{
	"document":{
		"aggregate_severity":{
			"namespace":"https://nvd.nist.gov/vuln-metrics/cvss",
			"text":"High"
		},
		"category":"csaf_vex",
		"csaf_version":"2.0",
		"distribution":{
			"tlp":{
				"label":"WHITE",
				"url":"https:/www.first.org/tlp/"
			}
		},
		"lang":"en",
		"notes":[
			{
				"text":"kernel security update",
				"category":"general",
				"title":"Synopsis"
			},
			{
				"text":"An update for kernel is now available for openEuler-22.03-LTS-SP4",
				"category":"general",
				"title":"Summary"
			},
			{
				"text":"The Linux Kernel, the operating system core itself.\n\nSecurity Fix(es):\n\nIn the Linux kernel, the following vulnerability has been resolved:\n\nipvlan: Dont Use skb->sk in ipvlan_process_v{4,6}_outbound\n\nRaw packet from PF_PACKET socket ontop of an IPv6-backed ipvlan device will\nhit WARN_ON_ONCE() in sk_mc_loop() through sch_direct_xmit() path.\n\nWARNING: CPU: 2 PID: 0 at net/core/sock.c:775 sk_mc_loop+0x2d/0x70\nModules linked in: sch_netem ipvlan rfkill cirrus drm_shmem_helper sg drm_kms_helper\nCPU: 2 PID: 0 Comm: swapper/2 Kdump: loaded Not tainted 6.9.0+ #279\nHardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.15.0-1 04/01/2014\nRIP: 0010:sk_mc_loop+0x2d/0x70\nCode: fa 0f 1f 44 00 00 65 0f b7 15 f7 96 a3 4f 31 c0 66 85 d2 75 26 48 85 ff 74 1c\nRSP: 0018:ffffa9584015cd78 EFLAGS: 00010212\nRAX: 0000000000000011 RBX: ffff91e585793e00 RCX: 0000000002c6a001\nRDX: 0000000000000000 RSI: 0000000000000040 RDI: ffff91e589c0f000\nRBP: ffff91e5855bd100 R08: 0000000000000000 R09: 3d00545216f43d00\nR10: ffff91e584fdcc50 R11: 00000060dd8616f4 R12: ffff91e58132d000\nR13: ffff91e584fdcc68 R14: ffff91e5869ce800 R15: ffff91e589c0f000\nFS:  0000000000000000(0000) GS:ffff91e898100000(0000) knlGS:0000000000000000\nCS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033\nCR2: 00007f788f7c44c0 CR3: 0000000008e1a000 CR4: 00000000000006f0\nDR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000\nDR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400\nCall Trace:\n<IRQ>\n ? __warn (kernel/panic.c:693)\n ? sk_mc_loop (net/core/sock.c:760)\n ? report_bug (lib/bug.c:201 lib/bug.c:219)\n ? handle_bug (arch/x86/kernel/traps.c:239)\n ? exc_invalid_op (arch/x86/kernel/traps.c:260 (discriminator 1))\n ? asm_exc_invalid_op (./arch/x86/include/asm/idtentry.h:621)\n ? sk_mc_loop (net/core/sock.c:760)\n ip6_finish_output2 (net/ipv6/ip6_output.c:83 (discriminator 1))\n ? nf_hook_slow (net/netfilter/core.c:626)\n ip6_finish_output (net/ipv6/ip6_output.c:222)\n ? __pfx_ip6_finish_output (net/ipv6/ip6_output.c:215)\n ipvlan_xmit_mode_l3 (drivers/net/ipvlan/ipvlan_core.c:602) ipvlan\n ipvlan_start_xmit (drivers/net/ipvlan/ipvlan_main.c:226) ipvlan\n dev_hard_start_xmit (net/core/dev.c:3594)\n sch_direct_xmit (net/sched/sch_generic.c:343)\n __qdisc_run (net/sched/sch_generic.c:416)\n net_tx_action (net/core/dev.c:5286)\n handle_softirqs (kernel/softirq.c:555)\n __irq_exit_rcu (kernel/softirq.c:589)\n sysvec_apic_timer_interrupt (arch/x86/kernel/apic/apic.c:1043)\n\nThe warning triggers as this:\npacket_sendmsg\n   packet_snd //skb->sk is packet sk\n      __dev_queue_xmit\n         __dev_xmit_skb //q->enqueue is not NULL\n             __qdisc_run\n               sch_direct_xmit\n                 dev_hard_start_xmit\n                   ipvlan_start_xmit\n                      ipvlan_xmit_mode_l3 //l3 mode\n                        ipvlan_process_outbound //vepa flag\n                          ipvlan_process_v6_outbound\n                            ip6_local_out\n                                __ip6_finish_output\n                                  ip6_finish_output2 //multicast packet\n                                    sk_mc_loop //sk->sk_family is AF_PACKET\n\nCall ip{6}_local_out() with NULL sk in ipvlan as other tunnels to fix this.(CVE-2024-33621)\n\nIn the Linux kernel, the following vulnerability has been resolved:\n\ndma-mapping: benchmark: fix node id validation\n\nWhile validating node ids in map_benchmark_ioctl(), node_possible() may\nbe provided with invalid argument outside of [0,MAX_NUMNODES-1] range\nleading to:\n\nBUG: KASAN: wild-memory-access in map_benchmark_ioctl (kernel/dma/map_benchmark.c:214)\nRead of size 8 at addr 1fffffff8ccb6398 by task dma_map_benchma/971\nCPU: 7 PID: 971 Comm: dma_map_benchma Not tainted 6.9.0-rc6 #37\nHardware name: QEMU Standard PC (i440FX + PIIX, 1996)\nCall Trace:\n <TASK>\ndump_stack_lvl (lib/dump_stack.c:117)\nkasan_report (mm/kasan/report.c:603)\nkasan_check_range (mm/kasan/generic.c:189)\nvariable_test_bit (arch/x86/include/asm/bitops.h:227) [inline]\narch_test_bit (arch/x86/include/asm/bitops.h:239) [inline]\n_test_bit at (include/asm-generic/bitops/instrumented-non-atomic.h:142) [inline]\nnode_state (include/linux/nodemask.h:423) [inline]\nmap_benchmark_ioctl (kernel/dma/map_benchmark.c:214)\nfull_proxy_unlocked_ioctl (fs/debugfs/file.c:333)\n__x64_sys_ioctl (fs/ioctl.c:890)\ndo_syscall_64 (arch/x86/entry/common.c:83)\nentry_SYSCALL_64_after_hwframe (arch/x86/entry/entry_64.S:130)\n\nCompare node ids with sane bounds first. NUMA_NO_NODE is considered a\nspecial valid case meaning that benchmarking kthreads won't be bound to a\ncpuset of a given node.\n\nFound by Linux Verification Center (linuxtesting.org).(CVE-2024-34777)\n\nIn the Linux kernel, the following vulnerability has been resolved:\n\nRDMA/rxe: Fix seg fault in rxe_comp_queue_pkt\n\nIn rxe_comp_queue_pkt() an incoming response packet skb is enqueued to the\nresp_pkts queue and then a decision is made whether to run the completer\ntask inline or schedule it. Finally the skb is dereferenced to bump a 'hw'\nperformance counter. This is wrong because if the completer task is\nalready running in a separate thread it may have already processed the skb\nand freed it which can cause a seg fault.  This has been observed\ninfrequently in testing at high scale.\n\nThis patch fixes this by changing the order of enqueuing the packet until\nafter the counter is accessed.(CVE-2024-38544)\n\nIn the Linux kernel, the following vulnerability has been resolved:\n\nwifi: ar5523: enable proper endpoint verification\n\nSyzkaller reports [1] hitting a warning about an endpoint in use\nnot having an expected type to it.\n\nFix the issue by checking for the existence of all proper\nendpoints with their according types intact.\n\nSadly, this patch has not been tested on real hardware.\n\n[1] Syzkaller report:\n------------[ cut here ]------------\nusb 1-1: BOGUS urb xfer, pipe 3 != type 1\nWARNING: CPU: 0 PID: 3643 at drivers/usb/core/urb.c:504 usb_submit_urb+0xed6/0x1880 drivers/usb/core/urb.c:504\n...\nCall Trace:\n <TASK>\n ar5523_cmd+0x41b/0x780 drivers/net/wireless/ath/ar5523/ar5523.c:275\n ar5523_cmd_read drivers/net/wireless/ath/ar5523/ar5523.c:302 [inline]\n ar5523_host_available drivers/net/wireless/ath/ar5523/ar5523.c:1376 [inline]\n ar5523_probe+0x14b0/0x1d10 drivers/net/wireless/ath/ar5523/ar5523.c:1655\n usb_probe_interface+0x30f/0x7f0 drivers/usb/core/driver.c:396\n call_driver_probe drivers/base/dd.c:560 [inline]\n really_probe+0x249/0xb90 drivers/base/dd.c:639\n __driver_probe_device+0x1df/0x4d0 drivers/base/dd.c:778\n driver_probe_device+0x4c/0x1a0 drivers/base/dd.c:808\n __device_attach_driver+0x1d4/0x2e0 drivers/base/dd.c:936\n bus_for_each_drv+0x163/0x1e0 drivers/base/bus.c:427\n __device_attach+0x1e4/0x530 drivers/base/dd.c:1008\n bus_probe_device+0x1e8/0x2a0 drivers/base/bus.c:487\n device_add+0xbd9/0x1e90 drivers/base/core.c:3517\n usb_set_configuration+0x101d/0x1900 drivers/usb/core/message.c:2170\n usb_generic_driver_probe+0xbe/0x100 drivers/usb/core/generic.c:238\n usb_probe_device+0xd8/0x2c0 drivers/usb/core/driver.c:293\n call_driver_probe drivers/base/dd.c:560 [inline]\n really_probe+0x249/0xb90 drivers/base/dd.c:639\n __driver_probe_device+0x1df/0x4d0 drivers/base/dd.c:778\n driver_probe_device+0x4c/0x1a0 drivers/base/dd.c:808\n __device_attach_driver+0x1d4/0x2e0 drivers/base/dd.c:936\n bus_for_each_drv+0x163/0x1e0 drivers/base/bus.c:427\n __device_attach+0x1e4/0x530 drivers/base/dd.c:1008\n bus_probe_device+0x1e8/0x2a0 drivers/base/bus.c:487\n device_add+0xbd9/0x1e90 drivers/base/core.c:3517\n usb_new_device.cold+0x685/0x10ad drivers/usb/core/hub.c:2573\n hub_port_connect drivers/usb/core/hub.c:5353 [inline]\n hub_port_connect_change drivers/usb/core/hub.c:5497 [inline]\n port_event drivers/usb/core/hub.c:5653 [inline]\n hub_event+0x26cb/0x45d0 drivers/usb/core/hub.c:5735\n process_one_work+0x9bf/0x1710 kernel/workqueue.c:2289\n worker_thread+0x669/0x1090 kernel/workqueue.c:2436\n kthread+0x2e8/0x3a0 kernel/kthread.c:376\n ret_from_fork+0x1f/0x30 arch/x86/entry/entry_64.S:306\n </TASK>(CVE-2024-38565)\n\nIn the Linux kernel, the following vulnerability has been resolved:\n\neth: sungem: remove .ndo_poll_controller to avoid deadlocks\n\nErhard reports netpoll warnings from sungem:\n\n  netpoll_send_skb_on_dev(): eth0 enabled interrupts in poll (gem_start_xmit+0x0/0x398)\n  WARNING: CPU: 1 PID: 1 at net/core/netpoll.c:370 netpoll_send_skb+0x1fc/0x20c\n\ngem_poll_controller() disables interrupts, which may sleep.\nWe can't sleep in netpoll, it has interrupts disabled completely.\nStrangely, gem_poll_controller() doesn't even poll the completions,\nand instead acts as if an interrupt has fired so it just schedules\nNAPI and exits. None of this has been necessary for years, since\nnetpoll invokes NAPI directly.(CVE-2024-38597)\n\nIn the Linux kernel, the following vulnerability has been resolved:\n\next4: fix mb_cache_entry's e_refcnt leak in ext4_xattr_block_cache_find()\n\nSyzbot reports a warning as follows:\n\n============================================\nWARNING: CPU: 0 PID: 5075 at fs/mbcache.c:419 mb_cache_destroy+0x224/0x290\nModules linked in:\nCPU: 0 PID: 5075 Comm: syz-executor199 Not tainted 6.9.0-rc6-gb947cc5bf6d7\nRIP: 0010:mb_cache_destroy+0x224/0x290 fs/mbcache.c:419\nCall Trace:\n <TASK>\n ext4_put_super+0x6d4/0xcd0 fs/ext4/super.c:1375\n generic_shutdown_super+0x136/0x2d0 fs/super.c:641\n kill_block_super+0x44/0x90 fs/super.c:1675\n ext4_kill_sb+0x68/0xa0 fs/ext4/super.c:7327\n[...]\n============================================\n\nThis is because when finding an entry in ext4_xattr_block_cache_find(), if\next4_sb_bread() returns -ENOMEM, the ce's e_refcnt, which has already grown\nin the __entry_find(), won't be put away, and eventually trigger the above\nissue in mb_cache_destroy() due to reference count leakage.\n\nSo call mb_cache_entry_put() on the -ENOMEM error branch as a quick fix.(CVE-2024-39276)\n\nIn the Linux kernel, the following vulnerability has been resolved:\n\nmd/raid5: fix deadlock that raid5d() wait for itself to clear MD_SB_CHANGE_PENDING\n\nXiao reported that lvm2 test lvconvert-raid-takeover.sh can hang with\nsmall possibility, the root cause is exactly the same as commit\nbed9e27baf52 (\"Revert \"md/raid5: Wait for MD_SB_CHANGE_PENDING in raid5d\"\")\n\nHowever, Dan reported another hang after that, and junxiao investigated\nthe problem and found out that this is caused by plugged bio can't issue\nfrom raid5d().\n\nCurrent implementation in raid5d() has a weird dependence:\n\n1) md_check_recovery() from raid5d() must hold 'reconfig_mutex' to clear\n   MD_SB_CHANGE_PENDING;\n2) raid5d() handles IO in a deadloop, until all IO are issued;\n3) IO from raid5d() must wait for MD_SB_CHANGE_PENDING to be cleared;\n\nThis behaviour is introduce before v2.6, and for consequence, if other\ncontext hold 'reconfig_mutex', and md_check_recovery() can't update\nsuper_block, then raid5d() will waste one cpu 100% by the deadloop, until\n'reconfig_mutex' is released.\n\nRefer to the implementation from raid1 and raid10, fix this problem by\nskipping issue IO if MD_SB_CHANGE_PENDING is still set after\nmd_check_recovery(), daemon thread will be woken up when 'reconfig_mutex'\nis released. Meanwhile, the hang problem will be fixed as well.(CVE-2024-39476)\n\nIn the Linux kernel, the following vulnerability has been resolved:\n\njfs: xattr: fix buffer overflow for invalid xattr\n\nWhen an xattr size is not what is expected, it is printed out to the\nkernel log in hex format as a form of debugging.  But when that xattr\nsize is bigger than the expected size, printing it out can cause an\naccess off the end of the buffer.\n\nFix this all up by properly restricting the size of the debug hex dump\nin the kernel log.(CVE-2024-40902)\n\nIn the Linux kernel, the following vulnerability has been resolved:\n\niommu: Return right value in iommu_sva_bind_device()\n\niommu_sva_bind_device() should return either a sva bond handle or an\nERR_PTR value in error cases. Existing drivers (idxd and uacce) only\ncheck the return value with IS_ERR(). This could potentially lead to\na kernel NULL pointer dereference issue if the function returns NULL\ninstead of an error pointer.\n\nIn reality, this doesn't cause any problems because iommu_sva_bind_device()\nonly returns NULL when the kernel is not configured with CONFIG_IOMMU_SVA.\nIn this case, iommu_dev_enable_feature(dev, IOMMU_DEV_FEAT_SVA) will\nreturn an error, and the device drivers won't call iommu_sva_bind_device()\nat all.(CVE-2024-40945)\n\nIn the Linux kernel, the following vulnerability has been resolved:\n\ntty: add the option to have a tty reject a new ldisc\n\n... and use it to limit the virtual terminals to just N_TTY.  They are\nkind of special, and in particular, the \"con_write()\" routine violates\nthe \"writes cannot sleep\" rule that some ldiscs rely on.\n\nThis avoids the\n\n   BUG: sleeping function called from invalid context at kernel/printk/printk.c:2659\n\nwhen N_GSM has been attached to a virtual console, and gsmld_write()\ncalls con_write() while holding a spinlock, and con_write() then tries\nto get the console lock.(CVE-2024-40966)\n\nIn the Linux kernel, the following vulnerability has been resolved:\n\ncan: mcp251xfd: fix infinite loop when xmit fails\n\nWhen the mcp251xfd_start_xmit() function fails, the driver stops\nprocessing messages, and the interrupt routine does not return,\nrunning indefinitely even after killing the running application.\n\nError messages:\n[  441.298819] mcp251xfd spi2.0 can0: ERROR in mcp251xfd_start_xmit: -16\n[  441.306498] mcp251xfd spi2.0 can0: Transmit Event FIFO buffer not empty. (seq=0x000017c7, tef_tail=0x000017cf, tef_head=0x000017d0, tx_head=0x000017d3).\n... and repeat forever.\n\nThe issue can be triggered when multiple devices share the same SPI\ninterface. And there is concurrent access to the bus.\n\nThe problem occurs because tx_ring->head increments even if\nmcp251xfd_start_xmit() fails. Consequently, the driver skips one TX\npackage while still expecting a response in\nmcp251xfd_handle_tefif_one().\n\nResolve the issue by starting a workqueue to write the tx obj\nsynchronously if err = -EBUSY. In case of another error, decrement\ntx_ring->head, remove skb from the echo stack, and drop the message.\n\n[mkl: use more imperative wording in patch description](CVE-2024-41088)\n\nIn the Linux kernel, the following vulnerability has been resolved:\n\nnetfilter: nf_tables: fully validate NFT_DATA_VALUE on store to data registers\n\nregister store validation for NFT_DATA_VALUE is conditional, however,\nthe datatype is always either NFT_DATA_VALUE or NFT_DATA_VERDICT. This\nonly requires a new helper function to infer the register type from the\nset datatype so this conditional check can be removed. Otherwise,\npointer to chain object can be leaked through the registers.(CVE-2024-42070)\n\nIn the Linux kernel, the following vulnerability has been resolved:\n\ndrm/lima: fix shared irq handling on driver remove\n\nlima uses a shared interrupt, so the interrupt handlers must be prepared\nto be called at any time. At driver removal time, the clocks are\ndisabled early and the interrupts stay registered until the very end of\nthe remove process due to the devm usage.\nThis is potentially a bug as the interrupts access device registers\nwhich assumes clocks are enabled. A crash can be triggered by removing\nthe driver in a kernel with CONFIG_DEBUG_SHIRQ enabled.\nThis patch frees the interrupts at each lima device finishing callback\nso that the handlers are already unregistered by the time we fully\ndisable clocks.(CVE-2024-42127)\n\nIn the Linux kernel, the following vulnerability has been resolved:\n\nmm: avoid overflows in dirty throttling logic\n\nThe dirty throttling logic is interspersed with assumptions that dirty\nlimits in PAGE_SIZE units fit into 32-bit (so that various multiplications\nfit into 64-bits).  If limits end up being larger, we will hit overflows,\npossible divisions by 0 etc.  Fix these problems by never allowing so\nlarge dirty limits as they have dubious practical value anyway.  For\ndirty_bytes / dirty_background_bytes interfaces we can just refuse to set\nso large limits.  For dirty_ratio / dirty_background_ratio it isn't so\nsimple as the dirty limit is computed from the amount of available memory\nwhich can change due to memory hotplug etc.  So when converting dirty\nlimits from ratios to numbers of pages, we just don't allow the result to\nexceed UINT_MAX.\n\nThis is root-only triggerable problem which occurs when the operator\nsets dirty limits to >16 TB.(CVE-2024-42131)\n\nIn the Linux kernel, the following vulnerability has been resolved:\n\nlibceph: fix race between delayed_work() and ceph_monc_stop()\n\nThe way the delayed work is handled in ceph_monc_stop() is prone to\nraces with mon_fault() and possibly also finish_hunting().  Both of\nthese can requeue the delayed work which wouldn't be canceled by any of\nthe following code in case that happens after cancel_delayed_work_sync()\nruns -- __close_session() doesn't mess with the delayed work in order\nto avoid interfering with the hunting interval logic.  This part was\nmissed in commit b5d91704f53e (\"libceph: behave in mon_fault() if\ncur_mon < 0\") and use-after-free can still ensue on monc and objects\nthat hang off of it, with monc->auth and monc->monmap being\nparticularly susceptible to quickly being reused.\n\nTo fix this:\n\n- clear monc->cur_mon and monc->hunting as part of closing the session\n  in ceph_monc_stop()\n- bail from delayed_work() if monc->cur_mon is cleared, similar to how\n  it's done in mon_fault() and finish_hunting() (based on monc->hunting)\n- call cancel_delayed_work_sync() after the session is closed(CVE-2024-42232)\n\nIn the Linux kernel, the following vulnerability has been resolved:\n\nusb: gadget: configfs: Prevent OOB read/write in usb_string_copy()\n\nUserspace provided string 's' could trivially have the length zero. Left\nunchecked this will firstly result in an OOB read in the form\n`if (str[0 - 1] == '\\n') followed closely by an OOB write in the form\n`str[0 - 1] = '\\0'`.\n\nThere is already a validating check to catch strings that are too long.\nLet's supply an additional check for invalid strings that are too short.(CVE-2024-42236)\n\nIn the Linux kernel, the following vulnerability has been resolved:\n\next4: make sure the first directory block is not a hole\n\nThe syzbot constructs a directory that has no dirblock but is non-inline,\ni.e. the first directory block is a hole. And no errors are reported when\ncreating files in this directory in the following flow.\n\n    ext4_mknod\n     ...\n      ext4_add_entry\n        // Read block 0\n        ext4_read_dirblock(dir, block, DIRENT)\n          bh = ext4_bread(NULL, inode, block, 0)\n          if (!bh && (type == INDEX || type == DIRENT_HTREE))\n          // The first directory block is a hole\n          // But type == DIRENT, so no error is reported.\n\nAfter that, we get a directory block without '.' and '..' but with a valid\ndentry. This may cause some code that relies on dot or dotdot (such as\nmake_indexed_dir()) to crash.\n\nTherefore when ext4_read_dirblock() finds that the first directory block\nis a hole report that the filesystem is corrupted and return an error to\navoid loading corrupted data from disk causing something bad.(CVE-2024-42304)\n\nIn the Linux kernel, the following vulnerability has been resolved:\n\ndrm/gma500: fix null pointer dereference in cdv_intel_lvds_get_modes\n\nIn cdv_intel_lvds_get_modes(), the return value of drm_mode_duplicate()\nis assigned to mode, which will lead to a NULL pointer dereference on\nfailure of drm_mode_duplicate(). Add a check to avoid npd.(CVE-2024-42310)\n\nIn the Linux kernel, the following vulnerability has been resolved:\n\nbna: adjust 'name' buf size of bna_tcb and bna_ccb structures\n\nTo have enough space to write all possible sprintf() args. Currently\n'name' size is 16, but the first '%s' specifier may already need at\nleast 16 characters, since 'bnad->netdev->name' is used there.\n\nFor '%d' specifiers, assume that they require:\n * 1 char for 'tx_id + tx_info->tcb[i]->id' sum, BNAD_MAX_TXQ_PER_TX is 8\n * 2 chars for 'rx_id + rx_info->rx_ctrl[i].ccb->id', BNAD_MAX_RXP_PER_RX\n   is 16\n\nAnd replace sprintf with snprintf.\n\nDetected using the static analysis tool - Svace.(CVE-2024-43839)",
				"category":"general",
				"title":"Description"
			},
			{
				"text":"An update for kernel is now available for openEuler-22.03-LTS-SP4.\n\nopenEuler Security has rated this update as having a security impact of high. A Common Vunlnerability Scoring System(CVSS)base score,which gives a detailed severity rating, is available for each vulnerability from the CVElink(s) in the References section.",
				"category":"general",
				"title":"Topic"
			},
			{
				"text":"High",
				"category":"general",
				"title":"Severity"
			},
			{
				"text":"kernel",
				"category":"general",
				"title":"Affected Component"
			}
		],
		"publisher":{
			"issuing_authority":"openEuler security committee",
			"name":"openEuler",
			"namespace":"https://www.openeuler.org",
			"contact_details":"openeuler-security@openeuler.org",
			"category":"vendor"
		},
		"references":[
			{
				"summary":"openEuler-SA-2024-2028",
				"category":"self",
				"url":"https://www.openeuler.org/zh/security/security-bulletins/detail/?id=openEuler-SA-2024-2028"
			},
			{
				"summary":"CVE-2024-33621",
				"category":"self",
				"url":"https://www.openeuler.org/en/security/cve/detail/?cveId=CVE-2024-33621&packageName=kernel"
			},
			{
				"summary":"CVE-2024-34777",
				"category":"self",
				"url":"https://www.openeuler.org/en/security/cve/detail/?cveId=CVE-2024-34777&packageName=kernel"
			},
			{
				"summary":"CVE-2024-38544",
				"category":"self",
				"url":"https://www.openeuler.org/en/security/cve/detail/?cveId=CVE-2024-38544&packageName=kernel"
			},
			{
				"summary":"CVE-2024-38565",
				"category":"self",
				"url":"https://www.openeuler.org/en/security/cve/detail/?cveId=CVE-2024-38565&packageName=kernel"
			},
			{
				"summary":"CVE-2024-38597",
				"category":"self",
				"url":"https://www.openeuler.org/en/security/cve/detail/?cveId=CVE-2024-38597&packageName=kernel"
			},
			{
				"summary":"CVE-2024-39276",
				"category":"self",
				"url":"https://www.openeuler.org/en/security/cve/detail/?cveId=CVE-2024-39276&packageName=kernel"
			},
			{
				"summary":"CVE-2024-39476",
				"category":"self",
				"url":"https://www.openeuler.org/en/security/cve/detail/?cveId=CVE-2024-39476&packageName=kernel"
			},
			{
				"summary":"CVE-2024-40902",
				"category":"self",
				"url":"https://www.openeuler.org/en/security/cve/detail/?cveId=CVE-2024-40902&packageName=kernel"
			},
			{
				"summary":"CVE-2024-40945",
				"category":"self",
				"url":"https://www.openeuler.org/en/security/cve/detail/?cveId=CVE-2024-40945&packageName=kernel"
			},
			{
				"summary":"CVE-2024-40966",
				"category":"self",
				"url":"https://www.openeuler.org/en/security/cve/detail/?cveId=CVE-2024-40966&packageName=kernel"
			},
			{
				"summary":"CVE-2024-41088",
				"category":"self",
				"url":"https://www.openeuler.org/en/security/cve/detail/?cveId=CVE-2024-41088&packageName=kernel"
			},
			{
				"summary":"CVE-2024-42070",
				"category":"self",
				"url":"https://www.openeuler.org/en/security/cve/detail/?cveId=CVE-2024-42070&packageName=kernel"
			},
			{
				"summary":"CVE-2024-42127",
				"category":"self",
				"url":"https://www.openeuler.org/en/security/cve/detail/?cveId=CVE-2024-42127&packageName=kernel"
			},
			{
				"summary":"CVE-2024-42131",
				"category":"self",
				"url":"https://www.openeuler.org/en/security/cve/detail/?cveId=CVE-2024-42131&packageName=kernel"
			},
			{
				"summary":"CVE-2024-42232",
				"category":"self",
				"url":"https://www.openeuler.org/en/security/cve/detail/?cveId=CVE-2024-42232&packageName=kernel"
			},
			{
				"summary":"CVE-2024-42236",
				"category":"self",
				"url":"https://www.openeuler.org/en/security/cve/detail/?cveId=CVE-2024-42236&packageName=kernel"
			},
			{
				"summary":"CVE-2024-42304",
				"category":"self",
				"url":"https://www.openeuler.org/en/security/cve/detail/?cveId=CVE-2024-42304&packageName=kernel"
			},
			{
				"summary":"CVE-2024-42310",
				"category":"self",
				"url":"https://www.openeuler.org/en/security/cve/detail/?cveId=CVE-2024-42310&packageName=kernel"
			},
			{
				"summary":"CVE-2024-43839",
				"category":"self",
				"url":"https://www.openeuler.org/en/security/cve/detail/?cveId=CVE-2024-43839&packageName=kernel"
			},
			{
				"summary":"nvd cve",
				"category":"external",
				"url":"https://nvd.nist.gov/vuln/detail/CVE-2024-33621"
			},
			{
				"summary":"nvd cve",
				"category":"external",
				"url":"https://nvd.nist.gov/vuln/detail/CVE-2024-34777"
			},
			{
				"summary":"nvd cve",
				"category":"external",
				"url":"https://nvd.nist.gov/vuln/detail/CVE-2024-38544"
			},
			{
				"summary":"nvd cve",
				"category":"external",
				"url":"https://nvd.nist.gov/vuln/detail/CVE-2024-38565"
			},
			{
				"summary":"nvd cve",
				"category":"external",
				"url":"https://nvd.nist.gov/vuln/detail/CVE-2024-38597"
			},
			{
				"summary":"nvd cve",
				"category":"external",
				"url":"https://nvd.nist.gov/vuln/detail/CVE-2024-39276"
			},
			{
				"summary":"nvd cve",
				"category":"external",
				"url":"https://nvd.nist.gov/vuln/detail/CVE-2024-39476"
			},
			{
				"summary":"nvd cve",
				"category":"external",
				"url":"https://nvd.nist.gov/vuln/detail/CVE-2024-40902"
			},
			{
				"summary":"nvd cve",
				"category":"external",
				"url":"https://nvd.nist.gov/vuln/detail/CVE-2024-40945"
			},
			{
				"summary":"nvd cve",
				"category":"external",
				"url":"https://nvd.nist.gov/vuln/detail/CVE-2024-40966"
			},
			{
				"summary":"nvd cve",
				"category":"external",
				"url":"https://nvd.nist.gov/vuln/detail/CVE-2024-41088"
			},
			{
				"summary":"nvd cve",
				"category":"external",
				"url":"https://nvd.nist.gov/vuln/detail/CVE-2024-42070"
			},
			{
				"summary":"nvd cve",
				"category":"external",
				"url":"https://nvd.nist.gov/vuln/detail/CVE-2024-42127"
			},
			{
				"summary":"nvd cve",
				"category":"external",
				"url":"https://nvd.nist.gov/vuln/detail/CVE-2024-42131"
			},
			{
				"summary":"nvd cve",
				"category":"external",
				"url":"https://nvd.nist.gov/vuln/detail/CVE-2024-42232"
			},
			{
				"summary":"nvd cve",
				"category":"external",
				"url":"https://nvd.nist.gov/vuln/detail/CVE-2024-42236"
			},
			{
				"summary":"nvd cve",
				"category":"external",
				"url":"https://nvd.nist.gov/vuln/detail/CVE-2024-42304"
			},
			{
				"summary":"nvd cve",
				"category":"external",
				"url":"https://nvd.nist.gov/vuln/detail/CVE-2024-42310"
			},
			{
				"summary":"nvd cve",
				"category":"external",
				"url":"https://nvd.nist.gov/vuln/detail/CVE-2024-43839"
			},
			{
				"summary":"openEuler-SA-2024-2028 vex file",
				"category":"self",
				"url":"https://repo.openeuler.org/security/data/csaf/advisories/2024/csaf-openeuler-sa-2024-2028.json"
			}
		],
		"title":"An update for kernel is now available for openEuler-22.03-LTS-SP4",
		"tracking":{
			"initial_release_date":"2024-08-23T19:58:48+08:00",
			"revision_history":[
				{
					"date":"2024-08-23T19:58:48+08:00",
					"summary":"Initial",
					"number":"1.0.0"
				}
			],
			"generator":{
				"date":"2024-08-23T19:58:48+08:00",
				"engine":{
					"name":"openEuler CSAF Tool V1.0"
				}
			},
			"current_release_date":"2024-08-23T19:58:48+08:00",
			"id":"openEuler-SA-2024-2028",
			"version":"1.0.0",
			"status":"final"
		}
	},
	"product_tree":{
		"branches":[
			{
				"name":"openEuler",
				"category":"vendor",
				"branches":[
					{
						"name":"openEuler",
						"branches":[
							{
								"product":{
									"product_identification_helper":{
										"cpe":"cpe:/a:openEuler:openEuler:22.03-LTS-SP4"
									},
									"product_id":"openEuler-22.03-LTS-SP4",
									"name":"openEuler-22.03-LTS-SP4"
								},
								"name":"openEuler-22.03-LTS-SP4",
								"category":"product_version"
							}
						],
						"category":"product_name"
					},
					{
						"name":"aarch64",
						"branches":[
							{
								"product":{
									"product_identification_helper":{
										"cpe":"cpe:/a:openEuler:openEuler:22.03-LTS-SP4"
									},
									"product_id":"bpftool-5.10.0-224.0.0.123.oe2203sp4.aarch64.rpm",
									"name":"bpftool-5.10.0-224.0.0.123.oe2203sp4.aarch64.rpm"
								},
								"name":"bpftool-5.10.0-224.0.0.123.oe2203sp4.aarch64.rpm",
								"category":"product_version"
							},
							{
								"product":{
									"product_identification_helper":{
										"cpe":"cpe:/a:openEuler:openEuler:22.03-LTS-SP4"
									},
									"product_id":"bpftool-debuginfo-5.10.0-224.0.0.123.oe2203sp4.aarch64.rpm",
									"name":"bpftool-debuginfo-5.10.0-224.0.0.123.oe2203sp4.aarch64.rpm"
								},
								"name":"bpftool-debuginfo-5.10.0-224.0.0.123.oe2203sp4.aarch64.rpm",
								"category":"product_version"
							},
							{
								"product":{
									"product_identification_helper":{
										"cpe":"cpe:/a:openEuler:openEuler:22.03-LTS-SP4"
									},
									"product_id":"kernel-5.10.0-224.0.0.123.oe2203sp4.aarch64.rpm",
									"name":"kernel-5.10.0-224.0.0.123.oe2203sp4.aarch64.rpm"
								},
								"name":"kernel-5.10.0-224.0.0.123.oe2203sp4.aarch64.rpm",
								"category":"product_version"
							},
							{
								"product":{
									"product_identification_helper":{
										"cpe":"cpe:/a:openEuler:openEuler:22.03-LTS-SP4"
									},
									"product_id":"kernel-debuginfo-5.10.0-224.0.0.123.oe2203sp4.aarch64.rpm",
									"name":"kernel-debuginfo-5.10.0-224.0.0.123.oe2203sp4.aarch64.rpm"
								},
								"name":"kernel-debuginfo-5.10.0-224.0.0.123.oe2203sp4.aarch64.rpm",
								"category":"product_version"
							},
							{
								"product":{
									"product_identification_helper":{
										"cpe":"cpe:/a:openEuler:openEuler:22.03-LTS-SP4"
									},
									"product_id":"kernel-debugsource-5.10.0-224.0.0.123.oe2203sp4.aarch64.rpm",
									"name":"kernel-debugsource-5.10.0-224.0.0.123.oe2203sp4.aarch64.rpm"
								},
								"name":"kernel-debugsource-5.10.0-224.0.0.123.oe2203sp4.aarch64.rpm",
								"category":"product_version"
							},
							{
								"product":{
									"product_identification_helper":{
										"cpe":"cpe:/a:openEuler:openEuler:22.03-LTS-SP4"
									},
									"product_id":"kernel-devel-5.10.0-224.0.0.123.oe2203sp4.aarch64.rpm",
									"name":"kernel-devel-5.10.0-224.0.0.123.oe2203sp4.aarch64.rpm"
								},
								"name":"kernel-devel-5.10.0-224.0.0.123.oe2203sp4.aarch64.rpm",
								"category":"product_version"
							},
							{
								"product":{
									"product_identification_helper":{
										"cpe":"cpe:/a:openEuler:openEuler:22.03-LTS-SP4"
									},
									"product_id":"kernel-headers-5.10.0-224.0.0.123.oe2203sp4.aarch64.rpm",
									"name":"kernel-headers-5.10.0-224.0.0.123.oe2203sp4.aarch64.rpm"
								},
								"name":"kernel-headers-5.10.0-224.0.0.123.oe2203sp4.aarch64.rpm",
								"category":"product_version"
							},
							{
								"product":{
									"product_identification_helper":{
										"cpe":"cpe:/a:openEuler:openEuler:22.03-LTS-SP4"
									},
									"product_id":"kernel-source-5.10.0-224.0.0.123.oe2203sp4.aarch64.rpm",
									"name":"kernel-source-5.10.0-224.0.0.123.oe2203sp4.aarch64.rpm"
								},
								"name":"kernel-source-5.10.0-224.0.0.123.oe2203sp4.aarch64.rpm",
								"category":"product_version"
							},
							{
								"product":{
									"product_identification_helper":{
										"cpe":"cpe:/a:openEuler:openEuler:22.03-LTS-SP4"
									},
									"product_id":"kernel-tools-5.10.0-224.0.0.123.oe2203sp4.aarch64.rpm",
									"name":"kernel-tools-5.10.0-224.0.0.123.oe2203sp4.aarch64.rpm"
								},
								"name":"kernel-tools-5.10.0-224.0.0.123.oe2203sp4.aarch64.rpm",
								"category":"product_version"
							},
							{
								"product":{
									"product_identification_helper":{
										"cpe":"cpe:/a:openEuler:openEuler:22.03-LTS-SP4"
									},
									"product_id":"kernel-tools-debuginfo-5.10.0-224.0.0.123.oe2203sp4.aarch64.rpm",
									"name":"kernel-tools-debuginfo-5.10.0-224.0.0.123.oe2203sp4.aarch64.rpm"
								},
								"name":"kernel-tools-debuginfo-5.10.0-224.0.0.123.oe2203sp4.aarch64.rpm",
								"category":"product_version"
							},
							{
								"product":{
									"product_identification_helper":{
										"cpe":"cpe:/a:openEuler:openEuler:22.03-LTS-SP4"
									},
									"product_id":"kernel-tools-devel-5.10.0-224.0.0.123.oe2203sp4.aarch64.rpm",
									"name":"kernel-tools-devel-5.10.0-224.0.0.123.oe2203sp4.aarch64.rpm"
								},
								"name":"kernel-tools-devel-5.10.0-224.0.0.123.oe2203sp4.aarch64.rpm",
								"category":"product_version"
							},
							{
								"product":{
									"product_identification_helper":{
										"cpe":"cpe:/a:openEuler:openEuler:22.03-LTS-SP4"
									},
									"product_id":"perf-5.10.0-224.0.0.123.oe2203sp4.aarch64.rpm",
									"name":"perf-5.10.0-224.0.0.123.oe2203sp4.aarch64.rpm"
								},
								"name":"perf-5.10.0-224.0.0.123.oe2203sp4.aarch64.rpm",
								"category":"product_version"
							},
							{
								"product":{
									"product_identification_helper":{
										"cpe":"cpe:/a:openEuler:openEuler:22.03-LTS-SP4"
									},
									"product_id":"perf-debuginfo-5.10.0-224.0.0.123.oe2203sp4.aarch64.rpm",
									"name":"perf-debuginfo-5.10.0-224.0.0.123.oe2203sp4.aarch64.rpm"
								},
								"name":"perf-debuginfo-5.10.0-224.0.0.123.oe2203sp4.aarch64.rpm",
								"category":"product_version"
							},
							{
								"product":{
									"product_identification_helper":{
										"cpe":"cpe:/a:openEuler:openEuler:22.03-LTS-SP4"
									},
									"product_id":"python3-perf-5.10.0-224.0.0.123.oe2203sp4.aarch64.rpm",
									"name":"python3-perf-5.10.0-224.0.0.123.oe2203sp4.aarch64.rpm"
								},
								"name":"python3-perf-5.10.0-224.0.0.123.oe2203sp4.aarch64.rpm",
								"category":"product_version"
							},
							{
								"product":{
									"product_identification_helper":{
										"cpe":"cpe:/a:openEuler:openEuler:22.03-LTS-SP4"
									},
									"product_id":"python3-perf-debuginfo-5.10.0-224.0.0.123.oe2203sp4.aarch64.rpm",
									"name":"python3-perf-debuginfo-5.10.0-224.0.0.123.oe2203sp4.aarch64.rpm"
								},
								"name":"python3-perf-debuginfo-5.10.0-224.0.0.123.oe2203sp4.aarch64.rpm",
								"category":"product_version"
							}
						],
						"category":"architecture"
					},
					{
						"name":"x86_64",
						"branches":[
							{
								"product":{
									"product_identification_helper":{
										"cpe":"cpe:/a:openEuler:openEuler:22.03-LTS-SP4"
									},
									"product_id":"bpftool-5.10.0-224.0.0.123.oe2203sp4.x86_64.rpm",
									"name":"bpftool-5.10.0-224.0.0.123.oe2203sp4.x86_64.rpm"
								},
								"name":"bpftool-5.10.0-224.0.0.123.oe2203sp4.x86_64.rpm",
								"category":"product_version"
							},
							{
								"product":{
									"product_identification_helper":{
										"cpe":"cpe:/a:openEuler:openEuler:22.03-LTS-SP4"
									},
									"product_id":"bpftool-debuginfo-5.10.0-224.0.0.123.oe2203sp4.x86_64.rpm",
									"name":"bpftool-debuginfo-5.10.0-224.0.0.123.oe2203sp4.x86_64.rpm"
								},
								"name":"bpftool-debuginfo-5.10.0-224.0.0.123.oe2203sp4.x86_64.rpm",
								"category":"product_version"
							},
							{
								"product":{
									"product_identification_helper":{
										"cpe":"cpe:/a:openEuler:openEuler:22.03-LTS-SP4"
									},
									"product_id":"kernel-5.10.0-224.0.0.123.oe2203sp4.x86_64.rpm",
									"name":"kernel-5.10.0-224.0.0.123.oe2203sp4.x86_64.rpm"
								},
								"name":"kernel-5.10.0-224.0.0.123.oe2203sp4.x86_64.rpm",
								"category":"product_version"
							},
							{
								"product":{
									"product_identification_helper":{
										"cpe":"cpe:/a:openEuler:openEuler:22.03-LTS-SP4"
									},
									"product_id":"kernel-debuginfo-5.10.0-224.0.0.123.oe2203sp4.x86_64.rpm",
									"name":"kernel-debuginfo-5.10.0-224.0.0.123.oe2203sp4.x86_64.rpm"
								},
								"name":"kernel-debuginfo-5.10.0-224.0.0.123.oe2203sp4.x86_64.rpm",
								"category":"product_version"
							},
							{
								"product":{
									"product_identification_helper":{
										"cpe":"cpe:/a:openEuler:openEuler:22.03-LTS-SP4"
									},
									"product_id":"kernel-debugsource-5.10.0-224.0.0.123.oe2203sp4.x86_64.rpm",
									"name":"kernel-debugsource-5.10.0-224.0.0.123.oe2203sp4.x86_64.rpm"
								},
								"name":"kernel-debugsource-5.10.0-224.0.0.123.oe2203sp4.x86_64.rpm",
								"category":"product_version"
							},
							{
								"product":{
									"product_identification_helper":{
										"cpe":"cpe:/a:openEuler:openEuler:22.03-LTS-SP4"
									},
									"product_id":"kernel-devel-5.10.0-224.0.0.123.oe2203sp4.x86_64.rpm",
									"name":"kernel-devel-5.10.0-224.0.0.123.oe2203sp4.x86_64.rpm"
								},
								"name":"kernel-devel-5.10.0-224.0.0.123.oe2203sp4.x86_64.rpm",
								"category":"product_version"
							},
							{
								"product":{
									"product_identification_helper":{
										"cpe":"cpe:/a:openEuler:openEuler:22.03-LTS-SP4"
									},
									"product_id":"kernel-headers-5.10.0-224.0.0.123.oe2203sp4.x86_64.rpm",
									"name":"kernel-headers-5.10.0-224.0.0.123.oe2203sp4.x86_64.rpm"
								},
								"name":"kernel-headers-5.10.0-224.0.0.123.oe2203sp4.x86_64.rpm",
								"category":"product_version"
							},
							{
								"product":{
									"product_identification_helper":{
										"cpe":"cpe:/a:openEuler:openEuler:22.03-LTS-SP4"
									},
									"product_id":"kernel-source-5.10.0-224.0.0.123.oe2203sp4.x86_64.rpm",
									"name":"kernel-source-5.10.0-224.0.0.123.oe2203sp4.x86_64.rpm"
								},
								"name":"kernel-source-5.10.0-224.0.0.123.oe2203sp4.x86_64.rpm",
								"category":"product_version"
							},
							{
								"product":{
									"product_identification_helper":{
										"cpe":"cpe:/a:openEuler:openEuler:22.03-LTS-SP4"
									},
									"product_id":"kernel-tools-5.10.0-224.0.0.123.oe2203sp4.x86_64.rpm",
									"name":"kernel-tools-5.10.0-224.0.0.123.oe2203sp4.x86_64.rpm"
								},
								"name":"kernel-tools-5.10.0-224.0.0.123.oe2203sp4.x86_64.rpm",
								"category":"product_version"
							},
							{
								"product":{
									"product_identification_helper":{
										"cpe":"cpe:/a:openEuler:openEuler:22.03-LTS-SP4"
									},
									"product_id":"kernel-tools-debuginfo-5.10.0-224.0.0.123.oe2203sp4.x86_64.rpm",
									"name":"kernel-tools-debuginfo-5.10.0-224.0.0.123.oe2203sp4.x86_64.rpm"
								},
								"name":"kernel-tools-debuginfo-5.10.0-224.0.0.123.oe2203sp4.x86_64.rpm",
								"category":"product_version"
							},
							{
								"product":{
									"product_identification_helper":{
										"cpe":"cpe:/a:openEuler:openEuler:22.03-LTS-SP4"
									},
									"product_id":"kernel-tools-devel-5.10.0-224.0.0.123.oe2203sp4.x86_64.rpm",
									"name":"kernel-tools-devel-5.10.0-224.0.0.123.oe2203sp4.x86_64.rpm"
								},
								"name":"kernel-tools-devel-5.10.0-224.0.0.123.oe2203sp4.x86_64.rpm",
								"category":"product_version"
							},
							{
								"product":{
									"product_identification_helper":{
										"cpe":"cpe:/a:openEuler:openEuler:22.03-LTS-SP4"
									},
									"product_id":"perf-5.10.0-224.0.0.123.oe2203sp4.x86_64.rpm",
									"name":"perf-5.10.0-224.0.0.123.oe2203sp4.x86_64.rpm"
								},
								"name":"perf-5.10.0-224.0.0.123.oe2203sp4.x86_64.rpm",
								"category":"product_version"
							},
							{
								"product":{
									"product_identification_helper":{
										"cpe":"cpe:/a:openEuler:openEuler:22.03-LTS-SP4"
									},
									"product_id":"perf-debuginfo-5.10.0-224.0.0.123.oe2203sp4.x86_64.rpm",
									"name":"perf-debuginfo-5.10.0-224.0.0.123.oe2203sp4.x86_64.rpm"
								},
								"name":"perf-debuginfo-5.10.0-224.0.0.123.oe2203sp4.x86_64.rpm",
								"category":"product_version"
							},
							{
								"product":{
									"product_identification_helper":{
										"cpe":"cpe:/a:openEuler:openEuler:22.03-LTS-SP4"
									},
									"product_id":"python3-perf-5.10.0-224.0.0.123.oe2203sp4.x86_64.rpm",
									"name":"python3-perf-5.10.0-224.0.0.123.oe2203sp4.x86_64.rpm"
								},
								"name":"python3-perf-5.10.0-224.0.0.123.oe2203sp4.x86_64.rpm",
								"category":"product_version"
							},
							{
								"product":{
									"product_identification_helper":{
										"cpe":"cpe:/a:openEuler:openEuler:22.03-LTS-SP4"
									},
									"product_id":"python3-perf-debuginfo-5.10.0-224.0.0.123.oe2203sp4.x86_64.rpm",
									"name":"python3-perf-debuginfo-5.10.0-224.0.0.123.oe2203sp4.x86_64.rpm"
								},
								"name":"python3-perf-debuginfo-5.10.0-224.0.0.123.oe2203sp4.x86_64.rpm",
								"category":"product_version"
							}
						],
						"category":"architecture"
					},
					{
						"name":"src",
						"branches":[
							{
								"product":{
									"product_identification_helper":{
										"cpe":"cpe:/a:openEuler:openEuler:22.03-LTS-SP4"
									},
									"product_id":"kernel-5.10.0-224.0.0.123.oe2203sp4.src.rpm",
									"name":"kernel-5.10.0-224.0.0.123.oe2203sp4.src.rpm"
								},
								"name":"kernel-5.10.0-224.0.0.123.oe2203sp4.src.rpm",
								"category":"product_version"
							}
						],
						"category":"architecture"
					}
				]
			}
		],
		"relationships":[
			{
				"relates_to_product_reference":"openEuler-22.03-LTS-SP4",
				"product_reference":"bpftool-5.10.0-224.0.0.123.oe2203sp4.aarch64.rpm",
				"full_product_name":{
					"product_id":"openEuler-22.03-LTS-SP4:bpftool-5.10.0-224.0.0.123.oe2203sp4.aarch64",
					"name":"bpftool-5.10.0-224.0.0.123.oe2203sp4.aarch64 as a component of openEuler-22.03-LTS-SP4"
				},
				"category":"default_component_of"
			},
			{
				"relates_to_product_reference":"openEuler-22.03-LTS-SP4",
				"product_reference":"bpftool-debuginfo-5.10.0-224.0.0.123.oe2203sp4.aarch64.rpm",
				"full_product_name":{
					"product_id":"openEuler-22.03-LTS-SP4:bpftool-debuginfo-5.10.0-224.0.0.123.oe2203sp4.aarch64",
					"name":"bpftool-debuginfo-5.10.0-224.0.0.123.oe2203sp4.aarch64 as a component of openEuler-22.03-LTS-SP4"
				},
				"category":"default_component_of"
			},
			{
				"relates_to_product_reference":"openEuler-22.03-LTS-SP4",
				"product_reference":"kernel-5.10.0-224.0.0.123.oe2203sp4.aarch64.rpm",
				"full_product_name":{
					"product_id":"openEuler-22.03-LTS-SP4:kernel-5.10.0-224.0.0.123.oe2203sp4.aarch64",
					"name":"kernel-5.10.0-224.0.0.123.oe2203sp4.aarch64 as a component of openEuler-22.03-LTS-SP4"
				},
				"category":"default_component_of"
			},
			{
				"relates_to_product_reference":"openEuler-22.03-LTS-SP4",
				"product_reference":"kernel-debuginfo-5.10.0-224.0.0.123.oe2203sp4.aarch64.rpm",
				"full_product_name":{
					"product_id":"openEuler-22.03-LTS-SP4:kernel-debuginfo-5.10.0-224.0.0.123.oe2203sp4.aarch64",
					"name":"kernel-debuginfo-5.10.0-224.0.0.123.oe2203sp4.aarch64 as a component of openEuler-22.03-LTS-SP4"
				},
				"category":"default_component_of"
			},
			{
				"relates_to_product_reference":"openEuler-22.03-LTS-SP4",
				"product_reference":"kernel-debugsource-5.10.0-224.0.0.123.oe2203sp4.aarch64.rpm",
				"full_product_name":{
					"product_id":"openEuler-22.03-LTS-SP4:kernel-debugsource-5.10.0-224.0.0.123.oe2203sp4.aarch64",
					"name":"kernel-debugsource-5.10.0-224.0.0.123.oe2203sp4.aarch64 as a component of openEuler-22.03-LTS-SP4"
				},
				"category":"default_component_of"
			},
			{
				"relates_to_product_reference":"openEuler-22.03-LTS-SP4",
				"product_reference":"kernel-devel-5.10.0-224.0.0.123.oe2203sp4.aarch64.rpm",
				"full_product_name":{
					"product_id":"openEuler-22.03-LTS-SP4:kernel-devel-5.10.0-224.0.0.123.oe2203sp4.aarch64",
					"name":"kernel-devel-5.10.0-224.0.0.123.oe2203sp4.aarch64 as a component of openEuler-22.03-LTS-SP4"
				},
				"category":"default_component_of"
			},
			{
				"relates_to_product_reference":"openEuler-22.03-LTS-SP4",
				"product_reference":"kernel-headers-5.10.0-224.0.0.123.oe2203sp4.aarch64.rpm",
				"full_product_name":{
					"product_id":"openEuler-22.03-LTS-SP4:kernel-headers-5.10.0-224.0.0.123.oe2203sp4.aarch64",
					"name":"kernel-headers-5.10.0-224.0.0.123.oe2203sp4.aarch64 as a component of openEuler-22.03-LTS-SP4"
				},
				"category":"default_component_of"
			},
			{
				"relates_to_product_reference":"openEuler-22.03-LTS-SP4",
				"product_reference":"kernel-source-5.10.0-224.0.0.123.oe2203sp4.aarch64.rpm",
				"full_product_name":{
					"product_id":"openEuler-22.03-LTS-SP4:kernel-source-5.10.0-224.0.0.123.oe2203sp4.aarch64",
					"name":"kernel-source-5.10.0-224.0.0.123.oe2203sp4.aarch64 as a component of openEuler-22.03-LTS-SP4"
				},
				"category":"default_component_of"
			},
			{
				"relates_to_product_reference":"openEuler-22.03-LTS-SP4",
				"product_reference":"kernel-tools-5.10.0-224.0.0.123.oe2203sp4.aarch64.rpm",
				"full_product_name":{
					"product_id":"openEuler-22.03-LTS-SP4:kernel-tools-5.10.0-224.0.0.123.oe2203sp4.aarch64",
					"name":"kernel-tools-5.10.0-224.0.0.123.oe2203sp4.aarch64 as a component of openEuler-22.03-LTS-SP4"
				},
				"category":"default_component_of"
			},
			{
				"relates_to_product_reference":"openEuler-22.03-LTS-SP4",
				"product_reference":"kernel-tools-debuginfo-5.10.0-224.0.0.123.oe2203sp4.aarch64.rpm",
				"full_product_name":{
					"product_id":"openEuler-22.03-LTS-SP4:kernel-tools-debuginfo-5.10.0-224.0.0.123.oe2203sp4.aarch64",
					"name":"kernel-tools-debuginfo-5.10.0-224.0.0.123.oe2203sp4.aarch64 as a component of openEuler-22.03-LTS-SP4"
				},
				"category":"default_component_of"
			},
			{
				"relates_to_product_reference":"openEuler-22.03-LTS-SP4",
				"product_reference":"kernel-tools-devel-5.10.0-224.0.0.123.oe2203sp4.aarch64.rpm",
				"full_product_name":{
					"product_id":"openEuler-22.03-LTS-SP4:kernel-tools-devel-5.10.0-224.0.0.123.oe2203sp4.aarch64",
					"name":"kernel-tools-devel-5.10.0-224.0.0.123.oe2203sp4.aarch64 as a component of openEuler-22.03-LTS-SP4"
				},
				"category":"default_component_of"
			},
			{
				"relates_to_product_reference":"openEuler-22.03-LTS-SP4",
				"product_reference":"perf-5.10.0-224.0.0.123.oe2203sp4.aarch64.rpm",
				"full_product_name":{
					"product_id":"openEuler-22.03-LTS-SP4:perf-5.10.0-224.0.0.123.oe2203sp4.aarch64",
					"name":"perf-5.10.0-224.0.0.123.oe2203sp4.aarch64 as a component of openEuler-22.03-LTS-SP4"
				},
				"category":"default_component_of"
			},
			{
				"relates_to_product_reference":"openEuler-22.03-LTS-SP4",
				"product_reference":"perf-debuginfo-5.10.0-224.0.0.123.oe2203sp4.aarch64.rpm",
				"full_product_name":{
					"product_id":"openEuler-22.03-LTS-SP4:perf-debuginfo-5.10.0-224.0.0.123.oe2203sp4.aarch64",
					"name":"perf-debuginfo-5.10.0-224.0.0.123.oe2203sp4.aarch64 as a component of openEuler-22.03-LTS-SP4"
				},
				"category":"default_component_of"
			},
			{
				"relates_to_product_reference":"openEuler-22.03-LTS-SP4",
				"product_reference":"python3-perf-5.10.0-224.0.0.123.oe2203sp4.aarch64.rpm",
				"full_product_name":{
					"product_id":"openEuler-22.03-LTS-SP4:python3-perf-5.10.0-224.0.0.123.oe2203sp4.aarch64",
					"name":"python3-perf-5.10.0-224.0.0.123.oe2203sp4.aarch64 as a component of openEuler-22.03-LTS-SP4"
				},
				"category":"default_component_of"
			},
			{
				"relates_to_product_reference":"openEuler-22.03-LTS-SP4",
				"product_reference":"python3-perf-debuginfo-5.10.0-224.0.0.123.oe2203sp4.aarch64.rpm",
				"full_product_name":{
					"product_id":"openEuler-22.03-LTS-SP4:python3-perf-debuginfo-5.10.0-224.0.0.123.oe2203sp4.aarch64",
					"name":"python3-perf-debuginfo-5.10.0-224.0.0.123.oe2203sp4.aarch64 as a component of openEuler-22.03-LTS-SP4"
				},
				"category":"default_component_of"
			},
			{
				"relates_to_product_reference":"openEuler-22.03-LTS-SP4",
				"product_reference":"bpftool-5.10.0-224.0.0.123.oe2203sp4.x86_64.rpm",
				"full_product_name":{
					"product_id":"openEuler-22.03-LTS-SP4:bpftool-5.10.0-224.0.0.123.oe2203sp4.x86_64",
					"name":"bpftool-5.10.0-224.0.0.123.oe2203sp4.x86_64 as a component of openEuler-22.03-LTS-SP4"
				},
				"category":"default_component_of"
			},
			{
				"relates_to_product_reference":"openEuler-22.03-LTS-SP4",
				"product_reference":"bpftool-debuginfo-5.10.0-224.0.0.123.oe2203sp4.x86_64.rpm",
				"full_product_name":{
					"product_id":"openEuler-22.03-LTS-SP4:bpftool-debuginfo-5.10.0-224.0.0.123.oe2203sp4.x86_64",
					"name":"bpftool-debuginfo-5.10.0-224.0.0.123.oe2203sp4.x86_64 as a component of openEuler-22.03-LTS-SP4"
				},
				"category":"default_component_of"
			},
			{
				"relates_to_product_reference":"openEuler-22.03-LTS-SP4",
				"product_reference":"kernel-5.10.0-224.0.0.123.oe2203sp4.x86_64.rpm",
				"full_product_name":{
					"product_id":"openEuler-22.03-LTS-SP4:kernel-5.10.0-224.0.0.123.oe2203sp4.x86_64",
					"name":"kernel-5.10.0-224.0.0.123.oe2203sp4.x86_64 as a component of openEuler-22.03-LTS-SP4"
				},
				"category":"default_component_of"
			},
			{
				"relates_to_product_reference":"openEuler-22.03-LTS-SP4",
				"product_reference":"kernel-debuginfo-5.10.0-224.0.0.123.oe2203sp4.x86_64.rpm",
				"full_product_name":{
					"product_id":"openEuler-22.03-LTS-SP4:kernel-debuginfo-5.10.0-224.0.0.123.oe2203sp4.x86_64",
					"name":"kernel-debuginfo-5.10.0-224.0.0.123.oe2203sp4.x86_64 as a component of openEuler-22.03-LTS-SP4"
				},
				"category":"default_component_of"
			},
			{
				"relates_to_product_reference":"openEuler-22.03-LTS-SP4",
				"product_reference":"kernel-debugsource-5.10.0-224.0.0.123.oe2203sp4.x86_64.rpm",
				"full_product_name":{
					"product_id":"openEuler-22.03-LTS-SP4:kernel-debugsource-5.10.0-224.0.0.123.oe2203sp4.x86_64",
					"name":"kernel-debugsource-5.10.0-224.0.0.123.oe2203sp4.x86_64 as a component of openEuler-22.03-LTS-SP4"
				},
				"category":"default_component_of"
			},
			{
				"relates_to_product_reference":"openEuler-22.03-LTS-SP4",
				"product_reference":"kernel-devel-5.10.0-224.0.0.123.oe2203sp4.x86_64.rpm",
				"full_product_name":{
					"product_id":"openEuler-22.03-LTS-SP4:kernel-devel-5.10.0-224.0.0.123.oe2203sp4.x86_64",
					"name":"kernel-devel-5.10.0-224.0.0.123.oe2203sp4.x86_64 as a component of openEuler-22.03-LTS-SP4"
				},
				"category":"default_component_of"
			},
			{
				"relates_to_product_reference":"openEuler-22.03-LTS-SP4",
				"product_reference":"kernel-headers-5.10.0-224.0.0.123.oe2203sp4.x86_64.rpm",
				"full_product_name":{
					"product_id":"openEuler-22.03-LTS-SP4:kernel-headers-5.10.0-224.0.0.123.oe2203sp4.x86_64",
					"name":"kernel-headers-5.10.0-224.0.0.123.oe2203sp4.x86_64 as a component of openEuler-22.03-LTS-SP4"
				},
				"category":"default_component_of"
			},
			{
				"relates_to_product_reference":"openEuler-22.03-LTS-SP4",
				"product_reference":"kernel-source-5.10.0-224.0.0.123.oe2203sp4.x86_64.rpm",
				"full_product_name":{
					"product_id":"openEuler-22.03-LTS-SP4:kernel-source-5.10.0-224.0.0.123.oe2203sp4.x86_64",
					"name":"kernel-source-5.10.0-224.0.0.123.oe2203sp4.x86_64 as a component of openEuler-22.03-LTS-SP4"
				},
				"category":"default_component_of"
			},
			{
				"relates_to_product_reference":"openEuler-22.03-LTS-SP4",
				"product_reference":"kernel-tools-5.10.0-224.0.0.123.oe2203sp4.x86_64.rpm",
				"full_product_name":{
					"product_id":"openEuler-22.03-LTS-SP4:kernel-tools-5.10.0-224.0.0.123.oe2203sp4.x86_64",
					"name":"kernel-tools-5.10.0-224.0.0.123.oe2203sp4.x86_64 as a component of openEuler-22.03-LTS-SP4"
				},
				"category":"default_component_of"
			},
			{
				"relates_to_product_reference":"openEuler-22.03-LTS-SP4",
				"product_reference":"kernel-tools-debuginfo-5.10.0-224.0.0.123.oe2203sp4.x86_64.rpm",
				"full_product_name":{
					"product_id":"openEuler-22.03-LTS-SP4:kernel-tools-debuginfo-5.10.0-224.0.0.123.oe2203sp4.x86_64",
					"name":"kernel-tools-debuginfo-5.10.0-224.0.0.123.oe2203sp4.x86_64 as a component of openEuler-22.03-LTS-SP4"
				},
				"category":"default_component_of"
			},
			{
				"relates_to_product_reference":"openEuler-22.03-LTS-SP4",
				"product_reference":"kernel-tools-devel-5.10.0-224.0.0.123.oe2203sp4.x86_64.rpm",
				"full_product_name":{
					"product_id":"openEuler-22.03-LTS-SP4:kernel-tools-devel-5.10.0-224.0.0.123.oe2203sp4.x86_64",
					"name":"kernel-tools-devel-5.10.0-224.0.0.123.oe2203sp4.x86_64 as a component of openEuler-22.03-LTS-SP4"
				},
				"category":"default_component_of"
			},
			{
				"relates_to_product_reference":"openEuler-22.03-LTS-SP4",
				"product_reference":"perf-5.10.0-224.0.0.123.oe2203sp4.x86_64.rpm",
				"full_product_name":{
					"product_id":"openEuler-22.03-LTS-SP4:perf-5.10.0-224.0.0.123.oe2203sp4.x86_64",
					"name":"perf-5.10.0-224.0.0.123.oe2203sp4.x86_64 as a component of openEuler-22.03-LTS-SP4"
				},
				"category":"default_component_of"
			},
			{
				"relates_to_product_reference":"openEuler-22.03-LTS-SP4",
				"product_reference":"perf-debuginfo-5.10.0-224.0.0.123.oe2203sp4.x86_64.rpm",
				"full_product_name":{
					"product_id":"openEuler-22.03-LTS-SP4:perf-debuginfo-5.10.0-224.0.0.123.oe2203sp4.x86_64",
					"name":"perf-debuginfo-5.10.0-224.0.0.123.oe2203sp4.x86_64 as a component of openEuler-22.03-LTS-SP4"
				},
				"category":"default_component_of"
			},
			{
				"relates_to_product_reference":"openEuler-22.03-LTS-SP4",
				"product_reference":"python3-perf-5.10.0-224.0.0.123.oe2203sp4.x86_64.rpm",
				"full_product_name":{
					"product_id":"openEuler-22.03-LTS-SP4:python3-perf-5.10.0-224.0.0.123.oe2203sp4.x86_64",
					"name":"python3-perf-5.10.0-224.0.0.123.oe2203sp4.x86_64 as a component of openEuler-22.03-LTS-SP4"
				},
				"category":"default_component_of"
			},
			{
				"relates_to_product_reference":"openEuler-22.03-LTS-SP4",
				"product_reference":"python3-perf-debuginfo-5.10.0-224.0.0.123.oe2203sp4.x86_64.rpm",
				"full_product_name":{
					"product_id":"openEuler-22.03-LTS-SP4:python3-perf-debuginfo-5.10.0-224.0.0.123.oe2203sp4.x86_64",
					"name":"python3-perf-debuginfo-5.10.0-224.0.0.123.oe2203sp4.x86_64 as a component of openEuler-22.03-LTS-SP4"
				},
				"category":"default_component_of"
			},
			{
				"relates_to_product_reference":"openEuler-22.03-LTS-SP4",
				"product_reference":"kernel-5.10.0-224.0.0.123.oe2203sp4.src.rpm",
				"full_product_name":{
					"product_id":"openEuler-22.03-LTS-SP4:kernel-5.10.0-224.0.0.123.oe2203sp4.src",
					"name":"kernel-5.10.0-224.0.0.123.oe2203sp4.src as a component of openEuler-22.03-LTS-SP4"
				},
				"category":"default_component_of"
			}
		]
	},
	"vulnerabilities":[
		{
			"cve":"CVE-2024-33621",
			"notes":[
				{
					"text":"In the Linux kernel, the following vulnerability has been resolved:\n\nipvlan: Dont Use skb->sk in ipvlan_process_v{4,6}_outbound\n\nRaw packet from PF_PACKET socket ontop of an IPv6-backed ipvlan device will\nhit WARN_ON_ONCE() in sk_mc_loop() through sch_direct_xmit() path.\n\nWARNING: CPU: 2 PID: 0 at net/core/sock.c:775 sk_mc_loop+0x2d/0x70\nModules linked in: sch_netem ipvlan rfkill cirrus drm_shmem_helper sg drm_kms_helper\nCPU: 2 PID: 0 Comm: swapper/2 Kdump: loaded Not tainted 6.9.0+ #279\nHardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.15.0-1 04/01/2014\nRIP: 0010:sk_mc_loop+0x2d/0x70\nCode: fa 0f 1f 44 00 00 65 0f b7 15 f7 96 a3 4f 31 c0 66 85 d2 75 26 48 85 ff 74 1c\nRSP: 0018:ffffa9584015cd78 EFLAGS: 00010212\nRAX: 0000000000000011 RBX: ffff91e585793e00 RCX: 0000000002c6a001\nRDX: 0000000000000000 RSI: 0000000000000040 RDI: ffff91e589c0f000\nRBP: ffff91e5855bd100 R08: 0000000000000000 R09: 3d00545216f43d00\nR10: ffff91e584fdcc50 R11: 00000060dd8616f4 R12: ffff91e58132d000\nR13: ffff91e584fdcc68 R14: ffff91e5869ce800 R15: ffff91e589c0f000\nFS:  0000000000000000(0000) GS:ffff91e898100000(0000) knlGS:0000000000000000\nCS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033\nCR2: 00007f788f7c44c0 CR3: 0000000008e1a000 CR4: 00000000000006f0\nDR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000\nDR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400\nCall Trace:\n<IRQ>\n ? __warn (kernel/panic.c:693)\n ? sk_mc_loop (net/core/sock.c:760)\n ? report_bug (lib/bug.c:201 lib/bug.c:219)\n ? handle_bug (arch/x86/kernel/traps.c:239)\n ? exc_invalid_op (arch/x86/kernel/traps.c:260 (discriminator 1))\n ? asm_exc_invalid_op (./arch/x86/include/asm/idtentry.h:621)\n ? sk_mc_loop (net/core/sock.c:760)\n ip6_finish_output2 (net/ipv6/ip6_output.c:83 (discriminator 1))\n ? nf_hook_slow (net/netfilter/core.c:626)\n ip6_finish_output (net/ipv6/ip6_output.c:222)\n ? __pfx_ip6_finish_output (net/ipv6/ip6_output.c:215)\n ipvlan_xmit_mode_l3 (drivers/net/ipvlan/ipvlan_core.c:602) ipvlan\n ipvlan_start_xmit (drivers/net/ipvlan/ipvlan_main.c:226) ipvlan\n dev_hard_start_xmit (net/core/dev.c:3594)\n sch_direct_xmit (net/sched/sch_generic.c:343)\n __qdisc_run (net/sched/sch_generic.c:416)\n net_tx_action (net/core/dev.c:5286)\n handle_softirqs (kernel/softirq.c:555)\n __irq_exit_rcu (kernel/softirq.c:589)\n sysvec_apic_timer_interrupt (arch/x86/kernel/apic/apic.c:1043)\n\nThe warning triggers as this:\npacket_sendmsg\n   packet_snd //skb->sk is packet sk\n      __dev_queue_xmit\n         __dev_xmit_skb //q->enqueue is not NULL\n             __qdisc_run\n               sch_direct_xmit\n                 dev_hard_start_xmit\n                   ipvlan_start_xmit\n                      ipvlan_xmit_mode_l3 //l3 mode\n                        ipvlan_process_outbound //vepa flag\n                          ipvlan_process_v6_outbound\n                            ip6_local_out\n                                __ip6_finish_output\n                                  ip6_finish_output2 //multicast packet\n                                    sk_mc_loop //sk->sk_family is AF_PACKET\n\nCall ip{6}_local_out() with NULL sk in ipvlan as other tunnels to fix this.",
					"category":"description",
					"title":"Vulnerability Description"
				}
			],
			"product_status":{
				"fixed":[
					"openEuler-22.03-LTS-SP4:bpftool-5.10.0-224.0.0.123.oe2203sp4.aarch64",
					"openEuler-22.03-LTS-SP4:bpftool-debuginfo-5.10.0-224.0.0.123.oe2203sp4.aarch64",
					"openEuler-22.03-LTS-SP4:kernel-5.10.0-224.0.0.123.oe2203sp4.aarch64",
					"openEuler-22.03-LTS-SP4:kernel-debuginfo-5.10.0-224.0.0.123.oe2203sp4.aarch64",
					"openEuler-22.03-LTS-SP4:kernel-debugsource-5.10.0-224.0.0.123.oe2203sp4.aarch64",
					"openEuler-22.03-LTS-SP4:kernel-devel-5.10.0-224.0.0.123.oe2203sp4.aarch64",
					"openEuler-22.03-LTS-SP4:kernel-headers-5.10.0-224.0.0.123.oe2203sp4.aarch64",
					"openEuler-22.03-LTS-SP4:kernel-source-5.10.0-224.0.0.123.oe2203sp4.aarch64",
					"openEuler-22.03-LTS-SP4:kernel-tools-5.10.0-224.0.0.123.oe2203sp4.aarch64",
					"openEuler-22.03-LTS-SP4:kernel-tools-debuginfo-5.10.0-224.0.0.123.oe2203sp4.aarch64",
					"openEuler-22.03-LTS-SP4:kernel-tools-devel-5.10.0-224.0.0.123.oe2203sp4.aarch64",
					"openEuler-22.03-LTS-SP4:perf-5.10.0-224.0.0.123.oe2203sp4.aarch64",
					"openEuler-22.03-LTS-SP4:perf-debuginfo-5.10.0-224.0.0.123.oe2203sp4.aarch64",
					"openEuler-22.03-LTS-SP4:python3-perf-5.10.0-224.0.0.123.oe2203sp4.aarch64",
					"openEuler-22.03-LTS-SP4:python3-perf-debuginfo-5.10.0-224.0.0.123.oe2203sp4.aarch64",
					"openEuler-22.03-LTS-SP4:bpftool-5.10.0-224.0.0.123.oe2203sp4.x86_64",
					"openEuler-22.03-LTS-SP4:bpftool-debuginfo-5.10.0-224.0.0.123.oe2203sp4.x86_64",
					"openEuler-22.03-LTS-SP4:kernel-5.10.0-224.0.0.123.oe2203sp4.x86_64",
					"openEuler-22.03-LTS-SP4:kernel-debuginfo-5.10.0-224.0.0.123.oe2203sp4.x86_64",
					"openEuler-22.03-LTS-SP4:kernel-debugsource-5.10.0-224.0.0.123.oe2203sp4.x86_64",
					"openEuler-22.03-LTS-SP4:kernel-devel-5.10.0-224.0.0.123.oe2203sp4.x86_64",
					"openEuler-22.03-LTS-SP4:kernel-headers-5.10.0-224.0.0.123.oe2203sp4.x86_64",
					"openEuler-22.03-LTS-SP4:kernel-source-5.10.0-224.0.0.123.oe2203sp4.x86_64",
					"openEuler-22.03-LTS-SP4:kernel-tools-5.10.0-224.0.0.123.oe2203sp4.x86_64",
					"openEuler-22.03-LTS-SP4:kernel-tools-debuginfo-5.10.0-224.0.0.123.oe2203sp4.x86_64",
					"openEuler-22.03-LTS-SP4:kernel-tools-devel-5.10.0-224.0.0.123.oe2203sp4.x86_64",
					"openEuler-22.03-LTS-SP4:perf-5.10.0-224.0.0.123.oe2203sp4.x86_64",
					"openEuler-22.03-LTS-SP4:perf-debuginfo-5.10.0-224.0.0.123.oe2203sp4.x86_64",
					"openEuler-22.03-LTS-SP4:python3-perf-5.10.0-224.0.0.123.oe2203sp4.x86_64",
					"openEuler-22.03-LTS-SP4:python3-perf-debuginfo-5.10.0-224.0.0.123.oe2203sp4.x86_64",
					"openEuler-22.03-LTS-SP4:kernel-5.10.0-224.0.0.123.oe2203sp4.src"
				]
			},
			"remediations":[
				{
					"product_ids":[
						"openEuler-22.03-LTS-SP4:bpftool-5.10.0-224.0.0.123.oe2203sp4.aarch64",
						"openEuler-22.03-LTS-SP4:bpftool-debuginfo-5.10.0-224.0.0.123.oe2203sp4.aarch64",
						"openEuler-22.03-LTS-SP4:kernel-5.10.0-224.0.0.123.oe2203sp4.aarch64",
						"openEuler-22.03-LTS-SP4:kernel-debuginfo-5.10.0-224.0.0.123.oe2203sp4.aarch64",
						"openEuler-22.03-LTS-SP4:kernel-debugsource-5.10.0-224.0.0.123.oe2203sp4.aarch64",
						"openEuler-22.03-LTS-SP4:kernel-devel-5.10.0-224.0.0.123.oe2203sp4.aarch64",
						"openEuler-22.03-LTS-SP4:kernel-headers-5.10.0-224.0.0.123.oe2203sp4.aarch64",
						"openEuler-22.03-LTS-SP4:kernel-source-5.10.0-224.0.0.123.oe2203sp4.aarch64",
						"openEuler-22.03-LTS-SP4:kernel-tools-5.10.0-224.0.0.123.oe2203sp4.aarch64",
						"openEuler-22.03-LTS-SP4:kernel-tools-debuginfo-5.10.0-224.0.0.123.oe2203sp4.aarch64",
						"openEuler-22.03-LTS-SP4:kernel-tools-devel-5.10.0-224.0.0.123.oe2203sp4.aarch64",
						"openEuler-22.03-LTS-SP4:perf-5.10.0-224.0.0.123.oe2203sp4.aarch64",
						"openEuler-22.03-LTS-SP4:perf-debuginfo-5.10.0-224.0.0.123.oe2203sp4.aarch64",
						"openEuler-22.03-LTS-SP4:python3-perf-5.10.0-224.0.0.123.oe2203sp4.aarch64",
						"openEuler-22.03-LTS-SP4:python3-perf-debuginfo-5.10.0-224.0.0.123.oe2203sp4.aarch64",
						"openEuler-22.03-LTS-SP4:bpftool-5.10.0-224.0.0.123.oe2203sp4.x86_64",
						"openEuler-22.03-LTS-SP4:bpftool-debuginfo-5.10.0-224.0.0.123.oe2203sp4.x86_64",
						"openEuler-22.03-LTS-SP4:kernel-5.10.0-224.0.0.123.oe2203sp4.x86_64",
						"openEuler-22.03-LTS-SP4:kernel-debuginfo-5.10.0-224.0.0.123.oe2203sp4.x86_64",
						"openEuler-22.03-LTS-SP4:kernel-debugsource-5.10.0-224.0.0.123.oe2203sp4.x86_64",
						"openEuler-22.03-LTS-SP4:kernel-devel-5.10.0-224.0.0.123.oe2203sp4.x86_64",
						"openEuler-22.03-LTS-SP4:kernel-headers-5.10.0-224.0.0.123.oe2203sp4.x86_64",
						"openEuler-22.03-LTS-SP4:kernel-source-5.10.0-224.0.0.123.oe2203sp4.x86_64",
						"openEuler-22.03-LTS-SP4:kernel-tools-5.10.0-224.0.0.123.oe2203sp4.x86_64",
						"openEuler-22.03-LTS-SP4:kernel-tools-debuginfo-5.10.0-224.0.0.123.oe2203sp4.x86_64",
						"openEuler-22.03-LTS-SP4:kernel-tools-devel-5.10.0-224.0.0.123.oe2203sp4.x86_64",
						"openEuler-22.03-LTS-SP4:perf-5.10.0-224.0.0.123.oe2203sp4.x86_64",
						"openEuler-22.03-LTS-SP4:perf-debuginfo-5.10.0-224.0.0.123.oe2203sp4.x86_64",
						"openEuler-22.03-LTS-SP4:python3-perf-5.10.0-224.0.0.123.oe2203sp4.x86_64",
						"openEuler-22.03-LTS-SP4:python3-perf-debuginfo-5.10.0-224.0.0.123.oe2203sp4.x86_64",
						"openEuler-22.03-LTS-SP4:kernel-5.10.0-224.0.0.123.oe2203sp4.src"
					],
					"details":"kernel security update",
					"category":"vendor_fix",
					"url":"https://www.openeuler.org/zh/security/security-bulletins/detail/?id=openEuler-SA-2024-2028"
				}
			],
			"scores":[
				{
					"cvss_v3":{
						"baseSeverity":"MEDIUM",
						"baseScore":5.5,
						"vectorString":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
						"version":"3.1"
					},
					"products":[
						"openEuler-22.03-LTS-SP4:bpftool-5.10.0-224.0.0.123.oe2203sp4.aarch64",
						"openEuler-22.03-LTS-SP4:bpftool-debuginfo-5.10.0-224.0.0.123.oe2203sp4.aarch64",
						"openEuler-22.03-LTS-SP4:kernel-5.10.0-224.0.0.123.oe2203sp4.aarch64",
						"openEuler-22.03-LTS-SP4:kernel-debuginfo-5.10.0-224.0.0.123.oe2203sp4.aarch64",
						"openEuler-22.03-LTS-SP4:kernel-debugsource-5.10.0-224.0.0.123.oe2203sp4.aarch64",
						"openEuler-22.03-LTS-SP4:kernel-devel-5.10.0-224.0.0.123.oe2203sp4.aarch64",
						"openEuler-22.03-LTS-SP4:kernel-headers-5.10.0-224.0.0.123.oe2203sp4.aarch64",
						"openEuler-22.03-LTS-SP4:kernel-source-5.10.0-224.0.0.123.oe2203sp4.aarch64",
						"openEuler-22.03-LTS-SP4:kernel-tools-5.10.0-224.0.0.123.oe2203sp4.aarch64",
						"openEuler-22.03-LTS-SP4:kernel-tools-debuginfo-5.10.0-224.0.0.123.oe2203sp4.aarch64",
						"openEuler-22.03-LTS-SP4:kernel-tools-devel-5.10.0-224.0.0.123.oe2203sp4.aarch64",
						"openEuler-22.03-LTS-SP4:perf-5.10.0-224.0.0.123.oe2203sp4.aarch64",
						"openEuler-22.03-LTS-SP4:perf-debuginfo-5.10.0-224.0.0.123.oe2203sp4.aarch64",
						"openEuler-22.03-LTS-SP4:python3-perf-5.10.0-224.0.0.123.oe2203sp4.aarch64",
						"openEuler-22.03-LTS-SP4:python3-perf-debuginfo-5.10.0-224.0.0.123.oe2203sp4.aarch64",
						"openEuler-22.03-LTS-SP4:bpftool-5.10.0-224.0.0.123.oe2203sp4.x86_64",
						"openEuler-22.03-LTS-SP4:bpftool-debuginfo-5.10.0-224.0.0.123.oe2203sp4.x86_64",
						"openEuler-22.03-LTS-SP4:kernel-5.10.0-224.0.0.123.oe2203sp4.x86_64",
						"openEuler-22.03-LTS-SP4:kernel-debuginfo-5.10.0-224.0.0.123.oe2203sp4.x86_64",
						"openEuler-22.03-LTS-SP4:kernel-debugsource-5.10.0-224.0.0.123.oe2203sp4.x86_64",
						"openEuler-22.03-LTS-SP4:kernel-devel-5.10.0-224.0.0.123.oe2203sp4.x86_64",
						"openEuler-22.03-LTS-SP4:kernel-headers-5.10.0-224.0.0.123.oe2203sp4.x86_64",
						"openEuler-22.03-LTS-SP4:kernel-source-5.10.0-224.0.0.123.oe2203sp4.x86_64",
						"openEuler-22.03-LTS-SP4:kernel-tools-5.10.0-224.0.0.123.oe2203sp4.x86_64",
						"openEuler-22.03-LTS-SP4:kernel-tools-debuginfo-5.10.0-224.0.0.123.oe2203sp4.x86_64",
						"openEuler-22.03-LTS-SP4:kernel-tools-devel-5.10.0-224.0.0.123.oe2203sp4.x86_64",
						"openEuler-22.03-LTS-SP4:perf-5.10.0-224.0.0.123.oe2203sp4.x86_64",
						"openEuler-22.03-LTS-SP4:perf-debuginfo-5.10.0-224.0.0.123.oe2203sp4.x86_64",
						"openEuler-22.03-LTS-SP4:python3-perf-5.10.0-224.0.0.123.oe2203sp4.x86_64",
						"openEuler-22.03-LTS-SP4:python3-perf-debuginfo-5.10.0-224.0.0.123.oe2203sp4.x86_64",
						"openEuler-22.03-LTS-SP4:kernel-5.10.0-224.0.0.123.oe2203sp4.src"
					]
				}
			],
			"threats":[
				{
					"details":"Medium",
					"category":"impact"
				}
			],
			"title":"CVE-2024-33621"
		},
		{
			"cve":"CVE-2024-34777",
			"notes":[
				{
					"text":"In the Linux kernel, the following vulnerability has been resolved:\n\ndma-mapping: benchmark: fix node id validation\n\nWhile validating node ids in map_benchmark_ioctl(), node_possible() may\nbe provided with invalid argument outside of [0,MAX_NUMNODES-1] range\nleading to:\n\nBUG: KASAN: wild-memory-access in map_benchmark_ioctl (kernel/dma/map_benchmark.c:214)\nRead of size 8 at addr 1fffffff8ccb6398 by task dma_map_benchma/971\nCPU: 7 PID: 971 Comm: dma_map_benchma Not tainted 6.9.0-rc6 #37\nHardware name: QEMU Standard PC (i440FX + PIIX, 1996)\nCall Trace:\n <TASK>\ndump_stack_lvl (lib/dump_stack.c:117)\nkasan_report (mm/kasan/report.c:603)\nkasan_check_range (mm/kasan/generic.c:189)\nvariable_test_bit (arch/x86/include/asm/bitops.h:227) [inline]\narch_test_bit (arch/x86/include/asm/bitops.h:239) [inline]\n_test_bit at (include/asm-generic/bitops/instrumented-non-atomic.h:142) [inline]\nnode_state (include/linux/nodemask.h:423) [inline]\nmap_benchmark_ioctl (kernel/dma/map_benchmark.c:214)\nfull_proxy_unlocked_ioctl (fs/debugfs/file.c:333)\n__x64_sys_ioctl (fs/ioctl.c:890)\ndo_syscall_64 (arch/x86/entry/common.c:83)\nentry_SYSCALL_64_after_hwframe (arch/x86/entry/entry_64.S:130)\n\nCompare node ids with sane bounds first. NUMA_NO_NODE is considered a\nspecial valid case meaning that benchmarking kthreads won't be bound to a\ncpuset of a given node.\n\nFound by Linux Verification Center (linuxtesting.org).",
					"category":"description",
					"title":"Vulnerability Description"
				}
			],
			"product_status":{
				"fixed":[
					"openEuler-22.03-LTS-SP4:bpftool-5.10.0-224.0.0.123.oe2203sp4.aarch64",
					"openEuler-22.03-LTS-SP4:bpftool-debuginfo-5.10.0-224.0.0.123.oe2203sp4.aarch64",
					"openEuler-22.03-LTS-SP4:kernel-5.10.0-224.0.0.123.oe2203sp4.aarch64",
					"openEuler-22.03-LTS-SP4:kernel-debuginfo-5.10.0-224.0.0.123.oe2203sp4.aarch64",
					"openEuler-22.03-LTS-SP4:kernel-debugsource-5.10.0-224.0.0.123.oe2203sp4.aarch64",
					"openEuler-22.03-LTS-SP4:kernel-devel-5.10.0-224.0.0.123.oe2203sp4.aarch64",
					"openEuler-22.03-LTS-SP4:kernel-headers-5.10.0-224.0.0.123.oe2203sp4.aarch64",
					"openEuler-22.03-LTS-SP4:kernel-source-5.10.0-224.0.0.123.oe2203sp4.aarch64",
					"openEuler-22.03-LTS-SP4:kernel-tools-5.10.0-224.0.0.123.oe2203sp4.aarch64",
					"openEuler-22.03-LTS-SP4:kernel-tools-debuginfo-5.10.0-224.0.0.123.oe2203sp4.aarch64",
					"openEuler-22.03-LTS-SP4:kernel-tools-devel-5.10.0-224.0.0.123.oe2203sp4.aarch64",
					"openEuler-22.03-LTS-SP4:perf-5.10.0-224.0.0.123.oe2203sp4.aarch64",
					"openEuler-22.03-LTS-SP4:perf-debuginfo-5.10.0-224.0.0.123.oe2203sp4.aarch64",
					"openEuler-22.03-LTS-SP4:python3-perf-5.10.0-224.0.0.123.oe2203sp4.aarch64",
					"openEuler-22.03-LTS-SP4:python3-perf-debuginfo-5.10.0-224.0.0.123.oe2203sp4.aarch64",
					"openEuler-22.03-LTS-SP4:bpftool-5.10.0-224.0.0.123.oe2203sp4.x86_64",
					"openEuler-22.03-LTS-SP4:bpftool-debuginfo-5.10.0-224.0.0.123.oe2203sp4.x86_64",
					"openEuler-22.03-LTS-SP4:kernel-5.10.0-224.0.0.123.oe2203sp4.x86_64",
					"openEuler-22.03-LTS-SP4:kernel-debuginfo-5.10.0-224.0.0.123.oe2203sp4.x86_64",
					"openEuler-22.03-LTS-SP4:kernel-debugsource-5.10.0-224.0.0.123.oe2203sp4.x86_64",
					"openEuler-22.03-LTS-SP4:kernel-devel-5.10.0-224.0.0.123.oe2203sp4.x86_64",
					"openEuler-22.03-LTS-SP4:kernel-headers-5.10.0-224.0.0.123.oe2203sp4.x86_64",
					"openEuler-22.03-LTS-SP4:kernel-source-5.10.0-224.0.0.123.oe2203sp4.x86_64",
					"openEuler-22.03-LTS-SP4:kernel-tools-5.10.0-224.0.0.123.oe2203sp4.x86_64",
					"openEuler-22.03-LTS-SP4:kernel-tools-debuginfo-5.10.0-224.0.0.123.oe2203sp4.x86_64",
					"openEuler-22.03-LTS-SP4:kernel-tools-devel-5.10.0-224.0.0.123.oe2203sp4.x86_64",
					"openEuler-22.03-LTS-SP4:perf-5.10.0-224.0.0.123.oe2203sp4.x86_64",
					"openEuler-22.03-LTS-SP4:perf-debuginfo-5.10.0-224.0.0.123.oe2203sp4.x86_64",
					"openEuler-22.03-LTS-SP4:python3-perf-5.10.0-224.0.0.123.oe2203sp4.x86_64",
					"openEuler-22.03-LTS-SP4:python3-perf-debuginfo-5.10.0-224.0.0.123.oe2203sp4.x86_64",
					"openEuler-22.03-LTS-SP4:kernel-5.10.0-224.0.0.123.oe2203sp4.src"
				]
			},
			"remediations":[
				{
					"product_ids":[
						"openEuler-22.03-LTS-SP4:bpftool-5.10.0-224.0.0.123.oe2203sp4.aarch64",
						"openEuler-22.03-LTS-SP4:bpftool-debuginfo-5.10.0-224.0.0.123.oe2203sp4.aarch64",
						"openEuler-22.03-LTS-SP4:kernel-5.10.0-224.0.0.123.oe2203sp4.aarch64",
						"openEuler-22.03-LTS-SP4:kernel-debuginfo-5.10.0-224.0.0.123.oe2203sp4.aarch64",
						"openEuler-22.03-LTS-SP4:kernel-debugsource-5.10.0-224.0.0.123.oe2203sp4.aarch64",
						"openEuler-22.03-LTS-SP4:kernel-devel-5.10.0-224.0.0.123.oe2203sp4.aarch64",
						"openEuler-22.03-LTS-SP4:kernel-headers-5.10.0-224.0.0.123.oe2203sp4.aarch64",
						"openEuler-22.03-LTS-SP4:kernel-source-5.10.0-224.0.0.123.oe2203sp4.aarch64",
						"openEuler-22.03-LTS-SP4:kernel-tools-5.10.0-224.0.0.123.oe2203sp4.aarch64",
						"openEuler-22.03-LTS-SP4:kernel-tools-debuginfo-5.10.0-224.0.0.123.oe2203sp4.aarch64",
						"openEuler-22.03-LTS-SP4:kernel-tools-devel-5.10.0-224.0.0.123.oe2203sp4.aarch64",
						"openEuler-22.03-LTS-SP4:perf-5.10.0-224.0.0.123.oe2203sp4.aarch64",
						"openEuler-22.03-LTS-SP4:perf-debuginfo-5.10.0-224.0.0.123.oe2203sp4.aarch64",
						"openEuler-22.03-LTS-SP4:python3-perf-5.10.0-224.0.0.123.oe2203sp4.aarch64",
						"openEuler-22.03-LTS-SP4:python3-perf-debuginfo-5.10.0-224.0.0.123.oe2203sp4.aarch64",
						"openEuler-22.03-LTS-SP4:bpftool-5.10.0-224.0.0.123.oe2203sp4.x86_64",
						"openEuler-22.03-LTS-SP4:bpftool-debuginfo-5.10.0-224.0.0.123.oe2203sp4.x86_64",
						"openEuler-22.03-LTS-SP4:kernel-5.10.0-224.0.0.123.oe2203sp4.x86_64",
						"openEuler-22.03-LTS-SP4:kernel-debuginfo-5.10.0-224.0.0.123.oe2203sp4.x86_64",
						"openEuler-22.03-LTS-SP4:kernel-debugsource-5.10.0-224.0.0.123.oe2203sp4.x86_64",
						"openEuler-22.03-LTS-SP4:kernel-devel-5.10.0-224.0.0.123.oe2203sp4.x86_64",
						"openEuler-22.03-LTS-SP4:kernel-headers-5.10.0-224.0.0.123.oe2203sp4.x86_64",
						"openEuler-22.03-LTS-SP4:kernel-source-5.10.0-224.0.0.123.oe2203sp4.x86_64",
						"openEuler-22.03-LTS-SP4:kernel-tools-5.10.0-224.0.0.123.oe2203sp4.x86_64",
						"openEuler-22.03-LTS-SP4:kernel-tools-debuginfo-5.10.0-224.0.0.123.oe2203sp4.x86_64",
						"openEuler-22.03-LTS-SP4:kernel-tools-devel-5.10.0-224.0.0.123.oe2203sp4.x86_64",
						"openEuler-22.03-LTS-SP4:perf-5.10.0-224.0.0.123.oe2203sp4.x86_64",
						"openEuler-22.03-LTS-SP4:perf-debuginfo-5.10.0-224.0.0.123.oe2203sp4.x86_64",
						"openEuler-22.03-LTS-SP4:python3-perf-5.10.0-224.0.0.123.oe2203sp4.x86_64",
						"openEuler-22.03-LTS-SP4:python3-perf-debuginfo-5.10.0-224.0.0.123.oe2203sp4.x86_64",
						"openEuler-22.03-LTS-SP4:kernel-5.10.0-224.0.0.123.oe2203sp4.src"
					],
					"details":"kernel security update",
					"category":"vendor_fix",
					"url":"https://www.openeuler.org/zh/security/security-bulletins/detail/?id=openEuler-SA-2024-2028"
				}
			],
			"scores":[
				{
					"cvss_v3":{
						"baseSeverity":"MEDIUM",
						"baseScore":6.1,
						"vectorString":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H",
						"version":"3.1"
					},
					"products":[
						"openEuler-22.03-LTS-SP4:bpftool-5.10.0-224.0.0.123.oe2203sp4.aarch64",
						"openEuler-22.03-LTS-SP4:bpftool-debuginfo-5.10.0-224.0.0.123.oe2203sp4.aarch64",
						"openEuler-22.03-LTS-SP4:kernel-5.10.0-224.0.0.123.oe2203sp4.aarch64",
						"openEuler-22.03-LTS-SP4:kernel-debuginfo-5.10.0-224.0.0.123.oe2203sp4.aarch64",
						"openEuler-22.03-LTS-SP4:kernel-debugsource-5.10.0-224.0.0.123.oe2203sp4.aarch64",
						"openEuler-22.03-LTS-SP4:kernel-devel-5.10.0-224.0.0.123.oe2203sp4.aarch64",
						"openEuler-22.03-LTS-SP4:kernel-headers-5.10.0-224.0.0.123.oe2203sp4.aarch64",
						"openEuler-22.03-LTS-SP4:kernel-source-5.10.0-224.0.0.123.oe2203sp4.aarch64",
						"openEuler-22.03-LTS-SP4:kernel-tools-5.10.0-224.0.0.123.oe2203sp4.aarch64",
						"openEuler-22.03-LTS-SP4:kernel-tools-debuginfo-5.10.0-224.0.0.123.oe2203sp4.aarch64",
						"openEuler-22.03-LTS-SP4:kernel-tools-devel-5.10.0-224.0.0.123.oe2203sp4.aarch64",
						"openEuler-22.03-LTS-SP4:perf-5.10.0-224.0.0.123.oe2203sp4.aarch64",
						"openEuler-22.03-LTS-SP4:perf-debuginfo-5.10.0-224.0.0.123.oe2203sp4.aarch64",
						"openEuler-22.03-LTS-SP4:python3-perf-5.10.0-224.0.0.123.oe2203sp4.aarch64",
						"openEuler-22.03-LTS-SP4:python3-perf-debuginfo-5.10.0-224.0.0.123.oe2203sp4.aarch64",
						"openEuler-22.03-LTS-SP4:bpftool-5.10.0-224.0.0.123.oe2203sp4.x86_64",
						"openEuler-22.03-LTS-SP4:bpftool-debuginfo-5.10.0-224.0.0.123.oe2203sp4.x86_64",
						"openEuler-22.03-LTS-SP4:kernel-5.10.0-224.0.0.123.oe2203sp4.x86_64",
						"openEuler-22.03-LTS-SP4:kernel-debuginfo-5.10.0-224.0.0.123.oe2203sp4.x86_64",
						"openEuler-22.03-LTS-SP4:kernel-debugsource-5.10.0-224.0.0.123.oe2203sp4.x86_64",
						"openEuler-22.03-LTS-SP4:kernel-devel-5.10.0-224.0.0.123.oe2203sp4.x86_64",
						"openEuler-22.03-LTS-SP4:kernel-headers-5.10.0-224.0.0.123.oe2203sp4.x86_64",
						"openEuler-22.03-LTS-SP4:kernel-source-5.10.0-224.0.0.123.oe2203sp4.x86_64",
						"openEuler-22.03-LTS-SP4:kernel-tools-5.10.0-224.0.0.123.oe2203sp4.x86_64",
						"openEuler-22.03-LTS-SP4:kernel-tools-debuginfo-5.10.0-224.0.0.123.oe2203sp4.x86_64",
						"openEuler-22.03-LTS-SP4:kernel-tools-devel-5.10.0-224.0.0.123.oe2203sp4.x86_64",
						"openEuler-22.03-LTS-SP4:perf-5.10.0-224.0.0.123.oe2203sp4.x86_64",
						"openEuler-22.03-LTS-SP4:perf-debuginfo-5.10.0-224.0.0.123.oe2203sp4.x86_64",
						"openEuler-22.03-LTS-SP4:python3-perf-5.10.0-224.0.0.123.oe2203sp4.x86_64",
						"openEuler-22.03-LTS-SP4:python3-perf-debuginfo-5.10.0-224.0.0.123.oe2203sp4.x86_64",
						"openEuler-22.03-LTS-SP4:kernel-5.10.0-224.0.0.123.oe2203sp4.src"
					]
				}
			],
			"threats":[
				{
					"details":"Medium",
					"category":"impact"
				}
			],
			"title":"CVE-2024-34777"
		},
		{
			"cve":"CVE-2024-38544",
			"notes":[
				{
					"text":"In the Linux kernel, the following vulnerability has been resolved:\n\nRDMA/rxe: Fix seg fault in rxe_comp_queue_pkt\n\nIn rxe_comp_queue_pkt() an incoming response packet skb is enqueued to the\nresp_pkts queue and then a decision is made whether to run the completer\ntask inline or schedule it. Finally the skb is dereferenced to bump a 'hw'\nperformance counter. This is wrong because if the completer task is\nalready running in a separate thread it may have already processed the skb\nand freed it which can cause a seg fault.  This has been observed\ninfrequently in testing at high scale.\n\nThis patch fixes this by changing the order of enqueuing the packet until\nafter the counter is accessed.",
					"category":"description",
					"title":"Vulnerability Description"
				}
			],
			"product_status":{
				"fixed":[
					"openEuler-22.03-LTS-SP4:bpftool-5.10.0-224.0.0.123.oe2203sp4.aarch64",
					"openEuler-22.03-LTS-SP4:bpftool-debuginfo-5.10.0-224.0.0.123.oe2203sp4.aarch64",
					"openEuler-22.03-LTS-SP4:kernel-5.10.0-224.0.0.123.oe2203sp4.aarch64",
					"openEuler-22.03-LTS-SP4:kernel-debuginfo-5.10.0-224.0.0.123.oe2203sp4.aarch64",
					"openEuler-22.03-LTS-SP4:kernel-debugsource-5.10.0-224.0.0.123.oe2203sp4.aarch64",
					"openEuler-22.03-LTS-SP4:kernel-devel-5.10.0-224.0.0.123.oe2203sp4.aarch64",
					"openEuler-22.03-LTS-SP4:kernel-headers-5.10.0-224.0.0.123.oe2203sp4.aarch64",
					"openEuler-22.03-LTS-SP4:kernel-source-5.10.0-224.0.0.123.oe2203sp4.aarch64",
					"openEuler-22.03-LTS-SP4:kernel-tools-5.10.0-224.0.0.123.oe2203sp4.aarch64",
					"openEuler-22.03-LTS-SP4:kernel-tools-debuginfo-5.10.0-224.0.0.123.oe2203sp4.aarch64",
					"openEuler-22.03-LTS-SP4:kernel-tools-devel-5.10.0-224.0.0.123.oe2203sp4.aarch64",
					"openEuler-22.03-LTS-SP4:perf-5.10.0-224.0.0.123.oe2203sp4.aarch64",
					"openEuler-22.03-LTS-SP4:perf-debuginfo-5.10.0-224.0.0.123.oe2203sp4.aarch64",
					"openEuler-22.03-LTS-SP4:python3-perf-5.10.0-224.0.0.123.oe2203sp4.aarch64",
					"openEuler-22.03-LTS-SP4:python3-perf-debuginfo-5.10.0-224.0.0.123.oe2203sp4.aarch64",
					"openEuler-22.03-LTS-SP4:bpftool-5.10.0-224.0.0.123.oe2203sp4.x86_64",
					"openEuler-22.03-LTS-SP4:bpftool-debuginfo-5.10.0-224.0.0.123.oe2203sp4.x86_64",
					"openEuler-22.03-LTS-SP4:kernel-5.10.0-224.0.0.123.oe2203sp4.x86_64",
					"openEuler-22.03-LTS-SP4:kernel-debuginfo-5.10.0-224.0.0.123.oe2203sp4.x86_64",
					"openEuler-22.03-LTS-SP4:kernel-debugsource-5.10.0-224.0.0.123.oe2203sp4.x86_64",
					"openEuler-22.03-LTS-SP4:kernel-devel-5.10.0-224.0.0.123.oe2203sp4.x86_64",
					"openEuler-22.03-LTS-SP4:kernel-headers-5.10.0-224.0.0.123.oe2203sp4.x86_64",
					"openEuler-22.03-LTS-SP4:kernel-source-5.10.0-224.0.0.123.oe2203sp4.x86_64",
					"openEuler-22.03-LTS-SP4:kernel-tools-5.10.0-224.0.0.123.oe2203sp4.x86_64",
					"openEuler-22.03-LTS-SP4:kernel-tools-debuginfo-5.10.0-224.0.0.123.oe2203sp4.x86_64",
					"openEuler-22.03-LTS-SP4:kernel-tools-devel-5.10.0-224.0.0.123.oe2203sp4.x86_64",
					"openEuler-22.03-LTS-SP4:perf-5.10.0-224.0.0.123.oe2203sp4.x86_64",
					"openEuler-22.03-LTS-SP4:perf-debuginfo-5.10.0-224.0.0.123.oe2203sp4.x86_64",
					"openEuler-22.03-LTS-SP4:python3-perf-5.10.0-224.0.0.123.oe2203sp4.x86_64",
					"openEuler-22.03-LTS-SP4:python3-perf-debuginfo-5.10.0-224.0.0.123.oe2203sp4.x86_64",
					"openEuler-22.03-LTS-SP4:kernel-5.10.0-224.0.0.123.oe2203sp4.src"
				]
			},
			"remediations":[
				{
					"product_ids":[
						"openEuler-22.03-LTS-SP4:bpftool-5.10.0-224.0.0.123.oe2203sp4.aarch64",
						"openEuler-22.03-LTS-SP4:bpftool-debuginfo-5.10.0-224.0.0.123.oe2203sp4.aarch64",
						"openEuler-22.03-LTS-SP4:kernel-5.10.0-224.0.0.123.oe2203sp4.aarch64",
						"openEuler-22.03-LTS-SP4:kernel-debuginfo-5.10.0-224.0.0.123.oe2203sp4.aarch64",
						"openEuler-22.03-LTS-SP4:kernel-debugsource-5.10.0-224.0.0.123.oe2203sp4.aarch64",
						"openEuler-22.03-LTS-SP4:kernel-devel-5.10.0-224.0.0.123.oe2203sp4.aarch64",
						"openEuler-22.03-LTS-SP4:kernel-headers-5.10.0-224.0.0.123.oe2203sp4.aarch64",
						"openEuler-22.03-LTS-SP4:kernel-source-5.10.0-224.0.0.123.oe2203sp4.aarch64",
						"openEuler-22.03-LTS-SP4:kernel-tools-5.10.0-224.0.0.123.oe2203sp4.aarch64",
						"openEuler-22.03-LTS-SP4:kernel-tools-debuginfo-5.10.0-224.0.0.123.oe2203sp4.aarch64",
						"openEuler-22.03-LTS-SP4:kernel-tools-devel-5.10.0-224.0.0.123.oe2203sp4.aarch64",
						"openEuler-22.03-LTS-SP4:perf-5.10.0-224.0.0.123.oe2203sp4.aarch64",
						"openEuler-22.03-LTS-SP4:perf-debuginfo-5.10.0-224.0.0.123.oe2203sp4.aarch64",
						"openEuler-22.03-LTS-SP4:python3-perf-5.10.0-224.0.0.123.oe2203sp4.aarch64",
						"openEuler-22.03-LTS-SP4:python3-perf-debuginfo-5.10.0-224.0.0.123.oe2203sp4.aarch64",
						"openEuler-22.03-LTS-SP4:bpftool-5.10.0-224.0.0.123.oe2203sp4.x86_64",
						"openEuler-22.03-LTS-SP4:bpftool-debuginfo-5.10.0-224.0.0.123.oe2203sp4.x86_64",
						"openEuler-22.03-LTS-SP4:kernel-5.10.0-224.0.0.123.oe2203sp4.x86_64",
						"openEuler-22.03-LTS-SP4:kernel-debuginfo-5.10.0-224.0.0.123.oe2203sp4.x86_64",
						"openEuler-22.03-LTS-SP4:kernel-debugsource-5.10.0-224.0.0.123.oe2203sp4.x86_64",
						"openEuler-22.03-LTS-SP4:kernel-devel-5.10.0-224.0.0.123.oe2203sp4.x86_64",
						"openEuler-22.03-LTS-SP4:kernel-headers-5.10.0-224.0.0.123.oe2203sp4.x86_64",
						"openEuler-22.03-LTS-SP4:kernel-source-5.10.0-224.0.0.123.oe2203sp4.x86_64",
						"openEuler-22.03-LTS-SP4:kernel-tools-5.10.0-224.0.0.123.oe2203sp4.x86_64",
						"openEuler-22.03-LTS-SP4:kernel-tools-debuginfo-5.10.0-224.0.0.123.oe2203sp4.x86_64",
						"openEuler-22.03-LTS-SP4:kernel-tools-devel-5.10.0-224.0.0.123.oe2203sp4.x86_64",
						"openEuler-22.03-LTS-SP4:perf-5.10.0-224.0.0.123.oe2203sp4.x86_64",
						"openEuler-22.03-LTS-SP4:perf-debuginfo-5.10.0-224.0.0.123.oe2203sp4.x86_64",
						"openEuler-22.03-LTS-SP4:python3-perf-5.10.0-224.0.0.123.oe2203sp4.x86_64",
						"openEuler-22.03-LTS-SP4:python3-perf-debuginfo-5.10.0-224.0.0.123.oe2203sp4.x86_64",
						"openEuler-22.03-LTS-SP4:kernel-5.10.0-224.0.0.123.oe2203sp4.src"
					],
					"details":"kernel security update",
					"category":"vendor_fix",
					"url":"https://www.openeuler.org/zh/security/security-bulletins/detail/?id=openEuler-SA-2024-2028"
				}
			],
			"scores":[
				{
					"cvss_v3":{
						"baseSeverity":"MEDIUM",
						"baseScore":4.7,
						"vectorString":"CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H",
						"version":"3.1"
					},
					"products":[
						"openEuler-22.03-LTS-SP4:bpftool-5.10.0-224.0.0.123.oe2203sp4.aarch64",
						"openEuler-22.03-LTS-SP4:bpftool-debuginfo-5.10.0-224.0.0.123.oe2203sp4.aarch64",
						"openEuler-22.03-LTS-SP4:kernel-5.10.0-224.0.0.123.oe2203sp4.aarch64",
						"openEuler-22.03-LTS-SP4:kernel-debuginfo-5.10.0-224.0.0.123.oe2203sp4.aarch64",
						"openEuler-22.03-LTS-SP4:kernel-debugsource-5.10.0-224.0.0.123.oe2203sp4.aarch64",
						"openEuler-22.03-LTS-SP4:kernel-devel-5.10.0-224.0.0.123.oe2203sp4.aarch64",
						"openEuler-22.03-LTS-SP4:kernel-headers-5.10.0-224.0.0.123.oe2203sp4.aarch64",
						"openEuler-22.03-LTS-SP4:kernel-source-5.10.0-224.0.0.123.oe2203sp4.aarch64",
						"openEuler-22.03-LTS-SP4:kernel-tools-5.10.0-224.0.0.123.oe2203sp4.aarch64",
						"openEuler-22.03-LTS-SP4:kernel-tools-debuginfo-5.10.0-224.0.0.123.oe2203sp4.aarch64",
						"openEuler-22.03-LTS-SP4:kernel-tools-devel-5.10.0-224.0.0.123.oe2203sp4.aarch64",
						"openEuler-22.03-LTS-SP4:perf-5.10.0-224.0.0.123.oe2203sp4.aarch64",
						"openEuler-22.03-LTS-SP4:perf-debuginfo-5.10.0-224.0.0.123.oe2203sp4.aarch64",
						"openEuler-22.03-LTS-SP4:python3-perf-5.10.0-224.0.0.123.oe2203sp4.aarch64",
						"openEuler-22.03-LTS-SP4:python3-perf-debuginfo-5.10.0-224.0.0.123.oe2203sp4.aarch64",
						"openEuler-22.03-LTS-SP4:bpftool-5.10.0-224.0.0.123.oe2203sp4.x86_64",
						"openEuler-22.03-LTS-SP4:bpftool-debuginfo-5.10.0-224.0.0.123.oe2203sp4.x86_64",
						"openEuler-22.03-LTS-SP4:kernel-5.10.0-224.0.0.123.oe2203sp4.x86_64",
						"openEuler-22.03-LTS-SP4:kernel-debuginfo-5.10.0-224.0.0.123.oe2203sp4.x86_64",
						"openEuler-22.03-LTS-SP4:kernel-debugsource-5.10.0-224.0.0.123.oe2203sp4.x86_64",
						"openEuler-22.03-LTS-SP4:kernel-devel-5.10.0-224.0.0.123.oe2203sp4.x86_64",
						"openEuler-22.03-LTS-SP4:kernel-headers-5.10.0-224.0.0.123.oe2203sp4.x86_64",
						"openEuler-22.03-LTS-SP4:kernel-source-5.10.0-224.0.0.123.oe2203sp4.x86_64",
						"openEuler-22.03-LTS-SP4:kernel-tools-5.10.0-224.0.0.123.oe2203sp4.x86_64",
						"openEuler-22.03-LTS-SP4:kernel-tools-debuginfo-5.10.0-224.0.0.123.oe2203sp4.x86_64",
						"openEuler-22.03-LTS-SP4:kernel-tools-devel-5.10.0-224.0.0.123.oe2203sp4.x86_64",
						"openEuler-22.03-LTS-SP4:perf-5.10.0-224.0.0.123.oe2203sp4.x86_64",
						"openEuler-22.03-LTS-SP4:perf-debuginfo-5.10.0-224.0.0.123.oe2203sp4.x86_64",
						"openEuler-22.03-LTS-SP4:python3-perf-5.10.0-224.0.0.123.oe2203sp4.x86_64",
						"openEuler-22.03-LTS-SP4:python3-perf-debuginfo-5.10.0-224.0.0.123.oe2203sp4.x86_64",
						"openEuler-22.03-LTS-SP4:kernel-5.10.0-224.0.0.123.oe2203sp4.src"
					]
				}
			],
			"threats":[
				{
					"details":"Medium",
					"category":"impact"
				}
			],
			"title":"CVE-2024-38544"
		},
		{
			"cve":"CVE-2024-38565",
			"notes":[
				{
					"text":"In the Linux kernel, the following vulnerability has been resolved:\n\nwifi: ar5523: enable proper endpoint verification\n\nSyzkaller reports [1] hitting a warning about an endpoint in use\nnot having an expected type to it.\n\nFix the issue by checking for the existence of all proper\nendpoints with their according types intact.\n\nSadly, this patch has not been tested on real hardware.\n\n[1] Syzkaller report:\n------------[ cut here ]------------\nusb 1-1: BOGUS urb xfer, pipe 3 != type 1\nWARNING: CPU: 0 PID: 3643 at drivers/usb/core/urb.c:504 usb_submit_urb+0xed6/0x1880 drivers/usb/core/urb.c:504\n...\nCall Trace:\n <TASK>\n ar5523_cmd+0x41b/0x780 drivers/net/wireless/ath/ar5523/ar5523.c:275\n ar5523_cmd_read drivers/net/wireless/ath/ar5523/ar5523.c:302 [inline]\n ar5523_host_available drivers/net/wireless/ath/ar5523/ar5523.c:1376 [inline]\n ar5523_probe+0x14b0/0x1d10 drivers/net/wireless/ath/ar5523/ar5523.c:1655\n usb_probe_interface+0x30f/0x7f0 drivers/usb/core/driver.c:396\n call_driver_probe drivers/base/dd.c:560 [inline]\n really_probe+0x249/0xb90 drivers/base/dd.c:639\n __driver_probe_device+0x1df/0x4d0 drivers/base/dd.c:778\n driver_probe_device+0x4c/0x1a0 drivers/base/dd.c:808\n __device_attach_driver+0x1d4/0x2e0 drivers/base/dd.c:936\n bus_for_each_drv+0x163/0x1e0 drivers/base/bus.c:427\n __device_attach+0x1e4/0x530 drivers/base/dd.c:1008\n bus_probe_device+0x1e8/0x2a0 drivers/base/bus.c:487\n device_add+0xbd9/0x1e90 drivers/base/core.c:3517\n usb_set_configuration+0x101d/0x1900 drivers/usb/core/message.c:2170\n usb_generic_driver_probe+0xbe/0x100 drivers/usb/core/generic.c:238\n usb_probe_device+0xd8/0x2c0 drivers/usb/core/driver.c:293\n call_driver_probe drivers/base/dd.c:560 [inline]\n really_probe+0x249/0xb90 drivers/base/dd.c:639\n __driver_probe_device+0x1df/0x4d0 drivers/base/dd.c:778\n driver_probe_device+0x4c/0x1a0 drivers/base/dd.c:808\n __device_attach_driver+0x1d4/0x2e0 drivers/base/dd.c:936\n bus_for_each_drv+0x163/0x1e0 drivers/base/bus.c:427\n __device_attach+0x1e4/0x530 drivers/base/dd.c:1008\n bus_probe_device+0x1e8/0x2a0 drivers/base/bus.c:487\n device_add+0xbd9/0x1e90 drivers/base/core.c:3517\n usb_new_device.cold+0x685/0x10ad drivers/usb/core/hub.c:2573\n hub_port_connect drivers/usb/core/hub.c:5353 [inline]\n hub_port_connect_change drivers/usb/core/hub.c:5497 [inline]\n port_event drivers/usb/core/hub.c:5653 [inline]\n hub_event+0x26cb/0x45d0 drivers/usb/core/hub.c:5735\n process_one_work+0x9bf/0x1710 kernel/workqueue.c:2289\n worker_thread+0x669/0x1090 kernel/workqueue.c:2436\n kthread+0x2e8/0x3a0 kernel/kthread.c:376\n ret_from_fork+0x1f/0x30 arch/x86/entry/entry_64.S:306\n </TASK>",
					"category":"description",
					"title":"Vulnerability Description"
				}
			],
			"product_status":{
				"fixed":[
					"openEuler-22.03-LTS-SP4:bpftool-5.10.0-224.0.0.123.oe2203sp4.aarch64",
					"openEuler-22.03-LTS-SP4:bpftool-debuginfo-5.10.0-224.0.0.123.oe2203sp4.aarch64",
					"openEuler-22.03-LTS-SP4:kernel-5.10.0-224.0.0.123.oe2203sp4.aarch64",
					"openEuler-22.03-LTS-SP4:kernel-debuginfo-5.10.0-224.0.0.123.oe2203sp4.aarch64",
					"openEuler-22.03-LTS-SP4:kernel-debugsource-5.10.0-224.0.0.123.oe2203sp4.aarch64",
					"openEuler-22.03-LTS-SP4:kernel-devel-5.10.0-224.0.0.123.oe2203sp4.aarch64",
					"openEuler-22.03-LTS-SP4:kernel-headers-5.10.0-224.0.0.123.oe2203sp4.aarch64",
					"openEuler-22.03-LTS-SP4:kernel-source-5.10.0-224.0.0.123.oe2203sp4.aarch64",
					"openEuler-22.03-LTS-SP4:kernel-tools-5.10.0-224.0.0.123.oe2203sp4.aarch64",
					"openEuler-22.03-LTS-SP4:kernel-tools-debuginfo-5.10.0-224.0.0.123.oe2203sp4.aarch64",
					"openEuler-22.03-LTS-SP4:kernel-tools-devel-5.10.0-224.0.0.123.oe2203sp4.aarch64",
					"openEuler-22.03-LTS-SP4:perf-5.10.0-224.0.0.123.oe2203sp4.aarch64",
					"openEuler-22.03-LTS-SP4:perf-debuginfo-5.10.0-224.0.0.123.oe2203sp4.aarch64",
					"openEuler-22.03-LTS-SP4:python3-perf-5.10.0-224.0.0.123.oe2203sp4.aarch64",
					"openEuler-22.03-LTS-SP4:python3-perf-debuginfo-5.10.0-224.0.0.123.oe2203sp4.aarch64",
					"openEuler-22.03-LTS-SP4:bpftool-5.10.0-224.0.0.123.oe2203sp4.x86_64",
					"openEuler-22.03-LTS-SP4:bpftool-debuginfo-5.10.0-224.0.0.123.oe2203sp4.x86_64",
					"openEuler-22.03-LTS-SP4:kernel-5.10.0-224.0.0.123.oe2203sp4.x86_64",
					"openEuler-22.03-LTS-SP4:kernel-debuginfo-5.10.0-224.0.0.123.oe2203sp4.x86_64",
					"openEuler-22.03-LTS-SP4:kernel-debugsource-5.10.0-224.0.0.123.oe2203sp4.x86_64",
					"openEuler-22.03-LTS-SP4:kernel-devel-5.10.0-224.0.0.123.oe2203sp4.x86_64",
					"openEuler-22.03-LTS-SP4:kernel-headers-5.10.0-224.0.0.123.oe2203sp4.x86_64",
					"openEuler-22.03-LTS-SP4:kernel-source-5.10.0-224.0.0.123.oe2203sp4.x86_64",
					"openEuler-22.03-LTS-SP4:kernel-tools-5.10.0-224.0.0.123.oe2203sp4.x86_64",
					"openEuler-22.03-LTS-SP4:kernel-tools-debuginfo-5.10.0-224.0.0.123.oe2203sp4.x86_64",
					"openEuler-22.03-LTS-SP4:kernel-tools-devel-5.10.0-224.0.0.123.oe2203sp4.x86_64",
					"openEuler-22.03-LTS-SP4:perf-5.10.0-224.0.0.123.oe2203sp4.x86_64",
					"openEuler-22.03-LTS-SP4:perf-debuginfo-5.10.0-224.0.0.123.oe2203sp4.x86_64",
					"openEuler-22.03-LTS-SP4:python3-perf-5.10.0-224.0.0.123.oe2203sp4.x86_64",
					"openEuler-22.03-LTS-SP4:python3-perf-debuginfo-5.10.0-224.0.0.123.oe2203sp4.x86_64",
					"openEuler-22.03-LTS-SP4:kernel-5.10.0-224.0.0.123.oe2203sp4.src"
				]
			},
			"remediations":[
				{
					"product_ids":[
						"openEuler-22.03-LTS-SP4:bpftool-5.10.0-224.0.0.123.oe2203sp4.aarch64",
						"openEuler-22.03-LTS-SP4:bpftool-debuginfo-5.10.0-224.0.0.123.oe2203sp4.aarch64",
						"openEuler-22.03-LTS-SP4:kernel-5.10.0-224.0.0.123.oe2203sp4.aarch64",
						"openEuler-22.03-LTS-SP4:kernel-debuginfo-5.10.0-224.0.0.123.oe2203sp4.aarch64",
						"openEuler-22.03-LTS-SP4:kernel-debugsource-5.10.0-224.0.0.123.oe2203sp4.aarch64",
						"openEuler-22.03-LTS-SP4:kernel-devel-5.10.0-224.0.0.123.oe2203sp4.aarch64",
						"openEuler-22.03-LTS-SP4:kernel-headers-5.10.0-224.0.0.123.oe2203sp4.aarch64",
						"openEuler-22.03-LTS-SP4:kernel-source-5.10.0-224.0.0.123.oe2203sp4.aarch64",
						"openEuler-22.03-LTS-SP4:kernel-tools-5.10.0-224.0.0.123.oe2203sp4.aarch64",
						"openEuler-22.03-LTS-SP4:kernel-tools-debuginfo-5.10.0-224.0.0.123.oe2203sp4.aarch64",
						"openEuler-22.03-LTS-SP4:kernel-tools-devel-5.10.0-224.0.0.123.oe2203sp4.aarch64",
						"openEuler-22.03-LTS-SP4:perf-5.10.0-224.0.0.123.oe2203sp4.aarch64",
						"openEuler-22.03-LTS-SP4:perf-debuginfo-5.10.0-224.0.0.123.oe2203sp4.aarch64",
						"openEuler-22.03-LTS-SP4:python3-perf-5.10.0-224.0.0.123.oe2203sp4.aarch64",
						"openEuler-22.03-LTS-SP4:python3-perf-debuginfo-5.10.0-224.0.0.123.oe2203sp4.aarch64",
						"openEuler-22.03-LTS-SP4:bpftool-5.10.0-224.0.0.123.oe2203sp4.x86_64",
						"openEuler-22.03-LTS-SP4:bpftool-debuginfo-5.10.0-224.0.0.123.oe2203sp4.x86_64",
						"openEuler-22.03-LTS-SP4:kernel-5.10.0-224.0.0.123.oe2203sp4.x86_64",
						"openEuler-22.03-LTS-SP4:kernel-debuginfo-5.10.0-224.0.0.123.oe2203sp4.x86_64",
						"openEuler-22.03-LTS-SP4:kernel-debugsource-5.10.0-224.0.0.123.oe2203sp4.x86_64",
						"openEuler-22.03-LTS-SP4:kernel-devel-5.10.0-224.0.0.123.oe2203sp4.x86_64",
						"openEuler-22.03-LTS-SP4:kernel-headers-5.10.0-224.0.0.123.oe2203sp4.x86_64",
						"openEuler-22.03-LTS-SP4:kernel-source-5.10.0-224.0.0.123.oe2203sp4.x86_64",
						"openEuler-22.03-LTS-SP4:kernel-tools-5.10.0-224.0.0.123.oe2203sp4.x86_64",
						"openEuler-22.03-LTS-SP4:kernel-tools-debuginfo-5.10.0-224.0.0.123.oe2203sp4.x86_64",
						"openEuler-22.03-LTS-SP4:kernel-tools-devel-5.10.0-224.0.0.123.oe2203sp4.x86_64",
						"openEuler-22.03-LTS-SP4:perf-5.10.0-224.0.0.123.oe2203sp4.x86_64",
						"openEuler-22.03-LTS-SP4:perf-debuginfo-5.10.0-224.0.0.123.oe2203sp4.x86_64",
						"openEuler-22.03-LTS-SP4:python3-perf-5.10.0-224.0.0.123.oe2203sp4.x86_64",
						"openEuler-22.03-LTS-SP4:python3-perf-debuginfo-5.10.0-224.0.0.123.oe2203sp4.x86_64",
						"openEuler-22.03-LTS-SP4:kernel-5.10.0-224.0.0.123.oe2203sp4.src"
					],
					"details":"kernel security update",
					"category":"vendor_fix",
					"url":"https://www.openeuler.org/zh/security/security-bulletins/detail/?id=openEuler-SA-2024-2028"
				}
			],
			"scores":[
				{
					"cvss_v3":{
						"baseSeverity":"MEDIUM",
						"baseScore":5.7,
						"vectorString":"CVSS:3.1/AV:A/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
						"version":"3.1"
					},
					"products":[
						"openEuler-22.03-LTS-SP4:bpftool-5.10.0-224.0.0.123.oe2203sp4.aarch64",
						"openEuler-22.03-LTS-SP4:bpftool-debuginfo-5.10.0-224.0.0.123.oe2203sp4.aarch64",
						"openEuler-22.03-LTS-SP4:kernel-5.10.0-224.0.0.123.oe2203sp4.aarch64",
						"openEuler-22.03-LTS-SP4:kernel-debuginfo-5.10.0-224.0.0.123.oe2203sp4.aarch64",
						"openEuler-22.03-LTS-SP4:kernel-debugsource-5.10.0-224.0.0.123.oe2203sp4.aarch64",
						"openEuler-22.03-LTS-SP4:kernel-devel-5.10.0-224.0.0.123.oe2203sp4.aarch64",
						"openEuler-22.03-LTS-SP4:kernel-headers-5.10.0-224.0.0.123.oe2203sp4.aarch64",
						"openEuler-22.03-LTS-SP4:kernel-source-5.10.0-224.0.0.123.oe2203sp4.aarch64",
						"openEuler-22.03-LTS-SP4:kernel-tools-5.10.0-224.0.0.123.oe2203sp4.aarch64",
						"openEuler-22.03-LTS-SP4:kernel-tools-debuginfo-5.10.0-224.0.0.123.oe2203sp4.aarch64",
						"openEuler-22.03-LTS-SP4:kernel-tools-devel-5.10.0-224.0.0.123.oe2203sp4.aarch64",
						"openEuler-22.03-LTS-SP4:perf-5.10.0-224.0.0.123.oe2203sp4.aarch64",
						"openEuler-22.03-LTS-SP4:perf-debuginfo-5.10.0-224.0.0.123.oe2203sp4.aarch64",
						"openEuler-22.03-LTS-SP4:python3-perf-5.10.0-224.0.0.123.oe2203sp4.aarch64",
						"openEuler-22.03-LTS-SP4:python3-perf-debuginfo-5.10.0-224.0.0.123.oe2203sp4.aarch64",
						"openEuler-22.03-LTS-SP4:bpftool-5.10.0-224.0.0.123.oe2203sp4.x86_64",
						"openEuler-22.03-LTS-SP4:bpftool-debuginfo-5.10.0-224.0.0.123.oe2203sp4.x86_64",
						"openEuler-22.03-LTS-SP4:kernel-5.10.0-224.0.0.123.oe2203sp4.x86_64",
						"openEuler-22.03-LTS-SP4:kernel-debuginfo-5.10.0-224.0.0.123.oe2203sp4.x86_64",
						"openEuler-22.03-LTS-SP4:kernel-debugsource-5.10.0-224.0.0.123.oe2203sp4.x86_64",
						"openEuler-22.03-LTS-SP4:kernel-devel-5.10.0-224.0.0.123.oe2203sp4.x86_64",
						"openEuler-22.03-LTS-SP4:kernel-headers-5.10.0-224.0.0.123.oe2203sp4.x86_64",
						"openEuler-22.03-LTS-SP4:kernel-source-5.10.0-224.0.0.123.oe2203sp4.x86_64",
						"openEuler-22.03-LTS-SP4:kernel-tools-5.10.0-224.0.0.123.oe2203sp4.x86_64",
						"openEuler-22.03-LTS-SP4:kernel-tools-debuginfo-5.10.0-224.0.0.123.oe2203sp4.x86_64",
						"openEuler-22.03-LTS-SP4:kernel-tools-devel-5.10.0-224.0.0.123.oe2203sp4.x86_64",
						"openEuler-22.03-LTS-SP4:perf-5.10.0-224.0.0.123.oe2203sp4.x86_64",
						"openEuler-22.03-LTS-SP4:perf-debuginfo-5.10.0-224.0.0.123.oe2203sp4.x86_64",
						"openEuler-22.03-LTS-SP4:python3-perf-5.10.0-224.0.0.123.oe2203sp4.x86_64",
						"openEuler-22.03-LTS-SP4:python3-perf-debuginfo-5.10.0-224.0.0.123.oe2203sp4.x86_64",
						"openEuler-22.03-LTS-SP4:kernel-5.10.0-224.0.0.123.oe2203sp4.src"
					]
				}
			],
			"threats":[
				{
					"details":"Medium",
					"category":"impact"
				}
			],
			"title":"CVE-2024-38565"
		},
		{
			"cve":"CVE-2024-38597",
			"notes":[
				{
					"text":"In the Linux kernel, the following vulnerability has been resolved:\n\neth: sungem: remove .ndo_poll_controller to avoid deadlocks\n\nErhard reports netpoll warnings from sungem:\n\n  netpoll_send_skb_on_dev(): eth0 enabled interrupts in poll (gem_start_xmit+0x0/0x398)\n  WARNING: CPU: 1 PID: 1 at net/core/netpoll.c:370 netpoll_send_skb+0x1fc/0x20c\n\ngem_poll_controller() disables interrupts, which may sleep.\nWe can't sleep in netpoll, it has interrupts disabled completely.\nStrangely, gem_poll_controller() doesn't even poll the completions,\nand instead acts as if an interrupt has fired so it just schedules\nNAPI and exits. None of this has been necessary for years, since\nnetpoll invokes NAPI directly.",
					"category":"description",
					"title":"Vulnerability Description"
				}
			],
			"product_status":{
				"fixed":[
					"openEuler-22.03-LTS-SP4:bpftool-5.10.0-224.0.0.123.oe2203sp4.aarch64",
					"openEuler-22.03-LTS-SP4:bpftool-debuginfo-5.10.0-224.0.0.123.oe2203sp4.aarch64",
					"openEuler-22.03-LTS-SP4:kernel-5.10.0-224.0.0.123.oe2203sp4.aarch64",
					"openEuler-22.03-LTS-SP4:kernel-debuginfo-5.10.0-224.0.0.123.oe2203sp4.aarch64",
					"openEuler-22.03-LTS-SP4:kernel-debugsource-5.10.0-224.0.0.123.oe2203sp4.aarch64",
					"openEuler-22.03-LTS-SP4:kernel-devel-5.10.0-224.0.0.123.oe2203sp4.aarch64",
					"openEuler-22.03-LTS-SP4:kernel-headers-5.10.0-224.0.0.123.oe2203sp4.aarch64",
					"openEuler-22.03-LTS-SP4:kernel-source-5.10.0-224.0.0.123.oe2203sp4.aarch64",
					"openEuler-22.03-LTS-SP4:kernel-tools-5.10.0-224.0.0.123.oe2203sp4.aarch64",
					"openEuler-22.03-LTS-SP4:kernel-tools-debuginfo-5.10.0-224.0.0.123.oe2203sp4.aarch64",
					"openEuler-22.03-LTS-SP4:kernel-tools-devel-5.10.0-224.0.0.123.oe2203sp4.aarch64",
					"openEuler-22.03-LTS-SP4:perf-5.10.0-224.0.0.123.oe2203sp4.aarch64",
					"openEuler-22.03-LTS-SP4:perf-debuginfo-5.10.0-224.0.0.123.oe2203sp4.aarch64",
					"openEuler-22.03-LTS-SP4:python3-perf-5.10.0-224.0.0.123.oe2203sp4.aarch64",
					"openEuler-22.03-LTS-SP4:python3-perf-debuginfo-5.10.0-224.0.0.123.oe2203sp4.aarch64",
					"openEuler-22.03-LTS-SP4:bpftool-5.10.0-224.0.0.123.oe2203sp4.x86_64",
					"openEuler-22.03-LTS-SP4:bpftool-debuginfo-5.10.0-224.0.0.123.oe2203sp4.x86_64",
					"openEuler-22.03-LTS-SP4:kernel-5.10.0-224.0.0.123.oe2203sp4.x86_64",
					"openEuler-22.03-LTS-SP4:kernel-debuginfo-5.10.0-224.0.0.123.oe2203sp4.x86_64",
					"openEuler-22.03-LTS-SP4:kernel-debugsource-5.10.0-224.0.0.123.oe2203sp4.x86_64",
					"openEuler-22.03-LTS-SP4:kernel-devel-5.10.0-224.0.0.123.oe2203sp4.x86_64",
					"openEuler-22.03-LTS-SP4:kernel-headers-5.10.0-224.0.0.123.oe2203sp4.x86_64",
					"openEuler-22.03-LTS-SP4:kernel-source-5.10.0-224.0.0.123.oe2203sp4.x86_64",
					"openEuler-22.03-LTS-SP4:kernel-tools-5.10.0-224.0.0.123.oe2203sp4.x86_64",
					"openEuler-22.03-LTS-SP4:kernel-tools-debuginfo-5.10.0-224.0.0.123.oe2203sp4.x86_64",
					"openEuler-22.03-LTS-SP4:kernel-tools-devel-5.10.0-224.0.0.123.oe2203sp4.x86_64",
					"openEuler-22.03-LTS-SP4:perf-5.10.0-224.0.0.123.oe2203sp4.x86_64",
					"openEuler-22.03-LTS-SP4:perf-debuginfo-5.10.0-224.0.0.123.oe2203sp4.x86_64",
					"openEuler-22.03-LTS-SP4:python3-perf-5.10.0-224.0.0.123.oe2203sp4.x86_64",
					"openEuler-22.03-LTS-SP4:python3-perf-debuginfo-5.10.0-224.0.0.123.oe2203sp4.x86_64",
					"openEuler-22.03-LTS-SP4:kernel-5.10.0-224.0.0.123.oe2203sp4.src"
				]
			},
			"remediations":[
				{
					"product_ids":[
						"openEuler-22.03-LTS-SP4:bpftool-5.10.0-224.0.0.123.oe2203sp4.aarch64",
						"openEuler-22.03-LTS-SP4:bpftool-debuginfo-5.10.0-224.0.0.123.oe2203sp4.aarch64",
						"openEuler-22.03-LTS-SP4:kernel-5.10.0-224.0.0.123.oe2203sp4.aarch64",
						"openEuler-22.03-LTS-SP4:kernel-debuginfo-5.10.0-224.0.0.123.oe2203sp4.aarch64",
						"openEuler-22.03-LTS-SP4:kernel-debugsource-5.10.0-224.0.0.123.oe2203sp4.aarch64",
						"openEuler-22.03-LTS-SP4:kernel-devel-5.10.0-224.0.0.123.oe2203sp4.aarch64",
						"openEuler-22.03-LTS-SP4:kernel-headers-5.10.0-224.0.0.123.oe2203sp4.aarch64",
						"openEuler-22.03-LTS-SP4:kernel-source-5.10.0-224.0.0.123.oe2203sp4.aarch64",
						"openEuler-22.03-LTS-SP4:kernel-tools-5.10.0-224.0.0.123.oe2203sp4.aarch64",
						"openEuler-22.03-LTS-SP4:kernel-tools-debuginfo-5.10.0-224.0.0.123.oe2203sp4.aarch64",
						"openEuler-22.03-LTS-SP4:kernel-tools-devel-5.10.0-224.0.0.123.oe2203sp4.aarch64",
						"openEuler-22.03-LTS-SP4:perf-5.10.0-224.0.0.123.oe2203sp4.aarch64",
						"openEuler-22.03-LTS-SP4:perf-debuginfo-5.10.0-224.0.0.123.oe2203sp4.aarch64",
						"openEuler-22.03-LTS-SP4:python3-perf-5.10.0-224.0.0.123.oe2203sp4.aarch64",
						"openEuler-22.03-LTS-SP4:python3-perf-debuginfo-5.10.0-224.0.0.123.oe2203sp4.aarch64",
						"openEuler-22.03-LTS-SP4:bpftool-5.10.0-224.0.0.123.oe2203sp4.x86_64",
						"openEuler-22.03-LTS-SP4:bpftool-debuginfo-5.10.0-224.0.0.123.oe2203sp4.x86_64",
						"openEuler-22.03-LTS-SP4:kernel-5.10.0-224.0.0.123.oe2203sp4.x86_64",
						"openEuler-22.03-LTS-SP4:kernel-debuginfo-5.10.0-224.0.0.123.oe2203sp4.x86_64",
						"openEuler-22.03-LTS-SP4:kernel-debugsource-5.10.0-224.0.0.123.oe2203sp4.x86_64",
						"openEuler-22.03-LTS-SP4:kernel-devel-5.10.0-224.0.0.123.oe2203sp4.x86_64",
						"openEuler-22.03-LTS-SP4:kernel-headers-5.10.0-224.0.0.123.oe2203sp4.x86_64",
						"openEuler-22.03-LTS-SP4:kernel-source-5.10.0-224.0.0.123.oe2203sp4.x86_64",
						"openEuler-22.03-LTS-SP4:kernel-tools-5.10.0-224.0.0.123.oe2203sp4.x86_64",
						"openEuler-22.03-LTS-SP4:kernel-tools-debuginfo-5.10.0-224.0.0.123.oe2203sp4.x86_64",
						"openEuler-22.03-LTS-SP4:kernel-tools-devel-5.10.0-224.0.0.123.oe2203sp4.x86_64",
						"openEuler-22.03-LTS-SP4:perf-5.10.0-224.0.0.123.oe2203sp4.x86_64",
						"openEuler-22.03-LTS-SP4:perf-debuginfo-5.10.0-224.0.0.123.oe2203sp4.x86_64",
						"openEuler-22.03-LTS-SP4:python3-perf-5.10.0-224.0.0.123.oe2203sp4.x86_64",
						"openEuler-22.03-LTS-SP4:python3-perf-debuginfo-5.10.0-224.0.0.123.oe2203sp4.x86_64",
						"openEuler-22.03-LTS-SP4:kernel-5.10.0-224.0.0.123.oe2203sp4.src"
					],
					"details":"kernel security update",
					"category":"vendor_fix",
					"url":"https://www.openeuler.org/zh/security/security-bulletins/detail/?id=openEuler-SA-2024-2028"
				}
			],
			"scores":[
				{
					"cvss_v3":{
						"baseSeverity":"MEDIUM",
						"baseScore":4.4,
						"vectorString":"CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
						"version":"3.1"
					},
					"products":[
						"openEuler-22.03-LTS-SP4:bpftool-5.10.0-224.0.0.123.oe2203sp4.aarch64",
						"openEuler-22.03-LTS-SP4:bpftool-debuginfo-5.10.0-224.0.0.123.oe2203sp4.aarch64",
						"openEuler-22.03-LTS-SP4:kernel-5.10.0-224.0.0.123.oe2203sp4.aarch64",
						"openEuler-22.03-LTS-SP4:kernel-debuginfo-5.10.0-224.0.0.123.oe2203sp4.aarch64",
						"openEuler-22.03-LTS-SP4:kernel-debugsource-5.10.0-224.0.0.123.oe2203sp4.aarch64",
						"openEuler-22.03-LTS-SP4:kernel-devel-5.10.0-224.0.0.123.oe2203sp4.aarch64",
						"openEuler-22.03-LTS-SP4:kernel-headers-5.10.0-224.0.0.123.oe2203sp4.aarch64",
						"openEuler-22.03-LTS-SP4:kernel-source-5.10.0-224.0.0.123.oe2203sp4.aarch64",
						"openEuler-22.03-LTS-SP4:kernel-tools-5.10.0-224.0.0.123.oe2203sp4.aarch64",
						"openEuler-22.03-LTS-SP4:kernel-tools-debuginfo-5.10.0-224.0.0.123.oe2203sp4.aarch64",
						"openEuler-22.03-LTS-SP4:kernel-tools-devel-5.10.0-224.0.0.123.oe2203sp4.aarch64",
						"openEuler-22.03-LTS-SP4:perf-5.10.0-224.0.0.123.oe2203sp4.aarch64",
						"openEuler-22.03-LTS-SP4:perf-debuginfo-5.10.0-224.0.0.123.oe2203sp4.aarch64",
						"openEuler-22.03-LTS-SP4:python3-perf-5.10.0-224.0.0.123.oe2203sp4.aarch64",
						"openEuler-22.03-LTS-SP4:python3-perf-debuginfo-5.10.0-224.0.0.123.oe2203sp4.aarch64",
						"openEuler-22.03-LTS-SP4:bpftool-5.10.0-224.0.0.123.oe2203sp4.x86_64",
						"openEuler-22.03-LTS-SP4:bpftool-debuginfo-5.10.0-224.0.0.123.oe2203sp4.x86_64",
						"openEuler-22.03-LTS-SP4:kernel-5.10.0-224.0.0.123.oe2203sp4.x86_64",
						"openEuler-22.03-LTS-SP4:kernel-debuginfo-5.10.0-224.0.0.123.oe2203sp4.x86_64",
						"openEuler-22.03-LTS-SP4:kernel-debugsource-5.10.0-224.0.0.123.oe2203sp4.x86_64",
						"openEuler-22.03-LTS-SP4:kernel-devel-5.10.0-224.0.0.123.oe2203sp4.x86_64",
						"openEuler-22.03-LTS-SP4:kernel-headers-5.10.0-224.0.0.123.oe2203sp4.x86_64",
						"openEuler-22.03-LTS-SP4:kernel-source-5.10.0-224.0.0.123.oe2203sp4.x86_64",
						"openEuler-22.03-LTS-SP4:kernel-tools-5.10.0-224.0.0.123.oe2203sp4.x86_64",
						"openEuler-22.03-LTS-SP4:kernel-tools-debuginfo-5.10.0-224.0.0.123.oe2203sp4.x86_64",
						"openEuler-22.03-LTS-SP4:kernel-tools-devel-5.10.0-224.0.0.123.oe2203sp4.x86_64",
						"openEuler-22.03-LTS-SP4:perf-5.10.0-224.0.0.123.oe2203sp4.x86_64",
						"openEuler-22.03-LTS-SP4:perf-debuginfo-5.10.0-224.0.0.123.oe2203sp4.x86_64",
						"openEuler-22.03-LTS-SP4:python3-perf-5.10.0-224.0.0.123.oe2203sp4.x86_64",
						"openEuler-22.03-LTS-SP4:python3-perf-debuginfo-5.10.0-224.0.0.123.oe2203sp4.x86_64",
						"openEuler-22.03-LTS-SP4:kernel-5.10.0-224.0.0.123.oe2203sp4.src"
					]
				}
			],
			"threats":[
				{
					"details":"Medium",
					"category":"impact"
				}
			],
			"title":"CVE-2024-38597"
		},
		{
			"cve":"CVE-2024-39276",
			"notes":[
				{
					"text":"In the Linux kernel, the following vulnerability has been resolved:\n\next4: fix mb_cache_entry's e_refcnt leak in ext4_xattr_block_cache_find()\n\nSyzbot reports a warning as follows:\n\n============================================\nWARNING: CPU: 0 PID: 5075 at fs/mbcache.c:419 mb_cache_destroy+0x224/0x290\nModules linked in:\nCPU: 0 PID: 5075 Comm: syz-executor199 Not tainted 6.9.0-rc6-gb947cc5bf6d7\nRIP: 0010:mb_cache_destroy+0x224/0x290 fs/mbcache.c:419\nCall Trace:\n <TASK>\n ext4_put_super+0x6d4/0xcd0 fs/ext4/super.c:1375\n generic_shutdown_super+0x136/0x2d0 fs/super.c:641\n kill_block_super+0x44/0x90 fs/super.c:1675\n ext4_kill_sb+0x68/0xa0 fs/ext4/super.c:7327\n[...]\n============================================\n\nThis is because when finding an entry in ext4_xattr_block_cache_find(), if\next4_sb_bread() returns -ENOMEM, the ce's e_refcnt, which has already grown\nin the __entry_find(), won't be put away, and eventually trigger the above\nissue in mb_cache_destroy() due to reference count leakage.\n\nSo call mb_cache_entry_put() on the -ENOMEM error branch as a quick fix.",
					"category":"description",
					"title":"Vulnerability Description"
				}
			],
			"product_status":{
				"fixed":[
					"openEuler-22.03-LTS-SP4:bpftool-5.10.0-224.0.0.123.oe2203sp4.aarch64",
					"openEuler-22.03-LTS-SP4:bpftool-debuginfo-5.10.0-224.0.0.123.oe2203sp4.aarch64",
					"openEuler-22.03-LTS-SP4:kernel-5.10.0-224.0.0.123.oe2203sp4.aarch64",
					"openEuler-22.03-LTS-SP4:kernel-debuginfo-5.10.0-224.0.0.123.oe2203sp4.aarch64",
					"openEuler-22.03-LTS-SP4:kernel-debugsource-5.10.0-224.0.0.123.oe2203sp4.aarch64",
					"openEuler-22.03-LTS-SP4:kernel-devel-5.10.0-224.0.0.123.oe2203sp4.aarch64",
					"openEuler-22.03-LTS-SP4:kernel-headers-5.10.0-224.0.0.123.oe2203sp4.aarch64",
					"openEuler-22.03-LTS-SP4:kernel-source-5.10.0-224.0.0.123.oe2203sp4.aarch64",
					"openEuler-22.03-LTS-SP4:kernel-tools-5.10.0-224.0.0.123.oe2203sp4.aarch64",
					"openEuler-22.03-LTS-SP4:kernel-tools-debuginfo-5.10.0-224.0.0.123.oe2203sp4.aarch64",
					"openEuler-22.03-LTS-SP4:kernel-tools-devel-5.10.0-224.0.0.123.oe2203sp4.aarch64",
					"openEuler-22.03-LTS-SP4:perf-5.10.0-224.0.0.123.oe2203sp4.aarch64",
					"openEuler-22.03-LTS-SP4:perf-debuginfo-5.10.0-224.0.0.123.oe2203sp4.aarch64",
					"openEuler-22.03-LTS-SP4:python3-perf-5.10.0-224.0.0.123.oe2203sp4.aarch64",
					"openEuler-22.03-LTS-SP4:python3-perf-debuginfo-5.10.0-224.0.0.123.oe2203sp4.aarch64",
					"openEuler-22.03-LTS-SP4:bpftool-5.10.0-224.0.0.123.oe2203sp4.x86_64",
					"openEuler-22.03-LTS-SP4:bpftool-debuginfo-5.10.0-224.0.0.123.oe2203sp4.x86_64",
					"openEuler-22.03-LTS-SP4:kernel-5.10.0-224.0.0.123.oe2203sp4.x86_64",
					"openEuler-22.03-LTS-SP4:kernel-debuginfo-5.10.0-224.0.0.123.oe2203sp4.x86_64",
					"openEuler-22.03-LTS-SP4:kernel-debugsource-5.10.0-224.0.0.123.oe2203sp4.x86_64",
					"openEuler-22.03-LTS-SP4:kernel-devel-5.10.0-224.0.0.123.oe2203sp4.x86_64",
					"openEuler-22.03-LTS-SP4:kernel-headers-5.10.0-224.0.0.123.oe2203sp4.x86_64",
					"openEuler-22.03-LTS-SP4:kernel-source-5.10.0-224.0.0.123.oe2203sp4.x86_64",
					"openEuler-22.03-LTS-SP4:kernel-tools-5.10.0-224.0.0.123.oe2203sp4.x86_64",
					"openEuler-22.03-LTS-SP4:kernel-tools-debuginfo-5.10.0-224.0.0.123.oe2203sp4.x86_64",
					"openEuler-22.03-LTS-SP4:kernel-tools-devel-5.10.0-224.0.0.123.oe2203sp4.x86_64",
					"openEuler-22.03-LTS-SP4:perf-5.10.0-224.0.0.123.oe2203sp4.x86_64",
					"openEuler-22.03-LTS-SP4:perf-debuginfo-5.10.0-224.0.0.123.oe2203sp4.x86_64",
					"openEuler-22.03-LTS-SP4:python3-perf-5.10.0-224.0.0.123.oe2203sp4.x86_64",
					"openEuler-22.03-LTS-SP4:python3-perf-debuginfo-5.10.0-224.0.0.123.oe2203sp4.x86_64",
					"openEuler-22.03-LTS-SP4:kernel-5.10.0-224.0.0.123.oe2203sp4.src"
				]
			},
			"remediations":[
				{
					"product_ids":[
						"openEuler-22.03-LTS-SP4:bpftool-5.10.0-224.0.0.123.oe2203sp4.aarch64",
						"openEuler-22.03-LTS-SP4:bpftool-debuginfo-5.10.0-224.0.0.123.oe2203sp4.aarch64",
						"openEuler-22.03-LTS-SP4:kernel-5.10.0-224.0.0.123.oe2203sp4.aarch64",
						"openEuler-22.03-LTS-SP4:kernel-debuginfo-5.10.0-224.0.0.123.oe2203sp4.aarch64",
						"openEuler-22.03-LTS-SP4:kernel-debugsource-5.10.0-224.0.0.123.oe2203sp4.aarch64",
						"openEuler-22.03-LTS-SP4:kernel-devel-5.10.0-224.0.0.123.oe2203sp4.aarch64",
						"openEuler-22.03-LTS-SP4:kernel-headers-5.10.0-224.0.0.123.oe2203sp4.aarch64",
						"openEuler-22.03-LTS-SP4:kernel-source-5.10.0-224.0.0.123.oe2203sp4.aarch64",
						"openEuler-22.03-LTS-SP4:kernel-tools-5.10.0-224.0.0.123.oe2203sp4.aarch64",
						"openEuler-22.03-LTS-SP4:kernel-tools-debuginfo-5.10.0-224.0.0.123.oe2203sp4.aarch64",
						"openEuler-22.03-LTS-SP4:kernel-tools-devel-5.10.0-224.0.0.123.oe2203sp4.aarch64",
						"openEuler-22.03-LTS-SP4:perf-5.10.0-224.0.0.123.oe2203sp4.aarch64",
						"openEuler-22.03-LTS-SP4:perf-debuginfo-5.10.0-224.0.0.123.oe2203sp4.aarch64",
						"openEuler-22.03-LTS-SP4:python3-perf-5.10.0-224.0.0.123.oe2203sp4.aarch64",
						"openEuler-22.03-LTS-SP4:python3-perf-debuginfo-5.10.0-224.0.0.123.oe2203sp4.aarch64",
						"openEuler-22.03-LTS-SP4:bpftool-5.10.0-224.0.0.123.oe2203sp4.x86_64",
						"openEuler-22.03-LTS-SP4:bpftool-debuginfo-5.10.0-224.0.0.123.oe2203sp4.x86_64",
						"openEuler-22.03-LTS-SP4:kernel-5.10.0-224.0.0.123.oe2203sp4.x86_64",
						"openEuler-22.03-LTS-SP4:kernel-debuginfo-5.10.0-224.0.0.123.oe2203sp4.x86_64",
						"openEuler-22.03-LTS-SP4:kernel-debugsource-5.10.0-224.0.0.123.oe2203sp4.x86_64",
						"openEuler-22.03-LTS-SP4:kernel-devel-5.10.0-224.0.0.123.oe2203sp4.x86_64",
						"openEuler-22.03-LTS-SP4:kernel-headers-5.10.0-224.0.0.123.oe2203sp4.x86_64",
						"openEuler-22.03-LTS-SP4:kernel-source-5.10.0-224.0.0.123.oe2203sp4.x86_64",
						"openEuler-22.03-LTS-SP4:kernel-tools-5.10.0-224.0.0.123.oe2203sp4.x86_64",
						"openEuler-22.03-LTS-SP4:kernel-tools-debuginfo-5.10.0-224.0.0.123.oe2203sp4.x86_64",
						"openEuler-22.03-LTS-SP4:kernel-tools-devel-5.10.0-224.0.0.123.oe2203sp4.x86_64",
						"openEuler-22.03-LTS-SP4:perf-5.10.0-224.0.0.123.oe2203sp4.x86_64",
						"openEuler-22.03-LTS-SP4:perf-debuginfo-5.10.0-224.0.0.123.oe2203sp4.x86_64",
						"openEuler-22.03-LTS-SP4:python3-perf-5.10.0-224.0.0.123.oe2203sp4.x86_64",
						"openEuler-22.03-LTS-SP4:python3-perf-debuginfo-5.10.0-224.0.0.123.oe2203sp4.x86_64",
						"openEuler-22.03-LTS-SP4:kernel-5.10.0-224.0.0.123.oe2203sp4.src"
					],
					"details":"kernel security update",
					"category":"vendor_fix",
					"url":"https://www.openeuler.org/zh/security/security-bulletins/detail/?id=openEuler-SA-2024-2028"
				}
			],
			"scores":[
				{
					"cvss_v3":{
						"baseSeverity":"MEDIUM",
						"baseScore":4.7,
						"vectorString":"CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H",
						"version":"3.1"
					},
					"products":[
						"openEuler-22.03-LTS-SP4:bpftool-5.10.0-224.0.0.123.oe2203sp4.aarch64",
						"openEuler-22.03-LTS-SP4:bpftool-debuginfo-5.10.0-224.0.0.123.oe2203sp4.aarch64",
						"openEuler-22.03-LTS-SP4:kernel-5.10.0-224.0.0.123.oe2203sp4.aarch64",
						"openEuler-22.03-LTS-SP4:kernel-debuginfo-5.10.0-224.0.0.123.oe2203sp4.aarch64",
						"openEuler-22.03-LTS-SP4:kernel-debugsource-5.10.0-224.0.0.123.oe2203sp4.aarch64",
						"openEuler-22.03-LTS-SP4:kernel-devel-5.10.0-224.0.0.123.oe2203sp4.aarch64",
						"openEuler-22.03-LTS-SP4:kernel-headers-5.10.0-224.0.0.123.oe2203sp4.aarch64",
						"openEuler-22.03-LTS-SP4:kernel-source-5.10.0-224.0.0.123.oe2203sp4.aarch64",
						"openEuler-22.03-LTS-SP4:kernel-tools-5.10.0-224.0.0.123.oe2203sp4.aarch64",
						"openEuler-22.03-LTS-SP4:kernel-tools-debuginfo-5.10.0-224.0.0.123.oe2203sp4.aarch64",
						"openEuler-22.03-LTS-SP4:kernel-tools-devel-5.10.0-224.0.0.123.oe2203sp4.aarch64",
						"openEuler-22.03-LTS-SP4:perf-5.10.0-224.0.0.123.oe2203sp4.aarch64",
						"openEuler-22.03-LTS-SP4:perf-debuginfo-5.10.0-224.0.0.123.oe2203sp4.aarch64",
						"openEuler-22.03-LTS-SP4:python3-perf-5.10.0-224.0.0.123.oe2203sp4.aarch64",
						"openEuler-22.03-LTS-SP4:python3-perf-debuginfo-5.10.0-224.0.0.123.oe2203sp4.aarch64",
						"openEuler-22.03-LTS-SP4:bpftool-5.10.0-224.0.0.123.oe2203sp4.x86_64",
						"openEuler-22.03-LTS-SP4:bpftool-debuginfo-5.10.0-224.0.0.123.oe2203sp4.x86_64",
						"openEuler-22.03-LTS-SP4:kernel-5.10.0-224.0.0.123.oe2203sp4.x86_64",
						"openEuler-22.03-LTS-SP4:kernel-debuginfo-5.10.0-224.0.0.123.oe2203sp4.x86_64",
						"openEuler-22.03-LTS-SP4:kernel-debugsource-5.10.0-224.0.0.123.oe2203sp4.x86_64",
						"openEuler-22.03-LTS-SP4:kernel-devel-5.10.0-224.0.0.123.oe2203sp4.x86_64",
						"openEuler-22.03-LTS-SP4:kernel-headers-5.10.0-224.0.0.123.oe2203sp4.x86_64",
						"openEuler-22.03-LTS-SP4:kernel-source-5.10.0-224.0.0.123.oe2203sp4.x86_64",
						"openEuler-22.03-LTS-SP4:kernel-tools-5.10.0-224.0.0.123.oe2203sp4.x86_64",
						"openEuler-22.03-LTS-SP4:kernel-tools-debuginfo-5.10.0-224.0.0.123.oe2203sp4.x86_64",
						"openEuler-22.03-LTS-SP4:kernel-tools-devel-5.10.0-224.0.0.123.oe2203sp4.x86_64",
						"openEuler-22.03-LTS-SP4:perf-5.10.0-224.0.0.123.oe2203sp4.x86_64",
						"openEuler-22.03-LTS-SP4:perf-debuginfo-5.10.0-224.0.0.123.oe2203sp4.x86_64",
						"openEuler-22.03-LTS-SP4:python3-perf-5.10.0-224.0.0.123.oe2203sp4.x86_64",
						"openEuler-22.03-LTS-SP4:python3-perf-debuginfo-5.10.0-224.0.0.123.oe2203sp4.x86_64",
						"openEuler-22.03-LTS-SP4:kernel-5.10.0-224.0.0.123.oe2203sp4.src"
					]
				}
			],
			"threats":[
				{
					"details":"Medium",
					"category":"impact"
				}
			],
			"title":"CVE-2024-39276"
		},
		{
			"cve":"CVE-2024-39476",
			"notes":[
				{
					"text":"In the Linux kernel, the following vulnerability has been resolved:md/raid5: fix deadlock that raid5d() wait for itself to clear MD_SB_CHANGE_PENDINGXiao reported that lvm2 test lvconvert-raid-takeover.sh can hang withsmall possibility, the root cause is exactly the same as commitbed9e27baf52 ( Revert  md/raid5: Wait for MD_SB_CHANGE_PENDING in raid5d  )However, Dan reported another hang after that, and junxiao investigatedthe problem and found out that this is caused by plugged bio can t issuefrom raid5d().Current implementation in raid5d() has a weird dependence:1) md_check_recovery() from raid5d() must hold  reconfig_mutex  to clear   MD_SB_CHANGE_PENDING;2) raid5d() handles IO in a deadloop, until all IO are issued;3) IO from raid5d() must wait for MD_SB_CHANGE_PENDING to be cleared;This behaviour is introduce before v2.6, and for consequence, if othercontext hold  reconfig_mutex , and md_check_recovery() can t updatesuper_block, then raid5d() will waste one cpu 100% by the deadloop, until reconfig_mutex  is released.Refer to the implementation from raid1 and raid10, fix this problem byskipping issue IO if MD_SB_CHANGE_PENDING is still set aftermd_check_recovery(), daemon thread will be woken up when  reconfig_mutex is released. Meanwhile, the hang problem will be fixed as well.",
					"category":"description",
					"title":"Vulnerability Description"
				}
			],
			"product_status":{
				"fixed":[
					"openEuler-22.03-LTS-SP4:bpftool-5.10.0-224.0.0.123.oe2203sp4.aarch64",
					"openEuler-22.03-LTS-SP4:bpftool-debuginfo-5.10.0-224.0.0.123.oe2203sp4.aarch64",
					"openEuler-22.03-LTS-SP4:kernel-5.10.0-224.0.0.123.oe2203sp4.aarch64",
					"openEuler-22.03-LTS-SP4:kernel-debuginfo-5.10.0-224.0.0.123.oe2203sp4.aarch64",
					"openEuler-22.03-LTS-SP4:kernel-debugsource-5.10.0-224.0.0.123.oe2203sp4.aarch64",
					"openEuler-22.03-LTS-SP4:kernel-devel-5.10.0-224.0.0.123.oe2203sp4.aarch64",
					"openEuler-22.03-LTS-SP4:kernel-headers-5.10.0-224.0.0.123.oe2203sp4.aarch64",
					"openEuler-22.03-LTS-SP4:kernel-source-5.10.0-224.0.0.123.oe2203sp4.aarch64",
					"openEuler-22.03-LTS-SP4:kernel-tools-5.10.0-224.0.0.123.oe2203sp4.aarch64",
					"openEuler-22.03-LTS-SP4:kernel-tools-debuginfo-5.10.0-224.0.0.123.oe2203sp4.aarch64",
					"openEuler-22.03-LTS-SP4:kernel-tools-devel-5.10.0-224.0.0.123.oe2203sp4.aarch64",
					"openEuler-22.03-LTS-SP4:perf-5.10.0-224.0.0.123.oe2203sp4.aarch64",
					"openEuler-22.03-LTS-SP4:perf-debuginfo-5.10.0-224.0.0.123.oe2203sp4.aarch64",
					"openEuler-22.03-LTS-SP4:python3-perf-5.10.0-224.0.0.123.oe2203sp4.aarch64",
					"openEuler-22.03-LTS-SP4:python3-perf-debuginfo-5.10.0-224.0.0.123.oe2203sp4.aarch64",
					"openEuler-22.03-LTS-SP4:bpftool-5.10.0-224.0.0.123.oe2203sp4.x86_64",
					"openEuler-22.03-LTS-SP4:bpftool-debuginfo-5.10.0-224.0.0.123.oe2203sp4.x86_64",
					"openEuler-22.03-LTS-SP4:kernel-5.10.0-224.0.0.123.oe2203sp4.x86_64",
					"openEuler-22.03-LTS-SP4:kernel-debuginfo-5.10.0-224.0.0.123.oe2203sp4.x86_64",
					"openEuler-22.03-LTS-SP4:kernel-debugsource-5.10.0-224.0.0.123.oe2203sp4.x86_64",
					"openEuler-22.03-LTS-SP4:kernel-devel-5.10.0-224.0.0.123.oe2203sp4.x86_64",
					"openEuler-22.03-LTS-SP4:kernel-headers-5.10.0-224.0.0.123.oe2203sp4.x86_64",
					"openEuler-22.03-LTS-SP4:kernel-source-5.10.0-224.0.0.123.oe2203sp4.x86_64",
					"openEuler-22.03-LTS-SP4:kernel-tools-5.10.0-224.0.0.123.oe2203sp4.x86_64",
					"openEuler-22.03-LTS-SP4:kernel-tools-debuginfo-5.10.0-224.0.0.123.oe2203sp4.x86_64",
					"openEuler-22.03-LTS-SP4:kernel-tools-devel-5.10.0-224.0.0.123.oe2203sp4.x86_64",
					"openEuler-22.03-LTS-SP4:perf-5.10.0-224.0.0.123.oe2203sp4.x86_64",
					"openEuler-22.03-LTS-SP4:perf-debuginfo-5.10.0-224.0.0.123.oe2203sp4.x86_64",
					"openEuler-22.03-LTS-SP4:python3-perf-5.10.0-224.0.0.123.oe2203sp4.x86_64",
					"openEuler-22.03-LTS-SP4:python3-perf-debuginfo-5.10.0-224.0.0.123.oe2203sp4.x86_64",
					"openEuler-22.03-LTS-SP4:kernel-5.10.0-224.0.0.123.oe2203sp4.src"
				]
			},
			"remediations":[
				{
					"product_ids":[
						"openEuler-22.03-LTS-SP4:bpftool-5.10.0-224.0.0.123.oe2203sp4.aarch64",
						"openEuler-22.03-LTS-SP4:bpftool-debuginfo-5.10.0-224.0.0.123.oe2203sp4.aarch64",
						"openEuler-22.03-LTS-SP4:kernel-5.10.0-224.0.0.123.oe2203sp4.aarch64",
						"openEuler-22.03-LTS-SP4:kernel-debuginfo-5.10.0-224.0.0.123.oe2203sp4.aarch64",
						"openEuler-22.03-LTS-SP4:kernel-debugsource-5.10.0-224.0.0.123.oe2203sp4.aarch64",
						"openEuler-22.03-LTS-SP4:kernel-devel-5.10.0-224.0.0.123.oe2203sp4.aarch64",
						"openEuler-22.03-LTS-SP4:kernel-headers-5.10.0-224.0.0.123.oe2203sp4.aarch64",
						"openEuler-22.03-LTS-SP4:kernel-source-5.10.0-224.0.0.123.oe2203sp4.aarch64",
						"openEuler-22.03-LTS-SP4:kernel-tools-5.10.0-224.0.0.123.oe2203sp4.aarch64",
						"openEuler-22.03-LTS-SP4:kernel-tools-debuginfo-5.10.0-224.0.0.123.oe2203sp4.aarch64",
						"openEuler-22.03-LTS-SP4:kernel-tools-devel-5.10.0-224.0.0.123.oe2203sp4.aarch64",
						"openEuler-22.03-LTS-SP4:perf-5.10.0-224.0.0.123.oe2203sp4.aarch64",
						"openEuler-22.03-LTS-SP4:perf-debuginfo-5.10.0-224.0.0.123.oe2203sp4.aarch64",
						"openEuler-22.03-LTS-SP4:python3-perf-5.10.0-224.0.0.123.oe2203sp4.aarch64",
						"openEuler-22.03-LTS-SP4:python3-perf-debuginfo-5.10.0-224.0.0.123.oe2203sp4.aarch64",
						"openEuler-22.03-LTS-SP4:bpftool-5.10.0-224.0.0.123.oe2203sp4.x86_64",
						"openEuler-22.03-LTS-SP4:bpftool-debuginfo-5.10.0-224.0.0.123.oe2203sp4.x86_64",
						"openEuler-22.03-LTS-SP4:kernel-5.10.0-224.0.0.123.oe2203sp4.x86_64",
						"openEuler-22.03-LTS-SP4:kernel-debuginfo-5.10.0-224.0.0.123.oe2203sp4.x86_64",
						"openEuler-22.03-LTS-SP4:kernel-debugsource-5.10.0-224.0.0.123.oe2203sp4.x86_64",
						"openEuler-22.03-LTS-SP4:kernel-devel-5.10.0-224.0.0.123.oe2203sp4.x86_64",
						"openEuler-22.03-LTS-SP4:kernel-headers-5.10.0-224.0.0.123.oe2203sp4.x86_64",
						"openEuler-22.03-LTS-SP4:kernel-source-5.10.0-224.0.0.123.oe2203sp4.x86_64",
						"openEuler-22.03-LTS-SP4:kernel-tools-5.10.0-224.0.0.123.oe2203sp4.x86_64",
						"openEuler-22.03-LTS-SP4:kernel-tools-debuginfo-5.10.0-224.0.0.123.oe2203sp4.x86_64",
						"openEuler-22.03-LTS-SP4:kernel-tools-devel-5.10.0-224.0.0.123.oe2203sp4.x86_64",
						"openEuler-22.03-LTS-SP4:perf-5.10.0-224.0.0.123.oe2203sp4.x86_64",
						"openEuler-22.03-LTS-SP4:perf-debuginfo-5.10.0-224.0.0.123.oe2203sp4.x86_64",
						"openEuler-22.03-LTS-SP4:python3-perf-5.10.0-224.0.0.123.oe2203sp4.x86_64",
						"openEuler-22.03-LTS-SP4:python3-perf-debuginfo-5.10.0-224.0.0.123.oe2203sp4.x86_64",
						"openEuler-22.03-LTS-SP4:kernel-5.10.0-224.0.0.123.oe2203sp4.src"
					],
					"details":"kernel security update",
					"category":"vendor_fix",
					"url":"https://www.openeuler.org/zh/security/security-bulletins/detail/?id=openEuler-SA-2024-2028"
				}
			],
			"scores":[
				{
					"cvss_v3":{
						"baseSeverity":"MEDIUM",
						"baseScore":5.5,
						"vectorString":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
						"version":"3.1"
					},
					"products":[
						"openEuler-22.03-LTS-SP4:bpftool-5.10.0-224.0.0.123.oe2203sp4.aarch64",
						"openEuler-22.03-LTS-SP4:bpftool-debuginfo-5.10.0-224.0.0.123.oe2203sp4.aarch64",
						"openEuler-22.03-LTS-SP4:kernel-5.10.0-224.0.0.123.oe2203sp4.aarch64",
						"openEuler-22.03-LTS-SP4:kernel-debuginfo-5.10.0-224.0.0.123.oe2203sp4.aarch64",
						"openEuler-22.03-LTS-SP4:kernel-debugsource-5.10.0-224.0.0.123.oe2203sp4.aarch64",
						"openEuler-22.03-LTS-SP4:kernel-devel-5.10.0-224.0.0.123.oe2203sp4.aarch64",
						"openEuler-22.03-LTS-SP4:kernel-headers-5.10.0-224.0.0.123.oe2203sp4.aarch64",
						"openEuler-22.03-LTS-SP4:kernel-source-5.10.0-224.0.0.123.oe2203sp4.aarch64",
						"openEuler-22.03-LTS-SP4:kernel-tools-5.10.0-224.0.0.123.oe2203sp4.aarch64",
						"openEuler-22.03-LTS-SP4:kernel-tools-debuginfo-5.10.0-224.0.0.123.oe2203sp4.aarch64",
						"openEuler-22.03-LTS-SP4:kernel-tools-devel-5.10.0-224.0.0.123.oe2203sp4.aarch64",
						"openEuler-22.03-LTS-SP4:perf-5.10.0-224.0.0.123.oe2203sp4.aarch64",
						"openEuler-22.03-LTS-SP4:perf-debuginfo-5.10.0-224.0.0.123.oe2203sp4.aarch64",
						"openEuler-22.03-LTS-SP4:python3-perf-5.10.0-224.0.0.123.oe2203sp4.aarch64",
						"openEuler-22.03-LTS-SP4:python3-perf-debuginfo-5.10.0-224.0.0.123.oe2203sp4.aarch64",
						"openEuler-22.03-LTS-SP4:bpftool-5.10.0-224.0.0.123.oe2203sp4.x86_64",
						"openEuler-22.03-LTS-SP4:bpftool-debuginfo-5.10.0-224.0.0.123.oe2203sp4.x86_64",
						"openEuler-22.03-LTS-SP4:kernel-5.10.0-224.0.0.123.oe2203sp4.x86_64",
						"openEuler-22.03-LTS-SP4:kernel-debuginfo-5.10.0-224.0.0.123.oe2203sp4.x86_64",
						"openEuler-22.03-LTS-SP4:kernel-debugsource-5.10.0-224.0.0.123.oe2203sp4.x86_64",
						"openEuler-22.03-LTS-SP4:kernel-devel-5.10.0-224.0.0.123.oe2203sp4.x86_64",
						"openEuler-22.03-LTS-SP4:kernel-headers-5.10.0-224.0.0.123.oe2203sp4.x86_64",
						"openEuler-22.03-LTS-SP4:kernel-source-5.10.0-224.0.0.123.oe2203sp4.x86_64",
						"openEuler-22.03-LTS-SP4:kernel-tools-5.10.0-224.0.0.123.oe2203sp4.x86_64",
						"openEuler-22.03-LTS-SP4:kernel-tools-debuginfo-5.10.0-224.0.0.123.oe2203sp4.x86_64",
						"openEuler-22.03-LTS-SP4:kernel-tools-devel-5.10.0-224.0.0.123.oe2203sp4.x86_64",
						"openEuler-22.03-LTS-SP4:perf-5.10.0-224.0.0.123.oe2203sp4.x86_64",
						"openEuler-22.03-LTS-SP4:perf-debuginfo-5.10.0-224.0.0.123.oe2203sp4.x86_64",
						"openEuler-22.03-LTS-SP4:python3-perf-5.10.0-224.0.0.123.oe2203sp4.x86_64",
						"openEuler-22.03-LTS-SP4:python3-perf-debuginfo-5.10.0-224.0.0.123.oe2203sp4.x86_64",
						"openEuler-22.03-LTS-SP4:kernel-5.10.0-224.0.0.123.oe2203sp4.src"
					]
				}
			],
			"threats":[
				{
					"details":"Medium",
					"category":"impact"
				}
			],
			"title":"CVE-2024-39476"
		},
		{
			"cve":"CVE-2024-40902",
			"notes":[
				{
					"text":"In the Linux kernel, the following vulnerability has been resolved:jfs: xattr: fix buffer overflow for invalid xattrWhen an xattr size is not what is expected, it is printed out to thekernel log in hex format as a form of debugging.  But when that xattrsize is bigger than the expected size, printing it out can cause anaccess off the end of the buffer.Fix this all up by properly restricting the size of the debug hex dumpin the kernel log.",
					"category":"description",
					"title":"Vulnerability Description"
				}
			],
			"product_status":{
				"fixed":[
					"openEuler-22.03-LTS-SP4:bpftool-5.10.0-224.0.0.123.oe2203sp4.aarch64",
					"openEuler-22.03-LTS-SP4:bpftool-debuginfo-5.10.0-224.0.0.123.oe2203sp4.aarch64",
					"openEuler-22.03-LTS-SP4:kernel-5.10.0-224.0.0.123.oe2203sp4.aarch64",
					"openEuler-22.03-LTS-SP4:kernel-debuginfo-5.10.0-224.0.0.123.oe2203sp4.aarch64",
					"openEuler-22.03-LTS-SP4:kernel-debugsource-5.10.0-224.0.0.123.oe2203sp4.aarch64",
					"openEuler-22.03-LTS-SP4:kernel-devel-5.10.0-224.0.0.123.oe2203sp4.aarch64",
					"openEuler-22.03-LTS-SP4:kernel-headers-5.10.0-224.0.0.123.oe2203sp4.aarch64",
					"openEuler-22.03-LTS-SP4:kernel-source-5.10.0-224.0.0.123.oe2203sp4.aarch64",
					"openEuler-22.03-LTS-SP4:kernel-tools-5.10.0-224.0.0.123.oe2203sp4.aarch64",
					"openEuler-22.03-LTS-SP4:kernel-tools-debuginfo-5.10.0-224.0.0.123.oe2203sp4.aarch64",
					"openEuler-22.03-LTS-SP4:kernel-tools-devel-5.10.0-224.0.0.123.oe2203sp4.aarch64",
					"openEuler-22.03-LTS-SP4:perf-5.10.0-224.0.0.123.oe2203sp4.aarch64",
					"openEuler-22.03-LTS-SP4:perf-debuginfo-5.10.0-224.0.0.123.oe2203sp4.aarch64",
					"openEuler-22.03-LTS-SP4:python3-perf-5.10.0-224.0.0.123.oe2203sp4.aarch64",
					"openEuler-22.03-LTS-SP4:python3-perf-debuginfo-5.10.0-224.0.0.123.oe2203sp4.aarch64",
					"openEuler-22.03-LTS-SP4:bpftool-5.10.0-224.0.0.123.oe2203sp4.x86_64",
					"openEuler-22.03-LTS-SP4:bpftool-debuginfo-5.10.0-224.0.0.123.oe2203sp4.x86_64",
					"openEuler-22.03-LTS-SP4:kernel-5.10.0-224.0.0.123.oe2203sp4.x86_64",
					"openEuler-22.03-LTS-SP4:kernel-debuginfo-5.10.0-224.0.0.123.oe2203sp4.x86_64",
					"openEuler-22.03-LTS-SP4:kernel-debugsource-5.10.0-224.0.0.123.oe2203sp4.x86_64",
					"openEuler-22.03-LTS-SP4:kernel-devel-5.10.0-224.0.0.123.oe2203sp4.x86_64",
					"openEuler-22.03-LTS-SP4:kernel-headers-5.10.0-224.0.0.123.oe2203sp4.x86_64",
					"openEuler-22.03-LTS-SP4:kernel-source-5.10.0-224.0.0.123.oe2203sp4.x86_64",
					"openEuler-22.03-LTS-SP4:kernel-tools-5.10.0-224.0.0.123.oe2203sp4.x86_64",
					"openEuler-22.03-LTS-SP4:kernel-tools-debuginfo-5.10.0-224.0.0.123.oe2203sp4.x86_64",
					"openEuler-22.03-LTS-SP4:kernel-tools-devel-5.10.0-224.0.0.123.oe2203sp4.x86_64",
					"openEuler-22.03-LTS-SP4:perf-5.10.0-224.0.0.123.oe2203sp4.x86_64",
					"openEuler-22.03-LTS-SP4:perf-debuginfo-5.10.0-224.0.0.123.oe2203sp4.x86_64",
					"openEuler-22.03-LTS-SP4:python3-perf-5.10.0-224.0.0.123.oe2203sp4.x86_64",
					"openEuler-22.03-LTS-SP4:python3-perf-debuginfo-5.10.0-224.0.0.123.oe2203sp4.x86_64",
					"openEuler-22.03-LTS-SP4:kernel-5.10.0-224.0.0.123.oe2203sp4.src"
				]
			},
			"remediations":[
				{
					"product_ids":[
						"openEuler-22.03-LTS-SP4:bpftool-5.10.0-224.0.0.123.oe2203sp4.aarch64",
						"openEuler-22.03-LTS-SP4:bpftool-debuginfo-5.10.0-224.0.0.123.oe2203sp4.aarch64",
						"openEuler-22.03-LTS-SP4:kernel-5.10.0-224.0.0.123.oe2203sp4.aarch64",
						"openEuler-22.03-LTS-SP4:kernel-debuginfo-5.10.0-224.0.0.123.oe2203sp4.aarch64",
						"openEuler-22.03-LTS-SP4:kernel-debugsource-5.10.0-224.0.0.123.oe2203sp4.aarch64",
						"openEuler-22.03-LTS-SP4:kernel-devel-5.10.0-224.0.0.123.oe2203sp4.aarch64",
						"openEuler-22.03-LTS-SP4:kernel-headers-5.10.0-224.0.0.123.oe2203sp4.aarch64",
						"openEuler-22.03-LTS-SP4:kernel-source-5.10.0-224.0.0.123.oe2203sp4.aarch64",
						"openEuler-22.03-LTS-SP4:kernel-tools-5.10.0-224.0.0.123.oe2203sp4.aarch64",
						"openEuler-22.03-LTS-SP4:kernel-tools-debuginfo-5.10.0-224.0.0.123.oe2203sp4.aarch64",
						"openEuler-22.03-LTS-SP4:kernel-tools-devel-5.10.0-224.0.0.123.oe2203sp4.aarch64",
						"openEuler-22.03-LTS-SP4:perf-5.10.0-224.0.0.123.oe2203sp4.aarch64",
						"openEuler-22.03-LTS-SP4:perf-debuginfo-5.10.0-224.0.0.123.oe2203sp4.aarch64",
						"openEuler-22.03-LTS-SP4:python3-perf-5.10.0-224.0.0.123.oe2203sp4.aarch64",
						"openEuler-22.03-LTS-SP4:python3-perf-debuginfo-5.10.0-224.0.0.123.oe2203sp4.aarch64",
						"openEuler-22.03-LTS-SP4:bpftool-5.10.0-224.0.0.123.oe2203sp4.x86_64",
						"openEuler-22.03-LTS-SP4:bpftool-debuginfo-5.10.0-224.0.0.123.oe2203sp4.x86_64",
						"openEuler-22.03-LTS-SP4:kernel-5.10.0-224.0.0.123.oe2203sp4.x86_64",
						"openEuler-22.03-LTS-SP4:kernel-debuginfo-5.10.0-224.0.0.123.oe2203sp4.x86_64",
						"openEuler-22.03-LTS-SP4:kernel-debugsource-5.10.0-224.0.0.123.oe2203sp4.x86_64",
						"openEuler-22.03-LTS-SP4:kernel-devel-5.10.0-224.0.0.123.oe2203sp4.x86_64",
						"openEuler-22.03-LTS-SP4:kernel-headers-5.10.0-224.0.0.123.oe2203sp4.x86_64",
						"openEuler-22.03-LTS-SP4:kernel-source-5.10.0-224.0.0.123.oe2203sp4.x86_64",
						"openEuler-22.03-LTS-SP4:kernel-tools-5.10.0-224.0.0.123.oe2203sp4.x86_64",
						"openEuler-22.03-LTS-SP4:kernel-tools-debuginfo-5.10.0-224.0.0.123.oe2203sp4.x86_64",
						"openEuler-22.03-LTS-SP4:kernel-tools-devel-5.10.0-224.0.0.123.oe2203sp4.x86_64",
						"openEuler-22.03-LTS-SP4:perf-5.10.0-224.0.0.123.oe2203sp4.x86_64",
						"openEuler-22.03-LTS-SP4:perf-debuginfo-5.10.0-224.0.0.123.oe2203sp4.x86_64",
						"openEuler-22.03-LTS-SP4:python3-perf-5.10.0-224.0.0.123.oe2203sp4.x86_64",
						"openEuler-22.03-LTS-SP4:python3-perf-debuginfo-5.10.0-224.0.0.123.oe2203sp4.x86_64",
						"openEuler-22.03-LTS-SP4:kernel-5.10.0-224.0.0.123.oe2203sp4.src"
					],
					"details":"kernel security update",
					"category":"vendor_fix",
					"url":"https://www.openeuler.org/zh/security/security-bulletins/detail/?id=openEuler-SA-2024-2028"
				}
			],
			"scores":[
				{
					"cvss_v3":{
						"baseSeverity":"HIGH",
						"baseScore":7.8,
						"vectorString":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
						"version":"3.1"
					},
					"products":[
						"openEuler-22.03-LTS-SP4:bpftool-5.10.0-224.0.0.123.oe2203sp4.aarch64",
						"openEuler-22.03-LTS-SP4:bpftool-debuginfo-5.10.0-224.0.0.123.oe2203sp4.aarch64",
						"openEuler-22.03-LTS-SP4:kernel-5.10.0-224.0.0.123.oe2203sp4.aarch64",
						"openEuler-22.03-LTS-SP4:kernel-debuginfo-5.10.0-224.0.0.123.oe2203sp4.aarch64",
						"openEuler-22.03-LTS-SP4:kernel-debugsource-5.10.0-224.0.0.123.oe2203sp4.aarch64",
						"openEuler-22.03-LTS-SP4:kernel-devel-5.10.0-224.0.0.123.oe2203sp4.aarch64",
						"openEuler-22.03-LTS-SP4:kernel-headers-5.10.0-224.0.0.123.oe2203sp4.aarch64",
						"openEuler-22.03-LTS-SP4:kernel-source-5.10.0-224.0.0.123.oe2203sp4.aarch64",
						"openEuler-22.03-LTS-SP4:kernel-tools-5.10.0-224.0.0.123.oe2203sp4.aarch64",
						"openEuler-22.03-LTS-SP4:kernel-tools-debuginfo-5.10.0-224.0.0.123.oe2203sp4.aarch64",
						"openEuler-22.03-LTS-SP4:kernel-tools-devel-5.10.0-224.0.0.123.oe2203sp4.aarch64",
						"openEuler-22.03-LTS-SP4:perf-5.10.0-224.0.0.123.oe2203sp4.aarch64",
						"openEuler-22.03-LTS-SP4:perf-debuginfo-5.10.0-224.0.0.123.oe2203sp4.aarch64",
						"openEuler-22.03-LTS-SP4:python3-perf-5.10.0-224.0.0.123.oe2203sp4.aarch64",
						"openEuler-22.03-LTS-SP4:python3-perf-debuginfo-5.10.0-224.0.0.123.oe2203sp4.aarch64",
						"openEuler-22.03-LTS-SP4:bpftool-5.10.0-224.0.0.123.oe2203sp4.x86_64",
						"openEuler-22.03-LTS-SP4:bpftool-debuginfo-5.10.0-224.0.0.123.oe2203sp4.x86_64",
						"openEuler-22.03-LTS-SP4:kernel-5.10.0-224.0.0.123.oe2203sp4.x86_64",
						"openEuler-22.03-LTS-SP4:kernel-debuginfo-5.10.0-224.0.0.123.oe2203sp4.x86_64",
						"openEuler-22.03-LTS-SP4:kernel-debugsource-5.10.0-224.0.0.123.oe2203sp4.x86_64",
						"openEuler-22.03-LTS-SP4:kernel-devel-5.10.0-224.0.0.123.oe2203sp4.x86_64",
						"openEuler-22.03-LTS-SP4:kernel-headers-5.10.0-224.0.0.123.oe2203sp4.x86_64",
						"openEuler-22.03-LTS-SP4:kernel-source-5.10.0-224.0.0.123.oe2203sp4.x86_64",
						"openEuler-22.03-LTS-SP4:kernel-tools-5.10.0-224.0.0.123.oe2203sp4.x86_64",
						"openEuler-22.03-LTS-SP4:kernel-tools-debuginfo-5.10.0-224.0.0.123.oe2203sp4.x86_64",
						"openEuler-22.03-LTS-SP4:kernel-tools-devel-5.10.0-224.0.0.123.oe2203sp4.x86_64",
						"openEuler-22.03-LTS-SP4:perf-5.10.0-224.0.0.123.oe2203sp4.x86_64",
						"openEuler-22.03-LTS-SP4:perf-debuginfo-5.10.0-224.0.0.123.oe2203sp4.x86_64",
						"openEuler-22.03-LTS-SP4:python3-perf-5.10.0-224.0.0.123.oe2203sp4.x86_64",
						"openEuler-22.03-LTS-SP4:python3-perf-debuginfo-5.10.0-224.0.0.123.oe2203sp4.x86_64",
						"openEuler-22.03-LTS-SP4:kernel-5.10.0-224.0.0.123.oe2203sp4.src"
					]
				}
			],
			"threats":[
				{
					"details":"High",
					"category":"impact"
				}
			],
			"title":"CVE-2024-40902"
		},
		{
			"cve":"CVE-2024-40945",
			"notes":[
				{
					"text":"In the Linux kernel, the following vulnerability has been resolved:\n\niommu: Return right value in iommu_sva_bind_device()\n\niommu_sva_bind_device() should return either a sva bond handle or an\nERR_PTR value in error cases. Existing drivers (idxd and uacce) only\ncheck the return value with IS_ERR(). This could potentially lead to\na kernel NULL pointer dereference issue if the function returns NULL\ninstead of an error pointer.\n\nIn reality, this doesn't cause any problems because iommu_sva_bind_device()\nonly returns NULL when the kernel is not configured with CONFIG_IOMMU_SVA.\nIn this case, iommu_dev_enable_feature(dev, IOMMU_DEV_FEAT_SVA) will\nreturn an error, and the device drivers won't call iommu_sva_bind_device()\nat all.",
					"category":"description",
					"title":"Vulnerability Description"
				}
			],
			"product_status":{
				"fixed":[
					"openEuler-22.03-LTS-SP4:bpftool-5.10.0-224.0.0.123.oe2203sp4.aarch64",
					"openEuler-22.03-LTS-SP4:bpftool-debuginfo-5.10.0-224.0.0.123.oe2203sp4.aarch64",
					"openEuler-22.03-LTS-SP4:kernel-5.10.0-224.0.0.123.oe2203sp4.aarch64",
					"openEuler-22.03-LTS-SP4:kernel-debuginfo-5.10.0-224.0.0.123.oe2203sp4.aarch64",
					"openEuler-22.03-LTS-SP4:kernel-debugsource-5.10.0-224.0.0.123.oe2203sp4.aarch64",
					"openEuler-22.03-LTS-SP4:kernel-devel-5.10.0-224.0.0.123.oe2203sp4.aarch64",
					"openEuler-22.03-LTS-SP4:kernel-headers-5.10.0-224.0.0.123.oe2203sp4.aarch64",
					"openEuler-22.03-LTS-SP4:kernel-source-5.10.0-224.0.0.123.oe2203sp4.aarch64",
					"openEuler-22.03-LTS-SP4:kernel-tools-5.10.0-224.0.0.123.oe2203sp4.aarch64",
					"openEuler-22.03-LTS-SP4:kernel-tools-debuginfo-5.10.0-224.0.0.123.oe2203sp4.aarch64",
					"openEuler-22.03-LTS-SP4:kernel-tools-devel-5.10.0-224.0.0.123.oe2203sp4.aarch64",
					"openEuler-22.03-LTS-SP4:perf-5.10.0-224.0.0.123.oe2203sp4.aarch64",
					"openEuler-22.03-LTS-SP4:perf-debuginfo-5.10.0-224.0.0.123.oe2203sp4.aarch64",
					"openEuler-22.03-LTS-SP4:python3-perf-5.10.0-224.0.0.123.oe2203sp4.aarch64",
					"openEuler-22.03-LTS-SP4:python3-perf-debuginfo-5.10.0-224.0.0.123.oe2203sp4.aarch64",
					"openEuler-22.03-LTS-SP4:bpftool-5.10.0-224.0.0.123.oe2203sp4.x86_64",
					"openEuler-22.03-LTS-SP4:bpftool-debuginfo-5.10.0-224.0.0.123.oe2203sp4.x86_64",
					"openEuler-22.03-LTS-SP4:kernel-5.10.0-224.0.0.123.oe2203sp4.x86_64",
					"openEuler-22.03-LTS-SP4:kernel-debuginfo-5.10.0-224.0.0.123.oe2203sp4.x86_64",
					"openEuler-22.03-LTS-SP4:kernel-debugsource-5.10.0-224.0.0.123.oe2203sp4.x86_64",
					"openEuler-22.03-LTS-SP4:kernel-devel-5.10.0-224.0.0.123.oe2203sp4.x86_64",
					"openEuler-22.03-LTS-SP4:kernel-headers-5.10.0-224.0.0.123.oe2203sp4.x86_64",
					"openEuler-22.03-LTS-SP4:kernel-source-5.10.0-224.0.0.123.oe2203sp4.x86_64",
					"openEuler-22.03-LTS-SP4:kernel-tools-5.10.0-224.0.0.123.oe2203sp4.x86_64",
					"openEuler-22.03-LTS-SP4:kernel-tools-debuginfo-5.10.0-224.0.0.123.oe2203sp4.x86_64",
					"openEuler-22.03-LTS-SP4:kernel-tools-devel-5.10.0-224.0.0.123.oe2203sp4.x86_64",
					"openEuler-22.03-LTS-SP4:perf-5.10.0-224.0.0.123.oe2203sp4.x86_64",
					"openEuler-22.03-LTS-SP4:perf-debuginfo-5.10.0-224.0.0.123.oe2203sp4.x86_64",
					"openEuler-22.03-LTS-SP4:python3-perf-5.10.0-224.0.0.123.oe2203sp4.x86_64",
					"openEuler-22.03-LTS-SP4:python3-perf-debuginfo-5.10.0-224.0.0.123.oe2203sp4.x86_64",
					"openEuler-22.03-LTS-SP4:kernel-5.10.0-224.0.0.123.oe2203sp4.src"
				]
			},
			"remediations":[
				{
					"product_ids":[
						"openEuler-22.03-LTS-SP4:bpftool-5.10.0-224.0.0.123.oe2203sp4.aarch64",
						"openEuler-22.03-LTS-SP4:bpftool-debuginfo-5.10.0-224.0.0.123.oe2203sp4.aarch64",
						"openEuler-22.03-LTS-SP4:kernel-5.10.0-224.0.0.123.oe2203sp4.aarch64",
						"openEuler-22.03-LTS-SP4:kernel-debuginfo-5.10.0-224.0.0.123.oe2203sp4.aarch64",
						"openEuler-22.03-LTS-SP4:kernel-debugsource-5.10.0-224.0.0.123.oe2203sp4.aarch64",
						"openEuler-22.03-LTS-SP4:kernel-devel-5.10.0-224.0.0.123.oe2203sp4.aarch64",
						"openEuler-22.03-LTS-SP4:kernel-headers-5.10.0-224.0.0.123.oe2203sp4.aarch64",
						"openEuler-22.03-LTS-SP4:kernel-source-5.10.0-224.0.0.123.oe2203sp4.aarch64",
						"openEuler-22.03-LTS-SP4:kernel-tools-5.10.0-224.0.0.123.oe2203sp4.aarch64",
						"openEuler-22.03-LTS-SP4:kernel-tools-debuginfo-5.10.0-224.0.0.123.oe2203sp4.aarch64",
						"openEuler-22.03-LTS-SP4:kernel-tools-devel-5.10.0-224.0.0.123.oe2203sp4.aarch64",
						"openEuler-22.03-LTS-SP4:perf-5.10.0-224.0.0.123.oe2203sp4.aarch64",
						"openEuler-22.03-LTS-SP4:perf-debuginfo-5.10.0-224.0.0.123.oe2203sp4.aarch64",
						"openEuler-22.03-LTS-SP4:python3-perf-5.10.0-224.0.0.123.oe2203sp4.aarch64",
						"openEuler-22.03-LTS-SP4:python3-perf-debuginfo-5.10.0-224.0.0.123.oe2203sp4.aarch64",
						"openEuler-22.03-LTS-SP4:bpftool-5.10.0-224.0.0.123.oe2203sp4.x86_64",
						"openEuler-22.03-LTS-SP4:bpftool-debuginfo-5.10.0-224.0.0.123.oe2203sp4.x86_64",
						"openEuler-22.03-LTS-SP4:kernel-5.10.0-224.0.0.123.oe2203sp4.x86_64",
						"openEuler-22.03-LTS-SP4:kernel-debuginfo-5.10.0-224.0.0.123.oe2203sp4.x86_64",
						"openEuler-22.03-LTS-SP4:kernel-debugsource-5.10.0-224.0.0.123.oe2203sp4.x86_64",
						"openEuler-22.03-LTS-SP4:kernel-devel-5.10.0-224.0.0.123.oe2203sp4.x86_64",
						"openEuler-22.03-LTS-SP4:kernel-headers-5.10.0-224.0.0.123.oe2203sp4.x86_64",
						"openEuler-22.03-LTS-SP4:kernel-source-5.10.0-224.0.0.123.oe2203sp4.x86_64",
						"openEuler-22.03-LTS-SP4:kernel-tools-5.10.0-224.0.0.123.oe2203sp4.x86_64",
						"openEuler-22.03-LTS-SP4:kernel-tools-debuginfo-5.10.0-224.0.0.123.oe2203sp4.x86_64",
						"openEuler-22.03-LTS-SP4:kernel-tools-devel-5.10.0-224.0.0.123.oe2203sp4.x86_64",
						"openEuler-22.03-LTS-SP4:perf-5.10.0-224.0.0.123.oe2203sp4.x86_64",
						"openEuler-22.03-LTS-SP4:perf-debuginfo-5.10.0-224.0.0.123.oe2203sp4.x86_64",
						"openEuler-22.03-LTS-SP4:python3-perf-5.10.0-224.0.0.123.oe2203sp4.x86_64",
						"openEuler-22.03-LTS-SP4:python3-perf-debuginfo-5.10.0-224.0.0.123.oe2203sp4.x86_64",
						"openEuler-22.03-LTS-SP4:kernel-5.10.0-224.0.0.123.oe2203sp4.src"
					],
					"details":"kernel security update",
					"category":"vendor_fix",
					"url":"https://www.openeuler.org/zh/security/security-bulletins/detail/?id=openEuler-SA-2024-2028"
				}
			],
			"scores":[
				{
					"cvss_v3":{
						"baseSeverity":"MEDIUM",
						"baseScore":5.5,
						"vectorString":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
						"version":"3.1"
					},
					"products":[
						"openEuler-22.03-LTS-SP4:bpftool-5.10.0-224.0.0.123.oe2203sp4.aarch64",
						"openEuler-22.03-LTS-SP4:bpftool-debuginfo-5.10.0-224.0.0.123.oe2203sp4.aarch64",
						"openEuler-22.03-LTS-SP4:kernel-5.10.0-224.0.0.123.oe2203sp4.aarch64",
						"openEuler-22.03-LTS-SP4:kernel-debuginfo-5.10.0-224.0.0.123.oe2203sp4.aarch64",
						"openEuler-22.03-LTS-SP4:kernel-debugsource-5.10.0-224.0.0.123.oe2203sp4.aarch64",
						"openEuler-22.03-LTS-SP4:kernel-devel-5.10.0-224.0.0.123.oe2203sp4.aarch64",
						"openEuler-22.03-LTS-SP4:kernel-headers-5.10.0-224.0.0.123.oe2203sp4.aarch64",
						"openEuler-22.03-LTS-SP4:kernel-source-5.10.0-224.0.0.123.oe2203sp4.aarch64",
						"openEuler-22.03-LTS-SP4:kernel-tools-5.10.0-224.0.0.123.oe2203sp4.aarch64",
						"openEuler-22.03-LTS-SP4:kernel-tools-debuginfo-5.10.0-224.0.0.123.oe2203sp4.aarch64",
						"openEuler-22.03-LTS-SP4:kernel-tools-devel-5.10.0-224.0.0.123.oe2203sp4.aarch64",
						"openEuler-22.03-LTS-SP4:perf-5.10.0-224.0.0.123.oe2203sp4.aarch64",
						"openEuler-22.03-LTS-SP4:perf-debuginfo-5.10.0-224.0.0.123.oe2203sp4.aarch64",
						"openEuler-22.03-LTS-SP4:python3-perf-5.10.0-224.0.0.123.oe2203sp4.aarch64",
						"openEuler-22.03-LTS-SP4:python3-perf-debuginfo-5.10.0-224.0.0.123.oe2203sp4.aarch64",
						"openEuler-22.03-LTS-SP4:bpftool-5.10.0-224.0.0.123.oe2203sp4.x86_64",
						"openEuler-22.03-LTS-SP4:bpftool-debuginfo-5.10.0-224.0.0.123.oe2203sp4.x86_64",
						"openEuler-22.03-LTS-SP4:kernel-5.10.0-224.0.0.123.oe2203sp4.x86_64",
						"openEuler-22.03-LTS-SP4:kernel-debuginfo-5.10.0-224.0.0.123.oe2203sp4.x86_64",
						"openEuler-22.03-LTS-SP4:kernel-debugsource-5.10.0-224.0.0.123.oe2203sp4.x86_64",
						"openEuler-22.03-LTS-SP4:kernel-devel-5.10.0-224.0.0.123.oe2203sp4.x86_64",
						"openEuler-22.03-LTS-SP4:kernel-headers-5.10.0-224.0.0.123.oe2203sp4.x86_64",
						"openEuler-22.03-LTS-SP4:kernel-source-5.10.0-224.0.0.123.oe2203sp4.x86_64",
						"openEuler-22.03-LTS-SP4:kernel-tools-5.10.0-224.0.0.123.oe2203sp4.x86_64",
						"openEuler-22.03-LTS-SP4:kernel-tools-debuginfo-5.10.0-224.0.0.123.oe2203sp4.x86_64",
						"openEuler-22.03-LTS-SP4:kernel-tools-devel-5.10.0-224.0.0.123.oe2203sp4.x86_64",
						"openEuler-22.03-LTS-SP4:perf-5.10.0-224.0.0.123.oe2203sp4.x86_64",
						"openEuler-22.03-LTS-SP4:perf-debuginfo-5.10.0-224.0.0.123.oe2203sp4.x86_64",
						"openEuler-22.03-LTS-SP4:python3-perf-5.10.0-224.0.0.123.oe2203sp4.x86_64",
						"openEuler-22.03-LTS-SP4:python3-perf-debuginfo-5.10.0-224.0.0.123.oe2203sp4.x86_64",
						"openEuler-22.03-LTS-SP4:kernel-5.10.0-224.0.0.123.oe2203sp4.src"
					]
				}
			],
			"threats":[
				{
					"details":"Medium",
					"category":"impact"
				}
			],
			"title":"CVE-2024-40945"
		},
		{
			"cve":"CVE-2024-40966",
			"notes":[
				{
					"text":"In the Linux kernel, the following vulnerability has been resolved:\n\ntty: add the option to have a tty reject a new ldisc\n\n... and use it to limit the virtual terminals to just N_TTY.  They are\nkind of special, and in particular, the \"con_write()\" routine violates\nthe \"writes cannot sleep\" rule that some ldiscs rely on.\n\nThis avoids the\n\n   BUG: sleeping function called from invalid context at kernel/printk/printk.c:2659\n\nwhen N_GSM has been attached to a virtual console, and gsmld_write()\ncalls con_write() while holding a spinlock, and con_write() then tries\nto get the console lock.",
					"category":"description",
					"title":"Vulnerability Description"
				}
			],
			"product_status":{
				"fixed":[
					"openEuler-22.03-LTS-SP4:bpftool-5.10.0-224.0.0.123.oe2203sp4.aarch64",
					"openEuler-22.03-LTS-SP4:bpftool-debuginfo-5.10.0-224.0.0.123.oe2203sp4.aarch64",
					"openEuler-22.03-LTS-SP4:kernel-5.10.0-224.0.0.123.oe2203sp4.aarch64",
					"openEuler-22.03-LTS-SP4:kernel-debuginfo-5.10.0-224.0.0.123.oe2203sp4.aarch64",
					"openEuler-22.03-LTS-SP4:kernel-debugsource-5.10.0-224.0.0.123.oe2203sp4.aarch64",
					"openEuler-22.03-LTS-SP4:kernel-devel-5.10.0-224.0.0.123.oe2203sp4.aarch64",
					"openEuler-22.03-LTS-SP4:kernel-headers-5.10.0-224.0.0.123.oe2203sp4.aarch64",
					"openEuler-22.03-LTS-SP4:kernel-source-5.10.0-224.0.0.123.oe2203sp4.aarch64",
					"openEuler-22.03-LTS-SP4:kernel-tools-5.10.0-224.0.0.123.oe2203sp4.aarch64",
					"openEuler-22.03-LTS-SP4:kernel-tools-debuginfo-5.10.0-224.0.0.123.oe2203sp4.aarch64",
					"openEuler-22.03-LTS-SP4:kernel-tools-devel-5.10.0-224.0.0.123.oe2203sp4.aarch64",
					"openEuler-22.03-LTS-SP4:perf-5.10.0-224.0.0.123.oe2203sp4.aarch64",
					"openEuler-22.03-LTS-SP4:perf-debuginfo-5.10.0-224.0.0.123.oe2203sp4.aarch64",
					"openEuler-22.03-LTS-SP4:python3-perf-5.10.0-224.0.0.123.oe2203sp4.aarch64",
					"openEuler-22.03-LTS-SP4:python3-perf-debuginfo-5.10.0-224.0.0.123.oe2203sp4.aarch64",
					"openEuler-22.03-LTS-SP4:bpftool-5.10.0-224.0.0.123.oe2203sp4.x86_64",
					"openEuler-22.03-LTS-SP4:bpftool-debuginfo-5.10.0-224.0.0.123.oe2203sp4.x86_64",
					"openEuler-22.03-LTS-SP4:kernel-5.10.0-224.0.0.123.oe2203sp4.x86_64",
					"openEuler-22.03-LTS-SP4:kernel-debuginfo-5.10.0-224.0.0.123.oe2203sp4.x86_64",
					"openEuler-22.03-LTS-SP4:kernel-debugsource-5.10.0-224.0.0.123.oe2203sp4.x86_64",
					"openEuler-22.03-LTS-SP4:kernel-devel-5.10.0-224.0.0.123.oe2203sp4.x86_64",
					"openEuler-22.03-LTS-SP4:kernel-headers-5.10.0-224.0.0.123.oe2203sp4.x86_64",
					"openEuler-22.03-LTS-SP4:kernel-source-5.10.0-224.0.0.123.oe2203sp4.x86_64",
					"openEuler-22.03-LTS-SP4:kernel-tools-5.10.0-224.0.0.123.oe2203sp4.x86_64",
					"openEuler-22.03-LTS-SP4:kernel-tools-debuginfo-5.10.0-224.0.0.123.oe2203sp4.x86_64",
					"openEuler-22.03-LTS-SP4:kernel-tools-devel-5.10.0-224.0.0.123.oe2203sp4.x86_64",
					"openEuler-22.03-LTS-SP4:perf-5.10.0-224.0.0.123.oe2203sp4.x86_64",
					"openEuler-22.03-LTS-SP4:perf-debuginfo-5.10.0-224.0.0.123.oe2203sp4.x86_64",
					"openEuler-22.03-LTS-SP4:python3-perf-5.10.0-224.0.0.123.oe2203sp4.x86_64",
					"openEuler-22.03-LTS-SP4:python3-perf-debuginfo-5.10.0-224.0.0.123.oe2203sp4.x86_64",
					"openEuler-22.03-LTS-SP4:kernel-5.10.0-224.0.0.123.oe2203sp4.src"
				]
			},
			"remediations":[
				{
					"product_ids":[
						"openEuler-22.03-LTS-SP4:bpftool-5.10.0-224.0.0.123.oe2203sp4.aarch64",
						"openEuler-22.03-LTS-SP4:bpftool-debuginfo-5.10.0-224.0.0.123.oe2203sp4.aarch64",
						"openEuler-22.03-LTS-SP4:kernel-5.10.0-224.0.0.123.oe2203sp4.aarch64",
						"openEuler-22.03-LTS-SP4:kernel-debuginfo-5.10.0-224.0.0.123.oe2203sp4.aarch64",
						"openEuler-22.03-LTS-SP4:kernel-debugsource-5.10.0-224.0.0.123.oe2203sp4.aarch64",
						"openEuler-22.03-LTS-SP4:kernel-devel-5.10.0-224.0.0.123.oe2203sp4.aarch64",
						"openEuler-22.03-LTS-SP4:kernel-headers-5.10.0-224.0.0.123.oe2203sp4.aarch64",
						"openEuler-22.03-LTS-SP4:kernel-source-5.10.0-224.0.0.123.oe2203sp4.aarch64",
						"openEuler-22.03-LTS-SP4:kernel-tools-5.10.0-224.0.0.123.oe2203sp4.aarch64",
						"openEuler-22.03-LTS-SP4:kernel-tools-debuginfo-5.10.0-224.0.0.123.oe2203sp4.aarch64",
						"openEuler-22.03-LTS-SP4:kernel-tools-devel-5.10.0-224.0.0.123.oe2203sp4.aarch64",
						"openEuler-22.03-LTS-SP4:perf-5.10.0-224.0.0.123.oe2203sp4.aarch64",
						"openEuler-22.03-LTS-SP4:perf-debuginfo-5.10.0-224.0.0.123.oe2203sp4.aarch64",
						"openEuler-22.03-LTS-SP4:python3-perf-5.10.0-224.0.0.123.oe2203sp4.aarch64",
						"openEuler-22.03-LTS-SP4:python3-perf-debuginfo-5.10.0-224.0.0.123.oe2203sp4.aarch64",
						"openEuler-22.03-LTS-SP4:bpftool-5.10.0-224.0.0.123.oe2203sp4.x86_64",
						"openEuler-22.03-LTS-SP4:bpftool-debuginfo-5.10.0-224.0.0.123.oe2203sp4.x86_64",
						"openEuler-22.03-LTS-SP4:kernel-5.10.0-224.0.0.123.oe2203sp4.x86_64",
						"openEuler-22.03-LTS-SP4:kernel-debuginfo-5.10.0-224.0.0.123.oe2203sp4.x86_64",
						"openEuler-22.03-LTS-SP4:kernel-debugsource-5.10.0-224.0.0.123.oe2203sp4.x86_64",
						"openEuler-22.03-LTS-SP4:kernel-devel-5.10.0-224.0.0.123.oe2203sp4.x86_64",
						"openEuler-22.03-LTS-SP4:kernel-headers-5.10.0-224.0.0.123.oe2203sp4.x86_64",
						"openEuler-22.03-LTS-SP4:kernel-source-5.10.0-224.0.0.123.oe2203sp4.x86_64",
						"openEuler-22.03-LTS-SP4:kernel-tools-5.10.0-224.0.0.123.oe2203sp4.x86_64",
						"openEuler-22.03-LTS-SP4:kernel-tools-debuginfo-5.10.0-224.0.0.123.oe2203sp4.x86_64",
						"openEuler-22.03-LTS-SP4:kernel-tools-devel-5.10.0-224.0.0.123.oe2203sp4.x86_64",
						"openEuler-22.03-LTS-SP4:perf-5.10.0-224.0.0.123.oe2203sp4.x86_64",
						"openEuler-22.03-LTS-SP4:perf-debuginfo-5.10.0-224.0.0.123.oe2203sp4.x86_64",
						"openEuler-22.03-LTS-SP4:python3-perf-5.10.0-224.0.0.123.oe2203sp4.x86_64",
						"openEuler-22.03-LTS-SP4:python3-perf-debuginfo-5.10.0-224.0.0.123.oe2203sp4.x86_64",
						"openEuler-22.03-LTS-SP4:kernel-5.10.0-224.0.0.123.oe2203sp4.src"
					],
					"details":"kernel security update",
					"category":"vendor_fix",
					"url":"https://www.openeuler.org/zh/security/security-bulletins/detail/?id=openEuler-SA-2024-2028"
				}
			],
			"scores":[
				{
					"cvss_v3":{
						"baseSeverity":"MEDIUM",
						"baseScore":4.7,
						"vectorString":"CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H",
						"version":"3.1"
					},
					"products":[
						"openEuler-22.03-LTS-SP4:bpftool-5.10.0-224.0.0.123.oe2203sp4.aarch64",
						"openEuler-22.03-LTS-SP4:bpftool-debuginfo-5.10.0-224.0.0.123.oe2203sp4.aarch64",
						"openEuler-22.03-LTS-SP4:kernel-5.10.0-224.0.0.123.oe2203sp4.aarch64",
						"openEuler-22.03-LTS-SP4:kernel-debuginfo-5.10.0-224.0.0.123.oe2203sp4.aarch64",
						"openEuler-22.03-LTS-SP4:kernel-debugsource-5.10.0-224.0.0.123.oe2203sp4.aarch64",
						"openEuler-22.03-LTS-SP4:kernel-devel-5.10.0-224.0.0.123.oe2203sp4.aarch64",
						"openEuler-22.03-LTS-SP4:kernel-headers-5.10.0-224.0.0.123.oe2203sp4.aarch64",
						"openEuler-22.03-LTS-SP4:kernel-source-5.10.0-224.0.0.123.oe2203sp4.aarch64",
						"openEuler-22.03-LTS-SP4:kernel-tools-5.10.0-224.0.0.123.oe2203sp4.aarch64",
						"openEuler-22.03-LTS-SP4:kernel-tools-debuginfo-5.10.0-224.0.0.123.oe2203sp4.aarch64",
						"openEuler-22.03-LTS-SP4:kernel-tools-devel-5.10.0-224.0.0.123.oe2203sp4.aarch64",
						"openEuler-22.03-LTS-SP4:perf-5.10.0-224.0.0.123.oe2203sp4.aarch64",
						"openEuler-22.03-LTS-SP4:perf-debuginfo-5.10.0-224.0.0.123.oe2203sp4.aarch64",
						"openEuler-22.03-LTS-SP4:python3-perf-5.10.0-224.0.0.123.oe2203sp4.aarch64",
						"openEuler-22.03-LTS-SP4:python3-perf-debuginfo-5.10.0-224.0.0.123.oe2203sp4.aarch64",
						"openEuler-22.03-LTS-SP4:bpftool-5.10.0-224.0.0.123.oe2203sp4.x86_64",
						"openEuler-22.03-LTS-SP4:bpftool-debuginfo-5.10.0-224.0.0.123.oe2203sp4.x86_64",
						"openEuler-22.03-LTS-SP4:kernel-5.10.0-224.0.0.123.oe2203sp4.x86_64",
						"openEuler-22.03-LTS-SP4:kernel-debuginfo-5.10.0-224.0.0.123.oe2203sp4.x86_64",
						"openEuler-22.03-LTS-SP4:kernel-debugsource-5.10.0-224.0.0.123.oe2203sp4.x86_64",
						"openEuler-22.03-LTS-SP4:kernel-devel-5.10.0-224.0.0.123.oe2203sp4.x86_64",
						"openEuler-22.03-LTS-SP4:kernel-headers-5.10.0-224.0.0.123.oe2203sp4.x86_64",
						"openEuler-22.03-LTS-SP4:kernel-source-5.10.0-224.0.0.123.oe2203sp4.x86_64",
						"openEuler-22.03-LTS-SP4:kernel-tools-5.10.0-224.0.0.123.oe2203sp4.x86_64",
						"openEuler-22.03-LTS-SP4:kernel-tools-debuginfo-5.10.0-224.0.0.123.oe2203sp4.x86_64",
						"openEuler-22.03-LTS-SP4:kernel-tools-devel-5.10.0-224.0.0.123.oe2203sp4.x86_64",
						"openEuler-22.03-LTS-SP4:perf-5.10.0-224.0.0.123.oe2203sp4.x86_64",
						"openEuler-22.03-LTS-SP4:perf-debuginfo-5.10.0-224.0.0.123.oe2203sp4.x86_64",
						"openEuler-22.03-LTS-SP4:python3-perf-5.10.0-224.0.0.123.oe2203sp4.x86_64",
						"openEuler-22.03-LTS-SP4:python3-perf-debuginfo-5.10.0-224.0.0.123.oe2203sp4.x86_64",
						"openEuler-22.03-LTS-SP4:kernel-5.10.0-224.0.0.123.oe2203sp4.src"
					]
				}
			],
			"threats":[
				{
					"details":"Medium",
					"category":"impact"
				}
			],
			"title":"CVE-2024-40966"
		},
		{
			"cve":"CVE-2024-41088",
			"notes":[
				{
					"text":"In the Linux kernel, the following vulnerability has been resolved:\n\ncan: mcp251xfd: fix infinite loop when xmit fails\n\nWhen the mcp251xfd_start_xmit() function fails, the driver stops\nprocessing messages, and the interrupt routine does not return,\nrunning indefinitely even after killing the running application.\n\nError messages:\n[  441.298819] mcp251xfd spi2.0 can0: ERROR in mcp251xfd_start_xmit: -16\n[  441.306498] mcp251xfd spi2.0 can0: Transmit Event FIFO buffer not empty. (seq=0x000017c7, tef_tail=0x000017cf, tef_head=0x000017d0, tx_head=0x000017d3).\n... and repeat forever.\n\nThe issue can be triggered when multiple devices share the same SPI\ninterface. And there is concurrent access to the bus.\n\nThe problem occurs because tx_ring->head increments even if\nmcp251xfd_start_xmit() fails. Consequently, the driver skips one TX\npackage while still expecting a response in\nmcp251xfd_handle_tefif_one().\n\nResolve the issue by starting a workqueue to write the tx obj\nsynchronously if err = -EBUSY. In case of another error, decrement\ntx_ring->head, remove skb from the echo stack, and drop the message.\n\n[mkl: use more imperative wording in patch description]",
					"category":"description",
					"title":"Vulnerability Description"
				}
			],
			"product_status":{
				"fixed":[
					"openEuler-22.03-LTS-SP4:bpftool-5.10.0-224.0.0.123.oe2203sp4.aarch64",
					"openEuler-22.03-LTS-SP4:bpftool-debuginfo-5.10.0-224.0.0.123.oe2203sp4.aarch64",
					"openEuler-22.03-LTS-SP4:kernel-5.10.0-224.0.0.123.oe2203sp4.aarch64",
					"openEuler-22.03-LTS-SP4:kernel-debuginfo-5.10.0-224.0.0.123.oe2203sp4.aarch64",
					"openEuler-22.03-LTS-SP4:kernel-debugsource-5.10.0-224.0.0.123.oe2203sp4.aarch64",
					"openEuler-22.03-LTS-SP4:kernel-devel-5.10.0-224.0.0.123.oe2203sp4.aarch64",
					"openEuler-22.03-LTS-SP4:kernel-headers-5.10.0-224.0.0.123.oe2203sp4.aarch64",
					"openEuler-22.03-LTS-SP4:kernel-source-5.10.0-224.0.0.123.oe2203sp4.aarch64",
					"openEuler-22.03-LTS-SP4:kernel-tools-5.10.0-224.0.0.123.oe2203sp4.aarch64",
					"openEuler-22.03-LTS-SP4:kernel-tools-debuginfo-5.10.0-224.0.0.123.oe2203sp4.aarch64",
					"openEuler-22.03-LTS-SP4:kernel-tools-devel-5.10.0-224.0.0.123.oe2203sp4.aarch64",
					"openEuler-22.03-LTS-SP4:perf-5.10.0-224.0.0.123.oe2203sp4.aarch64",
					"openEuler-22.03-LTS-SP4:perf-debuginfo-5.10.0-224.0.0.123.oe2203sp4.aarch64",
					"openEuler-22.03-LTS-SP4:python3-perf-5.10.0-224.0.0.123.oe2203sp4.aarch64",
					"openEuler-22.03-LTS-SP4:python3-perf-debuginfo-5.10.0-224.0.0.123.oe2203sp4.aarch64",
					"openEuler-22.03-LTS-SP4:bpftool-5.10.0-224.0.0.123.oe2203sp4.x86_64",
					"openEuler-22.03-LTS-SP4:bpftool-debuginfo-5.10.0-224.0.0.123.oe2203sp4.x86_64",
					"openEuler-22.03-LTS-SP4:kernel-5.10.0-224.0.0.123.oe2203sp4.x86_64",
					"openEuler-22.03-LTS-SP4:kernel-debuginfo-5.10.0-224.0.0.123.oe2203sp4.x86_64",
					"openEuler-22.03-LTS-SP4:kernel-debugsource-5.10.0-224.0.0.123.oe2203sp4.x86_64",
					"openEuler-22.03-LTS-SP4:kernel-devel-5.10.0-224.0.0.123.oe2203sp4.x86_64",
					"openEuler-22.03-LTS-SP4:kernel-headers-5.10.0-224.0.0.123.oe2203sp4.x86_64",
					"openEuler-22.03-LTS-SP4:kernel-source-5.10.0-224.0.0.123.oe2203sp4.x86_64",
					"openEuler-22.03-LTS-SP4:kernel-tools-5.10.0-224.0.0.123.oe2203sp4.x86_64",
					"openEuler-22.03-LTS-SP4:kernel-tools-debuginfo-5.10.0-224.0.0.123.oe2203sp4.x86_64",
					"openEuler-22.03-LTS-SP4:kernel-tools-devel-5.10.0-224.0.0.123.oe2203sp4.x86_64",
					"openEuler-22.03-LTS-SP4:perf-5.10.0-224.0.0.123.oe2203sp4.x86_64",
					"openEuler-22.03-LTS-SP4:perf-debuginfo-5.10.0-224.0.0.123.oe2203sp4.x86_64",
					"openEuler-22.03-LTS-SP4:python3-perf-5.10.0-224.0.0.123.oe2203sp4.x86_64",
					"openEuler-22.03-LTS-SP4:python3-perf-debuginfo-5.10.0-224.0.0.123.oe2203sp4.x86_64",
					"openEuler-22.03-LTS-SP4:kernel-5.10.0-224.0.0.123.oe2203sp4.src"
				]
			},
			"remediations":[
				{
					"product_ids":[
						"openEuler-22.03-LTS-SP4:bpftool-5.10.0-224.0.0.123.oe2203sp4.aarch64",
						"openEuler-22.03-LTS-SP4:bpftool-debuginfo-5.10.0-224.0.0.123.oe2203sp4.aarch64",
						"openEuler-22.03-LTS-SP4:kernel-5.10.0-224.0.0.123.oe2203sp4.aarch64",
						"openEuler-22.03-LTS-SP4:kernel-debuginfo-5.10.0-224.0.0.123.oe2203sp4.aarch64",
						"openEuler-22.03-LTS-SP4:kernel-debugsource-5.10.0-224.0.0.123.oe2203sp4.aarch64",
						"openEuler-22.03-LTS-SP4:kernel-devel-5.10.0-224.0.0.123.oe2203sp4.aarch64",
						"openEuler-22.03-LTS-SP4:kernel-headers-5.10.0-224.0.0.123.oe2203sp4.aarch64",
						"openEuler-22.03-LTS-SP4:kernel-source-5.10.0-224.0.0.123.oe2203sp4.aarch64",
						"openEuler-22.03-LTS-SP4:kernel-tools-5.10.0-224.0.0.123.oe2203sp4.aarch64",
						"openEuler-22.03-LTS-SP4:kernel-tools-debuginfo-5.10.0-224.0.0.123.oe2203sp4.aarch64",
						"openEuler-22.03-LTS-SP4:kernel-tools-devel-5.10.0-224.0.0.123.oe2203sp4.aarch64",
						"openEuler-22.03-LTS-SP4:perf-5.10.0-224.0.0.123.oe2203sp4.aarch64",
						"openEuler-22.03-LTS-SP4:perf-debuginfo-5.10.0-224.0.0.123.oe2203sp4.aarch64",
						"openEuler-22.03-LTS-SP4:python3-perf-5.10.0-224.0.0.123.oe2203sp4.aarch64",
						"openEuler-22.03-LTS-SP4:python3-perf-debuginfo-5.10.0-224.0.0.123.oe2203sp4.aarch64",
						"openEuler-22.03-LTS-SP4:bpftool-5.10.0-224.0.0.123.oe2203sp4.x86_64",
						"openEuler-22.03-LTS-SP4:bpftool-debuginfo-5.10.0-224.0.0.123.oe2203sp4.x86_64",
						"openEuler-22.03-LTS-SP4:kernel-5.10.0-224.0.0.123.oe2203sp4.x86_64",
						"openEuler-22.03-LTS-SP4:kernel-debuginfo-5.10.0-224.0.0.123.oe2203sp4.x86_64",
						"openEuler-22.03-LTS-SP4:kernel-debugsource-5.10.0-224.0.0.123.oe2203sp4.x86_64",
						"openEuler-22.03-LTS-SP4:kernel-devel-5.10.0-224.0.0.123.oe2203sp4.x86_64",
						"openEuler-22.03-LTS-SP4:kernel-headers-5.10.0-224.0.0.123.oe2203sp4.x86_64",
						"openEuler-22.03-LTS-SP4:kernel-source-5.10.0-224.0.0.123.oe2203sp4.x86_64",
						"openEuler-22.03-LTS-SP4:kernel-tools-5.10.0-224.0.0.123.oe2203sp4.x86_64",
						"openEuler-22.03-LTS-SP4:kernel-tools-debuginfo-5.10.0-224.0.0.123.oe2203sp4.x86_64",
						"openEuler-22.03-LTS-SP4:kernel-tools-devel-5.10.0-224.0.0.123.oe2203sp4.x86_64",
						"openEuler-22.03-LTS-SP4:perf-5.10.0-224.0.0.123.oe2203sp4.x86_64",
						"openEuler-22.03-LTS-SP4:perf-debuginfo-5.10.0-224.0.0.123.oe2203sp4.x86_64",
						"openEuler-22.03-LTS-SP4:python3-perf-5.10.0-224.0.0.123.oe2203sp4.x86_64",
						"openEuler-22.03-LTS-SP4:python3-perf-debuginfo-5.10.0-224.0.0.123.oe2203sp4.x86_64",
						"openEuler-22.03-LTS-SP4:kernel-5.10.0-224.0.0.123.oe2203sp4.src"
					],
					"details":"kernel security update",
					"category":"vendor_fix",
					"url":"https://www.openeuler.org/zh/security/security-bulletins/detail/?id=openEuler-SA-2024-2028"
				}
			],
			"scores":[
				{
					"cvss_v3":{
						"baseSeverity":"MEDIUM",
						"baseScore":5.5,
						"vectorString":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
						"version":"3.1"
					},
					"products":[
						"openEuler-22.03-LTS-SP4:bpftool-5.10.0-224.0.0.123.oe2203sp4.aarch64",
						"openEuler-22.03-LTS-SP4:bpftool-debuginfo-5.10.0-224.0.0.123.oe2203sp4.aarch64",
						"openEuler-22.03-LTS-SP4:kernel-5.10.0-224.0.0.123.oe2203sp4.aarch64",
						"openEuler-22.03-LTS-SP4:kernel-debuginfo-5.10.0-224.0.0.123.oe2203sp4.aarch64",
						"openEuler-22.03-LTS-SP4:kernel-debugsource-5.10.0-224.0.0.123.oe2203sp4.aarch64",
						"openEuler-22.03-LTS-SP4:kernel-devel-5.10.0-224.0.0.123.oe2203sp4.aarch64",
						"openEuler-22.03-LTS-SP4:kernel-headers-5.10.0-224.0.0.123.oe2203sp4.aarch64",
						"openEuler-22.03-LTS-SP4:kernel-source-5.10.0-224.0.0.123.oe2203sp4.aarch64",
						"openEuler-22.03-LTS-SP4:kernel-tools-5.10.0-224.0.0.123.oe2203sp4.aarch64",
						"openEuler-22.03-LTS-SP4:kernel-tools-debuginfo-5.10.0-224.0.0.123.oe2203sp4.aarch64",
						"openEuler-22.03-LTS-SP4:kernel-tools-devel-5.10.0-224.0.0.123.oe2203sp4.aarch64",
						"openEuler-22.03-LTS-SP4:perf-5.10.0-224.0.0.123.oe2203sp4.aarch64",
						"openEuler-22.03-LTS-SP4:perf-debuginfo-5.10.0-224.0.0.123.oe2203sp4.aarch64",
						"openEuler-22.03-LTS-SP4:python3-perf-5.10.0-224.0.0.123.oe2203sp4.aarch64",
						"openEuler-22.03-LTS-SP4:python3-perf-debuginfo-5.10.0-224.0.0.123.oe2203sp4.aarch64",
						"openEuler-22.03-LTS-SP4:bpftool-5.10.0-224.0.0.123.oe2203sp4.x86_64",
						"openEuler-22.03-LTS-SP4:bpftool-debuginfo-5.10.0-224.0.0.123.oe2203sp4.x86_64",
						"openEuler-22.03-LTS-SP4:kernel-5.10.0-224.0.0.123.oe2203sp4.x86_64",
						"openEuler-22.03-LTS-SP4:kernel-debuginfo-5.10.0-224.0.0.123.oe2203sp4.x86_64",
						"openEuler-22.03-LTS-SP4:kernel-debugsource-5.10.0-224.0.0.123.oe2203sp4.x86_64",
						"openEuler-22.03-LTS-SP4:kernel-devel-5.10.0-224.0.0.123.oe2203sp4.x86_64",
						"openEuler-22.03-LTS-SP4:kernel-headers-5.10.0-224.0.0.123.oe2203sp4.x86_64",
						"openEuler-22.03-LTS-SP4:kernel-source-5.10.0-224.0.0.123.oe2203sp4.x86_64",
						"openEuler-22.03-LTS-SP4:kernel-tools-5.10.0-224.0.0.123.oe2203sp4.x86_64",
						"openEuler-22.03-LTS-SP4:kernel-tools-debuginfo-5.10.0-224.0.0.123.oe2203sp4.x86_64",
						"openEuler-22.03-LTS-SP4:kernel-tools-devel-5.10.0-224.0.0.123.oe2203sp4.x86_64",
						"openEuler-22.03-LTS-SP4:perf-5.10.0-224.0.0.123.oe2203sp4.x86_64",
						"openEuler-22.03-LTS-SP4:perf-debuginfo-5.10.0-224.0.0.123.oe2203sp4.x86_64",
						"openEuler-22.03-LTS-SP4:python3-perf-5.10.0-224.0.0.123.oe2203sp4.x86_64",
						"openEuler-22.03-LTS-SP4:python3-perf-debuginfo-5.10.0-224.0.0.123.oe2203sp4.x86_64",
						"openEuler-22.03-LTS-SP4:kernel-5.10.0-224.0.0.123.oe2203sp4.src"
					]
				}
			],
			"threats":[
				{
					"details":"Medium",
					"category":"impact"
				}
			],
			"title":"CVE-2024-41088"
		},
		{
			"cve":"CVE-2024-42070",
			"notes":[
				{
					"text":"In the Linux kernel, the following vulnerability has been resolved:\n\nnetfilter: nf_tables: fully validate NFT_DATA_VALUE on store to data registers\n\nregister store validation for NFT_DATA_VALUE is conditional, however,\nthe datatype is always either NFT_DATA_VALUE or NFT_DATA_VERDICT. This\nonly requires a new helper function to infer the register type from the\nset datatype so this conditional check can be removed. Otherwise,\npointer to chain object can be leaked through the registers.",
					"category":"description",
					"title":"Vulnerability Description"
				}
			],
			"product_status":{
				"fixed":[
					"openEuler-22.03-LTS-SP4:bpftool-5.10.0-224.0.0.123.oe2203sp4.aarch64",
					"openEuler-22.03-LTS-SP4:bpftool-debuginfo-5.10.0-224.0.0.123.oe2203sp4.aarch64",
					"openEuler-22.03-LTS-SP4:kernel-5.10.0-224.0.0.123.oe2203sp4.aarch64",
					"openEuler-22.03-LTS-SP4:kernel-debuginfo-5.10.0-224.0.0.123.oe2203sp4.aarch64",
					"openEuler-22.03-LTS-SP4:kernel-debugsource-5.10.0-224.0.0.123.oe2203sp4.aarch64",
					"openEuler-22.03-LTS-SP4:kernel-devel-5.10.0-224.0.0.123.oe2203sp4.aarch64",
					"openEuler-22.03-LTS-SP4:kernel-headers-5.10.0-224.0.0.123.oe2203sp4.aarch64",
					"openEuler-22.03-LTS-SP4:kernel-source-5.10.0-224.0.0.123.oe2203sp4.aarch64",
					"openEuler-22.03-LTS-SP4:kernel-tools-5.10.0-224.0.0.123.oe2203sp4.aarch64",
					"openEuler-22.03-LTS-SP4:kernel-tools-debuginfo-5.10.0-224.0.0.123.oe2203sp4.aarch64",
					"openEuler-22.03-LTS-SP4:kernel-tools-devel-5.10.0-224.0.0.123.oe2203sp4.aarch64",
					"openEuler-22.03-LTS-SP4:perf-5.10.0-224.0.0.123.oe2203sp4.aarch64",
					"openEuler-22.03-LTS-SP4:perf-debuginfo-5.10.0-224.0.0.123.oe2203sp4.aarch64",
					"openEuler-22.03-LTS-SP4:python3-perf-5.10.0-224.0.0.123.oe2203sp4.aarch64",
					"openEuler-22.03-LTS-SP4:python3-perf-debuginfo-5.10.0-224.0.0.123.oe2203sp4.aarch64",
					"openEuler-22.03-LTS-SP4:bpftool-5.10.0-224.0.0.123.oe2203sp4.x86_64",
					"openEuler-22.03-LTS-SP4:bpftool-debuginfo-5.10.0-224.0.0.123.oe2203sp4.x86_64",
					"openEuler-22.03-LTS-SP4:kernel-5.10.0-224.0.0.123.oe2203sp4.x86_64",
					"openEuler-22.03-LTS-SP4:kernel-debuginfo-5.10.0-224.0.0.123.oe2203sp4.x86_64",
					"openEuler-22.03-LTS-SP4:kernel-debugsource-5.10.0-224.0.0.123.oe2203sp4.x86_64",
					"openEuler-22.03-LTS-SP4:kernel-devel-5.10.0-224.0.0.123.oe2203sp4.x86_64",
					"openEuler-22.03-LTS-SP4:kernel-headers-5.10.0-224.0.0.123.oe2203sp4.x86_64",
					"openEuler-22.03-LTS-SP4:kernel-source-5.10.0-224.0.0.123.oe2203sp4.x86_64",
					"openEuler-22.03-LTS-SP4:kernel-tools-5.10.0-224.0.0.123.oe2203sp4.x86_64",
					"openEuler-22.03-LTS-SP4:kernel-tools-debuginfo-5.10.0-224.0.0.123.oe2203sp4.x86_64",
					"openEuler-22.03-LTS-SP4:kernel-tools-devel-5.10.0-224.0.0.123.oe2203sp4.x86_64",
					"openEuler-22.03-LTS-SP4:perf-5.10.0-224.0.0.123.oe2203sp4.x86_64",
					"openEuler-22.03-LTS-SP4:perf-debuginfo-5.10.0-224.0.0.123.oe2203sp4.x86_64",
					"openEuler-22.03-LTS-SP4:python3-perf-5.10.0-224.0.0.123.oe2203sp4.x86_64",
					"openEuler-22.03-LTS-SP4:python3-perf-debuginfo-5.10.0-224.0.0.123.oe2203sp4.x86_64",
					"openEuler-22.03-LTS-SP4:kernel-5.10.0-224.0.0.123.oe2203sp4.src"
				]
			},
			"remediations":[
				{
					"product_ids":[
						"openEuler-22.03-LTS-SP4:bpftool-5.10.0-224.0.0.123.oe2203sp4.aarch64",
						"openEuler-22.03-LTS-SP4:bpftool-debuginfo-5.10.0-224.0.0.123.oe2203sp4.aarch64",
						"openEuler-22.03-LTS-SP4:kernel-5.10.0-224.0.0.123.oe2203sp4.aarch64",
						"openEuler-22.03-LTS-SP4:kernel-debuginfo-5.10.0-224.0.0.123.oe2203sp4.aarch64",
						"openEuler-22.03-LTS-SP4:kernel-debugsource-5.10.0-224.0.0.123.oe2203sp4.aarch64",
						"openEuler-22.03-LTS-SP4:kernel-devel-5.10.0-224.0.0.123.oe2203sp4.aarch64",
						"openEuler-22.03-LTS-SP4:kernel-headers-5.10.0-224.0.0.123.oe2203sp4.aarch64",
						"openEuler-22.03-LTS-SP4:kernel-source-5.10.0-224.0.0.123.oe2203sp4.aarch64",
						"openEuler-22.03-LTS-SP4:kernel-tools-5.10.0-224.0.0.123.oe2203sp4.aarch64",
						"openEuler-22.03-LTS-SP4:kernel-tools-debuginfo-5.10.0-224.0.0.123.oe2203sp4.aarch64",
						"openEuler-22.03-LTS-SP4:kernel-tools-devel-5.10.0-224.0.0.123.oe2203sp4.aarch64",
						"openEuler-22.03-LTS-SP4:perf-5.10.0-224.0.0.123.oe2203sp4.aarch64",
						"openEuler-22.03-LTS-SP4:perf-debuginfo-5.10.0-224.0.0.123.oe2203sp4.aarch64",
						"openEuler-22.03-LTS-SP4:python3-perf-5.10.0-224.0.0.123.oe2203sp4.aarch64",
						"openEuler-22.03-LTS-SP4:python3-perf-debuginfo-5.10.0-224.0.0.123.oe2203sp4.aarch64",
						"openEuler-22.03-LTS-SP4:bpftool-5.10.0-224.0.0.123.oe2203sp4.x86_64",
						"openEuler-22.03-LTS-SP4:bpftool-debuginfo-5.10.0-224.0.0.123.oe2203sp4.x86_64",
						"openEuler-22.03-LTS-SP4:kernel-5.10.0-224.0.0.123.oe2203sp4.x86_64",
						"openEuler-22.03-LTS-SP4:kernel-debuginfo-5.10.0-224.0.0.123.oe2203sp4.x86_64",
						"openEuler-22.03-LTS-SP4:kernel-debugsource-5.10.0-224.0.0.123.oe2203sp4.x86_64",
						"openEuler-22.03-LTS-SP4:kernel-devel-5.10.0-224.0.0.123.oe2203sp4.x86_64",
						"openEuler-22.03-LTS-SP4:kernel-headers-5.10.0-224.0.0.123.oe2203sp4.x86_64",
						"openEuler-22.03-LTS-SP4:kernel-source-5.10.0-224.0.0.123.oe2203sp4.x86_64",
						"openEuler-22.03-LTS-SP4:kernel-tools-5.10.0-224.0.0.123.oe2203sp4.x86_64",
						"openEuler-22.03-LTS-SP4:kernel-tools-debuginfo-5.10.0-224.0.0.123.oe2203sp4.x86_64",
						"openEuler-22.03-LTS-SP4:kernel-tools-devel-5.10.0-224.0.0.123.oe2203sp4.x86_64",
						"openEuler-22.03-LTS-SP4:perf-5.10.0-224.0.0.123.oe2203sp4.x86_64",
						"openEuler-22.03-LTS-SP4:perf-debuginfo-5.10.0-224.0.0.123.oe2203sp4.x86_64",
						"openEuler-22.03-LTS-SP4:python3-perf-5.10.0-224.0.0.123.oe2203sp4.x86_64",
						"openEuler-22.03-LTS-SP4:python3-perf-debuginfo-5.10.0-224.0.0.123.oe2203sp4.x86_64",
						"openEuler-22.03-LTS-SP4:kernel-5.10.0-224.0.0.123.oe2203sp4.src"
					],
					"details":"kernel security update",
					"category":"vendor_fix",
					"url":"https://www.openeuler.org/zh/security/security-bulletins/detail/?id=openEuler-SA-2024-2028"
				}
			],
			"scores":[
				{
					"cvss_v3":{
						"baseSeverity":"MEDIUM",
						"baseScore":5.5,
						"vectorString":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
						"version":"3.1"
					},
					"products":[
						"openEuler-22.03-LTS-SP4:bpftool-5.10.0-224.0.0.123.oe2203sp4.aarch64",
						"openEuler-22.03-LTS-SP4:bpftool-debuginfo-5.10.0-224.0.0.123.oe2203sp4.aarch64",
						"openEuler-22.03-LTS-SP4:kernel-5.10.0-224.0.0.123.oe2203sp4.aarch64",
						"openEuler-22.03-LTS-SP4:kernel-debuginfo-5.10.0-224.0.0.123.oe2203sp4.aarch64",
						"openEuler-22.03-LTS-SP4:kernel-debugsource-5.10.0-224.0.0.123.oe2203sp4.aarch64",
						"openEuler-22.03-LTS-SP4:kernel-devel-5.10.0-224.0.0.123.oe2203sp4.aarch64",
						"openEuler-22.03-LTS-SP4:kernel-headers-5.10.0-224.0.0.123.oe2203sp4.aarch64",
						"openEuler-22.03-LTS-SP4:kernel-source-5.10.0-224.0.0.123.oe2203sp4.aarch64",
						"openEuler-22.03-LTS-SP4:kernel-tools-5.10.0-224.0.0.123.oe2203sp4.aarch64",
						"openEuler-22.03-LTS-SP4:kernel-tools-debuginfo-5.10.0-224.0.0.123.oe2203sp4.aarch64",
						"openEuler-22.03-LTS-SP4:kernel-tools-devel-5.10.0-224.0.0.123.oe2203sp4.aarch64",
						"openEuler-22.03-LTS-SP4:perf-5.10.0-224.0.0.123.oe2203sp4.aarch64",
						"openEuler-22.03-LTS-SP4:perf-debuginfo-5.10.0-224.0.0.123.oe2203sp4.aarch64",
						"openEuler-22.03-LTS-SP4:python3-perf-5.10.0-224.0.0.123.oe2203sp4.aarch64",
						"openEuler-22.03-LTS-SP4:python3-perf-debuginfo-5.10.0-224.0.0.123.oe2203sp4.aarch64",
						"openEuler-22.03-LTS-SP4:bpftool-5.10.0-224.0.0.123.oe2203sp4.x86_64",
						"openEuler-22.03-LTS-SP4:bpftool-debuginfo-5.10.0-224.0.0.123.oe2203sp4.x86_64",
						"openEuler-22.03-LTS-SP4:kernel-5.10.0-224.0.0.123.oe2203sp4.x86_64",
						"openEuler-22.03-LTS-SP4:kernel-debuginfo-5.10.0-224.0.0.123.oe2203sp4.x86_64",
						"openEuler-22.03-LTS-SP4:kernel-debugsource-5.10.0-224.0.0.123.oe2203sp4.x86_64",
						"openEuler-22.03-LTS-SP4:kernel-devel-5.10.0-224.0.0.123.oe2203sp4.x86_64",
						"openEuler-22.03-LTS-SP4:kernel-headers-5.10.0-224.0.0.123.oe2203sp4.x86_64",
						"openEuler-22.03-LTS-SP4:kernel-source-5.10.0-224.0.0.123.oe2203sp4.x86_64",
						"openEuler-22.03-LTS-SP4:kernel-tools-5.10.0-224.0.0.123.oe2203sp4.x86_64",
						"openEuler-22.03-LTS-SP4:kernel-tools-debuginfo-5.10.0-224.0.0.123.oe2203sp4.x86_64",
						"openEuler-22.03-LTS-SP4:kernel-tools-devel-5.10.0-224.0.0.123.oe2203sp4.x86_64",
						"openEuler-22.03-LTS-SP4:perf-5.10.0-224.0.0.123.oe2203sp4.x86_64",
						"openEuler-22.03-LTS-SP4:perf-debuginfo-5.10.0-224.0.0.123.oe2203sp4.x86_64",
						"openEuler-22.03-LTS-SP4:python3-perf-5.10.0-224.0.0.123.oe2203sp4.x86_64",
						"openEuler-22.03-LTS-SP4:python3-perf-debuginfo-5.10.0-224.0.0.123.oe2203sp4.x86_64",
						"openEuler-22.03-LTS-SP4:kernel-5.10.0-224.0.0.123.oe2203sp4.src"
					]
				}
			],
			"threats":[
				{
					"details":"Medium",
					"category":"impact"
				}
			],
			"title":"CVE-2024-42070"
		},
		{
			"cve":"CVE-2024-42127",
			"notes":[
				{
					"text":"In the Linux kernel, the following vulnerability has been resolved:\n\ndrm/lima: fix shared irq handling on driver remove\n\nlima uses a shared interrupt, so the interrupt handlers must be prepared\nto be called at any time. At driver removal time, the clocks are\ndisabled early and the interrupts stay registered until the very end of\nthe remove process due to the devm usage.\nThis is potentially a bug as the interrupts access device registers\nwhich assumes clocks are enabled. A crash can be triggered by removing\nthe driver in a kernel with CONFIG_DEBUG_SHIRQ enabled.\nThis patch frees the interrupts at each lima device finishing callback\nso that the handlers are already unregistered by the time we fully\ndisable clocks.",
					"category":"description",
					"title":"Vulnerability Description"
				}
			],
			"product_status":{
				"fixed":[
					"openEuler-22.03-LTS-SP4:bpftool-5.10.0-224.0.0.123.oe2203sp4.aarch64",
					"openEuler-22.03-LTS-SP4:bpftool-debuginfo-5.10.0-224.0.0.123.oe2203sp4.aarch64",
					"openEuler-22.03-LTS-SP4:kernel-5.10.0-224.0.0.123.oe2203sp4.aarch64",
					"openEuler-22.03-LTS-SP4:kernel-debuginfo-5.10.0-224.0.0.123.oe2203sp4.aarch64",
					"openEuler-22.03-LTS-SP4:kernel-debugsource-5.10.0-224.0.0.123.oe2203sp4.aarch64",
					"openEuler-22.03-LTS-SP4:kernel-devel-5.10.0-224.0.0.123.oe2203sp4.aarch64",
					"openEuler-22.03-LTS-SP4:kernel-headers-5.10.0-224.0.0.123.oe2203sp4.aarch64",
					"openEuler-22.03-LTS-SP4:kernel-source-5.10.0-224.0.0.123.oe2203sp4.aarch64",
					"openEuler-22.03-LTS-SP4:kernel-tools-5.10.0-224.0.0.123.oe2203sp4.aarch64",
					"openEuler-22.03-LTS-SP4:kernel-tools-debuginfo-5.10.0-224.0.0.123.oe2203sp4.aarch64",
					"openEuler-22.03-LTS-SP4:kernel-tools-devel-5.10.0-224.0.0.123.oe2203sp4.aarch64",
					"openEuler-22.03-LTS-SP4:perf-5.10.0-224.0.0.123.oe2203sp4.aarch64",
					"openEuler-22.03-LTS-SP4:perf-debuginfo-5.10.0-224.0.0.123.oe2203sp4.aarch64",
					"openEuler-22.03-LTS-SP4:python3-perf-5.10.0-224.0.0.123.oe2203sp4.aarch64",
					"openEuler-22.03-LTS-SP4:python3-perf-debuginfo-5.10.0-224.0.0.123.oe2203sp4.aarch64",
					"openEuler-22.03-LTS-SP4:bpftool-5.10.0-224.0.0.123.oe2203sp4.x86_64",
					"openEuler-22.03-LTS-SP4:bpftool-debuginfo-5.10.0-224.0.0.123.oe2203sp4.x86_64",
					"openEuler-22.03-LTS-SP4:kernel-5.10.0-224.0.0.123.oe2203sp4.x86_64",
					"openEuler-22.03-LTS-SP4:kernel-debuginfo-5.10.0-224.0.0.123.oe2203sp4.x86_64",
					"openEuler-22.03-LTS-SP4:kernel-debugsource-5.10.0-224.0.0.123.oe2203sp4.x86_64",
					"openEuler-22.03-LTS-SP4:kernel-devel-5.10.0-224.0.0.123.oe2203sp4.x86_64",
					"openEuler-22.03-LTS-SP4:kernel-headers-5.10.0-224.0.0.123.oe2203sp4.x86_64",
					"openEuler-22.03-LTS-SP4:kernel-source-5.10.0-224.0.0.123.oe2203sp4.x86_64",
					"openEuler-22.03-LTS-SP4:kernel-tools-5.10.0-224.0.0.123.oe2203sp4.x86_64",
					"openEuler-22.03-LTS-SP4:kernel-tools-debuginfo-5.10.0-224.0.0.123.oe2203sp4.x86_64",
					"openEuler-22.03-LTS-SP4:kernel-tools-devel-5.10.0-224.0.0.123.oe2203sp4.x86_64",
					"openEuler-22.03-LTS-SP4:perf-5.10.0-224.0.0.123.oe2203sp4.x86_64",
					"openEuler-22.03-LTS-SP4:perf-debuginfo-5.10.0-224.0.0.123.oe2203sp4.x86_64",
					"openEuler-22.03-LTS-SP4:python3-perf-5.10.0-224.0.0.123.oe2203sp4.x86_64",
					"openEuler-22.03-LTS-SP4:python3-perf-debuginfo-5.10.0-224.0.0.123.oe2203sp4.x86_64",
					"openEuler-22.03-LTS-SP4:kernel-5.10.0-224.0.0.123.oe2203sp4.src"
				]
			},
			"remediations":[
				{
					"product_ids":[
						"openEuler-22.03-LTS-SP4:bpftool-5.10.0-224.0.0.123.oe2203sp4.aarch64",
						"openEuler-22.03-LTS-SP4:bpftool-debuginfo-5.10.0-224.0.0.123.oe2203sp4.aarch64",
						"openEuler-22.03-LTS-SP4:kernel-5.10.0-224.0.0.123.oe2203sp4.aarch64",
						"openEuler-22.03-LTS-SP4:kernel-debuginfo-5.10.0-224.0.0.123.oe2203sp4.aarch64",
						"openEuler-22.03-LTS-SP4:kernel-debugsource-5.10.0-224.0.0.123.oe2203sp4.aarch64",
						"openEuler-22.03-LTS-SP4:kernel-devel-5.10.0-224.0.0.123.oe2203sp4.aarch64",
						"openEuler-22.03-LTS-SP4:kernel-headers-5.10.0-224.0.0.123.oe2203sp4.aarch64",
						"openEuler-22.03-LTS-SP4:kernel-source-5.10.0-224.0.0.123.oe2203sp4.aarch64",
						"openEuler-22.03-LTS-SP4:kernel-tools-5.10.0-224.0.0.123.oe2203sp4.aarch64",
						"openEuler-22.03-LTS-SP4:kernel-tools-debuginfo-5.10.0-224.0.0.123.oe2203sp4.aarch64",
						"openEuler-22.03-LTS-SP4:kernel-tools-devel-5.10.0-224.0.0.123.oe2203sp4.aarch64",
						"openEuler-22.03-LTS-SP4:perf-5.10.0-224.0.0.123.oe2203sp4.aarch64",
						"openEuler-22.03-LTS-SP4:perf-debuginfo-5.10.0-224.0.0.123.oe2203sp4.aarch64",
						"openEuler-22.03-LTS-SP4:python3-perf-5.10.0-224.0.0.123.oe2203sp4.aarch64",
						"openEuler-22.03-LTS-SP4:python3-perf-debuginfo-5.10.0-224.0.0.123.oe2203sp4.aarch64",
						"openEuler-22.03-LTS-SP4:bpftool-5.10.0-224.0.0.123.oe2203sp4.x86_64",
						"openEuler-22.03-LTS-SP4:bpftool-debuginfo-5.10.0-224.0.0.123.oe2203sp4.x86_64",
						"openEuler-22.03-LTS-SP4:kernel-5.10.0-224.0.0.123.oe2203sp4.x86_64",
						"openEuler-22.03-LTS-SP4:kernel-debuginfo-5.10.0-224.0.0.123.oe2203sp4.x86_64",
						"openEuler-22.03-LTS-SP4:kernel-debugsource-5.10.0-224.0.0.123.oe2203sp4.x86_64",
						"openEuler-22.03-LTS-SP4:kernel-devel-5.10.0-224.0.0.123.oe2203sp4.x86_64",
						"openEuler-22.03-LTS-SP4:kernel-headers-5.10.0-224.0.0.123.oe2203sp4.x86_64",
						"openEuler-22.03-LTS-SP4:kernel-source-5.10.0-224.0.0.123.oe2203sp4.x86_64",
						"openEuler-22.03-LTS-SP4:kernel-tools-5.10.0-224.0.0.123.oe2203sp4.x86_64",
						"openEuler-22.03-LTS-SP4:kernel-tools-debuginfo-5.10.0-224.0.0.123.oe2203sp4.x86_64",
						"openEuler-22.03-LTS-SP4:kernel-tools-devel-5.10.0-224.0.0.123.oe2203sp4.x86_64",
						"openEuler-22.03-LTS-SP4:perf-5.10.0-224.0.0.123.oe2203sp4.x86_64",
						"openEuler-22.03-LTS-SP4:perf-debuginfo-5.10.0-224.0.0.123.oe2203sp4.x86_64",
						"openEuler-22.03-LTS-SP4:python3-perf-5.10.0-224.0.0.123.oe2203sp4.x86_64",
						"openEuler-22.03-LTS-SP4:python3-perf-debuginfo-5.10.0-224.0.0.123.oe2203sp4.x86_64",
						"openEuler-22.03-LTS-SP4:kernel-5.10.0-224.0.0.123.oe2203sp4.src"
					],
					"details":"kernel security update",
					"category":"vendor_fix",
					"url":"https://www.openeuler.org/zh/security/security-bulletins/detail/?id=openEuler-SA-2024-2028"
				}
			],
			"scores":[
				{
					"cvss_v3":{
						"baseSeverity":"MEDIUM",
						"baseScore":5.5,
						"vectorString":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
						"version":"3.1"
					},
					"products":[
						"openEuler-22.03-LTS-SP4:bpftool-5.10.0-224.0.0.123.oe2203sp4.aarch64",
						"openEuler-22.03-LTS-SP4:bpftool-debuginfo-5.10.0-224.0.0.123.oe2203sp4.aarch64",
						"openEuler-22.03-LTS-SP4:kernel-5.10.0-224.0.0.123.oe2203sp4.aarch64",
						"openEuler-22.03-LTS-SP4:kernel-debuginfo-5.10.0-224.0.0.123.oe2203sp4.aarch64",
						"openEuler-22.03-LTS-SP4:kernel-debugsource-5.10.0-224.0.0.123.oe2203sp4.aarch64",
						"openEuler-22.03-LTS-SP4:kernel-devel-5.10.0-224.0.0.123.oe2203sp4.aarch64",
						"openEuler-22.03-LTS-SP4:kernel-headers-5.10.0-224.0.0.123.oe2203sp4.aarch64",
						"openEuler-22.03-LTS-SP4:kernel-source-5.10.0-224.0.0.123.oe2203sp4.aarch64",
						"openEuler-22.03-LTS-SP4:kernel-tools-5.10.0-224.0.0.123.oe2203sp4.aarch64",
						"openEuler-22.03-LTS-SP4:kernel-tools-debuginfo-5.10.0-224.0.0.123.oe2203sp4.aarch64",
						"openEuler-22.03-LTS-SP4:kernel-tools-devel-5.10.0-224.0.0.123.oe2203sp4.aarch64",
						"openEuler-22.03-LTS-SP4:perf-5.10.0-224.0.0.123.oe2203sp4.aarch64",
						"openEuler-22.03-LTS-SP4:perf-debuginfo-5.10.0-224.0.0.123.oe2203sp4.aarch64",
						"openEuler-22.03-LTS-SP4:python3-perf-5.10.0-224.0.0.123.oe2203sp4.aarch64",
						"openEuler-22.03-LTS-SP4:python3-perf-debuginfo-5.10.0-224.0.0.123.oe2203sp4.aarch64",
						"openEuler-22.03-LTS-SP4:bpftool-5.10.0-224.0.0.123.oe2203sp4.x86_64",
						"openEuler-22.03-LTS-SP4:bpftool-debuginfo-5.10.0-224.0.0.123.oe2203sp4.x86_64",
						"openEuler-22.03-LTS-SP4:kernel-5.10.0-224.0.0.123.oe2203sp4.x86_64",
						"openEuler-22.03-LTS-SP4:kernel-debuginfo-5.10.0-224.0.0.123.oe2203sp4.x86_64",
						"openEuler-22.03-LTS-SP4:kernel-debugsource-5.10.0-224.0.0.123.oe2203sp4.x86_64",
						"openEuler-22.03-LTS-SP4:kernel-devel-5.10.0-224.0.0.123.oe2203sp4.x86_64",
						"openEuler-22.03-LTS-SP4:kernel-headers-5.10.0-224.0.0.123.oe2203sp4.x86_64",
						"openEuler-22.03-LTS-SP4:kernel-source-5.10.0-224.0.0.123.oe2203sp4.x86_64",
						"openEuler-22.03-LTS-SP4:kernel-tools-5.10.0-224.0.0.123.oe2203sp4.x86_64",
						"openEuler-22.03-LTS-SP4:kernel-tools-debuginfo-5.10.0-224.0.0.123.oe2203sp4.x86_64",
						"openEuler-22.03-LTS-SP4:kernel-tools-devel-5.10.0-224.0.0.123.oe2203sp4.x86_64",
						"openEuler-22.03-LTS-SP4:perf-5.10.0-224.0.0.123.oe2203sp4.x86_64",
						"openEuler-22.03-LTS-SP4:perf-debuginfo-5.10.0-224.0.0.123.oe2203sp4.x86_64",
						"openEuler-22.03-LTS-SP4:python3-perf-5.10.0-224.0.0.123.oe2203sp4.x86_64",
						"openEuler-22.03-LTS-SP4:python3-perf-debuginfo-5.10.0-224.0.0.123.oe2203sp4.x86_64",
						"openEuler-22.03-LTS-SP4:kernel-5.10.0-224.0.0.123.oe2203sp4.src"
					]
				}
			],
			"threats":[
				{
					"details":"Medium",
					"category":"impact"
				}
			],
			"title":"CVE-2024-42127"
		},
		{
			"cve":"CVE-2024-42131",
			"notes":[
				{
					"text":"In the Linux kernel, the following vulnerability has been resolved:\n\nmm: avoid overflows in dirty throttling logic\n\nThe dirty throttling logic is interspersed with assumptions that dirty\nlimits in PAGE_SIZE units fit into 32-bit (so that various multiplications\nfit into 64-bits).  If limits end up being larger, we will hit overflows,\npossible divisions by 0 etc.  Fix these problems by never allowing so\nlarge dirty limits as they have dubious practical value anyway.  For\ndirty_bytes / dirty_background_bytes interfaces we can just refuse to set\nso large limits.  For dirty_ratio / dirty_background_ratio it isn't so\nsimple as the dirty limit is computed from the amount of available memory\nwhich can change due to memory hotplug etc.  So when converting dirty\nlimits from ratios to numbers of pages, we just don't allow the result to\nexceed UINT_MAX.\n\nThis is root-only triggerable problem which occurs when the operator\nsets dirty limits to >16 TB.",
					"category":"description",
					"title":"Vulnerability Description"
				}
			],
			"product_status":{
				"fixed":[
					"openEuler-22.03-LTS-SP4:bpftool-5.10.0-224.0.0.123.oe2203sp4.aarch64",
					"openEuler-22.03-LTS-SP4:bpftool-debuginfo-5.10.0-224.0.0.123.oe2203sp4.aarch64",
					"openEuler-22.03-LTS-SP4:kernel-5.10.0-224.0.0.123.oe2203sp4.aarch64",
					"openEuler-22.03-LTS-SP4:kernel-debuginfo-5.10.0-224.0.0.123.oe2203sp4.aarch64",
					"openEuler-22.03-LTS-SP4:kernel-debugsource-5.10.0-224.0.0.123.oe2203sp4.aarch64",
					"openEuler-22.03-LTS-SP4:kernel-devel-5.10.0-224.0.0.123.oe2203sp4.aarch64",
					"openEuler-22.03-LTS-SP4:kernel-headers-5.10.0-224.0.0.123.oe2203sp4.aarch64",
					"openEuler-22.03-LTS-SP4:kernel-source-5.10.0-224.0.0.123.oe2203sp4.aarch64",
					"openEuler-22.03-LTS-SP4:kernel-tools-5.10.0-224.0.0.123.oe2203sp4.aarch64",
					"openEuler-22.03-LTS-SP4:kernel-tools-debuginfo-5.10.0-224.0.0.123.oe2203sp4.aarch64",
					"openEuler-22.03-LTS-SP4:kernel-tools-devel-5.10.0-224.0.0.123.oe2203sp4.aarch64",
					"openEuler-22.03-LTS-SP4:perf-5.10.0-224.0.0.123.oe2203sp4.aarch64",
					"openEuler-22.03-LTS-SP4:perf-debuginfo-5.10.0-224.0.0.123.oe2203sp4.aarch64",
					"openEuler-22.03-LTS-SP4:python3-perf-5.10.0-224.0.0.123.oe2203sp4.aarch64",
					"openEuler-22.03-LTS-SP4:python3-perf-debuginfo-5.10.0-224.0.0.123.oe2203sp4.aarch64",
					"openEuler-22.03-LTS-SP4:bpftool-5.10.0-224.0.0.123.oe2203sp4.x86_64",
					"openEuler-22.03-LTS-SP4:bpftool-debuginfo-5.10.0-224.0.0.123.oe2203sp4.x86_64",
					"openEuler-22.03-LTS-SP4:kernel-5.10.0-224.0.0.123.oe2203sp4.x86_64",
					"openEuler-22.03-LTS-SP4:kernel-debuginfo-5.10.0-224.0.0.123.oe2203sp4.x86_64",
					"openEuler-22.03-LTS-SP4:kernel-debugsource-5.10.0-224.0.0.123.oe2203sp4.x86_64",
					"openEuler-22.03-LTS-SP4:kernel-devel-5.10.0-224.0.0.123.oe2203sp4.x86_64",
					"openEuler-22.03-LTS-SP4:kernel-headers-5.10.0-224.0.0.123.oe2203sp4.x86_64",
					"openEuler-22.03-LTS-SP4:kernel-source-5.10.0-224.0.0.123.oe2203sp4.x86_64",
					"openEuler-22.03-LTS-SP4:kernel-tools-5.10.0-224.0.0.123.oe2203sp4.x86_64",
					"openEuler-22.03-LTS-SP4:kernel-tools-debuginfo-5.10.0-224.0.0.123.oe2203sp4.x86_64",
					"openEuler-22.03-LTS-SP4:kernel-tools-devel-5.10.0-224.0.0.123.oe2203sp4.x86_64",
					"openEuler-22.03-LTS-SP4:perf-5.10.0-224.0.0.123.oe2203sp4.x86_64",
					"openEuler-22.03-LTS-SP4:perf-debuginfo-5.10.0-224.0.0.123.oe2203sp4.x86_64",
					"openEuler-22.03-LTS-SP4:python3-perf-5.10.0-224.0.0.123.oe2203sp4.x86_64",
					"openEuler-22.03-LTS-SP4:python3-perf-debuginfo-5.10.0-224.0.0.123.oe2203sp4.x86_64",
					"openEuler-22.03-LTS-SP4:kernel-5.10.0-224.0.0.123.oe2203sp4.src"
				]
			},
			"remediations":[
				{
					"product_ids":[
						"openEuler-22.03-LTS-SP4:bpftool-5.10.0-224.0.0.123.oe2203sp4.aarch64",
						"openEuler-22.03-LTS-SP4:bpftool-debuginfo-5.10.0-224.0.0.123.oe2203sp4.aarch64",
						"openEuler-22.03-LTS-SP4:kernel-5.10.0-224.0.0.123.oe2203sp4.aarch64",
						"openEuler-22.03-LTS-SP4:kernel-debuginfo-5.10.0-224.0.0.123.oe2203sp4.aarch64",
						"openEuler-22.03-LTS-SP4:kernel-debugsource-5.10.0-224.0.0.123.oe2203sp4.aarch64",
						"openEuler-22.03-LTS-SP4:kernel-devel-5.10.0-224.0.0.123.oe2203sp4.aarch64",
						"openEuler-22.03-LTS-SP4:kernel-headers-5.10.0-224.0.0.123.oe2203sp4.aarch64",
						"openEuler-22.03-LTS-SP4:kernel-source-5.10.0-224.0.0.123.oe2203sp4.aarch64",
						"openEuler-22.03-LTS-SP4:kernel-tools-5.10.0-224.0.0.123.oe2203sp4.aarch64",
						"openEuler-22.03-LTS-SP4:kernel-tools-debuginfo-5.10.0-224.0.0.123.oe2203sp4.aarch64",
						"openEuler-22.03-LTS-SP4:kernel-tools-devel-5.10.0-224.0.0.123.oe2203sp4.aarch64",
						"openEuler-22.03-LTS-SP4:perf-5.10.0-224.0.0.123.oe2203sp4.aarch64",
						"openEuler-22.03-LTS-SP4:perf-debuginfo-5.10.0-224.0.0.123.oe2203sp4.aarch64",
						"openEuler-22.03-LTS-SP4:python3-perf-5.10.0-224.0.0.123.oe2203sp4.aarch64",
						"openEuler-22.03-LTS-SP4:python3-perf-debuginfo-5.10.0-224.0.0.123.oe2203sp4.aarch64",
						"openEuler-22.03-LTS-SP4:bpftool-5.10.0-224.0.0.123.oe2203sp4.x86_64",
						"openEuler-22.03-LTS-SP4:bpftool-debuginfo-5.10.0-224.0.0.123.oe2203sp4.x86_64",
						"openEuler-22.03-LTS-SP4:kernel-5.10.0-224.0.0.123.oe2203sp4.x86_64",
						"openEuler-22.03-LTS-SP4:kernel-debuginfo-5.10.0-224.0.0.123.oe2203sp4.x86_64",
						"openEuler-22.03-LTS-SP4:kernel-debugsource-5.10.0-224.0.0.123.oe2203sp4.x86_64",
						"openEuler-22.03-LTS-SP4:kernel-devel-5.10.0-224.0.0.123.oe2203sp4.x86_64",
						"openEuler-22.03-LTS-SP4:kernel-headers-5.10.0-224.0.0.123.oe2203sp4.x86_64",
						"openEuler-22.03-LTS-SP4:kernel-source-5.10.0-224.0.0.123.oe2203sp4.x86_64",
						"openEuler-22.03-LTS-SP4:kernel-tools-5.10.0-224.0.0.123.oe2203sp4.x86_64",
						"openEuler-22.03-LTS-SP4:kernel-tools-debuginfo-5.10.0-224.0.0.123.oe2203sp4.x86_64",
						"openEuler-22.03-LTS-SP4:kernel-tools-devel-5.10.0-224.0.0.123.oe2203sp4.x86_64",
						"openEuler-22.03-LTS-SP4:perf-5.10.0-224.0.0.123.oe2203sp4.x86_64",
						"openEuler-22.03-LTS-SP4:perf-debuginfo-5.10.0-224.0.0.123.oe2203sp4.x86_64",
						"openEuler-22.03-LTS-SP4:python3-perf-5.10.0-224.0.0.123.oe2203sp4.x86_64",
						"openEuler-22.03-LTS-SP4:python3-perf-debuginfo-5.10.0-224.0.0.123.oe2203sp4.x86_64",
						"openEuler-22.03-LTS-SP4:kernel-5.10.0-224.0.0.123.oe2203sp4.src"
					],
					"details":"kernel security update",
					"category":"vendor_fix",
					"url":"https://www.openeuler.org/zh/security/security-bulletins/detail/?id=openEuler-SA-2024-2028"
				}
			],
			"scores":[
				{
					"cvss_v3":{
						"baseSeverity":"MEDIUM",
						"baseScore":5.5,
						"vectorString":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
						"version":"3.1"
					},
					"products":[
						"openEuler-22.03-LTS-SP4:bpftool-5.10.0-224.0.0.123.oe2203sp4.aarch64",
						"openEuler-22.03-LTS-SP4:bpftool-debuginfo-5.10.0-224.0.0.123.oe2203sp4.aarch64",
						"openEuler-22.03-LTS-SP4:kernel-5.10.0-224.0.0.123.oe2203sp4.aarch64",
						"openEuler-22.03-LTS-SP4:kernel-debuginfo-5.10.0-224.0.0.123.oe2203sp4.aarch64",
						"openEuler-22.03-LTS-SP4:kernel-debugsource-5.10.0-224.0.0.123.oe2203sp4.aarch64",
						"openEuler-22.03-LTS-SP4:kernel-devel-5.10.0-224.0.0.123.oe2203sp4.aarch64",
						"openEuler-22.03-LTS-SP4:kernel-headers-5.10.0-224.0.0.123.oe2203sp4.aarch64",
						"openEuler-22.03-LTS-SP4:kernel-source-5.10.0-224.0.0.123.oe2203sp4.aarch64",
						"openEuler-22.03-LTS-SP4:kernel-tools-5.10.0-224.0.0.123.oe2203sp4.aarch64",
						"openEuler-22.03-LTS-SP4:kernel-tools-debuginfo-5.10.0-224.0.0.123.oe2203sp4.aarch64",
						"openEuler-22.03-LTS-SP4:kernel-tools-devel-5.10.0-224.0.0.123.oe2203sp4.aarch64",
						"openEuler-22.03-LTS-SP4:perf-5.10.0-224.0.0.123.oe2203sp4.aarch64",
						"openEuler-22.03-LTS-SP4:perf-debuginfo-5.10.0-224.0.0.123.oe2203sp4.aarch64",
						"openEuler-22.03-LTS-SP4:python3-perf-5.10.0-224.0.0.123.oe2203sp4.aarch64",
						"openEuler-22.03-LTS-SP4:python3-perf-debuginfo-5.10.0-224.0.0.123.oe2203sp4.aarch64",
						"openEuler-22.03-LTS-SP4:bpftool-5.10.0-224.0.0.123.oe2203sp4.x86_64",
						"openEuler-22.03-LTS-SP4:bpftool-debuginfo-5.10.0-224.0.0.123.oe2203sp4.x86_64",
						"openEuler-22.03-LTS-SP4:kernel-5.10.0-224.0.0.123.oe2203sp4.x86_64",
						"openEuler-22.03-LTS-SP4:kernel-debuginfo-5.10.0-224.0.0.123.oe2203sp4.x86_64",
						"openEuler-22.03-LTS-SP4:kernel-debugsource-5.10.0-224.0.0.123.oe2203sp4.x86_64",
						"openEuler-22.03-LTS-SP4:kernel-devel-5.10.0-224.0.0.123.oe2203sp4.x86_64",
						"openEuler-22.03-LTS-SP4:kernel-headers-5.10.0-224.0.0.123.oe2203sp4.x86_64",
						"openEuler-22.03-LTS-SP4:kernel-source-5.10.0-224.0.0.123.oe2203sp4.x86_64",
						"openEuler-22.03-LTS-SP4:kernel-tools-5.10.0-224.0.0.123.oe2203sp4.x86_64",
						"openEuler-22.03-LTS-SP4:kernel-tools-debuginfo-5.10.0-224.0.0.123.oe2203sp4.x86_64",
						"openEuler-22.03-LTS-SP4:kernel-tools-devel-5.10.0-224.0.0.123.oe2203sp4.x86_64",
						"openEuler-22.03-LTS-SP4:perf-5.10.0-224.0.0.123.oe2203sp4.x86_64",
						"openEuler-22.03-LTS-SP4:perf-debuginfo-5.10.0-224.0.0.123.oe2203sp4.x86_64",
						"openEuler-22.03-LTS-SP4:python3-perf-5.10.0-224.0.0.123.oe2203sp4.x86_64",
						"openEuler-22.03-LTS-SP4:python3-perf-debuginfo-5.10.0-224.0.0.123.oe2203sp4.x86_64",
						"openEuler-22.03-LTS-SP4:kernel-5.10.0-224.0.0.123.oe2203sp4.src"
					]
				}
			],
			"threats":[
				{
					"details":"Medium",
					"category":"impact"
				}
			],
			"title":"CVE-2024-42131"
		},
		{
			"cve":"CVE-2024-42232",
			"notes":[
				{
					"text":"In the Linux kernel, the following vulnerability has been resolved:\n\nlibceph: fix race between delayed_work() and ceph_monc_stop()\n\nThe way the delayed work is handled in ceph_monc_stop() is prone to\nraces with mon_fault() and possibly also finish_hunting().  Both of\nthese can requeue the delayed work which wouldn't be canceled by any of\nthe following code in case that happens after cancel_delayed_work_sync()\nruns -- __close_session() doesn't mess with the delayed work in order\nto avoid interfering with the hunting interval logic.  This part was\nmissed in commit b5d91704f53e (\"libceph: behave in mon_fault() if\ncur_mon < 0\") and use-after-free can still ensue on monc and objects\nthat hang off of it, with monc->auth and monc->monmap being\nparticularly susceptible to quickly being reused.\n\nTo fix this:\n\n- clear monc->cur_mon and monc->hunting as part of closing the session\n  in ceph_monc_stop()\n- bail from delayed_work() if monc->cur_mon is cleared, similar to how\n  it's done in mon_fault() and finish_hunting() (based on monc->hunting)\n- call cancel_delayed_work_sync() after the session is closed",
					"category":"description",
					"title":"Vulnerability Description"
				}
			],
			"product_status":{
				"fixed":[
					"openEuler-22.03-LTS-SP4:bpftool-5.10.0-224.0.0.123.oe2203sp4.aarch64",
					"openEuler-22.03-LTS-SP4:bpftool-debuginfo-5.10.0-224.0.0.123.oe2203sp4.aarch64",
					"openEuler-22.03-LTS-SP4:kernel-5.10.0-224.0.0.123.oe2203sp4.aarch64",
					"openEuler-22.03-LTS-SP4:kernel-debuginfo-5.10.0-224.0.0.123.oe2203sp4.aarch64",
					"openEuler-22.03-LTS-SP4:kernel-debugsource-5.10.0-224.0.0.123.oe2203sp4.aarch64",
					"openEuler-22.03-LTS-SP4:kernel-devel-5.10.0-224.0.0.123.oe2203sp4.aarch64",
					"openEuler-22.03-LTS-SP4:kernel-headers-5.10.0-224.0.0.123.oe2203sp4.aarch64",
					"openEuler-22.03-LTS-SP4:kernel-source-5.10.0-224.0.0.123.oe2203sp4.aarch64",
					"openEuler-22.03-LTS-SP4:kernel-tools-5.10.0-224.0.0.123.oe2203sp4.aarch64",
					"openEuler-22.03-LTS-SP4:kernel-tools-debuginfo-5.10.0-224.0.0.123.oe2203sp4.aarch64",
					"openEuler-22.03-LTS-SP4:kernel-tools-devel-5.10.0-224.0.0.123.oe2203sp4.aarch64",
					"openEuler-22.03-LTS-SP4:perf-5.10.0-224.0.0.123.oe2203sp4.aarch64",
					"openEuler-22.03-LTS-SP4:perf-debuginfo-5.10.0-224.0.0.123.oe2203sp4.aarch64",
					"openEuler-22.03-LTS-SP4:python3-perf-5.10.0-224.0.0.123.oe2203sp4.aarch64",
					"openEuler-22.03-LTS-SP4:python3-perf-debuginfo-5.10.0-224.0.0.123.oe2203sp4.aarch64",
					"openEuler-22.03-LTS-SP4:bpftool-5.10.0-224.0.0.123.oe2203sp4.x86_64",
					"openEuler-22.03-LTS-SP4:bpftool-debuginfo-5.10.0-224.0.0.123.oe2203sp4.x86_64",
					"openEuler-22.03-LTS-SP4:kernel-5.10.0-224.0.0.123.oe2203sp4.x86_64",
					"openEuler-22.03-LTS-SP4:kernel-debuginfo-5.10.0-224.0.0.123.oe2203sp4.x86_64",
					"openEuler-22.03-LTS-SP4:kernel-debugsource-5.10.0-224.0.0.123.oe2203sp4.x86_64",
					"openEuler-22.03-LTS-SP4:kernel-devel-5.10.0-224.0.0.123.oe2203sp4.x86_64",
					"openEuler-22.03-LTS-SP4:kernel-headers-5.10.0-224.0.0.123.oe2203sp4.x86_64",
					"openEuler-22.03-LTS-SP4:kernel-source-5.10.0-224.0.0.123.oe2203sp4.x86_64",
					"openEuler-22.03-LTS-SP4:kernel-tools-5.10.0-224.0.0.123.oe2203sp4.x86_64",
					"openEuler-22.03-LTS-SP4:kernel-tools-debuginfo-5.10.0-224.0.0.123.oe2203sp4.x86_64",
					"openEuler-22.03-LTS-SP4:kernel-tools-devel-5.10.0-224.0.0.123.oe2203sp4.x86_64",
					"openEuler-22.03-LTS-SP4:perf-5.10.0-224.0.0.123.oe2203sp4.x86_64",
					"openEuler-22.03-LTS-SP4:perf-debuginfo-5.10.0-224.0.0.123.oe2203sp4.x86_64",
					"openEuler-22.03-LTS-SP4:python3-perf-5.10.0-224.0.0.123.oe2203sp4.x86_64",
					"openEuler-22.03-LTS-SP4:python3-perf-debuginfo-5.10.0-224.0.0.123.oe2203sp4.x86_64",
					"openEuler-22.03-LTS-SP4:kernel-5.10.0-224.0.0.123.oe2203sp4.src"
				]
			},
			"remediations":[
				{
					"product_ids":[
						"openEuler-22.03-LTS-SP4:bpftool-5.10.0-224.0.0.123.oe2203sp4.aarch64",
						"openEuler-22.03-LTS-SP4:bpftool-debuginfo-5.10.0-224.0.0.123.oe2203sp4.aarch64",
						"openEuler-22.03-LTS-SP4:kernel-5.10.0-224.0.0.123.oe2203sp4.aarch64",
						"openEuler-22.03-LTS-SP4:kernel-debuginfo-5.10.0-224.0.0.123.oe2203sp4.aarch64",
						"openEuler-22.03-LTS-SP4:kernel-debugsource-5.10.0-224.0.0.123.oe2203sp4.aarch64",
						"openEuler-22.03-LTS-SP4:kernel-devel-5.10.0-224.0.0.123.oe2203sp4.aarch64",
						"openEuler-22.03-LTS-SP4:kernel-headers-5.10.0-224.0.0.123.oe2203sp4.aarch64",
						"openEuler-22.03-LTS-SP4:kernel-source-5.10.0-224.0.0.123.oe2203sp4.aarch64",
						"openEuler-22.03-LTS-SP4:kernel-tools-5.10.0-224.0.0.123.oe2203sp4.aarch64",
						"openEuler-22.03-LTS-SP4:kernel-tools-debuginfo-5.10.0-224.0.0.123.oe2203sp4.aarch64",
						"openEuler-22.03-LTS-SP4:kernel-tools-devel-5.10.0-224.0.0.123.oe2203sp4.aarch64",
						"openEuler-22.03-LTS-SP4:perf-5.10.0-224.0.0.123.oe2203sp4.aarch64",
						"openEuler-22.03-LTS-SP4:perf-debuginfo-5.10.0-224.0.0.123.oe2203sp4.aarch64",
						"openEuler-22.03-LTS-SP4:python3-perf-5.10.0-224.0.0.123.oe2203sp4.aarch64",
						"openEuler-22.03-LTS-SP4:python3-perf-debuginfo-5.10.0-224.0.0.123.oe2203sp4.aarch64",
						"openEuler-22.03-LTS-SP4:bpftool-5.10.0-224.0.0.123.oe2203sp4.x86_64",
						"openEuler-22.03-LTS-SP4:bpftool-debuginfo-5.10.0-224.0.0.123.oe2203sp4.x86_64",
						"openEuler-22.03-LTS-SP4:kernel-5.10.0-224.0.0.123.oe2203sp4.x86_64",
						"openEuler-22.03-LTS-SP4:kernel-debuginfo-5.10.0-224.0.0.123.oe2203sp4.x86_64",
						"openEuler-22.03-LTS-SP4:kernel-debugsource-5.10.0-224.0.0.123.oe2203sp4.x86_64",
						"openEuler-22.03-LTS-SP4:kernel-devel-5.10.0-224.0.0.123.oe2203sp4.x86_64",
						"openEuler-22.03-LTS-SP4:kernel-headers-5.10.0-224.0.0.123.oe2203sp4.x86_64",
						"openEuler-22.03-LTS-SP4:kernel-source-5.10.0-224.0.0.123.oe2203sp4.x86_64",
						"openEuler-22.03-LTS-SP4:kernel-tools-5.10.0-224.0.0.123.oe2203sp4.x86_64",
						"openEuler-22.03-LTS-SP4:kernel-tools-debuginfo-5.10.0-224.0.0.123.oe2203sp4.x86_64",
						"openEuler-22.03-LTS-SP4:kernel-tools-devel-5.10.0-224.0.0.123.oe2203sp4.x86_64",
						"openEuler-22.03-LTS-SP4:perf-5.10.0-224.0.0.123.oe2203sp4.x86_64",
						"openEuler-22.03-LTS-SP4:perf-debuginfo-5.10.0-224.0.0.123.oe2203sp4.x86_64",
						"openEuler-22.03-LTS-SP4:python3-perf-5.10.0-224.0.0.123.oe2203sp4.x86_64",
						"openEuler-22.03-LTS-SP4:python3-perf-debuginfo-5.10.0-224.0.0.123.oe2203sp4.x86_64",
						"openEuler-22.03-LTS-SP4:kernel-5.10.0-224.0.0.123.oe2203sp4.src"
					],
					"details":"kernel security update",
					"category":"vendor_fix",
					"url":"https://www.openeuler.org/zh/security/security-bulletins/detail/?id=openEuler-SA-2024-2028"
				}
			],
			"scores":[
				{
					"cvss_v3":{
						"baseSeverity":"MEDIUM",
						"baseScore":5.5,
						"vectorString":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
						"version":"3.1"
					},
					"products":[
						"openEuler-22.03-LTS-SP4:bpftool-5.10.0-224.0.0.123.oe2203sp4.aarch64",
						"openEuler-22.03-LTS-SP4:bpftool-debuginfo-5.10.0-224.0.0.123.oe2203sp4.aarch64",
						"openEuler-22.03-LTS-SP4:kernel-5.10.0-224.0.0.123.oe2203sp4.aarch64",
						"openEuler-22.03-LTS-SP4:kernel-debuginfo-5.10.0-224.0.0.123.oe2203sp4.aarch64",
						"openEuler-22.03-LTS-SP4:kernel-debugsource-5.10.0-224.0.0.123.oe2203sp4.aarch64",
						"openEuler-22.03-LTS-SP4:kernel-devel-5.10.0-224.0.0.123.oe2203sp4.aarch64",
						"openEuler-22.03-LTS-SP4:kernel-headers-5.10.0-224.0.0.123.oe2203sp4.aarch64",
						"openEuler-22.03-LTS-SP4:kernel-source-5.10.0-224.0.0.123.oe2203sp4.aarch64",
						"openEuler-22.03-LTS-SP4:kernel-tools-5.10.0-224.0.0.123.oe2203sp4.aarch64",
						"openEuler-22.03-LTS-SP4:kernel-tools-debuginfo-5.10.0-224.0.0.123.oe2203sp4.aarch64",
						"openEuler-22.03-LTS-SP4:kernel-tools-devel-5.10.0-224.0.0.123.oe2203sp4.aarch64",
						"openEuler-22.03-LTS-SP4:perf-5.10.0-224.0.0.123.oe2203sp4.aarch64",
						"openEuler-22.03-LTS-SP4:perf-debuginfo-5.10.0-224.0.0.123.oe2203sp4.aarch64",
						"openEuler-22.03-LTS-SP4:python3-perf-5.10.0-224.0.0.123.oe2203sp4.aarch64",
						"openEuler-22.03-LTS-SP4:python3-perf-debuginfo-5.10.0-224.0.0.123.oe2203sp4.aarch64",
						"openEuler-22.03-LTS-SP4:bpftool-5.10.0-224.0.0.123.oe2203sp4.x86_64",
						"openEuler-22.03-LTS-SP4:bpftool-debuginfo-5.10.0-224.0.0.123.oe2203sp4.x86_64",
						"openEuler-22.03-LTS-SP4:kernel-5.10.0-224.0.0.123.oe2203sp4.x86_64",
						"openEuler-22.03-LTS-SP4:kernel-debuginfo-5.10.0-224.0.0.123.oe2203sp4.x86_64",
						"openEuler-22.03-LTS-SP4:kernel-debugsource-5.10.0-224.0.0.123.oe2203sp4.x86_64",
						"openEuler-22.03-LTS-SP4:kernel-devel-5.10.0-224.0.0.123.oe2203sp4.x86_64",
						"openEuler-22.03-LTS-SP4:kernel-headers-5.10.0-224.0.0.123.oe2203sp4.x86_64",
						"openEuler-22.03-LTS-SP4:kernel-source-5.10.0-224.0.0.123.oe2203sp4.x86_64",
						"openEuler-22.03-LTS-SP4:kernel-tools-5.10.0-224.0.0.123.oe2203sp4.x86_64",
						"openEuler-22.03-LTS-SP4:kernel-tools-debuginfo-5.10.0-224.0.0.123.oe2203sp4.x86_64",
						"openEuler-22.03-LTS-SP4:kernel-tools-devel-5.10.0-224.0.0.123.oe2203sp4.x86_64",
						"openEuler-22.03-LTS-SP4:perf-5.10.0-224.0.0.123.oe2203sp4.x86_64",
						"openEuler-22.03-LTS-SP4:perf-debuginfo-5.10.0-224.0.0.123.oe2203sp4.x86_64",
						"openEuler-22.03-LTS-SP4:python3-perf-5.10.0-224.0.0.123.oe2203sp4.x86_64",
						"openEuler-22.03-LTS-SP4:python3-perf-debuginfo-5.10.0-224.0.0.123.oe2203sp4.x86_64",
						"openEuler-22.03-LTS-SP4:kernel-5.10.0-224.0.0.123.oe2203sp4.src"
					]
				}
			],
			"threats":[
				{
					"details":"Medium",
					"category":"impact"
				}
			],
			"title":"CVE-2024-42232"
		},
		{
			"cve":"CVE-2024-42236",
			"notes":[
				{
					"text":"In the Linux kernel, the following vulnerability has been resolved:\n\nusb: gadget: configfs: Prevent OOB read/write in usb_string_copy()\n\nUserspace provided string 's' could trivially have the length zero. Left\nunchecked this will firstly result in an OOB read in the form\n`if (str[0 - 1] == '\\n') followed closely by an OOB write in the form\n`str[0 - 1] = '\\0'`.\n\nThere is already a validating check to catch strings that are too long.\nLet's supply an additional check for invalid strings that are too short.",
					"category":"description",
					"title":"Vulnerability Description"
				}
			],
			"product_status":{
				"fixed":[
					"openEuler-22.03-LTS-SP4:bpftool-5.10.0-224.0.0.123.oe2203sp4.aarch64",
					"openEuler-22.03-LTS-SP4:bpftool-debuginfo-5.10.0-224.0.0.123.oe2203sp4.aarch64",
					"openEuler-22.03-LTS-SP4:kernel-5.10.0-224.0.0.123.oe2203sp4.aarch64",
					"openEuler-22.03-LTS-SP4:kernel-debuginfo-5.10.0-224.0.0.123.oe2203sp4.aarch64",
					"openEuler-22.03-LTS-SP4:kernel-debugsource-5.10.0-224.0.0.123.oe2203sp4.aarch64",
					"openEuler-22.03-LTS-SP4:kernel-devel-5.10.0-224.0.0.123.oe2203sp4.aarch64",
					"openEuler-22.03-LTS-SP4:kernel-headers-5.10.0-224.0.0.123.oe2203sp4.aarch64",
					"openEuler-22.03-LTS-SP4:kernel-source-5.10.0-224.0.0.123.oe2203sp4.aarch64",
					"openEuler-22.03-LTS-SP4:kernel-tools-5.10.0-224.0.0.123.oe2203sp4.aarch64",
					"openEuler-22.03-LTS-SP4:kernel-tools-debuginfo-5.10.0-224.0.0.123.oe2203sp4.aarch64",
					"openEuler-22.03-LTS-SP4:kernel-tools-devel-5.10.0-224.0.0.123.oe2203sp4.aarch64",
					"openEuler-22.03-LTS-SP4:perf-5.10.0-224.0.0.123.oe2203sp4.aarch64",
					"openEuler-22.03-LTS-SP4:perf-debuginfo-5.10.0-224.0.0.123.oe2203sp4.aarch64",
					"openEuler-22.03-LTS-SP4:python3-perf-5.10.0-224.0.0.123.oe2203sp4.aarch64",
					"openEuler-22.03-LTS-SP4:python3-perf-debuginfo-5.10.0-224.0.0.123.oe2203sp4.aarch64",
					"openEuler-22.03-LTS-SP4:bpftool-5.10.0-224.0.0.123.oe2203sp4.x86_64",
					"openEuler-22.03-LTS-SP4:bpftool-debuginfo-5.10.0-224.0.0.123.oe2203sp4.x86_64",
					"openEuler-22.03-LTS-SP4:kernel-5.10.0-224.0.0.123.oe2203sp4.x86_64",
					"openEuler-22.03-LTS-SP4:kernel-debuginfo-5.10.0-224.0.0.123.oe2203sp4.x86_64",
					"openEuler-22.03-LTS-SP4:kernel-debugsource-5.10.0-224.0.0.123.oe2203sp4.x86_64",
					"openEuler-22.03-LTS-SP4:kernel-devel-5.10.0-224.0.0.123.oe2203sp4.x86_64",
					"openEuler-22.03-LTS-SP4:kernel-headers-5.10.0-224.0.0.123.oe2203sp4.x86_64",
					"openEuler-22.03-LTS-SP4:kernel-source-5.10.0-224.0.0.123.oe2203sp4.x86_64",
					"openEuler-22.03-LTS-SP4:kernel-tools-5.10.0-224.0.0.123.oe2203sp4.x86_64",
					"openEuler-22.03-LTS-SP4:kernel-tools-debuginfo-5.10.0-224.0.0.123.oe2203sp4.x86_64",
					"openEuler-22.03-LTS-SP4:kernel-tools-devel-5.10.0-224.0.0.123.oe2203sp4.x86_64",
					"openEuler-22.03-LTS-SP4:perf-5.10.0-224.0.0.123.oe2203sp4.x86_64",
					"openEuler-22.03-LTS-SP4:perf-debuginfo-5.10.0-224.0.0.123.oe2203sp4.x86_64",
					"openEuler-22.03-LTS-SP4:python3-perf-5.10.0-224.0.0.123.oe2203sp4.x86_64",
					"openEuler-22.03-LTS-SP4:python3-perf-debuginfo-5.10.0-224.0.0.123.oe2203sp4.x86_64",
					"openEuler-22.03-LTS-SP4:kernel-5.10.0-224.0.0.123.oe2203sp4.src"
				]
			},
			"remediations":[
				{
					"product_ids":[
						"openEuler-22.03-LTS-SP4:bpftool-5.10.0-224.0.0.123.oe2203sp4.aarch64",
						"openEuler-22.03-LTS-SP4:bpftool-debuginfo-5.10.0-224.0.0.123.oe2203sp4.aarch64",
						"openEuler-22.03-LTS-SP4:kernel-5.10.0-224.0.0.123.oe2203sp4.aarch64",
						"openEuler-22.03-LTS-SP4:kernel-debuginfo-5.10.0-224.0.0.123.oe2203sp4.aarch64",
						"openEuler-22.03-LTS-SP4:kernel-debugsource-5.10.0-224.0.0.123.oe2203sp4.aarch64",
						"openEuler-22.03-LTS-SP4:kernel-devel-5.10.0-224.0.0.123.oe2203sp4.aarch64",
						"openEuler-22.03-LTS-SP4:kernel-headers-5.10.0-224.0.0.123.oe2203sp4.aarch64",
						"openEuler-22.03-LTS-SP4:kernel-source-5.10.0-224.0.0.123.oe2203sp4.aarch64",
						"openEuler-22.03-LTS-SP4:kernel-tools-5.10.0-224.0.0.123.oe2203sp4.aarch64",
						"openEuler-22.03-LTS-SP4:kernel-tools-debuginfo-5.10.0-224.0.0.123.oe2203sp4.aarch64",
						"openEuler-22.03-LTS-SP4:kernel-tools-devel-5.10.0-224.0.0.123.oe2203sp4.aarch64",
						"openEuler-22.03-LTS-SP4:perf-5.10.0-224.0.0.123.oe2203sp4.aarch64",
						"openEuler-22.03-LTS-SP4:perf-debuginfo-5.10.0-224.0.0.123.oe2203sp4.aarch64",
						"openEuler-22.03-LTS-SP4:python3-perf-5.10.0-224.0.0.123.oe2203sp4.aarch64",
						"openEuler-22.03-LTS-SP4:python3-perf-debuginfo-5.10.0-224.0.0.123.oe2203sp4.aarch64",
						"openEuler-22.03-LTS-SP4:bpftool-5.10.0-224.0.0.123.oe2203sp4.x86_64",
						"openEuler-22.03-LTS-SP4:bpftool-debuginfo-5.10.0-224.0.0.123.oe2203sp4.x86_64",
						"openEuler-22.03-LTS-SP4:kernel-5.10.0-224.0.0.123.oe2203sp4.x86_64",
						"openEuler-22.03-LTS-SP4:kernel-debuginfo-5.10.0-224.0.0.123.oe2203sp4.x86_64",
						"openEuler-22.03-LTS-SP4:kernel-debugsource-5.10.0-224.0.0.123.oe2203sp4.x86_64",
						"openEuler-22.03-LTS-SP4:kernel-devel-5.10.0-224.0.0.123.oe2203sp4.x86_64",
						"openEuler-22.03-LTS-SP4:kernel-headers-5.10.0-224.0.0.123.oe2203sp4.x86_64",
						"openEuler-22.03-LTS-SP4:kernel-source-5.10.0-224.0.0.123.oe2203sp4.x86_64",
						"openEuler-22.03-LTS-SP4:kernel-tools-5.10.0-224.0.0.123.oe2203sp4.x86_64",
						"openEuler-22.03-LTS-SP4:kernel-tools-debuginfo-5.10.0-224.0.0.123.oe2203sp4.x86_64",
						"openEuler-22.03-LTS-SP4:kernel-tools-devel-5.10.0-224.0.0.123.oe2203sp4.x86_64",
						"openEuler-22.03-LTS-SP4:perf-5.10.0-224.0.0.123.oe2203sp4.x86_64",
						"openEuler-22.03-LTS-SP4:perf-debuginfo-5.10.0-224.0.0.123.oe2203sp4.x86_64",
						"openEuler-22.03-LTS-SP4:python3-perf-5.10.0-224.0.0.123.oe2203sp4.x86_64",
						"openEuler-22.03-LTS-SP4:python3-perf-debuginfo-5.10.0-224.0.0.123.oe2203sp4.x86_64",
						"openEuler-22.03-LTS-SP4:kernel-5.10.0-224.0.0.123.oe2203sp4.src"
					],
					"details":"kernel security update",
					"category":"vendor_fix",
					"url":"https://www.openeuler.org/zh/security/security-bulletins/detail/?id=openEuler-SA-2024-2028"
				}
			],
			"scores":[
				{
					"cvss_v3":{
						"baseSeverity":"MEDIUM",
						"baseScore":5.5,
						"vectorString":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
						"version":"3.1"
					},
					"products":[
						"openEuler-22.03-LTS-SP4:bpftool-5.10.0-224.0.0.123.oe2203sp4.aarch64",
						"openEuler-22.03-LTS-SP4:bpftool-debuginfo-5.10.0-224.0.0.123.oe2203sp4.aarch64",
						"openEuler-22.03-LTS-SP4:kernel-5.10.0-224.0.0.123.oe2203sp4.aarch64",
						"openEuler-22.03-LTS-SP4:kernel-debuginfo-5.10.0-224.0.0.123.oe2203sp4.aarch64",
						"openEuler-22.03-LTS-SP4:kernel-debugsource-5.10.0-224.0.0.123.oe2203sp4.aarch64",
						"openEuler-22.03-LTS-SP4:kernel-devel-5.10.0-224.0.0.123.oe2203sp4.aarch64",
						"openEuler-22.03-LTS-SP4:kernel-headers-5.10.0-224.0.0.123.oe2203sp4.aarch64",
						"openEuler-22.03-LTS-SP4:kernel-source-5.10.0-224.0.0.123.oe2203sp4.aarch64",
						"openEuler-22.03-LTS-SP4:kernel-tools-5.10.0-224.0.0.123.oe2203sp4.aarch64",
						"openEuler-22.03-LTS-SP4:kernel-tools-debuginfo-5.10.0-224.0.0.123.oe2203sp4.aarch64",
						"openEuler-22.03-LTS-SP4:kernel-tools-devel-5.10.0-224.0.0.123.oe2203sp4.aarch64",
						"openEuler-22.03-LTS-SP4:perf-5.10.0-224.0.0.123.oe2203sp4.aarch64",
						"openEuler-22.03-LTS-SP4:perf-debuginfo-5.10.0-224.0.0.123.oe2203sp4.aarch64",
						"openEuler-22.03-LTS-SP4:python3-perf-5.10.0-224.0.0.123.oe2203sp4.aarch64",
						"openEuler-22.03-LTS-SP4:python3-perf-debuginfo-5.10.0-224.0.0.123.oe2203sp4.aarch64",
						"openEuler-22.03-LTS-SP4:bpftool-5.10.0-224.0.0.123.oe2203sp4.x86_64",
						"openEuler-22.03-LTS-SP4:bpftool-debuginfo-5.10.0-224.0.0.123.oe2203sp4.x86_64",
						"openEuler-22.03-LTS-SP4:kernel-5.10.0-224.0.0.123.oe2203sp4.x86_64",
						"openEuler-22.03-LTS-SP4:kernel-debuginfo-5.10.0-224.0.0.123.oe2203sp4.x86_64",
						"openEuler-22.03-LTS-SP4:kernel-debugsource-5.10.0-224.0.0.123.oe2203sp4.x86_64",
						"openEuler-22.03-LTS-SP4:kernel-devel-5.10.0-224.0.0.123.oe2203sp4.x86_64",
						"openEuler-22.03-LTS-SP4:kernel-headers-5.10.0-224.0.0.123.oe2203sp4.x86_64",
						"openEuler-22.03-LTS-SP4:kernel-source-5.10.0-224.0.0.123.oe2203sp4.x86_64",
						"openEuler-22.03-LTS-SP4:kernel-tools-5.10.0-224.0.0.123.oe2203sp4.x86_64",
						"openEuler-22.03-LTS-SP4:kernel-tools-debuginfo-5.10.0-224.0.0.123.oe2203sp4.x86_64",
						"openEuler-22.03-LTS-SP4:kernel-tools-devel-5.10.0-224.0.0.123.oe2203sp4.x86_64",
						"openEuler-22.03-LTS-SP4:perf-5.10.0-224.0.0.123.oe2203sp4.x86_64",
						"openEuler-22.03-LTS-SP4:perf-debuginfo-5.10.0-224.0.0.123.oe2203sp4.x86_64",
						"openEuler-22.03-LTS-SP4:python3-perf-5.10.0-224.0.0.123.oe2203sp4.x86_64",
						"openEuler-22.03-LTS-SP4:python3-perf-debuginfo-5.10.0-224.0.0.123.oe2203sp4.x86_64",
						"openEuler-22.03-LTS-SP4:kernel-5.10.0-224.0.0.123.oe2203sp4.src"
					]
				}
			],
			"threats":[
				{
					"details":"Medium",
					"category":"impact"
				}
			],
			"title":"CVE-2024-42236"
		},
		{
			"cve":"CVE-2024-42304",
			"notes":[
				{
					"text":"In the Linux kernel, the following vulnerability has been resolved:\n\next4: make sure the first directory block is not a hole\n\nThe syzbot constructs a directory that has no dirblock but is non-inline,\ni.e. the first directory block is a hole. And no errors are reported when\ncreating files in this directory in the following flow.\n\n    ext4_mknod\n     ...\n      ext4_add_entry\n        // Read block 0\n        ext4_read_dirblock(dir, block, DIRENT)\n          bh = ext4_bread(NULL, inode, block, 0)\n          if (!bh && (type == INDEX || type == DIRENT_HTREE))\n          // The first directory block is a hole\n          // But type == DIRENT, so no error is reported.\n\nAfter that, we get a directory block without '.' and '..' but with a valid\ndentry. This may cause some code that relies on dot or dotdot (such as\nmake_indexed_dir()) to crash.\n\nTherefore when ext4_read_dirblock() finds that the first directory block\nis a hole report that the filesystem is corrupted and return an error to\navoid loading corrupted data from disk causing something bad.",
					"category":"description",
					"title":"Vulnerability Description"
				}
			],
			"product_status":{
				"fixed":[
					"openEuler-22.03-LTS-SP4:bpftool-5.10.0-224.0.0.123.oe2203sp4.aarch64",
					"openEuler-22.03-LTS-SP4:bpftool-debuginfo-5.10.0-224.0.0.123.oe2203sp4.aarch64",
					"openEuler-22.03-LTS-SP4:kernel-5.10.0-224.0.0.123.oe2203sp4.aarch64",
					"openEuler-22.03-LTS-SP4:kernel-debuginfo-5.10.0-224.0.0.123.oe2203sp4.aarch64",
					"openEuler-22.03-LTS-SP4:kernel-debugsource-5.10.0-224.0.0.123.oe2203sp4.aarch64",
					"openEuler-22.03-LTS-SP4:kernel-devel-5.10.0-224.0.0.123.oe2203sp4.aarch64",
					"openEuler-22.03-LTS-SP4:kernel-headers-5.10.0-224.0.0.123.oe2203sp4.aarch64",
					"openEuler-22.03-LTS-SP4:kernel-source-5.10.0-224.0.0.123.oe2203sp4.aarch64",
					"openEuler-22.03-LTS-SP4:kernel-tools-5.10.0-224.0.0.123.oe2203sp4.aarch64",
					"openEuler-22.03-LTS-SP4:kernel-tools-debuginfo-5.10.0-224.0.0.123.oe2203sp4.aarch64",
					"openEuler-22.03-LTS-SP4:kernel-tools-devel-5.10.0-224.0.0.123.oe2203sp4.aarch64",
					"openEuler-22.03-LTS-SP4:perf-5.10.0-224.0.0.123.oe2203sp4.aarch64",
					"openEuler-22.03-LTS-SP4:perf-debuginfo-5.10.0-224.0.0.123.oe2203sp4.aarch64",
					"openEuler-22.03-LTS-SP4:python3-perf-5.10.0-224.0.0.123.oe2203sp4.aarch64",
					"openEuler-22.03-LTS-SP4:python3-perf-debuginfo-5.10.0-224.0.0.123.oe2203sp4.aarch64",
					"openEuler-22.03-LTS-SP4:bpftool-5.10.0-224.0.0.123.oe2203sp4.x86_64",
					"openEuler-22.03-LTS-SP4:bpftool-debuginfo-5.10.0-224.0.0.123.oe2203sp4.x86_64",
					"openEuler-22.03-LTS-SP4:kernel-5.10.0-224.0.0.123.oe2203sp4.x86_64",
					"openEuler-22.03-LTS-SP4:kernel-debuginfo-5.10.0-224.0.0.123.oe2203sp4.x86_64",
					"openEuler-22.03-LTS-SP4:kernel-debugsource-5.10.0-224.0.0.123.oe2203sp4.x86_64",
					"openEuler-22.03-LTS-SP4:kernel-devel-5.10.0-224.0.0.123.oe2203sp4.x86_64",
					"openEuler-22.03-LTS-SP4:kernel-headers-5.10.0-224.0.0.123.oe2203sp4.x86_64",
					"openEuler-22.03-LTS-SP4:kernel-source-5.10.0-224.0.0.123.oe2203sp4.x86_64",
					"openEuler-22.03-LTS-SP4:kernel-tools-5.10.0-224.0.0.123.oe2203sp4.x86_64",
					"openEuler-22.03-LTS-SP4:kernel-tools-debuginfo-5.10.0-224.0.0.123.oe2203sp4.x86_64",
					"openEuler-22.03-LTS-SP4:kernel-tools-devel-5.10.0-224.0.0.123.oe2203sp4.x86_64",
					"openEuler-22.03-LTS-SP4:perf-5.10.0-224.0.0.123.oe2203sp4.x86_64",
					"openEuler-22.03-LTS-SP4:perf-debuginfo-5.10.0-224.0.0.123.oe2203sp4.x86_64",
					"openEuler-22.03-LTS-SP4:python3-perf-5.10.0-224.0.0.123.oe2203sp4.x86_64",
					"openEuler-22.03-LTS-SP4:python3-perf-debuginfo-5.10.0-224.0.0.123.oe2203sp4.x86_64",
					"openEuler-22.03-LTS-SP4:kernel-5.10.0-224.0.0.123.oe2203sp4.src"
				]
			},
			"remediations":[
				{
					"product_ids":[
						"openEuler-22.03-LTS-SP4:bpftool-5.10.0-224.0.0.123.oe2203sp4.aarch64",
						"openEuler-22.03-LTS-SP4:bpftool-debuginfo-5.10.0-224.0.0.123.oe2203sp4.aarch64",
						"openEuler-22.03-LTS-SP4:kernel-5.10.0-224.0.0.123.oe2203sp4.aarch64",
						"openEuler-22.03-LTS-SP4:kernel-debuginfo-5.10.0-224.0.0.123.oe2203sp4.aarch64",
						"openEuler-22.03-LTS-SP4:kernel-debugsource-5.10.0-224.0.0.123.oe2203sp4.aarch64",
						"openEuler-22.03-LTS-SP4:kernel-devel-5.10.0-224.0.0.123.oe2203sp4.aarch64",
						"openEuler-22.03-LTS-SP4:kernel-headers-5.10.0-224.0.0.123.oe2203sp4.aarch64",
						"openEuler-22.03-LTS-SP4:kernel-source-5.10.0-224.0.0.123.oe2203sp4.aarch64",
						"openEuler-22.03-LTS-SP4:kernel-tools-5.10.0-224.0.0.123.oe2203sp4.aarch64",
						"openEuler-22.03-LTS-SP4:kernel-tools-debuginfo-5.10.0-224.0.0.123.oe2203sp4.aarch64",
						"openEuler-22.03-LTS-SP4:kernel-tools-devel-5.10.0-224.0.0.123.oe2203sp4.aarch64",
						"openEuler-22.03-LTS-SP4:perf-5.10.0-224.0.0.123.oe2203sp4.aarch64",
						"openEuler-22.03-LTS-SP4:perf-debuginfo-5.10.0-224.0.0.123.oe2203sp4.aarch64",
						"openEuler-22.03-LTS-SP4:python3-perf-5.10.0-224.0.0.123.oe2203sp4.aarch64",
						"openEuler-22.03-LTS-SP4:python3-perf-debuginfo-5.10.0-224.0.0.123.oe2203sp4.aarch64",
						"openEuler-22.03-LTS-SP4:bpftool-5.10.0-224.0.0.123.oe2203sp4.x86_64",
						"openEuler-22.03-LTS-SP4:bpftool-debuginfo-5.10.0-224.0.0.123.oe2203sp4.x86_64",
						"openEuler-22.03-LTS-SP4:kernel-5.10.0-224.0.0.123.oe2203sp4.x86_64",
						"openEuler-22.03-LTS-SP4:kernel-debuginfo-5.10.0-224.0.0.123.oe2203sp4.x86_64",
						"openEuler-22.03-LTS-SP4:kernel-debugsource-5.10.0-224.0.0.123.oe2203sp4.x86_64",
						"openEuler-22.03-LTS-SP4:kernel-devel-5.10.0-224.0.0.123.oe2203sp4.x86_64",
						"openEuler-22.03-LTS-SP4:kernel-headers-5.10.0-224.0.0.123.oe2203sp4.x86_64",
						"openEuler-22.03-LTS-SP4:kernel-source-5.10.0-224.0.0.123.oe2203sp4.x86_64",
						"openEuler-22.03-LTS-SP4:kernel-tools-5.10.0-224.0.0.123.oe2203sp4.x86_64",
						"openEuler-22.03-LTS-SP4:kernel-tools-debuginfo-5.10.0-224.0.0.123.oe2203sp4.x86_64",
						"openEuler-22.03-LTS-SP4:kernel-tools-devel-5.10.0-224.0.0.123.oe2203sp4.x86_64",
						"openEuler-22.03-LTS-SP4:perf-5.10.0-224.0.0.123.oe2203sp4.x86_64",
						"openEuler-22.03-LTS-SP4:perf-debuginfo-5.10.0-224.0.0.123.oe2203sp4.x86_64",
						"openEuler-22.03-LTS-SP4:python3-perf-5.10.0-224.0.0.123.oe2203sp4.x86_64",
						"openEuler-22.03-LTS-SP4:python3-perf-debuginfo-5.10.0-224.0.0.123.oe2203sp4.x86_64",
						"openEuler-22.03-LTS-SP4:kernel-5.10.0-224.0.0.123.oe2203sp4.src"
					],
					"details":"kernel security update",
					"category":"vendor_fix",
					"url":"https://www.openeuler.org/zh/security/security-bulletins/detail/?id=openEuler-SA-2024-2028"
				}
			],
			"scores":[
				{
					"cvss_v3":{
						"baseSeverity":"MEDIUM",
						"baseScore":5.5,
						"vectorString":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
						"version":"3.1"
					},
					"products":[
						"openEuler-22.03-LTS-SP4:bpftool-5.10.0-224.0.0.123.oe2203sp4.aarch64",
						"openEuler-22.03-LTS-SP4:bpftool-debuginfo-5.10.0-224.0.0.123.oe2203sp4.aarch64",
						"openEuler-22.03-LTS-SP4:kernel-5.10.0-224.0.0.123.oe2203sp4.aarch64",
						"openEuler-22.03-LTS-SP4:kernel-debuginfo-5.10.0-224.0.0.123.oe2203sp4.aarch64",
						"openEuler-22.03-LTS-SP4:kernel-debugsource-5.10.0-224.0.0.123.oe2203sp4.aarch64",
						"openEuler-22.03-LTS-SP4:kernel-devel-5.10.0-224.0.0.123.oe2203sp4.aarch64",
						"openEuler-22.03-LTS-SP4:kernel-headers-5.10.0-224.0.0.123.oe2203sp4.aarch64",
						"openEuler-22.03-LTS-SP4:kernel-source-5.10.0-224.0.0.123.oe2203sp4.aarch64",
						"openEuler-22.03-LTS-SP4:kernel-tools-5.10.0-224.0.0.123.oe2203sp4.aarch64",
						"openEuler-22.03-LTS-SP4:kernel-tools-debuginfo-5.10.0-224.0.0.123.oe2203sp4.aarch64",
						"openEuler-22.03-LTS-SP4:kernel-tools-devel-5.10.0-224.0.0.123.oe2203sp4.aarch64",
						"openEuler-22.03-LTS-SP4:perf-5.10.0-224.0.0.123.oe2203sp4.aarch64",
						"openEuler-22.03-LTS-SP4:perf-debuginfo-5.10.0-224.0.0.123.oe2203sp4.aarch64",
						"openEuler-22.03-LTS-SP4:python3-perf-5.10.0-224.0.0.123.oe2203sp4.aarch64",
						"openEuler-22.03-LTS-SP4:python3-perf-debuginfo-5.10.0-224.0.0.123.oe2203sp4.aarch64",
						"openEuler-22.03-LTS-SP4:bpftool-5.10.0-224.0.0.123.oe2203sp4.x86_64",
						"openEuler-22.03-LTS-SP4:bpftool-debuginfo-5.10.0-224.0.0.123.oe2203sp4.x86_64",
						"openEuler-22.03-LTS-SP4:kernel-5.10.0-224.0.0.123.oe2203sp4.x86_64",
						"openEuler-22.03-LTS-SP4:kernel-debuginfo-5.10.0-224.0.0.123.oe2203sp4.x86_64",
						"openEuler-22.03-LTS-SP4:kernel-debugsource-5.10.0-224.0.0.123.oe2203sp4.x86_64",
						"openEuler-22.03-LTS-SP4:kernel-devel-5.10.0-224.0.0.123.oe2203sp4.x86_64",
						"openEuler-22.03-LTS-SP4:kernel-headers-5.10.0-224.0.0.123.oe2203sp4.x86_64",
						"openEuler-22.03-LTS-SP4:kernel-source-5.10.0-224.0.0.123.oe2203sp4.x86_64",
						"openEuler-22.03-LTS-SP4:kernel-tools-5.10.0-224.0.0.123.oe2203sp4.x86_64",
						"openEuler-22.03-LTS-SP4:kernel-tools-debuginfo-5.10.0-224.0.0.123.oe2203sp4.x86_64",
						"openEuler-22.03-LTS-SP4:kernel-tools-devel-5.10.0-224.0.0.123.oe2203sp4.x86_64",
						"openEuler-22.03-LTS-SP4:perf-5.10.0-224.0.0.123.oe2203sp4.x86_64",
						"openEuler-22.03-LTS-SP4:perf-debuginfo-5.10.0-224.0.0.123.oe2203sp4.x86_64",
						"openEuler-22.03-LTS-SP4:python3-perf-5.10.0-224.0.0.123.oe2203sp4.x86_64",
						"openEuler-22.03-LTS-SP4:python3-perf-debuginfo-5.10.0-224.0.0.123.oe2203sp4.x86_64",
						"openEuler-22.03-LTS-SP4:kernel-5.10.0-224.0.0.123.oe2203sp4.src"
					]
				}
			],
			"threats":[
				{
					"details":"Medium",
					"category":"impact"
				}
			],
			"title":"CVE-2024-42304"
		},
		{
			"cve":"CVE-2024-42310",
			"notes":[
				{
					"text":"In the Linux kernel, the following vulnerability has been resolved:\n\ndrm/gma500: fix null pointer dereference in cdv_intel_lvds_get_modes\n\nIn cdv_intel_lvds_get_modes(), the return value of drm_mode_duplicate()\nis assigned to mode, which will lead to a NULL pointer dereference on\nfailure of drm_mode_duplicate(). Add a check to avoid npd.",
					"category":"description",
					"title":"Vulnerability Description"
				}
			],
			"product_status":{
				"fixed":[
					"openEuler-22.03-LTS-SP4:bpftool-5.10.0-224.0.0.123.oe2203sp4.aarch64",
					"openEuler-22.03-LTS-SP4:bpftool-debuginfo-5.10.0-224.0.0.123.oe2203sp4.aarch64",
					"openEuler-22.03-LTS-SP4:kernel-5.10.0-224.0.0.123.oe2203sp4.aarch64",
					"openEuler-22.03-LTS-SP4:kernel-debuginfo-5.10.0-224.0.0.123.oe2203sp4.aarch64",
					"openEuler-22.03-LTS-SP4:kernel-debugsource-5.10.0-224.0.0.123.oe2203sp4.aarch64",
					"openEuler-22.03-LTS-SP4:kernel-devel-5.10.0-224.0.0.123.oe2203sp4.aarch64",
					"openEuler-22.03-LTS-SP4:kernel-headers-5.10.0-224.0.0.123.oe2203sp4.aarch64",
					"openEuler-22.03-LTS-SP4:kernel-source-5.10.0-224.0.0.123.oe2203sp4.aarch64",
					"openEuler-22.03-LTS-SP4:kernel-tools-5.10.0-224.0.0.123.oe2203sp4.aarch64",
					"openEuler-22.03-LTS-SP4:kernel-tools-debuginfo-5.10.0-224.0.0.123.oe2203sp4.aarch64",
					"openEuler-22.03-LTS-SP4:kernel-tools-devel-5.10.0-224.0.0.123.oe2203sp4.aarch64",
					"openEuler-22.03-LTS-SP4:perf-5.10.0-224.0.0.123.oe2203sp4.aarch64",
					"openEuler-22.03-LTS-SP4:perf-debuginfo-5.10.0-224.0.0.123.oe2203sp4.aarch64",
					"openEuler-22.03-LTS-SP4:python3-perf-5.10.0-224.0.0.123.oe2203sp4.aarch64",
					"openEuler-22.03-LTS-SP4:python3-perf-debuginfo-5.10.0-224.0.0.123.oe2203sp4.aarch64",
					"openEuler-22.03-LTS-SP4:bpftool-5.10.0-224.0.0.123.oe2203sp4.x86_64",
					"openEuler-22.03-LTS-SP4:bpftool-debuginfo-5.10.0-224.0.0.123.oe2203sp4.x86_64",
					"openEuler-22.03-LTS-SP4:kernel-5.10.0-224.0.0.123.oe2203sp4.x86_64",
					"openEuler-22.03-LTS-SP4:kernel-debuginfo-5.10.0-224.0.0.123.oe2203sp4.x86_64",
					"openEuler-22.03-LTS-SP4:kernel-debugsource-5.10.0-224.0.0.123.oe2203sp4.x86_64",
					"openEuler-22.03-LTS-SP4:kernel-devel-5.10.0-224.0.0.123.oe2203sp4.x86_64",
					"openEuler-22.03-LTS-SP4:kernel-headers-5.10.0-224.0.0.123.oe2203sp4.x86_64",
					"openEuler-22.03-LTS-SP4:kernel-source-5.10.0-224.0.0.123.oe2203sp4.x86_64",
					"openEuler-22.03-LTS-SP4:kernel-tools-5.10.0-224.0.0.123.oe2203sp4.x86_64",
					"openEuler-22.03-LTS-SP4:kernel-tools-debuginfo-5.10.0-224.0.0.123.oe2203sp4.x86_64",
					"openEuler-22.03-LTS-SP4:kernel-tools-devel-5.10.0-224.0.0.123.oe2203sp4.x86_64",
					"openEuler-22.03-LTS-SP4:perf-5.10.0-224.0.0.123.oe2203sp4.x86_64",
					"openEuler-22.03-LTS-SP4:perf-debuginfo-5.10.0-224.0.0.123.oe2203sp4.x86_64",
					"openEuler-22.03-LTS-SP4:python3-perf-5.10.0-224.0.0.123.oe2203sp4.x86_64",
					"openEuler-22.03-LTS-SP4:python3-perf-debuginfo-5.10.0-224.0.0.123.oe2203sp4.x86_64",
					"openEuler-22.03-LTS-SP4:kernel-5.10.0-224.0.0.123.oe2203sp4.src"
				]
			},
			"remediations":[
				{
					"product_ids":[
						"openEuler-22.03-LTS-SP4:bpftool-5.10.0-224.0.0.123.oe2203sp4.aarch64",
						"openEuler-22.03-LTS-SP4:bpftool-debuginfo-5.10.0-224.0.0.123.oe2203sp4.aarch64",
						"openEuler-22.03-LTS-SP4:kernel-5.10.0-224.0.0.123.oe2203sp4.aarch64",
						"openEuler-22.03-LTS-SP4:kernel-debuginfo-5.10.0-224.0.0.123.oe2203sp4.aarch64",
						"openEuler-22.03-LTS-SP4:kernel-debugsource-5.10.0-224.0.0.123.oe2203sp4.aarch64",
						"openEuler-22.03-LTS-SP4:kernel-devel-5.10.0-224.0.0.123.oe2203sp4.aarch64",
						"openEuler-22.03-LTS-SP4:kernel-headers-5.10.0-224.0.0.123.oe2203sp4.aarch64",
						"openEuler-22.03-LTS-SP4:kernel-source-5.10.0-224.0.0.123.oe2203sp4.aarch64",
						"openEuler-22.03-LTS-SP4:kernel-tools-5.10.0-224.0.0.123.oe2203sp4.aarch64",
						"openEuler-22.03-LTS-SP4:kernel-tools-debuginfo-5.10.0-224.0.0.123.oe2203sp4.aarch64",
						"openEuler-22.03-LTS-SP4:kernel-tools-devel-5.10.0-224.0.0.123.oe2203sp4.aarch64",
						"openEuler-22.03-LTS-SP4:perf-5.10.0-224.0.0.123.oe2203sp4.aarch64",
						"openEuler-22.03-LTS-SP4:perf-debuginfo-5.10.0-224.0.0.123.oe2203sp4.aarch64",
						"openEuler-22.03-LTS-SP4:python3-perf-5.10.0-224.0.0.123.oe2203sp4.aarch64",
						"openEuler-22.03-LTS-SP4:python3-perf-debuginfo-5.10.0-224.0.0.123.oe2203sp4.aarch64",
						"openEuler-22.03-LTS-SP4:bpftool-5.10.0-224.0.0.123.oe2203sp4.x86_64",
						"openEuler-22.03-LTS-SP4:bpftool-debuginfo-5.10.0-224.0.0.123.oe2203sp4.x86_64",
						"openEuler-22.03-LTS-SP4:kernel-5.10.0-224.0.0.123.oe2203sp4.x86_64",
						"openEuler-22.03-LTS-SP4:kernel-debuginfo-5.10.0-224.0.0.123.oe2203sp4.x86_64",
						"openEuler-22.03-LTS-SP4:kernel-debugsource-5.10.0-224.0.0.123.oe2203sp4.x86_64",
						"openEuler-22.03-LTS-SP4:kernel-devel-5.10.0-224.0.0.123.oe2203sp4.x86_64",
						"openEuler-22.03-LTS-SP4:kernel-headers-5.10.0-224.0.0.123.oe2203sp4.x86_64",
						"openEuler-22.03-LTS-SP4:kernel-source-5.10.0-224.0.0.123.oe2203sp4.x86_64",
						"openEuler-22.03-LTS-SP4:kernel-tools-5.10.0-224.0.0.123.oe2203sp4.x86_64",
						"openEuler-22.03-LTS-SP4:kernel-tools-debuginfo-5.10.0-224.0.0.123.oe2203sp4.x86_64",
						"openEuler-22.03-LTS-SP4:kernel-tools-devel-5.10.0-224.0.0.123.oe2203sp4.x86_64",
						"openEuler-22.03-LTS-SP4:perf-5.10.0-224.0.0.123.oe2203sp4.x86_64",
						"openEuler-22.03-LTS-SP4:perf-debuginfo-5.10.0-224.0.0.123.oe2203sp4.x86_64",
						"openEuler-22.03-LTS-SP4:python3-perf-5.10.0-224.0.0.123.oe2203sp4.x86_64",
						"openEuler-22.03-LTS-SP4:python3-perf-debuginfo-5.10.0-224.0.0.123.oe2203sp4.x86_64",
						"openEuler-22.03-LTS-SP4:kernel-5.10.0-224.0.0.123.oe2203sp4.src"
					],
					"details":"kernel security update",
					"category":"vendor_fix",
					"url":"https://www.openeuler.org/zh/security/security-bulletins/detail/?id=openEuler-SA-2024-2028"
				}
			],
			"scores":[
				{
					"cvss_v3":{
						"baseSeverity":"MEDIUM",
						"baseScore":5.5,
						"vectorString":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
						"version":"3.1"
					},
					"products":[
						"openEuler-22.03-LTS-SP4:bpftool-5.10.0-224.0.0.123.oe2203sp4.aarch64",
						"openEuler-22.03-LTS-SP4:bpftool-debuginfo-5.10.0-224.0.0.123.oe2203sp4.aarch64",
						"openEuler-22.03-LTS-SP4:kernel-5.10.0-224.0.0.123.oe2203sp4.aarch64",
						"openEuler-22.03-LTS-SP4:kernel-debuginfo-5.10.0-224.0.0.123.oe2203sp4.aarch64",
						"openEuler-22.03-LTS-SP4:kernel-debugsource-5.10.0-224.0.0.123.oe2203sp4.aarch64",
						"openEuler-22.03-LTS-SP4:kernel-devel-5.10.0-224.0.0.123.oe2203sp4.aarch64",
						"openEuler-22.03-LTS-SP4:kernel-headers-5.10.0-224.0.0.123.oe2203sp4.aarch64",
						"openEuler-22.03-LTS-SP4:kernel-source-5.10.0-224.0.0.123.oe2203sp4.aarch64",
						"openEuler-22.03-LTS-SP4:kernel-tools-5.10.0-224.0.0.123.oe2203sp4.aarch64",
						"openEuler-22.03-LTS-SP4:kernel-tools-debuginfo-5.10.0-224.0.0.123.oe2203sp4.aarch64",
						"openEuler-22.03-LTS-SP4:kernel-tools-devel-5.10.0-224.0.0.123.oe2203sp4.aarch64",
						"openEuler-22.03-LTS-SP4:perf-5.10.0-224.0.0.123.oe2203sp4.aarch64",
						"openEuler-22.03-LTS-SP4:perf-debuginfo-5.10.0-224.0.0.123.oe2203sp4.aarch64",
						"openEuler-22.03-LTS-SP4:python3-perf-5.10.0-224.0.0.123.oe2203sp4.aarch64",
						"openEuler-22.03-LTS-SP4:python3-perf-debuginfo-5.10.0-224.0.0.123.oe2203sp4.aarch64",
						"openEuler-22.03-LTS-SP4:bpftool-5.10.0-224.0.0.123.oe2203sp4.x86_64",
						"openEuler-22.03-LTS-SP4:bpftool-debuginfo-5.10.0-224.0.0.123.oe2203sp4.x86_64",
						"openEuler-22.03-LTS-SP4:kernel-5.10.0-224.0.0.123.oe2203sp4.x86_64",
						"openEuler-22.03-LTS-SP4:kernel-debuginfo-5.10.0-224.0.0.123.oe2203sp4.x86_64",
						"openEuler-22.03-LTS-SP4:kernel-debugsource-5.10.0-224.0.0.123.oe2203sp4.x86_64",
						"openEuler-22.03-LTS-SP4:kernel-devel-5.10.0-224.0.0.123.oe2203sp4.x86_64",
						"openEuler-22.03-LTS-SP4:kernel-headers-5.10.0-224.0.0.123.oe2203sp4.x86_64",
						"openEuler-22.03-LTS-SP4:kernel-source-5.10.0-224.0.0.123.oe2203sp4.x86_64",
						"openEuler-22.03-LTS-SP4:kernel-tools-5.10.0-224.0.0.123.oe2203sp4.x86_64",
						"openEuler-22.03-LTS-SP4:kernel-tools-debuginfo-5.10.0-224.0.0.123.oe2203sp4.x86_64",
						"openEuler-22.03-LTS-SP4:kernel-tools-devel-5.10.0-224.0.0.123.oe2203sp4.x86_64",
						"openEuler-22.03-LTS-SP4:perf-5.10.0-224.0.0.123.oe2203sp4.x86_64",
						"openEuler-22.03-LTS-SP4:perf-debuginfo-5.10.0-224.0.0.123.oe2203sp4.x86_64",
						"openEuler-22.03-LTS-SP4:python3-perf-5.10.0-224.0.0.123.oe2203sp4.x86_64",
						"openEuler-22.03-LTS-SP4:python3-perf-debuginfo-5.10.0-224.0.0.123.oe2203sp4.x86_64",
						"openEuler-22.03-LTS-SP4:kernel-5.10.0-224.0.0.123.oe2203sp4.src"
					]
				}
			],
			"threats":[
				{
					"details":"Medium",
					"category":"impact"
				}
			],
			"title":"CVE-2024-42310"
		},
		{
			"cve":"CVE-2024-43839",
			"notes":[
				{
					"text":"In the Linux kernel, the following vulnerability has been resolved:\n\nbna: adjust 'name' buf size of bna_tcb and bna_ccb structures\n\nTo have enough space to write all possible sprintf() args. Currently\n'name' size is 16, but the first '%s' specifier may already need at\nleast 16 characters, since 'bnad->netdev->name' is used there.\n\nFor '%d' specifiers, assume that they require:\n * 1 char for 'tx_id + tx_info->tcb[i]->id' sum, BNAD_MAX_TXQ_PER_TX is 8\n * 2 chars for 'rx_id + rx_info->rx_ctrl[i].ccb->id', BNAD_MAX_RXP_PER_RX\n   is 16\n\nAnd replace sprintf with snprintf.\n\nDetected using the static analysis tool - Svace.",
					"category":"description",
					"title":"Vulnerability Description"
				}
			],
			"product_status":{
				"fixed":[
					"openEuler-22.03-LTS-SP4:bpftool-5.10.0-224.0.0.123.oe2203sp4.aarch64",
					"openEuler-22.03-LTS-SP4:bpftool-debuginfo-5.10.0-224.0.0.123.oe2203sp4.aarch64",
					"openEuler-22.03-LTS-SP4:kernel-5.10.0-224.0.0.123.oe2203sp4.aarch64",
					"openEuler-22.03-LTS-SP4:kernel-debuginfo-5.10.0-224.0.0.123.oe2203sp4.aarch64",
					"openEuler-22.03-LTS-SP4:kernel-debugsource-5.10.0-224.0.0.123.oe2203sp4.aarch64",
					"openEuler-22.03-LTS-SP4:kernel-devel-5.10.0-224.0.0.123.oe2203sp4.aarch64",
					"openEuler-22.03-LTS-SP4:kernel-headers-5.10.0-224.0.0.123.oe2203sp4.aarch64",
					"openEuler-22.03-LTS-SP4:kernel-source-5.10.0-224.0.0.123.oe2203sp4.aarch64",
					"openEuler-22.03-LTS-SP4:kernel-tools-5.10.0-224.0.0.123.oe2203sp4.aarch64",
					"openEuler-22.03-LTS-SP4:kernel-tools-debuginfo-5.10.0-224.0.0.123.oe2203sp4.aarch64",
					"openEuler-22.03-LTS-SP4:kernel-tools-devel-5.10.0-224.0.0.123.oe2203sp4.aarch64",
					"openEuler-22.03-LTS-SP4:perf-5.10.0-224.0.0.123.oe2203sp4.aarch64",
					"openEuler-22.03-LTS-SP4:perf-debuginfo-5.10.0-224.0.0.123.oe2203sp4.aarch64",
					"openEuler-22.03-LTS-SP4:python3-perf-5.10.0-224.0.0.123.oe2203sp4.aarch64",
					"openEuler-22.03-LTS-SP4:python3-perf-debuginfo-5.10.0-224.0.0.123.oe2203sp4.aarch64",
					"openEuler-22.03-LTS-SP4:bpftool-5.10.0-224.0.0.123.oe2203sp4.x86_64",
					"openEuler-22.03-LTS-SP4:bpftool-debuginfo-5.10.0-224.0.0.123.oe2203sp4.x86_64",
					"openEuler-22.03-LTS-SP4:kernel-5.10.0-224.0.0.123.oe2203sp4.x86_64",
					"openEuler-22.03-LTS-SP4:kernel-debuginfo-5.10.0-224.0.0.123.oe2203sp4.x86_64",
					"openEuler-22.03-LTS-SP4:kernel-debugsource-5.10.0-224.0.0.123.oe2203sp4.x86_64",
					"openEuler-22.03-LTS-SP4:kernel-devel-5.10.0-224.0.0.123.oe2203sp4.x86_64",
					"openEuler-22.03-LTS-SP4:kernel-headers-5.10.0-224.0.0.123.oe2203sp4.x86_64",
					"openEuler-22.03-LTS-SP4:kernel-source-5.10.0-224.0.0.123.oe2203sp4.x86_64",
					"openEuler-22.03-LTS-SP4:kernel-tools-5.10.0-224.0.0.123.oe2203sp4.x86_64",
					"openEuler-22.03-LTS-SP4:kernel-tools-debuginfo-5.10.0-224.0.0.123.oe2203sp4.x86_64",
					"openEuler-22.03-LTS-SP4:kernel-tools-devel-5.10.0-224.0.0.123.oe2203sp4.x86_64",
					"openEuler-22.03-LTS-SP4:perf-5.10.0-224.0.0.123.oe2203sp4.x86_64",
					"openEuler-22.03-LTS-SP4:perf-debuginfo-5.10.0-224.0.0.123.oe2203sp4.x86_64",
					"openEuler-22.03-LTS-SP4:python3-perf-5.10.0-224.0.0.123.oe2203sp4.x86_64",
					"openEuler-22.03-LTS-SP4:python3-perf-debuginfo-5.10.0-224.0.0.123.oe2203sp4.x86_64",
					"openEuler-22.03-LTS-SP4:kernel-5.10.0-224.0.0.123.oe2203sp4.src"
				]
			},
			"remediations":[
				{
					"product_ids":[
						"openEuler-22.03-LTS-SP4:bpftool-5.10.0-224.0.0.123.oe2203sp4.aarch64",
						"openEuler-22.03-LTS-SP4:bpftool-debuginfo-5.10.0-224.0.0.123.oe2203sp4.aarch64",
						"openEuler-22.03-LTS-SP4:kernel-5.10.0-224.0.0.123.oe2203sp4.aarch64",
						"openEuler-22.03-LTS-SP4:kernel-debuginfo-5.10.0-224.0.0.123.oe2203sp4.aarch64",
						"openEuler-22.03-LTS-SP4:kernel-debugsource-5.10.0-224.0.0.123.oe2203sp4.aarch64",
						"openEuler-22.03-LTS-SP4:kernel-devel-5.10.0-224.0.0.123.oe2203sp4.aarch64",
						"openEuler-22.03-LTS-SP4:kernel-headers-5.10.0-224.0.0.123.oe2203sp4.aarch64",
						"openEuler-22.03-LTS-SP4:kernel-source-5.10.0-224.0.0.123.oe2203sp4.aarch64",
						"openEuler-22.03-LTS-SP4:kernel-tools-5.10.0-224.0.0.123.oe2203sp4.aarch64",
						"openEuler-22.03-LTS-SP4:kernel-tools-debuginfo-5.10.0-224.0.0.123.oe2203sp4.aarch64",
						"openEuler-22.03-LTS-SP4:kernel-tools-devel-5.10.0-224.0.0.123.oe2203sp4.aarch64",
						"openEuler-22.03-LTS-SP4:perf-5.10.0-224.0.0.123.oe2203sp4.aarch64",
						"openEuler-22.03-LTS-SP4:perf-debuginfo-5.10.0-224.0.0.123.oe2203sp4.aarch64",
						"openEuler-22.03-LTS-SP4:python3-perf-5.10.0-224.0.0.123.oe2203sp4.aarch64",
						"openEuler-22.03-LTS-SP4:python3-perf-debuginfo-5.10.0-224.0.0.123.oe2203sp4.aarch64",
						"openEuler-22.03-LTS-SP4:bpftool-5.10.0-224.0.0.123.oe2203sp4.x86_64",
						"openEuler-22.03-LTS-SP4:bpftool-debuginfo-5.10.0-224.0.0.123.oe2203sp4.x86_64",
						"openEuler-22.03-LTS-SP4:kernel-5.10.0-224.0.0.123.oe2203sp4.x86_64",
						"openEuler-22.03-LTS-SP4:kernel-debuginfo-5.10.0-224.0.0.123.oe2203sp4.x86_64",
						"openEuler-22.03-LTS-SP4:kernel-debugsource-5.10.0-224.0.0.123.oe2203sp4.x86_64",
						"openEuler-22.03-LTS-SP4:kernel-devel-5.10.0-224.0.0.123.oe2203sp4.x86_64",
						"openEuler-22.03-LTS-SP4:kernel-headers-5.10.0-224.0.0.123.oe2203sp4.x86_64",
						"openEuler-22.03-LTS-SP4:kernel-source-5.10.0-224.0.0.123.oe2203sp4.x86_64",
						"openEuler-22.03-LTS-SP4:kernel-tools-5.10.0-224.0.0.123.oe2203sp4.x86_64",
						"openEuler-22.03-LTS-SP4:kernel-tools-debuginfo-5.10.0-224.0.0.123.oe2203sp4.x86_64",
						"openEuler-22.03-LTS-SP4:kernel-tools-devel-5.10.0-224.0.0.123.oe2203sp4.x86_64",
						"openEuler-22.03-LTS-SP4:perf-5.10.0-224.0.0.123.oe2203sp4.x86_64",
						"openEuler-22.03-LTS-SP4:perf-debuginfo-5.10.0-224.0.0.123.oe2203sp4.x86_64",
						"openEuler-22.03-LTS-SP4:python3-perf-5.10.0-224.0.0.123.oe2203sp4.x86_64",
						"openEuler-22.03-LTS-SP4:python3-perf-debuginfo-5.10.0-224.0.0.123.oe2203sp4.x86_64",
						"openEuler-22.03-LTS-SP4:kernel-5.10.0-224.0.0.123.oe2203sp4.src"
					],
					"details":"kernel security update",
					"category":"vendor_fix",
					"url":"https://www.openeuler.org/zh/security/security-bulletins/detail/?id=openEuler-SA-2024-2028"
				}
			],
			"scores":[
				{
					"cvss_v3":{
						"baseSeverity":"MEDIUM",
						"baseScore":5.5,
						"vectorString":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
						"version":"3.1"
					},
					"products":[
						"openEuler-22.03-LTS-SP4:bpftool-5.10.0-224.0.0.123.oe2203sp4.aarch64",
						"openEuler-22.03-LTS-SP4:bpftool-debuginfo-5.10.0-224.0.0.123.oe2203sp4.aarch64",
						"openEuler-22.03-LTS-SP4:kernel-5.10.0-224.0.0.123.oe2203sp4.aarch64",
						"openEuler-22.03-LTS-SP4:kernel-debuginfo-5.10.0-224.0.0.123.oe2203sp4.aarch64",
						"openEuler-22.03-LTS-SP4:kernel-debugsource-5.10.0-224.0.0.123.oe2203sp4.aarch64",
						"openEuler-22.03-LTS-SP4:kernel-devel-5.10.0-224.0.0.123.oe2203sp4.aarch64",
						"openEuler-22.03-LTS-SP4:kernel-headers-5.10.0-224.0.0.123.oe2203sp4.aarch64",
						"openEuler-22.03-LTS-SP4:kernel-source-5.10.0-224.0.0.123.oe2203sp4.aarch64",
						"openEuler-22.03-LTS-SP4:kernel-tools-5.10.0-224.0.0.123.oe2203sp4.aarch64",
						"openEuler-22.03-LTS-SP4:kernel-tools-debuginfo-5.10.0-224.0.0.123.oe2203sp4.aarch64",
						"openEuler-22.03-LTS-SP4:kernel-tools-devel-5.10.0-224.0.0.123.oe2203sp4.aarch64",
						"openEuler-22.03-LTS-SP4:perf-5.10.0-224.0.0.123.oe2203sp4.aarch64",
						"openEuler-22.03-LTS-SP4:perf-debuginfo-5.10.0-224.0.0.123.oe2203sp4.aarch64",
						"openEuler-22.03-LTS-SP4:python3-perf-5.10.0-224.0.0.123.oe2203sp4.aarch64",
						"openEuler-22.03-LTS-SP4:python3-perf-debuginfo-5.10.0-224.0.0.123.oe2203sp4.aarch64",
						"openEuler-22.03-LTS-SP4:bpftool-5.10.0-224.0.0.123.oe2203sp4.x86_64",
						"openEuler-22.03-LTS-SP4:bpftool-debuginfo-5.10.0-224.0.0.123.oe2203sp4.x86_64",
						"openEuler-22.03-LTS-SP4:kernel-5.10.0-224.0.0.123.oe2203sp4.x86_64",
						"openEuler-22.03-LTS-SP4:kernel-debuginfo-5.10.0-224.0.0.123.oe2203sp4.x86_64",
						"openEuler-22.03-LTS-SP4:kernel-debugsource-5.10.0-224.0.0.123.oe2203sp4.x86_64",
						"openEuler-22.03-LTS-SP4:kernel-devel-5.10.0-224.0.0.123.oe2203sp4.x86_64",
						"openEuler-22.03-LTS-SP4:kernel-headers-5.10.0-224.0.0.123.oe2203sp4.x86_64",
						"openEuler-22.03-LTS-SP4:kernel-source-5.10.0-224.0.0.123.oe2203sp4.x86_64",
						"openEuler-22.03-LTS-SP4:kernel-tools-5.10.0-224.0.0.123.oe2203sp4.x86_64",
						"openEuler-22.03-LTS-SP4:kernel-tools-debuginfo-5.10.0-224.0.0.123.oe2203sp4.x86_64",
						"openEuler-22.03-LTS-SP4:kernel-tools-devel-5.10.0-224.0.0.123.oe2203sp4.x86_64",
						"openEuler-22.03-LTS-SP4:perf-5.10.0-224.0.0.123.oe2203sp4.x86_64",
						"openEuler-22.03-LTS-SP4:perf-debuginfo-5.10.0-224.0.0.123.oe2203sp4.x86_64",
						"openEuler-22.03-LTS-SP4:python3-perf-5.10.0-224.0.0.123.oe2203sp4.x86_64",
						"openEuler-22.03-LTS-SP4:python3-perf-debuginfo-5.10.0-224.0.0.123.oe2203sp4.x86_64",
						"openEuler-22.03-LTS-SP4:kernel-5.10.0-224.0.0.123.oe2203sp4.src"
					]
				}
			],
			"threats":[
				{
					"details":"Medium",
					"category":"impact"
				}
			],
			"title":"CVE-2024-43839"
		}
	]
}