000000000000000 RDI: ff11000128100010\n    [  560.779867] RBP: ffa0000032e53df0 R08: 0000000000000000 R09: ffffffffffe77f08\n    [  560.787879] R10: 0000000000ffff0a R11: 0000000000000001 R12: 0000000000000000\n    [  560.795889] R13: ffa0000032e53e00 R14: 0000000000000000 R15: 0000000000000000\n    [  560.803889] FS:  0000000000000000(0000) GS:ff11007e7e800000(0000) knlGS:0000000000000000\n    [  560.812973] CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033\n    [  560.819422] CR2: 000055a04c118e68 CR3: 0000000007410005 CR4: 0000000000771ee0\n    [  560.827433] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000\n    [  560.835433] DR3: 0000000000000000 DR6: 00000000fffe07f0 DR7: 0000000000000400\n    [  560.843444] PKRU: 55555554\n    [  560.846480] Call Trace:\n    [  560.849225]  <TASK>\n    [  560.851580]  ? show_trace_log_lvl+0x1d6/0x2ea\n    [  560.856488]  ? show_trace_log_lvl+0x1d6/0x2ea\n    [  560.861379]  ? amdgpu_ras_do_recovery+0x1b2/0x210 [amdgpu]\n    [  560.867778]  ? show_regs.part.0+0x23/0x29\n    [  560.872293]  ? __die_body.cold+0x8/0xd\n    [  560.876502]  ? die_addr+0x3e/0x60\n    [  560.880238]  ? exc_general_protection+0x1c5/0x410\n    [  560.885532]  ? asm_exc_general_protection+0x27/0x30\n    [  560.891025]  ? amdgpu_device_gpu_recover.cold+0xbf1/0xcf5 [amdgpu]\n    [  560.898323]  amdgpu_ras_do_recovery+0x1b2/0x210 [amdgpu]\n    [  560.904520]  process_one_work+0x228/0x3d0\nHow:\n    In RAS recovery, mode-1 reset is issued from RAS fatal error handling and expected\n    all the nodes in a hive to be reset. no need to issue another mode-1 during this procedure.",
					"category":"description",
					"title":"Vulnerability Description"
				}
			],
			"product_status":{
				"fixed":[
					"openEuler-22.03-LTS-SP1:python3-perf-5.10.0-136.87.0.168.oe2203sp1.aarch64",
					"openEuler-22.03-LTS-SP1:kernel-debugsource-5.10.0-136.87.0.168.oe2203sp1.aarch64",
					"openEuler-22.03-LTS-SP1:kernel-source-5.10.0-136.87.0.168.oe2203sp1.aarch64",
					"openEuler-22.03-LTS-SP1:kernel-tools-5.10.0-136.87.0.168.oe2203sp1.aarch64",
					"openEuler-22.03-LTS-SP1:kernel-headers-5.10.0-136.87.0.168.oe2203sp1.aarch64",
					"openEuler-22.03-LTS-SP1:kernel-tools-devel-5.10.0-136.87.0.168.oe2203sp1.aarch64",
					"openEuler-22.03-LTS-SP1:perf-5.10.0-136.87.0.168.oe2203sp1.aarch64",
					"openEuler-22.03-LTS-SP1:kernel-devel-5.10.0-136.87.0.168.oe2203sp1.aarch64",
					"openEuler-22.03-LTS-SP1:kernel-debuginfo-5.10.0-136.87.0.168.oe2203sp1.aarch64",
					"openEuler-22.03-LTS-SP1:kernel-5.10.0-136.87.0.168.oe2203sp1.aarch64",
					"openEuler-22.03-LTS-SP1:perf-debuginfo-5.10.0-136.87.0.168.oe2203sp1.aarch64",
					"openEuler-22.03-LTS-SP1:python3-perf-debuginfo-5.10.0-136.87.0.168.oe2203sp1.aarch64",
					"openEuler-22.03-LTS-SP1:kernel-tools-debuginfo-5.10.0-136.87.0.168.oe2203sp1.aarch64",
					"openEuler-22.03-LTS-SP1:kernel-5.10.0-136.87.0.168.oe2203sp1.src",
					"openEuler-22.03-LTS-SP1:python3-perf-debuginfo-5.10.0-136.87.0.168.oe2203sp1.x86_64",
					"openEuler-22.03-LTS-SP1:kernel-devel-5.10.0-136.87.0.168.oe2203sp1.x86_64",
					"openEuler-22.03-LTS-SP1:kernel-tools-debuginfo-5.10.0-136.87.0.168.oe2203sp1.x86_64",
					"openEuler-22.03-LTS-SP1:perf-debuginfo-5.10.0-136.87.0.168.oe2203sp1.x86_64",
					"openEuler-22.03-LTS-SP1:perf-5.10.0-136.87.0.168.oe2203sp1.x86_64",
					"openEuler-22.03-LTS-SP1:kernel-5.10.0-136.87.0.168.oe2203sp1.x86_64",
					"openEuler-22.03-LTS-SP1:kernel-debuginfo-5.10.0-136.87.0.168.oe2203sp1.x86_64",
					"openEuler-22.03-LTS-SP1:kernel-source-5.10.0-136.87.0.168.oe2203sp1.x86_64",
					"openEuler-22.03-LTS-SP1:kernel-headers-5.10.0-136.87.0.168.oe2203sp1.x86_64",
					"openEuler-22.03-LTS-SP1:kernel-tools-5.10.0-136.87.0.168.oe2203sp1.x86_64",
					"openEuler-22.03-LTS-SP1:kernel-tools-devel-5.10.0-136.87.0.168.oe2203sp1.x86_64",
					"openEuler-22.03-LTS-SP1:python3-perf-5.10.0-136.87.0.168.oe2203sp1.x86_64",
					"openEuler-22.03-LTS-SP1:kernel-debugsource-5.10.0-136.87.0.168.oe2203sp1.x86_64"
				]
			},
			"remediations":[
				{
					"product_ids":[
						"openEuler-22.03-LTS-SP1:python3-perf-5.10.0-136.87.0.168.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:kernel-debugsource-5.10.0-136.87.0.168.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:kernel-source-5.10.0-136.87.0.168.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:kernel-tools-5.10.0-136.87.0.168.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:kernel-headers-5.10.0-136.87.0.168.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:kernel-tools-devel-5.10.0-136.87.0.168.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:perf-5.10.0-136.87.0.168.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:kernel-devel-5.10.0-136.87.0.168.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:kernel-debuginfo-5.10.0-136.87.0.168.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:kernel-5.10.0-136.87.0.168.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:perf-debuginfo-5.10.0-136.87.0.168.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:python3-perf-debuginfo-5.10.0-136.87.0.168.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:kernel-tools-debuginfo-5.10.0-136.87.0.168.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:kernel-5.10.0-136.87.0.168.oe2203sp1.src",
						"openEuler-22.03-LTS-SP1:python3-perf-debuginfo-5.10.0-136.87.0.168.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:kernel-devel-5.10.0-136.87.0.168.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:kernel-tools-debuginfo-5.10.0-136.87.0.168.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:perf-debuginfo-5.10.0-136.87.0.168.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:perf-5.10.0-136.87.0.168.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:kernel-5.10.0-136.87.0.168.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:kernel-debuginfo-5.10.0-136.87.0.168.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:kernel-source-5.10.0-136.87.0.168.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:kernel-headers-5.10.0-136.87.0.168.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:kernel-tools-5.10.0-136.87.0.168.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:kernel-tools-devel-5.10.0-136.87.0.168.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:python3-perf-5.10.0-136.87.0.168.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:kernel-debugsource-5.10.0-136.87.0.168.oe2203sp1.x86_64"
					],
					"details":"kernel security update",
					"category":"vendor_fix",
					"url":"https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2024-1941"
				}
			],
			"scores":[
				{
					"cvss_v3":{
						"baseSeverity":"MEDIUM",
						"baseScore":5.5,
						"vectorString":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
						"version":"3.1"
					},
					"products":[
						"openEuler-22.03-LTS-SP1:python3-perf-5.10.0-136.87.0.168.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:kernel-debugsource-5.10.0-136.87.0.168.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:kernel-source-5.10.0-136.87.0.168.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:kernel-tools-5.10.0-136.87.0.168.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:kernel-headers-5.10.0-136.87.0.168.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:kernel-tools-devel-5.10.0-136.87.0.168.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:perf-5.10.0-136.87.0.168.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:kernel-devel-5.10.0-136.87.0.168.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:kernel-debuginfo-5.10.0-136.87.0.168.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:kernel-5.10.0-136.87.0.168.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:perf-debuginfo-5.10.0-136.87.0.168.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:python3-perf-debuginfo-5.10.0-136.87.0.168.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:kernel-tools-debuginfo-5.10.0-136.87.0.168.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:kernel-5.10.0-136.87.0.168.oe2203sp1.src",
						"openEuler-22.03-LTS-SP1:python3-perf-debuginfo-5.10.0-136.87.0.168.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:kernel-devel-5.10.0-136.87.0.168.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:kernel-tools-debuginfo-5.10.0-136.87.0.168.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:perf-debuginfo-5.10.0-136.87.0.168.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:perf-5.10.0-136.87.0.168.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:kernel-5.10.0-136.87.0.168.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:kernel-debuginfo-5.10.0-136.87.0.168.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:kernel-source-5.10.0-136.87.0.168.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:kernel-headers-5.10.0-136.87.0.168.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:kernel-tools-5.10.0-136.87.0.168.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:kernel-tools-devel-5.10.0-136.87.0.168.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:python3-perf-5.10.0-136.87.0.168.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:kernel-debugsource-5.10.0-136.87.0.168.oe2203sp1.x86_64"
					]
				}
			],
			"threats":[
				{
					"details":"Medium",
					"category":"impact"
				}
			],
			"title":"CVE-2024-35931"
		},
		{
			"cve":"CVE-2024-36923",
			"notes":[
				{
					"text":"In the Linux kernel, the following vulnerability has been resolved:\n\nfs/9p: fix uninitialized values during inode evict\n\nIf an iget fails due to not being able to retrieve information\nfrom the server then the inode structure is only partially\ninitialized.  When the inode gets evicted, references to\nuninitialized structures (like fscache cookies) were being\nmade.\n\nThis patch checks for a bad_inode before doing anything other\nthan clearing the inode from the cache.  Since the inode is\nbad, it shouldn't have any state associated with it that needs\nto be written back (and there really isn't a way to complete\nthose anyways).",
					"category":"description",
					"title":"Vulnerability Description"
				}
			],
			"product_status":{
				"fixed":[
					"openEuler-22.03-LTS-SP1:python3-perf-5.10.0-136.87.0.168.oe2203sp1.aarch64",
					"openEuler-22.03-LTS-SP1:kernel-debugsource-5.10.0-136.87.0.168.oe2203sp1.aarch64",
					"openEuler-22.03-LTS-SP1:kernel-source-5.10.0-136.87.0.168.oe2203sp1.aarch64",
					"openEuler-22.03-LTS-SP1:kernel-tools-5.10.0-136.87.0.168.oe2203sp1.aarch64",
					"openEuler-22.03-LTS-SP1:kernel-headers-5.10.0-136.87.0.168.oe2203sp1.aarch64",
					"openEuler-22.03-LTS-SP1:kernel-tools-devel-5.10.0-136.87.0.168.oe2203sp1.aarch64",
					"openEuler-22.03-LTS-SP1:perf-5.10.0-136.87.0.168.oe2203sp1.aarch64",
					"openEuler-22.03-LTS-SP1:kernel-devel-5.10.0-136.87.0.168.oe2203sp1.aarch64",
					"openEuler-22.03-LTS-SP1:kernel-debuginfo-5.10.0-136.87.0.168.oe2203sp1.aarch64",
					"openEuler-22.03-LTS-SP1:kernel-5.10.0-136.87.0.168.oe2203sp1.aarch64",
					"openEuler-22.03-LTS-SP1:perf-debuginfo-5.10.0-136.87.0.168.oe2203sp1.aarch64",
					"openEuler-22.03-LTS-SP1:python3-perf-debuginfo-5.10.0-136.87.0.168.oe2203sp1.aarch64",
					"openEuler-22.03-LTS-SP1:kernel-tools-debuginfo-5.10.0-136.87.0.168.oe2203sp1.aarch64",
					"openEuler-22.03-LTS-SP1:kernel-5.10.0-136.87.0.168.oe2203sp1.src",
					"openEuler-22.03-LTS-SP1:python3-perf-debuginfo-5.10.0-136.87.0.168.oe2203sp1.x86_64",
					"openEuler-22.03-LTS-SP1:kernel-devel-5.10.0-136.87.0.168.oe2203sp1.x86_64",
					"openEuler-22.03-LTS-SP1:kernel-tools-debuginfo-5.10.0-136.87.0.168.oe2203sp1.x86_64",
					"openEuler-22.03-LTS-SP1:perf-debuginfo-5.10.0-136.87.0.168.oe2203sp1.x86_64",
					"openEuler-22.03-LTS-SP1:perf-5.10.0-136.87.0.168.oe2203sp1.x86_64",
					"openEuler-22.03-LTS-SP1:kernel-5.10.0-136.87.0.168.oe2203sp1.x86_64",
					"openEuler-22.03-LTS-SP1:kernel-debuginfo-5.10.0-136.87.0.168.oe2203sp1.x86_64",
					"openEuler-22.03-LTS-SP1:kernel-source-5.10.0-136.87.0.168.oe2203sp1.x86_64",
					"openEuler-22.03-LTS-SP1:kernel-headers-5.10.0-136.87.0.168.oe2203sp1.x86_64",
					"openEuler-22.03-LTS-SP1:kernel-tools-5.10.0-136.87.0.168.oe2203sp1.x86_64",
					"openEuler-22.03-LTS-SP1:kernel-tools-devel-5.10.0-136.87.0.168.oe2203sp1.x86_64",
					"openEuler-22.03-LTS-SP1:python3-perf-5.10.0-136.87.0.168.oe2203sp1.x86_64",
					"openEuler-22.03-LTS-SP1:kernel-debugsource-5.10.0-136.87.0.168.oe2203sp1.x86_64"
				]
			},
			"remediations":[
				{
					"product_ids":[
						"openEuler-22.03-LTS-SP1:python3-perf-5.10.0-136.87.0.168.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:kernel-debugsource-5.10.0-136.87.0.168.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:kernel-source-5.10.0-136.87.0.168.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:kernel-tools-5.10.0-136.87.0.168.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:kernel-headers-5.10.0-136.87.0.168.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:kernel-tools-devel-5.10.0-136.87.0.168.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:perf-5.10.0-136.87.0.168.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:kernel-devel-5.10.0-136.87.0.168.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:kernel-debuginfo-5.10.0-136.87.0.168.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:kernel-5.10.0-136.87.0.168.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:perf-debuginfo-5.10.0-136.87.0.168.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:python3-perf-debuginfo-5.10.0-136.87.0.168.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:kernel-tools-debuginfo-5.10.0-136.87.0.168.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:kernel-5.10.0-136.87.0.168.oe2203sp1.src",
						"openEuler-22.03-LTS-SP1:python3-perf-debuginfo-5.10.0-136.87.0.168.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:kernel-devel-5.10.0-136.87.0.168.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:kernel-tools-debuginfo-5.10.0-136.87.0.168.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:perf-debuginfo-5.10.0-136.87.0.168.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:perf-5.10.0-136.87.0.168.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:kernel-5.10.0-136.87.0.168.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:kernel-debuginfo-5.10.0-136.87.0.168.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:kernel-source-5.10.0-136.87.0.168.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:kernel-headers-5.10.0-136.87.0.168.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:kernel-tools-5.10.0-136.87.0.168.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:kernel-tools-devel-5.10.0-136.87.0.168.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:python3-perf-5.10.0-136.87.0.168.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:kernel-debugsource-5.10.0-136.87.0.168.oe2203sp1.x86_64"
					],
					"details":"kernel security update",
					"category":"vendor_fix",
					"url":"https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2024-1941"
				}
			],
			"scores":[
				{
					"cvss_v3":{
						"baseSeverity":"MEDIUM",
						"baseScore":5.3,
						"vectorString":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L",
						"version":"3.1"
					},
					"products":[
						"openEuler-22.03-LTS-SP1:python3-perf-5.10.0-136.87.0.168.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:kernel-debugsource-5.10.0-136.87.0.168.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:kernel-source-5.10.0-136.87.0.168.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:kernel-tools-5.10.0-136.87.0.168.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:kernel-headers-5.10.0-136.87.0.168.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:kernel-tools-devel-5.10.0-136.87.0.168.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:perf-5.10.0-136.87.0.168.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:kernel-devel-5.10.0-136.87.0.168.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:kernel-debuginfo-5.10.0-136.87.0.168.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:kernel-5.10.0-136.87.0.168.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:perf-debuginfo-5.10.0-136.87.0.168.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:python3-perf-debuginfo-5.10.0-136.87.0.168.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:kernel-tools-debuginfo-5.10.0-136.87.0.168.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:kernel-5.10.0-136.87.0.168.oe2203sp1.src",
						"openEuler-22.03-LTS-SP1:python3-perf-debuginfo-5.10.0-136.87.0.168.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:kernel-devel-5.10.0-136.87.0.168.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:kernel-tools-debuginfo-5.10.0-136.87.0.168.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:perf-debuginfo-5.10.0-136.87.0.168.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:perf-5.10.0-136.87.0.168.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:kernel-5.10.0-136.87.0.168.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:kernel-debuginfo-5.10.0-136.87.0.168.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:kernel-source-5.10.0-136.87.0.168.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:kernel-headers-5.10.0-136.87.0.168.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:kernel-tools-5.10.0-136.87.0.168.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:kernel-tools-devel-5.10.0-136.87.0.168.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:python3-perf-5.10.0-136.87.0.168.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:kernel-debugsource-5.10.0-136.87.0.168.oe2203sp1.x86_64"
					]
				}
			],
			"threats":[
				{
					"details":"Medium",
					"category":"impact"
				}
			],
			"title":"CVE-2024-36923"
		},
		{
			"cve":"CVE-2024-37078",
			"notes":[
				{
					"text":"In the Linux kernel, the following vulnerability has been resolved:\n\nnilfs2: fix potential kernel bug due to lack of writeback flag waiting\n\nDestructive writes to a block device on which nilfs2 is mounted can cause\na kernel bug in the folio/page writeback start routine or writeback end\nroutine (__folio_start_writeback in the log below):\n\n kernel BUG at mm/page-writeback.c:3070!\n Oops: invalid opcode: 0000 [#1] PREEMPT SMP KASAN PTI\n ...\n RIP: 0010:__folio_start_writeback+0xbaa/0x10e0\n Code: 25 ff 0f 00 00 0f 84 18 01 00 00 e8 40 ca c6 ff e9 17 f6 ff ff\n  e8 36 ca c6 ff 4c 89 f7 48 c7 c6 80 c0 12 84 e8 e7 b3 0f 00 90 <0f>\n  0b e8 1f ca c6 ff 4c 89 f7 48 c7 c6 a0 c6 12 84 e8 d0 b3 0f 00\n ...\n Call Trace:\n  <TASK>\n  nilfs_segctor_do_construct+0x4654/0x69d0 [nilfs2]\n  nilfs_segctor_construct+0x181/0x6b0 [nilfs2]\n  nilfs_segctor_thread+0x548/0x11c0 [nilfs2]\n  kthread+0x2f0/0x390\n  ret_from_fork+0x4b/0x80\n  ret_from_fork_asm+0x1a/0x30\n  </TASK>\n\nThis is because when the log writer starts a writeback for segment summary\nblocks or a super root block that use the backing device's page cache, it\ndoes not wait for the ongoing folio/page writeback, resulting in an\ninconsistent writeback state.\n\nFix this issue by waiting for ongoing writebacks when putting\nfolios/pages on the backing device into writeback state.",
					"category":"description",
					"title":"Vulnerability Description"
				}
			],
			"product_status":{
				"fixed":[
					"openEuler-22.03-LTS-SP1:python3-perf-5.10.0-136.87.0.168.oe2203sp1.aarch64",
					"openEuler-22.03-LTS-SP1:kernel-debugsource-5.10.0-136.87.0.168.oe2203sp1.aarch64",
					"openEuler-22.03-LTS-SP1:kernel-source-5.10.0-136.87.0.168.oe2203sp1.aarch64",
					"openEuler-22.03-LTS-SP1:kernel-tools-5.10.0-136.87.0.168.oe2203sp1.aarch64",
					"openEuler-22.03-LTS-SP1:kernel-headers-5.10.0-136.87.0.168.oe2203sp1.aarch64",
					"openEuler-22.03-LTS-SP1:kernel-tools-devel-5.10.0-136.87.0.168.oe2203sp1.aarch64",
					"openEuler-22.03-LTS-SP1:perf-5.10.0-136.87.0.168.oe2203sp1.aarch64",
					"openEuler-22.03-LTS-SP1:kernel-devel-5.10.0-136.87.0.168.oe2203sp1.aarch64",
					"openEuler-22.03-LTS-SP1:kernel-debuginfo-5.10.0-136.87.0.168.oe2203sp1.aarch64",
					"openEuler-22.03-LTS-SP1:kernel-5.10.0-136.87.0.168.oe2203sp1.aarch64",
					"openEuler-22.03-LTS-SP1:perf-debuginfo-5.10.0-136.87.0.168.oe2203sp1.aarch64",
					"openEuler-22.03-LTS-SP1:python3-perf-debuginfo-5.10.0-136.87.0.168.oe2203sp1.aarch64",
					"openEuler-22.03-LTS-SP1:kernel-tools-debuginfo-5.10.0-136.87.0.168.oe2203sp1.aarch64",
					"openEuler-22.03-LTS-SP1:kernel-5.10.0-136.87.0.168.oe2203sp1.src",
					"openEuler-22.03-LTS-SP1:python3-perf-debuginfo-5.10.0-136.87.0.168.oe2203sp1.x86_64",
					"openEuler-22.03-LTS-SP1:kernel-devel-5.10.0-136.87.0.168.oe2203sp1.x86_64",
					"openEuler-22.03-LTS-SP1:kernel-tools-debuginfo-5.10.0-136.87.0.168.oe2203sp1.x86_64",
					"openEuler-22.03-LTS-SP1:perf-debuginfo-5.10.0-136.87.0.168.oe2203sp1.x86_64",
					"openEuler-22.03-LTS-SP1:perf-5.10.0-136.87.0.168.oe2203sp1.x86_64",
					"openEuler-22.03-LTS-SP1:kernel-5.10.0-136.87.0.168.oe2203sp1.x86_64",
					"openEuler-22.03-LTS-SP1:kernel-debuginfo-5.10.0-136.87.0.168.oe2203sp1.x86_64",
					"openEuler-22.03-LTS-SP1:kernel-source-5.10.0-136.87.0.168.oe2203sp1.x86_64",
					"openEuler-22.03-LTS-SP1:kernel-headers-5.10.0-136.87.0.168.oe2203sp1.x86_64",
					"openEuler-22.03-LTS-SP1:kernel-tools-5.10.0-136.87.0.168.oe2203sp1.x86_64",
					"openEuler-22.03-LTS-SP1:kernel-tools-devel-5.10.0-136.87.0.168.oe2203sp1.x86_64",
					"openEuler-22.03-LTS-SP1:python3-perf-5.10.0-136.87.0.168.oe2203sp1.x86_64",
					"openEuler-22.03-LTS-SP1:kernel-debugsource-5.10.0-136.87.0.168.oe2203sp1.x86_64"
				]
			},
			"remediations":[
				{
					"product_ids":[
						"openEuler-22.03-LTS-SP1:python3-perf-5.10.0-136.87.0.168.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:kernel-debugsource-5.10.0-136.87.0.168.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:kernel-source-5.10.0-136.87.0.168.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:kernel-tools-5.10.0-136.87.0.168.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:kernel-headers-5.10.0-136.87.0.168.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:kernel-tools-devel-5.10.0-136.87.0.168.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:perf-5.10.0-136.87.0.168.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:kernel-devel-5.10.0-136.87.0.168.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:kernel-debuginfo-5.10.0-136.87.0.168.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:kernel-5.10.0-136.87.0.168.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:perf-debuginfo-5.10.0-136.87.0.168.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:python3-perf-debuginfo-5.10.0-136.87.0.168.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:kernel-tools-debuginfo-5.10.0-136.87.0.168.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:kernel-5.10.0-136.87.0.168.oe2203sp1.src",
						"openEuler-22.03-LTS-SP1:python3-perf-debuginfo-5.10.0-136.87.0.168.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:kernel-devel-5.10.0-136.87.0.168.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:kernel-tools-debuginfo-5.10.0-136.87.0.168.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:perf-debuginfo-5.10.0-136.87.0.168.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:perf-5.10.0-136.87.0.168.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:kernel-5.10.0-136.87.0.168.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:kernel-debuginfo-5.10.0-136.87.0.168.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:kernel-source-5.10.0-136.87.0.168.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:kernel-headers-5.10.0-136.87.0.168.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:kernel-tools-5.10.0-136.87.0.168.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:kernel-tools-devel-5.10.0-136.87.0.168.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:python3-perf-5.10.0-136.87.0.168.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:kernel-debugsource-5.10.0-136.87.0.168.oe2203sp1.x86_64"
					],
					"details":"kernel security update",
					"category":"vendor_fix",
					"url":"https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2024-1941"
				}
			],
			"scores":[
				{
					"cvss_v3":{
						"baseSeverity":"LOW",
						"baseScore":3.9,
						"vectorString":"CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:L/I:L/A:L",
						"version":"3.1"
					},
					"products":[
						"openEuler-22.03-LTS-SP1:python3-perf-5.10.0-136.87.0.168.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:kernel-debugsource-5.10.0-136.87.0.168.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:kernel-source-5.10.0-136.87.0.168.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:kernel-tools-5.10.0-136.87.0.168.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:kernel-headers-5.10.0-136.87.0.168.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:kernel-tools-devel-5.10.0-136.87.0.168.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:perf-5.10.0-136.87.0.168.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:kernel-devel-5.10.0-136.87.0.168.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:kernel-debuginfo-5.10.0-136.87.0.168.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:kernel-5.10.0-136.87.0.168.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:perf-debuginfo-5.10.0-136.87.0.168.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:python3-perf-debuginfo-5.10.0-136.87.0.168.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:kernel-tools-debuginfo-5.10.0-136.87.0.168.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:kernel-5.10.0-136.87.0.168.oe2203sp1.src",
						"openEuler-22.03-LTS-SP1:python3-perf-debuginfo-5.10.0-136.87.0.168.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:kernel-devel-5.10.0-136.87.0.168.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:kernel-tools-debuginfo-5.10.0-136.87.0.168.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:perf-debuginfo-5.10.0-136.87.0.168.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:perf-5.10.0-136.87.0.168.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:kernel-5.10.0-136.87.0.168.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:kernel-debuginfo-5.10.0-136.87.0.168.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:kernel-source-5.10.0-136.87.0.168.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:kernel-headers-5.10.0-136.87.0.168.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:kernel-tools-5.10.0-136.87.0.168.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:kernel-tools-devel-5.10.0-136.87.0.168.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:python3-perf-5.10.0-136.87.0.168.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:kernel-debugsource-5.10.0-136.87.0.168.oe2203sp1.x86_64"
					]
				}
			],
			"threats":[
				{
					"details":"Low",
					"category":"impact"
				}
			],
			"title":"CVE-2024-37078"
		},
		{
			"cve":"CVE-2024-38548",
			"notes":[
				{
					"text":"In the Linux kernel, the following vulnerability has been resolved:\n\ndrm: bridge: cdns-mhdp8546: Fix possible null pointer dereference\n\nIn cdns_mhdp_atomic_enable(), the return value of drm_mode_duplicate() is\nassigned to mhdp_state->current_mode, and there is a dereference of it in\ndrm_mode_set_name(), which will lead to a NULL pointer dereference on\nfailure of drm_mode_duplicate().\n\nFix this bug add a check of mhdp_state->current_mode.",
					"category":"description",
					"title":"Vulnerability Description"
				}
			],
			"product_status":{
				"fixed":[
					"openEuler-22.03-LTS-SP1:python3-perf-5.10.0-136.87.0.168.oe2203sp1.aarch64",
					"openEuler-22.03-LTS-SP1:kernel-debugsource-5.10.0-136.87.0.168.oe2203sp1.aarch64",
					"openEuler-22.03-LTS-SP1:kernel-source-5.10.0-136.87.0.168.oe2203sp1.aarch64",
					"openEuler-22.03-LTS-SP1:kernel-tools-5.10.0-136.87.0.168.oe2203sp1.aarch64",
					"openEuler-22.03-LTS-SP1:kernel-headers-5.10.0-136.87.0.168.oe2203sp1.aarch64",
					"openEuler-22.03-LTS-SP1:kernel-tools-devel-5.10.0-136.87.0.168.oe2203sp1.aarch64",
					"openEuler-22.03-LTS-SP1:perf-5.10.0-136.87.0.168.oe2203sp1.aarch64",
					"openEuler-22.03-LTS-SP1:kernel-devel-5.10.0-136.87.0.168.oe2203sp1.aarch64",
					"openEuler-22.03-LTS-SP1:kernel-debuginfo-5.10.0-136.87.0.168.oe2203sp1.aarch64",
					"openEuler-22.03-LTS-SP1:kernel-5.10.0-136.87.0.168.oe2203sp1.aarch64",
					"openEuler-22.03-LTS-SP1:perf-debuginfo-5.10.0-136.87.0.168.oe2203sp1.aarch64",
					"openEuler-22.03-LTS-SP1:python3-perf-debuginfo-5.10.0-136.87.0.168.oe2203sp1.aarch64",
					"openEuler-22.03-LTS-SP1:kernel-tools-debuginfo-5.10.0-136.87.0.168.oe2203sp1.aarch64",
					"openEuler-22.03-LTS-SP1:kernel-5.10.0-136.87.0.168.oe2203sp1.src",
					"openEuler-22.03-LTS-SP1:python3-perf-debuginfo-5.10.0-136.87.0.168.oe2203sp1.x86_64",
					"openEuler-22.03-LTS-SP1:kernel-devel-5.10.0-136.87.0.168.oe2203sp1.x86_64",
					"openEuler-22.03-LTS-SP1:kernel-tools-debuginfo-5.10.0-136.87.0.168.oe2203sp1.x86_64",
					"openEuler-22.03-LTS-SP1:perf-debuginfo-5.10.0-136.87.0.168.oe2203sp1.x86_64",
					"openEuler-22.03-LTS-SP1:perf-5.10.0-136.87.0.168.oe2203sp1.x86_64",
					"openEuler-22.03-LTS-SP1:kernel-5.10.0-136.87.0.168.oe2203sp1.x86_64",
					"openEuler-22.03-LTS-SP1:kernel-debuginfo-5.10.0-136.87.0.168.oe2203sp1.x86_64",
					"openEuler-22.03-LTS-SP1:kernel-source-5.10.0-136.87.0.168.oe2203sp1.x86_64",
					"openEuler-22.03-LTS-SP1:kernel-headers-5.10.0-136.87.0.168.oe2203sp1.x86_64",
					"openEuler-22.03-LTS-SP1:kernel-tools-5.10.0-136.87.0.168.oe2203sp1.x86_64",
					"openEuler-22.03-LTS-SP1:kernel-tools-devel-5.10.0-136.87.0.168.oe2203sp1.x86_64",
					"openEuler-22.03-LTS-SP1:python3-perf-5.10.0-136.87.0.168.oe2203sp1.x86_64",
					"openEuler-22.03-LTS-SP1:kernel-debugsource-5.10.0-136.87.0.168.oe2203sp1.x86_64"
				]
			},
			"remediations":[
				{
					"product_ids":[
						"openEuler-22.03-LTS-SP1:python3-perf-5.10.0-136.87.0.168.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:kernel-debugsource-5.10.0-136.87.0.168.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:kernel-source-5.10.0-136.87.0.168.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:kernel-tools-5.10.0-136.87.0.168.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:kernel-headers-5.10.0-136.87.0.168.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:kernel-tools-devel-5.10.0-136.87.0.168.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:perf-5.10.0-136.87.0.168.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:kernel-devel-5.10.0-136.87.0.168.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:kernel-debuginfo-5.10.0-136.87.0.168.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:kernel-5.10.0-136.87.0.168.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:perf-debuginfo-5.10.0-136.87.0.168.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:python3-perf-debuginfo-5.10.0-136.87.0.168.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:kernel-tools-debuginfo-5.10.0-136.87.0.168.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:kernel-5.10.0-136.87.0.168.oe2203sp1.src",
						"openEuler-22.03-LTS-SP1:python3-perf-debuginfo-5.10.0-136.87.0.168.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:kernel-devel-5.10.0-136.87.0.168.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:kernel-tools-debuginfo-5.10.0-136.87.0.168.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:perf-debuginfo-5.10.0-136.87.0.168.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:perf-5.10.0-136.87.0.168.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:kernel-5.10.0-136.87.0.168.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:kernel-debuginfo-5.10.0-136.87.0.168.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:kernel-source-5.10.0-136.87.0.168.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:kernel-headers-5.10.0-136.87.0.168.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:kernel-tools-5.10.0-136.87.0.168.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:kernel-tools-devel-5.10.0-136.87.0.168.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:python3-perf-5.10.0-136.87.0.168.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:kernel-debugsource-5.10.0-136.87.0.168.oe2203sp1.x86_64"
					],
					"details":"kernel security update",
					"category":"vendor_fix",
					"url":"https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2024-1941"
				}
			],
			"scores":[
				{
					"cvss_v3":{
						"baseSeverity":"MEDIUM",
						"baseScore":5.5,
						"vectorString":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
						"version":"3.1"
					},
					"products":[
						"openEuler-22.03-LTS-SP1:python3-perf-5.10.0-136.87.0.168.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:kernel-debugsource-5.10.0-136.87.0.168.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:kernel-source-5.10.0-136.87.0.168.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:kernel-tools-5.10.0-136.87.0.168.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:kernel-headers-5.10.0-136.87.0.168.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:kernel-tools-devel-5.10.0-136.87.0.168.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:perf-5.10.0-136.87.0.168.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:kernel-devel-5.10.0-136.87.0.168.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:kernel-debuginfo-5.10.0-136.87.0.168.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:kernel-5.10.0-136.87.0.168.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:perf-debuginfo-5.10.0-136.87.0.168.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:python3-perf-debuginfo-5.10.0-136.87.0.168.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:kernel-tools-debuginfo-5.10.0-136.87.0.168.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:kernel-5.10.0-136.87.0.168.oe2203sp1.src",
						"openEuler-22.03-LTS-SP1:python3-perf-debuginfo-5.10.0-136.87.0.168.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:kernel-devel-5.10.0-136.87.0.168.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:kernel-tools-debuginfo-5.10.0-136.87.0.168.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:perf-debuginfo-5.10.0-136.87.0.168.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:perf-5.10.0-136.87.0.168.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:kernel-5.10.0-136.87.0.168.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:kernel-debuginfo-5.10.0-136.87.0.168.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:kernel-source-5.10.0-136.87.0.168.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:kernel-headers-5.10.0-136.87.0.168.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:kernel-tools-5.10.0-136.87.0.168.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:kernel-tools-devel-5.10.0-136.87.0.168.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:python3-perf-5.10.0-136.87.0.168.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:kernel-debugsource-5.10.0-136.87.0.168.oe2203sp1.x86_64"
					]
				}
			],
			"threats":[
				{
					"details":"Medium",
					"category":"impact"
				}
			],
			"title":"CVE-2024-38548"
		},
		{
			"cve":"CVE-2024-38567",
			"notes":[
				{
					"text":"In the Linux kernel, the following vulnerability has been resolved:\n\nwifi: carl9170: add a proper sanity check for endpoints\n\nSyzkaller reports [1] hitting a warning which is caused by presence\nof a wrong endpoint type at the URB sumbitting stage. While there\nwas a check for a specific 4th endpoint, since it can switch types\nbetween bulk and interrupt, other endpoints are trusted implicitly.\nSimilar warning is triggered in a couple of other syzbot issues [2].\n\nFix the issue by doing a comprehensive check of all endpoints\ntaking into account difference between high- and full-speed\nconfiguration.\n\n[1] Syzkaller report:\n...\nWARNING: CPU: 0 PID: 4721 at drivers/usb/core/urb.c:504 usb_submit_urb+0xed6/0x1880 drivers/usb/core/urb.c:504\n...\nCall Trace:\n <TASK>\n carl9170_usb_send_rx_irq_urb+0x273/0x340 drivers/net/wireless/ath/carl9170/usb.c:504\n carl9170_usb_init_device drivers/net/wireless/ath/carl9170/usb.c:939 [inline]\n carl9170_usb_firmware_finish drivers/net/wireless/ath/carl9170/usb.c:999 [inline]\n carl9170_usb_firmware_step2+0x175/0x240 drivers/net/wireless/ath/carl9170/usb.c:1028\n request_firmware_work_func+0x130/0x240 drivers/base/firmware_loader/main.c:1107\n process_one_work+0x9bf/0x1710 kernel/workqueue.c:2289\n worker_thread+0x669/0x1090 kernel/workqueue.c:2436\n kthread+0x2e8/0x3a0 kernel/kthread.c:376\n ret_from_fork+0x1f/0x30 arch/x86/entry/entry_64.S:308\n </TASK>\n\n[2] Related syzkaller crashes:",
					"category":"description",
					"title":"Vulnerability Description"
				}
			],
			"product_status":{
				"fixed":[
					"openEuler-22.03-LTS-SP1:python3-perf-5.10.0-136.87.0.168.oe2203sp1.aarch64",
					"openEuler-22.03-LTS-SP1:kernel-debugsource-5.10.0-136.87.0.168.oe2203sp1.aarch64",
					"openEuler-22.03-LTS-SP1:kernel-source-5.10.0-136.87.0.168.oe2203sp1.aarch64",
					"openEuler-22.03-LTS-SP1:kernel-tools-5.10.0-136.87.0.168.oe2203sp1.aarch64",
					"openEuler-22.03-LTS-SP1:kernel-headers-5.10.0-136.87.0.168.oe2203sp1.aarch64",
					"openEuler-22.03-LTS-SP1:kernel-tools-devel-5.10.0-136.87.0.168.oe2203sp1.aarch64",
					"openEuler-22.03-LTS-SP1:perf-5.10.0-136.87.0.168.oe2203sp1.aarch64",
					"openEuler-22.03-LTS-SP1:kernel-devel-5.10.0-136.87.0.168.oe2203sp1.aarch64",
					"openEuler-22.03-LTS-SP1:kernel-debuginfo-5.10.0-136.87.0.168.oe2203sp1.aarch64",
					"openEuler-22.03-LTS-SP1:kernel-5.10.0-136.87.0.168.oe2203sp1.aarch64",
					"openEuler-22.03-LTS-SP1:perf-debuginfo-5.10.0-136.87.0.168.oe2203sp1.aarch64",
					"openEuler-22.03-LTS-SP1:python3-perf-debuginfo-5.10.0-136.87.0.168.oe2203sp1.aarch64",
					"openEuler-22.03-LTS-SP1:kernel-tools-debuginfo-5.10.0-136.87.0.168.oe2203sp1.aarch64",
					"openEuler-22.03-LTS-SP1:kernel-5.10.0-136.87.0.168.oe2203sp1.src",
					"openEuler-22.03-LTS-SP1:python3-perf-debuginfo-5.10.0-136.87.0.168.oe2203sp1.x86_64",
					"openEuler-22.03-LTS-SP1:kernel-devel-5.10.0-136.87.0.168.oe2203sp1.x86_64",
					"openEuler-22.03-LTS-SP1:kernel-tools-debuginfo-5.10.0-136.87.0.168.oe2203sp1.x86_64",
					"openEuler-22.03-LTS-SP1:perf-debuginfo-5.10.0-136.87.0.168.oe2203sp1.x86_64",
					"openEuler-22.03-LTS-SP1:perf-5.10.0-136.87.0.168.oe2203sp1.x86_64",
					"openEuler-22.03-LTS-SP1:kernel-5.10.0-136.87.0.168.oe2203sp1.x86_64",
					"openEuler-22.03-LTS-SP1:kernel-debuginfo-5.10.0-136.87.0.168.oe2203sp1.x86_64",
					"openEuler-22.03-LTS-SP1:kernel-source-5.10.0-136.87.0.168.oe2203sp1.x86_64",
					"openEuler-22.03-LTS-SP1:kernel-headers-5.10.0-136.87.0.168.oe2203sp1.x86_64",
					"openEuler-22.03-LTS-SP1:kernel-tools-5.10.0-136.87.0.168.oe2203sp1.x86_64",
					"openEuler-22.03-LTS-SP1:kernel-tools-devel-5.10.0-136.87.0.168.oe2203sp1.x86_64",
					"openEuler-22.03-LTS-SP1:python3-perf-5.10.0-136.87.0.168.oe2203sp1.x86_64",
					"openEuler-22.03-LTS-SP1:kernel-debugsource-5.10.0-136.87.0.168.oe2203sp1.x86_64"
				]
			},
			"remediations":[
				{
					"product_ids":[
						"openEuler-22.03-LTS-SP1:python3-perf-5.10.0-136.87.0.168.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:kernel-debugsource-5.10.0-136.87.0.168.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:kernel-source-5.10.0-136.87.0.168.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:kernel-tools-5.10.0-136.87.0.168.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:kernel-headers-5.10.0-136.87.0.168.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:kernel-tools-devel-5.10.0-136.87.0.168.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:perf-5.10.0-136.87.0.168.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:kernel-devel-5.10.0-136.87.0.168.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:kernel-debuginfo-5.10.0-136.87.0.168.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:kernel-5.10.0-136.87.0.168.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:perf-debuginfo-5.10.0-136.87.0.168.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:python3-perf-debuginfo-5.10.0-136.87.0.168.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:kernel-tools-debuginfo-5.10.0-136.87.0.168.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:kernel-5.10.0-136.87.0.168.oe2203sp1.src",
						"openEuler-22.03-LTS-SP1:python3-perf-debuginfo-5.10.0-136.87.0.168.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:kernel-devel-5.10.0-136.87.0.168.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:kernel-tools-debuginfo-5.10.0-136.87.0.168.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:perf-debuginfo-5.10.0-136.87.0.168.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:perf-5.10.0-136.87.0.168.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:kernel-5.10.0-136.87.0.168.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:kernel-debuginfo-5.10.0-136.87.0.168.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:kernel-source-5.10.0-136.87.0.168.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:kernel-headers-5.10.0-136.87.0.168.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:kernel-tools-5.10.0-136.87.0.168.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:kernel-tools-devel-5.10.0-136.87.0.168.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:python3-perf-5.10.0-136.87.0.168.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:kernel-debugsource-5.10.0-136.87.0.168.oe2203sp1.x86_64"
					],
					"details":"kernel security update",
					"category":"vendor_fix",
					"url":"https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2024-1941"
				}
			],
			"scores":[
				{
					"cvss_v3":{
						"baseSeverity":"MEDIUM",
						"baseScore":5.5,
						"vectorString":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
						"version":"3.1"
					},
					"products":[
						"openEuler-22.03-LTS-SP1:python3-perf-5.10.0-136.87.0.168.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:kernel-debugsource-5.10.0-136.87.0.168.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:kernel-source-5.10.0-136.87.0.168.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:kernel-tools-5.10.0-136.87.0.168.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:kernel-headers-5.10.0-136.87.0.168.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:kernel-tools-devel-5.10.0-136.87.0.168.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:perf-5.10.0-136.87.0.168.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:kernel-devel-5.10.0-136.87.0.168.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:kernel-debuginfo-5.10.0-136.87.0.168.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:kernel-5.10.0-136.87.0.168.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:perf-debuginfo-5.10.0-136.87.0.168.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:python3-perf-debuginfo-5.10.0-136.87.0.168.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:kernel-tools-debuginfo-5.10.0-136.87.0.168.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:kernel-5.10.0-136.87.0.168.oe2203sp1.src",
						"openEuler-22.03-LTS-SP1:python3-perf-debuginfo-5.10.0-136.87.0.168.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:kernel-devel-5.10.0-136.87.0.168.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:kernel-tools-debuginfo-5.10.0-136.87.0.168.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:perf-debuginfo-5.10.0-136.87.0.168.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:perf-5.10.0-136.87.0.168.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:kernel-5.10.0-136.87.0.168.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:kernel-debuginfo-5.10.0-136.87.0.168.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:kernel-source-5.10.0-136.87.0.168.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:kernel-headers-5.10.0-136.87.0.168.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:kernel-tools-5.10.0-136.87.0.168.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:kernel-tools-devel-5.10.0-136.87.0.168.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:python3-perf-5.10.0-136.87.0.168.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:kernel-debugsource-5.10.0-136.87.0.168.oe2203sp1.x86_64"
					]
				}
			],
			"threats":[
				{
					"details":"Medium",
					"category":"impact"
				}
			],
			"title":"CVE-2024-38567"
		},
		{
			"cve":"CVE-2024-38607",
			"notes":[
				{
					"text":"In the Linux kernel, the following vulnerability has been resolved:\n\nmacintosh/via-macii: Fix \"BUG: sleeping function called from invalid context\"\n\nThe via-macii ADB driver calls request_irq() after disabling hard\ninterrupts. But disabling interrupts isn't necessary here because the\nVIA shift register interrupt was masked during VIA1 initialization.",
					"category":"description",
					"title":"Vulnerability Description"
				}
			],
			"product_status":{
				"fixed":[
					"openEuler-22.03-LTS-SP1:python3-perf-5.10.0-136.87.0.168.oe2203sp1.aarch64",
					"openEuler-22.03-LTS-SP1:kernel-debugsource-5.10.0-136.87.0.168.oe2203sp1.aarch64",
					"openEuler-22.03-LTS-SP1:kernel-source-5.10.0-136.87.0.168.oe2203sp1.aarch64",
					"openEuler-22.03-LTS-SP1:kernel-tools-5.10.0-136.87.0.168.oe2203sp1.aarch64",
					"openEuler-22.03-LTS-SP1:kernel-headers-5.10.0-136.87.0.168.oe2203sp1.aarch64",
					"openEuler-22.03-LTS-SP1:kernel-tools-devel-5.10.0-136.87.0.168.oe2203sp1.aarch64",
					"openEuler-22.03-LTS-SP1:perf-5.10.0-136.87.0.168.oe2203sp1.aarch64",
					"openEuler-22.03-LTS-SP1:kernel-devel-5.10.0-136.87.0.168.oe2203sp1.aarch64",
					"openEuler-22.03-LTS-SP1:kernel-debuginfo-5.10.0-136.87.0.168.oe2203sp1.aarch64",
					"openEuler-22.03-LTS-SP1:kernel-5.10.0-136.87.0.168.oe2203sp1.aarch64",
					"openEuler-22.03-LTS-SP1:perf-debuginfo-5.10.0-136.87.0.168.oe2203sp1.aarch64",
					"openEuler-22.03-LTS-SP1:python3-perf-debuginfo-5.10.0-136.87.0.168.oe2203sp1.aarch64",
					"openEuler-22.03-LTS-SP1:kernel-tools-debuginfo-5.10.0-136.87.0.168.oe2203sp1.aarch64",
					"openEuler-22.03-LTS-SP1:kernel-5.10.0-136.87.0.168.oe2203sp1.src",
					"openEuler-22.03-LTS-SP1:python3-perf-debuginfo-5.10.0-136.87.0.168.oe2203sp1.x86_64",
					"openEuler-22.03-LTS-SP1:kernel-devel-5.10.0-136.87.0.168.oe2203sp1.x86_64",
					"openEuler-22.03-LTS-SP1:kernel-tools-debuginfo-5.10.0-136.87.0.168.oe2203sp1.x86_64",
					"openEuler-22.03-LTS-SP1:perf-debuginfo-5.10.0-136.87.0.168.oe2203sp1.x86_64",
					"openEuler-22.03-LTS-SP1:perf-5.10.0-136.87.0.168.oe2203sp1.x86_64",
					"openEuler-22.03-LTS-SP1:kernel-5.10.0-136.87.0.168.oe2203sp1.x86_64",
					"openEuler-22.03-LTS-SP1:kernel-debuginfo-5.10.0-136.87.0.168.oe2203sp1.x86_64",
					"openEuler-22.03-LTS-SP1:kernel-source-5.10.0-136.87.0.168.oe2203sp1.x86_64",
					"openEuler-22.03-LTS-SP1:kernel-headers-5.10.0-136.87.0.168.oe2203sp1.x86_64",
					"openEuler-22.03-LTS-SP1:kernel-tools-5.10.0-136.87.0.168.oe2203sp1.x86_64",
					"openEuler-22.03-LTS-SP1:kernel-tools-devel-5.10.0-136.87.0.168.oe2203sp1.x86_64",
					"openEuler-22.03-LTS-SP1:python3-perf-5.10.0-136.87.0.168.oe2203sp1.x86_64",
					"openEuler-22.03-LTS-SP1:kernel-debugsource-5.10.0-136.87.0.168.oe2203sp1.x86_64"
				]
			},
			"remediations":[
				{
					"product_ids":[
						"openEuler-22.03-LTS-SP1:python3-perf-5.10.0-136.87.0.168.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:kernel-debugsource-5.10.0-136.87.0.168.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:kernel-source-5.10.0-136.87.0.168.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:kernel-tools-5.10.0-136.87.0.168.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:kernel-headers-5.10.0-136.87.0.168.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:kernel-tools-devel-5.10.0-136.87.0.168.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:perf-5.10.0-136.87.0.168.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:kernel-devel-5.10.0-136.87.0.168.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:kernel-debuginfo-5.10.0-136.87.0.168.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:kernel-5.10.0-136.87.0.168.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:perf-debuginfo-5.10.0-136.87.0.168.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:python3-perf-debuginfo-5.10.0-136.87.0.168.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:kernel-tools-debuginfo-5.10.0-136.87.0.168.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:kernel-5.10.0-136.87.0.168.oe2203sp1.src",
						"openEuler-22.03-LTS-SP1:python3-perf-debuginfo-5.10.0-136.87.0.168.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:kernel-devel-5.10.0-136.87.0.168.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:kernel-tools-debuginfo-5.10.0-136.87.0.168.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:perf-debuginfo-5.10.0-136.87.0.168.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:perf-5.10.0-136.87.0.168.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:kernel-5.10.0-136.87.0.168.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:kernel-debuginfo-5.10.0-136.87.0.168.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:kernel-source-5.10.0-136.87.0.168.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:kernel-headers-5.10.0-136.87.0.168.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:kernel-tools-5.10.0-136.87.0.168.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:kernel-tools-devel-5.10.0-136.87.0.168.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:python3-perf-5.10.0-136.87.0.168.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:kernel-debugsource-5.10.0-136.87.0.168.oe2203sp1.x86_64"
					],
					"details":"kernel security update",
					"category":"vendor_fix",
					"url":"https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2024-1941"
				}
			],
			"scores":[
				{
					"cvss_v3":{
						"baseSeverity":"MEDIUM",
						"baseScore":5.5,
						"vectorString":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
						"version":"3.1"
					},
					"products":[
						"openEuler-22.03-LTS-SP1:python3-perf-5.10.0-136.87.0.168.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:kernel-debugsource-5.10.0-136.87.0.168.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:kernel-source-5.10.0-136.87.0.168.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:kernel-tools-5.10.0-136.87.0.168.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:kernel-headers-5.10.0-136.87.0.168.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:kernel-tools-devel-5.10.0-136.87.0.168.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:perf-5.10.0-136.87.0.168.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:kernel-devel-5.10.0-136.87.0.168.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:kernel-debuginfo-5.10.0-136.87.0.168.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:kernel-5.10.0-136.87.0.168.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:perf-debuginfo-5.10.0-136.87.0.168.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:python3-perf-debuginfo-5.10.0-136.87.0.168.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:kernel-tools-debuginfo-5.10.0-136.87.0.168.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:kernel-5.10.0-136.87.0.168.oe2203sp1.src",
						"openEuler-22.03-LTS-SP1:python3-perf-debuginfo-5.10.0-136.87.0.168.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:kernel-devel-5.10.0-136.87.0.168.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:kernel-tools-debuginfo-5.10.0-136.87.0.168.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:perf-debuginfo-5.10.0-136.87.0.168.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:perf-5.10.0-136.87.0.168.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:kernel-5.10.0-136.87.0.168.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:kernel-debuginfo-5.10.0-136.87.0.168.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:kernel-source-5.10.0-136.87.0.168.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:kernel-headers-5.10.0-136.87.0.168.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:kernel-tools-5.10.0-136.87.0.168.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:kernel-tools-devel-5.10.0-136.87.0.168.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:python3-perf-5.10.0-136.87.0.168.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:kernel-debugsource-5.10.0-136.87.0.168.oe2203sp1.x86_64"
					]
				}
			],
			"threats":[
				{
					"details":"Medium",
					"category":"impact"
				}
			],
			"title":"CVE-2024-38607"
		},
		{
			"cve":"CVE-2024-38611",
			"notes":[
				{
					"text":"In the Linux kernel, the following vulnerability has been resolved:\n\nmedia: i2c: et8ek8: Don't strip remove function when driver is builtin\n\nUsing __exit for the remove function results in the remove callback\nbeing discarded with CONFIG_VIDEO_ET8EK8=y. When such a device gets\nunbound (e.g. using sysfs or hotplug), the driver is just removed\nwithout the cleanup being performed. This results in resource leaks. Fix\nit by compiling in the remove callback unconditionally.\n\nThis also fixes a W=1 modpost warning:\n\n\tWARNING: modpost: drivers/media/i2c/et8ek8/et8ek8: section mismatch in reference: et8ek8_i2c_driver+0x10 (section: .data) -> et8ek8_remove (section: .exit.text)",
					"category":"description",
					"title":"Vulnerability Description"
				}
			],
			"product_status":{
				"fixed":[
					"openEuler-22.03-LTS-SP1:python3-perf-5.10.0-136.87.0.168.oe2203sp1.aarch64",
					"openEuler-22.03-LTS-SP1:kernel-debugsource-5.10.0-136.87.0.168.oe2203sp1.aarch64",
					"openEuler-22.03-LTS-SP1:kernel-source-5.10.0-136.87.0.168.oe2203sp1.aarch64",
					"openEuler-22.03-LTS-SP1:kernel-tools-5.10.0-136.87.0.168.oe2203sp1.aarch64",
					"openEuler-22.03-LTS-SP1:kernel-headers-5.10.0-136.87.0.168.oe2203sp1.aarch64",
					"openEuler-22.03-LTS-SP1:kernel-tools-devel-5.10.0-136.87.0.168.oe2203sp1.aarch64",
					"openEuler-22.03-LTS-SP1:perf-5.10.0-136.87.0.168.oe2203sp1.aarch64",
					"openEuler-22.03-LTS-SP1:kernel-devel-5.10.0-136.87.0.168.oe2203sp1.aarch64",
					"openEuler-22.03-LTS-SP1:kernel-debuginfo-5.10.0-136.87.0.168.oe2203sp1.aarch64",
					"openEuler-22.03-LTS-SP1:kernel-5.10.0-136.87.0.168.oe2203sp1.aarch64",
					"openEuler-22.03-LTS-SP1:perf-debuginfo-5.10.0-136.87.0.168.oe2203sp1.aarch64",
					"openEuler-22.03-LTS-SP1:python3-perf-debuginfo-5.10.0-136.87.0.168.oe2203sp1.aarch64",
					"openEuler-22.03-LTS-SP1:kernel-tools-debuginfo-5.10.0-136.87.0.168.oe2203sp1.aarch64",
					"openEuler-22.03-LTS-SP1:kernel-5.10.0-136.87.0.168.oe2203sp1.src",
					"openEuler-22.03-LTS-SP1:python3-perf-debuginfo-5.10.0-136.87.0.168.oe2203sp1.x86_64",
					"openEuler-22.03-LTS-SP1:kernel-devel-5.10.0-136.87.0.168.oe2203sp1.x86_64",
					"openEuler-22.03-LTS-SP1:kernel-tools-debuginfo-5.10.0-136.87.0.168.oe2203sp1.x86_64",
					"openEuler-22.03-LTS-SP1:perf-debuginfo-5.10.0-136.87.0.168.oe2203sp1.x86_64",
					"openEuler-22.03-LTS-SP1:perf-5.10.0-136.87.0.168.oe2203sp1.x86_64",
					"openEuler-22.03-LTS-SP1:kernel-5.10.0-136.87.0.168.oe2203sp1.x86_64",
					"openEuler-22.03-LTS-SP1:kernel-debuginfo-5.10.0-136.87.0.168.oe2203sp1.x86_64",
					"openEuler-22.03-LTS-SP1:kernel-source-5.10.0-136.87.0.168.oe2203sp1.x86_64",
					"openEuler-22.03-LTS-SP1:kernel-headers-5.10.0-136.87.0.168.oe2203sp1.x86_64",
					"openEuler-22.03-LTS-SP1:kernel-tools-5.10.0-136.87.0.168.oe2203sp1.x86_64",
					"openEuler-22.03-LTS-SP1:kernel-tools-devel-5.10.0-136.87.0.168.oe2203sp1.x86_64",
					"openEuler-22.03-LTS-SP1:python3-perf-5.10.0-136.87.0.168.oe2203sp1.x86_64",
					"openEuler-22.03-LTS-SP1:kernel-debugsource-5.10.0-136.87.0.168.oe2203sp1.x86_64"
				]
			},
			"remediations":[
				{
					"product_ids":[
						"openEuler-22.03-LTS-SP1:python3-perf-5.10.0-136.87.0.168.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:kernel-debugsource-5.10.0-136.87.0.168.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:kernel-source-5.10.0-136.87.0.168.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:kernel-tools-5.10.0-136.87.0.168.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:kernel-headers-5.10.0-136.87.0.168.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:kernel-tools-devel-5.10.0-136.87.0.168.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:perf-5.10.0-136.87.0.168.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:kernel-devel-5.10.0-136.87.0.168.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:kernel-debuginfo-5.10.0-136.87.0.168.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:kernel-5.10.0-136.87.0.168.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:perf-debuginfo-5.10.0-136.87.0.168.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:python3-perf-debuginfo-5.10.0-136.87.0.168.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:kernel-tools-debuginfo-5.10.0-136.87.0.168.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:kernel-5.10.0-136.87.0.168.oe2203sp1.src",
						"openEuler-22.03-LTS-SP1:python3-perf-debuginfo-5.10.0-136.87.0.168.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:kernel-devel-5.10.0-136.87.0.168.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:kernel-tools-debuginfo-5.10.0-136.87.0.168.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:perf-debuginfo-5.10.0-136.87.0.168.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:perf-5.10.0-136.87.0.168.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:kernel-5.10.0-136.87.0.168.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:kernel-debuginfo-5.10.0-136.87.0.168.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:kernel-source-5.10.0-136.87.0.168.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:kernel-headers-5.10.0-136.87.0.168.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:kernel-tools-5.10.0-136.87.0.168.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:kernel-tools-devel-5.10.0-136.87.0.168.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:python3-perf-5.10.0-136.87.0.168.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:kernel-debugsource-5.10.0-136.87.0.168.oe2203sp1.x86_64"
					],
					"details":"kernel security update",
					"category":"vendor_fix",
					"url":"https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2024-1941"
				}
			],
			"scores":[
				{
					"cvss_v3":{
						"baseSeverity":"MEDIUM",
						"baseScore":4.4,
						"vectorString":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:L",
						"version":"3.1"
					},
					"products":[
						"openEuler-22.03-LTS-SP1:python3-perf-5.10.0-136.87.0.168.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:kernel-debugsource-5.10.0-136.87.0.168.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:kernel-source-5.10.0-136.87.0.168.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:kernel-tools-5.10.0-136.87.0.168.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:kernel-headers-5.10.0-136.87.0.168.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:kernel-tools-devel-5.10.0-136.87.0.168.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:perf-5.10.0-136.87.0.168.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:kernel-devel-5.10.0-136.87.0.168.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:kernel-debuginfo-5.10.0-136.87.0.168.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:kernel-5.10.0-136.87.0.168.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:perf-debuginfo-5.10.0-136.87.0.168.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:python3-perf-debuginfo-5.10.0-136.87.0.168.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:kernel-tools-debuginfo-5.10.0-136.87.0.168.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:kernel-5.10.0-136.87.0.168.oe2203sp1.src",
						"openEuler-22.03-LTS-SP1:python3-perf-debuginfo-5.10.0-136.87.0.168.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:kernel-devel-5.10.0-136.87.0.168.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:kernel-tools-debuginfo-5.10.0-136.87.0.168.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:perf-debuginfo-5.10.0-136.87.0.168.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:perf-5.10.0-136.87.0.168.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:kernel-5.10.0-136.87.0.168.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:kernel-debuginfo-5.10.0-136.87.0.168.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:kernel-source-5.10.0-136.87.0.168.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:kernel-headers-5.10.0-136.87.0.168.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:kernel-tools-5.10.0-136.87.0.168.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:kernel-tools-devel-5.10.0-136.87.0.168.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:python3-perf-5.10.0-136.87.0.168.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:kernel-debugsource-5.10.0-136.87.0.168.oe2203sp1.x86_64"
					]
				}
			],
			"threats":[
				{
					"details":"Medium",
					"category":"impact"
				}
			],
			"title":"CVE-2024-38611"
		},
		{
			"cve":"CVE-2024-38621",
			"notes":[
				{
					"text":"In the Linux kernel, the following vulnerability has been resolved:\n\nmedia: stk1160: fix bounds checking in stk1160_copy_video()\n\nThe subtract in this condition is reversed.  The ->length is the length\nof the buffer.  The ->bytesused is how many bytes we have copied thus\nfar.  When the condition is reversed that means the result of the\nsubtraction is always negative but since it's unsigned then the result\nis a very high positive value.  That means the overflow check is never\ntrue.\n\nAdditionally, the ->bytesused doesn't actually work for this purpose\nbecause we're not writing to \"buf->mem + buf->bytesused\".  Instead, the\nmath to calculate the destination where we are writing is a bit\ninvolved.  You calculate the number of full lines already written,\nmultiply by two, skip a line if necessary so that we start on an odd\nnumbered line, and add the offset into the line.\n\nTo fix this buffer overflow, just take the actual destination where we\nare writing, if the offset is already out of bounds print an error and\nreturn.  Otherwise, write up to buf->length bytes.",
					"category":"description",
					"title":"Vulnerability Description"
				}
			],
			"product_status":{
				"fixed":[
					"openEuler-22.03-LTS-SP1:python3-perf-5.10.0-136.87.0.168.oe2203sp1.aarch64",
					"openEuler-22.03-LTS-SP1:kernel-debugsource-5.10.0-136.87.0.168.oe2203sp1.aarch64",
					"openEuler-22.03-LTS-SP1:kernel-source-5.10.0-136.87.0.168.oe2203sp1.aarch64",
					"openEuler-22.03-LTS-SP1:kernel-tools-5.10.0-136.87.0.168.oe2203sp1.aarch64",
					"openEuler-22.03-LTS-SP1:kernel-headers-5.10.0-136.87.0.168.oe2203sp1.aarch64",
					"openEuler-22.03-LTS-SP1:kernel-tools-devel-5.10.0-136.87.0.168.oe2203sp1.aarch64",
					"openEuler-22.03-LTS-SP1:perf-5.10.0-136.87.0.168.oe2203sp1.aarch64",
					"openEuler-22.03-LTS-SP1:kernel-devel-5.10.0-136.87.0.168.oe2203sp1.aarch64",
					"openEuler-22.03-LTS-SP1:kernel-debuginfo-5.10.0-136.87.0.168.oe2203sp1.aarch64",
					"openEuler-22.03-LTS-SP1:kernel-5.10.0-136.87.0.168.oe2203sp1.aarch64",
					"openEuler-22.03-LTS-SP1:perf-debuginfo-5.10.0-136.87.0.168.oe2203sp1.aarch64",
					"openEuler-22.03-LTS-SP1:python3-perf-debuginfo-5.10.0-136.87.0.168.oe2203sp1.aarch64",
					"openEuler-22.03-LTS-SP1:kernel-tools-debuginfo-5.10.0-136.87.0.168.oe2203sp1.aarch64",
					"openEuler-22.03-LTS-SP1:kernel-5.10.0-136.87.0.168.oe2203sp1.src",
					"openEuler-22.03-LTS-SP1:python3-perf-debuginfo-5.10.0-136.87.0.168.oe2203sp1.x86_64",
					"openEuler-22.03-LTS-SP1:kernel-devel-5.10.0-136.87.0.168.oe2203sp1.x86_64",
					"openEuler-22.03-LTS-SP1:kernel-tools-debuginfo-5.10.0-136.87.0.168.oe2203sp1.x86_64",
					"openEuler-22.03-LTS-SP1:perf-debuginfo-5.10.0-136.87.0.168.oe2203sp1.x86_64",
					"openEuler-22.03-LTS-SP1:perf-5.10.0-136.87.0.168.oe2203sp1.x86_64",
					"openEuler-22.03-LTS-SP1:kernel-5.10.0-136.87.0.168.oe2203sp1.x86_64",
					"openEuler-22.03-LTS-SP1:kernel-debuginfo-5.10.0-136.87.0.168.oe2203sp1.x86_64",
					"openEuler-22.03-LTS-SP1:kernel-source-5.10.0-136.87.0.168.oe2203sp1.x86_64",
					"openEuler-22.03-LTS-SP1:kernel-headers-5.10.0-136.87.0.168.oe2203sp1.x86_64",
					"openEuler-22.03-LTS-SP1:kernel-tools-5.10.0-136.87.0.168.oe2203sp1.x86_64",
					"openEuler-22.03-LTS-SP1:kernel-tools-devel-5.10.0-136.87.0.168.oe2203sp1.x86_64",
					"openEuler-22.03-LTS-SP1:python3-perf-5.10.0-136.87.0.168.oe2203sp1.x86_64",
					"openEuler-22.03-LTS-SP1:kernel-debugsource-5.10.0-136.87.0.168.oe2203sp1.x86_64"
				]
			},
			"remediations":[
				{
					"product_ids":[
						"openEuler-22.03-LTS-SP1:python3-perf-5.10.0-136.87.0.168.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:kernel-debugsource-5.10.0-136.87.0.168.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:kernel-source-5.10.0-136.87.0.168.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:kernel-tools-5.10.0-136.87.0.168.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:kernel-headers-5.10.0-136.87.0.168.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:kernel-tools-devel-5.10.0-136.87.0.168.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:perf-5.10.0-136.87.0.168.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:kernel-devel-5.10.0-136.87.0.168.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:kernel-debuginfo-5.10.0-136.87.0.168.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:kernel-5.10.0-136.87.0.168.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:perf-debuginfo-5.10.0-136.87.0.168.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:python3-perf-debuginfo-5.10.0-136.87.0.168.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:kernel-tools-debuginfo-5.10.0-136.87.0.168.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:kernel-5.10.0-136.87.0.168.oe2203sp1.src",
						"openEuler-22.03-LTS-SP1:python3-perf-debuginfo-5.10.0-136.87.0.168.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:kernel-devel-5.10.0-136.87.0.168.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:kernel-tools-debuginfo-5.10.0-136.87.0.168.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:perf-debuginfo-5.10.0-136.87.0.168.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:perf-5.10.0-136.87.0.168.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:kernel-5.10.0-136.87.0.168.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:kernel-debuginfo-5.10.0-136.87.0.168.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:kernel-source-5.10.0-136.87.0.168.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:kernel-headers-5.10.0-136.87.0.168.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:kernel-tools-5.10.0-136.87.0.168.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:kernel-tools-devel-5.10.0-136.87.0.168.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:python3-perf-5.10.0-136.87.0.168.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:kernel-debugsource-5.10.0-136.87.0.168.oe2203sp1.x86_64"
					],
					"details":"kernel security update",
					"category":"vendor_fix",
					"url":"https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2024-1941"
				}
			],
			"scores":[
				{
					"cvss_v3":{
						"baseSeverity":"MEDIUM",
						"baseScore":5.5,
						"vectorString":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
						"version":"3.1"
					},
					"products":[
						"openEuler-22.03-LTS-SP1:python3-perf-5.10.0-136.87.0.168.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:kernel-debugsource-5.10.0-136.87.0.168.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:kernel-source-5.10.0-136.87.0.168.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:kernel-tools-5.10.0-136.87.0.168.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:kernel-headers-5.10.0-136.87.0.168.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:kernel-tools-devel-5.10.0-136.87.0.168.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:perf-5.10.0-136.87.0.168.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:kernel-devel-5.10.0-136.87.0.168.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:kernel-debuginfo-5.10.0-136.87.0.168.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:kernel-5.10.0-136.87.0.168.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:perf-debuginfo-5.10.0-136.87.0.168.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:python3-perf-debuginfo-5.10.0-136.87.0.168.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:kernel-tools-debuginfo-5.10.0-136.87.0.168.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:kernel-5.10.0-136.87.0.168.oe2203sp1.src",
						"openEuler-22.03-LTS-SP1:python3-perf-debuginfo-5.10.0-136.87.0.168.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:kernel-devel-5.10.0-136.87.0.168.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:kernel-tools-debuginfo-5.10.0-136.87.0.168.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:perf-debuginfo-5.10.0-136.87.0.168.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:perf-5.10.0-136.87.0.168.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:kernel-5.10.0-136.87.0.168.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:kernel-debuginfo-5.10.0-136.87.0.168.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:kernel-source-5.10.0-136.87.0.168.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:kernel-headers-5.10.0-136.87.0.168.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:kernel-tools-5.10.0-136.87.0.168.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:kernel-tools-devel-5.10.0-136.87.0.168.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:python3-perf-5.10.0-136.87.0.168.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:kernel-debugsource-5.10.0-136.87.0.168.oe2203sp1.x86_64"
					]
				}
			],
			"threats":[
				{
					"details":"Medium",
					"category":"impact"
				}
			],
			"title":"CVE-2024-38621"
		},
		{
			"cve":"CVE-2024-39475",
			"notes":[
				{
					"text":"In the Linux kernel, the following vulnerability has been resolved:fbdev: savage: Handle err return when savagefb_check_var failedThe commit 04e5eac8f3ab( fbdev: savage: Error out if pixclock equals zero )checks the value of pixclock to avoid divide-by-zero error. Howeverthe function savagefb_probe doesn t handle the error return ofsavagefb_check_var. When pixclock is 0, it will cause divide-by-zero error.",
					"category":"description",
					"title":"Vulnerability Description"
				}
			],
			"product_status":{
				"fixed":[
					"openEuler-22.03-LTS-SP1:python3-perf-5.10.0-136.87.0.168.oe2203sp1.aarch64",
					"openEuler-22.03-LTS-SP1:kernel-debugsource-5.10.0-136.87.0.168.oe2203sp1.aarch64",
					"openEuler-22.03-LTS-SP1:kernel-source-5.10.0-136.87.0.168.oe2203sp1.aarch64",
					"openEuler-22.03-LTS-SP1:kernel-tools-5.10.0-136.87.0.168.oe2203sp1.aarch64",
					"openEuler-22.03-LTS-SP1:kernel-headers-5.10.0-136.87.0.168.oe2203sp1.aarch64",
					"openEuler-22.03-LTS-SP1:kernel-tools-devel-5.10.0-136.87.0.168.oe2203sp1.aarch64",
					"openEuler-22.03-LTS-SP1:perf-5.10.0-136.87.0.168.oe2203sp1.aarch64",
					"openEuler-22.03-LTS-SP1:kernel-devel-5.10.0-136.87.0.168.oe2203sp1.aarch64",
					"openEuler-22.03-LTS-SP1:kernel-debuginfo-5.10.0-136.87.0.168.oe2203sp1.aarch64",
					"openEuler-22.03-LTS-SP1:kernel-5.10.0-136.87.0.168.oe2203sp1.aarch64",
					"openEuler-22.03-LTS-SP1:perf-debuginfo-5.10.0-136.87.0.168.oe2203sp1.aarch64",
					"openEuler-22.03-LTS-SP1:python3-perf-debuginfo-5.10.0-136.87.0.168.oe2203sp1.aarch64",
					"openEuler-22.03-LTS-SP1:kernel-tools-debuginfo-5.10.0-136.87.0.168.oe2203sp1.aarch64",
					"openEuler-22.03-LTS-SP1:kernel-5.10.0-136.87.0.168.oe2203sp1.src",
					"openEuler-22.03-LTS-SP1:python3-perf-debuginfo-5.10.0-136.87.0.168.oe2203sp1.x86_64",
					"openEuler-22.03-LTS-SP1:kernel-devel-5.10.0-136.87.0.168.oe2203sp1.x86_64",
					"openEuler-22.03-LTS-SP1:kernel-tools-debuginfo-5.10.0-136.87.0.168.oe2203sp1.x86_64",
					"openEuler-22.03-LTS-SP1:perf-debuginfo-5.10.0-136.87.0.168.oe2203sp1.x86_64",
					"openEuler-22.03-LTS-SP1:perf-5.10.0-136.87.0.168.oe2203sp1.x86_64",
					"openEuler-22.03-LTS-SP1:kernel-5.10.0-136.87.0.168.oe2203sp1.x86_64",
					"openEuler-22.03-LTS-SP1:kernel-debuginfo-5.10.0-136.87.0.168.oe2203sp1.x86_64",
					"openEuler-22.03-LTS-SP1:kernel-source-5.10.0-136.87.0.168.oe2203sp1.x86_64",
					"openEuler-22.03-LTS-SP1:kernel-headers-5.10.0-136.87.0.168.oe2203sp1.x86_64",
					"openEuler-22.03-LTS-SP1:kernel-tools-5.10.0-136.87.0.168.oe2203sp1.x86_64",
					"openEuler-22.03-LTS-SP1:kernel-tools-devel-5.10.0-136.87.0.168.oe2203sp1.x86_64",
					"openEuler-22.03-LTS-SP1:python3-perf-5.10.0-136.87.0.168.oe2203sp1.x86_64",
					"openEuler-22.03-LTS-SP1:kernel-debugsource-5.10.0-136.87.0.168.oe2203sp1.x86_64"
				]
			},
			"remediations":[
				{
					"product_ids":[
						"openEuler-22.03-LTS-SP1:python3-perf-5.10.0-136.87.0.168.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:kernel-debugsource-5.10.0-136.87.0.168.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:kernel-source-5.10.0-136.87.0.168.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:kernel-tools-5.10.0-136.87.0.168.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:kernel-headers-5.10.0-136.87.0.168.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:kernel-tools-devel-5.10.0-136.87.0.168.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:perf-5.10.0-136.87.0.168.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:kernel-devel-5.10.0-136.87.0.168.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:kernel-debuginfo-5.10.0-136.87.0.168.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:kernel-5.10.0-136.87.0.168.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:perf-debuginfo-5.10.0-136.87.0.168.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:python3-perf-debuginfo-5.10.0-136.87.0.168.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:kernel-tools-debuginfo-5.10.0-136.87.0.168.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:kernel-5.10.0-136.87.0.168.oe2203sp1.src",
						"openEuler-22.03-LTS-SP1:python3-perf-debuginfo-5.10.0-136.87.0.168.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:kernel-devel-5.10.0-136.87.0.168.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:kernel-tools-debuginfo-5.10.0-136.87.0.168.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:perf-debuginfo-5.10.0-136.87.0.168.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:perf-5.10.0-136.87.0.168.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:kernel-5.10.0-136.87.0.168.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:kernel-debuginfo-5.10.0-136.87.0.168.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:kernel-source-5.10.0-136.87.0.168.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:kernel-headers-5.10.0-136.87.0.168.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:kernel-tools-5.10.0-136.87.0.168.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:kernel-tools-devel-5.10.0-136.87.0.168.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:python3-perf-5.10.0-136.87.0.168.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:kernel-debugsource-5.10.0-136.87.0.168.oe2203sp1.x86_64"
					],
					"details":"kernel security update",
					"category":"vendor_fix",
					"url":"https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2024-1941"
				}
			],
			"scores":[
				{
					"cvss_v3":{
						"baseSeverity":"MEDIUM",
						"baseScore":5.5,
						"vectorString":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
						"version":"3.1"
					},
					"products":[
						"openEuler-22.03-LTS-SP1:python3-perf-5.10.0-136.87.0.168.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:kernel-debugsource-5.10.0-136.87.0.168.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:kernel-source-5.10.0-136.87.0.168.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:kernel-tools-5.10.0-136.87.0.168.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:kernel-headers-5.10.0-136.87.0.168.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:kernel-tools-devel-5.10.0-136.87.0.168.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:perf-5.10.0-136.87.0.168.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:kernel-devel-5.10.0-136.87.0.168.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:kernel-debuginfo-5.10.0-136.87.0.168.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:kernel-5.10.0-136.87.0.168.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:perf-debuginfo-5.10.0-136.87.0.168.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:python3-perf-debuginfo-5.10.0-136.87.0.168.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:kernel-tools-debuginfo-5.10.0-136.87.0.168.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:kernel-5.10.0-136.87.0.168.oe2203sp1.src",
						"openEuler-22.03-LTS-SP1:python3-perf-debuginfo-5.10.0-136.87.0.168.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:kernel-devel-5.10.0-136.87.0.168.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:kernel-tools-debuginfo-5.10.0-136.87.0.168.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:perf-debuginfo-5.10.0-136.87.0.168.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:perf-5.10.0-136.87.0.168.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:kernel-5.10.0-136.87.0.168.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:kernel-debuginfo-5.10.0-136.87.0.168.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:kernel-source-5.10.0-136.87.0.168.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:kernel-headers-5.10.0-136.87.0.168.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:kernel-tools-5.10.0-136.87.0.168.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:kernel-tools-devel-5.10.0-136.87.0.168.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:python3-perf-5.10.0-136.87.0.168.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:kernel-debugsource-5.10.0-136.87.0.168.oe2203sp1.x86_64"
					]
				}
			],
			"threats":[
				{
					"details":"Medium",
					"category":"impact"
				}
			],
			"title":"CVE-2024-39475"
		},
		{
			"cve":"CVE-2024-39476",
			"notes":[
				{
					"text":"In the Linux kernel, the following vulnerability has been resolved:\n\nmd/raid5: fix deadlock that raid5d() wait for itself to clear MD_SB_CHANGE_PENDING\n\nXiao reported that lvm2 test lvconvert-raid-takeover.sh can hang with\nsmall possibility, the root cause is exactly the same as commit\nbed9e27baf52 (\"Revert \"md/raid5: Wait for MD_SB_CHANGE_PENDING in raid5d\"\")\n\nHowever, Dan reported another hang after that, and junxiao investigated\nthe problem and found out that this is caused by plugged bio can't issue\nfrom raid5d().\n\nCurrent implementation in raid5d() has a weird dependence:\n\n1) md_check_recovery() from raid5d() must hold 'reconfig_mutex' to clear\n   MD_SB_CHANGE_PENDING;\n2) raid5d() handles IO in a deadloop, until all IO are issued;\n3) IO from raid5d() must wait for MD_SB_CHANGE_PENDING to be cleared;\n\nThis behaviour is introduce before v2.6, and for consequence, if other\ncontext hold 'reconfig_mutex', and md_check_recovery() can't update\nsuper_block, then raid5d() will waste one cpu 100% by the deadloop, until\n'reconfig_mutex' is released.\n\nRefer to the implementation from raid1 and raid10, fix this problem by\nskipping issue IO if MD_SB_CHANGE_PENDING is still set after\nmd_check_recovery(), daemon thread will be woken up when 'reconfig_mutex'\nis released. Meanwhile, the hang problem will be fixed as well.",
					"category":"description",
					"title":"Vulnerability Description"
				}
			],
			"product_status":{
				"fixed":[
					"openEuler-22.03-LTS-SP1:python3-perf-5.10.0-136.87.0.168.oe2203sp1.aarch64",
					"openEuler-22.03-LTS-SP1:kernel-debugsource-5.10.0-136.87.0.168.oe2203sp1.aarch64",
					"openEuler-22.03-LTS-SP1:kernel-source-5.10.0-136.87.0.168.oe2203sp1.aarch64",
					"openEuler-22.03-LTS-SP1:kernel-tools-5.10.0-136.87.0.168.oe2203sp1.aarch64",
					"openEuler-22.03-LTS-SP1:kernel-headers-5.10.0-136.87.0.168.oe2203sp1.aarch64",
					"openEuler-22.03-LTS-SP1:kernel-tools-devel-5.10.0-136.87.0.168.oe2203sp1.aarch64",
					"openEuler-22.03-LTS-SP1:perf-5.10.0-136.87.0.168.oe2203sp1.aarch64",
					"openEuler-22.03-LTS-SP1:kernel-devel-5.10.0-136.87.0.168.oe2203sp1.aarch64",
					"openEuler-22.03-LTS-SP1:kernel-debuginfo-5.10.0-136.87.0.168.oe2203sp1.aarch64",
					"openEuler-22.03-LTS-SP1:kernel-5.10.0-136.87.0.168.oe2203sp1.aarch64",
					"openEuler-22.03-LTS-SP1:perf-debuginfo-5.10.0-136.87.0.168.oe2203sp1.aarch64",
					"openEuler-22.03-LTS-SP1:python3-perf-debuginfo-5.10.0-136.87.0.168.oe2203sp1.aarch64",
					"openEuler-22.03-LTS-SP1:kernel-tools-debuginfo-5.10.0-136.87.0.168.oe2203sp1.aarch64",
					"openEuler-22.03-LTS-SP1:kernel-5.10.0-136.87.0.168.oe2203sp1.src",
					"openEuler-22.03-LTS-SP1:python3-perf-debuginfo-5.10.0-136.87.0.168.oe2203sp1.x86_64",
					"openEuler-22.03-LTS-SP1:kernel-devel-5.10.0-136.87.0.168.oe2203sp1.x86_64",
					"openEuler-22.03-LTS-SP1:kernel-tools-debuginfo-5.10.0-136.87.0.168.oe2203sp1.x86_64",
					"openEuler-22.03-LTS-SP1:perf-debuginfo-5.10.0-136.87.0.168.oe2203sp1.x86_64",
					"openEuler-22.03-LTS-SP1:perf-5.10.0-136.87.0.168.oe2203sp1.x86_64",
					"openEuler-22.03-LTS-SP1:kernel-5.10.0-136.87.0.168.oe2203sp1.x86_64",
					"openEuler-22.03-LTS-SP1:kernel-debuginfo-5.10.0-136.87.0.168.oe2203sp1.x86_64",
					"openEuler-22.03-LTS-SP1:kernel-source-5.10.0-136.87.0.168.oe2203sp1.x86_64",
					"openEuler-22.03-LTS-SP1:kernel-headers-5.10.0-136.87.0.168.oe2203sp1.x86_64",
					"openEuler-22.03-LTS-SP1:kernel-tools-5.10.0-136.87.0.168.oe2203sp1.x86_64",
					"openEuler-22.03-LTS-SP1:kernel-tools-devel-5.10.0-136.87.0.168.oe2203sp1.x86_64",
					"openEuler-22.03-LTS-SP1:python3-perf-5.10.0-136.87.0.168.oe2203sp1.x86_64",
					"openEuler-22.03-LTS-SP1:kernel-debugsource-5.10.0-136.87.0.168.oe2203sp1.x86_64"
				]
			},
			"remediations":[
				{
					"product_ids":[
						"openEuler-22.03-LTS-SP1:python3-perf-5.10.0-136.87.0.168.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:kernel-debugsource-5.10.0-136.87.0.168.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:kernel-source-5.10.0-136.87.0.168.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:kernel-tools-5.10.0-136.87.0.168.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:kernel-headers-5.10.0-136.87.0.168.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:kernel-tools-devel-5.10.0-136.87.0.168.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:perf-5.10.0-136.87.0.168.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:kernel-devel-5.10.0-136.87.0.168.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:kernel-debuginfo-5.10.0-136.87.0.168.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:kernel-5.10.0-136.87.0.168.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:perf-debuginfo-5.10.0-136.87.0.168.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:python3-perf-debuginfo-5.10.0-136.87.0.168.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:kernel-tools-debuginfo-5.10.0-136.87.0.168.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:kernel-5.10.0-136.87.0.168.oe2203sp1.src",
						"openEuler-22.03-LTS-SP1:python3-perf-debuginfo-5.10.0-136.87.0.168.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:kernel-devel-5.10.0-136.87.0.168.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:kernel-tools-debuginfo-5.10.0-136.87.0.168.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:perf-debuginfo-5.10.0-136.87.0.168.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:perf-5.10.0-136.87.0.168.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:kernel-5.10.0-136.87.0.168.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:kernel-debuginfo-5.10.0-136.87.0.168.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:kernel-source-5.10.0-136.87.0.168.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:kernel-headers-5.10.0-136.87.0.168.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:kernel-tools-5.10.0-136.87.0.168.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:kernel-tools-devel-5.10.0-136.87.0.168.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:python3-perf-5.10.0-136.87.0.168.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:kernel-debugsource-5.10.0-136.87.0.168.oe2203sp1.x86_64"
					],
					"details":"kernel security update",
					"category":"vendor_fix",
					"url":"https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2024-1941"
				}
			],
			"scores":[
				{
					"cvss_v3":{
						"baseSeverity":"MEDIUM",
						"baseScore":5.5,
						"vectorString":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
						"version":"3.1"
					},
					"products":[
						"openEuler-22.03-LTS-SP1:python3-perf-5.10.0-136.87.0.168.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:kernel-debugsource-5.10.0-136.87.0.168.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:kernel-source-5.10.0-136.87.0.168.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:kernel-tools-5.10.0-136.87.0.168.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:kernel-headers-5.10.0-136.87.0.168.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:kernel-tools-devel-5.10.0-136.87.0.168.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:perf-5.10.0-136.87.0.168.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:kernel-devel-5.10.0-136.87.0.168.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:kernel-debuginfo-5.10.0-136.87.0.168.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:kernel-5.10.0-136.87.0.168.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:perf-debuginfo-5.10.0-136.87.0.168.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:python3-perf-debuginfo-5.10.0-136.87.0.168.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:kernel-tools-debuginfo-5.10.0-136.87.0.168.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:kernel-5.10.0-136.87.0.168.oe2203sp1.src",
						"openEuler-22.03-LTS-SP1:python3-perf-debuginfo-5.10.0-136.87.0.168.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:kernel-devel-5.10.0-136.87.0.168.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:kernel-tools-debuginfo-5.10.0-136.87.0.168.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:perf-debuginfo-5.10.0-136.87.0.168.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:perf-5.10.0-136.87.0.168.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:kernel-5.10.0-136.87.0.168.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:kernel-debuginfo-5.10.0-136.87.0.168.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:kernel-source-5.10.0-136.87.0.168.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:kernel-headers-5.10.0-136.87.0.168.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:kernel-tools-5.10.0-136.87.0.168.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:kernel-tools-devel-5.10.0-136.87.0.168.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:python3-perf-5.10.0-136.87.0.168.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:kernel-debugsource-5.10.0-136.87.0.168.oe2203sp1.x86_64"
					]
				}
			],
			"threats":[
				{
					"details":"Medium",
					"category":"impact"
				}
			],
			"title":"CVE-2024-39476"
		},
		{
			"cve":"CVE-2024-39484",
			"notes":[
				{
					"text":"In the Linux kernel, the following vulnerability has been resolved:mmc: davinci: Don t strip remove function when driver is builtinUsing __exit for the remove function results in the remove callback beingdiscarded with CONFIG_MMC_DAVINCI=y. When such a device gets unbound (e.g.using sysfs or hotplug), the driver is just removed without the cleanupbeing performed. This results in resource leaks. Fix it by compiling in theremove callback unconditionally.This also fixes a W=1 modpost warning:WARNING: modpost: drivers/mmc/host/davinci_mmc: section mismatch inreference: davinci_mmcsd_driver+0x10 (section: .data) ->davinci_mmcsd_remove (section: .exit.text)",
					"category":"description",
					"title":"Vulnerability Description"
				}
			],
			"product_status":{
				"fixed":[
					"openEuler-22.03-LTS-SP1:python3-perf-5.10.0-136.87.0.168.oe2203sp1.aarch64",
					"openEuler-22.03-LTS-SP1:kernel-debugsource-5.10.0-136.87.0.168.oe2203sp1.aarch64",
					"openEuler-22.03-LTS-SP1:kernel-source-5.10.0-136.87.0.168.oe2203sp1.aarch64",
					"openEuler-22.03-LTS-SP1:kernel-tools-5.10.0-136.87.0.168.oe2203sp1.aarch64",
					"openEuler-22.03-LTS-SP1:kernel-headers-5.10.0-136.87.0.168.oe2203sp1.aarch64",
					"openEuler-22.03-LTS-SP1:kernel-tools-devel-5.10.0-136.87.0.168.oe2203sp1.aarch64",
					"openEuler-22.03-LTS-SP1:perf-5.10.0-136.87.0.168.oe2203sp1.aarch64",
					"openEuler-22.03-LTS-SP1:kernel-devel-5.10.0-136.87.0.168.oe2203sp1.aarch64",
					"openEuler-22.03-LTS-SP1:kernel-debuginfo-5.10.0-136.87.0.168.oe2203sp1.aarch64",
					"openEuler-22.03-LTS-SP1:kernel-5.10.0-136.87.0.168.oe2203sp1.aarch64",
					"openEuler-22.03-LTS-SP1:perf-debuginfo-5.10.0-136.87.0.168.oe2203sp1.aarch64",
					"openEuler-22.03-LTS-SP1:python3-perf-debuginfo-5.10.0-136.87.0.168.oe2203sp1.aarch64",
					"openEuler-22.03-LTS-SP1:kernel-tools-debuginfo-5.10.0-136.87.0.168.oe2203sp1.aarch64",
					"openEuler-22.03-LTS-SP1:kernel-5.10.0-136.87.0.168.oe2203sp1.src",
					"openEuler-22.03-LTS-SP1:python3-perf-debuginfo-5.10.0-136.87.0.168.oe2203sp1.x86_64",
					"openEuler-22.03-LTS-SP1:kernel-devel-5.10.0-136.87.0.168.oe2203sp1.x86_64",
					"openEuler-22.03-LTS-SP1:kernel-tools-debuginfo-5.10.0-136.87.0.168.oe2203sp1.x86_64",
					"openEuler-22.03-LTS-SP1:perf-debuginfo-5.10.0-136.87.0.168.oe2203sp1.x86_64",
					"openEuler-22.03-LTS-SP1:perf-5.10.0-136.87.0.168.oe2203sp1.x86_64",
					"openEuler-22.03-LTS-SP1:kernel-5.10.0-136.87.0.168.oe2203sp1.x86_64",
					"openEuler-22.03-LTS-SP1:kernel-debuginfo-5.10.0-136.87.0.168.oe2203sp1.x86_64",
					"openEuler-22.03-LTS-SP1:kernel-source-5.10.0-136.87.0.168.oe2203sp1.x86_64",
					"openEuler-22.03-LTS-SP1:kernel-headers-5.10.0-136.87.0.168.oe2203sp1.x86_64",
					"openEuler-22.03-LTS-SP1:kernel-tools-5.10.0-136.87.0.168.oe2203sp1.x86_64",
					"openEuler-22.03-LTS-SP1:kernel-tools-devel-5.10.0-136.87.0.168.oe2203sp1.x86_64",
					"openEuler-22.03-LTS-SP1:python3-perf-5.10.0-136.87.0.168.oe2203sp1.x86_64",
					"openEuler-22.03-LTS-SP1:kernel-debugsource-5.10.0-136.87.0.168.oe2203sp1.x86_64"
				]
			},
			"remediations":[
				{
					"product_ids":[
						"openEuler-22.03-LTS-SP1:python3-perf-5.10.0-136.87.0.168.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:kernel-debugsource-5.10.0-136.87.0.168.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:kernel-source-5.10.0-136.87.0.168.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:kernel-tools-5.10.0-136.87.0.168.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:kernel-headers-5.10.0-136.87.0.168.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:kernel-tools-devel-5.10.0-136.87.0.168.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:perf-5.10.0-136.87.0.168.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:kernel-devel-5.10.0-136.87.0.168.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:kernel-debuginfo-5.10.0-136.87.0.168.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:kernel-5.10.0-136.87.0.168.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:perf-debuginfo-5.10.0-136.87.0.168.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:python3-perf-debuginfo-5.10.0-136.87.0.168.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:kernel-tools-debuginfo-5.10.0-136.87.0.168.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:kernel-5.10.0-136.87.0.168.oe2203sp1.src",
						"openEuler-22.03-LTS-SP1:python3-perf-debuginfo-5.10.0-136.87.0.168.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:kernel-devel-5.10.0-136.87.0.168.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:kernel-tools-debuginfo-5.10.0-136.87.0.168.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:perf-debuginfo-5.10.0-136.87.0.168.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:perf-5.10.0-136.87.0.168.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:kernel-5.10.0-136.87.0.168.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:kernel-debuginfo-5.10.0-136.87.0.168.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:kernel-source-5.10.0-136.87.0.168.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:kernel-headers-5.10.0-136.87.0.168.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:kernel-tools-5.10.0-136.87.0.168.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:kernel-tools-devel-5.10.0-136.87.0.168.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:python3-perf-5.10.0-136.87.0.168.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:kernel-debugsource-5.10.0-136.87.0.168.oe2203sp1.x86_64"
					],
					"details":"kernel security update",
					"category":"vendor_fix",
					"url":"https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2024-1941"
				}
			],
			"scores":[
				{
					"cvss_v3":{
						"baseSeverity":"MEDIUM",
						"baseScore":5.5,
						"vectorString":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
						"version":"3.1"
					},
					"products":[
						"openEuler-22.03-LTS-SP1:python3-perf-5.10.0-136.87.0.168.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:kernel-debugsource-5.10.0-136.87.0.168.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:kernel-source-5.10.0-136.87.0.168.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:kernel-tools-5.10.0-136.87.0.168.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:kernel-headers-5.10.0-136.87.0.168.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:kernel-tools-devel-5.10.0-136.87.0.168.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:perf-5.10.0-136.87.0.168.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:kernel-devel-5.10.0-136.87.0.168.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:kernel-debuginfo-5.10.0-136.87.0.168.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:kernel-5.10.0-136.87.0.168.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:perf-debuginfo-5.10.0-136.87.0.168.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:python3-perf-debuginfo-5.10.0-136.87.0.168.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:kernel-tools-debuginfo-5.10.0-136.87.0.168.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:kernel-5.10.0-136.87.0.168.oe2203sp1.src",
						"openEuler-22.03-LTS-SP1:python3-perf-debuginfo-5.10.0-136.87.0.168.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:kernel-devel-5.10.0-136.87.0.168.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:kernel-tools-debuginfo-5.10.0-136.87.0.168.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:perf-debuginfo-5.10.0-136.87.0.168.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:perf-5.10.0-136.87.0.168.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:kernel-5.10.0-136.87.0.168.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:kernel-debuginfo-5.10.0-136.87.0.168.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:kernel-source-5.10.0-136.87.0.168.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:kernel-headers-5.10.0-136.87.0.168.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:kernel-tools-5.10.0-136.87.0.168.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:kernel-tools-devel-5.10.0-136.87.0.168.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:python3-perf-5.10.0-136.87.0.168.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:kernel-debugsource-5.10.0-136.87.0.168.oe2203sp1.x86_64"
					]
				}
			],
			"threats":[
				{
					"details":"Medium",
					"category":"impact"
				}
			],
			"title":"CVE-2024-39484"
		},
		{
			"cve":"CVE-2024-39506",
			"notes":[
				{
					"text":"In the Linux kernel, the following vulnerability has been resolved:\n\nliquidio: Adjust a NULL pointer handling path in lio_vf_rep_copy_packet\n\nIn lio_vf_rep_copy_packet() pg_info->page is compared to a NULL value,\nbut then it is unconditionally passed to skb_add_rx_frag() which looks\nstrange and could lead to null pointer dereference.\n\nlio_vf_rep_copy_packet() call trace looks like:\n\tocteon_droq_process_packets\n\t octeon_droq_fast_process_packets\n\t  octeon_droq_dispatch_pkt\n\t   octeon_create_recv_info\n\t    ...search in the dispatch_list...\n\t     ->disp_fn(rdisp->rinfo, ...)\n\t      lio_vf_rep_pkt_recv(struct octeon_recv_info *recv_info, ...)\nIn this path there is no code which sets pg_info->page to NULL.\nSo this check looks unneeded and doesn't solve potential problem.\nBut I guess the author had reason to add a check and I have no such card\nand can't do real test.\nIn addition, the code in the function liquidio_push_packet() in\nliquidio/lio_core.c does exactly the same.\n\nBased on this, I consider the most acceptable compromise solution to\nadjust this issue by moving skb_add_rx_frag() into conditional scope.\n\nFound by Linux Verification Center (linuxtesting.org) with SVACE.",
					"category":"description",
					"title":"Vulnerability Description"
				}
			],
			"product_status":{
				"fixed":[
					"openEuler-22.03-LTS-SP1:python3-perf-5.10.0-136.87.0.168.oe2203sp1.aarch64",
					"openEuler-22.03-LTS-SP1:kernel-debugsource-5.10.0-136.87.0.168.oe2203sp1.aarch64",
					"openEuler-22.03-LTS-SP1:kernel-source-5.10.0-136.87.0.168.oe2203sp1.aarch64",
					"openEuler-22.03-LTS-SP1:kernel-tools-5.10.0-136.87.0.168.oe2203sp1.aarch64",
					"openEuler-22.03-LTS-SP1:kernel-headers-5.10.0-136.87.0.168.oe2203sp1.aarch64",
					"openEuler-22.03-LTS-SP1:kernel-tools-devel-5.10.0-136.87.0.168.oe2203sp1.aarch64",
					"openEuler-22.03-LTS-SP1:perf-5.10.0-136.87.0.168.oe2203sp1.aarch64",
					"openEuler-22.03-LTS-SP1:kernel-devel-5.10.0-136.87.0.168.oe2203sp1.aarch64",
					"openEuler-22.03-LTS-SP1:kernel-debuginfo-5.10.0-136.87.0.168.oe2203sp1.aarch64",
					"openEuler-22.03-LTS-SP1:kernel-5.10.0-136.87.0.168.oe2203sp1.aarch64",
					"openEuler-22.03-LTS-SP1:perf-debuginfo-5.10.0-136.87.0.168.oe2203sp1.aarch64",
					"openEuler-22.03-LTS-SP1:python3-perf-debuginfo-5.10.0-136.87.0.168.oe2203sp1.aarch64",
					"openEuler-22.03-LTS-SP1:kernel-tools-debuginfo-5.10.0-136.87.0.168.oe2203sp1.aarch64",
					"openEuler-22.03-LTS-SP1:kernel-5.10.0-136.87.0.168.oe2203sp1.src",
					"openEuler-22.03-LTS-SP1:python3-perf-debuginfo-5.10.0-136.87.0.168.oe2203sp1.x86_64",
					"openEuler-22.03-LTS-SP1:kernel-devel-5.10.0-136.87.0.168.oe2203sp1.x86_64",
					"openEuler-22.03-LTS-SP1:kernel-tools-debuginfo-5.10.0-136.87.0.168.oe2203sp1.x86_64",
					"openEuler-22.03-LTS-SP1:perf-debuginfo-5.10.0-136.87.0.168.oe2203sp1.x86_64",
					"openEuler-22.03-LTS-SP1:perf-5.10.0-136.87.0.168.oe2203sp1.x86_64",
					"openEuler-22.03-LTS-SP1:kernel-5.10.0-136.87.0.168.oe2203sp1.x86_64",
					"openEuler-22.03-LTS-SP1:kernel-debuginfo-5.10.0-136.87.0.168.oe2203sp1.x86_64",
					"openEuler-22.03-LTS-SP1:kernel-source-5.10.0-136.87.0.168.oe2203sp1.x86_64",
					"openEuler-22.03-LTS-SP1:kernel-headers-5.10.0-136.87.0.168.oe2203sp1.x86_64",
					"openEuler-22.03-LTS-SP1:kernel-tools-5.10.0-136.87.0.168.oe2203sp1.x86_64",
					"openEuler-22.03-LTS-SP1:kernel-tools-devel-5.10.0-136.87.0.168.oe2203sp1.x86_64",
					"openEuler-22.03-LTS-SP1:python3-perf-5.10.0-136.87.0.168.oe2203sp1.x86_64",
					"openEuler-22.03-LTS-SP1:kernel-debugsource-5.10.0-136.87.0.168.oe2203sp1.x86_64"
				]
			},
			"remediations":[
				{
					"product_ids":[
						"openEuler-22.03-LTS-SP1:python3-perf-5.10.0-136.87.0.168.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:kernel-debugsource-5.10.0-136.87.0.168.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:kernel-source-5.10.0-136.87.0.168.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:kernel-tools-5.10.0-136.87.0.168.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:kernel-headers-5.10.0-136.87.0.168.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:kernel-tools-devel-5.10.0-136.87.0.168.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:perf-5.10.0-136.87.0.168.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:kernel-devel-5.10.0-136.87.0.168.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:kernel-debuginfo-5.10.0-136.87.0.168.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:kernel-5.10.0-136.87.0.168.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:perf-debuginfo-5.10.0-136.87.0.168.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:python3-perf-debuginfo-5.10.0-136.87.0.168.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:kernel-tools-debuginfo-5.10.0-136.87.0.168.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:kernel-5.10.0-136.87.0.168.oe2203sp1.src",
						"openEuler-22.03-LTS-SP1:python3-perf-debuginfo-5.10.0-136.87.0.168.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:kernel-devel-5.10.0-136.87.0.168.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:kernel-tools-debuginfo-5.10.0-136.87.0.168.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:perf-debuginfo-5.10.0-136.87.0.168.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:perf-5.10.0-136.87.0.168.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:kernel-5.10.0-136.87.0.168.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:kernel-debuginfo-5.10.0-136.87.0.168.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:kernel-source-5.10.0-136.87.0.168.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:kernel-headers-5.10.0-136.87.0.168.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:kernel-tools-5.10.0-136.87.0.168.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:kernel-tools-devel-5.10.0-136.87.0.168.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:python3-perf-5.10.0-136.87.0.168.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:kernel-debugsource-5.10.0-136.87.0.168.oe2203sp1.x86_64"
					],
					"details":"kernel security update",
					"category":"vendor_fix",
					"url":"https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2024-1941"
				}
			],
			"scores":[
				{
					"cvss_v3":{
						"baseSeverity":"MEDIUM",
						"baseScore":5.5,
						"vectorString":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
						"version":"3.1"
					},
					"products":[
						"openEuler-22.03-LTS-SP1:python3-perf-5.10.0-136.87.0.168.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:kernel-debugsource-5.10.0-136.87.0.168.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:kernel-source-5.10.0-136.87.0.168.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:kernel-tools-5.10.0-136.87.0.168.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:kernel-headers-5.10.0-136.87.0.168.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:kernel-tools-devel-5.10.0-136.87.0.168.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:perf-5.10.0-136.87.0.168.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:kernel-devel-5.10.0-136.87.0.168.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:kernel-debuginfo-5.10.0-136.87.0.168.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:kernel-5.10.0-136.87.0.168.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:perf-debuginfo-5.10.0-136.87.0.168.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:python3-perf-debuginfo-5.10.0-136.87.0.168.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:kernel-tools-debuginfo-5.10.0-136.87.0.168.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:kernel-5.10.0-136.87.0.168.oe2203sp1.src",
						"openEuler-22.03-LTS-SP1:python3-perf-debuginfo-5.10.0-136.87.0.168.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:kernel-devel-5.10.0-136.87.0.168.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:kernel-tools-debuginfo-5.10.0-136.87.0.168.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:perf-debuginfo-5.10.0-136.87.0.168.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:perf-5.10.0-136.87.0.168.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:kernel-5.10.0-136.87.0.168.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:kernel-debuginfo-5.10.0-136.87.0.168.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:kernel-source-5.10.0-136.87.0.168.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:kernel-headers-5.10.0-136.87.0.168.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:kernel-tools-5.10.0-136.87.0.168.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:kernel-tools-devel-5.10.0-136.87.0.168.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:python3-perf-5.10.0-136.87.0.168.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:kernel-debugsource-5.10.0-136.87.0.168.oe2203sp1.x86_64"
					]
				}
			],
			"threats":[
				{
					"details":"Medium",
					"category":"impact"
				}
			],
			"title":"CVE-2024-39506"
		},
		{
			"cve":"CVE-2024-39508",
			"notes":[
				{
					"text":"In the Linux kernel, the following vulnerability has been resolved:\n\nio_uring/io-wq: Use set_bit() and test_bit() at worker->flags\n\nUtilize set_bit() and test_bit() on worker->flags within io_uring/io-wq\nto address potential data races.\n\nThe structure io_worker->flags may be accessed through various data\npaths, leading to concurrency issues. When KCSAN is enabled, it reveals\ndata races occurring in io_worker_handle_work and\nio_wq_activate_free_worker functions.\n\n\t BUG: KCSAN: data-race in io_worker_handle_work / io_wq_activate_free_worker\n\t write to 0xffff8885c4246404 of 4 bytes by task 49071 on cpu 28:\n\t io_worker_handle_work (io_uring/io-wq.c:434 io_uring/io-wq.c:569)\n\t io_wq_worker (io_uring/io-wq.c:?)\n<snip>\n\n\t read to 0xffff8885c4246404 of 4 bytes by task 49024 on cpu 5:\n\t io_wq_activate_free_worker (io_uring/io-wq.c:? io_uring/io-wq.c:285)\n\t io_wq_enqueue (io_uring/io-wq.c:947)\n\t io_queue_iowq (io_uring/io_uring.c:524)\n\t io_req_task_submit (io_uring/io_uring.c:1511)\n\t io_handle_tw_list (io_uring/io_uring.c:1198)\n<snip>\n\nLine numbers against commit 18daea77cca6 (\"Merge tag 'for-linus' of\ngit://git.kernel.org/pub/scm/virt/kvm/kvm\").\n\nThese races involve writes and reads to the same memory location by\ndifferent tasks running on different CPUs. To mitigate this, refactor\nthe code to use atomic operations such as set_bit(), test_bit(), and\nclear_bit() instead of basic \"and\" and \"or\" operations. This ensures\nthread-safe manipulation of worker flags.\n\nAlso, move `create_index` to avoid holes in the structure.",
					"category":"description",
					"title":"Vulnerability Description"
				}
			],
			"product_status":{
				"fixed":[
					"openEuler-22.03-LTS-SP1:python3-perf-5.10.0-136.87.0.168.oe2203sp1.aarch64",
					"openEuler-22.03-LTS-SP1:kernel-debugsource-5.10.0-136.87.0.168.oe2203sp1.aarch64",
					"openEuler-22.03-LTS-SP1:kernel-source-5.10.0-136.87.0.168.oe2203sp1.aarch64",
					"openEuler-22.03-LTS-SP1:kernel-tools-5.10.0-136.87.0.168.oe2203sp1.aarch64",
					"openEuler-22.03-LTS-SP1:kernel-headers-5.10.0-136.87.0.168.oe2203sp1.aarch64",
					"openEuler-22.03-LTS-SP1:kernel-tools-devel-5.10.0-136.87.0.168.oe2203sp1.aarch64",
					"openEuler-22.03-LTS-SP1:perf-5.10.0-136.87.0.168.oe2203sp1.aarch64",
					"openEuler-22.03-LTS-SP1:kernel-devel-5.10.0-136.87.0.168.oe2203sp1.aarch64",
					"openEuler-22.03-LTS-SP1:kernel-debuginfo-5.10.0-136.87.0.168.oe2203sp1.aarch64",
					"openEuler-22.03-LTS-SP1:kernel-5.10.0-136.87.0.168.oe2203sp1.aarch64",
					"openEuler-22.03-LTS-SP1:perf-debuginfo-5.10.0-136.87.0.168.oe2203sp1.aarch64",
					"openEuler-22.03-LTS-SP1:python3-perf-debuginfo-5.10.0-136.87.0.168.oe2203sp1.aarch64",
					"openEuler-22.03-LTS-SP1:kernel-tools-debuginfo-5.10.0-136.87.0.168.oe2203sp1.aarch64",
					"openEuler-22.03-LTS-SP1:kernel-5.10.0-136.87.0.168.oe2203sp1.src",
					"openEuler-22.03-LTS-SP1:python3-perf-debuginfo-5.10.0-136.87.0.168.oe2203sp1.x86_64",
					"openEuler-22.03-LTS-SP1:kernel-devel-5.10.0-136.87.0.168.oe2203sp1.x86_64",
					"openEuler-22.03-LTS-SP1:kernel-tools-debuginfo-5.10.0-136.87.0.168.oe2203sp1.x86_64",
					"openEuler-22.03-LTS-SP1:perf-debuginfo-5.10.0-136.87.0.168.oe2203sp1.x86_64",
					"openEuler-22.03-LTS-SP1:perf-5.10.0-136.87.0.168.oe2203sp1.x86_64",
					"openEuler-22.03-LTS-SP1:kernel-5.10.0-136.87.0.168.oe2203sp1.x86_64",
					"openEuler-22.03-LTS-SP1:kernel-debuginfo-5.10.0-136.87.0.168.oe2203sp1.x86_64",
					"openEuler-22.03-LTS-SP1:kernel-source-5.10.0-136.87.0.168.oe2203sp1.x86_64",
					"openEuler-22.03-LTS-SP1:kernel-headers-5.10.0-136.87.0.168.oe2203sp1.x86_64",
					"openEuler-22.03-LTS-SP1:kernel-tools-5.10.0-136.87.0.168.oe2203sp1.x86_64",
					"openEuler-22.03-LTS-SP1:kernel-tools-devel-5.10.0-136.87.0.168.oe2203sp1.x86_64",
					"openEuler-22.03-LTS-SP1:python3-perf-5.10.0-136.87.0.168.oe2203sp1.x86_64",
					"openEuler-22.03-LTS-SP1:kernel-debugsource-5.10.0-136.87.0.168.oe2203sp1.x86_64"
				]
			},
			"remediations":[
				{
					"product_ids":[
						"openEuler-22.03-LTS-SP1:python3-perf-5.10.0-136.87.0.168.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:kernel-debugsource-5.10.0-136.87.0.168.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:kernel-source-5.10.0-136.87.0.168.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:kernel-tools-5.10.0-136.87.0.168.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:kernel-headers-5.10.0-136.87.0.168.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:kernel-tools-devel-5.10.0-136.87.0.168.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:perf-5.10.0-136.87.0.168.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:kernel-devel-5.10.0-136.87.0.168.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:kernel-debuginfo-5.10.0-136.87.0.168.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:kernel-5.10.0-136.87.0.168.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:perf-debuginfo-5.10.0-136.87.0.168.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:python3-perf-debuginfo-5.10.0-136.87.0.168.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:kernel-tools-debuginfo-5.10.0-136.87.0.168.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:kernel-5.10.0-136.87.0.168.oe2203sp1.src",
						"openEuler-22.03-LTS-SP1:python3-perf-debuginfo-5.10.0-136.87.0.168.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:kernel-devel-5.10.0-136.87.0.168.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:kernel-tools-debuginfo-5.10.0-136.87.0.168.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:perf-debuginfo-5.10.0-136.87.0.168.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:perf-5.10.0-136.87.0.168.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:kernel-5.10.0-136.87.0.168.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:kernel-debuginfo-5.10.0-136.87.0.168.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:kernel-source-5.10.0-136.87.0.168.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:kernel-headers-5.10.0-136.87.0.168.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:kernel-tools-5.10.0-136.87.0.168.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:kernel-tools-devel-5.10.0-136.87.0.168.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:python3-perf-5.10.0-136.87.0.168.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:kernel-debugsource-5.10.0-136.87.0.168.oe2203sp1.x86_64"
					],
					"details":"kernel security update",
					"category":"vendor_fix",
					"url":"https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2024-1941"
				}
			],
			"scores":[
				{
					"cvss_v3":{
						"baseSeverity":"MEDIUM",
						"baseScore":6.3,
						"vectorString":"CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:N",
						"version":"3.1"
					},
					"products":[
						"openEuler-22.03-LTS-SP1:python3-perf-5.10.0-136.87.0.168.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:kernel-debugsource-5.10.0-136.87.0.168.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:kernel-source-5.10.0-136.87.0.168.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:kernel-tools-5.10.0-136.87.0.168.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:kernel-headers-5.10.0-136.87.0.168.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:kernel-tools-devel-5.10.0-136.87.0.168.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:perf-5.10.0-136.87.0.168.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:kernel-devel-5.10.0-136.87.0.168.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:kernel-debuginfo-5.10.0-136.87.0.168.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:kernel-5.10.0-136.87.0.168.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:perf-debuginfo-5.10.0-136.87.0.168.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:python3-perf-debuginfo-5.10.0-136.87.0.168.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:kernel-tools-debuginfo-5.10.0-136.87.0.168.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:kernel-5.10.0-136.87.0.168.oe2203sp1.src",
						"openEuler-22.03-LTS-SP1:python3-perf-debuginfo-5.10.0-136.87.0.168.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:kernel-devel-5.10.0-136.87.0.168.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:kernel-tools-debuginfo-5.10.0-136.87.0.168.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:perf-debuginfo-5.10.0-136.87.0.168.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:perf-5.10.0-136.87.0.168.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:kernel-5.10.0-136.87.0.168.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:kernel-debuginfo-5.10.0-136.87.0.168.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:kernel-source-5.10.0-136.87.0.168.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:kernel-headers-5.10.0-136.87.0.168.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:kernel-tools-5.10.0-136.87.0.168.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:kernel-tools-devel-5.10.0-136.87.0.168.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:python3-perf-5.10.0-136.87.0.168.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:kernel-debugsource-5.10.0-136.87.0.168.oe2203sp1.x86_64"
					]
				}
			],
			"threats":[
				{
					"details":"Medium",
					"category":"impact"
				}
			],
			"title":"CVE-2024-39508"
		},
		{
			"cve":"CVE-2024-40915",
			"notes":[
				{
					"text":"In the Linux kernel, the following vulnerability has been resolved:\n\nriscv: rewrite __kernel_map_pages() to fix sleeping in invalid context\n\n__kernel_map_pages() is a debug function which clears the valid bit in page\ntable entry for deallocated pages to detect illegal memory accesses to\nfreed pages.\n\nThis function set/clear the valid bit using __set_memory(). __set_memory()\nacquires init_mm's semaphore, and this operation may sleep. This is\nproblematic, because  __kernel_map_pages() can be called in atomic context,\nand thus is illegal to sleep. An example warning that this causes:\n\nBUG: sleeping function called from invalid context at kernel/locking/rwsem.c:1578\nin_atomic(): 1, irqs_disabled(): 0, non_block: 0, pid: 2, name: kthreadd\npreempt_count: 2, expected: 0\nCPU: 0 PID: 2 Comm: kthreadd Not tainted 6.9.0-g1d4c6d784ef6 #37\nHardware name: riscv-virtio,qemu (DT)\nCall Trace:\n[<ffffffff800060dc>] dump_backtrace+0x1c/0x24\n[<ffffffff8091ef6e>] show_stack+0x2c/0x38\n[<ffffffff8092baf8>] dump_stack_lvl+0x5a/0x72\n[<ffffffff8092bb24>] dump_stack+0x14/0x1c\n[<ffffffff8003b7ac>] __might_resched+0x104/0x10e\n[<ffffffff8003b7f4>] __might_sleep+0x3e/0x62\n[<ffffffff8093276a>] down_write+0x20/0x72\n[<ffffffff8000cf00>] __set_memory+0x82/0x2fa\n[<ffffffff8000d324>] __kernel_map_pages+0x5a/0xd4\n[<ffffffff80196cca>] __alloc_pages_bulk+0x3b2/0x43a\n[<ffffffff8018ee82>] __vmalloc_node_range+0x196/0x6ba\n[<ffffffff80011904>] copy_process+0x72c/0x17ec\n[<ffffffff80012ab4>] kernel_clone+0x60/0x2fe\n[<ffffffff80012f62>] kernel_thread+0x82/0xa0\n[<ffffffff8003552c>] kthreadd+0x14a/0x1be\n[<ffffffff809357de>] ret_from_fork+0xe/0x1c\n\nRewrite this function with apply_to_existing_page_range(). It is fine to\nnot have any locking, because __kernel_map_pages() works with pages being\nallocated/deallocated and those pages are not changed by anyone else in the\nmeantime.",
					"category":"description",
					"title":"Vulnerability Description"
				}
			],
			"product_status":{
				"fixed":[
					"openEuler-22.03-LTS-SP1:python3-perf-5.10.0-136.87.0.168.oe2203sp1.aarch64",
					"openEuler-22.03-LTS-SP1:kernel-debugsource-5.10.0-136.87.0.168.oe2203sp1.aarch64",
					"openEuler-22.03-LTS-SP1:kernel-source-5.10.0-136.87.0.168.oe2203sp1.aarch64",
					"openEuler-22.03-LTS-SP1:kernel-tools-5.10.0-136.87.0.168.oe2203sp1.aarch64",
					"openEuler-22.03-LTS-SP1:kernel-headers-5.10.0-136.87.0.168.oe2203sp1.aarch64",
					"openEuler-22.03-LTS-SP1:kernel-tools-devel-5.10.0-136.87.0.168.oe2203sp1.aarch64",
					"openEuler-22.03-LTS-SP1:perf-5.10.0-136.87.0.168.oe2203sp1.aarch64",
					"openEuler-22.03-LTS-SP1:kernel-devel-5.10.0-136.87.0.168.oe2203sp1.aarch64",
					"openEuler-22.03-LTS-SP1:kernel-debuginfo-5.10.0-136.87.0.168.oe2203sp1.aarch64",
					"openEuler-22.03-LTS-SP1:kernel-5.10.0-136.87.0.168.oe2203sp1.aarch64",
					"openEuler-22.03-LTS-SP1:perf-debuginfo-5.10.0-136.87.0.168.oe2203sp1.aarch64",
					"openEuler-22.03-LTS-SP1:python3-perf-debuginfo-5.10.0-136.87.0.168.oe2203sp1.aarch64",
					"openEuler-22.03-LTS-SP1:kernel-tools-debuginfo-5.10.0-136.87.0.168.oe2203sp1.aarch64",
					"openEuler-22.03-LTS-SP1:kernel-5.10.0-136.87.0.168.oe2203sp1.src",
					"openEuler-22.03-LTS-SP1:python3-perf-debuginfo-5.10.0-136.87.0.168.oe2203sp1.x86_64",
					"openEuler-22.03-LTS-SP1:kernel-devel-5.10.0-136.87.0.168.oe2203sp1.x86_64",
					"openEuler-22.03-LTS-SP1:kernel-tools-debuginfo-5.10.0-136.87.0.168.oe2203sp1.x86_64",
					"openEuler-22.03-LTS-SP1:perf-debuginfo-5.10.0-136.87.0.168.oe2203sp1.x86_64",
					"openEuler-22.03-LTS-SP1:perf-5.10.0-136.87.0.168.oe2203sp1.x86_64",
					"openEuler-22.03-LTS-SP1:kernel-5.10.0-136.87.0.168.oe2203sp1.x86_64",
					"openEuler-22.03-LTS-SP1:kernel-debuginfo-5.10.0-136.87.0.168.oe2203sp1.x86_64",
					"openEuler-22.03-LTS-SP1:kernel-source-5.10.0-136.87.0.168.oe2203sp1.x86_64",
					"openEuler-22.03-LTS-SP1:kernel-headers-5.10.0-136.87.0.168.oe2203sp1.x86_64",
					"openEuler-22.03-LTS-SP1:kernel-tools-5.10.0-136.87.0.168.oe2203sp1.x86_64",
					"openEuler-22.03-LTS-SP1:kernel-tools-devel-5.10.0-136.87.0.168.oe2203sp1.x86_64",
					"openEuler-22.03-LTS-SP1:python3-perf-5.10.0-136.87.0.168.oe2203sp1.x86_64",
					"openEuler-22.03-LTS-SP1:kernel-debugsource-5.10.0-136.87.0.168.oe2203sp1.x86_64"
				]
			},
			"remediations":[
				{
					"product_ids":[
						"openEuler-22.03-LTS-SP1:python3-perf-5.10.0-136.87.0.168.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:kernel-debugsource-5.10.0-136.87.0.168.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:kernel-source-5.10.0-136.87.0.168.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:kernel-tools-5.10.0-136.87.0.168.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:kernel-headers-5.10.0-136.87.0.168.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:kernel-tools-devel-5.10.0-136.87.0.168.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:perf-5.10.0-136.87.0.168.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:kernel-devel-5.10.0-136.87.0.168.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:kernel-debuginfo-5.10.0-136.87.0.168.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:kernel-5.10.0-136.87.0.168.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:perf-debuginfo-5.10.0-136.87.0.168.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:python3-perf-debuginfo-5.10.0-136.87.0.168.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:kernel-tools-debuginfo-5.10.0-136.87.0.168.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:kernel-5.10.0-136.87.0.168.oe2203sp1.src",
						"openEuler-22.03-LTS-SP1:python3-perf-debuginfo-5.10.0-136.87.0.168.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:kernel-devel-5.10.0-136.87.0.168.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:kernel-tools-debuginfo-5.10.0-136.87.0.168.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:perf-debuginfo-5.10.0-136.87.0.168.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:perf-5.10.0-136.87.0.168.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:kernel-5.10.0-136.87.0.168.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:kernel-debuginfo-5.10.0-136.87.0.168.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:kernel-source-5.10.0-136.87.0.168.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:kernel-headers-5.10.0-136.87.0.168.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:kernel-tools-5.10.0-136.87.0.168.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:kernel-tools-devel-5.10.0-136.87.0.168.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:python3-perf-5.10.0-136.87.0.168.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:kernel-debugsource-5.10.0-136.87.0.168.oe2203sp1.x86_64"
					],
					"details":"kernel security update",
					"category":"vendor_fix",
					"url":"https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2024-1941"
				}
			],
			"scores":[
				{
					"cvss_v3":{
						"baseSeverity":"MEDIUM",
						"baseScore":5.5,
						"vectorString":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
						"version":"3.1"
					},
					"products":[
						"openEuler-22.03-LTS-SP1:python3-perf-5.10.0-136.87.0.168.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:kernel-debugsource-5.10.0-136.87.0.168.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:kernel-source-5.10.0-136.87.0.168.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:kernel-tools-5.10.0-136.87.0.168.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:kernel-headers-5.10.0-136.87.0.168.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:kernel-tools-devel-5.10.0-136.87.0.168.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:perf-5.10.0-136.87.0.168.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:kernel-devel-5.10.0-136.87.0.168.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:kernel-debuginfo-5.10.0-136.87.0.168.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:kernel-5.10.0-136.87.0.168.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:perf-debuginfo-5.10.0-136.87.0.168.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:python3-perf-debuginfo-5.10.0-136.87.0.168.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:kernel-tools-debuginfo-5.10.0-136.87.0.168.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:kernel-5.10.0-136.87.0.168.oe2203sp1.src",
						"openEuler-22.03-LTS-SP1:python3-perf-debuginfo-5.10.0-136.87.0.168.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:kernel-devel-5.10.0-136.87.0.168.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:kernel-tools-debuginfo-5.10.0-136.87.0.168.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:perf-debuginfo-5.10.0-136.87.0.168.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:perf-5.10.0-136.87.0.168.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:kernel-5.10.0-136.87.0.168.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:kernel-debuginfo-5.10.0-136.87.0.168.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:kernel-source-5.10.0-136.87.0.168.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:kernel-headers-5.10.0-136.87.0.168.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:kernel-tools-5.10.0-136.87.0.168.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:kernel-tools-devel-5.10.0-136.87.0.168.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:python3-perf-5.10.0-136.87.0.168.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:kernel-debugsource-5.10.0-136.87.0.168.oe2203sp1.x86_64"
					]
				}
			],
			"threats":[
				{
					"details":"Medium",
					"category":"impact"
				}
			],
			"title":"CVE-2024-40915"
		},
		{
			"cve":"CVE-2024-40945",
			"notes":[
				{
					"text":"In the Linux kernel, the following vulnerability has been resolved:\n\niommu: Return right value in iommu_sva_bind_device()\n\niommu_sva_bind_device() should return either a sva bond handle or an\nERR_PTR value in error cases. Existing drivers (idxd and uacce) only\ncheck the return value with IS_ERR(). This could potentially lead to\na kernel NULL pointer dereference issue if the function returns NULL\ninstead of an error pointer.\n\nIn reality, this doesn't cause any problems because iommu_sva_bind_device()\nonly returns NULL when the kernel is not configured with CONFIG_IOMMU_SVA.\nIn this case, iommu_dev_enable_feature(dev, IOMMU_DEV_FEAT_SVA) will\nreturn an error, and the device drivers won't call iommu_sva_bind_device()\nat all.",
					"category":"description",
					"title":"Vulnerability Description"
				}
			],
			"product_status":{
				"fixed":[
					"openEuler-22.03-LTS-SP1:python3-perf-5.10.0-136.87.0.168.oe2203sp1.aarch64",
					"openEuler-22.03-LTS-SP1:kernel-debugsource-5.10.0-136.87.0.168.oe2203sp1.aarch64",
					"openEuler-22.03-LTS-SP1:kernel-source-5.10.0-136.87.0.168.oe2203sp1.aarch64",
					"openEuler-22.03-LTS-SP1:kernel-tools-5.10.0-136.87.0.168.oe2203sp1.aarch64",
					"openEuler-22.03-LTS-SP1:kernel-headers-5.10.0-136.87.0.168.oe2203sp1.aarch64",
					"openEuler-22.03-LTS-SP1:kernel-tools-devel-5.10.0-136.87.0.168.oe2203sp1.aarch64",
					"openEuler-22.03-LTS-SP1:perf-5.10.0-136.87.0.168.oe2203sp1.aarch64",
					"openEuler-22.03-LTS-SP1:kernel-devel-5.10.0-136.87.0.168.oe2203sp1.aarch64",
					"openEuler-22.03-LTS-SP1:kernel-debuginfo-5.10.0-136.87.0.168.oe2203sp1.aarch64",
					"openEuler-22.03-LTS-SP1:kernel-5.10.0-136.87.0.168.oe2203sp1.aarch64",
					"openEuler-22.03-LTS-SP1:perf-debuginfo-5.10.0-136.87.0.168.oe2203sp1.aarch64",
					"openEuler-22.03-LTS-SP1:python3-perf-debuginfo-5.10.0-136.87.0.168.oe2203sp1.aarch64",
					"openEuler-22.03-LTS-SP1:kernel-tools-debuginfo-5.10.0-136.87.0.168.oe2203sp1.aarch64",
					"openEuler-22.03-LTS-SP1:kernel-5.10.0-136.87.0.168.oe2203sp1.src",
					"openEuler-22.03-LTS-SP1:python3-perf-debuginfo-5.10.0-136.87.0.168.oe2203sp1.x86_64",
					"openEuler-22.03-LTS-SP1:kernel-devel-5.10.0-136.87.0.168.oe2203sp1.x86_64",
					"openEuler-22.03-LTS-SP1:kernel-tools-debuginfo-5.10.0-136.87.0.168.oe2203sp1.x86_64",
					"openEuler-22.03-LTS-SP1:perf-debuginfo-5.10.0-136.87.0.168.oe2203sp1.x86_64",
					"openEuler-22.03-LTS-SP1:perf-5.10.0-136.87.0.168.oe2203sp1.x86_64",
					"openEuler-22.03-LTS-SP1:kernel-5.10.0-136.87.0.168.oe2203sp1.x86_64",
					"openEuler-22.03-LTS-SP1:kernel-debuginfo-5.10.0-136.87.0.168.oe2203sp1.x86_64",
					"openEuler-22.03-LTS-SP1:kernel-source-5.10.0-136.87.0.168.oe2203sp1.x86_64",
					"openEuler-22.03-LTS-SP1:kernel-headers-5.10.0-136.87.0.168.oe2203sp1.x86_64",
					"openEuler-22.03-LTS-SP1:kernel-tools-5.10.0-136.87.0.168.oe2203sp1.x86_64",
					"openEuler-22.03-LTS-SP1:kernel-tools-devel-5.10.0-136.87.0.168.oe2203sp1.x86_64",
					"openEuler-22.03-LTS-SP1:python3-perf-5.10.0-136.87.0.168.oe2203sp1.x86_64",
					"openEuler-22.03-LTS-SP1:kernel-debugsource-5.10.0-136.87.0.168.oe2203sp1.x86_64"
				]
			},
			"remediations":[
				{
					"product_ids":[
						"openEuler-22.03-LTS-SP1:python3-perf-5.10.0-136.87.0.168.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:kernel-debugsource-5.10.0-136.87.0.168.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:kernel-source-5.10.0-136.87.0.168.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:kernel-tools-5.10.0-136.87.0.168.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:kernel-headers-5.10.0-136.87.0.168.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:kernel-tools-devel-5.10.0-136.87.0.168.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:perf-5.10.0-136.87.0.168.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:kernel-devel-5.10.0-136.87.0.168.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:kernel-debuginfo-5.10.0-136.87.0.168.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:kernel-5.10.0-136.87.0.168.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:perf-debuginfo-5.10.0-136.87.0.168.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:python3-perf-debuginfo-5.10.0-136.87.0.168.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:kernel-tools-debuginfo-5.10.0-136.87.0.168.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:kernel-5.10.0-136.87.0.168.oe2203sp1.src",
						"openEuler-22.03-LTS-SP1:python3-perf-debuginfo-5.10.0-136.87.0.168.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:kernel-devel-5.10.0-136.87.0.168.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:kernel-tools-debuginfo-5.10.0-136.87.0.168.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:perf-debuginfo-5.10.0-136.87.0.168.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:perf-5.10.0-136.87.0.168.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:kernel-5.10.0-136.87.0.168.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:kernel-debuginfo-5.10.0-136.87.0.168.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:kernel-source-5.10.0-136.87.0.168.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:kernel-headers-5.10.0-136.87.0.168.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:kernel-tools-5.10.0-136.87.0.168.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:kernel-tools-devel-5.10.0-136.87.0.168.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:python3-perf-5.10.0-136.87.0.168.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:kernel-debugsource-5.10.0-136.87.0.168.oe2203sp1.x86_64"
					],
					"details":"kernel security update",
					"category":"vendor_fix",
					"url":"https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2024-1941"
				}
			],
			"scores":[
				{
					"cvss_v3":{
						"baseSeverity":"MEDIUM",
						"baseScore":4.4,
						"vectorString":"CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
						"version":"3.1"
					},
					"products":[
						"openEuler-22.03-LTS-SP1:python3-perf-5.10.0-136.87.0.168.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:kernel-debugsource-5.10.0-136.87.0.168.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:kernel-source-5.10.0-136.87.0.168.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:kernel-tools-5.10.0-136.87.0.168.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:kernel-headers-5.10.0-136.87.0.168.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:kernel-tools-devel-5.10.0-136.87.0.168.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:perf-5.10.0-136.87.0.168.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:kernel-devel-5.10.0-136.87.0.168.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:kernel-debuginfo-5.10.0-136.87.0.168.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:kernel-5.10.0-136.87.0.168.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:perf-debuginfo-5.10.0-136.87.0.168.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:python3-perf-debuginfo-5.10.0-136.87.0.168.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:kernel-tools-debuginfo-5.10.0-136.87.0.168.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:kernel-5.10.0-136.87.0.168.oe2203sp1.src",
						"openEuler-22.03-LTS-SP1:python3-perf-debuginfo-5.10.0-136.87.0.168.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:kernel-devel-5.10.0-136.87.0.168.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:kernel-tools-debuginfo-5.10.0-136.87.0.168.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:perf-debuginfo-5.10.0-136.87.0.168.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:perf-5.10.0-136.87.0.168.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:kernel-5.10.0-136.87.0.168.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:kernel-debuginfo-5.10.0-136.87.0.168.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:kernel-source-5.10.0-136.87.0.168.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:kernel-headers-5.10.0-136.87.0.168.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:kernel-tools-5.10.0-136.87.0.168.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:kernel-tools-devel-5.10.0-136.87.0.168.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:python3-perf-5.10.0-136.87.0.168.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:kernel-debugsource-5.10.0-136.87.0.168.oe2203sp1.x86_64"
					]
				}
			],
			"threats":[
				{
					"details":"Medium",
					"category":"impact"
				}
			],
			"title":"CVE-2024-40945"
		},
		{
			"cve":"CVE-2024-40947",
			"notes":[
				{
					"text":"In the Linux kernel, the following vulnerability has been resolved:\n\nima: Avoid blocking in RCU read-side critical section\n\nA panic happens in ima_match_policy:\n\nBUG: unable to handle kernel NULL pointer dereference at 0000000000000010\nPGD 42f873067 P4D 0\nOops: 0000 [#1] SMP NOPTI\nCPU: 5 PID: 1286325 Comm: kubeletmonit.sh\nKdump: loaded Tainted: P\nHardware name: QEMU Standard PC (i440FX + PIIX, 1996),\n               BIOS 0.0.0 02/06/2015\nRIP: 0010:ima_match_policy+0x84/0x450\nCode: 49 89 fc 41 89 cf 31 ed 89 44 24 14 eb 1c 44 39\n      7b 18 74 26 41 83 ff 05 74 20 48 8b 1b 48 3b 1d\n      f2 b9 f4 00 0f 84 9c 01 00 00 <44> 85 73 10 74 ea\n      44 8b 6b 14 41 f6 c5 01 75 d4 41 f6 c5 02 74 0f\nRSP: 0018:ff71570009e07a80 EFLAGS: 00010207\nRAX: 0000000000000000 RBX: 0000000000000000 RCX: 0000000000000200\nRDX: ffffffffad8dc7c0 RSI: 0000000024924925 RDI: ff3e27850dea2000\nRBP: 0000000000000000 R08: 0000000000000000 R09: ffffffffabfce739\nR10: ff3e27810cc42400 R11: 0000000000000000 R12: ff3e2781825ef970\nR13: 00000000ff3e2785 R14: 000000000000000c R15: 0000000000000001\nFS:  00007f5195b51740(0000)\nGS:ff3e278b12d40000(0000) knlGS:0000000000000000\nCS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033\nCR2: 0000000000000010 CR3: 0000000626d24002 CR4: 0000000000361ee0\nDR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000\nDR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400\nCall Trace:\n ima_get_action+0x22/0x30\n process_measurement+0xb0/0x830\n ? page_add_file_rmap+0x15/0x170\n ? alloc_set_pte+0x269/0x4c0\n ? prep_new_page+0x81/0x140\n ? simple_xattr_get+0x75/0xa0\n ? selinux_file_open+0x9d/0xf0\n ima_file_check+0x64/0x90\n path_openat+0x571/0x1720\n do_filp_open+0x9b/0x110\n ? page_counter_try_charge+0x57/0xc0\n ? files_cgroup_alloc_fd+0x38/0x60\n ? __alloc_fd+0xd4/0x250\n ? do_sys_open+0x1bd/0x250\n do_sys_open+0x1bd/0x250\n do_syscall_64+0x5d/0x1d0\n entry_SYSCALL_64_after_hwframe+0x65/0xca\n\nCommit c7423dbdbc9e (\"ima: Handle -ESTALE returned by\nima_filter_rule_match()\") introduced call to ima_lsm_copy_rule within a\nRCU read-side critical section which contains kmalloc with GFP_KERNEL.\nThis implies a possible sleep and violates limitations of RCU read-side\ncritical sections on non-PREEMPT systems.\n\nSleeping within RCU read-side critical section might cause\nsynchronize_rcu() returning early and break RCU protection, allowing a\nUAF to happen.\n\nThe root cause of this issue could be described as follows:\n|\tThread A\t|\tThread B\t|\n|\t\t\t|ima_match_policy\t|\n|\t\t\t|  rcu_read_lock\t|\n|ima_lsm_update_rule\t|\t\t\t|\n|  synchronize_rcu\t|\t\t\t|\n|\t\t\t|    kmalloc(GFP_KERNEL)|\n|\t\t\t|      sleep\t\t|\n==> synchronize_rcu returns early\n|  kfree(entry)\t\t|\t\t\t|\n|\t\t\t|    entry = entry->next|\n==> UAF happens and entry now becomes NULL (or could be anything).\n|\t\t\t|    entry->action\t|\n==> Accessing entry might cause panic.\n\nTo fix this issue, we are converting all kmalloc that is called within\nRCU read-side critical section to use GFP_ATOMIC.\n\n[PM: fixed missing comment, long lines, !CONFIG_IMA_LSM_RULES case]",
					"category":"description",
					"title":"Vulnerability Description"
				}
			],
			"product_status":{
				"fixed":[
					"openEuler-22.03-LTS-SP1:python3-perf-5.10.0-136.87.0.168.oe2203sp1.aarch64",
					"openEuler-22.03-LTS-SP1:kernel-debugsource-5.10.0-136.87.0.168.oe2203sp1.aarch64",
					"openEuler-22.03-LTS-SP1:kernel-source-5.10.0-136.87.0.168.oe2203sp1.aarch64",
					"openEuler-22.03-LTS-SP1:kernel-tools-5.10.0-136.87.0.168.oe2203sp1.aarch64",
					"openEuler-22.03-LTS-SP1:kernel-headers-5.10.0-136.87.0.168.oe2203sp1.aarch64",
					"openEuler-22.03-LTS-SP1:kernel-tools-devel-5.10.0-136.87.0.168.oe2203sp1.aarch64",
					"openEuler-22.03-LTS-SP1:perf-5.10.0-136.87.0.168.oe2203sp1.aarch64",
					"openEuler-22.03-LTS-SP1:kernel-devel-5.10.0-136.87.0.168.oe2203sp1.aarch64",
					"openEuler-22.03-LTS-SP1:kernel-debuginfo-5.10.0-136.87.0.168.oe2203sp1.aarch64",
					"openEuler-22.03-LTS-SP1:kernel-5.10.0-136.87.0.168.oe2203sp1.aarch64",
					"openEuler-22.03-LTS-SP1:perf-debuginfo-5.10.0-136.87.0.168.oe2203sp1.aarch64",
					"openEuler-22.03-LTS-SP1:python3-perf-debuginfo-5.10.0-136.87.0.168.oe2203sp1.aarch64",
					"openEuler-22.03-LTS-SP1:kernel-tools-debuginfo-5.10.0-136.87.0.168.oe2203sp1.aarch64",
					"openEuler-22.03-LTS-SP1:kernel-5.10.0-136.87.0.168.oe2203sp1.src",
					"openEuler-22.03-LTS-SP1:python3-perf-debuginfo-5.10.0-136.87.0.168.oe2203sp1.x86_64",
					"openEuler-22.03-LTS-SP1:kernel-devel-5.10.0-136.87.0.168.oe2203sp1.x86_64",
					"openEuler-22.03-LTS-SP1:kernel-tools-debuginfo-5.10.0-136.87.0.168.oe2203sp1.x86_64",
					"openEuler-22.03-LTS-SP1:perf-debuginfo-5.10.0-136.87.0.168.oe2203sp1.x86_64",
					"openEuler-22.03-LTS-SP1:perf-5.10.0-136.87.0.168.oe2203sp1.x86_64",
					"openEuler-22.03-LTS-SP1:kernel-5.10.0-136.87.0.168.oe2203sp1.x86_64",
					"openEuler-22.03-LTS-SP1:kernel-debuginfo-5.10.0-136.87.0.168.oe2203sp1.x86_64",
					"openEuler-22.03-LTS-SP1:kernel-source-5.10.0-136.87.0.168.oe2203sp1.x86_64",
					"openEuler-22.03-LTS-SP1:kernel-headers-5.10.0-136.87.0.168.oe2203sp1.x86_64",
					"openEuler-22.03-LTS-SP1:kernel-tools-5.10.0-136.87.0.168.oe2203sp1.x86_64",
					"openEuler-22.03-LTS-SP1:kernel-tools-devel-5.10.0-136.87.0.168.oe2203sp1.x86_64",
					"openEuler-22.03-LTS-SP1:python3-perf-5.10.0-136.87.0.168.oe2203sp1.x86_64",
					"openEuler-22.03-LTS-SP1:kernel-debugsource-5.10.0-136.87.0.168.oe2203sp1.x86_64"
				]
			},
			"remediations":[
				{
					"product_ids":[
						"openEuler-22.03-LTS-SP1:python3-perf-5.10.0-136.87.0.168.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:kernel-debugsource-5.10.0-136.87.0.168.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:kernel-source-5.10.0-136.87.0.168.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:kernel-tools-5.10.0-136.87.0.168.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:kernel-headers-5.10.0-136.87.0.168.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:kernel-tools-devel-5.10.0-136.87.0.168.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:perf-5.10.0-136.87.0.168.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:kernel-devel-5.10.0-136.87.0.168.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:kernel-debuginfo-5.10.0-136.87.0.168.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:kernel-5.10.0-136.87.0.168.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:perf-debuginfo-5.10.0-136.87.0.168.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:python3-perf-debuginfo-5.10.0-136.87.0.168.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:kernel-tools-debuginfo-5.10.0-136.87.0.168.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:kernel-5.10.0-136.87.0.168.oe2203sp1.src",
						"openEuler-22.03-LTS-SP1:python3-perf-debuginfo-5.10.0-136.87.0.168.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:kernel-devel-5.10.0-136.87.0.168.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:kernel-tools-debuginfo-5.10.0-136.87.0.168.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:perf-debuginfo-5.10.0-136.87.0.168.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:perf-5.10.0-136.87.0.168.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:kernel-5.10.0-136.87.0.168.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:kernel-debuginfo-5.10.0-136.87.0.168.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:kernel-source-5.10.0-136.87.0.168.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:kernel-headers-5.10.0-136.87.0.168.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:kernel-tools-5.10.0-136.87.0.168.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:kernel-tools-devel-5.10.0-136.87.0.168.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:python3-perf-5.10.0-136.87.0.168.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:kernel-debugsource-5.10.0-136.87.0.168.oe2203sp1.x86_64"
					],
					"details":"kernel security update",
					"category":"vendor_fix",
					"url":"https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2024-1941"
				}
			],
			"scores":[
				{
					"cvss_v3":{
						"baseSeverity":"LOW",
						"baseScore":3.9,
						"vectorString":"CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:L/I:L/A:L",
						"version":"3.1"
					},
					"products":[
						"openEuler-22.03-LTS-SP1:python3-perf-5.10.0-136.87.0.168.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:kernel-debugsource-5.10.0-136.87.0.168.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:kernel-source-5.10.0-136.87.0.168.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:kernel-tools-5.10.0-136.87.0.168.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:kernel-headers-5.10.0-136.87.0.168.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:kernel-tools-devel-5.10.0-136.87.0.168.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:perf-5.10.0-136.87.0.168.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:kernel-devel-5.10.0-136.87.0.168.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:kernel-debuginfo-5.10.0-136.87.0.168.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:kernel-5.10.0-136.87.0.168.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:perf-debuginfo-5.10.0-136.87.0.168.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:python3-perf-debuginfo-5.10.0-136.87.0.168.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:kernel-tools-debuginfo-5.10.0-136.87.0.168.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:kernel-5.10.0-136.87.0.168.oe2203sp1.src",
						"openEuler-22.03-LTS-SP1:python3-perf-debuginfo-5.10.0-136.87.0.168.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:kernel-devel-5.10.0-136.87.0.168.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:kernel-tools-debuginfo-5.10.0-136.87.0.168.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:perf-debuginfo-5.10.0-136.87.0.168.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:perf-5.10.0-136.87.0.168.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:kernel-5.10.0-136.87.0.168.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:kernel-debuginfo-5.10.0-136.87.0.168.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:kernel-source-5.10.0-136.87.0.168.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:kernel-headers-5.10.0-136.87.0.168.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:kernel-tools-5.10.0-136.87.0.168.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:kernel-tools-devel-5.10.0-136.87.0.168.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:python3-perf-5.10.0-136.87.0.168.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:kernel-debugsource-5.10.0-136.87.0.168.oe2203sp1.x86_64"
					]
				}
			],
			"threats":[
				{
					"details":"Low",
					"category":"impact"
				}
			],
			"title":"CVE-2024-40947"
		},
		{
			"cve":"CVE-2024-40956",
			"notes":[
				{
					"text":"In the Linux kernel, the following vulnerability has been resolved:\n\ndmaengine: idxd: Fix possible Use-After-Free in irq_process_work_list\n\nUse list_for_each_entry_safe() to allow iterating through the list and\ndeleting the entry in the iteration process. The descriptor is freed via\nidxd_desc_complete() and there's a slight chance may cause issue for\nthe list iterator when the descriptor is reused by another thread\nwithout it being deleted from the list.",
					"category":"description",
					"title":"Vulnerability Description"
				}
			],
			"product_status":{
				"fixed":[
					"openEuler-22.03-LTS-SP1:python3-perf-5.10.0-136.87.0.168.oe2203sp1.aarch64",
					"openEuler-22.03-LTS-SP1:kernel-debugsource-5.10.0-136.87.0.168.oe2203sp1.aarch64",
					"openEuler-22.03-LTS-SP1:kernel-source-5.10.0-136.87.0.168.oe2203sp1.aarch64",
					"openEuler-22.03-LTS-SP1:kernel-tools-5.10.0-136.87.0.168.oe2203sp1.aarch64",
					"openEuler-22.03-LTS-SP1:kernel-headers-5.10.0-136.87.0.168.oe2203sp1.aarch64",
					"openEuler-22.03-LTS-SP1:kernel-tools-devel-5.10.0-136.87.0.168.oe2203sp1.aarch64",
					"openEuler-22.03-LTS-SP1:perf-5.10.0-136.87.0.168.oe2203sp1.aarch64",
					"openEuler-22.03-LTS-SP1:kernel-devel-5.10.0-136.87.0.168.oe2203sp1.aarch64",
					"openEuler-22.03-LTS-SP1:kernel-debuginfo-5.10.0-136.87.0.168.oe2203sp1.aarch64",
					"openEuler-22.03-LTS-SP1:kernel-5.10.0-136.87.0.168.oe2203sp1.aarch64",
					"openEuler-22.03-LTS-SP1:perf-debuginfo-5.10.0-136.87.0.168.oe2203sp1.aarch64",
					"openEuler-22.03-LTS-SP1:python3-perf-debuginfo-5.10.0-136.87.0.168.oe2203sp1.aarch64",
					"openEuler-22.03-LTS-SP1:kernel-tools-debuginfo-5.10.0-136.87.0.168.oe2203sp1.aarch64",
					"openEuler-22.03-LTS-SP1:kernel-5.10.0-136.87.0.168.oe2203sp1.src",
					"openEuler-22.03-LTS-SP1:python3-perf-debuginfo-5.10.0-136.87.0.168.oe2203sp1.x86_64",
					"openEuler-22.03-LTS-SP1:kernel-devel-5.10.0-136.87.0.168.oe2203sp1.x86_64",
					"openEuler-22.03-LTS-SP1:kernel-tools-debuginfo-5.10.0-136.87.0.168.oe2203sp1.x86_64",
					"openEuler-22.03-LTS-SP1:perf-debuginfo-5.10.0-136.87.0.168.oe2203sp1.x86_64",
					"openEuler-22.03-LTS-SP1:perf-5.10.0-136.87.0.168.oe2203sp1.x86_64",
					"openEuler-22.03-LTS-SP1:kernel-5.10.0-136.87.0.168.oe2203sp1.x86_64",
					"openEuler-22.03-LTS-SP1:kernel-debuginfo-5.10.0-136.87.0.168.oe2203sp1.x86_64",
					"openEuler-22.03-LTS-SP1:kernel-source-5.10.0-136.87.0.168.oe2203sp1.x86_64",
					"openEuler-22.03-LTS-SP1:kernel-headers-5.10.0-136.87.0.168.oe2203sp1.x86_64",
					"openEuler-22.03-LTS-SP1:kernel-tools-5.10.0-136.87.0.168.oe2203sp1.x86_64",
					"openEuler-22.03-LTS-SP1:kernel-tools-devel-5.10.0-136.87.0.168.oe2203sp1.x86_64",
					"openEuler-22.03-LTS-SP1:python3-perf-5.10.0-136.87.0.168.oe2203sp1.x86_64",
					"openEuler-22.03-LTS-SP1:kernel-debugsource-5.10.0-136.87.0.168.oe2203sp1.x86_64"
				]
			},
			"remediations":[
				{
					"product_ids":[
						"openEuler-22.03-LTS-SP1:python3-perf-5.10.0-136.87.0.168.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:kernel-debugsource-5.10.0-136.87.0.168.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:kernel-source-5.10.0-136.87.0.168.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:kernel-tools-5.10.0-136.87.0.168.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:kernel-headers-5.10.0-136.87.0.168.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:kernel-tools-devel-5.10.0-136.87.0.168.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:perf-5.10.0-136.87.0.168.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:kernel-devel-5.10.0-136.87.0.168.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:kernel-debuginfo-5.10.0-136.87.0.168.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:kernel-5.10.0-136.87.0.168.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:perf-debuginfo-5.10.0-136.87.0.168.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:python3-perf-debuginfo-5.10.0-136.87.0.168.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:kernel-tools-debuginfo-5.10.0-136.87.0.168.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:kernel-5.10.0-136.87.0.168.oe2203sp1.src",
						"openEuler-22.03-LTS-SP1:python3-perf-debuginfo-5.10.0-136.87.0.168.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:kernel-devel-5.10.0-136.87.0.168.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:kernel-tools-debuginfo-5.10.0-136.87.0.168.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:perf-debuginfo-5.10.0-136.87.0.168.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:perf-5.10.0-136.87.0.168.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:kernel-5.10.0-136.87.0.168.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:kernel-debuginfo-5.10.0-136.87.0.168.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:kernel-source-5.10.0-136.87.0.168.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:kernel-headers-5.10.0-136.87.0.168.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:kernel-tools-5.10.0-136.87.0.168.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:kernel-tools-devel-5.10.0-136.87.0.168.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:python3-perf-5.10.0-136.87.0.168.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:kernel-debugsource-5.10.0-136.87.0.168.oe2203sp1.x86_64"
					],
					"details":"kernel security update",
					"category":"vendor_fix",
					"url":"https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2024-1941"
				}
			],
			"scores":[
				{
					"cvss_v3":{
						"baseSeverity":"MEDIUM",
						"baseScore":5.5,
						"vectorString":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
						"version":"3.1"
					},
					"products":[
						"openEuler-22.03-LTS-SP1:python3-perf-5.10.0-136.87.0.168.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:kernel-debugsource-5.10.0-136.87.0.168.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:kernel-source-5.10.0-136.87.0.168.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:kernel-tools-5.10.0-136.87.0.168.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:kernel-headers-5.10.0-136.87.0.168.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:kernel-tools-devel-5.10.0-136.87.0.168.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:perf-5.10.0-136.87.0.168.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:kernel-devel-5.10.0-136.87.0.168.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:kernel-debuginfo-5.10.0-136.87.0.168.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:kernel-5.10.0-136.87.0.168.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:perf-debuginfo-5.10.0-136.87.0.168.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:python3-perf-debuginfo-5.10.0-136.87.0.168.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:kernel-tools-debuginfo-5.10.0-136.87.0.168.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:kernel-5.10.0-136.87.0.168.oe2203sp1.src",
						"openEuler-22.03-LTS-SP1:python3-perf-debuginfo-5.10.0-136.87.0.168.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:kernel-devel-5.10.0-136.87.0.168.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:kernel-tools-debuginfo-5.10.0-136.87.0.168.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:perf-debuginfo-5.10.0-136.87.0.168.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:perf-5.10.0-136.87.0.168.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:kernel-5.10.0-136.87.0.168.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:kernel-debuginfo-5.10.0-136.87.0.168.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:kernel-source-5.10.0-136.87.0.168.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:kernel-headers-5.10.0-136.87.0.168.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:kernel-tools-5.10.0-136.87.0.168.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:kernel-tools-devel-5.10.0-136.87.0.168.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:python3-perf-5.10.0-136.87.0.168.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:kernel-debugsource-5.10.0-136.87.0.168.oe2203sp1.x86_64"
					]
				}
			],
			"threats":[
				{
					"details":"Medium",
					"category":"impact"
				}
			],
			"title":"CVE-2024-40956"
		},
		{
			"cve":"CVE-2024-40960",
			"notes":[
				{
					"text":"In the Linux kernel, the following vulnerability has been resolved:\n\nipv6: prevent possible NULL dereference in rt6_probe()\n\nsyzbot caught a NULL dereference in rt6_probe() [1]\n\nBail out if  __in6_dev_get() returns NULL.\n\n[1]\nOops: general protection fault, probably for non-canonical address 0xdffffc00000000cb: 0000 [#1] PREEMPT SMP KASAN PTI\nKASAN: null-ptr-deref in range [0x0000000000000658-0x000000000000065f]\nCPU: 1 PID: 22444 Comm: syz-executor.0 Not tainted 6.10.0-rc2-syzkaller-00383-gb8481381d4e2 #0\nHardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 04/02/2024\n RIP: 0010:rt6_probe net/ipv6/route.c:656 [inline]\n RIP: 0010:find_match+0x8c4/0xf50 net/ipv6/route.c:758\nCode: 14 fd f7 48 8b 85 38 ff ff ff 48 c7 45 b0 00 00 00 00 48 8d b8 5c 06 00 00 48 b8 00 00 00 00 00 fc ff df 48 89 fa 48 c1 ea 03 <0f> b6 14 02 48 89 f8 83 e0 07 83 c0 03 38 d0 7c 08 84 d2 0f 85 19\nRSP: 0018:ffffc900034af070 EFLAGS: 00010203\nRAX: dffffc0000000000 RBX: 0000000000000000 RCX: ffffc90004521000\nRDX: 00000000000000cb RSI: ffffffff8990d0cd RDI: 000000000000065c\nRBP: ffffc900034af150 R08: 0000000000000005 R09: 0000000000000000\nR10: 0000000000000001 R11: 0000000000000002 R12: 000000000000000a\nR13: 1ffff92000695e18 R14: ffff8880244a1d20 R15: 0000000000000000\nFS:  00007f4844a5a6c0(0000) GS:ffff8880b9300000(0000) knlGS:0000000000000000\nCS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033\nCR2: 0000001b31b27000 CR3: 000000002d42c000 CR4: 00000000003506f0\nDR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000\nDR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400\nCall Trace:\n <TASK>\n  rt6_nh_find_match+0xfa/0x1a0 net/ipv6/route.c:784\n  nexthop_for_each_fib6_nh+0x26d/0x4a0 net/ipv4/nexthop.c:1496\n  __find_rr_leaf+0x6e7/0xe00 net/ipv6/route.c:825\n  find_rr_leaf net/ipv6/route.c:853 [inline]\n  rt6_select net/ipv6/route.c:897 [inline]\n  fib6_table_lookup+0x57e/0xa30 net/ipv6/route.c:2195\n  ip6_pol_route+0x1cd/0x1150 net/ipv6/route.c:2231\n  pol_lookup_func include/net/ip6_fib.h:616 [inline]\n  fib6_rule_lookup+0x386/0x720 net/ipv6/fib6_rules.c:121\n  ip6_route_output_flags_noref net/ipv6/route.c:2639 [inline]\n  ip6_route_output_flags+0x1d0/0x640 net/ipv6/route.c:2651\n  ip6_dst_lookup_tail.constprop.0+0x961/0x1760 net/ipv6/ip6_output.c:1147\n  ip6_dst_lookup_flow+0x99/0x1d0 net/ipv6/ip6_output.c:1250\n  rawv6_sendmsg+0xdab/0x4340 net/ipv6/raw.c:898\n  inet_sendmsg+0x119/0x140 net/ipv4/af_inet.c:853\n  sock_sendmsg_nosec net/socket.c:730 [inline]\n  __sock_sendmsg net/socket.c:745 [inline]\n  sock_write_iter+0x4b8/0x5c0 net/socket.c:1160\n  new_sync_write fs/read_write.c:497 [inline]\n  vfs_write+0x6b6/0x1140 fs/read_write.c:590\n  ksys_write+0x1f8/0x260 fs/read_write.c:643\n  do_syscall_x64 arch/x86/entry/common.c:52 [inline]\n  do_syscall_64+0xcd/0x250 arch/x86/entry/common.c:83\n entry_SYSCALL_64_after_hwframe+0x77/0x7f",
					"category":"description",
					"title":"Vulnerability Description"
				}
			],
			"product_status":{
				"fixed":[
					"openEuler-22.03-LTS-SP1:python3-perf-5.10.0-136.87.0.168.oe2203sp1.aarch64",
					"openEuler-22.03-LTS-SP1:kernel-debugsource-5.10.0-136.87.0.168.oe2203sp1.aarch64",
					"openEuler-22.03-LTS-SP1:kernel-source-5.10.0-136.87.0.168.oe2203sp1.aarch64",
					"openEuler-22.03-LTS-SP1:kernel-tools-5.10.0-136.87.0.168.oe2203sp1.aarch64",
					"openEuler-22.03-LTS-SP1:kernel-headers-5.10.0-136.87.0.168.oe2203sp1.aarch64",
					"openEuler-22.03-LTS-SP1:kernel-tools-devel-5.10.0-136.87.0.168.oe2203sp1.aarch64",
					"openEuler-22.03-LTS-SP1:perf-5.10.0-136.87.0.168.oe2203sp1.aarch64",
					"openEuler-22.03-LTS-SP1:kernel-devel-5.10.0-136.87.0.168.oe2203sp1.aarch64",
					"openEuler-22.03-LTS-SP1:kernel-debuginfo-5.10.0-136.87.0.168.oe2203sp1.aarch64",
					"openEuler-22.03-LTS-SP1:kernel-5.10.0-136.87.0.168.oe2203sp1.aarch64",
					"openEuler-22.03-LTS-SP1:perf-debuginfo-5.10.0-136.87.0.168.oe2203sp1.aarch64",
					"openEuler-22.03-LTS-SP1:python3-perf-debuginfo-5.10.0-136.87.0.168.oe2203sp1.aarch64",
					"openEuler-22.03-LTS-SP1:kernel-tools-debuginfo-5.10.0-136.87.0.168.oe2203sp1.aarch64",
					"openEuler-22.03-LTS-SP1:kernel-5.10.0-136.87.0.168.oe2203sp1.src",
					"openEuler-22.03-LTS-SP1:python3-perf-debuginfo-5.10.0-136.87.0.168.oe2203sp1.x86_64",
					"openEuler-22.03-LTS-SP1:kernel-devel-5.10.0-136.87.0.168.oe2203sp1.x86_64",
					"openEuler-22.03-LTS-SP1:kernel-tools-debuginfo-5.10.0-136.87.0.168.oe2203sp1.x86_64",
					"openEuler-22.03-LTS-SP1:perf-debuginfo-5.10.0-136.87.0.168.oe2203sp1.x86_64",
					"openEuler-22.03-LTS-SP1:perf-5.10.0-136.87.0.168.oe2203sp1.x86_64",
					"openEuler-22.03-LTS-SP1:kernel-5.10.0-136.87.0.168.oe2203sp1.x86_64",
					"openEuler-22.03-LTS-SP1:kernel-debuginfo-5.10.0-136.87.0.168.oe2203sp1.x86_64",
					"openEuler-22.03-LTS-SP1:kernel-source-5.10.0-136.87.0.168.oe2203sp1.x86_64",
					"openEuler-22.03-LTS-SP1:kernel-headers-5.10.0-136.87.0.168.oe2203sp1.x86_64",
					"openEuler-22.03-LTS-SP1:kernel-tools-5.10.0-136.87.0.168.oe2203sp1.x86_64",
					"openEuler-22.03-LTS-SP1:kernel-tools-devel-5.10.0-136.87.0.168.oe2203sp1.x86_64",
					"openEuler-22.03-LTS-SP1:python3-perf-5.10.0-136.87.0.168.oe2203sp1.x86_64",
					"openEuler-22.03-LTS-SP1:kernel-debugsource-5.10.0-136.87.0.168.oe2203sp1.x86_64"
				]
			},
			"remediations":[
				{
					"product_ids":[
						"openEuler-22.03-LTS-SP1:python3-perf-5.10.0-136.87.0.168.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:kernel-debugsource-5.10.0-136.87.0.168.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:kernel-source-5.10.0-136.87.0.168.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:kernel-tools-5.10.0-136.87.0.168.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:kernel-headers-5.10.0-136.87.0.168.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:kernel-tools-devel-5.10.0-136.87.0.168.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:perf-5.10.0-136.87.0.168.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:kernel-devel-5.10.0-136.87.0.168.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:kernel-debuginfo-5.10.0-136.87.0.168.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:kernel-5.10.0-136.87.0.168.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:perf-debuginfo-5.10.0-136.87.0.168.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:python3-perf-debuginfo-5.10.0-136.87.0.168.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:kernel-tools-debuginfo-5.10.0-136.87.0.168.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:kernel-5.10.0-136.87.0.168.oe2203sp1.src",
						"openEuler-22.03-LTS-SP1:python3-perf-debuginfo-5.10.0-136.87.0.168.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:kernel-devel-5.10.0-136.87.0.168.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:kernel-tools-debuginfo-5.10.0-136.87.0.168.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:perf-debuginfo-5.10.0-136.87.0.168.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:perf-5.10.0-136.87.0.168.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:kernel-5.10.0-136.87.0.168.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:kernel-debuginfo-5.10.0-136.87.0.168.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:kernel-source-5.10.0-136.87.0.168.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:kernel-headers-5.10.0-136.87.0.168.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:kernel-tools-5.10.0-136.87.0.168.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:kernel-tools-devel-5.10.0-136.87.0.168.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:python3-perf-5.10.0-136.87.0.168.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:kernel-debugsource-5.10.0-136.87.0.168.oe2203sp1.x86_64"
					],
					"details":"kernel security update",
					"category":"vendor_fix",
					"url":"https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2024-1941"
				}
			],
			"scores":[
				{
					"cvss_v3":{
						"baseSeverity":"MEDIUM",
						"baseScore":5.5,
						"vectorString":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
						"version":"3.1"
					},
					"products":[
						"openEuler-22.03-LTS-SP1:python3-perf-5.10.0-136.87.0.168.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:kernel-debugsource-5.10.0-136.87.0.168.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:kernel-source-5.10.0-136.87.0.168.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:kernel-tools-5.10.0-136.87.0.168.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:kernel-headers-5.10.0-136.87.0.168.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:kernel-tools-devel-5.10.0-136.87.0.168.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:perf-5.10.0-136.87.0.168.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:kernel-devel-5.10.0-136.87.0.168.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:kernel-debuginfo-5.10.0-136.87.0.168.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:kernel-5.10.0-136.87.0.168.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:perf-debuginfo-5.10.0-136.87.0.168.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:python3-perf-debuginfo-5.10.0-136.87.0.168.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:kernel-tools-debuginfo-5.10.0-136.87.0.168.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:kernel-5.10.0-136.87.0.168.oe2203sp1.src",
						"openEuler-22.03-LTS-SP1:python3-perf-debuginfo-5.10.0-136.87.0.168.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:kernel-devel-5.10.0-136.87.0.168.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:kernel-tools-debuginfo-5.10.0-136.87.0.168.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:perf-debuginfo-5.10.0-136.87.0.168.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:perf-5.10.0-136.87.0.168.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:kernel-5.10.0-136.87.0.168.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:kernel-debuginfo-5.10.0-136.87.0.168.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:kernel-source-5.10.0-136.87.0.168.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:kernel-headers-5.10.0-136.87.0.168.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:kernel-tools-5.10.0-136.87.0.168.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:kernel-tools-devel-5.10.0-136.87.0.168.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:python3-perf-5.10.0-136.87.0.168.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:kernel-debugsource-5.10.0-136.87.0.168.oe2203sp1.x86_64"
					]
				}
			],
			"threats":[
				{
					"details":"Medium",
					"category":"impact"
				}
			],
			"title":"CVE-2024-40960"
		},
		{
			"cve":"CVE-2024-40967",
			"notes":[
				{
					"text":"In the Linux kernel, the following vulnerability has been resolved:\n\nserial: imx: Introduce timeout when waiting on transmitter empty\n\nBy waiting at most 1 second for USR2_TXDC to be set, we avoid a potential\ndeadlock.\n\nIn case of the timeout, there is not much we can do, so we simply ignore\nthe transmitter state and optimistically try to continue.",
					"category":"description",
					"title":"Vulnerability Description"
				}
			],
			"product_status":{
				"fixed":[
					"openEuler-22.03-LTS-SP1:python3-perf-5.10.0-136.87.0.168.oe2203sp1.aarch64",
					"openEuler-22.03-LTS-SP1:kernel-debugsource-5.10.0-136.87.0.168.oe2203sp1.aarch64",
					"openEuler-22.03-LTS-SP1:kernel-source-5.10.0-136.87.0.168.oe2203sp1.aarch64",
					"openEuler-22.03-LTS-SP1:kernel-tools-5.10.0-136.87.0.168.oe2203sp1.aarch64",
					"openEuler-22.03-LTS-SP1:kernel-headers-5.10.0-136.87.0.168.oe2203sp1.aarch64",
					"openEuler-22.03-LTS-SP1:kernel-tools-devel-5.10.0-136.87.0.168.oe2203sp1.aarch64",
					"openEuler-22.03-LTS-SP1:perf-5.10.0-136.87.0.168.oe2203sp1.aarch64",
					"openEuler-22.03-LTS-SP1:kernel-devel-5.10.0-136.87.0.168.oe2203sp1.aarch64",
					"openEuler-22.03-LTS-SP1:kernel-debuginfo-5.10.0-136.87.0.168.oe2203sp1.aarch64",
					"openEuler-22.03-LTS-SP1:kernel-5.10.0-136.87.0.168.oe2203sp1.aarch64",
					"openEuler-22.03-LTS-SP1:perf-debuginfo-5.10.0-136.87.0.168.oe2203sp1.aarch64",
					"openEuler-22.03-LTS-SP1:python3-perf-debuginfo-5.10.0-136.87.0.168.oe2203sp1.aarch64",
					"openEuler-22.03-LTS-SP1:kernel-tools-debuginfo-5.10.0-136.87.0.168.oe2203sp1.aarch64",
					"openEuler-22.03-LTS-SP1:kernel-5.10.0-136.87.0.168.oe2203sp1.src",
					"openEuler-22.03-LTS-SP1:python3-perf-debuginfo-5.10.0-136.87.0.168.oe2203sp1.x86_64",
					"openEuler-22.03-LTS-SP1:kernel-devel-5.10.0-136.87.0.168.oe2203sp1.x86_64",
					"openEuler-22.03-LTS-SP1:kernel-tools-debuginfo-5.10.0-136.87.0.168.oe2203sp1.x86_64",
					"openEuler-22.03-LTS-SP1:perf-debuginfo-5.10.0-136.87.0.168.oe2203sp1.x86_64",
					"openEuler-22.03-LTS-SP1:perf-5.10.0-136.87.0.168.oe2203sp1.x86_64",
					"openEuler-22.03-LTS-SP1:kernel-5.10.0-136.87.0.168.oe2203sp1.x86_64",
					"openEuler-22.03-LTS-SP1:kernel-debuginfo-5.10.0-136.87.0.168.oe2203sp1.x86_64",
					"openEuler-22.03-LTS-SP1:kernel-source-5.10.0-136.87.0.168.oe2203sp1.x86_64",
					"openEuler-22.03-LTS-SP1:kernel-headers-5.10.0-136.87.0.168.oe2203sp1.x86_64",
					"openEuler-22.03-LTS-SP1:kernel-tools-5.10.0-136.87.0.168.oe2203sp1.x86_64",
					"openEuler-22.03-LTS-SP1:kernel-tools-devel-5.10.0-136.87.0.168.oe2203sp1.x86_64",
					"openEuler-22.03-LTS-SP1:python3-perf-5.10.0-136.87.0.168.oe2203sp1.x86_64",
					"openEuler-22.03-LTS-SP1:kernel-debugsource-5.10.0-136.87.0.168.oe2203sp1.x86_64"
				]
			},
			"remediations":[
				{
					"product_ids":[
						"openEuler-22.03-LTS-SP1:python3-perf-5.10.0-136.87.0.168.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:kernel-debugsource-5.10.0-136.87.0.168.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:kernel-source-5.10.0-136.87.0.168.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:kernel-tools-5.10.0-136.87.0.168.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:kernel-headers-5.10.0-136.87.0.168.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:kernel-tools-devel-5.10.0-136.87.0.168.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:perf-5.10.0-136.87.0.168.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:kernel-devel-5.10.0-136.87.0.168.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:kernel-debuginfo-5.10.0-136.87.0.168.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:kernel-5.10.0-136.87.0.168.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:perf-debuginfo-5.10.0-136.87.0.168.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:python3-perf-debuginfo-5.10.0-136.87.0.168.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:kernel-tools-debuginfo-5.10.0-136.87.0.168.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:kernel-5.10.0-136.87.0.168.oe2203sp1.src",
						"openEuler-22.03-LTS-SP1:python3-perf-debuginfo-5.10.0-136.87.0.168.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:kernel-devel-5.10.0-136.87.0.168.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:kernel-tools-debuginfo-5.10.0-136.87.0.168.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:perf-debuginfo-5.10.0-136.87.0.168.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:perf-5.10.0-136.87.0.168.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:kernel-5.10.0-136.87.0.168.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:kernel-debuginfo-5.10.0-136.87.0.168.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:kernel-source-5.10.0-136.87.0.168.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:kernel-headers-5.10.0-136.87.0.168.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:kernel-tools-5.10.0-136.87.0.168.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:kernel-tools-devel-5.10.0-136.87.0.168.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:python3-perf-5.10.0-136.87.0.168.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:kernel-debugsource-5.10.0-136.87.0.168.oe2203sp1.x86_64"
					],
					"details":"kernel security update",
					"category":"vendor_fix",
					"url":"https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2024-1941"
				}
			],
			"scores":[
				{
					"cvss_v3":{
						"baseSeverity":"LOW",
						"baseScore":3.9,
						"vectorString":"CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:L/I:L/A:L",
						"version":"3.1"
					},
					"products":[
						"openEuler-22.03-LTS-SP1:python3-perf-5.10.0-136.87.0.168.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:kernel-debugsource-5.10.0-136.87.0.168.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:kernel-source-5.10.0-136.87.0.168.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:kernel-tools-5.10.0-136.87.0.168.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:kernel-headers-5.10.0-136.87.0.168.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:kernel-tools-devel-5.10.0-136.87.0.168.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:perf-5.10.0-136.87.0.168.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:kernel-devel-5.10.0-136.87.0.168.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:kernel-debuginfo-5.10.0-136.87.0.168.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:kernel-5.10.0-136.87.0.168.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:perf-debuginfo-5.10.0-136.87.0.168.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:python3-perf-debuginfo-5.10.0-136.87.0.168.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:kernel-tools-debuginfo-5.10.0-136.87.0.168.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:kernel-5.10.0-136.87.0.168.oe2203sp1.src",
						"openEuler-22.03-LTS-SP1:python3-perf-debuginfo-5.10.0-136.87.0.168.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:kernel-devel-5.10.0-136.87.0.168.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:kernel-tools-debuginfo-5.10.0-136.87.0.168.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:perf-debuginfo-5.10.0-136.87.0.168.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:perf-5.10.0-136.87.0.168.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:kernel-5.10.0-136.87.0.168.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:kernel-debuginfo-5.10.0-136.87.0.168.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:kernel-source-5.10.0-136.87.0.168.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:kernel-headers-5.10.0-136.87.0.168.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:kernel-tools-5.10.0-136.87.0.168.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:kernel-tools-devel-5.10.0-136.87.0.168.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:python3-perf-5.10.0-136.87.0.168.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:kernel-debugsource-5.10.0-136.87.0.168.oe2203sp1.x86_64"
					]
				}
			],
			"threats":[
				{
					"details":"Low",
					"category":"impact"
				}
			],
			"title":"CVE-2024-40967"
		},
		{
			"cve":"CVE-2024-40972",
			"notes":[
				{
					"text":"In the Linux kernel, the following vulnerability has been resolved:\n\next4: do not create EA inode under buffer lock\n\next4_xattr_set_entry() creates new EA inodes while holding buffer lock\non the external xattr block. This is problematic as it nests all the\nallocation locking (which acquires locks on other buffers) under the\nbuffer lock. This can even deadlock when the filesystem is corrupted and\ne.g. quota file is setup to contain xattr block as data block. Move the\nallocation of EA inode out of ext4_xattr_set_entry() into the callers.",
					"category":"description",
					"title":"Vulnerability Description"
				}
			],
			"product_status":{
				"fixed":[
					"openEuler-22.03-LTS-SP1:python3-perf-5.10.0-136.87.0.168.oe2203sp1.aarch64",
					"openEuler-22.03-LTS-SP1:kernel-debugsource-5.10.0-136.87.0.168.oe2203sp1.aarch64",
					"openEuler-22.03-LTS-SP1:kernel-source-5.10.0-136.87.0.168.oe2203sp1.aarch64",
					"openEuler-22.03-LTS-SP1:kernel-tools-5.10.0-136.87.0.168.oe2203sp1.aarch64",
					"openEuler-22.03-LTS-SP1:kernel-headers-5.10.0-136.87.0.168.oe2203sp1.aarch64",
					"openEuler-22.03-LTS-SP1:kernel-tools-devel-5.10.0-136.87.0.168.oe2203sp1.aarch64",
					"openEuler-22.03-LTS-SP1:perf-5.10.0-136.87.0.168.oe2203sp1.aarch64",
					"openEuler-22.03-LTS-SP1:kernel-devel-5.10.0-136.87.0.168.oe2203sp1.aarch64",
					"openEuler-22.03-LTS-SP1:kernel-debuginfo-5.10.0-136.87.0.168.oe2203sp1.aarch64",
					"openEuler-22.03-LTS-SP1:kernel-5.10.0-136.87.0.168.oe2203sp1.aarch64",
					"openEuler-22.03-LTS-SP1:perf-debuginfo-5.10.0-136.87.0.168.oe2203sp1.aarch64",
					"openEuler-22.03-LTS-SP1:python3-perf-debuginfo-5.10.0-136.87.0.168.oe2203sp1.aarch64",
					"openEuler-22.03-LTS-SP1:kernel-tools-debuginfo-5.10.0-136.87.0.168.oe2203sp1.aarch64",
					"openEuler-22.03-LTS-SP1:kernel-5.10.0-136.87.0.168.oe2203sp1.src",
					"openEuler-22.03-LTS-SP1:python3-perf-debuginfo-5.10.0-136.87.0.168.oe2203sp1.x86_64",
					"openEuler-22.03-LTS-SP1:kernel-devel-5.10.0-136.87.0.168.oe2203sp1.x86_64",
					"openEuler-22.03-LTS-SP1:kernel-tools-debuginfo-5.10.0-136.87.0.168.oe2203sp1.x86_64",
					"openEuler-22.03-LTS-SP1:perf-debuginfo-5.10.0-136.87.0.168.oe2203sp1.x86_64",
					"openEuler-22.03-LTS-SP1:perf-5.10.0-136.87.0.168.oe2203sp1.x86_64",
					"openEuler-22.03-LTS-SP1:kernel-5.10.0-136.87.0.168.oe2203sp1.x86_64",
					"openEuler-22.03-LTS-SP1:kernel-debuginfo-5.10.0-136.87.0.168.oe2203sp1.x86_64",
					"openEuler-22.03-LTS-SP1:kernel-source-5.10.0-136.87.0.168.oe2203sp1.x86_64",
					"openEuler-22.03-LTS-SP1:kernel-headers-5.10.0-136.87.0.168.oe2203sp1.x86_64",
					"openEuler-22.03-LTS-SP1:kernel-tools-5.10.0-136.87.0.168.oe2203sp1.x86_64",
					"openEuler-22.03-LTS-SP1:kernel-tools-devel-5.10.0-136.87.0.168.oe2203sp1.x86_64",
					"openEuler-22.03-LTS-SP1:python3-perf-5.10.0-136.87.0.168.oe2203sp1.x86_64",
					"openEuler-22.03-LTS-SP1:kernel-debugsource-5.10.0-136.87.0.168.oe2203sp1.x86_64"
				]
			},
			"remediations":[
				{
					"product_ids":[
						"openEuler-22.03-LTS-SP1:python3-perf-5.10.0-136.87.0.168.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:kernel-debugsource-5.10.0-136.87.0.168.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:kernel-source-5.10.0-136.87.0.168.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:kernel-tools-5.10.0-136.87.0.168.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:kernel-headers-5.10.0-136.87.0.168.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:kernel-tools-devel-5.10.0-136.87.0.168.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:perf-5.10.0-136.87.0.168.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:kernel-devel-5.10.0-136.87.0.168.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:kernel-debuginfo-5.10.0-136.87.0.168.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:kernel-5.10.0-136.87.0.168.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:perf-debuginfo-5.10.0-136.87.0.168.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:python3-perf-debuginfo-5.10.0-136.87.0.168.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:kernel-tools-debuginfo-5.10.0-136.87.0.168.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:kernel-5.10.0-136.87.0.168.oe2203sp1.src",
						"openEuler-22.03-LTS-SP1:python3-perf-debuginfo-5.10.0-136.87.0.168.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:kernel-devel-5.10.0-136.87.0.168.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:kernel-tools-debuginfo-5.10.0-136.87.0.168.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:perf-debuginfo-5.10.0-136.87.0.168.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:perf-5.10.0-136.87.0.168.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:kernel-5.10.0-136.87.0.168.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:kernel-debuginfo-5.10.0-136.87.0.168.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:kernel-source-5.10.0-136.87.0.168.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:kernel-headers-5.10.0-136.87.0.168.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:kernel-tools-5.10.0-136.87.0.168.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:kernel-tools-devel-5.10.0-136.87.0.168.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:python3-perf-5.10.0-136.87.0.168.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:kernel-debugsource-5.10.0-136.87.0.168.oe2203sp1.x86_64"
					],
					"details":"kernel security update",
					"category":"vendor_fix",
					"url":"https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2024-1941"
				}
			],
			"scores":[
				{
					"cvss_v3":{
						"baseSeverity":"MEDIUM",
						"baseScore":4.7,
						"vectorString":"CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H",
						"version":"3.1"
					},
					"products":[
						"openEuler-22.03-LTS-SP1:python3-perf-5.10.0-136.87.0.168.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:kernel-debugsource-5.10.0-136.87.0.168.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:kernel-source-5.10.0-136.87.0.168.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:kernel-tools-5.10.0-136.87.0.168.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:kernel-headers-5.10.0-136.87.0.168.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:kernel-tools-devel-5.10.0-136.87.0.168.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:perf-5.10.0-136.87.0.168.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:kernel-devel-5.10.0-136.87.0.168.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:kernel-debuginfo-5.10.0-136.87.0.168.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:kernel-5.10.0-136.87.0.168.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:perf-debuginfo-5.10.0-136.87.0.168.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:python3-perf-debuginfo-5.10.0-136.87.0.168.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:kernel-tools-debuginfo-5.10.0-136.87.0.168.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:kernel-5.10.0-136.87.0.168.oe2203sp1.src",
						"openEuler-22.03-LTS-SP1:python3-perf-debuginfo-5.10.0-136.87.0.168.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:kernel-devel-5.10.0-136.87.0.168.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:kernel-tools-debuginfo-5.10.0-136.87.0.168.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:perf-debuginfo-5.10.0-136.87.0.168.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:perf-5.10.0-136.87.0.168.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:kernel-5.10.0-136.87.0.168.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:kernel-debuginfo-5.10.0-136.87.0.168.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:kernel-source-5.10.0-136.87.0.168.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:kernel-headers-5.10.0-136.87.0.168.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:kernel-tools-5.10.0-136.87.0.168.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:kernel-tools-devel-5.10.0-136.87.0.168.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:python3-perf-5.10.0-136.87.0.168.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:kernel-debugsource-5.10.0-136.87.0.168.oe2203sp1.x86_64"
					]
				}
			],
			"threats":[
				{
					"details":"Medium",
					"category":"impact"
				}
			],
			"title":"CVE-2024-40972"
		},
		{
			"cve":"CVE-2024-40980",
			"notes":[
				{
					"text":"In the Linux kernel, the following vulnerability has been resolved:\n\ndrop_monitor: replace spin_lock by raw_spin_lock\n\ntrace_drop_common() is called with preemption disabled, and it acquires\na spin_lock. This is problematic for RT kernels because spin_locks are\nsleeping locks in this configuration, which causes the following splat:\n\nBUG: sleeping function called from invalid context at kernel/locking/spinlock_rt.c:48\nin_atomic(): 1, irqs_disabled(): 1, non_block: 0, pid: 449, name: rcuc/47\npreempt_count: 1, expected: 0\nRCU nest depth: 2, expected: 2\n5 locks held by rcuc/47/449:\n #0: ff1100086ec30a60 ((softirq_ctrl.lock)){+.+.}-{2:2}, at: __local_bh_disable_ip+0x105/0x210\n #1: ffffffffb394a280 (rcu_read_lock){....}-{1:2}, at: rt_spin_lock+0xbf/0x130\n #2: ffffffffb394a280 (rcu_read_lock){....}-{1:2}, at: __local_bh_disable_ip+0x11c/0x210\n #3: ffffffffb394a160 (rcu_callback){....}-{0:0}, at: rcu_do_batch+0x360/0xc70\n #4: ff1100086ee07520 (&data->lock){+.+.}-{2:2}, at: trace_drop_common.constprop.0+0xb5/0x290\nirq event stamp: 139909\nhardirqs last  enabled at (139908): [<ffffffffb1df2b33>] _raw_spin_unlock_irqrestore+0x63/0x80\nhardirqs last disabled at (139909): [<ffffffffb19bd03d>] trace_drop_common.constprop.0+0x26d/0x290\nsoftirqs last  enabled at (139892): [<ffffffffb07a1083>] __local_bh_enable_ip+0x103/0x170\nsoftirqs last disabled at (139898): [<ffffffffb0909b33>] rcu_cpu_kthread+0x93/0x1f0\nPreemption disabled at:\n[<ffffffffb1de786b>] rt_mutex_slowunlock+0xab/0x2e0\nCPU: 47 PID: 449 Comm: rcuc/47 Not tainted 6.9.0-rc2-rt1+ #7\nHardware name: Dell Inc. PowerEdge R650/0Y2G81, BIOS 1.6.5 04/15/2022\nCall Trace:\n <TASK>\n dump_stack_lvl+0x8c/0xd0\n dump_stack+0x14/0x20\n __might_resched+0x21e/0x2f0\n rt_spin_lock+0x5e/0x130\n ? trace_drop_common.constprop.0+0xb5/0x290\n ? skb_queue_purge_reason.part.0+0x1bf/0x230\n trace_drop_common.constprop.0+0xb5/0x290\n ? preempt_count_sub+0x1c/0xd0\n ? _raw_spin_unlock_irqrestore+0x4a/0x80\n ? __pfx_trace_drop_common.constprop.0+0x10/0x10\n ? rt_mutex_slowunlock+0x26a/0x2e0\n ? skb_queue_purge_reason.part.0+0x1bf/0x230\n ? __pfx_rt_mutex_slowunlock+0x10/0x10\n ? skb_queue_purge_reason.part.0+0x1bf/0x230\n trace_kfree_skb_hit+0x15/0x20\n trace_kfree_skb+0xe9/0x150\n kfree_skb_reason+0x7b/0x110\n skb_queue_purge_reason.part.0+0x1bf/0x230\n ? __pfx_skb_queue_purge_reason.part.0+0x10/0x10\n ? mark_lock.part.0+0x8a/0x520\n...\n\ntrace_drop_common() also disables interrupts, but this is a minor issue\nbecause we could easily replace it with a local_lock.\n\nReplace the spin_lock with raw_spin_lock to avoid sleeping in atomic\ncontext.",
					"category":"description",
					"title":"Vulnerability Description"
				}
			],
			"product_status":{
				"fixed":[
					"openEuler-22.03-LTS-SP1:python3-perf-5.10.0-136.87.0.168.oe2203sp1.aarch64",
					"openEuler-22.03-LTS-SP1:kernel-debugsource-5.10.0-136.87.0.168.oe2203sp1.aarch64",
					"openEuler-22.03-LTS-SP1:kernel-source-5.10.0-136.87.0.168.oe2203sp1.aarch64",
					"openEuler-22.03-LTS-SP1:kernel-tools-5.10.0-136.87.0.168.oe2203sp1.aarch64",
					"openEuler-22.03-LTS-SP1:kernel-headers-5.10.0-136.87.0.168.oe2203sp1.aarch64",
					"openEuler-22.03-LTS-SP1:kernel-tools-devel-5.10.0-136.87.0.168.oe2203sp1.aarch64",
					"openEuler-22.03-LTS-SP1:perf-5.10.0-136.87.0.168.oe2203sp1.aarch64",
					"openEuler-22.03-LTS-SP1:kernel-devel-5.10.0-136.87.0.168.oe2203sp1.aarch64",
					"openEuler-22.03-LTS-SP1:kernel-debuginfo-5.10.0-136.87.0.168.oe2203sp1.aarch64",
					"openEuler-22.03-LTS-SP1:kernel-5.10.0-136.87.0.168.oe2203sp1.aarch64",
					"openEuler-22.03-LTS-SP1:perf-debuginfo-5.10.0-136.87.0.168.oe2203sp1.aarch64",
					"openEuler-22.03-LTS-SP1:python3-perf-debuginfo-5.10.0-136.87.0.168.oe2203sp1.aarch64",
					"openEuler-22.03-LTS-SP1:kernel-tools-debuginfo-5.10.0-136.87.0.168.oe2203sp1.aarch64",
					"openEuler-22.03-LTS-SP1:kernel-5.10.0-136.87.0.168.oe2203sp1.src",
					"openEuler-22.03-LTS-SP1:python3-perf-debuginfo-5.10.0-136.87.0.168.oe2203sp1.x86_64",
					"openEuler-22.03-LTS-SP1:kernel-devel-5.10.0-136.87.0.168.oe2203sp1.x86_64",
					"openEuler-22.03-LTS-SP1:kernel-tools-debuginfo-5.10.0-136.87.0.168.oe2203sp1.x86_64",
					"openEuler-22.03-LTS-SP1:perf-debuginfo-5.10.0-136.87.0.168.oe2203sp1.x86_64",
					"openEuler-22.03-LTS-SP1:perf-5.10.0-136.87.0.168.oe2203sp1.x86_64",
					"openEuler-22.03-LTS-SP1:kernel-5.10.0-136.87.0.168.oe2203sp1.x86_64",
					"openEuler-22.03-LTS-SP1:kernel-debuginfo-5.10.0-136.87.0.168.oe2203sp1.x86_64",
					"openEuler-22.03-LTS-SP1:kernel-source-5.10.0-136.87.0.168.oe2203sp1.x86_64",
					"openEuler-22.03-LTS-SP1:kernel-headers-5.10.0-136.87.0.168.oe2203sp1.x86_64",
					"openEuler-22.03-LTS-SP1:kernel-tools-5.10.0-136.87.0.168.oe2203sp1.x86_64",
					"openEuler-22.03-LTS-SP1:kernel-tools-devel-5.10.0-136.87.0.168.oe2203sp1.x86_64",
					"openEuler-22.03-LTS-SP1:python3-perf-5.10.0-136.87.0.168.oe2203sp1.x86_64",
					"openEuler-22.03-LTS-SP1:kernel-debugsource-5.10.0-136.87.0.168.oe2203sp1.x86_64"
				]
			},
			"remediations":[
				{
					"product_ids":[
						"openEuler-22.03-LTS-SP1:python3-perf-5.10.0-136.87.0.168.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:kernel-debugsource-5.10.0-136.87.0.168.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:kernel-source-5.10.0-136.87.0.168.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:kernel-tools-5.10.0-136.87.0.168.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:kernel-headers-5.10.0-136.87.0.168.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:kernel-tools-devel-5.10.0-136.87.0.168.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:perf-5.10.0-136.87.0.168.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:kernel-devel-5.10.0-136.87.0.168.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:kernel-debuginfo-5.10.0-136.87.0.168.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:kernel-5.10.0-136.87.0.168.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:perf-debuginfo-5.10.0-136.87.0.168.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:python3-perf-debuginfo-5.10.0-136.87.0.168.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:kernel-tools-debuginfo-5.10.0-136.87.0.168.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:kernel-5.10.0-136.87.0.168.oe2203sp1.src",
						"openEuler-22.03-LTS-SP1:python3-perf-debuginfo-5.10.0-136.87.0.168.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:kernel-devel-5.10.0-136.87.0.168.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:kernel-tools-debuginfo-5.10.0-136.87.0.168.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:perf-debuginfo-5.10.0-136.87.0.168.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:perf-5.10.0-136.87.0.168.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:kernel-5.10.0-136.87.0.168.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:kernel-debuginfo-5.10.0-136.87.0.168.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:kernel-source-5.10.0-136.87.0.168.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:kernel-headers-5.10.0-136.87.0.168.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:kernel-tools-5.10.0-136.87.0.168.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:kernel-tools-devel-5.10.0-136.87.0.168.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:python3-perf-5.10.0-136.87.0.168.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:kernel-debugsource-5.10.0-136.87.0.168.oe2203sp1.x86_64"
					],
					"details":"kernel security update",
					"category":"vendor_fix",
					"url":"https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2024-1941"
				}
			],
			"scores":[
				{
					"cvss_v3":{
						"baseSeverity":"MEDIUM",
						"baseScore":4.7,
						"vectorString":"CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H",
						"version":"3.1"
					},
					"products":[
						"openEuler-22.03-LTS-SP1:python3-perf-5.10.0-136.87.0.168.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:kernel-debugsource-5.10.0-136.87.0.168.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:kernel-source-5.10.0-136.87.0.168.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:kernel-tools-5.10.0-136.87.0.168.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:kernel-headers-5.10.0-136.87.0.168.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:kernel-tools-devel-5.10.0-136.87.0.168.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:perf-5.10.0-136.87.0.168.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:kernel-devel-5.10.0-136.87.0.168.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:kernel-debuginfo-5.10.0-136.87.0.168.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:kernel-5.10.0-136.87.0.168.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:perf-debuginfo-5.10.0-136.87.0.168.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:python3-perf-debuginfo-5.10.0-136.87.0.168.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:kernel-tools-debuginfo-5.10.0-136.87.0.168.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:kernel-5.10.0-136.87.0.168.oe2203sp1.src",
						"openEuler-22.03-LTS-SP1:python3-perf-debuginfo-5.10.0-136.87.0.168.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:kernel-devel-5.10.0-136.87.0.168.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:kernel-tools-debuginfo-5.10.0-136.87.0.168.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:perf-debuginfo-5.10.0-136.87.0.168.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:perf-5.10.0-136.87.0.168.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:kernel-5.10.0-136.87.0.168.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:kernel-debuginfo-5.10.0-136.87.0.168.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:kernel-source-5.10.0-136.87.0.168.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:kernel-headers-5.10.0-136.87.0.168.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:kernel-tools-5.10.0-136.87.0.168.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:kernel-tools-devel-5.10.0-136.87.0.168.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:python3-perf-5.10.0-136.87.0.168.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:kernel-debugsource-5.10.0-136.87.0.168.oe2203sp1.x86_64"
					]
				}
			],
			"threats":[
				{
					"details":"Medium",
					"category":"impact"
				}
			],
			"title":"CVE-2024-40980"
		},
		{
			"cve":"CVE-2024-40981",
			"notes":[
				{
					"text":"In the Linux kernel, the following vulnerability has been resolved:\n\nbatman-adv: bypass empty buckets in batadv_purge_orig_ref()\n\nMany syzbot reports are pointing to soft lockups in\nbatadv_purge_orig_ref() [1]\n\nRoot cause is unknown, but we can avoid spending too much\ntime there and perhaps get more interesting reports.\n\n[1]\n\nwatchdog: BUG: soft lockup - CPU#0 stuck for 27s! [kworker/u4:6:621]\nModules linked in:\nirq event stamp: 6182794\n hardirqs last  enabled at (6182793): [<ffff8000801dae10>] __local_bh_enable_ip+0x224/0x44c kernel/softirq.c:386\n hardirqs last disabled at (6182794): [<ffff80008ad66a78>] __el1_irq arch/arm64/kernel/entry-common.c:533 [inline]\n hardirqs last disabled at (6182794): [<ffff80008ad66a78>] el1_interrupt+0x24/0x68 arch/arm64/kernel/entry-common.c:551\n softirqs last  enabled at (6182792): [<ffff80008aab71c4>] spin_unlock_bh include/linux/spinlock.h:396 [inline]\n softirqs last  enabled at (6182792): [<ffff80008aab71c4>] batadv_purge_orig_ref+0x114c/0x1228 net/batman-adv/originator.c:1287\n softirqs last disabled at (6182790): [<ffff80008aab61dc>] spin_lock_bh include/linux/spinlock.h:356 [inline]\n softirqs last disabled at (6182790): [<ffff80008aab61dc>] batadv_purge_orig_ref+0x164/0x1228 net/batman-adv/originator.c:1271\nCPU: 0 PID: 621 Comm: kworker/u4:6 Not tainted 6.8.0-rc7-syzkaller-g707081b61156 #0\nHardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/29/2024\nWorkqueue: bat_events batadv_purge_orig\npstate: 80400005 (Nzcv daif +PAN -UAO -TCO -DIT -SSBS BTYPE=--)\n pc : should_resched arch/arm64/include/asm/preempt.h:79 [inline]\n pc : __local_bh_enable_ip+0x228/0x44c kernel/softirq.c:388\n lr : __local_bh_enable_ip+0x224/0x44c kernel/softirq.c:386\nsp : ffff800099007970\nx29: ffff800099007980 x28: 1fffe00018fce1bd x27: dfff800000000000\nx26: ffff0000d2620008 x25: ffff0000c7e70de8 x24: 0000000000000001\nx23: 1fffe00018e57781 x22: dfff800000000000 x21: ffff80008aab71c4\nx20: ffff0001b40136c0 x19: ffff0000c72bbc08 x18: 1fffe0001a817bb0\nx17: ffff800125414000 x16: ffff80008032116c x15: 0000000000000001\nx14: 1fffe0001ee9d610 x13: 0000000000000000 x12: 0000000000000003\nx11: 0000000000000000 x10: 0000000000ff0100 x9 : 0000000000000000\nx8 : 00000000005e5789 x7 : ffff80008aab61dc x6 : 0000000000000000\nx5 : 0000000000000000 x4 : 0000000000000001 x3 : 0000000000000000\nx2 : 0000000000000006 x1 : 0000000000000080 x0 : ffff800125414000\nCall trace:\n  __daif_local_irq_enable arch/arm64/include/asm/irqflags.h:27 [inline]\n  arch_local_irq_enable arch/arm64/include/asm/irqflags.h:49 [inline]\n  __local_bh_enable_ip+0x228/0x44c kernel/softirq.c:386\n  __raw_spin_unlock_bh include/linux/spinlock_api_smp.h:167 [inline]\n  _raw_spin_unlock_bh+0x3c/0x4c kernel/locking/spinlock.c:210\n  spin_unlock_bh include/linux/spinlock.h:396 [inline]\n  batadv_purge_orig_ref+0x114c/0x1228 net/batman-adv/originator.c:1287\n  batadv_purge_orig+0x20/0x70 net/batman-adv/originator.c:1300\n  process_one_work+0x694/0x1204 kernel/workqueue.c:2633\n  process_scheduled_works kernel/workqueue.c:2706 [inline]\n  worker_thread+0x938/0xef4 kernel/workqueue.c:2787\n  kthread+0x288/0x310 kernel/kthread.c:388\n  ret_from_fork+0x10/0x20 arch/arm64/kernel/entry.S:860\nSending NMI from CPU 0 to CPUs 1:\nNMI backtrace for cpu 1\nCPU: 1 PID: 0 Comm: swapper/1 Not tainted 6.8.0-rc7-syzkaller-g707081b61156 #0\nHardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/29/2024\npstate: 80400005 (Nzcv daif +PAN -UAO -TCO -DIT -SSBS BTYPE=--)\n pc : arch_local_irq_enable+0x8/0xc arch/arm64/include/asm/irqflags.h:51\n lr : default_idle_call+0xf8/0x128 kernel/sched/idle.c:103\nsp : ffff800093a17d30\nx29: ffff800093a17d30 x28: dfff800000000000 x27: 1ffff00012742fb4\nx26: ffff80008ec9d000 x25: 0000000000000000 x24: 0000000000000002\nx23: 1ffff00011d93a74 x22: ffff80008ec9d3a0 x21: 0000000000000000\nx20: ffff0000c19dbc00 x19: ffff8000802d0fd8 x18: 1fffe00036804396\nx17: ffff80008ec9d000 x16: ffff8000802d089c x15: 0000000000000001\n---truncated---",
					"category":"description",
					"title":"Vulnerability Description"
				}
			],
			"product_status":{
				"fixed":[
					"openEuler-22.03-LTS-SP1:python3-perf-5.10.0-136.87.0.168.oe2203sp1.aarch64",
					"openEuler-22.03-LTS-SP1:kernel-debugsource-5.10.0-136.87.0.168.oe2203sp1.aarch64",
					"openEuler-22.03-LTS-SP1:kernel-source-5.10.0-136.87.0.168.oe2203sp1.aarch64",
					"openEuler-22.03-LTS-SP1:kernel-tools-5.10.0-136.87.0.168.oe2203sp1.aarch64",
					"openEuler-22.03-LTS-SP1:kernel-headers-5.10.0-136.87.0.168.oe2203sp1.aarch64",
					"openEuler-22.03-LTS-SP1:kernel-tools-devel-5.10.0-136.87.0.168.oe2203sp1.aarch64",
					"openEuler-22.03-LTS-SP1:perf-5.10.0-136.87.0.168.oe2203sp1.aarch64",
					"openEuler-22.03-LTS-SP1:kernel-devel-5.10.0-136.87.0.168.oe2203sp1.aarch64",
					"openEuler-22.03-LTS-SP1:kernel-debuginfo-5.10.0-136.87.0.168.oe2203sp1.aarch64",
					"openEuler-22.03-LTS-SP1:kernel-5.10.0-136.87.0.168.oe2203sp1.aarch64",
					"openEuler-22.03-LTS-SP1:perf-debuginfo-5.10.0-136.87.0.168.oe2203sp1.aarch64",
					"openEuler-22.03-LTS-SP1:python3-perf-debuginfo-5.10.0-136.87.0.168.oe2203sp1.aarch64",
					"openEuler-22.03-LTS-SP1:kernel-tools-debuginfo-5.10.0-136.87.0.168.oe2203sp1.aarch64",
					"openEuler-22.03-LTS-SP1:kernel-5.10.0-136.87.0.168.oe2203sp1.src",
					"openEuler-22.03-LTS-SP1:python3-perf-debuginfo-5.10.0-136.87.0.168.oe2203sp1.x86_64",
					"openEuler-22.03-LTS-SP1:kernel-devel-5.10.0-136.87.0.168.oe2203sp1.x86_64",
					"openEuler-22.03-LTS-SP1:kernel-tools-debuginfo-5.10.0-136.87.0.168.oe2203sp1.x86_64",
					"openEuler-22.03-LTS-SP1:perf-debuginfo-5.10.0-136.87.0.168.oe2203sp1.x86_64",
					"openEuler-22.03-LTS-SP1:perf-5.10.0-136.87.0.168.oe2203sp1.x86_64",
					"openEuler-22.03-LTS-SP1:kernel-5.10.0-136.87.0.168.oe2203sp1.x86_64",
					"openEuler-22.03-LTS-SP1:kernel-debuginfo-5.10.0-136.87.0.168.oe2203sp1.x86_64",
					"openEuler-22.03-LTS-SP1:kernel-source-5.10.0-136.87.0.168.oe2203sp1.x86_64",
					"openEuler-22.03-LTS-SP1:kernel-headers-5.10.0-136.87.0.168.oe2203sp1.x86_64",
					"openEuler-22.03-LTS-SP1:kernel-tools-5.10.0-136.87.0.168.oe2203sp1.x86_64",
					"openEuler-22.03-LTS-SP1:kernel-tools-devel-5.10.0-136.87.0.168.oe2203sp1.x86_64",
					"openEuler-22.03-LTS-SP1:python3-perf-5.10.0-136.87.0.168.oe2203sp1.x86_64",
					"openEuler-22.03-LTS-SP1:kernel-debugsource-5.10.0-136.87.0.168.oe2203sp1.x86_64"
				]
			},
			"remediations":[
				{
					"product_ids":[
						"openEuler-22.03-LTS-SP1:python3-perf-5.10.0-136.87.0.168.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:kernel-debugsource-5.10.0-136.87.0.168.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:kernel-source-5.10.0-136.87.0.168.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:kernel-tools-5.10.0-136.87.0.168.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:kernel-headers-5.10.0-136.87.0.168.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:kernel-tools-devel-5.10.0-136.87.0.168.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:perf-5.10.0-136.87.0.168.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:kernel-devel-5.10.0-136.87.0.168.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:kernel-debuginfo-5.10.0-136.87.0.168.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:kernel-5.10.0-136.87.0.168.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:perf-debuginfo-5.10.0-136.87.0.168.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:python3-perf-debuginfo-5.10.0-136.87.0.168.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:kernel-tools-debuginfo-5.10.0-136.87.0.168.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:kernel-5.10.0-136.87.0.168.oe2203sp1.src",
						"openEuler-22.03-LTS-SP1:python3-perf-debuginfo-5.10.0-136.87.0.168.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:kernel-devel-5.10.0-136.87.0.168.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:kernel-tools-debuginfo-5.10.0-136.87.0.168.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:perf-debuginfo-5.10.0-136.87.0.168.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:perf-5.10.0-136.87.0.168.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:kernel-5.10.0-136.87.0.168.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:kernel-debuginfo-5.10.0-136.87.0.168.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:kernel-source-5.10.0-136.87.0.168.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:kernel-headers-5.10.0-136.87.0.168.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:kernel-tools-5.10.0-136.87.0.168.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:kernel-tools-devel-5.10.0-136.87.0.168.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:python3-perf-5.10.0-136.87.0.168.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:kernel-debugsource-5.10.0-136.87.0.168.oe2203sp1.x86_64"
					],
					"details":"kernel security update",
					"category":"vendor_fix",
					"url":"https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2024-1941"
				}
			],
			"scores":[
				{
					"cvss_v3":{
						"baseSeverity":"MEDIUM",
						"baseScore":5.5,
						"vectorString":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
						"version":"3.1"
					},
					"products":[
						"openEuler-22.03-LTS-SP1:python3-perf-5.10.0-136.87.0.168.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:kernel-debugsource-5.10.0-136.87.0.168.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:kernel-source-5.10.0-136.87.0.168.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:kernel-tools-5.10.0-136.87.0.168.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:kernel-headers-5.10.0-136.87.0.168.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:kernel-tools-devel-5.10.0-136.87.0.168.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:perf-5.10.0-136.87.0.168.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:kernel-devel-5.10.0-136.87.0.168.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:kernel-debuginfo-5.10.0-136.87.0.168.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:kernel-5.10.0-136.87.0.168.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:perf-debuginfo-5.10.0-136.87.0.168.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:python3-perf-debuginfo-5.10.0-136.87.0.168.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:kernel-tools-debuginfo-5.10.0-136.87.0.168.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:kernel-5.10.0-136.87.0.168.oe2203sp1.src",
						"openEuler-22.03-LTS-SP1:python3-perf-debuginfo-5.10.0-136.87.0.168.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:kernel-devel-5.10.0-136.87.0.168.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:kernel-tools-debuginfo-5.10.0-136.87.0.168.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:perf-debuginfo-5.10.0-136.87.0.168.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:perf-5.10.0-136.87.0.168.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:kernel-5.10.0-136.87.0.168.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:kernel-debuginfo-5.10.0-136.87.0.168.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:kernel-source-5.10.0-136.87.0.168.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:kernel-headers-5.10.0-136.87.0.168.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:kernel-tools-5.10.0-136.87.0.168.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:kernel-tools-devel-5.10.0-136.87.0.168.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:python3-perf-5.10.0-136.87.0.168.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:kernel-debugsource-5.10.0-136.87.0.168.oe2203sp1.x86_64"
					]
				}
			],
			"threats":[
				{
					"details":"Medium",
					"category":"impact"
				}
			],
			"title":"CVE-2024-40981"
		},
		{
			"cve":"CVE-2024-40995",
			"notes":[
				{
					"text":"In the Linux kernel, the following vulnerability has been resolved:\n\nnet/sched: act_api: fix possible infinite loop in tcf_idr_check_alloc()\n\nsyzbot found hanging tasks waiting on rtnl_lock [1]\n\nA reproducer is available in the syzbot bug.\n\nWhen a request to add multiple actions with the same index is sent, the\nsecond request will block forever on the first request. This holds\nrtnl_lock, and causes tasks to hang.\n\nReturn -EAGAIN to prevent infinite looping, while keeping documented\nbehavior.\n\n[1]\n\nINFO: task kworker/1:0:5088 blocked for more than 143 seconds.\nNot tainted 6.9.0-rc4-syzkaller-00173-g3cdb45594619 #0\n\"echo 0 > /proc/sys/kernel/hung_task_timeout_secs\" disables this message.\ntask:kworker/1:0 state:D stack:23744 pid:5088 tgid:5088 ppid:2 flags:0x00004000\nWorkqueue: events_power_efficient reg_check_chans_work\nCall Trace:\n<TASK>\ncontext_switch kernel/sched/core.c:5409 [inline]\n__schedule+0xf15/0x5d00 kernel/sched/core.c:6746\n__schedule_loop kernel/sched/core.c:6823 [inline]\nschedule+0xe7/0x350 kernel/sched/core.c:6838\nschedule_preempt_disabled+0x13/0x30 kernel/sched/core.c:6895\n__mutex_lock_common kernel/locking/mutex.c:684 [inline]\n__mutex_lock+0x5b8/0x9c0 kernel/locking/mutex.c:752\nwiphy_lock include/net/cfg80211.h:5953 [inline]\nreg_leave_invalid_chans net/wireless/reg.c:2466 [inline]\nreg_check_chans_work+0x10a/0x10e0 net/wireless/reg.c:2481",
					"category":"description",
					"title":"Vulnerability Description"
				}
			],
			"product_status":{
				"fixed":[
					"openEuler-22.03-LTS-SP1:python3-perf-5.10.0-136.87.0.168.oe2203sp1.aarch64",
					"openEuler-22.03-LTS-SP1:kernel-debugsource-5.10.0-136.87.0.168.oe2203sp1.aarch64",
					"openEuler-22.03-LTS-SP1:kernel-source-5.10.0-136.87.0.168.oe2203sp1.aarch64",
					"openEuler-22.03-LTS-SP1:kernel-tools-5.10.0-136.87.0.168.oe2203sp1.aarch64",
					"openEuler-22.03-LTS-SP1:kernel-headers-5.10.0-136.87.0.168.oe2203sp1.aarch64",
					"openEuler-22.03-LTS-SP1:kernel-tools-devel-5.10.0-136.87.0.168.oe2203sp1.aarch64",
					"openEuler-22.03-LTS-SP1:perf-5.10.0-136.87.0.168.oe2203sp1.aarch64",
					"openEuler-22.03-LTS-SP1:kernel-devel-5.10.0-136.87.0.168.oe2203sp1.aarch64",
					"openEuler-22.03-LTS-SP1:kernel-debuginfo-5.10.0-136.87.0.168.oe2203sp1.aarch64",
					"openEuler-22.03-LTS-SP1:kernel-5.10.0-136.87.0.168.oe2203sp1.aarch64",
					"openEuler-22.03-LTS-SP1:perf-debuginfo-5.10.0-136.87.0.168.oe2203sp1.aarch64",
					"openEuler-22.03-LTS-SP1:python3-perf-debuginfo-5.10.0-136.87.0.168.oe2203sp1.aarch64",
					"openEuler-22.03-LTS-SP1:kernel-tools-debuginfo-5.10.0-136.87.0.168.oe2203sp1.aarch64",
					"openEuler-22.03-LTS-SP1:kernel-5.10.0-136.87.0.168.oe2203sp1.src",
					"openEuler-22.03-LTS-SP1:python3-perf-debuginfo-5.10.0-136.87.0.168.oe2203sp1.x86_64",
					"openEuler-22.03-LTS-SP1:kernel-devel-5.10.0-136.87.0.168.oe2203sp1.x86_64",
					"openEuler-22.03-LTS-SP1:kernel-tools-debuginfo-5.10.0-136.87.0.168.oe2203sp1.x86_64",
					"openEuler-22.03-LTS-SP1:perf-debuginfo-5.10.0-136.87.0.168.oe2203sp1.x86_64",
					"openEuler-22.03-LTS-SP1:perf-5.10.0-136.87.0.168.oe2203sp1.x86_64",
					"openEuler-22.03-LTS-SP1:kernel-5.10.0-136.87.0.168.oe2203sp1.x86_64",
					"openEuler-22.03-LTS-SP1:kernel-debuginfo-5.10.0-136.87.0.168.oe2203sp1.x86_64",
					"openEuler-22.03-LTS-SP1:kernel-source-5.10.0-136.87.0.168.oe2203sp1.x86_64",
					"openEuler-22.03-LTS-SP1:kernel-headers-5.10.0-136.87.0.168.oe2203sp1.x86_64",
					"openEuler-22.03-LTS-SP1:kernel-tools-5.10.0-136.87.0.168.oe2203sp1.x86_64",
					"openEuler-22.03-LTS-SP1:kernel-tools-devel-5.10.0-136.87.0.168.oe2203sp1.x86_64",
					"openEuler-22.03-LTS-SP1:python3-perf-5.10.0-136.87.0.168.oe2203sp1.x86_64",
					"openEuler-22.03-LTS-SP1:kernel-debugsource-5.10.0-136.87.0.168.oe2203sp1.x86_64"
				]
			},
			"remediations":[
				{
					"product_ids":[
						"openEuler-22.03-LTS-SP1:python3-perf-5.10.0-136.87.0.168.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:kernel-debugsource-5.10.0-136.87.0.168.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:kernel-source-5.10.0-136.87.0.168.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:kernel-tools-5.10.0-136.87.0.168.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:kernel-headers-5.10.0-136.87.0.168.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:kernel-tools-devel-5.10.0-136.87.0.168.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:perf-5.10.0-136.87.0.168.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:kernel-devel-5.10.0-136.87.0.168.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:kernel-debuginfo-5.10.0-136.87.0.168.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:kernel-5.10.0-136.87.0.168.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:perf-debuginfo-5.10.0-136.87.0.168.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:python3-perf-debuginfo-5.10.0-136.87.0.168.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:kernel-tools-debuginfo-5.10.0-136.87.0.168.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:kernel-5.10.0-136.87.0.168.oe2203sp1.src",
						"openEuler-22.03-LTS-SP1:python3-perf-debuginfo-5.10.0-136.87.0.168.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:kernel-devel-5.10.0-136.87.0.168.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:kernel-tools-debuginfo-5.10.0-136.87.0.168.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:perf-debuginfo-5.10.0-136.87.0.168.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:perf-5.10.0-136.87.0.168.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:kernel-5.10.0-136.87.0.168.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:kernel-debuginfo-5.10.0-136.87.0.168.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:kernel-source-5.10.0-136.87.0.168.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:kernel-headers-5.10.0-136.87.0.168.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:kernel-tools-5.10.0-136.87.0.168.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:kernel-tools-devel-5.10.0-136.87.0.168.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:python3-perf-5.10.0-136.87.0.168.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:kernel-debugsource-5.10.0-136.87.0.168.oe2203sp1.x86_64"
					],
					"details":"kernel security update",
					"category":"vendor_fix",
					"url":"https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2024-1941"
				}
			],
			"scores":[
				{
					"cvss_v3":{
						"baseSeverity":"MEDIUM",
						"baseScore":5.5,
						"vectorString":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
						"version":"3.1"
					},
					"products":[
						"openEuler-22.03-LTS-SP1:python3-perf-5.10.0-136.87.0.168.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:kernel-debugsource-5.10.0-136.87.0.168.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:kernel-source-5.10.0-136.87.0.168.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:kernel-tools-5.10.0-136.87.0.168.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:kernel-headers-5.10.0-136.87.0.168.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:kernel-tools-devel-5.10.0-136.87.0.168.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:perf-5.10.0-136.87.0.168.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:kernel-devel-5.10.0-136.87.0.168.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:kernel-debuginfo-5.10.0-136.87.0.168.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:kernel-5.10.0-136.87.0.168.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:perf-debuginfo-5.10.0-136.87.0.168.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:python3-perf-debuginfo-5.10.0-136.87.0.168.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:kernel-tools-debuginfo-5.10.0-136.87.0.168.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:kernel-5.10.0-136.87.0.168.oe2203sp1.src",
						"openEuler-22.03-LTS-SP1:python3-perf-debuginfo-5.10.0-136.87.0.168.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:kernel-devel-5.10.0-136.87.0.168.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:kernel-tools-debuginfo-5.10.0-136.87.0.168.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:perf-debuginfo-5.10.0-136.87.0.168.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:perf-5.10.0-136.87.0.168.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:kernel-5.10.0-136.87.0.168.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:kernel-debuginfo-5.10.0-136.87.0.168.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:kernel-source-5.10.0-136.87.0.168.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:kernel-headers-5.10.0-136.87.0.168.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:kernel-tools-5.10.0-136.87.0.168.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:kernel-tools-devel-5.10.0-136.87.0.168.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:python3-perf-5.10.0-136.87.0.168.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:kernel-debugsource-5.10.0-136.87.0.168.oe2203sp1.x86_64"
					]
				}
			],
			"threats":[
				{
					"details":"Medium",
					"category":"impact"
				}
			],
			"title":"CVE-2024-40995"
		},
		{
			"cve":"CVE-2024-41011",
			"notes":[
				{
					"text":"In the Linux kernel, the following vulnerability has been resolved:\n\ndrm/amdkfd: don't allow mapping the MMIO HDP page with large pages\n\nWe don't get the right offset in that case.  The GPU has\nan unused 4K area of the register BAR space into which you can\nremap registers.  We remap the HDP flush registers into this\nspace to allow userspace (CPU or GPU) to flush the HDP when it\nupdates VRAM.  However, on systems with >4K pages, we end up\nexposing PAGE_SIZE of MMIO space.",
					"category":"description",
					"title":"Vulnerability Description"
				}
			],
			"product_status":{
				"fixed":[
					"openEuler-22.03-LTS-SP1:python3-perf-5.10.0-136.87.0.168.oe2203sp1.aarch64",
					"openEuler-22.03-LTS-SP1:kernel-debugsource-5.10.0-136.87.0.168.oe2203sp1.aarch64",
					"openEuler-22.03-LTS-SP1:kernel-source-5.10.0-136.87.0.168.oe2203sp1.aarch64",
					"openEuler-22.03-LTS-SP1:kernel-tools-5.10.0-136.87.0.168.oe2203sp1.aarch64",
					"openEuler-22.03-LTS-SP1:kernel-headers-5.10.0-136.87.0.168.oe2203sp1.aarch64",
					"openEuler-22.03-LTS-SP1:kernel-tools-devel-5.10.0-136.87.0.168.oe2203sp1.aarch64",
					"openEuler-22.03-LTS-SP1:perf-5.10.0-136.87.0.168.oe2203sp1.aarch64",
					"openEuler-22.03-LTS-SP1:kernel-devel-5.10.0-136.87.0.168.oe2203sp1.aarch64",
					"openEuler-22.03-LTS-SP1:kernel-debuginfo-5.10.0-136.87.0.168.oe2203sp1.aarch64",
					"openEuler-22.03-LTS-SP1:kernel-5.10.0-136.87.0.168.oe2203sp1.aarch64",
					"openEuler-22.03-LTS-SP1:perf-debuginfo-5.10.0-136.87.0.168.oe2203sp1.aarch64",
					"openEuler-22.03-LTS-SP1:python3-perf-debuginfo-5.10.0-136.87.0.168.oe2203sp1.aarch64",
					"openEuler-22.03-LTS-SP1:kernel-tools-debuginfo-5.10.0-136.87.0.168.oe2203sp1.aarch64",
					"openEuler-22.03-LTS-SP1:kernel-5.10.0-136.87.0.168.oe2203sp1.src",
					"openEuler-22.03-LTS-SP1:python3-perf-debuginfo-5.10.0-136.87.0.168.oe2203sp1.x86_64",
					"openEuler-22.03-LTS-SP1:kernel-devel-5.10.0-136.87.0.168.oe2203sp1.x86_64",
					"openEuler-22.03-LTS-SP1:kernel-tools-debuginfo-5.10.0-136.87.0.168.oe2203sp1.x86_64",
					"openEuler-22.03-LTS-SP1:perf-debuginfo-5.10.0-136.87.0.168.oe2203sp1.x86_64",
					"openEuler-22.03-LTS-SP1:perf-5.10.0-136.87.0.168.oe2203sp1.x86_64",
					"openEuler-22.03-LTS-SP1:kernel-5.10.0-136.87.0.168.oe2203sp1.x86_64",
					"openEuler-22.03-LTS-SP1:kernel-debuginfo-5.10.0-136.87.0.168.oe2203sp1.x86_64",
					"openEuler-22.03-LTS-SP1:kernel-source-5.10.0-136.87.0.168.oe2203sp1.x86_64",
					"openEuler-22.03-LTS-SP1:kernel-headers-5.10.0-136.87.0.168.oe2203sp1.x86_64",
					"openEuler-22.03-LTS-SP1:kernel-tools-5.10.0-136.87.0.168.oe2203sp1.x86_64",
					"openEuler-22.03-LTS-SP1:kernel-tools-devel-5.10.0-136.87.0.168.oe2203sp1.x86_64",
					"openEuler-22.03-LTS-SP1:python3-perf-5.10.0-136.87.0.168.oe2203sp1.x86_64",
					"openEuler-22.03-LTS-SP1:kernel-debugsource-5.10.0-136.87.0.168.oe2203sp1.x86_64"
				]
			},
			"remediations":[
				{
					"product_ids":[
						"openEuler-22.03-LTS-SP1:python3-perf-5.10.0-136.87.0.168.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:kernel-debugsource-5.10.0-136.87.0.168.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:kernel-source-5.10.0-136.87.0.168.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:kernel-tools-5.10.0-136.87.0.168.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:kernel-headers-5.10.0-136.87.0.168.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:kernel-tools-devel-5.10.0-136.87.0.168.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:perf-5.10.0-136.87.0.168.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:kernel-devel-5.10.0-136.87.0.168.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:kernel-debuginfo-5.10.0-136.87.0.168.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:kernel-5.10.0-136.87.0.168.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:perf-debuginfo-5.10.0-136.87.0.168.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:python3-perf-debuginfo-5.10.0-136.87.0.168.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:kernel-tools-debuginfo-5.10.0-136.87.0.168.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:kernel-5.10.0-136.87.0.168.oe2203sp1.src",
						"openEuler-22.03-LTS-SP1:python3-perf-debuginfo-5.10.0-136.87.0.168.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:kernel-devel-5.10.0-136.87.0.168.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:kernel-tools-debuginfo-5.10.0-136.87.0.168.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:perf-debuginfo-5.10.0-136.87.0.168.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:perf-5.10.0-136.87.0.168.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:kernel-5.10.0-136.87.0.168.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:kernel-debuginfo-5.10.0-136.87.0.168.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:kernel-source-5.10.0-136.87.0.168.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:kernel-headers-5.10.0-136.87.0.168.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:kernel-tools-5.10.0-136.87.0.168.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:kernel-tools-devel-5.10.0-136.87.0.168.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:python3-perf-5.10.0-136.87.0.168.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:kernel-debugsource-5.10.0-136.87.0.168.oe2203sp1.x86_64"
					],
					"details":"kernel security update",
					"category":"vendor_fix",
					"url":"https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2024-1941"
				}
			],
			"scores":[
				{
					"cvss_v3":{
						"baseSeverity":"HIGH",
						"baseScore":7.8,
						"vectorString":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
						"version":"3.1"
					},
					"products":[
						"openEuler-22.03-LTS-SP1:python3-perf-5.10.0-136.87.0.168.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:kernel-debugsource-5.10.0-136.87.0.168.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:kernel-source-5.10.0-136.87.0.168.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:kernel-tools-5.10.0-136.87.0.168.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:kernel-headers-5.10.0-136.87.0.168.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:kernel-tools-devel-5.10.0-136.87.0.168.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:perf-5.10.0-136.87.0.168.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:kernel-devel-5.10.0-136.87.0.168.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:kernel-debuginfo-5.10.0-136.87.0.168.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:kernel-5.10.0-136.87.0.168.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:perf-debuginfo-5.10.0-136.87.0.168.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:python3-perf-debuginfo-5.10.0-136.87.0.168.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:kernel-tools-debuginfo-5.10.0-136.87.0.168.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:kernel-5.10.0-136.87.0.168.oe2203sp1.src",
						"openEuler-22.03-LTS-SP1:python3-perf-debuginfo-5.10.0-136.87.0.168.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:kernel-devel-5.10.0-136.87.0.168.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:kernel-tools-debuginfo-5.10.0-136.87.0.168.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:perf-debuginfo-5.10.0-136.87.0.168.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:perf-5.10.0-136.87.0.168.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:kernel-5.10.0-136.87.0.168.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:kernel-debuginfo-5.10.0-136.87.0.168.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:kernel-source-5.10.0-136.87.0.168.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:kernel-headers-5.10.0-136.87.0.168.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:kernel-tools-5.10.0-136.87.0.168.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:kernel-tools-devel-5.10.0-136.87.0.168.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:python3-perf-5.10.0-136.87.0.168.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:kernel-debugsource-5.10.0-136.87.0.168.oe2203sp1.x86_64"
					]
				}
			],
			"threats":[
				{
					"details":"High",
					"category":"impact"
				}
			],
			"title":"CVE-2024-41011"
		}
	]
}