{
	"document":{
		"aggregate_severity":{
			"namespace":"https://nvd.nist.gov/vuln-metrics/cvss",
			"text":"Critical"
		},
		"category":"csaf_vex",
		"csaf_version":"2.0",
		"distribution":{
			"tlp":{
				"label":"WHITE",
				"url":"https:/www.first.org/tlp/"
			}
		},
		"lang":"en",
		"notes":[
			{
				"text":"kernel security update",
				"category":"general",
				"title":"Synopsis"
			},
			{
				"text":"An update for kernel is now available for openEuler-24.03-LTS",
				"category":"general",
				"title":"Summary"
			},
			{
				"text":"The Linux Kernel, the operating system core itself.\n\nSecurity Fix(es):\n\nIn the Linux kernel, the following vulnerability has been resolved:\n\nefi: libstub: only free priv.runtime_map when allocated\n\npriv.runtime_map is only allocated when efi_novamap is not set.\nOtherwise, it is an uninitialized value.  In the error path, it is freed\nunconditionally.  Avoid passing an uninitialized value to free_pool.\nFree priv.runtime_map only when it was allocated.\n\nThis bug was discovered and resolved using Coverity Static Analysis\nSecurity Testing (SAST) by Synopsys, Inc.(CVE-2024-33619)\n\nIn the Linux kernel, the following vulnerability has been resolved:\n\nfpga: region: add owner module and take its refcount\n\nThe current implementation of the fpga region assumes that the low-level\nmodule registers a driver for the parent device and uses its owner pointer\nto take the module's refcount. This approach is problematic since it can\nlead to a null pointer dereference while attempting to get the region\nduring programming if the parent device does not have a driver.\n\nTo address this problem, add a module owner pointer to the fpga_region\nstruct and use it to take the module's refcount. Modify the functions for\nregistering a region to take an additional owner module parameter and\nrename them to avoid conflicts. Use the old function names for helper\nmacros that automatically set the module that registers the region as the\nowner. This ensures compatibility with existing low-level control modules\nand reduces the chances of registering a region without setting the owner.\n\nAlso, update the documentation to keep it consistent with the new interface\nfor registering an fpga region.(CVE-2024-35247)\n\nIn the Linux kernel, the following vulnerability has been resolved:\n\neeprom: at24: fix memory corruption race condition\n\nIf the eeprom is not accessible, an nvmem device will be registered, the\nread will fail, and the device will be torn down. If another driver\naccesses the nvmem device after the teardown, it will reference\ninvalid memory.\n\nMove the failure point before registering the nvmem device.(CVE-2024-35848)\n\nIn the Linux kernel, the following vulnerability has been resolved:\n\nblock: fix module reference leakage from bdev_open_by_dev error path\n\nAt the time bdev_may_open() is called, module reference is grabbed\nalready, hence module reference should be released if bdev_may_open()\nfailed.\n\nThis problem is found by code review.(CVE-2024-35859)\n\nIn the Linux kernel, the following vulnerability has been resolved:\n\nBluetooth: RFCOMM: Fix not validating setsockopt user input\n\nsyzbot reported rfcomm_sock_setsockopt_old() is copying data without\nchecking user input length.\n\nBUG: KASAN: slab-out-of-bounds in copy_from_sockptr_offset\ninclude/linux/sockptr.h:49 [inline]\nBUG: KASAN: slab-out-of-bounds in copy_from_sockptr\ninclude/linux/sockptr.h:55 [inline]\nBUG: KASAN: slab-out-of-bounds in rfcomm_sock_setsockopt_old\nnet/bluetooth/rfcomm/sock.c:632 [inline]\nBUG: KASAN: slab-out-of-bounds in rfcomm_sock_setsockopt+0x893/0xa70\nnet/bluetooth/rfcomm/sock.c:673\nRead of size 4 at addr ffff8880209a8bc3 by task syz-executor632/5064(CVE-2024-35966)\n\nIn the Linux kernel, the following vulnerability has been resolved:\n\nmm/slab: make __free(kfree) accept error pointers\n\nCurrently, if an automatically freed allocation is an error pointer that\nwill lead to a crash.  An example of this is in wm831x_gpio_dbg_show().\n\n   171\tchar *label __free(kfree) = gpiochip_dup_line_label(chip, i);\n   172\tif (IS_ERR(label)) {\n   173\t\tdev_err(wm831x->dev, \"Failed to duplicate label\\n\");\n   174\t\tcontinue;\n   175  }\n\nThe auto clean up function should check for error pointers as well,\notherwise we're going to keep hitting issues like this.(CVE-2024-36890)\n\nIn the Linux kernel, the following vulnerability has been resolved:\n\nUSB: core: Fix access violation during port device removal\n\nTesting with KASAN and syzkaller revealed a bug in port.c:disable_store():\nusb_hub_to_struct_hub() can return NULL if the hub that the port belongs to\nis concurrently removed, but the function does not check for this\npossibility before dereferencing the returned value.\n\nIt turns out that the first dereference is unnecessary, since hub->intfdev\nis the parent of the port device, so it can be changed easily.  Adding a\ncheck for hub == NULL prevents further problems.\n\nThe same bug exists in the disable_show() routine, and it can be fixed the\nsame way.(CVE-2024-36896)\n\nIn the Linux kernel, the following vulnerability has been resolved:\n\ngpiolib: cdev: Fix use after free in lineinfo_changed_notify\n\nThe use-after-free issue occurs as follows: when the GPIO chip device file\nis being closed by invoking gpio_chrdev_release(), watched_lines is freed\nby bitmap_free(), but the unregistration of lineinfo_changed_nb notifier\nchain failed due to waiting write rwsem. Additionally, one of the GPIO\nchip's lines is also in the release process and holds the notifier chain's\nread rwsem. Consequently, a race condition leads to the use-after-free of\nwatched_lines.\n\nHere is the typical stack when issue happened:\n\n[free]\ngpio_chrdev_release()\n  --> bitmap_free(cdev->watched_lines)                  <-- freed\n  --> blocking_notifier_chain_unregister()\n    --> down_write(&nh->rwsem)                          <-- waiting rwsem\n          --> __down_write_common()\n            --> rwsem_down_write_slowpath()\n                  --> schedule_preempt_disabled()\n                    --> schedule()\n\n[use]\nst54spi_gpio_dev_release()\n  --> gpio_free()\n    --> gpiod_free()\n      --> gpiod_free_commit()\n        --> gpiod_line_state_notify()\n          --> blocking_notifier_call_chain()\n            --> down_read(&nh->rwsem);                  <-- held rwsem\n            --> notifier_call_chain()\n              --> lineinfo_changed_notify()\n                --> test_bit(xxxx, cdev->watched_lines) <-- use after free\n\nThe side effect of the use-after-free issue is that a GPIO line event is\nbeing generated for userspace where it shouldn't. However, since the chrdev\nis being closed, userspace won't have the chance to read that event anyway.\n\nTo fix the issue, call the bitmap_free() function after the unregistration\nof lineinfo_changed_nb notifier chain.(CVE-2024-36899)\n\nIn the Linux kernel, the following vulnerability has been resolved:\n\nipv6: prevent NULL dereference in ip6_output()\n\nAccording to syzbot, there is a chance that ip6_dst_idev()\nreturns NULL in ip6_output(). Most places in IPv6 stack\ndeal with a NULL idev just fine, but not here.\n\nsyzbot reported:\n\ngeneral protection fault, probably for non-canonical address 0xdffffc00000000bc: 0000 [#1] PREEMPT SMP KASAN PTI\nKASAN: null-ptr-deref in range [0x00000000000005e0-0x00000000000005e7]\nCPU: 0 PID: 9775 Comm: syz-executor.4 Not tainted 6.9.0-rc5-syzkaller-00157-g6a30653b604a #0\nHardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 03/27/2024\n RIP: 0010:ip6_output+0x231/0x3f0 net/ipv6/ip6_output.c:237\nCode: 3c 1e 00 49 89 df 74 08 4c 89 ef e8 19 58 db f7 48 8b 44 24 20 49 89 45 00 49 89 c5 48 8d 9d e0 05 00 00 48 89 d8 48 c1 e8 03 <42> 0f b6 04 38 84 c0 4c 8b 74 24 28 0f 85 61 01 00 00 8b 1b 31 ff\nRSP: 0018:ffffc9000927f0d8 EFLAGS: 00010202\nRAX: 00000000000000bc RBX: 00000000000005e0 RCX: 0000000000040000\nRDX: ffffc900131f9000 RSI: 0000000000004f47 RDI: 0000000000004f48\nRBP: 0000000000000000 R08: ffffffff8a1f0b9a R09: 1ffffffff1f51fad\nR10: dffffc0000000000 R11: fffffbfff1f51fae R12: ffff8880293ec8c0\nR13: ffff88805d7fc000 R14: 1ffff1100527d91a R15: dffffc0000000000\nFS:  00007f135c6856c0(0000) GS:ffff8880b9400000(0000) knlGS:0000000000000000\nCS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033\nCR2: 0000000020000080 CR3: 0000000064096000 CR4: 00000000003506f0\nDR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000\nDR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400\nCall Trace:\n <TASK>\n  NF_HOOK include/linux/netfilter.h:314 [inline]\n  ip6_xmit+0xefe/0x17f0 net/ipv6/ip6_output.c:358\n  sctp_v6_xmit+0x9f2/0x13f0 net/sctp/ipv6.c:248\n  sctp_packet_transmit+0x26ad/0x2ca0 net/sctp/output.c:653\n  sctp_packet_singleton+0x22c/0x320 net/sctp/outqueue.c:783\n  sctp_outq_flush_ctrl net/sctp/outqueue.c:914 [inline]\n  sctp_outq_flush+0x6d5/0x3e20 net/sctp/outqueue.c:1212\n  sctp_side_effects net/sctp/sm_sideeffect.c:1198 [inline]\n  sctp_do_sm+0x59cc/0x60c0 net/sctp/sm_sideeffect.c:1169\n  sctp_primitive_ASSOCIATE+0x95/0xc0 net/sctp/primitive.c:73\n  __sctp_connect+0x9cd/0xe30 net/sctp/socket.c:1234\n  sctp_connect net/sctp/socket.c:4819 [inline]\n  sctp_inet_connect+0x149/0x1f0 net/sctp/socket.c:4834\n  __sys_connect_file net/socket.c:2048 [inline]\n  __sys_connect+0x2df/0x310 net/socket.c:2065\n  __do_sys_connect net/socket.c:2075 [inline]\n  __se_sys_connect net/socket.c:2072 [inline]\n  __x64_sys_connect+0x7a/0x90 net/socket.c:2072\n  do_syscall_x64 arch/x86/entry/common.c:52 [inline]\n  do_syscall_64+0xf5/0x240 arch/x86/entry/common.c:83\n entry_SYSCALL_64_after_hwframe+0x77/0x7f(CVE-2024-36901)\n\nIn the Linux kernel, the following vulnerability has been resolved:\n\nReapply \"drm/qxl: simplify qxl_fence_wait\"\n\nThis reverts commit 07ed11afb68d94eadd4ffc082b97c2331307c5ea.\n\nStephen Rostedt reports:\n \"I went to run my tests on my VMs and the tests hung on boot up.\n  Unfortunately, the most I ever got out was:\n\n  [   93.607888] Testing event system initcall: OK\n  [   93.667730] Running tests on all trace events:\n  [   93.669757] Testing all events: OK\n  [   95.631064] ------------[ cut here ]------------\n  Timed out after 60 seconds\"\n\nand further debugging points to a possible circular locking dependency\nbetween the console_owner locking and the worker pool locking.\n\nReverting the commit allows Steve's VM to boot to completion again.\n\n[ This may obviously result in the \"[TTM] Buffer eviction failed\"\n  messages again, which was the reason for that original revert. But at\n  this point this seems preferable to a non-booting system... ](CVE-2024-36944)\n\nIn the Linux kernel, the following vulnerability has been resolved:\n\nfs/9p: only translate RWX permissions for plain 9P2000\n\nGarbage in plain 9P2000's perm bits is allowed through, which causes it\nto be able to set (among others) the suid bit. This was presumably not\nthe intent since the unix extended bits are handled explicitly and\nconditionally on .u.(CVE-2024-36964)\n\nIn the Linux kernel, the following vulnerability has been resolved:\n\nnet/mlx5: Add a timeout to acquire the command queue semaphore\n\nPrevent forced completion handling on an entry that has not yet been\nassigned an index, causing an out of bounds access on idx = -22.\nInstead of waiting indefinitely for the sem, blocking flow now waits for\nindex to be allocated or a sem acquisition timeout before beginning the\ntimer for FW completion.\n\nKernel log example:\nmlx5_core 0000:06:00.0: wait_func_handle_exec_timeout:1128:(pid 185911): cmd[-22]: CREATE_UCTX(0xa04) No done completion(CVE-2024-38556)\n\nIn the Linux kernel, the following vulnerability has been resolved:\n\nrcu: Fix buffer overflow in print_cpu_stall_info()\n\nThe rcuc-starvation output from print_cpu_stall_info() might overflow the\nbuffer if there is a huge difference in jiffies difference.  The situation\nmight seem improbable, but computers sometimes get very confused about\ntime, which can result in full-sized integers, and, in this case,\nbuffer overflow.\n\nAlso, the unsigned jiffies difference is printed using %ld, which is\nnormally for signed integers.  This is intentional for debugging purposes,\nbut it is not obvious from the code.\n\nThis commit therefore changes sprintf() to snprintf() and adds a\nclarifying comment about intention of %ld format.\n\nFound by Linux Verification Center (linuxtesting.org) with SVACE.(CVE-2024-38576)\n\nIn the Linux kernel, the following vulnerability has been resolved:\n\nALSA: Fix deadlocks with kctl removals at disconnection\n\nIn snd_card_disconnect(), we set card->shutdown flag at the beginning,\ncall callbacks and do sync for card->power_ref_sleep waiters at the\nend.  The callback may delete a kctl element, and this can lead to a\ndeadlock when the device was in the suspended state.  Namely:\n\n* A process waits for the power up at snd_power_ref_and_wait() in\n  snd_ctl_info() or read/write() inside card->controls_rwsem.\n\n* The system gets disconnected meanwhile, and the driver tries to\n  delete a kctl via snd_ctl_remove*(); it tries to take\n  card->controls_rwsem again, but this is already locked by the\n  above.  Since the sleeper isn't woken up, this deadlocks.\n\nAn easy fix is to wake up sleepers before processing the driver\ndisconnect callbacks but right after setting the card->shutdown flag.\nThen all sleepers will abort immediately, and the code flows again.\n\nSo, basically this patch moves the wait_event() call at the right\ntiming.  While we're at it, just to be sure, call wait_event_all()\ninstead of wait_event(), although we don't use exclusive events on\nthis queue for now.(CVE-2024-38600)\n\nIn the Linux kernel, the following vulnerability has been resolved:\n\ncrypto: qat - validate slices count returned by FW\n\nThe function adf_send_admin_tl_start() enables the telemetry (TL)\nfeature on a QAT device by sending the ICP_QAT_FW_TL_START message to\nthe firmware. This triggers the FW to start writing TL data to a DMA\nbuffer in memory and returns an array containing the number of\naccelerators of each type (slices) supported by this HW.\nThe pointer to this array is stored in the adf_tl_hw_data data\nstructure called slice_cnt.\n\nThe array slice_cnt is then used in the function tl_print_dev_data()\nto report in debugfs only statistics about the supported accelerators.\nAn incorrect value of the elements in slice_cnt might lead to an out\nof bounds memory read.\nAt the moment, there isn't an implementation of FW that returns a wrong\nvalue, but for robustness validate the slice count array returned by FW.(CVE-2024-38606)\n\nIn the Linux kernel, the following vulnerability has been resolved:\n\nmacintosh/via-macii: Fix \"BUG: sleeping function called from invalid context\"\n\nThe via-macii ADB driver calls request_irq() after disabling hard\ninterrupts. But disabling interrupts isn't necessary here because the\nVIA shift register interrupt was masked during VIA1 initialization.(CVE-2024-38607)\n\nIn the Linux kernel, the following vulnerability has been resolved:\n\nkunit/fortify: Fix mismatched kvalloc()/vfree() usage\n\nThe kv*() family of tests were accidentally freeing with vfree() instead\nof kvfree(). Use kvfree() instead.(CVE-2024-38617)\n\nIn the Linux kernel, the following vulnerability has been resolved:\n\ndrm/amdgpu: add error handle to avoid out-of-bounds\n\nif the sdma_v4_0_irq_id_to_seq return -EINVAL, the process should\nbe stop to avoid out-of-bounds read, so directly return -EINVAL.(CVE-2024-39471)\n\nIn the Linux kernel, the following vulnerability has been resolved:\n\nASoC: SOF: ipc4-topology: Fix input format query of process modules without base extension\n\nIf a process module does not have base config extension then the same\nformat applies to all of it's inputs and the process->base_config_ext is\nNULL, causing NULL dereference when specifically crafted topology and\nsequences used.(CVE-2024-39473)\n\nIn the Linux kernel, the following vulnerability has been resolved:\n\nfbdev: savage: Handle err return when savagefb_check_var failed\n\nThe commit 04e5eac8f3ab(\"fbdev: savage: Error out if pixclock equals zero\")\nchecks the value of pixclock to avoid divide-by-zero error. However\nthe function savagefb_probe doesn't handle the error return of\nsavagefb_check_var. When pixclock is 0, it will cause divide-by-zero error.(CVE-2024-39475)\n\nIn the Linux kernel, the following vulnerability has been resolved:\n\nmedia: mc: Fix graph walk in media_pipeline_start\n\nThe graph walk tries to follow all links, even if they are not between\npads. This causes a crash with, e.g. a MEDIA_LNK_FL_ANCILLARY_LINK link.\n\nFix this by allowing the walk to proceed only for MEDIA_LNK_FL_DATA_LINK\nlinks.(CVE-2024-39481)\n\nIn the Linux kernel, the following vulnerability has been resolved:\n\ndrm/drm_file: Fix pid refcounting race\n\n<maarten.lankhorst@linux.intel.com>, Maxime Ripard\n<mripard@kernel.org>, Thomas Zimmermann <tzimmermann@suse.de>\n\nfilp->pid is supposed to be a refcounted pointer; however, before this\npatch, drm_file_update_pid() only increments the refcount of a struct\npid after storing a pointer to it in filp->pid and dropping the\ndev->filelist_mutex, making the following race possible:\n\nprocess A               process B\n=========               =========\n                        begin drm_file_update_pid\n                        mutex_lock(&dev->filelist_mutex)\n                        rcu_replace_pointer(filp->pid, <pid B>, 1)\n                        mutex_unlock(&dev->filelist_mutex)\nbegin drm_file_update_pid\nmutex_lock(&dev->filelist_mutex)\nrcu_replace_pointer(filp->pid, <pid A>, 1)\nmutex_unlock(&dev->filelist_mutex)\nget_pid(<pid A>)\nsynchronize_rcu()\nput_pid(<pid B>)   *** pid B reaches refcount 0 and is freed here ***\n                        get_pid(<pid B>)   *** UAF ***\n                        synchronize_rcu()\n                        put_pid(<pid A>)\n\nAs far as I know, this race can only occur with CONFIG_PREEMPT_RCU=y\nbecause it requires RCU to detect a quiescent state in code that is not\nexplicitly calling into the scheduler.\n\nThis race leads to use-after-free of a \"struct pid\".\nIt is probably somewhat hard to hit because process A has to pass\nthrough a synchronize_rcu() operation while process B is between\nmutex_unlock() and get_pid().\n\nFix it by ensuring that by the time a pointer to the current task's pid\nis stored in the file, an extra reference to the pid has been taken.\n\nThis fix also removes the condition for synchronize_rcu(); I think\nthat optimization is unnecessary complexity, since in that case we\nwould usually have bailed out on the lockless check above.(CVE-2024-39486)\n\nIn the Linux kernel, the following vulnerability has been resolved:\n\ncrypto: qat - Fix ADF_DEV_RESET_SYNC memory leak\n\nUsing completion_done to determine whether the caller has gone\naway only works after a complete call.  Furthermore it's still\npossible that the caller has not yet called wait_for_completion,\nresulting in another potential UAF.\n\nFix this by making the caller use cancel_work_sync and then freeing\nthe memory safely.(CVE-2024-39493)\n\nIn the Linux kernel, the following vulnerability has been resolved:\n\nbtrfs: zoned: fix use-after-free due to race with dev replace\n\nWhile loading a zone's info during creation of a block group, we can race\nwith a device replace operation and then trigger a use-after-free on the\ndevice that was just replaced (source device of the replace operation).\n\nThis happens because at btrfs_load_zone_info() we extract a device from\nthe chunk map into a local variable and then use the device while not\nunder the protection of the device replace rwsem. So if there's a device\nreplace operation happening when we extract the device and that device\nis the source of the replace operation, we will trigger a use-after-free\nif before we finish using the device the replace operation finishes and\nfrees the device.\n\nFix this by enlarging the critical section under the protection of the\ndevice replace rwsem so that all uses of the device are done inside the\ncritical section.(CVE-2024-39496)\n\nIn the Linux kernel, the following vulnerability has been resolved:\n\nnetfilter: ipset: Fix race between namespace cleanup and gc in the list:set type\n\nLion Ackermann reported that there is a race condition between namespace cleanup\nin ipset and the garbage collection of the list:set type. The namespace\ncleanup can destroy the list:set type of sets while the gc of the set type is\nwaiting to run in rcu cleanup. The latter uses data from the destroyed set which\nthus leads use after free. The patch contains the following parts:\n\n- When destroying all sets, first remove the garbage collectors, then wait\n  if needed and then destroy the sets.\n- Fix the badly ordered \"wait then remove gc\" for the destroy a single set\n  case.\n- Fix the missing rcu locking in the list:set type in the userspace test\n  case.\n- Use proper RCU list handlings in the list:set type.\n\nThe patch depends on c1193d9bbbd3 (netfilter: ipset: Add list flush to cancel_gc).(CVE-2024-39503)\n\nIn the Linux kernel, the following vulnerability has been resolved:  cachefiles: remove requests from xarray during flushing requests  Even with CACHEFILES_DEAD set, we can still read the requests, so in the following concurrency the request may be used after it has been freed:       mount  |   daemon_thread1    |    daemon_thread2 ------------------------------------------------------------  cachefiles_ondemand_init_object   cachefiles_ondemand_send_req    REQ_A = kzalloc(sizeof(*req) + data_len)    wait_for_completion(&REQ_A->done)             cachefiles_daemon_read              cachefiles_ondemand_daemon_read                                   // close dev fd                                   cachefiles_flush_reqs                                    complete(&REQ_A->done)    kfree(REQ_A)               xa_lock(&cache->reqs);               cachefiles_ondemand_select_req                 req->msg.opcode != CACHEFILES_OP_READ                 // req use-after-free !!!               xa_unlock(&cache->reqs);                                    xa_destroy(&cache->reqs)  Hence remove requests from cache->reqs when flushing them to avoid accessing freed requests.(CVE-2024-40900)\n\nIn the Linux kernel, the following vulnerability has been resolved:\n\nnet/mlx5: Always stop health timer during driver removal\n\nCurrently, if teardown_hca fails to execute during driver removal, mlx5\ndoes not stop the health timer. Afterwards, mlx5 continue with driver\nteardown. This may lead to a UAF bug, which results in page fault\nOops[1], since the health timer invokes after resources were freed.\n\nHence, stop the health monitor even if teardown_hca fails.\n\n[1]\nmlx5_core 0000:18:00.0: E-Switch: Unload vfs: mode(LEGACY), nvfs(0), necvfs(0), active vports(0)\nmlx5_core 0000:18:00.0: E-Switch: Disable: mode(LEGACY), nvfs(0), necvfs(0), active vports(0)\nmlx5_core 0000:18:00.0: E-Switch: Disable: mode(LEGACY), nvfs(0), necvfs(0), active vports(0)\nmlx5_core 0000:18:00.0: E-Switch: cleanup\nmlx5_core 0000:18:00.0: wait_func:1155:(pid 1967079): TEARDOWN_HCA(0x103) timeout. Will cause a leak of a command resource\nmlx5_core 0000:18:00.0: mlx5_function_close:1288:(pid 1967079): tear_down_hca failed, skip cleanup\nBUG: unable to handle page fault for address: ffffa26487064230\nPGD 100c00067 P4D 100c00067 PUD 100e5a067 PMD 105ed7067 PTE 0\nOops: 0000 [#1] PREEMPT SMP PTI\nCPU: 0 PID: 0 Comm: swapper/0 Tainted: G           OE     -------  ---  6.7.0-68.fc38.x86_64 #1\nHardware name: Intel Corporation S2600WFT/S2600WFT, BIOS SE5C620.86B.02.01.0013.121520200651 12/15/2020\nRIP: 0010:ioread32be+0x34/0x60\nRSP: 0018:ffffa26480003e58 EFLAGS: 00010292\nRAX: ffffa26487064200 RBX: ffff9042d08161a0 RCX: ffff904c108222c0\nRDX: 000000010bbf1b80 RSI: ffffffffc055ddb0 RDI: ffffa26487064230\nRBP: ffff9042d08161a0 R08: 0000000000000022 R09: ffff904c108222e8\nR10: 0000000000000004 R11: 0000000000000441 R12: ffffffffc055ddb0\nR13: ffffa26487064200 R14: ffffa26480003f00 R15: ffff904c108222c0\nFS:  0000000000000000(0000) GS:ffff904c10800000(0000) knlGS:0000000000000000\nCS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033\nCR2: ffffa26487064230 CR3: 00000002c4420006 CR4: 00000000007706f0\nDR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000\nDR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400\nPKRU: 55555554\nCall Trace:\n <IRQ>\n ? __die+0x23/0x70\n ? page_fault_oops+0x171/0x4e0\n ? exc_page_fault+0x175/0x180\n ? asm_exc_page_fault+0x26/0x30\n ? __pfx_poll_health+0x10/0x10 [mlx5_core]\n ? __pfx_poll_health+0x10/0x10 [mlx5_core]\n ? ioread32be+0x34/0x60\n mlx5_health_check_fatal_sensors+0x20/0x100 [mlx5_core]\n ? __pfx_poll_health+0x10/0x10 [mlx5_core]\n poll_health+0x42/0x230 [mlx5_core]\n ? __next_timer_interrupt+0xbc/0x110\n ? __pfx_poll_health+0x10/0x10 [mlx5_core]\n call_timer_fn+0x21/0x130\n ? __pfx_poll_health+0x10/0x10 [mlx5_core]\n __run_timers+0x222/0x2c0\n run_timer_softirq+0x1d/0x40\n __do_softirq+0xc9/0x2c8\n __irq_exit_rcu+0xa6/0xc0\n sysvec_apic_timer_interrupt+0x72/0x90\n </IRQ>\n <TASK>\n asm_sysvec_apic_timer_interrupt+0x1a/0x20\nRIP: 0010:cpuidle_enter_state+0xcc/0x440\n ? cpuidle_enter_state+0xbd/0x440\n cpuidle_enter+0x2d/0x40\n do_idle+0x20d/0x270\n cpu_startup_entry+0x2a/0x30\n rest_init+0xd0/0xd0\n arch_call_rest_init+0xe/0x30\n start_kernel+0x709/0xa90\n x86_64_start_reservations+0x18/0x30\n x86_64_start_kernel+0x96/0xa0\n secondary_startup_64_no_verify+0x18f/0x19b\n---[ end trace 0000000000000000 ]---(CVE-2024-40906)\n\nIn the Linux kernel, the following vulnerability has been resolved:\n\nbpf: Set run context for rawtp test_run callback\n\nsyzbot reported crash when rawtp program executed through the\ntest_run interface calls bpf_get_attach_cookie helper or any\nother helper that touches task->bpf_ctx pointer.\n\nSetting the run context (task->bpf_ctx pointer) for test_run\ncallback.(CVE-2024-40908)\n\nIn the Linux kernel, the following vulnerability has been resolved:\n\ncachefiles: defer exposing anon_fd until after copy_to_user() succeeds\n\nAfter installing the anonymous fd, we can now see it in userland and close\nit. However, at this point we may not have gotten the reference count of\nthe cache, but we will put it during colse fd, so this may cause a cache\nUAF.\n\nSo grab the cache reference count before fd_install(). In addition, by\nkernel convention, fd is taken over by the user land after fd_install(),\nand the kernel should not call close_fd() after that, i.e., it should call\nfd_install() after everything is ready, thus fd_install() is called after\ncopy_to_user() succeeds.(CVE-2024-40913)\n\nIn the Linux kernel, the following vulnerability has been resolved:\n\nnet: bridge: mst: fix suspicious rcu usage in br_mst_set_state\n\nI converted br_mst_set_state to RCU to avoid a vlan use-after-free\nbut forgot to change the vlan group dereference helper. Switch to vlan\ngroup RCU deref helper to fix the suspicious rcu usage warning.(CVE-2024-40920)\n\nIn the Linux kernel, the following vulnerability has been resolved:\n\nnet: bridge: mst: pass vlan group directly to br_mst_vlan_set_state\n\nPass the already obtained vlan group pointer to br_mst_vlan_set_state()\ninstead of dereferencing it again. Each caller has already correctly\ndereferenced it for their context. This change is required for the\nfollowing suspicious RCU dereference fix. No functional changes\nintended.(CVE-2024-40921)\n\nIn the Linux kernel, the following vulnerability has been resolved:\n\nio_uring/rsrc: don't lock while !TASK_RUNNING\n\nThere is a report of io_rsrc_ref_quiesce() locking a mutex while not\nTASK_RUNNING, which is due to forgetting restoring the state back after\nio_run_task_work_sig() and attempts to break out of the waiting loop.\n\ndo not call blocking ops when !TASK_RUNNING; state=1 set at\n[<ffffffff815d2494>] prepare_to_wait+0xa4/0x380\nkernel/sched/wait.c:237\nWARNING: CPU: 2 PID: 397056 at kernel/sched/core.c:10099\n__might_sleep+0x114/0x160 kernel/sched/core.c:10099\nRIP: 0010:__might_sleep+0x114/0x160 kernel/sched/core.c:10099\nCall Trace:\n <TASK>\n __mutex_lock_common kernel/locking/mutex.c:585 [inline]\n __mutex_lock+0xb4/0x940 kernel/locking/mutex.c:752\n io_rsrc_ref_quiesce+0x590/0x940 io_uring/rsrc.c:253\n io_sqe_buffers_unregister+0xa2/0x340 io_uring/rsrc.c:799\n __io_uring_register io_uring/register.c:424 [inline]\n __do_sys_io_uring_register+0x5b9/0x2400 io_uring/register.c:613\n do_syscall_x64 arch/x86/entry/common.c:52 [inline]\n do_syscall_64+0xd8/0x270 arch/x86/entry/common.c:83\n entry_SYSCALL_64_after_hwframe+0x6f/0x77(CVE-2024-40922)\n\nIn the Linux kernel, the following vulnerability has been resolved:\n\ncachefiles: flush all requests after setting CACHEFILES_DEAD\n\nIn ondemand mode, when the daemon is processing an open request, if the\nkernel flags the cache as CACHEFILES_DEAD, the cachefiles_daemon_write()\nwill always return -EIO, so the daemon can't pass the copen to the kernel.\nThen the kernel process that is waiting for the copen triggers a hung_task.\n\nSince the DEAD state is irreversible, it can only be exited by closing\n/dev/cachefiles. Therefore, after calling cachefiles_io_error() to mark\nthe cache as CACHEFILES_DEAD, if in ondemand mode, flush all requests to\navoid the above hungtask. We may still be able to read some of the cached\ndata before closing the fd of /dev/cachefiles.\n\nNote that this relies on the patch that adds reference counting to the req,\notherwise it may UAF.(CVE-2024-40935)\n\nIn the Linux kernel, the following vulnerability has been resolved:\n\nKVM: Fix a data race on last_boosted_vcpu in kvm_vcpu_on_spin()\n\nUse {READ,WRITE}_ONCE() to access kvm->last_boosted_vcpu to ensure the\nloads and stores are atomic.  In the extremely unlikely scenario the\ncompiler tears the stores, it's theoretically possible for KVM to attempt\nto get a vCPU using an out-of-bounds index, e.g. if the write is split\ninto multiple 8-bit stores, and is paired with a 32-bit load on a VM with\n257 vCPUs:\n\n  CPU0                              CPU1\n  last_boosted_vcpu = 0xff;\n\n                                    (last_boosted_vcpu = 0x100)\n                                    last_boosted_vcpu[15:8] = 0x01;\n  i = (last_boosted_vcpu = 0x1ff)\n                                    last_boosted_vcpu[7:0] = 0x00;\n\n  vcpu = kvm->vcpu_array[0x1ff];\n\nAs detected by KCSAN:\n\n  BUG: KCSAN: data-race in kvm_vcpu_on_spin [kvm] / kvm_vcpu_on_spin [kvm]\n\n  write to 0xffffc90025a92344 of 4 bytes by task 4340 on cpu 16:\n  kvm_vcpu_on_spin (arch/x86/kvm/../../../virt/kvm/kvm_main.c:4112) kvm\n  handle_pause (arch/x86/kvm/vmx/vmx.c:5929) kvm_intel\n  vmx_handle_exit (arch/x86/kvm/vmx/vmx.c:?\n\t\t arch/x86/kvm/vmx/vmx.c:6606) kvm_intel\n  vcpu_run (arch/x86/kvm/x86.c:11107 arch/x86/kvm/x86.c:11211) kvm\n  kvm_arch_vcpu_ioctl_run (arch/x86/kvm/x86.c:?) kvm\n  kvm_vcpu_ioctl (arch/x86/kvm/../../../virt/kvm/kvm_main.c:?) kvm\n  __se_sys_ioctl (fs/ioctl.c:52 fs/ioctl.c:904 fs/ioctl.c:890)\n  __x64_sys_ioctl (fs/ioctl.c:890)\n  x64_sys_call (arch/x86/entry/syscall_64.c:33)\n  do_syscall_64 (arch/x86/entry/common.c:?)\n  entry_SYSCALL_64_after_hwframe (arch/x86/entry/entry_64.S:130)\n\n  read to 0xffffc90025a92344 of 4 bytes by task 4342 on cpu 4:\n  kvm_vcpu_on_spin (arch/x86/kvm/../../../virt/kvm/kvm_main.c:4069) kvm\n  handle_pause (arch/x86/kvm/vmx/vmx.c:5929) kvm_intel\n  vmx_handle_exit (arch/x86/kvm/vmx/vmx.c:?\n\t\t\tarch/x86/kvm/vmx/vmx.c:6606) kvm_intel\n  vcpu_run (arch/x86/kvm/x86.c:11107 arch/x86/kvm/x86.c:11211) kvm\n  kvm_arch_vcpu_ioctl_run (arch/x86/kvm/x86.c:?) kvm\n  kvm_vcpu_ioctl (arch/x86/kvm/../../../virt/kvm/kvm_main.c:?) kvm\n  __se_sys_ioctl (fs/ioctl.c:52 fs/ioctl.c:904 fs/ioctl.c:890)\n  __x64_sys_ioctl (fs/ioctl.c:890)\n  x64_sys_call (arch/x86/entry/syscall_64.c:33)\n  do_syscall_64 (arch/x86/entry/common.c:?)\n  entry_SYSCALL_64_after_hwframe (arch/x86/entry/entry_64.S:130)\n\n  value changed: 0x00000012 -> 0x00000000(CVE-2024-40953)\n\nIn the Linux kernel, the following vulnerability has been resolved:\n\nbtrfs: zoned: allocate dummy checksums for zoned NODATASUM writes\n\nShin'ichiro reported that when he's running fstests' test-case\nbtrfs/167 on emulated zoned devices, he's seeing the following NULL\npointer dereference in 'btrfs_zone_finish_endio()':\n\n  Oops: general protection fault, probably for non-canonical address 0xdffffc0000000011: 0000 [#1] PREEMPT SMP KASAN NOPTI\n  KASAN: null-ptr-deref in range [0x0000000000000088-0x000000000000008f]\n  CPU: 4 PID: 2332440 Comm: kworker/u80:15 Tainted: G        W          6.10.0-rc2-kts+ #4\n  Hardware name: Supermicro Super Server/X11SPi-TF, BIOS 3.3 02/21/2020\n  Workqueue: btrfs-endio-write btrfs_work_helper [btrfs]\n  RIP: 0010:btrfs_zone_finish_endio.part.0+0x34/0x160 [btrfs]\n\n  RSP: 0018:ffff88867f107a90 EFLAGS: 00010206\n  RAX: dffffc0000000000 RBX: 0000000000000000 RCX: ffffffff893e5534\n  RDX: 0000000000000011 RSI: 0000000000000004 RDI: 0000000000000088\n  RBP: 0000000000000002 R08: 0000000000000001 R09: ffffed1081696028\n  R10: ffff88840b4b0143 R11: ffff88834dfff600 R12: ffff88840b4b0000\n  R13: 0000000000020000 R14: 0000000000000000 R15: ffff888530ad5210\n  FS:  0000000000000000(0000) GS:ffff888e3f800000(0000) knlGS:0000000000000000\n  CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033\n  CR2: 00007f87223fff38 CR3: 00000007a7c6a002 CR4: 00000000007706f0\n  DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000\n  DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400\n  PKRU: 55555554\n  Call Trace:\n   <TASK>\n   ? __die_body.cold+0x19/0x27\n   ? die_addr+0x46/0x70\n   ? exc_general_protection+0x14f/0x250\n   ? asm_exc_general_protection+0x26/0x30\n   ? do_raw_read_unlock+0x44/0x70\n   ? btrfs_zone_finish_endio.part.0+0x34/0x160 [btrfs]\n   btrfs_finish_one_ordered+0x5d9/0x19a0 [btrfs]\n   ? __pfx_lock_release+0x10/0x10\n   ? do_raw_write_lock+0x90/0x260\n   ? __pfx_do_raw_write_lock+0x10/0x10\n   ? __pfx_btrfs_finish_one_ordered+0x10/0x10 [btrfs]\n   ? _raw_write_unlock+0x23/0x40\n   ? btrfs_finish_ordered_zoned+0x5a9/0x850 [btrfs]\n   ? lock_acquire+0x435/0x500\n   btrfs_work_helper+0x1b1/0xa70 [btrfs]\n   ? __schedule+0x10a8/0x60b0\n   ? __pfx___might_resched+0x10/0x10\n   process_one_work+0x862/0x1410\n   ? __pfx_lock_acquire+0x10/0x10\n   ? __pfx_process_one_work+0x10/0x10\n   ? assign_work+0x16c/0x240\n   worker_thread+0x5e6/0x1010\n   ? __pfx_worker_thread+0x10/0x10\n   kthread+0x2c3/0x3a0\n   ? trace_irq_enable.constprop.0+0xce/0x110\n   ? __pfx_kthread+0x10/0x10\n   ret_from_fork+0x31/0x70\n   ? __pfx_kthread+0x10/0x10\n   ret_from_fork_asm+0x1a/0x30\n   </TASK>\n\nEnabling CONFIG_BTRFS_ASSERT revealed the following assertion to\ntrigger:\n\n  assertion failed: !list_empty(&ordered->list), in fs/btrfs/zoned.c:1815\n\nThis indicates, that we're missing the checksums list on the\nordered_extent. As btrfs/167 is doing a NOCOW write this is to be\nexpected.\n\nFurther analysis with drgn confirmed the assumption:\n\n  >>> inode = prog.crashed_thread().stack_trace()[11]['ordered'].inode\n  >>> btrfs_inode = drgn.container_of(inode, \"struct btrfs_inode\", \\\n         \t\t\t\t\"vfs_inode\")\n  >>> print(btrfs_inode.flags)\n  (u32)1\n\nAs zoned emulation mode simulates conventional zones on regular devices,\nwe cannot use zone-append for writing. But we're only attaching dummy\nchecksums if we're doing a zone-append write.\n\nSo for NOCOW zoned data writes on conventional zones, also attach a\ndummy checksum.(CVE-2024-40962)\n\nIn the Linux kernel, the following vulnerability has been resolved:\n\nserial: imx: Introduce timeout when waiting on transmitter empty\n\nBy waiting at most 1 second for USR2_TXDC to be set, we avoid a potential\ndeadlock.\n\nIn case of the timeout, there is not much we can do, so we simply ignore\nthe transmitter state and optimistically try to continue.(CVE-2024-40967)\n\nIn the Linux kernel, the following vulnerability has been resolved:\n\nbatman-adv: bypass empty buckets in batadv_purge_orig_ref()\n\nMany syzbot reports are pointing to soft lockups in\nbatadv_purge_orig_ref() [1]\n\nRoot cause is unknown, but we can avoid spending too much\ntime there and perhaps get more interesting reports.\n\n[1]\n\nwatchdog: BUG: soft lockup - CPU#0 stuck for 27s! [kworker/u4:6:621]\nModules linked in:\nirq event stamp: 6182794\n hardirqs last  enabled at (6182793): [<ffff8000801dae10>] __local_bh_enable_ip+0x224/0x44c kernel/softirq.c:386\n hardirqs last disabled at (6182794): [<ffff80008ad66a78>] __el1_irq arch/arm64/kernel/entry-common.c:533 [inline]\n hardirqs last disabled at (6182794): [<ffff80008ad66a78>] el1_interrupt+0x24/0x68 arch/arm64/kernel/entry-common.c:551\n softirqs last  enabled at (6182792): [<ffff80008aab71c4>] spin_unlock_bh include/linux/spinlock.h:396 [inline]\n softirqs last  enabled at (6182792): [<ffff80008aab71c4>] batadv_purge_orig_ref+0x114c/0x1228 net/batman-adv/originator.c:1287\n softirqs last disabled at (6182790): [<ffff80008aab61dc>] spin_lock_bh include/linux/spinlock.h:356 [inline]\n softirqs last disabled at (6182790): [<ffff80008aab61dc>] batadv_purge_orig_ref+0x164/0x1228 net/batman-adv/originator.c:1271\nCPU: 0 PID: 621 Comm: kworker/u4:6 Not tainted 6.8.0-rc7-syzkaller-g707081b61156 #0\nHardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/29/2024\nWorkqueue: bat_events batadv_purge_orig\npstate: 80400005 (Nzcv daif +PAN -UAO -TCO -DIT -SSBS BTYPE=--)\n pc : should_resched arch/arm64/include/asm/preempt.h:79 [inline]\n pc : __local_bh_enable_ip+0x228/0x44c kernel/softirq.c:388\n lr : __local_bh_enable_ip+0x224/0x44c kernel/softirq.c:386\nsp : ffff800099007970\nx29: ffff800099007980 x28: 1fffe00018fce1bd x27: dfff800000000000\nx26: ffff0000d2620008 x25: ffff0000c7e70de8 x24: 0000000000000001\nx23: 1fffe00018e57781 x22: dfff800000000000 x21: ffff80008aab71c4\nx20: ffff0001b40136c0 x19: ffff0000c72bbc08 x18: 1fffe0001a817bb0\nx17: ffff800125414000 x16: ffff80008032116c x15: 0000000000000001\nx14: 1fffe0001ee9d610 x13: 0000000000000000 x12: 0000000000000003\nx11: 0000000000000000 x10: 0000000000ff0100 x9 : 0000000000000000\nx8 : 00000000005e5789 x7 : ffff80008aab61dc x6 : 0000000000000000\nx5 : 0000000000000000 x4 : 0000000000000001 x3 : 0000000000000000\nx2 : 0000000000000006 x1 : 0000000000000080 x0 : ffff800125414000\nCall trace:\n  __daif_local_irq_enable arch/arm64/include/asm/irqflags.h:27 [inline]\n  arch_local_irq_enable arch/arm64/include/asm/irqflags.h:49 [inline]\n  __local_bh_enable_ip+0x228/0x44c kernel/softirq.c:386\n  __raw_spin_unlock_bh include/linux/spinlock_api_smp.h:167 [inline]\n  _raw_spin_unlock_bh+0x3c/0x4c kernel/locking/spinlock.c:210\n  spin_unlock_bh include/linux/spinlock.h:396 [inline]\n  batadv_purge_orig_ref+0x114c/0x1228 net/batman-adv/originator.c:1287\n  batadv_purge_orig+0x20/0x70 net/batman-adv/originator.c:1300\n  process_one_work+0x694/0x1204 kernel/workqueue.c:2633\n  process_scheduled_works kernel/workqueue.c:2706 [inline]\n  worker_thread+0x938/0xef4 kernel/workqueue.c:2787\n  kthread+0x288/0x310 kernel/kthread.c:388\n  ret_from_fork+0x10/0x20 arch/arm64/kernel/entry.S:860\nSending NMI from CPU 0 to CPUs 1:\nNMI backtrace for cpu 1\nCPU: 1 PID: 0 Comm: swapper/1 Not tainted 6.8.0-rc7-syzkaller-g707081b61156 #0\nHardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/29/2024\npstate: 80400005 (Nzcv daif +PAN -UAO -TCO -DIT -SSBS BTYPE=--)\n pc : arch_local_irq_enable+0x8/0xc arch/arm64/include/asm/irqflags.h:51\n lr : default_idle_call+0xf8/0x128 kernel/sched/idle.c:103\nsp : ffff800093a17d30\nx29: ffff800093a17d30 x28: dfff800000000000 x27: 1ffff00012742fb4\nx26: ffff80008ec9d000 x25: 0000000000000000 x24: 0000000000000002\nx23: 1ffff00011d93a74 x22: ffff80008ec9d3a0 x21: 0000000000000000\nx20: ffff0000c19dbc00 x19: ffff8000802d0fd8 x18: 1fffe00036804396\nx17: ffff80008ec9d000 x16: ffff8000802d089c x15: 0000000000000001\n---truncated---(CVE-2024-40981)\n\nIn the Linux kernel, the following vulnerability has been resolved:\n\nnetrom: Fix a memory leak in nr_heartbeat_expiry()\n\nsyzbot reported a memory leak in nr_create() [0].\n\nCommit 409db27e3a2e (\"netrom: Fix use-after-free of a listening socket.\")\nadded sock_hold() to the nr_heartbeat_expiry() function, where\na) a socket has a SOCK_DESTROY flag or\nb) a listening socket has a SOCK_DEAD flag.\n\nBut in the case \"a,\" when the SOCK_DESTROY flag is set, the file descriptor\nhas already been closed and the nr_release() function has been called.\nSo it makes no sense to hold the reference count because no one will\ncall another nr_destroy_socket() and put it as in the case \"b.\"\n\nnr_connect\n  nr_establish_data_link\n    nr_start_heartbeat\n\nnr_release\n  switch (nr->state)\n  case NR_STATE_3\n    nr->state = NR_STATE_2\n    sock_set_flag(sk, SOCK_DESTROY);\n\n                        nr_rx_frame\n                          nr_process_rx_frame\n                            switch (nr->state)\n                            case NR_STATE_2\n                              nr_state2_machine()\n                                nr_disconnect()\n                                  nr_sk(sk)->state = NR_STATE_0\n                                  sock_set_flag(sk, SOCK_DEAD)\n\n                        nr_heartbeat_expiry\n                          switch (nr->state)\n                          case NR_STATE_0\n                            if (sock_flag(sk, SOCK_DESTROY) ||\n                               (sk->sk_state == TCP_LISTEN\n                                 && sock_flag(sk, SOCK_DEAD)))\n                               sock_hold()  // ( !!! )\n                               nr_destroy_socket()\n\nTo fix the memory leak, let's call sock_hold() only for a listening socket.\n\nFound by InfoTeCS on behalf of Linux Verification Center\n(linuxtesting.org) with Syzkaller.\n\n[0]: https://syzkaller.appspot.com/bug?extid=d327a1f3b12e1e206c16(CVE-2024-41006)\n\nIn the Linux kernel, the following vulnerability has been resolved:\n\nbpf: Fix too early release of tcx_entry\n\nPedro Pinto and later independently also Hyunwoo Kim and Wongi Lee reported\nan issue that the tcx_entry can be released too early leading to a use\nafter free (UAF) when an active old-style ingress or clsact qdisc with a\nshared tc block is later replaced by another ingress or clsact instance.\n\nEssentially, the sequence to trigger the UAF (one example) can be as follows:\n\n  1. A network namespace is created\n  2. An ingress qdisc is created. This allocates a tcx_entry, and\n     &tcx_entry->miniq is stored in the qdisc's miniqp->p_miniq. At the\n     same time, a tcf block with index 1 is created.\n  3. chain0 is attached to the tcf block. chain0 must be connected to\n     the block linked to the ingress qdisc to later reach the function\n     tcf_chain0_head_change_cb_del() which triggers the UAF.\n  4. Create and graft a clsact qdisc. This causes the ingress qdisc\n     created in step 1 to be removed, thus freeing the previously linked\n     tcx_entry:\n\n     rtnetlink_rcv_msg()\n       => tc_modify_qdisc()\n         => qdisc_create()\n           => clsact_init() [a]\n         => qdisc_graft()\n           => qdisc_destroy()\n             => __qdisc_destroy()\n               => ingress_destroy() [b]\n                 => tcx_entry_free()\n                   => kfree_rcu() // tcx_entry freed\n\n  5. Finally, the network namespace is closed. This registers the\n     cleanup_net worker, and during the process of releasing the\n     remaining clsact qdisc, it accesses the tcx_entry that was\n     already freed in step 4, causing the UAF to occur:\n\n     cleanup_net()\n       => ops_exit_list()\n         => default_device_exit_batch()\n           => unregister_netdevice_many()\n             => unregister_netdevice_many_notify()\n               => dev_shutdown()\n                 => qdisc_put()\n                   => clsact_destroy() [c]\n                     => tcf_block_put_ext()\n                       => tcf_chain0_head_change_cb_del()\n                         => tcf_chain_head_change_item()\n                           => clsact_chain_head_change()\n                             => mini_qdisc_pair_swap() // UAF\n\nThere are also other variants, the gist is to add an ingress (or clsact)\nqdisc with a specific shared block, then to replace that qdisc, waiting\nfor the tcx_entry kfree_rcu() to be executed and subsequently accessing\nthe current active qdisc's miniq one way or another.\n\nThe correct fix is to turn the miniq_active boolean into a counter. What\ncan be observed, at step 2 above, the counter transitions from 0->1, at\nstep [a] from 1->2 (in order for the miniq object to remain active during\nthe replacement), then in [b] from 2->1 and finally [c] 1->0 with the\neventual release. The reference counter in general ranges from [0,2] and\nit does not need to be atomic since all access to the counter is protected\nby the rtnl mutex. With this in place, there is no longer a UAF happening\nand the tcx_entry is freed at the correct time.(CVE-2024-41010)\n\nIn the Linux kernel, the following vulnerability has been resolved:\n\nxfs: don't walk off the end of a directory data block\n\nThis adds sanity checks for xfs_dir2_data_unused and xfs_dir2_data_entry\nto make sure don't stray beyond valid memory region. Before patching, the\nloop simply checks that the start offset of the dup and dep is within the\nrange. So in a crafted image, if last entry is xfs_dir2_data_unused, we\ncan change dup->length to dup->length-1 and leave 1 byte of space. In the\nnext traversal, this space will be considered as dup or dep. We may\nencounter an out of bound read when accessing the fixed members.\n\nIn the patch, we make sure that the remaining bytes large enough to hold\nan unused entry before accessing xfs_dir2_data_unused and\nxfs_dir2_data_unused is XFS_DIR2_DATA_ALIGN byte aligned. We also make\nsure that the remaining bytes large enough to hold a dirent with a\nsingle-byte name before accessing xfs_dir2_data_entry.(CVE-2024-41013)\n\nIn the Linux kernel, the following vulnerability has been resolved:\n\nxfs: add bounds checking to xlog_recover_process_data\n\nThere is a lack of verification of the space occupied by fixed members\nof xlog_op_header in the xlog_recover_process_data.\n\nWe can create a crafted image to trigger an out of bounds read by\nfollowing these steps:\n    1) Mount an image of xfs, and do some file operations to leave records\n    2) Before umounting, copy the image for subsequent steps to simulate\n       abnormal exit. Because umount will ensure that tail_blk and\n       head_blk are the same, which will result in the inability to enter\n       xlog_recover_process_data\n    3) Write a tool to parse and modify the copied image in step 2\n    4) Make the end of the xlog_op_header entries only 1 byte away from\n       xlog_rec_header->h_size\n    5) xlog_rec_header->h_num_logops++\n    6) Modify xlog_rec_header->h_crc\n\nFix:\nAdd a check to make sure there is sufficient space to access fixed members\nof xlog_op_header.(CVE-2024-41014)\n\nIn the Linux kernel, the following vulnerability has been resolved:\n\nfs/ntfs3: Add a check for attr_names and oatbl\n\nAdded out-of-bound checking for *ane (ATTR_NAME_ENTRY).(CVE-2024-41018)\n\nIn the Linux kernel, the following vulnerability has been resolved:\n\nfs/ntfs3: Validate ff offset\n\nThis adds sanity checks for ff offset. There is a check\non rt->first_free at first, but walking through by ff\nwithout any check. If the second ff is a large offset.\nWe may encounter an out-of-bound read.(CVE-2024-41019)\n\nIn the Linux kernel, the following vulnerability has been resolved:\n\nfilelock: Fix fcntl/close race recovery compat path\n\nWhen I wrote commit 3cad1bc01041 (\"filelock: Remove locks reliably when\nfcntl/close race is detected\"), I missed that there are two copies of the\ncode I was patching: The normal version, and the version for 64-bit offsets\non 32-bit kernels.\nThanks to Greg KH for stumbling over this while doing the stable\nbackport...\n\nApply exactly the same fix to the compat path for 32-bit kernels.(CVE-2024-41020)\n\nIn the Linux kernel, the following vulnerability has been resolved:\n\ns390/mm: Fix VM_FAULT_HWPOISON handling in do_exception()\n\nThere is no support for HWPOISON, MEMORY_FAILURE, or ARCH_HAS_COPY_MC on\ns390. Therefore we do not expect to see VM_FAULT_HWPOISON in\ndo_exception().\n\nHowever, since commit af19487f00f3 (\"mm: make PTE_MARKER_SWAPIN_ERROR more\ngeneral\"), it is possible to see VM_FAULT_HWPOISON in combination with\nPTE_MARKER_POISONED, even on architectures that do not support HWPOISON\notherwise. In this case, we will end up on the BUG() in do_exception().\n\nFix this by treating VM_FAULT_HWPOISON the same as VM_FAULT_SIGBUS, similar\nto x86 when MEMORY_FAILURE is not configured. Also print unexpected fault\nflags, for easier debugging.\n\nNote that VM_FAULT_HWPOISON_LARGE is not expected, because s390 cannot\nsupport swap entries on other levels than PTE level.(CVE-2024-41021)\n\nIn the Linux kernel, the following vulnerability has been resolved:\n\nsched/deadline: Fix task_struct reference leak\n\nDuring the execution of the following stress test with linux-rt:\n\nstress-ng --cyclic 30 --timeout 30 --minimize --quiet\n\nkmemleak frequently reported a memory leak concerning the task_struct:\n\nunreferenced object 0xffff8881305b8000 (size 16136):\n  comm \"stress-ng\", pid 614, jiffies 4294883961 (age 286.412s)\n  object hex dump (first 32 bytes):\n    02 40 00 00 00 00 00 00 00 00 00 00 00 00 00 00  .@..............\n    00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00  ................\n  debug hex dump (first 16 bytes):\n    53 09 00 00 00 00 00 00 00 00 00 00 00 00 00 00  S...............\n  backtrace:\n    [<00000000046b6790>] dup_task_struct+0x30/0x540\n    [<00000000c5ca0f0b>] copy_process+0x3d9/0x50e0\n    [<00000000ced59777>] kernel_clone+0xb0/0x770\n    [<00000000a50befdc>] __do_sys_clone+0xb6/0xf0\n    [<000000001dbf2008>] do_syscall_64+0x5d/0xf0\n    [<00000000552900ff>] entry_SYSCALL_64_after_hwframe+0x6e/0x76\n\nThe issue occurs in start_dl_timer(), which increments the task_struct\nreference count and sets a timer. The timer callback, dl_task_timer,\nis supposed to decrement the reference count upon expiration. However,\nif enqueue_task_dl() is called before the timer expires and cancels it,\nthe reference count is not decremented, leading to the leak.\n\nThis patch fixes the reference leak by ensuring the task_struct\nreference count is properly decremented when the timer is canceled.(CVE-2024-41023)\n\nIn the Linux kernel, the following vulnerability has been resolved:\n\nfirmware: cs_dsp: Fix overflow checking of wmfw header\n\nFix the checking that firmware file buffer is large enough for the\nwmfw header, to prevent overrunning the buffer.\n\nThe original code tested that the firmware data buffer contained\nenough bytes for the sums of the size of the structs\n\n\twmfw_header + wmfw_adsp1_sizes + wmfw_footer\n\nBut wmfw_adsp1_sizes is only used on ADSP1 firmware. For ADSP2 and\nHalo Core the equivalent struct is wmfw_adsp2_sizes, which is\n4 bytes longer. So the length check didn't guarantee that there\nare enough bytes in the firmware buffer for a header with\nwmfw_adsp2_sizes.\n\nThis patch splits the length check into three separate parts. Each\nof the wmfw_header, wmfw_adsp?_sizes and wmfw_footer are checked\nseparately before they are used.(CVE-2024-41039)\n\nIn the Linux kernel, the following vulnerability has been resolved:\n\nnet/sched: Fix UAF when resolving a clash\n\nKASAN reports the following UAF:\n\n BUG: KASAN: slab-use-after-free in tcf_ct_flow_table_process_conn+0x12b/0x380 [act_ct]\n Read of size 1 at addr ffff888c07603600 by task handler130/6469\n\n Call Trace:\n  <IRQ>\n  dump_stack_lvl+0x48/0x70\n  print_address_description.constprop.0+0x33/0x3d0\n  print_report+0xc0/0x2b0\n  kasan_report+0xd0/0x120\n  __asan_load1+0x6c/0x80\n  tcf_ct_flow_table_process_conn+0x12b/0x380 [act_ct]\n  tcf_ct_act+0x886/0x1350 [act_ct]\n  tcf_action_exec+0xf8/0x1f0\n  fl_classify+0x355/0x360 [cls_flower]\n  __tcf_classify+0x1fd/0x330\n  tcf_classify+0x21c/0x3c0\n  sch_handle_ingress.constprop.0+0x2c5/0x500\n  __netif_receive_skb_core.constprop.0+0xb25/0x1510\n  __netif_receive_skb_list_core+0x220/0x4c0\n  netif_receive_skb_list_internal+0x446/0x620\n  napi_complete_done+0x157/0x3d0\n  gro_cell_poll+0xcf/0x100\n  __napi_poll+0x65/0x310\n  net_rx_action+0x30c/0x5c0\n  __do_softirq+0x14f/0x491\n  __irq_exit_rcu+0x82/0xc0\n  irq_exit_rcu+0xe/0x20\n  common_interrupt+0xa1/0xb0\n  </IRQ>\n  <TASK>\n  asm_common_interrupt+0x27/0x40\n\n Allocated by task 6469:\n  kasan_save_stack+0x38/0x70\n  kasan_set_track+0x25/0x40\n  kasan_save_alloc_info+0x1e/0x40\n  __kasan_krealloc+0x133/0x190\n  krealloc+0xaa/0x130\n  nf_ct_ext_add+0xed/0x230 [nf_conntrack]\n  tcf_ct_act+0x1095/0x1350 [act_ct]\n  tcf_action_exec+0xf8/0x1f0\n  fl_classify+0x355/0x360 [cls_flower]\n  __tcf_classify+0x1fd/0x330\n  tcf_classify+0x21c/0x3c0\n  sch_handle_ingress.constprop.0+0x2c5/0x500\n  __netif_receive_skb_core.constprop.0+0xb25/0x1510\n  __netif_receive_skb_list_core+0x220/0x4c0\n  netif_receive_skb_list_internal+0x446/0x620\n  napi_complete_done+0x157/0x3d0\n  gro_cell_poll+0xcf/0x100\n  __napi_poll+0x65/0x310\n  net_rx_action+0x30c/0x5c0\n  __do_softirq+0x14f/0x491\n\n Freed by task 6469:\n  kasan_save_stack+0x38/0x70\n  kasan_set_track+0x25/0x40\n  kasan_save_free_info+0x2b/0x60\n  ____kasan_slab_free+0x180/0x1f0\n  __kasan_slab_free+0x12/0x30\n  slab_free_freelist_hook+0xd2/0x1a0\n  __kmem_cache_free+0x1a2/0x2f0\n  kfree+0x78/0x120\n  nf_conntrack_free+0x74/0x130 [nf_conntrack]\n  nf_ct_destroy+0xb2/0x140 [nf_conntrack]\n  __nf_ct_resolve_clash+0x529/0x5d0 [nf_conntrack]\n  nf_ct_resolve_clash+0xf6/0x490 [nf_conntrack]\n  __nf_conntrack_confirm+0x2c6/0x770 [nf_conntrack]\n  tcf_ct_act+0x12ad/0x1350 [act_ct]\n  tcf_action_exec+0xf8/0x1f0\n  fl_classify+0x355/0x360 [cls_flower]\n  __tcf_classify+0x1fd/0x330\n  tcf_classify+0x21c/0x3c0\n  sch_handle_ingress.constprop.0+0x2c5/0x500\n  __netif_receive_skb_core.constprop.0+0xb25/0x1510\n  __netif_receive_skb_list_core+0x220/0x4c0\n  netif_receive_skb_list_internal+0x446/0x620\n  napi_complete_done+0x157/0x3d0\n  gro_cell_poll+0xcf/0x100\n  __napi_poll+0x65/0x310\n  net_rx_action+0x30c/0x5c0\n  __do_softirq+0x14f/0x491\n\nThe ct may be dropped if a clash has been resolved but is still passed to\nthe tcf_ct_flow_table_process_conn function for further usage. This issue\ncan be fixed by retrieving ct from skb again after confirming conntrack.(CVE-2024-41040)\n\nIn the Linux kernel, the following vulnerability has been resolved:\n\nudp: Set SOCK_RCU_FREE earlier in udp_lib_get_port().\n\nsyzkaller triggered the warning [0] in udp_v4_early_demux().\n\nIn udp_v[46]_early_demux() and sk_lookup(), we do not touch the refcount\nof the looked-up sk and use sock_pfree() as skb->destructor, so we check\nSOCK_RCU_FREE to ensure that the sk is safe to access during the RCU grace\nperiod.\n\nCurrently, SOCK_RCU_FREE is flagged for a bound socket after being put\ninto the hash table.  Moreover, the SOCK_RCU_FREE check is done too early\nin udp_v[46]_early_demux() and sk_lookup(), so there could be a small race\nwindow:\n\n  CPU1                                 CPU2\n  ----                                 ----\n  udp_v4_early_demux()                 udp_lib_get_port()\n  |                                    |- hlist_add_head_rcu()\n  |- sk = __udp4_lib_demux_lookup()    |\n  |- DEBUG_NET_WARN_ON_ONCE(sk_is_refcounted(sk));\n                                       `- sock_set_flag(sk, SOCK_RCU_FREE)\n\nWe had the same bug in TCP and fixed it in commit 871019b22d1b (\"net:\nset SOCK_RCU_FREE before inserting socket into hashtable\").\n\nLet's apply the same fix for UDP.\n\n[0]:\nWARNING: CPU: 0 PID: 11198 at net/ipv4/udp.c:2599 udp_v4_early_demux+0x481/0xb70 net/ipv4/udp.c:2599\nModules linked in:\nCPU: 0 PID: 11198 Comm: syz-executor.1 Not tainted 6.9.0-g93bda33046e7 #13\nHardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS rel-1.16.0-0-gd239552ce722-prebuilt.qemu.org 04/01/2014\nRIP: 0010:udp_v4_early_demux+0x481/0xb70 net/ipv4/udp.c:2599\nCode: c5 7a 15 fe bb 01 00 00 00 44 89 e9 31 ff d3 e3 81 e3 bf ef ff ff 89 de e8 2c 74 15 fe 85 db 0f 85 02 06 00 00 e8 9f 7a 15 fe <0f> 0b e8 98 7a 15 fe 49 8d 7e 60 e8 4f 39 2f fe 49 c7 46 60 20 52\nRSP: 0018:ffffc9000ce3fa58 EFLAGS: 00010293\nRAX: 0000000000000000 RBX: 0000000000000000 RCX: ffffffff8318c92c\nRDX: ffff888036ccde00 RSI: ffffffff8318c2f1 RDI: 0000000000000001\nRBP: ffff88805a2dd6e0 R08: 0000000000000001 R09: 0000000000000000\nR10: 0000000000000000 R11: 0001ffffffffffff R12: ffff88805a2dd680\nR13: 0000000000000007 R14: ffff88800923f900 R15: ffff88805456004e\nFS:  00007fc449127640(0000) GS:ffff88807dc00000(0000) knlGS:0000000000000000\nCS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033\nCR2: 00007fc449126e38 CR3: 000000003de4b002 CR4: 0000000000770ef0\nDR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000\nDR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000600\nPKRU: 55555554\nCall Trace:\n <TASK>\n ip_rcv_finish_core.constprop.0+0xbdd/0xd20 net/ipv4/ip_input.c:349\n ip_rcv_finish+0xda/0x150 net/ipv4/ip_input.c:447\n NF_HOOK include/linux/netfilter.h:314 [inline]\n NF_HOOK include/linux/netfilter.h:308 [inline]\n ip_rcv+0x16c/0x180 net/ipv4/ip_input.c:569\n __netif_receive_skb_one_core+0xb3/0xe0 net/core/dev.c:5624\n __netif_receive_skb+0x21/0xd0 net/core/dev.c:5738\n netif_receive_skb_internal net/core/dev.c:5824 [inline]\n netif_receive_skb+0x271/0x300 net/core/dev.c:5884\n tun_rx_batched drivers/net/tun.c:1549 [inline]\n tun_get_user+0x24db/0x2c50 drivers/net/tun.c:2002\n tun_chr_write_iter+0x107/0x1a0 drivers/net/tun.c:2048\n new_sync_write fs/read_write.c:497 [inline]\n vfs_write+0x76f/0x8d0 fs/read_write.c:590\n ksys_write+0xbf/0x190 fs/read_write.c:643\n __do_sys_write fs/read_write.c:655 [inline]\n __se_sys_write fs/read_write.c:652 [inline]\n __x64_sys_write+0x41/0x50 fs/read_write.c:652\n x64_sys_call+0xe66/0x1990 arch/x86/include/generated/asm/syscalls_64.h:2\n do_syscall_x64 arch/x86/entry/common.c:52 [inline]\n do_syscall_64+0x4b/0x110 arch/x86/entry/common.c:83\n entry_SYSCALL_64_after_hwframe+0x4b/0x53\nRIP: 0033:0x7fc44a68bc1f\nCode: 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 e9 cf f5 ff 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 b8 01 00 00 00 0f 05 <48> 3d 00 f0 ff ff 77 31 44 89 c7 48 89 44 24 08 e8 3c d0 f5 ff 48\nRSP: 002b:00007fc449126c90 EFLAGS: 00000293 ORIG_RAX: 0000000000000001\nRAX: ffffffffffffffda RBX: 00000000004bc050 RCX: 00007fc44a68bc1f\nR\n---truncated---(CVE-2024-41041)\n\nIn the Linux kernel, the following vulnerability has been resolved:\n\nppp: reject claimed-as-LCP but actually malformed packets\n\nSince 'ppp_async_encode()' assumes valid LCP packets (with code\nfrom 1 to 7 inclusive), add 'ppp_check_packet()' to ensure that\nLCP packet has an actual body beyond PPP_LCP header bytes, and\nreject claimed-as-LCP but actually malformed data otherwise.(CVE-2024-41044)\n\nIn the Linux kernel, the following vulnerability has been resolved:\n\nbpf: Defer work in bpf_timer_cancel_and_free\n\nCurrently, the same case as previous patch (two timer callbacks trying\nto cancel each other) can be invoked through bpf_map_update_elem as\nwell, or more precisely, freeing map elements containing timers. Since\nthis relies on hrtimer_cancel as well, it is prone to the same deadlock\nsituation as the previous patch.\n\nIt would be sufficient to use hrtimer_try_to_cancel to fix this problem,\nas the timer cannot be enqueued after async_cancel_and_free. Once\nasync_cancel_and_free has been done, the timer must be reinitialized\nbefore it can be armed again. The callback running in parallel trying to\narm the timer will fail, and freeing bpf_hrtimer without waiting is\nsufficient (given kfree_rcu), and bpf_timer_cb will return\nHRTIMER_NORESTART, preventing the timer from being rearmed again.\n\nHowever, there exists a UAF scenario where the callback arms the timer\nbefore entering this function, such that if cancellation fails (due to\ntimer callback invoking this routine, or the target timer callback\nrunning concurrently). In such a case, if the timer expiration is\nsignificantly far in the future, the RCU grace period expiration\nhappening before it will free the bpf_hrtimer state and along with it\nthe struct hrtimer, that is enqueued.\n\nHence, it is clear cancellation needs to occur after\nasync_cancel_and_free, and yet it cannot be done inline due to deadlock\nissues. We thus modify bpf_timer_cancel_and_free to defer work to the\nglobal workqueue, adding a work_struct alongside rcu_head (both used at\n_different_ points of time, so can share space).\n\nUpdate existing code comments to reflect the new state of affairs.(CVE-2024-41045)\n\nIn the Linux kernel, the following vulnerability has been resolved:\n\nskmsg: Skip zero length skb in sk_msg_recvmsg\n\nWhen running BPF selftests (./test_progs -t sockmap_basic) on a Loongarch\nplatform, the following kernel panic occurs:\n\n  [...]\n  Oops[#1]:\n  CPU: 22 PID: 2824 Comm: test_progs Tainted: G           OE  6.10.0-rc2+ #18\n  Hardware name: LOONGSON Dabieshan/Loongson-TC542F0, BIOS Loongson-UDK2018\n     ... ...\n     ra: 90000000048bf6c0 sk_msg_recvmsg+0x120/0x560\n    ERA: 9000000004162774 copy_page_to_iter+0x74/0x1c0\n   CRMD: 000000b0 (PLV0 -IE -DA +PG DACF=CC DACM=CC -WE)\n   PRMD: 0000000c (PPLV0 +PIE +PWE)\n   EUEN: 00000007 (+FPE +SXE +ASXE -BTE)\n   ECFG: 00071c1d (LIE=0,2-4,10-12 VS=7)\n  ESTAT: 00010000 [PIL] (IS= ECode=1 EsubCode=0)\n   BADV: 0000000000000040\n   PRID: 0014c011 (Loongson-64bit, Loongson-3C5000)\n  Modules linked in: bpf_testmod(OE) xt_CHECKSUM xt_MASQUERADE xt_conntrack\n  Process test_progs (pid: 2824, threadinfo=0000000000863a31, task=...)\n  Stack : ...\n  Call Trace:\n  [<9000000004162774>] copy_page_to_iter+0x74/0x1c0\n  [<90000000048bf6c0>] sk_msg_recvmsg+0x120/0x560\n  [<90000000049f2b90>] tcp_bpf_recvmsg_parser+0x170/0x4e0\n  [<90000000049aae34>] inet_recvmsg+0x54/0x100\n  [<900000000481ad5c>] sock_recvmsg+0x7c/0xe0\n  [<900000000481e1a8>] __sys_recvfrom+0x108/0x1c0\n  [<900000000481e27c>] sys_recvfrom+0x1c/0x40\n  [<9000000004c076ec>] do_syscall+0x8c/0xc0\n  [<9000000003731da4>] handle_syscall+0xc4/0x160\n  Code: ...\n  ---[ end trace 0000000000000000 ]---\n  Kernel panic - not syncing: Fatal exception\n  Kernel relocated by 0x3510000\n   .text @ 0x9000000003710000\n   .data @ 0x9000000004d70000\n   .bss  @ 0x9000000006469400\n  ---[ end Kernel panic - not syncing: Fatal exception ]---\n  [...]\n\nThis crash happens every time when running sockmap_skb_verdict_shutdown\nsubtest in sockmap_basic.\n\nThis crash is because a NULL pointer is passed to page_address() in the\nsk_msg_recvmsg(). Due to the different implementations depending on the\narchitecture, page_address(NULL) will trigger a panic on Loongarch\nplatform but not on x86 platform. So this bug was hidden on x86 platform\nfor a while, but now it is exposed on Loongarch platform. The root cause\nis that a zero length skb (skb->len == 0) was put on the queue.\n\nThis zero length skb is a TCP FIN packet, which was sent by shutdown(),\ninvoked in test_sockmap_skb_verdict_shutdown():\n\n\tshutdown(p1, SHUT_WR);\n\nIn this case, in sk_psock_skb_ingress_enqueue(), num_sge is zero, and no\npage is put to this sge (see sg_set_page in sg_set_page), but this empty\nsge is queued into ingress_msg list.\n\nAnd in sk_msg_recvmsg(), this empty sge is used, and a NULL page is got by\nsg_page(sge). Pass this NULL page to copy_page_to_iter(), which passes it\nto kmap_local_page() and to page_address(), then kernel panics.\n\nTo solve this, we should skip this zero length skb. So in sk_msg_recvmsg(),\nif copy is zero, that means it's a zero length skb, skip invoking\ncopy_page_to_iter(). We are using the EFAULT return triggered by\ncopy_page_to_iter to check for is_fin in tcp_bpf.c.(CVE-2024-41048)\n\nIn the Linux kernel, the following vulnerability has been resolved:\n\nfilelock: fix potential use-after-free in posix_lock_inode\n\nLight Hsieh reported a KASAN UAF warning in trace_posix_lock_inode().\nThe request pointer had been changed earlier to point to a lock entry\nthat was added to the inode's list. However, before the tracepoint could\nfire, another task raced in and freed that lock.\n\nFix this by moving the tracepoint inside the spinlock, which should\nensure that this doesn't happen.(CVE-2024-41049)\n\nIn the Linux kernel, the following vulnerability has been resolved:\n\nfirmware: cs_dsp: Use strnlen() on name fields in V1 wmfw files\n\nUse strnlen() instead of strlen() on the algorithm and coefficient name\nstring arrays in V1 wmfw files.\n\nIn V1 wmfw files the name is a NUL-terminated string in a fixed-size\narray. cs_dsp should protect against overrunning the array if the NUL\nterminator is missing.(CVE-2024-41056)\n\nIn the Linux kernel, the following vulnerability has been resolved:\n\nbluetooth/l2cap: sync sock recv cb and release\n\nThe problem occurs between the system call to close the sock and hci_rx_work,\nwhere the former releases the sock and the latter accesses it without lock protection.\n\n           CPU0                       CPU1\n           ----                       ----\n           sock_close                 hci_rx_work\n\t   l2cap_sock_release         hci_acldata_packet\n\t   l2cap_sock_kill            l2cap_recv_frame\n\t   sk_free                    l2cap_conless_channel\n\t                              l2cap_sock_recv_cb\n\nIf hci_rx_work processes the data that needs to be received before the sock is\nclosed, then everything is normal; Otherwise, the work thread may access the\nreleased sock when receiving data.\n\nAdd a chan mutex in the rx callback of the sock to achieve synchronization between\nthe sock release and recv cb.\n\nSock is dead, so set chan data to NULL, avoid others use invalid sock pointer.(CVE-2024-41062)\n\nIn the Linux kernel, the following vulnerability has been resolved:\n\nBluetooth: hci_core: cancel all works upon hci_unregister_dev()\n\nsyzbot is reporting that calling hci_release_dev() from hci_error_reset()\ndue to hci_dev_put() from hci_error_reset() can cause deadlock at\ndestroy_workqueue(), for hci_error_reset() is called from\nhdev->req_workqueue which destroy_workqueue() needs to flush.\n\nWe need to make sure that hdev->{rx_work,cmd_work,tx_work} which are\nqueued into hdev->workqueue and hdev->{power_on,error_reset} which are\nqueued into hdev->req_workqueue are no longer running by the moment\n\n       destroy_workqueue(hdev->workqueue);\n       destroy_workqueue(hdev->req_workqueue);\n\nare called from hci_release_dev().\n\nCall cancel_work_sync() on these work items from hci_unregister_dev()\nas soon as hdev->list is removed from hci_dev_list.(CVE-2024-41063)\n\nIn the Linux kernel, the following vulnerability has been resolved:\n\npowerpc/eeh: avoid possible crash when edev->pdev changes\n\nIf a PCI device is removed during eeh_pe_report_edev(), edev->pdev\nwill change and can cause a crash, hold the PCI rescan/remove lock\nwhile taking a copy of edev->pdev->bus.(CVE-2024-41064)\n\nIn the Linux kernel, the following vulnerability has been resolved:\n\nASoC: topology: Fix references to freed memory\n\nMost users after parsing a topology file, release memory used by it, so\nhaving pointer references directly into topology file contents is wrong.\nUse devm_kmemdup(), to allocate memory as needed.(CVE-2024-41069)\n\nIn the Linux kernel, the following vulnerability has been resolved:\n\nwifi: cfg80211: wext: add extra SIOCSIWSCAN data check\n\nIn 'cfg80211_wext_siwscan()', add extra check whether number of\nchannels passed via 'ioctl(sock, SIOCSIWSCAN, ...)' doesn't exceed\nIW_MAX_FREQUENCIES and reject invalid request with -EINVAL otherwise.(CVE-2024-41072)\n\nIn the Linux kernel, the following vulnerability has been resolved:\n\nnvme: avoid double free special payload\n\nIf a discard request needs to be retried, and that retry may fail before\na new special payload is added, a double free will result. Clear the\nRQF_SPECIAL_LOAD when the request is cleaned.(CVE-2024-41073)\n\nIn the Linux kernel, the following vulnerability has been resolved:\n\ncachefiles: Set object to close if ondemand_id < 0 in copen\n\nIf copen is maliciously called in the user mode, it may delete the request\ncorresponding to the random id. And the request may have not been read yet.\n\nNote that when the object is set to reopen, the open request will be done\nwith the still reopen state in above case. As a result, the request\ncorresponding to this object is always skipped in select_req function, so\nthe read request is never completed and blocks other process.\n\nFix this issue by simply set object to close if its id < 0 in copen.(CVE-2024-41074)\n\nIn the Linux kernel, the following vulnerability has been resolved:\n\ncachefiles: add consistency check for copen/cread\n\nThis prevents malicious processes from completing random copen/cread\nrequests and crashing the system. Added checks are listed below:\n\n  * Generic, copen can only complete open requests, and cread can only\n    complete read requests.\n  * For copen, ondemand_id must not be 0, because this indicates that the\n    request has not been read by the daemon.\n  * For cread, the object corresponding to fd and req should be the same.(CVE-2024-41075)\n\nIn the Linux kernel, the following vulnerability has been resolved:\n\nNFSv4: Fix memory leak in nfs4_set_security_label\n\nWe leak nfs_fattr and nfs4_label every time we set a security xattr.(CVE-2024-41076)\n\nIn the Linux kernel, the following vulnerability has been resolved:\n\nnull_blk: fix validation of block size\n\nBlock size should be between 512 and PAGE_SIZE and be a power of 2. The current\ncheck does not validate this, so update the check.\n\nWithout this patch, null_blk would Oops due to a null pointer deref when\nloaded with bs=1536 [1].\n\n\n[axboe: remove unnecessary braces and != 0 check](CVE-2024-41077)\n\nIn the Linux kernel, the following vulnerability has been resolved:\n\nio_uring: fix possible deadlock in io_register_iowq_max_workers()\n\nThe io_register_iowq_max_workers() function calls io_put_sq_data(),\nwhich acquires the sqd->lock without releasing the uring_lock.\nSimilar to the commit 009ad9f0c6ee (\"io_uring: drop ctx->uring_lock\nbefore acquiring sqd->lock\"), this can lead to a potential deadlock\nsituation.\n\nTo resolve this issue, the uring_lock is released before calling\nio_put_sq_data(), and then it is re-acquired after the function call.\n\nThis change ensures that the locks are acquired in the correct\norder, preventing the possibility of a deadlock.(CVE-2024-41080)\n\nIn the Linux kernel, the following vulnerability has been resolved:\n\ncxl/mem: Fix no cxl_nvd during pmem region auto-assembling\n\nWhen CXL subsystem is auto-assembling a pmem region during cxl\nendpoint port probing, always hit below calltrace.\n\n BUG: kernel NULL pointer dereference, address: 0000000000000078\n #PF: supervisor read access in kernel mode\n #PF: error_code(0x0000) - not-present page\n RIP: 0010:cxl_pmem_region_probe+0x22e/0x360 [cxl_pmem]\n Call Trace:\n  <TASK>\n  ? __die+0x24/0x70\n  ? page_fault_oops+0x82/0x160\n  ? do_user_addr_fault+0x65/0x6b0\n  ? exc_page_fault+0x7d/0x170\n  ? asm_exc_page_fault+0x26/0x30\n  ? cxl_pmem_region_probe+0x22e/0x360 [cxl_pmem]\n  ? cxl_pmem_region_probe+0x1ac/0x360 [cxl_pmem]\n  cxl_bus_probe+0x1b/0x60 [cxl_core]\n  really_probe+0x173/0x410\n  ? __pfx___device_attach_driver+0x10/0x10\n  __driver_probe_device+0x80/0x170\n  driver_probe_device+0x1e/0x90\n  __device_attach_driver+0x90/0x120\n  bus_for_each_drv+0x84/0xe0\n  __device_attach+0xbc/0x1f0\n  bus_probe_device+0x90/0xa0\n  device_add+0x51c/0x710\n  devm_cxl_add_pmem_region+0x1b5/0x380 [cxl_core]\n  cxl_bus_probe+0x1b/0x60 [cxl_core]\n\nThe cxl_nvd of the memdev needs to be available during the pmem region\nprobe. Currently the cxl_nvd is registered after the endpoint port probe.\nThe endpoint probe, in the case of autoassembly of regions, can cause a\npmem region probe requiring the not yet available cxl_nvd. Adjust the\nsequence so this dependency is met.\n\nThis requires adding a port parameter to cxl_find_nvdimm_bridge() that\ncan be used to query the ancestor root port. The endpoint port is not\nyet available, but will share a common ancestor with its parent, so\nstart the query from there instead.(CVE-2024-41085)\n\nIn the Linux kernel, the following vulnerability has been resolved:\n\ntap: add missing verification for short frame\n\nThe cited commit missed to check against the validity of the frame length\nin the tap_get_user_xdp() path, which could cause a corrupted skb to be\nsent downstack. Even before the skb is transmitted, the\ntap_get_user_xdp()-->skb_set_network_header() may assume the size is more\nthan ETH_HLEN. Once transmitted, this could either cause out-of-bound\naccess beyond the actual length, or confuse the underlayer with incorrect\nor inconsistent header length in the skb metadata.\n\nIn the alternative path, tap_get_user() already prohibits short frame which\nhas the length less than Ethernet header size from being transmitted.\n\nThis is to drop any frame shorter than the Ethernet header size just like\nhow tap_get_user() does.\n\nCVE: CVE-2024-41090(CVE-2024-41090)\n\nIn the Linux kernel, the following vulnerability has been resolved:\n\ntun: add missing verification for short frame\n\nThe cited commit missed to check against the validity of the frame length\nin the tun_xdp_one() path, which could cause a corrupted skb to be sent\ndownstack. Even before the skb is transmitted, the\ntun_xdp_one-->eth_type_trans() may access the Ethernet header although it\ncan be less than ETH_HLEN. Once transmitted, this could either cause\nout-of-bound access beyond the actual length, or confuse the underlayer\nwith incorrect or inconsistent header length in the skb metadata.\n\nIn the alternative path, tun_get_user() already prohibits short frame which\nhas the length less than Ethernet header size from being transmitted for\nIFF_TAP.\n\nThis is to drop any frame shorter than the Ethernet header size just like\nhow tun_get_user() does.\n\nCVE: CVE-2024-41091(CVE-2024-41091)\n\nIn the Linux kernel, the following vulnerability has been resolved:\n\nPCI/MSI: Fix UAF in msi_capability_init\n\nKFENCE reports the following UAF:\n\n BUG: KFENCE: use-after-free read in __pci_enable_msi_range+0x2c0/0x488\n\n Use-after-free read at 0x0000000024629571 (in kfence-#12):\n  __pci_enable_msi_range+0x2c0/0x488\n  pci_alloc_irq_vectors_affinity+0xec/0x14c\n  pci_alloc_irq_vectors+0x18/0x28\n\n kfence-#12: 0x0000000008614900-0x00000000e06c228d, size=104, cache=kmalloc-128\n\n allocated by task 81 on cpu 7 at 10.808142s:\n  __kmem_cache_alloc_node+0x1f0/0x2bc\n  kmalloc_trace+0x44/0x138\n  msi_alloc_desc+0x3c/0x9c\n  msi_domain_insert_msi_desc+0x30/0x78\n  msi_setup_msi_desc+0x13c/0x184\n  __pci_enable_msi_range+0x258/0x488\n  pci_alloc_irq_vectors_affinity+0xec/0x14c\n  pci_alloc_irq_vectors+0x18/0x28\n\n freed by task 81 on cpu 7 at 10.811436s:\n  msi_domain_free_descs+0xd4/0x10c\n  msi_domain_free_locked.part.0+0xc0/0x1d8\n  msi_domain_alloc_irqs_all_locked+0xb4/0xbc\n  pci_msi_setup_msi_irqs+0x30/0x4c\n  __pci_enable_msi_range+0x2a8/0x488\n  pci_alloc_irq_vectors_affinity+0xec/0x14c\n  pci_alloc_irq_vectors+0x18/0x28\n\nDescriptor allocation done in:\n__pci_enable_msi_range\n    msi_capability_init\n        msi_setup_msi_desc\n            msi_insert_msi_desc\n                msi_domain_insert_msi_desc\n                    msi_alloc_desc\n                        ...\n\nFreed in case of failure in __msi_domain_alloc_locked()\n__pci_enable_msi_range\n    msi_capability_init\n        pci_msi_setup_msi_irqs\n            msi_domain_alloc_irqs_all_locked\n                msi_domain_alloc_locked\n                    __msi_domain_alloc_locked => fails\n                    msi_domain_free_locked\n                        ...\n\nThat failure propagates back to pci_msi_setup_msi_irqs() in\nmsi_capability_init() which accesses the descriptor for unmasking in the\nerror exit path.\n\nCure it by copying the descriptor and using the copy for the error exit path\nunmask operation.\n\n[ tglx: Massaged change log ](CVE-2024-41096)\n\nIn the Linux kernel, the following vulnerability has been resolved:\n\nbpf: Take return from set_memory_ro() into account with bpf_prog_lock_ro()\n\nset_memory_ro() can fail, leaving memory unprotected.\n\nCheck its return and take it into account as an error.(CVE-2024-42068)\n\nIn the Linux kernel, the following vulnerability has been resolved:\n\niio: chemical: bme680: Fix overflows in compensate() functions\n\nThere are cases in the compensate functions of the driver that\nthere could be overflows of variables due to bit shifting ops.\nThese implications were initially discussed here [1] and they\nwere mentioned in log message of Commit 1b3bd8592780 (\"iio:\nchemical: Add support for Bosch BME680 sensor\").\n\n[1]: https://lore.kernel.org/linux-iio/20180728114028.3c1bbe81@archlinux/(CVE-2024-42086)\n\nIn the Linux kernel, the following vulnerability has been resolved:\n\nALSA: emux: improve patch ioctl data validation\n\nIn load_data(), make the validation of and skipping over the main info\nblock match that in load_guspatch().\n\nIn load_guspatch(), add checking that the specified patch length matches\nthe actually supplied data, like load_data() already did.(CVE-2024-42097)\n\nIn the Linux kernel, the following vulnerability has been resolved:\n\njffs2: Fix potential illegal address access in jffs2_free_inode\n\nDuring the stress testing of the jffs2 file system,the following\nabnormal printouts were found:\n[ 2430.649000] Unable to handle kernel paging request at virtual address 0069696969696948\n[ 2430.649622] Mem abort info:\n[ 2430.649829]   ESR = 0x96000004\n[ 2430.650115]   EC = 0x25: DABT (current EL), IL = 32 bits\n[ 2430.650564]   SET = 0, FnV = 0\n[ 2430.650795]   EA = 0, S1PTW = 0\n[ 2430.651032]   FSC = 0x04: level 0 translation fault\n[ 2430.651446] Data abort info:\n[ 2430.651683]   ISV = 0, ISS = 0x00000004\n[ 2430.652001]   CM = 0, WnR = 0\n[ 2430.652558] [0069696969696948] address between user and kernel address ranges\n[ 2430.653265] Internal error: Oops: 96000004 [#1] PREEMPT SMP\n[ 2430.654512] CPU: 2 PID: 20919 Comm: cat Not tainted 5.15.25-g512f31242bf6 #33\n[ 2430.655008] Hardware name: linux,dummy-virt (DT)\n[ 2430.655517] pstate: 20000005 (nzCv daif -PAN -UAO -TCO -DIT -SSBS BTYPE=--)\n[ 2430.656142] pc : kfree+0x78/0x348\n[ 2430.656630] lr : jffs2_free_inode+0x24/0x48\n[ 2430.657051] sp : ffff800009eebd10\n[ 2430.657355] x29: ffff800009eebd10 x28: 0000000000000001 x27: 0000000000000000\n[ 2430.658327] x26: ffff000038f09d80 x25: 0080000000000000 x24: ffff800009d38000\n[ 2430.658919] x23: 5a5a5a5a5a5a5a5a x22: ffff000038f09d80 x21: ffff8000084f0d14\n[ 2430.659434] x20: ffff0000bf9a6ac0 x19: 0169696969696940 x18: 0000000000000000\n[ 2430.659969] x17: ffff8000b6506000 x16: ffff800009eec000 x15: 0000000000004000\n[ 2430.660637] x14: 0000000000000000 x13: 00000001000820a1 x12: 00000000000d1b19\n[ 2430.661345] x11: 0004000800000000 x10: 0000000000000001 x9 : ffff8000084f0d14\n[ 2430.662025] x8 : ffff0000bf9a6b40 x7 : ffff0000bf9a6b48 x6 : 0000000003470302\n[ 2430.662695] x5 : ffff00002e41dcc0 x4 : ffff0000bf9aa3b0 x3 : 0000000003470342\n[ 2430.663486] x2 : 0000000000000000 x1 : ffff8000084f0d14 x0 : fffffc0000000000\n[ 2430.664217] Call trace:\n[ 2430.664528]  kfree+0x78/0x348\n[ 2430.664855]  jffs2_free_inode+0x24/0x48\n[ 2430.665233]  i_callback+0x24/0x50\n[ 2430.665528]  rcu_do_batch+0x1ac/0x448\n[ 2430.665892]  rcu_core+0x28c/0x3c8\n[ 2430.666151]  rcu_core_si+0x18/0x28\n[ 2430.666473]  __do_softirq+0x138/0x3cc\n[ 2430.666781]  irq_exit+0xf0/0x110\n[ 2430.667065]  handle_domain_irq+0x6c/0x98\n[ 2430.667447]  gic_handle_irq+0xac/0xe8\n[ 2430.667739]  call_on_irq_stack+0x28/0x54\nThe parameter passed to kfree was 5a5a5a5a, which corresponds to the target field of\nthe jffs_inode_info structure. It was found that all variables in the jffs_inode_info\nstructure were 5a5a5a5a, except for the first member sem. It is suspected that these\nvariables are not initialized because they were set to 5a5a5a5a during memory testing,\nwhich is meant to detect uninitialized memory.The sem variable is initialized in the\nfunction jffs2_i_init_once, while other members are initialized in\nthe function jffs2_init_inode_info.\n\nThe function jffs2_init_inode_info is called after iget_locked,\nbut in the iget_locked function, the destroy_inode process is triggered,\nwhich releases the inode and consequently, the target member of the inode\nis not initialized.In concurrent high pressure scenarios, iget_locked\nmay enter the destroy_inode branch as described in the code.\n\nSince the destroy_inode functionality of jffs2 only releases the target,\nthe fix method is to set target to NULL in jffs2_i_init_once.(CVE-2024-42115)\n\nIn the Linux kernel, the following vulnerability has been resolved:\n\npowerpc: Avoid nmi_enter/nmi_exit in real mode interrupt.\n\nnmi_enter()/nmi_exit() touches per cpu variables which can lead to kernel\ncrash when invoked during real mode interrupt handling (e.g. early HMI/MCE\ninterrupt handler) if percpu allocation comes from vmalloc area.\n\nEarly HMI/MCE handlers are called through DEFINE_INTERRUPT_HANDLER_NMI()\nwrapper which invokes nmi_enter/nmi_exit calls. We don't see any issue when\npercpu allocation is from the embedded first chunk. However with\nCONFIG_NEED_PER_CPU_PAGE_FIRST_CHUNK enabled there are chances where percpu\nallocation can come from the vmalloc area.\n\nWith kernel command line \"percpu_alloc=page\" we can force percpu allocation\nto come from vmalloc area and can see kernel crash in machine_check_early:\n\n[    1.215714] NIP [c000000000e49eb4] rcu_nmi_enter+0x24/0x110\n[    1.215717] LR [c0000000000461a0] machine_check_early+0xf0/0x2c0\n[    1.215719] --- interrupt: 200\n[    1.215720] [c000000fffd73180] [0000000000000000] 0x0 (unreliable)\n[    1.215722] [c000000fffd731b0] [0000000000000000] 0x0\n[    1.215724] [c000000fffd73210] [c000000000008364] machine_check_early_common+0x134/0x1f8\n\nFix this by avoiding use of nmi_enter()/nmi_exit() in real mode if percpu\nfirst chunk is not embedded.(CVE-2024-42126)\n\nIn the Linux kernel, the following vulnerability has been resolved:\n\nleds: mlxreg: Use devm_mutex_init() for mutex initialization\n\nIn this driver LEDs are registered using devm_led_classdev_register()\nso they are automatically unregistered after module's remove() is done.\nled_classdev_unregister() calls module's led_set_brightness() to turn off\nthe LEDs and that callback uses mutex which was destroyed already\nin module's remove() so use devm API instead.(CVE-2024-42129)\n\nIn the Linux kernel, the following vulnerability has been resolved:\n\ns390/pkey: Wipe copies of protected- and secure-keys\n\nAlthough the clear-key of neither protected- nor secure-keys is\naccessible, this key material should only be visible to the calling\nprocess. So wipe all copies of protected- or secure-keys from stack,\neven in case of an error.(CVE-2024-42155)\n\nIn the Linux kernel, the following vulnerability has been resolved:\n\ngve: Account for stopped queues when reading NIC stats\n\nWe now account for the fact that the NIC might send us stats for a\nsubset of queues. Without this change, gve_get_ethtool_stats might make\nan invalid access on the priv->stats_report->stats array.(CVE-2024-42162)\n\nIn the Linux kernel, the following vulnerability has been resolved:\n\ndrm/amdgpu: Using uninitialized value *size when calling amdgpu_vce_cs_reloc\n\nInitialize the size before calling amdgpu_vce_cs_reloc, such as case 0x03000001.\nV2: To really improve the handling we would actually\n   need to have a separate value of 0xffffffff.(Christian)(CVE-2024-42228)",
				"category":"general",
				"title":"Description"
			},
			{
				"text":"An update for kernel is now available for openEuler-24.03-LTS.\n\nopenEuler Security has rated this update as having a security impact of critical. A Common Vunlnerability Scoring System(CVSS)base score,which gives a detailed severity rating, is available for each vulnerability from the CVElink(s) in the References section.",
				"category":"general",
				"title":"Topic"
			},
			{
				"text":"Critical",
				"category":"general",
				"title":"Severity"
			},
			{
				"text":"kernel",
				"category":"general",
				"title":"Affected Component"
			}
		],
		"publisher":{
			"issuing_authority":"openEuler security committee",
			"name":"openEuler",
			"namespace":"https://www.openeuler.org",
			"contact_details":"openeuler-security@openeuler.org",
			"category":"vendor"
		},
		"references":[
			{
				"summary":"openEuler-SA-2024-1960",
				"category":"self",
				"url":"https://www.openeuler.org/zh/security/security-bulletins/detail/?id=openEuler-SA-2024-1960"
			},
			{
				"summary":"CVE-2024-33619",
				"category":"self",
				"url":"https://www.openeuler.org/en/security/cve/detail/?cveId=CVE-2024-33619&packageName=kernel"
			},
			{
				"summary":"CVE-2024-35247",
				"category":"self",
				"url":"https://www.openeuler.org/en/security/cve/detail/?cveId=CVE-2024-35247&packageName=kernel"
			},
			{
				"summary":"CVE-2024-35848",
				"category":"self",
				"url":"https://www.openeuler.org/en/security/cve/detail/?cveId=CVE-2024-35848&packageName=kernel"
			},
			{
				"summary":"CVE-2024-35859",
				"category":"self",
				"url":"https://www.openeuler.org/en/security/cve/detail/?cveId=CVE-2024-35859&packageName=kernel"
			},
			{
				"summary":"CVE-2024-35966",
				"category":"self",
				"url":"https://www.openeuler.org/en/security/cve/detail/?cveId=CVE-2024-35966&packageName=kernel"
			},
			{
				"summary":"CVE-2024-36890",
				"category":"self",
				"url":"https://www.openeuler.org/en/security/cve/detail/?cveId=CVE-2024-36890&packageName=kernel"
			},
			{
				"summary":"CVE-2024-36896",
				"category":"self",
				"url":"https://www.openeuler.org/en/security/cve/detail/?cveId=CVE-2024-36896&packageName=kernel"
			},
			{
				"summary":"CVE-2024-36899",
				"category":"self",
				"url":"https://www.openeuler.org/en/security/cve/detail/?cveId=CVE-2024-36899&packageName=kernel"
			},
			{
				"summary":"CVE-2024-36901",
				"category":"self",
				"url":"https://www.openeuler.org/en/security/cve/detail/?cveId=CVE-2024-36901&packageName=kernel"
			},
			{
				"summary":"CVE-2024-36944",
				"category":"self",
				"url":"https://www.openeuler.org/en/security/cve/detail/?cveId=CVE-2024-36944&packageName=kernel"
			},
			{
				"summary":"CVE-2024-36964",
				"category":"self",
				"url":"https://www.openeuler.org/en/security/cve/detail/?cveId=CVE-2024-36964&packageName=kernel"
			},
			{
				"summary":"CVE-2024-38556",
				"category":"self",
				"url":"https://www.openeuler.org/en/security/cve/detail/?cveId=CVE-2024-38556&packageName=kernel"
			},
			{
				"summary":"CVE-2024-38576",
				"category":"self",
				"url":"https://www.openeuler.org/en/security/cve/detail/?cveId=CVE-2024-38576&packageName=kernel"
			},
			{
				"summary":"CVE-2024-38600",
				"category":"self",
				"url":"https://www.openeuler.org/en/security/cve/detail/?cveId=CVE-2024-38600&packageName=kernel"
			},
			{
				"summary":"CVE-2024-38606",
				"category":"self",
				"url":"https://www.openeuler.org/en/security/cve/detail/?cveId=CVE-2024-38606&packageName=kernel"
			},
			{
				"summary":"CVE-2024-38607",
				"category":"self",
				"url":"https://www.openeuler.org/en/security/cve/detail/?cveId=CVE-2024-38607&packageName=kernel"
			},
			{
				"summary":"CVE-2024-38617",
				"category":"self",
				"url":"https://www.openeuler.org/en/security/cve/detail/?cveId=CVE-2024-38617&packageName=kernel"
			},
			{
				"summary":"CVE-2024-39471",
				"category":"self",
				"url":"https://www.openeuler.org/en/security/cve/detail/?cveId=CVE-2024-39471&packageName=kernel"
			},
			{
				"summary":"CVE-2024-39473",
				"category":"self",
				"url":"https://www.openeuler.org/en/security/cve/detail/?cveId=CVE-2024-39473&packageName=kernel"
			},
			{
				"summary":"CVE-2024-39475",
				"category":"self",
				"url":"https://www.openeuler.org/en/security/cve/detail/?cveId=CVE-2024-39475&packageName=kernel"
			},
			{
				"summary":"CVE-2024-39481",
				"category":"self",
				"url":"https://www.openeuler.org/en/security/cve/detail/?cveId=CVE-2024-39481&packageName=kernel"
			},
			{
				"summary":"CVE-2024-39486",
				"category":"self",
				"url":"https://www.openeuler.org/en/security/cve/detail/?cveId=CVE-2024-39486&packageName=kernel"
			},
			{
				"summary":"CVE-2024-39493",
				"category":"self",
				"url":"https://www.openeuler.org/en/security/cve/detail/?cveId=CVE-2024-39493&packageName=kernel"
			},
			{
				"summary":"CVE-2024-39496",
				"category":"self",
				"url":"https://www.openeuler.org/en/security/cve/detail/?cveId=CVE-2024-39496&packageName=kernel"
			},
			{
				"summary":"CVE-2024-39503",
				"category":"self",
				"url":"https://www.openeuler.org/en/security/cve/detail/?cveId=CVE-2024-39503&packageName=kernel"
			},
			{
				"summary":"CVE-2024-40900",
				"category":"self",
				"url":"https://www.openeuler.org/en/security/cve/detail/?cveId=CVE-2024-40900&packageName=kernel"
			},
			{
				"summary":"CVE-2024-40906",
				"category":"self",
				"url":"https://www.openeuler.org/en/security/cve/detail/?cveId=CVE-2024-40906&packageName=kernel"
			},
			{
				"summary":"CVE-2024-40908",
				"category":"self",
				"url":"https://www.openeuler.org/en/security/cve/detail/?cveId=CVE-2024-40908&packageName=kernel"
			},
			{
				"summary":"CVE-2024-40913",
				"category":"self",
				"url":"https://www.openeuler.org/en/security/cve/detail/?cveId=CVE-2024-40913&packageName=kernel"
			},
			{
				"summary":"CVE-2024-40920",
				"category":"self",
				"url":"https://www.openeuler.org/en/security/cve/detail/?cveId=CVE-2024-40920&packageName=kernel"
			},
			{
				"summary":"CVE-2024-40921",
				"category":"self",
				"url":"https://www.openeuler.org/en/security/cve/detail/?cveId=CVE-2024-40921&packageName=kernel"
			},
			{
				"summary":"CVE-2024-40922",
				"category":"self",
				"url":"https://www.openeuler.org/en/security/cve/detail/?cveId=CVE-2024-40922&packageName=kernel"
			},
			{
				"summary":"CVE-2024-40935",
				"category":"self",
				"url":"https://www.openeuler.org/en/security/cve/detail/?cveId=CVE-2024-40935&packageName=kernel"
			},
			{
				"summary":"CVE-2024-40953",
				"category":"self",
				"url":"https://www.openeuler.org/en/security/cve/detail/?cveId=CVE-2024-40953&packageName=kernel"
			},
			{
				"summary":"CVE-2024-40962",
				"category":"self",
				"url":"https://www.openeuler.org/en/security/cve/detail/?cveId=CVE-2024-40962&packageName=kernel"
			},
			{
				"summary":"CVE-2024-40967",
				"category":"self",
				"url":"https://www.openeuler.org/en/security/cve/detail/?cveId=CVE-2024-40967&packageName=kernel"
			},
			{
				"summary":"CVE-2024-40981",
				"category":"self",
				"url":"https://www.openeuler.org/en/security/cve/detail/?cveId=CVE-2024-40981&packageName=kernel"
			},
			{
				"summary":"CVE-2024-41006",
				"category":"self",
				"url":"https://www.openeuler.org/en/security/cve/detail/?cveId=CVE-2024-41006&packageName=kernel"
			},
			{
				"summary":"CVE-2024-41010",
				"category":"self",
				"url":"https://www.openeuler.org/en/security/cve/detail/?cveId=CVE-2024-41010&packageName=kernel"
			},
			{
				"summary":"CVE-2024-41013",
				"category":"self",
				"url":"https://www.openeuler.org/en/security/cve/detail/?cveId=CVE-2024-41013&packageName=kernel"
			},
			{
				"summary":"CVE-2024-41014",
				"category":"self",
				"url":"https://www.openeuler.org/en/security/cve/detail/?cveId=CVE-2024-41014&packageName=kernel"
			},
			{
				"summary":"CVE-2024-41018",
				"category":"self",
				"url":"https://www.openeuler.org/en/security/cve/detail/?cveId=CVE-2024-41018&packageName=kernel"
			},
			{
				"summary":"CVE-2024-41019",
				"category":"self",
				"url":"https://www.openeuler.org/en/security/cve/detail/?cveId=CVE-2024-41019&packageName=kernel"
			},
			{
				"summary":"CVE-2024-41020",
				"category":"self",
				"url":"https://www.openeuler.org/en/security/cve/detail/?cveId=CVE-2024-41020&packageName=kernel"
			},
			{
				"summary":"CVE-2024-41021",
				"category":"self",
				"url":"https://www.openeuler.org/en/security/cve/detail/?cveId=CVE-2024-41021&packageName=kernel"
			},
			{
				"summary":"CVE-2024-41023",
				"category":"self",
				"url":"https://www.openeuler.org/en/security/cve/detail/?cveId=CVE-2024-41023&packageName=kernel"
			},
			{
				"summary":"CVE-2024-41039",
				"category":"self",
				"url":"https://www.openeuler.org/en/security/cve/detail/?cveId=CVE-2024-41039&packageName=kernel"
			},
			{
				"summary":"CVE-2024-41040",
				"category":"self",
				"url":"https://www.openeuler.org/en/security/cve/detail/?cveId=CVE-2024-41040&packageName=kernel"
			},
			{
				"summary":"CVE-2024-41041",
				"category":"self",
				"url":"https://www.openeuler.org/en/security/cve/detail/?cveId=CVE-2024-41041&packageName=kernel"
			},
			{
				"summary":"CVE-2024-41044",
				"category":"self",
				"url":"https://www.openeuler.org/en/security/cve/detail/?cveId=CVE-2024-41044&packageName=kernel"
			},
			{
				"summary":"CVE-2024-41045",
				"category":"self",
				"url":"https://www.openeuler.org/en/security/cve/detail/?cveId=CVE-2024-41045&packageName=kernel"
			},
			{
				"summary":"CVE-2024-41048",
				"category":"self",
				"url":"https://www.openeuler.org/en/security/cve/detail/?cveId=CVE-2024-41048&packageName=kernel"
			},
			{
				"summary":"CVE-2024-41049",
				"category":"self",
				"url":"https://www.openeuler.org/en/security/cve/detail/?cveId=CVE-2024-41049&packageName=kernel"
			},
			{
				"summary":"CVE-2024-41056",
				"category":"self",
				"url":"https://www.openeuler.org/en/security/cve/detail/?cveId=CVE-2024-41056&packageName=kernel"
			},
			{
				"summary":"CVE-2024-41062",
				"category":"self",
				"url":"https://www.openeuler.org/en/security/cve/detail/?cveId=CVE-2024-41062&packageName=kernel"
			},
			{
				"summary":"CVE-2024-41063",
				"category":"self",
				"url":"https://www.openeuler.org/en/security/cve/detail/?cveId=CVE-2024-41063&packageName=kernel"
			},
			{
				"summary":"CVE-2024-41064",
				"category":"self",
				"url":"https://www.openeuler.org/en/security/cve/detail/?cveId=CVE-2024-41064&packageName=kernel"
			},
			{
				"summary":"CVE-2024-41069",
				"category":"self",
				"url":"https://www.openeuler.org/en/security/cve/detail/?cveId=CVE-2024-41069&packageName=kernel"
			},
			{
				"summary":"CVE-2024-41072",
				"category":"self",
				"url":"https://www.openeuler.org/en/security/cve/detail/?cveId=CVE-2024-41072&packageName=kernel"
			},
			{
				"summary":"CVE-2024-41073",
				"category":"self",
				"url":"https://www.openeuler.org/en/security/cve/detail/?cveId=CVE-2024-41073&packageName=kernel"
			},
			{
				"summary":"CVE-2024-41074",
				"category":"self",
				"url":"https://www.openeuler.org/en/security/cve/detail/?cveId=CVE-2024-41074&packageName=kernel"
			},
			{
				"summary":"CVE-2024-41075",
				"category":"self",
				"url":"https://www.openeuler.org/en/security/cve/detail/?cveId=CVE-2024-41075&packageName=kernel"
			},
			{
				"summary":"CVE-2024-41076",
				"category":"self",
				"url":"https://www.openeuler.org/en/security/cve/detail/?cveId=CVE-2024-41076&packageName=kernel"
			},
			{
				"summary":"CVE-2024-41077",
				"category":"self",
				"url":"https://www.openeuler.org/en/security/cve/detail/?cveId=CVE-2024-41077&packageName=kernel"
			},
			{
				"summary":"CVE-2024-41080",
				"category":"self",
				"url":"https://www.openeuler.org/en/security/cve/detail/?cveId=CVE-2024-41080&packageName=kernel"
			},
			{
				"summary":"CVE-2024-41085",
				"category":"self",
				"url":"https://www.openeuler.org/en/security/cve/detail/?cveId=CVE-2024-41085&packageName=kernel"
			},
			{
				"summary":"CVE-2024-41090",
				"category":"self",
				"url":"https://www.openeuler.org/en/security/cve/detail/?cveId=CVE-2024-41090&packageName=kernel"
			},
			{
				"summary":"CVE-2024-41091",
				"category":"self",
				"url":"https://www.openeuler.org/en/security/cve/detail/?cveId=CVE-2024-41091&packageName=kernel"
			},
			{
				"summary":"CVE-2024-41096",
				"category":"self",
				"url":"https://www.openeuler.org/en/security/cve/detail/?cveId=CVE-2024-41096&packageName=kernel"
			},
			{
				"summary":"CVE-2024-42068",
				"category":"self",
				"url":"https://www.openeuler.org/en/security/cve/detail/?cveId=CVE-2024-42068&packageName=kernel"
			},
			{
				"summary":"CVE-2024-42086",
				"category":"self",
				"url":"https://www.openeuler.org/en/security/cve/detail/?cveId=CVE-2024-42086&packageName=kernel"
			},
			{
				"summary":"CVE-2024-42097",
				"category":"self",
				"url":"https://www.openeuler.org/en/security/cve/detail/?cveId=CVE-2024-42097&packageName=kernel"
			},
			{
				"summary":"CVE-2024-42115",
				"category":"self",
				"url":"https://www.openeuler.org/en/security/cve/detail/?cveId=CVE-2024-42115&packageName=kernel"
			},
			{
				"summary":"CVE-2024-42126",
				"category":"self",
				"url":"https://www.openeuler.org/en/security/cve/detail/?cveId=CVE-2024-42126&packageName=kernel"
			},
			{
				"summary":"CVE-2024-42129",
				"category":"self",
				"url":"https://www.openeuler.org/en/security/cve/detail/?cveId=CVE-2024-42129&packageName=kernel"
			},
			{
				"summary":"CVE-2024-42155",
				"category":"self",
				"url":"https://www.openeuler.org/en/security/cve/detail/?cveId=CVE-2024-42155&packageName=kernel"
			},
			{
				"summary":"CVE-2024-42162",
				"category":"self",
				"url":"https://www.openeuler.org/en/security/cve/detail/?cveId=CVE-2024-42162&packageName=kernel"
			},
			{
				"summary":"CVE-2024-42228",
				"category":"self",
				"url":"https://www.openeuler.org/en/security/cve/detail/?cveId=CVE-2024-42228&packageName=kernel"
			},
			{
				"summary":"nvd cve",
				"category":"external",
				"url":"https://nvd.nist.gov/vuln/detail/CVE-2024-33619"
			},
			{
				"summary":"nvd cve",
				"category":"external",
				"url":"https://nvd.nist.gov/vuln/detail/CVE-2024-35247"
			},
			{
				"summary":"nvd cve",
				"category":"external",
				"url":"https://nvd.nist.gov/vuln/detail/CVE-2024-35848"
			},
			{
				"summary":"nvd cve",
				"category":"external",
				"url":"https://nvd.nist.gov/vuln/detail/CVE-2024-35859"
			},
			{
				"summary":"nvd cve",
				"category":"external",
				"url":"https://nvd.nist.gov/vuln/detail/CVE-2024-35966"
			},
			{
				"summary":"nvd cve",
				"category":"external",
				"url":"https://nvd.nist.gov/vuln/detail/CVE-2024-36890"
			},
			{
				"summary":"nvd cve",
				"category":"external",
				"url":"https://nvd.nist.gov/vuln/detail/CVE-2024-36896"
			},
			{
				"summary":"nvd cve",
				"category":"external",
				"url":"https://nvd.nist.gov/vuln/detail/CVE-2024-36899"
			},
			{
				"summary":"nvd cve",
				"category":"external",
				"url":"https://nvd.nist.gov/vuln/detail/CVE-2024-36901"
			},
			{
				"summary":"nvd cve",
				"category":"external",
				"url":"https://nvd.nist.gov/vuln/detail/CVE-2024-36944"
			},
			{
				"summary":"nvd cve",
				"category":"external",
				"url":"https://nvd.nist.gov/vuln/detail/CVE-2024-36964"
			},
			{
				"summary":"nvd cve",
				"category":"external",
				"url":"https://nvd.nist.gov/vuln/detail/CVE-2024-38556"
			},
			{
				"summary":"nvd cve",
				"category":"external",
				"url":"https://nvd.nist.gov/vuln/detail/CVE-2024-38576"
			},
			{
				"summary":"nvd cve",
				"category":"external",
				"url":"https://nvd.nist.gov/vuln/detail/CVE-2024-38600"
			},
			{
				"summary":"nvd cve",
				"category":"external",
				"url":"https://nvd.nist.gov/vuln/detail/CVE-2024-38606"
			},
			{
				"summary":"nvd cve",
				"category":"external",
				"url":"https://nvd.nist.gov/vuln/detail/CVE-2024-38607"
			},
			{
				"summary":"nvd cve",
				"category":"external",
				"url":"https://nvd.nist.gov/vuln/detail/CVE-2024-38617"
			},
			{
				"summary":"nvd cve",
				"category":"external",
				"url":"https://nvd.nist.gov/vuln/detail/CVE-2024-39471"
			},
			{
				"summary":"nvd cve",
				"category":"external",
				"url":"https://nvd.nist.gov/vuln/detail/CVE-2024-39473"
			},
			{
				"summary":"nvd cve",
				"category":"external",
				"url":"https://nvd.nist.gov/vuln/detail/CVE-2024-39475"
			},
			{
				"summary":"nvd cve",
				"category":"external",
				"url":"https://nvd.nist.gov/vuln/detail/CVE-2024-39481"
			},
			{
				"summary":"nvd cve",
				"category":"external",
				"url":"https://nvd.nist.gov/vuln/detail/CVE-2024-39486"
			},
			{
				"summary":"nvd cve",
				"category":"external",
				"url":"https://nvd.nist.gov/vuln/detail/CVE-2024-39493"
			},
			{
				"summary":"nvd cve",
				"category":"external",
				"url":"https://nvd.nist.gov/vuln/detail/CVE-2024-39496"
			},
			{
				"summary":"nvd cve",
				"category":"external",
				"url":"https://nvd.nist.gov/vuln/detail/CVE-2024-39503"
			},
			{
				"summary":"nvd cve",
				"category":"external",
				"url":"https://nvd.nist.gov/vuln/detail/CVE-2024-40900"
			},
			{
				"summary":"nvd cve",
				"category":"external",
				"url":"https://nvd.nist.gov/vuln/detail/CVE-2024-40906"
			},
			{
				"summary":"nvd cve",
				"category":"external",
				"url":"https://nvd.nist.gov/vuln/detail/CVE-2024-40908"
			},
			{
				"summary":"nvd cve",
				"category":"external",
				"url":"https://nvd.nist.gov/vuln/detail/CVE-2024-40913"
			},
			{
				"summary":"nvd cve",
				"category":"external",
				"url":"https://nvd.nist.gov/vuln/detail/CVE-2024-40920"
			},
			{
				"summary":"nvd cve",
				"category":"external",
				"url":"https://nvd.nist.gov/vuln/detail/CVE-2024-40921"
			},
			{
				"summary":"nvd cve",
				"category":"external",
				"url":"https://nvd.nist.gov/vuln/detail/CVE-2024-40922"
			},
			{
				"summary":"nvd cve",
				"category":"external",
				"url":"https://nvd.nist.gov/vuln/detail/CVE-2024-40935"
			},
			{
				"summary":"nvd cve",
				"category":"external",
				"url":"https://nvd.nist.gov/vuln/detail/CVE-2024-40953"
			},
			{
				"summary":"nvd cve",
				"category":"external",
				"url":"https://nvd.nist.gov/vuln/detail/CVE-2024-40962"
			},
			{
				"summary":"nvd cve",
				"category":"external",
				"url":"https://nvd.nist.gov/vuln/detail/CVE-2024-40967"
			},
			{
				"summary":"nvd cve",
				"category":"external",
				"url":"https://nvd.nist.gov/vuln/detail/CVE-2024-40981"
			},
			{
				"summary":"nvd cve",
				"category":"external",
				"url":"https://nvd.nist.gov/vuln/detail/CVE-2024-41006"
			},
			{
				"summary":"nvd cve",
				"category":"external",
				"url":"https://nvd.nist.gov/vuln/detail/CVE-2024-41010"
			},
			{
				"summary":"nvd cve",
				"category":"external",
				"url":"https://nvd.nist.gov/vuln/detail/CVE-2024-41013"
			},
			{
				"summary":"nvd cve",
				"category":"external",
				"url":"https://nvd.nist.gov/vuln/detail/CVE-2024-41014"
			},
			{
				"summary":"nvd cve",
				"category":"external",
				"url":"https://nvd.nist.gov/vuln/detail/CVE-2024-41018"
			},
			{
				"summary":"nvd cve",
				"category":"external",
				"url":"https://nvd.nist.gov/vuln/detail/CVE-2024-41019"
			},
			{
				"summary":"nvd cve",
				"category":"external",
				"url":"https://nvd.nist.gov/vuln/detail/CVE-2024-41020"
			},
			{
				"summary":"nvd cve",
				"category":"external",
				"url":"https://nvd.nist.gov/vuln/detail/CVE-2024-41021"
			},
			{
				"summary":"nvd cve",
				"category":"external",
				"url":"https://nvd.nist.gov/vuln/detail/CVE-2024-41023"
			},
			{
				"summary":"nvd cve",
				"category":"external",
				"url":"https://nvd.nist.gov/vuln/detail/CVE-2024-41039"
			},
			{
				"summary":"nvd cve",
				"category":"external",
				"url":"https://nvd.nist.gov/vuln/detail/CVE-2024-41040"
			},
			{
				"summary":"nvd cve",
				"category":"external",
				"url":"https://nvd.nist.gov/vuln/detail/CVE-2024-41041"
			},
			{
				"summary":"nvd cve",
				"category":"external",
				"url":"https://nvd.nist.gov/vuln/detail/CVE-2024-41044"
			},
			{
				"summary":"nvd cve",
				"category":"external",
				"url":"https://nvd.nist.gov/vuln/detail/CVE-2024-41045"
			},
			{
				"summary":"nvd cve",
				"category":"external",
				"url":"https://nvd.nist.gov/vuln/detail/CVE-2024-41048"
			},
			{
				"summary":"nvd cve",
				"category":"external",
				"url":"https://nvd.nist.gov/vuln/detail/CVE-2024-41049"
			},
			{
				"summary":"nvd cve",
				"category":"external",
				"url":"https://nvd.nist.gov/vuln/detail/CVE-2024-41056"
			},
			{
				"summary":"nvd cve",
				"category":"external",
				"url":"https://nvd.nist.gov/vuln/detail/CVE-2024-41062"
			},
			{
				"summary":"nvd cve",
				"category":"external",
				"url":"https://nvd.nist.gov/vuln/detail/CVE-2024-41063"
			},
			{
				"summary":"nvd cve",
				"category":"external",
				"url":"https://nvd.nist.gov/vuln/detail/CVE-2024-41064"
			},
			{
				"summary":"nvd cve",
				"category":"external",
				"url":"https://nvd.nist.gov/vuln/detail/CVE-2024-41069"
			},
			{
				"summary":"nvd cve",
				"category":"external",
				"url":"https://nvd.nist.gov/vuln/detail/CVE-2024-41072"
			},
			{
				"summary":"nvd cve",
				"category":"external",
				"url":"https://nvd.nist.gov/vuln/detail/CVE-2024-41073"
			},
			{
				"summary":"nvd cve",
				"category":"external",
				"url":"https://nvd.nist.gov/vuln/detail/CVE-2024-41074"
			},
			{
				"summary":"nvd cve",
				"category":"external",
				"url":"https://nvd.nist.gov/vuln/detail/CVE-2024-41075"
			},
			{
				"summary":"nvd cve",
				"category":"external",
				"url":"https://nvd.nist.gov/vuln/detail/CVE-2024-41076"
			},
			{
				"summary":"nvd cve",
				"category":"external",
				"url":"https://nvd.nist.gov/vuln/detail/CVE-2024-41077"
			},
			{
				"summary":"nvd cve",
				"category":"external",
				"url":"https://nvd.nist.gov/vuln/detail/CVE-2024-41080"
			},
			{
				"summary":"nvd cve",
				"category":"external",
				"url":"https://nvd.nist.gov/vuln/detail/CVE-2024-41085"
			},
			{
				"summary":"nvd cve",
				"category":"external",
				"url":"https://nvd.nist.gov/vuln/detail/CVE-2024-41090"
			},
			{
				"summary":"nvd cve",
				"category":"external",
				"url":"https://nvd.nist.gov/vuln/detail/CVE-2024-41091"
			},
			{
				"summary":"nvd cve",
				"category":"external",
				"url":"https://nvd.nist.gov/vuln/detail/CVE-2024-41096"
			},
			{
				"summary":"nvd cve",
				"category":"external",
				"url":"https://nvd.nist.gov/vuln/detail/CVE-2024-42068"
			},
			{
				"summary":"nvd cve",
				"category":"external",
				"url":"https://nvd.nist.gov/vuln/detail/CVE-2024-42086"
			},
			{
				"summary":"nvd cve",
				"category":"external",
				"url":"https://nvd.nist.gov/vuln/detail/CVE-2024-42097"
			},
			{
				"summary":"nvd cve",
				"category":"external",
				"url":"https://nvd.nist.gov/vuln/detail/CVE-2024-42115"
			},
			{
				"summary":"nvd cve",
				"category":"external",
				"url":"https://nvd.nist.gov/vuln/detail/CVE-2024-42126"
			},
			{
				"summary":"nvd cve",
				"category":"external",
				"url":"https://nvd.nist.gov/vuln/detail/CVE-2024-42129"
			},
			{
				"summary":"nvd cve",
				"category":"external",
				"url":"https://nvd.nist.gov/vuln/detail/CVE-2024-42155"
			},
			{
				"summary":"nvd cve",
				"category":"external",
				"url":"https://nvd.nist.gov/vuln/detail/CVE-2024-42162"
			},
			{
				"summary":"nvd cve",
				"category":"external",
				"url":"https://nvd.nist.gov/vuln/detail/CVE-2024-42228"
			},
			{
				"summary":"openEuler-SA-2024-1960 vex file",
				"category":"self",
				"url":"https://repo.openeuler.org/security/data/csaf/advisories/2024/csaf-openeuler-sa-2024-1960.json"
			}
		],
		"title":"An update for kernel is now available for openEuler-24.03-LTS",
		"tracking":{
			"initial_release_date":"2024-08-09T21:03:11+08:00",
			"revision_history":[
				{
					"date":"2024-08-09T21:03:11+08:00",
					"summary":"Initial",
					"number":"1.0.0"
				},
				{
					"date":"2024-08-13T10:03:00+08:00",
					"summary":"Current version",
					"number":"2.0.0"
				},
				{
					"date":"2024-08-19T17:36:01+08:00",
					"summary":"final",
					"number":"3.0.0"
				}
			],
			"generator":{
				"date":"2024-08-19T17:36:01+08:00",
				"engine":{
					"name":"openEuler CSAF Tool V1.0"
				}
			},
			"current_release_date":"2024-08-19T17:36:01+08:00",
			"id":"openEuler-SA-2024-1960",
			"version":"3.0.0",
			"status":"final"
		}
	},
	"product_tree":{
		"branches":[
			{
				"name":"openEuler",
				"category":"vendor",
				"branches":[
					{
						"name":"openEuler",
						"branches":[
							{
								"product":{
									"product_identification_helper":{
										"cpe":"cpe:/a:openEuler:openEuler:24.03-LTS"
									},
									"product_id":"openEuler-24.03-LTS",
									"name":"openEuler-24.03-LTS"
								},
								"name":"openEuler-24.03-LTS",
								"category":"product_version"
							}
						],
						"category":"product_name"
					},
					{
						"name":"aarch64",
						"branches":[
							{
								"product":{
									"product_identification_helper":{
										"cpe":"cpe:/a:openEuler:openEuler:24.03-LTS"
									},
									"product_id":"bpftool-6.6.0-37.0.0.44.oe2403.aarch64.rpm",
									"name":"bpftool-6.6.0-37.0.0.44.oe2403.aarch64.rpm"
								},
								"name":"bpftool-6.6.0-37.0.0.44.oe2403.aarch64.rpm",
								"category":"product_version"
							},
							{
								"product":{
									"product_identification_helper":{
										"cpe":"cpe:/a:openEuler:openEuler:24.03-LTS"
									},
									"product_id":"bpftool-debuginfo-6.6.0-37.0.0.44.oe2403.aarch64.rpm",
									"name":"bpftool-debuginfo-6.6.0-37.0.0.44.oe2403.aarch64.rpm"
								},
								"name":"bpftool-debuginfo-6.6.0-37.0.0.44.oe2403.aarch64.rpm",
								"category":"product_version"
							},
							{
								"product":{
									"product_identification_helper":{
										"cpe":"cpe:/a:openEuler:openEuler:24.03-LTS"
									},
									"product_id":"kernel-6.6.0-37.0.0.44.oe2403.aarch64.rpm",
									"name":"kernel-6.6.0-37.0.0.44.oe2403.aarch64.rpm"
								},
								"name":"kernel-6.6.0-37.0.0.44.oe2403.aarch64.rpm",
								"category":"product_version"
							},
							{
								"product":{
									"product_identification_helper":{
										"cpe":"cpe:/a:openEuler:openEuler:24.03-LTS"
									},
									"product_id":"kernel-debuginfo-6.6.0-37.0.0.44.oe2403.aarch64.rpm",
									"name":"kernel-debuginfo-6.6.0-37.0.0.44.oe2403.aarch64.rpm"
								},
								"name":"kernel-debuginfo-6.6.0-37.0.0.44.oe2403.aarch64.rpm",
								"category":"product_version"
							},
							{
								"product":{
									"product_identification_helper":{
										"cpe":"cpe:/a:openEuler:openEuler:24.03-LTS"
									},
									"product_id":"kernel-debugsource-6.6.0-37.0.0.44.oe2403.aarch64.rpm",
									"name":"kernel-debugsource-6.6.0-37.0.0.44.oe2403.aarch64.rpm"
								},
								"name":"kernel-debugsource-6.6.0-37.0.0.44.oe2403.aarch64.rpm",
								"category":"product_version"
							},
							{
								"product":{
									"product_identification_helper":{
										"cpe":"cpe:/a:openEuler:openEuler:24.03-LTS"
									},
									"product_id":"kernel-devel-6.6.0-37.0.0.44.oe2403.aarch64.rpm",
									"name":"kernel-devel-6.6.0-37.0.0.44.oe2403.aarch64.rpm"
								},
								"name":"kernel-devel-6.6.0-37.0.0.44.oe2403.aarch64.rpm",
								"category":"product_version"
							},
							{
								"product":{
									"product_identification_helper":{
										"cpe":"cpe:/a:openEuler:openEuler:24.03-LTS"
									},
									"product_id":"kernel-headers-6.6.0-37.0.0.44.oe2403.aarch64.rpm",
									"name":"kernel-headers-6.6.0-37.0.0.44.oe2403.aarch64.rpm"
								},
								"name":"kernel-headers-6.6.0-37.0.0.44.oe2403.aarch64.rpm",
								"category":"product_version"
							},
							{
								"product":{
									"product_identification_helper":{
										"cpe":"cpe:/a:openEuler:openEuler:24.03-LTS"
									},
									"product_id":"kernel-source-6.6.0-37.0.0.44.oe2403.aarch64.rpm",
									"name":"kernel-source-6.6.0-37.0.0.44.oe2403.aarch64.rpm"
								},
								"name":"kernel-source-6.6.0-37.0.0.44.oe2403.aarch64.rpm",
								"category":"product_version"
							},
							{
								"product":{
									"product_identification_helper":{
										"cpe":"cpe:/a:openEuler:openEuler:24.03-LTS"
									},
									"product_id":"kernel-tools-6.6.0-37.0.0.44.oe2403.aarch64.rpm",
									"name":"kernel-tools-6.6.0-37.0.0.44.oe2403.aarch64.rpm"
								},
								"name":"kernel-tools-6.6.0-37.0.0.44.oe2403.aarch64.rpm",
								"category":"product_version"
							},
							{
								"product":{
									"product_identification_helper":{
										"cpe":"cpe:/a:openEuler:openEuler:24.03-LTS"
									},
									"product_id":"kernel-tools-debuginfo-6.6.0-37.0.0.44.oe2403.aarch64.rpm",
									"name":"kernel-tools-debuginfo-6.6.0-37.0.0.44.oe2403.aarch64.rpm"
								},
								"name":"kernel-tools-debuginfo-6.6.0-37.0.0.44.oe2403.aarch64.rpm",
								"category":"product_version"
							},
							{
								"product":{
									"product_identification_helper":{
										"cpe":"cpe:/a:openEuler:openEuler:24.03-LTS"
									},
									"product_id":"kernel-tools-devel-6.6.0-37.0.0.44.oe2403.aarch64.rpm",
									"name":"kernel-tools-devel-6.6.0-37.0.0.44.oe2403.aarch64.rpm"
								},
								"name":"kernel-tools-devel-6.6.0-37.0.0.44.oe2403.aarch64.rpm",
								"category":"product_version"
							},
							{
								"product":{
									"product_identification_helper":{
										"cpe":"cpe:/a:openEuler:openEuler:24.03-LTS"
									},
									"product_id":"perf-6.6.0-37.0.0.44.oe2403.aarch64.rpm",
									"name":"perf-6.6.0-37.0.0.44.oe2403.aarch64.rpm"
								},
								"name":"perf-6.6.0-37.0.0.44.oe2403.aarch64.rpm",
								"category":"product_version"
							},
							{
								"product":{
									"product_identification_helper":{
										"cpe":"cpe:/a:openEuler:openEuler:24.03-LTS"
									},
									"product_id":"perf-debuginfo-6.6.0-37.0.0.44.oe2403.aarch64.rpm",
									"name":"perf-debuginfo-6.6.0-37.0.0.44.oe2403.aarch64.rpm"
								},
								"name":"perf-debuginfo-6.6.0-37.0.0.44.oe2403.aarch64.rpm",
								"category":"product_version"
							},
							{
								"product":{
									"product_identification_helper":{
										"cpe":"cpe:/a:openEuler:openEuler:24.03-LTS"
									},
									"product_id":"python3-perf-6.6.0-37.0.0.44.oe2403.aarch64.rpm",
									"name":"python3-perf-6.6.0-37.0.0.44.oe2403.aarch64.rpm"
								},
								"name":"python3-perf-6.6.0-37.0.0.44.oe2403.aarch64.rpm",
								"category":"product_version"
							},
							{
								"product":{
									"product_identification_helper":{
										"cpe":"cpe:/a:openEuler:openEuler:24.03-LTS"
									},
									"product_id":"python3-perf-debuginfo-6.6.0-37.0.0.44.oe2403.aarch64.rpm",
									"name":"python3-perf-debuginfo-6.6.0-37.0.0.44.oe2403.aarch64.rpm"
								},
								"name":"python3-perf-debuginfo-6.6.0-37.0.0.44.oe2403.aarch64.rpm",
								"category":"product_version"
							}
						],
						"category":"architecture"
					},
					{
						"name":"x86_64",
						"branches":[
							{
								"product":{
									"product_identification_helper":{
										"cpe":"cpe:/a:openEuler:openEuler:24.03-LTS"
									},
									"product_id":"bpftool-6.6.0-37.0.0.44.oe2403.x86_64.rpm",
									"name":"bpftool-6.6.0-37.0.0.44.oe2403.x86_64.rpm"
								},
								"name":"bpftool-6.6.0-37.0.0.44.oe2403.x86_64.rpm",
								"category":"product_version"
							},
							{
								"product":{
									"product_identification_helper":{
										"cpe":"cpe:/a:openEuler:openEuler:24.03-LTS"
									},
									"product_id":"bpftool-debuginfo-6.6.0-37.0.0.44.oe2403.x86_64.rpm",
									"name":"bpftool-debuginfo-6.6.0-37.0.0.44.oe2403.x86_64.rpm"
								},
								"name":"bpftool-debuginfo-6.6.0-37.0.0.44.oe2403.x86_64.rpm",
								"category":"product_version"
							},
							{
								"product":{
									"product_identification_helper":{
										"cpe":"cpe:/a:openEuler:openEuler:24.03-LTS"
									},
									"product_id":"kernel-6.6.0-37.0.0.44.oe2403.x86_64.rpm",
									"name":"kernel-6.6.0-37.0.0.44.oe2403.x86_64.rpm"
								},
								"name":"kernel-6.6.0-37.0.0.44.oe2403.x86_64.rpm",
								"category":"product_version"
							},
							{
								"product":{
									"product_identification_helper":{
										"cpe":"cpe:/a:openEuler:openEuler:24.03-LTS"
									},
									"product_id":"kernel-debuginfo-6.6.0-37.0.0.44.oe2403.x86_64.rpm",
									"name":"kernel-debuginfo-6.6.0-37.0.0.44.oe2403.x86_64.rpm"
								},
								"name":"kernel-debuginfo-6.6.0-37.0.0.44.oe2403.x86_64.rpm",
								"category":"product_version"
							},
							{
								"product":{
									"product_identification_helper":{
										"cpe":"cpe:/a:openEuler:openEuler:24.03-LTS"
									},
									"product_id":"kernel-debugsource-6.6.0-37.0.0.44.oe2403.x86_64.rpm",
									"name":"kernel-debugsource-6.6.0-37.0.0.44.oe2403.x86_64.rpm"
								},
								"name":"kernel-debugsource-6.6.0-37.0.0.44.oe2403.x86_64.rpm",
								"category":"product_version"
							},
							{
								"product":{
									"product_identification_helper":{
										"cpe":"cpe:/a:openEuler:openEuler:24.03-LTS"
									},
									"product_id":"kernel-devel-6.6.0-37.0.0.44.oe2403.x86_64.rpm",
									"name":"kernel-devel-6.6.0-37.0.0.44.oe2403.x86_64.rpm"
								},
								"name":"kernel-devel-6.6.0-37.0.0.44.oe2403.x86_64.rpm",
								"category":"product_version"
							},
							{
								"product":{
									"product_identification_helper":{
										"cpe":"cpe:/a:openEuler:openEuler:24.03-LTS"
									},
									"product_id":"kernel-headers-6.6.0-37.0.0.44.oe2403.x86_64.rpm",
									"name":"kernel-headers-6.6.0-37.0.0.44.oe2403.x86_64.rpm"
								},
								"name":"kernel-headers-6.6.0-37.0.0.44.oe2403.x86_64.rpm",
								"category":"product_version"
							},
							{
								"product":{
									"product_identification_helper":{
										"cpe":"cpe:/a:openEuler:openEuler:24.03-LTS"
									},
									"product_id":"kernel-source-6.6.0-37.0.0.44.oe2403.x86_64.rpm",
									"name":"kernel-source-6.6.0-37.0.0.44.oe2403.x86_64.rpm"
								},
								"name":"kernel-source-6.6.0-37.0.0.44.oe2403.x86_64.rpm",
								"category":"product_version"
							},
							{
								"product":{
									"product_identification_helper":{
										"cpe":"cpe:/a:openEuler:openEuler:24.03-LTS"
									},
									"product_id":"kernel-tools-6.6.0-37.0.0.44.oe2403.x86_64.rpm",
									"name":"kernel-tools-6.6.0-37.0.0.44.oe2403.x86_64.rpm"
								},
								"name":"kernel-tools-6.6.0-37.0.0.44.oe2403.x86_64.rpm",
								"category":"product_version"
							},
							{
								"product":{
									"product_identification_helper":{
										"cpe":"cpe:/a:openEuler:openEuler:24.03-LTS"
									},
									"product_id":"kernel-tools-debuginfo-6.6.0-37.0.0.44.oe2403.x86_64.rpm",
									"name":"kernel-tools-debuginfo-6.6.0-37.0.0.44.oe2403.x86_64.rpm"
								},
								"name":"kernel-tools-debuginfo-6.6.0-37.0.0.44.oe2403.x86_64.rpm",
								"category":"product_version"
							},
							{
								"product":{
									"product_identification_helper":{
										"cpe":"cpe:/a:openEuler:openEuler:24.03-LTS"
									},
									"product_id":"kernel-tools-devel-6.6.0-37.0.0.44.oe2403.x86_64.rpm",
									"name":"kernel-tools-devel-6.6.0-37.0.0.44.oe2403.x86_64.rpm"
								},
								"name":"kernel-tools-devel-6.6.0-37.0.0.44.oe2403.x86_64.rpm",
								"category":"product_version"
							},
							{
								"product":{
									"product_identification_helper":{
										"cpe":"cpe:/a:openEuler:openEuler:24.03-LTS"
									},
									"product_id":"perf-6.6.0-37.0.0.44.oe2403.x86_64.rpm",
									"name":"perf-6.6.0-37.0.0.44.oe2403.x86_64.rpm"
								},
								"name":"perf-6.6.0-37.0.0.44.oe2403.x86_64.rpm",
								"category":"product_version"
							},
							{
								"product":{
									"product_identification_helper":{
										"cpe":"cpe:/a:openEuler:openEuler:24.03-LTS"
									},
									"product_id":"perf-debuginfo-6.6.0-37.0.0.44.oe2403.x86_64.rpm",
									"name":"perf-debuginfo-6.6.0-37.0.0.44.oe2403.x86_64.rpm"
								},
								"name":"perf-debuginfo-6.6.0-37.0.0.44.oe2403.x86_64.rpm",
								"category":"product_version"
							},
							{
								"product":{
									"product_identification_helper":{
										"cpe":"cpe:/a:openEuler:openEuler:24.03-LTS"
									},
									"product_id":"python3-perf-6.6.0-37.0.0.44.oe2403.x86_64.rpm",
									"name":"python3-perf-6.6.0-37.0.0.44.oe2403.x86_64.rpm"
								},
								"name":"python3-perf-6.6.0-37.0.0.44.oe2403.x86_64.rpm",
								"category":"product_version"
							},
							{
								"product":{
									"product_identification_helper":{
										"cpe":"cpe:/a:openEuler:openEuler:24.03-LTS"
									},
									"product_id":"python3-perf-debuginfo-6.6.0-37.0.0.44.oe2403.x86_64.rpm",
									"name":"python3-perf-debuginfo-6.6.0-37.0.0.44.oe2403.x86_64.rpm"
								},
								"name":"python3-perf-debuginfo-6.6.0-37.0.0.44.oe2403.x86_64.rpm",
								"category":"product_version"
							}
						],
						"category":"architecture"
					},
					{
						"name":"src",
						"branches":[
							{
								"product":{
									"product_identification_helper":{
										"cpe":"cpe:/a:openEuler:openEuler:24.03-LTS"
									},
									"product_id":"kernel-6.6.0-37.0.0.44.oe2403.src.rpm",
									"name":"kernel-6.6.0-37.0.0.44.oe2403.src.rpm"
								},
								"name":"kernel-6.6.0-37.0.0.44.oe2403.src.rpm",
								"category":"product_version"
							}
						],
						"category":"architecture"
					}
				]
			}
		],
		"relationships":[
			{
				"relates_to_product_reference":"openEuler-24.03-LTS",
				"product_reference":"bpftool-6.6.0-37.0.0.44.oe2403.aarch64.rpm",
				"full_product_name":{
					"product_id":"openEuler-24.03-LTS:bpftool-6.6.0-37.0.0.44.oe2403.aarch64",
					"name":"bpftool-6.6.0-37.0.0.44.oe2403.aarch64 as a component of openEuler-24.03-LTS"
				},
				"category":"default_component_of"
			},
			{
				"relates_to_product_reference":"openEuler-24.03-LTS",
				"product_reference":"bpftool-debuginfo-6.6.0-37.0.0.44.oe2403.aarch64.rpm",
				"full_product_name":{
					"product_id":"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-37.0.0.44.oe2403.aarch64",
					"name":"bpftool-debuginfo-6.6.0-37.0.0.44.oe2403.aarch64 as a component of openEuler-24.03-LTS"
				},
				"category":"default_component_of"
			},
			{
				"relates_to_product_reference":"openEuler-24.03-LTS",
				"product_reference":"kernel-6.6.0-37.0.0.44.oe2403.aarch64.rpm",
				"full_product_name":{
					"product_id":"openEuler-24.03-LTS:kernel-6.6.0-37.0.0.44.oe2403.aarch64",
					"name":"kernel-6.6.0-37.0.0.44.oe2403.aarch64 as a component of openEuler-24.03-LTS"
				},
				"category":"default_component_of"
			},
			{
				"relates_to_product_reference":"openEuler-24.03-LTS",
				"product_reference":"kernel-debuginfo-6.6.0-37.0.0.44.oe2403.aarch64.rpm",
				"full_product_name":{
					"product_id":"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-37.0.0.44.oe2403.aarch64",
					"name":"kernel-debuginfo-6.6.0-37.0.0.44.oe2403.aarch64 as a component of openEuler-24.03-LTS"
				},
				"category":"default_component_of"
			},
			{
				"relates_to_product_reference":"openEuler-24.03-LTS",
				"product_reference":"kernel-debugsource-6.6.0-37.0.0.44.oe2403.aarch64.rpm",
				"full_product_name":{
					"product_id":"openEuler-24.03-LTS:kernel-debugsource-6.6.0-37.0.0.44.oe2403.aarch64",
					"name":"kernel-debugsource-6.6.0-37.0.0.44.oe2403.aarch64 as a component of openEuler-24.03-LTS"
				},
				"category":"default_component_of"
			},
			{
				"relates_to_product_reference":"openEuler-24.03-LTS",
				"product_reference":"kernel-devel-6.6.0-37.0.0.44.oe2403.aarch64.rpm",
				"full_product_name":{
					"product_id":"openEuler-24.03-LTS:kernel-devel-6.6.0-37.0.0.44.oe2403.aarch64",
					"name":"kernel-devel-6.6.0-37.0.0.44.oe2403.aarch64 as a component of openEuler-24.03-LTS"
				},
				"category":"default_component_of"
			},
			{
				"relates_to_product_reference":"openEuler-24.03-LTS",
				"product_reference":"kernel-headers-6.6.0-37.0.0.44.oe2403.aarch64.rpm",
				"full_product_name":{
					"product_id":"openEuler-24.03-LTS:kernel-headers-6.6.0-37.0.0.44.oe2403.aarch64",
					"name":"kernel-headers-6.6.0-37.0.0.44.oe2403.aarch64 as a component of openEuler-24.03-LTS"
				},
				"category":"default_component_of"
			},
			{
				"relates_to_product_reference":"openEuler-24.03-LTS",
				"product_reference":"kernel-source-6.6.0-37.0.0.44.oe2403.aarch64.rpm",
				"full_product_name":{
					"product_id":"openEuler-24.03-LTS:kernel-source-6.6.0-37.0.0.44.oe2403.aarch64",
					"name":"kernel-source-6.6.0-37.0.0.44.oe2403.aarch64 as a component of openEuler-24.03-LTS"
				},
				"category":"default_component_of"
			},
			{
				"relates_to_product_reference":"openEuler-24.03-LTS",
				"product_reference":"kernel-tools-6.6.0-37.0.0.44.oe2403.aarch64.rpm",
				"full_product_name":{
					"product_id":"openEuler-24.03-LTS:kernel-tools-6.6.0-37.0.0.44.oe2403.aarch64",
					"name":"kernel-tools-6.6.0-37.0.0.44.oe2403.aarch64 as a component of openEuler-24.03-LTS"
				},
				"category":"default_component_of"
			},
			{
				"relates_to_product_reference":"openEuler-24.03-LTS",
				"product_reference":"kernel-tools-debuginfo-6.6.0-37.0.0.44.oe2403.aarch64.rpm",
				"full_product_name":{
					"product_id":"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-37.0.0.44.oe2403.aarch64",
					"name":"kernel-tools-debuginfo-6.6.0-37.0.0.44.oe2403.aarch64 as a component of openEuler-24.03-LTS"
				},
				"category":"default_component_of"
			},
			{
				"relates_to_product_reference":"openEuler-24.03-LTS",
				"product_reference":"kernel-tools-devel-6.6.0-37.0.0.44.oe2403.aarch64.rpm",
				"full_product_name":{
					"product_id":"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-37.0.0.44.oe2403.aarch64",
					"name":"kernel-tools-devel-6.6.0-37.0.0.44.oe2403.aarch64 as a component of openEuler-24.03-LTS"
				},
				"category":"default_component_of"
			},
			{
				"relates_to_product_reference":"openEuler-24.03-LTS",
				"product_reference":"perf-6.6.0-37.0.0.44.oe2403.aarch64.rpm",
				"full_product_name":{
					"product_id":"openEuler-24.03-LTS:perf-6.6.0-37.0.0.44.oe2403.aarch64",
					"name":"perf-6.6.0-37.0.0.44.oe2403.aarch64 as a component of openEuler-24.03-LTS"
				},
				"category":"default_component_of"
			},
			{
				"relates_to_product_reference":"openEuler-24.03-LTS",
				"product_reference":"perf-debuginfo-6.6.0-37.0.0.44.oe2403.aarch64.rpm",
				"full_product_name":{
					"product_id":"openEuler-24.03-LTS:perf-debuginfo-6.6.0-37.0.0.44.oe2403.aarch64",
					"name":"perf-debuginfo-6.6.0-37.0.0.44.oe2403.aarch64 as a component of openEuler-24.03-LTS"
				},
				"category":"default_component_of"
			},
			{
				"relates_to_product_reference":"openEuler-24.03-LTS",
				"product_reference":"python3-perf-6.6.0-37.0.0.44.oe2403.aarch64.rpm",
				"full_product_name":{
					"product_id":"openEuler-24.03-LTS:python3-perf-6.6.0-37.0.0.44.oe2403.aarch64",
					"name":"python3-perf-6.6.0-37.0.0.44.oe2403.aarch64 as a component of openEuler-24.03-LTS"
				},
				"category":"default_component_of"
			},
			{
				"relates_to_product_reference":"openEuler-24.03-LTS",
				"product_reference":"python3-perf-debuginfo-6.6.0-37.0.0.44.oe2403.aarch64.rpm",
				"full_product_name":{
					"product_id":"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-37.0.0.44.oe2403.aarch64",
					"name":"python3-perf-debuginfo-6.6.0-37.0.0.44.oe2403.aarch64 as a component of openEuler-24.03-LTS"
				},
				"category":"default_component_of"
			},
			{
				"relates_to_product_reference":"openEuler-24.03-LTS",
				"product_reference":"bpftool-6.6.0-37.0.0.44.oe2403.x86_64.rpm",
				"full_product_name":{
					"product_id":"openEuler-24.03-LTS:bpftool-6.6.0-37.0.0.44.oe2403.x86_64",
					"name":"bpftool-6.6.0-37.0.0.44.oe2403.x86_64 as a component of openEuler-24.03-LTS"
				},
				"category":"default_component_of"
			},
			{
				"relates_to_product_reference":"openEuler-24.03-LTS",
				"product_reference":"bpftool-debuginfo-6.6.0-37.0.0.44.oe2403.x86_64.rpm",
				"full_product_name":{
					"product_id":"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-37.0.0.44.oe2403.x86_64",
					"name":"bpftool-debuginfo-6.6.0-37.0.0.44.oe2403.x86_64 as a component of openEuler-24.03-LTS"
				},
				"category":"default_component_of"
			},
			{
				"relates_to_product_reference":"openEuler-24.03-LTS",
				"product_reference":"kernel-6.6.0-37.0.0.44.oe2403.x86_64.rpm",
				"full_product_name":{
					"product_id":"openEuler-24.03-LTS:kernel-6.6.0-37.0.0.44.oe2403.x86_64",
					"name":"kernel-6.6.0-37.0.0.44.oe2403.x86_64 as a component of openEuler-24.03-LTS"
				},
				"category":"default_component_of"
			},
			{
				"relates_to_product_reference":"openEuler-24.03-LTS",
				"product_reference":"kernel-debuginfo-6.6.0-37.0.0.44.oe2403.x86_64.rpm",
				"full_product_name":{
					"product_id":"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-37.0.0.44.oe2403.x86_64",
					"name":"kernel-debuginfo-6.6.0-37.0.0.44.oe2403.x86_64 as a component of openEuler-24.03-LTS"
				},
				"category":"default_component_of"
			},
			{
				"relates_to_product_reference":"openEuler-24.03-LTS",
				"product_reference":"kernel-debugsource-6.6.0-37.0.0.44.oe2403.x86_64.rpm",
				"full_product_name":{
					"product_id":"openEuler-24.03-LTS:kernel-debugsource-6.6.0-37.0.0.44.oe2403.x86_64",
					"name":"kernel-debugsource-6.6.0-37.0.0.44.oe2403.x86_64 as a component of openEuler-24.03-LTS"
				},
				"category":"default_component_of"
			},
			{
				"relates_to_product_reference":"openEuler-24.03-LTS",
				"product_reference":"kernel-devel-6.6.0-37.0.0.44.oe2403.x86_64.rpm",
				"full_product_name":{
					"product_id":"openEuler-24.03-LTS:kernel-devel-6.6.0-37.0.0.44.oe2403.x86_64",
					"name":"kernel-devel-6.6.0-37.0.0.44.oe2403.x86_64 as a component of openEuler-24.03-LTS"
				},
				"category":"default_component_of"
			},
			{
				"relates_to_product_reference":"openEuler-24.03-LTS",
				"product_reference":"kernel-headers-6.6.0-37.0.0.44.oe2403.x86_64.rpm",
				"full_product_name":{
					"product_id":"openEuler-24.03-LTS:kernel-headers-6.6.0-37.0.0.44.oe2403.x86_64",
					"name":"kernel-headers-6.6.0-37.0.0.44.oe2403.x86_64 as a component of openEuler-24.03-LTS"
				},
				"category":"default_component_of"
			},
			{
				"relates_to_product_reference":"openEuler-24.03-LTS",
				"product_reference":"kernel-source-6.6.0-37.0.0.44.oe2403.x86_64.rpm",
				"full_product_name":{
					"product_id":"openEuler-24.03-LTS:kernel-source-6.6.0-37.0.0.44.oe2403.x86_64",
					"name":"kernel-source-6.6.0-37.0.0.44.oe2403.x86_64 as a component of openEuler-24.03-LTS"
				},
				"category":"default_component_of"
			},
			{
				"relates_to_product_reference":"openEuler-24.03-LTS",
				"product_reference":"kernel-tools-6.6.0-37.0.0.44.oe2403.x86_64.rpm",
				"full_product_name":{
					"product_id":"openEuler-24.03-LTS:kernel-tools-6.6.0-37.0.0.44.oe2403.x86_64",
					"name":"kernel-tools-6.6.0-37.0.0.44.oe2403.x86_64 as a component of openEuler-24.03-LTS"
				},
				"category":"default_component_of"
			},
			{
				"relates_to_product_reference":"openEuler-24.03-LTS",
				"product_reference":"kernel-tools-debuginfo-6.6.0-37.0.0.44.oe2403.x86_64.rpm",
				"full_product_name":{
					"product_id":"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-37.0.0.44.oe2403.x86_64",
					"name":"kernel-tools-debuginfo-6.6.0-37.0.0.44.oe2403.x86_64 as a component of openEuler-24.03-LTS"
				},
				"category":"default_component_of"
			},
			{
				"relates_to_product_reference":"openEuler-24.03-LTS",
				"product_reference":"kernel-tools-devel-6.6.0-37.0.0.44.oe2403.x86_64.rpm",
				"full_product_name":{
					"product_id":"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-37.0.0.44.oe2403.x86_64",
					"name":"kernel-tools-devel-6.6.0-37.0.0.44.oe2403.x86_64 as a component of openEuler-24.03-LTS"
				},
				"category":"default_component_of"
			},
			{
				"relates_to_product_reference":"openEuler-24.03-LTS",
				"product_reference":"perf-6.6.0-37.0.0.44.oe2403.x86_64.rpm",
				"full_product_name":{
					"product_id":"openEuler-24.03-LTS:perf-6.6.0-37.0.0.44.oe2403.x86_64",
					"name":"perf-6.6.0-37.0.0.44.oe2403.x86_64 as a component of openEuler-24.03-LTS"
				},
				"category":"default_component_of"
			},
			{
				"relates_to_product_reference":"openEuler-24.03-LTS",
				"product_reference":"perf-debuginfo-6.6.0-37.0.0.44.oe2403.x86_64.rpm",
				"full_product_name":{
					"product_id":"openEuler-24.03-LTS:perf-debuginfo-6.6.0-37.0.0.44.oe2403.x86_64",
					"name":"perf-debuginfo-6.6.0-37.0.0.44.oe2403.x86_64 as a component of openEuler-24.03-LTS"
				},
				"category":"default_component_of"
			},
			{
				"relates_to_product_reference":"openEuler-24.03-LTS",
				"product_reference":"python3-perf-6.6.0-37.0.0.44.oe2403.x86_64.rpm",
				"full_product_name":{
					"product_id":"openEuler-24.03-LTS:python3-perf-6.6.0-37.0.0.44.oe2403.x86_64",
					"name":"python3-perf-6.6.0-37.0.0.44.oe2403.x86_64 as a component of openEuler-24.03-LTS"
				},
				"category":"default_component_of"
			},
			{
				"relates_to_product_reference":"openEuler-24.03-LTS",
				"product_reference":"python3-perf-debuginfo-6.6.0-37.0.0.44.oe2403.x86_64.rpm",
				"full_product_name":{
					"product_id":"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-37.0.0.44.oe2403.x86_64",
					"name":"python3-perf-debuginfo-6.6.0-37.0.0.44.oe2403.x86_64 as a component of openEuler-24.03-LTS"
				},
				"category":"default_component_of"
			},
			{
				"relates_to_product_reference":"openEuler-24.03-LTS",
				"product_reference":"kernel-6.6.0-37.0.0.44.oe2403.src.rpm",
				"full_product_name":{
					"product_id":"openEuler-24.03-LTS:kernel-6.6.0-37.0.0.44.oe2403.src",
					"name":"kernel-6.6.0-37.0.0.44.oe2403.src as a component of openEuler-24.03-LTS"
				},
				"category":"default_component_of"
			}
		]
	},
	"vulnerabilities":[
		{
			"cve":"CVE-2024-33619",
			"notes":[
				{
					"text":"In the Linux kernel, the following vulnerability has been resolved:\n\nefi: libstub: only free priv.runtime_map when allocated\n\npriv.runtime_map is only allocated when efi_novamap is not set.\nOtherwise, it is an uninitialized value.  In the error path, it is freed\nunconditionally.  Avoid passing an uninitialized value to free_pool.\nFree priv.runtime_map only when it was allocated.\n\nThis bug was discovered and resolved using Coverity Static Analysis\nSecurity Testing (SAST) by Synopsys, Inc.",
					"category":"description",
					"title":"Vulnerability Description"
				}
			],
			"product_status":{
				"fixed":[
					"openEuler-24.03-LTS:bpftool-6.6.0-37.0.0.44.oe2403.aarch64",
					"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-37.0.0.44.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-6.6.0-37.0.0.44.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-37.0.0.44.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-debugsource-6.6.0-37.0.0.44.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-devel-6.6.0-37.0.0.44.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-headers-6.6.0-37.0.0.44.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-source-6.6.0-37.0.0.44.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-tools-6.6.0-37.0.0.44.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-37.0.0.44.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-37.0.0.44.oe2403.aarch64",
					"openEuler-24.03-LTS:perf-6.6.0-37.0.0.44.oe2403.aarch64",
					"openEuler-24.03-LTS:perf-debuginfo-6.6.0-37.0.0.44.oe2403.aarch64",
					"openEuler-24.03-LTS:python3-perf-6.6.0-37.0.0.44.oe2403.aarch64",
					"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-37.0.0.44.oe2403.aarch64",
					"openEuler-24.03-LTS:bpftool-6.6.0-37.0.0.44.oe2403.x86_64",
					"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-37.0.0.44.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-6.6.0-37.0.0.44.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-37.0.0.44.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-debugsource-6.6.0-37.0.0.44.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-devel-6.6.0-37.0.0.44.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-headers-6.6.0-37.0.0.44.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-source-6.6.0-37.0.0.44.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-tools-6.6.0-37.0.0.44.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-37.0.0.44.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-37.0.0.44.oe2403.x86_64",
					"openEuler-24.03-LTS:perf-6.6.0-37.0.0.44.oe2403.x86_64",
					"openEuler-24.03-LTS:perf-debuginfo-6.6.0-37.0.0.44.oe2403.x86_64",
					"openEuler-24.03-LTS:python3-perf-6.6.0-37.0.0.44.oe2403.x86_64",
					"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-37.0.0.44.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-6.6.0-37.0.0.44.oe2403.src"
				]
			},
			"remediations":[
				{
					"product_ids":[
						"openEuler-24.03-LTS:bpftool-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-6.6.0-37.0.0.44.oe2403.src"
					],
					"details":"kernel security update",
					"category":"vendor_fix",
					"url":"https://www.openeuler.org/zh/security/security-bulletins/detail/?id=openEuler-SA-2024-1960"
				}
			],
			"scores":[
				{
					"cvss_v3":{
						"baseSeverity":"MEDIUM",
						"baseScore":4.4,
						"vectorString":"CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
						"version":"3.1"
					},
					"products":[
						"openEuler-24.03-LTS:bpftool-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-6.6.0-37.0.0.44.oe2403.src"
					]
				}
			],
			"threats":[
				{
					"details":"Medium",
					"category":"impact"
				}
			],
			"title":"CVE-2024-33619"
		},
		{
			"cve":"CVE-2024-35247",
			"notes":[
				{
					"text":"In the Linux kernel, the following vulnerability has been resolved:\n\nfpga: region: add owner module and take its refcount\n\nThe current implementation of the fpga region assumes that the low-level\nmodule registers a driver for the parent device and uses its owner pointer\nto take the module's refcount. This approach is problematic since it can\nlead to a null pointer dereference while attempting to get the region\nduring programming if the parent device does not have a driver.\n\nTo address this problem, add a module owner pointer to the fpga_region\nstruct and use it to take the module's refcount. Modify the functions for\nregistering a region to take an additional owner module parameter and\nrename them to avoid conflicts. Use the old function names for helper\nmacros that automatically set the module that registers the region as the\nowner. This ensures compatibility with existing low-level control modules\nand reduces the chances of registering a region without setting the owner.\n\nAlso, update the documentation to keep it consistent with the new interface\nfor registering an fpga region.",
					"category":"description",
					"title":"Vulnerability Description"
				}
			],
			"product_status":{
				"fixed":[
					"openEuler-24.03-LTS:bpftool-6.6.0-37.0.0.44.oe2403.aarch64",
					"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-37.0.0.44.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-6.6.0-37.0.0.44.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-37.0.0.44.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-debugsource-6.6.0-37.0.0.44.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-devel-6.6.0-37.0.0.44.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-headers-6.6.0-37.0.0.44.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-source-6.6.0-37.0.0.44.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-tools-6.6.0-37.0.0.44.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-37.0.0.44.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-37.0.0.44.oe2403.aarch64",
					"openEuler-24.03-LTS:perf-6.6.0-37.0.0.44.oe2403.aarch64",
					"openEuler-24.03-LTS:perf-debuginfo-6.6.0-37.0.0.44.oe2403.aarch64",
					"openEuler-24.03-LTS:python3-perf-6.6.0-37.0.0.44.oe2403.aarch64",
					"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-37.0.0.44.oe2403.aarch64",
					"openEuler-24.03-LTS:bpftool-6.6.0-37.0.0.44.oe2403.x86_64",
					"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-37.0.0.44.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-6.6.0-37.0.0.44.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-37.0.0.44.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-debugsource-6.6.0-37.0.0.44.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-devel-6.6.0-37.0.0.44.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-headers-6.6.0-37.0.0.44.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-source-6.6.0-37.0.0.44.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-tools-6.6.0-37.0.0.44.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-37.0.0.44.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-37.0.0.44.oe2403.x86_64",
					"openEuler-24.03-LTS:perf-6.6.0-37.0.0.44.oe2403.x86_64",
					"openEuler-24.03-LTS:perf-debuginfo-6.6.0-37.0.0.44.oe2403.x86_64",
					"openEuler-24.03-LTS:python3-perf-6.6.0-37.0.0.44.oe2403.x86_64",
					"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-37.0.0.44.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-6.6.0-37.0.0.44.oe2403.src"
				]
			},
			"remediations":[
				{
					"product_ids":[
						"openEuler-24.03-LTS:bpftool-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-6.6.0-37.0.0.44.oe2403.src"
					],
					"details":"kernel security update",
					"category":"vendor_fix",
					"url":"https://www.openeuler.org/zh/security/security-bulletins/detail/?id=openEuler-SA-2024-1960"
				}
			],
			"scores":[
				{
					"cvss_v3":{
						"baseSeverity":"LOW",
						"baseScore":3.9,
						"vectorString":"CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:L/I:L/A:L",
						"version":"3.1"
					},
					"products":[
						"openEuler-24.03-LTS:bpftool-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-6.6.0-37.0.0.44.oe2403.src"
					]
				}
			],
			"threats":[
				{
					"details":"Low",
					"category":"impact"
				}
			],
			"title":"CVE-2024-35247"
		},
		{
			"cve":"CVE-2024-35848",
			"notes":[
				{
					"text":"In the Linux kernel, the following vulnerability has been resolved:\n\neeprom: at24: fix memory corruption race condition\n\nIf the eeprom is not accessible, an nvmem device will be registered, the\nread will fail, and the device will be torn down. If another driver\naccesses the nvmem device after the teardown, it will reference\ninvalid memory.\n\nMove the failure point before registering the nvmem device.",
					"category":"description",
					"title":"Vulnerability Description"
				}
			],
			"product_status":{
				"fixed":[
					"openEuler-24.03-LTS:bpftool-6.6.0-37.0.0.44.oe2403.aarch64",
					"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-37.0.0.44.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-6.6.0-37.0.0.44.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-37.0.0.44.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-debugsource-6.6.0-37.0.0.44.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-devel-6.6.0-37.0.0.44.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-headers-6.6.0-37.0.0.44.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-source-6.6.0-37.0.0.44.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-tools-6.6.0-37.0.0.44.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-37.0.0.44.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-37.0.0.44.oe2403.aarch64",
					"openEuler-24.03-LTS:perf-6.6.0-37.0.0.44.oe2403.aarch64",
					"openEuler-24.03-LTS:perf-debuginfo-6.6.0-37.0.0.44.oe2403.aarch64",
					"openEuler-24.03-LTS:python3-perf-6.6.0-37.0.0.44.oe2403.aarch64",
					"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-37.0.0.44.oe2403.aarch64",
					"openEuler-24.03-LTS:bpftool-6.6.0-37.0.0.44.oe2403.x86_64",
					"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-37.0.0.44.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-6.6.0-37.0.0.44.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-37.0.0.44.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-debugsource-6.6.0-37.0.0.44.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-devel-6.6.0-37.0.0.44.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-headers-6.6.0-37.0.0.44.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-source-6.6.0-37.0.0.44.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-tools-6.6.0-37.0.0.44.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-37.0.0.44.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-37.0.0.44.oe2403.x86_64",
					"openEuler-24.03-LTS:perf-6.6.0-37.0.0.44.oe2403.x86_64",
					"openEuler-24.03-LTS:perf-debuginfo-6.6.0-37.0.0.44.oe2403.x86_64",
					"openEuler-24.03-LTS:python3-perf-6.6.0-37.0.0.44.oe2403.x86_64",
					"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-37.0.0.44.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-6.6.0-37.0.0.44.oe2403.src"
				]
			},
			"remediations":[
				{
					"product_ids":[
						"openEuler-24.03-LTS:bpftool-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-6.6.0-37.0.0.44.oe2403.src"
					],
					"details":"kernel security update",
					"category":"vendor_fix",
					"url":"https://www.openeuler.org/zh/security/security-bulletins/detail/?id=openEuler-SA-2024-1960"
				}
			],
			"scores":[
				{
					"cvss_v3":{
						"baseSeverity":"MEDIUM",
						"baseScore":5.5,
						"vectorString":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
						"version":"3.1"
					},
					"products":[
						"openEuler-24.03-LTS:bpftool-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-6.6.0-37.0.0.44.oe2403.src"
					]
				}
			],
			"threats":[
				{
					"details":"Medium",
					"category":"impact"
				}
			],
			"title":"CVE-2024-35848"
		},
		{
			"cve":"CVE-2024-35859",
			"notes":[
				{
					"text":"In the Linux kernel, the following vulnerability has been resolved:\n\nblock: fix module reference leakage from bdev_open_by_dev error path\n\nAt the time bdev_may_open() is called, module reference is grabbed\nalready, hence module reference should be released if bdev_may_open()\nfailed.\n\nThis problem is found by code review.",
					"category":"description",
					"title":"Vulnerability Description"
				}
			],
			"product_status":{
				"fixed":[
					"openEuler-24.03-LTS:bpftool-6.6.0-37.0.0.44.oe2403.aarch64",
					"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-37.0.0.44.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-6.6.0-37.0.0.44.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-37.0.0.44.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-debugsource-6.6.0-37.0.0.44.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-devel-6.6.0-37.0.0.44.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-headers-6.6.0-37.0.0.44.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-source-6.6.0-37.0.0.44.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-tools-6.6.0-37.0.0.44.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-37.0.0.44.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-37.0.0.44.oe2403.aarch64",
					"openEuler-24.03-LTS:perf-6.6.0-37.0.0.44.oe2403.aarch64",
					"openEuler-24.03-LTS:perf-debuginfo-6.6.0-37.0.0.44.oe2403.aarch64",
					"openEuler-24.03-LTS:python3-perf-6.6.0-37.0.0.44.oe2403.aarch64",
					"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-37.0.0.44.oe2403.aarch64",
					"openEuler-24.03-LTS:bpftool-6.6.0-37.0.0.44.oe2403.x86_64",
					"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-37.0.0.44.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-6.6.0-37.0.0.44.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-37.0.0.44.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-debugsource-6.6.0-37.0.0.44.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-devel-6.6.0-37.0.0.44.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-headers-6.6.0-37.0.0.44.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-source-6.6.0-37.0.0.44.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-tools-6.6.0-37.0.0.44.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-37.0.0.44.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-37.0.0.44.oe2403.x86_64",
					"openEuler-24.03-LTS:perf-6.6.0-37.0.0.44.oe2403.x86_64",
					"openEuler-24.03-LTS:perf-debuginfo-6.6.0-37.0.0.44.oe2403.x86_64",
					"openEuler-24.03-LTS:python3-perf-6.6.0-37.0.0.44.oe2403.x86_64",
					"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-37.0.0.44.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-6.6.0-37.0.0.44.oe2403.src"
				]
			},
			"remediations":[
				{
					"product_ids":[
						"openEuler-24.03-LTS:bpftool-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-6.6.0-37.0.0.44.oe2403.src"
					],
					"details":"kernel security update",
					"category":"vendor_fix",
					"url":"https://www.openeuler.org/zh/security/security-bulletins/detail/?id=openEuler-SA-2024-1960"
				}
			],
			"scores":[
				{
					"cvss_v3":{
						"baseSeverity":"MEDIUM",
						"baseScore":5.5,
						"vectorString":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
						"version":"3.1"
					},
					"products":[
						"openEuler-24.03-LTS:bpftool-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-6.6.0-37.0.0.44.oe2403.src"
					]
				}
			],
			"threats":[
				{
					"details":"Medium",
					"category":"impact"
				}
			],
			"title":"CVE-2024-35859"
		},
		{
			"cve":"CVE-2024-35966",
			"notes":[
				{
					"text":"In the Linux kernel, the following vulnerability has been resolved:\n\nBluetooth: RFCOMM: Fix not validating setsockopt user input\n\nsyzbot reported rfcomm_sock_setsockopt_old() is copying data without\nchecking user input length.\n\nBUG: KASAN: slab-out-of-bounds in copy_from_sockptr_offset\ninclude/linux/sockptr.h:49 [inline]\nBUG: KASAN: slab-out-of-bounds in copy_from_sockptr\ninclude/linux/sockptr.h:55 [inline]\nBUG: KASAN: slab-out-of-bounds in rfcomm_sock_setsockopt_old\nnet/bluetooth/rfcomm/sock.c:632 [inline]\nBUG: KASAN: slab-out-of-bounds in rfcomm_sock_setsockopt+0x893/0xa70\nnet/bluetooth/rfcomm/sock.c:673\nRead of size 4 at addr ffff8880209a8bc3 by task syz-executor632/5064",
					"category":"description",
					"title":"Vulnerability Description"
				}
			],
			"product_status":{
				"fixed":[
					"openEuler-24.03-LTS:bpftool-6.6.0-37.0.0.44.oe2403.aarch64",
					"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-37.0.0.44.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-6.6.0-37.0.0.44.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-37.0.0.44.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-debugsource-6.6.0-37.0.0.44.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-devel-6.6.0-37.0.0.44.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-headers-6.6.0-37.0.0.44.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-source-6.6.0-37.0.0.44.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-tools-6.6.0-37.0.0.44.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-37.0.0.44.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-37.0.0.44.oe2403.aarch64",
					"openEuler-24.03-LTS:perf-6.6.0-37.0.0.44.oe2403.aarch64",
					"openEuler-24.03-LTS:perf-debuginfo-6.6.0-37.0.0.44.oe2403.aarch64",
					"openEuler-24.03-LTS:python3-perf-6.6.0-37.0.0.44.oe2403.aarch64",
					"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-37.0.0.44.oe2403.aarch64",
					"openEuler-24.03-LTS:bpftool-6.6.0-37.0.0.44.oe2403.x86_64",
					"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-37.0.0.44.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-6.6.0-37.0.0.44.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-37.0.0.44.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-debugsource-6.6.0-37.0.0.44.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-devel-6.6.0-37.0.0.44.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-headers-6.6.0-37.0.0.44.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-source-6.6.0-37.0.0.44.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-tools-6.6.0-37.0.0.44.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-37.0.0.44.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-37.0.0.44.oe2403.x86_64",
					"openEuler-24.03-LTS:perf-6.6.0-37.0.0.44.oe2403.x86_64",
					"openEuler-24.03-LTS:perf-debuginfo-6.6.0-37.0.0.44.oe2403.x86_64",
					"openEuler-24.03-LTS:python3-perf-6.6.0-37.0.0.44.oe2403.x86_64",
					"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-37.0.0.44.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-6.6.0-37.0.0.44.oe2403.src"
				]
			},
			"remediations":[
				{
					"product_ids":[
						"openEuler-24.03-LTS:bpftool-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-6.6.0-37.0.0.44.oe2403.src"
					],
					"details":"kernel security update",
					"category":"vendor_fix",
					"url":"https://www.openeuler.org/zh/security/security-bulletins/detail/?id=openEuler-SA-2024-1960"
				}
			],
			"scores":[
				{
					"cvss_v3":{
						"baseSeverity":"MEDIUM",
						"baseScore":5.5,
						"vectorString":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
						"version":"3.1"
					},
					"products":[
						"openEuler-24.03-LTS:bpftool-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-6.6.0-37.0.0.44.oe2403.src"
					]
				}
			],
			"threats":[
				{
					"details":"Medium",
					"category":"impact"
				}
			],
			"title":"CVE-2024-35966"
		},
		{
			"cve":"CVE-2024-36890",
			"notes":[
				{
					"text":"In the Linux kernel, the following vulnerability has been resolved:\n\nmm/slab: make __free(kfree) accept error pointers\n\nCurrently, if an automatically freed allocation is an error pointer that\nwill lead to a crash.  An example of this is in wm831x_gpio_dbg_show().\n\n   171\tchar *label __free(kfree) = gpiochip_dup_line_label(chip, i);\n   172\tif (IS_ERR(label)) {\n   173\t\tdev_err(wm831x->dev, \"Failed to duplicate label\\n\");\n   174\t\tcontinue;\n   175  }\n\nThe auto clean up function should check for error pointers as well,\notherwise we're going to keep hitting issues like this.",
					"category":"description",
					"title":"Vulnerability Description"
				}
			],
			"product_status":{
				"fixed":[
					"openEuler-24.03-LTS:bpftool-6.6.0-37.0.0.44.oe2403.aarch64",
					"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-37.0.0.44.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-6.6.0-37.0.0.44.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-37.0.0.44.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-debugsource-6.6.0-37.0.0.44.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-devel-6.6.0-37.0.0.44.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-headers-6.6.0-37.0.0.44.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-source-6.6.0-37.0.0.44.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-tools-6.6.0-37.0.0.44.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-37.0.0.44.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-37.0.0.44.oe2403.aarch64",
					"openEuler-24.03-LTS:perf-6.6.0-37.0.0.44.oe2403.aarch64",
					"openEuler-24.03-LTS:perf-debuginfo-6.6.0-37.0.0.44.oe2403.aarch64",
					"openEuler-24.03-LTS:python3-perf-6.6.0-37.0.0.44.oe2403.aarch64",
					"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-37.0.0.44.oe2403.aarch64",
					"openEuler-24.03-LTS:bpftool-6.6.0-37.0.0.44.oe2403.x86_64",
					"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-37.0.0.44.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-6.6.0-37.0.0.44.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-37.0.0.44.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-debugsource-6.6.0-37.0.0.44.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-devel-6.6.0-37.0.0.44.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-headers-6.6.0-37.0.0.44.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-source-6.6.0-37.0.0.44.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-tools-6.6.0-37.0.0.44.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-37.0.0.44.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-37.0.0.44.oe2403.x86_64",
					"openEuler-24.03-LTS:perf-6.6.0-37.0.0.44.oe2403.x86_64",
					"openEuler-24.03-LTS:perf-debuginfo-6.6.0-37.0.0.44.oe2403.x86_64",
					"openEuler-24.03-LTS:python3-perf-6.6.0-37.0.0.44.oe2403.x86_64",
					"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-37.0.0.44.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-6.6.0-37.0.0.44.oe2403.src"
				]
			},
			"remediations":[
				{
					"product_ids":[
						"openEuler-24.03-LTS:bpftool-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-6.6.0-37.0.0.44.oe2403.src"
					],
					"details":"kernel security update",
					"category":"vendor_fix",
					"url":"https://www.openeuler.org/zh/security/security-bulletins/detail/?id=openEuler-SA-2024-1960"
				}
			],
			"scores":[
				{
					"cvss_v3":{
						"baseSeverity":"LOW",
						"baseScore":3.9,
						"vectorString":"CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:L/I:L/A:L",
						"version":"3.1"
					},
					"products":[
						"openEuler-24.03-LTS:bpftool-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-6.6.0-37.0.0.44.oe2403.src"
					]
				}
			],
			"threats":[
				{
					"details":"Low",
					"category":"impact"
				}
			],
			"title":"CVE-2024-36890"
		},
		{
			"cve":"CVE-2024-36896",
			"notes":[
				{
					"text":"In the Linux kernel, the following vulnerability has been resolved:USB: core: Fix access violation during port device removalTesting with KASAN and syzkaller revealed a bug in port.c:disable_store():usb_hub_to_struct_hub() can return NULL if the hub that the port belongs tois concurrently removed, but the function does not check for thispossibility before dereferencing the returned value.It turns out that the first dereference is unnecessary, since hub->intfdevis the parent of the port device, so it can be changed easily.  Adding acheck for hub == NULL prevents further problems.The same bug exists in the disable_show() routine, and it can be fixed thesame way.",
					"category":"description",
					"title":"Vulnerability Description"
				}
			],
			"product_status":{
				"fixed":[
					"openEuler-24.03-LTS:bpftool-6.6.0-37.0.0.44.oe2403.aarch64",
					"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-37.0.0.44.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-6.6.0-37.0.0.44.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-37.0.0.44.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-debugsource-6.6.0-37.0.0.44.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-devel-6.6.0-37.0.0.44.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-headers-6.6.0-37.0.0.44.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-source-6.6.0-37.0.0.44.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-tools-6.6.0-37.0.0.44.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-37.0.0.44.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-37.0.0.44.oe2403.aarch64",
					"openEuler-24.03-LTS:perf-6.6.0-37.0.0.44.oe2403.aarch64",
					"openEuler-24.03-LTS:perf-debuginfo-6.6.0-37.0.0.44.oe2403.aarch64",
					"openEuler-24.03-LTS:python3-perf-6.6.0-37.0.0.44.oe2403.aarch64",
					"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-37.0.0.44.oe2403.aarch64",
					"openEuler-24.03-LTS:bpftool-6.6.0-37.0.0.44.oe2403.x86_64",
					"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-37.0.0.44.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-6.6.0-37.0.0.44.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-37.0.0.44.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-debugsource-6.6.0-37.0.0.44.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-devel-6.6.0-37.0.0.44.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-headers-6.6.0-37.0.0.44.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-source-6.6.0-37.0.0.44.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-tools-6.6.0-37.0.0.44.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-37.0.0.44.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-37.0.0.44.oe2403.x86_64",
					"openEuler-24.03-LTS:perf-6.6.0-37.0.0.44.oe2403.x86_64",
					"openEuler-24.03-LTS:perf-debuginfo-6.6.0-37.0.0.44.oe2403.x86_64",
					"openEuler-24.03-LTS:python3-perf-6.6.0-37.0.0.44.oe2403.x86_64",
					"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-37.0.0.44.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-6.6.0-37.0.0.44.oe2403.src"
				]
			},
			"remediations":[
				{
					"product_ids":[
						"openEuler-24.03-LTS:bpftool-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-6.6.0-37.0.0.44.oe2403.src"
					],
					"details":"kernel security update",
					"category":"vendor_fix",
					"url":"https://www.openeuler.org/zh/security/security-bulletins/detail/?id=openEuler-SA-2024-1960"
				}
			],
			"scores":[
				{
					"cvss_v3":{
						"baseSeverity":"CRITICAL",
						"baseScore":9.1,
						"vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:H",
						"version":"3.1"
					},
					"products":[
						"openEuler-24.03-LTS:bpftool-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-6.6.0-37.0.0.44.oe2403.src"
					]
				}
			],
			"threats":[
				{
					"details":"Critical",
					"category":"impact"
				}
			],
			"title":"CVE-2024-36896"
		},
		{
			"cve":"CVE-2024-36899",
			"notes":[
				{
					"text":"In the Linux kernel, the following vulnerability has been resolved:\n\ngpiolib: cdev: Fix use after free in lineinfo_changed_notify\n\nThe use-after-free issue occurs as follows: when the GPIO chip device file\nis being closed by invoking gpio_chrdev_release(), watched_lines is freed\nby bitmap_free(), but the unregistration of lineinfo_changed_nb notifier\nchain failed due to waiting write rwsem. Additionally, one of the GPIO\nchip's lines is also in the release process and holds the notifier chain's\nread rwsem. Consequently, a race condition leads to the use-after-free of\nwatched_lines.\n\nHere is the typical stack when issue happened:\n\n[free]\ngpio_chrdev_release()\n  --> bitmap_free(cdev->watched_lines)                  <-- freed\n  --> blocking_notifier_chain_unregister()\n    --> down_write(&nh->rwsem)                          <-- waiting rwsem\n          --> __down_write_common()\n            --> rwsem_down_write_slowpath()\n                  --> schedule_preempt_disabled()\n                    --> schedule()\n\n[use]\nst54spi_gpio_dev_release()\n  --> gpio_free()\n    --> gpiod_free()\n      --> gpiod_free_commit()\n        --> gpiod_line_state_notify()\n          --> blocking_notifier_call_chain()\n            --> down_read(&nh->rwsem);                  <-- held rwsem\n            --> notifier_call_chain()\n              --> lineinfo_changed_notify()\n                --> test_bit(xxxx, cdev->watched_lines) <-- use after free\n\nThe side effect of the use-after-free issue is that a GPIO line event is\nbeing generated for userspace where it shouldn't. However, since the chrdev\nis being closed, userspace won't have the chance to read that event anyway.\n\nTo fix the issue, call the bitmap_free() function after the unregistration\nof lineinfo_changed_nb notifier chain.",
					"category":"description",
					"title":"Vulnerability Description"
				}
			],
			"product_status":{
				"fixed":[
					"openEuler-24.03-LTS:bpftool-6.6.0-37.0.0.44.oe2403.aarch64",
					"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-37.0.0.44.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-6.6.0-37.0.0.44.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-37.0.0.44.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-debugsource-6.6.0-37.0.0.44.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-devel-6.6.0-37.0.0.44.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-headers-6.6.0-37.0.0.44.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-source-6.6.0-37.0.0.44.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-tools-6.6.0-37.0.0.44.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-37.0.0.44.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-37.0.0.44.oe2403.aarch64",
					"openEuler-24.03-LTS:perf-6.6.0-37.0.0.44.oe2403.aarch64",
					"openEuler-24.03-LTS:perf-debuginfo-6.6.0-37.0.0.44.oe2403.aarch64",
					"openEuler-24.03-LTS:python3-perf-6.6.0-37.0.0.44.oe2403.aarch64",
					"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-37.0.0.44.oe2403.aarch64",
					"openEuler-24.03-LTS:bpftool-6.6.0-37.0.0.44.oe2403.x86_64",
					"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-37.0.0.44.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-6.6.0-37.0.0.44.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-37.0.0.44.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-debugsource-6.6.0-37.0.0.44.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-devel-6.6.0-37.0.0.44.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-headers-6.6.0-37.0.0.44.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-source-6.6.0-37.0.0.44.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-tools-6.6.0-37.0.0.44.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-37.0.0.44.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-37.0.0.44.oe2403.x86_64",
					"openEuler-24.03-LTS:perf-6.6.0-37.0.0.44.oe2403.x86_64",
					"openEuler-24.03-LTS:perf-debuginfo-6.6.0-37.0.0.44.oe2403.x86_64",
					"openEuler-24.03-LTS:python3-perf-6.6.0-37.0.0.44.oe2403.x86_64",
					"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-37.0.0.44.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-6.6.0-37.0.0.44.oe2403.src"
				]
			},
			"remediations":[
				{
					"product_ids":[
						"openEuler-24.03-LTS:bpftool-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-6.6.0-37.0.0.44.oe2403.src"
					],
					"details":"kernel security update",
					"category":"vendor_fix",
					"url":"https://www.openeuler.org/zh/security/security-bulletins/detail/?id=openEuler-SA-2024-1960"
				}
			],
			"scores":[
				{
					"cvss_v3":{
						"baseSeverity":"HIGH",
						"baseScore":7,
						"vectorString":"CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
						"version":"3.1"
					},
					"products":[
						"openEuler-24.03-LTS:bpftool-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-6.6.0-37.0.0.44.oe2403.src"
					]
				}
			],
			"threats":[
				{
					"details":"High",
					"category":"impact"
				}
			],
			"title":"CVE-2024-36899"
		},
		{
			"cve":"CVE-2024-36901",
			"notes":[
				{
					"text":"In the Linux kernel, the following vulnerability has been resolved:ipv6: prevent NULL dereference in ip6_output()According to syzbot, there is a chance that ip6_dst_idev()returns NULL in ip6_output(). Most places in IPv6 stackdeal with a NULL idev just fine, but not here.syzbot reported:general protection fault, probably for non-canonical address 0xdffffc00000000bc: 0000 [#1] PREEMPT SMP KASAN PTIKASAN: null-ptr-deref in range [0x00000000000005e0-0x00000000000005e7]CPU: 0 PID: 9775 Comm: syz-executor.4 Not tainted 6.9.0-rc5-syzkaller-00157-g6a30653b604a #0Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 03/27/2024 RIP: 0010:ip6_output+0x231/0x3f0 net/ipv6/ip6_output.c:237Code: 3c 1e 00 49 89 df 74 08 4c 89 ef e8 19 58 db f7 48 8b 44 24 20 49 89 45 00 49 89 c5 48 8d 9d e0 05 00 00 48 89 d8 48 c1 e8 03 <42> 0f b6 04 38 84 c0 4c 8b 74 24 28 0f 85 61 01 00 00 8b 1b 31 ffRSP: 0018:ffffc9000927f0d8 EFLAGS: 00010202RAX: 00000000000000bc RBX: 00000000000005e0 RCX: 0000000000040000RDX: ffffc900131f9000 RSI: 0000000000004f47 RDI: 0000000000004f48RBP: 0000000000000000 R08: ffffffff8a1f0b9a R09: 1ffffffff1f51fadR10: dffffc0000000000 R11: fffffbfff1f51fae R12: ffff8880293ec8c0R13: ffff88805d7fc000 R14: 1ffff1100527d91a R15: dffffc0000000000FS:  00007f135c6856c0(0000) GS:ffff8880b9400000(0000) knlGS:0000000000000000CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033CR2: 0000000020000080 CR3: 0000000064096000 CR4: 00000000003506f0DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400Call Trace: <TASK>  NF_HOOK include/linux/netfilter.h:314 [inline]  ip6_xmit+0xefe/0x17f0 net/ipv6/ip6_output.c:358  sctp_v6_xmit+0x9f2/0x13f0 net/sctp/ipv6.c:248  sctp_packet_transmit+0x26ad/0x2ca0 net/sctp/output.c:653  sctp_packet_singleton+0x22c/0x320 net/sctp/outqueue.c:783  sctp_outq_flush_ctrl net/sctp/outqueue.c:914 [inline]  sctp_outq_flush+0x6d5/0x3e20 net/sctp/outqueue.c:1212  sctp_side_effects net/sctp/sm_sideeffect.c:1198 [inline]  sctp_do_sm+0x59cc/0x60c0 net/sctp/sm_sideeffect.c:1169  sctp_primitive_ASSOCIATE+0x95/0xc0 net/sctp/primitive.c:73  __sctp_connect+0x9cd/0xe30 net/sctp/socket.c:1234  sctp_connect net/sctp/socket.c:4819 [inline]  sctp_inet_connect+0x149/0x1f0 net/sctp/socket.c:4834  __sys_connect_file net/socket.c:2048 [inline]  __sys_connect+0x2df/0x310 net/socket.c:2065  __do_sys_connect net/socket.c:2075 [inline]  __se_sys_connect net/socket.c:2072 [inline]  __x64_sys_connect+0x7a/0x90 net/socket.c:2072  do_syscall_x64 arch/x86/entry/common.c:52 [inline]  do_syscall_64+0xf5/0x240 arch/x86/entry/common.c:83 entry_SYSCALL_64_after_hwframe+0x77/0x7f",
					"category":"description",
					"title":"Vulnerability Description"
				}
			],
			"product_status":{
				"fixed":[
					"openEuler-24.03-LTS:bpftool-6.6.0-37.0.0.44.oe2403.aarch64",
					"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-37.0.0.44.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-6.6.0-37.0.0.44.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-37.0.0.44.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-debugsource-6.6.0-37.0.0.44.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-devel-6.6.0-37.0.0.44.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-headers-6.6.0-37.0.0.44.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-source-6.6.0-37.0.0.44.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-tools-6.6.0-37.0.0.44.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-37.0.0.44.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-37.0.0.44.oe2403.aarch64",
					"openEuler-24.03-LTS:perf-6.6.0-37.0.0.44.oe2403.aarch64",
					"openEuler-24.03-LTS:perf-debuginfo-6.6.0-37.0.0.44.oe2403.aarch64",
					"openEuler-24.03-LTS:python3-perf-6.6.0-37.0.0.44.oe2403.aarch64",
					"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-37.0.0.44.oe2403.aarch64",
					"openEuler-24.03-LTS:bpftool-6.6.0-37.0.0.44.oe2403.x86_64",
					"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-37.0.0.44.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-6.6.0-37.0.0.44.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-37.0.0.44.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-debugsource-6.6.0-37.0.0.44.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-devel-6.6.0-37.0.0.44.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-headers-6.6.0-37.0.0.44.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-source-6.6.0-37.0.0.44.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-tools-6.6.0-37.0.0.44.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-37.0.0.44.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-37.0.0.44.oe2403.x86_64",
					"openEuler-24.03-LTS:perf-6.6.0-37.0.0.44.oe2403.x86_64",
					"openEuler-24.03-LTS:perf-debuginfo-6.6.0-37.0.0.44.oe2403.x86_64",
					"openEuler-24.03-LTS:python3-perf-6.6.0-37.0.0.44.oe2403.x86_64",
					"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-37.0.0.44.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-6.6.0-37.0.0.44.oe2403.src"
				]
			},
			"remediations":[
				{
					"product_ids":[
						"openEuler-24.03-LTS:bpftool-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-6.6.0-37.0.0.44.oe2403.src"
					],
					"details":"kernel security update",
					"category":"vendor_fix",
					"url":"https://www.openeuler.org/zh/security/security-bulletins/detail/?id=openEuler-SA-2024-1960"
				}
			],
			"scores":[
				{
					"cvss_v3":{
						"baseSeverity":"MEDIUM",
						"baseScore":5.5,
						"vectorString":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
						"version":"3.1"
					},
					"products":[
						"openEuler-24.03-LTS:bpftool-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-6.6.0-37.0.0.44.oe2403.src"
					]
				}
			],
			"threats":[
				{
					"details":"Medium",
					"category":"impact"
				}
			],
			"title":"CVE-2024-36901"
		},
		{
			"cve":"CVE-2024-36944",
			"notes":[
				{
					"text":"In the Linux kernel, the following vulnerability has been resolved:\n\nReapply \"drm/qxl: simplify qxl_fence_wait\"\n\nThis reverts commit 07ed11afb68d94eadd4ffc082b97c2331307c5ea.\n\nStephen Rostedt reports:\n \"I went to run my tests on my VMs and the tests hung on boot up.\n  Unfortunately, the most I ever got out was:\n\n  [   93.607888] Testing event system initcall: OK\n  [   93.667730] Running tests on all trace events:\n  [   93.669757] Testing all events: OK\n  [   95.631064] ------------[ cut here ]------------\n  Timed out after 60 seconds\"\n\nand further debugging points to a possible circular locking dependency\nbetween the console_owner locking and the worker pool locking.\n\nReverting the commit allows Steve's VM to boot to completion again.\n\n[ This may obviously result in the \"[TTM] Buffer eviction failed\"\n  messages again, which was the reason for that original revert. But at\n  this point this seems preferable to a non-booting system... ]",
					"category":"description",
					"title":"Vulnerability Description"
				}
			],
			"product_status":{
				"fixed":[
					"openEuler-24.03-LTS:bpftool-6.6.0-37.0.0.44.oe2403.aarch64",
					"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-37.0.0.44.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-6.6.0-37.0.0.44.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-37.0.0.44.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-debugsource-6.6.0-37.0.0.44.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-devel-6.6.0-37.0.0.44.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-headers-6.6.0-37.0.0.44.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-source-6.6.0-37.0.0.44.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-tools-6.6.0-37.0.0.44.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-37.0.0.44.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-37.0.0.44.oe2403.aarch64",
					"openEuler-24.03-LTS:perf-6.6.0-37.0.0.44.oe2403.aarch64",
					"openEuler-24.03-LTS:perf-debuginfo-6.6.0-37.0.0.44.oe2403.aarch64",
					"openEuler-24.03-LTS:python3-perf-6.6.0-37.0.0.44.oe2403.aarch64",
					"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-37.0.0.44.oe2403.aarch64",
					"openEuler-24.03-LTS:bpftool-6.6.0-37.0.0.44.oe2403.x86_64",
					"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-37.0.0.44.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-6.6.0-37.0.0.44.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-37.0.0.44.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-debugsource-6.6.0-37.0.0.44.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-devel-6.6.0-37.0.0.44.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-headers-6.6.0-37.0.0.44.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-source-6.6.0-37.0.0.44.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-tools-6.6.0-37.0.0.44.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-37.0.0.44.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-37.0.0.44.oe2403.x86_64",
					"openEuler-24.03-LTS:perf-6.6.0-37.0.0.44.oe2403.x86_64",
					"openEuler-24.03-LTS:perf-debuginfo-6.6.0-37.0.0.44.oe2403.x86_64",
					"openEuler-24.03-LTS:python3-perf-6.6.0-37.0.0.44.oe2403.x86_64",
					"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-37.0.0.44.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-6.6.0-37.0.0.44.oe2403.src"
				]
			},
			"remediations":[
				{
					"product_ids":[
						"openEuler-24.03-LTS:bpftool-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-6.6.0-37.0.0.44.oe2403.src"
					],
					"details":"kernel security update",
					"category":"vendor_fix",
					"url":"https://www.openeuler.org/zh/security/security-bulletins/detail/?id=openEuler-SA-2024-1960"
				}
			],
			"scores":[
				{
					"cvss_v3":{
						"baseSeverity":"MEDIUM",
						"baseScore":5.5,
						"vectorString":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
						"version":"3.1"
					},
					"products":[
						"openEuler-24.03-LTS:bpftool-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-6.6.0-37.0.0.44.oe2403.src"
					]
				}
			],
			"threats":[
				{
					"details":"Medium",
					"category":"impact"
				}
			],
			"title":"CVE-2024-36944"
		},
		{
			"cve":"CVE-2024-36964",
			"notes":[
				{
					"text":"In the Linux kernel, the following vulnerability has been resolved:\n\nfs/9p: only translate RWX permissions for plain 9P2000\n\nGarbage in plain 9P2000's perm bits is allowed through, which causes it\nto be able to set (among others) the suid bit. This was presumably not\nthe intent since the unix extended bits are handled explicitly and\nconditionally on .u.",
					"category":"description",
					"title":"Vulnerability Description"
				}
			],
			"product_status":{
				"fixed":[
					"openEuler-24.03-LTS:bpftool-6.6.0-37.0.0.44.oe2403.aarch64",
					"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-37.0.0.44.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-6.6.0-37.0.0.44.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-37.0.0.44.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-debugsource-6.6.0-37.0.0.44.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-devel-6.6.0-37.0.0.44.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-headers-6.6.0-37.0.0.44.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-source-6.6.0-37.0.0.44.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-tools-6.6.0-37.0.0.44.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-37.0.0.44.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-37.0.0.44.oe2403.aarch64",
					"openEuler-24.03-LTS:perf-6.6.0-37.0.0.44.oe2403.aarch64",
					"openEuler-24.03-LTS:perf-debuginfo-6.6.0-37.0.0.44.oe2403.aarch64",
					"openEuler-24.03-LTS:python3-perf-6.6.0-37.0.0.44.oe2403.aarch64",
					"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-37.0.0.44.oe2403.aarch64",
					"openEuler-24.03-LTS:bpftool-6.6.0-37.0.0.44.oe2403.x86_64",
					"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-37.0.0.44.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-6.6.0-37.0.0.44.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-37.0.0.44.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-debugsource-6.6.0-37.0.0.44.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-devel-6.6.0-37.0.0.44.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-headers-6.6.0-37.0.0.44.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-source-6.6.0-37.0.0.44.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-tools-6.6.0-37.0.0.44.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-37.0.0.44.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-37.0.0.44.oe2403.x86_64",
					"openEuler-24.03-LTS:perf-6.6.0-37.0.0.44.oe2403.x86_64",
					"openEuler-24.03-LTS:perf-debuginfo-6.6.0-37.0.0.44.oe2403.x86_64",
					"openEuler-24.03-LTS:python3-perf-6.6.0-37.0.0.44.oe2403.x86_64",
					"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-37.0.0.44.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-6.6.0-37.0.0.44.oe2403.src"
				]
			},
			"remediations":[
				{
					"product_ids":[
						"openEuler-24.03-LTS:bpftool-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-6.6.0-37.0.0.44.oe2403.src"
					],
					"details":"kernel security update",
					"category":"vendor_fix",
					"url":"https://www.openeuler.org/zh/security/security-bulletins/detail/?id=openEuler-SA-2024-1960"
				}
			],
			"scores":[
				{
					"cvss_v3":{
						"baseSeverity":"HIGH",
						"baseScore":7.2,
						"vectorString":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
						"version":"3.1"
					},
					"products":[
						"openEuler-24.03-LTS:bpftool-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-6.6.0-37.0.0.44.oe2403.src"
					]
				}
			],
			"threats":[
				{
					"details":"High",
					"category":"impact"
				}
			],
			"title":"CVE-2024-36964"
		},
		{
			"cve":"CVE-2024-38556",
			"notes":[
				{
					"text":"In the Linux kernel, the following vulnerability has been resolved:\n\nnet/mlx5: Add a timeout to acquire the command queue semaphore\n\nPrevent forced completion handling on an entry that has not yet been\nassigned an index, causing an out of bounds access on idx = -22.\nInstead of waiting indefinitely for the sem, blocking flow now waits for\nindex to be allocated or a sem acquisition timeout before beginning the\ntimer for FW completion.\n\nKernel log example:\nmlx5_core 0000:06:00.0: wait_func_handle_exec_timeout:1128:(pid 185911): cmd[-22]: CREATE_UCTX(0xa04) No done completion",
					"category":"description",
					"title":"Vulnerability Description"
				}
			],
			"product_status":{
				"fixed":[
					"openEuler-24.03-LTS:bpftool-6.6.0-37.0.0.44.oe2403.aarch64",
					"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-37.0.0.44.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-6.6.0-37.0.0.44.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-37.0.0.44.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-debugsource-6.6.0-37.0.0.44.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-devel-6.6.0-37.0.0.44.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-headers-6.6.0-37.0.0.44.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-source-6.6.0-37.0.0.44.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-tools-6.6.0-37.0.0.44.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-37.0.0.44.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-37.0.0.44.oe2403.aarch64",
					"openEuler-24.03-LTS:perf-6.6.0-37.0.0.44.oe2403.aarch64",
					"openEuler-24.03-LTS:perf-debuginfo-6.6.0-37.0.0.44.oe2403.aarch64",
					"openEuler-24.03-LTS:python3-perf-6.6.0-37.0.0.44.oe2403.aarch64",
					"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-37.0.0.44.oe2403.aarch64",
					"openEuler-24.03-LTS:bpftool-6.6.0-37.0.0.44.oe2403.x86_64",
					"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-37.0.0.44.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-6.6.0-37.0.0.44.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-37.0.0.44.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-debugsource-6.6.0-37.0.0.44.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-devel-6.6.0-37.0.0.44.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-headers-6.6.0-37.0.0.44.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-source-6.6.0-37.0.0.44.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-tools-6.6.0-37.0.0.44.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-37.0.0.44.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-37.0.0.44.oe2403.x86_64",
					"openEuler-24.03-LTS:perf-6.6.0-37.0.0.44.oe2403.x86_64",
					"openEuler-24.03-LTS:perf-debuginfo-6.6.0-37.0.0.44.oe2403.x86_64",
					"openEuler-24.03-LTS:python3-perf-6.6.0-37.0.0.44.oe2403.x86_64",
					"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-37.0.0.44.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-6.6.0-37.0.0.44.oe2403.src"
				]
			},
			"remediations":[
				{
					"product_ids":[
						"openEuler-24.03-LTS:bpftool-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-6.6.0-37.0.0.44.oe2403.src"
					],
					"details":"kernel security update",
					"category":"vendor_fix",
					"url":"https://www.openeuler.org/zh/security/security-bulletins/detail/?id=openEuler-SA-2024-1960"
				}
			],
			"scores":[
				{
					"cvss_v3":{
						"baseSeverity":"MEDIUM",
						"baseScore":5.5,
						"vectorString":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
						"version":"3.1"
					},
					"products":[
						"openEuler-24.03-LTS:bpftool-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-6.6.0-37.0.0.44.oe2403.src"
					]
				}
			],
			"threats":[
				{
					"details":"Medium",
					"category":"impact"
				}
			],
			"title":"CVE-2024-38556"
		},
		{
			"cve":"CVE-2024-38576",
			"notes":[
				{
					"text":"In the Linux kernel, the following vulnerability has been resolved:\n\nrcu: Fix buffer overflow in print_cpu_stall_info()\n\nThe rcuc-starvation output from print_cpu_stall_info() might overflow the\nbuffer if there is a huge difference in jiffies difference.  The situation\nmight seem improbable, but computers sometimes get very confused about\ntime, which can result in full-sized integers, and, in this case,\nbuffer overflow.\n\nAlso, the unsigned jiffies difference is printed using %ld, which is\nnormally for signed integers.  This is intentional for debugging purposes,\nbut it is not obvious from the code.\n\nThis commit therefore changes sprintf() to snprintf() and adds a\nclarifying comment about intention of %ld format.\n\nFound by Linux Verification Center (linuxtesting.org) with SVACE.",
					"category":"description",
					"title":"Vulnerability Description"
				}
			],
			"product_status":{
				"fixed":[
					"openEuler-24.03-LTS:bpftool-6.6.0-37.0.0.44.oe2403.aarch64",
					"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-37.0.0.44.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-6.6.0-37.0.0.44.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-37.0.0.44.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-debugsource-6.6.0-37.0.0.44.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-devel-6.6.0-37.0.0.44.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-headers-6.6.0-37.0.0.44.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-source-6.6.0-37.0.0.44.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-tools-6.6.0-37.0.0.44.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-37.0.0.44.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-37.0.0.44.oe2403.aarch64",
					"openEuler-24.03-LTS:perf-6.6.0-37.0.0.44.oe2403.aarch64",
					"openEuler-24.03-LTS:perf-debuginfo-6.6.0-37.0.0.44.oe2403.aarch64",
					"openEuler-24.03-LTS:python3-perf-6.6.0-37.0.0.44.oe2403.aarch64",
					"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-37.0.0.44.oe2403.aarch64",
					"openEuler-24.03-LTS:bpftool-6.6.0-37.0.0.44.oe2403.x86_64",
					"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-37.0.0.44.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-6.6.0-37.0.0.44.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-37.0.0.44.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-debugsource-6.6.0-37.0.0.44.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-devel-6.6.0-37.0.0.44.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-headers-6.6.0-37.0.0.44.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-source-6.6.0-37.0.0.44.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-tools-6.6.0-37.0.0.44.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-37.0.0.44.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-37.0.0.44.oe2403.x86_64",
					"openEuler-24.03-LTS:perf-6.6.0-37.0.0.44.oe2403.x86_64",
					"openEuler-24.03-LTS:perf-debuginfo-6.6.0-37.0.0.44.oe2403.x86_64",
					"openEuler-24.03-LTS:python3-perf-6.6.0-37.0.0.44.oe2403.x86_64",
					"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-37.0.0.44.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-6.6.0-37.0.0.44.oe2403.src"
				]
			},
			"remediations":[
				{
					"product_ids":[
						"openEuler-24.03-LTS:bpftool-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-6.6.0-37.0.0.44.oe2403.src"
					],
					"details":"kernel security update",
					"category":"vendor_fix",
					"url":"https://www.openeuler.org/zh/security/security-bulletins/detail/?id=openEuler-SA-2024-1960"
				}
			],
			"scores":[
				{
					"cvss_v3":{
						"baseSeverity":"MEDIUM",
						"baseScore":5.5,
						"vectorString":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
						"version":"3.1"
					},
					"products":[
						"openEuler-24.03-LTS:bpftool-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-6.6.0-37.0.0.44.oe2403.src"
					]
				}
			],
			"threats":[
				{
					"details":"Medium",
					"category":"impact"
				}
			],
			"title":"CVE-2024-38576"
		},
		{
			"cve":"CVE-2024-38600",
			"notes":[
				{
					"text":"In the Linux kernel, the following vulnerability has been resolved:\n\nALSA: Fix deadlocks with kctl removals at disconnection\n\nIn snd_card_disconnect(), we set card->shutdown flag at the beginning,\ncall callbacks and do sync for card->power_ref_sleep waiters at the\nend.  The callback may delete a kctl element, and this can lead to a\ndeadlock when the device was in the suspended state.  Namely:\n\n* A process waits for the power up at snd_power_ref_and_wait() in\n  snd_ctl_info() or read/write() inside card->controls_rwsem.\n\n* The system gets disconnected meanwhile, and the driver tries to\n  delete a kctl via snd_ctl_remove*(); it tries to take\n  card->controls_rwsem again, but this is already locked by the\n  above.  Since the sleeper isn't woken up, this deadlocks.\n\nAn easy fix is to wake up sleepers before processing the driver\ndisconnect callbacks but right after setting the card->shutdown flag.\nThen all sleepers will abort immediately, and the code flows again.\n\nSo, basically this patch moves the wait_event() call at the right\ntiming.  While we're at it, just to be sure, call wait_event_all()\ninstead of wait_event(), although we don't use exclusive events on\nthis queue for now.",
					"category":"description",
					"title":"Vulnerability Description"
				}
			],
			"product_status":{
				"fixed":[
					"openEuler-24.03-LTS:bpftool-6.6.0-37.0.0.44.oe2403.aarch64",
					"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-37.0.0.44.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-6.6.0-37.0.0.44.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-37.0.0.44.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-debugsource-6.6.0-37.0.0.44.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-devel-6.6.0-37.0.0.44.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-headers-6.6.0-37.0.0.44.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-source-6.6.0-37.0.0.44.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-tools-6.6.0-37.0.0.44.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-37.0.0.44.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-37.0.0.44.oe2403.aarch64",
					"openEuler-24.03-LTS:perf-6.6.0-37.0.0.44.oe2403.aarch64",
					"openEuler-24.03-LTS:perf-debuginfo-6.6.0-37.0.0.44.oe2403.aarch64",
					"openEuler-24.03-LTS:python3-perf-6.6.0-37.0.0.44.oe2403.aarch64",
					"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-37.0.0.44.oe2403.aarch64",
					"openEuler-24.03-LTS:bpftool-6.6.0-37.0.0.44.oe2403.x86_64",
					"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-37.0.0.44.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-6.6.0-37.0.0.44.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-37.0.0.44.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-debugsource-6.6.0-37.0.0.44.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-devel-6.6.0-37.0.0.44.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-headers-6.6.0-37.0.0.44.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-source-6.6.0-37.0.0.44.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-tools-6.6.0-37.0.0.44.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-37.0.0.44.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-37.0.0.44.oe2403.x86_64",
					"openEuler-24.03-LTS:perf-6.6.0-37.0.0.44.oe2403.x86_64",
					"openEuler-24.03-LTS:perf-debuginfo-6.6.0-37.0.0.44.oe2403.x86_64",
					"openEuler-24.03-LTS:python3-perf-6.6.0-37.0.0.44.oe2403.x86_64",
					"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-37.0.0.44.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-6.6.0-37.0.0.44.oe2403.src"
				]
			},
			"remediations":[
				{
					"product_ids":[
						"openEuler-24.03-LTS:bpftool-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-6.6.0-37.0.0.44.oe2403.src"
					],
					"details":"kernel security update",
					"category":"vendor_fix",
					"url":"https://www.openeuler.org/zh/security/security-bulletins/detail/?id=openEuler-SA-2024-1960"
				}
			],
			"scores":[
				{
					"cvss_v3":{
						"baseSeverity":"MEDIUM",
						"baseScore":4.7,
						"vectorString":"CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H",
						"version":"3.1"
					},
					"products":[
						"openEuler-24.03-LTS:bpftool-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-6.6.0-37.0.0.44.oe2403.src"
					]
				}
			],
			"threats":[
				{
					"details":"Medium",
					"category":"impact"
				}
			],
			"title":"CVE-2024-38600"
		},
		{
			"cve":"CVE-2024-38606",
			"notes":[
				{
					"text":"In the Linux kernel, the following vulnerability has been resolved:\n\ncrypto: qat - validate slices count returned by FW\n\nThe function adf_send_admin_tl_start() enables the telemetry (TL)\nfeature on a QAT device by sending the ICP_QAT_FW_TL_START message to\nthe firmware. This triggers the FW to start writing TL data to a DMA\nbuffer in memory and returns an array containing the number of\naccelerators of each type (slices) supported by this HW.\nThe pointer to this array is stored in the adf_tl_hw_data data\nstructure called slice_cnt.\n\nThe array slice_cnt is then used in the function tl_print_dev_data()\nto report in debugfs only statistics about the supported accelerators.\nAn incorrect value of the elements in slice_cnt might lead to an out\nof bounds memory read.\nAt the moment, there isn't an implementation of FW that returns a wrong\nvalue, but for robustness validate the slice count array returned by FW.",
					"category":"description",
					"title":"Vulnerability Description"
				}
			],
			"product_status":{
				"fixed":[
					"openEuler-24.03-LTS:bpftool-6.6.0-37.0.0.44.oe2403.aarch64",
					"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-37.0.0.44.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-6.6.0-37.0.0.44.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-37.0.0.44.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-debugsource-6.6.0-37.0.0.44.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-devel-6.6.0-37.0.0.44.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-headers-6.6.0-37.0.0.44.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-source-6.6.0-37.0.0.44.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-tools-6.6.0-37.0.0.44.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-37.0.0.44.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-37.0.0.44.oe2403.aarch64",
					"openEuler-24.03-LTS:perf-6.6.0-37.0.0.44.oe2403.aarch64",
					"openEuler-24.03-LTS:perf-debuginfo-6.6.0-37.0.0.44.oe2403.aarch64",
					"openEuler-24.03-LTS:python3-perf-6.6.0-37.0.0.44.oe2403.aarch64",
					"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-37.0.0.44.oe2403.aarch64",
					"openEuler-24.03-LTS:bpftool-6.6.0-37.0.0.44.oe2403.x86_64",
					"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-37.0.0.44.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-6.6.0-37.0.0.44.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-37.0.0.44.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-debugsource-6.6.0-37.0.0.44.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-devel-6.6.0-37.0.0.44.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-headers-6.6.0-37.0.0.44.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-source-6.6.0-37.0.0.44.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-tools-6.6.0-37.0.0.44.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-37.0.0.44.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-37.0.0.44.oe2403.x86_64",
					"openEuler-24.03-LTS:perf-6.6.0-37.0.0.44.oe2403.x86_64",
					"openEuler-24.03-LTS:perf-debuginfo-6.6.0-37.0.0.44.oe2403.x86_64",
					"openEuler-24.03-LTS:python3-perf-6.6.0-37.0.0.44.oe2403.x86_64",
					"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-37.0.0.44.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-6.6.0-37.0.0.44.oe2403.src"
				]
			},
			"remediations":[
				{
					"product_ids":[
						"openEuler-24.03-LTS:bpftool-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-6.6.0-37.0.0.44.oe2403.src"
					],
					"details":"kernel security update",
					"category":"vendor_fix",
					"url":"https://www.openeuler.org/zh/security/security-bulletins/detail/?id=openEuler-SA-2024-1960"
				}
			],
			"scores":[
				{
					"cvss_v3":{
						"baseSeverity":"MEDIUM",
						"baseScore":5.5,
						"vectorString":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
						"version":"3.1"
					},
					"products":[
						"openEuler-24.03-LTS:bpftool-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-6.6.0-37.0.0.44.oe2403.src"
					]
				}
			],
			"threats":[
				{
					"details":"Medium",
					"category":"impact"
				}
			],
			"title":"CVE-2024-38606"
		},
		{
			"cve":"CVE-2024-38607",
			"notes":[
				{
					"text":"In the Linux kernel, the following vulnerability has been resolved:\n\nmacintosh/via-macii: Fix \"BUG: sleeping function called from invalid context\"\n\nThe via-macii ADB driver calls request_irq() after disabling hard\ninterrupts. But disabling interrupts isn't necessary here because the\nVIA shift register interrupt was masked during VIA1 initialization.",
					"category":"description",
					"title":"Vulnerability Description"
				}
			],
			"product_status":{
				"fixed":[
					"openEuler-24.03-LTS:bpftool-6.6.0-37.0.0.44.oe2403.aarch64",
					"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-37.0.0.44.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-6.6.0-37.0.0.44.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-37.0.0.44.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-debugsource-6.6.0-37.0.0.44.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-devel-6.6.0-37.0.0.44.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-headers-6.6.0-37.0.0.44.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-source-6.6.0-37.0.0.44.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-tools-6.6.0-37.0.0.44.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-37.0.0.44.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-37.0.0.44.oe2403.aarch64",
					"openEuler-24.03-LTS:perf-6.6.0-37.0.0.44.oe2403.aarch64",
					"openEuler-24.03-LTS:perf-debuginfo-6.6.0-37.0.0.44.oe2403.aarch64",
					"openEuler-24.03-LTS:python3-perf-6.6.0-37.0.0.44.oe2403.aarch64",
					"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-37.0.0.44.oe2403.aarch64",
					"openEuler-24.03-LTS:bpftool-6.6.0-37.0.0.44.oe2403.x86_64",
					"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-37.0.0.44.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-6.6.0-37.0.0.44.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-37.0.0.44.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-debugsource-6.6.0-37.0.0.44.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-devel-6.6.0-37.0.0.44.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-headers-6.6.0-37.0.0.44.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-source-6.6.0-37.0.0.44.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-tools-6.6.0-37.0.0.44.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-37.0.0.44.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-37.0.0.44.oe2403.x86_64",
					"openEuler-24.03-LTS:perf-6.6.0-37.0.0.44.oe2403.x86_64",
					"openEuler-24.03-LTS:perf-debuginfo-6.6.0-37.0.0.44.oe2403.x86_64",
					"openEuler-24.03-LTS:python3-perf-6.6.0-37.0.0.44.oe2403.x86_64",
					"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-37.0.0.44.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-6.6.0-37.0.0.44.oe2403.src"
				]
			},
			"remediations":[
				{
					"product_ids":[
						"openEuler-24.03-LTS:bpftool-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-6.6.0-37.0.0.44.oe2403.src"
					],
					"details":"kernel security update",
					"category":"vendor_fix",
					"url":"https://www.openeuler.org/zh/security/security-bulletins/detail/?id=openEuler-SA-2024-1960"
				}
			],
			"scores":[
				{
					"cvss_v3":{
						"baseSeverity":"MEDIUM",
						"baseScore":5.5,
						"vectorString":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
						"version":"3.1"
					},
					"products":[
						"openEuler-24.03-LTS:bpftool-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-6.6.0-37.0.0.44.oe2403.src"
					]
				}
			],
			"threats":[
				{
					"details":"Medium",
					"category":"impact"
				}
			],
			"title":"CVE-2024-38607"
		},
		{
			"cve":"CVE-2024-38617",
			"notes":[
				{
					"text":"In the Linux kernel, the following vulnerability has been resolved:\n\nkunit/fortify: Fix mismatched kvalloc()/vfree() usage\n\nThe kv*() family of tests were accidentally freeing with vfree() instead\nof kvfree(). Use kvfree() instead.",
					"category":"description",
					"title":"Vulnerability Description"
				}
			],
			"product_status":{
				"fixed":[
					"openEuler-24.03-LTS:bpftool-6.6.0-37.0.0.44.oe2403.aarch64",
					"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-37.0.0.44.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-6.6.0-37.0.0.44.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-37.0.0.44.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-debugsource-6.6.0-37.0.0.44.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-devel-6.6.0-37.0.0.44.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-headers-6.6.0-37.0.0.44.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-source-6.6.0-37.0.0.44.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-tools-6.6.0-37.0.0.44.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-37.0.0.44.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-37.0.0.44.oe2403.aarch64",
					"openEuler-24.03-LTS:perf-6.6.0-37.0.0.44.oe2403.aarch64",
					"openEuler-24.03-LTS:perf-debuginfo-6.6.0-37.0.0.44.oe2403.aarch64",
					"openEuler-24.03-LTS:python3-perf-6.6.0-37.0.0.44.oe2403.aarch64",
					"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-37.0.0.44.oe2403.aarch64",
					"openEuler-24.03-LTS:bpftool-6.6.0-37.0.0.44.oe2403.x86_64",
					"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-37.0.0.44.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-6.6.0-37.0.0.44.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-37.0.0.44.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-debugsource-6.6.0-37.0.0.44.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-devel-6.6.0-37.0.0.44.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-headers-6.6.0-37.0.0.44.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-source-6.6.0-37.0.0.44.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-tools-6.6.0-37.0.0.44.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-37.0.0.44.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-37.0.0.44.oe2403.x86_64",
					"openEuler-24.03-LTS:perf-6.6.0-37.0.0.44.oe2403.x86_64",
					"openEuler-24.03-LTS:perf-debuginfo-6.6.0-37.0.0.44.oe2403.x86_64",
					"openEuler-24.03-LTS:python3-perf-6.6.0-37.0.0.44.oe2403.x86_64",
					"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-37.0.0.44.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-6.6.0-37.0.0.44.oe2403.src"
				]
			},
			"remediations":[
				{
					"product_ids":[
						"openEuler-24.03-LTS:bpftool-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-6.6.0-37.0.0.44.oe2403.src"
					],
					"details":"kernel security update",
					"category":"vendor_fix",
					"url":"https://www.openeuler.org/zh/security/security-bulletins/detail/?id=openEuler-SA-2024-1960"
				}
			],
			"scores":[
				{
					"cvss_v3":{
						"baseSeverity":"MEDIUM",
						"baseScore":5.5,
						"vectorString":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
						"version":"3.1"
					},
					"products":[
						"openEuler-24.03-LTS:bpftool-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-6.6.0-37.0.0.44.oe2403.src"
					]
				}
			],
			"threats":[
				{
					"details":"Medium",
					"category":"impact"
				}
			],
			"title":"CVE-2024-38617"
		},
		{
			"cve":"CVE-2024-39471",
			"notes":[
				{
					"text":"In the Linux kernel, the following vulnerability has been resolved:\n\ndrm/amdgpu: add error handle to avoid out-of-bounds\n\nif the sdma_v4_0_irq_id_to_seq return -EINVAL, the process should\nbe stop to avoid out-of-bounds read, so directly return -EINVAL.",
					"category":"description",
					"title":"Vulnerability Description"
				}
			],
			"product_status":{
				"fixed":[
					"openEuler-24.03-LTS:bpftool-6.6.0-37.0.0.44.oe2403.aarch64",
					"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-37.0.0.44.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-6.6.0-37.0.0.44.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-37.0.0.44.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-debugsource-6.6.0-37.0.0.44.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-devel-6.6.0-37.0.0.44.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-headers-6.6.0-37.0.0.44.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-source-6.6.0-37.0.0.44.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-tools-6.6.0-37.0.0.44.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-37.0.0.44.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-37.0.0.44.oe2403.aarch64",
					"openEuler-24.03-LTS:perf-6.6.0-37.0.0.44.oe2403.aarch64",
					"openEuler-24.03-LTS:perf-debuginfo-6.6.0-37.0.0.44.oe2403.aarch64",
					"openEuler-24.03-LTS:python3-perf-6.6.0-37.0.0.44.oe2403.aarch64",
					"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-37.0.0.44.oe2403.aarch64",
					"openEuler-24.03-LTS:bpftool-6.6.0-37.0.0.44.oe2403.x86_64",
					"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-37.0.0.44.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-6.6.0-37.0.0.44.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-37.0.0.44.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-debugsource-6.6.0-37.0.0.44.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-devel-6.6.0-37.0.0.44.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-headers-6.6.0-37.0.0.44.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-source-6.6.0-37.0.0.44.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-tools-6.6.0-37.0.0.44.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-37.0.0.44.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-37.0.0.44.oe2403.x86_64",
					"openEuler-24.03-LTS:perf-6.6.0-37.0.0.44.oe2403.x86_64",
					"openEuler-24.03-LTS:perf-debuginfo-6.6.0-37.0.0.44.oe2403.x86_64",
					"openEuler-24.03-LTS:python3-perf-6.6.0-37.0.0.44.oe2403.x86_64",
					"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-37.0.0.44.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-6.6.0-37.0.0.44.oe2403.src"
				]
			},
			"remediations":[
				{
					"product_ids":[
						"openEuler-24.03-LTS:bpftool-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-6.6.0-37.0.0.44.oe2403.src"
					],
					"details":"kernel security update",
					"category":"vendor_fix",
					"url":"https://www.openeuler.org/zh/security/security-bulletins/detail/?id=openEuler-SA-2024-1960"
				}
			],
			"scores":[
				{
					"cvss_v3":{
						"baseSeverity":"MEDIUM",
						"baseScore":4.4,
						"vectorString":"CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
						"version":"3.1"
					},
					"products":[
						"openEuler-24.03-LTS:bpftool-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-6.6.0-37.0.0.44.oe2403.src"
					]
				}
			],
			"threats":[
				{
					"details":"Medium",
					"category":"impact"
				}
			],
			"title":"CVE-2024-39471"
		},
		{
			"cve":"CVE-2024-39473",
			"notes":[
				{
					"text":"In the Linux kernel, the following vulnerability has been resolved:ASoC: SOF: ipc4-topology: Fix input format query of process modules without base extensionIf a process module does not have base config extension then the sameformat applies to all of it s inputs and the process->base_config_ext isNULL, causing NULL dereference when specifically crafted topology andsequences used.",
					"category":"description",
					"title":"Vulnerability Description"
				}
			],
			"product_status":{
				"fixed":[
					"openEuler-24.03-LTS:bpftool-6.6.0-37.0.0.44.oe2403.aarch64",
					"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-37.0.0.44.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-6.6.0-37.0.0.44.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-37.0.0.44.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-debugsource-6.6.0-37.0.0.44.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-devel-6.6.0-37.0.0.44.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-headers-6.6.0-37.0.0.44.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-source-6.6.0-37.0.0.44.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-tools-6.6.0-37.0.0.44.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-37.0.0.44.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-37.0.0.44.oe2403.aarch64",
					"openEuler-24.03-LTS:perf-6.6.0-37.0.0.44.oe2403.aarch64",
					"openEuler-24.03-LTS:perf-debuginfo-6.6.0-37.0.0.44.oe2403.aarch64",
					"openEuler-24.03-LTS:python3-perf-6.6.0-37.0.0.44.oe2403.aarch64",
					"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-37.0.0.44.oe2403.aarch64",
					"openEuler-24.03-LTS:bpftool-6.6.0-37.0.0.44.oe2403.x86_64",
					"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-37.0.0.44.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-6.6.0-37.0.0.44.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-37.0.0.44.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-debugsource-6.6.0-37.0.0.44.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-devel-6.6.0-37.0.0.44.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-headers-6.6.0-37.0.0.44.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-source-6.6.0-37.0.0.44.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-tools-6.6.0-37.0.0.44.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-37.0.0.44.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-37.0.0.44.oe2403.x86_64",
					"openEuler-24.03-LTS:perf-6.6.0-37.0.0.44.oe2403.x86_64",
					"openEuler-24.03-LTS:perf-debuginfo-6.6.0-37.0.0.44.oe2403.x86_64",
					"openEuler-24.03-LTS:python3-perf-6.6.0-37.0.0.44.oe2403.x86_64",
					"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-37.0.0.44.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-6.6.0-37.0.0.44.oe2403.src"
				]
			},
			"remediations":[
				{
					"product_ids":[
						"openEuler-24.03-LTS:bpftool-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-6.6.0-37.0.0.44.oe2403.src"
					],
					"details":"kernel security update",
					"category":"vendor_fix",
					"url":"https://www.openeuler.org/zh/security/security-bulletins/detail/?id=openEuler-SA-2024-1960"
				}
			],
			"scores":[
				{
					"cvss_v3":{
						"baseSeverity":"MEDIUM",
						"baseScore":5.5,
						"vectorString":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
						"version":"3.1"
					},
					"products":[
						"openEuler-24.03-LTS:bpftool-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-6.6.0-37.0.0.44.oe2403.src"
					]
				}
			],
			"threats":[
				{
					"details":"Medium",
					"category":"impact"
				}
			],
			"title":"CVE-2024-39473"
		},
		{
			"cve":"CVE-2024-39475",
			"notes":[
				{
					"text":"In the Linux kernel, the following vulnerability has been resolved:fbdev: savage: Handle err return when savagefb_check_var failedThe commit 04e5eac8f3ab( fbdev: savage: Error out if pixclock equals zero )checks the value of pixclock to avoid divide-by-zero error. Howeverthe function savagefb_probe doesn t handle the error return ofsavagefb_check_var. When pixclock is 0, it will cause divide-by-zero error.",
					"category":"description",
					"title":"Vulnerability Description"
				}
			],
			"product_status":{
				"fixed":[
					"openEuler-24.03-LTS:bpftool-6.6.0-37.0.0.44.oe2403.aarch64",
					"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-37.0.0.44.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-6.6.0-37.0.0.44.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-37.0.0.44.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-debugsource-6.6.0-37.0.0.44.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-devel-6.6.0-37.0.0.44.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-headers-6.6.0-37.0.0.44.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-source-6.6.0-37.0.0.44.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-tools-6.6.0-37.0.0.44.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-37.0.0.44.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-37.0.0.44.oe2403.aarch64",
					"openEuler-24.03-LTS:perf-6.6.0-37.0.0.44.oe2403.aarch64",
					"openEuler-24.03-LTS:perf-debuginfo-6.6.0-37.0.0.44.oe2403.aarch64",
					"openEuler-24.03-LTS:python3-perf-6.6.0-37.0.0.44.oe2403.aarch64",
					"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-37.0.0.44.oe2403.aarch64",
					"openEuler-24.03-LTS:bpftool-6.6.0-37.0.0.44.oe2403.x86_64",
					"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-37.0.0.44.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-6.6.0-37.0.0.44.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-37.0.0.44.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-debugsource-6.6.0-37.0.0.44.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-devel-6.6.0-37.0.0.44.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-headers-6.6.0-37.0.0.44.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-source-6.6.0-37.0.0.44.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-tools-6.6.0-37.0.0.44.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-37.0.0.44.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-37.0.0.44.oe2403.x86_64",
					"openEuler-24.03-LTS:perf-6.6.0-37.0.0.44.oe2403.x86_64",
					"openEuler-24.03-LTS:perf-debuginfo-6.6.0-37.0.0.44.oe2403.x86_64",
					"openEuler-24.03-LTS:python3-perf-6.6.0-37.0.0.44.oe2403.x86_64",
					"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-37.0.0.44.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-6.6.0-37.0.0.44.oe2403.src"
				]
			},
			"remediations":[
				{
					"product_ids":[
						"openEuler-24.03-LTS:bpftool-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-6.6.0-37.0.0.44.oe2403.src"
					],
					"details":"kernel security update",
					"category":"vendor_fix",
					"url":"https://www.openeuler.org/zh/security/security-bulletins/detail/?id=openEuler-SA-2024-1960"
				}
			],
			"scores":[
				{
					"cvss_v3":{
						"baseSeverity":"MEDIUM",
						"baseScore":5.5,
						"vectorString":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
						"version":"3.1"
					},
					"products":[
						"openEuler-24.03-LTS:bpftool-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-6.6.0-37.0.0.44.oe2403.src"
					]
				}
			],
			"threats":[
				{
					"details":"Medium",
					"category":"impact"
				}
			],
			"title":"CVE-2024-39475"
		},
		{
			"cve":"CVE-2024-39481",
			"notes":[
				{
					"text":"In the Linux kernel, the following vulnerability has been resolved:media: mc: Fix graph walk in media_pipeline_startThe graph walk tries to follow all links, even if they are not betweenpads. This causes a crash with, e.g. a MEDIA_LNK_FL_ANCILLARY_LINK link.Fix this by allowing the walk to proceed only for MEDIA_LNK_FL_DATA_LINKlinks.",
					"category":"description",
					"title":"Vulnerability Description"
				}
			],
			"product_status":{
				"fixed":[
					"openEuler-24.03-LTS:bpftool-6.6.0-37.0.0.44.oe2403.aarch64",
					"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-37.0.0.44.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-6.6.0-37.0.0.44.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-37.0.0.44.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-debugsource-6.6.0-37.0.0.44.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-devel-6.6.0-37.0.0.44.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-headers-6.6.0-37.0.0.44.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-source-6.6.0-37.0.0.44.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-tools-6.6.0-37.0.0.44.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-37.0.0.44.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-37.0.0.44.oe2403.aarch64",
					"openEuler-24.03-LTS:perf-6.6.0-37.0.0.44.oe2403.aarch64",
					"openEuler-24.03-LTS:perf-debuginfo-6.6.0-37.0.0.44.oe2403.aarch64",
					"openEuler-24.03-LTS:python3-perf-6.6.0-37.0.0.44.oe2403.aarch64",
					"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-37.0.0.44.oe2403.aarch64",
					"openEuler-24.03-LTS:bpftool-6.6.0-37.0.0.44.oe2403.x86_64",
					"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-37.0.0.44.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-6.6.0-37.0.0.44.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-37.0.0.44.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-debugsource-6.6.0-37.0.0.44.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-devel-6.6.0-37.0.0.44.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-headers-6.6.0-37.0.0.44.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-source-6.6.0-37.0.0.44.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-tools-6.6.0-37.0.0.44.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-37.0.0.44.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-37.0.0.44.oe2403.x86_64",
					"openEuler-24.03-LTS:perf-6.6.0-37.0.0.44.oe2403.x86_64",
					"openEuler-24.03-LTS:perf-debuginfo-6.6.0-37.0.0.44.oe2403.x86_64",
					"openEuler-24.03-LTS:python3-perf-6.6.0-37.0.0.44.oe2403.x86_64",
					"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-37.0.0.44.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-6.6.0-37.0.0.44.oe2403.src"
				]
			},
			"remediations":[
				{
					"product_ids":[
						"openEuler-24.03-LTS:bpftool-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-6.6.0-37.0.0.44.oe2403.src"
					],
					"details":"kernel security update",
					"category":"vendor_fix",
					"url":"https://www.openeuler.org/zh/security/security-bulletins/detail/?id=openEuler-SA-2024-1960"
				}
			],
			"scores":[
				{
					"cvss_v3":{
						"baseSeverity":"MEDIUM",
						"baseScore":5.5,
						"vectorString":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
						"version":"3.1"
					},
					"products":[
						"openEuler-24.03-LTS:bpftool-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-6.6.0-37.0.0.44.oe2403.src"
					]
				}
			],
			"threats":[
				{
					"details":"Medium",
					"category":"impact"
				}
			],
			"title":"CVE-2024-39481"
		},
		{
			"cve":"CVE-2024-39486",
			"notes":[
				{
					"text":"In the Linux kernel, the following vulnerability has been resolved:\n\ndrm/drm_file: Fix pid refcounting race\n\n<maarten.lankhorst@linux.intel.com>, Maxime Ripard\n<mripard@kernel.org>, Thomas Zimmermann <tzimmermann@suse.de>\n\nfilp->pid is supposed to be a refcounted pointer; however, before this\npatch, drm_file_update_pid() only increments the refcount of a struct\npid after storing a pointer to it in filp->pid and dropping the\ndev->filelist_mutex, making the following race possible:\n\nprocess A               process B\n=========               =========\n                        begin drm_file_update_pid\n                        mutex_lock(&dev->filelist_mutex)\n                        rcu_replace_pointer(filp->pid, <pid B>, 1)\n                        mutex_unlock(&dev->filelist_mutex)\nbegin drm_file_update_pid\nmutex_lock(&dev->filelist_mutex)\nrcu_replace_pointer(filp->pid, <pid A>, 1)\nmutex_unlock(&dev->filelist_mutex)\nget_pid(<pid A>)\nsynchronize_rcu()\nput_pid(<pid B>)   *** pid B reaches refcount 0 and is freed here ***\n                        get_pid(<pid B>)   *** UAF ***\n                        synchronize_rcu()\n                        put_pid(<pid A>)\n\nAs far as I know, this race can only occur with CONFIG_PREEMPT_RCU=y\nbecause it requires RCU to detect a quiescent state in code that is not\nexplicitly calling into the scheduler.\n\nThis race leads to use-after-free of a \"struct pid\".\nIt is probably somewhat hard to hit because process A has to pass\nthrough a synchronize_rcu() operation while process B is between\nmutex_unlock() and get_pid().\n\nFix it by ensuring that by the time a pointer to the current task's pid\nis stored in the file, an extra reference to the pid has been taken.\n\nThis fix also removes the condition for synchronize_rcu(); I think\nthat optimization is unnecessary complexity, since in that case we\nwould usually have bailed out on the lockless check above.",
					"category":"description",
					"title":"Vulnerability Description"
				}
			],
			"product_status":{
				"fixed":[
					"openEuler-24.03-LTS:bpftool-6.6.0-37.0.0.44.oe2403.aarch64",
					"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-37.0.0.44.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-6.6.0-37.0.0.44.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-37.0.0.44.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-debugsource-6.6.0-37.0.0.44.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-devel-6.6.0-37.0.0.44.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-headers-6.6.0-37.0.0.44.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-source-6.6.0-37.0.0.44.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-tools-6.6.0-37.0.0.44.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-37.0.0.44.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-37.0.0.44.oe2403.aarch64",
					"openEuler-24.03-LTS:perf-6.6.0-37.0.0.44.oe2403.aarch64",
					"openEuler-24.03-LTS:perf-debuginfo-6.6.0-37.0.0.44.oe2403.aarch64",
					"openEuler-24.03-LTS:python3-perf-6.6.0-37.0.0.44.oe2403.aarch64",
					"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-37.0.0.44.oe2403.aarch64",
					"openEuler-24.03-LTS:bpftool-6.6.0-37.0.0.44.oe2403.x86_64",
					"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-37.0.0.44.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-6.6.0-37.0.0.44.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-37.0.0.44.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-debugsource-6.6.0-37.0.0.44.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-devel-6.6.0-37.0.0.44.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-headers-6.6.0-37.0.0.44.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-source-6.6.0-37.0.0.44.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-tools-6.6.0-37.0.0.44.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-37.0.0.44.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-37.0.0.44.oe2403.x86_64",
					"openEuler-24.03-LTS:perf-6.6.0-37.0.0.44.oe2403.x86_64",
					"openEuler-24.03-LTS:perf-debuginfo-6.6.0-37.0.0.44.oe2403.x86_64",
					"openEuler-24.03-LTS:python3-perf-6.6.0-37.0.0.44.oe2403.x86_64",
					"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-37.0.0.44.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-6.6.0-37.0.0.44.oe2403.src"
				]
			},
			"remediations":[
				{
					"product_ids":[
						"openEuler-24.03-LTS:bpftool-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-6.6.0-37.0.0.44.oe2403.src"
					],
					"details":"kernel security update",
					"category":"vendor_fix",
					"url":"https://www.openeuler.org/zh/security/security-bulletins/detail/?id=openEuler-SA-2024-1960"
				}
			],
			"scores":[
				{
					"cvss_v3":{
						"baseSeverity":"LOW",
						"baseScore":3.9,
						"vectorString":"CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:L/I:L/A:L",
						"version":"3.1"
					},
					"products":[
						"openEuler-24.03-LTS:bpftool-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-6.6.0-37.0.0.44.oe2403.src"
					]
				}
			],
			"threats":[
				{
					"details":"Low",
					"category":"impact"
				}
			],
			"title":"CVE-2024-39486"
		},
		{
			"cve":"CVE-2024-39493",
			"notes":[
				{
					"text":"In the Linux kernel, the following vulnerability has been resolved:\n\ncrypto: qat - Fix ADF_DEV_RESET_SYNC memory leak\n\nUsing completion_done to determine whether the caller has gone\naway only works after a complete call.  Furthermore it's still\npossible that the caller has not yet called wait_for_completion,\nresulting in another potential UAF.\n\nFix this by making the caller use cancel_work_sync and then freeing\nthe memory safely.",
					"category":"description",
					"title":"Vulnerability Description"
				}
			],
			"product_status":{
				"fixed":[
					"openEuler-24.03-LTS:bpftool-6.6.0-37.0.0.44.oe2403.aarch64",
					"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-37.0.0.44.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-6.6.0-37.0.0.44.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-37.0.0.44.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-debugsource-6.6.0-37.0.0.44.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-devel-6.6.0-37.0.0.44.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-headers-6.6.0-37.0.0.44.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-source-6.6.0-37.0.0.44.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-tools-6.6.0-37.0.0.44.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-37.0.0.44.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-37.0.0.44.oe2403.aarch64",
					"openEuler-24.03-LTS:perf-6.6.0-37.0.0.44.oe2403.aarch64",
					"openEuler-24.03-LTS:perf-debuginfo-6.6.0-37.0.0.44.oe2403.aarch64",
					"openEuler-24.03-LTS:python3-perf-6.6.0-37.0.0.44.oe2403.aarch64",
					"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-37.0.0.44.oe2403.aarch64",
					"openEuler-24.03-LTS:bpftool-6.6.0-37.0.0.44.oe2403.x86_64",
					"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-37.0.0.44.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-6.6.0-37.0.0.44.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-37.0.0.44.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-debugsource-6.6.0-37.0.0.44.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-devel-6.6.0-37.0.0.44.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-headers-6.6.0-37.0.0.44.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-source-6.6.0-37.0.0.44.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-tools-6.6.0-37.0.0.44.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-37.0.0.44.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-37.0.0.44.oe2403.x86_64",
					"openEuler-24.03-LTS:perf-6.6.0-37.0.0.44.oe2403.x86_64",
					"openEuler-24.03-LTS:perf-debuginfo-6.6.0-37.0.0.44.oe2403.x86_64",
					"openEuler-24.03-LTS:python3-perf-6.6.0-37.0.0.44.oe2403.x86_64",
					"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-37.0.0.44.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-6.6.0-37.0.0.44.oe2403.src"
				]
			},
			"remediations":[
				{
					"product_ids":[
						"openEuler-24.03-LTS:bpftool-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-6.6.0-37.0.0.44.oe2403.src"
					],
					"details":"kernel security update",
					"category":"vendor_fix",
					"url":"https://www.openeuler.org/zh/security/security-bulletins/detail/?id=openEuler-SA-2024-1960"
				}
			],
			"scores":[
				{
					"cvss_v3":{
						"baseSeverity":"MEDIUM",
						"baseScore":6.1,
						"vectorString":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H",
						"version":"3.1"
					},
					"products":[
						"openEuler-24.03-LTS:bpftool-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-6.6.0-37.0.0.44.oe2403.src"
					]
				}
			],
			"threats":[
				{
					"details":"Medium",
					"category":"impact"
				}
			],
			"title":"CVE-2024-39493"
		},
		{
			"cve":"CVE-2024-39496",
			"notes":[
				{
					"text":"In the Linux kernel, the following vulnerability has been resolved:btrfs: zoned: fix use-after-free due to race with dev replaceWhile loading a zone s info during creation of a block group, we can racewith a device replace operation and then trigger a use-after-free on thedevice that was just replaced (source device of the replace operation).This happens because at btrfs_load_zone_info() we extract a device fromthe chunk map into a local variable and then use the device while notunder the protection of the device replace rwsem. So if there s a devicereplace operation happening when we extract the device and that deviceis the source of the replace operation, we will trigger a use-after-freeif before we finish using the device the replace operation finishes andfrees the device.Fix this by enlarging the critical section under the protection of thedevice replace rwsem so that all uses of the device are done inside thecritical section.",
					"category":"description",
					"title":"Vulnerability Description"
				}
			],
			"product_status":{
				"fixed":[
					"openEuler-24.03-LTS:bpftool-6.6.0-37.0.0.44.oe2403.aarch64",
					"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-37.0.0.44.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-6.6.0-37.0.0.44.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-37.0.0.44.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-debugsource-6.6.0-37.0.0.44.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-devel-6.6.0-37.0.0.44.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-headers-6.6.0-37.0.0.44.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-source-6.6.0-37.0.0.44.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-tools-6.6.0-37.0.0.44.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-37.0.0.44.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-37.0.0.44.oe2403.aarch64",
					"openEuler-24.03-LTS:perf-6.6.0-37.0.0.44.oe2403.aarch64",
					"openEuler-24.03-LTS:perf-debuginfo-6.6.0-37.0.0.44.oe2403.aarch64",
					"openEuler-24.03-LTS:python3-perf-6.6.0-37.0.0.44.oe2403.aarch64",
					"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-37.0.0.44.oe2403.aarch64",
					"openEuler-24.03-LTS:bpftool-6.6.0-37.0.0.44.oe2403.x86_64",
					"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-37.0.0.44.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-6.6.0-37.0.0.44.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-37.0.0.44.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-debugsource-6.6.0-37.0.0.44.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-devel-6.6.0-37.0.0.44.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-headers-6.6.0-37.0.0.44.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-source-6.6.0-37.0.0.44.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-tools-6.6.0-37.0.0.44.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-37.0.0.44.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-37.0.0.44.oe2403.x86_64",
					"openEuler-24.03-LTS:perf-6.6.0-37.0.0.44.oe2403.x86_64",
					"openEuler-24.03-LTS:perf-debuginfo-6.6.0-37.0.0.44.oe2403.x86_64",
					"openEuler-24.03-LTS:python3-perf-6.6.0-37.0.0.44.oe2403.x86_64",
					"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-37.0.0.44.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-6.6.0-37.0.0.44.oe2403.src"
				]
			},
			"remediations":[
				{
					"product_ids":[
						"openEuler-24.03-LTS:bpftool-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-6.6.0-37.0.0.44.oe2403.src"
					],
					"details":"kernel security update",
					"category":"vendor_fix",
					"url":"https://www.openeuler.org/zh/security/security-bulletins/detail/?id=openEuler-SA-2024-1960"
				}
			],
			"scores":[
				{
					"cvss_v3":{
						"baseSeverity":"HIGH",
						"baseScore":7,
						"vectorString":"CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
						"version":"3.1"
					},
					"products":[
						"openEuler-24.03-LTS:bpftool-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-6.6.0-37.0.0.44.oe2403.src"
					]
				}
			],
			"threats":[
				{
					"details":"High",
					"category":"impact"
				}
			],
			"title":"CVE-2024-39496"
		},
		{
			"cve":"CVE-2024-39503",
			"notes":[
				{
					"text":"In the Linux kernel, the following vulnerability has been resolved:\n\nnetfilter: ipset: Fix race between namespace cleanup and gc in the list:set type\n\nLion Ackermann reported that there is a race condition between namespace cleanup\nin ipset and the garbage collection of the list:set type. The namespace\ncleanup can destroy the list:set type of sets while the gc of the set type is\nwaiting to run in rcu cleanup. The latter uses data from the destroyed set which\nthus leads use after free. The patch contains the following parts:\n\n- When destroying all sets, first remove the garbage collectors, then wait\n  if needed and then destroy the sets.\n- Fix the badly ordered \"wait then remove gc\" for the destroy a single set\n  case.\n- Fix the missing rcu locking in the list:set type in the userspace test\n  case.\n- Use proper RCU list handlings in the list:set type.\n\nThe patch depends on c1193d9bbbd3 (netfilter: ipset: Add list flush to cancel_gc).",
					"category":"description",
					"title":"Vulnerability Description"
				}
			],
			"product_status":{
				"fixed":[
					"openEuler-24.03-LTS:bpftool-6.6.0-37.0.0.44.oe2403.aarch64",
					"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-37.0.0.44.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-6.6.0-37.0.0.44.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-37.0.0.44.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-debugsource-6.6.0-37.0.0.44.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-devel-6.6.0-37.0.0.44.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-headers-6.6.0-37.0.0.44.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-source-6.6.0-37.0.0.44.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-tools-6.6.0-37.0.0.44.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-37.0.0.44.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-37.0.0.44.oe2403.aarch64",
					"openEuler-24.03-LTS:perf-6.6.0-37.0.0.44.oe2403.aarch64",
					"openEuler-24.03-LTS:perf-debuginfo-6.6.0-37.0.0.44.oe2403.aarch64",
					"openEuler-24.03-LTS:python3-perf-6.6.0-37.0.0.44.oe2403.aarch64",
					"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-37.0.0.44.oe2403.aarch64",
					"openEuler-24.03-LTS:bpftool-6.6.0-37.0.0.44.oe2403.x86_64",
					"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-37.0.0.44.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-6.6.0-37.0.0.44.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-37.0.0.44.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-debugsource-6.6.0-37.0.0.44.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-devel-6.6.0-37.0.0.44.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-headers-6.6.0-37.0.0.44.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-source-6.6.0-37.0.0.44.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-tools-6.6.0-37.0.0.44.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-37.0.0.44.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-37.0.0.44.oe2403.x86_64",
					"openEuler-24.03-LTS:perf-6.6.0-37.0.0.44.oe2403.x86_64",
					"openEuler-24.03-LTS:perf-debuginfo-6.6.0-37.0.0.44.oe2403.x86_64",
					"openEuler-24.03-LTS:python3-perf-6.6.0-37.0.0.44.oe2403.x86_64",
					"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-37.0.0.44.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-6.6.0-37.0.0.44.oe2403.src"
				]
			},
			"remediations":[
				{
					"product_ids":[
						"openEuler-24.03-LTS:bpftool-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-6.6.0-37.0.0.44.oe2403.src"
					],
					"details":"kernel security update",
					"category":"vendor_fix",
					"url":"https://www.openeuler.org/zh/security/security-bulletins/detail/?id=openEuler-SA-2024-1960"
				}
			],
			"scores":[
				{
					"cvss_v3":{
						"baseSeverity":"MEDIUM",
						"baseScore":5.5,
						"vectorString":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
						"version":"3.1"
					},
					"products":[
						"openEuler-24.03-LTS:bpftool-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-6.6.0-37.0.0.44.oe2403.src"
					]
				}
			],
			"threats":[
				{
					"details":"Medium",
					"category":"impact"
				}
			],
			"title":"CVE-2024-39503"
		},
		{
			"cve":"CVE-2024-40900",
			"notes":[
				{
					"text":"In the Linux kernel, the following vulnerability has been resolved:\n\ncachefiles: remove requests from xarray during flushing requests\n\nEven with CACHEFILES_DEAD set, we can still read the requests, so in the\nfollowing concurrency the request may be used after it has been freed:\n\n     mount  |   daemon_thread1    |    daemon_thread2\n------------------------------------------------------------\n cachefiles_ondemand_init_object\n  cachefiles_ondemand_send_req\n   REQ_A = kzalloc(sizeof(*req) + data_len)\n   wait_for_completion(&REQ_A->done)\n            cachefiles_daemon_read\n             cachefiles_ondemand_daemon_read\n                                  // close dev fd\n                                  cachefiles_flush_reqs\n                                   complete(&REQ_A->done)\n   kfree(REQ_A)\n              xa_lock(&cache->reqs);\n              cachefiles_ondemand_select_req\n                req->msg.opcode != CACHEFILES_OP_READ\n                // req use-after-free !!!\n              xa_unlock(&cache->reqs);\n                                   xa_destroy(&cache->reqs)\n\nHence remove requests from cache->reqs when flushing them to avoid\naccessing freed requests.",
					"category":"description",
					"title":"Vulnerability Description"
				}
			],
			"product_status":{
				"fixed":[
					"openEuler-24.03-LTS:bpftool-6.6.0-37.0.0.44.oe2403.aarch64",
					"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-37.0.0.44.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-6.6.0-37.0.0.44.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-37.0.0.44.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-debugsource-6.6.0-37.0.0.44.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-devel-6.6.0-37.0.0.44.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-headers-6.6.0-37.0.0.44.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-source-6.6.0-37.0.0.44.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-tools-6.6.0-37.0.0.44.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-37.0.0.44.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-37.0.0.44.oe2403.aarch64",
					"openEuler-24.03-LTS:perf-6.6.0-37.0.0.44.oe2403.aarch64",
					"openEuler-24.03-LTS:perf-debuginfo-6.6.0-37.0.0.44.oe2403.aarch64",
					"openEuler-24.03-LTS:python3-perf-6.6.0-37.0.0.44.oe2403.aarch64",
					"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-37.0.0.44.oe2403.aarch64",
					"openEuler-24.03-LTS:bpftool-6.6.0-37.0.0.44.oe2403.x86_64",
					"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-37.0.0.44.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-6.6.0-37.0.0.44.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-37.0.0.44.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-debugsource-6.6.0-37.0.0.44.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-devel-6.6.0-37.0.0.44.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-headers-6.6.0-37.0.0.44.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-source-6.6.0-37.0.0.44.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-tools-6.6.0-37.0.0.44.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-37.0.0.44.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-37.0.0.44.oe2403.x86_64",
					"openEuler-24.03-LTS:perf-6.6.0-37.0.0.44.oe2403.x86_64",
					"openEuler-24.03-LTS:perf-debuginfo-6.6.0-37.0.0.44.oe2403.x86_64",
					"openEuler-24.03-LTS:python3-perf-6.6.0-37.0.0.44.oe2403.x86_64",
					"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-37.0.0.44.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-6.6.0-37.0.0.44.oe2403.src"
				]
			},
			"remediations":[
				{
					"product_ids":[
						"openEuler-24.03-LTS:bpftool-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-6.6.0-37.0.0.44.oe2403.src"
					],
					"details":"kernel security update",
					"category":"vendor_fix",
					"url":"https://www.openeuler.org/zh/security/security-bulletins/detail/?id=openEuler-SA-2024-1960"
				}
			],
			"scores":[
				{
					"cvss_v3":{
						"baseSeverity":"MEDIUM",
						"baseScore":6.4,
						"vectorString":"CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H",
						"version":"3.1"
					},
					"products":[
						"openEuler-24.03-LTS:bpftool-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-6.6.0-37.0.0.44.oe2403.src"
					]
				}
			],
			"threats":[
				{
					"details":"Medium",
					"category":"impact"
				}
			],
			"title":"CVE-2024-40900"
		},
		{
			"cve":"CVE-2024-40906",
			"notes":[
				{
					"text":"In the Linux kernel, the following vulnerability has been resolved:\n\nnet/mlx5: Always stop health timer during driver removal\n\nCurrently, if teardown_hca fails to execute during driver removal, mlx5\ndoes not stop the health timer. Afterwards, mlx5 continue with driver\nteardown. This may lead to a UAF bug, which results in page fault\nOops[1], since the health timer invokes after resources were freed.\n\nHence, stop the health monitor even if teardown_hca fails.\n\n[1]\nmlx5_core 0000:18:00.0: E-Switch: Unload vfs: mode(LEGACY), nvfs(0), necvfs(0), active vports(0)\nmlx5_core 0000:18:00.0: E-Switch: Disable: mode(LEGACY), nvfs(0), necvfs(0), active vports(0)\nmlx5_core 0000:18:00.0: E-Switch: Disable: mode(LEGACY), nvfs(0), necvfs(0), active vports(0)\nmlx5_core 0000:18:00.0: E-Switch: cleanup\nmlx5_core 0000:18:00.0: wait_func:1155:(pid 1967079): TEARDOWN_HCA(0x103) timeout. Will cause a leak of a command resource\nmlx5_core 0000:18:00.0: mlx5_function_close:1288:(pid 1967079): tear_down_hca failed, skip cleanup\nBUG: unable to handle page fault for address: ffffa26487064230\nPGD 100c00067 P4D 100c00067 PUD 100e5a067 PMD 105ed7067 PTE 0\nOops: 0000 [#1] PREEMPT SMP PTI\nCPU: 0 PID: 0 Comm: swapper/0 Tainted: G           OE     -------  ---  6.7.0-68.fc38.x86_64 #1\nHardware name: Intel Corporation S2600WFT/S2600WFT, BIOS SE5C620.86B.02.01.0013.121520200651 12/15/2020\nRIP: 0010:ioread32be+0x34/0x60\nRSP: 0018:ffffa26480003e58 EFLAGS: 00010292\nRAX: ffffa26487064200 RBX: ffff9042d08161a0 RCX: ffff904c108222c0\nRDX: 000000010bbf1b80 RSI: ffffffffc055ddb0 RDI: ffffa26487064230\nRBP: ffff9042d08161a0 R08: 0000000000000022 R09: ffff904c108222e8\nR10: 0000000000000004 R11: 0000000000000441 R12: ffffffffc055ddb0\nR13: ffffa26487064200 R14: ffffa26480003f00 R15: ffff904c108222c0\nFS:  0000000000000000(0000) GS:ffff904c10800000(0000) knlGS:0000000000000000\nCS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033\nCR2: ffffa26487064230 CR3: 00000002c4420006 CR4: 00000000007706f0\nDR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000\nDR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400\nPKRU: 55555554\nCall Trace:\n <IRQ>\n ? __die+0x23/0x70\n ? page_fault_oops+0x171/0x4e0\n ? exc_page_fault+0x175/0x180\n ? asm_exc_page_fault+0x26/0x30\n ? __pfx_poll_health+0x10/0x10 [mlx5_core]\n ? __pfx_poll_health+0x10/0x10 [mlx5_core]\n ? ioread32be+0x34/0x60\n mlx5_health_check_fatal_sensors+0x20/0x100 [mlx5_core]\n ? __pfx_poll_health+0x10/0x10 [mlx5_core]\n poll_health+0x42/0x230 [mlx5_core]\n ? __next_timer_interrupt+0xbc/0x110\n ? __pfx_poll_health+0x10/0x10 [mlx5_core]\n call_timer_fn+0x21/0x130\n ? __pfx_poll_health+0x10/0x10 [mlx5_core]\n __run_timers+0x222/0x2c0\n run_timer_softirq+0x1d/0x40\n __do_softirq+0xc9/0x2c8\n __irq_exit_rcu+0xa6/0xc0\n sysvec_apic_timer_interrupt+0x72/0x90\n </IRQ>\n <TASK>\n asm_sysvec_apic_timer_interrupt+0x1a/0x20\nRIP: 0010:cpuidle_enter_state+0xcc/0x440\n ? cpuidle_enter_state+0xbd/0x440\n cpuidle_enter+0x2d/0x40\n do_idle+0x20d/0x270\n cpu_startup_entry+0x2a/0x30\n rest_init+0xd0/0xd0\n arch_call_rest_init+0xe/0x30\n start_kernel+0x709/0xa90\n x86_64_start_reservations+0x18/0x30\n x86_64_start_kernel+0x96/0xa0\n secondary_startup_64_no_verify+0x18f/0x19b\n---[ end trace 0000000000000000 ]---",
					"category":"description",
					"title":"Vulnerability Description"
				}
			],
			"product_status":{
				"fixed":[
					"openEuler-24.03-LTS:bpftool-6.6.0-37.0.0.44.oe2403.aarch64",
					"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-37.0.0.44.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-6.6.0-37.0.0.44.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-37.0.0.44.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-debugsource-6.6.0-37.0.0.44.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-devel-6.6.0-37.0.0.44.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-headers-6.6.0-37.0.0.44.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-source-6.6.0-37.0.0.44.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-tools-6.6.0-37.0.0.44.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-37.0.0.44.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-37.0.0.44.oe2403.aarch64",
					"openEuler-24.03-LTS:perf-6.6.0-37.0.0.44.oe2403.aarch64",
					"openEuler-24.03-LTS:perf-debuginfo-6.6.0-37.0.0.44.oe2403.aarch64",
					"openEuler-24.03-LTS:python3-perf-6.6.0-37.0.0.44.oe2403.aarch64",
					"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-37.0.0.44.oe2403.aarch64",
					"openEuler-24.03-LTS:bpftool-6.6.0-37.0.0.44.oe2403.x86_64",
					"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-37.0.0.44.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-6.6.0-37.0.0.44.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-37.0.0.44.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-debugsource-6.6.0-37.0.0.44.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-devel-6.6.0-37.0.0.44.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-headers-6.6.0-37.0.0.44.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-source-6.6.0-37.0.0.44.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-tools-6.6.0-37.0.0.44.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-37.0.0.44.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-37.0.0.44.oe2403.x86_64",
					"openEuler-24.03-LTS:perf-6.6.0-37.0.0.44.oe2403.x86_64",
					"openEuler-24.03-LTS:perf-debuginfo-6.6.0-37.0.0.44.oe2403.x86_64",
					"openEuler-24.03-LTS:python3-perf-6.6.0-37.0.0.44.oe2403.x86_64",
					"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-37.0.0.44.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-6.6.0-37.0.0.44.oe2403.src"
				]
			},
			"remediations":[
				{
					"product_ids":[
						"openEuler-24.03-LTS:bpftool-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-6.6.0-37.0.0.44.oe2403.src"
					],
					"details":"kernel security update",
					"category":"vendor_fix",
					"url":"https://www.openeuler.org/zh/security/security-bulletins/detail/?id=openEuler-SA-2024-1960"
				}
			],
			"scores":[
				{
					"cvss_v3":{
						"baseSeverity":"MEDIUM",
						"baseScore":4.4,
						"vectorString":"CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
						"version":"3.1"
					},
					"products":[
						"openEuler-24.03-LTS:bpftool-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-6.6.0-37.0.0.44.oe2403.src"
					]
				}
			],
			"threats":[
				{
					"details":"Medium",
					"category":"impact"
				}
			],
			"title":"CVE-2024-40906"
		},
		{
			"cve":"CVE-2024-40908",
			"notes":[
				{
					"text":"In the Linux kernel, the following vulnerability has been resolved:\n\nbpf: Set run context for rawtp test_run callback\n\nsyzbot reported crash when rawtp program executed through the\ntest_run interface calls bpf_get_attach_cookie helper or any\nother helper that touches task->bpf_ctx pointer.\n\nSetting the run context (task->bpf_ctx pointer) for test_run\ncallback.",
					"category":"description",
					"title":"Vulnerability Description"
				}
			],
			"product_status":{
				"fixed":[
					"openEuler-24.03-LTS:bpftool-6.6.0-37.0.0.44.oe2403.aarch64",
					"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-37.0.0.44.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-6.6.0-37.0.0.44.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-37.0.0.44.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-debugsource-6.6.0-37.0.0.44.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-devel-6.6.0-37.0.0.44.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-headers-6.6.0-37.0.0.44.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-source-6.6.0-37.0.0.44.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-tools-6.6.0-37.0.0.44.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-37.0.0.44.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-37.0.0.44.oe2403.aarch64",
					"openEuler-24.03-LTS:perf-6.6.0-37.0.0.44.oe2403.aarch64",
					"openEuler-24.03-LTS:perf-debuginfo-6.6.0-37.0.0.44.oe2403.aarch64",
					"openEuler-24.03-LTS:python3-perf-6.6.0-37.0.0.44.oe2403.aarch64",
					"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-37.0.0.44.oe2403.aarch64",
					"openEuler-24.03-LTS:bpftool-6.6.0-37.0.0.44.oe2403.x86_64",
					"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-37.0.0.44.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-6.6.0-37.0.0.44.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-37.0.0.44.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-debugsource-6.6.0-37.0.0.44.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-devel-6.6.0-37.0.0.44.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-headers-6.6.0-37.0.0.44.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-source-6.6.0-37.0.0.44.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-tools-6.6.0-37.0.0.44.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-37.0.0.44.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-37.0.0.44.oe2403.x86_64",
					"openEuler-24.03-LTS:perf-6.6.0-37.0.0.44.oe2403.x86_64",
					"openEuler-24.03-LTS:perf-debuginfo-6.6.0-37.0.0.44.oe2403.x86_64",
					"openEuler-24.03-LTS:python3-perf-6.6.0-37.0.0.44.oe2403.x86_64",
					"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-37.0.0.44.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-6.6.0-37.0.0.44.oe2403.src"
				]
			},
			"remediations":[
				{
					"product_ids":[
						"openEuler-24.03-LTS:bpftool-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-6.6.0-37.0.0.44.oe2403.src"
					],
					"details":"kernel security update",
					"category":"vendor_fix",
					"url":"https://www.openeuler.org/zh/security/security-bulletins/detail/?id=openEuler-SA-2024-1960"
				}
			],
			"scores":[
				{
					"cvss_v3":{
						"baseSeverity":"LOW",
						"baseScore":3.9,
						"vectorString":"CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:L/I:L/A:L",
						"version":"3.1"
					},
					"products":[
						"openEuler-24.03-LTS:bpftool-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-6.6.0-37.0.0.44.oe2403.src"
					]
				}
			],
			"threats":[
				{
					"details":"Low",
					"category":"impact"
				}
			],
			"title":"CVE-2024-40908"
		},
		{
			"cve":"CVE-2024-40913",
			"notes":[
				{
					"text":"In the Linux kernel, the following vulnerability has been resolved:\n\ncachefiles: defer exposing anon_fd until after copy_to_user() succeeds\n\nAfter installing the anonymous fd, we can now see it in userland and close\nit. However, at this point we may not have gotten the reference count of\nthe cache, but we will put it during colse fd, so this may cause a cache\nUAF.\n\nSo grab the cache reference count before fd_install(). In addition, by\nkernel convention, fd is taken over by the user land after fd_install(),\nand the kernel should not call close_fd() after that, i.e., it should call\nfd_install() after everything is ready, thus fd_install() is called after\ncopy_to_user() succeeds.",
					"category":"description",
					"title":"Vulnerability Description"
				}
			],
			"product_status":{
				"fixed":[
					"openEuler-24.03-LTS:bpftool-6.6.0-37.0.0.44.oe2403.aarch64",
					"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-37.0.0.44.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-6.6.0-37.0.0.44.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-37.0.0.44.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-debugsource-6.6.0-37.0.0.44.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-devel-6.6.0-37.0.0.44.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-headers-6.6.0-37.0.0.44.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-source-6.6.0-37.0.0.44.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-tools-6.6.0-37.0.0.44.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-37.0.0.44.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-37.0.0.44.oe2403.aarch64",
					"openEuler-24.03-LTS:perf-6.6.0-37.0.0.44.oe2403.aarch64",
					"openEuler-24.03-LTS:perf-debuginfo-6.6.0-37.0.0.44.oe2403.aarch64",
					"openEuler-24.03-LTS:python3-perf-6.6.0-37.0.0.44.oe2403.aarch64",
					"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-37.0.0.44.oe2403.aarch64",
					"openEuler-24.03-LTS:bpftool-6.6.0-37.0.0.44.oe2403.x86_64",
					"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-37.0.0.44.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-6.6.0-37.0.0.44.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-37.0.0.44.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-debugsource-6.6.0-37.0.0.44.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-devel-6.6.0-37.0.0.44.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-headers-6.6.0-37.0.0.44.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-source-6.6.0-37.0.0.44.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-tools-6.6.0-37.0.0.44.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-37.0.0.44.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-37.0.0.44.oe2403.x86_64",
					"openEuler-24.03-LTS:perf-6.6.0-37.0.0.44.oe2403.x86_64",
					"openEuler-24.03-LTS:perf-debuginfo-6.6.0-37.0.0.44.oe2403.x86_64",
					"openEuler-24.03-LTS:python3-perf-6.6.0-37.0.0.44.oe2403.x86_64",
					"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-37.0.0.44.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-6.6.0-37.0.0.44.oe2403.src"
				]
			},
			"remediations":[
				{
					"product_ids":[
						"openEuler-24.03-LTS:bpftool-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-6.6.0-37.0.0.44.oe2403.src"
					],
					"details":"kernel security update",
					"category":"vendor_fix",
					"url":"https://www.openeuler.org/zh/security/security-bulletins/detail/?id=openEuler-SA-2024-1960"
				}
			],
			"scores":[
				{
					"cvss_v3":{
						"baseSeverity":"MEDIUM",
						"baseScore":6.6,
						"vectorString":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H",
						"version":"3.1"
					},
					"products":[
						"openEuler-24.03-LTS:bpftool-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-6.6.0-37.0.0.44.oe2403.src"
					]
				}
			],
			"threats":[
				{
					"details":"Medium",
					"category":"impact"
				}
			],
			"title":"CVE-2024-40913"
		},
		{
			"cve":"CVE-2024-40920",
			"notes":[
				{
					"text":"In the Linux kernel, the following vulnerability has been resolved:\n\nnet: bridge: mst: fix suspicious rcu usage in br_mst_set_state\n\nI converted br_mst_set_state to RCU to avoid a vlan use-after-free\nbut forgot to change the vlan group dereference helper. Switch to vlan\ngroup RCU deref helper to fix the suspicious rcu usage warning.",
					"category":"description",
					"title":"Vulnerability Description"
				}
			],
			"product_status":{
				"fixed":[
					"openEuler-24.03-LTS:bpftool-6.6.0-37.0.0.44.oe2403.aarch64",
					"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-37.0.0.44.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-6.6.0-37.0.0.44.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-37.0.0.44.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-debugsource-6.6.0-37.0.0.44.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-devel-6.6.0-37.0.0.44.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-headers-6.6.0-37.0.0.44.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-source-6.6.0-37.0.0.44.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-tools-6.6.0-37.0.0.44.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-37.0.0.44.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-37.0.0.44.oe2403.aarch64",
					"openEuler-24.03-LTS:perf-6.6.0-37.0.0.44.oe2403.aarch64",
					"openEuler-24.03-LTS:perf-debuginfo-6.6.0-37.0.0.44.oe2403.aarch64",
					"openEuler-24.03-LTS:python3-perf-6.6.0-37.0.0.44.oe2403.aarch64",
					"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-37.0.0.44.oe2403.aarch64",
					"openEuler-24.03-LTS:bpftool-6.6.0-37.0.0.44.oe2403.x86_64",
					"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-37.0.0.44.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-6.6.0-37.0.0.44.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-37.0.0.44.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-debugsource-6.6.0-37.0.0.44.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-devel-6.6.0-37.0.0.44.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-headers-6.6.0-37.0.0.44.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-source-6.6.0-37.0.0.44.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-tools-6.6.0-37.0.0.44.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-37.0.0.44.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-37.0.0.44.oe2403.x86_64",
					"openEuler-24.03-LTS:perf-6.6.0-37.0.0.44.oe2403.x86_64",
					"openEuler-24.03-LTS:perf-debuginfo-6.6.0-37.0.0.44.oe2403.x86_64",
					"openEuler-24.03-LTS:python3-perf-6.6.0-37.0.0.44.oe2403.x86_64",
					"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-37.0.0.44.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-6.6.0-37.0.0.44.oe2403.src"
				]
			},
			"remediations":[
				{
					"product_ids":[
						"openEuler-24.03-LTS:bpftool-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-6.6.0-37.0.0.44.oe2403.src"
					],
					"details":"kernel security update",
					"category":"vendor_fix",
					"url":"https://www.openeuler.org/zh/security/security-bulletins/detail/?id=openEuler-SA-2024-1960"
				}
			],
			"scores":[
				{
					"cvss_v3":{
						"baseSeverity":"MEDIUM",
						"baseScore":5.5,
						"vectorString":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
						"version":"3.1"
					},
					"products":[
						"openEuler-24.03-LTS:bpftool-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-6.6.0-37.0.0.44.oe2403.src"
					]
				}
			],
			"threats":[
				{
					"details":"Medium",
					"category":"impact"
				}
			],
			"title":"CVE-2024-40920"
		},
		{
			"cve":"CVE-2024-40921",
			"notes":[
				{
					"text":"In the Linux kernel, the following vulnerability has been resolved:\n\nnet: bridge: mst: pass vlan group directly to br_mst_vlan_set_state\n\nPass the already obtained vlan group pointer to br_mst_vlan_set_state()\ninstead of dereferencing it again. Each caller has already correctly\ndereferenced it for their context. This change is required for the\nfollowing suspicious RCU dereference fix. No functional changes\nintended.",
					"category":"description",
					"title":"Vulnerability Description"
				}
			],
			"product_status":{
				"fixed":[
					"openEuler-24.03-LTS:bpftool-6.6.0-37.0.0.44.oe2403.aarch64",
					"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-37.0.0.44.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-6.6.0-37.0.0.44.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-37.0.0.44.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-debugsource-6.6.0-37.0.0.44.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-devel-6.6.0-37.0.0.44.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-headers-6.6.0-37.0.0.44.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-source-6.6.0-37.0.0.44.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-tools-6.6.0-37.0.0.44.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-37.0.0.44.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-37.0.0.44.oe2403.aarch64",
					"openEuler-24.03-LTS:perf-6.6.0-37.0.0.44.oe2403.aarch64",
					"openEuler-24.03-LTS:perf-debuginfo-6.6.0-37.0.0.44.oe2403.aarch64",
					"openEuler-24.03-LTS:python3-perf-6.6.0-37.0.0.44.oe2403.aarch64",
					"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-37.0.0.44.oe2403.aarch64",
					"openEuler-24.03-LTS:bpftool-6.6.0-37.0.0.44.oe2403.x86_64",
					"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-37.0.0.44.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-6.6.0-37.0.0.44.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-37.0.0.44.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-debugsource-6.6.0-37.0.0.44.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-devel-6.6.0-37.0.0.44.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-headers-6.6.0-37.0.0.44.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-source-6.6.0-37.0.0.44.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-tools-6.6.0-37.0.0.44.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-37.0.0.44.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-37.0.0.44.oe2403.x86_64",
					"openEuler-24.03-LTS:perf-6.6.0-37.0.0.44.oe2403.x86_64",
					"openEuler-24.03-LTS:perf-debuginfo-6.6.0-37.0.0.44.oe2403.x86_64",
					"openEuler-24.03-LTS:python3-perf-6.6.0-37.0.0.44.oe2403.x86_64",
					"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-37.0.0.44.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-6.6.0-37.0.0.44.oe2403.src"
				]
			},
			"remediations":[
				{
					"product_ids":[
						"openEuler-24.03-LTS:bpftool-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-6.6.0-37.0.0.44.oe2403.src"
					],
					"details":"kernel security update",
					"category":"vendor_fix",
					"url":"https://www.openeuler.org/zh/security/security-bulletins/detail/?id=openEuler-SA-2024-1960"
				}
			],
			"scores":[
				{
					"cvss_v3":{
						"baseSeverity":"LOW",
						"baseScore":3.9,
						"vectorString":"CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:L/I:L/A:L",
						"version":"3.1"
					},
					"products":[
						"openEuler-24.03-LTS:bpftool-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-6.6.0-37.0.0.44.oe2403.src"
					]
				}
			],
			"threats":[
				{
					"details":"Low",
					"category":"impact"
				}
			],
			"title":"CVE-2024-40921"
		},
		{
			"cve":"CVE-2024-40922",
			"notes":[
				{
					"text":"In the Linux kernel, the following vulnerability has been resolved:\n\nio_uring/rsrc: don't lock while !TASK_RUNNING\n\nThere is a report of io_rsrc_ref_quiesce() locking a mutex while not\nTASK_RUNNING, which is due to forgetting restoring the state back after\nio_run_task_work_sig() and attempts to break out of the waiting loop.\n\ndo not call blocking ops when !TASK_RUNNING; state=1 set at\n[<ffffffff815d2494>] prepare_to_wait+0xa4/0x380\nkernel/sched/wait.c:237\nWARNING: CPU: 2 PID: 397056 at kernel/sched/core.c:10099\n__might_sleep+0x114/0x160 kernel/sched/core.c:10099\nRIP: 0010:__might_sleep+0x114/0x160 kernel/sched/core.c:10099\nCall Trace:\n <TASK>\n __mutex_lock_common kernel/locking/mutex.c:585 [inline]\n __mutex_lock+0xb4/0x940 kernel/locking/mutex.c:752\n io_rsrc_ref_quiesce+0x590/0x940 io_uring/rsrc.c:253\n io_sqe_buffers_unregister+0xa2/0x340 io_uring/rsrc.c:799\n __io_uring_register io_uring/register.c:424 [inline]\n __do_sys_io_uring_register+0x5b9/0x2400 io_uring/register.c:613\n do_syscall_x64 arch/x86/entry/common.c:52 [inline]\n do_syscall_64+0xd8/0x270 arch/x86/entry/common.c:83\n entry_SYSCALL_64_after_hwframe+0x6f/0x77",
					"category":"description",
					"title":"Vulnerability Description"
				}
			],
			"product_status":{
				"fixed":[
					"openEuler-24.03-LTS:bpftool-6.6.0-37.0.0.44.oe2403.aarch64",
					"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-37.0.0.44.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-6.6.0-37.0.0.44.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-37.0.0.44.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-debugsource-6.6.0-37.0.0.44.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-devel-6.6.0-37.0.0.44.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-headers-6.6.0-37.0.0.44.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-source-6.6.0-37.0.0.44.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-tools-6.6.0-37.0.0.44.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-37.0.0.44.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-37.0.0.44.oe2403.aarch64",
					"openEuler-24.03-LTS:perf-6.6.0-37.0.0.44.oe2403.aarch64",
					"openEuler-24.03-LTS:perf-debuginfo-6.6.0-37.0.0.44.oe2403.aarch64",
					"openEuler-24.03-LTS:python3-perf-6.6.0-37.0.0.44.oe2403.aarch64",
					"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-37.0.0.44.oe2403.aarch64",
					"openEuler-24.03-LTS:bpftool-6.6.0-37.0.0.44.oe2403.x86_64",
					"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-37.0.0.44.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-6.6.0-37.0.0.44.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-37.0.0.44.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-debugsource-6.6.0-37.0.0.44.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-devel-6.6.0-37.0.0.44.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-headers-6.6.0-37.0.0.44.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-source-6.6.0-37.0.0.44.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-tools-6.6.0-37.0.0.44.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-37.0.0.44.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-37.0.0.44.oe2403.x86_64",
					"openEuler-24.03-LTS:perf-6.6.0-37.0.0.44.oe2403.x86_64",
					"openEuler-24.03-LTS:perf-debuginfo-6.6.0-37.0.0.44.oe2403.x86_64",
					"openEuler-24.03-LTS:python3-perf-6.6.0-37.0.0.44.oe2403.x86_64",
					"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-37.0.0.44.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-6.6.0-37.0.0.44.oe2403.src"
				]
			},
			"remediations":[
				{
					"product_ids":[
						"openEuler-24.03-LTS:bpftool-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-6.6.0-37.0.0.44.oe2403.src"
					],
					"details":"kernel security update",
					"category":"vendor_fix",
					"url":"https://www.openeuler.org/zh/security/security-bulletins/detail/?id=openEuler-SA-2024-1960"
				}
			],
			"scores":[
				{
					"cvss_v3":{
						"baseSeverity":"MEDIUM",
						"baseScore":5.5,
						"vectorString":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
						"version":"3.1"
					},
					"products":[
						"openEuler-24.03-LTS:bpftool-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-6.6.0-37.0.0.44.oe2403.src"
					]
				}
			],
			"threats":[
				{
					"details":"Medium",
					"category":"impact"
				}
			],
			"title":"CVE-2024-40922"
		},
		{
			"cve":"CVE-2024-40935",
			"notes":[
				{
					"text":"In the Linux kernel, the following vulnerability has been resolved:\n\ncachefiles: flush all requests after setting CACHEFILES_DEAD\n\nIn ondemand mode, when the daemon is processing an open request, if the\nkernel flags the cache as CACHEFILES_DEAD, the cachefiles_daemon_write()\nwill always return -EIO, so the daemon can't pass the copen to the kernel.\nThen the kernel process that is waiting for the copen triggers a hung_task.\n\nSince the DEAD state is irreversible, it can only be exited by closing\n/dev/cachefiles. Therefore, after calling cachefiles_io_error() to mark\nthe cache as CACHEFILES_DEAD, if in ondemand mode, flush all requests to\navoid the above hungtask. We may still be able to read some of the cached\ndata before closing the fd of /dev/cachefiles.\n\nNote that this relies on the patch that adds reference counting to the req,\notherwise it may UAF.",
					"category":"description",
					"title":"Vulnerability Description"
				}
			],
			"product_status":{
				"fixed":[
					"openEuler-24.03-LTS:bpftool-6.6.0-37.0.0.44.oe2403.aarch64",
					"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-37.0.0.44.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-6.6.0-37.0.0.44.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-37.0.0.44.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-debugsource-6.6.0-37.0.0.44.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-devel-6.6.0-37.0.0.44.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-headers-6.6.0-37.0.0.44.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-source-6.6.0-37.0.0.44.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-tools-6.6.0-37.0.0.44.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-37.0.0.44.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-37.0.0.44.oe2403.aarch64",
					"openEuler-24.03-LTS:perf-6.6.0-37.0.0.44.oe2403.aarch64",
					"openEuler-24.03-LTS:perf-debuginfo-6.6.0-37.0.0.44.oe2403.aarch64",
					"openEuler-24.03-LTS:python3-perf-6.6.0-37.0.0.44.oe2403.aarch64",
					"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-37.0.0.44.oe2403.aarch64",
					"openEuler-24.03-LTS:bpftool-6.6.0-37.0.0.44.oe2403.x86_64",
					"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-37.0.0.44.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-6.6.0-37.0.0.44.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-37.0.0.44.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-debugsource-6.6.0-37.0.0.44.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-devel-6.6.0-37.0.0.44.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-headers-6.6.0-37.0.0.44.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-source-6.6.0-37.0.0.44.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-tools-6.6.0-37.0.0.44.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-37.0.0.44.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-37.0.0.44.oe2403.x86_64",
					"openEuler-24.03-LTS:perf-6.6.0-37.0.0.44.oe2403.x86_64",
					"openEuler-24.03-LTS:perf-debuginfo-6.6.0-37.0.0.44.oe2403.x86_64",
					"openEuler-24.03-LTS:python3-perf-6.6.0-37.0.0.44.oe2403.x86_64",
					"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-37.0.0.44.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-6.6.0-37.0.0.44.oe2403.src"
				]
			},
			"remediations":[
				{
					"product_ids":[
						"openEuler-24.03-LTS:bpftool-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-6.6.0-37.0.0.44.oe2403.src"
					],
					"details":"kernel security update",
					"category":"vendor_fix",
					"url":"https://www.openeuler.org/zh/security/security-bulletins/detail/?id=openEuler-SA-2024-1960"
				}
			],
			"scores":[
				{
					"cvss_v3":{
						"baseSeverity":"MEDIUM",
						"baseScore":5.5,
						"vectorString":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
						"version":"3.1"
					},
					"products":[
						"openEuler-24.03-LTS:bpftool-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-6.6.0-37.0.0.44.oe2403.src"
					]
				}
			],
			"threats":[
				{
					"details":"Medium",
					"category":"impact"
				}
			],
			"title":"CVE-2024-40935"
		},
		{
			"cve":"CVE-2024-40953",
			"notes":[
				{
					"text":"In the Linux kernel, the following vulnerability has been resolved:\n\nKVM: Fix a data race on last_boosted_vcpu in kvm_vcpu_on_spin()\n\nUse {READ,WRITE}_ONCE() to access kvm->last_boosted_vcpu to ensure the\nloads and stores are atomic.  In the extremely unlikely scenario the\ncompiler tears the stores, it's theoretically possible for KVM to attempt\nto get a vCPU using an out-of-bounds index, e.g. if the write is split\ninto multiple 8-bit stores, and is paired with a 32-bit load on a VM with\n257 vCPUs:\n\n  CPU0                              CPU1\n  last_boosted_vcpu = 0xff;\n\n                                    (last_boosted_vcpu = 0x100)\n                                    last_boosted_vcpu[15:8] = 0x01;\n  i = (last_boosted_vcpu = 0x1ff)\n                                    last_boosted_vcpu[7:0] = 0x00;\n\n  vcpu = kvm->vcpu_array[0x1ff];\n\nAs detected by KCSAN:\n\n  BUG: KCSAN: data-race in kvm_vcpu_on_spin [kvm] / kvm_vcpu_on_spin [kvm]\n\n  write to 0xffffc90025a92344 of 4 bytes by task 4340 on cpu 16:\n  kvm_vcpu_on_spin (arch/x86/kvm/../../../virt/kvm/kvm_main.c:4112) kvm\n  handle_pause (arch/x86/kvm/vmx/vmx.c:5929) kvm_intel\n  vmx_handle_exit (arch/x86/kvm/vmx/vmx.c:?\n\t\t arch/x86/kvm/vmx/vmx.c:6606) kvm_intel\n  vcpu_run (arch/x86/kvm/x86.c:11107 arch/x86/kvm/x86.c:11211) kvm\n  kvm_arch_vcpu_ioctl_run (arch/x86/kvm/x86.c:?) kvm\n  kvm_vcpu_ioctl (arch/x86/kvm/../../../virt/kvm/kvm_main.c:?) kvm\n  __se_sys_ioctl (fs/ioctl.c:52 fs/ioctl.c:904 fs/ioctl.c:890)\n  __x64_sys_ioctl (fs/ioctl.c:890)\n  x64_sys_call (arch/x86/entry/syscall_64.c:33)\n  do_syscall_64 (arch/x86/entry/common.c:?)\n  entry_SYSCALL_64_after_hwframe (arch/x86/entry/entry_64.S:130)\n\n  read to 0xffffc90025a92344 of 4 bytes by task 4342 on cpu 4:\n  kvm_vcpu_on_spin (arch/x86/kvm/../../../virt/kvm/kvm_main.c:4069) kvm\n  handle_pause (arch/x86/kvm/vmx/vmx.c:5929) kvm_intel\n  vmx_handle_exit (arch/x86/kvm/vmx/vmx.c:?\n\t\t\tarch/x86/kvm/vmx/vmx.c:6606) kvm_intel\n  vcpu_run (arch/x86/kvm/x86.c:11107 arch/x86/kvm/x86.c:11211) kvm\n  kvm_arch_vcpu_ioctl_run (arch/x86/kvm/x86.c:?) kvm\n  kvm_vcpu_ioctl (arch/x86/kvm/../../../virt/kvm/kvm_main.c:?) kvm\n  __se_sys_ioctl (fs/ioctl.c:52 fs/ioctl.c:904 fs/ioctl.c:890)\n  __x64_sys_ioctl (fs/ioctl.c:890)\n  x64_sys_call (arch/x86/entry/syscall_64.c:33)\n  do_syscall_64 (arch/x86/entry/common.c:?)\n  entry_SYSCALL_64_after_hwframe (arch/x86/entry/entry_64.S:130)\n\n  value changed: 0x00000012 -> 0x00000000",
					"category":"description",
					"title":"Vulnerability Description"
				}
			],
			"product_status":{
				"fixed":[
					"openEuler-24.03-LTS:bpftool-6.6.0-37.0.0.44.oe2403.aarch64",
					"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-37.0.0.44.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-6.6.0-37.0.0.44.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-37.0.0.44.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-debugsource-6.6.0-37.0.0.44.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-devel-6.6.0-37.0.0.44.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-headers-6.6.0-37.0.0.44.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-source-6.6.0-37.0.0.44.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-tools-6.6.0-37.0.0.44.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-37.0.0.44.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-37.0.0.44.oe2403.aarch64",
					"openEuler-24.03-LTS:perf-6.6.0-37.0.0.44.oe2403.aarch64",
					"openEuler-24.03-LTS:perf-debuginfo-6.6.0-37.0.0.44.oe2403.aarch64",
					"openEuler-24.03-LTS:python3-perf-6.6.0-37.0.0.44.oe2403.aarch64",
					"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-37.0.0.44.oe2403.aarch64",
					"openEuler-24.03-LTS:bpftool-6.6.0-37.0.0.44.oe2403.x86_64",
					"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-37.0.0.44.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-6.6.0-37.0.0.44.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-37.0.0.44.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-debugsource-6.6.0-37.0.0.44.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-devel-6.6.0-37.0.0.44.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-headers-6.6.0-37.0.0.44.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-source-6.6.0-37.0.0.44.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-tools-6.6.0-37.0.0.44.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-37.0.0.44.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-37.0.0.44.oe2403.x86_64",
					"openEuler-24.03-LTS:perf-6.6.0-37.0.0.44.oe2403.x86_64",
					"openEuler-24.03-LTS:perf-debuginfo-6.6.0-37.0.0.44.oe2403.x86_64",
					"openEuler-24.03-LTS:python3-perf-6.6.0-37.0.0.44.oe2403.x86_64",
					"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-37.0.0.44.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-6.6.0-37.0.0.44.oe2403.src"
				]
			},
			"remediations":[
				{
					"product_ids":[
						"openEuler-24.03-LTS:bpftool-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-6.6.0-37.0.0.44.oe2403.src"
					],
					"details":"kernel security update",
					"category":"vendor_fix",
					"url":"https://www.openeuler.org/zh/security/security-bulletins/detail/?id=openEuler-SA-2024-1960"
				}
			],
			"scores":[
				{
					"cvss_v3":{
						"baseSeverity":"LOW",
						"baseScore":3.9,
						"vectorString":"CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:L/I:L/A:L",
						"version":"3.1"
					},
					"products":[
						"openEuler-24.03-LTS:bpftool-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-6.6.0-37.0.0.44.oe2403.src"
					]
				}
			],
			"threats":[
				{
					"details":"Low",
					"category":"impact"
				}
			],
			"title":"CVE-2024-40953"
		},
		{
			"cve":"CVE-2024-40962",
			"notes":[
				{
					"text":"In the Linux kernel, the following vulnerability has been resolved:\n\nbtrfs: zoned: allocate dummy checksums for zoned NODATASUM writes\n\nShin'ichiro reported that when he's running fstests' test-case\nbtrfs/167 on emulated zoned devices, he's seeing the following NULL\npointer dereference in 'btrfs_zone_finish_endio()':\n\n  Oops: general protection fault, probably for non-canonical address 0xdffffc0000000011: 0000 [#1] PREEMPT SMP KASAN NOPTI\n  KASAN: null-ptr-deref in range [0x0000000000000088-0x000000000000008f]\n  CPU: 4 PID: 2332440 Comm: kworker/u80:15 Tainted: G        W          6.10.0-rc2-kts+ #4\n  Hardware name: Supermicro Super Server/X11SPi-TF, BIOS 3.3 02/21/2020\n  Workqueue: btrfs-endio-write btrfs_work_helper [btrfs]\n  RIP: 0010:btrfs_zone_finish_endio.part.0+0x34/0x160 [btrfs]\n\n  RSP: 0018:ffff88867f107a90 EFLAGS: 00010206\n  RAX: dffffc0000000000 RBX: 0000000000000000 RCX: ffffffff893e5534\n  RDX: 0000000000000011 RSI: 0000000000000004 RDI: 0000000000000088\n  RBP: 0000000000000002 R08: 0000000000000001 R09: ffffed1081696028\n  R10: ffff88840b4b0143 R11: ffff88834dfff600 R12: ffff88840b4b0000\n  R13: 0000000000020000 R14: 0000000000000000 R15: ffff888530ad5210\n  FS:  0000000000000000(0000) GS:ffff888e3f800000(0000) knlGS:0000000000000000\n  CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033\n  CR2: 00007f87223fff38 CR3: 00000007a7c6a002 CR4: 00000000007706f0\n  DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000\n  DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400\n  PKRU: 55555554\n  Call Trace:\n   <TASK>\n   ? __die_body.cold+0x19/0x27\n   ? die_addr+0x46/0x70\n   ? exc_general_protection+0x14f/0x250\n   ? asm_exc_general_protection+0x26/0x30\n   ? do_raw_read_unlock+0x44/0x70\n   ? btrfs_zone_finish_endio.part.0+0x34/0x160 [btrfs]\n   btrfs_finish_one_ordered+0x5d9/0x19a0 [btrfs]\n   ? __pfx_lock_release+0x10/0x10\n   ? do_raw_write_lock+0x90/0x260\n   ? __pfx_do_raw_write_lock+0x10/0x10\n   ? __pfx_btrfs_finish_one_ordered+0x10/0x10 [btrfs]\n   ? _raw_write_unlock+0x23/0x40\n   ? btrfs_finish_ordered_zoned+0x5a9/0x850 [btrfs]\n   ? lock_acquire+0x435/0x500\n   btrfs_work_helper+0x1b1/0xa70 [btrfs]\n   ? __schedule+0x10a8/0x60b0\n   ? __pfx___might_resched+0x10/0x10\n   process_one_work+0x862/0x1410\n   ? __pfx_lock_acquire+0x10/0x10\n   ? __pfx_process_one_work+0x10/0x10\n   ? assign_work+0x16c/0x240\n   worker_thread+0x5e6/0x1010\n   ? __pfx_worker_thread+0x10/0x10\n   kthread+0x2c3/0x3a0\n   ? trace_irq_enable.constprop.0+0xce/0x110\n   ? __pfx_kthread+0x10/0x10\n   ret_from_fork+0x31/0x70\n   ? __pfx_kthread+0x10/0x10\n   ret_from_fork_asm+0x1a/0x30\n   </TASK>\n\nEnabling CONFIG_BTRFS_ASSERT revealed the following assertion to\ntrigger:\n\n  assertion failed: !list_empty(&ordered->list), in fs/btrfs/zoned.c:1815\n\nThis indicates, that we're missing the checksums list on the\nordered_extent. As btrfs/167 is doing a NOCOW write this is to be\nexpected.\n\nFurther analysis with drgn confirmed the assumption:\n\n  >>> inode = prog.crashed_thread().stack_trace()[11]['ordered'].inode\n  >>> btrfs_inode = drgn.container_of(inode, \"struct btrfs_inode\", \\\n         \t\t\t\t\"vfs_inode\")\n  >>> print(btrfs_inode.flags)\n  (u32)1\n\nAs zoned emulation mode simulates conventional zones on regular devices,\nwe cannot use zone-append for writing. But we're only attaching dummy\nchecksums if we're doing a zone-append write.\n\nSo for NOCOW zoned data writes on conventional zones, also attach a\ndummy checksum.",
					"category":"description",
					"title":"Vulnerability Description"
				}
			],
			"product_status":{
				"fixed":[
					"openEuler-24.03-LTS:bpftool-6.6.0-37.0.0.44.oe2403.aarch64",
					"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-37.0.0.44.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-6.6.0-37.0.0.44.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-37.0.0.44.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-debugsource-6.6.0-37.0.0.44.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-devel-6.6.0-37.0.0.44.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-headers-6.6.0-37.0.0.44.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-source-6.6.0-37.0.0.44.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-tools-6.6.0-37.0.0.44.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-37.0.0.44.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-37.0.0.44.oe2403.aarch64",
					"openEuler-24.03-LTS:perf-6.6.0-37.0.0.44.oe2403.aarch64",
					"openEuler-24.03-LTS:perf-debuginfo-6.6.0-37.0.0.44.oe2403.aarch64",
					"openEuler-24.03-LTS:python3-perf-6.6.0-37.0.0.44.oe2403.aarch64",
					"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-37.0.0.44.oe2403.aarch64",
					"openEuler-24.03-LTS:bpftool-6.6.0-37.0.0.44.oe2403.x86_64",
					"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-37.0.0.44.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-6.6.0-37.0.0.44.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-37.0.0.44.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-debugsource-6.6.0-37.0.0.44.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-devel-6.6.0-37.0.0.44.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-headers-6.6.0-37.0.0.44.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-source-6.6.0-37.0.0.44.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-tools-6.6.0-37.0.0.44.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-37.0.0.44.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-37.0.0.44.oe2403.x86_64",
					"openEuler-24.03-LTS:perf-6.6.0-37.0.0.44.oe2403.x86_64",
					"openEuler-24.03-LTS:perf-debuginfo-6.6.0-37.0.0.44.oe2403.x86_64",
					"openEuler-24.03-LTS:python3-perf-6.6.0-37.0.0.44.oe2403.x86_64",
					"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-37.0.0.44.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-6.6.0-37.0.0.44.oe2403.src"
				]
			},
			"remediations":[
				{
					"product_ids":[
						"openEuler-24.03-LTS:bpftool-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-6.6.0-37.0.0.44.oe2403.src"
					],
					"details":"kernel security update",
					"category":"vendor_fix",
					"url":"https://www.openeuler.org/zh/security/security-bulletins/detail/?id=openEuler-SA-2024-1960"
				}
			],
			"scores":[
				{
					"cvss_v3":{
						"baseSeverity":"MEDIUM",
						"baseScore":5.5,
						"vectorString":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
						"version":"3.1"
					},
					"products":[
						"openEuler-24.03-LTS:bpftool-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-6.6.0-37.0.0.44.oe2403.src"
					]
				}
			],
			"threats":[
				{
					"details":"Medium",
					"category":"impact"
				}
			],
			"title":"CVE-2024-40962"
		},
		{
			"cve":"CVE-2024-40967",
			"notes":[
				{
					"text":"In the Linux kernel, the following vulnerability has been resolved:\n\nserial: imx: Introduce timeout when waiting on transmitter empty\n\nBy waiting at most 1 second for USR2_TXDC to be set, we avoid a potential\ndeadlock.\n\nIn case of the timeout, there is not much we can do, so we simply ignore\nthe transmitter state and optimistically try to continue.",
					"category":"description",
					"title":"Vulnerability Description"
				}
			],
			"product_status":{
				"fixed":[
					"openEuler-24.03-LTS:bpftool-6.6.0-37.0.0.44.oe2403.aarch64",
					"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-37.0.0.44.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-6.6.0-37.0.0.44.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-37.0.0.44.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-debugsource-6.6.0-37.0.0.44.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-devel-6.6.0-37.0.0.44.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-headers-6.6.0-37.0.0.44.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-source-6.6.0-37.0.0.44.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-tools-6.6.0-37.0.0.44.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-37.0.0.44.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-37.0.0.44.oe2403.aarch64",
					"openEuler-24.03-LTS:perf-6.6.0-37.0.0.44.oe2403.aarch64",
					"openEuler-24.03-LTS:perf-debuginfo-6.6.0-37.0.0.44.oe2403.aarch64",
					"openEuler-24.03-LTS:python3-perf-6.6.0-37.0.0.44.oe2403.aarch64",
					"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-37.0.0.44.oe2403.aarch64",
					"openEuler-24.03-LTS:bpftool-6.6.0-37.0.0.44.oe2403.x86_64",
					"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-37.0.0.44.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-6.6.0-37.0.0.44.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-37.0.0.44.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-debugsource-6.6.0-37.0.0.44.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-devel-6.6.0-37.0.0.44.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-headers-6.6.0-37.0.0.44.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-source-6.6.0-37.0.0.44.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-tools-6.6.0-37.0.0.44.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-37.0.0.44.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-37.0.0.44.oe2403.x86_64",
					"openEuler-24.03-LTS:perf-6.6.0-37.0.0.44.oe2403.x86_64",
					"openEuler-24.03-LTS:perf-debuginfo-6.6.0-37.0.0.44.oe2403.x86_64",
					"openEuler-24.03-LTS:python3-perf-6.6.0-37.0.0.44.oe2403.x86_64",
					"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-37.0.0.44.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-6.6.0-37.0.0.44.oe2403.src"
				]
			},
			"remediations":[
				{
					"product_ids":[
						"openEuler-24.03-LTS:bpftool-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-6.6.0-37.0.0.44.oe2403.src"
					],
					"details":"kernel security update",
					"category":"vendor_fix",
					"url":"https://www.openeuler.org/zh/security/security-bulletins/detail/?id=openEuler-SA-2024-1960"
				}
			],
			"scores":[
				{
					"cvss_v3":{
						"baseSeverity":"LOW",
						"baseScore":3.9,
						"vectorString":"CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:L/I:L/A:L",
						"version":"3.1"
					},
					"products":[
						"openEuler-24.03-LTS:bpftool-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-6.6.0-37.0.0.44.oe2403.src"
					]
				}
			],
			"threats":[
				{
					"details":"Low",
					"category":"impact"
				}
			],
			"title":"CVE-2024-40967"
		},
		{
			"cve":"CVE-2024-40981",
			"notes":[
				{
					"text":"In the Linux kernel, the following vulnerability has been resolved:\n\nbatman-adv: bypass empty buckets in batadv_purge_orig_ref()\n\nMany syzbot reports are pointing to soft lockups in\nbatadv_purge_orig_ref() [1]\n\nRoot cause is unknown, but we can avoid spending too much\ntime there and perhaps get more interesting reports.\n\n[1]\n\nwatchdog: BUG: soft lockup - CPU#0 stuck for 27s! [kworker/u4:6:621]\nModules linked in:\nirq event stamp: 6182794\n hardirqs last  enabled at (6182793): [<ffff8000801dae10>] __local_bh_enable_ip+0x224/0x44c kernel/softirq.c:386\n hardirqs last disabled at (6182794): [<ffff80008ad66a78>] __el1_irq arch/arm64/kernel/entry-common.c:533 [inline]\n hardirqs last disabled at (6182794): [<ffff80008ad66a78>] el1_interrupt+0x24/0x68 arch/arm64/kernel/entry-common.c:551\n softirqs last  enabled at (6182792): [<ffff80008aab71c4>] spin_unlock_bh include/linux/spinlock.h:396 [inline]\n softirqs last  enabled at (6182792): [<ffff80008aab71c4>] batadv_purge_orig_ref+0x114c/0x1228 net/batman-adv/originator.c:1287\n softirqs last disabled at (6182790): [<ffff80008aab61dc>] spin_lock_bh include/linux/spinlock.h:356 [inline]\n softirqs last disabled at (6182790): [<ffff80008aab61dc>] batadv_purge_orig_ref+0x164/0x1228 net/batman-adv/originator.c:1271\nCPU: 0 PID: 621 Comm: kworker/u4:6 Not tainted 6.8.0-rc7-syzkaller-g707081b61156 #0\nHardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/29/2024\nWorkqueue: bat_events batadv_purge_orig\npstate: 80400005 (Nzcv daif +PAN -UAO -TCO -DIT -SSBS BTYPE=--)\n pc : should_resched arch/arm64/include/asm/preempt.h:79 [inline]\n pc : __local_bh_enable_ip+0x228/0x44c kernel/softirq.c:388\n lr : __local_bh_enable_ip+0x224/0x44c kernel/softirq.c:386\nsp : ffff800099007970\nx29: ffff800099007980 x28: 1fffe00018fce1bd x27: dfff800000000000\nx26: ffff0000d2620008 x25: ffff0000c7e70de8 x24: 0000000000000001\nx23: 1fffe00018e57781 x22: dfff800000000000 x21: ffff80008aab71c4\nx20: ffff0001b40136c0 x19: ffff0000c72bbc08 x18: 1fffe0001a817bb0\nx17: ffff800125414000 x16: ffff80008032116c x15: 0000000000000001\nx14: 1fffe0001ee9d610 x13: 0000000000000000 x12: 0000000000000003\nx11: 0000000000000000 x10: 0000000000ff0100 x9 : 0000000000000000\nx8 : 00000000005e5789 x7 : ffff80008aab61dc x6 : 0000000000000000\nx5 : 0000000000000000 x4 : 0000000000000001 x3 : 0000000000000000\nx2 : 0000000000000006 x1 : 0000000000000080 x0 : ffff800125414000\nCall trace:\n  __daif_local_irq_enable arch/arm64/include/asm/irqflags.h:27 [inline]\n  arch_local_irq_enable arch/arm64/include/asm/irqflags.h:49 [inline]\n  __local_bh_enable_ip+0x228/0x44c kernel/softirq.c:386\n  __raw_spin_unlock_bh include/linux/spinlock_api_smp.h:167 [inline]\n  _raw_spin_unlock_bh+0x3c/0x4c kernel/locking/spinlock.c:210\n  spin_unlock_bh include/linux/spinlock.h:396 [inline]\n  batadv_purge_orig_ref+0x114c/0x1228 net/batman-adv/originator.c:1287\n  batadv_purge_orig+0x20/0x70 net/batman-adv/originator.c:1300\n  process_one_work+0x694/0x1204 kernel/workqueue.c:2633\n  process_scheduled_works kernel/workqueue.c:2706 [inline]\n  worker_thread+0x938/0xef4 kernel/workqueue.c:2787\n  kthread+0x288/0x310 kernel/kthread.c:388\n  ret_from_fork+0x10/0x20 arch/arm64/kernel/entry.S:860\nSending NMI from CPU 0 to CPUs 1:\nNMI backtrace for cpu 1\nCPU: 1 PID: 0 Comm: swapper/1 Not tainted 6.8.0-rc7-syzkaller-g707081b61156 #0\nHardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/29/2024\npstate: 80400005 (Nzcv daif +PAN -UAO -TCO -DIT -SSBS BTYPE=--)\n pc : arch_local_irq_enable+0x8/0xc arch/arm64/include/asm/irqflags.h:51\n lr : default_idle_call+0xf8/0x128 kernel/sched/idle.c:103\nsp : ffff800093a17d30\nx29: ffff800093a17d30 x28: dfff800000000000 x27: 1ffff00012742fb4\nx26: ffff80008ec9d000 x25: 0000000000000000 x24: 0000000000000002\nx23: 1ffff00011d93a74 x22: ffff80008ec9d3a0 x21: 0000000000000000\nx20: ffff0000c19dbc00 x19: ffff8000802d0fd8 x18: 1fffe00036804396\nx17: ffff80008ec9d000 x16: ffff8000802d089c x15: 0000000000000001\n---truncated---",
					"category":"description",
					"title":"Vulnerability Description"
				}
			],
			"product_status":{
				"fixed":[
					"openEuler-24.03-LTS:bpftool-6.6.0-37.0.0.44.oe2403.aarch64",
					"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-37.0.0.44.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-6.6.0-37.0.0.44.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-37.0.0.44.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-debugsource-6.6.0-37.0.0.44.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-devel-6.6.0-37.0.0.44.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-headers-6.6.0-37.0.0.44.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-source-6.6.0-37.0.0.44.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-tools-6.6.0-37.0.0.44.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-37.0.0.44.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-37.0.0.44.oe2403.aarch64",
					"openEuler-24.03-LTS:perf-6.6.0-37.0.0.44.oe2403.aarch64",
					"openEuler-24.03-LTS:perf-debuginfo-6.6.0-37.0.0.44.oe2403.aarch64",
					"openEuler-24.03-LTS:python3-perf-6.6.0-37.0.0.44.oe2403.aarch64",
					"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-37.0.0.44.oe2403.aarch64",
					"openEuler-24.03-LTS:bpftool-6.6.0-37.0.0.44.oe2403.x86_64",
					"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-37.0.0.44.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-6.6.0-37.0.0.44.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-37.0.0.44.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-debugsource-6.6.0-37.0.0.44.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-devel-6.6.0-37.0.0.44.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-headers-6.6.0-37.0.0.44.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-source-6.6.0-37.0.0.44.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-tools-6.6.0-37.0.0.44.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-37.0.0.44.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-37.0.0.44.oe2403.x86_64",
					"openEuler-24.03-LTS:perf-6.6.0-37.0.0.44.oe2403.x86_64",
					"openEuler-24.03-LTS:perf-debuginfo-6.6.0-37.0.0.44.oe2403.x86_64",
					"openEuler-24.03-LTS:python3-perf-6.6.0-37.0.0.44.oe2403.x86_64",
					"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-37.0.0.44.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-6.6.0-37.0.0.44.oe2403.src"
				]
			},
			"remediations":[
				{
					"product_ids":[
						"openEuler-24.03-LTS:bpftool-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-6.6.0-37.0.0.44.oe2403.src"
					],
					"details":"kernel security update",
					"category":"vendor_fix",
					"url":"https://www.openeuler.org/zh/security/security-bulletins/detail/?id=openEuler-SA-2024-1960"
				}
			],
			"scores":[
				{
					"cvss_v3":{
						"baseSeverity":"MEDIUM",
						"baseScore":5.5,
						"vectorString":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
						"version":"3.1"
					},
					"products":[
						"openEuler-24.03-LTS:bpftool-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-6.6.0-37.0.0.44.oe2403.src"
					]
				}
			],
			"threats":[
				{
					"details":"Medium",
					"category":"impact"
				}
			],
			"title":"CVE-2024-40981"
		},
		{
			"cve":"CVE-2024-41006",
			"notes":[
				{
					"text":"In the Linux kernel, the following vulnerability has been resolved:\n\nnetrom: Fix a memory leak in nr_heartbeat_expiry()\n\nsyzbot reported a memory leak in nr_create() [0].\n\nCommit 409db27e3a2e (\"netrom: Fix use-after-free of a listening socket.\")\nadded sock_hold() to the nr_heartbeat_expiry() function, where\na) a socket has a SOCK_DESTROY flag or\nb) a listening socket has a SOCK_DEAD flag.\n\nBut in the case \"a,\" when the SOCK_DESTROY flag is set, the file descriptor\nhas already been closed and the nr_release() function has been called.\nSo it makes no sense to hold the reference count because no one will\ncall another nr_destroy_socket() and put it as in the case \"b.\"\n\nnr_connect\n  nr_establish_data_link\n    nr_start_heartbeat\n\nnr_release\n  switch (nr->state)\n  case NR_STATE_3\n    nr->state = NR_STATE_2\n    sock_set_flag(sk, SOCK_DESTROY);\n\n                        nr_rx_frame\n                          nr_process_rx_frame\n                            switch (nr->state)\n                            case NR_STATE_2\n                              nr_state2_machine()\n                                nr_disconnect()\n                                  nr_sk(sk)->state = NR_STATE_0\n                                  sock_set_flag(sk, SOCK_DEAD)\n\n                        nr_heartbeat_expiry\n                          switch (nr->state)\n                          case NR_STATE_0\n                            if (sock_flag(sk, SOCK_DESTROY) ||\n                               (sk->sk_state == TCP_LISTEN\n                                 && sock_flag(sk, SOCK_DEAD)))\n                               sock_hold()  // ( !!! )\n                               nr_destroy_socket()\n\nTo fix the memory leak, let's call sock_hold() only for a listening socket.\n\nFound by InfoTeCS on behalf of Linux Verification Center\n(linuxtesting.org) with Syzkaller.\n\n[0]: https://syzkaller.appspot.com/bug?extid=d327a1f3b12e1e206c16",
					"category":"description",
					"title":"Vulnerability Description"
				}
			],
			"product_status":{
				"fixed":[
					"openEuler-24.03-LTS:bpftool-6.6.0-37.0.0.44.oe2403.aarch64",
					"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-37.0.0.44.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-6.6.0-37.0.0.44.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-37.0.0.44.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-debugsource-6.6.0-37.0.0.44.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-devel-6.6.0-37.0.0.44.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-headers-6.6.0-37.0.0.44.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-source-6.6.0-37.0.0.44.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-tools-6.6.0-37.0.0.44.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-37.0.0.44.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-37.0.0.44.oe2403.aarch64",
					"openEuler-24.03-LTS:perf-6.6.0-37.0.0.44.oe2403.aarch64",
					"openEuler-24.03-LTS:perf-debuginfo-6.6.0-37.0.0.44.oe2403.aarch64",
					"openEuler-24.03-LTS:python3-perf-6.6.0-37.0.0.44.oe2403.aarch64",
					"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-37.0.0.44.oe2403.aarch64",
					"openEuler-24.03-LTS:bpftool-6.6.0-37.0.0.44.oe2403.x86_64",
					"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-37.0.0.44.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-6.6.0-37.0.0.44.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-37.0.0.44.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-debugsource-6.6.0-37.0.0.44.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-devel-6.6.0-37.0.0.44.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-headers-6.6.0-37.0.0.44.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-source-6.6.0-37.0.0.44.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-tools-6.6.0-37.0.0.44.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-37.0.0.44.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-37.0.0.44.oe2403.x86_64",
					"openEuler-24.03-LTS:perf-6.6.0-37.0.0.44.oe2403.x86_64",
					"openEuler-24.03-LTS:perf-debuginfo-6.6.0-37.0.0.44.oe2403.x86_64",
					"openEuler-24.03-LTS:python3-perf-6.6.0-37.0.0.44.oe2403.x86_64",
					"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-37.0.0.44.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-6.6.0-37.0.0.44.oe2403.src"
				]
			},
			"remediations":[
				{
					"product_ids":[
						"openEuler-24.03-LTS:bpftool-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-6.6.0-37.0.0.44.oe2403.src"
					],
					"details":"kernel security update",
					"category":"vendor_fix",
					"url":"https://www.openeuler.org/zh/security/security-bulletins/detail/?id=openEuler-SA-2024-1960"
				}
			],
			"scores":[
				{
					"cvss_v3":{
						"baseSeverity":"LOW",
						"baseScore":3.9,
						"vectorString":"CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:L/I:L/A:L",
						"version":"3.1"
					},
					"products":[
						"openEuler-24.03-LTS:bpftool-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-6.6.0-37.0.0.44.oe2403.src"
					]
				}
			],
			"threats":[
				{
					"details":"Low",
					"category":"impact"
				}
			],
			"title":"CVE-2024-41006"
		},
		{
			"cve":"CVE-2024-41010",
			"notes":[
				{
					"text":"In the Linux kernel, the following vulnerability has been resolved:bpf: Fix too early release of tcx_entryPedro Pinto and later independently also Hyunwoo Kim and Wongi Lee reportedan issue that the tcx_entry can be released too early leading to a useafter free (UAF) when an active old-style ingress or clsact qdisc with ashared tc block is later replaced by another ingress or clsact instance.Essentially, the sequence to trigger the UAF (one example) can be as follows:  1. A network namespace is created  2. An ingress qdisc is created. This allocates a tcx_entry, and     &tcx_entry->miniq is stored in the qdisc s miniqp->p_miniq. At the     same time, a tcf block with index 1 is created.  3. chain0 is attached to the tcf block. chain0 must be connected to     the block linked to the ingress qdisc to later reach the function     tcf_chain0_head_change_cb_del() which triggers the UAF.  4. Create and graft a clsact qdisc. This causes the ingress qdisc     created in step 1 to be removed, thus freeing the previously linked     tcx_entry:     rtnetlink_rcv_msg()       => tc_modify_qdisc()         => qdisc_create()           => clsact_init() [a]         => qdisc_graft()           => qdisc_destroy()             => __qdisc_destroy()               => ingress_destroy() [b]                 => tcx_entry_free()                   => kfree_rcu() // tcx_entry freed  5. Finally, the network namespace is closed. This registers the     cleanup_net worker, and during the process of releasing the     remaining clsact qdisc, it accesses the tcx_entry that was     already freed in step 4, causing the UAF to occur:     cleanup_net()       => ops_exit_list()         => default_device_exit_batch()           => unregister_netdevice_many()             => unregister_netdevice_many_notify()               => dev_shutdown()                 => qdisc_put()                   => clsact_destroy() [c]                     => tcf_block_put_ext()                       => tcf_chain0_head_change_cb_del()                         => tcf_chain_head_change_item()                           => clsact_chain_head_change()                             => mini_qdisc_pair_swap() // UAFThere are also other variants, the gist is to add an ingress (or clsact)qdisc with a specific shared block, then to replace that qdisc, waitingfor the tcx_entry kfree_rcu() to be executed and subsequently accessingthe current active qdisc s miniq one way or another.The correct fix is to turn the miniq_active boolean into a counter. Whatcan be observed, at step 2 above, the counter transitions from 0->1, atstep [a] from 1->2 (in order for the miniq object to remain active duringthe replacement), then in [b] from 2->1 and finally [c] 1->0 with theeventual release. The reference counter in general ranges from [0,2] andit does not need to be atomic since all access to the counter is protectedby the rtnl mutex. With this in place, there is no longer a UAF happeningand the tcx_entry is freed at the correct time.",
					"category":"description",
					"title":"Vulnerability Description"
				}
			],
			"product_status":{
				"fixed":[
					"openEuler-24.03-LTS:bpftool-6.6.0-37.0.0.44.oe2403.aarch64",
					"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-37.0.0.44.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-6.6.0-37.0.0.44.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-37.0.0.44.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-debugsource-6.6.0-37.0.0.44.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-devel-6.6.0-37.0.0.44.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-headers-6.6.0-37.0.0.44.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-source-6.6.0-37.0.0.44.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-tools-6.6.0-37.0.0.44.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-37.0.0.44.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-37.0.0.44.oe2403.aarch64",
					"openEuler-24.03-LTS:perf-6.6.0-37.0.0.44.oe2403.aarch64",
					"openEuler-24.03-LTS:perf-debuginfo-6.6.0-37.0.0.44.oe2403.aarch64",
					"openEuler-24.03-LTS:python3-perf-6.6.0-37.0.0.44.oe2403.aarch64",
					"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-37.0.0.44.oe2403.aarch64",
					"openEuler-24.03-LTS:bpftool-6.6.0-37.0.0.44.oe2403.x86_64",
					"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-37.0.0.44.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-6.6.0-37.0.0.44.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-37.0.0.44.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-debugsource-6.6.0-37.0.0.44.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-devel-6.6.0-37.0.0.44.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-headers-6.6.0-37.0.0.44.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-source-6.6.0-37.0.0.44.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-tools-6.6.0-37.0.0.44.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-37.0.0.44.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-37.0.0.44.oe2403.x86_64",
					"openEuler-24.03-LTS:perf-6.6.0-37.0.0.44.oe2403.x86_64",
					"openEuler-24.03-LTS:perf-debuginfo-6.6.0-37.0.0.44.oe2403.x86_64",
					"openEuler-24.03-LTS:python3-perf-6.6.0-37.0.0.44.oe2403.x86_64",
					"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-37.0.0.44.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-6.6.0-37.0.0.44.oe2403.src"
				]
			},
			"remediations":[
				{
					"product_ids":[
						"openEuler-24.03-LTS:bpftool-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-6.6.0-37.0.0.44.oe2403.src"
					],
					"details":"kernel security update",
					"category":"vendor_fix",
					"url":"https://www.openeuler.org/zh/security/security-bulletins/detail/?id=openEuler-SA-2024-1960"
				}
			],
			"scores":[
				{
					"cvss_v3":{
						"baseSeverity":"MEDIUM",
						"baseScore":5.5,
						"vectorString":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
						"version":"3.1"
					},
					"products":[
						"openEuler-24.03-LTS:bpftool-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-6.6.0-37.0.0.44.oe2403.src"
					]
				}
			],
			"threats":[
				{
					"details":"Medium",
					"category":"impact"
				}
			],
			"title":"CVE-2024-41010"
		},
		{
			"cve":"CVE-2024-41013",
			"notes":[
				{
					"text":"In the Linux kernel, the following vulnerability has been resolved:\n\nxfs: don't walk off the end of a directory data block\n\nThis adds sanity checks for xfs_dir2_data_unused and xfs_dir2_data_entry\nto make sure don't stray beyond valid memory region. Before patching, the\nloop simply checks that the start offset of the dup and dep is within the\nrange. So in a crafted image, if last entry is xfs_dir2_data_unused, we\ncan change dup->length to dup->length-1 and leave 1 byte of space. In the\nnext traversal, this space will be considered as dup or dep. We may\nencounter an out of bound read when accessing the fixed members.\n\nIn the patch, we make sure that the remaining bytes large enough to hold\nan unused entry before accessing xfs_dir2_data_unused and\nxfs_dir2_data_unused is XFS_DIR2_DATA_ALIGN byte aligned. We also make\nsure that the remaining bytes large enough to hold a dirent with a\nsingle-byte name before accessing xfs_dir2_data_entry.",
					"category":"description",
					"title":"Vulnerability Description"
				}
			],
			"product_status":{
				"fixed":[
					"openEuler-24.03-LTS:bpftool-6.6.0-37.0.0.44.oe2403.aarch64",
					"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-37.0.0.44.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-6.6.0-37.0.0.44.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-37.0.0.44.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-debugsource-6.6.0-37.0.0.44.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-devel-6.6.0-37.0.0.44.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-headers-6.6.0-37.0.0.44.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-source-6.6.0-37.0.0.44.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-tools-6.6.0-37.0.0.44.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-37.0.0.44.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-37.0.0.44.oe2403.aarch64",
					"openEuler-24.03-LTS:perf-6.6.0-37.0.0.44.oe2403.aarch64",
					"openEuler-24.03-LTS:perf-debuginfo-6.6.0-37.0.0.44.oe2403.aarch64",
					"openEuler-24.03-LTS:python3-perf-6.6.0-37.0.0.44.oe2403.aarch64",
					"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-37.0.0.44.oe2403.aarch64",
					"openEuler-24.03-LTS:bpftool-6.6.0-37.0.0.44.oe2403.x86_64",
					"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-37.0.0.44.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-6.6.0-37.0.0.44.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-37.0.0.44.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-debugsource-6.6.0-37.0.0.44.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-devel-6.6.0-37.0.0.44.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-headers-6.6.0-37.0.0.44.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-source-6.6.0-37.0.0.44.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-tools-6.6.0-37.0.0.44.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-37.0.0.44.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-37.0.0.44.oe2403.x86_64",
					"openEuler-24.03-LTS:perf-6.6.0-37.0.0.44.oe2403.x86_64",
					"openEuler-24.03-LTS:perf-debuginfo-6.6.0-37.0.0.44.oe2403.x86_64",
					"openEuler-24.03-LTS:python3-perf-6.6.0-37.0.0.44.oe2403.x86_64",
					"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-37.0.0.44.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-6.6.0-37.0.0.44.oe2403.src"
				]
			},
			"remediations":[
				{
					"product_ids":[
						"openEuler-24.03-LTS:bpftool-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-6.6.0-37.0.0.44.oe2403.src"
					],
					"details":"kernel security update",
					"category":"vendor_fix",
					"url":"https://www.openeuler.org/zh/security/security-bulletins/detail/?id=openEuler-SA-2024-1960"
				}
			],
			"scores":[
				{
					"cvss_v3":{
						"baseSeverity":"LOW",
						"baseScore":3.3,
						"vectorString":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N",
						"version":"3.1"
					},
					"products":[
						"openEuler-24.03-LTS:bpftool-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-6.6.0-37.0.0.44.oe2403.src"
					]
				}
			],
			"threats":[
				{
					"details":"Low",
					"category":"impact"
				}
			],
			"title":"CVE-2024-41013"
		},
		{
			"cve":"CVE-2024-41014",
			"notes":[
				{
					"text":"In the Linux kernel, the following vulnerability has been resolved:\n\nxfs: add bounds checking to xlog_recover_process_data\n\nThere is a lack of verification of the space occupied by fixed members\nof xlog_op_header in the xlog_recover_process_data.\n\nWe can create a crafted image to trigger an out of bounds read by\nfollowing these steps:\n    1) Mount an image of xfs, and do some file operations to leave records\n    2) Before umounting, copy the image for subsequent steps to simulate\n       abnormal exit. Because umount will ensure that tail_blk and\n       head_blk are the same, which will result in the inability to enter\n       xlog_recover_process_data\n    3) Write a tool to parse and modify the copied image in step 2\n    4) Make the end of the xlog_op_header entries only 1 byte away from\n       xlog_rec_header->h_size\n    5) xlog_rec_header->h_num_logops++\n    6) Modify xlog_rec_header->h_crc\n\nFix:\nAdd a check to make sure there is sufficient space to access fixed members\nof xlog_op_header.",
					"category":"description",
					"title":"Vulnerability Description"
				}
			],
			"product_status":{
				"fixed":[
					"openEuler-24.03-LTS:bpftool-6.6.0-37.0.0.44.oe2403.aarch64",
					"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-37.0.0.44.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-6.6.0-37.0.0.44.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-37.0.0.44.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-debugsource-6.6.0-37.0.0.44.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-devel-6.6.0-37.0.0.44.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-headers-6.6.0-37.0.0.44.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-source-6.6.0-37.0.0.44.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-tools-6.6.0-37.0.0.44.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-37.0.0.44.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-37.0.0.44.oe2403.aarch64",
					"openEuler-24.03-LTS:perf-6.6.0-37.0.0.44.oe2403.aarch64",
					"openEuler-24.03-LTS:perf-debuginfo-6.6.0-37.0.0.44.oe2403.aarch64",
					"openEuler-24.03-LTS:python3-perf-6.6.0-37.0.0.44.oe2403.aarch64",
					"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-37.0.0.44.oe2403.aarch64",
					"openEuler-24.03-LTS:bpftool-6.6.0-37.0.0.44.oe2403.x86_64",
					"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-37.0.0.44.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-6.6.0-37.0.0.44.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-37.0.0.44.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-debugsource-6.6.0-37.0.0.44.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-devel-6.6.0-37.0.0.44.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-headers-6.6.0-37.0.0.44.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-source-6.6.0-37.0.0.44.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-tools-6.6.0-37.0.0.44.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-37.0.0.44.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-37.0.0.44.oe2403.x86_64",
					"openEuler-24.03-LTS:perf-6.6.0-37.0.0.44.oe2403.x86_64",
					"openEuler-24.03-LTS:perf-debuginfo-6.6.0-37.0.0.44.oe2403.x86_64",
					"openEuler-24.03-LTS:python3-perf-6.6.0-37.0.0.44.oe2403.x86_64",
					"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-37.0.0.44.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-6.6.0-37.0.0.44.oe2403.src"
				]
			},
			"remediations":[
				{
					"product_ids":[
						"openEuler-24.03-LTS:bpftool-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-6.6.0-37.0.0.44.oe2403.src"
					],
					"details":"kernel security update",
					"category":"vendor_fix",
					"url":"https://www.openeuler.org/zh/security/security-bulletins/detail/?id=openEuler-SA-2024-1960"
				}
			],
			"scores":[
				{
					"cvss_v3":{
						"baseSeverity":"MEDIUM",
						"baseScore":5.5,
						"vectorString":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
						"version":"3.1"
					},
					"products":[
						"openEuler-24.03-LTS:bpftool-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-6.6.0-37.0.0.44.oe2403.src"
					]
				}
			],
			"threats":[
				{
					"details":"Medium",
					"category":"impact"
				}
			],
			"title":"CVE-2024-41014"
		},
		{
			"cve":"CVE-2024-41018",
			"notes":[
				{
					"text":"In the Linux kernel, the following vulnerability has been resolved:\n\nfs/ntfs3: Add a check for attr_names and oatbl\n\nAdded out-of-bound checking for *ane (ATTR_NAME_ENTRY).",
					"category":"description",
					"title":"Vulnerability Description"
				}
			],
			"product_status":{
				"fixed":[
					"openEuler-24.03-LTS:bpftool-6.6.0-37.0.0.44.oe2403.aarch64",
					"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-37.0.0.44.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-6.6.0-37.0.0.44.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-37.0.0.44.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-debugsource-6.6.0-37.0.0.44.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-devel-6.6.0-37.0.0.44.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-headers-6.6.0-37.0.0.44.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-source-6.6.0-37.0.0.44.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-tools-6.6.0-37.0.0.44.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-37.0.0.44.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-37.0.0.44.oe2403.aarch64",
					"openEuler-24.03-LTS:perf-6.6.0-37.0.0.44.oe2403.aarch64",
					"openEuler-24.03-LTS:perf-debuginfo-6.6.0-37.0.0.44.oe2403.aarch64",
					"openEuler-24.03-LTS:python3-perf-6.6.0-37.0.0.44.oe2403.aarch64",
					"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-37.0.0.44.oe2403.aarch64",
					"openEuler-24.03-LTS:bpftool-6.6.0-37.0.0.44.oe2403.x86_64",
					"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-37.0.0.44.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-6.6.0-37.0.0.44.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-37.0.0.44.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-debugsource-6.6.0-37.0.0.44.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-devel-6.6.0-37.0.0.44.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-headers-6.6.0-37.0.0.44.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-source-6.6.0-37.0.0.44.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-tools-6.6.0-37.0.0.44.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-37.0.0.44.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-37.0.0.44.oe2403.x86_64",
					"openEuler-24.03-LTS:perf-6.6.0-37.0.0.44.oe2403.x86_64",
					"openEuler-24.03-LTS:perf-debuginfo-6.6.0-37.0.0.44.oe2403.x86_64",
					"openEuler-24.03-LTS:python3-perf-6.6.0-37.0.0.44.oe2403.x86_64",
					"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-37.0.0.44.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-6.6.0-37.0.0.44.oe2403.src"
				]
			},
			"remediations":[
				{
					"product_ids":[
						"openEuler-24.03-LTS:bpftool-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-6.6.0-37.0.0.44.oe2403.src"
					],
					"details":"kernel security update",
					"category":"vendor_fix",
					"url":"https://www.openeuler.org/zh/security/security-bulletins/detail/?id=openEuler-SA-2024-1960"
				}
			],
			"scores":[
				{
					"cvss_v3":{
						"baseSeverity":"MEDIUM",
						"baseScore":5.5,
						"vectorString":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
						"version":"3.1"
					},
					"products":[
						"openEuler-24.03-LTS:bpftool-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-6.6.0-37.0.0.44.oe2403.src"
					]
				}
			],
			"threats":[
				{
					"details":"Medium",
					"category":"impact"
				}
			],
			"title":"CVE-2024-41018"
		},
		{
			"cve":"CVE-2024-41019",
			"notes":[
				{
					"text":"In the Linux kernel, the following vulnerability has been resolved:\n\nfs/ntfs3: Validate ff offset\n\nThis adds sanity checks for ff offset. There is a check\non rt->first_free at first, but walking through by ff\nwithout any check. If the second ff is a large offset.\nWe may encounter an out-of-bound read.",
					"category":"description",
					"title":"Vulnerability Description"
				}
			],
			"product_status":{
				"fixed":[
					"openEuler-24.03-LTS:bpftool-6.6.0-37.0.0.44.oe2403.aarch64",
					"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-37.0.0.44.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-6.6.0-37.0.0.44.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-37.0.0.44.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-debugsource-6.6.0-37.0.0.44.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-devel-6.6.0-37.0.0.44.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-headers-6.6.0-37.0.0.44.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-source-6.6.0-37.0.0.44.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-tools-6.6.0-37.0.0.44.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-37.0.0.44.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-37.0.0.44.oe2403.aarch64",
					"openEuler-24.03-LTS:perf-6.6.0-37.0.0.44.oe2403.aarch64",
					"openEuler-24.03-LTS:perf-debuginfo-6.6.0-37.0.0.44.oe2403.aarch64",
					"openEuler-24.03-LTS:python3-perf-6.6.0-37.0.0.44.oe2403.aarch64",
					"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-37.0.0.44.oe2403.aarch64",
					"openEuler-24.03-LTS:bpftool-6.6.0-37.0.0.44.oe2403.x86_64",
					"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-37.0.0.44.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-6.6.0-37.0.0.44.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-37.0.0.44.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-debugsource-6.6.0-37.0.0.44.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-devel-6.6.0-37.0.0.44.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-headers-6.6.0-37.0.0.44.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-source-6.6.0-37.0.0.44.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-tools-6.6.0-37.0.0.44.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-37.0.0.44.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-37.0.0.44.oe2403.x86_64",
					"openEuler-24.03-LTS:perf-6.6.0-37.0.0.44.oe2403.x86_64",
					"openEuler-24.03-LTS:perf-debuginfo-6.6.0-37.0.0.44.oe2403.x86_64",
					"openEuler-24.03-LTS:python3-perf-6.6.0-37.0.0.44.oe2403.x86_64",
					"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-37.0.0.44.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-6.6.0-37.0.0.44.oe2403.src"
				]
			},
			"remediations":[
				{
					"product_ids":[
						"openEuler-24.03-LTS:bpftool-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-6.6.0-37.0.0.44.oe2403.src"
					],
					"details":"kernel security update",
					"category":"vendor_fix",
					"url":"https://www.openeuler.org/zh/security/security-bulletins/detail/?id=openEuler-SA-2024-1960"
				}
			],
			"scores":[
				{
					"cvss_v3":{
						"baseSeverity":"MEDIUM",
						"baseScore":5.5,
						"vectorString":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
						"version":"3.1"
					},
					"products":[
						"openEuler-24.03-LTS:bpftool-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-6.6.0-37.0.0.44.oe2403.src"
					]
				}
			],
			"threats":[
				{
					"details":"Medium",
					"category":"impact"
				}
			],
			"title":"CVE-2024-41019"
		},
		{
			"cve":"CVE-2024-41020",
			"notes":[
				{
					"text":"In the Linux kernel, the following vulnerability has been resolved:\n\nfilelock: Fix fcntl/close race recovery compat path\n\nWhen I wrote commit 3cad1bc01041 (\"filelock: Remove locks reliably when\nfcntl/close race is detected\"), I missed that there are two copies of the\ncode I was patching: The normal version, and the version for 64-bit offsets\non 32-bit kernels.\nThanks to Greg KH for stumbling over this while doing the stable\nbackport...\n\nApply exactly the same fix to the compat path for 32-bit kernels.",
					"category":"description",
					"title":"Vulnerability Description"
				}
			],
			"product_status":{
				"fixed":[
					"openEuler-24.03-LTS:bpftool-6.6.0-37.0.0.44.oe2403.aarch64",
					"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-37.0.0.44.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-6.6.0-37.0.0.44.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-37.0.0.44.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-debugsource-6.6.0-37.0.0.44.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-devel-6.6.0-37.0.0.44.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-headers-6.6.0-37.0.0.44.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-source-6.6.0-37.0.0.44.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-tools-6.6.0-37.0.0.44.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-37.0.0.44.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-37.0.0.44.oe2403.aarch64",
					"openEuler-24.03-LTS:perf-6.6.0-37.0.0.44.oe2403.aarch64",
					"openEuler-24.03-LTS:perf-debuginfo-6.6.0-37.0.0.44.oe2403.aarch64",
					"openEuler-24.03-LTS:python3-perf-6.6.0-37.0.0.44.oe2403.aarch64",
					"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-37.0.0.44.oe2403.aarch64",
					"openEuler-24.03-LTS:bpftool-6.6.0-37.0.0.44.oe2403.x86_64",
					"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-37.0.0.44.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-6.6.0-37.0.0.44.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-37.0.0.44.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-debugsource-6.6.0-37.0.0.44.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-devel-6.6.0-37.0.0.44.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-headers-6.6.0-37.0.0.44.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-source-6.6.0-37.0.0.44.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-tools-6.6.0-37.0.0.44.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-37.0.0.44.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-37.0.0.44.oe2403.x86_64",
					"openEuler-24.03-LTS:perf-6.6.0-37.0.0.44.oe2403.x86_64",
					"openEuler-24.03-LTS:perf-debuginfo-6.6.0-37.0.0.44.oe2403.x86_64",
					"openEuler-24.03-LTS:python3-perf-6.6.0-37.0.0.44.oe2403.x86_64",
					"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-37.0.0.44.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-6.6.0-37.0.0.44.oe2403.src"
				]
			},
			"remediations":[
				{
					"product_ids":[
						"openEuler-24.03-LTS:bpftool-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-6.6.0-37.0.0.44.oe2403.src"
					],
					"details":"kernel security update",
					"category":"vendor_fix",
					"url":"https://www.openeuler.org/zh/security/security-bulletins/detail/?id=openEuler-SA-2024-1960"
				}
			],
			"scores":[
				{
					"cvss_v3":{
						"baseSeverity":"MEDIUM",
						"baseScore":6.3,
						"vectorString":"CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:H",
						"version":"3.1"
					},
					"products":[
						"openEuler-24.03-LTS:bpftool-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-6.6.0-37.0.0.44.oe2403.src"
					]
				}
			],
			"threats":[
				{
					"details":"Medium",
					"category":"impact"
				}
			],
			"title":"CVE-2024-41020"
		},
		{
			"cve":"CVE-2024-41021",
			"notes":[
				{
					"text":"In the Linux kernel, the following vulnerability has been resolved:\n\ns390/mm: Fix VM_FAULT_HWPOISON handling in do_exception()\n\nThere is no support for HWPOISON, MEMORY_FAILURE, or ARCH_HAS_COPY_MC on\ns390. Therefore we do not expect to see VM_FAULT_HWPOISON in\ndo_exception().\n\nHowever, since commit af19487f00f3 (\"mm: make PTE_MARKER_SWAPIN_ERROR more\ngeneral\"), it is possible to see VM_FAULT_HWPOISON in combination with\nPTE_MARKER_POISONED, even on architectures that do not support HWPOISON\notherwise. In this case, we will end up on the BUG() in do_exception().\n\nFix this by treating VM_FAULT_HWPOISON the same as VM_FAULT_SIGBUS, similar\nto x86 when MEMORY_FAILURE is not configured. Also print unexpected fault\nflags, for easier debugging.\n\nNote that VM_FAULT_HWPOISON_LARGE is not expected, because s390 cannot\nsupport swap entries on other levels than PTE level.",
					"category":"description",
					"title":"Vulnerability Description"
				}
			],
			"product_status":{
				"fixed":[
					"openEuler-24.03-LTS:bpftool-6.6.0-37.0.0.44.oe2403.aarch64",
					"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-37.0.0.44.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-6.6.0-37.0.0.44.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-37.0.0.44.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-debugsource-6.6.0-37.0.0.44.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-devel-6.6.0-37.0.0.44.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-headers-6.6.0-37.0.0.44.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-source-6.6.0-37.0.0.44.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-tools-6.6.0-37.0.0.44.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-37.0.0.44.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-37.0.0.44.oe2403.aarch64",
					"openEuler-24.03-LTS:perf-6.6.0-37.0.0.44.oe2403.aarch64",
					"openEuler-24.03-LTS:perf-debuginfo-6.6.0-37.0.0.44.oe2403.aarch64",
					"openEuler-24.03-LTS:python3-perf-6.6.0-37.0.0.44.oe2403.aarch64",
					"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-37.0.0.44.oe2403.aarch64",
					"openEuler-24.03-LTS:bpftool-6.6.0-37.0.0.44.oe2403.x86_64",
					"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-37.0.0.44.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-6.6.0-37.0.0.44.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-37.0.0.44.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-debugsource-6.6.0-37.0.0.44.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-devel-6.6.0-37.0.0.44.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-headers-6.6.0-37.0.0.44.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-source-6.6.0-37.0.0.44.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-tools-6.6.0-37.0.0.44.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-37.0.0.44.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-37.0.0.44.oe2403.x86_64",
					"openEuler-24.03-LTS:perf-6.6.0-37.0.0.44.oe2403.x86_64",
					"openEuler-24.03-LTS:perf-debuginfo-6.6.0-37.0.0.44.oe2403.x86_64",
					"openEuler-24.03-LTS:python3-perf-6.6.0-37.0.0.44.oe2403.x86_64",
					"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-37.0.0.44.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-6.6.0-37.0.0.44.oe2403.src"
				]
			},
			"remediations":[
				{
					"product_ids":[
						"openEuler-24.03-LTS:bpftool-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-6.6.0-37.0.0.44.oe2403.src"
					],
					"details":"kernel security update",
					"category":"vendor_fix",
					"url":"https://www.openeuler.org/zh/security/security-bulletins/detail/?id=openEuler-SA-2024-1960"
				}
			],
			"scores":[
				{
					"cvss_v3":{
						"baseSeverity":"LOW",
						"baseScore":3.3,
						"vectorString":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L",
						"version":"3.1"
					},
					"products":[
						"openEuler-24.03-LTS:bpftool-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-6.6.0-37.0.0.44.oe2403.src"
					]
				}
			],
			"threats":[
				{
					"details":"Low",
					"category":"impact"
				}
			],
			"title":"CVE-2024-41021"
		},
		{
			"cve":"CVE-2024-41023",
			"notes":[
				{
					"text":"In the Linux kernel, the following vulnerability has been resolved:\n\nsched/deadline: Fix task_struct reference leak\n\nDuring the execution of the following stress test with linux-rt:\n\nstress-ng --cyclic 30 --timeout 30 --minimize --quiet\n\nkmemleak frequently reported a memory leak concerning the task_struct:\n\nunreferenced object 0xffff8881305b8000 (size 16136):\n  comm \"stress-ng\", pid 614, jiffies 4294883961 (age 286.412s)\n  object hex dump (first 32 bytes):\n    02 40 00 00 00 00 00 00 00 00 00 00 00 00 00 00  .@..............\n    00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00  ................\n  debug hex dump (first 16 bytes):\n    53 09 00 00 00 00 00 00 00 00 00 00 00 00 00 00  S...............\n  backtrace:\n    [<00000000046b6790>] dup_task_struct+0x30/0x540\n    [<00000000c5ca0f0b>] copy_process+0x3d9/0x50e0\n    [<00000000ced59777>] kernel_clone+0xb0/0x770\n    [<00000000a50befdc>] __do_sys_clone+0xb6/0xf0\n    [<000000001dbf2008>] do_syscall_64+0x5d/0xf0\n    [<00000000552900ff>] entry_SYSCALL_64_after_hwframe+0x6e/0x76\n\nThe issue occurs in start_dl_timer(), which increments the task_struct\nreference count and sets a timer. The timer callback, dl_task_timer,\nis supposed to decrement the reference count upon expiration. However,\nif enqueue_task_dl() is called before the timer expires and cancels it,\nthe reference count is not decremented, leading to the leak.\n\nThis patch fixes the reference leak by ensuring the task_struct\nreference count is properly decremented when the timer is canceled.",
					"category":"description",
					"title":"Vulnerability Description"
				}
			],
			"product_status":{
				"fixed":[
					"openEuler-24.03-LTS:bpftool-6.6.0-37.0.0.44.oe2403.aarch64",
					"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-37.0.0.44.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-6.6.0-37.0.0.44.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-37.0.0.44.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-debugsource-6.6.0-37.0.0.44.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-devel-6.6.0-37.0.0.44.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-headers-6.6.0-37.0.0.44.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-source-6.6.0-37.0.0.44.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-tools-6.6.0-37.0.0.44.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-37.0.0.44.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-37.0.0.44.oe2403.aarch64",
					"openEuler-24.03-LTS:perf-6.6.0-37.0.0.44.oe2403.aarch64",
					"openEuler-24.03-LTS:perf-debuginfo-6.6.0-37.0.0.44.oe2403.aarch64",
					"openEuler-24.03-LTS:python3-perf-6.6.0-37.0.0.44.oe2403.aarch64",
					"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-37.0.0.44.oe2403.aarch64",
					"openEuler-24.03-LTS:bpftool-6.6.0-37.0.0.44.oe2403.x86_64",
					"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-37.0.0.44.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-6.6.0-37.0.0.44.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-37.0.0.44.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-debugsource-6.6.0-37.0.0.44.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-devel-6.6.0-37.0.0.44.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-headers-6.6.0-37.0.0.44.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-source-6.6.0-37.0.0.44.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-tools-6.6.0-37.0.0.44.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-37.0.0.44.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-37.0.0.44.oe2403.x86_64",
					"openEuler-24.03-LTS:perf-6.6.0-37.0.0.44.oe2403.x86_64",
					"openEuler-24.03-LTS:perf-debuginfo-6.6.0-37.0.0.44.oe2403.x86_64",
					"openEuler-24.03-LTS:python3-perf-6.6.0-37.0.0.44.oe2403.x86_64",
					"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-37.0.0.44.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-6.6.0-37.0.0.44.oe2403.src"
				]
			},
			"remediations":[
				{
					"product_ids":[
						"openEuler-24.03-LTS:bpftool-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-6.6.0-37.0.0.44.oe2403.src"
					],
					"details":"kernel security update",
					"category":"vendor_fix",
					"url":"https://www.openeuler.org/zh/security/security-bulletins/detail/?id=openEuler-SA-2024-1960"
				}
			],
			"scores":[
				{
					"cvss_v3":{
						"baseSeverity":"MEDIUM",
						"baseScore":5.5,
						"vectorString":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
						"version":"3.1"
					},
					"products":[
						"openEuler-24.03-LTS:bpftool-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-6.6.0-37.0.0.44.oe2403.src"
					]
				}
			],
			"threats":[
				{
					"details":"Medium",
					"category":"impact"
				}
			],
			"title":"CVE-2024-41023"
		},
		{
			"cve":"CVE-2024-41039",
			"notes":[
				{
					"text":"In the Linux kernel, the following vulnerability has been resolved:\n\nfirmware: cs_dsp: Fix overflow checking of wmfw header\n\nFix the checking that firmware file buffer is large enough for the\nwmfw header, to prevent overrunning the buffer.\n\nThe original code tested that the firmware data buffer contained\nenough bytes for the sums of the size of the structs\n\n\twmfw_header + wmfw_adsp1_sizes + wmfw_footer\n\nBut wmfw_adsp1_sizes is only used on ADSP1 firmware. For ADSP2 and\nHalo Core the equivalent struct is wmfw_adsp2_sizes, which is\n4 bytes longer. So the length check didn't guarantee that there\nare enough bytes in the firmware buffer for a header with\nwmfw_adsp2_sizes.\n\nThis patch splits the length check into three separate parts. Each\nof the wmfw_header, wmfw_adsp?_sizes and wmfw_footer are checked\nseparately before they are used.",
					"category":"description",
					"title":"Vulnerability Description"
				}
			],
			"product_status":{
				"fixed":[
					"openEuler-24.03-LTS:bpftool-6.6.0-37.0.0.44.oe2403.aarch64",
					"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-37.0.0.44.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-6.6.0-37.0.0.44.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-37.0.0.44.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-debugsource-6.6.0-37.0.0.44.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-devel-6.6.0-37.0.0.44.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-headers-6.6.0-37.0.0.44.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-source-6.6.0-37.0.0.44.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-tools-6.6.0-37.0.0.44.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-37.0.0.44.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-37.0.0.44.oe2403.aarch64",
					"openEuler-24.03-LTS:perf-6.6.0-37.0.0.44.oe2403.aarch64",
					"openEuler-24.03-LTS:perf-debuginfo-6.6.0-37.0.0.44.oe2403.aarch64",
					"openEuler-24.03-LTS:python3-perf-6.6.0-37.0.0.44.oe2403.aarch64",
					"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-37.0.0.44.oe2403.aarch64",
					"openEuler-24.03-LTS:bpftool-6.6.0-37.0.0.44.oe2403.x86_64",
					"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-37.0.0.44.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-6.6.0-37.0.0.44.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-37.0.0.44.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-debugsource-6.6.0-37.0.0.44.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-devel-6.6.0-37.0.0.44.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-headers-6.6.0-37.0.0.44.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-source-6.6.0-37.0.0.44.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-tools-6.6.0-37.0.0.44.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-37.0.0.44.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-37.0.0.44.oe2403.x86_64",
					"openEuler-24.03-LTS:perf-6.6.0-37.0.0.44.oe2403.x86_64",
					"openEuler-24.03-LTS:perf-debuginfo-6.6.0-37.0.0.44.oe2403.x86_64",
					"openEuler-24.03-LTS:python3-perf-6.6.0-37.0.0.44.oe2403.x86_64",
					"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-37.0.0.44.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-6.6.0-37.0.0.44.oe2403.src"
				]
			},
			"remediations":[
				{
					"product_ids":[
						"openEuler-24.03-LTS:bpftool-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-6.6.0-37.0.0.44.oe2403.src"
					],
					"details":"kernel security update",
					"category":"vendor_fix",
					"url":"https://www.openeuler.org/zh/security/security-bulletins/detail/?id=openEuler-SA-2024-1960"
				}
			],
			"scores":[
				{
					"cvss_v3":{
						"baseSeverity":"MEDIUM",
						"baseScore":5.5,
						"vectorString":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
						"version":"3.1"
					},
					"products":[
						"openEuler-24.03-LTS:bpftool-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-6.6.0-37.0.0.44.oe2403.src"
					]
				}
			],
			"threats":[
				{
					"details":"Medium",
					"category":"impact"
				}
			],
			"title":"CVE-2024-41039"
		},
		{
			"cve":"CVE-2024-41040",
			"notes":[
				{
					"text":"In the Linux kernel, the following vulnerability has been resolved:\n\nnet/sched: Fix UAF when resolving a clash\n\nKASAN reports the following UAF:\n\n BUG: KASAN: slab-use-after-free in tcf_ct_flow_table_process_conn+0x12b/0x380 [act_ct]\n Read of size 1 at addr ffff888c07603600 by task handler130/6469\n\n Call Trace:\n  <IRQ>\n  dump_stack_lvl+0x48/0x70\n  print_address_description.constprop.0+0x33/0x3d0\n  print_report+0xc0/0x2b0\n  kasan_report+0xd0/0x120\n  __asan_load1+0x6c/0x80\n  tcf_ct_flow_table_process_conn+0x12b/0x380 [act_ct]\n  tcf_ct_act+0x886/0x1350 [act_ct]\n  tcf_action_exec+0xf8/0x1f0\n  fl_classify+0x355/0x360 [cls_flower]\n  __tcf_classify+0x1fd/0x330\n  tcf_classify+0x21c/0x3c0\n  sch_handle_ingress.constprop.0+0x2c5/0x500\n  __netif_receive_skb_core.constprop.0+0xb25/0x1510\n  __netif_receive_skb_list_core+0x220/0x4c0\n  netif_receive_skb_list_internal+0x446/0x620\n  napi_complete_done+0x157/0x3d0\n  gro_cell_poll+0xcf/0x100\n  __napi_poll+0x65/0x310\n  net_rx_action+0x30c/0x5c0\n  __do_softirq+0x14f/0x491\n  __irq_exit_rcu+0x82/0xc0\n  irq_exit_rcu+0xe/0x20\n  common_interrupt+0xa1/0xb0\n  </IRQ>\n  <TASK>\n  asm_common_interrupt+0x27/0x40\n\n Allocated by task 6469:\n  kasan_save_stack+0x38/0x70\n  kasan_set_track+0x25/0x40\n  kasan_save_alloc_info+0x1e/0x40\n  __kasan_krealloc+0x133/0x190\n  krealloc+0xaa/0x130\n  nf_ct_ext_add+0xed/0x230 [nf_conntrack]\n  tcf_ct_act+0x1095/0x1350 [act_ct]\n  tcf_action_exec+0xf8/0x1f0\n  fl_classify+0x355/0x360 [cls_flower]\n  __tcf_classify+0x1fd/0x330\n  tcf_classify+0x21c/0x3c0\n  sch_handle_ingress.constprop.0+0x2c5/0x500\n  __netif_receive_skb_core.constprop.0+0xb25/0x1510\n  __netif_receive_skb_list_core+0x220/0x4c0\n  netif_receive_skb_list_internal+0x446/0x620\n  napi_complete_done+0x157/0x3d0\n  gro_cell_poll+0xcf/0x100\n  __napi_poll+0x65/0x310\n  net_rx_action+0x30c/0x5c0\n  __do_softirq+0x14f/0x491\n\n Freed by task 6469:\n  kasan_save_stack+0x38/0x70\n  kasan_set_track+0x25/0x40\n  kasan_save_free_info+0x2b/0x60\n  ____kasan_slab_free+0x180/0x1f0\n  __kasan_slab_free+0x12/0x30\n  slab_free_freelist_hook+0xd2/0x1a0\n  __kmem_cache_free+0x1a2/0x2f0\n  kfree+0x78/0x120\n  nf_conntrack_free+0x74/0x130 [nf_conntrack]\n  nf_ct_destroy+0xb2/0x140 [nf_conntrack]\n  __nf_ct_resolve_clash+0x529/0x5d0 [nf_conntrack]\n  nf_ct_resolve_clash+0xf6/0x490 [nf_conntrack]\n  __nf_conntrack_confirm+0x2c6/0x770 [nf_conntrack]\n  tcf_ct_act+0x12ad/0x1350 [act_ct]\n  tcf_action_exec+0xf8/0x1f0\n  fl_classify+0x355/0x360 [cls_flower]\n  __tcf_classify+0x1fd/0x330\n  tcf_classify+0x21c/0x3c0\n  sch_handle_ingress.constprop.0+0x2c5/0x500\n  __netif_receive_skb_core.constprop.0+0xb25/0x1510\n  __netif_receive_skb_list_core+0x220/0x4c0\n  netif_receive_skb_list_internal+0x446/0x620\n  napi_complete_done+0x157/0x3d0\n  gro_cell_poll+0xcf/0x100\n  __napi_poll+0x65/0x310\n  net_rx_action+0x30c/0x5c0\n  __do_softirq+0x14f/0x491\n\nThe ct may be dropped if a clash has been resolved but is still passed to\nthe tcf_ct_flow_table_process_conn function for further usage. This issue\ncan be fixed by retrieving ct from skb again after confirming conntrack.",
					"category":"description",
					"title":"Vulnerability Description"
				}
			],
			"product_status":{
				"fixed":[
					"openEuler-24.03-LTS:bpftool-6.6.0-37.0.0.44.oe2403.aarch64",
					"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-37.0.0.44.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-6.6.0-37.0.0.44.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-37.0.0.44.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-debugsource-6.6.0-37.0.0.44.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-devel-6.6.0-37.0.0.44.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-headers-6.6.0-37.0.0.44.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-source-6.6.0-37.0.0.44.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-tools-6.6.0-37.0.0.44.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-37.0.0.44.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-37.0.0.44.oe2403.aarch64",
					"openEuler-24.03-LTS:perf-6.6.0-37.0.0.44.oe2403.aarch64",
					"openEuler-24.03-LTS:perf-debuginfo-6.6.0-37.0.0.44.oe2403.aarch64",
					"openEuler-24.03-LTS:python3-perf-6.6.0-37.0.0.44.oe2403.aarch64",
					"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-37.0.0.44.oe2403.aarch64",
					"openEuler-24.03-LTS:bpftool-6.6.0-37.0.0.44.oe2403.x86_64",
					"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-37.0.0.44.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-6.6.0-37.0.0.44.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-37.0.0.44.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-debugsource-6.6.0-37.0.0.44.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-devel-6.6.0-37.0.0.44.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-headers-6.6.0-37.0.0.44.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-source-6.6.0-37.0.0.44.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-tools-6.6.0-37.0.0.44.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-37.0.0.44.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-37.0.0.44.oe2403.x86_64",
					"openEuler-24.03-LTS:perf-6.6.0-37.0.0.44.oe2403.x86_64",
					"openEuler-24.03-LTS:perf-debuginfo-6.6.0-37.0.0.44.oe2403.x86_64",
					"openEuler-24.03-LTS:python3-perf-6.6.0-37.0.0.44.oe2403.x86_64",
					"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-37.0.0.44.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-6.6.0-37.0.0.44.oe2403.src"
				]
			},
			"remediations":[
				{
					"product_ids":[
						"openEuler-24.03-LTS:bpftool-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-6.6.0-37.0.0.44.oe2403.src"
					],
					"details":"kernel security update",
					"category":"vendor_fix",
					"url":"https://www.openeuler.org/zh/security/security-bulletins/detail/?id=openEuler-SA-2024-1960"
				}
			],
			"scores":[
				{
					"cvss_v3":{
						"baseSeverity":"MEDIUM",
						"baseScore":5.5,
						"vectorString":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
						"version":"3.1"
					},
					"products":[
						"openEuler-24.03-LTS:bpftool-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-6.6.0-37.0.0.44.oe2403.src"
					]
				}
			],
			"threats":[
				{
					"details":"Medium",
					"category":"impact"
				}
			],
			"title":"CVE-2024-41040"
		},
		{
			"cve":"CVE-2024-41041",
			"notes":[
				{
					"text":"In the Linux kernel, the following vulnerability has been resolved:\n\nudp: Set SOCK_RCU_FREE earlier in udp_lib_get_port().\n\nsyzkaller triggered the warning [0] in udp_v4_early_demux().\n\nIn udp_v[46]_early_demux() and sk_lookup(), we do not touch the refcount\nof the looked-up sk and use sock_pfree() as skb->destructor, so we check\nSOCK_RCU_FREE to ensure that the sk is safe to access during the RCU grace\nperiod.\n\nCurrently, SOCK_RCU_FREE is flagged for a bound socket after being put\ninto the hash table.  Moreover, the SOCK_RCU_FREE check is done too early\nin udp_v[46]_early_demux() and sk_lookup(), so there could be a small race\nwindow:\n\n  CPU1                                 CPU2\n  ----                                 ----\n  udp_v4_early_demux()                 udp_lib_get_port()\n  |                                    |- hlist_add_head_rcu()\n  |- sk = __udp4_lib_demux_lookup()    |\n  |- DEBUG_NET_WARN_ON_ONCE(sk_is_refcounted(sk));\n                                       `- sock_set_flag(sk, SOCK_RCU_FREE)\n\nWe had the same bug in TCP and fixed it in commit 871019b22d1b (\"net:\nset SOCK_RCU_FREE before inserting socket into hashtable\").\n\nLet's apply the same fix for UDP.\n\n[0]:\nWARNING: CPU: 0 PID: 11198 at net/ipv4/udp.c:2599 udp_v4_early_demux+0x481/0xb70 net/ipv4/udp.c:2599\nModules linked in:\nCPU: 0 PID: 11198 Comm: syz-executor.1 Not tainted 6.9.0-g93bda33046e7 #13\nHardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS rel-1.16.0-0-gd239552ce722-prebuilt.qemu.org 04/01/2014\nRIP: 0010:udp_v4_early_demux+0x481/0xb70 net/ipv4/udp.c:2599\nCode: c5 7a 15 fe bb 01 00 00 00 44 89 e9 31 ff d3 e3 81 e3 bf ef ff ff 89 de e8 2c 74 15 fe 85 db 0f 85 02 06 00 00 e8 9f 7a 15 fe <0f> 0b e8 98 7a 15 fe 49 8d 7e 60 e8 4f 39 2f fe 49 c7 46 60 20 52\nRSP: 0018:ffffc9000ce3fa58 EFLAGS: 00010293\nRAX: 0000000000000000 RBX: 0000000000000000 RCX: ffffffff8318c92c\nRDX: ffff888036ccde00 RSI: ffffffff8318c2f1 RDI: 0000000000000001\nRBP: ffff88805a2dd6e0 R08: 0000000000000001 R09: 0000000000000000\nR10: 0000000000000000 R11: 0001ffffffffffff R12: ffff88805a2dd680\nR13: 0000000000000007 R14: ffff88800923f900 R15: ffff88805456004e\nFS:  00007fc449127640(0000) GS:ffff88807dc00000(0000) knlGS:0000000000000000\nCS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033\nCR2: 00007fc449126e38 CR3: 000000003de4b002 CR4: 0000000000770ef0\nDR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000\nDR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000600\nPKRU: 55555554\nCall Trace:\n <TASK>\n ip_rcv_finish_core.constprop.0+0xbdd/0xd20 net/ipv4/ip_input.c:349\n ip_rcv_finish+0xda/0x150 net/ipv4/ip_input.c:447\n NF_HOOK include/linux/netfilter.h:314 [inline]\n NF_HOOK include/linux/netfilter.h:308 [inline]\n ip_rcv+0x16c/0x180 net/ipv4/ip_input.c:569\n __netif_receive_skb_one_core+0xb3/0xe0 net/core/dev.c:5624\n __netif_receive_skb+0x21/0xd0 net/core/dev.c:5738\n netif_receive_skb_internal net/core/dev.c:5824 [inline]\n netif_receive_skb+0x271/0x300 net/core/dev.c:5884\n tun_rx_batched drivers/net/tun.c:1549 [inline]\n tun_get_user+0x24db/0x2c50 drivers/net/tun.c:2002\n tun_chr_write_iter+0x107/0x1a0 drivers/net/tun.c:2048\n new_sync_write fs/read_write.c:497 [inline]\n vfs_write+0x76f/0x8d0 fs/read_write.c:590\n ksys_write+0xbf/0x190 fs/read_write.c:643\n __do_sys_write fs/read_write.c:655 [inline]\n __se_sys_write fs/read_write.c:652 [inline]\n __x64_sys_write+0x41/0x50 fs/read_write.c:652\n x64_sys_call+0xe66/0x1990 arch/x86/include/generated/asm/syscalls_64.h:2\n do_syscall_x64 arch/x86/entry/common.c:52 [inline]\n do_syscall_64+0x4b/0x110 arch/x86/entry/common.c:83\n entry_SYSCALL_64_after_hwframe+0x4b/0x53\nRIP: 0033:0x7fc44a68bc1f\nCode: 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 e9 cf f5 ff 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 b8 01 00 00 00 0f 05 <48> 3d 00 f0 ff ff 77 31 44 89 c7 48 89 44 24 08 e8 3c d0 f5 ff 48\nRSP: 002b:00007fc449126c90 EFLAGS: 00000293 ORIG_RAX: 0000000000000001\nRAX: ffffffffffffffda RBX: 00000000004bc050 RCX: 00007fc44a68bc1f\nR\n---truncated---",
					"category":"description",
					"title":"Vulnerability Description"
				}
			],
			"product_status":{
				"fixed":[
					"openEuler-24.03-LTS:bpftool-6.6.0-37.0.0.44.oe2403.aarch64",
					"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-37.0.0.44.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-6.6.0-37.0.0.44.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-37.0.0.44.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-debugsource-6.6.0-37.0.0.44.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-devel-6.6.0-37.0.0.44.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-headers-6.6.0-37.0.0.44.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-source-6.6.0-37.0.0.44.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-tools-6.6.0-37.0.0.44.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-37.0.0.44.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-37.0.0.44.oe2403.aarch64",
					"openEuler-24.03-LTS:perf-6.6.0-37.0.0.44.oe2403.aarch64",
					"openEuler-24.03-LTS:perf-debuginfo-6.6.0-37.0.0.44.oe2403.aarch64",
					"openEuler-24.03-LTS:python3-perf-6.6.0-37.0.0.44.oe2403.aarch64",
					"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-37.0.0.44.oe2403.aarch64",
					"openEuler-24.03-LTS:bpftool-6.6.0-37.0.0.44.oe2403.x86_64",
					"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-37.0.0.44.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-6.6.0-37.0.0.44.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-37.0.0.44.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-debugsource-6.6.0-37.0.0.44.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-devel-6.6.0-37.0.0.44.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-headers-6.6.0-37.0.0.44.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-source-6.6.0-37.0.0.44.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-tools-6.6.0-37.0.0.44.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-37.0.0.44.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-37.0.0.44.oe2403.x86_64",
					"openEuler-24.03-LTS:perf-6.6.0-37.0.0.44.oe2403.x86_64",
					"openEuler-24.03-LTS:perf-debuginfo-6.6.0-37.0.0.44.oe2403.x86_64",
					"openEuler-24.03-LTS:python3-perf-6.6.0-37.0.0.44.oe2403.x86_64",
					"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-37.0.0.44.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-6.6.0-37.0.0.44.oe2403.src"
				]
			},
			"remediations":[
				{
					"product_ids":[
						"openEuler-24.03-LTS:bpftool-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-6.6.0-37.0.0.44.oe2403.src"
					],
					"details":"kernel security update",
					"category":"vendor_fix",
					"url":"https://www.openeuler.org/zh/security/security-bulletins/detail/?id=openEuler-SA-2024-1960"
				}
			],
			"scores":[
				{
					"cvss_v3":{
						"baseSeverity":"MEDIUM",
						"baseScore":5.5,
						"vectorString":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
						"version":"3.1"
					},
					"products":[
						"openEuler-24.03-LTS:bpftool-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-6.6.0-37.0.0.44.oe2403.src"
					]
				}
			],
			"threats":[
				{
					"details":"Medium",
					"category":"impact"
				}
			],
			"title":"CVE-2024-41041"
		},
		{
			"cve":"CVE-2024-41044",
			"notes":[
				{
					"text":"In the Linux kernel, the following vulnerability has been resolved:\n\nppp: reject claimed-as-LCP but actually malformed packets\n\nSince 'ppp_async_encode()' assumes valid LCP packets (with code\nfrom 1 to 7 inclusive), add 'ppp_check_packet()' to ensure that\nLCP packet has an actual body beyond PPP_LCP header bytes, and\nreject claimed-as-LCP but actually malformed data otherwise.",
					"category":"description",
					"title":"Vulnerability Description"
				}
			],
			"product_status":{
				"fixed":[
					"openEuler-24.03-LTS:bpftool-6.6.0-37.0.0.44.oe2403.aarch64",
					"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-37.0.0.44.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-6.6.0-37.0.0.44.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-37.0.0.44.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-debugsource-6.6.0-37.0.0.44.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-devel-6.6.0-37.0.0.44.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-headers-6.6.0-37.0.0.44.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-source-6.6.0-37.0.0.44.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-tools-6.6.0-37.0.0.44.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-37.0.0.44.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-37.0.0.44.oe2403.aarch64",
					"openEuler-24.03-LTS:perf-6.6.0-37.0.0.44.oe2403.aarch64",
					"openEuler-24.03-LTS:perf-debuginfo-6.6.0-37.0.0.44.oe2403.aarch64",
					"openEuler-24.03-LTS:python3-perf-6.6.0-37.0.0.44.oe2403.aarch64",
					"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-37.0.0.44.oe2403.aarch64",
					"openEuler-24.03-LTS:bpftool-6.6.0-37.0.0.44.oe2403.x86_64",
					"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-37.0.0.44.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-6.6.0-37.0.0.44.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-37.0.0.44.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-debugsource-6.6.0-37.0.0.44.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-devel-6.6.0-37.0.0.44.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-headers-6.6.0-37.0.0.44.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-source-6.6.0-37.0.0.44.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-tools-6.6.0-37.0.0.44.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-37.0.0.44.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-37.0.0.44.oe2403.x86_64",
					"openEuler-24.03-LTS:perf-6.6.0-37.0.0.44.oe2403.x86_64",
					"openEuler-24.03-LTS:perf-debuginfo-6.6.0-37.0.0.44.oe2403.x86_64",
					"openEuler-24.03-LTS:python3-perf-6.6.0-37.0.0.44.oe2403.x86_64",
					"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-37.0.0.44.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-6.6.0-37.0.0.44.oe2403.src"
				]
			},
			"remediations":[
				{
					"product_ids":[
						"openEuler-24.03-LTS:bpftool-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-6.6.0-37.0.0.44.oe2403.src"
					],
					"details":"kernel security update",
					"category":"vendor_fix",
					"url":"https://www.openeuler.org/zh/security/security-bulletins/detail/?id=openEuler-SA-2024-1960"
				}
			],
			"scores":[
				{
					"cvss_v3":{
						"baseSeverity":"MEDIUM",
						"baseScore":6.3,
						"vectorString":"CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:L",
						"version":"3.1"
					},
					"products":[
						"openEuler-24.03-LTS:bpftool-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-6.6.0-37.0.0.44.oe2403.src"
					]
				}
			],
			"threats":[
				{
					"details":"Medium",
					"category":"impact"
				}
			],
			"title":"CVE-2024-41044"
		},
		{
			"cve":"CVE-2024-41045",
			"notes":[
				{
					"text":"In the Linux kernel, the following vulnerability has been resolved:\n\nbpf: Defer work in bpf_timer_cancel_and_free\n\nCurrently, the same case as previous patch (two timer callbacks trying\nto cancel each other) can be invoked through bpf_map_update_elem as\nwell, or more precisely, freeing map elements containing timers. Since\nthis relies on hrtimer_cancel as well, it is prone to the same deadlock\nsituation as the previous patch.\n\nIt would be sufficient to use hrtimer_try_to_cancel to fix this problem,\nas the timer cannot be enqueued after async_cancel_and_free. Once\nasync_cancel_and_free has been done, the timer must be reinitialized\nbefore it can be armed again. The callback running in parallel trying to\narm the timer will fail, and freeing bpf_hrtimer without waiting is\nsufficient (given kfree_rcu), and bpf_timer_cb will return\nHRTIMER_NORESTART, preventing the timer from being rearmed again.\n\nHowever, there exists a UAF scenario where the callback arms the timer\nbefore entering this function, such that if cancellation fails (due to\ntimer callback invoking this routine, or the target timer callback\nrunning concurrently). In such a case, if the timer expiration is\nsignificantly far in the future, the RCU grace period expiration\nhappening before it will free the bpf_hrtimer state and along with it\nthe struct hrtimer, that is enqueued.\n\nHence, it is clear cancellation needs to occur after\nasync_cancel_and_free, and yet it cannot be done inline due to deadlock\nissues. We thus modify bpf_timer_cancel_and_free to defer work to the\nglobal workqueue, adding a work_struct alongside rcu_head (both used at\n_different_ points of time, so can share space).\n\nUpdate existing code comments to reflect the new state of affairs.",
					"category":"description",
					"title":"Vulnerability Description"
				}
			],
			"product_status":{
				"fixed":[
					"openEuler-24.03-LTS:bpftool-6.6.0-37.0.0.44.oe2403.aarch64",
					"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-37.0.0.44.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-6.6.0-37.0.0.44.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-37.0.0.44.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-debugsource-6.6.0-37.0.0.44.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-devel-6.6.0-37.0.0.44.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-headers-6.6.0-37.0.0.44.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-source-6.6.0-37.0.0.44.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-tools-6.6.0-37.0.0.44.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-37.0.0.44.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-37.0.0.44.oe2403.aarch64",
					"openEuler-24.03-LTS:perf-6.6.0-37.0.0.44.oe2403.aarch64",
					"openEuler-24.03-LTS:perf-debuginfo-6.6.0-37.0.0.44.oe2403.aarch64",
					"openEuler-24.03-LTS:python3-perf-6.6.0-37.0.0.44.oe2403.aarch64",
					"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-37.0.0.44.oe2403.aarch64",
					"openEuler-24.03-LTS:bpftool-6.6.0-37.0.0.44.oe2403.x86_64",
					"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-37.0.0.44.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-6.6.0-37.0.0.44.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-37.0.0.44.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-debugsource-6.6.0-37.0.0.44.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-devel-6.6.0-37.0.0.44.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-headers-6.6.0-37.0.0.44.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-source-6.6.0-37.0.0.44.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-tools-6.6.0-37.0.0.44.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-37.0.0.44.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-37.0.0.44.oe2403.x86_64",
					"openEuler-24.03-LTS:perf-6.6.0-37.0.0.44.oe2403.x86_64",
					"openEuler-24.03-LTS:perf-debuginfo-6.6.0-37.0.0.44.oe2403.x86_64",
					"openEuler-24.03-LTS:python3-perf-6.6.0-37.0.0.44.oe2403.x86_64",
					"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-37.0.0.44.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-6.6.0-37.0.0.44.oe2403.src"
				]
			},
			"remediations":[
				{
					"product_ids":[
						"openEuler-24.03-LTS:bpftool-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-6.6.0-37.0.0.44.oe2403.src"
					],
					"details":"kernel security update",
					"category":"vendor_fix",
					"url":"https://www.openeuler.org/zh/security/security-bulletins/detail/?id=openEuler-SA-2024-1960"
				}
			],
			"scores":[
				{
					"cvss_v3":{
						"baseSeverity":"MEDIUM",
						"baseScore":6.4,
						"vectorString":"CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H",
						"version":"3.1"
					},
					"products":[
						"openEuler-24.03-LTS:bpftool-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-6.6.0-37.0.0.44.oe2403.src"
					]
				}
			],
			"threats":[
				{
					"details":"Medium",
					"category":"impact"
				}
			],
			"title":"CVE-2024-41045"
		},
		{
			"cve":"CVE-2024-41048",
			"notes":[
				{
					"text":"In the Linux kernel, the following vulnerability has been resolved:\n\nskmsg: Skip zero length skb in sk_msg_recvmsg\n\nWhen running BPF selftests (./test_progs -t sockmap_basic) on a Loongarch\nplatform, the following kernel panic occurs:\n\n  [...]\n  Oops[#1]:\n  CPU: 22 PID: 2824 Comm: test_progs Tainted: G           OE  6.10.0-rc2+ #18\n  Hardware name: LOONGSON Dabieshan/Loongson-TC542F0, BIOS Loongson-UDK2018\n     ... ...\n     ra: 90000000048bf6c0 sk_msg_recvmsg+0x120/0x560\n    ERA: 9000000004162774 copy_page_to_iter+0x74/0x1c0\n   CRMD: 000000b0 (PLV0 -IE -DA +PG DACF=CC DACM=CC -WE)\n   PRMD: 0000000c (PPLV0 +PIE +PWE)\n   EUEN: 00000007 (+FPE +SXE +ASXE -BTE)\n   ECFG: 00071c1d (LIE=0,2-4,10-12 VS=7)\n  ESTAT: 00010000 [PIL] (IS= ECode=1 EsubCode=0)\n   BADV: 0000000000000040\n   PRID: 0014c011 (Loongson-64bit, Loongson-3C5000)\n  Modules linked in: bpf_testmod(OE) xt_CHECKSUM xt_MASQUERADE xt_conntrack\n  Process test_progs (pid: 2824, threadinfo=0000000000863a31, task=...)\n  Stack : ...\n  Call Trace:\n  [<9000000004162774>] copy_page_to_iter+0x74/0x1c0\n  [<90000000048bf6c0>] sk_msg_recvmsg+0x120/0x560\n  [<90000000049f2b90>] tcp_bpf_recvmsg_parser+0x170/0x4e0\n  [<90000000049aae34>] inet_recvmsg+0x54/0x100\n  [<900000000481ad5c>] sock_recvmsg+0x7c/0xe0\n  [<900000000481e1a8>] __sys_recvfrom+0x108/0x1c0\n  [<900000000481e27c>] sys_recvfrom+0x1c/0x40\n  [<9000000004c076ec>] do_syscall+0x8c/0xc0\n  [<9000000003731da4>] handle_syscall+0xc4/0x160\n  Code: ...\n  ---[ end trace 0000000000000000 ]---\n  Kernel panic - not syncing: Fatal exception\n  Kernel relocated by 0x3510000\n   .text @ 0x9000000003710000\n   .data @ 0x9000000004d70000\n   .bss  @ 0x9000000006469400\n  ---[ end Kernel panic - not syncing: Fatal exception ]---\n  [...]\n\nThis crash happens every time when running sockmap_skb_verdict_shutdown\nsubtest in sockmap_basic.\n\nThis crash is because a NULL pointer is passed to page_address() in the\nsk_msg_recvmsg(). Due to the different implementations depending on the\narchitecture, page_address(NULL) will trigger a panic on Loongarch\nplatform but not on x86 platform. So this bug was hidden on x86 platform\nfor a while, but now it is exposed on Loongarch platform. The root cause\nis that a zero length skb (skb->len == 0) was put on the queue.\n\nThis zero length skb is a TCP FIN packet, which was sent by shutdown(),\ninvoked in test_sockmap_skb_verdict_shutdown():\n\n\tshutdown(p1, SHUT_WR);\n\nIn this case, in sk_psock_skb_ingress_enqueue(), num_sge is zero, and no\npage is put to this sge (see sg_set_page in sg_set_page), but this empty\nsge is queued into ingress_msg list.\n\nAnd in sk_msg_recvmsg(), this empty sge is used, and a NULL page is got by\nsg_page(sge). Pass this NULL page to copy_page_to_iter(), which passes it\nto kmap_local_page() and to page_address(), then kernel panics.\n\nTo solve this, we should skip this zero length skb. So in sk_msg_recvmsg(),\nif copy is zero, that means it's a zero length skb, skip invoking\ncopy_page_to_iter(). We are using the EFAULT return triggered by\ncopy_page_to_iter to check for is_fin in tcp_bpf.c.",
					"category":"description",
					"title":"Vulnerability Description"
				}
			],
			"product_status":{
				"fixed":[
					"openEuler-24.03-LTS:bpftool-6.6.0-37.0.0.44.oe2403.aarch64",
					"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-37.0.0.44.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-6.6.0-37.0.0.44.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-37.0.0.44.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-debugsource-6.6.0-37.0.0.44.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-devel-6.6.0-37.0.0.44.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-headers-6.6.0-37.0.0.44.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-source-6.6.0-37.0.0.44.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-tools-6.6.0-37.0.0.44.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-37.0.0.44.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-37.0.0.44.oe2403.aarch64",
					"openEuler-24.03-LTS:perf-6.6.0-37.0.0.44.oe2403.aarch64",
					"openEuler-24.03-LTS:perf-debuginfo-6.6.0-37.0.0.44.oe2403.aarch64",
					"openEuler-24.03-LTS:python3-perf-6.6.0-37.0.0.44.oe2403.aarch64",
					"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-37.0.0.44.oe2403.aarch64",
					"openEuler-24.03-LTS:bpftool-6.6.0-37.0.0.44.oe2403.x86_64",
					"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-37.0.0.44.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-6.6.0-37.0.0.44.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-37.0.0.44.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-debugsource-6.6.0-37.0.0.44.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-devel-6.6.0-37.0.0.44.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-headers-6.6.0-37.0.0.44.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-source-6.6.0-37.0.0.44.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-tools-6.6.0-37.0.0.44.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-37.0.0.44.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-37.0.0.44.oe2403.x86_64",
					"openEuler-24.03-LTS:perf-6.6.0-37.0.0.44.oe2403.x86_64",
					"openEuler-24.03-LTS:perf-debuginfo-6.6.0-37.0.0.44.oe2403.x86_64",
					"openEuler-24.03-LTS:python3-perf-6.6.0-37.0.0.44.oe2403.x86_64",
					"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-37.0.0.44.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-6.6.0-37.0.0.44.oe2403.src"
				]
			},
			"remediations":[
				{
					"product_ids":[
						"openEuler-24.03-LTS:bpftool-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-6.6.0-37.0.0.44.oe2403.src"
					],
					"details":"kernel security update",
					"category":"vendor_fix",
					"url":"https://www.openeuler.org/zh/security/security-bulletins/detail/?id=openEuler-SA-2024-1960"
				}
			],
			"scores":[
				{
					"cvss_v3":{
						"baseSeverity":"MEDIUM",
						"baseScore":5.5,
						"vectorString":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
						"version":"3.1"
					},
					"products":[
						"openEuler-24.03-LTS:bpftool-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-6.6.0-37.0.0.44.oe2403.src"
					]
				}
			],
			"threats":[
				{
					"details":"Medium",
					"category":"impact"
				}
			],
			"title":"CVE-2024-41048"
		},
		{
			"cve":"CVE-2024-41049",
			"notes":[
				{
					"text":"In the Linux kernel, the following vulnerability has been resolved:\n\nfilelock: fix potential use-after-free in posix_lock_inode\n\nLight Hsieh reported a KASAN UAF warning in trace_posix_lock_inode().\nThe request pointer had been changed earlier to point to a lock entry\nthat was added to the inode's list. However, before the tracepoint could\nfire, another task raced in and freed that lock.\n\nFix this by moving the tracepoint inside the spinlock, which should\nensure that this doesn't happen.",
					"category":"description",
					"title":"Vulnerability Description"
				}
			],
			"product_status":{
				"fixed":[
					"openEuler-24.03-LTS:bpftool-6.6.0-37.0.0.44.oe2403.aarch64",
					"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-37.0.0.44.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-6.6.0-37.0.0.44.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-37.0.0.44.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-debugsource-6.6.0-37.0.0.44.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-devel-6.6.0-37.0.0.44.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-headers-6.6.0-37.0.0.44.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-source-6.6.0-37.0.0.44.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-tools-6.6.0-37.0.0.44.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-37.0.0.44.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-37.0.0.44.oe2403.aarch64",
					"openEuler-24.03-LTS:perf-6.6.0-37.0.0.44.oe2403.aarch64",
					"openEuler-24.03-LTS:perf-debuginfo-6.6.0-37.0.0.44.oe2403.aarch64",
					"openEuler-24.03-LTS:python3-perf-6.6.0-37.0.0.44.oe2403.aarch64",
					"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-37.0.0.44.oe2403.aarch64",
					"openEuler-24.03-LTS:bpftool-6.6.0-37.0.0.44.oe2403.x86_64",
					"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-37.0.0.44.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-6.6.0-37.0.0.44.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-37.0.0.44.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-debugsource-6.6.0-37.0.0.44.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-devel-6.6.0-37.0.0.44.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-headers-6.6.0-37.0.0.44.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-source-6.6.0-37.0.0.44.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-tools-6.6.0-37.0.0.44.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-37.0.0.44.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-37.0.0.44.oe2403.x86_64",
					"openEuler-24.03-LTS:perf-6.6.0-37.0.0.44.oe2403.x86_64",
					"openEuler-24.03-LTS:perf-debuginfo-6.6.0-37.0.0.44.oe2403.x86_64",
					"openEuler-24.03-LTS:python3-perf-6.6.0-37.0.0.44.oe2403.x86_64",
					"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-37.0.0.44.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-6.6.0-37.0.0.44.oe2403.src"
				]
			},
			"remediations":[
				{
					"product_ids":[
						"openEuler-24.03-LTS:bpftool-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-6.6.0-37.0.0.44.oe2403.src"
					],
					"details":"kernel security update",
					"category":"vendor_fix",
					"url":"https://www.openeuler.org/zh/security/security-bulletins/detail/?id=openEuler-SA-2024-1960"
				}
			],
			"scores":[
				{
					"cvss_v3":{
						"baseSeverity":"MEDIUM",
						"baseScore":5.5,
						"vectorString":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
						"version":"3.1"
					},
					"products":[
						"openEuler-24.03-LTS:bpftool-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-6.6.0-37.0.0.44.oe2403.src"
					]
				}
			],
			"threats":[
				{
					"details":"Medium",
					"category":"impact"
				}
			],
			"title":"CVE-2024-41049"
		},
		{
			"cve":"CVE-2024-41056",
			"notes":[
				{
					"text":"In the Linux kernel, the following vulnerability has been resolved:\n\nfirmware: cs_dsp: Use strnlen() on name fields in V1 wmfw files\n\nUse strnlen() instead of strlen() on the algorithm and coefficient name\nstring arrays in V1 wmfw files.\n\nIn V1 wmfw files the name is a NUL-terminated string in a fixed-size\narray. cs_dsp should protect against overrunning the array if the NUL\nterminator is missing.",
					"category":"description",
					"title":"Vulnerability Description"
				}
			],
			"product_status":{
				"fixed":[
					"openEuler-24.03-LTS:bpftool-6.6.0-37.0.0.44.oe2403.aarch64",
					"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-37.0.0.44.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-6.6.0-37.0.0.44.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-37.0.0.44.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-debugsource-6.6.0-37.0.0.44.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-devel-6.6.0-37.0.0.44.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-headers-6.6.0-37.0.0.44.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-source-6.6.0-37.0.0.44.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-tools-6.6.0-37.0.0.44.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-37.0.0.44.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-37.0.0.44.oe2403.aarch64",
					"openEuler-24.03-LTS:perf-6.6.0-37.0.0.44.oe2403.aarch64",
					"openEuler-24.03-LTS:perf-debuginfo-6.6.0-37.0.0.44.oe2403.aarch64",
					"openEuler-24.03-LTS:python3-perf-6.6.0-37.0.0.44.oe2403.aarch64",
					"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-37.0.0.44.oe2403.aarch64",
					"openEuler-24.03-LTS:bpftool-6.6.0-37.0.0.44.oe2403.x86_64",
					"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-37.0.0.44.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-6.6.0-37.0.0.44.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-37.0.0.44.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-debugsource-6.6.0-37.0.0.44.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-devel-6.6.0-37.0.0.44.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-headers-6.6.0-37.0.0.44.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-source-6.6.0-37.0.0.44.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-tools-6.6.0-37.0.0.44.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-37.0.0.44.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-37.0.0.44.oe2403.x86_64",
					"openEuler-24.03-LTS:perf-6.6.0-37.0.0.44.oe2403.x86_64",
					"openEuler-24.03-LTS:perf-debuginfo-6.6.0-37.0.0.44.oe2403.x86_64",
					"openEuler-24.03-LTS:python3-perf-6.6.0-37.0.0.44.oe2403.x86_64",
					"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-37.0.0.44.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-6.6.0-37.0.0.44.oe2403.src"
				]
			},
			"remediations":[
				{
					"product_ids":[
						"openEuler-24.03-LTS:bpftool-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-6.6.0-37.0.0.44.oe2403.src"
					],
					"details":"kernel security update",
					"category":"vendor_fix",
					"url":"https://www.openeuler.org/zh/security/security-bulletins/detail/?id=openEuler-SA-2024-1960"
				}
			],
			"scores":[
				{
					"cvss_v3":{
						"baseSeverity":"MEDIUM",
						"baseScore":5.5,
						"vectorString":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
						"version":"3.1"
					},
					"products":[
						"openEuler-24.03-LTS:bpftool-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-6.6.0-37.0.0.44.oe2403.src"
					]
				}
			],
			"threats":[
				{
					"details":"Medium",
					"category":"impact"
				}
			],
			"title":"CVE-2024-41056"
		},
		{
			"cve":"CVE-2024-41062",
			"notes":[
				{
					"text":"In the Linux kernel, the following vulnerability has been resolved:\n\nbluetooth/l2cap: sync sock recv cb and release\n\nThe problem occurs between the system call to close the sock and hci_rx_work,\nwhere the former releases the sock and the latter accesses it without lock protection.\n\n           CPU0                       CPU1\n           ----                       ----\n           sock_close                 hci_rx_work\n\t   l2cap_sock_release         hci_acldata_packet\n\t   l2cap_sock_kill            l2cap_recv_frame\n\t   sk_free                    l2cap_conless_channel\n\t                              l2cap_sock_recv_cb\n\nIf hci_rx_work processes the data that needs to be received before the sock is\nclosed, then everything is normal; Otherwise, the work thread may access the\nreleased sock when receiving data.\n\nAdd a chan mutex in the rx callback of the sock to achieve synchronization between\nthe sock release and recv cb.\n\nSock is dead, so set chan data to NULL, avoid others use invalid sock pointer.",
					"category":"description",
					"title":"Vulnerability Description"
				}
			],
			"product_status":{
				"fixed":[
					"openEuler-24.03-LTS:bpftool-6.6.0-37.0.0.44.oe2403.aarch64",
					"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-37.0.0.44.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-6.6.0-37.0.0.44.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-37.0.0.44.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-debugsource-6.6.0-37.0.0.44.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-devel-6.6.0-37.0.0.44.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-headers-6.6.0-37.0.0.44.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-source-6.6.0-37.0.0.44.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-tools-6.6.0-37.0.0.44.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-37.0.0.44.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-37.0.0.44.oe2403.aarch64",
					"openEuler-24.03-LTS:perf-6.6.0-37.0.0.44.oe2403.aarch64",
					"openEuler-24.03-LTS:perf-debuginfo-6.6.0-37.0.0.44.oe2403.aarch64",
					"openEuler-24.03-LTS:python3-perf-6.6.0-37.0.0.44.oe2403.aarch64",
					"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-37.0.0.44.oe2403.aarch64",
					"openEuler-24.03-LTS:bpftool-6.6.0-37.0.0.44.oe2403.x86_64",
					"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-37.0.0.44.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-6.6.0-37.0.0.44.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-37.0.0.44.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-debugsource-6.6.0-37.0.0.44.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-devel-6.6.0-37.0.0.44.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-headers-6.6.0-37.0.0.44.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-source-6.6.0-37.0.0.44.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-tools-6.6.0-37.0.0.44.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-37.0.0.44.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-37.0.0.44.oe2403.x86_64",
					"openEuler-24.03-LTS:perf-6.6.0-37.0.0.44.oe2403.x86_64",
					"openEuler-24.03-LTS:perf-debuginfo-6.6.0-37.0.0.44.oe2403.x86_64",
					"openEuler-24.03-LTS:python3-perf-6.6.0-37.0.0.44.oe2403.x86_64",
					"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-37.0.0.44.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-6.6.0-37.0.0.44.oe2403.src"
				]
			},
			"remediations":[
				{
					"product_ids":[
						"openEuler-24.03-LTS:bpftool-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-6.6.0-37.0.0.44.oe2403.src"
					],
					"details":"kernel security update",
					"category":"vendor_fix",
					"url":"https://www.openeuler.org/zh/security/security-bulletins/detail/?id=openEuler-SA-2024-1960"
				}
			],
			"scores":[
				{
					"cvss_v3":{
						"baseSeverity":"MEDIUM",
						"baseScore":5.5,
						"vectorString":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
						"version":"3.1"
					},
					"products":[
						"openEuler-24.03-LTS:bpftool-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-6.6.0-37.0.0.44.oe2403.src"
					]
				}
			],
			"threats":[
				{
					"details":"Medium",
					"category":"impact"
				}
			],
			"title":"CVE-2024-41062"
		},
		{
			"cve":"CVE-2024-41063",
			"notes":[
				{
					"text":"In the Linux kernel, the following vulnerability has been resolved:\n\nBluetooth: hci_core: cancel all works upon hci_unregister_dev()\n\nsyzbot is reporting that calling hci_release_dev() from hci_error_reset()\ndue to hci_dev_put() from hci_error_reset() can cause deadlock at\ndestroy_workqueue(), for hci_error_reset() is called from\nhdev->req_workqueue which destroy_workqueue() needs to flush.\n\nWe need to make sure that hdev->{rx_work,cmd_work,tx_work} which are\nqueued into hdev->workqueue and hdev->{power_on,error_reset} which are\nqueued into hdev->req_workqueue are no longer running by the moment\n\n       destroy_workqueue(hdev->workqueue);\n       destroy_workqueue(hdev->req_workqueue);\n\nare called from hci_release_dev().\n\nCall cancel_work_sync() on these work items from hci_unregister_dev()\nas soon as hdev->list is removed from hci_dev_list.",
					"category":"description",
					"title":"Vulnerability Description"
				}
			],
			"product_status":{
				"fixed":[
					"openEuler-24.03-LTS:bpftool-6.6.0-37.0.0.44.oe2403.aarch64",
					"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-37.0.0.44.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-6.6.0-37.0.0.44.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-37.0.0.44.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-debugsource-6.6.0-37.0.0.44.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-devel-6.6.0-37.0.0.44.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-headers-6.6.0-37.0.0.44.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-source-6.6.0-37.0.0.44.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-tools-6.6.0-37.0.0.44.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-37.0.0.44.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-37.0.0.44.oe2403.aarch64",
					"openEuler-24.03-LTS:perf-6.6.0-37.0.0.44.oe2403.aarch64",
					"openEuler-24.03-LTS:perf-debuginfo-6.6.0-37.0.0.44.oe2403.aarch64",
					"openEuler-24.03-LTS:python3-perf-6.6.0-37.0.0.44.oe2403.aarch64",
					"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-37.0.0.44.oe2403.aarch64",
					"openEuler-24.03-LTS:bpftool-6.6.0-37.0.0.44.oe2403.x86_64",
					"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-37.0.0.44.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-6.6.0-37.0.0.44.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-37.0.0.44.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-debugsource-6.6.0-37.0.0.44.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-devel-6.6.0-37.0.0.44.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-headers-6.6.0-37.0.0.44.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-source-6.6.0-37.0.0.44.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-tools-6.6.0-37.0.0.44.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-37.0.0.44.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-37.0.0.44.oe2403.x86_64",
					"openEuler-24.03-LTS:perf-6.6.0-37.0.0.44.oe2403.x86_64",
					"openEuler-24.03-LTS:perf-debuginfo-6.6.0-37.0.0.44.oe2403.x86_64",
					"openEuler-24.03-LTS:python3-perf-6.6.0-37.0.0.44.oe2403.x86_64",
					"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-37.0.0.44.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-6.6.0-37.0.0.44.oe2403.src"
				]
			},
			"remediations":[
				{
					"product_ids":[
						"openEuler-24.03-LTS:bpftool-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-6.6.0-37.0.0.44.oe2403.src"
					],
					"details":"kernel security update",
					"category":"vendor_fix",
					"url":"https://www.openeuler.org/zh/security/security-bulletins/detail/?id=openEuler-SA-2024-1960"
				}
			],
			"scores":[
				{
					"cvss_v3":{
						"baseSeverity":"MEDIUM",
						"baseScore":5.5,
						"vectorString":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
						"version":"3.1"
					},
					"products":[
						"openEuler-24.03-LTS:bpftool-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-6.6.0-37.0.0.44.oe2403.src"
					]
				}
			],
			"threats":[
				{
					"details":"Medium",
					"category":"impact"
				}
			],
			"title":"CVE-2024-41063"
		},
		{
			"cve":"CVE-2024-41064",
			"notes":[
				{
					"text":"In the Linux kernel, the following vulnerability has been resolved:\n\npowerpc/eeh: avoid possible crash when edev->pdev changes\n\nIf a PCI device is removed during eeh_pe_report_edev(), edev->pdev\nwill change and can cause a crash, hold the PCI rescan/remove lock\nwhile taking a copy of edev->pdev->bus.",
					"category":"description",
					"title":"Vulnerability Description"
				}
			],
			"product_status":{
				"fixed":[
					"openEuler-24.03-LTS:bpftool-6.6.0-37.0.0.44.oe2403.aarch64",
					"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-37.0.0.44.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-6.6.0-37.0.0.44.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-37.0.0.44.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-debugsource-6.6.0-37.0.0.44.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-devel-6.6.0-37.0.0.44.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-headers-6.6.0-37.0.0.44.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-source-6.6.0-37.0.0.44.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-tools-6.6.0-37.0.0.44.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-37.0.0.44.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-37.0.0.44.oe2403.aarch64",
					"openEuler-24.03-LTS:perf-6.6.0-37.0.0.44.oe2403.aarch64",
					"openEuler-24.03-LTS:perf-debuginfo-6.6.0-37.0.0.44.oe2403.aarch64",
					"openEuler-24.03-LTS:python3-perf-6.6.0-37.0.0.44.oe2403.aarch64",
					"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-37.0.0.44.oe2403.aarch64",
					"openEuler-24.03-LTS:bpftool-6.6.0-37.0.0.44.oe2403.x86_64",
					"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-37.0.0.44.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-6.6.0-37.0.0.44.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-37.0.0.44.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-debugsource-6.6.0-37.0.0.44.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-devel-6.6.0-37.0.0.44.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-headers-6.6.0-37.0.0.44.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-source-6.6.0-37.0.0.44.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-tools-6.6.0-37.0.0.44.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-37.0.0.44.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-37.0.0.44.oe2403.x86_64",
					"openEuler-24.03-LTS:perf-6.6.0-37.0.0.44.oe2403.x86_64",
					"openEuler-24.03-LTS:perf-debuginfo-6.6.0-37.0.0.44.oe2403.x86_64",
					"openEuler-24.03-LTS:python3-perf-6.6.0-37.0.0.44.oe2403.x86_64",
					"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-37.0.0.44.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-6.6.0-37.0.0.44.oe2403.src"
				]
			},
			"remediations":[
				{
					"product_ids":[
						"openEuler-24.03-LTS:bpftool-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-6.6.0-37.0.0.44.oe2403.src"
					],
					"details":"kernel security update",
					"category":"vendor_fix",
					"url":"https://www.openeuler.org/zh/security/security-bulletins/detail/?id=openEuler-SA-2024-1960"
				}
			],
			"scores":[
				{
					"cvss_v3":{
						"baseSeverity":"MEDIUM",
						"baseScore":5.5,
						"vectorString":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
						"version":"3.1"
					},
					"products":[
						"openEuler-24.03-LTS:bpftool-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-6.6.0-37.0.0.44.oe2403.src"
					]
				}
			],
			"threats":[
				{
					"details":"Medium",
					"category":"impact"
				}
			],
			"title":"CVE-2024-41064"
		},
		{
			"cve":"CVE-2024-41069",
			"notes":[
				{
					"text":"In the Linux kernel, the following vulnerability has been resolved:\n\nASoC: topology: Fix references to freed memory\n\nMost users after parsing a topology file, release memory used by it, so\nhaving pointer references directly into topology file contents is wrong.\nUse devm_kmemdup(), to allocate memory as needed.",
					"category":"description",
					"title":"Vulnerability Description"
				}
			],
			"product_status":{
				"fixed":[
					"openEuler-24.03-LTS:bpftool-6.6.0-37.0.0.44.oe2403.aarch64",
					"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-37.0.0.44.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-6.6.0-37.0.0.44.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-37.0.0.44.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-debugsource-6.6.0-37.0.0.44.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-devel-6.6.0-37.0.0.44.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-headers-6.6.0-37.0.0.44.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-source-6.6.0-37.0.0.44.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-tools-6.6.0-37.0.0.44.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-37.0.0.44.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-37.0.0.44.oe2403.aarch64",
					"openEuler-24.03-LTS:perf-6.6.0-37.0.0.44.oe2403.aarch64",
					"openEuler-24.03-LTS:perf-debuginfo-6.6.0-37.0.0.44.oe2403.aarch64",
					"openEuler-24.03-LTS:python3-perf-6.6.0-37.0.0.44.oe2403.aarch64",
					"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-37.0.0.44.oe2403.aarch64",
					"openEuler-24.03-LTS:bpftool-6.6.0-37.0.0.44.oe2403.x86_64",
					"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-37.0.0.44.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-6.6.0-37.0.0.44.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-37.0.0.44.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-debugsource-6.6.0-37.0.0.44.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-devel-6.6.0-37.0.0.44.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-headers-6.6.0-37.0.0.44.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-source-6.6.0-37.0.0.44.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-tools-6.6.0-37.0.0.44.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-37.0.0.44.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-37.0.0.44.oe2403.x86_64",
					"openEuler-24.03-LTS:perf-6.6.0-37.0.0.44.oe2403.x86_64",
					"openEuler-24.03-LTS:perf-debuginfo-6.6.0-37.0.0.44.oe2403.x86_64",
					"openEuler-24.03-LTS:python3-perf-6.6.0-37.0.0.44.oe2403.x86_64",
					"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-37.0.0.44.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-6.6.0-37.0.0.44.oe2403.src"
				]
			},
			"remediations":[
				{
					"product_ids":[
						"openEuler-24.03-LTS:bpftool-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-6.6.0-37.0.0.44.oe2403.src"
					],
					"details":"kernel security update",
					"category":"vendor_fix",
					"url":"https://www.openeuler.org/zh/security/security-bulletins/detail/?id=openEuler-SA-2024-1960"
				}
			],
			"scores":[
				{
					"cvss_v3":{
						"baseSeverity":"MEDIUM",
						"baseScore":5.5,
						"vectorString":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
						"version":"3.1"
					},
					"products":[
						"openEuler-24.03-LTS:bpftool-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-6.6.0-37.0.0.44.oe2403.src"
					]
				}
			],
			"threats":[
				{
					"details":"Medium",
					"category":"impact"
				}
			],
			"title":"CVE-2024-41069"
		},
		{
			"cve":"CVE-2024-41072",
			"notes":[
				{
					"text":"In the Linux kernel, the following vulnerability has been resolved:\n\nwifi: cfg80211: wext: add extra SIOCSIWSCAN data check\n\nIn 'cfg80211_wext_siwscan()', add extra check whether number of\nchannels passed via 'ioctl(sock, SIOCSIWSCAN, ...)' doesn't exceed\nIW_MAX_FREQUENCIES and reject invalid request with -EINVAL otherwise.",
					"category":"description",
					"title":"Vulnerability Description"
				}
			],
			"product_status":{
				"fixed":[
					"openEuler-24.03-LTS:bpftool-6.6.0-37.0.0.44.oe2403.aarch64",
					"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-37.0.0.44.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-6.6.0-37.0.0.44.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-37.0.0.44.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-debugsource-6.6.0-37.0.0.44.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-devel-6.6.0-37.0.0.44.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-headers-6.6.0-37.0.0.44.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-source-6.6.0-37.0.0.44.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-tools-6.6.0-37.0.0.44.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-37.0.0.44.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-37.0.0.44.oe2403.aarch64",
					"openEuler-24.03-LTS:perf-6.6.0-37.0.0.44.oe2403.aarch64",
					"openEuler-24.03-LTS:perf-debuginfo-6.6.0-37.0.0.44.oe2403.aarch64",
					"openEuler-24.03-LTS:python3-perf-6.6.0-37.0.0.44.oe2403.aarch64",
					"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-37.0.0.44.oe2403.aarch64",
					"openEuler-24.03-LTS:bpftool-6.6.0-37.0.0.44.oe2403.x86_64",
					"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-37.0.0.44.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-6.6.0-37.0.0.44.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-37.0.0.44.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-debugsource-6.6.0-37.0.0.44.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-devel-6.6.0-37.0.0.44.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-headers-6.6.0-37.0.0.44.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-source-6.6.0-37.0.0.44.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-tools-6.6.0-37.0.0.44.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-37.0.0.44.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-37.0.0.44.oe2403.x86_64",
					"openEuler-24.03-LTS:perf-6.6.0-37.0.0.44.oe2403.x86_64",
					"openEuler-24.03-LTS:perf-debuginfo-6.6.0-37.0.0.44.oe2403.x86_64",
					"openEuler-24.03-LTS:python3-perf-6.6.0-37.0.0.44.oe2403.x86_64",
					"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-37.0.0.44.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-6.6.0-37.0.0.44.oe2403.src"
				]
			},
			"remediations":[
				{
					"product_ids":[
						"openEuler-24.03-LTS:bpftool-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-6.6.0-37.0.0.44.oe2403.src"
					],
					"details":"kernel security update",
					"category":"vendor_fix",
					"url":"https://www.openeuler.org/zh/security/security-bulletins/detail/?id=openEuler-SA-2024-1960"
				}
			],
			"scores":[
				{
					"cvss_v3":{
						"baseSeverity":"MEDIUM",
						"baseScore":4.4,
						"vectorString":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N",
						"version":"3.1"
					},
					"products":[
						"openEuler-24.03-LTS:bpftool-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-6.6.0-37.0.0.44.oe2403.src"
					]
				}
			],
			"threats":[
				{
					"details":"Medium",
					"category":"impact"
				}
			],
			"title":"CVE-2024-41072"
		},
		{
			"cve":"CVE-2024-41073",
			"notes":[
				{
					"text":"In the Linux kernel, the following vulnerability has been resolved:\n\nnvme: avoid double free special payload\n\nIf a discard request needs to be retried, and that retry may fail before\na new special payload is added, a double free will result. Clear the\nRQF_SPECIAL_LOAD when the request is cleaned.",
					"category":"description",
					"title":"Vulnerability Description"
				}
			],
			"product_status":{
				"fixed":[
					"openEuler-24.03-LTS:bpftool-6.6.0-37.0.0.44.oe2403.aarch64",
					"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-37.0.0.44.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-6.6.0-37.0.0.44.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-37.0.0.44.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-debugsource-6.6.0-37.0.0.44.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-devel-6.6.0-37.0.0.44.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-headers-6.6.0-37.0.0.44.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-source-6.6.0-37.0.0.44.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-tools-6.6.0-37.0.0.44.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-37.0.0.44.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-37.0.0.44.oe2403.aarch64",
					"openEuler-24.03-LTS:perf-6.6.0-37.0.0.44.oe2403.aarch64",
					"openEuler-24.03-LTS:perf-debuginfo-6.6.0-37.0.0.44.oe2403.aarch64",
					"openEuler-24.03-LTS:python3-perf-6.6.0-37.0.0.44.oe2403.aarch64",
					"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-37.0.0.44.oe2403.aarch64",
					"openEuler-24.03-LTS:bpftool-6.6.0-37.0.0.44.oe2403.x86_64",
					"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-37.0.0.44.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-6.6.0-37.0.0.44.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-37.0.0.44.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-debugsource-6.6.0-37.0.0.44.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-devel-6.6.0-37.0.0.44.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-headers-6.6.0-37.0.0.44.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-source-6.6.0-37.0.0.44.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-tools-6.6.0-37.0.0.44.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-37.0.0.44.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-37.0.0.44.oe2403.x86_64",
					"openEuler-24.03-LTS:perf-6.6.0-37.0.0.44.oe2403.x86_64",
					"openEuler-24.03-LTS:perf-debuginfo-6.6.0-37.0.0.44.oe2403.x86_64",
					"openEuler-24.03-LTS:python3-perf-6.6.0-37.0.0.44.oe2403.x86_64",
					"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-37.0.0.44.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-6.6.0-37.0.0.44.oe2403.src"
				]
			},
			"remediations":[
				{
					"product_ids":[
						"openEuler-24.03-LTS:bpftool-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-6.6.0-37.0.0.44.oe2403.src"
					],
					"details":"kernel security update",
					"category":"vendor_fix",
					"url":"https://www.openeuler.org/zh/security/security-bulletins/detail/?id=openEuler-SA-2024-1960"
				}
			],
			"scores":[
				{
					"cvss_v3":{
						"baseSeverity":"MEDIUM",
						"baseScore":6.4,
						"vectorString":"CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H",
						"version":"3.1"
					},
					"products":[
						"openEuler-24.03-LTS:bpftool-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-6.6.0-37.0.0.44.oe2403.src"
					]
				}
			],
			"threats":[
				{
					"details":"Medium",
					"category":"impact"
				}
			],
			"title":"CVE-2024-41073"
		},
		{
			"cve":"CVE-2024-41074",
			"notes":[
				{
					"text":"In the Linux kernel, the following vulnerability has been resolved:\n\ncachefiles: Set object to close if ondemand_id < 0 in copen\n\nIf copen is maliciously called in the user mode, it may delete the request\ncorresponding to the random id. And the request may have not been read yet.\n\nNote that when the object is set to reopen, the open request will be done\nwith the still reopen state in above case. As a result, the request\ncorresponding to this object is always skipped in select_req function, so\nthe read request is never completed and blocks other process.\n\nFix this issue by simply set object to close if its id < 0 in copen.",
					"category":"description",
					"title":"Vulnerability Description"
				}
			],
			"product_status":{
				"fixed":[
					"openEuler-24.03-LTS:bpftool-6.6.0-37.0.0.44.oe2403.aarch64",
					"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-37.0.0.44.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-6.6.0-37.0.0.44.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-37.0.0.44.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-debugsource-6.6.0-37.0.0.44.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-devel-6.6.0-37.0.0.44.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-headers-6.6.0-37.0.0.44.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-source-6.6.0-37.0.0.44.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-tools-6.6.0-37.0.0.44.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-37.0.0.44.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-37.0.0.44.oe2403.aarch64",
					"openEuler-24.03-LTS:perf-6.6.0-37.0.0.44.oe2403.aarch64",
					"openEuler-24.03-LTS:perf-debuginfo-6.6.0-37.0.0.44.oe2403.aarch64",
					"openEuler-24.03-LTS:python3-perf-6.6.0-37.0.0.44.oe2403.aarch64",
					"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-37.0.0.44.oe2403.aarch64",
					"openEuler-24.03-LTS:bpftool-6.6.0-37.0.0.44.oe2403.x86_64",
					"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-37.0.0.44.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-6.6.0-37.0.0.44.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-37.0.0.44.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-debugsource-6.6.0-37.0.0.44.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-devel-6.6.0-37.0.0.44.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-headers-6.6.0-37.0.0.44.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-source-6.6.0-37.0.0.44.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-tools-6.6.0-37.0.0.44.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-37.0.0.44.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-37.0.0.44.oe2403.x86_64",
					"openEuler-24.03-LTS:perf-6.6.0-37.0.0.44.oe2403.x86_64",
					"openEuler-24.03-LTS:perf-debuginfo-6.6.0-37.0.0.44.oe2403.x86_64",
					"openEuler-24.03-LTS:python3-perf-6.6.0-37.0.0.44.oe2403.x86_64",
					"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-37.0.0.44.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-6.6.0-37.0.0.44.oe2403.src"
				]
			},
			"remediations":[
				{
					"product_ids":[
						"openEuler-24.03-LTS:bpftool-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-6.6.0-37.0.0.44.oe2403.src"
					],
					"details":"kernel security update",
					"category":"vendor_fix",
					"url":"https://www.openeuler.org/zh/security/security-bulletins/detail/?id=openEuler-SA-2024-1960"
				}
			],
			"scores":[
				{
					"cvss_v3":{
						"baseSeverity":"MEDIUM",
						"baseScore":5.5,
						"vectorString":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
						"version":"3.1"
					},
					"products":[
						"openEuler-24.03-LTS:bpftool-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-6.6.0-37.0.0.44.oe2403.src"
					]
				}
			],
			"threats":[
				{
					"details":"Medium",
					"category":"impact"
				}
			],
			"title":"CVE-2024-41074"
		},
		{
			"cve":"CVE-2024-41075",
			"notes":[
				{
					"text":"In the Linux kernel, the following vulnerability has been resolved:\n\ncachefiles: add consistency check for copen/cread\n\nThis prevents malicious processes from completing random copen/cread\nrequests and crashing the system. Added checks are listed below:\n\n  * Generic, copen can only complete open requests, and cread can only\n    complete read requests.\n  * For copen, ondemand_id must not be 0, because this indicates that the\n    request has not been read by the daemon.\n  * For cread, the object corresponding to fd and req should be the same.",
					"category":"description",
					"title":"Vulnerability Description"
				}
			],
			"product_status":{
				"fixed":[
					"openEuler-24.03-LTS:bpftool-6.6.0-37.0.0.44.oe2403.aarch64",
					"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-37.0.0.44.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-6.6.0-37.0.0.44.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-37.0.0.44.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-debugsource-6.6.0-37.0.0.44.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-devel-6.6.0-37.0.0.44.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-headers-6.6.0-37.0.0.44.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-source-6.6.0-37.0.0.44.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-tools-6.6.0-37.0.0.44.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-37.0.0.44.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-37.0.0.44.oe2403.aarch64",
					"openEuler-24.03-LTS:perf-6.6.0-37.0.0.44.oe2403.aarch64",
					"openEuler-24.03-LTS:perf-debuginfo-6.6.0-37.0.0.44.oe2403.aarch64",
					"openEuler-24.03-LTS:python3-perf-6.6.0-37.0.0.44.oe2403.aarch64",
					"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-37.0.0.44.oe2403.aarch64",
					"openEuler-24.03-LTS:bpftool-6.6.0-37.0.0.44.oe2403.x86_64",
					"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-37.0.0.44.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-6.6.0-37.0.0.44.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-37.0.0.44.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-debugsource-6.6.0-37.0.0.44.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-devel-6.6.0-37.0.0.44.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-headers-6.6.0-37.0.0.44.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-source-6.6.0-37.0.0.44.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-tools-6.6.0-37.0.0.44.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-37.0.0.44.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-37.0.0.44.oe2403.x86_64",
					"openEuler-24.03-LTS:perf-6.6.0-37.0.0.44.oe2403.x86_64",
					"openEuler-24.03-LTS:perf-debuginfo-6.6.0-37.0.0.44.oe2403.x86_64",
					"openEuler-24.03-LTS:python3-perf-6.6.0-37.0.0.44.oe2403.x86_64",
					"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-37.0.0.44.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-6.6.0-37.0.0.44.oe2403.src"
				]
			},
			"remediations":[
				{
					"product_ids":[
						"openEuler-24.03-LTS:bpftool-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-6.6.0-37.0.0.44.oe2403.src"
					],
					"details":"kernel security update",
					"category":"vendor_fix",
					"url":"https://www.openeuler.org/zh/security/security-bulletins/detail/?id=openEuler-SA-2024-1960"
				}
			],
			"scores":[
				{
					"cvss_v3":{
						"baseSeverity":"MEDIUM",
						"baseScore":5.5,
						"vectorString":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
						"version":"3.1"
					},
					"products":[
						"openEuler-24.03-LTS:bpftool-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-6.6.0-37.0.0.44.oe2403.src"
					]
				}
			],
			"threats":[
				{
					"details":"Medium",
					"category":"impact"
				}
			],
			"title":"CVE-2024-41075"
		},
		{
			"cve":"CVE-2024-41076",
			"notes":[
				{
					"text":"In the Linux kernel, the following vulnerability has been resolved:\n\nNFSv4: Fix memory leak in nfs4_set_security_label\n\nWe leak nfs_fattr and nfs4_label every time we set a security xattr.",
					"category":"description",
					"title":"Vulnerability Description"
				}
			],
			"product_status":{
				"fixed":[
					"openEuler-24.03-LTS:bpftool-6.6.0-37.0.0.44.oe2403.aarch64",
					"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-37.0.0.44.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-6.6.0-37.0.0.44.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-37.0.0.44.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-debugsource-6.6.0-37.0.0.44.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-devel-6.6.0-37.0.0.44.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-headers-6.6.0-37.0.0.44.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-source-6.6.0-37.0.0.44.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-tools-6.6.0-37.0.0.44.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-37.0.0.44.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-37.0.0.44.oe2403.aarch64",
					"openEuler-24.03-LTS:perf-6.6.0-37.0.0.44.oe2403.aarch64",
					"openEuler-24.03-LTS:perf-debuginfo-6.6.0-37.0.0.44.oe2403.aarch64",
					"openEuler-24.03-LTS:python3-perf-6.6.0-37.0.0.44.oe2403.aarch64",
					"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-37.0.0.44.oe2403.aarch64",
					"openEuler-24.03-LTS:bpftool-6.6.0-37.0.0.44.oe2403.x86_64",
					"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-37.0.0.44.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-6.6.0-37.0.0.44.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-37.0.0.44.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-debugsource-6.6.0-37.0.0.44.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-devel-6.6.0-37.0.0.44.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-headers-6.6.0-37.0.0.44.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-source-6.6.0-37.0.0.44.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-tools-6.6.0-37.0.0.44.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-37.0.0.44.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-37.0.0.44.oe2403.x86_64",
					"openEuler-24.03-LTS:perf-6.6.0-37.0.0.44.oe2403.x86_64",
					"openEuler-24.03-LTS:perf-debuginfo-6.6.0-37.0.0.44.oe2403.x86_64",
					"openEuler-24.03-LTS:python3-perf-6.6.0-37.0.0.44.oe2403.x86_64",
					"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-37.0.0.44.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-6.6.0-37.0.0.44.oe2403.src"
				]
			},
			"remediations":[
				{
					"product_ids":[
						"openEuler-24.03-LTS:bpftool-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-6.6.0-37.0.0.44.oe2403.src"
					],
					"details":"kernel security update",
					"category":"vendor_fix",
					"url":"https://www.openeuler.org/zh/security/security-bulletins/detail/?id=openEuler-SA-2024-1960"
				}
			],
			"scores":[
				{
					"cvss_v3":{
						"baseSeverity":"MEDIUM",
						"baseScore":5.5,
						"vectorString":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
						"version":"3.1"
					},
					"products":[
						"openEuler-24.03-LTS:bpftool-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-6.6.0-37.0.0.44.oe2403.src"
					]
				}
			],
			"threats":[
				{
					"details":"Medium",
					"category":"impact"
				}
			],
			"title":"CVE-2024-41076"
		},
		{
			"cve":"CVE-2024-41077",
			"notes":[
				{
					"text":"In the Linux kernel, the following vulnerability has been resolved:\n\nnull_blk: fix validation of block size\n\nBlock size should be between 512 and PAGE_SIZE and be a power of 2. The current\ncheck does not validate this, so update the check.\n\nWithout this patch, null_blk would Oops due to a null pointer deref when\nloaded with bs=1536 [1].\n\n\n[axboe: remove unnecessary braces and != 0 check]",
					"category":"description",
					"title":"Vulnerability Description"
				}
			],
			"product_status":{
				"fixed":[
					"openEuler-24.03-LTS:bpftool-6.6.0-37.0.0.44.oe2403.aarch64",
					"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-37.0.0.44.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-6.6.0-37.0.0.44.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-37.0.0.44.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-debugsource-6.6.0-37.0.0.44.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-devel-6.6.0-37.0.0.44.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-headers-6.6.0-37.0.0.44.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-source-6.6.0-37.0.0.44.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-tools-6.6.0-37.0.0.44.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-37.0.0.44.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-37.0.0.44.oe2403.aarch64",
					"openEuler-24.03-LTS:perf-6.6.0-37.0.0.44.oe2403.aarch64",
					"openEuler-24.03-LTS:perf-debuginfo-6.6.0-37.0.0.44.oe2403.aarch64",
					"openEuler-24.03-LTS:python3-perf-6.6.0-37.0.0.44.oe2403.aarch64",
					"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-37.0.0.44.oe2403.aarch64",
					"openEuler-24.03-LTS:bpftool-6.6.0-37.0.0.44.oe2403.x86_64",
					"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-37.0.0.44.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-6.6.0-37.0.0.44.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-37.0.0.44.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-debugsource-6.6.0-37.0.0.44.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-devel-6.6.0-37.0.0.44.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-headers-6.6.0-37.0.0.44.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-source-6.6.0-37.0.0.44.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-tools-6.6.0-37.0.0.44.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-37.0.0.44.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-37.0.0.44.oe2403.x86_64",
					"openEuler-24.03-LTS:perf-6.6.0-37.0.0.44.oe2403.x86_64",
					"openEuler-24.03-LTS:perf-debuginfo-6.6.0-37.0.0.44.oe2403.x86_64",
					"openEuler-24.03-LTS:python3-perf-6.6.0-37.0.0.44.oe2403.x86_64",
					"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-37.0.0.44.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-6.6.0-37.0.0.44.oe2403.src"
				]
			},
			"remediations":[
				{
					"product_ids":[
						"openEuler-24.03-LTS:bpftool-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-6.6.0-37.0.0.44.oe2403.src"
					],
					"details":"kernel security update",
					"category":"vendor_fix",
					"url":"https://www.openeuler.org/zh/security/security-bulletins/detail/?id=openEuler-SA-2024-1960"
				}
			],
			"scores":[
				{
					"cvss_v3":{
						"baseSeverity":"MEDIUM",
						"baseScore":4.8,
						"vectorString":"CVSS:3.1/AV:A/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H",
						"version":"3.1"
					},
					"products":[
						"openEuler-24.03-LTS:bpftool-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-6.6.0-37.0.0.44.oe2403.src"
					]
				}
			],
			"threats":[
				{
					"details":"Medium",
					"category":"impact"
				}
			],
			"title":"CVE-2024-41077"
		},
		{
			"cve":"CVE-2024-41080",
			"notes":[
				{
					"text":"In the Linux kernel, the following vulnerability has been resolved:\n\nio_uring: fix possible deadlock in io_register_iowq_max_workers()\n\nThe io_register_iowq_max_workers() function calls io_put_sq_data(),\nwhich acquires the sqd->lock without releasing the uring_lock.\nSimilar to the commit 009ad9f0c6ee (\"io_uring: drop ctx->uring_lock\nbefore acquiring sqd->lock\"), this can lead to a potential deadlock\nsituation.\n\nTo resolve this issue, the uring_lock is released before calling\nio_put_sq_data(), and then it is re-acquired after the function call.\n\nThis change ensures that the locks are acquired in the correct\norder, preventing the possibility of a deadlock.",
					"category":"description",
					"title":"Vulnerability Description"
				}
			],
			"product_status":{
				"fixed":[
					"openEuler-24.03-LTS:bpftool-6.6.0-37.0.0.44.oe2403.aarch64",
					"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-37.0.0.44.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-6.6.0-37.0.0.44.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-37.0.0.44.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-debugsource-6.6.0-37.0.0.44.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-devel-6.6.0-37.0.0.44.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-headers-6.6.0-37.0.0.44.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-source-6.6.0-37.0.0.44.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-tools-6.6.0-37.0.0.44.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-37.0.0.44.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-37.0.0.44.oe2403.aarch64",
					"openEuler-24.03-LTS:perf-6.6.0-37.0.0.44.oe2403.aarch64",
					"openEuler-24.03-LTS:perf-debuginfo-6.6.0-37.0.0.44.oe2403.aarch64",
					"openEuler-24.03-LTS:python3-perf-6.6.0-37.0.0.44.oe2403.aarch64",
					"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-37.0.0.44.oe2403.aarch64",
					"openEuler-24.03-LTS:bpftool-6.6.0-37.0.0.44.oe2403.x86_64",
					"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-37.0.0.44.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-6.6.0-37.0.0.44.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-37.0.0.44.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-debugsource-6.6.0-37.0.0.44.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-devel-6.6.0-37.0.0.44.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-headers-6.6.0-37.0.0.44.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-source-6.6.0-37.0.0.44.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-tools-6.6.0-37.0.0.44.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-37.0.0.44.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-37.0.0.44.oe2403.x86_64",
					"openEuler-24.03-LTS:perf-6.6.0-37.0.0.44.oe2403.x86_64",
					"openEuler-24.03-LTS:perf-debuginfo-6.6.0-37.0.0.44.oe2403.x86_64",
					"openEuler-24.03-LTS:python3-perf-6.6.0-37.0.0.44.oe2403.x86_64",
					"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-37.0.0.44.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-6.6.0-37.0.0.44.oe2403.src"
				]
			},
			"remediations":[
				{
					"product_ids":[
						"openEuler-24.03-LTS:bpftool-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-6.6.0-37.0.0.44.oe2403.src"
					],
					"details":"kernel security update",
					"category":"vendor_fix",
					"url":"https://www.openeuler.org/zh/security/security-bulletins/detail/?id=openEuler-SA-2024-1960"
				}
			],
			"scores":[
				{
					"cvss_v3":{
						"baseSeverity":"MEDIUM",
						"baseScore":5.7,
						"vectorString":"CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
						"version":"3.1"
					},
					"products":[
						"openEuler-24.03-LTS:bpftool-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-6.6.0-37.0.0.44.oe2403.src"
					]
				}
			],
			"threats":[
				{
					"details":"Medium",
					"category":"impact"
				}
			],
			"title":"CVE-2024-41080"
		},
		{
			"cve":"CVE-2024-41085",
			"notes":[
				{
					"text":"In the Linux kernel, the following vulnerability has been resolved:\n\ncxl/mem: Fix no cxl_nvd during pmem region auto-assembling\n\nWhen CXL subsystem is auto-assembling a pmem region during cxl\nendpoint port probing, always hit below calltrace.\n\n BUG: kernel NULL pointer dereference, address: 0000000000000078\n #PF: supervisor read access in kernel mode\n #PF: error_code(0x0000) - not-present page\n RIP: 0010:cxl_pmem_region_probe+0x22e/0x360 [cxl_pmem]\n Call Trace:\n  <TASK>\n  ? __die+0x24/0x70\n  ? page_fault_oops+0x82/0x160\n  ? do_user_addr_fault+0x65/0x6b0\n  ? exc_page_fault+0x7d/0x170\n  ? asm_exc_page_fault+0x26/0x30\n  ? cxl_pmem_region_probe+0x22e/0x360 [cxl_pmem]\n  ? cxl_pmem_region_probe+0x1ac/0x360 [cxl_pmem]\n  cxl_bus_probe+0x1b/0x60 [cxl_core]\n  really_probe+0x173/0x410\n  ? __pfx___device_attach_driver+0x10/0x10\n  __driver_probe_device+0x80/0x170\n  driver_probe_device+0x1e/0x90\n  __device_attach_driver+0x90/0x120\n  bus_for_each_drv+0x84/0xe0\n  __device_attach+0xbc/0x1f0\n  bus_probe_device+0x90/0xa0\n  device_add+0x51c/0x710\n  devm_cxl_add_pmem_region+0x1b5/0x380 [cxl_core]\n  cxl_bus_probe+0x1b/0x60 [cxl_core]\n\nThe cxl_nvd of the memdev needs to be available during the pmem region\nprobe. Currently the cxl_nvd is registered after the endpoint port probe.\nThe endpoint probe, in the case of autoassembly of regions, can cause a\npmem region probe requiring the not yet available cxl_nvd. Adjust the\nsequence so this dependency is met.\n\nThis requires adding a port parameter to cxl_find_nvdimm_bridge() that\ncan be used to query the ancestor root port. The endpoint port is not\nyet available, but will share a common ancestor with its parent, so\nstart the query from there instead.",
					"category":"description",
					"title":"Vulnerability Description"
				}
			],
			"product_status":{
				"fixed":[
					"openEuler-24.03-LTS:bpftool-6.6.0-37.0.0.44.oe2403.aarch64",
					"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-37.0.0.44.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-6.6.0-37.0.0.44.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-37.0.0.44.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-debugsource-6.6.0-37.0.0.44.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-devel-6.6.0-37.0.0.44.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-headers-6.6.0-37.0.0.44.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-source-6.6.0-37.0.0.44.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-tools-6.6.0-37.0.0.44.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-37.0.0.44.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-37.0.0.44.oe2403.aarch64",
					"openEuler-24.03-LTS:perf-6.6.0-37.0.0.44.oe2403.aarch64",
					"openEuler-24.03-LTS:perf-debuginfo-6.6.0-37.0.0.44.oe2403.aarch64",
					"openEuler-24.03-LTS:python3-perf-6.6.0-37.0.0.44.oe2403.aarch64",
					"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-37.0.0.44.oe2403.aarch64",
					"openEuler-24.03-LTS:bpftool-6.6.0-37.0.0.44.oe2403.x86_64",
					"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-37.0.0.44.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-6.6.0-37.0.0.44.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-37.0.0.44.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-debugsource-6.6.0-37.0.0.44.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-devel-6.6.0-37.0.0.44.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-headers-6.6.0-37.0.0.44.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-source-6.6.0-37.0.0.44.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-tools-6.6.0-37.0.0.44.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-37.0.0.44.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-37.0.0.44.oe2403.x86_64",
					"openEuler-24.03-LTS:perf-6.6.0-37.0.0.44.oe2403.x86_64",
					"openEuler-24.03-LTS:perf-debuginfo-6.6.0-37.0.0.44.oe2403.x86_64",
					"openEuler-24.03-LTS:python3-perf-6.6.0-37.0.0.44.oe2403.x86_64",
					"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-37.0.0.44.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-6.6.0-37.0.0.44.oe2403.src"
				]
			},
			"remediations":[
				{
					"product_ids":[
						"openEuler-24.03-LTS:bpftool-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-6.6.0-37.0.0.44.oe2403.src"
					],
					"details":"kernel security update",
					"category":"vendor_fix",
					"url":"https://www.openeuler.org/zh/security/security-bulletins/detail/?id=openEuler-SA-2024-1960"
				}
			],
			"scores":[
				{
					"cvss_v3":{
						"baseSeverity":"MEDIUM",
						"baseScore":5.5,
						"vectorString":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
						"version":"3.1"
					},
					"products":[
						"openEuler-24.03-LTS:bpftool-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-6.6.0-37.0.0.44.oe2403.src"
					]
				}
			],
			"threats":[
				{
					"details":"Medium",
					"category":"impact"
				}
			],
			"title":"CVE-2024-41085"
		},
		{
			"cve":"CVE-2024-41090",
			"notes":[
				{
					"text":"In the Linux kernel, the following vulnerability has been resolved:\n\ntap: add missing verification for short frame\n\nThe cited commit missed to check against the validity of the frame length\nin the tap_get_user_xdp() path, which could cause a corrupted skb to be\nsent downstack. Even before the skb is transmitted, the\ntap_get_user_xdp()-->skb_set_network_header() may assume the size is more\nthan ETH_HLEN. Once transmitted, this could either cause out-of-bound\naccess beyond the actual length, or confuse the underlayer with incorrect\nor inconsistent header length in the skb metadata.\n\nIn the alternative path, tap_get_user() already prohibits short frame which\nhas the length less than Ethernet header size from being transmitted.\n\nThis is to drop any frame shorter than the Ethernet header size just like\nhow tap_get_user() does.\n\nCVE: CVE-2024-41090",
					"category":"description",
					"title":"Vulnerability Description"
				}
			],
			"product_status":{
				"fixed":[
					"openEuler-24.03-LTS:bpftool-6.6.0-37.0.0.44.oe2403.aarch64",
					"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-37.0.0.44.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-6.6.0-37.0.0.44.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-37.0.0.44.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-debugsource-6.6.0-37.0.0.44.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-devel-6.6.0-37.0.0.44.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-headers-6.6.0-37.0.0.44.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-source-6.6.0-37.0.0.44.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-tools-6.6.0-37.0.0.44.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-37.0.0.44.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-37.0.0.44.oe2403.aarch64",
					"openEuler-24.03-LTS:perf-6.6.0-37.0.0.44.oe2403.aarch64",
					"openEuler-24.03-LTS:perf-debuginfo-6.6.0-37.0.0.44.oe2403.aarch64",
					"openEuler-24.03-LTS:python3-perf-6.6.0-37.0.0.44.oe2403.aarch64",
					"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-37.0.0.44.oe2403.aarch64",
					"openEuler-24.03-LTS:bpftool-6.6.0-37.0.0.44.oe2403.x86_64",
					"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-37.0.0.44.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-6.6.0-37.0.0.44.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-37.0.0.44.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-debugsource-6.6.0-37.0.0.44.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-devel-6.6.0-37.0.0.44.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-headers-6.6.0-37.0.0.44.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-source-6.6.0-37.0.0.44.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-tools-6.6.0-37.0.0.44.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-37.0.0.44.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-37.0.0.44.oe2403.x86_64",
					"openEuler-24.03-LTS:perf-6.6.0-37.0.0.44.oe2403.x86_64",
					"openEuler-24.03-LTS:perf-debuginfo-6.6.0-37.0.0.44.oe2403.x86_64",
					"openEuler-24.03-LTS:python3-perf-6.6.0-37.0.0.44.oe2403.x86_64",
					"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-37.0.0.44.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-6.6.0-37.0.0.44.oe2403.src"
				]
			},
			"remediations":[
				{
					"product_ids":[
						"openEuler-24.03-LTS:bpftool-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-6.6.0-37.0.0.44.oe2403.src"
					],
					"details":"kernel security update",
					"category":"vendor_fix",
					"url":"https://www.openeuler.org/zh/security/security-bulletins/detail/?id=openEuler-SA-2024-1960"
				}
			],
			"scores":[
				{
					"cvss_v3":{
						"baseSeverity":"HIGH",
						"baseScore":7.1,
						"vectorString":"CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H",
						"version":"3.1"
					},
					"products":[
						"openEuler-24.03-LTS:bpftool-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-6.6.0-37.0.0.44.oe2403.src"
					]
				}
			],
			"threats":[
				{
					"details":"High",
					"category":"impact"
				}
			],
			"title":"CVE-2024-41090"
		},
		{
			"cve":"CVE-2024-41091",
			"notes":[
				{
					"text":"In the Linux kernel, the following vulnerability has been resolved:\n\ntun: add missing verification for short frame\n\nThe cited commit missed to check against the validity of the frame length\nin the tun_xdp_one() path, which could cause a corrupted skb to be sent\ndownstack. Even before the skb is transmitted, the\ntun_xdp_one-->eth_type_trans() may access the Ethernet header although it\ncan be less than ETH_HLEN. Once transmitted, this could either cause\nout-of-bound access beyond the actual length, or confuse the underlayer\nwith incorrect or inconsistent header length in the skb metadata.\n\nIn the alternative path, tun_get_user() already prohibits short frame which\nhas the length less than Ethernet header size from being transmitted for\nIFF_TAP.\n\nThis is to drop any frame shorter than the Ethernet header size just like\nhow tun_get_user() does.\n\nCVE: CVE-2024-41091",
					"category":"description",
					"title":"Vulnerability Description"
				}
			],
			"product_status":{
				"fixed":[
					"openEuler-24.03-LTS:bpftool-6.6.0-37.0.0.44.oe2403.aarch64",
					"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-37.0.0.44.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-6.6.0-37.0.0.44.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-37.0.0.44.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-debugsource-6.6.0-37.0.0.44.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-devel-6.6.0-37.0.0.44.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-headers-6.6.0-37.0.0.44.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-source-6.6.0-37.0.0.44.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-tools-6.6.0-37.0.0.44.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-37.0.0.44.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-37.0.0.44.oe2403.aarch64",
					"openEuler-24.03-LTS:perf-6.6.0-37.0.0.44.oe2403.aarch64",
					"openEuler-24.03-LTS:perf-debuginfo-6.6.0-37.0.0.44.oe2403.aarch64",
					"openEuler-24.03-LTS:python3-perf-6.6.0-37.0.0.44.oe2403.aarch64",
					"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-37.0.0.44.oe2403.aarch64",
					"openEuler-24.03-LTS:bpftool-6.6.0-37.0.0.44.oe2403.x86_64",
					"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-37.0.0.44.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-6.6.0-37.0.0.44.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-37.0.0.44.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-debugsource-6.6.0-37.0.0.44.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-devel-6.6.0-37.0.0.44.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-headers-6.6.0-37.0.0.44.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-source-6.6.0-37.0.0.44.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-tools-6.6.0-37.0.0.44.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-37.0.0.44.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-37.0.0.44.oe2403.x86_64",
					"openEuler-24.03-LTS:perf-6.6.0-37.0.0.44.oe2403.x86_64",
					"openEuler-24.03-LTS:perf-debuginfo-6.6.0-37.0.0.44.oe2403.x86_64",
					"openEuler-24.03-LTS:python3-perf-6.6.0-37.0.0.44.oe2403.x86_64",
					"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-37.0.0.44.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-6.6.0-37.0.0.44.oe2403.src"
				]
			},
			"remediations":[
				{
					"product_ids":[
						"openEuler-24.03-LTS:bpftool-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-6.6.0-37.0.0.44.oe2403.src"
					],
					"details":"kernel security update",
					"category":"vendor_fix",
					"url":"https://www.openeuler.org/zh/security/security-bulletins/detail/?id=openEuler-SA-2024-1960"
				}
			],
			"scores":[
				{
					"cvss_v3":{
						"baseSeverity":"HIGH",
						"baseScore":7.1,
						"vectorString":"CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H",
						"version":"3.1"
					},
					"products":[
						"openEuler-24.03-LTS:bpftool-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-6.6.0-37.0.0.44.oe2403.src"
					]
				}
			],
			"threats":[
				{
					"details":"High",
					"category":"impact"
				}
			],
			"title":"CVE-2024-41091"
		},
		{
			"cve":"CVE-2024-41096",
			"notes":[
				{
					"text":"In the Linux kernel, the following vulnerability has been resolved:\n\nPCI/MSI: Fix UAF in msi_capability_init\n\nKFENCE reports the following UAF:\n\n BUG: KFENCE: use-after-free read in __pci_enable_msi_range+0x2c0/0x488\n\n Use-after-free read at 0x0000000024629571 (in kfence-#12):\n  __pci_enable_msi_range+0x2c0/0x488\n  pci_alloc_irq_vectors_affinity+0xec/0x14c\n  pci_alloc_irq_vectors+0x18/0x28\n\n kfence-#12: 0x0000000008614900-0x00000000e06c228d, size=104, cache=kmalloc-128\n\n allocated by task 81 on cpu 7 at 10.808142s:\n  __kmem_cache_alloc_node+0x1f0/0x2bc\n  kmalloc_trace+0x44/0x138\n  msi_alloc_desc+0x3c/0x9c\n  msi_domain_insert_msi_desc+0x30/0x78\n  msi_setup_msi_desc+0x13c/0x184\n  __pci_enable_msi_range+0x258/0x488\n  pci_alloc_irq_vectors_affinity+0xec/0x14c\n  pci_alloc_irq_vectors+0x18/0x28\n\n freed by task 81 on cpu 7 at 10.811436s:\n  msi_domain_free_descs+0xd4/0x10c\n  msi_domain_free_locked.part.0+0xc0/0x1d8\n  msi_domain_alloc_irqs_all_locked+0xb4/0xbc\n  pci_msi_setup_msi_irqs+0x30/0x4c\n  __pci_enable_msi_range+0x2a8/0x488\n  pci_alloc_irq_vectors_affinity+0xec/0x14c\n  pci_alloc_irq_vectors+0x18/0x28\n\nDescriptor allocation done in:\n__pci_enable_msi_range\n    msi_capability_init\n        msi_setup_msi_desc\n            msi_insert_msi_desc\n                msi_domain_insert_msi_desc\n                    msi_alloc_desc\n                        ...\n\nFreed in case of failure in __msi_domain_alloc_locked()\n__pci_enable_msi_range\n    msi_capability_init\n        pci_msi_setup_msi_irqs\n            msi_domain_alloc_irqs_all_locked\n                msi_domain_alloc_locked\n                    __msi_domain_alloc_locked => fails\n                    msi_domain_free_locked\n                        ...\n\nThat failure propagates back to pci_msi_setup_msi_irqs() in\nmsi_capability_init() which accesses the descriptor for unmasking in the\nerror exit path.\n\nCure it by copying the descriptor and using the copy for the error exit path\nunmask operation.\n\n[ tglx: Massaged change log ]",
					"category":"description",
					"title":"Vulnerability Description"
				}
			],
			"product_status":{
				"fixed":[
					"openEuler-24.03-LTS:bpftool-6.6.0-37.0.0.44.oe2403.aarch64",
					"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-37.0.0.44.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-6.6.0-37.0.0.44.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-37.0.0.44.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-debugsource-6.6.0-37.0.0.44.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-devel-6.6.0-37.0.0.44.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-headers-6.6.0-37.0.0.44.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-source-6.6.0-37.0.0.44.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-tools-6.6.0-37.0.0.44.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-37.0.0.44.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-37.0.0.44.oe2403.aarch64",
					"openEuler-24.03-LTS:perf-6.6.0-37.0.0.44.oe2403.aarch64",
					"openEuler-24.03-LTS:perf-debuginfo-6.6.0-37.0.0.44.oe2403.aarch64",
					"openEuler-24.03-LTS:python3-perf-6.6.0-37.0.0.44.oe2403.aarch64",
					"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-37.0.0.44.oe2403.aarch64",
					"openEuler-24.03-LTS:bpftool-6.6.0-37.0.0.44.oe2403.x86_64",
					"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-37.0.0.44.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-6.6.0-37.0.0.44.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-37.0.0.44.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-debugsource-6.6.0-37.0.0.44.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-devel-6.6.0-37.0.0.44.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-headers-6.6.0-37.0.0.44.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-source-6.6.0-37.0.0.44.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-tools-6.6.0-37.0.0.44.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-37.0.0.44.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-37.0.0.44.oe2403.x86_64",
					"openEuler-24.03-LTS:perf-6.6.0-37.0.0.44.oe2403.x86_64",
					"openEuler-24.03-LTS:perf-debuginfo-6.6.0-37.0.0.44.oe2403.x86_64",
					"openEuler-24.03-LTS:python3-perf-6.6.0-37.0.0.44.oe2403.x86_64",
					"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-37.0.0.44.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-6.6.0-37.0.0.44.oe2403.src"
				]
			},
			"remediations":[
				{
					"product_ids":[
						"openEuler-24.03-LTS:bpftool-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-6.6.0-37.0.0.44.oe2403.src"
					],
					"details":"kernel security update",
					"category":"vendor_fix",
					"url":"https://www.openeuler.org/zh/security/security-bulletins/detail/?id=openEuler-SA-2024-1960"
				}
			],
			"scores":[
				{
					"cvss_v3":{
						"baseSeverity":"MEDIUM",
						"baseScore":5.5,
						"vectorString":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
						"version":"3.1"
					},
					"products":[
						"openEuler-24.03-LTS:bpftool-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-6.6.0-37.0.0.44.oe2403.src"
					]
				}
			],
			"threats":[
				{
					"details":"Medium",
					"category":"impact"
				}
			],
			"title":"CVE-2024-41096"
		},
		{
			"cve":"CVE-2024-42068",
			"notes":[
				{
					"text":"In the Linux kernel, the following vulnerability has been resolved:\n\nbpf: Take return from set_memory_ro() into account with bpf_prog_lock_ro()\n\nset_memory_ro() can fail, leaving memory unprotected.\n\nCheck its return and take it into account as an error.",
					"category":"description",
					"title":"Vulnerability Description"
				}
			],
			"product_status":{
				"fixed":[
					"openEuler-24.03-LTS:bpftool-6.6.0-37.0.0.44.oe2403.aarch64",
					"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-37.0.0.44.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-6.6.0-37.0.0.44.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-37.0.0.44.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-debugsource-6.6.0-37.0.0.44.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-devel-6.6.0-37.0.0.44.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-headers-6.6.0-37.0.0.44.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-source-6.6.0-37.0.0.44.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-tools-6.6.0-37.0.0.44.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-37.0.0.44.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-37.0.0.44.oe2403.aarch64",
					"openEuler-24.03-LTS:perf-6.6.0-37.0.0.44.oe2403.aarch64",
					"openEuler-24.03-LTS:perf-debuginfo-6.6.0-37.0.0.44.oe2403.aarch64",
					"openEuler-24.03-LTS:python3-perf-6.6.0-37.0.0.44.oe2403.aarch64",
					"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-37.0.0.44.oe2403.aarch64",
					"openEuler-24.03-LTS:bpftool-6.6.0-37.0.0.44.oe2403.x86_64",
					"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-37.0.0.44.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-6.6.0-37.0.0.44.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-37.0.0.44.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-debugsource-6.6.0-37.0.0.44.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-devel-6.6.0-37.0.0.44.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-headers-6.6.0-37.0.0.44.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-source-6.6.0-37.0.0.44.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-tools-6.6.0-37.0.0.44.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-37.0.0.44.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-37.0.0.44.oe2403.x86_64",
					"openEuler-24.03-LTS:perf-6.6.0-37.0.0.44.oe2403.x86_64",
					"openEuler-24.03-LTS:perf-debuginfo-6.6.0-37.0.0.44.oe2403.x86_64",
					"openEuler-24.03-LTS:python3-perf-6.6.0-37.0.0.44.oe2403.x86_64",
					"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-37.0.0.44.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-6.6.0-37.0.0.44.oe2403.src"
				]
			},
			"remediations":[
				{
					"product_ids":[
						"openEuler-24.03-LTS:bpftool-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-6.6.0-37.0.0.44.oe2403.src"
					],
					"details":"kernel security update",
					"category":"vendor_fix",
					"url":"https://www.openeuler.org/zh/security/security-bulletins/detail/?id=openEuler-SA-2024-1960"
				}
			],
			"scores":[
				{
					"cvss_v3":{
						"baseSeverity":"MEDIUM",
						"baseScore":5.5,
						"vectorString":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
						"version":"3.1"
					},
					"products":[
						"openEuler-24.03-LTS:bpftool-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-6.6.0-37.0.0.44.oe2403.src"
					]
				}
			],
			"threats":[
				{
					"details":"Medium",
					"category":"impact"
				}
			],
			"title":"CVE-2024-42068"
		},
		{
			"cve":"CVE-2024-42086",
			"notes":[
				{
					"text":"In the Linux kernel, the following vulnerability has been resolved:\n\niio: chemical: bme680: Fix overflows in compensate() functions\n\nThere are cases in the compensate functions of the driver that\nthere could be overflows of variables due to bit shifting ops.\nThese implications were initially discussed here [1] and they\nwere mentioned in log message of Commit 1b3bd8592780 (\"iio:\nchemical: Add support for Bosch BME680 sensor\").\n\n[1]: https://lore.kernel.org/linux-iio/20180728114028.3c1bbe81@archlinux/",
					"category":"description",
					"title":"Vulnerability Description"
				}
			],
			"product_status":{
				"fixed":[
					"openEuler-24.03-LTS:bpftool-6.6.0-37.0.0.44.oe2403.aarch64",
					"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-37.0.0.44.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-6.6.0-37.0.0.44.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-37.0.0.44.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-debugsource-6.6.0-37.0.0.44.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-devel-6.6.0-37.0.0.44.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-headers-6.6.0-37.0.0.44.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-source-6.6.0-37.0.0.44.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-tools-6.6.0-37.0.0.44.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-37.0.0.44.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-37.0.0.44.oe2403.aarch64",
					"openEuler-24.03-LTS:perf-6.6.0-37.0.0.44.oe2403.aarch64",
					"openEuler-24.03-LTS:perf-debuginfo-6.6.0-37.0.0.44.oe2403.aarch64",
					"openEuler-24.03-LTS:python3-perf-6.6.0-37.0.0.44.oe2403.aarch64",
					"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-37.0.0.44.oe2403.aarch64",
					"openEuler-24.03-LTS:bpftool-6.6.0-37.0.0.44.oe2403.x86_64",
					"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-37.0.0.44.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-6.6.0-37.0.0.44.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-37.0.0.44.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-debugsource-6.6.0-37.0.0.44.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-devel-6.6.0-37.0.0.44.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-headers-6.6.0-37.0.0.44.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-source-6.6.0-37.0.0.44.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-tools-6.6.0-37.0.0.44.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-37.0.0.44.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-37.0.0.44.oe2403.x86_64",
					"openEuler-24.03-LTS:perf-6.6.0-37.0.0.44.oe2403.x86_64",
					"openEuler-24.03-LTS:perf-debuginfo-6.6.0-37.0.0.44.oe2403.x86_64",
					"openEuler-24.03-LTS:python3-perf-6.6.0-37.0.0.44.oe2403.x86_64",
					"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-37.0.0.44.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-6.6.0-37.0.0.44.oe2403.src"
				]
			},
			"remediations":[
				{
					"product_ids":[
						"openEuler-24.03-LTS:bpftool-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-6.6.0-37.0.0.44.oe2403.src"
					],
					"details":"kernel security update",
					"category":"vendor_fix",
					"url":"https://www.openeuler.org/zh/security/security-bulletins/detail/?id=openEuler-SA-2024-1960"
				}
			],
			"scores":[
				{
					"cvss_v3":{
						"baseSeverity":"MEDIUM",
						"baseScore":5.5,
						"vectorString":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
						"version":"3.1"
					},
					"products":[
						"openEuler-24.03-LTS:bpftool-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-6.6.0-37.0.0.44.oe2403.src"
					]
				}
			],
			"threats":[
				{
					"details":"Medium",
					"category":"impact"
				}
			],
			"title":"CVE-2024-42086"
		},
		{
			"cve":"CVE-2024-42097",
			"notes":[
				{
					"text":"In the Linux kernel, the following vulnerability has been resolved:\n\nALSA: emux: improve patch ioctl data validation\n\nIn load_data(), make the validation of and skipping over the main info\nblock match that in load_guspatch().\n\nIn load_guspatch(), add checking that the specified patch length matches\nthe actually supplied data, like load_data() already did.",
					"category":"description",
					"title":"Vulnerability Description"
				}
			],
			"product_status":{
				"fixed":[
					"openEuler-24.03-LTS:bpftool-6.6.0-37.0.0.44.oe2403.aarch64",
					"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-37.0.0.44.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-6.6.0-37.0.0.44.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-37.0.0.44.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-debugsource-6.6.0-37.0.0.44.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-devel-6.6.0-37.0.0.44.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-headers-6.6.0-37.0.0.44.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-source-6.6.0-37.0.0.44.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-tools-6.6.0-37.0.0.44.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-37.0.0.44.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-37.0.0.44.oe2403.aarch64",
					"openEuler-24.03-LTS:perf-6.6.0-37.0.0.44.oe2403.aarch64",
					"openEuler-24.03-LTS:perf-debuginfo-6.6.0-37.0.0.44.oe2403.aarch64",
					"openEuler-24.03-LTS:python3-perf-6.6.0-37.0.0.44.oe2403.aarch64",
					"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-37.0.0.44.oe2403.aarch64",
					"openEuler-24.03-LTS:bpftool-6.6.0-37.0.0.44.oe2403.x86_64",
					"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-37.0.0.44.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-6.6.0-37.0.0.44.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-37.0.0.44.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-debugsource-6.6.0-37.0.0.44.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-devel-6.6.0-37.0.0.44.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-headers-6.6.0-37.0.0.44.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-source-6.6.0-37.0.0.44.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-tools-6.6.0-37.0.0.44.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-37.0.0.44.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-37.0.0.44.oe2403.x86_64",
					"openEuler-24.03-LTS:perf-6.6.0-37.0.0.44.oe2403.x86_64",
					"openEuler-24.03-LTS:perf-debuginfo-6.6.0-37.0.0.44.oe2403.x86_64",
					"openEuler-24.03-LTS:python3-perf-6.6.0-37.0.0.44.oe2403.x86_64",
					"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-37.0.0.44.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-6.6.0-37.0.0.44.oe2403.src"
				]
			},
			"remediations":[
				{
					"product_ids":[
						"openEuler-24.03-LTS:bpftool-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-6.6.0-37.0.0.44.oe2403.src"
					],
					"details":"kernel security update",
					"category":"vendor_fix",
					"url":"https://www.openeuler.org/zh/security/security-bulletins/detail/?id=openEuler-SA-2024-1960"
				}
			],
			"scores":[
				{
					"cvss_v3":{
						"baseSeverity":"MEDIUM",
						"baseScore":5.5,
						"vectorString":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
						"version":"3.1"
					},
					"products":[
						"openEuler-24.03-LTS:bpftool-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-6.6.0-37.0.0.44.oe2403.src"
					]
				}
			],
			"threats":[
				{
					"details":"Medium",
					"category":"impact"
				}
			],
			"title":"CVE-2024-42097"
		},
		{
			"cve":"CVE-2024-42115",
			"notes":[
				{
					"text":"In the Linux kernel, the following vulnerability has been resolved:\n\njffs2: Fix potential illegal address access in jffs2_free_inode\n\nDuring the stress testing of the jffs2 file system,the following\nabnormal printouts were found:\n[ 2430.649000] Unable to handle kernel paging request at virtual address 0069696969696948\n[ 2430.649622] Mem abort info:\n[ 2430.649829]   ESR = 0x96000004\n[ 2430.650115]   EC = 0x25: DABT (current EL), IL = 32 bits\n[ 2430.650564]   SET = 0, FnV = 0\n[ 2430.650795]   EA = 0, S1PTW = 0\n[ 2430.651032]   FSC = 0x04: level 0 translation fault\n[ 2430.651446] Data abort info:\n[ 2430.651683]   ISV = 0, ISS = 0x00000004\n[ 2430.652001]   CM = 0, WnR = 0\n[ 2430.652558] [0069696969696948] address between user and kernel address ranges\n[ 2430.653265] Internal error: Oops: 96000004 [#1] PREEMPT SMP\n[ 2430.654512] CPU: 2 PID: 20919 Comm: cat Not tainted 5.15.25-g512f31242bf6 #33\n[ 2430.655008] Hardware name: linux,dummy-virt (DT)\n[ 2430.655517] pstate: 20000005 (nzCv daif -PAN -UAO -TCO -DIT -SSBS BTYPE=--)\n[ 2430.656142] pc : kfree+0x78/0x348\n[ 2430.656630] lr : jffs2_free_inode+0x24/0x48\n[ 2430.657051] sp : ffff800009eebd10\n[ 2430.657355] x29: ffff800009eebd10 x28: 0000000000000001 x27: 0000000000000000\n[ 2430.658327] x26: ffff000038f09d80 x25: 0080000000000000 x24: ffff800009d38000\n[ 2430.658919] x23: 5a5a5a5a5a5a5a5a x22: ffff000038f09d80 x21: ffff8000084f0d14\n[ 2430.659434] x20: ffff0000bf9a6ac0 x19: 0169696969696940 x18: 0000000000000000\n[ 2430.659969] x17: ffff8000b6506000 x16: ffff800009eec000 x15: 0000000000004000\n[ 2430.660637] x14: 0000000000000000 x13: 00000001000820a1 x12: 00000000000d1b19\n[ 2430.661345] x11: 0004000800000000 x10: 0000000000000001 x9 : ffff8000084f0d14\n[ 2430.662025] x8 : ffff0000bf9a6b40 x7 : ffff0000bf9a6b48 x6 : 0000000003470302\n[ 2430.662695] x5 : ffff00002e41dcc0 x4 : ffff0000bf9aa3b0 x3 : 0000000003470342\n[ 2430.663486] x2 : 0000000000000000 x1 : ffff8000084f0d14 x0 : fffffc0000000000\n[ 2430.664217] Call trace:\n[ 2430.664528]  kfree+0x78/0x348\n[ 2430.664855]  jffs2_free_inode+0x24/0x48\n[ 2430.665233]  i_callback+0x24/0x50\n[ 2430.665528]  rcu_do_batch+0x1ac/0x448\n[ 2430.665892]  rcu_core+0x28c/0x3c8\n[ 2430.666151]  rcu_core_si+0x18/0x28\n[ 2430.666473]  __do_softirq+0x138/0x3cc\n[ 2430.666781]  irq_exit+0xf0/0x110\n[ 2430.667065]  handle_domain_irq+0x6c/0x98\n[ 2430.667447]  gic_handle_irq+0xac/0xe8\n[ 2430.667739]  call_on_irq_stack+0x28/0x54\nThe parameter passed to kfree was 5a5a5a5a, which corresponds to the target field of\nthe jffs_inode_info structure. It was found that all variables in the jffs_inode_info\nstructure were 5a5a5a5a, except for the first member sem. It is suspected that these\nvariables are not initialized because they were set to 5a5a5a5a during memory testing,\nwhich is meant to detect uninitialized memory.The sem variable is initialized in the\nfunction jffs2_i_init_once, while other members are initialized in\nthe function jffs2_init_inode_info.\n\nThe function jffs2_init_inode_info is called after iget_locked,\nbut in the iget_locked function, the destroy_inode process is triggered,\nwhich releases the inode and consequently, the target member of the inode\nis not initialized.In concurrent high pressure scenarios, iget_locked\nmay enter the destroy_inode branch as described in the code.\n\nSince the destroy_inode functionality of jffs2 only releases the target,\nthe fix method is to set target to NULL in jffs2_i_init_once.",
					"category":"description",
					"title":"Vulnerability Description"
				}
			],
			"product_status":{
				"fixed":[
					"openEuler-24.03-LTS:bpftool-6.6.0-37.0.0.44.oe2403.aarch64",
					"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-37.0.0.44.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-6.6.0-37.0.0.44.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-37.0.0.44.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-debugsource-6.6.0-37.0.0.44.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-devel-6.6.0-37.0.0.44.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-headers-6.6.0-37.0.0.44.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-source-6.6.0-37.0.0.44.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-tools-6.6.0-37.0.0.44.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-37.0.0.44.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-37.0.0.44.oe2403.aarch64",
					"openEuler-24.03-LTS:perf-6.6.0-37.0.0.44.oe2403.aarch64",
					"openEuler-24.03-LTS:perf-debuginfo-6.6.0-37.0.0.44.oe2403.aarch64",
					"openEuler-24.03-LTS:python3-perf-6.6.0-37.0.0.44.oe2403.aarch64",
					"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-37.0.0.44.oe2403.aarch64",
					"openEuler-24.03-LTS:bpftool-6.6.0-37.0.0.44.oe2403.x86_64",
					"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-37.0.0.44.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-6.6.0-37.0.0.44.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-37.0.0.44.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-debugsource-6.6.0-37.0.0.44.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-devel-6.6.0-37.0.0.44.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-headers-6.6.0-37.0.0.44.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-source-6.6.0-37.0.0.44.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-tools-6.6.0-37.0.0.44.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-37.0.0.44.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-37.0.0.44.oe2403.x86_64",
					"openEuler-24.03-LTS:perf-6.6.0-37.0.0.44.oe2403.x86_64",
					"openEuler-24.03-LTS:perf-debuginfo-6.6.0-37.0.0.44.oe2403.x86_64",
					"openEuler-24.03-LTS:python3-perf-6.6.0-37.0.0.44.oe2403.x86_64",
					"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-37.0.0.44.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-6.6.0-37.0.0.44.oe2403.src"
				]
			},
			"remediations":[
				{
					"product_ids":[
						"openEuler-24.03-LTS:bpftool-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-6.6.0-37.0.0.44.oe2403.src"
					],
					"details":"kernel security update",
					"category":"vendor_fix",
					"url":"https://www.openeuler.org/zh/security/security-bulletins/detail/?id=openEuler-SA-2024-1960"
				}
			],
			"scores":[
				{
					"cvss_v3":{
						"baseSeverity":"MEDIUM",
						"baseScore":5.5,
						"vectorString":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
						"version":"3.1"
					},
					"products":[
						"openEuler-24.03-LTS:bpftool-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-6.6.0-37.0.0.44.oe2403.src"
					]
				}
			],
			"threats":[
				{
					"details":"Medium",
					"category":"impact"
				}
			],
			"title":"CVE-2024-42115"
		},
		{
			"cve":"CVE-2024-42126",
			"notes":[
				{
					"text":"In the Linux kernel, the following vulnerability has been resolved:\n\npowerpc: Avoid nmi_enter/nmi_exit in real mode interrupt.\n\nnmi_enter()/nmi_exit() touches per cpu variables which can lead to kernel\ncrash when invoked during real mode interrupt handling (e.g. early HMI/MCE\ninterrupt handler) if percpu allocation comes from vmalloc area.\n\nEarly HMI/MCE handlers are called through DEFINE_INTERRUPT_HANDLER_NMI()\nwrapper which invokes nmi_enter/nmi_exit calls. We don't see any issue when\npercpu allocation is from the embedded first chunk. However with\nCONFIG_NEED_PER_CPU_PAGE_FIRST_CHUNK enabled there are chances where percpu\nallocation can come from the vmalloc area.\n\nWith kernel command line \"percpu_alloc=page\" we can force percpu allocation\nto come from vmalloc area and can see kernel crash in machine_check_early:\n\n[    1.215714] NIP [c000000000e49eb4] rcu_nmi_enter+0x24/0x110\n[    1.215717] LR [c0000000000461a0] machine_check_early+0xf0/0x2c0\n[    1.215719] --- interrupt: 200\n[    1.215720] [c000000fffd73180] [0000000000000000] 0x0 (unreliable)\n[    1.215722] [c000000fffd731b0] [0000000000000000] 0x0\n[    1.215724] [c000000fffd73210] [c000000000008364] machine_check_early_common+0x134/0x1f8\n\nFix this by avoiding use of nmi_enter()/nmi_exit() in real mode if percpu\nfirst chunk is not embedded.",
					"category":"description",
					"title":"Vulnerability Description"
				}
			],
			"product_status":{
				"fixed":[
					"openEuler-24.03-LTS:bpftool-6.6.0-37.0.0.44.oe2403.aarch64",
					"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-37.0.0.44.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-6.6.0-37.0.0.44.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-37.0.0.44.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-debugsource-6.6.0-37.0.0.44.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-devel-6.6.0-37.0.0.44.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-headers-6.6.0-37.0.0.44.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-source-6.6.0-37.0.0.44.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-tools-6.6.0-37.0.0.44.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-37.0.0.44.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-37.0.0.44.oe2403.aarch64",
					"openEuler-24.03-LTS:perf-6.6.0-37.0.0.44.oe2403.aarch64",
					"openEuler-24.03-LTS:perf-debuginfo-6.6.0-37.0.0.44.oe2403.aarch64",
					"openEuler-24.03-LTS:python3-perf-6.6.0-37.0.0.44.oe2403.aarch64",
					"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-37.0.0.44.oe2403.aarch64",
					"openEuler-24.03-LTS:bpftool-6.6.0-37.0.0.44.oe2403.x86_64",
					"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-37.0.0.44.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-6.6.0-37.0.0.44.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-37.0.0.44.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-debugsource-6.6.0-37.0.0.44.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-devel-6.6.0-37.0.0.44.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-headers-6.6.0-37.0.0.44.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-source-6.6.0-37.0.0.44.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-tools-6.6.0-37.0.0.44.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-37.0.0.44.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-37.0.0.44.oe2403.x86_64",
					"openEuler-24.03-LTS:perf-6.6.0-37.0.0.44.oe2403.x86_64",
					"openEuler-24.03-LTS:perf-debuginfo-6.6.0-37.0.0.44.oe2403.x86_64",
					"openEuler-24.03-LTS:python3-perf-6.6.0-37.0.0.44.oe2403.x86_64",
					"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-37.0.0.44.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-6.6.0-37.0.0.44.oe2403.src"
				]
			},
			"remediations":[
				{
					"product_ids":[
						"openEuler-24.03-LTS:bpftool-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-6.6.0-37.0.0.44.oe2403.src"
					],
					"details":"kernel security update",
					"category":"vendor_fix",
					"url":"https://www.openeuler.org/zh/security/security-bulletins/detail/?id=openEuler-SA-2024-1960"
				}
			],
			"scores":[
				{
					"cvss_v3":{
						"baseSeverity":"MEDIUM",
						"baseScore":5.5,
						"vectorString":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
						"version":"3.1"
					},
					"products":[
						"openEuler-24.03-LTS:bpftool-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-6.6.0-37.0.0.44.oe2403.src"
					]
				}
			],
			"threats":[
				{
					"details":"Medium",
					"category":"impact"
				}
			],
			"title":"CVE-2024-42126"
		},
		{
			"cve":"CVE-2024-42129",
			"notes":[
				{
					"text":"In the Linux kernel, the following vulnerability has been resolved:\n\nleds: mlxreg: Use devm_mutex_init() for mutex initialization\n\nIn this driver LEDs are registered using devm_led_classdev_register()\nso they are automatically unregistered after module's remove() is done.\nled_classdev_unregister() calls module's led_set_brightness() to turn off\nthe LEDs and that callback uses mutex which was destroyed already\nin module's remove() so use devm API instead.",
					"category":"description",
					"title":"Vulnerability Description"
				}
			],
			"product_status":{
				"fixed":[
					"openEuler-24.03-LTS:bpftool-6.6.0-37.0.0.44.oe2403.aarch64",
					"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-37.0.0.44.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-6.6.0-37.0.0.44.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-37.0.0.44.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-debugsource-6.6.0-37.0.0.44.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-devel-6.6.0-37.0.0.44.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-headers-6.6.0-37.0.0.44.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-source-6.6.0-37.0.0.44.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-tools-6.6.0-37.0.0.44.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-37.0.0.44.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-37.0.0.44.oe2403.aarch64",
					"openEuler-24.03-LTS:perf-6.6.0-37.0.0.44.oe2403.aarch64",
					"openEuler-24.03-LTS:perf-debuginfo-6.6.0-37.0.0.44.oe2403.aarch64",
					"openEuler-24.03-LTS:python3-perf-6.6.0-37.0.0.44.oe2403.aarch64",
					"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-37.0.0.44.oe2403.aarch64",
					"openEuler-24.03-LTS:bpftool-6.6.0-37.0.0.44.oe2403.x86_64",
					"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-37.0.0.44.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-6.6.0-37.0.0.44.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-37.0.0.44.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-debugsource-6.6.0-37.0.0.44.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-devel-6.6.0-37.0.0.44.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-headers-6.6.0-37.0.0.44.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-source-6.6.0-37.0.0.44.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-tools-6.6.0-37.0.0.44.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-37.0.0.44.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-37.0.0.44.oe2403.x86_64",
					"openEuler-24.03-LTS:perf-6.6.0-37.0.0.44.oe2403.x86_64",
					"openEuler-24.03-LTS:perf-debuginfo-6.6.0-37.0.0.44.oe2403.x86_64",
					"openEuler-24.03-LTS:python3-perf-6.6.0-37.0.0.44.oe2403.x86_64",
					"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-37.0.0.44.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-6.6.0-37.0.0.44.oe2403.src"
				]
			},
			"remediations":[
				{
					"product_ids":[
						"openEuler-24.03-LTS:bpftool-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-6.6.0-37.0.0.44.oe2403.src"
					],
					"details":"kernel security update",
					"category":"vendor_fix",
					"url":"https://www.openeuler.org/zh/security/security-bulletins/detail/?id=openEuler-SA-2024-1960"
				}
			],
			"scores":[
				{
					"cvss_v3":{
						"baseSeverity":"LOW",
						"baseScore":3.3,
						"vectorString":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N",
						"version":"3.1"
					},
					"products":[
						"openEuler-24.03-LTS:bpftool-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-6.6.0-37.0.0.44.oe2403.src"
					]
				}
			],
			"threats":[
				{
					"details":"Low",
					"category":"impact"
				}
			],
			"title":"CVE-2024-42129"
		},
		{
			"cve":"CVE-2024-42155",
			"notes":[
				{
					"text":"In the Linux kernel, the following vulnerability has been resolved:\n\ns390/pkey: Wipe copies of protected- and secure-keys\n\nAlthough the clear-key of neither protected- nor secure-keys is\naccessible, this key material should only be visible to the calling\nprocess. So wipe all copies of protected- or secure-keys from stack,\neven in case of an error.",
					"category":"description",
					"title":"Vulnerability Description"
				}
			],
			"product_status":{
				"fixed":[
					"openEuler-24.03-LTS:bpftool-6.6.0-37.0.0.44.oe2403.aarch64",
					"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-37.0.0.44.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-6.6.0-37.0.0.44.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-37.0.0.44.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-debugsource-6.6.0-37.0.0.44.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-devel-6.6.0-37.0.0.44.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-headers-6.6.0-37.0.0.44.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-source-6.6.0-37.0.0.44.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-tools-6.6.0-37.0.0.44.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-37.0.0.44.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-37.0.0.44.oe2403.aarch64",
					"openEuler-24.03-LTS:perf-6.6.0-37.0.0.44.oe2403.aarch64",
					"openEuler-24.03-LTS:perf-debuginfo-6.6.0-37.0.0.44.oe2403.aarch64",
					"openEuler-24.03-LTS:python3-perf-6.6.0-37.0.0.44.oe2403.aarch64",
					"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-37.0.0.44.oe2403.aarch64",
					"openEuler-24.03-LTS:bpftool-6.6.0-37.0.0.44.oe2403.x86_64",
					"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-37.0.0.44.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-6.6.0-37.0.0.44.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-37.0.0.44.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-debugsource-6.6.0-37.0.0.44.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-devel-6.6.0-37.0.0.44.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-headers-6.6.0-37.0.0.44.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-source-6.6.0-37.0.0.44.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-tools-6.6.0-37.0.0.44.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-37.0.0.44.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-37.0.0.44.oe2403.x86_64",
					"openEuler-24.03-LTS:perf-6.6.0-37.0.0.44.oe2403.x86_64",
					"openEuler-24.03-LTS:perf-debuginfo-6.6.0-37.0.0.44.oe2403.x86_64",
					"openEuler-24.03-LTS:python3-perf-6.6.0-37.0.0.44.oe2403.x86_64",
					"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-37.0.0.44.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-6.6.0-37.0.0.44.oe2403.src"
				]
			},
			"remediations":[
				{
					"product_ids":[
						"openEuler-24.03-LTS:bpftool-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-6.6.0-37.0.0.44.oe2403.src"
					],
					"details":"kernel security update",
					"category":"vendor_fix",
					"url":"https://www.openeuler.org/zh/security/security-bulletins/detail/?id=openEuler-SA-2024-1960"
				}
			],
			"scores":[
				{
					"cvss_v3":{
						"baseSeverity":"MEDIUM",
						"baseScore":4.1,
						"vectorString":"CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:N/A:N",
						"version":"3.1"
					},
					"products":[
						"openEuler-24.03-LTS:bpftool-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-6.6.0-37.0.0.44.oe2403.src"
					]
				}
			],
			"threats":[
				{
					"details":"Medium",
					"category":"impact"
				}
			],
			"title":"CVE-2024-42155"
		},
		{
			"cve":"CVE-2024-42162",
			"notes":[
				{
					"text":"In the Linux kernel, the following vulnerability has been resolved:gve: Account for stopped queues when reading NIC statsWe now account for the fact that the NIC might send us stats for asubset of queues. Without this change, gve_get_ethtool_stats might makean invalid access on the priv->stats_report->stats array.",
					"category":"description",
					"title":"Vulnerability Description"
				}
			],
			"product_status":{
				"fixed":[
					"openEuler-24.03-LTS:bpftool-6.6.0-37.0.0.44.oe2403.aarch64",
					"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-37.0.0.44.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-6.6.0-37.0.0.44.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-37.0.0.44.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-debugsource-6.6.0-37.0.0.44.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-devel-6.6.0-37.0.0.44.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-headers-6.6.0-37.0.0.44.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-source-6.6.0-37.0.0.44.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-tools-6.6.0-37.0.0.44.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-37.0.0.44.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-37.0.0.44.oe2403.aarch64",
					"openEuler-24.03-LTS:perf-6.6.0-37.0.0.44.oe2403.aarch64",
					"openEuler-24.03-LTS:perf-debuginfo-6.6.0-37.0.0.44.oe2403.aarch64",
					"openEuler-24.03-LTS:python3-perf-6.6.0-37.0.0.44.oe2403.aarch64",
					"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-37.0.0.44.oe2403.aarch64",
					"openEuler-24.03-LTS:bpftool-6.6.0-37.0.0.44.oe2403.x86_64",
					"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-37.0.0.44.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-6.6.0-37.0.0.44.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-37.0.0.44.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-debugsource-6.6.0-37.0.0.44.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-devel-6.6.0-37.0.0.44.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-headers-6.6.0-37.0.0.44.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-source-6.6.0-37.0.0.44.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-tools-6.6.0-37.0.0.44.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-37.0.0.44.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-37.0.0.44.oe2403.x86_64",
					"openEuler-24.03-LTS:perf-6.6.0-37.0.0.44.oe2403.x86_64",
					"openEuler-24.03-LTS:perf-debuginfo-6.6.0-37.0.0.44.oe2403.x86_64",
					"openEuler-24.03-LTS:python3-perf-6.6.0-37.0.0.44.oe2403.x86_64",
					"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-37.0.0.44.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-6.6.0-37.0.0.44.oe2403.src"
				]
			},
			"remediations":[
				{
					"product_ids":[
						"openEuler-24.03-LTS:bpftool-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-6.6.0-37.0.0.44.oe2403.src"
					],
					"details":"kernel security update",
					"category":"vendor_fix",
					"url":"https://www.openeuler.org/zh/security/security-bulletins/detail/?id=openEuler-SA-2024-1960"
				}
			],
			"scores":[
				{
					"cvss_v3":{
						"baseSeverity":"HIGH",
						"baseScore":7,
						"vectorString":"CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
						"version":"3.1"
					},
					"products":[
						"openEuler-24.03-LTS:bpftool-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-6.6.0-37.0.0.44.oe2403.src"
					]
				}
			],
			"threats":[
				{
					"details":"High",
					"category":"impact"
				}
			],
			"title":"CVE-2024-42162"
		},
		{
			"cve":"CVE-2024-42228",
			"notes":[
				{
					"text":"In the Linux kernel, the following vulnerability has been resolved:drm/amdgpu: Using uninitialized value *size when calling amdgpu_vce_cs_relocInitialize the size before calling amdgpu_vce_cs_reloc, such as case 0x03000001.V2: To really improve the handling we would actually   need to have a separate value of 0xffffffff.(Christian)",
					"category":"description",
					"title":"Vulnerability Description"
				}
			],
			"product_status":{
				"fixed":[
					"openEuler-24.03-LTS:bpftool-6.6.0-37.0.0.44.oe2403.aarch64",
					"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-37.0.0.44.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-6.6.0-37.0.0.44.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-37.0.0.44.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-debugsource-6.6.0-37.0.0.44.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-devel-6.6.0-37.0.0.44.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-headers-6.6.0-37.0.0.44.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-source-6.6.0-37.0.0.44.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-tools-6.6.0-37.0.0.44.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-37.0.0.44.oe2403.aarch64",
					"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-37.0.0.44.oe2403.aarch64",
					"openEuler-24.03-LTS:perf-6.6.0-37.0.0.44.oe2403.aarch64",
					"openEuler-24.03-LTS:perf-debuginfo-6.6.0-37.0.0.44.oe2403.aarch64",
					"openEuler-24.03-LTS:python3-perf-6.6.0-37.0.0.44.oe2403.aarch64",
					"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-37.0.0.44.oe2403.aarch64",
					"openEuler-24.03-LTS:bpftool-6.6.0-37.0.0.44.oe2403.x86_64",
					"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-37.0.0.44.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-6.6.0-37.0.0.44.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-37.0.0.44.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-debugsource-6.6.0-37.0.0.44.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-devel-6.6.0-37.0.0.44.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-headers-6.6.0-37.0.0.44.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-source-6.6.0-37.0.0.44.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-tools-6.6.0-37.0.0.44.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-37.0.0.44.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-37.0.0.44.oe2403.x86_64",
					"openEuler-24.03-LTS:perf-6.6.0-37.0.0.44.oe2403.x86_64",
					"openEuler-24.03-LTS:perf-debuginfo-6.6.0-37.0.0.44.oe2403.x86_64",
					"openEuler-24.03-LTS:python3-perf-6.6.0-37.0.0.44.oe2403.x86_64",
					"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-37.0.0.44.oe2403.x86_64",
					"openEuler-24.03-LTS:kernel-6.6.0-37.0.0.44.oe2403.src"
				]
			},
			"remediations":[
				{
					"product_ids":[
						"openEuler-24.03-LTS:bpftool-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-6.6.0-37.0.0.44.oe2403.src"
					],
					"details":"kernel security update",
					"category":"vendor_fix",
					"url":"https://www.openeuler.org/zh/security/security-bulletins/detail/?id=openEuler-SA-2024-1960"
				}
			],
			"scores":[
				{
					"cvss_v3":{
						"baseSeverity":"HIGH",
						"baseScore":7,
						"vectorString":"CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
						"version":"3.1"
					},
					"products":[
						"openEuler-24.03-LTS:bpftool-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-37.0.0.44.oe2403.aarch64",
						"openEuler-24.03-LTS:bpftool-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:bpftool-debuginfo-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debuginfo-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-debugsource-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-devel-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-headers-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-source-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-debuginfo-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-tools-devel-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:perf-debuginfo-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:python3-perf-debuginfo-6.6.0-37.0.0.44.oe2403.x86_64",
						"openEuler-24.03-LTS:kernel-6.6.0-37.0.0.44.oe2403.src"
					]
				}
			],
			"threats":[
				{
					"details":"High",
					"category":"impact"
				}
			],
			"title":"CVE-2024-42228"
		}
	]
}